From patchwork Wed Dec 4 15:52:52 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13893977 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5B48E7716E for ; Wed, 4 Dec 2024 15:53:07 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4E1F56B0083; Wed, 4 Dec 2024 10:53:07 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 46BDC6B0085; Wed, 4 Dec 2024 10:53:07 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2E4E86B0088; Wed, 4 Dec 2024 10:53:07 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 034206B0083 for ; Wed, 4 Dec 2024 10:53:06 -0500 (EST) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id A0486A103F for ; Wed, 4 Dec 2024 15:53:06 +0000 (UTC) X-FDA: 82857720246.14.BECA256 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf06.hostedemail.com (Postfix) with ESMTP id CEF2918000B for ; Wed, 4 Dec 2024 15:52:54 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=RwglIqew; spf=pass (imf06.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733327578; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=vg3hQgOI0fVKCLF8XazcHrwtTTk7j4qHHHqA/NO5wZE=; b=1JkzjOCa6ZI2NYMnHlSoWQsopFL5E/0nSul5zt4LuvbIdD4uavDKitj7KSi1BQMxnL0Ov8 yBi/x7j+GV60xawGkVfI2+/A4Gv+vY3sbRqyE5b/gBFW/8Y8gRA64YQ4thjk3r5F7FQxEe qp2d+6EYqEONK0gfqWy6bizJzk3Rc/I= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=RwglIqew; spf=pass (imf06.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733327578; a=rsa-sha256; cv=none; b=PxGVtlU6tfW1PbW3jpJajhFLZr1vO67bPKS5Jkavir0M4fkTpMPcf98Z/T8V54hn/1eBzr NYkn9piTkwp5ioR9NMaiiHt8Nw+VMuC5MGJL22JT4bUvYM88nwaWXipxIZDEL+YtE/jXik GBLRrC3mBaOTi9pySpYwQ3NhjqwW25A= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 146C35C6E8B; Wed, 4 Dec 2024 15:52:21 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B27D4C4CED2; Wed, 4 Dec 2024 15:53:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1733327583; bh=NPVXYksZkbK7cP6WTdZWPp256P2B4FMiN2imk2oaSkg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RwglIqew+kC64HhmNeKRZMoydHTLxQALFth57WAXtBp6byNwVy91qJItQVVVwojSA OkH5/L9gFNYk/6f41QdqZVsf1I2GmIUsX/4V31OwNPFvaJMr9SwVKkROAY+FZFJze/ sL6tPNFlm19SV83JQXjaj+kPOEpM9/DycJQGqlRjtPJoey30zf9xUANBSL4qJbGTsm ql3tCoKZMlCrvZi0a1d2Z0oYByif2FG4pmAFUVUn+0J2Sjxv7GbWrkmPErKaHMypJC RFm8Yrwrio2mbZMJVEfnv8HExzhNKe4ZzOhXk3nxN7ocFTlW6sNuRZQYmSubZyHZ+h xfYcWMt80NU3A== From: cel@kernel.org To: Hugh Dickens , Christian Brauner , Al Viro Cc: , , yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever , stable@vger.kernel.org, Jeff Layton , Yang Erkun Subject: [PATCH v4 1/5] libfs: Return ENOSPC when the directory offset range is exhausted Date: Wed, 4 Dec 2024 10:52:52 -0500 Message-ID: <20241204155257.1110338-2-cel@kernel.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241204155257.1110338-1-cel@kernel.org> References: <20241204155257.1110338-1-cel@kernel.org> MIME-Version: 1.0 X-Rspamd-Queue-Id: CEF2918000B X-Stat-Signature: yq5hs3ikegxfo1ro5p999nwpfgd7pj1f X-Rspam-User: X-Rspamd-Server: rspam11 X-HE-Tag: 1733327574-830750 X-HE-Meta: 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 gBVRKPYa hXNd61nnoghMrBgdTklMbEgaDCfD0+bvLWuBBJxiplfKae+Mnvmv4Q45SRhj12mMoz44YZSgNKO+RgCDSc523QVG/m14O+Q5AD76DpyNTm45qyWZLwNf/NB1UQ8Wp6DPwm8lhf+6+KmLHfQ1bHreIudQ2RSl3JkRMKuCBKjkPUtpQKVfrKwvKDNJJlivNYY8lMssD0x6ZGrvOp4yzbFZpGjWXmdYk5OJi1YruTWD0LmqtJBO31ZgljMRLAYGjzFipdVTJkZebxT2UM2H5+qqMxOpLmw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Chuck Lever Testing shows that the EBUSY error return from mtree_alloc_cyclic() leaks into user space. The ERRORS section of "man creat(2)" says: > EBUSY O_EXCL was specified in flags and pathname refers > to a block device that is in use by the system > (e.g., it is mounted). ENOSPC is closer to what applications expect in this situation. Note that the normal range of simple directory offset values is 2..2^63, so hitting this error is going to be rare to impossible. Fixes: 6faddda69f62 ("libfs: Add directory operations for stable offsets") Cc: # v6.9+ Reviewed-by: Jeff Layton Reviewed-by: Yang Erkun Signed-off-by: Chuck Lever --- fs/libfs.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/fs/libfs.c b/fs/libfs.c index 46966fd8bcf9..bf67954b525b 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -288,7 +288,9 @@ int simple_offset_add(struct offset_ctx *octx, struct dentry *dentry) ret = mtree_alloc_cyclic(&octx->mt, &offset, dentry, DIR_OFFSET_MIN, LONG_MAX, &octx->next_offset, GFP_KERNEL); - if (ret < 0) + if (unlikely(ret == -EBUSY)) + return -ENOSPC; + if (unlikely(ret < 0)) return ret; offset_set(dentry, offset); From patchwork Wed Dec 4 15:52:53 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13893978 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id EEC4BE77170 for ; Wed, 4 Dec 2024 15:53:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 1875F6B0088; Wed, 4 Dec 2024 10:53:08 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 110016B008A; Wed, 4 Dec 2024 10:53:08 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EA4CE6B0089; Wed, 4 Dec 2024 10:53:07 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id C55906B0085 for ; Wed, 4 Dec 2024 10:53:07 -0500 (EST) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 5BA46810A2 for ; Wed, 4 Dec 2024 15:53:07 +0000 (UTC) X-FDA: 82857719742.19.0DDF911 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf14.hostedemail.com (Postfix) with ESMTP id 9931E100004 for ; Wed, 4 Dec 2024 15:52:49 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=A8mUmlEm; spf=pass (imf14.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733327576; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=TS0i0pF5SCGKiBSNDlxh+Mkj786d4YXV0ZMA76DJ4Rw=; b=aDRQKDk04vLkXaEHaHo7waZAIKg39bPHsxHssmZ3iYedLLMkWmJSa/n9McSWtBPtP6MYY/ Qx09BisqiIEfutPK2lhQDaekBOVDzxNiNrZS2C7dbNeNfKsabZ2lcpe/cPVIcAXw94WXAR zj1KEfinqpyrBCOzGhgoGpvmHksqSTY= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733327576; a=rsa-sha256; cv=none; b=PpBJ6Fk2I5u88b9GyOeiu5wPNxaJXr3QnHsgWx5I3Als3UYCzfrNN6HkCnuqLtBAn1HyU1 TLVYUKZ2BqW1vTeCuOhV90zRuK6RyiuDaS+qjbbn/2eNx/mFXwqUDfj4Y7/58bTwT9fa35 gPdJa3TAUIsMTgyzpwrkbmUHaQCqLhk= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=A8mUmlEm; spf=pass (imf14.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 027785C6E58; Wed, 4 Dec 2024 15:52:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E3432C4CED1; Wed, 4 Dec 2024 15:53:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1733327584; bh=N2kJlcrn9JOTM3KVLvrbjdtgeqhmJMuG2Y/zQp2C8sU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=A8mUmlEmi1YX9VJXiiGL6ot4MnLU+An2YSxggSZVPZtdpsB9RZ4PPgT8dKAJKyMk9 QQGgo56Hqy0Yv8NjuXQckIsZRYBRaETkYPR+bNx90Zbp2M5xDQP2qBOn9NlK047AIt f2QtumEWqXAqPc3Ge1dUSHbJsXja/zQwjrMf6RzAAEGI6p0PMM1JJxUc9kh2ARHLiR sm73FgFFJ6rks2aNBTaq3oPFifhtWX5Rf5P65oyWaeNEwjlkYrwxRcT7+kKcTxgbce Wa9A+h2fYaKZ1oGXrXywzv0oGHgOQEbneNLsBYhFXbKSHl0fucmCyWQl/0AECa920h IYDC41rC1xyDA== From: cel@kernel.org To: Hugh Dickens , Christian Brauner , Al Viro Cc: , , yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever Subject: [PATCH v4 2/5] Revert "libfs: Add simple_offset_empty()" Date: Wed, 4 Dec 2024 10:52:53 -0500 Message-ID: <20241204155257.1110338-3-cel@kernel.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241204155257.1110338-1-cel@kernel.org> References: <20241204155257.1110338-1-cel@kernel.org> MIME-Version: 1.0 X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 9931E100004 X-Stat-Signature: puyqixwt88ihjpyjpisaw4iaqepkygix X-Rspam-User: X-HE-Tag: 1733327569-135600 X-HE-Meta: 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 4JKnofJp gBxtbktC9upy8f7DxCkTlR9a7Z1KG7D8WVRw4x0g1Iuj4Dchlp9Vx3CbEJRh7Uxsa4fiGZ7UQdm5j8Pll0FGx2JGQz/9pXn8/sAEXbrmjO0IcZ8hV6A96HOIoSg4TldOCcC2WOV2PAPRH4RsK3DuWpol3M87owrg8+NZ0uK48/h5dIXDIOA2G+yUDn2tbqMJQvZAaYgmeEIfn2wSMv5IL8djtnaVihLoZNPhkQcFDfdAo3XrjJZn3zck8l0W/Mmmv49vuJB7azuWMpmtnJDqEFSHXWw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Chuck Lever simple_empty() and simple_offset_empty() perform the same task. The latter's use as a canary to find bugs has not found any new issues. A subsequent patch will remove the use of the mtree for iterating directory contents, so revert back to using a similar mechanism for determining whether a directory is indeed empty. Only one such mechanism is ever needed. Signed-off-by: Chuck Lever --- fs/libfs.c | 32 -------------------------------- include/linux/fs.h | 1 - mm/shmem.c | 4 ++-- 3 files changed, 2 insertions(+), 35 deletions(-) diff --git a/fs/libfs.c b/fs/libfs.c index bf67954b525b..b668a4f5bbc9 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -327,38 +327,6 @@ void simple_offset_remove(struct offset_ctx *octx, struct dentry *dentry) offset_set(dentry, 0); } -/** - * simple_offset_empty - Check if a dentry can be unlinked - * @dentry: dentry to be tested - * - * Returns 0 if @dentry is a non-empty directory; otherwise returns 1. - */ -int simple_offset_empty(struct dentry *dentry) -{ - struct inode *inode = d_inode(dentry); - struct offset_ctx *octx; - struct dentry *child; - unsigned long index; - int ret = 1; - - if (!inode || !S_ISDIR(inode->i_mode)) - return ret; - - index = DIR_OFFSET_MIN; - octx = inode->i_op->get_offset_ctx(inode); - mt_for_each(&octx->mt, child, index, LONG_MAX) { - spin_lock(&child->d_lock); - if (simple_positive(child)) { - spin_unlock(&child->d_lock); - ret = 0; - break; - } - spin_unlock(&child->d_lock); - } - - return ret; -} - /** * simple_offset_rename - handle directory offsets for rename * @old_dir: parent directory of source entry diff --git a/include/linux/fs.h b/include/linux/fs.h index 3559446279c1..0698cf63346c 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -3434,7 +3434,6 @@ struct offset_ctx { void simple_offset_init(struct offset_ctx *octx); int simple_offset_add(struct offset_ctx *octx, struct dentry *dentry); void simple_offset_remove(struct offset_ctx *octx, struct dentry *dentry); -int simple_offset_empty(struct dentry *dentry); int simple_offset_rename(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry); int simple_offset_rename_exchange(struct inode *old_dir, diff --git a/mm/shmem.c b/mm/shmem.c index 568bb290bdce..6ae963d42dbe 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -3697,7 +3697,7 @@ static int shmem_unlink(struct inode *dir, struct dentry *dentry) static int shmem_rmdir(struct inode *dir, struct dentry *dentry) { - if (!simple_offset_empty(dentry)) + if (!simple_empty(dentry)) return -ENOTEMPTY; drop_nlink(d_inode(dentry)); @@ -3754,7 +3754,7 @@ static int shmem_rename2(struct mnt_idmap *idmap, return simple_offset_rename_exchange(old_dir, old_dentry, new_dir, new_dentry); - if (!simple_offset_empty(new_dentry)) + if (!simple_empty(new_dentry)) return -ENOTEMPTY; if (flags & RENAME_WHITEOUT) { From patchwork Wed Dec 4 15:52:54 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13893979 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6FFD6E7716B for ; Wed, 4 Dec 2024 15:53:12 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 0A3516B0089; Wed, 4 Dec 2024 10:53:09 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id F41806B008A; Wed, 4 Dec 2024 10:53:08 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id DE3136B008C; Wed, 4 Dec 2024 10:53:08 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id BCDE36B0089 for ; Wed, 4 Dec 2024 10:53:08 -0500 (EST) Received: from smtpin28.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 6881DAED6C for ; Wed, 4 Dec 2024 15:53:08 +0000 (UTC) X-FDA: 82857720288.28.A450279 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf03.hostedemail.com (Postfix) with ESMTP id 2AD4A20013 for ; Wed, 4 Dec 2024 15:52:59 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="MzTVy/46"; spf=pass (imf03.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733327573; a=rsa-sha256; cv=none; b=AbK3tM1pa/Tb5ZVtux27iJhsvoWtuHrrVsNqX+StzEZjluw5jr9htFPcV5FohtAnypwJVb NWArLd6uYpBaeL4SS+PYeLu1YFkOxRSuQd4Q01ELguq+hlVFRgLJqOUbAkQ9UHT2sYj9Zb +59c64f675LpYgktctonh7qwc1rzcGg= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="MzTVy/46"; spf=pass (imf03.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733327573; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WMzLT5z69BLA1X5osTSxIXe7QTXneqKtw7Kt5u79Nbo=; b=IVYm5EUan5FlMThiUD7tW4hgRz+7Jy71Oo5PMFMLrlSAtMF5YRZUNff9PmDM2iVEpe/8u/ TxrKh1HSslbLqSdjmmEpXsz2jQcR/QyH7KpZVPmoPcMb0PHFWcfOJpNNaGg6nCE3AzKURf ZnKCmvGJhauTfRIcANVJqh3Hz095/P4= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 07E395C6EB6; Wed, 4 Dec 2024 15:52:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DCC74C4CEDD; Wed, 4 Dec 2024 15:53:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1733327585; bh=TsKe5WX9BiwgOVGJ1aGUhOHwVeN/D0/6ISUO68pxyBY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MzTVy/46mX0vtQ9cmM5USXoMMooJ1KLKQZkpf3oLyao/4qdPVY/7rtwZenbA2YDAY cX3TmG1nK4kY/xoSzqinYQ6TuE15iSm3PgFaFd0TNCbvFlErHAnNUQC5+da3lQvmR5 ANPRdGieOzXdv0BbgQU2g2rLaaccGk3PzVKuP203sRD9qmkuQiU4WNeU3goWstnVW+ 1TxqyAkImDkfOZa3eYwK6CROcOsupgBrH1o626gO/rs2rN3a4qF2fO0y3F0RaIE0SH +A4IeFU6F/XXfj70g/EzeqRNer66Ue79gfyuW1Cs2vIFg0B/H1l6X2ovepb5Yb1eJC Vn3ikyW1bNE6A== From: cel@kernel.org To: Hugh Dickens , Christian Brauner , Al Viro Cc: , , yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever Subject: [PATCH v4 3/5] Revert "libfs: fix infinite directory reads for offset dir" Date: Wed, 4 Dec 2024 10:52:54 -0500 Message-ID: <20241204155257.1110338-4-cel@kernel.