lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 02 Jan 2010 13:49:20 -0800
From:	ebiederm@...ssion.com (Eric W. Biederman)
To:	Tejun Heo <tj@...nel.org>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>,
	Borislav Petkov <petkovbb@...glemail.com>,
	David Airlie <airlied@...ux.ie>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Greg KH <greg@...ah.com>, Al Viro <viro@...IV.linux.org.uk>
Subject: Re: drm_vm.c:drm_mmap: possible circular locking dependency detected

Tejun Heo <tj@...nel.org> writes:

> Hello, Eric.
>
> On 01/02/2010 12:16 AM, Eric W. Biederman wrote:
>>>> kobject_del with a lock held scares me.
>>>
>>> I would not object at _all_ if sysfs fixed the locking here instead of in 
>>> filldir.
>> 
>> I just sent you my sysfs filldir scalability patch, so we can take that
>> red-herring off the plate.
>> 
>> The problem as I see it is that kobject_del is convenient.
>> kobject_del waits until all of the sysfs show and store methods for
>> that kobject have stopped executing.  Which imposes the rule that
>> kobject_del can not be called with any locks held that are taken in a
>> sysfs show or store method.  This is all invisible to lockdep as the
>> wait is done with a completion and not a lock.
>
> The synchronization against read/write ops is in sysfs_deactivate on
> purpose so that drivers (most common users) don't have to worry about
> sysfs ops accessing different parts of data structures once
> device_del() is complete.  Implementing the exlusion at the driver
> level is possible but not easy because some hardware devices are
> represented with complex data structures, some of them are reused when
> devices are exchanged and some sysfs ops end up accessing the
> hardware.  So, it's often not possible to simply disassociate the data
> structure and float it till the last reference goes away.  There needs
> to be a synchronization point where the driver can tell that nothing
> is accessing released data structure or hardware resource after it and
> it's far easier to define it at the sysfs level.
>
>> sysfs_deactivate happens in the device_del(), but if we were to move
>> sysfs_deactivate into the final kobject_put then in theory we can
>> continue to block and be friendly but not need to be called with
>> locations where locks are held.
>
> Nobody would know when that final put will actually happen.  In
> progress sysfs ops might access the hardware after the hardware is
> gone or replaced with another unit.

Alright than that is a bad possible split of the functionality.  Which
is all I was suggesting splitting the functionality not doing away
with the wait or moving it to a point where the wait would not work.
It was simply my bad assumption that the final kobject_put would
happen before the module that controlled that kobject could be
removed.

I still think it might make sense to separate kobject_del into two
parts.  One that we call with the locks held and one without, but that
does seem to be applicable to only a very small set of cases and our
problems appear to be much larger than that.

For the moment I have generated a patch that does the lockdep
annotations, and I have found that a simple:

   find /sys -type f | xargs cat {} > /dev/null

trivially generates lockdep warnings.  In particular:

[  165.049042] 
[  165.049044] =======================================================
[  165.052761] [ INFO: possible circular locking dependency detected ]
[  165.052761] 2.6.33-rc2x86_64 #3
[  165.052761] -------------------------------------------------------
[  165.052761] cat/5026 is trying to acquire lock:
[  165.052761]  (&serio->drv_mutex){+.+.+.}, at: [<ffffffff8132ecaa>] atkbd_attr_show_helper+0x28/0x6e
[  165.052761] 
[  165.052761] but task is already holding lock:
[  165.089443]  (s_active){++++.+}, at: [<ffffffff810e84dd>] sysfs_get_active_two+0x2c/0x43
[  165.089443] 
[  165.089443] which lock already depends on the new lock.
[  165.089443] 
[  165.089443] 
[  165.089443] the existing dependency chain (in reverse order) is:
[  165.089443] 
[  165.089443] -> #1 (s_active){++++.+}:
[  165.089443]        [<ffffffff81054956>] validate_chain+0xa25/0xd1d
[  165.089443]        [<ffffffff810553d3>] __lock_acquire+0x785/0x7dc
[  165.089443]        [<ffffffff81056112>] lock_acquire+0x5a/0x74
[  165.089443]        [<ffffffff810e8202>] sysfs_addrm_finish+0xba/0x125
[  165.089443]        [<ffffffff810e68b0>] sysfs_hash_and_remove+0x4f/0x6b
[  165.089443]        [<ffffffff810e94cf>] remove_files+0x1f/0x2c
[  165.089443]        [<ffffffff810e9561>] sysfs_remove_group+0x85/0xb4
[  165.089443]        [<ffffffff81331f0f>] psmouse_disconnect+0x33/0x147
[  165.089443]        [<ffffffff8132687b>] serio_disconnect_driver+0x2d/0x3a
[  165.089443]        [<ffffffff81326898>] serio_driver_remove+0x10/0x14
[  165.089443]        [<ffffffff812077f0>] __device_release_driver+0x67/0xb0
[  165.089443]        [<ffffffff81207857>] device_release_driver+0x1e/0x2b
[  165.089443]        [<ffffffff81326e68>] serio_disconnect_port+0x60/0x69
[  165.089443]        [<ffffffff8132757a>] serio_thread+0x170/0x34a
[  165.089443]        [<ffffffff810470e7>] kthread+0x7d/0x85
[  165.089443]        [<ffffffff81002cd4>] kernel_thread_helper+0x4/0x10
[  165.089443] 
[  165.089443] -> #0 (&serio->drv_mutex){+.+.+.}:
[  165.089443]        [<ffffffff81054642>] validate_chain+0x711/0xd1d
[  165.089443]        [<ffffffff810553d3>] __lock_acquire+0x785/0x7dc
[  165.089443]        [<ffffffff81056112>] lock_acquire+0x5a/0x74
[  165.089443]        [<ffffffff814378ed>] mutex_lock_interruptible_nested+0x4a/0x307
[  165.089443]        [<ffffffff8132ecaa>] atkbd_attr_show_helper+0x28/0x6e
[  165.089443]        [<ffffffff8132ed81>] atkbd_do_show_extra+0x13/0x15
[  165.089443]        [<ffffffff812049b6>] dev_attr_show+0x20/0x43
[  165.089443]        [<ffffffff810e71db>] sysfs_read_file+0xba/0x145
[  165.089443]        [<ffffffff8109f507>] vfs_read+0xab/0x147
[  165.089443]        [<ffffffff8109f85c>] sys_read+0x47/0x70
[  165.089443]        [<ffffffff81001f2b>] system_call_fastpath+0x16/0x1b
[  165.089443] 
[  165.089443] other info that might help us debug this:
[  165.089443] 
[  165.089443] 3 locks held by cat/5026:
[  165.089443]  #0:  (&buffer->mutex){+.+.+.}, at: [<ffffffff810e715a>] sysfs_read_file+0x39/0x145
[  165.089443]  #1:  (s_active){++++.+}, at: [<ffffffff810e84d0>] sysfs_get_active_two+0x1f/0x43
[  165.089443]  #2:  (s_active){++++.+}, at: [<ffffffff810e84dd>] sysfs_get_active_two+0x2c/0x43
[  165.089443] 
[  165.089443] stack backtrace:
[  165.089443] Pid: 5026, comm: cat Not tainted 2.6.33-rc2x86_64 #3
[  165.089443] Call Trace:
[  165.089443]  [<ffffffff810538f3>] print_circular_bug+0xb3/0xc1
[  165.089443]  [<ffffffff81054642>] validate_chain+0x711/0xd1d
[  165.089443]  [<ffffffff81052fb6>] ? trace_hardirqs_on_caller+0x10b/0x12f
[  165.089443]  [<ffffffff810553d3>] __lock_acquire+0x785/0x7dc
[  165.089443]  [<ffffffff8132ecaa>] ? atkbd_attr_show_helper+0x28/0x6e
[  165.089443]  [<ffffffff81056112>] lock_acquire+0x5a/0x74
[  165.089443]  [<ffffffff8132ecaa>] ? atkbd_attr_show_helper+0x28/0x6e
[  165.089443]  [<ffffffff814378ed>] mutex_lock_interruptible_nested+0x4a/0x307
[  165.089443]  [<ffffffff8132ecaa>] ? atkbd_attr_show_helper+0x28/0x6e
[  165.089443]  [<ffffffff8132ee41>] ? atkbd_show_extra+0x0/0x28
[  165.089443]  [<ffffffff8132ecaa>] atkbd_attr_show_helper+0x28/0x6e
[  165.089443]  [<ffffffff8132ed81>] atkbd_do_show_extra+0x13/0x15
[  165.089443]  [<ffffffff812049b6>] dev_attr_show+0x20/0x43
[  165.089443]  [<ffffffff810e71db>] sysfs_read_file+0xba/0x145
[  165.089443]  [<ffffffff8109f507>] vfs_read+0xab/0x147
[  165.089443]  [<ffffffff8109f85c>] sys_read+0x47/0x70
[  165.089443]  [<ffffffff81001f2b>] system_call_fastpath+0x16/0x1b

Suggestions on how to sort out this other set of issues are welcome.

Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