[<prev] [next>] [day] [month] [year] [list]
Message-ID: <998d0e4a0803130949s7de0e8e9vd953570e4569c5e5@mail.gmail.com>
Date: Thu, 13 Mar 2008 17:49:13 +0100
From: "J.C. Pizarro" <jcpiza@...il.com>
To: LKML <linux-kernel@...r.kernel.org>
Subject: Re: BUG: lock held when returning to user space
On Thu, 13 Mar 2008 08:43:49 -0700, Daniel Walker wrote:
> On Wed, 2008-03-12 at 22:40 +0100, Jiri Kosina wrote:
> > No, as it is a real bug if you use mutexes in this way. What happens if
> > process that has called open() on your device (and has not closed it yet)
> > calls fork()?
> > Another breakage scenario -- what if the filedescriptor is sent through
> > unix socket to another process? etc.
>
> There's a number of places where a semaphore is used across system
> calls.
>
> for instance the usb skeleton,
> drivers/usb/usb-skeleton.c
>
> Several of the watchdog drivers,
> drivers/watchdog/s3c2410_wdt.c
>
> These need to be removed, but the usage is clearly not compatible with
> the mutex API ..
>
> If you convert them to atomic counts then you loose the sleeping aspect
> of the semaphore, which you'd have to add back somehow.
>
> The only API that seems straight forward is using complete's .. Then you
> get an atomic count and all the sleeping function calls you might want..
> (include/linux/completion.h) The problem with complete's is that you
> can't start them out at "1" or "completed" unless you actually run
> complete() once during initialization (that's kind of ugly) ..
>
> Daniel
They are not only bugs in the implementation,
they are bugs in the design or in the definition too!
Assuming the definition of fork in the OpenGroup.org
http://www.opengroup.org/onlinepubs/000095399/functions/fork.html
"The fork() function shall create a new process. The new process
(child process)
shall be an exact copy of the calling process (parent process) except as
detailed below: ....."
Here there are some problems when a process is forked:
* when the process is multithreaded instead of monothreaded => dangerous!
(why? e.g. one of the threads can fork from its own process that will
have again many cloned threads duplicating its forbidden tasks and will
have undefined behaviour because of this forked multithreaded process!)
* the locks have a state: "unlocked" or "locked by one correspondent process",
but when the correspondent process is forked with some its locks locked by
itself then the locks are "locked by 2 or more processes instead one"
violating the theory of locking. There is no theorical solution
for this problem.
(it's not solution that all the locks of the forked process are
unlocked because
its program counter is "inside" of the mutual exclusion of the locked lock)
* even for semaphores, message passing, mutexes in shared memory (IPC), etc.
* when they are servers, it doesn't exist forked listen's ports from sockets!
* when they are clients, they can't duplicate sessions with same
TCP/IP client port!
* they can't duplicate pipes, streams, groups of children processes, etc.
* the same offsets of the opened files (or streams) for writing can imply them
to overwrite characters or blocks of the same opened file.
* etc.
In the fork specification, it almost says e.g. that "the fork shall
not inherit" but
it doesn't say "how to solve it when it's inherited or not inherited"!
Eureka! You did understand the difference when you found an unsolvable bug!
J.C.Pizarro
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists