Received: by 10.192.165.148 with SMTP id m20csp2832415imm; Mon, 7 May 2018 01:51:43 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr8BVLiSFvW7Yg9Qk/lPNjKYFjuWhmJG5zxBSOqTYSbTzGFF5BPTd44WlXYtYu9MLxPVSoN X-Received: by 10.98.12.202 with SMTP id 71mr35838757pfm.61.1525683103086; Mon, 07 May 2018 01:51:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525683103; cv=none; d=google.com; s=arc-20160816; b=OCTz50eRrhV8KB+QarXn1B96qwwKtWY71N/IAHZo2Mb3OwYMk12PzITEfimsycJ32l 3i1gzbaQQ9rdTEuR+CampRfu8G6sK3aFPiiWpWgTd9PFlmBkuIwc/5BjRr8rlgLtTbJe 2F8aYneYFuxuLlEpiloGwIjPrhtsmXFHBXhyShokAL3rLFB6cRXsW/swtz/wsX53G7jy wi7Nb/Dq+v5eqgcWPUIH5EvIqXlHL5xRaU2qHdZ+ZN47M0x7JgxF8QgPAefTU51oL/t5 vjmboM0sJMje/PMqAa9glZhRhwY0DECJyLZbhpp2A6BvUNkOvZN1XQT/E2LD11l0XCkR jSHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=+RDJddIFjdNcSUOK41IyhB9NRT1ehVcS+vZRXo3j+5k=; b=XOz0vag57ts8AfNCAw+UmGT7SuNgNjEoBsF+hN+KIhs0qcfhdcWHnFP138xRd8v9mI MGpG8x6Ixfx4R51JrJ8l7pR1ln0/crWOo+uBjyrW90/L4O7WoniezSa2axojN9TOBFo6 jXkurcHD2a+beJ4X04ew2fRaK7xWPyxaEsCgLvrMm6/hM+C49YbNLsj+BKAjNQ3VAsSz sjrYBOYIfMEPFh81KOTQbFNnd6kC4/jNuK29rSLRNC47SE6265Z+nmcqXecV16CN2xne MezG9KtTDt+Mmq/boD4jRE6NQFlUTwi44L3OSZGcRs8HhmiuePMbJoh6QZ586dTtvC/3 XPsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q7-v6si11729776pgf.547.2018.05.07.01.51.28; Mon, 07 May 2018 01:51:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752359AbeEGIvL (ORCPT + 99 others); Mon, 7 May 2018 04:51:11 -0400 Received: from mail-wm0-f68.google.com ([74.125.82.68]:54109 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752018AbeEGIiO (ORCPT ); Mon, 7 May 2018 04:38:14 -0400 Received: by mail-wm0-f68.google.com with SMTP id a67so11987666wmf.3 for ; Mon, 07 May 2018 01:38:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+RDJddIFjdNcSUOK41IyhB9NRT1ehVcS+vZRXo3j+5k=; b=q+ikjGHN1BIqtjbB/UZnxPQmK8A1CyEVCkrmhlfxTQ+OrYOe493QTJW2I5UxmHGf4/ Vp8SslaGINlWOIJnPcgsrxnYMjqGVOiFWX2KT/jL5S+dhG4QYi8wKND2O339tYXsKmKY k18hTy2e8cnt1cdGUZbPV4D6fo/Kpdgy6fgPiQEyGsZTLu+/tNrn5VWHzyYa049SXkj1 YibsY1n5iEAxf7hHahbhTuktYhYT5RawvhMU1uEseQytea/cUlOxofKYwqvqFEnWkiAO V+I85JlRI5kEl2gE8jzBnxslmmJsae6f1UdGymbegto0fCeRvH0yx3xY2lcvOrUvrht5 6KsQ== X-Gm-Message-State: ALQs6tAoXEXSwQcdFD/LSmsh6mtpUmXGryhKvdk7MrjZgTWnt/b4CRIE B3l+bt/IWGTRSQunvD1Qancm7w== X-Received: by 10.28.146.73 with SMTP id u70mr167704wmd.128.1525682293579; Mon, 07 May 2018 01:38:13 -0700 (PDT) Received: from veci.piliscsaba.redhat.com (C2B0E321.catv.pool.telekom.hu. [194.176.227.33]) by smtp.gmail.com with ESMTPSA id h8-v6sm5908050wmc.16.2018.05.07.01.38.12 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 07 May 2018 01:38:13 -0700 (PDT) From: Miklos Szeredi To: linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Al Viro Subject: [PATCH v2 01/35] vfs: add path_open() Date: Mon, 7 May 2018 10:37:33 +0200 Message-Id: <20180507083807.28792-2-mszeredi@redhat.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180507083807.28792-1-mszeredi@redhat.com> References: <20180507083807.28792-1-mszeredi@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently opening an overlay file results in: - the real file on the underlying layer being opened - f_path being set to the overlay {mount, dentry} pair This patch adds a new helper that allows the above to be explicitly performed. I.e. it's the same as dentry_open(), except the underlying inode to open is given as a separate argument. This is in preparation for stacking I/O operations on overlay files. Later, when implicit opening is removed, dentry_open() can be implemented by just calling path_open(). Signed-off-by: Miklos Szeredi --- fs/open.c | 31 +++++++++++++++++++++++++++++++ include/linux/fs.h | 2 ++ 2 files changed, 33 insertions(+) diff --git a/fs/open.c b/fs/open.c index c5ee7cd60424..d0bf7f061a1a 100644 --- a/fs/open.c +++ b/fs/open.c @@ -906,6 +906,37 @@ int vfs_open(const struct path *path, struct file *file, return do_dentry_open(file, d_backing_inode(dentry), NULL, cred); } +/** + * path_open() - Open an inode by a particular name. + * @path: The name of the file. + * @flags: The O_ flags used to open this file. + * @inode: The inode to open. + * @cred: The task's credentials used when opening this file. + * + * Context: Process context. + * Return: A pointer to a struct file or an IS_ERR pointer. Cannot return NULL. + */ +struct file *path_open(const struct path *path, int flags, struct inode *inode, + const struct cred *cred) +{ + struct file *file; + int retval; + + file = get_empty_filp(); + if (IS_ERR(file)) + return file; + + file->f_flags = flags; + file->f_path = *path; + retval = do_dentry_open(file, inode, NULL, cred); + if (retval) { + put_filp(file); + return ERR_PTR(retval); + } + return file; +} +EXPORT_SYMBOL(path_open); + struct file *dentry_open(const struct path *path, int flags, const struct cred *cred) { diff --git a/include/linux/fs.h b/include/linux/fs.h index 8007a31c4d3c..d97a661342c8 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -2401,6 +2401,8 @@ extern struct file *filp_open(const char *, int, umode_t); extern struct file *file_open_root(struct dentry *, struct vfsmount *, const char *, int, umode_t); extern struct file * dentry_open(const struct path *, int, const struct cred *); +extern struct file *path_open(const struct path *, int, struct inode *, + const struct cred *); extern int filp_close(struct file *, fl_owner_t id); extern struct filename *getname_flags(const char __user *, int, int *); -- 2.14.3