public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* lock_kernel called under spinlock in NFS
@ 2006-06-01 19:55 Joe Korty
  2006-06-01 20:13 ` Trond Myklebust
  0 siblings, 1 reply; 8+ messages in thread
From: Joe Korty @ 2006-06-01 19:55 UTC (permalink / raw)
  To: linux-kernel; +Cc: drepper, akpm, Trond.Myklebust, mingo

Tree 5fdccf2354269702f71beb8e0a2942e4167fd992

        [PATCH] vfs: *at functions: core

introduced a bug where lock_kernel() can be called from
under a spinlock.  To trigger the bug one must have
CONFIG_PREEMPT_BKL=y and be using NFS heavily.  It is
somewhat rare and, so far, haven't traced down the userland
sequence that causes the fatal path to be taken.

The bug was caused by the insertion into do_path_lookup()
of a call to file_permission().  do_path_lookup()
read-locks current->fs->lock for most of its operation.
file_permission() calls permission() which calls
nfs_permission(), which has one path through it
that uses lock_kernel().

I am not sure how to fix this bug.  It is not clear what
the lock_kernel() call is protecting. Nor is it clear why,
as part of the introduction of the openat() etc services,
it was desirable to add a call to file_permission()
to do_path_lookup().

For now, I plan to turn off CONFIG_PREEMPT_BKL.

Regards,
Joe

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2006-06-03 22:10 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-06-01 19:55 lock_kernel called under spinlock in NFS Joe Korty
2006-06-01 20:13 ` Trond Myklebust
2006-06-02 20:24   ` Joe Korty
2006-06-02 20:27     ` Trond Myklebust
2006-06-02 20:43       ` Andrew Morton
2006-06-02 21:26         ` Trond Myklebust
2006-06-03 18:30         ` Sergey Vlasov
2006-06-03 22:10           ` Trond Myklebust

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox