Re: [PATCH] NLM: hold BKL when clearing global lockd task and serv vars

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Apr 8, 2008, at 12:28 PM, J. Bruce Fields wrote:
On Tue, Apr 08, 2008 at 09:21:02AM -0400, Jeff Layton wrote:
On Mon, 7 Apr 2008 16:50:27 -0400
"J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote:

On Mon, Apr 07, 2008 at 04:22:41PM -0400, Jeff Layton wrote:
On Mon, 7 Apr 2008 13:56:15 -0400
"J. Bruce Fields" <bfields@xxxxxxxxxxxx> wrote:

On Mon, Apr 07, 2008 at 12:45:01PM -0400, Christoph Hellwig wrote:
On Mon, Apr 07, 2008 at 09:38:34AM -0400, Jeff Layton wrote:
The global task and serv pointers for lockd are normally protected by the nlmsvc_mutex. The exception is when the lockd exits abnormally. When
this occurs, these variables are cleared without any locking.

Shouldn't we get rid of the case where it exits abnormally instead?

I tried to figure out when this could actually occur (when can
svc_recv() return an error other than -EINTR or -EAGAIN?), and got lost
in sock_recvmsg():

	- svc_recv() itself returns only -EAGAIN or the return from
	  ->xpo_recvfrom().
	- the only xpo_recvfrom() that's interesting is
	  svc_tcp_recvfrom(), which can return the error it gets from
	  svc_recvfrom(), which can return the error from
	  kernel_recvmsg(), which gets its return from sock_recvmsg().

Since __sock_recvmsg() has a security hook, it looks like we can end up
with an -EACCES from selinux?

So one case would be selinux deciding we weren't allowed to receive
packets from this socket.  Huh.

I got lost there too, but I would suspect that there are other errors that can bubble up from the lower networking layers as well. Even if there aren't currently, it's probably still prudent to assume that it's
a possibility and code for it.

I tend to think the safest thing is probably to do a long sleep (1s or so and retry when we get an error (maybe also a ratelimited printk?).

Yeah, I guess I can't think of anything better.


Ok, I went ahead and did patches for this and gave them a quick test
this morning. Obviously, these are hard to fully unit test since this
seems to be a very uncommon occurrence.

I suppose this could probably be reproduced with some selinux magic.

Any thoughts?

If anyone does ever hit this and it doesn't go away, the printk (even
with the ratelimiting) could be pretty annoying, so it might be worth
arranging to print this just once.  But perhaps we can wait and see if
that actually happens.


Coding by contract would be useful here.

If svc_recv() returns only specific error codes (and never anything else) then its callers don't need any special logic for "unrecognized" return codes.

Thus, ensuring that svc_recv() returns only EINTR, EACCES, or EAGAIN would limit the complexity and failure modes of its callers.

--
Chuck Lever
chuck[dot]lever[at]oracle[dot]com
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux