public inbox for pbs-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Christian Ebner <c.ebner@proxmox.com>
To: "Proxmox Backup Server development discussion"
	<pbs-devel@lists.proxmox.com>,
	"Fabian Grünbichler" <f.gruenbichler@proxmox.com>
Subject: Re: [pbs-devel] [PATCH proxmox-backup 2/2] api: backup: never hold mutex guard when doing manifest update
Date: Thu, 25 Sep 2025 15:20:24 +0200	[thread overview]
Message-ID: <1c726e06-5faa-4a74-aba0-34cd5d3d18a0@proxmox.com> (raw)
In-Reply-To: <1758804082.vknehzyjxx.astroid@yuna.none>

On 9/25/25 2:46 PM, Fabian Grünbichler wrote:
> On September 24, 2025 4:56 pm, Christian Ebner wrote:
>> An manifest update with s3 backend will call async code, which must
>> be avoided because of possible deadlocks [0]. Therefore, perform all
>> changes on the shared backup state and drop the guard before
>> updating the manifest, which performs the backend specific update.
>> Dropping the guard prematurely is fine, as the state has already been
>> set to be finished, so no other api calls belonging to the same
>> backup task cannot perform further changes anyways.
>>
>> [0] https://docs.rs/tokio/latest/tokio/sync/struct.Mutex.html#which-kind-of-mutex-should-you-use
>>
>> Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
>> ---
>>   src/api2/backup/environment.rs | 12 ++++++++----
>>   1 file changed, 8 insertions(+), 4 deletions(-)
>>
>> diff --git a/src/api2/backup/environment.rs b/src/api2/backup/environment.rs
>> index e535891a4..073027c51 100644
>> --- a/src/api2/backup/environment.rs
>> +++ b/src/api2/backup/environment.rs
>> @@ -682,8 +682,15 @@ impl BackupEnvironment {
>>               }
>>           }
>>   
>> -        // check for valid manifest and store stats
>>           let stats = serde_json::to_value(state.backup_stat)?;
>> +
>> +        // marks the backup state as finished, so no other api calls can modify its state anymore
>> +        state.finished = true;
> 
> marking it as finished (which prevents cleanup in case the client
> connection disappears!)
> 
>> +        // never hold mutex guard during s3 upload due to possible deadlocks
>> +        drop(state);
>> +
>> +        // check for valid manifest and store stats
>>           self.backup_dir
>>               .update_manifest(&self.backend, |manifest| {
>>                   manifest.unprotected["chunk_upload_stats"] = stats;
>> @@ -692,9 +699,6 @@ impl BackupEnvironment {
>>   
>>           self.datastore.try_ensure_sync_level()?;
> 
> before this has been called seems kind of dangerous?

True, since this also allows the client to vanish as you mentioned.

> 
> why not update the manifest up front, then lock the state etc.? or

The manifest update requires the backup stats from the state, but one 
wants to disallow other (incorrect) API calls to mess with the state 
in-between as well (e.g. no more appending of chunks). But you are 
right, this requires a new, inter-mitten state as suggested below. I did 
miss that the finished state allows the client connection to vanish and 
the snapshot still be considered okay.

> 
> lock
> do_some_checks
> mark_as_finishing (new state that needs to be checked in some places)
> drop state
> update_manifest
> lock
> do_checks_again
> mark_as_finished
> 
> ? that way it should be race-free but still safe..

Yes, this sounds better, might encode this using more telling enum 
variants instead of boolean flags for the finished states.

Thanks for review!

> 
>> -        // marks the backup as successful
>> -        state.finished = true;
>> -
>>           Ok(())
>>       }
>>   
>> -- 
>> 2.47.3
>>
>>
>>
>> _______________________________________________
>> pbs-devel mailing list
>> pbs-devel@lists.proxmox.com
>> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
>>
>>
>>
> 
> 
> _______________________________________________
> pbs-devel mailing list
> pbs-devel@lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
> 
> 



_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel

      reply	other threads:[~2025-09-25 13:19 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-24 14:56 [pbs-devel] [RFC proxmox-backup 0/2] fix #6750: fix possible deadlock for s3 backed datastore backups Christian Ebner
2025-09-24 14:56 ` [pbs-devel] [PATCH proxmox-backup 1/2] fix #6750: api: avoid possible deadlock on datastores with s3 backend Christian Ebner
2025-09-25 12:41   ` Fabian Grünbichler
2025-09-25 13:08     ` Christian Ebner
2025-09-24 14:56 ` [pbs-devel] [PATCH proxmox-backup 2/2] api: backup: never hold mutex guard when doing manifest update Christian Ebner
2025-09-25 12:46   ` Fabian Grünbichler
2025-09-25 13:20     ` Christian Ebner [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1c726e06-5faa-4a74-aba0-34cd5d3d18a0@proxmox.com \
    --to=c.ebner@proxmox.com \
    --cc=f.gruenbichler@proxmox.com \
    --cc=pbs-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal