]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (c) 2002 Red Hat, Inc. All rights reserved. | |
3 | * | |
4 | * This software may be freely redistributed under the terms of the | |
5 | * GNU General Public License. | |
6 | * | |
7 | * You should have received a copy of the GNU General Public License | |
8 | * along with this program; if not, write to the Free Software | |
9 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | |
10 | * | |
44d1b980 | 11 | * Authors: David Woodhouse <[email protected]> |
1da177e4 LT |
12 | * David Howells <[email protected]> |
13 | * | |
14 | */ | |
15 | ||
16 | #include <linux/kernel.h> | |
17 | #include <linux/module.h> | |
18 | #include <linux/init.h> | |
1da177e4 LT |
19 | #include <linux/fs.h> |
20 | #include <linux/pagemap.h> | |
e8edc6e0 | 21 | #include <linux/sched.h> |
bec5eb61 | 22 | #include <linux/mount.h> |
23 | #include <linux/namei.h> | |
a01179e6 | 24 | #include <linux/iversion.h> |
1da177e4 LT |
25 | #include "internal.h" |
26 | ||
d3e3b7ea DH |
27 | static const struct inode_operations afs_symlink_inode_operations = { |
28 | .get_link = page_get_link, | |
29 | .listxattr = afs_listxattr, | |
30 | }; | |
31 | ||
1da177e4 | 32 | /* |
dd9fbcb8 | 33 | * Initialise an inode from the vnode status. |
1da177e4 | 34 | */ |
dd9fbcb8 | 35 | static int afs_inode_init_from_status(struct afs_vnode *vnode, struct key *key) |
1da177e4 LT |
36 | { |
37 | struct inode *inode = AFS_VNODE_TO_I(vnode); | |
38 | ||
260a9803 | 39 | _debug("FS: ft=%d lk=%d sz=%llu ver=%Lu mod=%hu", |
1da177e4 LT |
40 | vnode->status.type, |
41 | vnode->status.nlink, | |
ba3e0e1a | 42 | (unsigned long long) vnode->status.size, |
08e0e7c8 | 43 | vnode->status.data_version, |
1da177e4 LT |
44 | vnode->status.mode); |
45 | ||
c435ee34 DH |
46 | read_seqlock_excl(&vnode->cb_lock); |
47 | ||
dd9fbcb8 DH |
48 | afs_update_inode_from_status(vnode, &vnode->status, NULL, |
49 | AFS_VNODE_NOT_YET_SET); | |
50 | ||
1da177e4 LT |
51 | switch (vnode->status.type) { |
52 | case AFS_FTYPE_FILE: | |
53 | inode->i_mode = S_IFREG | vnode->status.mode; | |
54 | inode->i_op = &afs_file_inode_operations; | |
00d3b7a4 | 55 | inode->i_fop = &afs_file_operations; |
f3ddee8d | 56 | inode->i_mapping->a_ops = &afs_fs_aops; |
1da177e4 LT |
57 | break; |
58 | case AFS_FTYPE_DIR: | |
59 | inode->i_mode = S_IFDIR | vnode->status.mode; | |
60 | inode->i_op = &afs_dir_inode_operations; | |
61 | inode->i_fop = &afs_dir_file_operations; | |
f3ddee8d | 62 | inode->i_mapping->a_ops = &afs_dir_aops; |
1da177e4 LT |
63 | break; |
64 | case AFS_FTYPE_SYMLINK: | |
944c74f4 DH |
65 | /* Symlinks with a mode of 0644 are actually mountpoints. */ |
66 | if ((vnode->status.mode & 0777) == 0644) { | |
67 | inode->i_flags |= S_AUTOMOUNT; | |
68 | ||
944c74f4 | 69 | set_bit(AFS_VNODE_MOUNTPOINT, &vnode->flags); |
944c74f4 DH |
70 | |
71 | inode->i_mode = S_IFDIR | 0555; | |
72 | inode->i_op = &afs_mntpt_inode_operations; | |
73 | inode->i_fop = &afs_mntpt_file_operations; | |
f3ddee8d | 74 | inode->i_mapping->a_ops = &afs_fs_aops; |
944c74f4 DH |
75 | } else { |
76 | inode->i_mode = S_IFLNK | vnode->status.mode; | |
d3e3b7ea | 77 | inode->i_op = &afs_symlink_inode_operations; |
f3ddee8d | 78 | inode->i_mapping->a_ops = &afs_fs_aops; |
944c74f4 | 79 | } |
21fc61c7 | 80 | inode_nohighmem(inode); |
1da177e4 LT |
81 | break; |
82 | default: | |
83 | printk("kAFS: AFS vnode with undefined type\n"); | |
c435ee34 | 84 | read_sequnlock_excl(&vnode->cb_lock); |
160cb957 | 85 | return afs_protocol_error(NULL, -EBADMSG, afs_eproto_file_type); |
1da177e4 LT |
86 | } |
87 | ||
1da177e4 | 88 | inode->i_blocks = 0; |
a4ff7401 | 89 | vnode->invalid_before = vnode->status.data_version; |
c435ee34 DH |
90 | |
91 | read_sequnlock_excl(&vnode->cb_lock); | |
1da177e4 | 92 | return 0; |
ec26815a | 93 | } |
1da177e4 | 94 | |
d2ddc776 DH |
95 | /* |
96 | * Fetch file status from the volume. | |
97 | */ | |
0c3a5ac2 | 98 | int afs_fetch_status(struct afs_vnode *vnode, struct key *key, bool new_inode) |
d2ddc776 DH |
99 | { |
100 | struct afs_fs_cursor fc; | |
101 | int ret; | |
102 | ||
3b6492df | 103 | _enter("%s,{%llx:%llu.%u,S=%lx}", |
d2ddc776 DH |
104 | vnode->volume->name, |
105 | vnode->fid.vid, vnode->fid.vnode, vnode->fid.unique, | |
106 | vnode->flags); | |
107 | ||
108 | ret = -ERESTARTSYS; | |
109 | if (afs_begin_vnode_operation(&fc, vnode, key)) { | |
110 | while (afs_select_fileserver(&fc)) { | |
68251f0a | 111 | fc.cb_break = afs_calc_vnode_cb_break(vnode); |
0c3a5ac2 | 112 | afs_fs_fetch_file_status(&fc, NULL, new_inode); |
d2ddc776 DH |
113 | } |
114 | ||
115 | afs_check_for_remote_deletion(&fc, fc.vnode); | |
116 | afs_vnode_commit_status(&fc, vnode, fc.cb_break); | |
117 | ret = afs_end_vnode_operation(&fc); | |
118 | } | |
119 | ||
120 | _leave(" = %d", ret); | |
121 | return ret; | |
122 | } | |
123 | ||
1da177e4 LT |
124 | /* |
125 | * iget5() comparator | |
126 | */ | |
c435ee34 | 127 | int afs_iget5_test(struct inode *inode, void *opaque) |
1da177e4 LT |
128 | { |
129 | struct afs_iget_data *data = opaque; | |
3b6492df | 130 | struct afs_vnode *vnode = AFS_FS_I(inode); |
1da177e4 | 131 | |
3b6492df | 132 | return memcmp(&vnode->fid, &data->fid, sizeof(data->fid)) == 0; |
ec26815a | 133 | } |
1da177e4 | 134 | |
bec5eb61 | 135 | /* |
136 | * iget5() comparator for inode created by autocell operations | |
137 | * | |
138 | * These pseudo inodes don't match anything. | |
139 | */ | |
4d673da1 | 140 | static int afs_iget5_pseudo_dir_test(struct inode *inode, void *opaque) |
bec5eb61 | 141 | { |
142 | return 0; | |
143 | } | |
144 | ||
1da177e4 LT |
145 | /* |
146 | * iget5() inode initialiser | |
147 | */ | |
148 | static int afs_iget5_set(struct inode *inode, void *opaque) | |
149 | { | |
150 | struct afs_iget_data *data = opaque; | |
151 | struct afs_vnode *vnode = AFS_FS_I(inode); | |
152 | ||
1da177e4 LT |
153 | vnode->fid = data->fid; |
154 | vnode->volume = data->volume; | |
155 | ||
3b6492df DH |
156 | /* YFS supports 96-bit vnode IDs, but Linux only supports |
157 | * 64-bit inode numbers. | |
158 | */ | |
159 | inode->i_ino = data->fid.vnode; | |
160 | inode->i_generation = data->fid.unique; | |
1da177e4 | 161 | return 0; |
ec26815a | 162 | } |
1da177e4 | 163 | |
bec5eb61 | 164 | /* |
4d673da1 DH |
165 | * Create an inode for a dynamic root directory or an autocell dynamic |
166 | * automount dir. | |
bec5eb61 | 167 | */ |
4d673da1 | 168 | struct inode *afs_iget_pseudo_dir(struct super_block *sb, bool root) |
bec5eb61 | 169 | { |
170 | struct afs_iget_data data; | |
171 | struct afs_super_info *as; | |
172 | struct afs_vnode *vnode; | |
bec5eb61 | 173 | struct inode *inode; |
174 | static atomic_t afs_autocell_ino; | |
175 | ||
4d673da1 | 176 | _enter(""); |
bec5eb61 | 177 | |
bec5eb61 | 178 | as = sb->s_fs_info; |
4d673da1 DH |
179 | if (as->volume) { |
180 | data.volume = as->volume; | |
181 | data.fid.vid = as->volume->vid; | |
182 | } | |
183 | if (root) { | |
184 | data.fid.vnode = 1; | |
185 | data.fid.unique = 1; | |
186 | } else { | |
187 | data.fid.vnode = atomic_inc_return(&afs_autocell_ino); | |
188 | data.fid.unique = 0; | |
189 | } | |
bec5eb61 | 190 | |
4d673da1 DH |
191 | inode = iget5_locked(sb, data.fid.vnode, |
192 | afs_iget5_pseudo_dir_test, afs_iget5_set, | |
bec5eb61 | 193 | &data); |
194 | if (!inode) { | |
195 | _leave(" = -ENOMEM"); | |
196 | return ERR_PTR(-ENOMEM); | |
197 | } | |
198 | ||
3b6492df | 199 | _debug("GOT INODE %p { ino=%lu, vl=%llx, vn=%llx, u=%x }", |
bec5eb61 | 200 | inode, inode->i_ino, data.fid.vid, data.fid.vnode, |
201 | data.fid.unique); | |
202 | ||
203 | vnode = AFS_FS_I(inode); | |
204 | ||
205 | /* there shouldn't be an existing inode */ | |
206 | BUG_ON(!(inode->i_state & I_NEW)); | |
207 | ||
208 | inode->i_size = 0; | |
209 | inode->i_mode = S_IFDIR | S_IRUGO | S_IXUGO; | |
4d673da1 DH |
210 | if (root) { |
211 | inode->i_op = &afs_dynroot_inode_operations; | |
212 | inode->i_fop = &afs_dynroot_file_operations; | |
213 | } else { | |
214 | inode->i_op = &afs_autocell_inode_operations; | |
215 | } | |
bfe86848 | 216 | set_nlink(inode, 2); |
a0a5386a EB |
217 | inode->i_uid = GLOBAL_ROOT_UID; |
218 | inode->i_gid = GLOBAL_ROOT_GID; | |
bec5eb61 | 219 | inode->i_ctime.tv_sec = get_seconds(); |
220 | inode->i_ctime.tv_nsec = 0; | |
221 | inode->i_atime = inode->i_mtime = inode->i_ctime; | |
222 | inode->i_blocks = 0; | |
a01179e6 | 223 | inode_set_iversion_raw(inode, 0); |
bec5eb61 | 224 | inode->i_generation = 0; |
225 | ||
226 | set_bit(AFS_VNODE_PSEUDODIR, &vnode->flags); | |
4d673da1 DH |
227 | if (!root) { |
228 | set_bit(AFS_VNODE_MOUNTPOINT, &vnode->flags); | |
229 | inode->i_flags |= S_AUTOMOUNT; | |
230 | } | |
231 | ||
232 | inode->i_flags |= S_NOATIME; | |
bec5eb61 | 233 | unlock_new_inode(inode); |
234 | _leave(" = %p", inode); | |
235 | return inode; | |
236 | } | |
237 | ||
402cb8dd DH |
238 | /* |
239 | * Get a cache cookie for an inode. | |
240 | */ | |
241 | static void afs_get_inode_cache(struct afs_vnode *vnode) | |
242 | { | |
243 | #ifdef CONFIG_AFS_FSCACHE | |
244 | struct { | |
245 | u32 vnode_id; | |
246 | u32 unique; | |
247 | u32 vnode_id_ext[2]; /* Allow for a 96-bit key */ | |
248 | } __packed key; | |
249 | struct afs_vnode_cache_aux aux; | |
250 | ||
f3ddee8d DH |
251 | if (vnode->status.type == AFS_FTYPE_DIR) { |
252 | vnode->cache = NULL; | |
253 | return; | |
254 | } | |
255 | ||
402cb8dd DH |
256 | key.vnode_id = vnode->fid.vnode; |
257 | key.unique = vnode->fid.unique; | |
3b6492df DH |
258 | key.vnode_id_ext[0] = vnode->fid.vnode >> 32; |
259 | key.vnode_id_ext[1] = vnode->fid.vnode_hi; | |
402cb8dd DH |
260 | aux.data_version = vnode->status.data_version; |
261 | ||
262 | vnode->cache = fscache_acquire_cookie(vnode->volume->cache, | |
263 | &afs_vnode_cache_index_def, | |
264 | &key, sizeof(key), | |
265 | &aux, sizeof(aux), | |
ee1235a9 | 266 | vnode, vnode->status.size, true); |
402cb8dd DH |
267 | #endif |
268 | } | |
269 | ||
1da177e4 LT |
270 | /* |
271 | * inode retrieval | |
272 | */ | |
260a9803 DH |
273 | struct inode *afs_iget(struct super_block *sb, struct key *key, |
274 | struct afs_fid *fid, struct afs_file_status *status, | |
d2ddc776 | 275 | struct afs_callback *cb, struct afs_cb_interest *cbi) |
1da177e4 LT |
276 | { |
277 | struct afs_iget_data data = { .fid = *fid }; | |
278 | struct afs_super_info *as; | |
279 | struct afs_vnode *vnode; | |
280 | struct inode *inode; | |
281 | int ret; | |
282 | ||
3b6492df | 283 | _enter(",{%llx:%llu.%u},,", fid->vid, fid->vnode, fid->unique); |
1da177e4 LT |
284 | |
285 | as = sb->s_fs_info; | |
286 | data.volume = as->volume; | |
287 | ||
288 | inode = iget5_locked(sb, fid->vnode, afs_iget5_test, afs_iget5_set, | |
289 | &data); | |
290 | if (!inode) { | |
291 | _leave(" = -ENOMEM"); | |
08e0e7c8 | 292 | return ERR_PTR(-ENOMEM); |
1da177e4 LT |
293 | } |
294 | ||
3b6492df | 295 | _debug("GOT INODE %p { vl=%llx vn=%llx, u=%x }", |
08e0e7c8 DH |
296 | inode, fid->vid, fid->vnode, fid->unique); |
297 | ||
1da177e4 LT |
298 | vnode = AFS_FS_I(inode); |
299 | ||
300 | /* deal with an existing inode */ | |
301 | if (!(inode->i_state & I_NEW)) { | |
08e0e7c8 DH |
302 | _leave(" = %p", inode); |
303 | return inode; | |
1da177e4 LT |
304 | } |
305 | ||
260a9803 DH |
306 | if (!status) { |
307 | /* it's a remotely extant inode */ | |
0c3a5ac2 | 308 | ret = afs_fetch_status(vnode, key, true); |
260a9803 DH |
309 | if (ret < 0) |
310 | goto bad_inode; | |
311 | } else { | |
312 | /* it's an inode we just created */ | |
313 | memcpy(&vnode->status, status, sizeof(vnode->status)); | |
314 | ||
315 | if (!cb) { | |
316 | /* it's a symlink we just created (the fileserver | |
317 | * didn't give us a callback) */ | |
318 | vnode->cb_version = 0; | |
260a9803 | 319 | vnode->cb_type = 0; |
12d8e95a | 320 | vnode->cb_expires_at = ktime_get(); |
260a9803 DH |
321 | } else { |
322 | vnode->cb_version = cb->version; | |
260a9803 | 323 | vnode->cb_type = cb->type; |
12d8e95a | 324 | vnode->cb_expires_at = cb->expires_at; |
d2ddc776 | 325 | vnode->cb_interest = afs_get_cb_interest(cbi); |
c435ee34 | 326 | set_bit(AFS_VNODE_CB_PROMISED, &vnode->flags); |
260a9803 | 327 | } |
c435ee34 DH |
328 | |
329 | vnode->cb_expires_at += ktime_get_real_seconds(); | |
260a9803 DH |
330 | } |
331 | ||
dd9fbcb8 | 332 | ret = afs_inode_init_from_status(vnode, key); |
08e0e7c8 | 333 | if (ret < 0) |
1da177e4 LT |
334 | goto bad_inode; |
335 | ||
5800db81 DH |
336 | afs_get_inode_cache(vnode); |
337 | ||
1da177e4 | 338 | /* success */ |
260a9803 | 339 | clear_bit(AFS_VNODE_UNSET, &vnode->flags); |
08e0e7c8 | 340 | inode->i_flags |= S_NOATIME; |
1da177e4 | 341 | unlock_new_inode(inode); |
08e0e7c8 DH |
342 | _leave(" = %p [CB { v=%u t=%u }]", inode, vnode->cb_version, vnode->cb_type); |
343 | return inode; | |
1da177e4 LT |
344 | |
345 | /* failure */ | |
ec26815a | 346 | bad_inode: |
aa7fa240 | 347 | iget_failed(inode); |
1da177e4 | 348 | _leave(" = %d [bad]", ret); |
08e0e7c8 | 349 | return ERR_PTR(ret); |
ec26815a | 350 | } |
1da177e4 | 351 | |
416351f2 DH |
352 | /* |
353 | * mark the data attached to an inode as obsolete due to a write on the server | |
354 | * - might also want to ditch all the outstanding writes and dirty pages | |
355 | */ | |
356 | void afs_zap_data(struct afs_vnode *vnode) | |
357 | { | |
3b6492df | 358 | _enter("{%llx:%llu}", vnode->fid.vid, vnode->fid.vnode); |
416351f2 | 359 | |
c1515999 DH |
360 | #ifdef CONFIG_AFS_FSCACHE |
361 | fscache_invalidate(vnode->cache); | |
362 | #endif | |
363 | ||
416351f2 | 364 | /* nuke all the non-dirty pages that aren't locked, mapped or being |
0f300ca9 DH |
365 | * written back in a regular file and completely discard the pages in a |
366 | * directory or symlink */ | |
367 | if (S_ISREG(vnode->vfs_inode.i_mode)) | |
368 | invalidate_remote_inode(&vnode->vfs_inode); | |
369 | else | |
370 | invalidate_inode_pages2(vnode->vfs_inode.i_mapping); | |
416351f2 DH |
371 | } |
372 | ||
260a9803 DH |
373 | /* |
374 | * validate a vnode/inode | |
375 | * - there are several things we need to check | |
376 | * - parent dir data changes (rm, rmdir, rename, mkdir, create, link, | |
377 | * symlink) | |
378 | * - parent dir metadata changed (security changes) | |
379 | * - dentry data changed (write, truncate) | |
380 | * - dentry metadata changed (security changes) | |
381 | */ | |
382 | int afs_validate(struct afs_vnode *vnode, struct key *key) | |
383 | { | |
c435ee34 | 384 | time64_t now = ktime_get_real_seconds(); |
ae3b7361 | 385 | bool valid; |
260a9803 DH |
386 | int ret; |
387 | ||
3b6492df | 388 | _enter("{v={%llx:%llu} fl=%lx},%x", |
260a9803 DH |
389 | vnode->fid.vid, vnode->fid.vnode, vnode->flags, |
390 | key_serial(key)); | |
391 | ||
c435ee34 DH |
392 | /* Quickly check the callback state. Ideally, we'd use read_seqbegin |
393 | * here, but we have no way to pass the net namespace to the RCU | |
394 | * cleanup for the server record. | |
395 | */ | |
396 | read_seqlock_excl(&vnode->cb_lock); | |
397 | ||
398 | if (test_bit(AFS_VNODE_CB_PROMISED, &vnode->flags)) { | |
68251f0a DH |
399 | if (vnode->cb_s_break != vnode->cb_interest->server->cb_s_break || |
400 | vnode->cb_v_break != vnode->volume->cb_v_break) { | |
c435ee34 | 401 | vnode->cb_s_break = vnode->cb_interest->server->cb_s_break; |
68251f0a DH |
402 | vnode->cb_v_break = vnode->volume->cb_v_break; |
403 | valid = false; | |
63a4681f | 404 | } else if (vnode->status.type == AFS_FTYPE_DIR && |
ae3b7361 DH |
405 | (!test_bit(AFS_VNODE_DIR_VALID, &vnode->flags) || |
406 | vnode->cb_expires_at - 10 <= now)) { | |
407 | valid = false; | |
408 | } else if (test_bit(AFS_VNODE_ZAP_DATA, &vnode->flags) || | |
409 | vnode->cb_expires_at - 10 <= now) { | |
410 | valid = false; | |
411 | } else { | |
68251f0a | 412 | valid = true; |
260a9803 | 413 | } |
c435ee34 DH |
414 | } else if (test_bit(AFS_VNODE_DELETED, &vnode->flags)) { |
415 | valid = true; | |
ae3b7361 DH |
416 | } else { |
417 | vnode->cb_s_break = vnode->cb_interest->server->cb_s_break; | |
418 | vnode->cb_v_break = vnode->volume->cb_v_break; | |
419 | valid = false; | |
260a9803 DH |
420 | } |
421 | ||
c435ee34 | 422 | read_sequnlock_excl(&vnode->cb_lock); |
440fbc3a DH |
423 | |
424 | if (test_bit(AFS_VNODE_DELETED, &vnode->flags)) | |
425 | clear_nlink(&vnode->vfs_inode); | |
426 | ||
c435ee34 | 427 | if (valid) |
260a9803 DH |
428 | goto valid; |
429 | ||
b61f7dcf | 430 | down_write(&vnode->validate_lock); |
260a9803 DH |
431 | |
432 | /* if the promise has expired, we need to check the server again to get | |
433 | * a new promise - note that if the (parent) directory's metadata was | |
434 | * changed then the security may be different and we may no longer have | |
435 | * access */ | |
c435ee34 | 436 | if (!test_bit(AFS_VNODE_CB_PROMISED, &vnode->flags)) { |
260a9803 | 437 | _debug("not promised"); |
0c3a5ac2 | 438 | ret = afs_fetch_status(vnode, key, false); |
c435ee34 DH |
439 | if (ret < 0) { |
440 | if (ret == -ENOENT) { | |
441 | set_bit(AFS_VNODE_DELETED, &vnode->flags); | |
442 | ret = -ESTALE; | |
443 | } | |
260a9803 | 444 | goto error_unlock; |
c435ee34 | 445 | } |
260a9803 DH |
446 | _debug("new promise [fl=%lx]", vnode->flags); |
447 | } | |
448 | ||
449 | if (test_bit(AFS_VNODE_DELETED, &vnode->flags)) { | |
450 | _debug("file already deleted"); | |
451 | ret = -ESTALE; | |
452 | goto error_unlock; | |
453 | } | |
454 | ||
455 | /* if the vnode's data version number changed then its contents are | |
456 | * different */ | |
416351f2 DH |
457 | if (test_and_clear_bit(AFS_VNODE_ZAP_DATA, &vnode->flags)) |
458 | afs_zap_data(vnode); | |
b61f7dcf | 459 | up_write(&vnode->validate_lock); |
260a9803 DH |
460 | valid: |
461 | _leave(" = 0"); | |
462 | return 0; | |
463 | ||
464 | error_unlock: | |
b61f7dcf | 465 | up_write(&vnode->validate_lock); |
260a9803 DH |
466 | _leave(" = %d", ret); |
467 | return ret; | |
468 | } | |
469 | ||
1da177e4 LT |
470 | /* |
471 | * read the attributes of an inode | |
472 | */ | |
a528d35e DH |
473 | int afs_getattr(const struct path *path, struct kstat *stat, |
474 | u32 request_mask, unsigned int query_flags) | |
1da177e4 | 475 | { |
a528d35e | 476 | struct inode *inode = d_inode(path->dentry); |
c435ee34 DH |
477 | struct afs_vnode *vnode = AFS_FS_I(inode); |
478 | int seq = 0; | |
1da177e4 | 479 | |
d6e43f75 | 480 | _enter("{ ino=%lu v=%u }", inode->i_ino, inode->i_generation); |
1da177e4 | 481 | |
c435ee34 DH |
482 | do { |
483 | read_seqbegin_or_lock(&vnode->cb_lock, &seq); | |
484 | generic_fillattr(inode, stat); | |
485 | } while (need_seqretry(&vnode->cb_lock, seq)); | |
486 | ||
487 | done_seqretry(&vnode->cb_lock, seq); | |
1da177e4 | 488 | return 0; |
ec26815a | 489 | } |
1da177e4 | 490 | |
bec5eb61 | 491 | /* |
492 | * discard an AFS inode | |
493 | */ | |
494 | int afs_drop_inode(struct inode *inode) | |
495 | { | |
496 | _enter(""); | |
497 | ||
498 | if (test_bit(AFS_VNODE_PSEUDODIR, &AFS_FS_I(inode)->flags)) | |
499 | return generic_delete_inode(inode); | |
500 | else | |
501 | return generic_drop_inode(inode); | |
502 | } | |
503 | ||
1da177e4 LT |
504 | /* |
505 | * clear an AFS inode | |
506 | */ | |
b57922d9 | 507 | void afs_evict_inode(struct inode *inode) |
1da177e4 LT |
508 | { |
509 | struct afs_vnode *vnode; | |
510 | ||
511 | vnode = AFS_FS_I(inode); | |
512 | ||
3b6492df | 513 | _enter("{%llx:%llu.%d}", |
260a9803 | 514 | vnode->fid.vid, |
1da177e4 | 515 | vnode->fid.vnode, |
c435ee34 | 516 | vnode->fid.unique); |
1da177e4 | 517 | |
08e0e7c8 DH |
518 | _debug("CLEAR INODE %p", inode); |
519 | ||
520 | ASSERTCMP(inode->i_ino, ==, vnode->fid.vnode); | |
521 | ||
91b0abe3 | 522 | truncate_inode_pages_final(&inode->i_data); |
dbd5768f | 523 | clear_inode(inode); |
b57922d9 | 524 | |
c435ee34 DH |
525 | if (vnode->cb_interest) { |
526 | afs_put_cb_interest(afs_i2net(inode), vnode->cb_interest); | |
527 | vnode->cb_interest = NULL; | |
08e0e7c8 | 528 | } |
1da177e4 | 529 | |
4343d008 DH |
530 | while (!list_empty(&vnode->wb_keys)) { |
531 | struct afs_wb_key *wbk = list_entry(vnode->wb_keys.next, | |
532 | struct afs_wb_key, vnode_link); | |
533 | list_del(&wbk->vnode_link); | |
534 | afs_put_wb_key(wbk); | |
535 | } | |
1da177e4 | 536 | |
9b3f26c9 | 537 | #ifdef CONFIG_AFS_FSCACHE |
402cb8dd DH |
538 | { |
539 | struct afs_vnode_cache_aux aux; | |
540 | ||
541 | aux.data_version = vnode->status.data_version; | |
542 | fscache_relinquish_cookie(vnode->cache, &aux, | |
543 | test_bit(AFS_VNODE_DELETED, &vnode->flags)); | |
544 | vnode->cache = NULL; | |
545 | } | |
1da177e4 LT |
546 | #endif |
547 | ||
fe342cf7 | 548 | afs_put_permits(rcu_access_pointer(vnode->permit_cache)); |
1da177e4 | 549 | _leave(""); |
ec26815a | 550 | } |
31143d5d DH |
551 | |
552 | /* | |
553 | * set the attributes of an inode | |
554 | */ | |
555 | int afs_setattr(struct dentry *dentry, struct iattr *attr) | |
556 | { | |
d2ddc776 | 557 | struct afs_fs_cursor fc; |
2b0143b5 | 558 | struct afs_vnode *vnode = AFS_FS_I(d_inode(dentry)); |
31143d5d DH |
559 | struct key *key; |
560 | int ret; | |
561 | ||
3b6492df | 562 | _enter("{%llx:%llu},{n=%pd},%x", |
a455589f | 563 | vnode->fid.vid, vnode->fid.vnode, dentry, |
31143d5d DH |
564 | attr->ia_valid); |
565 | ||
566 | if (!(attr->ia_valid & (ATTR_SIZE | ATTR_MODE | ATTR_UID | ATTR_GID | | |
567 | ATTR_MTIME))) { | |
568 | _leave(" = 0 [unsupported]"); | |
569 | return 0; | |
570 | } | |
571 | ||
572 | /* flush any dirty data outstanding on a regular file */ | |
4343d008 | 573 | if (S_ISREG(vnode->vfs_inode.i_mode)) |
31143d5d | 574 | filemap_write_and_wait(vnode->vfs_inode.i_mapping); |
31143d5d DH |
575 | |
576 | if (attr->ia_valid & ATTR_FILE) { | |
215804a9 | 577 | key = afs_file_key(attr->ia_file); |
31143d5d DH |
578 | } else { |
579 | key = afs_request_key(vnode->volume->cell); | |
580 | if (IS_ERR(key)) { | |
581 | ret = PTR_ERR(key); | |
582 | goto error; | |
583 | } | |
584 | } | |
585 | ||
d2ddc776 DH |
586 | ret = -ERESTARTSYS; |
587 | if (afs_begin_vnode_operation(&fc, vnode, key)) { | |
588 | while (afs_select_fileserver(&fc)) { | |
68251f0a | 589 | fc.cb_break = afs_calc_vnode_cb_break(vnode); |
d2ddc776 DH |
590 | afs_fs_setattr(&fc, attr); |
591 | } | |
592 | ||
593 | afs_check_for_remote_deletion(&fc, fc.vnode); | |
594 | afs_vnode_commit_status(&fc, vnode, fc.cb_break); | |
595 | ret = afs_end_vnode_operation(&fc); | |
596 | } | |
597 | ||
31143d5d DH |
598 | if (!(attr->ia_valid & ATTR_FILE)) |
599 | key_put(key); | |
600 | ||
601 | error: | |
602 | _leave(" = %d", ret); | |
603 | return ret; | |
604 | } |