From nobody Wed Jan 7 23:01:14 2026 Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4B1A130F526 for ; Mon, 5 Jan 2026 02:10:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.44 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767579010; cv=none; b=meyXzSq531GHBarUfxLvNkkqFE6Mxxr46sycS96T09vghIjQ+UieVV2VoQII3ux7ocOOpOZiffxt2pJqAf6cdpbr+xNbb5KDDsNyM+zaqxZtyPG07YIKyEvw/iWfN7+bzSoJ7/PxM+w3jgznSWezFxcaiiZtdSSuGdGQQELnrnQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767579010; c=relaxed/simple; bh=mHd5/FDiQ86yScP8/xKWBTcg+ow54G9KDtNwccSg1Uk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=rO2Jq+FKGK9IN/Km2IK2U/FRMGiEbRbBpQQPODscNDYEganzXh2pT6BJnQn8Aevkkt3EJhk6Xrrx9W5CuBsoh/eoWj3HKCfBI3ff8n59nFUahTBLQXp1ln03mdZFjjC4/iLAJAzjHDW86LwdBaY7CuuL4xZvhpX1L51SGYjH8p0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=aHiu6se8; arc=none smtp.client-ip=209.85.216.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="aHiu6se8" Received: by mail-pj1-f44.google.com with SMTP id 98e67ed59e1d1-34ccdcbe520so705575a91.1 for ; Sun, 04 Jan 2026 18:10:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1767579005; x=1768183805; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=qykhmziqocBs83eOMsCXS+riegj3dQCRKqwsythsgqI=; b=aHiu6se8cpOvOqDc9GHV/ab3HTwsRuYtPOi6sJs0udSrqjXBXddSJ9XTx8qDx8gOz1 JjH8/O8/ORqxIWSl26yArqg+yDm+A0UOI1lRHReNCxE18wtRJ5ONbudC+zPbO0YnZ5mW suGB3VCHhgW0P2dIMO4UVZgzo8jTZPrC6HE6RkRzuDBcCCpE5vmQqI5+mTm6g22pwYN9 Zs3cwx3P9xrcPBIZSb9jPBk3cYGaF/ebv4Oxe2EkZLNFPVFPCMQSb1DadG5HrqZm34+F lcQT0rP7EKrMo2bVAXCkHDsw33uT5qIHbUIRFcLVACpwYPg560dYcsEVBlhXcHedON3G wfCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767579005; x=1768183805; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=qykhmziqocBs83eOMsCXS+riegj3dQCRKqwsythsgqI=; b=kzX/6tyXSWn5VOgHcdbauNMG1hThViL8wK2MVCjiE1t+nw8rXwMuczQRqSBMUr4LN0 tCGr3TYvcl+JNFv4zOzAlWarBRhsiO0FPPdVEB6SHkU1lguSAsl/zO7Dnb5bDxpVE9Sn PkLuO8uYStwDbPc1omZcXZqRvlO5+VKAHsqbVmR38TFg7LaLmZx9A3aPpYAqlG3FNDJD U0+XdZyHxzDU2LXzyRx6D1JE6oaqcVGVwtuYBY/LqM8SaCQXAhaTR2aObzcccH8sC9oW Y7Pjb1eMct0qqzR9P5MwBtodn5pnTv9GKhcun3GGBBDbuaDy1weYyv2iGfx9SsQMDiK1 MwXA== X-Forwarded-Encrypted: i=1; AJvYcCU9LZTxYdrT5B9X3LJixvC1tBlDQ1M8gUGbv8s3WwPNDOO3oo1sprrV9jjrHaMm/b51TYbXAVmD91dMhHQ=@vger.kernel.org X-Gm-Message-State: AOJu0YzeSCdPLjXRUvei2HwkD4/51mIMSsO7U0a0Oj/e7jMOPo2Za9+4 lbgnUGN5nwlAknnHLdDDWm8QlI7Tfhzb5Kc+DkTAPu8kTbhLIO+RbO1T X-Gm-Gg: AY/fxX43QO5J7bwE/zrhc4cw5Ky3ml95IsB//BPoyWTP9QX8xzOHyPP6i02EsUMOZG8 ajLv0N8Mz2/WL1dG6F3KF9oLzjNoRnq8k+0FGu0b8zAlBa3GCTvN4W6DZirsKig6Wuq2foXl7Ph 78sxhEUly8P5ll1pBtTUvOuCuN7SBL06mhAKKErI+stznMnd9qVg3nprdbRrB/IjDULbg04UZSP Y1eXocblYSuXRf/0xXKFUWdtEuRbw5//zR9nW8hNmcC07Ra91aI57X9zCSY8cat1nhek56gus6s BlEfQVio+Cmw33Eq0qi5X8Xq3YSPrtAwb6iX00onIPIJdJSLZhfAYmtEB/0uOPxGYNa3fktIlZo GV23DMnooTucwsIqJiRPHFW6OQj9ZLO3tJ+DQ36Ui5PPYdFIF2CCpzDc1245Z5q7Nat/kLibRfO q7hK+CDQ4fEa5eqPk9VirnpWPwKugeOlwJJdzJN3v/1R5rg1JQyxFS5g== X-Google-Smtp-Source: AGHT+IGOQour0NkX3syOiO+wHoNuBNONrZarwLKTvm0Dywz1DdFpKhVE2PPkSnu+G8zeuD1+IqheaA== X-Received: by 2002:a17:90a:e7cd:b0:34c:2e8a:ea42 with SMTP id 98e67ed59e1d1-34f4537d9a4mr5221185a91.7.1767579005234; Sun, 04 Jan 2026 18:10:05 -0800 (PST) Received: from d.home.mmyangfl.tk ([2001:19f0:8001:1644:5400:5ff:fe3e:12b1]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-34f476fb838sm4427102a91.7.2026.01.04.18.09.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 04 Jan 2026 18:10:04 -0800 (PST) From: David Yang To: netdev@vger.kernel.org Cc: David Yang , Andrew Lunn , Vladimir Oltean , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , linux-kernel@vger.kernel.org, Dan Carpenter , David Laight Subject: [PATCH net-next v3 1/2] net: dsa: yt921x: Fix MIB overflow wraparound routine Date: Mon, 5 Jan 2026 10:09:00 +0800 Message-ID: <20260105020905.3522484-2-mmyangfl@gmail.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260105020905.3522484-1-mmyangfl@gmail.com> References: <20260105020905.3522484-1-mmyangfl@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Reported by the following Smatch static checker warning: drivers/net/dsa/yt921x.c:702 yt921x_read_mib() warn: was expecting a 64 bit value instead of '(~0)' Fixes: 186623f4aa72 ("net: dsa: yt921x: Add support for Motorcomm YT921x") Reported-by: Dan Carpenter Closes: https://lore.kernel.org/netdev/aPsjYKQMzpY0nSXm@stanley.mountain/ Suggested-by: David Laight Signed-off-by: David Yang --- drivers/net/dsa/yt921x.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/drivers/net/dsa/yt921x.c b/drivers/net/dsa/yt921x.c index 0b3df732c0d1..5e4e8093ba16 100644 --- a/drivers/net/dsa/yt921x.c +++ b/drivers/net/dsa/yt921x.c @@ -682,21 +682,22 @@ static int yt921x_read_mib(struct yt921x_priv *priv, = int port) const struct yt921x_mib_desc *desc =3D &yt921x_mib_descs[i]; u32 reg =3D YT921X_MIBn_DATA0(port) + desc->offset; u64 *valp =3D &((u64 *)mib)[i]; - u64 val =3D *valp; u32 val0; - u32 val1; + u64 val; =20 res =3D yt921x_reg_read(priv, reg, &val0); if (res) break; =20 if (desc->size <=3D 1) { - if (val < (u32)val) - /* overflow */ - val +=3D (u64)U32_MAX + 1; - val &=3D ~U32_MAX; - val |=3D val0; + u64 old_val =3D *valp; + + val =3D (old_val & ~(u64)U32_MAX) | val0; + if (val < old_val) + val +=3D 1ull << 32; } else { + u32 val1; + res =3D yt921x_reg_read(priv, reg + 4, &val1); if (res) break; --=20 2.51.0 From nobody Wed Jan 7 23:01:14 2026 Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D039030DEA4 for ; Mon, 5 Jan 2026 02:10:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.51 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767579012; cv=none; b=FYjs0PoiroHDDd0rIBGKkViJ+MmiF7672k0V8CpOH253WcYhR5/nU6jOhihySiIEtw03Tj2bei1s8cg0/kgFZNwp0MrDWp8ZM+GXiE8N6KtF903oZF6K8ckWXU3hbh/uLzuqvrFLAbPc3axR5VxT3SMd04Io1BCDGfv0sObeKfE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767579012; c=relaxed/simple; bh=NAGZrhvuaAq9xQJmOkhL+QIcYkGlNtQ7/wDoWYeHTXY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=LtwK46/wZgpede2Nhs3d04Wl1qt0qfu1a8cPTPEfwmNTfcXYcIiK38G+kbDsqqd/Pb6zXVNg5SV5jpBq21N1Cihdkzh8LwYQIOlr68wPWJ5YVSXdHZK0/R9sE/1MlYJsV1t1cPi5jwHdtmtcUHNjs7gljbOvNNraA3khoXzs9yc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=fGHiE4Ng; arc=none smtp.client-ip=209.85.216.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="fGHiE4Ng" Received: by mail-pj1-f51.google.com with SMTP id 98e67ed59e1d1-34e90f7b49cso10768823a91.3 for ; Sun, 04 Jan 2026 18:10:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1767579009; x=1768183809; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=mz+CZAF5dzBQAy9zX9ZKNHPdrpYwNX+2FouNd+rPU/o=; b=fGHiE4NgCTHn0L640pSbUSGo2hWac792k4MpPvzkf7F6rimPhsQxE+IXBOtM3Lhgep pPijMi8bdtddLFYNVLly50Nf2XM38Jb5LIixafn97ufeiZ7oncwDKvLUyDrU0idqqDKo FznAuA9bZd3ekhSSVuHhEBxmJt0lpOJsmK9tfSXmFUNPu8lZo+RKMIZ0PwAtvKVW+n7v sj7DHvs7uhgcS+WdRcT3MK4ten09Hj9mZ1RwFmG5SRw9ZzcJkGiKpwyyALy82OKFVMTx 8ZDAOvY6Sw3AK0ROa2kOLneYE8NpPle2xyjjOhQ/qsEGDOB5FqEsjLYYTtSMfMVPtSDs Y+ZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1767579009; x=1768183809; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=mz+CZAF5dzBQAy9zX9ZKNHPdrpYwNX+2FouNd+rPU/o=; b=LC7/sT1pXY+INm+AoYjeOb/8NLOcUUx3d03yWC/WILmM6/Yg6+Bji/Utga3ogrXMVy frRfJt4jtRUmWx4ECOGjY4jMS9n9PjeocW147MnOIbWDJgrEdTrtxUhJ0UqJcQaSlx/8 wCtRecNBh0Bce7VDgnZDOs1pYa+O5PloeCxDJJCnv4RBV4k9gNV3EdM+Nkc/gpx7Mvxb UwLUw5DUUJF9v4wCgRO1Wkn1BIdSxkMcwOUpMPcxlGBs+ZHqdzZXj+MY+wvIDnCgUY/4 J5yDCgANdP2AGjEBoFYFzFjSBAxMNQ/BGqjybLCX3xVvlnaArm10V5dD5EqceoSpIQdI AvLQ== X-Forwarded-Encrypted: i=1; AJvYcCUZ4GsRDUWWKlVrElmMhiRmHz5UGJBknBsW5+o5TckC5LXFMjqls/LvcGu0hhHUHDwVN17cYktD7wS5VQY=@vger.kernel.org X-Gm-Message-State: AOJu0YwSFdI86gSf1pDCJndnc5RIm/mWcLJCKQ1d0SSrLyh0cf4ApJ/9 jOJ/485kEGTnsge4Ect1J6YJ3SiujNGd5NwiGX8JdH6odfmpNRNBCmJP X-Gm-Gg: AY/fxX5nnAnt59PW3lZK5HQXNArvO8svNz/8TceGC3wu8RzDPcPyeot3zU04Kk4Zm6/ fQmb0aFgB3ptAnYP5OM0E3v/T4wXJtY2hFM6A79EjlC9ti3ebll6sEprjN8wjBylyPGVHkHPjfd Qe2X8sZ1pM93FKZOd/cevLrGLmrNVu8x+kOd5sRdtNpYLMrsEUnehaj/iqlzvV4l8oFeQTKuS/g Vl+AAM+aqQLpraGEme+f/2iMizV3Too5+3GuOH9clleublh0UeUtnB6G6PLJg6YsXXoVTbUrPnH yICphQrCHIPvdeEFzgfVPUvR3D5qytcApK+FXs0bjqowTckJkJ41XKrI23wn53n1mSqaup4sufd zHevwboiibZXaChNAiOsjlHa3cB2KNjmedA1lAdn5HGECSSmARTYvaW6GbV0HlkYr3uqkPKVDX2 WiRXWoV9lXex2Y/0nLhlKtbYRDr/E/0qnwx3176QkcnwRcxeIzFECkQQ== X-Google-Smtp-Source: AGHT+IEtg8F8tWWOM1Grzf2Ly52nOpLQAUmBmMQZIAHRYsqwqUUUKT0FWi+0LEhlI3WJKQCUJm/BbA== X-Received: by 2002:a17:90b:4a52:b0:34c:35ce:3c5f with SMTP id 98e67ed59e1d1-34e9212f6c8mr42631157a91.5.1767579008863; Sun, 04 Jan 2026 18:10:08 -0800 (PST) Received: from d.home.mmyangfl.tk ([2001:19f0:8001:1644:5400:5ff:fe3e:12b1]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-34f476fb838sm4427102a91.7.2026.01.04.18.10.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 04 Jan 2026 18:10:08 -0800 (PST) From: David Yang To: netdev@vger.kernel.org Cc: David Yang , Andrew Lunn , Vladimir Oltean , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , linux-kernel@vger.kernel.org Subject: [PATCH net-next v3 2/2] net: dsa: yt921x: Protect MIB stats with a lock Date: Mon, 5 Jan 2026 10:09:01 +0800 Message-ID: <20260105020905.3522484-3-mmyangfl@gmail.com> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260105020905.3522484-1-mmyangfl@gmail.com> References: <20260105020905.3522484-1-mmyangfl@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" 64bit variables might not be atomic on 32bit architectures, thus cannot be made lock-free. Protect them with a spin lock since get_stats64() cannot sleep. Signed-off-by: David Yang --- drivers/net/dsa/yt921x.c | 63 ++++++++++++++++++++++++++-------------- drivers/net/dsa/yt921x.h | 5 ++++ 2 files changed, 46 insertions(+), 22 deletions(-) diff --git a/drivers/net/dsa/yt921x.c b/drivers/net/dsa/yt921x.c index 5e4e8093ba16..98ee517e0675 100644 --- a/drivers/net/dsa/yt921x.c +++ b/drivers/net/dsa/yt921x.c @@ -666,22 +666,16 @@ yt921x_mbus_ext_init(struct yt921x_priv *priv, struct= device_node *mnp) static int yt921x_read_mib(struct yt921x_priv *priv, int port) { struct yt921x_port *pp =3D &priv->ports[port]; + struct yt921x_mib *mib_new =3D &pp->mib_new; struct device *dev =3D to_device(priv); struct yt921x_mib *mib =3D &pp->mib; + u64 rx_frames; + u64 tx_frames; int res =3D 0; =20 - /* Reading of yt921x_port::mib is not protected by a lock and it's vain - * to keep its consistency, since we have to read registers one by one - * and there is no way to make a snapshot of MIB stats. - * - * Writing (by this function only) is and should be protected by - * reg_lock. - */ - for (size_t i =3D 0; i < ARRAY_SIZE(yt921x_mib_descs); i++) { const struct yt921x_mib_desc *desc =3D &yt921x_mib_descs[i]; u32 reg =3D YT921X_MIBn_DATA0(port) + desc->offset; - u64 *valp =3D &((u64 *)mib)[i]; u32 val0; u64 val; =20 @@ -690,7 +684,7 @@ static int yt921x_read_mib(struct yt921x_priv *priv, in= t port) break; =20 if (desc->size <=3D 1) { - u64 old_val =3D *valp; + u64 old_val =3D ((u64 *)mib)[i]; =20 val =3D (old_val & ~(u64)U32_MAX) | val0; if (val < old_val) @@ -704,22 +698,31 @@ static int yt921x_read_mib(struct yt921x_priv *priv, = int port) val =3D ((u64)val1 << 32) | val0; } =20 - WRITE_ONCE(*valp, val); + ((u64 *)mib_new)[i] =3D val; } =20 - pp->rx_frames =3D mib->rx_64byte + mib->rx_65_127byte + - mib->rx_128_255byte + mib->rx_256_511byte + - mib->rx_512_1023byte + mib->rx_1024_1518byte + - mib->rx_jumbo; - pp->tx_frames =3D mib->tx_64byte + mib->tx_65_127byte + - mib->tx_128_255byte + mib->tx_256_511byte + - mib->tx_512_1023byte + mib->tx_1024_1518byte + - mib->tx_jumbo; - - if (res) + if (res) { dev_err(dev, "Failed to %s port %d: %i\n", "read stats for", port, res); - return res; + return res; + } + + rx_frames =3D mib->rx_64byte + mib->rx_65_127byte + + mib->rx_128_255byte + mib->rx_256_511byte + + mib->rx_512_1023byte + mib->rx_1024_1518byte + + mib->rx_jumbo; + tx_frames =3D mib->tx_64byte + mib->tx_65_127byte + + mib->tx_128_255byte + mib->tx_256_511byte + + mib->tx_512_1023byte + mib->tx_1024_1518byte + + mib->tx_jumbo; + + spin_lock(&pp->stats_lock); + *mib =3D *mib_new; + pp->rx_frames =3D rx_frames; + pp->tx_frames =3D tx_frames; + spin_unlock(&pp->stats_lock); + + return 0; } =20 static void yt921x_poll_mib(struct work_struct *work) @@ -768,6 +771,7 @@ yt921x_dsa_get_ethtool_stats(struct dsa_switch *ds, int= port, uint64_t *data) yt921x_read_mib(priv, port); mutex_unlock(&priv->reg_lock); =20 + spin_lock(&pp->stats_lock); j =3D 0; for (size_t i =3D 0; i < ARRAY_SIZE(yt921x_mib_descs); i++) { const struct yt921x_mib_desc *desc =3D &yt921x_mib_descs[i]; @@ -778,6 +782,7 @@ yt921x_dsa_get_ethtool_stats(struct dsa_switch *ds, int= port, uint64_t *data) data[j] =3D ((u64 *)mib)[i]; j++; } + spin_unlock(&pp->stats_lock); } =20 static int yt921x_dsa_get_sset_count(struct dsa_switch *ds, int port, int = sset) @@ -809,6 +814,7 @@ yt921x_dsa_get_eth_mac_stats(struct dsa_switch *ds, int= port, yt921x_read_mib(priv, port); mutex_unlock(&priv->reg_lock); =20 + spin_lock(&pp->stats_lock); mac_stats->FramesTransmittedOK =3D pp->tx_frames; mac_stats->SingleCollisionFrames =3D mib->tx_single_collisions; mac_stats->MultipleCollisionFrames =3D mib->tx_multiple_collisions; @@ -831,6 +837,7 @@ yt921x_dsa_get_eth_mac_stats(struct dsa_switch *ds, int= port, /* mac_stats->InRangeLengthErrors */ /* mac_stats->OutOfRangeLengthField */ mac_stats->FrameTooLongErrors =3D mib->rx_oversize_errors; + spin_unlock(&pp->stats_lock); } =20 static void @@ -845,9 +852,11 @@ yt921x_dsa_get_eth_ctrl_stats(struct dsa_switch *ds, i= nt port, yt921x_read_mib(priv, port); mutex_unlock(&priv->reg_lock); =20 + spin_lock(&pp->stats_lock); ctrl_stats->MACControlFramesTransmitted =3D mib->tx_pause; ctrl_stats->MACControlFramesReceived =3D mib->rx_pause; /* ctrl_stats->UnsupportedOpcodesReceived */ + spin_unlock(&pp->stats_lock); } =20 static const struct ethtool_rmon_hist_range yt921x_rmon_ranges[] =3D { @@ -876,6 +885,8 @@ yt921x_dsa_get_rmon_stats(struct dsa_switch *ds, int po= rt, =20 *ranges =3D yt921x_rmon_ranges; =20 + spin_lock(&pp->stats_lock); + rmon_stats->undersize_pkts =3D mib->rx_undersize_errors; rmon_stats->oversize_pkts =3D mib->rx_oversize_errors; rmon_stats->fragments =3D mib->rx_alignment_errors; @@ -896,6 +907,8 @@ yt921x_dsa_get_rmon_stats(struct dsa_switch *ds, int po= rt, rmon_stats->hist_tx[4] =3D mib->tx_512_1023byte; rmon_stats->hist_tx[5] =3D mib->tx_1024_1518byte; rmon_stats->hist_tx[6] =3D mib->tx_jumbo; + + spin_unlock(&pp->stats_lock); } =20 static void @@ -906,6 +919,8 @@ yt921x_dsa_get_stats64(struct dsa_switch *ds, int port, struct yt921x_port *pp =3D &priv->ports[port]; struct yt921x_mib *mib =3D &pp->mib; =20 + spin_lock(&pp->stats_lock); + stats->rx_length_errors =3D mib->rx_undersize_errors + mib->rx_fragment_errors; stats->rx_over_errors =3D mib->rx_oversize_errors; @@ -932,6 +947,8 @@ yt921x_dsa_get_stats64(struct dsa_switch *ds, int port, /* stats->tx_dropped */ stats->multicast =3D mib->rx_multicast; stats->collisions =3D mib->tx_collisions; + + spin_unlock(&pp->stats_lock); } =20 static void @@ -946,8 +963,10 @@ yt921x_dsa_get_pause_stats(struct dsa_switch *ds, int = port, yt921x_read_mib(priv, port); mutex_unlock(&priv->reg_lock); =20 + spin_lock(&pp->stats_lock); pause_stats->tx_pause_frames =3D mib->tx_pause; pause_stats->rx_pause_frames =3D mib->rx_pause; + spin_unlock(&pp->stats_lock); } =20 static int diff --git a/drivers/net/dsa/yt921x.h b/drivers/net/dsa/yt921x.h index 61bb0ab3b09a..0c9d1b6cbc23 100644 --- a/drivers/net/dsa/yt921x.h +++ b/drivers/net/dsa/yt921x.h @@ -533,9 +533,14 @@ struct yt921x_port { bool isolated; =20 struct delayed_work mib_read; + /* protect the access to mib, rx_frames and tx_frames */ + spinlock_t stats_lock; struct yt921x_mib mib; u64 rx_frames; u64 tx_frames; + + /* only used by read routine to avoid huge allocations on the stack */ + struct yt921x_mib mib_new; }; =20 struct yt921x_reg_ops { --=20 2.51.0