mirror of
https://github.com/torvalds/linux.git
synced 2024-11-11 06:31:49 +00:00
6759212640
Cleanups: - remove an unused variable from orangefs_readdir. - clean up printk wrapper used for ofs "gossip" debugging. - clean up truncate ctime and mtime setting in inode.c - remove a useless null check found by coccinelle. - optimize some memcpy/memset boilerplate code. - remove some useless sanity checks from xattr.c Fix: - fix a potential strncpy vulnerability. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAABAgAGBQJXCAvtAAoJEM9EDqnrzg2+U3kP/RcypLnTdnOLFI7GtTr7erpc 4ys4UE3CdvOdIkDNgTeW+qTvy/b7qo3JBdaRqMAAmnWkxWn4cGXDGLhmfKD/6a3Q LL9vKxiczYN8gAYgnxoF5rNwoVScFVD7PospKkWMPedkRu00K0dqiJvomPXsvwM7 MEl4ueewq3KMrXHu1GYSdoZhU8BWtku789Oa5leXRqEO2pRit0amX/qxB9KG6Urz Ebz0yCGMPP61nTN9A/Q7IM2imcJO5F0wc5uaSaWimjHeHb040ytMVqFa4GOh4Pky oQjjw5OYSsX/O7Hh66wKQ68YqYb762OKE1y5v8K43vRhWQtnQo9pdKpFVEK0An8Z wOSaUFd5mhPD2KENcKB/kSiH3eOyGdyD2QamptLJ6Opl/6UdPQMt++1EkuSuYEdW wnCFsJM5yam3Ot+REnQiYAVjLsDZ0XhPfNIuAp+d4LIV32JGTQPOBurKECwsJbj5 fK0lsBNk7b8qgBwG41JjV7XyGlf5HWT2TwpuC2S5PysVXcxsvdfR3oVeUnzdL6aB fv0mp7bBqg2lNLKoeEYlxb+vbSiLutOCIPWSNptYjbCWa/q/bqnZMhXOUQjS5XRj HIG/91XeRUxOZk+y1gs5N5F8pCT9mfWRTvSCX5ex5x17rUFto/jhn2mQLAhxSyPD /AGQgNGz2VmmVBlaCngI =ZRlK -----END PGP SIGNATURE----- Merge tag 'for-linus-4.6-ofs1' of git://git.kernel.org/pub/scm/linux/kernel/git/hubcap/linux Pull orangefs fixes from Mike Marshall: "Orangefs cleanups and a strncpy vulnerability fix. Cleanups: - remove an unused variable from orangefs_readdir. - clean up printk wrapper used for ofs "gossip" debugging. - clean up truncate ctime and mtime setting in inode.c - remove a useless null check found by coccinelle. - optimize some memcpy/memset boilerplate code. - remove some useless sanity checks from xattr.c Fix: - fix a potential strncpy vulnerability" * tag 'for-linus-4.6-ofs1' of git://git.kernel.org/pub/scm/linux/kernel/git/hubcap/linux: orangefs: remove unused variable orangefs: Add KERN_<LEVEL> to gossip_<level> macros orangefs: strncpy -> strscpy orangefs: clean up truncate ctime and mtime setting Orangefs: fix ifnullfree.cocci warnings Orangefs: optimize boilerplate code. Orangefs: xattr.c cleanup
1053 lines
27 KiB
C
1053 lines
27 KiB
C
/*
|
|
* (C) 2001 Clemson University and The University of Chicago
|
|
*
|
|
* See COPYING in top-level directory.
|
|
*/
|
|
#include "protocol.h"
|
|
#include "orangefs-kernel.h"
|
|
#include "orangefs-dev-proto.h"
|
|
#include "orangefs-bufmap.h"
|
|
|
|
__s32 fsid_of_op(struct orangefs_kernel_op_s *op)
|
|
{
|
|
__s32 fsid = ORANGEFS_FS_ID_NULL;
|
|
|
|
if (op) {
|
|
switch (op->upcall.type) {
|
|
case ORANGEFS_VFS_OP_FILE_IO:
|
|
fsid = op->upcall.req.io.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_LOOKUP:
|
|
fsid = op->upcall.req.lookup.parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_CREATE:
|
|
fsid = op->upcall.req.create.parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_GETATTR:
|
|
fsid = op->upcall.req.getattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_REMOVE:
|
|
fsid = op->upcall.req.remove.parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_MKDIR:
|
|
fsid = op->upcall.req.mkdir.parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_READDIR:
|
|
fsid = op->upcall.req.readdir.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_SETATTR:
|
|
fsid = op->upcall.req.setattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_SYMLINK:
|
|
fsid = op->upcall.req.sym.parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_RENAME:
|
|
fsid = op->upcall.req.rename.old_parent_refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_STATFS:
|
|
fsid = op->upcall.req.statfs.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_TRUNCATE:
|
|
fsid = op->upcall.req.truncate.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_MMAP_RA_FLUSH:
|
|
fsid = op->upcall.req.ra_cache_flush.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_FS_UMOUNT:
|
|
fsid = op->upcall.req.fs_umount.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_GETXATTR:
|
|
fsid = op->upcall.req.getxattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_SETXATTR:
|
|
fsid = op->upcall.req.setxattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_LISTXATTR:
|
|
fsid = op->upcall.req.listxattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_REMOVEXATTR:
|
|
fsid = op->upcall.req.removexattr.refn.fs_id;
|
|
break;
|
|
case ORANGEFS_VFS_OP_FSYNC:
|
|
fsid = op->upcall.req.fsync.refn.fs_id;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
return fsid;
|
|
}
|
|
|
|
static int orangefs_inode_flags(struct ORANGEFS_sys_attr_s *attrs)
|
|
{
|
|
int flags = 0;
|
|
if (attrs->flags & ORANGEFS_IMMUTABLE_FL)
