Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1039661rwl; Fri, 31 Mar 2023 06:04:08 -0700 (PDT) X-Google-Smtp-Source: AKy350aA9jac3zSv+BAXDK2U9UUoQGZYFb7y4g8s7U31iDt5nQAkDOB8LFhgT0xiAiBbCy7bCgEb X-Received: by 2002:a17:906:c003:b0:92f:7c42:8637 with SMTP id e3-20020a170906c00300b0092f7c428637mr27917138ejz.30.1680267848595; Fri, 31 Mar 2023 06:04:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680267848; cv=none; d=google.com; s=arc-20160816; b=NXhPgm51T1PTpwRYc31LWNHd5BX5ExpxhxJ5mJu8d73sDopRVcVQLJBbm5Cv/pqgN3 ZwWEzv6frLD38ZOtTV9zJFRZcZHv9SgjrexLxnp7AZnWRw1zLIqM9C7WJHiwCuPt9IgT /oz+VVk169czEPeMkzcDKahcgEyJnO9V/LtB5Q2jTzP8yUg9eIhdE+PcOHvLXM3c8hwV RFmcIrsez3ti6lTPwSz4Yau0qOY7mKimG6A2hAjEsUgkAQCf8kLvbjA8u5n9tjKGdt8f K5MqE2wac23SgFryMIw2hUubonwklZu81Tca+igwg503DDgVV79d8q/bJKXWnfPzBOuT nkdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=PthcXqQHfIIvrulqCpf/pSK92CCChT+kzDynrm2vM9A=; b=O4hgZCRhy8GndnmficZFpDOVYcRwRSLww8XHV/cal0t0k0037cJYQ5h82UuiZydA4x pfiEYcMB8xWK87e0OkBcC1jfFcFfhexUISCdh0aNAQzz8W6puirphRieR/F3jbTAMDoQ U5rb5X54iA3s64hKCr+lOpf/+eXm6t284weY7Cn+yhAqo0VMcKWDLou/tyZ8XVWvzAq7 qAdPZoDzkEc7+ZEaeTBVLSsMSOSxJs1ynkAOKmTQ+ICmv9xbdTU/M9qpa20FIcNemwEy r+ffnvJ8n/bbhcOpioX6lE1amxQIkFIsCJrN1MHq73789Hzdgq1EreU3ZTDItraRL/B5 /K3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n13-20020a1709062bcd00b0093dc70f1709si350200ejg.779.2023.03.31.06.03.49; Fri, 31 Mar 2023 06:04:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230488AbjCaM7T (ORCPT + 58 others); Fri, 31 Mar 2023 08:59:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232648AbjCaM7Q (ORCPT ); Fri, 31 Mar 2023 08:59:16 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 10ED81C1C1 for ; Fri, 31 Mar 2023 05:59:15 -0700 (PDT) Received: from ptx.hi.pengutronix.de ([2001:67c:670:100:1d::c0]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1piELT-0007HC-29; Fri, 31 Mar 2023 14:59:07 +0200 Received: from sha by ptx.hi.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1piELS-0002LD-Oy; Fri, 31 Mar 2023 14:59:06 +0200 Date: Fri, 31 Mar 2023 14:59:06 +0200 From: Sascha Hauer To: Martin Blumenstingl Cc: linux-wireless@vger.kernel.org, tony0620emma@gmail.com, kvalo@kernel.org, pkshih@realtek.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 1/3] wifi: rtw88: Move register access from rtw_bf_assoc() outside the RCU Message-ID: <20230331125906.GF15436@pengutronix.de> References: <20230108211324.442823-1-martin.blumenstingl@googlemail.com> <20230108211324.442823-2-martin.blumenstingl@googlemail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230108211324.442823-2-martin.blumenstingl@googlemail.com> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-Accept-Language: de,en X-Accept-Content-Type: text/plain User-Agent: Mutt/1.10.1 (2018-07-13) X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::c0 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-wireless@vger.kernel.org X-Spam-Status: No, score=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Sun, Jan 08, 2023 at 10:13:22PM +0100, Martin Blumenstingl wrote: > USB and (upcoming) SDIO support may sleep in the read/write handlers. > Shrink the RCU critical section so it only cover the call to > ieee80211_find_sta() and finding the ic_vht_cap/vht_cap based on the > found station. This moves the chip's BFEE configuration outside the > rcu_read_lock section and thus prevent "scheduling while atomic" or > "Voluntary context switch within RCU read-side critical section!" > warnings when accessing the registers using an SDIO card (which is > where this issue has been spotted in the real world - but it also > affects USB cards). Unfortunately this introduces a regression on my RTW8821CU