From patchwork Mon Mar 24 22:45:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027941 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0357014EC46 for ; Mon, 24 Mar 2025 22:45:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856356; cv=none; b=cOhoBsEVIrhgep4dxqrLfPMOM9e9trvmwBd9+uD30w3Ld7LNhs45XfWmTGxQOqSXxw1whiRvjRJ7LZvc8Z8YTQ31kGbVz8+/hlkvIWw+CfWCWczOHP7O7giJsnMj82MJpVM98isa50vo8RaNsXEXftXpP0u1G23WN86VQBwg8IQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856356; c=relaxed/simple; bh=z0n8iRZOaeCnjLdNUUGn+3PeRbFnh2IHsSqf/RorZf0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=NTpL5R4sj6vvUAloyOZO7Tty4W/kZVbdqLEN94hAcQiKEDmxyynvjcYk2Qz24CblahdVXalucVEqYZVxr3YEwzLJnh2GW5ckmXAPEXAD5H4UqDjqhWtyYXAnrPsE0Vk55noUVnF3X87X1zZdaCjMOAek4JENjnkF59ZQxihJFyI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=l3zD9BKP; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="l3zD9BKP" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6DF02C4CEEE; Mon, 24 Mar 2025 22:45:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856353; bh=z0n8iRZOaeCnjLdNUUGn+3PeRbFnh2IHsSqf/RorZf0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=l3zD9BKP6ZCqkSeacbe0czGIen2ruscS07a8Z5JrgwOPWqJbltQk7YqvUibKpLUxH kUfUGNpHTrepc/IMXivB4o3RQrriPoXTEdHqYQjzvoZNFwJki9JXNAVY8u9X0rxZKa pSV3FIS4ld3a4THn7T2AHxaGwB5moyy5Hg0qoUxLboncfN/vWNh0mgowaB8+bNIJcA 5O1qG4VtmZ1NSboZDFgbosDoZuV1UlM0Ye3sCngbV3MRrWRZC7iQRzx4aylu2G1qyy YOapkPaUHqjwNg8o6mEj9ITKlZprijRuE8DjNPyV5MU0SR70HpZwQeKDTbRdL2ROfH g4fIAcKEWGzTA== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 01/11] net: bubble up taking netdev instance lock to callers of net_devmem_unbind_dmabuf() Date: Mon, 24 Mar 2025 15:45:27 -0700 Message-ID: <20250324224537.248800-2-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org A recent commit added taking the netdev instance lock in netdev_nl_bind_rx_doit(), but didn't remove it in net_devmem_unbind_dmabuf() which it calls from an error path. Always expect the callers of net_devmem_unbind_dmabuf() to hold the lock. This is consistent with net_devmem_bind_dmabuf(). (Not so) coincidentally this also protects mp_param with the instance lock, which the rest of this series needs. Fixes: 1d22d3060b9b ("net: drop rtnl_lock for queue_mgmt operations") Signed-off-by: Jakub Kicinski Reviewed-by: Mina Almasry --- v2: - rebase on a70f891e0fa0 ("net: devmem: do not WARN conditionally after netdev_rx_queue_restart()") v1: https://lore.kernel.org/20250312223507.805719-2-kuba@kernel.org --- net/core/devmem.c | 2 -- net/core/netdev-genl.c | 2 ++ 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/net/core/devmem.c b/net/core/devmem.c index 6802e82a4d03..ee145a2aa41c 100644 --- a/net/core/devmem.c +++ b/net/core/devmem.c @@ -128,12 +128,10 @@ void net_devmem_unbind_dmabuf(struct net_devmem_dmabuf_binding *binding) rxq->mp_params.mp_priv = NULL; rxq->mp_params.mp_ops = NULL; - netdev_lock(binding->dev); rxq_idx = get_netdev_rx_queue_index(rxq); err = netdev_rx_queue_restart(binding->dev, rxq_idx); WARN_ON(err && err != -ENETDOWN); - netdev_unlock(binding->dev); } xa_erase(&net_devmem_dmabuf_bindings, binding->id); diff --git a/net/core/netdev-genl.c b/net/core/netdev-genl.c index a186fea63c09..9e4882a22407 100644 --- a/net/core/netdev-genl.c +++ b/net/core/netdev-genl.c @@ -947,7 +947,9 @@ void netdev_nl_sock_priv_destroy(struct netdev_nl_sock *priv) mutex_lock(&priv->lock); list_for_each_entry_safe(binding, temp, &priv->bindings, list) { + netdev_lock(binding->dev); net_devmem_unbind_dmabuf(binding); + netdev_unlock(binding->dev); } mutex_unlock(&priv->lock); } From patchwork Mon Mar 24 22:45:28 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027942 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8EA4714EC46 for ; Mon, 24 Mar 2025 22:45:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856357; cv=none; b=JshbnsoB+WIDOj4iukKBUDM377vDN9gGPWZgw5sGfthh0VL8MxYrUpfocGs9IYPPQf+94Jc3DtjCXLbnmD+7zKX4l4sq3qKgr5WOWUBMWtEKMxZTcAT5z5InfhNN3rZ3O6gQhngiyNcQReFevJPr9G4VZwDhsWvYFhhBDlsCKMk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856357; c=relaxed/simple; bh=3TNQTLCEchXvr4LgWzTBDaHw8oUkTo4bLAcHl+BfFQc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=O8zZIiNdqeAZf6qyPr/+ak+nMqW++zWJhRlQ5UaVH4JXY9zLNmDTSoE/dllq17HW9Eu0Bt8R/0Zfn+A+z2jRv4oYnw+LNJwCoj49fA7bwPg3J9xoiTsfLuUfOSrm7G43uGeWAeiWVedhy8ilak7HdD6BWemubOhv32UJWdAXu5I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=PRX5zGVN; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="PRX5zGVN" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 22007C4CEE4; Mon, 24 Mar 2025 22:45:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856357; bh=3TNQTLCEchXvr4LgWzTBDaHw8oUkTo4bLAcHl+BfFQc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PRX5zGVNiyEW+Qvi/Cm4CnYrUM97Ol19tIdyg+s9pqC1rWVX2Qcaq7HDm+QpmJeEz xXSpBSHBPS2gliu9s94fHxasWcbE5Ns+mlE4zICpqT7Z7CA0EudHxOIsFmDa0A5vCu G50A4uiwCnixkhl9uwi0dzdt+Qm9GiT1Iq/WGL0MEU9BLP8O7Zsul9QQnbThpxbqLk wx8H3vzivtnZ5dStXd2CETHzvg3x5nrkz/SPYpSCxOJHJShFnHMOQAYl2SzbIblNXa ZhX1IHDtXvcEksVXfgTZnaM2SFXY+p8KAcu2a+0RTQCLg12Nu+Ytos8UVDHDTHgBJJ oAGXGPa1ofH+g== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 02/11] net: remove netif_set_real_num_rx_queues() helper for when SYSFS=n Date: Mon, 24 Mar 2025 15:45:28 -0700 Message-ID: <20250324224537.248800-3-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Since commit a953be53ce40 ("net-sysfs: add support for device-specific rx queue sysfs attributes"), so for at least a decade now it is safe to call net_rx_queue_update_kobjects() when SYSFS=n. That function does its own ifdef-inery and will return 0. Remove the unnecessary stub for netif_set_real_num_rx_queues(). Signed-off-by: Jakub Kicinski --- include/linux/netdevice.h | 10 ---------- net/core/dev.c | 2 -- 2 files changed, 12 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index f22cca7c03ad..55859c565f84 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -4062,17 +4062,7 @@ static inline bool netif_is_multiqueue(const struct net_device *dev) } int netif_set_real_num_tx_queues(struct net_device *dev, unsigned int txq); - -#ifdef CONFIG_SYSFS int netif_set_real_num_rx_queues(struct net_device *dev, unsigned int rxq); -#else -static inline int netif_set_real_num_rx_queues(struct net_device *dev, - unsigned int rxqs) -{ - dev->real_num_rx_queues = rxqs; - return 0; -} -#endif int netif_set_real_num_queues(struct net_device *dev, unsigned int txq, unsigned int rxq); diff --git a/net/core/dev.c b/net/core/dev.c index bcf81c3ff6a3..1a6e62792bb5 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -3160,7 +3160,6 @@ int netif_set_real_num_tx_queues(struct net_device *dev, unsigned int txq) } EXPORT_SYMBOL(netif_set_real_num_tx_queues); -#ifdef CONFIG_SYSFS /** * netif_set_real_num_rx_queues - set actual number of RX queues used * @dev: Network device @@ -3191,7 +3190,6 @@ int netif_set_real_num_rx_queues(struct net_device *dev, unsigned int rxq) return 0; } EXPORT_SYMBOL(netif_set_real_num_rx_queues); -#endif /** * netif_set_real_num_queues - set actual number of RX and TX queues used From patchwork Mon Mar 24 22:45:29 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027943 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4D7361EF368 for ; Mon, 24 Mar 2025 22:46:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856361; cv=none; b=hKJpbxrj+hMXVdY9M1zD8OJQjNM//ekW2MA3dr66pwBoaL4IB66EVcegKa6OZ1uIA0GEuFuj6hNr//lImyWVehkMNVdt7bzr4+BgL+RNP6CqQPLw5eyU+WYH59JpkGmxrG1zMBwmtKcLQ+CmvsfdN6q9J9JDmGWhzD/o3rJw374= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856361; c=relaxed/simple; bh=UJ1uMqcSjyYNXPVP+PPJN42NXmEZo49Xg9gS0iblTYI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=J5+DFFMHW7mkRymOmTGUl+PWjSfdqQUkAfJqToEyArg1DinTsoMqjDOJe7E4depXYPy+tqCvDIPb2ueb2MkiFfy8Xn1f0cq30v/6/T6Ypz8eZPpChmpPoZwp5Tu9p/giIanc4oBMyE49cDdIHWeWT76GddkARxb9c/i/x0VH7Z8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=LO2tZ4h8; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="LO2tZ4h8" Received: by smtp.kernel.org (Postfix) with ESMTPSA id BE3D1C4CEE4; Mon, 24 Mar 2025 22:45:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856360; bh=UJ1uMqcSjyYNXPVP+PPJN42NXmEZo49Xg9gS0iblTYI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LO2tZ4h8ul0HENj2eajtOVrMlvnlZoTyUmJZC26AF+qxq4eHfoyyw6bv6mJmkk1Zv YBdnYfmYXxdwS8nzNEXNQ7sczLRYZgg9eZDzhNtO17NOE9iVNalJJAmnVsWeW1GXwD EJyb+JXMUI5hr0RgKwMDCDo2ok+l60ZxVcin4dTO9bVmc16yXbIpO6sYgpBo4u0DG4 TFKW7mRGKuJqQ6UHhTMzB6h3ialaB56tlXav6gSqDbExtpNqjPRyCvZll2rDZX4an3 tgWIg1FvQge3Yjug08PoOJpbrcqxS4fm8mpsa2NS22oVnFSxymHIseMWvoWwb3/NyT /cwYDVzo4gJtQ== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 03/11] net: constify dev pointer in misc instance lock helpers Date: Mon, 24 Mar 2025 15:45:29 -0700 Message-ID: <20250324224537.248800-4-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org lockdep asserts and predicates can operate on const pointers. In the future this will let us add asserts in functions which operate on const pointers like dev_get_min_mp_channel_count(). Signed-off-by: Jakub Kicinski --- include/net/netdev_lock.h | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index 99631fbd7f54..689ffdfae50d 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -11,19 +11,20 @@ static inline bool netdev_trylock(struct net_device *dev) return mutex_trylock(&dev->lock); } -static inline void netdev_assert_locked(struct net_device *dev) +static inline void netdev_assert_locked(const struct net_device *dev) { lockdep_assert_held(&dev->lock); } -static inline void netdev_assert_locked_or_invisible(struct net_device *dev) +static inline void +netdev_assert_locked_or_invisible(const struct net_device *dev) { if (dev->reg_state == NETREG_REGISTERED || dev->reg_state == NETREG_UNREGISTERING) netdev_assert_locked(dev); } -static inline bool netdev_need_ops_lock(struct net_device *dev) +static inline bool netdev_need_ops_lock(const struct net_device *dev) { bool ret = dev->request_ops_lock || !!dev->queue_mgmt_ops; @@ -46,7 +47,7 @@ static inline void netdev_unlock_ops(struct net_device *dev) netdev_unlock(dev); } -static inline void netdev_ops_assert_locked(struct net_device *dev) +static inline void netdev_ops_assert_locked(const struct net_device *dev) { if (netdev_need_ops_lock(dev)) lockdep_assert_held(&dev->lock); From patchwork Mon Mar 24 22:45:30 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027944 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DBE5C1DFD8B for ; Mon, 24 Mar 2025 22:46:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856364; cv=none; b=TVMvpwSEQ3fSuVytbVEg8CoFob1UsVe/t23tT8GdEdZMxR7lBIYFCvjrGXMm4udOlTYVPxc/cM133H8IB3ipU3GRX8f+UfirjCRdWr8iEUVHqOAu5xQL6y/4TqMamu+kNrtcMa0svmDPzoQPeDNuZGLRbDTXBqNLF5jhPQgDS2Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856364; c=relaxed/simple; bh=fze7toAYLrwXIQgj4K9hYHKNQagZ6zZ8bnnevx9Ngwo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=iG5s9DcUHaQTGbycY+n9ktKJyTqXzWGxxH4BuXJM36n3X6B0oV7xSeL0+o7l0m045YOUeGDw7sThC2ZGZ2fqoA6mDjtNz4FZ6qOFKA1YHVp2vyRArTax5oKp59hEZG9rDngtJo6BLNCIltzFoJBf0gin5RbdKxr13r0c25RcO0k= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Hp9YVRgJ; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Hp9YVRgJ" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6673AC4CEDD; Mon, 24 Mar 2025 22:46:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856364; bh=fze7toAYLrwXIQgj4K9hYHKNQagZ6zZ8bnnevx9Ngwo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Hp9YVRgJrAdfxonWg/1ztkT9w6osGK/9hlvOUgMBXK+q6oRZXxcAVr2gXx39GOgAD 2Lv8rn/1Aj46kcGsc5w39OK+s9lYPqs1dzbO82d98hWeGVoIyIjRgh0GPw4IuBD1Rt zE0uanoB6oO17zJDpbPFdkc/C9vrCk0k1SHeE18luYbGRIJXc4i5ZHB9FfNuD+Y0J2 V9oHljk/1VGugdzLh2bfxpXW3w5Fxyji2q/K63OTYqvyCtTm2PtKQkvVfxVbLElhXw 8hOoNDayu+pWYfmc6vrLRYHnJdyIAYG+QTm8pCAKNix5X/0piNGQmfInzndueWMZrS 4oDXuEji1Er1A== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 04/11] net: explain "protection types" for the instance lock Date: Mon, 24 Mar 2025 15:45:30 -0700 Message-ID: <20250324224537.248800-5-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Try to define some terminology for which fields are protected by which lock and how. Some fields are protected by both rtnl_lock and instance lock which is hard to talk about without having a "key phrase" to refer to a particular protection scheme. "ops protected" fields are defined later in the series, one by one. Add ASSERT_RTNL() to netdev_ops_assert_locked() for drivers not other instance protection of ops. Hopefully it's not too confusion that netdev_lock_ops() does not match the lock which netdev_ops_assert_locked() will assert, exactly. The noun "ops" is in a different place in the name, so I think it's acceptable... Signed-off-by: Jakub Kicinski --- include/linux/netdevice.h | 24 ++++++++++++++++++------ include/net/netdev_lock.h | 3 +++ 2 files changed, 21 insertions(+), 6 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index 55859c565f84..09773e5c109a 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -2496,19 +2496,31 @@ struct net_device { * Should always be taken using netdev_lock() / netdev_unlock() helpers. * Drivers are free to use it for other protection. * - * Protects: + * For the drivers that implement shaper or queue API, the scope + * of this lock is expanded to cover most ndo/queue/ethtool/sysfs + * operations. Drivers may opt-in to this behavior by setting + * @request_ops_lock. + * + * @lock protection mixes with rtnl_lock in multiple ways, fields are + * either: + * - simply protected by the instance @lock; + * - double protected - writers hold both locks, readers hold either; + * - ops protected - protected by the lock held around the NDOs + * and other callbacks, that is the instance lock on devices for + * which netdev_need_ops_lock() returns true, otherwise by rtnl_lock; + * - double ops protected - always protected by rtnl_lock but for + * devices for which netdev_need_ops_lock() returns true - also + * the instance lock. + * + * Simply protects: * @gro_flush_timeout, @napi_defer_hard_irqs, @napi_list, * @net_shaper_hierarchy, @reg_state, @threaded * - * Partially protects (writers must hold both @lock and rtnl_lock): + * Double protects: * @up * * Also protects some fields in struct napi_struct. * - * For the drivers that implement shaper or queue API, the scope - * of this lock is expanded to cover most ndo/queue/ethtool/sysfs - * operations. - * * Ordering: take after rtnl_lock. */ struct mutex lock; diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index 689ffdfae50d..efd302375ef2 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -5,6 +5,7 @@ #include #include +#include static inline bool netdev_trylock(struct net_device *dev) { @@ -51,6 +52,8 @@ static inline void netdev_ops_assert_locked(const struct net_device *dev) { if (netdev_need_ops_lock(dev)) lockdep_assert_held(&dev->lock); + else + ASSERT_RTNL(); } static inline int netdev_lock_cmp_fn(const struct lockdep_map *a, From patchwork Mon Mar 24 22:45:31 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027945 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2BEA2189520 for ; Mon, 24 Mar 2025 22:46:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856368; cv=none; b=vCaQX8VE8I41SBrp3xX+FJIY69szIgJQbv0sw4+CYn9gJmBgQbqIeI0oB8lm4dhX+bieH9W+bDaUX1GSX9FRMeYINfYYoIlrsMDIbWHXeGKRnpbJrziP3dfj6uNb8cZdP555xCf7fxdHGefL+MwQXn67DE47LtVygs/9CTZ6uT8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856368; c=relaxed/simple; bh=N8ce7/T2rdGP3Dp6ms+l8h8orXsx57wAFWWsqkkX7NM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=QO4vK7fDQpa9NJI39qmYv42gb27uZiPEEwDTHIYJC9vKUjBTgXc1+m0pWneYO8q+aXCGiEJ7+A81L0WIOC9Tb6NsL2zHSMLHvOpDqML4IgrSwKlJTn2ln1JG9E2uQVPSfAvj7eMBQpzXwo6nKkCZwRtDBjFwQfqpERF3BJA0ToE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=oGg78okt; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="oGg78okt" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0E8C4C4CEDD; Mon, 24 Mar 2025 22:46:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856368; bh=N8ce7/T2rdGP3Dp6ms+l8h8orXsx57wAFWWsqkkX7NM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oGg78oktDth4jiA0z93PniAMXDlqy3GOutIrNX5T8+AO/xPBAUNsbQYsEWpMH42hM I43vwmrT4Q1TnsIevYLJQoiw2aTfRaB8cae4PF8uy1PenivTgPL6jRVi3u0nNxuGR2 2Rtf66swGAvd5IhKARGd0Vw52300WUimjPGLDZvIvBMWVrezL48U1AQT3lP09gPJhm T9CZgmXomUSyw8oJcLfemlOblYvsy+nlOY3X/s8sMKxwaqLXXeA8LY6szYxtieovca Jl7t0egNloMj3debzeU8dnn9acH8pwn8RfgdMTioEi9CqIEInjy9WWQwaxmlUzp7UI sxb8sJ5+I48Dw== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 05/11] net: designate queue counts as "double ops protected" by instance lock Date: Mon, 24 Mar 2025 15:45:31 -0700 Message-ID: <20250324224537.248800-6-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Drivers which opt into instance lock protection of ops should only call set_real_num_*_queues() under the instance lock. This means that queue counts are double protected (writes are under both rtnl_lock and instance lock, readers under either). Some readers may still be under the rtnl_lock, however, so for now we need double protection of writers. OTOH queue API paths are only under the protection of the instance lock, so we need to validate that the instance is actually locking ops, otherwise the input checks we do against queue count are racy. Signed-off-by: Jakub Kicinski --- include/linux/netdevice.h | 3 +++ net/core/dev.c | 2 ++ net/core/net-sysfs.c | 2 ++ net/core/netdev-genl.c | 7 +++++++ net/core/netdev_rx_queue.c | 3 +++ 5 files changed, 17 insertions(+) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index 09773e5c109a..3dbce9cd3f5a 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -2519,6 +2519,9 @@ struct net_device { * Double protects: * @up * + * Double ops protects: + * @real_num_rx_queues, @real_num_tx_queues + * * Also protects some fields in struct napi_struct. * * Ordering: take after rtnl_lock. diff --git a/net/core/dev.c b/net/core/dev.c index 1a6e62792bb5..aa99c91fd68f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -3130,6 +3130,7 @@ int netif_set_real_num_tx_queues(struct net_device *dev, unsigned int txq) if (dev->reg_state == NETREG_REGISTERED || dev->reg_state == NETREG_UNREGISTERING) { ASSERT_RTNL(); + netdev_ops_assert_locked(dev); rc = netdev_queue_update_kobjects(dev, dev->real_num_tx_queues, txq); @@ -3179,6 +3180,7 @@ int netif_set_real_num_rx_queues(struct net_device *dev, unsigned int rxq) if (dev->reg_state == NETREG_REGISTERED) { ASSERT_RTNL(); + netdev_ops_assert_locked(dev); rc = net_rx_queue_update_kobjects(dev, dev->real_num_rx_queues, rxq); diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c index abaa1c919b98..fa8c8c364a9a 100644 --- a/net/core/net-sysfs.c +++ b/net/core/net-sysfs.c @@ -2148,8 +2148,10 @@ static void remove_queue_kobjects(struct net_device *dev) net_rx_queue_update_kobjects(dev, real_rx, 0); netdev_queue_update_kobjects(dev, real_tx, 0); + netdev_lock_ops(dev); dev->real_num_rx_queues = 0; dev->real_num_tx_queues = 0; + netdev_unlock_ops(dev); #ifdef CONFIG_SYSFS kset_unregister(dev->queues_kset); #endif diff --git a/net/core/netdev-genl.c b/net/core/netdev-genl.c index 9e4882a22407..fd1cfa9707dc 100644 --- a/net/core/netdev-genl.c +++ b/net/core/netdev-genl.c @@ -867,6 +867,13 @@ int netdev_nl_bind_rx_doit(struct sk_buff *skb, struct genl_info *info) goto err_unlock_sock; } + if (!netdev_need_ops_lock(netdev)) { + err = -EOPNOTSUPP; + NL_SET_BAD_ATTR(info->extack, + info->attrs[NETDEV_A_DEV_IFINDEX]); + goto err_unlock; + } + if (dev_xdp_prog_count(netdev)) { NL_SET_ERR_MSG(info->extack, "unable to bind dmabuf to device with XDP program attached"); err = -EEXIST; diff --git a/net/core/netdev_rx_queue.c b/net/core/netdev_rx_queue.c index a5b234b33cd5..3af716f77a13 100644 --- a/net/core/netdev_rx_queue.c +++ b/net/core/netdev_rx_queue.c @@ -92,6 +92,9 @@ static int __net_mp_open_rxq(struct net_device *dev, unsigned ifq_idx, struct netdev_rx_queue *rxq; int ret; + if (!netdev_need_ops_lock(dev)) + return -EOPNOTSUPP; + if (ifq_idx >= dev->real_num_rx_queues) return -EINVAL; ifq_idx = array_index_nospec(ifq_idx, dev->real_num_rx_queues); From patchwork Mon Mar 24 22:45:32 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027946 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BA4121EF092 for ; Mon, 24 Mar 2025 22:46:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856371; cv=none; b=VYAEOZqV2s6RLoy5Cs0+W/sTV5gC5ybksUHuviLtcMiqwJf2asMaNr5Aa96A/Fawe0t/bbWN50lgeCsiYJNfL8qj+1SWzCrHZLpDyINHPtxfnDIBd4Bm2cvJiICWlD1G4sMDTsQxulNuo81JZ4qdT9BD6ym7jjNMCcZqMm8RDAk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856371; c=relaxed/simple; bh=z/I/BtRF99v+TA+ww7AuEtVGtX1QLInv2akaA9X0L/g=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=A54StCDMiYtUufiw7MqK3flub3MXiDvnn2sP4e0PTPugLpHodHwcTNDhLJ2Qe28BlwTfA+491cky9Zma7jxwMr/Jv3RFNr/rCf+fRkV4D+q8ufw6SiLL9f4Dve9nTBOGrSDyIGqIQEKntc/uRuQVlYOypxryRkct3DBkY9fVsf4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=IbC99N45; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="IbC99N45" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A9BD2C4CEED; Mon, 24 Mar 2025 22:46:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856371; bh=z/I/BtRF99v+TA+ww7AuEtVGtX1QLInv2akaA9X0L/g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IbC99N45j4OuT6mnu8Voug9bJTB9MVLbcvvuU2o8MRGrDa2PzuKUQoeQu7ey9zc7A hEnjIu6DRbHqAtiq0xPSQtpt416EOb/cYTeCxfUCp0hpVpGBK4qMnja2Qj/J3vMJlH h8YXA/XJhndkJEJNeRXRS79K6jU7IiuWpZ5tdl6yTJKFAh/VFRDjkrZn/R6k2aUT3c O6UF088d7dvha2Sbia4MgEx0gt+vJ/xgZVYvJMVA87OVHKukfKVBa3EfrPuA1gFumV iG/C//VrcLvjTahOPonADEm3gaBcU0dlJVO6XP9yH3ILs4OXxqk0uxjgmCykDxVsGU 9SbnZwiSxdBwQ== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 06/11] net: designate queue -> napi linking as "ops protected" Date: Mon, 24 Mar 2025 15:45:32 -0700 Message-ID: <20250324224537.248800-7-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org netdev netlink is the only reader of netdev_{,rx_}queue->napi, and it already holds netdev->lock. Switch protection of the writes to netdev->lock to "ops protected". The expectation will be now that accessing queue->napi will require netdev->lock for "ops locked" drivers, and rtnl_lock for all other drivers. Current "ops locked" drivers don't require any changes. gve and netdevsim use _locked() helpers right next to netif_queue_set_napi() so they must be holding the instance lock. iavf doesn't call it. bnxt is a bit messy but all paths seem locked. Signed-off-by: Jakub Kicinski --- include/linux/netdevice.h | 5 +++-- include/net/netdev_lock.h | 8 ++++++++ include/net/netdev_rx_queue.h | 2 +- net/core/dev.c | 3 +-- 4 files changed, 13 insertions(+), 5 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index 3dbce9cd3f5a..fd508e9f148c 