usb: gadget: f_mtp: Avoid race between mtp_read and mtp_function_disable
[GitHub/exynos8895/android_kernel_samsung_universal8895.git] / fs / f2fs / dir.c
CommitLineData
0a8165d7 1/*
6b4ea016
JK
2 * fs/f2fs/dir.c
3 *
4 * Copyright (c) 2012 Samsung Electronics Co., Ltd.
5 * http://www.samsung.com/
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11#include <linux/fs.h>
12#include <linux/f2fs_fs.h>
353c1624 13#include <linux/sched.h>
6b4ea016 14#include "f2fs.h"
398b1ac5 15#include "node.h"
6b4ea016 16#include "acl.h"
8ae8f162 17#include "xattr.h"
353c1624 18#include <trace/events/f2fs.h>
6b4ea016
JK
19
20static unsigned long dir_blocks(struct inode *inode)
21{
c1286ff4
JK
22 return ((unsigned long long) (i_size_read(inode) + PAGE_SIZE - 1))
23 >> PAGE_SHIFT;
6b4ea016
JK
24}
25
38431545 26static unsigned int dir_buckets(unsigned int level, int dir_level)
6b4ea016 27{
bfec07d0 28 if (level + dir_level < MAX_DIR_HASH_DEPTH / 2)
38431545 29 return 1 << (level + dir_level);
6b4ea016 30 else
bfec07d0 31 return MAX_DIR_BUCKETS;
6b4ea016
JK
32}
33
34static unsigned int bucket_blocks(unsigned int level)
35{
36 if (level < MAX_DIR_HASH_DEPTH / 2)
37 return 2;
38 else
39 return 4;
40}
41
c1286ff4 42static unsigned char f2fs_filetype_table[F2FS_FT_MAX] = {
6b4ea016
JK
43 [F2FS_FT_UNKNOWN] = DT_UNKNOWN,
44 [F2FS_FT_REG_FILE] = DT_REG,
45 [F2FS_FT_DIR] = DT_DIR,
46 [F2FS_FT_CHRDEV] = DT_CHR,
47 [F2FS_FT_BLKDEV] = DT_BLK,
48 [F2FS_FT_FIFO] = DT_FIFO,
49 [F2FS_FT_SOCK] = DT_SOCK,
50 [F2FS_FT_SYMLINK] = DT_LNK,
51};
52
6b4ea016
JK
53static unsigned char f2fs_type_by_mode[S_IFMT >> S_SHIFT] = {
54 [S_IFREG >> S_SHIFT] = F2FS_FT_REG_FILE,
55 [S_IFDIR >> S_SHIFT] = F2FS_FT_DIR,
56 [S_IFCHR >> S_SHIFT] = F2FS_FT_CHRDEV,
57 [S_IFBLK >> S_SHIFT] = F2FS_FT_BLKDEV,
58 [S_IFIFO >> S_SHIFT] = F2FS_FT_FIFO,
59 [S_IFSOCK >> S_SHIFT] = F2FS_FT_SOCK,
60 [S_IFLNK >> S_SHIFT] = F2FS_FT_SYMLINK,
61};
62
510022a8 63void set_de_type(struct f2fs_dir_entry *de, umode_t mode)
6b4ea016 64{
6b4ea016
JK
65 de->file_type = f2fs_type_by_mode[(mode & S_IFMT) >> S_SHIFT];
66}
67
c1286ff4
JK
68unsigned char get_de_type(struct f2fs_dir_entry *de)
69{
70 if (de->file_type < F2FS_FT_MAX)
71 return f2fs_filetype_table[de->file_type];
72 return DT_UNKNOWN;
73}
74
38431545
JK
75static unsigned long dir_block_index(unsigned int level,
76 int dir_level, unsigned int idx)
6b4ea016
JK
77{
78 unsigned long i;
79 unsigned long bidx = 0;
80
81 for (i = 0; i < level; i++)
38431545 82 bidx += dir_buckets(i, dir_level) * bucket_blocks(i);
6b4ea016
JK
83 bidx += idx * bucket_blocks(level);
84 return bidx;
85}
86
6b4ea016 87static struct f2fs_dir_entry *find_in_block(struct page *dentry_page,
c1286ff4 88 struct fscrypt_name *fname,
6e22c691
JK
89 f2fs_hash_t namehash,
90 int *max_slots,
4e6ebf6d
JK
91 struct page **res_page)
92{
93 struct f2fs_dentry_block *dentry_blk;
94 struct f2fs_dir_entry *de;
7b3cd7d6 95 struct f2fs_dentry_ptr d;
4e6ebf6d
JK
96
97 dentry_blk = (struct f2fs_dentry_block *)kmap(dentry_page);
7b3cd7d6 98
13f00235 99 make_dentry_ptr_block(NULL, &d, dentry_blk);
6e22c691 100 de = find_target_dentry(fname, namehash, max_slots, &d);
4e6ebf6d
JK
101 if (de)
102 *res_page = dentry_page;
103 else
104 kunmap(dentry_page);
105
4e6ebf6d
JK
106 return de;
107}
108
c1286ff4 109struct f2fs_dir_entry *find_target_dentry(struct fscrypt_name *fname,
6e22c691
JK
110 f2fs_hash_t namehash, int *max_slots,
111 struct f2fs_dentry_ptr *d)
6b4ea016
JK
112{
113 struct f2fs_dir_entry *de;
5d0c6671 114 unsigned long bit_pos = 0;
5d0c6671 115 int max_len = 0;
6b4ea016 116
7b3cd7d6
JK
117 if (max_slots)
118 *max_slots = 0;
119 while (bit_pos < d->max) {
120 if (!test_bit_le(bit_pos, d->bitmap)) {
5d0c6671 121 bit_pos++;
bda19076 122 max_len++;
5d0c6671
JK
123 continue;
124 }
bda19076 125
7b3cd7d6 126 de = &d->dentry[bit_pos];
6e22c691 127
c1286ff4
JK
128 if (unlikely(!de->name_len)) {
129 bit_pos++;
130 continue;
131 }
129a883b 132
13f00235
JK
133 if (de->hash_code == namehash &&
134 fscrypt_match_name(fname, d->filename[bit_pos],
135 le16_to_cpu(de->name_len)))
4e6ebf6d 136 goto found;
c1286ff4 137
bda19076 138 if (max_slots && max_len > *max_slots)
5d0c6671 139 *max_slots = max_len;
bda19076 140 max_len = 0;
81e366f8 141
5d0c6671 142 bit_pos += GET_DENTRY_SLOTS(le16_to_cpu(de->name_len));
6b4ea016
JK
143 }
144
145 de = NULL;
6b4ea016 146found:
7b3cd7d6 147 if (max_slots && max_len > *max_slots)
5d0c6671 148 *max_slots = max_len;
6b4ea016
JK
149 return de;
150}
151
152static struct f2fs_dir_entry *find_in_level(struct inode *dir,
6e22c691 153 unsigned int level,
c1286ff4 154 struct fscrypt_name *fname,
6e22c691 155 struct page **res_page)
6b4ea016 156{
6e22c691
JK
157 struct qstr name = FSTR_TO_QSTR(&fname->disk_name);
158 int s = GET_DENTRY_SLOTS(name.len);
6b4ea016
JK
159 unsigned int nbucket, nblock;
160 unsigned int bidx, end_block;
161 struct page *dentry_page;
162 struct f2fs_dir_entry *de = NULL;
163 bool room = false;
4e6ebf6d 164 int max_slots;
13f00235 165 f2fs_hash_t namehash = f2fs_dentry_hash(&name, fname);
6b4ea016 166
38431545 167 nbucket = dir_buckets(level, F2FS_I(dir)->i_dir_level);
6b4ea016
JK
168 nblock = bucket_blocks(level);
169
38431545
JK
170 bidx = dir_block_index(level, F2FS_I(dir)->i_dir_level,
171 le32_to_cpu(namehash) % nbucket);
6b4ea016
JK
172 end_block = bidx + nblock;
173
174 for (; bidx < end_block; bidx++) {
175 /* no need to allocate new dentry pages to all the indices */
43f3eae1 176 dentry_page = find_data_page(dir, bidx);
6b4ea016 177 if (IS_ERR(dentry_page)) {
c1286ff4
JK
178 if (PTR_ERR(dentry_page) == -ENOENT) {
179 room = true;
180 continue;
181 } else {
182 *res_page = dentry_page;
183 break;
184 }
6b4ea016
JK
185 }
186
6e22c691
JK
187 de = find_in_block(dentry_page, fname, namehash, &max_slots,
188 res_page);
6b4ea016
JK
189 if (de)
190 break;
191
192 if (max_slots >= s)
193 room = true;
194 f2fs_put_page(dentry_page, 0);
195 }
196
197 if (!de && room && F2FS_I(dir)->chash != namehash) {
198 F2FS_I(dir)->chash = namehash;
199 F2FS_I(dir)->clevel = level;
200 }
201
202 return de;
203}
204
c1286ff4
JK
205struct f2fs_dir_entry *__f2fs_find_entry(struct inode *dir,
206 struct fscrypt_name *fname, struct page **res_page)
6b4ea016 207{
6b4ea016
JK
208 unsigned long npages = dir_blocks(dir);
209 struct f2fs_dir_entry *de = NULL;
6b4ea016
JK
210 unsigned int max_depth;
211 unsigned int level;
6e22c691
JK
212
213 if (f2fs_has_inline_dentry(dir)) {
c1286ff4
JK
214 *res_page = NULL;
215 de = find_in_inline_dir(dir, fname, res_page);
6e22c691
JK
216 goto out;
217 }
622f28ae 218
c1286ff4
JK
219 if (npages == 0) {
220 *res_page = NULL;
6e22c691 221 goto out;
c1286ff4 222 }
6b4ea016 223
6b4ea016 224 max_depth = F2FS_I(dir)->i_current_depth;
c1286ff4
JK
225 if (unlikely(max_depth > MAX_DIR_HASH_DEPTH)) {
226 f2fs_msg(F2FS_I_SB(dir)->sb, KERN_WARNING,
227 "Corrupted max_depth of %lu: %u",
228 dir->i_ino, max_depth);
229 max_depth = MAX_DIR_HASH_DEPTH;
230 f2fs_i_depth_write(dir, max_depth);
231 }
6b4ea016
JK
232
233 for (level = 0; level < max_depth; level++) {
c1286ff4
JK
234 *res_page = NULL;
235 de = find_in_level(dir, level, fname, res_page);
236 if (de || IS_ERR(*res_page))
6b4ea016
JK
237 break;
238 }
6e22c691 239out:
13f00235
JK
240 /* This is to increase the speed of f2fs_create */
241 if (!de)
242 F2FS_I(dir)->task = current;
6b4ea016
JK
243 return de;
244}
245
c1286ff4
JK
246/*
247 * Find an entry in the specified directory with the wanted name.
248 * It returns the page where the entry was found (as a parameter - res_page),
249 * and the entry itself. Page is returned mapped and unlocked.
250 * Entry is guaranteed to be valid.
251 */
252struct f2fs_dir_entry *f2fs_find_entry(struct inode *dir,
253 const struct qstr *child, struct page **res_page)
6b4ea016 254{
c1286ff4
JK
255 struct f2fs_dir_entry *de = NULL;
256 struct fscrypt_name fname;
257 int err;
622f28ae 258
c1286ff4
JK
259 err = fscrypt_setup_filename(dir, child, 1, &fname);
260 if (err) {
13f00235
JK
261 if (err == -ENOENT)
262 *res_page = NULL;
263 else
264 *res_page = ERR_PTR(err);
6b4ea016 265 return NULL;
c1286ff4
JK
266 }
267
268 de = __f2fs_find_entry(dir, &fname, res_page);
6b4ea016 269
c1286ff4 270 fscrypt_free_filename(&fname);
6b4ea016
JK
271 return de;
272}
273
c1286ff4
JK
274struct f2fs_dir_entry *f2fs_parent_dir(struct inode *dir, struct page **p)
275{
276 struct qstr dotdot = QSTR_INIT("..", 2);
277
278 return f2fs_find_entry(dir, &dotdot, p);
279}
280
281ino_t f2fs_inode_by_name(struct inode *dir, const struct qstr *qstr,
282 struct page **page)
6b4ea016
JK
283{
284 ino_t res = 0;
285 struct f2fs_dir_entry *de;
6b4ea016 286
c1286ff4 287 de = f2fs_find_entry(dir, qstr, page);
6b4ea016
JK
288 if (de) {
289 res = le32_to_cpu(de->ino);
c1286ff4
JK
290 f2fs_dentry_kunmap(dir, *page);
291 f2fs_put_page(*page, 0);
6b4ea016
JK
292 }
293
294 return res;
295}
296
297void f2fs_set_link(struct inode *dir, struct f2fs_dir_entry *de,
298 struct page *page, struct inode *inode)
299{
59a06155 300 enum page_type type = f2fs_has_inline_dentry(dir) ? NODE : DATA;
6b4ea016 301 lock_page(page);
c1286ff4 302 f2fs_wait_on_page_writeback(page, type, true);
6b4ea016 303 de->ino = cpu_to_le32(inode->i_ino);
510022a8 304 set_de_type(de, inode->i_mode);
5df1f1da 305 f2fs_dentry_kunmap(dir, page);
6b4ea016 306 set_page_dirty(page);
6666e6aa 307
dafac77e 308 dir->i_mtime = dir->i_ctime = current_time(dir);
0ef31c7b 309 f2fs_mark_inode_dirty_sync(dir, false);
6b4ea016 310 f2fs_put_page(page, 1);
6b4ea016
JK
311}
312
44a83ff6 313static void init_dent_inode(const struct qstr *name, struct page *ipage)
6b4ea016 314{
58bfaf44 315 struct f2fs_inode *ri;
6b4ea016 316
c1286ff4 317 f2fs_wait_on_page_writeback(ipage, NODE, true);
54b591df 318
53dc9a67 319 /* copy name info. to this inode page */
58bfaf44
JK
320 ri = F2FS_INODE(ipage);
321 ri->i_namelen = cpu_to_le32(name->len);
322 memcpy(ri->i_name, name->name, name->len);
6b4ea016
JK
323 set_page_dirty(ipage);
324}
325
062a3e7b
JK
326void do_make_empty_dir(struct inode *inode, struct inode *parent,
327 struct f2fs_dentry_ptr *d)
328{
c1286ff4
JK
329 struct qstr dot = QSTR_INIT(".", 1);
330 struct qstr dotdot = QSTR_INIT("..", 2);
062a3e7b 331
c1286ff4
JK
332 /* update dirent of "." */
333 f2fs_update_dentry(inode->i_ino, inode->i_mode, d, &dot, 0, 0);
062a3e7b 334
c1286ff4
JK
335 /* update dirent of ".." */
336 f2fs_update_dentry(parent->i_ino, parent->i_mode, d, &dotdot, 0, 1);
062a3e7b
JK
337}
338
44a83ff6
JK
339static int make_empty_dir(struct inode *inode,
340 struct inode *parent, struct page *page)
39936837
JK
341{
342 struct page *dentry_page;
343 struct f2fs_dentry_block *dentry_blk;
062a3e7b 344 struct f2fs_dentry_ptr d;
39936837 345
622f28ae
CY
346 if (f2fs_has_inline_dentry(inode))
347 return make_empty_inline_dir(inode, parent, page);
348
44a83ff6 349 dentry_page = get_new_data_page(inode, page, 0, true);
39936837
JK
350 if (IS_ERR(dentry_page))
351 return PTR_ERR(dentry_page);
352
1c3bb978 353 dentry_blk = kmap_atomic(dentry_page);
39936837 354
13f00235 355 make_dentry_ptr_block(NULL, &d, dentry_blk);
062a3e7b 356 do_make_empty_dir(inode, parent, &d);
39936837 357
1c3bb978 358 kunmap_atomic(dentry_blk);
39936837
JK
359
360 set_page_dirty(dentry_page);
361 f2fs_put_page(dentry_page, 1);
362 return 0;
363}
364
bce8d112 365struct page *init_inode_metadata(struct inode *inode, struct inode *dir,
c1286ff4
JK
366 const struct qstr *new_name, const struct qstr *orig_name,
367 struct page *dpage)
6b4ea016 368{
44a83ff6
JK
369 struct page *page;
370 int err;
371
c1286ff4 372 if (is_inode_flag_set(inode, FI_NEW_INODE)) {
a014e037 373 page = new_inode_page(inode);
44a83ff6
JK
374 if (IS_ERR(page))
375 return page;
6b4ea016
JK
376
377 if (S_ISDIR(inode->i_mode)) {
c1286ff4
JK
378 /* in order to handle error case */
379 get_page(page);
44a83ff6 380 err = make_empty_dir(inode, dir, page);
c1286ff4
JK
381 if (err) {
382 lock_page(page);
383 goto put_error;
384 }
385 put_page(page);
6b4ea016
JK
386 }
387
bce8d112 388 err = f2fs_init_acl(inode, dir, page, dpage);
44a83ff6 389 if (err)
a8865372 390 goto put_error;
44a83ff6 391
c1286ff4 392 err = f2fs_init_security(inode, dir, orig_name, page);
8ae8f162 393 if (err)
a8865372 394 goto put_error;
fcc85a4d
JK
395
396 if (f2fs_encrypted_inode(dir) && f2fs_may_encrypt(inode)) {
c1286ff4 397 err = fscrypt_inherit_context(dir, inode, page, false);
fcc85a4d
JK
398 if (err)
399 goto put_error;
400 }
6b4ea016 401 } else {
4081363f 402 page = get_node_page(F2FS_I_SB(dir), inode->i_ino);
44a83ff6
JK
403 if (IS_ERR(page))
404 return page;
405
44a83ff6 406 set_cold_node(inode, page);
6b4ea016 407 }
44a83ff6 408
13f00235 409 if (new_name) {
c1286ff4 410 init_dent_inode(new_name, page);
13f00235
JK
411 if (f2fs_encrypted_inode(dir))
412 file_set_enc_name(inode);
413 }
44a83ff6 414
83d5d6f6
JK
415 /*
416 * This file should be checkpointed during fsync.
417 * We lost i_pino from now on.
418 */
c1286ff4 419 if (is_inode_flag_set(inode, FI_INC_LINK)) {
13f00235
JK
420 if (!S_ISDIR(inode->i_mode))
421 file_lost_pino(inode);
50732df0
CY
422 /*
423 * If link the tmpfile to alias through linkat path,
424 * we should remove this inode from orphan list.
425 */
426 if (inode->i_nlink == 0)
4081363f 427 remove_orphan_inode(F2FS_I_SB(dir), inode->i_ino);
c1286ff4 428 f2fs_i_links_write(inode, true);
6b4ea016 429 }
44a83ff6
JK
430 return page;
431
a8865372 432put_error:
c1286ff4
JK
433 clear_nlink(inode);
434 update_inode(inode, page);
44a83ff6 435 f2fs_put_page(page, 1);
44a83ff6 436 return ERR_PTR(err);
6b4ea016
JK
437}
438
dbeacf02 439void update_parent_metadata(struct inode *dir, struct inode *inode,
6b4ea016
JK
440 unsigned int current_depth)
441{
c1286ff4
JK
442 if (inode && is_inode_flag_set(inode, FI_NEW_INODE)) {
443 if (S_ISDIR(inode->i_mode))
444 f2fs_i_links_write(dir, true);
445 clear_inode_flag(inode, FI_NEW_INODE);
6b4ea016 446 }
dafac77e 447 dir->i_mtime = dir->i_ctime = current_time(dir);
0ef31c7b 448 f2fs_mark_inode_dirty_sync(dir, false);
a18ff063 449
c1286ff4
JK
450 if (F2FS_I(dir)->i_current_depth != current_depth)
451 f2fs_i_depth_write(dir, current_depth);
6b4ea016 452
c1286ff4
JK
453 if (inode && is_inode_flag_set(inode, FI_INC_LINK))
454 clear_inode_flag(inode, FI_INC_LINK);
6b4ea016
JK
455}
456
a82afa20 457int room_for_filename(const void *bitmap, int slots, int max_slots)
6b4ea016
JK
458{
459 int bit_start = 0;
460 int zero_start, zero_end;
461next:
a82afa20
JK
462 zero_start = find_next_zero_bit_le(bitmap, max_slots, bit_start);
463 if (zero_start >= max_slots)
464 return max_slots;
465
466 zero_end = find_next_bit_le(bitmap, max_slots, zero_start);
6b4ea016
JK
467 if (zero_end - zero_start >= slots)
468 return zero_start;
469
470 bit_start = zero_end + 1;
471
a82afa20
JK
472 if (zero_end + 1 >= max_slots)
473 return max_slots;
6b4ea016
JK
474 goto next;
475}
476
510022a8 477void f2fs_update_dentry(nid_t ino, umode_t mode, struct f2fs_dentry_ptr *d,
3b4d732a
CY
478 const struct qstr *name, f2fs_hash_t name_hash,
479 unsigned int bit_pos)
480{
481 struct f2fs_dir_entry *de;
482 int slots = GET_DENTRY_SLOTS(name->len);
483 int i;
484
485 de = &d->dentry[bit_pos];
486 de->hash_code = name_hash;
487 de->name_len = cpu_to_le16(name->len);
488 memcpy(d->filename[bit_pos], name->name, name->len);
510022a8
JK
489 de->ino = cpu_to_le32(ino);
490 set_de_type(de, mode);
c1286ff4
JK
491 for (i = 0; i < slots; i++) {
492 __set_bit_le(bit_pos + i, (void *)d->bitmap);
