Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756571AbcK2Kpg (ORCPT ); Tue, 29 Nov 2016 05:45:36 -0500 Received: from mail-oi0-f51.google.com ([209.85.218.51]:34100 "EHLO mail-oi0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754909AbcK2Kp1 (ORCPT ); Tue, 29 Nov 2016 05:45:27 -0500 MIME-Version: 1.0 X-Originating-IP: [217.173.44.24] In-Reply-To: <87polkv1nr.fsf@vostro.rath.org> References: <87a8cp3i6o.fsf@thinkpad.rath.org> <87polkv1nr.fsf@vostro.rath.org> From: Miklos Szeredi Date: Tue, 29 Nov 2016 11:45:25 +0100 Message-ID: Subject: Re: [fuse-devel] fuse: feasible to distinguish between umount and abort? To: Miklos Szeredi , linux-kernel , linux-fsdevel , Miklos Szeredi , fuse-devel Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2245 Lines: 49 On Fri, Nov 25, 2016 at 1:33 AM, Nikolaus Rath wrote: > On Nov 24 2016, Miklos Szeredi wrote: >> On Thu, Nov 24, 2016 at 12:11 AM, Nikolaus Rath wrote: >>> Hello, >>> >>> Currently, both a call to umount(2) and writing "1" to >>> /sys/fs/fuse/connections/NNN/abort will put the /dev/fuse fd into the >>> same state: reading from it returns ENODEV, and polling on it returns >>> POLLERR. >>> >>> This causes problems for filesystems that want to ensure that the >>> mountpoint is free when they exit. If accessing the device fd gives the >>> above errors, they have to do an additional check to determine if they >>> still need to unmount the mountpoint. This is difficult to do without >>> race conditions (think of someone unmounting and immediately re-starting >>> a new filesystem instance). >>> >>> Would it be possible to change the behavior of the /dev/fuse fd so that >>> userspace can distinguish between a regular umount and use of the >>> /sys/fs/fuse abort)? >> >> Yes. My proposal would be for the kernel to send FUSE_DESTROY >> asynchronously and only return ENODEV once that request was read by >> userspace. Currently FUSE_DESTROY is sent synchronously for fuseblk >> mounts, but not for plain fuse mounts. > > I trust that this is a good plan, but from the description I can't quite > tell how the filesystem would make the distinction between umount/abort > based on this. Would FUSE_DESTROY be send only for unmount, but not for > abort? Right. The userspace implementation would need to be careful to process the DESTROY message before ENODEV received in a different thread. Maybe instead userspace and kernel should negotiate in INIT whether userspace wants a DESTROY or not. If it does, then on umount kernel sends DESTROY and does not return ENODEV. If userspace does not want DESTROY then it falls back to the old way of returning ENODEV. And on abort it would do that as well, regardless of the negotiated DESTROY request. >> Please file a bug somewhere. I don't mind if kernel bugs are also >> kept at the github project as long as they can easily be found. > > Already done at https://github.com/libfuse/libfuse/issues/122. Great. Thanks, Miklos