From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from verein.lst.de (verein.lst.de [213.95.11.211]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E7B701AA83 for ; Wed, 9 Aug 2023 16:26:33 +0000 (UTC) Received: by verein.lst.de (Postfix, from userid 2407) id 1EBE56732D; Wed, 9 Aug 2023 18:26:30 +0200 (CEST) Date: Wed, 9 Aug 2023 18:26:29 +0200 From: Christoph Hellwig To: Christian Brauner Cc: Christoph Hellwig , Al Viro , Namjae Jeon , Sungjong Seo , Theodore Ts'o , Andreas Dilger , Konstantin Komarov , "Darrick J. Wong" , linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, ntfs3@lists.linux.dev, linux-xfs@vger.kernel.org Subject: Re: [PATCH 03/13] xfs: free the mount in ->kill_sb Message-ID: <20230809162629.GA2582@lst.de> References: <20230808161600.1099516-1-hch@lst.de> <20230808161600.1099516-4-hch@lst.de> <20230809-besang-chaoten-642fff8a141a@brauner> Precedence: bulk X-Mailing-List: ntfs3@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230809-besang-chaoten-642fff8a141a@brauner> User-Agent: Mutt/1.5.17 (2007-11-01) On Wed, Aug 09, 2023 at 09:38:13AM +0200, Christian Brauner wrote: > For filesystems on the new mount api it's always nice if the rules > can simply be made: > > * prior to sget_fc() succeeding fc->s_fs_info and freed in fs_context_operations->free() > * after sget_fc() succeeding fc->s_fs_info transfered to sb->s_fs_info and freed in fs_type->kill_sb() Yes. I've been wanting to write this down somewhere, but I can't really think of a good place.