Received: by 10.192.165.148 with SMTP id m20csp4444500imm; Tue, 8 May 2018 08:33:10 -0700 (PDT) X-Google-Smtp-Source: AB8JxZozEYheW74htXw+/wSUWeLgN25UjxitHkfwvAbyUD3Z/UBnAhNsSEzmBI999+/QIsMdJyz5 X-Received: by 2002:a63:85c1:: with SMTP id u184-v6mr33679549pgd.442.1525793590667; Tue, 08 May 2018 08:33:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525793590; cv=none; d=google.com; s=arc-20160816; b=WwDjDXqqUY6y5k2xNdVVFb8h/6K56sDO9PA18JmRpNnL9TbVmcm25EzJRedd/whGHd gP6SV6CBm3mkVvLRjGE/pK7hENO68AsaLb4mq+dvgvnF6iFg2I/cuNN3oEuzqNgsBPNx gJTCn7biYIkyuSm9RkpqreAe9GcCN2Dfs92BV/ylgfJ5pjRLIjdCsQr9HWj2/9km4QII 0yza1hq0cH9j7E5HrnIStJ4ndx7Mi6Qv1sgYJrWCqvzpO82EqXALCuPAvuN2EYmaS5Hm i3vGomLcnCcfH8aowC62f82Lo78cKUXcPaigqQCjOPzOGt2UiOjslfarhB4c07Z5P0HP nlUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature:arc-authentication-results; bh=MgAD/f53V8jYL6/SS7kEf2/3CjfhvzaIf1b/65Qkl0Y=; b=S1HpklxPLfg6sPqZjYq2GeX0pu5zSr374FoOgqXilLT1PyXdZSG5DxCkPRLZtcYl+I pb8eWqSTRLhptVfNlohGgD6Y3Na0FfyeQcTfGD0qsSMEtHQFFXld9CfaZI4F66jdh5Wq w0MP4Lik06HpSeOoxvTjrQbNrS+kVxWyuBbBrfX1rjlQQKt6hf3AnqELoKIA4TAKQOug Fd5t+z4S6R555x1oL/vKd+iDRUe6MqZ70XpAGUNzLAunDsqcG5BHb1pEf3TJy/TJxaw6 Vs9HWvIOsRY9iKG9sWuuG/iSERNirVH3Bapp3e/x9/DPph30V3gX5mcxL8GiQDgxEaNI gf2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1ThP+/G+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e19-v6si1588070pga.573.2018.05.08.08.32.55; Tue, 08 May 2018 08:33:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1ThP+/G+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932127AbeEHPPw (ORCPT + 99 others); Tue, 8 May 2018 11:15:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:54304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751723AbeEHPPv (ORCPT ); Tue, 8 May 2018 11:15:51 -0400 Received: from ceres.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D7D8B21835; Tue, 8 May 2018 15:15:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1525792550; bh=qTp9YhcRv6hvK1IFDPnT6B8Kw3gjSeXbF8JLLYDSTsU=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=1ThP+/G+6gbFr14/DVp33muW8iQufRjCvB6k3yDQhP9uYuD1+xuABXqbuBHvx4SFD dp2BmVYFjD00VYmBnoVJ2Stj6U3c0saROQ40YViRUqbGBSdAQS13igoy6xtC0BXYt6 nwCacdMcv7O3env5Zx9GQ6o1Q92bDaWfGLK/xxvY= Message-ID: <129bf5c889e3317d6372a2f251cbd56458347224.camel@kernel.org> Subject: Re: [PATCH v2 32/35] Partially revert "locks: fix file locking on overlayfs" From: Jeff Layton To: Miklos Szeredi , linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Al Viro Date: Tue, 08 May 2018 11:15:47 -0400 In-Reply-To: <20180507083807.28792-33-mszeredi@redhat.com> References: <20180507083807.28792-1-mszeredi@redhat.com> <20180507083807.28792-33-mszeredi@redhat.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.1 (3.28.1-2.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-05-07 at 10:38 +0200, Miklos Szeredi wrote: > This partially reverts commit c568d68341be7030f5647def68851e469b21ca11. > > Overlayfs files will now automatically get the correct locks, no need to > hack overlay support in VFS. > > It is a partial revert, because it leaves the locks_inode() calls in place > and defines locks_inode() to file_inode(). We could revert those as well, > but it would be unnecessary code churn and it makes sense to document that > we are getting the inode for locking purposes. > > Signed-off-by: Miklos Szeredi > --- > fs/locks.c | 17 ++++++----------- > fs/overlayfs/super.c | 2 +- > include/linux/fs.h | 13 +------------ > include/uapi/linux/fs.h | 1 - > 4 files changed, 8 insertions(+), 25 deletions(-) > > diff --git a/fs/locks.c b/fs/locks.c > index 9c0e5f3da66c..40bcbaaa3f52 100644 > --- a/fs/locks.c > +++ b/fs/locks.c > @@ -139,11 +139,6 @@ > #define IS_OFDLCK(fl) (fl->fl_flags & FL_OFDLCK) > #define IS_REMOTELCK(fl) (fl->fl_pid <= 0) > > -static inline bool is_remote_lock(struct file *filp) > -{ > - return likely(!