From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: Alice Ryhl <aliceryhl@google.com>
Cc: "Arnd Bergmann" <arnd@arndb.de>,
"Alexander Viro" <viro@zeniv.linux.org.uk>,
"Christian Brauner" <brauner@kernel.org>,
"Jan Kara" <jack@suse.cz>, "Miguel Ojeda" <ojeda@kernel.org>,
"Alex Gaynor" <alex.gaynor@gmail.com>,
"Boqun Feng" <boqun.feng@gmail.com>,
"Gary Guo" <gary@garyguo.net>,
"Björn Roy Baron" <bjorn3_gh@protonmail.com>,
"Benno Lossin" <benno.lossin@proton.me>,
"Andreas Hindborg" <a.hindborg@kernel.org>,
"Trevor Gross" <tmgross@umich.edu>, "Lee Jones" <lee@kernel.org>,
rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-fsdevel@vger.kernel.org
Subject: Re: [PATCH v2 2/2] rust: miscdevice: access the `struct miscdevice` from fops->open()
Date: Mon, 9 Dec 2024 09:48:43 +0100 [thread overview]
Message-ID: <2024120925-express-unmasked-76b4@gregkh> (raw)
In-Reply-To: <20241209-miscdevice-file-param-v2-2-83ece27e9ff6@google.com>
On Mon, Dec 09, 2024 at 07:27:47AM +0000, Alice Ryhl wrote:
> Providing access to the underlying `struct miscdevice` is useful for
> various reasons. For example, this allows you access the miscdevice's
> internal `struct device` for use with the `dev_*` printing macros.
>
> Note that since the underlying `struct miscdevice` could get freed at
> any point after the fops->open() call, only the open call is given
> access to it. To print from other calls, they should take a refcount on
> the device to keep it alive.
The lifespan of the miscdevice is at least from open until close, so
it's safe for at least then (i.e. read/write/ioctl/etc.)
> Signed-off-by: Alice Ryhl <aliceryhl@google.com>
> ---
> rust/kernel/miscdevice.rs | 19 ++++++++++++++++---
> 1 file changed, 16 insertions(+), 3 deletions(-)
>
> diff --git a/rust/kernel/miscdevice.rs b/rust/kernel/miscdevice.rs
> index 0cb79676c139..c5af1d5ec4be 100644
> --- a/rust/kernel/miscdevice.rs
> +++ b/rust/kernel/miscdevice.rs
> @@ -104,7 +104,7 @@ pub trait MiscDevice {
> /// Called when the misc device is opened.
> ///
> /// The returned pointer will be stored as the private data for the file.
> - fn open(_file: &File) -> Result<Self::Ptr>;
> + fn open(_file: &File, _misc: &MiscDeviceRegistration<Self>) -> Result<Self::Ptr>;
>
> /// Called when the misc device is released.
> fn release(device: Self::Ptr, _file: &File) {
> @@ -190,14 +190,27 @@ impl<T: MiscDevice> VtableHelper<T> {
> return ret;
> }
>
> + // SAFETY: The opwn call of a file can access the private data.
s/opwn/open/ :)
> + let misc_ptr = unsafe { (*file).private_data };
Blank line here?
> + // SAFETY: This is a miscdevice, so `misc_open()` set the private data to a pointer to the
> + // associated `struct miscdevice` before calling into this method. Furthermore, `misc_open()`
> + // ensures that the miscdevice can't be unregistered and freed during this call to `fops_open`.
Aren't we wrapping comment lines at 80 columns still? I can't remember
anymore...
> + let misc = unsafe { &*misc_ptr.cast::<MiscDeviceRegistration<T>>() };
> +
> // SAFETY:
> - // * The file is valid for the duration of this call.
> + // * The file is valid for the duration of the `T::open` call.
It's valid for the lifespan between open/release.
> // * There is no active fdget_pos region on the file on this thread.
> - let ptr = match T::open(unsafe { File::from_raw_file(file) }) {
> + let file = unsafe { File::from_raw_file(file) };
> +
> + let ptr = match T::open(file, misc) {
> Ok(ptr) => ptr,
> Err(err) => return err.to_errno(),
> };
>
> + // This overwrites the private data from above. It makes sense to not hold on to the misc
> + // pointer since the `struct miscdevice` can get unregistered as soon as we return from this
> + // call, so the misc pointer might be dangling on future file operations.
> + //
Wait, what are we overwriting this here with? Now private data points
to the misc device when before it was the file structure. No other code
needed to be changed because of that? Can't we enforce this pointer
type somewhere so that any casts in any read/write/ioctl also "knows" it
has the right type? This feels "dangerous" to me.
> // SAFETY: The open call of a file owns the private data.
> unsafe { (*file).private_data = ptr.into_foreign().cast_mut() };
Is this SAFETY comment still correct?
thanks,
greg k-h
next prev parent reply other threads:[~2024-12-09 8:48 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-12-09 7:27 [PATCH v2 0/2] Additional miscdevice fops parameters Alice Ryhl
2024-12-09 7:27 ` [PATCH v2 1/2] rust: miscdevice: access file in fops Alice Ryhl
2024-12-09 7:27 ` [PATCH v2 2/2] rust: miscdevice: access the `struct miscdevice` from fops->open() Alice Ryhl
2024-12-09 8:48 ` Greg Kroah-Hartman [this message]
2024-12-09 10:50 ` Alice Ryhl
2024-12-09 11:09 ` Greg Kroah-Hartman
2024-12-09 11:38 ` Alice Ryhl
2024-12-09 11:53 ` Greg Kroah-Hartman
2024-12-09 12:00 ` Alice Ryhl
2024-12-09 12:08 ` Greg Kroah-Hartman
2024-12-09 12:53 ` Alice Ryhl
2024-12-09 13:13 ` Greg Kroah-Hartman
2024-12-09 13:36 ` Alice Ryhl
2024-12-09 15:01 ` Danilo Krummrich
2024-12-09 15:04 ` Alice Ryhl
2024-12-09 15:11 ` Danilo Krummrich
2024-12-09 11:07 ` Danilo Krummrich
2024-12-09 11:17 ` Greg Kroah-Hartman
2024-12-09 11:36 ` Alice Ryhl
2024-12-09 14:42 ` kernel test robot
2024-12-09 8:43 ` [PATCH v2 0/2] Additional miscdevice fops parameters Greg Kroah-Hartman
2024-12-09 10:19 ` Miguel Ojeda
2024-12-09 10:44 ` Alice Ryhl
2024-12-09 20:06 ` Konstantin Ryabitsev
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2024120925-express-unmasked-76b4@gregkh \
--to=gregkh@linuxfoundation.org \
--cc=a.hindborg@kernel.org \
--cc=alex.gaynor@gmail.com \
--cc=aliceryhl@google.com \
--cc=arnd@arndb.de \
--cc=benno.lossin@proton.me \
--cc=bjorn3_gh@protonmail.com \
--cc=boqun.feng@gmail.com \
--cc=brauner@kernel.org \
--cc=gary@garyguo.net \
--cc=jack@suse.cz \
--cc=lee@kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=ojeda@kernel.org \
--cc=rust-for-linux@vger.kernel.org \
--cc=tmgross@umich.edu \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox