1 /* 2 * Copyright (c) 1982, 1986, 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_vnops.c 8.2 (Berkeley) 1/21/94 39 * $FreeBSD$ 40 */ 41 42 #include <sys/param.h> 43 #include <sys/systm.h> 44 #include <sys/fcntl.h> 45 #include <sys/file.h> 46 #include <sys/stat.h> 47 #include <sys/proc.h> 48 #include <sys/lock.h> 49 #include <sys/mount.h> 50 #include <sys/mutex.h> 51 #include <sys/namei.h> 52 #include <sys/vnode.h> 53 #include <sys/bio.h> 54 #include <sys/buf.h> 55 #include <sys/filio.h> 56 #include <sys/ttycom.h> 57 #include <sys/conf.h> 58 59 #include <machine/limits.h> 60 61 static int vn_closefile __P((struct file *fp, struct thread *td)); 62 static int vn_ioctl __P((struct file *fp, u_long com, caddr_t data, 63 struct thread *td)); 64 static int vn_read __P((struct file *fp, struct uio *uio, 65 struct ucred *cred, int flags, struct thread *td)); 66 static int vn_poll __P((struct file *fp, int events, struct ucred *cred, 67 struct thread *td)); 68 static int vn_kqfilter __P((struct file *fp, struct knote *kn)); 69 static int vn_statfile __P((struct file *fp, struct stat *sb, struct thread *td)); 70 static int vn_write __P((struct file *fp, struct uio *uio, 71 struct ucred *cred, int flags, struct thread *td)); 72 73 struct fileops vnops = { 74 vn_read, vn_write, vn_ioctl, vn_poll, vn_kqfilter, 75 vn_statfile, vn_closefile 76 }; 77 78 int 79 vn_open(ndp, flagp, cmode) 80 register struct nameidata *ndp; 81 int *flagp, cmode; 82 { 83 struct thread *td = ndp->ni_cnd.cn_thread; 84 85 return (vn_open_cred(ndp, flagp, cmode, td->td_proc->p_ucred)); 86 } 87 88 /* 89 * Common code for vnode open operations. 90 * Check permissions, and call the VOP_OPEN or VOP_CREATE routine. 91 * 92 * Note that this does NOT free nameidata for the successful case, 93 * due to the NDINIT being done elsewhere. 94 */ 95 int 96 vn_open_cred(ndp, flagp, cmode, cred) 97 register struct nameidata *ndp; 98 int *flagp, cmode; 99 struct ucred *cred; 100 { 101 struct vnode *vp; 102 struct mount *mp; 103 struct thread *td = ndp->ni_cnd.cn_thread; 104 struct vattr vat; 105 struct vattr *vap = &vat; 106 int mode, fmode, error; 107 108 restart: 109 fmode = *flagp; 110 if (fmode & O_CREAT) { 111 ndp->ni_cnd.cn_nameiop = CREATE; 112 ndp->ni_cnd.cn_flags = LOCKPARENT | LOCKLEAF; 113 if ((fmode & O_EXCL) == 0 && (fmode & O_NOFOLLOW) == 0) 114 ndp->ni_cnd.cn_flags |= FOLLOW; 115 bwillwrite(); 116 if ((error = namei(ndp)) != 0) 117 return (error); 118 if (ndp->ni_vp == NULL) { 119 VATTR_NULL(vap); 120 vap->va_type = VREG; 121 vap->va_mode = cmode; 122 if (fmode & O_EXCL) 123 vap->va_vaflags |= VA_EXCLUSIVE; 124 if (vn_start_write(ndp->ni_dvp, &mp, V_NOWAIT) != 0) { 125 NDFREE(ndp, NDF_ONLY_PNBUF); 126 vput(ndp->ni_dvp); 127 if ((error = vn_start_write(NULL, &mp, 128 V_XSLEEP | PCATCH)) != 0) 129 return (error); 130 goto restart; 131 } 132 VOP_LEASE(ndp->ni_dvp, td, cred, LEASE_WRITE); 133 error = VOP_CREATE(ndp->ni_dvp, &ndp->ni_vp, 134 &ndp->ni_cnd, vap); 135 vput(ndp->ni_dvp); 136 vn_finished_write(mp); 137 if (error) { 138 NDFREE(ndp, NDF_ONLY_PNBUF); 139 return (error); 140 } 141 ASSERT_VOP_UNLOCKED(ndp->ni_dvp, "create"); 142 ASSERT_VOP_LOCKED(ndp->ni_vp, "create"); 143 fmode &= ~O_TRUNC; 144 vp = ndp->ni_vp; 145 } else { 146 if (ndp->ni_dvp == ndp->ni_vp) 147 vrele(ndp->ni_dvp); 148 else 149 vput(ndp->ni_dvp); 150 ndp->ni_dvp = NULL; 151 vp = ndp->ni_vp; 152 if (fmode & O_EXCL) { 153 error = EEXIST; 154 goto bad; 155 } 156 fmode &= ~O_CREAT; 157 } 158 } else { 159 ndp->ni_cnd.cn_nameiop = LOOKUP; 160 ndp->ni_cnd.cn_flags = 161 ((fmode & O_NOFOLLOW) ? NOFOLLOW : FOLLOW) | LOCKLEAF; 162 if ((error = namei(ndp)) != 0) 163 return (error); 164 vp = ndp->ni_vp; 165 } 166 if (vp->v_type == VLNK) { 167 error = EMLINK; 168 goto bad; 169 } 170 if (vp->v_type == VSOCK) { 171 error = EOPNOTSUPP; 172 goto bad; 173 } 174 if ((fmode & O_CREAT) == 0) { 175 mode = 0; 176 if (fmode & (FWRITE | O_TRUNC)) { 177 if (vp->v_type == VDIR) { 178 error = EISDIR; 179 goto bad; 180 } 181 error = vn_writechk(vp); 182 if (error) 183 goto bad; 184 mode |= VWRITE; 185 } 186 if (fmode & FREAD) 187 mode |= VREAD; 188 if (mode) { 189 error = VOP_ACCESS(vp, mode, cred, td); 190 if (error) 191 goto bad; 192 } 193 } 194 if ((error = VOP_OPEN(vp, fmode, cred, td)) != 0) 195 goto bad; 196 /* 197 * Make sure that a VM object is created for VMIO support. 198 */ 199 if (vn_canvmio(vp) == TRUE) { 200 if ((error = vfs_object_create(vp, td, cred)) != 0) 201 /* XXX: Should VOP_CLOSE() again here. */ 202 goto bad; 203 } 204 205 if (fmode & FWRITE) 206 vp->v_writecount++; 207 *flagp = fmode; 208 return (0); 209 bad: 210 NDFREE(ndp, NDF_ONLY_PNBUF); 211 vput(vp); 212 *flagp = fmode; 213 return (error); 214 } 215 216 /* 217 * Check for write permissions on the specified vnode. 218 * Prototype text segments cannot be written. 219 */ 220 int 221 vn_writechk(vp) 222 register struct vnode *vp; 223 { 224 225 /* 226 * If there's shared text associated with 227 * the vnode, try to free it up once. If 228 * we fail, we can't allow writing. 229 */ 230 if (vp->v_flag & VTEXT) 231 return (ETXTBSY); 232 return (0); 233 } 234 235 /* 236 * Vnode close call 237 */ 238 int 239 vn_close(vp, flags, cred, td) 240 register struct vnode *vp; 241 int flags; 242 struct ucred *cred; 243 struct thread *td; 244 { 245 int error; 246 247 if (flags & FWRITE) 248 vp->v_writecount--; 249 error = VOP_CLOSE(vp, flags, cred, td); 250 /* 251 * XXX - In certain instances VOP_CLOSE has to do the vrele 252 * itself. If the vrele has been done, it will return EAGAIN 253 * to indicate that the vrele should not be done again. When 254 * this happens, we just return success. The correct thing to 255 * do would be to have all VOP_CLOSE instances do the vrele. 256 */ 257 if (error == EAGAIN) 258 return (0); 259 vrele(vp); 260 return (error); 261 } 262 263 static __inline 264 int 265 sequential_heuristic(struct uio *uio, struct file *fp) 266 { 267 /* 268 * Sequential heuristic - detect sequential operation 269 */ 270 if ((uio->uio_offset == 0 && fp->f_seqcount > 0) || 271 uio->uio_offset == fp->f_nextoff) { 272 /* 273 * XXX we assume that the filesystem block size is 274 * the default. Not true, but still gives us a pretty 275 * good indicator of how sequential the read operations 276 * are. 277 */ 278 fp->f_seqcount += (uio->uio_resid + BKVASIZE - 1) / BKVASIZE; 279 if (fp->f_seqcount >= 127) 280 fp->f_seqcount = 127; 281 return(fp->f_seqcount << 16); 282 } 283 284 /* 285 * Not sequential, quick draw-down of seqcount 286 */ 287 if (fp->f_seqcount > 1) 288 fp->f_seqcount = 1; 289 else 290 fp->f_seqcount = 0; 291 return(0); 292 } 293 294 /* 295 * Package up an I/O request on a vnode into a uio and do it. 296 */ 297 int 298 vn_rdwr(rw, vp, base, len, offset, segflg, ioflg, cred, aresid, td) 299 enum uio_rw rw; 300 struct vnode *vp; 301 caddr_t base; 302 int len; 303 off_t offset; 304 enum uio_seg segflg; 305 int ioflg; 306 struct ucred *cred; 307 int *aresid; 308 struct thread *td; 309 { 310 struct uio auio; 311 struct iovec aiov; 312 struct mount *mp; 313 int error; 314 315 if ((ioflg & IO_NODELOCKED) == 0) { 316 mp = NULL; 317 if (rw == UIO_WRITE && 318 vp->v_type != VCHR && 319 (error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 320 return (error); 321 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 322 } 323 auio.uio_iov = &aiov; 324 auio.uio_iovcnt = 1; 325 aiov.iov_base = base; 326 aiov.iov_len = len; 327 auio.uio_resid = len; 328 auio.uio_offset = offset; 329 auio.uio_segflg = segflg; 330 auio.uio_rw = rw; 331 auio.uio_td = td; 332 if (rw == UIO_READ) { 333 error = VOP_READ(vp, &auio, ioflg, cred); 334 } else { 335 error = VOP_WRITE(vp, &auio, ioflg, cred); 336 } 337 if (aresid) 338 *aresid = auio.uio_resid; 339 else 340 if (auio.uio_resid && error == 0) 341 error = EIO; 342 if ((ioflg & IO_NODELOCKED) == 0) { 343 vn_finished_write(mp); 344 VOP_UNLOCK(vp, 0, td); 345 } 346 return (error); 347 } 348 349 /* 350 * Package up an I/O request on a vnode into a uio and do it. The I/O 351 * request is split up into smaller chunks and we try to avoid saturating 352 * the buffer cache while potentially holding a vnode locked, so we 353 * check bwillwrite() before calling vn_rdwr(). We also call uio_yield() 354 * to give other processes a chance to lock the vnode (either other processes 355 * core'ing the same binary, or unrelated processes scanning the directory). 356 */ 357 int 358 vn_rdwr_inchunks(rw, vp, base, len, offset, segflg, ioflg, cred, aresid, td) 359 enum uio_rw rw; 360 struct vnode *vp; 361 caddr_t base; 362 int len; 363 off_t offset; 364 enum uio_seg segflg; 365 int ioflg; 366 struct ucred *cred; 367 int *aresid; 368 struct thread *td; 369 { 370 int error = 0; 371 372 do { 373 int chunk = (len > MAXBSIZE) ? MAXBSIZE : len; 374 375 if (rw != UIO_READ && vp->v_type == VREG) 376 bwillwrite(); 377 error = vn_rdwr(rw, vp, base, chunk, offset, segflg, 378 ioflg, cred, aresid, td); 379 len -= chunk; /* aresid calc already includes length */ 380 if (error) 381 break; 382 offset += chunk; 383 base += chunk; 384 uio_yield(); 385 } while (len); 386 if (aresid) 387 *aresid += len; 388 return (error); 389 } 390 391 /* 392 * File table vnode read routine. 393 */ 394 static int 395 vn_read(fp, uio, cred, flags, td) 396 struct file *fp; 397 struct uio *uio; 398 struct ucred *cred; 399 struct thread *td; 400 int flags; 401 { 402 struct vnode *vp; 403 int error, ioflag; 404 405 KASSERT(uio->uio_td == td, ("uio_td %p is not td %p", 406 uio->uio_td, td)); 407 vp = (struct vnode *)fp->f_data; 408 ioflag = 0; 409 if (fp->f_flag & FNONBLOCK) 410 ioflag |= IO_NDELAY; 411 if (fp->f_flag & O_DIRECT) 412 ioflag |= IO_DIRECT; 413 VOP_LEASE(vp, td, cred, LEASE_READ); 414 vn_lock(vp, LK_SHARED | LK_NOPAUSE | LK_RETRY, td); 415 if ((flags & FOF_OFFSET) == 0) 416 uio->uio_offset = fp->f_offset; 417 418 ioflag |= sequential_heuristic(uio, fp); 419 420 error = VOP_READ(vp, uio, ioflag, cred); 421 if ((flags & FOF_OFFSET) == 0) 422 fp->f_offset = uio->uio_offset; 423 fp->f_nextoff = uio->uio_offset; 424 VOP_UNLOCK(vp, 0, td); 425 return (error); 426 } 427 428 /* 429 * File table vnode write routine. 430 */ 431 static int 432 vn_write(fp, uio, cred, flags, td) 433 struct file *fp; 434 struct uio *uio; 435 struct ucred *cred; 436 struct thread *td; 437 int flags; 438 { 439 struct vnode *vp; 440 struct mount *mp; 441 int error, ioflag; 442 443 KASSERT(uio->uio_td == td, ("uio_td %p is not td %p", 444 uio->uio_td, td)); 445 vp = (struct vnode *)fp->f_data; 446 if (vp->v_type == VREG) 447 bwillwrite(); 448 vp = (struct vnode *)fp->f_data; /* XXX needed? */ 449 ioflag = IO_UNIT; 450 if (vp->v_type == VREG && (fp->f_flag & O_APPEND)) 451 ioflag |= IO_APPEND; 452 if (fp->f_flag & FNONBLOCK) 453 ioflag |= IO_NDELAY; 454 if (fp->f_flag & O_DIRECT) 455 ioflag |= IO_DIRECT; 456 if ((fp->f_flag & O_FSYNC) || 457 (vp->v_mount && (vp->v_mount->mnt_flag & MNT_SYNCHRONOUS))) 458 ioflag |= IO_SYNC; 459 mp = NULL; 460 if (vp->v_type != VCHR && 461 (error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 462 return (error); 463 VOP_LEASE(vp, td, cred, LEASE_WRITE); 464 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 465 if ((flags & FOF_OFFSET) == 0) 466 uio->uio_offset = fp->f_offset; 467 ioflag |= sequential_heuristic(uio, fp); 468 error = VOP_WRITE(vp, uio, ioflag, cred); 469 if ((flags & FOF_OFFSET) == 0) 470 fp->f_offset = uio->uio_offset; 471 fp->f_nextoff = uio->uio_offset; 472 VOP_UNLOCK(vp, 0, td); 473 vn_finished_write(mp); 474 return (error); 475 } 476 477 /* 478 * File table vnode stat routine. 479 */ 480 static int 481 vn_statfile(fp, sb, td) 482 struct file *fp; 483 struct stat *sb; 484 struct thread *td; 485 { 486 struct vnode *vp = (struct vnode *)fp->f_data; 487 488 return vn_stat(vp, sb, td); 489 } 490 491 int 492 vn_stat(vp, sb, td) 493 struct vnode *vp; 494 register struct stat *sb; 495 struct thread *td; 496 { 497 struct vattr vattr; 498 register struct vattr *vap; 499 int error; 500 u_short mode; 501 502 vap = &vattr; 503 error = VOP_GETATTR(vp, vap, td->td_proc->p_ucred, td); 504 if (error) 505 return (error); 506 507 /* 508 * Zero the spare stat fields 509 */ 510 sb->st_lspare = 0; 511 sb->st_qspare[0] = 0; 512 sb->st_qspare[1] = 0; 513 514 /* 515 * Copy from vattr table 516 */ 517 if (vap->va_fsid != VNOVAL) 518 sb->st_dev = vap->va_fsid; 519 else 520 sb->st_dev = vp->v_mount->mnt_stat.f_fsid.val[0]; 521 sb->st_ino = vap->va_fileid; 522 mode = vap->va_mode; 523 switch (vap->va_type) { 524 case VREG: 525 mode |= S_IFREG; 526 break; 527 case VDIR: 528 mode |= S_IFDIR; 529 break; 530 case VBLK: 531 mode |= S_IFBLK; 532 break; 533 case VCHR: 534 mode |= S_IFCHR; 535 break; 536 case VLNK: 537 mode |= S_IFLNK; 538 /* This is a cosmetic change, symlinks do not have a mode. */ 539 if (vp->v_mount->mnt_flag & MNT_NOSYMFOLLOW) 540 sb->st_mode &= ~ACCESSPERMS; /* 0000 */ 541 else 542 sb->st_mode |= ACCESSPERMS; /* 0777 */ 543 break; 544 case VSOCK: 545 mode |= S_IFSOCK; 546 break; 547 case VFIFO: 548 mode |= S_IFIFO; 549 break; 550 default: 551 return (EBADF); 552 }; 553 sb->st_mode = mode; 554 sb->st_nlink = vap->va_nlink; 555 sb->st_uid = vap->va_uid; 556 sb->st_gid = vap->va_gid; 557 sb->st_rdev = vap->va_rdev; 558 if (vap->va_size > OFF_MAX) 559 return (EOVERFLOW); 560 sb->st_size = vap->va_size; 561 sb->st_atimespec = vap->va_atime; 562 sb->st_mtimespec = vap->va_mtime; 563 sb->st_ctimespec = vap->va_ctime; 564 565 /* 566 * According to www.opengroup.org, the meaning of st_blksize is 567 * "a filesystem-specific preferred I/O block size for this 568 * object. In some filesystem types, this may vary from file 569 * to file" 570 * Default to zero to catch bogus uses of this field. 571 */ 572 573 if (vap->va_type == VREG) { 574 sb->st_blksize = vap->va_blocksize; 575 } else if (vn_isdisk(vp, NULL)) { 576 sb->st_blksize = vp->v_rdev->si_bsize_best; 577 if (sb->st_blksize < vp->v_rdev->si_bsize_phys) 578 sb->st_blksize = vp->v_rdev->si_bsize_phys; 579 if (sb->st_blksize < BLKDEV_IOSIZE) 580 sb->st_blksize = BLKDEV_IOSIZE; 581 } else { 582 sb->st_blksize = 0; 583 } 584 585 sb->st_flags = vap->va_flags; 586 if (suser_xxx(td->td_proc->p_ucred, 0, 0)) 587 sb->st_gen = 0; 588 else 589 sb->st_gen = vap->va_gen; 590 591 #if (S_BLKSIZE == 512) 592 /* Optimize this case */ 593 sb->st_blocks = vap->va_bytes >> 9; 594 #else 595 sb->st_blocks = vap->va_bytes / S_BLKSIZE; 596 #endif 597 return (0); 598 } 599 600 /* 601 * File table vnode ioctl routine. 602 */ 603 static int 604 vn_ioctl(fp, com, data, td) 605 struct file *fp; 606 u_long com; 607 caddr_t data; 608 struct thread *td; 609 { 610 register struct vnode *vp = ((struct vnode *)fp->f_data); 611 struct vattr vattr; 612 int error; 613 614 switch (vp->v_type) { 615 616 case VREG: 617 case VDIR: 618 if (com == FIONREAD) { 619 error = VOP_GETATTR(vp, &vattr, td->td_proc->p_ucred, td); 620 if (error) 621 return (error); 622 *(int *)data = vattr.va_size - fp->f_offset; 623 return (0); 624 } 625 if (com == FIONBIO || com == FIOASYNC) /* XXX */ 626 return (0); /* XXX */ 627 /* fall into ... */ 628 629 default: 630 #if 0 631 return (ENOTTY); 632 #endif 633 case VFIFO: 634 case VCHR: 635 case VBLK: 636 if (com == FIODTYPE) { 637 if (vp->v_type != VCHR && vp->v_type != VBLK) 638 return (ENOTTY); 639 *(int *)data = devsw(vp->v_rdev)->d_flags & D_TYPEMASK; 640 return (0); 641 } 642 error = VOP_IOCTL(vp, com, data, fp->f_flag, td->td_proc->p_ucred, td); 643 if (error == 0 && com == TIOCSCTTY) { 644 645 /* Do nothing if reassigning same control tty */ 646 if (td->td_proc->p_session->s_ttyvp == vp) 647 return (0); 648 649 /* Get rid of reference to old control tty */ 650 if (td->td_proc->p_session->s_ttyvp) 651 vrele(td->td_proc->p_session->s_ttyvp); 652 653 td->td_proc->p_session->s_ttyvp = vp; 654 VREF(vp); 655 } 656 return (error); 657 } 658 } 659 660 /* 661 * File table vnode poll routine. 662 */ 663 static int 664 vn_poll(fp, events, cred, td) 665 struct file *fp; 666 int events; 667 struct ucred *cred; 668 struct thread *td; 669 { 670 671 return (VOP_POLL(((struct vnode *)fp->f_data), events, cred, td)); 672 } 673 674 /* 675 * Check that the vnode is still valid, and if so 676 * acquire requested lock. 677 */ 678 int 679 #ifndef DEBUG_LOCKS 680 vn_lock(vp, flags, td) 681 #else 682 debug_vn_lock(vp, flags, td, filename, line) 683 #endif 684 struct vnode *vp; 685 int flags; 686 struct thread *td; 687 #ifdef DEBUG_LOCKS 688 const char *filename; 689 int line; 690 #endif 691 { 692 int error; 693 694 do { 695 if ((flags & LK_INTERLOCK) == 0) 696 mtx_lock(&vp->v_interlock); 697 if ((vp->v_flag & VXLOCK) && vp->v_vxproc != curthread) { 698 vp->v_flag |= VXWANT; 699 msleep(vp, &vp->v_interlock, PINOD | PDROP, 700 "vn_lock", 0); 701 error = ENOENT; 702 } else { 703 if (vp->v_vxproc != NULL) 704 printf("VXLOCK interlock avoided in vn_lock\n"); 705 #ifdef DEBUG_LOCKS 706 vp->filename = filename; 707 vp->line = line; 708 #endif 709 error = VOP_LOCK(vp, 710 flags | LK_NOPAUSE | LK_INTERLOCK, td); 711 if (error == 0) 712 return (error); 713 } 714 flags &= ~LK_INTERLOCK; 715 } while (flags & LK_RETRY); 716 return (error); 717 } 718 719 /* 720 * File table vnode close routine. 721 */ 722 static int 723 vn_closefile(fp, td) 724 struct file *fp; 725 struct thread *td; 726 { 727 728 fp->f_ops = &badfileops; 729 return (vn_close(((struct vnode *)fp->f_data), fp->f_flag, 730 fp->f_cred, td)); 731 } 732 733 /* 734 * Preparing to start a filesystem write operation. If the operation is 735 * permitted, then we bump the count of operations in progress and 736 * proceed. If a suspend request is in progress, we wait until the 737 * suspension is over, and then proceed. 738 */ 739 int 740 vn_start_write(vp, mpp, flags) 741 struct vnode *vp; 742 struct mount **mpp; 743 int flags; 744 { 745 struct mount *mp; 746 int error; 747 748 /* 749 * If a vnode is provided, get and return the mount point that 750 * to which it will write. 751 */ 752 if (vp != NULL) { 753 if ((error = VOP_GETWRITEMOUNT(vp, mpp)) != 0) { 754 *mpp = NULL; 755 if (error != EOPNOTSUPP) 756 return (error); 757 return (0); 758 } 759 } 760 if ((mp = *mpp) == NULL) 761 return (0); 762 /* 763 * Check on status of suspension. 764 */ 765 while ((mp->mnt_kern_flag & MNTK_SUSPEND) != 0) { 766 if (flags & V_NOWAIT) 767 return (EWOULDBLOCK); 768 error = tsleep(&mp->mnt_flag, (PUSER - 1) | (flags & PCATCH), 769 "suspfs", 0); 770 if (error) 771 return (error); 772 } 773 if (flags & V_XSLEEP) 774 return (0); 775 mp->mnt_writeopcount++; 776 return (0); 777 } 778 779 /* 780 * Secondary suspension. Used by operations such as vop_inactive 781 * routines that are needed by the higher level functions. These 782 * are allowed to proceed until all the higher level functions have 783 * completed (indicated by mnt_writeopcount dropping to zero). At that 784 * time, these operations are halted until the suspension is over. 785 */ 786 int 787 vn_write_suspend_wait(vp, mp, flags) 788 struct vnode *vp; 789 struct mount *mp; 790 int flags; 791 { 792 int error; 793 794 if (vp != NULL) { 795 if ((error = VOP_GETWRITEMOUNT(vp, &mp)) != 0) { 796 if (error != EOPNOTSUPP) 797 return (error); 798 return (0); 799 } 800 } 801 /* 802 * If we are not suspended or have not yet reached suspended 803 * mode, then let the operation proceed. 804 */ 805 if (mp == NULL || (mp->mnt_kern_flag & MNTK_SUSPENDED) == 0) 806 return (0); 807 if (flags & V_NOWAIT) 808 return (EWOULDBLOCK); 809 /* 810 * Wait for the suspension to finish. 811 */ 812 return (tsleep(&mp->mnt_flag, (PUSER - 1) | (flags & PCATCH), 813 "suspfs", 0)); 814 } 815 816 /* 817 * Filesystem write operation has completed. If we are suspending and this 818 * operation is the last one, notify the suspender that the suspension is 819 * now in effect. 820 */ 821 void 822 vn_finished_write(mp) 823 struct mount *mp; 824 { 825 826 if (mp == NULL) 827 return; 828 mp->mnt_writeopcount--; 829 if (mp->mnt_writeopcount < 0) 830 panic("vn_finished_write: neg cnt"); 831 if ((mp->mnt_kern_flag & MNTK_SUSPEND) != 0 && 832 mp->mnt_writeopcount <= 0) 833 wakeup(&mp->mnt_writeopcount); 834 } 835 836 /* 837 * Request a filesystem to suspend write operations. 838 */ 839 void 840 vfs_write_suspend(mp) 841 struct mount *mp; 842 { 843 struct thread *td = curthread; 844 845 if (mp->mnt_kern_flag & MNTK_SUSPEND) 846 return; 847 mp->mnt_kern_flag |= MNTK_SUSPEND; 848 if (mp->mnt_writeopcount > 0) 849 (void) tsleep(&mp->mnt_writeopcount, PUSER - 1, "suspwt", 0); 850 VFS_SYNC(mp, MNT_WAIT, td->td_proc->p_ucred, td); 851 mp->mnt_kern_flag |= MNTK_SUSPENDED; 852 } 853 854 /* 855 * Request a filesystem to resume write operations. 856 */ 857 void 858 vfs_write_resume(mp) 859 struct mount *mp; 860 { 861 862 if ((mp->mnt_kern_flag & MNTK_SUSPEND) == 0) 863 return; 864 mp->mnt_kern_flag &= ~(MNTK_SUSPEND | MNTK_SUSPENDED); 865 wakeup(&mp->mnt_writeopcount); 866 wakeup(&mp->mnt_flag); 867 } 868 869 static int 870 vn_kqfilter(struct file *fp, struct knote *kn) 871 { 872 873 return (VOP_KQFILTER(((struct vnode *)fp->f_data), kn)); 874 } 875 876 /* 877 * Simplified in-kernel wrapper calls for extended attribute access. 878 * Both calls pass in a NULL credential, authorizing as "kernel" access. 879 * Set IO_NODELOCKED in ioflg if the vnode is already locked. 880 */ 881 int 882 vn_extattr_get(struct vnode *vp, int ioflg, int attrnamespace, 883 const char *attrname, int *buflen, char *buf, struct thread *td) 884 { 885 struct uio auio; 886 struct iovec iov; 887 int error; 888 889 iov.iov_len = *buflen; 890 iov.iov_base = buf; 891 892 auio.uio_iov = &iov; 893 auio.uio_iovcnt = 1; 894 auio.uio_rw = UIO_READ; 895 auio.uio_segflg = UIO_SYSSPACE; 896 auio.uio_td = td; 897 auio.uio_offset = 0; 898 auio.uio_resid = *buflen; 899 900 if ((ioflg & IO_NODELOCKED) == 0) 901 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 902 903 /* authorize attribute retrieval as kernel */ 904 error = VOP_GETEXTATTR(vp, attrnamespace, attrname, &auio, NULL, td); 905 906 if ((ioflg & IO_NODELOCKED) == 0) 907 VOP_UNLOCK(vp, 0, td); 908 909 if (error == 0) { 910 *buflen = *buflen - auio.uio_resid; 911 } 912 913 return (error); 914 } 915 916 /* 917 * XXX failure mode if partially written? 918 */ 919 int 920 vn_extattr_set(struct vnode *vp, int ioflg, int attrnamespace, 921 const char *attrname, int buflen, char *buf, struct thread *td) 922 { 923 struct uio auio; 924 struct iovec iov; 925 struct mount *mp; 926 int error; 927 928 iov.iov_len = buflen; 929 iov.iov_base = buf; 930 931 auio.uio_iov = &iov; 932 auio.uio_iovcnt = 1; 933 auio.uio_rw = UIO_WRITE; 934 auio.uio_segflg = UIO_SYSSPACE; 935 auio.uio_td = td; 936 auio.uio_offset = 0; 937 auio.uio_resid = buflen; 938 939 if ((ioflg & IO_NODELOCKED) == 0) { 940 if ((error = vn_start_write(vp, &mp, V_WAIT)) != 0) 941 return (error); 942 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 943 } 944 945 /* authorize attribute setting as kernel */ 946 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio, NULL, td); 947 948 if ((ioflg & IO_NODELOCKED) == 0) { 949 vn_finished_write(mp); 950 VOP_UNLOCK(vp, 0, td); 951 } 952 953 return (error); 954 } 955 956 int 957 vn_extattr_rm(struct vnode *vp, int ioflg, int attrnamespace, 958 const char *attrname, struct thread *td) 959 { 960 struct mount *mp; 961 int error; 962 963 if ((ioflg & IO_NODELOCKED) == 0) { 964 if ((error = vn_start_write(vp, &mp, V_WAIT)) != 0) 965 return (error); 966 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 967 } 968 969 /* authorize attribute removal as kernel */ 970 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, NULL, td); 971 972 if ((ioflg & IO_NODELOCKED) == 0) { 973 vn_finished_write(mp); 974 VOP_UNLOCK(vp, 0, td); 975 } 976 977 return (error); 978 } 979