[XFS] kill the v_number member in struct bhv_vnode
[linux-2.6-block.git] / fs / xfs / linux-2.6 / xfs_iops.c
CommitLineData
1da177e4 1/*
7b718769
NS
2 * Copyright (c) 2000-2005 Silicon Graphics, Inc.
3 * All Rights Reserved.
1da177e4 4 *
7b718769
NS
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License as
1da177e4
LT
7 * published by the Free Software Foundation.
8 *
7b718769
NS
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
1da177e4 13 *
7b718769
NS
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
1da177e4 17 */
1da177e4
LT
18#include "xfs.h"
19#include "xfs_fs.h"
a844f451 20#include "xfs_bit.h"
1da177e4 21#include "xfs_log.h"
a844f451 22#include "xfs_inum.h"
1da177e4
LT
23#include "xfs_trans.h"
24#include "xfs_sb.h"
25#include "xfs_ag.h"
1da177e4
LT
26#include "xfs_dir2.h"
27#include "xfs_alloc.h"
28#include "xfs_dmapi.h"
29#include "xfs_quota.h"
30#include "xfs_mount.h"
1da177e4 31#include "xfs_bmap_btree.h"
a844f451 32#include "xfs_alloc_btree.h"
1da177e4 33#include "xfs_ialloc_btree.h"
1da177e4 34#include "xfs_dir2_sf.h"
a844f451 35#include "xfs_attr_sf.h"
1da177e4
LT
36#include "xfs_dinode.h"
37#include "xfs_inode.h"
38#include "xfs_bmap.h"
a844f451
NS
39#include "xfs_btree.h"
40#include "xfs_ialloc.h"
1da177e4
LT
41#include "xfs_rtalloc.h"
42#include "xfs_error.h"
43#include "xfs_itable.h"
44#include "xfs_rw.h"
45#include "xfs_acl.h"
1da177e4
LT
46#include "xfs_attr.h"
47#include "xfs_buf_item.h"
48#include "xfs_utils.h"
739bfb2a 49#include "xfs_vnodeops.h"
1da177e4 50
16f7e0fe 51#include <linux/capability.h>
1da177e4
LT
52#include <linux/xattr.h>
53#include <linux/namei.h>
446ada4a 54#include <linux/security.h>
1da177e4 55
42fe2b1f
CH
56/*
57 * Bring the atime in the XFS inode uptodate.
58 * Used before logging the inode to disk or when the Linux inode goes away.
59 */
60void
61xfs_synchronize_atime(
62 xfs_inode_t *ip)
63{
67fcaa73 64 bhv_vnode_t *vp;
42fe2b1f
CH
65
66 vp = XFS_ITOV_NULL(ip);
67 if (vp) {
68 struct inode *inode = &vp->v_inode;
69 ip->i_d.di_atime.t_sec = (__int32_t)inode->i_atime.tv_sec;
70 ip->i_d.di_atime.t_nsec = (__int32_t)inode->i_atime.tv_nsec;
71 }
72}
73
4aeb664c
NS
74/*
75 * Change the requested timestamp in the given inode.
76 * We don't lock across timestamp updates, and we don't log them but
77 * we do record the fact that there is dirty information in core.
78 *
79 * NOTE -- callers MUST combine XFS_ICHGTIME_MOD or XFS_ICHGTIME_CHG
80 * with XFS_ICHGTIME_ACC to be sure that access time
81 * update will take. Calling first with XFS_ICHGTIME_ACC
82 * and then XFS_ICHGTIME_MOD may fail to modify the access
83 * timestamp if the filesystem is mounted noacctm.
84 */
85void
86xfs_ichgtime(
87 xfs_inode_t *ip,
88 int flags)
89{
ec86dc02 90 struct inode *inode = vn_to_inode(XFS_ITOV(ip));
4aeb664c
NS
91 timespec_t tv;
92
4aeb664c
NS
93 nanotime(&tv);
94 if (flags & XFS_ICHGTIME_MOD) {
95 inode->i_mtime = tv;
96 ip->i_d.di_mtime.t_sec = (__int32_t)tv.tv_sec;
97 ip->i_d.di_mtime.t_nsec = (__int32_t)tv.tv_nsec;
98 }
99 if (flags & XFS_ICHGTIME_ACC) {
100 inode->i_atime = tv;
101 ip->i_d.di_atime.t_sec = (__int32_t)tv.tv_sec;
102 ip->i_d.di_atime.t_nsec = (__int32_t)tv.tv_nsec;
103 }
104 if (flags & XFS_ICHGTIME_CHG) {
105 inode->i_ctime = tv;
106 ip->i_d.di_ctime.t_sec = (__int32_t)tv.tv_sec;
107 ip->i_d.di_ctime.t_nsec = (__int32_t)tv.tv_nsec;
108 }
109
110 /*
111 * We update the i_update_core field _after_ changing
112 * the timestamps in order to coordinate properly with
113 * xfs_iflush() so that we don't lose timestamp updates.
114 * This keeps us from having to hold the inode lock
115 * while doing this. We use the SYNCHRONIZE macro to
116 * ensure that the compiler does not reorder the update
117 * of i_update_core above the timestamp updates above.
118 */
119 SYNCHRONIZE();
120 ip->i_update_core = 1;
121 if (!(inode->i_state & I_LOCK))
122 mark_inode_dirty_sync(inode);
123}
124
125/*
126 * Variant on the above which avoids querying the system clock
127 * in situations where we know the Linux inode timestamps have
128 * just been updated (and so we can update our inode cheaply).
4aeb664c
NS
129 */
130void
131xfs_ichgtime_fast(
132 xfs_inode_t *ip,
133 struct inode *inode,
134 int flags)
135{
136 timespec_t *tvp;
137
138 /*
42fe2b1f
CH
139 * Atime updates for read() & friends are handled lazily now, and
140 * explicit updates must go through xfs_ichgtime()
4aeb664c 141 */
42fe2b1f 142 ASSERT((flags & XFS_ICHGTIME_ACC) == 0);
4aeb664c
NS
143
144 /*
42fe2b1f
CH
145 * We're not supposed to change timestamps in readonly-mounted
146 * filesystems. Throw it away if anyone asks us.
4aeb664c 147 */
42fe2b1f 148 if (unlikely(IS_RDONLY(inode)))
4aeb664c
NS
149 return;
150
151 if (flags & XFS_ICHGTIME_MOD) {
152 tvp = &inode->i_mtime;
153 ip->i_d.di_mtime.t_sec = (__int32_t)tvp->tv_sec;
154 ip->i_d.di_mtime.t_nsec = (__int32_t)tvp->tv_nsec;
155 }
4aeb664c
NS
156 if (flags & XFS_ICHGTIME_CHG) {
157 tvp = &inode->i_ctime;
158 ip->i_d.di_ctime.t_sec = (__int32_t)tvp->tv_sec;
159 ip->i_d.di_ctime.t_nsec = (__int32_t)tvp->tv_nsec;
160 }
161
162 /*
163 * We update the i_update_core field _after_ changing
164 * the timestamps in order to coordinate properly with
165 * xfs_iflush() so that we don't lose timestamp updates.
166 * This keeps us from having to hold the inode lock
167 * while doing this. We use the SYNCHRONIZE macro to
168 * ensure that the compiler does not reorder the update
169 * of i_update_core above the timestamp updates above.
170 */
171 SYNCHRONIZE();
172 ip->i_update_core = 1;
173 if (!(inode->i_state & I_LOCK))
174 mark_inode_dirty_sync(inode);
175}
176
1da177e4
LT
177
178/*
179 * Pull the link count and size up from the xfs inode to the linux inode
180 */
181STATIC void
416c6d5b 182xfs_validate_fields(
220b5284 183 struct inode *ip,
8285fb58 184 bhv_vattr_t *vattr)
1da177e4 185{
220b5284 186 vattr->va_mask = XFS_AT_NLINK|XFS_AT_SIZE|XFS_AT_NBLOCKS;
739bfb2a 187 if (!xfs_getattr(XFS_I(ip), vattr, ATTR_LAZY)) {
220b5284
NS
188 ip->i_nlink = vattr->va_nlink;
189 ip->i_blocks = vattr->va_nblocks;
1da177e4 190
220b5284
NS
191 /* we're under i_sem so i_size can't change under us */
192 if (i_size_read(ip) != vattr->va_size)
193 i_size_write(ip, vattr->va_size);
1da177e4
LT
194 }
195}
196
446ada4a
NS
197/*
198 * Hook in SELinux. This is not quite correct yet, what we really need
199 * here (as we do for default ACLs) is a mechanism by which creation of
200 * these attrs can be journalled at inode creation time (along with the
201 * inode, of course, such that log replay can't cause these to be lost).
202 */
203STATIC int
416c6d5b 204xfs_init_security(
67fcaa73 205 bhv_vnode_t *vp,
446ada4a
NS
206 struct inode *dir)
207{
ec86dc02 208 struct inode *ip = vn_to_inode(vp);
446ada4a
NS
209 size_t length;
210 void *value;
211 char *name;
212 int error;
213
214 error = security_inode_init_security(ip, dir, &name, &value, &length);
215 if (error) {
216 if (error == -EOPNOTSUPP)
217 return 0;
218 return -error;
219 }
220
739bfb2a
CH
221 error = xfs_attr_set(XFS_I(ip), name, value,
222 length, ATTR_SECURE);
446ada4a 223 if (!error)
b3aea4ed 224 xfs_iflags_set(XFS_I(ip), XFS_IMODIFIED);
446ada4a
NS
225
226 kfree(name);
227 kfree(value);
228 return error;
229}
230
1da177e4
LT
231/*
232 * Determine whether a process has a valid fs_struct (kernel daemons
233 * like knfsd don't have an fs_struct).
234 *
235 * XXX(hch): nfsd is broken, better fix it instead.
236 */
7989cb8e 237STATIC_INLINE int
416c6d5b 238xfs_has_fs_struct(struct task_struct *task)
1da177e4
LT
239{
240 return (task->fs != init_task.fs);
241}
242
7989cb8e 243STATIC void
416c6d5b 244xfs_cleanup_inode(
739bfb2a 245 struct inode *dir,
67fcaa73 246 bhv_vnode_t *vp,
220b5284 247 struct dentry *dentry,
3a69c7dc
YL
248 int mode)
249{
250 struct dentry teardown = {};
3a69c7dc
YL
251
252 /* Oh, the horror.
220b5284 253 * If we can't add the ACL or we fail in
416c6d5b 254 * xfs_init_security we must back out.
3a69c7dc
YL
255 * ENOSPC can hit here, among other things.
256 */
ec86dc02 257 teardown.d_inode = vn_to_inode(vp);
3a69c7dc
YL
258 teardown.d_name = dentry->d_name;
259
260 if (S_ISDIR(mode))
739bfb2a 261 xfs_rmdir(XFS_I(dir), &teardown);
3a69c7dc 262 else
739bfb2a 263 xfs_remove(XFS_I(dir), &teardown);
3a69c7dc
YL
264 VN_RELE(vp);
265}
266
1da177e4 267STATIC int
416c6d5b 268xfs_vn_mknod(
1da177e4
LT
269 struct inode *dir,
270 struct dentry *dentry,
271 int mode,
272 dev_t rdev)
273{
274 struct inode *ip;
8285fb58 275 bhv_vattr_t vattr = { 0 };
67fcaa73 276 bhv_vnode_t *vp = NULL, *dvp = vn_from_inode(dir);
1da177e4
LT
277 xfs_acl_t *default_acl = NULL;
278 attrexists_t test_default_acl = _ACL_DEFAULT_EXISTS;
279 int error;
280
281 /*
282 * Irix uses Missed'em'V split, but doesn't want to see
283 * the upper 5 bits of (14bit) major.
284 */
220b5284 285 if (unlikely(!sysv_valid_dev(rdev) || MAJOR(rdev) & ~0x1ff))
1da177e4
LT
286 return -EINVAL;
287
220b5284
NS
288 if (unlikely(test_default_acl && test_default_acl(dvp))) {
289 if (!_ACL_ALLOC(default_acl)) {
1da177e4 290 return -ENOMEM;
220b5284 291 }
1da177e4
LT
292 if (!_ACL_GET_DEFAULT(dvp, default_acl)) {
293 _ACL_FREE(default_acl);
294 default_acl = NULL;
295 }
296 }
297
416c6d5b 298 if (IS_POSIXACL(dir) && !default_acl && xfs_has_fs_struct(current))
1da177e4
LT
299 mode &= ~current->fs->umask;
300
524fbf5d
NS
301 vattr.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
302 vattr.va_mode = mode;
1da177e4
LT
303
304 switch (mode & S_IFMT) {
305 case S_IFCHR: case S_IFBLK: case S_IFIFO: case S_IFSOCK:
524fbf5d
NS
306 vattr.va_rdev = sysv_encode_dev(rdev);
307 vattr.va_mask |= XFS_AT_RDEV;
1da177e4
LT
308 /*FALLTHROUGH*/
309 case S_IFREG:
739bfb2a 310 error = xfs_create(XFS_I(dir), dentry, &vattr, &vp, NULL);
1da177e4
LT
311 break;
312 case S_IFDIR:
739bfb2a 313 error = xfs_mkdir(XFS_I(dir), dentry, &vattr, &vp, NULL);
1da177e4
LT
314 break;
315 default:
316 error = EINVAL;
317 break;
318 }
319
220b5284 320 if (unlikely(!error)) {
416c6d5b 321 error = xfs_init_security(vp, dir);
3a69c7dc 322 if (error)
739bfb2a 323 xfs_cleanup_inode(dir, vp, dentry, mode);
3a69c7dc 324 }
446ada4a 325
220b5284 326 if (unlikely(default_acl)) {
1da177e4 327 if (!error) {
524fbf5d 328 error = _ACL_INHERIT(vp, &vattr, default_acl);
220b5284 329 if (!error)
b3aea4ed 330 xfs_iflags_set(XFS_I(&vp->v_inode), XFS_IMODIFIED);
3a69c7dc 331 else
739bfb2a 332 xfs_cleanup_inode(dir, vp, dentry, mode);
1da177e4
LT
333 }
334 _ACL_FREE(default_acl);
335 }
336
220b5284 337 if (likely(!error)) {
1da177e4 338 ASSERT(vp);
ec86dc02 339 ip = vn_to_inode(vp);
1da177e4
LT
340
341 if (S_ISCHR(mode) || S_ISBLK(mode))
342 ip->i_rdev = rdev;
343 else if (S_ISDIR(mode))
524fbf5d 344 xfs_validate_fields(ip, &vattr);
1da177e4 345 d_instantiate(dentry, ip);
524fbf5d 346 xfs_validate_fields(dir, &vattr);
1da177e4
LT
347 }
348 return -error;
349}
350
351STATIC int
416c6d5b 352xfs_vn_create(
1da177e4
LT
353 struct inode *dir,
354 struct dentry *dentry,
355 int mode,
356 struct nameidata *nd)
357{
416c6d5b 358 return xfs_vn_mknod(dir, dentry, mode, 0);
1da177e4
LT
359}
360
361STATIC int
416c6d5b 362xfs_vn_mkdir(
1da177e4
LT
363 struct inode *dir,
364 struct dentry *dentry,
365 int mode)
366{
416c6d5b 367 return xfs_vn_mknod(dir, dentry, mode|S_IFDIR, 0);
1da177e4
LT
368}
369
370STATIC struct dentry *
416c6d5b 371xfs_vn_lookup(
1da177e4
LT
372 struct inode *dir,
373 struct dentry *dentry,
374 struct nameidata *nd)
375{
739bfb2a 376 bhv_vnode_t *cvp;
1da177e4
LT
377 int error;
378
379 if (dentry->d_name.len >= MAXNAMELEN)
380 return ERR_PTR(-ENAMETOOLONG);
381
739bfb2a 382 error = xfs_lookup(XFS_I(dir), dentry, &cvp);
67fcaa73 383 if (unlikely(error)) {
1da177e4
LT
384 if (unlikely(error != ENOENT))
385 return ERR_PTR(-error);
386 d_add(dentry, NULL);
387 return NULL;
388 }
389
ec86dc02 390 return d_splice_alias(vn_to_inode(cvp), dentry);
1da177e4
LT
391}
392
393STATIC int
416c6d5b 394xfs_vn_link(
1da177e4
LT
395 struct dentry *old_dentry,
396 struct inode *dir,
397 struct dentry *dentry)
398{
399 struct inode *ip; /* inode of guy being linked to */
67fcaa73 400 bhv_vnode_t *vp; /* vp of name being linked */
8285fb58 401 bhv_vattr_t vattr;
1da177e4
LT
402 int error;
403
404 ip = old_dentry->d_inode; /* inode being linked to */
ec86dc02 405 vp = vn_from_inode(ip);
1da177e4 406
97dfd70c 407 VN_HOLD(vp);
739bfb2a 408 error = xfs_link(XFS_I(dir), vp, dentry);
97dfd70c
NS
409 if (unlikely(error)) {
410 VN_RELE(vp);
411 } else {
b3aea4ed 412 xfs_iflags_set(XFS_I(dir), XFS_IMODIFIED);
524fbf5d 413 xfs_validate_fields(ip, &vattr);
1da177e4
LT
414 d_instantiate(dentry, ip);
415 }
416 return -error;
417}
418
419STATIC int
416c6d5b 420xfs_vn_unlink(
1da177e4
LT
421 struct inode *dir,
422 struct dentry *dentry)
423{
424 struct inode *inode;
8285fb58 425 bhv_vattr_t vattr;
1da177e4
LT
426 int error;
427
428 inode = dentry->d_inode;
1da177e4 429
739bfb2a 430 error = xfs_remove(XFS_I(dir), dentry);
220b5284 431 if (likely(!error)) {
524fbf5d
NS
432 xfs_validate_fields(dir, &vattr); /* size needs update */
433 xfs_validate_fields(inode, &vattr);
1da177e4 434 }
1da177e4
LT
435 return -error;
436}
437
438STATIC int
416c6d5b 439xfs_vn_symlink(
1da177e4
LT
440 struct inode *dir,
441 struct dentry *dentry,
442 const char *symname)
443{
444 struct inode *ip;
8285fb58 445 bhv_vattr_t va = { 0 };
67fcaa73 446 bhv_vnode_t *cvp; /* used to lookup symlink to put in dentry */
1da177e4
LT
447 int error;
448
1da177e4
LT
449 cvp = NULL;
450
67fcaa73 451 va.va_mode = S_IFLNK |
0432dab2 452 (irix_symlink_mode ? 0777 & ~current->fs->umask : S_IRWXUGO);
67fcaa73 453 va.va_mask = XFS_AT_TYPE|XFS_AT_MODE;
1da177e4 454
739bfb2a
CH
455 error = xfs_symlink(XFS_I(dir), dentry, &va,
456 (char *)symname, &cvp, NULL);
54245702 457 if (likely(!error && cvp)) {
416c6d5b 458 error = xfs_init_security(cvp, dir);
54245702 459 if (likely(!error)) {
ec86dc02 460 ip = vn_to_inode(cvp);
54245702 461 d_instantiate(dentry, ip);
67fcaa73
NS
462 xfs_validate_fields(dir, &va);
463 xfs_validate_fields(ip, &va);
ce9d37c2 464 } else {
739bfb2a 465 xfs_cleanup_inode(dir, cvp, dentry, 0);
54245702 466 }
1da177e4
LT
467 }
468 return -error;
469}
470
471STATIC int
416c6d5b 472xfs_vn_rmdir(
1da177e4
LT
473 struct inode *dir,
474 struct dentry *dentry)
475{
476 struct inode *inode = dentry->d_inode;
8285fb58 477 bhv_vattr_t vattr;
1da177e4
LT
478 int error;
479
739bfb2a 480 error = xfs_rmdir(XFS_I(dir), dentry);
220b5284 481 if (likely(!error)) {
524fbf5d
NS
482 xfs_validate_fields(inode, &vattr);
483 xfs_validate_fields(dir, &vattr);
1da177e4
LT
484 }
485 return -error;
486}
487
488STATIC int
416c6d5b 489xfs_vn_rename(
1da177e4
LT
490 struct inode *odir,
491 struct dentry *odentry,
492 struct inode *ndir,
493 struct dentry *ndentry)
494{
495 struct inode *new_inode = ndentry->d_inode;
67fcaa73 496 bhv_vnode_t *tvp; /* target directory */
8285fb58 497 bhv_vattr_t vattr;
1da177e4
LT
498 int error;
499
ec86dc02 500 tvp = vn_from_inode(ndir);
1da177e4 501
739bfb2a 502 error = xfs_rename(XFS_I(odir), odentry, tvp, ndentry);
220b5284
NS
503 if (likely(!error)) {
504 if (new_inode)
524fbf5d
NS
505 xfs_validate_fields(new_inode, &vattr);
506 xfs_validate_fields(odir, &vattr);
220b5284 507 if (ndir != odir)
524fbf5d 508 xfs_validate_fields(ndir, &vattr);
220b5284 509 }
220b5284 510 return -error;
1da177e4
LT
511}
512
513/*
514 * careful here - this function can get called recursively, so
515 * we need to be very careful about how much stack we use.
516 * uio is kmalloced for this reason...
517 */
008b150a 518STATIC void *
416c6d5b 519xfs_vn_follow_link(
1da177e4
LT
520 struct dentry *dentry,
521 struct nameidata *nd)
522{
1da177e4 523 char *link;
804c83c3 524 int error = -ENOMEM;
1da177e4 525
f52720ca 526 link = kmalloc(MAXPATHLEN+1, GFP_KERNEL);
804c83c3
CH
527 if (!link)
528 goto out_err;
1da177e4 529
739bfb2a 530 error = -xfs_readlink(XFS_I(dentry->d_inode), link);
804c83c3
CH
531 if (unlikely(error))
532 goto out_kfree;
1da177e4
LT
533
534 nd_set_link(nd, link);
008b150a 535 return NULL;
804c83c3
CH
536
537 out_kfree:
538 kfree(link);
539 out_err:
540 nd_set_link(nd, ERR_PTR(error));
541 return NULL;
1da177e4
LT
542}
543
cde410a9 544STATIC void
416c6d5b 545xfs_vn_put_link(
cde410a9
NS
546 struct dentry *dentry,
547 struct nameidata *nd,
548 void *p)
1da177e4 549{
cde410a9
NS
550 char *s = nd_get_link(nd);
551
1da177e4
LT
552 if (!IS_ERR(s))
553 kfree(s);
554}
555
556#ifdef CONFIG_XFS_POSIX_ACL
557STATIC int
416c6d5b 558xfs_vn_permission(
1da177e4
LT
559 struct inode *inode,
560 int mode,
561 struct nameidata *nd)
562{
739bfb2a 563 return -xfs_access(XFS_I(inode), mode << 6, NULL);
1da177e4
LT
564}
565#else
416c6d5b 566#define xfs_vn_permission NULL
1da177e4
LT
567#endif
568
569STATIC int
416c6d5b 570xfs_vn_getattr(
1da177e4
LT
571 struct vfsmount *mnt,
572 struct dentry *dentry,
573 struct kstat *stat)
574{
575 struct inode *inode = dentry->d_inode;
69e23b9a
NS
576 bhv_vattr_t vattr = { .va_mask = XFS_AT_STAT };
577 int error;
1da177e4 578
739bfb2a 579 error = xfs_getattr(XFS_I(inode), &vattr, ATTR_LAZY);
69e23b9a
NS
580 if (likely(!error)) {
581 stat->size = i_size_read(inode);
582 stat->dev = inode->i_sb->s_dev;
583 stat->rdev = (vattr.va_rdev == 0) ? 0 :
584 MKDEV(sysv_major(vattr.va_rdev) & 0x1ff,
585 sysv_minor(vattr.va_rdev));
586 stat->mode = vattr.va_mode;
587 stat->nlink = vattr.va_nlink;
588 stat->uid = vattr.va_uid;
589 stat->gid = vattr.va_gid;
590 stat->ino = vattr.va_nodeid;
591 stat->atime = vattr.va_atime;
592 stat->mtime = vattr.va_mtime;
593 stat->ctime = vattr.va_ctime;
594 stat->blocks = vattr.va_nblocks;
595 stat->blksize = vattr.va_blocksize;
596 }
b76963fa 597 return -error;
1da177e4
LT
598}
599
600STATIC int
416c6d5b 601xfs_vn_setattr(
1da177e4
LT
602 struct dentry *dentry,
603 struct iattr *attr)
604{
605 struct inode *inode = dentry->d_inode;
606 unsigned int ia_valid = attr->ia_valid;
8285fb58 607 bhv_vattr_t vattr = { 0 };
1da177e4
LT
608 int flags = 0;
609 int error;
610
1da177e4
LT
611 if (ia_valid & ATTR_UID) {
612 vattr.va_mask |= XFS_AT_UID;
613 vattr.va_uid = attr->ia_uid;
614 }
615 if (ia_valid & ATTR_GID) {
616 vattr.va_mask |= XFS_AT_GID;
617 vattr.va_gid = attr->ia_gid;
618 }
619 if (ia_valid & ATTR_SIZE) {
620 vattr.va_mask |= XFS_AT_SIZE;
621 vattr.va_size = attr->ia_size;
622 }
623 if (ia_valid & ATTR_ATIME) {
624 vattr.va_mask |= XFS_AT_ATIME;
625 vattr.va_atime = attr->ia_atime;
8c0b5113 626 inode->i_atime = attr->ia_atime;
1da177e4
LT
627 }
628 if (ia_valid & ATTR_MTIME) {
629 vattr.va_mask |= XFS_AT_MTIME;
630 vattr.va_mtime = attr->ia_mtime;
631 }
632 if (ia_valid & ATTR_CTIME) {
633 vattr.va_mask |= XFS_AT_CTIME;
634 vattr.va_ctime = attr->ia_ctime;
635 }
636 if (ia_valid & ATTR_MODE) {
637 vattr.va_mask |= XFS_AT_MODE;
638 vattr.va_mode = attr->ia_mode;
639 if (!in_group_p(inode->i_gid) && !capable(CAP_FSETID))
640 inode->i_mode &= ~S_ISGID;
641 }
642
643 if (ia_valid & (ATTR_MTIME_SET | ATTR_ATIME_SET))
644 flags |= ATTR_UTIME;
645#ifdef ATTR_NO_BLOCK
646 if ((ia_valid & ATTR_NO_BLOCK))
647 flags |= ATTR_NONBLOCK;
648#endif
649
739bfb2a 650 error = xfs_setattr(XFS_I(inode), &vattr, flags, NULL);
220b5284 651 if (likely(!error))
739bfb2a 652 __vn_revalidate(vn_from_inode(inode), &vattr);
220b5284 653 return -error;
1da177e4
LT
654}
655
656STATIC void
416c6d5b 657xfs_vn_truncate(
1da177e4
LT
658 struct inode *inode)
659{
c2536668 660 block_truncate_page(inode->i_mapping, inode->i_size, xfs_get_blocks);
1da177e4
LT
661}
662
663STATIC int
416c6d5b 664xfs_vn_setxattr(
1da177e4
LT
665 struct dentry *dentry,
666 const char *name,
667 const void *data,
668 size_t size,
669 int flags)
670{
67fcaa73 671 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
672 char *attr = (char *)name;
673 attrnames_t *namesp;
674 int xflags = 0;
675 int error;
676
677 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
678 if (!namesp)
679 return -EOPNOTSUPP;
680 attr += namesp->attr_namelen;
681 error = namesp->attr_capable(vp, NULL);
682 if (error)
683 return error;
684
685 /* Convert Linux syscall to XFS internal ATTR flags */
686 if (flags & XATTR_CREATE)
687 xflags |= ATTR_CREATE;
688 if (flags & XATTR_REPLACE)
689 xflags |= ATTR_REPLACE;
690 xflags |= namesp->attr_flag;
691 return namesp->attr_set(vp, attr, (void *)data, size, xflags);
692}
693
694STATIC ssize_t
416c6d5b 695xfs_vn_getxattr(
1da177e4
LT
696 struct dentry *dentry,
697 const char *name,
698 void *data,
699 size_t size)
700{
67fcaa73 701 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
702 char *attr = (char *)name;
703 attrnames_t *namesp;
704 int xflags = 0;
705 ssize_t error;
706
707 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
708 if (!namesp)
709 return -EOPNOTSUPP;
710 attr += namesp->attr_namelen;
711 error = namesp->attr_capable(vp, NULL);
712 if (error)
713 return error;
714
715 /* Convert Linux syscall to XFS internal ATTR flags */
716 if (!size) {
717 xflags |= ATTR_KERNOVAL;
718 data = NULL;
719 }
720 xflags |= namesp->attr_flag;
721 return namesp->attr_get(vp, attr, (void *)data, size, xflags);
722}
723
724STATIC ssize_t
416c6d5b 725xfs_vn_listxattr(
1da177e4
LT
726 struct dentry *dentry,
727 char *data,
728 size_t size)
729{
67fcaa73 730 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
731 int error, xflags = ATTR_KERNAMELS;
732 ssize_t result;
733
734 if (!size)
735 xflags |= ATTR_KERNOVAL;
736 xflags |= capable(CAP_SYS_ADMIN) ? ATTR_KERNFULLS : ATTR_KERNORMALS;
737
738 error = attr_generic_list(vp, data, size, xflags, &result);
739 if (error < 0)
740 return error;
741 return result;
742}
743
744STATIC int
416c6d5b 745xfs_vn_removexattr(
1da177e4
LT
746 struct dentry *dentry,
747 const char *name)
748{
67fcaa73 749 bhv_vnode_t *vp = vn_from_inode(dentry->d_inode);
1da177e4
LT
750 char *attr = (char *)name;
751 attrnames_t *namesp;
752 int xflags = 0;
753 int error;
754
755 namesp = attr_lookup_namespace(attr, attr_namespaces, ATTR_NAMECOUNT);
756 if (!namesp)
757 return -EOPNOTSUPP;
758 attr += namesp->attr_namelen;
759 error = namesp->attr_capable(vp, NULL);
760 if (error)
761 return error;
762 xflags |= namesp->attr_flag;
763 return namesp->attr_remove(vp, attr, xflags);
764}
765
766
c5ef1c42 767const struct inode_operations xfs_inode_operations = {
416c6d5b
NS
768 .permission = xfs_vn_permission,
769 .truncate = xfs_vn_truncate,
770 .getattr = xfs_vn_getattr,
771 .setattr = xfs_vn_setattr,
772 .setxattr = xfs_vn_setxattr,
773 .getxattr = xfs_vn_getxattr,
774 .listxattr = xfs_vn_listxattr,
775 .removexattr = xfs_vn_removexattr,
1da177e4
LT
776};
777
c5ef1c42 778const struct inode_operations xfs_dir_inode_operations = {
416c6d5b
NS
779 .create = xfs_vn_create,
780 .lookup = xfs_vn_lookup,
781 .link = xfs_vn_link,
782 .unlink = xfs_vn_unlink,
783 .symlink = xfs_vn_symlink,
784 .mkdir = xfs_vn_mkdir,
785 .rmdir = xfs_vn_rmdir,
786 .mknod = xfs_vn_mknod,
787 .rename = xfs_vn_rename,
788 .permission = xfs_vn_permission,
789 .getattr = xfs_vn_getattr,
790 .setattr = xfs_vn_setattr,
791 .setxattr = xfs_vn_setxattr,
792 .getxattr = xfs_vn_getxattr,
793 .listxattr = xfs_vn_listxattr,
794 .removexattr = xfs_vn_removexattr,
1da177e4
LT
795};
796
c5ef1c42 797const struct inode_operations xfs_symlink_inode_operations = {
1da177e4 798 .readlink = generic_readlink,
416c6d5b
NS
799 .follow_link = xfs_vn_follow_link,
800 .put_link = xfs_vn_put_link,
801 .permission = xfs_vn_permission,
802 .getattr = xfs_vn_getattr,
803 .setattr = xfs_vn_setattr,
804 .setxattr = xfs_vn_setxattr,
805 .getxattr = xfs_vn_getxattr,
806 .listxattr = xfs_vn_listxattr,
807 .removexattr = xfs_vn_removexattr,
1da177e4 808};