Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752590AbYJ0KNo (ORCPT ); Mon, 27 Oct 2008 06:13:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751518AbYJ0KNg (ORCPT ); Mon, 27 Oct 2008 06:13:36 -0400 Received: from mx3.mail.elte.hu ([157.181.1.138]:43088 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751426AbYJ0KNf (ORCPT ); Mon, 27 Oct 2008 06:13:35 -0400 Date: Mon, 27 Oct 2008 11:13:03 +0100 From: Ingo Molnar To: Stefan Richter Cc: linux1394-devel@lists.sourceforge.net, bugme-daemon@bugzilla.kernel.org, linux-kernel@vger.kernel.org, Dan Dennedy , Johannes Weiner , Peter Zijlstra Subject: Re: [Bug 11824][PATCH] ieee1394: raw1394: fix possible deadlock in multithreaded clients Message-ID: <20081027101303.GI8116@elte.hu> References: <4902F41E.5070306@s5r6.in-berlin.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.18 (2008-05-17) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00,DNS_FROM_SECURITYSAGE autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] 0.0 DNS_FROM_SECURITYSAGE RBL: Envelope sender in blackholes.securitysage.com Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3073 Lines: 81 * Stefan Richter wrote: > Regression in 2.6.28-rc1: When I added the new state_mutex which > prevents corruption of raw1394's internal state when accessed by > multithreaded client applications, the following possible though > highly unlikely deadlock slipped in: > > Thread A: Thread B: > - acquire mmap_sem - raw1394_write() or raw1394_ioctl() > - raw1394_mmap() - acquire state_mutex > - acquire state_mutex - copy_to/from_user(), possible page fault: > acquire mmap_sem > > The simplest fix is to use mutex_trylock() instead of mutex_lock() in > raw1394_mmap(). This changes the behavior under contention in a way > which is visible to userspace clients. However, since multithreaded > access was entirely buggy before state_mutex was added and libraw1394's > documentation advised application programmers to use a handle only in a > single thread, this change in behaviour should not be an issue in > practice at all. > > Since we have to use mutex_trylock() in raw1394_mmap() regardless > whether /dev/raw1394 was opened with O_NONBLOCK or not, we now use > mutex_trylock() unconditionally everywhere for state_mutex, just to have > consistent behavior. > > Reported-by: Johannes Weiner > Signed-off-by: Stefan Richter > --- > > Background: That new state_mutex went only in because raw1394_ioctl() > already head some weak protection by the Big Kernel Lock, which I > removed for the general reasons pro BKL removal (get better performance > with local locks; make the locking clearer, easier to debug, more > reliable). > > drivers/ieee1394/raw1394.c | 9 ++++++--- > 1 file changed, 6 insertions(+), 3 deletions(-) > > Index: linux/drivers/ieee1394/raw1394.c > =================================================================== > --- linux.orig/drivers/ieee1394/raw1394.c > +++ linux/drivers/ieee1394/raw1394.c > @@ -2268,7 +2268,8 @@ static ssize_t raw1394_write(struct file > return -EFAULT; > } > > - mutex_lock(&fi->state_mutex); > + if (!mutex_trylock(&fi->state_mutex)) > + return -EAGAIN; > > switch (fi->state) { > case opened: > @@ -2548,7 +2549,8 @@ static int raw1394_mmap(struct file *fil > struct file_info *fi = file->private_data; > int ret; > > - mutex_lock(&fi->state_mutex); > + if (!mutex_trylock(&fi->state_mutex)) > + return -EAGAIN; > > if (fi->iso_state == RAW1394_ISO_INACTIVE) > ret = -EINVAL; > @@ -2669,7 +2671,8 @@ static long raw1394_ioctl(struct file *f > break; > } > > - mutex_lock(&fi->state_mutex); > + if (!mutex_trylock(&fi->state_mutex)) > + return -EAGAIN; So we can return a spurious -EAGAIN to user-space, if the state_mutex is taken briefly by some other context? Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/