NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/58531: NetBSD 10.0 deadlock in nd_timer
On 2024/08/13 10:10, matthew green wrote:
We have a deadlock here:
wm_handle_queue/wm_send_common_locked/bpf_deliver/selnotify/knote/filter_event waits for kernel_lock with txq->txq_lock held
softint_dispatch/callout_softclock/nd_timer/arp_llinfo_output/arprequest/ether_output/if_transmit/wm_start waits for txq->txq_lock with kernel_lock held
usually we'd want kernel lock taken before other locks so in
thie case, the first one would already have kernel lock and
would just take a ref on the existing lock
I just discussed this with ozaki-r@. He pointed out that
wm(4) is now marked IFEF_MPSAFE regardless of NET_MPSAFE:
https://github.com/NetBSD/src/commit/2f5368b82e369741e8d99b3fd6cda9a14e76e550
As a result, if(4) routines do not take KERNEL_LOCK for wm(4).
These days, many drivers assert IFEF_MPSAFE unconditionally.
We must revisit all of them, if it matters...
for the first case, see if you can ensure that kernel_lock is
held before taking txq_lock, perhaps only for the case that
calls the knote.
apparently we need to de-kernel-lock-ify select backends?
Yeah, at least FILTEROP_MPSAFE should be turned on for bpf(4);
it has a fine-grained lock, and this flag bit seems to be
left untouched just accidentally.
manu@, can you please test whether the attached patch below
fixes your problem or not?
Thanks,
rin
----
diff --git a/sys/net/bpf.c b/sys/net/bpf.c
index f2532265e34..4ae5e7653f0 100644
--- a/sys/net/bpf.c
+++ b/sys/net/bpf.c
@@ -1611,7 +1611,7 @@ filt_bpfread(struct knote *kn, long hint)
}
static const struct filterops bpfread_filtops = {
- .f_flags = FILTEROP_ISFD,
+ .f_flags = FILTEROP_ISFD | FILTEROP_MPSAFE,
.f_attach = NULL,
.f_detach = filt_bpfrdetach,
.f_event = filt_bpfread,
----
Home |
Main Index |
Thread Index |
Old Index