(filp->f_path.dentry->d_sb->s_flags & SB_NOREMOTELOCK)); > -} > - > static bool lease_breaking(struct file_lock *fl) > { > return fl->fl_flags & (FL_UNLOCK_PENDING | FL_DOWNGRADE_PENDING); > @@ -1875,7 +1870,7 @@ EXPORT_SYMBOL(generic_setlease); > int > vfs_setlease(struct file *filp, long arg, struct file_lock **lease, void **priv) > { > - if (filp->f_op->setlease && is_remote_lock(filp)) > + if (filp->f_op->setlease) > return filp->f_op->setlease(filp, arg, lease, priv); > else > return generic_setlease(filp, arg, lease, priv); > @@ -2022,7 +2017,7 @@ SYSCALL_DEFINE2(flock, unsigned int, fd, unsigned int, cmd) > if (error) > goto out_free; > > - if (f.file->f_op->flock && is_remote_lock(f.file)) > + if (f.file->f_op->flock) > error = f.file->f_op->flock(f.file, > (can_sleep) ? F_SETLKW : F_SETLK, > lock); > @@ -2048,7 +2043,7 @@ SYSCALL_DEFINE2(flock, unsigned int, fd, unsigned int, cmd) > */ > int vfs_test_lock(struct file *filp, struct file_lock *fl) > { > - if (filp->f_op->lock && is_remote_lock(filp)) > + if (filp->f_op->lock) > return filp->f_op->lock(filp, F_GETLK, fl); > posix_test_lock(filp, fl); > return 0; > @@ -2191,7 +2186,7 @@ int fcntl_getlk(struct file *filp, unsigned int cmd, struct flock *flock) > */ > int vfs_lock_file(struct file *filp, unsigned int cmd, struct file_lock *fl, struct file_lock *conf) > { > - if (filp->f_op->lock && is_remote_lock(filp)) > + if (filp->f_op->lock) > return filp->f_op->lock(filp, cmd, fl); > else > return posix_lock_file(filp, fl, conf); > @@ -2513,7 +2508,7 @@ locks_remove_flock(struct file *filp, struct file_lock_context *flctx) > if (list_empty(&flctx->flc_flock)) > return; > > - if (filp->f_op->flock && is_remote_lock(filp)) > + if (filp->f_op->flock) > filp->f_op->flock(filp, F_SETLKW, &fl); > else > flock_lock_inode(inode, &fl); > @@ -2600,7 +2595,7 @@ EXPORT_SYMBOL(posix_unblock_lock); > */ > int vfs_cancel_lock(struct file *filp, struct file_lock *fl) > { > - if (filp->f_op->lock && is_remote_lock(filp)) > + if (filp->f_op->lock) > return filp->f_op->lock(filp, F_CANCELLK, fl); > return 0; > } > diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c > index 7779fc610767..f2a83fabe2eb 100644 > --- a/fs/overlayfs/super.c > +++ b/fs/overlayfs/super.c > @@ -1479,7 +1479,7 @@ static int ovl_fill_super(struct super_block *sb, void *data, int silent) > sb->s_op = &ovl_super_operations; > sb->s_xattr = ovl_xattr_handlers; > sb->s_fs_info = ofs; > - sb->s_flags |= SB_POSIXACL | SB_NOREMOTELOCK; > + sb->s_flags |= SB_POSIXACL; > > err = -ENOMEM; > root_dentry = d_make_root(ovl_new_inode(sb, S_IFDIR, 0)); > diff --git a/include/linux/fs.h b/include/linux/fs.h > index ba3078693d4a..417e692a606a 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -1050,17 +1050,7 @@ struct file_lock_context { > > extern void send_sigio(struct fown_struct *fown, int fd, int band); > > -/* > - * Return the inode to use for locking > - * > - * For overlayfs this should be the overlay inode, not the real inode returned > - * by file_inode(). For any other fs file_inode(filp) and locks_inode(filp) are > - * equal. > - */ > -static inline struct inode *locks_inode(const struct file *f) > -{ > - return f->f_path.dentry->d_inode; > -} > +#define locks_inode(f) file_inode(f) > > #ifdef CONFIG_FILE_LOCKING > extern int fcntl_getlk(struct file *, unsigned int, struct flock *); > @@ -1300,7 +1290,6 @@ extern int send_sigurg(struct fown_struct *fown); > > /* These sb flags are internal to the kernel */ > #define SB_SUBMOUNT (1<<26) > -#define SB_NOREMOTELOCK (1<<27) > #define SB_NOSEC (1<<28) > #define SB_BORN (1<<29) > #define SB_ACTIVE (1<<30) > diff --git a/include/uapi/linux/fs.h b/include/uapi/linux/fs.h > index d2a8313fabd7..2840ddcece73 100644 > --- a/include/uapi/linux/fs.h > +++ b/include/uapi/linux/fs.h > @@ -134,7 +134,6 @@ struct inodes_stat_t { > > /* These sb flags are internal to the kernel */ > #define MS_SUBMOUNT (1<<26) > -#define MS_NOREMOTELOCK (1<<27) > #define MS_NOSEC (1<<28) > #define MS_BORN (1<<29) > #define MS_ACTIVE (1<<30) Acked-by: Jeff Layton