Re: [patch 16/61] lock validator: fown locking workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Andrew Morton <[email protected]> wrote:

> On Mon, 29 May 2006 23:24:23 +0200
> Ingo Molnar <[email protected]> wrote:
> 
> > temporary workaround for the lock validator: make all uses of 
> > f_owner.lock irq-safe. (The real solution will be to express to the 
> > lock validator that f_owner.lock rules are to be generated 
> > per-filesystem.)
> 
> This description forgot to tell us what problem is being worked 
> around.

f_owner locking rules are per-filesystem: some of them have this lock 
irq-safe [because they use it in irq-context generated SIGIOs], some of 
them have it irq-unsafe [because they dont generate SIGIOs in irq 
context]. The lock validator meshes them together and produces a false 
positive. The workaround changed all uses of f_owner.lock to be 
irq-safe.

> This patch is a bit of a show-stopper.  How hard-n-bad is the real 
> fix?

the real fix would be to correctly map the 'key' of the f_owner.lock to 
the filesystem. I.e. to embedd a "lockdep_type_key s_fown_key" in 
'struct file_system_type', and to use that key when initializing 
f_own.lock.

the practical problem is that the initialization site of f_owner.lock 
does not know about which filesystem this file will belong to.

there might be another way though: the only non-core user of f_own.lock 
is CIFS, and that use of f_own.lock seems unnecessary - it does not 
change any fowner state, and its justification for taking that lock 
seems rather vague as well:

 *  GlobalSMBSesLock protects:
 *      list operations on tcp and SMB session lists and tCon lists
 *  f_owner.lock protects certain per file struct operations

maybe CIFS or VFS people could comment?

that way you could remove the following patch from -mm:

   lock-validator-fown-locking-workaround.patch

and add the patch below. (the fcntl.c portion of the above patch is 
meanwhile moot)

	Ingo

--------------------------------------
Subject: CIFS: remove f_owner.lock use
From: Ingo Molnar <[email protected]>

CIFS takes/releases f_owner.lock - why? It does not change anything
in the fowner state. Remove this locking.

Signed-off-by: Ingo Molnar <[email protected]>
---
 fs/cifs/file.c |    9 ---------
 1 file changed, 9 deletions(-)

Index: linux/fs/cifs/file.c
===================================================================
--- linux.orig/fs/cifs/file.c
+++ linux/fs/cifs/file.c
@@ -110,7 +110,6 @@ static inline int cifs_open_inode_helper
 			 &pCifsInode->openFileList);
 	}
 	write_unlock(&GlobalSMBSeslock);
-	write_unlock(&file->f_owner.lock);
 	if (pCifsInode->clientCanCacheRead) {
 		/* we have the inode open somewhere else
 		   no need to discard cache data */
@@ -287,7 +286,6 @@ int cifs_open(struct inode *inode, struc
 		goto out;
 	}
 	pCifsFile = cifs_init_private(file->private_data, inode, file, netfid);
-	write_lock(&file->f_owner.lock);
 	write_lock(&GlobalSMBSeslock);
 	list_add(&pCifsFile->tlist, &pTcon->openFileList);
 
@@ -298,7 +296,6 @@ int cifs_open(struct inode *inode, struc
 					    &oplock, buf, full_path, xid);
 	} else {
 		write_unlock(&GlobalSMBSeslock);
-		write_unlock(&file->f_owner.lock);
 	}
 
 	if (oplock & CIFS_CREATE_ACTION) {           
@@ -477,7 +474,6 @@ int cifs_close(struct inode *inode, stru
 	pTcon = cifs_sb->tcon;
 	if (pSMBFile) {
 		pSMBFile->closePend = TRUE;
-		write_lock(&file->f_owner.lock);
 		if (pTcon) {
 			/* no sense reconnecting to close a file that is
 			   already closed */
@@ -492,23 +488,18 @@ int cifs_close(struct inode *inode, stru
 					the struct would be in each open file,
 					but this should give enough time to 
 					clear the socket */
-					write_unlock(&file->f_owner.lock);
 					cERROR(1,("close with pending writes"));
 					msleep(timeout);
-					write_lock(&file->f_owner.lock);
 					timeout *= 4;
 				} 
-				write_unlock(&file->f_owner.lock);
 				rc = CIFSSMBClose(xid, pTcon,
 						  pSMBFile->netfid);
-				write_lock(&file->f_owner.lock);
 			}
 		}
 		write_lock(&GlobalSMBSeslock);
 		list_del(&pSMBFile->flist);
 		list_del(&pSMBFile->tlist);
 		write_unlock(&GlobalSMBSeslock);
-		write_unlock(&file->f_owner.lock);
 		kfree(pSMBFile->search_resume_name);
 		kfree(file->private_data);
 		file->private_data = NULL;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux