Re: [PATCH] locks: try to catch potential deadlock between file-private and classic locks from same process

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mar 4, 2014, at 16:14, Dr Fields James Bruce <bfields@xxxxxxxxxxxx> wrote:

> On Tue, Mar 04, 2014 at 03:52:47PM -0500, Trond Myklebust wrote:
>> 
>> On Mar 4, 2014, at 15:37, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
>> 
>>> On Tue, 4 Mar 2014 12:19:44 -0800
>>> Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote:
>>> 
>>>> On Tue, Mar 4, 2014 at 12:14 PM, Jeff Layton <jlayton@xxxxxxxxxx> wrote:
>>>>> On Tue, 4 Mar 2014 14:35:51 -0500
>>>>> "J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote:
>>>>> 
>>>>>> On Tue, Mar 04, 2014 at 02:10:49PM -0500, Jeff Layton wrote:
>>>>>>> My expectation is that programs shouldn't mix classic and file-private
>>>>>>> locks, but Glenn Skinner pointed out to me that that may occur at times
>>>>>>> even if the programmer isn't aware.
>>>>>>> 
>>>>>>> Suppose we have a program that uses file-private locks. That program
>>>>>>> then links in a library that uses classic POSIX locks. If those locks
>>>>>>> end up conflicting and one is using blocking locks, then the program
>>>>>>> could end up deadlocked.
>>>>>>> 
>>>>>>> Try to catch this situation in posix_locks_deadlock by looking for the
>>>>>>> case where the blocking lock was set by the same process but has a
>>>>>>> different type, and have the kernel return EDEADLK if that occurs.
>>>>>>> 
>>>>>>> This check is not perfect. You could (in principle) have a threaded
>>>>>>> process that is using classic locks in one thread and file-private locks
>>>>>>> in another. That's not necessarily a deadlockable situation but this
>>>>>>> check would cause an EDEADLK return in that case.
>>>>>>> 
>>>>>>> By the same token, you could also have a file-private lock that was
>>>>>>> inherited across a fork(). If the inheriting process ends up blocking on
>>>>>>> that while trying to set a classic POSIX lock then this check would miss
>>>>>>> it and the program would deadlock.
>>>>>> 
>>>>>> If the caller's not prepared for the library to use classic posix locks,
>>>>>> then it's not going to know how to recover from this EDEADLCK either, is
>>>>>> it?
>>>>>> 
>>>>> 
>>>>> Well, callers should be aware of that if we take this change. The
>>>>> semantics aren't yet set in stone...
>>>>> 
>>>>>> I guess I don't understand how this helps anyone.
>>>>>> 
>>>>>> Has it ever made sense for a library function and its caller to both use
>>>>>> classic posix locking on the same file without any coordination?
>>>>>> 
>>>>> 
>>>>> Not really, but that doesn't mean that it isn't done... ;)
>>>>> 
>>>>>> Besides the first-close problem there's the problem that locks merge, so
>>>>>> for example you can't hold your own lock across a call to a function
>>>>>> that grabs and drops a lock on the same file.
>>>>>> 
>>>>> 
>>>>> It depends, but you're basically correct...
>>>>> 
>>>>> It's likely that if the above situation occurred with a program using
>>>>> classic locks, then those locks were silently lost at times. It's also
>>>>> plausible that when it occurs that no one is aware of it due to the way
>>>>> POSIX locks work.
>>>>> 
>>>>> If the program switched to using file-private locks and the library
>>>>> stays using classic locks (or vice versa), you then potentially trade
>>>>> that silent loss of locks for a deadlock (since classic and
>>>>> file-private locks always conflict).
>>>>> 
>>>>> So, the idea would be to try to catch that situation explicitly and
>>>>> return a hard error instead of deadlocking. Unfortunately, it's a
>>>>> little tough to do that in all cases so all this does is try to catch a
>>>>> subset of them.
>>>>> 
>>>>> Will it be helpful in the long run? I'm not sure. It seems unlikely to
>>>>> harm legit use cases though, and might catch some problematic
>>>>> situations. I can drop this if that's the consensus however.
>>>> 
>>>> I don't think I like it except in the case where there are no threads
>>>> (number of tasks sharing the fd table is 1) and where the struct file
>>>> only has one fd.  Otherwise I think it can have false positives.  Or
>>>> am I missing something?
>>>> 
>>> 
>>> The only case where I think this would hit a false positive is if you
>>> have a threaded program that's doing something weird like having one
>>> thread that's setting classic POSIX locks on a file, and one thread
>>> that isn't. Once you hit a conflict between the two, you'd get back
>>> EDEADLK on one of them, even though that situation might not actually
>>> be a deadlock.
>>> 
>>> That doesn't really seem like a real-world use-case though, so I'm
>>> generally OK with that potential false-positive.
>>> 
>> 
>> How do these locks interact with locks_mandatory_area(), and mandatory locking in general? Unless I missed something, it looks to me as if there is a nasty potential for a self-DOS if you set a file-private lock on a file with the mandatory lock bits set and the filesystem is mounted ‘-omand'.
> 
> Good point: if I understand it right, in the mandatory locking case,
> before doing a read or write we first check if we'd be able to apply a
> classic posix lock.  And that lock will always conflict with a
> file-private lock.
> 
> I think we should just not worry about it and see if anyone complains.
> File-private locks are a new feature and I don't see that we're under
> any obligation to support the combination of file-private locks and
> mandatory locking.
> 
> Mandatory locking is already buggy (because of the race between checking
> for locks and performing the IO).  If we get no complaints about this
> file-private behavior then that's more evidence we could use to justify
> just ripping it out completely some day....
> 
> But if we really want to be helpful to (possibly nonexistant?) users of
> mandatory locking, maybe we could allow locks_mandatory_area to try
> *both* a file-private and a classic lock and to succeed if either one
> succeeds??

The problem is that mandatory locking is something the administrator and user enable. It isn’t entirely under the control of the application… If you write a program that uses file-private locks, I can trivially DOS it by manipulating the mount parameters and manipulating the file's group execute and sgid bit.

_________________________________
Trond Myklebust
Linux NFS client maintainer, PrimaryData
trond.myklebust@xxxxxxxxxxxxxxx

--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux