Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp1830817pxb; Fri, 18 Feb 2022 16:58:33 -0800 (PST) X-Google-Smtp-Source: ABdhPJw9t2BHiUtJTBfKUh3L+y3Pc6JRIiVY8rIMtDNANkMDztIAhoxJwQ+eddhc183ZLjEmFzer X-Received: by 2002:a17:902:a409:b0:14f:6136:f760 with SMTP id p9-20020a170902a40900b0014f6136f760mr9365205plq.125.1645232312877; Fri, 18 Feb 2022 16:58:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645232312; cv=none; d=google.com; s=arc-20160816; b=RWxSkV08+kq6SBjk8k4t6o/DH/gf3Co6+0aOP/bkhXxa/S5VtUf5RBd6gaS40ithB4 pJ3ghAA0I5YkK4EQJowlQpbJxlNon2yZSEtpKmmnj6oMp7sRNkzwB2hcfXimLbuhTX6c L8bblmXs5HxDm2zw1zzkBmzJdbq8aZLsPYB4xo2yLvymGmydq4GzR60Rc/m7kcqdDpi7 CTNr9G3m8BotsDwKoNiNfpSLwkPbw67ngpsrTfavqN7CTD5ivFS51Z9K8iJz+Uw9XGyw PbK+qNoF6prId2Ay627wLQtSCO7fv+jKl2GZNfzvuIFfxXZsHy6HUlE0v4zls431PYGf 2pYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=8IYUPPLqsYznAle0QfUOWmg0eT/oceq86EHREvfj8dA=; b=whFZKM0pt1Y7Sf7Yk7C+81Ww6qGKJGDwVcGgvLphkMqzz0neosEx4vJTEJ0OgilX89 UtzdCzczjZLue6VrA69p+j9P0Q2VVMNo8UaZeGPnAfAxbWaSJIb2CKDRdjBn0RMiU1Wt SO5amkd4DugpTfCx57u7jmtA49jv6RxXfMSOamzTG5JE7QdE8UVYfn9LFAUvgnDYUjcm WHZ3EJBO74QshiQkvtTGpU59sacyyZWMtMsSAJtjJUOFW35uWKw+q8Cpuf/FaQNWjRtT ZnARE2nNShjZq7eMTHuAaLTCNeL+eDaajCb8nQnj7gNfmBCIaaSCxfn4sOVZkC3Dr6rn MdYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gi22si696390pjb.69.2022.02.18.16.58.15; Fri, 18 Feb 2022 16:58:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237674AbiBRToD (ORCPT + 99 others); Fri, 18 Feb 2022 14:44:03 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:57990 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232313AbiBRToC (ORCPT ); Fri, 18 Feb 2022 14:44:02 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 53F811074D8; Fri, 18 Feb 2022 11:43:45 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1nL9AO-002oME-0T; Fri, 18 Feb 2022 19:43:44 +0000 Date: Fri, 18 Feb 2022 19:43:43 +0000 From: Al Viro To: Rik van Riel Cc: linux-kernel@vger.kernel.org, kernel-team@fb.com, linux-fsdevel@vger.kernel.org, paulmck@kernel.org, gscrivan@redhat.com, Eric Biederman , Chris Mason Subject: Re: [PATCH 1/2] vfs: free vfsmount through rcu work from kern_unmount Message-ID: References: <20220218183114.2867528-1-riel@surriel.com> <20220218183114.2867528-2-riel@surriel.com> <5f442a7770fe4ac06b2837e4f937d559f5d17b8b.camel@surriel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <5f442a7770fe4ac06b2837e4f937d559f5d17b8b.camel@surriel.com> Sender: Al Viro X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 18, 2022 at 02:33:31PM -0500, Rik van Riel wrote: > On Fri, 2022-02-18 at 19:26 +0000, Al Viro wrote: > > On Fri, Feb 18, 2022 at 01:31:13PM -0500, Rik van Riel wrote: > > > After kern_unmount returns, callers can no longer access the > > > vfsmount structure. However, the vfsmount structure does need > > > to be kept around until the end of the RCU grace period, to > > > make sure other accesses have all gone away too. > > > > > > This can be accomplished by either gating each kern_unmount > > > on synchronize_rcu (the comment in the code says it all), or > > > by deferring the freeing until the next grace period, where > > > it needs to be handled in a workqueue due to the locking in > > > mntput_no_expire(). > > > > NAK.? There's code that relies upon kern_unmount() being > > synchronous.? That's precisely the reason why MNT_INTERNAL > > is treated that way in mntput_no_expire(). > > Fair enough. Should I make a kern_unmount_rcu() version > that gets called just from mq_put_mnt()? Umm... I'm not sure you can afford having struct ipc_namespace freed and reused before the mqueue superblock gets at least to deactivate_locked_super().