]>
Commit | Line | Data |
---|---|---|
1da177e4 | 1 | /* |
7b718769 NS |
2 | * Copyright (c) 2000-2005 Silicon Graphics, Inc. |
3 | * All Rights Reserved. | |
1da177e4 | 4 | * |
7b718769 NS |
5 | * This program is free software; you can redistribute it and/or |
6 | * modify it under the terms of the GNU General Public License as | |
1da177e4 LT |
7 | * published by the Free Software Foundation. |
8 | * | |
7b718769 NS |
9 | * This program is distributed in the hope that it would be useful, |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
1da177e4 | 13 | * |
7b718769 NS |
14 | * You should have received a copy of the GNU General Public License |
15 | * along with this program; if not, write the Free Software Foundation, | |
16 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
1da177e4 | 17 | */ |
1da177e4 LT |
18 | #include "xfs.h" |
19 | #include "xfs_fs.h" | |
a844f451 | 20 | #include "xfs_bit.h" |
1da177e4 | 21 | #include "xfs_log.h" |
a844f451 | 22 | #include "xfs_inum.h" |
1da177e4 LT |
23 | #include "xfs_trans.h" |
24 | #include "xfs_sb.h" | |
25 | #include "xfs_ag.h" | |
1da177e4 LT |
26 | #include "xfs_dir2.h" |
27 | #include "xfs_alloc.h" | |
28 | #include "xfs_dmapi.h" | |
29 | #include "xfs_quota.h" | |
30 | #include "xfs_mount.h" | |
1da177e4 | 31 | #include "xfs_bmap_btree.h" |
a844f451 | 32 | #include "xfs_alloc_btree.h" |
1da177e4 | 33 | #include "xfs_ialloc_btree.h" |
1da177e4 | 34 | #include "xfs_dir2_sf.h" |
a844f451 | 35 | #include "xfs_attr_sf.h" |
1da177e4 LT |
36 | #include "xfs_dinode.h" |
37 | #include "xfs_inode.h" | |
38 | #include "xfs_bmap.h" | |
a844f451 NS |
39 | #include "xfs_btree.h" |
40 | #include "xfs_ialloc.h" | |
1da177e4 LT |
41 | #include "xfs_rtalloc.h" |
42 | #include "xfs_error.h" | |
43 | #include "xfs_itable.h" | |
44 | #include "xfs_rw.h" | |
45 | #include "xfs_acl.h" | |
1da177e4 LT |
46 | #include "xfs_attr.h" |
47 | #include "xfs_buf_item.h" | |
48 | #include "xfs_utils.h" | |
49 | ||
16f7e0fe | 50 | #include <linux/capability.h> |
1da177e4 LT |
51 | #include <linux/xattr.h> |
52 | #include <linux/namei.h> | |
446ada4a | 53 | #include <linux/security.h> |
1da177e4 | 54 | |
75e17b3c CH |
55 | /* |
56 | * Get a XFS inode from a given vnode. | |
57 | */ | |
58 | xfs_inode_t * | |
59 | xfs_vtoi( | |
67fcaa73 | 60 | bhv_vnode_t *vp) |
75e17b3c CH |
61 | { |
62 | bhv_desc_t *bdp; | |
63 | ||
64 | bdp = bhv_lookup_range(VN_BHV_HEAD(vp), | |
65 | VNODE_POSITION_XFS, VNODE_POSITION_XFS); | |
66 | if (unlikely(bdp == NULL)) | |
67 | return NULL; | |
68 | return XFS_BHVTOI(bdp); | |
69 | } | |
70 | ||
42fe2b1f CH |
71 | /* |
72 | * Bring the atime in the XFS inode uptodate. | |
73 | * Used before logging the inode to disk or when the Linux inode goes away. | |
74 | */ | |
75 | void | |
76 | xfs_synchronize_atime( | |
77 | xfs_inode_t *ip) | |
78 | { | |
67fcaa73 | 79 | bhv_vnode_t *vp; |
42fe2b1f CH |
80 | |
81 | vp = XFS_ITOV_NULL(ip); | |
82 | if (vp) { | |
83 | struct inode *inode = &vp->v_inode; | |
84 | ip->i_d.di_atime.t_sec = (__int32_t)inode->i_atime.tv_sec; | |
85 | ip->i_d.di_atime.t_nsec = (__int32_t)inode->i_atime.tv_nsec; | |
86 | } | |
87 | } | |
88 | ||
4aeb664c NS |
89 | /* |
90 | * Change the requested timestamp in the given inode. | |
91 | * We don't lock across timestamp updates, and we don't log them but | |
92 | * we do record the fact that there is dirty information in core. | |
93 | * | |
94 | * NOTE -- callers MUST combine XFS_ICHGTIME_MOD or XFS_ICHGTIME_CHG | |
95 | * with XFS_ICHGTIME_ACC to be sure that access time | |
96 | * update will take. Calling first with XFS_ICHGTIME_ACC | |
97 | * and then XFS_ICHGTIME_MOD may fail to modify the access | |
98 | * timestamp if the filesystem is mounted noacctm. | |
99 | */ | |
100 | void | |
101 | xfs_ichgtime( | |
102 | xfs_inode_t *ip, | |
103 | int flags) | |
104 | { | |
ec86dc02 | 105 | struct inode *inode = vn_to_inode(XFS_ITOV(ip)); |
4aeb664c NS |
106 | timespec_t tv; |
107 | ||
4aeb664c NS |
108 | nanotime(&tv); |
109 | if (flags & XFS_ICHGTIME_MOD) { | |
110 | inode->i_mtime = tv; | |
111 | ip->i_d.di_mtime.t_sec = (__int32_t)tv.tv_sec; | |
112 | ip->i_d.di_mtime.t_nsec = (__int32_t)tv.tv_nsec; | |
113 | } | |
114 | if (flags & XFS_ICHGTIME_ACC) { | |
115 | inode->i_atime = tv; | |
116 | ip->i_d.di_atime.t_sec = (__int32_t)tv.tv_sec; | |
117 | ip->i_d.di_atime.t_nsec = (__int32_t)tv.tv_nsec; | |
118 | } | |
119 | if (flags & XFS_ICHGTIME_CHG) { | |
120 | inode->i_ctime = tv; | |
121 | ip->i_d.di_ctime.t_sec = (__int32_t)tv.tv_sec; | |
122 | ip->i_d.di_ctime.t_nsec = (__int32_t)tv.tv_nsec; | |
123 | } | |
124 | ||
125 | /* | |
126 | * We update the i_update_core field _after_ changing | |
127 | * the timestamps in order to coordinate properly with | |
128 | * xfs_iflush() so that we don't lose timestamp updates. | |
129 | * This keeps us from having to hold the inode lock | |
130 | * while doing this. We use the SYNCHRONIZE macro to | |
131 | * ensure that the compiler does not reorder the update | |
132 | * of i_update_core above the timestamp updates above. | |
133 | */ | |
134 | SYNCHRONIZE(); | |
135 | ip->i_update_core = 1; | |
136 | if (!(inode->i_state & I_LOCK)) | |
137 | mark_inode_dirty_sync(inode); | |
138 | } | |
139 | ||
140 | /* | |
141 | * Variant on the above which avoids querying the system clock | |
142 | * in situations where we know the Linux inode timestamps have | |
143 | * just been updated (and so we can update our inode cheaply). | |
4aeb664c NS |
144 | */ |
145 | void | |
146 | xfs_ichgtime_fast( | |
147 | xfs_inode_t *ip, | |
148 | struct inode *inode, | |
149 | int flags) | |
150 | { | |
151 | timespec_t *tvp; | |
152 | ||
153 | /* | |
42fe2b1f CH |
154 | * Atime updates for read() & friends are handled lazily now, and |
155 | * explicit updates must go through xfs_ichgtime() | |
4aeb664c | 156 | */ |
42fe2b1f | 157 | ASSERT((flags & XFS_ICHGTIME_ACC) == 0); |
4aeb664c NS |
158 | |
159 | /* | |
42fe2b1f CH |
160 | * We're not supposed to change timestamps in readonly-mounted |
161 | * filesystems. Throw it away if anyone asks us. | |
4aeb664c | 162 | */ |
42fe2b1f | 163 | if (unlikely(IS_RDONLY(inode))) |
4aeb664c NS |
164 | return; |
165 | ||
166 | if (flags & XFS_ICHGTIME_MOD) { | |
167 | tvp = &inode->i_mtime; | |
168 | ip->i_d.di_mtime.t_sec = (__int32_t)tvp->tv_sec; | |
169 | ip->i_d.di_mtime.t_nsec = (__int32_t)tvp->tv_nsec; | |
170 | } | |
4aeb664c NS |
171 | if (flags & XFS_ICHGTIME_CHG) { |
172 | tvp = &inode->i_ctime; | |
173 | ip->i_d.di_ctime.t_sec = (__int32_t)tvp->tv_sec; | |
174 | ip->i_d.di_ctime.t_nsec = (__int32_t)tvp->tv_nsec; | |
175 | } | |
176 | ||
177 | /* | |
178 | * We update the i_update_core field _after_ changing | |
179 | * the timestamps in order to coordinate properly with | |
180 | * xfs_iflush() so that we don't lose timestamp updates. | |
181 | * This keeps us from having to hold the inode lock | |
182 | * while doing this. We use the SYNCHRONIZE macro to | |
183 | * ensure that the compiler does not reorder the update | |
184 | * of i_update_core above the timestamp updates above. | |
185 | */ | |
186 | SYNCHRONIZE(); | |
187 | ip->i_update_core = 1; | |
188 | if (!(inode->i_state & I_LOCK)) | |
189 | mark_inode_dirty_sync(inode); | |
190 | } | |
191 | ||
1da177e4 LT |
192 | |
193 | /* | |
194 | * Pull the link count and size up from the xfs inode to the linux inode | |
195 | */ | |
196 | STATIC void | |
416c6d5b | 197 | xfs_validate_fields( |
220b5284 | 198 | struct inode *ip, |
8285fb58 | 199 | bhv_vattr_t *vattr) |
1da177e4 | 200 | { |
