From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steven Rostedt Subject: Re: [RT PATCH 2/2] net: add a lock around icmp_sk() Date: Wed, 31 Aug 2016 13:03:46 -0400 Message-ID: <20160831130346.7c60c24b@gandalf.local.home> References: <20160831160049.14303-1-bigeasy@linutronix.de> <20160831160049.14303-2-bigeasy@linutronix.de> <1472661463.14381.327.camel@edumazet-glaptop3.roam.corp.google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: Sebastian Andrzej Siewior , linux-rt-users@vger.kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, netdev@vger.kernel.org To: Eric Dumazet Return-path: Received: from smtprelay0241.hostedemail.com ([216.40.44.241]:48205 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S965120AbcHaRD6 (ORCPT ); Wed, 31 Aug 2016 13:03:58 -0400 In-Reply-To: <1472661463.14381.327.camel@edumazet-glaptop3.roam.corp.google.com> Sender: linux-rt-users-owner@vger.kernel.org List-ID: On Wed, 31 Aug 2016 09:37:43 -0700 Eric Dumazet wrote: > On Wed, 2016-08-31 at 18:00 +0200, Sebastian Andrzej Siewior wrote: > > It looks like the this_cpu_ptr() access in icmp_sk() is protected with > > local_bh_disable(). To avoid missing serialization in -RT I am adding > > here a local lock. No crash has been observed, this is just precaution. > > > > > Hmm... > > > Signed-off-by: Sebastian Andrzej Siewior > > --- > > net/ipv4/icmp.c | 8 ++++++++ > > 1 file changed, 8 insertions(+) > > > > diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c > > index c1f1d5030d37..63731fd6af3e 100644 > > --- a/net/ipv4/icmp.c > > +++ b/net/ipv4/icmp.c > > @@ -78,6 +78,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -205,6 +206,8 @@ static const struct icmp_control icmp_pointers[NR_ICMP_TYPES+1]; > > * > > * On SMP we have one ICMP socket per-cpu. > > */ > > +static DEFINE_LOCAL_IRQ_LOCK(icmp_sk_lock); > > + > > static struct sock *icmp_sk(struct net *net) > > { > > return *this_cpu_ptr(net->ipv4.icmp_sk); > > @@ -216,12 +219,14 @@ static inline struct sock *icmp_xmit_lock(struct net *net) > > > > local_bh_disable(); > > > > + local_lock(icmp_sk_lock); > > Deadlock alert ? > Please read the comment few lines after, explaining why we have to use > spin_trylock(). > Or maybe I should double check what is local_lock() in RT And I don't know exactly what the deadlock scenario of the comment below is. Is it racing with a softirq somehow? Note, in RT softirqs can schedule out, and are preemptable. But I don't know enough about this code to know if that is enough to not have a deadlock here. -- Steve > > > sk = icmp_sk(net); > > > > if (unlikely(!spin_trylock(&sk->sk_lock.slock))) { > > ... > > /* This can happen if the output path signals a > > * dst_link_failure() for an outgoing ICMP packet. > > */ > > > > + local_unlock(icmp_sk_lock); > > local_bh_enable(); > > return NULL; >