1 /* 2 * Copyright (c) 1982, 1986, 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_vnops.c 8.2 (Berkeley) 1/21/94 39 * $FreeBSD$ 40 */ 41 42 #include <sys/param.h> 43 #include <sys/systm.h> 44 #include <sys/fcntl.h> 45 #include <sys/file.h> 46 #include <sys/stat.h> 47 #include <sys/proc.h> 48 #include <sys/lock.h> 49 #include <sys/mount.h> 50 #include <sys/mutex.h> 51 #include <sys/namei.h> 52 #include <sys/vnode.h> 53 #include <sys/bio.h> 54 #include <sys/buf.h> 55 #include <sys/filio.h> 56 #include <sys/ttycom.h> 57 #include <sys/conf.h> 58 #include <sys/syslog.h> 59 60 #include <machine/limits.h> 61 62 static int vn_closefile __P((struct file *fp, struct thread *td)); 63 static int vn_ioctl __P((struct file *fp, u_long com, caddr_t data, 64 struct thread *td)); 65 static int vn_read __P((struct file *fp, struct uio *uio, 66 struct ucred *cred, int flags, struct thread *td)); 67 static int vn_poll __P((struct file *fp, int events, struct ucred *cred, 68 struct thread *td)); 69 static int vn_kqfilter __P((struct file *fp, struct knote *kn)); 70 static int vn_statfile __P((struct file *fp, struct stat *sb, struct thread *td)); 71 static int vn_write __P((struct file *fp, struct uio *uio, 72 struct ucred *cred, int flags, struct thread *td)); 73 74 struct fileops vnops = { 75 vn_read, vn_write, vn_ioctl, vn_poll, vn_kqfilter, 76 vn_statfile, vn_closefile 77 }; 78 79 int 80 vn_open(ndp, flagp, cmode) 81 register struct nameidata *ndp; 82 int *flagp, cmode; 83 { 84 struct thread *td = ndp->ni_cnd.cn_thread; 85 86 return (vn_open_cred(ndp, flagp, cmode, td->td_proc->p_ucred)); 87 } 88 89 /* 90 * Common code for vnode open operations. 91 * Check permissions, and call the VOP_OPEN or VOP_CREATE routine. 92 * 93 * Note that this does NOT free nameidata for the successful case, 94 * due to the NDINIT being done elsewhere. 95 */ 96 int 97 vn_open_cred(ndp, flagp, cmode, cred) 98 register struct nameidata *ndp; 99 int *flagp, cmode; 100 struct ucred *cred; 101 { 102 struct vnode *vp; 103 struct mount *mp; 104 struct thread *td = ndp->ni_cnd.cn_thread; 105 struct vattr vat; 106 struct vattr *vap = &vat; 107 int mode, fmode, error; 108 109 restart: 110 fmode = *flagp; 111 if (fmode & O_CREAT) { 112 ndp->ni_cnd.cn_nameiop = CREATE; 113 ndp->ni_cnd.cn_flags = LOCKPARENT | LOCKLEAF; 114 if ((fmode & O_EXCL) == 0 && (fmode & O_NOFOLLOW) == 0) 115 ndp->ni_cnd.cn_flags |= FOLLOW; 116 bwillwrite(); 117 if ((error = namei(ndp)) != 0) 118 return (error); 119 if (ndp->ni_vp == NULL) { 120 VATTR_NULL(vap); 121 vap->va_type = VREG; 122 vap->va_mode = cmode; 123 if (fmode & O_EXCL) 124 vap->va_vaflags |= VA_EXCLUSIVE; 125 if (vn_start_write(ndp->ni_dvp, &mp, V_NOWAIT) != 0) { 126 NDFREE(ndp, NDF_ONLY_PNBUF); 127 vput(ndp->ni_dvp); 128 if ((error = vn_start_write(NULL, &mp, 129 V_XSLEEP | PCATCH)) != 0) 130 return (error); 131 goto restart; 132 } 133 VOP_LEASE(ndp->ni_dvp, td, cred, LEASE_WRITE); 134 error = VOP_CREATE(ndp->ni_dvp, &ndp->ni_vp, 135 &ndp->ni_cnd, vap); 136 vput(ndp->ni_dvp); 137 vn_finished_write(mp); 138 if (error) { 139 NDFREE(ndp, NDF_ONLY_PNBUF); 140 return (error); 141 } 142 ASSERT_VOP_UNLOCKED(ndp->ni_dvp, "create"); 143 ASSERT_VOP_LOCKED(ndp->ni_vp, "create"); 144 fmode &= ~O_TRUNC; 145 vp = ndp->ni_vp; 146 } else { 147 if (ndp->ni_dvp == ndp->ni_vp) 148 vrele(ndp->ni_dvp); 149 else 150 vput(ndp->ni_dvp); 151 ndp->ni_dvp = NULL; 152 vp = ndp->ni_vp; 153 if (fmode & O_EXCL) { 154 error = EEXIST; 155 goto bad; 156 } 157 fmode &= ~O_CREAT; 158 } 159 } else { 160 ndp->ni_cnd.cn_nameiop = LOOKUP; 161 ndp->ni_cnd.cn_flags = 162 ((fmode & O_NOFOLLOW) ? NOFOLLOW : FOLLOW) | LOCKLEAF; 163 if ((error = namei(ndp)) != 0) 164 return (error); 165 vp = ndp->ni_vp; 166 } 167 if (vp->v_type == VLNK) { 168 error = EMLINK; 169 goto bad; 170 } 171 if (vp->v_type == VSOCK) { 172 error = EOPNOTSUPP; 173 goto bad; 174 } 175 if ((fmode & O_CREAT) == 0) { 176 mode = 0; 177 if (fmode & (FWRITE | O_TRUNC)) { 178 if (vp->v_type == VDIR) { 179 error = EISDIR; 180 goto bad; 181 } 182 error = vn_writechk(vp); 183 if (error) 184 goto bad; 185 mode |= VWRITE; 186 } 187 if (fmode & FREAD) 188 mode |= VREAD; 189 if (mode) { 190 error = VOP_ACCESS(vp, mode, cred, td); 191 if (error) 192 goto bad; 193 } 194 } 195 if ((error = VOP_OPEN(vp, fmode, cred, td)) != 0) 196 goto bad; 197 /* 198 * Make sure that a VM object is created for VMIO support. 199 */ 200 if (vn_canvmio(vp) == TRUE) { 201 if ((error = vfs_object_create(vp, td, cred)) != 0) { 202 VOP_CLOSE(vp, fmode, cred, td); 203 goto bad; 204 } 205 } 206 207 if (fmode & FWRITE) 208 vp->v_writecount++; 209 *flagp = fmode; 210 return (0); 211 bad: 212 NDFREE(ndp, NDF_ONLY_PNBUF); 213 vput(vp); 214 *flagp = fmode; 215 return (error); 216 } 217 218 /* 219 * Check for write permissions on the specified vnode. 220 * Prototype text segments cannot be written. 221 */ 222 int 223 vn_writechk(vp) 224 register struct vnode *vp; 225 { 226 227 /* 228 * If there's shared text associated with 229 * the vnode, try to free it up once. If 230 * we fail, we can't allow writing. 231 */ 232 if (vp->v_flag & VTEXT) 233 return (ETXTBSY); 234 return (0); 235 } 236 237 /* 238 * Vnode close call 239 */ 240 int 241 vn_close(vp, flags, cred, td) 242 register struct vnode *vp; 243 int flags; 244 struct ucred *cred; 245 struct thread *td; 246 { 247 int error; 248 249 if (flags & FWRITE) 250 vp->v_writecount--; 251 error = VOP_CLOSE(vp, flags, cred, td); 252 /* 253 * XXX - In certain instances VOP_CLOSE has to do the vrele 254 * itself. If the vrele has been done, it will return EAGAIN 255 * to indicate that the vrele should not be done again. When 256 * this happens, we just return success. The correct thing to 257 * do would be to have all VOP_CLOSE instances do the vrele. 258 */ 259 if (error == EAGAIN) 260 return (0); 261 vrele(vp); 262 return (error); 263 } 264 265 static __inline 266 int 267 sequential_heuristic(struct uio *uio, struct file *fp) 268 { 269 270 /* 271 * Sequential heuristic - detect sequential operation 272 */ 273 if ((uio->uio_offset == 0 && fp->f_seqcount > 0) || 274 uio->uio_offset == fp->f_nextoff) { 275 /* 276 * XXX we assume that the filesystem block size is 277 * the default. Not true, but still gives us a pretty 278 * good indicator of how sequential the read operations 279 * are. 280 */ 281 fp->f_seqcount += (uio->uio_resid + BKVASIZE - 1) / BKVASIZE; 282 if (fp->f_seqcount >= 127) 283 fp->f_seqcount = 127; 284 return(fp->f_seqcount << 16); 285 } 286 287 /* 288 * Not sequential, quick draw-down of seqcount 289 */ 290 if (fp->f_seqcount > 1) 291 fp->f_seqcount = 1; 292 else 293 fp->f_seqcount = 0; 294 return(0); 295 } 296 297 /* 298 * Package up an I/O request on a vnode into a uio and do it. 299 */ 300 int 301 vn_rdwr(rw, vp, base, len, offset, segflg, ioflg, cred, aresid, td) 302 enum uio_rw rw; 303 struct vnode *vp; 304 caddr_t base; 305 int len; 306 off_t offset; 307 enum uio_seg segflg; 308 int ioflg; 309 struct ucred *cred; 310 int *aresid; 311 struct thread *td; 312 { 313 struct uio auio; 314 struct iovec aiov; 315 struct mount *mp; 316 int error; 317 318 if ((ioflg & IO_NODELOCKED) == 0) { 319 mp = NULL; 320 if (rw == UIO_WRITE && 321 vp->v_type != VCHR && 322 (error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 323 return (error); 324 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 325 } 326 auio.uio_iov = &aiov; 327 auio.uio_iovcnt = 1; 328 aiov.iov_base = base; 329 aiov.iov_len = len; 330 auio.uio_resid = len; 331 auio.uio_offset = offset; 332 auio.uio_segflg = segflg; 333 auio.uio_rw = rw; 334 auio.uio_td = td; 335 if (rw == UIO_READ) { 336 error = VOP_READ(vp, &auio, ioflg, cred); 337 } else { 338 error = VOP_WRITE(vp, &auio, ioflg, cred); 339 } 340 if (aresid) 341 *aresid = auio.uio_resid; 342 else 343 if (auio.uio_resid && error == 0) 344 error = EIO; 345 if ((ioflg & IO_NODELOCKED) == 0) { 346 vn_finished_write(mp); 347 VOP_UNLOCK(vp, 0, td); 348 } 349 return (error); 350 } 351 352 /* 353 * Package up an I/O request on a vnode into a uio and do it. The I/O 354 * request is split up into smaller chunks and we try to avoid saturating 355 * the buffer cache while potentially holding a vnode locked, so we 356 * check bwillwrite() before calling vn_rdwr(). We also call uio_yield() 357 * to give other processes a chance to lock the vnode (either other processes 358 * core'ing the same binary, or unrelated processes scanning the directory). 359 */ 360 int 361 vn_rdwr_inchunks(rw, vp, base, len, offset, segflg, ioflg, cred, aresid, td) 362 enum uio_rw rw; 363 struct vnode *vp; 364 caddr_t base; 365 int len; 366 off_t offset; 367 enum uio_seg segflg; 368 int ioflg; 369 struct ucred *cred; 370 int *aresid; 371 struct thread *td; 372 { 373 int error = 0; 374 375 do { 376 int chunk = (len > MAXBSIZE) ? MAXBSIZE : len; 377 378 if (rw != UIO_READ && vp->v_type == VREG) 379 bwillwrite(); 380 error = vn_rdwr(rw, vp, base, chunk, offset, segflg, 381 ioflg, cred, aresid, td); 382 len -= chunk; /* aresid calc already includes length */ 383 if (error) 384 break; 385 offset += chunk; 386 base += chunk; 387 uio_yield(); 388 } while (len); 389 if (aresid) 390 *aresid += len; 391 return (error); 392 } 393 394 /* 395 * File table vnode read routine. 396 */ 397 static int 398 vn_read(fp, uio, cred, flags, td) 399 struct file *fp; 400 struct uio *uio; 401 struct ucred *cred; 402 struct thread *td; 403 int flags; 404 { 405 struct vnode *vp; 406 int error, ioflag; 407 408 KASSERT(uio->uio_td == td, ("uio_td %p is not td %p", 409 uio->uio_td, td)); 410 vp = (struct vnode *)fp->f_data; 411 ioflag = 0; 412 if (fp->f_flag & FNONBLOCK) 413 ioflag |= IO_NDELAY; 414 if (fp->f_flag & O_DIRECT) 415 ioflag |= IO_DIRECT; 416 VOP_LEASE(vp, td, cred, LEASE_READ); 417 vn_lock(vp, LK_SHARED | LK_NOPAUSE | LK_RETRY, td); 418 if ((flags & FOF_OFFSET) == 0) 419 uio->uio_offset = fp->f_offset; 420 421 ioflag |= sequential_heuristic(uio, fp); 422 423 error = VOP_READ(vp, uio, ioflag, cred); 424 if ((flags & FOF_OFFSET) == 0) 425 fp->f_offset = uio->uio_offset; 426 fp->f_nextoff = uio->uio_offset; 427 VOP_UNLOCK(vp, 0, td); 428 return (error); 429 } 430 431 /* 432 * File table vnode write routine. 433 */ 434 static int 435 vn_write(fp, uio, cred, flags, td) 436 struct file *fp; 437 struct uio *uio; 438 struct ucred *cred; 439 struct thread *td; 440 int flags; 441 { 442 struct vnode *vp; 443 struct mount *mp; 444 int error, ioflag; 445 446 KASSERT(uio->uio_td == td, ("uio_td %p is not td %p", 447 uio->uio_td, td)); 448 vp = (struct vnode *)fp->f_data; 449 if (vp->v_type == VREG) 450 bwillwrite(); 451 ioflag = IO_UNIT; 452 if (vp->v_type == VREG && (fp->f_flag & O_APPEND)) 453 ioflag |= IO_APPEND; 454 if (fp->f_flag & FNONBLOCK) 455 ioflag |= IO_NDELAY; 456 if (fp->f_flag & O_DIRECT) 457 ioflag |= IO_DIRECT; 458 if ((fp->f_flag & O_FSYNC) || 459 (vp->v_mount && (vp->v_mount->mnt_flag & MNT_SYNCHRONOUS))) 460 ioflag |= IO_SYNC; 461 mp = NULL; 462 if (vp->v_type != VCHR && 463 (error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 464 return (error); 465 VOP_LEASE(vp, td, cred, LEASE_WRITE); 466 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 467 if ((flags & FOF_OFFSET) == 0) 468 uio->uio_offset = fp->f_offset; 469 ioflag |= sequential_heuristic(uio, fp); 470 error = VOP_WRITE(vp, uio, ioflag, cred); 471 if ((flags & FOF_OFFSET) == 0) 472 fp->f_offset = uio->uio_offset; 473 fp->f_nextoff = uio->uio_offset; 474 VOP_UNLOCK(vp, 0, td); 475 vn_finished_write(mp); 476 return (error); 477 } 478 479 /* 480 * File table vnode stat routine. 481 */ 482 static int 483 vn_statfile(fp, sb, td) 484 struct file *fp; 485 struct stat *sb; 486 struct thread *td; 487 { 488 struct vnode *vp = (struct vnode *)fp->f_data; 489 int error; 490 491 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 492 error = vn_stat(vp, sb, td); 493 VOP_UNLOCK(vp, 0, td); 494 495 return (error); 496 } 497 498 int 499 vn_stat(vp, sb, td) 500 struct vnode *vp; 501 register struct stat *sb; 502 struct thread *td; 503 { 504 struct vattr vattr; 505 register struct vattr *vap; 506 int error; 507 u_short mode; 508 509 vap = &vattr; 510 error = VOP_GETATTR(vp, vap, td->td_proc->p_ucred, td); 511 if (error) 512 return (error); 513 514 /* 515 * Zero the spare stat fields 516 */ 517 sb->st_lspare = 0; 518 sb->st_qspare[0] = 0; 519 sb->st_qspare[1] = 0; 520 521 /* 522 * Copy from vattr table 523 */ 524 if (vap->va_fsid != VNOVAL) 525 sb->st_dev = vap->va_fsid; 526 else 527 sb->st_dev = vp->v_mount->mnt_stat.f_fsid.val[0]; 528 sb->st_ino = vap->va_fileid; 529 mode = vap->va_mode; 530 switch (vap->va_type) { 531 case VREG: 532 mode |= S_IFREG; 533 break; 534 case VDIR: 535 mode |= S_IFDIR; 536 break; 537 case VBLK: 538 mode |= S_IFBLK; 539 break; 540 case VCHR: 541 mode |= S_IFCHR; 542 break; 543 case VLNK: 544 mode |= S_IFLNK; 545 /* This is a cosmetic change, symlinks do not have a mode. */ 546 if (vp->v_mount->mnt_flag & MNT_NOSYMFOLLOW) 547 sb->st_mode &= ~ACCESSPERMS; /* 0000 */ 548 else 549 sb->st_mode |= ACCESSPERMS; /* 0777 */ 550 break; 551 case VSOCK: 552 mode |= S_IFSOCK; 553 break; 554 case VFIFO: 555 mode |= S_IFIFO; 556 break; 557 default: 558 return (EBADF); 559 }; 560 sb->st_mode = mode; 561 sb->st_nlink = vap->va_nlink; 562 sb->st_uid = vap->va_uid; 563 sb->st_gid = vap->va_gid; 564 sb->st_rdev = vap->va_rdev; 565 if (vap->va_size > OFF_MAX) 566 return (EOVERFLOW); 567 sb->st_size = vap->va_size; 568 sb->st_atimespec = vap->va_atime; 569 sb->st_mtimespec = vap->va_mtime; 570 sb->st_ctimespec = vap->va_ctime; 571 572 /* 573 * According to www.opengroup.org, the meaning of st_blksize is 574 * "a filesystem-specific preferred I/O block size for this 575 * object. In some filesystem types, this may vary from file 576 * to file" 577 * Default to PAGE_SIZE after much discussion. 578 */ 579 580 if (vap->va_type == VREG) { 581 sb->st_blksize = vap->va_blocksize; 582 } else if (vn_isdisk(vp, NULL)) { 583 sb->st_blksize = vp->v_rdev->si_bsize_best; 584 if (sb->st_blksize < vp->v_rdev->si_bsize_phys) 585 sb->st_blksize = vp->v_rdev->si_bsize_phys; 586 if (sb->st_blksize < BLKDEV_IOSIZE) 587 sb->st_blksize = BLKDEV_IOSIZE; 588 } else { 589 sb->st_blksize = PAGE_SIZE; 590 } 591 592 sb->st_flags = vap->va_flags; 593 if (suser_xxx(td->td_proc->p_ucred, 0, 0)) 594 sb->st_gen = 0; 595 else 596 sb->st_gen = vap->va_gen; 597 598 #if (S_BLKSIZE == 512) 599 /* Optimize this case */ 600 sb->st_blocks = vap->va_bytes >> 9; 601 #else 602 sb->st_blocks = vap->va_bytes / S_BLKSIZE; 603 #endif 604 return (0); 605 } 606 607 /* 608 * File table vnode ioctl routine. 609 */ 610 static int 611 vn_ioctl(fp, com, data, td) 612 struct file *fp; 613 u_long com; 614 caddr_t data; 615 struct thread *td; 616 { 617 register struct vnode *vp = ((struct vnode *)fp->f_data); 618 struct vattr vattr; 619 int error; 620 621 switch (vp->v_type) { 622 623 case VREG: 624 case VDIR: 625 if (com == FIONREAD) { 626 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 627 error = VOP_GETATTR(vp, &vattr, td->td_proc->p_ucred, td); 628 VOP_UNLOCK(vp, 0, td); 629 if (error) 630 return (error); 631 *(int *)data = vattr.va_size - fp->f_offset; 632 return (0); 633 } 634 if (com == FIONBIO || com == FIOASYNC) /* XXX */ 635 return (0); /* XXX */ 636 /* fall into ... */ 637 638 default: 639 #if 0 640 return (ENOTTY); 641 #endif 642 case VFIFO: 643 case VCHR: 644 case VBLK: 645 if (com == FIODTYPE) { 646 if (vp->v_type != VCHR && vp->v_type != VBLK) 647 return (ENOTTY); 648 *(int *)data = devsw(vp->v_rdev)->d_flags & D_TYPEMASK; 649 return (0); 650 } 651 error = VOP_IOCTL(vp, com, data, fp->f_flag, td->td_proc->p_ucred, td); 652 if (error == 0 && com == TIOCSCTTY) { 653 654 /* Do nothing if reassigning same control tty */ 655 if (td->td_proc->p_session->s_ttyvp == vp) 656 return (0); 657 658 /* Get rid of reference to old control tty */ 659 if (td->td_proc->p_session->s_ttyvp) 660 vrele(td->td_proc->p_session->s_ttyvp); 661 662 td->td_proc->p_session->s_ttyvp = vp; 663 VREF(vp); 664 } 665 return (error); 666 } 667 } 668 669 /* 670 * File table vnode poll routine. 671 */ 672 static int 673 vn_poll(fp, events, cred, td) 674 struct file *fp; 675 int events; 676 struct ucred *cred; 677 struct thread *td; 678 { 679 680 return (VOP_POLL(((struct vnode *)fp->f_data), events, cred, td)); 681 } 682 683 /* 684 * Check that the vnode is still valid, and if so 685 * acquire requested lock. 686 */ 687 int 688 #ifndef DEBUG_LOCKS 689 vn_lock(vp, flags, td) 690 #else 691 debug_vn_lock(vp, flags, td, filename, line) 692 #endif 693 struct vnode *vp; 694 int flags; 695 struct thread *td; 696 #ifdef DEBUG_LOCKS 697 const char *filename; 698 int line; 699 #endif 700 { 701 int error; 702 703 do { 704 if ((flags & LK_INTERLOCK) == 0) 705 mtx_lock(&vp->v_interlock); 706 if ((vp->v_flag & VXLOCK) && vp->v_vxproc != curthread) { 707 vp->v_flag |= VXWANT; 708 msleep(vp, &vp->v_interlock, PINOD | PDROP, 709 "vn_lock", 0); 710 error = ENOENT; 711 } else { 712 #if 0 713 /* this can now occur in normal operation */ 714 if (vp->v_vxproc != NULL) 715 log(LOG_INFO, "VXLOCK interlock avoided in vn_lock\n"); 716 #endif 717 #ifdef DEBUG_LOCKS 718 vp->filename = filename; 719 vp->line = line; 720 #endif 721 error = VOP_LOCK(vp, 722 flags | LK_NOPAUSE | LK_INTERLOCK, td); 723 if (error == 0) 724 return (error); 725 } 726 flags &= ~LK_INTERLOCK; 727 } while (flags & LK_RETRY); 728 return (error); 729 } 730 731 /* 732 * File table vnode close routine. 733 */ 734 static int 735 vn_closefile(fp, td) 736 struct file *fp; 737 struct thread *td; 738 { 739 740 fp->f_ops = &badfileops; 741 return (vn_close(((struct vnode *)fp->f_data), fp->f_flag, 742 fp->f_cred, td)); 743 } 744 745 /* 746 * Preparing to start a filesystem write operation. If the operation is 747 * permitted, then we bump the count of operations in progress and 748 * proceed. If a suspend request is in progress, we wait until the 749 * suspension is over, and then proceed. 