1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 /* 29 * vnode ops for the /dev filesystem 30 * 31 * - VDIR, VCHR, CBLK, and VLNK are considered must supported files 32 * - VREG and VDOOR are used for some internal implementations in 33 * the global zone, e.g. devname and devfsadm communication 34 * - other file types are unusual in this namespace and 35 * not supported for now 36 */ 37 38 #include <sys/types.h> 39 #include <sys/param.h> 40 #include <sys/t_lock.h> 41 #include <sys/systm.h> 42 #include <sys/sysmacros.h> 43 #include <sys/user.h> 44 #include <sys/time.h> 45 #include <sys/vfs.h> 46 #include <sys/vnode.h> 47 #include <sys/vfs_opreg.h> 48 #include <sys/file.h> 49 #include <sys/fcntl.h> 50 #include <sys/flock.h> 51 #include <sys/kmem.h> 52 #include <sys/uio.h> 53 #include <sys/errno.h> 54 #include <sys/stat.h> 55 #include <sys/cred.h> 56 #include <sys/cred_impl.h> 57 #include <sys/dirent.h> 58 #include <sys/pathname.h> 59 #include <sys/cmn_err.h> 60 #include <sys/debug.h> 61 #include <sys/policy.h> 62 #include <vm/hat.h> 63 #include <vm/seg_vn.h> 64 #include <vm/seg_map.h> 65 #include <vm/seg.h> 66 #include <vm/as.h> 67 #include <vm/page.h> 68 #include <sys/proc.h> 69 #include <sys/mode.h> 70 #include <sys/sunndi.h> 71 #include <sys/ptms.h> 72 #include <fs/fs_subr.h> 73 #include <sys/fs/dv_node.h> 74 #include <sys/fs/sdev_impl.h> 75 #include <sys/fs/sdev_node.h> 76 77 /*ARGSUSED*/ 78 static int 79 sdev_open(struct vnode **vpp, int flag, struct cred *cred, caller_context_t *ct) 80 { 81 struct sdev_node *dv = VTOSDEV(*vpp); 82 struct sdev_node *ddv = dv->sdev_dotdot; 83 int error = 0; 84 85 if ((*vpp)->v_type == VDIR) 86 return (0); 87 88 if (!SDEV_IS_GLOBAL(dv)) 89 return (ENOTSUP); 90 91 ASSERT((*vpp)->v_type == VREG); 92 if ((*vpp)->v_type != VREG) 93 return (ENOTSUP); 94 95 ASSERT(ddv); 96 rw_enter(&ddv->sdev_contents, RW_READER); 97 if (dv->sdev_attrvp == NULL) { 98 rw_exit(&ddv->sdev_contents); 99 return (ENOENT); 100 } 101 error = VOP_OPEN(&(dv->sdev_attrvp), flag, cred, ct); 102 rw_exit(&ddv->sdev_contents); 103 return (error); 104 } 105 106 /*ARGSUSED1*/ 107 static int 108 sdev_close(struct vnode *vp, int flag, int count, 109 offset_t offset, struct cred *cred, caller_context_t *ct) 110 { 111 struct sdev_node *dv = VTOSDEV(vp); 112 113 if (vp->v_type == VDIR) { 114 cleanlocks(vp, ttoproc(curthread)->p_pid, 0); 115 cleanshares(vp, ttoproc(curthread)->p_pid); 116 return (0); 117 } 118 119 if (!SDEV_IS_GLOBAL(dv)) 120 return (ENOTSUP); 121 122 ASSERT(vp->v_type == VREG); 123 if (vp->v_type != VREG) 124 return (ENOTSUP); 125 126 ASSERT(dv->sdev_attrvp); 127 return (VOP_CLOSE(dv->sdev_attrvp, flag, count, offset, cred, ct)); 128 } 129 130 /*ARGSUSED*/ 131 static int 132 sdev_read(struct vnode *vp, struct uio *uio, int ioflag, struct cred *cred, 133 struct caller_context *ct) 134 { 135 struct sdev_node *dv = (struct sdev_node *)VTOSDEV(vp); 136 int error; 137 138 if (!SDEV_IS_GLOBAL(dv)) 139 return (EINVAL); 140 141 if (vp->v_type == VDIR) 142 return (EISDIR); 143 144 /* only supporting regular files in /dev */ 145 ASSERT(vp->v_type == VREG); 146 if (vp->v_type != VREG) 147 return (EINVAL); 148 149 ASSERT(RW_READ_HELD(&VTOSDEV(vp)->sdev_contents)); 150 ASSERT(dv->sdev_attrvp); 151 (void) VOP_RWLOCK(dv->sdev_attrvp, 0, ct); 152 error = VOP_READ(dv->sdev_attrvp, uio, ioflag, cred, ct); 153 VOP_RWUNLOCK(dv->sdev_attrvp, 0, ct); 154 return (error); 155 } 156 157 /*ARGSUSED*/ 158 static int 159 sdev_write(struct vnode *vp, struct uio *uio, int ioflag, struct cred *cred, 160 struct caller_context *ct) 161 { 162 struct sdev_node *dv = VTOSDEV(vp); 163 int error = 0; 164 165 if (!SDEV_IS_GLOBAL(dv)) 166 return (EINVAL); 167 168 if (vp->v_type == VDIR) 169 return (EISDIR); 170 171 /* only supporting regular files in /dev */ 172 ASSERT(vp->v_type == VREG); 173 if (vp->v_type != VREG) 174 return (EINVAL); 175 176 ASSERT(dv->sdev_attrvp); 177 178 (void) VOP_RWLOCK(dv->sdev_attrvp, 1, ct); 179 error = VOP_WRITE(dv->sdev_attrvp, uio, ioflag, cred, ct); 180 VOP_RWUNLOCK(dv->sdev_attrvp, 1, ct); 181 if (error == 0) { 182 sdev_update_timestamps(dv->sdev_attrvp, kcred, 183 AT_MTIME); 184 } 185 return (error); 186 } 187 188 /*ARGSUSED*/ 189 static int 190 sdev_ioctl(struct vnode *vp, int cmd, intptr_t arg, int flag, 191 struct cred *cred, int *rvalp, caller_context_t *ct) 192 { 193 struct sdev_node *dv = VTOSDEV(vp); 194 195 if (!SDEV_IS_GLOBAL(dv) || (vp->v_type == VDIR)) 196 return (ENOTTY); 197 198 ASSERT(vp->v_type == VREG); 199 if (vp->v_type != VREG) 200 return (EINVAL); 201 202 ASSERT(dv->sdev_attrvp); 203 return (VOP_IOCTL(dv->sdev_attrvp, cmd, arg, flag, cred, rvalp, ct)); 204 } 205 206 static int 207 sdev_getattr(struct vnode *vp, struct vattr *vap, int flags, 208 struct cred *cr, caller_context_t *ct) 209 { 210 int error = 0; 211 struct sdev_node *dv = VTOSDEV(vp); 212 struct sdev_node *parent = dv->sdev_dotdot; 213 struct devname_nsmap *map = NULL; 214 struct devname_ops *dirops = NULL; 215 int (*fn)(devname_handle_t *, struct vattr *, struct cred *); 216 217 ASSERT(parent); 218 219 rw_enter(&parent->sdev_contents, RW_READER); 220 ASSERT(dv->sdev_attr || dv->sdev_attrvp); 221 if (SDEV_IS_GLOBAL(dv) && (dv->sdev_state != SDEV_ZOMBIE)) { 222 map = sdev_get_map(parent, 0); 223 dirops = map ? map->dir_ops : NULL; 224 } 225 226 /* 227 * search order: 228 * - for persistent nodes (SDEV_PERSIST): backstore 229 * - for non-persistent nodes: module ops if global, then memory 230 */ 231 if (dv->sdev_attrvp) { 232 rw_exit(&parent->sdev_contents); 233 error = VOP_GETATTR(dv->sdev_attrvp, vap, flags, cr, ct); 234 sdev_vattr_merge(dv, vap); 235 } else if (dirops && (fn = dirops->devnops_getattr)) { 236 sdev_vattr_merge(dv, vap); 237 rw_exit(&parent->sdev_contents); 238 error = (*fn)(&(dv->sdev_handle), vap, cr); 239 } else { 240 ASSERT(dv->sdev_attr); 241 *vap = *dv->sdev_attr; 242 sdev_vattr_merge(dv, vap); 243 rw_exit(&parent->sdev_contents); 244 } 245 246 return (error); 247 } 248 249 /*ARGSUSED4*/ 250 static int 251 sdev_setattr(struct vnode *vp, struct vattr *vap, int flags, 252 struct cred *cred, caller_context_t *ctp) 253 { 254 return (devname_setattr_func(vp, vap, flags, cred, NULL, 0)); 255 } 256 257 static int 258 sdev_getsecattr(struct vnode *vp, struct vsecattr *vsap, int flags, 259 struct cred *cr, caller_context_t *ct) 260 { 261 int error; 262 struct sdev_node *dv = VTOSDEV(vp); 263 struct vnode *avp = dv->sdev_attrvp; 264 265 if (avp == NULL) { 266 /* return fs_fab_acl() if flavor matches, else do nothing */ 267 if ((SDEV_ACL_FLAVOR(vp) == _ACL_ACLENT_ENABLED && 268 (vsap->vsa_mask & (VSA_ACLCNT | VSA_DFACLCNT))) || 269 (SDEV_ACL_FLAVOR(vp) == _ACL_ACE_ENABLED && 270 (vsap->vsa_mask & (VSA_ACECNT | VSA_ACE)))) 271 return (fs_fab_acl(vp, vsap, flags, cr, ct)); 272 273 return (ENOSYS); 274 } 275 276 (void) VOP_RWLOCK(avp, 1, ct); 277 error = VOP_GETSECATTR(avp, vsap, flags, cr, ct); 278 VOP_RWUNLOCK(avp, 1, ct); 279 return (error); 280 } 281 282 static int 283 sdev_setsecattr(struct vnode *vp, struct vsecattr *vsap, int flags, 284 struct cred *cr, caller_context_t *ct) 285 { 286 int error; 287 struct sdev_node *dv = VTOSDEV(vp); 288 struct vnode *avp = dv->sdev_attrvp; 289 290 if (dv->sdev_state == SDEV_ZOMBIE) 291 return (0); 292 293 if (avp == NULL) { 294 if (SDEV_IS_GLOBAL(dv) && !SDEV_IS_PERSIST(dv)) 295 return (fs_nosys()); 296 ASSERT(dv->sdev_attr); 297 /* 298 * if coming in directly, the acl system call will 299 * have held the read-write lock via VOP_RWLOCK() 300 * If coming in via specfs, specfs will have 301 * held the rw lock on the realvp i.e. us. 302 */ 303 ASSERT(RW_WRITE_HELD(&dv->sdev_contents)); 304 sdev_vattr_merge(dv, dv->sdev_attr); 305 error = sdev_shadow_node(dv, cr); 306 if (error) { 307 return (fs_nosys()); 308 } 309 310 ASSERT(dv->sdev_attrvp); 311 /* clean out the memory copy if any */ 312 if (dv->sdev_attr) { 313 kmem_free(dv->sdev_attr, sizeof (struct vattr)); 314 dv->sdev_attr = NULL; 315 } 316 avp = dv->sdev_attrvp; 317 } 318 ASSERT(avp); 319 320 (void) VOP_RWLOCK(avp, V_WRITELOCK_TRUE, ct); 321 error = VOP_SETSECATTR(avp, vsap, flags, cr, ct); 322 VOP_RWUNLOCK(avp, V_WRITELOCK_TRUE, ct); 323 return (error); 324 } 325 326 int 327 sdev_unlocked_access(void *vdv, int mode, struct cred *cr) 328 { 329 struct sdev_node *dv = vdv; 330 int shift = 0; 331 uid_t owner = dv->sdev_attr->va_uid; 332 333 if (crgetuid(cr) != owner) { 334 shift += 3; 335 if (groupmember(dv->sdev_attr->va_gid, cr) == 0) 336 shift += 3; 337 } 338 339 mode &= ~(dv->sdev_attr->va_mode << shift); 340 if (mode == 0) 341 return (0); 342 343 return (secpolicy_vnode_access(cr, SDEVTOV(dv), owner, mode)); 344 } 345 346 static int 347 sdev_access(struct vnode *vp, int mode, int flags, struct cred *cr, 348 caller_context_t *ct) 349 { 350 struct sdev_node *dv = VTOSDEV(vp); 351 int ret = 0; 352 353 ASSERT(dv->sdev_attr || dv->sdev_attrvp); 354 355 if (dv->sdev_attrvp) { 356 ret = VOP_ACCESS(dv->sdev_attrvp, mode, flags, cr, ct); 357 } else if (dv->sdev_attr) { 358 rw_enter(&dv->sdev_contents, RW_READER); 359 ret = sdev_unlocked_access(dv, mode, cr); 360 if (ret) 361 ret = EACCES; 362 rw_exit(&dv->sdev_contents); 363 } 364 365 return (ret); 366 } 367 368 /* 369 * Lookup 370 */ 371 /*ARGSUSED3*/ 372 static int 373 sdev_lookup(struct vnode *dvp, char *nm, struct vnode **vpp, 374 struct pathname *pnp, int flags, struct vnode *rdir, struct cred *cred, 375 caller_context_t *ct, int *direntflags, pathname_t *realpnp) 376 { 377 struct sdev_node *parent; 378 int error; 379 380 parent = VTOSDEV(dvp); 381 ASSERT(parent); 382 383 /* execute access is required to search the directory */ 384 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) 385 return (error); 386 387 if (!SDEV_IS_GLOBAL(parent)) 388 return (prof_lookup(dvp, nm, vpp, cred)); 389 return (devname_lookup_func(parent, nm, vpp, cred, NULL, 0)); 390 } 391 392 /*ARGSUSED2*/ 393 static int 394 sdev_create(struct vnode *dvp, char *nm, struct vattr *vap, vcexcl_t excl, 395 int mode, struct vnode **vpp, struct cred *cred, int flag, 396 caller_context_t *ct, vsecattr_t *vsecp) 397 { 398 struct vnode *vp = NULL; 399 struct vnode *avp; 400 struct sdev_node *parent; 401 struct sdev_node *self = NULL; 402 int error = 0; 403 vtype_t type = vap->va_type; 404 405 ASSERT(type != VNON && type != VBAD); 406 407 if ((type == VFIFO) || (type == VSOCK) || 408 (type == VPROC) || (type == VPORT)) 409 return (ENOTSUP); 410 411 parent = VTOSDEV(dvp); 412 ASSERT(parent); 413 414 rw_enter(&parent->sdev_dotdot->sdev_contents, RW_READER); 415 if (parent->sdev_state == SDEV_ZOMBIE) { 416 rw_exit(&parent->sdev_dotdot->sdev_contents); 417 return (ENOENT); 418 } 419 420 /* non-global do not allow pure node creation */ 421 if (!SDEV_IS_GLOBAL(parent)) { 422 rw_exit(&parent->sdev_dotdot->sdev_contents); 423 return (prof_lookup(dvp, nm, vpp, cred)); 424 } 425 rw_exit(&parent->sdev_dotdot->sdev_contents); 426 427 /* execute access is required to search the directory */ 428 if ((error = VOP_ACCESS(dvp, VEXEC|VWRITE, 0, cred, ct)) != 0) 429 return (error); 430 431 /* check existing name */ 432 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */ 433 error = VOP_LOOKUP(dvp, nm, &vp, NULL, 0, NULL, cred, ct, NULL, NULL); 434 435 /* name found */ 436 if (error == 0) { 437 ASSERT(vp); 438 if (excl == EXCL) { 439 error = EEXIST; 440 } else if ((vp->v_type == VDIR) && (mode & VWRITE)) { 441 /* allowing create/read-only an existing directory */ 442 error = EISDIR; 443 } else { 444 error = VOP_ACCESS(vp, mode, flag, cred, ct); 445 } 446 447 if (error) { 448 VN_RELE(vp); 449 return (error); 450 } 451 452 /* truncation first */ 453 if ((vp->v_type == VREG) && (vap->va_mask & AT_SIZE) && 454 (vap->va_size == 0)) { 455 ASSERT(parent->sdev_attrvp); 456 error = VOP_CREATE(parent->sdev_attrvp, 457 nm, vap, excl, mode, &avp, cred, flag, ct, vsecp); 458 459 if (error) { 460 VN_RELE(vp); 461 return (error); 462 } 463 } 464 465 sdev_update_timestamps(vp, kcred, 466 AT_CTIME|AT_MTIME|AT_ATIME); 467 *vpp = vp; 468 return (0); 469 } 470 471 /* bail out early */ 472 if (error != ENOENT) 473 return (error); 474 475 /* 476 * For memory-based (ROFS) directory: 477 * - either disallow node creation; 478 * - or implement VOP_CREATE of its own 479 */ 480 rw_enter(&parent->sdev_contents, RW_WRITER); 481 if (!SDEV_IS_PERSIST(parent)) { 482 rw_exit(&parent->sdev_contents); 483 return (ENOTSUP); 484 } 485 ASSERT(parent->sdev_attrvp); 486 error = sdev_mknode(parent, nm, &self, vap, NULL, NULL, 487 cred, SDEV_READY); 488 if (error) { 489 rw_exit(&parent->sdev_contents); 490 if (self) 491 SDEV_RELE(self); 492 return (error); 493 } 494 rw_exit(&parent->sdev_contents); 495 496 ASSERT(self); 497 /* take care the timestamps for the node and its parent */ 498 sdev_update_timestamps(SDEVTOV(self), kcred, 499 AT_CTIME|AT_MTIME|AT_ATIME); 500 sdev_update_timestamps(dvp, kcred, AT_MTIME|AT_ATIME); 501 if (SDEV_IS_GLOBAL(parent)) 502 atomic_inc_ulong(&parent->sdev_gdir_gen); 503 504 /* wake up other threads blocked on looking up this node */ 505 mutex_enter(&self->sdev_lookup_lock); 506 SDEV_UNBLOCK_OTHERS(self, SDEV_LOOKUP); 507 mutex_exit(&self->sdev_lookup_lock); 508 error = sdev_to_vp(self, vpp); 509 return (error); 510 } 511 512 static int 513 sdev_remove(struct vnode *dvp, char *nm, struct cred *cred, 514 caller_context_t *ct, int flags) 515 { 516 int error; 517 struct sdev_node *parent = (struct sdev_node *)VTOSDEV(dvp); 518 struct vnode *vp = NULL; 519 struct sdev_node *dv = NULL; 520 struct devname_nsmap *map = NULL; 521 struct devname_ops *dirops = NULL; 522 int (*fn)(devname_handle_t *); 523 int len; 524 int bkstore = 0; 525 526 /* bail out early */ 527 len = strlen(nm); 528 if (nm[0] == '.') { 529 if (len == 1) { 530 return (EINVAL); 531 } else if (len == 2 && nm[1] == '.') { 532 return (EEXIST); 533 } 534 } 535 536 ASSERT(parent); 537 rw_enter(&parent->sdev_contents, RW_READER); 538 if (!SDEV_IS_GLOBAL(parent)) { 539 rw_exit(&parent->sdev_contents); 540 return (ENOTSUP); 541 } 542 543 /* execute access is required to search the directory */ 544 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) { 545 rw_exit(&parent->sdev_contents); 546 return (error); 547 } 548 549 /* check existence first */ 550 dv = sdev_cache_lookup(parent, nm); 551 if (dv == NULL) { 552 rw_exit(&parent->sdev_contents); 553 return (ENOENT); 554 } 555 556 vp = SDEVTOV(dv); 557 if ((dv->sdev_state == SDEV_INIT) || 558 (dv->sdev_state == SDEV_ZOMBIE)) { 559 rw_exit(&parent->sdev_contents); 560 VN_RELE(vp); 561 return (ENOENT); 562 } 563 564 /* write access is required to remove an entry */ 565 if ((error = VOP_ACCESS(dvp, VWRITE, 0, cred, ct)) != 0) { 566 rw_exit(&parent->sdev_contents); 567 VN_RELE(vp); 568 return (error); 569 } 570 571 /* the module may record/reject removing a device node */ 572 map = sdev_get_map(parent, 0); 573 dirops = map ? map->dir_ops : NULL; 574 if (dirops && ((fn = dirops->devnops_remove) != NULL)) { 575 error = (*fn)(&(dv->sdev_handle)); 576 if (error) { 577 rw_exit(&parent->sdev_contents); 578 VN_RELE(vp); 579 return (error); 580 } 581 } 582 583 /* 584 * sdev_dirdelete does the real job of: 585 * - make sure no open ref count 586 * - destroying the sdev_node 587 * - releasing the hold on attrvp 588 */ 589 bkstore = SDEV_IS_PERSIST(dv) ? 1 : 0; 590 if (!rw_tryupgrade(&parent->sdev_contents)) { 591 rw_exit(&parent->sdev_contents); 592 rw_enter(&parent->sdev_contents, RW_WRITER); 593 } 594 error = sdev_cache_update(parent, &dv, nm, SDEV_CACHE_DELETE); 595 rw_exit(&parent->sdev_contents); 596 597 sdcmn_err2(("sdev_remove: cache_update error %d\n", error)); 598 if (error && (error != EBUSY)) { 599 /* report errors other than EBUSY */ 600 VN_RELE(vp); 601 } else { 602 sdcmn_err2(("sdev_remove: cleaning node %s from cache " 603 " with error %d\n", nm, error)); 604 605 /* 606 * best efforts clean up the backing store 607 */ 608 if (bkstore) { 609 ASSERT(parent->sdev_attrvp); 610 error = VOP_REMOVE(parent->sdev_attrvp, nm, cred, 611 ct, flags); 612 /* 613 * do not report BUSY error 614 * because the backing store ref count is released 615 * when the last ref count on the sdev_node is 616 * released. 617 */ 618 if (error == EBUSY) { 619 sdcmn_err2(("sdev_remove: device %s is still on" 620 "disk %s\n", nm, parent->sdev_path)); 621 error = 0; 622 } 623 } 624 625 if (error == EBUSY) 626 error = 0; 627 } 628 629 return (error); 630 } 631 632 /* 633 * Some restrictions for this file system: 634 * - both oldnm and newnm are in the scope of /dev file system, 635 * to simply the namespace management model. 636 */ 637 /*ARGSUSED6*/ 638 static int 639 sdev_rename(struct vnode *odvp, char *onm, struct vnode *ndvp, char *nnm, 640 struct cred *cred, caller_context_t *ct, int flags) 641 { 642 struct sdev_node *fromparent = NULL; 643 struct vattr vattr; 644 struct sdev_node *toparent; 645 struct sdev_node *fromdv = NULL; /* source node */ 646 struct vnode *ovp = NULL; /* source vnode */ 647 struct sdev_node *todv = NULL; /* destination node */ 648 struct vnode *nvp = NULL; /* destination vnode */ 649 int samedir = 0; /* set if odvp == ndvp */ 650 struct vnode *realvp; 651 int len; 652 char nnm_path[MAXPATHLEN]; 653 struct devname_nsmap *omap = NULL; 654 struct devname_ops *odirops = NULL; 655 int (*fn)(devname_handle_t *, char *); 656 int (*rmfn)(devname_handle_t *); 657 int error = 0; 658 dev_t fsid; 659 int bkstore = 0; 660 vtype_t type; 661 662 /* prevent modifying "." and ".." */ 663 if ((onm[0] == '.' && 664 (onm[1] == '\0' || (onm[1] == '.' && onm[2] == '\0'))) || 665 (nnm[0] == '.' && 666 (nnm[1] == '\0' || (nnm[1] == '.' && nnm[2] == '\0')))) { 667 return (EINVAL); 668 } 669 670 fromparent = VTOSDEV(odvp); 671 toparent = VTOSDEV(ndvp); 672 673 /* ZOMBIE parent doesn't allow new node creation */ 674 rw_enter(&fromparent->sdev_dotdot->sdev_contents, RW_READER); 675 if (fromparent->sdev_state == SDEV_ZOMBIE) { 676 rw_exit(&fromparent->sdev_dotdot->sdev_contents); 677 return (ENOENT); 678 } 679 680 /* renaming only supported for global device nodes */ 681 if (!SDEV_IS_GLOBAL(fromparent)) { 682 rw_exit(&fromparent->sdev_dotdot->sdev_contents); 683 return (ENOTSUP); 684 } 685 rw_exit(&fromparent->sdev_dotdot->sdev_contents); 686 687 rw_enter(&toparent->sdev_dotdot->sdev_contents, RW_READER); 688 if (toparent->sdev_state == SDEV_ZOMBIE) { 689 rw_exit(&toparent->sdev_dotdot->sdev_contents); 690 return (ENOENT); 691 } 692 rw_exit(&toparent->sdev_dotdot->sdev_contents); 693 694 /* 695 * acquire the global lock to prevent 696 * mount/unmount/other rename activities. 697 */ 698 mutex_enter(&sdev_lock); 699 700 /* check existence of the source node */ 701 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */ 702 error = VOP_LOOKUP(odvp, onm, &ovp, NULL, 0, NULL, cred, ct, 703 NULL, NULL); 704 if (error) { 705 sdcmn_err2(("sdev_rename: the source node %s exists\n", 706 onm)); 707 mutex_exit(&sdev_lock); 708 return (error); 709 } 710 711 if (VOP_REALVP(ovp, &realvp, ct) == 0) { 712 VN_HOLD(realvp); 713 VN_RELE(ovp); 714 ovp = realvp; 715 } 716 717 /* check existence of destination */ 718 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */ 719 error = VOP_LOOKUP(ndvp, nnm, &nvp, NULL, 0, NULL, cred, ct, 720 NULL, NULL); 721 if (error && (error != ENOENT)) { 722 mutex_exit(&sdev_lock); 723 VN_RELE(ovp); 724 return (error); 725 } 726 727 if (nvp && (VOP_REALVP(nvp, &realvp, ct) == 0)) { 728 VN_HOLD(realvp); 729 VN_RELE(nvp); 730 nvp = realvp; 731 } 732 733 /* 734 * make sure the source and the destination are 735 * in the same dev filesystem 736 */ 737 if (odvp != ndvp) { 738 vattr.va_mask = AT_FSID; 739 if (error = VOP_GETATTR(odvp, &vattr, 0, cred, ct)) { 740 mutex_exit(&sdev_lock); 741 VN_RELE(ovp); 742 return (error); 743 } 744 fsid = vattr.va_fsid; 745 vattr.va_mask = AT_FSID; 746 if (error = VOP_GETATTR(ndvp, &vattr, 0, cred, ct)) { 747 mutex_exit(&sdev_lock); 748 VN_RELE(ovp); 749 return (error); 750 } 751 if (fsid != vattr.va_fsid) { 752 mutex_exit(&sdev_lock); 753 VN_RELE(ovp); 754 return (EXDEV); 755 } 756 } 757 758 /* make sure the old entry can be deleted */ 759 error = VOP_ACCESS(odvp, VWRITE, 0, cred, ct); 760 if (error) { 761 mutex_exit(&sdev_lock); 762 VN_RELE(ovp); 763 return (error); 764 } 765 766 /* make sure the destination allows creation */ 767 samedir = (fromparent == toparent); 768 if (!samedir) { 769 error = VOP_ACCESS(ndvp, VEXEC|VWRITE, 0, cred, ct); 770 if (error) { 771 mutex_exit(&sdev_lock); 772 VN_RELE(ovp); 773 return (error); 774 } 775 } 776 777 fromdv = VTOSDEV(ovp); 778 ASSERT(fromdv); 779 780 /* check with the plug-in modules for the source directory */ 781 rw_enter(&fromparent->sdev_contents, RW_READER); 782 omap = sdev_get_map(fromparent, 0); 783 rw_exit(&fromparent->sdev_contents); 784 odirops = omap ? omap->dir_ops : NULL; 785 if (odirops && ((fn = odirops->devnops_rename) != NULL)) { 786 if (samedir) { 787 error = (*fn)(&(fromdv->sdev_handle), nnm); 788 } else { 789 len = strlen(nnm) + strlen(toparent->sdev_name) + 2; 790 (void) snprintf(nnm_path, len, "%s/%s", 791 toparent->sdev_name, nnm); 792 error = (*fn)(&(fromdv->sdev_handle), nnm); 793 } 794 795 if (error) { 796 mutex_exit(&sdev_lock); 797 sdcmn_err2(("sdev_rename: DBNR doesn't " 798 "allow rename, error %d", error)); 799 VN_RELE(ovp); 800 return (error); 801 } 802 } 803 804 /* destination file exists */ 805 if (nvp) { 806 todv = VTOSDEV(nvp); 807 ASSERT(todv); 808 } 809 810 /* 811 * link source to new target in the memory 812 */ 813 error = sdev_rnmnode(fromparent, fromdv, toparent, &todv, nnm, cred); 814 if (error) { 815 sdcmn_err2(("sdev_rename: renaming %s to %s failed " 816 " with error %d\n", onm, nnm, error)); 817 mutex_exit(&sdev_lock); 818 if (nvp) 819 VN_RELE(nvp); 820 VN_RELE(ovp); 821 return (error); 822 } 823 824 /* notify the DBNR module the node is going away */ 825 if (odirops && ((rmfn = odirops->devnops_remove) != NULL)) { 826 (void) (*rmfn)(&(fromdv->sdev_handle)); 827 } 828 829 /* 830 * unlink from source 831 */ 832 rw_enter(&fromparent->sdev_contents, RW_READER); 833 fromdv = sdev_cache_lookup(fromparent, onm); 834 if (fromdv == NULL) { 835 rw_exit(&fromparent->sdev_contents); 836 mutex_exit(&sdev_lock); 837 sdcmn_err2(("sdev_rename: the source is deleted already\n")); 838 return (0); 839 } 840 841 if (fromdv->sdev_state == SDEV_ZOMBIE) { 842 rw_exit(&fromparent->sdev_contents); 843 mutex_exit(&sdev_lock); 844 VN_RELE(SDEVTOV(fromdv)); 845 sdcmn_err2(("sdev_rename: the source is being deleted\n")); 846 return (0); 847 } 848 rw_exit(&fromparent->sdev_contents); 849 ASSERT(SDEVTOV(fromdv) == ovp); 850 VN_RELE(ovp); 851 852 /* clean out the directory contents before it can be removed */ 853 type = SDEVTOV(fromdv)->v_type; 854 if (type == VDIR) { 855 error = sdev_cleandir(fromdv, NULL, 0); 856 sdcmn_err2(("sdev_rename: cleandir finished with %d\n", 857 error)); 858 if (error == EBUSY) 859 error = 0; 860 } 861 862 rw_enter(&fromparent->sdev_contents, RW_WRITER); 863 bkstore = SDEV_IS_PERSIST(fromdv) ? 1 : 0; 864 error = sdev_cache_update(fromparent, &fromdv, onm, 865 SDEV_CACHE_DELETE); 866 867 /* best effforts clean up the backing store */ 868 if (bkstore) { 869 ASSERT(fromparent->sdev_attrvp); 870 if (type != VDIR) { 871 /* XXXci - We may need to translate the C-I flags on VOP_REMOVE */ 872 error = VOP_REMOVE(fromparent->sdev_attrvp, 873 onm, kcred, ct, 0); 874 } else { 875 /* XXXci - We may need to translate the C-I flags on VOP_RMDIR */ 876 error = VOP_RMDIR(fromparent->sdev_attrvp, 877 onm, fromparent->sdev_attrvp, kcred, ct, 0); 878 } 879 880 if (error) { 881 sdcmn_err2(("sdev_rename: device %s is " 882 "still on disk %s\n", onm, 883 fromparent->sdev_path)); 884 error = 0; 885 } 886 } 887 rw_exit(&fromparent->sdev_contents); 888 mutex_exit(&sdev_lock); 889 890 /* once reached to this point, the rename is regarded successful */ 891 return (0); 892 } 893 894 /* 895 * dev-fs version of "ln -s path dev-name" 896 * tnm - path, e.g. /devices/... or /dev/... 897 * lnm - dev_name 898 */ 899 /*ARGSUSED6*/ 900 static int 901 sdev_symlink(struct vnode *dvp, char *lnm, struct vattr *tva, 902 char *tnm, struct cred *cred, caller_context_t *ct, int flags) 903 { 904 int error; 905 struct vnode *vp = NULL; 906 struct sdev_node *parent = (struct sdev_node *)VTOSDEV(dvp); 907 struct sdev_node *self = (struct sdev_node *)NULL; 908 909 ASSERT(parent); 910 rw_enter(&parent->sdev_dotdot->sdev_contents, RW_READER); 911 if (parent->sdev_state == SDEV_ZOMBIE) { 912 rw_exit(&parent->sdev_dotdot->sdev_contents); 913 sdcmn_err2(("sdev_symlink: parent %s is ZOMBIED \n", 914 parent->sdev_name)); 915 return (ENOENT); 916 } 917 918 if (!SDEV_IS_GLOBAL(parent)) { 919 rw_exit(&parent->sdev_dotdot->sdev_contents); 920 return (ENOTSUP); 921 } 922 rw_exit(&parent->sdev_dotdot->sdev_contents); 923 924 /* execute access is required to search a directory */ 925 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) 926 return (error); 927 928 /* find existing name */ 929 /* XXXci - We may need to translate the C-I flags here */ 930 error = VOP_LOOKUP(dvp, lnm, &vp, NULL, 0, NULL, cred, ct, NULL, NULL); 931 if (error == 0) { 932 ASSERT(vp); 933 VN_RELE(vp); 934 sdcmn_err2(("sdev_symlink: node %s already exists\n", lnm)); 935 return (EEXIST); 936 } 937 if (error != ENOENT) 938 return (error); 939 940 /* write access is required to create a symlink */ 941 if ((error = VOP_ACCESS(dvp, VWRITE, 0, cred, ct)) != 0) 942 return (error); 943 944 /* put it into memory cache */ 945 rw_enter(&parent->sdev_contents, RW_WRITER); 946 error = sdev_mknode(parent, lnm, &self, tva, NULL, (void *)tnm, 947 cred, SDEV_READY); 948 if (error) { 949 rw_exit(&parent->sdev_contents); 950 sdcmn_err2(("sdev_symlink: node %s creation failed\n", lnm)); 951 if (self) 952 SDEV_RELE(self); 953 954 return (error); 955 } 956 ASSERT(self && (self->sdev_state == SDEV_READY)); 957 rw_exit(&parent->sdev_contents); 958 959 /* take care the timestamps for the node and its parent */ 960 sdev_update_timestamps(SDEVTOV(self), kcred, 961 AT_CTIME|AT_MTIME|AT_ATIME); 962 sdev_update_timestamps(dvp, kcred, AT_MTIME|AT_ATIME); 963 if (SDEV_IS_GLOBAL(parent)) 964 atomic_inc_ulong(&parent->sdev_gdir_gen); 965 966 /* wake up other threads blocked on looking up this node */ 967 mutex_enter(&self->sdev_lookup_lock); 968 SDEV_UNBLOCK_OTHERS(self, SDEV_LOOKUP); 969 mutex_exit(&self->sdev_lookup_lock); 970 SDEV_RELE(self); /* don't return with vnode held */ 971 return (0); 972 } 973 974 /*ARGSUSED6*/ 975 static int 976 sdev_mkdir(struct vnode *dvp, char *nm, struct vattr *va, struct vnode **vpp, 977 struct cred *cred, caller_context_t *ct, int flags, vsecattr_t *vsecp) 978 { 979 int error; 980 struct sdev_node *parent = (struct sdev_node *)VTOSDEV(dvp); 981 struct sdev_node *self = NULL; 982 struct vnode *vp = NULL; 983 984 ASSERT(parent && parent->sdev_dotdot); 985 rw_enter(&parent->sdev_dotdot->sdev_contents, RW_READER); 986 if (parent->sdev_state == SDEV_ZOMBIE) { 987 rw_exit(&parent->sdev_dotdot->sdev_contents); 988 return (ENOENT); 989 } 990 991 /* non-global do not allow pure directory creation */ 992 if (!SDEV_IS_GLOBAL(parent)) { 993 rw_exit(&parent->sdev_dotdot->sdev_contents); 994 return (prof_lookup(dvp, nm, vpp, cred)); 995 } 996 rw_exit(&parent->sdev_dotdot->sdev_contents); 997 998 /* execute access is required to search the directory */ 999 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) { 1000 return (error); 1001 } 1002 1003 /* find existing name */ 1004 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */ 1005 error = VOP_LOOKUP(dvp, nm, &vp, NULL, 0, NULL, cred, ct, NULL, NULL); 1006 if (error == 0) { 1007 VN_RELE(vp); 1008 return (EEXIST); 1009 } 1010 if (error != ENOENT) 1011 return (error); 1012 1013 /* require write access to create a directory */ 1014 if ((error = VOP_ACCESS(dvp, VWRITE, 0, cred, ct)) != 0) { 1015 return (error); 1016 } 1017 1018 /* put it into memory */ 1019 rw_enter(&parent->sdev_contents, RW_WRITER); 1020 error = sdev_mknode(parent, nm, &self, 1021 va, NULL, NULL, cred, SDEV_READY); 1022 if (error) { 1023 rw_exit(&parent->sdev_contents); 1024 if (self) 1025 SDEV_RELE(self); 1026 return (error); 1027 } 1028 ASSERT(self && (self->sdev_state == SDEV_READY)); 1029 rw_exit(&parent->sdev_contents); 1030 1031 /* take care the timestamps for the node and its parent */ 1032 sdev_update_timestamps(SDEVTOV(self), kcred, 1033 AT_CTIME|AT_MTIME|AT_ATIME); 1034 sdev_update_timestamps(dvp, kcred, AT_MTIME|AT_ATIME); 1035 if (SDEV_IS_GLOBAL(parent)) 1036 atomic_inc_ulong(&parent->sdev_gdir_gen); 1037 1038 /* wake up other threads blocked on looking up this node */ 1039 mutex_enter(&self->sdev_lookup_lock); 1040 SDEV_UNBLOCK_OTHERS(self, SDEV_LOOKUP); 1041 mutex_exit(&self->sdev_lookup_lock); 1042 *vpp = SDEVTOV(self); 1043 return (0); 1044 } 1045 1046 /* 1047 * allowing removing an empty directory under /dev 1048 */ 1049 /*ARGSUSED*/ 1050 static int 1051 sdev_rmdir(struct vnode *dvp, char *nm, struct vnode *cdir, struct cred *cred, 1052 caller_context_t *ct, int flags) 1053 { 1054 int error = 0; 1055 struct sdev_node *parent = (struct sdev_node *)VTOSDEV(dvp); 1056 struct sdev_node *self = NULL; 1057 struct vnode *vp = NULL; 1058 1059 /* bail out early */ 1060 if (strcmp(nm, ".") == 0) 1061 return (EINVAL); 1062 if (strcmp(nm, "..") == 0) 1063 return (EEXIST); /* should be ENOTEMPTY */ 1064 1065 /* no destruction of non-global node */ 1066 ASSERT(parent && parent->sdev_dotdot); 1067 rw_enter(&parent->sdev_dotdot->sdev_contents, RW_READER); 1068 if (!SDEV_IS_GLOBAL(parent)) { 1069 rw_exit(&parent->sdev_dotdot->sdev_contents); 1070 return (ENOTSUP); 1071 } 1072 rw_exit(&parent->sdev_dotdot->sdev_contents); 1073 1074 /* execute access is required to search the directory */ 1075 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) 1076 return (error); 1077 1078 /* check existing name */ 1079 rw_enter(&parent->sdev_contents, RW_WRITER); 1080 self = sdev_cache_lookup(parent, nm); 1081 if (self == NULL) { 1082 rw_exit(&parent->sdev_contents); 1083 return (ENOENT); 1084 } 1085 1086 vp = SDEVTOV(self); 1087 if ((self->sdev_state == SDEV_INIT) || 1088 (self->sdev_state == SDEV_ZOMBIE)) { 1089 rw_exit(&parent->sdev_contents); 1090 VN_RELE(vp); 1091 return (ENOENT); 1092 } 1093 1094 /* write access is required to remove a directory */ 1095 if ((error = VOP_ACCESS(dvp, VWRITE, 0, cred, ct)) != 0) { 1096 rw_exit(&parent->sdev_contents); 1097 VN_RELE(vp); 1098 return (error); 1099 } 1100 1101 /* some sanity checks */ 1102 if (vp == dvp || vp == cdir) { 1103 rw_exit(&parent->sdev_contents); 1104 VN_RELE(vp); 1105 return (EINVAL); 1106 } 1107 1108 if (vp->v_type != VDIR) { 1109 rw_exit(&parent->sdev_contents); 1110 VN_RELE(vp); 1111 return (ENOTDIR); 1112 } 1113 1114 if (vn_vfswlock(vp)) { 1115 rw_exit(&parent->sdev_contents); 1116 VN_RELE(vp); 1117 return (EBUSY); 1118 } 1119 1120 if (vn_mountedvfs(vp) != NULL) { 1121 rw_exit(&parent->sdev_contents); 1122 vn_vfsunlock(vp); 1123 VN_RELE(vp); 1124 return (EBUSY); 1125 } 1126 1127 self = VTOSDEV(vp); 1128 /* bail out on a non-empty directory */ 1129 rw_enter(&self->sdev_contents, RW_READER); 1130 if (self->sdev_nlink > 2) { 1131 rw_exit(&self->sdev_contents); 1132 rw_exit(&parent->sdev_contents); 1133 vn_vfsunlock(vp); 1134 VN_RELE(vp); 1135 return (ENOTEMPTY); 1136 } 1137 rw_exit(&self->sdev_contents); 1138 1139 /* unlink it from the directory cache */ 1140 error = sdev_cache_update(parent, &self, nm, SDEV_CACHE_DELETE); 1141 rw_exit(&parent->sdev_contents); 1142 vn_vfsunlock(vp); 1143 1144 if (error && (error != EBUSY)) { 1145 VN_RELE(vp); 1146 } else { 1147 sdcmn_err2(("sdev_rmdir: cleaning node %s from directory " 1148 " cache with error %d\n", nm, error)); 1149 1150 /* best effort to clean up the backing store */ 1151 if (SDEV_IS_PERSIST(parent)) { 1152 ASSERT(parent->sdev_attrvp); 1153 error = VOP_RMDIR(parent->sdev_attrvp, nm, 1154 parent->sdev_attrvp, kcred, ct, flags); 1155 sdcmn_err2(("sdev_rmdir: cleaning device %s is on" 1156 " disk error %d\n", parent->sdev_path, error)); 1157 } 1158 1159 if (error == EBUSY) 1160 error = 0; 1161 } 1162 1163 return (error); 1164 } 1165 1166 /* 1167 * read the contents of a symbolic link 1168 */ 1169 static int 1170 sdev_readlink(struct vnode *vp, struct uio *uiop, struct cred *cred, 1171 caller_context_t *ct) 1172 { 1173 struct sdev_node *dv; 1174 int error = 0; 1175 1176 ASSERT(vp->v_type == VLNK); 1177 1178 dv = VTOSDEV(vp); 1179 1180 if (dv->sdev_attrvp) { 1181 /* non-NULL attrvp implys a persisted node at READY state */ 1182 return (VOP_READLINK(dv->sdev_attrvp, uiop, cred, ct)); 1183 } else if (dv->sdev_symlink != NULL) { 1184 /* memory nodes, e.g. local nodes */ 1185 rw_enter(&dv->sdev_contents, RW_READER); 1186 sdcmn_err2(("sdev_readlink link is %s\n", dv->sdev_symlink)); 1187 error = uiomove(dv->sdev_symlink, strlen(dv->sdev_symlink), 1188 UIO_READ, uiop); 1189 rw_exit(&dv->sdev_contents); 1190 return (error); 1191 } 1192 1193 return (ENOENT); 1194 } 1195 1196 /*ARGSUSED4*/ 1197 static int 1198 sdev_readdir(struct vnode *dvp, struct uio *uiop, struct cred *cred, int *eofp, 1199 caller_context_t *ct, int flags) 1200 { 1201 struct sdev_node *parent = VTOSDEV(dvp); 1202 int error; 1203 1204 /* execute access is required to search the directory */ 1205 if ((error = VOP_ACCESS(dvp, VEXEC, 0, cred, ct)) != 0) 1206 return (error); 1207 1208 ASSERT(parent); 1209 if (!SDEV_IS_GLOBAL(parent)) 1210 prof_filldir(parent); 1211 return (devname_readdir_func(dvp, uiop, cred, eofp, SDEV_BROWSE)); 1212 } 1213 1214 /*ARGSUSED1*/ 1215 static void 1216 sdev_inactive(struct vnode *vp, struct cred *cred, caller_context_t *ct) 1217 { 1218 int clean; 1219 struct sdev_node *dv = VTOSDEV(vp); 1220 struct sdev_node *ddv = dv->sdev_dotdot; 1221 struct sdev_node *idv; 1222 struct sdev_node *prev = NULL; 1223 int state; 1224 struct devname_nsmap *map = NULL; 1225 struct devname_ops *dirops = NULL; 1226 void (*fn)(devname_handle_t *, struct cred *) = NULL; 1227 1228 rw_enter(&ddv->sdev_contents, RW_WRITER); 1229 state = dv->sdev_state; 1230 1231 mutex_enter(&vp->v_lock); 1232 ASSERT(vp->v_count >= 1); 1233 1234 clean = (vp->v_count == 1) && (state == SDEV_ZOMBIE); 1235 1236 /* 1237 * last ref count on the ZOMBIE node is released. 1238 * clean up the sdev_node, and 1239 * release the hold on the backing store node so that 1240 * the ZOMBIE backing stores also cleaned out. 1241 */ 1242 if (clean) { 1243 ASSERT(ddv); 1244 if (SDEV_IS_GLOBAL(dv)) { 1245 map = ddv->sdev_mapinfo; 1246 dirops = map ? map->dir_ops : NULL; 1247 if (dirops && (fn = dirops->devnops_inactive)) 1248 (*fn)(&(dv->sdev_handle), cred); 1249 } 1250 1251 ddv->sdev_nlink--; 1252 if (vp->v_type == VDIR) { 1253 dv->sdev_nlink--; 1254 } 1255 for (idv = ddv->sdev_dot; idv && idv != dv; 1256 prev = idv, idv = idv->sdev_next) 1257 ; 1258 ASSERT(idv == dv); 1259 if (prev == NULL) 1260 ddv->sdev_dot = dv->sdev_next; 1261 else 1262 prev->sdev_next = dv->sdev_next; 1263 dv->sdev_next = NULL; 1264 dv->sdev_nlink--; 1265 --vp->v_count; 1266 mutex_exit(&vp->v_lock); 1267 sdev_nodedestroy(dv, 0); 1268 } else { 1269 --vp->v_count; 1270 mutex_exit(&vp->v_lock); 1271 } 1272 rw_exit(&ddv->sdev_contents); 1273 } 1274 1275 /*ARGSUSED2*/ 1276 static int 1277 sdev_fid(struct vnode *vp, struct fid *fidp, caller_context_t *ct) 1278 { 1279 struct sdev_node *dv = VTOSDEV(vp); 1280 struct sdev_fid *sdev_fid; 1281 1282 if (fidp->fid_len < (sizeof (struct sdev_fid) - sizeof (ushort_t))) { 1283 fidp->fid_len = sizeof (struct sdev_fid) - sizeof (ushort_t); 1284 return (ENOSPC); 1285 } 1286 1287 sdev_fid = (struct sdev_fid *)fidp; 1288 bzero(sdev_fid, sizeof (struct sdev_fid)); 1289 sdev_fid->sdevfid_len = 1290 (int)sizeof (struct sdev_fid) - sizeof (ushort_t); 1291 sdev_fid->sdevfid_ino = dv->sdev_ino; 1292 1293 return (0); 1294 } 1295 1296 /* 1297 * This pair of routines bracket all VOP_READ, VOP_WRITE 1298 * and VOP_READDIR requests. The contents lock stops things 1299 * moving around while we're looking at them. 1300 */ 1301 /*ARGSUSED2*/ 1302 static int 1303 sdev_rwlock(struct vnode *vp, int write_flag, caller_context_t *ctp) 1304 { 1305 rw_enter(&VTOSDEV(vp)->sdev_contents, 1306 write_flag ? RW_WRITER : RW_READER); 1307 return (write_flag ? V_WRITELOCK_TRUE : V_WRITELOCK_FALSE); 1308 } 1309 1310 /*ARGSUSED1*/ 1311 static void 1312 sdev_rwunlock(struct vnode *vp, int write_flag, caller_context_t *ctp) 1313 { 1314 rw_exit(&VTOSDEV(vp)->sdev_contents); 1315 } 1316 1317 /*ARGSUSED1*/ 1318 static int 1319 sdev_seek(struct vnode *vp, offset_t ooff, offset_t *noffp, 1320 caller_context_t *ct) 1321 { 1322 struct vnode *attrvp = VTOSDEV(vp)->sdev_attrvp; 1323 1324 ASSERT(vp->v_type != VCHR && 1325 vp->v_type != VBLK && vp->v_type != VLNK); 1326 1327 if (vp->v_type == VDIR) 1328 return (fs_seek(vp, ooff, noffp, ct)); 1329 1330 ASSERT(attrvp); 1331 return (VOP_SEEK(attrvp, ooff, noffp, ct)); 1332 } 1333 1334 /*ARGSUSED1*/ 1335 static int 1336 sdev_frlock(struct vnode *vp, int cmd, struct flock64 *bfp, int flag, 1337 offset_t offset, struct flk_callback *flk_cbp, struct cred *cr, 1338 caller_context_t *ct) 1339 { 1340 int error; 1341 struct sdev_node *dv = VTOSDEV(vp); 1342 1343 ASSERT(dv); 1344 ASSERT(dv->sdev_attrvp); 1345 error = VOP_FRLOCK(dv->sdev_attrvp, cmd, bfp, flag, offset, 1346 flk_cbp, cr, ct); 1347 1348 return (error); 1349 } 1350 1351 static int 1352 sdev_setfl(struct vnode *vp, int oflags, int nflags, cred_t *cr, 1353 caller_context_t *ct) 1354 { 1355 struct sdev_node *dv = VTOSDEV(vp); 1356 ASSERT(dv); 1357 ASSERT(dv->sdev_attrvp); 1358 1359 return (VOP_SETFL(dv->sdev_attrvp, oflags, nflags, cr, ct)); 1360 } 1361 1362 static int 1363 sdev_pathconf(vnode_t *vp, int cmd, ulong_t *valp, cred_t *cr, 1364 caller_context_t *ct) 1365 { 1366 switch (cmd) { 1367 case _PC_ACL_ENABLED: 1368 *valp = SDEV_ACL_FLAVOR(vp); 1369 return (0); 1370 } 1371 1372 return (fs_pathconf(vp, cmd, valp, cr, ct)); 1373 } 1374 1375 vnodeops_t *sdev_vnodeops; 1376 1377 const fs_operation_def_t sdev_vnodeops_tbl[] = { 1378 VOPNAME_OPEN, { .vop_open = sdev_open }, 1379 VOPNAME_CLOSE, { .vop_close = sdev_close }, 1380 VOPNAME_READ, { .vop_read = sdev_read }, 1381 VOPNAME_WRITE, { .vop_write = sdev_write }, 1382 VOPNAME_IOCTL, { .vop_ioctl = sdev_ioctl }, 1383 VOPNAME_GETATTR, { .vop_getattr = sdev_getattr }, 1384 VOPNAME_SETATTR, { .vop_setattr = sdev_setattr }, 1385 VOPNAME_ACCESS, { .vop_access = sdev_access }, 1386 VOPNAME_LOOKUP, { .vop_lookup = sdev_lookup }, 1387 VOPNAME_CREATE, { .vop_create = sdev_create }, 1388 VOPNAME_RENAME, { .vop_rename = sdev_rename }, 1389 VOPNAME_REMOVE, { .vop_remove = sdev_remove }, 1390 VOPNAME_MKDIR, { .vop_mkdir = sdev_mkdir }, 1391 VOPNAME_RMDIR, { .vop_rmdir = sdev_rmdir }, 1392 VOPNAME_READDIR, { .vop_readdir = sdev_readdir }, 1393 VOPNAME_SYMLINK, { .vop_symlink = sdev_symlink }, 1394 VOPNAME_READLINK, { .vop_readlink = sdev_readlink }, 1395 VOPNAME_INACTIVE, { .vop_inactive = sdev_inactive }, 1396 VOPNAME_FID, { .vop_fid = sdev_fid }, 1397 VOPNAME_RWLOCK, { .vop_rwlock = sdev_rwlock }, 1398 VOPNAME_RWUNLOCK, { .vop_rwunlock = sdev_rwunlock }, 1399 VOPNAME_SEEK, { .vop_seek = sdev_seek }, 1400 VOPNAME_FRLOCK, { .vop_frlock = sdev_frlock }, 1401 VOPNAME_PATHCONF, { .vop_pathconf = sdev_pathconf }, 1402 VOPNAME_SETFL, { .vop_setfl = sdev_setfl }, 1403 VOPNAME_SETSECATTR, { .vop_setsecattr = sdev_setsecattr }, 1404 VOPNAME_GETSECATTR, { .vop_getsecattr = sdev_getsecattr }, 1405 NULL, NULL 1406 }; 1407 1408 int sdev_vnodeops_tbl_size = sizeof (sdev_vnodeops_tbl); 1409