From: Yishai Hadas <yishaih-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
To: Jason Gunthorpe
<jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
Cc: Yishai Hadas <yishaih-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>,
dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
raindel-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org,
jackm-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org
Subject: Re: [PATCH for-next V5 3/5] IB/uverbs: Enable device removal when there are active user space applications
Date: Thu, 25 Jun 2015 16:51:49 +0300 [thread overview]
Message-ID: <558C0775.4000104@dev.mellanox.co.il> (raw)
In-Reply-To: <20150624182519.GD21033-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
On 6/24/2015 9:25 PM, Jason Gunthorpe wrote:
> On Mon, Jun 22, 2015 at 05:47:16PM +0300, Yishai Hadas wrote:
>> +++ b/drivers/infiniband/core/uverbs_main.c
>> @@ -137,7 +137,12 @@ static void ib_uverbs_release_dev(struct kref *ref)
>> struct ib_uverbs_device *dev =
>> container_of(ref, struct ib_uverbs_device, ref);
>>
>> - complete(&dev->comp);
>> + if (!dev->ib_dev) {
>> + cleanup_srcu_struct(&dev->disassociate_srcu);
>> + kfree(dev);
>> + } else {
>> + complete(&dev->comp);
>> + }
>
> Oy.. It is so gross to see a kref now being simultaneously used for
> actual memory accounting and also for general reference counting.
>
> It is also locked wrong, for instance:
Not correct, see below.
>
> @@ -792,13 +889,18 @@ static int ib_uverbs_open(struct inode *inode, struct file *filp)
> err:
> + mutex_unlock(&dev->lists_mutex);
> + srcu_read_unlock(&dev->disassociate_srcu, srcu_key);
> kref_put(&dev->ref, ib_uverbs_release_dev);
>
> Is not holding the RCU lock while ib_uverbs_release_dev is reading
> ib_dev. The barriers in kref are not strong enough to guarentee the RCU
> protected data will be visible. (remember when I asked if you checked
> all of these?)
>
This is not a locking problem, the only option that here the reference
count becomes 0 is if ib_uverbs_remove_one was previously called and
decreased the reference count that was taken upon load. However, it was
done after that rcu_assign_pointer(uverbs_dev->ib_dev, NULL) was called
so the check whether if (!dev->ib_dev) is fully protected and can't race
with HW removal flow.
> Obviously you can't hold the disassociate_srcu and call kref_put, so
> maybe grabbing it in release_dev would work. I didn't look that
> closely.
>
> But really, don't make a kref do two kinds of things, it just doesn't
> make any sense. You should split it into a proper memory ownership
> tracking kref that always does kfree and a counter used to cause
> complete().
The kref is used to manage the uverbs_dev allocation, the internal code
in ib_uverbs_release_dev depends on the state. Usually the natural place
to free the memory is as part of the release function as done in other
kernel places. In case that ib_device was previously removed it can be
safely freed here as it's called when the last client disconnected, this
logic is introduced by this patch. In case there is a need to wait
clients as the driver doesn't support HW device removal the free can't
be done internally but must be done externally in ib_uverbs_remove_one
when last client disconnected and complete should be used instead. As of
I believe that we can stay with only one kref that manage the uverbs_dev
which is safe as I pointed above.
>
> The rest looked OK now..
Thanks
>
>> + /* The barriers built into wait_event_interruptible()
>> + * and wake_up() make this ib_dev check RCU protected
>> + */
>
> No..
>
> The barriers built into wait_event_interruptible() and wake_up()
> guarentee this will see the null set without using RCU
>
Will fix the comment
>> + if (device->disassociate_ucontext) {
>> + /* We disassociate HW resources and immediately returning, not
>> + * pending to active userspace clients. Upon returning ib_device
>> + * may be freed internally and is not valid any more.
>> + * uverbs_device is still available, when all clients close
>> + * their files, the uverbs device ref count will be zero and its
>> + * resources will be freed.
>> + * Note: At that step no more files can be opened on that cdev
>> + * as it was deleted, however active clients can still issue
>> + * commands and close their open files.
>> + */
>
> Clean up the grammer..
>
> We disassociate HW resources and immediately return. Userspace will
> see a EIO errno for all future access. Upon returning, ib_device may be
> freed internally and is not valid any more. uverbs_device is still
> available until all clients close their files, then the uverbs device
> ref count will be zero and its resources will be freed. Note: At this
> point no more files can be opened since the cdev was deleted, however
> active clients can still issue commands and close their open files.
OK
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2015-06-25 13:51 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-06-22 14:47 [PATCH for-next V5 0/5] HW Device hot-removal support Yishai Hadas
[not found] ` <1434984438-21733-1-git-send-email-yishaih-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
2015-06-22 14:47 ` [PATCH for-next V5 1/5] IB/uverbs: Fix reference counting usage of event files Yishai Hadas
[not found] ` <1434984438-21733-2-git-send-email-yishaih-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
2015-06-24 17:57 ` Jason Gunthorpe
[not found] ` <20150624175738.GC21033-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2015-06-25 11:46 ` Yishai Hadas
[not found] ` <558BE9FA.9060402-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2015-06-25 17:52 ` Jason Gunthorpe
[not found] ` <20150625175228.GF21033-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2015-06-28 14:33 ` Yishai Hadas
[not found] ` <559005A0.4070800-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2015-06-29 17:40 ` Jason Gunthorpe
[not found] ` <20150629174038.GB2755-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2015-06-29 21:22 ` Yishai Hadas
[not found] ` <5591B6FA.4000400-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2015-06-29 21:48 ` Jason Gunthorpe
2015-06-22 14:47 ` [PATCH for-next V5 2/5] IB/uverbs: Explicitly pass ib_dev to uverbs commands Yishai Hadas
2015-06-22 14:47 ` [PATCH for-next V5 3/5] IB/uverbs: Enable device removal when there are active user space applications Yishai Hadas
[not found] ` <1434984438-21733-4-git-send-email-yishaih-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org>
2015-06-24 18:25 ` Jason Gunthorpe
[not found] ` <20150624182519.GD21033-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2015-06-25 13:51 ` Yishai Hadas [this message]
[not found] ` <558C0775.4000104-LDSdmyG8hGV8YrgS2mwiifqBs+8SCbDb@public.gmane.org>
2015-06-25 17:09 ` Jason Gunthorpe
[not found] ` <20150625170937.GE21033-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2015-06-29 21:33 ` Yishai Hadas
2015-06-22 14:47 ` [PATCH for-next V5 4/5] IB/mlx4_ib: Disassociate support Yishai Hadas
2015-06-22 14:47 ` [PATCH for-next V5 5/5] IB/ucma: HW Device hot-removal support Yishai Hadas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=558C0775.4000104@dev.mellanox.co.il \
--to=yishaih-ldsdmyg8hgv8yrgs2mwiifqbs+8scbdb@public.gmane.org \
--cc=dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=jackm-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org \
--cc=jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org \
--cc=linux-rdma-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=raindel-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org \
--cc=yishaih-VPRAkNaXOzVWk0Htik3J/w@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox