diff options
author | Kent Overstreet <kent.overstreet@gmail.com> | 2018-07-10 09:36:01 -0400 |
---|---|---|
committer | Kent Overstreet <kent.overstreet@gmail.com> | 2018-07-12 20:13:56 -0400 |
commit | 940d6ca657ea70758f3f43323bfd531019a40d3c (patch) | |
tree | e59c7d6c4bdaa14285915e89d954ebc5d2fa1605 | |
parent | c9197c21103591917468ebc543ec01fa92ba4a15 (diff) |
bcachefs: acl code improvements
Fewer allocations, and to_disk/from_disk are considerably less sketchy
now
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
-rw-r--r-- | fs/bcachefs/acl.c | 297 | ||||
-rw-r--r-- | fs/bcachefs/acl.h | 29 | ||||
-rw-r--r-- | fs/bcachefs/xattr.c | 58 | ||||
-rw-r--r-- | fs/bcachefs/xattr.h | 28 |
4 files changed, 223 insertions, 189 deletions
diff --git a/fs/bcachefs/acl.c b/fs/bcachefs/acl.c index 29774e5d94f9..a8735bc04b4d 100644 --- a/fs/bcachefs/acl.c +++ b/fs/bcachefs/acl.c @@ -12,96 +12,175 @@ #include "fs.h" #include "xattr.h" +static inline size_t bch2_acl_size(unsigned nr_short, unsigned nr_long) +{ + return sizeof(bch_acl_header) + + sizeof(bch_acl_entry_short) * nr_short + + sizeof(bch_acl_entry) * nr_long; +} + +static inline int acl_to_xattr_type(int type) +{ + switch (type) { + case ACL_TYPE_ACCESS: + return BCH_XATTR_INDEX_POSIX_ACL_ACCESS; + case ACL_TYPE_DEFAULT: + return BCH_XATTR_INDEX_POSIX_ACL_DEFAULT; + default: + BUG(); + } +} + /* * Convert from filesystem to in-memory representation. */ static struct posix_acl *bch2_acl_from_disk(const void *value, size_t size) { - const char *end = (char *)value + size; - int n, count; + const void *p, *end = value + size; struct posix_acl *acl; + struct posix_acl_entry *out; + unsigned count = 0; if (!value) return NULL; if (size < sizeof(bch_acl_header)) - return ERR_PTR(-EINVAL); + goto invalid; if (((bch_acl_header *)value)->a_version != cpu_to_le32(BCH_ACL_VERSION)) - return ERR_PTR(-EINVAL); - value = (char *)value + sizeof(bch_acl_header); - count = bch2_acl_count(size); - if (count < 0) - return ERR_PTR(-EINVAL); - if (count == 0) + goto invalid; + + p = value + sizeof(bch_acl_header); + while (p < end) { + const bch_acl_entry *entry = p; + + if (p + sizeof(bch_acl_entry_short) > end) + goto invalid; + + switch (le16_to_cpu(entry->e_tag)) { + case ACL_USER_OBJ: + case ACL_GROUP_OBJ: + case ACL_MASK: + case ACL_OTHER: + p += sizeof(bch_acl_entry_short); + break; + case ACL_USER: + case ACL_GROUP: + p += sizeof(bch_acl_entry); + break; + default: + goto invalid; + } + + count++; + } + + if (p > end) + goto invalid; + + if (!count) return NULL; + acl = posix_acl_alloc(count, GFP_KERNEL); if (!acl) return ERR_PTR(-ENOMEM); - for (n = 0; n < count; n++) { - bch_acl_entry *entry = - (bch_acl_entry *)value; - if ((char *)value + sizeof(bch_acl_entry_short) > end) - goto fail; - acl->a_entries[n].e_tag = le16_to_cpu(entry->e_tag); - acl->a_entries[n].e_perm = le16_to_cpu(entry->e_perm); - switch (acl->a_entries[n].e_tag) { + + out = acl->a_entries; + + p = value + sizeof(bch_acl_header); + while (p < end) { + const bch_acl_entry *in = p; + + out->e_tag = le16_to_cpu(in->e_tag); + out->e_perm = le16_to_cpu(in->e_perm); + + switch (out->e_tag) { case ACL_USER_OBJ: case ACL_GROUP_OBJ: case ACL_MASK: case ACL_OTHER: - value = (char *)value + - sizeof(bch_acl_entry_short); + p += sizeof(bch_acl_entry_short); break; - case ACL_USER: - value = (char *)value + sizeof(bch_acl_entry); - if ((char *)value > end) - goto fail; - acl->a_entries[n].e_uid = - make_kuid(&init_user_ns, - le32_to_cpu(entry->e_id)); + out->e_uid = make_kuid(&init_user_ns, + le32_to_cpu(in->e_id)); + p += sizeof(bch_acl_entry); break; case ACL_GROUP: - value = (char *)value + sizeof(bch_acl_entry); - if ((char *)value > end) - goto fail; - acl->a_entries[n].e_gid = - make_kgid(&init_user_ns, - le32_to_cpu(entry->e_id)); + out->e_gid = make_kgid(&init_user_ns, + le32_to_cpu(in->e_id)); + p += sizeof(bch_acl_entry); break; - - default: - goto fail; } + + out++; } - if (value != end) - goto fail; - return acl; -fail: - posix_acl_release(acl); + BUG_ON(out != acl->a_entries + acl->a_count); + + return acl; +invalid: + pr_err("invalid acl entry"); return ERR_PTR(-EINVAL); } +#define acl_for_each_entry(acl, acl_e) \ + for (acl_e = acl->a_entries; \ + acl_e < acl->a_entries + acl->a_count; \ + acl_e++) + /* * Convert from in-memory to filesystem representation. */ -static void *bch2_acl_to_disk(const struct posix_acl *acl, size_t *size) +static struct bkey_i_xattr * +bch2_acl_to_xattr(const struct posix_acl *acl, + int type) { - bch_acl_header *ext_acl; - char *e; - size_t n; - - *size = bch2_acl_size(acl->a_count); - ext_acl = kmalloc(sizeof(bch_acl_header) + acl->a_count * - sizeof(bch_acl_entry), GFP_KERNEL); - if (!ext_acl) - return ERR_PTR(-ENOMEM); - ext_acl->a_version = cpu_to_le32(BCH_ACL_VERSION); - e = (char *)ext_acl + sizeof(bch_acl_header); - for (n = 0; n < acl->a_count; n++) { - const struct posix_acl_entry *acl_e = &acl->a_entries[n]; - bch_acl_entry *entry = (bch_acl_entry *)e; + struct bkey_i_xattr *xattr; + bch_acl_header *acl_header; + const struct posix_acl_entry *acl_e; + void *outptr; + unsigned nr_short = 0, nr_long = 0, acl_len, u64s; + + acl_for_each_entry(acl, acl_e) { + switch (acl_e->e_tag) { + case ACL_USER: + case ACL_GROUP: + nr_long++; + break; + case ACL_USER_OBJ: + case ACL_GROUP_OBJ: + case ACL_MASK: + case ACL_OTHER: + nr_short++; + break; + default: + return ERR_PTR(-EINVAL); + } + } + + acl_len = bch2_acl_size(nr_short, nr_long); + u64s = BKEY_U64s + xattr_val_u64s(0, acl_len); + + if (u64s > U8_MAX) + return ERR_PTR(-E2BIG); + + xattr = kmalloc(u64s * sizeof(u64), GFP_KERNEL); + if (IS_ERR(xattr)) + return xattr; + + bkey_xattr_init(&xattr->k_i); + xattr->k.u64s = u64s; + xattr->v.x_type = acl_to_xattr_type(type); + xattr->v.x_name_len = 0, + xattr->v.x_val_len = cpu_to_le16(acl_len); + + acl_header = xattr_val(&xattr->v); + acl_header->a_version = cpu_to_le32(BCH_ACL_VERSION); + + outptr = (void *) acl_header + sizeof(*acl_header); + + acl_for_each_entry(acl, acl_e) { + bch_acl_entry *entry = outptr; entry->e_tag = cpu_to_le16(acl_e->e_tag); entry->e_perm = cpu_to_le16(acl_e->e_perm); @@ -109,70 +188,54 @@ static void *bch2_acl_to_disk(const struct posix_acl *acl, size_t *size) case ACL_USER: entry->e_id = cpu_to_le32( from_kuid(&init_user_ns, acl_e->e_uid)); - e += sizeof(bch_acl_entry); + outptr += sizeof(bch_acl_entry); break; case ACL_GROUP: entry->e_id = cpu_to_le32( from_kgid(&init_user_ns, acl_e->e_gid)); - e += sizeof(bch_acl_entry); + outptr += sizeof(bch_acl_entry); break; case ACL_USER_OBJ: case ACL_GROUP_OBJ: case ACL_MASK: case ACL_OTHER: - e += sizeof(bch_acl_entry_short); + outptr += sizeof(bch_acl_entry_short); break; - - default: - goto fail; } } - return (char *)ext_acl; -fail: - kfree(ext_acl); - return ERR_PTR(-EINVAL); + BUG_ON(outptr != xattr_val(&xattr->v) + acl_len); + + return xattr; } struct posix_acl *bch2_get_acl(struct inode *vinode, int type) { struct bch_inode_info *inode = to_bch_ei(vinode); struct bch_fs *c = inode->v.i_sb->s_fs_info; - int name_index; - char *value = NULL; - struct posix_acl *acl; - int ret; - - switch (type) { - case ACL_TYPE_ACCESS: - name_index = BCH_XATTR_INDEX_POSIX_ACL_ACCESS; - break; - case ACL_TYPE_DEFAULT: - name_index = BCH_XATTR_INDEX_POSIX_ACL_DEFAULT; - break; - default: - BUG(); + struct btree_iter iter; + struct bkey_s_c_xattr xattr; + struct bkey_s_c k; + struct posix_acl *acl = NULL; + int name_index = acl_to_xattr_type(type); + + k = bch2_xattr_get_iter(c, &iter, inode, "", name_index); + if (IS_ERR(k.k)) { + if (PTR_ERR(k.k) != -ENOENT) + acl = ERR_CAST(k.k); + goto out; } - ret = bch2_xattr_get(c, inode, "", NULL, 0, name_index); - if (ret > 0) { - value = kmalloc(ret, GFP_KERNEL); - if (!value) - return ERR_PTR(-ENOMEM); - ret = bch2_xattr_get(c, inode, "", value, - ret, name_index); - } - if (ret > 0) - acl = bch2_acl_from_disk(value, ret); - else if (ret == -ENODATA || ret == -ENOSYS) - acl = NULL; - else - acl = ERR_PTR(ret); - kfree(value); + + xattr = bkey_s_c_to_xattr(k); + + acl = bch2_acl_from_disk(xattr_val(xattr.v), + le16_to_cpu(xattr.v->x_val_len)); if (!IS_ERR(acl)) set_cached_acl(&inode->v, type, acl); - +out: + bch2_btree_iter_unlock(&iter); return acl; } @@ -180,37 +243,31 @@ int __bch2_set_acl(struct inode *vinode, struct posix_acl *acl, int type) { struct bch_inode_info *inode = to_bch_ei(vinode); struct bch_fs *c = inode->v.i_sb->s_fs_info; - int name_index; - void *value = NULL; - size_t size = 0; int ret; - switch (type) { - case ACL_TYPE_ACCESS: - name_index = BCH_XATTR_INDEX_POSIX_ACL_ACCESS; - break; - case ACL_TYPE_DEFAULT: - name_index = BCH_XATTR_INDEX_POSIX_ACL_DEFAULT; - if (!S_ISDIR(inode->v.i_mode)) - return acl ? -EACCES : 0; - break; - - default: - return -EINVAL; - } + if (type == ACL_TYPE_DEFAULT && + !S_ISDIR(inode->v.i_mode)) + return acl ? -EACCES : 0; if (acl) { - value = bch2_acl_to_disk(acl, &size); - if (IS_ERR(value)) - return (int)PTR_ERR(value); + struct bkey_i_xattr *xattr = + bch2_acl_to_xattr(acl, type); + if (IS_ERR(xattr)) + return PTR_ERR(xattr); + + ret = bch2_hash_set(bch2_xattr_hash_desc, &inode->ei_str_hash, + c, inode->v.i_ino, &inode->ei_journal_seq, + &xattr->k_i, 0); + kfree(xattr); + } else { + struct xattr_search_key search = + X_SEARCH(acl_to_xattr_type(type), "", 0); + + ret = bch2_hash_delete(bch2_xattr_hash_desc, &inode->ei_str_hash, + c, inode->v.i_ino, &inode->ei_journal_seq, + &search); } - ret = bch2_xattr_set(c, inode, "", value, size, 0, name_index); - kfree(value); - - if (ret == -ERANGE) - ret = -E2BIG; - if (!ret) set_cached_acl(&inode->v, type, acl); diff --git a/fs/bcachefs/acl.h b/fs/bcachefs/acl.h index a66338d4171e..0be31ee9e59d 100644 --- a/fs/bcachefs/acl.h +++ b/fs/bcachefs/acl.h @@ -20,35 +20,6 @@ typedef struct { __le32 a_version; } bch_acl_header; -static inline size_t bch2_acl_size(int count) -{ - if (count <= 4) { - return sizeof(bch_acl_header) + - count * sizeof(bch_acl_entry_short); - } else { - return sizeof(bch_acl_header) + - 4 * sizeof(bch_acl_entry_short) + - (count - 4) * sizeof(bch_acl_entry); - } -} - -static inline int bch2_acl_count(size_t size) -{ - ssize_t s; - - size -= sizeof(bch_acl_header); - s = size - 4 * sizeof(bch_acl_entry_short); - if (s < 0) { - if (size % sizeof(bch_acl_entry_short)) - return -1; - return size / sizeof(bch_acl_entry_short); - } else { - if (s % sizeof(bch_acl_entry)) - return -1; - return s / sizeof(bch_acl_entry) + 4; - } -} - struct posix_acl; extern struct posix_acl *bch2_get_acl(struct inode *, int); diff --git a/fs/bcachefs/xattr.c b/fs/bcachefs/xattr.c index de95480c8b08..c6b5015a0087 100644 --- a/fs/bcachefs/xattr.c +++ b/fs/bcachefs/xattr.c @@ -13,24 +13,8 @@ #include <linux/posix_acl_xattr.h> #include <linux/xattr.h> -static unsigned xattr_val_u64s(unsigned name_len, unsigned val_len) -{ - return DIV_ROUND_UP(offsetof(struct bch_xattr, x_name) + - name_len + val_len, sizeof(u64)); -} - -#define xattr_val(_xattr) ((_xattr)->x_name + (_xattr)->x_name_len) - static const struct xattr_handler *bch2_xattr_type_to_handler(unsigned); -struct xattr_search_key { - u8 type; - struct qstr name; -}; - -#define X_SEARCH(_type, _name, _len) ((struct xattr_search_key) \ - { .type = _type, .name = QSTR_INIT(_name, _len) }) - static u64 bch2_xattr_hash(const struct bch_hash_info *info, const struct xattr_search_key *key) { @@ -158,6 +142,17 @@ void bch2_xattr_to_text(struct bch_fs *c, char *buf, } } +struct bkey_s_c bch2_xattr_get_iter(struct bch_fs *c, + struct btree_iter *iter, + struct bch_inode_info *inode, + const char *name, int type) +{ + return bch2_hash_lookup(bch2_xattr_hash_desc, + &inode->ei_str_hash, + c, inode->v.i_ino, iter, + &X_SEARCH(type, name, strlen(name))); +} + int bch2_xattr_get(struct bch_fs *c, struct bch_inode_info *inode, const char *name, void *buffer, size_t size, int type) { @@ -185,19 +180,15 @@ int bch2_xattr_get(struct bch_fs *c, struct bch_inode_info *inode, return ret; } -int __bch2_xattr_set(struct bch_fs *c, u64 inum, - const struct bch_hash_info *hash_info, - const char *name, const void *value, size_t size, - int flags, int type, u64 *journal_seq) +int bch2_xattr_set(struct bch_fs *c, u64 inum, + const struct bch_hash_info *hash_info, + const char *name, const void *value, size_t size, + int flags, int type, u64 *journal_seq) { struct xattr_search_key search = X_SEARCH(type, name, strlen(name)); int ret; - if (!value) { - ret = bch2_hash_delete(bch2_xattr_hash_desc, hash_info, - c, inum, - journal_seq, &search); - } else { + if (value) { struct bkey_i_xattr *xattr; unsigned u64s = BKEY_U64s + xattr_val_u64s(search.name.len, size); @@ -223,6 +214,9 @@ int __bch2_xattr_set(struct bch_fs *c, u64 inum, (flags & XATTR_CREATE ? BCH_HASH_SET_MUST_CREATE : 0)| (flags & XATTR_REPLACE ? BCH_HASH_SET_MUST_REPLACE : 0)); kfree(xattr); + } else { + ret = bch2_hash_delete(bch2_xattr_hash_desc, hash_info, + c, inum, journal_seq, &search); } if (ret == -ENOENT) @@ -231,15 +225,6 @@ int __bch2_xattr_set(struct bch_fs *c, u64 inum, return ret; } -int bch2_xattr_set(struct bch_fs *c, struct bch_inode_info *inode, - const char *name, const void *value, size_t size, - int flags, int type) -{ - return __bch2_xattr_set(c, inode->v.i_ino, &inode->ei_str_hash, - name, value, size, flags, type, - &inode->ei_journal_seq); -} - static size_t bch2_xattr_emit(struct dentry *dentry, const struct bch_xattr *xattr, char *buffer, size_t buffer_size) @@ -323,8 +308,9 @@ static int bch2_xattr_set_handler(const struct xattr_handler *handler, struct bch_inode_info *inode = to_bch_ei(vinode); struct bch_fs *c = inode->v.i_sb->s_fs_info; - return bch2_xattr_set(c, inode, name, value, size, flags, - handler->flags); + return bch2_xattr_set(c, inode->v.i_ino, &inode->ei_str_hash, + name, value, size, flags, handler->flags, + &inode->ei_journal_seq); } static const struct xattr_handler bch_xattr_user_handler = { diff --git a/fs/bcachefs/xattr.h b/fs/bcachefs/xattr.h index a58e7e303421..1365032d56c3 100644 --- a/fs/bcachefs/xattr.h +++ b/fs/bcachefs/xattr.h @@ -13,17 +13,37 @@ void bch2_xattr_to_text(struct bch_fs *, char *, size_t, struct bkey_s_c); .val_to_text = bch2_xattr_to_text, \ } +static inline unsigned xattr_val_u64s(unsigned name_len, unsigned val_len) +{ + return DIV_ROUND_UP(offsetof(struct bch_xattr, x_name) + + name_len + val_len, sizeof(u64)); +} + +#define xattr_val(_xattr) \ + ((void *) (_xattr)->x_name + (_xattr)->x_name_len) + +struct xattr_search_key { + u8 type; + struct qstr name; +}; + +#define X_SEARCH(_type, _name, _len) ((struct xattr_search_key) \ + { .type = _type, .name = QSTR_INIT(_name, _len) }) + struct dentry; struct xattr_handler; struct bch_hash_info; struct bch_inode_info; +struct bkey_s_c bch2_xattr_get_iter(struct bch_fs *, + struct btree_iter *, + struct bch_inode_info *, + const char *, int); int bch2_xattr_get(struct bch_fs *, struct bch_inode_info *, const char *, void *, size_t, int); -int __bch2_xattr_set(struct bch_fs *, u64, const struct bch_hash_info *, - const char *, const void *, size_t, int, int, u64 *); -int bch2_xattr_set(struct bch_fs *, struct bch_inode_info *, - const char *, const void *, size_t, int, int); + +int bch2_xattr_set(struct bch_fs *, u64, const struct bch_hash_info *, + const char *, const void *, size_t, int, int, u64 *); ssize_t bch2_xattr_list(struct dentry *, char *, size_t); extern const struct xattr_handler *bch2_xattr_handlers[]; |