Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp1645411ioo; Sun, 22 May 2022 22:50:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/XglLFAzcS4eUqneuyux8prCMcb0dcxIFHm9PNdusYBqVQlejWFpZwggv/rj7SoDDJYHm X-Received: by 2002:a63:5357:0:b0:3f2:6210:f8e9 with SMTP id t23-20020a635357000000b003f26210f8e9mr18525066pgl.158.1653285016415; Sun, 22 May 2022 22:50:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653285016; cv=none; d=google.com; s=arc-20160816; b=IriCE5nzHWoqMH8jYzbED4Zk/T850Gq7GNwZZzNuxYQSLe3iHQYBwub+5bkhbLgx1c oeOJATbnfLrbzJPK3eOCsiukJ/r3kRg/yFHbgo191KXL2GDNg1/Z2Tks0oNESXVxJ2tC kroqHWegeVbntkoudr35L+pCra1myD3tHeHAgjm1ZdTt+8/JGMklCsBy5xei5KUicb4c PPhW5ptRoNFTmJz7QIlMFJ3YRFWYl5zAKr7sqw+5Co9LgJsus3RESwcUMHwHGyLzgno3 YPb7QSvmZE38mGmYCwgXC2rWHiT7WCxvc9QQHTWHql1IyMtr8Tbtyr2gwO+5l2HW/571 wGwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=EPEgF/LXOvUc67RR+bySpSWPvexzgqgYq6xbV2e96Q0=; b=wPRxaIrS8Nr5aXM91Qw/nhwV3ib4wQ5IAO+ycmQnIfhViOfKciJwlFBDWWIWE9uvvn D1eA8LFF1gGy0Ozl+lAYoo8sBB8oTOByoemWQfpFThrwijyha1m+eIBqOVuRdFrNiStz kBffO7+4juprdoukfu5D2Mgtl5Xkg8/xpUCjDOldkNAfxJYIHwfjTloVcarPB9cYGC05 d109dZHX852p/zVxQaj3aGgef20dqj7zUw9VAyguGKeXbkEpIltOzMhnEeffnIftRF3o RMRWwKDawDuBJuy8C8fEwbZCTY4o31/KYM99uD9AJUjVugy8aMeX8ofO4YWGxg10/786 GIgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=LrF9SwHl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id g1-20020a056a001a0100b004fa3a8dff62si14038781pfv.25.2022.05.22.22.50.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 May 2022 22:50:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=LrF9SwHl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A2AA5286FD; Sun, 22 May 2022 22:48:54 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231827AbiEWAZR (ORCPT + 99 others); Sun, 22 May 2022 20:25:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230095AbiEWAZP (ORCPT ); Sun, 22 May 2022 20:25:15 -0400 Received: from mail-yb1-xb34.google.com (mail-yb1-xb34.google.com [IPv6:2607:f8b0:4864:20::b34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ED18B2E68D for ; Sun, 22 May 2022 17:25:13 -0700 (PDT) Received: by mail-yb1-xb34.google.com with SMTP id v71so22758143ybi.4 for ; Sun, 22 May 2022 17:25:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EPEgF/LXOvUc67RR+bySpSWPvexzgqgYq6xbV2e96Q0=; b=LrF9SwHl7tirDLy9Fl17YKhCwdvT/sdMh+BXdFnac/urzE5li6mT9hDQAylZMB2RQ6 5EIeDdQN97eDsQ+QY7mtLEpf2T8SjUxGVCvP+pWv2K71Pu+AxwzUYHdjxdpZyMWe0cJO zjkWnbIs046qkmrW/32PfIgJoNoGw7YkOZjHs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EPEgF/LXOvUc67RR+bySpSWPvexzgqgYq6xbV2e96Q0=; b=RS+RK7mZ6fUWjKwYrFXbmv6rCYblJtk3hNil53+MxgDvU+dvv/FWFcX+xCccckPkCl 94PPP7NG+GooP5NsIJ3IZD3VqJoeIs3L/q+1kBE3s5aYVzU0fXQtW+ICzfcp+XN0YYhK FiM/9aezxURggE6QktQHRPSOwb0DVB8yvE2ctqHIa/OtqaXTA+7SRH7hZLHltnC5LwpR DjnzpFmgy1EXaquiLsx1HNvXwhzIDjX8gZirLpeCqrGSXdCLark1GDaHDyR/KMeGpTdd zzXkW6CRq/Oau9nY+CiUJQu+0RYixuyvrSrZmMqRZ5AM57iTHgt80w0GvwsSQcloAhpJ u5+w== X-Gm-Message-State: AOAM531Mf9yWC84Z9my27qj1/+LlFfPEYWl7pZvDlMlf/g91Hfxu8eVy C0TdCTwNH9sSKsawjwEZvDsMQ9R8ZSPSTYPqFuGtTJdsr1ZbRg== X-Received: by 2002:a25:48c7:0:b0:64d:fc43:b23e with SMTP id v190-20020a2548c7000000b0064dfc43b23emr20408643yba.62.1653265513235; Sun, 22 May 2022 17:25:13 -0700 (PDT) MIME-Version: 1.0 References: <20220511222910.635307-1-dlunev@chromium.org> <20220512082832.v2.2.I692165059274c30b59bed56940b54a573ccb46e4@changeid> In-Reply-To: From: Daniil Lunev Date: Mon, 23 May 2022 10:25:02 +1000 Message-ID: Subject: Re: [PATCH v2 2/2] FUSE: Retire superblock on force unmount To: Miklos Szeredi Cc: Al Viro , linux-fsdevel@vger.kernel.org, Christoph Hellwig , fuse-devel , "Theodore Ts'o" , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org So, I tried this patchset with open bdi elements during force unmount and a random file open [1], and didn't see any major drama with force unmounting the node, after re-mounting, read on sysfs node returned "no such device", which is expected. With private bdi flag patch, unless bdi is unregister on force unmount in fuse, it will complain on name collision [2] (because the patch actually doesn't do much but unregisters the bdi on unmount, which seems to happen ok even if node is busy). Let me know if I am missing anything or if there are any other concerns, and advise what would be the best way to move this forward. Thanks, Daniil. [1] Python shell >>> f1 = open('/sys/class/bdi/8:0-fuseblk/read_ahead_kb', 'r') >>> f2 = open('/media/removable/USB Drive/m1', 'w') [2] [ 149.826508] sysfs: cannot create duplicate filename '/devices/virtual/bdi/8:0-fuseblk' On Thu, May 19, 2022 at 8:55 AM Daniil Lunev wrote: > > > Yep, messing with the bdi doesn't look good. Fuse always uses a > > private bdi, so it's not even necessary. > > The reason I needed to remove the bdi is name collision - fuse > generates a fixed name for its bdi based on the underlying block > device. However, those collisions of mine were conducted on a > version prior to the private bdi introduction, I am not sure if that > is supposed to fix the collision issue. Need to check > > Thanks, > Daniil