493 /* avoid wrong garbage data for readdir */
494 if (i)
495 (de + i)->name_len = 0;
496 }
3b4d732a
CY
497}
498
c1286ff4
JK
499int f2fs_add_regular_entry(struct inode *dir, const struct qstr *new_name,
500 const struct qstr *orig_name,
510022a8 501 struct inode *inode, nid_t ino, umode_t mode)
6b4ea016
JK
502{
503 unsigned int bit_pos;
504 unsigned int level;
505 unsigned int current_depth;
506 unsigned long bidx, block;
507 f2fs_hash_t dentry_hash;
6b4ea016 508 unsigned int nbucket, nblock;
6b4ea016
JK
509 struct page *dentry_page = NULL;
510 struct f2fs_dentry_block *dentry_blk = NULL;
3b4d732a 511 struct f2fs_dentry_ptr d;
510022a8 512 struct page *page = NULL;
c1286ff4 513 int slots, err = 0;
622f28ae 514
6b4ea016 515 level = 0;
c1286ff4 516 slots = GET_DENTRY_SLOTS(new_name->len);
13f00235 517 dentry_hash = f2fs_dentry_hash(new_name, NULL);
9ea97163 518
6b4ea016
JK
519 current_depth = F2FS_I(dir)->i_current_depth;
520 if (F2FS_I(dir)->chash == dentry_hash) {
521 level = F2FS_I(dir)->clevel;
522 F2FS_I(dir)->chash = 0;
523 }
524
525start:
c1286ff4 526#ifdef CONFIG_F2FS_FAULT_INJECTION
13f00235
JK
527 if (time_to_inject(F2FS_I_SB(dir), FAULT_DIR_DEPTH)) {
528 f2fs_show_injection_info(FAULT_DIR_DEPTH);
c1286ff4 529 return -ENOSPC;
13f00235 530 }
c1286ff4
JK
531#endif
532 if (unlikely(current_depth == MAX_DIR_HASH_DEPTH))
533 return -ENOSPC;
6b4ea016
JK
534
535 /* Increase the depth, if required */
536 if (level == current_depth)
537 ++current_depth;
538
38431545 539 nbucket = dir_buckets(level, F2FS_I(dir)->i_dir_level);
6b4ea016
JK
540 nblock = bucket_blocks(level);
541
38431545
JK
542 bidx = dir_block_index(level, F2FS_I(dir)->i_dir_level,
543 (le32_to_cpu(dentry_hash) % nbucket));
6b4ea016
JK
544
545 for (block = bidx; block <= (bidx + nblock - 1); block++) {
64aa7ed9 546 dentry_page = get_new_data_page(dir, NULL, block, true);
c1286ff4
JK
547 if (IS_ERR(dentry_page))
548 return PTR_ERR(dentry_page);
6b4ea016
JK
549
550 dentry_blk = kmap(dentry_page);
a82afa20
JK
551 bit_pos = room_for_filename(&dentry_blk->dentry_bitmap,
552 slots, NR_DENTRY_IN_BLOCK);
6b4ea016
JK
553 if (bit_pos < NR_DENTRY_IN_BLOCK)
554 goto add_dentry;
555
556 kunmap(dentry_page);
557 f2fs_put_page(dentry_page, 1);
6b4ea016
JK
558 }
559
560 /* Move to next level to find the empty slot for new dentry */
561 ++level;
562 goto start;
563add_dentry:
c1286ff4 564 f2fs_wait_on_page_writeback(dentry_page, DATA, true);
6b4ea016 565
510022a8
JK
566 if (inode) {
567 down_write(&F2FS_I(inode)->i_sem);
c1286ff4
JK
568 page = init_inode_metadata(inode, dir, new_name,
569 orig_name, NULL);
510022a8
JK
570 if (IS_ERR(page)) {
571 err = PTR_ERR(page);
572 goto fail;
573 }
44a83ff6 574 }
3b4d732a 575
13f00235 576 make_dentry_ptr_block(NULL, &d, dentry_blk);
c1286ff4 577 f2fs_update_dentry(ino, mode, &d, new_name, dentry_hash, bit_pos);
3b4d732a 578
6b4ea016 579 set_page_dirty(dentry_page);
6666e6aa 580
510022a8 581 if (inode) {
c1286ff4 582 f2fs_i_pino_write(inode, dir->i_ino);
510022a8
JK
583 f2fs_put_page(page, 1);
584 }
44a83ff6
JK
585
586 update_parent_metadata(dir, inode, current_depth);
6b4ea016 587fail:
510022a8
JK
588 if (inode)
589 up_write(&F2FS_I(inode)->i_sem);
d928bfbf 590
6b4ea016
JK
591 kunmap(dentry_page);
592 f2fs_put_page(dentry_page, 1);
c1286ff4
JK
593
594 return err;
595}
596
597int __f2fs_do_add_link(struct inode *dir, struct fscrypt_name *fname,
598 struct inode *inode, nid_t ino, umode_t mode)
599{
600 struct qstr new_name;
601 int err = -EAGAIN;
602
603 new_name.name = fname_name(fname);
604 new_name.len = fname_len(fname);
605
606 if (f2fs_has_inline_dentry(dir))
607 err = f2fs_add_inline_entry(dir, &new_name, fname->usr_fname,
608 inode, ino, mode);
609 if (err == -EAGAIN)
610 err = f2fs_add_regular_entry(dir, &new_name, fname->usr_fname,
611 inode, ino, mode);
612
613 f2fs_update_time(F2FS_I_SB(dir), REQ_TIME);
614 return err;
615}
616
617/*
618 * Caller should grab and release a rwsem by calling f2fs_lock_op() and
619 * f2fs_unlock_op().
620 */
621int __f2fs_add_link(struct inode *dir, const struct qstr *name,
622 struct inode *inode, nid_t ino, umode_t mode)
623{
624 struct fscrypt_name fname;
13f00235
JK
625 struct page *page = NULL;
626 struct f2fs_dir_entry *de = NULL;
c1286ff4
JK
627 int err;
628
629 err = fscrypt_setup_filename(dir, name, 0, &fname);
630 if (err)
631 return err;
632
13f00235
JK
633 /*
634 * An immature stakable filesystem shows a race condition between lookup
635 * and create. If we have same task when doing lookup and create, it's
636 * definitely fine as expected by VFS normally. Otherwise, let's just
637 * verify on-disk dentry one more time, which guarantees filesystem
638 * consistency more.
639 */
640 if (current != F2FS_I(dir)->task) {
641 de = __f2fs_find_entry(dir, &fname, &page);
642 F2FS_I(dir)->task = NULL;
643 }
644 if (de) {
645 f2fs_dentry_kunmap(dir, page);
646 f2fs_put_page(page, 0);
647 err = -EEXIST;
648 } else if (IS_ERR(page)) {
649 err = PTR_ERR(page);
650 } else {
651 err = __f2fs_do_add_link(dir, &fname, inode, ino, mode);
652 }
c1286ff4 653 fscrypt_free_filename(&fname);
6b4ea016
JK
654 return err;
655}
656
b97a9b5d
JK
657int f2fs_do_tmpfile(struct inode *inode, struct inode *dir)
658{
659 struct page *page;
660 int err = 0;
661
662 down_write(&F2FS_I(inode)->i_sem);
c1286ff4 663 page = init_inode_metadata(inode, dir, NULL, NULL, NULL);
b97a9b5d
JK
664 if (IS_ERR(page)) {
665 err = PTR_ERR(page);
666 goto fail;
667 }
b97a9b5d
JK
668 f2fs_put_page(page, 1);
669
c1286ff4 670 clear_inode_flag(inode, FI_NEW_INODE);
b97a9b5d
JK
671fail:
672 up_write(&F2FS_I(inode)->i_sem);
c1286ff4 673 f2fs_update_time(F2FS_I_SB(inode), REQ_TIME);
b97a9b5d
JK
674 return err;
675}
676
c1286ff4 677void f2fs_drop_nlink(struct inode *dir, struct inode *inode)
dbeacf02
CY
678{
679 struct f2fs_sb_info *sbi = F2FS_I_SB(dir);
680
681 down_write(&F2FS_I(inode)->i_sem);
682
c1286ff4
JK
683 if (S_ISDIR(inode->i_mode))
684 f2fs_i_links_write(dir, false);
dafac77e 685 inode->i_ctime = current_time(inode);
dbeacf02 686
c1286ff4 687 f2fs_i_links_write(inode, false);
dbeacf02 688 if (S_ISDIR(inode->i_mode)) {
c1286ff4
JK
689 f2fs_i_links_write(inode, false);
690 f2fs_i_size_write(inode, 0);
dbeacf02
CY
691 }
692 up_write(&F2FS_I(inode)->i_sem);
dbeacf02
CY
693
694 if (inode->i_nlink == 0)
c1286ff4 695 add_orphan_inode(inode);
dbeacf02
CY
696 else
697 release_orphan_inode(sbi);
698}
699
0a8165d7 700/*
e1c42045 701 * It only removes the dentry from the dentry page, corresponding name
6b4ea016
JK
702 * entry in name page does not need to be touched during deletion.
703 */
704void f2fs_delete_entry(struct f2fs_dir_entry *dentry, struct page *page,
dbeacf02 705 struct inode *dir, struct inode *inode)
6b4ea016
JK
706{
707 struct f2fs_dentry_block *dentry_blk;
708 unsigned int bit_pos;
457d08ee 709 int slots = GET_DENTRY_SLOTS(le16_to_cpu(dentry->name_len));
13f00235
JK
710 struct address_space *mapping = page_mapping(page);
711 unsigned long flags;
6b4ea016
JK
712 int i;
713
c1286ff4
JK
714 f2fs_update_time(F2FS_I_SB(dir), REQ_TIME);
715
622f28ae
CY
716 if (f2fs_has_inline_dentry(dir))
717 return f2fs_delete_inline_entry(dentry, page, dir, inode);
718
6b4ea016 719 lock_page(page);
c1286ff4 720 f2fs_wait_on_page_writeback(page, DATA, true);
6b4ea016 721
1c3bb978
GZ
722 dentry_blk = page_address(page);
723 bit_pos = dentry - dentry_blk->dentry;
6b4ea016 724 for (i = 0; i < slots; i++)
13f00235 725 __clear_bit_le(bit_pos + i, &dentry_blk->dentry_bitmap);
6b4ea016
JK
726
727 /* Let's check and deallocate this dentry page */
728 bit_pos = find_next_bit_le(&dentry_blk->dentry_bitmap,
729 NR_DENTRY_IN_BLOCK,
730 0);
731 kunmap(page); /* kunmap - pair of f2fs_find_entry */
732 set_page_dirty(page);
733
dafac77e 734 dir->i_ctime = dir->i_mtime = current_time(dir);
0ef31c7b 735 f2fs_mark_inode_dirty_sync(dir, false);
6b4ea016 736
dbeacf02 737 if (inode)
c1286ff4 738 f2fs_drop_nlink(dir, inode);
6b4ea016 739
206e61be
CY
740 if (bit_pos == NR_DENTRY_IN_BLOCK &&
741 !truncate_hole(dir, page->index, page->index + 1)) {
13f00235
JK
742 spin_lock_irqsave(&mapping->tree_lock, flags);
743 radix_tree_tag_clear(&mapping->page_tree, page_index(page),
744 PAGECACHE_TAG_DIRTY);
745 spin_unlock_irqrestore(&mapping->tree_lock, flags);
746
6b4ea016 747 clear_page_dirty_for_io(page);
2bca1e23 748 ClearPagePrivate(page);
6b4ea016 749 ClearPageUptodate(page);
a7ffdbe2 750 inode_dec_dirty_pages(dir);
75bb19d8 751 remove_dirty_inode(dir);
6b4ea016 752 }
508198be 753 f2fs_put_page(page, 1);
6b4ea016
JK
754}
755
756bool f2fs_empty_dir(struct inode *dir)
757{
758 unsigned long bidx;
759 struct page *dentry_page;
760 unsigned int bit_pos;
dbeacf02 761 struct f2fs_dentry_block *dentry_blk;
6b4ea016
JK
762 unsigned long nblock = dir_blocks(dir);
763
622f28ae
CY
764 if (f2fs_has_inline_dentry(dir))
765 return f2fs_empty_inline_dir(dir);
766
6b4ea016 767 for (bidx = 0; bidx < nblock; bidx++) {
a56c7c6f 768 dentry_page = get_lock_data_page(dir, bidx, false);
6b4ea016
JK
769 if (IS_ERR(dentry_page)) {
770 if (PTR_ERR(dentry_page) == -ENOENT)
771 continue;
772 else
773 return false;
774 }
775
1c3bb978 776 dentry_blk = kmap_atomic(dentry_page);
6b4ea016
JK
777 if (bidx == 0)
778 bit_pos = 2;
779 else
780 bit_pos = 0;
781 bit_pos = find_next_bit_le(&dentry_blk->dentry_bitmap,
782 NR_DENTRY_IN_BLOCK,
783 bit_pos);
1c3bb978 784 kunmap_atomic(dentry_blk);
6b4ea016
JK
785
786 f2fs_put_page(dentry_page, 1);
787
788 if (bit_pos < NR_DENTRY_IN_BLOCK)
789 return false;
790 }
791 return true;
792}
793
7d2eab19 794int f2fs_fill_dentries(struct dir_context *ctx, struct f2fs_dentry_ptr *d,
c1286ff4 795 unsigned int start_pos, struct fscrypt_str *fstr)
38594de7
JK
796{
797 unsigned char d_type = DT_UNKNOWN;
798 unsigned int bit_pos;
799 struct f2fs_dir_entry *de = NULL;
c1286ff4 800 struct fscrypt_str de_name = FSTR_INIT(NULL, 0);
38594de7 801
7b3cd7d6 802 bit_pos = ((unsigned long)ctx->pos % d->max);
38594de7 803
7b3cd7d6
JK
804 while (bit_pos < d->max) {
805 bit_pos = find_next_bit_le(d->bitmap, d->max, bit_pos);
806 if (bit_pos >= d->max)
38594de7
JK
807 break;
808
7b3cd7d6 809 de = &d->dentry[bit_pos];
c1286ff4
JK
810 if (de->name_len == 0) {
811 bit_pos++;
812 ctx->pos = start_pos + bit_pos;
813 continue;
814 }
815
816 d_type = get_de_type(de);
d8c6822a 817
d8c6822a
JK
818 de_name.name = d->filename[bit_pos];
819 de_name.len = le16_to_cpu(de->name_len);
820
821 if (f2fs_encrypted_inode(d->inode)) {
822 int save_len = fstr->len;
d4ec990d 823 int err;
d8c6822a 824
d4ec990d 825 err = fscrypt_fname_disk_to_usr(d->inode,
c1286ff4
JK
826 (u32)de->hash_code, 0,
827 &de_name, fstr);
d4ec990d 828 if (err)
7d2eab19 829 return err;
569cf187
JK
830
831 de_name = *fstr;
832 fstr->len = save_len;
d8c6822a
JK
833 }
834
835 if (!dir_emit(ctx, de_name.name, de_name.len,
38594de7 836 le32_to_cpu(de->ino), d_type))
7d2eab19 837 return 1;
38594de7
JK
838
839 bit_pos += GET_DENTRY_SLOTS(le16_to_cpu(de->name_len));
840 ctx->pos = start_pos + bit_pos;
841 }
7d2eab19 842 return 0;
38594de7
JK
843}
844
6f7f231e 845static int f2fs_readdir(struct file *file, struct dir_context *ctx)
6b4ea016 846{
496ad9aa 847 struct inode *inode = file_inode(file);
6b4ea016 848 unsigned long npages = dir_blocks(inode);
6b4ea016 849 struct f2fs_dentry_block *dentry_blk = NULL;
6b4ea016 850 struct page *dentry_page = NULL;
817202d9 851 struct file_ra_state *ra = &file->f_ra;
353c1624 852 loff_t start_pos = ctx->pos;
6f7f231e 853 unsigned int n = ((unsigned long)ctx->pos / NR_DENTRY_IN_BLOCK);
7b3cd7d6 854 struct f2fs_dentry_ptr d;
c1286ff4 855 struct fscrypt_str fstr = FSTR_INIT(NULL, 0);
d8c6822a 856 int err = 0;
6b4ea016 857
d8c6822a 858 if (f2fs_encrypted_inode(inode)) {
c1286ff4
JK
859 err = fscrypt_get_encryption_info(inode);
860 if (err && err != -ENOKEY)
353c1624 861 goto out;
26bf3dc7 862
c1286ff4 863 err = fscrypt_fname_alloc_buffer(inode, F2FS_NAME_LEN, &fstr);
d8c6822a 864 if (err < 0)
353c1624 865 goto out;
d8c6822a
JK
866 }
867
868 if (f2fs_has_inline_dentry(inode)) {
869 err = f2fs_read_inline_dir(file, ctx, &fstr);
353c1624 870 goto out_free;
d8c6822a 871 }
622f28ae 872
353c1624
JK
873 for (; n < npages; n++, ctx->pos = n * NR_DENTRY_IN_BLOCK) {
874
875 /* allow readdir() to be interrupted */
876 if (fatal_signal_pending(current)) {
877 err = -ERESTARTSYS;
878 goto out_free;
879 }
880 cond_resched();
881
882 /* readahead for multi pages of dir */
883 if (npages - n > 1 && !ra_has_index(ra, n))
884 page_cache_sync_readahead(inode->i_mapping, ra, file, n,
817202d9
CY
885 min(npages - n, (pgoff_t)MAX_DIR_RA_PAGES));
886
a56c7c6f 887 dentry_page = get_lock_data_page(inode, n, false);
c1286ff4
JK
888 if (IS_ERR(dentry_page)) {
889 err = PTR_ERR(dentry_page);
7d2eab19
CY
890 if (err == -ENOENT) {
891 err = 0;
c1286ff4 892 continue;
7d2eab19 893 } else {
353c1624 894 goto out_free;
7d2eab19 895 }
c1286ff4 896 }
6b4ea016 897
6b4ea016 898 dentry_blk = kmap(dentry_page);
99b072bb 899
13f00235 900 make_dentry_ptr_block(inode, &d, dentry_blk);
7b3cd7d6 901
7d2eab19
CY
902 err = f2fs_fill_dentries(ctx, &d,
903 n * NR_DENTRY_IN_BLOCK, &fstr);
904 if (err) {
c1286ff4
JK
905 kunmap(dentry_page);
906 f2fs_put_page(dentry_page, 1);
907 break;
908 }
38594de7 909
6b4ea016
JK
910 kunmap(dentry_page);
911 f2fs_put_page(dentry_page, 1);
6b4ea016 912 }
353c1624 913out_free:
c1286ff4 914 fscrypt_fname_free_buffer(&fstr);
353c1624
JK
915out:
916 trace_f2fs_readdir(inode, start_pos, ctx->pos, err);
7d2eab19 917 return err < 0 ? err : 0;
6b4ea016
JK
918}
919
c1286ff4
JK
920static int f2fs_dir_open(struct inode *inode, struct file *filp)
921{
922 if (f2fs_encrypted_inode(inode))
923 return fscrypt_get_encryption_info(inode) ? -EACCES : 0;
924 return 0;
925}
926
6b4ea016
JK
927const struct file_operations f2fs_dir_operations = {
928 .llseek = generic_file_llseek,
929 .read = generic_read_dir,
6f7f231e 930 .iterate = f2fs_readdir,
6b4ea016 931 .fsync = f2fs_sync_file,
c1286ff4 932 .open = f2fs_dir_open,
6b4ea016 933 .unlocked_ioctl = f2fs_ioctl,
08b95126 934#ifdef CONFIG_COMPAT
935 .compat_ioctl = f2fs_compat_ioctl,
936#endif
6b4ea016 937};