Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755925AbZCXFzS (ORCPT ); Tue, 24 Mar 2009 01:55:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751876AbZCXFzE (ORCPT ); Tue, 24 Mar 2009 01:55:04 -0400 Received: from cantor.suse.de ([195.135.220.2]:48373 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751815AbZCXFzB (ORCPT ); Tue, 24 Mar 2009 01:55:01 -0400 From: Nikanth Karthikesan Organization: suse.de To: jens.axboe@oracle.com Subject: Re: [PATCH] Fix Bug 10504 - losetup possible circular locking Date: Tue, 24 Mar 2009 11:22:32 +0530 User-Agent: KMail/1.10.3 (Linux/2.6.27.19-3.2-default; KDE/4.1.3; x86_64; ; ) Cc: zdenek.kabelac@gmail.com, bunk@kernel.org, jirislaby@gmail.com, hidave.darkstar@gmail.com, viro@zeniv.linux.org.uk, linux-kernel@vger.kernel.org, nikanth@gmail.com References: <200903121341.13173.knikanth@suse.de> In-Reply-To: <200903121341.13173.knikanth@suse.de> MIME-Version: 1.0 Content-Disposition: inline Message-Id: <200903241122.32599.knikanth@suse.de> Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4163 Lines: 119 Hi Jens Did you get to look at this? Can you ACK/NACK this one? Thanks Nikanth On Thursday 12 March 2009 13:41:12 Nikanth Karthikesan wrote: > With CONFIG_PROVE_LOCKING enabled > > $ losetup /dev/loop0 file > $ losetup -o 32256 /dev/loop1 /dev/loop0 > > $ losetup -d /dev/loop1 > $ losetup -d /dev/loop0 > > triggers a [ INFO: possible circular locking dependency detected ] > > I think this warning is a false positive. > > Open/close on a loop device acquires bd_mutex of the device before > acquiring lo_ctl_mutex of the same device. For ioctl(LOOP_CLR_FD) after > acquiring lo_ctl_mutex, fput on the backing_file might acquire the bd_mutex > of a device, if backing file is a device and this is the last reference to > the file being dropped . But it is guaranteed that it is impossible to have > a circular list of backing devices.(say loop2->loop1->loop0->loop2 is not > possible), which guarantees that this can never deadlock. > > So this warning should be suppressed. It is very difficult to annotate > lockdep not to warn here in the correct way. A simple way to silence > lockdep could be to mark the lo_ctl_mutex in ioctl to be a sub class, but > this might mask some other real bugs. > > --- a/drivers/block/loop.c > +++ b/drivers/block/loop.c > @@ -1164,7 +1164,7 @@ static int lo_ioctl(struct block_device *bdev, > fmode_t mode, struct loop_device *lo = bdev->bd_disk->private_data; > int err; > > - mutex_lock(&lo->lo_ctl_mutex); > + mutex_lock_nested(&lo->lo_ctl_mutex, 1); > switch (cmd) { > case LOOP_SET_FD: > err = loop_set_fd(lo, mode, bdev, arg); > > Or actually marking the bd_mutex after lo_ctl_mutex as a sub class could be > a better solution. > > Luckily it is easy to avoid calling fput on backing file with lo_ctl_mutex > held, so no lockdep annotation is required. > > If you do not like the special handling of the lo_ctl_mutex just for the > LOOP_CLR_FD ioctl in lo_ioctl(), the mutex handling could be moved inside > each of the individual ioctl handlers and I could send you another patch. > > Thanks > Nikanth Karthikesan > > Signed-off-by: Nikanth Karthikesan > > --- > > Fix Bug 10504 - losetup possible circular locking > > Avoid triggering a circular dependency warning by calling fput on the > backing file with lo_ctl_mutex held. If the backing file is a device, fput > might try to acquire bd_mutex of a that device which triggers a circular > dependency warning. > > diff --git a/drivers/block/loop.c b/drivers/block/loop.c > index edbaac6..5588f67 100644 > --- a/drivers/block/loop.c > +++ b/drivers/block/loop.c > @@ -942,11 +942,18 @@ static int loop_clr_fd(struct loop_device *lo, struct > block_device *bdev) bd_set_size(bdev, 0); > mapping_set_gfp_mask(filp->f_mapping, gfp); > lo->lo_state = Lo_unbound; > - fput(filp); > /* This is safe: open() is still holding a reference. */ > module_put(THIS_MODULE); > if (max_part > 0) > ioctl_by_bdev(bdev, BLKRRPART, 0); > + mutex_unlock(&lo->lo_ctl_mutex); > + /* > + * Need not hold lo_ctl_mutex to fput backing file. > + * Calling fput holding lo_ctl_mutex triggers a circular > + * lock dependency possibility warning as fput can take > + * bd_mutex which is usually taken before lo_ctl_mutex. > + */ > + fput(filp); > return 0; > } > > @@ -1173,7 +1180,10 @@ static int lo_ioctl(struct block_device *bdev, > fmode_t mode, err = loop_change_fd(lo, bdev, arg); > break; > case LOOP_CLR_FD: > + /* loop_clr_fd would have unlocked lo_ctl_mutex on success */ > err = loop_clr_fd(lo, bdev); > + if (!err) > + goto out_unlocked; > break; > case LOOP_SET_STATUS: > err = loop_set_status_old(lo, (struct loop_info __user *) arg); > @@ -1191,6 +1201,8 @@ static int lo_ioctl(struct block_device *bdev, > fmode_t mode, err = lo->ioctl ? lo->ioctl(lo, cmd, arg) : -EINVAL; > } > mutex_unlock(&lo->lo_ctl_mutex); > + > +out_unlocked: > return err; > } -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/