From: Trond Myklebust <trondmy@kernel.org>
To: NeilBrown <neil@brown.name>
Cc: Anna Schumaker <anna.schumaker@oracle.com>,
Mike Snitzer <snitzer@kernel.org>,
linux-nfs@vger.kernel.org
Subject: Re: [PATCH 3/3] NFS/localio: nfs_uuid_put() fix the wake up after unlinking the file
Date: Wed, 16 Jul 2025 08:19:27 -0700 [thread overview]
Message-ID: <593804825ffbeb1e7f60224bd208f4401d3e1223.camel@kernel.org> (raw)
In-Reply-To: <175264242036.2234665.5415540733180170207@noble.neil.brown.name>
On Wed, 2025-07-16 at 15:07 +1000, NeilBrown wrote:
> On Wed, 16 Jul 2025, Trond Myklebust wrote:
> > On Wed, 2025-07-16 at 11:31 +1000, NeilBrown wrote:
> > > On Wed, 16 Jul 2025, Trond Myklebust wrote:
> > > > From: Trond Myklebust <trond.myklebust@hammerspace.com>
> > > >
> > > > After setting nfl->nfs_uuid to NULL, dereferences of nfl should
> > > > be
> > > > avoided, since there are no further guarantees that the memory
> > > > is
> > > > still
> > > > allocated.
> > >
> > > nfl is not being dereferenced here. The difference between using
> > > "nfl"
> > > and "&nfl->nfs_uuid" as the event variable is simply some address
> > > arithmetic. As long as both are the same it doesn't matter which
> > > is
> > > used.
> > >
> > >
> > > > Also change the wake_up_var_locked() to be a regular
> > > > wake_up_var(),
> > > > since nfs_close_local_fh() cannot retake the nfs_uuid->lock
> > > > after
> > > > dropping it.
> > >
> > > The point of wake_up_var_locked() is to document why
> > > wake_up_var() is
> > > safe. In general you need a barrier between an assignment and a
> > > wake_up_var(). I would like to eventually remove all
> > > wake_up_var()
> > > calls, replacing them with other calls which document why the
> > > wakeup
> > > is
> > > safe (e.g. store_release_wake_up(), atomic_dec_and_wake_up()).
> > > In
> > > this
> > > case it is safe because both the waker and the waiter hold the
> > > same
> > > spinlock. I would like that documentation to remain.
> >
> >
> > The documentation is wrong. The waiter and waker do not both hold
> > the
> > spin lock.
>
> True. In that case it would make sense to use
> store_release_wake_up()
> in nfs_uuid_put(). Though that doesn't have the right rcu
> annotations....
> I think
> store_release_wake_up(&nfl->nfs_uuid, RCU_INITIALIZER(NULL));
> would be correct.
>
> >
> > nfs_close_local_fh() calls wait_var_event() after it has dropped
> > the
> > nfs_uuid->lock, and it has no guarantee that nfs_uuid still exists
> > after that is the case.
> > In order to guarantee that, it would have to go through the whole
> > rcu_dereference(nfl->nfs_uuid) rhumba from beginning of the call
> > again.
> >
> > The point of the rcu_assign_pointer() is therefore to add the
> > barrier
> > that is missing before the call to wake_up_var().
>
> rcu_assign_pointer()s add a barrier before the assignment.
> wake_up_var()
> requires a barrier after the assignment.
> In fact, when the val is NULL, rcu_assign_pointer() doesn't even
> include
> that barrier - it acts exactly like RCU_INIT_POINTER() - interesting.
>
Fair enough. I have a v2 of this patchset that Mike is testing out, and
that should fix this issue as well as the ones raised by the second
patch. I'll post once he is satisfied.
--
Trond Myklebust
Linux NFS client maintainer, Hammerspace
trondmy@kernel.org, trond.myklebust@hammerspace.com
next prev parent reply other threads:[~2025-07-16 15:19 UTC|newest]
Thread overview: 56+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-05-09 0:46 [PATCH 0/6 v2] nfs_localio: fixes for races and errors from older compilers NeilBrown
2025-05-09 0:46 ` [PATCH 1/6] nfs_localio: use cmpxchg() to install new nfs_file_localio NeilBrown
2025-05-09 0:46 ` [PATCH 2/6] nfs_localio: always hold nfsd net ref with nfsd_file ref NeilBrown
2025-05-09 0:46 ` [PATCH 3/6] nfs_localio: simplify interface to nfsd for getting nfsd_file NeilBrown
2025-05-09 0:46 ` [PATCH 4/6] nfs_localio: duplicate nfs_close_local_fh() NeilBrown
2025-05-09 0:46 ` [PATCH 5/6] nfs_localio: protect race between nfs_uuid_put() and nfs_close_local_fh() NeilBrown
2025-05-09 0:46 ` [PATCH 6/6] nfs_localio: change nfsd_file_put_local() to take a pointer to __rcu pointer NeilBrown
2025-05-09 11:03 ` kernel test robot
2025-07-08 14:20 ` [RFC PATCH for 6.16-rcX] Revert "nfs_localio: change nfsd_file_put_local() to take a pointer to __rcu pointer" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 0/9] NFSD/NFS/LOCALIO: stable fixes and revert 6.16 LOCALIO changes Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 1/9] Revert "NFSD: Clean up kdoc for nfsd_open_local_fh()" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 2/9] Revert "nfs_localio: change nfsd_file_put_local() to take a pointer to __rcu pointer" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 3/9] Revert "nfs_localio: protect race between nfs_uuid_put() and nfs_close_local_fh()" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 4/9] Revert "nfs_localio: duplicate nfs_close_local_fh()" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 5/9] Revert "nfs_localio: simplify interface to nfsd for getting nfsd_file" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 6/9] Revert "nfs_localio: always hold nfsd net ref with nfsd_file ref" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 7/9] Revert "nfs_localio: use cmpxchg() to install new nfs_file_localio" Mike Snitzer
2025-07-14 3:13 ` [for-6.16-final PATCH 8/9] nfs/localio: avoid bouncing LOCALIO if nfs_client_is_local() Mike Snitzer
2025-07-14 4:19 ` NeilBrown
2025-07-14 14:37 ` Mike Snitzer
2025-07-14 12:23 ` Jeff Layton
2025-07-14 3:13 ` [for-6.16-final PATCH 9/9] nfs/localio: add localio_async_probe modparm Mike Snitzer
2025-07-14 4:23 ` NeilBrown
2025-07-14 12:28 ` Jeff Layton
2025-07-14 14:08 ` Mike Snitzer
2025-07-14 3:50 ` [RFC PATCH for 6.16-rcX] Revert "nfs_localio: change nfsd_file_put_local() to take a pointer to __rcu pointer" NeilBrown
2025-07-14 14:45 ` Mike Snitzer
2025-07-15 22:52 ` [PATCH 0/3] Fix localio hangs Trond Myklebust
2025-07-15 22:52 ` [PATCH 1/3] NFS/localio: nfs_close_local_fh() fix check for file closed Trond Myklebust
2025-07-15 22:52 ` [PATCH 2/3] NFS/localio: nfs_uuid_put() fix the wait for file unlink events Trond Myklebust
2025-07-15 22:52 ` [PATCH 3/3] NFS/localio: nfs_uuid_put() fix the wake up after unlinking the file Trond Myklebust
2025-07-16 1:09 ` [PATCH 1/3] NFS/localio: nfs_close_local_fh() fix check for file closed NeilBrown
2025-07-16 1:22 ` [PATCH 2/3] NFS/localio: nfs_uuid_put() fix the wait for file unlink events NeilBrown
2025-07-16 2:29 ` Trond Myklebust
2025-07-16 3:51 ` NeilBrown
2025-07-16 1:31 ` [PATCH 3/3] NFS/localio: nfs_uuid_put() fix the wake up after unlinking the file NeilBrown
2025-07-16 4:17 ` Trond Myklebust
2025-07-16 5:07 ` NeilBrown
2025-07-16 15:19 ` Trond Myklebust [this message]
2025-07-16 15:59 ` [PATCH v2 0/3] Fix localio hangs Trond Myklebust
2025-07-16 15:59 ` [PATCH v2 1/3] NFS/localio: nfs_close_local_fh() fix check for file closed Trond Myklebust
2025-07-16 15:59 ` [PATCH v2 2/3] NFS/localio: nfs_uuid_put() fix races with nfs_open/close_local_fh() Trond Myklebust
2025-07-16 15:59 ` [PATCH v2 3/3] NFS/localio: nfs_uuid_put() fix the wake up after unlinking the file Trond Myklebust
2025-07-16 22:09 ` [PATCH v2 0/3] Fix localio hangs NeilBrown
2025-07-16 23:27 ` Mike Snitzer
2025-07-18 0:18 ` NeilBrown
2025-05-09 16:01 ` [PATCH 0/6 v2] nfs_localio: fixes for races and errors from older compilers Chuck Lever
2025-05-09 21:02 ` Mike Snitzer
2025-05-10 0:16 ` Paul E. McKenney
2025-05-10 2:44 ` NeilBrown
2025-05-10 3:01 ` NeilBrown
2025-05-10 16:02 ` Chuck Lever
2025-05-10 19:57 ` Mike Snitzer
2025-05-16 15:33 ` Chuck Lever
2025-05-18 10:46 ` Pali Rohár
2025-05-19 3:49 ` NeilBrown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=593804825ffbeb1e7f60224bd208f4401d3e1223.camel@kernel.org \
--to=trondmy@kernel.org \
--cc=anna.schumaker@oracle.com \
--cc=linux-nfs@vger.kernel.org \
--cc=neil@brown.name \
--cc=snitzer@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox