Re: [PATCH v8 02/10] kernfs: make ->attr.open RCU protected.

From: Tejun Heo
Date: Fri Apr 22 2022 - 12:20:10 EST


On Sun, Apr 10, 2022 at 12:37:11PM +1000, Imran Khan wrote:
> static int kernfs_seq_show(struct seq_file *sf, void *v)
> {
> struct kernfs_open_file *of = sf->private;
> + struct kernfs_open_node *on = rcu_dereference_raw(of->kn->attr.open);

I suppose raw deref is safe because @on can't go away while @of is alive,
right? If that's the case, please factor out of -> on dereferencing into a
helper and put a comment there explaining why the raw deref is safe.

...
> @@ -201,7 +203,8 @@ static ssize_t kernfs_file_read_iter(struct kiocb *iocb, struct iov_iter *iter)
> goto out_free;
> }
>
> - of->event = atomic_read(&of->kn->attr.open->event);
> + on = rcu_dereference_raw(of->kn->attr.open);

cuz we don't wanna sprinkle raw derefs in multiple places without
explanation like this.

...
> /**
> @@ -566,24 +567,30 @@ static int kernfs_get_open_node(struct kernfs_node *kn,
> static void kernfs_put_open_node(struct kernfs_node *kn,
> struct kernfs_open_file *of)
> {
> - struct kernfs_open_node *on = kn->attr.open;
> - unsigned long flags;
> + struct kernfs_open_node *on;
> +
> + /* ->attr.open NULL means there are no more open files */
> + if (rcu_dereference_raw(kn->attr.open) == NULL)
> + return;

For pointer value check, what you want is rcu_access_pointer(). That said,
tho, why is this being called if no one is linked on it? Before removing the
refcnt, that'd be the same as trying to put a 0 ref. How does that happen?
Also, can you please rename it to unlink or something of the sort? It's
confusing to call it put when there's no refcnt.

>
> mutex_lock(&kernfs_open_file_mutex);
> - spin_lock_irqsave(&kernfs_open_node_lock, flags);
> +
> + on = rcu_dereference_protected(kn->attr.open,
> + lockdep_is_held(&kernfs_open_file_mutex));

Again, a better way to do it would be defining a kn -> on accessor which
encodes the safe way to deref and use it. The deref rule is tied to the
deref itself not the callsite.

> +
> + if (!on) {
> + mutex_unlock(&kernfs_open_file_mutex);
> + return;
> + }
>
> if (of)
> list_del(&of->list);
>
> - if (list_empty(&on->files))
> - kn->attr.open = NULL;
> - else
> - on = NULL;
> -
> - spin_unlock_irqrestore(&kernfs_open_node_lock, flags);
> + if (list_empty(&on->files)) {
> + rcu_assign_pointer(kn->attr.open, NULL);
> + kfree_rcu(on, rcu_head);
> + }
> mutex_unlock(&kernfs_open_file_mutex);
> -
> - kfree(on);
> }
>
> static int kernfs_fop_open(struct inode *inode, struct file *file)
> @@ -765,12 +772,13 @@ void kernfs_drain_open_files(struct kernfs_node *kn)
> if (!(kn->flags & (KERNFS_HAS_MMAP | KERNFS_HAS_RELEASE)))
> return;
>
> - on = kn->attr.open;
> - if (!on)
> + if (rcu_dereference_raw(kn->attr.open) == NULL)
> return;

rcu_access_pointer again and you gotta explain why the lockless check is
safe.

> mutex_lock(&kernfs_open_file_mutex);
> - if (!kn->attr.open) {
> + on = rcu_dereference_check(kn->attr.open,
> + lockdep_is_held(&kernfs_open_file_mutex));
> + if (!on) {
> mutex_unlock(&kernfs_open_file_mutex);
> return;
> }
...
> @@ -912,14 +920,13 @@ void kernfs_notify(struct kernfs_node *kn)
> return;
>
> /* kick poll immediately */
> - spin_lock_irqsave(&kernfs_open_node_lock, flags);
> - on = kn->attr.open;
> + rcu_read_lock();
> + on = rcu_dereference(kn->attr.open);
> if (on) {
> atomic_inc(&on->event);
> wake_up_interruptible(&on->poll);
> }
> - spin_unlock_irqrestore(&kernfs_open_node_lock, flags);
> -
> + rcu_read_unlock();

An explanation of why this is safe in terms of event ordering would be great
here.

Thanks.

--
tejun