Re: [PATCH] aio: Fix locking in aio_poll()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Feb 05, 2019 at 04:53:04PM -0800, Bart Van Assche wrote:
> On Tue, 2019-02-05 at 09:12 +0100, Miklos Szeredi wrote:
> > Not all variants of the waitqueue interface require irqs to be
> > disabled, and fuse has nothing whatsoever to do with irqs, so there's
> > no sane reason to disable them.
> > 
> > Also, AFAICS, the fuse device does not support asynchronous IO.  I
> > just don't get what this is about...
> 
> Hi Miklos,
> 
> Could this be what happens?
> 
> aio_poll() calls vfs_poll()
>   vfs_poll() calls fuse_dev_poll()
>     fuse_dev_poll() calls poll_wait(file, &fiq->waitq, wait)
>       poll_wait() calls aio_poll_queue_proc(file, &fiq->waitq, wait)
>         aio_poll_queue_proc() stores &fiq->waitq in pt->iocb->poll.head
> aio_poll() calls spin_lock_irq(&ctx->ctx_lock)
> aio_poll() calls spin_lock(&req->head->lock) (req == &pt->iocb->poll).
> 
> I think the lockdep complaint is about the FUSE fiq->waitq lock not being
> IRQ-safe and about aio_poll() creating a dependency between an IRQ-safe lock
> (ctx->ctx_lock) and a lock that is not IRQ-safe (fiq->waitq).

Yep.  And is AIO doing anything in irq context?  If so, why?

Would it make sense to just disable AIO on file descriptors where it makes zero
sense?

E.g. this patch:

Thanks,
Miklos

---
diff --git a/fs/aio.c b/fs/aio.c
index b906ff70c90f..6f5edd28a83c 100644
--- a/fs/aio.c
+++ b/fs/aio.c
@@ -1435,6 +1435,9 @@ static int aio_prep_rw(struct kiocb *req, const struct iocb *iocb)
 	req->ki_filp = fget(iocb->aio_fildes);
 	if (unlikely(!req->ki_filp))
 		return -EBADF;
+	ret = -EINVAL;
+	if (req->ki_filp->f_mode & FMODE_NOAIO)
+		goto out_fput;
 	req->ki_complete = aio_complete_rw;
 	req->ki_pos = iocb->aio_offset;
 	req->ki_flags = iocb_flags(req->ki_filp);
@@ -1607,7 +1610,8 @@ static int aio_fsync(struct fsync_iocb *req, const struct iocb *iocb,
 	req->file = fget(iocb->aio_fildes);
 	if (unlikely(!req->file))
 		return -EBADF;
-	if (unlikely(!req->file->f_op->fsync)) {
+	if (unlikely(req->file->f_mode & FMODE_NOAIO) ||
+	    unlikely(!req->file->f_op->fsync)) {
 		fput(req->file);
 		return -EINVAL;
 	}
@@ -1755,6 +1759,9 @@ static ssize_t aio_poll(struct aio_kiocb *aiocb, const struct iocb *iocb)
 	apt.iocb = aiocb;
 	apt.error = -EINVAL; /* same as no support for IOCB_CMD_POLL */
 
+	if (req->file->f_mode & FMODE_NOAIO)
+		goto out;
+
 	/* initialized the list so that we can do list_empty checks */
 	INIT_LIST_HEAD(&req->wait.entry);
 	init_waitqueue_func_entry(&req->wait, aio_poll_wake);
diff --git a/fs/fuse/dev.c b/fs/fuse/dev.c
index a5e516a40e7a..c00aa39ec7f0 100644
--- a/fs/fuse/dev.c
+++ b/fs/fuse/dev.c
@@ -1397,6 +1397,7 @@ static int fuse_dev_open(struct inode *inode, struct file *file)
 	 * keep track of whether the file has been mounted already.
 	 */
 	file->private_data = NULL;
+	file->f_mode |= FMODE_NOAIO;
 	return 0;
 }
 
diff --git a/include/linux/fs.h b/include/linux/fs.h
index 29d8e2cfed0e..7cda153baad3 100644
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -162,6 +162,9 @@ typedef int (dio_iodone_t)(struct kiocb *iocb, loff_t offset,
 /* File does not contribute to nr_files count */
 #define FMODE_NOACCOUNT	((__force fmode_t)0x20000000)
 
+/* File does not support AIO ops */
+#define FMODE_NOAIO	((__force fmode_t)0x40000000)
+
 /*
  * Flag for rw_copy_check_uvector and compat_rw_copy_check_uvector
  * that indicates that they should check the contents of the iovec are



[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux