Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3481194imm; Tue, 29 May 2018 08:00:35 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq8meNskYWGK5PjFp5RA8ZY0aYZfemHKo4ZYSWDNhVIOL30mwm3EZLKRhcViiBn1GaLcuO1 X-Received: by 2002:a63:5f54:: with SMTP id t81-v6mr14190999pgb.108.1527606035303; Tue, 29 May 2018 08:00:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527606035; cv=none; d=google.com; s=arc-20160816; b=Iu5q4Vh4lksQ/A+aKzCzd+e7+3Yn80o0Pf0Hf0nVgeMZ4mugwR4h/N8r1Dd2PMA0hG 4UII+kenNs+PTL3idJ4n1DoWlQnfnK+PX82ghHt4k/88ljzBiXmXkF6XfLAc6nHT7ALq m+iHS1S3iXNg1DaNvcTkiFTKtUANVN81mPlaN1aM8hwgZ6R2sqg/nAourM+e0kzVRk6D P5kRXTEDI8jBSR92bO9CU7Jgue775tdVt54TG8EWQJsHDxD+vsypvzCXQH0s7IoKhc2/ fIauoWvpalKJSPtYyuokEBY4yA7n25gN8JWrS4UkkWGsQ3LO+lSSJgMKaD1lHtx1K2+0 oZ8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=ylIQzqFlNWtR3XOy2OS8/zoI3po2thy1SYZ3oZoDtzA=; b=RKn4Us/7B/Mw7fAhOOdRlsQifhVU/Z/lyvaguK7VBy8hE8V/7IHpBxLA/UIJDJO545 zliUCGb/UVVDh2iESeW+ZcDf6C2mCbmbh7vHsFVUmGx71F5UP63lNQU3MokI8DtQDrMs 5aMpvYxkC+nQHFzTFi1kaZ1rEUZRTYmeph9ZdqNG69jagsZKqXwSOzUREBac5NoFNqoD DsMN4RwILEDboOwlvcsqLLi7IwbMlQoOhJ2U+/rdAOl3lNbnkbEQIzYoipS7EBPvXaCM FYvAmXQEya4rCK+aoHH/MrhvTCgiHh40NeVZymF3cxgisRC1cnF2WxQVQwj8IBFbaUdT 1pdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f10-v6si6820667pgs.655.2018.05.29.08.00.20; Tue, 29 May 2018 08:00:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964844AbeE2O6e (ORCPT + 99 others); Tue, 29 May 2018 10:58:34 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:39398 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S936531AbeE2OqX (ORCPT ); Tue, 29 May 2018 10:46:23 -0400 Received: by mail-wm0-f66.google.com with SMTP id f8-v6so41462421wmc.4 for ; Tue, 29 May 2018 07:46:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=ylIQzqFlNWtR3XOy2OS8/zoI3po2thy1SYZ3oZoDtzA=; b=LuveTzM/SvGRXBtP9DUNpRFWCEQnSylDWY8bD3lrJHqFzR97SnWWMv+q39aV7t97gJ S+niji8gh6oCG9x3YrGOTci7Ec373ZGVu8D6lStD4OsSno2b63OgQpefm6inDseqmso2 mwZ9NSzeR6431s8eOWnsTtXM3Xmwz2u7AbZm2MW2k5kGqeRntDcjkiLHvxxpMdvVb85R vypaD9v5VtEmITyTyKd//I+rk68xvz4PZFfI3/4LVZ/f0DnL8qpaLIrx8hnxOaxOtC8L 7HEzEYx5gLLxc9l0RX7S3nMMKlqWwTipSDbA62qrRwLrAGF8eX4qjL1R63CoZIQVFpQL C0LA== X-Gm-Message-State: ALKqPwett7Rs/mwBSX7Rh30KSP2zOwze6IwHwEOtvjrMe5n+lOtTWxDy fzn7Aqjv2IrYGBuiQhYVEXes+w== X-Received: by 2002:a1c:7204:: with SMTP id n4-v6mr10999568wmc.138.1527605181673; Tue, 29 May 2018 07:46:21 -0700 (PDT) Received: from veci.piliscsaba.redhat.com (catv-176-63-54-97.catv.broadband.hu. [176.63.54.97]) by smtp.gmail.com with ESMTPSA id n71-v6sm20942227wmi.14.2018.05.29.07.46.20 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 29 May 2018 07:46:21 -0700 (PDT) From: Miklos Szeredi To: linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 06/28] ovl: Add helper ovl_already_copied_up() Date: Tue, 29 May 2018 16:45:50 +0200 Message-Id: <20180529144612.16675-7-mszeredi@redhat.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180529144612.16675-1-mszeredi@redhat.com> References: <20180529144612.16675-1-mszeredi@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vivek Goyal There are couple of places where we need to know if file is already copied up (in lockless manner). Right now its open coded and there are only two conditions to check. Soon this patch series will introduce another condition to check and Amir wants to introduce one more. So introduce a helper instead to check this so that code is easier to read. Signed-off-by: Vivek Goyal Reviewed-by: Amir Goldstein Signed-off-by: Miklos Szeredi --- fs/overlayfs/copy_up.c | 20 ++------------------ fs/overlayfs/overlayfs.h | 1 + fs/overlayfs/util.c | 26 +++++++++++++++++++++++++- 3 files changed, 28 insertions(+), 19 deletions(-) diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c index 38cfd1acc196..6247617fea0b 100644 --- a/fs/overlayfs/copy_up.c +++ b/fs/overlayfs/copy_up.c @@ -761,21 +761,7 @@ int ovl_copy_up_flags(struct dentry *dentry, int flags) struct dentry *next; struct dentry *parent = NULL; - /* - * Check if copy-up has happened as well as for upper alias (in - * case of hard links) is there. - * - * Both checks are lockless: - * - false negatives: will recheck under oi->lock - * - false positives: - * + ovl_dentry_upper() uses memory barriers to ensure the - * upper dentry is up-to-date - * + ovl_dentry_has_upper_alias() relies on locking of - * upper parent i_rwsem to prevent reordering copy-up - * with rename. - */ - if (ovl_dentry_upper(dentry) && - (ovl_dentry_has_upper_alias(dentry) || disconnected)) + if (ovl_already_copied_up(dentry)) break; next = dget(dentry); @@ -803,9 +789,7 @@ int ovl_copy_up_flags(struct dentry *dentry, int flags) static bool ovl_open_need_copy_up(struct dentry *dentry, int flags) { /* Copy up of disconnected dentry does not set upper alias */ - if (ovl_dentry_upper(dentry) && - (ovl_dentry_has_upper_alias(dentry) || - (dentry->d_flags & DCACHE_DISCONNECTED))) + if (ovl_already_copied_up(dentry)) return false; if (special_file(d_inode(dentry)->i_mode)) diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h index 9172d3d5d870..2a9c5a80ae48 100644 --- a/fs/overlayfs/overlayfs.h +++ b/fs/overlayfs/overlayfs.h @@ -238,6 +238,7 @@ bool ovl_is_whiteout(struct dentry *dentry); struct file *ovl_path_open(struct path *path, int flags); int ovl_copy_up_start(struct dentry *dentry); void ovl_copy_up_end(struct dentry *dentry); +bool ovl_already_copied_up(struct dentry *dentry); bool ovl_check_origin_xattr(struct dentry *dentry); bool ovl_check_dir_xattr(struct dentry *dentry, const char *name); int ovl_check_setxattr(struct dentry *dentry, struct dentry *upperdentry, diff --git a/fs/overlayfs/util.c b/fs/overlayfs/util.c index 25d202b47326..43235294e77b 100644 --- a/fs/overlayfs/util.c +++ b/fs/overlayfs/util.c @@ -377,13 +377,37 @@ struct file *ovl_path_open(struct path *path, int flags) return dentry_open(path, flags | O_NOATIME, current_cred()); } +bool ovl_already_copied_up(struct dentry *dentry) +{ + bool disconnected = dentry->d_flags & DCACHE_DISCONNECTED; + + /* + * Check if copy-up has happened as well as for upper alias (in + * case of hard links) is there. + * + * Both checks are lockless: + * - false negatives: will recheck under oi->lock + * - false positives: + * + ovl_dentry_upper() uses memory barriers to ensure the + * upper dentry is up-to-date + * + ovl_dentry_has_upper_alias() relies on locking of + * upper parent i_rwsem to prevent reordering copy-up + * with rename. + */ + if (ovl_dentry_upper(dentry) && + (ovl_dentry_has_upper_alias(dentry) || disconnected)) + return true; + + return false; +} + int ovl_copy_up_start(struct dentry *dentry) { struct ovl_inode *oi = OVL_I(d_inode(dentry)); int err; err = mutex_lock_interruptible(&oi->lock); - if (!err && ovl_dentry_has_upper_alias(dentry)) { + if (!err && ovl_already_copied_up(dentry)) { err = 1; /* Already copied up */ mutex_unlock(&oi->lock); } -- 2.14.3