mirror of https://github.com/armbian/build.git
Update odroidxu4-current to 6.6.75
This commit is contained in:
parent
a8abed8d46
commit
222c875761
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,227 @@
|
|||
diff --git a/Makefile b/Makefile
|
||||
index 4c0dd62e02e465..9476e4502bbb0b 100644
|
||||
--- a/Makefile
|
||||
+++ b/Makefile
|
||||
@@ -1,7 +1,7 @@
|
||||
# SPDX-License-Identifier: GPL-2.0
|
||||
VERSION = 6
|
||||
PATCHLEVEL = 6
|
||||
-SUBLEVEL = 70
|
||||
+SUBLEVEL = 71
|
||||
EXTRAVERSION =
|
||||
NAME = Pinguïn Aangedreven
|
||||
|
||||
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile
|
||||
index 15fc9fc3dcf052..3269a0e23d3ab8 100644
|
||||
--- a/arch/x86/kernel/Makefile
|
||||
+++ b/arch/x86/kernel/Makefile
|
||||
@@ -99,9 +99,9 @@ obj-$(CONFIG_TRACING) += trace.o
|
||||
obj-$(CONFIG_RETHOOK) += rethook.o
|
||||
obj-$(CONFIG_CRASH_CORE) += crash_core_$(BITS).o
|
||||
obj-$(CONFIG_KEXEC_CORE) += machine_kexec_$(BITS).o
|
||||
-obj-$(CONFIG_KEXEC_CORE) += relocate_kernel_$(BITS).o
|
||||
+obj-$(CONFIG_KEXEC_CORE) += relocate_kernel_$(BITS).o crash.o
|
||||
obj-$(CONFIG_KEXEC_FILE) += kexec-bzimage64.o
|
||||
-obj-$(CONFIG_CRASH_DUMP) += crash_dump_$(BITS).o crash.o
|
||||
+obj-$(CONFIG_CRASH_DUMP) += crash_dump_$(BITS).o
|
||||
obj-y += kprobes/
|
||||
obj-$(CONFIG_MODULES) += module.o
|
||||
obj-$(CONFIG_X86_32) += doublefault_32.o
|
||||
diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
|
||||
index 6328cf56e59be2..5ae77d966cafea 100644
|
||||
--- a/arch/x86/kernel/cpu/mshyperv.c
|
||||
+++ b/arch/x86/kernel/cpu/mshyperv.c
|
||||
@@ -209,9 +209,7 @@ static void hv_machine_shutdown(void)
|
||||
if (kexec_in_progress)
|
||||
hyperv_cleanup();
|
||||
}
|
||||
-#endif /* CONFIG_KEXEC_CORE */
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
static void hv_machine_crash_shutdown(struct pt_regs *regs)
|
||||
{
|
||||
if (hv_crash_handler)
|
||||
@@ -223,7 +221,7 @@ static void hv_machine_crash_shutdown(struct pt_regs *regs)
|
||||
/* Disable the hypercall page when there is only 1 active CPU. */
|
||||
hyperv_cleanup();
|
||||
}
|
||||
-#endif /* CONFIG_CRASH_DUMP */
|
||||
+#endif /* CONFIG_KEXEC_CORE */
|
||||
|
||||
static u64 hv_ref_counter_at_suspend;
|
||||
static void (*old_save_sched_clock_state)(void);
|
||||
@@ -552,13 +550,9 @@ static void __init ms_hyperv_init_platform(void)
|
||||
no_timer_check = 1;
|
||||
#endif
|
||||
|
||||
-#if IS_ENABLED(CONFIG_HYPERV)
|
||||
-#if defined(CONFIG_KEXEC_CORE)
|
||||
+#if IS_ENABLED(CONFIG_HYPERV) && defined(CONFIG_KEXEC_CORE)
|
||||
machine_ops.shutdown = hv_machine_shutdown;
|
||||
-#endif
|
||||
-#if defined(CONFIG_CRASH_DUMP)
|
||||
machine_ops.crash_shutdown = hv_machine_crash_shutdown;
|
||||
-#endif
|
||||
#endif
|
||||
if (ms_hyperv.features & HV_ACCESS_TSC_INVARIANT) {
|
||||
/*
|
||||
diff --git a/arch/x86/kernel/kexec-bzimage64.c b/arch/x86/kernel/kexec-bzimage64.c
|
||||
index 0de509c02d18b9..a61c12c0127097 100644
|
||||
--- a/arch/x86/kernel/kexec-bzimage64.c
|
||||
+++ b/arch/x86/kernel/kexec-bzimage64.c
|
||||
@@ -263,13 +263,11 @@ setup_boot_parameters(struct kimage *image, struct boot_params *params,
|
||||
memset(¶ms->hd0_info, 0, sizeof(params->hd0_info));
|
||||
memset(¶ms->hd1_info, 0, sizeof(params->hd1_info));
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
if (image->type == KEXEC_TYPE_CRASH) {
|
||||
ret = crash_setup_memmap_entries(image, params);
|
||||
if (ret)
|
||||
return ret;
|
||||
} else
|
||||
-#endif
|
||||
setup_e820_entries(params);
|
||||
|
||||
nr_e820_entries = params->e820_entries;
|
||||
@@ -430,14 +428,12 @@ static void *bzImage64_load(struct kimage *image, char *kernel,
|
||||
return ERR_PTR(-EINVAL);
|
||||
}
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
/* Allocate and load backup region */
|
||||
if (image->type == KEXEC_TYPE_CRASH) {
|
||||
ret = crash_load_segments(image);
|
||||
if (ret)
|
||||
return ERR_PTR(ret);
|
||||
}
|
||||
-#endif
|
||||
|
||||
/*
|
||||
* Load purgatory. For 64bit entry point, purgatory code can be
|
||||
diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c
|
||||
index 38d88c8b56ec07..b8ab9ee5896c19 100644
|
||||
--- a/arch/x86/kernel/kvm.c
|
||||
+++ b/arch/x86/kernel/kvm.c
|
||||
@@ -769,7 +769,7 @@ static struct notifier_block kvm_pv_reboot_nb = {
|
||||
* won't be valid. In cases like kexec, in which you install a new kernel, this
|
||||
* means a random memory location will be kept being written.
|
||||
*/
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
+#ifdef CONFIG_KEXEC_CORE
|
||||
static void kvm_crash_shutdown(struct pt_regs *regs)
|
||||
{
|
||||
kvm_guest_cpu_offline(true);
|
||||
@@ -852,7 +852,7 @@ static void __init kvm_guest_init(void)
|
||||
kvm_guest_cpu_init();
|
||||
#endif
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
+#ifdef CONFIG_KEXEC_CORE
|
||||
machine_ops.crash_shutdown = kvm_crash_shutdown;
|
||||
#endif
|
||||
|
||||
diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_kexec_64.c
|
||||
index aaeac2deb85dc6..2fa12d1dc67602 100644
|
||||
--- a/arch/x86/kernel/machine_kexec_64.c
|
||||
+++ b/arch/x86/kernel/machine_kexec_64.c
|
||||
@@ -545,8 +545,6 @@ int arch_kimage_file_post_load_cleanup(struct kimage *image)
|
||||
}
|
||||
#endif /* CONFIG_KEXEC_FILE */
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
-
|
||||
static int
|
||||
kexec_mark_range(unsigned long start, unsigned long end, bool protect)
|
||||
{
|
||||
@@ -591,7 +589,6 @@ void arch_kexec_unprotect_crashkres(void)
|
||||
{
|
||||
kexec_mark_crashkres(false);
|
||||
}
|
||||
-#endif
|
||||
|
||||
/*
|
||||
* During a traditional boot under SME, SME will encrypt the kernel,
|
||||
diff --git a/arch/x86/kernel/reboot.c b/arch/x86/kernel/reboot.c
|
||||
index f3130f762784a1..830425e6d38e2f 100644
|
||||
--- a/arch/x86/kernel/reboot.c
|
||||
+++ b/arch/x86/kernel/reboot.c
|
||||
@@ -796,7 +796,7 @@ struct machine_ops machine_ops __ro_after_init = {
|
||||
.emergency_restart = native_machine_emergency_restart,
|
||||
.restart = native_machine_restart,
|
||||
.halt = native_machine_halt,
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
+#ifdef CONFIG_KEXEC_CORE
|
||||
.crash_shutdown = native_machine_crash_shutdown,
|
||||
#endif
|
||||
};
|
||||
@@ -826,7 +826,7 @@ void machine_halt(void)
|
||||
machine_ops.halt();
|
||||
}
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
+#ifdef CONFIG_KEXEC_CORE
|
||||
void machine_crash_shutdown(struct pt_regs *regs)
|
||||
{
|
||||
machine_ops.crash_shutdown(regs);
|
||||
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
|
||||
index 8bcecabd475bdf..eb129277dcdd64 100644
|
||||
--- a/arch/x86/kernel/setup.c
|
||||
+++ b/arch/x86/kernel/setup.c
|
||||
@@ -547,7 +547,7 @@ static void __init reserve_crashkernel(void)
|
||||
bool high = false;
|
||||
int ret;
|
||||
|
||||
- if (!IS_ENABLED(CONFIG_CRASH_RESERVE))
|
||||
+ if (!IS_ENABLED(CONFIG_KEXEC_CORE))
|
||||
return;
|
||||
|
||||
total_mem = memblock_phys_mem_size();
|
||||
diff --git a/arch/x86/kernel/smp.c b/arch/x86/kernel/smp.c
|
||||
index 52c3823b721191..96a771f9f930a6 100644
|
||||
--- a/arch/x86/kernel/smp.c
|
||||
+++ b/arch/x86/kernel/smp.c
|
||||
@@ -282,7 +282,7 @@ struct smp_ops smp_ops = {
|
||||
.smp_cpus_done = native_smp_cpus_done,
|
||||
|
||||
.stop_other_cpus = native_stop_other_cpus,
|
||||
-#if defined(CONFIG_CRASH_DUMP)
|
||||
+#if defined(CONFIG_KEXEC_CORE)
|
||||
.crash_stop_other_cpus = kdump_nmi_shootdown_cpus,
|
||||
#endif
|
||||
.smp_send_reschedule = native_smp_send_reschedule,
|
||||
diff --git a/arch/x86/xen/enlighten_hvm.c b/arch/x86/xen/enlighten_hvm.c
|
||||
index ade22feee7aeb1..70be57e8f51caa 100644
|
||||
--- a/arch/x86/xen/enlighten_hvm.c
|
||||
+++ b/arch/x86/xen/enlighten_hvm.c
|
||||
@@ -141,9 +141,7 @@ static void xen_hvm_shutdown(void)
|
||||
if (kexec_in_progress)
|
||||
xen_reboot(SHUTDOWN_soft_reset);
|
||||
}
|
||||
-#endif
|
||||
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
static void xen_hvm_crash_shutdown(struct pt_regs *regs)
|
||||
{
|
||||
native_machine_crash_shutdown(regs);
|
||||
@@ -231,8 +229,6 @@ static void __init xen_hvm_guest_init(void)
|
||||
|
||||
#ifdef CONFIG_KEXEC_CORE
|
||||
machine_ops.shutdown = xen_hvm_shutdown;
|
||||
-#endif
|
||||
-#ifdef CONFIG_CRASH_DUMP
|
||||
machine_ops.crash_shutdown = xen_hvm_crash_shutdown;
|
||||
#endif
|
||||
}
|
||||
diff --git a/arch/x86/xen/mmu_pv.c b/arch/x86/xen/mmu_pv.c
|
||||
index bfd57d07f4b5ee..6b201e64d8abc8 100644
|
||||
--- a/arch/x86/xen/mmu_pv.c
|
||||
+++ b/arch/x86/xen/mmu_pv.c
|
||||
@@ -2517,7 +2517,7 @@ int xen_remap_pfn(struct vm_area_struct *vma, unsigned long addr,
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(xen_remap_pfn);
|
||||
|
||||
-#ifdef CONFIG_VMCORE_INFO
|
||||
+#ifdef CONFIG_KEXEC_CORE
|
||||
phys_addr_t paddr_vmcoreinfo_note(void)
|
||||
{
|
||||
if (xen_pv_domain())
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,586 @@
|
|||
diff --git a/Makefile b/Makefile
|
||||
index fb4949cac6ffbf..2ba627f545901e 100644
|
||||
--- a/Makefile
|
||||
+++ b/Makefile
|
||||
@@ -1,7 +1,7 @@
|
||||
# SPDX-License-Identifier: GPL-2.0
|
||||
VERSION = 6
|
||||
PATCHLEVEL = 6
|
||||
-SUBLEVEL = 72
|
||||
+SUBLEVEL = 73
|
||||
EXTRAVERSION =
|
||||
NAME = Pinguïn Aangedreven
|
||||
|
||||
diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c
|
||||
index f14c412c56097d..ada3fcc9c6d501 100644
|
||||
--- a/fs/overlayfs/copy_up.c
|
||||
+++ b/fs/overlayfs/copy_up.c
|
||||
@@ -371,13 +371,13 @@ int ovl_set_attr(struct ovl_fs *ofs, struct dentry *upperdentry,
|
||||
return err;
|
||||
}
|
||||
|
||||
-struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct inode *realinode,
|
||||
+struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct dentry *real,
|
||||
bool is_upper)
|
||||
{
|
||||
struct ovl_fh *fh;
|
||||
int fh_type, dwords;
|
||||
int buflen = MAX_HANDLE_SZ;
|
||||
- uuid_t *uuid = &realinode->i_sb->s_uuid;
|
||||
+ uuid_t *uuid = &real->d_sb->s_uuid;
|
||||
int err;
|
||||
|
||||
/* Make sure the real fid stays 32bit aligned */
|
||||
@@ -394,8 +394,7 @@ struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct inode *realinode,
|
||||
* the price or reconnecting the dentry.
|
||||
*/
|
||||
dwords = buflen >> 2;
|
||||
- fh_type = exportfs_encode_inode_fh(realinode, (void *)fh->fb.fid,
|
||||
- &dwords, NULL, 0);
|
||||
+ fh_type = exportfs_encode_fh(real, (void *)fh->fb.fid, &dwords, 0);
|
||||
buflen = (dwords << 2);
|
||||
|
||||
err = -EIO;
|
||||
@@ -427,29 +426,29 @@ struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct inode *realinode,
|
||||
return ERR_PTR(err);
|
||||
}
|
||||
|
||||
-struct ovl_fh *ovl_get_origin_fh(struct ovl_fs *ofs, struct dentry *origin)
|
||||
+int ovl_set_origin(struct ovl_fs *ofs, struct dentry *lower,
|
||||
+ struct dentry *upper)
|
||||
{
|
||||
+ const struct ovl_fh *fh = NULL;
|
||||
+ int err;
|
||||
+
|
||||
/*
|
||||
* When lower layer doesn't support export operations store a 'null' fh,
|
||||
* so we can use the overlay.origin xattr to distignuish between a copy
|
||||
* up and a pure upper inode.
|
||||
*/
|
||||
- if (!ovl_can_decode_fh(origin->d_sb))
|
||||
- return NULL;
|
||||
-
|
||||
- return ovl_encode_real_fh(ofs, d_inode(origin), false);
|
||||
-}
|
||||
-
|
||||
-int ovl_set_origin_fh(struct ovl_fs *ofs, const struct ovl_fh *fh,
|
||||
- struct dentry *upper)
|
||||
-{
|
||||
- int err;
|
||||
+ if (ovl_can_decode_fh(lower->d_sb)) {
|
||||
+ fh = ovl_encode_real_fh(ofs, lower, false);
|
||||
+ if (IS_ERR(fh))
|
||||
+ return PTR_ERR(fh);
|
||||
+ }
|
||||
|
||||
/*
|
||||
* Do not fail when upper doesn't support xattrs.
|
||||
*/
|
||||
err = ovl_check_setxattr(ofs, upper, OVL_XATTR_ORIGIN, fh->buf,
|
||||
fh ? fh->fb.len : 0, 0);
|
||||
+ kfree(fh);
|
||||
|
||||
/* Ignore -EPERM from setting "user.*" on symlink/special */
|
||||
return err == -EPERM ? 0 : err;
|
||||
@@ -462,7 +461,7 @@ static int ovl_set_upper_fh(struct ovl_fs *ofs, struct dentry *upper,
|
||||
const struct ovl_fh *fh;
|
||||
int err;
|
||||
|
||||
- fh = ovl_encode_real_fh(ofs, d_inode(upper), true);
|
||||
+ fh = ovl_encode_real_fh(ofs, upper, true);
|
||||
if (IS_ERR(fh))
|
||||
return PTR_ERR(fh);
|
||||
|
||||
@@ -477,7 +476,7 @@ static int ovl_set_upper_fh(struct ovl_fs *ofs, struct dentry *upper,
|
||||
*
|
||||
* Caller must hold i_mutex on indexdir.
|
||||
*/
|
||||
-static int ovl_create_index(struct dentry *dentry, const struct ovl_fh *fh,
|
||||
+static int ovl_create_index(struct dentry *dentry, struct dentry *origin,
|
||||
struct dentry *upper)
|
||||
{
|
||||
struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
|
||||
@@ -503,7 +502,7 @@ static int ovl_create_index(struct dentry *dentry, const struct ovl_fh *fh,
|
||||
if (WARN_ON(ovl_test_flag(OVL_INDEX, d_inode(dentry))))
|
||||
return -EIO;
|
||||
|
||||
- err = ovl_get_index_name_fh(fh, &name);
|
||||
+ err = ovl_get_index_name(ofs, origin, &name);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
@@ -542,7 +541,6 @@ struct ovl_copy_up_ctx {
|
||||
struct dentry *destdir;
|
||||
struct qstr destname;
|
||||
struct dentry *workdir;
|
||||
- const struct ovl_fh *origin_fh;
|
||||
bool origin;
|
||||
bool indexed;
|
||||
bool metacopy;
|
||||
@@ -639,7 +637,7 @@ static int ovl_copy_up_metadata(struct ovl_copy_up_ctx *c, struct dentry *temp)
|
||||
* hard link.
|
||||
*/
|
||||
if (c->origin) {
|
||||
- err = ovl_set_origin_fh(ofs, c->origin_fh, temp);
|
||||
+ err = ovl_set_origin(ofs, c->lowerpath.dentry, temp);
|
||||
if (err)
|
||||
return err;
|
||||
}
|
||||
@@ -751,7 +749,7 @@ static int ovl_copy_up_workdir(struct ovl_copy_up_ctx *c)
|
||||
goto cleanup;
|
||||
|
||||
if (S_ISDIR(c->stat.mode) && c->indexed) {
|
||||
- err = ovl_create_index(c->dentry, c->origin_fh, temp);
|
||||
+ err = ovl_create_index(c->dentry, c->lowerpath.dentry, temp);
|
||||
if (err)
|
||||
goto cleanup;
|
||||
}
|
||||
@@ -863,8 +861,6 @@ static int ovl_do_copy_up(struct ovl_copy_up_ctx *c)
|
||||
{
|
||||
int err;
|
||||
struct ovl_fs *ofs = OVL_FS(c->dentry->d_sb);
|
||||
- struct dentry *origin = c->lowerpath.dentry;
|
||||
- struct ovl_fh *fh = NULL;
|
||||
bool to_index = false;
|
||||
|
||||
/*
|
||||
@@ -881,25 +877,17 @@ static int ovl_do_copy_up(struct ovl_copy_up_ctx *c)
|
||||
to_index = true;
|
||||
}
|
||||
|
||||
- if (S_ISDIR(c->stat.mode) || c->stat.nlink == 1 || to_index) {
|
||||
- fh = ovl_get_origin_fh(ofs, origin);
|
||||
- if (IS_ERR(fh))
|
||||
- return PTR_ERR(fh);
|
||||
-
|
||||
- /* origin_fh may be NULL */
|
||||
- c->origin_fh = fh;
|
||||
+ if (S_ISDIR(c->stat.mode) || c->stat.nlink == 1 || to_index)
|
||||
c->origin = true;
|
||||
- }
|
||||
|
||||
if (to_index) {
|
||||
c->destdir = ovl_indexdir(c->dentry->d_sb);
|
||||
- err = ovl_get_index_name(ofs, origin, &c->destname);
|
||||
+ err = ovl_get_index_name(ofs, c->lowerpath.dentry, &c->destname);
|
||||
if (err)
|
||||
- goto out_free_fh;
|
||||
+ return err;
|
||||
} else if (WARN_ON(!c->parent)) {
|
||||
/* Disconnected dentry must be copied up to index dir */
|
||||
- err = -EIO;
|
||||
- goto out_free_fh;
|
||||
+ return -EIO;
|
||||
} else {
|
||||
/*
|
||||
* Mark parent "impure" because it may now contain non-pure
|
||||
@@ -907,7 +895,7 @@ static int ovl_do_copy_up(struct ovl_copy_up_ctx *c)
|
||||
*/
|
||||
err = ovl_set_impure(c->parent, c->destdir);
|
||||
if (err)
|
||||
- goto out_free_fh;
|
||||
+ return err;
|
||||
}
|
||||
|
||||
/* Should we copyup with O_TMPFILE or with workdir? */
|
||||
@@ -939,8 +927,6 @@ static int ovl_do_copy_up(struct ovl_copy_up_ctx *c)
|
||||
out:
|
||||
if (to_index)
|
||||
kfree(c->destname.name);
|
||||
-out_free_fh:
|
||||
- kfree(fh);
|
||||
return err;
|
||||
}
|
||||
|
||||
diff --git a/fs/overlayfs/export.c b/fs/overlayfs/export.c
|
||||
index 3a17e4366f28c0..611ff567a1aa6f 100644
|
||||
--- a/fs/overlayfs/export.c
|
||||
+++ b/fs/overlayfs/export.c
|
||||
@@ -181,37 +181,35 @@ static int ovl_connect_layer(struct dentry *dentry)
|
||||
*
|
||||
* Return 0 for upper file handle, > 0 for lower file handle or < 0 on error.
|
||||
*/
|
||||
-static int ovl_check_encode_origin(struct inode *inode)
|
||||
+static int ovl_check_encode_origin(struct dentry *dentry)
|
||||
{
|
||||
- struct ovl_fs *ofs = OVL_FS(inode->i_sb);
|
||||
+ struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
|
||||
bool decodable = ofs->config.nfs_export;
|
||||
- struct dentry *dentry;
|
||||
- int err;
|
||||
|
||||
/* No upper layer? */
|
||||
if (!ovl_upper_mnt(ofs))
|
||||
return 1;
|
||||
|
||||
/* Lower file handle for non-upper non-decodable */
|
||||
- if (!ovl_inode_upper(inode) && !decodable)
|
||||
+ if (!ovl_dentry_upper(dentry) && !decodable)
|
||||
return 1;
|
||||
|
||||
/* Upper file handle for pure upper */
|
||||
- if (!ovl_inode_lower(inode))
|
||||
+ if (!ovl_dentry_lower(dentry))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Root is never indexed, so if there's an upper layer, encode upper for
|
||||
* root.
|
||||
*/
|
||||
- if (inode == d_inode(inode->i_sb->s_root))
|
||||
+ if (dentry == dentry->d_sb->s_root)
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Upper decodable file handle for non-indexed upper.
|
||||
*/
|
||||
- if (ovl_inode_upper(inode) && decodable &&
|
||||
- !ovl_test_flag(OVL_INDEX, inode))
|
||||
+ if (ovl_dentry_upper(dentry) && decodable &&
|
||||
+ !ovl_test_flag(OVL_INDEX, d_inode(dentry)))
|
||||
return 0;
|
||||
|
||||
/*
|
||||
@@ -220,23 +218,14 @@ static int ovl_check_encode_origin(struct inode *inode)
|
||||
* ovl_connect_layer() will try to make origin's layer "connected" by
|
||||
* copying up a "connectable" ancestor.
|
||||
*/
|
||||
- if (!decodable || !S_ISDIR(inode->i_mode))
|
||||
- return 1;
|
||||
-
|
||||
- dentry = d_find_any_alias(inode);
|
||||
- if (!dentry)
|
||||
- return -ENOENT;
|
||||
-
|
||||
- err = ovl_connect_layer(dentry);
|
||||
- dput(dentry);
|
||||
- if (err < 0)
|
||||
- return err;
|
||||
+ if (d_is_dir(dentry) && decodable)
|
||||
+ return ovl_connect_layer(dentry);
|
||||
|
||||
/* Lower file handle for indexed and non-upper dir/non-dir */
|
||||
return 1;
|
||||
}
|
||||
|
||||
-static int ovl_dentry_to_fid(struct ovl_fs *ofs, struct inode *inode,
|
||||
+static int ovl_dentry_to_fid(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
u32 *fid, int buflen)
|
||||
{
|
||||
struct ovl_fh *fh = NULL;
|
||||
@@ -247,13 +236,13 @@ static int ovl_dentry_to_fid(struct ovl_fs *ofs, struct inode *inode,
|
||||
* Check if we should encode a lower or upper file handle and maybe
|
||||
* copy up an ancestor to make lower file handle connectable.
|
||||
*/
|
||||
- err = enc_lower = ovl_check_encode_origin(inode);
|
||||
+ err = enc_lower = ovl_check_encode_origin(dentry);
|
||||
if (enc_lower < 0)
|
||||
goto fail;
|
||||
|
||||
/* Encode an upper or lower file handle */
|
||||
- fh = ovl_encode_real_fh(ofs, enc_lower ? ovl_inode_lower(inode) :
|
||||
- ovl_inode_upper(inode), !enc_lower);
|
||||
+ fh = ovl_encode_real_fh(ofs, enc_lower ? ovl_dentry_lower(dentry) :
|
||||
+ ovl_dentry_upper(dentry), !enc_lower);
|
||||
if (IS_ERR(fh))
|
||||
return PTR_ERR(fh);
|
||||
|
||||
@@ -267,8 +256,8 @@ static int ovl_dentry_to_fid(struct ovl_fs *ofs, struct inode *inode,
|
||||
return err;
|
||||
|
||||
fail:
|
||||
- pr_warn_ratelimited("failed to encode file handle (ino=%lu, err=%i)\n",
|
||||
- inode->i_ino, err);
|
||||
+ pr_warn_ratelimited("failed to encode file handle (%pd2, err=%i)\n",
|
||||
+ dentry, err);
|
||||
goto out;
|
||||
}
|
||||
|
||||
@@ -276,13 +265,19 @@ static int ovl_encode_fh(struct inode *inode, u32 *fid, int *max_len,
|
||||
struct inode *parent)
|
||||
{
|
||||
struct ovl_fs *ofs = OVL_FS(inode->i_sb);
|
||||
+ struct dentry *dentry;
|
||||
int bytes, buflen = *max_len << 2;
|
||||
|
||||
/* TODO: encode connectable file handles */
|
||||
if (parent)
|
||||
return FILEID_INVALID;
|
||||
|
||||
- bytes = ovl_dentry_to_fid(ofs, inode, fid, buflen);
|
||||
+ dentry = d_find_any_alias(inode);
|
||||
+ if (!dentry)
|
||||
+ return FILEID_INVALID;
|
||||
+
|
||||
+ bytes = ovl_dentry_to_fid(ofs, dentry, fid, buflen);
|
||||
+ dput(dentry);
|
||||
if (bytes <= 0)
|
||||
return FILEID_INVALID;
|
||||
|
||||
diff --git a/fs/overlayfs/namei.c b/fs/overlayfs/namei.c
|
||||
index 2d2ef671b36ba5..80391c687c2ad8 100644
|
||||
--- a/fs/overlayfs/namei.c
|
||||
+++ b/fs/overlayfs/namei.c
|
||||
@@ -507,19 +507,6 @@ static int ovl_verify_fh(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
return err;
|
||||
}
|
||||
|
||||
-int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
- enum ovl_xattr ox, const struct ovl_fh *fh,
|
||||
- bool is_upper, bool set)
|
||||
-{
|
||||
- int err;
|
||||
-
|
||||
- err = ovl_verify_fh(ofs, dentry, ox, fh);
|
||||
- if (set && err == -ENODATA)
|
||||
- err = ovl_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len);
|
||||
-
|
||||
- return err;
|
||||
-}
|
||||
-
|
||||
/*
|
||||
* Verify that @real dentry matches the file handle stored in xattr @name.
|
||||
*
|
||||
@@ -528,22 +515,24 @@ int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
*
|
||||
* Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
|
||||
*/
|
||||
-int ovl_verify_origin_xattr(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
- enum ovl_xattr ox, struct dentry *real,
|
||||
- bool is_upper, bool set)
|
||||
+int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
+ enum ovl_xattr ox, struct dentry *real, bool is_upper,
|
||||
+ bool set)
|
||||
{
|
||||
struct inode *inode;
|
||||
struct ovl_fh *fh;
|
||||
int err;
|
||||
|
||||
- fh = ovl_encode_real_fh(ofs, d_inode(real), is_upper);
|
||||
+ fh = ovl_encode_real_fh(ofs, real, is_upper);
|
||||
err = PTR_ERR(fh);
|
||||
if (IS_ERR(fh)) {
|
||||
fh = NULL;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
- err = ovl_verify_set_fh(ofs, dentry, ox, fh, is_upper, set);
|
||||
+ err = ovl_verify_fh(ofs, dentry, ox, fh);
|
||||
+ if (set && err == -ENODATA)
|
||||
+ err = ovl_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len);
|
||||
if (err)
|
||||
goto fail;
|
||||
|
||||
@@ -559,7 +548,6 @@ int ovl_verify_origin_xattr(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
goto out;
|
||||
}
|
||||
|
||||
-
|
||||
/* Get upper dentry from index */
|
||||
struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index,
|
||||
bool connected)
|
||||
@@ -696,7 +684,7 @@ int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index)
|
||||
goto out;
|
||||
}
|
||||
|
||||
-int ovl_get_index_name_fh(const struct ovl_fh *fh, struct qstr *name)
|
||||
+static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name)
|
||||
{
|
||||
char *n, *s;
|
||||
|
||||
@@ -732,7 +720,7 @@ int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin,
|
||||
struct ovl_fh *fh;
|
||||
int err;
|
||||
|
||||
- fh = ovl_encode_real_fh(ofs, d_inode(origin), false);
|
||||
+ fh = ovl_encode_real_fh(ofs, origin, false);
|
||||
if (IS_ERR(fh))
|
||||
return PTR_ERR(fh);
|
||||
|
||||
@@ -885,27 +873,20 @@ int ovl_path_next(int idx, struct dentry *dentry, struct path *path)
|
||||
static int ovl_fix_origin(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
struct dentry *lower, struct dentry *upper)
|
||||
{
|
||||
- const struct ovl_fh *fh;
|
||||
int err;
|
||||
|
||||
if (ovl_check_origin_xattr(ofs, upper))
|
||||
return 0;
|
||||
|
||||
- fh = ovl_get_origin_fh(ofs, lower);
|
||||
- if (IS_ERR(fh))
|
||||
- return PTR_ERR(fh);
|
||||
-
|
||||
err = ovl_want_write(dentry);
|
||||
if (err)
|
||||
- goto out;
|
||||
+ return err;
|
||||
|
||||
- err = ovl_set_origin_fh(ofs, fh, upper);
|
||||
+ err = ovl_set_origin(ofs, lower, upper);
|
||||
if (!err)
|
||||
err = ovl_set_impure(dentry->d_parent, upper->d_parent);
|
||||
|
||||
ovl_drop_write(dentry);
|
||||
-out:
|
||||
- kfree(fh);
|
||||
return err;
|
||||
}
|
||||
|
||||
diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h
|
||||
index ca63a26a6170b0..09ca82ed0f8ced 100644
|
||||
--- a/fs/overlayfs/overlayfs.h
|
||||
+++ b/fs/overlayfs/overlayfs.h
|
||||
@@ -632,15 +632,11 @@ struct dentry *ovl_decode_real_fh(struct ovl_fs *ofs, struct ovl_fh *fh,
|
||||
int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, bool connected,
|
||||
struct dentry *upperdentry, struct ovl_path **stackp);
|
||||
int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
- enum ovl_xattr ox, const struct ovl_fh *fh,
|
||||
- bool is_upper, bool set);
|
||||
-int ovl_verify_origin_xattr(struct ovl_fs *ofs, struct dentry *dentry,
|
||||
- enum ovl_xattr ox, struct dentry *real,
|
||||
- bool is_upper, bool set);
|
||||
+ enum ovl_xattr ox, struct dentry *real, bool is_upper,
|
||||
+ bool set);
|
||||
struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index,
|
||||
bool connected);
|
||||
int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index);
|
||||
-int ovl_get_index_name_fh(const struct ovl_fh *fh, struct qstr *name);
|
||||
int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin,
|
||||
struct qstr *name);
|
||||
struct dentry *ovl_get_index_fh(struct ovl_fs *ofs, struct ovl_fh *fh);
|
||||
@@ -652,24 +648,17 @@ struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry,
|
||||
unsigned int flags);
|
||||
bool ovl_lower_positive(struct dentry *dentry);
|
||||
|
||||
-static inline int ovl_verify_origin_fh(struct ovl_fs *ofs, struct dentry *upper,
|
||||
- const struct ovl_fh *fh, bool set)
|
||||
-{
|
||||
- return ovl_verify_set_fh(ofs, upper, OVL_XATTR_ORIGIN, fh, false, set);
|
||||
-}
|
||||
-
|
||||
static inline int ovl_verify_origin(struct ovl_fs *ofs, struct dentry *upper,
|
||||
struct dentry *origin, bool set)
|
||||
{
|
||||
- return ovl_verify_origin_xattr(ofs, upper, OVL_XATTR_ORIGIN, origin,
|
||||
- false, set);
|
||||
+ return ovl_verify_set_fh(ofs, upper, OVL_XATTR_ORIGIN, origin,
|
||||
+ false, set);
|
||||
}
|
||||
|
||||
static inline int ovl_verify_upper(struct ovl_fs *ofs, struct dentry *index,
|
||||
struct dentry *upper, bool set)
|
||||
{
|
||||
- return ovl_verify_origin_xattr(ofs, index, OVL_XATTR_UPPER, upper,
|
||||
- true, set);
|
||||
+ return ovl_verify_set_fh(ofs, index, OVL_XATTR_UPPER, upper, true, set);
|
||||
}
|
||||
|
||||
/* readdir.c */
|
||||
@@ -832,11 +821,10 @@ int ovl_copy_up_with_data(struct dentry *dentry);
|
||||
int ovl_maybe_copy_up(struct dentry *dentry, int flags);
|
||||
int ovl_copy_xattr(struct super_block *sb, const struct path *path, struct dentry *new);
|
||||
int ovl_set_attr(struct ovl_fs *ofs, struct dentry *upper, struct kstat *stat);
|
||||
-struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct inode *realinode,
|
||||
+struct ovl_fh *ovl_encode_real_fh(struct ovl_fs *ofs, struct dentry *real,
|
||||
bool is_upper);
|
||||
-struct ovl_fh *ovl_get_origin_fh(struct ovl_fs *ofs, struct dentry *origin);
|
||||
-int ovl_set_origin_fh(struct ovl_fs *ofs, const struct ovl_fh *fh,
|
||||
- struct dentry *upper);
|
||||
+int ovl_set_origin(struct ovl_fs *ofs, struct dentry *lower,
|
||||
+ struct dentry *upper);
|
||||
|
||||
/* export.c */
|
||||
extern const struct export_operations ovl_export_operations;
|
||||
diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c
|
||||
index e2574034c3fa17..2c056d737c27c3 100644
|
||||
--- a/fs/overlayfs/super.c
|
||||
+++ b/fs/overlayfs/super.c
|
||||
@@ -879,20 +879,15 @@ static int ovl_get_indexdir(struct super_block *sb, struct ovl_fs *ofs,
|
||||
{
|
||||
struct vfsmount *mnt = ovl_upper_mnt(ofs);
|
||||
struct dentry *indexdir;
|
||||
- struct dentry *origin = ovl_lowerstack(oe)->dentry;
|
||||
- const struct ovl_fh *fh;
|
||||
int err;
|
||||
|
||||
- fh = ovl_get_origin_fh(ofs, origin);
|
||||
- if (IS_ERR(fh))
|
||||
- return PTR_ERR(fh);
|
||||
-
|
||||
err = mnt_want_write(mnt);
|
||||
if (err)
|
||||
- goto out_free_fh;
|
||||
+ return err;
|
||||
|
||||
/* Verify lower root is upper root origin */
|
||||
- err = ovl_verify_origin_fh(ofs, upperpath->dentry, fh, true);
|
||||
+ err = ovl_verify_origin(ofs, upperpath->dentry,
|
||||
+ ovl_lowerstack(oe)->dentry, true);
|
||||
if (err) {
|
||||
pr_err("failed to verify upper root origin\n");
|
||||
goto out;
|
||||
@@ -924,10 +919,9 @@ static int ovl_get_indexdir(struct super_block *sb, struct ovl_fs *ofs,
|
||||
* directory entries.
|
||||
*/
|
||||
if (ovl_check_origin_xattr(ofs, ofs->indexdir)) {
|
||||
- err = ovl_verify_origin_xattr(ofs, ofs->indexdir,
|
||||
- OVL_XATTR_ORIGIN,
|
||||
- upperpath->dentry, true,
|
||||
- false);
|
||||
+ err = ovl_verify_set_fh(ofs, ofs->indexdir,
|
||||
+ OVL_XATTR_ORIGIN,
|
||||
+ upperpath->dentry, true, false);
|
||||
if (err)
|
||||
pr_err("failed to verify index dir 'origin' xattr\n");
|
||||
}
|
||||
@@ -945,8 +939,6 @@ static int ovl_get_indexdir(struct super_block *sb, struct ovl_fs *ofs,
|
||||
|
||||
out:
|
||||
mnt_drop_write(mnt);
|
||||
-out_free_fh:
|
||||
- kfree(fh);
|
||||
return err;
|
||||
}
|
||||
|
||||
diff --git a/fs/overlayfs/util.c b/fs/overlayfs/util.c
|
||||
index 4e6b747e0f2e25..0bf3ffcd072f6a 100644
|
||||
--- a/fs/overlayfs/util.c
|
||||
+++ b/fs/overlayfs/util.c
|
||||
@@ -976,18 +976,12 @@ static void ovl_cleanup_index(struct dentry *dentry)
|
||||
struct dentry *index = NULL;
|
||||
struct inode *inode;
|
||||
struct qstr name = { };
|
||||
- bool got_write = false;
|
||||
int err;
|
||||
|
||||
err = ovl_get_index_name(ofs, lowerdentry, &name);
|
||||
if (err)
|
||||
goto fail;
|
||||
|
||||
- err = ovl_want_write(dentry);
|
||||
- if (err)
|
||||
- goto fail;
|
||||
-
|
||||
- got_write = true;
|
||||
inode = d_inode(upperdentry);
|
||||
if (!S_ISDIR(inode->i_mode) && inode->i_nlink != 1) {
|
||||
pr_warn_ratelimited("cleanup linked index (%pd2, ino=%lu, nlink=%u)\n",
|
||||
@@ -1025,8 +1019,6 @@ static void ovl_cleanup_index(struct dentry *dentry)
|
||||
goto fail;
|
||||
|
||||
out:
|
||||
- if (got_write)
|
||||
- ovl_drop_write(dentry);
|
||||
kfree(name.name);
|
||||
dput(index);
|
||||
return;
|
||||
@@ -1097,8 +1089,6 @@ void ovl_nlink_end(struct dentry *dentry)
|
||||
{
|
||||
struct inode *inode = d_inode(dentry);
|
||||
|
||||
- ovl_drop_write(dentry);
|
||||
-
|
||||
if (ovl_test_flag(OVL_INDEX, inode) && inode->i_nlink == 0) {
|
||||
const struct cred *old_cred;
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue