2021-12-05 11:10:39 +03:00
|
|
|
/* $NetBSD: coda_vnops.c,v 1.117 2021/12/05 08:10:39 msaitoh Exp $ */
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-08 21:12:46 +04:00
|
|
|
/*
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
1998-09-08 21:12:46 +04:00
|
|
|
* Coda: an Experimental Distributed File System
|
|
|
|
* Release 3.1
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
1998-09-08 21:12:46 +04:00
|
|
|
* Copyright (c) 1987-1998 Carnegie Mellon University
|
|
|
|
* All Rights Reserved
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
1998-09-08 21:12:46 +04:00
|
|
|
* Permission to use, copy, modify and distribute this software and its
|
|
|
|
* documentation is hereby granted, provided that both the copyright
|
|
|
|
* notice and this permission notice appear in all copies of the
|
|
|
|
* software, derivative works or modified versions, and any portions
|
|
|
|
* thereof, and that both notices appear in supporting documentation, and
|
|
|
|
* that credit is given to Carnegie Mellon University in all documents
|
|
|
|
* and publicity pertaining to direct or indirect use of this code or its
|
|
|
|
* derivatives.
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
1998-09-08 21:12:46 +04:00
|
|
|
* CODA IS AN EXPERIMENTAL SOFTWARE SYSTEM AND IS KNOWN TO HAVE BUGS,
|
|
|
|
* SOME OF WHICH MAY HAVE SERIOUS CONSEQUENCES. CARNEGIE MELLON ALLOWS
|
|
|
|
* FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON
|
|
|
|
* DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER
|
|
|
|
* RESULTING DIRECTLY OR INDIRECTLY FROM THE USE OF THIS SOFTWARE OR OF
|
|
|
|
* ANY DERIVATIVE WORK.
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
1998-09-08 21:12:46 +04:00
|
|
|
* Carnegie Mellon encourages users of this software to return any
|
|
|
|
* improvements or extensions that they make, and to grant Carnegie
|
|
|
|
* Mellon the rights to redistribute these changes without encumbrance.
|
2005-02-27 01:58:54 +03:00
|
|
|
*
|
|
|
|
* @(#) coda/coda_vnops.c,v 1.1.1.1 1998/08/29 21:26:46 rvb Exp $
|
1998-09-08 21:12:46 +04:00
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* Mach Operating System
|
|
|
|
* Copyright (c) 1990 Carnegie-Mellon University
|
|
|
|
* Copyright (c) 1989 Carnegie-Mellon University
|
|
|
|
* All rights reserved. The CMU software License Agreement specifies
|
|
|
|
* the terms and conditions for use and redistribution.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This code was written for the Coda file system at Carnegie Mellon
|
|
|
|
* University. Contributers include David Steere, James Kistler, and
|
2005-02-27 01:58:54 +03:00
|
|
|
* M. Satyanarayanan.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
|
2001-11-13 02:08:56 +03:00
|
|
|
#include <sys/cdefs.h>
|
2021-12-05 11:10:39 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: coda_vnops.c,v 1.117 2021/12/05 08:10:39 msaitoh Exp $");
|
2001-11-13 02:08:56 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/acct.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <sys/namei.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/select.h>
|
2007-04-26 00:45:02 +04:00
|
|
|
#include <sys/vnode.h>
|
2006-05-15 01:19:33 +04:00
|
|
|
#include <sys/kauth.h>
|
2020-11-14 14:42:56 +03:00
|
|
|
#include <sys/dirent.h>
|
2006-05-15 01:19:33 +04:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
#include <miscfs/genfs/genfs.h>
|
2014-12-13 18:57:46 +03:00
|
|
|
#include <miscfs/specfs/specdev.h>
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-15 06:02:55 +04:00
|
|
|
#include <coda/coda.h>
|
|
|
|
#include <coda/cnode.h>
|
|
|
|
#include <coda/coda_vnops.h>
|
|
|
|
#include <coda/coda_venus.h>
|
|
|
|
#include <coda/coda_opstats.h>
|
|
|
|
#include <coda/coda_subr.h>
|
|
|
|
#include <coda/coda_namecache.h>
|
|
|
|
#include <coda/coda_pioctl.h>
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* These flags select various performance enhancements.
|
|
|
|
*/
|
1998-09-12 19:05:47 +04:00
|
|
|
int coda_attr_cache = 1; /* Set to cache attributes in the kernel */
|
|
|
|
int coda_symlink_cache = 1; /* Set to cache symbolic link information */
|
|
|
|
int coda_access_cache = 1; /* Set to handle some access checks directly */
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* structure to keep track of vfs calls */
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
struct coda_op_stats coda_vnodeopstats[CODA_VNODEOPS_SIZE];
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
#define MARK_ENTRY(op) (coda_vnodeopstats[op].entries++)
|
|
|
|
#define MARK_INT_SAT(op) (coda_vnodeopstats[op].sat_intrn++)
|
|
|
|
#define MARK_INT_FAIL(op) (coda_vnodeopstats[op].unsat_intrn++)
|
|
|
|
#define MARK_INT_GEN(op) (coda_vnodeopstats[op].gen_intrn++)
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* What we are delaying for in printf */
|
1998-09-12 19:05:47 +04:00
|
|
|
static int coda_lockdebug = 0;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2001-11-23 20:42:48 +03:00
|
|
|
#define ENTRY if(coda_vnop_print_entry) myprintf(("Entered %s\n",__func__))
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Definition of the vnode operation vector */
|
|
|
|
|
2001-01-22 15:17:35 +03:00
|
|
|
const struct vnodeopv_entry_desc coda_vnodeop_entries[] = {
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_default_desc, coda_vop_error },
|
2021-06-30 01:34:05 +03:00
|
|
|
{ &vop_parsepath_desc, genfs_parsepath }, /* parsepath */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_lookup_desc, coda_lookup }, /* lookup */
|
|
|
|
{ &vop_create_desc, coda_create }, /* create */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_mknod_desc, coda_vop_error }, /* mknod */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_open_desc, coda_open }, /* open */
|
|
|
|
{ &vop_close_desc, coda_close }, /* close */
|
|
|
|
{ &vop_access_desc, coda_access }, /* access */
|
2020-05-16 21:31:45 +03:00
|
|
|
{ &vop_accessx_desc, genfs_accessx }, /* access */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_getattr_desc, coda_getattr }, /* getattr */
|
|
|
|
{ &vop_setattr_desc, coda_setattr }, /* setattr */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_read_desc, coda_read }, /* read */
|
|
|
|
{ &vop_write_desc, coda_write }, /* write */
|
2014-07-25 12:20:51 +04:00
|
|
|
{ &vop_fallocate_desc, genfs_eopnotsupp }, /* fallocate */
|
|
|
|
{ &vop_fdiscard_desc, genfs_eopnotsupp }, /* fdiscard */
|
1999-08-04 00:19:16 +04:00
|
|
|
{ &vop_fcntl_desc, genfs_fcntl }, /* fcntl */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_ioctl_desc, coda_ioctl }, /* ioctl */
|
2001-05-28 06:50:51 +04:00
|
|
|
{ &vop_mmap_desc, genfs_mmap }, /* mmap */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_fsync_desc, coda_fsync }, /* fsync */
|
|
|
|
{ &vop_remove_desc, coda_remove }, /* remove */
|
|
|
|
{ &vop_link_desc, coda_link }, /* link */
|
|
|
|
{ &vop_rename_desc, coda_rename }, /* rename */
|
|
|
|
{ &vop_mkdir_desc, coda_mkdir }, /* mkdir */
|
|
|
|
{ &vop_rmdir_desc, coda_rmdir }, /* rmdir */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_symlink_desc, coda_symlink }, /* symlink */
|
|
|
|
{ &vop_readdir_desc, coda_readdir }, /* readdir */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_readlink_desc, coda_readlink }, /* readlink */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_abortop_desc, coda_abortop }, /* abortop */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_inactive_desc, coda_inactive }, /* inactive */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_reclaim_desc, coda_reclaim }, /* reclaim */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_lock_desc, coda_lock }, /* lock */
|
|
|
|
{ &vop_unlock_desc, coda_unlock }, /* unlock */
|
|
|
|
{ &vop_bmap_desc, coda_bmap }, /* bmap */
|
|
|
|
{ &vop_strategy_desc, coda_strategy }, /* strategy */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_print_desc, coda_vop_error }, /* print */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_islocked_desc, coda_islocked }, /* islocked */
|
2020-11-14 14:42:05 +03:00
|
|
|
{ &vop_pathconf_desc, coda_pathconf }, /* pathconf */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_advlock_desc, coda_vop_nop }, /* advlock */
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &vop_bwrite_desc, coda_vop_error }, /* bwrite */
|
1998-08-30 01:26:45 +04:00
|
|
|
{ &vop_seek_desc, genfs_seek }, /* seek */
|
1998-09-25 19:01:12 +04:00
|
|
|
{ &vop_poll_desc, genfs_poll }, /* poll */
|
2001-07-03 10:46:52 +04:00
|
|
|
{ &vop_getpages_desc, coda_getpages }, /* getpages */
|
|
|
|
{ &vop_putpages_desc, coda_putpages }, /* putpages */
|
2001-05-28 06:50:51 +04:00
|
|
|
{ NULL, NULL }
|
1998-08-30 01:26:45 +04:00
|
|
|
};
|
|
|
|
|
2012-08-02 20:06:58 +04:00
|
|
|
static void coda_print_vattr(struct vattr *);
|
|
|
|
|
2012-07-28 04:10:22 +04:00
|
|
|
int (**coda_vnodeop_p)(void *);
|
2005-02-27 01:58:54 +03:00
|
|
|
const struct vnodeopv_desc coda_vnodeop_opv_desc =
|
1998-09-12 19:05:47 +04:00
|
|
|
{ &coda_vnodeop_p, coda_vnodeop_entries };
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Definitions of NetBSD vnodeop interfaces */
|
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
/*
|
|
|
|
* A generic error routine. Return EIO without looking at arguments.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
int
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_vop_error(void *anon) {
|
1998-08-30 01:26:45 +04:00
|
|
|
struct vnodeop_desc **desc = (struct vnodeop_desc **)anon;
|
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
if (codadebug) {
|
2012-04-29 00:15:07 +04:00
|
|
|
myprintf(("%s: Vnode operation %s called (error).\n",
|
|
|
|
__func__, (*desc)->vdesc_name));
|
2007-04-07 02:28:12 +04:00
|
|
|
}
|
|
|
|
|
1998-12-10 05:22:52 +03:00
|
|
|
return EIO;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2008-01-25 17:32:11 +03:00
|
|
|
/* A generic do-nothing. */
|
1998-08-30 01:26:45 +04:00
|
|
|
int
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_vop_nop(void *anon) {
|
1998-08-30 01:26:45 +04:00
|
|
|
struct vnodeop_desc **desc = (struct vnodeop_desc **)anon;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (codadebug) {
|
1998-08-30 01:26:45 +04:00
|
|
|
myprintf(("Vnode operation %s called, but unsupported\n",
|
|
|
|
(*desc)->vdesc_name));
|
2005-02-27 01:58:54 +03:00
|
|
|
}
|
1998-08-30 01:26:45 +04:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_vnodeopstats_init(void)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
2000-03-30 15:24:16 +04:00
|
|
|
int i;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
for(i=0;i<CODA_VNODEOPS_SIZE;i++) {
|
|
|
|
coda_vnodeopstats[i].opcode = i;
|
|
|
|
coda_vnodeopstats[i].entries = 0;
|
|
|
|
coda_vnodeopstats[i].sat_intrn = 0;
|
|
|
|
coda_vnodeopstats[i].unsat_intrn = 0;
|
|
|
|
coda_vnodeopstats[i].gen_intrn = 0;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/*
|
|
|
|
* XXX The entire relationship between VOP_OPEN and having a container
|
|
|
|
* file (via venus_open) needs to be reexamined. In particular, it's
|
|
|
|
* valid to open/mmap/close and then reference. Instead of doing
|
|
|
|
* VOP_OPEN when getpages needs a container, we should do the
|
|
|
|
* venus_open part, and record that the vnode has opened the container
|
|
|
|
* for getpages, and do the matching logical close on coda_inactive.
|
|
|
|
* Further, coda_rdwr needs a container file, and sometimes needs to
|
|
|
|
* do the equivalent of open (core dumps).
|
|
|
|
*/
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
2007-04-08 04:21:59 +04:00
|
|
|
* coda_open calls Venus to return the device and inode of the
|
|
|
|
* container file, and then obtains a vnode for that file. The
|
|
|
|
* container vnode is stored in the coda vnode, and a reference is
|
|
|
|
* added for each open file.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_open(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* NetBSD can pass the O_EXCL flag in mode, even though the check
|
|
|
|
* has already happened. Venus defensively assumes that if open
|
|
|
|
* is passed the EXCL, it must be a bug. We strip the flag here.
|
|
|
|
*/
|
|
|
|
/* true args */
|
|
|
|
struct vop_open_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
2007-04-08 04:21:59 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
int flag = ap->a_mode & (~O_EXCL);
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
2007-04-08 04:21:59 +04:00
|
|
|
dev_t dev; /* container file device, inode, vnode */
|
1998-08-30 01:26:45 +04:00
|
|
|
ino_t inode;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *container_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_OPEN_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2014-02-27 20:51:37 +04:00
|
|
|
KASSERT(VOP_ISLOCKED(vp));
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Check for open of control file. */
|
2007-04-08 04:21:59 +04:00
|
|
|
if (IS_CTL_VP(vp)) {
|
2005-02-27 01:58:54 +03:00
|
|
|
/* if (WRITABLE(flag)) */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (flag & (FWRITE | O_TRUNC | O_CREAT | O_EXCL)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_OPEN_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_OPEN_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_open(vtomi(vp), &cp->c_fid, flag, cred, curlwp, &dev, &inode);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
if (!error) {
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_OPEN, myprintf((
|
|
|
|
"%s: dev 0x%llx inode %llu result %d\n", __func__,
|
|
|
|
(unsigned long long)dev, (unsigned long long)inode, error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* Obtain locked and referenced container vnode from container
|
2007-04-15 16:45:39 +04:00
|
|
|
* device/inode.
|
2007-04-08 04:21:59 +04:00
|
|
|
*/
|
2012-04-29 00:01:09 +04:00
|
|
|
error = coda_grab_vnode(vp, dev, inode, &container_vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Save the vnode pointer for the container file. */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (cp->c_ovp == NULL) {
|
2007-04-08 04:21:59 +04:00
|
|
|
cp->c_ovp = container_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
2007-04-08 04:21:59 +04:00
|
|
|
if (cp->c_ovp != container_vp)
|
|
|
|
/*
|
|
|
|
* Perhaps venus returned a different container, or
|
|
|
|
* something else went wrong.
|
|
|
|
*/
|
2012-04-29 00:15:07 +04:00
|
|
|
panic("%s: cp->c_ovp != container_vp", __func__);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
cp->c_ocount++;
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Flush the attribute cache if writing the file. */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (flag & FWRITE) {
|
|
|
|
cp->c_owrite++;
|
|
|
|
cp->c_flags &= ~C_VATTR;
|
|
|
|
}
|
|
|
|
|
2007-04-15 18:10:28 +04:00
|
|
|
/*
|
|
|
|
* Save the <device, inode> pair for the container file to speed
|
|
|
|
* up subsequent reads while closed (mmap, program execution).
|
|
|
|
* This is perhaps safe because venus will invalidate the node
|
|
|
|
* before changing the container file mapping.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
cp->c_device = dev;
|
|
|
|
cp->c_inode = inode;
|
|
|
|
|
2007-04-15 18:10:28 +04:00
|
|
|
/* Open the container file. */
|
2007-11-26 22:01:26 +03:00
|
|
|
error = VOP_OPEN(container_vp, flag, cred);
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* Drop the lock on the container, after we have done VOP_OPEN
|
|
|
|
* (which requires a locked vnode).
|
|
|
|
*/
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(container_vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Close the cache file used for I/O and notify Venus.
|
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_close(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_close_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
int flag = ap->a_fflag;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_CLOSE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for close of control file. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_CLOSE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
2007-04-15 16:45:39 +04:00
|
|
|
* XXX The IS_UNMOUNTING part of this is very suspect.
|
2007-04-08 04:21:59 +04:00
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
if (IS_UNMOUNTING(cp)) {
|
|
|
|
if (cp->c_ovp) {
|
1998-09-28 21:55:21 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: destroying container %d, ufs vp %p of vp %p/cp %p\n",
|
2020-04-13 22:23:17 +03:00
|
|
|
__func__, vrefcnt(vp), cp->c_ovp, vp, cp);
|
1998-09-25 19:01:12 +04:00
|
|
|
#endif
|
1998-11-09 19:36:16 +03:00
|
|
|
#ifdef hmm
|
1998-08-30 01:26:45 +04:00
|
|
|
vgone(cp->c_ovp);
|
1998-11-09 19:36:16 +03:00
|
|
|
#else
|
1999-10-17 03:53:26 +04:00
|
|
|
vn_lock(cp->c_ovp, LK_EXCLUSIVE | LK_RETRY);
|
2007-11-26 22:01:26 +03:00
|
|
|
VOP_CLOSE(cp->c_ovp, flag, cred); /* Do errors matter here? */
|
1999-10-17 03:53:26 +04:00
|
|
|
vput(cp->c_ovp);
|
1998-11-09 19:36:16 +03:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
1998-09-28 21:55:21 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: NO container vp %p/cp %p\n", __func__, vp, cp);
|
1998-09-25 19:01:12 +04:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
return ENODEV;
|
|
|
|
}
|
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/* Lock the container node, and VOP_CLOSE it. */
|
2007-04-08 04:21:59 +04:00
|
|
|
vn_lock(cp->c_ovp, LK_EXCLUSIVE | LK_RETRY);
|
2007-11-26 22:01:26 +03:00
|
|
|
VOP_CLOSE(cp->c_ovp, flag, cred); /* Do errors matter here? */
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* Drop the lock we just obtained, and vrele the container vnode.
|
|
|
|
* Decrement reference counts, and clear container vnode pointer on
|
|
|
|
* last close.
|
|
|
|
*/
|
|
|
|
vput(cp->c_ovp);
|
|
|
|
if (flag & FWRITE)
|
|
|
|
--cp->c_owrite;
|
1998-08-30 01:26:45 +04:00
|
|
|
if (--cp->c_ocount == 0)
|
|
|
|
cp->c_ovp = NULL;
|
|
|
|
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_close(vtomi(vp), &cp->c_fid, flag, cred, curlwp);
|
2007-04-07 02:28:12 +04:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_CLOSE, myprintf(("%s: result %d\n", __func__, error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_read(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
struct vop_read_args *ap = v;
|
|
|
|
|
|
|
|
ENTRY;
|
1998-09-12 19:05:47 +04:00
|
|
|
return(coda_rdwr(ap->a_vp, ap->a_uio, UIO_READ,
|
2006-03-01 15:38:10 +03:00
|
|
|
ap->a_ioflag, ap->a_cred, curlwp));
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_write(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
struct vop_write_args *ap = v;
|
|
|
|
|
|
|
|
ENTRY;
|
1998-09-12 19:05:47 +04:00
|
|
|
return(coda_rdwr(ap->a_vp, ap->a_uio, UIO_WRITE,
|
2006-03-01 15:38:10 +03:00
|
|
|
ap->a_ioflag, ap->a_cred, curlwp));
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2012-04-29 00:15:07 +04:00
|
|
|
coda_rdwr(vnode_t *vp, struct uio *uiop, enum uio_rw rw, int ioflag,
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred, struct lwp *l)
|
2005-02-27 01:58:54 +03:00
|
|
|
{
|
1998-08-30 01:26:45 +04:00
|
|
|
/* upcall decl */
|
|
|
|
/* NOTE: container file operation!!! */
|
|
|
|
/* locals */
|
|
|
|
struct cnode *cp = VTOC(vp);
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *cfvp = cp->c_ovp;
|
2005-12-11 15:16:03 +03:00
|
|
|
struct proc *p = l->l_proc;
|
1998-08-30 01:26:45 +04:00
|
|
|
int opened_internally = 0;
|
|
|
|
int error = 0;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2006-03-01 15:38:10 +03:00
|
|
|
CODADEBUG(CODA_RDWR, myprintf(("coda_rdwr(%d, %p, %lu, %lld)\n", rw,
|
2012-04-29 00:15:07 +04:00
|
|
|
uiop->uio_iov->iov_base, (unsigned long) uiop->uio_resid,
|
|
|
|
(long long) uiop->uio_offset)); )
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Check for rdwr of control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Redirect the request to UFS. */
|
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* If file is not already open this must be a page
|
|
|
|
* {read,write} request. Iget the cache file's inode
|
|
|
|
* pointer if we still have its <device, inode> pair.
