Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3499750imm; Tue, 29 May 2018 08:15:44 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrWLn3gS+GCzwmMB7mN1ytGDCdClMUnYhmGeo50tlDqyOHVqLUz7Df/tLz3sHNtBe+Kn2NU X-Received: by 2002:a63:af4b:: with SMTP id s11-v6mr14218172pgo.346.1527606944357; Tue, 29 May 2018 08:15:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527606944; cv=none; d=google.com; s=arc-20160816; b=CAWYWLW1QtkXKNdxuqJLZCRXbPAVYdcl7JzYzsS4XqQv0SPYRrd1CHRKauMWUWKvWB FNQ7mAWPP7JHYfljjhhTVpKP+EXkEBm4aIu2Yw9jqeNUvBsebY62HaVUS0gJ6U3fWW3y MaPXv4QiwwIxkHwE9x9aLvjw6Zck8nLg3gPZU5yBxdlcPmA/IAKi/Kgr8SOuxJG1fXNf QrIBrPomldj8Wxi2galuR+QEzEOkceest6URGNkOmaf+xzlzy01nJpeWpRR86HAnCLOM A33kSmqL81QxqPiTJ7j2O9DmnnwY2WWN8fccV4zja7ipY0J9lyKe4+0UcVCnk7WtxyNf apyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=9P3vxRB9PibNVyJySs2Wss+Tey4o1MCKCXE9cLNib88=; b=FbIXATWZ1NH3THHd1mAN/45yRa+c7shXBjlJhYMSVB2FMX69ZDY/kKnmiRnsXu88R9 of5huFdORWeXrq0MyENbcWsumFZ7I1l9Ar63FyZQZr3c9LLGY0ZZI/GoW3rgq7D7bbEh wvpv2S6u9Q2NG5M21Bt1E9YOVIGem4+GXG7lU14Whoh4fBrVBMY7Gw7N3KqH4nNGEXZ4 4Q+oEmKtK2jeodxX0Q9lo6CC/t326Jo+Zyx3j353ZIvxR2E9K9JXCXc5lXEttPV+QoXn kdjePqfLoSW9ExM1YOuy4fxxm1fhFq8ENS4E+QfUeA89ro9kZ0azZV1M3VyPEAEL1I1p 6qeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q10-v6si3391633pfh.17.2018.05.29.08.15.30; Tue, 29 May 2018 08:15:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936751AbeE2PNb (ORCPT + 99 others); Tue, 29 May 2018 11:13:31 -0400 Received: from mail-wm0-f67.google.com ([74.125.82.67]:39720 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754961AbeE2On7 (ORCPT ); Tue, 29 May 2018 10:43:59 -0400 Received: by mail-wm0-f67.google.com with SMTP id f8-v6so41439145wmc.4 for ; Tue, 29 May 2018 07:43:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=9P3vxRB9PibNVyJySs2Wss+Tey4o1MCKCXE9cLNib88=; b=MnitIxfp5r/YyVqBbkMoRoTv/pKQj2q+gQli0m7JGaIGALbwZkEpn/WpKYCvi3Sv7Y JguvRb484xM40DCp5BCMZWh+PY7yQhfhYEdROMfcC62nZTIYvCrhaobu4gjgb4Uxps8I 8INj/C+9M3jJzXgm6eQefoMHFf8yYAuwzKxqBuNYVeM1Yu3wTh0yMxNYRf4Kbj4hZozx IG4BR5/GO6et+0xr1MPduZzG1+bERk9rehbC/9Ayob/9LvLIT3z3Zof7jDNjPy+i9asg Bp3Bkza3uFs2NF3fOflCby3Tv5n1Kx5ffsdUk0gbEyxkcaN0VTb0JfNQmeKV7I6X4THr WFWA== X-Gm-Message-State: ALKqPwdwfEAaa2KFj4i37cRfKCRhpRMztRBPxPO7lGL1njlozdgkSSP8 9Ld5rTYF4p7s1J5gHt7Ca5wTIA== X-Received: by 2002:a1c:8a03:: with SMTP id m3-v6mr10496148wmd.135.1527605037953; Tue, 29 May 2018 07:43:57 -0700 (PDT) Received: from veci.piliscsaba.redhat.com (catv-176-63-54-97.catv.broadband.hu. [176.63.54.97]) by smtp.gmail.com with ESMTPSA id t198-v6sm18834422wmt.23.2018.05.29.07.43.56 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 29 May 2018 07:43:57 -0700 (PDT) From: Miklos Szeredi To: linux-unionfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 14/39] ovl: stack file ops Date: Tue, 29 May 2018 16:43:14 +0200 Message-Id: <20180529144339.16538-15-mszeredi@redhat.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180529144339.16538-1-mszeredi@redhat.com> References: <20180529144339.16538-1-mszeredi@redhat.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Implement file operations on a regular overlay file. The underlying file is opened separately and cached in ->private_data. It might be worth making an exception for such files when accounting in nr_file to confirm to userspace expectations. We are only adding a small overhead (248bytes for the struct file) since the real inode and dentry are pinned by overlayfs anyway. This patch doesn't have any effect, since the vfs will use d_real() to find the real underlying file to open. The patch at the end of the series will actually enable this functionality. Signed-off-by: Miklos Szeredi --- fs/overlayfs/Makefile | 4 +-- fs/overlayfs/file.c | 76 ++++++++++++++++++++++++++++++++++++++++++++++++ fs/overlayfs/inode.c | 1 + fs/overlayfs/overlayfs.h | 3 ++ 4 files changed, 82 insertions(+), 2 deletions(-) create mode 100644 fs/overlayfs/file.c diff --git a/fs/overlayfs/Makefile b/fs/overlayfs/Makefile index 30802347a020..46e1ff8ac056 100644 --- a/fs/overlayfs/Makefile +++ b/fs/overlayfs/Makefile @@ -4,5 +4,5 @@ obj-$(CONFIG_OVERLAY_FS) += overlay.o -overlay-objs := super.o namei.o util.o inode.o dir.o readdir.o copy_up.o \ - export.o +overlay-objs := super.o namei.o util.o inode.o file.o dir.o readdir.o \ + copy_up.o export.o diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c new file mode 100644 index 000000000000..a0b606885c41 --- /dev/null +++ b/fs/overlayfs/file.c @@ -0,0 +1,76 @@ +/* + * Copyright (C) 2017 Red Hat, Inc. + * + * This program is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2 as published by + * the Free Software Foundation. + */ + +#include +#include +#include +#include "overlayfs.h" + +static struct file *ovl_open_realfile(const struct file *file) +{ + struct inode *inode = file_inode(file); + struct inode *upperinode = ovl_inode_upper(inode); + struct inode *realinode = upperinode ?: ovl_inode_lower(inode); + struct file *realfile; + const struct cred *old_cred; + + old_cred = ovl_override_creds(inode->i_sb); + realfile = path_open(&file->f_path, file->f_flags | O_NOATIME, + realinode, current_cred(), false); + revert_creds(old_cred); + + pr_debug("open(%p[%pD2/%c], 0%o) -> (%p, 0%o)\n", + file, file, upperinode ? 'u' : 'l', file->f_flags, + realfile, IS_ERR(realfile) ? 0 : realfile->f_flags); + + return realfile; +} + +static int ovl_open(struct inode *inode, struct file *file) +{ + struct dentry *dentry = file_dentry(file); + struct file *realfile; + int err; + + err = ovl_open_maybe_copy_up(dentry, file->f_flags); + if (err) + return err; + + /* No longer need these flags, so don't pass them on to underlying fs */ + file->f_flags &= ~(O_CREAT | O_EXCL | O_NOCTTY | O_TRUNC); + + realfile = ovl_open_realfile(file); + if (IS_ERR(realfile)) + return PTR_ERR(realfile); + + file->private_data = realfile; + + return 0; +} + +static int ovl_release(struct inode *inode, struct file *file) +{ + fput(file->private_data); + + return 0; +} + +static loff_t ovl_llseek(struct file *file, loff_t offset, int whence) +{ + struct inode *realinode = ovl_inode_real(file_inode(file)); + + return generic_file_llseek_size(file, offset, whence, + realinode->i_sb->s_maxbytes, + i_size_read(realinode)); +} + +const struct file_operations ovl_file_operations = { + .open = ovl_open, + .release = ovl_release, + .llseek = ovl_llseek, +}; diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c index 6682ea63c4fd..d6a13da0740f 100644 --- a/fs/overlayfs/inode.c +++ b/fs/overlayfs/inode.c @@ -535,6 +535,7 @@ static void ovl_fill_inode(struct inode *inode, umode_t mode, dev_t rdev, switch (mode & S_IFMT) { case S_IFREG: inode->i_op = &ovl_file_inode_operations; + inode->i_fop = &ovl_file_operations; break; case S_IFDIR: diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h index 419c80a0024e..3f6e39a2f51e 100644 --- a/fs/overlayfs/overlayfs.h +++ b/fs/overlayfs/overlayfs.h @@ -377,6 +377,9 @@ struct dentry *ovl_create_real(struct inode *dir, struct dentry *newdentry, int ovl_cleanup(struct inode *dir, struct dentry *dentry); struct dentry *ovl_create_temp(struct dentry *workdir, struct ovl_cattr *attr); +/* file.c */ +extern const struct file_operations ovl_file_operations; + /* copy_up.c */ int ovl_copy_up(struct dentry *dentry); int ovl_copy_up_flags(struct dentry *dentry, int flags); -- 2.14.3