Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp5364491rwl; Tue, 11 Apr 2023 04:33:49 -0700 (PDT) X-Google-Smtp-Source: AKy350Z6xdxKKOQ7g011GNa8rvDIHx/6Rd3GiKBZ6hmixkFKQnl6c0lu5qCSwZu29ErVSVFFwv/t X-Received: by 2002:a17:902:e353:b0:1a1:af34:ab35 with SMTP id p19-20020a170902e35300b001a1af34ab35mr11005261plc.2.1681212829576; Tue, 11 Apr 2023 04:33:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681212829; cv=none; d=google.com; s=arc-20160816; b=uC9/U6WuXx/SI/G2tu0jVdwU8WcUKQS4zMp4QslwgvltVbKscEYxPWJk/lsFZq2exd 4RSlClUvM5KnHPdSCU2TXcmvTnIZ7w0l3fv4M4m3RLUmPpBD8bzX8ozxNsw9elfzFXGA sL7TjmoMOKoovZnS9Xfk0BaU/vRa/CzKZbDH30bvdIpR4gLI9WXJQsIlGrDCpxBtHctC 9AIm9vxkRfWzKkLB+AXhlhhiYUQhsSGHvtFlCOYaOQ5h66kUOSazAO3IIaL8gM8Totyr VXTWdXs29vePCf3r680gqCwhRCbgr2ThIt/to36G+pAs+Vuq7uobzgEhoOC9r5mdg1ti OZtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=aGauEiHqVA7QiQ97Qr+6UKOHPx0gVf8dVIWyTskmRwE=; b=gPIxPRbByuL6MZe777EhuzTJwuj6vnKh/ZC4oLKwq13OcrnHlmI8KjqhuBl6LEHlO5 NmANffEpEXSF0Fbh6ewxYG0AhFvM0P2B9yfyxsqTGGvIhPnbnnCakfGj9GVGxmtq8wU9 Zec5YZlEtK3Sswy8BOxkx0sXB2yXlzbM7sASvnLIbxOW5VLRNbtE4qhP5zNZJVsHmlyj 0i8mMIr0aZK2A9V7zWwhwGKp1QG6/VVWtYZqcP2cUUub/8PLZAYAUw1o0H6w58X0bDhn mSlj5eMW5qEfGT3NruZy+JRwfgtcDKWjftirkmQ65BQ8afJmSFPZz2+kBzSPIjRdaEGF Aagw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=scIGKx4q; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o15-20020a170902d4cf00b0019cd505cdc5si14361066plg.440.2023.04.11.04.33.41; Tue, 11 Apr 2023 04:33:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=scIGKx4q; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229622AbjDKLYr (ORCPT + 61 others); Tue, 11 Apr 2023 07:24:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34944 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229550AbjDKLYn (ORCPT ); Tue, 11 Apr 2023 07:24:43 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1670E3C25 for ; Tue, 11 Apr 2023 04:24:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:Cc:To:From:Subject:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=aGauEiHqVA7QiQ97Qr+6UKOHPx0gVf8dVIWyTskmRwE=; t=1681212279; x=1682421879; b=scIGKx4qF3aHq3p8pwA1rbiChj7EcwDFZX73KI7i+TIOdIY gbFCRFYM5EBcCcKiwPRwDL89agGcYbUL3LCP5QyQV30xhLO2a+G+Kn96jMX6XcW8qYH4gpc13IjDF NcF2lN2UowadVssA389dMmfEL7whZHD9xNU4gHktk6U35eX5vGd/5z1AuLmwGb9wOvz6Vwxphdlal mHO6o9uSzvGK6KDcUozqB+4dSYQU9paeud9/Jle+s44jQUwzLitHgzoJRQmWNvu8G5861WllyrucH 241e4ewX/KoZeCcUVvXZ/0L13pc20Ld8QIn4iuBnpRZEs3Lb8rS0lHjknOZyGN8w==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.96) (envelope-from ) id 1pmC72-00ChVj-1e; Tue, 11 Apr 2023 13:24:36 +0200 Message-ID: Subject: Re: [PATCH] wifi: wilc1000: fix kernel oops during interface down during background scan From: Johannes Berg To: Michael Walle , Ajay.Kathat@microchip.com, Kalle Valo Cc: linux-wireless@vger.kernel.org, Claudiu.Beznea@microchip.com, Sripad.Balwadgi@microchip.com, mwalle@kernel.org Date: Tue, 11 Apr 2023 13:24:35 +0200 In-Reply-To: References: <20230404012010.15261-1-ajay.kathat@microchip.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.4 (3.46.4-1.fc37) MIME-Version: 1.0 X-malware-bazaar: not-scanned X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Wed, 2023-04-05 at 13:40 +0200, Michael Walle wrote: >=20 > wilc_disconnect() is called from the cfg80211_ops::disconnect > callback. wilc_deinit() is called from net_device_ops::ndo_stop. > Is there any lock which prevents both functions be called in > parallel? I don't _think_ there's any common lock, ndo_stop() holds the RTNL, but cfg80211 for a normal nl80211 disconnect command will only briefly hold the RTNL and drop it again before calling into the driver. The internal flags here don't indicate requiring RTNL and that wouldn't make much sense either: { .cmd =3D NL80211_CMD_DISCONNECT, .validate =3D GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDAT= E_DUMP, .doit =3D nl80211_disconnect, .flags =3D GENL_UNS_ADMIN_PERM, .internal_flags =3D IFLAGS(NL80211_FLAG_NEED_NETDEV_UP), }, See commit a05829a7222e ("cfg80211: avoid holding the RTNL when calling the driver"). johannes