From: Oliver Hartkopp <socketcan@hartkopp.net>
To: "Thomas Körper" <Thomas.Koerper@esd.eu>,
"linux-can@vger.kernel.org" <linux-can@vger.kernel.org>
Subject: Re: Calling can_free_echo_skb() from interrupt causes WARN
Date: Wed, 29 Oct 2014 22:00:15 +0100 [thread overview]
Message-ID: <5451555F.1090800@hartkopp.net> (raw)
In-Reply-To: <8CE1D0B9BFD2404DA079DDE1814A6F2E02BB65718FFE@esd-s3.esd.local>
Hi Thomas,
did you fix this - or do we need to change it in can_free_echo_skb() globally?
Regards,
Oliver
On 30.09.2014 06:21, Thomas Körper wrote:
> Hi linux-can,
>
> I'm working on a new driver for one of our CAN cards.
>
> In the TX error interrupt I call can_free_echo_skb(), but I get a warning and stack trace then. I'd say its kfree_skb() must not be called from interrupt context - replacing it by dev_kfree_skb_any() seems to fix it.
>
> But I'm not the first one calling can_free_echo_skb() from interrupt... so, what am I missing?
>
>
> Regards,
> Thomas
>
>
> [ 1153.360705] ------------[ cut here ]------------
> [ 1153.360715] WARNING: CPU: 0 PID: 31 at net/core/skbuff.c:563 skb_release_head_state+0xb9/0xd0()
> [ 1153.360717] Modules linked in: can_raw esd402(O) can_dev(O) can arc4 md4 nls_utf8 cifs nfsv3 i915 nfsd auth_rpcgss nfs_acl rfcomm bnep nfs bluetooth hisax lockd video drm_kms_helper sunrpc drm coretemp kvm isdn fscache dell_wmi gpio_ich sparse_keymap i2c_algo_bit crc_ccitt binfmt_misc dcdbas lpc_ich serio_raw wmi mac_hid parport_pc ppdev lp parport hid_generic usbhid hid r8169 e1000e mii psmouse ptp pps_core
> [ 1153.360754] CPU: 0 PID: 31 Comm: kworker/0:1 Tainted: G O 3.17.0-rc4+ #1
> [ 1153.360756] Hardware name: Dell Inc. OptiPlex 760 /0M858N, BIOS A05 08/17/2009
> [ 1153.360760] 00000000 00000000 f580dedc c167906f 00000000 f580df0c c105bb7e c187cf30
> [ 1153.360764] 00000000 0000001f c1911ffb 00000233 c158b909 c158b909 f4e1a600 00000003
> [ 1153.360768] f4e1a600 f580df1c c105bc42 00000009 00000000 f580df28 c158b909 f4e1a600
> [ 1153.360772] Call Trace:
> [ 1153.360778] [<c167906f>] dump_stack+0x41/0x52
> [ 1153.360782] [<c105bb7e>] warn_slowpath_common+0x7e/0xa0
> [ 1153.360784] [<c158b909>] ? skb_release_head_state+0xb9/0xd0
> [ 1153.360786] [<c158b909>] ? skb_release_head_state+0xb9/0xd0
> [ 1153.360788] [<c105bc42>] warn_slowpath_null+0x22/0x30
> [ 1153.360791] [<c158b909>] skb_release_head_state+0xb9/0xd0
> [ 1153.360793] [<c158be90>] skb_release_all+0x10/0x30
> [ 1153.360795] [<c158bf06>] kfree_skb+0x36/0x80
> [ 1153.360799] [<f8486938>] ? can_free_echo_skb+0x28/0x40 [can_dev]
> [ 1153.360802] [<f8486938>] can_free_echo_skb+0x28/0x40 [can_dev]
> [ 1153.360805] [<f849a12c>] esd_pci402_interrupt+0x34c/0x57a [esd402]
> [ 1153.360809] [<c10a75b5>] handle_irq_event_percpu+0x35/0x180
> [ 1153.360811] [<c10a7623>] ? handle_irq_event_percpu+0xa3/0x180
> [ 1153.360813] [<c10a7731>] handle_irq_event+0x31/0x50
> [ 1153.360816] [<c10a9c7f>] handle_fasteoi_irq+0x6f/0x120
> [ 1153.360818] [<c10a9c10>] ? handle_edge_irq+0x110/0x110
> [ 1153.360822] [<c1011b61>] handle_irq+0x71/0x90
> [ 1153.360823] <IRQ> [<c168152c>] do_IRQ+0x3c/0xd0
> [ 1153.360829] [<c1680b6c>] common_interrupt+0x2c/0x34
> [ 1153.360834] [<c107d277>] ? finish_task_switch+0x47/0xf0
> [ 1153.360836] [<c167c27b>] __schedule+0x35b/0x7e0
> [ 1153.360839] [<c10a5334>] ? console_unlock+0x2c4/0x4d0
> [ 1153.360842] [<c13df500>] ? n_tty_receive_buf_common+0x890/0x890
> [ 1153.360845] [<c10707b6>] ? process_one_work+0x196/0x370
> [ 1153.360847] [<c167c723>] schedule+0x23/0x60
> [ 1153.360849] [<c1070de1>] worker_thread+0x161/0x460
> [ 1153.360852] [<c1090fcf>] ? __wake_up_locked+0x1f/0x30
> [ 1153.360854] [<c1070c80>] ? rescuer_thread+0x2f0/0x2f0
> [ 1153.360856] [<c1074f01>] kthread+0xa1/0xc0
> [ 1153.360859] [<c1680401>] ret_from_kernel_thread+0x21/0x30
> [ 1153.360861] [<c1074e60>] ? kthread_create_on_node+0x110/0x110
> [ 1153.360863] ---[ end trace 5ff83639cbb74b35 ]---
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-can" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
next prev parent reply other threads:[~2014-10-29 21:00 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-30 4:21 Calling can_free_echo_skb() from interrupt causes WARN Thomas Körper
2014-10-29 21:00 ` Oliver Hartkopp [this message]
2014-10-30 4:11 ` AW: " Thomas Körper
2014-10-30 20:37 ` Oliver Hartkopp
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5451555F.1090800@hartkopp.net \
--to=socketcan@hartkopp.net \
--cc=Thomas.Koerper@esd.eu \
--cc=linux-can@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).