Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp791743ioo; Thu, 26 May 2022 15:11:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKE54UPfsj5l9789w40hpgIh3jcmChBzmfHUR+ynW05tJn7mDwmFj7j+wFhQAe2aZxECsb X-Received: by 2002:a17:90a:690f:b0:1df:336d:5533 with SMTP id r15-20020a17090a690f00b001df336d5533mr4798314pjj.222.1653603106439; Thu, 26 May 2022 15:11:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653603106; cv=none; d=google.com; s=arc-20160816; b=ZbMz3Bm9bvzv9YpPg+ksCH9vEgjJIvZhyVOVmoS4iAQyb9WhH4vFVKsAJQhkbaAZDm tmMk5a0v7gaUSne1YWZ9/Y0V01gs+SVzZQmnos+qE/Xb78IxPWQEK1psZuKpPiNUrwtx 7zlHFovgEjdA8q4LH1ItwCxMMcJVpmBlH3DhWGBYvVaoVNeCkKW6Xb6d2h0lGhxuahcv U9TCTq2Nf5M6Ez1NItoHwYPwQv/3FIipXmFN3wNBT5CoeRS+gJaC3D4gLbZ4pSfOT09S 80smjXQEXv9XXIu0nQ80/X43iOXJ7VJL3EoMqFLcD8RteyZRmS8csmytstkZJ+EUqC2v WQgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=xz869cX5K5CXp5x1mskXe6licPQenMVKhOFszIG412s=; b=JQdo1pI3nV9PeDG96JbuY2qsxjc6e1wzkY9MUVxledkj0kYc+79vXsQyguOpVxqR0p AmZkm2Zz+qKy+hiQX1ABe0fgm57ksdT4DrXiNMzfexfiJ6YTypaLGJuxfAW73hkvieGQ URjKeaFA339w1K9F8N0PCyTKF9WqoxWD5pb+2Dt4CuI23U20R466/6zT29cTLO2cfUoc 2bGcquIS+ir1AeOOW6FU99rrmrvLmRqos2TTUeG8KCkH+jDVC+sz4R/i/duLnESXJEYf Q4pH01BrxSjIxPu5lZIANJlXGOVdikJLVNniqs77u+PHIyIHs4KHVQD0xF5nKPDErkzR Uilg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fsxti0ef; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c1-20020a170902d48100b0015be178cbf4si2509002plg.188.2022.05.26.15.11.34; Thu, 26 May 2022 15:11:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fsxti0ef; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347585AbiEZNl4 (ORCPT + 99 others); Thu, 26 May 2022 09:41:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41646 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344624AbiEZNll (ORCPT ); Thu, 26 May 2022 09:41:41 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1D7F5D5B for ; Thu, 26 May 2022 06:41:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1653572498; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xz869cX5K5CXp5x1mskXe6licPQenMVKhOFszIG412s=; b=fsxti0ef8pxm0SzP0UY4Jnz5JqeNzOlnDVsh3ymLQW8rohiLzNZzXjdhIFJIDBDFyYZB2b crldTSEnMb6gBJ254SV67vZkKgLED1pDG4hUibnLSGn02KVQXC6+HWxsu7EIzNoBBLYmK3 mnehGAFUjbQYPxvmMBvP8TR8GH6VBOw= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-15-9z8noiHDPvCYOYjmAhTrbw-1; Thu, 26 May 2022 09:41:34 -0400 X-MC-Unique: 9z8noiHDPvCYOYjmAhTrbw-1 Received: by mail-wr1-f71.google.com with SMTP id e24-20020a5d5958000000b0020ffd1d62b2so270030wri.17 for ; Thu, 26 May 2022 06:41:34 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=xz869cX5K5CXp5x1mskXe6licPQenMVKhOFszIG412s=; b=7Pia+zHNarmT24wLfdP02wIN4sTjoo/34NCDMVAkS/IOy6gN75cuXvcRyFnS0T7hUI fZvmcX8V8D+hLcnublEQmMt/UZ4Yup9WNzlEMkaqkRyAGLi+UI/z2zyATKcczEkuGaHr VCNlDhtsYnYi7KJXEYPoVXiAWpOuQt4kUQgSm8XZ8vGl+09neNVqZprLvZ/of1oCts0b 9dyQ2fHFaEA7AMGU/Ibzek+MsL0mnHKBd8ALjTypjNjtvlU5+IPNV7LvxTkYZH9DW4hY +oHh1xAbNpklKf2Z9MpYI0X396UJLGC6cT71VnRGqOqNzUe3uLkaPjaW7v4J6RPH1yZ6 OdSg== X-Gm-Message-State: AOAM530n70PYbXAr4UshfW/Hi6tDwkLZGRz6IZjLjXJ8rRCI6WL1qJdV mlPMF/IESDmHykcujhMcNrelzo8pbLHtWOdXIX2KoZ1mKw+GVsga26ptiNtTrfCbQhVAZFiW+kQ qY2OTysBYaeWXOA4iwHCO2BE2BS/l0ByxhS8N6q1XWLtmOwpUhwo9V4fAqsdg35qoqz8bYHDycr s= X-Received: by 2002:a05:600c:350f:b0:397:7204:ce8e with SMTP id h15-20020a05600c350f00b003977204ce8emr2459318wmq.0.1653572493179; Thu, 26 May 2022 06:41:33 -0700 (PDT) X-Received: by 2002:a05:600c:350f:b0:397:7204:ce8e with SMTP id h15-20020a05600c350f00b003977204ce8emr2459290wmq.0.1653572492866; Thu, 26 May 2022 06:41:32 -0700 (PDT) Received: from minerva.home (205.pool92-176-231.dynamic.orange.es. [92.176.231.205]) by smtp.gmail.com with ESMTPSA id h6-20020a5d5046000000b0020c547f75easm1765022wrt.101.2022.05.26.06.41.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 26 May 2022 06:41:32 -0700 (PDT) From: Javier Martinez Canillas To: linux-kernel@vger.kernel.org Cc: Christian Kellner , Muhammad Usama Anjum , Alexander Larsson , Alberto Ruiz , Peter Jones , Lennart Poettering , Colin Walters , Chung-Chiang Cheng , Javier Martinez Canillas , OGAWA Hirofumi Subject: [PATCH v3 2/3] fat: add renameat2 RENAME_EXCHANGE flag support Date: Thu, 26 May 2022 15:41:18 +0200 Message-Id: <20220526134119.242182-3-javierm@redhat.com> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220526134119.242182-1-javierm@redhat.com> References: <20220526134119.242182-1-javierm@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The renameat2 RENAME_EXCHANGE flag allows to atomically exchange two paths but is currently not supported by the Linux vfat filesystem driver. Add a vfat_rename_exchange() helper function that implements this support. The super block lock is acquired during the operation to ensure atomicity, and in the error path actions made are reversed also with the mutex held. It makes the operation as transactional as possible, within the limitation impossed by vfat due not having a journal with logs to replay. Signed-off-by: Javier Martinez Canillas --- (no changes since v2) Changes in v2: - Only update the new_dir inode version and timestamps if != old_dir (Alex Larsson). - Add some helper functions to avoid duplicating code (OGAWA Hirofumi). - Use braces for multi-lines blocks even if are one statement (OGAWA Hirofumi). - Mention in commit message that the operation is as transactional as possible but within the vfat limitations of not having a journal (Colin Walters). fs/fat/namei_vfat.c | 174 +++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 173 insertions(+), 1 deletion(-) diff --git a/fs/fat/namei_vfat.c b/fs/fat/namei_vfat.c index 88ccb2ee3537..97caec8c5207 100644 --- a/fs/fat/namei_vfat.c +++ b/fs/fat/namei_vfat.c @@ -1017,13 +1017,185 @@ static int vfat_rename(struct inode *old_dir, struct dentry *old_dentry, goto out; } +/* Helpers for vfat_rename_exchange() */ + +static int vfat_get_dotdot_info(struct inode *inode, struct buffer_head **dotdot_bh, + struct msdos_dir_entry **dotdot_de) +{ + if (!S_ISDIR(inode->i_mode)) + return 0; + + return fat_get_dotdot_entry(inode, dotdot_bh, dotdot_de); +} + +static void vfat_exchange_dentries(struct inode *old_inode, struct inode *new_inode, + loff_t old_i_pos, loff_t new_i_pos) +{ + fat_detach(old_inode); + fat_detach(new_inode); + + fat_attach(old_inode, new_i_pos); + fat_attach(new_inode, old_i_pos); +} + +static int vfat_sync_after_exchange(struct inode *dir, struct inode *inode) +{ + int err = 0; + + if (IS_DIRSYNC(dir)) + err = fat_sync_inode(inode); + else + mark_inode_dirty(inode); + + return err; +} + +static int vfat_update_dotdot_info(struct buffer_head *dotdot_bh, struct msdos_dir_entry *dotdot_de, + struct inode *dir, struct inode *inode) +{ + int err = 0; + + fat_set_start(dotdot_de, MSDOS_I(dir)->i_logstart); + mark_buffer_dirty_inode(dotdot_bh, inode); + + if (IS_DIRSYNC(dir)) + err = sync_dirty_buffer(dotdot_bh); + + return err; +} + +static void vfat_update_dir_metadata(struct inode *dir, struct timespec64 *ts) +{ + inode_inc_iversion(dir); + fat_truncate_time(dir, ts, S_CTIME | S_MTIME); + + if (IS_DIRSYNC(dir)) + (void)fat_sync_inode(dir); + else + mark_inode_dirty(dir); +} + +static int vfat_rename_exchange(struct inode *old_dir, struct dentry *old_dentry, + struct inode *new_dir, struct dentry *new_dentry) +{ + struct buffer_head *old_dotdot_bh = NULL, *new_dotdot_bh = NULL; + struct msdos_dir_entry *old_dotdot_de = NULL, *new_dotdot_de = NULL; + struct inode *old_inode, *new_inode; + struct timespec64 ts = current_time(old_dir); + loff_t old_i_pos, new_i_pos; + int err, corrupt = 0; + struct super_block *sb = old_dir->i_sb; + + old_inode = d_inode(old_dentry); + new_inode = d_inode(new_dentry); + + /* Acquire super block lock for the operation to be atomic */ + mutex_lock(&MSDOS_SB(sb)->s_lock); + + /* if directories are not the same, get ".." info to update */ + if (old_dir != new_dir) { + err = vfat_get_dotdot_info(old_inode, &old_dotdot_bh, &old_dotdot_de); + if (err) + goto out; + + err = vfat_get_dotdot_info(new_inode, &new_dotdot_bh, &new_dotdot_de); + if (err) + goto out; + } + + old_i_pos = MSDOS_I(old_inode)->i_pos; + new_i_pos = MSDOS_I(new_inode)->i_pos; + + /* exchange the two dentries */ + vfat_exchange_dentries(old_inode, new_inode, old_i_pos, new_i_pos); + + err = vfat_sync_after_exchange(old_dir, new_inode); + if (err) + goto error_exchange; + + err = vfat_sync_after_exchange(new_dir, old_inode); + if (err) + goto error_exchange; + + /* update ".." directory entry info */ + if (old_dotdot_de) { + err = vfat_update_dotdot_info(old_dotdot_bh, old_dotdot_de, new_dir, old_inode); + if (err) + goto error_old_dotdot; + + drop_nlink(old_dir); + inc_nlink(new_dir); + } + + if (new_dotdot_de) { + err = vfat_update_dotdot_info(new_dotdot_bh, new_dotdot_de, old_dir, new_inode); + if (err) + goto error_new_dotdot; + + drop_nlink(new_dir); + inc_nlink(old_dir); + } + + /* update inode version and timestamps */ + inode_inc_iversion(old_inode); + inode_inc_iversion(new_inode); + + vfat_update_dir_metadata(old_dir, &ts); + + /* if directories are not the same, update new_dir as well */ + if (old_dir != new_dir) + vfat_update_dir_metadata(new_dir, &ts); +out: + brelse(old_dotdot_bh); + brelse(new_dotdot_bh); + mutex_unlock(&MSDOS_SB(sb)->s_lock); + + return err; + +error_new_dotdot: + /* data cluster is shared, serious corruption */ + corrupt = 1; + + if (new_dotdot_de) { + corrupt |= vfat_update_dotdot_info(new_dotdot_bh, new_dotdot_de, + new_dir, new_inode); + } + +error_old_dotdot: + /* data cluster is shared, serious corruption */ + corrupt = 1; + + if (old_dotdot_de) { + corrupt |= vfat_update_dotdot_info(old_dotdot_bh, old_dotdot_de, + old_dir, old_inode); + } + +error_exchange: + vfat_exchange_dentries(old_inode, new_inode, new_i_pos, old_i_pos); + + if (corrupt) { + corrupt |= fat_sync_inode(old_inode); + corrupt |= fat_sync_inode(new_inode); + } + + if (corrupt < 0) { + fat_fs_error(new_dir->i_sb, + "%s: Filesystem corrupted (i_pos %lld, %lld)", + __func__, old_i_pos, new_i_pos); + } + goto out; +} + static int vfat_rename2(struct user_namespace *mnt_userns, struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry, unsigned int flags) { - if (flags & ~RENAME_NOREPLACE) + if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE)) return -EINVAL; + if (flags & RENAME_EXCHANGE) + return vfat_rename_exchange(old_dir, old_dentry, new_dir, new_dentry); + /* VFS already handled RENAME_NOREPLACE, handle it as a normal rename */ return vfat_rename(old_dir, old_dentry, new_dir, new_dentry); } -- 2.36.1