linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [patch] net, bcmgenet: Fix locking of netpoll facing functions
@ 2025-08-26  8:24 Mike Galbraith
  2025-08-28 18:59 ` Florian Fainelli
  0 siblings, 1 reply; 3+ messages in thread
From: Mike Galbraith @ 2025-08-26  8:24 UTC (permalink / raw)
  To: lkml; +Cc: Doug Berger, Florian Fainelli, Breno Leitao

Lockdep reports ring->lock to not be irq safe during netpoll/netconsole
session, resulting in a potential deadlock scenario.

 Chain exists of:
   &host->lock --> target_list_lock --> &ring->lock
  Possible interrupt unsafe locking scenario:
        CPU0                    CPU1
        ----                    ----
   lock(&ring->lock);
                                local_irq_disable();
                                lock(&host->lock);
                                lock(target_list_lock);
   <Interrupt>
     lock(&host->lock);
  *** DEADLOCK ***

Prevent that via use of irqsave/restore spinlock variant when polling.

Signed-off-by: Mike Galbraith <efault@gmx.de>
---
 drivers/net/ethernet/broadcom/genet/bcmgenet.c |   10 ++++++----
 1 file changed, 6 insertions(+), 4 deletions(-)

--- a/drivers/net/ethernet/broadcom/genet/bcmgenet.c
+++ b/drivers/net/ethernet/broadcom/genet/bcmgenet.c
@@ -2022,14 +2022,15 @@ static int bcmgenet_tx_poll(struct napi_
 		container_of(napi, struct bcmgenet_tx_ring, napi);
 	unsigned int work_done = 0;
 	struct netdev_queue *txq;
+	unsigned long flags;
 
-	spin_lock(&ring->lock);
+	spin_lock_irqsave(&ring->lock, flags);
 	work_done = __bcmgenet_tx_reclaim(ring->priv->dev, ring);
 	if (ring->free_bds > (MAX_SKB_FRAGS + 1)) {
 		txq = netdev_get_tx_queue(ring->priv->dev, ring->index);
 		netif_tx_wake_queue(txq);
 	}
-	spin_unlock(&ring->lock);
+	spin_unlock_irqrestore(&ring->lock, flags);
 
 	if (work_done == 0) {
 		napi_complete(napi);
@@ -2128,6 +2129,7 @@ static netdev_tx_t bcmgenet_xmit(struct
 	struct bcmgenet_tx_ring *ring = NULL;
 	struct enet_cb *tx_cb_ptr;
 	struct netdev_queue *txq;
+	unsigned long flags;
 	int nr_frags, index;
 	dma_addr_t mapping;
 	unsigned int size;
@@ -2149,7 +2151,7 @@ static netdev_tx_t bcmgenet_xmit(struct
 
 	nr_frags = skb_shinfo(skb)->nr_frags;
 
-	spin_lock(&ring->lock);
+	spin_lock_irqsave(&ring->lock, flags);
 	if (ring->free_bds <= (nr_frags + 1)) {
 		if (!netif_tx_queue_stopped(txq))
 			netif_tx_stop_queue(txq);
@@ -2239,7 +2241,7 @@ static netdev_tx_t bcmgenet_xmit(struct
 		bcmgenet_tdma_ring_writel(priv, ring->index,
 					  ring->prod_index, TDMA_PROD_INDEX);
 out:
-	spin_unlock(&ring->lock);
+	spin_unlock_irqrestore(&ring->lock, flags);
 
 	return ret;
 


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [patch] net, bcmgenet: Fix locking of netpoll facing functions
  2025-08-26  8:24 [patch] net, bcmgenet: Fix locking of netpoll facing functions Mike Galbraith
@ 2025-08-28 18:59 ` Florian Fainelli
  2025-08-29  2:40   ` Mike Galbraith
  0 siblings, 1 reply; 3+ messages in thread
From: Florian Fainelli @ 2025-08-28 18:59 UTC (permalink / raw)
  To: Mike Galbraith, lkml; +Cc: Doug Berger, Breno Leitao

On 8/26/25 01:24, Mike Galbraith wrote:
> Lockdep reports ring->lock to not be irq safe during netpoll/netconsole
> session, resulting in a potential deadlock scenario.
> 
>   Chain exists of:
>     &host->lock --> target_list_lock --> &ring->lock
>    Possible interrupt unsafe locking scenario:
>          CPU0                    CPU1
>          ----                    ----
>     lock(&ring->lock);
>                                  local_irq_disable();
>                                  lock(&host->lock);
>                                  lock(target_list_lock);
>     <Interrupt>
>       lock(&host->lock);
>    *** DEADLOCK ***
> 
> Prevent that via use of irqsave/restore spinlock variant when polling.
> 
> Signed-off-by: Mike Galbraith <efault@gmx.de>

Your patch did not make it to the adequate mailing list which should be 
at least netdev@vger.kernel.org. This is effectively a partial revert of 
b0447ecb533270cf857ebee1133cb8ff67115423 ("net: bcmgenet: relax lock 
constraints to reduce IRQ latency") therefore I would want Doug to chime 
in and review this.

Thanks!

> ---
>   drivers/net/ethernet/broadcom/genet/bcmgenet.c |   10 ++++++----
>   1 file changed, 6 insertions(+), 4 deletions(-)
> 
> --- a/drivers/net/ethernet/broadcom/genet/bcmgenet.c
> +++ b/drivers/net/ethernet/broadcom/genet/bcmgenet.c
> @@ -2022,14 +2022,15 @@ static int bcmgenet_tx_poll(struct napi_
>   		container_of(napi, struct bcmgenet_tx_ring, napi);
>   	unsigned int work_done = 0;
>   	struct netdev_queue *txq;
> +	unsigned long flags;
>   
> -	spin_lock(&ring->lock);
> +	spin_lock_irqsave(&ring->lock, flags);
>   	work_done = __bcmgenet_tx_reclaim(ring->priv->dev, ring);
>   	if (ring->free_bds > (MAX_SKB_FRAGS + 1)) {
>   		txq = netdev_get_tx_queue(ring->priv->dev, ring->index);
>   		netif_tx_wake_queue(txq);
>   	}
> -	spin_unlock(&ring->lock);
> +	spin_unlock_irqrestore(&ring->lock, flags);
>   
>   	if (work_done == 0) {
>   		napi_complete(napi);
> @@ -2128,6 +2129,7 @@ static netdev_tx_t bcmgenet_xmit(struct
>   	struct bcmgenet_tx_ring *ring = NULL;
>   	struct enet_cb *tx_cb_ptr;
>   	struct netdev_queue *txq;
> +	unsigned long flags;
>   	int nr_frags, index;
>   	dma_addr_t mapping;
>   	unsigned int size;
> @@ -2149,7 +2151,7 @@ static netdev_tx_t bcmgenet_xmit(struct
>   
>   	nr_frags = skb_shinfo(skb)->nr_frags;
>   
> -	spin_lock(&ring->lock);
> +	spin_lock_irqsave(&ring->lock, flags);
>   	if (ring->free_bds <= (nr_frags + 1)) {
>   		if (!netif_tx_queue_stopped(txq))
>   			netif_tx_stop_queue(txq);
> @@ -2239,7 +2241,7 @@ static netdev_tx_t bcmgenet_xmit(struct
>   		bcmgenet_tdma_ring_writel(priv, ring->index,
>   					  ring->prod_index, TDMA_PROD_INDEX);
>   out:
> -	spin_unlock(&ring->lock);
> +	spin_unlock_irqrestore(&ring->lock, flags);
>   
>   	return ret;
>   
> 


-- 
Florian

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [patch] net, bcmgenet: Fix locking of netpoll facing functions
  2025-08-28 18:59 ` Florian Fainelli
@ 2025-08-29  2:40   ` Mike Galbraith
  0 siblings, 0 replies; 3+ messages in thread
From: Mike Galbraith @ 2025-08-29  2:40 UTC (permalink / raw)
  To: Florian Fainelli, lkml; +Cc: Doug Berger, Breno Leitao

On Thu, 2025-08-28 at 11:59 -0700, Florian Fainelli wrote:
> On 8/26/25 01:24, Mike Galbraith wrote:
> > Lockdep reports ring->lock to not be irq safe during netpoll/netconsole
> > session, resulting in a potential deadlock scenario.
> > 
> >   Chain exists of:
> >     &host->lock --> target_list_lock --> &ring->lock
> >    Possible interrupt unsafe locking scenario:
> >          CPU0                    CPU1
> >          ----                    ----
> >     lock(&ring->lock);
> >                                  local_irq_disable();
> >                                  lock(&host->lock);
> >                                  lock(target_list_lock);
> >     <Interrupt>
> >       lock(&host->lock);
> >    *** DEADLOCK ***
> > 
> > Prevent that via use of irqsave/restore spinlock variant when polling.
> > 
> > Signed-off-by: Mike Galbraith <efault@gmx.de>
> 
> Your patch did not make it to the adequate mailing list which should be 
> at least netdev@vger.kernel.org. This is effectively a partial revert of 
> b0447ecb533270cf857ebee1133cb8ff67115423 ("net: bcmgenet: relax lock 
> constraints to reduce IRQ latency") therefore I would want Doug to chime 
> in and review this.

Ah, just drop it, he'll likely do something way better.

	-Mike

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2025-08-29  2:40 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-08-26  8:24 [patch] net, bcmgenet: Fix locking of netpoll facing functions Mike Galbraith
2025-08-28 18:59 ` Florian Fainelli
2025-08-29  2:40   ` Mike Galbraith

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).