From: Dmitry Torokhov <dmitry.torokhov@gmail.com>
To: Neil Horman <nhorman@tuxdriver.com>
Cc: Xiaotian Feng <dfeng@redhat.com>,
linux-kernel@vger.kernel.org, Ingo Molnar <mingo@elte.hu>,
Andrew Morton <akpm@linux-foundation.org>,
"David S. Miller" <davem@davemloft.net>
Subject: Re: [RFC PATCH] sysrq: don't hold the sysrq_key_table_lock during the handler
Date: Tue, 27 Jul 2010 01:15:52 -0700 [thread overview]
Message-ID: <20100727081552.GB32084@core.coreip.homeip.net> (raw)
In-Reply-To: <20100726203420.GB18789@hmsreliant.think-freely.org>
On Mon, Jul 26, 2010 at 04:34:20PM -0400, Neil Horman wrote:
> On Mon, Jul 26, 2010 at 10:41:54AM -0700, Dmitry Torokhov wrote:
> > On Mon, Jul 26, 2010 at 06:51:48AM -0400, Neil Horman wrote:
> > > On Mon, Jul 26, 2010 at 05:54:02PM +0800, Xiaotian Feng wrote:
> > > > sysrq_key_table_lock is used to protect the sysrq_key_table, make sure
> > > > we get/replace the right operation for the sysrq. But in __handle_sysrq,
> > > > kernel will hold this lock and disable irqs until we finished op_p->handler().
> > > > This may cause false positive watchdog alert when we're doing "show-task-states"
> > > > on a system with many tasks.
> > > >
> > > > Signed-off-by: Xiaotian Feng <dfeng@redhat.com>
> > > > Cc: Ingo Molnar <mingo@elte.hu>
> > > > Cc: Dmitry Torokhov <dmitry.torokhov@gmail.com>
> > > > Cc: Andrew Morton <akpm@linux-foundation.org>
> > > > Cc: Neil Horman <nhorman@tuxdriver.com>
> > > > Cc: "David S. Miller" <davem@davemloft.net>
> > > > ---
> > > > drivers/char/sysrq.c | 4 +++-
> > > > 1 files changed, 3 insertions(+), 1 deletions(-)
> > > >
> > > > diff --git a/drivers/char/sysrq.c b/drivers/char/sysrq.c
> > > > index 878ac0c..0856e2e 100644
> > > > --- a/drivers/char/sysrq.c
> > > > +++ b/drivers/char/sysrq.c
> > > > @@ -520,9 +520,11 @@ void __handle_sysrq(int key, struct tty_struct *tty, int check_mask)
> > > > if (!check_mask || sysrq_on_mask(op_p->enable_mask)) {
> > > > printk("%s\n", op_p->action_msg);
> > > > console_loglevel = orig_log_level;
> > > > + spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
> > > > op_p->handler(key, tty);
> > > > } else {
> > > > printk("This sysrq operation is disabled.\n");
> > > > + spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
> > > > }
> > > > } else {
> > > > printk("HELP : ");
> > > > @@ -541,8 +543,8 @@ void __handle_sysrq(int key, struct tty_struct *tty, int check_mask)
> > > > }
> > > > printk("\n");
> > > > console_loglevel = orig_log_level;
> > > > + spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
> > > > }
> > > > - spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
> > > > }
> > > >
> > > > void handle_sysrq(int key, struct tty_struct *tty)
> > > > --
> > > > 1.7.2
> > > >
> > > >
> > >
> > > This creates the possibility of a race in the handler. Not that it happens
> > > often, but sysrq keys can be registered and unregistered dynamically. If that
> > > lock isn't held while we call the keys handler, the code implementing that
> > > handler can live in a module that gets removed while its executing, leading to
> > > an oops, etc. I think the better solution would be to use an rcu lock here.
> >
> > I'd simply changed spinlock to a mutex.
> >
> I don't think you can do that safely in this path, as sysrqs will be looked up
> in both process (echo t > /proc/sysrq-trigger) context and in interrupt
> (alt-sysrq-t) context. If a mutex is locked and you try to take it in interrupt
> context, you get a sleeping-in-interrupt panic IIRC
>
Yes, indeed. But then even RCU will not really help us since keyboard
driver will have inpterrupts disabled anyways.
--
Dmitry
next prev parent reply other threads:[~2010-07-27 8:16 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-07-26 9:54 [RFC PATCH] sysrq: don't hold the sysrq_key_table_lock during the handler Xiaotian Feng
2010-07-26 10:51 ` Neil Horman
2010-07-26 17:41 ` Dmitry Torokhov
2010-07-26 20:34 ` Neil Horman
2010-07-27 8:15 ` Dmitry Torokhov [this message]
2010-07-27 11:57 ` Neil Horman
2010-07-27 16:38 ` Dmitry Torokhov
2010-07-27 19:24 ` Neil Horman
2010-07-27 23:36 ` Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20100727081552.GB32084@core.coreip.homeip.net \
--to=dmitry.torokhov@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=davem@davemloft.net \
--cc=dfeng@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@elte.hu \
--cc=nhorman@tuxdriver.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox