lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <m1zllgzki0.fsf@frodo.ebiederm.org>
Date:	Tue, 07 Oct 2008 04:56:39 -0700
From:	ebiederm@...ssion.com (Eric W. Biederman)
To:	Tejun Heo <tj@...nel.org>
Cc:	Al Viro <viro@...IV.linux.org.uk>,
	Benjamin Thery <benjamin.thery@...l.net>,
	Greg KH <greg@...ah.com>, linux-kernel@...r.kernel.org,
	"Serge E. Hallyn" <serue@...ibm.com>,
	Al Viro <viro@....linux.org.uk>,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: sysfs: tagged directories not merged completely yet


> If the filler is a real concern, I think it's better to just decouple
> it rather than making sysfs locking fine-grained.  sysfs metadata
> might as well be protected by a single spinlock if it can be decoupled
> from vfs locking and stuff.  It's just an in-memory tree which isn't
> used too often.

I think with a little care we can make the sysfs read side rcu
protected which would remove any real locking from lookup
and readdir.


> Generally, the VFS layer isn't too easy for sysfs which is a bit like
> distributed filesystem but has more strict here-and-now rule (all
> changes should be visible instantaneously).  At the beginning, sysfs
> didn't have much metadata itself, it just used the VFS data structures
> but that was too large so sysfs_dirent got introduced and it tried to
> update VFS data structures as necessary and (this is when I started
> working on it) the current code and Eric's patcheset evolved from
> there.


> Maybe it can be done better by taking more traditional distributed
> filesystem approach - re/invalidation on access.  I don't know whether
> it will fit sysfs's needs but if it can be done, sysfs would be able
> to ride along with other distributed filesystems and become much more
> conventional in its interfacing with VFS.

The revalidate on access model doesn't appear to have a way to track
remote renames.  Something sysfs supports.

I have just spent a little bit of time thinking it through.  I had previously
thought that we could take advantage of the fact that sysfs only allows
VFS reads we could fix our backwards lock ordering by optimizing the read
side with rcu.  Unfortunately the VFS still takes locks on rename and similar
paths despite the fact sysfs does not implement those paths functions.  Therefore
whatever we do has to be handle all VFS operations even if we don't support
them.  Weird,  but true.

We may need to delay dentry unhashing until revalidate.  I think I see
some issues if we don't do that.

Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