162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * JFFS2 -- Journalling Flash File System, Version 2. 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Copyright © 2006 NEC Corporation 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Created by KaiGai Kohei <kaigai@ak.jp.nec.com> 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * For licensing information, see the file 'LICENCE' in this directory. 962306a36Sopenharmony_ci * 1062306a36Sopenharmony_ci */ 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#define JFFS2_XATTR_IS_CORRUPTED 1 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci#include <linux/kernel.h> 1762306a36Sopenharmony_ci#include <linux/slab.h> 1862306a36Sopenharmony_ci#include <linux/fs.h> 1962306a36Sopenharmony_ci#include <linux/time.h> 2062306a36Sopenharmony_ci#include <linux/pagemap.h> 2162306a36Sopenharmony_ci#include <linux/highmem.h> 2262306a36Sopenharmony_ci#include <linux/crc32.h> 2362306a36Sopenharmony_ci#include <linux/jffs2.h> 2462306a36Sopenharmony_ci#include <linux/xattr.h> 2562306a36Sopenharmony_ci#include <linux/posix_acl_xattr.h> 2662306a36Sopenharmony_ci#include <linux/mtd/mtd.h> 2762306a36Sopenharmony_ci#include "nodelist.h" 2862306a36Sopenharmony_ci/* -------- xdatum related functions ---------------- 2962306a36Sopenharmony_ci * xattr_datum_hashkey(xprefix, xname, xvalue, xsize) 3062306a36Sopenharmony_ci * is used to calcurate xdatum hashkey. The reminder of hashkey into XATTRINDEX_HASHSIZE is 3162306a36Sopenharmony_ci * the index of the xattr name/value pair cache (c->xattrindex). 3262306a36Sopenharmony_ci * is_xattr_datum_unchecked(c, xd) 3362306a36Sopenharmony_ci * returns 1, if xdatum contains any unchecked raw nodes. if all raw nodes are not 3462306a36Sopenharmony_ci * unchecked, it returns 0. 3562306a36Sopenharmony_ci * unload_xattr_datum(c, xd) 3662306a36Sopenharmony_ci * is used to release xattr name/value pair and detach from c->xattrindex. 3762306a36Sopenharmony_ci * reclaim_xattr_datum(c) 3862306a36Sopenharmony_ci * is used to reclaim xattr name/value pairs on the xattr name/value pair cache when 3962306a36Sopenharmony_ci * memory usage by cache is over c->xdatum_mem_threshold. Currently, this threshold 4062306a36Sopenharmony_ci * is hard coded as 32KiB. 4162306a36Sopenharmony_ci * do_verify_xattr_datum(c, xd) 4262306a36Sopenharmony_ci * is used to load the xdatum informations without name/value pair from the medium. 4362306a36Sopenharmony_ci * It's necessary once, because those informations are not collected during mounting 4462306a36Sopenharmony_ci * process when EBS is enabled. 4562306a36Sopenharmony_ci * 0 will be returned, if success. An negative return value means recoverable error, and 4662306a36Sopenharmony_ci * positive return value means unrecoverable error. Thus, caller must remove this xdatum 4762306a36Sopenharmony_ci * and xref when it returned positive value. 4862306a36Sopenharmony_ci * do_load_xattr_datum(c, xd) 4962306a36Sopenharmony_ci * is used to load name/value pair from the medium. 5062306a36Sopenharmony_ci * The meanings of return value is same as do_verify_xattr_datum(). 5162306a36Sopenharmony_ci * load_xattr_datum(c, xd) 5262306a36Sopenharmony_ci * is used to be as a wrapper of do_verify_xattr_datum() and do_load_xattr_datum(). 5362306a36Sopenharmony_ci * If xd need to call do_verify_xattr_datum() at first, it's called before calling 5462306a36Sopenharmony_ci * do_load_xattr_datum(). The meanings of return value is same as do_verify_xattr_datum(). 5562306a36Sopenharmony_ci * save_xattr_datum(c, xd) 5662306a36Sopenharmony_ci * is used to write xdatum to medium. xd->version will be incremented. 5762306a36Sopenharmony_ci * create_xattr_datum(c, xprefix, xname, xvalue, xsize) 5862306a36Sopenharmony_ci * is used to create new xdatum and write to medium. 5962306a36Sopenharmony_ci * unrefer_xattr_datum(c, xd) 6062306a36Sopenharmony_ci * is used to delete a xdatum. When nobody refers this xdatum, JFFS2_XFLAGS_DEAD 6162306a36Sopenharmony_ci * is set on xd->flags and chained xattr_dead_list or release it immediately. 6262306a36Sopenharmony_ci * In the first case, the garbage collector release it later. 6362306a36Sopenharmony_ci * -------------------------------------------------- */ 6462306a36Sopenharmony_cistatic uint32_t xattr_datum_hashkey(int xprefix, const char *xname, const char *xvalue, int xsize) 6562306a36Sopenharmony_ci{ 6662306a36Sopenharmony_ci int name_len = strlen(xname); 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci return crc32(xprefix, xname, name_len) ^ crc32(xprefix, xvalue, xsize); 6962306a36Sopenharmony_ci} 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_cistatic int is_xattr_datum_unchecked(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 7262306a36Sopenharmony_ci{ 7362306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw; 7462306a36Sopenharmony_ci int rc = 0; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 7762306a36Sopenharmony_ci for (raw=xd->node; raw != (void *)xd; raw=raw->next_in_ino) { 7862306a36Sopenharmony_ci if (ref_flags(raw) == REF_UNCHECKED) { 7962306a36Sopenharmony_ci rc = 1; 8062306a36Sopenharmony_ci break; 8162306a36Sopenharmony_ci } 8262306a36Sopenharmony_ci } 8362306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 8462306a36Sopenharmony_ci return rc; 8562306a36Sopenharmony_ci} 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_cistatic void unload_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 8862306a36Sopenharmony_ci{ 8962306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 9062306a36Sopenharmony_ci D1(dbg_xattr("%s: xid=%u, version=%u\n", __func__, xd->xid, xd->version)); 9162306a36Sopenharmony_ci if (xd->xname) { 9262306a36Sopenharmony_ci c->xdatum_mem_usage -= (xd->name_len + 1 + xd->value_len); 9362306a36Sopenharmony_ci kfree(xd->xname); 9462306a36Sopenharmony_ci } 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci list_del_init(&xd->xindex); 9762306a36Sopenharmony_ci xd->hashkey = 0; 9862306a36Sopenharmony_ci xd->xname = NULL; 9962306a36Sopenharmony_ci xd->xvalue = NULL; 10062306a36Sopenharmony_ci} 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_cistatic void reclaim_xattr_datum(struct jffs2_sb_info *c) 10362306a36Sopenharmony_ci{ 10462306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 10562306a36Sopenharmony_ci struct jffs2_xattr_datum *xd, *_xd; 10662306a36Sopenharmony_ci uint32_t target, before; 10762306a36Sopenharmony_ci static int index = 0; 10862306a36Sopenharmony_ci int count; 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci if (c->xdatum_mem_threshold > c->xdatum_mem_usage) 11162306a36Sopenharmony_ci return; 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci before = c->xdatum_mem_usage; 11462306a36Sopenharmony_ci target = c->xdatum_mem_usage * 4 / 5; /* 20% reduction */ 11562306a36Sopenharmony_ci for (count = 0; count < XATTRINDEX_HASHSIZE; count++) { 11662306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattrindex[index], xindex) { 11762306a36Sopenharmony_ci if (xd->flags & JFFS2_XFLAGS_HOT) { 11862306a36Sopenharmony_ci xd->flags &= ~JFFS2_XFLAGS_HOT; 11962306a36Sopenharmony_ci } else if (!(xd->flags & JFFS2_XFLAGS_BIND)) { 12062306a36Sopenharmony_ci unload_xattr_datum(c, xd); 12162306a36Sopenharmony_ci } 12262306a36Sopenharmony_ci if (c->xdatum_mem_usage <= target) 12362306a36Sopenharmony_ci goto out; 12462306a36Sopenharmony_ci } 12562306a36Sopenharmony_ci index = (index+1) % XATTRINDEX_HASHSIZE; 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci out: 12862306a36Sopenharmony_ci JFFS2_NOTICE("xdatum_mem_usage from %u byte to %u byte (%u byte reclaimed)\n", 12962306a36Sopenharmony_ci before, c->xdatum_mem_usage, before - c->xdatum_mem_usage); 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_cistatic int do_verify_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 13362306a36Sopenharmony_ci{ 13462306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 13562306a36Sopenharmony_ci struct jffs2_eraseblock *jeb; 13662306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw; 13762306a36Sopenharmony_ci struct jffs2_raw_xattr rx; 13862306a36Sopenharmony_ci size_t readlen; 13962306a36Sopenharmony_ci uint32_t crc, offset, totlen; 14062306a36Sopenharmony_ci int rc; 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 14362306a36Sopenharmony_ci offset = ref_offset(xd->node); 14462306a36Sopenharmony_ci if (ref_flags(xd->node) == REF_PRISTINE) 14562306a36Sopenharmony_ci goto complete; 14662306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci rc = jffs2_flash_read(c, offset, sizeof(rx), &readlen, (char *)&rx); 14962306a36Sopenharmony_ci if (rc || readlen != sizeof(rx)) { 15062306a36Sopenharmony_ci JFFS2_WARNING("jffs2_flash_read()=%d, req=%zu, read=%zu at %#08x\n", 15162306a36Sopenharmony_ci rc, sizeof(rx), readlen, offset); 15262306a36Sopenharmony_ci return rc ? rc : -EIO; 15362306a36Sopenharmony_ci } 15462306a36Sopenharmony_ci crc = crc32(0, &rx, sizeof(rx) - 4); 15562306a36Sopenharmony_ci if (crc != je32_to_cpu(rx.node_crc)) { 15662306a36Sopenharmony_ci JFFS2_ERROR("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", 15762306a36Sopenharmony_ci offset, je32_to_cpu(rx.hdr_crc), crc); 15862306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_INVALID; 15962306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 16062306a36Sopenharmony_ci } 16162306a36Sopenharmony_ci totlen = PAD(sizeof(rx) + rx.name_len + 1 + je16_to_cpu(rx.value_len)); 16262306a36Sopenharmony_ci if (je16_to_cpu(rx.magic) != JFFS2_MAGIC_BITMASK 16362306a36Sopenharmony_ci || je16_to_cpu(rx.nodetype) != JFFS2_NODETYPE_XATTR 16462306a36Sopenharmony_ci || je32_to_cpu(rx.totlen) != totlen 16562306a36Sopenharmony_ci || je32_to_cpu(rx.xid) != xd->xid 16662306a36Sopenharmony_ci || je32_to_cpu(rx.version) != xd->version) { 16762306a36Sopenharmony_ci JFFS2_ERROR("inconsistent xdatum at %#08x, magic=%#04x/%#04x, " 16862306a36Sopenharmony_ci "nodetype=%#04x/%#04x, totlen=%u/%u, xid=%u/%u, version=%u/%u\n", 16962306a36Sopenharmony_ci offset, je16_to_cpu(rx.magic), JFFS2_MAGIC_BITMASK, 17062306a36Sopenharmony_ci je16_to_cpu(rx.nodetype), JFFS2_NODETYPE_XATTR, 17162306a36Sopenharmony_ci je32_to_cpu(rx.totlen), totlen, 17262306a36Sopenharmony_ci je32_to_cpu(rx.xid), xd->xid, 17362306a36Sopenharmony_ci je32_to_cpu(rx.version), xd->version); 17462306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_INVALID; 17562306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 17662306a36Sopenharmony_ci } 17762306a36Sopenharmony_ci xd->xprefix = rx.xprefix; 17862306a36Sopenharmony_ci xd->name_len = rx.name_len; 17962306a36Sopenharmony_ci xd->value_len = je16_to_cpu(rx.value_len); 18062306a36Sopenharmony_ci xd->data_crc = je32_to_cpu(rx.data_crc); 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 18362306a36Sopenharmony_ci complete: 18462306a36Sopenharmony_ci for (raw=xd->node; raw != (void *)xd; raw=raw->next_in_ino) { 18562306a36Sopenharmony_ci jeb = &c->blocks[ref_offset(raw) / c->sector_size]; 18662306a36Sopenharmony_ci totlen = PAD(ref_totlen(c, jeb, raw)); 18762306a36Sopenharmony_ci if (ref_flags(raw) == REF_UNCHECKED) { 18862306a36Sopenharmony_ci c->unchecked_size -= totlen; c->used_size += totlen; 18962306a36Sopenharmony_ci jeb->unchecked_size -= totlen; jeb->used_size += totlen; 19062306a36Sopenharmony_ci } 19162306a36Sopenharmony_ci raw->flash_offset = ref_offset(raw) | ((xd->node==raw) ? REF_PRISTINE : REF_NORMAL); 19262306a36Sopenharmony_ci } 19362306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci /* unchecked xdatum is chained with c->xattr_unchecked */ 19662306a36Sopenharmony_ci list_del_init(&xd->xindex); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci dbg_xattr("success on verifying xdatum (xid=%u, version=%u)\n", 19962306a36Sopenharmony_ci xd->xid, xd->version); 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci return 0; 20262306a36Sopenharmony_ci} 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_cistatic int do_load_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 20562306a36Sopenharmony_ci{ 20662306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 20762306a36Sopenharmony_ci char *data; 20862306a36Sopenharmony_ci size_t readlen; 20962306a36Sopenharmony_ci uint32_t crc, length; 21062306a36Sopenharmony_ci int i, ret, retry = 0; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci BUG_ON(ref_flags(xd->node) != REF_PRISTINE); 21362306a36Sopenharmony_ci BUG_ON(!list_empty(&xd->xindex)); 21462306a36Sopenharmony_ci retry: 21562306a36Sopenharmony_ci length = xd->name_len + 1 + xd->value_len; 21662306a36Sopenharmony_ci data = kmalloc(length, GFP_KERNEL); 21762306a36Sopenharmony_ci if (!data) 21862306a36Sopenharmony_ci return -ENOMEM; 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci ret = jffs2_flash_read(c, ref_offset(xd->node)+sizeof(struct jffs2_raw_xattr), 22162306a36Sopenharmony_ci length, &readlen, data); 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci if (ret || length!=readlen) { 22462306a36Sopenharmony_ci JFFS2_WARNING("jffs2_flash_read() returned %d, request=%d, readlen=%zu, at %#08x\n", 22562306a36Sopenharmony_ci ret, length, readlen, ref_offset(xd->node)); 22662306a36Sopenharmony_ci kfree(data); 22762306a36Sopenharmony_ci return ret ? ret : -EIO; 22862306a36Sopenharmony_ci } 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci data[xd->name_len] = '\0'; 23162306a36Sopenharmony_ci crc = crc32(0, data, length); 23262306a36Sopenharmony_ci if (crc != xd->data_crc) { 23362306a36Sopenharmony_ci JFFS2_WARNING("node CRC failed (JFFS2_NODETYPE_XATTR)" 23462306a36Sopenharmony_ci " at %#08x, read: 0x%08x calculated: 0x%08x\n", 23562306a36Sopenharmony_ci ref_offset(xd->node), xd->data_crc, crc); 23662306a36Sopenharmony_ci kfree(data); 23762306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_INVALID; 23862306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 23962306a36Sopenharmony_ci } 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_HOT; 24262306a36Sopenharmony_ci xd->xname = data; 24362306a36Sopenharmony_ci xd->xvalue = data + xd->name_len+1; 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci c->xdatum_mem_usage += length; 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_ci xd->hashkey = xattr_datum_hashkey(xd->xprefix, xd->xname, xd->xvalue, xd->value_len); 24862306a36Sopenharmony_ci i = xd->hashkey % XATTRINDEX_HASHSIZE; 24962306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattrindex[i]); 25062306a36Sopenharmony_ci if (!retry) { 25162306a36Sopenharmony_ci retry = 1; 25262306a36Sopenharmony_ci reclaim_xattr_datum(c); 25362306a36Sopenharmony_ci if (!xd->xname) 25462306a36Sopenharmony_ci goto retry; 25562306a36Sopenharmony_ci } 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci dbg_xattr("success on loading xdatum (xid=%u, xprefix=%u, xname='%s')\n", 25862306a36Sopenharmony_ci xd->xid, xd->xprefix, xd->xname); 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_ci return 0; 26162306a36Sopenharmony_ci} 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_cistatic int load_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 26462306a36Sopenharmony_ci{ 26562306a36Sopenharmony_ci /* must be called under down_write(xattr_sem); 26662306a36Sopenharmony_ci * rc < 0 : recoverable error, try again 26762306a36Sopenharmony_ci * rc = 0 : success 26862306a36Sopenharmony_ci * rc > 0 : Unrecoverable error, this node should be deleted. 26962306a36Sopenharmony_ci */ 27062306a36Sopenharmony_ci int rc = 0; 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci BUG_ON(xd->flags & JFFS2_XFLAGS_DEAD); 27362306a36Sopenharmony_ci if (xd->xname) 27462306a36Sopenharmony_ci return 0; 27562306a36Sopenharmony_ci if (xd->flags & JFFS2_XFLAGS_INVALID) 27662306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 27762306a36Sopenharmony_ci if (unlikely(is_xattr_datum_unchecked(c, xd))) 27862306a36Sopenharmony_ci rc = do_verify_xattr_datum(c, xd); 27962306a36Sopenharmony_ci if (!rc) 28062306a36Sopenharmony_ci rc = do_load_xattr_datum(c, xd); 28162306a36Sopenharmony_ci return rc; 28262306a36Sopenharmony_ci} 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_cistatic int save_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 28562306a36Sopenharmony_ci{ 28662306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 28762306a36Sopenharmony_ci struct jffs2_raw_xattr rx; 28862306a36Sopenharmony_ci struct kvec vecs[2]; 28962306a36Sopenharmony_ci size_t length; 29062306a36Sopenharmony_ci int rc, totlen; 29162306a36Sopenharmony_ci uint32_t phys_ofs = write_ofs(c); 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci BUG_ON(!xd->xname); 29462306a36Sopenharmony_ci BUG_ON(xd->flags & (JFFS2_XFLAGS_DEAD|JFFS2_XFLAGS_INVALID)); 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci vecs[0].iov_base = ℞ 29762306a36Sopenharmony_ci vecs[0].iov_len = sizeof(rx); 29862306a36Sopenharmony_ci vecs[1].iov_base = xd->xname; 29962306a36Sopenharmony_ci vecs[1].iov_len = xd->name_len + 1 + xd->value_len; 30062306a36Sopenharmony_ci totlen = vecs[0].iov_len + vecs[1].iov_len; 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci /* Setup raw-xattr */ 30362306a36Sopenharmony_ci memset(&rx, 0, sizeof(rx)); 30462306a36Sopenharmony_ci rx.magic = cpu_to_je16(JFFS2_MAGIC_BITMASK); 30562306a36Sopenharmony_ci rx.nodetype = cpu_to_je16(JFFS2_NODETYPE_XATTR); 30662306a36Sopenharmony_ci rx.totlen = cpu_to_je32(PAD(totlen)); 30762306a36Sopenharmony_ci rx.hdr_crc = cpu_to_je32(crc32(0, &rx, sizeof(struct jffs2_unknown_node) - 4)); 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci rx.xid = cpu_to_je32(xd->xid); 31062306a36Sopenharmony_ci rx.version = cpu_to_je32(++xd->version); 31162306a36Sopenharmony_ci rx.xprefix = xd->xprefix; 31262306a36Sopenharmony_ci rx.name_len = xd->name_len; 31362306a36Sopenharmony_ci rx.value_len = cpu_to_je16(xd->value_len); 31462306a36Sopenharmony_ci rx.data_crc = cpu_to_je32(crc32(0, vecs[1].iov_base, vecs[1].iov_len)); 31562306a36Sopenharmony_ci rx.node_crc = cpu_to_je32(crc32(0, &rx, sizeof(struct jffs2_raw_xattr) - 4)); 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci rc = jffs2_flash_writev(c, vecs, 2, phys_ofs, &length, 0); 31862306a36Sopenharmony_ci if (rc || totlen != length) { 31962306a36Sopenharmony_ci JFFS2_WARNING("jffs2_flash_writev()=%d, req=%u, wrote=%zu, at %#08x\n", 32062306a36Sopenharmony_ci rc, totlen, length, phys_ofs); 32162306a36Sopenharmony_ci rc = rc ? rc : -EIO; 32262306a36Sopenharmony_ci if (length) 32362306a36Sopenharmony_ci jffs2_add_physical_node_ref(c, phys_ofs | REF_OBSOLETE, PAD(totlen), NULL); 32462306a36Sopenharmony_ci 32562306a36Sopenharmony_ci return rc; 32662306a36Sopenharmony_ci } 32762306a36Sopenharmony_ci /* success */ 32862306a36Sopenharmony_ci jffs2_add_physical_node_ref(c, phys_ofs | REF_PRISTINE, PAD(totlen), (void *)xd); 32962306a36Sopenharmony_ci 33062306a36Sopenharmony_ci dbg_xattr("success on saving xdatum (xid=%u, version=%u, xprefix=%u, xname='%s')\n", 33162306a36Sopenharmony_ci xd->xid, xd->version, xd->xprefix, xd->xname); 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci return 0; 33462306a36Sopenharmony_ci} 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_cistatic struct jffs2_xattr_datum *create_xattr_datum(struct jffs2_sb_info *c, 33762306a36Sopenharmony_ci int xprefix, const char *xname, 33862306a36Sopenharmony_ci const char *xvalue, int xsize) 33962306a36Sopenharmony_ci{ 34062306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 34162306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 34262306a36Sopenharmony_ci uint32_t hashkey, name_len; 34362306a36Sopenharmony_ci char *data; 34462306a36Sopenharmony_ci int i, rc; 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci /* Search xattr_datum has same xname/xvalue by index */ 34762306a36Sopenharmony_ci hashkey = xattr_datum_hashkey(xprefix, xname, xvalue, xsize); 34862306a36Sopenharmony_ci i = hashkey % XATTRINDEX_HASHSIZE; 34962306a36Sopenharmony_ci list_for_each_entry(xd, &c->xattrindex[i], xindex) { 35062306a36Sopenharmony_ci if (xd->hashkey==hashkey 35162306a36Sopenharmony_ci && xd->xprefix==xprefix 35262306a36Sopenharmony_ci && xd->value_len==xsize 35362306a36Sopenharmony_ci && !strcmp(xd->xname, xname) 35462306a36Sopenharmony_ci && !memcmp(xd->xvalue, xvalue, xsize)) { 35562306a36Sopenharmony_ci atomic_inc(&xd->refcnt); 35662306a36Sopenharmony_ci return xd; 35762306a36Sopenharmony_ci } 35862306a36Sopenharmony_ci } 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci /* Not found, Create NEW XATTR-Cache */ 36162306a36Sopenharmony_ci name_len = strlen(xname); 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci xd = jffs2_alloc_xattr_datum(); 36462306a36Sopenharmony_ci if (!xd) 36562306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci data = kmalloc(name_len + 1 + xsize, GFP_KERNEL); 36862306a36Sopenharmony_ci if (!data) { 36962306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 37062306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 37162306a36Sopenharmony_ci } 37262306a36Sopenharmony_ci strcpy(data, xname); 37362306a36Sopenharmony_ci memcpy(data + name_len + 1, xvalue, xsize); 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci atomic_set(&xd->refcnt, 1); 37662306a36Sopenharmony_ci xd->xid = ++c->highest_xid; 37762306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_HOT; 37862306a36Sopenharmony_ci xd->xprefix = xprefix; 37962306a36Sopenharmony_ci 38062306a36Sopenharmony_ci xd->hashkey = hashkey; 38162306a36Sopenharmony_ci xd->xname = data; 38262306a36Sopenharmony_ci xd->xvalue = data + name_len + 1; 38362306a36Sopenharmony_ci xd->name_len = name_len; 38462306a36Sopenharmony_ci xd->value_len = xsize; 38562306a36Sopenharmony_ci xd->data_crc = crc32(0, data, xd->name_len + 1 + xd->value_len); 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci rc = save_xattr_datum(c, xd); 38862306a36Sopenharmony_ci if (rc) { 38962306a36Sopenharmony_ci kfree(xd->xname); 39062306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 39162306a36Sopenharmony_ci return ERR_PTR(rc); 39262306a36Sopenharmony_ci } 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_ci /* Insert Hash Index */ 39562306a36Sopenharmony_ci i = hashkey % XATTRINDEX_HASHSIZE; 39662306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattrindex[i]); 39762306a36Sopenharmony_ci 39862306a36Sopenharmony_ci c->xdatum_mem_usage += (xd->name_len + 1 + xd->value_len); 39962306a36Sopenharmony_ci reclaim_xattr_datum(c); 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci return xd; 40262306a36Sopenharmony_ci} 40362306a36Sopenharmony_ci 40462306a36Sopenharmony_cistatic void unrefer_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 40562306a36Sopenharmony_ci{ 40662306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 40762306a36Sopenharmony_ci if (atomic_dec_and_lock(&xd->refcnt, &c->erase_completion_lock)) { 40862306a36Sopenharmony_ci unload_xattr_datum(c, xd); 40962306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_DEAD; 41062306a36Sopenharmony_ci if (xd->node == (void *)xd) { 41162306a36Sopenharmony_ci BUG_ON(!(xd->flags & JFFS2_XFLAGS_INVALID)); 41262306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 41362306a36Sopenharmony_ci } else { 41462306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattr_dead_list); 41562306a36Sopenharmony_ci } 41662306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 41762306a36Sopenharmony_ci 41862306a36Sopenharmony_ci dbg_xattr("xdatum(xid=%u, version=%u) was removed.\n", 41962306a36Sopenharmony_ci xd->xid, xd->version); 42062306a36Sopenharmony_ci } 42162306a36Sopenharmony_ci} 42262306a36Sopenharmony_ci 42362306a36Sopenharmony_ci/* -------- xref related functions ------------------ 42462306a36Sopenharmony_ci * verify_xattr_ref(c, ref) 42562306a36Sopenharmony_ci * is used to load xref information from medium. Because summary data does not 42662306a36Sopenharmony_ci * contain xid/ino, it's necessary to verify once while mounting process. 42762306a36Sopenharmony_ci * save_xattr_ref(c, ref) 42862306a36Sopenharmony_ci * is used to write xref to medium. If delete marker is marked, it write 42962306a36Sopenharmony_ci * a delete marker of xref into medium. 43062306a36Sopenharmony_ci * create_xattr_ref(c, ic, xd) 43162306a36Sopenharmony_ci * is used to create a new xref and write to medium. 43262306a36Sopenharmony_ci * delete_xattr_ref(c, ref) 43362306a36Sopenharmony_ci * is used to delete jffs2_xattr_ref. It marks xref XREF_DELETE_MARKER, 43462306a36Sopenharmony_ci * and allows GC to reclaim those physical nodes. 43562306a36Sopenharmony_ci * jffs2_xattr_delete_inode(c, ic) 43662306a36Sopenharmony_ci * is called to remove xrefs related to obsolete inode when inode is unlinked. 43762306a36Sopenharmony_ci * jffs2_xattr_free_inode(c, ic) 43862306a36Sopenharmony_ci * is called to release xattr related objects when unmounting. 43962306a36Sopenharmony_ci * check_xattr_ref_inode(c, ic) 44062306a36Sopenharmony_ci * is used to confirm inode does not have duplicate xattr name/value pair. 44162306a36Sopenharmony_ci * jffs2_xattr_do_crccheck_inode(c, ic) 44262306a36Sopenharmony_ci * is used to force xattr data integrity check during the initial gc scan. 44362306a36Sopenharmony_ci * -------------------------------------------------- */ 44462306a36Sopenharmony_cistatic int verify_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) 44562306a36Sopenharmony_ci{ 44662306a36Sopenharmony_ci struct jffs2_eraseblock *jeb; 44762306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw; 44862306a36Sopenharmony_ci struct jffs2_raw_xref rr; 44962306a36Sopenharmony_ci size_t readlen; 45062306a36Sopenharmony_ci uint32_t crc, offset, totlen; 45162306a36Sopenharmony_ci int rc; 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 45462306a36Sopenharmony_ci if (ref_flags(ref->node) != REF_UNCHECKED) 45562306a36Sopenharmony_ci goto complete; 45662306a36Sopenharmony_ci offset = ref_offset(ref->node); 45762306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci rc = jffs2_flash_read(c, offset, sizeof(rr), &readlen, (char *)&rr); 46062306a36Sopenharmony_ci if (rc || sizeof(rr) != readlen) { 46162306a36Sopenharmony_ci JFFS2_WARNING("jffs2_flash_read()=%d, req=%zu, read=%zu, at %#08x\n", 46262306a36Sopenharmony_ci rc, sizeof(rr), readlen, offset); 46362306a36Sopenharmony_ci return rc ? rc : -EIO; 46462306a36Sopenharmony_ci } 46562306a36Sopenharmony_ci /* obsolete node */ 46662306a36Sopenharmony_ci crc = crc32(0, &rr, sizeof(rr) - 4); 46762306a36Sopenharmony_ci if (crc != je32_to_cpu(rr.node_crc)) { 46862306a36Sopenharmony_ci JFFS2_ERROR("node CRC failed at %#08x, read=%#08x, calc=%#08x\n", 46962306a36Sopenharmony_ci offset, je32_to_cpu(rr.node_crc), crc); 47062306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 47162306a36Sopenharmony_ci } 47262306a36Sopenharmony_ci if (je16_to_cpu(rr.magic) != JFFS2_MAGIC_BITMASK 47362306a36Sopenharmony_ci || je16_to_cpu(rr.nodetype) != JFFS2_NODETYPE_XREF 47462306a36Sopenharmony_ci || je32_to_cpu(rr.totlen) != PAD(sizeof(rr))) { 47562306a36Sopenharmony_ci JFFS2_ERROR("inconsistent xref at %#08x, magic=%#04x/%#04x, " 47662306a36Sopenharmony_ci "nodetype=%#04x/%#04x, totlen=%u/%zu\n", 47762306a36Sopenharmony_ci offset, je16_to_cpu(rr.magic), JFFS2_MAGIC_BITMASK, 47862306a36Sopenharmony_ci je16_to_cpu(rr.nodetype), JFFS2_NODETYPE_XREF, 47962306a36Sopenharmony_ci je32_to_cpu(rr.totlen), PAD(sizeof(rr))); 48062306a36Sopenharmony_ci return JFFS2_XATTR_IS_CORRUPTED; 48162306a36Sopenharmony_ci } 48262306a36Sopenharmony_ci ref->ino = je32_to_cpu(rr.ino); 48362306a36Sopenharmony_ci ref->xid = je32_to_cpu(rr.xid); 48462306a36Sopenharmony_ci ref->xseqno = je32_to_cpu(rr.xseqno); 48562306a36Sopenharmony_ci if (ref->xseqno > c->highest_xseqno) 48662306a36Sopenharmony_ci c->highest_xseqno = (ref->xseqno & ~XREF_DELETE_MARKER); 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 48962306a36Sopenharmony_ci complete: 49062306a36Sopenharmony_ci for (raw=ref->node; raw != (void *)ref; raw=raw->next_in_ino) { 49162306a36Sopenharmony_ci jeb = &c->blocks[ref_offset(raw) / c->sector_size]; 49262306a36Sopenharmony_ci totlen = PAD(ref_totlen(c, jeb, raw)); 49362306a36Sopenharmony_ci if (ref_flags(raw) == REF_UNCHECKED) { 49462306a36Sopenharmony_ci c->unchecked_size -= totlen; c->used_size += totlen; 49562306a36Sopenharmony_ci jeb->unchecked_size -= totlen; jeb->used_size += totlen; 49662306a36Sopenharmony_ci } 49762306a36Sopenharmony_ci raw->flash_offset = ref_offset(raw) | ((ref->node==raw) ? REF_PRISTINE : REF_NORMAL); 49862306a36Sopenharmony_ci } 49962306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ci dbg_xattr("success on verifying xref (ino=%u, xid=%u) at %#08x\n", 50262306a36Sopenharmony_ci ref->ino, ref->xid, ref_offset(ref->node)); 50362306a36Sopenharmony_ci return 0; 50462306a36Sopenharmony_ci} 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_cistatic int save_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) 50762306a36Sopenharmony_ci{ 50862306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 50962306a36Sopenharmony_ci struct jffs2_raw_xref rr; 51062306a36Sopenharmony_ci size_t length; 51162306a36Sopenharmony_ci uint32_t xseqno, phys_ofs = write_ofs(c); 51262306a36Sopenharmony_ci int ret; 51362306a36Sopenharmony_ci 51462306a36Sopenharmony_ci rr.magic = cpu_to_je16(JFFS2_MAGIC_BITMASK); 51562306a36Sopenharmony_ci rr.nodetype = cpu_to_je16(JFFS2_NODETYPE_XREF); 51662306a36Sopenharmony_ci rr.totlen = cpu_to_je32(PAD(sizeof(rr))); 51762306a36Sopenharmony_ci rr.hdr_crc = cpu_to_je32(crc32(0, &rr, sizeof(struct jffs2_unknown_node) - 4)); 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_ci xseqno = (c->highest_xseqno += 2); 52062306a36Sopenharmony_ci if (is_xattr_ref_dead(ref)) { 52162306a36Sopenharmony_ci xseqno |= XREF_DELETE_MARKER; 52262306a36Sopenharmony_ci rr.ino = cpu_to_je32(ref->ino); 52362306a36Sopenharmony_ci rr.xid = cpu_to_je32(ref->xid); 52462306a36Sopenharmony_ci } else { 52562306a36Sopenharmony_ci rr.ino = cpu_to_je32(ref->ic->ino); 52662306a36Sopenharmony_ci rr.xid = cpu_to_je32(ref->xd->xid); 52762306a36Sopenharmony_ci } 52862306a36Sopenharmony_ci rr.xseqno = cpu_to_je32(xseqno); 52962306a36Sopenharmony_ci rr.node_crc = cpu_to_je32(crc32(0, &rr, sizeof(rr) - 4)); 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci ret = jffs2_flash_write(c, phys_ofs, sizeof(rr), &length, (char *)&rr); 53262306a36Sopenharmony_ci if (ret || sizeof(rr) != length) { 53362306a36Sopenharmony_ci JFFS2_WARNING("jffs2_flash_write() returned %d, request=%zu, retlen=%zu, at %#08x\n", 53462306a36Sopenharmony_ci ret, sizeof(rr), length, phys_ofs); 53562306a36Sopenharmony_ci ret = ret ? ret : -EIO; 53662306a36Sopenharmony_ci if (length) 53762306a36Sopenharmony_ci jffs2_add_physical_node_ref(c, phys_ofs | REF_OBSOLETE, PAD(sizeof(rr)), NULL); 53862306a36Sopenharmony_ci 53962306a36Sopenharmony_ci return ret; 54062306a36Sopenharmony_ci } 54162306a36Sopenharmony_ci /* success */ 54262306a36Sopenharmony_ci ref->xseqno = xseqno; 54362306a36Sopenharmony_ci jffs2_add_physical_node_ref(c, phys_ofs | REF_PRISTINE, PAD(sizeof(rr)), (void *)ref); 54462306a36Sopenharmony_ci 54562306a36Sopenharmony_ci dbg_xattr("success on saving xref (ino=%u, xid=%u)\n", ref->ic->ino, ref->xd->xid); 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci return 0; 54862306a36Sopenharmony_ci} 54962306a36Sopenharmony_ci 55062306a36Sopenharmony_cistatic struct jffs2_xattr_ref *create_xattr_ref(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic, 55162306a36Sopenharmony_ci struct jffs2_xattr_datum *xd) 55262306a36Sopenharmony_ci{ 55362306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 55462306a36Sopenharmony_ci struct jffs2_xattr_ref *ref; 55562306a36Sopenharmony_ci int ret; 55662306a36Sopenharmony_ci 55762306a36Sopenharmony_ci ref = jffs2_alloc_xattr_ref(); 55862306a36Sopenharmony_ci if (!ref) 55962306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 56062306a36Sopenharmony_ci ref->ic = ic; 56162306a36Sopenharmony_ci ref->xd = xd; 56262306a36Sopenharmony_ci 56362306a36Sopenharmony_ci ret = save_xattr_ref(c, ref); 56462306a36Sopenharmony_ci if (ret) { 56562306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 56662306a36Sopenharmony_ci return ERR_PTR(ret); 56762306a36Sopenharmony_ci } 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ci /* Chain to inode */ 57062306a36Sopenharmony_ci ref->next = ic->xref; 57162306a36Sopenharmony_ci ic->xref = ref; 57262306a36Sopenharmony_ci 57362306a36Sopenharmony_ci return ref; /* success */ 57462306a36Sopenharmony_ci} 57562306a36Sopenharmony_ci 57662306a36Sopenharmony_cistatic void delete_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) 57762306a36Sopenharmony_ci{ 57862306a36Sopenharmony_ci /* must be called under down_write(xattr_sem) */ 57962306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 58062306a36Sopenharmony_ci 58162306a36Sopenharmony_ci xd = ref->xd; 58262306a36Sopenharmony_ci ref->xseqno |= XREF_DELETE_MARKER; 58362306a36Sopenharmony_ci ref->ino = ref->ic->ino; 58462306a36Sopenharmony_ci ref->xid = ref->xd->xid; 58562306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 58662306a36Sopenharmony_ci ref->next = c->xref_dead_list; 58762306a36Sopenharmony_ci c->xref_dead_list = ref; 58862306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 58962306a36Sopenharmony_ci 59062306a36Sopenharmony_ci dbg_xattr("xref(ino=%u, xid=%u, xseqno=%u) was removed.\n", 59162306a36Sopenharmony_ci ref->ino, ref->xid, ref->xseqno); 59262306a36Sopenharmony_ci 59362306a36Sopenharmony_ci unrefer_xattr_datum(c, xd); 59462306a36Sopenharmony_ci} 59562306a36Sopenharmony_ci 59662306a36Sopenharmony_civoid jffs2_xattr_delete_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) 59762306a36Sopenharmony_ci{ 59862306a36Sopenharmony_ci /* It's called from jffs2_evict_inode() on inode removing. 59962306a36Sopenharmony_ci When an inode with XATTR is removed, those XATTRs must be removed. */ 60062306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *_ref; 60162306a36Sopenharmony_ci 60262306a36Sopenharmony_ci if (!ic || ic->pino_nlink > 0) 60362306a36Sopenharmony_ci return; 60462306a36Sopenharmony_ci 60562306a36Sopenharmony_ci down_write(&c->xattr_sem); 60662306a36Sopenharmony_ci for (ref = ic->xref; ref; ref = _ref) { 60762306a36Sopenharmony_ci _ref = ref->next; 60862306a36Sopenharmony_ci delete_xattr_ref(c, ref); 60962306a36Sopenharmony_ci } 61062306a36Sopenharmony_ci ic->xref = NULL; 61162306a36Sopenharmony_ci up_write(&c->xattr_sem); 61262306a36Sopenharmony_ci} 61362306a36Sopenharmony_ci 61462306a36Sopenharmony_civoid jffs2_xattr_free_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) 61562306a36Sopenharmony_ci{ 61662306a36Sopenharmony_ci /* It's called from jffs2_free_ino_caches() until unmounting FS. */ 61762306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 61862306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *_ref; 61962306a36Sopenharmony_ci 62062306a36Sopenharmony_ci down_write(&c->xattr_sem); 62162306a36Sopenharmony_ci for (ref = ic->xref; ref; ref = _ref) { 62262306a36Sopenharmony_ci _ref = ref->next; 62362306a36Sopenharmony_ci xd = ref->xd; 62462306a36Sopenharmony_ci if (atomic_dec_and_test(&xd->refcnt)) { 62562306a36Sopenharmony_ci unload_xattr_datum(c, xd); 62662306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 62762306a36Sopenharmony_ci } 62862306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 62962306a36Sopenharmony_ci } 63062306a36Sopenharmony_ci ic->xref = NULL; 63162306a36Sopenharmony_ci up_write(&c->xattr_sem); 63262306a36Sopenharmony_ci} 63362306a36Sopenharmony_ci 63462306a36Sopenharmony_cistatic int check_xattr_ref_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) 63562306a36Sopenharmony_ci{ 63662306a36Sopenharmony_ci /* success of check_xattr_ref_inode() means that inode (ic) dose not have 63762306a36Sopenharmony_ci * duplicate name/value pairs. If duplicate name/value pair would be found, 63862306a36Sopenharmony_ci * one will be removed. 63962306a36Sopenharmony_ci */ 64062306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *cmp, **pref, **pcmp; 64162306a36Sopenharmony_ci int rc = 0; 64262306a36Sopenharmony_ci 64362306a36Sopenharmony_ci if (likely(ic->flags & INO_FLAGS_XATTR_CHECKED)) 64462306a36Sopenharmony_ci return 0; 64562306a36Sopenharmony_ci down_write(&c->xattr_sem); 64662306a36Sopenharmony_ci retry: 64762306a36Sopenharmony_ci rc = 0; 64862306a36Sopenharmony_ci for (ref=ic->xref, pref=&ic->xref; ref; pref=&ref->next, ref=ref->next) { 64962306a36Sopenharmony_ci if (!ref->xd->xname) { 65062306a36Sopenharmony_ci rc = load_xattr_datum(c, ref->xd); 65162306a36Sopenharmony_ci if (unlikely(rc > 0)) { 65262306a36Sopenharmony_ci *pref = ref->next; 65362306a36Sopenharmony_ci delete_xattr_ref(c, ref); 65462306a36Sopenharmony_ci goto retry; 65562306a36Sopenharmony_ci } else if (unlikely(rc < 0)) 65662306a36Sopenharmony_ci goto out; 65762306a36Sopenharmony_ci } 65862306a36Sopenharmony_ci for (cmp=ref->next, pcmp=&ref->next; cmp; pcmp=&cmp->next, cmp=cmp->next) { 65962306a36Sopenharmony_ci if (!cmp->xd->xname) { 66062306a36Sopenharmony_ci ref->xd->flags |= JFFS2_XFLAGS_BIND; 66162306a36Sopenharmony_ci rc = load_xattr_datum(c, cmp->xd); 66262306a36Sopenharmony_ci ref->xd->flags &= ~JFFS2_XFLAGS_BIND; 66362306a36Sopenharmony_ci if (unlikely(rc > 0)) { 66462306a36Sopenharmony_ci *pcmp = cmp->next; 66562306a36Sopenharmony_ci delete_xattr_ref(c, cmp); 66662306a36Sopenharmony_ci goto retry; 66762306a36Sopenharmony_ci } else if (unlikely(rc < 0)) 66862306a36Sopenharmony_ci goto out; 66962306a36Sopenharmony_ci } 67062306a36Sopenharmony_ci if (ref->xd->xprefix == cmp->xd->xprefix 67162306a36Sopenharmony_ci && !strcmp(ref->xd->xname, cmp->xd->xname)) { 67262306a36Sopenharmony_ci if (ref->xseqno > cmp->xseqno) { 67362306a36Sopenharmony_ci *pcmp = cmp->next; 67462306a36Sopenharmony_ci delete_xattr_ref(c, cmp); 67562306a36Sopenharmony_ci } else { 67662306a36Sopenharmony_ci *pref = ref->next; 67762306a36Sopenharmony_ci delete_xattr_ref(c, ref); 67862306a36Sopenharmony_ci } 67962306a36Sopenharmony_ci goto retry; 68062306a36Sopenharmony_ci } 68162306a36Sopenharmony_ci } 68262306a36Sopenharmony_ci } 68362306a36Sopenharmony_ci ic->flags |= INO_FLAGS_XATTR_CHECKED; 68462306a36Sopenharmony_ci out: 68562306a36Sopenharmony_ci up_write(&c->xattr_sem); 68662306a36Sopenharmony_ci 68762306a36Sopenharmony_ci return rc; 68862306a36Sopenharmony_ci} 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_civoid jffs2_xattr_do_crccheck_inode(struct jffs2_sb_info *c, struct jffs2_inode_cache *ic) 69162306a36Sopenharmony_ci{ 69262306a36Sopenharmony_ci check_xattr_ref_inode(c, ic); 69362306a36Sopenharmony_ci} 69462306a36Sopenharmony_ci 69562306a36Sopenharmony_ci/* -------- xattr subsystem functions --------------- 69662306a36Sopenharmony_ci * jffs2_init_xattr_subsystem(c) 69762306a36Sopenharmony_ci * is used to initialize semaphore and list_head, and some variables. 69862306a36Sopenharmony_ci * jffs2_find_xattr_datum(c, xid) 69962306a36Sopenharmony_ci * is used to lookup xdatum while scanning process. 70062306a36Sopenharmony_ci * jffs2_clear_xattr_subsystem(c) 70162306a36Sopenharmony_ci * is used to release any xattr related objects. 70262306a36Sopenharmony_ci * jffs2_build_xattr_subsystem(c) 70362306a36Sopenharmony_ci * is used to associate xdatum and xref while super block building process. 70462306a36Sopenharmony_ci * jffs2_setup_xattr_datum(c, xid, version) 70562306a36Sopenharmony_ci * is used to insert xdatum while scanning process. 70662306a36Sopenharmony_ci * -------------------------------------------------- */ 70762306a36Sopenharmony_civoid jffs2_init_xattr_subsystem(struct jffs2_sb_info *c) 70862306a36Sopenharmony_ci{ 70962306a36Sopenharmony_ci int i; 71062306a36Sopenharmony_ci 71162306a36Sopenharmony_ci for (i=0; i < XATTRINDEX_HASHSIZE; i++) 71262306a36Sopenharmony_ci INIT_LIST_HEAD(&c->xattrindex[i]); 71362306a36Sopenharmony_ci INIT_LIST_HEAD(&c->xattr_unchecked); 71462306a36Sopenharmony_ci INIT_LIST_HEAD(&c->xattr_dead_list); 71562306a36Sopenharmony_ci c->xref_dead_list = NULL; 71662306a36Sopenharmony_ci c->xref_temp = NULL; 71762306a36Sopenharmony_ci 71862306a36Sopenharmony_ci init_rwsem(&c->xattr_sem); 71962306a36Sopenharmony_ci c->highest_xid = 0; 72062306a36Sopenharmony_ci c->highest_xseqno = 0; 72162306a36Sopenharmony_ci c->xdatum_mem_usage = 0; 72262306a36Sopenharmony_ci c->xdatum_mem_threshold = 32 * 1024; /* Default 32KB */ 72362306a36Sopenharmony_ci} 72462306a36Sopenharmony_ci 72562306a36Sopenharmony_cistatic struct jffs2_xattr_datum *jffs2_find_xattr_datum(struct jffs2_sb_info *c, uint32_t xid) 72662306a36Sopenharmony_ci{ 72762306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 72862306a36Sopenharmony_ci int i = xid % XATTRINDEX_HASHSIZE; 72962306a36Sopenharmony_ci 73062306a36Sopenharmony_ci /* It's only used in scanning/building process. */ 73162306a36Sopenharmony_ci BUG_ON(!(c->flags & (JFFS2_SB_FLAG_SCANNING|JFFS2_SB_FLAG_BUILDING))); 73262306a36Sopenharmony_ci 73362306a36Sopenharmony_ci list_for_each_entry(xd, &c->xattrindex[i], xindex) { 73462306a36Sopenharmony_ci if (xd->xid==xid) 73562306a36Sopenharmony_ci return xd; 73662306a36Sopenharmony_ci } 73762306a36Sopenharmony_ci return NULL; 73862306a36Sopenharmony_ci} 73962306a36Sopenharmony_ci 74062306a36Sopenharmony_civoid jffs2_clear_xattr_subsystem(struct jffs2_sb_info *c) 74162306a36Sopenharmony_ci{ 74262306a36Sopenharmony_ci struct jffs2_xattr_datum *xd, *_xd; 74362306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *_ref; 74462306a36Sopenharmony_ci int i; 74562306a36Sopenharmony_ci 74662306a36Sopenharmony_ci for (ref=c->xref_temp; ref; ref = _ref) { 74762306a36Sopenharmony_ci _ref = ref->next; 74862306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 74962306a36Sopenharmony_ci } 75062306a36Sopenharmony_ci 75162306a36Sopenharmony_ci for (ref=c->xref_dead_list; ref; ref = _ref) { 75262306a36Sopenharmony_ci _ref = ref->next; 75362306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 75462306a36Sopenharmony_ci } 75562306a36Sopenharmony_ci 75662306a36Sopenharmony_ci for (i=0; i < XATTRINDEX_HASHSIZE; i++) { 75762306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattrindex[i], xindex) { 75862306a36Sopenharmony_ci list_del(&xd->xindex); 75962306a36Sopenharmony_ci kfree(xd->xname); 76062306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 76162306a36Sopenharmony_ci } 76262306a36Sopenharmony_ci } 76362306a36Sopenharmony_ci 76462306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattr_dead_list, xindex) { 76562306a36Sopenharmony_ci list_del(&xd->xindex); 76662306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 76762306a36Sopenharmony_ci } 76862306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattr_unchecked, xindex) { 76962306a36Sopenharmony_ci list_del(&xd->xindex); 77062306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 77162306a36Sopenharmony_ci } 77262306a36Sopenharmony_ci} 77362306a36Sopenharmony_ci 77462306a36Sopenharmony_ci#define XREF_TMPHASH_SIZE (128) 77562306a36Sopenharmony_ciint jffs2_build_xattr_subsystem(struct jffs2_sb_info *c) 77662306a36Sopenharmony_ci{ 77762306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *_ref; 77862306a36Sopenharmony_ci struct jffs2_xattr_ref **xref_tmphash; 77962306a36Sopenharmony_ci struct jffs2_xattr_datum *xd, *_xd; 78062306a36Sopenharmony_ci struct jffs2_inode_cache *ic; 78162306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw; 78262306a36Sopenharmony_ci int i, xdatum_count = 0, xdatum_unchecked_count = 0, xref_count = 0; 78362306a36Sopenharmony_ci int xdatum_orphan_count = 0, xref_orphan_count = 0, xref_dead_count = 0; 78462306a36Sopenharmony_ci 78562306a36Sopenharmony_ci BUG_ON(!(c->flags & JFFS2_SB_FLAG_BUILDING)); 78662306a36Sopenharmony_ci 78762306a36Sopenharmony_ci xref_tmphash = kcalloc(XREF_TMPHASH_SIZE, 78862306a36Sopenharmony_ci sizeof(struct jffs2_xattr_ref *), GFP_KERNEL); 78962306a36Sopenharmony_ci if (!xref_tmphash) 79062306a36Sopenharmony_ci return -ENOMEM; 79162306a36Sopenharmony_ci 79262306a36Sopenharmony_ci /* Phase.1 : Merge same xref */ 79362306a36Sopenharmony_ci for (ref=c->xref_temp; ref; ref=_ref) { 79462306a36Sopenharmony_ci struct jffs2_xattr_ref *tmp; 79562306a36Sopenharmony_ci 79662306a36Sopenharmony_ci _ref = ref->next; 79762306a36Sopenharmony_ci if (ref_flags(ref->node) != REF_PRISTINE) { 79862306a36Sopenharmony_ci if (verify_xattr_ref(c, ref)) { 79962306a36Sopenharmony_ci BUG_ON(ref->node->next_in_ino != (void *)ref); 80062306a36Sopenharmony_ci ref->node->next_in_ino = NULL; 80162306a36Sopenharmony_ci jffs2_mark_node_obsolete(c, ref->node); 80262306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 80362306a36Sopenharmony_ci continue; 80462306a36Sopenharmony_ci } 80562306a36Sopenharmony_ci } 80662306a36Sopenharmony_ci 80762306a36Sopenharmony_ci i = (ref->ino ^ ref->xid) % XREF_TMPHASH_SIZE; 80862306a36Sopenharmony_ci for (tmp=xref_tmphash[i]; tmp; tmp=tmp->next) { 80962306a36Sopenharmony_ci if (tmp->ino == ref->ino && tmp->xid == ref->xid) 81062306a36Sopenharmony_ci break; 81162306a36Sopenharmony_ci } 81262306a36Sopenharmony_ci if (tmp) { 81362306a36Sopenharmony_ci raw = ref->node; 81462306a36Sopenharmony_ci if (ref->xseqno > tmp->xseqno) { 81562306a36Sopenharmony_ci tmp->xseqno = ref->xseqno; 81662306a36Sopenharmony_ci raw->next_in_ino = tmp->node; 81762306a36Sopenharmony_ci tmp->node = raw; 81862306a36Sopenharmony_ci } else { 81962306a36Sopenharmony_ci raw->next_in_ino = tmp->node->next_in_ino; 82062306a36Sopenharmony_ci tmp->node->next_in_ino = raw; 82162306a36Sopenharmony_ci } 82262306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 82362306a36Sopenharmony_ci continue; 82462306a36Sopenharmony_ci } else { 82562306a36Sopenharmony_ci ref->next = xref_tmphash[i]; 82662306a36Sopenharmony_ci xref_tmphash[i] = ref; 82762306a36Sopenharmony_ci } 82862306a36Sopenharmony_ci } 82962306a36Sopenharmony_ci c->xref_temp = NULL; 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_ci /* Phase.2 : Bind xref with inode_cache and xattr_datum */ 83262306a36Sopenharmony_ci for (i=0; i < XREF_TMPHASH_SIZE; i++) { 83362306a36Sopenharmony_ci for (ref=xref_tmphash[i]; ref; ref=_ref) { 83462306a36Sopenharmony_ci xref_count++; 83562306a36Sopenharmony_ci _ref = ref->next; 83662306a36Sopenharmony_ci if (is_xattr_ref_dead(ref)) { 83762306a36Sopenharmony_ci ref->next = c->xref_dead_list; 83862306a36Sopenharmony_ci c->xref_dead_list = ref; 83962306a36Sopenharmony_ci xref_dead_count++; 84062306a36Sopenharmony_ci continue; 84162306a36Sopenharmony_ci } 84262306a36Sopenharmony_ci /* At this point, ref->xid and ref->ino contain XID and inode number. 84362306a36Sopenharmony_ci ref->xd and ref->ic are not valid yet. */ 84462306a36Sopenharmony_ci xd = jffs2_find_xattr_datum(c, ref->xid); 84562306a36Sopenharmony_ci ic = jffs2_get_ino_cache(c, ref->ino); 84662306a36Sopenharmony_ci if (!xd || !ic || !ic->pino_nlink) { 84762306a36Sopenharmony_ci dbg_xattr("xref(ino=%u, xid=%u, xseqno=%u) is orphan.\n", 84862306a36Sopenharmony_ci ref->ino, ref->xid, ref->xseqno); 84962306a36Sopenharmony_ci ref->xseqno |= XREF_DELETE_MARKER; 85062306a36Sopenharmony_ci ref->next = c->xref_dead_list; 85162306a36Sopenharmony_ci c->xref_dead_list = ref; 85262306a36Sopenharmony_ci xref_orphan_count++; 85362306a36Sopenharmony_ci continue; 85462306a36Sopenharmony_ci } 85562306a36Sopenharmony_ci ref->xd = xd; 85662306a36Sopenharmony_ci ref->ic = ic; 85762306a36Sopenharmony_ci atomic_inc(&xd->refcnt); 85862306a36Sopenharmony_ci ref->next = ic->xref; 85962306a36Sopenharmony_ci ic->xref = ref; 86062306a36Sopenharmony_ci } 86162306a36Sopenharmony_ci } 86262306a36Sopenharmony_ci 86362306a36Sopenharmony_ci /* Phase.3 : Link unchecked xdatum to xattr_unchecked list */ 86462306a36Sopenharmony_ci for (i=0; i < XATTRINDEX_HASHSIZE; i++) { 86562306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattrindex[i], xindex) { 86662306a36Sopenharmony_ci xdatum_count++; 86762306a36Sopenharmony_ci list_del_init(&xd->xindex); 86862306a36Sopenharmony_ci if (!atomic_read(&xd->refcnt)) { 86962306a36Sopenharmony_ci dbg_xattr("xdatum(xid=%u, version=%u) is orphan.\n", 87062306a36Sopenharmony_ci xd->xid, xd->version); 87162306a36Sopenharmony_ci xd->flags |= JFFS2_XFLAGS_DEAD; 87262306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattr_unchecked); 87362306a36Sopenharmony_ci xdatum_orphan_count++; 87462306a36Sopenharmony_ci continue; 87562306a36Sopenharmony_ci } 87662306a36Sopenharmony_ci if (is_xattr_datum_unchecked(c, xd)) { 87762306a36Sopenharmony_ci dbg_xattr("unchecked xdatum(xid=%u, version=%u)\n", 87862306a36Sopenharmony_ci xd->xid, xd->version); 87962306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattr_unchecked); 88062306a36Sopenharmony_ci xdatum_unchecked_count++; 88162306a36Sopenharmony_ci } 88262306a36Sopenharmony_ci } 88362306a36Sopenharmony_ci } 88462306a36Sopenharmony_ci /* build complete */ 88562306a36Sopenharmony_ci JFFS2_NOTICE("complete building xattr subsystem, %u of xdatum" 88662306a36Sopenharmony_ci " (%u unchecked, %u orphan) and " 88762306a36Sopenharmony_ci "%u of xref (%u dead, %u orphan) found.\n", 88862306a36Sopenharmony_ci xdatum_count, xdatum_unchecked_count, xdatum_orphan_count, 88962306a36Sopenharmony_ci xref_count, xref_dead_count, xref_orphan_count); 89062306a36Sopenharmony_ci kfree(xref_tmphash); 89162306a36Sopenharmony_ci return 0; 89262306a36Sopenharmony_ci} 89362306a36Sopenharmony_ci 89462306a36Sopenharmony_cistruct jffs2_xattr_datum *jffs2_setup_xattr_datum(struct jffs2_sb_info *c, 89562306a36Sopenharmony_ci uint32_t xid, uint32_t version) 89662306a36Sopenharmony_ci{ 89762306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 89862306a36Sopenharmony_ci 89962306a36Sopenharmony_ci xd = jffs2_find_xattr_datum(c, xid); 90062306a36Sopenharmony_ci if (!xd) { 90162306a36Sopenharmony_ci xd = jffs2_alloc_xattr_datum(); 90262306a36Sopenharmony_ci if (!xd) 90362306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 90462306a36Sopenharmony_ci xd->xid = xid; 90562306a36Sopenharmony_ci xd->version = version; 90662306a36Sopenharmony_ci if (xd->xid > c->highest_xid) 90762306a36Sopenharmony_ci c->highest_xid = xd->xid; 90862306a36Sopenharmony_ci list_add_tail(&xd->xindex, &c->xattrindex[xid % XATTRINDEX_HASHSIZE]); 90962306a36Sopenharmony_ci } 91062306a36Sopenharmony_ci return xd; 91162306a36Sopenharmony_ci} 91262306a36Sopenharmony_ci 91362306a36Sopenharmony_ci/* -------- xattr subsystem functions --------------- 91462306a36Sopenharmony_ci * xprefix_to_handler(xprefix) 91562306a36Sopenharmony_ci * is used to translate xprefix into xattr_handler. 91662306a36Sopenharmony_ci * jffs2_listxattr(dentry, buffer, size) 91762306a36Sopenharmony_ci * is an implementation of listxattr handler on jffs2. 91862306a36Sopenharmony_ci * do_jffs2_getxattr(inode, xprefix, xname, buffer, size) 91962306a36Sopenharmony_ci * is an implementation of getxattr handler on jffs2. 92062306a36Sopenharmony_ci * do_jffs2_setxattr(inode, xprefix, xname, buffer, size, flags) 92162306a36Sopenharmony_ci * is an implementation of setxattr handler on jffs2. 92262306a36Sopenharmony_ci * -------------------------------------------------- */ 92362306a36Sopenharmony_ciconst struct xattr_handler *jffs2_xattr_handlers[] = { 92462306a36Sopenharmony_ci &jffs2_user_xattr_handler, 92562306a36Sopenharmony_ci#ifdef CONFIG_JFFS2_FS_SECURITY 92662306a36Sopenharmony_ci &jffs2_security_xattr_handler, 92762306a36Sopenharmony_ci#endif 92862306a36Sopenharmony_ci &jffs2_trusted_xattr_handler, 92962306a36Sopenharmony_ci NULL 93062306a36Sopenharmony_ci}; 93162306a36Sopenharmony_ci 93262306a36Sopenharmony_cistatic const char *jffs2_xattr_prefix(int xprefix, struct dentry *dentry) 93362306a36Sopenharmony_ci{ 93462306a36Sopenharmony_ci const struct xattr_handler *ret = NULL; 93562306a36Sopenharmony_ci 93662306a36Sopenharmony_ci switch (xprefix) { 93762306a36Sopenharmony_ci case JFFS2_XPREFIX_USER: 93862306a36Sopenharmony_ci ret = &jffs2_user_xattr_handler; 93962306a36Sopenharmony_ci break; 94062306a36Sopenharmony_ci#ifdef CONFIG_JFFS2_FS_SECURITY 94162306a36Sopenharmony_ci case JFFS2_XPREFIX_SECURITY: 94262306a36Sopenharmony_ci ret = &jffs2_security_xattr_handler; 94362306a36Sopenharmony_ci break; 94462306a36Sopenharmony_ci#endif 94562306a36Sopenharmony_ci#ifdef CONFIG_JFFS2_FS_POSIX_ACL 94662306a36Sopenharmony_ci case JFFS2_XPREFIX_ACL_ACCESS: 94762306a36Sopenharmony_ci ret = &nop_posix_acl_access; 94862306a36Sopenharmony_ci break; 94962306a36Sopenharmony_ci case JFFS2_XPREFIX_ACL_DEFAULT: 95062306a36Sopenharmony_ci ret = &nop_posix_acl_default; 95162306a36Sopenharmony_ci break; 95262306a36Sopenharmony_ci#endif 95362306a36Sopenharmony_ci case JFFS2_XPREFIX_TRUSTED: 95462306a36Sopenharmony_ci ret = &jffs2_trusted_xattr_handler; 95562306a36Sopenharmony_ci break; 95662306a36Sopenharmony_ci default: 95762306a36Sopenharmony_ci return NULL; 95862306a36Sopenharmony_ci } 95962306a36Sopenharmony_ci 96062306a36Sopenharmony_ci if (!xattr_handler_can_list(ret, dentry)) 96162306a36Sopenharmony_ci return NULL; 96262306a36Sopenharmony_ci 96362306a36Sopenharmony_ci return xattr_prefix(ret); 96462306a36Sopenharmony_ci} 96562306a36Sopenharmony_ci 96662306a36Sopenharmony_cissize_t jffs2_listxattr(struct dentry *dentry, char *buffer, size_t size) 96762306a36Sopenharmony_ci{ 96862306a36Sopenharmony_ci struct inode *inode = d_inode(dentry); 96962306a36Sopenharmony_ci struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); 97062306a36Sopenharmony_ci struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); 97162306a36Sopenharmony_ci struct jffs2_inode_cache *ic = f->inocache; 97262306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, **pref; 97362306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 97462306a36Sopenharmony_ci const char *prefix; 97562306a36Sopenharmony_ci ssize_t prefix_len, len, rc; 97662306a36Sopenharmony_ci int retry = 0; 97762306a36Sopenharmony_ci 97862306a36Sopenharmony_ci rc = check_xattr_ref_inode(c, ic); 97962306a36Sopenharmony_ci if (unlikely(rc)) 98062306a36Sopenharmony_ci return rc; 98162306a36Sopenharmony_ci 98262306a36Sopenharmony_ci down_read(&c->xattr_sem); 98362306a36Sopenharmony_ci retry: 98462306a36Sopenharmony_ci len = 0; 98562306a36Sopenharmony_ci for (ref=ic->xref, pref=&ic->xref; ref; pref=&ref->next, ref=ref->next) { 98662306a36Sopenharmony_ci BUG_ON(ref->ic != ic); 98762306a36Sopenharmony_ci xd = ref->xd; 98862306a36Sopenharmony_ci if (!xd->xname) { 98962306a36Sopenharmony_ci /* xdatum is unchached */ 99062306a36Sopenharmony_ci if (!retry) { 99162306a36Sopenharmony_ci retry = 1; 99262306a36Sopenharmony_ci up_read(&c->xattr_sem); 99362306a36Sopenharmony_ci down_write(&c->xattr_sem); 99462306a36Sopenharmony_ci goto retry; 99562306a36Sopenharmony_ci } else { 99662306a36Sopenharmony_ci rc = load_xattr_datum(c, xd); 99762306a36Sopenharmony_ci if (unlikely(rc > 0)) { 99862306a36Sopenharmony_ci *pref = ref->next; 99962306a36Sopenharmony_ci delete_xattr_ref(c, ref); 100062306a36Sopenharmony_ci goto retry; 100162306a36Sopenharmony_ci } else if (unlikely(rc < 0)) 100262306a36Sopenharmony_ci goto out; 100362306a36Sopenharmony_ci } 100462306a36Sopenharmony_ci } 100562306a36Sopenharmony_ci 100662306a36Sopenharmony_ci prefix = jffs2_xattr_prefix(xd->xprefix, dentry); 100762306a36Sopenharmony_ci if (!prefix) 100862306a36Sopenharmony_ci continue; 100962306a36Sopenharmony_ci prefix_len = strlen(prefix); 101062306a36Sopenharmony_ci rc = prefix_len + xd->name_len + 1; 101162306a36Sopenharmony_ci 101262306a36Sopenharmony_ci if (buffer) { 101362306a36Sopenharmony_ci if (rc > size - len) { 101462306a36Sopenharmony_ci rc = -ERANGE; 101562306a36Sopenharmony_ci goto out; 101662306a36Sopenharmony_ci } 101762306a36Sopenharmony_ci memcpy(buffer, prefix, prefix_len); 101862306a36Sopenharmony_ci buffer += prefix_len; 101962306a36Sopenharmony_ci memcpy(buffer, xd->xname, xd->name_len); 102062306a36Sopenharmony_ci buffer += xd->name_len; 102162306a36Sopenharmony_ci *buffer++ = 0; 102262306a36Sopenharmony_ci } 102362306a36Sopenharmony_ci len += rc; 102462306a36Sopenharmony_ci } 102562306a36Sopenharmony_ci rc = len; 102662306a36Sopenharmony_ci out: 102762306a36Sopenharmony_ci if (!retry) { 102862306a36Sopenharmony_ci up_read(&c->xattr_sem); 102962306a36Sopenharmony_ci } else { 103062306a36Sopenharmony_ci up_write(&c->xattr_sem); 103162306a36Sopenharmony_ci } 103262306a36Sopenharmony_ci return rc; 103362306a36Sopenharmony_ci} 103462306a36Sopenharmony_ci 103562306a36Sopenharmony_ciint do_jffs2_getxattr(struct inode *inode, int xprefix, const char *xname, 103662306a36Sopenharmony_ci char *buffer, size_t size) 103762306a36Sopenharmony_ci{ 103862306a36Sopenharmony_ci struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); 103962306a36Sopenharmony_ci struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); 104062306a36Sopenharmony_ci struct jffs2_inode_cache *ic = f->inocache; 104162306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 104262306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, **pref; 104362306a36Sopenharmony_ci int rc, retry = 0; 104462306a36Sopenharmony_ci 104562306a36Sopenharmony_ci rc = check_xattr_ref_inode(c, ic); 104662306a36Sopenharmony_ci if (unlikely(rc)) 104762306a36Sopenharmony_ci return rc; 104862306a36Sopenharmony_ci 104962306a36Sopenharmony_ci down_read(&c->xattr_sem); 105062306a36Sopenharmony_ci retry: 105162306a36Sopenharmony_ci for (ref=ic->xref, pref=&ic->xref; ref; pref=&ref->next, ref=ref->next) { 105262306a36Sopenharmony_ci BUG_ON(ref->ic!=ic); 105362306a36Sopenharmony_ci 105462306a36Sopenharmony_ci xd = ref->xd; 105562306a36Sopenharmony_ci if (xd->xprefix != xprefix) 105662306a36Sopenharmony_ci continue; 105762306a36Sopenharmony_ci if (!xd->xname) { 105862306a36Sopenharmony_ci /* xdatum is unchached */ 105962306a36Sopenharmony_ci if (!retry) { 106062306a36Sopenharmony_ci retry = 1; 106162306a36Sopenharmony_ci up_read(&c->xattr_sem); 106262306a36Sopenharmony_ci down_write(&c->xattr_sem); 106362306a36Sopenharmony_ci goto retry; 106462306a36Sopenharmony_ci } else { 106562306a36Sopenharmony_ci rc = load_xattr_datum(c, xd); 106662306a36Sopenharmony_ci if (unlikely(rc > 0)) { 106762306a36Sopenharmony_ci *pref = ref->next; 106862306a36Sopenharmony_ci delete_xattr_ref(c, ref); 106962306a36Sopenharmony_ci goto retry; 107062306a36Sopenharmony_ci } else if (unlikely(rc < 0)) { 107162306a36Sopenharmony_ci goto out; 107262306a36Sopenharmony_ci } 107362306a36Sopenharmony_ci } 107462306a36Sopenharmony_ci } 107562306a36Sopenharmony_ci if (!strcmp(xname, xd->xname)) { 107662306a36Sopenharmony_ci rc = xd->value_len; 107762306a36Sopenharmony_ci if (buffer) { 107862306a36Sopenharmony_ci if (size < rc) { 107962306a36Sopenharmony_ci rc = -ERANGE; 108062306a36Sopenharmony_ci } else { 108162306a36Sopenharmony_ci memcpy(buffer, xd->xvalue, rc); 108262306a36Sopenharmony_ci } 108362306a36Sopenharmony_ci } 108462306a36Sopenharmony_ci goto out; 108562306a36Sopenharmony_ci } 108662306a36Sopenharmony_ci } 108762306a36Sopenharmony_ci rc = -ENODATA; 108862306a36Sopenharmony_ci out: 108962306a36Sopenharmony_ci if (!retry) { 109062306a36Sopenharmony_ci up_read(&c->xattr_sem); 109162306a36Sopenharmony_ci } else { 109262306a36Sopenharmony_ci up_write(&c->xattr_sem); 109362306a36Sopenharmony_ci } 109462306a36Sopenharmony_ci return rc; 109562306a36Sopenharmony_ci} 109662306a36Sopenharmony_ci 109762306a36Sopenharmony_ciint do_jffs2_setxattr(struct inode *inode, int xprefix, const char *xname, 109862306a36Sopenharmony_ci const char *buffer, size_t size, int flags) 109962306a36Sopenharmony_ci{ 110062306a36Sopenharmony_ci struct jffs2_inode_info *f = JFFS2_INODE_INFO(inode); 110162306a36Sopenharmony_ci struct jffs2_sb_info *c = JFFS2_SB_INFO(inode->i_sb); 110262306a36Sopenharmony_ci struct jffs2_inode_cache *ic = f->inocache; 110362306a36Sopenharmony_ci struct jffs2_xattr_datum *xd; 110462306a36Sopenharmony_ci struct jffs2_xattr_ref *ref, *newref, **pref; 110562306a36Sopenharmony_ci uint32_t length, request; 110662306a36Sopenharmony_ci int rc; 110762306a36Sopenharmony_ci 110862306a36Sopenharmony_ci rc = check_xattr_ref_inode(c, ic); 110962306a36Sopenharmony_ci if (unlikely(rc)) 111062306a36Sopenharmony_ci return rc; 111162306a36Sopenharmony_ci 111262306a36Sopenharmony_ci request = PAD(sizeof(struct jffs2_raw_xattr) + strlen(xname) + 1 + size); 111362306a36Sopenharmony_ci rc = jffs2_reserve_space(c, request, &length, 111462306a36Sopenharmony_ci ALLOC_NORMAL, JFFS2_SUMMARY_XATTR_SIZE); 111562306a36Sopenharmony_ci if (rc) { 111662306a36Sopenharmony_ci JFFS2_WARNING("jffs2_reserve_space()=%d, request=%u\n", rc, request); 111762306a36Sopenharmony_ci return rc; 111862306a36Sopenharmony_ci } 111962306a36Sopenharmony_ci 112062306a36Sopenharmony_ci /* Find existing xattr */ 112162306a36Sopenharmony_ci down_write(&c->xattr_sem); 112262306a36Sopenharmony_ci retry: 112362306a36Sopenharmony_ci for (ref=ic->xref, pref=&ic->xref; ref; pref=&ref->next, ref=ref->next) { 112462306a36Sopenharmony_ci xd = ref->xd; 112562306a36Sopenharmony_ci if (xd->xprefix != xprefix) 112662306a36Sopenharmony_ci continue; 112762306a36Sopenharmony_ci if (!xd->xname) { 112862306a36Sopenharmony_ci rc = load_xattr_datum(c, xd); 112962306a36Sopenharmony_ci if (unlikely(rc > 0)) { 113062306a36Sopenharmony_ci *pref = ref->next; 113162306a36Sopenharmony_ci delete_xattr_ref(c, ref); 113262306a36Sopenharmony_ci goto retry; 113362306a36Sopenharmony_ci } else if (unlikely(rc < 0)) 113462306a36Sopenharmony_ci goto out; 113562306a36Sopenharmony_ci } 113662306a36Sopenharmony_ci if (!strcmp(xd->xname, xname)) { 113762306a36Sopenharmony_ci if (flags & XATTR_CREATE) { 113862306a36Sopenharmony_ci rc = -EEXIST; 113962306a36Sopenharmony_ci goto out; 114062306a36Sopenharmony_ci } 114162306a36Sopenharmony_ci if (!buffer) { 114262306a36Sopenharmony_ci ref->ino = ic->ino; 114362306a36Sopenharmony_ci ref->xid = xd->xid; 114462306a36Sopenharmony_ci ref->xseqno |= XREF_DELETE_MARKER; 114562306a36Sopenharmony_ci rc = save_xattr_ref(c, ref); 114662306a36Sopenharmony_ci if (!rc) { 114762306a36Sopenharmony_ci *pref = ref->next; 114862306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 114962306a36Sopenharmony_ci ref->next = c->xref_dead_list; 115062306a36Sopenharmony_ci c->xref_dead_list = ref; 115162306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 115262306a36Sopenharmony_ci unrefer_xattr_datum(c, xd); 115362306a36Sopenharmony_ci } else { 115462306a36Sopenharmony_ci ref->ic = ic; 115562306a36Sopenharmony_ci ref->xd = xd; 115662306a36Sopenharmony_ci ref->xseqno &= ~XREF_DELETE_MARKER; 115762306a36Sopenharmony_ci } 115862306a36Sopenharmony_ci goto out; 115962306a36Sopenharmony_ci } 116062306a36Sopenharmony_ci goto found; 116162306a36Sopenharmony_ci } 116262306a36Sopenharmony_ci } 116362306a36Sopenharmony_ci /* not found */ 116462306a36Sopenharmony_ci if (flags & XATTR_REPLACE) { 116562306a36Sopenharmony_ci rc = -ENODATA; 116662306a36Sopenharmony_ci goto out; 116762306a36Sopenharmony_ci } 116862306a36Sopenharmony_ci if (!buffer) { 116962306a36Sopenharmony_ci rc = -ENODATA; 117062306a36Sopenharmony_ci goto out; 117162306a36Sopenharmony_ci } 117262306a36Sopenharmony_ci found: 117362306a36Sopenharmony_ci xd = create_xattr_datum(c, xprefix, xname, buffer, size); 117462306a36Sopenharmony_ci if (IS_ERR(xd)) { 117562306a36Sopenharmony_ci rc = PTR_ERR(xd); 117662306a36Sopenharmony_ci goto out; 117762306a36Sopenharmony_ci } 117862306a36Sopenharmony_ci up_write(&c->xattr_sem); 117962306a36Sopenharmony_ci jffs2_complete_reservation(c); 118062306a36Sopenharmony_ci 118162306a36Sopenharmony_ci /* create xattr_ref */ 118262306a36Sopenharmony_ci request = PAD(sizeof(struct jffs2_raw_xref)); 118362306a36Sopenharmony_ci rc = jffs2_reserve_space(c, request, &length, 118462306a36Sopenharmony_ci ALLOC_NORMAL, JFFS2_SUMMARY_XREF_SIZE); 118562306a36Sopenharmony_ci down_write(&c->xattr_sem); 118662306a36Sopenharmony_ci if (rc) { 118762306a36Sopenharmony_ci JFFS2_WARNING("jffs2_reserve_space()=%d, request=%u\n", rc, request); 118862306a36Sopenharmony_ci unrefer_xattr_datum(c, xd); 118962306a36Sopenharmony_ci up_write(&c->xattr_sem); 119062306a36Sopenharmony_ci return rc; 119162306a36Sopenharmony_ci } 119262306a36Sopenharmony_ci if (ref) 119362306a36Sopenharmony_ci *pref = ref->next; 119462306a36Sopenharmony_ci newref = create_xattr_ref(c, ic, xd); 119562306a36Sopenharmony_ci if (IS_ERR(newref)) { 119662306a36Sopenharmony_ci if (ref) { 119762306a36Sopenharmony_ci ref->next = ic->xref; 119862306a36Sopenharmony_ci ic->xref = ref; 119962306a36Sopenharmony_ci } 120062306a36Sopenharmony_ci rc = PTR_ERR(newref); 120162306a36Sopenharmony_ci unrefer_xattr_datum(c, xd); 120262306a36Sopenharmony_ci } else if (ref) { 120362306a36Sopenharmony_ci delete_xattr_ref(c, ref); 120462306a36Sopenharmony_ci } 120562306a36Sopenharmony_ci out: 120662306a36Sopenharmony_ci up_write(&c->xattr_sem); 120762306a36Sopenharmony_ci jffs2_complete_reservation(c); 120862306a36Sopenharmony_ci return rc; 120962306a36Sopenharmony_ci} 121062306a36Sopenharmony_ci 121162306a36Sopenharmony_ci/* -------- garbage collector functions ------------- 121262306a36Sopenharmony_ci * jffs2_garbage_collect_xattr_datum(c, xd, raw) 121362306a36Sopenharmony_ci * is used to move xdatum into new node. 121462306a36Sopenharmony_ci * jffs2_garbage_collect_xattr_ref(c, ref, raw) 121562306a36Sopenharmony_ci * is used to move xref into new node. 121662306a36Sopenharmony_ci * jffs2_verify_xattr(c) 121762306a36Sopenharmony_ci * is used to call do_verify_xattr_datum() before garbage collecting. 121862306a36Sopenharmony_ci * jffs2_release_xattr_datum(c, xd) 121962306a36Sopenharmony_ci * is used to release an in-memory object of xdatum. 122062306a36Sopenharmony_ci * jffs2_release_xattr_ref(c, ref) 122162306a36Sopenharmony_ci * is used to release an in-memory object of xref. 122262306a36Sopenharmony_ci * -------------------------------------------------- */ 122362306a36Sopenharmony_ciint jffs2_garbage_collect_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd, 122462306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw) 122562306a36Sopenharmony_ci{ 122662306a36Sopenharmony_ci uint32_t totlen, length, old_ofs; 122762306a36Sopenharmony_ci int rc = 0; 122862306a36Sopenharmony_ci 122962306a36Sopenharmony_ci down_write(&c->xattr_sem); 123062306a36Sopenharmony_ci if (xd->node != raw) 123162306a36Sopenharmony_ci goto out; 123262306a36Sopenharmony_ci if (xd->flags & (JFFS2_XFLAGS_DEAD|JFFS2_XFLAGS_INVALID)) 123362306a36Sopenharmony_ci goto out; 123462306a36Sopenharmony_ci 123562306a36Sopenharmony_ci rc = load_xattr_datum(c, xd); 123662306a36Sopenharmony_ci if (unlikely(rc)) { 123762306a36Sopenharmony_ci rc = (rc > 0) ? 0 : rc; 123862306a36Sopenharmony_ci goto out; 123962306a36Sopenharmony_ci } 124062306a36Sopenharmony_ci old_ofs = ref_offset(xd->node); 124162306a36Sopenharmony_ci totlen = PAD(sizeof(struct jffs2_raw_xattr) 124262306a36Sopenharmony_ci + xd->name_len + 1 + xd->value_len); 124362306a36Sopenharmony_ci rc = jffs2_reserve_space_gc(c, totlen, &length, JFFS2_SUMMARY_XATTR_SIZE); 124462306a36Sopenharmony_ci if (rc) { 124562306a36Sopenharmony_ci JFFS2_WARNING("jffs2_reserve_space_gc()=%d, request=%u\n", rc, totlen); 124662306a36Sopenharmony_ci goto out; 124762306a36Sopenharmony_ci } 124862306a36Sopenharmony_ci rc = save_xattr_datum(c, xd); 124962306a36Sopenharmony_ci if (!rc) 125062306a36Sopenharmony_ci dbg_xattr("xdatum (xid=%u, version=%u) GC'ed from %#08x to %08x\n", 125162306a36Sopenharmony_ci xd->xid, xd->version, old_ofs, ref_offset(xd->node)); 125262306a36Sopenharmony_ci out: 125362306a36Sopenharmony_ci if (!rc) 125462306a36Sopenharmony_ci jffs2_mark_node_obsolete(c, raw); 125562306a36Sopenharmony_ci up_write(&c->xattr_sem); 125662306a36Sopenharmony_ci return rc; 125762306a36Sopenharmony_ci} 125862306a36Sopenharmony_ci 125962306a36Sopenharmony_ciint jffs2_garbage_collect_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref, 126062306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw) 126162306a36Sopenharmony_ci{ 126262306a36Sopenharmony_ci uint32_t totlen, length, old_ofs; 126362306a36Sopenharmony_ci int rc = 0; 126462306a36Sopenharmony_ci 126562306a36Sopenharmony_ci down_write(&c->xattr_sem); 126662306a36Sopenharmony_ci BUG_ON(!ref->node); 126762306a36Sopenharmony_ci 126862306a36Sopenharmony_ci if (ref->node != raw) 126962306a36Sopenharmony_ci goto out; 127062306a36Sopenharmony_ci if (is_xattr_ref_dead(ref) && (raw->next_in_ino == (void *)ref)) 127162306a36Sopenharmony_ci goto out; 127262306a36Sopenharmony_ci 127362306a36Sopenharmony_ci old_ofs = ref_offset(ref->node); 127462306a36Sopenharmony_ci totlen = ref_totlen(c, c->gcblock, ref->node); 127562306a36Sopenharmony_ci 127662306a36Sopenharmony_ci rc = jffs2_reserve_space_gc(c, totlen, &length, JFFS2_SUMMARY_XREF_SIZE); 127762306a36Sopenharmony_ci if (rc) { 127862306a36Sopenharmony_ci JFFS2_WARNING("%s: jffs2_reserve_space_gc() = %d, request = %u\n", 127962306a36Sopenharmony_ci __func__, rc, totlen); 128062306a36Sopenharmony_ci goto out; 128162306a36Sopenharmony_ci } 128262306a36Sopenharmony_ci rc = save_xattr_ref(c, ref); 128362306a36Sopenharmony_ci if (!rc) 128462306a36Sopenharmony_ci dbg_xattr("xref (ino=%u, xid=%u) GC'ed from %#08x to %08x\n", 128562306a36Sopenharmony_ci ref->ic->ino, ref->xd->xid, old_ofs, ref_offset(ref->node)); 128662306a36Sopenharmony_ci out: 128762306a36Sopenharmony_ci if (!rc) 128862306a36Sopenharmony_ci jffs2_mark_node_obsolete(c, raw); 128962306a36Sopenharmony_ci up_write(&c->xattr_sem); 129062306a36Sopenharmony_ci return rc; 129162306a36Sopenharmony_ci} 129262306a36Sopenharmony_ci 129362306a36Sopenharmony_ciint jffs2_verify_xattr(struct jffs2_sb_info *c) 129462306a36Sopenharmony_ci{ 129562306a36Sopenharmony_ci struct jffs2_xattr_datum *xd, *_xd; 129662306a36Sopenharmony_ci struct jffs2_eraseblock *jeb; 129762306a36Sopenharmony_ci struct jffs2_raw_node_ref *raw; 129862306a36Sopenharmony_ci uint32_t totlen; 129962306a36Sopenharmony_ci int rc; 130062306a36Sopenharmony_ci 130162306a36Sopenharmony_ci down_write(&c->xattr_sem); 130262306a36Sopenharmony_ci list_for_each_entry_safe(xd, _xd, &c->xattr_unchecked, xindex) { 130362306a36Sopenharmony_ci rc = do_verify_xattr_datum(c, xd); 130462306a36Sopenharmony_ci if (rc < 0) 130562306a36Sopenharmony_ci continue; 130662306a36Sopenharmony_ci list_del_init(&xd->xindex); 130762306a36Sopenharmony_ci spin_lock(&c->erase_completion_lock); 130862306a36Sopenharmony_ci for (raw=xd->node; raw != (void *)xd; raw=raw->next_in_ino) { 130962306a36Sopenharmony_ci if (ref_flags(raw) != REF_UNCHECKED) 131062306a36Sopenharmony_ci continue; 131162306a36Sopenharmony_ci jeb = &c->blocks[ref_offset(raw) / c->sector_size]; 131262306a36Sopenharmony_ci totlen = PAD(ref_totlen(c, jeb, raw)); 131362306a36Sopenharmony_ci c->unchecked_size -= totlen; c->used_size += totlen; 131462306a36Sopenharmony_ci jeb->unchecked_size -= totlen; jeb->used_size += totlen; 131562306a36Sopenharmony_ci raw->flash_offset = ref_offset(raw) 131662306a36Sopenharmony_ci | ((xd->node == (void *)raw) ? REF_PRISTINE : REF_NORMAL); 131762306a36Sopenharmony_ci } 131862306a36Sopenharmony_ci if (xd->flags & JFFS2_XFLAGS_DEAD) 131962306a36Sopenharmony_ci list_add(&xd->xindex, &c->xattr_dead_list); 132062306a36Sopenharmony_ci spin_unlock(&c->erase_completion_lock); 132162306a36Sopenharmony_ci } 132262306a36Sopenharmony_ci up_write(&c->xattr_sem); 132362306a36Sopenharmony_ci return list_empty(&c->xattr_unchecked) ? 1 : 0; 132462306a36Sopenharmony_ci} 132562306a36Sopenharmony_ci 132662306a36Sopenharmony_civoid jffs2_release_xattr_datum(struct jffs2_sb_info *c, struct jffs2_xattr_datum *xd) 132762306a36Sopenharmony_ci{ 132862306a36Sopenharmony_ci /* must be called under spin_lock(&c->erase_completion_lock) */ 132962306a36Sopenharmony_ci if (atomic_read(&xd->refcnt) || xd->node != (void *)xd) 133062306a36Sopenharmony_ci return; 133162306a36Sopenharmony_ci 133262306a36Sopenharmony_ci list_del(&xd->xindex); 133362306a36Sopenharmony_ci jffs2_free_xattr_datum(xd); 133462306a36Sopenharmony_ci} 133562306a36Sopenharmony_ci 133662306a36Sopenharmony_civoid jffs2_release_xattr_ref(struct jffs2_sb_info *c, struct jffs2_xattr_ref *ref) 133762306a36Sopenharmony_ci{ 133862306a36Sopenharmony_ci /* must be called under spin_lock(&c->erase_completion_lock) */ 133962306a36Sopenharmony_ci struct jffs2_xattr_ref *tmp, **ptmp; 134062306a36Sopenharmony_ci 134162306a36Sopenharmony_ci if (ref->node != (void *)ref) 134262306a36Sopenharmony_ci return; 134362306a36Sopenharmony_ci 134462306a36Sopenharmony_ci for (tmp=c->xref_dead_list, ptmp=&c->xref_dead_list; tmp; ptmp=&tmp->next, tmp=tmp->next) { 134562306a36Sopenharmony_ci if (ref == tmp) { 134662306a36Sopenharmony_ci *ptmp = tmp->next; 134762306a36Sopenharmony_ci break; 134862306a36Sopenharmony_ci } 134962306a36Sopenharmony_ci } 135062306a36Sopenharmony_ci jffs2_free_xattr_ref(ref); 135162306a36Sopenharmony_ci} 1352