Re: futex question

From: Darren Hart
Date: Mon Oct 05 2009 - 10:11:04 EST


Ingo Molnar wrote:
* Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote:

On Mon, 2009-10-05 at 13:59 +0200, Thomas Gleixner wrote:

Stared at the same place a minute ago :) But still I wonder if it's a good idea to silently release locks and set the state to OWNERDEAD instead of hitting the app programmer with a big clue stick in case the app holds locks when calling execve().
Agreed, I rather like the feedback. With regular exit like things there's just not much we can do to avoid the mess, but here we can actually avoid it, seems a waste not to do so.

Well, exec() has been a 'exit() + boot-strap next process' kind of thing from the get go - with little state carried over into the new task. This has security and robustness reasons as well.

So i think exec() should release all existing state, unless told otherwise. Making it behave differently for robust futexes sounds assymetric to me.

It might make sense though - a 'prevent exec because you are holding locks!' thing. Dunno.

Cc:-ed a few execve() semantics experts who might want to chime in.

If a (buggy) app calls execve() with a (robust) futex still held should we auto-force-release robust locks held, or fail the exec with an error code? I think the forced release is a 'anomalous exit' thing mostly, while calling exec() is not anomalous at all.

My first thought earlier in the thread was that changing the exec behavior to fail if either a robust or pi futex is held would be liable to break existing applications. I can now see the argument that such apps are broken already, and if they aren't hanging, it's simply because they are hacking around it.

I think the semantics work for robust mutexes, if you exec, the exec'ing "thread" is effectively dead, so EOWNERDEAD makes sense.

This doesn't seem to work for PI futexes, unless they are also Robust of course. Here I would expect a userspace application to hang.

The only locking related statements made in the SUS or our Linux man pages is in regards to named semaphores. And here it is only said that the semaphore will be closed like a call to sem_close(). sem_close(3) doesn't specify a return value if the semaphore is held when called.

The closing of message queues and canceling of any pending asynchronous I/O might provide precedent for just unlocking held locks and moving on in the case of PI. EOWNERDEAD still makes more sense to me from a robust point of view.

And from the ignorant-fool department, the docs refer to replacing the "process image" on execve, doesn't that mean that if there are 20 threads in a process and one of them calls execve that all 20 are destroyed? If so, then we are only concerned with PTHREAD_PROCESS_SHARED futexes, since none of the private futexes will have any users after the execve.


--
Darren Hart
IBM Linux Technology Center
Real-Time Linux Team
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/