Received: by 10.192.165.148 with SMTP id m20csp3946325imm; Mon, 23 Apr 2018 15:39:54 -0700 (PDT) X-Google-Smtp-Source: AIpwx48eRkV9QJs6/YAyI16H8k/1g2RWkpn6EE8rVcWMxbLyD39JTZcWi9WNTweASwdBSeyuIul3 X-Received: by 10.99.177.5 with SMTP id r5mr17752302pgf.186.1524523194906; Mon, 23 Apr 2018 15:39:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524523194; cv=none; d=google.com; s=arc-20160816; b=HoDrFtGaHtgTgKwsSBoZF6+NbykTolxlB5XJZtC8PdANQtM2+7W+JKlbz9TnOH5KiK AnAaTExosjvFG4gBevZWBHzTgGYVIrJn7CNbGV5rs0Zi1P9MtFHZt0055HTbtSzQ/5Si N0BgfaqkvbeR6sl/aEo3SFCRlljbZK5ZqdkkNyo7dVOvodg9a27DWrosEtMmG5mNewsq SYasJiXYH9iT27scfly5jAAhgXcxE/RcWy+popWGMbFpi7wCtm0PYO3ROHPUCy77QCuT Bruhn+/eE35x40iHXlxpq0eiXcU1i89/bPNFHdTpl7QsnsfcE43dTpr9IqNcYyiPk/jM GqMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=Mvs/llhny6Ta3S9gi21YyEvkSpzS8jf1+nFx+6R7bBE=; b=jjkjFNWc+xmpBESgIud+mQkIAbltFiQBipnv/0EuSp6nod777WQm3awWd869x8/rYJ n2vEnuwJP577kLBEeeXKO9LkiuJXC9efTMhtANJAKi9koFZg3Em+5pig5I8LGWuGfU7G xPMFObzx0k4COH9um64S9Hb5TME9G9qKzoLUsuf+isFbYNzesKMrRoE/X/7R+5rE2vyQ MuEEH7Ge1LkVvW0eKmQiuPPJy2AR0aiFx9OFeXwgPX2XoWpUxe0hiSUi4+UjmU7/Zc/J SyuSHGPN2lS/J0ADo0eHdWsz1NvJjC6qcb+mz11bgLlmY66TzpU3Ig+ahu8NyDhkTBlp aXOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MX0+xgKa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m137si10281491pga.382.2018.04.23.15.39.37; Mon, 23 Apr 2018 15:39:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MX0+xgKa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932585AbeDWWiZ (ORCPT + 99 others); Mon, 23 Apr 2018 18:38:25 -0400 Received: from mail-pg0-f66.google.com ([74.125.83.66]:39083 "EHLO mail-pg0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932514AbeDWWiV (ORCPT ); Mon, 23 Apr 2018 18:38:21 -0400 Received: by mail-pg0-f66.google.com with SMTP id b9so9364296pgf.6; Mon, 23 Apr 2018 15:38:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=Mvs/llhny6Ta3S9gi21YyEvkSpzS8jf1+nFx+6R7bBE=; b=MX0+xgKaZ0N2G9dBLsd4x4s7IpoEtU2GjGD5b70M8ZiAPWy8k+DcfbSIzI2nX81Q2Y puTjsrdRawjLdIuiv3wORdNCjbz/Fh3Axe9hrlbOrhYpzxqLzT3XrFzLzISOCL4zH+mG Ai8J6ei4P5X5bM6ZxnZn09hQ7a7Po6md2whd9DFSNEAZZ3ScG8TtVa1SOlmWgYWB4+ph 2npPCwq2o4BD0Fr9uHoG6oWJzyaUEnqdxXS6hNw+1tqzQ93lfQpSTXiA0QuQ0XySRDce B3RnW/ZYcDeQbwj0VnB/KHQLXJKFMZ2VxnPpMbXkZEBP7JXWSny+I1BYf8iAvvJRXYP1 E3OQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Mvs/llhny6Ta3S9gi21YyEvkSpzS8jf1+nFx+6R7bBE=; b=C8w4h7bFd0PFqVIDNtNlIbu/e5uFlDuCVLmen7RZc8BVOVxwqCdSzZTSUsVDBCyBFd 3HTuBMcekYiNFUAy57xWUr6RKBJpq1ce338v76V8XKGVk03tAK+DWTT9qTJXFw6SYGdv UUynAepVa6fcpdHSGicmVhEP8t8F/ysh7juUH6oMsz0BNKUxR8UwytbakTaNy2xPlFLH KyOzMvrYrluc9dCMmipfY8/MzbdFqZWKMe+Xzz7aAlFARktCVgZ6UDhbmOzU2gQ3WhOb aBa3QfhrXHDqyDi8jf5dtE1G59UYtwJpEFkQhlseaQBiwQilzsNSB+YY7bp6QQfnb0Y7 CEOw== X-Gm-Message-State: ALQs6tCYZuJwg8jmAaA7TaBl6nqPqqn0Mzgichh6izeFPLBkisqb9A1a E5amn2imfshpvPa/fdVgzZU= X-Received: by 2002:a17:902:43:: with SMTP id 61-v6mr22835447pla.112.1524523100195; Mon, 23 Apr 2018 15:38:20 -0700 (PDT) Received: from [192.168.1.70] (c-24-6-192-50.hsd1.ca.comcast.net. [24.6.192.50]) by smtp.gmail.com with ESMTPSA id q9sm25576948pgs.5.2018.04.23.15.38.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 23 Apr 2018 15:38:19 -0700 (PDT) Subject: Re: [PATCH v7 2/5] of: change overlay apply input data from unflattened to FDT To: Jan Kiszka , Rob Herring , Alan Tull Cc: Pantelis Antoniou , Pantelis Antoniou , devicetree@vger.kernel.org, "linux-kernel@vger.kernel.org" , Geert Uytterhoeven , Laurent Pinchart , Jailhouse References: <1520122673-11003-1-git-send-email-frowand.list@gmail.com> <1520122673-11003-3-git-send-email-frowand.list@gmail.com> <09e3db63-cbf9-52a2-ee77-520979f17fea@web.de> <7bbf615b-3cdd-6bb4-6918-33e48de4225d@gmail.com> From: Frank Rowand Message-ID: <7bbb9472-9c96-6012-68e6-4ec2773c7732@gmail.com> Date: Mon, 23 Apr 2018 15:38:17 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jan, + Alan Tull for fpga perspective On 04/22/18 03:30, Jan Kiszka wrote: > On 2018-04-11 07:42, Jan Kiszka wrote: >> On 2018-04-05 23:12, Rob Herring wrote: >>> On Thu, Apr 5, 2018 at 2:28 PM, Frank Rowand wrote: >>>> On 04/05/18 12:13, Jan Kiszka wrote: >>>>> On 2018-04-05 20:59, Frank Rowand wrote: >>>>>> Hi Jan, >>>>>> >>>>>> On 04/04/18 15:35, Jan Kiszka wrote: >>>>>>> Hi Frank, >>>>>>> >>>>>>> On 2018-03-04 01:17, frowand.list@gmail.com wrote: >>>>>>>> From: Frank Rowand >>>>>>>> >>>>>>>> Move duplicating and unflattening of an overlay flattened devicetree >>>>>>>> (FDT) into the overlay application code. To accomplish this, >>>>>>>> of_overlay_apply() is replaced by of_overlay_fdt_apply(). >>>>>>>> >>>>>>>> The copy of the FDT (aka "duplicate FDT") now belongs to devicetree >>>>>>>> code, which is thus responsible for freeing the duplicate FDT. The >>>>>>>> caller of of_overlay_fdt_apply() remains responsible for freeing the >>>>>>>> original FDT. >>>>>>>> >>>>>>>> The unflattened devicetree now belongs to devicetree code, which is >>>>>>>> thus responsible for freeing the unflattened devicetree. >>>>>>>> >>>>>>>> These ownership changes prevent early freeing of the duplicated FDT >>>>>>>> or the unflattened devicetree, which could result in use after free >>>>>>>> errors. >>>>>>>> >>>>>>>> of_overlay_fdt_apply() is a private function for the anticipated >>>>>>>> overlay loader. >>>>>>> >>>>>>> We are using of_fdt_unflatten_tree + of_overlay_apply in the >>>>>>> (out-of-tree) Jailhouse loader driver in order to register a virtual >>>>>>> device during hypervisor activation with Linux. The DT overlay is >>>>>>> created from a a template but modified prior to application to account >>>>>>> for runtime-specific parameters. See [1] for the current implementation. >>>>>>> >>>>>>> I'm now wondering how to model that scenario best with the new API. >>>>>>> Given that the loader lost ownership of the unflattened tree but the >>>>>>> modification API exist only for the that DT state, I'm not yet seeing a >>>>>>> clear solution. Should we apply the template in disabled form (status = >>>>>>> "disabled"), modify it, and then activate it while it is already applied? >>>>>> >>>>>> Thank you for the pointer to the driver - that makes it much easier to >>>>>> understand the use case and consider solutions. >>>>>> >>>>>> If you can make the changes directly on the FDT instead of on the >>>>>> expanded devicetree, then you could move to the new API. >>>>> >>>>> Are there some examples/references on how to edit FDTs in-place in the >>>>> kernel? I'd like to avoid writing the n-th FDT parser/generator. >>>> >>>> I don't know of any existing in-kernel edits of the FDT (but they might >>>> exist). The functions to access an FDT are in libfdt, which is in >>>> scripts/dtc/libfdt/. >>> >>> Let's please not go down that route of doing FDT modifications. There >>> is little reason to other than for early boot changes. And it is much >>> easier to work on unflattened trees. >> >> I just briefly looked into libfdt, and it would have meant building it >> into the module as there are no library functions exported by the kernel >> either. Another reason to drop that. >> >> What's apparently working now is the pattern I initially suggested: >> Register template with status = "disabled" as overlay, then prepare and >> apply changeset that contains all needed modifications and sets the >> status to "ok". I might be leaking additional resources, but to find >> that out, I will now finally have to resolve clean unbinding of the >> generic PCI host controller [1] first. > > static void free_overlay_changeset(struct overlay_changeset *ovcs) > { > [...] > /* > * TODO > * > * would like to: kfree(ovcs->overlay_tree); > * but can not since drivers may have pointers into this data > * > * would like to: kfree(ovcs->fdt); > * but can not since drivers may have pointers into this data > */ > > kfree(ovcs); > } > > What's this? I have kmemleak now jumping at me over this. Who is suppose > to plug these leaks? The caller of of_overlay_fdt_apply has no pointers > to those objects. I would say that's a regression of the new API. The problem already existed but it was hidden. We have never been able to kfree() these object because we do not know if there are any pointers into these objects. The new API makes the problem visible to kmemleak. The reason that we do not know if there are any pointers into these objects is that devicetree access APIs return pointers into the devicetree internal data structures (that is, into the overlay unflattened devicetree). If we want to be able to do the kfree()s, we could change the devicetree access APIs. The reason that pointers into the overlay flattened tree (ovcs->fdt) are also exposed is that the overlay unflattened devicetree property values are pointers into the overlay fdt. ** This paragraph becomes academic (and not needed) if the fix in the next paragraph can be implemented. ** I _think_ that the fdt issue __for overlays__ can be fixed somewhat easily. (I would want to read through the code again to make sure I'm not missing any issues.) If the of_fdt_unflatten_tree() called by of_overlay_fdt_apply() was modified so that property values were copied into newly allocated memory and the live tree property pointers were set to the copy instead of to the value in the fdt, then I _think_ the fdt could be freed in of_overlay_fdt_apply() after calling of_overlay_apply(). The code that frees a devicetree would also have to be aware of this change -- I'm not sure if that leads to ugly complications or if it is easy. The other question to consider is whether to make the same change to of_fdt_unflatten_tree() when it is called in early boot to unflatten the base devicetree. Doing so would increase the memory usage of the live tree (we would not be able to free the base fdt after unflattening it because we make the fdt visible in /sys/firmware/fdt -- though _maybe_ that could be conditioned on CONFIG_KEXEC). But all of the complexity of that fix is _only_ because of_overlay_apply() and of_overlay_remove() call overlay_notify(), passing in the overlay unflattened devicetree (which has pointers into the overlay fdt). Pointers into the overlay unflattened devicetree are then passed to the notifiers. (Again, I may be missing some other place that the overlay unflattened devicetree is made visible to other code -- a more thorough reading of the code is needed.) If the notifiers could be modified to accept the changeset list instead of of pointers to the fragments in the overlay unflattened devicetree then there would be no possibility of the notifiers keeping a pointer into the overlay fdt. I do not know if this is a practical change for the notifiers -- there are no callers of of_overlay_notifier_register() in the mainline kernel source. My recollection is that the overlay notifiers were added for the fpga subsystem. Why is overlay_notify() the only issue related to unknown users having pointers into the overlay fdt? The answer is that the overlay code does not directly expose the overlay unflattened devicetree (and thus indirectly the overlay fdt) to the live devicetree -- when the overlay code creates the overlay changeset, it copies from the overlay unflattened devicetree and overlay fdt and only exposes pointers to the copies. And hopefully the issues with the overlay unflattened devicetree can be resolved in the same way as for the overlay fdt. -Frank