Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1645052imu; Tue, 6 Nov 2018 01:53:27 -0800 (PST) X-Google-Smtp-Source: AJdET5eVKgRJE9T9dtgAo7XTTd7Ql4e+Ow3ZhrKjPvfywtk+FU2Wye0woe/6bzB2QT01RDbY3teJ X-Received: by 2002:a63:5f41:: with SMTP id t62mr23267718pgb.76.1541498007312; Tue, 06 Nov 2018 01:53:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541498007; cv=none; d=google.com; s=arc-20160816; b=Kn7HzVJetv3J3zkW05v3fUDyQz9X8NgmxwxhIM3FGL5eopYyAn1okk2a/jo751yvty /s2r4dz8rC7ieAs1103EynbciLll97QjN7i9z6lSNaUSw+uAHzS87Qc9zOhWGYQZpE0d vI1uwdfMJcuX4LEOrHT1kWQ20sbIY1GKWVWZahfYskcSURVpMBgEbw+fm269v6O10l4v e6lgcRMICslBSU4UicT5IwA1SnBpRUZv/QmWmuCWDXkBx7ZjkEmOWHdXHW/TrZdzZ6l2 AhxF2RkzSk7vnC+zWOOtFLRnbqim5g9q9rkTTf+wpM1NyTwuq8x8NOcrMBOAYfTwn6Ku ZlzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:to:from:subject; bh=S5UtllbPPwONHheR6GJeGkJKidsixJFXN+wy0XklUg4=; b=jN6k7b7TtIWZ1A0uJElZbDygKRjkC4xqTZiJDFxgy6XQR2KLGtdrWHavDaQNpd/uQC lwQ/YwD83RqOFZO79ix1Ba5UJheO0Fi8gjhWE6lUo8xpDv8So/ax/0fr1cOiWQrPfO54 B/oT6rFf2k+RNeCjU4nd0e6ynCGEOx4Mx/tV9OGZPHHdPROwUFxLQuBS3sNDyPUzPUi9 j3uW1E2I0D85xj++LPdTwuza3JkWLeas2i4wgmohxavKif/oNccgKfsjgoN8awoBs7PI jU6lfWjvDU/bgTzbC6QQJRvO8N+DcmKIeB0WfHFaitTGfQ9L6AbvzacwJZb9HNIRmzat l7SA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f62-v6si47026839plf.288.2018.11.06.01.53.12; Tue, 06 Nov 2018 01:53:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730411AbeKFTIM (ORCPT + 99 others); Tue, 6 Nov 2018 14:08:12 -0500 Received: from relay.sw.ru ([185.231.240.75]:59850 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729241AbeKFTIM (ORCPT ); Tue, 6 Nov 2018 14:08:12 -0500 Received: from [172.16.25.169] (helo=localhost.localdomain) by relay.sw.ru with esmtp (Exim 4.90_1) (envelope-from ) id 1gJxtj-00035Q-Gx; Tue, 06 Nov 2018 12:43:47 +0300 Subject: [PATCH 2/6] fuse: Add fuse_inode argument to fuse_prepare_release() From: Kirill Tkhai To: miklos@szeredi.hu, ktkhai@virtuozzo.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 06 Nov 2018 12:43:46 +0300 Message-ID: <154149742692.18189.9352264643667833361.stgit@localhost.localdomain> In-Reply-To: <154149673368.18189.14752124997476502777.stgit@localhost.localdomain> References: <154149673368.18189.14752124997476502777.stgit@localhost.localdomain> User-Agent: StGit/0.18 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Here is preparation for next patches, which introduce new fuse_inode::lock for protection fuse_file::write_entry linked into fuse_inode::write_files. This patch just passes new argument to the function. Signed-off-by: Kirill Tkhai --- fs/fuse/cuse.c | 3 ++- fs/fuse/dir.c | 6 ++++-- fs/fuse/file.c | 10 ++++++---- fs/fuse/fuse_i.h | 2 +- 4 files changed, 13 insertions(+), 8 deletions(-) diff --git a/fs/fuse/cuse.c b/fs/fuse/cuse.c index 8f68181256c0..d73eba592ba1 100644 --- a/fs/fuse/cuse.c +++ b/fs/fuse/cuse.c @@ -141,10 +141,11 @@ static int cuse_open(struct inode *inode, struct file *file) static int cuse_release(struct inode *inode, struct file *file) { + struct fuse_inode *fi = get_fuse_inode(inode); struct fuse_file *ff = file->private_data; struct fuse_conn *fc = ff->fc; - fuse_sync_release(ff, file->f_flags); + fuse_sync_release(fi, ff, file->f_flags); fuse_conn_put(fc); return 0; diff --git a/fs/fuse/dir.c b/fs/fuse/dir.c index c71f7e9ee0f7..7058bbf69c3c 100644 --- a/fs/fuse/dir.c +++ b/fs/fuse/dir.c @@ -400,6 +400,7 @@ static int fuse_create_open(struct inode *dir, struct dentry *entry, struct fuse_create_in inarg; struct fuse_open_out outopen; struct fuse_entry_out outentry; + struct fuse_inode *fi; struct fuse_file *ff; /* Userspace expects S_IFREG in create mode */ @@ -451,7 +452,7 @@ static int fuse_create_open(struct inode *dir, struct dentry *entry, &outentry.attr, entry_attr_timeout(&outentry), 0); if (!inode) { flags &= ~(O_CREAT | O_EXCL | O_TRUNC); - fuse_sync_release(ff, flags); + fuse_sync_release(NULL, ff, flags); fuse_queue_forget(fc, forget, outentry.nodeid, 1); err = -ENOMEM; goto out_err; @@ -462,7 +463,8 @@ static int fuse_create_open(struct inode *dir, struct dentry *entry, fuse_dir_changed(dir); err = finish_open(file, entry, generic_file_open); if (err) { - fuse_sync_release(ff, flags); + fi = get_fuse_inode(inode); + fuse_sync_release(fi, ff, flags); } else { file->private_data = ff; fuse_finish_open(inode, file); diff --git a/fs/fuse/file.c b/fs/fuse/file.c index d5bd29610875..fa7580d47d0c 100644 --- a/fs/fuse/file.c +++ b/fs/fuse/file.c @@ -224,7 +224,8 @@ int fuse_open_common(struct inode *inode, struct file *file, bool isdir) return err; } -static void fuse_prepare_release(struct fuse_file *ff, int flags, int opcode) +static void fuse_prepare_release(struct fuse_inode *fi, struct fuse_file *ff, + int flags, int opcode) { struct fuse_conn *fc = ff->fc; struct fuse_req *req = ff->reserved_req; @@ -249,10 +250,11 @@ static void fuse_prepare_release(struct fuse_file *ff, int flags, int opcode) void fuse_release_common(struct file *file, int opcode) { + struct fuse_inode *fi = get_fuse_inode(file_inode(file)); struct fuse_file *ff = file->private_data; struct fuse_req *req = ff->reserved_req; - fuse_prepare_release(ff, file->f_flags, opcode); + fuse_prepare_release(fi, ff, file->f_flags, opcode); if (ff->flock) { struct fuse_release_in *inarg = &req->misc.release.in; @@ -294,10 +296,10 @@ static int fuse_release(struct inode *inode, struct file *file) return 0; } -void fuse_sync_release(struct fuse_file *ff, int flags) +void fuse_sync_release(struct fuse_inode *fi, struct fuse_file *ff, int flags) { WARN_ON(refcount_read(&ff->count) > 1); - fuse_prepare_release(ff, flags, FUSE_RELEASE); + fuse_prepare_release(fi, ff, flags, FUSE_RELEASE); /* * iput(NULL) is a no-op and since the refcount is 1 and everything's * synchronous, we are fine with not doing igrab() here" diff --git a/fs/fuse/fuse_i.h b/fs/fuse/fuse_i.h index 38bd7ca1908a..9e23e871873b 100644 --- a/fs/fuse/fuse_i.h +++ b/fs/fuse/fuse_i.h @@ -817,7 +817,7 @@ struct fuse_file *fuse_file_alloc(struct fuse_conn *fc); void fuse_file_free(struct fuse_file *ff); void fuse_finish_open(struct inode *inode, struct file *file); -void fuse_sync_release(struct fuse_file *ff, int flags); +void fuse_sync_release(struct fuse_inode *fi, struct fuse_file *ff, int flags); /** * Send RELEASE or RELEASEDIR request