On Mon, 2026-03-30 at 19:08 -0700, Jakub Kicinski wrote:
> This is an AI-generated review of your patch. The human sending this
> email has considered the AI review valid, or at least plausible.
> ---
> devlink: Allow rate node parents from other devlinks
>
> This commit makes use of the building blocks previously added to
> implement cross-device rate nodes.
>
> > diff --git a/include/net/devlink.h b/include/net/devlink.h
> > index 3038af6ec017e..8d5ad5d4f1d05 100644
> > --- a/include/net/devlink.h
> > +++ b/include/net/devlink.h
> > @@ -1585,6 +1585,11 @@ struct devlink_ops {
> > struct devlink_rate *parent,
> > void *priv_child, void
> > *priv_parent,
> > struct netlink_ext_ack
> > *extack);
> > + /* Indicates if cross-device rate nodes are supported.
> > + * This also requires a shared common ancestor object all
> > devices that
> > + * could share rate nodes are nested in.
> > + */
> > + bool supported_cross_device_rate_nodes;
>
> When a device acting as a cross-device rate parent is destroyed,
> devl_rate_nodes_destroy() iterates the shared rate_list to detach its
> children. If it encounters a child rate node belonging to a different
> device,
> it invokes the child driver's ops->rate_node_parent_set or
> ops->rate_leaf_parent_set callbacks.
>
> Since the cleanup path only holds the parent's devlink lock and the
> shared
> root devlink lock, does this allow the child driver's rate operations
> to
> execute concurrently with other operations on the child device
> without holding
> the child's devlink instance lock?
The rate_node lock protects changes to the rate hierarchy, even if
child devlink instance locks aren't held. The code works by locking
everything from the affected instance A up to the instance at the root
of the hierarchy R, and affects the hierarchy with R's instance lock
held. I think this can be made clearer in the code/comments though, so
Will tweak some things in the next version.
>
> [ ... ]
> > diff --git a/net/devlink/rate.c b/net/devlink/rate.c
> > index 1949746fab291..f243cccc95bee 100644
> > --- a/net/devlink/rate.c
> > +++ b/net/devlink/rate.c
> > @@ -30,19 +30,53 @@ devlink_rate_leaf_get_from_info(struct devlink
> > *devlink, struct genl_info *info)
> > return devlink_rate ?: ERR_PTR(-ENODEV);
> > }
> >
> > +/* Repeatedly locks the nested-in devlink instances while cross
> > device rate
> > + * nodes are supported. Returns the devlink instance where rates
> > should be
> > + * stored.
> > + */
> > static struct devlink *devl_rate_lock(struct devlink *devlink)
> > {
> > - return devlink;
> > + struct devlink *rate_devlink = devlink;
> > +
> > + while (rate_devlink->ops &&
> > + rate_devlink->ops-
> > >supported_cross_device_rate_nodes) {
> > + devlink = devlink_nested_in_get_lock(rate_devlink-
> > >rel);
> > + if (!devlink)
> > + break;
> > + rate_devlink = devlink;
> > + }
> > + return rate_devlink;
> > }
>
> [ ... ]
>
> > +/* Repeatedly unlocks the nested-in devlink instances of 'devlink'
> > while cross
> > + * device nodes are supported.
> > + */
> > static void devl_rate_unlock(struct devlink *devlink)
> > {
> > + if (!devlink || !devlink->ops ||
> > + !devlink->ops->supported_cross_device_rate_nodes)
> > + return;
> > +
> > + devl_rate_unlock(devlink_nested_in_get_locked(devlink-
> > >rel));
> > + devlink_nested_in_put_unlock(devlink->rel);
> > }
>
> If a parent devlink is not yet registered,
> devlink_nested_in_get_lock() can
> return NULL in devl_rate_lock() and break the loop without taking a
> lock.
>
> If another thread completes registering the parent devlink
> concurrently,
> devlink_nested_in_get_locked() in devl_rate_unlock() will find it.
>
> Could this lead to unlocking a mutex that was never acquired and
> dropping a
> reference that was never taken, resulting in a use-after-free or lock
> corruption?
A valid concern in theory, even though in practice there won't be
another thread registering a shared devlink instance that would race
with registration in this way.
I will make these lock/unlock helpers more robust in the next version.
>
> [ ... ]
> > @@ -320,13 +371,14 @@ devlink_nl_rate_parent_node_set(struct
> > devlink_rate *devlink_rate,
> > struct genl_info *info,
> > struct nlattr *nla_parent)
> > {
> > - struct devlink *devlink = devlink_rate->devlink;
> > + struct devlink *devlink = devlink_rate->devlink,
> > *parent_devlink;
> > const char *parent_name = nla_data(nla_parent);
> > const struct devlink_ops *ops = devlink->ops;
> > size_t len = strlen(parent_name);
> > struct devlink_rate *parent;
> > int err = -EOPNOTSUPP;
> >
> > + parent_devlink = devlink_nl_ctx(info)->parent_devlink ? :
> > devlink;
> > parent = devlink_rate->parent;
> >
> > if (parent && !len) {
> > @@ -344,7 +396,13 @@ devlink_nl_rate_parent_node_set(struct
> > devlink_rate *devlink_rate,
> > refcount_dec(&parent->refcnt);
> > devlink_rate->parent = NULL;
> > } else if (len) {
> > - parent = devlink_rate_node_get_by_name(devlink,
> > parent_name);
> > + /* parent_devlink (when different than devlink)
> > isn't locked,
> > + * but the rate node devlink instance is, so
> > nobody from the
> > + * same group of devices sharing rates could
> > change the used
> > + * fields or unregister the parent.
> > + */
> > + parent =
> > devlink_rate_node_get_by_name(parent_devlink,
> > +
> > parent_name);
>
> Is parent_devlink validated to ensure it shares the same common rate
> root
> ancestor as devlink?
>
> If an arbitrary unrelated parent_devlink is specified,
> devlink_rate_node_get_by_name() could traverse an unrelated parent's
> rate_list that was never locked by devl_rate_lock(), leading to a
> data race.
>
> Additionally, if a rate node is found, its priv pointer is passed to
> the
> target driver's ops->rate_node_parent_set. Could this cause the
> target driver
> to cast a foreign priv pointer to its own private struct type,
> resulting in
> type confusion and memory corruption?
Right, there's no common ancestor validation which could lead to
unpleasant results if one tries to set a rate parent across drivers
which support cross-esw.
I'll add it in the next version.
Cosmin.