From patchwork Mon Feb 22 14:10:02 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Vrabel X-Patchwork-Id: 8376811 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id A4F559F372 for ; Mon, 22 Feb 2016 14:12:38 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 8A3EF2041A for ; Mon, 22 Feb 2016 14:12:37 +0000 (UTC) Received: from lists.xen.org (lists.xenproject.org [50.57.142.19]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id A090F2037C for ; Mon, 22 Feb 2016 14:12:36 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aXrBj-0005fs-UG; Mon, 22 Feb 2016 14:10:11 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aXrBi-0005fn-Lj for xen-devel@lists.xenproject.org; Mon, 22 Feb 2016 14:10:10 +0000 Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id 26/3D-03316-1C61BC65; Mon, 22 Feb 2016 14:10:09 +0000 X-Env-Sender: prvs=853990b3f=david.vrabel@citrix.com X-Msg-Ref: server-12.tower-206.messagelabs.com!1456150207!24100876!1 X-Originating-IP: [66.165.176.63] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n, received_headers: No Received headers X-StarScan-Received: X-StarScan-Version: 7.35.1; banners=-,-,- X-VirusChecked: Checked Received: (qmail 1878 invoked from network); 22 Feb 2016 14:10:08 -0000 Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63) by server-12.tower-206.messagelabs.com with RC4-SHA encrypted SMTP; 22 Feb 2016 14:10:08 -0000 X-IronPort-AV: E=Sophos;i="5.22,484,1449532800"; d="scan'208";a="339933821" To: Gonglei , , , References: <1455931646-5672-1-git-send-email-arei.gonglei@huawei.com> From: David Vrabel X-Enigmail-Draft-Status: N1110 Message-ID: <56CB16BA.3020102@citrix.com> Date: Mon, 22 Feb 2016 14:10:02 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Icedove/38.5.0 MIME-Version: 1.0 In-Reply-To: <1455931646-5672-1-git-send-email-arei.gonglei@huawei.com> X-DLP: MIA1 Cc: peter.huangpeng@huawei.com, "David S . Miller" Subject: Re: [Xen-devel] [PATCH] xen-netfront: set real_num_tx_queues to zreo avoid to trigger BUG_ON X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP On 20/02/16 01:27, Gonglei wrote: > It's possible for a race condition to exist between xennet_open() and > talk_to_netback(). After invoking netfront_probe() then other > threads or processes invoke xennet_open (such as NetworkManager) > immediately may trigger BUG_ON(). Besides, we also should reset > real_num_tx_queues in xennet_destroy_queues(). I think you want something like the following. We serialize the backend changing and the netdev open with the device mutex. (I've not even tried to compile this so it might not even build.) David diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c index d6abf19..7e2791a 100644 --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -340,22 +340,28 @@ static int xennet_open(struct net_device *dev) unsigned int i = 0; struct netfront_queue *queue = NULL; + device_lock(&np->xbdev->dev); + + if (!netif_carrier_ok(dev)) + goto unlock; + for (i = 0; i < num_queues; ++i) { queue = &np->queues[i]; napi_enable(&queue->napi); spin_lock_bh(&queue->rx_lock); - if (netif_carrier_ok(dev)) { - xennet_alloc_rx_buffers(queue); - queue->rx.sring->rsp_event = queue->rx.rsp_cons + 1; - if (RING_HAS_UNCONSUMED_RESPONSES(&queue->rx)) - napi_schedule(&queue->napi); - } + xennet_alloc_rx_buffers(queue); + queue->rx.sring->rsp_event = queue->rx.rsp_cons + 1; + if (RING_HAS_UNCONSUMED_RESPONSES(&queue->rx)) + napi_schedule(&queue->napi); spin_unlock_bh(&queue->rx_lock); } netif_tx_start_all_queues(dev); + unlock: + device_unlock(&np->xbdev->dev); + return 0; } @@ -1983,8 +1989,8 @@ static int xennet_connect(struct net_device *dev) num_queues = dev->real_num_tx_queues; rtnl_lock(); + netdev_update_features(dev); - rtnl_unlock(); /* * All public and private state should now be sane. Get @@ -1992,7 +1998,6 @@ static int xennet_connect(struct net_device *dev) * domain a kick because we've probably just requeued some * packets. */ - netif_carrier_on(np->netdev); for (j = 0; j < num_queues; ++j) { queue = &np->queues[j]; @@ -2006,9 +2011,17 @@ static int xennet_connect(struct net_device *dev) spin_lock_bh(&queue->rx_lock); xennet_alloc_rx_buffers(queue); + if (netif_running(dev)) { + if (RING_HAS_UNCONSUMED_RESPONSES(&queue->rx)) + napi_schedule(&queue->napi); + } spin_unlock_bh(&queue->rx_lock); } + netif_carrier_on(np->netdev); + + rtnl_unlock(); + return 0; } diff --git a/drivers/xen/xenbus/xenbus_probe.c b/drivers/xen/xenbus/xenbus_probe.c index 33a31cf..57cd20d 100644 --- a/drivers/xen/xenbus/xenbus_probe.c +++ b/drivers/xen/xenbus/xenbus_probe.c @@ -204,8 +204,11 @@ void xenbus_otherend_changed(struct xenbus_watch *watch, return; } - if (drv->otherend_changed) + if (drv->otherend_changed) { + device_lock(&dev->dev); drv->otherend_changed(dev, state); + device_unlock(&dev->dev); + } } EXPORT_SYMBOL_GPL(xenbus_otherend_changed);