Re: [PATCH] locks: try to catch potential deadlock between file-private and classic locks from same process

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 04, 2014 at 03:52:47PM -0500, Trond Myklebust wrote:
> 
> On Mar 4, 2014, at 15:37, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
> 
> > On Tue, 4 Mar 2014 12:19:44 -0800
> > Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote:
> > 
> >> On Tue, Mar 4, 2014 at 12:14 PM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
> >>> On Tue, 4 Mar 2014 14:35:51 -0500
> >>> "J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote:
> >>> 
> >>>> On Tue, Mar 04, 2014 at 02:10:49PM -0500, Jeff Layton wrote:
> >>>>> My expectation is that programs shouldn't mix classic and file-private
> >>>>> locks, but Glenn Skinner pointed out to me that that may occur at times
> >>>>> even if the programmer isn't aware.
> >>>>> 
> >>>>> Suppose we have a program that uses file-private locks. That program
> >>>>> then links in a library that uses classic POSIX locks. If those locks
> >>>>> end up conflicting and one is using blocking locks, then the program
> >>>>> could end up deadlocked.
> >>>>> 
> >>>>> Try to catch this situation in posix_locks_deadlock by looking for the
> >>>>> case where the blocking lock was set by the same process but has a
> >>>>> different type, and have the kernel return EDEADLK if that occurs.
> >>>>> 
> >>>>> This check is not perfect. You could (in principle) have a threaded
> >>>>> process that is using classic locks in one thread and file-private locks
> >>>>> in another. That's not necessarily a deadlockable situation but this
> >>>>> check would cause an EDEADLK return in that case.
> >>>>> 
> >>>>> By the same token, you could also have a file-private lock that was
> >>>>> inherited across a fork(). If the inheriting process ends up blocking on
> >>>>> that while trying to set a classic POSIX lock then this check would miss
> >>>>> it and the program would deadlock.
> >>>> 
> >>>> If the caller's not prepared for the library to use classic posix locks,
> >>>> then it's not going to know how to recover from this EDEADLCK either, is
> >>>> it?
> >>>> 
> >>> 
> >>> Well, callers should be aware of that if we take this change. The
> >>> semantics aren't yet set in stone...
> >>> 
> >>>> I guess I don't understand how this helps anyone.
> >>>> 
> >>>> Has it ever made sense for a library function and its caller to both use
> >>>> classic posix locking on the same file without any coordination?
> >>>> 
> >>> 
> >>> Not really, but that doesn't mean that it isn't done... ;)
> >>> 
> >>>> Besides the first-close problem there's the problem that locks merge, so
> >>>> for example you can't hold your own lock across a call to a function
> >>>> that grabs and drops a lock on the same file.
> >>>> 
> >>> 
> >>> It depends, but you're basically correct...
> >>> 
> >>> It's likely that if the above situation occurred with a program using
> >>> classic locks, then those locks were silently lost at times. It's also
> >>> plausible that when it occurs that no one is aware of it due to the way
> >>> POSIX locks work.
> >>> 
> >>> If the program switched to using file-private locks and the library
> >>> stays using classic locks (or vice versa), you then potentially trade
> >>> that silent loss of locks for a deadlock (since classic and
> >>> file-private locks always conflict).
> >>> 
> >>> So, the idea would be to try to catch that situation explicitly and
> >>> return a hard error instead of deadlocking. Unfortunately, it's a
> >>> little tough to do that in all cases so all this does is try to catch a
> >>> subset of them.
> >>> 
> >>> Will it be helpful in the long run? I'm not sure. It seems unlikely to
> >>> harm legit use cases though, and might catch some problematic
> >>> situations. I can drop this if that's the consensus however.
> >> 
> >> I don't think I like it except in the case where there are no threads
> >> (number of tasks sharing the fd table is 1) and where the struct file
> >> only has one fd.  Otherwise I think it can have false positives.  Or
> >> am I missing something?
> >> 
> > 
> > The only case where I think this would hit a false positive is if you
> > have a threaded program that's doing something weird like having one
> > thread that's setting classic POSIX locks on a file, and one thread
> > that isn't. Once you hit a conflict between the two, you'd get back
> > EDEADLK on one of them, even though that situation might not actually
> > be a deadlock.
> > 
> > That doesn't really seem like a real-world use-case though, so I'm
> > generally OK with that potential false-positive.
> > 
> 
> How do these locks interact with locks_mandatory_area(), and mandatory locking in general? Unless I missed something, it looks to me as if there is a nasty potential for a self-DOS if you set a file-private lock on a file with the mandatory lock bits set and the filesystem is mounted ‘-omand'.

Good point: if I understand it right, in the mandatory locking case,
before doing a read or write we first check if we'd be able to apply a
classic posix lock.  And that lock will always conflict with a
file-private lock.

I think we should just not worry about it and see if anyone complains.
File-private locks are a new feature and I don't see that we're under
any obligation to support the combination of file-private locks and
mandatory locking.

Mandatory locking is already buggy (because of the race between checking
for locks and performing the IO).  If we get no complaints about this
file-private behavior then that's more evidence we could use to justify
just ripping it out completely some day....

But if we really want to be helpful to (possibly nonexistant?) users of
mandatory locking, maybe we could allow locks_mandatory_area to try
*both* a file-private and a classic lock and to succeed if either one
succeeds??

--b.
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux