NFSv4: Recovery of recalled read delegations is broken
[deliverable/linux.git] / fs / f2fs / xattr.c
CommitLineData
0a8165d7 1/*
af48b85b
JK
2 * fs/f2fs/xattr.c
3 *
4 * Copyright (c) 2012 Samsung Electronics Co., Ltd.
5 * http://www.samsung.com/
6 *
7 * Portions of this code from linux/fs/ext2/xattr.c
8 *
9 * Copyright (C) 2001-2003 Andreas Gruenbacher <agruen@suse.de>
10 *
11 * Fix by Harrison Xing <harrison@mountainviewdata.com>.
12 * Extended attributes for symlinks and special files added per
13 * suggestion of Luka Renko <luka.renko@hermes.si>.
14 * xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>,
15 * Red Hat Inc.
16 *
17 * This program is free software; you can redistribute it and/or modify
18 * it under the terms of the GNU General Public License version 2 as
19 * published by the Free Software Foundation.
20 */
21#include <linux/rwsem.h>
22#include <linux/f2fs_fs.h>
8ae8f162 23#include <linux/security.h>
a6dda0e6 24#include <linux/posix_acl_xattr.h>
af48b85b
JK
25#include "f2fs.h"
26#include "xattr.h"
27
28static size_t f2fs_xattr_generic_list(struct dentry *dentry, char *list,
e1123268 29 size_t list_size, const char *name, size_t len, int type)
af48b85b
JK
30{
31 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
32 int total_len, prefix_len = 0;
33 const char *prefix = NULL;
34
35 switch (type) {
36 case F2FS_XATTR_INDEX_USER:
37 if (!test_opt(sbi, XATTR_USER))
38 return -EOPNOTSUPP;
39 prefix = XATTR_USER_PREFIX;
40 prefix_len = XATTR_USER_PREFIX_LEN;
41 break;
42 case F2FS_XATTR_INDEX_TRUSTED:
43 if (!capable(CAP_SYS_ADMIN))
44 return -EPERM;
45 prefix = XATTR_TRUSTED_PREFIX;
46 prefix_len = XATTR_TRUSTED_PREFIX_LEN;
47 break;
8ae8f162
JK
48 case F2FS_XATTR_INDEX_SECURITY:
49 prefix = XATTR_SECURITY_PREFIX;
50 prefix_len = XATTR_SECURITY_PREFIX_LEN;
51 break;
af48b85b
JK
52 default:
53 return -EINVAL;
54 }
55
e1123268 56 total_len = prefix_len + len + 1;
af48b85b
JK
57 if (list && total_len <= list_size) {
58 memcpy(list, prefix, prefix_len);
e1123268
JK
59 memcpy(list + prefix_len, name, len);
60 list[prefix_len + len] = '\0';
af48b85b
JK
61 }
62 return total_len;
63}
64
65static int f2fs_xattr_generic_get(struct dentry *dentry, const char *name,
66 void *buffer, size_t size, int type)
67{
68 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
69
70 switch (type) {
71 case F2FS_XATTR_INDEX_USER:
72 if (!test_opt(sbi, XATTR_USER))
73 return -EOPNOTSUPP;
74 break;
75 case F2FS_XATTR_INDEX_TRUSTED:
76 if (!capable(CAP_SYS_ADMIN))
77 return -EPERM;
78 break;
8ae8f162
JK
79 case F2FS_XATTR_INDEX_SECURITY:
80 break;
af48b85b
JK
81 default:
82 return -EINVAL;
83 }
84 if (strcmp(name, "") == 0)
85 return -EINVAL;
2b0143b5 86 return f2fs_getxattr(d_inode(dentry), type, name, buffer, size, NULL);
af48b85b
JK
87}
88
89static int f2fs_xattr_generic_set(struct dentry *dentry, const char *name,
90 const void *value, size_t size, int flags, int type)
91{
92 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
93
94 switch (type) {
95 case F2FS_XATTR_INDEX_USER:
96 if (!test_opt(sbi, XATTR_USER))
97 return -EOPNOTSUPP;
98 break;
99 case F2FS_XATTR_INDEX_TRUSTED:
100 if (!capable(CAP_SYS_ADMIN))
101 return -EPERM;
102 break;
8ae8f162
JK
103 case F2FS_XATTR_INDEX_SECURITY:
104 break;
af48b85b
JK
105 default:
106 return -EINVAL;
107 }
108 if (strcmp(name, "") == 0)
109 return -EINVAL;
110
2b0143b5 111 return f2fs_setxattr(d_inode(dentry), type, name,
c02745ef 112 value, size, NULL, flags);
af48b85b
JK
113}
114
573ea5fc 115static size_t f2fs_xattr_advise_list(struct dentry *dentry, char *list,
e1123268 116 size_t list_size, const char *name, size_t len, int type)
573ea5fc
JK
117{
118 const char *xname = F2FS_SYSTEM_ADVISE_PREFIX;
119 size_t size;
120
121 if (type != F2FS_XATTR_INDEX_ADVISE)
122 return 0;
123
124 size = strlen(xname) + 1;
125 if (list && size <= list_size)
126 memcpy(list, xname, size);
127 return size;
128}
129
130static int f2fs_xattr_advise_get(struct dentry *dentry, const char *name,
131 void *buffer, size_t size, int type)
132{
2b0143b5 133 struct inode *inode = d_inode(dentry);
573ea5fc
JK
134
135 if (strcmp(name, "") != 0)
136 return -EINVAL;
137
84e97c27
CY
138 if (buffer)
139 *((char *)buffer) = F2FS_I(inode)->i_advise;
573ea5fc
JK
140 return sizeof(char);
141}
142
143static int f2fs_xattr_advise_set(struct dentry *dentry, const char *name,
144 const void *value, size_t size, int flags, int type)
145{
2b0143b5 146 struct inode *inode = d_inode(dentry);
573ea5fc
JK
147
148 if (strcmp(name, "") != 0)
149 return -EINVAL;
150 if (!inode_owner_or_capable(inode))
151 return -EPERM;
152 if (value == NULL)
153 return -EINVAL;
154
155 F2FS_I(inode)->i_advise |= *(char *)value;
30c62fdb 156 mark_inode_dirty(inode);
573ea5fc
JK
157 return 0;
158}
159
8ae8f162
JK
160#ifdef CONFIG_F2FS_FS_SECURITY
161static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
162 void *page)
163{
164 const struct xattr *xattr;
165 int err = 0;
166
167 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
d631abda 168 err = f2fs_setxattr(inode, F2FS_XATTR_INDEX_SECURITY,
8ae8f162 169 xattr->name, xattr->value,
c02745ef 170 xattr->value_len, (struct page *)page, 0);
8ae8f162
JK
171 if (err < 0)
172 break;
173 }
174 return err;
175}
176
177int f2fs_init_security(struct inode *inode, struct inode *dir,
178 const struct qstr *qstr, struct page *ipage)
179{
180 return security_inode_init_security(inode, dir, qstr,
181 &f2fs_initxattrs, ipage);
182}
183#endif
184
af48b85b
JK
185const struct xattr_handler f2fs_xattr_user_handler = {
186 .prefix = XATTR_USER_PREFIX,
187 .flags = F2FS_XATTR_INDEX_USER,
188 .list = f2fs_xattr_generic_list,
189 .get = f2fs_xattr_generic_get,
190 .set = f2fs_xattr_generic_set,
191};
192
193const struct xattr_handler f2fs_xattr_trusted_handler = {
194 .prefix = XATTR_TRUSTED_PREFIX,
195 .flags = F2FS_XATTR_INDEX_TRUSTED,
196 .list = f2fs_xattr_generic_list,
197 .get = f2fs_xattr_generic_get,
198 .set = f2fs_xattr_generic_set,
199};
200
573ea5fc
JK
201const struct xattr_handler f2fs_xattr_advise_handler = {
202 .prefix = F2FS_SYSTEM_ADVISE_PREFIX,
203 .flags = F2FS_XATTR_INDEX_ADVISE,
204 .list = f2fs_xattr_advise_list,
205 .get = f2fs_xattr_advise_get,
206 .set = f2fs_xattr_advise_set,
207};
208
8ae8f162
JK
209const struct xattr_handler f2fs_xattr_security_handler = {
210 .prefix = XATTR_SECURITY_PREFIX,
211 .flags = F2FS_XATTR_INDEX_SECURITY,
212 .list = f2fs_xattr_generic_list,
213 .get = f2fs_xattr_generic_get,
214 .set = f2fs_xattr_generic_set,
215};
216
af48b85b
JK
217static const struct xattr_handler *f2fs_xattr_handler_map[] = {
218 [F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler,
219#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
220 [F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
221 [F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
af48b85b
JK
222#endif
223 [F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler,
8ae8f162
JK
224#ifdef CONFIG_F2FS_FS_SECURITY
225 [F2FS_XATTR_INDEX_SECURITY] = &f2fs_xattr_security_handler,
226#endif
af48b85b
JK
227 [F2FS_XATTR_INDEX_ADVISE] = &f2fs_xattr_advise_handler,
228};
229
230const struct xattr_handler *f2fs_xattr_handlers[] = {
231 &f2fs_xattr_user_handler,
232#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
233 &posix_acl_access_xattr_handler,
234 &posix_acl_default_xattr_handler,
af48b85b
JK
235#endif
236 &f2fs_xattr_trusted_handler,
8ae8f162
JK
237#ifdef CONFIG_F2FS_FS_SECURITY
238 &f2fs_xattr_security_handler,
239#endif
af48b85b
JK
240 &f2fs_xattr_advise_handler,
241 NULL,
242};
243
e1123268 244static inline const struct xattr_handler *f2fs_xattr_handler(int index)
af48b85b
JK
245{
246 const struct xattr_handler *handler = NULL;
247
e1123268
JK
248 if (index > 0 && index < ARRAY_SIZE(f2fs_xattr_handler_map))
249 handler = f2fs_xattr_handler_map[index];
af48b85b
JK
250 return handler;
251}
252
e1123268
JK
253static struct f2fs_xattr_entry *__find_xattr(void *base_addr, int index,
254 size_t len, const char *name)
dd9cfe23
JK
255{
256 struct f2fs_xattr_entry *entry;
257
258 list_for_each_xattr(entry, base_addr) {
e1123268 259 if (entry->e_name_index != index)
dd9cfe23 260 continue;
e1123268 261 if (entry->e_name_len != len)
dd9cfe23 262 continue;
e1123268 263 if (!memcmp(entry->e_name, name, len))
dd9cfe23
JK
264 break;
265 }
266 return entry;
267}
268
65985d93
JK
269static void *read_all_xattrs(struct inode *inode, struct page *ipage)
270{
4081363f 271 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
272 struct f2fs_xattr_header *header;
273 size_t size = PAGE_SIZE, inline_size = 0;
274 void *txattr_addr;
275
276 inline_size = inline_xattr_size(inode);
277
808a1d74 278 txattr_addr = kzalloc(inline_size + size, GFP_F2FS_ZERO);
65985d93
JK
279 if (!txattr_addr)
280 return NULL;
281
282 /* read from inline xattr */
283 if (inline_size) {
284 struct page *page = NULL;
285 void *inline_addr;
286
287 if (ipage) {
288 inline_addr = inline_xattr_addr(ipage);
289 } else {
290 page = get_node_page(sbi, inode->i_ino);
291 if (IS_ERR(page))
292 goto fail;
293 inline_addr = inline_xattr_addr(page);
294 }
295 memcpy(txattr_addr, inline_addr, inline_size);
296 f2fs_put_page(page, 1);
297 }
298
299 /* read from xattr node block */
300 if (F2FS_I(inode)->i_xattr_nid) {
301 struct page *xpage;
302 void *xattr_addr;
303
304 /* The inode already has an extended attribute block. */
305 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
306 if (IS_ERR(xpage))
307 goto fail;
308
309 xattr_addr = page_address(xpage);
310 memcpy(txattr_addr + inline_size, xattr_addr, PAGE_SIZE);
311 f2fs_put_page(xpage, 1);
312 }
313
314 header = XATTR_HDR(txattr_addr);
315
316 /* never been allocated xattrs */
317 if (le32_to_cpu(header->h_magic) != F2FS_XATTR_MAGIC) {
318 header->h_magic = cpu_to_le32(F2FS_XATTR_MAGIC);
319 header->h_refcount = cpu_to_le32(1);
320 }
321 return txattr_addr;
322fail:
323 kzfree(txattr_addr);
324 return NULL;
325}
326
327static inline int write_all_xattrs(struct inode *inode, __u32 hsize,
328 void *txattr_addr, struct page *ipage)
329{
4081363f 330 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
331 size_t inline_size = 0;
332 void *xattr_addr;
333 struct page *xpage;
334 nid_t new_nid = 0;
335 int err;
336
337 inline_size = inline_xattr_size(inode);
338
339 if (hsize > inline_size && !F2FS_I(inode)->i_xattr_nid)
340 if (!alloc_nid(sbi, &new_nid))
341 return -ENOSPC;
342
343 /* write to inline xattr */
344 if (inline_size) {
345 struct page *page = NULL;
346 void *inline_addr;
347
348 if (ipage) {
349 inline_addr = inline_xattr_addr(ipage);
54b591df 350 f2fs_wait_on_page_writeback(ipage, NODE);
65985d93
JK
351 } else {
352 page = get_node_page(sbi, inode->i_ino);
353 if (IS_ERR(page)) {
354 alloc_nid_failed(sbi, new_nid);
355 return PTR_ERR(page);
356 }
357 inline_addr = inline_xattr_addr(page);
54b591df 358 f2fs_wait_on_page_writeback(page, NODE);
65985d93
JK
359 }
360 memcpy(inline_addr, txattr_addr, inline_size);
361 f2fs_put_page(page, 1);
362
363 /* no need to use xattr node block */
364 if (hsize <= inline_size) {
365 err = truncate_xattr_node(inode, ipage);
366 alloc_nid_failed(sbi, new_nid);
367 return err;
368 }
369 }
370
371 /* write to xattr node block */
372 if (F2FS_I(inode)->i_xattr_nid) {
373 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
374 if (IS_ERR(xpage)) {
375 alloc_nid_failed(sbi, new_nid);
376 return PTR_ERR(xpage);
377 }
9850cf4a 378 f2fs_bug_on(sbi, new_nid);
54b591df 379 f2fs_wait_on_page_writeback(xpage, NODE);
65985d93
JK
380 } else {
381 struct dnode_of_data dn;
382 set_new_dnode(&dn, inode, NULL, NULL, new_nid);
383 xpage = new_node_page(&dn, XATTR_NODE_OFFSET, ipage);
384 if (IS_ERR(xpage)) {
385 alloc_nid_failed(sbi, new_nid);
386 return PTR_ERR(xpage);
387 }
388 alloc_nid_done(sbi, new_nid);
389 }
390
391 xattr_addr = page_address(xpage);
392 memcpy(xattr_addr, txattr_addr + inline_size, PAGE_SIZE -
393 sizeof(struct node_footer));
394 set_page_dirty(xpage);
395 f2fs_put_page(xpage, 1);
396
397 /* need to checkpoint during fsync */
398 F2FS_I(inode)->xattr_ver = cur_cp_version(F2FS_CKPT(sbi));
399 return 0;
400}
401
e1123268 402int f2fs_getxattr(struct inode *inode, int index, const char *name,
bce8d112 403 void *buffer, size_t buffer_size, struct page *ipage)
af48b85b 404{
af48b85b 405 struct f2fs_xattr_entry *entry;
65985d93 406 void *base_addr;
dd9cfe23 407 int error = 0;
e1123268 408 size_t size, len;
af48b85b
JK
409
410 if (name == NULL)
411 return -EINVAL;
e1123268
JK
412
413 len = strlen(name);
414 if (len > F2FS_NAME_LEN)
6e452d69 415 return -ERANGE;
af48b85b 416
bce8d112 417 base_addr = read_all_xattrs(inode, ipage);
65985d93
JK
418 if (!base_addr)
419 return -ENOMEM;
af48b85b 420
e1123268 421 entry = __find_xattr(base_addr, index, len, name);
dd9cfe23 422 if (IS_XATTR_LAST_ENTRY(entry)) {
af48b85b
JK
423 error = -ENODATA;
424 goto cleanup;
425 }
426
e1123268 427 size = le16_to_cpu(entry->e_value_size);
af48b85b 428
e1123268 429 if (buffer && size > buffer_size) {
af48b85b
JK
430 error = -ERANGE;
431 goto cleanup;
432 }
433
434 if (buffer) {
435 char *pval = entry->e_name + entry->e_name_len;
e1123268 436 memcpy(buffer, pval, size);
af48b85b 437 }
e1123268 438 error = size;
af48b85b
JK
439
440cleanup:
65985d93 441 kzfree(base_addr);
af48b85b
JK
442 return error;
443}
444
445ssize_t f2fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
446{
2b0143b5 447 struct inode *inode = d_inode(dentry);
af48b85b 448 struct f2fs_xattr_entry *entry;
af48b85b
JK
449 void *base_addr;
450 int error = 0;
451 size_t rest = buffer_size;
452
65985d93
JK
453 base_addr = read_all_xattrs(inode, NULL);
454 if (!base_addr)
455 return -ENOMEM;
af48b85b
JK
456
457 list_for_each_xattr(entry, base_addr) {
458 const struct xattr_handler *handler =
459 f2fs_xattr_handler(entry->e_name_index);
460 size_t size;
461
462 if (!handler)
463 continue;
464
465 size = handler->list(dentry, buffer, rest, entry->e_name,
466 entry->e_name_len, handler->flags);
467 if (buffer && size > rest) {
468 error = -ERANGE;
469 goto cleanup;
470 }
471
472 if (buffer)
473 buffer += size;
474 rest -= size;
475 }
476 error = buffer_size - rest;
477cleanup:
65985d93 478 kzfree(base_addr);
af48b85b
JK
479 return error;
480}
481
e1123268
JK
482static int __f2fs_setxattr(struct inode *inode, int index,
483 const char *name, const void *value, size_t size,
c02745ef 484 struct page *ipage, int flags)
af48b85b 485{
af48b85b 486 struct f2fs_inode_info *fi = F2FS_I(inode);
af48b85b 487 struct f2fs_xattr_entry *here, *last;
af48b85b 488 void *base_addr;
65985d93 489 int found, newsize;
e1123268 490 size_t len;
65985d93
JK
491 __u32 new_hsize;
492 int error = -ENOMEM;
af48b85b
JK
493
494 if (name == NULL)
495 return -EINVAL;
af48b85b
JK
496
497 if (value == NULL)
e1123268 498 size = 0;
af48b85b 499
e1123268 500 len = strlen(name);
7c909772 501
037fe70c 502 if (len > F2FS_NAME_LEN)
af48b85b
JK
503 return -ERANGE;
504
037fe70c
CY
505 if (size > MAX_VALUE_LEN(inode))
506 return -E2BIG;
507
65985d93
JK
508 base_addr = read_all_xattrs(inode, ipage);
509 if (!base_addr)
510 goto exit;
af48b85b
JK
511
512 /* find entry with wanted name. */
e1123268 513 here = __find_xattr(base_addr, index, len, name);
af48b85b 514
dd9cfe23 515 found = IS_XATTR_LAST_ENTRY(here) ? 0 : 1;
af48b85b 516
916decbf
JK
517 if ((flags & XATTR_REPLACE) && !found) {
518 error = -ENODATA;
519 goto exit;
520 } else if ((flags & XATTR_CREATE) && found) {
521 error = -EEXIST;
522 goto exit;
523 }
524
525 last = here;
af48b85b
JK
526 while (!IS_XATTR_LAST_ENTRY(last))
527 last = XATTR_NEXT_ENTRY(last);
528
e1123268 529 newsize = XATTR_ALIGN(sizeof(struct f2fs_xattr_entry) + len + size);
af48b85b
JK
530
531 /* 1. Check space */
532 if (value) {
65985d93
JK
533 int free;
534 /*
535 * If value is NULL, it is remove operation.
e1c42045 536 * In case of update operation, we calculate free.
af48b85b 537 */
65985d93 538 free = MIN_OFFSET(inode) - ((char *)last - (char *)base_addr);
af48b85b 539 if (found)
cc3de6a3 540 free = free + ENTRY_SIZE(here);
af48b85b 541
6bacf52f 542 if (unlikely(free < newsize)) {
af48b85b 543 error = -ENOSPC;
65985d93 544 goto exit;
af48b85b
JK
545 }
546 }
547
548 /* 2. Remove old entry */
549 if (found) {
65985d93
JK
550 /*
551 * If entry is found, remove old entry.
af48b85b
JK
552 * If not found, remove operation is not needed.
553 */
554 struct f2fs_xattr_entry *next = XATTR_NEXT_ENTRY(here);
555 int oldsize = ENTRY_SIZE(here);
556
557 memmove(here, next, (char *)last - (char *)next);
558 last = (struct f2fs_xattr_entry *)((char *)last - oldsize);
559 memset(last, 0, oldsize);
560 }
561
65985d93
JK
562 new_hsize = (char *)last - (char *)base_addr;
563
af48b85b
JK
564 /* 3. Write new entry */
565 if (value) {
65985d93
JK
566 char *pval;
567 /*
568 * Before we come here, old entry is removed.
569 * We just write new entry.
570 */
af48b85b 571 memset(last, 0, newsize);
e1123268
JK
572 last->e_name_index = index;
573 last->e_name_len = len;
574 memcpy(last->e_name, name, len);
575 pval = last->e_name + len;
576 memcpy(pval, value, size);
577 last->e_value_size = cpu_to_le16(size);
65985d93 578 new_hsize += newsize;
af48b85b
JK
579 }
580
65985d93
JK
581 error = write_all_xattrs(inode, new_hsize, base_addr, ipage);
582 if (error)
583 goto exit;
af48b85b
JK
584
585 if (is_inode_flag_set(fi, FI_ACL_MODE)) {
586 inode->i_mode = fi->i_acl_mode;
587 inode->i_ctime = CURRENT_TIME;
588 clear_inode_flag(fi, FI_ACL_MODE);
589 }
f424f664
JK
590 if (index == F2FS_XATTR_INDEX_ENCRYPTION &&
591 !strcmp(name, F2FS_XATTR_NAME_ENCRYPTION_CONTEXT))
592 f2fs_set_encrypted_inode(inode);
e518ff81 593
8ae8f162
JK
594 if (ipage)
595 update_inode(inode, ipage);
596 else
597 update_inode_page(inode);
7c909772 598exit:
65985d93 599 kzfree(base_addr);
af48b85b
JK
600 return error;
601}
52ab9560 602
e1123268
JK
603int f2fs_setxattr(struct inode *inode, int index, const char *name,
604 const void *value, size_t size,
c02745ef 605 struct page *ipage, int flags)
52ab9560 606{
4081363f 607 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
52ab9560
RK
608 int err;
609
d631abda
JK
610 /* this case is only from init_inode_metadata */
611 if (ipage)
612 return __f2fs_setxattr(inode, index, name, value,
613 size, ipage, flags);
52ab9560
RK
614 f2fs_balance_fs(sbi);
615
e479556b 616 f2fs_lock_op(sbi);
d928bfbf
JK
617 /* protect xattr_ver */
618 down_write(&F2FS_I(inode)->i_sem);
c02745ef 619 err = __f2fs_setxattr(inode, index, name, value, size, ipage, flags);
d928bfbf 620 up_write(&F2FS_I(inode)->i_sem);
e479556b 621 f2fs_unlock_op(sbi);
52ab9560
RK
622
623 return err;
624}
This page took 0.176323 seconds and 5 git commands to generate.