Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754543Ab0LHJib (ORCPT ); Wed, 8 Dec 2010 04:38:31 -0500 Received: from ipmail07.adl2.internode.on.net ([150.101.137.131]:18663 "EHLO ipmail07.adl2.internode.on.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751942Ab0LHJi3 (ORCPT ); Wed, 8 Dec 2010 04:38:29 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AvsEAPbd/kx5LdBk/2dsb2JhbACjTXLAUoVJBJAL Date: Wed, 8 Dec 2010 20:38:24 +1100 From: Nick Piggin To: Dave Chinner Cc: Nick Piggin , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 01/46] Revert "fs: use RCU read side protection in d_validate" Message-ID: <20101208093824.GA3151@amd> References: <2d1d8ffc4acea8b6c4e5b58bb1653b3f0e7071e2.1290852958.git.npiggin@kernel.dk> <20101208011656.GD29333@dastard> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20101208011656.GD29333@dastard> User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1973 Lines: 46 On Wed, Dec 08, 2010 at 12:16:56PM +1100, Dave Chinner wrote: > On Sat, Nov 27, 2010 at 08:56:03PM +1100, Nick Piggin wrote: > > This reverts commit 3825bdb7ed920845961f32f364454bee5f469abb. > > > > Patch is broken, you can't dget() without holding any locks! > > I believe you can - for the same reasons we can take a reference to > an inode without holding the inode_lock. That is, as long as the > caller already holds an active reference to the dentry, > dget() can be used to take another reference without needing the > dcache_lock. > > Such usage appears to be described in the comment above dget() and > there's a BUG_ON() in dget() to catch callers that don't already > have an active reference. An example of a valid unlocked dget(): > d_alloc() does an unlocked dget() to take a reference to the parent > dentry whichn we already are guaranteed to have a reference to. Of course you can dget if you already have a reference :) > As to d_validate() - it depends on the caller behaviour as to > whether the unlocked dget() is valid or not. From a cursory check > of the NCP and SMB readdir caches, both appear to hold an active > reference to the dentry it is passing to d_validate(). I don't see where? Can you point to where the refcount is taken? AFAIKS it drops the reference 3 lines after it puts the pointer into cache. > If that is > the case then there is nothing wrong with the way d_validate uses > dget(). Can someone with more SMB/NCP expertise than me validate the > use of cached dentries? Then why would it have to use d_validate if it has a reference? That is supposed to be for an "untrusted" pointer (which is why it had all the crazy checks that it's in kmem and in the right slab etc). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/