From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 6C8CB4038E DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 8EE3F4041C MIME-Version: 1.0 Date: Thu, 20 Oct 2022 21:59:03 +0200 From: netdev@kapio-technology.com In-Reply-To: <20221020132538.reirrskemcjwih2m@skbuf> References: <20221018165619.134535-1-netdev@kapio-technology.com> <20221018165619.134535-1-netdev@kapio-technology.com> <20221018165619.134535-11-netdev@kapio-technology.com> <20221018165619.134535-11-netdev@kapio-technology.com> <20221020132538.reirrskemcjwih2m@skbuf> Message-ID: <77c2b6507fd267cefdaf74e53c2bd325@kapio-technology.com> Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [Bridge] [PATCH v8 net-next 10/12] net: dsa: mv88e6xxx: mac-auth/MAB implementation List-Id: Linux Ethernet Bridging List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Vladimir Oltean Cc: Andrew Lunn , Alexandre Belloni , Nikolay Aleksandrov , Kurt Kanzenbach , Eric Dumazet , linux-kselftest@vger.kernel.org, Joachim Wiberg , Shuah Khan , Ivan Vecera , Florian Fainelli , Daniel Borkmann , Ido Schimmel , bridge@lists.linux-foundation.org, Russell King , linux-arm-kernel@lists.infradead.org, Roopa Prabhu , kuba@kernel.org, Paolo Abeni , Vivien Didelot , Woojung Huh , Landen Chao , Jiri Pirko , Amit Cohen , Christian Marangi , Hauke Mehrtens , Hans Schultz , Sean Wang , DENG Qingfang , Claudiu Manoil , linux-mediatek@lists.infradead.org, Matthias Brugger , Yuwei Wang , Petr Machata , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Florent Fourcot , UNGLinuxDriver@microchip.com, davem@davemloft.net On 2022-10-20 15:25, Vladimir Oltean wrote: >> + >> +#include >> +#include >> +#include "chip.h" >> +#include "global1.h" >> +#include "switchdev.h" >> + >> +static void mv88e6xxx_atu_locked_entry_purge(struct >> mv88e6xxx_atu_locked_entry *ale, >> + bool notify, bool take_nl_lock) >> +{ >> + struct switchdev_notifier_fdb_info info = { >> + .addr = ale->mac, >> + .vid = ale->vid, >> + .locked = true, >> + .offloaded = true, >> + }; >> + struct mv88e6xxx_atu_entry entry; >> + struct net_device *brport; >> + struct dsa_port *dp; >> + >> + entry.portvec = MV88E6XXX_G1_ATU_DATA_PORT_VECTOR_NO_EGRESS; >> + entry.state = MV88E6XXX_G1_ATU_DATA_STATE_UC_UNUSED; >> + entry.trunk = false; >> + ether_addr_copy(entry.mac, ale->mac); >> + >> + mv88e6xxx_reg_lock(ale->chip); >> + mv88e6xxx_g1_atu_loadpurge(ale->chip, ale->fid, &entry); >> + mv88e6xxx_reg_unlock(ale->chip); >> + >> + dp = dsa_to_port(ale->chip->ds, ale->port); >> + >> + if (notify) { >> + if (take_nl_lock) >> + rtnl_lock(); > > Is this tested with lockdep? I see the function is called with other > locks held (p->ale_list_lock). Isn't there a lock inversion anywhere? > Locks always need to be taken in the same order, and rtnl_lock is a > pretty high level lock, not exactly the kind you could take just like > that. > I am very sure that there is no lock inversions or double locks taken. It is only in the clean-up from time-out of driver locked entries that the nl lock needs to be taken (as the code reveals). In all other instances, the nl lock is already taken as far as this implementation goes.