|
|
|
|
* Otherwise, we must do an internal open to derive the
|
2005-02-27 01:58:54 +03:00
|
|
|
* pair.
|
2007-04-15 16:45:39 +04:00
|
|
|
* XXX Integrate this into a coherent strategy for container
|
|
|
|
* file acquisition.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
if (cfvp == NULL) {
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* If we're dumping core, do the internal open. Otherwise
|
|
|
|
* venus won't have the correct size of the core when
|
|
|
|
* it's completely written.
|
|
|
|
*/
|
2005-02-27 01:58:54 +03:00
|
|
|
if (cp->c_inode != 0 && !(p && (p->p_acflag & ACORE))) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: grabbing container vnode, losing reference\n",
|
|
|
|
__func__);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2007-04-15 16:45:39 +04:00
|
|
|
/* Get locked and refed vnode. */
|
2012-04-29 00:01:09 +04:00
|
|
|
error = coda_grab_vnode(vp, cp->c_device, cp->c_inode, &cfvp);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
2007-04-15 16:45:39 +04:00
|
|
|
/*
|
|
|
|
* Drop lock.
|
|
|
|
* XXX Where is reference released.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(cfvp);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
else {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: internal VOP_OPEN\n", __func__);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
opened_internally = 1;
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_GEN(CODA_OPEN_STATS);
|
2007-11-26 22:01:26 +03:00
|
|
|
error = VOP_OPEN(vp, (rw == UIO_READ ? FREAD : FWRITE), cred);
|
2000-04-05 22:39:09 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: Internally Opening %p\n", __func__, vp);
|
2000-04-05 22:39:09 +04:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
cfvp = cp->c_ovp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Have UFS handle the call. */
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_RDWR, myprintf(("%s: fid = %s, refcnt = %d\n", __func__,
|
2020-04-13 22:23:17 +03:00
|
|
|
coda_f2s(&cp->c_fid), vrefcnt(CTOV(cp)))); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (rw == UIO_READ) {
|
|
|
|
error = VOP_READ(cfvp, uiop, ioflag, cred);
|
|
|
|
} else {
|
|
|
|
error = VOP_WRITE(cfvp, uiop, ioflag, cred);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (error)
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
else
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_RDWR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Do an internal close if necessary. */
|
|
|
|
if (opened_internally) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_GEN(CODA_CLOSE_STATS);
|
2007-11-26 22:01:26 +03:00
|
|
|
(void)VOP_CLOSE(vp, (rw == UIO_READ ? FREAD : FWRITE), cred);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Invalidate cached attributes if writing. */
|
|
|
|
if (rw == UIO_WRITE)
|
|
|
|
cp->c_flags &= ~C_VATTR;
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_ioctl(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_ioctl_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
int com = ap->a_command;
|
2007-03-04 08:59:00 +03:00
|
|
|
void *data = ap->a_data;
|
1998-08-30 01:26:45 +04:00
|
|
|
int flag = ap->a_fflag;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *tvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct PioctlData *iap = (struct PioctlData *)data;
|
Convert 67 namei call sites to use namei_simple, in these functions:
check_console, veriexecclose, veriexec_delete, veriexec_file_add,
emul_find_root, coff_load_shlib (sh3 version), coff_load_shlib,
compat_20_sys_statfs, compat_20_netbsd32_statfs,
ELFNAME2(netbsd32,probe_noteless), darwin_sys_statfs,
ibcs2_sys_statfs, ibcs2_sys_statvfs, linux_sys_uselib,
osf1_sys_statfs, sunos_sys_statfs, sunos32_sys_statfs,
ultrix_sys_statfs, do_sys_mount, fss_create_files (3 of 4),
adosfs_mount, cd9660_mount, coda_ioctl, coda_mount, ext2fs_mount,
ffs_mount, filecore_mount, hfs_mount, lfs_mount, msdosfs_mount,
ntfs_mount, sysvbfs_mount, udf_mount, union_mount, sys_chflags,
sys_lchflags, sys_chmod, sys_lchmod, sys_chown, sys_lchown,
sys___posix_chown, sys___posix_lchown, sys_link, do_sys_pstatvfs,
sys_quotactl, sys_revoke, sys_truncate, do_sys_utimes, sys_extattrctl,
sys_extattr_set_file, sys_extattr_set_link, sys_extattr_get_file,
sys_extattr_get_link, sys_extattr_delete_file,
sys_extattr_delete_link, sys_extattr_list_file, sys_extattr_list_link,
sys_setxattr, sys_lsetxattr, sys_getxattr, sys_lgetxattr,
sys_listxattr, sys_llistxattr, sys_removexattr, sys_lremovexattr
All have been scrutinized (several times, in fact) and compile-tested,
but not all have been explicitly tested in action.
XXX: While I haven't (intentionally) changed the use or nonuse of
XXX: TRYEMULROOT in any of these places, I'm not convinced all the
XXX: uses are correct; an audit might be desirable.
2009-06-29 09:08:15 +04:00
|
|
|
namei_simple_flags_t sflags;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_IOCTL_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_IOCTL, myprintf(("in coda_ioctl on %s\n", iap->path));)
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Don't check for operation on a dying object, for ctlvp it
|
|
|
|
shouldn't matter */
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Must be control object to succeed. */
|
|
|
|
if (!IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_IOCTL_STATS);
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_IOCTL, myprintf(("%s error: vp != ctlvp", __func__));)
|
|
|
|
return (EOPNOTSUPP);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
/* Look up the pathname. */
|
|
|
|
|
|
|
|
/* Should we use the name cache here? It would get it from
|
|
|
|
lookupname sooner or later anyway, right? */
|
|
|
|
|
Convert 67 namei call sites to use namei_simple, in these functions:
check_console, veriexecclose, veriexec_delete, veriexec_file_add,
emul_find_root, coff_load_shlib (sh3 version), coff_load_shlib,
compat_20_sys_statfs, compat_20_netbsd32_statfs,
ELFNAME2(netbsd32,probe_noteless), darwin_sys_statfs,
ibcs2_sys_statfs, ibcs2_sys_statvfs, linux_sys_uselib,
osf1_sys_statfs, sunos_sys_statfs, sunos32_sys_statfs,
ultrix_sys_statfs, do_sys_mount, fss_create_files (3 of 4),
adosfs_mount, cd9660_mount, coda_ioctl, coda_mount, ext2fs_mount,
ffs_mount, filecore_mount, hfs_mount, lfs_mount, msdosfs_mount,
ntfs_mount, sysvbfs_mount, udf_mount, union_mount, sys_chflags,
sys_lchflags, sys_chmod, sys_lchmod, sys_chown, sys_lchown,
sys___posix_chown, sys___posix_lchown, sys_link, do_sys_pstatvfs,
sys_quotactl, sys_revoke, sys_truncate, do_sys_utimes, sys_extattrctl,
sys_extattr_set_file, sys_extattr_set_link, sys_extattr_get_file,
sys_extattr_get_link, sys_extattr_delete_file,
sys_extattr_delete_link, sys_extattr_list_file, sys_extattr_list_link,
sys_setxattr, sys_lsetxattr, sys_getxattr, sys_lgetxattr,
sys_listxattr, sys_llistxattr, sys_removexattr, sys_lremovexattr
All have been scrutinized (several times, in fact) and compile-tested,
but not all have been explicitly tested in action.
XXX: While I haven't (intentionally) changed the use or nonuse of
XXX: TRYEMULROOT in any of these places, I'm not convinced all the
XXX: uses are correct; an audit might be desirable.
2009-06-29 09:08:15 +04:00
|
|
|
sflags = iap->follow ? NSM_FOLLOW_NOEMULROOT : NSM_NOFOLLOW_NOEMULROOT;
|
|
|
|
error = namei_simple_user(iap->path, sflags, &tvp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (error) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_IOCTL_STATS);
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_IOCTL, myprintf(("%s error: lookup returns %d\n",
|
|
|
|
__func__, error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* Make sure this is a coda style cnode, but it may be a
|
2005-02-27 01:58:54 +03:00
|
|
|
* different vfsp
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
/* XXX: this totally violates the comment about vtagtype in vnode.h */
|
1998-09-12 19:05:47 +04:00
|
|
|
if (tvp->v_tag != VT_CODA) {
|
1998-08-30 01:26:45 +04:00
|
|
|
vrele(tvp);
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_IOCTL_STATS);
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_IOCTL, myprintf(("%s error: %s not a coda object\n",
|
|
|
|
__func__, iap->path));)
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
2010-07-20 21:26:03 +04:00
|
|
|
if (iap->vi.in_size > VC_MAXDATASIZE || iap->vi.out_size > VC_MAXDATASIZE) {
|
1998-08-30 01:26:45 +04:00
|
|
|
vrele(tvp);
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_ioctl(vtomi(tvp), &((VTOC(tvp))->c_fid), com, flag, data,
|
|
|
|
cred, curlwp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (error)
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_IOCTL_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
else
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_IOCTL, myprintf(("Ioctl returns %d \n", error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
vrele(tvp);
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* To reduce the cost of a user-level venus;we cache attributes in
|
|
|
|
* the kernel. Each cnode has storage allocated for an attribute. If
|
|
|
|
* c_vattr is valid, return a reference to it. Otherwise, get the
|
|
|
|
* attributes from venus and store them in the cnode. There is some
|
|
|
|
* question if this method is a security leak. But I think that in
|
|
|
|
* order to make this call, the user must have done a lookup and
|
2005-02-27 01:58:54 +03:00
|
|
|
* opened the file, and therefore should already have access.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_getattr(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_getattr_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
struct vattr *vap = ap->a_vap;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_GETATTR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for getattr of control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_GETATTR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check to see if the attributes have already been cached */
|
2005-02-27 01:58:54 +03:00
|
|
|
if (VALID_VATTR(cp)) {
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_GETATTR, { myprintf(("%s: attr cache hit: %s\n",
|
|
|
|
__func__, coda_f2s(&cp->c_fid)));})
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_GETATTR, if (!(codadebug & ~CODA_GETATTR))
|
2012-08-02 20:06:58 +04:00
|
|
|
coda_print_vattr(&cp->c_vattr); )
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
*vap = cp->c_vattr;
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_GETATTR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_getattr(vtomi(vp), &cp->c_fid, cred, curlwp, vap);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (!error) {
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_GETATTR, myprintf(("%s miss %s: result %d\n",
|
|
|
|
__func__, coda_f2s(&cp->c_fid), error)); )
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_GETATTR, if (!(codadebug & ~CODA_GETATTR))
|
2012-08-02 20:06:58 +04:00
|
|
|
coda_print_vattr(vap); )
|
2005-02-27 01:58:54 +03:00
|
|
|
|
|
|
|
/* If not open for write, store attributes in cnode */
|
|
|
|
if ((cp->c_owrite == 0) && (coda_attr_cache)) {
|
1998-08-30 01:26:45 +04:00
|
|
|
cp->c_vattr = *vap;
|
2005-02-27 01:58:54 +03:00
|
|
|
cp->c_flags |= C_VATTR;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_setattr(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_setattr_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2000-03-30 15:24:16 +04:00
|
|
|
struct vattr *vap = ap->a_vap;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_SETATTR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for setattr of control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_SETATTR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (codadebug & CODADBGMSK(CODA_SETATTR)) {
|
2012-08-02 20:06:58 +04:00
|
|
|
coda_print_vattr(vap);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_setattr(vtomi(vp), &cp->c_fid, vap, cred, curlwp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (!error)
|
|
|
|
cp->c_flags &= ~C_VATTR;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_SETATTR, myprintf(("setattr %d\n", error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_access(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_access_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2020-05-16 21:31:45 +03:00
|
|
|
accmode_t accmode = ap->a_accmode;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_ACCESS_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2020-05-16 21:31:45 +03:00
|
|
|
KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0);
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Check for access of control object. Only read access is
|
|
|
|
allowed on it. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
|
|
|
/* bogus hack - all will be marked as successes */
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_ACCESS_STATS);
|
2020-05-16 21:31:45 +03:00
|
|
|
return(((accmode & VREAD) && !(accmode & (VWRITE | VEXEC)))
|
1998-08-30 01:26:45 +04:00
|
|
|
? 0 : EACCES);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2005-02-27 01:58:54 +03:00
|
|
|
* if the file is a directory, and we are checking exec (eg lookup)
|
|
|
|
* access, and the file is in the namecache, then the user must have
|
1998-08-30 01:26:45 +04:00
|
|
|
* lookup access to it.
|
|
|
|
*/
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_access_cache) {
|
2020-05-16 21:31:45 +03:00
|
|
|
if ((vp->v_type == VDIR) && (accmode & VEXEC)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_nc_lookup(cp, ".", 1, cred)) {
|
|
|
|
MARK_INT_SAT(CODA_ACCESS_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0); /* it was in the cache */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-16 21:31:45 +03:00
|
|
|
error = venus_access(vtomi(vp), &cp->c_fid, accmode, cred, curlwp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1998-09-12 19:05:47 +04:00
|
|
|
* CODA abort op, called after namei() when a CREATE/DELETE isn't actually
|
|
|
|
* done. If a buffer has been saved in anticipation of a coda_create or
|
|
|
|
* a coda_remove, delete it.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_abortop(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_abortop_args /* {
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *a_dvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *a_cnp;
|
|
|
|
} */ *ap = v;
|
2010-11-30 13:29:57 +03:00
|
|
|
|
|
|
|
(void)ap;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_readlink(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_readlink_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
struct uio *uiop = ap->a_uio;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
2006-03-01 15:38:10 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
int error;
|
|
|
|
char *str;
|
|
|
|
int len;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_READLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for readlink of control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_READLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if ((coda_symlink_cache) && (VALID_SYMLINK(cp))) { /* symlink was cached */
|
1998-08-30 01:26:45 +04:00
|
|
|
uiop->uio_rw = UIO_READ;
|
|
|
|
error = uiomove(cp->c_symlink, (int)cp->c_symlen, uiop);
|
|
|
|
if (error)
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_READLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
else
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_READLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_readlink(vtomi(vp), &cp->c_fid, cred, l, &str, &len);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (!error) {
|
|
|
|
uiop->uio_rw = UIO_READ;
|
|
|
|
error = uiomove(str, len, uiop);
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_symlink_cache) {
|
1998-08-30 01:26:45 +04:00
|
|
|
cp->c_symlink = str;
|
|
|
|
cp->c_symlen = len;
|
|
|
|
cp->c_flags |= C_SYMLINK;
|
|
|
|
} else
|
1998-09-12 19:05:47 +04:00
|
|
|
CODA_FREE(str, len);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_READLINK, myprintf(("in readlink result %d\n",error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_fsync(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_fsync_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = ap->a_cred;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *convp = cp->c_ovp;
|
1998-08-30 01:26:45 +04:00
|
|
|
int error;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_FSYNC_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for fsync on an unmounting object */
|
2014-10-18 12:33:23 +04:00
|
|
|
/* The NetBSD kernel, in its infinite wisdom, can try to fsync
|
1998-08-30 01:26:45 +04:00
|
|
|
* after an unmount has been initiated. This is a Bad Thing,
|
|
|
|
* which we have to avoid. Not a legitimate failure for stats.
|
|
|
|
*/
|
|
|
|
if (IS_UNMOUNTING(cp)) {
|
|
|
|
return(ENODEV);
|
|
|
|
}
|
|
|
|
|
2014-12-13 18:59:30 +03:00
|
|
|
/* Check for fsync of control object or unitialized cnode. */
|
|
|
|
if (IS_CTL_VP(vp) || vp->v_type == VNON) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_FSYNC_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (convp)
|
2007-11-26 22:01:26 +03:00
|
|
|
VOP_FSYNC(convp, cred, MNT_WAIT, 0, 0);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We can expect fsync on any vnode at all if venus is pruging it.
|
|
|
|
* Venus can't very well answer the fsync request, now can it?
|
|
|
|
* Hopefully, it won't have to, because hopefully, venus preserves
|
|
|
|
* the (possibly untrue) invariant that it never purges an open
|
|
|
|
* vnode. Hopefully.
|
|
|
|
*/
|
|
|
|
if (cp->c_flags & C_PURGING) {
|
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
2007-11-26 22:01:26 +03:00
|
|
|
error = venus_fsync(vtomi(vp), &cp->c_fid, cred, curlwp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_FSYNC, myprintf(("in fsync result %d\n",error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
2007-04-15 18:10:28 +04:00
|
|
|
/*
|
|
|
|
* vp is locked on entry, and we must unlock it.
|
|
|
|
* XXX This routine is suspect and probably needs rewriting.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_inactive(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2017-04-11 17:24:59 +03:00
|
|
|
struct vop_inactive_v2_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2007-12-25 21:33:32 +03:00
|
|
|
kauth_cred_t cred __unused = NULL;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* We don't need to send inactive to venus - DCS */
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_INACTIVE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_INACTIVE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-08-27 21:49:48 +04:00
|
|
|
CODADEBUG(CODA_INACTIVE, myprintf(("in inactive, %s, vfsp %p\n",
|
|
|
|
coda_f2s(&cp->c_fid), vp->v_mount));)
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2002-07-30 11:40:07 +04:00
|
|
|
if (vp->v_mount->mnt_data == NULL) {
|
1998-08-30 01:26:45 +04:00
|
|
|
myprintf(("Help! vfsp->vfs_data was NULL, but vnode %p wasn't dying\n", vp));
|
2002-09-27 19:35:29 +04:00
|
|
|
panic("badness in coda_inactive");
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
|
|
|
/* Sanity checks that perhaps should be panic. */
|
2020-04-13 22:23:17 +03:00
|
|
|
if (vrefcnt(vp) > 1)
|
|
|
|
printf("%s: %p usecount %d\n", __func__, vp, vrefcnt(vp));
|
2012-05-04 21:57:22 +04:00
|
|
|
if (cp->c_ovp != NULL)
|
|
|
|
printf("%s: %p ovp != NULL\n", __func__, vp);
|
|
|
|
#endif
|
|
|
|
/* XXX Do we need to VOP_CLOSE container vnodes? */
|
|
|
|
if (!IS_UNMOUNTING(cp))
|
2008-01-02 14:48:20 +03:00
|
|
|
*ap->a_recycle = true;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_INACTIVE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2007-04-15 18:10:28 +04:00
|
|
|
* Coda does not use the normal namecache, but a private version.
|
|
|
|
* Consider how to use the standard facility instead.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_lookup(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2014-02-07 19:29:20 +04:00
|
|
|
struct vop_lookup_v2_args *ap = v;
|
2007-04-05 16:48:51 +04:00
|
|
|
/* (locked) vnode of dir in which to do lookup */
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
2007-04-05 16:48:51 +04:00
|
|
|
/* output variable for result */
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t **vpp = ap->a_vpp;
|
2007-04-05 16:48:51 +04:00
|
|
|
/* name to lookup */
|
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
struct cnode *cp;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
2003-08-27 21:49:48 +04:00
|
|
|
CodaFid VFid;
|
1998-08-30 01:26:45 +04:00
|
|
|
int vtype;
|
|
|
|
int error = 0;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_LOOKUP_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_LOOKUP, myprintf(("%s: %s in %s\n", __func__,
|
|
|
|
nm, coda_f2s(&dcp->c_fid)));)
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-05 16:48:51 +04:00
|
|
|
/*
|
|
|
|
* XXX componentname flags in MODMASK are not handled at all
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The overall strategy is to switch on the lookup type and get a
|
2014-02-07 19:29:20 +04:00
|
|
|
* result vnode that is vref'd but not locked.
|
2007-04-05 16:48:51 +04:00
|
|
|
*/
|
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Check for lookup of control object. */
|
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
*vpp = coda_ctlvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
vref(*vpp);
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_LOOKUP_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2007-04-05 16:48:51 +04:00
|
|
|
/* Avoid trying to hand venus an unreasonably long name. */
|
1998-09-12 19:05:47 +04:00
|
|
|
if (len+1 > CODA_MAXNAMLEN) {
|
|
|
|
MARK_INT_FAIL(CODA_LOOKUP_STATS);
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_LOOKUP, myprintf(("%s: name too long:, %s (%s)\n",
|
|
|
|
__func__, coda_f2s(&dcp->c_fid), nm));)
|
|
|
|
*vpp = (vnode_t *)0;
|
1998-08-30 01:26:45 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
2007-04-05 16:48:51 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Try to resolve the lookup in the minicache. If that fails, ask
|
|
|
|
* venus to do the lookup. XXX The interaction between vnode
|
|
|
|
* locking and any locking that coda does is not clear.
|
|
|
|
*/
|
1998-09-12 19:05:47 +04:00
|
|
|
cp = coda_nc_lookup(dcp, nm, len, cred);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (cp) {
|
|
|
|
*vpp = CTOV(cp);
|
|
|
|
vref(*vpp);
|
2005-02-27 01:58:54 +03:00
|
|
|
CODADEBUG(CODA_LOOKUP,
|
1998-08-30 01:26:45 +04:00
|
|
|
myprintf(("lookup result %d vpp %p\n",error,*vpp));)
|
|
|
|
} else {
|
2007-04-05 16:48:51 +04:00
|
|
|
/* The name wasn't cached, so ask Venus. */
|
2012-05-04 21:57:22 +04:00
|
|
|
error = venus_lookup(vtomi(dvp), &dcp->c_fid, nm, len, cred, l, &VFid,
|
|
|
|
&vtype);
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_LOOKUP_STATS);
|
2012-05-04 21:57:22 +04:00
|
|
|
CODADEBUG(CODA_LOOKUP, myprintf(("%s: lookup error on %s (%s)%d\n",
|
|
|
|
__func__, coda_f2s(&dcp->c_fid), nm, error));)
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_SAT(CODA_LOOKUP_STATS);
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_LOOKUP, myprintf(("%s: %s type %o result %d\n",
|
|
|
|
__func__, coda_f2s(&VFid), vtype, error)); )
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
cp = make_coda_node(&VFid, dvp->v_mount, vtype);
|
1998-08-30 01:26:45 +04:00
|
|
|
*vpp = CTOV(cp);
|
2007-04-05 16:48:51 +04:00
|
|
|
/* vpp is now vrefed. */
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2007-04-05 16:48:51 +04:00
|
|
|
/*
|
|
|
|
* Unless this vnode is marked CODA_NOCACHE, enter it into
|
|
|
|
* the coda name cache to avoid a future venus round-trip.
|
|
|
|
* XXX Interaction with componentname NOCACHE is unclear.
|
|
|
|
*/
|
1998-09-12 19:05:47 +04:00
|
|
|
if (!(vtype & CODA_NOCACHE))
|
|
|
|
coda_nc_enter(VTOC(dvp), nm, len, cred, VTOC(*vpp));
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
exit:
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* If we are creating, and this was the last name to be looked up,
|
2007-04-05 16:48:51 +04:00
|
|
|
* and the error was ENOENT, then make the leaf NULL and return
|
|
|
|
* success.
|
|
|
|
* XXX Check against new lookup rules.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
if (((cnp->cn_nameiop == CREATE) || (cnp->cn_nameiop == RENAME))
|
|
|
|
&& (cnp->cn_flags & ISLASTCN)
|
|
|
|
&& (error == ENOENT))
|
|
|
|
{
|
|
|
|
error = EJUSTRETURN;
|
|
|
|
*ap->a_vpp = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_create(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2014-01-23 14:13:55 +04:00
|
|
|
struct vop_create_v3_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
|
|
|
struct vattr *va = ap->a_vap;
|
|
|
|
int exclusive = 1;
|
|
|
|
int mode = ap->a_vap->va_mode;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t **vpp = ap->a_vpp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
struct cnode *cp;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
2003-08-27 21:49:48 +04:00
|
|
|
CodaFid VFid;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct vattr attr;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_CREATE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* All creates are exclusive XXX */
|
|
|
|
/* I'm assuming the 'mode' argument is the file mode bits XXX */
|
|
|
|
|
|
|
|
/* Check for create of control object. */
|
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_CREATE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_create(vtomi(dvp), &dcp->c_fid, nm, len, exclusive, mode, va, cred, l, &VFid, &attr);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (!error) {
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
/*
|
|
|
|
* XXX Violation of venus/kernel invariants is a difficult case,
|
|
|
|
* but venus should not be able to cause a panic.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
/* If this is an exclusive create, panic if the file already exists. */
|
|
|
|
/* Venus should have detected the file and reported EEXIST. */
|
|
|
|
|
|
|
|
if ((exclusive == 1) &&
|
1998-09-12 19:05:47 +04:00
|
|
|
(coda_find(&VFid) != NULL))
|
1998-08-30 01:26:45 +04:00
|
|
|
panic("cnode existed for newly created file!");
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
cp = make_coda_node(&VFid, dvp->v_mount, attr.va_type);
|
1998-08-30 01:26:45 +04:00
|
|
|
*vpp = CTOV(cp);
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
/* XXX vnodeops doesn't say this argument can be changed. */
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Update va to reflect the new attributes. */
|
|
|
|
(*va) = attr;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* Update the attribute cache and mark it as valid */
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_attr_cache) {
|
1998-08-30 01:26:45 +04:00
|
|
|
VTOC(*vpp)->c_vattr = attr;
|
2005-02-27 01:58:54 +03:00
|
|
|
VTOC(*vpp)->c_flags |= C_VATTR;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
/* Invalidate parent's attr cache (modification time has changed). */
|
1998-08-30 01:26:45 +04:00
|
|
|
VTOC(dvp)->c_flags &= ~C_VATTR;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* enter the new vnode in the Name Cache */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_enter(VTOC(dvp), nm, len, cred, VTOC(*vpp));
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_CREATE, myprintf(("%s: %s, result %d\n", __func__,
|
|
|
|
coda_f2s(&VFid), error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
2012-05-04 21:57:22 +04:00
|
|
|
CODADEBUG(CODA_CREATE, myprintf(("%s: create error %d\n", __func__,
|
|
|
|
error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!error) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
|
|
|
if ((cnp->cn_flags & LOCKLEAF) == 0)
|
2007-04-07 02:28:12 +04:00
|
|
|
/* This should not happen; flags are for lookup only. */
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: LOCKLEAF not set!\n", __func__);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
2007-04-07 02:28:12 +04:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_remove(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
Overhaul of the EVFILT_VNODE kevent(2) filter:
- Centralize vnode kevent handling in the VOP_*() wrappers, rather than
forcing each individual file system to deal with it (except VOP_RENAME(),
because VOP_RENAME() is a mess and we currently have 2 different ways
of handling it; at least it's reasonably well-centralized in the "new"
way).
