Received: by 2002:a05:7412:e79e:b0:f3:1519:9f41 with SMTP id o30csp201600rdd; Wed, 22 Nov 2023 13:19:17 -0800 (PST) X-Google-Smtp-Source: AGHT+IHlBZhcc7c8K8jfWDEqb2nbgqonoSIRfWiwR1FOiUGEVS3fEZyhOqJQ9qcxjK17Bldc8bYp X-Received: by 2002:a05:620a:1301:b0:77b:e19f:2988 with SMTP id o1-20020a05620a130100b0077be19f2988mr3752509qkj.6.1700687957420; Wed, 22 Nov 2023 13:19:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700687957; cv=none; d=google.com; s=arc-20160816; b=Q6zCUFq/OSOaal38h6ZBDrTrTT30RiaoZHwJbJ3si8j3HqPZ6s/qHOD5Du3+gpJoxu eN80tkndvgEADF4MD/OtSs1Yq6tRG2/4feJORpMW9MN2DDDa0ECG+w+qYyzYHWcrZPft 3JtlsClIsJNCXaFpCyEJd1u/n6wl41p5XqH1JErdxKljggutvh08MUW7oj+1zPMnQSoA DlIFtokNqlGiGmd+n7ACs3ipBIpvBU0wVOXg8Ed81J38/PiYu5pCGCrzHLS3x9/eUidp ge8y1WYce719Jb7ATwPBi4JfonDm8O2wp8yDMOhmNY+XR1IlricBYMp60Gt/zInWGFVo XThQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:in-reply-to:content-disposition:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:references :message-id:subject:cc:to:from:date:dkim-signature; bh=GbGgxXd0D6P3kK6eEYEOVB7NqqPtigeykui8LfkWNZM=; fh=EC56zrK1cCR0+MNXSpbwKRCx2at6bGt3EsEAPFXz1Rs=; b=FgKZzfG5SOu+CR9pp9Z74tOFZJylSJuu1WIi9Jh31RaS9sJfH/exl/QTJpFozDw0yJ C4rN8WtRw/viR7K0i0r0m0AvL97iNgJRr8PPgcW2a66ToXgmBW/a85XrmK7EvalJ1RR+ WFp/ekUpBSC4NQthkPNJhcGM7tzQyl4+UaV458J5CYt/pL2/qnO5nNbxFLsHsCq+luFb VfCNMqi4KZr0cadEYiyG2RFE3GDEt3lSfR7IrKVwjYLoi3GdHw0Q3pddsAD2eZTNiiz0 01uqs+vSIdck2QK7bJx9obb6mln9IcNZm6Z5ul6o3C9yvUeJWRhcggRsmU8VBQxLMBAo ofUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.org.uk header.s=zeniv-20220401 header.b="mI/nBUzb"; spf=pass (google.com: domain of linux-ext4+bounces-92-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-ext4+bounces-92-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zeniv.linux.org.uk Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id de26-20020a05620a371a00b00775a6554b41si486769qkb.285.2023.11.22.13.19.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 13:19:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4+bounces-92-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.org.uk header.s=zeniv-20220401 header.b="mI/nBUzb"; spf=pass (google.com: domain of linux-ext4+bounces-92-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-ext4+bounces-92-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zeniv.linux.org.uk Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id AC4571C20B1A for ; Wed, 22 Nov 2023 21:19:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7A1B31C2BE; Wed, 22 Nov 2023 21:19:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linux.org.uk header.i=@linux.org.uk header.b="mI/nBUzb" X-Original-To: linux-ext4@vger.kernel.org Received: from zeniv.linux.org.uk (zeniv.linux.org.uk [IPv6:2a03:a000:7:0:5054:ff:fe1c:15ff]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF71E1A5; Wed, 22 Nov 2023 13:19:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=linux.org.uk; s=zeniv-20220401; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=GbGgxXd0D6P3kK6eEYEOVB7NqqPtigeykui8LfkWNZM=; b=mI/nBUzbuLRl8y71pGzGwG3AqE 9nwjsJ2gz+NhHF9XD6iYO4i+9WjMVuzBqAY16Wd/yrssV0AaFAv02ZkujqU5S78p8rOPo/SUuyk4W 8/nT5AO6eLxpRd56238mkk7z92XdfpSyf1N4qCYODg2gNDegCwfS36EIdJMnpzbyg7jIOIqlm60a2 cN+L44mlhZcn4bOy1TdDvE3F2HyesD2+3TOjf/yriqIuoujbwk+Nw4r8tfbC6bs0khIm3iyEeR0VO hr8fiUavTzkDlQHsYuue1vVtFUt9QBG1qUpXfi8yRo5l95o54GwvPikZo1kq4tHNgUWZHJcpxjlAn H3hu8bYw==; Received: from viro by zeniv.linux.org.uk with local (Exim 4.96 #2 (Red Hat Linux)) id 1r5ucf-001mtu-1r; Wed, 22 Nov 2023 21:19:01 +0000 Date: Wed, 22 Nov 2023 21:19:01 +0000 From: Al Viro To: Linus Torvalds Cc: Christian Brauner , Gabriel Krisman Bertazi , tytso@mit.edu, linux-f2fs-devel@lists.sourceforge.net, ebiggers@kernel.org, linux-fsdevel@vger.kernel.org, jaegeuk@kernel.org, linux-ext4@vger.kernel.org Subject: Re: [f2fs-dev] [PATCH v6 0/9] Support negative dentries on case-insensitive ext4 and f2fs Message-ID: <20231122211901.GJ38156@ZenIV> References: <20230816050803.15660-1-krisman@suse.de> <20231025-selektiert-leibarzt-5d0070d85d93@brauner> <655a9634.630a0220.d50d7.5063SMTPIN_ADDED_BROKEN@mx.google.com> <20231120-nihilismus-verehren-f2b932b799e0@brauner> <20231121022734.GC38156@ZenIV> Precedence: bulk X-Mailing-List: linux-ext4@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231121022734.GC38156@ZenIV> Sender: Al Viro On Tue, Nov 21, 2023 at 02:27:34AM +0000, Al Viro wrote: > I will review that series; my impression from the previous iterations > had been fairly unpleasant, TBH, but I hadn't rechecked since April > or so. The serious gap, AFAICS, is the interplay with open-by-fhandle. It's not unfixable, but we need to figure out what to do when lookup runs into a disconnected directory alias. d_splice_alias() will move it in place, all right, but any state ->lookup() has hung off the dentry that had been passed to it will be lost. And I seriously suspect that we want to combine that state propagation with d_splice_alias() (or its variant to be used in such cases), rather than fixing the things up afterwards. In particular, propagating ->d_op is really not trivial at that point; it is safe to do to ->lookup() argument prior to d_splice_alias() (even though that's too subtle and brittle, IMO), but after d_splice_alias() has succeeded, the damn thing is live and can be hit by hash lookups, revalidate, etc. The only things that can't happen to it are ->d_delete(), ->d_prune(), ->d_iput() and ->d_init(). Everything else is fair game. And then there's an interesting question about the interplay with reparenting. It's OK to return an error rather than reparent, but we need some way to tell if we need to do so.