Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1849444ybt; Sat, 27 Jun 2020 23:31:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQra4Od2Un41kz7u4NRGWmxY44HmuwYxa48Bye0wspxsp2gb6501zXlJQlMbLRXpNMDLMv X-Received: by 2002:a17:906:7746:: with SMTP id o6mr9390283ejn.75.1593325915227; Sat, 27 Jun 2020 23:31:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593325915; cv=none; d=google.com; s=arc-20160816; b=XNh/4QtUdBkTQiG6EJIH66JCkdqVOorqBb2g8OwiRgw8bAprdU9LhzQ3ds+/Yqpb35 1csERfZpvSsuPAyefiLWjq036+6d04oEOzvxTghbp6mPxo+bEuyUf2Q7pLI0aodSSjaL XquNzNdPzAbjjrQ6yPLBMNmDpLGKJ/dDWTGyr9f6u/Buf2dYfAKIhZvIinWWgLYO58Y1 BtgdKafhRb65II3tYdFBQAHhp9Izao/mWLDCmzensVbP7vKYLOIxIDM1taZ3O4b07JOV O/X56KKS3d18CSYJAkFTEXdSuxnJURYQPSXNqK0OB8MCxYZ9lQ14G3L5WJ/Dyiwovnho O4JQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=lQqlt46FUYW1wrJU78Tt3Mwl+qUGao1zNA39z/IzARs=; b=OlvvrWGv9qY5Kzj4sPkFagIy8lI38yXyUJBMrAAiTc+D/SlIasbFCKESPitoML2nn0 GX4Di6jgtxDfUnfke7vPAFYc6NMx+er9Lgnk8Nh7Zwcm/tNDQwkByNSulG7KNqS8nWm8 NHL8RIGYlcEzXcjpE+N1LtV38uEww49iwM/hZgXWrjFML130sj4CcnP5FFUl2Gn/Q0lU 8f+xQ4+suknsZzPeEkavf8q4Jd+xY+HrhPN5ev7WqYRQCBXpy5OCCCR87RXCVLnw2lyc pv5UqKVAo/ReZpsvHWnR0x7uXiAWFsWGjt1yomP7EGyS86Iqy0jmXg7HP7Tdh2UpZxYj Dfzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w9si12198948edr.171.2020.06.27.23.31.31; Sat, 27 Jun 2020 23:31:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725999AbgF1G2m (ORCPT + 99 others); Sun, 28 Jun 2020 02:28:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725913AbgF1G2l (ORCPT ); Sun, 28 Jun 2020 02:28:41 -0400 Received: from nautica.notk.org (ipv6.notk.org [IPv6:2001:41d0:1:7a93::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 985B1C061794 for ; Sat, 27 Jun 2020 23:28:41 -0700 (PDT) Received: by nautica.notk.org (Postfix, from userid 1001) id D6CADC01A; Sun, 28 Jun 2020 08:28:39 +0200 (CEST) Date: Sun, 28 Jun 2020 08:28:24 +0200 From: Dominique Martinet To: Jianyong Wu Cc: ericvh@gmail.com, lucho@ionkov.net, v9fs-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org, Steve.Capper@arm.com, Kaly.Xin@arm.com, justin.he@arm.com, wei.chen@arm.com Subject: Re: [RFC PATCH 1/2] 9p: retrieve fid from file when file instance exist. Message-ID: <20200628062824.GB13335@nautica> References: <20200628020608.36512-1-jianyong.wu@arm.com> <20200628020608.36512-2-jianyong.wu@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200628020608.36512-2-jianyong.wu@arm.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Jianyong Wu wrote on Sun, Jun 28, 2020: > In the current setattr implementation in 9p, fid will always retrieved from > dentry no matter file instance exist or not when setattr. There will > be some info related to open file instance dropped. so it's better > to retrieve fid from file instance if file instance is passed to setattr. > > for example: > fd=open("tmp", O_RDWR); > ftruncate(fd, 10); > > the file context related with fd info will lost as fid will always be > retrieved from dentry, then the backend can't get the info of file context. > it is against the original intention of user and may lead to bug. I agree on principle, this makes more sense to use the file's fid. Just a comment below, but while I'm up in commit message I'll also be annoying with it -- please try to fix grammar mistakes for next patches/version (mostly missing some 'be' for future passive form; but I don't understand why you use future at all and some passive forms could probably be made active to simplify... Anyway we're not here to discuss English grammar but words missing out is sloppy and that gives a bad impression for no good reason) > > Signed-off-by: Jianyong Wu > --- > fs/9p/vfs_inode.c | 5 ++++- > fs/9p/vfs_inode_dotl.c | 5 ++++- > 2 files changed, 8 insertions(+), 2 deletions(-) > > diff --git a/fs/9p/vfs_inode.c b/fs/9p/vfs_inode.c > index c9255d399917..010869389523 100644 > --- a/fs/9p/vfs_inode.c > +++ b/fs/9p/vfs_inode.c > @@ -1100,7 +1100,10 @@ static int v9fs_vfs_setattr(struct dentry *dentry, struct iattr *iattr) > > retval = -EPERM; > v9ses = v9fs_dentry2v9ses(dentry); > - fid = v9fs_fid_lookup(dentry); > + if (iattr->ia_valid & ATTR_FILE) > + fid = iattr->ia_file->private_data; hmm, normally setattr cannot happen on a file that hasn't been opened so private_data should always be set, but it doesn't cost much to play safe and check? e.g. something like this is more conservative: struct p9_fid *fid = NULL; ... if (iattr->ia_valid & ATTR_FILE) { fid = iattr->ia_file->private_data; WARN_ON(!fid); } if (!fid) fid = v9fs_fid_lookup(dentry); What do you think? -- Dominique