Re: [PATCH] dm: separate device deletion from dm_put()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi

I like this approach, it also prevents the existence of "ghost" devices 
--- devices that were already destroyed with ioctl, but exist because of a 
hidden reference from somewhere.

I would recommend this patch after review and testing.

Mikulas

> Hi Alasdair,
> 
> This patch separates the device deletion code from dm_put()
> to make sure the deletion happens in the process context.
> 
> By this patch, device deletion always occurs in an ioctl (process)
> context and dm_put() can be called in interrupt context.
> As a result, the request-based dm's bad dm_put() usage pointed out
> by Mikulas below disappears.
>     http://marc.info/?l=dm-devel&m=126699981019735&w=2
> 
> This patch is for 2.6.33 + your editing patches.
> Please review and apply.
> 
> In request-based dm, a device opener can remove a mapped_device
> while the last request is still completing, because bios in the last
> request complete first and then the device opener can close and remove
> the mapped_device before the last request completes:
>   CPU0                                          CPU1
>   =================================================================
>   <<INTERRUPT>>
>   blk_end_request_all(clone_rq)
>     blk_update_request(clone_rq)
>       bio_endio(clone_bio) == end_clone_bio
>         blk_update_request(orig_rq)
>           bio_endio(orig_bio)
>                                                 <<I/O completed>>
>                                                 dm_blk_close()
>                                                 dev_remove()
>                                                   dm_put(md)
>                                                     <<Free md>>
>    blk_finish_request(clone_rq)
>      ....
>      dm_end_request(clone_rq)
>        free_rq_clone(clone_rq)
>        blk_end_request_all(orig_rq)
>        rq_completed(md)
> 
> So request-based dm used dm_get()/dm_put() to hold md for each I/O
> until its request completion handling is fully done.
> However, the final dm_put() can call the device deletion code which
> must not be run in interrupt context and may cause kernel panic.
> 
> To solve the problem, this patch moves the device deletion code,
> dm_destroy(), to predetermined places that is actually deleting
> the mapped_device in ioctl (process) context, and changes dm_put()
> just to decrement the reference count of the mapped_device.
> By this change, dm_put() can be used in any context and the symmetric
> model below is introduced:
>     dm_create():  create a mapped_device
>     dm_destroy(): destroy a mapped_device
>     dm_get():     increment the reference count of a mapped_device
>     dm_put():     decrement the reference count of a mapped_device
> 
> dm_destroy() waits for all references of the mapped_device to disappear,
> then deletes the mapped_device.
> 
> dm_destroy() uses active waiting with msleep(1), since deleting
> the mapped_device isn't performance-critical task.
> And since at this point, nobody opens the mapped_device and no new
> reference will be taken, the pending counts are just for racing
> completing activity and will eventually decrease to zero.
> 
> Signed-off-by: Kiyoshi Ueda <k-ueda@xxxxxxxxxxxxx>
> Signed-off-by: Jun'ichi Nomura <j-nomura@xxxxxxxxxxxxx>
> Cc: Mikulas Patocka <mpatocka@xxxxxxxxxx>
> Cc: Alasdair G Kergon <agk@xxxxxxxxxx>
> ---
>  drivers/md/dm-ioctl.c |    8 ++++++--
>  drivers/md/dm.c       |   47 +++++++++++++++++++++++++++++++----------------
>  drivers/md/dm.h       |    4 ++++
>  3 files changed, 41 insertions(+), 18 deletions(-)
> 
> Index: 2.6.33/drivers/md/dm-ioctl.c
> ===================================================================
> --- 2.6.33.orig/drivers/md/dm-ioctl.c
> +++ 2.6.33/drivers/md/dm-ioctl.c
> @@ -252,6 +252,7 @@ static void dm_hash_remove_all(int keep_
>  	int i, dev_skipped, dev_removed;
>  	struct hash_cell *hc;
>  	struct list_head *tmp, *n;
> +	struct mapped_device *md;
>  
>  	down_write(&_hash_lock);
>  
> @@ -260,13 +261,14 @@ retry:
>  	for (i = 0; i < NUM_BUCKETS; i++) {
>  		list_for_each_safe (tmp, n, _name_buckets + i) {
>  			hc = list_entry(tmp, struct hash_cell, name_list);
> +			md = hc->md;
>  
> -			if (keep_open_devices &&
> -			    dm_lock_for_deletion(hc->md)) {
> +			if (keep_open_devices && dm_lock_for_deletion(md)) {
>  				dev_skipped++;
>  				continue;
>  			}
>  			__hash_remove(hc);
> +			dm_destroy(md);
>  			dev_removed = 1;
>  		}
>  	}
> @@ -640,6 +642,7 @@ static int dev_create(struct dm_ioctl *p
>  	r = dm_hash_insert(param->name, *param->uuid ? param->uuid : NULL, md);
>  	if (r) {
>  		dm_put(md);
> +		dm_destroy(md);
>  		return r;
>  	}
>  
> @@ -742,6 +745,7 @@ static int dev_remove(struct dm_ioctl *p
>  		param->flags |= DM_UEVENT_GENERATED_FLAG;
>  
>  	dm_put(md);
> +	dm_destroy(md);
>  	return 0;
>  }
>  
> Index: 2.6.33/drivers/md/dm.c
> ===================================================================
> --- 2.6.33.orig/drivers/md/dm.c
> +++ 2.6.33/drivers/md/dm.c
> @@ -2175,6 +2175,7 @@ void dm_set_mdptr(struct mapped_device *
>  void dm_get(struct mapped_device *md)
>  {
>  	atomic_inc(&md->holders);
> +	BUG_ON(test_bit(DMF_FREEING, &md->flags));
>  }
>  
>  const char *dm_device_name(struct mapped_device *md)
> @@ -2183,27 +2184,41 @@ const char *dm_device_name(struct mapped
>  }
>  EXPORT_SYMBOL_GPL(dm_device_name);
>  
> -void dm_put(struct mapped_device *md)
> +void dm_destroy(struct mapped_device *md)
>  {
>  	struct dm_table *map;
>  
> -	BUG_ON(test_bit(DMF_FREEING, &md->flags));
> +	might_sleep();
>  
> -	if (atomic_dec_and_lock(&md->holders, &_minor_lock)) {
> -		map = dm_get_live_table(md);
> -		idr_replace(&_minor_idr, MINOR_ALLOCED,
> -			    MINOR(disk_devt(dm_disk(md))));
> -		set_bit(DMF_FREEING, &md->flags);
> -		spin_unlock(&_minor_lock);
> -		if (!dm_suspended_md(md)) {
> -			dm_table_presuspend_targets(map);
> -			dm_table_postsuspend_targets(map);
> -		}
> -		dm_sysfs_exit(md);
> -		dm_table_put(map);
> -		dm_table_destroy(__unbind(md));
> -		free_dev(md);
> +	spin_lock(&_minor_lock);
> +	map = dm_get_live_table(md);
> +	idr_replace(&_minor_idr, MINOR_ALLOCED, MINOR(disk_devt(dm_disk(md))));
> +	set_bit(DMF_FREEING, &md->flags);
> +	spin_unlock(&_minor_lock);
> +
> +	if (!dm_suspended_md(md)) {
> +		dm_table_presuspend_targets(map);
> +		dm_table_postsuspend_targets(map);
>  	}
> +
> +	/*
> +	 * Rare but there may be I/O requests still going to complete,
> +	 * for example.  Wait for all references to disappear.
> +	 * No one shouldn't increment the reference count of the mapped_device,
> +	 * after the mapped_device becomes DMF_FREEING state.
> +	 */
> +	while (atomic_read(&md->holders))
> +		msleep(1);
> +
> +	dm_sysfs_exit(md);
> +	dm_table_put(map);
> +	dm_table_destroy(__unbind(md));
> +	free_dev(md);
> +}
> +
> +void dm_put(struct mapped_device *md)
> +{
> +	atomic_dec(&md->holders);
>  }
>  EXPORT_SYMBOL_GPL(dm_put);
>  
> Index: 2.6.33/drivers/md/dm.h
> ===================================================================
> --- 2.6.33.orig/drivers/md/dm.h
> +++ 2.6.33/drivers/md/dm.h
> @@ -122,6 +122,10 @@ void dm_linear_exit(void);
>  int dm_stripe_init(void);
>  void dm_stripe_exit(void);
>  
> +/*
> + * mapped_device operations
> + */
> +void dm_destroy(struct mapped_device *md);
>  int dm_open_count(struct mapped_device *md);
>  int dm_lock_for_deletion(struct mapped_device *md);
>  
> 

--
dm-devel mailing list
dm-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/dm-devel

[Index of Archives]     [DM Crypt]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite Discussion]     [KDE Users]     [Fedora Docs]

  Powered by Linux