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241204155257.1110338-1-cel@kernel.org> References: <20241204155257.1110338-1-cel@kernel.org> MIME-Version: 1.0 X-Rspamd-Queue-Id: 2AD4A20013 X-Stat-Signature: ixt53g6ws3psx8sq5forsimgwsosxre1 X-Rspam-User: X-Rspamd-Server: rspam09 X-HE-Tag: 1733327579-553412 X-HE-Meta: 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 42f5Ca8Y /SBv1b/ttEwiv9vnNPDwn3XjmYn81fV9qXfriMxH3k7oWT8ZFYeO/ImryDMQzYTQzRQazNA7voqk9PnZnXRpajpPBghkH9F7eTsLadqlMcXCOml58q7Osy6+D4jTzF/xFXtumR77cwpJZXe08Rv54C7hhjKYjvf+Hu1zLoDYN7OnIJsQiKFDFiUzJigsjEMFMEU/066vSJ0B/CBhMk+K5Fz6nDsOsxGfALj9Mbpa4D4sr3v5odzq9xVwsnhOFaSRjaINt X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Chuck Lever The current directory offset allocator (based on mtree_alloc_cyclic) stores the next offset value to return in octx->next_offset. This mechanism typically returns values that increase monotonically over time. Eventually, though, the newly allocated offset value wraps back to a low number (say, 2) which is smaller than other already- allocated offset values. Yu Kuai reports that, after commit 64a7ce76fb90 ("libfs: fix infinite directory reads for offset dir"), if a directory's offset allocator wraps, existing entries are no longer visible via readdir/getdents because offset_readdir() stops listing entries once an entry's offset is larger than octx->next_offset. These entries vanish persistently -- they can be looked up, but will never again appear in readdir(3) output. The reason for this is that the commit treats directory offsets as monotonically increasing integer values rather than opaque cookies, and introduces this comparison: if (dentry2offset(dentry) >= last_index) { On 64-bit platforms, the directory offset value upper bound is 2^63 - 1. Directory offsets will monotonically increase for millions of years without wrapping. On 32-bit platforms, however, LONG_MAX is 2^31 - 1. The allocator can wrap after only a few weeks (at worst). Revert commit 64a7ce76fb90 ("libfs: fix infinite directory reads for offset dir") to prepare for a fix that can work properly on 32-bit systems and might apply to recent LTS kernels where shmem employs the simple_offset mechanism. Reported-by: Yu Kuai Signed-off-by: Chuck Lever --- fs/libfs.c | 35 +++++++++++------------------------ 1 file changed, 11 insertions(+), 24 deletions(-) diff --git a/fs/libfs.c b/fs/libfs.c index b668a4f5bbc9..461384fb6119 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -420,14 +420,6 @@ void simple_offset_destroy(struct offset_ctx *octx) mtree_destroy(&octx->mt); } -static int offset_dir_open(struct inode *inode, struct file *file) -{ - struct offset_ctx *ctx = inode->i_op->get_offset_ctx(inode); - - file->private_data = (void *)ctx->next_offset; - return 0; -} - /** * offset_dir_llseek - Advance the read position of a directory descriptor * @file: an open directory whose position is to be updated @@ -441,9 +433,6 @@ static int offset_dir_open(struct inode *inode, struct file *file) */ static loff_t offset_dir_llseek(struct file *file, loff_t offset, int whence) { - struct inode *inode = file->f_inode; - struct offset_ctx *ctx = inode->i_op->get_offset_ctx(inode); - switch (whence) { case SEEK_CUR: offset += file->f_pos; @@ -457,8 +446,7 @@ static loff_t offset_dir_llseek(struct file *file, loff_t offset, int whence) } /* In this case, ->private_data is protected by f_pos_lock */ - if (!offset) - file->private_data = (void *)ctx->next_offset; + file->private_data = NULL; return vfs_setpos(file, offset, LONG_MAX); } @@ -489,7 +477,7 @@ static bool offset_dir_emit(struct dir_context *ctx, struct dentry *dentry) inode->i_ino, fs_umode_to_dtype(inode->i_mode)); } -static void offset_iterate_dir(struct inode *inode, struct dir_context *ctx, long last_index) +static void *offset_iterate_dir(struct inode *inode, struct dir_context *ctx) { struct offset_ctx *octx = inode->i_op->get_offset_ctx(inode); struct dentry *dentry; @@ -497,21 +485,17 @@ static void offset_iterate_dir(struct inode *inode, struct dir_context *ctx, lon while (true) { dentry = offset_find_next(octx, ctx->pos); if (!dentry) - return; - - if (dentry2offset(dentry) >= last_index) { - dput(dentry); - return; - } + return ERR_PTR(-ENOENT); if (!offset_dir_emit(ctx, dentry)) { dput(dentry); - return; + break; } ctx->pos = dentry2offset(dentry) + 1; dput(dentry); } + return NULL; } /** @@ -538,19 +522,22 @@ static void offset_iterate_dir(struct inode *inode, struct dir_context *ctx, lon static int offset_readdir(struct file *file, struct dir_context *ctx) { struct dentry *dir = file->f_path.dentry; - long last_index = (long)file->private_data; lockdep_assert_held(&d_inode(dir)->i_rwsem); if (!dir_emit_dots(file, ctx)) return 0; - offset_iterate_dir(d_inode(dir), ctx, last_index); + /* In this case, ->private_data is protected by f_pos_lock */ + if (ctx->pos == DIR_OFFSET_MIN) + file->private_data = NULL; + else if (file->private_data == ERR_PTR(-ENOENT)) + return 0; + file->private_data = offset_iterate_dir(d_inode(dir), ctx); return 0; } const struct file_operations simple_offset_dir_operations = { - .open = offset_dir_open, .llseek = offset_dir_llseek, .iterate_shared = offset_readdir, .read = generic_read_dir, From patchwork Wed Dec 4 15:52:55 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13893980 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D29E2E7716E for ; Wed, 4 Dec 2024 15:53:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 1AE6E6B008A; Wed, 4 Dec 2024 10:53:10 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 13BC46B008C; Wed, 4 Dec 2024 10:53:10 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EA4086B0092; Wed, 4 Dec 2024 10:53:09 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id C75CB6B008A for ; Wed, 4 Dec 2024 10:53:09 -0500 (EST) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 72485A10D5 for ; Wed, 4 Dec 2024 15:53:09 +0000 (UTC) X-FDA: 82857720078.12.9B7A52A Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf30.hostedemail.com (Postfix) with ESMTP id 0B8128000C for ; Wed, 4 Dec 2024 15:52:39 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="Q0AZ2/Kj"; spf=pass (imf30.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733327578; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=ffFX21GwnmplEQCgvZNu31M5tQ/BDnnEO+F2yArezAA=; b=vWjinAOGt6hyyX069QhElkIYPOVsrNybZd97947l1ieaXZN94zNv1qEgi6zFbuKT+bn/ey Mlji8GBIzvZbMpSmW1S0MC4AMvWkimjx8onqOB+Fp1QUTnj5L60my7ZBB1CgyWkDbIA4SD EHLPAyEKAngRe4P40WNHRUslPUduW1c= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733327578; a=rsa-sha256; cv=none; b=2yPWoK22zklfaWoB5Dgt5/jmJrmedyedEVK+X7i+D/MEl4Y995PPcmVAVy24ciAshFSYI0 rYRnAqVeQ3hQzTini/WqNjabq3/CgTTlPnuFRMdbcMMpabqFWvpK6uMIXbTwFnkCOc1qzL /lJmKJJkxqd3iXyNU6DSce1PwiH3kv8= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="Q0AZ2/Kj"; spf=pass (imf30.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 037BE5C6EAD; Wed, 4 Dec 2024 15:52:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D6D28C4CED1; Wed, 4 Dec 2024 15:53:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1733327586; bh=fRN9vGJ7LROdP4ek3V8O3+9HR95gl8BzVkAX4o0+JlY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q0AZ2/KjCsuROd6V7x56n3hoEBUBchfYFAuCF0++umRnEOWMv1+sbIet4cMY14itF CkKZCOq38eR6EpzttfTgzJxVeu4h+0skR0eQYD8Uy9XDds3uM7zFubgpceYxrri4FQ pgaSr49+I+W9cbchnRNbxPOGAPx6VvfzQ9NcuOqaZ2Wu5dZrTtfAjCgDvd7jMj0vE4 kFHhIY3GM7CKMEvGUB+D7RZpa0hvZ1UekvVZJMU5Qcp6tOyr9CqbqwhUpYKSepqKw1 5vtvTPM/y5JDwPHkU9ZMMxg0leBr/36t8gvxufaTUrzb+tbrDvButD4IMg3wmrbo4K M/7DW3b5h+rUw== From: cel@kernel.org To: Hugh Dickens , Christian Brauner , Al Viro Cc: , , yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever Subject: [PATCH v4 4/5] libfs: Replace simple_offset end-of-directory detection Date: Wed, 4 Dec 2024 10:52:55 -0500 Message-ID: <20241204155257.1110338-5-cel@kernel.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241204155257.1110338-1-cel@kernel.org> References: <20241204155257.1110338-1-cel@kernel.org> MIME-Version: 1.0 X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 0B8128000C X-Stat-Signature: 4zbgpubajk4qo7rgkfyc4jgkhaxf8ckk X-Rspam-User: X-HE-Tag: 1733327559-65995 X-HE-Meta: U2FsdGVkX19/OjPalIFgczLerrRB8D/gF7GyvoFHSn3//DQJUXeIQUY+FpURpFM9tHAlYqm8W5w3ks5yV691Zrj8YrynG7NzSIxfVFdaq7b0I6VxtNLlGyJ/zntwfN6Sg+KrTwUI/K47YwXypezd3H2rJU8xEs09WkIHq+TaV+B2zbpiVPCgGFrAE519RhBxz78lm24a6NR5blPdBYZFuhA5xKm1epSQwW6ixjegl7Oj84QpQo9DlWM0Fc8WTc+bHjUnAW/Iv0QufvIcMMWHAi99qc1TB53Bx/rhVsuGiGqkB+VTmNrUkLDU7IbWtk3Yj/PZi8NXGw0Ktm+MkVZ2wdSasJlp/9BNEdB8aeIc1sKGdjLvZ+S0SjP/Ob00vSJmuGrIgowXugflr+7UeZmQDMlgxkuxkq1/JdCW2PVcn8hE0rR6UgbILWo+iMrGWvRuUbqHhfhnlrGmDnjwpvbYWMHdpjWvAgTWU79ET49oKKwpKkyItSB8zPauDZCEYNa1jRt1uh8vHzoafOs3YvrYG55I7/EZraA+y4Gw2FhL9R9srACt2iKNCNyan6TSra5M1Em/pgj5TT/H7dahc1IyhixboUsYoz4w7rzyYHTKJXoQHxQLO0q7fYV8BNBBWqhejyU/2NuVZEcPXSPUcyADz8g9/tNwijIH5C0OaKQdXI+V5SdcwGgiLEh81arelAm13H/yAPRIv0GgApVWHjQhndx9MVn25SjfQkkNrDDuzcGGCdX8fZXYiym/aEZqu3CAvjO+yFd8wJB21xKx6juh8ShMc0PvAsdWoO/b8CpP/mlKiK9rh41iyTvdK9inZhuBycg2ENB7OEwknpatMRJV+tSKfvQr5z1u9t1FjNvyTtfv6mns0PyVil0u0ShNG8GRLJdDH2kAmg5y3IK7LZ47/rQWzfR9smYd8XX1lcPMG53OrdVKm1JfTyyjNbbM5TF7iDBotC4SDAq4+O5FKZH