]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - fs/xfs/linux-2.6/xfs_iops.c
[XFS] Keep stack usage down for 4k stacks by using noinline.
[mirror_ubuntu-jammy-kernel.git] / fs / xfs / linux-2.6 / xfs_iops.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4
LT
18#include "xfs.h"
19#include "xfs_fs.h"
a844f451 20#include "xfs_bit.h"
1da177e4 21#include "xfs_log.h"
a844f451 22#include "xfs_inum.h"
1da177e4
LT
23#include "xfs_trans.h"
24#include "xfs_sb.h"
25#include "xfs_ag.h"
1da177e4
LT
26#include "xfs_dir2.h"
27#include "xfs_alloc.h"
28#include "xfs_dmapi.h"
29#include "xfs_quota.h"
30#include "xfs_mount.h"
1da177e4 31#include "xfs_bmap_btree.h"
a844f451 32#include "xfs_alloc_btree.h"
1da177e4 33#include "xfs_ialloc_btree.h"
1da177e4 34#include "xfs_dir2_sf.h"
a844f451 35#include "xfs_attr_sf.h"
1da177e4
LT
36#include "xfs_dinode.h"
37#include "xfs_inode.h"
38#include "xfs_bmap.h"
a844f451
NS
39#include "xfs_btree.h"
40#include "xfs_ialloc.h"
1da177e4
LT
41#include "xfs_rtalloc.h"
42#include "xfs_error.h"
43#include "xfs_itable.h"
44#include "xfs_rw.h"
45#include "xfs_acl.h"
46#include "xfs_cap.h"
47#include "xfs_mac.h"
48#include "xfs_attr.h"
49#include "xfs_buf_item.h"
50#include "xfs_utils.h"
51
16f7e0fe 52#include <linux/capability.h>
1da177e4
LT
53#include <linux/xattr.h>
54#include <linux/namei.h>
446ada4a 55#include <linux/security.h>
1da177e4 56
75e17b3c
CH
57/*
58 * Get a XFS inode from a given vnode.
59 */
60xfs_inode_t *
61xfs_vtoi(
67fcaa73 62 bhv_vnode_t *vp)
75e17b3c
CH
63{
64 bhv_desc_t *bdp;
65
66 bdp = bhv_lookup_range(VN_BHV_HEAD(vp),
67 VNODE_POSITION_XFS, VNODE_POSITION_XFS);
68 if (unlikely(bdp == NULL))
69 return NULL;
70 return XFS_BHVTOI(bdp);
71}
72
42fe2b1f
CH
73/*
74 * Bring the atime in the XFS inode uptodate.
75 * Used before logging the inode to disk or when the Linux inode goes away.
76 */
77void
78xfs_synchronize_atime(
79 xfs_inode_t *ip)
80{
67fcaa73 81 bhv_vnode_t *vp;
42fe2b1f
CH
82
83 vp = XFS_ITOV_NULL(ip);
84 if (vp) {
85 struct inode *inode = &vp->v_inode;
86 ip->i_d.di_atime.t_sec = (__int32_t)inode->i_atime.tv_sec;
87 ip->i_d.di_atime.t_nsec = (__int32_t)inode->i_atime.tv_nsec;
88 }
89}
90
4aeb664c
NS
91/*
92 * Change the requested timestamp in the given inode.
93 * We don't lock across timestamp updates, and we don't log them but
94 * we do record the fact that there is dirty information in core.
95 *
96 * NOTE -- callers MUST combine XFS_ICHGTIME_MOD or XFS_ICHGTIME_CHG
97 * with XFS_ICHGTIME_ACC to be sure that access time
98 * update will take. Calling first with XFS_ICHGTIME_ACC
99 * and then XFS_ICHGTIME_MOD may fail to modify the access
100 * timestamp if the filesystem is mounted noacctm.
101 */
102void
103xfs_ichgtime(
104 xfs_inode_t *ip,
105 int flags)
106{
ec86dc02 107 struct inode *inode = vn_to_inode(XFS_ITOV(ip));
4aeb664c
NS
108 timespec_t tv;
109
4aeb664c
NS
110 nanotime(&tv);
111 if (flags & XFS_ICHGTIME_MOD) {
112 inode->i_mtime = tv;
113 ip->i_d.di_mtime.t_sec = (__int32_t)tv.tv_sec;
114 ip->i_d.di_mtime.t_nsec = (__int32_t)tv.tv_nsec;
115 }
116 if (flags & XFS_ICHGTIME_ACC) {
117 inode->i_atime = tv;
118 ip->i_d.di_atime.t_sec = (__int32_t)tv.tv_sec;
119 ip->i_d.di_atime.t_nsec = (__int32_t)tv.tv_nsec;
120 }
121 if (flags & XFS_ICHGTIME_CHG) {
122 inode->i_ctime = tv;
123 ip->i_d.di_ctime.t_sec = (__int32_t)tv.tv_sec;
124 ip->i_d.di_ctime.t_nsec = (__int32_t)tv.tv_nsec;
125 }
126
127 /*
128 * We update the i_update_core field _after_ changing
129 * the timestamps in order to coordinate properly with
130 * xfs_iflush() so that we don't lose timestamp updates.
131 * This keeps us from having to hold the inode lock
132 * while doing this. We use the SYNCHRONIZE macro to
133 * ensure that the compiler does not reorder the update
134 * of i_update_core above the timestamp updates above.
135 */
136 SYNCHRONIZE();
137 ip->i_update_core = 1;
138 if (!(inode->i_state & I_LOCK))
139 mark_inode_dirty_sync(inode);
140}
141
142/*
143 * Variant on the above which avoids querying the system clock
144 * in situations where we know the Linux inode timestamps have
145 * just been updated (and so we can update our inode cheaply).
4aeb664c
NS
146 */
147void
148xfs_ichgtime_fast(
149 xfs_inode_t *ip,
150 struct inode *inode,
151 int flags)
152{
153 timespec_t *tvp;
154
155 /*
42fe2b1f
CH
156 * Atime updates for read() & friends are handled lazily now, and
157 * explicit updates must go through xfs_ichgtime()
4aeb664c 158 */
42fe2b1f 159 ASSERT((flags & XFS_ICHGTIME_ACC) == 0);
4aeb664c
NS
160
161 /*
42fe2b1f
CH
162 * We're not supposed to change timestamps in readonly-mounted
163 * filesystems. Throw it away if anyone asks us.
4aeb664c 164 */
42fe2b1f 165 if (unlikely(IS_RDONLY(inode)))
4aeb664c
NS
166 return;
167
168 if (flags & XFS_ICHGTIME_MOD) {
169 tvp = &inode->i_mtime;
170 ip->i_d.di_mtime.t_sec = (__int32_t)tvp->tv_sec;
171 ip->i_d.di_mtime.t_nsec = (__int32_t)tvp->tv_nsec;
172 }
4aeb664c
NS
173 if (flags & XFS_ICHGTIME_CHG) {
174 tvp = &inode->i_ctime;
175 ip->i_d.di_ctime.t_sec = (__int32_t)tvp->tv_sec;
176 ip->i_d.di_ctime.t_nsec = (__int32_t)tvp->tv_nsec;
177 }
178
179 /*
180 * We update the i_update_core field _after_ changing
181 * the timestamps in order to coordinate properly with
182 * xfs_iflush() so that we don't lose timestamp updates.
183 * This keeps us from having to hold the inode lock
184 * while doing this. We use the SYNCHRONIZE macro to
185 * ensure that the compiler does not reorder the update
186 * of i_update_core above the timestamp updates above.
187 */
188 SYNCHRONIZE();
189 ip->i_update_core = 1;
190 if (!(inode->i_state & I_LOCK))
191 mark_inode_dirty_sync(inode);
192}
193
1da177e4
LT
194
195/*
196 * Pull the link count and size up from the xfs inode to the linux inode
197 */
198STATIC void
416c6d5b 199xfs_validate_fields(
220b5284 200 struct inode *ip,
8285fb58 201 bhv_vattr_t *vattr)
1da177e4 202{
220b5284 203 vattr->va_mask = XFS_AT_NLINK|XFS_AT_SIZE|XFS_AT_NBLOCKS;
67fcaa73 204 if (!bhv_vop_getattr(vn_from_inode(ip), vattr, ATTR_LAZY, NULL)) {
220b5284
NS
205 ip->i_nlink = vattr->va_nlink;
206 ip->i_blocks = vattr->va_nblocks;
1da177e4 207
220b5284
NS
208 /* we're under i_sem so i_size can't change under us */
209 if (i_size_read(ip) != vattr->va_size)
210 i_size_write(ip, vattr->va_size);
1da177e4
LT
211 }
212}
213
446ada4a
NS
214/*
215 * Hook in SELinux. This is not quite correct yet, what we really need
216 * here (as we do for default ACLs) is a mechanism by which creation of
217 * these attrs can be journalled at inode creation time (along with the
218 * inode, of course, such that log replay can't cause these to be lost).
219 */
220STATIC int
416c6d5b 221xfs_init_security(
67fcaa73 222 bhv_vnode_t *vp,
446ada4a
NS
223 struct inode *dir)
224{
ec86dc02 225 struct inode *ip = vn_to_inode(vp);
446ada4a
NS
226 size_t length;
227 void *value;
228 char *name;
229 int error;
230
231 error = security_inode_init_security(ip, dir, &name, &value, &length);
232 if (error) {
233 if (error == -EOPNOTSUPP)
234 return 0;
235 return -error;
236 }
237
67fcaa73 238 error = bhv_vop_attr_set(vp, name, value, length, ATTR_SECURE, NULL);
446ada4a
NS
239 if (!error)
240 VMODIFY(vp);
241
242 kfree(name);
243 kfree(value);
244 return error;
245}
246
1da177e4
LT
247/*
248 * Determine whether a process has a valid fs_struct (kernel daemons
249 * like knfsd don't have an fs_struct).
250 *
251 * XXX(hch): nfsd is broken, better fix it instead.
252 */
7989cb8e 253STATIC_INLINE int
416c6d5b 254xfs_has_fs_struct(struct task_struct *task)
1da177e4
LT
255{
256 return (task->fs != init_task.fs);
257}
258
7989cb8e 259STATIC void
416c6d5b 260xfs_cleanup_inode(
67fcaa73
NS
261 bhv_vnode_t *dvp,
262 bhv_vnode_t *vp,
220b5284 263 struct dentry *dentry,
3a69c7dc
YL
264 int mode)
265{
266 struct dentry teardown = {};
3a69c7dc
YL
267
268 /* Oh, the horror.
220b5284 269 * If we can't add the ACL or we fail in
416c6d5b 270 * xfs_init_security we must back out.
3a69c7dc
YL
271 * ENOSPC can hit here, among other things.
272 */
ec86dc02 273 teardown.d_inode = vn_to_inode(vp);
3a69c7dc
YL
274 teardown.d_name = dentry->d_name;
275
276 if (S_ISDIR(mode))
67fcaa73 277 bhv_vop_rmdir(dvp, &teardown, NULL);
3a69c7dc 278 else
67fcaa73 279 bhv_vop_remove(dvp, &teardown, NULL);
3a69c7dc
YL
280 VN_RELE(vp);
281}
282
1da177e4 283STATIC int
416c6d5b 284xfs_vn_mknod(
1da177e4
LT
285 struct inode *dir,
286 struct dentry *dentry,
287 int mode,
288 dev_t rdev)
289{
290 struct inode *ip;
8285fb58 291 bhv_vattr_t vattr = { 0 };
67fcaa73 292 bhv_vnode_t *vp = NULL, *dvp = vn_from_inode(dir);
1da177e4
LT
293 xfs_acl_t *default_acl = NULL;
294 attrexists_t test_default_acl = _ACL_DEFAULT_EXISTS;
295 int error;
296
297 /*
298 * Irix uses Missed'em'V split, but doesn't want to see
299 * the upper 5 bits of (14bit) major.
300 */
220b5284 301 if (unlikely(!sysv_valid_dev(rdev) || MAJOR(rdev) & ~0x1ff))
1da177e4
LT
302 return -EINVAL;
303
220b5284
NS
304 if (unlikely(test_default_acl && test_default_acl(dvp))) {
305 if (!_ACL_ALLOC(default_acl)) {
1da177e4 306 return -ENOMEM;
220b5284 307 }
1da177e4
LT
308 if (!_ACL_GET_DEFAULT(dvp, default_acl)) {
309 _ACL_FREE(default_acl);
310 default_acl = NULL;
311 }
312 }
313
416c6d5b 314 if (IS_POSIXACL(dir) && !default_acl && xfs_has_fs_struct(current))
1da177e4
LT
315 mode &= ~current->fs->umask;
316
524fbf5d
NS
317 vattr.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
318 vattr.va_mode = mode;
1da177e4
LT
319
320 switch (mode & S_IFMT) {
321 case S_IFCHR: case S_IFBLK: case S_IFIFO: case S_IFSOCK:
524fbf5d
NS
322 vattr.va_rdev = sysv_encode_dev(rdev);
323 vattr.va_mask |= XFS_AT_RDEV;
1da177e4
LT
324 /*FALLTHROUGH*/
325 case S_IFREG:
67fcaa73 326 error = bhv_vop_create(dvp, dentry, &vattr, &vp, NULL);
1da177e4
LT
327 break;
328 case S_IFDIR:
67fcaa73 329 error = bhv_vop_mkdir(dvp, dentry, &vattr, &vp, NULL);
1da177e4
LT
330 break;
331 default:
332 error = EINVAL;
333 break;
334 }
335
220b5284 336 if (unlikely(!error)) {
416c6d5b 337 error = xfs_init_security(vp, dir);
3a69c7dc 338 if (error)
416c6d5b 339 xfs_cleanup_inode(dvp, vp, dentry, mode);
3a69c7dc 340 }
446ada4a 341
220b5284 342 if (unlikely(default_acl)) {
1da177e4 343 if (!error) {
524fbf5d 344 error = _ACL_INHERIT(vp, &vattr, default_acl);
220b5284 345 if (!error)
1da177e4 346 VMODIFY(vp);
3a69c7dc 347 else
416c6d5b 348 xfs_cleanup_inode(dvp, vp, dentry, mode);
1da177e4
LT
349 }
350 _ACL_FREE(default_acl);
351 }
352
220b5284 353 if (likely(!error)) {
1da177e4 354 ASSERT(vp);
ec86dc02 355 ip = vn_to_inode(vp);
1da177e4
LT
356
357 if (S_ISCHR(mode) || S_ISBLK(mode))
358 ip->i_rdev = rdev;
359 else if (S_ISDIR(mode))
524fbf5d 360 xfs_validate_fields(ip, &vattr);
1da177e4 361 d_instantiate(dentry, ip);
524fbf5d 362 xfs_validate_fields(dir, &vattr);
1da177e4
LT
363 }
364 return -error;
365}
366
367STATIC int
416c6d5b 368xfs_vn_create(
1da177e4
LT
369 struct inode *dir,
370 struct dentry *dentry,
371 int mode,
372 struct nameidata *nd)
373{
416c6d5b 374 return xfs_vn_mknod(dir, dentry, mode, 0);
1da177e4
LT
375}
376
377STATIC int
416c6d5b 378xfs_vn_mkdir(
1da177e4
LT
379 struct inode *dir,
380 struct dentry *dentry,
381 int mode)
382{
416c6d5b 383 return xfs_vn_mknod(dir, dentry, mode|S_IFDIR, 0);
1da177e4
LT
384}
385
386STATIC struct dentry *
416c6d5b 387xfs_vn_lookup(
1da177e4
LT
388 struct inode *dir,
389 struct dentry *dentry,
390 struct nameidata *nd)
391{
67fcaa73 392 bhv_vnode_t *vp = vn_from_inode(dir), *cvp;
1da177e4
LT
393 int error;
394
395 if (dentry->d_name.len >= MAXNAMELEN)
396 return ERR_PTR(-ENAMETOOLONG);
397
67fcaa73
NS
398 error = bhv_vop_lookup(vp, dentry, &cvp, 0, NULL, NULL);
399 if (unlikely(error)) {
1da177e4
LT
400 if (unlikely(error != ENOENT))
401 return ERR_PTR(-error);
402 d_add(dentry, NULL);
403 return NULL;
404 }
405
ec86dc02 406 return d_splice_alias(vn_to_inode(cvp), dentry);
1da177e4
LT
407}
408
409STATIC int
416c6d5b 410xfs_vn_link(
1da177e4
LT
411 struct dentry *old_dentry,
412 struct inode *dir,
413 struct dentry *dentry)
414{
415 struct inode *ip; /* inode of guy being linked to */
67fcaa73
NS
416 bhv_vnode_t *tdvp; /* target directory for new name/link */
417 bhv_vnode_t *vp; /* vp of name being linked */
8285fb58 418 bhv_vattr_t vattr;
1da177e4
LT
419 int error;
420
421 ip = old_dentry->d_inode; /* inode being linked to */
ec86dc02
NS
422 tdvp = vn_from_inode(dir);
423 vp = vn_from_inode(ip);
1da177e4 424
97dfd70c 425 VN_HOLD(vp);
67fcaa73 426 error = bhv_vop_link(tdvp, vp, dentry, NULL);
97dfd70c
NS
427 if (unlikely(error)) {
428 VN_RELE(vp);
429 } else {
1da177e4 430 VMODIFY(tdvp);
524fbf5d 431 xfs_validate_fields(ip, &vattr);
1da177e4
LT
432 d_instantiate(dentry, ip);
433 }
434 return -error;
435}
436
437STATIC int
416c6d5b 438xfs_vn_unlink(
1da177e4
LT
439 struct inode *dir,
440 struct dentry *dentry)
441{
442 struct inode *inode;
67fcaa73 443 bhv_vnode_t *dvp; /* directory containing name to remove */
8285fb58 444 bhv_vattr_t vattr;
1da177e4
LT
445 int error;
446
447 inode = dentry->d_inode;
ec86dc02 448 dvp = vn_from_inode(dir);
1da177e4 449
67fcaa73 450 error = bhv_vop_remove(dvp, dentry, NULL);
220b5284 451 if (likely(!error)) {
524fbf5d
NS
452 xfs_validate_fields(dir, &vattr); /* size needs update */
453 xfs_validate_fields(inode, &vattr);
1da177e4 454 }
1da177e4
LT
455 return -error;
456}
457
458STATIC int
416c6d5b 459xfs_vn_symlink(
1da177e4
LT
460 struct inode *dir,
461 struct dentry *dentry,
462 const char *symname)
463{
464 struct inode *ip;
8285fb58 465 bhv_vattr_t va = { 0 };
67fcaa73
NS
466 bhv_vnode_t *dvp; /* directory containing name of symlink */
467 bhv_vnode_t *cvp; /* used to lookup symlink to put in dentry */
1da177e4
LT
468 int error;
469
ec86dc02 470 dvp = vn_from_inode(dir);
1da177e4
LT
471 cvp = NULL;
472
67fcaa73 473 va.va_mode = S_IFLNK |
0432dab2 474 (irix_symlink_mode ? 0777 & ~current->fs->umask : S_IRWXUGO);
67fcaa73 475 va.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
1da177e4 476
67fcaa73 477 error = bhv_vop_symlink(dvp, dentry, &va, (char *)symname, &cvp, NULL);
54245702 478 if (likely(!error && cvp)) {
416c6d5b 479 error = xfs_init_security(cvp, dir);
54245702 480 if (likely(!error)) {
ec86dc02 481 ip = vn_to_inode(cvp);
54245702 482 d_instantiate(dentry, ip);
67fcaa73
NS
483 xfs_validate_fields(dir, &va);
484 xfs_validate_fields(ip, &va);
ce9d37c2
NS
485 } else {
486 xfs_cleanup_inode(dvp, cvp, dentry, 0);
54245702 487 }
1da177e4
LT
488 }
489 return -error;
490}
491
492STATIC int
416c6d5b 493xfs_vn_rmdir(
1da177e4
LT
494 struct inode *dir,
495 struct dentry *dentry)
496{
497 struct inode *inode = dentry->d_inode;
67fcaa73 498 bhv_vnode_t *dvp = vn_from_inode(dir);
8285fb58 499 bhv_vattr_t vattr;
1da177e4
LT
500 int error;
501
67fcaa73 502 error = bhv_vop_rmdir(dvp, dentry, NULL);
220b5284 503 if (likely(!error)) {
524fbf5d
NS
504 xfs_validate_fields(inode, &vattr);
505 xfs_validate_fields(dir, &vattr);
1da177e4
LT
506 }
507 return -error;
508}
509
510STATIC int
416c6d5b 511xfs_vn_rename(
1da177e4
LT
512 struct inode *odir,
513 struct dentry *odentry,
514 struct inode *ndir,
515 struct dentry *ndentry)
516{
517 struct inode *new_inode = ndentry->d_inode;
67fcaa73
NS
518 bhv_vnode_t *fvp; /* from directory */
519 bhv_vnode_t *tvp; /* target directory */
8285fb58 520 bhv_vattr_t vattr;
1da177e4
LT
521 int error;
522
ec86dc02
NS
523 fvp = vn_from_inode(odir);
524 tvp = vn_from_inode(ndir);
1da177e4 525
67fcaa73 526 error = bhv_vop_rename(fvp, odentry, tvp, ndentry, NULL);
220b5284
NS
527 if (likely(!error)) {
528 if (new_inode)
524fbf5d
NS
529 xfs_validate_fields(new_inode, &vattr);
530 xfs_validate_fields(odir, &vattr);
220b5284 531 if (ndir != odir)
524fbf5d 532 xfs_validate_fields(ndir, &vattr);
220b5284 533 }
220b5284 534 return -error;
1da177e4
LT
535}
536
537/*
538 * careful here - this function can get called recursively, so
539 * we need to be very careful about how much stack we use.
540 * uio is kmalloced for this reason...
541 */
008b150a 542STATIC void *
416c6d5b 543xfs_vn_follow_link(
1da177e4
LT
544 struct dentry *dentry,
545 struct nameidata *nd)
546{
67fcaa73 547 bhv_vnode_t *vp;
1da177e4
LT
548 uio_t *uio;
549 iovec_t iov;
550 int error;
551 char *link;
552
553 ASSERT(dentry);
554 ASSERT(nd);
555
f52720ca 556 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
1da177e4
LT
557 if (!link) {
558 nd_set_link(nd, ERR_PTR(-ENOMEM));
008b150a 559 return NULL;
1da177e4
LT
560 }
561
f52720ca 562 uio = kmalloc(sizeof(uio_t), GFP_KERNEL);
1da177e4
LT
563 if (!uio) {
564 kfree(link);
565 nd_set_link(nd, ERR_PTR(-ENOMEM));
008b150a 566 return NULL;
1da177e4
LT
567 }
568
ec86dc02 569 vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
570
571 iov.iov_base = link;
0d1335b3 572 iov.iov_len = MAXPATHLEN;
1da177e4
LT
573
574 uio->uio_iov = &iov;
575 uio->uio_offset = 0;
576 uio->uio_segflg = UIO_SYSSPACE;
0d1335b3 577 uio->uio_resid = MAXPATHLEN;
1da177e4
LT
578 uio->uio_iovcnt = 1;
579
67fcaa73
NS
580 error = bhv_vop_readlink(vp, uio, 0, NULL);
581 if (unlikely(error)) {
1da177e4
LT
582 kfree(link);
583 link = ERR_PTR(-error);
584 } else {
0d1335b3 585 link[MAXPATHLEN - uio->uio_resid] = '\0';
1da177e4
LT
586 }
587 kfree(uio);
588
589 nd_set_link(nd, link);
008b150a 590 return NULL;
1da177e4
LT
591}
592
cde410a9 593STATIC void
416c6d5b 594xfs_vn_put_link(
cde410a9
NS
595 struct dentry *dentry,
596 struct nameidata *nd,
597 void *p)
1da177e4 598{
cde410a9
NS
599 char *s = nd_get_link(nd);
600
1da177e4
LT
601 if (!IS_ERR(s))
602 kfree(s);
603}
604
605#ifdef CONFIG_XFS_POSIX_ACL
606STATIC int
416c6d5b 607xfs_vn_permission(
1da177e4
LT
608 struct inode *inode,
609 int mode,
610 struct nameidata *nd)
611{
67fcaa73 612 return -bhv_vop_access(vn_from_inode(inode), mode << 6, NULL);
1da177e4
LT
613}
614#else
416c6d5b 615#define xfs_vn_permission NULL
1da177e4
LT
616#endif
617
618STATIC int
416c6d5b 619xfs_vn_getattr(
1da177e4
LT
620 struct vfsmount *mnt,
621 struct dentry *dentry,
622 struct kstat *stat)
623{
624 struct inode *inode = dentry->d_inode;
67fcaa73 625 bhv_vnode_t *vp = vn_from_inode(inode);
69e23b9a
NS
626 bhv_vattr_t vattr = { .va_mask = XFS_AT_STAT };
627 int error;
1da177e4 628
69e23b9a
NS
629 error = bhv_vop_getattr(vp, &vattr, ATTR_LAZY, NULL);
630 if (likely(!error)) {
631 stat->size = i_size_read(inode);
632 stat->dev = inode->i_sb->s_dev;
633 stat->rdev = (vattr.va_rdev == 0) ? 0 :
634 MKDEV(sysv_major(vattr.va_rdev) & 0x1ff,
635 sysv_minor(vattr.va_rdev));
636 stat->mode = vattr.va_mode;
637 stat->nlink = vattr.va_nlink;
638 stat->uid = vattr.va_uid;
639 stat->gid = vattr.va_gid;
640 stat->ino = vattr.va_nodeid;
641 stat->atime = vattr.va_atime;
642 stat->mtime = vattr.va_mtime;
643 stat->ctime = vattr.va_ctime;
644 stat->blocks = vattr.va_nblocks;
645 stat->blksize = vattr.va_blocksize;
646 }
b76963fa 647 return -error;
1da177e4
LT
648}
649
650STATIC int
416c6d5b 651xfs_vn_setattr(
1da177e4
LT
652 struct dentry *dentry,
653 struct iattr *attr)
654{
655 struct inode *inode = dentry->d_inode;
656 unsigned int ia_valid = attr->ia_valid;
67fcaa73 657 bhv_vnode_t *vp = vn_from_inode(inode);
8285fb58 658 bhv_vattr_t vattr = { 0 };
1da177e4
LT
659 int flags = 0;
660 int error;
661
1da177e4
LT
662 if (ia_valid & ATTR_UID) {
663 vattr.va_mask |= XFS_AT_UID;
664 vattr.va_uid = attr->ia_uid;
665 }
666 if (ia_valid & ATTR_GID) {
667 vattr.va_mask |= XFS_AT_GID;
668 vattr.va_gid = attr->ia_gid;
669 }
670 if (ia_valid & ATTR_SIZE) {
671 vattr.va_mask |= XFS_AT_SIZE;
672 vattr.va_size = attr->ia_size;
673 }
674 if (ia_valid & ATTR_ATIME) {
675 vattr.va_mask |= XFS_AT_ATIME;
676 vattr.va_atime = attr->ia_atime;
8c0b5113 677 inode->i_atime = attr->ia_atime;
1da177e4
LT
678 }
679 if (ia_valid & ATTR_MTIME) {
680 vattr.va_mask |= XFS_AT_MTIME;
681 vattr.va_mtime = attr->ia_mtime;
682 }
683 if (ia_valid & ATTR_CTIME) {
684 vattr.va_mask |= XFS_AT_CTIME;
685 vattr.va_ctime = attr->ia_ctime;
686 }
687 if (ia_valid & ATTR_MODE) {
688 vattr.va_mask |= XFS_AT_MODE;
689 vattr.va_mode = attr->ia_mode;
690 if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID))
691 inode->i_mode &= ~S_ISGID;
692 }
693
694 if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET))
695 flags |= ATTR_UTIME;
696#ifdef ATTR_NO_BLOCK
697 if ((ia_valid & ATTR_NO_BLOCK))
698 flags |= ATTR_NONBLOCK;
699#endif
700
67fcaa73 701 error = bhv_vop_setattr(vp, &vattr, flags, NULL);
220b5284
NS
702 if (likely(!error))
703 __vn_revalidate(vp, &vattr);
704 return -error;
1da177e4
LT
705}
706
707STATIC void
416c6d5b 708xfs_vn_truncate(
1da177e4
LT
709 struct inode *inode)
710{
c2536668 711 block_truncate_page(inode->i_mapping, inode->i_size, xfs_get_blocks);
1da177e4
LT
712}
713
714STATIC int
416c6d5b 715xfs_vn_setxattr(
1da177e4
LT
716 struct dentry *dentry,
717 const char *name,
718 const void *data,
719 size_t size,
720 int flags)
721{
67fcaa73 722 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
723 char *attr = (char *)name;
724 attrnames_t *namesp;
725 int xflags = 0;
726 int error;
727
728 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
729 if (!namesp)
730 return -EOPNOTSUPP;
731 attr += namesp->attr_namelen;
732 error = namesp->attr_capable(vp, NULL);
733 if (error)
734 return error;
735
736 /* Convert Linux syscall to XFS internal ATTR flags */
737 if (flags & XATTR_CREATE)
738 xflags |= ATTR_CREATE;
739 if (flags & XATTR_REPLACE)
740 xflags |= ATTR_REPLACE;
741 xflags |= namesp->attr_flag;
742 return namesp->attr_set(vp, attr, (void *)data, size, xflags);
743}
744
745STATIC ssize_t
416c6d5b 746xfs_vn_getxattr(
1da177e4
LT
747 struct dentry *dentry,
748 const char *name,
749 void *data,
750 size_t size)
751{
67fcaa73 752 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
753 char *attr = (char *)name;
754 attrnames_t *namesp;
755 int xflags = 0;
756 ssize_t error;
757
758 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
759 if (!namesp)
760 return -EOPNOTSUPP;
761 attr += namesp->attr_namelen;
762 error = namesp->attr_capable(vp, NULL);
763 if (error)
764 return error;
765
766 /* Convert Linux syscall to XFS internal ATTR flags */
767 if (!size) {
768 xflags |= ATTR_KERNOVAL;
769 data = NULL;
770 }
771 xflags |= namesp->attr_flag;
772 return namesp->attr_get(vp, attr, (void *)data, size, xflags);
773}
774
775STATIC ssize_t
416c6d5b 776xfs_vn_listxattr(
1da177e4
LT
777 struct dentry *dentry,
778 char *data,
779 size_t size)
780{
67fcaa73 781 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
782 int error, xflags = ATTR_KERNAMELS;
783 ssize_t result;
784
785 if (!size)
786 xflags |= ATTR_KERNOVAL;
787 xflags |= capable(CAP_SYS_ADMIN) ? ATTR_KERNFULLS : ATTR_KERNORMALS;
788
789 error = attr_generic_list(vp, data, size, xflags, &result);
790 if (error < 0)
791 return error;
792 return result;
793}
794
795STATIC int
416c6d5b 796xfs_vn_removexattr(
1da177e4
LT
797 struct dentry *dentry,
798 const char *name)
799{
67fcaa73 800 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
801 char *attr = (char *)name;
802 attrnames_t *namesp;
803 int xflags = 0;
804 int error;
805
806 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
807 if (!namesp)
808 return -EOPNOTSUPP;
809 attr += namesp->attr_namelen;
810 error = namesp->attr_capable(vp, NULL);
811 if (error)
812 return error;
813 xflags |= namesp->attr_flag;
814 return namesp->attr_remove(vp, attr, xflags);
815}
816
817
416c6d5b
NS
818struct inode_operations xfs_inode_operations = {
819 .permission = xfs_vn_permission,
820 .truncate = xfs_vn_truncate,
821 .getattr = xfs_vn_getattr,
822 .setattr = xfs_vn_setattr,
823 .setxattr = xfs_vn_setxattr,
824 .getxattr = xfs_vn_getxattr,
825 .listxattr = xfs_vn_listxattr,
826 .removexattr = xfs_vn_removexattr,
1da177e4
LT
827};
828
416c6d5b
NS
829struct inode_operations xfs_dir_inode_operations = {
830 .create = xfs_vn_create,
831 .lookup = xfs_vn_lookup,
832 .link = xfs_vn_link,
833 .unlink = xfs_vn_unlink,
834 .symlink = xfs_vn_symlink,
835 .mkdir = xfs_vn_mkdir,
836 .rmdir = xfs_vn_rmdir,
837 .mknod = xfs_vn_mknod,
838 .rename = xfs_vn_rename,
839 .permission = xfs_vn_permission,
840 .getattr = xfs_vn_getattr,
841 .setattr = xfs_vn_setattr,
842 .setxattr = xfs_vn_setxattr,
843 .getxattr = xfs_vn_getxattr,
844 .listxattr = xfs_vn_listxattr,
845 .removexattr = xfs_vn_removexattr,
1da177e4
LT
846};
847
416c6d5b 848struct inode_operations xfs_symlink_inode_operations = {
1da177e4 849 .readlink = generic_readlink,
416c6d5b
NS
850 .follow_link = xfs_vn_follow_link,
851 .put_link = xfs_vn_put_link,
852 .permission = xfs_vn_permission,
853 .getattr = xfs_vn_getattr,
854 .setattr = xfs_vn_setattr,
855 .setxattr = xfs_vn_setxattr,
856 .getxattr = xfs_vn_getxattr,
857 .listxattr = xfs_vn_listxattr,
858 .removexattr = xfs_vn_removexattr,
1da177e4 859};