]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/xfs/linux-2.6/xfs_iops.c
introduce I_SYNC
[net-next-2.6.git] / fs / xfs / linux-2.6 / xfs_iops.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4
LT
18#include "xfs.h"
19#include "xfs_fs.h"
a844f451 20#include "xfs_bit.h"
1da177e4 21#include "xfs_log.h"
a844f451 22#include "xfs_inum.h"
1da177e4
LT
23#include "xfs_trans.h"
24#include "xfs_sb.h"
25#include "xfs_ag.h"
1da177e4
LT
26#include "xfs_dir2.h"
27#include "xfs_alloc.h"
28#include "xfs_dmapi.h"
29#include "xfs_quota.h"
30#include "xfs_mount.h"
1da177e4 31#include "xfs_bmap_btree.h"
a844f451 32#include "xfs_alloc_btree.h"
1da177e4 33#include "xfs_ialloc_btree.h"
1da177e4 34#include "xfs_dir2_sf.h"
a844f451 35#include "xfs_attr_sf.h"
1da177e4
LT
36#include "xfs_dinode.h"
37#include "xfs_inode.h"
38#include "xfs_bmap.h"
a844f451
NS
39#include "xfs_btree.h"
40#include "xfs_ialloc.h"
1da177e4
LT
41#include "xfs_rtalloc.h"
42#include "xfs_error.h"
43#include "xfs_itable.h"
44#include "xfs_rw.h"
45#include "xfs_acl.h"
1da177e4
LT
46#include "xfs_attr.h"
47#include "xfs_buf_item.h"
48#include "xfs_utils.h"
49
16f7e0fe 50#include <linux/capability.h>
1da177e4
LT
51#include <linux/xattr.h>
52#include <linux/namei.h>
446ada4a 53#include <linux/security.h>
1da177e4 54
75e17b3c
CH
55/*
56 * Get a XFS inode from a given vnode.
57 */
58xfs_inode_t *
59xfs_vtoi(
67fcaa73 60 bhv_vnode_t *vp)
75e17b3c
CH
61{
62 bhv_desc_t *bdp;
63
64 bdp = bhv_lookup_range(VN_BHV_HEAD(vp),
65 VNODE_POSITION_XFS, VNODE_POSITION_XFS);
66 if (unlikely(bdp == NULL))
67 return NULL;
68 return XFS_BHVTOI(bdp);
69}
70
42fe2b1f
CH
71/*
72 * Bring the atime in the XFS inode uptodate.
73 * Used before logging the inode to disk or when the Linux inode goes away.
74 */
75void
76xfs_synchronize_atime(
77 xfs_inode_t *ip)
78{
67fcaa73 79 bhv_vnode_t *vp;
42fe2b1f
CH
80
81 vp = XFS_ITOV_NULL(ip);
82 if (vp) {
83 struct inode *inode = &vp->v_inode;
84 ip->i_d.di_atime.t_sec = (__int32_t)inode->i_atime.tv_sec;
85 ip->i_d.di_atime.t_nsec = (__int32_t)inode->i_atime.tv_nsec;
86 }
87}
88
4aeb664c
NS
89/*
90 * Change the requested timestamp in the given inode.
91 * We don't lock across timestamp updates, and we don't log them but
92 * we do record the fact that there is dirty information in core.
93 *
94 * NOTE -- callers MUST combine XFS_ICHGTIME_MOD or XFS_ICHGTIME_CHG
95 * with XFS_ICHGTIME_ACC to be sure that access time
96 * update will take. Calling first with XFS_ICHGTIME_ACC
97 * and then XFS_ICHGTIME_MOD may fail to modify the access
98 * timestamp if the filesystem is mounted noacctm.
99 */
100void
101xfs_ichgtime(
102 xfs_inode_t *ip,
103 int flags)
104{
ec86dc02 105 struct inode *inode = vn_to_inode(XFS_ITOV(ip));
4aeb664c
NS
106 timespec_t tv;
107
4aeb664c
NS
108 nanotime(&tv);
109 if (flags & XFS_ICHGTIME_MOD) {
110 inode->i_mtime = tv;
111 ip->i_d.di_mtime.t_sec = (__int32_t)tv.tv_sec;
112 ip->i_d.di_mtime.t_nsec = (__int32_t)tv.tv_nsec;
113 }
114 if (flags & XFS_ICHGTIME_ACC) {
115 inode->i_atime = tv;
116 ip->i_d.di_atime.t_sec = (__int32_t)tv.tv_sec;
117 ip->i_d.di_atime.t_nsec = (__int32_t)tv.tv_nsec;
118 }
119 if (flags & XFS_ICHGTIME_CHG) {
120 inode->i_ctime = tv;
121 ip->i_d.di_ctime.t_sec = (__int32_t)tv.tv_sec;
122 ip->i_d.di_ctime.t_nsec = (__int32_t)tv.tv_nsec;
123 }
124
125 /*
126 * We update the i_update_core field _after_ changing
127 * the timestamps in order to coordinate properly with
128 * xfs_iflush() so that we don't lose timestamp updates.
129 * This keeps us from having to hold the inode lock
130 * while doing this. We use the SYNCHRONIZE macro to
131 * ensure that the compiler does not reorder the update
132 * of i_update_core above the timestamp updates above.
133 */
134 SYNCHRONIZE();
135 ip->i_update_core = 1;
1c0eeaf5 136 if (!(inode->i_state & I_SYNC))
4aeb664c
NS
137 mark_inode_dirty_sync(inode);
138}
139
140/*
141 * Variant on the above which avoids querying the system clock
142 * in situations where we know the Linux inode timestamps have
143 * just been updated (and so we can update our inode cheaply).
4aeb664c
NS
144 */
145void
146xfs_ichgtime_fast(
147 xfs_inode_t *ip,
148 struct inode *inode,
149 int flags)
150{
151 timespec_t *tvp;
152
153 /*
42fe2b1f
CH
154 * Atime updates for read() & friends are handled lazily now, and
155 * explicit updates must go through xfs_ichgtime()
4aeb664c 156 */
42fe2b1f 157 ASSERT((flags & XFS_ICHGTIME_ACC) == 0);
4aeb664c
NS
158
159 /*
42fe2b1f
CH
160 * We're not supposed to change timestamps in readonly-mounted
161 * filesystems. Throw it away if anyone asks us.
4aeb664c 162 */
42fe2b1f 163 if (unlikely(IS_RDONLY(inode)))
4aeb664c
NS
164 return;
165
166 if (flags & XFS_ICHGTIME_MOD) {
167 tvp = &inode->i_mtime;
168 ip->i_d.di_mtime.t_sec = (__int32_t)tvp->tv_sec;
169 ip->i_d.di_mtime.t_nsec = (__int32_t)tvp->tv_nsec;
170 }
4aeb664c
NS
171 if (flags & XFS_ICHGTIME_CHG) {
172 tvp = &inode->i_ctime;
173 ip->i_d.di_ctime.t_sec = (__int32_t)tvp->tv_sec;
174 ip->i_d.di_ctime.t_nsec = (__int32_t)tvp->tv_nsec;
175 }
176
177 /*
178 * We update the i_update_core field _after_ changing
179 * the timestamps in order to coordinate properly with
180 * xfs_iflush() so that we don't lose timestamp updates.
181 * This keeps us from having to hold the inode lock
182 * while doing this. We use the SYNCHRONIZE macro to
183 * ensure that the compiler does not reorder the update
184 * of i_update_core above the timestamp updates above.
185 */
186 SYNCHRONIZE();
187 ip->i_update_core = 1;
1c0eeaf5 188 if (!(inode->i_state & I_SYNC))
4aeb664c
NS
189 mark_inode_dirty_sync(inode);
190}
191
1da177e4
LT
192
193/*
194 * Pull the link count and size up from the xfs inode to the linux inode
195 */
196STATIC void
416c6d5b 197xfs_validate_fields(
220b5284 198 struct inode *ip,
8285fb58 199 bhv_vattr_t *vattr)
1da177e4 200{
220b5284 201 vattr->va_mask = XFS_AT_NLINK|XFS_AT_SIZE|XFS_AT_NBLOCKS;
67fcaa73 202 if (!bhv_vop_getattr(vn_from_inode(ip), vattr, ATTR_LAZY, NULL)) {
220b5284
NS
203 ip->i_nlink = vattr->va_nlink;
204 ip->i_blocks = vattr->va_nblocks;
1da177e4 205
220b5284
NS
206 /* we're under i_sem so i_size can't change under us */
207 if (i_size_read(ip) != vattr->va_size)
208 i_size_write(ip, vattr->va_size);
1da177e4
LT
209 }
210}
211
446ada4a
NS
212/*
213 * Hook in SELinux. This is not quite correct yet, what we really need
214 * here (as we do for default ACLs) is a mechanism by which creation of
215 * these attrs can be journalled at inode creation time (along with the
216 * inode, of course, such that log replay can't cause these to be lost).
217 */
218STATIC int
416c6d5b 219xfs_init_security(
67fcaa73 220 bhv_vnode_t *vp,
446ada4a
NS
221 struct inode *dir)
222{
ec86dc02 223 struct inode *ip = vn_to_inode(vp);
446ada4a
NS
224 size_t length;
225 void *value;
226 char *name;
227 int error;
228
229 error = security_inode_init_security(ip, dir, &name, &value, &length);
230 if (error) {
231 if (error == -EOPNOTSUPP)
232 return 0;
233 return -error;
234 }
235
67fcaa73 236 error = bhv_vop_attr_set(vp, name, value, length, ATTR_SECURE, NULL);
446ada4a
NS
237 if (!error)
238 VMODIFY(vp);
239
240 kfree(name);
241 kfree(value);
242 return error;
243}
244
1da177e4
LT
245/*
246 * Determine whether a process has a valid fs_struct (kernel daemons
247 * like knfsd don't have an fs_struct).
248 *
249 * XXX(hch): nfsd is broken, better fix it instead.
250 */
7989cb8e 251STATIC_INLINE int
416c6d5b 252xfs_has_fs_struct(struct task_struct *task)
1da177e4
LT
253{
254 return (task->fs != init_task.fs);
255}
256
7989cb8e 257STATIC void
416c6d5b 258xfs_cleanup_inode(
67fcaa73
NS
259 bhv_vnode_t *dvp,
260 bhv_vnode_t *vp,
220b5284 261 struct dentry *dentry,
3a69c7dc
YL
262 int mode)
263{
264 struct dentry teardown = {};
3a69c7dc
YL
265
266 /* Oh, the horror.
220b5284 267 * If we can't add the ACL or we fail in
416c6d5b 268 * xfs_init_security we must back out.
3a69c7dc
YL
269 * ENOSPC can hit here, among other things.
270 */
ec86dc02 271 teardown.d_inode = vn_to_inode(vp);
3a69c7dc
YL
272 teardown.d_name = dentry->d_name;
273
274 if (S_ISDIR(mode))
67fcaa73 275 bhv_vop_rmdir(dvp, &teardown, NULL);
3a69c7dc 276 else
67fcaa73 277 bhv_vop_remove(dvp, &teardown, NULL);
3a69c7dc
YL
278 VN_RELE(vp);
279}
280
1da177e4 281STATIC int
416c6d5b 282xfs_vn_mknod(
1da177e4
LT
283 struct inode *dir,
284 struct dentry *dentry,
285 int mode,
286 dev_t rdev)
287{
288 struct inode *ip;
8285fb58 289 bhv_vattr_t vattr = { 0 };
67fcaa73 290 bhv_vnode_t *vp = NULL, *dvp = vn_from_inode(dir);
1da177e4
LT
291 xfs_acl_t *default_acl = NULL;
292 attrexists_t test_default_acl = _ACL_DEFAULT_EXISTS;
293 int error;
294
295 /*
296 * Irix uses Missed'em'V split, but doesn't want to see
297 * the upper 5 bits of (14bit) major.
298 */
220b5284 299 if (unlikely(!sysv_valid_dev(rdev) || MAJOR(rdev) & ~0x1ff))
1da177e4
LT
300 return -EINVAL;
301
220b5284
NS
302 if (unlikely(test_default_acl && test_default_acl(dvp))) {
303 if (!_ACL_ALLOC(default_acl)) {
1da177e4 304 return -ENOMEM;
220b5284 305 }
1da177e4
LT
306 if (!_ACL_GET_DEFAULT(dvp, default_acl)) {
307 _ACL_FREE(default_acl);
308 default_acl = NULL;
309 }
310 }
311
416c6d5b 312 if (IS_POSIXACL(dir) && !default_acl && xfs_has_fs_struct(current))
1da177e4
LT
313 mode &= ~current->fs->umask;
314
524fbf5d
NS
315 vattr.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
316 vattr.va_mode = mode;
1da177e4
LT
317
318 switch (mode & S_IFMT) {
319 case S_IFCHR: case S_IFBLK: case S_IFIFO: case S_IFSOCK:
524fbf5d
NS
320 vattr.va_rdev = sysv_encode_dev(rdev);
321 vattr.va_mask |= XFS_AT_RDEV;
1da177e4
LT
322 /*FALLTHROUGH*/
323 case S_IFREG:
67fcaa73 324 error = bhv_vop_create(dvp, dentry, &vattr, &vp, NULL);
1da177e4
LT
325 break;
326 case S_IFDIR:
67fcaa73 327 error = bhv_vop_mkdir(dvp, dentry, &vattr, &vp, NULL);
1da177e4
LT
328 break;
329 default:
330 error = EINVAL;
331 break;
332 }
333
220b5284 334 if (unlikely(!error)) {
416c6d5b 335 error = xfs_init_security(vp, dir);
3a69c7dc 336 if (error)
416c6d5b 337 xfs_cleanup_inode(dvp, vp, dentry, mode);
3a69c7dc 338 }
446ada4a 339
220b5284 340 if (unlikely(default_acl)) {
1da177e4 341 if (!error) {
524fbf5d 342 error = _ACL_INHERIT(vp, &vattr, default_acl);
220b5284 343 if (!error)
1da177e4 344 VMODIFY(vp);
3a69c7dc 345 else
416c6d5b 346 xfs_cleanup_inode(dvp, vp, dentry, mode);
1da177e4
LT
347 }
348 _ACL_FREE(default_acl);
349 }
350
220b5284 351 if (likely(!error)) {
1da177e4 352 ASSERT(vp);
ec86dc02 353 ip = vn_to_inode(vp);
1da177e4
LT
354
355 if (S_ISCHR(mode) || S_ISBLK(mode))
356 ip->i_rdev = rdev;
357 else if (S_ISDIR(mode))
524fbf5d 358 xfs_validate_fields(ip, &vattr);
1da177e4 359 d_instantiate(dentry, ip);
524fbf5d 360 xfs_validate_fields(dir, &vattr);
1da177e4
LT
361 }
362 return -error;
363}
364
365STATIC int
416c6d5b 366xfs_vn_create(
1da177e4
LT
367 struct inode *dir,
368 struct dentry *dentry,
369 int mode,
370 struct nameidata *nd)
371{
416c6d5b 372 return xfs_vn_mknod(dir, dentry, mode, 0);
1da177e4
LT
373}
374
375STATIC int
416c6d5b 376xfs_vn_mkdir(
1da177e4
LT
377 struct inode *dir,
378 struct dentry *dentry,
379 int mode)
380{
416c6d5b 381 return xfs_vn_mknod(dir, dentry, mode|S_IFDIR, 0);
1da177e4
LT
382}
383
384STATIC struct dentry *
416c6d5b 385xfs_vn_lookup(
1da177e4
LT
386 struct inode *dir,
387 struct dentry *dentry,
388 struct nameidata *nd)
389{
67fcaa73 390 bhv_vnode_t *vp = vn_from_inode(dir), *cvp;
1da177e4
LT
391 int error;
392
393 if (dentry->d_name.len >= MAXNAMELEN)
394 return ERR_PTR(-ENAMETOOLONG);
395
67fcaa73
NS
396 error = bhv_vop_lookup(vp, dentry, &cvp, 0, NULL, NULL);
397 if (unlikely(error)) {
1da177e4
LT
398 if (unlikely(error != ENOENT))
399 return ERR_PTR(-error);
400 d_add(dentry, NULL);
401 return NULL;
402 }
403
ec86dc02 404 return d_splice_alias(vn_to_inode(cvp), dentry);
1da177e4
LT
405}
406
407STATIC int
416c6d5b 408xfs_vn_link(
1da177e4
LT
409 struct dentry *old_dentry,
410 struct inode *dir,
411 struct dentry *dentry)
412{
413 struct inode *ip; /* inode of guy being linked to */
67fcaa73
NS
414 bhv_vnode_t *tdvp; /* target directory for new name/link */
415 bhv_vnode_t *vp; /* vp of name being linked */
8285fb58 416 bhv_vattr_t vattr;
1da177e4
LT
417 int error;
418
419 ip = old_dentry->d_inode; /* inode being linked to */
ec86dc02
NS
420 tdvp = vn_from_inode(dir);
421 vp = vn_from_inode(ip);
1da177e4 422
97dfd70c 423 VN_HOLD(vp);
67fcaa73 424 error = bhv_vop_link(tdvp, vp, dentry, NULL);
97dfd70c
NS
425 if (unlikely(error)) {
426 VN_RELE(vp);
427 } else {
1da177e4 428 VMODIFY(tdvp);
524fbf5d 429 xfs_validate_fields(ip, &vattr);
1da177e4
LT
430 d_instantiate(dentry, ip);
431 }
432 return -error;
433}
434
435STATIC int
416c6d5b 436xfs_vn_unlink(
1da177e4
LT
437 struct inode *dir,
438 struct dentry *dentry)
439{
440 struct inode *inode;
67fcaa73 441 bhv_vnode_t *dvp; /* directory containing name to remove */
8285fb58 442 bhv_vattr_t vattr;
1da177e4
LT
443 int error;
444
445 inode = dentry->d_inode;
ec86dc02 446 dvp = vn_from_inode(dir);
1da177e4 447
67fcaa73 448 error = bhv_vop_remove(dvp, dentry, NULL);
220b5284 449 if (likely(!error)) {
524fbf5d
NS
450 xfs_validate_fields(dir, &vattr); /* size needs update */
451 xfs_validate_fields(inode, &vattr);
1da177e4 452 }
1da177e4
LT
453 return -error;
454}
455
456STATIC int
416c6d5b 457xfs_vn_symlink(
1da177e4
LT
458 struct inode *dir,
459 struct dentry *dentry,
460 const char *symname)
461{
462 struct inode *ip;
8285fb58 463 bhv_vattr_t va = { 0 };
67fcaa73
NS
464 bhv_vnode_t *dvp; /* directory containing name of symlink */
465 bhv_vnode_t *cvp; /* used to lookup symlink to put in dentry */
1da177e4
LT
466 int error;
467
ec86dc02 468 dvp = vn_from_inode(dir);
1da177e4
LT
469 cvp = NULL;
470
67fcaa73 471 va.va_mode = S_IFLNK |
0432dab2 472 (irix_symlink_mode ? 0777 & ~current->fs->umask : S_IRWXUGO);
67fcaa73 473 va.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
1da177e4 474
67fcaa73 475 error = bhv_vop_symlink(dvp, dentry, &va, (char *)symname, &cvp, NULL);
54245702 476 if (likely(!error && cvp)) {
416c6d5b 477 error = xfs_init_security(cvp, dir);
54245702 478 if (likely(!error)) {
ec86dc02 479 ip = vn_to_inode(cvp);
54245702 480 d_instantiate(dentry, ip);
67fcaa73
NS
481 xfs_validate_fields(dir, &va);
482 xfs_validate_fields(ip, &va);
ce9d37c2
NS
483 } else {
484 xfs_cleanup_inode(dvp, cvp, dentry, 0);
54245702 485 }
1da177e4
LT
486 }
487 return -error;
488}
489
490STATIC int
416c6d5b 491xfs_vn_rmdir(
1da177e4
LT
492 struct inode *dir,
493 struct dentry *dentry)
494{
495 struct inode *inode = dentry->d_inode;
67fcaa73 496 bhv_vnode_t *dvp = vn_from_inode(dir);
8285fb58 497 bhv_vattr_t vattr;
1da177e4
LT
498 int error;
499
67fcaa73 500 error = bhv_vop_rmdir(dvp, dentry, NULL);
220b5284 501 if (likely(!error)) {
524fbf5d
NS
502 xfs_validate_fields(inode, &vattr);
503 xfs_validate_fields(dir, &vattr);
1da177e4
LT
504 }
505 return -error;
506}
507
508STATIC int
416c6d5b 509xfs_vn_rename(
1da177e4
LT
510 struct inode *odir,
511 struct dentry *odentry,
512 struct inode *ndir,
513 struct dentry *ndentry)
514{
515 struct inode *new_inode = ndentry->d_inode;
67fcaa73
NS
516 bhv_vnode_t *fvp; /* from directory */
517 bhv_vnode_t *tvp; /* target directory */
8285fb58 518 bhv_vattr_t vattr;
1da177e4
LT
519 int error;
520
ec86dc02
NS
521 fvp = vn_from_inode(odir);
522 tvp = vn_from_inode(ndir);
1da177e4 523
67fcaa73 524 error = bhv_vop_rename(fvp, odentry, tvp, ndentry, NULL);
220b5284
NS
525 if (likely(!error)) {
526 if (new_inode)
524fbf5d
NS
527 xfs_validate_fields(new_inode, &vattr);
528 xfs_validate_fields(odir, &vattr);
220b5284 529 if (ndir != odir)
524fbf5d 530 xfs_validate_fields(ndir, &vattr);
220b5284 531 }
220b5284 532 return -error;
1da177e4
LT
533}
534
535/*
536 * careful here - this function can get called recursively, so
537 * we need to be very careful about how much stack we use.
538 * uio is kmalloced for this reason...
539 */
008b150a 540STATIC void *
416c6d5b 541xfs_vn_follow_link(
1da177e4
LT
542 struct dentry *dentry,
543 struct nameidata *nd)
544{
67fcaa73 545 bhv_vnode_t *vp;
1da177e4
LT
546 uio_t *uio;
547 iovec_t iov;
548 int error;
549 char *link;
550
551 ASSERT(dentry);
552 ASSERT(nd);
553
f52720ca 554 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
1da177e4
LT
555 if (!link) {
556 nd_set_link(nd, ERR_PTR(-ENOMEM));
008b150a 557 return NULL;
1da177e4
LT
558 }
559
f52720ca 560 uio = kmalloc(sizeof(uio_t), GFP_KERNEL);
1da177e4
LT
561 if (!uio) {
562 kfree(link);
563 nd_set_link(nd, ERR_PTR(-ENOMEM));
008b150a 564 return NULL;
1da177e4
LT
565 }
566
ec86dc02 567 vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
568
569 iov.iov_base = link;
0d1335b3 570 iov.iov_len = MAXPATHLEN;
1da177e4
LT
571
572 uio->uio_iov = &iov;
573 uio->uio_offset = 0;
574 uio->uio_segflg = UIO_SYSSPACE;
0d1335b3 575 uio->uio_resid = MAXPATHLEN;
1da177e4
LT
576 uio->uio_iovcnt = 1;
577
67fcaa73
NS
578 error = bhv_vop_readlink(vp, uio, 0, NULL);
579 if (unlikely(error)) {
1da177e4
LT
580 kfree(link);
581 link = ERR_PTR(-error);
582 } else {
0d1335b3 583 link[MAXPATHLEN - uio->uio_resid] = '\0';
1da177e4
LT
584 }
585 kfree(uio);
586
587 nd_set_link(nd, link);
008b150a 588 return NULL;
1da177e4
LT
589}
590
cde410a9 591STATIC void
416c6d5b 592xfs_vn_put_link(
cde410a9
NS
593 struct dentry *dentry,
594 struct nameidata *nd,
595 void *p)
1da177e4 596{
cde410a9
NS
597 char *s = nd_get_link(nd);
598
1da177e4
LT
599 if (!IS_ERR(s))
600 kfree(s);
601}
602
603#ifdef CONFIG_XFS_POSIX_ACL
604STATIC int
416c6d5b 605xfs_vn_permission(
1da177e4
LT
606 struct inode *inode,
607 int mode,
608 struct nameidata *nd)
609{
67fcaa73 610 return -bhv_vop_access(vn_from_inode(inode), mode << 6, NULL);
1da177e4
LT
611}
612#else
416c6d5b 613#define xfs_vn_permission NULL
1da177e4
LT
614#endif
615
616STATIC int
416c6d5b 617xfs_vn_getattr(
1da177e4
LT
618 struct vfsmount *mnt,
619 struct dentry *dentry,
620 struct kstat *stat)
621{
622 struct inode *inode = dentry->d_inode;
67fcaa73 623 bhv_vnode_t *vp = vn_from_inode(inode);
69e23b9a
NS
624 bhv_vattr_t vattr = { .va_mask = XFS_AT_STAT };
625 int error;
1da177e4 626
69e23b9a
NS
627 error = bhv_vop_getattr(vp, &vattr, ATTR_LAZY, NULL);
628 if (likely(!error)) {
629 stat->size = i_size_read(inode);
630 stat->dev = inode->i_sb->s_dev;
631 stat->rdev = (vattr.va_rdev == 0) ? 0 :
632 MKDEV(sysv_major(vattr.va_rdev) & 0x1ff,
633 sysv_minor(vattr.va_rdev));
634 stat->mode = vattr.va_mode;
635 stat->nlink = vattr.va_nlink;
636 stat->uid = vattr.va_uid;
637 stat->gid = vattr.va_gid;
638 stat->ino = vattr.va_nodeid;
639 stat->atime = vattr.va_atime;
640 stat->mtime = vattr.va_mtime;
641 stat->ctime = vattr.va_ctime;
642 stat->blocks = vattr.va_nblocks;
643 stat->blksize = vattr.va_blocksize;
644 }
b76963fa 645 return -error;
1da177e4
LT
646}
647
648STATIC int
416c6d5b 649xfs_vn_setattr(
1da177e4
LT
650 struct dentry *dentry,
651 struct iattr *attr)
652{
653 struct inode *inode = dentry->d_inode;
654 unsigned int ia_valid = attr->ia_valid;
67fcaa73 655 bhv_vnode_t *vp = vn_from_inode(inode);
8285fb58 656 bhv_vattr_t vattr = { 0 };
1da177e4
LT
657 int flags = 0;
658 int error;
659
1da177e4
LT
660 if (ia_valid & ATTR_UID) {
661 vattr.va_mask |= XFS_AT_UID;
662 vattr.va_uid = attr->ia_uid;
663 }
664 if (ia_valid & ATTR_GID) {
665 vattr.va_mask |= XFS_AT_GID;
666 vattr.va_gid = attr->ia_gid;
667 }
668 if (ia_valid & ATTR_SIZE) {
669 vattr.va_mask |= XFS_AT_SIZE;
670 vattr.va_size = attr->ia_size;
671 }
672 if (ia_valid & ATTR_ATIME) {
673 vattr.va_mask |= XFS_AT_ATIME;
674 vattr.va_atime = attr->ia_atime;
8c0b5113 675 inode->i_atime = attr->ia_atime;
1da177e4
LT
676 }
677 if (ia_valid & ATTR_MTIME) {
678 vattr.va_mask |= XFS_AT_MTIME;
679 vattr.va_mtime = attr->ia_mtime;
680 }
681 if (ia_valid & ATTR_CTIME) {
682 vattr.va_mask |= XFS_AT_CTIME;
683 vattr.va_ctime = attr->ia_ctime;
684 }
685 if (ia_valid & ATTR_MODE) {
686 vattr.va_mask |= XFS_AT_MODE;
687 vattr.va_mode = attr->ia_mode;
688 if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID))
689 inode->i_mode &= ~S_ISGID;
690 }
691
692 if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET))
693 flags |= ATTR_UTIME;
694#ifdef ATTR_NO_BLOCK
695 if ((ia_valid & ATTR_NO_BLOCK))
696 flags |= ATTR_NONBLOCK;
697#endif
698
67fcaa73 699 error = bhv_vop_setattr(vp, &vattr, flags, NULL);
220b5284
NS
700 if (likely(!error))
701 __vn_revalidate(vp, &vattr);
702 return -error;
1da177e4
LT
703}
704
705STATIC void
416c6d5b 706xfs_vn_truncate(
1da177e4
LT
707 struct inode *inode)
708{
c2536668 709 block_truncate_page(inode->i_mapping, inode->i_size, xfs_get_blocks);
1da177e4
LT
710}
711
712STATIC int
416c6d5b 713xfs_vn_setxattr(
1da177e4
LT
714 struct dentry *dentry,
715 const char *name,
716 const void *data,
717 size_t size,
718 int flags)
719{
67fcaa73 720 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
721 char *attr = (char *)name;
722 attrnames_t *namesp;
723 int xflags = 0;
724 int error;
725
726 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
727 if (!namesp)
728 return -EOPNOTSUPP;
729 attr += namesp->attr_namelen;
730 error = namesp->attr_capable(vp, NULL);
731 if (error)
732 return error;
733
734 /* Convert Linux syscall to XFS internal ATTR flags */
735 if (flags & XATTR_CREATE)
736 xflags |= ATTR_CREATE;
737 if (flags & XATTR_REPLACE)
738 xflags |= ATTR_REPLACE;
739 xflags |= namesp->attr_flag;
740 return namesp->attr_set(vp, attr, (void *)data, size, xflags);
741}
742
743STATIC ssize_t
416c6d5b 744xfs_vn_getxattr(
1da177e4
LT
745 struct dentry *dentry,
746 const char *name,
747 void *data,
748 size_t size)
749{
67fcaa73 750 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
751 char *attr = (char *)name;
752 attrnames_t *namesp;
753 int xflags = 0;
754 ssize_t error;
755
756 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
757 if (!namesp)
758 return -EOPNOTSUPP;
759 attr += namesp->attr_namelen;
760 error = namesp->attr_capable(vp, NULL);
761 if (error)
762 return error;
763
764 /* Convert Linux syscall to XFS internal ATTR flags */
765 if (!size) {
766 xflags |= ATTR_KERNOVAL;
767 data = NULL;
768 }
769 xflags |= namesp->attr_flag;
770 return namesp->attr_get(vp, attr, (void *)data, size, xflags);
771}
772
773STATIC ssize_t
416c6d5b 774xfs_vn_listxattr(
1da177e4
LT
775 struct dentry *dentry,
776 char *data,
777 size_t size)
778{
67fcaa73 779 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
780 int error, xflags = ATTR_KERNAMELS;
781 ssize_t result;
782
783 if (!size)
784 xflags |= ATTR_KERNOVAL;
785 xflags |= capable(CAP_SYS_ADMIN) ? ATTR_KERNFULLS : ATTR_KERNORMALS;
786
787 error = attr_generic_list(vp, data, size, xflags, &result);
788 if (error < 0)
789 return error;
790 return result;
791}
792
793STATIC int
416c6d5b 794xfs_vn_removexattr(
1da177e4
LT
795 struct dentry *dentry,
796 const char *name)
797{
67fcaa73 798 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
799 char *attr = (char *)name;
800 attrnames_t *namesp;
801 int xflags = 0;
802 int error;
803
804 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
805 if (!namesp)
806 return -EOPNOTSUPP;
807 attr += namesp->attr_namelen;
808 error = namesp->attr_capable(vp, NULL);
809 if (error)
810 return error;
811 xflags |= namesp->attr_flag;
812 return namesp->attr_remove(vp, attr, xflags);
813}
814
815
c5ef1c42 816const struct inode_operations xfs_inode_operations = {
416c6d5b
NS
817 .permission = xfs_vn_permission,
818 .truncate = xfs_vn_truncate,
819 .getattr = xfs_vn_getattr,
820 .setattr = xfs_vn_setattr,
821 .setxattr = xfs_vn_setxattr,
822 .getxattr = xfs_vn_getxattr,
823 .listxattr = xfs_vn_listxattr,
824 .removexattr = xfs_vn_removexattr,
1da177e4
LT
825};
826
c5ef1c42 827const struct inode_operations xfs_dir_inode_operations = {
416c6d5b
NS
828 .create = xfs_vn_create,
829 .lookup = xfs_vn_lookup,
830 .link = xfs_vn_link,
831 .unlink = xfs_vn_unlink,
832 .symlink = xfs_vn_symlink,
833 .mkdir = xfs_vn_mkdir,
834 .rmdir = xfs_vn_rmdir,
835 .mknod = xfs_vn_mknod,
836 .rename = xfs_vn_rename,
837 .permission = xfs_vn_permission,
838 .getattr = xfs_vn_getattr,
839 .setattr = xfs_vn_setattr,
840 .setxattr = xfs_vn_setxattr,
841 .getxattr = xfs_vn_getxattr,
842 .listxattr = xfs_vn_listxattr,
843 .removexattr = xfs_vn_removexattr,
1da177e4
LT
844};
845
c5ef1c42 846const struct inode_operations xfs_symlink_inode_operations = {
1da177e4 847 .readlink = generic_readlink,
416c6d5b
NS
848 .follow_link = xfs_vn_follow_link,
849 .put_link = xfs_vn_put_link,
850 .permission = xfs_vn_permission,
851 .getattr = xfs_vn_getattr,
852 .setattr = xfs_vn_setattr,
853 .setxattr = xfs_vn_setxattr,
854 .getxattr = xfs_vn_getxattr,
855 .listxattr = xfs_vn_listxattr,
856 .removexattr = xfs_vn_removexattr,
1da177e4 857};