USB stack getting confused

Hans Petter Selasky hps at selasky.org
Sun Mar 10 10:15:55 UTC 2019


On 3/10/19 10:47 AM, Konstantin Belousov wrote:
> On Sat, Mar 09, 2019 at 10:35:28PM +0100, Hans Petter Selasky wrote:
>> On 3/9/19 8:23 PM, Konstantin Belousov wrote:
>>> On Sat, Mar 09, 2019 at 11:41:31AM -0700, Warner Losh wrote:
>>>>
>>>> Is there a form of destroy_dev() that does a revoke on all open instances?
>>>> Eg, this is gone, you can't use it anymore, and all further attempts to use
>>>> the device will generate an error, but in the mean time we destroy the
>>>> device and let the detach routine get on with life. waiting may make sense
>>>> when you are merely unloading the driver (and getting to the detach routine
>>>> that way), but when the device is gone, I've come around to the point of
>>>> view that we should just destroy it w/o waiting for closes and anybody that
>>>> touches it afterwards gets an error and has to cope with the error. But
>>>> even in the unload case, we maybe we shouldn't get to the detach routine
>>>> unless we're forcing and/or the detach routine just returns EBUSY since the
>>>> only one that knows what dev_t's are associated with the device_t is the
>>>> driver itself.
>>> You are asking very basic questions about devfs there.
>>>
>>> destroy_dev(9) waits for two things:
>>> - that all threads left the cdevsw methods for the given device;
>>> - that all cdevpriv destructors finished running.
>>
>> Hi,
>>
>>> To facilitate waking up threads potentially sleeping inside the cdevsw
>>> methods, drivers might implement d_purge method which must weed out sleeping
>>> threads from inside the code in the bound time.
>>
>> USB will purge all callers before calling destroy_dev(). This is not the
>> problem.
>>
>>> After that we return from destroy_dev(9) and guarantee that no new calls
>>> into cdevsw is done for this device.  devfs magic consumes  the fo_ and
>>> VOP_ calls and does not allow them to reach into the driver.
>>
>> When I designed the current USB devfs it was important to me to keep
>> open() and close() calls balanced to avoid situations where an open call
>> may setup some resource and then close(), which free this resource
>> again, never gets called. destroy_dev(9) makes no such guarantee, and I
>> think that is a failure of destroy_dev(9). That's when I started using
>> the cdev's destructor callback function.
> Lets correct the terminology first.
> Are you referring to the d_open/d_close pairing ?
> 
> Without D_TRACKCLOSE, d_close() is only called on the last close of
> the device.  With D_TRACKCLOSE, devfs _tries_ to call d_close each time
> it sees the VOP_CLOSE() operation from VFS, but due to way VFS works
> VOP_CLOSE() could be missed.  Also, d_open vs d_close are not synchronized,
> so a driver might get call to d_open in parallel to last d_close.

Hi,

I'm using D_TRACKCLOSE.

> 
> What do you mean by cdev destructor callback function ?  Do you mean
> callback from destroy_dev_cb(), or do you actually reference the
> destructors from devfs_set_cdevpriv(9) ?

Yes, I mean the use of devfs_set_cdevpriv(9).

> If the later, then destroy_dev() guarantees that all cdevpriv destructors
> for all file descriptors opened against the destroyed cdev are finished
> before destroy_dev() returns.  In other words, if you use cdevpriv, you
> can remove the drain for your refcount and everything should just work.

Using devfs_set_cdevpriv(9), means destroy_dev() will be called after 
the last close() on the file descriptor in question. Is this strictly 
needed? You see this in the code that devfs_close_f() calls devfs_fpdrop().

> 
>>
>>> So what usb does there is actively defeating existing mechanism by
>>> keeping internal refcount on opens and refusing to call destroy_dev()
>>> until the count goes to zero
>>
>> The FreeBSD USB stack also is used in environments w/o DEVFS and need
>> own refcounts.

 >
> I completely disagree with use of code sharing as excuse for FreeBSD bugs.
 >

Like said, using devfs_set_cdevpriv(9), which the USB stack needs, 
basically means we are waiting for the final user-space close() or 
"struct file" refcount drop. This behaviour is not like announced. I 
would like to have the cdevpriv's destructor executed before 
destroy_dev() returns.

Again, the USB stack needs paired operation. An open() call must always 
be followed by a close() call on the same FD. Else memory resources will 
leak simply.

--HPS


More information about the freebsd-hackers mailing list