Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754710AbZAFUpE (ORCPT ); Tue, 6 Jan 2009 15:45:04 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751305AbZAFUox (ORCPT ); Tue, 6 Jan 2009 15:44:53 -0500 Received: from mail-out2.uio.no ([129.240.10.58]:52567 "EHLO mail-out2.uio.no" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751072AbZAFUow (ORCPT ); Tue, 6 Jan 2009 15:44:52 -0500 Subject: Re: [RFC][PATCH 2/4] sunrpc: Use utsnamespaces From: Trond Myklebust To: "Serge E. Hallyn" Cc: Matt Helsley , Linux Containers , linux-nfs@vger.kernel.org, Linux Kernel Mailing List , "J. Bruce Fields" , Chuck Lever , "Eric W. Biederman" , Linux Containers , Cedric Le Goater In-Reply-To: <20090106200229.GA17031@us.ibm.com> References: <20090106011314.534653345@us.ibm.com> <20090106011314.961946803@us.ibm.com> <20090106200229.GA17031@us.ibm.com> Content-Type: text/plain Date: Tue, 06 Jan 2009 15:44:42 -0500 Message-Id: <1231274682.20316.65.camel@heimdal.trondhjem.org> Mime-Version: 1.0 X-Mailer: Evolution 2.24.2 Content-Transfer-Encoding: 7bit X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO) X-UiO-Scanned: B7369462B4E4CDFB723A36BCB49AC9935994CF40 X-UiO-SPAM-Test: remote_host: 68.40.183.129 spam_score: -49 maxlevel 200 minaction 2 bait 0 mail/h: 1 total 326 max/h 9 blacklist 0 greylist 0 ratelimit 0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1806 Lines: 38 On Tue, 2009-01-06 at 14:02 -0600, Serge E. Hallyn wrote: > Quoting Matt Helsley (matthltc@us.ibm.com): > > We can often specify the UTS namespace to use when starting an RPC client. > > However sometimes no UTS namespace is available (specifically during system > > shutdown as the last NFS mount in a container is unmounted) so fall > > back to the initial UTS namespace. > > So what happens if we take this patch and do nothing else? > > The only potential problem situation will be rpc requests > made on behalf of a container in which the last task has > exited, right? So let's say a container did an nfs mount > and then exits, causing an nfs umount request. > > That umount request will now be sent with the wrong nodename. > Does that actually cause problems, will the server use the > nodename to try and determine the client sending the request? The NFSv2/v3 umount rpc call will be sent by the 'umount' program from userspace, not the kernel. The problem here is that because lazy mounts exist, the lifetime of the RPC client may be longer than that of the container. In addition, it may be shared among more than 1 container, because superblocks can be shared. One thing you need to be aware of here is that inode dirty data writebacks may be initiated by completely different processes than the one that dirtied the inode. IOW: Aside from being extremely ugly, approaches like [PATCH 4/4] which rely on being able to determine the container-specific node name at RPC generation time are therefore going to return incorrect values. Trond -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/