-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Don't use flock on NFS mounts #2623
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Completely skip file locking when we detect an NFS mount via `statfs`. Closes rust-lang#2615
|
r? @brson |
|
r? @huonw (rust_highfive has picked a reviewer for you, use r? to override) |
| let mut buf: libc::statfs = mem::zeroed(); | ||
| let r = libc::statfs(path.as_ptr(), &mut buf); | ||
|
|
||
| r == 0 && buf.f_type == libc::NFS_SUPER_MAGIC |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After googling this I'm even more curious. Just magic stuff.
|
@bors r+ |
|
📌 Commit b0ecb90 has been approved by |
Don't use flock on NFS mounts Completely skip file locking when we detect an NFS mount via `statfs`. Closes #2615
|
Do you know what happens when using NFS on other Oses? |
|
I have no idea :( |
|
☀️ Test successful - cargo-cross-linux, cargo-linux-32, cargo-linux-64, cargo-mac-32, cargo-mac-64, cargo-win-gnu-32, cargo-win-gnu-64, cargo-win-msvc-32, cargo-win-msvc-64 |
|
Here is an examples of lock file error on an nfs file system on OS X. |
|
@Kerosene2000 thanks for the report! I'll send a PR soon |
|
(PR is #2720) |
This PR adds fine grain locking for the build cache using build unit level locking. I'd recommend reading the design details in this description and then reviewing commit by commit. Part of #4282 Previous attempt: #16089 ## Design decisions / rational - Still hold `build-dir/<profile>/.cargo-lock` - to protect against `cargo clean` (exclusive) - changed from exclusive to shared for builds - Using build unit level locking with a single lock per build unit. - Before checking fingerprint freshness we take a shared lock. This prevents reading a fingerprint while another build is active. - For units that are dirty, when the job server queues the job we take an exclusive lock to prevent others from reading while we compile. - This is done by dropping the shared lock and then acquiring an exclusive lock, rather than downgrading the lock, to protect against deadlock, see #16155 (comment) - After the unit's compilation is complete, we downgrade back to a shared lock allowing other readers. - All locks are released at the end of the entire build process - artifact-dir was handled in #16307. For the rational for this design see the discussion [#t-cargo > Build cache and locking design @ 💬](https://rust-lang.zulipchat.com/#narrow/channel/246057-t-cargo/topic/Build.20cache.20and.20locking.20design/near/561677181) ## Open Questions - [ ] Do we need rlimit checks and dynamic rlimits? #16155 (comment) - [ ] Proper handling of blocking message (#16155 (comment)) - Update Dec 18 2025: With updated impl, we now get the blocking message when taking the initial shared lock, but we get no message when taking the exclusive lock right before compiling. - [ ] Reduce parallelism when blocking - [x] How do we want to handle locking on the artifact directory? - We could simply continue using coarse grain locking, locking and unlocking when files are uplifted. - One downside of locking/unlocking multiple times per invocation is that artifact-dir is touch many times across the compilation process (for example, there is a pre-rustc [clean up step](https://github.com/rust-lang/cargo/blob/master/src/cargo/core/compiler/mod.rs#L402) Also we need to take into account other commands like `cargo doc` - Another option would to only take a lock on the artifact-dir for commands that we know will uplift files. (e.g. `cargo check` would not take a lock artifact-dir but `cargo build` would). This would mean that 2 `cargo build` invocations would not run in parallel because one of them would hold the lock artifact-dir (blocking the other). This might actually be ideal to avoid 2 instances fighting over the CPU while recompiling the same crates. - Solved by #16307 - [ ] What should our testing strategy for locking be? - My testing strategy thus far has been to run cargo on dummy projects to verify the locking. - For the max file descriptor testing, I have been using the Zed codebase as a testbed as it has over 1,500 build units which is more than the default ulimit on my linux system. (I am happy to test this on other large codebase that we think would be good to verify against) - It’s not immediately obvious to me as to how to create repeatable unit tests for this or what those tests should be testing for. - For performance testing, I have been using hyperfine to benchmark builds with and without `-Zbuild-dir-new-layout`. With the current implementation I am not seeing any perf regression on linux but I have yet to test on windows/macos. --- <details><summary>Original Design</summary> - Using build unit level locking instead of a temporary working directory. - After experimenting with multiple approaches, I am currently leaning to towards build unit level locking. - The working directory approach introduces a fair bit of uplifting complexity and I further along I pushed my prototype the more I ran into unexpected issues. - mtime changes in fingerprints due to uplifting/downlifting order - tests/benches need to be ran before being uplifted OR uplifted and locked during execution which leads to more locking design needed. (also running pre-uplift introduces other potential side effects like the path displayed to the user being deleted as its temporary) - The trade off here is that with build unit level locks, we need a more advanced locking mechanism and we will have more open locks at once. - The reason I think this is a worth while trade of is that the locking complexity can largely be contained to single module where the uplifting complexity would be spread through out the cargo codebase anywhere we do uplifting. The increased locks count while unavoidable can be mitigated (see below for more details) - Risk of too many locks (file descriptors) - On Linux 1024 is a fairly common default soft limit. Windows is even lower at 256. - Having 2 locks per build unit makes is possible to hit with a moderate amount of dependencies - There are a few mitigations I could think of for this problem (that are included in this PR) - Increasing the file descriptor limits of based on the number of build units (if hard limit is high enough) - Share file descriptors for shared locks across jobs (within a single process) using a virtual lock - This could be implemented using reference counting. - Falling back to coarse grain locking if some heuristic is not met ### Implementation details - We have a stateful lock per build unit made up of multiple file locks `primary.lock` and `secondary.lock` (see [`locking.rs`](http://locking.rs) module docs for more details on the states) - This is needed to enable pipelined builds - We fall back to coarse grain locking if fine grain locking is determined to be unsafe (see `determine_locking_mode()`) - Fine grain locking continues to take the existing `.cargo-lock` lock as RO shared to continue working with older cargo versions while allowing multiple newer cargo instances to run in parallel. - Locking is disabled on network filesystems. (keeping existing behavior from #2623) - `cargo clean` continues to use coarse grain locking for simplicity. - File descriptors - I added functionality to increase the file descriptors if cargo detects that there will not be enough based on the number of build units in the `UnitGraph`. - If we aren’t able to increase a threshold (currently `number of build units * 10`) we automatically fallback to coarse grain locking and display a warning to the user. - I picked 10 times the number of build units a conservative estimate for now. I think lowering this number may be reasonable. - While testing, I was seeing a peak of ~3,200 open file descriptors while compiling Zed. This is approximately x2 the number of build units. - Without the `RcFileLock` I was seeing peaks of ~12,000 open fds which I felt was quiet high even for a large project like Zed. - We use a global `FileLockInterner` that holds on to the file descriptors (`RcFileLock`) until the end of the process. (We could potentially add it to `JobState` if preferred, it would just be a bit more plumbing) See #16155 (comment) for proposal to transition away from this to the current scheme </details>
Completely skip file locking when we detect an NFS mount via
statfs.Closes #2615