1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22 /*
23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
25 */
26
27 /*
28 * Copyright (c) 2012, Joyent, Inc. All rights reserved.
29 * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
30 */
31
32 #include <sys/types.h>
33 #include <sys/param.h>
34 #include <sys/t_lock.h>
35 #include <sys/systm.h>
36 #include <sys/sysmacros.h>
37 #include <sys/user.h>
38 #include <sys/time.h>
39 #include <sys/vfs.h>
40 #include <sys/vfs_opreg.h>
41 #include <sys/vnode.h>
42 #include <sys/file.h>
43 #include <sys/fcntl.h>
44 #include <sys/flock.h>
45 #include <sys/kmem.h>
46 #include <sys/uio.h>
47 #include <sys/errno.h>
48 #include <sys/stat.h>
49 #include <sys/cred.h>
50 #include <sys/dirent.h>
51 #include <sys/pathname.h>
52 #include <sys/vmsystm.h>
53 #include <sys/fs/tmp.h>
54 #include <sys/fs/tmpnode.h>
55 #include <sys/mman.h>
56 #include <vm/hat.h>
57 #include <vm/seg_vn.h>
58 #include <vm/seg_map.h>
59 #include <vm/seg.h>
60 #include <vm/anon.h>
61 #include <vm/as.h>
62 #include <vm/page.h>
63 #include <vm/pvn.h>
64 #include <sys/cmn_err.h>
65 #include <sys/debug.h>
66 #include <sys/swap.h>
67 #include <sys/buf.h>
68 #include <sys/vm.h>
69 #include <sys/vtrace.h>
70 #include <sys/policy.h>
71 #include <fs/fs_subr.h>
72
73 static int tmp_getapage(struct vnode *, u_offset_t, size_t, uint_t *,
74 page_t **, size_t, struct seg *, caddr_t, enum seg_rw, struct cred *);
75 static int tmp_putapage(struct vnode *, page_t *, u_offset_t *, size_t *,
76 int, struct cred *);
77
78 /* ARGSUSED1 */
79 static int
tmp_open(struct vnode ** vpp,int flag,struct cred * cred,caller_context_t * ct)80 tmp_open(struct vnode **vpp, int flag, struct cred *cred, caller_context_t *ct)
81 {
82 /*
83 * swapon to a tmpfs file is not supported so access
84 * is denied on open if VISSWAP is set.
85 */
86 if ((*vpp)->v_flag & VISSWAP)
87 return (EINVAL);
88 return (0);
89 }
90
91 /* ARGSUSED1 */
92 static int
tmp_close(struct vnode * vp,int flag,int count,offset_t offset,struct cred * cred,caller_context_t * ct)93 tmp_close(
94 struct vnode *vp,
95 int flag,
96 int count,
97 offset_t offset,
98 struct cred *cred,
99 caller_context_t *ct)
100 {
101 cleanlocks(vp, ttoproc(curthread)->p_pid, 0);
102 cleanshares(vp, ttoproc(curthread)->p_pid);
103 return (0);
104 }
105
106 /*
107 * wrtmp does the real work of write requests for tmpfs.
108 */
109 static int
wrtmp(struct tmount * tm,struct tmpnode * tp,struct uio * uio,struct cred * cr,struct caller_context * ct)110 wrtmp(
111 struct tmount *tm,
112 struct tmpnode *tp,
113 struct uio *uio,
114 struct cred *cr,
115 struct caller_context *ct)
116 {
117 pgcnt_t pageoffset; /* offset in pages */
118 ulong_t segmap_offset; /* pagesize byte offset into segmap */
119 caddr_t base; /* base of segmap */
120 ssize_t bytes; /* bytes to uiomove */
121 pfn_t pagenumber; /* offset in pages into tmp file */
122 struct vnode *vp;
123 int error = 0;
124 int pagecreate; /* == 1 if we allocated a page */
125 int newpage;
126 rlim64_t limit = uio->uio_llimit;
127 long oresid = uio->uio_resid;
128 timestruc_t now;
129
130 long tn_size_changed = 0;
131 long old_tn_size;
132 long new_tn_size;
133
134 vp = TNTOV(tp);
135 ASSERT(vp->v_type == VREG);
136
137 TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START,
138 "tmp_wrtmp_start:vp %p", vp);
139
140 ASSERT(RW_WRITE_HELD(&tp->tn_contents));
141 ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
142
143 if (MANDLOCK(vp, tp->tn_mode)) {
144 rw_exit(&tp->tn_contents);
145 /*
146 * tmp_getattr ends up being called by chklock
147 */
148 error = chklock(vp, FWRITE, uio->uio_loffset, uio->uio_resid,
149 uio->uio_fmode, ct);
150 rw_enter(&tp->tn_contents, RW_WRITER);
151 if (error != 0) {
152 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
153 "tmp_wrtmp_end:vp %p error %d", vp, error);
154 return (error);
155 }
156 }
157
158 if (uio->uio_loffset < 0)
159 return (EINVAL);
160
161 if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
162 limit = MAXOFFSET_T;
163
164 if (uio->uio_loffset >= limit) {
165 proc_t *p = ttoproc(curthread);
166
167 mutex_enter(&p->p_lock);
168 (void) rctl_action(rctlproc_legacy[RLIMIT_FSIZE], p->p_rctls,
169 p, RCA_UNSAFE_SIGINFO);
170 mutex_exit(&p->p_lock);
171 return (EFBIG);
172 }
173
174 if (uio->uio_loffset >= MAXOFF_T) {
175 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
176 "tmp_wrtmp_end:vp %p error %d", vp, EINVAL);
177 return (EFBIG);
178 }
179
180 if (uio->uio_resid == 0) {
181 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
182 "tmp_wrtmp_end:vp %p error %d", vp, 0);
183 return (0);
184 }
185
186 if (limit > MAXOFF_T)
187 limit = MAXOFF_T;
188
189 do {
190 long offset;
191 long delta;
192
193 offset = (long)uio->uio_offset;
194 pageoffset = offset & PAGEOFFSET;
195 /*
196 * A maximum of PAGESIZE bytes of data is transferred
197 * each pass through this loop
198 */
199 bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
200
201 if (offset + bytes >= limit) {
202 if (offset >= limit) {
203 error = EFBIG;
204 goto out;
205 }
206 bytes = limit - offset;
207 }
208 pagenumber = btop(offset);
209
210 /*
211 * delta is the amount of anonymous memory
212 * to reserve for the file.
213 * We always reserve in pagesize increments so
214 * unless we're extending the file into a new page,
215 * we don't need to call tmp_resv.
216 */
217 delta = offset + bytes -
218 P2ROUNDUP_TYPED(tp->tn_size, PAGESIZE, u_offset_t);
219 if (delta > 0) {
220 pagecreate = 1;
221 if (tmp_resv(tm, tp, delta, pagecreate)) {
222 /*
223 * Log file system full in the zone that owns
224 * the tmpfs mount, as well as in the global
225 * zone if necessary.
226 */
227 zcmn_err(tm->tm_vfsp->vfs_zone->zone_id,
228 CE_WARN, "%s: File system full, "
229 "swap space limit exceeded",
230 tm->tm_mntpath);
231
232 if (tm->tm_vfsp->vfs_zone->zone_id !=
233 GLOBAL_ZONEID) {
234
235 vfs_t *vfs = tm->tm_vfsp;
236
237 zcmn_err(GLOBAL_ZONEID,
238 CE_WARN, "%s: File system full, "
239 "swap space limit exceeded",
240 vfs->vfs_vnodecovered->v_path);
241 }
242 error = ENOSPC;
243 break;
244 }
245 tmpnode_growmap(tp, (ulong_t)offset + bytes);
246 }
247 /* grow the file to the new length */
248 if (offset + bytes > tp->tn_size) {
249 tn_size_changed = 1;
250 old_tn_size = tp->tn_size;
251 /*
252 * Postpone updating tp->tn_size until uiomove() is
253 * done.
254 */
255 new_tn_size = offset + bytes;
256 }
257 if (bytes == PAGESIZE) {
258 /*
259 * Writing whole page so reading from disk
260 * is a waste
261 */
262 pagecreate = 1;
263 } else {
264 pagecreate = 0;
265 }
266 /*
267 * If writing past EOF or filling in a hole
268 * we need to allocate an anon slot.
269 */
270 if (anon_get_ptr(tp->tn_anon, pagenumber) == NULL) {
271 (void) anon_set_ptr(tp->tn_anon, pagenumber,
272 anon_alloc(vp, ptob(pagenumber)), ANON_SLEEP);
273 pagecreate = 1;
274 tp->tn_nblocks++;
275 }
276
277 /*
278 * We have to drop the contents lock to allow the VM
279 * system to reacquire it in tmp_getpage()
280 */
281 rw_exit(&tp->tn_contents);
282
283 /*
284 * Touch the page and fault it in if it is not in core
285 * before segmap_getmapflt or vpm_data_copy can lock it.
286 * This is to avoid the deadlock if the buffer is mapped
287 * to the same file through mmap which we want to write.
288 */
289 uio_prefaultpages((long)bytes, uio);
290
291 newpage = 0;
292 if (vpm_enable) {
293 /*
294 * Copy data. If new pages are created, part of
295 * the page that is not written will be initizliazed
296 * with zeros.
297 */
298 error = vpm_data_copy(vp, offset, bytes, uio,
299 !pagecreate, &newpage, 1, S_WRITE);
300 } else {
301 /* Get offset within the segmap mapping */
302 segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
303 base = segmap_getmapflt(segkmap, vp,
304 (offset & MAXBMASK), PAGESIZE, !pagecreate,
305 S_WRITE);
306 }
307
308
309 if (!vpm_enable && pagecreate) {
310 /*
311 * segmap_pagecreate() returns 1 if it calls
312 * page_create_va() to allocate any pages.
313 */
314 newpage = segmap_pagecreate(segkmap,
315 base + segmap_offset, (size_t)PAGESIZE, 0);
316 /*
317 * Clear from the beginning of the page to the starting
318 * offset of the data.
319 */
320 if (pageoffset != 0)
321 (void) kzero(base + segmap_offset,
322 (size_t)pageoffset);
323 }
324
325 if (!vpm_enable) {
326 error = uiomove(base + segmap_offset + pageoffset,
327 (long)bytes, UIO_WRITE, uio);
328 }
329
330 if (!vpm_enable && pagecreate &&
331 uio->uio_offset < P2ROUNDUP(offset + bytes, PAGESIZE)) {
332 long zoffset; /* zero from offset into page */
333 /*
334 * We created pages w/o initializing them completely,
335 * thus we need to zero the part that wasn't set up.
336 * This happens on most EOF write cases and if
337 * we had some sort of error during the uiomove.
338 */
339 long nmoved;
340
341 nmoved = uio->uio_offset - offset;
342 ASSERT((nmoved + pageoffset) <= PAGESIZE);
343
344 /*
345 * Zero from the end of data in the page to the
346 * end of the page.
347 */
348 if ((zoffset = pageoffset + nmoved) < PAGESIZE)
349 (void) kzero(base + segmap_offset + zoffset,
350 (size_t)PAGESIZE - zoffset);
351 }
352
353 /*
354 * Unlock the pages which have been allocated by
355 * page_create_va() in segmap_pagecreate()
356 */
357 if (!vpm_enable && newpage) {
358 segmap_pageunlock(segkmap, base + segmap_offset,
359 (size_t)PAGESIZE, S_WRITE);
360 }
361
362 if (error) {
363 /*
364 * If we failed on a write, we must
365 * be sure to invalidate any pages that may have
366 * been allocated.
367 */
368 if (vpm_enable) {
369 (void) vpm_sync_pages(vp, offset, PAGESIZE,
370 SM_INVAL);
371 } else {
372 (void) segmap_release(segkmap, base, SM_INVAL);
373 }
374 } else {
375 if (vpm_enable) {
376 error = vpm_sync_pages(vp, offset, PAGESIZE,
377 0);
378 } else {
379 error = segmap_release(segkmap, base, 0);
380 }
381 }
382
383 /*
384 * Re-acquire contents lock.
385 */
386 rw_enter(&tp->tn_contents, RW_WRITER);
387
388 /*
389 * Update tn_size.
390 */
391 if (tn_size_changed)
392 tp->tn_size = new_tn_size;
393
394 /*
395 * If the uiomove failed, fix up tn_size.
396 */
397 if (error) {
398 if (tn_size_changed) {
399 /*
400 * The uiomove failed, and we
401 * allocated blocks,so get rid
402 * of them.
403 */
404 (void) tmpnode_trunc(tm, tp,
405 (ulong_t)old_tn_size);
406 }
407 } else {
408 /*
409 * XXX - Can this be out of the loop?
410 */
411 if ((tp->tn_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) &&
412 (tp->tn_mode & (S_ISUID | S_ISGID)) &&
413 secpolicy_vnode_setid_retain(cr,
414 (tp->tn_mode & S_ISUID) != 0 && tp->tn_uid == 0)) {
415 /*
416 * Clear Set-UID & Set-GID bits on
417 * successful write if not privileged
418 * and at least one of the execute bits
419 * is set. If we always clear Set-GID,
420 * mandatory file and record locking is
421 * unuseable.
422 */
423 tp->tn_mode &= ~(S_ISUID | S_ISGID);
424 }
425 gethrestime(&now);
426 tp->tn_mtime = now;
427 tp->tn_ctime = now;
428 }
429 } while (error == 0 && uio->uio_resid > 0 && bytes != 0);
430
431 out:
432 /*
433 * If we've already done a partial-write, terminate
434 * the write but return no error.
435 */
436 if (oresid != uio->uio_resid)
437 error = 0;
438 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
439 "tmp_wrtmp_end:vp %p error %d", vp, error);
440 return (error);
441 }
442
443 /*
444 * rdtmp does the real work of read requests for tmpfs.
445 */
446 static int
rdtmp(struct tmount * tm,struct tmpnode * tp,struct uio * uio,struct caller_context * ct)447 rdtmp(
448 struct tmount *tm,
449 struct tmpnode *tp,
450 struct uio *uio,
451 struct caller_context *ct)
452 {
453 ulong_t pageoffset; /* offset in tmpfs file (uio_offset) */
454 ulong_t segmap_offset; /* pagesize byte offset into segmap */
455 caddr_t base; /* base of segmap */
456 ssize_t bytes; /* bytes to uiomove */
457 struct vnode *vp;
458 int error;
459 long oresid = uio->uio_resid;
460
461 #if defined(lint)
462 tm = tm;
463 #endif
464 vp = TNTOV(tp);
465
466 TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START, "tmp_rdtmp_start:vp %p",
467 vp);
468
469 ASSERT(RW_LOCK_HELD(&tp->tn_contents));
470
471 if (MANDLOCK(vp, tp->tn_mode)) {
472 rw_exit(&tp->tn_contents);
473 /*
474 * tmp_getattr ends up being called by chklock
475 */
476 error = chklock(vp, FREAD, uio->uio_loffset, uio->uio_resid,
477 uio->uio_fmode, ct);
478 rw_enter(&tp->tn_contents, RW_READER);
479 if (error != 0) {
480 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
481 "tmp_rdtmp_end:vp %p error %d", vp, error);
482 return (error);
483 }
484 }
485 ASSERT(tp->tn_type == VREG);
486
487 if (uio->uio_loffset >= MAXOFF_T) {
488 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
489 "tmp_rdtmp_end:vp %p error %d", vp, EINVAL);
490 return (0);
491 }
492 if (uio->uio_loffset < 0)
493 return (EINVAL);
494 if (uio->uio_resid == 0) {
495 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
496 "tmp_rdtmp_end:vp %p error %d", vp, 0);
497 return (0);
498 }
499
500 vp = TNTOV(tp);
501
502 do {
503 long diff;
504 long offset;
505
506 offset = uio->uio_offset;
507 pageoffset = offset & PAGEOFFSET;
508 bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
509
510 diff = tp->tn_size - offset;
511
512 if (diff <= 0) {
513 error = 0;
514 goto out;
515 }
516 if (diff < bytes)
517 bytes = diff;
518
519 /*
520 * We have to drop the contents lock to allow the VM system
521 * to reacquire it in tmp_getpage() should the uiomove cause a
522 * pagefault.
523 */
524 rw_exit(&tp->tn_contents);
525
526 if (vpm_enable) {
527 /*
528 * Copy data.
529 */
530 error = vpm_data_copy(vp, offset, bytes, uio, 1, NULL,
531 0, S_READ);
532 } else {
533 segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
534 base = segmap_getmapflt(segkmap, vp, offset & MAXBMASK,
535 bytes, 1, S_READ);
536
537 error = uiomove(base + segmap_offset + pageoffset,
538 (long)bytes, UIO_READ, uio);
539 }
540
541 if (error) {
542 if (vpm_enable) {
543 (void) vpm_sync_pages(vp, offset, PAGESIZE, 0);
544 } else {
545 (void) segmap_release(segkmap, base, 0);
546 }
547 } else {
548 if (vpm_enable) {
549 error = vpm_sync_pages(vp, offset, PAGESIZE,
550 0);
551 } else {
552 error = segmap_release(segkmap, base, 0);
553 }
554 }
555
556 /*
557 * Re-acquire contents lock.
558 */
559 rw_enter(&tp->tn_contents, RW_READER);
560
561 } while (error == 0 && uio->uio_resid > 0);
562
563 out:
564 gethrestime(&tp->tn_atime);
565
566 /*
567 * If we've already done a partial read, terminate
568 * the read but return no error.
569 */
570 if (oresid != uio->uio_resid)
571 error = 0;
572
573 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
574 "tmp_rdtmp_end:vp %x error %d", vp, error);
575 return (error);
576 }
577
578 /* ARGSUSED2 */
579 static int
tmp_read(struct vnode * vp,struct uio * uiop,int ioflag,cred_t * cred,struct caller_context * ct)580 tmp_read(struct vnode *vp, struct uio *uiop, int ioflag, cred_t *cred,
581 struct caller_context *ct)
582 {
583 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
584 struct tmount *tm = (struct tmount *)VTOTM(vp);
585 int error;
586
587 /*
588 * We don't currently support reading non-regular files
589 */
590 if (vp->v_type == VDIR)
591 return (EISDIR);
592 if (vp->v_type != VREG)
593 return (EINVAL);
594 /*
595 * tmp_rwlock should have already been called from layers above
596 */
597 ASSERT(RW_READ_HELD(&tp->tn_rwlock));
598
599 rw_enter(&tp->tn_contents, RW_READER);
600
601 error = rdtmp(tm, tp, uiop, ct);
602
603 rw_exit(&tp->tn_contents);
604
605 return (error);
606 }
607
608 static int
tmp_write(struct vnode * vp,struct uio * uiop,int ioflag,struct cred * cred,struct caller_context * ct)609 tmp_write(struct vnode *vp, struct uio *uiop, int ioflag, struct cred *cred,
610 struct caller_context *ct)
611 {
612 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
613 struct tmount *tm = (struct tmount *)VTOTM(vp);
614 int error;
615
616 /*
617 * We don't currently support writing to non-regular files
618 */
619 if (vp->v_type != VREG)
620 return (EINVAL); /* XXX EISDIR? */
621
622 /*
623 * tmp_rwlock should have already been called from layers above
624 */
625 ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
626
627 rw_enter(&tp->tn_contents, RW_WRITER);
628
629 if (ioflag & FAPPEND) {
630 /*
631 * In append mode start at end of file.
632 */
633 uiop->uio_loffset = tp->tn_size;
634 }
635
636 error = wrtmp(tm, tp, uiop, cred, ct);
637
638 rw_exit(&tp->tn_contents);
639
640 return (error);
641 }
642
643 /* ARGSUSED */
644 static int
tmp_ioctl(struct vnode * vp,int com,intptr_t data,int flag,struct cred * cred,int * rvalp,caller_context_t * ct)645 tmp_ioctl(
646 struct vnode *vp,
647 int com,
648 intptr_t data,
649 int flag,
650 struct cred *cred,
651 int *rvalp,
652 caller_context_t *ct)
653 {
654 return (ENOTTY);
655 }
656
657 /* ARGSUSED2 */
658 static int
tmp_getattr(struct vnode * vp,struct vattr * vap,int flags,struct cred * cred,caller_context_t * ct)659 tmp_getattr(
660 struct vnode *vp,
661 struct vattr *vap,
662 int flags,
663 struct cred *cred,
664 caller_context_t *ct)
665 {
666 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
667 struct vnode *mvp;
668 struct vattr va;
669 int attrs = 1;
670
671 /*
672 * A special case to handle the root tnode on a diskless nfs
673 * client who may have had its uid and gid inherited
674 * from an nfs vnode with nobody ownership. Likely the
675 * root filesystem. After nfs is fully functional the uid/gid
676 * may be mapable so ask again.
677 * vfsp can't get unmounted because we hold vp.
678 */
679 if (vp->v_flag & VROOT &&
680 (mvp = vp->v_vfsp->vfs_vnodecovered) != NULL) {
681 mutex_enter(&tp->tn_tlock);
682 if (tp->tn_uid == UID_NOBODY || tp->tn_gid == GID_NOBODY) {
683 mutex_exit(&tp->tn_tlock);
684 bzero(&va, sizeof (struct vattr));
685 va.va_mask = AT_UID|AT_GID;
686 attrs = VOP_GETATTR(mvp, &va, 0, cred, ct);
687 } else {
688 mutex_exit(&tp->tn_tlock);
689 }
690 }
691 mutex_enter(&tp->tn_tlock);
692 if (attrs == 0) {
693 tp->tn_uid = va.va_uid;
694 tp->tn_gid = va.va_gid;
695 }
696 vap->va_type = vp->v_type;
697 vap->va_mode = tp->tn_mode & MODEMASK;
698 vap->va_uid = tp->tn_uid;
699 vap->va_gid = tp->tn_gid;
700 vap->va_fsid = tp->tn_fsid;
701 vap->va_nodeid = (ino64_t)tp->tn_nodeid;
702 vap->va_nlink = tp->tn_nlink;
703 vap->va_size = (u_offset_t)tp->tn_size;
704 vap->va_atime = tp->tn_atime;
705 vap->va_mtime = tp->tn_mtime;
706 vap->va_ctime = tp->tn_ctime;
707 vap->va_blksize = PAGESIZE;
708 vap->va_rdev = tp->tn_rdev;
709 vap->va_seq = tp->tn_seq;
710
711 /*
712 * XXX Holes are not taken into account. We could take the time to
713 * run through the anon array looking for allocated slots...
714 */
715 vap->va_nblocks = (fsblkcnt64_t)btodb(ptob(btopr(vap->va_size)));
716 mutex_exit(&tp->tn_tlock);
717 return (0);
718 }
719
720 /*ARGSUSED4*/
721 static int
tmp_setattr(struct vnode * vp,struct vattr * vap,int flags,struct cred * cred,caller_context_t * ct)722 tmp_setattr(
723 struct vnode *vp,
724 struct vattr *vap,
725 int flags,
726 struct cred *cred,
727 caller_context_t *ct)
728 {
729 struct tmount *tm = (struct tmount *)VTOTM(vp);
730 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
731 int error = 0;
732 struct vattr *get;
733 long mask;
734
735 /*
736 * Cannot set these attributes
737 */
738 if ((vap->va_mask & AT_NOSET) || (vap->va_mask & AT_XVATTR))
739 return (EINVAL);
740
741 mutex_enter(&tp->tn_tlock);
742
743 get = &tp->tn_attr;
744 /*
745 * Change file access modes. Must be owner or have sufficient
746 * privileges.
747 */
748 error = secpolicy_vnode_setattr(cred, vp, vap, get, flags, tmp_taccess,
749 tp);
750
751 if (error)
752 goto out;
753
754 mask = vap->va_mask;
755
756 if (mask & AT_MODE) {
757 get->va_mode &= S_IFMT;
758 get->va_mode |= vap->va_mode & ~S_IFMT;
759 }
760
761 if (mask & AT_UID)
762 get->va_uid = vap->va_uid;
763 if (mask & AT_GID)
764 get->va_gid = vap->va_gid;
765 if (mask & AT_ATIME)
766 get->va_atime = vap->va_atime;
767 if (mask & AT_MTIME)
768 get->va_mtime = vap->va_mtime;
769
770 if (mask & (AT_UID | AT_GID | AT_MODE | AT_MTIME))
771 gethrestime(&tp->tn_ctime);
772
773 if (mask & AT_SIZE) {
774 ASSERT(vp->v_type != VDIR);
775
776 /* Don't support large files. */
777 if (vap->va_size > MAXOFF_T) {
778 error = EFBIG;
779 goto out;
780 }
781 mutex_exit(&tp->tn_tlock);
782
783 rw_enter(&tp->tn_rwlock, RW_WRITER);
784 rw_enter(&tp->tn_contents, RW_WRITER);
785 error = tmpnode_trunc(tm, tp, (ulong_t)vap->va_size);
786 rw_exit(&tp->tn_contents);
787 rw_exit(&tp->tn_rwlock);
788
789 if (error == 0 && vap->va_size == 0)
790 vnevent_truncate(vp, ct);
791
792 goto out1;
793 }
794 out:
795 mutex_exit(&tp->tn_tlock);
796 out1:
797 return (error);
798 }
799
800 /* ARGSUSED2 */
801 static int
tmp_access(struct vnode * vp,int mode,int flags,struct cred * cred,caller_context_t * ct)802 tmp_access(
803 struct vnode *vp,
804 int mode,
805 int flags,
806 struct cred *cred,
807 caller_context_t *ct)
808 {
809 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
810 int error;
811
812 mutex_enter(&tp->tn_tlock);
813 error = tmp_taccess(tp, mode, cred);
814 mutex_exit(&tp->tn_tlock);
815 return (error);
816 }
817
818 /* ARGSUSED3 */
819 static int
tmp_lookup(struct vnode * dvp,char * nm,struct vnode ** vpp,struct pathname * pnp,int flags,struct vnode * rdir,struct cred * cred,caller_context_t * ct,int * direntflags,pathname_t * realpnp)820 tmp_lookup(
821 struct vnode *dvp,
822 char *nm,
823 struct vnode **vpp,
824 struct pathname *pnp,
825 int flags,
826 struct vnode *rdir,
827 struct cred *cred,
828 caller_context_t *ct,
829 int *direntflags,
830 pathname_t *realpnp)
831 {
832 struct tmpnode *tp = (struct tmpnode *)VTOTN(dvp);
833 struct tmpnode *ntp = NULL;
834 int error;
835
836
837 /* allow cd into @ dir */
838 if (flags & LOOKUP_XATTR) {
839 struct tmpnode *xdp;
840 struct tmount *tm;
841
842 /*
843 * don't allow attributes if not mounted XATTR support
844 */
845 if (!(dvp->v_vfsp->vfs_flag & VFS_XATTR))
846 return (EINVAL);
847
848 if (tp->tn_flags & ISXATTR)
849 /* No attributes on attributes */
850 return (EINVAL);
851
852 rw_enter(&tp->tn_rwlock, RW_WRITER);
853 if (tp->tn_xattrdp == NULL) {
854 if (!(flags & CREATE_XATTR_DIR)) {
855 rw_exit(&tp->tn_rwlock);
856 return (ENOENT);
857 }
858
859 /*
860 * No attribute directory exists for this
861 * node - create the attr dir as a side effect
862 * of this lookup.
863 */
864
865 /*
866 * Make sure we have adequate permission...
867 */
868
869 if ((error = tmp_taccess(tp, VWRITE, cred)) != 0) {
870 rw_exit(&tp->tn_rwlock);
871 return (error);
872 }
873
874 xdp = tmp_memalloc(sizeof (struct tmpnode),
875 TMP_MUSTHAVE);
876 tm = VTOTM(dvp);
877 tmpnode_init(tm, xdp, &tp->tn_attr, NULL);
878 /*
879 * Fix-up fields unique to attribute directories.
880 */
881 xdp->tn_flags = ISXATTR;
882 xdp->tn_type = VDIR;
883 if (tp->tn_type == VDIR) {
884 xdp->tn_mode = tp->tn_attr.va_mode;
885 } else {
886 xdp->tn_mode = 0700;
887 if (tp->tn_attr.va_mode & 0040)
888 xdp->tn_mode |= 0750;
889 if (tp->tn_attr.va_mode & 0004)
890 xdp->tn_mode |= 0705;
891 }
892 xdp->tn_vnode->v_type = VDIR;
893 xdp->tn_vnode->v_flag |= V_XATTRDIR;
894 tdirinit(tp, xdp);
895 tp->tn_xattrdp = xdp;
896 } else {
897 VN_HOLD(tp->tn_xattrdp->tn_vnode);
898 }
899 *vpp = TNTOV(tp->tn_xattrdp);
900 rw_exit(&tp->tn_rwlock);
901 return (0);
902 }
903
904 /*
905 * Null component name is a synonym for directory being searched.
906 */
907 if (*nm == '\0') {
908 VN_HOLD(dvp);
909 *vpp = dvp;
910 return (0);
911 }
912 ASSERT(tp);
913
914 error = tdirlookup(tp, nm, &ntp, cred);
915
916 if (error == 0) {
917 ASSERT(ntp);
918 *vpp = TNTOV(ntp);
919 /*
920 * If vnode is a device return special vnode instead
921 */
922 if (IS_DEVVP(*vpp)) {
923 struct vnode *newvp;
924
925 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
926 cred);
927 VN_RELE(*vpp);
928 *vpp = newvp;
929 }
930 }
931 TRACE_4(TR_FAC_TMPFS, TR_TMPFS_LOOKUP,
932 "tmpfs lookup:vp %p name %s vpp %p error %d",
933 dvp, nm, vpp, error);
934 return (error);
935 }
936
937 /*ARGSUSED7*/
938 static int
tmp_create(struct vnode * dvp,char * nm,struct vattr * vap,enum vcexcl exclusive,int mode,struct vnode ** vpp,struct cred * cred,int flag,caller_context_t * ct,vsecattr_t * vsecp)939 tmp_create(
940 struct vnode *dvp,
941 char *nm,
942 struct vattr *vap,
943 enum vcexcl exclusive,
944 int mode,
945 struct vnode **vpp,
946 struct cred *cred,
947 int flag,
948 caller_context_t *ct,
949 vsecattr_t *vsecp)
950 {
951 struct tmpnode *parent;
952 struct tmount *tm;
953 struct tmpnode *self;
954 int error;
955 struct tmpnode *oldtp;
956
957 again:
958 parent = (struct tmpnode *)VTOTN(dvp);
959 tm = (struct tmount *)VTOTM(dvp);
960 self = NULL;
961 error = 0;
962 oldtp = NULL;
963
964 /* device files not allowed in ext. attr dirs */
965 if ((parent->tn_flags & ISXATTR) &&
966 (vap->va_type == VBLK || vap->va_type == VCHR ||
967 vap->va_type == VFIFO || vap->va_type == VDOOR ||
968 vap->va_type == VSOCK || vap->va_type == VPORT))
969 return (EINVAL);
970
971 if (vap->va_type == VREG && (vap->va_mode & VSVTX)) {
972 /* Must be privileged to set sticky bit */
973 if (secpolicy_vnode_stky_modify(cred))
974 vap->va_mode &= ~VSVTX;
975 } else if (vap->va_type == VNON) {
976 return (EINVAL);
977 }
978
979 /*
980 * Null component name is a synonym for directory being searched.
981 */
982 if (*nm == '\0') {
983 VN_HOLD(dvp);
984 oldtp = parent;
985 } else {
986 error = tdirlookup(parent, nm, &oldtp, cred);
987 }
988
989 if (error == 0) { /* name found */
990 boolean_t trunc = B_FALSE;
991
992 ASSERT(oldtp);
993
994 rw_enter(&oldtp->tn_rwlock, RW_WRITER);
995
996 /*
997 * if create/read-only an existing
998 * directory, allow it
999 */
1000 if (exclusive == EXCL)
1001 error = EEXIST;
1002 else if ((oldtp->tn_type == VDIR) && (mode & VWRITE))
1003 error = EISDIR;
1004 else {
1005 error = tmp_taccess(oldtp, mode, cred);
1006 }
1007
1008 if (error) {
1009 rw_exit(&oldtp->tn_rwlock);
1010 tmpnode_rele(oldtp);
1011 return (error);
1012 }
1013 *vpp = TNTOV(oldtp);
1014 if ((*vpp)->v_type == VREG && (vap->va_mask & AT_SIZE) &&
1015 vap->va_size == 0) {
1016 rw_enter(&oldtp->tn_contents, RW_WRITER);
1017 (void) tmpnode_trunc(tm, oldtp, 0);
1018 rw_exit(&oldtp->tn_contents);
1019 trunc = B_TRUE;
1020 }
1021 rw_exit(&oldtp->tn_rwlock);
1022 if (IS_DEVVP(*vpp)) {
1023 struct vnode *newvp;
1024
1025 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
1026 cred);
1027 VN_RELE(*vpp);
1028 if (newvp == NULL) {
1029 return (ENOSYS);
1030 }
1031 *vpp = newvp;
1032 }
1033
1034 if (trunc)
1035 vnevent_create(*vpp, ct);
1036
1037 return (0);
1038 }
1039
1040 if (error != ENOENT)
1041 return (error);
1042
1043 rw_enter(&parent->tn_rwlock, RW_WRITER);
1044 error = tdirenter(tm, parent, nm, DE_CREATE,
1045 (struct tmpnode *)NULL, (struct tmpnode *)NULL,
1046 vap, &self, cred, ct);
1047 rw_exit(&parent->tn_rwlock);
1048
1049 if (error) {
1050 if (self)
1051 tmpnode_rele(self);
1052
1053 if (error == EEXIST) {
1054 /*
1055 * This means that the file was created sometime
1056 * after we checked and did not find it and when
1057 * we went to create it.
1058 * Since creat() is supposed to truncate a file
1059 * that already exits go back to the begining
1060 * of the function. This time we will find it
1061 * and go down the tmp_trunc() path
1062 */
1063 goto again;
1064 }
1065 return (error);
1066 }
1067
1068 *vpp = TNTOV(self);
1069
1070 if (!error && IS_DEVVP(*vpp)) {
1071 struct vnode *newvp;
1072
1073 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type, cred);
1074 VN_RELE(*vpp);
1075 if (newvp == NULL)
1076 return (ENOSYS);
1077 *vpp = newvp;
1078 }
1079 TRACE_3(TR_FAC_TMPFS, TR_TMPFS_CREATE,
1080 "tmpfs create:dvp %p nm %s vpp %p", dvp, nm, vpp);
1081 return (0);
1082 }
1083
1084 /* ARGSUSED3 */
1085 static int
tmp_remove(struct vnode * dvp,char * nm,struct cred * cred,caller_context_t * ct,int flags)1086 tmp_remove(
1087 struct vnode *dvp,
1088 char *nm,
1089 struct cred *cred,
1090 caller_context_t *ct,
1091 int flags)
1092 {
1093 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1094 int error;
1095 struct tmpnode *tp = NULL;
1096
1097 error = tdirlookup(parent, nm, &tp, cred);
1098 if (error)
1099 return (error);
1100
1101 ASSERT(tp);
1102 rw_enter(&parent->tn_rwlock, RW_WRITER);
1103 rw_enter(&tp->tn_rwlock, RW_WRITER);
1104
1105 if (tp->tn_type != VDIR ||
1106 (error = secpolicy_fs_linkdir(cred, dvp->v_vfsp)) == 0)
1107 error = tdirdelete(parent, tp, nm, DR_REMOVE, cred);
1108
1109 rw_exit(&tp->tn_rwlock);
1110 rw_exit(&parent->tn_rwlock);
1111 vnevent_remove(TNTOV(tp), dvp, nm, ct);
1112 tmpnode_rele(tp);
1113
1114 TRACE_3(TR_FAC_TMPFS, TR_TMPFS_REMOVE,
1115 "tmpfs remove:dvp %p nm %s error %d", dvp, nm, error);
1116 return (error);
1117 }
1118
1119 /* ARGSUSED4 */
1120 static int
tmp_link(struct vnode * dvp,struct vnode * srcvp,char * tnm,struct cred * cred,caller_context_t * ct,int flags)1121 tmp_link(
1122 struct vnode *dvp,
1123 struct vnode *srcvp,
1124 char *tnm,
1125 struct cred *cred,
1126 caller_context_t *ct,
1127 int flags)
1128 {
1129 struct tmpnode *parent;
1130 struct tmpnode *from;
1131 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1132 int error;
1133 struct tmpnode *found = NULL;
1134 struct vnode *realvp;
1135
1136 if (VOP_REALVP(srcvp, &realvp, ct) == 0)
1137 srcvp = realvp;
1138
1139 parent = (struct tmpnode *)VTOTN(dvp);
1140 from = (struct tmpnode *)VTOTN(srcvp);
1141
1142 if ((srcvp->v_type == VDIR &&
1143 secpolicy_fs_linkdir(cred, dvp->v_vfsp)) ||
1144 (from->tn_uid != crgetuid(cred) && secpolicy_basic_link(cred)))
1145 return (EPERM);
1146
1147 /*
1148 * Make sure link for extended attributes is valid
1149 * We only support hard linking of xattr's in xattrdir to an xattrdir
1150 */
1151 if ((from->tn_flags & ISXATTR) != (parent->tn_flags & ISXATTR))
1152 return (EINVAL);
1153
1154 error = tdirlookup(parent, tnm, &found, cred);
1155 if (error == 0) {
1156 ASSERT(found);
1157 tmpnode_rele(found);
1158 return (EEXIST);
1159 }
1160
1161 if (error != ENOENT)
1162 return (error);
1163
1164 rw_enter(&parent->tn_rwlock, RW_WRITER);
1165 error = tdirenter(tm, parent, tnm, DE_LINK, (struct tmpnode *)NULL,
1166 from, NULL, (struct tmpnode **)NULL, cred, ct);
1167 rw_exit(&parent->tn_rwlock);
1168 if (error == 0) {
1169 vnevent_link(srcvp, ct);
1170 }
1171 return (error);
1172 }
1173
1174 /* ARGSUSED5 */
1175 static int
tmp_rename(struct vnode * odvp,char * onm,struct vnode * ndvp,char * nnm,struct cred * cred,caller_context_t * ct,int flags)1176 tmp_rename(
1177 struct vnode *odvp, /* source parent vnode */
1178 char *onm, /* source name */
1179 struct vnode *ndvp, /* destination parent vnode */
1180 char *nnm, /* destination name */
1181 struct cred *cred,
1182 caller_context_t *ct,
1183 int flags)
1184 {
1185 struct tmpnode *fromparent;
1186 struct tmpnode *toparent;
1187 struct tmpnode *fromtp = NULL; /* source tmpnode */
1188 struct tmount *tm = (struct tmount *)VTOTM(odvp);
1189 int error;
1190 int samedir = 0; /* set if odvp == ndvp */
1191 struct vnode *realvp;
1192
1193 if (VOP_REALVP(ndvp, &realvp, ct) == 0)
1194 ndvp = realvp;
1195
1196 fromparent = (struct tmpnode *)VTOTN(odvp);
1197 toparent = (struct tmpnode *)VTOTN(ndvp);
1198
1199 if ((fromparent->tn_flags & ISXATTR) != (toparent->tn_flags & ISXATTR))
1200 return (EINVAL);
1201
1202 mutex_enter(&tm->tm_renamelck);
1203
1204 /*
1205 * Look up tmpnode of file we're supposed to rename.
1206 */
1207 error = tdirlookup(fromparent, onm, &fromtp, cred);
1208 if (error) {
1209 mutex_exit(&tm->tm_renamelck);
1210 return (error);
1211 }
1212
1213 /*
1214 * Make sure we can delete the old (source) entry. This
1215 * requires write permission on the containing directory. If
1216 * that directory is "sticky" it requires further checks.
1217 */
1218 if (((error = tmp_taccess(fromparent, VWRITE, cred)) != 0) ||
1219 (error = tmp_sticky_remove_access(fromparent, fromtp, cred)) != 0)
1220 goto done;
1221
1222 /*
1223 * Check for renaming to or from '.' or '..' or that
1224 * fromtp == fromparent
1225 */
1226 if ((onm[0] == '.' &&
1227 (onm[1] == '\0' || (onm[1] == '.' && onm[2] == '\0'))) ||
1228 (nnm[0] == '.' &&
1229 (nnm[1] == '\0' || (nnm[1] == '.' && nnm[2] == '\0'))) ||
1230 (fromparent == fromtp)) {
1231 error = EINVAL;
1232 goto done;
1233 }
1234
1235 samedir = (fromparent == toparent);
1236 /*
1237 * Make sure we can search and rename into the new
1238 * (destination) directory.
1239 */
1240 if (!samedir) {
1241 error = tmp_taccess(toparent, VEXEC|VWRITE, cred);
1242 if (error)
1243 goto done;
1244 }
1245
1246 /*
1247 * Link source to new target
1248 */
1249 rw_enter(&toparent->tn_rwlock, RW_WRITER);
1250 error = tdirenter(tm, toparent, nnm, DE_RENAME,
1251 fromparent, fromtp, (struct vattr *)NULL,
1252 (struct tmpnode **)NULL, cred, ct);
1253 rw_exit(&toparent->tn_rwlock);
1254
1255 if (error) {
1256 /*
1257 * ESAME isn't really an error; it indicates that the
1258 * operation should not be done because the source and target
1259 * are the same file, but that no error should be reported.
1260 */
1261 if (error == ESAME)
1262 error = 0;
1263 goto done;
1264 }
1265 vnevent_rename_src(TNTOV(fromtp), odvp, onm, ct);
1266
1267 /*
1268 * Notify the target directory if not same as
1269 * source directory.
1270 */
1271 if (ndvp != odvp) {
1272 vnevent_rename_dest_dir(ndvp, ct);
1273 }
1274
1275 /*
1276 * Unlink from source.
1277 */
1278 rw_enter(&fromparent->tn_rwlock, RW_WRITER);
1279 rw_enter(&fromtp->tn_rwlock, RW_WRITER);
1280
1281 error = tdirdelete(fromparent, fromtp, onm, DR_RENAME, cred);
1282
1283 /*
1284 * The following handles the case where our source tmpnode was
1285 * removed before we got to it.
1286 *
1287 * XXX We should also cleanup properly in the case where tdirdelete
1288 * fails for some other reason. Currently this case shouldn't happen.
1289 * (see 1184991).
1290 */
1291 if (error == ENOENT)
1292 error = 0;
1293
1294 rw_exit(&fromtp->tn_rwlock);
1295 rw_exit(&fromparent->tn_rwlock);
1296 done:
1297 tmpnode_rele(fromtp);
1298 mutex_exit(&tm->tm_renamelck);
1299
1300 TRACE_5(TR_FAC_TMPFS, TR_TMPFS_RENAME,
1301 "tmpfs rename:ovp %p onm %s nvp %p nnm %s error %d", odvp, onm,
1302 ndvp, nnm, error);
1303 return (error);
1304 }
1305
1306 /* ARGSUSED5 */
1307 static int
tmp_mkdir(struct vnode * dvp,char * nm,struct vattr * va,struct vnode ** vpp,struct cred * cred,caller_context_t * ct,int flags,vsecattr_t * vsecp)1308 tmp_mkdir(
1309 struct vnode *dvp,
1310 char *nm,
1311 struct vattr *va,
1312 struct vnode **vpp,
1313 struct cred *cred,
1314 caller_context_t *ct,
1315 int flags,
1316 vsecattr_t *vsecp)
1317 {
1318 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1319 struct tmpnode *self = NULL;
1320 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1321 int error;
1322
1323 /* no new dirs allowed in xattr dirs */
1324 if (parent->tn_flags & ISXATTR)
1325 return (EINVAL);
1326
1327 /*
1328 * Might be dangling directory. Catch it here,
1329 * because a ENOENT return from tdirlookup() is
1330 * an "o.k. return".
1331 */
1332 if (parent->tn_nlink == 0)
1333 return (ENOENT);
1334
1335 error = tdirlookup(parent, nm, &self, cred);
1336 if (error == 0) {
1337 ASSERT(self);
1338 tmpnode_rele(self);
1339 return (EEXIST);
1340 }
1341 if (error != ENOENT)
1342 return (error);
1343
1344 rw_enter(&parent->tn_rwlock, RW_WRITER);
1345 error = tdirenter(tm, parent, nm, DE_MKDIR, (struct tmpnode *)NULL,
1346 (struct tmpnode *)NULL, va, &self, cred, ct);
1347 if (error) {
1348 rw_exit(&parent->tn_rwlock);
1349 if (self)
1350 tmpnode_rele(self);
1351 return (error);
1352 }
1353 rw_exit(&parent->tn_rwlock);
1354 *vpp = TNTOV(self);
1355 return (0);
1356 }
1357
1358 /* ARGSUSED4 */
1359 static int
tmp_rmdir(struct vnode * dvp,char * nm,struct vnode * cdir,struct cred * cred,caller_context_t * ct,int flags)1360 tmp_rmdir(
1361 struct vnode *dvp,
1362 char *nm,
1363 struct vnode *cdir,
1364 struct cred *cred,
1365 caller_context_t *ct,
1366 int flags)
1367 {
1368 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1369 struct tmpnode *self = NULL;
1370 struct vnode *vp;
1371 int error = 0;
1372
1373 /*
1374 * Return error when removing . and ..
1375 */
1376 if (strcmp(nm, ".") == 0)
1377 return (EINVAL);
1378 if (strcmp(nm, "..") == 0)
1379 return (EEXIST); /* Should be ENOTEMPTY */
1380 error = tdirlookup(parent, nm, &self, cred);
1381 if (error)
1382 return (error);
1383
1384 rw_enter(&parent->tn_rwlock, RW_WRITER);
1385 rw_enter(&self->tn_rwlock, RW_WRITER);
1386
1387 vp = TNTOV(self);
1388 if (vp == dvp || vp == cdir) {
1389 error = EINVAL;
1390 goto done1;
1391 }
1392 if (self->tn_type != VDIR) {
1393 error = ENOTDIR;
1394 goto done1;
1395 }
1396
1397 mutex_enter(&self->tn_tlock);
1398 if (self->tn_nlink > 2) {
1399 mutex_exit(&self->tn_tlock);
1400 error = EEXIST;
1401 goto done1;
1402 }
1403 mutex_exit(&self->tn_tlock);
1404
1405 if (vn_vfswlock(vp)) {
1406 error = EBUSY;
1407 goto done1;
1408 }
1409 if (vn_mountedvfs(vp) != NULL) {
1410 error = EBUSY;
1411 goto done;
1412 }
1413
1414 /*
1415 * Check for an empty directory
1416 * i.e. only includes entries for "." and ".."
1417 */
1418 if (self->tn_dirents > 2) {
1419 error = EEXIST; /* SIGH should be ENOTEMPTY */
1420 /*
1421 * Update atime because checking tn_dirents is logically
1422 * equivalent to reading the directory
1423 */
1424 gethrestime(&self->tn_atime);
1425 goto done;
1426 }
1427
1428 error = tdirdelete(parent, self, nm, DR_RMDIR, cred);
1429 done:
1430 vn_vfsunlock(vp);
1431 done1:
1432 rw_exit(&self->tn_rwlock);
1433 rw_exit(&parent->tn_rwlock);
1434 vnevent_rmdir(TNTOV(self), dvp, nm, ct);
1435 tmpnode_rele(self);
1436
1437 return (error);
1438 }
1439
1440 /* ARGSUSED2 */
1441 static int
tmp_readdir(struct vnode * vp,struct uio * uiop,struct cred * cred,int * eofp,caller_context_t * ct,int flags)1442 tmp_readdir(
1443 struct vnode *vp,
1444 struct uio *uiop,
1445 struct cred *cred,
1446 int *eofp,
1447 caller_context_t *ct,
1448 int flags)
1449 {
1450 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1451 struct tdirent *tdp;
1452 int error = 0;
1453 size_t namelen;
1454 struct dirent64 *dp;
1455 ulong_t offset;
1456 ulong_t total_bytes_wanted;
1457 long outcount = 0;
1458 long bufsize;
1459 int reclen;
1460 caddr_t outbuf;
1461
1462 if (uiop->uio_loffset >= MAXOFF_T) {
1463 if (eofp)
1464 *eofp = 1;
1465 return (0);
1466 }
1467 /*
1468 * assuming system call has already called tmp_rwlock
1469 */
1470 ASSERT(RW_READ_HELD(&tp->tn_rwlock));
1471
1472 if (uiop->uio_iovcnt != 1)
1473 return (EINVAL);
1474
1475 if (vp->v_type != VDIR)
1476 return (ENOTDIR);
1477
1478 /*
1479 * There's a window here where someone could have removed
1480 * all the entries in the directory after we put a hold on the
1481 * vnode but before we grabbed the rwlock. Just return.
1482 */
1483 if (tp->tn_dir == NULL) {
1484 if (tp->tn_nlink) {
1485 panic("empty directory 0x%p", (void *)tp);
1486 /*NOTREACHED*/
1487 }
1488 return (0);
1489 }
1490
1491 /*
1492 * Get space for multiple directory entries
1493 */
1494 total_bytes_wanted = uiop->uio_iov->iov_len;
1495 bufsize = total_bytes_wanted + sizeof (struct dirent64);
1496 outbuf = kmem_alloc(bufsize, KM_SLEEP);
1497
1498 dp = (struct dirent64 *)outbuf;
1499
1500
1501 offset = 0;
1502 tdp = tp->tn_dir;
1503 while (tdp) {
1504 namelen = strlen(tdp->td_name); /* no +1 needed */
1505 offset = tdp->td_offset;
1506 if (offset >= uiop->uio_offset) {
1507 reclen = (int)DIRENT64_RECLEN(namelen);
1508 if (outcount + reclen > total_bytes_wanted) {
1509 if (!outcount)
1510 /*
1511 * Buffer too small for any entries.
1512 */
1513 error = EINVAL;
1514 break;
1515 }
1516 ASSERT(tdp->td_tmpnode != NULL);
1517
1518 /* use strncpy(9f) to zero out uninitialized bytes */
1519
1520 (void) strncpy(dp->d_name, tdp->td_name,
1521 DIRENT64_NAMELEN(reclen));
1522 dp->d_reclen = (ushort_t)reclen;
1523 dp->d_ino = (ino64_t)tdp->td_tmpnode->tn_nodeid;
1524 dp->d_off = (offset_t)tdp->td_offset + 1;
1525 dp = (struct dirent64 *)
1526 ((uintptr_t)dp + dp->d_reclen);
1527 outcount += reclen;
1528 ASSERT(outcount <= bufsize);
1529 }
1530 tdp = tdp->td_next;
1531 }
1532
1533 if (!error)
1534 error = uiomove(outbuf, outcount, UIO_READ, uiop);
1535
1536 if (!error) {
1537 /* If we reached the end of the list our offset */
1538 /* should now be just past the end. */
1539 if (!tdp) {
1540 offset += 1;
1541 if (eofp)
1542 *eofp = 1;
1543 } else if (eofp)
1544 *eofp = 0;
1545 uiop->uio_offset = offset;
1546 }
1547 gethrestime(&tp->tn_atime);
1548 kmem_free(outbuf, bufsize);
1549 return (error);
1550 }
1551
1552 /* ARGSUSED5 */
1553 static int
tmp_symlink(struct vnode * dvp,char * lnm,struct vattr * tva,char * tnm,struct cred * cred,caller_context_t * ct,int flags)1554 tmp_symlink(
1555 struct vnode *dvp,
1556 char *lnm,
1557 struct vattr *tva,
1558 char *tnm,
1559 struct cred *cred,
1560 caller_context_t *ct,
1561 int flags)
1562 {
1563 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1564 struct tmpnode *self = (struct tmpnode *)NULL;
1565 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1566 char *cp = NULL;
1567 int error;
1568 size_t len;
1569
1570 /* no symlinks allowed to files in xattr dirs */
1571 if (parent->tn_flags & ISXATTR)
1572 return (EINVAL);
1573
1574 error = tdirlookup(parent, lnm, &self, cred);
1575 if (error == 0) {
1576 /*
1577 * The entry already exists
1578 */
1579 tmpnode_rele(self);
1580 return (EEXIST); /* was 0 */
1581 }
1582
1583 if (error != ENOENT) {
1584 if (self != NULL)
1585 tmpnode_rele(self);
1586 return (error);
1587 }
1588
1589 rw_enter(&parent->tn_rwlock, RW_WRITER);
1590 error = tdirenter(tm, parent, lnm, DE_CREATE, (struct tmpnode *)NULL,
1591 (struct tmpnode *)NULL, tva, &self, cred, ct);
1592 rw_exit(&parent->tn_rwlock);
1593
1594 if (error) {
1595 if (self)
1596 tmpnode_rele(self);
1597 return (error);
1598 }
1599 len = strlen(tnm) + 1;
1600 cp = tmp_memalloc(len, 0);
1601 if (cp == NULL) {
1602 tmpnode_rele(self);
1603 return (ENOSPC);
1604 }
1605 (void) strcpy(cp, tnm);
1606
1607 self->tn_symlink = cp;
1608 self->tn_size = len - 1;
1609 tmpnode_rele(self);
1610 return (error);
1611 }
1612
1613 /* ARGSUSED2 */
1614 static int
tmp_readlink(struct vnode * vp,struct uio * uiop,struct cred * cred,caller_context_t * ct)1615 tmp_readlink(
1616 struct vnode *vp,
1617 struct uio *uiop,
1618 struct cred *cred,
1619 caller_context_t *ct)
1620 {
1621 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1622 int error = 0;
1623
1624 if (vp->v_type != VLNK)
1625 return (EINVAL);
1626
1627 rw_enter(&tp->tn_rwlock, RW_READER);
1628 rw_enter(&tp->tn_contents, RW_READER);
1629 error = uiomove(tp->tn_symlink, tp->tn_size, UIO_READ, uiop);
1630 gethrestime(&tp->tn_atime);
1631 rw_exit(&tp->tn_contents);
1632 rw_exit(&tp->tn_rwlock);
1633 return (error);
1634 }
1635
1636 /* ARGSUSED */
1637 static int
tmp_fsync(struct vnode * vp,int syncflag,struct cred * cred,caller_context_t * ct)1638 tmp_fsync(
1639 struct vnode *vp,
1640 int syncflag,
1641 struct cred *cred,
1642 caller_context_t *ct)
1643 {
1644 return (0);
1645 }
1646
1647 /* ARGSUSED */
1648 static void
tmp_inactive(struct vnode * vp,struct cred * cred,caller_context_t * ct)1649 tmp_inactive(struct vnode *vp, struct cred *cred, caller_context_t *ct)
1650 {
1651 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1652 struct tmount *tm = (struct tmount *)VFSTOTM(vp->v_vfsp);
1653
1654 rw_enter(&tp->tn_rwlock, RW_WRITER);
1655 top:
1656 mutex_enter(&tp->tn_tlock);
1657 mutex_enter(&vp->v_lock);
1658 ASSERT(vp->v_count >= 1);
1659
1660 /*
1661 * If we don't have the last hold or the link count is non-zero,
1662 * there's little to do -- just drop our hold.
1663 */
1664 if (vp->v_count > 1 || tp->tn_nlink != 0) {
1665 vp->v_count--;
1666 mutex_exit(&vp->v_lock);
1667 mutex_exit(&tp->tn_tlock);
1668 rw_exit(&tp->tn_rwlock);
1669 return;
1670 }
1671
1672 /*
1673 * We have the last hold *and* the link count is zero, so this
1674 * tmpnode is dead from the filesystem's viewpoint. However,
1675 * if the tmpnode has any pages associated with it (i.e. if it's
1676 * a normal file with non-zero size), the tmpnode can still be
1677 * discovered by pageout or fsflush via the page vnode pointers.
1678 * In this case we must drop all our locks, truncate the tmpnode,
1679 * and try the whole dance again.
1680 */
1681 if (tp->tn_size != 0) {
1682 if (tp->tn_type == VREG) {
1683 mutex_exit(&vp->v_lock);
1684 mutex_exit(&tp->tn_tlock);
1685 rw_enter(&tp->tn_contents, RW_WRITER);
1686 (void) tmpnode_trunc(tm, tp, 0);
1687 rw_exit(&tp->tn_contents);
1688 ASSERT(tp->tn_size == 0);
1689 ASSERT(tp->tn_nblocks == 0);
1690 goto top;
1691 }
1692 if (tp->tn_type == VLNK)
1693 tmp_memfree(tp->tn_symlink, tp->tn_size + 1);
1694 }
1695
1696 /*
1697 * Remove normal file/dir's xattr dir and xattrs.
1698 */
1699 if (tp->tn_xattrdp) {
1700 struct tmpnode *xtp = tp->tn_xattrdp;
1701
1702 ASSERT(xtp->tn_flags & ISXATTR);
1703 tmpnode_hold(xtp);
1704 rw_enter(&xtp->tn_rwlock, RW_WRITER);
1705 tdirtrunc(xtp);
1706 DECR_COUNT(&xtp->tn_nlink, &xtp->tn_tlock);
1707 tp->tn_xattrdp = NULL;
1708 rw_exit(&xtp->tn_rwlock);
1709 tmpnode_rele(xtp);
1710 }
1711
1712 mutex_exit(&vp->v_lock);
1713 mutex_exit(&tp->tn_tlock);
1714 /* Here's our chance to send invalid event while we're between locks */
1715 vn_invalid(TNTOV(tp));
1716 mutex_enter(&tm->tm_contents);
1717 if (tp->tn_forw == NULL)
1718 tm->tm_rootnode->tn_back = tp->tn_back;
1719 else
1720 tp->tn_forw->tn_back = tp->tn_back;
1721 tp->tn_back->tn_forw = tp->tn_forw;
1722 mutex_exit(&tm->tm_contents);
1723 rw_exit(&tp->tn_rwlock);
1724 rw_destroy(&tp->tn_rwlock);
1725 mutex_destroy(&tp->tn_tlock);
1726 vn_free(TNTOV(tp));
1727 tmp_memfree(tp, sizeof (struct tmpnode));
1728 }
1729
1730 /* ARGSUSED2 */
1731 static int
tmp_fid(struct vnode * vp,struct fid * fidp,caller_context_t * ct)1732 tmp_fid(struct vnode *vp, struct fid *fidp, caller_context_t *ct)
1733 {
1734 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1735 struct tfid *tfid;
1736
1737 if (fidp->fid_len < (sizeof (struct tfid) - sizeof (ushort_t))) {
1738 fidp->fid_len = sizeof (struct tfid) - sizeof (ushort_t);
1739 return (ENOSPC);
1740 }
1741
1742 tfid = (struct tfid *)fidp;
1743 bzero(tfid, sizeof (struct tfid));
1744 tfid->tfid_len = (int)sizeof (struct tfid) - sizeof (ushort_t);
1745
1746 tfid->tfid_ino = tp->tn_nodeid;
1747 tfid->tfid_gen = tp->tn_gen;
1748
1749 return (0);
1750 }
1751
1752
1753 /*
1754 * Return all the pages from [off..off+len] in given file
1755 */
1756 /* ARGSUSED */
1757 static int
tmp_getpage(struct vnode * vp,offset_t off,size_t len,uint_t * protp,page_t * pl[],size_t plsz,struct seg * seg,caddr_t addr,enum seg_rw rw,struct cred * cr,caller_context_t * ct)1758 tmp_getpage(
1759 struct vnode *vp,
1760 offset_t off,
1761 size_t len,
1762 uint_t *protp,
1763 page_t *pl[],
1764 size_t plsz,
1765 struct seg *seg,
1766 caddr_t addr,
1767 enum seg_rw rw,
1768 struct cred *cr,
1769 caller_context_t *ct)
1770 {
1771 int err = 0;
1772 struct tmpnode *tp = VTOTN(vp);
1773 anoff_t toff = (anoff_t)off;
1774 size_t tlen = len;
1775 u_offset_t tmpoff;
1776 timestruc_t now;
1777
1778 rw_enter(&tp->tn_contents, RW_READER);
1779
1780 if (off + len > tp->tn_size + PAGEOFFSET) {
1781 err = EFAULT;
1782 goto out;
1783 }
1784 /*
1785 * Look for holes (no anon slot) in faulting range. If there are
1786 * holes we have to switch to a write lock and fill them in. Swap
1787 * space for holes was already reserved when the file was grown.
1788 */
1789 tmpoff = toff;
1790 if (non_anon(tp->tn_anon, btop(off), &tmpoff, &tlen)) {
1791 if (!rw_tryupgrade(&tp->tn_contents)) {
1792 rw_exit(&tp->tn_contents);
1793 rw_enter(&tp->tn_contents, RW_WRITER);
1794 /* Size may have changed when lock was dropped */
1795 if (off + len > tp->tn_size + PAGEOFFSET) {
1796 err = EFAULT;
1797 goto out;
1798 }
1799 }
1800 for (toff = (anoff_t)off; toff < (anoff_t)off + len;
1801 toff += PAGESIZE) {
1802 if (anon_get_ptr(tp->tn_anon, btop(toff)) == NULL) {
1803 /* XXX - may allocate mem w. write lock held */
1804 (void) anon_set_ptr(tp->tn_anon, btop(toff),
1805 anon_alloc(vp, toff), ANON_SLEEP);
1806 tp->tn_nblocks++;
1807 }
1808 }
1809 rw_downgrade(&tp->tn_contents);
1810 }
1811
1812
1813 err = pvn_getpages(tmp_getapage, vp, (u_offset_t)off, len, protp,
1814 pl, plsz, seg, addr, rw, cr);
1815
1816 gethrestime(&now);
1817 tp->tn_atime = now;
1818 if (rw == S_WRITE)
1819 tp->tn_mtime = now;
1820
1821 out:
1822 rw_exit(&tp->tn_contents);
1823 return (err);
1824 }
1825
1826 /*
1827 * Called from pvn_getpages to get a particular page.
1828 */
1829 /*ARGSUSED*/
1830 static int
tmp_getapage(struct vnode * vp,u_offset_t off,size_t len,uint_t * protp,page_t * pl[],size_t plsz,struct seg * seg,caddr_t addr,enum seg_rw rw,struct cred * cr)1831 tmp_getapage(
1832 struct vnode *vp,
1833 u_offset_t off,
1834 size_t len,
1835 uint_t *protp,
1836 page_t *pl[],
1837 size_t plsz,
1838 struct seg *seg,
1839 caddr_t addr,
1840 enum seg_rw rw,
1841 struct cred *cr)
1842 {
1843 struct page *pp;
1844 int flags;
1845 int err = 0;
1846 struct vnode *pvp;
1847 u_offset_t poff;
1848
1849 if (protp != NULL)
1850 *protp = PROT_ALL;
1851 again:
1852 if (pp = page_lookup(vp, off, rw == S_CREATE ? SE_EXCL : SE_SHARED)) {
1853 if (pl) {
1854 pl[0] = pp;
1855 pl[1] = NULL;
1856 } else {
1857 page_unlock(pp);
1858 }
1859 } else {
1860 pp = page_create_va(vp, off, PAGESIZE,
1861 PG_WAIT | PG_EXCL, seg, addr);
1862 /*
1863 * Someone raced in and created the page after we did the
1864 * lookup but before we did the create, so go back and
1865 * try to look it up again.
1866 */
1867 if (pp == NULL)
1868 goto again;
1869 /*
1870 * Fill page from backing store, if any. If none, then
1871 * either this is a newly filled hole or page must have
1872 * been unmodified and freed so just zero it out.
1873 */
1874 err = swap_getphysname(vp, off, &pvp, &poff);
1875 if (err) {
1876 panic("tmp_getapage: no anon slot vp %p "
1877 "off %llx pp %p\n", (void *)vp, off, (void *)pp);
1878 }
1879 if (pvp) {
1880 flags = (pl == NULL ? B_ASYNC|B_READ : B_READ);
1881 err = VOP_PAGEIO(pvp, pp, (u_offset_t)poff, PAGESIZE,
1882 flags, cr, NULL);
1883 if (flags & B_ASYNC)
1884 pp = NULL;
1885 } else if (rw != S_CREATE) {
1886 pagezero(pp, 0, PAGESIZE);
1887 }
1888 if (err && pp)
1889 pvn_read_done(pp, B_ERROR);
1890 if (err == 0) {
1891 if (pl)
1892 pvn_plist_init(pp, pl, plsz, off, PAGESIZE, rw);
1893 else
1894 pvn_io_done(pp);
1895 }
1896 }
1897 return (err);
1898 }
1899
1900
1901 /*
1902 * Flags are composed of {B_INVAL, B_DIRTY B_FREE, B_DONTNEED}.
1903 * If len == 0, do from off to EOF.
1904 */
1905 static int tmp_nopage = 0; /* Don't do tmp_putpage's if set */
1906
1907 /* ARGSUSED */
1908 int
tmp_putpage(register struct vnode * vp,offset_t off,size_t len,int flags,struct cred * cr,caller_context_t * ct)1909 tmp_putpage(
1910 register struct vnode *vp,
1911 offset_t off,
1912 size_t len,
1913 int flags,
1914 struct cred *cr,
1915 caller_context_t *ct)
1916 {
1917 register page_t *pp;
1918 u_offset_t io_off;
1919 size_t io_len = 0;
1920 int err = 0;
1921 struct tmpnode *tp = VTOTN(vp);
1922 int dolock;
1923
1924 if (tmp_nopage)
1925 return (0);
1926
1927 ASSERT(vp->v_count != 0);
1928
1929 if (vp->v_flag & VNOMAP)
1930 return (ENOSYS);
1931
1932 /*
1933 * This being tmpfs, we don't ever do i/o unless we really
1934 * have to (when we're low on memory and pageout calls us
1935 * with B_ASYNC | B_FREE or the user explicitly asks for it with
1936 * B_DONTNEED).
1937 * XXX to approximately track the mod time like ufs we should
1938 * update the times here. The problem is, once someone does a
1939 * store we never clear the mod bit and do i/o, thus fsflush
1940 * will keep calling us every 30 seconds to do the i/o and we'll
1941 * continually update the mod time. At least we update the mod
1942 * time on the first store because this results in a call to getpage.
1943 */
1944 if (flags != (B_ASYNC | B_FREE) && (flags & B_INVAL) == 0 &&
1945 (flags & B_DONTNEED) == 0)
1946 return (0);
1947 /*
1948 * If this thread owns the lock, i.e., this thread grabbed it
1949 * as writer somewhere above, then we don't need to grab the
1950 * lock as reader in this routine.
1951 */
1952 dolock = (rw_owner(&tp->tn_contents) != curthread);
1953
1954 /*
1955 * If this is pageout don't block on the lock as you could deadlock
1956 * when freemem == 0 (another thread has the read lock and is blocked
1957 * creating a page, and a third thread is waiting to get the writers
1958 * lock - waiting writers priority blocks us from getting the read
1959 * lock). Of course, if the only freeable pages are on this tmpnode
1960 * we're hosed anyways. A better solution might be a new lock type.
1961 * Note: ufs has the same problem.
1962 */
1963 if (curproc == proc_pageout) {
1964 if (!rw_tryenter(&tp->tn_contents, RW_READER))
1965 return (ENOMEM);
1966 } else if (dolock)
1967 rw_enter(&tp->tn_contents, RW_READER);
1968
1969 if (!vn_has_cached_data(vp))
1970 goto out;
1971
1972 if (len == 0) {
1973 if (curproc == proc_pageout) {
1974 panic("tmp: pageout can't block");
1975 /*NOTREACHED*/
1976 }
1977
1978 /* Search the entire vp list for pages >= off. */
1979 err = pvn_vplist_dirty(vp, (u_offset_t)off, tmp_putapage,
1980 flags, cr);
1981 } else {
1982 u_offset_t eoff;
1983
1984 /*
1985 * Loop over all offsets in the range [off...off + len]
1986 * looking for pages to deal with.
1987 */
1988 eoff = MIN(off + len, tp->tn_size);
1989 for (io_off = off; io_off < eoff; io_off += io_len) {
1990 /*
1991 * If we are not invalidating, synchronously
1992 * freeing or writing pages use the routine
1993 * page_lookup_nowait() to prevent reclaiming
1994 * them from the free list.
1995 */
1996 if ((flags & B_INVAL) || ((flags & B_ASYNC) == 0)) {
1997 pp = page_lookup(vp, io_off,
1998 (flags & (B_INVAL | B_FREE)) ?
1999 SE_EXCL : SE_SHARED);
2000 } else {
2001 pp = page_lookup_nowait(vp, io_off,
2002 (flags & B_FREE) ? SE_EXCL : SE_SHARED);
2003 }
2004
2005 if (pp == NULL || pvn_getdirty(pp, flags) == 0)
2006 io_len = PAGESIZE;
2007 else {
2008 err = tmp_putapage(vp, pp, &io_off, &io_len,
2009 flags, cr);
2010 if (err != 0)
2011 break;
2012 }
2013 }
2014 }
2015 /* If invalidating, verify all pages on vnode list are gone. */
2016 if (err == 0 && off == 0 && len == 0 &&
2017 (flags & B_INVAL) && vn_has_cached_data(vp)) {
2018 panic("tmp_putpage: B_INVAL, pages not gone");
2019 /*NOTREACHED*/
2020 }
2021 out:
2022 if ((curproc == proc_pageout) || dolock)
2023 rw_exit(&tp->tn_contents);
2024 /*
2025 * Only reason putapage is going to give us SE_NOSWAP as error
2026 * is when we ask a page to be written to physical backing store
2027 * and there is none. Ignore this because we might be dealing
2028 * with a swap page which does not have any backing store
2029 * on disk. In any other case we won't get this error over here.
2030 */
2031 if (err == SE_NOSWAP)
2032 err = 0;
2033 return (err);
2034 }
2035
2036 long tmp_putpagecnt, tmp_pagespushed;
2037
2038 /*
2039 * Write out a single page.
2040 * For tmpfs this means choose a physical swap slot and write the page
2041 * out using VOP_PAGEIO. For performance, we attempt to kluster; i.e.,
2042 * we try to find a bunch of other dirty pages adjacent in the file
2043 * and a bunch of contiguous swap slots, and then write all the pages
2044 * out in a single i/o.
2045 */
2046 /*ARGSUSED*/
2047 static int
tmp_putapage(struct vnode * vp,page_t * pp,u_offset_t * offp,size_t * lenp,int flags,struct cred * cr)2048 tmp_putapage(
2049 struct vnode *vp,
2050 page_t *pp,
2051 u_offset_t *offp,
2052 size_t *lenp,
2053 int flags,
2054 struct cred *cr)
2055 {
2056 int err;
2057 ulong_t klstart, kllen;
2058 page_t *pplist, *npplist;
2059 extern int klustsize;
2060 long tmp_klustsize;
2061 struct tmpnode *tp;
2062 size_t pp_off, pp_len;
2063 u_offset_t io_off;
2064 size_t io_len;
2065 struct vnode *pvp;
2066 u_offset_t pstart;
2067 u_offset_t offset;
2068 u_offset_t tmpoff;
2069
2070 ASSERT(PAGE_LOCKED(pp));
2071
2072 /* Kluster in tmp_klustsize chunks */
2073 tp = VTOTN(vp);
2074 tmp_klustsize = klustsize;
2075 offset = pp->p_offset;
2076 klstart = (offset / tmp_klustsize) * tmp_klustsize;
2077 kllen = MIN(tmp_klustsize, tp->tn_size - klstart);
2078
2079 /* Get a kluster of pages */
2080 pplist =
2081 pvn_write_kluster(vp, pp, &tmpoff, &pp_len, klstart, kllen, flags);
2082
2083 pp_off = (size_t)tmpoff;
2084
2085 /*
2086 * Get a cluster of physical offsets for the pages; the amount we
2087 * get may be some subrange of what we ask for (io_off, io_len).
2088 */
2089 io_off = pp_off;
2090 io_len = pp_len;
2091 err = swap_newphysname(vp, offset, &io_off, &io_len, &pvp, &pstart);
2092 ASSERT(err != SE_NOANON); /* anon slot must have been filled */
2093 if (err) {
2094 pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2095 /*
2096 * If this routine is called as a result of segvn_sync
2097 * operation and we have no physical swap then we can get an
2098 * error here. In such case we would return SE_NOSWAP as error.
2099 * At this point, we expect only SE_NOSWAP.
2100 */
2101 ASSERT(err == SE_NOSWAP);
2102 if (flags & B_INVAL)
2103 err = ENOMEM;
2104 goto out;
2105 }
2106 ASSERT(pp_off <= io_off && io_off + io_len <= pp_off + pp_len);
2107 ASSERT(io_off <= offset && offset < io_off + io_len);
2108
2109 /* Toss pages at front/rear that we couldn't get physical backing for */
2110 if (io_off != pp_off) {
2111 npplist = NULL;
2112 page_list_break(&pplist, &npplist, btop(io_off - pp_off));
2113 ASSERT(pplist->p_offset == pp_off);
2114 ASSERT(pplist->p_prev->p_offset == io_off - PAGESIZE);
2115 pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2116 pplist = npplist;
2117 }
2118 if (io_off + io_len < pp_off + pp_len) {
2119 npplist = NULL;
2120 page_list_break(&pplist, &npplist, btop(io_len));
2121 ASSERT(npplist->p_offset == io_off + io_len);
2122 ASSERT(npplist->p_prev->p_offset == pp_off + pp_len - PAGESIZE);
2123 pvn_write_done(npplist, B_ERROR | B_WRITE | flags);
2124 }
2125
2126 ASSERT(pplist->p_offset == io_off);
2127 ASSERT(pplist->p_prev->p_offset == io_off + io_len - PAGESIZE);
2128 ASSERT(btopr(io_len) <= btopr(kllen));
2129
2130 /* Do i/o on the remaining kluster */
2131 err = VOP_PAGEIO(pvp, pplist, (u_offset_t)pstart, io_len,
2132 B_WRITE | flags, cr, NULL);
2133
2134 if ((flags & B_ASYNC) == 0) {
2135 pvn_write_done(pplist, ((err) ? B_ERROR : 0) | B_WRITE | flags);
2136 }
2137 out:
2138 if (!err) {
2139 if (offp)
2140 *offp = io_off;
2141 if (lenp)
2142 *lenp = io_len;
2143 tmp_putpagecnt++;
2144 tmp_pagespushed += btop(io_len);
2145 }
2146 if (err && err != ENOMEM && err != SE_NOSWAP)
2147 cmn_err(CE_WARN, "tmp_putapage: err %d\n", err);
2148 return (err);
2149 }
2150
2151 /* ARGSUSED */
2152 static int
tmp_map(struct vnode * vp,offset_t off,struct as * as,caddr_t * addrp,size_t len,uchar_t prot,uchar_t maxprot,uint_t flags,struct cred * cred,caller_context_t * ct)2153 tmp_map(
2154 struct vnode *vp,
2155 offset_t off,
2156 struct as *as,
2157 caddr_t *addrp,
2158 size_t len,
2159 uchar_t prot,
2160 uchar_t maxprot,
2161 uint_t flags,
2162 struct cred *cred,
2163 caller_context_t *ct)
2164 {
2165 struct segvn_crargs vn_a;
2166 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
2167 int error;
2168
2169 #ifdef _ILP32
2170 if (len > MAXOFF_T)
2171 return (ENOMEM);
2172 #endif
2173
2174 if (vp->v_flag & VNOMAP)
2175 return (ENOSYS);
2176
2177 if (off < 0 || (offset_t)(off + len) < 0 ||
2178 off > MAXOFF_T || (off + len) > MAXOFF_T)
2179 return (ENXIO);
2180
2181 if (vp->v_type != VREG)
2182 return (ENODEV);
2183
2184 /*
2185 * Don't allow mapping to locked file
2186 */
2187 if (vn_has_mandatory_locks(vp, tp->tn_mode)) {
2188 return (EAGAIN);
2189 }
2190
2191 as_rangelock(as);
2192 error = choose_addr(as, addrp, len, off, ADDR_VACALIGN, flags);
2193 if (error != 0) {
2194 as_rangeunlock(as);
2195 return (error);
2196 }
2197
2198 vn_a.vp = vp;
2199 vn_a.offset = (u_offset_t)off;
2200 vn_a.type = flags & MAP_TYPE;
2201 vn_a.prot = prot;
2202 vn_a.maxprot = maxprot;
2203 vn_a.flags = flags & ~MAP_TYPE;
2204 vn_a.cred = cred;
2205 vn_a.amp = NULL;
2206 vn_a.szc = 0;
2207 vn_a.lgrp_mem_policy_flags = 0;
2208
2209 error = as_map(as, *addrp, len, segvn_create, &vn_a);
2210 as_rangeunlock(as);
2211 return (error);
2212 }
2213
2214 /*
2215 * tmp_addmap and tmp_delmap can't be called since the vp
2216 * maintained in the segvn mapping is NULL.
2217 */
2218 /* ARGSUSED */
2219 static int
tmp_addmap(struct vnode * vp,offset_t off,struct as * as,caddr_t addr,size_t len,uchar_t prot,uchar_t maxprot,uint_t flags,struct cred * cred,caller_context_t * ct)2220 tmp_addmap(
2221 struct vnode *vp,
2222 offset_t off,
2223 struct as *as,
2224 caddr_t addr,
2225 size_t len,
2226 uchar_t prot,
2227 uchar_t maxprot,
2228 uint_t flags,
2229 struct cred *cred,
2230 caller_context_t *ct)
2231 {
2232 return (0);
2233 }
2234
2235 /* ARGSUSED */
2236 static int
tmp_delmap(struct vnode * vp,offset_t off,struct as * as,caddr_t addr,size_t len,uint_t prot,uint_t maxprot,uint_t flags,struct cred * cred,caller_context_t * ct)2237 tmp_delmap(
2238 struct vnode *vp,
2239 offset_t off,
2240 struct as *as,
2241 caddr_t addr,
2242 size_t len,
2243 uint_t prot,
2244 uint_t maxprot,
2245 uint_t flags,
2246 struct cred *cred,
2247 caller_context_t *ct)
2248 {
2249 return (0);
2250 }
2251
2252 static int
tmp_freesp(struct vnode * vp,struct flock64 * lp,int flag)2253 tmp_freesp(struct vnode *vp, struct flock64 *lp, int flag)
2254 {
2255 register int i;
2256 register struct tmpnode *tp = VTOTN(vp);
2257 int error;
2258
2259 ASSERT(vp->v_type == VREG);
2260 ASSERT(lp->l_start >= 0);
2261
2262 if (lp->l_len != 0)
2263 return (EINVAL);
2264
2265 rw_enter(&tp->tn_rwlock, RW_WRITER);
2266 if (tp->tn_size == lp->l_start) {
2267 rw_exit(&tp->tn_rwlock);
2268 return (0);
2269 }
2270
2271 /*
2272 * Check for any mandatory locks on the range
2273 */
2274 if (MANDLOCK(vp, tp->tn_mode)) {
2275 long save_start;
2276
2277 save_start = lp->l_start;
2278
2279 if (tp->tn_size < lp->l_start) {
2280 /*
2281 * "Truncate up" case: need to make sure there
2282 * is no lock beyond current end-of-file. To
2283 * do so, we need to set l_start to the size
2284 * of the file temporarily.
2285 */
2286 lp->l_start = tp->tn_size;
2287 }
2288 lp->l_type = F_WRLCK;
2289 lp->l_sysid = 0;
2290 lp->l_pid = ttoproc(curthread)->p_pid;
2291 i = (flag & (FNDELAY|FNONBLOCK)) ? 0 : SLPFLCK;
2292 if ((i = reclock(vp, lp, i, 0, lp->l_start, NULL)) != 0 ||
2293 lp->l_type != F_UNLCK) {
2294 rw_exit(&tp->tn_rwlock);
2295 return (i ? i : EAGAIN);
2296 }
2297
2298 lp->l_start = save_start;
2299 }
2300 VFSTOTM(vp->v_vfsp);
2301
2302 rw_enter(&tp->tn_contents, RW_WRITER);
2303 error = tmpnode_trunc((struct tmount *)VFSTOTM(vp->v_vfsp),
2304 tp, (ulong_t)lp->l_start);
2305 rw_exit(&tp->tn_contents);
2306 rw_exit(&tp->tn_rwlock);
2307 return (error);
2308 }
2309
2310 /* ARGSUSED */
2311 static int
tmp_space(struct vnode * vp,int cmd,struct flock64 * bfp,int flag,offset_t offset,cred_t * cred,caller_context_t * ct)2312 tmp_space(
2313 struct vnode *vp,
2314 int cmd,
2315 struct flock64 *bfp,
2316 int flag,
2317 offset_t offset,
2318 cred_t *cred,
2319 caller_context_t *ct)
2320 {
2321 int error;
2322
2323 if (cmd != F_FREESP)
2324 return (EINVAL);
2325 if ((error = convoff(vp, bfp, 0, (offset_t)offset)) == 0) {
2326 if ((bfp->l_start > MAXOFF_T) || (bfp->l_len > MAXOFF_T))
2327 return (EFBIG);
2328 error = tmp_freesp(vp, bfp, flag);
2329
2330 if (error == 0 && bfp->l_start == 0)
2331 vnevent_truncate(vp, ct);
2332 }
2333 return (error);
2334 }
2335
2336 /* ARGSUSED */
2337 static int
tmp_seek(struct vnode * vp,offset_t ooff,offset_t * noffp,caller_context_t * ct)2338 tmp_seek(
2339 struct vnode *vp,
2340 offset_t ooff,
2341 offset_t *noffp,
2342 caller_context_t *ct)
2343 {
2344 return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
2345 }
2346
2347 /* ARGSUSED2 */
2348 static int
tmp_rwlock(struct vnode * vp,int write_lock,caller_context_t * ctp)2349 tmp_rwlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2350 {
2351 struct tmpnode *tp = VTOTN(vp);
2352
2353 if (write_lock) {
2354 rw_enter(&tp->tn_rwlock, RW_WRITER);
2355 } else {
2356 rw_enter(&tp->tn_rwlock, RW_READER);
2357 }
2358 return (write_lock);
2359 }
2360
2361 /* ARGSUSED1 */
2362 static void
tmp_rwunlock(struct vnode * vp,int write_lock,caller_context_t * ctp)2363 tmp_rwunlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2364 {
2365 struct tmpnode *tp = VTOTN(vp);
2366
2367 rw_exit(&tp->tn_rwlock);
2368 }
2369
2370 static int
tmp_pathconf(struct vnode * vp,int cmd,ulong_t * valp,cred_t * cr,caller_context_t * ct)2371 tmp_pathconf(
2372 struct vnode *vp,
2373 int cmd,
2374 ulong_t *valp,
2375 cred_t *cr,
2376 caller_context_t *ct)
2377 {
2378 struct tmpnode *tp = NULL;
2379 int error;
2380
2381 switch (cmd) {
2382 case _PC_XATTR_EXISTS:
2383 if (vp->v_vfsp->vfs_flag & VFS_XATTR) {
2384 *valp = 0; /* assume no attributes */
2385 error = 0; /* okay to ask */
2386 tp = VTOTN(vp);
2387 rw_enter(&tp->tn_rwlock, RW_READER);
2388 if (tp->tn_xattrdp) {
2389 rw_enter(&tp->tn_xattrdp->tn_rwlock, RW_READER);
2390 /* do not count "." and ".." */
2391 if (tp->tn_xattrdp->tn_dirents > 2)
2392 *valp = 1;
2393 rw_exit(&tp->tn_xattrdp->tn_rwlock);
2394 }
2395 rw_exit(&tp->tn_rwlock);
2396 } else {
2397 error = EINVAL;
2398 }
2399 break;
2400 case _PC_SATTR_ENABLED:
2401 case _PC_SATTR_EXISTS:
2402 *valp = vfs_has_feature(vp->v_vfsp, VFSFT_SYSATTR_VIEWS) &&
2403 (vp->v_type == VREG || vp->v_type == VDIR);
2404 error = 0;
2405 break;
2406 case _PC_TIMESTAMP_RESOLUTION:
2407 /* nanosecond timestamp resolution */
2408 *valp = 1L;
2409 error = 0;
2410 break;
2411 default:
2412 error = fs_pathconf(vp, cmd, valp, cr, ct);
2413 }
2414 return (error);
2415 }
2416
2417
2418 struct vnodeops *tmp_vnodeops;
2419
2420 const fs_operation_def_t tmp_vnodeops_template[] = {
2421 VOPNAME_OPEN, { .vop_open = tmp_open },
2422 VOPNAME_CLOSE, { .vop_close = tmp_close },
2423 VOPNAME_READ, { .vop_read = tmp_read },
2424 VOPNAME_WRITE, { .vop_write = tmp_write },
2425 VOPNAME_IOCTL, { .vop_ioctl = tmp_ioctl },
2426 VOPNAME_GETATTR, { .vop_getattr = tmp_getattr },
2427 VOPNAME_SETATTR, { .vop_setattr = tmp_setattr },
2428 VOPNAME_ACCESS, { .vop_access = tmp_access },
2429 VOPNAME_LOOKUP, { .vop_lookup = tmp_lookup },
2430 VOPNAME_CREATE, { .vop_create = tmp_create },
2431 VOPNAME_REMOVE, { .vop_remove = tmp_remove },
2432 VOPNAME_LINK, { .vop_link = tmp_link },
2433 VOPNAME_RENAME, { .vop_rename = tmp_rename },
2434 VOPNAME_MKDIR, { .vop_mkdir = tmp_mkdir },
2435 VOPNAME_RMDIR, { .vop_rmdir = tmp_rmdir },
2436 VOPNAME_READDIR, { .vop_readdir = tmp_readdir },
2437 VOPNAME_SYMLINK, { .vop_symlink = tmp_symlink },
2438 VOPNAME_READLINK, { .vop_readlink = tmp_readlink },
2439 VOPNAME_FSYNC, { .vop_fsync = tmp_fsync },
2440 VOPNAME_INACTIVE, { .vop_inactive = tmp_inactive },
2441 VOPNAME_FID, { .vop_fid = tmp_fid },
2442 VOPNAME_RWLOCK, { .vop_rwlock = tmp_rwlock },
2443 VOPNAME_RWUNLOCK, { .vop_rwunlock = tmp_rwunlock },
2444 VOPNAME_SEEK, { .vop_seek = tmp_seek },
2445 VOPNAME_SPACE, { .vop_space = tmp_space },
2446 VOPNAME_GETPAGE, { .vop_getpage = tmp_getpage },
2447 VOPNAME_PUTPAGE, { .vop_putpage = tmp_putpage },
2448 VOPNAME_MAP, { .vop_map = tmp_map },
2449 VOPNAME_ADDMAP, { .vop_addmap = tmp_addmap },
2450 VOPNAME_DELMAP, { .vop_delmap = tmp_delmap },
2451 VOPNAME_PATHCONF, { .vop_pathconf = tmp_pathconf },
2452 VOPNAME_VNEVENT, { .vop_vnevent = fs_vnevent_support },
2453 NULL, NULL
2454 };
2455