Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp2438094ybi; Thu, 18 Jul 2019 08:22:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqyIpQvpC4PbajM4vnIL369BSfRI9g67UVm8pk5fYKwXoWRFtmBOxMnofz1HbpPtSFAgemzo X-Received: by 2002:a17:90a:4f0e:: with SMTP id p14mr49998036pjh.40.1563463378307; Thu, 18 Jul 2019 08:22:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563463378; cv=none; d=google.com; s=arc-20160816; b=Smc7m7X1eLxlwhfz5x8i0bevNTpC7LhTuxeMFRNo8vIo0otLzP+boSnp+twWmEMiEJ 8wAbZrovAVjeZ0Ay3QSeC0cawoAmQ/V1uTo4AmGwA+WzwtUituf5/4VGpdayOKe7gfxh IzhhYiLlcakyX/J4OdGMOpv3P5D1aGegGWbdIhc8Wr3jzdj9qGjVRtjUv0RryQAzvNLF OJBL1g7xuuKVzI7l42j8SnI9yv3iLy0xsY/COdEzD+R6c+msddQVKTbr/aENGDzhohpz tedwlrh2/lRHOPN48vyxRaCkzM+6dRdKVP1wZfHWYGzy0A6EgKBdHsn80Fji7vK2Bel0 O9MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=JGztH7tgoQtkbLFBE/MRdJ5TODdB2l18b0mOfwp0RC8=; b=iR8JYEf2Lg24XTJfbvmIXZJNtf3k0GffY5LsgeHu4ejn2ykU4Oh60R8TZuJdfwgt3I 06Knc9YoqSdsTo7R6loq9rlkfDWc9NolZsjpvdYRI+1p6SJkAF6CzSAUKOvRdBwkXrlA q+nfYc9CP/Oeh7rR/44wZK355UVcybYKPoqtRCYBQQztHx4n3tyhPLuKgggBUaF1GJdj VNLcEuFvQ7M0EftG3xfbrPgnaLaKtCClHatpqej4qy4/pW1Y376kLvCycioOOXSgh7ui K9/W096SDxg4n0P/j7Qd+TrROdmVGkjdaYOoR1HyIzu5rCxrWwkXk6swrfTcPzT5HdKa tHig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z185si1043475pfb.109.2019.07.18.08.22.41; Thu, 18 Jul 2019 08:22:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390694AbfGRPWW (ORCPT + 99 others); Thu, 18 Jul 2019 11:22:22 -0400 Received: from mx1.mailbox.org ([80.241.60.212]:9384 "EHLO mx1.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726040AbfGRPWV (ORCPT ); Thu, 18 Jul 2019 11:22:21 -0400 Received: from smtp2.mailbox.org (smtp2.mailbox.org [IPv6:2001:67c:2050:105:465:1:2:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mx1.mailbox.org (Postfix) with ESMTPS id A31DB4DF37; Thu, 18 Jul 2019 17:22:15 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by hefe.heinlein-support.de (hefe.heinlein-support.de [91.198.250.172]) (amavisd-new, port 10030) with ESMTP id xmIYYji9PWVu; Thu, 18 Jul 2019 17:22:09 +0200 (CEST) Date: Fri, 19 Jul 2019 01:21:23 +1000 From: Aleksa Sarai To: Rasmus Villemoes Cc: Al Viro , Jeff Layton , "J. Bruce Fields" , Arnd Bergmann , David Howells , Shuah Khan , Shuah Khan , Christian Brauner , Eric Biederman , Andy Lutomirski , Andrew Morton , Alexei Starovoitov , Kees Cook , Jann Horn , Tycho Andersen , David Drysdale , Chanho Min , Oleg Nesterov , Aleksa Sarai , Linus Torvalds , containers@lists.linux-foundation.org, linux-alpha@vger.kernel.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-ia64@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, linux-xtensa@linux-xtensa.org, sparclinux@vger.kernel.org Subject: Re: [PATCH v9 08/10] open: openat2(2) syscall Message-ID: <20190718152123.m33t44dapy6y4nwy@yavin> References: <20190706145737.5299-1-cyphar@cyphar.com> <20190706145737.5299-9-cyphar@cyphar.com> <845e4364-685f-343b-46fb-c418766dce3e@rasmusvillemoes.dk> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="x55cx7xfpotu25go" Content-Disposition: inline In-Reply-To: <845e4364-685f-343b-46fb-c418766dce3e@rasmusvillemoes.dk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --x55cx7xfpotu25go Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2019-07-18, Rasmus Villemoes wrote: > On 06/07/2019 16.57, Aleksa Sarai wrote: > > --- a/fs/open.c > > +++ b/fs/open.c > > @@ -928,24 +928,32 @@ struct file *open_with_fake_path(const struct pat= h *path, int flags, > > } > > EXPORT_SYMBOL(open_with_fake_path); > > =20 > > -static inline int build_open_flags(int flags, umode_t mode, struct ope= n_flags *op) > > +static inline int build_open_flags(struct open_how how, struct open_fl= ags *op) > > { >=20 > How does passing such a huge struct by value affect code generation? > Does gcc actually inline the function (and does it even inline the old > one given that it's already non-trivial and has more than one caller). I'm not sure, but I'll just do what you suggested with passing a const reference and just copying the few fields that actually are touched by this function. > > =20 > > diff --git a/include/linux/fcntl.h b/include/linux/fcntl.h > > index 2868ae6c8fc1..e59917292213 100644 > > --- a/include/linux/fcntl.h > > +++ b/include/linux/fcntl.h > > @@ -4,13 +4,26 @@ > > =20 > > #include > > =20 > > -/* list of all valid flags for the open/openat flags argument: */ > > +/* Should open_how.mode be set for older syscalls wrappers? */ > > +#define OPENHOW_MODE(flags, mode) \ > > + (((flags) | (O_CREAT | __O_TMPFILE)) ? (mode) : 0) > > + >=20 > Typo: (((flags) & (O_CREAT | __O_TMPFILE)) ? (mode) : 0) Yup, thanks. I'm not sure why my tests passed on v9 with this bug (they didn't pass in my v10-draft until I fixed this bug earlier today). >=20 > > +/** > > + * Arguments for how openat2(2) should open the target path. If @extra= is zero, > > + * then openat2(2) is identical to openat(2). > > + * > > + * @flags: O_* flags (unknown flags ignored). > > + * @mode: O_CREAT file mode (ignored otherwise). >=20 > should probably say "O_CREAT/O_TMPFILE file mode". :+1: > > + * @upgrade_mask: restrict how the O_PATH may be re-opened (ignored ot= herwise). > > + * @resolve: RESOLVE_* flags (-EINVAL on unknown flags). > > + * @reserved: reserved for future extensions, must be zeroed. > > + */ > > +struct open_how { > > + __u32 flags; > > + union { > > + __u16 mode; > > + __u16 upgrade_mask; > > + }; > > + __u16 resolve; >=20 > So mode and upgrade_mask are naturally u16 aka mode_t. And yes, they > probably never need to be used together, so the union works. That then > makes the next member 2-byte aligned, so using a u16 for the resolve > flags brings us to an 8-byte boundary, and 11 unused flag bits should be > enough for a while. But it seems a bit artificial to cram all this > together and then add 56 bytes of reserved space. I will happily admit that padding to 64 bytes is probably _very_ extreme (I picked it purely because it's the size of a cache-line so anything bigger makes even less sense). I was hoping someone would suggest a better size once I posted the patchset, since I couldn't think of a good answer myself. Do you have any suggestions for a better layout or padding size? --=20 Aleksa Sarai Senior Software Engineer (Containers) SUSE Linux GmbH --x55cx7xfpotu25go Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSxZm6dtfE8gxLLfYqdlLljIbnQEgUCXTCOcAAKCRCdlLljIbnQ EllZAP4qSUDEVdU4aP8+s9uysbQoCi6l463vJM+jdHxpJ66OfQEAxlI5lXwcL6G0 jPCtI0Vs5LI5kpJuE2k98ol8BVMyZAg= =2lKS -----END PGP SIGNATURE----- --x55cx7xfpotu25go--