lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220712110933.2646293-1-williamsukatube@163.com>
Date:   Tue, 12 Jul 2022 19:09:33 +0800
From:   williamsukatube@....com
To:     linux-unionfs@...r.kernel.org, linux-kernel@...r.kernel.org
Cc:     miklos@...redi.hu, William Dean <williamsukatube@...il.com>,
        Hacash Robot <hacashRobot@...tino.com>
Subject: [PATCH -next] ovl: Fix spelling mistakes and cleanup code

From: William Dean <williamsukatube@...il.com>

First, fix follow spelling misktakes:
	decendant  ==> descendant
	indentify  ==> identify
Second, delete extra blank line and add blank line where
appropriate to make code format more standardized.

Reported-by: Hacash Robot <hacashRobot@...tino.com>
Signed-off-by: William Dean <williamsukatube@...il.com>
---
 fs/overlayfs/copy_up.c |  4 ++++
 fs/overlayfs/dir.c     |  8 ++++++++
 fs/overlayfs/inode.c   |  5 ++++-
 fs/overlayfs/namei.c   |  7 +++++--
 fs/overlayfs/readdir.c |  8 ++++++--
 fs/overlayfs/super.c   | 10 ++++++----
 fs/overlayfs/util.c    |  8 ++++++--
 7 files changed, 39 insertions(+), 11 deletions(-)

diff --git a/fs/overlayfs/copy_up.c b/fs/overlayfs/copy_up.c
index 714ec569d25b..9c515ad05a70 100644
--- a/fs/overlayfs/copy_up.c
+++ b/fs/overlayfs/copy_up.c
@@ -127,6 +127,7 @@ int ovl_copy_xattr(struct super_block *sb, struct path *oldpath, struct dentry *
 		}
 	}
 	kvfree(value);
+
 out:
 	kvfree(buf);
 	return error;
@@ -283,6 +284,7 @@ static int ovl_copy_up_data(struct ovl_fs *ofs, struct path *old,
 
 		len -= bytes;
 	}
+
 out:
 	if (!error && ovl_should_sync(ofs))
 		error = vfs_fsync(new_file, 0);
@@ -493,6 +495,7 @@ static int ovl_create_index(struct dentry *dentry, struct dentry *origin,
 		err = ovl_do_rename(ofs, dir, temp, dir, index, 0);
 		dput(index);
 	}
+
 out:
 	if (err)
 		ovl_cleanup(ofs, dir, temp);
@@ -893,6 +896,7 @@ static ssize_t ovl_getxattr_value(struct path *path, char *name, char **value)
 		else
 			*value = buf;
 	}
+
 	return res;
 }
 
diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c
index 6b03457f72bb..d8cee9686cb3 100644
--- a/fs/overlayfs/dir.c
+++ b/fs/overlayfs/dir.c
@@ -101,6 +101,7 @@ static struct dentry *ovl_whiteout(struct ovl_fs *ofs)
 	}
 	whiteout = ofs->whiteout;
 	ofs->whiteout = NULL;
+
 out:
 	return whiteout;
 }
@@ -454,6 +455,7 @@ static int ovl_set_upper_acl(struct ovl_fs *ofs, struct dentry *upperdentry,
 		goto out_free;
 
 	err = ovl_do_setxattr(ofs, upperdentry, name, buffer, size, XATTR_CREATE);
+
 out_free:
 	kfree(buffer);
 	return err;
@@ -551,6 +553,7 @@ static int ovl_create_over_whiteout(struct dentry *dentry, struct inode *inode,
 		ovl_cleanup(ofs, udir, newdentry);
 		dput(newdentry);
 	}
+
 out_dput:
 	dput(upper);
 out_unlock:
@@ -614,6 +617,7 @@ static int ovl_create_or_link(struct dentry *dentry, struct inode *inode,
 		else
 			err = ovl_create_over_whiteout(dentry, inode, attr);
 	}
+
 out_revert_creds:
 	revert_creds(old_cred);
 	return err;
@@ -843,6 +847,7 @@ static int ovl_remove_upper(struct dentry *dentry, bool is_dir,
 	 */
 	if (!err)
 		d_drop(dentry);
+
 out_dput_upper:
 	dput(upper);
 out_unlock:
@@ -1012,6 +1017,7 @@ static char *ovl_get_redirect(struct dentry *dentry, bool abs_redirect)
 		buf[buflen] = '/';
 	}
 	ret = kstrdup(&buf[buflen], GFP_KERNEL);
+
 out_put:
 	dput(d);
 	kfree(buf);
@@ -1043,6 +1049,7 @@ static bool ovl_need_absolute_redirect(struct dentry *dentry, bool samedir)
 	 * redirect.
 	 */
 	lowerdentry = ovl_dentry_lower(dentry);
+
 	return (d_inode(lowerdentry)->i_nlink > 1);
 }
 
@@ -1074,6 +1081,7 @@ static int ovl_set_redirect(struct dentry *dentry, bool samedir)
 		/* Fall back to userspace copy-up */
 		err = -EXDEV;
 	}
+
 	return err;
 }
 
diff --git a/fs/overlayfs/inode.c b/fs/overlayfs/inode.c
index 492eddeb481f..1969488b2a01 100644
--- a/fs/overlayfs/inode.c
+++ b/fs/overlayfs/inode.c
@@ -16,7 +16,6 @@
 #include <linux/namei.h>
 #include "overlayfs.h"
 
-
 int ovl_setattr(struct user_namespace *mnt_userns, struct dentry *dentry,
 		struct iattr *attr)
 {
@@ -87,6 +86,7 @@ int ovl_setattr(struct user_namespace *mnt_userns, struct dentry *dentry,
 		if (winode)
 			put_write_access(winode);
 	}
+
 out_drop_write:
 	ovl_drop_write(dentry);
 out:
@@ -487,6 +487,7 @@ int ovl_update_time(struct inode *inode, struct timespec64 *ts, int flags)
 			inode->i_atime = d_inode(upperpath.dentry)->i_atime;
 		}
 	}
+
 	return 0;
 }
 
@@ -589,6 +590,7 @@ int ovl_fileattr_set(struct user_namespace *mnt_userns,
 		ovl_copyattr(inode);
 	}
 	ovl_drop_write(dentry);
+
 out:
 	return err;
 }
@@ -620,6 +622,7 @@ int ovl_real_fileattr_get(struct path *realpath, struct fileattr *fa)
 	err = vfs_fileattr_get(realpath->dentry, fa);
 	if (err == -ENOIOCTLCMD)
 		err = -ENOTTY;
+
 	return err;
 }
 
diff --git a/fs/overlayfs/namei.c b/fs/overlayfs/namei.c
index 65c4346a5b43..42ab6efca264 100644
--- a/fs/overlayfs/namei.c
+++ b/fs/overlayfs/namei.c
@@ -42,7 +42,7 @@ static int ovl_check_redirect(struct path *path, struct ovl_lookup_data *d,
 		 * One of the ancestor path elements in an absolute path
 		 * lookup in ovl_lookup_layer() could have been opaque and
 		 * that will stop further lookup in lower layers (d->stop=true)
-		 * But we have found an absolute redirect in decendant path
+		 * But we have found an absolute redirect in descendant path
 		 * element and that should force continue lookup in lower
 		 * layers (reset d->stop).
 		 */
@@ -217,6 +217,7 @@ static struct dentry *ovl_lookup_positive_unlocked(struct ovl_lookup_data *d,
 		dput(ret);
 		ret = ERR_PTR(-ENOENT);
 	}
+
 	return ret;
 }
 
@@ -294,6 +295,7 @@ static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d,
 	err = ovl_check_redirect(&path, d, prelen, post);
 	if (err)
 		goto out_err;
+
 out:
 	*ret = this;
 	return 0;
@@ -345,6 +347,7 @@ static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d,
 		if (WARN_ON(rem >= d->name.len))
 			return -EIO;
 	}
+
 	*ret = dentry;
 	return 0;
 }
@@ -648,7 +651,7 @@ static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name)
  * If the index dentry for a copy up origin inode is positive, but points
  * to an inode different than the upper inode, then either the upper inode
  * has been copied up and not indexed or it was indexed, but since then
- * index dir was cleared. Either way, that index cannot be used to indentify
+ * index dir was cleared. Either way, that index cannot be used to identify
  * the overlay inode.
  */
 int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin,
diff --git a/fs/overlayfs/readdir.c b/fs/overlayfs/readdir.c
index 78f62cc1797b..4719afdff082 100644
--- a/fs/overlayfs/readdir.c
+++ b/fs/overlayfs/readdir.c
@@ -167,6 +167,7 @@ static struct ovl_cache_entry *ovl_cache_entry_new(struct ovl_readdir_data *rdd,
 		p->next_maybe_whiteout = rdd->first_maybe_whiteout;
 		rdd->first_maybe_whiteout = p;
 	}
+
 	return p;
 }
 
@@ -373,6 +374,7 @@ static int ovl_dir_read_merged(struct dentry *dentry, struct list_head *list,
 			list_del(&rdd.middle);
 		}
 	}
+
 	return err;
 }
 
@@ -589,6 +591,7 @@ static int ovl_dir_read_impure(struct path *path,  struct list_head *list,
 			rb_insert_color(&p->node, root);
 		}
 	}
+
 	return 0;
 }
 
@@ -788,6 +791,7 @@ static int ovl_iterate(struct file *file, struct dir_context *ctx)
 		ctx->pos++;
 	}
 	err = 0;
+
 out:
 	revert_creds(old_cred);
 	return err;
@@ -827,9 +831,9 @@ static loff_t ovl_dir_llseek(struct file *file, loff_t offset, int origin)
 		}
 		res = offset;
 	}
+
 out_unlock:
 	inode_unlock(file_inode(file));
-
 	return res;
 }
 
@@ -855,7 +859,6 @@ static struct file *ovl_dir_open_realfile(const struct file *file,
  */
 struct file *ovl_dir_real_file(const struct file *file, bool want_upper)
 {
-
 	struct ovl_dir_file *od = file->private_data;
 	struct dentry *dentry = file->f_path.dentry;
 	struct file *old, *realfile = od->realfile;
@@ -1123,6 +1126,7 @@ static int ovl_workdir_cleanup_recurse(struct ovl_fs *ofs, struct path *path,
 			break;
 	}
 	inode_unlock(dir);
+
 out:
 	ovl_cache_free(&list);
 	return err;
diff --git a/fs/overlayfs/super.c b/fs/overlayfs/super.c
index e0a2e0468ee7..b936e2c9226b 100644
--- a/fs/overlayfs/super.c
+++ b/fs/overlayfs/super.c
@@ -21,7 +21,6 @@ MODULE_AUTHOR("Miklos Szeredi <miklos@...redi.hu>");
 MODULE_DESCRIPTION("Overlay filesystem");
 MODULE_LICENSE("GPL");
 
-
 struct ovl_dir_cache;
 
 #define OVL_MAX_STACK 500
@@ -131,6 +130,7 @@ static int ovl_revalidate_real(struct dentry *d, unsigned int flags, bool weak)
 			ret = -ESTALE;
 		}
 	}
+
 	return ret;
 }
 
@@ -150,6 +150,7 @@ static int ovl_dentry_revalidate_common(struct dentry *dentry,
 		ret = ovl_revalidate_real(oe->lowerstack[i].dentry, flags,
 					  weak);
 	}
+
 	return ret;
 }
 
@@ -910,8 +911,8 @@ static int ovl_check_namelen(struct path *path, struct ovl_fs *ofs,
 			     const char *name)
 {
 	struct kstatfs statfs;
-	int err = vfs_statfs(path, &statfs);
 
+	int err = vfs_statfs(path, &statfs);
 	if (err)
 		pr_err("statfs failed on '%s'\n", name);
 	else
@@ -1024,6 +1025,7 @@ ovl_posix_acl_xattr_set(const struct xattr_handler *handler,
 		if (IS_ERR(acl))
 			return PTR_ERR(acl);
 	}
+
 	err = -EOPNOTSUPP;
 	if (!IS_POSIXACL(d_inode(workdir)))
 		goto out_acl_release;
@@ -1033,6 +1035,7 @@ ovl_posix_acl_xattr_set(const struct xattr_handler *handler,
 		err = acl ? -EACCES : 0;
 		goto out_acl_release;
 	}
+
 	err = -EPERM;
 	if (!inode_owner_or_capable(&init_user_ns, inode))
 		goto out_acl_release;
@@ -1397,7 +1400,6 @@ static int ovl_make_workdir(struct super_block *sb, struct ovl_fs *ofs,
 	else
 		pr_warn("upper fs does not support tmpfile.\n");
 
-
 	/* Check if upper/work fs supports RENAME_WHITEOUT */
 	err = ovl_check_rename_whiteout(ofs);
 	if (err < 0)
@@ -1619,6 +1621,7 @@ static bool ovl_lower_uuid_ok(struct ovl_fs *ofs, const uuid_t *uuid)
 			return false;
 		}
 	}
+
 	return true;
 }
 
@@ -1880,7 +1883,6 @@ static int ovl_check_layer(struct super_block *sb, struct ovl_fs *ofs,
 	}
 
 	dput(parent);
-
 	return err;
 }
 
diff --git a/fs/overlayfs/util.c b/fs/overlayfs/util.c
index 87f811c089e4..b949e2080b43 100644
--- a/fs/overlayfs/util.c
+++ b/fs/overlayfs/util.c
@@ -19,6 +19,7 @@
 int ovl_want_write(struct dentry *dentry)
 {
 	struct ovl_fs *ofs = dentry->d_sb->s_fs_info;
+
 	return mnt_want_write(ovl_upper_mnt(ofs));
 }
 
@@ -31,6 +32,7 @@ void ovl_drop_write(struct dentry *dentry)
 struct dentry *ovl_workdir(struct dentry *dentry)
 {
 	struct ovl_fs *ofs = dentry->d_sb->s_fs_info;
+
 	return ofs->workdir;
 }
 
@@ -147,6 +149,7 @@ enum ovl_path_type ovl_path_type(struct dentry *dentry)
 		if (oe->numlower > 1)
 			type |= __OVL_PATH_MERGE;
 	}
+
 	return type;
 }
 
@@ -375,6 +378,7 @@ bool ovl_has_upperdata(struct inode *inode)
 
 	if (!ovl_test_flag(OVL_UPPERDATA, inode))
 		return false;
+
 	/*
 	 * Pairs with smp_wmb() in ovl_set_upperdata(). Main user of
 	 * ovl_has_upperdata() is ovl_copy_up_meta_inode_data(). Make sure
@@ -583,7 +587,6 @@ bool ovl_path_check_origin_xattr(struct ovl_fs *ofs, struct path *path)
 	int res;
 
 	res = ovl_path_getxattr(ofs, path, OVL_XATTR_ORIGIN, NULL, 0);
-
 	/* Zero size value means "copied up but origin unknown" */
 	if (res >= 0)
 		return true;
@@ -641,7 +644,6 @@ int ovl_check_setxattr(struct ovl_fs *ofs, struct dentry *upperdentry,
 		return xerr;
 
 	err = ovl_setxattr(ofs, upperdentry, ox, value, size);
-
 	if (err == -EOPNOTSUPP) {
 		pr_warn("cannot set %s xattr on upper\n", ovl_xattr(ofs, ox));
 		ofs->noxattr = true;
@@ -994,6 +996,7 @@ int ovl_check_metacopy_xattr(struct ovl_fs *ofs, struct path *path)
 	}
 
 	return 1;
+
 out:
 	pr_warn_ratelimited("failed to get metacopy (%i)\n", res);
 	return res;
@@ -1050,6 +1053,7 @@ char *ovl_get_redirect_xattr(struct ovl_fs *ofs, struct path *path, int padding)
 	}
 
 	return buf;
+
 invalid:
 	pr_warn_ratelimited("invalid redirect (%s)\n", buf);
 	res = -EINVAL;
-- 
2.25.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