From patchwork Mon Feb 18 19:46:55 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeff Layton X-Patchwork-Id: 2160201 Return-Path: X-Original-To: patchwork-linux-nfs@patchwork.kernel.org Delivered-To: patchwork-process-083081@patchwork1.kernel.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by patchwork1.kernel.org (Postfix) with ESMTP id 5757E3FCFC for ; Mon, 18 Feb 2013 19:47:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757085Ab3BRTrm (ORCPT ); Mon, 18 Feb 2013 14:47:42 -0500 Received: from mx1.redhat.com ([209.132.183.28]:18122 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754881Ab3BRTrm (ORCPT ); Mon, 18 Feb 2013 14:47:42 -0500 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id r1IJkvfn012350 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 18 Feb 2013 14:46:57 -0500 Received: from tlielax.poochiereds.net (vpn-52-120.rdu2.redhat.com [10.10.52.120]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id r1IJku52020827; Mon, 18 Feb 2013 14:46:56 -0500 Date: Mon, 18 Feb 2013 14:46:55 -0500 From: Jeff Layton To: Al Viro Cc: NeilBrown , "Myklebust, Trond" , NFS , Linus Torvalds Subject: Re: More fun with unmounting ESTALE directories. Message-ID: <20130218144655.42b3f3e3@tlielax.poochiereds.net> In-Reply-To: <20130218184609.GF4503@ZenIV.linux.org.uk> References: <20130212113813.427b8e05@notabene.brown> <20130214104230.013b7f71@tlielax.poochiereds.net> <20130218132509.0ce779de@notabene.brown> <20130218184609.GF4503@ZenIV.linux.org.uk> Mime-Version: 1.0 X-Scanned-By: MIMEDefang 2.68 on 10.5.11.23 Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, 18 Feb 2013 18:46:09 +0000 Al Viro wrote: > On Mon, Feb 18, 2013 at 01:25:09PM +1100, NeilBrown wrote: > > > I would be really nice if sys_unmount used a LOOKUP_MOUNTPOINT flag that > > works a bit like LOOKUP_PARENT and LOOKUP_NOFOLLOW in that it skips the very > > last step and returns the mounted-on directory, not the mountpoint that is > > mounted there - or at least makes sure not revalidate happens on that final > > mounted directory. > > I don't think LOOKUP_MOUNTPOINT is a good idea. For one thing, we have > fairly few places that might want it, all of them in core VFS. Might as > well provide a separate function for them, a-la path_lookupat() vs. > path_openat(). > > For another, we need to decide what to do with a really nasty corner case: > a/b is a mountpoint, with c/d bound on it. > c/d is a symlink to c/e > c/e is a mountpoint > What should umount("a/b", 0) do? There are two possibilities - removing > vfsmount on top of a/b or one on top of c/e... > > We have the latter semantics; _that_ is what this GETATTR is about. It's > a fairly obscure corner case - the question is not even whether to follow > symlinks, it's whether to follow _mounts_ on the last component. Hell > knows; I'm seriously tempted to change it "don't follow mounts" and see if > anyone complains. The only case when behaviour would change would be > a symlink mounted somewhere (note that this is _not_ something that can easily > happen; e.g. mount --bind does follow symlinks) and umount(2) given the > path resolving to the mountpoint of that symlink. > > > I think FS_REVAL_DOT is needed so that if you call stat("."), it will update > > attributes from the server if the cache is old. However it seems to do a > > whole lot more than that, including "lookup" calls which it I'm sure is wrong. > > Far from only that. FS_REVAL_DOT is a misnomer - it's not just ".". Take > a look at the places where LOOKUP_JUMPED is set; _that_ is what drives the > damn thing. Essentially, LOOKUP_JUMPED is "we hadn't arrived here by > lookup in parent"; "." (or "/") obviously qualify, but so does following > a procfs-style symlink, or .., for that matter. "foo/.", OTOH, does *not*. > > It matters only in the end of the pathname, of course. So we don't need to do > revalidate every time we step on e.g. .. or cross a mountpoint (let alone > when we step on .), as long as we make sure that revalidate isn't missing in > the end of path. Ok, that helps. In that case, this patch might be a reasonable forward-port of the one Neil sent earlier today. Note that this doesn't really do anything for the umount problem, but it does seem to fix the testcase for the problem I've been looking at. Thoughts? ---------------[snip]-------------- nfs: handle d_revalidate of 'dot' correctly When d_revalidate is called on a dentry because FS_REVAL_DOT is set it isn't really appropriate to revalidate the name. If the path was simply ".", then the current-working-directory could have been renamed on the server and should still be accessible as "." even if it has a new name. If the path was "/some/long/path/.", then the final component ("path" in this case) has already been revalidated and there is no particular need to do it again. If LOOKUP_JUMPED is set in the flags, then that indicates that we reached this dentry by some means other than a lookup in a parent directory. In that case, verifying the dentry by name is pretty meaningless. We do however want to know whether the inode is still good. Based-on-Patch-by: NeilBrown Signed-off-by: Jeff Layton --- fs/nfs/dir.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/fs/nfs/dir.c b/fs/nfs/dir.c index a8bd28c..f159c3c 100644 --- a/fs/nfs/dir.c +++ b/fs/nfs/dir.c @@ -1076,6 +1076,19 @@ static int nfs_lookup_revalidate(struct dentry *dentry, unsigned int flags) if (NFS_STALE(inode)) goto out_bad; + /* + * If we didn't reach this dentry as the result of a lookup in the + * parent dir, then LOOKUP_JUMPED will be set. In that case, however + * the name not really relevant, so just revalidate the inode + */ + if (flags & LOOKUP_JUMPED) { + error = nfs_revalidate_inode(NFS_SERVER(inode), inode); + if (error) + goto out_bad; + else + goto out_valid; + } + error = -ENOMEM; fhandle = nfs_alloc_fhandle(); fattr = nfs_alloc_fattr();