lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 18 Jan 2008 11:37:21 +0800
From:	"Dave Young" <hidave.darkstar@...il.com>
To:	"Cornelia Huck" <cornelia.huck@...ibm.com>
Cc:	"Gabor Gombas" <gombasg@...aki.hu>, "Tejun Heo" <htejun@...il.com>,
	"Al Viro" <viro@...iv.linux.org.uk>, linux-kernel@...r.kernel.org,
	bluez-devel@...ts.sf.net, kay.sievers@...y.org,
	"Greg KH" <greg@...ah.com>,
	"Marcel Holtmann" <marcel@...tmann.org>, davem@...emloft.net
Subject: Re: [Bluez-devel] Oops involving RFCOMM and sysfs

On Jan 17, 2008 7:42 PM, Cornelia Huck <cornelia.huck@...ibm.com> wrote:
> On Thu, 17 Jan 2008 16:15:04 +0800,
> Dave Young <hidave.darkstar@...il.com> wrote:
>
> > On Thu, Jan 17, 2008 at 03:24:50PM +0800, Dave Young wrote:
> > > On Jan 17, 2008 7:06 AM, Gabor Gombas <gombasg@...aki.hu> wrote:
> > > > Hi,
> > > >
> > > > On Wed, Jan 16, 2008 at 09:02:05AM +0800, Dave Young wrote:
> > > >
> > > > > The rfcomm tty device will possibly retain even when conn is down,
> > > > > and sysfs doesn't support zombie device moving, so this patch
> > > > > move the tty device before conn device is destroyed.
> > > > >
> > > > > Signed-off-by: Dave Young <hidave.darkstar@...il.com>
> > > >
> > > > This seems to work, both the oops and the hang are gone. I get these
> > > > messages in syslog when the Bluetooth link hangs and I want to kill pppd
> > > > with "poff":
> > > >
> > > > Jan 16 23:55:59 twister kernel: unregister_netdevice: waiting for ppp0 to become free. Usage count = 1
> > > > Jan 16 23:56:09 twister kernel: unregister_netdevice: waiting for ppp0 to become free. Usage count = 1
>
> Might be helpful to try with CONFIG_DEBUG_DRIVER=y and
> CONFIG_KOBJECT_DEBUG=y to spot where a reference is not dropped.
>
> > > >
> > > > But a "killall -9 pppd" seems to help and then the re-connect (after the
> > > > phone got power-cycled) works.
> > >
> > > Weird, I guess "device_move(dev, NULL) two times" cause the problem.
> > >
> > > Anyway, device_move should check the old_parent and new_parent , if
> > > they equal to each other then just return.
>
> sysfs_move_dir() does this (to avoid a loop later in the function).
> Don't know if that's a good thing to check at a higher level as well,
> because the calling code should really know where their devices are.
>
> Anyway, if this "move in place" exposes a refcounting bug, we must fix
> it.

Lets see the device_move function, seems there's some problems in it:

1302 int device_move(struct device *dev, struct device *new_parent)
1303 {
1304         int error;
1305         struct device *old_parent;
1306         struct kobject *new_parent_kobj;
1307
1308         dev = get_device(dev);
1309         if (!dev)
1310                 return -EINVAL;
1311
1312         new_parent = get_device(new_parent);
1313         new_parent_kobj = get_device_parent (dev, new_parent);

Here could get kobject reference

1314         if (IS_ERR(new_parent_kobj)) {
1315                 error = PTR_ERR(new_parent_kobj);
1316                 put_device(new_parent);
1317                 goto out;
1318         }
1319         pr_debug("DEVICE: moving '%s' to '%s'\n", dev->bus_id,
1320                  new_parent ? new_parent->bus_id : "<NULL>");
1321         error = kobject_move(&dev->kobj, new_parent_kobj);
1322         if (error) {
1323                 put_device(new_parent);

imagine new_parent is NULL, then the new_parent_kobj should be put

1324                 goto out;
1325         }
1326         old_parent = dev->parent;
1327         dev->parent = new_parent;
1328         if (old_parent)
1329                 klist_remove(&dev->knode_parent);
1330         if (new_parent)
1331                 klist_add_tail(&dev->knode_parent,
&new_parent->klist_children);
1332         if (!dev->class)
1333                 goto out_put;

Why not put new_parent | new_parent_kobj?

1334         error = device_move_class_links(dev, old_parent, new_parent);
1335         if (error) {
1336                 /* We ignore errors on cleanup since we're hosed
anyway... */
1337                 device_move_class_links(dev, new_parent, old_parent);
1338                 if (!kobject_move(&dev->kobj, &old_parent->kobj)) {
1339                         if (new_parent)
1340                                 klist_remove(&dev->knode_parent);
1341                         if (old_parent)
1342                                 klist_add_tail(&dev->knode_parent,
1343
&old_parent->klist_children);
1344                 }
1345                 put_device(new_parent);

Same doubt as above

1346                 goto out;
1347         }
1348 out_put:
1349         put_device(old_parent);
1350 out:
1351         put_device(dev);
1352         return error;
1353 }

Hope I'm wrong, but if it's indeed bugs, I will send a patch about this.

>
> > >
> > > Am I right?
> >
> > Could you apply this patch as well to test? Thanks.
> >
> > diff -upr linux/net/bluetooth/rfcomm/tty.c linux.new/net/bluetooth/rfcomm/tty.c
> > --- linux/net/bluetooth/rfcomm/tty.c  2008-01-17 16:09:34.000000000 +0800
> > +++ linux.new/net/bluetooth/rfcomm/tty.c      2008-01-17 16:10:22.000000000 +0800
> > @@ -692,7 +692,8 @@ static void rfcomm_tty_close(struct tty_
> >       BT_DBG("tty %p dev %p dlc %p opened %d", tty, dev, dev->dlc, dev->opened);
> >
> >       if (--dev->opened == 0) {
> > -             device_move(dev->tty_dev, NULL);
> > +             if (dev->tty_dev->parent)
> > +                     device_move(dev->tty_dev, NULL);
> >
> >               /* Close DLC and dettach TTY */
> >               rfcomm_dlc_close(dev->dlc, 0);
> >
>
> Avoiding to move devices when there is nothing to be moved nevertheless
> sounds like a good idea :)
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