On Mon, 10 Dec 2007 17:05:30 +0200 Maxim Levitsky <[EMAIL PROTECTED]> wrote:
> On Monday 10 December 2007 16:36:09 J. Bruce Fields wrote: > > On Mon, Dec 10, 2007 at 04:19:12PM +0200, Maxim Levitsky wrote: > > > ... > > > > It is best not to use nohide - we should probably mark it as > > > > 'legacy'. > > > > > > > > Simply export the top level mountpoint as 'crossmnt' and everything > > > > below there will be exported. > > > > > > > > > Where should I put those options in root file-system export or in > > > > > submount export? > > > > > > > > crossmnt goes at the top. nohide goes in the submount. Both have > > > > the same general effect though with subtle differences. > > > > You don't need both (though that doesn't hurt). > > > > Just use crossmnt at the top, Then you don't need to mention the > > > > lower level filesystems at all. > > > > > > > > > > > > ... > > > > > (I decided to switch to NFS4 only due to the lack of ability to see > > > > > underlying mounts) > > > > > > > > > > > > > All of this should work fine with v3. Once you have the right patch > > > > for the crossmnt bug applied, if you have further problems post them > > > > to [EMAIL PROTECTED] > > > > > > > > NeilBrown > > > > > > > > > > Big thanks, > > > > > > Still NFS server just don't want to accept the connection > > > I noticed that if I first mount with > > > -tnfs, unmount, and then mount with -tnfs4, it works > > > > OK, in that case, that's definitely the bug Eric sent out the patch for; > > you may want to try applying his patch. > You mean > "[PATCH 2.6.24-rc4] proc: Remove/Fix proc generic d_revalidate" ? > > I did apply it (on both kernel and server), and it doesn't help. argh, this is getting bad. Can you please test the below patch asap? Against 2.6.24-rc4 or latest-linus. From: Andrew Morton <[EMAIL PROTECTED]> Revert commit 2b1e300a9dfc3196ccddf6f1d74b91b7af55e416 Author: Eric W. Biederman <[EMAIL PROTECTED]> Date: Sun Dec 2 00:33:17 2007 +1100 [NETNS]: Fix /proc/net breakage It has caused all sorts of procfs mayhem. Reverting this will reintroduce "Currently things work but there are odd details visible to user space, even when we have a single network namespace." Where "details" was never elaborated upon. Cc: Eric W. Biederman <[EMAIL PROTECTED]> Cc: "Rafael J. Wysocki" <[EMAIL PROTECTED]> Cc: Pavel Machek <[EMAIL PROTECTED]> Cc: Pavel Emelyanov <[EMAIL PROTECTED]> Cc: "David S. Miller" <[EMAIL PROTECTED]> Cc: Ingo Molnar <[EMAIL PROTECTED]> Cc: Herbert Xu <[EMAIL PROTECTED]> Cc: Alexey Dobriyan <[EMAIL PROTECTED]> Cc: "Rafael J. Wysocki" <[EMAIL PROTECTED]> Cc: Trond Myklebust <[EMAIL PROTECTED]> Cc: "Denis V. Lunev" <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- fs/proc/generic.c | 12 ----- fs/proc/proc_net.c | 86 +++++++++++++++++++++++++++++++++++--- include/linux/proc_fs.h | 3 - 3 files changed, 82 insertions(+), 19 deletions(-) diff -puN fs/proc/generic.c~revert-fix-proc-net-breakage fs/proc/generic.c --- a/fs/proc/generic.c~revert-fix-proc-net-breakage +++ a/fs/proc/generic.c @@ -374,16 +374,9 @@ static int proc_delete_dentry(struct den return 1; } -static int proc_revalidate_dentry(struct dentry *dentry, struct nameidata *nd) -{ - d_drop(dentry); - return 0; -} - static struct dentry_operations proc_dentry_operations = { .d_delete = proc_delete_dentry, - .d_revalidate = proc_revalidate_dentry, }; /* @@ -404,11 +397,8 @@ struct dentry *proc_lookup(struct inode if (de->namelen != dentry->d_name.len) continue; if (!memcmp(dentry->d_name.name, de->name, de->namelen)) { - unsigned int ino; + unsigned int ino = de->low_ino; - if (de->shadow_proc) - de = de->shadow_proc(current, de); - ino = de->low_ino; de_get(de); spin_unlock(&proc_subdir_lock); error = -EINVAL; diff -puN fs/proc/proc_net.c~revert-fix-proc-net-breakage fs/proc/proc_net.c --- a/fs/proc/proc_net.c~revert-fix-proc-net-breakage +++ a/fs/proc/proc_net.c @@ -50,14 +50,89 @@ struct net *get_proc_net(const struct in } EXPORT_SYMBOL_GPL(get_proc_net); -static struct proc_dir_entry *shadow_pde; +static struct proc_dir_entry *proc_net_shadow; -static struct proc_dir_entry *proc_net_shadow(struct task_struct *task, +static struct dentry *proc_net_shadow_dentry(struct dentry *parent, struct proc_dir_entry *de) { - return task->nsproxy->net_ns->proc_net; + struct dentry *shadow = NULL; + struct inode *inode; + if (!de) + goto out; + de_get(de); + inode = proc_get_inode(parent->d_inode->i_sb, de->low_ino, de); + if (!inode) + goto out_de_put; + shadow = d_alloc_name(parent, de->name); + if (!shadow) + goto out_iput; + shadow->d_op = parent->d_op; /* proc_dentry_operations */ + d_instantiate(shadow, inode); +out: + return shadow; +out_iput: + iput(inode); +out_de_put: + de_put(de); + goto out; +} + +static void *proc_net_follow_link(struct dentry *parent, struct nameidata *nd) +{ + struct net *net = current->nsproxy->net_ns; + struct dentry *shadow; + shadow = proc_net_shadow_dentry(parent, net->proc_net); + if (!shadow) + return ERR_PTR(-ENOENT); + + dput(nd->dentry); + /* My dentry count is 1 and that should be enough as the + * shadow dentry is thrown away immediately. + */ + nd->dentry = shadow; + return NULL; } +static struct dentry *proc_net_lookup(struct inode *dir, struct dentry *dentry, + struct nameidata *nd) +{ + struct net *net = current->nsproxy->net_ns; + struct dentry *shadow; + + shadow = proc_net_shadow_dentry(nd->dentry, net->proc_net); + if (!shadow) + return ERR_PTR(-ENOENT); + + dput(nd->dentry); + nd->dentry = shadow; + + return shadow->d_inode->i_op->lookup(shadow->d_inode, dentry, nd); +} + +static int proc_net_setattr(struct dentry *dentry, struct iattr *iattr) +{ + struct net *net = current->nsproxy->net_ns; + struct dentry *shadow; + int ret; + + shadow = proc_net_shadow_dentry(dentry->d_parent, net->proc_net); + if (!shadow) + return -ENOENT; + ret = shadow->d_inode->i_op->setattr(shadow, iattr); + dput(shadow); + return ret; +} + +static const struct file_operations proc_net_dir_operations = { + .read = generic_read_dir, +}; + +static struct inode_operations proc_net_dir_inode_operations = { + .follow_link = proc_net_follow_link, + .lookup = proc_net_lookup, + .setattr = proc_net_setattr, +}; + static __net_init int proc_net_ns_init(struct net *net) { struct proc_dir_entry *root, *netd, *net_statd; @@ -110,8 +185,9 @@ static struct pernet_operations __net_in int __init proc_net_init(void) { - shadow_pde = proc_mkdir("net", NULL); - shadow_pde->shadow_proc = proc_net_shadow; + proc_net_shadow = proc_mkdir("net", NULL); + proc_net_shadow->proc_iops = &proc_net_dir_inode_operations; + proc_net_shadow->proc_fops = &proc_net_dir_operations; return register_pernet_subsys(&proc_net_ns_ops); } diff -puN include/linux/proc_fs.h~revert-fix-proc-net-breakage include/linux/proc_fs.h --- a/include/linux/proc_fs.h~revert-fix-proc-net-breakage +++ a/include/linux/proc_fs.h @@ -48,8 +48,6 @@ typedef int (read_proc_t)(char *page, ch typedef int (write_proc_t)(struct file *file, const char __user *buffer, unsigned long count, void *data); typedef int (get_info_t)(char *, char **, off_t, int); -typedef struct proc_dir_entry *(shadow_proc_t)(struct task_struct *task, - struct proc_dir_entry *pde); struct proc_dir_entry { unsigned int low_ino; @@ -80,7 +78,6 @@ struct proc_dir_entry { int pde_users; /* number of callers into module in progress */ spinlock_t pde_unload_lock; /* proc_fops checks and pde_users bumps */ struct completion *pde_unload_completion; - shadow_proc_t *shadow_proc; }; struct kcore_list { _ -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/