Received: by 2002:a05:7412:98c1:b0:fa:551:50a7 with SMTP id kc1csp73280rdb; Fri, 5 Jan 2024 03:15:37 -0800 (PST) X-Google-Smtp-Source: AGHT+IE7jtcAswqvZGiEmORKgQYHkwBTiJV3kcL5VC60IF2TMr6VmhRLuCs34SNCLRDXy1K+nz3r X-Received: by 2002:a05:6a00:3914:b0:6da:cbee:9d9c with SMTP id fh20-20020a056a00391400b006dacbee9d9cmr1580966pfb.29.1704453337028; Fri, 05 Jan 2024 03:15:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704453337; cv=none; d=google.com; s=arc-20160816; b=igbEyOyz0CdpEoHCGJawxyr9h4gbm8rkzCuBTU7hY1METmiMx54BKR2ljfPARhmBH8 SgAfxkaQxiuqghvyl/ElPv4PszsqBLueExhHeJ19SOdSOGsPPcyWURFlNQ8ie34ejZfj KNxp8rpOk4Y7ZLYJDWSG1iwtI1RYiMVd9QRNV6GfHuaNQG0tLpMZoQC/9KsGduHbuYxl src589oqt80/7aSWGXzZMCol7IE3/S/Rt8o8u9qwtRl+TUdvYhiQxzPjBpqvxhNumXhI nFdFiSXVwQK1K6vIWamXw286Aj/3A0Flat74j3ibb/VZo8jIPlV4RT9ERyt2e4T30Iwa gotw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=wt3et3Lg1JMzMlwW3L7wOJFlJ1OdN7N33ADTbx7p4mQ=; fh=0aykj9hE2iJAiNCXm2nwUtxbCzegeGamKfQ2tbEjjL0=; b=z+6o1WGYwj3XUHQAEbMna3mwjvDyswHAtWtkdUpV4y66yo0H+sd95R9GQxfuMTT4TV 4sN6DpCcpLzx9d96mSMNQ9ELsWanjIPYXjwH5YU5d99WkaQf7kQoItgtK6YaPdJKrsfa OLOwGbSNDgcTsuX7edtSoeXWr2ZwJTx7oc690ByhHURtHoErKbFrnEqBxD8qLlJ+06ga 5TUHuKbkvvldiNfLhsODgbyo+cLcJVZyjae9C6xZwkugQ4ID5fcYM5T1emutAnbjzSwD F2gIhwaR+UTxYkwSws04jGqGyyzr8HTzEpF7G5HarwAB5nD+Vh7Ya6Vfpy2WeJfFSu79 N5Hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tesarici.cz header.s=mail header.b=1VfFDQEa; spf=pass (google.com: domain of linux-kernel+bounces-17783-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-17783-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=tesarici.cz Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id w186-20020a6362c3000000b005cdfa675225si1118109pgb.833.2024.01.05.03.15.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 05 Jan 2024 03:15:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-17783-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@tesarici.cz header.s=mail header.b=1VfFDQEa; spf=pass (google.com: domain of linux-kernel+bounces-17783-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-17783-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=tesarici.cz Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id D42A9B23912 for ; Fri, 5 Jan 2024 11:15:07 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 93E172C684; Fri, 5 Jan 2024 11:14:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=tesarici.cz header.i=@tesarici.cz header.b="1VfFDQEa" X-Original-To: linux-kernel@vger.kernel.org Received: from bee.tesarici.cz (bee.tesarici.cz [77.93.223.253]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5210828DDD; Fri, 5 Jan 2024 11:14:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=tesarici.cz Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=tesarici.cz Received: from meshulam.tesarici.cz (dynamic-2a00-1028-83b8-1e7a-4427-cc85-6706-c595.ipv6.o2.cz [IPv6:2a00:1028:83b8:1e7a:4427:cc85:6706:c595]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by bee.tesarici.cz (Postfix) with ESMTPSA id 2FCD31A832B; Fri, 5 Jan 2024 12:14:48 +0100 (CET) Authentication-Results: mail.tesarici.cz; dmarc=fail (p=none dis=none) header.from=tesarici.cz DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=tesarici.cz; s=mail; t=1704453288; bh=VYNlhjSgg7jLCMMITrN8jeGgl0bBjNZ/pe4B+q8QKeE=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=1VfFDQEadUP+XmGIWATJBwq5CBSGsDI0Qs175mZmz6QFcSuNnGXs/ezrOjxbV5tFL gVkmv6JF4QNR1xX84ydALHJ8rGjBjKZh+Mhj8KOHkH/dAeEMCD0O8Mzfyu82Z0CDvE y/OOHbSbr7MzKGdjZNe8/7dMrzcA1sPqey7H1LH9MD4LeWlvuk93Fw3VgQu7m07/9d O+y1vjz3dvc98K0GPU7o9Pvv6LUMdAaWZ+ayb5JvScSowrOASEKArfwMBXRLdm9Ynm UVC1SPCpcnWN/hUPQI5PbZdJiegK7gkv+/38qwPiqPxSwG6vqgUSdUsIl7WbqMdbED 8S9ghcZ1KmqSg== Date: Fri, 5 Jan 2024 12:14:47 +0100 From: Petr =?UTF-8?B?VGVzYcWZw61r?= To: Eric Dumazet Cc: Alexandre Torgue , Jose Abreu , "David S. Miller" , Jakub Kicinski , Paolo Abeni , Maxime Coquelin , Chen-Yu Tsai , Jernej Skrabec , Samuel Holland , "open list:STMMAC ETHERNET DRIVER" , "moderated list:ARM/STM32 ARCHITECTURE" , "moderated list:ARM/STM32 ARCHITECTURE" , open list , "open list:ARM/Allwinner sunXi SoC support" Subject: Re: [PATCH] net: stmmac: protect statistics updates with a spinlock Message-ID: <20240105121447.11ae80d1@meshulam.tesarici.cz> In-Reply-To: References: <20240105091556.15516-1-petr@tesarici.cz> <20240105113402.0f5f1232@meshulam.tesarici.cz> X-Mailer: Claws Mail 4.2.0 (GTK 3.24.39; x86_64-suse-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Fri, 5 Jan 2024 11:48:19 +0100 Eric Dumazet wrote: > On Fri, Jan 5, 2024 at 11:34=E2=80=AFAM Petr Tesa=C5=99=C3=ADk wrote: > > > > On Fri, 5 Jan 2024 10:58:42 +0100 > > Eric Dumazet wrote: > > =20 > > > On Fri, Jan 5, 2024 at 10:16=E2=80=AFAM Petr Tesarik wrote: =20 > > > > > > > > Add a spinlock to fix race conditions while updating Tx/Rx statisti= cs. > > > > > > > > As explained by a comment in , write side o= f struct > > > > u64_stats_sync must ensure mutual exclusion, or one seqcount update= could > > > > be lost on 32-bit platforms, thus blocking readers forever. > > > > > > > > Such lockups have been actually observed on 32-bit Arm after stmmac= _xmit() > > > > on one core raced with stmmac_napi_poll_tx() on another core. > > > > > > > > Signed-off-by: Petr Tesarik =20 > > > > > > This is going to add more costs to 64bit platforms ? =20 > > > > Yes, it adds a (hopefully not too contended) spinlock and in most > > places an interrupt disable/enable pair. > > > > FWIW the race condition is also present on 64-bit platforms, resulting > > in inaccurate statistic counters. I can understand if you consider it a > > mild annoyance, not worth fixing. > > =20 > > > It seems to me that the same syncp can be used from two different > > > threads : hard irq and napi poller... =20 > > > > Yes, that's exactly the scenario that locks up my system. > > =20 > > > At this point, I do not see why you keep linux/u64_stats_sync.h if you > > > decide to go for a spinlock... =20 > > > > The spinlock does not havce to be taken on the reader side, so the > > seqcounter still adds some value. > > =20 > > > Alternative would use atomic64_t fields for the ones where there is no > > > mutual exclusion. > > > > > > RX : napi poll is definitely safe (protected by an atomic bit) > > > TX : each TX queue is also safe (protected by an atomic exclusion for > > > non LLTX drivers) > > > > > > This leaves the fields updated from hardware interrupt context ? =20 > > > > I'm afraid I don't have enough network-stack-foo to follow here. > > > > My issue on 32 bit is that stmmac_xmit() may be called directly from > > process context while another core runs the TX napi on the same channel > > (in interrupt context). I didn't observe any race on the RX path, but I > > believe it's possible with NAPI busy polling. > > > > In any case, I don't see the connection with LLTX. Maybe you want to > > say that the TX queue is safe for stmmac (because it is a non-LLTX > > driver), but might not be safe for LLTX drivers? =20 >=20 > LLTX drivers (mostly virtual drivers like tunnels...) can have multiple c= pus > running ndo_start_xmit() concurrently. So any use of a 'shared syncp' > would be a bug. > These drivers usually use per-cpu stats, to avoid races and false > sharing anyway. >=20 > I think you should split the structures into two separate groups, each > guarded with its own syncp. >=20 > No extra spinlocks, no extra costs on 64bit arches... >=20 > If TX completion can run in parallel with ndo_start_xmit(), then > clearly we have to split stmmac_txq_stats in two halves: Oh, now I get it. Yes, that's much better, indeed. I mean, the counters have never been consistent (due to the race on the writer side), and nobody is concerned. So, there is no value in taking a consistent snapshot in stmmac_get_ethtool_stats(). I'm going to rework and retest my patch. Thank you for pointing me in the right direction! Petr T > Also please note the conversion from u64 to u64_stats_t Noted. IIUC this will in turn close the update race on 64-bit by using an atomic type and on 32-bit by using a seqlock. Clever. Petr T > Very partial patch, only to show the split and new structure : >=20 > diff --git a/drivers/net/ethernet/stmicro/stmmac/common.h > b/drivers/net/ethernet/stmicro/stmmac/common.h > index e3f650e88f82f927f0dcf95748fbd10c14c30cbe..702bceea5dc8c875a80f5e3a9= 2b7bb058f373eda > 100644 > --- a/drivers/net/ethernet/stmicro/stmmac/common.h > +++ b/drivers/net/ethernet/stmicro/stmmac/common.h > @@ -60,16 +60,22 @@ > /* #define FRAME_FILTER_DEBUG */ >=20 > struct stmmac_txq_stats { > - u64 tx_bytes; > - u64 tx_packets; > - u64 tx_pkt_n; > - u64 tx_normal_irq_n; > - u64 napi_poll; > - u64 tx_clean; > - u64 tx_set_ic_bit; > - u64 tx_tso_frames; > - u64 tx_tso_nfrags; > - struct u64_stats_sync syncp; > +/* First part, updated from ndo_start_xmit(), protected by tx queue lock= */ > + struct u64_stats_sync syncp_tx; > + u64_stats_t tx_bytes; > + u64_stats_t tx_packets; > + u64_stats_t tx_pkt_n; > + u64_stats_t tx_tso_frames; > + u64_stats_t tx_tso_nfrags; > + > +/* Second part, updated from TX completion (protected by NAPI poll logic= ) */ > + struct u64_stats_sync syncp_tx_completion; > + u64_stats_t napi_poll; > + u64_stats_t tx_clean; > + u64_stats_t tx_set_ic_bit; > + > +/* Following feld is updated from hard irq context... */ > + atomic64_t tx_normal_irq_n; > } ____cacheline_aligned_in_smp; >=20 > struct stmmac_rxq_stats {