Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1584703ybb; Thu, 26 Mar 2020 03:40:21 -0700 (PDT) X-Google-Smtp-Source: ADFU+vv2IUWqjB0iEY2TIt7J1MJWHblR++GaWg/aSfl7JNSafQVhhomfVeBYaPk9QYH7FKv6Hxju X-Received: by 2002:a05:6830:22d9:: with SMTP id q25mr5579705otc.164.1585219221045; Thu, 26 Mar 2020 03:40:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585219221; cv=none; d=google.com; s=arc-20160816; b=ZFroQug/B7TIsRbao5jjbws8RBfXFs+FMoKpEAeiW5Nd0JahM3HAj+d2G67Ea8g2B7 qqCRiNcQgt7R26EK6cht2kGk8f6EMa5KSACuUrcoH7n64D5gyleJeIZzxxSXI+rDnh0S 3KI9M4lKJMJwVhb6akEwbyThe9cPOBF/oSnzYTi/TdUmtmf9GAwg/dUNzcAkmrD7Tt4S Cay042g5oYDSxxbYUlISyPaVzU3NsVBtvZO5ASDHjZmZr8ivbj3wXydiPt6VN6a4y4te l3q6FuoMOhjt1gY+M/9O04MdxcFf3ojppg3Ja4eHPZmwmIU3/bZKKcbMka28gNmU5Fho iuIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=nTKd33DRB5PSh35gQttUrIJddnXRcmUr/8BgXQiEUrs=; b=ZET/CviHEwALNdWN9Qjp3CmdYj7uxochsAWKgpv5+iAhuLezSYCISJe9jUlxWO5/Gx 4fQHDatA019QEsRagf4w/MyKp1krNp/Vqfc+xZu6n1D9OV4QHIzNfUm65e0OdgUqv/pj o7Coehs2IDWCJtVCAFF/z5RiLl7xO8TDoip0KMoIbplwiRVZoWE7YxZ8jSrUy2J7apzG 9vQ8+Fr8DpP+xT1FpEWg5WAEJ8j4YBE1EdHFKwnyJWbo7fIh2T3f0KgL/cwfPbmR0xtf HbHmsGgtCSR37U/2rcAR//jdOqvEMXbaPamMa5i+BTQu6l6scGs73e82aW/a4WgFl7hf srWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si1013896otg.9.2020.03.26.03.40.08; Thu, 26 Mar 2020 03:40:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728036AbgCZKjq (ORCPT + 99 others); Thu, 26 Mar 2020 06:39:46 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:34648 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727948AbgCZKjn (ORCPT ); Thu, 26 Mar 2020 06:39:43 -0400 Received: from 61-220-137-37.hinet-ip.hinet.net ([61.220.137.37] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jHPvD-0003yo-Eu; Thu, 26 Mar 2020 10:39:36 +0000 From: Kai-Heng Feng To: jeffrey.t.kirsher@intel.com Cc: aaron.f.brown@intel.com, Kai-Heng Feng , "David S. Miller" , intel-wired-lan@lists.osuosl.org (moderated list:INTEL ETHERNET DRIVERS), netdev@vger.kernel.org (open list:NETWORKING DRIVERS), linux-kernel@vger.kernel.org (open list) Subject: [PATCH] igb: Use a sperate mutex insead of rtnl_lock() Date: Thu, 26 Mar 2020 18:39:26 +0800 Message-Id: <20200326103926.20888-1-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 9474933caf21 ("igb: close/suspend race in netif_device_detach") fixed race condition between close and power management ops by using rtnl_lock(). This fix is a preparation for next patch, to prevent a dead lock under rtnl_lock() when calling runtime resume routine. However, we can't use device_lock() in igb_close() because when module is getting removed, the lock is already held for igb_remove(), and igb_close() gets called during unregistering the netdev, hence causing a deadlock. So let's introduce a new mutex so we don't cause a deadlock with driver core or netdev core. Signed-off-by: Kai-Heng Feng --- drivers/net/ethernet/intel/igb/igb_main.c | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c index b46bff8fe056..dc7ed5dd216b 100644 --- a/drivers/net/ethernet/intel/igb/igb_main.c +++ b/drivers/net/ethernet/intel/igb/igb_main.c @@ -288,6 +288,8 @@ static const struct igb_reg_info igb_reg_info_tbl[] = { {} }; +static DEFINE_MUTEX(igb_mutex); + /* igb_regdump - register printout routine */ static void igb_regdump(struct e1000_hw *hw, struct igb_reg_info *reginfo) { @@ -4026,9 +4028,14 @@ static int __igb_close(struct net_device *netdev, bool suspending) int igb_close(struct net_device *netdev) { + int err = 0; + + mutex_lock(&igb_mutex); if (netif_device_present(netdev) || netdev->dismantle) - return __igb_close(netdev, false); - return 0; + err = __igb_close(netdev, false); + mutex_unlock(&igb_mutex); + + return err; } /** @@ -8760,7 +8767,7 @@ static int __igb_shutdown(struct pci_dev *pdev, bool *enable_wake, u32 wufc = runtime ? E1000_WUFC_LNKC : adapter->wol; bool wake; - rtnl_lock(); + mutex_lock(&igb_mutex); netif_device_detach(netdev); if (netif_running(netdev)) @@ -8769,7 +8776,7 @@ static int __igb_shutdown(struct pci_dev *pdev, bool *enable_wake, igb_ptp_suspend(adapter); igb_clear_interrupt_scheme(adapter); - rtnl_unlock(); + mutex_unlock(&igb_mutex); status = rd32(E1000_STATUS); if (status & E1000_STATUS_LU) @@ -8897,13 +8904,13 @@ static int __maybe_unused igb_resume(struct device *dev) wr32(E1000_WUS, ~0); - rtnl_lock(); + mutex_lock(&igb_mutex); if (!err && netif_running(netdev)) err = __igb_open(netdev, true); if (!err) netif_device_attach(netdev); - rtnl_unlock(); + mutex_unlock(&igb_mutex); return err; } -- 2.17.1