mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2024-11-18 10:21:01 +03:00
abbf0bd4eb
Linux 4.11 added a new statx system call that allows us to expose crtime as btime. We do this by caching crtime in the znode to match how atime, ctime and mtime are cached in the inode. statx also introduced a new way of reporting whether the immutable, append and nodump bits have been set. It adds support for reporting compression and encryption, but the semantics on other filesystems is not just to report compression/encryption, but to allow it to be turned on/off at the file level. We do not support that. We could implement semantics where we refuse to allow user modification of the bit, but we would need to do a dnode_hold() in zfs_znode_alloc() to find out encryption/compression information. That would introduce locking that will have a minor (although unmeasured) performance cost. It also would be inferior to zdb, which reports far more detailed information. We therefore omit reporting of encryption/compression through statx in favor of recommending that users interested in such information use zdb. Reviewed-by: Tony Nguyen <tony.nguyen@delphix.com> Reviewed-by: Allan Jude <allan@klarasystems.com> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Reviewed-by: Alexander Motin <mav@FreeBSD.org> Reviewed-by: Ryan Moeller <ryan@iXsystems.com> Signed-off-by: Richard Yao <ryao@gentoo.org> Closes #8507
833 lines
19 KiB
C
833 lines
19 KiB
C
/*
|
|
* CDDL HEADER START
|
|
*
|
|
* The contents of this file are subject to the terms of the
|
|
* Common Development and Distribution License (the "License").
|
|
* You may not use this file except in compliance with the License.
|
|
*
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
* or http://www.opensolaris.org/os/licensing.
|
|
* See the License for the specific language governing permissions
|
|
* and limitations under the License.
|
|
*
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
*
|
|
* CDDL HEADER END
|
|
*/
|
|
/*
|
|
* Copyright (c) 2011, Lawrence Livermore National Security, LLC.
|
|
* Copyright (c) 2015 by Chunwei Chen. All rights reserved.
|
|
*/
|
|
|
|
|
|
#include <sys/zfs_ctldir.h>
|
|
#include <sys/zfs_vfsops.h>
|
|
#include <sys/zfs_vnops.h>
|
|
#include <sys/zfs_znode.h>
|
|
#include <sys/dmu_objset.h>
|
|
#include <sys/vfs.h>
|
|
#include <sys/zpl.h>
|
|
#include <sys/file.h>
|
|
|
|
|
|
static struct dentry *
|
|
zpl_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags)
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
pathname_t *ppn = NULL;
|
|
pathname_t pn;
|
|
int zfs_flags = 0;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
if (dlen(dentry) >= ZAP_MAXNAMELEN)
|
|
return (ERR_PTR(-ENAMETOOLONG));
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
|
|
/* If we are a case insensitive fs, we need the real name */
|
|
if (zfsvfs->z_case == ZFS_CASE_INSENSITIVE) {
|
|
zfs_flags = FIGNORECASE;
|
|
pn_alloc(&pn);
|
|
ppn = &pn;
|
|
}
|
|
|
|
error = -zfs_lookup(ITOZ(dir), dname(dentry), &zp,
|
|
zfs_flags, cr, NULL, ppn);
|
|
spl_fstrans_unmark(cookie);
|
|
ASSERT3S(error, <=, 0);
|
|
crfree(cr);
|
|
|
|
spin_lock(&dentry->d_lock);
|
|
dentry->d_time = jiffies;
|
|
spin_unlock(&dentry->d_lock);
|
|
|
|
if (error) {
|
|
/*
|
|
* If we have a case sensitive fs, we do not want to
|
|
* insert negative entries, so return NULL for ENOENT.
|
|
* Fall through if the error is not ENOENT. Also free memory.
|
|
*/
|
|
if (ppn) {
|
|
pn_free(ppn);
|
|
if (error == -ENOENT)
|
|
return (NULL);
|
|
}
|
|
|
|
if (error == -ENOENT)
|
|
return (d_splice_alias(NULL, dentry));
|
|
else
|
|
return (ERR_PTR(error));
|
|
}
|
|
ip = ZTOI(zp);
|
|
|
|
/*
|
|
* If we are case insensitive, call the correct function
|
|
* to install the name.
|
|
*/
|
|
if (ppn) {
|
|
struct dentry *new_dentry;
|
|
struct qstr ci_name;
|
|
|
|
if (strcmp(dname(dentry), pn.pn_buf) == 0) {
|
|
new_dentry = d_splice_alias(ip, dentry);
|
|
} else {
|
|
ci_name.name = pn.pn_buf;
|
|
ci_name.len = strlen(pn.pn_buf);
|
|
new_dentry = d_add_ci(dentry, ip, &ci_name);
|
|
}
|
|
pn_free(ppn);
|
|
return (new_dentry);
|
|
} else {
|
|
return (d_splice_alias(ip, dentry));
|
|
}
|
|
}
|
|
|
|
void
|
|
zpl_vap_init(vattr_t *vap, struct inode *dir, umode_t mode, cred_t *cr)
|
|
{
|
|
vap->va_mask = ATTR_MODE;
|
|
vap->va_mode = mode;
|
|
vap->va_uid = crgetfsuid(cr);
|
|
|
|
if (dir && dir->i_mode & S_ISGID) {
|
|
vap->va_gid = KGID_TO_SGID(dir->i_gid);
|
|
if (S_ISDIR(mode))
|
|
vap->va_mode |= S_ISGID;
|
|
} else {
|
|
vap->va_gid = crgetfsgid(cr);
|
|
}
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_CREATE_USERNS
|
|
zpl_create(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode, bool flag)
|
|
#else
|
|
zpl_create(struct inode *dir, struct dentry *dentry, umode_t mode, bool flag)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
znode_t *zp;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode, cr);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_create(ITOZ(dir), dname(dentry), vap, 0,
|
|
mode, &zp, cr, 0, NULL);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_MKNOD_USERNS
|
|
zpl_mknod(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode,
|
|
#else
|
|
zpl_mknod(struct inode *dir, struct dentry *dentry, umode_t mode,
|
|
#endif
|
|
dev_t rdev)
|
|
{
|
|
cred_t *cr = CRED();
|
|
znode_t *zp;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
/*
|
|
* We currently expect Linux to supply rdev=0 for all sockets
|
|
* and fifos, but we want to know if this behavior ever changes.
|
|
*/
|
|
if (S_ISSOCK(mode) || S_ISFIFO(mode))
|
|
ASSERT(rdev == 0);
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode, cr);
|
|
vap->va_rdev = rdev;
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_create(ITOZ(dir), dname(dentry), vap, 0,
|
|
mode, &zp, cr, 0, NULL);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#ifdef HAVE_TMPFILE
|
|
static int
|
|
#ifdef HAVE_TMPFILE_USERNS
|
|
zpl_tmpfile(struct user_namespace *userns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode)
|
|
#else
|
|
zpl_tmpfile(struct inode *dir, struct dentry *dentry, umode_t mode)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
/*
|
|
* The VFS does not apply the umask, therefore it is applied here
|
|
* when POSIX ACLs are not enabled.
|
|
*/
|
|
if (!IS_POSIXACL(dir))
|
|
mode &= ~current_umask();
|
|
zpl_vap_init(vap, dir, mode, cr);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_tmpfile(dir, vap, 0, mode, &ip, cr, 0, NULL);
|
|
if (error == 0) {
|
|
/* d_tmpfile will do drop_nlink, so we should set it first */
|
|
set_nlink(ip, 1);
|
|
d_tmpfile(dentry, ip);
|
|
|
|
error = zpl_xattr_security_init(ip, dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ip, dir);
|
|
/*
|
|
* don't need to handle error here, file is already in
|
|
* unlinked set.
|
|
*/
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_unlink(struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
|
|
/*
|
|
* For a CI FS we must invalidate the dentry to prevent the
|
|
* creation of negative entries.
|
|
*/
|
|
if (error == 0 && zfsvfs->z_case == ZFS_CASE_INSENSITIVE)
|
|
d_invalidate(dentry);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_MKDIR_USERNS
|
|
zpl_mkdir(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode)
|
|
#else
|
|
zpl_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode | S_IFDIR, cr);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_mkdir(ITOZ(dir), dname(dentry), vap, &zp, cr, 0, NULL);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_rmdir(ITOZ(dir), dname(dentry), NULL, cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
zpl_rmdir(struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_rmdir(ITOZ(dir), dname(dentry), NULL, cr, 0);
|
|
|
|
/*
|
|
* For a CI FS we must invalidate the dentry to prevent the
|
|
* creation of negative entries.
|
|
*/
|
|
if (error == 0 && zfsvfs->z_case == ZFS_CASE_INSENSITIVE)
|
|
d_invalidate(dentry);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_USERNS_IOPS_GETATTR
|
|
zpl_getattr_impl(struct user_namespace *user_ns,
|
|
const struct path *path, struct kstat *stat, u32 request_mask,
|
|
unsigned int query_flags)
|
|
#else
|
|
zpl_getattr_impl(const struct path *path, struct kstat *stat, u32 request_mask,
|
|
unsigned int query_flags)
|
|
#endif
|
|
{
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
struct inode *ip = path->dentry->d_inode;
|
|
znode_t *zp __maybe_unused = ITOZ(ip);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
|
|
/*
|
|
* XXX query_flags currently ignored.
|
|
*/
|
|
|
|
#ifdef HAVE_USERNS_IOPS_GETATTR
|
|
error = -zfs_getattr_fast(user_ns, ip, stat);
|
|
#else
|
|
error = -zfs_getattr_fast(kcred->user_ns, ip, stat);
|
|
#endif
|
|
|
|
#ifdef STATX_BTIME
|
|
if (request_mask & STATX_BTIME) {
|
|
stat->btime = zp->z_btime;
|
|
stat->result_mask |= STATX_BTIME;
|
|
}
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_IMMUTABLE
|
|
if (zp->z_pflags & ZFS_IMMUTABLE)
|
|
stat->attributes |= STATX_ATTR_IMMUTABLE;
|
|
stat->attributes_mask |= STATX_ATTR_IMMUTABLE;
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_APPEND
|
|
if (zp->z_pflags & ZFS_APPENDONLY)
|
|
stat->attributes |= STATX_ATTR_APPEND;
|
|
stat->attributes_mask |= STATX_ATTR_APPEND;
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_NODUMP
|
|
if (zp->z_pflags & ZFS_NODUMP)
|
|
stat->attributes |= STATX_ATTR_NODUMP;
|
|
stat->attributes_mask |= STATX_ATTR_NODUMP;
|
|
#endif
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
ZPL_GETATTR_WRAPPER(zpl_getattr);
|
|
|
|
static int
|
|
#ifdef HAVE_SETATTR_PREPARE_USERNS
|
|
zpl_setattr(struct user_namespace *user_ns, struct dentry *dentry,
|
|
struct iattr *ia)
|
|
#else
|
|
zpl_setattr(struct dentry *dentry, struct iattr *ia)
|
|
#endif
|
|
{
|
|
struct inode *ip = dentry->d_inode;
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
error = zpl_setattr_prepare(kcred->user_ns, dentry, ia);
|
|
if (error)
|
|
return (error);
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
vap->va_mask = ia->ia_valid & ATTR_IATTR_MASK;
|
|
vap->va_mode = ia->ia_mode;
|
|
vap->va_uid = KUID_TO_SUID(ia->ia_uid);
|
|
vap->va_gid = KGID_TO_SGID(ia->ia_gid);
|
|
vap->va_size = ia->ia_size;
|
|
vap->va_atime = ia->ia_atime;
|
|
vap->va_mtime = ia->ia_mtime;
|
|
vap->va_ctime = ia->ia_ctime;
|
|
|
|
if (vap->va_mask & ATTR_ATIME)
|
|
ip->i_atime = zpl_inode_timestamp_truncate(ia->ia_atime, ip);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_setattr(ITOZ(ip), vap, 0, cr);
|
|
if (!error && (ia->ia_valid & ATTR_MODE))
|
|
error = zpl_chmod_acl(ip);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_RENAME_USERNS
|
|
zpl_rename2(struct user_namespace *user_ns, struct inode *sdip,
|
|
struct dentry *sdentry, struct inode *tdip, struct dentry *tdentry,
|
|
unsigned int flags)
|
|
#else
|
|
zpl_rename2(struct inode *sdip, struct dentry *sdentry,
|
|
struct inode *tdip, struct dentry *tdentry, unsigned int flags)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
/* We don't have renameat2(2) support */
|
|
if (flags)
|
|
return (-EINVAL);
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_rename(ITOZ(sdip), dname(sdentry), ITOZ(tdip),
|
|
dname(tdentry), cr, 0);
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if !defined(HAVE_RENAME_WANTS_FLAGS) && !defined(HAVE_IOPS_RENAME_USERNS)
|
|
static int
|
|
zpl_rename(struct inode *sdip, struct dentry *sdentry,
|
|
struct inode *tdip, struct dentry *tdentry)
|
|
{
|
|
return (zpl_rename2(sdip, sdentry, tdip, tdentry, 0));
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_SYMLINK_USERNS
|
|
zpl_symlink(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, const char *name)
|
|
#else
|
|
zpl_symlink(struct inode *dir, struct dentry *dentry, const char *name)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, S_IFLNK | S_IRWXUGO, cr);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_symlink(ITOZ(dir), dname(dentry), vap,
|
|
(char *)name, &zp, cr, 0);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if defined(HAVE_PUT_LINK_COOKIE)
|
|
static void
|
|
zpl_put_link(struct inode *unused, void *cookie)
|
|
{
|
|
kmem_free(cookie, MAXPATHLEN);
|
|
}
|
|
#elif defined(HAVE_PUT_LINK_NAMEIDATA)
|
|
static void
|
|
zpl_put_link(struct dentry *dentry, struct nameidata *nd, void *ptr)
|
|
{
|
|
const char *link = nd_get_link(nd);
|
|
|
|
if (!IS_ERR(link))
|
|
kmem_free(link, MAXPATHLEN);
|
|
}
|
|
#elif defined(HAVE_PUT_LINK_DELAYED)
|
|
static void
|
|
zpl_put_link(void *ptr)
|
|
{
|
|
kmem_free(ptr, MAXPATHLEN);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_get_link_common(struct dentry *dentry, struct inode *ip, char **link)
|
|
{
|
|
fstrans_cookie_t cookie;
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
|
|
crhold(cr);
|
|
*link = NULL;
|
|
|
|
struct iovec iov;
|
|
iov.iov_len = MAXPATHLEN;
|
|
iov.iov_base = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
|
|
|
|
zfs_uio_t uio;
|
|
zfs_uio_iovec_init(&uio, &iov, 1, 0, UIO_SYSSPACE, MAXPATHLEN - 1, 0);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_readlink(ip, &uio, cr);
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
|
|
if (error)
|
|
kmem_free(iov.iov_base, MAXPATHLEN);
|
|
else
|
|
*link = iov.iov_base;
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if defined(HAVE_GET_LINK_DELAYED)
|
|
static const char *
|
|
zpl_get_link(struct dentry *dentry, struct inode *inode,
|
|
struct delayed_call *done)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
if (!dentry)
|
|
return (ERR_PTR(-ECHILD));
|
|
|
|
error = zpl_get_link_common(dentry, inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
set_delayed_call(done, zpl_put_link, link);
|
|
|
|
return (link);
|
|
}
|
|
#elif defined(HAVE_GET_LINK_COOKIE)
|
|
static const char *
|
|
zpl_get_link(struct dentry *dentry, struct inode *inode, void **cookie)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
if (!dentry)
|
|
return (ERR_PTR(-ECHILD));
|
|
|
|
error = zpl_get_link_common(dentry, inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
return (*cookie = link);
|
|
}
|
|
#elif defined(HAVE_FOLLOW_LINK_COOKIE)
|
|
static const char *
|
|
zpl_follow_link(struct dentry *dentry, void **cookie)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
error = zpl_get_link_common(dentry, dentry->d_inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
return (*cookie = link);
|
|
}
|
|
#elif defined(HAVE_FOLLOW_LINK_NAMEIDATA)
|
|
static void *
|
|
zpl_follow_link(struct dentry *dentry, struct nameidata *nd)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
error = zpl_get_link_common(dentry, dentry->d_inode, &link);
|
|
if (error)
|
|
nd_set_link(nd, ERR_PTR(error));
|
|
else
|
|
nd_set_link(nd, link);
|
|
|
|
return (NULL);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_link(struct dentry *old_dentry, struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip = old_dentry->d_inode;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
if (ip->i_nlink >= ZFS_LINK_MAX)
|
|
return (-EMLINK);
|
|
|
|
crhold(cr);
|
|
ip->i_ctime = current_time(ip);
|
|
/* Must have an existing ref, so igrab() cannot return NULL */
|
|
VERIFY3P(igrab(ip), !=, NULL);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_link(ITOZ(dir), ITOZ(ip), dname(dentry), cr, 0);
|
|
if (error) {
|
|
iput(ip);
|
|
goto out;
|
|
}
|
|
|
|
d_instantiate(dentry, ip);
|
|
out:
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_D_REVALIDATE_NAMEIDATA
|
|
zpl_revalidate(struct dentry *dentry, struct nameidata *nd)
|
|
{
|
|
unsigned int flags = (nd ? nd->flags : 0);
|
|
#else
|
|
zpl_revalidate(struct dentry *dentry, unsigned int flags)
|
|
{
|
|
#endif /* HAVE_D_REVALIDATE_NAMEIDATA */
|
|
/* CSTYLED */
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
int error;
|
|
|
|
if (flags & LOOKUP_RCU)
|
|
return (-ECHILD);
|
|
|
|
/*
|
|
* After a rollback negative dentries created before the rollback
|
|
* time must be invalidated. Otherwise they can obscure files which
|
|
* are only present in the rolled back dataset.
|
|
*/
|
|
if (dentry->d_inode == NULL) {
|
|
spin_lock(&dentry->d_lock);
|
|
error = time_before(dentry->d_time, zfsvfs->z_rollback_time);
|
|
spin_unlock(&dentry->d_lock);
|
|
|
|
if (error)
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* The dentry may reference a stale inode if a mounted file system
|
|
* was rolled back to a point in time where the object didn't exist.
|
|
*/
|
|
if (dentry->d_inode && ITOZ(dentry->d_inode)->z_is_stale)
|
|
return (0);
|
|
|
|
return (1);
|
|
}
|
|
|
|
const struct inode_operations zpl_inode_operations = {
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
};
|
|
|
|
const struct inode_operations zpl_dir_inode_operations = {
|
|
.create = zpl_create,
|
|
.lookup = zpl_lookup,
|
|
.link = zpl_link,
|
|
.unlink = zpl_unlink,
|
|
.symlink = zpl_symlink,
|
|
.mkdir = zpl_mkdir,
|
|
.rmdir = zpl_rmdir,
|
|
.mknod = zpl_mknod,
|
|
#if defined(HAVE_RENAME_WANTS_FLAGS) || defined(HAVE_IOPS_RENAME_USERNS)
|
|
.rename = zpl_rename2,
|
|
#else
|
|
.rename = zpl_rename,
|
|
#endif
|
|
#ifdef HAVE_TMPFILE
|
|
.tmpfile = zpl_tmpfile,
|
|
#endif
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
};
|
|
|
|
const struct inode_operations zpl_symlink_inode_operations = {
|
|
#ifdef HAVE_GENERIC_READLINK
|
|
.readlink = generic_readlink,
|
|
#endif
|
|
#if defined(HAVE_GET_LINK_DELAYED) || defined(HAVE_GET_LINK_COOKIE)
|
|
.get_link = zpl_get_link,
|
|
#elif defined(HAVE_FOLLOW_LINK_COOKIE) || defined(HAVE_FOLLOW_LINK_NAMEIDATA)
|
|
.follow_link = zpl_follow_link,
|
|
#endif
|
|
#if defined(HAVE_PUT_LINK_COOKIE) || defined(HAVE_PUT_LINK_NAMEIDATA)
|
|
.put_link = zpl_put_link,
|
|
#endif
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
};
|
|
|
|
const struct inode_operations zpl_special_inode_operations = {
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
};
|
|
|
|
dentry_operations_t zpl_dentry_operations = {
|
|
.d_revalidate = zpl_revalidate,
|
|
};
|