mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2024-12-28 11:59:34 +03:00
dbf6108b4d
Implement support for Linux's RENAME_* flags (for renameat2). Aside from being quite useful for userspace (providing race-free ways to exchange paths and implement mv --no-clobber), they are used by overlayfs and are thus required in order to use overlayfs-on-ZFS. In order for us to represent the new renameat2(2) flags in the ZIL, we create two new transaction types for the two flags which need transactional-level support (RENAME_EXCHANGE and RENAME_WHITEOUT). RENAME_NOREPLACE does not need any ZIL support because we know that if the operation succeeded before creating the ZIL entry, there was no file to be clobbered and thus it can be treated as a regular TX_RENAME. Reviewed-by: Ryan Moeller <ryan@iXsystems.com> Reviewed-by: Alexander Motin <mav@FreeBSD.org> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Reviewed-by: Pavel Snajdr <snajpa@snajpa.net> Signed-off-by: Aleksa Sarai <cyphar@cyphar.com> Closes #12209 Closes #14070
838 lines
19 KiB
C
838 lines
19 KiB
C
/*
|
|
* CDDL HEADER START
|
|
*
|
|
* The contents of this file are subject to the terms of the
|
|
* Common Development and Distribution License (the "License").
|
|
* You may not use this file except in compliance with the License.
|
|
*
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
* or https://opensource.org/licenses/CDDL-1.0.
|
|
* See the License for the specific language governing permissions
|
|
* and limitations under the License.
|
|
*
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
*
|
|
* CDDL HEADER END
|
|
*/
|
|
/*
|
|
* Copyright (c) 2011, Lawrence Livermore National Security, LLC.
|
|
* Copyright (c) 2015 by Chunwei Chen. All rights reserved.
|
|
*/
|
|
|
|
|
|
#include <sys/sysmacros.h>
|
|
#include <sys/zfs_ctldir.h>
|
|
#include <sys/zfs_vfsops.h>
|
|
#include <sys/zfs_vnops.h>
|
|
#include <sys/zfs_znode.h>
|
|
#include <sys/dmu_objset.h>
|
|
#include <sys/vfs.h>
|
|
#include <sys/zpl.h>
|
|
#include <sys/file.h>
|
|
|
|
static struct dentry *
|
|
zpl_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags)
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
pathname_t *ppn = NULL;
|
|
pathname_t pn;
|
|
int zfs_flags = 0;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
if (dlen(dentry) >= ZAP_MAXNAMELEN)
|
|
return (ERR_PTR(-ENAMETOOLONG));
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
|
|
/* If we are a case insensitive fs, we need the real name */
|
|
if (zfsvfs->z_case == ZFS_CASE_INSENSITIVE) {
|
|
zfs_flags = FIGNORECASE;
|
|
pn_alloc(&pn);
|
|
ppn = &pn;
|
|
}
|
|
|
|
error = -zfs_lookup(ITOZ(dir), dname(dentry), &zp,
|
|
zfs_flags, cr, NULL, ppn);
|
|
spl_fstrans_unmark(cookie);
|
|
ASSERT3S(error, <=, 0);
|
|
crfree(cr);
|
|
|
|
spin_lock(&dentry->d_lock);
|
|
dentry->d_time = jiffies;
|
|
spin_unlock(&dentry->d_lock);
|
|
|
|
if (error) {
|
|
/*
|
|
* If we have a case sensitive fs, we do not want to
|
|
* insert negative entries, so return NULL for ENOENT.
|
|
* Fall through if the error is not ENOENT. Also free memory.
|
|
*/
|
|
if (ppn) {
|
|
pn_free(ppn);
|
|
if (error == -ENOENT)
|
|
return (NULL);
|
|
}
|
|
|
|
if (error == -ENOENT)
|
|
return (d_splice_alias(NULL, dentry));
|
|
else
|
|
return (ERR_PTR(error));
|
|
}
|
|
ip = ZTOI(zp);
|
|
|
|
/*
|
|
* If we are case insensitive, call the correct function
|
|
* to install the name.
|
|
*/
|
|
if (ppn) {
|
|
struct dentry *new_dentry;
|
|
struct qstr ci_name;
|
|
|
|
if (strcmp(dname(dentry), pn.pn_buf) == 0) {
|
|
new_dentry = d_splice_alias(ip, dentry);
|
|
} else {
|
|
ci_name.name = pn.pn_buf;
|
|
ci_name.len = strlen(pn.pn_buf);
|
|
new_dentry = d_add_ci(dentry, ip, &ci_name);
|
|
}
|
|
pn_free(ppn);
|
|
return (new_dentry);
|
|
} else {
|
|
return (d_splice_alias(ip, dentry));
|
|
}
|
|
}
|
|
|
|
void
|
|
zpl_vap_init(vattr_t *vap, struct inode *dir, umode_t mode, cred_t *cr,
|
|
zuserns_t *mnt_ns)
|
|
{
|
|
vap->va_mask = ATTR_MODE;
|
|
vap->va_mode = mode;
|
|
|
|
vap->va_uid = zfs_uid_from_mnt((struct user_namespace *)mnt_ns,
|
|
crgetuid(cr));
|
|
|
|
if (dir && dir->i_mode & S_ISGID) {
|
|
vap->va_gid = KGID_TO_SGID(dir->i_gid);
|
|
if (S_ISDIR(mode))
|
|
vap->va_mode |= S_ISGID;
|
|
} else {
|
|
vap->va_gid = zfs_gid_from_mnt((struct user_namespace *)mnt_ns,
|
|
crgetgid(cr));
|
|
}
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_CREATE_USERNS
|
|
zpl_create(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode, bool flag)
|
|
#else
|
|
zpl_create(struct inode *dir, struct dentry *dentry, umode_t mode, bool flag)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
znode_t *zp;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_IOPS_CREATE_USERNS
|
|
zuserns_t *user_ns = NULL;
|
|
#endif
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode, cr, user_ns);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_create(ITOZ(dir), dname(dentry), vap, 0,
|
|
mode, &zp, cr, 0, NULL, user_ns);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_MKNOD_USERNS
|
|
zpl_mknod(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode,
|
|
#else
|
|
zpl_mknod(struct inode *dir, struct dentry *dentry, umode_t mode,
|
|
#endif
|
|
dev_t rdev)
|
|
{
|
|
cred_t *cr = CRED();
|
|
znode_t *zp;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_IOPS_MKNOD_USERNS
|
|
zuserns_t *user_ns = NULL;
|
|
#endif
|
|
|
|
/*
|
|
* We currently expect Linux to supply rdev=0 for all sockets
|
|
* and fifos, but we want to know if this behavior ever changes.
|
|
*/
|
|
if (S_ISSOCK(mode) || S_ISFIFO(mode))
|
|
ASSERT(rdev == 0);
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode, cr, user_ns);
|
|
vap->va_rdev = rdev;
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_create(ITOZ(dir), dname(dentry), vap, 0,
|
|
mode, &zp, cr, 0, NULL, user_ns);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#ifdef HAVE_TMPFILE
|
|
static int
|
|
#ifdef HAVE_TMPFILE_USERNS
|
|
zpl_tmpfile(struct user_namespace *userns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode)
|
|
#else
|
|
zpl_tmpfile(struct inode *dir, struct dentry *dentry, umode_t mode)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip;
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_TMPFILE_USERNS
|
|
zuserns_t *userns = NULL;
|
|
#endif
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
/*
|
|
* The VFS does not apply the umask, therefore it is applied here
|
|
* when POSIX ACLs are not enabled.
|
|
*/
|
|
if (!IS_POSIXACL(dir))
|
|
mode &= ~current_umask();
|
|
zpl_vap_init(vap, dir, mode, cr, userns);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_tmpfile(dir, vap, 0, mode, &ip, cr, 0, NULL, userns);
|
|
if (error == 0) {
|
|
/* d_tmpfile will do drop_nlink, so we should set it first */
|
|
set_nlink(ip, 1);
|
|
d_tmpfile(dentry, ip);
|
|
|
|
error = zpl_xattr_security_init(ip, dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ip, dir);
|
|
/*
|
|
* don't need to handle error here, file is already in
|
|
* unlinked set.
|
|
*/
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_unlink(struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
|
|
/*
|
|
* For a CI FS we must invalidate the dentry to prevent the
|
|
* creation of negative entries.
|
|
*/
|
|
if (error == 0 && zfsvfs->z_case == ZFS_CASE_INSENSITIVE)
|
|
d_invalidate(dentry);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_MKDIR_USERNS
|
|
zpl_mkdir(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, umode_t mode)
|
|
#else
|
|
zpl_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_IOPS_MKDIR_USERNS
|
|
zuserns_t *user_ns = NULL;
|
|
#endif
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, mode | S_IFDIR, cr, user_ns);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_mkdir(ITOZ(dir), dname(dentry), vap, &zp, cr, 0, NULL,
|
|
user_ns);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error == 0)
|
|
error = zpl_init_acl(ZTOI(zp), dir);
|
|
|
|
if (error) {
|
|
(void) zfs_rmdir(ITOZ(dir), dname(dentry), NULL, cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
zpl_rmdir(struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
zfsvfs_t *zfsvfs = dentry->d_sb->s_fs_info;
|
|
|
|
crhold(cr);
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_rmdir(ITOZ(dir), dname(dentry), NULL, cr, 0);
|
|
|
|
/*
|
|
* For a CI FS we must invalidate the dentry to prevent the
|
|
* creation of negative entries.
|
|
*/
|
|
if (error == 0 && zfsvfs->z_case == ZFS_CASE_INSENSITIVE)
|
|
d_invalidate(dentry);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_USERNS_IOPS_GETATTR
|
|
zpl_getattr_impl(struct user_namespace *user_ns,
|
|
const struct path *path, struct kstat *stat, u32 request_mask,
|
|
unsigned int query_flags)
|
|
#else
|
|
zpl_getattr_impl(const struct path *path, struct kstat *stat, u32 request_mask,
|
|
unsigned int query_flags)
|
|
#endif
|
|
{
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
struct inode *ip = path->dentry->d_inode;
|
|
znode_t *zp __maybe_unused = ITOZ(ip);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
|
|
/*
|
|
* XXX query_flags currently ignored.
|
|
*/
|
|
|
|
#ifdef HAVE_USERNS_IOPS_GETATTR
|
|
error = -zfs_getattr_fast(user_ns, ip, stat);
|
|
#else
|
|
error = -zfs_getattr_fast(kcred->user_ns, ip, stat);
|
|
#endif
|
|
|
|
#ifdef STATX_BTIME
|
|
if (request_mask & STATX_BTIME) {
|
|
stat->btime = zp->z_btime;
|
|
stat->result_mask |= STATX_BTIME;
|
|
}
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_IMMUTABLE
|
|
if (zp->z_pflags & ZFS_IMMUTABLE)
|
|
stat->attributes |= STATX_ATTR_IMMUTABLE;
|
|
stat->attributes_mask |= STATX_ATTR_IMMUTABLE;
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_APPEND
|
|
if (zp->z_pflags & ZFS_APPENDONLY)
|
|
stat->attributes |= STATX_ATTR_APPEND;
|
|
stat->attributes_mask |= STATX_ATTR_APPEND;
|
|
#endif
|
|
|
|
#ifdef STATX_ATTR_NODUMP
|
|
if (zp->z_pflags & ZFS_NODUMP)
|
|
stat->attributes |= STATX_ATTR_NODUMP;
|
|
stat->attributes_mask |= STATX_ATTR_NODUMP;
|
|
#endif
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
ZPL_GETATTR_WRAPPER(zpl_getattr);
|
|
|
|
static int
|
|
#ifdef HAVE_SETATTR_PREPARE_USERNS
|
|
zpl_setattr(struct user_namespace *user_ns, struct dentry *dentry,
|
|
struct iattr *ia)
|
|
#else
|
|
zpl_setattr(struct dentry *dentry, struct iattr *ia)
|
|
#endif
|
|
{
|
|
struct inode *ip = dentry->d_inode;
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
#ifdef HAVE_SETATTR_PREPARE_USERNS
|
|
error = zpl_setattr_prepare(user_ns, dentry, ia);
|
|
#else
|
|
error = zpl_setattr_prepare(kcred->user_ns, dentry, ia);
|
|
#endif
|
|
if (error)
|
|
return (error);
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
vap->va_mask = ia->ia_valid & ATTR_IATTR_MASK;
|
|
vap->va_mode = ia->ia_mode;
|
|
vap->va_uid = KUID_TO_SUID(ia->ia_uid);
|
|
vap->va_gid = KGID_TO_SGID(ia->ia_gid);
|
|
vap->va_size = ia->ia_size;
|
|
vap->va_atime = ia->ia_atime;
|
|
vap->va_mtime = ia->ia_mtime;
|
|
vap->va_ctime = ia->ia_ctime;
|
|
|
|
if (vap->va_mask & ATTR_ATIME)
|
|
ip->i_atime = zpl_inode_timestamp_truncate(ia->ia_atime, ip);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
#ifdef HAVE_SETATTR_PREPARE_USERNS
|
|
error = -zfs_setattr(ITOZ(ip), vap, 0, cr, user_ns);
|
|
#else
|
|
error = -zfs_setattr(ITOZ(ip), vap, 0, cr, NULL);
|
|
#endif
|
|
if (!error && (ia->ia_valid & ATTR_MODE))
|
|
error = zpl_chmod_acl(ip);
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_RENAME_USERNS
|
|
zpl_rename2(struct user_namespace *user_ns, struct inode *sdip,
|
|
struct dentry *sdentry, struct inode *tdip, struct dentry *tdentry,
|
|
unsigned int rflags)
|
|
#else
|
|
zpl_rename2(struct inode *sdip, struct dentry *sdentry,
|
|
struct inode *tdip, struct dentry *tdentry, unsigned int rflags)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
vattr_t *wo_vap = NULL;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_IOPS_RENAME_USERNS
|
|
zuserns_t *user_ns = NULL;
|
|
#endif
|
|
|
|
crhold(cr);
|
|
if (rflags & RENAME_WHITEOUT) {
|
|
wo_vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(wo_vap, sdip, S_IFCHR, cr, user_ns);
|
|
wo_vap->va_rdev = makedevice(0, 0);
|
|
}
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_rename(ITOZ(sdip), dname(sdentry), ITOZ(tdip),
|
|
dname(tdentry), cr, 0, rflags, wo_vap, user_ns);
|
|
spl_fstrans_unmark(cookie);
|
|
if (wo_vap)
|
|
kmem_free(wo_vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if !defined(HAVE_IOPS_RENAME_USERNS) && \
|
|
!defined(HAVE_RENAME_WANTS_FLAGS) && \
|
|
!defined(HAVE_RENAME2)
|
|
static int
|
|
zpl_rename(struct inode *sdip, struct dentry *sdentry,
|
|
struct inode *tdip, struct dentry *tdentry)
|
|
{
|
|
return (zpl_rename2(sdip, sdentry, tdip, tdentry, 0));
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
#ifdef HAVE_IOPS_SYMLINK_USERNS
|
|
zpl_symlink(struct user_namespace *user_ns, struct inode *dir,
|
|
struct dentry *dentry, const char *name)
|
|
#else
|
|
zpl_symlink(struct inode *dir, struct dentry *dentry, const char *name)
|
|
#endif
|
|
{
|
|
cred_t *cr = CRED();
|
|
vattr_t *vap;
|
|
znode_t *zp;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
#ifndef HAVE_IOPS_SYMLINK_USERNS
|
|
zuserns_t *user_ns = NULL;
|
|
#endif
|
|
|
|
crhold(cr);
|
|
vap = kmem_zalloc(sizeof (vattr_t), KM_SLEEP);
|
|
zpl_vap_init(vap, dir, S_IFLNK | S_IRWXUGO, cr, user_ns);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_symlink(ITOZ(dir), dname(dentry), vap,
|
|
(char *)name, &zp, cr, 0, user_ns);
|
|
if (error == 0) {
|
|
error = zpl_xattr_security_init(ZTOI(zp), dir, &dentry->d_name);
|
|
if (error) {
|
|
(void) zfs_remove(ITOZ(dir), dname(dentry), cr, 0);
|
|
remove_inode_hash(ZTOI(zp));
|
|
iput(ZTOI(zp));
|
|
} else {
|
|
d_instantiate(dentry, ZTOI(zp));
|
|
}
|
|
}
|
|
|
|
spl_fstrans_unmark(cookie);
|
|
kmem_free(vap, sizeof (vattr_t));
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if defined(HAVE_PUT_LINK_COOKIE)
|
|
static void
|
|
zpl_put_link(struct inode *unused, void *cookie)
|
|
{
|
|
kmem_free(cookie, MAXPATHLEN);
|
|
}
|
|
#elif defined(HAVE_PUT_LINK_NAMEIDATA)
|
|
static void
|
|
zpl_put_link(struct dentry *dentry, struct nameidata *nd, void *ptr)
|
|
{
|
|
const char *link = nd_get_link(nd);
|
|
|
|
if (!IS_ERR(link))
|
|
kmem_free(link, MAXPATHLEN);
|
|
}
|
|
#elif defined(HAVE_PUT_LINK_DELAYED)
|
|
static void
|
|
zpl_put_link(void *ptr)
|
|
{
|
|
kmem_free(ptr, MAXPATHLEN);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_get_link_common(struct dentry *dentry, struct inode *ip, char **link)
|
|
{
|
|
fstrans_cookie_t cookie;
|
|
cred_t *cr = CRED();
|
|
int error;
|
|
|
|
crhold(cr);
|
|
*link = NULL;
|
|
|
|
struct iovec iov;
|
|
iov.iov_len = MAXPATHLEN;
|
|
iov.iov_base = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
|
|
|
|
zfs_uio_t uio;
|
|
zfs_uio_iovec_init(&uio, &iov, 1, 0, UIO_SYSSPACE, MAXPATHLEN - 1, 0);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_readlink(ip, &uio, cr);
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
|
|
if (error)
|
|
kmem_free(iov.iov_base, MAXPATHLEN);
|
|
else
|
|
*link = iov.iov_base;
|
|
|
|
return (error);
|
|
}
|
|
|
|
#if defined(HAVE_GET_LINK_DELAYED)
|
|
static const char *
|
|
zpl_get_link(struct dentry *dentry, struct inode *inode,
|
|
struct delayed_call *done)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
if (!dentry)
|
|
return (ERR_PTR(-ECHILD));
|
|
|
|
error = zpl_get_link_common(dentry, inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
set_delayed_call(done, zpl_put_link, link);
|
|
|
|
return (link);
|
|
}
|
|
#elif defined(HAVE_GET_LINK_COOKIE)
|
|
static const char *
|
|
zpl_get_link(struct dentry *dentry, struct inode *inode, void **cookie)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
if (!dentry)
|
|
return (ERR_PTR(-ECHILD));
|
|
|
|
error = zpl_get_link_common(dentry, inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
return (*cookie = link);
|
|
}
|
|
#elif defined(HAVE_FOLLOW_LINK_COOKIE)
|
|
static const char *
|
|
zpl_follow_link(struct dentry *dentry, void **cookie)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
error = zpl_get_link_common(dentry, dentry->d_inode, &link);
|
|
if (error)
|
|
return (ERR_PTR(error));
|
|
|
|
return (*cookie = link);
|
|
}
|
|
#elif defined(HAVE_FOLLOW_LINK_NAMEIDATA)
|
|
static void *
|
|
zpl_follow_link(struct dentry *dentry, struct nameidata *nd)
|
|
{
|
|
char *link = NULL;
|
|
int error;
|
|
|
|
error = zpl_get_link_common(dentry, dentry->d_inode, &link);
|
|
if (error)
|
|
nd_set_link(nd, ERR_PTR(error));
|
|
else
|
|
nd_set_link(nd, link);
|
|
|
|
return (NULL);
|
|
}
|
|
#endif
|
|
|
|
static int
|
|
zpl_link(struct dentry *old_dentry, struct inode *dir, struct dentry *dentry)
|
|
{
|
|
cred_t *cr = CRED();
|
|
struct inode *ip = old_dentry->d_inode;
|
|
int error;
|
|
fstrans_cookie_t cookie;
|
|
|
|
if (ip->i_nlink >= ZFS_LINK_MAX)
|
|
return (-EMLINK);
|
|
|
|
crhold(cr);
|
|
ip->i_ctime = current_time(ip);
|
|
/* Must have an existing ref, so igrab() cannot return NULL */
|
|
VERIFY3P(igrab(ip), !=, NULL);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
error = -zfs_link(ITOZ(dir), ITOZ(ip), dname(dentry), cr, 0);
|
|
if (error) {
|
|
iput(ip);
|
|
goto out;
|
|
}
|
|
|
|
d_instantiate(dentry, ip);
|
|
out:
|
|
spl_fstrans_unmark(cookie);
|
|
crfree(cr);
|
|
ASSERT3S(error, <=, 0);
|
|
|
|
return (error);
|
|
}
|
|
|
|
const struct inode_operations zpl_inode_operations = {
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
};
|
|
|
|
#ifdef HAVE_RENAME2_OPERATIONS_WRAPPER
|
|
const struct inode_operations_wrapper zpl_dir_inode_operations = {
|
|
.ops = {
|
|
#else
|
|
const struct inode_operations zpl_dir_inode_operations = {
|
|
#endif
|
|
.create = zpl_create,
|
|
.lookup = zpl_lookup,
|
|
.link = zpl_link,
|
|
.unlink = zpl_unlink,
|
|
.symlink = zpl_symlink,
|
|
.mkdir = zpl_mkdir,
|
|
.rmdir = zpl_rmdir,
|
|
.mknod = zpl_mknod,
|
|
#ifdef HAVE_RENAME2
|
|
.rename2 = zpl_rename2,
|
|
#elif defined(HAVE_RENAME_WANTS_FLAGS) || defined(HAVE_IOPS_RENAME_USERNS)
|
|
.rename = zpl_rename2,
|
|
#else
|
|
.rename = zpl_rename,
|
|
#endif
|
|
#ifdef HAVE_TMPFILE
|
|
.tmpfile = zpl_tmpfile,
|
|
#endif
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
#ifdef HAVE_RENAME2_OPERATIONS_WRAPPER
|
|
},
|
|
.rename2 = zpl_rename2,
|
|
#endif
|
|
};
|
|
|
|
const struct inode_operations zpl_symlink_inode_operations = {
|
|
#ifdef HAVE_GENERIC_READLINK
|
|
.readlink = generic_readlink,
|
|
#endif
|
|
#if defined(HAVE_GET_LINK_DELAYED) || defined(HAVE_GET_LINK_COOKIE)
|
|
.get_link = zpl_get_link,
|
|
#elif defined(HAVE_FOLLOW_LINK_COOKIE) || defined(HAVE_FOLLOW_LINK_NAMEIDATA)
|
|
.follow_link = zpl_follow_link,
|
|
#endif
|
|
#if defined(HAVE_PUT_LINK_COOKIE) || defined(HAVE_PUT_LINK_NAMEIDATA)
|
|
.put_link = zpl_put_link,
|
|
#endif
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
};
|
|
|
|
const struct inode_operations zpl_special_inode_operations = {
|
|
.setattr = zpl_setattr,
|
|
.getattr = zpl_getattr,
|
|
#ifdef HAVE_GENERIC_SETXATTR
|
|
.setxattr = generic_setxattr,
|
|
.getxattr = generic_getxattr,
|
|
.removexattr = generic_removexattr,
|
|
#endif
|
|
.listxattr = zpl_xattr_list,
|
|
#if defined(CONFIG_FS_POSIX_ACL)
|
|
#if defined(HAVE_SET_ACL)
|
|
.set_acl = zpl_set_acl,
|
|
#endif /* HAVE_SET_ACL */
|
|
.get_acl = zpl_get_acl,
|
|
#endif /* CONFIG_FS_POSIX_ACL */
|
|
};
|