Page MenuHomeFreeBSD

unionfs: various locking fixes
ClosedPublic

Authored by jah on Oct 24 2021, 9:59 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sun, Dec 15, 10:54 AM
Unknown Object (File)
Tue, Dec 10, 6:19 PM
Unknown Object (File)
Nov 21 2024, 2:05 PM
Unknown Object (File)
Nov 16 2024, 9:41 AM
Unknown Object (File)
Nov 14 2024, 1:20 PM
Unknown Object (File)
Nov 9 2024, 9:35 PM
Unknown Object (File)
Nov 7 2024, 1:15 PM
Unknown Object (File)
Nov 4 2024, 4:44 AM
Subscribers

Details

Summary

--Clearing cached subdirectories in unionfs_noderem() should be done

under the vnode interlock

--When preparing to switch the vnode lock in both unionfs_node_update()

and unionfs_noderem(), the incoming lock should be acquired before
updating the v_vnlock field to point to it.  Otherwise we effectively
break the locking contract for a brief window.

unionfs: assorted style fixes

No functional change intended, beyond slightly different panic strings

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

jah requested review of this revision.Oct 24 2021, 9:59 PM

phabricator doesn't make it very clear, but the locking and style changes are 2 different commits.

sys/fs/unionfs/union_subr.c
215

There should be spaces around binary ops, like uppervp == NULLVP

442

I do not think that () are needed there.

I am not sure what to do about possible lock recursion there. It would be enough to assert that either of lower/upper vnodes are not recursively locked, if exist. unionfs_node_update() does handle the recursion.

You might also add the LK_NOWAIT flag, since the lock must not be owned by anybody.

1255

This is a strange block. Either we cannot handle such situation (empty read) at all, or we ignore it, under DIAGNOSTIC or not.

Most likely, this check should be moved somewhere into vop_readdir_post under INVARIANTS.

1329

Again this is strange, panic will re-enter the debugger. Perhaps it should be KASSERT, and then remove notyet?

sys/fs/unionfs/union_subr.c
1255

Agreed. For now I'll make this a KASSERT in the same place as the current check.

1329

I'm not sure why the KDB part was written like this; I suspect the vnops check under notyet was pasted from the equivalent nullfs code, But in any case, I'd rather have a KASSERT here to catch some strange corner case where we're not using a unionfs node, before trying to access fields of that node.

Further style fixes, improve locking assertions and vnode checking

kib added inline comments.
sys/fs/unionfs/union.h
119 ↗(On Diff #97729)
121 ↗(On Diff #97729)
122 ↗(On Diff #97729)

Generally, VOP_LOCK() implementations _must_ be able to handle reclaimed vnodes. Because we might wait for the lock while VOP_RECLAIM() is running.

I.e. I think the case is there to stay.

sys/fs/unionfs/union_subr.c
189

Are uvp/lvp supposed to be locked there (I assume yes)?

445
This revision is now accepted and ready to land.Oct 31 2021, 1:46 AM
sys/fs/unionfs/union_subr.c
189

Good point, actually no they won't be locked for unionfs_get_cached_vnode(). unionfs_nodeget() first tries to lookup any matching vnode from the cache and returns if it finds one. Only after that does it lock lvp/uvp, at which point lvp/uvp are also checked for VI_DOOMED. lvp/uvp will therefore be locked at the time unionfs_ins_cached_vnode() is called, and they will not be passed to unionfs_ins_cached_vnode() if they are doomed, so the VDIR assert there is valid.

Here they will be referenced but not locked, so v_type may still transition to VBAD.

Remove asserts from unionfs_get_cached_vnode(), add locking asserts to unionfs_ins_cached_vnode()

This revision now requires review to proceed.Oct 31 2021, 7:39 PM
This revision is now accepted and ready to land.Oct 31 2021, 9:30 PM