From patchwork Sat Mar 29 18:56:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032761 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DD1461B3927 for ; Sat, 29 Mar 2025 18:57:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.51 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274630; cv=none; b=mmfUXpRVlSkfWYg/MJnbfBRM1KLGJkprkcUQ517LBDO9TpprOlxd3VpftoZmB4YX3Bq+O0nXGSca4JPKmbh5BQIJWD+9YLzseLLtZt0U4/7Fi1drcjdwbLkjpQQa9uSowGAJ6NhzyEBpsAxaBlMJZtjC3bZLP+dPdnyYZmcq4o0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274630; c=relaxed/simple; bh=pHF1H0eRpuVjSrsaH/3OXo2Gg1tjFfCNVU8wL3vaQkA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=L+W+kaCfvn98dhXSib6SVDGFFsXLeuz8/ZJgcA0yoevUIKtc37XnG/+xQBs3uiYNk/aYtLg238y7DX4Gzdl3shqK0lfFKnU/dM7BGrzDT3KNVkXJmZjyIfUDfCpglUUYSf32erZaFDZCULsVo/VoPberB7phS57dgrqTPLRp4Ts= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.216.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pj1-f51.google.com with SMTP id 98e67ed59e1d1-3032aa1b764so4142658a91.1 for ; Sat, 29 Mar 2025 11:57:08 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274627; x=1743879427; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FH/yeg5CqGdASotNHaNY0+o7IF+PSiI928pMRRgk8/w=; b=ZckPL4GRmOXcixe+E6BpO/h/6B4LMFLCEyhOZuOsEbUCZ1w1vmBiwMDAivV3cCv4Ej 1+xPa0Vo8fLSOeUkXzWtU/+hDB4x4P9V8YwiMt2NGHKk9pjKfvhlk+blHniiRpFMJP5d EiFfEzb1cBT9bd0UPecWCHvQYuDHRRv0W0UoPR8HsGmXzzwmPOfDI9TFwAz/qrkfn9uT aSGfewitc6H6uJ0dAkz4vcysLefjiBvDLdp70lbjHHaAIfkRzsgO/RtG9t7Allmz43rS OafcuVkK77KB/WgiYehdZHcDdDKuecoPJ2Zx9bqVawG3evgB1rvQuF7V9gU6lKv1hFIr c68g== X-Gm-Message-State: AOJu0YxDjdfVUAURAuFiqSnnHIxDo8v4ZV6nh2QIW9LutkhjfmaV9P8I R1rMhc7Ab/8+C5Z+28i6lwbmBzcD+3m+LiB5XfCJa1wuPZQgQlCQeDzcDpY= X-Gm-Gg: ASbGncvYpz3Gm57LBR0c5lgaB+S6qK5wG8Hk9qIDa8pjwThTyZOWDpO/kkX66S7Ezvc z2KaptmBjNgMdbU/SOG0ADGUIsBph1Lg8prDMrZVsRCV4XUR7RalWtEpaf82o0LwR14pq/fWs+3 vPgQMN3WTtA7mUdz3rWR0WGGK5rSHJA0MnMBXAcl2rD/Uz27jKOnSbTAP2TE4JiQ5dj6JeUL7ut Hx5sObEuCqHgXWsuCojsC2b7ec551v0xAY1/anvqhaK3YOetG1zEYF6lw5n6Vl379JEr2UA6Qoi h7nPfS99UqVsJEKCl/1JJU3tc23GxiZ3FuxqPYNZSWdIdbKQQ5SOcbk= X-Google-Smtp-Source: AGHT+IGIZreGMChS/9hMlzexNzMEnEOp90nQSCBr+V3BRR0cvlCA4nXMf/H+QJKZH4+N8bdGqcoU7Q== X-Received: by 2002:a17:90b:5446:b0:2fa:f8d:65de with SMTP id 98e67ed59e1d1-30532147035mr5293051a91.22.1743274627302; Sat, 29 Mar 2025 11:57:07 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id 98e67ed59e1d1-3039e20e4besm6397877a91.29.2025.03.29.11.57.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:06 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, Cosmin Ratiu Subject: [PATCH net v3 01/11] net: switch to netif_disable_lro in inetdev_init Date: Sat, 29 Mar 2025 11:56:54 -0700 Message-ID: <20250329185704.676589-2-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Cosmin reports the following deadlock: dump_stack_lvl+0x62/0x90 print_deadlock_bug+0x274/0x3b0 __lock_acquire+0x1229/0x2470 lock_acquire+0xb7/0x2b0 __mutex_lock+0xa6/0xd20 dev_disable_lro+0x20/0x80 inetdev_init+0x12f/0x1f0 inetdev_event+0x48b/0x870 notifier_call_chain+0x38/0xf0 netif_change_net_namespace+0x72e/0x9f0 do_setlink.isra.0+0xd5/0x1220 rtnl_newlink+0x7ea/0xb50 rtnetlink_rcv_msg+0x459/0x5e0 netlink_rcv_skb+0x54/0x100 netlink_unicast+0x193/0x270 netlink_sendmsg+0x204/0x450 Switch to netif_disable_lro which assumes the caller holds the instance lock. inetdev_init is called for blackhole device (which sw device and doesn't grab instance lock) and from REGISTER/UNREGISTER notifiers. We already hold the instance lock for REGISTER notifier during netns change and we'll soon hold the lock during other paths. Reviewed-by: Jakub Kicinski Reported-by: Cosmin Ratiu Fixes: ad7c7b2172c3 ("net: hold netdev instance lock during sysfs operations") Signed-off-by: Stanislav Fomichev --- net/core/dev.c | 1 + net/ipv4/devinet.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/net/core/dev.c b/net/core/dev.c index be17e0660144..711a946d4bfb 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -1771,6 +1771,7 @@ void netif_disable_lro(struct net_device *dev) netdev_unlock_ops(lower_dev); } } +EXPORT_IPV6_MOD(netif_disable_lro); /** * dev_disable_gro_hw - disable HW Generic Receive Offload on a device diff --git a/net/ipv4/devinet.c b/net/ipv4/devinet.c index 754f60fb6e25..77e5705ac799 100644 --- a/net/ipv4/devinet.c +++ b/net/ipv4/devinet.c @@ -281,7 +281,7 @@ static struct in_device *inetdev_init(struct net_device *dev) if (!in_dev->arp_parms) goto out_kfree; if (IPV4_DEVCONF(in_dev->cnf, FORWARDING)) - dev_disable_lro(dev); + netif_disable_lro(dev); /* Reference in_dev->dev */ netdev_hold(dev, &in_dev->dev_tracker, GFP_KERNEL); /* Account for reference dev->ip_ptr (below) */ From patchwork Sat Mar 29 18:56:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032762 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 492911EA73 for ; Sat, 29 Mar 2025 18:57:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.180 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274631; cv=none; b=s9tOxvNF/EndnxG/zH6Mq0I2DuASSI+Ow15ruyh7rkcylve4AcYs/Hiqmbu5Qthv6DhCZ0QAiGRm+CvdXDM03k0epXptqYpVCuLMUREc1Wrtlh+KFhsNaSpLDNa0mHMiKVKNfHaZwoXAiX/xd4Btrq0pkFpYNeTkHbRijaSiZ3Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274631; c=relaxed/simple; bh=Y0zSK5Mfb9dAIBmguwkV8PCJ1TB5QJ7L71JV9vpNrIM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=dIeGhES3d83eAgoVz2yZyo9YfLzrywowQoSTbxij8bTwJ9BKMHgTHcUIp1GkZzrPMG0k6B7npniyBwCDJlVF58EDSkKvjUpYeiCvxgsWeXnnM2Dd5npW2e4VhCBh7sjU+A2Q6q1ySubu/JfNWRkNX2inXjbiROAXz4tlbsUXZhU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-223fd89d036so73131475ad.1 for ; Sat, 29 Mar 2025 11:57:09 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274629; x=1743879429; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dH1tGqHtaJIkSU1XT0iRYgg9/cYsUvwhQOGJy6XN8+I=; b=PzBPYxATtXC0t0UB5CwSDiwq1EXZ8jZ1ZNIk2d0y8qsacYxDJwQseJAqSCy6dK+dnI Rcj5ebEOtZ9oPAcMOjAGFh6YxjgupFwkmXqv/NBnAk7IglUem3/N85iGVB3ZhGNXDW0Q suKIjw9/R7CNpJ8bOPrWZYMtZQ/o7TMlYQ8fpLlwDih+5f1N9y8vNLjxSVo8bwU76ssF ha58UazrmkHzLCUyslHJmw+Cu+L+k929ityAx7mj+aKXLILoPqbvLvs6vnOxi0D1RoP8 kdyzdjN1mgi8l81uDPwBHK05niG2fuUzYTiQPvPKj30CFU31SgH/oEsDc48sniQ6UZRw lCdA== X-Gm-Message-State: AOJu0YwPqKpEc1jNlzQmcj2Mc5kS9F0PDvT/agwDY1tV3L/GYsNd4nzY zDgHldy83gWv2/1p3gTx0FvGRd5xv2yEwmvR/ZHs6l49N19AExY0b5Sz/W0= X-Gm-Gg: ASbGncvEopzlcj8ZLqj3+jRMrpTkcJZCZTVe26vt5EvTkjHiqqDG39kDhEPy/21u5+F 6tUOMhFdj7fnvFKkYnzv+OOaSWiPJg4cQlDD6gADwxtMf1qCeAUSdYSgrQPbc8qJpcC5YgdxKWt XzQieA2UGf/7IlZbv3jnavCSV3FHJFrMLWOKJ/VIq6JH4cfdfwkDo5Dn56adZ6dtETnCv994kqc yXLFirJkjhsTyt3dT27f6uWBRxzb2V3ew09UE4PZItvaVrHVGbG210+pgdfoQRUEebix4ek9gIB 4d1zRjdzeVh/VYd0tVL5R8r9ycfE9ld55Lj7ZWhSGkUY X-Google-Smtp-Source: AGHT+IHgU8D6ZUDxj34v+YHGA84YTdeO/pORpiSPSC9833zYa3TqW38U4qYZkZVNDJbwM4PsW3E94w== X-Received: by 2002:a17:902:ebc6:b0:224:2175:b0cd with SMTP id d9443c01a7336-2292f977b8dmr60814225ad.26.1743274629093; Sat, 29 Mar 2025 11:57:09 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d9443c01a7336-2291eeca0a7sm39880345ad.39.2025.03.29.11.57.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:08 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, Cosmin Ratiu Subject: [PATCH net v3 02/11] net: hold instance lock during NETDEV_REGISTER/UP Date: Sat, 29 Mar 2025 11:56:55 -0700 Message-ID: <20250329185704.676589-3-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Callers of inetdev_init can come from several places with inconsistent expectation about netdev instance lock. Grab instance lock during REGISTER (plus UP). Also solve the inconsistency with UNREGISTER where it was locked only during move netns path. WARNING: CPU: 10 PID: 1479 at ./include/net/netdev_lock.h:54 __netdev_update_features+0x65f/0xca0 __warn+0x81/0x180 __netdev_update_features+0x65f/0xca0 report_bug+0x156/0x180 handle_bug+0x4f/0x90 exc_invalid_op+0x13/0x60 asm_exc_invalid_op+0x16/0x20 __netdev_update_features+0x65f/0xca0 netif_disable_lro+0x30/0x1d0 inetdev_init+0x12f/0x1f0 inetdev_event+0x48b/0x870 notifier_call_chain+0x38/0xf0 register_netdevice+0x741/0x8b0 register_netdev+0x1f/0x40 mlx5e_probe+0x4e3/0x8e0 [mlx5_core] auxiliary_bus_probe+0x3f/0x90 really_probe+0xc3/0x3a0 __driver_probe_device+0x80/0x150 driver_probe_device+0x1f/0x90 __device_attach_driver+0x7d/0x100 bus_for_each_drv+0x80/0xd0 __device_attach+0xb4/0x1c0 bus_probe_device+0x91/0xa0 device_add+0x657/0x870 Reported-by: Cosmin Ratiu Fixes: ad7c7b2172c3 ("net: hold netdev instance lock during sysfs operations") Signed-off-by: Stanislav Fomichev --- include/linux/netdevice.h | 2 +- net/core/dev.c | 12 +++++++++--- net/core/dev_api.c | 4 +--- net/core/rtnetlink.c | 10 +++++----- 4 files changed, 16 insertions(+), 12 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index fa79145518d1..cf3b6445817b 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -4192,7 +4192,7 @@ int dev_change_flags(struct net_device *dev, unsigned int flags, int netif_set_alias(struct net_device *dev, const char *alias, size_t len); int dev_set_alias(struct net_device *, const char *, size_t); int dev_get_alias(const struct net_device *, char *, size_t); -int netif_change_net_namespace(struct net_device *dev, struct net *net, +int __dev_change_net_namespace(struct net_device *dev, struct net *net, const char *pat, int new_ifindex, struct netlink_ext_ack *extack); int dev_change_net_namespace(struct net_device *dev, struct net *net, diff --git a/net/core/dev.c b/net/core/dev.c index 711a946d4bfb..e59eb173900d 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -1859,7 +1859,9 @@ static int call_netdevice_register_net_notifiers(struct notifier_block *nb, int err; for_each_netdev(net, dev) { + netdev_lock_ops(dev); err = call_netdevice_register_notifiers(nb, dev); + netdev_unlock_ops(dev); if (err) goto rollback; } @@ -11046,7 +11048,9 @@ int register_netdevice(struct net_device *dev) memcpy(dev->perm_addr, dev->dev_addr, dev->addr_len); /* Notify protocols, that a new device appeared. */ + netdev_lock_ops(dev); ret = call_netdevice_notifiers(NETDEV_REGISTER, dev); + netdev_unlock_ops(dev); ret = notifier_to_errno(ret); if (ret) { /* Expect explicit free_netdev() on failure */ @@ -12058,7 +12062,7 @@ void unregister_netdev(struct net_device *dev) } EXPORT_SYMBOL(unregister_netdev); -int netif_change_net_namespace(struct net_device *dev, struct net *net, +int __dev_change_net_namespace(struct net_device *dev, struct net *net, const char *pat, int new_ifindex, struct netlink_ext_ack *extack) { @@ -12143,11 +12147,12 @@ int netif_change_net_namespace(struct net_device *dev, struct net *net, * And now a mini version of register_netdevice unregister_netdevice. */ + netdev_lock_ops(dev); /* If device is running close it first. */ netif_close(dev); - /* And unlink it from device chain */ unlist_netdevice(dev); + netdev_unlock_ops(dev); synchronize_net(); @@ -12209,11 +12214,12 @@ int netif_change_net_namespace(struct net_device *dev, struct net *net, err = netdev_change_owner(dev, net_old, net); WARN_ON(err); + netdev_lock_ops(dev); /* Add the device back in the hashes */ list_netdevice(dev); - /* Notify protocols, that a new device appeared. */ call_netdevice_notifiers(NETDEV_REGISTER, dev); + netdev_unlock_ops(dev); /* * Prevent userspace races by waiting until the network diff --git a/net/core/dev_api.c b/net/core/dev_api.c index 8dbc60612100..cb3e5807dce8 100644 --- a/net/core/dev_api.c +++ b/net/core/dev_api.c @@ -119,9 +119,7 @@ int dev_change_net_namespace(struct net_device *dev, struct net *net, { int ret; - netdev_lock_ops(dev); - ret = netif_change_net_namespace(dev, net, pat, 0, NULL); - netdev_unlock_ops(dev); + ret = __dev_change_net_namespace(dev, net, pat, 0, NULL); return ret; } diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index 334db17be37d..f49665851172 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c @@ -3025,8 +3025,6 @@ static int do_setlink(const struct sk_buff *skb, struct net_device *dev, char ifname[IFNAMSIZ]; int err; - netdev_lock_ops(dev); - err = validate_linkmsg(dev, tb, extack); if (err < 0) goto errout; @@ -3042,14 +3040,16 @@ static int do_setlink(const struct sk_buff *skb, struct net_device *dev, new_ifindex = nla_get_s32_default(tb[IFLA_NEW_IFINDEX], 0); - err = netif_change_net_namespace(dev, tgt_net, pat, - new_ifindex, extack); + err = __dev_change_net_namespace(dev, tgt_net, pat, new_ifindex, + extack); if (err) - goto errout; + return err; status |= DO_SETLINK_MODIFIED; } + netdev_lock_ops(dev); + if (tb[IFLA_MAP]) { struct rtnl_link_ifmap *u_map; struct ifmap k_map; From patchwork Sat Mar 29 18:56:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032763 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D3B821B3927 for ; Sat, 29 Mar 2025 18:57:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.51 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274633; cv=none; b=Ofgrz+6ETZHquc1yDR+QBzGVyfYSUbN2ByucOsXNZenDI6ddm0qAgo+W0TcIu1HnNKZSdfrZ5czPll3r4IuN05tdi3u/ZbcQIbQ/UgHos5ngKn4sxKEDBCtiGbsvsDGzGA934VtPsiFG0tD7r76aiVIzU805lbJl02M7+TUqr2o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274633; c=relaxed/simple; bh=PUDFvO2TDnkW7uD9u6/ySNuFohxkZio2Ts3ESQWNvyQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ASS2gzgmLmxXZ5J/JRd0DfrJL6W5Li9F5sTkxywSg9E3CwnQ68kFzFhRhbh4QbzyA/6JtJ4Jm8ieudAux6llXBNPcrARiN702j19U5KX+xLI3NHrvS0AjnE1SfgkUZE0L6jodYv6Mb8E0dKMzHTRhpLv55EFTV7TNba3KZqbry4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.216.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pj1-f51.google.com with SMTP id 98e67ed59e1d1-30362ee1312so5813566a91.0 for ; Sat, 29 Mar 2025 11:57:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274631; x=1743879431; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JgqTnfYSYprKLWkrSOtNcWuBgAHtTnXeKE0pF1k7IRA=; b=MeAneeWLK210Jk2D/zj+GemYQEW7M6PeUV706GbDbwN5S5SzJTs7nlXWOMmSYb+Df6 Eq4dSnoYY2sSfdNiiL10etOez5zk+l8jlySMnhk1t/9FB7mpn1ZskIatIX6xzlwUyqyG QCqFo9aH4pDhAO217kkYQOE30BAI7Ddl5XYXuxwtr5DtAp+zqKBR5RqoVhG8EOr+/NA+ GCAI6VpzqINgxQCqV2146UwGc368ZSxW4xiFxzTrxBu4pscrdI5/ru9FkQPmhV6k1RI+ Q69Z2WzrY83RL4jl8o+shK4SChmMxjhKD+BFZLRDOIThGxHCfr8f/d2xp/TX30oF3iBT 2W+w== X-Gm-Message-State: AOJu0Yx349V4Ae+b/ka9/JBRD1StNQO6kMugANLzwpeNnXyq0BBz1aX8 yajlcYoCHMAL1sSBdvhQmce2OwWyh+0UW9HibpZ9Uzg/JwNzUw4hlEOq6Bo= X-Gm-Gg: ASbGncu+mkmNYMJBRr+PByRgn1SOTro/uzEbLbVHW7ZVJIBu2h1j3878kuGZ3GCYsgX TrosF58y+zTdkPsU6WtahBxg9xfserEFEKWosF3YfNYPooxy1v94TpketMh6dEWVgIjrEE+kdW5 ZlZoYNoRll/iTIlfd65/FxBiS9tS1F+qTN6PKZhCMYt2secAp/9HQkjRwDgHhJv+CgYmpjld/VI 7zQ80uYeh0zsEcLtB1Unldjgh3meWHjM2wFYVxzA/VDGDr3scMXfmx5c206ME+xsq6Rrt36+lhh nKbXjrsOX9aTE5GIDWpKOL+h+xKlWvkBS6RwcYxhlad+ X-Google-Smtp-Source: AGHT+IFdg78/UZ3eGa3AGKsKNu7HJq3iko+QuztIcaSebD4AfFQ8HO9FxsoS4817XSA1XcOtwf4mjQ== X-Received: by 2002:a17:90b:3c07:b0:2ff:53ad:a0ec with SMTP id 98e67ed59e1d1-305320b1fcdmr5406509a91.21.1743274630667; Sat, 29 Mar 2025 11:57:10 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id 98e67ed59e1d1-30516d3e640sm4112057a91.10.2025.03.29.11.57.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:10 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, Cosmin Ratiu Subject: [PATCH net v3 03/11] net: use netif_disable_lro in ipv6_add_dev Date: Sat, 29 Mar 2025 11:56:56 -0700 Message-ID: <20250329185704.676589-4-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org ipv6_add_dev might call dev_disable_lro which unconditionally grabs instance lock, so it will deadlock during NETDEV_REGISTER. Switch to netif_disable_lro. Make sure all callers hold the instance lock as well. Cc: Cosmin Ratiu Fixes: ad7c7b2172c3 ("net: hold netdev instance lock during sysfs operations") Signed-off-by: Stanislav Fomichev --- net/ipv6/addrconf.c | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c index ac8cc1076536..35477d494573 100644 --- a/net/ipv6/addrconf.c +++ b/net/ipv6/addrconf.c @@ -80,6 +80,7 @@ #include #include #include +#include #include #include #include @@ -377,6 +378,7 @@ static struct inet6_dev *ipv6_add_dev(struct net_device *dev) int err = -ENOMEM; ASSERT_RTNL(); + netdev_ops_assert_locked(dev); if (dev->mtu < IPV6_MIN_MTU && dev != blackhole_netdev) return ERR_PTR(-EINVAL); @@ -402,7 +404,7 @@ static struct inet6_dev *ipv6_add_dev(struct net_device *dev) return ERR_PTR(err); } if (ndev->cnf.forwarding) - dev_disable_lro(dev); + netif_disable_lro(dev); /* We refer to the device */ netdev_hold(dev, &ndev->dev_tracker, GFP_KERNEL); @@ -3152,10 +3154,12 @@ int addrconf_add_ifaddr(struct net *net, void __user *arg) rtnl_net_lock(net); dev = __dev_get_by_index(net, ireq.ifr6_ifindex); + netdev_lock_ops(dev); if (dev) err = inet6_addr_add(net, dev, &cfg, 0, 0, NULL); else err = -ENODEV; + netdev_unlock_ops(dev); rtnl_net_unlock(net); return err; } @@ -5026,9 +5030,10 @@ inet6_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, if (!dev) { NL_SET_ERR_MSG_MOD(extack, "Unable to find the interface"); err = -ENODEV; - goto unlock; + goto unlock_rtnl; } + netdev_lock_ops(dev); idev = ipv6_find_idev(dev); if (IS_ERR(idev)) { err = PTR_ERR(idev); @@ -5065,6 +5070,8 @@ inet6_rtm_newaddr(struct sk_buff *skb, struct nlmsghdr *nlh, in6_ifa_put(ifa); unlock: + netdev_unlock_ops(dev); +unlock_rtnl: rtnl_net_unlock(net); return err; @@ -6503,7 +6510,9 @@ static int addrconf_sysctl_addr_gen_mode(const struct ctl_table *ctl, int write, if (idev->cnf.addr_gen_mode != new_val) { WRITE_ONCE(idev->cnf.addr_gen_mode, new_val); + netdev_lock_ops(idev->dev); addrconf_init_auto_addrs(idev->dev); + netdev_unlock_ops(idev->dev); } } else if (&net->ipv6.devconf_all->addr_gen_mode == ctl->data) { struct net_device *dev; @@ -6515,7 +6524,9 @@ static int addrconf_sysctl_addr_gen_mode(const struct ctl_table *ctl, int write, idev->cnf.addr_gen_mode != new_val) { WRITE_ONCE(idev->cnf.addr_gen_mode, new_val); + netdev_lock_ops(idev->dev); addrconf_init_auto_addrs(idev->dev); + netdev_unlock_ops(idev->dev); } } } From patchwork Sat Mar 29 18:56:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032764 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f177.google.com (mail-pl1-f177.google.com [209.85.214.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 52DB01EA73 for ; Sat, 29 Mar 2025 18:57:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274634; cv=none; b=DAFaPehWL5+gMNZtG8vEBdSYxQQ5Urz7cJNYCs4K1YmgFX+XAoUbKp1rWW3mTEi7gXIVt4qALlJ942gAiglnpo2fMuFukTNVmAp15ZtVsxYuhHGttJo5Mk7q3QtU93sgEV4yxr3W30hGLOC7cjHHvcctq6aMjYdVbviAdMZKU2A= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274634; c=relaxed/simple; bh=eNFrVMso47nrlptvov1JsM27k2P05I4jI8+P3NDvlcg=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=uO/DRlE9CSKQfjVrCS6hQ5aAsvXcikt9/xkblN3m2RnCmsvWkPH6fti5mtyzzSTMtNNgF20+hXbVt/gIlMcgjG6ZTlaTOwREMCxWjgPKvw3C+BksqpXHHvdsmO+ITIwDEQFI/9eISaFvVEmALH6xQxAAzcKXzm2whf8WMQGO00I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f177.google.com with SMTP id d9443c01a7336-223a7065ff8so35899155ad.0 for ; Sat, 29 Mar 2025 11:57:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274632; x=1743879432; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=UPCijyayYYncgRUFHK4PxErg6SbhrLYGSHYZMfQcqzA=; b=rePUXIc7r8FMgrbiXloPXrnU4rBrkOyBL1FxX9Z71PzC2okLOlbREanW/i+dPPw+f9 MFw9E/ZWJBjURo0QP76zAG9xBXzq+hesRz+cKS+27mbYlpOolAm4keLIzCNct9AlKzi0 bkLwTKJiLEknuMFoNXlbKtg6HlzeyDP8jimlSNJujlDP/7EvjbWoXmIsGPOZ+uWAoelQ ss5zHXfYzVCtGDC8Yj3FwBTAyzmfsA1RprNafoCuYxKQO1Y8V6BKU48sdsqvD97qybWM RikOiG+1WoHsl/dO+hQnXNiMws4d/DA//VhhQ0KUB6H+yVO3jS9MT6s+tjPL2VCL34tA p0OA== X-Gm-Message-State: AOJu0Yz+FDg2MD7pT4yO90H+S8DXB/FRf0S21IS7HJeMC24CkE7ggtdp yVraBUFuqbMFLGvJe8LbIHxn8uUySvwfa/j0BmNjcERR7yCm3vNN9NNeny0= X-Gm-Gg: ASbGncsoVPDpKNBE7AYsZ0846l2jsi2MHjDtXWqH9UclfixDuMfHmopMlaunq7+FIcg SMQv/u4ZFcShFvtMu9cDnuwjTk3a6I1N9sTvfT/Ui40LcB86IFVbclEm3524F1FgHyJfIZ3640e LLZeaxMsW+kRRfGelKhE+HChN5cuokPX46Vffno3/YkcMDPdZotoLfURuaGjf76IUc7CZb6BjOg hT/hHuE84qUBFtmrxZYv86QplVWFCw8V9Xe5WCQWETC+PWcL7/5UUpi+7+jLLjPI5kvcdVSxVle w4wDLibAtlcqi5zbuCN3f7lk7v3oZNz2SWWQxxzfn7pm X-Google-Smtp-Source: AGHT+IFEZK1fj8HKougtb0K62UZyHT07ffX9PVu5nwTrBYgnb4vzVufJApNSgMGeL7S02bJ7/RBl5w== X-Received: by 2002:a17:902:c408:b0:220:cb6c:2e30 with SMTP id d9443c01a7336-2292fa010cemr64008515ad.49.1743274632169; Sat, 29 Mar 2025 11:57:12 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d2e1a72fcca58-73970deed76sm4046687b3a.11.2025.03.29.11.57.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:11 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 04/11] net: rename rtnl_net_debug to lock_debug Date: Sat, 29 Mar 2025 11:56:57 -0700 Message-ID: <20250329185704.676589-5-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org And make it selected by CONFIG_DEBUG_NET. Don't rename any of the structs/functions. Next patch will use rtnl_net_debug_event in netdevsim. Signed-off-by: Stanislav Fomichev --- net/core/Makefile | 2 +- net/core/{rtnl_net_debug.c => lock_debug.c} | 0 2 files changed, 1 insertion(+), 1 deletion(-) rename net/core/{rtnl_net_debug.c => lock_debug.c} (100%) diff --git a/net/core/Makefile b/net/core/Makefile index a10c3bd96798..b2a76ce33932 100644 --- a/net/core/Makefile +++ b/net/core/Makefile @@ -45,5 +45,5 @@ obj-$(CONFIG_BPF_SYSCALL) += bpf_sk_storage.o obj-$(CONFIG_OF) += of_net.o obj-$(CONFIG_NET_TEST) += net_test.o obj-$(CONFIG_NET_DEVMEM) += devmem.o -obj-$(CONFIG_DEBUG_NET_SMALL_RTNL) += rtnl_net_debug.o +obj-$(CONFIG_DEBUG_NET) += lock_debug.o obj-$(CONFIG_FAIL_SKB_REALLOC) += skb_fault_injection.o diff --git a/net/core/rtnl_net_debug.c b/net/core/lock_debug.c similarity index 100% rename from net/core/rtnl_net_debug.c rename to net/core/lock_debug.c From patchwork Sat Mar 29 18:56:58 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032765 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ADBC11B3927 for ; Sat, 29 Mar 2025 18:57:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.180 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274636; cv=none; b=X+4SUKYTDp3yJ7uQXjFIgtO30Dijg759azpwiqNcsvqBfdJ9xDbbijz08bBj+/PbDmAcrxEu9YmELXsRqaqkeZFtTJS8zsv3XSeXljWwZPA2tRVSJAmR5xz+W6BlIiRzUx96R7LZ2/VnVEpI2Vk2uHMTcrjW7h+/2VVM2Aa42iY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274636; c=relaxed/simple; bh=fk6PCYPeCeRjRPK+RnICodseYYpTy/4gvY4+yGXBwgU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=NScw8sPmDxpYwTlUYJNC4Hc/JaJa7Styrb1Vc8nQK+Lx9q/bGtaxBa8tICNkZufJKsQeWIP4fWfQUObT3W06VClSlKq4FnhXVPNUh5YMaGRMM32MyXXXKBtNBkVJEJQ5nv9ppfAj/G4fVcgYUhWvT5E6fki+2NCGLYKdkMX4yO4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-227b828de00so59043115ad.1 for ; Sat, 29 Mar 2025 11:57:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274634; x=1743879434; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=IxdX0i18cLiiRxO0Z5z7ViZeMQPVjKCK2cApBMaWKX8=; b=puvg/sNqOxk1wSxKi3T0SXNFB+Im/DtPvOlrKy/dqCeJ1emCAplwCn4uX38y/91jYX xYRruN2iYDxq+eY/8yflwgUSh0VVF/3qXNf9MnBFEOR6So9b2K3RKk3JpSspNRqE0ZUZ IN7meQs2PuAtexX4neEAyObKoTNxuUJB2OObYOjB2bi0oBVbTeDEuITlMbbbgu4qy6Il c9Cd1Pos7RmhLeA8bmBrGcZklsxdAeR4hilLxNxnSayQ/eDp9rM9KQVPynLJgn/ABUyD tRQ6OWJGqXJvV3kNSfsAa/ybW9RZujQ2Ky7LJeJIEZNtI7tNZOZrpwk5gkZy/KMBL0// qsAA== X-Gm-Message-State: AOJu0YzHQpVZewzqsbwIiBRsoY7vvIJqX/70pE5qs7dzNWfldSG0CDVM LUsJJVyZfCxB2PSwcopxhAjXgXrscvNf/VK4NFCQWn71fnjQqtgI/d6FVyA= X-Gm-Gg: ASbGncvEQgVKmXZPJSqSJ8WR64mcQ9I+DeyzR4GbBrN09iWrj0eWpB+7knLuF8TdMIU mu5b12JH2N57TM0mf/4q6c+rIFf7fxXI/AdGrGoL15Kv2CoBXy2gxOBOxh9VVjLesmEXJVp4Flq WeTeEzN1LRcunZk2oj4+Hc5Me5dBegjHl6RwGOaQFeztczxPoRdMPh8tkjgC5RNzq8uE86vaT4D ugziMeA+AP+YW4lq9UoMyWZRhPp3lZ/YT7ii+LSa0Ku5aosoHpypoQBn/aDv+l8Uja4Wtn7l0uc iK0Bdw+4iSeXobz+YdQFqrwy1YgRAv7HVIcmRfRL0wDe X-Google-Smtp-Source: AGHT+IFgp3tcjw63weALhXZ+PfsrkBIChYzrgTusrXg+OZnCdS6Qok1BYwr6NRj5Dv9z7Ldkg0dyHw== X-Received: by 2002:a05:6a20:3d95:b0:1f5:64a4:aeac with SMTP id adf61e73a8af0-2009f7535d0mr5133607637.33.1743274633666; Sat, 29 Mar 2025 11:57:13 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id 41be03b00d2f7-af93b6d6f77sm3057224a12.36.2025.03.29.11.57.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:13 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 05/11] netdevsim: add dummy device notifiers Date: Sat, 29 Mar 2025 11:56:58 -0700 Message-ID: <20250329185704.676589-6-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org In order to exercise and verify notifiers' locking assumptions, register dummy notifiers (via register_netdevice_notifier_dev_net). Share notifier event handler that enforces the assumptions with lock_debug.c (rename and export rtnl_net_debug_event as netdev_debug_event). Add ops lock asserts to netdev_debug_event. Signed-off-by: Stanislav Fomichev --- drivers/net/netdevsim/netdev.c | 10 ++++++++++ drivers/net/netdevsim/netdevsim.h | 3 +++ include/net/netdev_lock.h | 11 +++++++++++ net/core/lock_debug.c | 14 +++++++++----- 4 files changed, 33 insertions(+), 5 deletions(-) diff --git a/drivers/net/netdevsim/netdev.c b/drivers/net/netdevsim/netdev.c index b67af4651185..6188699aa241 100644 --- a/drivers/net/netdevsim/netdev.c +++ b/drivers/net/netdevsim/netdev.c @@ -939,6 +939,7 @@ static int nsim_init_netdevsim(struct netdevsim *ns) ns->netdev->netdev_ops = &nsim_netdev_ops; ns->netdev->stat_ops = &nsim_stat_ops; ns->netdev->queue_mgmt_ops = &nsim_queue_mgmt_ops; + netdev_lockdep_set_classes(ns->netdev); err = nsim_udp_tunnels_info_create(ns->nsim_dev, ns->netdev); if (err) @@ -960,6 +961,11 @@ static int nsim_init_netdevsim(struct netdevsim *ns) if (err) goto err_ipsec_teardown; rtnl_unlock(); + + ns->nb.notifier_call = netdev_debug_event; + if (register_netdevice_notifier_dev_net(ns->netdev, &ns->nb, &ns->nn)) + ns->nb.notifier_call = NULL; + return 0; err_ipsec_teardown: @@ -1043,6 +1049,10 @@ void nsim_destroy(struct netdevsim *ns) debugfs_remove(ns->qr_dfs); debugfs_remove(ns->pp_dfs); + if (ns->nb.notifier_call) + unregister_netdevice_notifier_dev_net(ns->netdev, &ns->nb, + &ns->nn); + rtnl_lock(); peer = rtnl_dereference(ns->peer); if (peer) diff --git a/drivers/net/netdevsim/netdevsim.h b/drivers/net/netdevsim/netdevsim.h index 665020d18f29..d04401f0bdf7 100644 --- a/drivers/net/netdevsim/netdevsim.h +++ b/drivers/net/netdevsim/netdevsim.h @@ -144,6 +144,9 @@ struct netdevsim { struct nsim_ethtool ethtool; struct netdevsim __rcu *peer; + + struct notifier_block nb; + struct netdev_net_notifier nn; }; struct netdevsim * diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index 1c0c9a94cc22..5f712de5bf8a 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -98,4 +98,15 @@ static inline int netdev_lock_cmp_fn(const struct lockdep_map *a, &qdisc_xmit_lock_key); \ } +#if IS_ENABLED(CONFIG_DEBUG_NET) +int netdev_debug_event(struct notifier_block *nb, unsigned long event, + void *ptr); +#else +static inline int netdev_debug_event(struct notifier_block *nb, + unsigned long event, void *ptr) +{ + return 0; +} +#endif + #endif diff --git a/net/core/lock_debug.c b/net/core/lock_debug.c index 7ecd28cc1c22..506899164f31 100644 --- a/net/core/lock_debug.c +++ b/net/core/lock_debug.c @@ -6,10 +6,11 @@ #include #include #include +#include #include -static int rtnl_net_debug_event(struct notifier_block *nb, - unsigned long event, void *ptr) +int netdev_debug_event(struct notifier_block *nb, unsigned long event, + void *ptr) { struct net_device *dev = netdev_notifier_info_to_dev(ptr); struct net *net = dev_net(dev); @@ -17,11 +18,13 @@ static int rtnl_net_debug_event(struct notifier_block *nb, /* Keep enum and don't add default to trigger -Werror=switch */ switch (cmd) { + case NETDEV_REGISTER: case NETDEV_UP: + netdev_ops_assert_locked(dev); + fallthrough; case NETDEV_DOWN: case NETDEV_REBOOT: case NETDEV_CHANGE: - case NETDEV_REGISTER: case NETDEV_UNREGISTER: case NETDEV_CHANGEMTU: case NETDEV_CHANGEADDR: @@ -66,6 +69,7 @@ static int rtnl_net_debug_event(struct notifier_block *nb, return NOTIFY_DONE; } +EXPORT_SYMBOL_GPL(netdev_debug_event); static int rtnl_net_debug_net_id; @@ -74,7 +78,7 @@ static int __net_init rtnl_net_debug_net_init(struct net *net) struct notifier_block *nb; nb = net_generic(net, rtnl_net_debug_net_id); - nb->notifier_call = rtnl_net_debug_event; + nb->notifier_call = netdev_debug_event; return register_netdevice_notifier_net(net, nb); } @@ -95,7 +99,7 @@ static struct pernet_operations rtnl_net_debug_net_ops __net_initdata = { }; static struct notifier_block rtnl_net_debug_block = { - .notifier_call = rtnl_net_debug_event, + .notifier_call = netdev_debug_event, }; static int __init rtnl_net_debug_init(void) From patchwork Sat Mar 29 18:56:59 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032766 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1A71B1B3927 for ; Sat, 29 Mar 2025 18:57:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.174 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274638; cv=none; b=XGFOTcuf5laI4tJEpTT6rOulREhIfGXQ9nEYaondRE7//UoB/kubnkhatcyInirfVG26T8JI8JJzvOXy+gN2gn70Ap9r68x73WE7HVUzbDkpLCKVe70yvzXlnly15RAGDVQ+TPUfZ1GScxG5sDg5a+EHz0shWMkhvGPOM2+e2aY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274638; c=relaxed/simple; bh=No/0VfPK7pHniKtbbaQJ0cyWQL9HoLVC3b3WbWBLe4o=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=pHZaTRlPUYEYZoLsf07kGtree5gOUBfGvuZoo2caHQLHlEMmxAA264flJ/Yprm2rx7Z9k3puk8vCX3UjxQ7gTRQRnKYffMAgyXJoMa1R3UD/HT+2qa7Y4mGpdxOFRQKZYnsmK2gKds8OFRaotc4Fm5yCK9Exy1jANDjtkRjNPZM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.174 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-2264aefc45dso86359435ad.0 for ; Sat, 29 Mar 2025 11:57:15 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274635; x=1743879435; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=QOUxfu91P1ktbOKHx7UEPpGlhg2bkdrt6E9z1Gl/UMk=; b=SfA3PvGhJFci1qS4DgYoP4zFDDNjOje66jovG6NrUP8bXE5WxS10FOWeorCoHAlplI CTR1MoxZQqfsH5unkwRZ8xI226lLuL8z/aVl1pTprOt4M/qIsKA1HRsC4CrAFo6ydCY8 5IC5y7N4NRbR4dLAZLjlq+izTOHdnNscO35i4xGWOrKcUPGkX1vbuuyiqg1lG0UaGtHs RrNa51Q3NDRz9fwGTEmBHMAATnIULS7HCS3SGxMeFF5xhvV3F1a1dZcX+sGmHYxsrQfS q95qiVIf7lv5GLOMMEMILp7A/wgwsKoPDrS6ZkuNMQmFvmD/UdqeVjQnfpANegrE4tiA oKbw== X-Gm-Message-State: AOJu0YzTSiCh7cEU/SyH6VNOEaS1joL09tQQzQkqVtyqFpF1kDUpZ0iH z5eULujvLTmGaKSRyt/1eB/fT308gs+J+Slfg/gCgPjKTqfX3e9vZ0VamOU= X-Gm-Gg: ASbGncth4/ZRLsJYvhjj+aRphixEL8TiCzVevG1I+Ro38hoe6F7Kw6kIgJHiavTcwxM ooaPJFQpRm2kalrIS/WIB/ARz8aK5k4hZXgMNrWVUxWbO4nsVA1nufPx93ntBXGu7JEnfEZ3hes sJIilTnJsBqmYlkcdRklRdTWF17+NCze3/RKPfgIWVjb8SeKv4FFtyiIR/hheUe7j+VzA05FIEJ /od/ZFJA8P6HRx1b7xx6CmPf7JGk+DJ56m5t69i1nLD1q+EGbSOdLDGvUbZiJ25Ukgg9ncCrvjW r2Beo0jXWJ+VW/1EtDgmTCt3vCuY3la6bE6ftD9G7tbk X-Google-Smtp-Source: AGHT+IGZvtq83+08cQjj/sm5hUpeVF3X2nUYvKDW3jBFoq2C/jNT4RqlhcC2hYVIELdnZJ3s6vzIqA== X-Received: by 2002:a17:903:2f85:b0:224:76f:9e45 with SMTP id d9443c01a7336-2292f963a1dmr45699325ad.21.1743274635025; Sat, 29 Mar 2025 11:57:15 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d2e1a72fcca58-73970dee851sm3936846b3a.26.2025.03.29.11.57.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:14 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 06/11] net: dummy: request ops lock Date: Sat, 29 Mar 2025 11:56:59 -0700 Message-ID: <20250329185704.676589-7-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Even though dummy device doesn't really need an instance lock, a lot of selftests use dummy so it's useful to have extra expose to the instance lock on NIPA. Request the instance/ops locking. Signed-off-by: Stanislav Fomichev --- drivers/net/dummy.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/net/dummy.c b/drivers/net/dummy.c index a4938c6a5ebb..d6bdad4baadd 100644 --- a/drivers/net/dummy.c +++ b/drivers/net/dummy.c @@ -105,6 +105,7 @@ static void dummy_setup(struct net_device *dev) dev->netdev_ops = &dummy_netdev_ops; dev->ethtool_ops = &dummy_ethtool_ops; dev->needs_free_netdev = true; + dev->request_ops_lock = true; /* Fill in device structure with ethernet-generic values. */ dev->flags |= IFF_NOARP; From patchwork Sat Mar 29 18:57:00 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032767 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E7EAA1DF97F for ; Sat, 29 Mar 2025 18:57:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.178 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274640; cv=none; b=b300gRtrvF21OTlu/omOS97oYG/W3b9Jp7iC/KsIVoKzSTxN/1d3vwazOzHVRg9vd26TnVQCGz1VIh4Cp98HQtv9+9ujE8D2xb15ohsozFQj4N4Zu0orbrdINCCwxw8yjJjfTlZj5aubAA9LebBF9bTjqXxm4fEGrl9/KyRkOpA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274640; c=relaxed/simple; bh=Btql8D+z61PeUR/qioHKtwL89Uw5YMz8yU1zPEYt1Xk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EVC6VYtDIZ5pZF94e6XXZGOlhzyV0Yj1b2gjiEekeYJrwNXYcxETH9DGDPY5EXDLlGSGFym8rNSNYaHM6j7O0DdnegogrnYXgQBy05WFGD/s4O6eezZKdMA7kP6i6aGkQ+w6Obxq3MSYpohn6kG1E5PNxqL1Xms7pL/rcf4Rp5E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-22435603572so63825015ad.1 for ; Sat, 29 Mar 2025 11:57:17 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274636; x=1743879436; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nGUsnZ7P/Gy4hwM2m6cRQua0QteAzaougsYbfzZVkYM=; b=nwXHAXZbtsczmXiWoPyTqKh2ol3UtVe1qTY4429y9j+QaowwfQqPH3dZpkjF0iU+z4 u22Y9auJucNlJr8Os/t9G+xHF1s2lWIGKXRrz3LXMdts8rRraY24HSOtGAL7bVu/rMEb K+iUICPRR0IGkc6T7fdtkEW5nMbAsIgLNH8DeRSj+7kxcwRv7YEnNpz2pIHiBcnaxVWG HgC6s6SLRlbLXDiEvgsju5NfjCIIyvnjoU7k7ttZiq7rhvT5w7MyUez+juMDbWSdz55F b7HuFrHZ6l1m5wdNgKLakXoAosebVCuytkT24sG7vFGLoa3RMhDxl23nKN20K58zC1Ot Gr2w== X-Gm-Message-State: AOJu0Yy1VcmwP1a0OVJUWLZuhnArsMQRFRG7Oz2t3wR2+npMB3Z/cxUl 5n/ipa4m+3jA3Br+F3umFnZGcNCuSAUOv5pjULWZWoTIRFLxtNfu3pJuVWo= X-Gm-Gg: ASbGncuRBNwFsO5OOzukCXQ8P4/te71vC+0s4rSUbxL/ZLUUAfdRhtI/oM/nXTalcAr LeuMAbiolpKj/zKarcKHTyqAJMKpFHaDSGbAfD7VTYKJHF61MBtPLPHquPIze0I5cRZq2V3WVs3 GdV4O60dAwN/MFUX5UYiv0NFZ8xJLIWN8VHgy4h1EDnmIz8nj1mMvs+2kJU1YX5zGHGUnP7ft0Z aIb5QhFnRLhyCYdy86jFzxeXXsNHYiaWKIxgKjkK8pyv4aRB2jfO/nXOKKbNDlIFhX+hop9Znfu KZBOLszbloFcX2CaKAAOp45NuS9/7DJBm+fBDJytG0zI X-Google-Smtp-Source: AGHT+IHbm7PkZHY8e1VzU2s6E34GlqtHbIsjuKb4txeQWe4/xiBp9A++Qh7ccLBWHtE0OzKJiphLDw== X-Received: by 2002:a05:6a20:9185:b0:1f5:81bc:c72e with SMTP id adf61e73a8af0-2009f778828mr4639733637.33.1743274636352; Sat, 29 Mar 2025 11:57:16 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id 41be03b00d2f7-af93b8adc83sm3590126a12.56.2025.03.29.11.57.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:16 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 07/11] docs: net: document netdev notifier expectations Date: Sat, 29 Mar 2025 11:57:00 -0700 Message-ID: <20250329185704.676589-8-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org We don't have a consistent state yet, but document where we think we are and where we wanna be. Signed-off-by: Stanislav Fomichev --- Documentation/networking/netdevices.rst | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/Documentation/networking/netdevices.rst b/Documentation/networking/netdevices.rst index ebb868f50ac2..381243c002c1 100644 --- a/Documentation/networking/netdevices.rst +++ b/Documentation/networking/netdevices.rst @@ -343,6 +343,28 @@ there are two sets of interfaces: ``dev_xxx`` and ``netif_xxx`` (e.g., acquiring the instance lock themselves, while the ``netif_xxx`` functions assume that the driver has already acquired the instance lock. +Notifiers and netdev instance lock +================================== + +For device drivers that implement shaping or queue management APIs, +some of the notifiers (``enum netdev_cmd``) are running under the netdev +instance lock. + +For devices with locked ops, currently only the following notifiers are +running under the lock: +* ``NETDEV_REGISTER`` +* ``NETDEV_UP`` + +The following notifiers are running without the lock (so the ops-locked +devices need to manually grab the lock if needed): +* ``NETDEV_UNREGISTER`` + +There are no clear expectations for the remaining notifiers. Notifiers not on +the list may run with or without the instance lock, potentially even invoking +the same notifier type with and without the lock from different code paths. +The goal is to eventually ensure that all (or most, with a few documented +exceptions) notifiers run under the instance lock. + NETDEV_INTERNAL symbol namespace ================================ From patchwork Sat Mar 29 18:57:01 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032768 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f172.google.com (mail-pl1-f172.google.com [209.85.214.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 19AA71DF985 for ; Sat, 29 Mar 2025 18:57:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274640; cv=none; b=BhHiJ5uaBz1UvV/ejH1EN0oPlbmE8BO8XOgk/HUkDppuDVNb+qXZX+cLc1a4CoT2lMAXSd33YtbG50NRtUvRfeZJ7elfBlEcfglcYCMS6JmJPy9l2bdpltyniY3OReNRyUv7SgHP3LuszsTmMvLcY/ue8zAw6tSsbrXQRlVM7m0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274640; c=relaxed/simple; bh=X7KmEadZjppxjeK02+ADtaxBZWNPB0A0AyWhTDqlsbQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=PpdeAdbHKt0w/G9gSDhItH6X3Laffq61/yiFlvIrt9qtIHShYJFB0jDUwqP4DZXUDGcbGPMibU2ToSNp/YUWOznAcKM+foxrq8zbK8Nm1HZ4nWSLBn+xZ9wq6D0xBFUQ0aYLRaeII8mkau+Soh2Bck66wljV7mBxHbMyJDZA8ko= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f172.google.com with SMTP id d9443c01a7336-223fd89d036so73132525ad.1 for ; Sat, 29 Mar 2025 11:57:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274638; x=1743879438; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FcYRnerQ6JYJ7ayFAv8/Jf2/Ey5llrN6cVGamxlnHzM=; b=qJaAhiEXodChPCtjk6ssta3qsUXRZyIXXwkuRZfLqRXbJyxv8gMRnj4KWTzo6Fyfr8 ui4/6pHBq5Z97MIMVhsE18j4767In5csi9b5tv5oD7Q6FUQWwV20jAkdROoHC9yhVD/6 iqJ5ZqBBWj6xdSkU1RjDgyjqiPlfzYB7I+k9017mOK2ZhOfVy7QoBeI9fij653G6U0O+ qTWmpwOh0FJZPocBMFmomkBbc0L3nHmfCZyPcdJ6D2w0IFKgg7nKVSLWdl3AyKODiO1P gS5c0jpiNiRwEZjFPrPvUbXCcYv0Re82TABCxmIfNUvjKrzgfwYHuyAM430AAghqW5Bq 5rbg== X-Gm-Message-State: AOJu0YxsIxKA3QPqhCiXydHvxeJLC9mtsiBKkZ4h4znIHOiBChTvGsd7 LFEV/6wTTWQ7CL7WpmVEINGf7o4S+dTOHD8A53PDZjfln4w7gv9w/aJ2FAA= X-Gm-Gg: ASbGncvEfZeye1d2IzzjpYR8WS8kfoitRkw0ZW9VEDZ+uCD6oyjLrcgNX9agxp46+3t RlOPW9eK70U0oalCtPtVHqWSII960zJy3tYVZv5Jb/w7TgNoXbBLhyZgBoZ47rD3smTBzKaV/zL 5+TAwqZFe2pNz9GoK7yjIRzXssLwmU9lCNcBCzdUEs9wB8r4dsDyGIyXTA6omyXNV6Ka0y7reuJ mrWdVR9rjl5+K4rO6klezxO5DkQisEOwufGeQWGj5J+D2BvlW7qIx0QDXkUXmk/NcQH9GbMgjxz puXceoSlGqqj19hckw7xd5yY5d/V1N4zn8nxkfUIqjPE X-Google-Smtp-Source: AGHT+IECg3yi9o4tYm5VuXaL/enumDHimBuH65yGMvCOEfTZa9/9fiKhcZpJpKZRCIJuHXEaJ6Mzmg== X-Received: by 2002:a17:903:19ed:b0:224:3db:a296 with SMTP id d9443c01a7336-2292f946dd7mr59887465ad.2.1743274637711; Sat, 29 Mar 2025 11:57:17 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d9443c01a7336-2291f1ce127sm39648225ad.108.2025.03.29.11.57.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:17 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 08/11] selftests: net: use netdevsim in netns test Date: Sat, 29 Mar 2025 11:57:01 -0700 Message-ID: <20250329185704.676589-9-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org Netdevsim has extra register_netdevice_notifier_dev_net notifiers, use netdevim instead of dummy device to test them out. Signed-off-by: Stanislav Fomichev --- tools/testing/selftests/net/lib.sh | 25 +++++++++++++++++++++++ tools/testing/selftests/net/netns-name.sh | 13 ++++++++---- 2 files changed, 34 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/net/lib.sh b/tools/testing/selftests/net/lib.sh index 975be4fdbcdb..701905eeff66 100644 --- a/tools/testing/selftests/net/lib.sh +++ b/tools/testing/selftests/net/lib.sh @@ -222,6 +222,31 @@ setup_ns() NS_LIST+=("${ns_list[@]}") } +# Create netdevsim with given id and net namespace. +create_netdevsim() { + local id="$1" + local ns="$2" + + modprobe netdevsim &> /dev/null + udevadm settle + + echo "$id 1" | ip netns exec $ns tee /sys/bus/netdevsim/new_device >/dev/null + local dev=$(ip netns exec $ns ls /sys/bus/netdevsim/devices/netdevsim$id/net) + ip -netns $ns link set dev $dev name nsim$id + ip -netns $ns link set dev nsim$id up + + echo nsim$id +} + +# Remove netdevsim with given id. +cleanup_netdevsim() { + local id="$1" + + if [ -d "/sys/bus/netdevsim/devices/netdevsim$id/net" ]; then + echo "$id" > /sys/bus/netdevsim/del_device + fi +} + tc_rule_stats_get() { local dev=$1; shift diff --git a/tools/testing/selftests/net/netns-name.sh b/tools/testing/selftests/net/netns-name.sh index 0be1905d1f2f..38871bdef67f 100755 --- a/tools/testing/selftests/net/netns-name.sh +++ b/tools/testing/selftests/net/netns-name.sh @@ -7,10 +7,12 @@ set -o pipefail DEV=dummy-dev0 DEV2=dummy-dev1 ALT_NAME=some-alt-name +NSIM_ADDR=2025 RET_CODE=0 cleanup() { + cleanup_netdevsim $NSIM_ADDR cleanup_ns $NS $test_ns } @@ -25,12 +27,15 @@ setup_ns NS test_ns # # Test basic move without a rename +# Use netdevsim because it has extra asserts for notifiers. # -ip -netns $NS link add name $DEV type dummy || fail -ip -netns $NS link set dev $DEV netns $test_ns || + +nsim=$(create_netdevsim $NSIM_ADDR $NS) +ip -netns $NS link set dev $nsim netns $test_ns || fail "Can't perform a netns move" -ip -netns $test_ns link show dev $DEV >> /dev/null || fail "Device not found after move" -ip -netns $test_ns link del $DEV || fail +ip -netns $test_ns link show dev $nsim >> /dev/null || + fail "Device not found after move" +cleanup_netdevsim $NSIM_ADDR # # Test move with a conflict From patchwork Sat Mar 29 18:57:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032769 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CA9891DFE0B for ; Sat, 29 Mar 2025 18:57:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.178 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274642; cv=none; b=tiq2LQ18b7jKbo/PMC4JXY8LAbfcpHybruuAP6Jkb6mLTV4BdbCDIU15tI3B5InOhTcGpzOuqsGFHIhjGOR6o/XrkfeKnQhYxpE0oNNRANgiMy37szEr37PoLUhgknmOZMrO2F2+Ej+Vtlrrpv6KnMzmggnkrUcO/JMRN9BkraU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274642; c=relaxed/simple; bh=vfxSILg7Dt9/kKWbl0XzVC6ljAEF+FnMQQXqxT5C4e8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=VB75FRz9rms21nGBu1oA8yVS6zl/WHT4lDs3211FnIfe3y96+YIGIXmfyjn7ewvP7g6J+siz7251nUAZzOPKTW3x/7LkuPuJW+KTvK3BYrwKMpRKCu0sgyQuZXL/96og31aBQJhCx+3ILweNFgG8k1hkmGB4z1w2n0IYtrxeGXI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-226185948ffso66617355ad.0 for ; Sat, 29 Mar 2025 11:57:20 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274639; x=1743879439; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Os/U7o5A7vY4zqbL9CfE3FsiEugWyA5SJaeZg8deXM0=; b=uidc+HKQg1FZLjq3Ar60d/Dzlp8CfqvCnTpntLRsrBSlfOifl8qIgyUjoczw5M1Y2f Tq362aDZvScUM2UHt6KBDnzbwrs4z+yPFiDiY9qlUO1auVrrRfO06TA9D+DJ23GUA8DS 8eSfQ2+5aA2T1zT0Y1FaPYIM7a2SOTzVaIY3xqPR4tIJynhp4ji33n5n5iz3Z9hT5c0f Md9kwHw7S8A7WBZpBwrcYHj+9phokFonGSH61+mu8YlX39XpHsXagQme7vGBy33d9SYN B/l+CW57arvo12cqAbmWv1kb8rPmc5WYk1O3oR9C3Gy2ZbVBdYcHeSZfLivwTImnO0ak B76Q== X-Gm-Message-State: AOJu0YwduzhtGEFdrhZb351O3cbklw0f2jYkqKcgUbdRiS7GaQCJaTOP Xt/ohDlpk81jxAuqXmi0S1BpepQ5KAeCDjaTADgCQXrrrphJDRJQRv+KT64= X-Gm-Gg: ASbGncuWBL9QYeJXWareKKRej6653ppelQEVBlk5DySi2LdCeoxxjDcq129NxG3iyJe b4vo6tpNJEGWaa7F7/QkXiB7g5PAMwBPLp+W2uSQhodVkBg8h4l3pH3ZA2LyGT8B78jmgs2sStT QlaY52s2vgX3FZh6Xql1Lo80EmBvbiasLNMb1H0Q4zqVw0i787GkB/i8ZzstbYRTarg8ENPtGVu p+doXgUfMmhcK7eMxdbvNLmQDwvU+YMmhSgKivq1jQRkNUGIPO5jY5o14Bl1NW/neQ2dGzrh0yq mgeM3TLLmoAgJxP6CivcZl5iDY9nebe2cEaws0BCp4c7 X-Google-Smtp-Source: AGHT+IEJkRowgtjJrozf5x2QeK1AXF1mRh2cFhF4jDRzFLt4LHMZzjgWMuqxAx6E9/mYs7gkYj3mLw== X-Received: by 2002:a05:6a00:2e18:b0:736:51a6:78b1 with SMTP id d2e1a72fcca58-739803ab862mr5293657b3a.11.1743274639322; Sat, 29 Mar 2025 11:57:19 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d2e1a72fcca58-73970e2243esm4069147b3a.60.2025.03.29.11.57.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:18 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 09/11] net: designate XSK pool pointers in queues as "ops protected" Date: Sat, 29 Mar 2025 11:57:02 -0700 Message-ID: <20250329185704.676589-10-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org From: Jakub Kicinski Read accesses go via xsk_get_pool_from_qid(), the call coming from the core and gve look safe (other "ops locked" drivers don't support XSK). Write accesses go via xsk_reg_pool_at_qid() and xsk_clear_pool_at_qid(). Former is already under the ops lock, latter needs to be locked when coming from the workqueue via xp_clear_dev(). Acked-by: Stanislav Fomichev Signed-off-by: Jakub Kicinski Signed-off-by: Stanislav Fomichev --- include/linux/netdevice.h | 1 + include/net/netdev_rx_queue.h | 6 +++--- net/xdp/xsk.c | 2 ++ net/xdp/xsk_buff_pool.c | 7 ++++++- 4 files changed, 12 insertions(+), 4 deletions(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index cf3b6445817b..9fb03a292817 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -688,6 +688,7 @@ struct netdev_queue { /* Subordinate device that the queue has been assigned to */ struct net_device *sb_dev; #ifdef CONFIG_XDP_SOCKETS + /* "ops protected", see comment about net_device::lock */ struct xsk_buff_pool *pool; #endif diff --git a/include/net/netdev_rx_queue.h b/include/net/netdev_rx_queue.h index b2238b551dce..8cdcd138b33f 100644 --- a/include/net/netdev_rx_queue.h +++ b/include/net/netdev_rx_queue.h @@ -20,12 +20,12 @@ struct netdev_rx_queue { struct net_device *dev; netdevice_tracker dev_tracker; + /* All fields below are "ops protected", + * see comment about net_device::lock + */ #ifdef CONFIG_XDP_SOCKETS struct xsk_buff_pool *pool; #endif - /* NAPI instance for the queue - * "ops protected", see comment about net_device::lock - */ struct napi_struct *napi; struct pp_memory_provider_params mp_params; } ____cacheline_aligned_in_smp; diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c index e5d104ce7b82..98a38d21b9b7 100644 --- a/net/xdp/xsk.c +++ b/net/xdp/xsk.c @@ -1651,7 +1651,9 @@ static int xsk_notifier(struct notifier_block *this, xsk_unbind_dev(xs); /* Clear device references. */ + netdev_lock_ops(dev); xp_clear_dev(xs->pool); + netdev_unlock_ops(dev); } mutex_unlock(&xs->mutex); } diff --git a/net/xdp/xsk_buff_pool.c b/net/xdp/xsk_buff_pool.c index 25a76c5ce0f1..c7e50fd86c6a 100644 --- a/net/xdp/xsk_buff_pool.c +++ b/net/xdp/xsk_buff_pool.c @@ -279,9 +279,14 @@ static void xp_release_deferred(struct work_struct *work) { struct xsk_buff_pool *pool = container_of(work, struct xsk_buff_pool, work); + struct net_device *netdev = pool->netdev; rtnl_lock(); - xp_clear_dev(pool); + if (netdev) { + netdev_lock_ops(netdev); + xp_clear_dev(pool); + netdev_unlock_ops(netdev); + } rtnl_unlock(); if (pool->fq) { From patchwork Sat Mar 29 18:57:03 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032770 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f177.google.com (mail-pl1-f177.google.com [209.85.214.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6508B1DF985 for ; Sat, 29 Mar 2025 18:57:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274643; cv=none; b=WUWETRVgRh5vY6Q8ERPfRdpMZZxYq9gRq3731jDQwcYrL0Eevq8H/IAdmqKTOGID+3c+YJ9ltpy7w9YIogS6TWaOoxto4xqutWykoYFGBDadC733966cv/yd2C4rRWHgmx9efZXRM8gSiO3v5RftH2rr+42K/iCfNVPSQ+Y/cvQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274643; c=relaxed/simple; bh=hl35ujfOZVg64UpZwk7qsbl7ZjcbQrQhhAeOrMhC5RA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=oqcWvbYtXgfK/3mtsNZWrduGL/jGnZNbwRHwqHDJq0TXC9r+gDlKzpbRFV2v9C6/wDZ3M1h8UoId+kzy+YiWzYi4H2phbtpqhmgxOyAUivg86sNJbiwv16S7tnp+6IR3rvH/SzSQ7pdQNdVJ/uW6mA9aOoMY+su3l0r5+Uc14tc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f177.google.com with SMTP id d9443c01a7336-2279915e06eso69948725ad.1 for ; Sat, 29 Mar 2025 11:57:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274641; x=1743879441; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZwTWfgqefJmGJ+Qc6zGlY2axibd++Vub9iWTsP1YT2g=; b=pQKZ9kQKL0jp8h8jtjVpbXKX+PELzuLZBfBmv4pXm5wpjB1nKJBcvuxz3qfG79tOBA 6UzKoap/wL0Axvw1OJFDvJkv2L/jRh3kcvX5QC5tciNWSGL4M+FZO5p+aNZv7jNwyu2y By3pRGovXHbiiOEy8njd/uR7D/H4EXD4mMC7YH3CI4f0nt8O66fFOGOVIs34FzPbaf/p deYJEG0tlHZEQtipFCdsog2HuO8rqL+xsESmpO+cqe1C/8qTNLTFNlTtA8Q0ZgLmqU+s EfQ3yZ/JrOMScc11e8yibSyzo7dCQidHh/eYZ30nmGEVQdrIQTBZ295YaizUAMr8v8oU mYIw== X-Gm-Message-State: AOJu0YyCsGspEJldJ8R1ke94KCniIudsTrkZn738s+FmsaRkuhs9EEpY am54mLLxeWjiY3WVRVcCbG6ykB/hMhQCbLS08z5emnvEfF4ORdP5jGOroEo= X-Gm-Gg: ASbGncs+GfL1niAJaX3eL7GAdtapJd3zlO4Xpd0ucDnTWPu5FQ1Pf0+/csSAXaxkzTS oLd2xucaG+zvFzf0di/dyvlr1Nq3Zdbbeq7QR2Rse00ilOda40k+aHP+9kraSuDVGA8EClnL+Wr PEF9HPcKR/0FJ5/wWNVnYHKFqEAECwnrl+m0G2KaOu/HejYeuXeSmXe6eIGXCnx/6DEmTLof2Jm qREfsGom7Jh52FFOO2/VNvasnl/oze6UeLFaCxqov0N7gEnlngBO3RH+ACE4tLhencMEU/2zZ89 AadVpAoTyvkFypankwad6JuScIGHEPHZneB0OSUtpHYr X-Google-Smtp-Source: AGHT+IEoyJqptpSkbfMcWWnHAwCER0cdlnTjbX6uLQbrCIuT0b86G2OoUT0JQkAjQCldFkRM18WHLg== X-Received: by 2002:a05:6a00:983:b0:732:2484:e0ce with SMTP id d2e1a72fcca58-739804397a1mr4282488b3a.17.1743274640890; Sat, 29 Mar 2025 11:57:20 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d2e1a72fcca58-73970deeea2sm3922931b3a.21.2025.03.29.11.57.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:20 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 10/11] netdev: add "ops compat locking" helpers Date: Sat, 29 Mar 2025 11:57:03 -0700 Message-ID: <20250329185704.676589-11-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org From: Jakub Kicinski Add helpers to "lock a netdev in a backward-compatible way", which for ops-locked netdevs will mean take the instance lock. For drivers which haven't opted into the ops locking we'll take rtnl_lock. The scoped foreach is dropping and re-taking the lock for each device, even if prev and next are both under rtnl_lock. I hope that's fine since we expect that netdev nl to be mostly supported by modern drivers, and modern drivers should also opt into the instance locking. Note that these helpers are mostly needed for queue related state, because drivers modify queue config in their ops in a non-atomic way. Or differently put, queue changes don't have a clear-cut API like NAPI configuration. Any state that can should just use the instance lock directly, not the "compat" hacks. Acked-by: Stanislav Fomichev Signed-off-by: Jakub Kicinski Signed-off-by: Stanislav Fomichev --- include/net/netdev_lock.h | 16 +++++++++++++ net/core/dev.c | 49 +++++++++++++++++++++++++++++++++++++++ net/core/dev.h | 15 ++++++++++++ 3 files changed, 80 insertions(+) diff --git a/include/net/netdev_lock.h b/include/net/netdev_lock.h index 5f712de5bf8a..8ab108a4e2cf 100644 --- a/include/net/netdev_lock.h +++ b/include/net/netdev_lock.h @@ -64,6 +64,22 @@ netdev_ops_assert_locked_or_invisible(const struct net_device *dev) netdev_ops_assert_locked(dev); } +static inline void netdev_lock_ops_compat(struct net_device *dev) +{ + if (netdev_need_ops_lock(dev)) + netdev_lock(dev); + else + rtnl_lock(); +} + +static inline void netdev_unlock_ops_compat(struct net_device *dev) +{ + if (netdev_need_ops_lock(dev)) + netdev_unlock(dev); + else + rtnl_unlock(); +} + static inline int netdev_lock_cmp_fn(const struct lockdep_map *a, const struct lockdep_map *b) { diff --git a/net/core/dev.c b/net/core/dev.c index e59eb173900d..87cba93fa59f 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -1051,6 +1051,18 @@ struct net_device *__netdev_put_lock(struct net_device *dev) return dev; } +static struct net_device *__netdev_put_lock_ops_compat(struct net_device *dev) +{ + netdev_lock_ops_compat(dev); + if (dev->reg_state > NETREG_REGISTERED) { + netdev_unlock_ops_compat(dev); + dev_put(dev); + return NULL; + } + dev_put(dev); + return dev; +} + /** * netdev_get_by_index_lock() - find a device by its ifindex * @net: the applicable net namespace @@ -1073,6 +1085,18 @@ struct net_device *netdev_get_by_index_lock(struct net *net, int ifindex) return __netdev_put_lock(dev); } +struct net_device * +netdev_get_by_index_lock_ops_compat(struct net *net, int ifindex) +{ + struct net_device *dev; + + dev = dev_get_by_index(net, ifindex); + if (!dev) + return NULL; + + return __netdev_put_lock_ops_compat(dev); +} + struct net_device * netdev_xa_find_lock(struct net *net, struct net_device *dev, unsigned long *index) @@ -1098,6 +1122,31 @@ netdev_xa_find_lock(struct net *net, struct net_device *dev, } while (true); } +struct net_device * +netdev_xa_find_lock_ops_compat(struct net *net, struct net_device *dev, + unsigned long *index) +{ + if (dev) + netdev_unlock_ops_compat(dev); + + do { + rcu_read_lock(); + dev = xa_find(&net->dev_by_index, index, ULONG_MAX, XA_PRESENT); + if (!dev) { + rcu_read_unlock(); + return NULL; + } + dev_hold(dev); + rcu_read_unlock(); + + dev = __netdev_put_lock_ops_compat(dev); + if (dev) + return dev; + + (*index)++; + } while (true); +} + static DEFINE_SEQLOCK(netdev_rename_lock); void netdev_copy_name(struct net_device *dev, char *name) diff --git a/net/core/dev.h b/net/core/dev.h index 7ee203395d8e..c4b645120d72 100644 --- a/net/core/dev.h +++ b/net/core/dev.h @@ -41,6 +41,21 @@ DEFINE_FREE(netdev_unlock, struct net_device *, if (_T) netdev_unlock(_T)); (var_name = netdev_xa_find_lock(net, var_name, &ifindex)); \ ifindex++) +struct net_device * +netdev_get_by_index_lock_ops_compat(struct net *net, int ifindex); +struct net_device * +netdev_xa_find_lock_ops_compat(struct net *net, struct net_device *dev, + unsigned long *index); + +DEFINE_FREE(netdev_unlock_ops_compat, struct net_device *, + if (_T) netdev_unlock_ops_compat(_T)); + +#define for_each_netdev_lock_ops_compat_scoped(net, var_name, ifindex) \ + for (struct net_device *var_name __free(netdev_unlock_ops_compat) = NULL; \ + (var_name = netdev_xa_find_lock_ops_compat(net, var_name, \ + &ifindex)); \ + ifindex++) + #ifdef CONFIG_PROC_FS int __init dev_proc_init(void); #else From patchwork Sat Mar 29 18:57:04 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanislav Fomichev X-Patchwork-Id: 14032771 X-Patchwork-Delegate: kuba@kernel.org Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D07531DED5E for ; Sat, 29 Mar 2025 18:57:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.173 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274645; cv=none; b=Hu3jMmgEWcqS56C3WpJmJyinfeKMytfauTo46KPBe0PyuDAPDcO0yl0ZA72MXM3T5Xthn0r4gz72UVG8mylciEa2W61Rnmmp+aDrymFQmBQFisvZncNOjI+NnQhg9ohenB4P6hvHJ+9HWPqslqMTdh44MxY2R0DoOOOPVBHJIjI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743274645; c=relaxed/simple; bh=CUR5I3UpwjbNO0hNnmCCSuAoAxW+HdofdbYjgHwMqZw=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=WEwzfEb4bWdVHjdfj6XnZ5OOHsUHZo3yM2of8d9FC0NSYxygQbeBKa7IBDLHF82IuRVfApx1gwrfS91R3Zn8tBeG88OElD8aZ6iRPCLJk37zyXRbJQN5WynSaSH019FIPENG3qrDmJwA4hk/eMivEv3BjjRBwbwyZzCTsq2svVs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=fomichev.me Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-22401f4d35aso66948245ad.2 for ; Sat, 29 Mar 2025 11:57:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743274642; x=1743879442; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=knTGk9lxkObf5m8zJBEYc+FoI0axfDUQp9+wJSH7C6k=; b=LVEIevd5uCoLcz76EkeLWP5vbsaJXgjcHmFjxhynApgz7K3xi7hrNXLbp/toUnM0dx LEr3SVwRAl5wdttC6Mcbrpvdcnl/Jn2k02nYBG8ENs3k5YDB1oyIsmsU4zlDKv9WKpIq 2CancnQ59hxEqs+LwYO6WOax4LFRiYmSwaWM2xn0eNRk7HtVKZ5MyGNgrdl4oFoxEAuH W7jJtGTP8FD0nOuKX+BK4j4kgHcaGhLAJ+28nNISOvrnmArYLGnAHs5imcYNlQxa6Vwv fxI2CANTrTSjoQYZr7mCehKEYa/OxpAqAZdNFTZn7cKy4WwtaQIDpoOPhDGfSZgTOxEU f6ow== X-Gm-Message-State: AOJu0YwMfomQlC9g1qUnpInmnqlyH9lsIjt3x/+5TCyn9p7b2sPni7Nx AJ5up8erkvoZ2wll8x9jg7ZxnAoziCoH9q5knxXODgXJA2TMxf476tPU0E0= X-Gm-Gg: ASbGnctkAN/RzxmvG5TB1cB6nWMwjAzkC9yBOIbmWhNR7tcqEzuxKNbFvixb2dw6IBh TYKpKDtzJ3Gt6qyS3Mw5A282wVstCeS2IHbVjnNNg6VMNFij0Gem/8hMMUmJb12QMU2XcrfcFEv Z9eAGAYv7NYT4GvYpKuJ9Bd7E2qajtyjcUmEfyrEu+XM7A2fm6pivxifjP6GQvMDVhvGG7lsELb 49aPGD5DyVKg7seULeh0HSgcj+6QqOiMy93w6p9q8kRIE8JgfnXVBf3sAvwgtca+Q640RtAg06f NaGBgDU0e0PKBDpEbc09wAKg2TsL+0S6yABy9AspHB8rdYBE2P2e9cM= X-Google-Smtp-Source: AGHT+IELjhLlUzQzXrQ97Lyu6+EGgRh0OBZnFwQlHp9mv+GaeiUIcTjvdYzNvm+KerxL2tq6EM2BFw== X-Received: by 2002:a17:903:1a0b:b0:224:1eaa:5de1 with SMTP id d9443c01a7336-2292f95f318mr51390875ad.18.1743274642342; Sat, 29 Mar 2025 11:57:22 -0700 (PDT) Received: from localhost ([2601:646:9e00:f56e:123b:cea3:439a:b3e3]) by smtp.gmail.com with UTF8SMTPSA id d9443c01a7336-2291f1cf860sm39453695ad.115.2025.03.29.11.57.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Mar 2025 11:57:21 -0700 (PDT) From: Stanislav Fomichev To: netdev@vger.kernel.org Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Subject: [PATCH net v3 11/11] netdev: don't hold rtnl_lock over nl queue info get when possible Date: Sat, 29 Mar 2025 11:57:04 -0700 Message-ID: <20250329185704.676589-12-sdf@fomichev.me> X-Mailer: git-send-email 2.48.1 In-Reply-To: <20250329185704.676589-1-sdf@fomichev.me> References: <20250329185704.676589-1-sdf@fomichev.me> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: kuba@kernel.org From: Jakub Kicinski Netdev queue dump accesses: NAPI, memory providers, XSk pointers. All three are "ops protected" now, switch to the op compat locking. rtnl lock does not have to be taken for "ops locked" devices. Acked-by: Stanislav Fomichev Signed-off-by: Jakub Kicinski Signed-off-by: Stanislav Fomichev --- net/core/netdev-genl.c | 18 +++++++----------- 1 file changed, 7 insertions(+), 11 deletions(-) diff --git a/net/core/netdev-genl.c b/net/core/netdev-genl.c index fd1cfa9707dc..39f52a311f07 100644 --- a/net/core/netdev-genl.c +++ b/net/core/netdev-genl.c @@ -481,18 +481,15 @@ int netdev_nl_queue_get_doit(struct sk_buff *skb, struct genl_info *info) if (!rsp) return -ENOMEM; - rtnl_lock(); - - netdev = netdev_get_by_index_lock(genl_info_net(info), ifindex); + netdev = netdev_get_by_index_lock_ops_compat(genl_info_net(info), + ifindex); if (netdev) { err = netdev_nl_queue_fill(rsp, netdev, q_id, q_type, info); - netdev_unlock(netdev); + netdev_unlock_ops_compat(netdev); } else { err = -ENODEV; } - rtnl_unlock(); - if (err) goto err_free_msg; @@ -541,17 +538,17 @@ int netdev_nl_queue_get_dumpit(struct sk_buff *skb, struct netlink_callback *cb) if (info->attrs[NETDEV_A_QUEUE_IFINDEX]) ifindex = nla_get_u32(info->attrs[NETDEV_A_QUEUE_IFINDEX]); - rtnl_lock(); if (ifindex) { - netdev = netdev_get_by_index_lock(net, ifindex); + netdev = netdev_get_by_index_lock_ops_compat(net, ifindex); if (netdev) { err = netdev_nl_queue_dump_one(netdev, skb, info, ctx); - netdev_unlock(netdev); + netdev_unlock_ops_compat(netdev); } else { err = -ENODEV; } } else { - for_each_netdev_lock_scoped(net, netdev, ctx->ifindex) { + for_each_netdev_lock_ops_compat_scoped(net, netdev, + ctx->ifindex) { err = netdev_nl_queue_dump_one(netdev, skb, info, ctx); if (err < 0) break; @@ -559,7 +556,6 @@ int netdev_nl_queue_get_dumpit(struct sk_buff *skb, struct netlink_callback *cb) ctx->txq_idx = 0; } } - rtnl_unlock(); return err; }