public inbox for linux-unionfs@vger.kernel.org
 help / color / mirror / Atom feed
* [RFC] ovl: System-wide unique st_dev
@ 2017-06-11 13:44 Chandan Rajendra
  2017-06-11 15:33 ` Amir Goldstein
  0 siblings, 1 reply; 3+ messages in thread
From: Chandan Rajendra @ 2017-06-11 13:44 UTC (permalink / raw)
  To: linux-unionfs; +Cc: Chandan Rajendra, miklos, amir73il

The following sequence of commands causes a lowerdir file and an
overlay file to have the same values for st_ino/st_dev,

$ xfs_io -f -c "pwrite 0 4k" /mnt/lowerdir/testfile -c sync
$ xfs_io -a -c "pwrite 4k 4k" /mnt/ovl/testfile # Copy-up occurs here

This commit solves the bug by reporting pseudo device numbers for files
on lowerdir.

Signed-off-by: Chandan Rajendra <chandan@linux.vnet.ibm.com>
---
 fs/overlayfs/inode.c     | 23 ++++++++++++++++++++---
 fs/overlayfs/ovl_entry.h |  8 +++++++-
 fs/overlayfs/super.c     | 33 +++++++++++++++++++++++++--------
 3 files changed, 52 insertions(+), 12 deletions(-)

diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c
index 5f285c1..154c87892 100644
--- a/fs/overlayfs/inode.c
+++ b/fs/overlayfs/inode.c
@@ -13,6 +13,19 @@
 #include <linux/xattr.h>
 #include <linux/posix_acl.h>
 #include "overlayfs.h"
+#include "ovl_entry.h"
+
+static dev_t get_lowerdir_pseudo_dev(struct ovl_fs *ufs, dev_t dev)
+{
+	int i;
+
+	for (i = 0; i < ufs->numlower; i++) {
+		if (ufs->lower_mnt[i].real_dev == dev)
+			return ufs->lower_mnt[i].pseudo_dev;
+	}
+
+	BUG();
+}
 
 int ovl_setattr(struct dentry *dentry, struct iattr *attr)
 {
@@ -61,6 +74,7 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
 		u32 request_mask, unsigned int flags)
 {
 	struct dentry *dentry = path->dentry;
+	struct ovl_fs *ufs;
 	enum ovl_path_type type;
 	struct path realpath;
 	const struct cred *old_cred;
@@ -103,10 +117,13 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
 			if (is_dir || lowerstat.nlink == 1)
 				stat->ino = lowerstat.ino;
 
-			if (samefs)
+			if (samefs) {
 				WARN_ON_ONCE(stat->dev != lowerstat.dev);
-			else
-				stat->dev = lowerstat.dev;
+			} else {
+				ufs = dentry->d_sb->s_fs_info;
+				stat->dev = get_lowerdir_pseudo_dev(ufs,
+								lowerstat.dev);
+			}
 		}
 		if (samefs)
 			stat->dev = dentry->d_sb->s_dev;
diff --git a/fs/overlayfs/ovl_entry.h b/fs/overlayfs/ovl_entry.h
index 34bc4a9..92aebe9 100644
--- a/fs/overlayfs/ovl_entry.h
+++ b/fs/overlayfs/ovl_entry.h
@@ -16,11 +16,17 @@ struct ovl_config {
 	bool redirect_dir;
 };
 
+struct ovl_lower_mnt {
+	struct vfsmount *mnt;
+	dev_t real_dev;
+	dev_t pseudo_dev;
+};
+
 /* private information held for overlayfs's superblock */
 struct ovl_fs {
 	struct vfsmount *upper_mnt;
 	unsigned numlower;
-	struct vfsmount **lower_mnt;
+	struct ovl_lower_mnt *lower_mnt;
 	struct dentry *workdir;
 	long namelen;
 	/* pathnames of lower and upper dirs, for show_options */
diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c
index 4882ffb..c922a92 100644
--- a/fs/overlayfs/super.c
+++ b/fs/overlayfs/super.c
@@ -172,8 +172,10 @@ static void ovl_put_super(struct super_block *sb)
 
 	dput(ufs->workdir);
 	mntput(ufs->upper_mnt);
-	for (i = 0; i < ufs->numlower; i++)
-		mntput(ufs->lower_mnt[i]);
+	for (i = 0; i < ufs->numlower; i++) {
+		mntput(ufs->lower_mnt[i].mnt);
+		free_anon_bdev(ufs->lower_mnt[i].pseudo_dev);
+	}
 	kfree(ufs->lower_mnt);
 
 	kfree(ufs->config.lowerdir);
@@ -908,15 +910,25 @@ static int ovl_fill_super(struct super_block *sb, void *data, int silent)
 	}
 
 	err = -ENOMEM;
-	ufs->lower_mnt = kcalloc(numlower, sizeof(struct vfsmount *), GFP_KERNEL);
+	ufs->lower_mnt = kcalloc(numlower, sizeof(struct ovl_lower_mnt),
+				GFP_KERNEL);
 	if (ufs->lower_mnt == NULL)
 		goto out_put_workdir;
 	for (i = 0; i < numlower; i++) {
-		struct vfsmount *mnt = clone_private_mount(&stack[i]);
+		struct vfsmount *mnt;
+		dev_t dev;
 
+		err = get_anon_bdev(&dev);
+		if (err) {
+			pr_err("overlayfs: failed to get anonymous bdev for lowerpath\n");
+			goto out_put_lower_mnt;
+		}
+
+		mnt = clone_private_mount(&stack[i]);
 		err = PTR_ERR(mnt);
 		if (IS_ERR(mnt)) {
 			pr_err("overlayfs: failed to clone lowerpath\n");
+			free_anon_bdev(dev);
 			goto out_put_lower_mnt;
 		}
 		/*
@@ -925,7 +937,9 @@ static int ovl_fill_super(struct super_block *sb, void *data, int silent)
 		 */
 		mnt->mnt_flags |= MNT_READONLY | MNT_NOATIME;
 
-		ufs->lower_mnt[ufs->numlower] = mnt;
+		ufs->lower_mnt[ufs->numlower].mnt = mnt;
+		ufs->lower_mnt[ufs->numlower].real_dev = mnt->mnt_sb->s_dev;
+		ufs->lower_mnt[ufs->numlower].pseudo_dev = dev;
 		ufs->numlower++;
 
 		/* Check if all lower layers are on same sb */
@@ -980,7 +994,7 @@ static int ovl_fill_super(struct super_block *sb, void *data, int silent)
 	}
 	for (i = 0; i < numlower; i++) {
 		oe->lowerstack[i].dentry = stack[i].dentry;
-		oe->lowerstack[i].mnt = ufs->lower_mnt[i];
+		oe->lowerstack[i].mnt = ufs->lower_mnt[i].mnt;
 	}
 	kfree(stack);
 
@@ -999,8 +1013,11 @@ static int ovl_fill_super(struct super_block *sb, void *data, int silent)
 out_put_cred:
 	put_cred(ufs->creator_cred);
 out_put_lower_mnt:
-	for (i = 0; i < ufs->numlower; i++)
-		mntput(ufs->lower_mnt[i]);
+	for (i = 0; i < ufs->numlower; i++) {
+		if (ufs->lower_mnt[i].mnt)
+			free_anon_bdev(ufs->lower_mnt[i].pseudo_dev);
+		mntput(ufs->lower_mnt[i].mnt);
+	}
 	kfree(ufs->lower_mnt);
 out_put_workdir:
 	dput(ufs->workdir);
-- 
2.9.4

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [RFC] ovl: System-wide unique st_dev
  2017-06-11 13:44 [RFC] ovl: System-wide unique st_dev Chandan Rajendra
@ 2017-06-11 15:33 ` Amir Goldstein
  2017-06-12  5:10   ` Chandan Rajendra
  0 siblings, 1 reply; 3+ messages in thread
From: Amir Goldstein @ 2017-06-11 15:33 UTC (permalink / raw)
  To: Chandan Rajendra; +Cc: overlayfs, Miklos Szeredi

On Sun, Jun 11, 2017 at 4:44 PM, Chandan Rajendra
<chandan@linux.vnet.ibm.com> wrote:
> The following sequence of commands causes a lowerdir file and an
> overlay file to have the same values for st_ino/st_dev,

You meant different st_dev values...

All in all, looks very good to me. Nice work!
See some nits and suggestions below.

Did you get any progress with tests yet?

>
> $ xfs_io -f -c "pwrite 0 4k" /mnt/lowerdir/testfile -c sync
> $ xfs_io -a -c "pwrite 4k 4k" /mnt/ovl/testfile # Copy-up occurs here

Honestly, I think you could find a simpler example and also one that
demonstrates
the bug, something like:

$ echo 123 > /mnt/lowerdir/testfile
$ echo 456 > /mnt/ovl/testfile
$ cat /mnt/lowerdir/testfile /mnt/ovl/testfile
123
456
$ diff /mnt/lowerdir/testfile /mnt/ovl/testfile && echo "123  == 456 ???"

But that diff example will only demonstrate a bug on top of my branch,
and I don't think that is the right order for this patch. it should
come *before*
the relax samefs patch, so maybe just drop the example?

>
> This commit solves the bug by reporting pseudo device numbers for files
> on lowerdir.
>
> Signed-off-by: Chandan Rajendra <chandan@linux.vnet.ibm.com>
> ---
>  fs/overlayfs/inode.c     | 23 ++++++++++++++++++++---
>  fs/overlayfs/ovl_entry.h |  8 +++++++-
>  fs/overlayfs/super.c     | 33 +++++++++++++++++++++++++--------
>  3 files changed, 52 insertions(+), 12 deletions(-)
>
> diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c
> index 5f285c1..154c87892 100644
> --- a/fs/overlayfs/inode.c
> +++ b/fs/overlayfs/inode.c
> @@ -13,6 +13,19 @@
>  #include <linux/xattr.h>
>  #include <linux/posix_acl.h>
>  #include "overlayfs.h"
> +#include "ovl_entry.h"
> +
> +static dev_t get_lowerdir_pseudo_dev(struct ovl_fs *ufs, dev_t dev)

I suggest to call this ovl_get_pseudo_dev (see below why) and
I suggest to check if dev == upper real dev and return the overlay dev.

> +{
> +       int i;
> +
> +       for (i = 0; i < ufs->numlower; i++) {
> +               if (ufs->lower_mnt[i].real_dev == dev)
> +                       return ufs->lower_mnt[i].pseudo_dev;
> +       }
> +
> +       BUG();

No need to BUG() here WARN() and return dev will not cause any
catastrophic bug. overlay will just behave as it does today..

> +}
>
>  int ovl_setattr(struct dentry *dentry, struct iattr *attr)
>  {
> @@ -61,6 +74,7 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
>                 u32 request_mask, unsigned int flags)
>  {
>         struct dentry *dentry = path->dentry;
> +       struct ovl_fs *ufs;

I prefer ofs. The use of ufs is mostly when the info is not yet attached to sb.
Not sure if this was intentional, but its convenient.

>         enum ovl_path_type type;
>         struct path realpath;
>         const struct cred *old_cred;
> @@ -103,10 +117,13 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
>                         if (is_dir || lowerstat.nlink == 1)
>                                 stat->ino = lowerstat.ino;
>
> -                       if (samefs)
> +                       if (samefs) {
>                                 WARN_ON_ONCE(stat->dev != lowerstat.dev);
> -                       else
> -                               stat->dev = lowerstat.dev;
> +                       } else {
> +                               ufs = dentry->d_sb->s_fs_info;
> +                               stat->dev = get_lowerdir_pseudo_dev(ufs,
> +                                                               lowerstat.dev);

if (!is_dir && !samefs) { stat->dev = ovl_get_pseudo_dev ... }
should be outside the OVL_TYPE_ORIGIN condition, because
it also applies to pure lower and pure upper inodes (not copied up).

For pure upper it is just nicer and du -xs will work better on
pure upper dirs.
For lower, it is a must, because overlay inode needs to preserve
st_dev across copy up, so it needs to have the pseudo lower st_dev
before that lower becomes the origin of a copy up.


> +                       }
>                 }
>                 if (samefs)
>                         stat->dev = dentry->d_sb->s_dev;

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [RFC] ovl: System-wide unique st_dev
  2017-06-11 15:33 ` Amir Goldstein
@ 2017-06-12  5:10   ` Chandan Rajendra
  0 siblings, 0 replies; 3+ messages in thread
From: Chandan Rajendra @ 2017-06-12  5:10 UTC (permalink / raw)
  To: Amir Goldstein; +Cc: overlayfs, Miklos Szeredi

On Sunday, June 11, 2017 9:03:54 PM IST Amir Goldstein wrote:
> On Sun, Jun 11, 2017 at 4:44 PM, Chandan Rajendra
> <chandan@linux.vnet.ibm.com> wrote:
> > The following sequence of commands causes a lowerdir file and an
> > overlay file to have the same values for st_ino/st_dev,
> 
> You meant different st_dev values...
> 
> All in all, looks very good to me. Nice work!
> See some nits and suggestions below.
> 
> Did you get any progress with tests yet?

Thanks for the review comments.

I spent some time to read and figure out the workings of 
unionmount-testsuite framework. I should be able to post the
the new test along with the non-RFC version of this patch.

> 
> >
> > $ xfs_io -f -c "pwrite 0 4k" /mnt/lowerdir/testfile -c sync
> > $ xfs_io -a -c "pwrite 4k 4k" /mnt/ovl/testfile # Copy-up occurs here
> 
> Honestly, I think you could find a simpler example and also one that
> demonstrates
> the bug, something like:
> 
> $ echo 123 > /mnt/lowerdir/testfile
> $ echo 456 > /mnt/ovl/testfile
> $ cat /mnt/lowerdir/testfile /mnt/ovl/testfile
> 123
> 456
> $ diff /mnt/lowerdir/testfile /mnt/ovl/testfile && echo "123  == 456 ???"
> 
> But that diff example will only demonstrate a bug on top of my branch,
> and I don't think that is the right order for this patch. it should
> come *before*
> the relax samefs patch, so maybe just drop the example?

Ok. Understood. I will do that.

> 
> >
> > This commit solves the bug by reporting pseudo device numbers for files
> > on lowerdir.
> >
> > Signed-off-by: Chandan Rajendra <chandan@linux.vnet.ibm.com>
> > ---
> >  fs/overlayfs/inode.c     | 23 ++++++++++++++++++++---
> >  fs/overlayfs/ovl_entry.h |  8 +++++++-
> >  fs/overlayfs/super.c     | 33 +++++++++++++++++++++++++--------
> >  3 files changed, 52 insertions(+), 12 deletions(-)
> >
> > diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c
> > index 5f285c1..154c87892 100644
> > --- a/fs/overlayfs/inode.c
> > +++ b/fs/overlayfs/inode.c
> > @@ -13,6 +13,19 @@
> >  #include <linux/xattr.h>
> >  #include <linux/posix_acl.h>
> >  #include "overlayfs.h"
> > +#include "ovl_entry.h"
> > +
> > +static dev_t get_lowerdir_pseudo_dev(struct ovl_fs *ufs, dev_t dev)
> 
> I suggest to call this ovl_get_pseudo_dev (see below why) and
> I suggest to check if dev == upper real dev and return the overlay dev.

Ok. I agree.
> 
> > +{
> > +       int i;
> > +
> > +       for (i = 0; i < ufs->numlower; i++) {
> > +               if (ufs->lower_mnt[i].real_dev == dev)
> > +                       return ufs->lower_mnt[i].pseudo_dev;
> > +       }
> > +
> > +       BUG();
> 
> No need to BUG() here WARN() and return dev will not cause any
> catastrophic bug. overlay will just behave as it does today..

I agree.
> 
> > +}
> >
> >  int ovl_setattr(struct dentry *dentry, struct iattr *attr)
> >  {
> > @@ -61,6 +74,7 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
> >                 u32 request_mask, unsigned int flags)
> >  {
> >         struct dentry *dentry = path->dentry;
> > +       struct ovl_fs *ufs;
> 
> I prefer ofs. The use of ufs is mostly when the info is not yet attached to sb.
> Not sure if this was intentional, but its convenient.

I will fix this.
> 
> >         enum ovl_path_type type;
> >         struct path realpath;
> >         const struct cred *old_cred;
> > @@ -103,10 +117,13 @@ int ovl_getattr(const struct path *path, struct kstat *stat,
> >                         if (is_dir || lowerstat.nlink == 1)
> >                                 stat->ino = lowerstat.ino;
> >
> > -                       if (samefs)
> > +                       if (samefs) {
> >                                 WARN_ON_ONCE(stat->dev != lowerstat.dev);
> > -                       else
> > -                               stat->dev = lowerstat.dev;
> > +                       } else {
> > +                               ufs = dentry->d_sb->s_fs_info;
> > +                               stat->dev = get_lowerdir_pseudo_dev(ufs,
> > +                                                               lowerstat.dev);
> 
> if (!is_dir && !samefs) { stat->dev = ovl_get_pseudo_dev ... }
> should be outside the OVL_TYPE_ORIGIN condition, because
> it also applies to pure lower and pure upper inodes (not copied up).
> 
> For pure upper it is just nicer and du -xs will work better on
> pure upper dirs.
> For lower, it is a must, because overlay inode needs to preserve
> st_dev across copy up, so it needs to have the pseudo lower st_dev
> before that lower becomes the origin of a copy up.

I will fix this.
> 
> 
> > +                       }
> >                 }
> >                 if (samefs)
> >                         stat->dev = dentry->d_sb->s_dev;
> 
> 


-- 
chandan

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-06-12  5:10 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-06-11 13:44 [RFC] ovl: System-wide unique st_dev Chandan Rajendra
2017-06-11 15:33 ` Amir Goldstein
2017-06-12  5:10   ` Chandan Rajendra

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox