From: Amir Goldstein <amir73il@gmail.com>
To: Vivek Goyal <vgoyal@redhat.com>
Cc: overlayfs <linux-unionfs@vger.kernel.org>,
Miklos Szeredi <miklos@szeredi.hu>
Subject: Re: [PATCH 11/13] ovl: Introduce read/write barriers around metacopy flag update
Date: Thu, 26 Oct 2017 09:34:15 +0300 [thread overview]
Message-ID: <CAOQ4uxio4ZESiJ35dAimnFW_YcdEpmRCPqMPDB5i2AWvRg2WOA@mail.gmail.com> (raw)
In-Reply-To: <1508958575-14086-12-git-send-email-vgoyal@redhat.com>
On Wed, Oct 25, 2017 at 10:09 PM, Vivek Goyal <vgoyal@redhat.com> wrote:
> If a file is copied up metadata only and later when same file is opened
> for WRITE, then data copy up takes place. We copy up data, remove METACOPY
> xattr and then set the UPPERDATA flag in ovl_entry->flags. While all
> these operations happen with oi->lock held, read side of oi->flags is
> lockless. That is another thread on another cpu can check if UPPERDATA
> flag is set or not.
>
> So this gives us an ordering requirement w.r.t UPPERDATA flag. That is, if
> another cpu sees UPPERDATA flag set, then it should be guaranteed that
> effects of data copy up and remove xattr operations are also visible.
>
> For example.
>
> CPU1 CPU2
> ovl_copy_up_flags() acquire(oi->lock)
> ovl_dentry_needs_data_copy_up() ovl_copy_up_data()
> ovl_test_flag(OVL_UPPERDATA) vfs_removexattr()
> ovl_set_flag(OVL_UPPERDATA)
> release(oi->lock)
>
> Say CPU2 is copying up data and in the end sets UPPERDATA flag. But if
> CPU1 perceives the effects of setting UPPERDATA flag but not effects of
> preceeding operations, that would be a problem.
Why would that be a problem?
What can go wrong?
If you try to answer the question instead of referring to a vague "problem"
you will see that only the ovl_d_real() code path can be a problem and maybe
(I did not check) ovl_getattr. Please change your example above to ovl_d_real()
code path of CPU1
>
> Hence this patch introduces smp_wmb() on setting UPPERDATA flag operation
> and smp_rmb() on UPPERDATA flag test operation.
>
> May be some other lock or barrier is already covering it. But I am not sure
> what that is and is it obvious enough that we will not break it in future.
>
> So hence trying to be safe here and introducing barriers explicitly for
> UPPERDATA flag/bit.
>
> Signed-off-by: Vivek Goyal <vgoyal@redhat.com>
> ---
> fs/overlayfs/copy_up.c | 7 ++++++-
> fs/overlayfs/super.c | 13 ++++++++++---
> fs/overlayfs/util.c | 11 ++++++++++-
> 3 files changed, 26 insertions(+), 5 deletions(-)
>
> diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c
> index a6cda02..4876ae4 100644
> --- a/fs/overlayfs/copy_up.c
> +++ b/fs/overlayfs/copy_up.c
> @@ -466,7 +466,12 @@ static int ovl_copy_up_meta_inode_data(struct ovl_copy_up_ctx *c)
> err= vfs_removexattr(upperpath.dentry, OVL_XATTR_METACOPY);
> if (err)
> return err;
> -
> + /*
> + * Pairs with smp_rmb() in ovl_dentry_needs_data_copy_up(). Make sure
Nope. only pairs with smp_rmpb() in ovl_d_real() (or in a new helper
you need to create)
> + * if OVL_UPPERDATA flag is visible, then all the write operations
> + * before it are visible as well.
> + */
> + smp_wmb();
> ovl_set_flag(OVL_UPPERDATA, d_inode(c->dentry));
> return err;
> }
> diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c
> index 4cf1f98..e97dccb 100644
> --- a/fs/overlayfs/super.c
> +++ b/fs/overlayfs/super.c
> @@ -102,9 +102,16 @@ static struct dentry *ovl_d_real(struct dentry *dentry,
> if (err)
> return ERR_PTR(err);
>
> - if (ovl_dentry_check_upperdata(dentry) &&
> - !ovl_test_flag(OVL_UPPERDATA, d_inode(dentry)))
> - goto lower;
> + if (ovl_dentry_check_upperdata(dentry)) {
> + if (!ovl_test_flag(OVL_UPPERDATA,
> + d_inode(dentry)))
> + goto lower;
> + /*
> + * Pairs with smp_wmb in
> + * ovl_copy_up_meta_inode_data()
> + */
> + smp_rmb();
> + }
> }
> return real;
> }
> diff --git a/fs/overlayfs/util.c b/fs/overlayfs/util.c
> index ef720a9..d0f3bf7 100644
> --- a/fs/overlayfs/util.c
> +++ b/fs/overlayfs/util.c
> @@ -238,6 +238,8 @@ bool ovl_dentry_check_upperdata(struct dentry *dentry) {
> }
>
> bool ovl_dentry_needs_data_copy_up(struct dentry *dentry, int flags) {
> + bool upperdata;
> +
> if (!ovl_dentry_check_upperdata(dentry))
> return false;
>
> @@ -250,7 +252,14 @@ bool ovl_dentry_needs_data_copy_up(struct dentry *dentry, int flags) {
> if (!(OPEN_FMODE(flags) & FMODE_WRITE))
> return false;
>
> - if (likely(ovl_test_flag(OVL_UPPERDATA, d_inode(dentry))))
> + upperdata = ovl_test_flag(OVL_UPPERDATA, d_inode(dentry));
> + /*
> + * Pairs with smp_wmb() in ovl_copy_up_meta_inode_data(). Make sure
> + * if setting of OVL_UPPERDATA is visible, then effects of writes
> + * before that are visible too.
> + */
> + smp_rmb();
> + if (upperdata)
Nope. smp_rmb() is not needed here, because most of the places that
use this helper
will take a lock and call it again under lock.
You may need an explicit smp_rmb() also in getattr() though, so you
can create a new
helper that does exactly what the hunk in ovl_d_real does and reuse
the helper in ovl_getattr
> return false;
>
> return true;
> --
> 2.5.5
>
next prev parent reply other threads:[~2017-10-26 6:34 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-25 19:09 [RFC PATCH 00/13][V5] overlayfs: Delayed copy up of data Vivek Goyal
2017-10-25 19:09 ` [PATCH 01/13] ovl: Put upperdentry if ovl_check_origin() fails Vivek Goyal
2017-10-25 20:08 ` Amir Goldstein
2017-10-25 19:09 ` [PATCH 02/13] ovl: Create origin xattr on copy up for all files Vivek Goyal
2017-10-26 5:31 ` Amir Goldstein
2017-10-26 12:53 ` Vivek Goyal
2017-10-25 19:09 ` [PATCH 03/13] ovl: ovl_check_setxattr() get rid of redundant -EOPNOTSUPP check Vivek Goyal
2017-10-25 19:09 ` [PATCH 04/13] ovl: Provide a mount option metacopy=on/off for metadata copyup Vivek Goyal
2017-10-26 5:39 ` Amir Goldstein
2017-10-26 13:15 ` Vivek Goyal
2017-10-26 13:57 ` Amir Goldstein
2017-10-25 19:09 ` [PATCH 05/13] ovl: During copy up, first copy up metadata and then data Vivek Goyal
2017-10-26 5:42 ` Amir Goldstein
2017-10-26 13:19 ` Vivek Goyal
2017-10-25 19:09 ` [PATCH 06/13] ovl: Copy up only metadata during copy up where it makes sense Vivek Goyal
2017-10-25 19:09 ` [PATCH 07/13] ovl: A new xattr OVL_XATTR_METACOPY for file on upper Vivek Goyal
2017-10-26 6:04 ` Amir Goldstein
2017-10-26 13:53 ` Vivek Goyal
2017-10-26 14:14 ` Amir Goldstein
2017-10-26 14:34 ` Vivek Goyal
2017-10-26 16:11 ` Amir Goldstein
2017-10-27 4:28 ` Amir Goldstein
2017-10-25 19:09 ` [PATCH 08/13] ovl: Fix ovl_getattr() to get number of blocks from lower Vivek Goyal
2017-10-26 6:12 ` Amir Goldstein
2017-10-25 19:09 ` [PATCH 09/13] ovl: Set OVL_UPPERDATA flag during ovl_lookup() Vivek Goyal
2017-10-26 6:19 ` Amir Goldstein
2017-10-26 18:04 ` Vivek Goyal
2017-10-25 19:09 ` [PATCH 10/13] ovl: Return lower dentry if only metadata copy up took place Vivek Goyal
2017-10-25 19:09 ` [PATCH 11/13] ovl: Introduce read/write barriers around metacopy flag update Vivek Goyal
2017-10-26 6:34 ` Amir Goldstein [this message]
2017-10-26 17:54 ` Vivek Goyal
2017-10-27 4:35 ` Amir Goldstein
2017-10-27 13:14 ` Vivek Goyal
2017-10-25 19:09 ` [PATCH 12/13] ovl: Do not export metacopy only upper dentry Vivek Goyal
2017-10-26 6:54 ` Amir Goldstein
2017-10-26 6:54 ` Amir Goldstein
2017-10-25 19:09 ` [PATCH 13/13] ovl: Enable metadata only feature Vivek Goyal
2017-10-26 7:07 ` Amir Goldstein
2017-10-26 18:19 ` Vivek Goyal
2017-10-26 7:18 ` [RFC PATCH 00/13][V5] overlayfs: Delayed copy up of data Amir Goldstein
2017-10-27 16:40 ` Vivek Goyal
2017-10-28 14:50 ` Amir Goldstein
2017-10-31 13:39 ` Vivek Goyal
2017-10-31 13:56 ` Amir Goldstein
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAOQ4uxio4ZESiJ35dAimnFW_YcdEpmRCPqMPDB5i2AWvRg2WOA@mail.gmail.com \
--to=amir73il@gmail.com \
--cc=linux-unionfs@vger.kernel.org \
--cc=miklos@szeredi.hu \
--cc=vgoyal@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).