From: David Brownell <david-b@pacbell.net>
To: Pavel Machek <pavel@ucw.cz>
Cc: rtc-linux@googlegroups.com,
kernel list <linux-kernel@vger.kernel.org>,
Alessandro Zummo <alessandro.zummo@towertech.it>
Subject: Re: RTC wakealarm write-only, still has 644 permissions
Date: Thu, 29 Nov 2007 10:10:12 -0800 [thread overview]
Message-ID: <200711291010.12707.david-b@pacbell.net> (raw)
In-Reply-To: <20071128232647.GC4947@elf.ucw.cz>
On Wednesday 28 November 2007, Pavel Machek wrote:
> > Are you sure it's not working? Other than the two issues I noted
> > above -- borkage w.r.t. ACPI (which wasn't necessarily shown in your
> > scripts above), and with wildcarding -- it looked to be correct.
>
> It seems to be working now, not sure what changed.
There were some patches from Mark Lord to update the wildcarding,
and to hibernation to work better with ACPI. I still don't think
the wildcarding is done quite right; there are some date-wrap cases
that looked wrong.
> rtc-sysfs.c: why this?
>
> if (alarm > now) {
> /* Avoid accidentally clobbering active alarms; we can't
> * entirely prevent that here, without even the minimal
> * locking from the /dev/rtcN api.
> */
> retval = rtc_read_alarm(rtc, &alm);
> if (retval < 0)
> return retval;
> if (alm.enabled)
> return -EBUSY;
>
> alm.enabled = 1;
>
> People should not be "accidentally" writing to sysfs files...
It's not an issue of accidental writes, it's an issue of there being
no other synchronization for setting those alarms. Remember that both
RTC_WKALM_SET and RTC_ALM_SET ioctls can set that same alarm, and so
could a different userspace activity ...
If there's no alarm set, it's clear that changing the (single) alarm
can't cause event lossage. But if an alarm *is* set it sure seems
that changing it would discard an event that something was expecting,
and thus cause breakage.
As written, this allows one userspace activity to clobber another if
it does so explicitly, by first disabling the other one and then
setting its own alarm. But the idea is to minimize "accidents" like
unintentionally clobbering an alarm set by someone else.
> If I remove "accidental alarm modify" logic, I can actually use rtc to
> wake up more than once per boot.
Evidently the alarm isn't being disabled then...
I think the issue there is that the alarm isn't acting as a one-shot
event. There are some model questions lurking there ... if the RTC
has a sane alarm model, "fire at YYYY-MM-DD at HH:MM:SS", then it's
naturally one-shot.
But if the YYYY-MM-DD part is a wildcard (or equivalently, ignored)
at the hardware level, that model is awkward. You can't easily look
at such alarms and know if they already triggered -- especially after
hibernation. With respect to rtc-cmos, it'd always be practical to
disable the alarm after it triggers while the system is running.
(Not currently done, pending resolution of such issues.) And there's
an ACPI flag -- currently ignored by Linux, or maybe trashed -- to
report whether the system wakeup was triggered by an alarm; that
could be read, and used to disable the alarm.
I think the right thing to do there is just insist that in the RTC
framework, alarms should always follow the one-shot model.
- Dave
next prev parent reply other threads:[~2007-11-29 18:11 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-09-20 10:32 RTC wakealarm write-only, still has 644 permissions Pavel Machek
2007-09-20 10:50 ` Pavel Machek
2007-09-22 5:38 ` David Brownell
2007-10-02 9:36 ` Pavel Machek
2007-10-03 2:15 ` David Brownell
2007-11-28 23:26 ` Pavel Machek
2007-11-29 8:02 ` Tino Keitel
2007-11-29 18:10 ` David Brownell [this message]
2007-11-29 18:14 ` Alessandro Zummo
2007-11-30 20:35 ` Pavel Machek
2007-11-30 21:10 ` David Brownell
2007-11-30 21:20 ` Mark Lord
2007-11-30 21:27 ` Pavel Machek
2007-12-02 11:36 ` Pavel Machek
2007-12-02 16:03 ` David Brownell
[not found] ` <20071128230451.GA1547@elf.ucw.cz>
2007-11-28 23:26 ` Pavel Machek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200711291010.12707.david-b@pacbell.net \
--to=david-b@pacbell.net \
--cc=alessandro.zummo@towertech.it \
--cc=linux-kernel@vger.kernel.org \
--cc=pavel@ucw.cz \
--cc=rtc-linux@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox