[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250106125717.1a11e522@kernel.org>
Date: Mon, 6 Jan 2025 12:57:17 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: Shinas Rasheed <srasheed@...vell.com>
Cc: "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Haseeb Gani
<hgani@...vell.com>, Sathesh B Edara <sedara@...vell.com>, Vimlesh Kumar
<vimleshk@...vell.com>, "thaller@...hat.com" <thaller@...hat.com>,
"wizhao@...hat.com" <wizhao@...hat.com>, "kheib@...hat.com"
<kheib@...hat.com>, "konguyen@...hat.com" <konguyen@...hat.com>,
"horms@...nel.org" <horms@...nel.org>, "einstein.xue@...axg.com"
<einstein.xue@...axg.com>, Veerasenareddy Burru <vburru@...vell.com>,
Andrew Lunn <andrew+netdev@...n.ch>, "David S. Miller"
<davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Paolo Abeni
<pabeni@...hat.com>, Abhijit Ayarekar <aayarekar@...vell.com>, Satananda
Burla <sburla@...vell.com>
Subject: Re: [EXTERNAL] Re: [PATCH net v4 1/4] octeon_ep: fix race
conditions in ndo_get_stats64
On Mon, 6 Jan 2025 05:57:09 +0000 Shinas Rasheed wrote:
> > > struct octep_device *oct = netdev_priv(netdev);
> > > int q;
> > >
> > > - if (netif_running(netdev))
> > > - octep_ctrl_net_get_if_stats(oct,
> > > - OCTEP_CTRL_NET_INVALID_VFID,
> > > - &oct->iface_rx_stats,
> > > - &oct->iface_tx_stats);
> > > -
> > > tx_packets = 0;
> > > tx_bytes = 0;
> > > rx_packets = 0;
> > > rx_bytes = 0;
> > > +
> > > + if (!netif_running(netdev))
> > > + return;
> >
> > So we'll provide no stats when the device is down? That's not correct.
> > The driver should save the stats from the freed queues (somewhere in
> > the oct structure). Also please mention how this is synchronized
> > against netif_running() changing its state, device may get closed while
> > we're running..
>
> I ACK the 'save stats from freed queues and emit out stats when device is down'.
>
> About the synchronization, the reason I changed to simple netif_running check was to avoid
> locks (as per previous patch version comments). Please do correct me if I'm wrong, but isn't the case
> you mentioned protected by the rtnl_lock held by the netdev stack when it calls the ndo_op ?
I don't see rtnl_lock being taken in the procfs path.
FWIW I posted a test for the problem you're fixing in octeon,
since it's relatively common among drivers:
https://lore.kernel.org/20250105011525.1718380-1-kuba@kernel.org
see also:
https://github.com/linux-netdev/nipa/wiki/Running-driver-tests
Powered by blists - more mailing lists