220b5284 | 201 | vattr->va_mask = XFS_AT_NLINK|XFS_AT_SIZE|XFS_AT_NBLOCKS; |
67fcaa73 | 202 | if (!bhv_vop_getattr(vn_from_inode(ip), vattr, ATTR_LAZY, NULL)) { |
220b5284 NS |
203 | ip->i_nlink = vattr->va_nlink; |
204 | ip->i_blocks = vattr->va_nblocks; | |
1da177e4 | 205 | |
220b5284 NS |
206 | /* we're under i_sem so i_size can't change under us */ |
207 | if (i_size_read(ip) != vattr->va_size) | |
208 | i_size_write(ip, vattr->va_size); | |
1da177e4 LT |
209 | } |
210 | } | |
211 | ||
446ada4a NS |
212 | /* |
213 | * Hook in SELinux. This is not quite correct yet, what we really need | |
214 | * here (as we do for default ACLs) is a mechanism by which creation of | |
215 | * these attrs can be journalled at inode creation time (along with the | |
216 | * inode, of course, such that log replay can't cause these to be lost). | |
217 | */ | |
218 | STATIC int | |
416c6d5b | 219 | xfs_init_security( |
67fcaa73 | 220 | bhv_vnode_t *vp, |
446ada4a NS |
221 | struct inode *dir) |
222 | { | |
ec86dc02 | 223 | struct inode *ip = vn_to_inode(vp); |
446ada4a NS |
224 | size_t length; |
225 | void *value; | |
226 | char *name; | |
227 | int error; | |
228 | ||
229 | error = security_inode_init_security(ip, dir, &name, &value, &length); | |
230 | if (error) { | |
231 | if (error == -EOPNOTSUPP) | |
232 | return 0; | |
233 | return -error; | |
234 | } | |
235 | ||
67fcaa73 | 236 | error = bhv_vop_attr_set(vp, name, value, length, ATTR_SECURE, NULL); |
446ada4a NS |
237 | if (!error) |
238 | VMODIFY(vp); | |
239 | ||
240 | kfree(name); | |
241 | kfree(value); | |
242 | return error; | |
243 | } | |
244 | ||
1da177e4 LT |
245 | /* |
246 | * Determine whether a process has a valid fs_struct (kernel daemons | |
247 | * like knfsd don't have an fs_struct). | |
248 | * | |
249 | * XXX(hch): nfsd is broken, better fix it instead. | |
250 | */ | |
7989cb8e | 251 | STATIC_INLINE int |
416c6d5b | 252 | xfs_has_fs_struct(struct task_struct *task) |
1da177e4 LT |
253 | { |
254 | return (task->fs != init_task.fs); | |
255 | } | |
256 | ||
7989cb8e | 257 | STATIC void |
416c6d5b | 258 | xfs_cleanup_inode( |
67fcaa73 NS |
259 | bhv_vnode_t *dvp, |
260 | bhv_vnode_t *vp, | |
220b5284 | 261 | struct dentry *dentry, |
3a69c7dc YL |
262 | int mode) |
263 | { | |
264 | struct dentry teardown = {}; | |
3a69c7dc YL |
265 | |
266 | /* Oh, the horror. | |
220b5284 | 267 | * If we can't add the ACL or we fail in |
416c6d5b | 268 | * xfs_init_security we must back out. |
3a69c7dc YL |
269 | * ENOSPC can hit here, among other things. |
270 | */ | |
ec86dc02 | 271 | teardown.d_inode = vn_to_inode(vp); |
3a69c7dc YL |
272 | teardown.d_name = dentry->d_name; |
273 | ||
274 | if (S_ISDIR(mode)) | |
67fcaa73 | 275 | bhv_vop_rmdir(dvp, &teardown, NULL); |
3a69c7dc | 276 | else |
67fcaa73 | 277 | bhv_vop_remove(dvp, &teardown, NULL); |
3a69c7dc YL |
278 | VN_RELE(vp); |
279 | } | |
280 | ||
1da177e4 | 281 | STATIC int |
416c6d5b | 282 | xfs_vn_mknod( |
1da177e4 LT |
283 | struct inode *dir, |
284 | struct dentry *dentry, | |
285 | int mode, | |
286 | dev_t rdev) | |
287 | { | |
288 | struct inode *ip; | |
8285fb58 | 289 | bhv_vattr_t vattr = { 0 }; |
67fcaa73 | 290 | bhv_vnode_t *vp = NULL, *dvp = vn_from_inode(dir); |
1da177e4 LT |
291 | xfs_acl_t *default_acl = NULL; |
292 | attrexists_t test_default_acl = _ACL_DEFAULT_EXISTS; | |
293 | int error; | |
294 | ||
295 | /* | |
296 | * Irix uses Missed'em'V split, but doesn't want to see | |
297 | * the upper 5 bits of (14bit) major. | |
298 | */ | |
220b5284 | 299 | if (unlikely(!sysv_valid_dev(rdev) || MAJOR(rdev) & ~0x1ff)) |
1da177e4 LT |
300 | return -EINVAL; |
301 | ||
220b5284 NS |
302 | if (unlikely(test_default_acl && test_default_acl(dvp))) { |
303 | if (!_ACL_ALLOC(default_acl)) { | |
1da177e4 | 304 | return -ENOMEM; |
220b5284 | 305 | } |
1da177e4 LT |
306 | if (!_ACL_GET_DEFAULT(dvp, default_acl)) { |
307 | _ACL_FREE(default_acl); | |
308 | default_acl = NULL; | |
309 | } | |
310 | } | |
311 | ||
416c6d5b | 312 | if (IS_POSIXACL(dir) && !default_acl && xfs_has_fs_struct(current)) |
1da177e4 LT |
313 | mode &= ~current->fs->umask; |
314 | ||
524fbf5d NS |
315 | vattr.va_mask = XFS_AT_TYPE|XFS_AT_MODE; |
316 | vattr.va_mode = mode; | |
1da177e4 LT |
317 | |
318 | switch (mode & S_IFMT) { | |
319 | case S_IFCHR: case S_IFBLK: case S_IFIFO: case S_IFSOCK: | |
524fbf5d NS |
320 | vattr.va_rdev = sysv_encode_dev(rdev); |
321 | vattr.va_mask |= XFS_AT_RDEV; | |
1da177e4 LT |
322 | /*FALLTHROUGH*/ |
323 | case S_IFREG: | |
67fcaa73 | 324 | error = bhv_vop_create(dvp, dentry, &vattr, &vp, NULL); |
1da177e4 LT |
325 | break; |
326 | case S_IFDIR: | |
67fcaa73 | 327 | error = bhv_vop_mkdir(dvp, dentry, &vattr, &vp, NULL); |
1da177e4 LT |
328 | break; |
329 | default: | |
330 | error = EINVAL; | |
331 | break; | |
332 | } | |
333 | ||
220b5284 | 334 | if (unlikely(!error)) { |
416c6d5b | 335 | error = xfs_init_security(vp, dir); |
3a69c7dc | 336 | if (error) |
416c6d5b | 337 | xfs_cleanup_inode(dvp, vp, dentry, mode); |
3a69c7dc | 338 | } |
446ada4a | 339 | |
220b5284 | 340 | if (unlikely(default_acl)) { |
1da177e4 | 341 | if (!error) { |
524fbf5d | 342 | error = _ACL_INHERIT(vp, &vattr, default_acl); |
220b5284 | 343 | if (!error) |
1da177e4 | 344 | VMODIFY(vp); |
3a69c7dc | 345 | else |
416c6d5b | 346 | xfs_cleanup_inode(dvp, vp, dentry, mode); |
1da177e4 LT |
347 | } |
348 | _ACL_FREE(default_acl); | |
349 | } | |
350 | ||
220b5284 | 351 | if (likely(!error)) { |
1da177e4 | 352 | ASSERT(vp); |
ec86dc02 | 353 | ip = vn_to_inode(vp); |
1da177e4 LT |
354 | |
355 | if (S_ISCHR(mode) || S_ISBLK(mode)) | |
356 | ip->i_rdev = rdev; | |
357 | else if (S_ISDIR(mode)) | |
524fbf5d | 358 | xfs_validate_fields(ip, &vattr); |
1da177e4 | 359 | d_instantiate(dentry, ip); |
524fbf5d | 360 | xfs_validate_fields(dir, &vattr); |
1da177e4 LT |
361 | } |
362 | return -error; | |
363 | } | |
364 | ||
365 | STATIC int | |
416c6d5b | 366 | xfs_vn_create( |
1da177e4 LT |
367 | struct inode *dir, |
368 | struct dentry *dentry, | |
369 | int mode, | |
370 | struct nameidata *nd) | |
371 | { | |
416c6d5b | 372 | return xfs_vn_mknod(dir, dentry, mode, 0); |
1da177e4 LT |
373 | } |
374 | ||
375 | STATIC int | |
416c6d5b | 376 | xfs_vn_mkdir( |
1da177e4 LT |
377 | struct inode *dir, |
378 | struct dentry *dentry, | |
379 | int mode) | |
380 | { | |
416c6d5b | 381 | return xfs_vn_mknod(dir, dentry, mode|S_IFDIR, 0); |
1da177e4 LT |
382 | } |
383 | ||
384 | STATIC struct dentry * | |
416c6d5b | 385 | xfs_vn_lookup( |
1da177e4 LT |
386 | struct inode *dir, |
387 | struct dentry *dentry, | |
388 | struct nameidata *nd) | |
389 | { | |
67fcaa73 | 390 | bhv_vnode_t *vp = vn_from_inode(dir), *cvp; |
1da177e4 LT |
391 | int error; |
392 | ||
393 | if (dentry->d_name.len >= MAXNAMELEN) | |
394 | return ERR_PTR(-ENAMETOOLONG); | |
395 | ||
67fcaa73 NS |
396 | error = bhv_vop_lookup(vp, dentry, &cvp, 0, NULL, NULL); |
397 | if (unlikely(error)) { | |
1da177e4 LT |
398 | if (unlikely(error != ENOENT)) |
399 | return ERR_PTR(-error); | |
400 | d_add(dentry, NULL); | |
401 | return NULL; | |
402 | } | |
403 | ||
ec86dc02 | 404 | return d_splice_alias(vn_to_inode(cvp), dentry); |
1da177e4 LT |
405 | } |
406 | ||
407 | STATIC int | |
416c6d5b | 408 | xfs_vn_link( |
1da177e4 LT |
409 | struct dentry *old_dentry, |
410 | struct inode *dir, | |
411 | struct dentry *dentry) | |
412 | { | |
413 | struct inode *ip; /* inode of guy being linked to */ | |
67fcaa73 NS |
414 | bhv_vnode_t *tdvp; /* target directory for new name/link */ |
415 | bhv_vnode_t *vp; /* vp of name being linked */ | |
8285fb58 | 416 | bhv_vattr_t vattr; |
1da177e4 LT |
417 | int error; |
418 | ||
419 | ip = old_dentry->d_inode; /* inode being linked to */ | |
ec86dc02 NS |
420 | tdvp = vn_from_inode(dir); |
421 | vp = vn_from_inode(ip); | |
1da177e4 | 422 | |
97dfd70c | 423 | VN_HOLD(vp); |
67fcaa73 | 424 | error = bhv_vop_link(tdvp, vp, dentry, NULL); |
97dfd70c NS |
425 | if (unlikely(error)) { |
426 | VN_RELE(vp); | |
427 | } else { | |
1da177e4 | 428 | VMODIFY(tdvp); |
524fbf5d | 429 | xfs_validate_fields(ip, &vattr); |
1da177e4 LT |
430 | d_instantiate(dentry, ip); |
431 | } | |
432 | return -error; | |
433 | } | |
434 | ||
435 | STATIC int | |
416c6d5b | 436 | xfs_vn_unlink( |
1da177e4 LT |
437 | struct inode *dir, |
438 | struct dentry *dentry) | |
439 | { | |
440 | struct inode *inode; | |
67fcaa73 | 441 | bhv_vnode_t *dvp; /* directory containing name to remove */ |
8285fb58 | 442 | bhv_vattr_t vattr; |
1da177e4 LT |
443 | int error; |
444 | ||
445 | inode = dentry->d_inode; | |
ec86dc02 | 446 | dvp = vn_from_inode(dir); |
1da177e4 | 447 | |
67fcaa73 | 448 | error = bhv_vop_remove(dvp, dentry, NULL); |
220b5284 | 449 | if (likely(!error)) { |
524fbf5d NS |
450 | xfs_validate_fields(dir, &vattr); /* size needs update */ |
451 | xfs_validate_fields(inode, &vattr); | |
1da177e4 | 452 | } |
1da177e4 LT |
453 | return -error; |
454 | } | |
455 | ||
456 | STATIC int | |
416c6d5b | 457 | xfs_vn_symlink( |
1da177e4 LT |
458 | struct inode *dir, |
459 | struct dentry *dentry, | |
460 | const char *symname) | |
461 | { | |
462 | struct inode *ip; | |
8285fb58 | 463 | bhv_vattr_t va = { 0 }; |
67fcaa73 NS |
464 | bhv_vnode_t *dvp; /* directory containing name of symlink */ |
465 | bhv_vnode_t *cvp; /* used to lookup symlink to put in dentry */ | |
1da177e4 LT |
466 | int error; |
467 | ||
ec86dc02 | 468 | dvp = vn_from_inode(dir); |
1da177e4 LT |
469 | cvp = NULL; |
470 | ||
67fcaa73 | 471 | va.va_mode = S_IFLNK | |
0432dab2 | 472 | (irix_symlink_mode ? 0777 & ~current->fs->umask : S_IRWXUGO); |
67fcaa73 | 473 | va.va_mask = XFS_AT_TYPE|XFS_AT_MODE; |
1da177e4 | 474 | |
67fcaa73 | 475 | error = bhv_vop_symlink(dvp, dentry, &va, (char *)symname, &cvp, NULL); |
54245702 | 476 | if (likely(!error && cvp)) { |
416c6d5b | 477 | error = xfs_init_security(cvp, dir); |
54245702 | 478 | if (likely(!error)) { |
ec86dc02 | 479 | ip = vn_to_inode(cvp); |
54245702 | 480 | d_instantiate(dentry, ip); |
67fcaa73 NS |
481 | xfs_validate_fields(dir, &va); |
482 | xfs_validate_fields(ip, &va); | |
ce9d37c2 NS |
483 | } else { |
484 | xfs_cleanup_inode(dvp, cvp, dentry, 0); | |
54245702 | 485 | } |
1da177e4 LT |
486 | } |
487 | return -error; | |
488 | } | |
489 | ||
490 | STATIC int | |
416c6d5b | 491 | xfs_vn_rmdir( |
1da177e4 LT |
492 | struct inode *dir, |
493 | struct dentry *dentry) | |
494 | { | |
495 | struct inode *inode = dentry->d_inode; | |
67fcaa73 | 496 | bhv_vnode_t *dvp = vn_from_inode(dir); |
8285fb58 | 497 | bhv_vattr_t vattr; |
1da177e4 LT |
498 | int error; |
499 | ||
67fcaa73 | 500 | error = bhv_vop_rmdir(dvp, dentry, NULL); |
220b5284 | 501 | if (likely(!error)) { |
524fbf5d NS |
502 | xfs_validate_fields(inode, &vattr); |
503 | xfs_validate_fields(dir, &vattr); | |
1da177e4 LT |
504 | } |
505 | return -error; | |
506 | } | |
507 | ||
508 | STATIC int | |
416c6d5b | 509 | xfs_vn_rename( |
1da177e4 LT |
510 | struct inode *odir, |
511 | struct dentry *odentry, | |
512 | struct inode *ndir, | |
513 | struct dentry *ndentry) | |
514 | { | |
515 | struct inode *new_inode = ndentry->d_inode; | |
67fcaa73 NS |
516 | bhv_vnode_t *fvp; /* from directory */ |
517 | bhv_vnode_t *tvp; /* target directory */ | |
8285fb58 | 518 | bhv_vattr_t vattr; |
1da177e4 LT |
519 | int error; |
520 | ||
ec86dc02 NS |
521 | fvp = vn_from_inode(odir); |
522 | tvp = vn_from_inode(ndir); | |
1da177e4 | 523 | |
67fcaa73 | 524 | error = bhv_vop_rename(fvp, odentry, tvp, ndentry, NULL); |
220b5284 NS |
525 | if (likely(!error)) { |
526 | if (new_inode) | |
524fbf5d NS |
527 | xfs_validate_fields(new_inode, &vattr); |
528 | xfs_validate_fields(odir, &vattr); | |
220b5284 | 529 | if (ndir != odir) |
524fbf5d | 530 | xfs_validate_fields(ndir, &vattr); |
220b5284 | 531 | } |
220b5284 | 532 | return -error; |
1da177e4 LT |
533 | } |
534 | ||
535 | /* | |
536 | * careful here - this function can get called recursively, so | |
537 | * we need to be very careful about how much stack we use. | |
538 | * uio is kmalloced for this reason... | |
539 | */ | |
008b150a | 540 | STATIC void * |
416c6d5b | 541 | xfs_vn_follow_link( |
1da177e4 LT |
542 | struct dentry *dentry, |
543 | struct nameidata *nd) | |
544 | { | |
67fcaa73 | 545 | bhv_vnode_t *vp; |
1da177e4 LT |
546 | uio_t *uio; |
547 | iovec_t iov; | |
548 | int error; | |
549 | char *link; | |
550 | ||
551 | ASSERT(dentry); | |
552 | ASSERT(nd); | |
553 | ||
f52720ca | 554 | link = kmalloc(MAXPATHLEN+1, GFP_KERNEL); |
1da177e4 LT |
555 | if (!link) { |
556 | nd_set_link(nd, ERR_PTR(-ENOMEM)); | |
008b150a | 557 | return NULL; |
1da177e4 LT |
558 | } |
559 | ||
f52720ca | 560 | uio = kmalloc(sizeof(uio_t), GFP_KERNEL); |
1da177e4 LT |
561 | if (!uio) { |
562 | kfree(link); | |
563 | nd_set_link(nd, ERR_PTR(-ENOMEM)); | |
008b150a | 564 | return NULL; |
1da177e4 LT |
565 | } |
566 | ||
ec86dc02 | 567 | vp = vn_from_inode(dentry->d_inode); |
1da177e4 LT |
568 | |
569 | iov.iov_base = link; | |
0d1335b3 | 570 | iov.iov_len = MAXPATHLEN; |
1da177e4 LT |
571 | |
572 | uio->uio_iov = &iov; | |
573 | uio->uio_offset = 0; | |
574 | uio->uio_segflg = UIO_SYSSPACE; | |
0d1335b3 | 575 | uio->uio_resid = MAXPATHLEN; |
1da177e4 LT |
576 | uio->uio_iovcnt = 1; |
577 | ||
67fcaa73 NS |
578 | error = bhv_vop_readlink(vp, uio, 0, NULL); |
579 | if (unlikely(error)) { | |
1da177e4 LT |
580 | kfree(link); |
581 | link = ERR_PTR(-error); | |
582 | } else { | |
0d1335b3 | 583 | link[MAXPATHLEN - uio->uio_resid] = '\0'; |
1da177e4 LT |
584 | } |
585 | kfree(uio); | |
586 | ||
587 | nd_set_link(nd, link); | |
008b150a | 588 | return NULL; |
1da177e4 LT |
589 | } |
590 | ||
cde410a9 | 591 | STATIC void |
416c6d5b | 592 | xfs_vn_put_link( |
cde410a9 NS |
593 | struct dentry *dentry, |
594 | struct nameidata *nd, | |
595 | void *p) | |
1da177e4 | 596 | { |
cde410a9 NS |
597 | char *s = nd_get_link(nd); |
598 | ||
1da177e4 LT |
599 | if (!IS_ERR(s)) |
600 | kfree(s); | |
601 | } | |
602 | ||
603 | #ifdef CONFIG_XFS_POSIX_ACL | |
604 | STATIC int | |
416c6d5b | 605 | xfs_vn_permission( |
1da177e4 LT |
606 | struct inode *inode, |
607 | int mode, | |
608 | struct nameidata *nd) | |
609 | { | |
67fcaa73 | 610 | return -bhv_vop_access(vn_from_inode(inode), mode << 6, NULL); |
1da177e4 LT |
611 | } |
612 | #else | |
416c6d5b | 613 | #define xfs_vn_permission NULL |
1da177e4 LT |
614 | #endif |
615 | ||
616 | STATIC int | |
416c6d5b | 617 | xfs_vn_getattr( |
1da177e4 LT |
618 | struct vfsmount *mnt, |
619 | struct dentry *dentry, | |
620 | struct kstat *stat) | |
621 | { | |
622 | struct inode *inode = dentry->d_inode; | |
67fcaa73 | 623 | bhv_vnode_t *vp = vn_from_inode(inode); |
69e23b9a NS |
624 | bhv_vattr_t vattr = { .va_mask = XFS_AT_STAT }; |
625 | int error; | |
1da177e4 | 626 | |
69e23b9a NS |
627 | error = bhv_vop_getattr(vp, &vattr, ATTR_LAZY, NULL); |
628 | if (likely(!error)) { | |
629 | stat->size = i_size_read(inode); | |
630 | stat->dev = inode->i_sb->s_dev; | |
631 | stat->rdev = (vattr.va_rdev == 0) ? 0 : | |
632 | MKDEV(sysv_major(vattr.va_rdev) & 0x1ff, | |
633 | sysv_minor(vattr.va_rdev)); | |
634 | stat->mode = vattr.va_mode; | |
635 | stat->nlink = vattr.va_nlink; | |
636 | stat->uid = vattr.va_uid; | |
637 | stat->gid = vattr.va_gid; | |
638 | stat->ino = vattr.va_nodeid; | |
639 | stat->atime = vattr.va_atime; | |
640 | stat->mtime = vattr.va_mtime; | |
641 | stat->ctime = vattr.va_ctime; | |
642 | stat->blocks = vattr.va_nblocks; | |
643 | stat->blksize = vattr.va_blocksize; | |
644 | } | |
b76963fa | 645 | return -error; |
1da177e4 LT |
646 | } |
647 | ||
648 | STATIC int | |
416c6d5b | 649 | xfs_vn_setattr( |
1da177e4 LT |
650 | struct dentry *dentry, |
651 | struct iattr *attr) | |
652 | { | |
653 | struct inode *inode = dentry->d_inode; | |
654 | unsigned int ia_valid = attr->ia_valid; | |
67fcaa73 | 655 | bhv_vnode_t *vp = vn_from_inode(inode); |
8285fb58 | 656 | bhv_vattr_t vattr = { 0 }; |
1da177e4 LT |
657 | int flags = 0; |
658 | int error; | |
659 | ||
1da177e4 LT |
660 | if (ia_valid & ATTR_UID) { |
661 | vattr.va_mask |= XFS_AT_UID; | |
662 | vattr.va_uid = attr->ia_uid; | |
663 | } | |
664 | if (ia_valid & ATTR_GID) { | |
665 | vattr.va_mask |= XFS_AT_GID; | |
666 | vattr.va_gid = attr->ia_gid; | |
667 | } | |
668 | if (ia_valid & ATTR_SIZE) { | |
669 | vattr.va_mask |= XFS_AT_SIZE; | |
670 | vattr.va_size = attr->ia_size; | |
671 | } | |
672 | if (ia_valid & ATTR_ATIME) { | |
673 | vattr.va_mask |= XFS_AT_ATIME; | |
674 | vattr.va_atime = attr->ia_atime; | |
8c0b5113 | 675 | inode->i_atime = attr->ia_atime; |
1da177e4 LT |
676 | } |
677 | if (ia_valid & ATTR_MTIME) { | |
678 | vattr.va_mask |= XFS_AT_MTIME; | |
679 | vattr.va_mtime = attr->ia_mtime; | |
680 | } | |
681 | if (ia_valid & ATTR_CTIME) { | |
682 | vattr.va_mask |= XFS_AT_CTIME; | |
683 | vattr.va_ctime = attr->ia_ctime; | |
684 | } | |
685 | if (ia_valid & ATTR_MODE) { | |
686 | vattr.va_mask |= XFS_AT_MODE; | |
687 | vattr.va_mode = attr->ia_mode; | |
688 | if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID)) | |
689 | inode->i_mode &= ~S_ISGID; | |
690 | } | |
691 | ||
692 | if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET)) | |
693 | flags |= ATTR_UTIME; | |
694 | #ifdef ATTR_NO_BLOCK | |
695 | if ((ia_valid & ATTR_NO_BLOCK)) | |
696 | flags |= ATTR_NONBLOCK; | |
697 | #endif | |
698 | ||
67fcaa73 | 699 | error = bhv_vop_setattr(vp, &vattr, flags, NULL); |
220b5284 NS |
700 | if (likely(!error)) |
701 | __vn_revalidate(vp, &vattr); | |
702 | return -error; | |
1da177e4 LT |
703 | } |
704 | ||
705 | STATIC void | |
416c6d5b | 706 | xfs_vn_truncate( |
1da177e4 LT |
707 | struct inode *inode) |
708 | { | |
c2536668 | 709 | block_truncate_page(inode->i_mapping, inode->i_size, xfs_get_blocks); |
1da177e4 LT |
710 | } |
711 | ||
712 | STATIC int | |
416c6d5b | 713 | xfs_vn_setxattr( |
1da177e4 LT |
714 | struct dentry *dentry, |
715 | const char *name, | |
716 | const void *data, | |
717 | size_t size, | |
718 | int flags) | |
719 | { | |
67fcaa73 | 720 | bhv_vnode_t *vp = vn_from_inode(dentry->d_inode); |
1da177e4 LT |
721 | char *attr = (char *)name; |
722 | attrnames_t *namesp; | |
723 | int xflags = 0; | |
724 | int error; | |
725 | ||
726 | namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT); | |
727 | if (!namesp) | |
728 | return -EOPNOTSUPP; | |
729 | attr += namesp->attr_namelen; | |
730 | error = namesp->attr_capable(vp, NULL); | |
731 | if (error) | |
732 | return error; | |
733 | ||
734 | /* Convert Linux syscall to XFS internal ATTR flags */ | |
735 | if (flags & XATTR_CREATE) | |
736 | xflags |= ATTR_CREATE; | |
737 | if (flags & XATTR_REPLACE) | |
738 | xflags |= ATTR_REPLACE; | |
739 | xflags |= namesp->attr_flag; | |
740 | return namesp->attr_set(vp, attr, (void *)data, size, xflags); | |
741 | } | |
742 | ||
743 | STATIC ssize_t | |
416c6d5b | 744 | xfs_vn_getxattr( |
1da177e4 LT |
745 | struct dentry *dentry, |
746 | const char *name, | |
747 | void *data, | |
748 | size_t size) | |
749 | { | |
67fcaa73 | 750 | bhv_vnode_t *vp = vn_from_inode(dentry->d_inode); |
1da177e4 LT |
751 | char *attr = (char *)name; |
752 | attrnames_t *namesp; | |
753 | int xflags = 0; | |
754 | ssize_t error; | |
755 | ||
756 | namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT); | |
757 | if (!namesp) | |
758 | return -EOPNOTSUPP; | |
759 | attr += namesp->attr_namelen; | |
760 | error = namesp->attr_capable(vp, NULL); | |
761 | if (error) | |
762 | return error; | |
763 | ||
764 | /* Convert Linux syscall to XFS internal ATTR flags */ | |
765 | if (!size) { | |
766 | xflags |= ATTR_KERNOVAL; | |
767 | data = NULL; | |
768 | } | |
769 | xflags |= namesp->attr_flag; | |
770 | return namesp->attr_get(vp, attr, (void *)data, size, xflags); | |
771 | } | |
772 | ||
773 | STATIC ssize_t | |
416c6d5b | 774 | xfs_vn_listxattr( |
1da177e4 LT |
775 | struct dentry *dentry, |
776 | char *data, | |
777 | size_t size) | |
778 | { | |
67fcaa73 | 779 | bhv_vnode_t *vp = vn_from_inode(dentry->d_inode); |
1da177e4 LT |
780 | int error, xflags = ATTR_KERNAMELS; |
781 | ssize_t result; | |
782 | ||
783 | if (!size) | |
784 | xflags |= ATTR_KERNOVAL; | |
785 | xflags |= capable(CAP_SYS_ADMIN) ? ATTR_KERNFULLS : ATTR_KERNORMALS; | |
786 | ||
787 | error = attr_generic_list(vp, data, size, xflags, &result); | |
788 | if (error < 0) | |
789 | return error; | |
790 | return result; | |
791 | } | |
792 | ||
793 | STATIC int | |
416c6d5b | 794 | xfs_vn_removexattr( |
1da177e4 LT |
795 | struct dentry *dentry, |
796 | const char *name) | |
797 | { | |
67fcaa73 | 798 | bhv_vnode_t *vp = vn_from_inode(dentry->d_inode); |
1da177e4 LT |
799 | char *attr = (char *)name; |
800 | attrnames_t *namesp; | |
801 | int xflags = 0; | |
802 | int error; | |
803 | ||
804 | namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT); | |
805 | if (!namesp) | |
806 | return -EOPNOTSUPP; | |
807 | attr += namesp->attr_namelen; | |
808 | error = namesp->attr_capable(vp, NULL); | |
809 | if (error) | |
810 | return error; | |
811 | xflags |= namesp->attr_flag; | |
812 | return namesp->attr_remove(vp, attr, xflags); | |
813 | } | |
814 | ||
815 | ||
416c6d5b NS |
816 | struct inode_operations xfs_inode_operations = { |
817 | .permission = xfs_vn_permission, | |
818 | .truncate = xfs_vn_truncate, | |
819 | .getattr = xfs_vn_getattr, | |
820 | .setattr = xfs_vn_setattr, | |
821 | .setxattr = xfs_vn_setxattr, | |
822 | .getxattr = xfs_vn_getxattr, | |
823 | .listxattr = xfs_vn_listxattr, | |
824 | .removexattr = xfs_vn_removexattr, | |
1da177e4 LT |
825 | }; |
826 | ||
416c6d5b NS |
827 | struct inode_operations xfs_dir_inode_operations = { |
828 | .create = xfs_vn_create, | |
829 | .lookup = xfs_vn_lookup, | |
830 | .link = xfs_vn_link, | |
831 | .unlink = xfs_vn_unlink, | |
832 | .symlink = xfs_vn_symlink, | |
833 | .mkdir = xfs_vn_mkdir, | |
834 | .rmdir = xfs_vn_rmdir, | |
835 | .mknod = xfs_vn_mknod, | |
836 | .rename = xfs_vn_rename, | |
837 | .permission = xfs_vn_permission, | |
838 | .getattr = xfs_vn_getattr, | |
839 | .setattr = xfs_vn_setattr, | |
840 | .setxattr = xfs_vn_setxattr, | |
841 | .getxattr = xfs_vn_getxattr, | |
842 | .listxattr = xfs_vn_listxattr, | |
843 | .removexattr = xfs_vn_removexattr, | |
1da177e4 LT |
844 | }; |
845 | ||
416c6d5b | 846 | struct inode_operations xfs_symlink_inode_operations = { |
1da177e4 | 847 | .readlink = generic_readlink, |
416c6d5b NS |
848 | .follow_link = xfs_vn_follow_link, |
849 | .put_link = xfs_vn_put_link, | |
850 | .permission = xfs_vn_permission, | |
851 | .getattr = xfs_vn_getattr, | |
852 | .setattr = xfs_vn_setattr, | |
853 | .setxattr = xfs_vn_setxattr, | |
854 | .getxattr = xfs_vn_getxattr, | |
855 | .listxattr = xfs_vn_listxattr, | |
856 | .removexattr = xfs_vn_removexattr, | |
1da177e4 | 857 | }; |