Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp881415imw; Thu, 14 Jul 2022 12:39:58 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tSmfB5Ak5GYc5tO48FoDOiTtNlP4b/VKYkubPEEDxkj/eMg/D8reyM4WC0gHUMKKxIFxcT X-Received: by 2002:a17:902:b70d:b0:16a:39e6:13fc with SMTP id d13-20020a170902b70d00b0016a39e613fcmr9838546pls.125.1657827598643; Thu, 14 Jul 2022 12:39:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657827598; cv=none; d=google.com; s=arc-20160816; b=cbYDqvX8SZAdg8I2p9IBgS8zUaF26VfmhDbblP/AuM//A7ZFtg0kN8Blvq+404KT0X PmziiP+mBR4qkdL9SLMwcb+h7jMiLjiZQ5fn+SOUY8iFvwZD5Tcz30IoQ24qDevcJwgB j0qeGrkTpb3sYRsGMEBcsmq+HkAvVdGuTEvd2YUfGWcMpG8Wh7vpATZRc19aQgBSKAaP PmNAAV67J/0xKfQx9WD83TuXhT2Hh994yQferoK0BXNDckRaVnu00fMzpZesM/DJ8ZIb +ZOd4fNjNdQMYnU1Ebs08q+DK0rStWVKc6e7F7xBmpGRHz4EvTBOHkZ5OpdyOKhvmelC mXCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=nJ9W+ZeMVXi7yQxoqT69+whanOrCH1uQRHsRu9187h8=; b=eTlSuur4RsSXTGa9YuqPGGf0o/3KcYYa1EsbJ3jkXvYe8lF3AKlpiSrj7QCay8Hw/r OVDraieey4ShdKhykUcG/11TBrIRAF16OMZ48i7d3ajr8WXITVIPjhv6DMyw3u9qBmqG uJvZ4nu57t9/NVhIi812kl90Tl9Ix+WSfIKaPVdUNwVPYNrZJlad5X8v9Hflg6cGAplI uunPTOvt2q+YtXu4rOQ8RNBMBDLfolIHGtLSJrviWnwz6nBMFkkEsBdQts4U+H0vCN8i 7GX8TbuPX8Mtu2WSpWxJ8BVOHuqk4PFrKi7OocsrZ4Tlg2iXvI8v/EuuwR/Hn3VwIeNi 56jA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b="y/bVxvpV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q102-20020a17090a1b6f00b001ed2222d8c1si6043905pjq.38.2022.07.14.12.39.44; Thu, 14 Jul 2022 12:39:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b="y/bVxvpV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240594AbiGNThK (ORCPT + 99 others); Thu, 14 Jul 2022 15:37:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37268 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239389AbiGNThG (ORCPT ); Thu, 14 Jul 2022 15:37:06 -0400 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB64E5B062; Thu, 14 Jul 2022 12:37:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1657827425; x=1689363425; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=aMYINw/bQBgU2dOHC2a0xTGgk9HFADbiVbCZ7qS5ZKE=; b=y/bVxvpVUonJbVYhlSHYyyj1a2A/Px0iVpAmCIbyzuJ7uBeetBAZlMAk xzDkHHUFSOxAxxYwLPGt8IQf074KAYwRIW6S6r4KByWd1Ajp749c6Gn9z XQZhqhvJXOpWURpAW3phv4eT55UZGKfldYZ6tKGqnN0UxbinRkBx8A2Ja 28E0U3YCXJhzhjVbbzLcgnoFFP4Sbe1yBIEVj4zc6vXA/Qsnxg++UZpp9 qamMW3hXWkAeYBr/x000s+BtFhIIzJpSFwAuqg8pbNm3WgT6/rIrVl7p/ lcHs0VOJnABneglYfcItsZHVid+0VW3I/mwyO7+SAqtLJJe9tSqOsizWx g==; X-IronPort-AV: E=Sophos;i="5.92,272,1650956400"; d="scan'208";a="167895570" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa2.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 14 Jul 2022 12:37:05 -0700 Received: from chn-vm-ex01.mchp-main.com (10.10.85.143) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.17; Thu, 14 Jul 2022 12:37:00 -0700 Received: from soft-dev3-1.microsemi.net (10.10.115.15) by chn-vm-ex01.mchp-main.com (10.10.85.143) with Microsoft SMTP Server id 15.1.2375.17 via Frontend Transport; Thu, 14 Jul 2022 12:36:58 -0700 From: Horatiu Vultur To: , CC: , , , , , , Horatiu Vultur Subject: [PATCH net 3/5] net: lan966x: Fix usage of lan966x->mac_lock when entry is removed Date: Thu, 14 Jul 2022 21:40:38 +0200 Message-ID: <20220714194040.231651-4-horatiu.vultur@microchip.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20220714194040.231651-1-horatiu.vultur@microchip.com> References: <20220714194040.231651-1-horatiu.vultur@microchip.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Spam-Status: No, score=-5.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org To remove an entry to the MAC table, it is required first to setup the entry and then issue a command for the MAC to forget the entry. So if it happens for two threads to remove simultaneously an entry in MAC table then it would be a race condition. Fix this by using lan966x->mac_lock to protect the HW access. Fixes: e18aba8941b40 ("net: lan966x: add mactable support") Signed-off-by: Horatiu Vultur --- .../ethernet/microchip/lan966x/lan966x_mac.c | 24 +++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-) diff --git a/drivers/net/ethernet/microchip/lan966x/lan966x_mac.c b/drivers/net/ethernet/microchip/lan966x/lan966x_mac.c index 4f8fd5cde950..d0b8eba0a66d 100644 --- a/drivers/net/ethernet/microchip/lan966x/lan966x_mac.c +++ b/drivers/net/ethernet/microchip/lan966x/lan966x_mac.c @@ -119,11 +119,13 @@ int lan966x_mac_learn(struct lan966x *lan966x, int port, return __lan966x_mac_learn(lan966x, port, false, mac, vid, type); } -int lan966x_mac_forget(struct lan966x *lan966x, - const unsigned char mac[ETH_ALEN], - unsigned int vid, - enum macaccess_entry_type type) +static int lan966x_mac_forget_locked(struct lan966x *lan966x, + const unsigned char mac[ETH_ALEN], + unsigned int vid, + enum macaccess_entry_type type) { + lockdep_assert_held(&lan966x->mac_lock); + lan966x_mac_select(lan966x, mac, vid); /* Issue a forget command */ @@ -134,6 +136,20 @@ int lan966x_mac_forget(struct lan966x *lan966x, return lan966x_mac_wait_for_completion(lan966x); } +int lan966x_mac_forget(struct lan966x *lan966x, + const unsigned char mac[ETH_ALEN], + unsigned int vid, + enum macaccess_entry_type type) +{ + int ret; + + spin_lock(&lan966x->mac_lock); + ret = lan966x_mac_forget_locked(lan966x, mac, vid, type); + spin_unlock(&lan966x->mac_lock); + + return ret; +} + int lan966x_mac_cpu_learn(struct lan966x *lan966x, const char *addr, u16 vid) { return lan966x_mac_learn(lan966x, PGID_CPU, addr, vid, ENTRYTYPE_LOCKED); -- 2.33.0