Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751337AbaLEQyV (ORCPT ); Fri, 5 Dec 2014 11:54:21 -0500 Received: from smtp.codeaurora.org ([198.145.11.231]:40884 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751208AbaLEQyT (ORCPT ); Fri, 5 Dec 2014 11:54:19 -0500 Message-ID: <5481E336.8090303@codeaurora.org> Date: Fri, 05 Dec 2014 18:54:14 +0200 From: Tanya Brokhman User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: Richard Weinberger , dedekind1@gmail.com CC: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 4/6] UBI: Fastmap: Fix races in ubi_wl_get_peb() References: <1416835236-25185-1-git-send-email-richard@nod.at> <1416835236-25185-5-git-send-email-richard@nod.at> <5481AE79.1090900@codeaurora.org> <5481B120.5020409@nod.at> In-Reply-To: <5481B120.5020409@nod.at> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Richard On 12/5/2014 3:20 PM, Richard Weinberger wrote: > Tanya, > > Am 05.12.2014 um 14:09 schrieb Tanya Brokhman: >> On 11/24/2014 3:20 PM, Richard Weinberger wrote: >>> ubi_wl_get_peb() has two problems, it reads the pool >>> size and usage counters without any protection. >>> While reading one value would be perfectly fine it reads multiple >>> values and compares them. This is racy and can lead to incorrect >>> pool handling. >>> Furthermore ubi_update_fastmap() is called without wl_lock held, >>> before incrementing the used counter it needs to be checked again. >> >> I didn't see where you fixed the ubi_update_fastmap issue you just mentioned. > > This is exactly what you're questioning below. > We have to recheck as the pool counter could have changed. > Oh, I understood the commit msg a bit differently, but now I see that it was my mistake. thanks! >>> It could happen that another thread consumed all PEBs from the >>> pool and the counter goes beyond ->size. >>> >>> Signed-off-by: Richard Weinberger >>> --- >>> drivers/mtd/ubi/ubi.h | 3 ++- >>> drivers/mtd/ubi/wl.c | 34 +++++++++++++++++++++++----------- >>> 2 files changed, 25 insertions(+), 12 deletions(-) >>> >>> diff --git a/drivers/mtd/ubi/ubi.h b/drivers/mtd/ubi/ubi.h >>> index 04c4c05..d672412 100644 >>> --- a/drivers/mtd/ubi/ubi.h >>> +++ b/drivers/mtd/ubi/ubi.h >>> @@ -439,7 +439,8 @@ struct ubi_debug_info { >>> * @pq_head: protection queue head >>> * @wl_lock: protects the @used, @free, @pq, @pq_head, @lookuptbl, @move_from, >>> * @move_to, @move_to_put @erase_pending, @wl_scheduled, @works, >>> - * @erroneous, @erroneous_peb_count, and @fm_work_scheduled fields >>> + * @erroneous, @erroneous_peb_count, @fm_work_scheduled, @fm_pool, >>> + * and @fm_wl_pool fields >>> * @move_mutex: serializes eraseblock moves >>> * @work_sem: used to wait for all the scheduled works to finish and prevent >>> * new works from being submitted >>> diff --git a/drivers/mtd/ubi/wl.c b/drivers/mtd/ubi/wl.c >>> index cb2e571..7730b97 100644 >>> --- a/drivers/mtd/ubi/wl.c >>> +++ b/drivers/mtd/ubi/wl.c >>> @@ -629,24 +629,36 @@ void ubi_refill_pools(struct ubi_device *ubi) >>> */ >>> int ubi_wl_get_peb(struct ubi_device *ubi) >>> { >>> - int ret; >>> + int ret, retried = 0; >>> struct ubi_fm_pool *pool = &ubi->fm_pool; >>> struct ubi_fm_pool *wl_pool = &ubi->fm_wl_pool; >>> >>> - if (!pool->size || !wl_pool->size || pool->used == pool->size || >>> - wl_pool->used == wl_pool->size) >>> +again: >>> + spin_lock(&ubi->wl_lock); >>> + /* We check here also for the WL pool because at this point we can >>> + * refill the WL pool synchronous. */ >>> + if (pool->used == pool->size || wl_pool->used == wl_pool->size) { >>> + spin_unlock(&ubi->wl_lock); >>> ubi_update_fastmap(ubi); >>> - >>> - /* we got not a single free PEB */ >>> - if (!pool->size) >>> - ret = -ENOSPC; >>> - else { >>> spin_lock(&ubi->wl_lock); >>> - ret = pool->pebs[pool->used++]; >>> - prot_queue_add(ubi, ubi->lookuptbl[ret]); >>> + } >>> + >>> + if (pool->used == pool->size) { >> >> Im confused about this "if" condition. You just tested pool->used == pool->size in the previous "if". If in the previous if pool->used != pool->size and wl_pool->used != >> wl_pool->size, you didn't enter, the lock is still held so pool->used != pool->size still. If in the previos "if" wl_pool->used == wl_pool->size was true nd tou released the lock, >> ubi_update_fastmap(ubi) was called, which refills the pools. So again, if pools were refilled pool->used would be 0 here and pool->size > 0. >> >> So in both cases I don't see how at this point pool->used == pool->size could ever be true? > > If we enter the "if (pool->used == pool->size || wl_pool->used == wl_pool->size) {" branch we unlock wl_lock and call ubi_update_fastmap(). > Another thread can enter ubi_wl_get_peb() and alter the pool counter. So we have to recheck the counter after taking wl_lock again. hmmm... ok. Perhaps a comment could be added in the code to explain this case in a few words? > >>> spin_unlock(&ubi->wl_lock); >>> + if (retried) { >>> + ubi_err(ubi, "Unable to get a free PEB from user WL pool"); >>> + ret = -ENOSPC; >>> + goto out; >>> + } >>> + retried = 1; >> >> Why did you decide to retry in this function? and why only 1 retry attempt? I'm not against it, trying to understand the logic. > > Because failing immediately with -ENOSPC is not nice. Why not? this is what was done before.... I think what I really bothers me in this case is that you don't sleep, you branch immediately to retry again, so the chances that there will be context switch and free pebs appear aren't that high. I'm used to functions using some sort of "retry" logic to sleep before retrying. Of course sleeping isn't a good idea here. That's why the "retry" bugs me a bit. Before we do that I'll give UBI a second chance to produce a free PEB. > > Thanks, > //richard > Thanks, Tanya Brokhman -- Qualcomm Israel, on behalf of Qualcomm Innovation Center, Inc. The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/