750 */ 751 int 752 vn_start_write(vp, mpp, flags) 753 struct vnode *vp; 754 struct mount **mpp; 755 int flags; 756 { 757 struct mount *mp; 758 int error; 759 760 /* 761 * If a vnode is provided, get and return the mount point that 762 * to which it will write. 763 */ 764 if (vp != NULL) { 765 if ((error = VOP_GETWRITEMOUNT(vp, mpp)) != 0) { 766 *mpp = NULL; 767 if (error != EOPNOTSUPP) 768 return (error); 769 return (0); 770 } 771 } 772 if ((mp = *mpp) == NULL) 773 return (0); 774 /* 775 * Check on status of suspension. 776 */ 777 while ((mp->mnt_kern_flag & MNTK_SUSPEND) != 0) { 778 if (flags & V_NOWAIT) 779 return (EWOULDBLOCK); 780 error = tsleep(&mp->mnt_flag, (PUSER - 1) | (flags & PCATCH), 781 "suspfs", 0); 782 if (error) 783 return (error); 784 } 785 if (flags & V_XSLEEP) 786 return (0); 787 mp->mnt_writeopcount++; 788 return (0); 789 } 790 791 /* 792 * Secondary suspension. Used by operations such as vop_inactive 793 * routines that are needed by the higher level functions. These 794 * are allowed to proceed until all the higher level functions have 795 * completed (indicated by mnt_writeopcount dropping to zero). At that 796 * time, these operations are halted until the suspension is over. 797 */ 798 int 799 vn_write_suspend_wait(vp, mp, flags) 800 struct vnode *vp; 801 struct mount *mp; 802 int flags; 803 { 804 int error; 805 806 if (vp != NULL) { 807 if ((error = VOP_GETWRITEMOUNT(vp, &mp)) != 0) { 808 if (error != EOPNOTSUPP) 809 return (error); 810 return (0); 811 } 812 } 813 /* 814 * If we are not suspended or have not yet reached suspended 815 * mode, then let the operation proceed. 816 */ 817 if (mp == NULL || (mp->mnt_kern_flag & MNTK_SUSPENDED) == 0) 818 return (0); 819 if (flags & V_NOWAIT) 820 return (EWOULDBLOCK); 821 /* 822 * Wait for the suspension to finish. 823 */ 824 return (tsleep(&mp->mnt_flag, (PUSER - 1) | (flags & PCATCH), 825 "suspfs", 0)); 826 } 827 828 /* 829 * Filesystem write operation has completed. If we are suspending and this 830 * operation is the last one, notify the suspender that the suspension is 831 * now in effect. 832 */ 833 void 834 vn_finished_write(mp) 835 struct mount *mp; 836 { 837 838 if (mp == NULL) 839 return; 840 mp->mnt_writeopcount--; 841 if (mp->mnt_writeopcount < 0) 842 panic("vn_finished_write: neg cnt"); 843 if ((mp->mnt_kern_flag & MNTK_SUSPEND) != 0 && 844 mp->mnt_writeopcount <= 0) 845 wakeup(&mp->mnt_writeopcount); 846 } 847 848 /* 849 * Request a filesystem to suspend write operations. 850 */ 851 void 852 vfs_write_suspend(mp) 853 struct mount *mp; 854 { 855 struct thread *td = curthread; 856 857 if (mp->mnt_kern_flag & MNTK_SUSPEND) 858 return; 859 mp->mnt_kern_flag |= MNTK_SUSPEND; 860 if (mp->mnt_writeopcount > 0) 861 (void) tsleep(&mp->mnt_writeopcount, PUSER - 1, "suspwt", 0); 862 VFS_SYNC(mp, MNT_WAIT, td->td_proc->p_ucred, td); 863 mp->mnt_kern_flag |= MNTK_SUSPENDED; 864 } 865 866 /* 867 * Request a filesystem to resume write operations. 868 */ 869 void 870 vfs_write_resume(mp) 871 struct mount *mp; 872 { 873 874 if ((mp->mnt_kern_flag & MNTK_SUSPEND) == 0) 875 return; 876 mp->mnt_kern_flag &= ~(MNTK_SUSPEND | MNTK_SUSPENDED); 877 wakeup(&mp->mnt_writeopcount); 878 wakeup(&mp->mnt_flag); 879 } 880 881 static int 882 vn_kqfilter(struct file *fp, struct knote *kn) 883 { 884 885 return (VOP_KQFILTER(((struct vnode *)fp->f_data), kn)); 886 } 887 888 /* 889 * Simplified in-kernel wrapper calls for extended attribute access. 890 * Both calls pass in a NULL credential, authorizing as "kernel" access. 891 * Set IO_NODELOCKED in ioflg if the vnode is already locked. 892 */ 893 int 894 vn_extattr_get(struct vnode *vp, int ioflg, int attrnamespace, 895 const char *attrname, int *buflen, char *buf, struct thread *td) 896 { 897 struct uio auio; 898 struct iovec iov; 899 int error; 900 901 iov.iov_len = *buflen; 902 iov.iov_base = buf; 903 904 auio.uio_iov = &iov; 905 auio.uio_iovcnt = 1; 906 auio.uio_rw = UIO_READ; 907 auio.uio_segflg = UIO_SYSSPACE; 908 auio.uio_td = td; 909 auio.uio_offset = 0; 910 auio.uio_resid = *buflen; 911 912 if ((ioflg & IO_NODELOCKED) == 0) 913 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 914 915 /* authorize attribute retrieval as kernel */ 916 error = VOP_GETEXTATTR(vp, attrnamespace, attrname, &auio, NULL, NULL, 917 td); 918 919 if ((ioflg & IO_NODELOCKED) == 0) 920 VOP_UNLOCK(vp, 0, td); 921 922 if (error == 0) { 923 *buflen = *buflen - auio.uio_resid; 924 } 925 926 return (error); 927 } 928 929 /* 930 * XXX failure mode if partially written? 931 */ 932 int 933 vn_extattr_set(struct vnode *vp, int ioflg, int attrnamespace, 934 const char *attrname, int buflen, char *buf, struct thread *td) 935 { 936 struct uio auio; 937 struct iovec iov; 938 struct mount *mp; 939 int error; 940 941 iov.iov_len = buflen; 942 iov.iov_base = buf; 943 944 auio.uio_iov = &iov; 945 auio.uio_iovcnt = 1; 946 auio.uio_rw = UIO_WRITE; 947 auio.uio_segflg = UIO_SYSSPACE; 948 auio.uio_td = td; 949 auio.uio_offset = 0; 950 auio.uio_resid = buflen; 951 952 if ((ioflg & IO_NODELOCKED) == 0) { 953 if ((error = vn_start_write(vp, &mp, V_WAIT)) != 0) 954 return (error); 955 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 956 } 957 958 /* authorize attribute setting as kernel */ 959 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio, NULL, td); 960 961 if ((ioflg & IO_NODELOCKED) == 0) { 962 vn_finished_write(mp); 963 VOP_UNLOCK(vp, 0, td); 964 } 965 966 return (error); 967 } 968 969 int 970 vn_extattr_rm(struct vnode *vp, int ioflg, int attrnamespace, 971 const char *attrname, struct thread *td) 972 { 973 struct mount *mp; 974 int error; 975 976 if ((ioflg & IO_NODELOCKED) == 0) { 977 if ((error = vn_start_write(vp, &mp, V_WAIT)) != 0) 978 return (error); 979 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 980 } 981 982 /* authorize attribute removal as kernel */ 983 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, NULL, td); 984 985 if ((ioflg & IO_NODELOCKED) == 0) { 986 vn_finished_write(mp); 987 VOP_UNLOCK(vp, 0, td); 988 } 989 990 return (error); 991 } 992