From owner-svn-src-all@FreeBSD.ORG Tue Oct 7 16:22:24 2014 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B74075F1; Tue, 7 Oct 2014 16:22:24 +0000 (UTC) Received: from bigwig.baldwin.cx (bigwig.baldwin.cx [IPv6:2001:470:1f11:75::1]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 750D5981; Tue, 7 Oct 2014 16:22:24 +0000 (UTC) Received: from jhbbsd.localnet (unknown [209.249.190.124]) by bigwig.baldwin.cx (Postfix) with ESMTPSA id 6CCA4B976; Tue, 7 Oct 2014 12:22:23 -0400 (EDT) From: John Baldwin To: Mateusz Guzik Subject: Re: svn commit: r272596 - head/sys/fs/devfs Date: Tue, 7 Oct 2014 11:00:38 -0400 User-Agent: KMail/1.13.5 (FreeBSD/8.4-CBSD-20140415; KDE/4.5.5; amd64; ; ) References: <201410060620.s966Kaqt078736@svn.freebsd.org> <13670379.opPJl0kA6Z@ralph.baldwin.cx> <20141007005237.GA32651@dft-labs.eu> In-Reply-To: <20141007005237.GA32651@dft-labs.eu> MIME-Version: 1.0 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <201410071100.38827.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (bigwig.baldwin.cx); Tue, 07 Oct 2014 12:22:23 -0400 (EDT) Cc: svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org, Mateusz Guzik X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Oct 2014 16:22:24 -0000 On Monday, October 06, 2014 8:52:37 pm Mateusz Guzik wrote: > On Mon, Oct 06, 2014 at 11:37:32AM -0400, John Baldwin wrote: > > On Monday, October 06, 2014 06:20:36 AM Mateusz Guzik wrote: > > > Author: mjg > > > Date: Mon Oct 6 06:20:35 2014 > > > New Revision: 272596 > > > URL: https://svnweb.freebsd.org/changeset/base/272596 > > > > > > Log: > > > devfs: don't take proctree_lock unconditionally in devfs_close > > > > > > MFC after: 1 week > > > > Just for my sanity: > > > > What keeps td->td_proc->p_session static in this case so that it is safe to > > dereference it? Specifically, if you are preempted after reading p_session > > but before you then read s_ttyvp, what prevents a race with another thread > > changing the session of td->td_proc? > > > > Right, it's buggy. > > Turns out devfs was quite liberal in relation to that even prior to my > change. > > How about: > > diff --git a/sys/fs/devfs/devfs_vnops.c b/sys/fs/devfs/devfs_vnops.c > index d7009a4..a480e4f 100644 > --- a/sys/fs/devfs/devfs_vnops.c > +++ b/sys/fs/devfs/devfs_vnops.c > @@ -499,6 +499,7 @@ devfs_access(struct vop_access_args *ap) > { > struct vnode *vp = ap->a_vp; > struct devfs_dirent *de; > + struct proc *p; > int error; > > de = vp->v_data; > @@ -511,11 +512,14 @@ devfs_access(struct vop_access_args *ap) > return (0); > if (error != EACCES) > return (error); > + p = ap->a_td->td_proc; > /* We do, however, allow access to the controlling terminal */ > - if (!(ap->a_td->td_proc->p_flag & P_CONTROLT)) > + if (!(p->p_flag & P_CONTROLT)) > return (error); > - if (ap->a_td->td_proc->p_session->s_ttydp == de->de_cdp) > - return (0); > + PROC_LOCK(p); > + if (p->p_session->s_ttydp == de->de_cdp) > + error = 0; > + PROC_UNLOCK(p); > return (error); > } > > @@ -525,6 +529,7 @@ devfs_close(struct vop_close_args *ap) > { > struct vnode *vp = ap->a_vp, *oldvp; > struct thread *td = ap->a_td; > + struct proc *p; > struct cdev *dev = vp->v_rdev; > struct cdevsw *dsw; > int vp_locked, error, ref; > @@ -545,24 +550,30 @@ devfs_close(struct vop_close_args *ap) > * if the reference count is 2 (this last descriptor > * plus the session), release the reference from the session. > */ > - if (td && vp == td->td_proc->p_session->s_ttyvp) { > - oldvp = NULL; > - sx_xlock(&proctree_lock); > - if (vp == td->td_proc->p_session->s_ttyvp) { > - SESS_LOCK(td->td_proc->p_session); > - VI_LOCK(vp); > - if (count_dev(dev) == 2 && > - (vp->v_iflag & VI_DOOMED) == 0) { > - td->td_proc->p_session->s_ttyvp = NULL; > - td->td_proc->p_session->s_ttydp = NULL; > - oldvp = vp; > + if (td != NULL) { > + p = td->td_proc; > + PROC_LOCK(p); > + if (vp == p->p_session->s_ttyvp) { > + PROC_UNLOCK(p); > + oldvp = NULL; > + sx_xlock(&proctree_lock); > + if (vp == p->p_session->s_ttyvp) { > + SESS_LOCK(p->p_session); > + VI_LOCK(vp); > + if (count_dev(dev) == 2 && > + (vp->v_iflag & VI_DOOMED) == 0) { > + p->p_session->s_ttyvp = NULL; > + p->p_session->s_ttydp = NULL; > + oldvp = vp; > + } > + VI_UNLOCK(vp); > + SESS_UNLOCK(p->p_session); > } > - VI_UNLOCK(vp); > - SESS_UNLOCK(td->td_proc->p_session); > - } > - sx_xunlock(&proctree_lock); > - if (oldvp != NULL) > - vrele(oldvp); > + sx_xunlock(&proctree_lock); > + if (oldvp != NULL) > + vrele(oldvp); > + } else > + PROC_UNLOCK(p); > } > /* > * We do not want to really close the device if it > @@ -814,6 +825,7 @@ devfs_prison_check(struct devfs_dirent *de, struct thread *td) > { > struct cdev_priv *cdp; > struct ucred *dcr; > + struct proc *p; > int error; > > cdp = de->de_cdp; > @@ -827,10 +839,13 @@ devfs_prison_check(struct devfs_dirent *de, struct thread *td) > if (error == 0) > return (0); > /* We do, however, allow access to the controlling terminal */ > - if (!(td->td_proc->p_flag & P_CONTROLT)) > + p = td->td_proc; > + if (!(p->p_flag & P_CONTROLT)) > return (error); > - if (td->td_proc->p_session->s_ttydp == cdp) > - return (0); > + PROC_LOCK(p); > + if (p->p_session->s_ttydp == cdp) > + error = 0; > + PROC_UNLOCK(p); > return (error); > } I think this is fine (and I've had one of these fixes in a side branch forever myself). In my version I held PROC_LOCK while checking P_CONTROLT. I think you might need that in case another thread in the same process is invoking TIOCSCTTY. (I am assuming that the thread variables in devfs_access() and devfs_prison_check() are in fact curthread. If they weren't, I think you'd definitely need the lock. Since TIOCSCTTY acts on curthread, you could get by without the lock for reading the flag for curproc for a single-threaded process, but not for a multi-threaded one.) -- John Baldwin