From: Vivek Goyal <vgoyal@redhat.com>
To: Amir Goldstein <amir73il@gmail.com>
Cc: overlayfs <linux-unionfs@vger.kernel.org>,
Miklos Szeredi <miklos@szeredi.hu>
Subject: Re: [PATCH v9 00/15] overlayfs: Delayed copy up of data
Date: Mon, 8 Jan 2018 09:13:35 -0500 [thread overview]
Message-ID: <20180108141335.GB9910@redhat.com> (raw)
In-Reply-To: <CAOQ4uxiKAXXNOkY2gvWWkTTuw7TRu9z33az8uVf0Z47uH2LdyA@mail.gmail.com>
On Sat, Jan 06, 2018 at 09:38:07AM +0200, Amir Goldstein wrote:
> On Wed, Nov 29, 2017 at 5:54 PM, Vivek Goyal <vgoyal@redhat.com> wrote:
> > Hi,
> >
> > Please find attached V9 of the patches. Minor changes to take care of
> > Amir's comments. I have also dropped RFC tag. If there are no concerns,
> > then I would like these patches to be included.
> >
>
> Sorry Vivek, just realized some issues:
>
> 1. Considering Miklos' commit
> 438c84c2f0c7 ovl: don't follow redirects if redirect_dir=off
> It is probably not a good idea to allow lookup of metacopy unless
> metacopy=on. Is that already the behavior in V9?
Hi Amir,
Hmm.., no, that's not the behavior in V9. Remember, we wanted to follow
metacopy origin even if metacopy=off. That way a user can mount a
overlayfs with metacopy=off (which was previously mounted as metacopy=on)
and not be broken.
If we follow metacopy only if metacopy=on, then we really need some
mechanism which can atleast warn user that this overlay mount was
mounted with metacopy=on in the past and expect some unexpected results
if mounted with metacopy=off.
Has there been any agreement on what mechanism to use to remember what
features have been turned on existing overlay mount.
>
> 2. An upper layer with metacopy cannot be rotated as middle layer
> becasue non-dir origin is only followed from upper layer.
> This needs to be fixed (follow origin of metacopy from middle layer).
I was thinking about it. I did not have an immediate user of this
functinality to so I did not bother too much about it. I will look
into it and see how to implement it.
>
> 3. You really should write some tests to verify correctness of
> metadata before requesting to include the feature.
Was thinking about this too. Agreed, it is a good idea to write test
cases. Will do.
Vivek
>
> I recommend that you start with a simple xfstest that verify expected
> behavior of a some basic use cases with
> _require_scratch_feature metacopy.
>
> Then, I suggest that you look into extending unionmount-testsuite's
> check_layer() to know about metacopy. Currently it checks that
> objects that were supposed to be copied up (dentry.copied_up())
> are on upper layer (dentry.on_upper()). It shouldn't be too hard to
> extend that with dentry.data_copied_up() and dentry.data_on_upper().
> to verify metacopy correctness.
>
> Alas, there are currently no chmod/chown test cases in
> unionmount-testsuite, so you will also need to add some test cases.
>
> To properly test metacopy in middle layers (once it is implemented)
> you can use ./run --ov=N. Currently, to verify redirect_dir,
> upper layer is rotated on mkdir and rename dir. You will need
> to add some relevant "rotate points" for the metacopy use cases.
> For example, I added rotate and recycle points for testing
> handlinks/index:
> c427e85 - Cycle mount after link rename of non dir
>
> I never got around to the TODO item
> https://github.com/amir73il/overlayfs/wiki/Overlayfs-TODO#testing
> "unionmount-testsuite configure rotate points"
> I envisioned something like:
> ./run --ov=N rotate=mkdir,rename recycle=link
> Instead of the hardcoded rotate/recycle points.
>
> Well, you don't need to implement ALL of that ;-)
>
> Cheers,
> Amir.
next prev parent reply other threads:[~2018-01-08 14:13 UTC|newest]
Thread overview: 48+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-11-29 15:54 [PATCH v9 00/15] overlayfs: Delayed copy up of data Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 01/15] ovl: Do not look for OVL_XATTR_NLINK if index is not there Vivek Goyal
2017-11-29 17:04 ` Amir Goldstein
2017-11-29 15:54 ` [PATCH v9 02/15] ovl: disable redirect_dir and index when no xattr support Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 03/15] ovl: ovl_check_setxattr() get rid of redundant -EOPNOTSUPP check Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 04/15] ovl: Create origin xattr on copy up for all files Vivek Goyal
2018-01-08 10:16 ` Miklos Szeredi
2018-01-08 11:18 ` Amir Goldstein
2018-01-08 15:58 ` Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 05/15] ovl: Provide a mount option metacopy=on/off for metadata copyup Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 06/15] ovl: During copy up, first copy up metadata and then data Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 07/15] ovl: Move the copy up helpers to copy_up.c Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 08/15] ovl: Copy up only metadata during copy up where it makes sense Vivek Goyal
2018-01-08 10:35 ` Miklos Szeredi
2018-01-08 17:03 ` Vivek Goyal
2018-01-09 10:49 ` Miklos Szeredi
2018-01-09 13:26 ` Vivek Goyal
2018-01-09 13:33 ` Amir Goldstein
2018-01-09 20:34 ` Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 09/15] ovl: Add helper ovl_already_copied_up() Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 10/15] ovl: A new xattr OVL_XATTR_METACOPY for file on upper Vivek Goyal
2018-01-08 15:50 ` Miklos Szeredi
2018-01-08 16:17 ` Vivek Goyal
2018-01-08 16:21 ` Miklos Szeredi
2018-01-08 16:25 ` Miklos Szeredi
2017-11-29 15:54 ` [PATCH v9 11/15] ovl: Fix ovl_getattr() to get number of blocks from lower Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 12/15] ovl: Set OVL_UPPERDATA flag during ovl_lookup() Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 13/15] ovl: Do not expose metacopy only upper dentry from d_real() Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 14/15] ovl: Fix encryption/compression status of a metacopy only file Vivek Goyal
2018-01-18 14:24 ` Vivek Goyal
2018-01-18 14:32 ` Amir Goldstein
2018-01-18 14:36 ` Vivek Goyal
2017-11-29 15:54 ` [PATCH v9 15/15] ovl: Enable metadata only feature Vivek Goyal
2018-01-06 7:38 ` [PATCH v9 00/15] overlayfs: Delayed copy up of data Amir Goldstein
2018-01-08 14:13 ` Vivek Goyal [this message]
2018-01-08 14:42 ` Amir Goldstein
2018-01-08 15:44 ` Vivek Goyal
2018-01-10 14:56 ` Vivek Goyal
2018-01-10 15:08 ` Miklos Szeredi
2018-01-10 15:23 ` Vivek Goyal
2018-01-10 15:10 ` Amir Goldstein
2018-01-10 15:27 ` Vivek Goyal
2018-01-10 15:38 ` Miklos Szeredi
2018-01-10 15:47 ` Vivek Goyal
2018-01-10 15:54 ` Amir Goldstein
2018-01-10 16:03 ` Miklos Szeredi
2018-01-10 16:30 ` Vivek Goyal
2018-01-10 17:05 ` Amir Goldstein
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180108141335.GB9910@redhat.com \
--to=vgoyal@redhat.com \
--cc=amir73il@gmail.com \
--cc=linux-unionfs@vger.kernel.org \
--cc=miklos@szeredi.hu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox