2006-10-11 08:20:50 +00:00
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* linux/fs/ext4/xattr.c
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Copyright (C) 2001-2003 Andreas Gruenbacher, <agruen@suse.de>
|
|
|
|
*
|
|
|
|
* Fix by Harrison Xing <harrison@mountainviewdata.com>.
|
2006-10-11 08:20:53 +00:00
|
|
|
* Ext4 code with a lot of help from Eric Jarman <ejarman@acm.org>.
|
2006-10-11 08:20:50 +00:00
|
|
|
* Extended attributes for symlinks and special files added per
|
|
|
|
* suggestion of Luka Renko <luka.renko@hermes.si>.
|
|
|
|
* xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>,
|
|
|
|
* Red Hat Inc.
|
|
|
|
* ea-in-inode support by Alex Tomas <alex@clusterfs.com> aka bzzz
|
|
|
|
* and Andreas Gruenbacher <agruen@suse.de>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extended attributes are stored directly in inodes (on file systems with
|
|
|
|
* inodes bigger than 128 bytes) and on additional disk blocks. The i_file_acl
|
|
|
|
* field contains the block number if an inode uses an additional block. All
|
|
|
|
* attributes must fit in the inode and one additional block. Blocks that
|
|
|
|
* contain the identical set of attributes may be shared among several inodes.
|
|
|
|
* Identical blocks are detected by keeping a cache of blocks that have
|
|
|
|
* recently been accessed.
|
|
|
|
*
|
|
|
|
* The attributes in inodes and on blocks have a different header; the entries
|
|
|
|
* are stored in the same format:
|
|
|
|
*
|
|
|
|
* +------------------+
|
|
|
|
* | header |
|
|
|
|
* | entry 1 | |
|
|
|
|
* | entry 2 | | growing downwards
|
|
|
|
* | entry 3 | v
|
|
|
|
* | four null bytes |
|
|
|
|
* | . . . |
|
|
|
|
* | value 1 | ^
|
|
|
|
* | value 3 | | growing upwards
|
|
|
|
* | value 2 | |
|
|
|
|
* +------------------+
|
|
|
|
*
|
|
|
|
* The header is followed by multiple entry descriptors. In disk blocks, the
|
|
|
|
* entry descriptors are kept sorted. In inodes, they are unsorted. The
|
|
|
|
* attribute values are aligned to the end of the block in no specific order.
|
|
|
|
*
|
|
|
|
* Locking strategy
|
|
|
|
* ----------------
|
2006-10-11 08:20:53 +00:00
|
|
|
* EXT4_I(inode)->i_file_acl is protected by EXT4_I(inode)->xattr_sem.
|
2006-10-11 08:20:50 +00:00
|
|
|
* EA blocks are only changed if they are exclusive to an inode, so
|
|
|
|
* holding xattr_sem also means that nothing but the EA block's reference
|
|
|
|
* count can change. Multiple writers to the same block are synchronized
|
|
|
|
* by the buffer lock.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/slab.h>
|
2016-02-23 03:35:22 +00:00
|
|
|
#include <linux/mbcache.h>
|
2006-10-11 08:20:50 +00:00
|
|
|
#include <linux/quotaops.h>
|
2008-04-29 22:13:32 +00:00
|
|
|
#include "ext4_jbd2.h"
|
|
|
|
#include "ext4.h"
|
2006-10-11 08:20:50 +00:00
|
|
|
#include "xattr.h"
|
|
|
|
#include "acl.h"
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
#ifdef EXT4_XATTR_DEBUG
|
2016-10-15 13:57:31 +00:00
|
|
|
# define ea_idebug(inode, fmt, ...) \
|
|
|
|
printk(KERN_DEBUG "inode %s:%lu: " fmt "\n", \
|
|
|
|
inode->i_sb->s_id, inode->i_ino, ##__VA_ARGS__)
|
|
|
|
# define ea_bdebug(bh, fmt, ...) \
|
|
|
|
printk(KERN_DEBUG "block %pg:%lu: " fmt "\n", \
|
|
|
|
bh->b_bdev, (unsigned long)bh->b_blocknr, ##__VA_ARGS__)
|
2006-10-11 08:20:50 +00:00
|
|
|
#else
|
2012-03-20 03:11:43 +00:00
|
|
|
# define ea_idebug(inode, fmt, ...) no_printk(fmt, ##__VA_ARGS__)
|
|
|
|
# define ea_bdebug(bh, fmt, ...) no_printk(fmt, ##__VA_ARGS__)
|
2006-10-11 08:20:50 +00:00
|
|
|
#endif
|
|
|
|
|
2016-02-23 03:35:22 +00:00
|
|
|
static void ext4_xattr_cache_insert(struct mb_cache *, struct buffer_head *);
|
2006-10-11 08:20:53 +00:00
|
|
|
static struct buffer_head *ext4_xattr_cache_find(struct inode *,
|
|
|
|
struct ext4_xattr_header *,
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache_entry **);
|
2006-10-11 08:20:53 +00:00
|
|
|
static void ext4_xattr_rehash(struct ext4_xattr_header *,
|
|
|
|
struct ext4_xattr_entry *);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2017-04-30 03:47:50 +00:00
|
|
|
static const struct xattr_handler * const ext4_xattr_handler_map[] = {
|
2006-10-11 08:20:53 +00:00
|
|
|
[EXT4_XATTR_INDEX_USER] = &ext4_xattr_user_handler,
|
2008-10-11 00:02:48 +00:00
|
|
|
#ifdef CONFIG_EXT4_FS_POSIX_ACL
|
2013-12-20 13:16:44 +00:00
|
|
|
[EXT4_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
|
|
|
|
[EXT4_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
|
2006-10-11 08:20:50 +00:00
|
|
|
#endif
|
2006-10-11 08:20:53 +00:00
|
|
|
[EXT4_XATTR_INDEX_TRUSTED] = &ext4_xattr_trusted_handler,
|
2008-10-11 00:02:48 +00:00
|
|
|
#ifdef CONFIG_EXT4_FS_SECURITY
|
2006-10-11 08:20:53 +00:00
|
|
|
[EXT4_XATTR_INDEX_SECURITY] = &ext4_xattr_security_handler,
|
2006-10-11 08:20:50 +00:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2010-05-14 00:53:18 +00:00
|
|
|
const struct xattr_handler *ext4_xattr_handlers[] = {
|
2006-10-11 08:20:53 +00:00
|
|
|
&ext4_xattr_user_handler,
|
|
|
|
&ext4_xattr_trusted_handler,
|
2008-10-11 00:02:48 +00:00
|
|
|
#ifdef CONFIG_EXT4_FS_POSIX_ACL
|
2013-12-20 13:16:44 +00:00
|
|
|
&posix_acl_access_xattr_handler,
|
|
|
|
&posix_acl_default_xattr_handler,
|
2006-10-11 08:20:50 +00:00
|
|
|
#endif
|
2008-10-11 00:02:48 +00:00
|
|
|
#ifdef CONFIG_EXT4_FS_SECURITY
|
2006-10-11 08:20:53 +00:00
|
|
|
&ext4_xattr_security_handler,
|
2006-10-11 08:20:50 +00:00
|
|
|
#endif
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2014-03-18 23:24:49 +00:00
|
|
|
#define EXT4_GET_MB_CACHE(inode) (((struct ext4_sb_info *) \
|
|
|
|
inode->i_sb->s_fs_info)->s_mb_cache)
|
|
|
|
|
2017-06-22 01:17:10 +00:00
|
|
|
#ifdef CONFIG_LOCKDEP
|
|
|
|
void ext4_xattr_inode_set_class(struct inode *ea_inode)
|
|
|
|
{
|
|
|
|
lockdep_set_subclass(&ea_inode->i_rwsem, 1);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-04-29 22:43:10 +00:00
|
|
|
static __le32 ext4_xattr_block_csum(struct inode *inode,
|
|
|
|
sector_t block_nr,
|
|
|
|
struct ext4_xattr_header *hdr)
|
|
|
|
{
|
|
|
|
struct ext4_sb_info *sbi = EXT4_SB(inode->i_sb);
|
2013-04-10 03:59:55 +00:00
|
|
|
__u32 csum;
|
|
|
|
__le64 dsk_block_nr = cpu_to_le64(block_nr);
|
2016-07-03 21:51:39 +00:00
|
|
|
__u32 dummy_csum = 0;
|
|
|
|
int offset = offsetof(struct ext4_xattr_header, h_checksum);
|
2012-04-29 22:43:10 +00:00
|
|
|
|
2013-04-10 03:59:55 +00:00
|
|
|
csum = ext4_chksum(sbi, sbi->s_csum_seed, (__u8 *)&dsk_block_nr,
|
|
|
|
sizeof(dsk_block_nr));
|
2016-07-03 21:51:39 +00:00
|
|
|
csum = ext4_chksum(sbi, csum, (__u8 *)hdr, offset);
|
|
|
|
csum = ext4_chksum(sbi, csum, (__u8 *)&dummy_csum, sizeof(dummy_csum));
|
|
|
|
offset += sizeof(dummy_csum);
|
|
|
|
csum = ext4_chksum(sbi, csum, (__u8 *)hdr + offset,
|
|
|
|
EXT4_BLOCK_SIZE(inode->i_sb) - offset);
|
2012-07-09 20:29:27 +00:00
|
|
|
|
2012-04-29 22:43:10 +00:00
|
|
|
return cpu_to_le32(csum);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ext4_xattr_block_csum_verify(struct inode *inode,
|
2017-03-25 21:22:47 +00:00
|
|
|
struct buffer_head *bh)
|
2012-04-29 22:43:10 +00:00
|
|
|
{
|
2017-03-25 21:22:47 +00:00
|
|
|
struct ext4_xattr_header *hdr = BHDR(bh);
|
|
|
|
int ret = 1;
|
2012-04-29 22:43:10 +00:00
|
|
|
|
2017-03-25 21:22:47 +00:00
|
|
|
if (ext4_has_metadata_csum(inode->i_sb)) {
|
|
|
|
lock_buffer(bh);
|
|
|
|
ret = (hdr->h_checksum == ext4_xattr_block_csum(inode,
|
|
|
|
bh->b_blocknr, hdr));
|
|
|
|
unlock_buffer(bh);
|
|
|
|
}
|
|
|
|
return ret;
|
2012-04-29 22:43:10 +00:00
|
|
|
}
|
|
|
|
|
2017-03-25 21:22:47 +00:00
|
|
|
static void ext4_xattr_block_csum_set(struct inode *inode,
|
|
|
|
struct buffer_head *bh)
|
2012-04-29 22:43:10 +00:00
|
|
|
{
|
2017-03-25 21:22:47 +00:00
|
|
|
if (ext4_has_metadata_csum(inode->i_sb))
|
|
|
|
BHDR(bh)->h_checksum = ext4_xattr_block_csum(inode,
|
|
|
|
bh->b_blocknr, BHDR(bh));
|
2012-04-29 22:43:10 +00:00
|
|
|
}
|
|
|
|
|
2010-05-14 00:53:18 +00:00
|
|
|
static inline const struct xattr_handler *
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_handler(int name_index)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2010-05-14 00:53:18 +00:00
|
|
|
const struct xattr_handler *handler = NULL;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (name_index > 0 && name_index < ARRAY_SIZE(ext4_xattr_handler_map))
|
|
|
|
handler = ext4_xattr_handler_map[name_index];
|
2006-10-11 08:20:50 +00:00
|
|
|
return handler;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2017-04-30 03:56:52 +00:00
|
|
|
ext4_xattr_check_entries(struct ext4_xattr_entry *entry, void *end,
|
|
|
|
void *value_start)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2014-09-16 18:34:59 +00:00
|
|
|
struct ext4_xattr_entry *e = entry;
|
|
|
|
|
2016-12-01 19:57:29 +00:00
|
|
|
/* Find the end of the names list */
|
2014-09-16 18:34:59 +00:00
|
|
|
while (!IS_LAST_ENTRY(e)) {
|
|
|
|
struct ext4_xattr_entry *next = EXT4_XATTR_NEXT(e);
|
2006-10-11 08:20:50 +00:00
|
|
|
if ((void *)next >= end)
|
2015-10-17 20:16:04 +00:00
|
|
|
return -EFSCORRUPTED;
|
2014-09-16 18:34:59 +00:00
|
|
|
e = next;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2014-09-16 18:34:59 +00:00
|
|
|
|
2016-12-01 19:57:29 +00:00
|
|
|
/* Check the values */
|
2014-09-16 18:34:59 +00:00
|
|
|
while (!IS_LAST_ENTRY(entry)) {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (entry->e_value_size != 0 &&
|
|
|
|
entry->e_value_inum == 0) {
|
2016-12-01 19:57:29 +00:00
|
|
|
u16 offs = le16_to_cpu(entry->e_value_offs);
|
|
|
|
u32 size = le32_to_cpu(entry->e_value_size);
|
|
|
|
void *value;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The value cannot overlap the names, and the value
|
|
|
|
* with padding cannot extend beyond 'end'. Check both
|
|
|
|
* the padded and unpadded sizes, since the size may
|
|
|
|
* overflow to 0 when adding padding.
|
|
|
|
*/
|
|
|
|
if (offs > end - value_start)
|
|
|
|
return -EFSCORRUPTED;
|
|
|
|
value = value_start + offs;
|
|
|
|
if (value < (void *)e + sizeof(u32) ||
|
|
|
|
size > end - value ||
|
|
|
|
EXT4_XATTR_SIZE(size) > end - value)
|
|
|
|
return -EFSCORRUPTED;
|
|
|
|
}
|
2014-09-16 18:34:59 +00:00
|
|
|
entry = EXT4_XATTR_NEXT(entry);
|
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
2012-04-29 22:43:10 +00:00
|
|
|
ext4_xattr_check_block(struct inode *inode, struct buffer_head *bh)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2012-04-29 22:43:10 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
if (buffer_verified(bh))
|
|
|
|
return 0;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (BHDR(bh)->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC) ||
|
2006-10-11 08:20:50 +00:00
|
|
|
BHDR(bh)->h_blocks != cpu_to_le32(1))
|
2015-10-17 20:16:04 +00:00
|
|
|
return -EFSCORRUPTED;
|
2017-03-25 21:22:47 +00:00
|
|
|
if (!ext4_xattr_block_csum_verify(inode, bh))
|
2015-10-17 20:16:04 +00:00
|
|
|
return -EFSBADCRC;
|
2017-04-30 03:56:52 +00:00
|
|
|
error = ext4_xattr_check_entries(BFIRST(bh), bh->b_data + bh->b_size,
|
|
|
|
bh->b_data);
|
2012-04-29 22:43:10 +00:00
|
|
|
if (!error)
|
|
|
|
set_buffer_verified(bh);
|
|
|
|
return error;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
2016-03-22 20:13:15 +00:00
|
|
|
static int
|
|
|
|
__xattr_check_inode(struct inode *inode, struct ext4_xattr_ibody_header *header,
|
|
|
|
void *end, const char *function, unsigned int line)
|
|
|
|
{
|
|
|
|
int error = -EFSCORRUPTED;
|
|
|
|
|
2016-12-01 19:51:58 +00:00
|
|
|
if (end - (void *)header < sizeof(*header) + sizeof(u32) ||
|
2016-10-15 13:39:31 +00:00
|
|
|
(header->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC)))
|
2016-03-22 20:13:15 +00:00
|
|
|
goto errout;
|
2017-04-30 03:56:52 +00:00
|
|
|
error = ext4_xattr_check_entries(IFIRST(header), end, IFIRST(header));
|
2016-03-22 20:13:15 +00:00
|
|
|
errout:
|
|
|
|
if (error)
|
|
|
|
__ext4_error_inode(inode, function, line, 0,
|
|
|
|
"corrupted in-inode xattr");
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define xattr_check_inode(inode, header, end) \
|
|
|
|
__xattr_check_inode((inode), (header), (end), __func__, __LINE__)
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
static int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_find_entry(struct ext4_xattr_entry **pentry, int name_index,
|
2017-04-30 04:01:02 +00:00
|
|
|
const char *name, int sorted)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_entry *entry;
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t name_len;
|
|
|
|
int cmp = 1;
|
|
|
|
|
|
|
|
if (name == NULL)
|
|
|
|
return -EINVAL;
|
|
|
|
name_len = strlen(name);
|
|
|
|
entry = *pentry;
|
2006-10-11 08:20:53 +00:00
|
|
|
for (; !IS_LAST_ENTRY(entry); entry = EXT4_XATTR_NEXT(entry)) {
|
2006-10-11 08:20:50 +00:00
|
|
|
cmp = name_index - entry->e_name_index;
|
|
|
|
if (!cmp)
|
|
|
|
cmp = name_len - entry->e_name_len;
|
|
|
|
if (!cmp)
|
|
|
|
cmp = memcmp(name, entry->e_name, name_len);
|
|
|
|
if (cmp <= 0 && (sorted || cmp == 0))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
*pentry = entry;
|
|
|
|
return cmp ? -ENODATA : 0;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
/*
|
|
|
|
* Read the EA value from an inode.
|
|
|
|
*/
|
2017-06-22 01:57:36 +00:00
|
|
|
static int ext4_xattr_inode_read(struct inode *ea_inode, void *buf, size_t size)
|
2017-06-22 01:10:32 +00:00
|
|
|
{
|
|
|
|
unsigned long block = 0;
|
|
|
|
struct buffer_head *bh = NULL;
|
2017-06-22 01:57:36 +00:00
|
|
|
int blocksize = ea_inode->i_sb->s_blocksize;
|
|
|
|
size_t csize, copied = 0;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
2017-06-22 01:57:36 +00:00
|
|
|
while (copied < size) {
|
|
|
|
csize = (size - copied) > blocksize ? blocksize : size - copied;
|
2017-06-22 01:10:32 +00:00
|
|
|
bh = ext4_bread(NULL, ea_inode, block, 0);
|
2017-06-22 01:57:36 +00:00
|
|
|
if (IS_ERR(bh))
|
2017-06-22 01:10:32 +00:00
|
|
|
return PTR_ERR(bh);
|
2017-06-22 01:57:36 +00:00
|
|
|
if (!bh)
|
|
|
|
return -EFSCORRUPTED;
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
memcpy(buf, bh->b_data, csize);
|
|
|
|
brelse(bh);
|
|
|
|
|
|
|
|
buf += csize;
|
|
|
|
block += 1;
|
2017-06-22 01:57:36 +00:00
|
|
|
copied += csize;
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
static int ext4_xattr_inode_iget(struct inode *parent, unsigned long ea_ino,
|
|
|
|
struct inode **ea_inode)
|
2017-06-22 01:10:32 +00:00
|
|
|
{
|
2017-06-22 01:49:53 +00:00
|
|
|
struct inode *inode;
|
|
|
|
int err;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
inode = ext4_iget(parent->i_sb, ea_ino);
|
|
|
|
if (IS_ERR(inode)) {
|
|
|
|
err = PTR_ERR(inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
ext4_error(parent->i_sb, "error while reading EA inode %lu "
|
2017-06-22 01:49:53 +00:00
|
|
|
"err=%d", ea_ino, err);
|
|
|
|
return err;
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
if (is_bad_inode(inode)) {
|
|
|
|
ext4_error(parent->i_sb, "error while reading EA inode %lu "
|
|
|
|
"is_bad_inode", ea_ino);
|
|
|
|
err = -EIO;
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (EXT4_XATTR_INODE_GET_PARENT(inode) != parent->i_ino ||
|
|
|
|
inode->i_generation != parent->i_generation) {
|
2017-06-22 01:10:32 +00:00
|
|
|
ext4_error(parent->i_sb, "Backpointer from EA inode %lu "
|
2017-06-22 01:49:53 +00:00
|
|
|
"to parent is invalid.", ea_ino);
|
|
|
|
err = -EINVAL;
|
2017-06-22 01:10:32 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
if (!(EXT4_I(inode)->i_flags & EXT4_EA_INODE_FL)) {
|
2017-06-22 01:10:32 +00:00
|
|
|
ext4_error(parent->i_sb, "EA inode %lu does not have "
|
|
|
|
"EXT4_EA_INODE_FL flag set.\n", ea_ino);
|
2017-06-22 01:49:53 +00:00
|
|
|
err = -EINVAL;
|
2017-06-22 01:10:32 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
*ea_inode = inode;
|
|
|
|
return 0;
|
2017-06-22 01:10:32 +00:00
|
|
|
error:
|
2017-06-22 01:49:53 +00:00
|
|
|
iput(inode);
|
|
|
|
return err;
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Read the value from the EA inode.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ext4_xattr_inode_get(struct inode *inode, unsigned long ea_ino, void *buffer,
|
2017-06-22 01:57:36 +00:00
|
|
|
size_t size)
|
2017-06-22 01:10:32 +00:00
|
|
|
{
|
2017-06-22 01:49:53 +00:00
|
|
|
struct inode *ea_inode;
|
|
|
|
int ret;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
ret = ext4_xattr_inode_iget(inode, ea_ino, &ea_inode);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
ret = ext4_xattr_inode_read(ea_inode, buffer, size);
|
2017-06-22 01:10:32 +00:00
|
|
|
iput(ea_inode);
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
return ret;
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
static int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_block_get(struct inode *inode, int name_index, const char *name,
|
2006-10-11 08:20:50 +00:00
|
|
|
void *buffer, size_t buffer_size)
|
|
|
|
{
|
|
|
|
struct buffer_head *bh = NULL;
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_entry *entry;
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t size;
|
|
|
|
int error;
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache *ext4_mb_cache = EXT4_GET_MB_CACHE(inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
ea_idebug(inode, "name=%d.%s, buffer=%p, buffer_size=%ld",
|
|
|
|
name_index, name, buffer, (long)buffer_size);
|
|
|
|
|
|
|
|
error = -ENODATA;
|
2006-10-11 08:20:53 +00:00
|
|
|
if (!EXT4_I(inode)->i_file_acl)
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
2012-03-20 03:11:43 +00:00
|
|
|
ea_idebug(inode, "reading block %llu",
|
|
|
|
(unsigned long long)EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:53 +00:00
|
|
|
bh = sb_bread(inode->i_sb, EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!bh)
|
|
|
|
goto cleanup;
|
|
|
|
ea_bdebug(bh, "b_count=%d, refcount=%d",
|
|
|
|
atomic_read(&(bh->b_count)), le32_to_cpu(BHDR(bh)->h_refcount));
|
2012-04-29 22:43:10 +00:00
|
|
|
if (ext4_xattr_check_block(inode, bh)) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2015-10-17 20:16:04 +00:00
|
|
|
error = -EFSCORRUPTED;
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-03-18 23:24:49 +00:00
|
|
|
ext4_xattr_cache_insert(ext4_mb_cache, bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
entry = BFIRST(bh);
|
2017-04-30 04:01:02 +00:00
|
|
|
error = ext4_xattr_find_entry(&entry, name_index, name, 1);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
size = le32_to_cpu(entry->e_value_size);
|
|
|
|
if (buffer) {
|
|
|
|
error = -ERANGE;
|
|
|
|
if (size > buffer_size)
|
|
|
|
goto cleanup;
|
2017-06-22 01:10:32 +00:00
|
|
|
if (entry->e_value_inum) {
|
|
|
|
error = ext4_xattr_inode_get(inode,
|
|
|
|
le32_to_cpu(entry->e_value_inum),
|
2017-06-22 01:57:36 +00:00
|
|
|
buffer, size);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
} else {
|
|
|
|
memcpy(buffer, bh->b_data +
|
|
|
|
le16_to_cpu(entry->e_value_offs), size);
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
error = size;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(bh);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2012-12-05 15:28:46 +00:00
|
|
|
int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_ibody_get(struct inode *inode, int name_index, const char *name,
|
2006-10-11 08:20:50 +00:00
|
|
|
void *buffer, size_t buffer_size)
|
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_xattr_entry *entry;
|
|
|
|
struct ext4_inode *raw_inode;
|
|
|
|
struct ext4_iloc iloc;
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t size;
|
|
|
|
void *end;
|
|
|
|
int error;
|
|
|
|
|
2010-01-24 19:34:07 +00:00
|
|
|
if (!ext4_test_inode_state(inode, EXT4_STATE_XATTR))
|
2006-10-11 08:20:50 +00:00
|
|
|
return -ENODATA;
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_get_inode_loc(inode, &iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
return error;
|
2006-10-11 08:20:53 +00:00
|
|
|
raw_inode = ext4_raw_inode(&iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
header = IHDR(inode, raw_inode);
|
2006-10-11 08:20:53 +00:00
|
|
|
end = (void *)raw_inode + EXT4_SB(inode->i_sb)->s_inode_size;
|
2016-03-22 20:13:15 +00:00
|
|
|
error = xattr_check_inode(inode, header, end);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
2017-04-30 04:01:02 +00:00
|
|
|
entry = IFIRST(header);
|
|
|
|
error = ext4_xattr_find_entry(&entry, name_index, name, 0);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
size = le32_to_cpu(entry->e_value_size);
|
|
|
|
if (buffer) {
|
|
|
|
error = -ERANGE;
|
|
|
|
if (size > buffer_size)
|
|
|
|
goto cleanup;
|
2017-06-22 01:10:32 +00:00
|
|
|
if (entry->e_value_inum) {
|
|
|
|
error = ext4_xattr_inode_get(inode,
|
|
|
|
le32_to_cpu(entry->e_value_inum),
|
2017-06-22 01:57:36 +00:00
|
|
|
buffer, size);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
} else {
|
|
|
|
memcpy(buffer, (void *)IFIRST(header) +
|
|
|
|
le16_to_cpu(entry->e_value_offs), size);
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
error = size;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(iloc.bh);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_get()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Copy an extended attribute into the buffer
|
|
|
|
* provided, or compute the buffer size required.
|
|
|
|
* Buffer is NULL to compute the size of the buffer required.
|
|
|
|
*
|
|
|
|
* Returns a negative error number on failure, or the number of bytes
|
|
|
|
* used / required on success.
|
|
|
|
*/
|
|
|
|
int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_get(struct inode *inode, int name_index, const char *name,
|
2006-10-11 08:20:50 +00:00
|
|
|
void *buffer, size_t buffer_size)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
2017-02-05 06:28:48 +00:00
|
|
|
if (unlikely(ext4_forced_shutdown(EXT4_SB(inode->i_sb))))
|
|
|
|
return -EIO;
|
|
|
|
|
2014-05-12 13:57:59 +00:00
|
|
|
if (strlen(name) > 255)
|
|
|
|
return -ERANGE;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
down_read(&EXT4_I(inode)->xattr_sem);
|
|
|
|
error = ext4_xattr_ibody_get(inode, name_index, name, buffer,
|
2006-10-11 08:20:50 +00:00
|
|
|
buffer_size);
|
|
|
|
if (error == -ENODATA)
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_block_get(inode, name_index, name, buffer,
|
2006-10-11 08:20:50 +00:00
|
|
|
buffer_size);
|
2006-10-11 08:20:53 +00:00
|
|
|
up_read(&EXT4_I(inode)->xattr_sem);
|
2006-10-11 08:20:50 +00:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2009-11-13 09:52:56 +00:00
|
|
|
ext4_xattr_list_entries(struct dentry *dentry, struct ext4_xattr_entry *entry,
|
2006-10-11 08:20:50 +00:00
|
|
|
char *buffer, size_t buffer_size)
|
|
|
|
{
|
|
|
|
size_t rest = buffer_size;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
for (; !IS_LAST_ENTRY(entry); entry = EXT4_XATTR_NEXT(entry)) {
|
2010-05-14 00:53:18 +00:00
|
|
|
const struct xattr_handler *handler =
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_handler(entry->e_name_index);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2015-12-02 13:44:43 +00:00
|
|
|
if (handler && (!handler->list || handler->list(dentry))) {
|
|
|
|
const char *prefix = handler->prefix ?: handler->name;
|
|
|
|
size_t prefix_len = strlen(prefix);
|
|
|
|
size_t size = prefix_len + entry->e_name_len + 1;
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
if (buffer) {
|
|
|
|
if (size > rest)
|
|
|
|
return -ERANGE;
|
2015-12-02 13:44:43 +00:00
|
|
|
memcpy(buffer, prefix, prefix_len);
|
|
|
|
buffer += prefix_len;
|
|
|
|
memcpy(buffer, entry->e_name, entry->e_name_len);
|
|
|
|
buffer += entry->e_name_len;
|
|
|
|
*buffer++ = 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
rest -= size;
|
|
|
|
}
|
|
|
|
}
|
2015-12-02 13:44:43 +00:00
|
|
|
return buffer_size - rest; /* total size */
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2009-11-13 09:52:56 +00:00
|
|
|
ext4_xattr_block_list(struct dentry *dentry, char *buffer, size_t buffer_size)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2015-03-17 22:25:59 +00:00
|
|
|
struct inode *inode = d_inode(dentry);
|
2006-10-11 08:20:50 +00:00
|
|
|
struct buffer_head *bh = NULL;
|
|
|
|
int error;
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache *ext4_mb_cache = EXT4_GET_MB_CACHE(inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
ea_idebug(inode, "buffer=%p, buffer_size=%ld",
|
|
|
|
buffer, (long)buffer_size);
|
|
|
|
|
|
|
|
error = 0;
|
2006-10-11 08:20:53 +00:00
|
|
|
if (!EXT4_I(inode)->i_file_acl)
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
2012-03-20 03:11:43 +00:00
|
|
|
ea_idebug(inode, "reading block %llu",
|
|
|
|
(unsigned long long)EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:53 +00:00
|
|
|
bh = sb_bread(inode->i_sb, EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
error = -EIO;
|
|
|
|
if (!bh)
|
|
|
|
goto cleanup;
|
|
|
|
ea_bdebug(bh, "b_count=%d, refcount=%d",
|
|
|
|
atomic_read(&(bh->b_count)), le32_to_cpu(BHDR(bh)->h_refcount));
|
2012-04-29 22:43:10 +00:00
|
|
|
if (ext4_xattr_check_block(inode, bh)) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2015-10-17 20:16:04 +00:00
|
|
|
error = -EFSCORRUPTED;
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-03-18 23:24:49 +00:00
|
|
|
ext4_xattr_cache_insert(ext4_mb_cache, bh);
|
2009-11-13 09:52:56 +00:00
|
|
|
error = ext4_xattr_list_entries(dentry, BFIRST(bh), buffer, buffer_size);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(bh);
|
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2009-11-13 09:52:56 +00:00
|
|
|
ext4_xattr_ibody_list(struct dentry *dentry, char *buffer, size_t buffer_size)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2015-03-17 22:25:59 +00:00
|
|
|
struct inode *inode = d_inode(dentry);
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_inode *raw_inode;
|
|
|
|
struct ext4_iloc iloc;
|
2006-10-11 08:20:50 +00:00
|
|
|
void *end;
|
|
|
|
int error;
|
|
|
|
|
2010-01-24 19:34:07 +00:00
|
|
|
if (!ext4_test_inode_state(inode, EXT4_STATE_XATTR))
|
2006-10-11 08:20:50 +00:00
|
|
|
return 0;
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_get_inode_loc(inode, &iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
return error;
|
2006-10-11 08:20:53 +00:00
|
|
|
raw_inode = ext4_raw_inode(&iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
header = IHDR(inode, raw_inode);
|
2006-10-11 08:20:53 +00:00
|
|
|
end = (void *)raw_inode + EXT4_SB(inode->i_sb)->s_inode_size;
|
2016-03-22 20:13:15 +00:00
|
|
|
error = xattr_check_inode(inode, header, end);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
2009-11-13 09:52:56 +00:00
|
|
|
error = ext4_xattr_list_entries(dentry, IFIRST(header),
|
2006-10-11 08:20:50 +00:00
|
|
|
buffer, buffer_size);
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(iloc.bh);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-04-30 03:53:17 +00:00
|
|
|
* Inode operation listxattr()
|
|
|
|
*
|
|
|
|
* d_inode(dentry)->i_rwsem: don't care
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Copy a list of attribute names into the buffer
|
|
|
|
* provided, or compute the buffer size required.
|
|
|
|
* Buffer is NULL to compute the size of the buffer required.
|
|
|
|
*
|
|
|
|
* Returns a negative error number on failure, or the number of bytes
|
|
|
|
* used / required on success.
|
|
|
|
*/
|
2017-04-30 03:53:17 +00:00
|
|
|
ssize_t
|
|
|
|
ext4_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2011-01-10 17:10:07 +00:00
|
|
|
int ret, ret2;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2015-03-17 22:25:59 +00:00
|
|
|
down_read(&EXT4_I(d_inode(dentry))->xattr_sem);
|
2011-01-10 17:10:07 +00:00
|
|
|
ret = ret2 = ext4_xattr_ibody_list(dentry, buffer, buffer_size);
|
|
|
|
if (ret < 0)
|
|
|
|
goto errout;
|
|
|
|
if (buffer) {
|
|
|
|
buffer += ret;
|
|
|
|
buffer_size -= ret;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2011-01-10 17:10:07 +00:00
|
|
|
ret = ext4_xattr_block_list(dentry, buffer, buffer_size);
|
|
|
|
if (ret < 0)
|
|
|
|
goto errout;
|
|
|
|
ret += ret2;
|
|
|
|
errout:
|
2015-03-17 22:25:59 +00:00
|
|
|
up_read(&EXT4_I(d_inode(dentry))->xattr_sem);
|
2011-01-10 17:10:07 +00:00
|
|
|
return ret;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* If the EXT4_FEATURE_COMPAT_EXT_ATTR feature of this file system is
|
2006-10-11 08:20:50 +00:00
|
|
|
* not set, set it.
|
|
|
|
*/
|
2006-10-11 08:20:53 +00:00
|
|
|
static void ext4_xattr_update_super_block(handle_t *handle,
|
2006-10-11 08:20:50 +00:00
|
|
|
struct super_block *sb)
|
|
|
|
{
|
2015-10-17 20:18:43 +00:00
|
|
|
if (ext4_has_feature_xattr(sb))
|
2006-10-11 08:20:50 +00:00
|
|
|
return;
|
|
|
|
|
2014-05-13 02:06:43 +00:00
|
|
|
BUFFER_TRACE(EXT4_SB(sb)->s_sbh, "get_write_access");
|
2006-10-11 08:20:53 +00:00
|
|
|
if (ext4_journal_get_write_access(handle, EXT4_SB(sb)->s_sbh) == 0) {
|
2015-10-17 20:18:43 +00:00
|
|
|
ext4_set_feature_xattr(sb);
|
2010-06-12 03:14:04 +00:00
|
|
|
ext4_handle_dirty_super(handle, sb);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2014-04-07 14:54:21 +00:00
|
|
|
* Release the xattr block BH: If the reference count is > 1, decrement it;
|
|
|
|
* otherwise free the block.
|
2006-10-11 08:20:50 +00:00
|
|
|
*/
|
|
|
|
static void
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_release_block(handle_t *handle, struct inode *inode,
|
2006-10-11 08:20:50 +00:00
|
|
|
struct buffer_head *bh)
|
|
|
|
{
|
2016-02-23 03:44:04 +00:00
|
|
|
struct mb_cache *ext4_mb_cache = EXT4_GET_MB_CACHE(inode);
|
|
|
|
u32 hash, ref;
|
2007-03-01 04:13:35 +00:00
|
|
|
int error = 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2014-05-13 02:06:43 +00:00
|
|
|
BUFFER_TRACE(bh, "get_write_access");
|
2007-03-01 04:13:35 +00:00
|
|
|
error = ext4_journal_get_write_access(handle, bh);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
lock_buffer(bh);
|
2016-02-23 03:44:04 +00:00
|
|
|
hash = le32_to_cpu(BHDR(bh)->h_hash);
|
|
|
|
ref = le32_to_cpu(BHDR(bh)->h_refcount);
|
|
|
|
if (ref == 1) {
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(bh, "refcount now=0; freeing");
|
2016-02-22 16:50:13 +00:00
|
|
|
/*
|
|
|
|
* This must happen under buffer lock for
|
|
|
|
* ext4_xattr_block_set() to reliably detect freed block
|
|
|
|
*/
|
2016-02-23 03:44:04 +00:00
|
|
|
mb_cache_entry_delete_block(ext4_mb_cache, hash, bh->b_blocknr);
|
2006-10-11 08:20:50 +00:00
|
|
|
get_bh(bh);
|
2014-04-07 14:54:21 +00:00
|
|
|
unlock_buffer(bh);
|
2009-11-23 12:17:05 +00:00
|
|
|
ext4_free_blocks(handle, inode, bh, 0, 1,
|
|
|
|
EXT4_FREE_BLOCKS_METADATA |
|
|
|
|
EXT4_FREE_BLOCKS_FORGET);
|
2006-10-11 08:20:50 +00:00
|
|
|
} else {
|
2016-02-23 03:44:04 +00:00
|
|
|
ref--;
|
|
|
|
BHDR(bh)->h_refcount = cpu_to_le32(ref);
|
|
|
|
if (ref == EXT4_XATTR_REFCOUNT_MAX - 1) {
|
|
|
|
struct mb_cache_entry *ce;
|
|
|
|
|
|
|
|
ce = mb_cache_entry_get(ext4_mb_cache, hash,
|
|
|
|
bh->b_blocknr);
|
|
|
|
if (ce) {
|
|
|
|
ce->e_reusable = 1;
|
|
|
|
mb_cache_entry_put(ext4_mb_cache, ce);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-25 21:22:47 +00:00
|
|
|
ext4_xattr_block_csum_set(inode, bh);
|
2014-04-07 14:54:21 +00:00
|
|
|
/*
|
|
|
|
* Beware of this ugliness: Releasing of xattr block references
|
|
|
|
* from different inodes can race and so we have to protect
|
|
|
|
* from a race where someone else frees the block (and releases
|
|
|
|
* its journal_head) before we are done dirtying the buffer. In
|
|
|
|
* nojournal mode this race is harmless and we actually cannot
|
2017-03-25 21:22:47 +00:00
|
|
|
* call ext4_handle_dirty_metadata() with locked buffer as
|
2014-04-07 14:54:21 +00:00
|
|
|
* that function can call sync_dirty_buffer() so for that case
|
|
|
|
* we handle the dirtying after unlocking the buffer.
|
|
|
|
*/
|
|
|
|
if (ext4_handle_valid(handle))
|
2017-03-25 21:22:47 +00:00
|
|
|
error = ext4_handle_dirty_metadata(handle, inode, bh);
|
2012-02-21 04:06:18 +00:00
|
|
|
unlock_buffer(bh);
|
2014-04-07 14:54:21 +00:00
|
|
|
if (!ext4_handle_valid(handle))
|
2017-03-25 21:22:47 +00:00
|
|
|
error = ext4_handle_dirty_metadata(handle, inode, bh);
|
2007-03-01 04:13:35 +00:00
|
|
|
if (IS_SYNC(inode))
|
2009-01-07 05:06:22 +00:00
|
|
|
ext4_handle_sync(handle);
|
2013-02-18 17:12:07 +00:00
|
|
|
dquot_free_block(inode, EXT4_C2B(EXT4_SB(inode->i_sb), 1));
|
2007-03-01 04:13:35 +00:00
|
|
|
ea_bdebug(bh, "refcount now=%d; releasing",
|
|
|
|
le32_to_cpu(BHDR(bh)->h_refcount));
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2007-03-01 04:13:35 +00:00
|
|
|
out:
|
|
|
|
ext4_std_error(inode->i_sb, error);
|
|
|
|
return;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
2007-07-18 13:19:57 +00:00
|
|
|
/*
|
|
|
|
* Find the available free space for EAs. This also returns the total number of
|
|
|
|
* bytes used by EA entries.
|
|
|
|
*/
|
|
|
|
static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
|
|
|
|
size_t *min_offs, void *base, int *total)
|
|
|
|
{
|
|
|
|
for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!last->e_value_inum && last->e_value_size) {
|
2007-07-18 13:19:57 +00:00
|
|
|
size_t offs = le16_to_cpu(last->e_value_offs);
|
|
|
|
if (offs < *min_offs)
|
|
|
|
*min_offs = offs;
|
|
|
|
}
|
2014-02-20 01:15:21 +00:00
|
|
|
if (total)
|
|
|
|
*total += EXT4_XATTR_LEN(last->e_name_len);
|
2007-07-18 13:19:57 +00:00
|
|
|
}
|
|
|
|
return (*min_offs - ((void *)last - base) - sizeof(__u32));
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
/*
|
|
|
|
* Write the value of the EA in an inode.
|
|
|
|
*/
|
|
|
|
static int ext4_xattr_inode_write(handle_t *handle, struct inode *ea_inode,
|
|
|
|
const void *buf, int bufsize)
|
|
|
|
{
|
|
|
|
struct buffer_head *bh = NULL;
|
|
|
|
unsigned long block = 0;
|
|
|
|
unsigned blocksize = ea_inode->i_sb->s_blocksize;
|
|
|
|
unsigned max_blocks = (bufsize + blocksize - 1) >> ea_inode->i_blkbits;
|
|
|
|
int csize, wsize = 0;
|
|
|
|
int ret = 0;
|
|
|
|
int retries = 0;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
while (ret >= 0 && ret < max_blocks) {
|
|
|
|
struct ext4_map_blocks map;
|
|
|
|
map.m_lblk = block += ret;
|
|
|
|
map.m_len = max_blocks -= ret;
|
|
|
|
|
|
|
|
ret = ext4_map_blocks(handle, ea_inode, &map,
|
|
|
|
EXT4_GET_BLOCKS_CREATE);
|
|
|
|
if (ret <= 0) {
|
|
|
|
ext4_mark_inode_dirty(handle, ea_inode);
|
|
|
|
if (ret == -ENOSPC &&
|
|
|
|
ext4_should_retry_alloc(ea_inode->i_sb, &retries)) {
|
|
|
|
ret = 0;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
block = 0;
|
|
|
|
while (wsize < bufsize) {
|
|
|
|
if (bh != NULL)
|
|
|
|
brelse(bh);
|
|
|
|
csize = (bufsize - wsize) > blocksize ? blocksize :
|
|
|
|
bufsize - wsize;
|
|
|
|
bh = ext4_getblk(handle, ea_inode, block, 0);
|
|
|
|
if (IS_ERR(bh))
|
|
|
|
return PTR_ERR(bh);
|
|
|
|
ret = ext4_journal_get_write_access(handle, bh);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
memcpy(bh->b_data, buf, csize);
|
|
|
|
set_buffer_uptodate(bh);
|
|
|
|
ext4_handle_dirty_metadata(handle, ea_inode, bh);
|
|
|
|
|
|
|
|
buf += csize;
|
|
|
|
wsize += csize;
|
|
|
|
block += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
inode_lock(ea_inode);
|
|
|
|
i_size_write(ea_inode, wsize);
|
|
|
|
ext4_update_i_disksize(ea_inode, wsize);
|
|
|
|
inode_unlock(ea_inode);
|
|
|
|
|
|
|
|
ext4_mark_inode_dirty(handle, ea_inode);
|
|
|
|
|
|
|
|
out:
|
|
|
|
brelse(bh);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create an inode to store the value of a large EA.
|
|
|
|
*/
|
|
|
|
static struct inode *ext4_xattr_inode_create(handle_t *handle,
|
|
|
|
struct inode *inode)
|
|
|
|
{
|
|
|
|
struct inode *ea_inode = NULL;
|
2017-06-22 01:27:00 +00:00
|
|
|
uid_t owner[2] = { i_uid_read(inode), i_gid_read(inode) };
|
2017-06-22 01:24:31 +00:00
|
|
|
int err;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Let the next inode be the goal, so we try and allocate the EA inode
|
|
|
|
* in the same group, or nearby one.
|
|
|
|
*/
|
|
|
|
ea_inode = ext4_new_inode(handle, inode->i_sb->s_root->d_inode,
|
2017-06-22 01:27:00 +00:00
|
|
|
S_IFREG | 0600, NULL, inode->i_ino + 1, owner,
|
2017-06-22 01:21:39 +00:00
|
|
|
EXT4_EA_INODE_FL);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!IS_ERR(ea_inode)) {
|
|
|
|
ea_inode->i_op = &ext4_file_inode_operations;
|
|
|
|
ea_inode->i_fop = &ext4_file_operations;
|
|
|
|
ext4_set_aops(ea_inode);
|
2017-06-22 01:17:10 +00:00
|
|
|
ext4_xattr_inode_set_class(ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
ea_inode->i_generation = inode->i_generation;
|
|
|
|
EXT4_I(ea_inode)->i_flags |= EXT4_EA_INODE_FL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A back-pointer from EA inode to parent inode will be useful
|
|
|
|
* for e2fsck.
|
|
|
|
*/
|
|
|
|
EXT4_XATTR_INODE_SET_PARENT(ea_inode, inode->i_ino);
|
|
|
|
unlock_new_inode(ea_inode);
|
2017-06-22 01:24:31 +00:00
|
|
|
err = ext4_inode_attach_jinode(ea_inode);
|
|
|
|
if (err) {
|
|
|
|
iput(ea_inode);
|
|
|
|
return ERR_PTR(err);
|
|
|
|
}
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return ea_inode;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unlink the inode storing the value of the EA.
|
|
|
|
*/
|
|
|
|
int ext4_xattr_inode_unlink(struct inode *inode, unsigned long ea_ino)
|
|
|
|
{
|
|
|
|
struct inode *ea_inode = NULL;
|
|
|
|
int err;
|
|
|
|
|
2017-06-22 01:49:53 +00:00
|
|
|
err = ext4_xattr_inode_iget(inode, ea_ino, &ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
clear_nlink(ea_inode);
|
|
|
|
iput(ea_inode);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add value of the EA in an inode.
|
|
|
|
*/
|
|
|
|
static int ext4_xattr_inode_set(handle_t *handle, struct inode *inode,
|
|
|
|
unsigned long *ea_ino, const void *value,
|
|
|
|
size_t value_len)
|
|
|
|
{
|
|
|
|
struct inode *ea_inode;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* Create an inode for the EA value */
|
|
|
|
ea_inode = ext4_xattr_inode_create(handle, inode);
|
|
|
|
if (IS_ERR(ea_inode))
|
|
|
|
return PTR_ERR(ea_inode);
|
|
|
|
|
|
|
|
err = ext4_xattr_inode_write(handle, ea_inode, value, value_len);
|
|
|
|
if (err)
|
|
|
|
clear_nlink(ea_inode);
|
|
|
|
else
|
|
|
|
*ea_ino = ea_inode->i_ino;
|
|
|
|
|
|
|
|
iput(ea_inode);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ext4_xattr_set_entry(struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_search *s,
|
|
|
|
handle_t *handle, struct inode *inode)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_entry *last;
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t free, min_offs = s->end - s->base, name_len = strlen(i->name);
|
2017-06-22 01:10:32 +00:00
|
|
|
int in_inode = i->in_inode;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (ext4_has_feature_ea_inode(inode->i_sb) &&
|
|
|
|
(EXT4_XATTR_SIZE(i->value_len) >
|
|
|
|
EXT4_XATTR_MIN_LARGE_EA_SIZE(inode->i_sb->s_blocksize)))
|
|
|
|
in_inode = 1;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
/* Compute min_offs and last. */
|
|
|
|
last = s->first;
|
2006-10-11 08:20:53 +00:00
|
|
|
for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!last->e_value_inum && last->e_value_size) {
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t offs = le16_to_cpu(last->e_value_offs);
|
|
|
|
if (offs < min_offs)
|
|
|
|
min_offs = offs;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free = min_offs - ((void *)last - s->base) - sizeof(__u32);
|
|
|
|
if (!s->not_found) {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!in_inode &&
|
|
|
|
!s->here->e_value_inum && s->here->e_value_size) {
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t size = le32_to_cpu(s->here->e_value_size);
|
2006-10-11 08:20:53 +00:00
|
|
|
free += EXT4_XATTR_SIZE(size);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2006-10-11 08:20:53 +00:00
|
|
|
free += EXT4_XATTR_LEN(name_len);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
if (i->value) {
|
2017-06-22 01:10:32 +00:00
|
|
|
size_t value_len = EXT4_XATTR_SIZE(i->value_len);
|
|
|
|
|
|
|
|
if (in_inode)
|
|
|
|
value_len = 0;
|
|
|
|
|
|
|
|
if (free < EXT4_XATTR_LEN(name_len) + value_len)
|
2006-10-11 08:20:50 +00:00
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i->value && s->not_found) {
|
|
|
|
/* Insert the new name. */
|
2006-10-11 08:20:53 +00:00
|
|
|
size_t size = EXT4_XATTR_LEN(name_len);
|
2006-10-11 08:20:50 +00:00
|
|
|
size_t rest = (void *)last - (void *)s->here + sizeof(__u32);
|
|
|
|
memmove((void *)s->here + size, s->here, rest);
|
|
|
|
memset(s->here, 0, size);
|
|
|
|
s->here->e_name_index = i->name_index;
|
|
|
|
s->here->e_name_len = name_len;
|
|
|
|
memcpy(s->here->e_name, i->name, name_len);
|
|
|
|
} else {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!s->here->e_value_inum && s->here->e_value_size &&
|
|
|
|
s->here->e_value_offs > 0) {
|
2006-10-11 08:20:50 +00:00
|
|
|
void *first_val = s->base + min_offs;
|
|
|
|
size_t offs = le16_to_cpu(s->here->e_value_offs);
|
|
|
|
void *val = s->base + offs;
|
2006-10-11 08:20:53 +00:00
|
|
|
size_t size = EXT4_XATTR_SIZE(
|
2006-10-11 08:20:50 +00:00
|
|
|
le32_to_cpu(s->here->e_value_size));
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (i->value && size == EXT4_XATTR_SIZE(i->value_len)) {
|
2006-10-11 08:20:50 +00:00
|
|
|
/* The old and the new value have the same
|
|
|
|
size. Just replace. */
|
|
|
|
s->here->e_value_size =
|
|
|
|
cpu_to_le32(i->value_len);
|
2012-12-11 08:31:49 +00:00
|
|
|
if (i->value == EXT4_ZERO_XATTR_VALUE) {
|
|
|
|
memset(val, 0, size);
|
|
|
|
} else {
|
|
|
|
/* Clear pad bytes first. */
|
|
|
|
memset(val + size - EXT4_XATTR_PAD, 0,
|
|
|
|
EXT4_XATTR_PAD);
|
|
|
|
memcpy(val, i->value, i->value_len);
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove the old value. */
|
|
|
|
memmove(first_val + size, first_val, val - first_val);
|
|
|
|
memset(first_val, 0, size);
|
|
|
|
s->here->e_value_size = 0;
|
|
|
|
s->here->e_value_offs = 0;
|
|
|
|
min_offs += size;
|
|
|
|
|
|
|
|
/* Adjust all value offsets. */
|
|
|
|
last = s->first;
|
|
|
|
while (!IS_LAST_ENTRY(last)) {
|
|
|
|
size_t o = le16_to_cpu(last->e_value_offs);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!last->e_value_inum &&
|
|
|
|
last->e_value_size && o < offs)
|
2006-10-11 08:20:50 +00:00
|
|
|
last->e_value_offs =
|
|
|
|
cpu_to_le16(o + size);
|
2006-10-11 08:20:53 +00:00
|
|
|
last = EXT4_XATTR_NEXT(last);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
}
|
2017-06-22 01:10:32 +00:00
|
|
|
if (s->here->e_value_inum) {
|
|
|
|
ext4_xattr_inode_unlink(inode,
|
|
|
|
le32_to_cpu(s->here->e_value_inum));
|
|
|
|
s->here->e_value_inum = 0;
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!i->value) {
|
|
|
|
/* Remove the old name. */
|
2006-10-11 08:20:53 +00:00
|
|
|
size_t size = EXT4_XATTR_LEN(name_len);
|
2006-10-11 08:20:50 +00:00
|
|
|
last = ENTRY((void *)last - size);
|
|
|
|
memmove(s->here, (void *)s->here + size,
|
|
|
|
(void *)last - (void *)s->here + sizeof(__u32));
|
|
|
|
memset(last, 0, size);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i->value) {
|
|
|
|
/* Insert the new value. */
|
2017-06-22 01:10:32 +00:00
|
|
|
if (in_inode) {
|
|
|
|
unsigned long ea_ino =
|
|
|
|
le32_to_cpu(s->here->e_value_inum);
|
|
|
|
rc = ext4_xattr_inode_set(handle, inode, &ea_ino,
|
|
|
|
i->value, i->value_len);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
s->here->e_value_inum = cpu_to_le32(ea_ino);
|
|
|
|
s->here->e_value_offs = 0;
|
|
|
|
} else if (i->value_len) {
|
2006-10-11 08:20:53 +00:00
|
|
|
size_t size = EXT4_XATTR_SIZE(i->value_len);
|
2006-10-11 08:20:50 +00:00
|
|
|
void *val = s->base + min_offs - size;
|
|
|
|
s->here->e_value_offs = cpu_to_le16(min_offs - size);
|
2017-06-22 01:10:32 +00:00
|
|
|
s->here->e_value_inum = 0;
|
2012-12-11 08:31:49 +00:00
|
|
|
if (i->value == EXT4_ZERO_XATTR_VALUE) {
|
|
|
|
memset(val, 0, size);
|
|
|
|
} else {
|
|
|
|
/* Clear the pad bytes first. */
|
|
|
|
memset(val + size - EXT4_XATTR_PAD, 0,
|
|
|
|
EXT4_XATTR_PAD);
|
|
|
|
memcpy(val, i->value, i->value_len);
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2017-06-22 01:10:32 +00:00
|
|
|
s->here->e_value_size = cpu_to_le32(i->value_len);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2017-06-22 01:10:32 +00:00
|
|
|
|
|
|
|
out:
|
|
|
|
return rc;
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_block_find {
|
|
|
|
struct ext4_xattr_search s;
|
2006-10-11 08:20:50 +00:00
|
|
|
struct buffer_head *bh;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_block_find(struct inode *inode, struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_block_find *bs)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
|
|
|
struct super_block *sb = inode->i_sb;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
ea_idebug(inode, "name=%d.%s, value=%p, value_len=%ld",
|
|
|
|
i->name_index, i->name, i->value, (long)i->value_len);
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (EXT4_I(inode)->i_file_acl) {
|
2006-10-11 08:20:50 +00:00
|
|
|
/* The inode already has an extended attribute block. */
|
2006-10-11 08:20:53 +00:00
|
|
|
bs->bh = sb_bread(sb, EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
error = -EIO;
|
|
|
|
if (!bs->bh)
|
|
|
|
goto cleanup;
|
|
|
|
ea_bdebug(bs->bh, "b_count=%d, refcount=%d",
|
|
|
|
atomic_read(&(bs->bh->b_count)),
|
|
|
|
le32_to_cpu(BHDR(bs->bh)->h_refcount));
|
2012-04-29 22:43:10 +00:00
|
|
|
if (ext4_xattr_check_block(inode, bs->bh)) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2015-10-17 20:16:04 +00:00
|
|
|
error = -EFSCORRUPTED;
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
/* Find the named attribute. */
|
|
|
|
bs->s.base = BHDR(bs->bh);
|
|
|
|
bs->s.first = BFIRST(bs->bh);
|
|
|
|
bs->s.end = bs->bh->b_data + bs->bh->b_size;
|
|
|
|
bs->s.here = bs->s.first;
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_find_entry(&bs->s.here, i->name_index,
|
2017-04-30 04:01:02 +00:00
|
|
|
i->name, 1);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error && error != -ENODATA)
|
|
|
|
goto cleanup;
|
|
|
|
bs->s.not_found = error;
|
|
|
|
}
|
|
|
|
error = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_block_set(handle_t *handle, struct inode *inode,
|
|
|
|
struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_block_find *bs)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
|
|
|
struct super_block *sb = inode->i_sb;
|
|
|
|
struct buffer_head *new_bh = NULL;
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_search *s = &bs->s;
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache_entry *ce = NULL;
|
2007-03-01 04:13:35 +00:00
|
|
|
int error = 0;
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache *ext4_mb_cache = EXT4_GET_MB_CACHE(inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
#define header(x) ((struct ext4_xattr_header *)(x))
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
if (s->base) {
|
2014-05-13 02:06:43 +00:00
|
|
|
BUFFER_TRACE(bs->bh, "get_write_access");
|
2007-03-01 04:13:35 +00:00
|
|
|
error = ext4_journal_get_write_access(handle, bs->bh);
|
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
lock_buffer(bs->bh);
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
if (header(s->base)->h_refcount == cpu_to_le32(1)) {
|
2016-02-22 16:50:13 +00:00
|
|
|
__u32 hash = le32_to_cpu(BHDR(bs->bh)->h_hash);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This must happen under buffer lock for
|
|
|
|
* ext4_xattr_block_set() to reliably detect modified
|
|
|
|
* block
|
|
|
|
*/
|
2016-02-23 03:35:22 +00:00
|
|
|
mb_cache_entry_delete_block(ext4_mb_cache, hash,
|
|
|
|
bs->bh->b_blocknr);
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(bs->bh, "modifying in-place");
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_set_entry(i, s, handle, inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!error) {
|
|
|
|
if (!IS_LAST_ENTRY(s->first))
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_rehash(header(s->base),
|
2006-10-11 08:20:50 +00:00
|
|
|
s->here);
|
2014-03-18 23:24:49 +00:00
|
|
|
ext4_xattr_cache_insert(ext4_mb_cache,
|
|
|
|
bs->bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2017-03-25 21:22:47 +00:00
|
|
|
ext4_xattr_block_csum_set(inode, bs->bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
unlock_buffer(bs->bh);
|
2015-10-17 20:16:04 +00:00
|
|
|
if (error == -EFSCORRUPTED)
|
2006-10-11 08:20:50 +00:00
|
|
|
goto bad_block;
|
|
|
|
if (!error)
|
2017-03-25 21:22:47 +00:00
|
|
|
error = ext4_handle_dirty_metadata(handle,
|
|
|
|
inode,
|
|
|
|
bs->bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
goto inserted;
|
|
|
|
} else {
|
|
|
|
int offset = (char *)s->here - bs->bh->b_data;
|
|
|
|
|
2007-03-01 04:13:35 +00:00
|
|
|
unlock_buffer(bs->bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(bs->bh, "cloning");
|
2008-04-30 02:02:02 +00:00
|
|
|
s->base = kmalloc(bs->bh->b_size, GFP_NOFS);
|
2006-10-11 08:20:50 +00:00
|
|
|
error = -ENOMEM;
|
|
|
|
if (s->base == NULL)
|
|
|
|
goto cleanup;
|
|
|
|
memcpy(s->base, BHDR(bs->bh), bs->bh->b_size);
|
|
|
|
s->first = ENTRY(header(s->base)+1);
|
|
|
|
header(s->base)->h_refcount = cpu_to_le32(1);
|
|
|
|
s->here = ENTRY(s->base + offset);
|
|
|
|
s->end = s->base + bs->bh->b_size;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Allocate a buffer where we construct the new block. */
|
2008-04-30 02:02:02 +00:00
|
|
|
s->base = kzalloc(sb->s_blocksize, GFP_NOFS);
|
2006-10-11 08:20:50 +00:00
|
|
|
/* assert(header == s->base) */
|
|
|
|
error = -ENOMEM;
|
|
|
|
if (s->base == NULL)
|
|
|
|
goto cleanup;
|
2006-10-11 08:20:53 +00:00
|
|
|
header(s->base)->h_magic = cpu_to_le32(EXT4_XATTR_MAGIC);
|
2006-10-11 08:20:50 +00:00
|
|
|
header(s->base)->h_blocks = cpu_to_le32(1);
|
|
|
|
header(s->base)->h_refcount = cpu_to_le32(1);
|
|
|
|
s->first = ENTRY(header(s->base)+1);
|
|
|
|
s->here = ENTRY(header(s->base)+1);
|
|
|
|
s->end = s->base + sb->s_blocksize;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_set_entry(i, s, handle, inode);
|
2015-10-17 20:16:04 +00:00
|
|
|
if (error == -EFSCORRUPTED)
|
2006-10-11 08:20:50 +00:00
|
|
|
goto bad_block;
|
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
if (!IS_LAST_ENTRY(s->first))
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_rehash(header(s->base), s->here);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
inserted:
|
|
|
|
if (!IS_LAST_ENTRY(s->first)) {
|
2006-10-11 08:20:53 +00:00
|
|
|
new_bh = ext4_xattr_cache_find(inode, header(s->base), &ce);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (new_bh) {
|
|
|
|
/* We found an identical block in the cache. */
|
|
|
|
if (new_bh == bs->bh)
|
|
|
|
ea_bdebug(new_bh, "keeping");
|
|
|
|
else {
|
2016-02-23 03:44:04 +00:00
|
|
|
u32 ref;
|
|
|
|
|
2017-05-24 22:24:07 +00:00
|
|
|
WARN_ON_ONCE(dquot_initialize_needed(inode));
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
/* The old block is released after updating
|
|
|
|
the inode. */
|
2013-02-18 17:12:07 +00:00
|
|
|
error = dquot_alloc_block(inode,
|
|
|
|
EXT4_C2B(EXT4_SB(sb), 1));
|
2010-03-03 14:05:00 +00:00
|
|
|
if (error)
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
2014-05-13 02:06:43 +00:00
|
|
|
BUFFER_TRACE(new_bh, "get_write_access");
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_journal_get_write_access(handle,
|
2006-10-11 08:20:50 +00:00
|
|
|
new_bh);
|
|
|
|
if (error)
|
|
|
|
goto cleanup_dquot;
|
|
|
|
lock_buffer(new_bh);
|
2016-02-22 16:50:13 +00:00
|
|
|
/*
|
|
|
|
* We have to be careful about races with
|
2016-02-23 03:44:04 +00:00
|
|
|
* freeing, rehashing or adding references to
|
|
|
|
* xattr block. Once we hold buffer lock xattr
|
|
|
|
* block's state is stable so we can check
|
|
|
|
* whether the block got freed / rehashed or
|
|
|
|
* not. Since we unhash mbcache entry under
|
|
|
|
* buffer lock when freeing / rehashing xattr
|
|
|
|
* block, checking whether entry is still
|
|
|
|
* hashed is reliable. Same rules hold for
|
|
|
|
* e_reusable handling.
|
2016-02-22 16:50:13 +00:00
|
|
|
*/
|
2016-02-23 03:44:04 +00:00
|
|
|
if (hlist_bl_unhashed(&ce->e_hash_list) ||
|
|
|
|
!ce->e_reusable) {
|
2016-02-22 16:50:13 +00:00
|
|
|
/*
|
|
|
|
* Undo everything and check mbcache
|
|
|
|
* again.
|
|
|
|
*/
|
|
|
|
unlock_buffer(new_bh);
|
|
|
|
dquot_free_block(inode,
|
|
|
|
EXT4_C2B(EXT4_SB(sb),
|
|
|
|
1));
|
|
|
|
brelse(new_bh);
|
2016-02-23 03:35:22 +00:00
|
|
|
mb_cache_entry_put(ext4_mb_cache, ce);
|
2016-02-22 16:50:13 +00:00
|
|
|
ce = NULL;
|
|
|
|
new_bh = NULL;
|
|
|
|
goto inserted;
|
|
|
|
}
|
2016-02-23 03:44:04 +00:00
|
|
|
ref = le32_to_cpu(BHDR(new_bh)->h_refcount) + 1;
|
|
|
|
BHDR(new_bh)->h_refcount = cpu_to_le32(ref);
|
|
|
|
if (ref >= EXT4_XATTR_REFCOUNT_MAX)
|
|
|
|
ce->e_reusable = 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(new_bh, "reusing; refcount now=%d",
|
2016-02-23 03:44:04 +00:00
|
|
|
ref);
|
2017-03-25 21:22:47 +00:00
|
|
|
ext4_xattr_block_csum_set(inode, new_bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
unlock_buffer(new_bh);
|
2017-03-25 21:22:47 +00:00
|
|
|
error = ext4_handle_dirty_metadata(handle,
|
|
|
|
inode,
|
|
|
|
new_bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup_dquot;
|
|
|
|
}
|
2016-02-23 03:35:22 +00:00
|
|
|
mb_cache_entry_touch(ext4_mb_cache, ce);
|
|
|
|
mb_cache_entry_put(ext4_mb_cache, ce);
|
2006-10-11 08:20:50 +00:00
|
|
|
ce = NULL;
|
|
|
|
} else if (bs->bh && s->base == bs->bh->b_data) {
|
|
|
|
/* We were modifying this block in-place. */
|
|
|
|
ea_bdebug(bs->bh, "keeping this block");
|
|
|
|
new_bh = bs->bh;
|
|
|
|
get_bh(new_bh);
|
|
|
|
} else {
|
|
|
|
/* We need to allocate a new block */
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
ext4_fsblk_t goal, block;
|
|
|
|
|
2017-05-24 22:24:07 +00:00
|
|
|
WARN_ON_ONCE(dquot_initialize_needed(inode));
|
|
|
|
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
goal = ext4_group_first_block_no(sb,
|
2008-04-17 14:38:59 +00:00
|
|
|
EXT4_I(inode)->i_block_group);
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
|
|
|
|
/* non-extent files can't have physical blocks past 2^32 */
|
2010-05-17 02:00:00 +00:00
|
|
|
if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
goal = goal & EXT4_MAX_BLOCK_FILE_PHYS;
|
|
|
|
|
2011-05-25 11:41:26 +00:00
|
|
|
block = ext4_new_meta_blocks(handle, inode, goal, 0,
|
|
|
|
NULL, &error);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
|
2010-05-17 02:00:00 +00:00
|
|
|
if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
|
ext4: limit block allocations for indirect-block files to < 2^32
Today, the ext4 allocator will happily allocate blocks past
2^32 for indirect-block files, which results in the block
numbers getting truncated, and corruption ensues.
This patch limits such allocations to < 2^32, and adds
BUG_ONs if we do get blocks larger than that.
This should address RH Bug 519471, ext4 bitmap allocator
must limit blocks to < 2^32
* ext4_find_goal() is modified to choose a goal < UINT_MAX,
so that our starting point is in an acceptable range.
* ext4_xattr_block_set() is modified such that the goal block
is < UINT_MAX, as above.
* ext4_mb_regular_allocator() is modified so that the group
search does not continue into groups which are too high
* ext4_mb_use_preallocated() has a check that we don't use
preallocated space which is too far out
* ext4_alloc_blocks() and ext4_xattr_block_set() add some BUG_ONs
No attempt has been made to limit inode locations to < 2^32,
so we may wind up with blocks far from their inodes. Doing
this much already will lead to some odd ENOSPC issues when the
"lower 32" gets full, and further restricting inodes could
make that even weirder.
For high inodes, choosing a goal of the original, % UINT_MAX,
may be a bit odd, but then we're in an odd situation anyway,
and I don't know of a better heuristic.
Signed-off-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
2009-09-16 18:45:10 +00:00
|
|
|
BUG_ON(block > EXT4_MAX_BLOCK_FILE_PHYS);
|
|
|
|
|
2012-03-20 03:11:43 +00:00
|
|
|
ea_idebug(inode, "creating block %llu",
|
|
|
|
(unsigned long long)block);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
new_bh = sb_getblk(sb, block);
|
2013-01-12 21:28:47 +00:00
|
|
|
if (unlikely(!new_bh)) {
|
2013-01-12 21:19:36 +00:00
|
|
|
error = -ENOMEM;
|
2006-10-11 08:20:50 +00:00
|
|
|
getblk_failed:
|
2011-02-22 02:01:42 +00:00
|
|
|
ext4_free_blocks(handle, inode, NULL, block, 1,
|
2009-11-23 12:17:05 +00:00
|
|
|
EXT4_FREE_BLOCKS_METADATA);
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
lock_buffer(new_bh);
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_journal_get_create_access(handle, new_bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error) {
|
|
|
|
unlock_buffer(new_bh);
|
2013-01-12 21:19:36 +00:00
|
|
|
error = -EIO;
|
2006-10-11 08:20:50 +00:00
|
|
|
goto getblk_failed;
|
|
|
|
}
|
|
|
|
memcpy(new_bh->b_data, s->base, new_bh->b_size);
|
2017-03-25 21:22:47 +00:00
|
|
|
ext4_xattr_block_csum_set(inode, new_bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
set_buffer_uptodate(new_bh);
|
|
|
|
unlock_buffer(new_bh);
|
2014-03-18 23:24:49 +00:00
|
|
|
ext4_xattr_cache_insert(ext4_mb_cache, new_bh);
|
2017-03-25 21:22:47 +00:00
|
|
|
error = ext4_handle_dirty_metadata(handle, inode,
|
|
|
|
new_bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Update the inode. */
|
2006-10-11 08:20:53 +00:00
|
|
|
EXT4_I(inode)->i_file_acl = new_bh ? new_bh->b_blocknr : 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
/* Drop the previous xattr block. */
|
|
|
|
if (bs->bh && bs->bh != new_bh)
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_release_block(handle, inode, bs->bh);
|
2006-10-11 08:20:50 +00:00
|
|
|
error = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (ce)
|
2016-02-23 03:35:22 +00:00
|
|
|
mb_cache_entry_put(ext4_mb_cache, ce);
|
2006-10-11 08:20:50 +00:00
|
|
|
brelse(new_bh);
|
|
|
|
if (!(bs->bh && s->base == bs->bh->b_data))
|
|
|
|
kfree(s->base);
|
|
|
|
|
|
|
|
return error;
|
|
|
|
|
|
|
|
cleanup_dquot:
|
2013-02-18 17:12:07 +00:00
|
|
|
dquot_free_block(inode, EXT4_C2B(EXT4_SB(sb), 1));
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
bad_block:
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
#undef header
|
|
|
|
}
|
|
|
|
|
2012-12-05 15:28:46 +00:00
|
|
|
int ext4_xattr_ibody_find(struct inode *inode, struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_ibody_find *is)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_inode *raw_inode;
|
2006-10-11 08:20:50 +00:00
|
|
|
int error;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (EXT4_I(inode)->i_extra_isize == 0)
|
2006-10-11 08:20:50 +00:00
|
|
|
return 0;
|
2006-10-11 08:20:53 +00:00
|
|
|
raw_inode = ext4_raw_inode(&is->iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
header = IHDR(inode, raw_inode);
|
|
|
|
is->s.base = is->s.first = IFIRST(header);
|
|
|
|
is->s.here = is->s.first;
|
2006-10-11 08:20:53 +00:00
|
|
|
is->s.end = (void *)raw_inode + EXT4_SB(inode->i_sb)->s_inode_size;
|
2010-01-24 19:34:07 +00:00
|
|
|
if (ext4_test_inode_state(inode, EXT4_STATE_XATTR)) {
|
2016-03-22 20:13:15 +00:00
|
|
|
error = xattr_check_inode(inode, header, is->s.end);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
/* Find the named attribute. */
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_find_entry(&is->s.here, i->name_index,
|
2017-04-30 04:01:02 +00:00
|
|
|
i->name, 0);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error && error != -ENODATA)
|
|
|
|
return error;
|
|
|
|
is->s.not_found = error;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-12-10 19:06:02 +00:00
|
|
|
int ext4_xattr_ibody_inline_set(handle_t *handle, struct inode *inode,
|
|
|
|
struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_ibody_find *is)
|
|
|
|
{
|
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_xattr_search *s = &is->s;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (EXT4_I(inode)->i_extra_isize == 0)
|
|
|
|
return -ENOSPC;
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_set_entry(i, s, handle, inode);
|
2012-12-10 19:06:02 +00:00
|
|
|
if (error) {
|
|
|
|
if (error == -ENOSPC &&
|
|
|
|
ext4_has_inline_data(inode)) {
|
|
|
|
error = ext4_try_to_evict_inline_data(handle, inode,
|
|
|
|
EXT4_XATTR_LEN(strlen(i->name) +
|
|
|
|
EXT4_XATTR_SIZE(i->value_len)));
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
error = ext4_xattr_ibody_find(inode, i, is);
|
|
|
|
if (error)
|
|
|
|
return error;
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_set_entry(i, s, handle, inode);
|
2012-12-10 19:06:02 +00:00
|
|
|
}
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
header = IHDR(inode, ext4_raw_inode(&is->iloc));
|
|
|
|
if (!IS_LAST_ENTRY(s->first)) {
|
|
|
|
header->h_magic = cpu_to_le32(EXT4_XATTR_MAGIC);
|
|
|
|
ext4_set_inode_state(inode, EXT4_STATE_XATTR);
|
|
|
|
} else {
|
|
|
|
header->h_magic = cpu_to_le32(0);
|
|
|
|
ext4_clear_inode_state(inode, EXT4_STATE_XATTR);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
static int ext4_xattr_ibody_set(handle_t *handle, struct inode *inode,
|
2012-12-10 19:06:02 +00:00
|
|
|
struct ext4_xattr_info *i,
|
|
|
|
struct ext4_xattr_ibody_find *is)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_xattr_search *s = &is->s;
|
2006-10-11 08:20:50 +00:00
|
|
|
int error;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
if (EXT4_I(inode)->i_extra_isize == 0)
|
2006-10-11 08:20:50 +00:00
|
|
|
return -ENOSPC;
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_set_entry(i, s, handle, inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
return error;
|
2006-10-11 08:20:53 +00:00
|
|
|
header = IHDR(inode, ext4_raw_inode(&is->iloc));
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!IS_LAST_ENTRY(s->first)) {
|
2006-10-11 08:20:53 +00:00
|
|
|
header->h_magic = cpu_to_le32(EXT4_XATTR_MAGIC);
|
2010-01-24 19:34:07 +00:00
|
|
|
ext4_set_inode_state(inode, EXT4_STATE_XATTR);
|
2006-10-11 08:20:50 +00:00
|
|
|
} else {
|
|
|
|
header->h_magic = cpu_to_le32(0);
|
2010-01-24 19:34:07 +00:00
|
|
|
ext4_clear_inode_state(inode, EXT4_STATE_XATTR);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-02-23 03:43:04 +00:00
|
|
|
static int ext4_xattr_value_same(struct ext4_xattr_search *s,
|
|
|
|
struct ext4_xattr_info *i)
|
|
|
|
{
|
|
|
|
void *value;
|
|
|
|
|
2017-06-22 02:02:06 +00:00
|
|
|
/* When e_value_inum is set the value is stored externally. */
|
|
|
|
if (s->here->e_value_inum)
|
|
|
|
return 0;
|
2016-02-23 03:43:04 +00:00
|
|
|
if (le32_to_cpu(s->here->e_value_size) != i->value_len)
|
|
|
|
return 0;
|
|
|
|
value = ((void *)s->base) + le16_to_cpu(s->here->e_value_offs);
|
|
|
|
return !memcmp(value, i->value, i->value_len);
|
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_set_handle()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
2011-01-10 17:10:30 +00:00
|
|
|
* Create, replace or remove an extended attribute for this inode. Value
|
2006-10-11 08:20:50 +00:00
|
|
|
* is NULL to remove an existing extended attribute, and non-NULL to
|
|
|
|
* either replace an existing extended attribute, or create a new extended
|
|
|
|
* attribute. The flags XATTR_REPLACE and XATTR_CREATE
|
|
|
|
* specify that an extended attribute must exist and must not exist
|
|
|
|
* previous to the call, respectively.
|
|
|
|
*
|
|
|
|
* Returns 0, or a negative error number on failure.
|
|
|
|
*/
|
|
|
|
int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_set_handle(handle_t *handle, struct inode *inode, int name_index,
|
2006-10-11 08:20:50 +00:00
|
|
|
const char *name, const void *value, size_t value_len,
|
|
|
|
int flags)
|
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_info i = {
|
2006-10-11 08:20:50 +00:00
|
|
|
.name_index = name_index,
|
|
|
|
.name = name,
|
|
|
|
.value = value,
|
|
|
|
.value_len = value_len,
|
2017-06-22 01:10:32 +00:00
|
|
|
.in_inode = 0,
|
2006-10-11 08:20:50 +00:00
|
|
|
};
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_ibody_find is = {
|
2006-10-11 08:20:50 +00:00
|
|
|
.s = { .not_found = -ENODATA, },
|
|
|
|
};
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_block_find bs = {
|
2006-10-11 08:20:50 +00:00
|
|
|
.s = { .not_found = -ENODATA, },
|
|
|
|
};
|
2017-01-12 02:50:46 +00:00
|
|
|
int no_expand;
|
2006-10-11 08:20:50 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
if (!name)
|
|
|
|
return -EINVAL;
|
|
|
|
if (strlen(name) > 255)
|
|
|
|
return -ERANGE;
|
2017-05-24 22:24:07 +00:00
|
|
|
|
2017-01-12 02:50:46 +00:00
|
|
|
ext4_write_lock_xattr(inode, &no_expand);
|
2008-10-09 03:21:54 +00:00
|
|
|
|
2011-10-26 07:32:07 +00:00
|
|
|
error = ext4_reserve_inode_write(handle, inode, &is.iloc);
|
2009-11-15 20:30:52 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
|
2010-01-24 19:34:07 +00:00
|
|
|
if (ext4_test_inode_state(inode, EXT4_STATE_NEW)) {
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_inode *raw_inode = ext4_raw_inode(&is.iloc);
|
|
|
|
memset(raw_inode, 0, EXT4_SB(inode->i_sb)->s_inode_size);
|
2010-01-24 19:34:07 +00:00
|
|
|
ext4_clear_inode_state(inode, EXT4_STATE_NEW);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_ibody_find(inode, &i, &is);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
if (is.s.not_found)
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_block_find(inode, &i, &bs);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
if (is.s.not_found && bs.s.not_found) {
|
|
|
|
error = -ENODATA;
|
|
|
|
if (flags & XATTR_REPLACE)
|
|
|
|
goto cleanup;
|
|
|
|
error = 0;
|
|
|
|
if (!value)
|
|
|
|
goto cleanup;
|
|
|
|
} else {
|
|
|
|
error = -EEXIST;
|
|
|
|
if (flags & XATTR_CREATE)
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (!value) {
|
|
|
|
if (!is.s.not_found)
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_ibody_set(handle, inode, &i, &is);
|
2006-10-11 08:20:50 +00:00
|
|
|
else if (!bs.s.not_found)
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_block_set(handle, inode, &i, &bs);
|
2006-10-11 08:20:50 +00:00
|
|
|
} else {
|
2016-02-23 03:43:04 +00:00
|
|
|
error = 0;
|
|
|
|
/* Xattr value did not change? Save us some work and bail out */
|
|
|
|
if (!is.s.not_found && ext4_xattr_value_same(&is.s, &i))
|
|
|
|
goto cleanup;
|
|
|
|
if (!bs.s.not_found && ext4_xattr_value_same(&bs.s, &i))
|
|
|
|
goto cleanup;
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_ibody_set(handle, inode, &i, &is);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!error && !bs.s.not_found) {
|
|
|
|
i.value = NULL;
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_block_set(handle, inode, &i, &bs);
|
2006-10-11 08:20:50 +00:00
|
|
|
} else if (error == -ENOSPC) {
|
2008-05-14 23:05:47 +00:00
|
|
|
if (EXT4_I(inode)->i_file_acl && !bs.s.base) {
|
|
|
|
error = ext4_xattr_block_find(inode, &i, &bs);
|
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_block_set(handle, inode, &i, &bs);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (ext4_has_feature_ea_inode(inode->i_sb) &&
|
|
|
|
error == -ENOSPC) {
|
|
|
|
/* xattr not fit to block, store at external
|
|
|
|
* inode */
|
|
|
|
i.in_inode = 1;
|
|
|
|
error = ext4_xattr_ibody_set(handle, inode,
|
|
|
|
&i, &is);
|
|
|
|
}
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
if (!is.s.not_found) {
|
|
|
|
i.value = NULL;
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_ibody_set(handle, inode, &i,
|
|
|
|
&is);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!error) {
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_update_super_block(handle, inode->i_sb);
|
2016-11-15 02:40:10 +00:00
|
|
|
inode->i_ctime = current_time(inode);
|
2007-07-18 13:19:57 +00:00
|
|
|
if (!value)
|
2017-01-12 02:50:46 +00:00
|
|
|
no_expand = 0;
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_mark_iloc_dirty(handle, inode, &is.iloc);
|
2006-10-11 08:20:50 +00:00
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* The bh is consumed by ext4_mark_iloc_dirty, even with
|
2006-10-11 08:20:50 +00:00
|
|
|
* error != 0.
|
|
|
|
*/
|
|
|
|
is.iloc.bh = NULL;
|
|
|
|
if (IS_SYNC(inode))
|
2009-01-07 05:06:22 +00:00
|
|
|
ext4_handle_sync(handle);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(is.iloc.bh);
|
|
|
|
brelse(bs.bh);
|
2017-01-12 02:50:46 +00:00
|
|
|
ext4_write_unlock_xattr(inode, &no_expand);
|
2006-10-11 08:20:50 +00:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_set()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
2006-10-11 08:20:53 +00:00
|
|
|
* Like ext4_xattr_set_handle, but start from an inode. This extended
|
2006-10-11 08:20:50 +00:00
|
|
|
* attribute modification is a filesystem transaction by itself.
|
|
|
|
*
|
|
|
|
* Returns 0, or a negative error number on failure.
|
|
|
|
*/
|
|
|
|
int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_set(struct inode *inode, int name_index, const char *name,
|
2006-10-11 08:20:50 +00:00
|
|
|
const void *value, size_t value_len, int flags)
|
|
|
|
{
|
|
|
|
handle_t *handle;
|
2017-06-22 01:10:32 +00:00
|
|
|
struct super_block *sb = inode->i_sb;
|
2006-10-11 08:20:50 +00:00
|
|
|
int error, retries = 0;
|
2013-02-09 20:23:03 +00:00
|
|
|
int credits = ext4_jbd2_credits_xattr(inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2017-05-24 22:24:07 +00:00
|
|
|
error = dquot_initialize(inode);
|
|
|
|
if (error)
|
|
|
|
return error;
|
2017-06-22 01:10:32 +00:00
|
|
|
|
|
|
|
if ((value_len >= EXT4_XATTR_MIN_LARGE_EA_SIZE(sb->s_blocksize)) &&
|
|
|
|
ext4_has_feature_ea_inode(sb)) {
|
|
|
|
int nrblocks = (value_len + sb->s_blocksize - 1) >>
|
|
|
|
sb->s_blocksize_bits;
|
|
|
|
|
|
|
|
/* For new inode */
|
|
|
|
credits += EXT4_SINGLEDATA_TRANS_BLOCKS(sb) + 3;
|
|
|
|
|
|
|
|
/* For data blocks of EA inode */
|
|
|
|
credits += ext4_meta_trans_blocks(inode, nrblocks, 0);
|
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
retry:
|
2013-02-09 02:59:22 +00:00
|
|
|
handle = ext4_journal_start(inode, EXT4_HT_XATTR, credits);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (IS_ERR(handle)) {
|
|
|
|
error = PTR_ERR(handle);
|
|
|
|
} else {
|
|
|
|
int error2;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
error = ext4_xattr_set_handle(handle, inode, name_index, name,
|
2006-10-11 08:20:50 +00:00
|
|
|
value, value_len, flags);
|
2006-10-11 08:20:53 +00:00
|
|
|
error2 = ext4_journal_stop(handle);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error == -ENOSPC &&
|
2017-06-22 01:10:32 +00:00
|
|
|
ext4_should_retry_alloc(sb, &retries))
|
2006-10-11 08:20:50 +00:00
|
|
|
goto retry;
|
|
|
|
if (error == 0)
|
|
|
|
error = error2;
|
|
|
|
}
|
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2007-07-18 13:19:57 +00:00
|
|
|
/*
|
|
|
|
* Shift the EA entries in the inode to create space for the increased
|
|
|
|
* i_extra_isize.
|
|
|
|
*/
|
|
|
|
static void ext4_xattr_shift_entries(struct ext4_xattr_entry *entry,
|
|
|
|
int value_offs_shift, void *to,
|
2016-08-29 19:41:11 +00:00
|
|
|
void *from, size_t n)
|
2007-07-18 13:19:57 +00:00
|
|
|
{
|
|
|
|
struct ext4_xattr_entry *last = entry;
|
|
|
|
int new_offs;
|
|
|
|
|
2016-08-29 19:41:11 +00:00
|
|
|
/* We always shift xattr headers further thus offsets get lower */
|
|
|
|
BUG_ON(value_offs_shift > 0);
|
|
|
|
|
2007-07-18 13:19:57 +00:00
|
|
|
/* Adjust the value offsets of the entries */
|
|
|
|
for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!last->e_value_inum && last->e_value_size) {
|
2007-07-18 13:19:57 +00:00
|
|
|
new_offs = le16_to_cpu(last->e_value_offs) +
|
|
|
|
value_offs_shift;
|
|
|
|
last->e_value_offs = cpu_to_le16(new_offs);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Shift the entries by n bytes */
|
|
|
|
memmove(to, from, n);
|
|
|
|
}
|
|
|
|
|
2016-08-29 19:42:11 +00:00
|
|
|
/*
|
|
|
|
* Move xattr pointed to by 'entry' from inode into external xattr block
|
|
|
|
*/
|
|
|
|
static int ext4_xattr_move_to_block(handle_t *handle, struct inode *inode,
|
|
|
|
struct ext4_inode *raw_inode,
|
|
|
|
struct ext4_xattr_entry *entry)
|
|
|
|
{
|
|
|
|
struct ext4_xattr_ibody_find *is = NULL;
|
|
|
|
struct ext4_xattr_block_find *bs = NULL;
|
|
|
|
char *buffer = NULL, *b_entry_name = NULL;
|
2017-06-22 02:11:54 +00:00
|
|
|
size_t value_size = le32_to_cpu(entry->e_value_size);
|
2016-08-29 19:42:11 +00:00
|
|
|
struct ext4_xattr_info i = {
|
|
|
|
.value = NULL,
|
|
|
|
.value_len = 0,
|
|
|
|
.name_index = entry->e_name_index,
|
2017-06-22 02:11:54 +00:00
|
|
|
.in_inode = !!entry->e_value_inum,
|
2016-08-29 19:42:11 +00:00
|
|
|
};
|
|
|
|
struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode);
|
|
|
|
int error;
|
|
|
|
|
|
|
|
is = kzalloc(sizeof(struct ext4_xattr_ibody_find), GFP_NOFS);
|
|
|
|
bs = kzalloc(sizeof(struct ext4_xattr_block_find), GFP_NOFS);
|
|
|
|
buffer = kmalloc(value_size, GFP_NOFS);
|
|
|
|
b_entry_name = kmalloc(entry->e_name_len + 1, GFP_NOFS);
|
|
|
|
if (!is || !bs || !buffer || !b_entry_name) {
|
|
|
|
error = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
is->s.not_found = -ENODATA;
|
|
|
|
bs->s.not_found = -ENODATA;
|
|
|
|
is->iloc.bh = NULL;
|
|
|
|
bs->bh = NULL;
|
|
|
|
|
|
|
|
/* Save the entry name and the entry value */
|
2017-06-22 02:11:54 +00:00
|
|
|
if (entry->e_value_inum) {
|
|
|
|
error = ext4_xattr_inode_get(inode,
|
|
|
|
le32_to_cpu(entry->e_value_inum),
|
|
|
|
buffer, value_size);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
} else {
|
|
|
|
size_t value_offs = le16_to_cpu(entry->e_value_offs);
|
|
|
|
memcpy(buffer, (void *)IFIRST(header) + value_offs, value_size);
|
|
|
|
}
|
|
|
|
|
2016-08-29 19:42:11 +00:00
|
|
|
memcpy(b_entry_name, entry->e_name, entry->e_name_len);
|
|
|
|
b_entry_name[entry->e_name_len] = '\0';
|
|
|
|
i.name = b_entry_name;
|
|
|
|
|
|
|
|
error = ext4_get_inode_loc(inode, &is->iloc);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
error = ext4_xattr_ibody_find(inode, &i, is);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Remove the chosen entry from the inode */
|
2017-06-22 01:10:32 +00:00
|
|
|
error = ext4_xattr_ibody_set(handle, inode, &i, is);
|
2016-08-29 19:42:11 +00:00
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
i.value = buffer;
|
|
|
|
i.value_len = value_size;
|
|
|
|
error = ext4_xattr_block_find(inode, &i, bs);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Add entry which was removed from the inode into the block */
|
|
|
|
error = ext4_xattr_block_set(handle, inode, &i, bs);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
error = 0;
|
|
|
|
out:
|
|
|
|
kfree(b_entry_name);
|
|
|
|
kfree(buffer);
|
|
|
|
if (is)
|
|
|
|
brelse(is->iloc.bh);
|
|
|
|
kfree(is);
|
|
|
|
kfree(bs);
|
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2016-08-29 19:44:11 +00:00
|
|
|
static int ext4_xattr_make_inode_space(handle_t *handle, struct inode *inode,
|
|
|
|
struct ext4_inode *raw_inode,
|
|
|
|
int isize_diff, size_t ifree,
|
|
|
|
size_t bfree, int *total_ino)
|
|
|
|
{
|
|
|
|
struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode);
|
|
|
|
struct ext4_xattr_entry *small_entry;
|
|
|
|
struct ext4_xattr_entry *entry;
|
|
|
|
struct ext4_xattr_entry *last;
|
|
|
|
unsigned int entry_size; /* EA entry size */
|
|
|
|
unsigned int total_size; /* EA entry size + value size */
|
|
|
|
unsigned int min_total_size;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
while (isize_diff > ifree) {
|
|
|
|
entry = NULL;
|
|
|
|
small_entry = NULL;
|
|
|
|
min_total_size = ~0U;
|
|
|
|
last = IFIRST(header);
|
|
|
|
/* Find the entry best suited to be pushed into EA block */
|
|
|
|
for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
|
2017-06-22 02:05:44 +00:00
|
|
|
total_size = EXT4_XATTR_LEN(last->e_name_len);
|
|
|
|
if (!last->e_value_inum)
|
|
|
|
total_size += EXT4_XATTR_SIZE(
|
|
|
|
le32_to_cpu(last->e_value_size));
|
2016-08-29 19:44:11 +00:00
|
|
|
if (total_size <= bfree &&
|
|
|
|
total_size < min_total_size) {
|
|
|
|
if (total_size + ifree < isize_diff) {
|
|
|
|
small_entry = last;
|
|
|
|
} else {
|
|
|
|
entry = last;
|
|
|
|
min_total_size = total_size;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (entry == NULL) {
|
|
|
|
if (small_entry == NULL)
|
|
|
|
return -ENOSPC;
|
|
|
|
entry = small_entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
entry_size = EXT4_XATTR_LEN(entry->e_name_len);
|
2017-06-22 02:05:44 +00:00
|
|
|
total_size = entry_size;
|
|
|
|
if (!entry->e_value_inum)
|
|
|
|
total_size += EXT4_XATTR_SIZE(
|
|
|
|
le32_to_cpu(entry->e_value_size));
|
2016-08-29 19:44:11 +00:00
|
|
|
error = ext4_xattr_move_to_block(handle, inode, raw_inode,
|
|
|
|
entry);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
*total_ino -= entry_size;
|
|
|
|
ifree += total_size;
|
|
|
|
bfree -= total_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-07-18 13:19:57 +00:00
|
|
|
/*
|
|
|
|
* Expand an inode by new_extra_isize bytes when EAs are present.
|
|
|
|
* Returns 0 on success or negative error number on failure.
|
|
|
|
*/
|
|
|
|
int ext4_expand_extra_isize_ea(struct inode *inode, int new_extra_isize,
|
|
|
|
struct ext4_inode *raw_inode, handle_t *handle)
|
|
|
|
{
|
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct buffer_head *bh = NULL;
|
2016-08-29 19:38:11 +00:00
|
|
|
size_t min_offs;
|
|
|
|
size_t ifree, bfree;
|
2014-02-20 01:15:21 +00:00
|
|
|
int total_ino;
|
2016-08-29 19:43:11 +00:00
|
|
|
void *base, *end;
|
2016-08-11 15:50:30 +00:00
|
|
|
int error = 0, tried_min_extra_isize = 0;
|
2007-10-16 22:38:25 +00:00
|
|
|
int s_min_extra_isize = le16_to_cpu(EXT4_SB(inode->i_sb)->s_es->s_min_extra_isize);
|
2016-08-11 15:50:30 +00:00
|
|
|
int isize_diff; /* How much do we need to grow i_extra_isize */
|
2017-01-12 02:50:46 +00:00
|
|
|
int no_expand;
|
|
|
|
|
|
|
|
if (ext4_write_trylock_xattr(inode, &no_expand) == 0)
|
|
|
|
return 0;
|
2007-07-18 13:19:57 +00:00
|
|
|
|
|
|
|
retry:
|
2016-08-11 15:50:30 +00:00
|
|
|
isize_diff = new_extra_isize - EXT4_I(inode)->i_extra_isize;
|
2016-08-11 16:38:55 +00:00
|
|
|
if (EXT4_I(inode)->i_extra_isize >= new_extra_isize)
|
|
|
|
goto out;
|
2007-07-18 13:19:57 +00:00
|
|
|
|
|
|
|
header = IHDR(inode, raw_inode);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if enough free space is available in the inode to shift the
|
|
|
|
* entries ahead by new_extra_isize.
|
|
|
|
*/
|
|
|
|
|
2016-08-29 19:43:11 +00:00
|
|
|
base = IFIRST(header);
|
2007-07-18 13:19:57 +00:00
|
|
|
end = (void *)raw_inode + EXT4_SB(inode->i_sb)->s_inode_size;
|
|
|
|
min_offs = end - base;
|
|
|
|
total_ino = sizeof(struct ext4_xattr_ibody_header);
|
|
|
|
|
2016-03-22 20:13:15 +00:00
|
|
|
error = xattr_check_inode(inode, header, end);
|
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
|
2016-08-29 19:43:11 +00:00
|
|
|
ifree = ext4_xattr_free_space(base, &min_offs, base, &total_ino);
|
2016-08-29 19:38:11 +00:00
|
|
|
if (ifree >= isize_diff)
|
|
|
|
goto shift;
|
2007-07-18 13:19:57 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Enough free space isn't available in the inode, check if
|
|
|
|
* EA block can hold new_extra_isize bytes.
|
|
|
|
*/
|
|
|
|
if (EXT4_I(inode)->i_file_acl) {
|
|
|
|
bh = sb_bread(inode->i_sb, EXT4_I(inode)->i_file_acl);
|
|
|
|
error = -EIO;
|
|
|
|
if (!bh)
|
|
|
|
goto cleanup;
|
2012-04-29 22:43:10 +00:00
|
|
|
if (ext4_xattr_check_block(inode, bh)) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2015-10-17 20:16:04 +00:00
|
|
|
error = -EFSCORRUPTED;
|
2007-07-18 13:19:57 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
base = BHDR(bh);
|
|
|
|
end = bh->b_data + bh->b_size;
|
|
|
|
min_offs = end - base;
|
2016-08-29 19:43:11 +00:00
|
|
|
bfree = ext4_xattr_free_space(BFIRST(bh), &min_offs, base,
|
|
|
|
NULL);
|
2016-08-29 19:38:11 +00:00
|
|
|
if (bfree + ifree < isize_diff) {
|
2007-07-18 13:19:57 +00:00
|
|
|
if (!tried_min_extra_isize && s_min_extra_isize) {
|
|
|
|
tried_min_extra_isize++;
|
|
|
|
new_extra_isize = s_min_extra_isize;
|
|
|
|
brelse(bh);
|
|
|
|
goto retry;
|
|
|
|
}
|
2016-08-29 19:44:11 +00:00
|
|
|
error = -ENOSPC;
|
2007-07-18 13:19:57 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
} else {
|
2016-08-29 19:38:11 +00:00
|
|
|
bfree = inode->i_sb->s_blocksize;
|
2007-07-18 13:19:57 +00:00
|
|
|
}
|
|
|
|
|
2016-08-29 19:44:11 +00:00
|
|
|
error = ext4_xattr_make_inode_space(handle, inode, raw_inode,
|
|
|
|
isize_diff, ifree, bfree,
|
|
|
|
&total_ino);
|
|
|
|
if (error) {
|
|
|
|
if (error == -ENOSPC && !tried_min_extra_isize &&
|
|
|
|
s_min_extra_isize) {
|
|
|
|
tried_min_extra_isize++;
|
|
|
|
new_extra_isize = s_min_extra_isize;
|
|
|
|
brelse(bh);
|
|
|
|
goto retry;
|
2007-07-18 13:19:57 +00:00
|
|
|
}
|
2016-08-29 19:44:11 +00:00
|
|
|
goto cleanup;
|
2007-07-18 13:19:57 +00:00
|
|
|
}
|
2016-08-29 19:38:11 +00:00
|
|
|
shift:
|
|
|
|
/* Adjust the offsets and shift the remaining entries ahead */
|
2016-08-29 19:43:11 +00:00
|
|
|
ext4_xattr_shift_entries(IFIRST(header), EXT4_I(inode)->i_extra_isize
|
2016-08-29 19:38:11 +00:00
|
|
|
- new_extra_isize, (void *)raw_inode +
|
|
|
|
EXT4_GOOD_OLD_INODE_SIZE + new_extra_isize,
|
2016-08-29 19:41:11 +00:00
|
|
|
(void *)header, total_ino);
|
2016-08-29 19:38:11 +00:00
|
|
|
EXT4_I(inode)->i_extra_isize = new_extra_isize;
|
2007-07-18 13:19:57 +00:00
|
|
|
brelse(bh);
|
2016-08-11 16:38:55 +00:00
|
|
|
out:
|
2017-01-12 02:50:46 +00:00
|
|
|
ext4_write_unlock_xattr(inode, &no_expand);
|
2007-07-18 13:19:57 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(bh);
|
2016-08-11 16:38:55 +00:00
|
|
|
/*
|
2017-01-12 02:50:46 +00:00
|
|
|
* Inode size expansion failed; don't try again
|
2016-08-11 16:38:55 +00:00
|
|
|
*/
|
2017-01-12 02:50:46 +00:00
|
|
|
no_expand = 1;
|
|
|
|
ext4_write_unlock_xattr(inode, &no_expand);
|
2007-07-18 13:19:57 +00:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
#define EIA_INCR 16 /* must be 2^n */
|
|
|
|
#define EIA_MASK (EIA_INCR - 1)
|
|
|
|
/* Add the large xattr @ino into @lea_ino_array for later deletion.
|
|
|
|
* If @lea_ino_array is new or full it will be grown and the old
|
|
|
|
* contents copied over.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ext4_expand_ino_array(struct ext4_xattr_ino_array **lea_ino_array, __u32 ino)
|
|
|
|
{
|
|
|
|
if (*lea_ino_array == NULL) {
|
|
|
|
/*
|
|
|
|
* Start with 15 inodes, so it fits into a power-of-two size.
|
|
|
|
* If *lea_ino_array is NULL, this is essentially offsetof()
|
|
|
|
*/
|
|
|
|
(*lea_ino_array) =
|
|
|
|
kmalloc(offsetof(struct ext4_xattr_ino_array,
|
|
|
|
xia_inodes[EIA_MASK]),
|
|
|
|
GFP_NOFS);
|
|
|
|
if (*lea_ino_array == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
(*lea_ino_array)->xia_count = 0;
|
|
|
|
} else if (((*lea_ino_array)->xia_count & EIA_MASK) == EIA_MASK) {
|
|
|
|
/* expand the array once all 15 + n * 16 slots are full */
|
|
|
|
struct ext4_xattr_ino_array *new_array = NULL;
|
|
|
|
int count = (*lea_ino_array)->xia_count;
|
|
|
|
|
|
|
|
/* if new_array is NULL, this is essentially offsetof() */
|
|
|
|
new_array = kmalloc(
|
|
|
|
offsetof(struct ext4_xattr_ino_array,
|
|
|
|
xia_inodes[count + EIA_INCR]),
|
|
|
|
GFP_NOFS);
|
|
|
|
if (new_array == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
memcpy(new_array, *lea_ino_array,
|
|
|
|
offsetof(struct ext4_xattr_ino_array,
|
|
|
|
xia_inodes[count]));
|
|
|
|
kfree(*lea_ino_array);
|
|
|
|
*lea_ino_array = new_array;
|
|
|
|
}
|
|
|
|
(*lea_ino_array)->xia_inodes[(*lea_ino_array)->xia_count++] = ino;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Add xattr inode to orphan list
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ext4_xattr_inode_orphan_add(handle_t *handle, struct inode *inode,
|
|
|
|
int credits, struct ext4_xattr_ino_array *lea_ino_array)
|
|
|
|
{
|
2017-06-22 01:49:53 +00:00
|
|
|
struct inode *ea_inode;
|
2017-06-22 01:10:32 +00:00
|
|
|
int idx = 0, error = 0;
|
|
|
|
|
|
|
|
if (lea_ino_array == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (; idx < lea_ino_array->xia_count; ++idx) {
|
|
|
|
if (!ext4_handle_has_enough_credits(handle, credits)) {
|
|
|
|
error = ext4_journal_extend(handle, credits);
|
|
|
|
if (error > 0)
|
|
|
|
error = ext4_journal_restart(handle, credits);
|
|
|
|
|
|
|
|
if (error != 0) {
|
|
|
|
ext4_warning(inode->i_sb,
|
|
|
|
"couldn't extend journal "
|
|
|
|
"(err %d)", error);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
}
|
2017-06-22 01:49:53 +00:00
|
|
|
error = ext4_xattr_inode_iget(inode,
|
|
|
|
lea_ino_array->xia_inodes[idx], &ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (error)
|
|
|
|
continue;
|
2017-06-22 01:19:16 +00:00
|
|
|
inode_lock(ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
ext4_orphan_add(handle, ea_inode);
|
2017-06-22 01:19:16 +00:00
|
|
|
inode_unlock(ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
/* the inode's i_count will be released by caller */
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2007-07-18 13:19:57 +00:00
|
|
|
|
2006-10-11 08:20:50 +00:00
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_delete_inode()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
2017-06-22 01:10:32 +00:00
|
|
|
* Free extended attribute resources associated with this inode. Traverse
|
|
|
|
* all entries and unlink any xattr inodes associated with this inode. This
|
2006-10-11 08:20:50 +00:00
|
|
|
* is called immediately before an inode is freed. We have exclusive
|
2017-06-22 01:10:32 +00:00
|
|
|
* access to the inode. If an orphan inode is deleted it will also delete any
|
|
|
|
* xattr block and all xattr inodes. They are checked by ext4_xattr_inode_iget()
|
|
|
|
* to ensure they belong to the parent inode and were not deleted already.
|
2006-10-11 08:20:50 +00:00
|
|
|
*/
|
2017-06-22 01:10:32 +00:00
|
|
|
int
|
|
|
|
ext4_xattr_delete_inode(handle_t *handle, struct inode *inode,
|
|
|
|
struct ext4_xattr_ino_array **lea_ino_array)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
|
|
|
struct buffer_head *bh = NULL;
|
2017-06-22 01:10:32 +00:00
|
|
|
struct ext4_xattr_ibody_header *header;
|
|
|
|
struct ext4_inode *raw_inode;
|
|
|
|
struct ext4_iloc iloc;
|
|
|
|
struct ext4_xattr_entry *entry;
|
2017-06-22 01:59:30 +00:00
|
|
|
unsigned int ea_ino;
|
2017-06-22 01:10:32 +00:00
|
|
|
int credits = 3, error = 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!ext4_test_inode_state(inode, EXT4_STATE_XATTR))
|
|
|
|
goto delete_external_ea;
|
|
|
|
|
|
|
|
error = ext4_get_inode_loc(inode, &iloc);
|
|
|
|
if (error)
|
|
|
|
goto cleanup;
|
|
|
|
raw_inode = ext4_raw_inode(&iloc);
|
|
|
|
header = IHDR(inode, raw_inode);
|
|
|
|
for (entry = IFIRST(header); !IS_LAST_ENTRY(entry);
|
|
|
|
entry = EXT4_XATTR_NEXT(entry)) {
|
|
|
|
if (!entry->e_value_inum)
|
|
|
|
continue;
|
2017-06-22 01:59:30 +00:00
|
|
|
ea_ino = le32_to_cpu(entry->e_value_inum);
|
|
|
|
if (ext4_expand_ino_array(lea_ino_array, ea_ino) != 0) {
|
2017-06-22 01:10:32 +00:00
|
|
|
brelse(iloc.bh);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
entry->e_value_inum = 0;
|
|
|
|
}
|
|
|
|
brelse(iloc.bh);
|
|
|
|
|
|
|
|
delete_external_ea:
|
|
|
|
if (!EXT4_I(inode)->i_file_acl) {
|
|
|
|
/* add xattr inode to orphan list */
|
|
|
|
ext4_xattr_inode_orphan_add(handle, inode, credits,
|
|
|
|
*lea_ino_array);
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
2017-06-22 01:10:32 +00:00
|
|
|
}
|
2006-10-11 08:20:53 +00:00
|
|
|
bh = sb_bread(inode->i_sb, EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (!bh) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "block %llu read error",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2006-10-11 08:20:53 +00:00
|
|
|
if (BHDR(bh)->h_magic != cpu_to_le32(EXT4_XATTR_MAGIC) ||
|
2006-10-11 08:20:50 +00:00
|
|
|
BHDR(bh)->h_blocks != cpu_to_le32(1)) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "bad block %llu",
|
|
|
|
EXT4_I(inode)->i_file_acl);
|
2006-10-11 08:20:50 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2017-06-22 01:10:32 +00:00
|
|
|
|
|
|
|
for (entry = BFIRST(bh); !IS_LAST_ENTRY(entry);
|
|
|
|
entry = EXT4_XATTR_NEXT(entry)) {
|
|
|
|
if (!entry->e_value_inum)
|
|
|
|
continue;
|
2017-06-22 01:59:30 +00:00
|
|
|
ea_ino = le32_to_cpu(entry->e_value_inum);
|
|
|
|
if (ext4_expand_ino_array(lea_ino_array, ea_ino) != 0)
|
2017-06-22 01:10:32 +00:00
|
|
|
goto cleanup;
|
|
|
|
entry->e_value_inum = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* add xattr inode to orphan list */
|
|
|
|
error = ext4_xattr_inode_orphan_add(handle, inode, credits,
|
|
|
|
*lea_ino_array);
|
|
|
|
if (error != 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (!IS_NOQUOTA(inode))
|
|
|
|
credits += 2 * EXT4_QUOTA_DEL_BLOCKS(inode->i_sb);
|
|
|
|
|
|
|
|
if (!ext4_handle_has_enough_credits(handle, credits)) {
|
|
|
|
error = ext4_journal_extend(handle, credits);
|
|
|
|
if (error > 0)
|
|
|
|
error = ext4_journal_restart(handle, credits);
|
|
|
|
if (error != 0) {
|
|
|
|
ext4_warning(inode->i_sb,
|
|
|
|
"couldn't extend journal (err %d)", error);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_release_block(handle, inode, bh);
|
|
|
|
EXT4_I(inode)->i_file_acl = 0;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
cleanup:
|
|
|
|
brelse(bh);
|
2017-06-22 01:10:32 +00:00
|
|
|
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ext4_xattr_inode_array_free(struct inode *inode,
|
|
|
|
struct ext4_xattr_ino_array *lea_ino_array)
|
|
|
|
{
|
2017-06-22 01:49:53 +00:00
|
|
|
struct inode *ea_inode;
|
2017-06-22 01:10:32 +00:00
|
|
|
int idx = 0;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (lea_ino_array == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (; idx < lea_ino_array->xia_count; ++idx) {
|
2017-06-22 01:49:53 +00:00
|
|
|
err = ext4_xattr_inode_iget(inode,
|
|
|
|
lea_ino_array->xia_inodes[idx], &ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
if (err)
|
|
|
|
continue;
|
|
|
|
/* for inode's i_count get from ext4_xattr_delete_inode */
|
2017-06-22 01:39:38 +00:00
|
|
|
iput(ea_inode);
|
2017-06-22 01:10:32 +00:00
|
|
|
clear_nlink(ea_inode);
|
|
|
|
iput(ea_inode);
|
|
|
|
}
|
|
|
|
kfree(lea_ino_array);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_cache_insert()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Create a new entry in the extended attribute cache, and insert
|
|
|
|
* it unless such an entry is already in the cache.
|
|
|
|
*
|
|
|
|
* Returns 0, or a negative error number on failure.
|
|
|
|
*/
|
|
|
|
static void
|
2016-02-23 03:35:22 +00:00
|
|
|
ext4_xattr_cache_insert(struct mb_cache *ext4_mb_cache, struct buffer_head *bh)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2016-02-23 03:44:04 +00:00
|
|
|
struct ext4_xattr_header *header = BHDR(bh);
|
|
|
|
__u32 hash = le32_to_cpu(header->h_hash);
|
|
|
|
int reusable = le32_to_cpu(header->h_refcount) <
|
|
|
|
EXT4_XATTR_REFCOUNT_MAX;
|
2006-10-11 08:20:50 +00:00
|
|
|
int error;
|
|
|
|
|
2016-02-23 03:35:22 +00:00
|
|
|
error = mb_cache_entry_create(ext4_mb_cache, GFP_NOFS, hash,
|
2016-02-23 03:44:04 +00:00
|
|
|
bh->b_blocknr, reusable);
|
2006-10-11 08:20:50 +00:00
|
|
|
if (error) {
|
2016-02-22 16:50:13 +00:00
|
|
|
if (error == -EBUSY)
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(bh, "already in cache");
|
2016-02-22 16:50:13 +00:00
|
|
|
} else
|
2006-10-11 08:20:50 +00:00
|
|
|
ea_bdebug(bh, "inserting [%x]", (int)hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_cmp()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Compare two extended attribute blocks for equality.
|
|
|
|
*
|
|
|
|
* Returns 0 if the blocks are equal, 1 if they differ, and
|
|
|
|
* a negative error number on errors.
|
|
|
|
*/
|
|
|
|
static int
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_cmp(struct ext4_xattr_header *header1,
|
|
|
|
struct ext4_xattr_header *header2)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_entry *entry1, *entry2;
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
entry1 = ENTRY(header1+1);
|
|
|
|
entry2 = ENTRY(header2+1);
|
|
|
|
while (!IS_LAST_ENTRY(entry1)) {
|
|
|
|
if (IS_LAST_ENTRY(entry2))
|
|
|
|
return 1;
|
|
|
|
if (entry1->e_hash != entry2->e_hash ||
|
|
|
|
entry1->e_name_index != entry2->e_name_index ||
|
|
|
|
entry1->e_name_len != entry2->e_name_len ||
|
|
|
|
entry1->e_value_size != entry2->e_value_size ||
|
2017-06-22 01:10:32 +00:00
|
|
|
entry1->e_value_inum != entry2->e_value_inum ||
|
2006-10-11 08:20:50 +00:00
|
|
|
memcmp(entry1->e_name, entry2->e_name, entry1->e_name_len))
|
|
|
|
return 1;
|
|
|
|
if (memcmp((char *)header1 + le16_to_cpu(entry1->e_value_offs),
|
|
|
|
(char *)header2 + le16_to_cpu(entry2->e_value_offs),
|
|
|
|
le32_to_cpu(entry1->e_value_size)))
|
|
|
|
return 1;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
entry1 = EXT4_XATTR_NEXT(entry1);
|
|
|
|
entry2 = EXT4_XATTR_NEXT(entry2);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
if (!IS_LAST_ENTRY(entry2))
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_cache_find()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Find an identical extended attribute block.
|
|
|
|
*
|
|
|
|
* Returns a pointer to the block found, or NULL if such a block was
|
|
|
|
* not found or an error occurred.
|
|
|
|
*/
|
|
|
|
static struct buffer_head *
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_cache_find(struct inode *inode, struct ext4_xattr_header *header,
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache_entry **pce)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
|
|
|
__u32 hash = le32_to_cpu(header->h_hash);
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache_entry *ce;
|
|
|
|
struct mb_cache *ext4_mb_cache = EXT4_GET_MB_CACHE(inode);
|
2006-10-11 08:20:50 +00:00
|
|
|
|
|
|
|
if (!header->h_hash)
|
|
|
|
return NULL; /* never share */
|
|
|
|
ea_idebug(inode, "looking for cached blocks [%x]", (int)hash);
|
2016-02-23 03:35:22 +00:00
|
|
|
ce = mb_cache_entry_find_first(ext4_mb_cache, hash);
|
2006-10-11 08:20:50 +00:00
|
|
|
while (ce) {
|
|
|
|
struct buffer_head *bh;
|
|
|
|
|
|
|
|
bh = sb_bread(inode->i_sb, ce->e_block);
|
|
|
|
if (!bh) {
|
2010-05-17 01:00:00 +00:00
|
|
|
EXT4_ERROR_INODE(inode, "block %lu read error",
|
|
|
|
(unsigned long) ce->e_block);
|
2006-10-11 08:20:53 +00:00
|
|
|
} else if (ext4_xattr_cmp(header, BHDR(bh)) == 0) {
|
2006-10-11 08:20:50 +00:00
|
|
|
*pce = ce;
|
|
|
|
return bh;
|
|
|
|
}
|
|
|
|
brelse(bh);
|
2016-02-23 03:35:22 +00:00
|
|
|
ce = mb_cache_entry_find_next(ext4_mb_cache, ce);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NAME_HASH_SHIFT 5
|
|
|
|
#define VALUE_HASH_SHIFT 16
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_hash_entry()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Compute the hash of an extended attribute.
|
|
|
|
*/
|
2006-10-11 08:20:53 +00:00
|
|
|
static inline void ext4_xattr_hash_entry(struct ext4_xattr_header *header,
|
|
|
|
struct ext4_xattr_entry *entry)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
|
|
|
__u32 hash = 0;
|
|
|
|
char *name = entry->e_name;
|
|
|
|
int n;
|
|
|
|
|
2008-07-26 20:15:44 +00:00
|
|
|
for (n = 0; n < entry->e_name_len; n++) {
|
2006-10-11 08:20:50 +00:00
|
|
|
hash = (hash << NAME_HASH_SHIFT) ^
|
|
|
|
(hash >> (8*sizeof(hash) - NAME_HASH_SHIFT)) ^
|
|
|
|
*name++;
|
|
|
|
}
|
|
|
|
|
2017-06-22 01:10:32 +00:00
|
|
|
if (!entry->e_value_inum && entry->e_value_size) {
|
2006-10-11 08:20:50 +00:00
|
|
|
__le32 *value = (__le32 *)((char *)header +
|
|
|
|
le16_to_cpu(entry->e_value_offs));
|
|
|
|
for (n = (le32_to_cpu(entry->e_value_size) +
|
2006-10-11 08:20:53 +00:00
|
|
|
EXT4_XATTR_ROUND) >> EXT4_XATTR_PAD_BITS; n; n--) {
|
2006-10-11 08:20:50 +00:00
|
|
|
hash = (hash << VALUE_HASH_SHIFT) ^
|
|
|
|
(hash >> (8*sizeof(hash) - VALUE_HASH_SHIFT)) ^
|
|
|
|
le32_to_cpu(*value++);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
entry->e_hash = cpu_to_le32(hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef NAME_HASH_SHIFT
|
|
|
|
#undef VALUE_HASH_SHIFT
|
|
|
|
|
|
|
|
#define BLOCK_HASH_SHIFT 16
|
|
|
|
|
|
|
|
/*
|
2006-10-11 08:20:53 +00:00
|
|
|
* ext4_xattr_rehash()
|
2006-10-11 08:20:50 +00:00
|
|
|
*
|
|
|
|
* Re-compute the extended attribute hash value after an entry has changed.
|
|
|
|
*/
|
2006-10-11 08:20:53 +00:00
|
|
|
static void ext4_xattr_rehash(struct ext4_xattr_header *header,
|
|
|
|
struct ext4_xattr_entry *entry)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2006-10-11 08:20:53 +00:00
|
|
|
struct ext4_xattr_entry *here;
|
2006-10-11 08:20:50 +00:00
|
|
|
__u32 hash = 0;
|
|
|
|
|
2006-10-11 08:20:53 +00:00
|
|
|
ext4_xattr_hash_entry(header, entry);
|
2006-10-11 08:20:50 +00:00
|
|
|
here = ENTRY(header+1);
|
|
|
|
while (!IS_LAST_ENTRY(here)) {
|
|
|
|
if (!here->e_hash) {
|
|
|
|
/* Block is not shared if an entry's hash value == 0 */
|
|
|
|
hash = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
hash = (hash << BLOCK_HASH_SHIFT) ^
|
|
|
|
(hash >> (8*sizeof(hash) - BLOCK_HASH_SHIFT)) ^
|
|
|
|
le32_to_cpu(here->e_hash);
|
2006-10-11 08:20:53 +00:00
|
|
|
here = EXT4_XATTR_NEXT(here);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
header->h_hash = cpu_to_le32(hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef BLOCK_HASH_SHIFT
|
|
|
|
|
2014-03-18 23:24:49 +00:00
|
|
|
#define HASH_BUCKET_BITS 10
|
|
|
|
|
2016-02-23 03:35:22 +00:00
|
|
|
struct mb_cache *
|
2016-02-22 16:50:13 +00:00
|
|
|
ext4_xattr_create_cache(void)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2016-02-23 03:35:22 +00:00
|
|
|
return mb_cache_create(HASH_BUCKET_BITS);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
|
|
|
|
2016-02-23 03:35:22 +00:00
|
|
|
void ext4_xattr_destroy_cache(struct mb_cache *cache)
|
2006-10-11 08:20:50 +00:00
|
|
|
{
|
2014-03-18 23:24:49 +00:00
|
|
|
if (cache)
|
2016-02-23 03:35:22 +00:00
|
|
|
mb_cache_destroy(cache);
|
2006-10-11 08:20:50 +00:00
|
|
|
}
|
2014-03-18 23:24:49 +00:00
|
|
|
|