Received: by 2002:ab2:7b86:0:b0:1f7:5705:b850 with SMTP id q6csp6677lqh; Fri, 3 May 2024 11:32:26 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUqUxgEBTF/dl8HCRzglvtO1uwwwR2eS4rX0EriIhhCGvYSw0Mu5Bw9qgtpS6rBfylPJP4zmNbEGQOnvCLJwLZqWh6n9TykBcRyqp12zQ== X-Google-Smtp-Source: AGHT+IG0fLy+4NdFIgm2nvRQ3zShm44ulykVbOAPcrwoC9XGPKVyXoPe+5BthPMkOcr5OT9qk7kj X-Received: by 2002:a05:6102:5f47:b0:47e:a214:5317 with SMTP id il7-20020a0561025f4700b0047ea2145317mr3997182vsb.19.1714761145699; Fri, 03 May 2024 11:32:25 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714761145; cv=pass; d=google.com; s=arc-20160816; b=astQ3+phprsGSeFkD/qV2XMUhg9RPolB/CwePyu1BdoNWp+A8+243pWzrJOf6/eCyj 6/GqvG4LDmisUPK5MUXzn3RYAMVV/RZM83uUW7cQeI59J+PZoYubS8ucBqHNrxkWLHeK k2/ZbSGG6UFt2aIw4x/u9dI8xvYAgVyF4trSE6kf50tV7Mhpqe254cvKc633q4x9KUAL Yv+3p2C5gTOi8P6Rlw93m+3rbG0ps9fasJhqmCsjvFpFfpLghh1e1Sx/tdFcpKiPVLWi MxDxTXB64qMDjopRWkkbkT+7oJNGFTBqtMztiDUr0fPEcQYwOTayvR0zyHlcbUl1YPXR 2Pbw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:dkim-signature:dkim-signature:from; bh=bsXcW5uZG6cWaMVlyAXK8eicxATBh3uvSrRgqWotKdM=; fh=mRMHo6FEBd+e0N/0wwmt9BaEcwCnNTE8npQn9DDRWX4=; b=o6gIxXZNZpLcIfOTyhrhdSKZAtwlRdS0mvHMs3AAztMEqn2F/l/vL4O4RYF1yEfoQd TtVUO6m5PtaXabJ8bUs93w2Ar80pM7dtvZhKMuRTqwcNULqX+TsQ7suIztAEtzKv3/fS Yyq9sklsXx3Ej3vr8KPCPtv3ybKCP9Szpdf8bJeqIp2UPtYOg9DB4q4rNrPTaJAvmLJq Gg4QURR+IgXLKS5xbw4cKJ7f1+gQqxPzsSp/6NCL9PZKQBQBs0dbww3fktV4g/EOgKfp k07y/+523BNqYj13ub5AxR73NDZshCupp6RahmZYEptQJV8a+ssaA1GKRb2vpeaCwkHe N8kA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=b44alsuR; dkim=neutral (no key) header.i=@linutronix.de; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-168061-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168061-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id dd6-20020a056102568600b00476dad2d6c9si847292vsb.572.2024.05.03.11.32.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 11:32:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-168061-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=b44alsuR; dkim=neutral (no key) header.i=@linutronix.de; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-168061-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-168061-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 670AF1C211D1 for ; Fri, 3 May 2024 18:32:25 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 89EEF15A4A6; Fri, 3 May 2024 18:30:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="b44alsuR"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="YeNEJOBT" Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4B138158D9F; Fri, 3 May 2024 18:30:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.142.43.55 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714761013; cv=none; b=aNyzyNVA6ox3iW+J1UubStnm/VQjX2dyZxvv5WQNl+7H//kqTwP0mx5PR7qfHef1b8DWEOrhmUb+RVrsb4mQ+WH72qkF/pr8l0eEPFV6UtGWM3MrIjZLqMMBIxtITROVoFF2KTraNhO+xGsB21if2tiwJL1rsr8tsYbT1+hgNe8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714761013; c=relaxed/simple; bh=owGjXj1gRcQHvfXuD018vQxaCTN0J8efK7YMuWyF8As=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=t4jySER6s4bXxOkHn9mfm4cGEdeNQAGwMlR/zch3slWJzSPTf9ij2pTHUYTLCNWKrI3VtMIEqnUfAveBrhyT5fhRXyN3PxdQ0O7QSV+TOhoh+tv9e7bRg6g0baQPjUvxn7cKAbLujsSDZ9MUihLlrq6AJ0of9/BRB4sS6FQaYQg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de; spf=pass smtp.mailfrom=linutronix.de; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=b44alsuR; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=YeNEJOBT; arc=none smtp.client-ip=193.142.43.55 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linutronix.de From: Sebastian Andrzej Siewior DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1714761009; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=bsXcW5uZG6cWaMVlyAXK8eicxATBh3uvSrRgqWotKdM=; b=b44alsuR2QcrVlf59gZX0/PyvBQ3IOqwVn1z1csODKySqTQ0CI5M251JLg46rxDWQyJTC0 k0fAKLRn+wdULW7GKRDTEWPs8Dp3ms99AZXnkK9nTrrw9w1ZjOl8b8aHFj9JK3jfAHHTcC dKePv+zpQ23u8ntg/qV+kibZr6QYgBQZeEadjTOManbb4/1Lk5HBTR2+40P3aumaJYoqxW pEAvQWxS4yHQujjzCB8bfgPEhfr180KvF2EyV9BiMZiJkWTo6X0A5HhywlCadh85k+o4DS QQpa0A9owaUc6Ce/di1SpwDdGng9EfjFxBi5UlvlIzs2c9VGIa7wpYuHKr4G/w== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1714761009; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=bsXcW5uZG6cWaMVlyAXK8eicxATBh3uvSrRgqWotKdM=; b=YeNEJOBTMY+L6UBwB4PdTxNfxklNmtz+hgddyru9gz8MnCWeQkdHeZY3YfDE99OCC2sn+k ZCWDz75clMOBIoBg== To: linux-kernel@vger.kernel.org, netdev@vger.kernel.org Cc: "David S. Miller" , Boqun Feng , Daniel Borkmann , Eric Dumazet , Frederic Weisbecker , Ingo Molnar , Jakub Kicinski , Paolo Abeni , Peter Zijlstra , Thomas Gleixner , Waiman Long , Will Deacon , Sebastian Andrzej Siewior Subject: [PATCH net-next 10/15] dev: Use nested-BH locking for softnet_data.process_queue. Date: Fri, 3 May 2024 20:25:14 +0200 Message-ID: <20240503182957.1042122-11-bigeasy@linutronix.de> In-Reply-To: <20240503182957.1042122-1-bigeasy@linutronix.de> References: <20240503182957.1042122-1-bigeasy@linutronix.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable softnet_data::process_queue is a per-CPU variable and relies on disabled BH for its locking. Without per-CPU locking in local_bh_disable() on PREEMPT_RT this data structure requires explicit locking. softnet_data::input_queue_head can be updated lockless. This is fine because this value is only update CPU local by the local backlog_napi thread. Add a local_lock_t to softnet_data and use local_lock_nested_bh() for locki= ng of process_queue. This change adds only lockdep coverage and does not alter the functional behaviour for !PREEMPT_RT. Signed-off-by: Sebastian Andrzej Siewior --- include/linux/netdevice.h | 1 + net/core/dev.c | 12 +++++++++++- 2 files changed, 12 insertions(+), 1 deletion(-) diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index c551ec235f9af..9d19e6ace7cb7 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -3199,6 +3199,7 @@ static inline bool dev_has_header(const struct net_de= vice *dev) struct softnet_data { struct list_head poll_list; struct sk_buff_head process_queue; + local_lock_t process_queue_bh_lock; =20 /* stats */ unsigned int processed; diff --git a/net/core/dev.c b/net/core/dev.c index cf7b452ce0d74..1503883ce15a4 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -450,7 +450,9 @@ static RAW_NOTIFIER_HEAD(netdev_chain); * queue in the local softnet handler. */ =20 -DEFINE_PER_CPU_ALIGNED(struct softnet_data, softnet_data); +DEFINE_PER_CPU_ALIGNED(struct softnet_data, softnet_data) =3D { + .process_queue_bh_lock =3D INIT_LOCAL_LOCK(process_queue_bh_lock), +}; EXPORT_PER_CPU_SYMBOL(softnet_data); =20 /* Page_pool has a lockless array/stack to alloc/recycle pages. @@ -5935,6 +5937,7 @@ static void flush_backlog(struct work_struct *work) } backlog_unlock_irq_enable(sd); =20 + local_lock_nested_bh(&softnet_data.process_queue_bh_lock); skb_queue_walk_safe(&sd->process_queue, skb, tmp) { if (skb->dev->reg_state =3D=3D NETREG_UNREGISTERING) { __skb_unlink(skb, &sd->process_queue); @@ -5942,6 +5945,7 @@ static void flush_backlog(struct work_struct *work) rps_input_queue_head_incr(sd); } } + local_unlock_nested_bh(&softnet_data.process_queue_bh_lock); local_bh_enable(); } =20 @@ -6063,7 +6067,9 @@ static int process_backlog(struct napi_struct *napi, = int quota) while (again) { struct sk_buff *skb; =20 + local_lock_nested_bh(&softnet_data.process_queue_bh_lock); while ((skb =3D __skb_dequeue(&sd->process_queue))) { + local_unlock_nested_bh(&softnet_data.process_queue_bh_lock); rcu_read_lock(); __netif_receive_skb(skb); rcu_read_unlock(); @@ -6072,7 +6078,9 @@ static int process_backlog(struct napi_struct *napi, = int quota) return work; } =20 + local_lock_nested_bh(&softnet_data.process_queue_bh_lock); } + local_unlock_nested_bh(&softnet_data.process_queue_bh_lock); =20 backlog_lock_irq_disable(sd); if (skb_queue_empty(&sd->input_pkt_queue)) { @@ -6087,8 +6095,10 @@ static int process_backlog(struct napi_struct *napi,= int quota) napi->state &=3D NAPIF_STATE_THREADED; again =3D false; } else { + local_lock_nested_bh(&softnet_data.process_queue_bh_lock); skb_queue_splice_tail_init(&sd->input_pkt_queue, &sd->process_queue); + local_unlock_nested_bh(&softnet_data.process_queue_bh_lock); } backlog_unlock_irq_enable(sd); } --=20 2.43.0