1 /* * This file is part of UBIFS.
3 * Copyright (C) 2006-2008 Nokia Corporation.
4 * Copyright (C) 2006, 2007 University of Szeged, Hungary
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License version 2 as published by
8 * the Free Software Foundation.
10 * This program is distributed in the hope that it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
15 * You should have received a copy of the GNU General Public License along with
16 * this program; if not, write to the Free Software Foundation, Inc., 51
17 * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19 * Authors: Artem Bityutskiy (Битюцкий Артём)
25 * This file implements directory operations.
27 * All FS operations in this file allocate budget before writing anything to the
28 * media. If they fail to allocate it, the error is returned. The only
29 * exceptions are 'ubifs_unlink()' and 'ubifs_rmdir()' which keep working even
30 * if they unable to allocate the budget, because deletion %-ENOSPC failure is
31 * not what users are usually ready to get. UBIFS budgeting subsystem has some
32 * space reserved for these purposes.
34 * All operations in this file write all inodes which they change straight
35 * away, instead of marking them dirty. For example, 'ubifs_link()' changes
36 * @i_size of the parent inode and writes the parent inode together with the
37 * target inode. This was done to simplify file-system recovery which would
38 * otherwise be very difficult to do. The only exception is rename which marks
39 * the re-named inode dirty (because its @i_ctime is updated) but does not
40 * write it, but just marks it as dirty.
46 * inherit_flags - inherit flags of the parent inode.
48 * @mode: new inode mode flags
50 * This is a helper function for 'ubifs_new_inode()' which inherits flag of the
51 * parent directory inode @dir. UBIFS inodes inherit the following flags:
52 * o %UBIFS_COMPR_FL, which is useful to switch compression on/of on
53 * sub-directory basis;
54 * o %UBIFS_SYNC_FL - useful for the same reasons;
55 * o %UBIFS_DIRSYNC_FL - similar, but relevant only to directories.
57 * This function returns the inherited flags.
59 static int inherit_flags(const struct inode *dir, umode_t mode)
62 const struct ubifs_inode *ui = ubifs_inode(dir);
64 if (!S_ISDIR(dir->i_mode))
66 * The parent is not a directory, which means that an extended
67 * attribute inode is being created. No flags.
71 flags = ui->flags & (UBIFS_COMPR_FL | UBIFS_SYNC_FL | UBIFS_DIRSYNC_FL);
73 /* The "DIRSYNC" flag only applies to directories */
74 flags &= ~UBIFS_DIRSYNC_FL;
79 * ubifs_new_inode - allocate new UBIFS inode object.
80 * @c: UBIFS file-system description object
81 * @dir: parent directory inode
82 * @mode: inode mode flags
84 * This function finds an unused inode number, allocates new inode and
85 * initializes it. Returns new inode in case of success and an error code in
88 struct inode *ubifs_new_inode(struct ubifs_info *c, struct inode *dir,
93 struct ubifs_inode *ui;
94 bool encrypted = false;
96 if (ubifs_crypt_is_encrypted(dir)) {
97 err = fscrypt_get_encryption_info(dir);
99 ubifs_err(c, "fscrypt_get_encryption_info failed: %i", err);
103 if (!fscrypt_has_encryption_key(dir))
104 return ERR_PTR(-EPERM);
109 inode = new_inode(c->vfs_sb);
110 ui = ubifs_inode(inode);
112 return ERR_PTR(-ENOMEM);
115 * Set 'S_NOCMTIME' to prevent VFS form updating [mc]time of inodes and
116 * marking them dirty in file write path (see 'file_update_time()').
117 * UBIFS has to fully control "clean <-> dirty" transitions of inodes
118 * to make budgeting work.
120 inode->i_flags |= S_NOCMTIME;
122 inode_init_owner(inode, dir, mode);
123 inode->i_mtime = inode->i_atime = inode->i_ctime =
125 inode->i_mapping->nrpages = 0;
127 switch (mode & S_IFMT) {
129 inode->i_mapping->a_ops = &ubifs_file_address_operations;
130 inode->i_op = &ubifs_file_inode_operations;
131 inode->i_fop = &ubifs_file_operations;
134 inode->i_op = &ubifs_dir_inode_operations;
135 inode->i_fop = &ubifs_dir_operations;
136 inode->i_size = ui->ui_size = UBIFS_INO_NODE_SZ;
139 inode->i_op = &ubifs_symlink_inode_operations;
145 inode->i_op = &ubifs_file_inode_operations;
152 ui->flags = inherit_flags(dir, mode);
153 ubifs_set_inode_flags(inode);
155 ui->compr_type = c->default_compr;
157 ui->compr_type = UBIFS_COMPR_NONE;
158 ui->synced_i_size = 0;
160 spin_lock(&c->cnt_lock);
161 /* Inode number overflow is currently not supported */
162 if (c->highest_inum >= INUM_WARN_WATERMARK) {
163 if (c->highest_inum >= INUM_WATERMARK) {
164 spin_unlock(&c->cnt_lock);
165 ubifs_err(c, "out of inode numbers");
166 make_bad_inode(inode);
168 return ERR_PTR(-EINVAL);
170 ubifs_warn(c, "running out of inode numbers (current %lu, max %u)",
171 (unsigned long)c->highest_inum, INUM_WATERMARK);
174 inode->i_ino = ++c->highest_inum;
176 * The creation sequence number remains with this inode for its
177 * lifetime. All nodes for this inode have a greater sequence number,
178 * and so it is possible to distinguish obsolete nodes belonging to a
179 * previous incarnation of the same inode number - for example, for the
180 * purpose of rebuilding the index.
182 ui->creat_sqnum = ++c->max_sqnum;
183 spin_unlock(&c->cnt_lock);
186 err = fscrypt_inherit_context(dir, inode, &encrypted, true);
188 ubifs_err(c, "fscrypt_inherit_context failed: %i", err);
189 make_bad_inode(inode);
198 static int dbg_check_name(const struct ubifs_info *c,
199 const struct ubifs_dent_node *dent,
200 const struct fscrypt_name *nm)
202 if (!dbg_is_chk_gen(c))
204 if (le16_to_cpu(dent->nlen) != fname_len(nm))
206 if (memcmp(dent->name, fname_name(nm), fname_len(nm)))
211 static struct dentry *ubifs_lookup(struct inode *dir, struct dentry *dentry,
216 struct inode *inode = NULL;
217 struct ubifs_dent_node *dent;
218 struct ubifs_info *c = dir->i_sb->s_fs_info;
219 struct fscrypt_name nm;
221 dbg_gen("'%pd' in dir ino %lu", dentry, dir->i_ino);
223 if (ubifs_crypt_is_encrypted(dir)) {
224 err = fscrypt_get_encryption_info(dir);
227 * DCACHE_ENCRYPTED_WITH_KEY is set if the dentry is
228 * created while the directory was encrypted and we
229 * have access to the key.
231 if (fscrypt_has_encryption_key(dir))
232 fscrypt_set_encrypted_dentry(dentry);
233 fscrypt_set_d_op(dentry);
234 if (err && err != -ENOKEY)
238 err = fscrypt_setup_filename(dir, &dentry->d_name, 1, &nm);
242 if (fname_len(&nm) > UBIFS_MAX_NLEN) {
247 dent = kmalloc(UBIFS_MAX_DENT_NODE_SZ, GFP_NOFS);
254 ubifs_assert(fname_len(&nm) == 0);
255 ubifs_assert(fname_name(&nm) == NULL);
256 if (nm.hash & ~UBIFS_S_KEY_HASH_MASK)
257 goto done; /* ENOENT */
258 dent_key_init_hash(c, &key, dir->i_ino, nm.hash);
259 err = ubifs_tnc_lookup_dh(c, &key, dent, nm.minor_hash);
261 dent_key_init(c, &key, dir->i_ino, &nm);
262 err = ubifs_tnc_lookup_nm(c, &key, dent, &nm);
266 if (err == -ENOENT) {
267 dbg_gen("not found");
273 if (dbg_check_name(c, dent, &nm)) {
278 inode = ubifs_iget(dir->i_sb, le64_to_cpu(dent->inum));
281 * This should not happen. Probably the file-system needs
284 err = PTR_ERR(inode);
285 ubifs_err(c, "dead directory entry '%pd', error %d",
287 ubifs_ro_mode(c, err);
291 if (ubifs_crypt_is_encrypted(dir) &&
292 (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) &&
293 !fscrypt_has_permitted_context(dir, inode)) {
294 ubifs_warn(c, "Inconsistent encryption contexts: %lu/%lu",
295 dir->i_ino, inode->i_ino);
302 fscrypt_free_filename(&nm);
304 * Note, d_splice_alias() would be required instead if we supported
307 d_add(dentry, inode);
315 fscrypt_free_filename(&nm);
319 static int ubifs_create(struct inode *dir, struct dentry *dentry, umode_t mode,
323 struct ubifs_info *c = dir->i_sb->s_fs_info;
324 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
326 struct ubifs_inode *dir_ui = ubifs_inode(dir);
327 struct fscrypt_name nm;
331 * Budget request settings: new inode, new direntry, changing the
332 * parent directory inode.
335 dbg_gen("dent '%pd', mode %#hx in dir ino %lu",
336 dentry, mode, dir->i_ino);
338 err = ubifs_budget_space(c, &req);
342 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
346 sz_change = CALC_DENT_SIZE(fname_len(&nm));
348 inode = ubifs_new_inode(c, dir, mode);
350 err = PTR_ERR(inode);
354 err = ubifs_init_security(dir, inode, &dentry->d_name);
358 mutex_lock(&dir_ui->ui_mutex);
359 dir->i_size += sz_change;
360 dir_ui->ui_size = dir->i_size;
361 dir->i_mtime = dir->i_ctime = inode->i_ctime;
362 err = ubifs_jnl_update(c, dir, &nm, inode, 0, 0);
365 mutex_unlock(&dir_ui->ui_mutex);
367 ubifs_release_budget(c, &req);
368 fscrypt_free_filename(&nm);
369 insert_inode_hash(inode);
370 d_instantiate(dentry, inode);
374 dir->i_size -= sz_change;
375 dir_ui->ui_size = dir->i_size;
376 mutex_unlock(&dir_ui->ui_mutex);
378 make_bad_inode(inode);
381 fscrypt_free_filename(&nm);
383 ubifs_release_budget(c, &req);
384 ubifs_err(c, "cannot create regular file, error %d", err);
388 static int do_tmpfile(struct inode *dir, struct dentry *dentry,
389 umode_t mode, struct inode **whiteout)
392 struct ubifs_info *c = dir->i_sb->s_fs_info;
393 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
395 struct ubifs_budget_req ino_req = { .dirtied_ino = 1 };
396 struct ubifs_inode *ui, *dir_ui = ubifs_inode(dir);
397 int err, instantiated = 0;
398 struct fscrypt_name nm;
401 * Budget request settings: new inode, new direntry, changing the
402 * parent directory inode.
403 * Allocate budget separately for new dirtied inode, the budget will
404 * be released via writeback.
407 dbg_gen("dent '%pd', mode %#hx in dir ino %lu",
408 dentry, mode, dir->i_ino);
410 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
414 err = ubifs_budget_space(c, &req);
416 fscrypt_free_filename(&nm);
420 err = ubifs_budget_space(c, &ino_req);
422 ubifs_release_budget(c, &req);
423 fscrypt_free_filename(&nm);
427 inode = ubifs_new_inode(c, dir, mode);
429 err = PTR_ERR(inode);
432 ui = ubifs_inode(inode);
435 init_special_inode(inode, inode->i_mode, WHITEOUT_DEV);
436 ubifs_assert(inode->i_op == &ubifs_file_inode_operations);
439 err = ubifs_init_security(dir, inode, &dentry->d_name);
443 mutex_lock(&ui->ui_mutex);
444 insert_inode_hash(inode);
447 mark_inode_dirty(inode);
451 d_tmpfile(dentry, inode);
453 ubifs_assert(ui->dirty);
456 mutex_unlock(&ui->ui_mutex);
458 mutex_lock(&dir_ui->ui_mutex);
459 err = ubifs_jnl_update(c, dir, &nm, inode, 1, 0);
462 mutex_unlock(&dir_ui->ui_mutex);
464 ubifs_release_budget(c, &req);
465 fscrypt_free_filename(&nm);
470 mutex_unlock(&dir_ui->ui_mutex);
472 make_bad_inode(inode);
478 ubifs_release_budget(c, &req);
480 ubifs_release_budget(c, &ino_req);
481 fscrypt_free_filename(&nm);
482 ubifs_err(c, "cannot create temporary file, error %d", err);
486 static int ubifs_tmpfile(struct inode *dir, struct dentry *dentry,
489 return do_tmpfile(dir, dentry, mode, NULL);
493 * vfs_dent_type - get VFS directory entry type.
494 * @type: UBIFS directory entry type
496 * This function converts UBIFS directory entry type into VFS directory entry
499 static unsigned int vfs_dent_type(uint8_t type)
502 case UBIFS_ITYPE_REG:
504 case UBIFS_ITYPE_DIR:
506 case UBIFS_ITYPE_LNK:
508 case UBIFS_ITYPE_BLK:
510 case UBIFS_ITYPE_CHR:
512 case UBIFS_ITYPE_FIFO:
514 case UBIFS_ITYPE_SOCK:
523 * The classical Unix view for directory is that it is a linear array of
524 * (name, inode number) entries. Linux/VFS assumes this model as well.
525 * Particularly, 'readdir()' call wants us to return a directory entry offset
526 * which later may be used to continue 'readdir()'ing the directory or to
527 * 'seek()' to that specific direntry. Obviously UBIFS does not really fit this
528 * model because directory entries are identified by keys, which may collide.
530 * UBIFS uses directory entry hash value for directory offsets, so
531 * 'seekdir()'/'telldir()' may not always work because of possible key
532 * collisions. But UBIFS guarantees that consecutive 'readdir()' calls work
533 * properly by means of saving full directory entry name in the private field
534 * of the file description object.
536 * This means that UBIFS cannot support NFS which requires full
537 * 'seekdir()'/'telldir()' support.
539 static int ubifs_readdir(struct file *file, struct dir_context *ctx)
541 int fstr_real_len = 0, err = 0;
542 struct fscrypt_name nm;
543 struct fscrypt_str fstr = {0};
545 struct ubifs_dent_node *dent;
546 struct inode *dir = file_inode(file);
547 struct ubifs_info *c = dir->i_sb->s_fs_info;
548 bool encrypted = ubifs_crypt_is_encrypted(dir);
550 dbg_gen("dir ino %lu, f_pos %#llx", dir->i_ino, ctx->pos);
552 if (ctx->pos > UBIFS_S_KEY_HASH_MASK || ctx->pos == 2)
554 * The directory was seek'ed to a senseless position or there
555 * are no more entries.
560 err = fscrypt_get_encryption_info(dir);
561 if (err && err != -ENOKEY)
564 err = fscrypt_fname_alloc_buffer(dir, UBIFS_MAX_NLEN, &fstr);
568 fstr_real_len = fstr.len;
571 if (file->f_version == 0) {
573 * The file was seek'ed, which means that @file->private_data
574 * is now invalid. This may also be just the first
575 * 'ubifs_readdir()' invocation, in which case
576 * @file->private_data is NULL, and the below code is
579 kfree(file->private_data);
580 file->private_data = NULL;
584 * 'generic_file_llseek()' unconditionally sets @file->f_version to
585 * zero, and we use this for detecting whether the file was seek'ed.
589 /* File positions 0 and 1 correspond to "." and ".." */
591 ubifs_assert(!file->private_data);
592 if (!dir_emit_dots(file, ctx)) {
594 fscrypt_fname_free_buffer(&fstr);
598 /* Find the first entry in TNC and save it */
599 lowest_dent_key(c, &key, dir->i_ino);
601 dent = ubifs_tnc_next_ent(c, &key, &nm);
607 ctx->pos = key_hash_flash(c, &dent->key);
608 file->private_data = dent;
611 dent = file->private_data;
614 * The directory was seek'ed to and is now readdir'ed.
615 * Find the entry corresponding to @ctx->pos or the closest one.
617 dent_key_init_hash(c, &key, dir->i_ino, ctx->pos);
619 dent = ubifs_tnc_next_ent(c, &key, &nm);
624 ctx->pos = key_hash_flash(c, &dent->key);
625 file->private_data = dent;
629 dbg_gen("ino %llu, new f_pos %#x",
630 (unsigned long long)le64_to_cpu(dent->inum),
631 key_hash_flash(c, &dent->key));
632 ubifs_assert(le64_to_cpu(dent->ch.sqnum) >
633 ubifs_inode(dir)->creat_sqnum);
635 fname_len(&nm) = le16_to_cpu(dent->nlen);
636 fname_name(&nm) = dent->name;
639 fstr.len = fstr_real_len;
641 err = fscrypt_fname_disk_to_usr(dir, key_hash_flash(c,
643 le32_to_cpu(dent->cookie),
644 &nm.disk_name, &fstr);
648 fstr.len = fname_len(&nm);
649 fstr.name = fname_name(&nm);
652 if (!dir_emit(ctx, fstr.name, fstr.len,
653 le64_to_cpu(dent->inum),
654 vfs_dent_type(dent->type))) {
656 fscrypt_fname_free_buffer(&fstr);
660 /* Switch to the next entry */
661 key_read(c, &dent->key, &key);
662 dent = ubifs_tnc_next_ent(c, &key, &nm);
668 kfree(file->private_data);
669 ctx->pos = key_hash_flash(c, &dent->key);
670 file->private_data = dent;
675 kfree(file->private_data);
676 file->private_data = NULL;
679 fscrypt_fname_free_buffer(&fstr);
682 ubifs_err(c, "cannot find next direntry, error %d", err);
685 * -ENOENT is a non-fatal error in this context, the TNC uses
686 * it to indicate that the cursor moved past the current directory
687 * and readdir() has to stop.
692 /* 2 is a special value indicating that there are no more direntries */
697 /* Free saved readdir() state when the directory is closed */
698 static int ubifs_dir_release(struct inode *dir, struct file *file)
700 kfree(file->private_data);
701 file->private_data = NULL;
706 * lock_2_inodes - a wrapper for locking two UBIFS inodes.
707 * @inode1: first inode
708 * @inode2: second inode
710 * We do not implement any tricks to guarantee strict lock ordering, because
711 * VFS has already done it for us on the @i_mutex. So this is just a simple
714 static void lock_2_inodes(struct inode *inode1, struct inode *inode2)
716 mutex_lock_nested(&ubifs_inode(inode1)->ui_mutex, WB_MUTEX_1);
717 mutex_lock_nested(&ubifs_inode(inode2)->ui_mutex, WB_MUTEX_2);
721 * unlock_2_inodes - a wrapper for unlocking two UBIFS inodes.
722 * @inode1: first inode
723 * @inode2: second inode
725 static void unlock_2_inodes(struct inode *inode1, struct inode *inode2)
727 mutex_unlock(&ubifs_inode(inode2)->ui_mutex);
728 mutex_unlock(&ubifs_inode(inode1)->ui_mutex);
731 static int ubifs_link(struct dentry *old_dentry, struct inode *dir,
732 struct dentry *dentry)
734 struct ubifs_info *c = dir->i_sb->s_fs_info;
735 struct inode *inode = d_inode(old_dentry);
736 struct ubifs_inode *ui = ubifs_inode(inode);
737 struct ubifs_inode *dir_ui = ubifs_inode(dir);
738 int err, sz_change = CALC_DENT_SIZE(dentry->d_name.len);
739 struct ubifs_budget_req req = { .new_dent = 1, .dirtied_ino = 2,
740 .dirtied_ino_d = ALIGN(ui->data_len, 8) };
741 struct fscrypt_name nm;
744 * Budget request settings: new direntry, changing the target inode,
745 * changing the parent inode.
748 dbg_gen("dent '%pd' to ino %lu (nlink %d) in dir ino %lu",
749 dentry, inode->i_ino,
750 inode->i_nlink, dir->i_ino);
751 ubifs_assert(inode_is_locked(dir));
752 ubifs_assert(inode_is_locked(inode));
754 if (ubifs_crypt_is_encrypted(dir) &&
755 !fscrypt_has_permitted_context(dir, inode))
758 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
762 err = dbg_check_synced_i_size(c, inode);
766 err = ubifs_budget_space(c, &req);
770 lock_2_inodes(dir, inode);
772 /* Handle O_TMPFILE corner case, it is allowed to link a O_TMPFILE. */
773 if (inode->i_nlink == 0)
774 ubifs_delete_orphan(c, inode->i_ino);
778 inode->i_ctime = current_time(inode);
779 dir->i_size += sz_change;
780 dir_ui->ui_size = dir->i_size;
781 dir->i_mtime = dir->i_ctime = inode->i_ctime;
782 err = ubifs_jnl_update(c, dir, &nm, inode, 0, 0);
785 unlock_2_inodes(dir, inode);
787 ubifs_release_budget(c, &req);
788 d_instantiate(dentry, inode);
789 fscrypt_free_filename(&nm);
793 dir->i_size -= sz_change;
794 dir_ui->ui_size = dir->i_size;
796 if (inode->i_nlink == 0)
797 ubifs_add_orphan(c, inode->i_ino);
798 unlock_2_inodes(dir, inode);
799 ubifs_release_budget(c, &req);
802 fscrypt_free_filename(&nm);
806 static int ubifs_unlink(struct inode *dir, struct dentry *dentry)
808 struct ubifs_info *c = dir->i_sb->s_fs_info;
809 struct inode *inode = d_inode(dentry);
810 struct ubifs_inode *dir_ui = ubifs_inode(dir);
811 int err, sz_change, budgeted = 1;
812 struct ubifs_budget_req req = { .mod_dent = 1, .dirtied_ino = 2 };
813 unsigned int saved_nlink = inode->i_nlink;
814 struct fscrypt_name nm;
817 * Budget request settings: deletion direntry, deletion inode (+1 for
818 * @dirtied_ino), changing the parent directory inode. If budgeting
819 * fails, go ahead anyway because we have extra space reserved for
823 dbg_gen("dent '%pd' from ino %lu (nlink %d) in dir ino %lu",
824 dentry, inode->i_ino,
825 inode->i_nlink, dir->i_ino);
827 if (ubifs_crypt_is_encrypted(dir)) {
828 err = fscrypt_get_encryption_info(dir);
829 if (err && err != -ENOKEY)
833 err = fscrypt_setup_filename(dir, &dentry->d_name, 1, &nm);
837 sz_change = CALC_DENT_SIZE(fname_len(&nm));
839 ubifs_assert(inode_is_locked(dir));
840 ubifs_assert(inode_is_locked(inode));
841 err = dbg_check_synced_i_size(c, inode);
845 err = ubifs_budget_space(c, &req);
852 lock_2_inodes(dir, inode);
853 inode->i_ctime = current_time(dir);
855 dir->i_size -= sz_change;
856 dir_ui->ui_size = dir->i_size;
857 dir->i_mtime = dir->i_ctime = inode->i_ctime;
858 err = ubifs_jnl_update(c, dir, &nm, inode, 1, 0);
861 unlock_2_inodes(dir, inode);
864 ubifs_release_budget(c, &req);
866 /* We've deleted something - clean the "no space" flags */
867 c->bi.nospace = c->bi.nospace_rp = 0;
870 fscrypt_free_filename(&nm);
874 dir->i_size += sz_change;
875 dir_ui->ui_size = dir->i_size;
876 set_nlink(inode, saved_nlink);
877 unlock_2_inodes(dir, inode);
879 ubifs_release_budget(c, &req);
881 fscrypt_free_filename(&nm);
886 * check_dir_empty - check if a directory is empty or not.
887 * @dir: VFS inode object of the directory to check
889 * This function checks if directory @dir is empty. Returns zero if the
890 * directory is empty, %-ENOTEMPTY if it is not, and other negative error codes
891 * in case of of errors.
893 int ubifs_check_dir_empty(struct inode *dir)
895 struct ubifs_info *c = dir->i_sb->s_fs_info;
896 struct fscrypt_name nm = { 0 };
897 struct ubifs_dent_node *dent;
901 lowest_dent_key(c, &key, dir->i_ino);
902 dent = ubifs_tnc_next_ent(c, &key, &nm);
914 static int ubifs_rmdir(struct inode *dir, struct dentry *dentry)
916 struct ubifs_info *c = dir->i_sb->s_fs_info;
917 struct inode *inode = d_inode(dentry);
918 int err, sz_change, budgeted = 1;
919 struct ubifs_inode *dir_ui = ubifs_inode(dir);
920 struct ubifs_budget_req req = { .mod_dent = 1, .dirtied_ino = 2 };
921 struct fscrypt_name nm;
924 * Budget request settings: deletion direntry, deletion inode and
925 * changing the parent inode. If budgeting fails, go ahead anyway
926 * because we have extra space reserved for deletions.
929 dbg_gen("directory '%pd', ino %lu in dir ino %lu", dentry,
930 inode->i_ino, dir->i_ino);
931 ubifs_assert(inode_is_locked(dir));
932 ubifs_assert(inode_is_locked(inode));
933 err = ubifs_check_dir_empty(d_inode(dentry));
937 if (ubifs_crypt_is_encrypted(dir)) {
938 err = fscrypt_get_encryption_info(dir);
939 if (err && err != -ENOKEY)
943 err = fscrypt_setup_filename(dir, &dentry->d_name, 1, &nm);
947 sz_change = CALC_DENT_SIZE(fname_len(&nm));
949 err = ubifs_budget_space(c, &req);
956 lock_2_inodes(dir, inode);
957 inode->i_ctime = current_time(dir);
960 dir->i_size -= sz_change;
961 dir_ui->ui_size = dir->i_size;
962 dir->i_mtime = dir->i_ctime = inode->i_ctime;
963 err = ubifs_jnl_update(c, dir, &nm, inode, 1, 0);
966 unlock_2_inodes(dir, inode);
969 ubifs_release_budget(c, &req);
971 /* We've deleted something - clean the "no space" flags */
972 c->bi.nospace = c->bi.nospace_rp = 0;
975 fscrypt_free_filename(&nm);
979 dir->i_size += sz_change;
980 dir_ui->ui_size = dir->i_size;
983 unlock_2_inodes(dir, inode);
985 ubifs_release_budget(c, &req);
987 fscrypt_free_filename(&nm);
991 static int ubifs_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
994 struct ubifs_inode *dir_ui = ubifs_inode(dir);
995 struct ubifs_info *c = dir->i_sb->s_fs_info;
997 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
999 struct fscrypt_name nm;
1002 * Budget request settings: new inode, new direntry and changing parent
1006 dbg_gen("dent '%pd', mode %#hx in dir ino %lu",
1007 dentry, mode, dir->i_ino);
1009 err = ubifs_budget_space(c, &req);
1013 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
1017 sz_change = CALC_DENT_SIZE(fname_len(&nm));
1019 inode = ubifs_new_inode(c, dir, S_IFDIR | mode);
1020 if (IS_ERR(inode)) {
1021 err = PTR_ERR(inode);
1025 err = ubifs_init_security(dir, inode, &dentry->d_name);
1029 mutex_lock(&dir_ui->ui_mutex);
1030 insert_inode_hash(inode);
1033 dir->i_size += sz_change;
1034 dir_ui->ui_size = dir->i_size;
1035 dir->i_mtime = dir->i_ctime = inode->i_ctime;
1036 err = ubifs_jnl_update(c, dir, &nm, inode, 0, 0);
1038 ubifs_err(c, "cannot create directory, error %d", err);
1041 mutex_unlock(&dir_ui->ui_mutex);
1043 ubifs_release_budget(c, &req);
1044 d_instantiate(dentry, inode);
1045 fscrypt_free_filename(&nm);
1049 dir->i_size -= sz_change;
1050 dir_ui->ui_size = dir->i_size;
1052 mutex_unlock(&dir_ui->ui_mutex);
1054 make_bad_inode(inode);
1057 fscrypt_free_filename(&nm);
1059 ubifs_release_budget(c, &req);
1063 static int ubifs_mknod(struct inode *dir, struct dentry *dentry,
1064 umode_t mode, dev_t rdev)
1066 struct inode *inode;
1067 struct ubifs_inode *ui;
1068 struct ubifs_inode *dir_ui = ubifs_inode(dir);
1069 struct ubifs_info *c = dir->i_sb->s_fs_info;
1070 union ubifs_dev_desc *dev = NULL;
1072 int err, devlen = 0;
1073 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
1075 struct fscrypt_name nm;
1078 * Budget request settings: new inode, new direntry and changing parent
1082 dbg_gen("dent '%pd' in dir ino %lu", dentry, dir->i_ino);
1084 if (S_ISBLK(mode) || S_ISCHR(mode)) {
1085 dev = kmalloc(sizeof(union ubifs_dev_desc), GFP_NOFS);
1088 devlen = ubifs_encode_dev(dev, rdev);
1091 req.new_ino_d = ALIGN(devlen, 8);
1092 err = ubifs_budget_space(c, &req);
1098 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
1104 sz_change = CALC_DENT_SIZE(fname_len(&nm));
1106 inode = ubifs_new_inode(c, dir, mode);
1107 if (IS_ERR(inode)) {
1109 err = PTR_ERR(inode);
1113 init_special_inode(inode, inode->i_mode, rdev);
1114 inode->i_size = ubifs_inode(inode)->ui_size = devlen;
1115 ui = ubifs_inode(inode);
1117 ui->data_len = devlen;
1119 err = ubifs_init_security(dir, inode, &dentry->d_name);
1123 mutex_lock(&dir_ui->ui_mutex);
1124 dir->i_size += sz_change;
1125 dir_ui->ui_size = dir->i_size;
1126 dir->i_mtime = dir->i_ctime = inode->i_ctime;
1127 err = ubifs_jnl_update(c, dir, &nm, inode, 0, 0);
1130 mutex_unlock(&dir_ui->ui_mutex);
1132 ubifs_release_budget(c, &req);
1133 insert_inode_hash(inode);
1134 d_instantiate(dentry, inode);
1135 fscrypt_free_filename(&nm);
1139 dir->i_size -= sz_change;
1140 dir_ui->ui_size = dir->i_size;
1141 mutex_unlock(&dir_ui->ui_mutex);
1143 make_bad_inode(inode);
1146 fscrypt_free_filename(&nm);
1148 ubifs_release_budget(c, &req);
1152 static int ubifs_symlink(struct inode *dir, struct dentry *dentry,
1153 const char *symname)
1155 struct inode *inode;
1156 struct ubifs_inode *ui;
1157 struct ubifs_inode *dir_ui = ubifs_inode(dir);
1158 struct ubifs_info *c = dir->i_sb->s_fs_info;
1159 int err, sz_change, len = strlen(symname);
1160 struct fscrypt_str disk_link = FSTR_INIT((char *)symname, len + 1);
1161 struct fscrypt_symlink_data *sd = NULL;
1162 struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
1163 .new_ino_d = ALIGN(len, 8),
1165 struct fscrypt_name nm;
1167 if (ubifs_crypt_is_encrypted(dir)) {
1168 err = fscrypt_get_encryption_info(dir);
1172 if (!fscrypt_has_encryption_key(dir)) {
1177 disk_link.len = (fscrypt_fname_encrypted_size(dir, len) +
1178 sizeof(struct fscrypt_symlink_data));
1182 * Budget request settings: new inode, new direntry and changing parent
1186 dbg_gen("dent '%pd', target '%s' in dir ino %lu", dentry,
1187 symname, dir->i_ino);
1189 if (disk_link.len > UBIFS_MAX_INO_DATA)
1190 return -ENAMETOOLONG;
1192 err = ubifs_budget_space(c, &req);
1196 err = fscrypt_setup_filename(dir, &dentry->d_name, 0, &nm);
1200 sz_change = CALC_DENT_SIZE(fname_len(&nm));
1202 inode = ubifs_new_inode(c, dir, S_IFLNK | S_IRWXUGO);
1203 if (IS_ERR(inode)) {
1204 err = PTR_ERR(inode);
1208 ui = ubifs_inode(inode);
1209 ui->data = kmalloc(disk_link.len, GFP_NOFS);
1215 if (ubifs_crypt_is_encrypted(dir)) {
1216 struct qstr istr = QSTR_INIT(symname, len);
1217 struct fscrypt_str ostr;
1219 sd = kzalloc(disk_link.len, GFP_NOFS);
1225 ostr.name = sd->encrypted_path;
1226 ostr.len = disk_link.len;
1228 err = fscrypt_fname_usr_to_disk(inode, &istr, &ostr);
1232 sd->len = cpu_to_le16(ostr.len);
1233 disk_link.name = (char *)sd;
1235 inode->i_link = ui->data;
1238 memcpy(ui->data, disk_link.name, disk_link.len);
1239 ((char *)ui->data)[disk_link.len - 1] = '\0';
1242 * The terminating zero byte is not written to the flash media and it
1243 * is put just to make later in-memory string processing simpler. Thus,
1244 * data length is @len, not @len + %1.
1246 ui->data_len = disk_link.len - 1;
1247 inode->i_size = ubifs_inode(inode)->ui_size = disk_link.len - 1;
1249 err = ubifs_init_security(dir, inode, &dentry->d_name);
1253 mutex_lock(&dir_ui->ui_mutex);
1254 dir->i_size += sz_change;
1255 dir_ui->ui_size = dir->i_size;
1256 dir->i_mtime = dir->i_ctime = inode->i_ctime;
1257 err = ubifs_jnl_update(c, dir, &nm, inode, 0, 0);
1260 mutex_unlock(&dir_ui->ui_mutex);
1262 insert_inode_hash(inode);
1263 d_instantiate(dentry, inode);
1268 dir->i_size -= sz_change;
1269 dir_ui->ui_size = dir->i_size;
1270 mutex_unlock(&dir_ui->ui_mutex);
1272 make_bad_inode(inode);
1275 fscrypt_free_filename(&nm);
1277 ubifs_release_budget(c, &req);
1283 * lock_4_inodes - a wrapper for locking three UBIFS inodes.
1284 * @inode1: first inode
1285 * @inode2: second inode
1286 * @inode3: third inode
1287 * @inode4: fouth inode
1289 * This function is used for 'ubifs_rename()' and @inode1 may be the same as
1290 * @inode2 whereas @inode3 and @inode4 may be %NULL.
1292 * We do not implement any tricks to guarantee strict lock ordering, because
1293 * VFS has already done it for us on the @i_mutex. So this is just a simple
1296 static void lock_4_inodes(struct inode *inode1, struct inode *inode2,
1297 struct inode *inode3, struct inode *inode4)
1299 mutex_lock_nested(&ubifs_inode(inode1)->ui_mutex, WB_MUTEX_1);
1300 if (inode2 != inode1)
1301 mutex_lock_nested(&ubifs_inode(inode2)->ui_mutex, WB_MUTEX_2);
1303 mutex_lock_nested(&ubifs_inode(inode3)->ui_mutex, WB_MUTEX_3);
1305 mutex_lock_nested(&ubifs_inode(inode4)->ui_mutex, WB_MUTEX_4);
1309 * unlock_4_inodes - a wrapper for unlocking three UBIFS inodes for rename.
1310 * @inode1: first inode
1311 * @inode2: second inode
1312 * @inode3: third inode
1313 * @inode4: fouth inode
1315 static void unlock_4_inodes(struct inode *inode1, struct inode *inode2,
1316 struct inode *inode3, struct inode *inode4)
1319 mutex_unlock(&ubifs_inode(inode4)->ui_mutex);
1321 mutex_unlock(&ubifs_inode(inode3)->ui_mutex);
1322 if (inode1 != inode2)
1323 mutex_unlock(&ubifs_inode(inode2)->ui_mutex);
1324 mutex_unlock(&ubifs_inode(inode1)->ui_mutex);
1327 static int do_rename(struct inode *old_dir, struct dentry *old_dentry,
1328 struct inode *new_dir, struct dentry *new_dentry,
1331 struct ubifs_info *c = old_dir->i_sb->s_fs_info;
1332 struct inode *old_inode = d_inode(old_dentry);
1333 struct inode *new_inode = d_inode(new_dentry);
1334 struct inode *whiteout = NULL;
1335 struct ubifs_inode *old_inode_ui = ubifs_inode(old_inode);
1336 struct ubifs_inode *whiteout_ui = NULL;
1337 int err, release, sync = 0, move = (new_dir != old_dir);
1338 int is_dir = S_ISDIR(old_inode->i_mode);
1339 int unlink = !!new_inode, new_sz, old_sz;
1340 struct ubifs_budget_req req = { .new_dent = 1, .mod_dent = 1,
1342 struct ubifs_budget_req ino_req = { .dirtied_ino = 1,
1343 .dirtied_ino_d = ALIGN(old_inode_ui->data_len, 8) };
1344 struct timespec time;
1345 unsigned int uninitialized_var(saved_nlink);
1346 struct fscrypt_name old_nm, new_nm;
1349 * Budget request settings: deletion direntry, new direntry, removing
1350 * the old inode, and changing old and new parent directory inodes.
1352 * However, this operation also marks the target inode as dirty and
1353 * does not write it, so we allocate budget for the target inode
1357 dbg_gen("dent '%pd' ino %lu in dir ino %lu to dent '%pd' in dir ino %lu flags 0x%x",
1358 old_dentry, old_inode->i_ino, old_dir->i_ino,
1359 new_dentry, new_dir->i_ino, flags);
1362 ubifs_assert(inode_is_locked(new_inode));
1364 if (old_dir != new_dir) {
1365 if (ubifs_crypt_is_encrypted(new_dir) &&
1366 !fscrypt_has_permitted_context(new_dir, old_inode))
1370 if (unlink && is_dir) {
1371 err = ubifs_check_dir_empty(new_inode);
1376 err = fscrypt_setup_filename(old_dir, &old_dentry->d_name, 0, &old_nm);
1380 err = fscrypt_setup_filename(new_dir, &new_dentry->d_name, 0, &new_nm);
1382 fscrypt_free_filename(&old_nm);
1386 new_sz = CALC_DENT_SIZE(fname_len(&new_nm));
1387 old_sz = CALC_DENT_SIZE(fname_len(&old_nm));
1389 err = ubifs_budget_space(c, &req);
1391 fscrypt_free_filename(&old_nm);
1392 fscrypt_free_filename(&new_nm);
1395 err = ubifs_budget_space(c, &ino_req);
1397 fscrypt_free_filename(&old_nm);
1398 fscrypt_free_filename(&new_nm);
1399 ubifs_release_budget(c, &req);
1403 if (flags & RENAME_WHITEOUT) {
1404 union ubifs_dev_desc *dev = NULL;
1406 dev = kmalloc(sizeof(union ubifs_dev_desc), GFP_NOFS);
1412 err = do_tmpfile(old_dir, old_dentry, S_IFCHR | WHITEOUT_MODE, &whiteout);
1418 spin_lock(&whiteout->i_lock);
1419 whiteout->i_state |= I_LINKABLE;
1420 spin_unlock(&whiteout->i_lock);
1422 whiteout_ui = ubifs_inode(whiteout);
1423 whiteout_ui->data = dev;
1424 whiteout_ui->data_len = ubifs_encode_dev(dev, MKDEV(0, 0));
1425 ubifs_assert(!whiteout_ui->dirty);
1428 lock_4_inodes(old_dir, new_dir, new_inode, whiteout);
1431 * Like most other Unix systems, set the @i_ctime for inodes on a
1434 time = current_time(old_dir);
1435 old_inode->i_ctime = time;
1437 /* We must adjust parent link count when renaming directories */
1441 * @old_dir loses a link because we are moving
1442 * @old_inode to a different directory.
1444 drop_nlink(old_dir);
1446 * @new_dir only gains a link if we are not also
1447 * overwriting an existing directory.
1453 * @old_inode is not moving to a different directory,
1454 * but @old_dir still loses a link if we are
1455 * overwriting an existing directory.
1458 drop_nlink(old_dir);
1461 /* Add the old_dentry size to the old_dir size. */
1462 old_sz -= CALC_DENT_SIZE(fname_len(&old_nm));
1465 old_dir->i_size -= old_sz;
1466 ubifs_inode(old_dir)->ui_size = old_dir->i_size;
1467 old_dir->i_mtime = old_dir->i_ctime = time;
1468 new_dir->i_mtime = new_dir->i_ctime = time;
1471 * And finally, if we unlinked a direntry which happened to have the
1472 * same name as the moved direntry, we have to decrement @i_nlink of
1473 * the unlinked inode and change its ctime.
1477 * Directories cannot have hard-links, so if this is a
1478 * directory, just clear @i_nlink.
1480 saved_nlink = new_inode->i_nlink;
1482 clear_nlink(new_inode);
1484 drop_nlink(new_inode);
1485 new_inode->i_ctime = time;
1487 new_dir->i_size += new_sz;
1488 ubifs_inode(new_dir)->ui_size = new_dir->i_size;
1492 * Do not ask 'ubifs_jnl_rename()' to flush write-buffer if @old_inode
1493 * is dirty, because this will be done later on at the end of
1496 if (IS_SYNC(old_inode)) {
1497 sync = IS_DIRSYNC(old_dir) || IS_DIRSYNC(new_dir);
1498 if (unlink && IS_SYNC(new_inode))
1503 struct ubifs_budget_req wht_req = { .dirtied_ino = 1,
1505 ALIGN(ubifs_inode(whiteout)->data_len, 8) };
1507 err = ubifs_budget_space(c, &wht_req);
1513 inc_nlink(whiteout);
1514 mark_inode_dirty(whiteout);
1516 spin_lock(&whiteout->i_lock);
1517 whiteout->i_state &= ~I_LINKABLE;
1518 spin_unlock(&whiteout->i_lock);
1523 err = ubifs_jnl_rename(c, old_dir, old_inode, &old_nm, new_dir,
1524 new_inode, &new_nm, whiteout, sync);
1528 unlock_4_inodes(old_dir, new_dir, new_inode, whiteout);
1529 ubifs_release_budget(c, &req);
1531 mutex_lock(&old_inode_ui->ui_mutex);
1532 release = old_inode_ui->dirty;
1533 mark_inode_dirty_sync(old_inode);
1534 mutex_unlock(&old_inode_ui->ui_mutex);
1537 ubifs_release_budget(c, &ino_req);
1538 if (IS_SYNC(old_inode))
1539 err = old_inode->i_sb->s_op->write_inode(old_inode, NULL);
1541 fscrypt_free_filename(&old_nm);
1542 fscrypt_free_filename(&new_nm);
1547 set_nlink(new_inode, saved_nlink);
1549 new_dir->i_size -= new_sz;
1550 ubifs_inode(new_dir)->ui_size = new_dir->i_size;
1552 old_dir->i_size += old_sz;
1553 ubifs_inode(old_dir)->ui_size = old_dir->i_size;
1558 drop_nlink(new_dir);
1565 drop_nlink(whiteout);
1568 unlock_4_inodes(old_dir, new_dir, new_inode, whiteout);
1570 ubifs_release_budget(c, &ino_req);
1571 ubifs_release_budget(c, &req);
1572 fscrypt_free_filename(&old_nm);
1573 fscrypt_free_filename(&new_nm);
1577 static int ubifs_xrename(struct inode *old_dir, struct dentry *old_dentry,
1578 struct inode *new_dir, struct dentry *new_dentry)
1580 struct ubifs_info *c = old_dir->i_sb->s_fs_info;
1581 struct ubifs_budget_req req = { .new_dent = 1, .mod_dent = 1,
1583 int sync = IS_DIRSYNC(old_dir) || IS_DIRSYNC(new_dir);
1584 struct inode *fst_inode = d_inode(old_dentry);
1585 struct inode *snd_inode = d_inode(new_dentry);
1586 struct timespec time;
1588 struct fscrypt_name fst_nm, snd_nm;
1590 ubifs_assert(fst_inode && snd_inode);
1592 if ((ubifs_crypt_is_encrypted(old_dir) ||
1593 ubifs_crypt_is_encrypted(new_dir)) &&
1594 (old_dir != new_dir) &&
1595 (!fscrypt_has_permitted_context(new_dir, fst_inode) ||
1596 !fscrypt_has_permitted_context(old_dir, snd_inode)))
1599 err = fscrypt_setup_filename(old_dir, &old_dentry->d_name, 0, &fst_nm);
1603 err = fscrypt_setup_filename(new_dir, &new_dentry->d_name, 0, &snd_nm);
1605 fscrypt_free_filename(&fst_nm);
1609 err = ubifs_budget_space(c, &req);
1613 lock_4_inodes(old_dir, new_dir, NULL, NULL);
1615 time = current_time(old_dir);
1616 fst_inode->i_ctime = time;
1617 snd_inode->i_ctime = time;
1618 old_dir->i_mtime = old_dir->i_ctime = time;
1619 new_dir->i_mtime = new_dir->i_ctime = time;
1621 if (old_dir != new_dir) {
1622 if (S_ISDIR(fst_inode->i_mode) && !S_ISDIR(snd_inode->i_mode)) {
1624 drop_nlink(old_dir);
1626 else if (!S_ISDIR(fst_inode->i_mode) && S_ISDIR(snd_inode->i_mode)) {
1627 drop_nlink(new_dir);
1632 err = ubifs_jnl_xrename(c, old_dir, fst_inode, &fst_nm, new_dir,
1633 snd_inode, &snd_nm, sync);
1635 unlock_4_inodes(old_dir, new_dir, NULL, NULL);
1636 ubifs_release_budget(c, &req);
1639 fscrypt_free_filename(&fst_nm);
1640 fscrypt_free_filename(&snd_nm);
1644 static int ubifs_rename(struct inode *old_dir, struct dentry *old_dentry,
1645 struct inode *new_dir, struct dentry *new_dentry,
1648 if (flags & ~(RENAME_NOREPLACE | RENAME_WHITEOUT | RENAME_EXCHANGE))
1651 ubifs_assert(inode_is_locked(old_dir));
1652 ubifs_assert(inode_is_locked(new_dir));
1654 if (flags & RENAME_EXCHANGE)
1655 return ubifs_xrename(old_dir, old_dentry, new_dir, new_dentry);
1657 return do_rename(old_dir, old_dentry, new_dir, new_dentry, flags);
1660 int ubifs_getattr(const struct path *path, struct kstat *stat,
1661 u32 request_mask, unsigned int flags)
1664 struct inode *inode = d_inode(path->dentry);
1665 struct ubifs_inode *ui = ubifs_inode(inode);
1667 mutex_lock(&ui->ui_mutex);
1669 if (ui->flags & UBIFS_APPEND_FL)
1670 stat->attributes |= STATX_ATTR_APPEND;
1671 if (ui->flags & UBIFS_COMPR_FL)
1672 stat->attributes |= STATX_ATTR_COMPRESSED;
1673 if (ui->flags & UBIFS_CRYPT_FL)
1674 stat->attributes |= STATX_ATTR_ENCRYPTED;
1675 if (ui->flags & UBIFS_IMMUTABLE_FL)
1676 stat->attributes |= STATX_ATTR_IMMUTABLE;
1678 stat->attributes_mask |= (STATX_ATTR_APPEND |
1679 STATX_ATTR_COMPRESSED |
1680 STATX_ATTR_ENCRYPTED |
1681 STATX_ATTR_IMMUTABLE);
1683 generic_fillattr(inode, stat);
1684 stat->blksize = UBIFS_BLOCK_SIZE;
1685 stat->size = ui->ui_size;
1688 * Unfortunately, the 'stat()' system call was designed for block
1689 * device based file systems, and it is not appropriate for UBIFS,
1690 * because UBIFS does not have notion of "block". For example, it is
1691 * difficult to tell how many block a directory takes - it actually
1692 * takes less than 300 bytes, but we have to round it to block size,
1693 * which introduces large mistake. This makes utilities like 'du' to
1694 * report completely senseless numbers. This is the reason why UBIFS
1695 * goes the same way as JFFS2 - it reports zero blocks for everything
1696 * but regular files, which makes more sense than reporting completely
1699 if (S_ISREG(inode->i_mode)) {
1700 size = ui->xattr_size;
1702 size = ALIGN(size, UBIFS_BLOCK_SIZE);
1704 * Note, user-space expects 512-byte blocks count irrespectively
1705 * of what was reported in @stat->size.
1707 stat->blocks = size >> 9;
1710 mutex_unlock(&ui->ui_mutex);
1714 static int ubifs_dir_open(struct inode *dir, struct file *file)
1716 if (ubifs_crypt_is_encrypted(dir))
1717 return fscrypt_get_encryption_info(dir) ? -EACCES : 0;
1722 const struct inode_operations ubifs_dir_inode_operations = {
1723 .lookup = ubifs_lookup,
1724 .create = ubifs_create,
1726 .symlink = ubifs_symlink,
1727 .unlink = ubifs_unlink,
1728 .mkdir = ubifs_mkdir,
1729 .rmdir = ubifs_rmdir,
1730 .mknod = ubifs_mknod,
1731 .rename = ubifs_rename,
1732 .setattr = ubifs_setattr,
1733 .getattr = ubifs_getattr,
1734 .listxattr = ubifs_listxattr,
1735 #ifdef CONFIG_UBIFS_ATIME_SUPPORT
1736 .update_time = ubifs_update_time,
1738 .tmpfile = ubifs_tmpfile,
1741 const struct file_operations ubifs_dir_operations = {
1742 .llseek = generic_file_llseek,
1743 .release = ubifs_dir_release,
1744 .read = generic_read_dir,
1745 .iterate_shared = ubifs_readdir,
1746 .fsync = ubifs_fsync,
1747 .unlocked_ioctl = ubifs_ioctl,
1748 .open = ubifs_dir_open,
1749 #ifdef CONFIG_COMPAT
1750 .compat_ioctl = ubifs_compat_ioctl,