JDREX4RS fWOyaCxGRS2UGOCPtjYebWbiQy6RMTv9c6hL03qlkpGYlkP3MDOU4WRwcov7R5s2XcrrQcCqpIur3VpCQJpRF4Yty9ORHxXcNS83Vp7DKlyVLmmCX+KZ+r5Yf2VCUxpFwAiMEtGcuL/mVqXO1YF46aBpDKPPfKz3dSv1tHcfJjy0sF0fluDlp6/qZd7LAIryWifGhckZjavRXhdmt1klVi7XP+40Td1pI58TUgv03iraWVLYFyvH0nnoZYPkeU2dqq9sgSmcfJ9R6wruRsHEIhrEWJwzD+sRMfq9rAIbsJTdX3Q93oSC5gk8xuThyHiZWWkF+ X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Chuck Lever According to getdents(3), the d_off field in each returned directory entry points to the next entry in the directory. The d_off field in the last returned entry in the readdir buffer must contain a valid offset value, but if it points to an actual directory entry, then readdir/getdents can loop. This patch introduces a specific fixed offset value that is placed in the d_off field of the last entry in a directory. Some user space applications assume that the EOD offset value is larger than the offsets of real directory entries, so the largest possible offset value is reserved for this purpose. This new value is never allocated by simple_offset_add(). When ->iterate_dir() returns, getdents{64} inserts the ctx->pos value into the d_off field of the last valid entry in the readdir buffer. When it hits EOD, offset_readdir() sets ctx->pos to the EOD offset value so the last entry is updated to point to the EOD marker. When trying to read the entry at the EOD offset, offset_readdir() terminates immediately. It is worth noting that using a Maple tree for directory offset value allocation does not guarantee a 63-bit range of values -- on platforms where "long" is a 32-bit type, the directory offset value range is still 0..(2^31 - 1). Fixes: 796432efab1e ("libfs: getdents() should return 0 after reaching EOD") Signed-off-by: Chuck Lever --- fs/libfs.c | 38 ++++++++++++++++++++++---------------- 1 file changed, 22 insertions(+), 16 deletions(-) diff --git a/fs/libfs.c b/fs/libfs.c index 461384fb6119..fcb2cdf6e3f3 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -241,9 +241,16 @@ const struct inode_operations simple_dir_inode_operations = { }; EXPORT_SYMBOL(simple_dir_inode_operations); -/* 0 is '.', 1 is '..', so always start with offset 2 or more */ +/* simple_offset_add() allocation range */ enum { - DIR_OFFSET_MIN = 2, + DIR_OFFSET_MIN = 2, + DIR_OFFSET_MAX = LONG_MAX - 1, +}; + +/* simple_offset_add() never assigns these to a dentry */ +enum { + DIR_OFFSET_EOD = LONG_MAX, /* Marks EOD */ + }; static void offset_set(struct dentry *dentry, long offset) @@ -287,7 +294,8 @@ int simple_offset_add(struct offset_ctx *octx, struct dentry *dentry) return -EBUSY; ret = mtree_alloc_cyclic(&octx->mt, &offset, dentry, DIR_OFFSET_MIN, - LONG_MAX, &octx->next_offset, GFP_KERNEL); + DIR_OFFSET_MAX, &octx->next_offset, + GFP_KERNEL); if (unlikely(ret == -EBUSY)) return -ENOSPC; if (unlikely(ret < 0)) @@ -445,8 +453,6 @@ static loff_t offset_dir_llseek(struct file *file, loff_t offset, int whence) return -EINVAL; } - /* In this case, ->private_data is protected by f_pos_lock */ - file->private_data = NULL; return vfs_setpos(file, offset, LONG_MAX); } @@ -456,7 +462,7 @@ static struct dentry *offset_find_next(struct offset_ctx *octx, loff_t offset) struct dentry *child, *found = NULL; rcu_read_lock(); - child = mas_find(&mas, LONG_MAX); + child = mas_find(&mas, DIR_OFFSET_MAX); if (!child) goto out; spin_lock(&child->d_lock); @@ -477,7 +483,7 @@ static bool offset_dir_emit(struct dir_context *ctx, struct dentry *dentry) inode->i_ino, fs_umode_to_dtype(inode->i_mode)); } -static void *offset_iterate_dir(struct inode *inode, struct dir_context *ctx) +static void offset_iterate_dir(struct inode *inode, struct dir_context *ctx) { struct offset_ctx *octx = inode->i_op->get_offset_ctx(inode); struct dentry *dentry; @@ -485,7 +491,7 @@ static void *offset_iterate_dir(struct inode *inode, struct dir_context *ctx) while (true) { dentry = offset_find_next(octx, ctx->pos); if (!dentry) - return ERR_PTR(-ENOENT); + goto out_eod; if (!offset_dir_emit(ctx, dentry)) { dput(dentry); @@ -495,7 +501,10 @@ static void *offset_iterate_dir(struct inode *inode, struct dir_context *ctx) ctx->pos = dentry2offset(dentry) + 1; dput(dentry); } - return NULL; + return; + +out_eod: + ctx->pos = DIR_OFFSET_EOD; } /** @@ -515,6 +524,8 @@ static void *offset_iterate_dir(struct inode *inode, struct dir_context *ctx) * * On return, @ctx->pos contains an offset that will read the next entry * in this directory when offset_readdir() is called again with @ctx. + * Caller places this value in the d_off field of the last entry in the + * user's buffer. * * Return values: * %0 - Complete @@ -527,13 +538,8 @@ static int offset_readdir(struct file *file, struct dir_context *ctx) if (!dir_emit_dots(file, ctx)) return 0; - - /* In this case, ->private_data is protected by f_pos_lock */ - if (ctx->pos == DIR_OFFSET_MIN) - file->private_data = NULL; - else if (file->private_data == ERR_PTR(-ENOENT)) - return 0; - file->private_data = offset_iterate_dir(d_inode(dir), ctx); + if (ctx->pos != DIR_OFFSET_EOD) + offset_iterate_dir(d_inode(dir), ctx); return 0; } From patchwork Wed Dec 4 15:52:56 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13893981 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 12A99E77170 for ; Wed, 4 Dec 2024 15:53:17 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id EF62E6B008C; Wed, 4 Dec 2024 10:53:10 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id E7D9E6B0092; Wed, 4 Dec 2024 10:53:10 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CAC6D6B0093; Wed, 4 Dec 2024 10:53:10 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 9D0836B008C for ; Wed, 4 Dec 2024 10:53:10 -0500 (EST) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 49B69C10B1 for ; Wed, 4 Dec 2024 15:53:10 +0000 (UTC) X-FDA: 82857720120.22.F4D4038 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf18.hostedemail.com (Postfix) with ESMTP id E6B541C001C for ; Wed, 4 Dec 2024 15:53:01 +0000 (UTC) Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=FfMP5EMF; spf=pass (imf18.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733327581; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=akvFEsoE62y2jlk3CZL5+Wc/+jvljrH7xjvrjCmp2qA=; b=scTmOPqrppwp5FJt8SbAmFciBqorDSlIwKy4IZkzk7wZSsfcG7x0KfOvcUpPSjXkI3FZp5 4sEH7b5vibE+Y4F9VyvlbU3JEuuZS5+DoYqkdGPjBB7avNnhjFDhUH1Bj9GDqyo7j1Tt5B fy1U8SZsA/KUhSptPVyZDQPOVBrvzEc= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733327581; a=rsa-sha256; cv=none; b=lqzxzmvj6JWP5P6GpZnj8MiWZQYzTq6C5XF3f1VJFIZzrkXVfI0W7NKqHEchkxrZV8Rkew wrJ6KXBjAEj7X7On8Rwofse4gARZE7Ad90KGLRQxKk5eug2PqF0Xngq82feACuPyn+eFXY XXNCXKKeu51R4YgLtG0h3TB1ffKfJKQ= ARC-Authentication-Results: i=1; imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=FfMP5EMF; spf=pass (imf18.hostedemail.com: domain of cel@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=cel@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id D3FFC5C6EE2; Wed, 4 Dec 2024 15:52:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF0DFC4CEDF; Wed, 4 Dec 2024 15:53:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1733327587; bh=uvo1HVcXQPvOFc+Tys1OpqZ+zabfYR8WnzY6RxmyeLw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FfMP5EMFpAz6PQ9Cece/cfrswMGjeexM20kMaqoYqE76POVWpZCG0qVk7E/WxkBUW qYytJOTAKTZwUXhNfqVNydYqn+YQYz/30IALiV0Lm71vw5Ngfl5tvh8YpsMFRDcBck S4Ju5KlZSgq6lQAevI0+FLKrOCQk5Lx9W0WZyQMOHWS7abB729iS/H7JU1epZE9xQ5 RnzkOykEvT+xUv3uAQoZLDWXIZ+SZrF0EDdrWDThwntBXSaw6gccKJzT/rAW1KVVwV 6EDlv7bivXJ3bqgDZ3eFB02qvqc9+kT0g0OUff0la0HYoGAUObBmoUv5iqB0EDB044 5I6Jf7s9pIxDA== From: cel@kernel.org To: Hugh Dickens , Christian Brauner , Al Viro Cc: , , yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever Subject: [PATCH v4 5/5] libfs: Use d_children list to iterate simple_offset directories Date: Wed, 4 Dec 2024 10:52:56 -0500 Message-ID: <20241204155257.1110338-6-cel@kernel.org> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241204155257.1110338-1-cel@kernel.org> References: <20241204155257.1110338-1-cel@kernel.org> MIME-Version: 1.0 X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: E6B541C001C X-Stat-Signature: jaqnuxg67kjccbywfuzw4gbhguff7d47 X-Rspam-User: X-HE-Tag: 1733327581-556984 X-HE-Meta: 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 QtwIZCDi vrFHRa8GIsJiQ6m8J2HkH3PYStBIWTl9kPYMC1JaEt4VwglKOaqwAwr1UtldV5630WGTsnY2wgZP2giTgdNPD4ZRuVg+k4Mw4jGzItY+z/U1EEIA/bVt6ege6eUCFHQTBVX4h80t4wD171MhEvvv8wtxzwNeS7ZL+ni2JaXs7E0112eY5sqNxsrj9Cz7KGzV+RlB9NotS31VxMKtSOxv/u0vhzxMqq847amOcsvEQrqVZxZzuu4JdhRGwfu2shKSVXNpKNM51UGa8J/mH69yZwTtz1A== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Chuck Lever The mtree mechanism has been effective at creating directory offsets that are stable over multiple opendir instances. However, it has not been able to handle the subtleties of renames that are concurrent with readdir. Instead of using the mtree to emit entries in the order of their offset values, use it only to map incoming ctx->pos to a starting entry. Then use the directory's d_children list, which is already maintained properly by the dcache, to find the next child to emit. One of the sneaky things about this is that when the mtree-allocated offset value wraps (which is very rare), looking up ctx->pos++ is not going to find the next entry; it will return NULL. Instead, by following the d_children list, the offset values can appear in any order but all of the entries in the directory will be visited eventually. Note also that the readdir() is guaranteed to reach the tail of this list. Entries are added only at the head of d_children, and readdir walks from its current position in that list towards its tail. Signed-off-by: Chuck Lever --- fs/libfs.c | 77 ++++++++++++++++++++++++++++++++++++++++-------------- 1 file changed, 57 insertions(+), 20 deletions(-) diff --git a/fs/libfs.c b/fs/libfs.c index fcb2cdf6e3f3..398eac385094 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -243,12 +243,13 @@ EXPORT_SYMBOL(simple_dir_inode_operations); /* simple_offset_add() allocation range */ enum { - DIR_OFFSET_MIN = 2, + DIR_OFFSET_MIN = 3, DIR_OFFSET_MAX = LONG_MAX - 1, }; /* simple_offset_add() never assigns these to a dentry */ enum { + DIR_OFFSET_FIRST = 2, /* Find first real entry */ DIR_OFFSET_EOD = LONG_MAX, /* Marks EOD */ }; @@ -456,19 +457,43 @@ static loff_t offset_dir_llseek(struct file *file, loff_t offset, int whence) return vfs_setpos(file, offset, LONG_MAX); } -static struct dentry *offset_find_next(struct offset_ctx *octx, loff_t offset) +/* Cf. find_next_child() */ +static struct dentry *find_next_sibling_locked(struct dentry *parent, + struct dentry *dentry) { - MA_STATE(mas, &octx->mt, offset, offset); + struct dentry *found = NULL; + + hlist_for_each_entry_from(dentry, d_sib) { + if (!simple_positive(dentry)) + continue; + spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED); + if (simple_positive(dentry)) + found = dget_dlock(dentry); + spin_unlock(&dentry->d_lock); + if (likely(found)) + break; + } + return found; +} + +static noinline_for_stack struct dentry * +offset_dir_lookup(struct file *file, loff_t offset) +{ + struct dentry *parent = file->f_path.dentry; struct dentry *child, *found = NULL; + struct inode *inode = d_inode(parent); + struct offset_ctx *octx = inode->i_op->get_offset_ctx(inode); + + MA_STATE(mas, &octx->mt, offset, offset); rcu_read_lock(); child = mas_find(&mas, DIR_OFFSET_MAX); if (!child) goto out; - spin_lock(&child->d_lock); - if (simple_positive(child)) - found = dget_dlock(child); - spin_unlock(&child->d_lock); + + spin_lock(&parent->d_lock); + found = find_next_sibling_locked(parent, child); + spin_unlock(&parent->d_lock); out: rcu_read_unlock(); return found; @@ -477,30 +502,42 @@ static struct dentry *offset_find_next(struct offset_ctx *octx, loff_t offset) static bool offset_dir_emit(struct dir_context *ctx, struct dentry *dentry) { struct inode *inode = d_inode(dentry); - long offset = dentry2offset(dentry); - return ctx->actor(ctx, dentry->d_name.name, dentry->d_name.len, offset, - inode->i_ino, fs_umode_to_dtype(inode->i_mode)); + return dir_emit(ctx, dentry->d_name.name, dentry->d_name.len, + inode->i_ino, fs_umode_to_dtype(inode->i_mode)); } -static void offset_iterate_dir(struct inode *inode, struct dir_context *ctx) +static void offset_iterate_dir(struct file *file, struct dir_context *ctx) { - struct offset_ctx *octx = inode->i_op->get_offset_ctx(inode); + struct dentry *dir = file->f_path.dentry; struct dentry *dentry; + if (ctx->pos == DIR_OFFSET_FIRST) { + spin_lock(&dir->d_lock); + dentry = find_next_sibling_locked(dir, d_first_child(dir)); + spin_unlock(&dir->d_lock); + } else + dentry = offset_dir_lookup(file, ctx->pos); + if (!dentry) + goto out_eod; + while (true) { - dentry = offset_find_next(octx, ctx->pos); - if (!dentry) - goto out_eod; + struct dentry *next; - if (!offset_dir_emit(ctx, dentry)) { - dput(dentry); + ctx->pos = dentry2offset(dentry); + if (!offset_dir_emit(ctx, dentry)) break; - } - ctx->pos = dentry2offset(dentry) + 1; + spin_lock(&dir->d_lock); + next = find_next_sibling_locked(dir, d_next_sibling(dentry)); + spin_unlock(&dir->d_lock); dput(dentry); + + if (!next) + goto out_eod; + dentry = next; } + dput(dentry); return; out_eod: @@ -539,7 +576,7 @@ static int offset_readdir(struct file *file, struct dir_context *ctx) if (!dir_emit_dots(file, ctx)) return 0; if (ctx->pos != DIR_OFFSET_EOD) - offset_iterate_dir(d_inode(dir), ctx); + offset_iterate_dir(file, ctx); return 0; }