diff options
-rw-r--r-- | fs/Kconfig | 38 | ||||
-rw-r--r-- | fs/jffs2/Makefile | 3 | ||||
-rw-r--r-- | fs/jffs2/acl.c | 483 | ||||
-rw-r--r-- | fs/jffs2/acl.h | 46 | ||||
-rw-r--r-- | fs/jffs2/build.c | 2 | ||||
-rw-r--r-- | fs/jffs2/debug.h | 6 | ||||
-rw-r--r-- | fs/jffs2/dir.c | 62 | ||||
-rw-r--r-- | fs/jffs2/file.c | 7 | ||||
-rw-r--r-- | fs/jffs2/fs.c | 11 | ||||
-rw-r--r-- | fs/jffs2/gc.c | 16 | ||||
-rw-r--r-- | fs/jffs2/jffs2_fs_i.h | 5 | ||||
-rw-r--r-- | fs/jffs2/jffs2_fs_sb.h | 10 | ||||
-rw-r--r-- | fs/jffs2/malloc.c | 68 | ||||
-rw-r--r-- | fs/jffs2/nodelist.c | 1 | ||||
-rw-r--r-- | fs/jffs2/nodelist.h | 21 | ||||
-rw-r--r-- | fs/jffs2/os-linux.h | 4 | ||||
-rw-r--r-- | fs/jffs2/readinode.c | 1 | ||||
-rw-r--r-- | fs/jffs2/scan.c | 168 | ||||
-rw-r--r-- | fs/jffs2/security.c | 82 | ||||
-rw-r--r-- | fs/jffs2/summary.c | 191 | ||||
-rw-r--r-- | fs/jffs2/summary.h | 42 | ||||
-rw-r--r-- | fs/jffs2/super.c | 6 | ||||
-rw-r--r-- | fs/jffs2/symlink.c | 7 | ||||
-rw-r--r-- | fs/jffs2/write.c | 2 | ||||
-rw-r--r-- | fs/jffs2/xattr.c | 1271 | ||||
-rw-r--r-- | fs/jffs2/xattr.h | 120 | ||||
-rw-r--r-- | fs/jffs2/xattr_trusted.c | 51 | ||||
-rw-r--r-- | fs/jffs2/xattr_user.c | 51 | ||||
-rw-r--r-- | include/linux/jffs2.h | 40 |
29 files changed, 2800 insertions, 15 deletions
diff --git a/fs/Kconfig b/fs/Kconfig index f9b5842c8d2d..2496ccbe2604 100644 --- a/fs/Kconfig +++ b/fs/Kconfig | |||
@@ -1075,6 +1075,44 @@ config JFFS2_FS_DEBUG | |||
1075 | If reporting bugs, please try to have available a full dump of the | 1075 | If reporting bugs, please try to have available a full dump of the |
1076 | messages at debug level 1 while the misbehaviour was occurring. | 1076 | messages at debug level 1 while the misbehaviour was occurring. |
1077 | 1077 | ||
1078 | config JFFS2_FS_XATTR | ||
1079 | bool "JFFS2 XATTR support" | ||
1080 | depends on JFFS2_FS | ||
1081 | default n | ||
1082 | help | ||
1083 | Extended attributes are name:value pairs associated with inodes by | ||
1084 | the kernel or by users (see the attr(5) manual page, or visit | ||
1085 | <http://acl.bestbits.at/> for details). | ||
1086 | |||
1087 | If unsure, say N. | ||
1088 | |||
1089 | config JFFS2_FS_POSIX_ACL | ||
1090 | bool "JFFS2 POSIX Access Control Lists" | ||
1091 | depends on JFFS2_FS_XATTR | ||
1092 | default y | ||
1093 | select FS_POSIX_ACL | ||
1094 | help | ||
1095 | Posix Access Control Lists (ACLs) support permissions for users and | ||
1096 | groups beyond the owner/group/world scheme. | ||
1097 | |||
1098 | To learn more about Access Control Lists, visit the Posix ACLs for | ||
1099 | Linux website <http://acl.bestbits.at/>. | ||
1100 | |||
1101 | If you don't know what Access Control Lists are, say N | ||
1102 | |||
1103 | config JFFS2_FS_SECURITY | ||
1104 | bool "JFFS2 Security Labels" | ||
1105 | depends on JFFS2_FS_XATTR | ||
1106 | default y | ||
1107 | help | ||
1108 | Security labels support alternative access control models | ||
1109 | implemented by security modules like SELinux. This option | ||
1110 | enables an extended attribute handler for file security | ||
1111 | labels in the jffs2 filesystem. | ||
1112 | |||
1113 | If you are not using a security module that requires using | ||
1114 | extended attributes for file security labels, say N. | ||
1115 | |||
1078 | config JFFS2_FS_WRITEBUFFER | 1116 | config JFFS2_FS_WRITEBUFFER |
1079 | bool "JFFS2 write-buffering support" | 1117 | bool "JFFS2 write-buffering support" |
1080 | depends on JFFS2_FS | 1118 | depends on JFFS2_FS |
diff --git a/fs/jffs2/Makefile b/fs/jffs2/Makefile index 77dc5561a04e..7f28ee0bd132 100644 --- a/fs/jffs2/Makefile +++ b/fs/jffs2/Makefile | |||
@@ -12,6 +12,9 @@ jffs2-y += symlink.o build.o erase.o background.o fs.o writev.o | |||
12 | jffs2-y += super.o debug.o | 12 | jffs2-y += super.o debug.o |
13 | 13 | ||
14 | jffs2-$(CONFIG_JFFS2_FS_WRITEBUFFER) += wbuf.o | 14 | jffs2-$(CONFIG_JFFS2_FS_WRITEBUFFER) += wbuf.o |
15 | jffs2-$(CONFIG_JFFS2_FS_XATTR) += xattr.o xattr_trusted.o xattr_user.o | ||
16 | jffs2-$(CONFIG_JFFS2_FS_SECURITY) += security.o | ||
17 | jffs2-$(CONFIG_JFFS2_FS_POSIX_ACL) += acl.o | ||
15 | jffs2-$(CONFIG_JFFS2_RUBIN) += compr_rubin.o | 18 | jffs2-$(CONFIG_JFFS2_RUBIN) += compr_rubin.o |
16 | jffs2-$(CONFIG_JFFS2_RTIME) += compr_rtime.o | 19 | jffs2-$(CONFIG_JFFS2_RTIME) += compr_rtime.o |
17 | jffs2-$(CONFIG_JFFS2_ZLIB) += compr_zlib.o | 20 | jffs2-$(CONFIG_JFFS2_ZLIB) += compr_zlib.o |
diff --git a/fs/jffs2/acl.c b/fs/jffs2/acl.c new file mode 100644 index 000000000000..080bb51e4b65 --- /dev/null +++ b/fs/jffs2/acl.c | |||
@@ -0,0 +1,483 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/acl.c | ||
3 | * POSIX ACL support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | #include <linux/kernel.h> | ||
11 | #include <linux/slab.h> | ||
12 | #include <linux/fs.h> | ||
13 | #include <linux/time.h> | ||
14 | #include <linux/crc32.h> | ||
15 | #include <linux/jffs2.h> | ||
16 | #include <linux/xattr.h> | ||
17 | #include <linux/posix_acl_xattr.h> | ||
18 | #include <linux/mtd/mtd.h> | ||
19 | #include "nodelist.h" | ||
20 | |||
21 | static size_t jffs2_acl_size(int count) | ||
22 | { | ||
23 | if (count <= 4) { | ||
24 | return sizeof(jffs2_acl_header) | ||
25 | + count * sizeof(jffs2_acl_entry_short); | ||
26 | } else { | ||
27 | return sizeof(jffs2_acl_header) | ||
28 | + 4 * sizeof(jffs2_acl_entry_short) | ||
29 | + (count - 4) * sizeof(jffs2_acl_entry); | ||
30 | } | ||
31 | } | ||
32 | |||
33 | static int jffs2_acl_count(size_t size) | ||
34 | { | ||
35 | size_t s; | ||
36 | |||
37 | size -= sizeof(jffs2_acl_header); | ||
38 | s = size - 4 * sizeof(jffs2_acl_entry_short); | ||
39 | if (s < 0) { | ||
40 | if (size % sizeof(jffs2_acl_entry_short)) | ||
41 | return -1; | ||
42 | return size / sizeof(jffs2_acl_entry_short); | ||
43 | } else { | ||
44 | if (s % sizeof(jffs2_acl_entry)) | ||
45 | return -1; | ||
46 | return s / sizeof(jffs2_acl_entry) + 4; | ||
47 | } | ||
48 | } | ||
49 | |||
50 | static struct posix_acl *jffs2_acl_from_medium(const void *value, size_t size) | ||
51 | { | ||
52 | const char *end = (char *)value + size; | ||
53 | struct posix_acl *acl; | ||
54 | uint32_t ver; | ||
55 | int i, count; | ||
56 | |||
57 | if (!value) | ||
58 | return NULL; | ||
59 | if (size < sizeof(jffs2_acl_header)) | ||
60 | return ERR_PTR(-EINVAL); | ||
61 | ver = je32_to_cpu(((jffs2_acl_header *)value)->a_version); | ||
62 | if (ver != JFFS2_ACL_VERSION) { | ||
63 | JFFS2_WARNING("Invalid ACL version. (=%u)\n", ver); | ||
64 | return ERR_PTR(-EINVAL); | ||
65 | } | ||
66 | |||
67 | value = (char *)value + sizeof(jffs2_acl_header); | ||
68 | count = jffs2_acl_count(size); | ||
69 | if (count < 0) | ||
70 | return ERR_PTR(-EINVAL); | ||
71 | if (count == 0) | ||
72 | return NULL; | ||
73 | |||
74 | acl = posix_acl_alloc(count, GFP_KERNEL); | ||
75 | if (!acl) | ||
76 | return ERR_PTR(-ENOMEM); | ||
77 | |||
78 | for (i=0; i < count; i++) { | ||
79 | jffs2_acl_entry *entry = (jffs2_acl_entry *)value; | ||
80 | if ((char *)value + sizeof(jffs2_acl_entry_short) > end) | ||
81 | goto fail; | ||
82 | acl->a_entries[i].e_tag = je16_to_cpu(entry->e_tag); | ||
83 | acl->a_entries[i].e_perm = je16_to_cpu(entry->e_perm); | ||
84 | switch (acl->a_entries[i].e_tag) { | ||
85 | case ACL_USER_OBJ: | ||
86 | case ACL_GROUP_OBJ: | ||
87 | case ACL_MASK: | ||
88 | case ACL_OTHER: | ||
89 | value = (char *)value + sizeof(jffs2_acl_entry_short); | ||
90 | acl->a_entries[i].e_id = ACL_UNDEFINED_ID; | ||
91 | break; | ||
92 | |||
93 | case ACL_USER: | ||
94 | case ACL_GROUP: | ||
95 | value = (char *)value + sizeof(jffs2_acl_entry); | ||
96 | if ((char *)value > end) | ||
97 | goto fail; | ||
98 | acl->a_entries[i].e_id = je32_to_cpu(entry->e_id); | ||
99 | break; | ||
100 | |||
101 | default: | ||
102 | goto fail; | ||
103 | } | ||
104 | } | ||
105 | if (value != end) | ||
106 | goto fail; | ||
107 | return acl; | ||
108 | fail: | ||
109 | posix_acl_release(acl); | ||
110 | return ERR_PTR(-EINVAL); | ||
111 | } | ||
112 | |||
113 | static void *jffs2_acl_to_medium(const struct posix_acl *acl, size_t *size) | ||
114 | { | ||
115 | jffs2_acl_header *jffs2_acl; | ||
116 | char *e; | ||
117 | size_t i; | ||
118 | |||
119 | *size = jffs2_acl_size(acl->a_count); | ||
120 | jffs2_acl = (jffs2_acl_header *)kmalloc(sizeof(jffs2_acl_header) | ||
121 | + acl->a_count * sizeof(jffs2_acl_entry), | ||
122 | GFP_KERNEL); | ||
123 | if (!jffs2_acl) | ||
124 | return ERR_PTR(-ENOMEM); | ||
125 | jffs2_acl->a_version = cpu_to_je32(JFFS2_ACL_VERSION); | ||
126 | e = (char *)jffs2_acl + sizeof(jffs2_acl_header); | ||
127 | for (i=0; i < acl->a_count; i++) { | ||
128 | jffs2_acl_entry *entry = (jffs2_acl_entry *)e; | ||
129 | entry->e_tag = cpu_to_je16(acl->a_entries[i].e_tag); | ||
130 | entry->e_perm = cpu_to_je16(acl->a_entries[i].e_perm); | ||
131 | switch(acl->a_entries[i].e_tag) { | ||
132 | case ACL_USER: | ||
133 | case ACL_GROUP: | ||
134 | entry->e_id = cpu_to_je32(acl->a_entries[i].e_id); | ||
135 | e += sizeof(jffs2_acl_entry); | ||
136 | break; | ||
137 | |||
138 | case ACL_USER_OBJ: | ||
139 | case ACL_GROUP_OBJ: | ||
140 | case ACL_MASK: | ||
141 | case ACL_OTHER: | ||
142 | e += sizeof(jffs2_acl_entry_short); | ||
143 | break; | ||
144 | |||
145 | default: | ||
146 | goto fail; | ||
147 | } | ||
148 | } | ||
149 | return (char *)jffs2_acl; | ||
150 | fail: | ||
151 | kfree(jffs2_acl); | ||
152 | return ERR_PTR(-EINVAL); | ||
153 | } | ||
154 | |||
155 | static struct posix_acl *jffs2_iget_acl(struct inode *inode, struct posix_acl **i_acl) | ||
156 | { | ||
157 | struct posix_acl *acl = JFFS2_ACL_NOT_CACHED; | ||
158 | |||
159 | spin_lock(&inode->i_lock); | ||
160 | if (*i_acl != JFFS2_ACL_NOT_CACHED) | ||
161 | acl = posix_acl_dup(*i_acl); | ||
162 | spin_unlock(&inode->i_lock); | ||
163 | return acl; | ||
164 | } | ||
165 | |||
166 | static void jffs2_iset_acl(struct inode *inode, struct posix_acl **i_acl, struct posix_acl *acl) | ||
167 | { | ||
168 | spin_lock(&inode->i_lock); | ||
169 | if (*i_acl != JFFS2_ACL_NOT_CACHED) | ||
170 | posix_acl_release(*i_acl); | ||
171 | *i_acl = posix_acl_dup(acl); | ||
172 | spin_unlock(&inode->i_lock); | ||
173 | } | ||
174 | |||
175 | static struct posix_acl *jffs2_get_acl(struct inode *inode, int type) | ||
176 | { | ||
177 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
178 | struct posix_acl *acl; | ||
179 | char *value = NULL; | ||
180 | int rc, xprefix; | ||
181 | |||
182 | switch (type) { | ||
183 | case ACL_TYPE_ACCESS: | ||
184 | acl = jffs2_iget_acl(inode, &f->i_acl_access); | ||
185 | if (acl != JFFS2_ACL_NOT_CACHED) | ||
186 | return acl; | ||
187 | xprefix = JFFS2_XPREFIX_ACL_ACCESS; | ||
188 | break; | ||
189 | case ACL_TYPE_DEFAULT: | ||
190 | acl = jffs2_iget_acl(inode, &f->i_acl_default); | ||
191 | if (acl != JFFS2_ACL_NOT_CACHED) | ||
192 | return acl; | ||
193 | xprefix = JFFS2_XPREFIX_ACL_DEFAULT; | ||
194 | break; | ||
195 | default: | ||
196 | return ERR_PTR(-EINVAL); | ||
197 | } | ||
198 | rc = do_jffs2_getxattr(inode, xprefix, "", NULL, 0); | ||
199 | if (rc > 0) { | ||
200 | value = kmalloc(rc, GFP_KERNEL); | ||
201 | if (!value) | ||
202 | return ERR_PTR(-ENOMEM); | ||
203 | rc = do_jffs2_getxattr(inode, xprefix, "", value, rc); | ||
204 | } | ||
205 | if (rc > 0) { | ||
206 | acl = jffs2_acl_from_medium(value, rc); | ||
207 | } else if (rc == -ENODATA || rc == -ENOSYS) { | ||
208 | acl = NULL; | ||
209 | } else { | ||
210 | acl = ERR_PTR(rc); | ||
211 | } | ||
212 | if (value) | ||
213 | kfree(value); | ||
214 | if (!IS_ERR(acl)) { | ||
215 | switch (type) { | ||
216 | case ACL_TYPE_ACCESS: | ||
217 | jffs2_iset_acl(inode, &f->i_acl_access, acl); | ||
218 | break; | ||
219 | case ACL_TYPE_DEFAULT: | ||
220 | jffs2_iset_acl(inode, &f->i_acl_default, acl); | ||
221 | break; | ||
222 | } | ||
223 | } | ||
224 | return acl; | ||
225 | } | ||
226 | |||
227 | static int jffs2_set_acl(struct inode *inode, int type, struct posix_acl *acl) | ||
228 | { | ||
229 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
230 | size_t size = 0; | ||
231 | char *value = NULL; | ||
232 | int rc, xprefix; | ||
233 | |||
234 | if (S_ISLNK(inode->i_mode)) | ||
235 | return -EOPNOTSUPP; | ||
236 | |||
237 | switch (type) { | ||
238 | case ACL_TYPE_ACCESS: | ||
239 | xprefix = JFFS2_XPREFIX_ACL_ACCESS; | ||
240 | if (acl) { | ||
241 | mode_t mode = inode->i_mode; | ||
242 | rc = posix_acl_equiv_mode(acl, &mode); | ||
243 | if (rc < 0) | ||
244 | return rc; | ||
245 | if (inode->i_mode != mode) { | ||
246 | inode->i_mode = mode; | ||
247 | jffs2_dirty_inode(inode); | ||
248 | } | ||
249 | if (rc == 0) | ||
250 | acl = NULL; | ||
251 | } | ||
252 | break; | ||
253 | case ACL_TYPE_DEFAULT: | ||
254 | xprefix = JFFS2_XPREFIX_ACL_DEFAULT; | ||
255 | if (!S_ISDIR(inode->i_mode)) | ||
256 | return acl ? -EACCES : 0; | ||
257 | break; | ||
258 | default: | ||
259 | return -EINVAL; | ||
260 | } | ||
261 | if (acl) { | ||
262 | value = jffs2_acl_to_medium(acl, &size); | ||
263 | if (IS_ERR(value)) | ||
264 | return PTR_ERR(value); | ||
265 | } | ||
266 | |||
267 | rc = do_jffs2_setxattr(inode, xprefix, "", value, size, 0); | ||
268 | if (value) | ||
269 | kfree(value); | ||
270 | if (!rc) { | ||
271 | switch(type) { | ||
272 | case ACL_TYPE_ACCESS: | ||
273 | jffs2_iset_acl(inode, &f->i_acl_access, acl); | ||
274 | break; | ||
275 | case ACL_TYPE_DEFAULT: | ||
276 | jffs2_iset_acl(inode, &f->i_acl_default, acl); | ||
277 | break; | ||
278 | } | ||
279 | } | ||
280 | return rc; | ||
281 | } | ||
282 | |||
283 | static int jffs2_check_acl(struct inode *inode, int mask) | ||
284 | { | ||
285 | struct posix_acl *acl; | ||
286 | int rc; | ||
287 | |||
288 | acl = jffs2_get_acl(inode, ACL_TYPE_ACCESS); | ||
289 | if (IS_ERR(acl)) | ||
290 | return PTR_ERR(acl); | ||
291 | if (acl) { | ||
292 | rc = posix_acl_permission(inode, acl, mask); | ||
293 | posix_acl_release(acl); | ||
294 | return rc; | ||
295 | } | ||
296 | return -EAGAIN; | ||
297 | } | ||
298 | |||
299 | int jffs2_permission(struct inode *inode, int mask, struct nameidata *nd) | ||
300 | { | ||
301 | return generic_permission(inode, mask, jffs2_check_acl); | ||
302 | } | ||
303 | |||
304 | int jffs2_init_acl(struct inode *inode, struct inode *dir) | ||
305 | { | ||
306 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
307 | struct posix_acl *acl = NULL, *clone; | ||
308 | mode_t mode; | ||
309 | int rc = 0; | ||
310 | |||
311 | f->i_acl_access = JFFS2_ACL_NOT_CACHED; | ||
312 | f->i_acl_default = JFFS2_ACL_NOT_CACHED; | ||
313 | if (!S_ISLNK(inode->i_mode)) { | ||
314 | acl = jffs2_get_acl(dir, ACL_TYPE_DEFAULT); | ||
315 | if (IS_ERR(acl)) | ||
316 | return PTR_ERR(acl); | ||
317 | if (!acl) | ||
318 | inode->i_mode &= ~current->fs->umask; | ||
319 | } | ||
320 | if (acl) { | ||
321 | if (S_ISDIR(inode->i_mode)) { | ||
322 | rc = jffs2_set_acl(inode, ACL_TYPE_DEFAULT, acl); | ||
323 | if (rc) | ||
324 | goto cleanup; | ||
325 | } | ||
326 | clone = posix_acl_clone(acl, GFP_KERNEL); | ||
327 | rc = -ENOMEM; | ||
328 | if (!clone) | ||
329 | goto cleanup; | ||
330 | mode = inode->i_mode; | ||
331 | rc = posix_acl_create_masq(clone, &mode); | ||
332 | if (rc >= 0) { | ||
333 | inode->i_mode = mode; | ||
334 | if (rc > 0) | ||
335 | rc = jffs2_set_acl(inode, ACL_TYPE_ACCESS, clone); | ||
336 | } | ||
337 | posix_acl_release(clone); | ||
338 | } | ||
339 | cleanup: | ||
340 | posix_acl_release(acl); | ||
341 | return rc; | ||
342 | } | ||
343 | |||
344 | void jffs2_clear_acl(struct inode *inode) | ||
345 | { | ||
346 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
347 | |||
348 | if (f->i_acl_access && f->i_acl_access != JFFS2_ACL_NOT_CACHED) { | ||
349 | posix_acl_release(f->i_acl_access); | ||
350 | f->i_acl_access = JFFS2_ACL_NOT_CACHED; | ||
351 | } | ||
352 | if (f->i_acl_default && f->i_acl_default != JFFS2_ACL_NOT_CACHED) { | ||
353 | posix_acl_release(f->i_acl_default); | ||
354 | f->i_acl_default = JFFS2_ACL_NOT_CACHED; | ||
355 | } | ||
356 | } | ||
357 | |||
358 | int jffs2_acl_chmod(struct inode *inode) | ||
359 | { | ||
360 | struct posix_acl *acl, *clone; | ||
361 | int rc; | ||
362 | |||
363 | if (S_ISLNK(inode->i_mode)) | ||
364 | return -EOPNOTSUPP; | ||
365 | acl = jffs2_get_acl(inode, ACL_TYPE_ACCESS); | ||
366 | if (IS_ERR(acl) || !acl) | ||
367 | return PTR_ERR(acl); | ||
368 | clone = posix_acl_clone(acl, GFP_KERNEL); | ||
369 | posix_acl_release(acl); | ||
370 | if (!clone) | ||
371 | return -ENOMEM; | ||
372 | rc = posix_acl_chmod_masq(clone, inode->i_mode); | ||
373 | if (!rc) | ||
374 | rc = jffs2_set_acl(inode, ACL_TYPE_ACCESS, clone); | ||
375 | posix_acl_release(clone); | ||
376 | return rc; | ||
377 | } | ||
378 | |||
379 | static size_t jffs2_acl_access_listxattr(struct inode *inode, char *list, size_t list_size, | ||
380 | const char *name, size_t name_len) | ||
381 | { | ||
382 | const int retlen = sizeof(POSIX_ACL_XATTR_ACCESS); | ||
383 | |||
384 | if (list && retlen <= list_size) | ||
385 | strcpy(list, POSIX_ACL_XATTR_ACCESS); | ||
386 | return retlen; | ||
387 | } | ||
388 | |||
389 | static size_t jffs2_acl_default_listxattr(struct inode *inode, char *list, size_t list_size, | ||
390 | const char *name, size_t name_len) | ||
391 | { | ||
392 | const int retlen = sizeof(POSIX_ACL_XATTR_DEFAULT); | ||
393 | |||
394 | if (list && retlen <= list_size) | ||
395 | strcpy(list, POSIX_ACL_XATTR_DEFAULT); | ||
396 | return retlen; | ||
397 | } | ||
398 | |||
399 | static int jffs2_acl_getxattr(struct inode *inode, int type, void *buffer, size_t size) | ||
400 | { | ||
401 | struct posix_acl *acl; | ||
402 | int rc; | ||
403 | |||
404 | acl = jffs2_get_acl(inode, type); | ||
405 | if (IS_ERR(acl)) | ||
406 | return PTR_ERR(acl); | ||
407 | if (!acl) | ||
408 | return -ENODATA; | ||
409 | rc = posix_acl_to_xattr(acl, buffer, size); | ||
410 | posix_acl_release(acl); | ||
411 | |||
412 | return rc; | ||
413 | } | ||
414 | |||
415 | static int jffs2_acl_access_getxattr(struct inode *inode, const char *name, void *buffer, size_t size) | ||
416 | { | ||
417 | if (name[0] != '\0') | ||
418 | return -EINVAL; | ||
419 | return jffs2_acl_getxattr(inode, ACL_TYPE_ACCESS, buffer, size); | ||
420 | } | ||
421 | |||
422 | static int jffs2_acl_default_getxattr(struct inode *inode, const char *name, void *buffer, size_t size) | ||
423 | { | ||
424 | if (name[0] != '\0') | ||
425 | return -EINVAL; | ||
426 | return jffs2_acl_getxattr(inode, ACL_TYPE_DEFAULT, buffer, size); | ||
427 | } | ||
428 | |||
429 | static int jffs2_acl_setxattr(struct inode *inode, int type, const void *value, size_t size) | ||
430 | { | ||
431 | struct posix_acl *acl; | ||
432 | int rc; | ||
433 | |||
434 | if ((current->fsuid != inode->i_uid) && !capable(CAP_FOWNER)) | ||
435 | return -EPERM; | ||
436 | |||
437 | if (value) { | ||
438 | acl = posix_acl_from_xattr(value, size); | ||
439 | if (IS_ERR(acl)) | ||
440 | return PTR_ERR(acl); | ||
441 | if (acl) { | ||
442 | rc = posix_acl_valid(acl); | ||
443 | if (rc) | ||
444 | goto out; | ||
445 | } | ||
446 | } else { | ||
447 | acl = NULL; | ||
448 | } | ||
449 | rc = jffs2_set_acl(inode, type, acl); | ||
450 | out: | ||
451 | posix_acl_release(acl); | ||
452 | return rc; | ||
453 | } | ||
454 | |||
455 | static int jffs2_acl_access_setxattr(struct inode *inode, const char *name, | ||
456 | const void *buffer, size_t size, int flags) | ||
457 | { | ||
458 | if (name[0] != '\0') | ||
459 | return -EINVAL; | ||
460 | return jffs2_acl_setxattr(inode, ACL_TYPE_ACCESS, buffer, size); | ||
461 | } | ||
462 | |||
463 | static int jffs2_acl_default_setxattr(struct inode *inode, const char *name, | ||
464 | const void *buffer, size_t size, int flags) | ||
465 | { | ||
466 | if (name[0] != '\0') | ||
467 | return -EINVAL; | ||
468 | return jffs2_acl_setxattr(inode, ACL_TYPE_DEFAULT, buffer, size); | ||
469 | } | ||
470 | |||
471 | struct xattr_handler jffs2_acl_access_xattr_handler = { | ||
472 | .prefix = POSIX_ACL_XATTR_ACCESS, | ||
473 | .list = jffs2_acl_access_listxattr, | ||
474 | .get = jffs2_acl_access_getxattr, | ||
475 | .set = jffs2_acl_access_setxattr, | ||
476 | }; | ||
477 | |||
478 | struct xattr_handler jffs2_acl_default_xattr_handler = { | ||
479 | .prefix = POSIX_ACL_XATTR_DEFAULT, | ||
480 | .list = jffs2_acl_default_listxattr, | ||
481 | .get = jffs2_acl_default_getxattr, | ||
482 | .set = jffs2_acl_default_setxattr, | ||
483 | }; | ||
diff --git a/fs/jffs2/acl.h b/fs/jffs2/acl.h new file mode 100644 index 000000000000..c98610b4e81c --- /dev/null +++ b/fs/jffs2/acl.h | |||
@@ -0,0 +1,46 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/acl.h | ||
3 | * POSIX ACL support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | typedef struct { | ||
11 | jint16_t e_tag; | ||
12 | jint16_t e_perm; | ||
13 | jint32_t e_id; | ||
14 | } jffs2_acl_entry; | ||
15 | |||
16 | typedef struct { | ||
17 | jint16_t e_tag; | ||
18 | jint16_t e_perm; | ||
19 | } jffs2_acl_entry_short; | ||
20 | |||
21 | typedef struct { | ||
22 | jint32_t a_version; | ||
23 | } jffs2_acl_header; | ||
24 | |||
25 | #ifdef __KERNEL__ | ||
26 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
27 | |||
28 | #define JFFS2_ACL_NOT_CACHED ((void *)-1) | ||
29 | |||
30 | extern int jffs2_permission(struct inode *, int, struct nameidata *); | ||
31 | extern int jffs2_acl_chmod(struct inode *); | ||
32 | extern int jffs2_init_acl(struct inode *, struct inode *); | ||
33 | extern void jffs2_clear_acl(struct inode *); | ||
34 | |||
35 | extern struct xattr_handler jffs2_acl_access_xattr_handler; | ||
36 | extern struct xattr_handler jffs2_acl_default_xattr_handler; | ||
37 | |||
38 | #else | ||
39 | |||
40 | #define jffs2_permission NULL | ||
41 | #define jffs2_acl_chmod(inode) (0) | ||
42 | #define jffs2_init_acl(inode,dir) (0) | ||
43 | #define jffs2_clear_acl(inode) | ||
44 | |||
45 | #endif /* CONFIG_JFFS2_FS_POSIX_ACL */ | ||
46 | #endif /* __KERNEL__ */ | ||
diff --git a/fs/jffs2/build.c b/fs/jffs2/build.c index 70f7a896c04a..02826967ab58 100644 --- a/fs/jffs2/build.c +++ b/fs/jffs2/build.c | |||
@@ -160,6 +160,7 @@ static int jffs2_build_filesystem(struct jffs2_sb_info *c) | |||
160 | ic->scan_dents = NULL; | 160 | ic->scan_dents = NULL; |
161 | cond_resched(); | 161 | cond_resched(); |
162 | } | 162 | } |
163 | jffs2_build_xattr_subsystem(c); | ||
163 | c->flags &= ~JFFS2_SB_FLAG_BUILDING; | 164 | c->flags &= ~JFFS2_SB_FLAG_BUILDING; |
164 | 165 | ||
165 | dbg_fsbuild("FS build complete\n"); | 166 | dbg_fsbuild("FS build complete\n"); |
@@ -178,6 +179,7 @@ exit: | |||
178 | jffs2_free_full_dirent(fd); | 179 | jffs2_free_full_dirent(fd); |
179 | } | 180 | } |
180 | } | 181 | } |
182 | jffs2_clear_xattr_subsystem(c); | ||
181 | } | 183 | } |
182 | 184 | ||
183 | return ret; | 185 | return ret; |
diff --git a/fs/jffs2/debug.h b/fs/jffs2/debug.h index 162af6dfe292..5fa494a792b2 100644 --- a/fs/jffs2/debug.h +++ b/fs/jffs2/debug.h | |||
@@ -171,6 +171,12 @@ | |||
171 | #define dbg_memalloc(fmt, ...) | 171 | #define dbg_memalloc(fmt, ...) |
172 | #endif | 172 | #endif |
173 | 173 | ||
174 | /* Watch the XATTR subsystem */ | ||
175 | #ifdef JFFS2_DBG_XATTR_MESSAGES | ||
176 | #define dbg_xattr(fmt, ...) JFFS2_DEBUG(fmt, ##__VA_ARGS__) | ||
177 | #else | ||
178 | #define dbg_xattr(fmt, ...) | ||
179 | #endif | ||
174 | 180 | ||
175 | /* "Sanity" checks */ | 181 | /* "Sanity" checks */ |
176 | void | 182 | void |
diff --git a/fs/jffs2/dir.c b/fs/jffs2/dir.c index 1c8e8c0f6cea..f1b18b99a3cd 100644 --- a/fs/jffs2/dir.c +++ b/fs/jffs2/dir.c | |||
@@ -57,7 +57,12 @@ struct inode_operations jffs2_dir_inode_operations = | |||
57 | .rmdir = jffs2_rmdir, | 57 | .rmdir = jffs2_rmdir, |
58 | .mknod = jffs2_mknod, | 58 | .mknod = jffs2_mknod, |
59 | .rename = jffs2_rename, | 59 | .rename = jffs2_rename, |
60 | .permission = jffs2_permission, | ||
60 | .setattr = jffs2_setattr, | 61 | .setattr = jffs2_setattr, |
62 | .setxattr = jffs2_setxattr, | ||
63 | .getxattr = jffs2_getxattr, | ||
64 | .listxattr = jffs2_listxattr, | ||
65 | .removexattr = jffs2_removexattr | ||
61 | }; | 66 | }; |
62 | 67 | ||
63 | /***********************************************************************/ | 68 | /***********************************************************************/ |
@@ -209,12 +214,15 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode, | |||
209 | ret = jffs2_do_create(c, dir_f, f, ri, | 214 | ret = jffs2_do_create(c, dir_f, f, ri, |
210 | dentry->d_name.name, dentry->d_name.len); | 215 | dentry->d_name.name, dentry->d_name.len); |
211 | 216 | ||
212 | if (ret) { | 217 | if (ret) |
213 | make_bad_inode(inode); | 218 | goto fail; |
214 | iput(inode); | 219 | |
215 | jffs2_free_raw_inode(ri); | 220 | ret = jffs2_init_security(inode, dir_i); |
216 | return ret; | 221 | if (ret) |
217 | } | 222 | goto fail; |
223 | ret = jffs2_init_acl(inode, dir_i); | ||
224 | if (ret) | ||
225 | goto fail; | ||
218 | 226 | ||
219 | dir_i->i_mtime = dir_i->i_ctime = ITIME(je32_to_cpu(ri->ctime)); | 227 | dir_i->i_mtime = dir_i->i_ctime = ITIME(je32_to_cpu(ri->ctime)); |
220 | 228 | ||
@@ -224,6 +232,12 @@ static int jffs2_create(struct inode *dir_i, struct dentry *dentry, int mode, | |||
224 | D1(printk(KERN_DEBUG "jffs2_create: Created ino #%lu with mode %o, nlink %d(%d). nrpages %ld\n", | 232 | D1(printk(KERN_DEBUG "jffs2_create: Created ino #%lu with mode %o, nlink %d(%d). nrpages %ld\n", |
225 | inode->i_ino, inode->i_mode, inode->i_nlink, f->inocache->nlink, inode->i_mapping->nrpages)); | 233 | inode->i_ino, inode->i_mode, inode->i_nlink, f->inocache->nlink, inode->i_mapping->nrpages)); |
226 | return 0; | 234 | return 0; |
235 | |||
236 | fail: | ||
237 | make_bad_inode(inode); | ||
238 | iput(inode); | ||
239 | jffs2_free_raw_inode(ri); | ||
240 | return ret; | ||
227 | } | 241 | } |
228 | 242 | ||
229 | /***********************************************************************/ | 243 | /***********************************************************************/ |
@@ -374,6 +388,18 @@ static int jffs2_symlink (struct inode *dir_i, struct dentry *dentry, const char | |||
374 | up(&f->sem); | 388 | up(&f->sem); |
375 | 389 | ||
376 | jffs2_complete_reservation(c); | 390 | jffs2_complete_reservation(c); |
391 | |||
392 | ret = jffs2_init_security(inode, dir_i); | ||
393 | if (ret) { | ||
394 | jffs2_clear_inode(inode); | ||
395 | return ret; | ||
396 | } | ||
397 | ret = jffs2_init_acl(inode, dir_i); | ||
398 | if (ret) { | ||
399 | jffs2_clear_inode(inode); | ||
400 | return ret; | ||
401 | } | ||
402 | |||
377 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, | 403 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, |
378 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); | 404 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); |
379 | if (ret) { | 405 | if (ret) { |
@@ -504,6 +530,18 @@ static int jffs2_mkdir (struct inode *dir_i, struct dentry *dentry, int mode) | |||
504 | up(&f->sem); | 530 | up(&f->sem); |
505 | 531 | ||
506 | jffs2_complete_reservation(c); | 532 | jffs2_complete_reservation(c); |
533 | |||
534 | ret = jffs2_init_security(inode, dir_i); | ||
535 | if (ret) { | ||
536 | jffs2_clear_inode(inode); | ||
537 | return ret; | ||
538 | } | ||
539 | ret = jffs2_init_acl(inode, dir_i); | ||
540 | if (ret) { | ||
541 | jffs2_clear_inode(inode); | ||
542 | return ret; | ||
543 | } | ||
544 | |||
507 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, | 545 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, |
508 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); | 546 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); |
509 | if (ret) { | 547 | if (ret) { |
@@ -660,6 +698,18 @@ static int jffs2_mknod (struct inode *dir_i, struct dentry *dentry, int mode, de | |||
660 | up(&f->sem); | 698 | up(&f->sem); |
661 | 699 | ||
662 | jffs2_complete_reservation(c); | 700 | jffs2_complete_reservation(c); |
701 | |||
702 | ret = jffs2_init_security(inode, dir_i); | ||
703 | if (ret) { | ||
704 | jffs2_clear_inode(inode); | ||
705 | return ret; | ||
706 | } | ||
707 | ret = jffs2_init_acl(inode, dir_i); | ||
708 | if (ret) { | ||
709 | jffs2_clear_inode(inode); | ||
710 | return ret; | ||
711 | } | ||
712 | |||
663 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, | 713 | ret = jffs2_reserve_space(c, sizeof(*rd)+namelen, &phys_ofs, &alloclen, |
664 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); | 714 | ALLOC_NORMAL, JFFS2_SUMMARY_DIRENT_SIZE(namelen)); |
665 | if (ret) { | 715 | if (ret) { |
diff --git a/fs/jffs2/file.c b/fs/jffs2/file.c index 9f4171213e58..e92187f34d5f 100644 --- a/fs/jffs2/file.c +++ b/fs/jffs2/file.c | |||
@@ -54,7 +54,12 @@ const struct file_operations jffs2_file_operations = | |||
54 | 54 | ||
55 | struct inode_operations jffs2_file_inode_operations = | 55 | struct inode_operations jffs2_file_inode_operations = |
56 | { | 56 | { |
57 | .setattr = jffs2_setattr | 57 | .permission = jffs2_permission, |
58 | .setattr = jffs2_setattr, | ||
59 | .setxattr = jffs2_setxattr, | ||
60 | .getxattr = jffs2_getxattr, | ||
61 | .listxattr = jffs2_listxattr, | ||
62 | .removexattr = jffs2_removexattr | ||
58 | }; | 63 | }; |
59 | 64 | ||
60 | struct address_space_operations jffs2_file_address_operations = | 65 | struct address_space_operations jffs2_file_address_operations = |
diff --git a/fs/jffs2/fs.c b/fs/jffs2/fs.c index ea1f37d4fc58..4607cdc4c46d 100644 --- a/fs/jffs2/fs.c +++ b/fs/jffs2/fs.c | |||
@@ -185,7 +185,12 @@ static int jffs2_do_setattr (struct inode *inode, struct iattr *iattr) | |||
185 | 185 | ||
186 | int jffs2_setattr(struct dentry *dentry, struct iattr *iattr) | 186 | int jffs2_setattr(struct dentry *dentry, struct iattr *iattr) |
187 | { | 187 | { |
188 | return jffs2_do_setattr(dentry->d_inode, iattr); | 188 | int rc; |
189 | |||
190 | rc = jffs2_do_setattr(dentry->d_inode, iattr); | ||
191 | if (!rc && (iattr->ia_valid & ATTR_MODE)) | ||
192 | rc = jffs2_acl_chmod(dentry->d_inode); | ||
193 | return rc; | ||
189 | } | 194 | } |
190 | 195 | ||
191 | int jffs2_statfs(struct super_block *sb, struct kstatfs *buf) | 196 | int jffs2_statfs(struct super_block *sb, struct kstatfs *buf) |
@@ -224,6 +229,7 @@ void jffs2_clear_inode (struct inode *inode) | |||
224 | 229 | ||
225 | D1(printk(KERN_DEBUG "jffs2_clear_inode(): ino #%lu mode %o\n", inode->i_ino, inode->i_mode)); | 230 | D1(printk(KERN_DEBUG "jffs2_clear_inode(): ino #%lu mode %o\n", inode->i_ino, inode->i_mode)); |
226 | 231 | ||
232 | jffs2_xattr_delete_inode(c, f->inocache); | ||
227 | jffs2_do_clear_inode(c, f); | 233 | jffs2_do_clear_inode(c, f); |
228 | } | 234 | } |
229 | 235 | ||
@@ -497,6 +503,8 @@ int jffs2_do_fill_super(struct super_block *sb, void *data, int silent) | |||
497 | } | 503 | } |
498 | memset(c->inocache_list, 0, INOCACHE_HASHSIZE * sizeof(struct jffs2_inode_cache *)); | 504 | memset(c->inocache_list, 0, INOCACHE_HASHSIZE * sizeof(struct jffs2_inode_cache *)); |
499 | 505 | ||
506 | jffs2_init_xattr_subsystem(c); | ||
507 | |||
500 | if ((ret = jffs2_do_mount_fs(c))) | 508 | if ((ret = jffs2_do_mount_fs(c))) |
501 | goto out_inohash; | 509 | goto out_inohash; |
502 | 510 | ||
@@ -531,6 +539,7 @@ int jffs2_do_fill_super(struct super_block *sb, void *data, int silent) | |||
531 | else | 539 | else |
532 | kfree(c->blocks); | 540 | kfree(c->blocks); |
533 | out_inohash: | 541 | out_inohash: |
542 | jffs2_clear_xattr_subsystem(c); | ||
534 | kfree(c->inocache_list); | 543 | kfree(c->inocache_list); |
535 | out_wbuf: | 544 | out_wbuf: |
536 | jffs2_flash_cleanup(c); | 545 | jffs2_flash_cleanup(c); |
diff --git a/fs/jffs2/gc.c b/fs/jffs2/gc.c index 967fb2cf8e21..4ea1b7f0ae78 100644 --- a/fs/jffs2/gc.c +++ b/fs/jffs2/gc.c | |||
@@ -125,6 +125,7 @@ int jffs2_garbage_collect_pass(struct jffs2_sb_info *c) | |||
125 | struct jffs2_eraseblock *jeb; | 125 | struct jffs2_eraseblock *jeb; |
126 | struct jffs2_raw_node_ref *raw; | 126 | struct jffs2_raw_node_ref *raw; |
127 | int ret = 0, inum, nlink; | 127 | int ret = 0, inum, nlink; |
128 | int xattr = 0; | ||
128 | 129 | ||
129 | if (down_interruptible(&c->alloc_sem)) | 130 | if (down_interruptible(&c->alloc_sem)) |
130 | return -EINTR; | 131 | return -EINTR; |
@@ -138,7 +139,7 @@ int jffs2_garbage_collect_pass(struct jffs2_sb_info *c) | |||
138 | the node CRCs etc. Do it now. */ | 139 | the node CRCs etc. Do it now. */ |
139 | 140 | ||
140 | /* checked_ino is protected by the alloc_sem */ | 141 | /* checked_ino is protected by the alloc_sem */ |
141 | if (c->checked_ino > c->highest_ino) { | 142 | if (c->checked_ino > c->highest_ino && xattr) { |
142 | printk(KERN_CRIT "Checked all inodes but still 0x%x bytes of unchecked space?\n", | 143 | printk(KERN_CRIT "Checked all inodes but still 0x%x bytes of unchecked space?\n", |
143 | c->unchecked_size); | 144 | c->unchecked_size); |
144 | jffs2_dbg_dump_block_lists_nolock(c); | 145 | jffs2_dbg_dump_block_lists_nolock(c); |
@@ -148,6 +149,9 @@ int jffs2_garbage_collect_pass(struct jffs2_sb_info *c) | |||
148 | 149 | ||
149 | spin_unlock(&c->erase_completion_lock); | 150 | spin_unlock(&c->erase_completion_lock); |
150 | 151 | ||
152 | if (!xattr) | ||
153 | xattr = jffs2_verify_xattr(c); | ||
154 | |||
151 | spin_lock(&c->inocache_lock); | 155 | spin_lock(&c->inocache_lock); |
152 | 156 | ||
153 | ic = jffs2_get_ino_cache(c, c->checked_ino++); | 157 | ic = jffs2_get_ino_cache(c, c->checked_ino++); |
@@ -262,6 +266,16 @@ int jffs2_garbage_collect_pass(struct jffs2_sb_info *c) | |||
262 | 266 | ||
263 | ic = jffs2_raw_ref_to_ic(raw); | 267 | ic = jffs2_raw_ref_to_ic(raw); |
264 | 268 | ||
269 | /* When 'ic' refers xattr_datum/xattr_ref, this node is GCed as xattr. | ||
270 | We can decide whether this node is inode or xattr by ic->class. | ||
271 | ret = 0 : ic is xattr_datum/xattr_ref, and GC was SUCCESSED. | ||
272 | ret < 0 : ic is xattr_datum/xattr_ref, but GC was FAILED. | ||
273 | ret > 0 : ic is NOT xattr_datum/xattr_ref. | ||
274 | */ | ||
275 | ret = jffs2_garbage_collect_xattr(c, ic); | ||
276 | if (ret <= 0) | ||
277 | goto release_sem; | ||
278 | |||
265 | /* We need to hold the inocache. Either the erase_completion_lock or | 279 | /* We need to hold the inocache. Either the erase_completion_lock or |
266 | the inocache_lock are sufficient; we trade down since the inocache_lock | 280 | the inocache_lock are sufficient; we trade down since the inocache_lock |
267 | causes less contention. */ | 281 | causes less contention. */ |
diff --git a/fs/jffs2/jffs2_fs_i.h b/fs/jffs2/jffs2_fs_i.h index ad565bf9dcc1..2e0cc8e00b85 100644 --- a/fs/jffs2/jffs2_fs_i.h +++ b/fs/jffs2/jffs2_fs_i.h | |||
@@ -5,6 +5,7 @@ | |||
5 | 5 | ||
6 | #include <linux/version.h> | 6 | #include <linux/version.h> |
7 | #include <linux/rbtree.h> | 7 | #include <linux/rbtree.h> |
8 | #include <linux/posix_acl.h> | ||
8 | #include <asm/semaphore.h> | 9 | #include <asm/semaphore.h> |
9 | 10 | ||
10 | struct jffs2_inode_info { | 11 | struct jffs2_inode_info { |
@@ -45,6 +46,10 @@ struct jffs2_inode_info { | |||
45 | struct inode vfs_inode; | 46 | struct inode vfs_inode; |
46 | #endif | 47 | #endif |
47 | #endif | 48 | #endif |
49 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
50 | struct posix_acl *i_acl_access; | ||
51 | struct posix_acl *i_acl_default; | ||
52 | #endif | ||
48 | }; | 53 | }; |
49 | 54 | ||
50 | #endif /* _JFFS2_FS_I */ | 55 | #endif /* _JFFS2_FS_I */ |
diff --git a/fs/jffs2/jffs2_fs_sb.h b/fs/jffs2/jffs2_fs_sb.h index 4bcfb5570221..3b4e0edd6dbb 100644 --- a/fs/jffs2/jffs2_fs_sb.h +++ b/fs/jffs2/jffs2_fs_sb.h | |||
@@ -115,6 +115,16 @@ struct jffs2_sb_info { | |||
115 | 115 | ||
116 | struct jffs2_summary *summary; /* Summary information */ | 116 | struct jffs2_summary *summary; /* Summary information */ |
117 | 117 | ||
118 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
119 | #define XATTRINDEX_HASHSIZE (57) | ||
120 | uint32_t highest_xid; | ||
121 | struct list_head xattrindex[XATTRINDEX_HASHSIZE]; | ||
122 | struct list_head xattr_temp; | ||
123 | struct list_head xattr_unchecked; | ||
124 | struct rw_semaphore xattr_sem; | ||
125 | uint32_t xdatum_mem_usage; | ||
126 | uint32_t xdatum_mem_threshold; | ||
127 | #endif | ||
118 | /* OS-private pointer for getting back to master superblock info */ | 128 | /* OS-private pointer for getting back to master superblock info */ |
119 | void *os_priv; | 129 | void *os_priv; |
120 | }; | 130 | }; |
diff --git a/fs/jffs2/malloc.c b/fs/jffs2/malloc.c index 036cbd11c004..3d5b7ecfbf8d 100644 --- a/fs/jffs2/malloc.c +++ b/fs/jffs2/malloc.c | |||
@@ -26,6 +26,10 @@ static kmem_cache_t *tmp_dnode_info_slab; | |||
26 | static kmem_cache_t *raw_node_ref_slab; | 26 | static kmem_cache_t *raw_node_ref_slab; |
27 | static kmem_cache_t *node_frag_slab; | 27 | static kmem_cache_t *node_frag_slab; |
28 | static kmem_cache_t *inode_cache_slab; | 28 | static kmem_cache_t *inode_cache_slab; |
29 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
30 | static kmem_cache_t *xattr_datum_cache; | ||
31 | static kmem_cache_t *xattr_ref_cache; | ||
32 | #endif | ||
29 | 33 | ||
30 | int __init jffs2_create_slab_caches(void) | 34 | int __init jffs2_create_slab_caches(void) |
31 | { | 35 | { |
@@ -68,8 +72,24 @@ int __init jffs2_create_slab_caches(void) | |||
68 | inode_cache_slab = kmem_cache_create("jffs2_inode_cache", | 72 | inode_cache_slab = kmem_cache_create("jffs2_inode_cache", |
69 | sizeof(struct jffs2_inode_cache), | 73 | sizeof(struct jffs2_inode_cache), |
70 | 0, 0, NULL, NULL); | 74 | 0, 0, NULL, NULL); |
71 | if (inode_cache_slab) | 75 | if (!inode_cache_slab) |
72 | return 0; | 76 | goto err; |
77 | |||
78 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
79 | xattr_datum_cache = kmem_cache_create("jffs2_xattr_datum", | ||
80 | sizeof(struct jffs2_xattr_datum), | ||
81 | 0, 0, NULL, NULL); | ||
82 | if (!xattr_datum_cache) | ||
83 | goto err; | ||
84 | |||
85 | xattr_ref_cache = kmem_cache_create("jffs2_xattr_ref", | ||
86 | sizeof(struct jffs2_xattr_ref), | ||
87 | 0, 0, NULL, NULL); | ||
88 | if (!xattr_ref_cache) | ||
89 | goto err; | ||
90 | #endif | ||
91 | |||
92 | return 0; | ||
73 | err: | 93 | err: |
74 | jffs2_destroy_slab_caches(); | 94 | jffs2_destroy_slab_caches(); |
75 | return -ENOMEM; | 95 | return -ENOMEM; |
@@ -91,6 +111,12 @@ void jffs2_destroy_slab_caches(void) | |||
91 | kmem_cache_destroy(node_frag_slab); | 111 | kmem_cache_destroy(node_frag_slab); |
92 | if(inode_cache_slab) | 112 | if(inode_cache_slab) |
93 | kmem_cache_destroy(inode_cache_slab); | 113 | kmem_cache_destroy(inode_cache_slab); |
114 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
115 | if (xattr_datum_cache) | ||
116 | kmem_cache_destroy(xattr_datum_cache); | ||
117 | if (xattr_ref_cache) | ||
118 | kmem_cache_destroy(xattr_ref_cache); | ||
119 | #endif | ||
94 | } | 120 | } |
95 | 121 | ||
96 | struct jffs2_full_dirent *jffs2_alloc_full_dirent(int namesize) | 122 | struct jffs2_full_dirent *jffs2_alloc_full_dirent(int namesize) |
@@ -205,3 +231,41 @@ void jffs2_free_inode_cache(struct jffs2_inode_cache *x) | |||
205 | dbg_memalloc("%p\n", x); | 231 | dbg_memalloc("%p\n", x); |
206 | kmem_cache_free(inode_cache_slab, x); | 232 | kmem_cache_free(inode_cache_slab, x); |
207 | } | 233 | } |
234 | |||
235 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
236 | struct jffs2_xattr_datum *jffs2_alloc_xattr_datum(void) | ||
237 | { | ||
238 | struct jffs2_xattr_datum *xd; | ||
239 | xd = kmem_cache_alloc(xattr_datum_cache, GFP_KERNEL); | ||
240 | dbg_memalloc("%p\n", xd); | ||
241 | |||
242 | memset(xd, 0, sizeof(struct jffs2_xattr_datum)); | ||
243 | xd->class = RAWNODE_CLASS_XATTR_DATUM; | ||
244 | INIT_LIST_HEAD(&xd->xindex); | ||
245 | return xd; | ||
246 | } | ||
247 | |||
248 | void jffs2_free_xattr_datum(struct jffs2_xattr_datum *xd) | ||
249 | { | ||
250 | dbg_memalloc("%p\n", xd); | ||
251 | kmem_cache_free(xattr_datum_cache, xd); | ||
252 | } | ||
253 | |||
254 | struct jffs2_xattr_ref *jffs2_alloc_xattr_ref(void) | ||
255 | { | ||
256 | struct jffs2_xattr_ref *ref; | ||
257 | ref = kmem_cache_alloc(xattr_ref_cache, GFP_KERNEL); | ||
258 | dbg_memalloc("%p\n", ref); | ||
259 | |||
260 | memset(ref, 0, sizeof(struct jffs2_xattr_ref)); | ||
261 | ref->class = RAWNODE_CLASS_XATTR_REF; | ||
262 | INIT_LIST_HEAD(&ref->ilist); | ||
263 | return ref; | ||
264 | } | ||
265 | |||
266 | void jffs2_free_xattr_ref(struct jffs2_xattr_ref *ref) | ||
267 | { | ||
268 | dbg_memalloc("%p\n", ref); | ||
269 | kmem_cache_free(xattr_ref_cache, ref); | ||
270 | } | ||
271 | #endif | ||
diff --git a/fs/jffs2/nodelist.c b/fs/jffs2/nodelist.c index d4d0c41490cd..9c575733659b 100644 --- a/fs/jffs2/nodelist.c +++ b/fs/jffs2/nodelist.c | |||
@@ -938,6 +938,7 @@ void jffs2_free_ino_caches(struct jffs2_sb_info *c) | |||
938 | this = c->inocache_list[i]; | 938 | this = c->inocache_list[i]; |
939 | while (this) { | 939 | while (this) { |
940 | next = this->next; | 940 | next = this->next; |
941 | jffs2_xattr_free_inode(c, this); | ||
941 | jffs2_free_inode_cache(this); | 942 | jffs2_free_inode_cache(this); |
942 | this = next; | 943 | this = next; |
943 | } | 944 | } |
diff --git a/fs/jffs2/nodelist.h b/fs/jffs2/nodelist.h index f6645afe88e4..6f6279cf4909 100644 --- a/fs/jffs2/nodelist.h +++ b/fs/jffs2/nodelist.h | |||
@@ -20,6 +20,8 @@ | |||
20 | #include <linux/jffs2.h> | 20 | #include <linux/jffs2.h> |
21 | #include "jffs2_fs_sb.h" | 21 | #include "jffs2_fs_sb.h" |
22 | #include "jffs2_fs_i.h" | 22 | #include "jffs2_fs_i.h" |
23 | #include "xattr.h" | ||
24 | #include "acl.h" | ||
23 | #include "summary.h" | 25 | #include "summary.h" |
24 | 26 | ||
25 | #ifdef __ECOS | 27 | #ifdef __ECOS |
@@ -107,11 +109,16 @@ struct jffs2_inode_cache { | |||
107 | temporary lists of dirents, and later must be set to | 109 | temporary lists of dirents, and later must be set to |
108 | NULL to mark the end of the raw_node_ref->next_in_ino | 110 | NULL to mark the end of the raw_node_ref->next_in_ino |
109 | chain. */ | 111 | chain. */ |
112 | u8 class; /* It's used for identification */ | ||
113 | u8 flags; | ||
114 | uint16_t state; | ||
110 | struct jffs2_inode_cache *next; | 115 | struct jffs2_inode_cache *next; |
111 | struct jffs2_raw_node_ref *nodes; | 116 | struct jffs2_raw_node_ref *nodes; |
112 | uint32_t ino; | 117 | uint32_t ino; |
113 | int nlink; | 118 | int nlink; |
114 | int state; | 119 | #ifdef CONFIG_JFFS2_FS_XATTR |
120 | struct list_head ilist; | ||
121 | #endif | ||
115 | }; | 122 | }; |
116 | 123 | ||
117 | /* Inode states for 'state' above. We need the 'GC' state to prevent | 124 | /* Inode states for 'state' above. We need the 'GC' state to prevent |
@@ -125,6 +132,12 @@ struct jffs2_inode_cache { | |||
125 | #define INO_STATE_READING 5 /* In read_inode() */ | 132 | #define INO_STATE_READING 5 /* In read_inode() */ |
126 | #define INO_STATE_CLEARING 6 /* In clear_inode() */ | 133 | #define INO_STATE_CLEARING 6 /* In clear_inode() */ |
127 | 134 | ||
135 | #define INO_FLAGS_XATTR_CHECKED 0x01 /* has no duplicate xattr_ref */ | ||
136 | |||
137 | #define RAWNODE_CLASS_INODE_CACHE 0 | ||
138 | #define RAWNODE_CLASS_XATTR_DATUM 1 | ||
139 | #define RAWNODE_CLASS_XATTR_REF 2 | ||
140 | |||
128 | #define INOCACHE_HASHSIZE 128 | 141 | #define INOCACHE_HASHSIZE 128 |
129 | 142 | ||
130 | /* | 143 | /* |
@@ -374,6 +387,12 @@ struct jffs2_node_frag *jffs2_alloc_node_frag(void); | |||
374 | void jffs2_free_node_frag(struct jffs2_node_frag *); | 387 | void jffs2_free_node_frag(struct jffs2_node_frag *); |
375 | struct jffs2_inode_cache *jffs2_alloc_inode_cache(void); | 388 | struct jffs2_inode_cache *jffs2_alloc_inode_cache(void); |
376 | void jffs2_free_inode_cache(struct jffs2_inode_cache *); | 389 | void jffs2_free_inode_cache(struct jffs2_inode_cache *); |
390 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
391 | struct jffs2_xattr_datum *jffs2_alloc_xattr_datum(void); | ||
392 | void jffs2_free_xattr_datum(struct jffs2_xattr_datum *); | ||
393 | struct jffs2_xattr_ref *jffs2_alloc_xattr_ref(void); | ||
394 | void jffs2_free_xattr_ref(struct jffs2_xattr_ref *); | ||
395 | #endif | ||
377 | 396 | ||
378 | /* gc.c */ | 397 | /* gc.c */ |
379 | int jffs2_garbage_collect_pass(struct jffs2_sb_info *c); | 398 | int jffs2_garbage_collect_pass(struct jffs2_sb_info *c); |
diff --git a/fs/jffs2/os-linux.h b/fs/jffs2/os-linux.h index d307cf548625..9936ae23f8dc 100644 --- a/fs/jffs2/os-linux.h +++ b/fs/jffs2/os-linux.h | |||
@@ -60,6 +60,10 @@ static inline void jffs2_init_inode_info(struct jffs2_inode_info *f) | |||
60 | f->target = NULL; | 60 | f->target = NULL; |
61 | f->flags = 0; | 61 | f->flags = 0; |
62 | f->usercompr = 0; | 62 | f->usercompr = 0; |
63 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
64 | f->i_acl_access = JFFS2_ACL_NOT_CACHED; | ||
65 | f->i_acl_default = JFFS2_ACL_NOT_CACHED; | ||
66 | #endif | ||
63 | } | 67 | } |
64 | 68 | ||
65 | 69 | ||
diff --git a/fs/jffs2/readinode.c b/fs/jffs2/readinode.c index e1acce8fb2bf..61ccdf4f1042 100644 --- a/fs/jffs2/readinode.c +++ b/fs/jffs2/readinode.c | |||
@@ -902,6 +902,7 @@ int jffs2_do_read_inode(struct jffs2_sb_info *c, struct jffs2_inode_info *f, | |||
902 | f->inocache->ino = f->inocache->nlink = 1; | 902 | f->inocache->ino = f->inocache->nlink = 1; |
903 | f->inocache->nodes = (struct jffs2_raw_node_ref *)f->inocache; | 903 | f->inocache->nodes = (struct jffs2_raw_node_ref *)f->inocache; |
904 | f->inocache->state = INO_STATE_READING; | 904 | f->inocache->state = INO_STATE_READING; |
905 | init_xattr_inode_cache(f->inocache); | ||
905 | jffs2_add_ino_cache(c, f->inocache); | 906 | jffs2_add_ino_cache(c, f->inocache); |
906 | } | 907 | } |
907 | if (!f->inocache) { | 908 | if (!f->inocache) { |
diff --git a/fs/jffs2/scan.c b/fs/jffs2/scan.c index cf55b221fc2b..f09689e320fe 100644 --- a/fs/jffs2/scan.c +++ b/fs/jffs2/scan.c | |||
@@ -306,6 +306,136 @@ int jffs2_scan_classify_jeb(struct jffs2_sb_info *c, struct jffs2_eraseblock *je | |||
306 | return BLK_STATE_ALLDIRTY; | 306 | return BLK_STATE_ALLDIRTY; |
307 | } | 307 | } |
308 | 308 | ||
309 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
310 | static int jffs2_scan_xattr_node(struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, | ||
311 | struct jffs2_raw_xattr *rx, uint32_t ofs, | ||
312 | struct jffs2_summary *s) | ||
313 | { | ||
314 | struct jffs2_xattr_datum *xd; | ||
315 | struct jffs2_raw_node_ref *raw; | ||
316 | uint32_t totlen, crc; | ||
317 | |||
318 | crc = crc32(0, rx, sizeof(struct jffs2_raw_xattr) - 4); | ||
319 | if (crc != je32_to_cpu(rx->node_crc)) { | ||
320 | if (je32_to_cpu(rx->node_crc) != 0xffffffff) | ||
321 | JFFS2_WARNING("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", | ||
322 | ofs, je32_to_cpu(rx->node_crc), crc); | ||
323 | DIRTY_SPACE(je32_to_cpu(rx->totlen)); | ||
324 | return 0; | ||
325 | } | ||
326 | |||
327 | totlen = PAD(sizeof(*rx) + rx->name_len + 1 + je16_to_cpu(rx->value_len)); | ||
328 | if (totlen != je32_to_cpu(rx->totlen)) { | ||
329 | JFFS2_WARNING("node length mismatch at %#08x, read=%u, calc=%u\n", | ||
330 | ofs, je32_to_cpu(rx->totlen), totlen); | ||
331 | DIRTY_SPACE(je32_to_cpu(rx->totlen)); | ||
332 | return 0; | ||
333 | } | ||
334 | |||
335 | raw = jffs2_alloc_raw_node_ref(); | ||
336 | if (!raw) | ||
337 | return -ENOMEM; | ||
338 | |||
339 | xd = jffs2_setup_xattr_datum(c, je32_to_cpu(rx->xid), je32_to_cpu(rx->version)); | ||
340 | if (IS_ERR(xd)) { | ||
341 | jffs2_free_raw_node_ref(raw); | ||
342 | if (PTR_ERR(xd) == -EEXIST) { | ||
343 | DIRTY_SPACE(PAD(je32_to_cpu(rx->totlen))); | ||
344 | return 0; | ||
345 | } | ||
346 | return PTR_ERR(xd); | ||
347 | } | ||
348 | xd->xprefix = rx->xprefix; | ||
349 | xd->name_len = rx->name_len; | ||
350 | xd->value_len = je16_to_cpu(rx->value_len); | ||
351 | xd->data_crc = je32_to_cpu(rx->data_crc); | ||
352 | xd->node = raw; | ||
353 | |||
354 | raw->__totlen = totlen; | ||
355 | raw->flash_offset = ofs | REF_PRISTINE; | ||
356 | raw->next_phys = NULL; | ||
357 | raw->next_in_ino = (void *)xd; | ||
358 | if (!jeb->first_node) | ||
359 | jeb->first_node = raw; | ||
360 | if (jeb->last_node) | ||
361 | jeb->last_node->next_phys = raw; | ||
362 | jeb->last_node = raw; | ||
363 | |||
364 | USED_SPACE(PAD(je32_to_cpu(rx->totlen))); | ||
365 | if (jffs2_sum_active()) | ||
366 | jffs2_sum_add_xattr_mem(s, rx, ofs - jeb->offset); | ||
367 | dbg_xattr("scaning xdatum at %#08x (xid=%u, version=%u)\n", | ||
368 | ofs, xd->xid, xd->version); | ||
369 | return 0; | ||
370 | } | ||
371 | |||
372 | static int jffs2_scan_xref_node(struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, | ||
373 | struct jffs2_raw_xref *rr, uint32_t ofs, | ||
374 | struct jffs2_summary *s) | ||
375 | { | ||
376 | struct jffs2_xattr_ref *ref; | ||
377 | struct jffs2_raw_node_ref *raw; | ||
378 | uint32_t crc; | ||
379 | |||
380 | crc = crc32(0, rr, sizeof(*rr) - 4); | ||
381 | if (crc != je32_to_cpu(rr->node_crc)) { | ||
382 | if (je32_to_cpu(rr->node_crc) != 0xffffffff) | ||
383 | JFFS2_WARNING("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", | ||
384 | ofs, je32_to_cpu(rr->node_crc), crc); | ||
385 | DIRTY_SPACE(PAD(je32_to_cpu(rr->totlen))); | ||
386 | return 0; | ||
387 | } | ||
388 | |||
389 | if (PAD(sizeof(struct jffs2_raw_xref)) != je32_to_cpu(rr->totlen)) { | ||
390 | JFFS2_WARNING("node length mismatch at %#08x, read=%u, calc=%u\n", | ||
391 | ofs, je32_to_cpu(rr->totlen), | ||
392 | PAD(sizeof(struct jffs2_raw_xref))); | ||
393 | DIRTY_SPACE(je32_to_cpu(rr->totlen)); | ||
394 | return 0; | ||
395 | } | ||
396 | |||
397 | ref = jffs2_alloc_xattr_ref(); | ||
398 | if (!ref) | ||
399 | return -ENOMEM; | ||
400 | |||
401 | raw = jffs2_alloc_raw_node_ref(); | ||
402 | if (!raw) { | ||
403 | jffs2_free_xattr_ref(ref); | ||
404 | return -ENOMEM; | ||
405 | } | ||
406 | |||
407 | /* BEFORE jffs2_build_xattr_subsystem() called, | ||
408 | * ref->xid is used to store 32bit xid, xd is not used | ||
409 | * ref->ino is used to store 32bit inode-number, ic is not used | ||
410 | * Thoes variables are declared as union, thus using those | ||
411 | * are exclusive. In a similar way, ref->ilist is temporarily | ||
412 | * used to chain all xattr_ref object. It's re-chained to | ||
413 | * jffs2_inode_cache in jffs2_build_xattr_subsystem() correctly. | ||
414 | */ | ||
415 | ref->node = raw; | ||
416 | ref->ino = je32_to_cpu(rr->ino); | ||
417 | ref->xid = je32_to_cpu(rr->xid); | ||
418 | list_add_tail(&ref->ilist, &c->xattr_temp); | ||
419 | |||
420 | raw->__totlen = PAD(je32_to_cpu(rr->totlen)); | ||
421 | raw->flash_offset = ofs | REF_PRISTINE; | ||
422 | raw->next_phys = NULL; | ||
423 | raw->next_in_ino = (void *)ref; | ||
424 | if (!jeb->first_node) | ||
425 | jeb->first_node = raw; | ||
426 | if (jeb->last_node) | ||
427 | jeb->last_node->next_phys = raw; | ||
428 | jeb->last_node = raw; | ||
429 | |||
430 | USED_SPACE(PAD(je32_to_cpu(rr->totlen))); | ||
431 | if (jffs2_sum_active()) | ||
432 | jffs2_sum_add_xref_mem(s, rr, ofs - jeb->offset); | ||
