On Mon, Jun 26, 2023 at 11:32:16AM +0200, Christian Brauner wrote: > On Mon, Jun 26, 2023 at 03:12:09AM +0200, Ahelenia Ziemiańska wrote: > > Hi! (starting with get_maintainers.pl fs/splice.c, > > idk if that's right though) > > > > Per fs/splice.c: > > * The traditional unix read/write is extended with a "splice()" operation > > * that transfers data buffers to or from a pipe buffer. > > so I expect splice() to work just about the same as read()/write() > > (and, to a large extent, it does so). > > > > Thus, a refresher on pipe read() semantics > > (quoting Issue 8 Draft 3; Linux when writing with write()): > > 60746 When attempting to read from an empty pipe or FIFO: > > 60747 • If no process has the pipe open for writing, read( ) shall return 0 to indicate end-of-file. > > 60748 • If some process has the pipe open for writing and O_NONBLOCK is set, read( ) shall return > > 60749 −1 and set errno to [EAGAIN]. > > 60750 • If some process has the pipe open for writing and O_NONBLOCK is clear, read( ) shall > > 60751 block the calling thread until some data is written or the pipe is closed by all processes that > > 60752 had the pipe open for writing. > > > > However, I've observed that this is not the case when splicing from > > something that sleeps on read to a pipe, and that in that case all > > readers block, /including/ ones that are reading from fds with > > O_NONBLOCK set! > > > > As an example, consider these two programs: > > -- >8 -- > > // wr.c > > #define _GNU_SOURCE > > #include <fcntl.h> > > #include <stdio.h> > > int main() { > > while (splice(0, 0, 1, 0, 128 * 1024 * 1024, 0) > 0) > > ; > > fprintf(stderr, "wr: %m\n"); > > } > > -- >8 -- > > > > -- >8 -- > > // rd.c > > #define _GNU_SOURCE > > #include <errno.h> > > #include <fcntl.h> > > #include <stdio.h> > > #include <unistd.h> > > int main() { > > fcntl(0, F_SETFL, fcntl(0, F_GETFL) | O_NONBLOCK); > > > > char buf[64 * 1024] = {}; > > for (ssize_t rd;;) { > > #if 1 > > while ((rd = read(0, buf, sizeof(buf))) == -1 && errno == EINTR) > > ; > > #else > > while ((rd = splice(0, 0, 1, 0, 128 * 1024 * 1024, 0)) == -1 && > > errno == EINTR) > > ; > > #endif > > fprintf(stderr, "rd=%zd: %m\n", rd); > > write(1, buf, rd); > > > > errno = 0; > > sleep(1); > > } > > } > > -- >8 -- > > > > Thus: > > -- >8 -- > > a$ make rd wr > > a$ mkfifo fifo > > a$ ./rd < fifo b$ echo qwe > fifo > > rd=4: Success > > qwe > > rd=0: Success > > rd=0: Success b$ sleep 2 > fifo > > rd=-1: Resource temporarily unavailable > > rd=-1: Resource temporarily unavailable > > rd=0: Success > > rd=0: Success > > rd=-1: Resource temporarily unavailable b$ /bin/cat > fifo > > rd=-1: Resource temporarily unavailable > > rd=4: Success abc > > abc > > rd=-1: Resource temporarily unavailable > > rd=4: Success def > > def > > rd=0: Success ^D > > rd=0: Success > > rd=0: Success b$ ./wr > fifo > > -- >8 -- > > and nothing. Until you actually type a line (or a few) into teletype b > > so that the splice completes, at which point so does the read. > > > > An even simpler case is > > -- >8 -- > > $ ./wr | ./rd > > abc > > def > > rd=8: Success > > abc > > def > > ghi > > jkl > > rd=8: Success > > ghi > > jkl > > ^D > > wr: Success > > rd=-1: Resource temporarily unavailable > > rd=0: Success > > rd=0: Success > > -- >8 -- > > > > splice flags don't do anything. > > Tested on bookworm (6.1.27-1) and Linus' HEAD (v6.4-rc7-234-g547cc9be86f4). > > > > You could say this is a "denial of service", since this is a valid > > way of following pipes (and, sans SIGIO, the only portable one), > splice() may block for any of the two file descriptors if they don't > have O_NONBLOCK set even if SPLICE_F_NONBLOCK is raised. > > SPLICE_F_NONBLOCK in splice_file_to_pipe() is only relevant if the pipe > is full. If the pipe isn't full then the write is attempted. That of > course involves reading the data to splice from the source file. If the > source file isn't O_NONBLOCK that read may block holding pipe_lock(). > > If you raise O_NONBLOCK on the source fd in wr.c then your problems go > away. This is pretty long-standing behavior. I don't see how this is relevant here. Whether the writer splice blocks ‒ or how it behaves at all ‒ doesn't matter. The /reader/ demands non-blocking reads. Just by running a splice() we've managed to permanently hang the reader in a way that's fully impervious to everything. Actually, hold that: in testing this on an actual program that relies on this (nullmailer), I've found that trying to /open the FIFO/ also hangs forever, in that same signal-impervious state. To wit: $ ps 3766 PID TTY STAT TIME COMMAND 3766 ? Ss 0:01 /usr/sbin/nullmailer-send $ ls -l /proc/3766/fd total 0 lr-x------ 1 mail mail 64 Jun 14 15:03 0 -> /dev/null lrwx------ 1 mail mail 64 Jun 14 15:03 1 -> 'socket:[81721760]' lrwx------ 1 mail mail 64 Jun 14 15:03 2 -> 'socket:[81721760]' lr-x------ 1 mail mail 64 Apr 28 15:38 3 -> 'pipe:[81721763]' l-wx------ 1 mail mail 64 Jun 14 15:03 4 -> 'pipe:[81721763]' lr-x------ 1 mail mail 64 Jun 14 15:03 5 -> /var/spool/nullmailer/trigger lrwx------ 1 mail mail 64 Jun 14 15:03 9 -> /dev/null # cat /proc/3766/fdinfo/5 pos: 0 flags: 0104000 mnt_id: 64 ino: 393969 # < /proc/3766/fdinfo/5 fdinfo O_RDONLY O_NONBLOCK O_LARGEFILE # strace -yp 3766 & strace: Process 3766 attached $ strace out/cmd/cat > /var/spool/nullmailer/trigger [cat] (normal libc setup) [cat] splice(0, NULL, 1, NULL, 134217728, SPLICE_F_MOVE|SPLICE_F_MOREa [cat] ) = 2 [cat] splice(0, NULL, 1, NULL, 134217728, SPLICE_F_MOVE|SPLICE_F_MORE [nullmailer] pselect6(6, [5</var/spool/nullmailer/trigger>], NULL, NULL, {tv_sec=86397, tv_nsec=624894145}, NULL) = 1 (in [5], left {tv_sec=86394, tv_nsec=841299215}) [nullmailer] write(1<socket:[81721760]>, "Trigger pulled.\n", 16) = 16 [nullmailer] read(5</var/spool/nullmailer/trigger>, and $ strace -y sh -c 'echo zupa > /var/spool/nullmailer/trigger' (...whatever shell setup) rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER, sa_restorer=0xf7d21bb0}, NULL, 8) = 0 openat(AT_FDCWD, "/var/spool/nullmailer/trigger", O_WRONLY|O_CREAT|O_TRUNC, 0666 This is a "you've lost" situation to me. This system will /never/ send mail now, and any mailer program will also hang forever (again, to wit: # echo zupa | strace -yfo /tmp/ss mail root does hang forever and /tmp/ss ends in 16915 close(6</var/spool/nullmailer/queue>) = 0 16915 unlink("/var/spool/nullmailer/tmp/16915") = 0 16915 openat(AT_FDCWD, "/var/spool/nullmailer/trigger", O_WRONLY|O_NONBLOCK ) which means that, on this system, I will never get events from smartd or ZED, so fuck me if I wanted to get "scrub errored" or "disk will die soon" notifications (in pre-2.0.0 ZED this would also have broken autoreplace=on since it waited synchronously), or from other monitoring, so again fuck me if I wanted to get overheating/packet drops/whatever notifications, or again fuck me if I wanted to get cron mail. In many ways I've brought the system down (or will have done in like a day once some mails go out) by sending a mail weird. Naturally systemd stopping nullmailer failed after a few minutes with × nullmailer.service - Nullmailer relay-only MTA Loaded: loaded (/lib/systemd/system/nullmailer.service; enabled; preset: enabled) Active: failed (Result: timeout) since Mon 2023-06-26 13:10:02 CEST; 6min ago Duration: 1month 4w 10h 55min 29.666s Docs: man:nullmailer(7) Main PID: 3766 Tasks: 1 (limit: 4673) Memory: 3.1M CPU: 1min 26.893s CGroup: /system.slice/nullmailer.service └─3766 /usr/sbin/nullmailer-send Jun 26 13:05:32 szarotka systemd[1]: nullmailer.service: State 'stop-sigterm' timed out. Killing. Jun 26 13:05:32 szarotka systemd[1]: nullmailer.service: Killing process 3766 (nullmailer-send) with signal SIGKILL. Jun 26 13:07:02 szarotka systemd[1]: nullmailer.service: Processes still around after SIGKILL. Ignoring. Jun 26 13:08:32 szarotka systemd[1]: nullmailer.service: State 'final-sigterm' timed out. Killing. Jun 26 13:08:32 szarotka systemd[1]: nullmailer.service: Killing process 3766 (nullmailer-send) with signal SIGKILL. Jun 26 13:10:02 szarotka systemd[1]: nullmailer.service: Processes still around after final SIGKILL. Entering failed mode. Jun 26 13:10:02 szarotka systemd[1]: nullmailer.service: Failed with result 'timeout'. Jun 26 13:10:02 szarotka systemd[1]: nullmailer.service: Unit process 3766 (nullmailer-send) remains running after unit s> Jun 26 13:10:02 szarotka systemd[1]: Stopped nullmailer.service - Nullmailer relay-only MTA. Jun 26 13:10:02 szarotka systemd[1]: nullmailer.service: Consumed 1min 26.893s CPU time. But not to fret! Maybe we can still kill it with the cgroup! No: # strace -y sh -c 'echo 1 > /sys/fs/cgroup/system.slice/nullmailer.service/cgroup.kill' ... dup2(3</sys/fs/cgroup/system.slice/nullmailer.service/cgroup.kill>, 1) = 1</sys/fs/cgroup/system.slice/nullmailer.service/cgroup.kill> close(3</sys/fs/cgroup/system.slice/nullmailer.service/cgroup.kill>) = 0 write(1</sys/fs/cgroup/system.slice/nullmailer.service/cgroup.kill>, "1\n", 2) = 2 ... This completes, sure, but doesn't do anything at all (admittedly, I'm not a cgroup expert, but it did work on other, non-poisoned, cgroups, so I'd expect it to work). Opening the FIFO with O_NONBLOCK also hangs, obviously. Killing the splicer restores order, as expected. > Splice would have to be > refactored to not rely on pipe_lock(). That's likely major work with a > good portion of regressions if the past is any indication. That's likely; however, it ‒ or an equivalent solution ‒ would probably be a good idea to do, on balance of all my points above, I think. > If you need that ability to fully async read from a pipe with splice > rn then io_uring will at least allow you to punt that read into an async > worker thread afaict. I need my system to not be hanged by any user with a magic syscall. I think you've confused the splice bit as being contentious ‒ I don't care, and couldn't care less about how this is triggered ‒ the issue is that a splice fully excludes /ALL OTHER/ operations on a pipe, and zombifies all processes that try. Consider the case where messages arrive at a collection pipe (this is well-specified and well-used with O_DIRECT and <=PIPE_MAX, I don't have a demo off-hand), or, hell, even a case where logs do: giving any user with append capability effectively exclusive control for as long as they want is, well, suboptimal; you could analyse this as a stronger variant of https://lore.kernel.org/linux-fsdevel/fa6de786ee1241c6ba54c3cce0b980aa@xxxxxxxxxxxxxxxx/t/#e74be7131861099a7f3d82d51dfc96645d26e9a94 and indeed, my original use-case was this broke tail -f, but you know how it be.
Attachment:
signature.asc
Description: PGP signature