From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1C8CEC4332F for ; Tue, 18 Oct 2022 00:53:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230111AbiJRAxF (ORCPT ); Mon, 17 Oct 2022 20:53:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47342 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230090AbiJRAxF (ORCPT ); Mon, 17 Oct 2022 20:53:05 -0400 Received: from vps0.lunn.ch (vps0.lunn.ch [185.16.172.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3CC6B8993E for ; Mon, 17 Oct 2022 17:52:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lunn.ch; s=20171124; h=In-Reply-To:Content-Disposition:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:From:Sender:Reply-To:Subject: Date:Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Content-Disposition:In-Reply-To:References; bh=j/oG9w00Wc+cJ+XTdNzSI4emlTOOBkhMZ4zjBopJSwg=; b=UfXGiZi0eW6ifruue+h7pzDsYT mP5K1ednUiFUkOLYrCF7Yif00GhMIZcdSoPcjh5m1apwkv4CBwEiChWfm0+AuPoqMeoKrRNMNZp63 JFsdDy+NHj7p5cm2UeHOQCC0CqpxkKNau+c8oZnIzSLW+Zhe6i9z+Zm//k2uZEi9tSJI=; Received: from andrew by vps0.lunn.ch with local (Exim 4.94.2) (envelope-from ) id 1okaSK-002Gus-1j; Tue, 18 Oct 2022 02:27:40 +0200 Date: Tue, 18 Oct 2022 02:27:40 +0200 From: Andrew Lunn To: =?iso-8859-1?B?zfFpZ28=?= Huguet Cc: irusskikh@marvell.com, dbogdanov@marvell.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, netdev@vger.kernel.org, Li Liang Subject: Re: [PATCH net] atlantic: fix deadlock at aq_nic_stop Message-ID: References: <20221014103443.138574-1-ihuguet@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org > > Please try to identify what is being protected. If it is driver > > internal state, could it be replaced with a driver mutex, rather than > > RTNL? Or is it network stack as a whole state, which really does > > require RTNL? If so, how do other drivers deal with this problem? Is > > it specific to MACSEC? Does MACSEC have a design problem? > > I already considered this possibility but discarded it because, as I > say above, everything else is already legitimately protected by > rtnl_lock. Did you look at other drivers using MACSEC offload? Is this driver unique in having stuff run in a work queue which you need to cancel? In fact, it is not limited to MACSEC, it could be any work queue which holds RTNL and needs to be cancelled. Andrew