433 | dbg_xattr("scan xref at %#08x (xid=%u, ino=%u)\n", | ||
434 | ofs, ref->xid, ref->ino); | ||
435 | return 0; | ||
436 | } | ||
437 | #endif | ||
438 | |||
309 | static int jffs2_scan_eraseblock (struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, | 439 | static int jffs2_scan_eraseblock (struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, |
310 | unsigned char *buf, uint32_t buf_size, struct jffs2_summary *s) { | 440 | unsigned char *buf, uint32_t buf_size, struct jffs2_summary *s) { |
311 | struct jffs2_unknown_node *node; | 441 | struct jffs2_unknown_node *node; |
@@ -614,6 +744,43 @@ scan_more: | |||
614 | ofs += PAD(je32_to_cpu(node->totlen)); | 744 | ofs += PAD(je32_to_cpu(node->totlen)); |
615 | break; | 745 | break; |
616 | 746 | ||
747 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
748 | case JFFS2_NODETYPE_XATTR: | ||
749 | if (buf_ofs + buf_len < ofs + je32_to_cpu(node->totlen)) { | ||
750 | buf_len = min_t(uint32_t, buf_size, jeb->offset + c->sector_size - ofs); | ||
751 | D1(printk(KERN_DEBUG "Fewer than %d bytes (xattr node)" | ||
752 | " left to end of buf. Reading 0x%x at 0x%08x\n", | ||
753 | je32_to_cpu(node->totlen), buf_len, ofs)); | ||
754 | err = jffs2_fill_scan_buf(c, buf, ofs, buf_len); | ||
755 | if (err) | ||
756 | return err; | ||
757 | buf_ofs = ofs; | ||
758 | node = (void *)buf; | ||
759 | } | ||
760 | err = jffs2_scan_xattr_node(c, jeb, (void *)node, ofs, s); | ||
761 | if (err) | ||
762 | return err; | ||
763 | ofs += PAD(je32_to_cpu(node->totlen)); | ||
764 | break; | ||
765 | case JFFS2_NODETYPE_XREF: | ||
766 | if (buf_ofs + buf_len < ofs + je32_to_cpu(node->totlen)) { | ||
767 | buf_len = min_t(uint32_t, buf_size, jeb->offset + c->sector_size - ofs); | ||
768 | D1(printk(KERN_DEBUG "Fewer than %d bytes (xref node)" | ||
769 | " left to end of buf. Reading 0x%x at 0x%08x\n", | ||
770 | je32_to_cpu(node->totlen), buf_len, ofs)); | ||
771 | err = jffs2_fill_scan_buf(c, buf, ofs, buf_len); | ||
772 | if (err) | ||
773 | return err; | ||
774 | buf_ofs = ofs; | ||
775 | node = (void *)buf; | ||
776 | } | ||
777 | err = jffs2_scan_xref_node(c, jeb, (void *)node, ofs, s); | ||
778 | if (err) | ||
779 | return err; | ||
780 | ofs += PAD(je32_to_cpu(node->totlen)); | ||
781 | break; | ||
782 | #endif /* CONFIG_JFFS2_FS_XATTR */ | ||
783 | |||
617 | case JFFS2_NODETYPE_CLEANMARKER: | 784 | case JFFS2_NODETYPE_CLEANMARKER: |
618 | D1(printk(KERN_DEBUG "CLEANMARKER node found at 0x%08x\n", ofs)); | 785 | D1(printk(KERN_DEBUG "CLEANMARKER node found at 0x%08x\n", ofs)); |
619 | if (je32_to_cpu(node->totlen) != c->cleanmarker_size) { | 786 | if (je32_to_cpu(node->totlen) != c->cleanmarker_size) { |
@@ -721,6 +888,7 @@ struct jffs2_inode_cache *jffs2_scan_make_ino_cache(struct jffs2_sb_info *c, uin | |||
721 | 888 | ||
722 | ic->ino = ino; | 889 | ic->ino = ino; |
723 | ic->nodes = (void *)ic; | 890 | ic->nodes = (void *)ic; |
891 | init_xattr_inode_cache(ic); | ||
724 | jffs2_add_ino_cache(c, ic); | 892 | jffs2_add_ino_cache(c, ic); |
725 | if (ino == 1) | 893 | if (ino == 1) |
726 | ic->nlink = 1; | 894 | ic->nlink = 1; |
diff --git a/fs/jffs2/security.c b/fs/jffs2/security.c new file mode 100644 index 000000000000..4b6c3b22524f --- /dev/null +++ b/fs/jffs2/security.c | |||
@@ -0,0 +1,82 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/security.c | ||
3 | * Security Labels support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | |||
11 | #include <linux/kernel.h> | ||
12 | #include <linux/slab.h> | ||
13 | #include <linux/fs.h> | ||
14 | #include <linux/time.h> | ||
15 | #include <linux/pagemap.h> | ||
16 | #include <linux/highmem.h> | ||
17 | #include <linux/crc32.h> | ||
18 | #include <linux/jffs2.h> | ||
19 | #include <linux/xattr.h> | ||
20 | #include <linux/mtd/mtd.h> | ||
21 | #include <linux/security.h> | ||
22 | #include "nodelist.h" | ||
23 | |||
24 | /* ---- Initial Security Label Attachment -------------- */ | ||
25 | int jffs2_init_security(struct inode *inode, struct inode *dir) | ||
26 | { | ||
27 | int rc; | ||
28 | size_t len; | ||
29 | void *value; | ||
30 | char *name; | ||
31 | |||
32 | rc = security_inode_init_security(inode, dir, &name, &value, &len); | ||
33 | if (rc) { | ||
34 | if (rc == -EOPNOTSUPP) | ||
35 | return 0; | ||
36 | return rc; | ||
37 | } | ||
38 | rc = do_jffs2_setxattr(inode, JFFS2_XPREFIX_SECURITY, name, value, len, 0); | ||
39 | |||
40 | kfree(name); | ||
41 | kfree(value); | ||
42 | return rc; | ||
43 | } | ||
44 | |||
45 | /* ---- XATTR Handler for "security.*" ----------------- */ | ||
46 | static int jffs2_security_getxattr(struct inode *inode, const char *name, | ||
47 | void *buffer, size_t size) | ||
48 | { | ||
49 | if (!strcmp(name, "")) | ||
50 | return -EINVAL; | ||
51 | |||
52 | return do_jffs2_getxattr(inode, JFFS2_XPREFIX_SECURITY, name, buffer, size); | ||
53 | } | ||
54 | |||
55 | static int jffs2_security_setxattr(struct inode *inode, const char *name, const void *buffer, | ||
56 | size_t size, int flags) | ||
57 | { | ||
58 | if (!strcmp(name, "")) | ||
59 | return -EINVAL; | ||
60 | |||
61 | return do_jffs2_setxattr(inode, JFFS2_XPREFIX_SECURITY, name, buffer, size, flags); | ||
62 | } | ||
63 | |||
64 | static size_t jffs2_security_listxattr(struct inode *inode, char *list, size_t list_size, | ||
65 | const char *name, size_t name_len) | ||
66 | { | ||
67 | size_t retlen = XATTR_SECURITY_PREFIX_LEN + name_len + 1; | ||
68 | |||
69 | if (list && retlen <= list_size) { | ||
70 | strcpy(list, XATTR_SECURITY_PREFIX); | ||
71 | strcpy(list + XATTR_SECURITY_PREFIX_LEN, name); | ||
72 | } | ||
73 | |||
74 | return retlen; | ||
75 | } | ||
76 | |||
77 | struct xattr_handler jffs2_security_xattr_handler = { | ||
78 | .prefix = XATTR_SECURITY_PREFIX, | ||
79 | .list = jffs2_security_listxattr, | ||
80 | .set = jffs2_security_setxattr, | ||
81 | .get = jffs2_security_getxattr | ||
82 | }; | ||
diff --git a/fs/jffs2/summary.c b/fs/jffs2/summary.c index 7b0ed77a4c35..5d9ec8e36528 100644 --- a/fs/jffs2/summary.c +++ b/fs/jffs2/summary.c | |||
@@ -5,6 +5,7 @@ | |||
5 | * Zoltan Sogor <weth@inf.u-szeged.hu>, | 5 | * Zoltan Sogor <weth@inf.u-szeged.hu>, |
6 | * Patrik Kluba <pajko@halom.u-szeged.hu>, | 6 | * Patrik Kluba <pajko@halom.u-szeged.hu>, |
7 | * University of Szeged, Hungary | 7 | * University of Szeged, Hungary |
8 | * 2005 KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
8 | * | 9 | * |
9 | * For licensing information, see the file 'LICENCE' in this directory. | 10 | * For licensing information, see the file 'LICENCE' in this directory. |
10 | * | 11 | * |
@@ -81,6 +82,19 @@ static int jffs2_sum_add_mem(struct jffs2_summary *s, union jffs2_sum_mem *item) | |||
81 | dbg_summary("dirent (%u) added to summary\n", | 82 | dbg_summary("dirent (%u) added to summary\n", |
82 | je32_to_cpu(item->d.ino)); | 83 | je32_to_cpu(item->d.ino)); |
83 | break; | 84 | break; |
85 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
86 | case JFFS2_NODETYPE_XATTR: | ||
87 | s->sum_size += JFFS2_SUMMARY_XATTR_SIZE; | ||
88 | s->sum_num++; | ||
89 | dbg_summary("xattr (xid=%u, version=%u) added to summary\n", | ||
90 | je32_to_cpu(item->x.xid), je32_to_cpu(item->x.version)); | ||
91 | break; | ||
92 | case JFFS2_NODETYPE_XREF: | ||
93 | s->sum_size += JFFS2_SUMMARY_XREF_SIZE; | ||
94 | s->sum_num++; | ||
95 | dbg_summary("xref added to summary\n"); | ||
96 | break; | ||
97 | #endif | ||
84 | default: | 98 | default: |
85 | JFFS2_WARNING("UNKNOWN node type %u\n", | 99 | JFFS2_WARNING("UNKNOWN node type %u\n", |
86 | je16_to_cpu(item->u.nodetype)); | 100 | je16_to_cpu(item->u.nodetype)); |
@@ -141,6 +155,40 @@ int jffs2_sum_add_dirent_mem(struct jffs2_summary *s, struct jffs2_raw_dirent *r | |||
141 | return jffs2_sum_add_mem(s, (union jffs2_sum_mem *)temp); | 155 | return jffs2_sum_add_mem(s, (union jffs2_sum_mem *)temp); |
142 | } | 156 | } |
143 | 157 | ||
158 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
159 | int jffs2_sum_add_xattr_mem(struct jffs2_summary *s, struct jffs2_raw_xattr *rx, uint32_t ofs) | ||
160 | { | ||
161 | struct jffs2_sum_xattr_mem *temp; | ||
162 | |||
163 | temp = kmalloc(sizeof(struct jffs2_sum_xattr_mem), GFP_KERNEL); | ||
164 | if (!temp) | ||
165 | return -ENOMEM; | ||
166 | |||
167 | temp->nodetype = rx->nodetype; | ||
168 | temp->xid = rx->xid; | ||
169 | temp->version = rx->version; | ||
170 | temp->offset = cpu_to_je32(ofs); | ||
171 | temp->totlen = rx->totlen; | ||
172 | temp->next = NULL; | ||
173 | |||
174 | return jffs2_sum_add_mem(s, (union jffs2_sum_mem *)temp); | ||
175 | } | ||
176 | |||
177 | int jffs2_sum_add_xref_mem(struct jffs2_summary *s, struct jffs2_raw_xref *rr, uint32_t ofs) | ||
178 | { | ||
179 | struct jffs2_sum_xref_mem *temp; | ||
180 | |||
181 | temp = kmalloc(sizeof(struct jffs2_sum_xref_mem), GFP_KERNEL); | ||
182 | if (!temp) | ||
183 | return -ENOMEM; | ||
184 | |||
185 | temp->nodetype = rr->nodetype; | ||
186 | temp->offset = cpu_to_je32(ofs); | ||
187 | temp->next = NULL; | ||
188 | |||
189 | return jffs2_sum_add_mem(s, (union jffs2_sum_mem *)temp); | ||
190 | } | ||
191 | #endif | ||
144 | /* Cleanup every collected summary information */ | 192 | /* Cleanup every collected summary information */ |
145 | 193 | ||
146 | static void jffs2_sum_clean_collected(struct jffs2_summary *s) | 194 | static void jffs2_sum_clean_collected(struct jffs2_summary *s) |
@@ -259,7 +307,40 @@ int jffs2_sum_add_kvec(struct jffs2_sb_info *c, const struct kvec *invecs, | |||
259 | 307 | ||
260 | return jffs2_sum_add_mem(c->summary, (union jffs2_sum_mem *)temp); | 308 | return jffs2_sum_add_mem(c->summary, (union jffs2_sum_mem *)temp); |
261 | } | 309 | } |
310 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
311 | case JFFS2_NODETYPE_XATTR: { | ||
312 | struct jffs2_sum_xattr_mem *temp; | ||
313 | if (je32_to_cpu(node->x.version) == 0xffffffff) | ||
314 | return 0; | ||
315 | temp = kmalloc(sizeof(struct jffs2_sum_xattr_mem), GFP_KERNEL); | ||
316 | if (!temp) | ||
317 | goto no_mem; | ||
262 | 318 | ||
319 | temp->nodetype = node->x.nodetype; | ||
320 | temp->xid = node->x.xid; | ||
321 | temp->version = node->x.version; | ||
322 | temp->totlen = node->x.totlen; | ||
323 | temp->offset = cpu_to_je32(ofs); | ||
324 | temp->next = NULL; | ||
325 | |||
326 | return jffs2_sum_add_mem(c->summary, (union jffs2_sum_mem *)temp); | ||
327 | } | ||
328 | case JFFS2_NODETYPE_XREF: { | ||
329 | struct jffs2_sum_xref_mem *temp; | ||
330 | |||
331 | if (je32_to_cpu(node->r.ino) == 0xffffffff | ||
332 | && je32_to_cpu(node->r.xid) == 0xffffffff) | ||
333 | return 0; | ||
334 | temp = kmalloc(sizeof(struct jffs2_sum_xref_mem), GFP_KERNEL); | ||
335 | if (!temp) | ||
336 | goto no_mem; | ||
337 | temp->nodetype = node->r.nodetype; | ||
338 | temp->offset = cpu_to_je32(ofs); | ||
339 | temp->next = NULL; | ||
340 | |||
341 | return jffs2_sum_add_mem(c->summary, (union jffs2_sum_mem *)temp); | ||
342 | } | ||
343 | #endif | ||
263 | case JFFS2_NODETYPE_PADDING: | 344 | case JFFS2_NODETYPE_PADDING: |
264 | dbg_summary("node PADDING\n"); | 345 | dbg_summary("node PADDING\n"); |
265 | c->summary->sum_padded += je32_to_cpu(node->u.totlen); | 346 | c->summary->sum_padded += je32_to_cpu(node->u.totlen); |
@@ -408,8 +489,94 @@ static int jffs2_sum_process_sum_data(struct jffs2_sb_info *c, struct jffs2_eras | |||
408 | 489 | ||
409 | break; | 490 | break; |
410 | } | 491 | } |
492 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
493 | case JFFS2_NODETYPE_XATTR: { | ||
494 | struct jffs2_xattr_datum *xd; | ||
495 | struct jffs2_sum_xattr_flash *spx; | ||
496 | uint32_t ofs; | ||
497 | |||
498 | spx = (struct jffs2_sum_xattr_flash *)sp; | ||
499 | ofs = jeb->offset + je32_to_cpu(spx->offset); | ||
500 | dbg_summary("xattr at %#08x (xid=%u, version=%u)\n", ofs, | ||
501 | je32_to_cpu(spx->xid), je32_to_cpu(spx->version)); | ||
502 | raw = jffs2_alloc_raw_node_ref(); | ||
503 | if (!raw) { | ||
504 | JFFS2_NOTICE("allocation of node reference failed\n"); | ||
505 | kfree(summary); | ||
506 | return -ENOMEM; | ||
507 | } | ||
508 | xd = jffs2_setup_xattr_datum(c, je32_to_cpu(spx->xid), | ||
509 | je32_to_cpu(spx->version)); | ||
510 | if (IS_ERR(xd)) { | ||
511 | JFFS2_NOTICE("allocation of xattr_datum failed\n"); | ||
512 | jffs2_free_raw_node_ref(raw); | ||
513 | kfree(summary); | ||
514 | return PTR_ERR(xd); | ||
515 | } | ||
516 | xd->node = raw; | ||
411 | 517 | ||
518 | raw->flash_offset = ofs | REF_UNCHECKED; | ||
519 | raw->__totlen = PAD(je32_to_cpu(spx->totlen)); | ||
520 | raw->next_phys = NULL; | ||
521 | raw->next_in_ino = (void *)xd; | ||
522 | if (!jeb->first_node) | ||
523 | jeb->first_node = raw; | ||
524 | if (jeb->last_node) | ||
525 | jeb->last_node->next_phys = raw; | ||
526 | jeb->last_node = raw; | ||
527 | |||
528 | *pseudo_random += je32_to_cpu(spx->xid); | ||
529 | UNCHECKED_SPACE(je32_to_cpu(spx->totlen)); | ||
530 | sp += JFFS2_SUMMARY_XATTR_SIZE; | ||
531 | |||
532 | break; | ||
533 | } | ||
534 | case JFFS2_NODETYPE_XREF: { | ||
535 | struct jffs2_xattr_ref *ref; | ||
536 | struct jffs2_sum_xref_flash *spr; | ||
537 | uint32_t ofs; | ||
538 | |||
539 | spr = (struct jffs2_sum_xref_flash *)sp; | ||
540 | ofs = jeb->offset + je32_to_cpu(spr->offset); | ||
541 | dbg_summary("xref at %#08x (xid=%u, ino=%u)\n", ofs, | ||
542 | je32_to_cpu(spr->xid), je32_to_cpu(spr->ino)); | ||
543 | raw = jffs2_alloc_raw_node_ref(); | ||
544 | if (!raw) { | ||
545 | JFFS2_NOTICE("allocation of node reference failed\n"); | ||
546 | kfree(summary); | ||
547 | return -ENOMEM; | ||
548 | } | ||
549 | ref = jffs2_alloc_xattr_ref(); | ||
550 | if (!ref) { | ||
551 | JFFS2_NOTICE("allocation of xattr_datum failed\n"); | ||
552 | jffs2_free_raw_node_ref(raw); | ||
553 | kfree(summary); | ||
554 | return -ENOMEM; | ||
555 | } | ||
556 | ref->ino = 0xfffffffe; | ||
557 | ref->xid = 0xfffffffd; | ||
558 | ref->node = raw; | ||
559 | list_add_tail(&ref->ilist, &c->xattr_temp); | ||
560 | |||
561 | raw->__totlen = PAD(sizeof(struct jffs2_raw_xref)); | ||
562 | raw->flash_offset = ofs | REF_UNCHECKED; | ||
563 | raw->next_phys = NULL; | ||
564 | raw->next_in_ino = (void *)ref; | ||
565 | if (!jeb->first_node) | ||
566 | jeb->first_node = raw; | ||
567 | if (jeb->last_node) | ||
568 | jeb->last_node->next_phys = raw; | ||
569 | jeb->last_node = raw; | ||
570 | |||
571 | UNCHECKED_SPACE(PAD(sizeof(struct jffs2_raw_xref))); | ||
572 | *pseudo_random += ofs; | ||
573 | sp += JFFS2_SUMMARY_XREF_SIZE; | ||
574 | |||
575 | break; | ||
576 | } | ||
577 | #endif | ||
412 | default : { | 578 | default : { |
579 | printk("nodetype = %#04x\n",je16_to_cpu(((struct jffs2_sum_unknown_flash *)sp)->nodetype)); | ||
413 | JFFS2_WARNING("Unsupported node type found in summary! Exiting..."); | 580 | JFFS2_WARNING("Unsupported node type found in summary! Exiting..."); |
414 | kfree(summary); | 581 | kfree(summary); |
415 | return -EIO; | 582 | return -EIO; |
@@ -617,7 +784,31 @@ static int jffs2_sum_write_data(struct jffs2_sb_info *c, struct jffs2_eraseblock | |||
617 | 784 | ||
618 | break; | 785 | break; |
619 | } | 786 | } |
787 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
788 | case JFFS2_NODETYPE_XATTR: { | ||
789 | struct jffs2_sum_xattr_flash *sxattr_ptr = wpage; | ||
790 | |||
791 | temp = c->summary->sum_list_head; | ||
792 | sxattr_ptr->nodetype = temp->x.nodetype; | ||
793 | sxattr_ptr->xid = temp->x.xid; | ||
794 | sxattr_ptr->version = temp->x.version; | ||
795 | sxattr_ptr->offset = temp->x.offset; | ||
796 | sxattr_ptr->totlen = temp->x.totlen; | ||
797 | |||
798 | wpage += JFFS2_SUMMARY_XATTR_SIZE; | ||
799 | break; | ||
800 | } | ||
801 | case JFFS2_NODETYPE_XREF: { | ||
802 | struct jffs2_sum_xref_flash *sxref_ptr = wpage; | ||
803 | |||
804 | temp = c->summary->sum_list_head; | ||
805 | sxref_ptr->nodetype = temp->r.nodetype; | ||
806 | sxref_ptr->offset = temp->r.offset; | ||
620 | 807 | ||
808 | wpage += JFFS2_SUMMARY_XREF_SIZE; | ||
809 | break; | ||
810 | } | ||
811 | #endif | ||
621 | default : { | 812 | default : { |
622 | BUG(); /* unknown node in summary information */ | 813 | BUG(); /* unknown node in summary information */ |
623 | } | 814 | } |
diff --git a/fs/jffs2/summary.h b/fs/jffs2/summary.h index b7a678be1709..a3b66c18aae9 100644 --- a/fs/jffs2/summary.h +++ b/fs/jffs2/summary.h | |||
@@ -45,6 +45,8 @@ | |||
45 | #define JFFS2_SUMMARY_NOSUM_SIZE 0xffffffff | 45 | #define JFFS2_SUMMARY_NOSUM_SIZE 0xffffffff |
46 | #define JFFS2_SUMMARY_INODE_SIZE (sizeof(struct jffs2_sum_inode_flash)) | 46 | #define JFFS2_SUMMARY_INODE_SIZE (sizeof(struct jffs2_sum_inode_flash)) |
47 | #define JFFS2_SUMMARY_DIRENT_SIZE(x) (sizeof(struct jffs2_sum_dirent_flash) + (x)) | 47 | #define JFFS2_SUMMARY_DIRENT_SIZE(x) (sizeof(struct jffs2_sum_dirent_flash) + (x)) |
48 | #define JFFS2_SUMMARY_XATTR_SIZE (sizeof(struct jffs2_sum_xattr_flash)) | ||
49 | #define JFFS2_SUMMARY_XREF_SIZE (sizeof(struct jffs2_sum_xref_flash)) | ||
48 | 50 | ||
49 | /* Summary structures used on flash */ | 51 | /* Summary structures used on flash */ |
50 | 52 | ||
@@ -75,11 +77,28 @@ struct jffs2_sum_dirent_flash | |||
75 | uint8_t name[0]; /* dirent name */ | 77 | uint8_t name[0]; /* dirent name */ |
76 | } __attribute__((packed)); | 78 | } __attribute__((packed)); |
77 | 79 | ||
80 | struct jffs2_sum_xattr_flash | ||
81 | { | ||
82 | jint16_t nodetype; /* == JFFS2_NODETYPE_XATR */ | ||
83 | jint32_t xid; /* xattr identifier */ | ||
84 | jint32_t version; /* version number */ | ||
85 | jint32_t offset; /* offset on jeb */ | ||
86 | jint32_t totlen; /* node length */ | ||
87 | } __attribute__((packed)); | ||
88 | |||
89 | struct jffs2_sum_xref_flash | ||
90 | { | ||
91 | jint16_t nodetype; /* == JFFS2_NODETYPE_XREF */ | ||
92 | jint32_t offset; /* offset on jeb */ | ||
93 | } __attribute__((packed)); | ||
94 | |||
78 | union jffs2_sum_flash | 95 | union jffs2_sum_flash |
79 | { | 96 | { |
80 | struct jffs2_sum_unknown_flash u; | 97 | struct jffs2_sum_unknown_flash u; |
81 | struct jffs2_sum_inode_flash i; | 98 | struct jffs2_sum_inode_flash i; |
82 | struct jffs2_sum_dirent_flash d; | 99 | struct jffs2_sum_dirent_flash d; |
100 | struct jffs2_sum_xattr_flash x; | ||
101 | struct jffs2_sum_xref_flash r; | ||
83 | }; | 102 | }; |
84 | 103 | ||
85 | /* Summary structures used in the memory */ | 104 | /* Summary structures used in the memory */ |
@@ -114,11 +133,30 @@ struct jffs2_sum_dirent_mem | |||
114 | uint8_t name[0]; /* dirent name */ | 133 | uint8_t name[0]; /* dirent name */ |
115 | } __attribute__((packed)); | 134 | } __attribute__((packed)); |
116 | 135 | ||
136 | struct jffs2_sum_xattr_mem | ||
137 | { | ||
138 | union jffs2_sum_mem *next; | ||
139 | jint16_t nodetype; | ||
140 | jint32_t xid; | ||
141 | jint32_t version; | ||
142 | jint32_t offset; | ||
143 | jint32_t totlen; | ||
144 | } __attribute__((packed)); | ||
145 | |||
146 | struct jffs2_sum_xref_mem | ||
147 | { | ||
148 | union jffs2_sum_mem *next; | ||
149 | jint16_t nodetype; | ||
150 | jint32_t offset; | ||
151 | } __attribute__((packed)); | ||
152 | |||
117 | union jffs2_sum_mem | 153 | union jffs2_sum_mem |
118 | { | 154 | { |
119 | struct jffs2_sum_unknown_mem u; | 155 | struct jffs2_sum_unknown_mem u; |
120 | struct jffs2_sum_inode_mem i; | 156 | struct jffs2_sum_inode_mem i; |
121 | struct jffs2_sum_dirent_mem d; | 157 | struct jffs2_sum_dirent_mem d; |
158 | struct jffs2_sum_xattr_mem x; | ||
159 | struct jffs2_sum_xref_mem r; | ||
122 | }; | 160 | }; |
123 | 161 | ||
124 | /* Summary related information stored in superblock */ | 162 | /* Summary related information stored in superblock */ |
@@ -159,6 +197,8 @@ int jffs2_sum_write_sumnode(struct jffs2_sb_info *c); | |||
159 | int jffs2_sum_add_padding_mem(struct jffs2_summary *s, uint32_t size); | 197 | int jffs2_sum_add_padding_mem(struct jffs2_summary *s, uint32_t size); |
160 | int jffs2_sum_add_inode_mem(struct jffs2_summary *s, struct jffs2_raw_inode *ri, uint32_t ofs); | 198 | int jffs2_sum_add_inode_mem(struct jffs2_summary *s, struct jffs2_raw_inode *ri, uint32_t ofs); |
161 | int jffs2_sum_add_dirent_mem(struct jffs2_summary *s, struct jffs2_raw_dirent *rd, uint32_t ofs); | 199 | int jffs2_sum_add_dirent_mem(struct jffs2_summary *s, struct jffs2_raw_dirent *rd, uint32_t ofs); |
200 | int jffs2_sum_add_xattr_mem(struct jffs2_summary *s, struct jffs2_raw_xattr *rx, uint32_t ofs); | ||
201 | int jffs2_sum_add_xref_mem(struct jffs2_summary *s, struct jffs2_raw_xref *rr, uint32_t ofs); | ||
162 | int jffs2_sum_scan_sumnode(struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, | 202 | int jffs2_sum_scan_sumnode(struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb, |
163 | uint32_t ofs, uint32_t *pseudo_random); | 203 | uint32_t ofs, uint32_t *pseudo_random); |
164 | 204 | ||
@@ -176,6 +216,8 @@ int jffs2_sum_scan_sumnode(struct jffs2_sb_info *c, struct jffs2_eraseblock *jeb | |||
176 | #define jffs2_sum_add_padding_mem(a,b) | 216 | #define jffs2_sum_add_padding_mem(a,b) |
177 | #define jffs2_sum_add_inode_mem(a,b,c) | 217 | #define jffs2_sum_add_inode_mem(a,b,c) |
178 | #define jffs2_sum_add_dirent_mem(a,b,c) | 218 | #define jffs2_sum_add_dirent_mem(a,b,c) |
219 | #define jffs2_sum_add_xattr_mem(a,b,c) | ||
220 | #define jffs2_sum_add_xref_mem(a,b,c) | ||
179 | #define jffs2_sum_scan_sumnode(a,b,c,d) (0) | 221 | #define jffs2_sum_scan_sumnode(a,b,c,d) (0) |
180 | 222 | ||
181 | #endif /* CONFIG_JFFS2_SUMMARY */ | 223 | #endif /* CONFIG_JFFS2_SUMMARY */ |
diff --git a/fs/jffs2/super.c b/fs/jffs2/super.c index ffd8e84b22cc..c8b539ee7d80 100644 --- a/fs/jffs2/super.c +++ b/fs/jffs2/super.c | |||
@@ -151,7 +151,10 @@ static struct super_block *jffs2_get_sb_mtd(struct file_system_type *fs_type, | |||
151 | 151 | ||
152 | sb->s_op = &jffs2_super_operations; | 152 | sb->s_op = &jffs2_super_operations; |
153 | sb->s_flags = flags | MS_NOATIME; | 153 | sb->s_flags = flags | MS_NOATIME; |
154 | 154 | sb->s_xattr = jffs2_xattr_handlers; | |
155 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
156 | sb->s_flags |= MS_POSIXACL; | ||
157 | #endif | ||
155 | ret = jffs2_do_fill_super(sb, data, flags & MS_SILENT ? 1 : 0); | 158 | ret = jffs2_do_fill_super(sb, data, flags & MS_SILENT ? 1 : 0); |
156 | 159 | ||
157 | if (ret) { | 160 | if (ret) { |
@@ -293,6 +296,7 @@ static void jffs2_put_super (struct super_block *sb) | |||
293 | kfree(c->blocks); | 296 | kfree(c->blocks); |
294 | jffs2_flash_cleanup(c); | 297 | jffs2_flash_cleanup(c); |
295 | kfree(c->inocache_list); | 298 | kfree(c->inocache_list); |
299 | jffs2_clear_xattr_subsystem(c); | ||
296 | if (c->mtd->sync) | 300 | if (c->mtd->sync) |
297 | c->mtd->sync(c->mtd); | 301 | c->mtd->sync(c->mtd); |
298 | 302 | ||
diff --git a/fs/jffs2/symlink.c b/fs/jffs2/symlink.c index d55754fe8925..fc211b6e9b03 100644 --- a/fs/jffs2/symlink.c +++ b/fs/jffs2/symlink.c | |||
@@ -24,7 +24,12 @@ struct inode_operations jffs2_symlink_inode_operations = | |||
24 | { | 24 | { |
25 | .readlink = generic_readlink, | 25 | .readlink = generic_readlink, |
26 | .follow_link = jffs2_follow_link, | 26 | .follow_link = jffs2_follow_link, |
27 | .setattr = jffs2_setattr | 27 | .permission = jffs2_permission, |
28 | .setattr = jffs2_setattr, | ||
29 | .setxattr = jffs2_setxattr, | ||
30 | .getxattr = jffs2_getxattr, | ||
31 | .listxattr = jffs2_listxattr, | ||
32 | .removexattr = jffs2_removexattr | ||
28 | }; | 33 | }; |
29 | 34 | ||
30 | static void *jffs2_follow_link(struct dentry *dentry, struct nameidata *nd) | 35 | static void *jffs2_follow_link(struct dentry *dentry, struct nameidata *nd) |
diff --git a/fs/jffs2/write.c b/fs/jffs2/write.c index 1342f0158e9b..d5c78195f3b8 100644 --- a/fs/jffs2/write.c +++ b/fs/jffs2/write.c | |||
@@ -36,7 +36,7 @@ int jffs2_do_new_inode(struct jffs2_sb_info *c, struct jffs2_inode_info *f, uint | |||
36 | f->inocache->nlink = 1; | 36 | f->inocache->nlink = 1; |
37 | f->inocache->nodes = (struct jffs2_raw_node_ref *)f->inocache; | 37 | f->inocache->nodes = (struct jffs2_raw_node_ref *)f->inocache; |
38 | f->inocache->state = INO_STATE_PRESENT; | 38 | f->inocache->state = INO_STATE_PRESENT; |
39 | 39 | init_xattr_inode_cache(f->inocache); | |
40 | 40 | ||
41 | jffs2_add_ino_cache(c, f->inocache); | 41 | jffs2_add_ino_cache(c, f->inocache); |
42 | D1(printk(KERN_DEBUG "jffs2_do_new_inode(): Assigned ino# %d\n", f->inocache->ino)); | 42 | D1(printk(KERN_DEBUG "jffs2_do_new_inode(): Assigned ino# %d\n", f->inocache->ino)); |
diff --git a/fs/jffs2/xattr.c b/fs/jffs2/xattr.c new file mode 100644 index 000000000000..c9a185c54ce7 --- /dev/null +++ b/fs/jffs2/xattr.c | |||
@@ -0,0 +1,1271 @@ | |||
1 | /* ------------------------------------------------------------------------- | ||
2 | * File: fs/jffs2/xattr.c | ||
3 | * XATTR support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | * ------------------------------------------------------------------------- */ | ||
10 | |||
11 | #include <linux/kernel.h> | ||
12 | #include <linux/slab.h> | ||
13 | #include <linux/fs.h> | ||
14 | #include <linux/time.h> | ||
15 | #include <linux/pagemap.h> | ||
16 | #include <linux/highmem.h> | ||
17 | #include <linux/crc32.h> | ||
18 | #include <linux/jffs2.h> | ||
19 | #include <linux/xattr.h> | ||
20 | #include <linux/mtd/mtd.h> | ||
21 | #include "nodelist.h" | ||
22 | /* -------- xdatum related functions ---------------- | ||
23 | * xattr_datum_hashkey(xprefix, xname, xvalue, xsize) | ||
24 | * is used to calcurate xdatum hashkey. The reminder of hashkey into XATTRINDEX_HASHSIZE is | ||
25 | * the index of the xattr name/value pair cache (c->xattrindex). | ||
26 | * unload_xattr_datum(c, xd) | ||
27 | * is used to release xattr name/value pair and detach from c->xattrindex. | ||
28 | * reclaim_xattr_datum(c) | ||
29 | * is used to reclaim xattr name/value pairs on the xattr name/value pair cache when | ||
30 | * memory usage by cache is over c->xdatum_mem_threshold. Currentry, this threshold | ||
31 | * is hard coded as 32KiB. | ||
32 | * delete_xattr_datum_node(c, xd) | ||
33 | * is used to delete a jffs2 node is dominated by xdatum. When EBS(Erase Block Summary) is | ||
34 | * enabled, it overwrites the obsolete node by myself. | ||
35 | * delete_xattr_datum(c, xd) | ||
36 | * is used to delete jffs2_xattr_datum object. It must be called with 0-value of reference | ||
37 | * counter. (It means how many jffs2_xattr_ref object refers this xdatum.) | ||
38 | * do_verify_xattr_datum(c, xd) | ||
39 | * is used to load the xdatum informations without name/value pair from the medium. | ||
40 | * It's necessary once, because those informations are not collected during mounting | ||
41 | * process when EBS is enabled. | ||
42 | * 0 will be returned, if success. An negative return value means recoverable error, and | ||
43 | * positive return value means unrecoverable error. Thus, caller must remove this xdatum | ||
44 | * and xref when it returned positive value. | ||
45 | * do_load_xattr_datum(c, xd) | ||
46 | * is used to load name/value pair from the medium. | ||
47 | * The meanings of return value is same as do_verify_xattr_datum(). | ||
48 | * load_xattr_datum(c, xd) | ||
49 | * is used to be as a wrapper of do_verify_xattr_datum() and do_load_xattr_datum(). | ||
50 | * If xd need to call do_verify_xattr_datum() at first, it's called before calling | ||
51 | * do_load_xattr_datum(). The meanings of return value is same as do_verify_xattr_datum(). | ||
52 | * save_xattr_datum(c, xd, phys_ofs) | ||
53 | * is used to write xdatum to medium. xd->version will be incremented. | ||
54 | * create_xattr_datum(c, xprefix, xname, xvalue, xsize, phys_ofs) | ||
55 | * is used to create new xdatum and write to medium. | ||
56 | * -------------------------------------------------- */ | ||
57 | |||
58 | static uint32_t xattr_datum_hashkey(int xprefix, const char *xname, const char *xvalue, int xsize) | ||
59 | { | ||
60 | int name_len = strlen(xname); | ||
61 | |||
62 | return crc32(xprefix, xname, name_len) ^ crc32(xprefix, xvalue, xsize); | ||
63 | } | ||
64 | |||
65 | static void unload_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
66 | { | ||
67 | /* must be called under down_write(xattr_sem) */ | ||
68 | D1(dbg_xattr("%s: xid=%u, version=%u\n", __FUNCTION__, xd->xid, xd->version)); | ||
69 | if (xd->xname) { | ||
70 | c->xdatum_mem_usage -= (xd->name_len + 1 + xd->value_len); | ||
71 | kfree(xd->xname); | ||
72 | } | ||
73 | |||
74 | list_del_init(&xd->xindex); | ||
75 | xd->hashkey = 0; | ||
76 | xd->xname = NULL; | ||
77 | xd->xvalue = NULL; | ||
78 | } | ||
79 | |||
80 | static void reclaim_xattr_datum(struct jffs2_sb_info *c) | ||
81 | { | ||
82 | /* must be called under down_write(xattr_sem) */ | ||
83 | struct jffs2_xattr_datum *xd, *_xd; | ||
84 | uint32_t target, before; | ||
85 | static int index = 0; | ||
86 | int count; | ||
87 | |||
88 | if (c->xdatum_mem_threshold > c->xdatum_mem_usage) | ||
89 | return; | ||
90 | |||
91 | before = c->xdatum_mem_usage; | ||
92 | target = c->xdatum_mem_usage * 4 / 5; /* 20% reduction */ | ||
93 | for (count = 0; count < XATTRINDEX_HASHSIZE; count++) { | ||
94 | list_for_each_entry_safe(xd, _xd, &c->xattrindex[index], xindex) { | ||
95 | if (xd->flags & JFFS2_XFLAGS_HOT) { | ||
96 | xd->flags &= ~JFFS2_XFLAGS_HOT; | ||
97 | } else if (!(xd->flags & JFFS2_XFLAGS_BIND)) { | ||
98 | unload_xattr_datum(c, xd); | ||
99 | } | ||
100 | if (c->xdatum_mem_usage <= target) | ||
101 | goto out; | ||
102 | } | ||
103 | index = (index+1) % XATTRINDEX_HASHSIZE; | ||
104 | } | ||
105 | out: | ||
106 | JFFS2_NOTICE("xdatum_mem_usage from %u byte to %u byte (%u byte reclaimed)\n", | ||
107 | before, c->xdatum_mem_usage, before - c->xdatum_mem_usage); | ||
108 | } | ||
109 | |||
110 | static void delete_xattr_datum_node(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
111 | { | ||
112 | /* must be called under down_write(xattr_sem) */ | ||
113 | struct jffs2_raw_xattr rx; | ||
114 | uint32_t length; | ||
115 | int rc; | ||
116 | |||
117 | if (!xd->node) { | ||
118 | JFFS2_WARNING("xdatum (xid=%u) is removed twice.\n", xd->xid); | ||
119 | return; | ||
120 | } | ||
121 | if (jffs2_sum_active()) { | ||
122 | memset(&rx, 0xff, sizeof(struct jffs2_raw_xattr)); | ||
123 | rc = jffs2_flash_read(c, ref_offset(xd->node), | ||
124 | sizeof(struct jffs2_unknown_node), | ||
125 | &length, (char *)&rx); | ||
126 | if (rc || length != sizeof(struct jffs2_unknown_node)) { | ||
127 | JFFS2_ERROR("jffs2_flash_read()=%d, req=%u, read=%u at %#08x\n", | ||
128 | rc, sizeof(struct jffs2_unknown_node), | ||
129 | length, ref_offset(xd->node)); | ||
130 | } | ||
131 | rc = jffs2_flash_write(c, ref_offset(xd->node), sizeof(rx), | ||
132 | &length, (char *)&rx); | ||
133 | if (rc || length != sizeof(struct jffs2_raw_xattr)) { | ||
134 | JFFS2_ERROR("jffs2_flash_write()=%d, req=%u, wrote=%u ar %#08x\n", | ||
135 | rc, sizeof(rx), length, ref_offset(xd->node)); | ||
136 | } | ||
137 | } | ||
138 | spin_lock(&c->erase_completion_lock); | ||
139 | xd->node->next_in_ino = NULL; | ||
140 | spin_unlock(&c->erase_completion_lock); | ||
141 | jffs2_mark_node_obsolete(c, xd->node); | ||
142 | xd->node = NULL; | ||
143 | } | ||
144 | |||
145 | static void delete_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
146 | { | ||
147 | /* must be called under down_write(xattr_sem) */ | ||
148 | BUG_ON(xd->refcnt); | ||
149 | |||
150 | unload_xattr_datum(c, xd); | ||
151 | if (xd->node) { | ||
152 | delete_xattr_datum_node(c, xd); | ||
153 | xd->node = NULL; | ||
154 | } | ||
155 | jffs2_free_xattr_datum(xd); | ||
156 | } | ||
157 | |||
158 | static int do_verify_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
159 | { | ||
160 | /* must be called under down_write(xattr_sem) */ | ||
161 | struct jffs2_eraseblock *jeb; | ||
162 | struct jffs2_raw_xattr rx; | ||
163 | size_t readlen; | ||
164 | uint32_t crc, totlen; | ||
165 | int rc; | ||
166 | |||
167 | BUG_ON(!xd->node); | ||
168 | BUG_ON(ref_flags(xd->node) != REF_UNCHECKED); | ||
169 | |||
170 | rc = jffs2_flash_read(c, ref_offset(xd->node), sizeof(rx), &readlen, (char *)&rx); | ||
171 | if (rc || readlen != sizeof(rx)) { | ||
172 | JFFS2_WARNING("jffs2_flash_read()=%d, req=%u, read=%u at %#08x\n", | ||
173 | rc, sizeof(rx), readlen, ref_offset(xd->node)); | ||
174 | return rc ? rc : -EIO; | ||
175 | } | ||
176 | crc = crc32(0, &rx, sizeof(rx) - 4); | ||
177 | if (crc != je32_to_cpu(rx.node_crc)) { | ||
178 | if (je32_to_cpu(rx.node_crc) != 0xffffffff) | ||
179 | JFFS2_ERROR("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", | ||
180 | ref_offset(xd->node), je32_to_cpu(rx.hdr_crc), crc); | ||
181 | return EIO; | ||
182 | } | ||
183 | totlen = PAD(sizeof(rx) + rx.name_len + 1 + je16_to_cpu(rx.value_len)); | ||
184 | if (je16_to_cpu(rx.magic) != JFFS2_MAGIC_BITMASK | ||
185 | || je16_to_cpu(rx.nodetype) != JFFS2_NODETYPE_XATTR | ||
186 | || je32_to_cpu(rx.totlen) != totlen | ||
187 | || je32_to_cpu(rx.xid) != xd->xid | ||
188 | || je32_to_cpu(rx.version) != xd->version) { | ||
189 | JFFS2_ERROR("inconsistent xdatum at %#08x, magic=%#04x/%#04x, " | ||
190 | "nodetype=%#04x/%#04x, totlen=%u/%u, xid=%u/%u, version=%u/%u\n", | ||
191 | ref_offset(xd->node), je16_to_cpu(rx.magic), JFFS2_MAGIC_BITMASK, | ||
192 | je16_to_cpu(rx.nodetype), JFFS2_NODETYPE_XATTR, | ||
193 | je32_to_cpu(rx.totlen), totlen, | ||
194 | je32_to_cpu(rx.xid), xd->xid, | ||
195 | je32_to_cpu(rx.version), xd->version); | ||
196 | return EIO; | ||
197 | } | ||
198 | xd->xprefix = rx.xprefix; | ||
199 | xd->name_len = rx.name_len; | ||
200 | xd->value_len = je16_to_cpu(rx.value_len); | ||
201 | xd->data_crc = je32_to_cpu(rx.data_crc); | ||
202 | |||
203 | /* This JFFS2_NODETYPE_XATTR node is checked */ | ||
204 | jeb = &c->blocks[ref_offset(xd->node) / c->sector_size]; | ||
205 | totlen = PAD(je32_to_cpu(rx.totlen)); | ||
206 | |||
207 | spin_lock(&c->erase_completion_lock); | ||
208 | c->unchecked_size -= totlen; c->used_size += totlen; | ||
209 | jeb->unchecked_size -= totlen; jeb->used_size += totlen; | ||
210 | xd->node->flash_offset = ref_offset(xd->node) | REF_PRISTINE; | ||
211 | spin_unlock(&c->erase_completion_lock); | ||
212 | |||
213 | /* unchecked xdatum is chained with c->xattr_unchecked */ | ||
214 | list_del_init(&xd->xindex); | ||
215 | |||
216 | dbg_xattr("success on verfying xdatum (xid=%u, version=%u)\n", | ||
217 | xd->xid, xd->version); | ||
218 | |||
219 | return 0; | ||
220 | } | ||
221 | |||
222 | static int do_load_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
223 | { | ||
224 | /* must be called under down_write(xattr_sem) */ | ||
225 | char *data; | ||
226 | size_t readlen; | ||
227 | uint32_t crc, length; | ||
228 | int i, ret, retry = 0; | ||
229 | |||
230 | BUG_ON(!xd->node); | ||
231 | BUG_ON(ref_flags(xd->node) != REF_PRISTINE); | ||
232 | BUG_ON(!list_empty(&xd->xindex)); | ||
233 | retry: | ||
234 | length = xd->name_len + 1 + xd->value_len; | ||
235 | data = kmalloc(length, GFP_KERNEL); | ||
236 | if (!data) | ||
237 | return -ENOMEM; | ||
238 | |||
239 | ret = jffs2_flash_read(c, ref_offset(xd->node)+sizeof(struct jffs2_raw_xattr), | ||
240 | length, &readlen, data); | ||
241 | |||
242 | if (ret || length!=readlen) { | ||
243 | JFFS2_WARNING("jffs2_flash_read() returned %d, request=%d, readlen=%d, at %#08x\n", | ||
244 | ret, length, readlen, ref_offset(xd->node)); | ||
245 | kfree(data); | ||
246 | return ret ? ret : -EIO; | ||
247 | } | ||
248 | |||
249 | data[xd->name_len] = '\0'; | ||
250 | crc = crc32(0, data, length); | ||
251 | if (crc != xd->data_crc) { | ||
252 | JFFS2_WARNING("node CRC failed (JFFS2_NODETYPE_XREF)" | ||
253 | " at %#08x, read: 0x%08x calculated: 0x%08x\n", | ||
254 | ref_offset(xd->node), xd->data_crc, crc); | ||
255 | kfree(data); | ||
256 | return EIO; | ||
257 | } | ||
258 | |||
259 | xd->flags |= JFFS2_XFLAGS_HOT; | ||
260 | xd->xname = data; | ||
261 | xd->xvalue = data + xd->name_len+1; | ||
262 | |||
263 | c->xdatum_mem_usage += length; | ||
264 | |||
265 | xd->hashkey = xattr_datum_hashkey(xd->xprefix, xd->xname, xd->xvalue, xd->value_len); | ||
266 | i = xd->hashkey % XATTRINDEX_HASHSIZE; | ||
267 | list_add(&xd->xindex, &c->xattrindex[i]); | ||
268 | if (!retry) { | ||
269 | retry = 1; | ||
270 | reclaim_xattr_datum(c); | ||
271 | if (!xd->xname) | ||
272 | goto retry; | ||
273 | } | ||
274 | |||
275 | dbg_xattr("success on loading xdatum (xid=%u, xprefix=%u, xname='%s')\n", | ||
276 | xd->xid, xd->xprefix, xd->xname); | ||
277 | |||
278 | return 0; | ||
279 | } | ||
280 | |||
281 | static int load_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) | ||
282 | { | ||
283 | /* must be called under down_write(xattr_sem); | ||
284 | * rc < 0 : recoverable error, try again | ||
285 | * rc = 0 : success | ||
286 | * rc > 0 : Unrecoverable error, this node should be deleted. | ||
287 | */ | ||
288 | int rc = 0; | ||
289 | BUG_ON(xd->xname); | ||
290 | if (!xd->node) | ||
291 | return EIO; | ||
292 | if (unlikely(ref_flags(xd->node) != REF_PRISTINE)) { | ||
293 | rc = do_verify_xattr_datum(c, xd); | ||
294 | if (rc > 0) { | ||
295 | list_del_init(&xd->xindex); | ||
296 | delete_xattr_datum_node(c, xd); | ||
297 | } | ||
298 | } | ||
299 | if (!rc) | ||
300 | rc = do_load_xattr_datum(c, xd); | ||
301 | return rc; | ||
302 | } | ||
303 | |||
304 | static int save_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd, uint32_t phys_ofs) | ||
305 | { | ||
306 | /* must be called under down_write(xattr_sem) */ | ||
307 | struct jffs2_raw_xattr rx; | ||
308 | struct jffs2_raw_node_ref *raw; | ||
309 | struct kvec vecs[2]; | ||
310 | uint32_t length; | ||
311 | int rc, totlen; | ||
312 | |||
313 | BUG_ON(!xd->xname); | ||
314 | |||
315 | vecs[0].iov_base = ℞ | ||
316 | vecs[0].iov_len = PAD(sizeof(rx)); | ||
317 | vecs[1].iov_base = xd->xname; | ||
318 | vecs[1].iov_len = xd->name_len + 1 + xd->value_len; | ||
319 | totlen = vecs[0].iov_len + vecs[1].iov_len; | ||
320 | |||
321 | raw = jffs2_alloc_raw_node_ref(); | ||
322 | if (!raw) | ||
323 | return -ENOMEM; | ||
324 | raw->flash_offset = phys_ofs; | ||
325 | raw->__totlen = PAD(totlen); | ||
326 | raw->next_phys = NULL; | ||
327 | raw->next_in_ino = (void *)xd; | ||
328 | |||
329 | /* Setup raw-xattr */ | ||
330 | rx.magic = cpu_to_je16(JFFS2_MAGIC_BITMASK); | ||
331 | rx.nodetype = cpu_to_je16(JFFS2_NODETYPE_XATTR); | ||
332 | rx.totlen = cpu_to_je32(PAD(totlen)); | ||
333 | rx.hdr_crc = cpu_to_je32(crc32(0, &rx, sizeof(struct jffs2_unknown_node) - 4)); | ||
334 | |||
335 | rx.xid = cpu_to_je32(xd->xid); | ||
336 | rx.version = cpu_to_je32(++xd->version); | ||
337 | rx.xprefix = xd->xprefix; | ||
338 | rx.name_len = xd->name_len; | ||
339 | rx.value_len = cpu_to_je16(xd->value_len); | ||
340 | rx.data_crc = cpu_to_je32(crc32(0, vecs[1].iov_base, vecs[1].iov_len)); | ||
341 | rx.node_crc = cpu_to_je32(crc32(0, &rx, sizeof(struct jffs2_raw_xattr) - 4)); | ||
342 | |||
343 | rc = jffs2_flash_writev(c, vecs, 2, phys_ofs, &length, 0); | ||
344 | if (rc || totlen != length) { | ||
345 | JFFS2_WARNING("jffs2_flash_writev()=%d, req=%u, wrote=%u, at %#08x\n", | ||
346 | rc, totlen, length, phys_ofs); | ||
347 | rc = rc ? rc : -EIO; | ||
348 | if (length) { | ||
349 | raw->flash_offset |= REF_OBSOLETE; | ||
350 | raw->next_in_ino = NULL; | ||
351 | jffs2_add_physical_node_ref(c, raw); | ||
352 | jffs2_mark_node_obsolete(c, raw); | ||
353 | } else { | ||
354 | jffs2_free_raw_node_ref(raw); | ||
355 | } | ||
356 | return rc; | ||
357 | } | ||
358 | BUG_ON(raw->__totlen < sizeof(struct jffs2_raw_xattr)); | ||
359 | /* success */ | ||
360 | raw->flash_offset |= REF_PRISTINE; | ||
361 | jffs2_add_physical_node_ref(c, raw); | ||
362 | if (xd->node) | ||
363 | delete_xattr_datum_node(c, xd); | ||
364 | xd->node = raw; | ||
365 | |||
366 | dbg_xattr("success on saving xdatum (xid=%u, version=%u, xprefix=%u, xname='%s')\n", | ||
367 | xd->xid, xd->version, xd->xprefix, xd->xname); | ||
368 | |||
369 | return 0; | ||
370 | } | ||
371 | |||
372 | static struct jffs2_xattr_datum *create_xattr_datum(struct jffs2_sb_info *c, | ||
373 | int xprefix, const char *xname, | ||
374 | const char *xvalue, int xsize, | ||
375 | uint32_t phys_ofs) | ||
376 | { | ||
377 | /* must be called under down_write(xattr_sem) */ | ||
378 | struct jffs2_xattr_datum *xd; | ||
379 | uint32_t hashkey, name_len; | ||
380 | char *data; | ||
381 | int i, rc; | ||
382 | |||
383 | /* Search xattr_datum has same xname/xvalue by index */ | ||
384 | hashkey = xattr_datum_hashkey(xprefix, xname, xvalue, xsize); | ||
385 | i = hashkey % XATTRINDEX_HASHSIZE; | ||
386 | list_for_each_entry(xd, &c->xattrindex[i], xindex) { | ||
387 | if (xd->hashkey==hashkey | ||
388 | && xd->xprefix==xprefix | ||
389 | && xd->value_len==xsize | ||
390 | && !strcmp(xd->xname, xname) | ||
391 | && !memcmp(xd->xvalue, xvalue, xsize)) { | ||
392 | xd->refcnt++; | ||
393 | return xd; | ||
394 | } | ||
395 | } | ||
396 | |||
397 | /* Not found, Create NEW XATTR-Cache */ | ||
398 | name_len = strlen(xname); | ||
399 | |||
400 | xd = jffs2_alloc_xattr_datum(); | ||
401 | if (!xd) | ||
402 | return ERR_PTR(-ENOMEM); | ||
403 | |||
404 | data = kmalloc(name_len + 1 + xsize, GFP_KERNEL); | ||
405 | if (!data) { | ||
406 | jffs2_free_xattr_datum(xd); | ||
407 | return ERR_PTR(-ENOMEM); | ||
408 | } | ||
409 | strcpy(data, xname); | ||
410 | memcpy(data + name_len + 1, xvalue, xsize); | ||
411 | |||
412 | xd->refcnt = 1; | ||
413 | xd->xid = ++c->highest_xid; | ||
414 | xd->flags |= JFFS2_XFLAGS_HOT; | ||
415 | xd->xprefix = xprefix; | ||
416 | |||
417 | xd->hashkey = hashkey; | ||
418 | xd->xname = data; | ||
419 | xd->xvalue = data + name_len + 1; | ||
420 | xd->name_len = name_len; | ||
421 | xd->value_len = xsize; | ||
422 | xd->data_crc = crc32(0, data, xd->name_len + 1 + xd->value_len); | ||
423 | |||
424 | rc = save_xattr_datum(c, xd, phys_ofs); | ||
425 | if (rc) { | ||
426 | kfree(xd->xname); | ||
427 | jffs2_free_xattr_datum(xd); | ||
428 | return ERR_PTR(rc); | ||
429 | } | ||
430 | |||
431 | /* Insert Hash Index */ | ||
432 | i = hashkey % XATTRINDEX_HASHSIZE; | ||
433 | list_add(&xd->xindex, &c->xattrindex[i]); | ||
434 | |||
435 | c->xdatum_mem_usage += (xd->name_len + 1 + xd->value_len); | ||
436 | reclaim_xattr_datum(c); | ||
437 | |||
438 | return xd; | ||
439 | } | ||
440 | |||
441 | /* -------- xdatum related functions ---------------- | ||
442 | * verify_xattr_ref(c, ref) | ||
443 | * is used to load xref information from medium. Because summary data does not | ||
444 | * contain xid/ino, it's necessary to verify once while mounting process. | ||
445 | * delete_xattr_ref_node(c, ref) | ||
446 | * is used to delete a jffs2 node is dominated by xref. When EBS is enabled, | ||
447 | * it overwrites the obsolete node by myself. | ||
448 | * delete_xattr_ref(c, ref) | ||
449 | * is used to delete jffs2_xattr_ref object. If the reference counter of xdatum | ||
450 | * is refered by this xref become 0, delete_xattr_datum() is called later. | ||
451 | * save_xattr_ref(c, ref, phys_ofs) | ||
452 | * is used to write xref to medium. | ||
453 | * create_xattr_ref(c, ic, xd, phys_ofs) | ||
454 | * is used to create a new xref and write to medium. | ||
455 | * jffs2_xattr_delete_inode(c, ic) | ||
456 | * is called to remove xrefs related to obsolete inode when inode is unlinked. | ||
457 | * jffs2_xattr_free_inode(c, ic) | ||
458 | * is called to release xattr related objects when unmounting. | ||
459 | * check_xattr_ref_ilist(c, ic) | ||
460 | * is used to confirm inode does not have duplicate xattr name/value pair. | ||
461 | * -------------------------------------------------- */ | ||
462 | static int verify_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) | ||
463 | { | ||
464 | struct jffs2_eraseblock *jeb; | ||
465 | struct jffs2_raw_xref rr; | ||
466 | size_t readlen; | ||
467 | uint32_t crc, totlen; | ||
468 | int rc; | ||
469 | |||
470 | BUG_ON(ref_flags(ref->node) != REF_UNCHECKED); | ||
471 | |||
472 | rc = jffs2_flash_read(c, ref_offset(ref->node), sizeof(rr), &readlen, (char *)&rr); | ||
473 | if (rc || sizeof(rr) != readlen) { | ||
474 | JFFS2_WARNING("jffs2_flash_read()=%d, req=%u, read=%u, at %#08x\n", | ||
475 | rc, sizeof(rr), readlen, ref_offset(ref->node)); | ||
476 | return rc ? rc : -EIO; | ||
477 | } | ||
478 | /* obsolete node */ | ||
479 | crc = crc32(0, &rr, sizeof(rr) - 4); | ||
480 | if (crc != je32_to_cpu(rr.node_crc)) { | ||
481 | if (je32_to_cpu(rr.node_crc) != 0xffffffff) | ||
482 | JFFS2_ERROR("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", | ||
483 | ref_offset(ref->node), je32_to_cpu(rr.node_crc), crc); | ||
484 | return EIO; | ||
485 | } | ||
486 | if (je16_to_cpu(rr.magic) != JFFS2_MAGIC_BITMASK | ||
487 | || je16_to_cpu(rr.nodetype) != JFFS2_NODETYPE_XREF | ||
488 | || je32_to_cpu(rr.totlen) != PAD(sizeof(rr))) { | ||
489 | JFFS2_ERROR("inconsistent xref at %#08x, magic=%#04x/%#04x, " | ||
490 | "nodetype=%#04x/%#04x, totlen=%u/%u\n", | ||
491 | ref_offset(ref->node), je16_to_cpu(rr.magic), JFFS2_MAGIC_BITMASK, | ||
492 | je16_to_cpu(rr.nodetype), JFFS2_NODETYPE_XREF, | ||
493 | je32_to_cpu(rr.totlen), PAD(sizeof(rr))); | ||
494 | return EIO; | ||
495 | } | ||
496 | ref->ino = je32_to_cpu(rr.ino); | ||
497 | ref->xid = je32_to_cpu(rr.xid); | ||
498 | |||
499 | /* fixup superblock/eraseblock info */ | ||
500 | jeb = &c->blocks[ref_offset(ref->node) / c->sector_size]; | ||
501 | totlen = PAD(sizeof(rr)); | ||
502 | |||
503 | spin_lock(&c->erase_completion_lock); | ||
504 | c->unchecked_size -= totlen; c->used_size += totlen; | ||
505 | jeb->unchecked_size -= totlen; jeb->used_size += totlen; | ||
506 | ref->node->flash_offset = ref_offset(ref->node) | REF_PRISTINE; | ||
507 | spin_unlock(&c->erase_completion_lock); | ||
508 | |||
509 | dbg_xattr("success on verifying xref (ino=%u, xid=%u) at %#08x\n", | ||
510 | ref->ino, ref->xid, ref_offset(ref->node)); | ||
511 | return 0; | ||
512 | } | ||
513 | |||
514 | static void delete_xattr_ref_node(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) | ||
515 | { | ||
516 | struct jffs2_raw_xref rr; | ||
517 | uint32_t length; | ||
518 | int rc; | ||
519 | |||
520 | if (jffs2_sum_active()) { | ||
521 | memset(&rr, 0xff, sizeof(rr)); | ||
522 | rc = jffs2_flash_read(c, ref_offset(ref->node), | ||
523 | sizeof(struct jffs2_unknown_node), | ||
524 | &length, (char *)&rr); | ||
525 | if (rc || length != sizeof(struct jffs2_unknown_node)) { | ||
526 | JFFS2_ERROR("jffs2_flash_read()=%d, req=%u, read=%u at %#08x\n", | ||
527 | rc, sizeof(struct jffs2_unknown_node), | ||
528 | length, ref_offset(ref->node)); | ||
529 | } | ||
530 | rc = jffs2_flash_write(c, ref_offset(ref->node), sizeof(rr), | ||
531 | &length, (char *)&rr); | ||
532 | if (rc || length != sizeof(struct jffs2_raw_xref)) { | ||
533 | JFFS2_ERROR("jffs2_flash_write()=%d, req=%u, wrote=%u at %#08x\n", | ||
534 | rc, sizeof(rr), length, ref_offset(ref->node)); | ||
535 | } | ||
536 | } | ||
537 | spin_lock(&c->erase_completion_lock); | ||
538 | ref->node->next_in_ino = NULL; | ||
539 | spin_unlock(&c->erase_completion_lock); | ||
540 | jffs2_mark_node_obsolete(c, ref->node); | ||
541 | ref->node = NULL; | ||
542 | } | ||
543 | |||
544 | static void delete_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) | ||
545 | { | ||
546 | /* must be called under down_write(xattr_sem) */ | ||
547 | struct jffs2_xattr_datum *xd; | ||
548 | |||
549 | BUG_ON(!ref->node); | ||
550 | delete_xattr_ref_node(c, ref); | ||
551 | |||
552 | list_del(&ref->ilist); | ||
553 | xd = ref->xd; | ||
554 | xd->refcnt--; | ||
555 | if (!xd->refcnt) | ||
556 | delete_xattr_datum(c, xd); | ||
557 | jffs2_free_xattr_ref(ref); | ||
558 | } | ||
559 | |||
560 | static int save_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref, uint32_t phys_ofs) | ||
561 | { | ||
562 | /* must be called under down_write(xattr_sem) */ | ||
563 | struct jffs2_raw_node_ref *raw; | ||
564 | struct jffs2_raw_xref rr; | ||
565 | uint32_t length; | ||
566 | int ret; | ||
567 | |||
568 | raw = jffs2_alloc_raw_node_ref(); | ||
569 | if (!raw) | ||
570 | return -ENOMEM; | ||
571 | raw->flash_offset = phys_ofs; | ||
572 | raw->__totlen = PAD(sizeof(rr)); | ||
573 | raw->next_phys = NULL; | ||
574 | raw->next_in_ino = (void *)ref; | ||
575 | |||
576 | rr.magic = cpu_to_je16(JFFS2_MAGIC_BITMASK); | ||
577 | rr.nodetype = cpu_to_je16(JFFS2_NODETYPE_XREF); | ||
578 | rr.totlen = cpu_to_je32(PAD(sizeof(rr))); | ||
579 | rr.hdr_crc = cpu_to_je32(crc32(0, &rr, sizeof(struct jffs2_unknown_node) - 4)); | ||
580 | |||
581 | rr.ino = cpu_to_je32(ref->ic->ino); | ||
582 | rr.xid = cpu_to_je32(ref->xd->xid); | ||
583 | rr.node_crc = cpu_to_je32(crc32(0, &rr, sizeof(rr) - 4)); | ||
584 | |||
585 | ret = jffs2_flash_write(c, phys_ofs, sizeof(rr), &length, (char *)&rr); | ||
586 | if (ret || sizeof(rr) != length) { | ||
587 | JFFS2_WARNING("jffs2_flash_write() returned %d, request=%u, retlen=%u, at %#08x\n", | ||
588 | ret, sizeof(rr), length, phys_ofs); | ||
589 | ret = ret ? ret : -EIO; | ||
590 | if (length) { | ||
591 | raw->flash_offset |= REF_OBSOLETE; | ||
592 | raw->next_in_ino = NULL; | ||
593 | jffs2_add_physical_node_ref(c, raw); | ||
594 | jffs2_mark_node_obsolete(c, raw); | ||
595 | } else { | ||
596 | jffs2_free_raw_node_ref(raw); | ||
597 | } | ||
598 | return ret; | ||
599 | } | ||
600 | raw->flash_offset |= REF_PRISTINE; | ||
601 | |||
602 | jffs2_add_physical_node_ref(c, raw); | ||
603 | if (ref->node) | ||
604 | delete_xattr_ref_node(c, ref); | ||
605 | ref->node = raw; | ||
606 | |||
607 | dbg_xattr("success on saving xref (ino=%u, xid=%u)\n", ref->ic->ino, ref->xd->xid); | ||
608 | |||
609 | return 0; | ||
610 | } | ||
611 | |||
612 | static struct jffs2_xattr_ref *create_xattr_ref(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic, | ||
613 | struct jffs2_xattr_datum *xd, uint32_t phys_ofs) | ||
614 | { | ||
615 | /* must be called under down_write(xattr_sem) */ | ||
616 | struct jffs2_xattr_ref *ref; | ||
617 | int ret; | ||
618 | |||
619 | ref = jffs2_alloc_xattr_ref(); | ||
620 | if (!ref) | ||
621 | return ERR_PTR(-ENOMEM); | ||
622 | ref->ic = ic; | ||
623 | ref->xd = xd; | ||
624 | |||
625 | ret = save_xattr_ref(c, ref, phys_ofs); | ||
626 | if (ret) { | ||
627 | jffs2_free_xattr_ref(ref); | ||
628 | return ERR_PTR(ret); | ||
629 | } | ||
630 | |||
631 | /* Chain to inode */ | ||
632 | list_add(&ref->ilist, &ic->ilist); | ||
633 | |||
634 | return ref; /* success */ | ||
635 | } | ||
636 | |||
637 | void jffs2_xattr_delete_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) | ||
638 | { | ||
639 | /* It's called from jffs2_clear_inode() on inode removing. | ||
640 | When an inode with XATTR is removed, those XATTRs must be removed. */ | ||
641 | struct jffs2_xattr_ref *ref, *_ref; | ||
642 | |||
643 | if (!ic || ic->nlink > 0) | ||
644 | return; | ||
645 | |||
646 | down_write(&c->xattr_sem); | ||
647 | list_for_each_entry_safe(ref, _ref, &ic->ilist, ilist) | ||
648 | delete_xattr_ref(c, ref); | ||
649 | up_write(&c->xattr_sem); | ||
650 | } | ||
651 | |||
652 | void jffs2_xattr_free_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) | ||
653 | { | ||
654 | /* It's called from jffs2_free_ino_caches() until unmounting FS. */ | ||
655 | struct jffs2_xattr_datum *xd; | ||
656 | struct jffs2_xattr_ref *ref, *_ref; | ||
657 | |||
658 | down_write(&c->xattr_sem); | ||
659 | list_for_each_entry_safe(ref, _ref, &ic->ilist, ilist) { | ||
660 | list_del(&ref->ilist); | ||
661 | xd = ref->xd; | ||
662 | xd->refcnt--; | ||
663 | if (!xd->refcnt) { | ||
664 | unload_xattr_datum(c, xd); | ||
665 | jffs2_free_xattr_datum(xd); | ||
666 | } | ||
667 | jffs2_free_xattr_ref(ref); | ||
668 | } | ||
669 | up_write(&c->xattr_sem); | ||
670 | } | ||
671 | |||
672 | static int check_xattr_ref_ilist(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) | ||
673 | { | ||
674 | /* success of check_xattr_ref_ilist() means taht inode (ic) dose not have | ||
675 | * duplicate name/value pairs. If duplicate name/value pair would be found, | ||
676 | * one will be removed. | ||
677 | */ | ||
678 | struct jffs2_xattr_ref *ref, *cmp; | ||
679 | int rc = 0; | ||
680 | |||
681 | if (likely(ic->flags & INO_FLAGS_XATTR_CHECKED)) | ||
682 | return 0; | ||
683 | down_write(&c->xattr_sem); | ||
684 | retry: | ||
685 | rc = 0; | ||
686 | list_for_each_entry(ref, &ic->ilist, ilist) { | ||
687 | if (!ref->xd->xname) { | ||
688 | rc = load_xattr_datum(c, ref->xd); | ||
689 | if (unlikely(rc > 0)) { | ||
690 | delete_xattr_ref(c, ref); | ||
691 | goto retry; | ||
692 | } else if (unlikely(rc < 0)) | ||
693 | goto out; | ||
694 | } | ||
695 | cmp = ref; | ||
696 | list_for_each_entry_continue(cmp, &ic->ilist, ilist) { | ||
697 | if (!cmp->xd->xname) { | ||
698 | ref->xd->flags |= JFFS2_XFLAGS_BIND; | ||
699 | rc = load_xattr_datum(c, cmp->xd); | ||
700 | ref->xd->flags &= ~JFFS2_XFLAGS_BIND; | ||
701 | if (unlikely(rc > 0)) { | ||
702 | delete_xattr_ref(c, cmp); | ||
703 | goto retry; | ||
704 | } else if (unlikely(rc < 0)) | ||
705 | goto out; | ||
706 | } | ||
707 | if (ref->xd->xprefix == cmp->xd->xprefix | ||
708 | && !strcmp(ref->xd->xname, cmp->xd->xname)) { | ||
709 | delete_xattr_ref(c, cmp); | ||
710 | goto retry; | ||
711 | } | ||
712 | } | ||
713 | } | ||
714 | ic->flags |= INO_FLAGS_XATTR_CHECKED; | ||
715 | out: | ||
716 | up_write(&c->xattr_sem); | ||
717 | |||
718 | return rc; | ||
719 | } | ||
720 | |||
721 | /* -------- xattr subsystem functions --------------- | ||
722 | * jffs2_init_xattr_subsystem(c) | ||
723 | * is used to initialize semaphore and list_head, and some variables. | ||
724 | * jffs2_find_xattr_datum(c, xid) | ||
725 | * is used to lookup xdatum while scanning process. | ||
726 | * jffs2_clear_xattr_subsystem(c) | ||
727 | * is used to release any xattr related objects. | ||
728 | * jffs2_build_xattr_subsystem(c) | ||
729 | * is used to associate xdatum and xref while super block building process. | ||
730 | * jffs2_setup_xattr_datum(c, xid, version) | ||
731 | * is used to insert xdatum while scanning process. | ||
732 | * -------------------------------------------------- */ | ||
733 | void jffs2_init_xattr_subsystem(struct jffs2_sb_info *c) | ||
734 | { | ||
735 | int i; | ||
736 | |||
737 | for (i=0; i < XATTRINDEX_HASHSIZE; i++) | ||
738 | INIT_LIST_HEAD(&c->xattrindex[i]); | ||
739 | INIT_LIST_HEAD(&c->xattr_temp); | ||
740 | INIT_LIST_HEAD(&c->xattr_unchecked); | ||
741 | |||
742 | init_rwsem(&c->xattr_sem); | ||
743 | c->xdatum_mem_usage = 0; | ||
744 | c->xdatum_mem_threshold = 32 * 1024; /* Default 32KB */ | ||
745 | } | ||
746 | |||
747 | static struct jffs2_xattr_datum *jffs2_find_xattr_datum(struct jffs2_sb_info *c, uint32_t xid) | ||
748 | { | ||
749 | struct jffs2_xattr_datum *xd; | ||
750 | int i = xid % XATTRINDEX_HASHSIZE; | ||
751 | |||
752 | /* It's only used in scanning/building process. */ | ||
753 | BUG_ON(!(c->flags & (JFFS2_SB_FLAG_SCANNING|JFFS2_SB_FLAG_BUILDING))); | ||
754 | |||
755 | list_for_each_entry(xd, &c->xattrindex[i], xindex) { | ||
756 | if (xd->xid==xid) | ||
757 | return xd; | ||
758 | } | ||
759 | return NULL; | ||
760 | } | ||
761 | |||
762 | void jffs2_clear_xattr_subsystem(struct jffs2_sb_info *c) | ||
763 | { | ||
764 | struct jffs2_xattr_datum *xd, *_xd; | ||
765 | struct jffs2_xattr_ref *ref, *_ref; | ||
766 | int i; | ||
767 | |||
768 | list_for_each_entry_safe(ref, _ref, &c->xattr_temp, ilist) | ||
769 | jffs2_free_xattr_ref(ref); | ||
770 | |||
771 | for (i=0; i < XATTRINDEX_HASHSIZE; i++) { | ||
772 | list_for_each_entry_safe(xd, _xd, &c->xattrindex[i], xindex) { | ||
773 | list_del(&xd->xindex); | ||
774 | if (xd->xname) | ||
775 | kfree(xd->xname); | ||
776 | jffs2_free_xattr_datum(xd); | ||
777 | } | ||
778 | } | ||
779 | } | ||
780 | |||
781 | void jffs2_build_xattr_subsystem(struct jffs2_sb_info *c) | ||
782 | { | ||
783 | struct jffs2_xattr_ref *ref, *_ref; | ||
784 | struct jffs2_xattr_datum *xd, *_xd; | ||
785 | struct jffs2_inode_cache *ic; | ||
786 | int i, xdatum_count =0, xdatum_unchecked_count = 0, xref_count = 0; | ||
787 | |||
788 | BUG_ON(!(c->flags & JFFS2_SB_FLAG_BUILDING)); | ||
789 | |||
790 | /* Phase.1 */ | ||
791 | list_for_each_entry_safe(ref, _ref, &c->xattr_temp, ilist) { | ||
792 | list_del_init(&ref->ilist); | ||
793 | /* checking REF_UNCHECKED nodes */ | ||
794 | if (ref_flags(ref->node) != REF_PRISTINE) { | ||
795 | if (verify_xattr_ref(c, ref)) { | ||
796 | delete_xattr_ref_node(c, ref); | ||
797 | jffs2_free_xattr_ref(ref); | ||
798 | continue; | ||
799 | } | ||
800 | } | ||
801 | /* At this point, ref->xid and ref->ino contain XID and inode number. | ||
802 | ref->xd and ref->ic are not valid yet. */ | ||
803 | xd = jffs2_find_xattr_datum(c, ref->xid); | ||
804 | ic = jffs2_get_ino_cache(c, ref->ino); | ||
805 | if (!xd || !ic) { | ||
806 | if (ref_flags(ref->node) != REF_UNCHECKED) | ||
807 | JFFS2_WARNING("xref(ino=%u, xid=%u) is orphan. \n", | ||
808 | ref->ino, ref->xid); | ||
809 | delete_xattr_ref_node(c, ref); | ||
810 | jffs2_free_xattr_ref(ref); | ||
811 | continue; | ||
812 | } | ||
813 | ref->xd = xd; | ||
814 | ref->ic = ic; | ||
815 | xd->refcnt++; | ||
816 | list_add_tail(&ref->ilist, &ic->ilist); | ||
817 | xref_count++; | ||
818 | } | ||
819 | /* After this, ref->xid/ino are NEVER used. */ | ||
820 | |||
821 | /* Phase.2 */ | ||
822 | for (i=0; i < XATTRINDEX_HASHSIZE; i++) { | ||
823 | list_for_each_entry_safe(xd, _xd, &c->xattrindex[i], xindex) { | ||
824 | list_del_init(&xd->xindex); | ||
825 | if (!xd->refcnt) { | ||
826 | if (ref_flags(xd->node) != REF_UNCHECKED) | ||
827 | JFFS2_WARNING("orphan xdatum(xid=%u, version=%u) at %#08x\n", | ||
828 | xd->xid, xd->version, ref_offset(xd->node)); | ||
829 | delete_xattr_datum(c, xd); | ||
830 | continue; | ||
831 | } | ||
832 | if (ref_flags(xd->node) != REF_PRISTINE) { | ||
833 | dbg_xattr("unchecked xdatum(xid=%u) at %#08x\n", | ||
834 | xd->xid, ref_offset(xd->node)); | ||
835 | list_add(&xd->xindex, &c->xattr_unchecked); | ||
836 | xdatum_unchecked_count++; | ||
837 | } | ||
838 | xdatum_count++; | ||
839 | } | ||
840 | } | ||
841 | /* build complete */ | ||
842 | JFFS2_NOTICE("complete building xattr subsystem, %u of xdatum (%u unchecked) and " | ||
843 | "%u of xref found.\n", xdatum_count, xdatum_unchecked_count, xref_count); | ||
844 | } | ||
845 | |||
846 | struct jffs2_xattr_datum *jffs2_setup_xattr_datum(struct jffs2_sb_info *c, | ||
847 | uint32_t xid, uint32_t version) | ||
848 | { | ||
849 | struct jffs2_xattr_datum *xd, *_xd; | ||
850 | |||
851 | _xd = jffs2_find_xattr_datum(c, xid); | ||
852 | if (_xd) { | ||
853 | dbg_xattr("duplicate xdatum (xid=%u, version=%u/%u) at %#08x\n", | ||
854 | xid, version, _xd->version, ref_offset(_xd->node)); | ||
855 | if (version < _xd->version) | ||
856 | return ERR_PTR(-EEXIST); | ||
857 | } | ||
858 | xd = jffs2_alloc_xattr_datum(); | ||
859 | if (!xd) | ||
860 | return ERR_PTR(-ENOMEM); | ||
861 | xd->xid = xid; | ||
862 | xd->version = version; | ||
863 | if (xd->xid > c->highest_xid) | ||
864 | c->highest_xid = xd->xid; | ||
865 | list_add_tail(&xd->xindex, &c->xattrindex[xid % XATTRINDEX_HASHSIZE]); | ||
866 | |||
867 | if (_xd) { | ||
868 | list_del_init(&_xd->xindex); | ||
869 | delete_xattr_datum_node(c, _xd); | ||
870 | jffs2_free_xattr_datum(_xd); | ||
871 | } | ||
872 | return xd; | ||
873 | } | ||
874 | |||
875 | /* -------- xattr subsystem functions --------------- | ||
876 | * xprefix_to_handler(xprefix) | ||
877 | * is used to translate xprefix into xattr_handler. | ||
878 | * jffs2_listxattr(dentry, buffer, size) | ||
879 | * is an implementation of listxattr handler on jffs2. | ||
880 | * do_jffs2_getxattr(inode, xprefix, xname, buffer, size) | ||
881 | * is an implementation of getxattr handler on jffs2. | ||
882 | * do_jffs2_setxattr(inode, xprefix, xname, buffer, size, flags) | ||
883 | * is an implementation of setxattr handler on jffs2. | ||
884 | * -------------------------------------------------- */ | ||
885 | struct xattr_handler *jffs2_xattr_handlers[] = { | ||
886 | &jffs2_user_xattr_handler, | ||
887 | #ifdef CONFIG_JFFS2_FS_SECURITY | ||
888 | &jffs2_security_xattr_handler, | ||
889 | #endif | ||
890 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
891 | &jffs2_acl_access_xattr_handler, | ||
892 | &jffs2_acl_default_xattr_handler, | ||
893 | #endif | ||
894 | &jffs2_trusted_xattr_handler, | ||
895 | NULL | ||
896 | }; | ||
897 | |||
898 | static struct xattr_handler *xprefix_to_handler(int xprefix) { | ||
899 | struct xattr_handler *ret; | ||
900 | |||
901 | switch (xprefix) { | ||
902 | case JFFS2_XPREFIX_USER: | ||
903 | ret = &jffs2_user_xattr_handler; | ||
904 | break; | ||
905 | #ifdef CONFIG_JFFS2_FS_SECURITY | ||
906 | case JFFS2_XPREFIX_SECURITY: | ||
907 | ret = &jffs2_security_xattr_handler; | ||
908 | break; | ||
909 | #endif | ||
910 | #ifdef CONFIG_JFFS2_FS_POSIX_ACL | ||
911 | case JFFS2_XPREFIX_ACL_ACCESS: | ||
912 | ret = &jffs2_acl_access_xattr_handler; | ||
913 | break; | ||
914 | case JFFS2_XPREFIX_ACL_DEFAULT: | ||
915 | ret = &jffs2_acl_default_xattr_handler; | ||
916 | break; | ||
917 | #endif | ||
918 | case JFFS2_XPREFIX_TRUSTED: | ||
919 | ret = &jffs2_trusted_xattr_handler; | ||
920 | break; | ||
921 | default: | ||
922 | ret = NULL; | ||
923 | break; | ||
924 | } | ||
925 | return ret; | ||
926 | } | ||
927 | |||
928 | ssize_t jffs2_listxattr(struct dentry *dentry, char *buffer, size_t size) | ||
929 | { | ||
930 | struct inode *inode = dentry->d_inode; | ||
931 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
932 | struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); | ||
933 | struct jffs2_inode_cache *ic = f->inocache; | ||
934 | struct jffs2_xattr_ref *ref; | ||
935 | struct jffs2_xattr_datum *xd; | ||
936 | struct xattr_handler *xhandle; | ||
937 | ssize_t len, rc; | ||
938 | int retry = 0; | ||
939 | |||
940 | rc = check_xattr_ref_ilist(c, ic); | ||
941 | if (unlikely(rc)) | ||
942 | return rc; | ||
943 | |||
944 | down_read(&c->xattr_sem); | ||
945 | retry: | ||
946 | len = 0; | ||
947 | list_for_each_entry(ref, &ic->ilist, ilist) { | ||
948 | BUG_ON(ref->ic != ic); | ||
949 | xd = ref->xd; | ||
950 | if (!xd->xname) { | ||
951 | /* xdatum is unchached */ | ||
952 | if (!retry) { | ||
953 | retry = 1; | ||
954 | up_read(&c->xattr_sem); | ||
955 | down_write(&c->xattr_sem); | ||
956 | goto retry; | ||
957 | } else { | ||
958 | rc = load_xattr_datum(c, xd); | ||
959 | if (unlikely(rc > 0)) { | ||
960 | delete_xattr_ref(c, ref); | ||
961 | goto retry; | ||
962 | } else if (unlikely(rc < 0)) | ||
963 | goto out; | ||
964 | } | ||
965 | } | ||
966 | xhandle = xprefix_to_handler(xd->xprefix); | ||
967 | if (!xhandle) | ||
968 | continue; | ||
969 | if (buffer) { | ||
970 | rc = xhandle->list(inode, buffer+len, size-len, xd->xname, xd->name_len); | ||
971 | } else { | ||
972 | rc = xhandle->list(inode, NULL, 0, xd->xname, xd->name_len); | ||
973 | } | ||
974 | if (rc < 0) | ||
975 | goto out; | ||
976 | len += rc; | ||
977 | } | ||
978 | rc = len; | ||
979 | out: | ||
980 | if (!retry) { | ||
981 | up_read(&c->xattr_sem); | ||
982 | } else { | ||
983 | up_write(&c->xattr_sem); | ||
984 | } | ||
985 | return rc; | ||
986 | } | ||
987 | |||
988 | int do_jffs2_getxattr(struct inode *inode, int xprefix, const char *xname, | ||
989 | char *buffer, size_t size) | ||
990 | { | ||
991 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
992 | struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); | ||
993 | struct jffs2_inode_cache *ic = f->inocache; | ||
994 | struct jffs2_xattr_datum *xd; | ||
995 | struct jffs2_xattr_ref *ref; | ||
996 | int rc, retry = 0; | ||
997 | |||
998 | rc = check_xattr_ref_ilist(c, ic); | ||
999 | if (unlikely(rc)) | ||
1000 | return rc; | ||
1001 | |||
1002 | down_read(&c->xattr_sem); | ||
1003 | retry: | ||
1004 | list_for_each_entry(ref, &ic->ilist, ilist) { | ||
1005 | BUG_ON(ref->ic!=ic); | ||
1006 | |||
1007 | xd = ref->xd; | ||
1008 | if (xd->xprefix != xprefix) | ||
1009 | continue; | ||
1010 | if (!xd->xname) { | ||
1011 | /* xdatum is unchached */ | ||
1012 | if (!retry) { | ||
1013 | retry = 1; | ||
1014 | up_read(&c->xattr_sem); | ||
1015 | down_write(&c->xattr_sem); | ||
1016 | goto retry; | ||
1017 | } else { | ||
1018 | rc = load_xattr_datum(c, xd); | ||
1019 | if (unlikely(rc > 0)) { | ||
1020 | delete_xattr_ref(c, ref); | ||
1021 | goto retry; | ||
1022 | } else if (unlikely(rc < 0)) { | ||
1023 | goto out; | ||
1024 | } | ||
1025 | } | ||
1026 | } | ||
1027 | if (!strcmp(xname, xd->xname)) { | ||
1028 | rc = xd->value_len; | ||
1029 | if (buffer) { | ||
1030 | if (size < rc) { | ||
1031 | rc = -ERANGE; | ||
1032 | } else { | ||
1033 | memcpy(buffer, xd->xvalue, rc); | ||
1034 | } | ||
1035 | } | ||
1036 | goto out; | ||
1037 | } | ||
1038 | } | ||
1039 | rc = -ENODATA; | ||
1040 | out: | ||
1041 | if (!retry) { | ||
1042 | up_read(&c->xattr_sem); | ||
1043 | } else { | ||
1044 | up_write(&c->xattr_sem); | ||
1045 | } | ||
1046 | return rc; | ||
1047 | } | ||
1048 | |||
1049 | int do_jffs2_setxattr(struct inode *inode, int xprefix, const char *xname, | ||
1050 | const char *buffer, size_t size, int flags) | ||
1051 | { | ||
1052 | struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); | ||
1053 | struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); | ||
1054 | struct jffs2_inode_cache *ic = f->inocache; | ||
1055 | struct jffs2_xattr_datum *xd; | ||
1056 | struct jffs2_xattr_ref *ref, *newref; | ||
1057 | uint32_t phys_ofs, length, request; | ||
1058 | int rc; | ||
1059 | |||
1060 | rc = check_xattr_ref_ilist(c, ic); | ||
1061 | if (unlikely(rc)) | ||
1062 | return rc; | ||
1063 | |||
1064 | request = PAD(sizeof(struct jffs2_raw_xattr) + strlen(xname) + 1 + size); | ||
1065 | rc = jffs2_reserve_space(c, request, &phys_ofs, &length, | ||
1066 | ALLOC_NORMAL, JFFS2_SUMMARY_XATTR_SIZE); | ||
1067 | if (rc) { | ||
1068 | JFFS2_WARNING("jffs2_reserve_space()=%d, request=%u\n", rc, request); | ||
1069 | return rc; | ||
1070 | } | ||
1071 | |||
1072 | /* Find existing xattr */ | ||
1073 | down_write(&c->xattr_sem); | ||
1074 | retry: | ||
1075 | list_for_each_entry(ref, &ic->ilist, ilist) { | ||
1076 | xd = ref->xd; | ||
1077 | if (xd->xprefix != xprefix) | ||
1078 | continue; | ||
1079 | if (!xd->xname) { | ||
1080 | rc = load_xattr_datum(c, xd); | ||
1081 | if (unlikely(rc > 0)) { | ||
1082 | delete_xattr_ref(c, ref); | ||
1083 | goto retry; | ||
1084 | } else if (unlikely(rc < 0)) | ||
1085 | goto out; | ||
1086 | } | ||
1087 | if (!strcmp(xd->xname, xname)) { | ||
1088 | if (flags & XATTR_CREATE) { | ||
1089 | rc = -EEXIST; | ||
1090 | goto out; | ||
1091 | } | ||
1092 | if (!buffer) { | ||
1093 | delete_xattr_ref(c, ref); | ||
1094 | rc = 0; | ||
1095 | goto out; | ||
1096 | } | ||
1097 | goto found; | ||
1098 | } | ||
1099 | } | ||
1100 | /* not found */ | ||
1101 | ref = NULL; | ||
1102 | if (flags & XATTR_REPLACE) { | ||
1103 | rc = -ENODATA; | ||
1104 | goto out; | ||
1105 | } | ||
1106 | if (!buffer) { | ||
1107 | rc = -EINVAL; | ||
1108 | goto out; | ||
1109 | } | ||
1110 | found: | ||
1111 | xd = create_xattr_datum(c, xprefix, xname, buffer, size, phys_ofs); | ||
1112 | if (IS_ERR(xd)) { | ||
1113 | rc = PTR_ERR(xd); | ||
1114 | goto out; | ||
1115 | } | ||
1116 | up_write(&c->xattr_sem); | ||
1117 | jffs2_complete_reservation(c); | ||
1118 | |||
1119 | /* create xattr_ref */ | ||
1120 | request = PAD(sizeof(struct jffs2_raw_xref)); | ||
1121 | rc = jffs2_reserve_space(c, request, &phys_ofs, &length, | ||
1122 | ALLOC_NORMAL, JFFS2_SUMMARY_XREF_SIZE); | ||
1123 | if (rc) { | ||
1124 | JFFS2_WARNING("jffs2_reserve_space()=%d, request=%u\n", rc, request); | ||
1125 | down_write(&c->xattr_sem); | ||
1126 | xd->refcnt--; | ||
1127 | if (!xd->refcnt) | ||
1128 | delete_xattr_datum(c, xd); | ||
1129 | up_write(&c->xattr_sem); | ||
1130 | return rc; | ||
1131 | } | ||
1132 | down_write(&c->xattr_sem); | ||
1133 | newref = create_xattr_ref(c, ic, xd, phys_ofs); | ||
1134 | if (IS_ERR(newref)) { | ||
1135 | rc = PTR_ERR(newref); | ||
1136 | xd->refcnt--; | ||
1137 | if (!xd->refcnt) | ||
1138 | delete_xattr_datum(c, xd); | ||
1139 | } else if (ref) { | ||
1140 | /* If replaced xattr_ref exists */ | ||
1141 | delete_xattr_ref(c, ref); | ||
1142 | } | ||
1143 | out: | ||
1144 | up_write(&c->xattr_sem); | ||
1145 | jffs2_complete_reservation(c); | ||
1146 | return rc; | ||
1147 | } | ||
1148 | |||
1149 | /* -------- garbage collector functions ------------- | ||
1150 | * jffs2_garbage_collect_xattr_datum(c, xd) | ||
1151 | * is used to move xdatum into new node. | ||
1152 | * jffs2_garbage_collect_xattr_ref(c, ref) | ||
1153 | * is used to move xref into new node. | ||
1154 | * jffs2_garbage_collect_xattr(c, ic) | ||
1155 | * is used to call appropriate garbage collector function, if argument | ||
1156 | * pointer (ic) is the reference of xdatum/xref. | ||
1157 | * jffs2_verify_xattr(c) | ||
1158 | * is used to call do_verify_xattr_datum() before garbage collecting. | ||
1159 | * -------------------------------------------------- */ | ||
1160 | static int jffs2_garbage_collect_xattr_datum(struct jffs2_sb_info *c, | ||
1161 | struct jffs2_xattr_datum *xd) | ||
1162 | { | ||
1163 | /* must be called under down_write(xattr_sem), and called from GC thread */ | ||
1164 | uint32_t phys_ofs, totlen, length, old_ofs; | ||
1165 | int rc; | ||
1166 | |||
1167 | BUG_ON(!xd->node); | ||
1168 | |||
1169 | old_ofs = ref_offset(xd->node); | ||
1170 | totlen = ref_totlen(c, c->gcblock, xd->node); | ||
1171 | if (totlen < sizeof(struct jffs2_raw_xattr)) | ||
1172 | return -EINVAL; | ||
1173 | |||
1174 | if (!xd->xname) { | ||
1175 | rc = load_xattr_datum(c, xd); | ||
1176 | if (unlikely(rc > 0)) { | ||
1177 | delete_xattr_datum_node(c, xd); | ||
1178 | return 0; | ||
1179 | } else if (unlikely(rc < 0)) | ||
1180 | return -EINVAL; | ||
1181 | } | ||
1182 | rc = jffs2_reserve_space_gc(c, totlen, &phys_ofs, &length, JFFS2_SUMMARY_XATTR_SIZE); | ||
1183 | if (rc || length < totlen) { | ||
1184 | JFFS2_WARNING("jffs2_reserve_space()=%d, request=%u\n", rc, totlen); | ||
1185 | return rc ? rc : -EBADFD; | ||
1186 | } | ||
1187 | rc = save_xattr_datum(c, xd, phys_ofs); | ||
1188 | if (!rc) | ||
1189 | dbg_xattr("xdatum (xid=%u, version=%u) GC'ed from %#08x to %08x\n", | ||
1190 | xd->xid, xd->version, old_ofs, ref_offset(xd->node)); | ||
1191 | return rc; | ||
1192 | } | ||
1193 | |||
1194 | |||
1195 | static int jffs2_garbage_collect_xattr_ref(struct jffs2_sb_info *c, | ||
1196 | struct jffs2_xattr_ref *ref) | ||
1197 | { | ||
1198 | /* must be called under down(alloc_sem) */ | ||
1199 | uint32_t phys_ofs, totlen, length, old_ofs; | ||
1200 | int rc; | ||
1201 | |||
1202 | BUG_ON(!ref->node); | ||
1203 | |||
1204 | old_ofs = ref_offset(ref->node); | ||
1205 | totlen = ref_totlen(c, c->gcblock, ref->node); | ||
1206 | if (totlen != sizeof(struct jffs2_raw_xref)) | ||
1207 | return -EINVAL; | ||
1208 | rc = jffs2_reserve_space_gc(c, totlen, &phys_ofs, &length, JFFS2_SUMMARY_XREF_SIZE); | ||
1209 | if (rc || length < totlen) { | ||
1210 | JFFS2_WARNING("%s: jffs2_reserve_space() = %d, request = %u\n", | ||
1211 | __FUNCTION__, rc, totlen); | ||
1212 | return rc ? rc : -EBADFD; | ||
1213 | } | ||
1214 | rc = save_xattr_ref(c, ref, phys_ofs); | ||
1215 | if (!rc) | ||
1216 | dbg_xattr("xref (ino=%u, xid=%u) GC'ed from %#08x to %08x\n", | ||
1217 | ref->ic->ino, ref->xd->xid, old_ofs, ref_offset(ref->node)); | ||
1218 | return rc; | ||
1219 | } | ||
1220 | |||
1221 | int jffs2_garbage_collect_xattr(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) | ||
1222 | { | ||
1223 | struct jffs2_xattr_datum *xd; | ||
1224 | struct jffs2_xattr_ref *ref; | ||
1225 | int ret; | ||
1226 | |||
1227 | switch (ic->class) { | ||
1228 | case RAWNODE_CLASS_XATTR_DATUM: | ||
1229 | spin_unlock(&c->erase_completion_lock); | ||
1230 | |||
1231 | down_write(&c->xattr_sem); | ||
1232 | xd = (struct jffs2_xattr_datum *)ic; | ||
1233 | ret = xd ? jffs2_garbage_collect_xattr_datum(c, xd) : 0; | ||
1234 | up_write(&c->xattr_sem); | ||
1235 | break; | ||
1236 | case RAWNODE_CLASS_XATTR_REF: | ||
1237 | spin_unlock(&c->erase_completion_lock); | ||
1238 | |||
1239 | down_write(&c->xattr_sem); | ||
1240 | ref = (struct jffs2_xattr_ref *)ic; | ||
1241 | ret = ref ? jffs2_garbage_collect_xattr_ref(c, ref) : 0; | ||
1242 | up_write(&c->xattr_sem); | ||
1243 | break; | ||
1244 | default: | ||
1245 | /* This node is not xattr_datum/xattr_ref */ | ||
1246 | ret = 1; | ||
1247 | break; | ||
1248 | } | ||
1249 | return ret; | ||
1250 | } | ||
1251 | |||
1252 | int jffs2_verify_xattr(struct jffs2_sb_info *c) | ||
1253 | { | ||
1254 | struct jffs2_xattr_datum *xd, *_xd; | ||
1255 | int rc; | ||
1256 | |||
1257 | down_write(&c->xattr_sem); | ||
1258 | list_for_each_entry_safe(xd, _xd, &c->xattr_unchecked, xindex) { | ||
1259 | rc = do_verify_xattr_datum(c, xd); | ||
1260 | if (rc == 0) { | ||
1261 | list_del_init(&xd->xindex); | ||
1262 | break; | ||
1263 | } else if (rc > 0) { | ||
1264 | list_del_init(&xd->xindex); | ||
1265 | delete_xattr_datum_node(c, xd); | ||
1266 | } | ||
1267 | } | ||
1268 | up_write(&c->xattr_sem); | ||
1269 | |||
1270 | return list_empty(&c->xattr_unchecked) ? 1 : 0; | ||
1271 | } | ||
diff --git a/fs/jffs2/xattr.h b/fs/jffs2/xattr.h new file mode 100644 index 000000000000..d157ad641ed4 --- /dev/null +++ b/fs/jffs2/xattr.h | |||
@@ -0,0 +1,120 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/xattr.c | ||
3 | * XATTR support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | |||
11 | #ifndef _JFFS2_FS_XATTR_H_ | ||
12 | #define _JFFS2_FS_XATTR_H_ | ||
13 | |||
14 | #include <linux/xattr.h> | ||
15 | |||
16 | #define JFFS2_XFLAGS_HOT (0x01) /* This datum is HOT */ | ||
17 | #define JFFS2_XFLAGS_BIND (0x02) /* This datum is not reclaimed */ | ||
18 | |||
19 | struct jffs2_xattr_datum | ||
20 | { | ||
21 | void *always_null; | ||
22 | u8 class; | ||
23 | u8 flags; | ||
24 | u16 xprefix; /* see JFFS2_XATTR_PREFIX_* */ | ||
25 | |||
26 | struct jffs2_raw_node_ref *node; | ||
27 | struct list_head xindex; /* chained from c->xattrindex[n] */ | ||
28 | uint32_t refcnt; /* # of xattr_ref refers this */ | ||
29 | uint32_t xid; | ||
30 | uint32_t version; | ||
31 | |||
32 | uint32_t data_crc; | ||
33 | uint32_t hashkey; | ||
34 | char *xname; /* XATTR name without prefix */ | ||
35 | uint32_t name_len; /* length of xname */ | ||
36 | char *xvalue; /* XATTR value */ | ||
37 | uint32_t value_len; /* length of xvalue */ | ||
38 | }; | ||
39 | |||
40 | struct jffs2_inode_cache; /* forward refence */ | ||
41 | struct jffs2_xattr_ref | ||
42 | { | ||
43 | void *always_null; | ||
44 | u8 class; | ||
45 | u8 flags; /* Currently unused */ | ||
46 | u16 unused; | ||
47 | |||
48 | struct jffs2_raw_node_ref *node; | ||
49 | union { | ||
50 | struct jffs2_inode_cache *ic; /* reference to jffs2_inode_cache */ | ||
51 | uint32_t ino; /* only used in scanning/building */ | ||
52 | }; | ||
53 | union { | ||
54 | struct jffs2_xattr_datum *xd; /* reference to jffs2_xattr_datum */ | ||
55 | uint32_t xid; /* only used in sccanning/building */ | ||
56 | }; | ||
57 | struct list_head ilist; /* chained from ic->ilist */ | ||
58 | }; | ||
59 | |||
60 | #ifdef CONFIG_JFFS2_FS_XATTR | ||
61 | |||
62 | extern void jffs2_init_xattr_subsystem(struct jffs2_sb_info *c); | ||
63 | extern void jffs2_build_xattr_subsystem(struct jffs2_sb_info *c); | ||
64 | extern void jffs2_clear_xattr_subsystem(struct jffs2_sb_info *c); | ||
65 | |||
66 | extern struct jffs2_xattr_datum *jffs2_setup_xattr_datum(struct jffs2_sb_info *c, | ||
67 | uint32_t xid, uint32_t version); | ||
68 | |||
69 | extern void jffs2_xattr_delete_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic); | ||
70 | extern void jffs2_xattr_free_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic); | ||
71 | |||
72 | extern int jffs2_garbage_collect_xattr(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic); | ||
73 | extern int jffs2_verify_xattr(struct jffs2_sb_info *c); | ||
74 | |||
75 | extern int do_jffs2_getxattr(struct inode *inode, int xprefix, const char *xname, | ||
76 | char *buffer, size_t size); | ||
77 | extern int do_jffs2_setxattr(struct inode *inode, int xprefix, const char *xname, | ||
78 | const char *buffer, size_t size, int flags); | ||
79 | |||
80 | extern struct xattr_handler *jffs2_xattr_handlers[]; | ||
81 | extern struct xattr_handler jffs2_user_xattr_handler; | ||
82 | extern struct xattr_handler jffs2_trusted_xattr_handler; | ||
83 | |||
84 | extern ssize_t jffs2_listxattr(struct dentry *, char *, size_t); | ||
85 | #define jffs2_getxattr generic_getxattr | ||
86 | #define jffs2_setxattr generic_setxattr | ||
87 | #define jffs2_removexattr generic_removexattr | ||
88 | |||
89 | /*---- Any inline initialize functions ----*/ | ||
90 | #define init_xattr_inode_cache(x) INIT_LIST_HEAD(&((x)->ilist)) | ||
91 | |||
92 | #else | ||
93 | |||
94 | #define jffs2_init_xattr_subsystem(c) | ||
95 | #define jffs2_build_xattr_subsystem(c) | ||
96 | #define jffs2_clear_xattr_subsystem(c) | ||
97 | |||
98 | #define jffs2_xattr_delete_inode(c, ic) | ||
99 | #define jffs2_xattr_free_inode(c, ic) | ||
100 | #define jffs2_garbage_collect_xattr(c, ic) (1) | ||
101 | #define jffs2_verify_xattr(c) (1) | ||
102 | |||
103 | #define jffs2_xattr_handlers NULL | ||
104 | #define jffs2_listxattr NULL | ||
105 | #define jffs2_getxattr NULL | ||
106 | #define jffs2_setxattr NULL | ||
107 | #define jffs2_removexattr NULL | ||
108 | |||
109 | #define init_xattr_inode_cache(x) | ||
110 | |||
111 | #endif /* CONFIG_JFFS2_FS_XATTR */ | ||
112 | |||
113 | #ifdef CONFIG_JFFS2_FS_SECURITY | ||
114 | extern int jffs2_init_security(struct inode *inode, struct inode *dir); | ||
115 | extern struct xattr_handler jffs2_security_xattr_handler; | ||
116 | #else | ||
117 | #define jffs2_init_security(inode,dir) (0) | ||
118 | #endif /* CONFIG_JFFS2_FS_SECURITY */ | ||
119 | |||
120 | #endif /* _JFFS2_FS_XATTR_H_ */ | ||
diff --git a/fs/jffs2/xattr_trusted.c b/fs/jffs2/xattr_trusted.c new file mode 100644 index 000000000000..a018c9c31a60 --- /dev/null +++ b/fs/jffs2/xattr_trusted.c | |||
@@ -0,0 +1,51 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/xattr_trusted.c | ||
3 | * XATTR support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | #include <linux/kernel.h> | ||
11 | #include <linux/fs.h> | ||
12 | #include <linux/jffs2.h> | ||
13 | #include <linux/xattr.h> | ||
14 | #include <linux/mtd/mtd.h> | ||
15 | #include "nodelist.h" | ||
16 | |||
17 | static int jffs2_trusted_getxattr(struct inode *inode, const char *name, | ||
18 | void *buffer, size_t size) | ||
19 | { | ||
20 | if (!strcmp(name, "")) | ||
21 | return -EINVAL; | ||
22 | return do_jffs2_getxattr(inode, JFFS2_XPREFIX_TRUSTED, name, buffer, size); | ||
23 | } | ||
24 | |||
25 | static int jffs2_trusted_setxattr(struct inode *inode, const char *name, const void *buffer, | ||
26 | size_t size, int flags) | ||
27 | { | ||
28 | if (!strcmp(name, "")) | ||
29 | return -EINVAL; | ||
30 | return do_jffs2_setxattr(inode, JFFS2_XPREFIX_TRUSTED, name, buffer, size, flags); | ||
31 | } | ||
32 | |||
33 | static size_t jffs2_trusted_listxattr(struct inode *inode, char *list, size_t list_size, | ||
34 | const char *name, size_t name_len) | ||
35 | { | ||
36 | size_t retlen = XATTR_TRUSTED_PREFIX_LEN + name_len + 1; | ||
37 | |||
38 | if (list && retlen<=list_size) { | ||
39 | strcpy(list, XATTR_TRUSTED_PREFIX); | ||
40 | strcpy(list + XATTR_TRUSTED_PREFIX_LEN, name); | ||
41 | } | ||
42 | |||
43 | return retlen; | ||
44 | } | ||
45 | |||
46 | struct xattr_handler jffs2_trusted_xattr_handler = { | ||
47 | .prefix = XATTR_TRUSTED_PREFIX, | ||
48 | .list = jffs2_trusted_listxattr, | ||
49 | .set = jffs2_trusted_setxattr, | ||
50 | .get = jffs2_trusted_getxattr | ||
51 | }; | ||
diff --git a/fs/jffs2/xattr_user.c b/fs/jffs2/xattr_user.c new file mode 100644 index 000000000000..d8c13636ea4c --- /dev/null +++ b/fs/jffs2/xattr_user.c | |||
@@ -0,0 +1,51 @@ | |||
1 | /*-------------------------------------------------------------------------* | ||
2 | * File: fs/jffs2/xattr_user.c | ||
3 | * XATTR support on JFFS2 FileSystem | ||
4 | * | ||
5 | * Implemented by KaiGai Kohei <kaigai@ak.jp.nec.com> | ||
6 | * Copyright (C) 2006 NEC Corporation | ||
7 | * | ||
8 | * For licensing information, see the file 'LICENCE' in the jffs2 directory. | ||
9 | *-------------------------------------------------------------------------*/ | ||
10 | #include <linux/kernel.h> | ||
11 | #include <linux/fs.h> | ||
12 | #include <linux/jffs2.h> | ||
13 | #include <linux/xattr.h> | ||
14 | #include <linux/mtd/mtd.h> | ||
15 | #include "nodelist.h" | ||
16 | |||
17 | static int jffs2_user_getxattr(struct inode *inode, const char *name, | ||
18 | void *buffer, size_t size) | ||
19 | { | ||
20 | if (!strcmp(name, "")) | ||
21 | return -EINVAL; | ||
22 | return do_jffs2_getxattr(inode, JFFS2_XPREFIX_USER, name, buffer, size); | ||
23 | } | ||
24 | |||
25 | static int jffs2_user_setxattr(struct inode *inode, const char *name, const void *buffer, | ||
26 | size_t size, int flags) | ||
27 | { | ||
28 | if (!strcmp(name, "")) | ||
29 | return -EINVAL; | ||
30 | return do_jffs2_setxattr(inode, JFFS2_XPREFIX_USER, name, buffer, size, flags); | ||
31 | } | ||
32 | |||
33 | static size_t jffs2_user_listxattr(struct inode *inode, char *list, size_t list_size, | ||
34 | const char *name, size_t name_len) | ||
35 | { | ||
36 | size_t retlen = XATTR_USER_PREFIX_LEN + name_len + 1; | ||
37 | |||
38 | if (list && retlen <= list_size) { | ||
39 | strcpy(list, XATTR_USER_PREFIX); | ||
40 | strcpy(list + XATTR_USER_PREFIX_LEN, name); | ||
41 | } | ||
42 | |||
43 | return retlen; | ||
44 | } | ||
45 | |||
46 | struct xattr_handler jffs2_user_xattr_handler = { | ||
47 | .prefix = XATTR_USER_PREFIX, | ||
48 | .list = jffs2_user_listxattr, | ||
49 | .set = jffs2_user_setxattr, | ||
50 | .get = jffs2_user_getxattr | ||
51 | }; | ||
diff --git a/include/linux/jffs2.h b/include/linux/jffs2.h index cf792bb3c726..2cac60e55322 100644 --- a/include/linux/jffs2.h +++ b/include/linux/jffs2.h | |||
@@ -65,6 +65,18 @@ | |||
65 | 65 | ||
66 | #define JFFS2_NODETYPE_SUMMARY (JFFS2_FEATURE_RWCOMPAT_DELETE | JFFS2_NODE_ACCURATE | 6) | 66 | #define JFFS2_NODETYPE_SUMMARY (JFFS2_FEATURE_RWCOMPAT_DELETE | JFFS2_NODE_ACCURATE | 6) |
67 | 67 | ||
68 | #define JFFS2_NODETYPE_XATTR (JFFS2_FEATURE_INCOMPAT | JFFS2_NODE_ACCURATE | 8) | ||
69 | #define JFFS2_NODETYPE_XREF (JFFS2_FEATURE_INCOMPAT | JFFS2_NODE_ACCURATE | 9) | ||
70 | |||
71 | /* XATTR Related */ | ||
72 | #define JFFS2_XPREFIX_USER 1 /* for "user." */ | ||
73 | #define JFFS2_XPREFIX_SECURITY 2 /* for "security." */ | ||
74 | #define JFFS2_XPREFIX_ACL_ACCESS 3 /* for "system.posix_acl_access" */ | ||
75 | #define JFFS2_XPREFIX_ACL_DEFAULT 4 /* for "system.posix_acl_default" */ | ||
76 | #define JFFS2_XPREFIX_TRUSTED 5 /* for "trusted.*" */ | ||
77 | |||
78 | #define JFFS2_ACL_VERSION 0x0001 | ||
79 | |||
68 | // Maybe later... | 80 | // Maybe later... |
69 | //#define JFFS2_NODETYPE_CHECKPOINT (JFFS2_FEATURE_RWCOMPAT_DELETE | JFFS2_NODE_ACCURATE | 3) | 81 | //#define JFFS2_NODETYPE_CHECKPOINT (JFFS2_FEATURE_RWCOMPAT_DELETE | JFFS2_NODE_ACCURATE | 3) |
70 | //#define JFFS2_NODETYPE_OPTIONS (JFFS2_FEATURE_RWCOMPAT_COPY | JFFS2_NODE_ACCURATE | 4) | 82 | //#define JFFS2_NODETYPE_OPTIONS (JFFS2_FEATURE_RWCOMPAT_COPY | JFFS2_NODE_ACCURATE | 4) |
@@ -151,6 +163,32 @@ struct jffs2_raw_inode | |||
151 | uint8_t data[0]; | 163 | uint8_t data[0]; |
152 | } __attribute__((packed)); | 164 | } __attribute__((packed)); |
153 | 165 | ||
166 | struct jffs2_raw_xattr { | ||
167 | jint16_t magic; | ||
168 | jint16_t nodetype; /* = JFFS2_NODETYPE_XATTR */ | ||
169 | jint32_t totlen; | ||
170 | jint32_t hdr_crc; | ||
171 | jint32_t xid; /* XATTR identifier number */ | ||
172 | jint32_t version; | ||
173 | uint8_t xprefix; | ||
174 | uint8_t name_len; | ||
175 | jint16_t value_len; | ||
176 | jint32_t data_crc; | ||
177 | jint32_t node_crc; | ||
178 | uint8_t data[0]; | ||
179 | } __attribute__((packed)); | ||
180 | |||
181 | struct jffs2_raw_xref | ||
182 | { | ||
183 | jint16_t magic; | ||
184 | jint16_t nodetype; /* = JFFS2_NODETYPE_XREF */ | ||
185 | jint32_t totlen; | ||
186 | jint32_t hdr_crc; | ||
187 | jint32_t ino; /* inode number */ | ||
188 | jint32_t xid; /* XATTR identifier number */ | ||
189 | jint32_t node_crc; | ||
190 | } __attribute__((packed)); | ||
191 | |||
154 | struct jffs2_raw_summary | 192 | struct jffs2_raw_summary |
155 | { | 193 | { |
156 | jint16_t magic; | 194 | jint16_t magic; |
@@ -169,6 +207,8 @@ union jffs2_node_union | |||
169 | { | 207 | { |
170 | struct jffs2_raw_inode i; | 208 | struct jffs2_raw_inode i; |
171 | struct jffs2_raw_dirent d; | 209 | struct jffs2_raw_dirent d; |
210 | struct jffs2_raw_xattr x; | ||
211 | struct jffs2_raw_xref r; | ||
172 | struct jffs2_raw_summary s; | 212 | struct jffs2_raw_summary s; |
173 | struct jffs2_unknown_node u; | 213 | struct jffs2_unknown_node u; |
174 | }; | 214 | }; |