chip. With this it constantly looses connection to the AP and reconnects shortly after: [ 199.771143] wlan0: authenticate with b0:be:76:5e:7b:34 [ 201.447301] wlan0: send auth to b0:be:76:5e:7b:34 (try 1/3) [ 201.456789] wlan0: authenticated [ 201.462356] wlan0: associate with b0:be:76:5e:7b:34 (try 1/3) [ 201.477263] wlan0: RX AssocResp from b0:be:76:5e:7b:34 (capab=0x431 status=0 aid=2) [ 201.512995] wlan0: associated [ 213.790399] wlan0: authenticate with b0:be:76:5e:7b:34 [ 215.467302] wlan0: send auth to b0:be:76:5e:7b:34 (try 1/3) [ 215.470532] wlan0: authenticated [ 215.490355] wlan0: associate with b0:be:76:5e:7b:34 (try 1/3) [ 215.503777] wlan0: RX AssocResp from b0:be:76:5e:7b:34 (capab=0x431 status=0 aid=2) [ 215.539608] wlan0: associated [ 227.770596] wlan0: authenticate with b0:be:76:5e:7b:34 [ 229.443302] wlan0: send auth to b0:be:76:5e:7b:34 (try 1/3) [ 229.451209] wlan0: authenticated [ 229.462487] wlan0: associate with b0:be:76:5e:7b:34 (try 1/3) [ 229.476077] wlan0: RX AssocResp from b0:be:76:5e:7b:34 (capab=0x431 status=0 aid=2) [ 229.513499] wlan0: associated [ 241.738494] wlan0: authenticate with b0:be:76:5e:7b:34 [ 243.407301] wlan0: send auth to b0:be:76:5e:7b:34 (try 1/3) [ 243.411207] wlan0: authenticated [ 243.423213] wlan0: associate with b0:be:76:5e:7b:34 (try 1/3) [ 243.439822] wlan0: RX AssocResp from b0:be:76:5e:7b:34 (capab=0x431 status=0 aid=2) [ 243.476731] wlan0: associated I haven't got any further information yet, I just realized this when I rebased my own RTW88 bugfix series from v6.2.2 to v6.3-rc4 before sending it. RTW8723D and RTW8822CU seem unaffected though. Sascha > > Reviewed-by: Ping-Ke Shih > Tested-by: Sascha Hauer > Signed-off-by: Martin Blumenstingl > --- > v1 -> v2: > - Added Ping-Ke's Reviewed-by (thank you!) > > v2 -> v3: > - Added Sascha's Tested-by (thank you!) > - added "wifi" prefix to the subject and reworded the title accordingly > > > drivers/net/wireless/realtek/rtw88/bf.c | 13 +++++++------ > 1 file changed, 7 insertions(+), 6 deletions(-) > > diff --git a/drivers/net/wireless/realtek/rtw88/bf.c b/drivers/net/wireless/realtek/rtw88/bf.c > index 038a30b170ef..c827c4a2814b 100644 > --- a/drivers/net/wireless/realtek/rtw88/bf.c > +++ b/drivers/net/wireless/realtek/rtw88/bf.c > @@ -49,19 +49,23 @@ void rtw_bf_assoc(struct rtw_dev *rtwdev, struct ieee80211_vif *vif, > > sta = ieee80211_find_sta(vif, bssid); > if (!sta) { > + rcu_read_unlock(); > + > rtw_warn(rtwdev, "failed to find station entry for bss %pM\n", > bssid); > - goto out_unlock; > + return; > } > > ic_vht_cap = &hw->wiphy->bands[NL80211_BAND_5GHZ]->vht_cap; > vht_cap = &sta->deflink.vht_cap; > > + rcu_read_unlock(); > + > if ((ic_vht_cap->cap & IEEE80211_VHT_CAP_MU_BEAMFORMEE_CAPABLE) && > (vht_cap->cap & IEEE80211_VHT_CAP_MU_BEAMFORMER_CAPABLE)) { > if (bfinfo->bfer_mu_cnt >= chip->bfer_mu_max_num) { > rtw_dbg(rtwdev, RTW_DBG_BF, "mu bfer number over limit\n"); > - goto out_unlock; > + return; > } > > ether_addr_copy(bfee->mac_addr, bssid); > @@ -75,7 +79,7 @@ void rtw_bf_assoc(struct rtw_dev *rtwdev, struct ieee80211_vif *vif, > (vht_cap->cap & IEEE80211_VHT_CAP_SU_BEAMFORMER_CAPABLE)) { > if (bfinfo->bfer_su_cnt >= chip->bfer_su_max_num) { > rtw_dbg(rtwdev, RTW_DBG_BF, "su bfer number over limit\n"); > - goto out_unlock; > + return; > } > > sound_dim = vht_cap->cap & > @@ -98,9 +102,6 @@ void rtw_bf_assoc(struct rtw_dev *rtwdev, struct ieee80211_vif *vif, > > rtw_chip_config_bfee(rtwdev, rtwvif, bfee, true); > } > - > -out_unlock: > - rcu_read_unlock(); > } > > void rtw_bf_init_bfer_entry_mu(struct rtw_dev *rtwdev, > -- > 2.39.0 > > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |