]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
ac27a0ec | 2 | /* |
617ba13b | 3 | * linux/fs/ext4/dir.c |
ac27a0ec DK |
4 | * |
5 | * Copyright (C) 1992, 1993, 1994, 1995 | |
6 | * Remy Card ([email protected]) | |
7 | * Laboratoire MASI - Institut Blaise Pascal | |
8 | * Universite Pierre et Marie Curie (Paris VI) | |
9 | * | |
10 | * from | |
11 | * | |
12 | * linux/fs/minix/dir.c | |
13 | * | |
14 | * Copyright (C) 1991, 1992 Linus Torvalds | |
15 | * | |
617ba13b | 16 | * ext4 directory handling functions |
ac27a0ec DK |
17 | * |
18 | * Big-endian to little-endian byte-swapping/bitmaps by | |
19 | * David S. Miller ([email protected]), 1995 | |
20 | * | |
21 | * Hash Tree Directory indexing (c) 2001 Daniel Phillips | |
22 | * | |
23 | */ | |
24 | ||
25 | #include <linux/fs.h> | |
ac27a0ec | 26 | #include <linux/buffer_head.h> |
ac27a0ec | 27 | #include <linux/slab.h> |
ee73f9a5 | 28 | #include <linux/iversion.h> |
3dcf5451 | 29 | #include "ext4.h" |
65d165d9 | 30 | #include "xattr.h" |
ac27a0ec | 31 | |
725bebb2 | 32 | static int ext4_dx_readdir(struct file *, struct dir_context *); |
ac27a0ec | 33 | |
d1f5273e FY |
34 | /** |
35 | * Check if the given dir-inode refers to an htree-indexed directory | |
70261f56 | 36 | * (or a directory which could potentially get converted to use htree |
d1f5273e FY |
37 | * indexing). |
38 | * | |
39 | * Return 1 if it is a dx dir, 0 if not | |
40 | */ | |
41 | static int is_dx_dir(struct inode *inode) | |
42 | { | |
43 | struct super_block *sb = inode->i_sb; | |
44 | ||
e2b911c5 | 45 | if (ext4_has_feature_dir_index(inode->i_sb) && |
d1f5273e | 46 | ((ext4_test_inode_flag(inode, EXT4_INODE_INDEX)) || |
8af0f082 TM |
47 | ((inode->i_size >> sb->s_blocksize_bits) == 1) || |
48 | ext4_has_inline_data(inode))) | |
d1f5273e FY |
49 | return 1; |
50 | ||
51 | return 0; | |
52 | } | |
53 | ||
cad3f007 TT |
54 | /* |
55 | * Return 0 if the directory entry is OK, and 1 if there is a problem | |
56 | * | |
57 | * Note: this is the opposite of what ext2 and ext3 historically returned... | |
65d165d9 TM |
58 | * |
59 | * bh passed here can be an inode block or a dir data block, depending | |
60 | * on the inode inline data flag. | |
cad3f007 | 61 | */ |
60fd4da3 | 62 | int __ext4_check_dir_entry(const char *function, unsigned int line, |
f7c21177 | 63 | struct inode *dir, struct file *filp, |
60fd4da3 | 64 | struct ext4_dir_entry_2 *de, |
226ba972 | 65 | struct buffer_head *bh, char *buf, int size, |
60fd4da3 | 66 | unsigned int offset) |
ac27a0ec | 67 | { |
af5bc92d | 68 | const char *error_msg = NULL; |
3d0518f4 WY |
69 | const int rlen = ext4_rec_len_from_disk(de->rec_len, |
70 | dir->i_sb->s_blocksize); | |
ac27a0ec | 71 | |
cad3f007 | 72 | if (unlikely(rlen < EXT4_DIR_REC_LEN(1))) |
ac27a0ec | 73 | error_msg = "rec_len is smaller than minimal"; |
cad3f007 | 74 | else if (unlikely(rlen % 4 != 0)) |
ac27a0ec | 75 | error_msg = "rec_len % 4 != 0"; |
cad3f007 | 76 | else if (unlikely(rlen < EXT4_DIR_REC_LEN(de->name_len))) |
ac27a0ec | 77 | error_msg = "rec_len is too small for name_len"; |
226ba972 | 78 | else if (unlikely(((char *) de - buf) + rlen > size)) |
4d982e25 | 79 | error_msg = "directory entry overrun"; |
cad3f007 TT |
80 | else if (unlikely(le32_to_cpu(de->inode) > |
81 | le32_to_cpu(EXT4_SB(dir->i_sb)->s_es->s_inodes_count))) | |
ac27a0ec | 82 | error_msg = "inode out of bounds"; |
cad3f007 TT |
83 | else |
84 | return 0; | |
85 | ||
f7c21177 | 86 | if (filp) |
4fda4003 | 87 | ext4_error_file(filp, function, line, bh->b_blocknr, |
4d982e25 TT |
88 | "bad entry in directory: %s - offset=%u, " |
89 | "inode=%u, rec_len=%d, name_len=%d, size=%d", | |
90 | error_msg, offset, le32_to_cpu(de->inode), | |
91 | rlen, de->name_len, size); | |
f7c21177 | 92 | else |
4fda4003 | 93 | ext4_error_inode(dir, function, line, bh->b_blocknr, |
4d982e25 TT |
94 | "bad entry in directory: %s - offset=%u, " |
95 | "inode=%u, rec_len=%d, name_len=%d, size=%d", | |
96 | error_msg, offset, le32_to_cpu(de->inode), | |
97 | rlen, de->name_len, size); | |
f7c21177 | 98 | |
cad3f007 | 99 | return 1; |
ac27a0ec DK |
100 | } |
101 | ||
725bebb2 | 102 | static int ext4_readdir(struct file *file, struct dir_context *ctx) |
ac27a0ec | 103 | { |
498e5f24 | 104 | unsigned int offset; |
aa13d5f6 | 105 | int i; |
617ba13b | 106 | struct ext4_dir_entry_2 *de; |
ac27a0ec | 107 | int err; |
725bebb2 | 108 | struct inode *inode = file_inode(file); |
d1f5273e | 109 | struct super_block *sb = inode->i_sb; |
44614711 | 110 | struct buffer_head *bh = NULL; |
9d9f1775 | 111 | int dir_has_error = 0; |
a7550b30 | 112 | struct fscrypt_str fstr = FSTR_INIT(NULL, 0); |
ac27a0ec | 113 | |
28b4c263 | 114 | if (ext4_encrypted_inode(inode)) { |
a7550b30 | 115 | err = fscrypt_get_encryption_info(inode); |
28b4c263 TT |
116 | if (err && err != -ENOKEY) |
117 | return err; | |
118 | } | |
119 | ||
d1f5273e | 120 | if (is_dx_dir(inode)) { |
725bebb2 | 121 | err = ext4_dx_readdir(file, ctx); |
ac27a0ec | 122 | if (err != ERR_BAD_DX_DIR) { |
725bebb2 | 123 | return err; |
ac27a0ec DK |
124 | } |
125 | /* | |
126 | * We don't set the inode dirty flag since it's not | |
127 | * critical that it get flushed back to the disk. | |
128 | */ | |
725bebb2 | 129 | ext4_clear_inode_flag(file_inode(file), |
07a03824 | 130 | EXT4_INODE_INDEX); |
ac27a0ec | 131 | } |
8af0f082 TM |
132 | |
133 | if (ext4_has_inline_data(inode)) { | |
134 | int has_inline_data = 1; | |
44614711 | 135 | err = ext4_read_inline_dir(file, ctx, |
8af0f082 TM |
136 | &has_inline_data); |
137 | if (has_inline_data) | |
44614711 MH |
138 | return err; |
139 | } | |
140 | ||
b7236e21 | 141 | if (ext4_encrypted_inode(inode)) { |
a7550b30 | 142 | err = fscrypt_fname_alloc_buffer(inode, EXT4_NAME_LEN, &fstr); |
b7236e21 | 143 | if (err < 0) |
44614711 | 144 | return err; |
8af0f082 TM |
145 | } |
146 | ||
725bebb2 | 147 | offset = ctx->pos & (sb->s_blocksize - 1); |
ac27a0ec | 148 | |
725bebb2 | 149 | while (ctx->pos < inode->i_size) { |
2ed88685 | 150 | struct ext4_map_blocks map; |
ac27a0ec | 151 | |
1f60fbe7 TT |
152 | if (fatal_signal_pending(current)) { |
153 | err = -ERESTARTSYS; | |
154 | goto errout; | |
155 | } | |
156 | cond_resched(); | |
725bebb2 | 157 | map.m_lblk = ctx->pos >> EXT4_BLOCK_SIZE_BITS(sb); |
2ed88685 TT |
158 | map.m_len = 1; |
159 | err = ext4_map_blocks(NULL, inode, &map, 0); | |
ac27a0ec | 160 | if (err > 0) { |
2ed88685 | 161 | pgoff_t index = map.m_pblk >> |
09cbfeaf | 162 | (PAGE_SHIFT - inode->i_blkbits); |
725bebb2 | 163 | if (!ra_has_index(&file->f_ra, index)) |
cf914a7d | 164 | page_cache_sync_readahead( |
dc7868fc | 165 | sb->s_bdev->bd_inode->i_mapping, |
725bebb2 | 166 | &file->f_ra, file, |
cf914a7d | 167 | index, 1); |
09cbfeaf | 168 | file->f_ra.prev_pos = (loff_t)index << PAGE_SHIFT; |
1c215028 | 169 | bh = ext4_bread(NULL, inode, map.m_lblk, 0); |
c906f38e KT |
170 | if (IS_ERR(bh)) { |
171 | err = PTR_ERR(bh); | |
172 | bh = NULL; | |
173 | goto errout; | |
174 | } | |
ac27a0ec DK |
175 | } |
176 | ||
ac27a0ec | 177 | if (!bh) { |
9d9f1775 | 178 | if (!dir_has_error) { |
725bebb2 | 179 | EXT4_ERROR_FILE(file, 0, |
f7c21177 TT |
180 | "directory contains a " |
181 | "hole at offset %llu", | |
725bebb2 | 182 | (unsigned long long) ctx->pos); |
9d9f1775 ES |
183 | dir_has_error = 1; |
184 | } | |
e6c40211 | 185 | /* corrupt size? Maybe no more blocks to read */ |
725bebb2 | 186 | if (ctx->pos > inode->i_blocks << 9) |
e6c40211 | 187 | break; |
725bebb2 | 188 | ctx->pos += sb->s_blocksize - offset; |
ac27a0ec DK |
189 | continue; |
190 | } | |
191 | ||
b0336e8d DW |
192 | /* Check the checksum */ |
193 | if (!buffer_verified(bh) && | |
194 | !ext4_dirent_csum_verify(inode, | |
195 | (struct ext4_dir_entry *)bh->b_data)) { | |
725bebb2 | 196 | EXT4_ERROR_FILE(file, 0, "directory fails checksum " |
b0336e8d | 197 | "at offset %llu", |
725bebb2 AV |
198 | (unsigned long long)ctx->pos); |
199 | ctx->pos += sb->s_blocksize - offset; | |
d5ac7773 | 200 | brelse(bh); |
44614711 | 201 | bh = NULL; |
b0336e8d DW |
202 | continue; |
203 | } | |
204 | set_buffer_verified(bh); | |
205 | ||
ac27a0ec DK |
206 | /* If the dir block has changed since the last call to |
207 | * readdir(2), then we might be pointing to an invalid | |
208 | * dirent right now. Scan from the start of the block | |
209 | * to make sure. */ | |
c472c07b | 210 | if (!inode_eq_iversion(inode, file->f_version)) { |
ac27a0ec | 211 | for (i = 0; i < sb->s_blocksize && i < offset; ) { |
617ba13b | 212 | de = (struct ext4_dir_entry_2 *) |
ac27a0ec DK |
213 | (bh->b_data + i); |
214 | /* It's too expensive to do a full | |
215 | * dirent test each time round this | |
216 | * loop, but we do have to test at | |
217 | * least that it is non-zero. A | |
218 | * failure will be detected in the | |
219 | * dirent test below. */ | |
3d0518f4 WY |
220 | if (ext4_rec_len_from_disk(de->rec_len, |
221 | sb->s_blocksize) < EXT4_DIR_REC_LEN(1)) | |
ac27a0ec | 222 | break; |
3d0518f4 WY |
223 | i += ext4_rec_len_from_disk(de->rec_len, |
224 | sb->s_blocksize); | |
ac27a0ec DK |
225 | } |
226 | offset = i; | |
725bebb2 | 227 | ctx->pos = (ctx->pos & ~(sb->s_blocksize - 1)) |
ac27a0ec | 228 | | offset; |
ee73f9a5 | 229 | file->f_version = inode_query_iversion(inode); |
ac27a0ec DK |
230 | } |
231 | ||
725bebb2 | 232 | while (ctx->pos < inode->i_size |
ac27a0ec | 233 | && offset < sb->s_blocksize) { |
617ba13b | 234 | de = (struct ext4_dir_entry_2 *) (bh->b_data + offset); |
725bebb2 | 235 | if (ext4_check_dir_entry(inode, file, de, bh, |
226ba972 TM |
236 | bh->b_data, bh->b_size, |
237 | offset)) { | |
63f57933 | 238 | /* |
725bebb2 | 239 | * On error, skip to the next block |
63f57933 | 240 | */ |
725bebb2 | 241 | ctx->pos = (ctx->pos | |
ac27a0ec | 242 | (sb->s_blocksize - 1)) + 1; |
725bebb2 | 243 | break; |
ac27a0ec | 244 | } |
3d0518f4 WY |
245 | offset += ext4_rec_len_from_disk(de->rec_len, |
246 | sb->s_blocksize); | |
ac27a0ec | 247 | if (le32_to_cpu(de->inode)) { |
b7236e21 | 248 | if (!ext4_encrypted_inode(inode)) { |
44614711 MH |
249 | if (!dir_emit(ctx, de->name, |
250 | de->name_len, | |
251 | le32_to_cpu(de->inode), | |
252 | get_dtype(sb, de->file_type))) | |
253 | goto done; | |
254 | } else { | |
a7550b30 JK |
255 | int save_len = fstr.len; |
256 | struct fscrypt_str de_name = | |
257 | FSTR_INIT(de->name, | |
258 | de->name_len); | |
d2299590 | 259 | |
44614711 | 260 | /* Directory is encrypted */ |
a7550b30 JK |
261 | err = fscrypt_fname_disk_to_usr(inode, |
262 | 0, 0, &de_name, &fstr); | |
ef1eb3aa | 263 | de_name = fstr; |
a7550b30 | 264 | fstr.len = save_len; |
ef1eb3aa | 265 | if (err) |
44614711 MH |
266 | goto errout; |
267 | if (!dir_emit(ctx, | |
ef1eb3aa | 268 | de_name.name, de_name.len, |
44614711 MH |
269 | le32_to_cpu(de->inode), |
270 | get_dtype(sb, de->file_type))) | |
271 | goto done; | |
725bebb2 | 272 | } |
ac27a0ec | 273 | } |
725bebb2 | 274 | ctx->pos += ext4_rec_len_from_disk(de->rec_len, |
3d0518f4 | 275 | sb->s_blocksize); |
ac27a0ec | 276 | } |
ae05327a | 277 | if ((ctx->pos < inode->i_size) && !dir_relax_shared(inode)) |
44614711 | 278 | goto done; |
af5bc92d | 279 | brelse(bh); |
44614711 MH |
280 | bh = NULL; |
281 | offset = 0; | |
ac27a0ec | 282 | } |
44614711 MH |
283 | done: |
284 | err = 0; | |
285 | errout: | |
286 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | |
a7550b30 | 287 | fscrypt_fname_free_buffer(&fstr); |
44614711 MH |
288 | #endif |
289 | brelse(bh); | |
290 | return err; | |
ac27a0ec DK |
291 | } |
292 | ||
d1f5273e FY |
293 | static inline int is_32bit_api(void) |
294 | { | |
295 | #ifdef CONFIG_COMPAT | |
121cef8f | 296 | return in_compat_syscall(); |
d1f5273e FY |
297 | #else |
298 | return (BITS_PER_LONG == 32); | |
299 | #endif | |
300 | } | |
301 | ||
ac27a0ec DK |
302 | /* |
303 | * These functions convert from the major/minor hash to an f_pos | |
d1f5273e FY |
304 | * value for dx directories |
305 | * | |
306 | * Upper layer (for example NFS) should specify FMODE_32BITHASH or | |
307 | * FMODE_64BITHASH explicitly. On the other hand, we allow ext4 to be mounted | |
308 | * directly on both 32-bit and 64-bit nodes, under such case, neither | |
309 | * FMODE_32BITHASH nor FMODE_64BITHASH is specified. | |
310 | */ | |
311 | static inline loff_t hash2pos(struct file *filp, __u32 major, __u32 minor) | |
312 | { | |
313 | if ((filp->f_mode & FMODE_32BITHASH) || | |
314 | (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api())) | |
315 | return major >> 1; | |
316 | else | |
317 | return ((__u64)(major >> 1) << 32) | (__u64)minor; | |
318 | } | |
319 | ||
320 | static inline __u32 pos2maj_hash(struct file *filp, loff_t pos) | |
321 | { | |
322 | if ((filp->f_mode & FMODE_32BITHASH) || | |
323 | (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api())) | |
324 | return (pos << 1) & 0xffffffff; | |
325 | else | |
326 | return ((pos >> 32) << 1) & 0xffffffff; | |
327 | } | |
328 | ||
329 | static inline __u32 pos2min_hash(struct file *filp, loff_t pos) | |
330 | { | |
331 | if ((filp->f_mode & FMODE_32BITHASH) || | |
332 | (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api())) | |
333 | return 0; | |
334 | else | |
335 | return pos & 0xffffffff; | |
336 | } | |
337 | ||
338 | /* | |
339 | * Return 32- or 64-bit end-of-file for dx directories | |
340 | */ | |
341 | static inline loff_t ext4_get_htree_eof(struct file *filp) | |
342 | { | |
343 | if ((filp->f_mode & FMODE_32BITHASH) || | |
344 | (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api())) | |
345 | return EXT4_HTREE_EOF_32BIT; | |
346 | else | |
347 | return EXT4_HTREE_EOF_64BIT; | |
348 | } | |
349 | ||
350 | ||
351 | /* | |
ec7268ce ES |
352 | * ext4_dir_llseek() calls generic_file_llseek_size to handle htree |
353 | * directories, where the "offset" is in terms of the filename hash | |
354 | * value instead of the byte offset. | |
ac27a0ec | 355 | * |
ec7268ce ES |
356 | * Because we may return a 64-bit hash that is well beyond offset limits, |
357 | * we need to pass the max hash as the maximum allowable offset in | |
358 | * the htree directory case. | |
359 | * | |
360 | * For non-htree, ext4_llseek already chooses the proper max offset. | |
ac27a0ec | 361 | */ |
d4e43954 | 362 | static loff_t ext4_dir_llseek(struct file *file, loff_t offset, int whence) |
d1f5273e FY |
363 | { |
364 | struct inode *inode = file->f_mapping->host; | |
d1f5273e | 365 | int dx_dir = is_dx_dir(inode); |
e40ff213 | 366 | loff_t ret, htree_max = ext4_get_htree_eof(file); |
d1f5273e | 367 | |
ec7268ce | 368 | if (likely(dx_dir)) |
e40ff213 | 369 | ret = generic_file_llseek_size(file, offset, whence, |
ec7268ce ES |
370 | htree_max, htree_max); |
371 | else | |
e40ff213 TT |
372 | ret = ext4_llseek(file, offset, whence); |
373 | file->f_version = inode_peek_iversion(inode) - 1; | |
374 | return ret; | |
d1f5273e | 375 | } |
ac27a0ec DK |
376 | |
377 | /* | |
378 | * This structure holds the nodes of the red-black tree used to store | |
379 | * the directory entry in hash order. | |
380 | */ | |
381 | struct fname { | |
382 | __u32 hash; | |
383 | __u32 minor_hash; | |
384 | struct rb_node rb_hash; | |
385 | struct fname *next; | |
386 | __u32 inode; | |
387 | __u8 name_len; | |
388 | __u8 file_type; | |
389 | char name[0]; | |
390 | }; | |
391 | ||
392 | /* | |
393 | * This functoin implements a non-recursive way of freeing all of the | |
394 | * nodes in the red-black tree. | |
395 | */ | |
396 | static void free_rb_tree_fname(struct rb_root *root) | |
397 | { | |
d1866bd0 CS |
398 | struct fname *fname, *next; |
399 | ||
400 | rbtree_postorder_for_each_entry_safe(fname, next, root, rb_hash) | |
ac27a0ec | 401 | while (fname) { |
af5bc92d | 402 | struct fname *old = fname; |
ac27a0ec | 403 | fname = fname->next; |
af5bc92d | 404 | kfree(old); |
ac27a0ec | 405 | } |
d1866bd0 CS |
406 | |
407 | *root = RB_ROOT; | |
ac27a0ec DK |
408 | } |
409 | ||
410 | ||
d1f5273e FY |
411 | static struct dir_private_info *ext4_htree_create_dir_info(struct file *filp, |
412 | loff_t pos) | |
ac27a0ec DK |
413 | { |
414 | struct dir_private_info *p; | |
415 | ||
d695a1be | 416 | p = kzalloc(sizeof(*p), GFP_KERNEL); |
ac27a0ec DK |
417 | if (!p) |
418 | return NULL; | |
d1f5273e FY |
419 | p->curr_hash = pos2maj_hash(filp, pos); |
420 | p->curr_minor_hash = pos2min_hash(filp, pos); | |
ac27a0ec DK |
421 | return p; |
422 | } | |
423 | ||
617ba13b | 424 | void ext4_htree_free_dir_info(struct dir_private_info *p) |
ac27a0ec DK |
425 | { |
426 | free_rb_tree_fname(&p->root); | |
427 | kfree(p); | |
428 | } | |
429 | ||
430 | /* | |
431 | * Given a directory entry, enter it into the fname rb tree. | |
2f61830a TT |
432 | * |
433 | * When filename encryption is enabled, the dirent will hold the | |
434 | * encrypted filename, while the htree will hold decrypted filename. | |
435 | * The decrypted filename is passed in via ent_name. parameter. | |
ac27a0ec | 436 | */ |
617ba13b | 437 | int ext4_htree_store_dirent(struct file *dir_file, __u32 hash, |
ac27a0ec | 438 | __u32 minor_hash, |
2f61830a | 439 | struct ext4_dir_entry_2 *dirent, |
a7550b30 | 440 | struct fscrypt_str *ent_name) |
ac27a0ec DK |
441 | { |
442 | struct rb_node **p, *parent = NULL; | |
af5bc92d | 443 | struct fname *fname, *new_fn; |
ac27a0ec DK |
444 | struct dir_private_info *info; |
445 | int len; | |
446 | ||
a271fe85 | 447 | info = dir_file->private_data; |
ac27a0ec DK |
448 | p = &info->root.rb_node; |
449 | ||
450 | /* Create and allocate the fname structure */ | |
2f61830a | 451 | len = sizeof(struct fname) + ent_name->len + 1; |
ac27a0ec DK |
452 | new_fn = kzalloc(len, GFP_KERNEL); |
453 | if (!new_fn) | |
454 | return -ENOMEM; | |
455 | new_fn->hash = hash; | |
456 | new_fn->minor_hash = minor_hash; | |
457 | new_fn->inode = le32_to_cpu(dirent->inode); | |
2f61830a | 458 | new_fn->name_len = ent_name->len; |
ac27a0ec | 459 | new_fn->file_type = dirent->file_type; |
2f61830a TT |
460 | memcpy(new_fn->name, ent_name->name, ent_name->len); |
461 | new_fn->name[ent_name->len] = 0; | |
ac27a0ec DK |
462 | |
463 | while (*p) { | |
464 | parent = *p; | |
465 | fname = rb_entry(parent, struct fname, rb_hash); | |
466 | ||
467 | /* | |
468 | * If the hash and minor hash match up, then we put | |
469 | * them on a linked list. This rarely happens... | |
470 | */ | |
471 | if ((new_fn->hash == fname->hash) && | |
472 | (new_fn->minor_hash == fname->minor_hash)) { | |
473 | new_fn->next = fname->next; | |
474 | fname->next = new_fn; | |
475 | return 0; | |
476 | } | |
477 | ||
478 | if (new_fn->hash < fname->hash) | |
479 | p = &(*p)->rb_left; | |
480 | else if (new_fn->hash > fname->hash) | |
481 | p = &(*p)->rb_right; | |
482 | else if (new_fn->minor_hash < fname->minor_hash) | |
483 | p = &(*p)->rb_left; | |
484 | else /* if (new_fn->minor_hash > fname->minor_hash) */ | |
485 | p = &(*p)->rb_right; | |
486 | } | |
487 | ||
488 | rb_link_node(&new_fn->rb_hash, parent, p); | |
489 | rb_insert_color(&new_fn->rb_hash, &info->root); | |
490 | return 0; | |
491 | } | |
492 | ||
493 | ||
494 | ||
495 | /* | |
617ba13b | 496 | * This is a helper function for ext4_dx_readdir. It calls filldir |
ac27a0ec DK |
497 | * for all entres on the fname linked list. (Normally there is only |
498 | * one entry on the linked list, unless there are 62 bit hash collisions.) | |
499 | */ | |
725bebb2 AV |
500 | static int call_filldir(struct file *file, struct dir_context *ctx, |
501 | struct fname *fname) | |
ac27a0ec | 502 | { |
725bebb2 AV |
503 | struct dir_private_info *info = file->private_data; |
504 | struct inode *inode = file_inode(file); | |
505 | struct super_block *sb = inode->i_sb; | |
ac27a0ec DK |
506 | |
507 | if (!fname) { | |
92b97816 TT |
508 | ext4_msg(sb, KERN_ERR, "%s:%d: inode #%lu: comm %s: " |
509 | "called with null fname?!?", __func__, __LINE__, | |
510 | inode->i_ino, current->comm); | |
ac27a0ec DK |
511 | return 0; |
512 | } | |
725bebb2 | 513 | ctx->pos = hash2pos(file, fname->hash, fname->minor_hash); |
ac27a0ec | 514 | while (fname) { |
725bebb2 AV |
515 | if (!dir_emit(ctx, fname->name, |
516 | fname->name_len, | |
ac27a0ec | 517 | fname->inode, |
725bebb2 | 518 | get_dtype(sb, fname->file_type))) { |
d0156417 | 519 | info->extra_fname = fname; |
725bebb2 | 520 | return 1; |
ac27a0ec DK |
521 | } |
522 | fname = fname->next; | |
523 | } | |
524 | return 0; | |
525 | } | |
526 | ||
725bebb2 | 527 | static int ext4_dx_readdir(struct file *file, struct dir_context *ctx) |
ac27a0ec | 528 | { |
725bebb2 AV |
529 | struct dir_private_info *info = file->private_data; |
530 | struct inode *inode = file_inode(file); | |
ac27a0ec DK |
531 | struct fname *fname; |
532 | int ret; | |
533 | ||
534 | if (!info) { | |
725bebb2 | 535 | info = ext4_htree_create_dir_info(file, ctx->pos); |
ac27a0ec DK |
536 | if (!info) |
537 | return -ENOMEM; | |
725bebb2 | 538 | file->private_data = info; |
ac27a0ec DK |
539 | } |
540 | ||
725bebb2 | 541 | if (ctx->pos == ext4_get_htree_eof(file)) |
ac27a0ec DK |
542 | return 0; /* EOF */ |
543 | ||
544 | /* Some one has messed with f_pos; reset the world */ | |
725bebb2 | 545 | if (info->last_pos != ctx->pos) { |
ac27a0ec DK |
546 | free_rb_tree_fname(&info->root); |
547 | info->curr_node = NULL; | |
548 | info->extra_fname = NULL; | |
725bebb2 AV |
549 | info->curr_hash = pos2maj_hash(file, ctx->pos); |
550 | info->curr_minor_hash = pos2min_hash(file, ctx->pos); | |
ac27a0ec DK |
551 | } |
552 | ||
553 | /* | |
554 | * If there are any leftover names on the hash collision | |
555 | * chain, return them first. | |
556 | */ | |
d0156417 | 557 | if (info->extra_fname) { |
725bebb2 | 558 | if (call_filldir(file, ctx, info->extra_fname)) |
d0156417 | 559 | goto finished; |
d0156417 | 560 | info->extra_fname = NULL; |
3c37fc86 | 561 | goto next_node; |
d0156417 | 562 | } else if (!info->curr_node) |
ac27a0ec DK |
563 | info->curr_node = rb_first(&info->root); |
564 | ||
565 | while (1) { | |
566 | /* | |
567 | * Fill the rbtree if we have no more entries, | |
568 | * or the inode has changed since we last read in the | |
569 | * cached entries. | |
570 | */ | |
571 | if ((!info->curr_node) || | |
c472c07b | 572 | !inode_eq_iversion(inode, file->f_version)) { |
ac27a0ec DK |
573 | info->curr_node = NULL; |
574 | free_rb_tree_fname(&info->root); | |
ee73f9a5 | 575 | file->f_version = inode_query_iversion(inode); |
725bebb2 | 576 | ret = ext4_htree_fill_tree(file, info->curr_hash, |
ac27a0ec DK |
577 | info->curr_minor_hash, |
578 | &info->next_hash); | |
579 | if (ret < 0) | |
580 | return ret; | |
581 | if (ret == 0) { | |
725bebb2 | 582 | ctx->pos = ext4_get_htree_eof(file); |
ac27a0ec DK |
583 | break; |
584 | } | |
585 | info->curr_node = rb_first(&info->root); | |
586 | } | |
587 | ||
588 | fname = rb_entry(info->curr_node, struct fname, rb_hash); | |
589 | info->curr_hash = fname->hash; | |
590 | info->curr_minor_hash = fname->minor_hash; | |
725bebb2 | 591 | if (call_filldir(file, ctx, fname)) |
ac27a0ec | 592 | break; |
3c37fc86 | 593 | next_node: |
ac27a0ec | 594 | info->curr_node = rb_next(info->curr_node); |
3c37fc86 TT |
595 | if (info->curr_node) { |
596 | fname = rb_entry(info->curr_node, struct fname, | |
597 | rb_hash); | |
598 | info->curr_hash = fname->hash; | |
599 | info->curr_minor_hash = fname->minor_hash; | |
600 | } else { | |
ac27a0ec | 601 | if (info->next_hash == ~0) { |
725bebb2 | 602 | ctx->pos = ext4_get_htree_eof(file); |
ac27a0ec DK |
603 | break; |
604 | } | |
605 | info->curr_hash = info->next_hash; | |
606 | info->curr_minor_hash = 0; | |
607 | } | |
608 | } | |
609 | finished: | |
725bebb2 | 610 | info->last_pos = ctx->pos; |
ac27a0ec DK |
611 | return 0; |
612 | } | |
613 | ||
6bc445e0 TT |
614 | static int ext4_dir_open(struct inode * inode, struct file * filp) |
615 | { | |
616 | if (ext4_encrypted_inode(inode)) | |
a7550b30 | 617 | return fscrypt_get_encryption_info(inode) ? -EACCES : 0; |
6bc445e0 TT |
618 | return 0; |
619 | } | |
620 | ||
af5bc92d | 621 | static int ext4_release_dir(struct inode *inode, struct file *filp) |
ac27a0ec | 622 | { |
63f57933 | 623 | if (filp->private_data) |
617ba13b | 624 | ext4_htree_free_dir_info(filp->private_data); |
ac27a0ec DK |
625 | |
626 | return 0; | |
627 | } | |
d1f5273e | 628 | |
40b163f1 DW |
629 | int ext4_check_all_de(struct inode *dir, struct buffer_head *bh, void *buf, |
630 | int buf_size) | |
631 | { | |
632 | struct ext4_dir_entry_2 *de; | |
18017479 | 633 | int rlen; |
40b163f1 DW |
634 | unsigned int offset = 0; |
635 | char *top; | |
636 | ||
637 | de = (struct ext4_dir_entry_2 *)buf; | |
638 | top = buf + buf_size; | |
639 | while ((char *) de < top) { | |
640 | if (ext4_check_dir_entry(dir, NULL, de, bh, | |
641 | buf, buf_size, offset)) | |
6a797d27 | 642 | return -EFSCORRUPTED; |
40b163f1 DW |
643 | rlen = ext4_rec_len_from_disk(de->rec_len, buf_size); |
644 | de = (struct ext4_dir_entry_2 *)((char *)de + rlen); | |
645 | offset += rlen; | |
646 | } | |
647 | if ((char *) de > top) | |
6a797d27 | 648 | return -EFSCORRUPTED; |
40b163f1 DW |
649 | |
650 | return 0; | |
651 | } | |
652 | ||
d1f5273e FY |
653 | const struct file_operations ext4_dir_operations = { |
654 | .llseek = ext4_dir_llseek, | |
655 | .read = generic_read_dir, | |
ae05327a | 656 | .iterate_shared = ext4_readdir, |
d1f5273e FY |
657 | .unlocked_ioctl = ext4_ioctl, |
658 | #ifdef CONFIG_COMPAT | |
659 | .compat_ioctl = ext4_compat_ioctl, | |
660 | #endif | |
661 | .fsync = ext4_sync_file, | |
6bc445e0 | 662 | .open = ext4_dir_open, |
d1f5273e FY |
663 | .release = ext4_release_dir, |
664 | }; |