* Locking problem in overlayfs
@ 2014-10-27 14:05 David Howells
2014-10-27 14:19 ` Miklos Szeredi
2014-10-27 14:39 ` David Howells
0 siblings, 2 replies; 5+ messages in thread
From: David Howells @ 2014-10-27 14:05 UTC (permalink / raw)
To: Miklos Szeredi, Al Viro
Cc: dhowells, Linus Torvalds, Linux-Fsdevel, Kernel Mailing List,
linux-unionfs
Using my testsuite, I see the attached moan from lockdep. Unfortunately, it
doesn't cause the testsuite to actually fail, so I'm going to have to manually
try and isolate the failing test.
David
=============================================
[ INFO: possible recursive locking detected ]
3.18.0-rc2-fsdevel+ #910 Tainted: G W
---------------------------------------------
run/2642 is trying to acquire lock:
(&sb->s_type->i_mutex_key#10/1){+.+.+.}, at: [<ffffffff81203d81>] ovl_cleanup_whiteouts+0x29/0xb4
but task is already holding lock:
(&sb->s_type->i_mutex_key#10/1){+.+.+.}, at: [<ffffffff8113abff>] lock_rename+0xb7/0xd7
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(&sb->s_type->i_mutex_key#10/1);
lock(&sb->s_type->i_mutex_key#10/1);
*** DEADLOCK ***
May be due to missing lock nesting notation
7 locks held by run/2642:
#0: (sb_writers#15){.+.+.+}, at: [<ffffffff8114a1e2>] mnt_want_write+0x1f/0x46
#1: (&sb->s_type->i_mutex_key#17/1){+.+.+.}, at: [<ffffffff8113c737>] do_rmdir+0xa9/0x165
#2: (&sb->s_type->i_mutex_key#17){+.+.+.}, at: [<ffffffff8113c0ad>] vfs_rmdir+0x5a/0x115
#3: (sb_writers#8){.+.+.+}, at: [<ffffffff8114a1e2>] mnt_want_write+0x1f/0x46
#4: (&type->s_vfs_rename_key){+.+.+.}, at: [<ffffffff8113ab88>] lock_rename+0x40/0xd7
#5: (&sb->s_type->i_mutex_key#10/1){+.+.+.}, at: [<ffffffff8113abff>] lock_rename+0xb7/0xd7
#6: (&sb->s_type->i_mutex_key#10/2){+.+.+.}, at: [<ffffffff8113ac15>] lock_rename+0xcd/0xd7
stack backtrace:
CPU: 0 PID: 2642 Comm: run Tainted: G W 3.18.0-rc2-fsdevel+ #910
Hardware name: /DG965RY, BIOS MQ96510J.86A.0816.2006.0716.2308 07/16/2006
ffffffff823989e0 ffff880038d8fa68 ffffffff815222f2 0000000000000006
ffffffff823989e0 ffff880038d8fb38 ffffffff810738f4 000000000000000b
ffff880037ebc710 ffff880038d8fb00 ffff880037ebcf58 0000000000000005
Call Trace:
[<ffffffff815222f2>] dump_stack+0x4e/0x68
[<ffffffff810738f4>] __lock_acquire+0x7b5/0x1a17
[<ffffffff8107522d>] lock_acquire+0xa3/0x11d
[<ffffffff81203d81>] ? ovl_cleanup_whiteouts+0x29/0xb4
[<ffffffff8111ff14>] ? kfree+0x17e/0x1ca
[<ffffffff8152580a>] mutex_lock_nested+0x5a/0x304
[<ffffffff81203d81>] ? ovl_cleanup_whiteouts+0x29/0xb4
[<ffffffff81139123>] ? vfs_rename+0x602/0x689
[<ffffffff81203d81>] ovl_cleanup_whiteouts+0x29/0xb4
[<ffffffff81202252>] ovl_clear_empty+0x195/0x216
[<ffffffff81202315>] ovl_check_empty_and_clear+0x42/0x5d
[<ffffffff81056944>] ? creds_are_invalid+0x17/0x4a
[<ffffffff81202a19>] ovl_do_remove+0x189/0x36a
[<ffffffff81202c0b>] ovl_rmdir+0x11/0x13
[<ffffffff8113c0f2>] vfs_rmdir+0x9f/0x115
[<ffffffff8113c784>] do_rmdir+0xf6/0x165
[<ffffffff8100d224>] ? do_audit_syscall_entry+0x4a/0x4c
[<ffffffff8100e43f>] ? syscall_trace_enter_phase2+0x178/0x1c1
[<ffffffff810e5aae>] ? context_tracking_user_exit+0x54/0xce
[<ffffffff8113d007>] SyS_rmdir+0x11/0x13
[<ffffffff81528a09>] tracesys_phase2+0xd4/0xd9
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Locking problem in overlayfs
2014-10-27 14:05 Locking problem in overlayfs David Howells
@ 2014-10-27 14:19 ` Miklos Szeredi
2014-10-27 14:39 ` David Howells
1 sibling, 0 replies; 5+ messages in thread
From: Miklos Szeredi @ 2014-10-27 14:19 UTC (permalink / raw)
To: David Howells
Cc: Al Viro, Linus Torvalds, Linux-Fsdevel, Kernel Mailing List,
linux-unionfs
On Mon, Oct 27, 2014 at 02:05:18PM +0000, David Howells wrote:
> Using my testsuite, I see the attached moan from lockdep. Unfortunately, it
> doesn't cause the testsuite to actually fail, so I'm going to have to manually
> try and isolate the failing test.
>
> David
>
> =============================================
> [ INFO: possible recursive locking detected ]
> 3.18.0-rc2-fsdevel+ #910 Tainted: G W
> ---------------------------------------------
> run/2642 is trying to acquire lock:
> (&sb->s_type->i_mutex_key#10/1){+.+.+.}, at: [<ffffffff81203d81>] ovl_cleanup_whiteouts+0x29/0xb4
>
> but task is already holding lock:
> (&sb->s_type->i_mutex_key#10/1){+.+.+.}, at: [<ffffffff8113abff>] lock_rename+0xb7/0xd7
Uh-oh. We changed nesting late in the cycle and I didn't retest with lockdep.
And it's actually harmless, but AFAICS needs another level of nesting between
I_MUTEX_CHILD and I_MUTEX_NORMAL.
Will do a patch.
Thanks,
Miklos
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Locking problem in overlayfs
2014-10-27 14:05 Locking problem in overlayfs David Howells
2014-10-27 14:19 ` Miklos Szeredi
@ 2014-10-27 14:39 ` David Howells
2014-10-27 14:42 ` Miklos Szeredi
2014-10-27 15:44 ` David Howells
1 sibling, 2 replies; 5+ messages in thread
From: David Howells @ 2014-10-27 14:39 UTC (permalink / raw)
To: Miklos Szeredi
Cc: dhowells, Al Viro, Linus Torvalds, Linux-Fsdevel,
Kernel Mailing List, linux-unionfs
Miklos Szeredi <miklos@szeredi.hu> wrote:
> Uh-oh. We changed nesting late in the cycle and I didn't retest with lockdep.
>
> And it's actually harmless, but AFAICS needs another level of nesting between
> I_MUTEX_CHILD and I_MUTEX_NORMAL.
In an overlay directory that shadows an empty lower directory, say
/mnt/a/empty102, do:
touch /mnt/a/empty102/x
unlink /mnt/a/empty102/x
rmdir /mnt/a/empty102
David
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Locking problem in overlayfs
2014-10-27 14:39 ` David Howells
@ 2014-10-27 14:42 ` Miklos Szeredi
2014-10-27 15:44 ` David Howells
1 sibling, 0 replies; 5+ messages in thread
From: Miklos Szeredi @ 2014-10-27 14:42 UTC (permalink / raw)
To: David Howells
Cc: Al Viro, Linus Torvalds, Linux-Fsdevel, Kernel Mailing List,
linux-unionfs
On Mon, Oct 27, 2014 at 02:39:21PM +0000, David Howells wrote:
> Miklos Szeredi <miklos@szeredi.hu> wrote:
>
> > Uh-oh. We changed nesting late in the cycle and I didn't retest with lockdep.
> >
> > And it's actually harmless, but AFAICS needs another level of nesting between
> > I_MUTEX_CHILD and I_MUTEX_NORMAL.
>
> In an overlay directory that shadows an empty lower directory, say
> /mnt/a/empty102, do:
>
> touch /mnt/a/empty102/x
> unlink /mnt/a/empty102/x
> rmdir /mnt/a/empty102
Yes, following (untested) patch should fix it:
Thanks,
Miklos
diff --git a/fs/namei.c b/fs/namei.c
index 42df664e95e5..922f27068c4c 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -2497,7 +2497,7 @@ struct dentry *lock_rename(struct dentry *p1, struct dentry *p2)
}
mutex_lock_nested(&p1->d_inode->i_mutex, I_MUTEX_PARENT);
- mutex_lock_nested(&p2->d_inode->i_mutex, I_MUTEX_CHILD);
+ mutex_lock_nested(&p2->d_inode->i_mutex, I_MUTEX_PARENT2);
return NULL;
}
EXPORT_SYMBOL(lock_rename);
diff --git a/fs/overlayfs/readdir.c b/fs/overlayfs/readdir.c
index 910553f37aca..de77b5c62d72 100644
--- a/fs/overlayfs/readdir.c
+++ b/fs/overlayfs/readdir.c
@@ -569,7 +569,7 @@ void ovl_cleanup_whiteouts(struct dentry *upper, struct list_head *list)
{
struct ovl_cache_entry *p;
- mutex_lock_nested(&upper->d_inode->i_mutex, I_MUTEX_PARENT);
+ mutex_lock_nested(&upper->d_inode->i_mutex, I_MUTEX_CHILD);
list_for_each_entry(p, list, l_node) {
struct dentry *dentry;
diff --git a/include/linux/fs.h b/include/linux/fs.h
index 4e41a4a331bb..01036262095f 100644
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -639,11 +639,13 @@ static inline int inode_unhashed(struct inode *inode)
* 2: child/target
* 3: xattr
* 4: second non-directory
- * The last is for certain operations (such as rename) which lock two
+ * 5: second parent (when locking independent directories in rename)
+ *
+ * I_MUTEX_NONDIR2 is for certain operations (such as rename) which lock two
* non-directories at once.
*
* The locking order between these classes is
- * parent -> child -> normal -> xattr -> second non-directory
+ * parent[2] -> child -> grandchild -> normal -> xattr -> second non-directory
*/
enum inode_i_mutex_lock_class
{
@@ -651,7 +653,8 @@ enum inode_i_mutex_lock_class
I_MUTEX_PARENT,
I_MUTEX_CHILD,
I_MUTEX_XATTR,
- I_MUTEX_NONDIR2
+ I_MUTEX_NONDIR2,
+ I_MUTEX_PARENT2,
};
void lock_two_nondirectories(struct inode *, struct inode*);
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: Locking problem in overlayfs
2014-10-27 14:39 ` David Howells
2014-10-27 14:42 ` Miklos Szeredi
@ 2014-10-27 15:44 ` David Howells
1 sibling, 0 replies; 5+ messages in thread
From: David Howells @ 2014-10-27 15:44 UTC (permalink / raw)
To: Miklos Szeredi
Cc: dhowells, Al Viro, Linus Torvalds, Linux-Fsdevel,
Kernel Mailing List, linux-unionfs
Miklos Szeredi <miklos@szeredi.hu> wrote:
> Yes, following (untested) patch should fix it:
Tested-by: David Howells <dhowells@redhat.com>
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2014-10-27 15:44 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-10-27 14:05 Locking problem in overlayfs David Howells
2014-10-27 14:19 ` Miklos Szeredi
2014-10-27 14:39 ` David Howells
2014-10-27 14:42 ` Miklos Szeredi
2014-10-27 15:44 ` David Howells
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).