Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3313236ybi; Tue, 2 Jul 2019 05:50:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqzMoB/xBw2JdX3LsJhyUPgqYIYkMfkI2RBOz04DU/z3dlI7duPLVvN8fTsOl3tO2MWgfTBy X-Received: by 2002:a63:b10:: with SMTP id 16mr29912818pgl.336.1562071824460; Tue, 02 Jul 2019 05:50:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562071824; cv=none; d=google.com; s=arc-20160816; b=Ntq/IKmccMCcrVAsWeXn61dXq/kXB2G3PVfps/j1VC9F02Nm3gkOGlRcKYXoSX+QuV zawaMZsnaKpnOFRoXCnoQiZ+JCgJme9WvACCcy78XWoY7QTtEl6+YSTLO2HQf8/KCCoB FQXVJg3Fy7Bbb8QybgCpY86zdbGpCBwXZI1P6P5sSXdJ1SGK7O6nrSg7vpH/9ioSlbxO jkNECf2sadhlrTQsS34JFSr8N8nI72wN6Lzn1jfDwwR3A36Ff174F/I2jMgUl5momtU+ IYGohfKJgrnbHwunlLzFszBUakiKHXQ2vF7e+bod9MSrb87WM6wLpYI66szJ2DXURxIr PyEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :content-language:in-reply-to:mime-version:date:message-id:from :references:cc:to:subject; bh=QFqGAwMIsHGGtBPBnOvo50744kDSorV5Tle+D/3Dojo=; b=ANn65eea4+NOzmvc/NWxYI+bPMTTtuI8iYTLo0hwKUzeykhcWx1Ope3W0I8yTYJQjq jrLpbnUvGXNi4z/yEWWweJK+9TLxIjjGmAooSrZfF6kED7MmDTYLHPVRdTs2mUlLg6+S TLimEF2wQ8b0Hl95FKMaKzOxAbPRSi9HMoVYbZJvXqMA/ycPQDn96VK+XxemyZgTC06/ +gkNlZYwKqmCsSsT6s8x+7i5kaFS4gLunHwUm/Rq1jeXWGwXq/VCq4VOu7rS5DEAzOOe 5XHKK/6OZnOiYPBWGHHsea3hk3qu0XG2DyGgrhqDF8minP3wX1ZLBrLqfEfYtl/5BchQ PHOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=U4vb5pB7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j2si12244127plt.171.2019.07.02.05.50.09; Tue, 02 Jul 2019 05:50:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=U4vb5pB7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726831AbfGBMsA (ORCPT + 99 others); Tue, 2 Jul 2019 08:48:00 -0400 Received: from hqemgate15.nvidia.com ([216.228.121.64]:17418 "EHLO hqemgate15.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726362AbfGBMsA (ORCPT ); Tue, 2 Jul 2019 08:48:00 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqemgate15.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Tue, 02 Jul 2019 05:48:01 -0700 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Tue, 02 Jul 2019 05:47:57 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Tue, 02 Jul 2019 05:47:57 -0700 Received: from [10.24.70.16] (172.20.13.39) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 2 Jul 2019 12:47:51 +0000 Subject: Re: [PATCH v2] mdev: Send uevents around parent device registration To: Parav Pandit , Alex Williamson CC: "cohuck@redhat.com" , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" References: <156199271955.1646.13321360197612813634.stgit@gimli.home> <08597ab4-cc37-3973-8927-f1bc430f6185@nvidia.com> <20190701112442.176a8407@x1.home> <3b338e73-7929-df20-ca2b-3223ba4ead39@nvidia.com> <20190701140436.45eabf07@x1.home> <14783c81-0236-2f25-6193-c06aa83392c9@nvidia.com> <20190701234201.47b6f23a@x1.home> X-Nvconfidentiality: public From: Kirti Wankhede Message-ID: Date: Tue, 2 Jul 2019 18:17:41 +0530 MIME-Version: 1.0 In-Reply-To: X-Originating-IP: [172.20.13.39] X-ClientProxiedBy: HQMAIL107.nvidia.com (172.20.187.13) To HQMAIL107.nvidia.com (172.20.187.13) Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1562071681; bh=QFqGAwMIsHGGtBPBnOvo50744kDSorV5Tle+D/3Dojo=; h=X-PGP-Universal:Subject:To:CC:References:X-Nvconfidentiality:From: Message-ID:Date:MIME-Version:In-Reply-To:X-Originating-IP: X-ClientProxiedBy:Content-Type:Content-Language: Content-Transfer-Encoding; b=U4vb5pB7jZcWFlC5ABbXH6cXuT9L/87QUHdS48jMfdLoWszrW3i7FYEjCQE76+QBO a4BetUb+cz8Ml3Nwbc4Twfbc4RNNqhgTXWX5s+QFHQsJipdqCB0BhlxoYctVoC3tj3 Dkz2r8/8g/b8d6FHVk3y6to58d/iWiacA+dwCi4ISLSnPRt+XAJeXZyryH4lIo1yh8 f0NnXXXJAe6UXuTS47wETJRWqryIqZZiL2nf882yeORKgiMahArC22KPYVmawJyDO2 wuWnLToDTaGckyUoK2kY35i84ZyoXq4LSMwNF4ihN7oBxKpF/ChNmUyxQzCoJgN5hC wtlczNRQIW11Q== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/2/2019 12:43 PM, Parav Pandit wrote: > > >> -----Original Message----- >> From: linux-kernel-owner@vger.kernel.org > owner@vger.kernel.org> On Behalf Of Alex Williamson >> Sent: Tuesday, July 2, 2019 11:12 AM >> To: Kirti Wankhede >> Cc: cohuck@redhat.com; kvm@vger.kernel.org; linux-kernel@vger.kernel.org >> Subject: Re: [PATCH v2] mdev: Send uevents around parent device registration >> >> On Tue, 2 Jul 2019 10:25:04 +0530 >> Kirti Wankhede wrote: >> >>> On 7/2/2019 1:34 AM, Alex Williamson wrote: >>>> On Mon, 1 Jul 2019 23:20:35 +0530 >>>> Kirti Wankhede wrote: >>>> >>>>> On 7/1/2019 10:54 PM, Alex Williamson wrote: >>>>>> On Mon, 1 Jul 2019 22:43:10 +0530 >>>>>> Kirti Wankhede wrote: >>>>>> >>>>>>> On 7/1/2019 8:24 PM, Alex Williamson wrote: >>>>>>>> This allows udev to trigger rules when a parent device is >>>>>>>> registered or unregistered from mdev. >>>>>>>> >>>>>>>> Signed-off-by: Alex Williamson >>>>>>>> --- >>>>>>>> >>>>>>>> v2: Don't remove the dev_info(), Kirti requested they stay and >>>>>>>> removing them is only tangential to the goal of this change. >>>>>>>> >>>>>>> >>>>>>> Thanks. >>>>>>> >>>>>>> >>>>>>>> drivers/vfio/mdev/mdev_core.c | 8 ++++++++ >>>>>>>> 1 file changed, 8 insertions(+) >>>>>>>> >>>>>>>> diff --git a/drivers/vfio/mdev/mdev_core.c >>>>>>>> b/drivers/vfio/mdev/mdev_core.c index ae23151442cb..7fb268136c62 >>>>>>>> 100644 >>>>>>>> --- a/drivers/vfio/mdev/mdev_core.c >>>>>>>> +++ b/drivers/vfio/mdev/mdev_core.c >>>>>>>> @@ -146,6 +146,8 @@ int mdev_register_device(struct device *dev, >>>>>>>> const struct mdev_parent_ops *ops) { >>>>>>>> int ret; >>>>>>>> struct mdev_parent *parent; >>>>>>>> + char *env_string = "MDEV_STATE=registered"; >>>>>>>> + char *envp[] = { env_string, NULL }; >>>>>>>> >>>>>>>> /* check for mandatory ops */ >>>>>>>> if (!ops || !ops->create || !ops->remove || >>>>>>>> !ops->supported_type_groups) @@ -197,6 +199,8 @@ int >> mdev_register_device(struct device *dev, const struct mdev_parent_ops *ops) >>>>>>>> mutex_unlock(&parent_list_lock); >>>>>>>> >>>>>>>> dev_info(dev, "MDEV: Registered\n"); >>>>>>>> + kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); >>>>>>>> + >>>>>>>> return 0; >>>>>>>> >>>>>>>> add_dev_err: >>>>>>>> @@ -220,6 +224,8 @@ EXPORT_SYMBOL(mdev_register_device); >>>>>>>> void mdev_unregister_device(struct device *dev) { >>>>>>>> struct mdev_parent *parent; >>>>>>>> + char *env_string = "MDEV_STATE=unregistered"; >>>>>>>> + char *envp[] = { env_string, NULL }; >>>>>>>> >>>>>>>> mutex_lock(&parent_list_lock); >>>>>>>> parent = __find_parent_device(dev); @@ -243,6 +249,8 @@ >> void >>>>>>>> mdev_unregister_device(struct device *dev) >>>>>>>> up_write(&parent->unreg_sem); >>>>>>>> >>>>>>>> mdev_put_parent(parent); >>>>>>>> + >>>>>>>> + kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); >>>>>>> >>>>>>> mdev_put_parent() calls put_device(dev). If this is the last >>>>>>> instance holding device, then on put_device(dev) dev would get freed. >>>>>>> >>>>>>> This event should be before mdev_put_parent() >>>>>> >>>>>> So you're suggesting the vendor driver is calling >>>>>> mdev_unregister_device() without a reference to the struct device >>>>>> that it's passing to unregister? Sounds bogus to me. We take a >>>>>> reference to the device so that it can't disappear out from under >>>>>> us, the caller cannot rely on our reference and the caller >>>>>> provided the struct device. Thanks, >>>>>> >>>>> >>>>> 1. Register uevent is sent after mdev holding reference to device, >>>>> then ideally, unregister path should be mirror of register path, >>>>> send uevent and then release the reference to device. >>>> >>>> I don't see the relevance here. We're marking an event, not >>>> unwinding state of the device from the registration process. >>>> Additionally, the event we're trying to mark is the completion of >>>> each process, so the notion that we need to mirror the ordering between >> the two is invalid. >>>> >>>>> 2. I agree that vendor driver shouldn't call >>>>> mdev_unregister_device() without holding reference to device. But >>>>> to be on safer side, if ever such case occur, to avoid any >>>>> segmentation fault in kernel, better to send event before mdev release the >> reference to device. >>>> >>>> I know that get_device() and put_device() are GPL symbols and that's >>>> a bit of an issue, but I don't think we should be kludging the code >>>> for a vendor driver that might have problems with that. A) we're >>>> using the caller provided device for the uevent, B) we're only >>>> releasing our own reference to the device that was acquired during >>>> registration, the vendor driver must have other references, >>> >>> Are you going to assume that someone/vendor driver is always going to >>> do right thing? >> >> mdev is a kernel driver, we make reasonable assumptions that other drivers >> interact with it correctly. >> > That is right. > Vendor drivers must invoke mdev_register_device() and mdev_unregister_device() only once. > And it must have a valid reference to the device for which it is invoking it. > This is basic programming practice that a given driver has to follow. > mdev_register_device() has a loop to check. It needs to WARN_ON there if there are duplicate registration. > Similarly on mdev_unregister_device() to have WARN_ON if device is not found. If assumption is vendor driver is always going to do right way, then why need check for duplicate registration? vendor driver is always going to do it right way, right? > It was in my TODO list to submit those patches. > I was still thinking to that mdev_register_device() should return mdev_parent and mdev_unregister_device() should accept mdev_parent pointer, instead of WARN_ON on unregister(). > > >>>> C) the parent device >>>> generally lives on a bus, with a vendor driver, there's an entire >>>> ecosystem of references to the device below mdev. Is this a >>>> paranoia request or are you really concerned that your PCI device suddenly >>>> disappears when mdev's reference to it disappears. >>> >>> mdev infrastructure is not always used by PCI devices. It is designed >>> to be generic, so that other devices (other than PCI devices) can also >>> use this framework. >> >> Obviously mdev is not PCI specific, I only mention it because I'm asking if you >> have a specific concern in mind. If you did, I'd assume it's related to a PCI >> backed vGPU. Its not always good to assume certain things. >> Any physical parent device of an mdev is likely to have some sort >> of bus infrastructure behind it holding references to the device (ie. a probe and >> release where an implicit reference is held between these points). A virtual >> device would be similar, it's created as part of a module init and destroyed as >> part of a module exit, where mdev registration would exist between these >> points. >> >>> If there is a assumption that user of mdev framework or vendor drivers >>> are always going to use mdev in right way, then there is no need for >>> mdev core to held reference of the device? >>> This is not a "paranoia request". This is more of a ideal scenario, >>> mdev should use device by holding its reference rather than assuming >>> (or relying on) someone else holding the reference of device. >> >> In fact, at one point Parav was proposing removing these references entirely, >> but Connie and I both felt uncomfortable about that. I think it's good practice >> that mdev indicates the use of the parent device by incrementing the reference >> count, with each child mdev device also taking a reference, but those >> references balance out within the mdev core. Their purpose is not to maintain >> the device for outside callers, nor should outside callers assume mdev's use of >> references to release their own. I don't think it's unreasonable to assume that >> the caller should have a legitimate reference to the object it's providing to this >> function and therefore we should be able to use it after mdev's internal >> references are balanced out. Thanks, >> I'm not fully convinced with what is the advantage of sending uevent after releasing reference to device or disadvantage of sending uevent before releasing reference to device. Still if you want to go ahead with this change, please add a check or assert if (dev != NULL) and add an comment highlighting the assumption. Thanks, Kirti