Re: [patch 0/3] futex/rtmutex: Fix issues exposed by trinity
From: Carlos O'Donell
Date: Wed May 14 2014 - 02:59:06 EST
On 05/12/2014 11:54 PM, Darren Hart wrote:
> On Mon, May 12, 2014 at 08:45:32PM -0000, Thomas Gleixner wrote:
>> Dave reported recently that the trinity syscall fuzzer triggers a
>> warning in the rtmutex code via the futex syscall.
>>
>> It took me quite a while to understand the issue, until I was able to
>> write a minimalistic reproducer.
>>
>> The first two patches address the issues and the third one is adding
>> an unrelated sanity check to prevent user space from assigning PI
>> futexes to kernel threads.
>>
>> I ran it through my usual tests (except of one, see below), Darrens
>> futex tester and it holds up against a 400 threads trinity whacking
>> for well above 12hrs now.
>>
>> Staring three days into futex.c/rtmutex.c and a few GB of traces
>> definitly brings one in a lousy mood. But I discovered two things
>> which made me outright grumpy:
>>
>>
>> 2) glibc fun
>>
>> While writing an isolated test case for the trinity wreckage, I
>> found out that glibc has an interesting misfeature:
>>
>> strace tells me:
>>
>> futex(0x600e00, FUTEX_LOCK_PI_PRIVATE, 1) = -1 EINVAL (Invalid argument)
>>
>> but the return value of pthread_mutex_lock() is 0
>
> So something is clearly wrong there - however, were you looking at the comments
> (sorry, I mean the C code), or the implementation (all the ASM)? The only way
> I've been able to be sure in the past is to delete the ASM files and recompile
> using the C files. Hopefully we'll be able to drop all the ASM in the pthread
> calls soonish (measured in years in glibc development time scales).... sigh.
I agree. Something is wrong. There are *few* cases where we might probe the
kernel to test for things, but you'd only see that failed futex syscall once.
If this is repeating for each call to pthread_mutex_lock, then I would appreciate
a test case I could use to debug this and then stick into the regression tests
for glibc.
>> Yay, for another master piece of trainwreck engineering!
>>
>> I checked the glibc source and of course neither the lock nor the unlock path
>> gets any error code from the syscall propagated.
If there is a specific test case you have in mind where we fail to return an
appropriate error to the caller, please provide it.
>> The handling of -EDEADLOCK is even more impressive. Instead of
>> propagating it to the caller something in the guts of glibc calls pause().
>>
>> futex(0x601300, FUTEX_LOCK_PI_PRIVATE, 1) = -1 EDEADLK (Resource deadlock avoided)
>> pause(
>>
>
> Gotta love comments like these though - such trust!:
>
> /* The mutex is locked. The kernel will now take care of
> everything. */
>
> IIRC, glibc takes the approach that if this operation fails, there is no way for
> it to recovery "properly", and so it chooses to:
>
> /* Delay the thread indefinitely. */
>
> I believe the thinking goes that if we get to here, then the lock is in an
> inconsistent state (between kernel and userspace). I don't have an answer for
> why pausing forever would be preferable to returning an error however...
What error would we return?
This particular case is a serious error for which we have no good error code
to return to userspace. It's an implementation defect, a bug, we should probably
assert instead of pausing.
We can't cancel the stuck thread because pthread_mutex_lock is not a cancellation
point.
In practice the rest of the application can make forward progress with a single
thread stuck. You can attach the debugger and inspect state, so it's useful
from that perspective.
>> So any kind of futex wreckage which is not detectable by glibc
>> itself ends up in a disaster one way or the other. How is Joe user
>> of this stuff who reads the manpages supposed to find out that the
>> kernel detected an inconsistent user space variable?
>>
>> If someone of the glibc folks can be bothered to look after that,
>> I'm happy to provide the simple test cases, but I'm sure that
>> looking at the code which simply ignores or pauses on kernel error
>> return values is enough to figure out why its broken.
>
> Was there a spot where it ignores it completely? I suppose if it's anything
> other than ESRCH or EDEADLK... yuck...
What additional error codes are documented?
What additional error codes are returned?
Keep in mind glibc has to maintain the POSIX semantics for the other error codes.
We can't blindly return any error code, and if we did what would the user do
with that information? It's easy to say "return any and all error codes", but
in practice the user has to be able to do something actionable with that error.
If the error is indicative of a kernel bug, I'd be inclined to simply assert
or abort immediately. Then you get a core file for debugging.
>> This does not only apply to the PI version, the bog standard
>> futexes have error returns from the kernel as well, which are
>> handled in the same absurd way.
>
> We do have the attention of some of the new glibc maintainers with the requeue
> PI work, and some redhat folks are digging into other PI related spec issues.
> I'll bring this up in those discussions and see if there might be something we
> can do here.
Hi Darren! :-)
Cheers,
Carlos.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/