Received: by 10.192.165.156 with SMTP id m28csp2094896imm; Thu, 12 Apr 2018 08:31:36 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+WgQTytldxwg3ClbI3jgMMdzaQmp0NuHuK7dCn2AX3k2FfXYw/G/hOHp3S4+xiMCLn4UlZ X-Received: by 2002:a17:902:d886:: with SMTP id b6-v6mr1541979plz.335.1523547096879; Thu, 12 Apr 2018 08:31:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523547096; cv=none; d=google.com; s=arc-20160816; b=RR5eYe+RsxEbcVEKNefFHez+MtL6k0WgmXSRtoHv3fz27kGc6bQynjdAf5Vfm47fJa 23gNHnD3RrJNT5TgG6Lxf3t4tzkajuJtlDD2cNn/rDP20rjozlLXRo9j/ZVNy3yBCpSM dGkteO9FoxxyorTtXFhug1DfONUjQNNpfj/VGQlTF0znrLfnBVet63uOj4jDgOb+OKK3 vqkloR/XSCveKg1qsKMGeyYd74QFBexTBWms3IWz0tDdGSFhFd+ecCz9ccAvwbCBeK+e xOBNXBikCcWrAHQJjxh9rx8LxM5Ak/nCpAO3kEOiQqnJv+LUiRz2cUdxizXQtoY0IT+9 hjww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=lWY3qTmvA3qZDM3OVU0ARWLCm9ll2QQqXv/AwtuV1SM=; b=IS+h0yiR81UoApt0D2lfA7vmPh6OfyhNvgVFEH1fjGazqLtwMPhwmXHa8jmub/1J8C glF8lTsg60RUp99kutepNJCymnBAW+LdOVosXZnszu+UQcoQZo5cCwRUcJy9zvjw0y0U SZTtZXGSImNo22803ZzrHMqEOKUovUQR7MXjLDe/z9lk9zXy2o63Xn1yDxJRTBhG1ftu rJ5HsPYG5TTczeec0ws8nq1oN7rkkcx62bcp2UcS6O+O3ciomHc8RGFcoHmYO5eLSIq3 lDya2vuo2kvsbTy+urp+Qdl7rYWWaZO0BSqQVA/aZIPSqUqrqakSnkjtYvA1O23zKEjT 8GCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w34-v6si3441232pla.319.2018.04.12.08.31.00; Thu, 12 Apr 2018 08:31:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753118AbeDLPIf (ORCPT + 99 others); Thu, 12 Apr 2018 11:08:35 -0400 Received: from mail-wm0-f42.google.com ([74.125.82.42]:54920 "EHLO mail-wm0-f42.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752746AbeDLPId (ORCPT ); Thu, 12 Apr 2018 11:08:33 -0400 Received: by mail-wm0-f42.google.com with SMTP id r191so12291587wmg.4 for ; Thu, 12 Apr 2018 08:08:32 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=lWY3qTmvA3qZDM3OVU0ARWLCm9ll2QQqXv/AwtuV1SM=; b=EKMHh01SgJ00sqb0U6xtcaGISRUh5tBNcmhvqoU18tAXa3bRVeaRQyHh0fdccaZGUc wFT8efM7vG9bw2x7+vinelV5TZikWAPkvvRtB/6csN8eM26yApME6W0kRef7teRK6pVj NhJ4RlAbwQa+NCYpGszGLNZHOA3nAyLlT3bbXbd+hqSTuykfAYNxL1OPEetYr46SG4er UiOuo5P1UvfNvp5WRTcaXpmx5ZVAxtmuJEPRH2vrP0s57POgIJ3DLxClC5ngqKMGN8Mz wpG1DOYNd3dJAXZNr0DG+EtqG/3+5S1qAjUhX8xH4tXv7Lt/ZtLxJQg66Fnwex2A2JZC O0pQ== X-Gm-Message-State: ALQs6tDl7HN6IMSBlHNEApOYnAEeG30eNwr1nhbcPfSD8XuEkLi3um5B xAYGbGpjKAfgfKTZKmK5nMyPjw== X-Received: by 10.28.234.12 with SMTP id i12mr992702wmh.161.1523545711778; Thu, 12 Apr 2018 08:08:31 -0700 (PDT) Received: from veci.piliscsaba.redhat.com (catv-176-63-54-97.catv.broadband.hu. [176.63.54.97]) by smtp.gmail.com with ESMTPSA id p197sm2621783wme.43.2018.04.12.08.08.30 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 12 Apr 2018 08:08:31 -0700 (PDT) From: Miklos Szeredi To: linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH 00/35] overlayfs: stack file operations Date: Thu, 12 Apr 2018 17:07:51 +0200 Message-Id: <20180412150826.20988-1-mszeredi@redhat.com> X-Mailer: git-send-email 2.14.3 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Up till now overlayfs didn't stack regular file operations. Instead, when a file was opened on an overlay, the file from one of the underlying layers would be opened and any file operations performed would directly go to the underlying file on a real filesystem. This works well mostly, but various hacks were added to the VFS to work around issues with this: - d_path() and friends - relatime handling - file locking - fsnotify - writecount handling There are also issues that are unresolved before this patchset: - ioctl's that need write access but can be performed on a O_RDONLY fd - ro/rw inconsistency: file on lower layer opened for read-only will return stale data on read after copy-up and modification - ro/rw inconsistency for mmap: file on lower layer mapped shared will contain stale data after copy-up and modification This patch series reverts the VFS hacks (with the exception of d_path) and fixes the unresoved issues. We need to keep d_path related hacks, because memory maps are still not stacked, yet d_path() should keep working on vma->vm_file->f_path. No regressions were observed after running various test suites (xfstests, ltp, unionmount-testsuite, pjd-fstest). Performance impact of stacking was found to be minimal. Memory use for open overlay files increases by about 256bytes or 12%. Git tree is here: git://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/vfs.git overlayfs-rorw Thanks, Miklos --- Miklos Szeredi (35): vfs: clean up dedup vfs: add path_open() vfs: optionally don't account file in nr_files ovl: copy up times ovl: copy up inode flags Revert "Revert "ovl: get_write_access() in truncate"" ovl: copy up file size as well ovl: deal with overlay files in ovl_d_real() ovl: stack file ops ovl: add helper to return real file ovl: readd read_iter ovl: readd write_iter ovl: readd fsync ovl: readd mmap ovl: readd fallocate ovl: readd lsattr/chattr support ovl: readd fiemap ovl: readd O_DIRECT support ovl: readd reflink/copyfile/dedup support vfs: don't open real vfs: add f_op->pre_mmap() ovl: copy-up on MAP_SHARED vfs: simplify dentry_open() Revert "ovl: fix relatime for directories" Revert "vfs: update ovl inode before relatime check" Revert "ovl: fix may_write_real() for overlayfs directories" Revert "ovl: don't allow writing ioctl on lower layer" Revert "vfs: add flags to d_real()" Revert "vfs: do get_write_access() on upper layer of overlayfs" Revert "vfs: make argument of d_real_inode() const" Revert "vfs: add d_real_inode() helper" Partially revert "locks: fix file locking on overlayfs" Revert "fsnotify: support overlayfs" vfs: simplify d_op->d_real() ovl: fix documentation of non-standard behavior Documentation/filesystems/Locking | 4 +- Documentation/filesystems/overlayfs.txt | 64 +++-- Documentation/filesystems/vfs.txt | 25 +- fs/file_table.c | 13 +- fs/inode.c | 46 +--- fs/internal.h | 17 +- fs/ioctl.c | 1 + fs/locks.c | 20 +- fs/namei.c | 2 +- fs/namespace.c | 66 +---- fs/open.c | 79 +++--- fs/overlayfs/Kconfig | 21 ++ fs/overlayfs/Makefile | 4 +- fs/overlayfs/dir.c | 5 + fs/overlayfs/file.c | 466 ++++++++++++++++++++++++++++++++ fs/overlayfs/inode.c | 52 +++- fs/overlayfs/overlayfs.h | 26 ++ fs/overlayfs/ovl_entry.h | 1 + fs/overlayfs/super.c | 82 +++--- fs/overlayfs/util.c | 20 ++ fs/read_write.c | 90 +++--- fs/xattr.c | 9 +- include/linux/dcache.h | 41 +-- include/linux/fs.h | 32 ++- include/linux/fsnotify.h | 14 +- include/uapi/linux/fs.h | 1 - mm/util.c | 5 + 27 files changed, 831 insertions(+), 375 deletions(-) create mode 100644 fs/overlayfs/file.c -- 2.14.3