Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6256010imu; Mon, 21 Jan 2019 05:57:44 -0800 (PST) X-Google-Smtp-Source: ALg8bN5p2CAiFF9vQqEFa1qiVFyBVBxrOe56GRmmcPRxbW4TwUTRubVOcqK8tbNnKTArrCI7thjW X-Received: by 2002:a62:ca05:: with SMTP id n5mr29940614pfg.154.1548079064245; Mon, 21 Jan 2019 05:57:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548079064; cv=none; d=google.com; s=arc-20160816; b=BXQNJkc1IyJV9dW+1Zs0+oIasddNLjsSeUbv8lk6zM9sVsyEtBP74XoPKr+fsTWXsX 8mn59dXeKHe2ZnFLgYG3eZNXIwmbdVN8ZSjkVGgDyQFbdAW8PjYpr/k3Nx1jdWUjDVMj V/fMF2ag5kAsmSdOXcylcO898cqdFjRf2vpIUtWnvAf5Ym2QNrQ79JY5aaviXWcSYInW wXnNQBYUdCInz1RCmGyOB4yFEhx+AGGyOBGwwN6sQ0sR6wssmgUJaRV5pIvVq0TmNHj7 wTSaJ4cZF0vJc0Xw8L8D+FDlS3jgBdDY9fRSyV9Pe6tTbiyj5W5QPwMosHJ4CJx/pskm Y1ZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YKi/1aqaeJw77FwHl9pxeXl7FPJ+ae23cAbtGiBZ6sI=; b=rVTGJJfm1I8n3YiSp7NRZEczjMUWZKohxqob9eWDippQLBw4f1MkcicQvvQz1dDX4p 0aSHSqAoy3x0LDfK3AKlniWw3W/rGMaaGGchckzdMRgyGCj5OWOXe1vQkK7LRhVLumW9 Dz3t41SP/DQ+GqukVMcd6fj3Her0vNgh8w9H+1XVvTV42Ra0e7KmI5rWgaUTWPMVNohY XrUhJ14ayPKP5q8u4RRAxMV1c0tH4qH88ZmKe8318usd9IqO4T+PWrQXqpeYTYM1kXy9 sAUcjY5/K94NhbdOKSmEXJMGfzPnMayhI57lMQVipeJTh2EqyFUlivsMW808E6hKf1tK lXgQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XXvlMYb1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k64si13357459pge.7.2019.01.21.05.57.28; Mon, 21 Jan 2019 05:57:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XXvlMYb1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731742AbfAUNzf (ORCPT + 99 others); Mon, 21 Jan 2019 08:55:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:40238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731733AbfAUNzb (ORCPT ); Mon, 21 Jan 2019 08:55:31 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3BF3520861; Mon, 21 Jan 2019 13:55:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548078930; bh=BPo/BOGj/ioXB67XrTTeURLxsdTnp5tGJljFcx8auHE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XXvlMYb1zG9p770w4EUHlXVr/PnV1kMNro83ShR5vmWkgV01k4QCOfzFPDOzFQoi8 8IoEktS4PO0km3RTBX4Ojd19PRXmLToQ8TsXbvN+0VcobB6WrHaQ70QXzAnJNREqoK 6IQ0d1KR/WhTKqbafDgwKS1fvDMpGgLH+fEiU9kk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Slaby , "Lukas F. Hartmann" , Dmitry Safonov Subject: [PATCH 4.9 04/51] tty: Dont hold ldisc lock in tty_reopen() if ldisc present Date: Mon, 21 Jan 2019 14:44:00 +0100 Message-Id: <20190121122453.967865420@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190121122453.700446926@linuxfoundation.org> References: <20190121122453.700446926@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dmitry Safonov commit d3736d82e8169768218ee0ef68718875918091a0 upstream. Try to get reference for ldisc during tty_reopen(). If ldisc present, we don't need to do tty_ldisc_reinit() and lock the write side for line discipline semaphore. Effectively, it optimizes fast-path for tty_reopen(), but more importantly it won't interrupt ongoing IO on the tty as no ldisc change is needed. Fixes user-visible issue when tty_reopen() interrupted login process for user with a long password, observed and reported by Lukas. Fixes: c96cf923a98d ("tty: Don't block on IO when ldisc change is pending") Fixes: 83d817f41070 ("tty: Hold tty_ldisc_lock() during tty_reopen()") Cc: Jiri Slaby Reported-by: Lukas F. Hartmann Tested-by: Lukas F. Hartmann Cc: stable Signed-off-by: Dmitry Safonov Signed-off-by: Greg Kroah-Hartman --- drivers/tty/tty_io.c | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-) --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -1475,7 +1475,8 @@ static void tty_driver_remove_tty(struct static int tty_reopen(struct tty_struct *tty) { struct tty_driver *driver = tty->driver; - int retval; + struct tty_ldisc *ld; + int retval = 0; if (driver->type == TTY_DRIVER_TYPE_PTY && driver->subtype == PTY_TYPE_MASTER) @@ -1487,13 +1488,18 @@ static int tty_reopen(struct tty_struct if (test_bit(TTY_EXCLUSIVE, &tty->flags) && !capable(CAP_SYS_ADMIN)) return -EBUSY; - retval = tty_ldisc_lock(tty, 5 * HZ); - if (retval) - return retval; - - if (!tty->ldisc) - retval = tty_ldisc_reinit(tty, tty->termios.c_line); - tty_ldisc_unlock(tty); + ld = tty_ldisc_ref_wait(tty); + if (ld) { + tty_ldisc_deref(ld); + } else { + retval = tty_ldisc_lock(tty, 5 * HZ); + if (retval) + return retval; + + if (!tty->ldisc) + retval = tty_ldisc_reinit(tty, tty->termios.c_line); + tty_ldisc_unlock(tty); + } if (retval == 0) tty->count++;