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -710,7 +710,7 @@ struct netdev_queue { * slow- / control-path part */ /* NAPI instance for the queue - * Readers and writers must hold RTNL + * "ops protected", see comment about net_device::lock */ struct napi_struct *napi; @@ -2522,7 +2522,8 @@ struct net_device { * Double ops protects: * @real_num_rx_queues, @real_num_tx_queues * - * Also protects some fields in struct napi_struct. + * Also protects some fields in: + * struct napi_struct, struct netdev_queue, struct netdev_rx_queue * * Ordering: take after rtnl_lock. */ diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index efd302375ef2..1c0c9a94cc22 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -56,6 +56,14 @@ static inline void netdev_ops_assert_locked(const struct net_device *dev) ASSERT_RTNL(); } +static inline void +netdev_ops_assert_locked_or_invisible(const struct net_device *dev) +{ + if (dev->reg_state == NETREG_REGISTERED || + dev->reg_state == NETREG_UNREGISTERING) + netdev_ops_assert_locked(dev); +} + static inline int netdev_lock_cmp_fn(const struct lockdep_map *a, const struct lockdep_map *b) { diff --git a/include/net/netdev_rx_queue.h b/include/net/netdev_rx_queue.h index af40842f229d..b2238b551dce 100644 --- a/include/net/netdev_rx_queue.h +++ b/include/net/netdev_rx_queue.h @@ -24,7 +24,7 @@ struct netdev_rx_queue { struct xsk_buff_pool *pool; #endif /* NAPI instance for the queue - * Readers and writers must hold RTNL + * "ops protected", see comment about net_device::lock */ struct napi_struct *napi; struct pp_memory_provider_params mp_params; diff --git a/net/core/dev.c b/net/core/dev.c index aa99c91fd68f..690d46497b2f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -6896,8 +6896,7 @@ void netif_queue_set_napi(struct net_device *dev, unsigned int queue_index, if (WARN_ON_ONCE(napi && !napi->dev)) return; - if (dev->reg_state >= NETREG_REGISTERED) - ASSERT_RTNL(); + netdev_ops_assert_locked_or_invisible(dev); switch (type) { case NETDEV_QUEUE_TYPE_RX: From patchwork Mon Mar 24 22:45:33 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027947 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CA05C1EF092 for ; Mon, 24 Mar 2025 22:46:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856378; cv=none; b=Ez/PjE/zxmgXfKtERZJ3budcpS2QKbEXLzRD4ZgukQpFbO5h/PGvfn21Cw7arH9bUtJsn0TEwbzKbPE52QJzmYBoCmVN4nrI7WySbWW+xjVf8MDKbs2Zt2C0sPtszS+xkZw89W9mQCSsyQifK39dJKSAp4bK+zGno5vxCXAnneY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856378; c=relaxed/simple; bh=xRv1UD8qVJqW/FKNvUkdOCzK4lkqrdz8hvC31IgcWE4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=QenxENuF2Aq+rO17Rujnr/iJRd0qBK3JzVrHkOqC6PGIcpmCSgElNlB25Oq06as8OYTmE+I/TVrpUQu/i+MfSBIVtxG5uFgN4M33A3GGuCsXw9FoEY4w0u0tTOwbb9gR0MDB+J883Muuyfug4qhBx67GMQgMQaxQO7G3qQyc59E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=hQgKJW+p; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="hQgKJW+p" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4FF19C4CEE4; Mon, 24 Mar 2025 22:46:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856375; bh=xRv1UD8qVJqW/FKNvUkdOCzK4lkqrdz8hvC31IgcWE4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hQgKJW+pzX5B/IQpCDgVDgVliI55yQcTIZv/rqUBuS+L+qW76WRM9jysMNfTnL0LF zNfOE9j8KFG++mCkEvmN3tCZcHz5YveWErMdQHH6qHEtWF3JQyFVpkKWKYM12MVgFA WygJNAu22Wdco81uMELj/UKFLTI932SQ8omEA3NKhh6ZQToxRk8kYlpB1lMJCVh/qc W2OcVGdIyTIPYyIrr4NQX8U+v0nqggiYziByl/yDku4GG0skupmE9AUoXRh44relJZ SCCp4H0EcPfULS631PyDw39PZcpxaDAnQPCm6gzFvVz5NsZA1KdmpTW8FvP4bE9bp4 +J3sopQeZOd4g== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 07/11] net: protect rxq->mp_params with the instance lock Date: Mon, 24 Mar 2025 15:45:33 -0700 Message-ID: <20250324224537.248800-8-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Ensure that all accesses to mp_params are under the netdev instance lock. The only change we need is to move dev_memory_provider_uninstall() under the lock. Appropriately swap the asserts. Signed-off-by: Jakub Kicinski Reviewed-by: Mina Almasry --- net/core/dev.c | 4 ++-- net/core/page_pool.c | 7 ++----- 2 files changed, 4 insertions(+), 7 deletions(-) diff --git a/net/core/dev.c b/net/core/dev.c index 690d46497b2f..652f2c6f5674 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -10353,7 +10353,7 @@ u32 dev_get_min_mp_channel_count(const struct net_device *dev) { int i; - ASSERT_RTNL(); + netdev_ops_assert_locked(dev); for (i = dev->real_num_rx_queues - 1; i >= 0; i--) if (dev->_rx[i].mp_params.mp_priv) @@ -11957,9 +11957,9 @@ void unregister_netdevice_many_notify(struct list_head *head, dev_tcx_uninstall(dev); netdev_lock_ops(dev); dev_xdp_uninstall(dev); + dev_memory_provider_uninstall(dev); netdev_unlock_ops(dev); bpf_dev_bound_netdev_unregister(dev); - dev_memory_provider_uninstall(dev); netdev_offload_xstats_disable_all(dev); diff --git a/net/core/page_pool.c b/net/core/page_pool.c index acef1fcd8ddc..7745ad924ae2 100644 --- a/net/core/page_pool.c +++ b/net/core/page_pool.c @@ -11,6 +11,7 @@ #include #include +#include #include #include #include @@ -279,11 +280,7 @@ static int page_pool_init(struct page_pool *pool, get_device(pool->p.dev); if (pool->slow.flags & PP_FLAG_ALLOW_UNREADABLE_NETMEM) { - /* We rely on rtnl_lock()ing to make sure netdev_rx_queue - * configuration doesn't change while we're initializing - * the page_pool. - */ - ASSERT_RTNL(); + netdev_assert_locked(pool->slow.netdev); rxq = __netif_get_rx_queue(pool->slow.netdev, pool->slow.queue_idx); pool->mp_priv = rxq->mp_params.mp_priv; From patchwork Mon Mar 24 22:45:34 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027948 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 220771EFFB4 for ; Mon, 24 Mar 2025 22:46:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856379; cv=none; b=l2JX0W7PD7nc/bW1r0ke21M59F25fzaxolNMWlrmw3ZyeYrAZtXkvZeBlR2cWslAuPW2rDtCcCwIj0LZ6soSfL+hcn0S7RAPKExtjdxcOTYlc/GY6GIaY8d60WYkBUB6NiKHZ4Pbym3JI4UrOLrkyx9Xdmru3bDWBhtcvjECn38= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856379; c=relaxed/simple; bh=gy4V265Rzlh5uqWJcjwtsQl8QJYZ6Ht2/0ulv0joOBU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=uSMORB13kOyHBeKu7cudS+Yw/FaOhauINWl/yOD97vVytp7yEPhEHgqic3P6jHNgZOhHuFPXbegLlKNmhuPHhsJ2gUUEfiYrHy+FVgoy/wexZAKxauxDNl4iRJt2/ACJuSyPyAK8Nv3bclhMMOTWSOX7AgcLS75iJnC7DVudGuM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=JjfSEg5S; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="JjfSEg5S" Received: by smtp.kernel.org (Postfix) with ESMTPSA id F31C1C4CEED; Mon, 24 Mar 2025 22:46:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856379; bh=gy4V265Rzlh5uqWJcjwtsQl8QJYZ6Ht2/0ulv0joOBU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JjfSEg5SIcN7Z80CWgMT0PLArf5/LRCxtefl33Y9AxZZ2SzRo/K9e7YZRdqcsF/Jo BPfx4Dm1wWhcsgfETfeyWa/Sx90vVOlxpeLo5Qkig6K/y6xctkB2xsSWQwD2/rxSNj e3VdY4H2C19CbxzNkZw+EgKmpk2uslKY8wCFjdYzyz6cPRfjSY91SgS12AKXzCTwCF Jz9q2KcCa0Zyck1Npv6yeq30wPWWI9kiV5MAFEceqg3HQT3jgqrgvV7ffzs9d3MXC4 cqdqc23h6qkdd4Oi+WcrU7/hCbm78FRIWIV7FLLvcciz7nW1zopbDYPSfcqbZua3Gg Wx78O5xai5gDA== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 08/11] net: make NETDEV_UNREGISTER and instance lock more consistent Date: Mon, 24 Mar 2025 15:45:34 -0700 Message-ID: <20250324224537.248800-9-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org The NETDEV_UNREGISTER notifier gets called under the ops lock when device changes namespace but not during real unregistration. Take it consistently, XSK tries to poke at netdev queue state from this notifier. Signed-off-by: Jakub Kicinski --- net/core/dev.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/net/core/dev.c b/net/core/dev.c index 652f2c6f5674..7bd8bd82f66f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -1848,7 +1848,9 @@ static void call_netdevice_unregister_notifiers(struct notifier_block *nb, dev); call_netdevice_notifier(nb, NETDEV_DOWN, dev); } + netdev_lock_ops(dev); call_netdevice_notifier(nb, NETDEV_UNREGISTER, dev); + netdev_unlock_ops(dev); } static int call_netdevice_register_net_notifiers(struct notifier_block *nb, @@ -11174,8 +11176,11 @@ static struct net_device *netdev_wait_allrefs_any(struct list_head *list) rtnl_lock(); /* Rebroadcast unregister notification */ - list_for_each_entry(dev, list, todo_list) + list_for_each_entry(dev, list, todo_list) { + netdev_lock_ops(dev); call_netdevice_notifiers(NETDEV_UNREGISTER, dev); + netdev_unlock_ops(dev); + } __rtnl_unlock(); rcu_barrier(); @@ -11966,7 +11971,9 @@ void unregister_netdevice_many_notify(struct list_head *head, /* Notify protocols, that we are about to destroy * this device. They should clean all the things. */ + netdev_lock_ops(dev); call_netdevice_notifiers(NETDEV_UNREGISTER, dev); + netdev_unlock_ops(dev); if (!dev->rtnl_link_ops || dev->rtnl_link_state == RTNL_LINK_INITIALIZED) From patchwork Mon Mar 24 22:45:35 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027949 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D344E1EFFB4 for ; Mon, 24 Mar 2025 22:46:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856382; cv=none; b=S/13z/hgLYgVIaidDlch+8cHtPDIcwCpcTd3gUhrCy/yOSeV7yRs6cprMwaKjbgd+m5hu9dMdd1r9OXaNg5t0Hq02/xvkvXhKBxhus3xtssNsrg99UCGijoTG4EDtqqzA6uaeuTaWf3VQ1ldsw3DMQj1gU63BhfGqE5nNqAt02U= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856382; c=relaxed/simple; bh=8jyNDr+eYZir264pbPdlC6Gm7Uz7FyKF6wEuoqFukd4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=BktmwNYphoPpIrcxIcwd9yv8UJli6+gr0rVYYbTUX3gyG2o/e7+eGG2cuu+CK3yXM6Mu583Wcm2I+HFkFN/BI2X0vIY2Cr82kot3xyPu9EZieBXOkAOPXciJi2mxdZK3EFzVmcZJrCfAN+b8N79rWuuITyOsaDT1LSFh7fPzgAQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=dIqOFYAL; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="dIqOFYAL" Received: by smtp.kernel.org (Postfix) with ESMTPSA id AA9D0C4CEDD; Mon, 24 Mar 2025 22:46:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856382; bh=8jyNDr+eYZir264pbPdlC6Gm7Uz7FyKF6wEuoqFukd4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dIqOFYALTYZdA71mPcykaBqOZWJfM8h3kCyXsuHQcqraf+oSmS/fPX3kCARCOO8lk Da8+Jg6JeT8qn/JkJXzdiNJHp3iFPVnKH4Wz2DTcy2rvt8jWXqmFKwD+94yAxGc+8G rB0tZ4g0DkW8eST/eNwE14FaolAv4vjc4H8Djk0LYQPqnNCSlBxSU0EkVsRoIhCBCm +YhJ7stDWK2F70m2vE9I865nGNLO/EcsZQ3aiHGxeTyXmq53Sj6/pZf/tMXfR5fwOd 3tHREXIbuGk54TV0breuHVHhtg3zLmMc2vSkjcUFOgt4BzbfcsSAo2jC4IeukaoKkl DGLrJbV1as23A== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 09/11] net: designate XSK pool pointers in queues as "ops protected" Date: Mon, 24 Mar 2025 15:45:35 -0700 Message-ID: <20250324224537.248800-10-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Read accesses go via xsk_get_pool_from_qid(), the call coming from the core and gve look safe (other "ops locked" drivers don't support XSK). Write accesses go via xsk_reg_pool_at_qid() and xsk_clear_pool_at_qid(). Former is already under the ops lock, latter needs to be locked when coming from the workqueue via xp_clear_dev(). Signed-off-by: Jakub Kicinski --- v2: - only clear if netdev still set v1: https://lore.kernel.org/20250312223507.805719-10-kuba@kernel.org --- include/linux/netdevice.h | 1 + include/net/netdev_rx_queue.h | 6 +++--- net/xdp/xsk_buff_pool.c | 7 ++++++- 3 files changed, 10 insertions(+), 4 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index fd508e9f148c..15f8b596da66 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -688,6 +688,7 @@ struct netdev_queue { /* Subordinate device that the queue has been assigned to */ struct net_device *sb_dev; #ifdef CONFIG_XDP_SOCKETS + /* "ops protected", see comment about net_device::lock */ struct xsk_buff_pool *pool; #endif diff --git a/include/net/netdev_rx_queue.h b/include/net/netdev_rx_queue.h index b2238b551dce..8cdcd138b33f 100644 --- a/include/net/netdev_rx_queue.h +++ b/include/net/netdev_rx_queue.h @@ -20,12 +20,12 @@ struct netdev_rx_queue { struct net_device *dev; netdevice_tracker dev_tracker; + /* All fields below are "ops protected", + * see comment about net_device::lock + */ #ifdef CONFIG_XDP_SOCKETS struct xsk_buff_pool *pool; #endif - /* NAPI instance for the queue - * "ops protected", see comment about net_device::lock - */ struct napi_struct *napi; struct pp_memory_provider_params mp_params; } ____cacheline_aligned_in_smp; diff --git a/net/xdp/xsk_buff_pool.c b/net/xdp/xsk_buff_pool.c index 25a76c5ce0f1..c7e50fd86c6a 100644 --- a/net/xdp/xsk_buff_pool.c +++ b/net/xdp/xsk_buff_pool.c @@ -279,9 +279,14 @@ static void xp_release_deferred(struct work_struct *work) { struct xsk_buff_pool *pool = container_of(work, struct xsk_buff_pool, work); + struct net_device *netdev = pool->netdev; rtnl_lock(); - xp_clear_dev(pool); + if (netdev) { + netdev_lock_ops(netdev); + xp_clear_dev(pool); + netdev_unlock_ops(netdev); + } rtnl_unlock(); if (pool->fq) { From patchwork Mon Mar 24 22:45:36 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027950 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D416E1F03FF for ; Mon, 24 Mar 2025 22:46:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856386; cv=none; b=htn3eagqI+ywJ+FHrlaQirzAHHVZCincWdsYEKTSwe8niis1JCO4A3y1eWtkOuqzS7AvXG27yyGAD6I46V4G3lq/jIImK5vEawedgLdCe+yXpJzORnfD96ah41S454wA2JPeRi8Y6xwCooS8FwV8fe+aRuhUaBxCvZOWKpDv71Y= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856386; c=relaxed/simple; bh=h/mtOsvuECjaC2R3nd+Z9hHhktziYVYcFtpdVFN4gH8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=urL6ujg1PFx/JMXzTs7VcDOmYpnpTtKbhqrb8SI73niFMA5kVx3j6S6k7fKFs/JF1g83rIw0XDE6sFMh3gdZRB/5HuQpLJ43Q8g5BZyxqmBrJ6kQ55P8W4v2Y92PSBG5ph4oN0K57VbDQQ7ym25yfQoTwfp4NrY341TkeJ9PbZQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=csBjWbni; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="csBjWbni" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 604A0C4CEE4; Mon, 24 Mar 2025 22:46:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856386; bh=h/mtOsvuECjaC2R3nd+Z9hHhktziYVYcFtpdVFN4gH8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=csBjWbnimDkkBjUFvUpvtUcbx9cVVPZOwoBwk02oQovW2wZGMQEPgryeKpeRWycvc kBWilUySjMRKXkAWYXyTcgbLe81hQwsaAdK0xN1Oh8L0Eu48TIO1SnzvBMW69OzVj/ R8v4hNWge93XNo/qJSAkrzQ0s2Jk8z6fPoASTR08YuollMWNZhck57k6dQLcRNK/GC pIYN8v/dYtO8vd8iQuUOUtDP19BDVOSQq25RWvLI887RYxeXEjCRrMZg5kBrkbKBMZ sCLnmEObBSE3a6RdJY1atWrUag9VRlEY2ryP/XDfw8ZbNT/QSTxoB4Q0LxTJDPpU3i VaqaLIwog2ftg== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 10/11] netdev: add "ops compat locking" helpers Date: Mon, 24 Mar 2025 15:45:36 -0700 Message-ID: <20250324224537.248800-11-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Add helpers to "lock a netdev in a backward-compatible way", which for ops-locked netdevs will mean take the instance lock. For drivers which haven't opted into the ops locking we'll take rtnl_lock. The scoped foreach is dropping and re-taking the lock for each device, even if prev and next are both under rtnl_lock. I hope that's fine since we expect that netdev nl to be mostly supported by modern drivers, and modern drivers should also opt into the instance locking. Note that these helpers are mostly needed for queue related state, because drivers modify queue config in their ops in a non-atomic way. Or differently put, queue changes don't have a clear-cut API like NAPI configuration. Any state that can should just use the instance lock directly, not the "compat" hacks. Signed-off-by: Jakub Kicinski --- include/net/netdev_lock.h | 16 +++++++++++++ net/core/dev.h | 15 ++++++++++++ net/core/dev.c | 49 +++++++++++++++++++++++++++++++++++++++ 3 files changed, 80 insertions(+) diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index 1c0c9a94cc22..76cbf5a449b6 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -64,6 +64,22 @@ netdev_ops_assert_locked_or_invisible(const struct net_device *dev) netdev_ops_assert_locked(dev); } +static inline void netdev_lock_ops_compat(struct net_device *dev) +{ + if (netdev_need_ops_lock(dev)) + netdev_lock(dev); + else + rtnl_lock(); +} + +static inline void netdev_unlock_ops_compat(struct net_device *dev) +{ + if (netdev_need_ops_lock(dev)) + netdev_unlock(dev); + else + rtnl_unlock(); +} + static inline int netdev_lock_cmp_fn(const struct lockdep_map *a, const struct lockdep_map *b) { diff --git a/net/core/dev.h b/net/core/dev.h index 7ee203395d8e..c4b645120d72 100644 --- a/net/core/dev.h +++ b/net/core/dev.h @@ -41,6 +41,21 @@ DEFINE_FREE(netdev_unlock, struct net_device *, if (_T) netdev_unlock(_T)); (var_name = netdev_xa_find_lock(net, var_name, &ifindex)); \ ifindex++) +struct net_device * +netdev_get_by_index_lock_ops_compat(struct net *net, int ifindex); +struct net_device * +netdev_xa_find_lock_ops_compat(struct net *net, struct net_device *dev, + unsigned long *index); + +DEFINE_FREE(netdev_unlock_ops_compat, struct net_device *, + if (_T) netdev_unlock_ops_compat(_T)); + +#define for_each_netdev_lock_ops_compat_scoped(net, var_name, ifindex) \ + for (struct net_device *var_name __free(netdev_unlock_ops_compat) = NULL; \ + (var_name = netdev_xa_find_lock_ops_compat(net, var_name, \ + &ifindex)); \ + ifindex++) + #ifdef CONFIG_PROC_FS int __init dev_proc_init(void); #else diff --git a/net/core/dev.c b/net/core/dev.c index 7bd8bd82f66f..01139d8ef840 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -1051,6 +1051,18 @@ struct net_device *__netdev_put_lock(struct net_device *dev) return dev; } +static struct net_device *__netdev_put_lock_ops_compat(struct net_device *dev) +{ + netdev_lock_ops_compat(dev); + if (dev->reg_state > NETREG_REGISTERED) { + netdev_unlock_ops_compat(dev); + dev_put(dev); + return NULL; + } + dev_put(dev); + return dev; +} + /** * netdev_get_by_index_lock() - find a device by its ifindex * @net: the applicable net namespace @@ -1073,6 +1085,18 @@ struct net_device *netdev_get_by_index_lock(struct net *net, int ifindex) return __netdev_put_lock(dev); } +struct net_device * +netdev_get_by_index_lock_ops_compat(struct net *net, int ifindex) +{ + struct net_device *dev; + + dev = dev_get_by_index(net, ifindex); + if (!dev) + return NULL; + + return __netdev_put_lock_ops_compat(dev); +} + struct net_device * netdev_xa_find_lock(struct net *net, struct net_device *dev, unsigned long *index) @@ -1098,6 +1122,31 @@ netdev_xa_find_lock(struct net *net, struct net_device *dev, } while (true); } +struct net_device * +netdev_xa_find_lock_ops_compat(struct net *net, struct net_device *dev, + unsigned long *index) +{ + if (dev) + netdev_unlock_ops_compat(dev); + + do { + rcu_read_lock(); + dev = xa_find(&net->dev_by_index, index, ULONG_MAX, XA_PRESENT); + if (!dev) { + rcu_read_unlock(); + return NULL; + } + dev_hold(dev); + rcu_read_unlock(); + + dev = __netdev_put_lock_ops_compat(dev); + if (dev) + return dev; + + (*index)++; + } while (true); +} + static DEFINE_SEQLOCK(netdev_rename_lock); void netdev_copy_name(struct net_device *dev, char *name) From patchwork Mon Mar 24 22:45:37 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 14027951 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 848551F0E33 for ; Mon, 24 Mar 2025 22:46:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856390; cv=none; b=uIz7ZXHaP3ier6lwfgMh+1DCBWEoB6Oo2O+Wt4ImqgYY8tUddvv1wmCQ8jpeaB5eWxZs6+by4JJBY710RsQUQEN7mJWBdosHDrEXHd6NlW/vKMjNWI6UoMW0TchNq7j+QYEROlYP/SsGEDZw+7PI9XhqR9/vW7ZVP7ROA87n0pw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742856390; c=relaxed/simple; bh=ZMamlOjj30l+91Ix7h1ymxQ9VxErzprFR5DvNK34rEk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=s5DDJCvg9MkvdZ3QM4RTnI2xPPSwu1dMlvd1k5pln6KkIpH2LAMjy+KOBiWus9ob/7IQuxRgiGCXARjyVpsV2tWR1l6gHQ6G1tYyqyPXtyBe0zQW/nZI6/QVYCYqy9ROupqRhIrCST3OXescVf9Ce3KErdmlmzyGksTn/RHGtxw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Z+N7hCwp; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Z+N7hCwp" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0B987C4CEDD; Mon, 24 Mar 2025 22:46:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1742856390; bh=ZMamlOjj30l+91Ix7h1ymxQ9VxErzprFR5DvNK34rEk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z+N7hCwpMak8UhPhPmlmeo8ILxLEBfIzDgiion2oc9fR+wRKD2T/Re6D74XZg716Z CR4v2K+4yYnu+zzEY4tun+No/D8zINE6HhX1fHItoAfU6dt1lGydlhrCvykU23uRSE mi6mBkmkBrun1Y3n1fQkft8iogojEg3URAKxPftO8jevQ/DCGEiycdcI2CaNl8dZTN 6EeZCKyxLku4j/fYsKRAyC1GYX7EVsVMKftY5+u0KExGQ5g5tk/5J4zi27GPFrWhmI r0qYump9BWNZ+fHAXBTYUEnfvtAebYl5/kOXkrpOOEHFCGBi2T1V6oHQhDPctwLHMt nLcd78PldAoDQ== From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, edumazet@google.com, pabeni@redhat.com, andrew+netdev@lunn.ch, horms@kernel.org, sdf@fomichev.me, Jakub Kicinski Subject: [PATCH net-next v2 11/11] netdev: don't hold rtnl_lock over nl queue info get when possible Date: Mon, 24 Mar 2025 15:45:37 -0700 Message-ID: <20250324224537.248800-12-kuba@kernel.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250324224537.248800-1-kuba@kernel.org> References: <20250324224537.248800-1-kuba@kernel.org> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Netdev queue dump accesses: NAPI, memory providers, XSk pointers. All three are "ops protected" now, switch to the op compat locking. rtnl lock does not have to be taken for "ops locked" devices. Signed-off-by: Jakub Kicinski --- net/core/netdev-genl.c | 18 +++++++----------- 1 file changed, 7 insertions(+), 11 deletions(-) diff --git a/net/core/netdev-genl.c b/net/core/netdev-genl.c index fd1cfa9707dc..39f52a311f07 100644 --- a/net/core/netdev-genl.c +++ b/net/core/netdev-genl.c @@ -481,18 +481,15 @@ int netdev_nl_queue_get_doit(struct sk_buff *skb, struct genl_info *info) if (!rsp) return -ENOMEM; - rtnl_lock(); - - netdev = netdev_get_by_index_lock(genl_info_net(info), ifindex); + netdev = netdev_get_by_index_lock_ops_compat(genl_info_net(info), + ifindex); if (netdev) { err = netdev_nl_queue_fill(rsp, netdev, q_id, q_type, info); - netdev_unlock(netdev); + netdev_unlock_ops_compat(netdev); } else { err = -ENODEV; } - rtnl_unlock(); - if (err) goto err_free_msg; @@ -541,17 +538,17 @@ int netdev_nl_queue_get_dumpit(struct sk_buff *skb, struct netlink_callback *cb) if (info->attrs[NETDEV_A_QUEUE_IFINDEX]) ifindex = nla_get_u32(info->attrs[NETDEV_A_QUEUE_IFINDEX]); - rtnl_lock(); if (ifindex) { - netdev = netdev_get_by_index_lock(net, ifindex); + netdev = netdev_get_by_index_lock_ops_compat(net, ifindex); if (netdev) { err = netdev_nl_queue_dump_one(netdev, skb, info, ctx); - netdev_unlock(netdev); + netdev_unlock_ops_compat(netdev); } else { err = -ENODEV; } } else { - for_each_netdev_lock_scoped(net, netdev, ctx->ifindex) { + for_each_netdev_lock_ops_compat_scoped(net, netdev, + ctx->ifindex) { err = netdev_nl_queue_dump_one(netdev, skb, info, ctx); if (err < 0) break; @@ -559,7 +556,6 @@ int netdev_nl_queue_get_dumpit(struct sk_buff *skb, struct netlink_callback *cb) ctx->txq_idx = 0; } } - rtnl_unlock(); return err; }