Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp4054272rdh; Fri, 29 Sep 2023 09:39:59 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGYCpg5sURK0fHn1yaqZ8j1p/fbhIIe/hzOmYG+PStVANpfcgypOrl74aL2B80cc3UMWK/J X-Received: by 2002:a17:902:9b8e:b0:1c6:845:27c5 with SMTP id y14-20020a1709029b8e00b001c6084527c5mr4474479plp.61.1696005598956; Fri, 29 Sep 2023 09:39:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696005598; cv=none; d=google.com; s=arc-20160816; b=01layTFVzrA0KpE79MLbSxPaDQXYzk/W/HXeB2pdjO4oeXNxESKwXynPlyZNxllGvt o+9mPHbNVW/vgFYq66Eyds+6r+ZB8HH6CaS7B/Fh1k9p+F/q551PXqY1fr+ZwVgDkVoJ Dlkhi14TjRn4Ou2aoEHzUhsEv4FlrnJ6hrVsCOS2OEf6hc5Qvc0VATpvKUQ/n+yfmUVO ZdDF+zY13Mk4fw3rsNhhxqsXeXDBi6aWwWpkAqGcR1+QkwIYCd1IOnbMOBd7218/ZIbP /yXm04qfUVbFmw3y0ckQdiwECu1vcOyhbzzJzR4lEJPPZMFm9OUtVWso7LiiFFcLVoYf LoYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=LxOVkqV6g+jQpN5bPhd9zKnvwGlEWf0RQgwNMVx6MWg=; fh=76/2EbnIhkCye407T3bAmdPmb9vuH/8Af3wrgnfvwCo=; b=we+ZNgPtQm/p/2kO/krRGrEGTcQdzKAbivQsvDFfCjt+Lg6GphtpwK9ZFktZBYF2CD ovqPXj4LoW/Awi1SW2lJ0/uc/BmY96UpH/2ds8C2o7beL9zx/J4ZxRTik2AP1DnPZDV7 iCGIr4tuH6KSpxgJahHM5b6KMG3KP3p6elJkeeNZPOVjea4pNPMwcPtjJZERrDFy7Itk Fp+p8uiSioCfnXRsIzt4M3o154ZBlSyUQnEdCR0sJ9uC4ZUZbknWD9OanuA/dH1l3zoK zYWgcq44og/iA2g6D0FODXnZ+bpBNgP27jPuRavtnRsaxgg7iCk5WrDonNvLN+UG2PN7 cGkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=YVd6EteG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id h4-20020a170902680400b001c62d935854si9755090plk.614.2023.09.29.09.39.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 09:39:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=YVd6EteG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id C70C582C7B52; Fri, 29 Sep 2023 08:23:16 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233607AbjI2PXD (ORCPT + 99 others); Fri, 29 Sep 2023 11:23:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34680 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233599AbjI2PWa (ORCPT ); Fri, 29 Sep 2023 11:22:30 -0400 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A32EC10D2; Fri, 29 Sep 2023 08:22:26 -0700 (PDT) Received: from pps.filterd (m0279867.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 38TEPGn0015894; Fri, 29 Sep 2023 15:22:21 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=LxOVkqV6g+jQpN5bPhd9zKnvwGlEWf0RQgwNMVx6MWg=; b=YVd6EteGFCTn7QQVQ/yMizKd2/QWhElH1kjIvu4IFSD0QwNMAv4uUnyQUznDcor8tj/4 D2yzqO69RH9dIHW0YsxhxIfsnrbqKoV/j224/LS+1uENUO78GqbpgetQj3naKo51Ce1p HHyBrfW+0kDlG3ZjcAsiGdE3xPPCeCq3ZJ8IjFx9+pOEiZOrNoXMFJSZITa5w9j2jSig S94D0z6dGsbeN0yO5tIm8s516FrxC8fcK4iYMGYfwz9Pvk2EIHH+zZTPXEEJ1Xubo+5Y OyMw51JAY8GJA1lwDDrwxbbwKE7I+VTZ1MreAIC3y5Bfn0/OheSo1lAQLGpUxruZvNpo tw== Received: from nalasppmta05.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3te0avr5nq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Sep 2023 15:22:21 +0000 Received: from nalasex01a.na.qualcomm.com (nalasex01a.na.qualcomm.com [10.47.209.196]) by NALASPPMTA05.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 38TFMK1S025965 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Sep 2023 15:22:20 GMT Received: from [10.226.59.182] (10.80.80.8) by nalasex01a.na.qualcomm.com (10.47.209.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.36; Fri, 29 Sep 2023 08:22:19 -0700 Message-ID: Date: Fri, 29 Sep 2023 09:22:19 -0600 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.0 Subject: Re: [PATCH v2 1/2] bus: mhi: host: Add spinlock to protect WP access when queueing TREs Content-Language: en-US To: Qiang Yu , CC: , , , , References: <1694594861-12691-1-git-send-email-quic_qianyu@quicinc.com> <1694594861-12691-2-git-send-email-quic_qianyu@quicinc.com> From: Jeffrey Hugo In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nalasex01a.na.qualcomm.com (10.47.209.196) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: XcW2_6Z0OPJGF239HwCIeJQsshMGH5oM X-Proofpoint-ORIG-GUID: XcW2_6Z0OPJGF239HwCIeJQsshMGH5oM X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.980,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-09-29_13,2023-09-28_03,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 spamscore=0 impostorscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999 suspectscore=0 adultscore=0 clxscore=1015 malwarescore=0 phishscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2309180000 definitions=main-2309290132 X-Spam-Status: No, score=-4.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Fri, 29 Sep 2023 08:23:16 -0700 (PDT) On 9/24/2023 9:10 PM, Qiang Yu wrote: > > On 9/22/2023 10:44 PM, Jeffrey Hugo wrote: >> On 9/13/2023 2:47 AM, Qiang Yu wrote: >>> From: Bhaumik Bhatt >>> >>> Protect WP accesses such that multiple threads queueing buffers for >>> incoming data do not race and access the same WP twice. Ensure read and >>> write locks for the channel are not taken in succession by dropping the >>> read lock from parse_xfer_event() such that a callback given to client >>> can potentially queue buffers and acquire the write lock in that >>> process. >>> Any queueing of buffers should be done without channel read lock >>> acquired >>> as it can result in multiple locks and a soft lockup. >>> >>> Signed-off-by: Bhaumik Bhatt >>> Signed-off-by: Qiang Yu >>> --- >>>   drivers/bus/mhi/host/main.c | 11 ++++++++++- >>>   1 file changed, 10 insertions(+), 1 deletion(-) >>> >>> diff --git a/drivers/bus/mhi/host/main.c b/drivers/bus/mhi/host/main.c >>> index dcf627b..13c4b89 100644 >>> --- a/drivers/bus/mhi/host/main.c >>> +++ b/drivers/bus/mhi/host/main.c >>> @@ -642,6 +642,7 @@ static int parse_xfer_event(struct mhi_controller >>> *mhi_cntrl, >>>               mhi_del_ring_element(mhi_cntrl, tre_ring); >>>               local_rp = tre_ring->rp; >>>   +            read_unlock_bh(&mhi_chan->lock); >> >> This doesn't work due to the write_lock_irqsave(&mhi_chan->lock, >> flags); on line 591. > Write_lock_irqsave(&mhi_chan->lock, flags) is used in case of ev_code >= > MHI_EV_CC_OOB. We only read_lock/read_unlock the mhi_chan while ev_code > < MHI_EV_CC_OOB. Sorry. OOB != EOB >> >> I really don't like that we are unlocking the mhi_chan while still >> using it.  It opens up a window where the mhi_chan state can be >> updated between here and the client using the callback to queue a buf. >> >> Perhaps we need a new lock that just protects the wp, and needs to be >> only grabbed while mhi_chan->lock is held? > > Since we have employed mhi_chan lock to protect the channel and what we > are concerned here is that client may queue buf to a disabled or stopped > channel, can we check channel state after getting mhi_chan->lock like > line 595. > > We can add the check after getting write lock in mhi_gen_tre() and after > getting read lock again here. I'm not sure that is sufficient. After you unlock to notify the client, MHI is going to manipulate the packet count and runtime_pm without the lock (648-652). It seems like that adds additional races which won't be covered by the additional check you propose. > >> >>>               /* notify client */ >>>               mhi_chan->xfer_cb(mhi_chan->mhi_dev, &result); >>>   @@ -667,6 +668,7 @@ static int parse_xfer_event(struct >>> mhi_controller *mhi_cntrl, >>>                       kfree(buf_info->cb_buf); >>>                   } >>>               } >>> +            read_lock_bh(&mhi_chan->lock); >>>           } >>>           break; >>>       } /* CC_EOT */ >>> @@ -1204,6 +1206,9 @@ int mhi_gen_tre(struct mhi_controller >>> *mhi_cntrl, struct mhi_chan *mhi_chan, >>>       int eot, eob, chain, bei; >>>       int ret; >>>   +    /* Protect accesses for reading and incrementing WP */ >>> +    write_lock_bh(&mhi_chan->lock); >>> + >>>       buf_ring = &mhi_chan->buf_ring; >>>       tre_ring = &mhi_chan->tre_ring; >>>   @@ -1221,8 +1226,10 @@ int mhi_gen_tre(struct mhi_controller >>> *mhi_cntrl, struct mhi_chan *mhi_chan, >>>         if (!info->pre_mapped) { >>>           ret = mhi_cntrl->map_single(mhi_cntrl, buf_info); >>> -        if (ret) >>> +        if (ret) { >>> +            write_unlock_bh(&mhi_chan->lock); >>>               return ret; >>> +        } >>>       } >>>         eob = !!(flags & MHI_EOB); >>> @@ -1239,6 +1246,8 @@ int mhi_gen_tre(struct mhi_controller >>> *mhi_cntrl, struct mhi_chan *mhi_chan, >>>       mhi_add_ring_element(mhi_cntrl, tre_ring); >>>       mhi_add_ring_element(mhi_cntrl, buf_ring); >>>   +    write_unlock_bh(&mhi_chan->lock); >>> + >>>       return 0; >>>   } >>