From nobody Thu Oct 2 14:24:03 2025 Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 164BE3191B0 for ; Tue, 16 Sep 2025 13:59:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.52 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758031179; cv=none; b=gq6BMdbyTbvT2OJTy6Yp7nMI+ob8Gv8Awo6sTeqqQawXKJ/U4uGQaJRVpnaVxqGAEWC5+epK7ZoIe4OdMUGddflOFZngaJQbQYu/n+Hv6T1GXfVI7rSHoirSQoZRRav2oCZQsuk5dBcDFC3JFtsSuoLJwxG3en85CGJi//qyDJw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758031179; c=relaxed/simple; bh=4ZH9W3P+XiG/Sp7tBDITc58g7he5Ng0NmNakO8szh+8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Vm4WpnVjSYkLMw7x4GMByWvLuHlr5AR1yId+VivYk6PXj/c36mQkZ2G5X/MP/BOMH5Ej8040T6Rq64BSBylqF5KNavqdJ16GUT1H+UDQbibQf6oIs8QpVroS0sle35uwDXK//L80atadEDa/jCjge8EpG77cSz+H4xZVg9mrcn8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=NzHK56T4; arc=none smtp.client-ip=209.85.128.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="NzHK56T4" Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-45dcfecdc0fso55132075e9.1 for ; Tue, 16 Sep 2025 06:59:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1758031174; x=1758635974; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=EhJbct8Hpn8FASNagja9p1KxL0ag1VLHqziGZAwrXc4=; b=NzHK56T4Gc9JTM6H5ShPFQQhyyD1KBGLZZDgYq4XZa1aMIo2n4DP9S0SqtZSlgWAel URh6NqbNPTAC0XBYWmTWUCNq3f7yIBNCgTDGy30CRsnWD3N6BeCrDUdCf8AY1Jy0sxfs WxF4HDJQyHIVnXBszwq0VmZmX6SitvC+7rsMYWXwI9n075Gotqh9WWoCi35qff0KJekl vzrjUrDNBpGx9Ytd4bcUK8NHqrUw/DQeUDJF/Nrmm/urXLiciDnr62isLxnvHErkwNE9 ChRWElykA0Gkfi8CJCeridEoKr/rNMWmUrWzXUSrCFAYe/597o+/Dg7K3iJmLIkP7uTy 7GFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1758031174; x=1758635974; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=EhJbct8Hpn8FASNagja9p1KxL0ag1VLHqziGZAwrXc4=; b=cZqik5zITFqSIwv8du09yGiwEs9pqp3VEfvc3+/P/watbWSjvkK+W0B6xz/p9NRm4e b6hiLjzlMO8A3PsZemZY+8ZueuuAY+Jp+OcYs2g1GTK1KBYjaCGEveKz5qLuuhgr+RYX +SlL/qGp4sklBu+4QaP2KtFmhlfg2hdeUpsMGMmdiJ3PdetILSOH16mYYHCm9BOck+Zs as2r9vJy8a+As6KaON0MwQVnwk7Uy0i2NJJoHuRXrdRJyLW3DBjzA3+H1R1WckaRfXQ7 vWJj1BL564NoFZn6LTF4gjOI2ohlW2Hy3oxH7kX2CJmIuG5XxyrXqejRcldP76G/oPHe 5rQA== X-Forwarded-Encrypted: i=1; AJvYcCXKgpt8+VsxBHm515tP5dEAJPlwf5r9QwZ0BHLkpxmG8joWMj/y4rA30cNHaXXyuItjtHLOh6U9wpRqwD0=@vger.kernel.org X-Gm-Message-State: AOJu0YxM/nE9e+eCigCIOc11CaNLhaEGiBblRSx6TEmRYjW3ymUuRlXj 01xuuRZDDLnxRoJWpzPZyBDtHlAsv1HGUTLi7FxU4sTuqYCXrIQ2BSir X-Gm-Gg: ASbGnctZ22OFNi6nbwmxTSBZC9eTle3Ki2qKDKVfol2sqlxU3hTvYz7baO6q2sA6dVJ s1VYdriuC+ER0TX1zD8roLRqwYwI1eaD2QLYW7qD3jW0qJqPZqe55M98p3WdgZoWQQWFhdJbGAm qfmg3aGMYTUOO9Jx2oYg8uu1N3dLRuoBzavKJX82kHzTjQo8G6alpWhYxnu6A+ejclurNg8Ln+3 MCYnZh84B7z3gnpPJDlRwUdpkiCNW6wrx1CIHFuiGYLnqmiZprbbyPrX8UQ0vNwVTUYC0QM7fW5 xNrn1IvU5XplQhMmxBeUeXDwXq+DlRnCEfewhHvJknrsY3M59fpcx6oitbUSLBqzjhX5tGIMpEL WaO+KaWCZ5Qn4Ggv+WD4UnL8t1IT685oW5yvNG6qfw/Dq52R9ukzY9TwFZNU0eCCGTDyTZKht X-Google-Smtp-Source: AGHT+IEv/yp+v5i4wDZD8rx/vzr2v/aCCUSPqPNX1ISHbufqpWah1qF1v3yMiZroJvxSpOFaPBPDfg== X-Received: by 2002:a5d:5d01:0:b0:3e1:734b:5393 with SMTP id ffacd0b85a97d-3e7657b6a36mr14835320f8f.28.1758031174218; Tue, 16 Sep 2025 06:59:34 -0700 (PDT) Received: from f.. (cst-prg-88-146.cust.vodafone.cz. [46.135.88.146]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-3e7cde81491sm16557991f8f.42.2025.09.16.06.59.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Sep 2025 06:59:33 -0700 (PDT) From: Mateusz Guzik To: brauner@kernel.org Cc: viro@zeniv.linux.org.uk, jack@suse.cz, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, josef@toxicpanda.com, kernel-team@fb.com, amir73il@gmail.com, linux-btrfs@vger.kernel.org, linux-ext4@vger.kernel.org, linux-xfs@vger.kernel.org, ceph-devel@vger.kernel.org, linux-unionfs@vger.kernel.org, Mateusz Guzik Subject: [PATCH v4 01/12] fs: provide accessors for ->i_state Date: Tue, 16 Sep 2025 15:58:49 +0200 Message-ID: <20250916135900.2170346-2-mjguzik@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250916135900.2170346-1-mjguzik@gmail.com> References: <20250916135900.2170346-1-mjguzik@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Open-coded accesses prevent asserting they are done correctly. One obvious aspect is locking, but significantly more can checked. For example it can be detected when the code is clearing flags which are already missing, or is setting flags when it is illegal (e.g., I_FREEING when ->i_count > 0). In order to keep things manageable this patchset merely gets the thing off the ground with only lockdep checks baked in. Current consumers can be trivially converted. Suppose flags I_A and I_B are to be handled, then if ->i_lock is held: state =3D inode->i_state =3D> state =3D inode_state_read(inode) inode->i_state |=3D (I_A | I_B) =3D> inode_state_add(inode, I_A | I_B) inode->i_state &=3D ~(I_A | I_B) =3D> inode_state_del(inode, I_A | I_B) inode->i_state =3D I_A | I_B =3D> inode_state_set(inode, I_A | I_B) If ->i_lock is not held or only held conditionally, add "_once" suffix for the read routine or "_raw" for the rest: state =3D inode->i_state =3D> state =3D inode_state_read_once(inode) inode->i_state |=3D (I_A | I_B) =3D> inode_state_add_raw(inode, I_A | I_B) inode->i_state &=3D ~(I_A | I_B) =3D> inode_state_del_raw(inode, I_A | I_B) inode->i_state =3D I_A | I_B =3D> inode_state_set_raw(inode, I_A | I_B) The "_once" vs "_raw" discrepancy stems from the read variant differing by READ_ONCE as opposed to just lockdep checks. Signed-off-by: Mateusz Guzik --- include/linux/fs.h | 59 ++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 57 insertions(+), 2 deletions(-) diff --git a/include/linux/fs.h b/include/linux/fs.h index c4fd010cf5bf..d54171f13c7a 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -756,7 +756,7 @@ enum inode_state_bits { /* reserved wait address bit 3 */ }; =20 -enum inode_state_flags_t { +enum inode_state_flags_enum { I_NEW =3D (1U << __I_NEW), I_SYNC =3D (1U << __I_SYNC), I_LRU_ISOLATING =3D (1U << __I_LRU_ISOLATING), @@ -840,7 +840,7 @@ struct inode { #endif =20 /* Misc */ - enum inode_state_flags_t i_state; + enum inode_state_flags_enum i_state; /* 32-bit hole */ struct rw_semaphore i_rwsem; =20 @@ -899,6 +899,61 @@ struct inode { void *i_private; /* fs or device private pointer */ } __randomize_layout; =20 +/* + * i_state handling + * + * We hide all of it behind helpers so that we can validate consumers. + */ +static inline enum inode_state_flags_enum inode_state_read_once(struct ino= de *inode) +{ + return READ_ONCE(inode->i_state); +} + +static inline enum inode_state_flags_enum inode_state_read(struct inode *i= node) +{ + lockdep_assert_held(&inode->i_lock); + return inode->i_state; +} + +static inline void inode_state_add_raw(struct inode *inode, + enum inode_state_flags_enum addflags) +{ + WRITE_ONCE(inode->i_state, inode->i_state | addflags); +} + +static inline void inode_state_add(struct inode *inode, + enum inode_state_flags_enum addflags) +{ + lockdep_assert_held(&inode->i_lock); + inode_state_add_raw(inode, addflags); +} + +static inline void inode_state_del_raw(struct inode *inode, + enum inode_state_flags_enum delflags) +{ + WRITE_ONCE(inode->i_state, inode->i_state & ~delflags); +} + +static inline void inode_state_del(struct inode *inode, + enum inode_state_flags_enum delflags) +{ + lockdep_assert_held(&inode->i_lock); + inode_state_del_raw(inode, delflags); +} + +static inline void inode_state_set_raw(struct inode *inode, + enum inode_state_flags_enum setflags) +{ + WRITE_ONCE(inode->i_state, setflags); +} + +static inline void inode_state_set(struct inode *inode, + enum inode_state_flags_enum setflags) +{ + lockdep_assert_held(&inode->i_lock); + inode_state_set_raw(inode, setflags); +} + static inline void inode_set_cached_link(struct inode *inode, char *link, = int linklen) { VFS_WARN_ON_INODE(strlen(link) !=3D linklen, inode); --=20 2.43.0