Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3185697imu; Sun, 23 Dec 2018 18:45:14 -0800 (PST) X-Google-Smtp-Source: ALg8bN6QsY0fIZz3qLKG5zhLi/ZzVYx2x37u7izMn1bdK7cGG3lh4ER95Vk0Yia30ZJzG70icroo X-Received: by 2002:a63:2b01:: with SMTP id r1mr10808958pgr.432.1545619514035; Sun, 23 Dec 2018 18:45:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545619514; cv=none; d=google.com; s=arc-20160816; b=xQv1RrPfeymj/+pzQjBgOc8PJ8xmX6UzEst6p9KQZmRGG9Q+i3MZJtB425N9mGARZE MGyf7vtqqiMkbdMQEuw7R82Ya13CQPRMo2eQdA5HC9hv1evQFA2Zh+JwUnrCAN59CtNB phaHPMe9gJwOpSxal9l0ZFnWnuAZnxa3WjJc8r+C3a1gkU/1jpzgJKjtj2CZ3VX/QExN gG8ymbH1+Shf0sc5ClbpolJ3emy/uJOz6uKQLfG3RdU37aKFkcpFyvINZKsi/xYQIu5R 35rU5nF4Bc+32eIfJsXWWHK0ndHp3JdAU9VpR9EnmcEZso5AnVZ31dJ7mwKKJLNnGX70 tBDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from; bh=sh5OzaC1pIw9znYV0OPpsgiYLvENPKCDtJfB9CyJYUY=; b=d7GZMePM9owWj/w8s0Fb+uWxP+268rznTa5/ajA/sPuAS6E/AN1b+sgzpqbE1uBVdi QmBuz3Cf1mOJM+9py7AcnOSViZh3u3/h4epOMazjCocRLC9iae7aF/UJJ5lccXxT+kPD Q0RcfofFy2FP4R/2bZqnibc2y0pzT7S5j5HuuigOBcmiYffVmIpNGrBA7aKkU7zrhbBO xpVabE4vQYMDrmw3EsthK8aJQaTjYSPKG2h/3iu3drMaUy7+j2kra6xe977HivZD9tSB tT3rmM7drbFgv6d95VX16XQiXSF81H9dFEQhOIXZwpJcI6QgJsxbcnTjDHUF4MO+CUN/ 4Lng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k5si7114103pfi.176.2018.12.23.18.44.57; Sun, 23 Dec 2018 18:45:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726661AbeLXCoG (ORCPT + 99 others); Sun, 23 Dec 2018 21:44:06 -0500 Received: from mx132-tc.baidu.com ([61.135.168.132]:23179 "EHLO tc-sys-mailedm05.tc.baidu.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726493AbeLXCoG (ORCPT ); Sun, 23 Dec 2018 21:44:06 -0500 Received: from localhost (cp01-cos-dev01.cp01.baidu.com [10.92.119.46]) by tc-sys-mailedm05.tc.baidu.com (Postfix) with ESMTP id 3E5851EBA002; Mon, 24 Dec 2018 10:43:52 +0800 (CST) From: Li RongQing To: linux-kernel@vger.kernel.org, jslaby@suse.com, gregkh@linuxfoundation.org, gkohli@codeaurora.org, alan@linux.intel.com Subject: [PATCH][v2] tty: fix race between flush_to_ldisc and tty_open Date: Mon, 24 Dec 2018 10:43:52 +0800 Message-Id: <1545619432-8875-1-git-send-email-lirongqing@baidu.com> X-Mailer: git-send-email 1.7.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There still is a race window after the commit b027e2298bd588 ("tty: fix data race between tty_init_dev and flush of buf"), if receive_buf call comes before tty initialization completes in n_tty_open and tty->driver_data may be NULL. CPU0 CPU1 ---- ---- n_tty_open tty_init_dev tty_ldisc_unlock schedule flush_to_ldisc n_tty_receive_buf uart_flush_chars uart_start /*tty->driver_data is NULL*/ tty->ops->open /*init tty->driver_data*/ Extending ldisc semaphore lock in tty_init_dev to driver_data initialized completely after tty->ops->open(). Signed-off-by: Zhang Yu Signed-off-by: Li RongQing --- drivers/staging/speakup/spk_ttyio.c | 1 + drivers/tty/pty.c | 2 ++ drivers/tty/serdev/serdev-ttyport.c | 2 ++ drivers/tty/tty_io.c | 14 +++++++++++--- drivers/tty/tty_ldisc.c | 1 + 5 files changed, 17 insertions(+), 3 deletions(-) diff --git a/drivers/staging/speakup/spk_ttyio.c b/drivers/staging/speakup/spk_ttyio.c index 979e3ae249c1..c31f08c98383 100644 --- a/drivers/staging/speakup/spk_ttyio.c +++ b/drivers/staging/speakup/spk_ttyio.c @@ -155,6 +155,7 @@ static int spk_ttyio_initialise_ldisc(struct spk_synth *synth) else ret = -ENODEV; + tty_ldisc_unlock(tty); if (ret) { tty_unlock(tty); return ret; diff --git a/drivers/tty/pty.c b/drivers/tty/pty.c index 00099a8439d2..1b9684d4f718 100644 --- a/drivers/tty/pty.c +++ b/drivers/tty/pty.c @@ -873,9 +873,11 @@ static int ptmx_open(struct inode *inode, struct file *filp) tty_debug_hangup(tty, "opening (count=%d)\n", tty->count); + tty_ldisc_unlock(tty); tty_unlock(tty); return 0; err_release: + tty_ldisc_unlock(tty); tty_unlock(tty); // This will also put-ref the fsi tty_release(inode, filp); diff --git a/drivers/tty/serdev/serdev-ttyport.c b/drivers/tty/serdev/serdev-ttyport.c index fa1672993b4c..ce16cb303e28 100644 --- a/drivers/tty/serdev/serdev-ttyport.c +++ b/drivers/tty/serdev/serdev-ttyport.c @@ -123,6 +123,7 @@ static int ttyport_open(struct serdev_controller *ctrl) if (ret) goto err_close; + tty_ldisc_unlock(tty); tty_unlock(serport->tty); /* Bring the UART into a known 8 bits no parity hw fc state */ @@ -145,6 +146,7 @@ static int ttyport_open(struct serdev_controller *ctrl) err_close: tty->ops->close(tty, NULL); err_unlock: + tty_ldisc_unlock(tty); tty_unlock(tty); tty_release_struct(tty, serport->tty_idx); diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c index 687250ec8032..199f45e2e1b1 100644 --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -1351,7 +1351,6 @@ struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx) retval = tty_ldisc_setup(tty, tty->link); if (retval) goto err_release_tty; - tty_ldisc_unlock(tty); /* Return the tty locked so that it cannot vanish under the caller */ return tty; @@ -1926,7 +1925,7 @@ EXPORT_SYMBOL_GPL(tty_kopen); * - concurrent tty removal from driver table */ static struct tty_struct *tty_open_by_driver(dev_t device, struct inode *inode, - struct file *filp) + struct file *filp, bool *unlock) { struct tty_struct *tty; struct tty_driver *driver = NULL; @@ -1970,6 +1969,7 @@ static struct tty_struct *tty_open_by_driver(dev_t device, struct inode *inode, } } else { /* Returns with the tty_lock held for now */ tty = tty_init_dev(driver, index); + *unlock = true; mutex_unlock(&tty_mutex); } out: @@ -2007,6 +2007,7 @@ static int tty_open(struct inode *inode, struct file *filp) int noctty, retval; dev_t device = inode->i_rdev; unsigned saved_flags = filp->f_flags; + bool unlock = false; nonseekable_open(inode, filp); @@ -2017,7 +2018,7 @@ static int tty_open(struct inode *inode, struct file *filp) tty = tty_open_current_tty(device, filp); if (!tty) - tty = tty_open_by_driver(device, inode, filp); + tty = tty_open_by_driver(device, inode, filp, &unlock); if (IS_ERR(tty)) { tty_free_file(filp); @@ -2042,6 +2043,10 @@ static int tty_open(struct inode *inode, struct file *filp) if (retval) { tty_debug_hangup(tty, "open error %d, releasing\n", retval); + if (unlock) { + unlock = false; + tty_ldisc_unlock(tty); + } tty_unlock(tty); /* need to call tty_release without BTM */ tty_release(inode, filp); if (retval != -ERESTARTSYS) @@ -2067,6 +2072,9 @@ static int tty_open(struct inode *inode, struct file *filp) tty->driver->subtype == PTY_TYPE_MASTER); if (!noctty) tty_open_proc_set_tty(filp, tty); + + if (unlock) + tty_ldisc_unlock(tty); tty_unlock(tty); return 0; } diff --git a/drivers/tty/tty_ldisc.c b/drivers/tty/tty_ldisc.c index fc4c97cae01e..dd9b41f66c18 100644 --- a/drivers/tty/tty_ldisc.c +++ b/drivers/tty/tty_ldisc.c @@ -339,6 +339,7 @@ void tty_ldisc_unlock(struct tty_struct *tty) clear_bit(TTY_LDISC_HALTED, &tty->flags); __tty_ldisc_unlock(tty); } +EXPORT_SYMBOL_GPL(tty_ldisc_unlock); static int tty_ldisc_lock_pair_timeout(struct tty_struct *tty, struct tty_struct *tty2, -- 2.16.2