Thanks for your reply!
> The variables gb_tty->port.close_delay and gb_tty->port.closing_wait are
> ofter accessed together while holding the lock gb_tty->port.mutex. Here is
> an example in set_serial_info():
>
> mutex_lock(&gb_tty->port.mutex);
> ...
> gb_tty->port.close_delay = close_delay;
> gb_tty->port.closing_wait = closing_wait;
> ...
> mutex_unlock(&gb_tty->port.mutex);
>
> However, they are accessed without holding the lock gb_tty->port.mutex when
> are accessed in get_serial_info():
>
> ss->close_delay = jiffies_to_msecs(gb_tty->port.close_delay) / 10;
> ss->closing_wait =
> gb_tty->port.closing_wait == ASYNC_CLOSING_WAIT_NONE ?
> ASYNC_CLOSING_WAIT_NONE :
> jiffies_to_msecs(gb_tty->port.closing_wait) / 10;
>
> In my opinion, this may be a harmful race, because ss->close_delay can be
> inconsistent with ss->closing_wait if gb_tty->port.close_delay and
> gb_tty->port.closing_wait are updated by another thread after the
> assignment to ss->close_delay.
And how can that happen?
I am sorry that this data race is reported by a static analysis tool, and
thus I do not know how to write a test case to trigger this data race.
Also you have trailing whitespace in your changelog text :(
I am sorry to bother you, and I will be careful in the subsequent patches.
> Besides, the select operator may return wrong value if
> gb_tty->port.closing_wait is updated right after the condition is
> calculated.
>
> To fix this possible data-inconsistency caused by data race, a lock and
> unlock pair is added when accessing different fields of gb_tty->port.
>
> Reported-by: BassCheck <bass@buaa.edu.cn>
As per the documentation for research tools like this, you need to
explain how this was tested.
I use a static analysis tool to detect this possible data race. It first collects
all struct fields that may be protected by a lock when accessed. And then,
for each of such struct fields, it calculates the proportion of the protected
accesses in all accesses. If the proportion is greater than a given threshold,
the tool generates warnings for those unprotected field accesses.
Any suggestion on this static analysis tool will be appreciated.
Sincerely,
Tuo Li