[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALzav=f+=c5XH7Uw9EGVb2P6VxsnpF76e0DXAAXhM0gsWPxw2w@mail.gmail.com>
Date: Mon, 24 Nov 2025 15:45:00 -0800
From: David Matlack <dmatlack@...gle.com>
To: Pasha Tatashin <pasha.tatashin@...een.com>
Cc: pratyush@...nel.org, jasonmiu@...gle.com, graf@...zon.com, rppt@...nel.org,
rientjes@...gle.com, corbet@....net, rdunlap@...radead.org,
ilpo.jarvinen@...ux.intel.com, kanie@...ux.alibaba.com, ojeda@...nel.org,
aliceryhl@...gle.com, masahiroy@...nel.org, akpm@...ux-foundation.org,
tj@...nel.org, yoann.congal@...le.fr, mmaurer@...gle.com,
roman.gushchin@...ux.dev, chenridong@...wei.com, axboe@...nel.dk,
mark.rutland@....com, jannh@...gle.com, vincent.guittot@...aro.org,
hannes@...xchg.org, dan.j.williams@...el.com, david@...hat.com,
joel.granados@...nel.org, rostedt@...dmis.org, anna.schumaker@...cle.com,
song@...nel.org, linux@...ssschuh.net, linux-kernel@...r.kernel.org,
linux-doc@...r.kernel.org, linux-mm@...ck.org, gregkh@...uxfoundation.org,
tglx@...utronix.de, mingo@...hat.com, bp@...en8.de,
dave.hansen@...ux.intel.com, x86@...nel.org, hpa@...or.com, rafael@...nel.org,
dakr@...nel.org, bartosz.golaszewski@...aro.org, cw00.choi@...sung.com,
myungjoo.ham@...sung.com, yesanishhere@...il.com, Jonathan.Cameron@...wei.com,
quic_zijuhu@...cinc.com, aleksander.lobakin@...el.com, ira.weiny@...el.com,
andriy.shevchenko@...ux.intel.com, leon@...nel.org, lukas@...ner.de,
bhelgaas@...gle.com, wagi@...nel.org, djeffery@...hat.com,
stuart.w.hayes@...il.com, ptyadav@...zon.de, lennart@...ttering.net,
brauner@...nel.org, linux-api@...r.kernel.org, linux-fsdevel@...r.kernel.org,
saeedm@...dia.com, ajayachandra@...dia.com, jgg@...dia.com, parav@...dia.com,
leonro@...dia.com, witu@...dia.com, hughd@...gle.com, skhawaja@...gle.com,
chrisl@...nel.org
Subject: Re: [PATCH v7 21/22] liveupdate: luo_flb: Introduce
File-Lifecycle-Bound global state
On Sat, Nov 22, 2025 at 2:24 PM Pasha Tatashin
<pasha.tatashin@...een.com> wrote:
> +int liveupdate_flb_incoming_locked(struct liveupdate_flb *flb, void **objp);
> +void liveupdate_flb_incoming_unlock(struct liveupdate_flb *flb, void *obj);
> +int liveupdate_flb_outgoing_locked(struct liveupdate_flb *flb, void **objp);
> +void liveupdate_flb_outgoing_unlock(struct liveupdate_flb *flb, void *obj);
nit: "locked" should be "lock". "locked" is used for situations where
the lock must already be held by the caller.
> @@ -633,6 +639,7 @@ static void luo_file_finish_one(struct luo_file_set *file_set,
> args.file = luo_file->file;
> args.serialized_data = luo_file->serialized_data;
> args.retrieved = luo_file->retrieved;
> + luo_flb_file_finish(luo_file->fh);
>
> luo_file->fh->ops->finish(&args);
I think luo_flb_file_finish() should be called after the file's
finish() callback. Otherwise the FLB data will be cleaned just before
the last file's finish() callback.
i.e. The order should be
file1->finish()
file2->finish()
file3->finish() // last file
flb->finish()
rather than
file1->finish()
file2->finish()
flb->finish()
file3->finish() // last file
> +static void luo_flb_unlock(struct liveupdate_flb *flb, bool incoming,
> + void *obj)
> +{
> + struct luo_flb_private *private = luo_flb_get_private(flb);
> + struct luo_flb_private_state *state;
> +
> + state = incoming ? &private->incoming : &private->outgoing;
> +
> + lockdep_assert_held(&state->lock);
> + state->obj = obj;
I tripped over this when developing the PCI FLB state. The following
compiles fine and looks innocent enough:
liveupdate_flb_incoming_locked(&pci_liveupdate_flb, &ser);
...
liveupdate_flb_incoming_unlock(&pci_liveupdate_flb, &ser);
But this ends up corrupting state->obj.
Do we have a use-case for replacing obj on unlock? If not I'd suggest
dropping it.
Powered by blists - more mailing lists