mutex usage in if_bridge vs other drivers

Konstantin Belousov kostikbel at gmail.com
Wed Dec 7 10:09:49 UTC 2016


On Wed, Dec 07, 2016 at 05:41:51PM +0800, Sepherosa Ziehau wrote:
> On Sat, Dec 3, 2016 at 3:36 PM, Chris Torek <torek at elf.torek.net> wrote:
> >>... Dropping the lock is entirely the wrong thing to do -- as
> >>you note, if we do, then the bridge members can change out from
> >>under us.  The only path forward is to use an sx lock, but ...
> >  [snip]
> >>In code paths that modify the list of bridge members, hold both the
> >>BRIDGE_LOCK and the new sx lock.  In the transmit and receive paths,
> >>nothing should change.
> >
> > That should work, but I hate the cost of obtaining two locks --
> > not so much the lock acquire/release cost, but the "mental cost"
> > of keeping the lock ordering straight.
> >
> > The other option I thought of was gathering the list of members
> > that need an ioctl done on them in one pass, then doing all the
> > ioctls after dropping the lock.  But that runs the risk of doing
> > ioctls on interfaces that are no longer members of the bridge.
> >
> > I guess the "mental cost" is not that high, since the lock order
> > requirement is guaranteed to be "sx lock first, then mtx lock"
> > (because the other way around causes sleeping while holding a
> > regular mutex!).
> 
> This is what did for Hyper-V network drivers:
> 
> while (sx_try_xlock(drv_conf_sx) == 0)
>     DELAY(1000);
> 
> since that mainlock, i.e. configuration lock, is not on hot path for drivers.
> 
> In this way, driver can sleep freely on IF_UP/DOWN/detach path, which
> is convenient, though other paths e.g. promisc, add/delmulti still
> requires busy-wait instead of sleeping.

Consider what happens if some other thread already owns the conf sx lock
and tries to acquire the mutex.

If the thread blocks execution by whatever mean, be it lock primitive putting
the thread off cpu, or thread executing spin loop (as in your case), reversing
the order still causes the deadlock.


More information about the freebsd-net mailing list