|
|
flags |= S_IMMUTABLE;
|
|
else
|
|
flags &= ~S_IMMUTABLE;
|
|
if (attrs->flags & ORANGEFS_APPEND_FL)
|
|
flags |= S_APPEND;
|
|
else
|
|
flags &= ~S_APPEND;
|
|
if (attrs->flags & ORANGEFS_NOATIME_FL)
|
|
flags |= S_NOATIME;
|
|
else
|
|
flags &= ~S_NOATIME;
|
|
return flags;
|
|
}
|
|
|
|
static int orangefs_inode_perms(struct ORANGEFS_sys_attr_s *attrs)
|
|
{
|
|
int perm_mode = 0;
|
|
|
|
if (attrs->perms & ORANGEFS_O_EXECUTE)
|
|
perm_mode |= S_IXOTH;
|
|
if (attrs->perms & ORANGEFS_O_WRITE)
|
|
perm_mode |= S_IWOTH;
|
|
if (attrs->perms & ORANGEFS_O_READ)
|
|
perm_mode |= S_IROTH;
|
|
|
|
if (attrs->perms & ORANGEFS_G_EXECUTE)
|
|
perm_mode |= S_IXGRP;
|
|
if (attrs->perms & ORANGEFS_G_WRITE)
|
|
perm_mode |= S_IWGRP;
|
|
if (attrs->perms & ORANGEFS_G_READ)
|
|
perm_mode |= S_IRGRP;
|
|
|
|
if (attrs->perms & ORANGEFS_U_EXECUTE)
|
|
perm_mode |= S_IXUSR;
|
|
if (attrs->perms & ORANGEFS_U_WRITE)
|
|
perm_mode |= S_IWUSR;
|
|
if (attrs->perms & ORANGEFS_U_READ)
|
|
perm_mode |= S_IRUSR;
|
|
|
|
if (attrs->perms & ORANGEFS_G_SGID)
|
|
perm_mode |= S_ISGID;
|
|
if (attrs->perms & ORANGEFS_U_SUID)
|
|
perm_mode |= S_ISUID;
|
|
|
|
return perm_mode;
|
|
}
|
|
|
|
/*
|
|
* NOTE: in kernel land, we never use the sys_attr->link_target for
|
|
* anything, so don't bother copying it into the sys_attr object here.
|
|
*/
|
|
static inline int copy_attributes_from_inode(struct inode *inode,
|
|
struct ORANGEFS_sys_attr_s *attrs,
|
|
struct iattr *iattr)
|
|
{
|
|
umode_t tmp_mode;
|
|
|
|
if (!iattr || !inode || !attrs) {
|
|
gossip_err("NULL iattr (%p), inode (%p), attrs (%p) "
|
|
"in copy_attributes_from_inode!\n",
|
|
iattr,
|
|
inode,
|
|
attrs);
|
|
return -EINVAL;
|
|
}
|
|
/*
|
|
* We need to be careful to only copy the attributes out of the
|
|
* iattr object that we know are valid.
|
|
*/
|
|
attrs->mask = 0;
|
|
if (iattr->ia_valid & ATTR_UID) {
|
|
attrs->owner = from_kuid(current_user_ns(), iattr->ia_uid);
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_UID;
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "(UID) %d\n", attrs->owner);
|
|
}
|
|
if (iattr->ia_valid & ATTR_GID) {
|
|
attrs->group = from_kgid(current_user_ns(), iattr->ia_gid);
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_GID;
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "(GID) %d\n", attrs->group);
|
|
}
|
|
|
|
if (iattr->ia_valid & ATTR_ATIME) {
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_ATIME;
|
|
if (iattr->ia_valid & ATTR_ATIME_SET) {
|
|
attrs->atime = (time64_t)iattr->ia_atime.tv_sec;
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_ATIME_SET;
|
|
}
|
|
}
|
|
if (iattr->ia_valid & ATTR_MTIME) {
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_MTIME;
|
|
if (iattr->ia_valid & ATTR_MTIME_SET) {
|
|
attrs->mtime = (time64_t)iattr->ia_mtime.tv_sec;
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_MTIME_SET;
|
|
}
|
|
}
|
|
if (iattr->ia_valid & ATTR_CTIME)
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_CTIME;
|
|
|
|
/*
|
|
* ORANGEFS cannot set size with a setattr operation. Probably not likely
|
|
* to be requested through the VFS, but just in case, don't worry about
|
|
* ATTR_SIZE
|
|
*/
|
|
|
|
if (iattr->ia_valid & ATTR_MODE) {
|
|
tmp_mode = iattr->ia_mode;
|
|
if (tmp_mode & (S_ISVTX)) {
|
|
if (is_root_handle(inode)) {
|
|
/*
|
|
* allow sticky bit to be set on root (since
|
|
* it shows up that way by default anyhow),
|
|
* but don't show it to the server
|
|
*/
|
|
tmp_mode -= S_ISVTX;
|
|
} else {
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"User attempted to set sticky bit on non-root directory; returning EINVAL.\n");
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
if (tmp_mode & (S_ISUID)) {
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"Attempting to set setuid bit (not supported); returning EINVAL.\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
attrs->perms = ORANGEFS_util_translate_mode(tmp_mode);
|
|
attrs->mask |= ORANGEFS_ATTR_SYS_PERM;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int orangefs_inode_type(enum orangefs_ds_type objtype)
|
|
{
|
|
if (objtype == ORANGEFS_TYPE_METAFILE)
|
|
return S_IFREG;
|
|
else if (objtype == ORANGEFS_TYPE_DIRECTORY)
|
|
return S_IFDIR;
|
|
else if (objtype == ORANGEFS_TYPE_SYMLINK)
|
|
return S_IFLNK;
|
|
else
|
|
return -1;
|
|
}
|
|
|
|
static int orangefs_inode_is_stale(struct inode *inode, int new,
|
|
struct ORANGEFS_sys_attr_s *attrs, char *link_target)
|
|
{
|
|
struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
|
|
int type = orangefs_inode_type(attrs->objtype);
|
|
if (!new) {
|
|
/*
|
|
* If the inode type or symlink target have changed then this
|
|
* inode is stale.
|
|
*/
|
|
if (type == -1 || !(inode->i_mode & type)) {
|
|
orangefs_make_bad_inode(inode);
|
|
return 1;
|
|
}
|
|
if (type == S_IFLNK && strncmp(orangefs_inode->link_target,
|
|
link_target, ORANGEFS_NAME_MAX)) {
|
|
orangefs_make_bad_inode(inode);
|
|
return 1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int orangefs_inode_getattr(struct inode *inode, int new, int size)
|
|
{
|
|
struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
|
|
struct orangefs_kernel_op_s *new_op;
|
|
loff_t inode_size, rounded_up_size;
|
|
int ret, type;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: called on inode %pU\n", __func__,
|
|
get_khandle_from_ino(inode));
|
|
|
|
new_op = op_alloc(ORANGEFS_VFS_OP_GETATTR);
|
|
if (!new_op)
|
|
return -ENOMEM;
|
|
new_op->upcall.req.getattr.refn = orangefs_inode->refn;
|
|
new_op->upcall.req.getattr.mask = size ?
|
|
ORANGEFS_ATTR_SYS_ALL_NOHINT : ORANGEFS_ATTR_SYS_ALL_NOHINT_NOSIZE;
|
|
|
|
ret = service_operation(new_op, __func__,
|
|
get_interruptible_flag(inode));
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
type = orangefs_inode_type(new_op->
|
|
downcall.resp.getattr.attributes.objtype);
|
|
ret = orangefs_inode_is_stale(inode, new,
|
|
&new_op->downcall.resp.getattr.attributes,
|
|
new_op->downcall.resp.getattr.link_target);
|
|
if (ret) {
|
|
ret = -ESTALE;
|
|
goto out;
|
|
}
|
|
|
|
switch (type) {
|
|
case S_IFREG:
|
|
inode->i_flags = orangefs_inode_flags(&new_op->
|
|
downcall.resp.getattr.attributes);
|
|
if (size) {
|
|
inode_size = (loff_t)new_op->
|
|
downcall.resp.getattr.attributes.size;
|
|
rounded_up_size =
|
|
(inode_size + (4096 - (inode_size % 4096)));
|
|
inode->i_size = inode_size;
|
|
orangefs_inode->blksize =
|
|
new_op->downcall.resp.getattr.attributes.blksize;
|
|
spin_lock(&inode->i_lock);
|
|
inode->i_bytes = inode_size;
|
|
inode->i_blocks =
|
|
(unsigned long)(rounded_up_size / 512);
|
|
spin_unlock(&inode->i_lock);
|
|
}
|
|
break;
|
|
case S_IFDIR:
|
|
inode->i_size = PAGE_SIZE;
|
|
orangefs_inode->blksize = (1 << inode->i_blkbits);
|
|
spin_lock(&inode->i_lock);
|
|
inode_set_bytes(inode, inode->i_size);
|
|
spin_unlock(&inode->i_lock);
|
|
set_nlink(inode, 1);
|
|
break;
|
|
case S_IFLNK:
|
|
if (new) {
|
|
inode->i_size = (loff_t)strlen(new_op->
|
|
downcall.resp.getattr.link_target);
|
|
orangefs_inode->blksize = (1 << inode->i_blkbits);
|
|
ret = strscpy(orangefs_inode->link_target,
|
|
new_op->downcall.resp.getattr.link_target,
|
|
ORANGEFS_NAME_MAX);
|
|
if (ret == -E2BIG) {
|
|
ret = -EIO;
|
|
goto out;
|
|
}
|
|
inode->i_link = orangefs_inode->link_target;
|
|
}
|
|
break;
|
|
}
|
|
|
|
inode->i_uid = make_kuid(&init_user_ns, new_op->
|
|
downcall.resp.getattr.attributes.owner);
|
|
inode->i_gid = make_kgid(&init_user_ns, new_op->
|
|
downcall.resp.getattr.attributes.group);
|
|
inode->i_atime.tv_sec = (time64_t)new_op->
|
|
downcall.resp.getattr.attributes.atime;
|
|
inode->i_mtime.tv_sec = (time64_t)new_op->
|
|
downcall.resp.getattr.attributes.mtime;
|
|
inode->i_ctime.tv_sec = (time64_t)new_op->
|
|
downcall.resp.getattr.attributes.ctime;
|
|
inode->i_atime.tv_nsec = 0;
|
|
inode->i_mtime.tv_nsec = 0;
|
|
inode->i_ctime.tv_nsec = 0;
|
|
|
|
/* special case: mark the root inode as sticky */
|
|
inode->i_mode = type | (is_root_handle(inode) ? S_ISVTX : 0) |
|
|
orangefs_inode_perms(&new_op->downcall.resp.getattr.attributes);
|
|
|
|
ret = 0;
|
|
out:
|
|
op_release(new_op);
|
|
return ret;
|
|
}
|
|
|
|
int orangefs_inode_check_changed(struct inode *inode)
|
|
{
|
|
struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
|
|
struct orangefs_kernel_op_s *new_op;
|
|
int ret;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: called on inode %pU\n", __func__,
|
|
get_khandle_from_ino(inode));
|
|
|
|
new_op = op_alloc(ORANGEFS_VFS_OP_GETATTR);
|
|
if (!new_op)
|
|
return -ENOMEM;
|
|
new_op->upcall.req.getattr.refn = orangefs_inode->refn;
|
|
new_op->upcall.req.getattr.mask = ORANGEFS_ATTR_SYS_TYPE |
|
|
ORANGEFS_ATTR_SYS_LNK_TARGET;
|
|
|
|
ret = service_operation(new_op, __func__,
|
|
get_interruptible_flag(inode));
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
ret = orangefs_inode_is_stale(inode, 0,
|
|
&new_op->downcall.resp.getattr.attributes,
|
|
new_op->downcall.resp.getattr.link_target);
|
|
out:
|
|
op_release(new_op);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* issues a orangefs setattr request to make sure the new attribute values
|
|
* take effect if successful. returns 0 on success; -errno otherwise
|
|
*/
|
|
int orangefs_inode_setattr(struct inode *inode, struct iattr *iattr)
|
|
{
|
|
struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
|
|
struct orangefs_kernel_op_s *new_op;
|
|
int ret;
|
|
|
|
new_op = op_alloc(ORANGEFS_VFS_OP_SETATTR);
|
|
if (!new_op)
|
|
return -ENOMEM;
|
|
|
|
new_op->upcall.req.setattr.refn = orangefs_inode->refn;
|
|
ret = copy_attributes_from_inode(inode,
|
|
&new_op->upcall.req.setattr.attributes,
|
|
iattr);
|
|
if (ret >= 0) {
|
|
ret = service_operation(new_op, __func__,
|
|
get_interruptible_flag(inode));
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"orangefs_inode_setattr: returning %d\n",
|
|
ret);
|
|
}
|
|
|
|
op_release(new_op);
|
|
|
|
/*
|
|
* successful setattr should clear the atime, mtime and
|
|
* ctime flags.
|
|
*/
|
|
if (ret == 0) {
|
|
ClearAtimeFlag(orangefs_inode);
|
|
ClearMtimeFlag(orangefs_inode);
|
|
ClearCtimeFlag(orangefs_inode);
|
|
ClearModeFlag(orangefs_inode);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int orangefs_flush_inode(struct inode *inode)
|
|
{
|
|
/*
|
|
* If it is a dirty inode, this function gets called.
|
|
* Gather all the information that needs to be setattr'ed
|
|
* Right now, this will only be used for mode, atime, mtime
|
|
* and/or ctime.
|
|
*/
|
|
struct iattr wbattr;
|
|
int ret;
|
|
int mtime_flag;
|
|
int ctime_flag;
|
|
int atime_flag;
|
|
int mode_flag;
|
|
struct orangefs_inode_s *orangefs_inode = ORANGEFS_I(inode);
|
|
|
|
memset(&wbattr, 0, sizeof(wbattr));
|
|
|
|
/*
|
|
* check inode flags up front, and clear them if they are set. This
|
|
* will prevent multiple processes from all trying to flush the same
|
|
* inode if they call close() simultaneously
|
|
*/
|
|
mtime_flag = MtimeFlag(orangefs_inode);
|
|
ClearMtimeFlag(orangefs_inode);
|
|
ctime_flag = CtimeFlag(orangefs_inode);
|
|
ClearCtimeFlag(orangefs_inode);
|
|
atime_flag = AtimeFlag(orangefs_inode);
|
|
ClearAtimeFlag(orangefs_inode);
|
|
mode_flag = ModeFlag(orangefs_inode);
|
|
ClearModeFlag(orangefs_inode);
|
|
|
|
/* -- Lazy atime,mtime and ctime update --
|
|
* Note: all times are dictated by server in the new scheme
|
|
* and not by the clients
|
|
*
|
|
* Also mode updates are being handled now..
|
|
*/
|
|
|
|
if (mtime_flag)
|
|
wbattr.ia_valid |= ATTR_MTIME;
|
|
if (ctime_flag)
|
|
wbattr.ia_valid |= ATTR_CTIME;
|
|
if (atime_flag)
|
|
wbattr.ia_valid |= ATTR_ATIME;
|
|
|
|
if (mode_flag) {
|
|
wbattr.ia_mode = inode->i_mode;
|
|
wbattr.ia_valid |= ATTR_MODE;
|
|
}
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"*********** orangefs_flush_inode: %pU "
|
|
"(ia_valid %d)\n",
|
|
get_khandle_from_ino(inode),
|
|
wbattr.ia_valid);
|
|
if (wbattr.ia_valid == 0) {
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"orangefs_flush_inode skipping setattr()\n");
|
|
return 0;
|
|
}
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"orangefs_flush_inode (%pU) writing mode %o\n",
|
|
get_khandle_from_ino(inode),
|
|
inode->i_mode);
|
|
|
|
ret = orangefs_inode_setattr(inode, &wbattr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int orangefs_unmount_sb(struct super_block *sb)
|
|
{
|
|
int ret = -EINVAL;
|
|
struct orangefs_kernel_op_s *new_op = NULL;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"orangefs_unmount_sb called on sb %p\n",
|
|
sb);
|
|
|
|
new_op = op_alloc(ORANGEFS_VFS_OP_FS_UMOUNT);
|
|
if (!new_op)
|
|
return -ENOMEM;
|
|
new_op->upcall.req.fs_umount.id = ORANGEFS_SB(sb)->id;
|
|
new_op->upcall.req.fs_umount.fs_id = ORANGEFS_SB(sb)->fs_id;
|
|
strncpy(new_op->upcall.req.fs_umount.orangefs_config_server,
|
|
ORANGEFS_SB(sb)->devname,
|
|
ORANGEFS_MAX_SERVER_ADDR_LEN);
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"Attempting ORANGEFS Unmount via host %s\n",
|
|
new_op->upcall.req.fs_umount.orangefs_config_server);
|
|
|
|
ret = service_operation(new_op, "orangefs_fs_umount", 0);
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"orangefs_unmount: got return value of %d\n", ret);
|
|
if (ret)
|
|
sb = ERR_PTR(ret);
|
|
else
|
|
ORANGEFS_SB(sb)->mount_pending = 1;
|
|
|
|
op_release(new_op);
|
|
return ret;
|
|
}
|
|
|
|
void orangefs_make_bad_inode(struct inode *inode)
|
|
{
|
|
if (is_root_handle(inode)) {
|
|
/*
|
|
* if this occurs, the pvfs2-client-core was killed but we
|
|
* can't afford to lose the inode operations and such
|
|
* associated with the root handle in any case.
|
|
*/
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"*** NOT making bad root inode %pU\n",
|
|
get_khandle_from_ino(inode));
|
|
} else {
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"*** making bad inode %pU\n",
|
|
get_khandle_from_ino(inode));
|
|
make_bad_inode(inode);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* The following is a very dirty hack that is now a permanent part of the
|
|
* ORANGEFS protocol. See protocol.h for more error definitions.
|
|
*/
|
|
|
|
/* The order matches include/orangefs-types.h in the OrangeFS source. */
|
|
static int PINT_errno_mapping[] = {
|
|
0, EPERM, ENOENT, EINTR, EIO, ENXIO, EBADF, EAGAIN, ENOMEM,
|
|
EFAULT, EBUSY, EEXIST, ENODEV, ENOTDIR, EISDIR, EINVAL, EMFILE,
|
|
EFBIG, ENOSPC, EROFS, EMLINK, EPIPE, EDEADLK, ENAMETOOLONG,
|
|
ENOLCK, ENOSYS, ENOTEMPTY, ELOOP, EWOULDBLOCK, ENOMSG, EUNATCH,
|
|
EBADR, EDEADLOCK, ENODATA, ETIME, ENONET, EREMOTE, ECOMM,
|
|
EPROTO, EBADMSG, EOVERFLOW, ERESTART, EMSGSIZE, EPROTOTYPE,
|
|
ENOPROTOOPT, EPROTONOSUPPORT, EOPNOTSUPP, EADDRINUSE,
|
|
EADDRNOTAVAIL, ENETDOWN, ENETUNREACH, ENETRESET, ENOBUFS,
|
|
ETIMEDOUT, ECONNREFUSED, EHOSTDOWN, EHOSTUNREACH, EALREADY,
|
|
EACCES, ECONNRESET, ERANGE
|
|
};
|
|
|
|
int orangefs_normalize_to_errno(__s32 error_code)
|
|
{
|
|
__u32 i;
|
|
|
|
/* Success */
|
|
if (error_code == 0) {
|
|
return 0;
|
|
/*
|
|
* This shouldn't ever happen. If it does it should be fixed on the
|
|
* server.
|
|
*/
|
|
} else if (error_code > 0) {
|
|
gossip_err("orangefs: error status receieved.\n");
|
|
gossip_err("orangefs: assuming error code is inverted.\n");
|
|
error_code = -error_code;
|
|
}
|
|
|
|
/*
|
|
* XXX: This is very bad since error codes from ORANGEFS may not be
|
|
* suitable for return into userspace.
|
|
*/
|
|
|
|
/*
|
|
* Convert ORANGEFS error values into errno values suitable for return
|
|
* from the kernel.
|
|
*/
|
|
if ((-error_code) & ORANGEFS_NON_ERRNO_ERROR_BIT) {
|
|
if (((-error_code) &
|
|
(ORANGEFS_ERROR_NUMBER_BITS|ORANGEFS_NON_ERRNO_ERROR_BIT|
|
|
ORANGEFS_ERROR_BIT)) == ORANGEFS_ECANCEL) {
|
|
/*
|
|
* cancellation error codes generally correspond to
|
|
* a timeout from the client's perspective
|
|
*/
|
|
error_code = -ETIMEDOUT;
|
|
} else {
|
|
/* assume a default error code */
|
|
gossip_err("orangefs: warning: got error code without errno equivalent: %d.\n", error_code);
|
|
error_code = -EINVAL;
|
|
}
|
|
|
|
/* Convert ORANGEFS encoded errno values into regular errno values. */
|
|
} else if ((-error_code) & ORANGEFS_ERROR_BIT) {
|
|
i = (-error_code) & ~(ORANGEFS_ERROR_BIT|ORANGEFS_ERROR_CLASS_BITS);
|
|
if (i < sizeof(PINT_errno_mapping)/sizeof(*PINT_errno_mapping))
|
|
error_code = -PINT_errno_mapping[i];
|
|
else
|
|
error_code = -EINVAL;
|
|
|
|
/*
|
|
* Only ORANGEFS protocol error codes should ever come here. Otherwise
|
|
* there is a bug somewhere.
|
|
*/
|
|
} else {
|
|
gossip_err("orangefs: orangefs_normalize_to_errno: got error code which is not from ORANGEFS.\n");
|
|
}
|
|
return error_code;
|
|
}
|
|
|
|
#define NUM_MODES 11
|
|
__s32 ORANGEFS_util_translate_mode(int mode)
|
|
{
|
|
int ret = 0;
|
|
int i = 0;
|
|
static int modes[NUM_MODES] = {
|
|
S_IXOTH, S_IWOTH, S_IROTH,
|
|
S_IXGRP, S_IWGRP, S_IRGRP,
|
|
S_IXUSR, S_IWUSR, S_IRUSR,
|
|
S_ISGID, S_ISUID
|
|
};
|
|
static int orangefs_modes[NUM_MODES] = {
|
|
ORANGEFS_O_EXECUTE, ORANGEFS_O_WRITE, ORANGEFS_O_READ,
|
|
ORANGEFS_G_EXECUTE, ORANGEFS_G_WRITE, ORANGEFS_G_READ,
|
|
ORANGEFS_U_EXECUTE, ORANGEFS_U_WRITE, ORANGEFS_U_READ,
|
|
ORANGEFS_G_SGID, ORANGEFS_U_SUID
|
|
};
|
|
|
|
for (i = 0; i < NUM_MODES; i++)
|
|
if (mode & modes[i])
|
|
ret |= orangefs_modes[i];
|
|
|
|
return ret;
|
|
}
|
|
#undef NUM_MODES
|
|
|
|
/*
|
|
* After obtaining a string representation of the client's debug
|
|
* keywords and their associated masks, this function is called to build an
|
|
* array of these values.
|
|
*/
|
|
int orangefs_prepare_cdm_array(char *debug_array_string)
|
|
{
|
|
int i;
|
|
int rc = -EINVAL;
|
|
char *cds_head = NULL;
|
|
char *cds_delimiter = NULL;
|
|
int keyword_len = 0;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: start\n", __func__);
|
|
|
|
/*
|
|
* figure out how many elements the cdm_array needs.
|
|
*/
|
|
for (i = 0; i < strlen(debug_array_string); i++)
|
|
if (debug_array_string[i] == '\n')
|
|
cdm_element_count++;
|
|
|
|
if (!cdm_element_count) {
|
|
pr_info("No elements in client debug array string!\n");
|
|
goto out;
|
|
}
|
|
|
|
cdm_array =
|
|
kzalloc(cdm_element_count * sizeof(struct client_debug_mask),
|
|
GFP_KERNEL);
|
|
if (!cdm_array) {
|
|
pr_info("malloc failed for cdm_array!\n");
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
cds_head = debug_array_string;
|
|
|
|
for (i = 0; i < cdm_element_count; i++) {
|
|
cds_delimiter = strchr(cds_head, '\n');
|
|
*cds_delimiter = '\0';
|
|
|
|
keyword_len = strcspn(cds_head, " ");
|
|
|
|
cdm_array[i].keyword = kzalloc(keyword_len + 1, GFP_KERNEL);
|
|
if (!cdm_array[i].keyword) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
sscanf(cds_head,
|
|
"%s %llx %llx",
|
|
cdm_array[i].keyword,
|
|
(unsigned long long *)&(cdm_array[i].mask1),
|
|
(unsigned long long *)&(cdm_array[i].mask2));
|
|
|
|
if (!strcmp(cdm_array[i].keyword, ORANGEFS_VERBOSE))
|
|
client_verbose_index = i;
|
|
|
|
if (!strcmp(cdm_array[i].keyword, ORANGEFS_ALL))
|
|
client_all_index = i;
|
|
|
|
cds_head = cds_delimiter + 1;
|
|
}
|
|
|
|
rc = cdm_element_count;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: rc:%d:\n", __func__, rc);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
/*
|
|
* /sys/kernel/debug/orangefs/debug-help can be catted to
|
|
* see all the available kernel and client debug keywords.
|
|
*
|
|
* When the kernel boots, we have no idea what keywords the
|
|
* client supports, nor their associated masks.
|
|
*
|
|
* We pass through this function once at boot and stamp a
|
|
* boilerplate "we don't know" message for the client in the
|
|
* debug-help file. We pass through here again when the client
|
|
* starts and then we can fill out the debug-help file fully.
|
|
*
|
|
* The client might be restarted any number of times between
|
|
* reboots, we only build the debug-help file the first time.
|
|
*/
|
|
int orangefs_prepare_debugfs_help_string(int at_boot)
|
|
{
|
|
int rc = -EINVAL;
|
|
int i;
|
|
int byte_count = 0;
|
|
char *client_title = "Client Debug Keywords:\n";
|
|
char *kernel_title = "Kernel Debug Keywords:\n";
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: start\n", __func__);
|
|
|
|
if (at_boot) {
|
|
byte_count += strlen(HELP_STRING_UNINITIALIZED);
|
|
client_title = HELP_STRING_UNINITIALIZED;
|
|
} else {
|
|
/*
|
|
* fill the client keyword/mask array and remember
|
|
* how many elements there were.
|
|
*/
|
|
cdm_element_count =
|
|
orangefs_prepare_cdm_array(client_debug_array_string);
|
|
if (cdm_element_count <= 0)
|
|
goto out;
|
|
|
|
/* Count the bytes destined for debug_help_string. */
|
|
byte_count += strlen(client_title);
|
|
|
|
for (i = 0; i < cdm_element_count; i++) {
|
|
byte_count += strlen(cdm_array[i].keyword + 2);
|
|
if (byte_count >= DEBUG_HELP_STRING_SIZE) {
|
|
pr_info("%s: overflow 1!\n", __func__);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG,
|
|
"%s: cdm_element_count:%d:\n",
|
|
__func__,
|
|
cdm_element_count);
|
|
}
|
|
|
|
byte_count += strlen(kernel_title);
|
|
for (i = 0; i < num_kmod_keyword_mask_map; i++) {
|
|
byte_count +=
|
|
strlen(s_kmod_keyword_mask_map[i].keyword + 2);
|
|
if (byte_count >= DEBUG_HELP_STRING_SIZE) {
|
|
pr_info("%s: overflow 2!\n", __func__);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* build debug_help_string. */
|
|
debug_help_string = kzalloc(DEBUG_HELP_STRING_SIZE, GFP_KERNEL);
|
|
if (!debug_help_string) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
strcat(debug_help_string, client_title);
|
|
|
|
if (!at_boot) {
|
|
for (i = 0; i < cdm_element_count; i++) {
|
|
strcat(debug_help_string, "\t");
|
|
strcat(debug_help_string, cdm_array[i].keyword);
|
|
strcat(debug_help_string, "\n");
|
|
}
|
|
}
|
|
|
|
strcat(debug_help_string, "\n");
|
|
strcat(debug_help_string, kernel_title);
|
|
|
|
for (i = 0; i < num_kmod_keyword_mask_map; i++) {
|
|
strcat(debug_help_string, "\t");
|
|
strcat(debug_help_string, s_kmod_keyword_mask_map[i].keyword);
|
|
strcat(debug_help_string, "\n");
|
|
}
|
|
|
|
rc = 0;
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
/*
|
|
* kernel = type 0
|
|
* client = type 1
|
|
*/
|
|
void debug_mask_to_string(void *mask, int type)
|
|
{
|
|
int i;
|
|
int len = 0;
|
|
char *debug_string;
|
|
int element_count = 0;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: start\n", __func__);
|
|
|
|
if (type) {
|
|
debug_string = client_debug_string;
|
|
element_count = cdm_element_count;
|
|
} else {
|
|
debug_string = kernel_debug_string;
|
|
element_count = num_kmod_keyword_mask_map;
|
|
}
|
|
|
|
memset(debug_string, 0, ORANGEFS_MAX_DEBUG_STRING_LEN);
|
|
|
|
/*
|
|
* Some keywords, like "all" or "verbose", are amalgams of
|
|
* numerous other keywords. Make a special check for those
|
|
* before grinding through the whole mask only to find out
|
|
* later...
|
|
*/
|
|
if (check_amalgam_keyword(mask, type))
|
|
goto out;
|
|
|
|
/* Build the debug string. */
|
|
for (i = 0; i < element_count; i++)
|
|
if (type)
|
|
do_c_string(mask, i);
|
|
else
|
|
do_k_string(mask, i);
|
|
|
|
len = strlen(debug_string);
|
|
|
|
if ((len) && (type))
|
|
client_debug_string[len - 1] = '\0';
|
|
else if (len)
|
|
kernel_debug_string[len - 1] = '\0';
|
|
else if (type)
|
|
strcpy(client_debug_string, "none");
|
|
else
|
|
strcpy(kernel_debug_string, "none");
|
|
|
|
out:
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: string:%s:\n", __func__, debug_string);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
void do_k_string(void *k_mask, int index)
|
|
{
|
|
__u64 *mask = (__u64 *) k_mask;
|
|
|
|
if (keyword_is_amalgam((char *) s_kmod_keyword_mask_map[index].keyword))
|
|
goto out;
|
|
|
|
if (*mask & s_kmod_keyword_mask_map[index].mask_val) {
|
|
if ((strlen(kernel_debug_string) +
|
|
strlen(s_kmod_keyword_mask_map[index].keyword))
|
|
< ORANGEFS_MAX_DEBUG_STRING_LEN - 1) {
|
|
strcat(kernel_debug_string,
|
|
s_kmod_keyword_mask_map[index].keyword);
|
|
strcat(kernel_debug_string, ",");
|
|
} else {
|
|
gossip_err("%s: overflow!\n", __func__);
|
|
strcpy(kernel_debug_string, ORANGEFS_ALL);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
out:
|
|
|
|
return;
|
|
}
|
|
|
|
void do_c_string(void *c_mask, int index)
|
|
{
|
|
struct client_debug_mask *mask = (struct client_debug_mask *) c_mask;
|
|
|
|
if (keyword_is_amalgam(cdm_array[index].keyword))
|
|
goto out;
|
|
|
|
if ((mask->mask1 & cdm_array[index].mask1) ||
|
|
(mask->mask2 & cdm_array[index].mask2)) {
|
|
if ((strlen(client_debug_string) +
|
|
strlen(cdm_array[index].keyword) + 1)
|
|
< ORANGEFS_MAX_DEBUG_STRING_LEN - 2) {
|
|
strcat(client_debug_string,
|
|
cdm_array[index].keyword);
|
|
strcat(client_debug_string, ",");
|
|
} else {
|
|
gossip_err("%s: overflow!\n", __func__);
|
|
strcpy(client_debug_string, ORANGEFS_ALL);
|
|
goto out;
|
|
}
|
|
}
|
|
out:
|
|
return;
|
|
}
|
|
|
|
int keyword_is_amalgam(char *keyword)
|
|
{
|
|
int rc = 0;
|
|
|
|
if ((!strcmp(keyword, ORANGEFS_ALL)) || (!strcmp(keyword, ORANGEFS_VERBOSE)))
|
|
rc = 1;
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* kernel = type 0
|
|
* client = type 1
|
|
*
|
|
* return 1 if we found an amalgam.
|
|
*/
|
|
int check_amalgam_keyword(void *mask, int type)
|
|
{
|
|
__u64 *k_mask;
|
|
struct client_debug_mask *c_mask;
|
|
int k_all_index = num_kmod_keyword_mask_map - 1;
|
|
int rc = 0;
|
|
|
|
if (type) {
|
|
c_mask = (struct client_debug_mask *) mask;
|
|
|
|
if ((c_mask->mask1 == cdm_array[client_all_index].mask1) &&
|
|
(c_mask->mask2 == cdm_array[client_all_index].mask2)) {
|
|
strcpy(client_debug_string, ORANGEFS_ALL);
|
|
rc = 1;
|
|
goto out;
|
|
}
|
|
|
|
if ((c_mask->mask1 == cdm_array[client_verbose_index].mask1) &&
|
|
(c_mask->mask2 == cdm_array[client_verbose_index].mask2)) {
|
|
strcpy(client_debug_string, ORANGEFS_VERBOSE);
|
|
rc = 1;
|
|
goto out;
|
|
}
|
|
|
|
} else {
|
|
k_mask = (__u64 *) mask;
|
|
|
|
if (*k_mask >= s_kmod_keyword_mask_map[k_all_index].mask_val) {
|
|
strcpy(kernel_debug_string, ORANGEFS_ALL);
|
|
rc = 1;
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
out:
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* kernel = type 0
|
|
* client = type 1
|
|
*/
|
|
void debug_string_to_mask(char *debug_string, void *mask, int type)
|
|
{
|
|
char *unchecked_keyword;
|
|
int i;
|
|
char *strsep_fodder = kstrdup(debug_string, GFP_KERNEL);
|
|
char *original_pointer;
|
|
int element_count = 0;
|
|
struct client_debug_mask *c_mask;
|
|
__u64 *k_mask;
|
|
|
|
gossip_debug(GOSSIP_UTILS_DEBUG, "%s: start\n", __func__);
|
|
|
|
if (type) {
|
|
c_mask = (struct client_debug_mask *)mask;
|
|
element_count = cdm_element_count;
|
|
} else {
|
|
k_mask = (__u64 *)mask;
|
|
*k_mask = 0;
|
|
element_count = num_kmod_keyword_mask_map;
|
|
}
|
|
|
|
original_pointer = strsep_fodder;
|
|
while ((unchecked_keyword = strsep(&strsep_fodder, ",")))
|
|
if (strlen(unchecked_keyword)) {
|
|
for (i = 0; i < element_count; i++)
|
|
if (type)
|
|
do_c_mask(i,
|
|
unchecked_keyword,
|
|
&c_mask);
|
|
else
|
|
do_k_mask(i,
|
|
unchecked_keyword,
|
|
&k_mask);
|
|
}
|
|
|
|
kfree(original_pointer);
|
|
}
|
|
|
|
void do_c_mask(int i,
|
|
char *unchecked_keyword,
|
|
struct client_debug_mask **sane_mask)
|
|
{
|
|
|
|
if (!strcmp(cdm_array[i].keyword, unchecked_keyword)) {
|
|
(**sane_mask).mask1 = (**sane_mask).mask1 | cdm_array[i].mask1;
|
|
(**sane_mask).mask2 = (**sane_mask).mask2 | cdm_array[i].mask2;
|
|
}
|
|
}
|
|
|
|
void do_k_mask(int i, char *unchecked_keyword, __u64 **sane_mask)
|
|
{
|
|
|
|
if (!strcmp(s_kmod_keyword_mask_map[i].keyword, unchecked_keyword))
|
|
**sane_mask = (**sane_mask) |
|
|
s_kmod_keyword_mask_map[i].mask_val;
|
|
}
|