Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4227027ybl; Tue, 21 Jan 2020 15:35:19 -0800 (PST) X-Google-Smtp-Source: APXvYqxVL+TlcDQvh+TliihXiFrysmGpEYnOEm3dbwL4/zNIKY6pomHglXWQ+HZzrWpXvNY04hFW X-Received: by 2002:a9d:708f:: with SMTP id l15mr5688276otj.229.1579649719468; Tue, 21 Jan 2020 15:35:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579649719; cv=none; d=google.com; s=arc-20160816; b=qNYHFiBZvkHvQ4ozqdcG0QC26esKpo+u3FssXxLdKtXBDHbkg2fPB3+DMDc8NObcbh AxXV25uxUlnLKMTpA/i13Lhkh5lS7KYpRTFoyZs8ILJvwj7O/hXMyzkbSAmy3unxq3xk T35fFcULWE4TSQpEI4pDKHTx3KG3BMWs4tI9UiFutXVa0HXEU0LxUvU8NTEBXiMicrc9 P1aMSVMb6ync9x1XCf/BbXN8TQT1npzcRqt7jGX1lXwwSlptQMdM9IqG9peDahqXKwYB 2PL99U1iqp1KSOY95iZjKC9dlUiVNJMP8X810P7zeWWAvmg+ZXPp/s869RFFg0kyuzfS CFaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:message-id :in-reply-to:subject:cc:to:from:date; bh=DxMOzuIqGQZn5l9Zcx61n+MAMv1G78AAZwq8B7ASW9g=; b=VLXbOhu4aOkG1MLu/A26GjDyUHcw8FXkRCzT5FQm/gNUftGrvCuNfsVAqidkrhl/mz nooGCPS7HtUbspUTScGCAL/6yH3KhImcaijVIqpLI/wCmK1CcK22KKv3LdWVz5d54Vvb Jinmp3tF3eX2LWwEVNgGL0GNtMkzbm4nzJwDqDb4K+qfhyVF6aJA2pCbKOvWHaoCTFNJ ZS/VQ30Mej4n+DMvA0kASzD0SW50XH0vXT6Gfz3AXlTqL9jUeqFqKYvQgVL0PTP9Ocw6 eZrV3LPVN6ZRmvr2vTtIGUBgly/tKaDhP9c9hEq0gXg4fnyxoI9sgfDBd1UvtEaJBnze UODw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a19si20511242oic.77.2020.01.21.15.35.08; Tue, 21 Jan 2020 15:35:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728916AbgAUXeB (ORCPT + 99 others); Tue, 21 Jan 2020 18:34:01 -0500 Received: from kvm5.telegraphics.com.au ([98.124.60.144]:46418 "EHLO kvm5.telegraphics.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725933AbgAUXeA (ORCPT ); Tue, 21 Jan 2020 18:34:00 -0500 Received: from localhost (localhost.localdomain [127.0.0.1]) by kvm5.telegraphics.com.au (Postfix) with ESMTP id 9E474272D8; Tue, 21 Jan 2020 18:33:54 -0500 (EST) Date: Wed, 22 Jan 2020 10:33:53 +1100 (AEDT) From: Finn Thain To: Eric Dumazet cc: "David S. Miller" , Thomas Bogendoerfer , Chris Zankel , Laurent Vivier , Geert Uytterhoeven , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH net v2 01/12] net/sonic: Add mutual exclusion for accessing shared state In-Reply-To: <0113c00f-3f77-8324-95a8-31dd6f64fa6a@gmail.com> Message-ID: References: <0113c00f-3f77-8324-95a8-31dd6f64fa6a@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 21 Jan 2020, Eric Dumazet wrote: > On 1/21/20 1:22 PM, Finn Thain wrote: > > The netif_stop_queue() call in sonic_send_packet() races with the > > netif_wake_queue() call in sonic_interrupt(). This causes issues > > like "NETDEV WATCHDOG: eth0 (macsonic): transmit queue 0 timed out". > > Fix this by disabling interrupts when accessing tx_skb[] and next_tx. > > Update a comment to clarify the synchronization properties. > > > > Fixes: efcce839360f ("[PATCH] macsonic/jazzsonic network drivers update") > > Tested-by: Stan Johnson > > Signed-off-by: Finn Thain > > > @@ -284,9 +287,16 @@ static irqreturn_t sonic_interrupt(int irq, void *dev_id) > > struct net_device *dev = dev_id; > > struct sonic_local *lp = netdev_priv(dev); > > int status; > > + unsigned long flags; > > + > > + spin_lock_irqsave(&lp->lock, flags); > > > This is a hard irq handler, no need to block hard irqs. > > spin_lock() here is enough. > Well, yes, assuming we're dealing with SMP [1]. Probably just disabling pre-emption is all that will ever be needed. Anyway, the real problem solved by disabling irqs is that macsonic must avoid re-entrance of sonic_interrupt(). [2] [1] https://lore.kernel.org/netdev/alpine.LNX.2.21.1.2001211026190.8@nippy.intranet/T/#m0523c8b2a26a410ed56889d9230c37ba1160d40a [2] https://lore.kernel.org/netdev/alpine.LNX.2.21.1.2001211026190.8@nippy.intranet/T/#m1c8ca580d2b45e61a628d17839978d0bd5aaf061