Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 6c17675e authored by Jeff Mahoney's avatar Jeff Mahoney Committed by Linus Torvalds
Browse files

reiserfs: simplify xattr internal file lookups/opens



The xattr file open/lookup code is needlessly complex.  We can use
vfs-level operations to perform the same work, and also simplify the
locking constraints.  The locking advantages will be exploited in future
patches.

Signed-off-by: default avatarJeff Mahoney <jeffm@suse.com>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent a72bdb1c
Loading
Loading
Loading
Loading
+135 −127
Original line number Original line Diff line number Diff line
@@ -44,100 +44,123 @@
#include <net/checksum.h>
#include <net/checksum.h>
#include <linux/smp_lock.h>
#include <linux/smp_lock.h>
#include <linux/stat.h>
#include <linux/stat.h>
#include <linux/quotaops.h>


#define FL_READONLY 128
#define FL_DIR_SEM_HELD 256
#define PRIVROOT_NAME ".reiserfs_priv"
#define PRIVROOT_NAME ".reiserfs_priv"
#define XAROOT_NAME   "xattrs"
#define XAROOT_NAME   "xattrs"


/* Returns the dentry referring to the root of the extended attribute
/* Helpers for inode ops. We do this so that we don't have all the VFS
 * directory tree. If it has already been retrieved, it is used. If it
 * overhead and also for proper i_mutex annotation.
 * hasn't been created and the flags indicate creation is allowed, we
 * dir->i_mutex must be held for all of them. */
 * attempt to create it. On error, we return a pointer-encoded error.
static int xattr_create(struct inode *dir, struct dentry *dentry, int mode)
 */
static struct dentry *get_xa_root(struct super_block *sb, int flags)
{
{
	struct dentry *privroot = dget(REISERFS_SB(sb)->priv_root);
	BUG_ON(!mutex_is_locked(&dir->i_mutex));
	struct dentry *xaroot;
	DQUOT_INIT(dir);
	return dir->i_op->create(dir, dentry, mode, NULL);
}


	/* This needs to be created at mount-time */
static int xattr_mkdir(struct inode *dir, struct dentry *dentry, int mode)
	if (!privroot)
{
		return ERR_PTR(-ENODATA);
	BUG_ON(!mutex_is_locked(&dir->i_mutex));
	DQUOT_INIT(dir);
	return dir->i_op->mkdir(dir, dentry, mode);
}


	mutex_lock_nested(&privroot->d_inode->i_mutex, I_MUTEX_XATTR);
/* We use I_MUTEX_CHILD here to silence lockdep. It's safe because xattr
	if (REISERFS_SB(sb)->xattr_root) {
 * mutation ops aren't called during rename or splace, which are the
		xaroot = dget(REISERFS_SB(sb)->xattr_root);
 * only other users of I_MUTEX_CHILD. It violates the ordering, but that's
		goto out;
 * better than allocating another subclass just for this code. */
static int xattr_unlink(struct inode *dir, struct dentry *dentry)
{
	int error;
	BUG_ON(!mutex_is_locked(&dir->i_mutex));
	DQUOT_INIT(dir);

	mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_CHILD);
	error = dir->i_op->unlink(dir, dentry);
	mutex_unlock(&dentry->d_inode->i_mutex);

	if (!error)
		d_delete(dentry);
	return error;
}
}


	xaroot = lookup_one_len(XAROOT_NAME, privroot, strlen(XAROOT_NAME));
static int xattr_rmdir(struct inode *dir, struct dentry *dentry)
	if (IS_ERR(xaroot)) {
{
		goto out;
	int error;
	} else if (!xaroot->d_inode) {
	BUG_ON(!mutex_is_locked(&dir->i_mutex));
	DQUOT_INIT(dir);

	mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_CHILD);
	dentry_unhash(dentry);
	error = dir->i_op->rmdir(dir, dentry);
	if (!error)
		dentry->d_inode->i_flags |= S_DEAD;
	mutex_unlock(&dentry->d_inode->i_mutex);
	if (!error)
		d_delete(dentry);
	dput(dentry);

	return error;
}


#define xattr_may_create(flags)	(!flags || flags & XATTR_CREATE)

/* Returns and possibly creates the xattr dir. */
static struct dentry *lookup_or_create_dir(struct dentry *parent,
					    const char *name, int flags)
{
	struct dentry *dentry;
	BUG_ON(!parent);

	dentry = lookup_one_len(name, parent, strlen(name));
	if (IS_ERR(dentry))
		return dentry;
	else if (!dentry->d_inode) {
		int err = -ENODATA;
		int err = -ENODATA;
		if (flags == 0 || flags & XATTR_CREATE)

			err = privroot->d_inode->i_op->mkdir(privroot->d_inode,
		if (xattr_may_create(flags)) {
			                                     xaroot, 0700);
			mutex_lock_nested(&parent->d_inode->i_mutex,
					  I_MUTEX_XATTR);
			err = xattr_mkdir(parent->d_inode, dentry, 0700);
			mutex_unlock(&parent->d_inode->i_mutex);
		}

		if (err) {
		if (err) {
			dput(xaroot);
			dput(dentry);
			xaroot = ERR_PTR(err);
			dentry = ERR_PTR(err);
			goto out;
		}
		}
	}
	}
	REISERFS_SB(sb)->xattr_root = dget(xaroot);


      out:
	return dentry;
	mutex_unlock(&privroot->d_inode->i_mutex);
}
	dput(privroot);

	return xaroot;
static struct dentry *open_xa_root(struct super_block *sb, int flags)
{
	struct dentry *privroot = REISERFS_SB(sb)->priv_root;
	if (!privroot)
		return ERR_PTR(-ENODATA);
	return lookup_or_create_dir(privroot, XAROOT_NAME, flags);
}
}


/* Opens the directory corresponding to the inode's extended attribute store.
 * If flags allow, the tree to the directory may be created. If creation is
 * prohibited, -ENODATA is returned. */
static struct dentry *open_xa_dir(const struct inode *inode, int flags)
static struct dentry *open_xa_dir(const struct inode *inode, int flags)
{
{
	struct dentry *xaroot, *xadir;
	struct dentry *xaroot, *xadir;
	char namebuf[17];
	char namebuf[17];


	xaroot = get_xa_root(inode->i_sb, flags);
	xaroot = open_xa_root(inode->i_sb, flags);
	if (IS_ERR(xaroot))
	if (IS_ERR(xaroot))
		return xaroot;
		return xaroot;


	/* ok, we have xaroot open */
	snprintf(namebuf, sizeof(namebuf), "%X.%X",
	snprintf(namebuf, sizeof(namebuf), "%X.%X",
		 le32_to_cpu(INODE_PKEY(inode)->k_objectid),
		 le32_to_cpu(INODE_PKEY(inode)->k_objectid),
		 inode->i_generation);
		 inode->i_generation);
	xadir = lookup_one_len(namebuf, xaroot, strlen(namebuf));
	if (IS_ERR(xadir)) {
		dput(xaroot);
		return xadir;
	}

	if (!xadir->d_inode) {
		int err;
		if (flags == 0 || flags & XATTR_CREATE) {
			/* Although there is nothing else trying to create this directory,
			 * another directory with the same hash may be created, so we need
			 * to protect against that */
			err =
			    xaroot->d_inode->i_op->mkdir(xaroot->d_inode, xadir,
							 0700);
			if (err) {
				dput(xaroot);
				dput(xadir);
				return ERR_PTR(err);
			}
		}
		if (!xadir->d_inode) {
			dput(xaroot);
			dput(xadir);
			return ERR_PTR(-ENODATA);
		}
	}


	xadir = lookup_or_create_dir(xaroot, namebuf, flags);
	dput(xaroot);
	dput(xaroot);
	return xadir;
	return xadir;

}
}


/*
/*
@@ -302,13 +325,11 @@ static
int xattr_readdir(struct inode *inode, filldir_t filler, void *buf)
int xattr_readdir(struct inode *inode, filldir_t filler, void *buf)
{
{
	int res = -ENOENT;
	int res = -ENOENT;
	mutex_lock_nested(&inode->i_mutex, I_MUTEX_XATTR);
	if (!IS_DEADDIR(inode)) {
	if (!IS_DEADDIR(inode)) {
		lock_kernel();
		lock_kernel();
		res = __xattr_readdir(inode, buf, filler);
		res = __xattr_readdir(inode, buf, filler);
		unlock_kernel();
		unlock_kernel();
	}
	}
	mutex_unlock(&inode->i_mutex);
	return res;
	return res;
}
}


@@ -345,9 +366,7 @@ __reiserfs_xattr_del(struct dentry *xadir, const char *name, int namelen)
		return -EIO;
		return -EIO;
	}
	}


	err = dir->i_op->unlink(dir, dentry);
	err = xattr_unlink(dir, dentry);
	if (!err)
		d_delete(dentry);


out_file:
out_file:
	dput(dentry);
	dput(dentry);
@@ -381,7 +400,7 @@ int reiserfs_delete_xattrs(struct inode *inode)
		return 0;
		return 0;


	reiserfs_read_lock_xattrs(inode->i_sb);
	reiserfs_read_lock_xattrs(inode->i_sb);
	dir = open_xa_dir(inode, FL_READONLY);
	dir = open_xa_dir(inode, XATTR_REPLACE);
	reiserfs_read_unlock_xattrs(inode->i_sb);
	reiserfs_read_unlock_xattrs(inode->i_sb);
	if (IS_ERR(dir)) {
	if (IS_ERR(dir)) {
		err = PTR_ERR(dir);
		err = PTR_ERR(dir);
@@ -391,25 +410,25 @@ int reiserfs_delete_xattrs(struct inode *inode)
		return 0;
		return 0;
	}
	}


	lock_kernel();
	mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
	err = xattr_readdir(dir->d_inode, reiserfs_delete_xattrs_filler, dir);
	err = xattr_readdir(dir->d_inode, reiserfs_delete_xattrs_filler, dir);
	if (err) {
	mutex_unlock(&dir->d_inode->i_mutex);
		unlock_kernel();
	if (err)
		goto out_dir;
		goto out_dir;
	}


	/* Leftovers besides . and .. -- that's not good. */
	/* Leftovers besides . and .. -- that's not good. */
	if (dir->d_inode->i_nlink <= 2) {
	if (dir->d_inode->i_nlink <= 2) {
		root = get_xa_root(inode->i_sb, XATTR_REPLACE);
		root = open_xa_root(inode->i_sb, XATTR_REPLACE);
		reiserfs_write_lock_xattrs(inode->i_sb);
		reiserfs_write_lock_xattrs(inode->i_sb);
		err = vfs_rmdir(root->d_inode, dir);
		mutex_lock_nested(&root->d_inode->i_mutex, I_MUTEX_XATTR);
		err = xattr_rmdir(root->d_inode, dir);
		mutex_unlock(&root->d_inode->i_mutex);
		reiserfs_write_unlock_xattrs(inode->i_sb);
		reiserfs_write_unlock_xattrs(inode->i_sb);
		dput(root);
		dput(root);
	} else {
	} else {
		reiserfs_warning(inode->i_sb, "jdm-20006",
		reiserfs_warning(inode->i_sb, "jdm-20006",
				 "Couldn't remove all entries in directory");
				 "Couldn't remove all entries in directory");
	}
	}
	unlock_kernel();


out_dir:
out_dir:
	dput(dir);
	dput(dir);
@@ -445,8 +464,11 @@ reiserfs_chown_xattrs_filler(void *buf, const char *name, int namelen,
		return -ENODATA;
		return -ENODATA;
	}
	}


	if (!S_ISDIR(xafile->d_inode->i_mode))
	if (!S_ISDIR(xafile->d_inode->i_mode)) {
		mutex_lock_nested(&xafile->d_inode->i_mutex, I_MUTEX_CHILD);
		err = notify_change(xafile, attrs);
		err = notify_change(xafile, attrs);
		mutex_unlock(&xafile->d_inode->i_mutex);
	}
	dput(xafile);
	dput(xafile);


	return err;
	return err;
@@ -464,38 +486,31 @@ int reiserfs_chown_xattrs(struct inode *inode, struct iattr *attrs)
		return 0;
		return 0;


	reiserfs_read_lock_xattrs(inode->i_sb);
	reiserfs_read_lock_xattrs(inode->i_sb);
	dir = open_xa_dir(inode, FL_READONLY);
	dir = open_xa_dir(inode, XATTR_REPLACE);
	reiserfs_read_unlock_xattrs(inode->i_sb);
	reiserfs_read_unlock_xattrs(inode->i_sb);
	if (IS_ERR(dir)) {
	if (IS_ERR(dir)) {
		if (PTR_ERR(dir) != -ENODATA)
		if (PTR_ERR(dir) != -ENODATA)
			err = PTR_ERR(dir);
			err = PTR_ERR(dir);
		goto out;
		goto out;
	} else if (!dir->d_inode) {
	} else if (!dir->d_inode)
		dput(dir);
		goto out_dir;
		goto out;
	}

	lock_kernel();


	attrs->ia_valid &= (ATTR_UID | ATTR_GID | ATTR_CTIME);
	attrs->ia_valid &= (ATTR_UID | ATTR_GID | ATTR_CTIME);
	buf.xadir = dir;
	buf.xadir = dir;
	buf.attrs = attrs;
	buf.attrs = attrs;
	buf.inode = inode;
	buf.inode = inode;


	mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
	err = xattr_readdir(dir->d_inode, reiserfs_chown_xattrs_filler, &buf);
	err = xattr_readdir(dir->d_inode, reiserfs_chown_xattrs_filler, &buf);
	if (err) {
		unlock_kernel();
		goto out_dir;
	}


	if (!err)
		err = notify_change(dir, attrs);
		err = notify_change(dir, attrs);
	unlock_kernel();
	mutex_unlock(&dir->d_inode->i_mutex);


	attrs->ia_valid = ia_valid;
out_dir:
out_dir:
	dput(dir);
	dput(dir);

out:
out:
	attrs->ia_valid = ia_valid;
	return err;
	return err;
}
}


@@ -513,47 +528,35 @@ static struct dentry *get_xa_file_dentry(const struct inode *inode,
	int err = 0;
	int err = 0;


	xadir = open_xa_dir(inode, flags);
	xadir = open_xa_dir(inode, flags);
	if (IS_ERR(xadir)) {
	if (IS_ERR(xadir))
		return ERR_CAST(xadir);
		return ERR_CAST(xadir);
	} else if (xadir && !xadir->d_inode) {
		dput(xadir);
		return ERR_PTR(-ENODATA);
	}


	xafile = lookup_one_len(name, xadir, strlen(name));
	xafile = lookup_one_len(name, xadir, strlen(name));
	if (IS_ERR(xafile)) {
	if (IS_ERR(xafile)) {
		dput(xadir);
		err = PTR_ERR(xafile);
		return ERR_CAST(xafile);
		goto out;
	}
	}


	if (xafile->d_inode) {	/* file exists */
	if (xafile->d_inode && (flags & XATTR_CREATE))
		if (flags & XATTR_CREATE) {
		err = -EEXIST;
		err = -EEXIST;
			dput(xafile);
			goto out;
		}
	} else if (flags & XATTR_REPLACE || flags & FL_READONLY) {
		goto out;
	} else {
		/* inode->i_mutex is down, so nothing else can try to create
		 * the same xattr */
		err = xadir->d_inode->i_op->create(xadir->d_inode, xafile,
						   0700 | S_IFREG, NULL);


		if (err) {
	if (!xafile->d_inode) {
			dput(xafile);
		err = -ENODATA;
			goto out;
		if (xattr_may_create(flags)) {
			mutex_lock_nested(&xadir->d_inode->i_mutex,
					  I_MUTEX_XATTR);
			err = xattr_create(xadir->d_inode, xafile,
					      0700|S_IFREG);
			mutex_unlock(&xadir->d_inode->i_mutex);
		}
		}
	}
	}


	if (err)
		dput(xafile);
out:
out:
	dput(xadir);
	dput(xadir);
	if (err)
	if (err)
		xafile = ERR_PTR(err);
		return ERR_PTR(err);
	else if (!xafile->d_inode) {
		dput(xafile);
		xafile = ERR_PTR(-ENODATA);
	}
	return xafile;
	return xafile;
}
}


@@ -633,6 +636,7 @@ reiserfs_xattr_set(struct inode *inode, const char *name, const void *buffer,
	newattrs.ia_valid = ATTR_SIZE | ATTR_CTIME;
	newattrs.ia_valid = ATTR_SIZE | ATTR_CTIME;
	mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_XATTR);
	mutex_lock_nested(&dentry->d_inode->i_mutex, I_MUTEX_XATTR);
	err = notify_change(dentry, &newattrs);
	err = notify_change(dentry, &newattrs);
	mutex_unlock(&dentry->d_inode->i_mutex);
	if (err)
	if (err)
		goto out_filp;
		goto out_filp;


@@ -692,7 +696,6 @@ reiserfs_xattr_set(struct inode *inode, const char *name, const void *buffer,
	}
	}


      out_filp:
      out_filp:
	mutex_unlock(&dentry->d_inode->i_mutex);
	dput(dentry);
	dput(dentry);


      out:
      out:
@@ -722,7 +725,7 @@ reiserfs_xattr_get(const struct inode *inode, const char *name, void *buffer,
	if (get_inode_sd_version(inode) == STAT_DATA_V1)
	if (get_inode_sd_version(inode) == STAT_DATA_V1)
		return -EOPNOTSUPP;
		return -EOPNOTSUPP;


	dentry = get_xa_file_dentry(inode, name, FL_READONLY);
	dentry = get_xa_file_dentry(inode, name, XATTR_REPLACE);
	if (IS_ERR(dentry)) {
	if (IS_ERR(dentry)) {
		err = PTR_ERR(dentry);
		err = PTR_ERR(dentry);
		goto out;
		goto out;
@@ -806,13 +809,15 @@ int reiserfs_xattr_del(struct inode *inode, const char *name)
	struct dentry *dir;
	struct dentry *dir;
	int err;
	int err;


	dir = open_xa_dir(inode, FL_READONLY);
	dir = open_xa_dir(inode, XATTR_REPLACE);
	if (IS_ERR(dir)) {
	if (IS_ERR(dir)) {
		err = PTR_ERR(dir);
		err = PTR_ERR(dir);
		goto out;
		goto out;
	}
	}


	mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
	err = __reiserfs_xattr_del(dir, name, strlen(name));
	err = __reiserfs_xattr_del(dir, name, strlen(name));
	mutex_unlock(&dir->d_inode->i_mutex);
	dput(dir);
	dput(dir);


	if (!err) {
	if (!err) {
@@ -826,6 +831,7 @@ int reiserfs_xattr_del(struct inode *inode, const char *name)


/* Actual operations that are exported to VFS-land */
/* Actual operations that are exported to VFS-land */


static struct reiserfs_xattr_handler *find_xattr_handler_prefix(const char *);
/*
/*
 * Inode operation getxattr()
 * Inode operation getxattr()
 * Preliminary locking: we down dentry->d_inode->i_mutex
 * Preliminary locking: we down dentry->d_inode->i_mutex
@@ -978,7 +984,7 @@ ssize_t reiserfs_listxattr(struct dentry * dentry, char *buffer, size_t size)


	reiserfs_read_lock_xattr_i(dentry->d_inode);
	reiserfs_read_lock_xattr_i(dentry->d_inode);
	reiserfs_read_lock_xattrs(dentry->d_sb);
	reiserfs_read_lock_xattrs(dentry->d_sb);
	dir = open_xa_dir(dentry->d_inode, FL_READONLY);
	dir = open_xa_dir(dentry->d_inode, XATTR_REPLACE);
	reiserfs_read_unlock_xattrs(dentry->d_sb);
	reiserfs_read_unlock_xattrs(dentry->d_sb);
	if (IS_ERR(dir)) {
	if (IS_ERR(dir)) {
		err = PTR_ERR(dir);
		err = PTR_ERR(dir);
@@ -994,7 +1000,9 @@ ssize_t reiserfs_listxattr(struct dentry * dentry, char *buffer, size_t size)


	REISERFS_I(dentry->d_inode)->i_flags |= i_has_xattr_dir;
	REISERFS_I(dentry->d_inode)->i_flags |= i_has_xattr_dir;


	mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_XATTR);
	err = xattr_readdir(dir->d_inode, reiserfs_listxattr_filler, &buf);
	err = xattr_readdir(dir->d_inode, reiserfs_listxattr_filler, &buf);
	mutex_unlock(&dir->d_inode->i_mutex);
	if (err)
	if (err)
		goto out_dir;
		goto out_dir;


@@ -1146,7 +1154,7 @@ static int create_privroot(struct dentry *dentry)
	int err;
	int err;
	struct inode *inode = dentry->d_parent->d_inode;
	struct inode *inode = dentry->d_parent->d_inode;
	mutex_lock_nested(&inode->i_mutex, I_MUTEX_XATTR);
	mutex_lock_nested(&inode->i_mutex, I_MUTEX_XATTR);
	err = inode->i_op->mkdir(inode, dentry, 0700);
	err = xattr_mkdir(inode, dentry, 0700);
	mutex_unlock(&inode->i_mutex);
	mutex_unlock(&inode->i_mutex);
	if (err) {
	if (err) {
		dput(dentry);
		dput(dentry);