Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp690838pxj; Fri, 11 Jun 2021 09:03:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMzDAIHvBWEyq37RExPpbGE8sF1lQEjHRxrmeY8uYrUG8PBGleQpEoUezZI+mED20R7IeV X-Received: by 2002:a17:906:2988:: with SMTP id x8mr4435802eje.122.1623427437510; Fri, 11 Jun 2021 09:03:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623427437; cv=none; d=google.com; s=arc-20160816; b=hLckqDyAF3wJeWoWtZP/QTdhqGKi4qiJSJAX5Tj32dUw/rCwtO+oKMnDFA0K6dSez2 +MPQFJ+G0WHJuByxHtG8LdTiFK80jMyCYyks6TGyNp4L0Dn32huaqAoc6xq6NZIFu06J 3tyYIpdjh74Ukr7nJfDSAMcbkUxHyI1JY/rw/bCMwmN68o/iJnEee1Zi+OIKPB09lxL4 w0tOq3ZSElgGjw0u5iPlFJjzsBU8V4Sjeo6mvdsM+KKmtJahNYi8BjLh4i5+NiYhs3+T iRgklFkkZmbONtjcAcxM/GCGFOSdsYNs6o8RgXsoiemYDRHh7CIE666AmpFkYGDeIDbi znhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=Jhfgq/SwlbQHSmonA7ZbT1QAZQx8LRFh8VYUt5H7wOw=; b=VksA02HzgrXZqqcLWVfoYhfAuP/CQVTaDe3ekShyWRufMHhmA/WXERKzHM6XBNBJF3 XAqOrcjRxH7E3RnqAK8NX+GpnbDoSZUwVgz3MutM9sOLNqeS4gzAEShANXgS/LrLIDmz jdRJ0oz1j/AcmOvY3xvTFW5mHKoecT1IeETRAFFV5U3s78jQABOnt/4SFkXt7se5mBIv M56ZR9gVJ15AihxrlDUk+jvJvcSgGZzfmvm7RujY/bun88gkeA+01PfEeMzD6CUVo0bn /Iwxb6jdY68R6+4d0SFj3KHn4ZWpO9pT8xFanVp95h+yQrDHUP83WuhWNov2dw/HpWuD NxeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cz11si5109161edb.37.2021.06.11.09.03.27; Fri, 11 Jun 2021 09:03:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230428AbhFKQCR (ORCPT + 99 others); Fri, 11 Jun 2021 12:02:17 -0400 Received: from foss.arm.com ([217.140.110.172]:33744 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230358AbhFKQCO (ORCPT ); Fri, 11 Jun 2021 12:02:14 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 02D521396; Fri, 11 Jun 2021 09:00:16 -0700 (PDT) Received: from entos-ampere-02.shanghai.arm.com (entos-ampere-02.shanghai.arm.com [10.169.214.103]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 95B203F719; Fri, 11 Jun 2021 09:00:11 -0700 (PDT) From: Jia He To: Petr Mladek , Steven Rostedt , Sergey Senozhatsky , Andy Shevchenko , Rasmus Villemoes , Jonathan Corbet , Alexander Viro , Linus Torvalds Cc: "Peter Zijlstra (Intel)" , Eric Biggers , "Ahmed S. Darwish" , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Jia He Subject: [PATCH RFCv3 1/3] fs: introduce helper d_path_unsafe() Date: Fri, 11 Jun 2021 23:59:51 +0800 Message-Id: <20210611155953.3010-2-justin.he@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210611155953.3010-1-justin.he@arm.com> References: <20210611155953.3010-1-justin.he@arm.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This helper is similar to d_path except that it doesn't take any seqlock/spinlock. It is typical for debugging purpose. Besides, an additional return value *prenpend_len* is used to get the full path length of the dentry. prepend_name_with_len() enhances the behavior of prepend_name(). Previously it will skip the loop at once in __prepen_path() when the space is not enough. __prepend_path() gets the full length of dentry together with the parent recusively. Besides, if someone invokes snprintf with small but positive space, prepend_name_with() needs to move and copy the string partially. More than that, kasnprintf will pass NULL _buf_ and _end_, hence it returns at the very beginning with false in this case; Suggested-by: Matthew Wilcox Signed-off-by: Jia He --- fs/d_path.c | 83 +++++++++++++++++++++++++++++++++++++++++- include/linux/dcache.h | 1 + 2 files changed, 82 insertions(+), 2 deletions(-) diff --git a/fs/d_path.c b/fs/d_path.c index 23a53f7b5c71..4fc224eadf58 100644 --- a/fs/d_path.c +++ b/fs/d_path.c @@ -68,9 +68,66 @@ static bool prepend_name(struct prepend_buffer *p, const struct qstr *name) return true; } +static bool prepend_name_with_len(struct prepend_buffer *p, const struct qstr *name, + int orig_buflen) +{ + const char *dname = smp_load_acquire(&name->name); /* ^^^ */ + int dlen = READ_ONCE(name->len); + char *s; + int last_len = p->len; + + p->len -= dlen + 1; + + if (unlikely(!p->buf)) + return false; + + if (orig_buflen <= 0) + return false; + /* + * The first time we overflow the buffer. Then fill the string + * partially from the beginning + */ + if (unlikely(p->len < 0)) { + int buflen = strlen(p->buf); + + s = p->buf; + + /* Still have small space to fill partially */ + if (last_len > 0) { + p->buf -= last_len; + buflen += last_len; + } + + if (buflen > dlen + 1) { + /* This dentry name can be fully filled */ + memmove(p->buf + dlen + 1, s, buflen - dlen - 1); + p->buf[0] = '/'; + memcpy(p->buf + 1, dname, dlen); + } else if (buflen > 0) { + /* Partially filled, and drop last dentry name */ + p->buf[0] = '/'; + memcpy(p->buf + 1, dname, buflen - 1); + } + + return false; + } + + s = p->buf -= dlen + 1; + *s++ = '/'; + while (dlen--) { + char c = *dname++; + + if (!c) + break; + *s++ = c; + } + return true; +} static int __prepend_path(const struct dentry *dentry, const struct mount *mnt, const struct path *root, struct prepend_buffer *p) { + int orig_buflen = p->len; + while (dentry != root->dentry || &mnt->mnt != root->mnt) { const struct dentry *parent = READ_ONCE(dentry->d_parent); @@ -97,8 +154,7 @@ static int __prepend_path(const struct dentry *dentry, const struct mount *mnt, return 3; prefetch(parent); - if (!prepend_name(p, &dentry->d_name)) - break; + prepend_name_with_len(p, &dentry->d_name, orig_buflen); dentry = parent; } return 0; @@ -263,6 +319,29 @@ char *d_path(const struct path *path, char *buf, int buflen) } EXPORT_SYMBOL(d_path); +/** + * d_path_unsafe - fast return the full path of a dentry without taking + * any seqlock/spinlock. This helper is typical for debugging purpose. + */ +char *d_path_unsafe(const struct path *path, char *buf, int buflen, + int *prepend_len) +{ + struct path root; + struct mount *mnt = real_mount(path->mnt); + DECLARE_BUFFER(b, buf, buflen); + + rcu_read_lock(); + get_fs_root_rcu(current->fs, &root); + + prepend(&b, "", 1); + __prepend_path(path->dentry, mnt, &root, &b); + rcu_read_unlock(); + + *prepend_len = b.len; + + return b.buf; +} + /* * Helper function for dentry_operations.d_dname() members */ diff --git a/include/linux/dcache.h b/include/linux/dcache.h index 9e23d33bb6f1..ec118b684055 100644 --- a/include/linux/dcache.h +++ b/include/linux/dcache.h @@ -301,6 +301,7 @@ char *dynamic_dname(struct dentry *, char *, int, const char *, ...); extern char *__d_path(const struct path *, const struct path *, char *, int); extern char *d_absolute_path(const struct path *, char *, int); extern char *d_path(const struct path *, char *, int); +extern char *d_path_unsafe(const struct path *, char *, int, int*); extern char *dentry_path_raw(const struct dentry *, char *, int); extern char *dentry_path(const struct dentry *, char *, int); -- 2.17.1