Received: by 10.192.165.156 with SMTP id m28csp2171259imm; Thu, 12 Apr 2018 09:42:58 -0700 (PDT) X-Google-Smtp-Source: AIpwx49bx+1ji4DNoI2S427Yc0/gtosCP4QnSmOBErei9o57SrisvwLlaqzHIi8Jm+PQls4SGABc X-Received: by 10.99.121.131 with SMTP id u125mr1306502pgc.48.1523551378090; Thu, 12 Apr 2018 09:42:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523551378; cv=none; d=google.com; s=arc-20160816; b=hK02sPE5fjgxfcl0E8bXUQq3uWRefqyyj696Xb7E6Y+HmW1jm5EoW28ofSVvJXHKsm jkR12V9l7iyvwxV1oz52c7KNau9By1iYDC/Wpv6LVo9UajUAyh0jlMwAN9CIgdaiCAR8 abMDZA2TEqGHkLimI6GwgPQy/bdA9SxsdAxjlFqNwbv4S07QDsZmVk3RRElv0ZZknpZF ce/pg2IYcvb4Z4mEdc+T9ArGOQWn9X5BQCz56Nas1Kcd5msalWXsSNG0n5RbHNK++vxQ zab9pQ7SGUplMiPWMqFcxj8RwHyv4OmHAAbiXvodZbn+McfPXrSCd9QjYuceEE/wNJXA jKqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=jrSBKe+exMu5yQYwOwZm4DDYjnz9ieK7RsaTjxXPuB4=; b=goSrztn2lV8i6tPmSknnoRmJEx+/wV2mLnpd3z3dILzTg4ECAvAX8NmvIbx2Yodj8G ivKXJ3U9GgrgdKpPmoUm4SD/7xjwBX4zE4cXfhZgnUfAjLVS0FDDzrsObjANFC49MxPK UPwhXgFcJEsAgYB1xMvmHR8cpmJPOxNVuA3yxi6OraGpNUpsFfC+U6/l8YvbYBDEr7eP qMwtvwHmHC+2URGBPiGj81wESZ1ZRwxbzmy8piCUfNT4/Vf8EQYoH3T3uoxZVxHRMgf/ E1/MfkQekCIFLe2NS6s+kol1eUUxn0ZgRcAEBGowoqdcPuYRIdJjhiGc0Qeclv+RwzUV 19qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=V+u4ZiUV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q62si2509428pga.177.2018.04.12.09.42.20; Thu, 12 Apr 2018 09:42:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=V+u4ZiUV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752930AbeDLQi6 (ORCPT + 99 others); Thu, 12 Apr 2018 12:38:58 -0400 Received: from bombadil.infradead.org ([198.137.202.133]:34658 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752437AbeDLQi4 (ORCPT ); Thu, 12 Apr 2018 12:38:56 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=jrSBKe+exMu5yQYwOwZm4DDYjnz9ieK7RsaTjxXPuB4=; b=V+u4ZiUVw0Eng5RlHB/8U471v 1UbeSJxS3JmOQM2QxDOe1j+TSW0mSH99r/HgJqbUKxy+tZfRUOo0D3ZLfrrgYMC8DOYIP9D1SgaRU Czpk+3L2kD71rU/JeQs5pNtb7aKFueucJO1/P8jymHIMwVHOYca4AdIFYxTJjGp+Mf78XLKdnCCWy GiBxNcNAA7w7asrGSdcqmRhrfhPdA0c4dmoRz8HFREM63r1Lwib3Nykg6eq50rPEoCXNBhFkMSkjt CVTvpVlvO0UrhuJn2mp8DO7KLBpxIPn8qsaRX0oNT2wfsTpDc7CeDAqlJCP/ffQhCFRrqMj9eJfbc 3mEHWGy9g==; Received: from willy by bombadil.infradead.org with local (Exim 4.90_1 #2 (Red Hat Linux)) id 1f6fFQ-0002gy-EF; Thu, 12 Apr 2018 16:38:56 +0000 Date: Thu, 12 Apr 2018 09:38:56 -0700 From: Matthew Wilcox To: Miklos Szeredi Cc: linux-unionfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 02/35] vfs: add path_open() Message-ID: <20180412163856.GB24728@bombadil.infradead.org> References: <20180412150826.20988-1-mszeredi@redhat.com> <20180412150826.20988-3-mszeredi@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180412150826.20988-3-mszeredi@redhat.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 12, 2018 at 05:07:53PM +0200, Miklos Szeredi wrote: > Currently opening an overlay file results in: > > - the real file on the underlying layer being opened > - f_path being set to the overlay {mount, dentry} pair > > This patch adds a new helper that allows the above to be explicitly > performed. I.e. it's the same as dentry_open(), except the underlying > inode to open is given as a separate argument. > > This is in preparation for stacking I/O operations on overlay files. > > Later, when implicit opening is removed, dentry_open() can be implemented > by just calling path_open(). > > Signed-off-by: Miklos Szeredi > --- > fs/open.c | 27 +++++++++++++++++++++++++++ > include/linux/fs.h | 2 ++ > 2 files changed, 29 insertions(+) > > diff --git a/fs/open.c b/fs/open.c > index 7ea118471dce..8c315f9ec2f6 100644 > --- a/fs/open.c > +++ b/fs/open.c > @@ -866,6 +866,33 @@ int vfs_open(const struct path *path, struct file *file, > return do_dentry_open(file, d_backing_inode(dentry), NULL, cred); > } > This really warrants some kernel-doc. Let me try to get this started and you can fix it: /** * path_open() - Open an inode by a particular name. * @path: The name of the file. * @flags: The O_ flags used to open this file. * @inode: The inode to open. * @cred: The task's credentials used when opening this file. * * ... * * Context: Process context. * Return: A pointer to a struct file or an IS_ERR pointer. Cannot return NULL. */ > +struct file *path_open(const struct path *path, int flags, struct inode *inode, > + const struct cred *cred) > +{ > + struct file *file; > + int retval; > + > + file = get_empty_filp(); > + if (!IS_ERR(file)) { > + file->f_flags = flags; > + file->f_path = *path; > + retval = do_dentry_open(file, inode, NULL, cred); > + if (retval) { > + put_filp(file); > + file = ERR_PTR(retval); > + } else { > + retval = open_check_o_direct(file); > + if (retval) { > + fput(file); > + file = ERR_PTR(retval); > + } > + } > + } > + > + return file; I'd find this clearer written like this ... + file = get_empty_filp(); + if (IS_ERR(file)) + return file; + + file->f_flags = flags; + file->f_path = *path; + retval = do_dentry_open(file, inode, NULL, cred); + if (retval) + goto err; + retval = open_check_o_direct(file); + if (retval) + goto err; + return file; +err: + put_filp(file); + return ERR_PTR(retval);