Re: [patch 3/7] fs, notify: Add file handle entry intoinotify_inode_mark

From: Andrew Morton
Date: Mon Nov 12 2012 - 19:55:31 EST


On Mon, 12 Nov 2012 14:14:43 +0400
Cyrill Gorcunov <gorcunov@xxxxxxxxxx> wrote:

> This file handle will be used in /proc/pid/fdinfo/fd
> output, which in turn will allow to restore a watch
> target after checkpoint (thus it's provided for
> CONFIG_CHECKPOINT_RESTORE only).

This changelog isn't very good.

What appears to be happening is that you're borrowing exportfs's
ability to encode file handles and this is being reused to transport
inotify fd's to userspace for c/r? Or something else - I didn't try
very hard. Please explain better?

> --- linux-2.6.git.orig/fs/notify/inotify/inotify.h
> +++ linux-2.6.git/fs/notify/inotify/inotify.h
> @@ -1,6 +1,7 @@
> #include <linux/fsnotify_backend.h>
> #include <linux/inotify.h>
> #include <linux/slab.h> /* struct kmem_cache */
> +#include <linux/exportfs.h>
>
> extern struct kmem_cache *event_priv_cachep;
>
> @@ -9,9 +10,16 @@ struct inotify_event_private_data {
> int wd;
> };
>
> +#if defined(CONFIG_PROC_FS) && defined(CONFIG_EXPORTFS) && defined(CONFIG_CHECKPOINT_RESTORE)
> +# define INOTIFY_USE_FHANDLE
> +#endif

Does this mean that c/r will fail to work properly if
CONFIG_EXPORTFS=n? If so, that should be expressed in Kconfig
dependencies?

> struct inotify_inode_mark {
> struct fsnotify_mark fsn_mark;
> int wd;
> +#ifdef INOTIFY_USE_FHANDLE
> + __u8 fhandle[sizeof(struct file_handle) + MAX_HANDLE_SZ];
> +#endif
> };

Whoa. This adds 128+8 bytes to the inotify_inode_mark. That's a lot of
bloat, and there can be a lot of inotify_inode_mark's in the system?

Also, what about alignment? That embedded `struct file_handle' will
have a 4-byte alignment and if there's anything in there which is an
8-byte quantity then some architectures (ia64?) might get upset about
the kernel-mode unaligned access. It appears that this won't happen in
the present code, but are we future-proof?

Why did you use a __u8, anyway? Could have done something like

struct {
struct file_handle fhandle;
u8 pad[MAX_HANDLE_SZ];
};

and got some additional type safety and less typecasting?

> extern void inotify_ignored_and_remove_idr(struct fsnotify_mark *fsn_mark,
> Index: linux-2.6.git/fs/notify/inotify/inotify_user.c
> ===================================================================
> --- linux-2.6.git.orig/fs/notify/inotify/inotify_user.c
> +++ linux-2.6.git/fs/notify/inotify/inotify_user.c
> @@ -566,6 +566,33 @@ static void inotify_free_mark(struct fsn
> kmem_cache_free(inotify_inode_mark_cachep, i_mark);
> }
>
> +#ifdef INOTIFY_USE_FHANDLE
> +static int inotify_encode_wd_fhandle(struct inotify_inode_mark *mark, struct dentry *dentry)
> +{
> + struct file_handle *fhandle = (struct file_handle *)mark->fhandle;
> + int size, ret;
> +
> + BUILD_BUG_ON(sizeof(mark->fhandle) <= sizeof(struct file_handle));
> +
> + fhandle->handle_bytes = sizeof(mark->fhandle) - sizeof(struct file_handle);
> + size = fhandle->handle_bytes >> 2;
> +
> + ret = exportfs_encode_fh(dentry, (struct fid *)fhandle->f_handle, &size, 0);
> + if ((ret == 255) || (ret == -ENOSPC))

Sigh. ENOSPC means "your disk is full". If this error ever gets back
to userspace, our poor user will go and provision more disks and then
wonder why that didn't fix anything.

> + return -EOVERFLOW;

That doesn't seem very appropriate either, unsure.

> + fhandle->handle_type = ret;
> + fhandle->handle_bytes = size * sizeof(u32);
> +
> + return 0;
> +}
>
> ...
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/