Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932928AbcLIAVj (ORCPT ); Thu, 8 Dec 2016 19:21:39 -0500 Received: from mail-dm3nam03on0131.outbound.protection.outlook.com ([104.47.41.131]:22728 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752760AbcLIAVi (ORCPT ); Thu, 8 Dec 2016 19:21:38 -0500 X-Greylist: delayed 941 seconds by postgrey-1.27 at vger.kernel.org; Thu, 08 Dec 2016 19:21:38 EST From: KY Srinivasan To: Greg KH CC: "linux-kernel@vger.kernel.org" , "devel@linuxdriverproject.org" , "olaf@aepfle.de" , "apw@canonical.com" , "vkuznets@redhat.com" , "jasowang@redhat.com" , "leann.ogasawara@canonical.com" , "bjorn.helgaas@gmail.com" , Haiyang Zhang Subject: RE: [PATCH 3/3] hv_netvsc: Implement VF matching based on serial numbers Thread-Topic: [PATCH 3/3] hv_netvsc: Implement VF matching based on serial numbers Thread-Index: AQHSUR217WryFwQHM0aSgrk15jlaWqD+NO0AgABUCDA= Date: Fri, 9 Dec 2016 00:05:53 +0000 Message-ID: References: <1481185988-30383-1-git-send-email-kys@exchange.microsoft.com> <1481186023-30429-1-git-send-email-kys@exchange.microsoft.com> <1481186023-30429-3-git-send-email-kys@exchange.microsoft.com> <20161208155604.GA4601@kroah.com> In-Reply-To: <20161208155604.GA4601@kroah.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=kys@microsoft.com; x-originating-ip: [2001:4898:80e8:4::4c6] x-microsoft-exchange-diagnostics: 1;BLUPR03MB1411;7:EmrX06pJonWue2v1sMhzJ8peE9zwRCNGAyst8wMaih2HonoJm2bOk5mrP1DptNcM9XHrtfDZPHKTfdQ4igmITpQxN4pKtAQlg8Uvua5bqSZuXdq8PuNf4wHa12+R+u1QO0lKYzfC5hU5fk3s1I1kI2pebP9HT6D6hAb9qJb7sh5NVYyLeUbpkRYoFKBBCJTGY1rD//0NesPL+0HhGD8yVJ+oV0vw59LWKq8/tSv/WiWvGoNyghbGMZGdnYwLG/WWSKKbokusglM05VGXSJcAVKjvf+FewUH95x8Kfp7cS/LO282bw0uHQ9MeeEKCgL+zYtfZKQmuTlRyWsv95anJU0HpzP7A+ac2wj53EW1vIjAk96vorMfic93/sGu2rs1q x-ms-office365-filtering-correlation-id: 56c59f94-e74e-4e3a-77c4-08d41fc724b8 x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BLUPR03MB1411; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(9452136761055)(140211028294663)(198206253151910); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(61425038)(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026)(61426038)(61427038)(6041248)(20161123555025)(20161123564025)(20161123560025)(20161123562025)(6072148)(6047074);SRVR:BLUPR03MB1411;BCL:0;PCL:0;RULEID:;SRVR:BLUPR03MB1411; x-forefront-prvs: 015114592F x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(7916002)(39410400002)(39840400002)(39860400002)(39450400003)(39850400002)(40224003)(199003)(377454003)(13464003)(189002)(24454002)(106116001)(7736002)(8676002)(7696004)(50986999)(8936002)(54356999)(81156014)(76176999)(81166006)(5005710100001)(105586002)(106356001)(38730400001)(10090500001)(102836003)(8990500004)(77096006)(5660300001)(74316002)(10290500002)(101416001)(6116002)(110136003)(93886004)(33656002)(229853002)(6506006)(99286002)(305945005)(39060400001)(86612001)(4326007)(122556002)(189998001)(107886002)(97736004)(3280700002)(2906002)(3660700001)(4001430100002)(86362001)(68736007)(92566002)(2950100002)(6916009)(76576001)(9686002)(6436002)(2900100001);DIR:OUT;SFP:1102;SCL:1;SRVR:BLUPR03MB1411;H:DM5PR03MB2490.namprd03.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Dec 2016 00:05:53.9683 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR03MB1411 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id uB90Lnjl000891 Content-Length: 4143 Lines: 113 > -----Original Message----- > From: Greg KH [mailto:gregkh@linuxfoundation.org] > Sent: Thursday, December 8, 2016 7:56 AM > To: KY Srinivasan > Cc: linux-kernel@vger.kernel.org; devel@linuxdriverproject.org; > olaf@aepfle.de; apw@canonical.com; vkuznets@redhat.com; > jasowang@redhat.com; leann.ogasawara@canonical.com; > bjorn.helgaas@gmail.com; Haiyang Zhang > Subject: Re: [PATCH 3/3] hv_netvsc: Implement VF matching based on serial > numbers > > On Thu, Dec 08, 2016 at 12:33:43AM -0800, kys@exchange.microsoft.com > wrote: > > From: Haiyang Zhang > > > > We currently use MAC address to match VF and synthetic NICs. Hyper-V > > provides a serial number to both devices for this purpose. This patch > > implements the matching based on VF serial numbers. This is the way > > specified by the protocol and more reliable. > > > > Signed-off-by: Haiyang Zhang > > Signed-off-by: K. Y. Srinivasan > > --- > > drivers/net/hyperv/netvsc_drv.c | 55 > ++++++++++++++++++++++++++++++++++++--- > > 1 files changed, 51 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/net/hyperv/netvsc_drv.c > b/drivers/net/hyperv/netvsc_drv.c > > index 9522763..c5778cf 100644 > > --- a/drivers/net/hyperv/netvsc_drv.c > > +++ b/drivers/net/hyperv/netvsc_drv.c > > @@ -1165,9 +1165,10 @@ static void netvsc_free_netdev(struct > net_device *netdev) > > free_netdev(netdev); > > } > > > > -static struct net_device *get_netvsc_bymac(const u8 *mac) > > +static struct net_device *get_netvsc_byvfser(u32 vfser) > > { > > struct net_device *dev; > > + struct net_device_context *ndev_ctx; > > > > ASSERT_RTNL(); > > > > @@ -1175,7 +1176,8 @@ static void netvsc_free_netdev(struct net_device > *netdev) > > if (dev->netdev_ops != &device_ops) > > continue; /* not a netvsc device */ > > > > - if (ether_addr_equal(mac, dev->perm_addr)) > > + ndev_ctx = netdev_priv(dev); > > + if (ndev_ctx->vf_serial == vfser) > > return dev; > > } > > > > @@ -1205,21 +1207,66 @@ static void netvsc_free_netdev(struct > net_device *netdev) > > return NULL; > > } > > > > +static u32 netvsc_get_vfser(struct net_device *vf_netdev) > > +{ > > + struct device *dev; > > + struct hv_device *hdev; > > + struct hv_pcibus_device *hbus = NULL; > > + struct list_head *iter; > > + struct hv_pci_dev *hpdev; > > + unsigned long flags; > > + u32 vfser = 0; > > + u32 count = 0; > > + > > + for (dev = &vf_netdev->dev; dev; dev = dev->parent) { > > You are going to walk the whole device tree backwards? That's crazy. > And foolish. And racy and broken (what happens if the tree changes > while you do this?) Where is the lock being grabbed while this happens? > What about reference counts? Do you see other drivers ever doing this > (if you do, point them out and I'll go yell at them too...) Greg, We are registering for netdev events. Coming into this function, the caller guarantees that the list of netdevs does not change - we assert this on entry: ASSERT_RTNL(). We are only walking up the device tree for the netdevs whose state change is being notified to us - the device tree being walked here is limited to netdevs under question. We have a reference to the device and we know the device is not going away. Is it not safe to dereference the parent pointer - after all the child has taken a reference on the parent as part of device_add() call. > > > + if (!dev_is_vmbus(dev)) > > + continue; > > Ick. > > Why isn't your parent pointer a vmbus device all the time? How could > you get burried down in the device hierarchy when you are the driver for > a specific bus type in the first place? How could this function ever be > called for a device that is NOT of this type? We get notified when state changes on any of the netdev devices in the system. Not all netdevs in the system belong to vmbus. Consider for instance the emulated NIC that can be configured. This is an emulated PCI NIC. We are only interested in netdevs that correspond to the VF instance that we are interested in. Regards, K. Y