Message ID | 1341501390-797-3-git-send-email-pbonzini@redhat.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On 07/05/2012 06:16 PM, Paolo Bonzini wrote: > This is broken; since the eventfd is used in nonblocking mode there > is a race between reading and writing. > > diff --git a/event_notifier.c b/event_notifier.c > index 2b210f4..c339bfe 100644 > --- a/event_notifier.c > +++ b/event_notifier.c > @@ -51,18 +51,3 @@ int event_notifier_test_and_clear(EventNotifier *e) > int r = read(e->fd, &value, sizeof(value)); > return r == sizeof(value); > } > - > -int event_notifier_test(EventNotifier *e) > -{ > - uint64_t value; > - int r = read(e->fd, &value, sizeof(value)); > - if (r == sizeof(value)) { > - /* restore previous value. */ > - int s = write(e->fd, &value, sizeof(value)); > - /* never blocks because we use EFD_SEMAPHORE. > - * If we didn't we'd get EAGAIN on overflow > - * and we'd have to write code to ignore it. */ > - assert(s == sizeof(value)); > - } > - return r == sizeof(value); > -} I don't see the race. Mind explaining? It does however require than a poller be extra careful when reading; and the function is silly anyway.
Il 12/07/2012 11:10, Avi Kivity ha scritto: > On 07/05/2012 06:16 PM, Paolo Bonzini wrote: >> This is broken; since the eventfd is used in nonblocking mode there >> is a race between reading and writing. >> > >> diff --git a/event_notifier.c b/event_notifier.c >> index 2b210f4..c339bfe 100644 >> --- a/event_notifier.c >> +++ b/event_notifier.c >> @@ -51,18 +51,3 @@ int event_notifier_test_and_clear(EventNotifier *e) >> int r = read(e->fd, &value, sizeof(value)); >> return r == sizeof(value); >> } >> - >> -int event_notifier_test(EventNotifier *e) >> -{ >> - uint64_t value; >> - int r = read(e->fd, &value, sizeof(value)); >> - if (r == sizeof(value)) { >> - /* restore previous value. */ >> - int s = write(e->fd, &value, sizeof(value)); >> - /* never blocks because we use EFD_SEMAPHORE. >> - * If we didn't we'd get EAGAIN on overflow >> - * and we'd have to write code to ignore it. */ >> - assert(s == sizeof(value)); >> - } >> - return r == sizeof(value); >> -} > > I don't see the race. Mind explaining? The assertion can actually fire, there's nothing that prevents this from happening: event_notifier_test() read(fd, &value, 8) write(fd, <large value>, 8) write(fd, &value, 8) event_notifier_set will always write a 1 and it will take a large amount of writes to reach overflow :) but that may not be true of other writers using the same file descriptor. Then, the comment is wrong in two ways. First, we do not use EFD_SEMAPHORE (though even if we did the only difference is that value will be always one). Second, we cannot write code to ignore EAGAIN, because then we've lost the value. With blocking I/O things would not be much better, because then event_notifier_test() might block on the write. That would be quite surprising. If we cared, we could implement the function more easily and corectly with poll(), checking for POLLIN in the revents. But I don't see a sensible use case for it anyway. Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On 07/12/2012 01:30 PM, Paolo Bonzini wrote: > Il 12/07/2012 11:10, Avi Kivity ha scritto: >> On 07/05/2012 06:16 PM, Paolo Bonzini wrote: >>> This is broken; since the eventfd is used in nonblocking mode there >>> is a race between reading and writing. >>> >> >>> diff --git a/event_notifier.c b/event_notifier.c >>> index 2b210f4..c339bfe 100644 >>> --- a/event_notifier.c >>> +++ b/event_notifier.c >>> @@ -51,18 +51,3 @@ int event_notifier_test_and_clear(EventNotifier *e) >>> int r = read(e->fd, &value, sizeof(value)); >>> return r == sizeof(value); >>> } >>> - >>> -int event_notifier_test(EventNotifier *e) >>> -{ >>> - uint64_t value; >>> - int r = read(e->fd, &value, sizeof(value)); >>> - if (r == sizeof(value)) { >>> - /* restore previous value. */ >>> - int s = write(e->fd, &value, sizeof(value)); >>> - /* never blocks because we use EFD_SEMAPHORE. >>> - * If we didn't we'd get EAGAIN on overflow >>> - * and we'd have to write code to ignore it. */ >>> - assert(s == sizeof(value)); >>> - } >>> - return r == sizeof(value); >>> -} >> >> I don't see the race. Mind explaining? > > The assertion can actually fire, there's nothing that prevents this from > happening: > > event_notifier_test() > read(fd, &value, 8) > write(fd, <large value>, 8) > write(fd, &value, 8) > > event_notifier_set will always write a 1 and it will take a large amount > of writes to reach overflow :) but that may not be true of other writers > using the same file descriptor. The first write would have overflowed without event_notifier_test(), and there's no reasonable way to deal with it; nor is there any reason to, since the limit is so large. > Then, the comment is wrong in two ways. First, we do not use > EFD_SEMAPHORE (though even if we did the only difference is that value > will be always one). Second, we cannot write code to ignore EAGAIN, > because then we've lost the value. > > With blocking I/O things would not be much better, because then > event_notifier_test() might block on the write. That would be quite > surprising. > > If we cared, we could implement the function more easily and corectly > with poll(), checking for POLLIN in the revents. But I don't see a > sensible use case for it anyway. Right, it's useless. I'll adjust the comment (and the whitespace fix) and apply.
Il 12/07/2012 13:04, Avi Kivity ha scritto: > Right, it's useless. I'll adjust the comment (and the whitespace fix) > and apply. Ok, thanks very much! Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/event_notifier.c b/event_notifier.c index 2b210f4..c339bfe 100644 --- a/event_notifier.c +++ b/event_notifier.c @@ -51,18 +51,3 @@ int event_notifier_test_and_clear(EventNotifier *e) int r = read(e->fd, &value, sizeof(value)); return r == sizeof(value); } - -int event_notifier_test(EventNotifier *e) -{ - uint64_t value; - int r = read(e->fd, &value, sizeof(value)); - if (r == sizeof(value)) { - /* restore previous value. */ - int s = write(e->fd, &value, sizeof(value)); - /* never blocks because we use EFD_SEMAPHORE. - * If we didn't we'd get EAGAIN on overflow - * and we'd have to write code to ignore it. */ - assert(s == sizeof(value)); - } - return r == sizeof(value); -} diff --git a/event_notifier.h b/event_notifier.h index efca852..9b2edf4 100644 --- a/event_notifier.h +++ b/event_notifier.h @@ -24,6 +24,5 @@ void event_notifier_cleanup(EventNotifier *); int event_notifier_get_fd(EventNotifier *); int event_notifier_set(EventNotifier *); int event_notifier_test_and_clear(EventNotifier *); -int event_notifier_test(EventNotifier *); #endif
This is broken; since the eventfd is used in nonblocking mode there is a race between reading and writing. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> --- event_notifier.c | 15 --------------- event_notifier.h | 1 - 2 files changed, 16 deletions(-)