Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp2576901rdb; Fri, 8 Dec 2023 12:08:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IGsTW3sX/0PJBDyEG7XO4zVWZ3GBtxmvT7lyVEaBwtvwG2oExrmFaPkAei838wll1b/Ha7c X-Received: by 2002:a17:902:c406:b0:1d0:44f6:ccb9 with SMTP id k6-20020a170902c40600b001d044f6ccb9mr552069plk.65.1702066133684; Fri, 08 Dec 2023 12:08:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702066133; cv=none; d=google.com; s=arc-20160816; b=J9Wre2GEi9GiRBCNJgF28o04KpccJeVRosYaaYJNA8fg6qIEhhcMDWoB9xUg4l1x0g XzcX1qk6KEFF2RuAo/TyNuznvA/0l1vs0zpg40yaebuIhfCl3w5YBOcMB4tM6pxGe7Gm 0ltW4ZLgy8mbbFcn/tAAc2K6y4JmP7LswjnXZ6Uwx9qZuKVfipTEsZLtmCPfjsNxwAHQ MARt364/F51J8g/txwsBxgK2WRMeEFyLQMCtC0NILVzP7kni8+jd+9Mic2mzK7DbWkgn p3dMg1k+MWHd4xkArSHAikmSZql6+0xB+0x4mXx4N/xAFWxcv6oveyst4amdX/1YvrEB GhYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:subject:from:user-agent :mime-version:date:message-id:dkim-signature; bh=vbUydnrXhVSmCz0/LKzXohrdr/oWo7h1yxnSiq7vXxY=; fh=khTdURk7KyF7NXcxf1LT83Xf8Pbii4+5IhSBmEzrYdw=; b=YZO5kIUZ0k32DP65Z3cUHi0HqBTv63MHPYNARr/MIbuYezq701fVyHR/t5MI11LUJw ing7l2IfjTxS8zhm4pZQv7pZpGvskbR/Nuh59r6ddtZc/MJsm+gU2R+FOlZ4ZF7Y2WKU 2v4DsMlrD9q67QmyQjRfcho+EycaAGRRlWXgbOz9zMDqu7LRcjJRU31Uf0spLhiDT86Z FidISt0A3/Y8LtjMquKiyvqrJ83EHSi7LQ+pItvJl6NS5aEbQJrpznQ7Ailyto4iueSO h3wQVYXeFdQnB5uasovL67hLat7XO2G1q5hZRjceyamGfcugS0hhLna4LuoYYhqSo0bF vc0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WSDkv8Wz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id c16-20020a170903235000b001d08a8c56a7si2086251plh.279.2023.12.08.12.08.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Dec 2023 12:08:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WSDkv8Wz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 553F882662EB; Fri, 8 Dec 2023 12:08:49 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1574688AbjLHUIa (ORCPT + 99 others); Fri, 8 Dec 2023 15:08:30 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52728 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234276AbjLHUIY (ORCPT ); Fri, 8 Dec 2023 15:08:24 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D0FF81BDF for ; Fri, 8 Dec 2023 12:08:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702066104; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=vbUydnrXhVSmCz0/LKzXohrdr/oWo7h1yxnSiq7vXxY=; b=WSDkv8Wzx5kS3MOBaz7cfy4CBQxvtAOWOpzBrSEkaB3Y4CqG+lCZhbeequy1Qb3MevedN3 0vtmdRd8oM2i/EswNinCqnS0jZK9o71H7XDd6w9mctJgj1db+XlNclXE58JI1Uoax4pQZM EDafkN3vykzu8YwIGVwTmPGDsqo0YQo= Received: from mail-qk1-f198.google.com (mail-qk1-f198.google.com [209.85.222.198]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-655-bEEIHdq7N8efTd5njXTk1Q-1; Fri, 08 Dec 2023 15:08:23 -0500 X-MC-Unique: bEEIHdq7N8efTd5njXTk1Q-1 Received: by mail-qk1-f198.google.com with SMTP id af79cd13be357-77dcbb52f2dso240504185a.1 for ; Fri, 08 Dec 2023 12:08:22 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702066102; x=1702670902; h=content-transfer-encoding:in-reply-to:content-language:references :cc:to:subject:from:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=vbUydnrXhVSmCz0/LKzXohrdr/oWo7h1yxnSiq7vXxY=; b=HHcfiePMmkrSmP+0vFPrSW+w+DnlWwOfYHvJDOKNGKM6h861sGpKqJ5VurYdCtO3ml uafFoOmyK708rf5yjtlIgPNVYbxfT1sFZmksGyUPifWMH9kCG1NS7VpPaJtMnrvbIEPu Kf/Htgm63RyptL9JDBPftw8W6TXQlSjXBSPPhiRhJTH093yXjSfbV/KfcC1Ptfm9VYxP clMJDP9Eeh1utrjP1NKMPJjmQeWjIiUCgmXNxmUSb/impt9wlq+pwYbRI11dQsEejLUU ZwxCPI/Wo9vAl5uZ/u0UBMHgpmT5vHDMaBtfObXarV0AhuRKUz9gTJXIKn9BJtHAvMTu 3AjQ== X-Gm-Message-State: AOJu0YyjNOa2MYJhntqGktaLBfH87//ytpKlB2MYBhieLLwGfJcKScxp i95RVf1FEmxx4jinzB+40hnv2x4NoJghyyTe3NntLLW0FgYot2s4i/nCMgqy/s7Y0PGO8rBRSuW scKAg4tu5Zb/LtF4IP6t7z9c= X-Received: by 2002:a05:620a:2946:b0:77e:fba3:4f08 with SMTP id n6-20020a05620a294600b0077efba34f08mr694297qkp.94.1702066102408; Fri, 08 Dec 2023 12:08:22 -0800 (PST) X-Received: by 2002:a05:620a:2946:b0:77e:fba3:4f08 with SMTP id n6-20020a05620a294600b0077efba34f08mr694287qkp.94.1702066102032; Fri, 08 Dec 2023 12:08:22 -0800 (PST) Received: from [192.168.9.34] (net-2-34-30-38.cust.vodafonedsl.it. [2.34.30.38]) by smtp.gmail.com with ESMTPSA id re22-20020a05620a8e1600b0077891d2d12dsm928398qkn.43.2023.12.08.12.08.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 08 Dec 2023 12:08:21 -0800 (PST) Message-ID: <5a8819ad-3551-475e-a645-1a300d3373f1@redhat.com> Date: Fri, 8 Dec 2023 21:08:17 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird From: Marco Pagani Subject: Re: [RFC PATCH v2 1/2] fpga: add a module owner field to fpga_manager and fpga_manager_ops To: Xu Yilun Cc: Moritz Fischer , Wu Hao , Xu Yilun , Tom Rix , Greg Kroah-Hartman , linux-kernel@vger.kernel.org, linux-fpga@vger.kernel.org References: <20231124162807.238724-1-marpagan@redhat.com> <20231124162807.238724-2-marpagan@redhat.com> <7004d215-5185-4cce-a51e-42e131a30453@redhat.com> Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 08 Dec 2023 12:08:49 -0800 (PST) On 2023-12-02 13:16, Xu Yilun wrote: > On Thu, Nov 30, 2023 at 11:42:36AM +0100, Marco Pagani wrote: >> >> >> On 2023-11-25 10:11, Xu Yilun wrote: >>> On Fri, Nov 24, 2023 at 05:28:06PM +0100, Marco Pagani wrote: >>>> Add a module *owner field to the fpga_manager_ops and fpga_manager >>>> structs to protect the fpga manager against the unloading of the >>>> low-level control module while someone is holding a reference to the >>>> manager device. Low-level control modules should statically set the >>>> owner field of the fpga_manager_ops struct to THIS_MODULE. Then, when >>>> the manager is registered using fpga_mgr_register(), the value is copied >>>> into the owner field of the fpga_manager struct (that contains the >>>> device context). In this way, the manager can later use it in >>>> fpga_mgr_get() to take the low-level module's refcount. To prevent races >>>> while unloading the low-level control module, fpga_mgr_get() and part of >>>> the fpga_mgr_unregister() methods are protected with a mutex. >>>> >>>> Other changes: move put_device() from __fpga_mgr_get() to fpga_mgr_get() >>>> and of_fpga_mgr_get() to improve code clarity. >>>> >>>> Fixes: 654ba4cc0f3e ("fpga manager: ensure lifetime with of_fpga_mgr_get") >>>> Signed-off-by: Marco Pagani >>>> --- >>>> drivers/fpga/fpga-mgr.c | 56 +++++++++++++++++++++++++---------- >>>> include/linux/fpga/fpga-mgr.h | 4 +++ >>>> 2 files changed, 44 insertions(+), 16 deletions(-) >>>> >>>> diff --git a/drivers/fpga/fpga-mgr.c b/drivers/fpga/fpga-mgr.c >>>> index 06651389c592..608605d59860 100644 >>>> --- a/drivers/fpga/fpga-mgr.c >>>> +++ b/drivers/fpga/fpga-mgr.c >>>> @@ -21,6 +21,8 @@ >>>> static DEFINE_IDA(fpga_mgr_ida); >>>> static const struct class fpga_mgr_class; >>>> >>>> +static DEFINE_MUTEX(mgr_lock); >>>> + >>>> struct fpga_mgr_devres { >>>> struct fpga_manager *mgr; >>>> }; >>>> @@ -667,17 +669,15 @@ ATTRIBUTE_GROUPS(fpga_mgr); >>>> static struct fpga_manager *__fpga_mgr_get(struct device *dev) >>>> { >>>> struct fpga_manager *mgr; >>>> + struct module *owner; >>>> >>>> mgr = to_fpga_manager(dev); >>>> + owner = mgr->owner; >>>> >>>> - if (!try_module_get(dev->parent->driver->owner)) >>>> - goto err_dev; >>>> + if (owner && !try_module_get(owner)) >>> >>> No need to test owner == NULL, try_module_get() does this. >> >> You are right. I'll remove it in the next version. >> >>> >>>> + mgr = ERR_PTR(-ENODEV); >>>> >>>> return mgr; >>>> - >>>> -err_dev: >>>> - put_device(dev); >>>> - return ERR_PTR(-ENODEV); >>>> } >>>> >>>> static int fpga_mgr_dev_match(struct device *dev, const void *data) >>>> @@ -693,12 +693,22 @@ static int fpga_mgr_dev_match(struct device *dev, const void *data) >>>> */ >>>> struct fpga_manager *fpga_mgr_get(struct device *dev) >>>> { >>>> - struct device *mgr_dev = class_find_device(&fpga_mgr_class, NULL, dev, >>>> - fpga_mgr_dev_match); >>>> + struct fpga_manager *mgr = ERR_PTR(-ENODEV); >>>> + struct device *mgr_dev; >>>> + >>>> + mutex_lock(&mgr_lock); >>>> + >>>> + mgr_dev = class_find_device(&fpga_mgr_class, NULL, dev, fpga_mgr_dev_match); >>>> if (!mgr_dev) >>>> - return ERR_PTR(-ENODEV); >>>> + goto out; >>>> + >>>> + mgr = __fpga_mgr_get(mgr_dev); >>>> + if (IS_ERR(mgr)) >>>> + put_device(mgr_dev); >>>> >>>> - return __fpga_mgr_get(mgr_dev); >>>> +out: >>>> + mutex_unlock(&mgr_lock); >>>> + return mgr; >>>> } >>>> EXPORT_SYMBOL_GPL(fpga_mgr_get); >>>> >>>> @@ -711,13 +721,22 @@ EXPORT_SYMBOL_GPL(fpga_mgr_get); >>>> */ >>>> struct fpga_manager *of_fpga_mgr_get(struct device_node *node) >>>> { >>>> - struct device *dev; >>>> + struct fpga_manager *mgr = ERR_PTR(-ENODEV); >>>> + struct device *mgr_dev; >>>> + >>>> + mutex_lock(&mgr_lock); >>>> + >>>> + mgr_dev = class_find_device_by_of_node(&fpga_mgr_class, node); >>>> + if (!mgr_dev) >>>> + goto out; >>>> >>>> - dev = class_find_device_by_of_node(&fpga_mgr_class, node); >>>> - if (!dev) >>>> - return ERR_PTR(-ENODEV); >>>> + mgr = __fpga_mgr_get(mgr_dev); >>>> + if (IS_ERR(mgr)) >>>> + put_device(mgr_dev); >>>> >>>> - return __fpga_mgr_get(dev); >>>> +out: >>>> + mutex_unlock(&mgr_lock); >>>> + return mgr; >>>> } >>>> EXPORT_SYMBOL_GPL(of_fpga_mgr_get); >>>> >>>> @@ -727,7 +746,7 @@ EXPORT_SYMBOL_GPL(of_fpga_mgr_get); >>>> */ >>>> void fpga_mgr_put(struct fpga_manager *mgr) >>>> { >>>> - module_put(mgr->dev.parent->driver->owner); >>>> + module_put(mgr->owner); >>>> put_device(&mgr->dev); >>>> } >>>> EXPORT_SYMBOL_GPL(fpga_mgr_put); >>>> @@ -806,6 +825,7 @@ fpga_mgr_register_full(struct device *parent, const struct fpga_manager_info *in >>>> >>>> mgr->name = info->name; >>>> mgr->mops = info->mops; >>>> + mgr->owner = info->mops->owner; >>>> mgr->priv = info->priv; >>>> mgr->compat_id = info->compat_id; >>>> >>>> @@ -888,7 +908,11 @@ void fpga_mgr_unregister(struct fpga_manager *mgr) >>>> */ >>>> fpga_mgr_fpga_remove(mgr); >>>> >>>> + mutex_lock(&mgr_lock); >>>> + >>>> device_unregister(&mgr->dev); >>>> + >>>> + mutex_unlock(&mgr_lock); >>> >>> Why this part should be protected rather than the whole >>> fpga_mgr_unregister()? >>> >> >> Protecting the fpga_remove() op seems unnecessary to me because it >> does not affect the manager device's lifetime. Moreover, it may hold >> the mutex for a long time since it was intended to interact with the >> hardware to put it in a specific state before removing the driver. >> >>> I feel the scope of the protection is unclear to me in this patch. What >>> data should be protected from concurrent access by this mutex? From the >>> code seems the racing of mgr dev should be protected but apparently it >>> doesn't have to. >> >> The mutex is there to ensure the lifetime of the manager device and >> its context (struct fpga_manager) if fpga_mgr_get() happens to run >> concurrently with the removal of the low-level module. >> >>> >>> And with this mutex, the get/put/unregister() for one mgr should be >>> exclusive with another mgr, but that also seems not necessary. >>> >> >> I decided to use a static mutex because I thought putting the mutex >> in the manager's context would be unsafe since its life would be tied >> to the manager's life. For instance, consider the following sequence: >> >> - A removes the low-level control module, and delete_module progresses >> up to the point when it calls the module's exit function, which in turn >> calls fpga_mgr_unregister(). >> >> - fpga_mgr_unregister() takes the mutex but gets descheduled before >> completing the unregistering of the manager device. >> >> - Meanwhile, B wants to get the manager (it is still there) and calls >> fpga_mgr_get(), which tries to take the mutex but gets suspended since >> it is held by A. >> >> - A resumes and fpga_mgr_unregister() releases the manager device and > > The lifecycle of the manager device is not entirely decided by > fpga_mgr_unregister(), this func just puts/decreases the device > refcount. Right, but here I'm considering the case where no one has previously taken the manager device. In that specific case, the refcount will be decremented to zero, and the device (with its context) will be released. However, you got me thinking about how the mutex is causing the problem in this case. > > Remember fpga_mgr_get() gets the device via > class_find_device()->get_device(). I assume if the valid device pointer > could be returned by class_find_device(), it would never be released by > other nice players. So I have no worry about the per manager mutex. > >> its context, including the mutex on which B is suspended. >> >> We could mitigate this specific case using mutex_trylock(). However, >> there will still be other problematic cases, like if fpga_mgr_get() >> gets suspended right before taking the mutex and then delete_module >> proceeds up to when fpga_mgr_unregister() frees the manager device >> and its context. >> >>> I think the mgr->owner & mgr->ops should be protected from concurrent >>> access of delete_module & fpga_mgr_get/put(), so how about: >>> >>> struct fpga_manager_ops { >>> struct module *owner; >>> ... >>> }; >>> >>> struct fpga_manager { >>> ... >>> struct mutex mops_lock; >>> const struct fpga_manager_ops *mops; >>> ... >>> }; >>> >>> >>> static struct fpga_manager *__fpga_mgr_get(struct device *dev) >>> { >>> struct fpga_manager *mgr; >>> >>> mgr = to_fpga_manager(dev); >>> >>> mutex_lock(&mgr->mops_lock); >>> >>> if (!mgr->mops || !try_module_get(mgr->mops->owner)) >>> mgr = ERR_PTR(-ENODEV); >>> >>> mutex_unlock(&mgr->mops_lock); >>> >>> return mgr; >>> } >>> >>> void fpga_mgr_unregister(struct fpga_manager *mgr) >>> { >>> fpga_mgr_fpga_remove(mgr); >>> >>> mutex_lock(&mgr->ops_lock); >>> mgr->mops = NULL; >>> mutex_unlock(&mgr->ops_lock); >>> >>> device_unregister(&mgr->dev); >>> } >>> >>> Not actually tested. >>> >> >> I think protecting the only the ops is not enough for the same reasons. >> If fpga_mgr_get() gets suspended right after class_find_device(),and >> meanwhile the low-level module is removed, it resumes with a reference >> to a manager device that no longer exists. >> >> In a certain sense, however, using a mutex seems like a mitigation >> that does not solve the problem at its root. I honestly still think >> that taking the module's refcount right when registering the manager >> is the only way that is both safe and robust against code changes. > > I would nak either. As mentioned above, that makes rmmod vendor module > impossible. Introducing another user interface to release the module's > refcount is also a bad idea. Who decides to take the ref, who releases > it. A user has no knowledge of what is happening inside and should not > enforce. > >> However, my proposal was rejected. >> >> So, if you prefer, I can drop the mutex entirely in the next version, >> and we leave the responsibility of keeping all kernel pieces to the > > No, please try to fix it. Could you please reconsider my proposal? > I have considered it and thought about it. However, I don't think we need a mutex to protect mgr->mops. This is because the low-level module's refcount has already been decremented when fpga_mgr_unregister() is called by the module's exit function. So, when we get to the point of executing fpga_mgr_unregister(), any concurrent call to try_module_get() will fail (if no one has taken the module before) without the need to check mops first. If we assume (as you pointed out) that class_find_device() can be safely executed concurrently with device_unregister() (returning either a valid dev pointer or null) and, consequently, the manager context is guaranteed to exist after that point. Then, we should be good without the mutex if we call try_module_get() on a copy of the owner pointer stored in the manager context. >> user. It will still be an improvement over taking the low-level >> module's refcount through the parent device's driver pointer. >> Thanks, Marco