On Tue, Feb 05, 2013 at 03:14:05PM -0800, Zach Brown wrote:
> > +   struct btrfs_inode *b_inode = BTRFS_I(inode);
> > +   struct btrfs_fs_info *fs_info = b_inode->root->fs_info;
> >  
> >     if (atomic_add_unless(&inode->i_count, -1, 1))
> >             return;
> >  
> > -   delayed = kmalloc(sizeof(*delayed), GFP_NOFS | __GFP_NOFAIL);
> > -   delayed->inode = inode;
> > -
> >     spin_lock(&fs_info->delayed_iput_lock);
> > -   list_add_tail(&delayed->list, &fs_info->delayed_iputs);
> > +   list_add_tail(&b_inode->delayed_iput, &fs_info->delayed_iputs);
> >     spin_unlock(&fs_info->delayed_iput_lock);
> >  }
> 
> Hmm.  I'm not great with inode life cycles, but isn't this only safe if
> someone else can't get an i_count reference while this is in flight?  It
> looks like the final iput does the unhashing, and so on, so couldn't an
> iget/iput race with this and try to add the inode's list_head twice?

Yeah, same concern here.  Basically this will result in inodes still being
in use on unmount.

Actually I did a similar one, here is some disscussion:

https://patchwork.kernel.org/patch/1824711/

thanks,
liubo
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to