@@ -316,8 +316,7 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
int err;
unsigned frag = -1;
struct ceph_mds_reply_info_parsed *rinfo;
- struct fscrypt_str tname = FSTR_INIT(NULL, 0);
- struct fscrypt_str oname = FSTR_INIT(NULL, 0);
+ char *dentry_name = NULL;
dout("readdir %p file %p pos %llx\n", inode, file, ctx->pos);
if (dfi->file_info.flags & CEPH_F_ATEND)
@@ -347,7 +346,7 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
err = fscrypt_prepare_readdir(inode);
if (err)
- goto out;
+ return err;
spin_lock(&ci->i_ceph_lock);
/* request Fx cap. if have Fx, we don't need to release Fs cap
@@ -369,13 +368,9 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
spin_unlock(&ci->i_ceph_lock);
}
- err = ceph_fname_alloc_buffer(inode, &tname);
- if (err < 0)
- goto out;
-
- err = ceph_fname_alloc_buffer(inode, &oname);
- if (err < 0)
- goto out;
+ dentry_name = kmalloc(NAME_MAX, GFP_KERNEL);
+ if (!dentry_name)
+ return -ENOMEM;
/* proceed with a normal readdir */
more:
@@ -528,31 +523,27 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
}
}
}
+
for (; i < rinfo->dir_nr; i++) {
struct ceph_mds_reply_dir_entry *rde = rinfo->dir_entries + i;
- struct ceph_fname fname = { .dir = inode,
- .name = rde->name,
- .name_len = rde->name_len,
- .ctext = rde->altname,
- .ctext_len = rde->altname_len };
- u32 olen = oname.len;
-
- err = ceph_fname_to_usr(&fname, &tname, &oname, NULL);
- if (err) {
- pr_err("%s unable to decode %.*s, got %d\n", __func__,
- rde->name_len, rde->name, err);
- goto out;
- }
+ struct dentry *dn = rde->dentry;
+ int name_len;
BUG_ON(rde->offset < ctx->pos);
BUG_ON(!rde->inode.in);
+ BUG_ON(!rde->dentry);
ctx->pos = rde->offset;
- dout("readdir (%d/%d) -> %llx '%.*s' %p\n",
- i, rinfo->dir_nr, ctx->pos,
- rde->name_len, rde->name, &rde->inode.in);
- if (!dir_emit(ctx, oname.name, oname.len,
+ spin_lock(&dn->d_lock);
+ memcpy(dentry_name, dn->d_name.name, dn->d_name.len);
+ name_len = dn->d_name.len;
+ spin_unlock(&dn->d_lock);
+
+ dout("readdir (%d/%d) -> %llx '%s' %p\n",
+ i, rinfo->dir_nr, ctx->pos, dentry_name, &rde->inode.in);
+
+ if (!dir_emit(ctx, dentry_name, name_len,
ceph_present_ino(inode->i_sb, le64_to_cpu(rde->inode.in->ino)),
le32_to_cpu(rde->inode.in->mode) >> 12)) {
/*
@@ -566,8 +557,6 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
goto out;
}
- /* Reset the lengths to their original allocated vals */
- oname.len = olen;
ctx->pos++;
}
@@ -625,8 +614,8 @@ static int ceph_readdir(struct file *file, struct dir_context *ctx)
err = 0;
dout("readdir %p file %p done.\n", inode, file);
out:
- ceph_fname_free_buffer(inode, &tname);
- ceph_fname_free_buffer(inode, &oname);
+ if (dentry_name)
+ kfree(dentry_name);
return err;
}
@@ -1902,6 +1902,8 @@ int ceph_readdir_prepopulate(struct ceph_mds_request *req,
.ctext = rde->altname,
.ctext_len = rde->altname_len };
+ WARN_ON_ONCE(rde->name_len > NAME_MAX);
+
err = ceph_fname_to_usr(&fname, &tname, &oname, &is_nokey);
if (err) {
pr_err("%s unable to decode %.*s, got %d\n", __func__,
@@ -1909,6 +1911,7 @@ int ceph_readdir_prepopulate(struct ceph_mds_request *req,
goto out;
}
+ rde->dentry = NULL;
dname.name = oname.name;
dname.len = oname.len;
dname.hash = full_name_hash(parent, dname.name, dname.len);
@@ -1969,6 +1972,12 @@ int ceph_readdir_prepopulate(struct ceph_mds_request *req,
goto retry_lookup;
}
+ /*
+ * ceph_readdir will use the dentry to get the name
+ * to avoid doing the dencrypt again there.
+ */
+ rde->dentry = dget(dn);
+
/* inode */
if (d_really_is_positive(dn)) {
in = d_inode(dn);
@@ -733,6 +733,7 @@ static void destroy_reply_info(struct ceph_mds_reply_info_parsed *info)
kfree(rde->inode.fscrypt_auth);
kfree(rde->inode.fscrypt_file);
+ dput(rde->dentry);
}
free_pages((unsigned long)info->dir_entries, get_order(info->dir_buf_size));
}
@@ -96,6 +96,7 @@ struct ceph_mds_reply_info_in {
};
struct ceph_mds_reply_dir_entry {
+ struct dentry *dentry;
char *name;
u8 *altname;
u32 name_len;