Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753271AbdHWCk2 (ORCPT ); Tue, 22 Aug 2017 22:40:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41336 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753084AbdHWCk0 (ORCPT ); Tue, 22 Aug 2017 22:40:26 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 0B709883B1 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=ikent@redhat.com Subject: Re: Do we really need d_weak_revalidate??? From: Ian Kent To: NeilBrown , Jeff Layton , Trond Myklebust , "viro@zeniv.linux.org.uk" Cc: "linux-kernel@vger.kernel.org" , "mkoutny@suse.com" , "linux-nfs@vger.kernel.org" , "linux-fsdevel@vger.kernel.org" , David Howells References: <87bmnmrai9.fsf@notabene.neil.brown.name> <1502430944.3822.1.camel@primarydata.com> <1502449309.4950.2.camel@redhat.com> <87zib3niqn.fsf@notabene.neil.brown.name> <1502705432.4978.1.camel@redhat.com> <877ey4nsep.fsf@notabene.neil.brown.name> <1502883253.4847.6.camel@redhat.com> <1e4665a6-30d6-c16a-760a-2892fb147760@redhat.com> <878tihmora.fsf@notabene.neil.brown.name> <2e289bba-677b-cc50-5fa3-2d24d1f6b858@redhat.com> <87h8x1l9qp.fsf@notabene.neil.brown.name> <733c15c2-ffbb-9a89-90ec-3ba1d574590e@redhat.com> <87r2w3jdn5.fsf@notabene.neil.brown.name> <42ba2fa5-d756-d70f-370c-c2fe1a61c5bf@redhat.com> Message-ID: <1bfd81b3-4f16-b0a7-6b51-0c0cb23ed0a0@redhat.com> Date: Wed, 23 Aug 2017 10:40:16 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <42ba2fa5-d756-d70f-370c-c2fe1a61c5bf@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Wed, 23 Aug 2017 02:40:26 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6059 Lines: 154 On 23/08/17 10:32, Ian Kent wrote: > On 23/08/17 09:06, NeilBrown wrote: >> On Mon, Aug 21 2017, Ian Kent wrote: >> >>>> >>>> A mount isn't triggered by kern_path(pathname, 0, &path). >>>> That '0' would need to include one of >>>> LOOKUP_PARENT | LOOKUP_DIRECTORY | >>>> LOOKUP_OPEN | LOOKUP_CREATE | LOOKUP_AUTOMOUNT >>>> >>>> to trigger an automount (otherwise you just get -EISDIR). >>> >>> It's perfectly sensible to think that but there is a case where a >>> a mount is triggered when using kern_path(). >>> >>> The EISDIR return occurs for positive dentrys, negative dentrys >>> will still trigger an automount (which is autofs specific, >>> indirect mount map using nobrowse option, the install default). >> >> Ok, I understand this better now. This difference between direct and >> indirect mounts is slightly awkward. It is visible from user-space, but >> not elegant to document. >> When you use O_PATH to open a direct automount that has not already been >> triggered, the open returns the underlying directory (and fstatfs >> confirms that it is AUTOFS_SUPER_MAGIC). When you use O_PATH on >> an indirect automount, it *will* trigger the automount when "nobrowse" is >> in effect, but it won't when "browse" is in effect. > > That inconsistency has bothered me for quite a while now. > > It was carried over from the autofs module behavior when automounting > support was added to the VFS. What's worse is it prevents the use of > the AT_NO_AUTOMOUNT flag from working properly with fstatat(2) and with > statx(). > > There is some risk in changing that so it does work but it really does > need to work to enable userspace to not trigger an automount by using > this flag. > > So that's (hopefully) going to change soonish, see: > http://ozlabs.org/~akpm/mmotm/broken-out/autofs-fix-at_no_automount-not-being-honored.patch > > The result should be that stat family calls don't trigger automounts except > for fstatat(2) and statx() which will require the AT_NO_AUTOMOUNT flag. > >> >> So we cannot just say "O_PATH doesn't trigger automounts", which is >> essentially what I said in >> >> https://git.kernel.org/pub/scm/docs/man-pages/man-pages.git/commit/?id=97a45d02e6671482e8b2cdcce3951930bf6bdb94 >> >> It might be possible to modify automount so that it was more consistent >> - i.e. if the point is triggered by a mkdir has been done, just to the >> mkdir. If it is triggered after a mkdir has been done, do the mount. I >> guess that might be racy, and in any case is hard to justify. >> >> Maybe I should change it to be about "direct automounts", and add a note >> that indirect automounts aren't so predictable. > > Right and the semantics should be much more consistent in the near future. > I hope (and expect) this semantic change won't cause problems. > >> >> But back to my original issue of wanting to discard >> kern_path_mountpoint, what would you think of the following approach - >> slight revised from before. >> >> Thanks, >> NeilBrown >> >> diff --git a/fs/autofs4/autofs_i.h b/fs/autofs4/autofs_i.h >> index beef981aa54f..7663ea82e68d 100644 >> --- a/fs/autofs4/autofs_i.h >> +++ b/fs/autofs4/autofs_i.h >> @@ -135,10 +135,13 @@ static inline struct autofs_info *autofs4_dentry_ino(struct dentry *dentry) >> /* autofs4_oz_mode(): do we see the man behind the curtain? (The >> * processes which do manipulations for us in user space sees the raw >> * filesystem without "magic".) >> + * A process performing certain ioctls can get temporary oz status. >> */ >> +extern struct task_struct *autofs_tmp_oz; >> static inline int autofs4_oz_mode(struct autofs_sb_info *sbi) >> { >> - return sbi->catatonic || task_pgrp(current) == sbi->oz_pgrp; >> + return sbi->catatonic || task_pgrp(current) == sbi->oz_pgrp || >> + autofs_tmp_oz == current; >> } >> >> struct inode *autofs4_get_inode(struct super_block *, umode_t); >> diff --git a/fs/autofs4/dev-ioctl.c b/fs/autofs4/dev-ioctl.c >> index dd9f1bebb5a3..d76401669a20 100644 >> --- a/fs/autofs4/dev-ioctl.c >> +++ b/fs/autofs4/dev-ioctl.c >> @@ -200,6 +200,20 @@ static int autofs_dev_ioctl_protosubver(struct file *fp, >> return 0; >> } >> >> +struct task_struct *autofs_tmp_oz; >> +int kern_path_oz(const char *pathname, int flags, struct path *path) >> +{ >> + static DEFINE_MUTEX(autofs_oz); >> + int err; >> + >> + mutex_lock(&autofs_oz); >> + autofs_tmp_oz = current; >> + err = kern_path(pathname, flags, path); >> + autofs_tmp_oz = NULL; >> + mutex_unlock(&autofs_oz); >> + return err; >> +} >> + > > It's simple enough but does look like it will attract criticism as being > a hack! > > The kern_path_locked() function is very similar to what was originally > done, along with code to look down the mount stack (rather than up the > way it does now) to get the mount point. In this case, to be valid the > dentry can't be a symlink so that fits kern_path_locked() too. Oh wait, that __lookup_hash() tries too hard to resolve the dentry, that won't quite work, and maybe d_lookup() can't be used safely in this context either .... > > So maybe it is worth going back to the way it was in the beginning and > be done with it .... OTOH Al must have had a reason for changing the > way it was done that I didn't get. > >> /* Find the topmost mount satisfying test() */ >> static int find_autofs_mount(const char *pathname, >> struct path *res, >> @@ -209,7 +223,8 @@ static int find_autofs_mount(const char *pathname, >> struct path path; >> int err; >> >> - err = kern_path_mountpoint(AT_FDCWD, pathname, &path, 0); >> + err = kern_path_oz(pathname, 0, &path); >> + >> if (err) >> return err; >> err = -ENOENT; >> @@ -552,8 +567,7 @@ static int autofs_dev_ioctl_ismountpoint(struct file *fp, >> >> if (!fp || param->ioctlfd == -1) { >> if (autofs_type_any(type)) >> - err = kern_path_mountpoint(AT_FDCWD, >> - name, &path, LOOKUP_FOLLOW); >> + err = kern_path_oz(name, LOOKUP_FOLLOW, &path); >> else >> err = find_autofs_mount(name, &path, >> test_by_type, &type); >> >