Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1705281pxj; Wed, 19 May 2021 11:57:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwPMmcpfjviIBng3fjbtNNCortNCq+RxHy61iRmQn+dXg3JyDzY5edgYZbfczx2RidK+C7U X-Received: by 2002:aa7:dc15:: with SMTP id b21mr538701edu.350.1621450622415; Wed, 19 May 2021 11:57:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621450622; cv=none; d=google.com; s=arc-20160816; b=uKQAk1WIBZCkiGq2+RWbaiSKDzKUdAgggDx2pNvKOadipE1Cyk3/enrv0nc3tg4nOE HJDVRhDPNuvp8T0qEHjEGSrJkXuNiY+8L0oSEfB1EMBCB6xhBxpdUZLjj25xbdd1W53O tKiRWRJ8ybKhjDyQ1HMyoHptb/bScQo4q7UfAVGvs8XyGYOlM6XCeTS7VQP5xTNZFr+a CEd5MnFPtitDEJ81i2jd96SyvX51zeON178z/V6HmZ3muZ3quOCJFajZRdrfhIQcM65f iOCyugl/zCEMojIfUr/Eyi/Y0JiVxFDE1DjbLs/YSIzs7kY2IjLgTTKzkuQZbFmWqouL h2qA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=N9Oeq0EFaWdMNliRClJbiorlOQO45kyUrj++t2y8epY=; b=V+MxROcZw8+Pewhh/5ftdqtMKmyUB8cLzzYQciRi59yat3m13k0OxZplTvsgto4YFF S06FnVzGKPD6H3HkULlmD49AsO+iL1SufqIju4mSF7kpwURLyqiXwdj83Otdfo0L32tD qtg2MYwCs6UDux+7r3Yohk9rD4zQY70D7JlemuRDJIfMjE5EDhp781iNy9sagF/fACGZ 0jTE/cTEJN0ItahqQl4al/gKwNGDzJBMJ20WhLLn8iqfp0ObcM15XOBp83mpOCBfgYec 7pUsMRrafEoad6VndQrO4aVjtJLD20NtcDO7lXb9MOIlUB49fGXJLmwvR3Er9mlcIQ69 ewnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ds10si420125ejc.559.2021.05.19.11.56.38; Wed, 19 May 2021 11:57:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352914AbhESAwi (ORCPT + 99 others); Tue, 18 May 2021 20:52:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53904 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234642AbhESAu5 (ORCPT ); Tue, 18 May 2021 20:50:57 -0400 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BDFB6C06175F; Tue, 18 May 2021 17:49:37 -0700 (PDT) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94 #2 (Red Hat Linux)) id 1ljAOT-00G4FY-K4; Wed, 19 May 2021 00:49:01 +0000 From: Al Viro To: Linus Torvalds Cc: Jia He , Petr Mladek , Steven Rostedt , Sergey Senozhatsky , Andy Shevchenko , Rasmus Villemoes , Jonathan Corbet , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , "Eric W . Biederman" , "Darrick J. Wong" , "Peter Zijlstra (Intel)" , Ira Weiny , Eric Biggers , "Ahmed S. Darwish" , "open list:DOCUMENTATION" , Linux Kernel Mailing List , linux-s390 , linux-fsdevel Subject: [PATCH 03/14] d_path: regularize handling of root dentry in __dentry_path() Date: Wed, 19 May 2021 00:48:50 +0000 Message-Id: <20210519004901.3829541-3-viro@zeniv.linux.org.uk> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210519004901.3829541-1-viro@zeniv.linux.org.uk> References: <20210519004901.3829541-1-viro@zeniv.linux.org.uk> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org All path-forming primitives boil down to sequence of prepend_name() on dentries encountered along the way toward root. Each time we prepend / + dentry name to the buffer. Normally that does exactly what we want, but there's a corner case when we don't call prepend_name() at all (in case of __dentry_path() that happens if we are given root dentry). We obviously want to end up with "/", rather than "", so this corner case needs to be handled. __dentry_path() used to manually put '/' in the end of buffer before doing anything else, to be overwritten by the first call of prepend_name() if one happens and to be left in place if we don't call prepend_name() at all. That required manually checking that we had space in the buffer (prepend_name() and prepend() take care of such checks themselves) and lead to clumsy keeping track of return value. A better approach is to check if the main loop has added anything into the buffer and prepend "/" if it hasn't. A side benefit of using prepend() is that it does the right thing if we'd already run out of buffer, making the overflow-handling logics simpler. Signed-off-by: Al Viro --- fs/d_path.c | 21 +++++---------------- 1 file changed, 5 insertions(+), 16 deletions(-) diff --git a/fs/d_path.c b/fs/d_path.c index 1a1cf05e7780..b3324ae7cfe2 100644 --- a/fs/d_path.c +++ b/fs/d_path.c @@ -329,31 +329,22 @@ char *simple_dname(struct dentry *dentry, char *buffer, int buflen) static char *__dentry_path(const struct dentry *d, char *p, int buflen) { const struct dentry *dentry; - char *end, *retval; + char *end; int len, seq = 0; - int error = 0; - - if (buflen < 1) - goto Elong; rcu_read_lock(); restart: dentry = d; end = p; len = buflen; - /* Get '/' right */ - retval = end-1; - *retval = '/'; read_seqbegin_or_lock(&rename_lock, &seq); while (!IS_ROOT(dentry)) { const struct dentry *parent = dentry->d_parent; prefetch(parent); - error = prepend_name(&end, &len, &dentry->d_name); - if (error) + if (unlikely(prepend_name(&end, &len, &dentry->d_name) < 0)) break; - retval = end; dentry = parent; } if (!(seq & 1)) @@ -363,11 +354,9 @@ static char *__dentry_path(const struct dentry *d, char *p, int buflen) goto restart; } done_seqretry(&rename_lock, seq); - if (error) - goto Elong; - return retval; -Elong: - return ERR_PTR(-ENAMETOOLONG); + if (len == buflen) + prepend(&end, &len, "/", 1); + return len >= 0 ? end : ERR_PTR(-ENAMETOOLONG); } char *dentry_path_raw(const struct dentry *dentry, char *buf, int buflen) -- 2.11.0