> +static bool tracker_submit_bio_cb(struct bio *bio) > +{ > + struct bdev_filter *flt = bio->bi_bdev->bd_filter; > + struct bio_list bio_list_on_stack[2] = { }; > + struct bio *new_bio; > + bool ret = true; > + struct tracker *tracker = container_of(flt, struct tracker, flt); > + int err; > + sector_t sector; > + sector_t count; > + unsigned int current_flag; > + > + WARN_ON_ONCE(!flt); > + if (unlikely(!flt)) > + return true; We're called through the filter, so checking this again here (twice) is a bit silly. > + if (bio->bi_opf & REQ_NOWAIT) { > + if (!percpu_down_read_trylock(&tracker_submit_lock)) { > + bio_wouldblock_error(bio); > + return false; > + } > + } else > + percpu_down_read(&tracker_submit_lock); Does it make sense to make this a global lock vs per-struct tracker? > + if (!op_is_write(bio_op(bio))) > + goto out; > + > + count = bio_sectors(bio); > + if (!count) > + goto out; Just nitpicking, but what about moving all the code below here into a separate helper that is only called for op_is_write && bio_sectors? It's not going to change anything functionally, but would make the code easier to follow. > + current_flag = memalloc_noio_save(); > + bio_list_init(&bio_list_on_stack[0]); > + current->bio_list = bio_list_on_stack; > + barrier(); barrier is just a compiler barrier, so it is unlikely to do what you want. But without a comment I can't even figure out what it is trying to do. > +static int tracker_filter_attach(struct block_device *bdev, > + struct tracker *tracker) > +{ > + int ret; > + bool is_frozen = false; > + > + pr_debug("Tracker attach filter\n"); > + > + if (freeze_bdev(bdev)) > + pr_err("Failed to freeze device [%u:%u]\n", MAJOR(bdev->bd_dev), > + MINOR(bdev->bd_dev)); I think you need to fail the attachment if we can't freeze the device. > +static int tracker_filter_detach(struct block_device *bdev) > +{ > + int ret; > + bool is_frozen = false; > + > + pr_debug("Tracker delete filter\n"); > + if (freeze_bdev(bdev)) > + pr_err("Failed to freeze device [%u:%u]\n", MAJOR(bdev->bd_dev), > + MINOR(bdev->bd_dev)); Same here. > +/** > + * tracker_wait_for_release - Waiting for all trackers are released. > + * > + * Trackers are released in the worker thread. So, this function allows to wait > + * for the end of the process of releasing trackers. > + */ > +static void tracker_wait_for_release(void) This defeats the reason to move it to the workqueue first, as you can still deadlock on whatever problem that tried to solve, just out of reach of lockdep. > +struct tracker *tracker_create_or_get(dev_t dev_id) > +{ > + struct tracker *tracker; > + struct block_device *bdev; > + struct tracked_device *tr_dev; > + > + bdev = blkdev_get_by_dev(dev_id, 0, NULL); These blkdev_get_by_dev calls are a little problematic, as they bypass any access restriction (LSMs, containers, etc). That's why the kernel generally does a blkdev_get_by_name based on the actual file name, which does all the proper checks. I think the tracker creation also needs to happen based on names to fit into this security model. Passing in names should also be much easier for userspace to start with. Now for remove, and the other operations on the tracked device: Is there any reason to not simply add an ioctl method to bdev_filter_operations, so that you can issue these ioctls against the tracked device? That removes the need to find the tracked device entirely and should simplify a lot of things. In fact thinking wonder if attachment of a filter driver should go through the block layer using an ioctl on the tracked device as well, i.e. - add a name field to bdev_filter_operations - keep a list of all bdev_filter_operations in the block core - new core block layer ioctl to associate a block device with a bdev_filter_operations - everything after that is done through bdev_filter_operations->ioctl.