Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7408206rwr; Wed, 10 May 2023 07:56:25 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6d2gwBlvEiiOWN2PvaMR8nZD0rmqs3Jp623CnpWs+z39nlxekBlNpGClrXu69oZG3naF9e X-Received: by 2002:a17:90a:5aa6:b0:24e:28c:f391 with SMTP id n35-20020a17090a5aa600b0024e028cf391mr17846701pji.27.1683730585526; Wed, 10 May 2023 07:56:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683730585; cv=none; d=google.com; s=arc-20160816; b=mM2I74u+REbj+OLRD0p1G98lpYiAcsPOrMBe7wRNZCee91LtU7rQ+pbCaKvyTLRsCX dzdYyCD7TAHeb7ppN/0gBlj6uYETMGHsBi7QGb7Yer3DaXCwOUstl+QVXMxwwPIhBOcB 504v85joU4l6AwNwDuWI+6hF61q7vaZWaN4ZaHr2BDJ2uAMLQR9Hv6rimsinE56u1N9q R8eNEQ7JXXOJDuPEJI60CwiQgJQ3MHma37pokXuFVqdeLALox76+L+HeQVOgP8ul6TyL vFsy9+jq8eSVmNzaD8sTn2KCbDHKc4k4Mig7zLFntjkOMq/sMY45Arwpg50o07YAkRG5 QMKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=xoK0t0FIXLMBM9odYWFYmeSywbjn/SJsIsX4GI4hTOo=; b=GNCiqE7Nk6c6nTuSoIW5u6bEUQrOvmYVPhmhWUH6HFV+waBGLvO4fOaw7qhqPpMbel pnz39CT12VVhuU4enOuKhbWpleiVEr5B1Bm6ONB6Y4gKzXe7z95y4nIa+RiHXzvSjnqS SrJx9rH5m4uXGEhBrFBE7esVkfv3N9sXvkIXDA0Euf3ECqtkXlKQ+lj4Dm/wGzGIzebl Z/FWrD9HkQkY5vnU+19cz+A9i32rsugIU7AwhHpWBzURsCYl7gUxVKDJsqvGXyO63fAL 654wU7r2iYwj1949HNQDCnBlxaZpEX1jdcwNO5GIbOYgCOnN/1JchqGjR1P3Yo44eRlW +pyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gnuweeb.org header.s=default header.b=jZseRr+F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnuweeb.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lj15-20020a17090b344f00b0024e3c22a7dbsi17686966pjb.113.2023.05.10.07.56.10; Wed, 10 May 2023 07:56:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gnuweeb.org header.s=default header.b=jZseRr+F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnuweeb.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237542AbjEJOk2 (ORCPT + 99 others); Wed, 10 May 2023 10:40:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43926 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237111AbjEJOkW (ORCPT ); Wed, 10 May 2023 10:40:22 -0400 Received: from gnuweeb.org (gnuweeb.org [51.81.211.47]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 552A86EB5; Wed, 10 May 2023 07:40:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gnuweeb.org; s=default; t=1683729615; bh=SKIms/x8UkuCSr7MMpMwCUwu5UFRx/RZRLA+rEglAko=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=jZseRr+FoEyBwmEDpOSOuV1XqLGTpFkp1YdWeGNopmPeGlzWr+noMhhYkVGLQNh3t 4UsvxDcUNQ5HXZZ7Sy/uoPqRg0fLJuIHMmL0UU/3CAYhAwyohY6O/b/5qNVLaOsuZY wjhMsT8NASw5rWXUj6PPGo9iS0Va3Vi2NusYDoOEFIGi1J0RXwxDFO6SH5Cqr6llv2 yRXVxl59iYbuDsvrxKCnqAKB81J6o0cmRUQo0fKBaVN8xTZeXQZF5Yj2Co+tkCFI7M +ifDSBzTkmRGiRBL6QdyHiSWyfjL29BjyFJw+ypvllEQv/nsEjshIN0PZGK3g30KEx kGzk4Cd/aI+DA== Received: from integral2.. (unknown [101.128.114.135]) by gnuweeb.org (Postfix) with ESMTPSA id B13FE245CF1; Wed, 10 May 2023 21:40:13 +0700 (WIB) From: Ammar Faizi To: Jens Axboe Cc: Ammar Faizi , =?UTF-8?q?Barnab=C3=A1s=20P=C5=91cze?= , Michael William Jonathan , Linux Kernel Mailing List , io-uring Mailing List , GNU/Weeb Mailing List Subject: [PATCH liburing v1 2/2] recv-msgall: Fix invalid mutex usage Date: Wed, 10 May 2023 21:39:27 +0700 Message-Id: <20230510143927.123170-3-ammarfaizi2@gnuweeb.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230510143927.123170-1-ammarfaizi2@gnuweeb.org> References: <20230510143927.123170-1-ammarfaizi2@gnuweeb.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Calling pthread_mutex_lock() twice with the same mutex in the same thread without unlocking it first is invalid. The intention behind this pattern was to wait for the recv_fn() thread to be ready. Use the pthread barrier instead. It is more straightforward and correct. Fixes: https://github.com/axboe/liburing/issues/855 Reported-by: Barnabás Pőcze Signed-off-by: Ammar Faizi --- test/recv-msgall.c | 18 +++++++----------- 1 file changed, 7 insertions(+), 11 deletions(-) diff --git a/test/recv-msgall.c b/test/recv-msgall.c index f809834b2e427fc5..d1fcdb0d510423e7 100644 --- a/test/recv-msgall.c +++ b/test/recv-msgall.c @@ -19,7 +19,7 @@ #define HOST "127.0.0.1" static __be16 bind_port; struct recv_data { - pthread_mutex_t mutex; + pthread_barrier_t barrier; int use_recvmsg; struct msghdr msg; }; @@ -122,11 +122,11 @@ static void *recv_fn(void *data) ret = t_create_ring_params(1, &ring, &p); if (ret == T_SETUP_SKIP) { - pthread_mutex_unlock(&rd->mutex); + pthread_barrier_wait(&rd->barrier); ret = 0; goto err; } else if (ret < 0) { - pthread_mutex_unlock(&rd->mutex); + pthread_barrier_wait(&rd->barrier); goto err; } @@ -135,7 +135,7 @@ static void *recv_fn(void *data) fprintf(stderr, "recv_prep failed: %d\n", ret); goto err; } - pthread_mutex_unlock(&rd->mutex); + pthread_barrier_wait(&rd->barrier); ret = do_recv(&ring); close(sock); io_uring_queue_exit(&ring); @@ -219,28 +219,24 @@ err: static int test(int use_recvmsg) { - pthread_mutexattr_t attr; pthread_t recv_thread; struct recv_data rd; int ret; void *retval; - pthread_mutexattr_init(&attr); - pthread_mutexattr_setpshared(&attr, 1); - pthread_mutex_init(&rd.mutex, &attr); - pthread_mutex_lock(&rd.mutex); + pthread_barrier_init(&rd.barrier, NULL, 2); rd.use_recvmsg = use_recvmsg; ret = pthread_create(&recv_thread, NULL, recv_fn, &rd); if (ret) { fprintf(stderr, "Thread create failed: %d\n", ret); - pthread_mutex_unlock(&rd.mutex); return 1; } - pthread_mutex_lock(&rd.mutex); + pthread_barrier_wait(&rd.barrier); do_send(); pthread_join(recv_thread, &retval); + pthread_barrier_destroy(&rd.barrier); return (intptr_t)retval; } -- Ammar Faizi