]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright 2000 by Hans Reiser, licensing governed by reiserfs/README | |
3 | */ | |
4 | ||
5 | /* | |
6 | * Written by Anatoly P. Pinchuk pap@namesys.botik.ru | |
7 | * Programm System Institute | |
8 | * Pereslavl-Zalessky Russia | |
9 | */ | |
10 | ||
1da177e4 LT |
11 | #include <linux/time.h> |
12 | #include <linux/string.h> | |
13 | #include <linux/pagemap.h> | |
2f8b5444 | 14 | #include <linux/bio.h> |
f466c6fd | 15 | #include "reiserfs.h" |
1da177e4 LT |
16 | #include <linux/buffer_head.h> |
17 | #include <linux/quotaops.h> | |
18 | ||
19 | /* Does the buffer contain a disk block which is in the tree. */ | |
ad31a4fc | 20 | inline int B_IS_IN_TREE(const struct buffer_head *bh) |
1da177e4 LT |
21 | { |
22 | ||
ad31a4fc JM |
23 | RFALSE(B_LEVEL(bh) > MAX_HEIGHT, |
24 | "PAP-1010: block (%b) has too big level (%z)", bh, bh); | |
1da177e4 | 25 | |
ad31a4fc | 26 | return (B_LEVEL(bh) != FREE_LEVEL); |
1da177e4 LT |
27 | } |
28 | ||
098297b2 | 29 | /* to get item head in le form */ |
d68caa95 JM |
30 | inline void copy_item_head(struct item_head *to, |
31 | const struct item_head *from) | |
1da177e4 | 32 | { |
d68caa95 | 33 | memcpy(to, from, IH_SIZE); |
1da177e4 LT |
34 | } |
35 | ||
098297b2 JM |
36 | /* |
37 | * k1 is pointer to on-disk structure which is stored in little-endian | |
38 | * form. k2 is pointer to cpu variable. For key of items of the same | |
39 | * object this returns 0. | |
40 | * Returns: -1 if key1 < key2 | |
41 | * 0 if key1 == key2 | |
42 | * 1 if key1 > key2 | |
43 | */ | |
bd4c625c LT |
44 | inline int comp_short_keys(const struct reiserfs_key *le_key, |
45 | const struct cpu_key *cpu_key) | |
1da177e4 | 46 | { |
bd4c625c LT |
47 | __u32 n; |
48 | n = le32_to_cpu(le_key->k_dir_id); | |
49 | if (n < cpu_key->on_disk_key.k_dir_id) | |
50 | return -1; | |
51 | if (n > cpu_key->on_disk_key.k_dir_id) | |
52 | return 1; | |
53 | n = le32_to_cpu(le_key->k_objectid); | |
54 | if (n < cpu_key->on_disk_key.k_objectid) | |
55 | return -1; | |
56 | if (n > cpu_key->on_disk_key.k_objectid) | |
57 | return 1; | |
58 | return 0; | |
1da177e4 LT |
59 | } |
60 | ||
098297b2 JM |
61 | /* |
62 | * k1 is pointer to on-disk structure which is stored in little-endian | |
63 | * form. k2 is pointer to cpu variable. | |
64 | * Compare keys using all 4 key fields. | |
65 | * Returns: -1 if key1 < key2 0 | |
66 | * if key1 = key2 1 if key1 > key2 | |
67 | */ | |
bd4c625c LT |
68 | static inline int comp_keys(const struct reiserfs_key *le_key, |
69 | const struct cpu_key *cpu_key) | |
1da177e4 | 70 | { |
bd4c625c LT |
71 | int retval; |
72 | ||
73 | retval = comp_short_keys(le_key, cpu_key); | |
74 | if (retval) | |
75 | return retval; | |
76 | if (le_key_k_offset(le_key_version(le_key), le_key) < | |
77 | cpu_key_k_offset(cpu_key)) | |
78 | return -1; | |
79 | if (le_key_k_offset(le_key_version(le_key), le_key) > | |
80 | cpu_key_k_offset(cpu_key)) | |
81 | return 1; | |
82 | ||
83 | if (cpu_key->key_length == 3) | |
84 | return 0; | |
85 | ||
86 | /* this part is needed only when tail conversion is in progress */ | |
87 | if (le_key_k_type(le_key_version(le_key), le_key) < | |
88 | cpu_key_k_type(cpu_key)) | |
89 | return -1; | |
90 | ||
91 | if (le_key_k_type(le_key_version(le_key), le_key) > | |
92 | cpu_key_k_type(cpu_key)) | |
93 | return 1; | |
1da177e4 | 94 | |
bd4c625c | 95 | return 0; |
1da177e4 LT |
96 | } |
97 | ||
bd4c625c LT |
98 | inline int comp_short_le_keys(const struct reiserfs_key *key1, |
99 | const struct reiserfs_key *key2) | |
1da177e4 | 100 | { |
d68caa95 | 101 | __u32 *k1_u32, *k2_u32; |
ee93961b | 102 | int key_length = REISERFS_SHORT_KEY_LEN; |
bd4c625c | 103 | |
d68caa95 JM |
104 | k1_u32 = (__u32 *) key1; |
105 | k2_u32 = (__u32 *) key2; | |
ee93961b | 106 | for (; key_length--; ++k1_u32, ++k2_u32) { |
d68caa95 | 107 | if (le32_to_cpu(*k1_u32) < le32_to_cpu(*k2_u32)) |
bd4c625c | 108 | return -1; |
d68caa95 | 109 | if (le32_to_cpu(*k1_u32) > le32_to_cpu(*k2_u32)) |
bd4c625c LT |
110 | return 1; |
111 | } | |
112 | return 0; | |
1da177e4 LT |
113 | } |
114 | ||
bd4c625c | 115 | inline void le_key2cpu_key(struct cpu_key *to, const struct reiserfs_key *from) |
1da177e4 | 116 | { |
bd4c625c LT |
117 | int version; |
118 | to->on_disk_key.k_dir_id = le32_to_cpu(from->k_dir_id); | |
119 | to->on_disk_key.k_objectid = le32_to_cpu(from->k_objectid); | |
120 | ||
098297b2 | 121 | /* find out version of the key */ |
bd4c625c LT |
122 | version = le_key_version(from); |
123 | to->version = version; | |
124 | to->on_disk_key.k_offset = le_key_k_offset(version, from); | |
125 | to->on_disk_key.k_type = le_key_k_type(version, from); | |
1da177e4 LT |
126 | } |
127 | ||
098297b2 JM |
128 | /* |
129 | * this does not say which one is bigger, it only returns 1 if keys | |
130 | * are not equal, 0 otherwise | |
131 | */ | |
bd4c625c LT |
132 | inline int comp_le_keys(const struct reiserfs_key *k1, |
133 | const struct reiserfs_key *k2) | |
1da177e4 | 134 | { |
bd4c625c | 135 | return memcmp(k1, k2, sizeof(struct reiserfs_key)); |
1da177e4 LT |
136 | } |
137 | ||
138 | /************************************************************************** | |
139 | * Binary search toolkit function * | |
140 | * Search for an item in the array by the item key * | |
141 | * Returns: 1 if found, 0 if not found; * | |
d68caa95 JM |
142 | * *pos = number of the searched element if found, else the * |
143 | * number of the first element that is larger than key. * | |
1da177e4 | 144 | **************************************************************************/ |
098297b2 JM |
145 | /* |
146 | * For those not familiar with binary search: lbound is the leftmost item | |
147 | * that it could be, rbound the rightmost item that it could be. We examine | |
148 | * the item halfway between lbound and rbound, and that tells us either | |
149 | * that we can increase lbound, or decrease rbound, or that we have found it, | |
150 | * or if lbound <= rbound that there are no possible items, and we have not | |
151 | * found it. With each examination we cut the number of possible items it | |
152 | * could be by one more than half rounded down, or we find it. | |
153 | */ | |
d68caa95 JM |
154 | static inline int bin_search(const void *key, /* Key to search for. */ |
155 | const void *base, /* First item in the array. */ | |
156 | int num, /* Number of items in the array. */ | |
098297b2 JM |
157 | /* |
158 | * Item size in the array. searched. Lest the | |
159 | * reader be confused, note that this is crafted | |
160 | * as a general function, and when it is applied | |
161 | * specifically to the array of item headers in a | |
162 | * node, width is actually the item header size | |
163 | * not the item size. | |
164 | */ | |
165 | int width, | |
d68caa95 | 166 | int *pos /* Number of the searched for element. */ |
bd4c625c LT |
167 | ) |
168 | { | |
ee93961b | 169 | int rbound, lbound, j; |
bd4c625c | 170 | |
ee93961b JM |
171 | for (j = ((rbound = num - 1) + (lbound = 0)) / 2; |
172 | lbound <= rbound; j = (rbound + lbound) / 2) | |
bd4c625c | 173 | switch (comp_keys |
ee93961b | 174 | ((struct reiserfs_key *)((char *)base + j * width), |
d68caa95 | 175 | (struct cpu_key *)key)) { |
bd4c625c | 176 | case -1: |
ee93961b | 177 | lbound = j + 1; |
bd4c625c LT |
178 | continue; |
179 | case 1: | |
ee93961b | 180 | rbound = j - 1; |
bd4c625c LT |
181 | continue; |
182 | case 0: | |
ee93961b | 183 | *pos = j; |
bd4c625c LT |
184 | return ITEM_FOUND; /* Key found in the array. */ |
185 | } | |
186 | ||
098297b2 JM |
187 | /* |
188 | * bin_search did not find given key, it returns position of key, | |
189 | * that is minimal and greater than the given one. | |
190 | */ | |
ee93961b | 191 | *pos = lbound; |
bd4c625c | 192 | return ITEM_NOT_FOUND; |
1da177e4 LT |
193 | } |
194 | ||
1da177e4 | 195 | |
1da177e4 | 196 | /* Minimal possible key. It is never in the tree. */ |
bd4c625c | 197 | const struct reiserfs_key MIN_KEY = { 0, 0, {{0, 0},} }; |
1da177e4 LT |
198 | |
199 | /* Maximal possible key. It is never in the tree. */ | |
bd4c625c | 200 | static const struct reiserfs_key MAX_KEY = { |
afd54c68 FF |
201 | cpu_to_le32(0xffffffff), |
202 | cpu_to_le32(0xffffffff), | |
203 | {{cpu_to_le32(0xffffffff), | |
204 | cpu_to_le32(0xffffffff)},} | |
3e8962be | 205 | }; |
1da177e4 | 206 | |
098297b2 JM |
207 | /* |
208 | * Get delimiting key of the buffer by looking for it in the buffers in the | |
209 | * path, starting from the bottom of the path, and going upwards. We must | |
210 | * check the path's validity at each step. If the key is not in the path, | |
211 | * there is no delimiting key in the tree (buffer is first or last buffer | |
212 | * in tree), and in this case we return a special key, either MIN_KEY or | |
213 | * MAX_KEY. | |
214 | */ | |
ee93961b JM |
215 | static inline const struct reiserfs_key *get_lkey(const struct treepath *chk_path, |
216 | const struct super_block *sb) | |
bd4c625c | 217 | { |
ee93961b | 218 | int position, path_offset = chk_path->path_length; |
d68caa95 | 219 | struct buffer_head *parent; |
bd4c625c | 220 | |
ee93961b | 221 | RFALSE(path_offset < FIRST_PATH_ELEMENT_OFFSET, |
bd4c625c LT |
222 | "PAP-5010: invalid offset in the path"); |
223 | ||
224 | /* While not higher in path than first element. */ | |
ee93961b | 225 | while (path_offset-- > FIRST_PATH_ELEMENT_OFFSET) { |
bd4c625c LT |
226 | |
227 | RFALSE(!buffer_uptodate | |
ee93961b | 228 | (PATH_OFFSET_PBUFFER(chk_path, path_offset)), |
bd4c625c LT |
229 | "PAP-5020: parent is not uptodate"); |
230 | ||
231 | /* Parent at the path is not in the tree now. */ | |
232 | if (!B_IS_IN_TREE | |
d68caa95 | 233 | (parent = |
ee93961b | 234 | PATH_OFFSET_PBUFFER(chk_path, path_offset))) |
bd4c625c LT |
235 | return &MAX_KEY; |
236 | /* Check whether position in the parent is correct. */ | |
ee93961b | 237 | if ((position = |
d68caa95 | 238 | PATH_OFFSET_POSITION(chk_path, |
ee93961b | 239 | path_offset)) > |
d68caa95 | 240 | B_NR_ITEMS(parent)) |
bd4c625c LT |
241 | return &MAX_KEY; |
242 | /* Check whether parent at the path really points to the child. */ | |
ee93961b | 243 | if (B_N_CHILD_NUM(parent, position) != |
d68caa95 | 244 | PATH_OFFSET_PBUFFER(chk_path, |
ee93961b | 245 | path_offset + 1)->b_blocknr) |
bd4c625c | 246 | return &MAX_KEY; |
098297b2 JM |
247 | /* |
248 | * Return delimiting key if position in the parent | |
249 | * is not equal to zero. | |
250 | */ | |
ee93961b | 251 | if (position) |
4cf5f7ad | 252 | return internal_key(parent, position - 1); |
bd4c625c LT |
253 | } |
254 | /* Return MIN_KEY if we are in the root of the buffer tree. */ | |
d68caa95 | 255 | if (PATH_OFFSET_PBUFFER(chk_path, FIRST_PATH_ELEMENT_OFFSET)-> |
a9dd3643 | 256 | b_blocknr == SB_ROOT_BLOCK(sb)) |
bd4c625c LT |
257 | return &MIN_KEY; |
258 | return &MAX_KEY; | |
1da177e4 LT |
259 | } |
260 | ||
1da177e4 | 261 | /* Get delimiting key of the buffer at the path and its right neighbor. */ |
d68caa95 | 262 | inline const struct reiserfs_key *get_rkey(const struct treepath *chk_path, |
a9dd3643 | 263 | const struct super_block *sb) |
bd4c625c | 264 | { |
ee93961b | 265 | int position, path_offset = chk_path->path_length; |
d68caa95 | 266 | struct buffer_head *parent; |
bd4c625c | 267 | |
ee93961b | 268 | RFALSE(path_offset < FIRST_PATH_ELEMENT_OFFSET, |
bd4c625c LT |
269 | "PAP-5030: invalid offset in the path"); |
270 | ||
ee93961b | 271 | while (path_offset-- > FIRST_PATH_ELEMENT_OFFSET) { |
bd4c625c LT |
272 | |
273 | RFALSE(!buffer_uptodate | |
ee93961b | 274 | (PATH_OFFSET_PBUFFER(chk_path, path_offset)), |
bd4c625c LT |
275 | "PAP-5040: parent is not uptodate"); |
276 | ||
277 | /* Parent at the path is not in the tree now. */ | |
278 | if (!B_IS_IN_TREE | |
d68caa95 | 279 | (parent = |
ee93961b | 280 | PATH_OFFSET_PBUFFER(chk_path, path_offset))) |
bd4c625c LT |
281 | return &MIN_KEY; |
282 | /* Check whether position in the parent is correct. */ | |
ee93961b | 283 | if ((position = |
d68caa95 | 284 | PATH_OFFSET_POSITION(chk_path, |
ee93961b | 285 | path_offset)) > |
d68caa95 | 286 | B_NR_ITEMS(parent)) |
bd4c625c | 287 | return &MIN_KEY; |
098297b2 JM |
288 | /* |
289 | * Check whether parent at the path really points | |
290 | * to the child. | |
291 | */ | |
ee93961b | 292 | if (B_N_CHILD_NUM(parent, position) != |
d68caa95 | 293 | PATH_OFFSET_PBUFFER(chk_path, |
ee93961b | 294 | path_offset + 1)->b_blocknr) |
bd4c625c | 295 | return &MIN_KEY; |
098297b2 JM |
296 | |
297 | /* | |
298 | * Return delimiting key if position in the parent | |
299 | * is not the last one. | |
300 | */ | |
ee93961b | 301 | if (position != B_NR_ITEMS(parent)) |
4cf5f7ad | 302 | return internal_key(parent, position); |
bd4c625c | 303 | } |
098297b2 | 304 | |
bd4c625c | 305 | /* Return MAX_KEY if we are in the root of the buffer tree. */ |
d68caa95 | 306 | if (PATH_OFFSET_PBUFFER(chk_path, FIRST_PATH_ELEMENT_OFFSET)-> |
a9dd3643 | 307 | b_blocknr == SB_ROOT_BLOCK(sb)) |
bd4c625c LT |
308 | return &MAX_KEY; |
309 | return &MIN_KEY; | |
1da177e4 LT |
310 | } |
311 | ||
098297b2 JM |
312 | /* |
313 | * Check whether a key is contained in the tree rooted from a buffer at a path. | |
314 | * This works by looking at the left and right delimiting keys for the buffer | |
315 | * in the last path_element in the path. These delimiting keys are stored | |
316 | * at least one level above that buffer in the tree. If the buffer is the | |
317 | * first or last node in the tree order then one of the delimiting keys may | |
318 | * be absent, and in this case get_lkey and get_rkey return a special key | |
319 | * which is MIN_KEY or MAX_KEY. | |
320 | */ | |
321 | static inline int key_in_buffer( | |
322 | /* Path which should be checked. */ | |
323 | struct treepath *chk_path, | |
324 | /* Key which should be checked. */ | |
325 | const struct cpu_key *key, | |
d68caa95 | 326 | struct super_block *sb |
bd4c625c LT |
327 | ) |
328 | { | |
1da177e4 | 329 | |
d68caa95 JM |
330 | RFALSE(!key || chk_path->path_length < FIRST_PATH_ELEMENT_OFFSET |
331 | || chk_path->path_length > MAX_HEIGHT, | |
bd4c625c | 332 | "PAP-5050: pointer to the key(%p) is NULL or invalid path length(%d)", |
d68caa95 JM |
333 | key, chk_path->path_length); |
334 | RFALSE(!PATH_PLAST_BUFFER(chk_path)->b_bdev, | |
bd4c625c LT |
335 | "PAP-5060: device must not be NODEV"); |
336 | ||
d68caa95 | 337 | if (comp_keys(get_lkey(chk_path, sb), key) == 1) |
bd4c625c LT |
338 | /* left delimiting key is bigger, that the key we look for */ |
339 | return 0; | |
d68caa95 JM |
340 | /* if ( comp_keys(key, get_rkey(chk_path, sb)) != -1 ) */ |
341 | if (comp_keys(get_rkey(chk_path, sb), key) != 1) | |
342 | /* key must be less than right delimitiing key */ | |
bd4c625c LT |
343 | return 0; |
344 | return 1; | |
1da177e4 LT |
345 | } |
346 | ||
fec6d055 | 347 | int reiserfs_check_path(struct treepath *p) |
bd4c625c LT |
348 | { |
349 | RFALSE(p->path_length != ILLEGAL_PATH_ELEMENT_OFFSET, | |
350 | "path not properly relsed"); | |
351 | return 0; | |
352 | } | |
1da177e4 | 353 | |
098297b2 JM |
354 | /* |
355 | * Drop the reference to each buffer in a path and restore | |
3cd6dbe6 | 356 | * dirty bits clean when preparing the buffer for the log. |
098297b2 JM |
357 | * This version should only be called from fix_nodes() |
358 | */ | |
3cd6dbe6 | 359 | void pathrelse_and_restore(struct super_block *sb, |
d68caa95 | 360 | struct treepath *search_path) |
bd4c625c | 361 | { |
ee93961b | 362 | int path_offset = search_path->path_length; |
bd4c625c | 363 | |
ee93961b | 364 | RFALSE(path_offset < ILLEGAL_PATH_ELEMENT_OFFSET, |
bd4c625c LT |
365 | "clm-4000: invalid path offset"); |
366 | ||
ee93961b | 367 | while (path_offset > ILLEGAL_PATH_ELEMENT_OFFSET) { |
3cd6dbe6 | 368 | struct buffer_head *bh; |
ee93961b | 369 | bh = PATH_OFFSET_PBUFFER(search_path, path_offset--); |
3cd6dbe6 JM |
370 | reiserfs_restore_prepared_buffer(sb, bh); |
371 | brelse(bh); | |
bd4c625c | 372 | } |
d68caa95 | 373 | search_path->path_length = ILLEGAL_PATH_ELEMENT_OFFSET; |
1da177e4 LT |
374 | } |
375 | ||
3cd6dbe6 | 376 | /* Drop the reference to each buffer in a path */ |
d68caa95 | 377 | void pathrelse(struct treepath *search_path) |
bd4c625c | 378 | { |
ee93961b | 379 | int path_offset = search_path->path_length; |
1da177e4 | 380 | |
ee93961b | 381 | RFALSE(path_offset < ILLEGAL_PATH_ELEMENT_OFFSET, |
bd4c625c | 382 | "PAP-5090: invalid path offset"); |
1da177e4 | 383 | |
ee93961b JM |
384 | while (path_offset > ILLEGAL_PATH_ELEMENT_OFFSET) |
385 | brelse(PATH_OFFSET_PBUFFER(search_path, path_offset--)); | |
1da177e4 | 386 | |
d68caa95 | 387 | search_path->path_length = ILLEGAL_PATH_ELEMENT_OFFSET; |
bd4c625c | 388 | } |
1da177e4 | 389 | |
13d25750 SC |
390 | static int has_valid_deh_location(struct buffer_head *bh, struct item_head *ih) |
391 | { | |
392 | struct reiserfs_de_head *deh; | |
393 | int i; | |
394 | ||
395 | deh = B_I_DEH(bh, ih); | |
396 | for (i = 0; i < ih_entry_count(ih); i++) { | |
397 | if (deh_location(&deh[i]) > ih_item_len(ih)) { | |
398 | reiserfs_warning(NULL, "reiserfs-5094", | |
399 | "directory entry location seems wrong %h", | |
400 | &deh[i]); | |
401 | return 0; | |
402 | } | |
403 | } | |
404 | ||
405 | return 1; | |
406 | } | |
407 | ||
bd4c625c LT |
408 | static int is_leaf(char *buf, int blocksize, struct buffer_head *bh) |
409 | { | |
410 | struct block_head *blkh; | |
411 | struct item_head *ih; | |
412 | int used_space; | |
413 | int prev_location; | |
414 | int i; | |
415 | int nr; | |
416 | ||
417 | blkh = (struct block_head *)buf; | |
418 | if (blkh_level(blkh) != DISK_LEAF_NODE_LEVEL) { | |
45b03d5e JM |
419 | reiserfs_warning(NULL, "reiserfs-5080", |
420 | "this should be caught earlier"); | |
bd4c625c | 421 | return 0; |
1da177e4 | 422 | } |
bd4c625c LT |
423 | |
424 | nr = blkh_nr_item(blkh); | |
425 | if (nr < 1 || nr > ((blocksize - BLKH_SIZE) / (IH_SIZE + MIN_ITEM_LEN))) { | |
426 | /* item number is too big or too small */ | |
45b03d5e JM |
427 | reiserfs_warning(NULL, "reiserfs-5081", |
428 | "nr_item seems wrong: %z", bh); | |
bd4c625c | 429 | return 0; |
1da177e4 | 430 | } |
bd4c625c LT |
431 | ih = (struct item_head *)(buf + BLKH_SIZE) + nr - 1; |
432 | used_space = BLKH_SIZE + IH_SIZE * nr + (blocksize - ih_location(ih)); | |
098297b2 JM |
433 | |
434 | /* free space does not match to calculated amount of use space */ | |
bd4c625c | 435 | if (used_space != blocksize - blkh_free_space(blkh)) { |
45b03d5e JM |
436 | reiserfs_warning(NULL, "reiserfs-5082", |
437 | "free space seems wrong: %z", bh); | |
bd4c625c | 438 | return 0; |
1da177e4 | 439 | } |
098297b2 JM |
440 | /* |
441 | * FIXME: it is_leaf will hit performance too much - we may have | |
442 | * return 1 here | |
443 | */ | |
bd4c625c LT |
444 | |
445 | /* check tables of item heads */ | |
446 | ih = (struct item_head *)(buf + BLKH_SIZE); | |
447 | prev_location = blocksize; | |
448 | for (i = 0; i < nr; i++, ih++) { | |
449 | if (le_ih_k_type(ih) == TYPE_ANY) { | |
45b03d5e JM |
450 | reiserfs_warning(NULL, "reiserfs-5083", |
451 | "wrong item type for item %h", | |
bd4c625c LT |
452 | ih); |
453 | return 0; | |
454 | } | |
455 | if (ih_location(ih) >= blocksize | |
456 | || ih_location(ih) < IH_SIZE * nr) { | |
45b03d5e JM |
457 | reiserfs_warning(NULL, "reiserfs-5084", |
458 | "item location seems wrong: %h", | |
bd4c625c LT |
459 | ih); |
460 | return 0; | |
461 | } | |
462 | if (ih_item_len(ih) < 1 | |
463 | || ih_item_len(ih) > MAX_ITEM_LEN(blocksize)) { | |
45b03d5e JM |
464 | reiserfs_warning(NULL, "reiserfs-5085", |
465 | "item length seems wrong: %h", | |
bd4c625c LT |
466 | ih); |
467 | return 0; | |
468 | } | |
469 | if (prev_location - ih_location(ih) != ih_item_len(ih)) { | |
45b03d5e JM |
470 | reiserfs_warning(NULL, "reiserfs-5086", |
471 | "item location seems wrong " | |
472 | "(second one): %h", ih); | |
bd4c625c LT |
473 | return 0; |
474 | } | |
13d25750 SC |
475 | if (is_direntry_le_ih(ih)) { |
476 | if (ih_item_len(ih) < (ih_entry_count(ih) * IH_SIZE)) { | |
477 | reiserfs_warning(NULL, "reiserfs-5093", | |
478 | "item entry count seems wrong %h", | |
479 | ih); | |
480 | return 0; | |
481 | } | |
482 | return has_valid_deh_location(bh, ih); | |
d24396c5 | 483 | } |
bd4c625c | 484 | prev_location = ih_location(ih); |
1da177e4 | 485 | } |
1da177e4 | 486 | |
098297b2 | 487 | /* one may imagine many more checks */ |
bd4c625c | 488 | return 1; |
1da177e4 LT |
489 | } |
490 | ||
1da177e4 | 491 | /* returns 1 if buf looks like an internal node, 0 otherwise */ |
bd4c625c | 492 | static int is_internal(char *buf, int blocksize, struct buffer_head *bh) |
1da177e4 | 493 | { |
bd4c625c LT |
494 | struct block_head *blkh; |
495 | int nr; | |
496 | int used_space; | |
497 | ||
498 | blkh = (struct block_head *)buf; | |
499 | nr = blkh_level(blkh); | |
500 | if (nr <= DISK_LEAF_NODE_LEVEL || nr > MAX_HEIGHT) { | |
501 | /* this level is not possible for internal nodes */ | |
45b03d5e JM |
502 | reiserfs_warning(NULL, "reiserfs-5087", |
503 | "this should be caught earlier"); | |
bd4c625c LT |
504 | return 0; |
505 | } | |
1da177e4 | 506 | |
bd4c625c | 507 | nr = blkh_nr_item(blkh); |
098297b2 | 508 | /* for internal which is not root we might check min number of keys */ |
bd4c625c | 509 | if (nr > (blocksize - BLKH_SIZE - DC_SIZE) / (KEY_SIZE + DC_SIZE)) { |
45b03d5e JM |
510 | reiserfs_warning(NULL, "reiserfs-5088", |
511 | "number of key seems wrong: %z", bh); | |
bd4c625c LT |
512 | return 0; |
513 | } | |
1da177e4 | 514 | |
bd4c625c LT |
515 | used_space = BLKH_SIZE + KEY_SIZE * nr + DC_SIZE * (nr + 1); |
516 | if (used_space != blocksize - blkh_free_space(blkh)) { | |
45b03d5e JM |
517 | reiserfs_warning(NULL, "reiserfs-5089", |
518 | "free space seems wrong: %z", bh); | |
bd4c625c LT |
519 | return 0; |
520 | } | |
098297b2 JM |
521 | |
522 | /* one may imagine many more checks */ | |
bd4c625c | 523 | return 1; |
1da177e4 LT |
524 | } |
525 | ||
098297b2 JM |
526 | /* |
527 | * make sure that bh contains formatted node of reiserfs tree of | |
528 | * 'level'-th level | |
529 | */ | |
bd4c625c | 530 | static int is_tree_node(struct buffer_head *bh, int level) |
1da177e4 | 531 | { |
bd4c625c | 532 | if (B_LEVEL(bh) != level) { |
45b03d5e JM |
533 | reiserfs_warning(NULL, "reiserfs-5090", "node level %d does " |
534 | "not match to the expected one %d", | |
bd4c625c LT |
535 | B_LEVEL(bh), level); |
536 | return 0; | |
537 | } | |
538 | if (level == DISK_LEAF_NODE_LEVEL) | |
539 | return is_leaf(bh->b_data, bh->b_size, bh); | |
1da177e4 | 540 | |
bd4c625c | 541 | return is_internal(bh->b_data, bh->b_size, bh); |
1da177e4 LT |
542 | } |
543 | ||
1da177e4 LT |
544 | #define SEARCH_BY_KEY_READA 16 |
545 | ||
2ac62695 FW |
546 | /* |
547 | * The function is NOT SCHEDULE-SAFE! | |
548 | * It might unlock the write lock if we needed to wait for a block | |
549 | * to be read. Note that in this case it won't recover the lock to avoid | |
550 | * high contention resulting from too much lock requests, especially | |
551 | * the caller (search_by_key) will perform other schedule-unsafe | |
552 | * operations just after calling this function. | |
553 | * | |
278f6679 | 554 | * @return depth of lock to be restored after read completes |
2ac62695 | 555 | */ |
278f6679 | 556 | static int search_by_key_reada(struct super_block *s, |
bd4c625c | 557 | struct buffer_head **bh, |
3ee16670 | 558 | b_blocknr_t *b, int num) |
1da177e4 | 559 | { |
bd4c625c | 560 | int i, j; |
278f6679 | 561 | int depth = -1; |
bd4c625c LT |
562 | |
563 | for (i = 0; i < num; i++) { | |
564 | bh[i] = sb_getblk(s, b[i]); | |
565 | } | |
09eb47a7 FW |
566 | /* |
567 | * We are going to read some blocks on which we | |
568 | * have a reference. It's safe, though we might be | |
569 | * reading blocks concurrently changed if we release | |
570 | * the lock. But it's still fine because we check later | |
571 | * if the tree changed | |
572 | */ | |
bd4c625c LT |
573 | for (j = 0; j < i; j++) { |
574 | /* | |
575 | * note, this needs attention if we are getting rid of the BKL | |
098297b2 JM |
576 | * you have to make sure the prepared bit isn't set on this |
577 | * buffer | |
bd4c625c | 578 | */ |
2ac62695 | 579 | if (!buffer_uptodate(bh[j])) { |
278f6679 JM |
580 | if (depth == -1) |
581 | depth = reiserfs_write_unlock_nested(s); | |
70246286 | 582 | ll_rw_block(REQ_OP_READ, REQ_RAHEAD, 1, bh + j); |
2ac62695 | 583 | } |
bd4c625c LT |
584 | brelse(bh[j]); |
585 | } | |
278f6679 | 586 | return depth; |
1da177e4 LT |
587 | } |
588 | ||
098297b2 JM |
589 | /* |
590 | * This function fills up the path from the root to the leaf as it | |
591 | * descends the tree looking for the key. It uses reiserfs_bread to | |
592 | * try to find buffers in the cache given their block number. If it | |
593 | * does not find them in the cache it reads them from disk. For each | |
594 | * node search_by_key finds using reiserfs_bread it then uses | |
595 | * bin_search to look through that node. bin_search will find the | |
596 | * position of the block_number of the next node if it is looking | |
597 | * through an internal node. If it is looking through a leaf node | |
598 | * bin_search will find the position of the item which has key either | |
599 | * equal to given key, or which is the maximal key less than the given | |
600 | * key. search_by_key returns a path that must be checked for the | |
601 | * correctness of the top of the path but need not be checked for the | |
602 | * correctness of the bottom of the path | |
603 | */ | |
604 | /* | |
605 | * search_by_key - search for key (and item) in stree | |
606 | * @sb: superblock | |
607 | * @key: pointer to key to search for | |
608 | * @search_path: Allocated and initialized struct treepath; Returned filled | |
609 | * on success. | |
610 | * @stop_level: How far down the tree to search, Use DISK_LEAF_NODE_LEVEL to | |
611 | * stop at leaf level. | |
612 | * | |
613 | * The function is NOT SCHEDULE-SAFE! | |
614 | */ | |
615 | int search_by_key(struct super_block *sb, const struct cpu_key *key, | |
616 | struct treepath *search_path, int stop_level) | |
bd4c625c | 617 | { |
ee93961b | 618 | b_blocknr_t block_number; |
bd4c625c | 619 | int expected_level; |
ad31a4fc | 620 | struct buffer_head *bh; |
d68caa95 | 621 | struct path_element *last_element; |
ee93961b | 622 | int node_level, retval; |
bd4c625c LT |
623 | int fs_gen; |
624 | struct buffer_head *reada_bh[SEARCH_BY_KEY_READA]; | |
3ee16670 | 625 | b_blocknr_t reada_blocks[SEARCH_BY_KEY_READA]; |
bd4c625c | 626 | int reada_count = 0; |
1da177e4 LT |
627 | |
628 | #ifdef CONFIG_REISERFS_CHECK | |
ee93961b | 629 | int repeat_counter = 0; |
1da177e4 | 630 | #endif |
1da177e4 | 631 | |
a9dd3643 | 632 | PROC_INFO_INC(sb, search_by_key); |
bd4c625c | 633 | |
098297b2 JM |
634 | /* |
635 | * As we add each node to a path we increase its count. This means | |
636 | * that we must be careful to release all nodes in a path before we | |
637 | * either discard the path struct or re-use the path struct, as we | |
638 | * do here. | |
639 | */ | |
1da177e4 | 640 | |
d68caa95 | 641 | pathrelse(search_path); |
1da177e4 | 642 | |
098297b2 JM |
643 | /* |
644 | * With each iteration of this loop we search through the items in the | |
645 | * current node, and calculate the next current node(next path element) | |
646 | * for the next iteration of this loop.. | |
647 | */ | |
ee93961b | 648 | block_number = SB_ROOT_BLOCK(sb); |
bd4c625c LT |
649 | expected_level = -1; |
650 | while (1) { | |
1da177e4 LT |
651 | |
652 | #ifdef CONFIG_REISERFS_CHECK | |
ee93961b | 653 | if (!(++repeat_counter % 50000)) |
a9dd3643 | 654 | reiserfs_warning(sb, "PAP-5100", |
45b03d5e JM |
655 | "%s: there were %d iterations of " |
656 | "while loop looking for key %K", | |
ee93961b | 657 | current->comm, repeat_counter, |
d68caa95 | 658 | key); |
1da177e4 LT |
659 | #endif |
660 | ||
bd4c625c | 661 | /* prep path to have another element added to it. */ |
d68caa95 JM |
662 | last_element = |
663 | PATH_OFFSET_PELEMENT(search_path, | |
664 | ++search_path->path_length); | |
a9dd3643 | 665 | fs_gen = get_generation(sb); |
bd4c625c | 666 | |
098297b2 JM |
667 | /* |
668 | * Read the next tree node, and set the last element | |
669 | * in the path to have a pointer to it. | |
670 | */ | |
d68caa95 | 671 | if ((bh = last_element->pe_buffer = |
ee93961b | 672 | sb_getblk(sb, block_number))) { |
2ac62695 | 673 | |
2ac62695 | 674 | /* |
278f6679 JM |
675 | * We'll need to drop the lock if we encounter any |
676 | * buffers that need to be read. If all of them are | |
677 | * already up to date, we don't need to drop the lock. | |
2ac62695 | 678 | */ |
278f6679 JM |
679 | int depth = -1; |
680 | ||
681 | if (!buffer_uptodate(bh) && reada_count > 1) | |
682 | depth = search_by_key_reada(sb, reada_bh, | |
683 | reada_blocks, reada_count); | |
684 | ||
685 | if (!buffer_uptodate(bh) && depth == -1) | |
686 | depth = reiserfs_write_unlock_nested(sb); | |
687 | ||
dfec8a14 | 688 | ll_rw_block(REQ_OP_READ, 0, 1, &bh); |
ad31a4fc | 689 | wait_on_buffer(bh); |
2ac62695 | 690 | |
278f6679 JM |
691 | if (depth != -1) |
692 | reiserfs_write_lock_nested(sb, depth); | |
ad31a4fc | 693 | if (!buffer_uptodate(bh)) |
bd4c625c LT |
694 | goto io_error; |
695 | } else { | |
cf776a7a | 696 | io_error: |
d68caa95 JM |
697 | search_path->path_length--; |
698 | pathrelse(search_path); | |
bd4c625c LT |
699 | return IO_ERROR; |
700 | } | |
701 | reada_count = 0; | |
702 | if (expected_level == -1) | |
a9dd3643 | 703 | expected_level = SB_TREE_HEIGHT(sb); |
bd4c625c LT |
704 | expected_level--; |
705 | ||
098297b2 JM |
706 | /* |
707 | * It is possible that schedule occurred. We must check | |
708 | * whether the key to search is still in the tree rooted | |
709 | * from the current buffer. If not then repeat search | |
710 | * from the root. | |
711 | */ | |
a9dd3643 | 712 | if (fs_changed(fs_gen, sb) && |
ad31a4fc JM |
713 | (!B_IS_IN_TREE(bh) || |
714 | B_LEVEL(bh) != expected_level || | |
d68caa95 | 715 | !key_in_buffer(search_path, key, sb))) { |
a9dd3643 JM |
716 | PROC_INFO_INC(sb, search_by_key_fs_changed); |
717 | PROC_INFO_INC(sb, search_by_key_restarted); | |
718 | PROC_INFO_INC(sb, | |
bd4c625c | 719 | sbk_restarted[expected_level - 1]); |
d68caa95 | 720 | pathrelse(search_path); |
bd4c625c | 721 | |
098297b2 JM |
722 | /* |
723 | * Get the root block number so that we can | |
724 | * repeat the search starting from the root. | |
725 | */ | |
ee93961b | 726 | block_number = SB_ROOT_BLOCK(sb); |
bd4c625c | 727 | expected_level = -1; |
bd4c625c LT |
728 | |
729 | /* repeat search from the root */ | |
730 | continue; | |
731 | } | |
1da177e4 | 732 | |
098297b2 JM |
733 | /* |
734 | * only check that the key is in the buffer if key is not | |
735 | * equal to the MAX_KEY. Latter case is only possible in | |
736 | * "finish_unfinished()" processing during mount. | |
737 | */ | |
d68caa95 JM |
738 | RFALSE(comp_keys(&MAX_KEY, key) && |
739 | !key_in_buffer(search_path, key, sb), | |
bd4c625c | 740 | "PAP-5130: key is not in the buffer"); |
1da177e4 | 741 | #ifdef CONFIG_REISERFS_CHECK |
08f14fc8 | 742 | if (REISERFS_SB(sb)->cur_tb) { |
bd4c625c | 743 | print_cur_tb("5140"); |
a9dd3643 | 744 | reiserfs_panic(sb, "PAP-5140", |
c3a9c210 | 745 | "schedule occurred in do_balance!"); |
bd4c625c | 746 | } |
1da177e4 LT |
747 | #endif |
748 | ||
098297b2 JM |
749 | /* |
750 | * make sure, that the node contents look like a node of | |
751 | * certain level | |
752 | */ | |
ad31a4fc | 753 | if (!is_tree_node(bh, expected_level)) { |
a9dd3643 | 754 | reiserfs_error(sb, "vs-5150", |
0030b645 | 755 | "invalid format found in block %ld. " |
ad31a4fc | 756 | "Fsck?", bh->b_blocknr); |
d68caa95 | 757 | pathrelse(search_path); |
bd4c625c LT |
758 | return IO_ERROR; |
759 | } | |
1da177e4 | 760 | |
bd4c625c | 761 | /* ok, we have acquired next formatted node in the tree */ |
ee93961b | 762 | node_level = B_LEVEL(bh); |
1da177e4 | 763 | |
ee93961b | 764 | PROC_INFO_BH_STAT(sb, bh, node_level - 1); |
1da177e4 | 765 | |
ee93961b | 766 | RFALSE(node_level < stop_level, |
bd4c625c | 767 | "vs-5152: tree level (%d) is less than stop level (%d)", |
ee93961b | 768 | node_level, stop_level); |
1da177e4 | 769 | |
4cf5f7ad | 770 | retval = bin_search(key, item_head(bh, 0), |
ad31a4fc | 771 | B_NR_ITEMS(bh), |
ee93961b | 772 | (node_level == |
bd4c625c LT |
773 | DISK_LEAF_NODE_LEVEL) ? IH_SIZE : |
774 | KEY_SIZE, | |
a228bf8f | 775 | &last_element->pe_position); |
ee93961b JM |
776 | if (node_level == stop_level) { |
777 | return retval; | |
bd4c625c | 778 | } |
1da177e4 | 779 | |
bd4c625c | 780 | /* we are not in the stop level */ |
098297b2 JM |
781 | /* |
782 | * item has been found, so we choose the pointer which | |
783 | * is to the right of the found one | |
784 | */ | |
ee93961b | 785 | if (retval == ITEM_FOUND) |
d68caa95 | 786 | last_element->pe_position++; |
bd4c625c | 787 | |
098297b2 JM |
788 | /* |
789 | * if item was not found we choose the position which is to | |
790 | * the left of the found item. This requires no code, | |
791 | * bin_search did it already. | |
792 | */ | |
bd4c625c | 793 | |
098297b2 JM |
794 | /* |
795 | * So we have chosen a position in the current node which is | |
796 | * an internal node. Now we calculate child block number by | |
797 | * position in the node. | |
798 | */ | |
ee93961b | 799 | block_number = |
d68caa95 | 800 | B_N_CHILD_NUM(bh, last_element->pe_position); |
bd4c625c | 801 | |
098297b2 JM |
802 | /* |
803 | * if we are going to read leaf nodes, try for read | |
804 | * ahead as well | |
805 | */ | |
d68caa95 | 806 | if ((search_path->reada & PATH_READA) && |
ee93961b | 807 | node_level == DISK_LEAF_NODE_LEVEL + 1) { |
d68caa95 | 808 | int pos = last_element->pe_position; |
ad31a4fc | 809 | int limit = B_NR_ITEMS(bh); |
bd4c625c LT |
810 | struct reiserfs_key *le_key; |
811 | ||
d68caa95 | 812 | if (search_path->reada & PATH_READA_BACK) |
bd4c625c LT |
813 | limit = 0; |
814 | while (reada_count < SEARCH_BY_KEY_READA) { | |
815 | if (pos == limit) | |
816 | break; | |
817 | reada_blocks[reada_count++] = | |
ad31a4fc | 818 | B_N_CHILD_NUM(bh, pos); |
d68caa95 | 819 | if (search_path->reada & PATH_READA_BACK) |
bd4c625c LT |
820 | pos--; |
821 | else | |
822 | pos++; | |
823 | ||
824 | /* | |
825 | * check to make sure we're in the same object | |
826 | */ | |
4cf5f7ad | 827 | le_key = internal_key(bh, pos); |
bd4c625c | 828 | if (le32_to_cpu(le_key->k_objectid) != |
d68caa95 | 829 | key->on_disk_key.k_objectid) { |
bd4c625c LT |
830 | break; |
831 | } | |
832 | } | |
1da177e4 | 833 | } |
bd4c625c | 834 | } |
1da177e4 LT |
835 | } |
836 | ||
098297b2 JM |
837 | /* |
838 | * Form the path to an item and position in this item which contains | |
839 | * file byte defined by key. If there is no such item | |
840 | * corresponding to the key, we point the path to the item with | |
841 | * maximal key less than key, and *pos_in_item is set to one | |
842 | * past the last entry/byte in the item. If searching for entry in a | |
843 | * directory item, and it is not found, *pos_in_item is set to one | |
844 | * entry more than the entry with maximal key which is less than the | |
845 | * sought key. | |
846 | * | |
847 | * Note that if there is no entry in this same node which is one more, | |
848 | * then we point to an imaginary entry. for direct items, the | |
849 | * position is in units of bytes, for indirect items the position is | |
850 | * in units of blocknr entries, for directory items the position is in | |
851 | * units of directory entries. | |
852 | */ | |
1da177e4 | 853 | /* The function is NOT SCHEDULE-SAFE! */ |
098297b2 JM |
854 | int search_for_position_by_key(struct super_block *sb, |
855 | /* Key to search (cpu variable) */ | |
856 | const struct cpu_key *p_cpu_key, | |
857 | /* Filled up by this function. */ | |
858 | struct treepath *search_path) | |
bd4c625c LT |
859 | { |
860 | struct item_head *p_le_ih; /* pointer to on-disk structure */ | |
ee93961b | 861 | int blk_size; |
bd4c625c LT |
862 | loff_t item_offset, offset; |
863 | struct reiserfs_dir_entry de; | |
864 | int retval; | |
865 | ||
866 | /* If searching for directory entry. */ | |
867 | if (is_direntry_cpu_key(p_cpu_key)) | |
d68caa95 | 868 | return search_by_entry_key(sb, p_cpu_key, search_path, |
bd4c625c LT |
869 | &de); |
870 | ||
871 | /* If not searching for directory entry. */ | |
872 | ||
873 | /* If item is found. */ | |
d68caa95 | 874 | retval = search_item(sb, p_cpu_key, search_path); |
bd4c625c LT |
875 | if (retval == IO_ERROR) |
876 | return retval; | |
877 | if (retval == ITEM_FOUND) { | |
1da177e4 | 878 | |
bd4c625c | 879 | RFALSE(!ih_item_len |
4cf5f7ad | 880 | (item_head |
d68caa95 JM |
881 | (PATH_PLAST_BUFFER(search_path), |
882 | PATH_LAST_POSITION(search_path))), | |
bd4c625c | 883 | "PAP-5165: item length equals zero"); |
1da177e4 | 884 | |
d68caa95 | 885 | pos_in_item(search_path) = 0; |
bd4c625c LT |
886 | return POSITION_FOUND; |
887 | } | |
1da177e4 | 888 | |
d68caa95 | 889 | RFALSE(!PATH_LAST_POSITION(search_path), |
bd4c625c | 890 | "PAP-5170: position equals zero"); |
1da177e4 | 891 | |
bd4c625c LT |
892 | /* Item is not found. Set path to the previous item. */ |
893 | p_le_ih = | |
4cf5f7ad | 894 | item_head(PATH_PLAST_BUFFER(search_path), |
d68caa95 | 895 | --PATH_LAST_POSITION(search_path)); |
ee93961b | 896 | blk_size = sb->s_blocksize; |
1da177e4 | 897 | |
a228bf8f | 898 | if (comp_short_keys(&p_le_ih->ih_key, p_cpu_key)) |
bd4c625c | 899 | return FILE_NOT_FOUND; |
098297b2 JM |
900 | |
901 | /* FIXME: quite ugly this far */ | |
1da177e4 | 902 | |
bd4c625c LT |
903 | item_offset = le_ih_k_offset(p_le_ih); |
904 | offset = cpu_key_k_offset(p_cpu_key); | |
1da177e4 | 905 | |
bd4c625c LT |
906 | /* Needed byte is contained in the item pointed to by the path. */ |
907 | if (item_offset <= offset && | |
ee93961b | 908 | item_offset + op_bytes_number(p_le_ih, blk_size) > offset) { |
d68caa95 | 909 | pos_in_item(search_path) = offset - item_offset; |
bd4c625c | 910 | if (is_indirect_le_ih(p_le_ih)) { |
ee93961b | 911 | pos_in_item(search_path) /= blk_size; |
bd4c625c LT |
912 | } |
913 | return POSITION_FOUND; | |
1da177e4 | 914 | } |
1da177e4 | 915 | |
098297b2 JM |
916 | /* |
917 | * Needed byte is not contained in the item pointed to by the | |
918 | * path. Set pos_in_item out of the item. | |
919 | */ | |
bd4c625c | 920 | if (is_indirect_le_ih(p_le_ih)) |
d68caa95 | 921 | pos_in_item(search_path) = |
bd4c625c LT |
922 | ih_item_len(p_le_ih) / UNFM_P_SIZE; |
923 | else | |
d68caa95 | 924 | pos_in_item(search_path) = ih_item_len(p_le_ih); |
bd4c625c LT |
925 | |
926 | return POSITION_NOT_FOUND; | |
927 | } | |
1da177e4 LT |
928 | |
929 | /* Compare given item and item pointed to by the path. */ | |
d68caa95 | 930 | int comp_items(const struct item_head *stored_ih, const struct treepath *path) |
1da177e4 | 931 | { |
d68caa95 | 932 | struct buffer_head *bh = PATH_PLAST_BUFFER(path); |
bd4c625c | 933 | struct item_head *ih; |
1da177e4 | 934 | |
bd4c625c | 935 | /* Last buffer at the path is not in the tree. */ |
ad31a4fc | 936 | if (!B_IS_IN_TREE(bh)) |
bd4c625c | 937 | return 1; |
1da177e4 | 938 | |
bd4c625c | 939 | /* Last path position is invalid. */ |
d68caa95 | 940 | if (PATH_LAST_POSITION(path) >= B_NR_ITEMS(bh)) |
bd4c625c | 941 | return 1; |
1da177e4 | 942 | |
bd4c625c | 943 | /* we need only to know, whether it is the same item */ |
4cf5f7ad | 944 | ih = tp_item_head(path); |
bd4c625c | 945 | return memcmp(stored_ih, ih, IH_SIZE); |
1da177e4 LT |
946 | } |
947 | ||
098297b2 | 948 | /* prepare for delete or cut of direct item */ |
fec6d055 | 949 | static inline int prepare_for_direct_item(struct treepath *path, |
bd4c625c LT |
950 | struct item_head *le_ih, |
951 | struct inode *inode, | |
952 | loff_t new_file_length, int *cut_size) | |
1da177e4 | 953 | { |
bd4c625c LT |
954 | loff_t round_len; |
955 | ||
956 | if (new_file_length == max_reiserfs_offset(inode)) { | |
957 | /* item has to be deleted */ | |
958 | *cut_size = -(IH_SIZE + ih_item_len(le_ih)); | |
959 | return M_DELETE; | |
960 | } | |
098297b2 | 961 | /* new file gets truncated */ |
bd4c625c | 962 | if (get_inode_item_key_version(inode) == KEY_FORMAT_3_6) { |
bd4c625c | 963 | round_len = ROUND_UP(new_file_length); |
ee93961b | 964 | /* this was new_file_length < le_ih ... */ |
bd4c625c LT |
965 | if (round_len < le_ih_k_offset(le_ih)) { |
966 | *cut_size = -(IH_SIZE + ih_item_len(le_ih)); | |
967 | return M_DELETE; /* Delete this item. */ | |
968 | } | |
969 | /* Calculate first position and size for cutting from item. */ | |
970 | pos_in_item(path) = round_len - (le_ih_k_offset(le_ih) - 1); | |
971 | *cut_size = -(ih_item_len(le_ih) - pos_in_item(path)); | |
972 | ||
973 | return M_CUT; /* Cut from this item. */ | |
974 | } | |
975 | ||
098297b2 | 976 | /* old file: items may have any length */ |
bd4c625c LT |
977 | |
978 | if (new_file_length < le_ih_k_offset(le_ih)) { | |
979 | *cut_size = -(IH_SIZE + ih_item_len(le_ih)); | |
980 | return M_DELETE; /* Delete this item. */ | |
1da177e4 | 981 | } |
098297b2 | 982 | |
1da177e4 | 983 | /* Calculate first position and size for cutting from item. */ |
bd4c625c LT |
984 | *cut_size = -(ih_item_len(le_ih) - |
985 | (pos_in_item(path) = | |
986 | new_file_length + 1 - le_ih_k_offset(le_ih))); | |
987 | return M_CUT; /* Cut from this item. */ | |
1da177e4 LT |
988 | } |
989 | ||
fec6d055 | 990 | static inline int prepare_for_direntry_item(struct treepath *path, |
bd4c625c LT |
991 | struct item_head *le_ih, |
992 | struct inode *inode, | |
993 | loff_t new_file_length, | |
994 | int *cut_size) | |
1da177e4 | 995 | { |
bd4c625c LT |
996 | if (le_ih_k_offset(le_ih) == DOT_OFFSET && |
997 | new_file_length == max_reiserfs_offset(inode)) { | |
998 | RFALSE(ih_entry_count(le_ih) != 2, | |
999 | "PAP-5220: incorrect empty directory item (%h)", le_ih); | |
1000 | *cut_size = -(IH_SIZE + ih_item_len(le_ih)); | |
098297b2 JM |
1001 | /* Delete the directory item containing "." and ".." entry. */ |
1002 | return M_DELETE; | |
bd4c625c | 1003 | } |
1da177e4 | 1004 | |
bd4c625c | 1005 | if (ih_entry_count(le_ih) == 1) { |
098297b2 JM |
1006 | /* |
1007 | * Delete the directory item such as there is one record only | |
1008 | * in this item | |
1009 | */ | |
bd4c625c LT |
1010 | *cut_size = -(IH_SIZE + ih_item_len(le_ih)); |
1011 | return M_DELETE; | |
1012 | } | |
1013 | ||
1014 | /* Cut one record from the directory item. */ | |
1015 | *cut_size = | |
1016 | -(DEH_SIZE + | |
1017 | entry_length(get_last_bh(path), le_ih, pos_in_item(path))); | |
1018 | return M_CUT; | |
1019 | } | |
1da177e4 | 1020 | |
23f9e0f8 AZ |
1021 | #define JOURNAL_FOR_FREE_BLOCK_AND_UPDATE_SD (2 * JOURNAL_PER_BALANCE_CNT + 1) |
1022 | ||
098297b2 JM |
1023 | /* |
1024 | * If the path points to a directory or direct item, calculate mode | |
1025 | * and the size cut, for balance. | |
1026 | * If the path points to an indirect item, remove some number of its | |
1027 | * unformatted nodes. | |
1028 | * In case of file truncate calculate whether this item must be | |
1029 | * deleted/truncated or last unformatted node of this item will be | |
1030 | * converted to a direct item. | |
1031 | * This function returns a determination of what balance mode the | |
1032 | * calling function should employ. | |
1033 | */ | |
1034 | static char prepare_for_delete_or_cut(struct reiserfs_transaction_handle *th, | |
1035 | struct inode *inode, | |
1036 | struct treepath *path, | |
1037 | const struct cpu_key *item_key, | |
1038 | /* | |
1039 | * Number of unformatted nodes | |
1040 | * which were removed from end | |
1041 | * of the file. | |
1042 | */ | |
1043 | int *removed, | |
1044 | int *cut_size, | |
1045 | /* MAX_KEY_OFFSET in case of delete. */ | |
1046 | unsigned long long new_file_length | |
bd4c625c LT |
1047 | ) |
1048 | { | |
a9dd3643 | 1049 | struct super_block *sb = inode->i_sb; |
4cf5f7ad | 1050 | struct item_head *p_le_ih = tp_item_head(path); |
d68caa95 | 1051 | struct buffer_head *bh = PATH_PLAST_BUFFER(path); |
1da177e4 | 1052 | |
bd4c625c | 1053 | BUG_ON(!th->t_trans_id); |
1da177e4 | 1054 | |
bd4c625c LT |
1055 | /* Stat_data item. */ |
1056 | if (is_statdata_le_ih(p_le_ih)) { | |
1da177e4 | 1057 | |
ee93961b | 1058 | RFALSE(new_file_length != max_reiserfs_offset(inode), |
bd4c625c | 1059 | "PAP-5210: mode must be M_DELETE"); |
1da177e4 | 1060 | |
d68caa95 | 1061 | *cut_size = -(IH_SIZE + ih_item_len(p_le_ih)); |
bd4c625c LT |
1062 | return M_DELETE; |
1063 | } | |
1da177e4 | 1064 | |
bd4c625c LT |
1065 | /* Directory item. */ |
1066 | if (is_direntry_le_ih(p_le_ih)) | |
d68caa95 | 1067 | return prepare_for_direntry_item(path, p_le_ih, inode, |
ee93961b | 1068 | new_file_length, |
d68caa95 | 1069 | cut_size); |
1da177e4 | 1070 | |
bd4c625c LT |
1071 | /* Direct item. */ |
1072 | if (is_direct_le_ih(p_le_ih)) | |
d68caa95 | 1073 | return prepare_for_direct_item(path, p_le_ih, inode, |
ee93961b | 1074 | new_file_length, cut_size); |
bd4c625c LT |
1075 | |
1076 | /* Case of an indirect item. */ | |
1077 | { | |
a9dd3643 | 1078 | int blk_size = sb->s_blocksize; |
23f9e0f8 AZ |
1079 | struct item_head s_ih; |
1080 | int need_re_search; | |
1081 | int delete = 0; | |
1082 | int result = M_CUT; | |
1083 | int pos = 0; | |
1084 | ||
ee93961b | 1085 | if ( new_file_length == max_reiserfs_offset (inode) ) { |
098297b2 JM |
1086 | /* |
1087 | * prepare_for_delete_or_cut() is called by | |
1088 | * reiserfs_delete_item() | |
1089 | */ | |
ee93961b | 1090 | new_file_length = 0; |
23f9e0f8 AZ |
1091 | delete = 1; |
1092 | } | |
1093 | ||
1094 | do { | |
1095 | need_re_search = 0; | |
d68caa95 JM |
1096 | *cut_size = 0; |
1097 | bh = PATH_PLAST_BUFFER(path); | |
4cf5f7ad | 1098 | copy_item_head(&s_ih, tp_item_head(path)); |
23f9e0f8 | 1099 | pos = I_UNFM_NUM(&s_ih); |
bd4c625c | 1100 | |
ee93961b | 1101 | while (le_ih_k_offset (&s_ih) + (pos - 1) * blk_size > new_file_length) { |
87588dd6 AV |
1102 | __le32 *unfm; |
1103 | __u32 block; | |
bd4c625c | 1104 | |
098297b2 JM |
1105 | /* |
1106 | * Each unformatted block deletion may involve | |
1107 | * one additional bitmap block into the transaction, | |
1108 | * thereby the initial journal space reservation | |
1109 | * might not be enough. | |
1110 | */ | |
d68caa95 JM |
1111 | if (!delete && (*cut_size) != 0 && |
1112 | reiserfs_transaction_free_space(th) < JOURNAL_FOR_FREE_BLOCK_AND_UPDATE_SD) | |
23f9e0f8 | 1113 | break; |
bd4c625c | 1114 | |
4cf5f7ad | 1115 | unfm = (__le32 *)ih_item_body(bh, &s_ih) + pos - 1; |
23f9e0f8 | 1116 | block = get_block_num(unfm, 0); |
bd4c625c | 1117 | |
23f9e0f8 | 1118 | if (block != 0) { |
ad31a4fc | 1119 | reiserfs_prepare_for_journal(sb, bh, 1); |
23f9e0f8 | 1120 | put_block_num(unfm, 0, 0); |
09f1b80b | 1121 | journal_mark_dirty(th, bh); |
23f9e0f8 AZ |
1122 | reiserfs_free_block(th, inode, block, 1); |
1123 | } | |
bd4c625c | 1124 | |
278f6679 | 1125 | reiserfs_cond_resched(sb); |
bd4c625c | 1126 | |
d68caa95 | 1127 | if (item_moved (&s_ih, path)) { |
23f9e0f8 AZ |
1128 | need_re_search = 1; |
1129 | break; | |
1130 | } | |
1131 | ||
1132 | pos --; | |
d68caa95 JM |
1133 | (*removed)++; |
1134 | (*cut_size) -= UNFM_P_SIZE; | |
23f9e0f8 AZ |
1135 | |
1136 | if (pos == 0) { | |
d68caa95 | 1137 | (*cut_size) -= IH_SIZE; |
23f9e0f8 AZ |
1138 | result = M_DELETE; |
1139 | break; | |
1140 | } | |
1141 | } | |
098297b2 JM |
1142 | /* |
1143 | * a trick. If the buffer has been logged, this will | |
1144 | * do nothing. If we've broken the loop without logging | |
1145 | * it, it will restore the buffer | |
1146 | */ | |
ad31a4fc | 1147 | reiserfs_restore_prepared_buffer(sb, bh); |
23f9e0f8 | 1148 | } while (need_re_search && |
d68caa95 JM |
1149 | search_for_position_by_key(sb, item_key, path) == POSITION_FOUND); |
1150 | pos_in_item(path) = pos * UNFM_P_SIZE; | |
23f9e0f8 | 1151 | |
d68caa95 | 1152 | if (*cut_size == 0) { |
098297b2 JM |
1153 | /* |
1154 | * Nothing was cut. maybe convert last unformatted node to the | |
1155 | * direct item? | |
1156 | */ | |
23f9e0f8 AZ |
1157 | result = M_CONVERT; |
1158 | } | |
1159 | return result; | |
bd4c625c | 1160 | } |
1da177e4 LT |
1161 | } |
1162 | ||
1163 | /* Calculate number of bytes which will be deleted or cut during balance */ | |
ee93961b | 1164 | static int calc_deleted_bytes_number(struct tree_balance *tb, char mode) |
bd4c625c | 1165 | { |
ee93961b | 1166 | int del_size; |
4cf5f7ad | 1167 | struct item_head *p_le_ih = tp_item_head(tb->tb_path); |
bd4c625c LT |
1168 | |
1169 | if (is_statdata_le_ih(p_le_ih)) | |
1170 | return 0; | |
1171 | ||
ee93961b JM |
1172 | del_size = |
1173 | (mode == | |
a063ae17 | 1174 | M_DELETE) ? ih_item_len(p_le_ih) : -tb->insert_size[0]; |
bd4c625c | 1175 | if (is_direntry_le_ih(p_le_ih)) { |
098297b2 JM |
1176 | /* |
1177 | * return EMPTY_DIR_SIZE; We delete emty directories only. | |
1178 | * we can't use EMPTY_DIR_SIZE, as old format dirs have a | |
1179 | * different empty size. ick. FIXME, is this right? | |
1180 | */ | |
ee93961b | 1181 | return del_size; |
bd4c625c | 1182 | } |
1da177e4 | 1183 | |
bd4c625c | 1184 | if (is_indirect_le_ih(p_le_ih)) |
ee93961b | 1185 | del_size = (del_size / UNFM_P_SIZE) * |
a063ae17 | 1186 | (PATH_PLAST_BUFFER(tb->tb_path)->b_size); |
ee93961b | 1187 | return del_size; |
1da177e4 LT |
1188 | } |
1189 | ||
bd4c625c | 1190 | static void init_tb_struct(struct reiserfs_transaction_handle *th, |
a063ae17 | 1191 | struct tree_balance *tb, |
a9dd3643 | 1192 | struct super_block *sb, |
ee93961b | 1193 | struct treepath *path, int size) |
bd4c625c | 1194 | { |
1da177e4 | 1195 | |
bd4c625c | 1196 | BUG_ON(!th->t_trans_id); |
1da177e4 | 1197 | |
a063ae17 JM |
1198 | memset(tb, '\0', sizeof(struct tree_balance)); |
1199 | tb->transaction_handle = th; | |
1200 | tb->tb_sb = sb; | |
d68caa95 JM |
1201 | tb->tb_path = path; |
1202 | PATH_OFFSET_PBUFFER(path, ILLEGAL_PATH_ELEMENT_OFFSET) = NULL; | |
1203 | PATH_OFFSET_POSITION(path, ILLEGAL_PATH_ELEMENT_OFFSET) = 0; | |
ee93961b | 1204 | tb->insert_size[0] = size; |
bd4c625c | 1205 | } |
1da177e4 | 1206 | |
bd4c625c | 1207 | void padd_item(char *item, int total_length, int length) |
1da177e4 | 1208 | { |
bd4c625c | 1209 | int i; |
1da177e4 | 1210 | |
bd4c625c LT |
1211 | for (i = total_length; i > length;) |
1212 | item[--i] = 0; | |
1da177e4 LT |
1213 | } |
1214 | ||
1215 | #ifdef REISERQUOTA_DEBUG | |
1216 | char key2type(struct reiserfs_key *ih) | |
1217 | { | |
bd4c625c LT |
1218 | if (is_direntry_le_key(2, ih)) |
1219 | return 'd'; | |
1220 | if (is_direct_le_key(2, ih)) | |
1221 | return 'D'; | |
1222 | if (is_indirect_le_key(2, ih)) | |
1223 | return 'i'; | |
1224 | if (is_statdata_le_key(2, ih)) | |
1225 | return 's'; | |
1226 | return 'u'; | |
1da177e4 LT |
1227 | } |
1228 | ||
1229 | char head2type(struct item_head *ih) | |
1230 | { | |
bd4c625c LT |
1231 | if (is_direntry_le_ih(ih)) |
1232 | return 'd'; | |
1233 | if (is_direct_le_ih(ih)) | |
1234 | return 'D'; | |
1235 | if (is_indirect_le_ih(ih)) | |
1236 | return 'i'; | |
1237 | if (is_statdata_le_ih(ih)) | |
1238 | return 's'; | |
1239 | return 'u'; | |
1da177e4 LT |
1240 | } |
1241 | #endif | |
1242 | ||
098297b2 JM |
1243 | /* |
1244 | * Delete object item. | |
d68caa95 JM |
1245 | * th - active transaction handle |
1246 | * path - path to the deleted item | |
1247 | * item_key - key to search for the deleted item | |
1248 | * indode - used for updating i_blocks and quotas | |
1249 | * un_bh - NULL or unformatted node pointer | |
1250 | */ | |
1251 | int reiserfs_delete_item(struct reiserfs_transaction_handle *th, | |
1252 | struct treepath *path, const struct cpu_key *item_key, | |
1253 | struct inode *inode, struct buffer_head *un_bh) | |
1254 | { | |
995c762e | 1255 | struct super_block *sb = inode->i_sb; |
bd4c625c LT |
1256 | struct tree_balance s_del_balance; |
1257 | struct item_head s_ih; | |
1258 | struct item_head *q_ih; | |
1259 | int quota_cut_bytes; | |
ee93961b | 1260 | int ret_value, del_size, removed; |
d2d0395f | 1261 | int depth; |
1da177e4 LT |
1262 | |
1263 | #ifdef CONFIG_REISERFS_CHECK | |
ee93961b JM |
1264 | char mode; |
1265 | int iter = 0; | |
1da177e4 LT |
1266 | #endif |
1267 | ||
bd4c625c | 1268 | BUG_ON(!th->t_trans_id); |
1da177e4 | 1269 | |
d68caa95 | 1270 | init_tb_struct(th, &s_del_balance, sb, path, |
bd4c625c | 1271 | 0 /*size is unknown */ ); |
1da177e4 | 1272 | |
bd4c625c | 1273 | while (1) { |
ee93961b | 1274 | removed = 0; |
1da177e4 LT |
1275 | |
1276 | #ifdef CONFIG_REISERFS_CHECK | |
ee93961b JM |
1277 | iter++; |
1278 | mode = | |
1da177e4 | 1279 | #endif |
d68caa95 | 1280 | prepare_for_delete_or_cut(th, inode, path, |
ee93961b JM |
1281 | item_key, &removed, |
1282 | &del_size, | |
995c762e | 1283 | max_reiserfs_offset(inode)); |
bd4c625c | 1284 | |
ee93961b | 1285 | RFALSE(mode != M_DELETE, "PAP-5320: mode must be M_DELETE"); |
bd4c625c | 1286 | |
4cf5f7ad | 1287 | copy_item_head(&s_ih, tp_item_head(path)); |
ee93961b | 1288 | s_del_balance.insert_size[0] = del_size; |
bd4c625c | 1289 | |
ee93961b JM |
1290 | ret_value = fix_nodes(M_DELETE, &s_del_balance, NULL, NULL); |
1291 | if (ret_value != REPEAT_SEARCH) | |
bd4c625c LT |
1292 | break; |
1293 | ||
a9dd3643 | 1294 | PROC_INFO_INC(sb, delete_item_restarted); |
bd4c625c | 1295 | |
098297b2 | 1296 | /* file system changed, repeat search */ |
ee93961b | 1297 | ret_value = |
d68caa95 | 1298 | search_for_position_by_key(sb, item_key, path); |
ee93961b | 1299 | if (ret_value == IO_ERROR) |
bd4c625c | 1300 | break; |
ee93961b | 1301 | if (ret_value == FILE_NOT_FOUND) { |
a9dd3643 | 1302 | reiserfs_warning(sb, "vs-5340", |
bd4c625c | 1303 | "no items of the file %K found", |
d68caa95 | 1304 | item_key); |
bd4c625c LT |
1305 | break; |
1306 | } | |
1307 | } /* while (1) */ | |
1da177e4 | 1308 | |
ee93961b | 1309 | if (ret_value != CARRY_ON) { |
bd4c625c LT |
1310 | unfix_nodes(&s_del_balance); |
1311 | return 0; | |
1312 | } | |
098297b2 JM |
1313 | |
1314 | /* reiserfs_delete_item returns item length when success */ | |
ee93961b | 1315 | ret_value = calc_deleted_bytes_number(&s_del_balance, M_DELETE); |
4cf5f7ad | 1316 | q_ih = tp_item_head(path); |
bd4c625c LT |
1317 | quota_cut_bytes = ih_item_len(q_ih); |
1318 | ||
098297b2 JM |
1319 | /* |
1320 | * hack so the quota code doesn't have to guess if the file has a | |
1321 | * tail. On tail insert, we allocate quota for 1 unformatted node. | |
1322 | * We test the offset because the tail might have been | |
1323 | * split into multiple items, and we only want to decrement for | |
1324 | * the unfm node once | |
bd4c625c | 1325 | */ |
995c762e | 1326 | if (!S_ISLNK(inode->i_mode) && is_direct_le_ih(q_ih)) { |
a9dd3643 JM |
1327 | if ((le_ih_k_offset(q_ih) & (sb->s_blocksize - 1)) == 1) { |
1328 | quota_cut_bytes = sb->s_blocksize + UNFM_P_SIZE; | |
bd4c625c LT |
1329 | } else { |
1330 | quota_cut_bytes = 0; | |
1331 | } | |
1da177e4 | 1332 | } |
1da177e4 | 1333 | |
d68caa95 | 1334 | if (un_bh) { |
bd4c625c LT |
1335 | int off; |
1336 | char *data; | |
1337 | ||
098297b2 JM |
1338 | /* |
1339 | * We are in direct2indirect conversion, so move tail contents | |
1340 | * to the unformatted node | |
1341 | */ | |
1342 | /* | |
1343 | * note, we do the copy before preparing the buffer because we | |
1344 | * don't care about the contents of the unformatted node yet. | |
1345 | * the only thing we really care about is the direct item's | |
1346 | * data is in the unformatted node. | |
1347 | * | |
1348 | * Otherwise, we would have to call | |
1349 | * reiserfs_prepare_for_journal on the unformatted node, | |
1350 | * which might schedule, meaning we'd have to loop all the | |
1351 | * way back up to the start of the while loop. | |
1352 | * | |
1353 | * The unformatted node must be dirtied later on. We can't be | |
1354 | * sure here if the entire tail has been deleted yet. | |
1355 | * | |
1356 | * un_bh is from the page cache (all unformatted nodes are | |
1357 | * from the page cache) and might be a highmem page. So, we | |
1358 | * can't use un_bh->b_data. | |
1359 | * -clm | |
bd4c625c LT |
1360 | */ |
1361 | ||
883da600 | 1362 | data = kmap_atomic(un_bh->b_page); |
09cbfeaf | 1363 | off = ((le_ih_k_offset(&s_ih) - 1) & (PAGE_SIZE - 1)); |
bd4c625c | 1364 | memcpy(data + off, |
4cf5f7ad | 1365 | ih_item_body(PATH_PLAST_BUFFER(path), &s_ih), |
ee93961b | 1366 | ret_value); |
883da600 | 1367 | kunmap_atomic(data); |
1da177e4 | 1368 | } |
098297b2 | 1369 | |
bd4c625c LT |
1370 | /* Perform balancing after all resources have been collected at once. */ |
1371 | do_balance(&s_del_balance, NULL, NULL, M_DELETE); | |
1da177e4 LT |
1372 | |
1373 | #ifdef REISERQUOTA_DEBUG | |
a9dd3643 | 1374 | reiserfs_debug(sb, REISERFS_DEBUG_CODE, |
bd4c625c | 1375 | "reiserquota delete_item(): freeing %u, id=%u type=%c", |
995c762e | 1376 | quota_cut_bytes, inode->i_uid, head2type(&s_ih)); |
1da177e4 | 1377 | #endif |
d2d0395f | 1378 | depth = reiserfs_write_unlock_nested(inode->i_sb); |
5dd4056d | 1379 | dquot_free_space_nodirty(inode, quota_cut_bytes); |
d2d0395f | 1380 | reiserfs_write_lock_nested(inode->i_sb, depth); |
1da177e4 | 1381 | |
bd4c625c | 1382 | /* Return deleted body length */ |
ee93961b | 1383 | return ret_value; |
1da177e4 LT |
1384 | } |
1385 | ||
098297b2 JM |
1386 | /* |
1387 | * Summary Of Mechanisms For Handling Collisions Between Processes: | |
1388 | * | |
1389 | * deletion of the body of the object is performed by iput(), with the | |
1390 | * result that if multiple processes are operating on a file, the | |
1391 | * deletion of the body of the file is deferred until the last process | |
1392 | * that has an open inode performs its iput(). | |
1393 | * | |
1394 | * writes and truncates are protected from collisions by use of | |
1395 | * semaphores. | |
1396 | * | |
1397 | * creates, linking, and mknod are protected from collisions with other | |
1398 | * processes by making the reiserfs_add_entry() the last step in the | |
1399 | * creation, and then rolling back all changes if there was a collision. | |
1400 | * - Hans | |
1da177e4 LT |
1401 | */ |
1402 | ||
1da177e4 | 1403 | /* this deletes item which never gets split */ |
bd4c625c LT |
1404 | void reiserfs_delete_solid_item(struct reiserfs_transaction_handle *th, |
1405 | struct inode *inode, struct reiserfs_key *key) | |
1da177e4 | 1406 | { |
d2d0395f | 1407 | struct super_block *sb = th->t_super; |
bd4c625c LT |
1408 | struct tree_balance tb; |
1409 | INITIALIZE_PATH(path); | |
1410 | int item_len = 0; | |
1411 | int tb_init = 0; | |
1412 | struct cpu_key cpu_key; | |
1413 | int retval; | |
1414 | int quota_cut_bytes = 0; | |
1415 | ||
1416 | BUG_ON(!th->t_trans_id); | |
1417 | ||
1418 | le_key2cpu_key(&cpu_key, key); | |
1419 | ||
1420 | while (1) { | |
1421 | retval = search_item(th->t_super, &cpu_key, &path); | |
1422 | if (retval == IO_ERROR) { | |
0030b645 JM |
1423 | reiserfs_error(th->t_super, "vs-5350", |
1424 | "i/o failure occurred trying " | |
1425 | "to delete %K", &cpu_key); | |
bd4c625c LT |
1426 | break; |
1427 | } | |
1428 | if (retval != ITEM_FOUND) { | |
1429 | pathrelse(&path); | |
098297b2 JM |
1430 | /* |
1431 | * No need for a warning, if there is just no free | |
1432 | * space to insert '..' item into the | |
1433 | * newly-created subdir | |
1434 | */ | |
bd4c625c LT |
1435 | if (! |
1436 | ((unsigned long long) | |
1437 | GET_HASH_VALUE(le_key_k_offset | |
1438 | (le_key_version(key), key)) == 0 | |
1439 | && (unsigned long long) | |
1440 | GET_GENERATION_NUMBER(le_key_k_offset | |
1441 | (le_key_version(key), | |
1442 | key)) == 1)) | |
45b03d5e JM |
1443 | reiserfs_warning(th->t_super, "vs-5355", |
1444 | "%k not found", key); | |
bd4c625c LT |
1445 | break; |
1446 | } | |
1447 | if (!tb_init) { | |
1448 | tb_init = 1; | |
4cf5f7ad | 1449 | item_len = ih_item_len(tp_item_head(&path)); |
bd4c625c LT |
1450 | init_tb_struct(th, &tb, th->t_super, &path, |
1451 | -(IH_SIZE + item_len)); | |
1452 | } | |
4cf5f7ad | 1453 | quota_cut_bytes = ih_item_len(tp_item_head(&path)); |
1da177e4 | 1454 | |
bd4c625c LT |
1455 | retval = fix_nodes(M_DELETE, &tb, NULL, NULL); |
1456 | if (retval == REPEAT_SEARCH) { | |
1457 | PROC_INFO_INC(th->t_super, delete_solid_item_restarted); | |
1458 | continue; | |
1459 | } | |
1da177e4 | 1460 | |
bd4c625c LT |
1461 | if (retval == CARRY_ON) { |
1462 | do_balance(&tb, NULL, NULL, M_DELETE); | |
098297b2 JM |
1463 | /* |
1464 | * Should we count quota for item? (we don't | |
1465 | * count quotas for save-links) | |
1466 | */ | |
1467 | if (inode) { | |
d2d0395f | 1468 | int depth; |
1da177e4 | 1469 | #ifdef REISERQUOTA_DEBUG |
bd4c625c LT |
1470 | reiserfs_debug(th->t_super, REISERFS_DEBUG_CODE, |
1471 | "reiserquota delete_solid_item(): freeing %u id=%u type=%c", | |
1472 | quota_cut_bytes, inode->i_uid, | |
1473 | key2type(key)); | |
1da177e4 | 1474 | #endif |
d2d0395f | 1475 | depth = reiserfs_write_unlock_nested(sb); |
5dd4056d | 1476 | dquot_free_space_nodirty(inode, |
bd4c625c | 1477 | quota_cut_bytes); |
d2d0395f | 1478 | reiserfs_write_lock_nested(sb, depth); |
bd4c625c LT |
1479 | } |
1480 | break; | |
1481 | } | |
098297b2 JM |
1482 | |
1483 | /* IO_ERROR, NO_DISK_SPACE, etc */ | |
45b03d5e | 1484 | reiserfs_warning(th->t_super, "vs-5360", |
bd4c625c LT |
1485 | "could not delete %K due to fix_nodes failure", |
1486 | &cpu_key); | |
1487 | unfix_nodes(&tb); | |
1488 | break; | |
1da177e4 LT |
1489 | } |
1490 | ||
bd4c625c | 1491 | reiserfs_check_path(&path); |
1da177e4 LT |
1492 | } |
1493 | ||
bd4c625c LT |
1494 | int reiserfs_delete_object(struct reiserfs_transaction_handle *th, |
1495 | struct inode *inode) | |
1da177e4 | 1496 | { |
bd4c625c LT |
1497 | int err; |
1498 | inode->i_size = 0; | |
1499 | BUG_ON(!th->t_trans_id); | |
1500 | ||
1501 | /* for directory this deletes item containing "." and ".." */ | |
1502 | err = | |
1503 | reiserfs_do_truncate(th, inode, NULL, 0 /*no timestamp updates */ ); | |
1504 | if (err) | |
1505 | return err; | |
1506 | ||
1da177e4 | 1507 | #if defined( USE_INODE_GENERATION_COUNTER ) |
bd4c625c LT |
1508 | if (!old_format_only(th->t_super)) { |
1509 | __le32 *inode_generation; | |
1510 | ||
1511 | inode_generation = | |
1512 | &REISERFS_SB(th->t_super)->s_rs->s_inode_generation; | |
9e902df6 | 1513 | le32_add_cpu(inode_generation, 1); |
bd4c625c | 1514 | } |
1da177e4 LT |
1515 | /* USE_INODE_GENERATION_COUNTER */ |
1516 | #endif | |
bd4c625c | 1517 | reiserfs_delete_solid_item(th, inode, INODE_PKEY(inode)); |
1da177e4 | 1518 | |
bd4c625c | 1519 | return err; |
1da177e4 LT |
1520 | } |
1521 | ||
bd4c625c LT |
1522 | static void unmap_buffers(struct page *page, loff_t pos) |
1523 | { | |
1524 | struct buffer_head *bh; | |
1525 | struct buffer_head *head; | |
1526 | struct buffer_head *next; | |
1527 | unsigned long tail_index; | |
1528 | unsigned long cur_index; | |
1529 | ||
1530 | if (page) { | |
1531 | if (page_has_buffers(page)) { | |
09cbfeaf | 1532 | tail_index = pos & (PAGE_SIZE - 1); |
bd4c625c LT |
1533 | cur_index = 0; |
1534 | head = page_buffers(page); | |
1535 | bh = head; | |
1536 | do { | |
1537 | next = bh->b_this_page; | |
1538 | ||
098297b2 JM |
1539 | /* |
1540 | * we want to unmap the buffers that contain | |
1541 | * the tail, and all the buffers after it | |
1542 | * (since the tail must be at the end of the | |
1543 | * file). We don't want to unmap file data | |
1544 | * before the tail, since it might be dirty | |
1545 | * and waiting to reach disk | |
bd4c625c LT |
1546 | */ |
1547 | cur_index += bh->b_size; | |
1548 | if (cur_index > tail_index) { | |
1549 | reiserfs_unmap_buffer(bh); | |
1550 | } | |
1551 | bh = next; | |
1552 | } while (bh != head); | |
1da177e4 | 1553 | } |
1da177e4 | 1554 | } |
1da177e4 LT |
1555 | } |
1556 | ||
bd4c625c | 1557 | static int maybe_indirect_to_direct(struct reiserfs_transaction_handle *th, |
995c762e | 1558 | struct inode *inode, |
bd4c625c | 1559 | struct page *page, |
d68caa95 JM |
1560 | struct treepath *path, |
1561 | const struct cpu_key *item_key, | |
ee93961b | 1562 | loff_t new_file_size, char *mode) |
bd4c625c | 1563 | { |
995c762e | 1564 | struct super_block *sb = inode->i_sb; |
ee93961b | 1565 | int block_size = sb->s_blocksize; |
bd4c625c LT |
1566 | int cut_bytes; |
1567 | BUG_ON(!th->t_trans_id); | |
ee93961b | 1568 | BUG_ON(new_file_size != inode->i_size); |
1da177e4 | 1569 | |
098297b2 JM |
1570 | /* |
1571 | * the page being sent in could be NULL if there was an i/o error | |
1572 | * reading in the last block. The user will hit problems trying to | |
1573 | * read the file, but for now we just skip the indirect2direct | |
bd4c625c | 1574 | */ |
995c762e JM |
1575 | if (atomic_read(&inode->i_count) > 1 || |
1576 | !tail_has_to_be_packed(inode) || | |
1577 | !page || (REISERFS_I(inode)->i_flags & i_nopack_mask)) { | |
0222e657 | 1578 | /* leave tail in an unformatted node */ |
d68caa95 | 1579 | *mode = M_SKIP_BALANCING; |
bd4c625c | 1580 | cut_bytes = |
ee93961b | 1581 | block_size - (new_file_size & (block_size - 1)); |
d68caa95 | 1582 | pathrelse(path); |
bd4c625c LT |
1583 | return cut_bytes; |
1584 | } | |
098297b2 | 1585 | |
d68caa95 | 1586 | /* Perform the conversion to a direct_item. */ |
d68caa95 | 1587 | return indirect2direct(th, inode, page, path, item_key, |
ee93961b | 1588 | new_file_size, mode); |
bd4c625c | 1589 | } |
1da177e4 | 1590 | |
098297b2 JM |
1591 | /* |
1592 | * we did indirect_to_direct conversion. And we have inserted direct | |
1593 | * item successesfully, but there were no disk space to cut unfm | |
1594 | * pointer being converted. Therefore we have to delete inserted | |
1595 | * direct item(s) | |
1596 | */ | |
bd4c625c | 1597 | static void indirect_to_direct_roll_back(struct reiserfs_transaction_handle *th, |
fec6d055 | 1598 | struct inode *inode, struct treepath *path) |
1da177e4 | 1599 | { |
bd4c625c LT |
1600 | struct cpu_key tail_key; |
1601 | int tail_len; | |
1602 | int removed; | |
1603 | BUG_ON(!th->t_trans_id); | |
1604 | ||
098297b2 | 1605 | make_cpu_key(&tail_key, inode, inode->i_size + 1, TYPE_DIRECT, 4); |
bd4c625c LT |
1606 | tail_key.key_length = 4; |
1607 | ||
1608 | tail_len = | |
1609 | (cpu_key_k_offset(&tail_key) & (inode->i_sb->s_blocksize - 1)) - 1; | |
1610 | while (tail_len) { | |
1611 | /* look for the last byte of the tail */ | |
1612 | if (search_for_position_by_key(inode->i_sb, &tail_key, path) == | |
1613 | POSITION_NOT_FOUND) | |
c3a9c210 JM |
1614 | reiserfs_panic(inode->i_sb, "vs-5615", |
1615 | "found invalid item"); | |
bd4c625c | 1616 | RFALSE(path->pos_in_item != |
4cf5f7ad | 1617 | ih_item_len(tp_item_head(path)) - 1, |
bd4c625c LT |
1618 | "vs-5616: appended bytes found"); |
1619 | PATH_LAST_POSITION(path)--; | |
1620 | ||
1621 | removed = | |
1622 | reiserfs_delete_item(th, path, &tail_key, inode, | |
1623 | NULL /*unbh not needed */ ); | |
1624 | RFALSE(removed <= 0 | |
1625 | || removed > tail_len, | |
1626 | "vs-5617: there was tail %d bytes, removed item length %d bytes", | |
1627 | tail_len, removed); | |
1628 | tail_len -= removed; | |
1629 | set_cpu_key_k_offset(&tail_key, | |
1630 | cpu_key_k_offset(&tail_key) - removed); | |
1631 | } | |
45b03d5e JM |
1632 | reiserfs_warning(inode->i_sb, "reiserfs-5091", "indirect_to_direct " |
1633 | "conversion has been rolled back due to " | |
1634 | "lack of disk space"); | |
bd4c625c | 1635 | mark_inode_dirty(inode); |
1da177e4 LT |
1636 | } |
1637 | ||
1da177e4 | 1638 | /* (Truncate or cut entry) or delete object item. Returns < 0 on failure */ |
bd4c625c | 1639 | int reiserfs_cut_from_item(struct reiserfs_transaction_handle *th, |
d68caa95 JM |
1640 | struct treepath *path, |
1641 | struct cpu_key *item_key, | |
995c762e | 1642 | struct inode *inode, |
ee93961b | 1643 | struct page *page, loff_t new_file_size) |
1da177e4 | 1644 | { |
995c762e | 1645 | struct super_block *sb = inode->i_sb; |
098297b2 JM |
1646 | /* |
1647 | * Every function which is going to call do_balance must first | |
1648 | * create a tree_balance structure. Then it must fill up this | |
1649 | * structure by using the init_tb_struct and fix_nodes functions. | |
1650 | * After that we can make tree balancing. | |
1651 | */ | |
bd4c625c LT |
1652 | struct tree_balance s_cut_balance; |
1653 | struct item_head *p_le_ih; | |
098297b2 JM |
1654 | int cut_size = 0; /* Amount to be cut. */ |
1655 | int ret_value = CARRY_ON; | |
1656 | int removed = 0; /* Number of the removed unformatted nodes. */ | |
1657 | int is_inode_locked = 0; | |
ee93961b | 1658 | char mode; /* Mode of the balance. */ |
bd4c625c LT |
1659 | int retval2 = -1; |
1660 | int quota_cut_bytes; | |
1661 | loff_t tail_pos = 0; | |
d2d0395f | 1662 | int depth; |
bd4c625c LT |
1663 | |
1664 | BUG_ON(!th->t_trans_id); | |
1665 | ||
d68caa95 | 1666 | init_tb_struct(th, &s_cut_balance, inode->i_sb, path, |
ee93961b | 1667 | cut_size); |
bd4c625c | 1668 | |
098297b2 JM |
1669 | /* |
1670 | * Repeat this loop until we either cut the item without needing | |
1671 | * to balance, or we fix_nodes without schedule occurring | |
1672 | */ | |
bd4c625c | 1673 | while (1) { |
098297b2 JM |
1674 | /* |
1675 | * Determine the balance mode, position of the first byte to | |
1676 | * be cut, and size to be cut. In case of the indirect item | |
1677 | * free unformatted nodes which are pointed to by the cut | |
1678 | * pointers. | |
1679 | */ | |
bd4c625c | 1680 | |
ee93961b | 1681 | mode = |
d68caa95 | 1682 | prepare_for_delete_or_cut(th, inode, path, |
ee93961b JM |
1683 | item_key, &removed, |
1684 | &cut_size, new_file_size); | |
1685 | if (mode == M_CONVERT) { | |
098297b2 JM |
1686 | /* |
1687 | * convert last unformatted node to direct item or | |
1688 | * leave tail in the unformatted node | |
1689 | */ | |
ee93961b | 1690 | RFALSE(ret_value != CARRY_ON, |
bd4c625c LT |
1691 | "PAP-5570: can not convert twice"); |
1692 | ||
ee93961b | 1693 | ret_value = |
995c762e | 1694 | maybe_indirect_to_direct(th, inode, page, |
d68caa95 | 1695 | path, item_key, |
ee93961b JM |
1696 | new_file_size, &mode); |
1697 | if (mode == M_SKIP_BALANCING) | |
bd4c625c | 1698 | /* tail has been left in the unformatted node */ |
ee93961b | 1699 | return ret_value; |
bd4c625c | 1700 | |
ee93961b | 1701 | is_inode_locked = 1; |
bd4c625c | 1702 | |
098297b2 JM |
1703 | /* |
1704 | * removing of last unformatted node will | |
1705 | * change value we have to return to truncate. | |
1706 | * Save it | |
1707 | */ | |
ee93961b | 1708 | retval2 = ret_value; |
bd4c625c | 1709 | |
098297b2 JM |
1710 | /* |
1711 | * So, we have performed the first part of the | |
1712 | * conversion: | |
1713 | * inserting the new direct item. Now we are | |
1714 | * removing the last unformatted node pointer. | |
1715 | * Set key to search for it. | |
1716 | */ | |
d68caa95 JM |
1717 | set_cpu_key_k_type(item_key, TYPE_INDIRECT); |
1718 | item_key->key_length = 4; | |
ee93961b JM |
1719 | new_file_size -= |
1720 | (new_file_size & (sb->s_blocksize - 1)); | |
1721 | tail_pos = new_file_size; | |
1722 | set_cpu_key_k_offset(item_key, new_file_size + 1); | |
bd4c625c | 1723 | if (search_for_position_by_key |
d68caa95 JM |
1724 | (sb, item_key, |
1725 | path) == POSITION_NOT_FOUND) { | |
1726 | print_block(PATH_PLAST_BUFFER(path), 3, | |
1727 | PATH_LAST_POSITION(path) - 1, | |
1728 | PATH_LAST_POSITION(path) + 1); | |
a9dd3643 | 1729 | reiserfs_panic(sb, "PAP-5580", "item to " |
c3a9c210 | 1730 | "convert does not exist (%K)", |
d68caa95 | 1731 | item_key); |
bd4c625c LT |
1732 | } |
1733 | continue; | |
1734 | } | |
ee93961b | 1735 | if (cut_size == 0) { |
d68caa95 | 1736 | pathrelse(path); |
bd4c625c LT |
1737 | return 0; |
1738 | } | |
1739 | ||
ee93961b | 1740 | s_cut_balance.insert_size[0] = cut_size; |
bd4c625c | 1741 | |
ee93961b JM |
1742 | ret_value = fix_nodes(mode, &s_cut_balance, NULL, NULL); |
1743 | if (ret_value != REPEAT_SEARCH) | |
bd4c625c LT |
1744 | break; |
1745 | ||
a9dd3643 | 1746 | PROC_INFO_INC(sb, cut_from_item_restarted); |
bd4c625c | 1747 | |
ee93961b | 1748 | ret_value = |
d68caa95 | 1749 | search_for_position_by_key(sb, item_key, path); |
ee93961b | 1750 | if (ret_value == POSITION_FOUND) |
bd4c625c | 1751 | continue; |
1da177e4 | 1752 | |
a9dd3643 | 1753 | reiserfs_warning(sb, "PAP-5610", "item %K not found", |
d68caa95 | 1754 | item_key); |
bd4c625c | 1755 | unfix_nodes(&s_cut_balance); |
ee93961b | 1756 | return (ret_value == IO_ERROR) ? -EIO : -ENOENT; |
bd4c625c LT |
1757 | } /* while */ |
1758 | ||
098297b2 | 1759 | /* check fix_nodes results (IO_ERROR or NO_DISK_SPACE) */ |
ee93961b JM |
1760 | if (ret_value != CARRY_ON) { |
1761 | if (is_inode_locked) { | |
098297b2 JM |
1762 | /* |
1763 | * FIXME: this seems to be not needed: we are always | |
1764 | * able to cut item | |
1765 | */ | |
d68caa95 | 1766 | indirect_to_direct_roll_back(th, inode, path); |
bd4c625c | 1767 | } |
ee93961b | 1768 | if (ret_value == NO_DISK_SPACE) |
a9dd3643 | 1769 | reiserfs_warning(sb, "reiserfs-5092", |
45b03d5e | 1770 | "NO_DISK_SPACE"); |
bd4c625c LT |
1771 | unfix_nodes(&s_cut_balance); |
1772 | return -EIO; | |
1da177e4 | 1773 | } |
bd4c625c LT |
1774 | |
1775 | /* go ahead and perform balancing */ | |
1776 | ||
ee93961b | 1777 | RFALSE(mode == M_PASTE || mode == M_INSERT, "invalid mode"); |
bd4c625c LT |
1778 | |
1779 | /* Calculate number of bytes that need to be cut from the item. */ | |
1780 | quota_cut_bytes = | |
ee93961b | 1781 | (mode == |
4cf5f7ad | 1782 | M_DELETE) ? ih_item_len(tp_item_head(path)) : -s_cut_balance. |
bd4c625c LT |
1783 | insert_size[0]; |
1784 | if (retval2 == -1) | |
ee93961b | 1785 | ret_value = calc_deleted_bytes_number(&s_cut_balance, mode); |
bd4c625c | 1786 | else |
ee93961b | 1787 | ret_value = retval2; |
bd4c625c | 1788 | |
098297b2 JM |
1789 | /* |
1790 | * For direct items, we only change the quota when deleting the last | |
1791 | * item. | |
bd4c625c | 1792 | */ |
4cf5f7ad | 1793 | p_le_ih = tp_item_head(s_cut_balance.tb_path); |
995c762e | 1794 | if (!S_ISLNK(inode->i_mode) && is_direct_le_ih(p_le_ih)) { |
ee93961b | 1795 | if (mode == M_DELETE && |
a9dd3643 | 1796 | (le_ih_k_offset(p_le_ih) & (sb->s_blocksize - 1)) == |
bd4c625c | 1797 | 1) { |
098297b2 | 1798 | /* FIXME: this is to keep 3.5 happy */ |
995c762e | 1799 | REISERFS_I(inode)->i_first_direct_byte = U32_MAX; |
a9dd3643 | 1800 | quota_cut_bytes = sb->s_blocksize + UNFM_P_SIZE; |
bd4c625c LT |
1801 | } else { |
1802 | quota_cut_bytes = 0; | |
1803 | } | |
1da177e4 | 1804 | } |
1da177e4 | 1805 | #ifdef CONFIG_REISERFS_CHECK |
ee93961b | 1806 | if (is_inode_locked) { |
bd4c625c | 1807 | struct item_head *le_ih = |
4cf5f7ad | 1808 | tp_item_head(s_cut_balance.tb_path); |
098297b2 JM |
1809 | /* |
1810 | * we are going to complete indirect2direct conversion. Make | |
1811 | * sure, that we exactly remove last unformatted node pointer | |
1812 | * of the item | |
1813 | */ | |
bd4c625c | 1814 | if (!is_indirect_le_ih(le_ih)) |
a9dd3643 | 1815 | reiserfs_panic(sb, "vs-5652", |
bd4c625c LT |
1816 | "item must be indirect %h", le_ih); |
1817 | ||
ee93961b | 1818 | if (mode == M_DELETE && ih_item_len(le_ih) != UNFM_P_SIZE) |
a9dd3643 | 1819 | reiserfs_panic(sb, "vs-5653", "completing " |
c3a9c210 JM |
1820 | "indirect2direct conversion indirect " |
1821 | "item %h being deleted must be of " | |
1822 | "4 byte long", le_ih); | |
bd4c625c | 1823 | |
ee93961b | 1824 | if (mode == M_CUT |
bd4c625c | 1825 | && s_cut_balance.insert_size[0] != -UNFM_P_SIZE) { |
a9dd3643 | 1826 | reiserfs_panic(sb, "vs-5654", "can not complete " |
c3a9c210 JM |
1827 | "indirect2direct conversion of %h " |
1828 | "(CUT, insert_size==%d)", | |
bd4c625c LT |
1829 | le_ih, s_cut_balance.insert_size[0]); |
1830 | } | |
098297b2 JM |
1831 | /* |
1832 | * it would be useful to make sure, that right neighboring | |
1833 | * item is direct item of this file | |
1834 | */ | |
1da177e4 | 1835 | } |
1da177e4 | 1836 | #endif |
bd4c625c | 1837 | |
ee93961b JM |
1838 | do_balance(&s_cut_balance, NULL, NULL, mode); |
1839 | if (is_inode_locked) { | |
098297b2 JM |
1840 | /* |
1841 | * we've done an indirect->direct conversion. when the | |
1842 | * data block was freed, it was removed from the list of | |
1843 | * blocks that must be flushed before the transaction | |
1844 | * commits, make sure to unmap and invalidate it | |
bd4c625c LT |
1845 | */ |
1846 | unmap_buffers(page, tail_pos); | |
995c762e | 1847 | REISERFS_I(inode)->i_flags &= ~i_pack_on_close_mask; |
bd4c625c | 1848 | } |
1da177e4 | 1849 | #ifdef REISERQUOTA_DEBUG |
995c762e | 1850 | reiserfs_debug(inode->i_sb, REISERFS_DEBUG_CODE, |
bd4c625c | 1851 | "reiserquota cut_from_item(): freeing %u id=%u type=%c", |
995c762e | 1852 | quota_cut_bytes, inode->i_uid, '?'); |
1da177e4 | 1853 | #endif |
d2d0395f | 1854 | depth = reiserfs_write_unlock_nested(sb); |
5dd4056d | 1855 | dquot_free_space_nodirty(inode, quota_cut_bytes); |
d2d0395f | 1856 | reiserfs_write_lock_nested(sb, depth); |
ee93961b | 1857 | return ret_value; |
1da177e4 LT |
1858 | } |
1859 | ||
bd4c625c LT |
1860 | static void truncate_directory(struct reiserfs_transaction_handle *th, |
1861 | struct inode *inode) | |
1da177e4 | 1862 | { |
bd4c625c LT |
1863 | BUG_ON(!th->t_trans_id); |
1864 | if (inode->i_nlink) | |
0030b645 | 1865 | reiserfs_error(inode->i_sb, "vs-5655", "link count != 0"); |
bd4c625c LT |
1866 | |
1867 | set_le_key_k_offset(KEY_FORMAT_3_5, INODE_PKEY(inode), DOT_OFFSET); | |
1868 | set_le_key_k_type(KEY_FORMAT_3_5, INODE_PKEY(inode), TYPE_DIRENTRY); | |
1869 | reiserfs_delete_solid_item(th, inode, INODE_PKEY(inode)); | |
1870 | reiserfs_update_sd(th, inode); | |
1871 | set_le_key_k_offset(KEY_FORMAT_3_5, INODE_PKEY(inode), SD_OFFSET); | |
1872 | set_le_key_k_type(KEY_FORMAT_3_5, INODE_PKEY(inode), TYPE_STAT_DATA); | |
1da177e4 LT |
1873 | } |
1874 | ||
098297b2 JM |
1875 | /* |
1876 | * Truncate file to the new size. Note, this must be called with a | |
1877 | * transaction already started | |
1878 | */ | |
995c762e | 1879 | int reiserfs_do_truncate(struct reiserfs_transaction_handle *th, |
098297b2 | 1880 | struct inode *inode, /* ->i_size contains new size */ |
bd4c625c | 1881 | struct page *page, /* up to date for last block */ |
098297b2 JM |
1882 | /* |
1883 | * when it is called by file_release to convert | |
1884 | * the tail - no timestamps should be updated | |
1885 | */ | |
1886 | int update_timestamps | |
bd4c625c LT |
1887 | ) |
1888 | { | |
1889 | INITIALIZE_PATH(s_search_path); /* Path to the current object item. */ | |
1890 | struct item_head *p_le_ih; /* Pointer to an item header. */ | |
098297b2 JM |
1891 | |
1892 | /* Key to search for a previous file item. */ | |
1893 | struct cpu_key s_item_key; | |
ee93961b JM |
1894 | loff_t file_size, /* Old file size. */ |
1895 | new_file_size; /* New file size. */ | |
1896 | int deleted; /* Number of deleted or truncated bytes. */ | |
bd4c625c LT |
1897 | int retval; |
1898 | int err = 0; | |
1899 | ||
1900 | BUG_ON(!th->t_trans_id); | |
1901 | if (! | |
995c762e JM |
1902 | (S_ISREG(inode->i_mode) || S_ISDIR(inode->i_mode) |
1903 | || S_ISLNK(inode->i_mode))) | |
bd4c625c LT |
1904 | return 0; |
1905 | ||
098297b2 | 1906 | /* deletion of directory - no need to update timestamps */ |
995c762e | 1907 | if (S_ISDIR(inode->i_mode)) { |
995c762e | 1908 | truncate_directory(th, inode); |
bd4c625c LT |
1909 | return 0; |
1910 | } | |
1da177e4 | 1911 | |
bd4c625c | 1912 | /* Get new file size. */ |
ee93961b | 1913 | new_file_size = inode->i_size; |
1da177e4 | 1914 | |
098297b2 | 1915 | /* FIXME: note, that key type is unimportant here */ |
995c762e | 1916 | make_cpu_key(&s_item_key, inode, max_reiserfs_offset(inode), |
bd4c625c | 1917 | TYPE_DIRECT, 3); |
1da177e4 | 1918 | |
bd4c625c | 1919 | retval = |
995c762e | 1920 | search_for_position_by_key(inode->i_sb, &s_item_key, |
bd4c625c LT |
1921 | &s_search_path); |
1922 | if (retval == IO_ERROR) { | |
995c762e | 1923 | reiserfs_error(inode->i_sb, "vs-5657", |
0030b645 JM |
1924 | "i/o failure occurred trying to truncate %K", |
1925 | &s_item_key); | |
bd4c625c LT |
1926 | err = -EIO; |
1927 | goto out; | |
1928 | } | |
1929 | if (retval == POSITION_FOUND || retval == FILE_NOT_FOUND) { | |
995c762e | 1930 | reiserfs_error(inode->i_sb, "PAP-5660", |
0030b645 JM |
1931 | "wrong result %d of search for %K", retval, |
1932 | &s_item_key); | |
bd4c625c LT |
1933 | |
1934 | err = -EIO; | |
1935 | goto out; | |
1936 | } | |
1da177e4 | 1937 | |
bd4c625c LT |
1938 | s_search_path.pos_in_item--; |
1939 | ||
1940 | /* Get real file size (total length of all file items) */ | |
4cf5f7ad | 1941 | p_le_ih = tp_item_head(&s_search_path); |
bd4c625c | 1942 | if (is_statdata_le_ih(p_le_ih)) |
ee93961b | 1943 | file_size = 0; |
bd4c625c LT |
1944 | else { |
1945 | loff_t offset = le_ih_k_offset(p_le_ih); | |
1946 | int bytes = | |
995c762e | 1947 | op_bytes_number(p_le_ih, inode->i_sb->s_blocksize); |
bd4c625c | 1948 | |
098297b2 JM |
1949 | /* |
1950 | * this may mismatch with real file size: if last direct item | |
1951 | * had no padding zeros and last unformatted node had no free | |
1952 | * space, this file would have this file size | |
1953 | */ | |
ee93961b | 1954 | file_size = offset + bytes - 1; |
bd4c625c LT |
1955 | } |
1956 | /* | |
1957 | * are we doing a full truncate or delete, if so | |
1958 | * kick in the reada code | |
1959 | */ | |
ee93961b | 1960 | if (new_file_size == 0) |
bd4c625c LT |
1961 | s_search_path.reada = PATH_READA | PATH_READA_BACK; |
1962 | ||
ee93961b | 1963 | if (file_size == 0 || file_size < new_file_size) { |
bd4c625c | 1964 | goto update_and_out; |
1da177e4 LT |
1965 | } |
1966 | ||
bd4c625c | 1967 | /* Update key to search for the last file item. */ |
ee93961b | 1968 | set_cpu_key_k_offset(&s_item_key, file_size); |
bd4c625c LT |
1969 | |
1970 | do { | |
1971 | /* Cut or delete file item. */ | |
ee93961b | 1972 | deleted = |
bd4c625c | 1973 | reiserfs_cut_from_item(th, &s_search_path, &s_item_key, |
ee93961b JM |
1974 | inode, page, new_file_size); |
1975 | if (deleted < 0) { | |
995c762e | 1976 | reiserfs_warning(inode->i_sb, "vs-5665", |
45b03d5e | 1977 | "reiserfs_cut_from_item failed"); |
bd4c625c LT |
1978 | reiserfs_check_path(&s_search_path); |
1979 | return 0; | |
1980 | } | |
1da177e4 | 1981 | |
ee93961b | 1982 | RFALSE(deleted > file_size, |
bd4c625c | 1983 | "PAP-5670: reiserfs_cut_from_item: too many bytes deleted: deleted %d, file_size %lu, item_key %K", |
ee93961b | 1984 | deleted, file_size, &s_item_key); |
1da177e4 | 1985 | |
bd4c625c | 1986 | /* Change key to search the last file item. */ |
ee93961b | 1987 | file_size -= deleted; |
1da177e4 | 1988 | |
ee93961b | 1989 | set_cpu_key_k_offset(&s_item_key, file_size); |
1da177e4 | 1990 | |
098297b2 JM |
1991 | /* |
1992 | * While there are bytes to truncate and previous | |
1993 | * file item is presented in the tree. | |
1994 | */ | |
bd4c625c LT |
1995 | |
1996 | /* | |
098297b2 JM |
1997 | * This loop could take a really long time, and could log |
1998 | * many more blocks than a transaction can hold. So, we do | |
1999 | * a polite journal end here, and if the transaction needs | |
2000 | * ending, we make sure the file is consistent before ending | |
2001 | * the current trans and starting a new one | |
bd4c625c | 2002 | */ |
23f9e0f8 AZ |
2003 | if (journal_transaction_should_end(th, 0) || |
2004 | reiserfs_transaction_free_space(th) <= JOURNAL_FOR_FREE_BLOCK_AND_UPDATE_SD) { | |
3cd6dbe6 | 2005 | pathrelse(&s_search_path); |
bd4c625c LT |
2006 | |
2007 | if (update_timestamps) { | |
02027d42 DD |
2008 | inode->i_mtime = current_time(inode); |
2009 | inode->i_ctime = current_time(inode); | |
bd4c625c | 2010 | } |
995c762e | 2011 | reiserfs_update_sd(th, inode); |
bd4c625c | 2012 | |
58d85426 | 2013 | err = journal_end(th); |
bd4c625c LT |
2014 | if (err) |
2015 | goto out; | |
995c762e | 2016 | err = journal_begin(th, inode->i_sb, |
23f9e0f8 | 2017 | JOURNAL_FOR_FREE_BLOCK_AND_UPDATE_SD + JOURNAL_PER_BALANCE_CNT * 4) ; |
bd4c625c LT |
2018 | if (err) |
2019 | goto out; | |
995c762e | 2020 | reiserfs_update_inode_transaction(inode); |
bd4c625c | 2021 | } |
ee93961b | 2022 | } while (file_size > ROUND_UP(new_file_size) && |
995c762e | 2023 | search_for_position_by_key(inode->i_sb, &s_item_key, |
bd4c625c LT |
2024 | &s_search_path) == POSITION_FOUND); |
2025 | ||
ee93961b | 2026 | RFALSE(file_size > ROUND_UP(new_file_size), |
53872ed0 | 2027 | "PAP-5680: truncate did not finish: new_file_size %lld, current %lld, oid %d", |
ee93961b | 2028 | new_file_size, file_size, s_item_key.on_disk_key.k_objectid); |
bd4c625c | 2029 | |
cf776a7a | 2030 | update_and_out: |
bd4c625c | 2031 | if (update_timestamps) { |
098297b2 | 2032 | /* this is truncate, not file closing */ |
02027d42 DD |
2033 | inode->i_mtime = current_time(inode); |
2034 | inode->i_ctime = current_time(inode); | |
1da177e4 | 2035 | } |
995c762e | 2036 | reiserfs_update_sd(th, inode); |
1da177e4 | 2037 | |
cf776a7a | 2038 | out: |
bd4c625c LT |
2039 | pathrelse(&s_search_path); |
2040 | return err; | |
2041 | } | |
1da177e4 LT |
2042 | |
2043 | #ifdef CONFIG_REISERFS_CHECK | |
098297b2 | 2044 | /* this makes sure, that we __append__, not overwrite or add holes */ |
fec6d055 | 2045 | static void check_research_for_paste(struct treepath *path, |
d68caa95 | 2046 | const struct cpu_key *key) |
1da177e4 | 2047 | { |
4cf5f7ad | 2048 | struct item_head *found_ih = tp_item_head(path); |
bd4c625c LT |
2049 | |
2050 | if (is_direct_le_ih(found_ih)) { | |
2051 | if (le_ih_k_offset(found_ih) + | |
2052 | op_bytes_number(found_ih, | |
2053 | get_last_bh(path)->b_size) != | |
d68caa95 | 2054 | cpu_key_k_offset(key) |
bd4c625c LT |
2055 | || op_bytes_number(found_ih, |
2056 | get_last_bh(path)->b_size) != | |
2057 | pos_in_item(path)) | |
c3a9c210 JM |
2058 | reiserfs_panic(NULL, "PAP-5720", "found direct item " |
2059 | "%h or position (%d) does not match " | |
2060 | "to key %K", found_ih, | |
d68caa95 | 2061 | pos_in_item(path), key); |
bd4c625c LT |
2062 | } |
2063 | if (is_indirect_le_ih(found_ih)) { | |
2064 | if (le_ih_k_offset(found_ih) + | |
2065 | op_bytes_number(found_ih, | |
2066 | get_last_bh(path)->b_size) != | |
d68caa95 | 2067 | cpu_key_k_offset(key) |
bd4c625c LT |
2068 | || I_UNFM_NUM(found_ih) != pos_in_item(path) |
2069 | || get_ih_free_space(found_ih) != 0) | |
c3a9c210 JM |
2070 | reiserfs_panic(NULL, "PAP-5730", "found indirect " |
2071 | "item (%h) or position (%d) does not " | |
2072 | "match to key (%K)", | |
d68caa95 | 2073 | found_ih, pos_in_item(path), key); |
bd4c625c | 2074 | } |
1da177e4 | 2075 | } |
bd4c625c | 2076 | #endif /* config reiserfs check */ |
1da177e4 | 2077 | |
098297b2 JM |
2078 | /* |
2079 | * Paste bytes to the existing item. | |
2080 | * Returns bytes number pasted into the item. | |
2081 | */ | |
2082 | int reiserfs_paste_into_item(struct reiserfs_transaction_handle *th, | |
2083 | /* Path to the pasted item. */ | |
2084 | struct treepath *search_path, | |
2085 | /* Key to search for the needed item. */ | |
2086 | const struct cpu_key *key, | |
2087 | /* Inode item belongs to */ | |
2088 | struct inode *inode, | |
2089 | /* Pointer to the bytes to paste. */ | |
2090 | const char *body, | |
2091 | /* Size of pasted bytes. */ | |
ee93961b | 2092 | int pasted_size) |
098297b2 | 2093 | { |
d2d0395f | 2094 | struct super_block *sb = inode->i_sb; |
bd4c625c LT |
2095 | struct tree_balance s_paste_balance; |
2096 | int retval; | |
2097 | int fs_gen; | |
d2d0395f | 2098 | int depth; |
bd4c625c LT |
2099 | |
2100 | BUG_ON(!th->t_trans_id); | |
1da177e4 | 2101 | |
bd4c625c | 2102 | fs_gen = get_generation(inode->i_sb); |
1da177e4 LT |
2103 | |
2104 | #ifdef REISERQUOTA_DEBUG | |
bd4c625c LT |
2105 | reiserfs_debug(inode->i_sb, REISERFS_DEBUG_CODE, |
2106 | "reiserquota paste_into_item(): allocating %u id=%u type=%c", | |
ee93961b | 2107 | pasted_size, inode->i_uid, |
a228bf8f | 2108 | key2type(&key->on_disk_key)); |
1da177e4 LT |
2109 | #endif |
2110 | ||
d2d0395f | 2111 | depth = reiserfs_write_unlock_nested(sb); |
5dd4056d | 2112 | retval = dquot_alloc_space_nodirty(inode, pasted_size); |
d2d0395f | 2113 | reiserfs_write_lock_nested(sb, depth); |
5dd4056d | 2114 | if (retval) { |
d68caa95 | 2115 | pathrelse(search_path); |
5dd4056d | 2116 | return retval; |
bd4c625c | 2117 | } |
d68caa95 | 2118 | init_tb_struct(th, &s_paste_balance, th->t_super, search_path, |
ee93961b | 2119 | pasted_size); |
1da177e4 | 2120 | #ifdef DISPLACE_NEW_PACKING_LOCALITIES |
d68caa95 | 2121 | s_paste_balance.key = key->on_disk_key; |
1da177e4 LT |
2122 | #endif |
2123 | ||
bd4c625c LT |
2124 | /* DQUOT_* can schedule, must check before the fix_nodes */ |
2125 | if (fs_changed(fs_gen, inode->i_sb)) { | |
2126 | goto search_again; | |
1da177e4 | 2127 | } |
bd4c625c LT |
2128 | |
2129 | while ((retval = | |
2130 | fix_nodes(M_PASTE, &s_paste_balance, NULL, | |
d68caa95 | 2131 | body)) == REPEAT_SEARCH) { |
cf776a7a | 2132 | search_again: |
bd4c625c LT |
2133 | /* file system changed while we were in the fix_nodes */ |
2134 | PROC_INFO_INC(th->t_super, paste_into_item_restarted); | |
2135 | retval = | |
d68caa95 JM |
2136 | search_for_position_by_key(th->t_super, key, |
2137 | search_path); | |
bd4c625c LT |
2138 | if (retval == IO_ERROR) { |
2139 | retval = -EIO; | |
2140 | goto error_out; | |
2141 | } | |
2142 | if (retval == POSITION_FOUND) { | |
45b03d5e JM |
2143 | reiserfs_warning(inode->i_sb, "PAP-5710", |
2144 | "entry or pasted byte (%K) exists", | |
d68caa95 | 2145 | key); |
bd4c625c LT |
2146 | retval = -EEXIST; |
2147 | goto error_out; | |
2148 | } | |
1da177e4 | 2149 | #ifdef CONFIG_REISERFS_CHECK |
d68caa95 | 2150 | check_research_for_paste(search_path, key); |
1da177e4 | 2151 | #endif |
bd4c625c | 2152 | } |
1da177e4 | 2153 | |
098297b2 JM |
2154 | /* |
2155 | * Perform balancing after all resources are collected by fix_nodes, | |
2156 | * and accessing them will not risk triggering schedule. | |
2157 | */ | |
bd4c625c | 2158 | if (retval == CARRY_ON) { |
d68caa95 | 2159 | do_balance(&s_paste_balance, NULL /*ih */ , body, M_PASTE); |
bd4c625c LT |
2160 | return 0; |
2161 | } | |
2162 | retval = (retval == NO_DISK_SPACE) ? -ENOSPC : -EIO; | |
cf776a7a | 2163 | error_out: |
bd4c625c LT |
2164 | /* this also releases the path */ |
2165 | unfix_nodes(&s_paste_balance); | |
1da177e4 | 2166 | #ifdef REISERQUOTA_DEBUG |
bd4c625c LT |
2167 | reiserfs_debug(inode->i_sb, REISERFS_DEBUG_CODE, |
2168 | "reiserquota paste_into_item(): freeing %u id=%u type=%c", | |
ee93961b | 2169 | pasted_size, inode->i_uid, |
a228bf8f | 2170 | key2type(&key->on_disk_key)); |
1da177e4 | 2171 | #endif |
d2d0395f | 2172 | depth = reiserfs_write_unlock_nested(sb); |
5dd4056d | 2173 | dquot_free_space_nodirty(inode, pasted_size); |
d2d0395f | 2174 | reiserfs_write_lock_nested(sb, depth); |
bd4c625c | 2175 | return retval; |
1da177e4 LT |
2176 | } |
2177 | ||
098297b2 JM |
2178 | /* |
2179 | * Insert new item into the buffer at the path. | |
d68caa95 JM |
2180 | * th - active transaction handle |
2181 | * path - path to the inserted item | |
2182 | * ih - pointer to the item header to insert | |
2183 | * body - pointer to the bytes to insert | |
2184 | */ | |
2185 | int reiserfs_insert_item(struct reiserfs_transaction_handle *th, | |
2186 | struct treepath *path, const struct cpu_key *key, | |
2187 | struct item_head *ih, struct inode *inode, | |
2188 | const char *body) | |
2189 | { | |
bd4c625c LT |
2190 | struct tree_balance s_ins_balance; |
2191 | int retval; | |
2192 | int fs_gen = 0; | |
2193 | int quota_bytes = 0; | |
2194 | ||
2195 | BUG_ON(!th->t_trans_id); | |
2196 | ||
2197 | if (inode) { /* Do we count quotas for item? */ | |
d2d0395f | 2198 | int depth; |
bd4c625c | 2199 | fs_gen = get_generation(inode->i_sb); |
d68caa95 | 2200 | quota_bytes = ih_item_len(ih); |
bd4c625c | 2201 | |
098297b2 JM |
2202 | /* |
2203 | * hack so the quota code doesn't have to guess | |
2204 | * if the file has a tail, links are always tails, | |
2205 | * so there's no guessing needed | |
bd4c625c | 2206 | */ |
d68caa95 | 2207 | if (!S_ISLNK(inode->i_mode) && is_direct_le_ih(ih)) |
bd4c625c | 2208 | quota_bytes = inode->i_sb->s_blocksize + UNFM_P_SIZE; |
1da177e4 | 2209 | #ifdef REISERQUOTA_DEBUG |
bd4c625c LT |
2210 | reiserfs_debug(inode->i_sb, REISERFS_DEBUG_CODE, |
2211 | "reiserquota insert_item(): allocating %u id=%u type=%c", | |
d68caa95 | 2212 | quota_bytes, inode->i_uid, head2type(ih)); |
1da177e4 | 2213 | #endif |
098297b2 JM |
2214 | /* |
2215 | * We can't dirty inode here. It would be immediately | |
2216 | * written but appropriate stat item isn't inserted yet... | |
2217 | */ | |
d2d0395f | 2218 | depth = reiserfs_write_unlock_nested(inode->i_sb); |
5dd4056d | 2219 | retval = dquot_alloc_space_nodirty(inode, quota_bytes); |
d2d0395f | 2220 | reiserfs_write_lock_nested(inode->i_sb, depth); |
5dd4056d | 2221 | if (retval) { |
d68caa95 | 2222 | pathrelse(path); |
5dd4056d | 2223 | return retval; |
bd4c625c | 2224 | } |
1da177e4 | 2225 | } |
d68caa95 JM |
2226 | init_tb_struct(th, &s_ins_balance, th->t_super, path, |
2227 | IH_SIZE + ih_item_len(ih)); | |
1da177e4 | 2228 | #ifdef DISPLACE_NEW_PACKING_LOCALITIES |
bd4c625c | 2229 | s_ins_balance.key = key->on_disk_key; |
1da177e4 | 2230 | #endif |
098297b2 JM |
2231 | /* |
2232 | * DQUOT_* can schedule, must check to be sure calling | |
2233 | * fix_nodes is safe | |
2234 | */ | |
bd4c625c LT |
2235 | if (inode && fs_changed(fs_gen, inode->i_sb)) { |
2236 | goto search_again; | |
1da177e4 | 2237 | } |
bd4c625c LT |
2238 | |
2239 | while ((retval = | |
d68caa95 JM |
2240 | fix_nodes(M_INSERT, &s_ins_balance, ih, |
2241 | body)) == REPEAT_SEARCH) { | |
cf776a7a | 2242 | search_again: |
bd4c625c LT |
2243 | /* file system changed while we were in the fix_nodes */ |
2244 | PROC_INFO_INC(th->t_super, insert_item_restarted); | |
d68caa95 | 2245 | retval = search_item(th->t_super, key, path); |
bd4c625c LT |
2246 | if (retval == IO_ERROR) { |
2247 | retval = -EIO; | |
2248 | goto error_out; | |
2249 | } | |
2250 | if (retval == ITEM_FOUND) { | |
45b03d5e | 2251 | reiserfs_warning(th->t_super, "PAP-5760", |
bd4c625c LT |
2252 | "key %K already exists in the tree", |
2253 | key); | |
2254 | retval = -EEXIST; | |
2255 | goto error_out; | |
2256 | } | |
1da177e4 | 2257 | } |
1da177e4 | 2258 | |
bd4c625c LT |
2259 | /* make balancing after all resources will be collected at a time */ |
2260 | if (retval == CARRY_ON) { | |
d68caa95 | 2261 | do_balance(&s_ins_balance, ih, body, M_INSERT); |
bd4c625c LT |
2262 | return 0; |
2263 | } | |
1da177e4 | 2264 | |
bd4c625c | 2265 | retval = (retval == NO_DISK_SPACE) ? -ENOSPC : -EIO; |
cf776a7a | 2266 | error_out: |
bd4c625c LT |
2267 | /* also releases the path */ |
2268 | unfix_nodes(&s_ins_balance); | |
1da177e4 | 2269 | #ifdef REISERQUOTA_DEBUG |
aacee544 YY |
2270 | if (inode) |
2271 | reiserfs_debug(th->t_super, REISERFS_DEBUG_CODE, | |
bd4c625c | 2272 | "reiserquota insert_item(): freeing %u id=%u type=%c", |
d68caa95 | 2273 | quota_bytes, inode->i_uid, head2type(ih)); |
1da177e4 | 2274 | #endif |
d2d0395f JM |
2275 | if (inode) { |
2276 | int depth = reiserfs_write_unlock_nested(inode->i_sb); | |
5dd4056d | 2277 | dquot_free_space_nodirty(inode, quota_bytes); |
d2d0395f JM |
2278 | reiserfs_write_lock_nested(inode->i_sb, depth); |
2279 | } | |
bd4c625c | 2280 | return retval; |
1da177e4 | 2281 | } |