2017-03-16 22:18:50 -08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
|
|
|
#include "bcachefs.h"
|
2023-06-21 06:00:04 -04:00
|
|
|
#include "bkey_buf.h"
|
2017-03-16 22:18:50 -08:00
|
|
|
#include "bkey_methods.h"
|
|
|
|
#include "btree_update.h"
|
|
|
|
#include "extents.h"
|
|
|
|
#include "dirent.h"
|
|
|
|
#include "fs.h"
|
|
|
|
#include "keylist.h"
|
|
|
|
#include "str_hash.h"
|
2021-03-16 00:28:17 -04:00
|
|
|
#include "subvolume.h"
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
#include <linux/dcache.h>
|
|
|
|
|
2025-07-15 10:01:00 -04:00
|
|
|
#ifdef CONFIG_UNICODE
|
2025-04-24 12:58:06 -04:00
|
|
|
int bch2_casefold(struct btree_trans *trans, const struct bch_hash_info *info,
|
|
|
|
const struct qstr *str, struct qstr *out_cf)
|
2023-08-13 18:34:17 +01:00
|
|
|
{
|
|
|
|
*out_cf = (struct qstr) QSTR_INIT(NULL, 0);
|
|
|
|
|
2025-06-26 09:46:35 -04:00
|
|
|
if (!bch2_fs_casefold_enabled(trans->c))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2023-08-13 18:34:17 +01:00
|
|
|
unsigned char *buf = bch2_trans_kmalloc(trans, BCH_NAME_MAX + 1);
|
|
|
|
int ret = PTR_ERR_OR_ZERO(buf);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
ret = utf8_casefold(info->cf_encoding, str, buf, BCH_NAME_MAX + 1);
|
|
|
|
if (ret <= 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
*out_cf = (struct qstr) QSTR_INIT(buf, ret);
|
|
|
|
return 0;
|
|
|
|
}
|
2025-07-15 10:01:00 -04:00
|
|
|
#endif
|
2023-08-13 18:34:17 +01:00
|
|
|
|
2023-08-12 22:26:29 +01:00
|
|
|
static unsigned bch2_dirent_name_bytes(struct bkey_s_c_dirent d)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2024-05-22 19:14:08 -04:00
|
|
|
if (bkey_val_bytes(d.k) < offsetof(struct bch_dirent, d_name))
|
|
|
|
return 0;
|
|
|
|
|
2023-08-12 22:26:30 +01:00
|
|
|
unsigned bkey_u64s = bkey_val_u64s(d.k);
|
|
|
|
unsigned bkey_bytes = bkey_u64s * sizeof(u64);
|
|
|
|
u64 last_u64 = ((u64*)d.v)[bkey_u64s - 1];
|
|
|
|
#if CPU_BIG_ENDIAN
|
|
|
|
unsigned trailing_nuls = last_u64 ? __builtin_ctzll(last_u64) / 8 : 64 / 8;
|
|
|
|
#else
|
|
|
|
unsigned trailing_nuls = last_u64 ? __builtin_clzll(last_u64) / 8 : 64 / 8;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return bkey_bytes -
|
2023-08-13 18:34:17 +01:00
|
|
|
(d.v->d_casefold
|
|
|
|
? offsetof(struct bch_dirent, d_cf_name_block.d_names)
|
|
|
|
: offsetof(struct bch_dirent, d_name)) -
|
2023-08-12 22:26:30 +01:00
|
|
|
trailing_nuls;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2023-08-12 22:26:29 +01:00
|
|
|
struct qstr bch2_dirent_get_name(struct bkey_s_c_dirent d)
|
|
|
|
{
|
2023-08-13 18:34:17 +01:00
|
|
|
if (d.v->d_casefold) {
|
|
|
|
unsigned name_len = le16_to_cpu(d.v->d_cf_name_block.d_name_len);
|
|
|
|
return (struct qstr) QSTR_INIT(&d.v->d_cf_name_block.d_names[0], name_len);
|
|
|
|
} else {
|
|
|
|
return (struct qstr) QSTR_INIT(d.v->d_name, bch2_dirent_name_bytes(d));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct qstr bch2_dirent_get_casefold_name(struct bkey_s_c_dirent d)
|
|
|
|
{
|
|
|
|
if (d.v->d_casefold) {
|
|
|
|
unsigned name_len = le16_to_cpu(d.v->d_cf_name_block.d_name_len);
|
|
|
|
unsigned cf_name_len = le16_to_cpu(d.v->d_cf_name_block.d_cf_name_len);
|
|
|
|
return (struct qstr) QSTR_INIT(&d.v->d_cf_name_block.d_names[name_len], cf_name_len);
|
|
|
|
} else {
|
|
|
|
return (struct qstr) QSTR_INIT(NULL, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct qstr bch2_dirent_get_lookup_name(struct bkey_s_c_dirent d)
|
|
|
|
{
|
|
|
|
return d.v->d_casefold
|
|
|
|
? bch2_dirent_get_casefold_name(d)
|
|
|
|
: bch2_dirent_get_name(d);
|
2023-08-12 22:26:29 +01:00
|
|
|
}
|
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
static u64 bch2_dirent_hash(const struct bch_hash_info *info,
|
|
|
|
const struct qstr *name)
|
|
|
|
{
|
|
|
|
struct bch_str_hash_ctx ctx;
|
|
|
|
|
|
|
|
bch2_str_hash_init(&ctx, info);
|
|
|
|
bch2_str_hash_update(&ctx, info, name->name, name->len);
|
|
|
|
|
|
|
|
/* [0,2) reserved for dots */
|
|
|
|
return max_t(u64, bch2_str_hash_end(&ctx, info), 2);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 dirent_hash_key(const struct bch_hash_info *info, const void *key)
|
|
|
|
{
|
|
|
|
return bch2_dirent_hash(info, key);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 dirent_hash_bkey(const struct bch_hash_info *info, struct bkey_s_c k)
|
|
|
|
{
|
|
|
|
struct bkey_s_c_dirent d = bkey_s_c_to_dirent(k);
|
2023-08-13 18:34:17 +01:00
|
|
|
struct qstr name = bch2_dirent_get_lookup_name(d);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
return bch2_dirent_hash(info, &name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool dirent_cmp_key(struct bkey_s_c _l, const void *_r)
|
|
|
|
{
|
|
|
|
struct bkey_s_c_dirent l = bkey_s_c_to_dirent(_l);
|
2023-08-13 18:34:17 +01:00
|
|
|
const struct qstr l_name = bch2_dirent_get_lookup_name(l);
|
2023-08-12 22:26:29 +01:00
|
|
|
const struct qstr *r_name = _r;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2023-12-16 21:16:34 -05:00
|
|
|
return !qstr_eq(l_name, *r_name);
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool dirent_cmp_bkey(struct bkey_s_c _l, struct bkey_s_c _r)
|
|
|
|
{
|
|
|
|
struct bkey_s_c_dirent l = bkey_s_c_to_dirent(_l);
|
|
|
|
struct bkey_s_c_dirent r = bkey_s_c_to_dirent(_r);
|
2023-08-13 18:34:17 +01:00
|
|
|
const struct qstr l_name = bch2_dirent_get_lookup_name(l);
|
|
|
|
const struct qstr r_name = bch2_dirent_get_lookup_name(r);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2023-12-16 21:16:34 -05:00
|
|
|
return !qstr_eq(l_name, r_name);
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2021-10-12 12:06:02 -04:00
|
|
|
static bool dirent_is_visible(subvol_inum inum, struct bkey_s_c k)
|
|
|
|
{
|
|
|
|
struct bkey_s_c_dirent d = bkey_s_c_to_dirent(k);
|
|
|
|
|
|
|
|
if (d.v->d_type == DT_SUBVOL)
|
|
|
|
return le32_to_cpu(d.v->d_parent_subvol) == inum.subvol;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
const struct bch_hash_desc bch2_dirent_hash_desc = {
|
2021-02-20 19:27:37 -05:00
|
|
|
.btree_id = BTREE_ID_dirents,
|
2018-11-01 15:10:01 -04:00
|
|
|
.key_type = KEY_TYPE_dirent,
|
2017-03-16 22:18:50 -08:00
|
|
|
.hash_key = dirent_hash_key,
|
|
|
|
.hash_bkey = dirent_hash_bkey,
|
|
|
|
.cmp_key = dirent_cmp_key,
|
|
|
|
.cmp_bkey = dirent_cmp_bkey,
|
2021-10-12 12:06:02 -04:00
|
|
|
.is_visible = dirent_is_visible,
|
2017-03-16 22:18:50 -08:00
|
|
|
};
|
|
|
|
|
2024-08-12 21:31:25 -04:00
|
|
|
int bch2_dirent_validate(struct bch_fs *c, struct bkey_s_c k,
|
2024-11-27 00:29:52 -05:00
|
|
|
struct bkey_validate_context from)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2018-11-01 15:10:01 -04:00
|
|
|
struct bkey_s_c_dirent d = bkey_s_c_to_dirent(k);
|
2023-08-13 18:34:17 +01:00
|
|
|
unsigned name_block_len = bch2_dirent_name_bytes(d);
|
2023-08-12 22:26:29 +01:00
|
|
|
struct qstr d_name = bch2_dirent_get_name(d);
|
2023-08-13 18:34:17 +01:00
|
|
|
struct qstr d_cf_name = bch2_dirent_get_casefold_name(d);
|
2023-10-24 20:44:36 -04:00
|
|
|
int ret = 0;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2024-08-12 21:31:25 -04:00
|
|
|
bkey_fsck_err_on(!d_name.len,
|
|
|
|
c, dirent_empty_name,
|
2023-10-24 20:44:36 -04:00
|
|
|
"empty name");
|
2022-04-03 17:50:01 -04:00
|
|
|
|
2023-08-13 18:34:17 +01:00
|
|
|
bkey_fsck_err_on(d_name.len + d_cf_name.len > name_block_len,
|
2024-08-12 21:31:25 -04:00
|
|
|
c, dirent_val_too_big,
|
2023-08-13 18:34:17 +01:00
|
|
|
"dirent names exceed bkey size (%d + %d > %d)",
|
|
|
|
d_name.len, d_cf_name.len, name_block_len);
|
2022-04-03 17:50:01 -04:00
|
|
|
|
2023-08-13 16:53:45 +01:00
|
|
|
/*
|
|
|
|
* Check new keys don't exceed the max length
|
|
|
|
* (older keys may be larger.)
|
|
|
|
*/
|
2024-11-27 00:29:52 -05:00
|
|
|
bkey_fsck_err_on((from.flags & BCH_VALIDATE_commit) && d_name.len > BCH_NAME_MAX,
|
2024-08-12 21:31:25 -04:00
|
|
|
c, dirent_name_too_long,
|
2023-10-24 20:44:36 -04:00
|
|
|
"dirent name too big (%u > %u)",
|
|
|
|
d_name.len, BCH_NAME_MAX);
|
|
|
|
|
2024-08-12 21:31:25 -04:00
|
|
|
bkey_fsck_err_on(d_name.len != strnlen(d_name.name, d_name.len),
|
|
|
|
c, dirent_name_embedded_nul,
|
2023-10-24 20:44:36 -04:00
|
|
|
"dirent has stray data after name's NUL");
|
|
|
|
|
|
|
|
bkey_fsck_err_on((d_name.len == 1 && !memcmp(d_name.name, ".", 1)) ||
|
2024-08-12 21:31:25 -04:00
|
|
|
(d_name.len == 2 && !memcmp(d_name.name, "..", 2)),
|
|
|
|
c, dirent_name_dot_or_dotdot,
|
2023-10-24 20:44:36 -04:00
|
|
|
"invalid name");
|
|
|
|
|
2024-08-12 21:31:25 -04:00
|
|
|
bkey_fsck_err_on(memchr(d_name.name, '/', d_name.len),
|
|
|
|
c, dirent_name_has_slash,
|
2023-10-24 20:44:36 -04:00
|
|
|
"name with /");
|
|
|
|
|
|
|
|
bkey_fsck_err_on(d.v->d_type != DT_SUBVOL &&
|
2024-08-12 21:31:25 -04:00
|
|
|
le64_to_cpu(d.v->d_inum) == d.k->p.inode,
|
|
|
|
c, dirent_to_itself,
|
2023-10-24 20:44:36 -04:00
|
|
|
"dirent points to own directory");
|
2023-08-13 18:34:17 +01:00
|
|
|
|
|
|
|
if (d.v->d_casefold) {
|
|
|
|
bkey_fsck_err_on(from.from == BKEY_VALIDATE_commit &&
|
|
|
|
d_cf_name.len > BCH_NAME_MAX,
|
|
|
|
c, dirent_cf_name_too_big,
|
|
|
|
"dirent w/ cf name too big (%u > %u)",
|
|
|
|
d_cf_name.len, BCH_NAME_MAX);
|
|
|
|
|
|
|
|
bkey_fsck_err_on(d_cf_name.len != strnlen(d_cf_name.name, d_cf_name.len),
|
|
|
|
c, dirent_stray_data_after_cf_name,
|
|
|
|
"dirent has stray data after cf name's NUL");
|
|
|
|
}
|
2023-10-24 20:44:36 -04:00
|
|
|
fsck_err:
|
|
|
|
return ret;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2024-01-21 17:46:14 -05:00
|
|
|
void bch2_dirent_to_text(struct printbuf *out, struct bch_fs *c, struct bkey_s_c k)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2018-11-01 15:10:01 -04:00
|
|
|
struct bkey_s_c_dirent d = bkey_s_c_to_dirent(k);
|
2023-08-12 22:26:29 +01:00
|
|
|
struct qstr d_name = bch2_dirent_get_name(d);
|
2018-11-01 15:10:01 -04:00
|
|
|
|
2025-04-24 17:55:20 -04:00
|
|
|
prt_printf(out, "%.*s", d_name.len, d_name.name);
|
|
|
|
|
|
|
|
if (d.v->d_casefold) {
|
|
|
|
struct qstr d_name = bch2_dirent_get_lookup_name(d);
|
|
|
|
prt_printf(out, " (casefold %.*s)", d_name.len, d_name.name);
|
|
|
|
}
|
|
|
|
|
|
|
|
prt_str(out, " ->");
|
2024-01-21 17:46:14 -05:00
|
|
|
|
|
|
|
if (d.v->d_type != DT_SUBVOL)
|
2025-04-24 17:55:20 -04:00
|
|
|
prt_printf(out, " %llu", le64_to_cpu(d.v->d_inum));
|
2024-01-21 17:46:14 -05:00
|
|
|
else
|
2025-04-24 17:55:20 -04:00
|
|
|
prt_printf(out, " %u -> %u",
|
2024-01-21 17:46:14 -05:00
|
|
|
le32_to_cpu(d.v->d_parent_subvol),
|
|
|
|
le32_to_cpu(d.v->d_child_subvol));
|
|
|
|
|
|
|
|
prt_printf(out, " type %s", bch2_d_type_str(d.v->d_type));
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2025-06-26 09:46:35 -04:00
|
|
|
int bch2_dirent_init_name(struct bch_fs *c,
|
|
|
|
struct bkey_i_dirent *dirent,
|
2025-06-01 18:35:18 -04:00
|
|
|
const struct bch_hash_info *hash_info,
|
|
|
|
const struct qstr *name,
|
|
|
|
const struct qstr *cf_name)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2025-06-01 18:35:18 -04:00
|
|
|
EBUG_ON(hash_info->cf_encoding == NULL && cf_name);
|
|
|
|
int cf_len = 0;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
if (name->len > BCH_NAME_MAX)
|
|
|
|
return -ENAMETOOLONG;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
dirent->v.d_casefold = hash_info->cf_encoding != NULL;
|
2021-10-12 12:06:02 -04:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
if (!dirent->v.d_casefold) {
|
|
|
|
memcpy(&dirent->v.d_name[0], name->name, name->len);
|
|
|
|
memset(&dirent->v.d_name[name->len], 0,
|
|
|
|
bkey_val_bytes(&dirent->k) -
|
|
|
|
offsetof(struct bch_dirent, d_name) -
|
|
|
|
name->len);
|
2021-10-12 12:06:02 -04:00
|
|
|
} else {
|
2025-06-26 09:46:35 -04:00
|
|
|
if (!bch2_fs_casefold_enabled(c))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2025-07-15 10:01:00 -04:00
|
|
|
#ifdef CONFIG_UNICODE
|
2025-06-01 18:35:18 -04:00
|
|
|
memcpy(&dirent->v.d_cf_name_block.d_names[0], name->name, name->len);
|
2021-10-12 12:06:02 -04:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
char *cf_out = &dirent->v.d_cf_name_block.d_names[name->len];
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
if (cf_name) {
|
|
|
|
cf_len = cf_name->len;
|
2023-08-13 17:49:12 +01:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
memcpy(cf_out, cf_name->name, cf_name->len);
|
|
|
|
} else {
|
|
|
|
cf_len = utf8_casefold(hash_info->cf_encoding, name,
|
|
|
|
cf_out,
|
|
|
|
bkey_val_end(bkey_i_to_s(&dirent->k_i)) - (void *) cf_out);
|
|
|
|
if (cf_len <= 0)
|
|
|
|
return cf_len;
|
|
|
|
}
|
2023-08-13 18:34:17 +01:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
memset(&dirent->v.d_cf_name_block.d_names[name->len + cf_len], 0,
|
|
|
|
bkey_val_bytes(&dirent->k) -
|
|
|
|
offsetof(struct bch_dirent, d_cf_name_block.d_names) -
|
|
|
|
name->len + cf_len);
|
2023-08-13 17:49:12 +01:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
dirent->v.d_cf_name_block.d_name_len = cpu_to_le16(name->len);
|
|
|
|
dirent->v.d_cf_name_block.d_cf_name_len = cpu_to_le16(cf_len);
|
|
|
|
|
|
|
|
EBUG_ON(bch2_dirent_get_casefold_name(dirent_i_to_s_c(dirent)).len != cf_len);
|
2025-07-15 10:01:00 -04:00
|
|
|
#endif
|
2025-06-01 18:35:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
unsigned u64s = dirent_val_u64s(name->len, cf_len);
|
|
|
|
BUG_ON(u64s > bkey_val_u64s(&dirent->k));
|
|
|
|
set_bkey_val_u64s(&dirent->k, u64s);
|
|
|
|
return 0;
|
2023-08-13 18:34:17 +01:00
|
|
|
}
|
|
|
|
|
2025-05-31 00:11:52 -04:00
|
|
|
struct bkey_i_dirent *bch2_dirent_create_key(struct btree_trans *trans,
|
2025-05-21 00:41:07 -04:00
|
|
|
const struct bch_hash_info *hash_info,
|
2023-08-13 17:49:12 +01:00
|
|
|
subvol_inum dir,
|
|
|
|
u8 type,
|
|
|
|
const struct qstr *name,
|
2023-08-13 18:34:17 +01:00
|
|
|
const struct qstr *cf_name,
|
2023-08-13 17:49:12 +01:00
|
|
|
u64 dst)
|
|
|
|
{
|
2025-06-01 18:35:18 -04:00
|
|
|
struct bkey_i_dirent *dirent = bch2_trans_kmalloc(trans, BKEY_U64s_MAX * sizeof(u64));
|
|
|
|
if (IS_ERR(dirent))
|
|
|
|
return dirent;
|
2023-08-13 17:49:12 +01:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
bkey_dirent_init(&dirent->k_i);
|
|
|
|
dirent->k.u64s = BKEY_U64s_MAX;
|
2025-05-21 00:41:07 -04:00
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
if (type != DT_SUBVOL) {
|
|
|
|
dirent->v.d_inum = cpu_to_le64(dst);
|
|
|
|
} else {
|
|
|
|
dirent->v.d_parent_subvol = cpu_to_le32(dir.subvol);
|
|
|
|
dirent->v.d_child_subvol = cpu_to_le32(dst);
|
2025-05-21 00:41:07 -04:00
|
|
|
}
|
|
|
|
|
2025-06-01 18:35:18 -04:00
|
|
|
dirent->v.d_type = type;
|
|
|
|
dirent->v.d_unused = 0;
|
2023-08-13 17:49:12 +01:00
|
|
|
|
2025-06-26 09:46:35 -04:00
|
|
|
int ret = bch2_dirent_init_name(trans->c, dirent, hash_info, name, cf_name);
|
2025-06-01 18:35:18 -04:00
|
|
|
if (ret)
|
|
|
|
return ERR_PTR(ret);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2023-08-13 18:34:17 +01:00
|
|
|
EBUG_ON(bch2_dirent_get_name(dirent_i_to_s_c(dirent)).len != name->len);
|
2017-03-16 22:18:50 -08:00
|
|
|
return dirent;
|
|
|
|
}
|
|
|
|
|
2023-12-15 14:13:48 -05:00
|
|
|
int bch2_dirent_create_snapshot(struct btree_trans *trans,
|
2024-02-09 16:04:50 -05:00
|
|
|
u32 dir_subvol, u64 dir, u32 snapshot,
|
2023-12-15 14:13:48 -05:00
|
|
|
const struct bch_hash_info *hash_info,
|
|
|
|
u8 type, const struct qstr *name, u64 dst_inum,
|
|
|
|
u64 *dir_offset,
|
2024-04-07 18:05:34 -04:00
|
|
|
enum btree_iter_update_trigger_flags flags)
|
2023-12-15 14:13:48 -05:00
|
|
|
{
|
2024-02-09 16:04:50 -05:00
|
|
|
subvol_inum dir_inum = { .subvol = dir_subvol, .inum = dir };
|
2023-12-15 14:13:48 -05:00
|
|
|
struct bkey_i_dirent *dirent;
|
|
|
|
int ret;
|
|
|
|
|
2025-05-31 00:11:52 -04:00
|
|
|
dirent = bch2_dirent_create_key(trans, hash_info, dir_inum, type, name, NULL, dst_inum);
|
2023-12-15 14:13:48 -05:00
|
|
|
ret = PTR_ERR_OR_ZERO(dirent);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
dirent->k.p.inode = dir;
|
|
|
|
dirent->k.p.snapshot = snapshot;
|
|
|
|
|
2024-01-25 19:57:26 -05:00
|
|
|
ret = bch2_hash_set_in_snapshot(trans, bch2_dirent_hash_desc, hash_info,
|
2025-05-21 00:41:07 -04:00
|
|
|
dir_inum, snapshot, &dirent->k_i, flags);
|
2023-12-15 14:13:48 -05:00
|
|
|
*dir_offset = dirent->k.p.offset;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-03-16 00:28:17 -04:00
|
|
|
int bch2_dirent_create(struct btree_trans *trans, subvol_inum dir,
|
|
|
|
const struct bch_hash_info *hash_info,
|
2019-10-02 18:35:36 -04:00
|
|
|
u8 type, const struct qstr *name, u64 dst_inum,
|
2023-11-11 16:31:50 -05:00
|
|
|
u64 *dir_offset,
|
2024-04-07 18:05:34 -04:00
|
|
|
enum btree_iter_update_trigger_flags flags)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
|
|
|
struct bkey_i_dirent *dirent;
|
|
|
|
int ret;
|
|
|
|
|
2025-05-31 00:11:52 -04:00
|
|
|
dirent = bch2_dirent_create_key(trans, hash_info, dir, type, name, NULL, dst_inum);
|
2017-03-16 22:18:50 -08:00
|
|
|
ret = PTR_ERR_OR_ZERO(dirent);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2021-03-02 18:35:30 -05:00
|
|
|
ret = bch2_hash_set(trans, bch2_dirent_hash_desc, hash_info,
|
2024-04-07 18:05:34 -04:00
|
|
|
dir, &dirent->k_i, flags);
|
2021-03-02 18:35:30 -05:00
|
|
|
*dir_offset = dirent->k.p.offset;
|
|
|
|
|
|
|
|
return ret;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2021-11-13 19:49:14 -05:00
|
|
|
int bch2_dirent_read_target(struct btree_trans *trans, subvol_inum dir,
|
|
|
|
struct bkey_s_c_dirent d, subvol_inum *target)
|
2021-03-16 00:46:26 -04:00
|
|
|
{
|
2021-10-14 13:14:40 -04:00
|
|
|
struct bch_subvolume s;
|
2021-03-16 00:46:26 -04:00
|
|
|
int ret = 0;
|
|
|
|
|
2021-10-12 12:06:02 -04:00
|
|
|
if (d.v->d_type == DT_SUBVOL &&
|
2023-07-06 22:47:42 -04:00
|
|
|
le32_to_cpu(d.v->d_parent_subvol) != dir.subvol)
|
2021-10-12 12:06:02 -04:00
|
|
|
return 1;
|
2021-03-16 00:46:26 -04:00
|
|
|
|
|
|
|
if (likely(d.v->d_type != DT_SUBVOL)) {
|
2021-10-12 12:06:02 -04:00
|
|
|
target->subvol = dir.subvol;
|
|
|
|
target->inum = le64_to_cpu(d.v->d_inum);
|
2021-03-16 00:46:26 -04:00
|
|
|
} else {
|
2021-10-12 12:06:02 -04:00
|
|
|
target->subvol = le32_to_cpu(d.v->d_child_subvol);
|
2021-09-30 19:46:23 -04:00
|
|
|
|
2024-12-04 23:40:26 -05:00
|
|
|
ret = bch2_subvolume_get(trans, target->subvol, true, &s);
|
2021-09-30 19:46:23 -04:00
|
|
|
|
2021-10-12 12:06:02 -04:00
|
|
|
target->inum = le64_to_cpu(s.inode);
|
2021-03-16 00:46:26 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
int bch2_dirent_rename(struct btree_trans *trans,
|
2025-05-31 18:32:37 -04:00
|
|
|
subvol_inum src_dir, struct bch_hash_info *src_hash,
|
|
|
|
subvol_inum dst_dir, struct bch_hash_info *dst_hash,
|
2021-03-16 00:28:17 -04:00
|
|
|
const struct qstr *src_name, subvol_inum *src_inum, u64 *src_offset,
|
|
|
|
const struct qstr *dst_name, subvol_inum *dst_inum, u64 *dst_offset,
|
|
|
|
enum bch_rename_mode mode)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2023-08-13 18:34:17 +01:00
|
|
|
struct qstr src_name_lookup, dst_name_lookup;
|
2025-03-21 15:18:51 -04:00
|
|
|
struct btree_iter src_iter = {};
|
|
|
|
struct btree_iter dst_iter = {};
|
2021-12-14 16:05:47 -05:00
|
|
|
struct bkey_s_c old_src, old_dst = bkey_s_c_null;
|
2017-03-16 22:18:50 -08:00
|
|
|
struct bkey_i_dirent *new_src = NULL, *new_dst = NULL;
|
2019-10-02 18:35:36 -04:00
|
|
|
struct bpos dst_pos =
|
2021-03-16 00:28:17 -04:00
|
|
|
POS(dst_dir.inum, bch2_dirent_hash(dst_hash, dst_name));
|
2024-01-21 16:46:45 -05:00
|
|
|
unsigned src_update_flags = 0;
|
|
|
|
bool delete_src, delete_dst;
|
2020-02-26 15:39:46 -05:00
|
|
|
int ret = 0;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2021-03-16 00:28:17 -04:00
|
|
|
memset(src_inum, 0, sizeof(*src_inum));
|
|
|
|
memset(dst_inum, 0, sizeof(*dst_inum));
|
2019-10-02 18:35:36 -04:00
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
/* Lookup src: */
|
2023-08-13 18:34:17 +01:00
|
|
|
ret = bch2_maybe_casefold(trans, src_hash, src_name, &src_name_lookup);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2024-04-07 16:16:49 -04:00
|
|
|
old_src = bch2_hash_lookup(trans, &src_iter, bch2_dirent_hash_desc,
|
2023-08-13 18:34:17 +01:00
|
|
|
src_hash, src_dir, &src_name_lookup,
|
2024-04-07 18:05:34 -04:00
|
|
|
BTREE_ITER_intent);
|
2021-07-24 19:50:40 -04:00
|
|
|
ret = bkey_err(old_src);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
2021-03-16 00:28:17 -04:00
|
|
|
ret = bch2_dirent_read_target(trans, src_dir,
|
|
|
|
bkey_s_c_to_dirent(old_src), src_inum);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2021-10-12 12:06:02 -04:00
|
|
|
/* Lookup dst: */
|
2023-08-13 18:34:17 +01:00
|
|
|
ret = bch2_maybe_casefold(trans, dst_hash, dst_name, &dst_name_lookup);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2021-10-12 12:06:02 -04:00
|
|
|
if (mode == BCH_RENAME) {
|
|
|
|
/*
|
|
|
|
* Note that we're _not_ checking if the target already exists -
|
|
|
|
* we're relying on the VFS to do that check for us for
|
|
|
|
* correctness:
|
|
|
|
*/
|
|
|
|
ret = bch2_hash_hole(trans, &dst_iter, bch2_dirent_hash_desc,
|
2023-08-13 18:34:17 +01:00
|
|
|
dst_hash, dst_dir, &dst_name_lookup);
|
2021-10-12 12:06:02 -04:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
} else {
|
2024-04-07 16:16:49 -04:00
|
|
|
old_dst = bch2_hash_lookup(trans, &dst_iter, bch2_dirent_hash_desc,
|
2023-08-13 18:34:17 +01:00
|
|
|
dst_hash, dst_dir, &dst_name_lookup,
|
2024-04-07 18:05:34 -04:00
|
|
|
BTREE_ITER_intent);
|
2021-10-12 12:06:02 -04:00
|
|
|
ret = bkey_err(old_dst);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = bch2_dirent_read_target(trans, dst_dir,
|
|
|
|
bkey_s_c_to_dirent(old_dst), dst_inum);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mode != BCH_RENAME_EXCHANGE)
|
|
|
|
*src_offset = dst_iter.pos.offset;
|
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
/* Create new dst key: */
|
2025-05-31 00:11:52 -04:00
|
|
|
new_dst = bch2_dirent_create_key(trans, dst_hash, dst_dir, 0, dst_name,
|
|
|
|
dst_hash->cf_encoding ? &dst_name_lookup : NULL, 0);
|
2020-02-26 15:39:46 -05:00
|
|
|
ret = PTR_ERR_OR_ZERO(new_dst);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
dirent_copy_target(new_dst, bkey_s_c_to_dirent(old_src));
|
2021-08-30 15:18:31 -04:00
|
|
|
new_dst->k.p = dst_iter.pos;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
/* Create new src key: */
|
|
|
|
if (mode == BCH_RENAME_EXCHANGE) {
|
2025-05-31 00:11:52 -04:00
|
|
|
new_src = bch2_dirent_create_key(trans, src_hash, src_dir, 0, src_name,
|
|
|
|
src_hash->cf_encoding ? &src_name_lookup : NULL, 0);
|
2020-02-26 15:39:46 -05:00
|
|
|
ret = PTR_ERR_OR_ZERO(new_src);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
dirent_copy_target(new_src, bkey_s_c_to_dirent(old_dst));
|
2021-08-30 15:18:31 -04:00
|
|
|
new_src->k.p = src_iter.pos;
|
2017-03-16 22:18:50 -08:00
|
|
|
} else {
|
|
|
|
new_src = bch2_trans_kmalloc(trans, sizeof(struct bkey_i));
|
2020-02-26 15:39:46 -05:00
|
|
|
ret = PTR_ERR_OR_ZERO(new_src);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
2017-03-16 22:18:50 -08:00
|
|
|
bkey_init(&new_src->k);
|
2021-08-30 15:18:31 -04:00
|
|
|
new_src->k.p = src_iter.pos;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2022-11-24 03:12:22 -05:00
|
|
|
if (bkey_le(dst_pos, src_iter.pos) &&
|
|
|
|
bkey_lt(src_iter.pos, dst_iter.pos)) {
|
2017-03-16 22:18:50 -08:00
|
|
|
/*
|
|
|
|
* We have a hash collision for the new dst key,
|
|
|
|
* and new_src - the key we're deleting - is between
|
|
|
|
* new_dst's hashed slot and the slot we're going to be
|
|
|
|
* inserting it into - oops. This will break the hash
|
|
|
|
* table if we don't deal with it:
|
|
|
|
*/
|
|
|
|
if (mode == BCH_RENAME) {
|
|
|
|
/*
|
|
|
|
* If we're not overwriting, we can just insert
|
|
|
|
* new_dst at the src position:
|
|
|
|
*/
|
2021-10-12 12:06:02 -04:00
|
|
|
new_src = new_dst;
|
|
|
|
new_src->k.p = src_iter.pos;
|
|
|
|
goto out_set_src;
|
2017-03-16 22:18:50 -08:00
|
|
|
} else {
|
|
|
|
/* If we're overwriting, we can't insert new_dst
|
|
|
|
* at a different slot because it has to
|
|
|
|
* overwrite old_dst - just make sure to use a
|
|
|
|
* whiteout when deleting src:
|
|
|
|
*/
|
2021-02-20 19:09:53 -05:00
|
|
|
new_src->k.type = KEY_TYPE_hash_whiteout;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Check if we need a whiteout to delete src: */
|
|
|
|
ret = bch2_hash_needs_whiteout(trans, bch2_dirent_hash_desc,
|
2021-08-30 15:18:31 -04:00
|
|
|
src_hash, &src_iter);
|
2017-03-16 22:18:50 -08:00
|
|
|
if (ret < 0)
|
2020-02-26 15:39:46 -05:00
|
|
|
goto out;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
if (ret)
|
2021-02-20 19:09:53 -05:00
|
|
|
new_src->k.type = KEY_TYPE_hash_whiteout;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-21 16:46:45 -05:00
|
|
|
if (new_dst->v.d_type == DT_SUBVOL)
|
|
|
|
new_dst->v.d_parent_subvol = cpu_to_le32(dst_dir.subvol);
|
|
|
|
|
|
|
|
if ((mode == BCH_RENAME_EXCHANGE) &&
|
|
|
|
new_src->v.d_type == DT_SUBVOL)
|
|
|
|
new_src->v.d_parent_subvol = cpu_to_le32(src_dir.subvol);
|
|
|
|
|
2021-12-05 00:30:49 -05:00
|
|
|
ret = bch2_trans_update(trans, &dst_iter, &new_dst->k_i, 0);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
2021-10-12 12:06:02 -04:00
|
|
|
out_set_src:
|
|
|
|
/*
|
2024-01-21 16:46:45 -05:00
|
|
|
* If we're deleting a subvolume we need to really delete the dirent,
|
|
|
|
* not just emit a whiteout in the current snapshot - there can only be
|
|
|
|
* single dirent that points to a given subvolume.
|
|
|
|
*
|
|
|
|
* IOW, we don't maintain multiple versions in different snapshots of
|
|
|
|
* dirents that point to subvolumes - dirents that point to subvolumes
|
|
|
|
* are only visible in one particular subvolume so it's not necessary,
|
|
|
|
* and it would be particularly confusing for fsck to have to deal with.
|
2021-10-12 12:06:02 -04:00
|
|
|
*/
|
2024-01-21 16:46:45 -05:00
|
|
|
delete_src = bkey_s_c_to_dirent(old_src).v->d_type == DT_SUBVOL &&
|
|
|
|
new_src->k.p.snapshot != old_src.k->p.snapshot;
|
|
|
|
|
|
|
|
delete_dst = old_dst.k &&
|
|
|
|
bkey_s_c_to_dirent(old_dst).v->d_type == DT_SUBVOL &&
|
|
|
|
new_dst->k.p.snapshot != old_dst.k->p.snapshot;
|
|
|
|
|
|
|
|
if (!delete_src || !bkey_deleted(&new_src->k)) {
|
|
|
|
ret = bch2_trans_update(trans, &src_iter, &new_src->k_i, src_update_flags);
|
2021-10-12 12:06:02 -04:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2024-01-21 16:46:45 -05:00
|
|
|
}
|
2021-10-12 12:06:02 -04:00
|
|
|
|
2024-01-21 16:46:45 -05:00
|
|
|
if (delete_src) {
|
2025-03-21 15:18:51 -04:00
|
|
|
bch2_btree_iter_set_snapshot(trans, &src_iter, old_src.k->p.snapshot);
|
|
|
|
ret = bch2_btree_iter_traverse(trans, &src_iter) ?:
|
2024-04-07 18:05:34 -04:00
|
|
|
bch2_btree_delete_at(trans, &src_iter, BTREE_UPDATE_internal_snapshot_node);
|
2024-01-21 16:46:45 -05:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
2021-10-12 12:06:02 -04:00
|
|
|
}
|
|
|
|
|
2024-01-21 16:46:45 -05:00
|
|
|
if (delete_dst) {
|
2025-03-21 15:18:51 -04:00
|
|
|
bch2_btree_iter_set_snapshot(trans, &dst_iter, old_dst.k->p.snapshot);
|
|
|
|
ret = bch2_btree_iter_traverse(trans, &dst_iter) ?:
|
2024-04-07 18:05:34 -04:00
|
|
|
bch2_btree_delete_at(trans, &dst_iter, BTREE_UPDATE_internal_snapshot_node);
|
2024-01-21 16:46:45 -05:00
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
}
|
2021-10-12 12:06:02 -04:00
|
|
|
|
2021-05-20 00:09:47 -04:00
|
|
|
if (mode == BCH_RENAME_EXCHANGE)
|
|
|
|
*src_offset = new_src->k.p.offset;
|
2021-03-02 18:35:30 -05:00
|
|
|
*dst_offset = new_dst->k.p.offset;
|
2020-02-26 15:39:46 -05:00
|
|
|
out:
|
2021-08-30 15:18:31 -04:00
|
|
|
bch2_trans_iter_exit(trans, &src_iter);
|
|
|
|
bch2_trans_iter_exit(trans, &dst_iter);
|
2020-02-26 15:39:46 -05:00
|
|
|
return ret;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2024-01-25 12:35:06 -05:00
|
|
|
int bch2_dirent_lookup_trans(struct btree_trans *trans,
|
|
|
|
struct btree_iter *iter,
|
|
|
|
subvol_inum dir,
|
|
|
|
const struct bch_hash_info *hash_info,
|
|
|
|
const struct qstr *name, subvol_inum *inum,
|
|
|
|
unsigned flags)
|
2019-10-02 18:35:36 -04:00
|
|
|
{
|
2023-08-13 18:34:17 +01:00
|
|
|
struct qstr lookup_name;
|
|
|
|
int ret = bch2_maybe_casefold(trans, hash_info, name, &lookup_name);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2024-04-07 16:16:49 -04:00
|
|
|
struct bkey_s_c k = bch2_hash_lookup(trans, iter, bch2_dirent_hash_desc,
|
2023-08-13 18:34:17 +01:00
|
|
|
hash_info, dir, &lookup_name, flags);
|
|
|
|
ret = bkey_err(k);
|
2021-11-13 12:57:00 -05:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
2021-03-16 00:46:26 -04:00
|
|
|
|
2024-01-25 12:35:06 -05:00
|
|
|
ret = bch2_dirent_read_target(trans, dir, bkey_s_c_to_dirent(k), inum);
|
2021-10-12 12:06:02 -04:00
|
|
|
if (ret > 0)
|
|
|
|
ret = -ENOENT;
|
2021-11-13 12:57:00 -05:00
|
|
|
err:
|
2021-03-16 00:46:26 -04:00
|
|
|
if (ret)
|
|
|
|
bch2_trans_iter_exit(trans, iter);
|
|
|
|
return ret;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2021-03-16 00:28:17 -04:00
|
|
|
u64 bch2_dirent_lookup(struct bch_fs *c, subvol_inum dir,
|
2017-03-16 22:18:50 -08:00
|
|
|
const struct bch_hash_info *hash_info,
|
2021-03-16 00:28:17 -04:00
|
|
|
const struct qstr *name, subvol_inum *inum)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2023-09-12 17:16:02 -04:00
|
|
|
struct btree_trans *trans = bch2_trans_get(c);
|
2025-03-21 15:18:51 -04:00
|
|
|
struct btree_iter iter = {};
|
2023-12-17 03:05:30 -05:00
|
|
|
|
|
|
|
int ret = lockrestart_do(trans,
|
2024-01-25 12:35:06 -05:00
|
|
|
bch2_dirent_lookup_trans(trans, &iter, dir, hash_info, name, inum, 0));
|
2023-12-17 03:05:30 -05:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2023-09-12 17:16:02 -04:00
|
|
|
bch2_trans_put(trans);
|
2021-03-16 00:28:17 -04:00
|
|
|
return ret;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
|
|
|
|
2024-02-13 16:20:04 +08:00
|
|
|
int bch2_empty_dir_snapshot(struct btree_trans *trans, u64 dir, u32 subvol, u32 snapshot)
|
2017-03-16 22:18:50 -08:00
|
|
|
{
|
2021-08-30 15:18:31 -04:00
|
|
|
struct btree_iter iter;
|
2017-03-16 22:18:50 -08:00
|
|
|
struct bkey_s_c k;
|
2019-04-17 15:49:28 -04:00
|
|
|
int ret;
|
2019-03-25 15:10:15 -04:00
|
|
|
|
2024-10-24 18:39:59 -04:00
|
|
|
for_each_btree_key_max_norestart(trans, iter, BTREE_ID_dirents,
|
2023-12-07 12:39:13 -05:00
|
|
|
SPOS(dir, 0, snapshot),
|
|
|
|
POS(dir, U64_MAX), 0, k, ret)
|
2018-11-01 15:10:01 -04:00
|
|
|
if (k.k->type == KEY_TYPE_dirent) {
|
2024-02-13 16:20:04 +08:00
|
|
|
struct bkey_s_c_dirent d = bkey_s_c_to_dirent(k);
|
|
|
|
if (d.v->d_type == DT_SUBVOL && le32_to_cpu(d.v->d_parent_subvol) != subvol)
|
|
|
|
continue;
|
2025-05-28 11:57:50 -04:00
|
|
|
ret = bch_err_throw(trans->c, ENOTEMPTY_dir_not_empty);
|
2017-03-16 22:18:50 -08:00
|
|
|
break;
|
|
|
|
}
|
2021-08-30 15:18:31 -04:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-12-07 12:39:13 -05:00
|
|
|
int bch2_empty_dir_trans(struct btree_trans *trans, subvol_inum dir)
|
|
|
|
{
|
|
|
|
u32 snapshot;
|
|
|
|
|
|
|
|
return bch2_subvolume_get_snapshot(trans, dir.subvol, &snapshot) ?:
|
2024-02-13 16:20:04 +08:00
|
|
|
bch2_empty_dir_snapshot(trans, dir.inum, dir.subvol, snapshot);
|
2023-12-07 12:39:13 -05:00
|
|
|
}
|
|
|
|
|
2024-04-10 13:18:22 -04:00
|
|
|
static int bch2_dir_emit(struct dir_context *ctx, struct bkey_s_c_dirent d, subvol_inum target)
|
|
|
|
{
|
|
|
|
struct qstr name = bch2_dirent_get_name(d);
|
2024-05-31 00:13:58 +03:00
|
|
|
/*
|
|
|
|
* Although not required by the kernel code, updating ctx->pos is needed
|
|
|
|
* for the bcachefs FUSE driver. Without this update, the FUSE
|
|
|
|
* implementation will be stuck in an infinite loop when reading
|
|
|
|
* directories (via the bcachefs_fuse_readdir callback).
|
|
|
|
* In kernel space, ctx->pos is updated by the VFS code.
|
|
|
|
*/
|
|
|
|
ctx->pos = d.k->p.offset;
|
2024-04-10 13:18:22 -04:00
|
|
|
bool ret = dir_emit(ctx, name.name,
|
|
|
|
name.len,
|
|
|
|
target.inum,
|
|
|
|
vfs_d_type(d.v->d_type));
|
|
|
|
if (ret)
|
|
|
|
ctx->pos = d.k->p.offset + 1;
|
2025-04-29 14:30:01 -04:00
|
|
|
return !ret;
|
2024-04-10 13:18:22 -04:00
|
|
|
}
|
|
|
|
|
2025-05-28 16:34:42 -04:00
|
|
|
int bch2_readdir(struct bch_fs *c, subvol_inum inum,
|
|
|
|
struct bch_hash_info *hash_info,
|
|
|
|
struct dir_context *ctx)
|
2019-03-31 17:37:30 -04:00
|
|
|
{
|
2023-06-21 06:00:04 -04:00
|
|
|
struct bkey_buf sk;
|
|
|
|
bch2_bkey_buf_init(&sk);
|
2021-03-16 00:28:17 -04:00
|
|
|
|
2024-07-17 13:24:28 -04:00
|
|
|
int ret = bch2_trans_run(c,
|
2024-10-24 18:39:59 -04:00
|
|
|
for_each_btree_key_in_subvolume_max(trans, iter, BTREE_ID_dirents,
|
2024-07-17 13:24:28 -04:00
|
|
|
POS(inum.inum, ctx->pos),
|
|
|
|
POS(inum.inum, U64_MAX),
|
|
|
|
inum.subvol, 0, k, ({
|
|
|
|
if (k.k->type != KEY_TYPE_dirent)
|
|
|
|
continue;
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2024-07-17 13:24:28 -04:00
|
|
|
/* dir_emit() can fault and block: */
|
|
|
|
bch2_bkey_buf_reassemble(&sk, c, k);
|
|
|
|
struct bkey_s_c_dirent dirent = bkey_i_to_s_c_dirent(sk.k);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2024-07-17 13:24:28 -04:00
|
|
|
subvol_inum target;
|
2025-05-28 16:34:42 -04:00
|
|
|
|
2025-05-31 19:12:25 -04:00
|
|
|
bool need_second_pass = false;
|
2025-05-28 16:34:42 -04:00
|
|
|
int ret2 = bch2_str_hash_check_key(trans, NULL, &bch2_dirent_hash_desc,
|
2025-05-31 19:12:25 -04:00
|
|
|
hash_info, &iter, k, &need_second_pass) ?:
|
2025-05-28 16:34:42 -04:00
|
|
|
bch2_dirent_read_target(trans, inum, dirent, &target);
|
2024-07-17 13:24:28 -04:00
|
|
|
if (ret2 > 0)
|
|
|
|
continue;
|
2021-10-12 12:06:02 -04:00
|
|
|
|
2025-04-29 14:30:01 -04:00
|
|
|
ret2 ?: (bch2_trans_unlock(trans), bch2_dir_emit(ctx, dirent, target));
|
2024-07-17 13:24:28 -04:00
|
|
|
})));
|
2021-03-19 20:29:11 -04:00
|
|
|
|
2023-06-21 06:00:04 -04:00
|
|
|
bch2_bkey_buf_exit(&sk, c);
|
2017-03-16 22:18:50 -08:00
|
|
|
|
2024-07-17 13:24:28 -04:00
|
|
|
return ret < 0 ? ret : 0;
|
2017-03-16 22:18:50 -08:00
|
|
|
}
|
2025-03-20 11:06:50 -04:00
|
|
|
|
|
|
|
/* fsck */
|
|
|
|
|
|
|
|
static int lookup_first_inode(struct btree_trans *trans, u64 inode_nr,
|
|
|
|
struct bch_inode_unpacked *inode)
|
|
|
|
{
|
|
|
|
struct btree_iter iter;
|
|
|
|
struct bkey_s_c k;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
for_each_btree_key_norestart(trans, iter, BTREE_ID_inodes, POS(0, inode_nr),
|
|
|
|
BTREE_ITER_all_snapshots, k, ret) {
|
|
|
|
if (k.k->p.offset != inode_nr)
|
|
|
|
break;
|
|
|
|
if (!bkey_is_inode(k.k))
|
|
|
|
continue;
|
|
|
|
ret = bch2_inode_unpack(k, inode);
|
|
|
|
goto found;
|
|
|
|
}
|
2025-05-28 11:57:50 -04:00
|
|
|
ret = bch_err_throw(trans->c, ENOENT_inode);
|
2025-03-20 11:06:50 -04:00
|
|
|
found:
|
|
|
|
bch_err_msg(trans->c, ret, "fetching inode %llu", inode_nr);
|
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int bch2_fsck_remove_dirent(struct btree_trans *trans, struct bpos pos)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = trans->c;
|
|
|
|
struct btree_iter iter;
|
|
|
|
struct bch_inode_unpacked dir_inode;
|
|
|
|
struct bch_hash_info dir_hash_info;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = lookup_first_inode(trans, pos.inode, &dir_inode);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
dir_hash_info = bch2_hash_info_init(c, &dir_inode);
|
|
|
|
|
|
|
|
bch2_trans_iter_init(trans, &iter, BTREE_ID_dirents, pos, BTREE_ITER_intent);
|
|
|
|
|
2025-03-21 15:18:51 -04:00
|
|
|
ret = bch2_btree_iter_traverse(trans, &iter) ?:
|
2025-03-20 11:06:50 -04:00
|
|
|
bch2_hash_delete_at(trans, bch2_dirent_hash_desc,
|
|
|
|
&dir_hash_info, &iter,
|
|
|
|
BTREE_UPDATE_internal_snapshot_node);
|
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
|
|
|
err:
|
|
|
|
bch_err_fn(c, ret);
|
|
|
|
return ret;
|
|
|
|
}
|