On Tue, 4 Mar 2014 16:14:43 -0500 Dr Fields James Bruce <bfields@xxxxxxxxxxxx> wrote: > On Tue, Mar 04, 2014 at 03:52:47PM -0500, Trond Myklebust wrote: > > > > On Mar 4, 2014, at 15:37, Jeff Layton <jlayton@xxxxxxxxxx> wrote: > > > > > On Tue, 4 Mar 2014 12:19:44 -0800 > > > Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote: > > > > > >> On Tue, Mar 4, 2014 at 12:14 PM, Jeff Layton <jlayton@xxxxxxxxxx> wrote: > > >>> On Tue, 4 Mar 2014 14:35:51 -0500 > > >>> "J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote: > > >>> > > >>>> On Tue, Mar 04, 2014 at 02:10:49PM -0500, Jeff Layton wrote: > > >>>>> My expectation is that programs shouldn't mix classic and file-private > > >>>>> locks, but Glenn Skinner pointed out to me that that may occur at times > > >>>>> even if the programmer isn't aware. > > >>>>> > > >>>>> Suppose we have a program that uses file-private locks. That program > > >>>>> then links in a library that uses classic POSIX locks. If those locks > > >>>>> end up conflicting and one is using blocking locks, then the program > > >>>>> could end up deadlocked. > > >>>>> > > >>>>> Try to catch this situation in posix_locks_deadlock by looking for the > > >>>>> case where the blocking lock was set by the same process but has a > > >>>>> different type, and have the kernel return EDEADLK if that occurs. > > >>>>> > > >>>>> This check is not perfect. You could (in principle) have a threaded > > >>>>> process that is using classic locks in one thread and file-private locks > > >>>>> in another. That's not necessarily a deadlockable situation but this > > >>>>> check would cause an EDEADLK return in that case. > > >>>>> > > >>>>> By the same token, you could also have a file-private lock that was > > >>>>> inherited across a fork(). If the inheriting process ends up blocking on > > >>>>> that while trying to set a classic POSIX lock then this check would miss > > >>>>> it and the program would deadlock. > > >>>> > > >>>> If the caller's not prepared for the library to use classic posix locks, > > >>>> then it's not going to know how to recover from this EDEADLCK either, is > > >>>> it? > > >>>> > > >>> > > >>> Well, callers should be aware of that if we take this change. The > > >>> semantics aren't yet set in stone... > > >>> > > >>>> I guess I don't understand how this helps anyone. > > >>>> > > >>>> Has it ever made sense for a library function and its caller to both use > > >>>> classic posix locking on the same file without any coordination? > > >>>> > > >>> > > >>> Not really, but that doesn't mean that it isn't done... ;) > > >>> > > >>>> Besides the first-close problem there's the problem that locks merge, so > > >>>> for example you can't hold your own lock across a call to a function > > >>>> that grabs and drops a lock on the same file. > > >>>> > > >>> > > >>> It depends, but you're basically correct... > > >>> > > >>> It's likely that if the above situation occurred with a program using > > >>> classic locks, then those locks were silently lost at times. It's also > > >>> plausible that when it occurs that no one is aware of it due to the way > > >>> POSIX locks work. > > >>> > > >>> If the program switched to using file-private locks and the library > > >>> stays using classic locks (or vice versa), you then potentially trade > > >>> that silent loss of locks for a deadlock (since classic and > > >>> file-private locks always conflict). > > >>> > > >>> So, the idea would be to try to catch that situation explicitly and > > >>> return a hard error instead of deadlocking. Unfortunately, it's a > > >>> little tough to do that in all cases so all this does is try to catch a > > >>> subset of them. > > >>> > > >>> Will it be helpful in the long run? I'm not sure. It seems unlikely to > > >>> harm legit use cases though, and might catch some problematic > > >>> situations. I can drop this if that's the consensus however. > > >> > > >> I don't think I like it except in the case where there are no threads > > >> (number of tasks sharing the fd table is 1) and where the struct file > > >> only has one fd. Otherwise I think it can have false positives. Or > > >> am I missing something? > > >> > > > > > > The only case where I think this would hit a false positive is if you > > > have a threaded program that's doing something weird like having one > > > thread that's setting classic POSIX locks on a file, and one thread > > > that isn't. Once you hit a conflict between the two, you'd get back > > > EDEADLK on one of them, even though that situation might not actually > > > be a deadlock. > > > > > > That doesn't really seem like a real-world use-case though, so I'm > > > generally OK with that potential false-positive. > > > > > > > How do these locks interact with locks_mandatory_area(), and mandatory locking in general? Unless I missed something, it looks to me as if there is a nasty potential for a self-DOS if you set a file-private lock on a file with the mandatory lock bits set and the filesystem is mounted ‘-omand'. > > Good point: if I understand it right, in the mandatory locking case, > before doing a read or write we first check if we'd be able to apply a > classic posix lock. And that lock will always conflict with a > file-private lock. > > I think we should just not worry about it and see if anyone complains. > File-private locks are a new feature and I don't see that we're under > any obligation to support the combination of file-private locks and > mandatory locking. > > Mandatory locking is already buggy (because of the race between checking > for locks and performing the IO). If we get no complaints about this > file-private behavior then that's more evidence we could use to justify > just ripping it out completely some day.... > > But if we really want to be helpful to (possibly nonexistant?) users of > mandatory locking, maybe we could allow locks_mandatory_area to try > *both* a file-private and a classic lock and to succeed if either one > succeeds?? > Yeah, I think that's what we'll have to do. In principle it shouldn't be too hard to do, but I'll have look at the most efficient way to handle it. -- Jeff Layton <jlayton@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html