Message ID | 1371238081-32260-3-git-send-email-jiang.liu@huawei.com (mailing list archive) |
---|---|
State | Superseded, archived |
Headers | show |
On Saturday, June 15, 2013 03:27:59 AM Jiang Liu wrote: > This is a preparation for next patch to avoid breaking bisecting. > If next patch is applied without this one, it will cause deadlock > as below: > > Case 1: > [ 31.015593] Possible unsafe locking scenario: > > [ 31.018350] CPU0 CPU1 > [ 31.019691] ---- ---- > [ 31.021002] lock(&dock_station->hp_lock); > [ 31.022327] lock(&slot->crit_sect); > [ 31.023650] lock(&dock_station->hp_lock); > [ 31.025010] lock(&slot->crit_sect); > [ 31.026342] > > Case 2: > hotplug_dock_devices() > mutex_lock(&ds->hp_lock) > dd->ops->handler() > register_hotplug_dock_device() > mutex_lock(&ds->hp_lock) > [ 34.316570] [ INFO: possible recursive locking detected ] > [ 34.316573] 3.10.0-rc4 #6 Tainted: G C > [ 34.316575] --------------------------------------------- > [ 34.316577] kworker/0:0/4 is trying to acquire lock: > [ 34.316579] (&dock_station->hp_lock){+.+.+.}, at: > [<ffffffff813c766b>] register_hotplug_dock_device+0x6a/0xbf > [ 34.316588] > but task is already holding lock: > [ 34.316590] (&dock_station->hp_lock){+.+.+.}, at: > [<ffffffff813c7270>] hotplug_dock_devices+0x2c/0xda > [ 34.316595] > other info that might help us debug this: > [ 34.316597] Possible unsafe locking scenario: > > [ 34.316599] CPU0 > [ 34.316601] ---- > [ 34.316602] lock(&dock_station->hp_lock); > [ 34.316605] lock(&dock_station->hp_lock); > [ 34.316608] > *** DEADLOCK *** > > So fix this deadlock by not taking ds->hp_lock in function > register_hotplug_dock_device(). This patch also fixes a possible > race conditions in function dock_event() because previously it > accesses ds->hotplug_devices list without holding ds->hp_lock. > > Signed-off-by: Jiang Liu <jiang.liu@huawei.com> > Cc: Len Brown <lenb@kernel.org> > Cc: "Rafael J. Wysocki" <rjw@sisk.pl> > Cc: Bjorn Helgaas <bhelgaas@google.com> > Cc: Yinghai Lu <yinghai@kernel.org> > Cc: Yijing Wang <wangyijing@huawei.com> > Cc: linux-acpi@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Cc: linux-pci@vger.kernel.org > Cc: <stable@vger.kernel.org> # 3.8+ > --- > drivers/acpi/dock.c | 109 ++++++++++++++++++++++--------------- > drivers/pci/hotplug/acpiphp_glue.c | 15 +++++ > include/acpi/acpi_drivers.h | 2 + > 3 files changed, 82 insertions(+), 44 deletions(-) > > diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c > index 02b0563..602bce5 100644 > --- a/drivers/acpi/dock.c > +++ b/drivers/acpi/dock.c > @@ -66,7 +66,7 @@ struct dock_station { > spinlock_t dd_lock; > struct mutex hp_lock; > struct list_head dependent_devices; > - struct list_head hotplug_devices; > + struct klist hotplug_devices; > > struct list_head sibling; > struct platform_device *dock_device; > @@ -76,12 +76,18 @@ static int dock_station_count; > > struct dock_dependent_device { > struct list_head list; > - struct list_head hotplug_list; > + acpi_handle handle; > +}; > + > +struct dock_hotplug_info { > + struct klist_node node; > acpi_handle handle; > const struct acpi_dock_ops *ops; > void *context; > }; Can we please relax a bit and possibly take a step back? So since your last reply to me wasn't particularly helpful, I went through the code in dock.c and acpiphp_glue.c and I simply think that the whole hotplug_list thing is simply redundant. It looks like instead of using it (or the klist in this patch), we can add a "hotlpug_device" flag to dock_dependent_device and set that flag instead of adding dd to hotplug_devices or clear it instead of removing dd from that list. That would allow us to avoid the deadlock, because we wouldn't need the hp_lock any more and perhaps we could make the code simpler instead of making it more complex. How does that sound? Rafael > +#define node_to_info(n) container_of((n), struct dock_hotplug_info, node) > + > #define DOCK_DOCKING 0x00000001 > #define DOCK_UNDOCKING 0x00000002 > #define DOCK_IS_DOCK 0x00000010 > @@ -111,7 +117,6 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) > > dd->handle = handle; > INIT_LIST_HEAD(&dd->list); > - INIT_LIST_HEAD(&dd->hotplug_list); > > spin_lock(&ds->dd_lock); > list_add_tail(&dd->list, &ds->dependent_devices); > @@ -120,36 +125,19 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) > return 0; > } > > -/** > - * dock_add_hotplug_device - associate a hotplug handler with the dock station > - * @ds: The dock station > - * @dd: The dependent device struct > - * > - * Add the dependent device to the dock's hotplug device list > - */ > -static void > -dock_add_hotplug_device(struct dock_station *ds, > - struct dock_dependent_device *dd) > +static void hotplug_info_get(struct klist_node *node) > { > - mutex_lock(&ds->hp_lock); > - list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); > - mutex_unlock(&ds->hp_lock); > + struct dock_hotplug_info *info = node_to_info(node); > + > + info->ops->get(info->context); > } > > -/** > - * dock_del_hotplug_device - remove a hotplug handler from the dock station > - * @ds: The dock station > - * @dd: the dependent device struct > - * > - * Delete the dependent device from the dock's hotplug device list > - */ > -static void > -dock_del_hotplug_device(struct dock_station *ds, > - struct dock_dependent_device *dd) > +static void hotplug_info_put(struct klist_node *node) > { > - mutex_lock(&ds->hp_lock); > - list_del(&dd->hotplug_list); > - mutex_unlock(&ds->hp_lock); > + struct dock_hotplug_info *info = node_to_info(node); > + > + info->ops->put(info->context); > + kfree(info); > } > > /** > @@ -354,15 +342,22 @@ static void dock_remove_acpi_device(acpi_handle handle) > static void hotplug_dock_devices(struct dock_station *ds, u32 event) > { > struct dock_dependent_device *dd; > + struct klist_iter iter; > + struct klist_node *node; > + struct dock_hotplug_info *info; > > mutex_lock(&ds->hp_lock); > > /* > * First call driver specific hotplug functions > */ > - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) > - if (dd->ops && dd->ops->handler) > - dd->ops->handler(dd->handle, event, dd->context); > + klist_iter_init(&ds->hotplug_devices, &iter); > + while ((node = klist_next(&iter))) { > + info = node_to_info(node); > + if (info->ops && info->ops->handler) > + info->ops->handler(info->handle, event, info->context); > + } > + klist_iter_exit(&iter); > > /* > * Now make sure that an acpi_device is created for each > @@ -384,7 +379,9 @@ static void dock_event(struct dock_station *ds, u32 event, int num) > struct device *dev = &ds->dock_device->dev; > char event_string[13]; > char *envp[] = { event_string, NULL }; > - struct dock_dependent_device *dd; > + struct klist_iter iter; > + struct klist_node *node; > + struct dock_hotplug_info *info; > > if (num == UNDOCK_EVENT) > sprintf(event_string, "EVENT=undock"); > @@ -398,9 +395,13 @@ static void dock_event(struct dock_station *ds, u32 event, int num) > if (num == DOCK_EVENT) > kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); > > - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) > - if (dd->ops && dd->ops->uevent) > - dd->ops->uevent(dd->handle, event, dd->context); > + klist_iter_init(&ds->hotplug_devices, &iter); > + while ((node = klist_next(&iter))) { > + info = node_to_info(node); > + if (info->ops && info->ops->handler) > + info->ops->handler(info->handle, event, info->context); > + } > + klist_iter_exit(&iter); > > if (num != DOCK_EVENT) > kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); > @@ -580,12 +581,16 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops > void *context) > { > struct dock_dependent_device *dd; > + struct dock_hotplug_info *info; > struct dock_station *dock_station; > int ret = -EINVAL; > > if (!dock_station_count) > return -ENODEV; > > + if (ops == NULL || ops->get == NULL || ops->put == NULL) > + return -EINVAL; > + > /* > * make sure this handle is for a device dependent on the dock, > * this would include the dock station itself > @@ -598,9 +603,18 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops > */ > dd = find_dock_dependent_device(dock_station, handle); > if (dd) { > - dd->ops = ops; > - dd->context = context; > - dock_add_hotplug_device(dock_station, dd); > + info = kzalloc(sizeof(*info), GFP_KERNEL); > + if (!info) { > + unregister_hotplug_dock_device(handle); > + ret = -ENOMEM; > + break; > + } > + > + info->ops = ops; > + info->context = context; > + info->handle = dd->handle; > + klist_add_tail(&info->node, > + &dock_station->hotplug_devices); > ret = 0; > } > } > @@ -615,16 +629,22 @@ EXPORT_SYMBOL_GPL(register_hotplug_dock_device); > */ > void unregister_hotplug_dock_device(acpi_handle handle) > { > - struct dock_dependent_device *dd; > struct dock_station *dock_station; > + struct klist_iter iter; > + struct klist_node *node; > + struct dock_hotplug_info *info; > > if (!dock_station_count) > return; > > list_for_each_entry(dock_station, &dock_stations, sibling) { > - dd = find_dock_dependent_device(dock_station, handle); > - if (dd) > - dock_del_hotplug_device(dock_station, dd); > + klist_iter_init(&dock_station->hotplug_devices, &iter); > + while ((node = klist_next(&iter))) { > + info = node_to_info(node); > + if (info->handle == handle) > + klist_del(&info->node); > + } > + klist_iter_exit(&iter); > } > } > EXPORT_SYMBOL_GPL(unregister_hotplug_dock_device); > @@ -951,7 +971,8 @@ static int __init dock_add(acpi_handle handle) > mutex_init(&dock_station->hp_lock); > spin_lock_init(&dock_station->dd_lock); > INIT_LIST_HEAD(&dock_station->sibling); > - INIT_LIST_HEAD(&dock_station->hotplug_devices); > + klist_init(&dock_station->hotplug_devices, > + hotplug_info_get, hotplug_info_put); > ATOMIC_INIT_NOTIFIER_HEAD(&dock_notifier_list); > INIT_LIST_HEAD(&dock_station->dependent_devices); > > diff --git a/drivers/pci/hotplug/acpiphp_glue.c b/drivers/pci/hotplug/acpiphp_glue.c > index 716aa93..5d696f5 100644 > --- a/drivers/pci/hotplug/acpiphp_glue.c > +++ b/drivers/pci/hotplug/acpiphp_glue.c > @@ -145,9 +145,24 @@ static int post_dock_fixups(struct notifier_block *nb, unsigned long val, > return NOTIFY_OK; > } > > +static void acpiphp_dock_get(void *data) > +{ > + struct acpiphp_func *func = data; > + > + get_bridge(func->slot->bridge); > +} > + > +static void acpiphp_dock_put(void *data) > +{ > + struct acpiphp_func *func = data; > + > + put_bridge(func->slot->bridge); > +} > > static const struct acpi_dock_ops acpiphp_dock_ops = { > .handler = handle_hotplug_event_func, > + .get = acpiphp_dock_get, > + .put = acpiphp_dock_put, > }; > > /* Check whether the PCI device is managed by native PCIe hotplug driver */ > diff --git a/include/acpi/acpi_drivers.h b/include/acpi/acpi_drivers.h > index e6168a2..8fcc9ac 100644 > --- a/include/acpi/acpi_drivers.h > +++ b/include/acpi/acpi_drivers.h > @@ -115,6 +115,8 @@ void pci_acpi_crs_quirks(void); > struct acpi_dock_ops { > acpi_notify_handler handler; > acpi_notify_handler uevent; > + void (*get)(void *data); > + void (*put)(void *data); > }; > > #if defined(CONFIG_ACPI_DOCK) || defined(CONFIG_ACPI_DOCK_MODULE) >
On Sat 15 Jun 2013 06:21:02 AM CST, Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 03:27:59 AM Jiang Liu wrote: >> This is a preparation for next patch to avoid breaking bisecting. >> If next patch is applied without this one, it will cause deadlock >> as below: >> >> Case 1: >> [ 31.015593] Possible unsafe locking scenario: >> >> [ 31.018350] CPU0 CPU1 >> [ 31.019691] ---- ---- >> [ 31.021002] lock(&dock_station->hp_lock); >> [ 31.022327] lock(&slot->crit_sect); >> [ 31.023650] lock(&dock_station->hp_lock); >> [ 31.025010] lock(&slot->crit_sect); >> [ 31.026342] >> >> Case 2: >> hotplug_dock_devices() >> mutex_lock(&ds->hp_lock) >> dd->ops->handler() >> register_hotplug_dock_device() >> mutex_lock(&ds->hp_lock) >> [ 34.316570] [ INFO: possible recursive locking detected ] >> [ 34.316573] 3.10.0-rc4 #6 Tainted: G C >> [ 34.316575] --------------------------------------------- >> [ 34.316577] kworker/0:0/4 is trying to acquire lock: >> [ 34.316579] (&dock_station->hp_lock){+.+.+.}, at: >> [<ffffffff813c766b>] register_hotplug_dock_device+0x6a/0xbf >> [ 34.316588] >> but task is already holding lock: >> [ 34.316590] (&dock_station->hp_lock){+.+.+.}, at: >> [<ffffffff813c7270>] hotplug_dock_devices+0x2c/0xda >> [ 34.316595] >> other info that might help us debug this: >> [ 34.316597] Possible unsafe locking scenario: >> >> [ 34.316599] CPU0 >> [ 34.316601] ---- >> [ 34.316602] lock(&dock_station->hp_lock); >> [ 34.316605] lock(&dock_station->hp_lock); >> [ 34.316608] >> *** DEADLOCK *** >> >> So fix this deadlock by not taking ds->hp_lock in function >> register_hotplug_dock_device(). This patch also fixes a possible >> race conditions in function dock_event() because previously it >> accesses ds->hotplug_devices list without holding ds->hp_lock. >> >> Signed-off-by: Jiang Liu <jiang.liu@huawei.com> >> Cc: Len Brown <lenb@kernel.org> >> Cc: "Rafael J. Wysocki" <rjw@sisk.pl> >> Cc: Bjorn Helgaas <bhelgaas@google.com> >> Cc: Yinghai Lu <yinghai@kernel.org> >> Cc: Yijing Wang <wangyijing@huawei.com> >> Cc: linux-acpi@vger.kernel.org >> Cc: linux-kernel@vger.kernel.org >> Cc: linux-pci@vger.kernel.org >> Cc: <stable@vger.kernel.org> # 3.8+ >> --- >> drivers/acpi/dock.c | 109 ++++++++++++++++++++++--------------- >> drivers/pci/hotplug/acpiphp_glue.c | 15 +++++ >> include/acpi/acpi_drivers.h | 2 + >> 3 files changed, 82 insertions(+), 44 deletions(-) >> >> diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c >> index 02b0563..602bce5 100644 >> --- a/drivers/acpi/dock.c >> +++ b/drivers/acpi/dock.c >> @@ -66,7 +66,7 @@ struct dock_station { >> spinlock_t dd_lock; >> struct mutex hp_lock; >> struct list_head dependent_devices; >> - struct list_head hotplug_devices; >> + struct klist hotplug_devices; >> >> struct list_head sibling; >> struct platform_device *dock_device; >> @@ -76,12 +76,18 @@ static int dock_station_count; >> >> struct dock_dependent_device { >> struct list_head list; >> - struct list_head hotplug_list; >> + acpi_handle handle; >> +}; >> + >> +struct dock_hotplug_info { >> + struct klist_node node; >> acpi_handle handle; >> const struct acpi_dock_ops *ops; >> void *context; >> }; > > Can we please relax a bit and possibly take a step back? > > So since your last reply to me wasn't particularly helpful, I went through the > code in dock.c and acpiphp_glue.c and I simply think that the whole > hotplug_list thing is simply redundant. > > It looks like instead of using it (or the klist in this patch), we can add a > "hotlpug_device" flag to dock_dependent_device and set that flag instead of > adding dd to hotplug_devices or clear it instead of removing dd from that list. > > That would allow us to avoid the deadlock, because we wouldn't need the hp_lock > any more and perhaps we could make the code simpler instead of making it more > complex. > > How does that sound? > > Rafael Hi Rafael, Thanks for comments! It would be great if we could kill the hotplug_devices list so thing gets simple. But there are still some special cases:( As you have mentioned, ds->hp_lock is used to make both addition and removal of hotplug devices wait for us to complete walking ds->hotplug_devices. So it acts as two roles: 1) protect the hotplug_devices list, 2) serialize unregister_hotplug_dock_device() and hotplug_dock_devices() so the dock driver doesn't access registered handler and associated data structure once returing from unregister_hotplug_dock_device(). If we simply use a flag to mark presence of registered callback, we can't achieve the second goal. Take the sony laptop as an example. It has several PCI hotplug slot associated with the dock station: [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM0 [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM1 [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2 [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB So it still has some race windows if we undock the station while repeatedly rescanning/removing the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. For example, thread 1 is handling undocking event, walking the dependent device list and invoking registered callback handler with associated data. While that, thread 2 may step in to unregister the callback for \_SB_.PCI0.RP07.LPMB.LPM0. Then thread 1 may cause access-after-free issue. The klist patch solves this issue by adding a "put" callback method to explicitly notify dock client that the dock core has done with previously registered handler and associated data. > > >> +#define node_to_info(n) container_of((n), struct dock_hotplug_info, node) >> + >> #define DOCK_DOCKING 0x00000001 >> #define DOCK_UNDOCKING 0x00000002 >> #define DOCK_IS_DOCK 0x00000010 >> @@ -111,7 +117,6 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) >> >> dd->handle = handle; >> INIT_LIST_HEAD(&dd->list); >> - INIT_LIST_HEAD(&dd->hotplug_list); >> >> spin_lock(&ds->dd_lock); >> list_add_tail(&dd->list, &ds->dependent_devices); >> @@ -120,36 +125,19 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) >> return 0; >> } >> >> -/** >> - * dock_add_hotplug_device - associate a hotplug handler with the dock station >> - * @ds: The dock station >> - * @dd: The dependent device struct >> - * >> - * Add the dependent device to the dock's hotplug device list >> - */ >> -static void >> -dock_add_hotplug_device(struct dock_station *ds, >> - struct dock_dependent_device *dd) >> +static void hotplug_info_get(struct klist_node *node) >> { >> - mutex_lock(&ds->hp_lock); >> - list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); >> - mutex_unlock(&ds->hp_lock); >> + struct dock_hotplug_info *info = node_to_info(node); >> + >> + info->ops->get(info->context); >> } >> >> -/** >> - * dock_del_hotplug_device - remove a hotplug handler from the dock station >> - * @ds: The dock station >> - * @dd: the dependent device struct >> - * >> - * Delete the dependent device from the dock's hotplug device list >> - */ >> -static void >> -dock_del_hotplug_device(struct dock_station *ds, >> - struct dock_dependent_device *dd) >> +static void hotplug_info_put(struct klist_node *node) >> { >> - mutex_lock(&ds->hp_lock); >> - list_del(&dd->hotplug_list); >> - mutex_unlock(&ds->hp_lock); >> + struct dock_hotplug_info *info = node_to_info(node); >> + >> + info->ops->put(info->context); >> + kfree(info); >> } >> >> /** >> @@ -354,15 +342,22 @@ static void dock_remove_acpi_device(acpi_handle handle) >> static void hotplug_dock_devices(struct dock_station *ds, u32 event) >> { >> struct dock_dependent_device *dd; >> + struct klist_iter iter; >> + struct klist_node *node; >> + struct dock_hotplug_info *info; >> >> mutex_lock(&ds->hp_lock); >> >> /* >> * First call driver specific hotplug functions >> */ >> - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) >> - if (dd->ops && dd->ops->handler) >> - dd->ops->handler(dd->handle, event, dd->context); >> + klist_iter_init(&ds->hotplug_devices, &iter); >> + while ((node = klist_next(&iter))) { >> + info = node_to_info(node); >> + if (info->ops && info->ops->handler) >> + info->ops->handler(info->handle, event, info->context); >> + } >> + klist_iter_exit(&iter); >> >> /* >> * Now make sure that an acpi_device is created for each >> @@ -384,7 +379,9 @@ static void dock_event(struct dock_station *ds, u32 event, int num) >> struct device *dev = &ds->dock_device->dev; >> char event_string[13]; >> char *envp[] = { event_string, NULL }; >> - struct dock_dependent_device *dd; >> + struct klist_iter iter; >> + struct klist_node *node; >> + struct dock_hotplug_info *info; >> >> if (num == UNDOCK_EVENT) >> sprintf(event_string, "EVENT=undock"); >> @@ -398,9 +395,13 @@ static void dock_event(struct dock_station *ds, u32 event, int num) >> if (num == DOCK_EVENT) >> kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); >> >> - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) >> - if (dd->ops && dd->ops->uevent) >> - dd->ops->uevent(dd->handle, event, dd->context); >> + klist_iter_init(&ds->hotplug_devices, &iter); >> + while ((node = klist_next(&iter))) { >> + info = node_to_info(node); >> + if (info->ops && info->ops->handler) >> + info->ops->handler(info->handle, event, info->context); >> + } >> + klist_iter_exit(&iter); >> >> if (num != DOCK_EVENT) >> kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); >> @@ -580,12 +581,16 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops >> void *context) >> { >> struct dock_dependent_device *dd; >> + struct dock_hotplug_info *info; >> struct dock_station *dock_station; >> int ret = -EINVAL; >> >> if (!dock_station_count) >> return -ENODEV; >> >> + if (ops == NULL || ops->get == NULL || ops->put == NULL) >> + return -EINVAL; >> + >> /* >> * make sure this handle is for a device dependent on the dock, >> * this would include the dock station itself >> @@ -598,9 +603,18 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops >> */ >> dd = find_dock_dependent_device(dock_station, handle); >> if (dd) { >> - dd->ops = ops; >> - dd->context = context; >> - dock_add_hotplug_device(dock_station, dd); >> + info = kzalloc(sizeof(*info), GFP_KERNEL); >> + if (!info) { >> + unregister_hotplug_dock_device(handle); >> + ret = -ENOMEM; >> + break; >> + } >> + >> + info->ops = ops; >> + info->context = context; >> + info->handle = dd->handle; >> + klist_add_tail(&info->node, >> + &dock_station->hotplug_devices); >> ret = 0; >> } >> } >> @@ -615,16 +629,22 @@ EXPORT_SYMBOL_GPL(register_hotplug_dock_device); >> */ >> void unregister_hotplug_dock_device(acpi_handle handle) >> { >> - struct dock_dependent_device *dd; >> struct dock_station *dock_station; >> + struct klist_iter iter; >> + struct klist_node *node; >> + struct dock_hotplug_info *info; >> >> if (!dock_station_count) >> return; >> >> list_for_each_entry(dock_station, &dock_stations, sibling) { >> - dd = find_dock_dependent_device(dock_station, handle); >> - if (dd) >> - dock_del_hotplug_device(dock_station, dd); >> + klist_iter_init(&dock_station->hotplug_devices, &iter); >> + while ((node = klist_next(&iter))) { >> + info = node_to_info(node); >> + if (info->handle == handle) >> + klist_del(&info->node); >> + } >> + klist_iter_exit(&iter); >> } >> } >> EXPORT_SYMBOL_GPL(unregister_hotplug_dock_device); >> @@ -951,7 +971,8 @@ static int __init dock_add(acpi_handle handle) >> mutex_init(&dock_station->hp_lock); >> spin_lock_init(&dock_station->dd_lock); >> INIT_LIST_HEAD(&dock_station->sibling); >> - INIT_LIST_HEAD(&dock_station->hotplug_devices); >> + klist_init(&dock_station->hotplug_devices, >> + hotplug_info_get, hotplug_info_put); >> ATOMIC_INIT_NOTIFIER_HEAD(&dock_notifier_list); >> INIT_LIST_HEAD(&dock_station->dependent_devices); >> >> diff --git a/drivers/pci/hotplug/acpiphp_glue.c b/drivers/pci/hotplug/acpiphp_glue.c >> index 716aa93..5d696f5 100644 >> --- a/drivers/pci/hotplug/acpiphp_glue.c >> +++ b/drivers/pci/hotplug/acpiphp_glue.c >> @@ -145,9 +145,24 @@ static int post_dock_fixups(struct notifier_block *nb, unsigned long val, >> return NOTIFY_OK; >> } >> >> +static void acpiphp_dock_get(void *data) >> +{ >> + struct acpiphp_func *func = data; >> + >> + get_bridge(func->slot->bridge); >> +} >> + >> +static void acpiphp_dock_put(void *data) >> +{ >> + struct acpiphp_func *func = data; >> + >> + put_bridge(func->slot->bridge); >> +} >> >> static const struct acpi_dock_ops acpiphp_dock_ops = { >> .handler = handle_hotplug_event_func, >> + .get = acpiphp_dock_get, >> + .put = acpiphp_dock_put, >> }; >> >> /* Check whether the PCI device is managed by native PCIe hotplug driver */ >> diff --git a/include/acpi/acpi_drivers.h b/include/acpi/acpi_drivers.h >> index e6168a2..8fcc9ac 100644 >> --- a/include/acpi/acpi_drivers.h >> +++ b/include/acpi/acpi_drivers.h >> @@ -115,6 +115,8 @@ void pci_acpi_crs_quirks(void); >> struct acpi_dock_ops { >> acpi_notify_handler handler; >> acpi_notify_handler uevent; >> + void (*get)(void *data); >> + void (*put)(void *data); >> }; >> >> #if defined(CONFIG_ACPI_DOCK) || defined(CONFIG_ACPI_DOCK_MODULE) >> -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: > On Sat 15 Jun 2013 06:21:02 AM CST, Rafael J. Wysocki wrote: > > On Saturday, June 15, 2013 03:27:59 AM Jiang Liu wrote: > >> This is a preparation for next patch to avoid breaking bisecting. > >> If next patch is applied without this one, it will cause deadlock > >> as below: > >> > >> Case 1: > >> [ 31.015593] Possible unsafe locking scenario: > >> > >> [ 31.018350] CPU0 CPU1 > >> [ 31.019691] ---- ---- > >> [ 31.021002] lock(&dock_station->hp_lock); > >> [ 31.022327] lock(&slot->crit_sect); > >> [ 31.023650] lock(&dock_station->hp_lock); > >> [ 31.025010] lock(&slot->crit_sect); > >> [ 31.026342] > >> > >> Case 2: > >> hotplug_dock_devices() > >> mutex_lock(&ds->hp_lock) > >> dd->ops->handler() > >> register_hotplug_dock_device() > >> mutex_lock(&ds->hp_lock) > >> [ 34.316570] [ INFO: possible recursive locking detected ] > >> [ 34.316573] 3.10.0-rc4 #6 Tainted: G C > >> [ 34.316575] --------------------------------------------- > >> [ 34.316577] kworker/0:0/4 is trying to acquire lock: > >> [ 34.316579] (&dock_station->hp_lock){+.+.+.}, at: > >> [<ffffffff813c766b>] register_hotplug_dock_device+0x6a/0xbf > >> [ 34.316588] > >> but task is already holding lock: > >> [ 34.316590] (&dock_station->hp_lock){+.+.+.}, at: > >> [<ffffffff813c7270>] hotplug_dock_devices+0x2c/0xda > >> [ 34.316595] > >> other info that might help us debug this: > >> [ 34.316597] Possible unsafe locking scenario: > >> > >> [ 34.316599] CPU0 > >> [ 34.316601] ---- > >> [ 34.316602] lock(&dock_station->hp_lock); > >> [ 34.316605] lock(&dock_station->hp_lock); > >> [ 34.316608] > >> *** DEADLOCK *** > >> > >> So fix this deadlock by not taking ds->hp_lock in function > >> register_hotplug_dock_device(). This patch also fixes a possible > >> race conditions in function dock_event() because previously it > >> accesses ds->hotplug_devices list without holding ds->hp_lock. > >> > >> Signed-off-by: Jiang Liu <jiang.liu@huawei.com> > >> Cc: Len Brown <lenb@kernel.org> > >> Cc: "Rafael J. Wysocki" <rjw@sisk.pl> > >> Cc: Bjorn Helgaas <bhelgaas@google.com> > >> Cc: Yinghai Lu <yinghai@kernel.org> > >> Cc: Yijing Wang <wangyijing@huawei.com> > >> Cc: linux-acpi@vger.kernel.org > >> Cc: linux-kernel@vger.kernel.org > >> Cc: linux-pci@vger.kernel.org > >> Cc: <stable@vger.kernel.org> # 3.8+ > >> --- > >> drivers/acpi/dock.c | 109 ++++++++++++++++++++++--------------- > >> drivers/pci/hotplug/acpiphp_glue.c | 15 +++++ > >> include/acpi/acpi_drivers.h | 2 + > >> 3 files changed, 82 insertions(+), 44 deletions(-) > >> > >> diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c > >> index 02b0563..602bce5 100644 > >> --- a/drivers/acpi/dock.c > >> +++ b/drivers/acpi/dock.c > >> @@ -66,7 +66,7 @@ struct dock_station { > >> spinlock_t dd_lock; > >> struct mutex hp_lock; > >> struct list_head dependent_devices; > >> - struct list_head hotplug_devices; > >> + struct klist hotplug_devices; > >> > >> struct list_head sibling; > >> struct platform_device *dock_device; > >> @@ -76,12 +76,18 @@ static int dock_station_count; > >> > >> struct dock_dependent_device { > >> struct list_head list; > >> - struct list_head hotplug_list; > >> + acpi_handle handle; > >> +}; > >> + > >> +struct dock_hotplug_info { > >> + struct klist_node node; > >> acpi_handle handle; > >> const struct acpi_dock_ops *ops; > >> void *context; > >> }; > > > > Can we please relax a bit and possibly take a step back? > > > > So since your last reply to me wasn't particularly helpful, I went through the > > code in dock.c and acpiphp_glue.c and I simply think that the whole > > hotplug_list thing is simply redundant. > > > > It looks like instead of using it (or the klist in this patch), we can add a > > "hotlpug_device" flag to dock_dependent_device and set that flag instead of > > adding dd to hotplug_devices or clear it instead of removing dd from that list. > > > > That would allow us to avoid the deadlock, because we wouldn't need the hp_lock > > any more and perhaps we could make the code simpler instead of making it more > > complex. > > > > How does that sound? > > > > Rafael > Hi Rafael, > Thanks for comments! It would be great if we could kill the > hotplug_devices > list so thing gets simple. But there are still some special cases:( > > As you have mentioned, ds->hp_lock is used to make both addition and > removal > of hotplug devices wait for us to complete walking ds->hotplug_devices. > So it acts as two roles: > 1) protect the hotplug_devices list, > 2) serialize unregister_hotplug_dock_device() and > hotplug_dock_devices() so > the dock driver doesn't access registered handler and associated data > structure > once returing from unregister_hotplug_dock_device(). When it returns from unregister_hotplug_dock_device(), nothing prevents it from accessing whatever it wants, because ds->hp_lock is not used outside of the add/del and hotplug_dock_devices(). So, the actual role of ds->hp_lock (not the one that it is supposed to play, but the real one) is to prevent addition/deletion from happening when hotplug_dock_devices() is running. [Yes, it does protect the list, but since the list is in fact unnecessary, that doesn't matter.] > If we simply use a flag to mark presence of registered callback, we > can't achieve the second goal. I don't mean using the flag *alone*. > Take the sony laptop as an example. It has several PCI > hotplug > slot associated with the dock station: > [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB > [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM0 > [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM1 > [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2 > [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA > [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA > [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN > [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD > [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB > > So it still has some race windows if we undock the station while > repeatedly rescanning/removing > the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. For > example, thread 1 is > handling undocking event, walking the dependent device list and > invoking registered callback > handler with associated data. While that, thread 2 may step in to > unregister the callback for > \_SB_.PCI0.RP07.LPMB.LPM0. Then thread 1 may cause access-after-free > issue. That should be handled in acpiphp_glue instead of dock. What you're trying to do is to make dock work around synchronization issues in the acpiphp driver. > The klist patch solves this issue by adding a "put" callback method to > explicitly notify > dock client that the dock core has done with previously registered > handler and associated > data. Honestly, don't you think this is overly compilcated? Rafael
On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: > > On Sat 15 Jun 2013 06:21:02 AM CST, Rafael J. Wysocki wrote: > > > On Saturday, June 15, 2013 03:27:59 AM Jiang Liu wrote: > > >> This is a preparation for next patch to avoid breaking bisecting. > > >> If next patch is applied without this one, it will cause deadlock > > >> as below: > > >> > > >> Case 1: > > >> [ 31.015593] Possible unsafe locking scenario: > > >> > > >> [ 31.018350] CPU0 CPU1 > > >> [ 31.019691] ---- ---- > > >> [ 31.021002] lock(&dock_station->hp_lock); > > >> [ 31.022327] lock(&slot->crit_sect); > > >> [ 31.023650] lock(&dock_station->hp_lock); > > >> [ 31.025010] lock(&slot->crit_sect); > > >> [ 31.026342] > > >> > > >> Case 2: > > >> hotplug_dock_devices() > > >> mutex_lock(&ds->hp_lock) > > >> dd->ops->handler() > > >> register_hotplug_dock_device() > > >> mutex_lock(&ds->hp_lock) > > >> [ 34.316570] [ INFO: possible recursive locking detected ] > > >> [ 34.316573] 3.10.0-rc4 #6 Tainted: G C > > >> [ 34.316575] --------------------------------------------- > > >> [ 34.316577] kworker/0:0/4 is trying to acquire lock: > > >> [ 34.316579] (&dock_station->hp_lock){+.+.+.}, at: > > >> [<ffffffff813c766b>] register_hotplug_dock_device+0x6a/0xbf > > >> [ 34.316588] > > >> but task is already holding lock: > > >> [ 34.316590] (&dock_station->hp_lock){+.+.+.}, at: > > >> [<ffffffff813c7270>] hotplug_dock_devices+0x2c/0xda > > >> [ 34.316595] > > >> other info that might help us debug this: > > >> [ 34.316597] Possible unsafe locking scenario: > > >> > > >> [ 34.316599] CPU0 > > >> [ 34.316601] ---- > > >> [ 34.316602] lock(&dock_station->hp_lock); > > >> [ 34.316605] lock(&dock_station->hp_lock); > > >> [ 34.316608] > > >> *** DEADLOCK *** > > >> > > >> So fix this deadlock by not taking ds->hp_lock in function > > >> register_hotplug_dock_device(). This patch also fixes a possible > > >> race conditions in function dock_event() because previously it > > >> accesses ds->hotplug_devices list without holding ds->hp_lock. > > >> > > >> Signed-off-by: Jiang Liu <jiang.liu@huawei.com> > > >> Cc: Len Brown <lenb@kernel.org> > > >> Cc: "Rafael J. Wysocki" <rjw@sisk.pl> > > >> Cc: Bjorn Helgaas <bhelgaas@google.com> > > >> Cc: Yinghai Lu <yinghai@kernel.org> > > >> Cc: Yijing Wang <wangyijing@huawei.com> > > >> Cc: linux-acpi@vger.kernel.org > > >> Cc: linux-kernel@vger.kernel.org > > >> Cc: linux-pci@vger.kernel.org > > >> Cc: <stable@vger.kernel.org> # 3.8+ > > >> --- > > >> drivers/acpi/dock.c | 109 ++++++++++++++++++++++--------------- > > >> drivers/pci/hotplug/acpiphp_glue.c | 15 +++++ > > >> include/acpi/acpi_drivers.h | 2 + > > >> 3 files changed, 82 insertions(+), 44 deletions(-) > > >> > > >> diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c > > >> index 02b0563..602bce5 100644 > > >> --- a/drivers/acpi/dock.c > > >> +++ b/drivers/acpi/dock.c > > >> @@ -66,7 +66,7 @@ struct dock_station { > > >> spinlock_t dd_lock; > > >> struct mutex hp_lock; > > >> struct list_head dependent_devices; > > >> - struct list_head hotplug_devices; > > >> + struct klist hotplug_devices; > > >> > > >> struct list_head sibling; > > >> struct platform_device *dock_device; > > >> @@ -76,12 +76,18 @@ static int dock_station_count; > > >> > > >> struct dock_dependent_device { > > >> struct list_head list; > > >> - struct list_head hotplug_list; > > >> + acpi_handle handle; > > >> +}; > > >> + > > >> +struct dock_hotplug_info { > > >> + struct klist_node node; > > >> acpi_handle handle; > > >> const struct acpi_dock_ops *ops; > > >> void *context; > > >> }; > > > > > > Can we please relax a bit and possibly take a step back? > > > > > > So since your last reply to me wasn't particularly helpful, I went through the > > > code in dock.c and acpiphp_glue.c and I simply think that the whole > > > hotplug_list thing is simply redundant. > > > > > > It looks like instead of using it (or the klist in this patch), we can add a > > > "hotlpug_device" flag to dock_dependent_device and set that flag instead of > > > adding dd to hotplug_devices or clear it instead of removing dd from that list. > > > > > > That would allow us to avoid the deadlock, because we wouldn't need the hp_lock > > > any more and perhaps we could make the code simpler instead of making it more > > > complex. > > > > > > How does that sound? > > > > > > Rafael > > Hi Rafael, > > Thanks for comments! It would be great if we could kill the > > hotplug_devices > > list so thing gets simple. But there are still some special cases:( > > > > As you have mentioned, ds->hp_lock is used to make both addition and > > removal > > of hotplug devices wait for us to complete walking ds->hotplug_devices. > > So it acts as two roles: > > 1) protect the hotplug_devices list, > > 2) serialize unregister_hotplug_dock_device() and > > hotplug_dock_devices() so > > the dock driver doesn't access registered handler and associated data > > structure > > once returing from unregister_hotplug_dock_device(). > > When it returns from unregister_hotplug_dock_device(), nothing prevents it > from accessing whatever it wants, because ds->hp_lock is not used outside > of the add/del and hotplug_dock_devices(). So, the actual role of > ds->hp_lock (not the one that it is supposed to play, but the real one) > is to prevent addition/deletion from happening when hotplug_dock_devices() > is running. [Yes, it does protect the list, but since the list is in fact > unnecessary, that doesn't matter.] > > > If we simply use a flag to mark presence of registered callback, we > > can't achieve the second goal. > > I don't mean using the flag *alone*. > > > Take the sony laptop as an example. It has several PCI > > hotplug > > slot associated with the dock station: > > [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB > > [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM0 > > [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM1 > > [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2 > > [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA > > [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA > > [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN > > [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD > > [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check > > notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB > > > > So it still has some race windows if we undock the station while > > repeatedly rescanning/removing > > the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. Which sysfs interfaces do you mean, by the way? If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() should always be run under acpi_scan_lock too. It isn't at the moment, because write_undock() doesn't take acpi_scan_lock(), but this is an obvious bug (so I'm going to send a patch to fix it in a while). With that bug fixed, the possible race between acpi_eject_store() and hotplug_dock_devices() should be prevented from happening, so perhaps we're worrying about something that cannot happen? Rafael
On Saturday, June 15, 2013 11:20:40 PM Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: [...] > > Which sysfs interfaces do you mean, by the way? > > If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > should always be run under acpi_scan_lock too. It isn't at the moment, > because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > bug (so I'm going to send a patch to fix it in a while). > > With that bug fixed, the possible race between acpi_eject_store() and > hotplug_dock_devices() should be prevented from happening, so perhaps we're > worrying about something that cannot happen? So here's a question: What particular races are possible if we remove ds->hp_lock entirely without doing anything else just yet? I mean, how to *trigger* them from the start to the end and not how they can possibly happen but never do, because there's no way they can be actually triggered? Rafael
On 06/16/2013 04:17 AM, Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: >> On Sat 15 Jun 2013 06:21:02 AM CST, Rafael J. Wysocki wrote: [...] >>> Can we please relax a bit and possibly take a step back? >>> >>> So since your last reply to me wasn't particularly helpful, I went through the >>> code in dock.c and acpiphp_glue.c and I simply think that the whole >>> hotplug_list thing is simply redundant. >>> >>> It looks like instead of using it (or the klist in this patch), we can add a >>> "hotlpug_device" flag to dock_dependent_device and set that flag instead of >>> adding dd to hotplug_devices or clear it instead of removing dd from that list. >>> >>> That would allow us to avoid the deadlock, because we wouldn't need the hp_lock >>> any more and perhaps we could make the code simpler instead of making it more >>> complex. >>> >>> How does that sound? >>> >>> Rafael >> Hi Rafael, >> Thanks for comments! It would be great if we could kill the >> hotplug_devices >> list so thing gets simple. But there are still some special cases:( >> >> As you have mentioned, ds->hp_lock is used to make both addition and >> removal >> of hotplug devices wait for us to complete walking ds->hotplug_devices. >> So it acts as two roles: >> 1) protect the hotplug_devices list, >> 2) serialize unregister_hotplug_dock_device() and >> hotplug_dock_devices() so >> the dock driver doesn't access registered handler and associated data >> structure >> once returing from unregister_hotplug_dock_device(). > > When it returns from unregister_hotplug_dock_device(), nothing prevents it > from accessing whatever it wants, because ds->hp_lock is not used outside > of the add/del and hotplug_dock_devices(). So, the actual role of > ds->hp_lock (not the one that it is supposed to play, but the real one) > is to prevent addition/deletion from happening when hotplug_dock_devices() > is running. [Yes, it does protect the list, but since the list is in fact > unnecessary, that doesn't matter.] Hi Rafael, With current implementation function dock_add_hotplug_device(), dock_del_hotplug_device(), hotplug_dock_devices() and dock_event() access hotplug_devices list, registered callback(ops) and associated data(context). Caller may free the associated data(context) once returned from function unregister_hotplug_dock_device(), so the dock core shouldn't access the data(context) any more after returning from unregister_hotplug_dock_device(). With current implementation, this is guaranteed by acquiring ds->hp_lock in function dock_del_hotplug_device(). But there's another issue with current implementation here, we should use ds->hp_lock to protect dock_event() too. > >> If we simply use a flag to mark presence of registered callback, we >> can't achieve the second goal. > > I don't mean using the flag *alone*. > >> Take the sony laptop as an example. It has several PCI >> hotplug >> slot associated with the dock station: >> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB >> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM0 >> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM1 >> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Btus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2 >> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA >> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA >> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN >> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD >> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check >> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB >> >> So it still has some race windows if we undock the station while >> repeatedly rescanning/removing >> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. For >> example, thread 1 is >> handling undocking event, walking the dependent device list and >> invoking registered callback >> handler with associated data. While that, thread 2 may step in to >> unregister the callback for >> \_SB_.PCI0.RP07.LPMB.LPM0. Then thread 1 may cause access-after-free >> issue. > > That should be handled in acpiphp_glue instead of dock. What you're trying to > do is to make dock work around synchronization issues in the acpiphp driver. I'm not sure whether we could solve this issue from acpiphp_glue side. If dock driver can't guarantee that it doesn't access registered handler(ops) and associated data(context) after returning from unregister_hotplug_dock_device(), it will be hard for acpiphp_glue to manage the data structure(context). So I introduced a "put" method into the acpi_dock_ops to help manage lifecycle of "context". > >> The klist patch solves this issue by adding a "put" callback method to >> explicitly notify >> dock client that the dock core has done with previously registered >> handler and associated >> data. > > Honestly, don't you think this is overly compilcated? Yeah, I must admire that it's really a little over complicated, but I can't find a simpler solution here:( > > Rafael > > -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 06/16/2013 05:20 AM, Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: >> On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: [...] >> When it returns from unregister_hotplug_dock_device(), nothing prevents it >> from accessing whatever it wants, because ds->hp_lock is not used outside >> of the add/del and hotplug_dock_devices(). So, the actual role of >> ds->hp_lock (not the one that it is supposed to play, but the real one) >> is to prevent addition/deletion from happening when hotplug_dock_devices() >> is running. [Yes, it does protect the list, but since the list is in fact >> unnecessary, that doesn't matter.] >> >>> If we simply use a flag to mark presence of registered callback, we >>> can't achieve the second goal. >> >> I don't mean using the flag *alone*. >> >>> Take the sony laptop as an example. It has several PCI >>> hotplug >>> slot associated with the dock station: >>> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB >>> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM0 >>> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM1 >>> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2 >>> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA >>> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA >>> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN >>> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD >>> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB >>> >>> So it still has some race windows if we undock the station while >>> repeatedly rescanning/removing >>> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. > > Which sysfs interfaces do you mean, by the way? > > If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > should always be run under acpi_scan_lock too. It isn't at the moment, > because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > bug (so I'm going to send a patch to fix it in a while). > > With that bug fixed, the possible race between acpi_eject_store() and > hotplug_dock_devices() should be prevented from happening, so perhaps we're > worrying about something that cannot happen? Hi Rafael, I mean the "remove" method of each PCI device, and the "power" method of PCI hotplug slot here. These methods may be used to remove P2P bridges with associated ACPIPHP hotplug slots, which in turn will cause invoking of unregister_hotplug_dock_device(). So theoretical we may trigger the bug by undocking while repeatedly adding/removing P2P bridges with ACPIPHP hotplug slot through PCI "rescan" and "remove" sysfs interface, Regards! Gerry > > Rafael > > -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 06/16/2013 06:54 AM, Rafael J. Wysocki wrote: > On Saturday, June 15, 2013 11:20:40 PM Rafael J. Wysocki wrote: >> On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > > [...] > >> >> Which sysfs interfaces do you mean, by the way? >> >> If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() >> should always be run under acpi_scan_lock too. It isn't at the moment, >> because write_undock() doesn't take acpi_scan_lock(), but this is an obvious >> bug (so I'm going to send a patch to fix it in a while). >> >> With that bug fixed, the possible race between acpi_eject_store() and >> hotplug_dock_devices() should be prevented from happening, so perhaps we're >> worrying about something that cannot happen? > > So here's a question: What particular races are possible if we remove > ds->hp_lock entirely without doing anything else just yet? I mean, how to > *trigger* them from the start to the end and not how they can possibly happen > but never do, because there's no way they can be actually triggered? Hi Rafael, I have no really platform which triggers this bug, but I may imagine a possible platform if it's valid for explanation. Let's think about a laptop dock station with a thunderbolt controller built-in. The dock station is managed by dock driver and acpiphp driver. And the PCIe hierarchy managed by the thunderbolt controller may be managed by dock driver and ACPIPHP driver too. So it may trigger the issue by pressing the dock button and unplugging thunderbolt cable concurrently. But after all, this is all by imagination:). We may need to find a simple and quick solution for 3.10 and the stable trees and enhance the solution later to avoid introducing new bugs while fixing a bug. Regards! Gerry > > Rafael > > -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Monday, June 17, 2013 01:01:51 AM Jiang Liu wrote: > On 06/16/2013 05:20 AM, Rafael J. Wysocki wrote: > > On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > >> On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: > [...] > >> When it returns from unregister_hotplug_dock_device(), nothing prevents it > >> from accessing whatever it wants, because ds->hp_lock is not used outside > >> of the add/del and hotplug_dock_devices(). So, the actual role of > >> ds->hp_lock (not the one that it is supposed to play, but the real one) > >> is to prevent addition/deletion from happening when hotplug_dock_devices() > >> is running. [Yes, it does protect the list, but since the list is in fact > >> unnecessary, that doesn't matter.] > >> > >>> If we simply use a flag to mark presence of registered callback, we > >>> can't achieve the second goal. > >> > >> I don't mean using the flag *alone*. > >> > >>> Take the sony laptop as an example. It has several PCI > >>> hotplug > >>> slot associated with the dock station: > >>> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB > >>> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM0 > >>> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM1 > >>> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2 > >>> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA > >>> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA > >>> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN > >>> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD > >>> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB > >>> > >>> So it still has some race windows if we undock the station while > >>> repeatedly rescanning/removing > >>> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. > > > > Which sysfs interfaces do you mean, by the way? > > > > If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > > should always be run under acpi_scan_lock too. It isn't at the moment, > > because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > > bug (so I'm going to send a patch to fix it in a while). > > > > With that bug fixed, the possible race between acpi_eject_store() and > > hotplug_dock_devices() should be prevented from happening, so perhaps we're > > worrying about something that cannot happen? > Hi Rafael, > I mean the "remove" method of each PCI device, and the "power" method > of PCI hotplug slot here. > These methods may be used to remove P2P bridges with associated ACPIPHP > hotplug slots, which in turn will cause invoking of > unregister_hotplug_dock_device(). > So theoretical we may trigger the bug by undocking while repeatedly > adding/removing P2P bridges with ACPIPHP hotplug slot through PCI > "rescan" and "remove" sysfs interface, Why don't we make these things take acpi_scan_lock upfront, then? Rafael
On Monday, June 17, 2013 01:12:00 AM Jiang Liu wrote: > On 06/16/2013 06:54 AM, Rafael J. Wysocki wrote: > > On Saturday, June 15, 2013 11:20:40 PM Rafael J. Wysocki wrote: > >> On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > > > > [...] > > > >> > >> Which sysfs interfaces do you mean, by the way? > >> > >> If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > >> should always be run under acpi_scan_lock too. It isn't at the moment, > >> because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > >> bug (so I'm going to send a patch to fix it in a while). > >> > >> With that bug fixed, the possible race between acpi_eject_store() and > >> hotplug_dock_devices() should be prevented from happening, so perhaps we're > >> worrying about something that cannot happen? > > > > So here's a question: What particular races are possible if we remove > > ds->hp_lock entirely without doing anything else just yet? I mean, how to > > *trigger* them from the start to the end and not how they can possibly happen > > but never do, because there's no way they can be actually triggered? > Hi Rafael, > I have no really platform which triggers this bug, but I may imagine > a possible platform if it's valid for explanation. > Let's think about a laptop dock station with a thunderbolt > controller built-in. The dock station is managed by dock driver and > acpiphp driver. And the PCIe hierarchy managed by the thunderbolt > controller may be managed by dock driver and ACPIPHP driver too. > So it may trigger the issue by pressing the dock button and unplugging > thunderbolt cable concurrently. > But after all, this is all by imagination:). We may need to find a > simple and quick solution for 3.10 and the stable trees and enhance the > solution later to avoid introducing new bugs while fixing a bug. Well, if that particular bug is not fixed in 3,10, it won't be a tragedy, and I *really* don't want that code to get substantially more complex than it is now. Thanks, Rafael
On Monday, June 17, 2013 01:39:04 PM Rafael J. Wysocki wrote: > On Monday, June 17, 2013 01:01:51 AM Jiang Liu wrote: > > On 06/16/2013 05:20 AM, Rafael J. Wysocki wrote: > > > On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > > >> On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: > > [...] > > >> When it returns from unregister_hotplug_dock_device(), nothing prevents it > > >> from accessing whatever it wants, because ds->hp_lock is not used outside > > >> of the add/del and hotplug_dock_devices(). So, the actual role of > > >> ds->hp_lock (not the one that it is supposed to play, but the real one) > > >> is to prevent addition/deletion from happening when hotplug_dock_devices() > > >> is running. [Yes, it does protect the list, but since the list is in fact > > >> unnecessary, that doesn't matter.] > > >> > > >>> If we simply use a flag to mark presence of registered callback, we > > >>> can't achieve the second goal. > > >> > > >> I don't mean using the flag *alone*. > > >> > > >>> Take the sony laptop as an example. It has several PCI > > >>> hotplug > > >>> slot associated with the dock station: > > >>> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB > > >>> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM0 > > >>> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM1 > > >>> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2 > > >>> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA > > >>> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA > > >>> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN > > >>> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD > > >>> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check > > >>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB > > >>> > > >>> So it still has some race windows if we undock the station while > > >>> repeatedly rescanning/removing > > >>> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. > > > > > > Which sysfs interfaces do you mean, by the way? > > > > > > If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > > > should always be run under acpi_scan_lock too. It isn't at the moment, > > > because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > > > bug (so I'm going to send a patch to fix it in a while). > > > > > > With that bug fixed, the possible race between acpi_eject_store() and > > > hotplug_dock_devices() should be prevented from happening, so perhaps we're > > > worrying about something that cannot happen? > > Hi Rafael, > > I mean the "remove" method of each PCI device, and the "power" method > > of PCI hotplug slot here. > > These methods may be used to remove P2P bridges with associated ACPIPHP > > hotplug slots, which in turn will cause invoking of > > unregister_hotplug_dock_device(). > > So theoretical we may trigger the bug by undocking while repeatedly > > adding/removing P2P bridges with ACPIPHP hotplug slot through PCI > > "rescan" and "remove" sysfs interface, > > Why don't we make these things take acpi_scan_lock upfront, then? Or perhaps (and maybe better) why don't we replace ds->hp_lock by another lock that will be acquired upper in the call chain so that dock_add_hotplug_device(), dock_del_hotplug_device(), hotplug_dock_devices() and dock_event() are all guaranteed to be called under that lock? Rafael
On 06/17/2013 07:39 PM, Rafael J. Wysocki wrote: > On Monday, June 17, 2013 01:01:51 AM Jiang Liu wrote: >> On 06/16/2013 05:20 AM, Rafael J. Wysocki wrote: >>> On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: >>>> On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: >> [...] >>>> When it returns from unregister_hotplug_dock_device(), nothing prevents it >>>> from accessing whatever it wants, because ds->hp_lock is not used outside >>>> of the add/del and hotplug_dock_devices(). So, the actual role of >>>> ds->hp_lock (not the one that it is supposed to play, but the real one) >>>> is to prevent addition/deletion from happening when hotplug_dock_devices() >>>> is running. [Yes, it does protect the list, but since the list is in fact >>>> unnecessary, that doesn't matter.] >>>> >>>>> If we simply use a flag to mark presence of registered callback, we >>>>> can't achieve the second goal. >>>> >>>> I don't mean using the flag *alone*. >>>> >>>>> Take the sony laptop as an example. It has several PCI >>>>> hotplug >>>>> slot associated with the dock station: >>>>> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB >>>>> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM0 >>>>> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM1 >>>>> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2 >>>>> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA >>>>> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA >>>>> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN >>>>> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD >>>>> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB >>>>> >>>>> So it still has some race windows if we undock the station while >>>>> repeatedly rescanning/removing >>>>> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. >>> >>> Which sysfs interfaces do you mean, by the way? >>> >>> If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() >>> should always be run under acpi_scan_lock too. It isn't at the moment,t >>> because write_undock() doesn't take acpi_scan_lock(), but this is an obvious >>> bug (so I'm going to send a patch to fix it in a while). >>> >>> With that bug fixed, the possible race between acpi_eject_store() and >>> hotplug_dock_devices() should be prevented from happening, so perhaps we're >>> worrying about something that cannot happen? >> Hi Rafael, >> I mean the "remove" method of each PCI device, and the "power" method >> of PCI hotplug slot here. >> These methods may be used to remove P2P bridges with associated ACPIPHP >> hotplug slots, which in turn will cause invoking of >> unregister_hotplug_dock_device(). >> So theoretical we may trigger the bug by undocking while repeatedly >> adding/removing P2P bridges with ACPIPHP hotplug slot through PCI >> "rescan" and "remove" sysfs interface, > > Why don't we make these things take acpi_scan_lock upfront, then? Hi Rafael, Seems we can't rely on acpi_scan_lock here, it may cause another deadlock scenario: 1) thread 1 acquired the acpi_scan_lock and tries to destroy all sysfs interfaces for PCI devices. 2) thread 2 opens a PCI sysfs which then tries to acquire the acpi_scan_lock. Regards! Gerry > > Rafael > > -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tuesday, June 18, 2013 11:36:50 PM Jiang Liu wrote: > On 06/17/2013 07:39 PM, Rafael J. Wysocki wrote: > > On Monday, June 17, 2013 01:01:51 AM Jiang Liu wrote: > >> On 06/16/2013 05:20 AM, Rafael J. Wysocki wrote: > >>> On Saturday, June 15, 2013 10:17:42 PM Rafael J. Wysocki wrote: > >>>> On Saturday, June 15, 2013 09:44:28 AM Jiang Liu wrote: > >> [...] > >>>> When it returns from unregister_hotplug_dock_device(), nothing prevents it > >>>> from accessing whatever it wants, because ds->hp_lock is not used outside > >>>> of the add/del and hotplug_dock_devices(). So, the actual role of > >>>> ds->hp_lock (not the one that it is supposed to play, but the real one) > >>>> is to prevent addition/deletion from happening when hotplug_dock_devices() > >>>> is running. [Yes, it does protect the list, but since the list is in fact > >>>> unnecessary, that doesn't matter.] > >>>> > >>>>> If we simply use a flag to mark presence of registered callback, we > >>>>> can't achieve the second goal. > >>>> > >>>> I don't mean using the flag *alone*. > >>>> > >>>>> Take the sony laptop as an example. It has several PCI > >>>>> hotplug > >>>>> slot associated with the dock station: > >>>>> [ 28.829316] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB > >>>>> [ 30.174964] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM0 > >>>>> [ 30.174973] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM1 > >>>>> [ 30.174979] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2 > >>>>> [ 30.174985] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GFXA > >>>>> [ 30.175020] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR0.GHDA > >>>>> [ 30.175040] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC0.DLAN > >>>>> [ 30.175050] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC1.DODD > >>>>> [ 30.175060] acpiphp_glue: _handle_hotplug_event_func: Bus check > >>>>> notify on \_SB_.PCI0.RP07.LPMB.LPM2.LPRI.LPR1.LPCI.LPC2.DUSB > >>>>> > >>>>> So it still has some race windows if we undock the station while > >>>>> repeatedly rescanning/removing > >>>>> the PCI bus for \_SB_.PCI0.RP07.LPMB.LPM0 through sysfs interfaces. > >>> > >>> Which sysfs interfaces do you mean, by the way? > >>> > >>> If you mean "eject", then it takes acpi_scan_lock and hotplug_dock_devices() > >>> should always be run under acpi_scan_lock too. It isn't at the moment,t > >>> because write_undock() doesn't take acpi_scan_lock(), but this is an obvious > >>> bug (so I'm going to send a patch to fix it in a while). > >>> > >>> With that bug fixed, the possible race between acpi_eject_store() and > >>> hotplug_dock_devices() should be prevented from happening, so perhaps we're > >>> worrying about something that cannot happen? > >> Hi Rafael, > >> I mean the "remove" method of each PCI device, and the "power" method > >> of PCI hotplug slot here. > >> These methods may be used to remove P2P bridges with associated ACPIPHP > >> hotplug slots, which in turn will cause invoking of > >> unregister_hotplug_dock_device(). > >> So theoretical we may trigger the bug by undocking while repeatedly > >> adding/removing P2P bridges with ACPIPHP hotplug slot through PCI > >> "rescan" and "remove" sysfs interface, > > > > Why don't we make these things take acpi_scan_lock upfront, then? > Hi Rafael, > Seems we can't rely on acpi_scan_lock here, it may cause another > deadlock scenario: > 1) thread 1 acquired the acpi_scan_lock and tries to destroy all sysfs > interfaces for PCI devices. > 2) thread 2 opens a PCI sysfs which then tries to acquire the > acpi_scan_lock. Well, maybe, but you didn't explain how this was going to happen. What code paths are involved, etc. Quite frankly, I've already run out of patience, sorry about that. It looks like I need to go through the code and understand all of these problems myself. Yes, it will take time. Thanks, Rafael
diff --git a/drivers/acpi/dock.c b/drivers/acpi/dock.c index 02b0563..602bce5 100644 --- a/drivers/acpi/dock.c +++ b/drivers/acpi/dock.c @@ -66,7 +66,7 @@ struct dock_station { spinlock_t dd_lock; struct mutex hp_lock; struct list_head dependent_devices; - struct list_head hotplug_devices; + struct klist hotplug_devices; struct list_head sibling; struct platform_device *dock_device; @@ -76,12 +76,18 @@ static int dock_station_count; struct dock_dependent_device { struct list_head list; - struct list_head hotplug_list; + acpi_handle handle; +}; + +struct dock_hotplug_info { + struct klist_node node; acpi_handle handle; const struct acpi_dock_ops *ops; void *context; }; +#define node_to_info(n) container_of((n), struct dock_hotplug_info, node) + #define DOCK_DOCKING 0x00000001 #define DOCK_UNDOCKING 0x00000002 #define DOCK_IS_DOCK 0x00000010 @@ -111,7 +117,6 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) dd->handle = handle; INIT_LIST_HEAD(&dd->list); - INIT_LIST_HEAD(&dd->hotplug_list); spin_lock(&ds->dd_lock); list_add_tail(&dd->list, &ds->dependent_devices); @@ -120,36 +125,19 @@ add_dock_dependent_device(struct dock_station *ds, acpi_handle handle) return 0; } -/** - * dock_add_hotplug_device - associate a hotplug handler with the dock station - * @ds: The dock station - * @dd: The dependent device struct - * - * Add the dependent device to the dock's hotplug device list - */ -static void -dock_add_hotplug_device(struct dock_station *ds, - struct dock_dependent_device *dd) +static void hotplug_info_get(struct klist_node *node) { - mutex_lock(&ds->hp_lock); - list_add_tail(&dd->hotplug_list, &ds->hotplug_devices); - mutex_unlock(&ds->hp_lock); + struct dock_hotplug_info *info = node_to_info(node); + + info->ops->get(info->context); } -/** - * dock_del_hotplug_device - remove a hotplug handler from the dock station - * @ds: The dock station - * @dd: the dependent device struct - * - * Delete the dependent device from the dock's hotplug device list - */ -static void -dock_del_hotplug_device(struct dock_station *ds, - struct dock_dependent_device *dd) +static void hotplug_info_put(struct klist_node *node) { - mutex_lock(&ds->hp_lock); - list_del(&dd->hotplug_list); - mutex_unlock(&ds->hp_lock); + struct dock_hotplug_info *info = node_to_info(node); + + info->ops->put(info->context); + kfree(info); } /** @@ -354,15 +342,22 @@ static void dock_remove_acpi_device(acpi_handle handle) static void hotplug_dock_devices(struct dock_station *ds, u32 event) { struct dock_dependent_device *dd; + struct klist_iter iter; + struct klist_node *node; + struct dock_hotplug_info *info; mutex_lock(&ds->hp_lock); /* * First call driver specific hotplug functions */ - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) - if (dd->ops && dd->ops->handler) - dd->ops->handler(dd->handle, event, dd->context); + klist_iter_init(&ds->hotplug_devices, &iter); + while ((node = klist_next(&iter))) { + info = node_to_info(node); + if (info->ops && info->ops->handler) + info->ops->handler(info->handle, event, info->context); + } + klist_iter_exit(&iter); /* * Now make sure that an acpi_device is created for each @@ -384,7 +379,9 @@ static void dock_event(struct dock_station *ds, u32 event, int num) struct device *dev = &ds->dock_device->dev; char event_string[13]; char *envp[] = { event_string, NULL }; - struct dock_dependent_device *dd; + struct klist_iter iter; + struct klist_node *node; + struct dock_hotplug_info *info; if (num == UNDOCK_EVENT) sprintf(event_string, "EVENT=undock"); @@ -398,9 +395,13 @@ static void dock_event(struct dock_station *ds, u32 event, int num) if (num == DOCK_EVENT) kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); - list_for_each_entry(dd, &ds->hotplug_devices, hotplug_list) - if (dd->ops && dd->ops->uevent) - dd->ops->uevent(dd->handle, event, dd->context); + klist_iter_init(&ds->hotplug_devices, &iter); + while ((node = klist_next(&iter))) { + info = node_to_info(node); + if (info->ops && info->ops->handler) + info->ops->handler(info->handle, event, info->context); + } + klist_iter_exit(&iter); if (num != DOCK_EVENT) kobject_uevent_env(&dev->kobj, KOBJ_CHANGE, envp); @@ -580,12 +581,16 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops void *context) { struct dock_dependent_device *dd; + struct dock_hotplug_info *info; struct dock_station *dock_station; int ret = -EINVAL; if (!dock_station_count) return -ENODEV; + if (ops == NULL || ops->get == NULL || ops->put == NULL) + return -EINVAL; + /* * make sure this handle is for a device dependent on the dock, * this would include the dock station itself @@ -598,9 +603,18 @@ register_hotplug_dock_device(acpi_handle handle, const struct acpi_dock_ops *ops */ dd = find_dock_dependent_device(dock_station, handle); if (dd) { - dd->ops = ops; - dd->context = context; - dock_add_hotplug_device(dock_station, dd); + info = kzalloc(sizeof(*info), GFP_KERNEL); + if (!info) { + unregister_hotplug_dock_device(handle); + ret = -ENOMEM; + break; + } + + info->ops = ops; + info->context = context; + info->handle = dd->handle; + klist_add_tail(&info->node, + &dock_station->hotplug_devices); ret = 0; } } @@ -615,16 +629,22 @@ EXPORT_SYMBOL_GPL(register_hotplug_dock_device); */ void unregister_hotplug_dock_device(acpi_handle handle) { - struct dock_dependent_device *dd; struct dock_station *dock_station; + struct klist_iter iter; + struct klist_node *node; + struct dock_hotplug_info *info; if (!dock_station_count) return; list_for_each_entry(dock_station, &dock_stations, sibling) { - dd = find_dock_dependent_device(dock_station, handle); - if (dd) - dock_del_hotplug_device(dock_station, dd); + klist_iter_init(&dock_station->hotplug_devices, &iter); + while ((node = klist_next(&iter))) { + info = node_to_info(node); + if (info->handle == handle) + klist_del(&info->node); + } + klist_iter_exit(&iter); } } EXPORT_SYMBOL_GPL(unregister_hotplug_dock_device); @@ -951,7 +971,8 @@ static int __init dock_add(acpi_handle handle) mutex_init(&dock_station->hp_lock); spin_lock_init(&dock_station->dd_lock); INIT_LIST_HEAD(&dock_station->sibling); - INIT_LIST_HEAD(&dock_station->hotplug_devices); + klist_init(&dock_station->hotplug_devices, + hotplug_info_get, hotplug_info_put); ATOMIC_INIT_NOTIFIER_HEAD(&dock_notifier_list); INIT_LIST_HEAD(&dock_station->dependent_devices); diff --git a/drivers/pci/hotplug/acpiphp_glue.c b/drivers/pci/hotplug/acpiphp_glue.c index 716aa93..5d696f5 100644 --- a/drivers/pci/hotplug/acpiphp_glue.c +++ b/drivers/pci/hotplug/acpiphp_glue.c @@ -145,9 +145,24 @@ static int post_dock_fixups(struct notifier_block *nb, unsigned long val, return NOTIFY_OK; } +static void acpiphp_dock_get(void *data) +{ + struct acpiphp_func *func = data; + + get_bridge(func->slot->bridge); +} + +static void acpiphp_dock_put(void *data) +{ + struct acpiphp_func *func = data; + + put_bridge(func->slot->bridge); +} static const struct acpi_dock_ops acpiphp_dock_ops = { .handler = handle_hotplug_event_func, + .get = acpiphp_dock_get, + .put = acpiphp_dock_put, }; /* Check whether the PCI device is managed by native PCIe hotplug driver */ diff --git a/include/acpi/acpi_drivers.h b/include/acpi/acpi_drivers.h index e6168a2..8fcc9ac 100644 --- a/include/acpi/acpi_drivers.h +++ b/include/acpi/acpi_drivers.h @@ -115,6 +115,8 @@ void pci_acpi_crs_quirks(void); struct acpi_dock_ops { acpi_notify_handler handler; acpi_notify_handler uevent; + void (*get)(void *data); + void (*put)(void *data); }; #if defined(CONFIG_ACPI_DOCK) || defined(CONFIG_ACPI_DOCK_MODULE)
This is a preparation for next patch to avoid breaking bisecting. If next patch is applied without this one, it will cause deadlock as below: Case 1: [ 31.015593] Possible unsafe locking scenario: [ 31.018350] CPU0 CPU1 [ 31.019691] ---- ---- [ 31.021002] lock(&dock_station->hp_lock); [ 31.022327] lock(&slot->crit_sect); [ 31.023650] lock(&dock_station->hp_lock); [ 31.025010] lock(&slot->crit_sect); [ 31.026342] Case 2: hotplug_dock_devices() mutex_lock(&ds->hp_lock) dd->ops->handler() register_hotplug_dock_device() mutex_lock(&ds->hp_lock) [ 34.316570] [ INFO: possible recursive locking detected ] [ 34.316573] 3.10.0-rc4 #6 Tainted: G C [ 34.316575] --------------------------------------------- [ 34.316577] kworker/0:0/4 is trying to acquire lock: [ 34.316579] (&dock_station->hp_lock){+.+.+.}, at: [<ffffffff813c766b>] register_hotplug_dock_device+0x6a/0xbf [ 34.316588] but task is already holding lock: [ 34.316590] (&dock_station->hp_lock){+.+.+.}, at: [<ffffffff813c7270>] hotplug_dock_devices+0x2c/0xda [ 34.316595] other info that might help us debug this: [ 34.316597] Possible unsafe locking scenario: [ 34.316599] CPU0 [ 34.316601] ---- [ 34.316602] lock(&dock_station->hp_lock); [ 34.316605] lock(&dock_station->hp_lock); [ 34.316608] *** DEADLOCK *** So fix this deadlock by not taking ds->hp_lock in function register_hotplug_dock_device(). This patch also fixes a possible race conditions in function dock_event() because previously it accesses ds->hotplug_devices list without holding ds->hp_lock. Signed-off-by: Jiang Liu <jiang.liu@huawei.com> Cc: Len Brown <lenb@kernel.org> Cc: "Rafael J. Wysocki" <rjw@sisk.pl> Cc: Bjorn Helgaas <bhelgaas@google.com> Cc: Yinghai Lu <yinghai@kernel.org> Cc: Yijing Wang <wangyijing@huawei.com> Cc: linux-acpi@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-pci@vger.kernel.org Cc: <stable@vger.kernel.org> # 3.8+ --- drivers/acpi/dock.c | 109 ++++++++++++++++++++++--------------- drivers/pci/hotplug/acpiphp_glue.c | 15 +++++ include/acpi/acpi_drivers.h | 2 + 3 files changed, 82 insertions(+), 44 deletions(-)