Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4403111imm; Tue, 11 Sep 2018 11:18:21 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbQ35BQfsmaUvtK2JFjIw9riQblTVgEuHCyZtm/x5PG4Bvfpp0V0vgMw/zPHKg1ZRal2V7a X-Received: by 2002:a62:455b:: with SMTP id s88-v6mr30548121pfa.203.1536689901385; Tue, 11 Sep 2018 11:18:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536689901; cv=none; d=google.com; s=arc-20160816; b=ybicddrrvW/PA496QmKM7Z2ozHm7MiggJZFqCRtu1KAW6U1h4pmQDHslVPJmqQjIfV 38CuAnWSCVmx9ZLYO1yTQcAL7DrqDcFxn+FcRATrfCNlX4rj6q6Zd0Y9O05SgVDBddaV YM7OZlFL+Fk35l7stM+u8nEQFFmeXVy0VnPLVdd8zJFZdERByDhZ8NJWIwKbUlF+D8Y8 EYoCqddxTh52mc6Bcxz/D0/v0rrebGtK7GA4sbKeJ3atTLKAmbesH5cCbl4fXBK7uFHT yoGjcENKW3OO8MW1MwwAekBfUdWo7pn7gCcUuBohh/xO2IYAlLUu/SETAQBm+AEqGtle KN3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id; bh=jlUCN79PxEEHsfOgvvOh2wTLSfdaLXK2TWSE9AAeNOw=; b=aM/mE+7wqRhUxoMkem3uISmQpWtqdVxQnvQPBW4YGIqz7umkCYUXkadctp9TZ86MoI z2A0PPsogOyBjXs2ZLmAGqgFcqreL/1QFZPUvzku6eyss5zjD0zk1LI3pOaO94PWvTwy Ozh04TPnVqFNteQhaLncd5HeRoBf5tHG0HnsI6Z/SrMpHPTZWI57k6lYreLs7YqcmJpL F6XJdxgymIzi2Vd42eoTveXSdqGUYnsnQQDuoaEJj2HY2Ix25hgPe/6C5uZ1O6ZCxcEH D+YI2EF8LMA2DK67YAqXktiTm2grFeZ+NyyTwPupErGR67jxlSPDV193YBfZ8e11dXm/ UowA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l7-v6si21627861pgm.677.2018.09.11.11.18.03; Tue, 11 Sep 2018 11:18:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728111AbeIKXRH (ORCPT + 99 others); Tue, 11 Sep 2018 19:17:07 -0400 Received: from imap1.codethink.co.uk ([176.9.8.82]:50474 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727332AbeIKXRG (ORCPT ); Tue, 11 Sep 2018 19:17:06 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1fznDA-0008HY-GA; Tue, 11 Sep 2018 19:16:28 +0100 Message-ID: <1536689787.3024.130.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 105/124] xen-netfront: wait xenbus state change when load module manually From: Ben Hutchings To: Boris Ostrovsky , Xiao Liang Cc: stable@vger.kernel.org, "David S. Miller" , Greg Kroah-Hartman , LKML , Juergen Gross Date: Tue, 11 Sep 2018 19:16:27 +0100 In-Reply-To: References: <20180804082702.434482435@linuxfoundation.org> <20180804082706.393252081@linuxfoundation.org> <1536279682.3024.95.camel@codethink.co.uk> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2018-09-07 at 13:27 -0400, Boris Ostrovsky wrote: > On 09/06/2018 08:21 PM, Ben Hutchings wrote: > > On Sat, 2018-08-04 at 11:01 +0200, Greg Kroah-Hartman wrote: > > > 4.4-stable review patch.  If anyone has any objections, please let me know. > > > > > > ------------------ > > > > > > From: Xiao Liang > > > > > > [ Upstream commit 822fb18a82abaf4ee7058793d95d340f5dab7bfc ] > > > > > > When loading module manually, after call xenbus_switch_state to initializes > > > the state of the netfront device, the driver state did not change so fast > > > that may lead no dev created in latest kernel. This patch adds wait to make > > > sure xenbus knows the driver is not in closed/unknown state. > > > > [...] > > > --- a/drivers/net/xen-netfront.c > > > +++ b/drivers/net/xen-netfront.c > > > @@ -86,6 +86,7 @@ struct netfront_cb { > > >  /* IRQ name is queue name with "-tx" or "-rx" appended */ > > >  #define IRQ_NAME_SIZE (QUEUE_NAME_SIZE + 3) > > >   > > > +static DECLARE_WAIT_QUEUE_HEAD(module_load_q); > > >  static DECLARE_WAIT_QUEUE_HEAD(module_unload_q); > > >   > > >  struct netfront_stats { > > > @@ -1335,6 +1336,11 @@ static struct net_device *xennet_create_ > > >   netif_carrier_off(netdev); > > >   > > >   xenbus_switch_state(dev, XenbusStateInitialising); > > > + wait_event(module_load_q, > > > +    xenbus_read_driver_state(dev->otherend) != > > > +    XenbusStateClosed && > > > +    xenbus_read_driver_state(dev->otherend) != > > > +    XenbusStateUnknown); > > >   return netdev; > > >   > > >   exit: > > > > This won't work; it will hang.  Something (maybe netback_changed()?) > > needs to wake up tasks on the module_load_q. > > > https://lkml.org/lkml/2018/9/7/691 Thanks. Ben. -- Ben Hutchings, Software Developer   Codethink Ltd https://www.codethink.co.uk/ Dale House, 35 Dale Street Manchester, M1 2HF, United Kingdom