dir.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660
  1. /*
  2. * linux/fs/ext4/dir.c
  3. *
  4. * Copyright (C) 1992, 1993, 1994, 1995
  5. * Remy Card (card@masi.ibp.fr)
  6. * Laboratoire MASI - Institut Blaise Pascal
  7. * Universite Pierre et Marie Curie (Paris VI)
  8. *
  9. * from
  10. *
  11. * linux/fs/minix/dir.c
  12. *
  13. * Copyright (C) 1991, 1992 Linus Torvalds
  14. *
  15. * ext4 directory handling functions
  16. *
  17. * Big-endian to little-endian byte-swapping/bitmaps by
  18. * David S. Miller (davem@caip.rutgers.edu), 1995
  19. *
  20. * Hash Tree Directory indexing (c) 2001 Daniel Phillips
  21. *
  22. */
  23. #include <linux/fs.h>
  24. #include <linux/buffer_head.h>
  25. #include <linux/slab.h>
  26. #include "ext4.h"
  27. #include "xattr.h"
  28. static int ext4_dx_readdir(struct file *, struct dir_context *);
  29. /**
  30. * Check if the given dir-inode refers to an htree-indexed directory
  31. * (or a directory which could potentially get converted to use htree
  32. * indexing).
  33. *
  34. * Return 1 if it is a dx dir, 0 if not
  35. */
  36. static int is_dx_dir(struct inode *inode)
  37. {
  38. struct super_block *sb = inode->i_sb;
  39. if (ext4_has_feature_dir_index(inode->i_sb) &&
  40. ((ext4_test_inode_flag(inode, EXT4_INODE_INDEX)) ||
  41. ((inode->i_size >> sb->s_blocksize_bits) == 1) ||
  42. ext4_has_inline_data(inode)))
  43. return 1;
  44. return 0;
  45. }
  46. /*
  47. * Return 0 if the directory entry is OK, and 1 if there is a problem
  48. *
  49. * Note: this is the opposite of what ext2 and ext3 historically returned...
  50. *
  51. * bh passed here can be an inode block or a dir data block, depending
  52. * on the inode inline data flag.
  53. */
  54. int __ext4_check_dir_entry(const char *function, unsigned int line,
  55. struct inode *dir, struct file *filp,
  56. struct ext4_dir_entry_2 *de,
  57. struct buffer_head *bh, char *buf, int size,
  58. unsigned int offset)
  59. {
  60. const char *error_msg = NULL;
  61. const int rlen = ext4_rec_len_from_disk(de->rec_len,
  62. dir->i_sb->s_blocksize);
  63. if (unlikely(rlen < EXT4_DIR_REC_LEN(1)))
  64. error_msg = "rec_len is smaller than minimal";
  65. else if (unlikely(rlen % 4 != 0))
  66. error_msg = "rec_len % 4 != 0";
  67. else if (unlikely(rlen < EXT4_DIR_REC_LEN(de->name_len)))
  68. error_msg = "rec_len is too small for name_len";
  69. else if (unlikely(((char *) de - buf) + rlen > size))
  70. error_msg = "directory entry across range";
  71. else if (unlikely(le32_to_cpu(de->inode) >
  72. le32_to_cpu(EXT4_SB(dir->i_sb)->s_es->s_inodes_count)))
  73. error_msg = "inode out of bounds";
  74. else
  75. return 0;
  76. if (filp)
  77. ext4_error_file(filp, function, line, bh->b_blocknr,
  78. "bad entry in directory: %s - offset=%u(%u), "
  79. "inode=%u, rec_len=%d, name_len=%d",
  80. error_msg, (unsigned) (offset % size),
  81. offset, le32_to_cpu(de->inode),
  82. rlen, de->name_len);
  83. else
  84. ext4_error_inode(dir, function, line, bh->b_blocknr,
  85. "bad entry in directory: %s - offset=%u(%u), "
  86. "inode=%u, rec_len=%d, name_len=%d",
  87. error_msg, (unsigned) (offset % size),
  88. offset, le32_to_cpu(de->inode),
  89. rlen, de->name_len);
  90. return 1;
  91. }
  92. static int ext4_readdir(struct file *file, struct dir_context *ctx)
  93. {
  94. unsigned int offset;
  95. int i;
  96. struct ext4_dir_entry_2 *de;
  97. int err;
  98. struct inode *inode = file_inode(file);
  99. struct super_block *sb = inode->i_sb;
  100. struct buffer_head *bh = NULL;
  101. int dir_has_error = 0;
  102. struct ext4_str fname_crypto_str = {.name = NULL, .len = 0};
  103. if (ext4_encrypted_inode(inode)) {
  104. err = ext4_get_encryption_info(inode);
  105. if (err && err != -ENOKEY)
  106. return err;
  107. }
  108. if (is_dx_dir(inode)) {
  109. err = ext4_dx_readdir(file, ctx);
  110. if (err != ERR_BAD_DX_DIR) {
  111. return err;
  112. }
  113. /*
  114. * We don't set the inode dirty flag since it's not
  115. * critical that it get flushed back to the disk.
  116. */
  117. ext4_clear_inode_flag(file_inode(file),
  118. EXT4_INODE_INDEX);
  119. }
  120. if (ext4_has_inline_data(inode)) {
  121. int has_inline_data = 1;
  122. err = ext4_read_inline_dir(file, ctx,
  123. &has_inline_data);
  124. if (has_inline_data)
  125. return err;
  126. }
  127. if (ext4_encrypted_inode(inode)) {
  128. err = ext4_fname_crypto_alloc_buffer(inode, EXT4_NAME_LEN,
  129. &fname_crypto_str);
  130. if (err < 0)
  131. return err;
  132. }
  133. offset = ctx->pos & (sb->s_blocksize - 1);
  134. while (ctx->pos < inode->i_size) {
  135. struct ext4_map_blocks map;
  136. if (fatal_signal_pending(current)) {
  137. err = -ERESTARTSYS;
  138. goto errout;
  139. }
  140. cond_resched();
  141. map.m_lblk = ctx->pos >> EXT4_BLOCK_SIZE_BITS(sb);
  142. map.m_len = 1;
  143. err = ext4_map_blocks(NULL, inode, &map, 0);
  144. if (err > 0) {
  145. pgoff_t index = map.m_pblk >>
  146. (PAGE_SHIFT - inode->i_blkbits);
  147. if (!ra_has_index(&file->f_ra, index))
  148. page_cache_sync_readahead(
  149. sb->s_bdev->bd_inode->i_mapping,
  150. &file->f_ra, file,
  151. index, 1);
  152. file->f_ra.prev_pos = (loff_t)index << PAGE_SHIFT;
  153. bh = ext4_bread(NULL, inode, map.m_lblk, 0);
  154. if (IS_ERR(bh)) {
  155. err = PTR_ERR(bh);
  156. bh = NULL;
  157. goto errout;
  158. }
  159. }
  160. if (!bh) {
  161. if (!dir_has_error) {
  162. EXT4_ERROR_FILE(file, 0,
  163. "directory contains a "
  164. "hole at offset %llu",
  165. (unsigned long long) ctx->pos);
  166. dir_has_error = 1;
  167. }
  168. /* corrupt size? Maybe no more blocks to read */
  169. if (ctx->pos > inode->i_blocks << 9)
  170. break;
  171. ctx->pos += sb->s_blocksize - offset;
  172. continue;
  173. }
  174. /* Check the checksum */
  175. if (!buffer_verified(bh) &&
  176. !ext4_dirent_csum_verify(inode,
  177. (struct ext4_dir_entry *)bh->b_data)) {
  178. EXT4_ERROR_FILE(file, 0, "directory fails checksum "
  179. "at offset %llu",
  180. (unsigned long long)ctx->pos);
  181. ctx->pos += sb->s_blocksize - offset;
  182. brelse(bh);
  183. bh = NULL;
  184. continue;
  185. }
  186. set_buffer_verified(bh);
  187. /* If the dir block has changed since the last call to
  188. * readdir(2), then we might be pointing to an invalid
  189. * dirent right now. Scan from the start of the block
  190. * to make sure. */
  191. if (file->f_version != inode->i_version) {
  192. for (i = 0; i < sb->s_blocksize && i < offset; ) {
  193. de = (struct ext4_dir_entry_2 *)
  194. (bh->b_data + i);
  195. /* It's too expensive to do a full
  196. * dirent test each time round this
  197. * loop, but we do have to test at
  198. * least that it is non-zero. A
  199. * failure will be detected in the
  200. * dirent test below. */
  201. if (ext4_rec_len_from_disk(de->rec_len,
  202. sb->s_blocksize) < EXT4_DIR_REC_LEN(1))
  203. break;
  204. i += ext4_rec_len_from_disk(de->rec_len,
  205. sb->s_blocksize);
  206. }
  207. offset = i;
  208. ctx->pos = (ctx->pos & ~(sb->s_blocksize - 1))
  209. | offset;
  210. file->f_version = inode->i_version;
  211. }
  212. while (ctx->pos < inode->i_size
  213. && offset < sb->s_blocksize) {
  214. de = (struct ext4_dir_entry_2 *) (bh->b_data + offset);
  215. if (ext4_check_dir_entry(inode, file, de, bh,
  216. bh->b_data, bh->b_size,
  217. offset)) {
  218. /*
  219. * On error, skip to the next block
  220. */
  221. ctx->pos = (ctx->pos |
  222. (sb->s_blocksize - 1)) + 1;
  223. break;
  224. }
  225. offset += ext4_rec_len_from_disk(de->rec_len,
  226. sb->s_blocksize);
  227. if (le32_to_cpu(de->inode)) {
  228. if (!ext4_encrypted_inode(inode)) {
  229. if (!dir_emit(ctx, de->name,
  230. de->name_len,
  231. le32_to_cpu(de->inode),
  232. get_dtype(sb, de->file_type)))
  233. goto done;
  234. } else {
  235. int save_len = fname_crypto_str.len;
  236. /* Directory is encrypted */
  237. err = ext4_fname_disk_to_usr(inode,
  238. NULL, de, &fname_crypto_str);
  239. fname_crypto_str.len = save_len;
  240. if (err < 0)
  241. goto errout;
  242. if (!dir_emit(ctx,
  243. fname_crypto_str.name, err,
  244. le32_to_cpu(de->inode),
  245. get_dtype(sb, de->file_type)))
  246. goto done;
  247. }
  248. }
  249. ctx->pos += ext4_rec_len_from_disk(de->rec_len,
  250. sb->s_blocksize);
  251. }
  252. if ((ctx->pos < inode->i_size) && !dir_relax_shared(inode))
  253. goto done;
  254. brelse(bh);
  255. bh = NULL;
  256. offset = 0;
  257. }
  258. done:
  259. err = 0;
  260. errout:
  261. #ifdef CONFIG_EXT4_FS_ENCRYPTION
  262. ext4_fname_crypto_free_buffer(&fname_crypto_str);
  263. #endif
  264. brelse(bh);
  265. return err;
  266. }
  267. static inline int is_32bit_api(void)
  268. {
  269. #ifdef CONFIG_COMPAT
  270. return in_compat_syscall();
  271. #else
  272. return (BITS_PER_LONG == 32);
  273. #endif
  274. }
  275. /*
  276. * These functions convert from the major/minor hash to an f_pos
  277. * value for dx directories
  278. *
  279. * Upper layer (for example NFS) should specify FMODE_32BITHASH or
  280. * FMODE_64BITHASH explicitly. On the other hand, we allow ext4 to be mounted
  281. * directly on both 32-bit and 64-bit nodes, under such case, neither
  282. * FMODE_32BITHASH nor FMODE_64BITHASH is specified.
  283. */
  284. static inline loff_t hash2pos(struct file *filp, __u32 major, __u32 minor)
  285. {
  286. if ((filp->f_mode & FMODE_32BITHASH) ||
  287. (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api()))
  288. return major >> 1;
  289. else
  290. return ((__u64)(major >> 1) << 32) | (__u64)minor;
  291. }
  292. static inline __u32 pos2maj_hash(struct file *filp, loff_t pos)
  293. {
  294. if ((filp->f_mode & FMODE_32BITHASH) ||
  295. (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api()))
  296. return (pos << 1) & 0xffffffff;
  297. else
  298. return ((pos >> 32) << 1) & 0xffffffff;
  299. }
  300. static inline __u32 pos2min_hash(struct file *filp, loff_t pos)
  301. {
  302. if ((filp->f_mode & FMODE_32BITHASH) ||
  303. (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api()))
  304. return 0;
  305. else
  306. return pos & 0xffffffff;
  307. }
  308. /*
  309. * Return 32- or 64-bit end-of-file for dx directories
  310. */
  311. static inline loff_t ext4_get_htree_eof(struct file *filp)
  312. {
  313. if ((filp->f_mode & FMODE_32BITHASH) ||
  314. (!(filp->f_mode & FMODE_64BITHASH) && is_32bit_api()))
  315. return EXT4_HTREE_EOF_32BIT;
  316. else
  317. return EXT4_HTREE_EOF_64BIT;
  318. }
  319. /*
  320. * ext4_dir_llseek() calls generic_file_llseek_size to handle htree
  321. * directories, where the "offset" is in terms of the filename hash
  322. * value instead of the byte offset.
  323. *
  324. * Because we may return a 64-bit hash that is well beyond offset limits,
  325. * we need to pass the max hash as the maximum allowable offset in
  326. * the htree directory case.
  327. *
  328. * For non-htree, ext4_llseek already chooses the proper max offset.
  329. */
  330. static loff_t ext4_dir_llseek(struct file *file, loff_t offset, int whence)
  331. {
  332. struct inode *inode = file->f_mapping->host;
  333. int dx_dir = is_dx_dir(inode);
  334. loff_t htree_max = ext4_get_htree_eof(file);
  335. if (likely(dx_dir))
  336. return generic_file_llseek_size(file, offset, whence,
  337. htree_max, htree_max);
  338. else
  339. return ext4_llseek(file, offset, whence);
  340. }
  341. /*
  342. * This structure holds the nodes of the red-black tree used to store
  343. * the directory entry in hash order.
  344. */
  345. struct fname {
  346. __u32 hash;
  347. __u32 minor_hash;
  348. struct rb_node rb_hash;
  349. struct fname *next;
  350. __u32 inode;
  351. __u8 name_len;
  352. __u8 file_type;
  353. char name[0];
  354. };
  355. /*
  356. * This functoin implements a non-recursive way of freeing all of the
  357. * nodes in the red-black tree.
  358. */
  359. static void free_rb_tree_fname(struct rb_root *root)
  360. {
  361. struct fname *fname, *next;
  362. rbtree_postorder_for_each_entry_safe(fname, next, root, rb_hash)
  363. while (fname) {
  364. struct fname *old = fname;
  365. fname = fname->next;
  366. kfree(old);
  367. }
  368. *root = RB_ROOT;
  369. }
  370. static struct dir_private_info *ext4_htree_create_dir_info(struct file *filp,
  371. loff_t pos)
  372. {
  373. struct dir_private_info *p;
  374. p = kzalloc(sizeof(struct dir_private_info), GFP_KERNEL);
  375. if (!p)
  376. return NULL;
  377. p->curr_hash = pos2maj_hash(filp, pos);
  378. p->curr_minor_hash = pos2min_hash(filp, pos);
  379. return p;
  380. }
  381. void ext4_htree_free_dir_info(struct dir_private_info *p)
  382. {
  383. free_rb_tree_fname(&p->root);
  384. kfree(p);
  385. }
  386. /*
  387. * Given a directory entry, enter it into the fname rb tree.
  388. *
  389. * When filename encryption is enabled, the dirent will hold the
  390. * encrypted filename, while the htree will hold decrypted filename.
  391. * The decrypted filename is passed in via ent_name. parameter.
  392. */
  393. int ext4_htree_store_dirent(struct file *dir_file, __u32 hash,
  394. __u32 minor_hash,
  395. struct ext4_dir_entry_2 *dirent,
  396. struct ext4_str *ent_name)
  397. {
  398. struct rb_node **p, *parent = NULL;
  399. struct fname *fname, *new_fn;
  400. struct dir_private_info *info;
  401. int len;
  402. info = dir_file->private_data;
  403. p = &info->root.rb_node;
  404. /* Create and allocate the fname structure */
  405. len = sizeof(struct fname) + ent_name->len + 1;
  406. new_fn = kzalloc(len, GFP_KERNEL);
  407. if (!new_fn)
  408. return -ENOMEM;
  409. new_fn->hash = hash;
  410. new_fn->minor_hash = minor_hash;
  411. new_fn->inode = le32_to_cpu(dirent->inode);
  412. new_fn->name_len = ent_name->len;
  413. new_fn->file_type = dirent->file_type;
  414. memcpy(new_fn->name, ent_name->name, ent_name->len);
  415. new_fn->name[ent_name->len] = 0;
  416. while (*p) {
  417. parent = *p;
  418. fname = rb_entry(parent, struct fname, rb_hash);
  419. /*
  420. * If the hash and minor hash match up, then we put
  421. * them on a linked list. This rarely happens...
  422. */
  423. if ((new_fn->hash == fname->hash) &&
  424. (new_fn->minor_hash == fname->minor_hash)) {
  425. new_fn->next = fname->next;
  426. fname->next = new_fn;
  427. return 0;
  428. }
  429. if (new_fn->hash < fname->hash)
  430. p = &(*p)->rb_left;
  431. else if (new_fn->hash > fname->hash)
  432. p = &(*p)->rb_right;
  433. else if (new_fn->minor_hash < fname->minor_hash)
  434. p = &(*p)->rb_left;
  435. else /* if (new_fn->minor_hash > fname->minor_hash) */
  436. p = &(*p)->rb_right;
  437. }
  438. rb_link_node(&new_fn->rb_hash, parent, p);
  439. rb_insert_color(&new_fn->rb_hash, &info->root);
  440. return 0;
  441. }
  442. /*
  443. * This is a helper function for ext4_dx_readdir. It calls filldir
  444. * for all entres on the fname linked list. (Normally there is only
  445. * one entry on the linked list, unless there are 62 bit hash collisions.)
  446. */
  447. static int call_filldir(struct file *file, struct dir_context *ctx,
  448. struct fname *fname)
  449. {
  450. struct dir_private_info *info = file->private_data;
  451. struct inode *inode = file_inode(file);
  452. struct super_block *sb = inode->i_sb;
  453. if (!fname) {
  454. ext4_msg(sb, KERN_ERR, "%s:%d: inode #%lu: comm %s: "
  455. "called with null fname?!?", __func__, __LINE__,
  456. inode->i_ino, current->comm);
  457. return 0;
  458. }
  459. ctx->pos = hash2pos(file, fname->hash, fname->minor_hash);
  460. while (fname) {
  461. if (!dir_emit(ctx, fname->name,
  462. fname->name_len,
  463. fname->inode,
  464. get_dtype(sb, fname->file_type))) {
  465. info->extra_fname = fname;
  466. return 1;
  467. }
  468. fname = fname->next;
  469. }
  470. return 0;
  471. }
  472. static int ext4_dx_readdir(struct file *file, struct dir_context *ctx)
  473. {
  474. struct dir_private_info *info = file->private_data;
  475. struct inode *inode = file_inode(file);
  476. struct fname *fname;
  477. int ret;
  478. if (!info) {
  479. info = ext4_htree_create_dir_info(file, ctx->pos);
  480. if (!info)
  481. return -ENOMEM;
  482. file->private_data = info;
  483. }
  484. if (ctx->pos == ext4_get_htree_eof(file))
  485. return 0; /* EOF */
  486. /* Some one has messed with f_pos; reset the world */
  487. if (info->last_pos != ctx->pos) {
  488. free_rb_tree_fname(&info->root);
  489. info->curr_node = NULL;
  490. info->extra_fname = NULL;
  491. info->curr_hash = pos2maj_hash(file, ctx->pos);
  492. info->curr_minor_hash = pos2min_hash(file, ctx->pos);
  493. }
  494. /*
  495. * If there are any leftover names on the hash collision
  496. * chain, return them first.
  497. */
  498. if (info->extra_fname) {
  499. if (call_filldir(file, ctx, info->extra_fname))
  500. goto finished;
  501. info->extra_fname = NULL;
  502. goto next_node;
  503. } else if (!info->curr_node)
  504. info->curr_node = rb_first(&info->root);
  505. while (1) {
  506. /*
  507. * Fill the rbtree if we have no more entries,
  508. * or the inode has changed since we last read in the
  509. * cached entries.
  510. */
  511. if ((!info->curr_node) ||
  512. (file->f_version != inode->i_version)) {
  513. info->curr_node = NULL;
  514. free_rb_tree_fname(&info->root);
  515. file->f_version = inode->i_version;
  516. ret = ext4_htree_fill_tree(file, info->curr_hash,
  517. info->curr_minor_hash,
  518. &info->next_hash);
  519. if (ret < 0)
  520. return ret;
  521. if (ret == 0) {
  522. ctx->pos = ext4_get_htree_eof(file);
  523. break;
  524. }
  525. info->curr_node = rb_first(&info->root);
  526. }
  527. fname = rb_entry(info->curr_node, struct fname, rb_hash);
  528. info->curr_hash = fname->hash;
  529. info->curr_minor_hash = fname->minor_hash;
  530. if (call_filldir(file, ctx, fname))
  531. break;
  532. next_node:
  533. info->curr_node = rb_next(info->curr_node);
  534. if (info->curr_node) {
  535. fname = rb_entry(info->curr_node, struct fname,
  536. rb_hash);
  537. info->curr_hash = fname->hash;
  538. info->curr_minor_hash = fname->minor_hash;
  539. } else {
  540. if (info->next_hash == ~0) {
  541. ctx->pos = ext4_get_htree_eof(file);
  542. break;
  543. }
  544. info->curr_hash = info->next_hash;
  545. info->curr_minor_hash = 0;
  546. }
  547. }
  548. finished:
  549. info->last_pos = ctx->pos;
  550. return 0;
  551. }
  552. static int ext4_dir_open(struct inode * inode, struct file * filp)
  553. {
  554. if (ext4_encrypted_inode(inode))
  555. return ext4_get_encryption_info(inode) ? -EACCES : 0;
  556. return 0;
  557. }
  558. static int ext4_release_dir(struct inode *inode, struct file *filp)
  559. {
  560. if (filp->private_data)
  561. ext4_htree_free_dir_info(filp->private_data);
  562. return 0;
  563. }
  564. int ext4_check_all_de(struct inode *dir, struct buffer_head *bh, void *buf,
  565. int buf_size)
  566. {
  567. struct ext4_dir_entry_2 *de;
  568. int nlen, rlen;
  569. unsigned int offset = 0;
  570. char *top;
  571. de = (struct ext4_dir_entry_2 *)buf;
  572. top = buf + buf_size;
  573. while ((char *) de < top) {
  574. if (ext4_check_dir_entry(dir, NULL, de, bh,
  575. buf, buf_size, offset))
  576. return -EFSCORRUPTED;
  577. nlen = EXT4_DIR_REC_LEN(de->name_len);
  578. rlen = ext4_rec_len_from_disk(de->rec_len, buf_size);
  579. de = (struct ext4_dir_entry_2 *)((char *)de + rlen);
  580. offset += rlen;
  581. }
  582. if ((char *) de > top)
  583. return -EFSCORRUPTED;
  584. return 0;
  585. }
  586. const struct file_operations ext4_dir_operations = {
  587. .llseek = ext4_dir_llseek,
  588. .read = generic_read_dir,
  589. .iterate_shared = ext4_readdir,
  590. .unlocked_ioctl = ext4_ioctl,
  591. #ifdef CONFIG_COMPAT
  592. .compat_ioctl = ext4_compat_ioctl,
  593. #endif
  594. .fsync = ext4_sync_file,
  595. .open = ext4_dir_open,
  596. .release = ext4_release_dir,
  597. };