Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1787024imm; Thu, 14 Jun 2018 04:00:54 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK6BY6TEA4PU5DxPr5PHfuVb5lKcoWv4c1BeloSlsyi4TQmtkKIWuAlorLgLI5iRnTXHzv7 X-Received: by 2002:a63:7f4e:: with SMTP id p14-v6mr1861539pgn.27.1528974054722; Thu, 14 Jun 2018 04:00:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528974054; cv=none; d=google.com; s=arc-20160816; b=TjhncJHnbyqB5dRCkdzcHOQaBEFHOhcdalmCZYqeUhTWA3ZV3tSlEDf28Lf1BelyCC UB0AU1PdY4MgJDA4erdRfLDZ0zMC5GuAOGQwEkvsN04cxKUWMJ6IBrIbQI4B6FlK6NI9 wi1NXcMp2LZh1MlL4oRG+sR2RJVgNeWdzSIFu0q3Go+TzR4nYogR/3Cd60L0fL9orqSY LN5/IvHuUmKIR2xqZw1PkKMSfeKOpSzg3aDs2Bxg51QngxT4KFBtPZQGvcwAgwztNowM uOB/3dECiZw/I/d8aLKGSmdfCu+z6YgN/4PHDWRcg1iXDRplZyCuyBwR5MmGRTbPWvi+ 4Yug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:arc-authentication-results; bh=WFaYVdHM3NgVHRX7NuM204x2pp4X41nI/KU8LSOiGEw=; b=fdzCLFuCMuhY7/VIUDClv6EQCCX6lmOiaMe1Zr2twjajR809iQ0DON8VRkk1e4a5R2 D0O4hGF69EhnvFUCeGAmX3gBqB4lEOFwzv/PZN6CPYJpJ/leInQgrKKrRubPMixyRuLF A6os4VC6hY2jFIZikUsaa8pINNt8xntovTF5Cppln3EbyoMNjvUNPd9ZiKOqULHe7UuL UqiLdrr+6yvTVXZ2u0Kwi9IbeC298q4FfDHlkUlCtHEzPuicAh6yr71q4lQIENDmA90V GHbqVENu9+N8gZIuKliLnmpJhx9YD2c4iACNzSowFewLQTUprLQ2lU3M9nu7xwEwzY8t 33pA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNtqjj2y; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x70-v6si5040454pfj.347.2018.06.14.04.00.40; Thu, 14 Jun 2018 04:00:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNtqjj2y; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755069AbeFNLAL (ORCPT + 99 others); Thu, 14 Jun 2018 07:00:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:40060 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754906AbeFNLAK (ORCPT ); Thu, 14 Jun 2018 07:00:10 -0400 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DE371208D4; Thu, 14 Jun 2018 11:00:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1528974010; bh=txTqgVC2CboIHthV54PHG96RQBQFm2lzl/gGKPScroo=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=TNtqjj2y5Lh6t2TDRyF5GZ5cZ2Dla1h5XfudCiSZn4FNxt3EcsLFaSrKHF9sedO8V pZUjmSvi6Yuszn/2biWFOXLcDSkZHTAMR2kPjJHEzQl+9AWuRItLWI+T725q6UAzAV oJrvzZy93MV7mTULF1OzWz7DDOECnTHBgR6JFagk= Message-ID: Subject: Re: [PATCH 2/2] fs/lock: show locks taken by processes from another pidns From: Jeff Layton To: Konstantin Khorenko , Kirill Gorkunov , Andrey Vagin , Benjamin Coddington , "J. Bruce Fields" , Alexander Viro Cc: Vasily Averin , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Nikolay Borisov Date: Thu, 14 Jun 2018 07:00:07 -0400 In-Reply-To: <20180608142712.32460-3-khorenko@virtuozzo.com> References: <20180608142712.32460-1-khorenko@virtuozzo.com> <20180608142712.32460-3-khorenko@virtuozzo.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.2 (3.28.2-1.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2018-06-08 at 17:27 +0300, Konstantin Khorenko wrote: > Currently if we face a lock taken by a process invisible in the current > pidns we skip the lock completely, but this > > 1) makes the output not that nice > (root@vz7)/: cat /proc/${PID_A2}/fdinfo/3 > pos: 4 > flags: 02100002 > mnt_id: 257 > lock: (root@vz7)/: > > 2) makes it more difficult to debug issues with leaked flocks > if you get error on lock, but don't see any locks in /proc/$id/fdinfo/$file > > Let's show information about such locks again as previously, but > show zero in the owner pid field. > > After the patch: > =============== > (root@vz7)/:cat /proc/${PID_A2}/fdinfo/3 > pos: 4 > flags: 02100002 > mnt_id: 295 > lock: 1: FLOCK ADVISORY WRITE 0 b6:f8a61:529946 0 EOF > > Fixes: 9d5b86ac13c5 ("fs/locks: Remove fl_nspid and use fs-specific l_pid for remote locks") > Signed-off-by: Konstantin Khorenko > --- > fs/locks.c | 8 +++----- > 1 file changed, 3 insertions(+), 5 deletions(-) > > diff --git a/fs/locks.c b/fs/locks.c > index bfee5b7f2862..e533623e2e99 100644 > --- a/fs/locks.c > +++ b/fs/locks.c > @@ -2633,12 +2633,10 @@ static void lock_get_status(struct seq_file *f, struct file_lock *fl, > > fl_pid = locks_translate_pid(fl, proc_pidns); > /* > - * If there isn't a fl_pid don't display who is waiting on > - * the lock if we are called from locks_show, or if we are > - * called from __show_fd_info - skip lock entirely > + * If lock owner is dead (and pid is freed) or not visible in current > + * pidns, zero is shown as a pid value. Check lock info from > + * init_pid_ns to get saved lock pid value. > */ > - if (fl_pid == 0) > - return; > > if (fl->fl_file != NULL) > inode = locks_inode(fl->fl_file); (cc'ing Nickolay) As Andrey points out, this behavior was originally added in commit d67fd44f697d to address performance issues when there are a lot of locks held by tasks in other namespaces. Will allowing this code to show these again cause a problem there? -- Jeff Layton