- Add support for NOTE_OPEN, NOTE_CLOSE, NOTE_CLOSE_WRITE, and NOTE_READ,
compatible with the same events in FreeBSD.
- Track which kevent notifications clients are interested in receiving
to avoid doing work for events no one cares about (avoiding, e.g.
taking locks and traversing the klist to send a NOTE_WRITE when
someone is merely watching for a file to be deleted, for example).
In support of the above:
- Add support in vnode_if.sh for specifying PRE- and POST-op handlers,
to be invoked before and after vop_pre() and vop_post(), respectively.
Basic idea from FreeBSD, but implemented differently.
- Add support in vnode_if.sh for specifying CONTEXT fields in the
vop_*_args structures. These context fields are used to convey information
between the file system VOP function and the VOP wrapper, but do not
occupy an argument slot in the VOP_*() call itself. These context fields
are initialized and subsequently interpreted by PRE- and POST-op handlers.
- Version VOP_REMOVE(), uses the a context field for the file system to report
back the resulting link count of the target vnode. Return this in tmpfs,
udf, nfs, chfs, ext2fs, lfs, and ufs.
NetBSD 9.99.92.
2021-10-20 06:08:16 +03:00
|
|
|
struct vop_remove_v3_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(dvp);
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
|
|
|
struct cnode *tp;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_REMOVE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_REMOVE, myprintf(("%s: %s in %s\n", __func__,
|
|
|
|
nm, coda_f2s(&cp->c_fid)));)
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
/* Remove the file's entry from the CODA Name Cache */
|
1998-08-30 01:26:45 +04:00
|
|
|
/* We're being conservative here, it might be that this person
|
|
|
|
* doesn't really have sufficient access to delete the file
|
|
|
|
* but we feel zapping the entry won't really hurt anyone -- dcs
|
|
|
|
*/
|
|
|
|
/* I'm gonna go out on a limb here. If a file and a hardlink to it
|
|
|
|
* exist, and one is removed, the link count on the other will be
|
|
|
|
* off by 1. We could either invalidate the attrs if cached, or
|
|
|
|
* fix them. I'll try to fix them. DCS 11/8/94
|
|
|
|
*/
|
1998-09-12 19:05:47 +04:00
|
|
|
tp = coda_nc_lookup(VTOC(dvp), nm, len, cred);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (tp) {
|
|
|
|
if (VALID_VATTR(tp)) { /* If attrs are cached */
|
|
|
|
if (tp->c_vattr.va_nlink > 1) { /* If it's a hard link */
|
|
|
|
tp->c_vattr.va_nlink--;
|
|
|
|
}
|
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
|
|
|
coda_nc_zapfile(VTOC(dvp), nm, len);
|
1998-08-30 01:26:45 +04:00
|
|
|
/* No need to flush it if it doesn't exist! */
|
|
|
|
}
|
|
|
|
/* Invalidate the parent's attr cache, the modification time has changed */
|
|
|
|
VTOC(dvp)->c_flags &= ~C_VATTR;
|
|
|
|
|
|
|
|
/* Check for remove of control object. */
|
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_REMOVE_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_remove(vtomi(dvp), &cp->c_fid, nm, len, cred, l);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_REMOVE, myprintf(("in remove result %d\n",error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
2017-04-26 06:02:47 +03:00
|
|
|
* Unlock and release child (avoiding double if ".").
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
2007-04-07 02:28:12 +04:00
|
|
|
if (dvp == vp) {
|
|
|
|
vrele(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
2007-04-07 02:28:12 +04:00
|
|
|
vput(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* dvp is the directory where the link is to go, and is locked.
|
|
|
|
* vp is the object to be linked to, and is unlocked.
|
|
|
|
* At exit, we must unlock dvp, and vput dvp.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_link(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2015-04-21 01:59:19 +03:00
|
|
|
struct vop_link_v2_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
2007-04-08 04:21:59 +04:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_LINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (codadebug & CODADBGMSK(CODA_LINK)) {
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
myprintf(("%s: vp fid: %s\n", __func__, coda_f2s(&cp->c_fid)));
|
|
|
|
myprintf(("%s: dvp fid: %s)\n", __func__, coda_f2s(&dcp->c_fid)));
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
1998-09-12 19:05:47 +04:00
|
|
|
if (codadebug & CODADBGMSK(CODA_LINK)) {
|
2012-04-29 00:15:07 +04:00
|
|
|
myprintf(("%s: vp fid: %s\n", __func__, coda_f2s(&cp->c_fid)));
|
|
|
|
myprintf(("%s: dvp fid: %s\n", __func__, coda_f2s(&dcp->c_fid)));
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for link to/from control object. */
|
2007-04-08 04:21:59 +04:00
|
|
|
if (IS_CTL_NAME(dvp, nm, len) || IS_CTL_VP(vp)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_LINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* If linking . to a name, error out earlier. */
|
|
|
|
if (vp == dvp) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
|
|
|
printf("%s coda_link vp==dvp\n", __func__);
|
|
|
|
#endif
|
2007-04-08 04:21:59 +04:00
|
|
|
error = EISDIR;
|
1998-08-30 01:26:45 +04:00
|
|
|
goto exit;
|
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* XXX Why does venus_link need the vnode to be locked?*/
|
|
|
|
if ((error = vn_lock(vp, LK_EXCLUSIVE)) != 0) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: couldn't lock vnode %p\n", __func__, vp);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2007-04-08 04:21:59 +04:00
|
|
|
error = EFAULT; /* XXX better value */
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
error = venus_link(vtomi(vp), &cp->c_fid, &dcp->c_fid, nm, len, cred, l);
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Invalidate parent's attr cache (the modification time has changed). */
|
|
|
|
VTOC(dvp)->c_flags &= ~C_VATTR;
|
|
|
|
/* Invalidate child's attr cache (XXX why). */
|
1998-08-30 01:26:45 +04:00
|
|
|
VTOC(vp)->c_flags &= ~C_VATTR;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_LINK, myprintf(("in link result %d\n",error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
exit:
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_rename(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_rename_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *odvp = ap->a_fdvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *odcp = VTOC(odvp);
|
|
|
|
struct componentname *fcnp = ap->a_fcnp;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *ndvp = ap->a_tdvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *ndcp = VTOC(ndvp);
|
|
|
|
struct componentname *tcnp = ap->a_tcnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = fcnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* true args */
|
|
|
|
int error;
|
|
|
|
const char *fnm = fcnp->cn_nameptr;
|
|
|
|
int flen = fcnp->cn_namelen;
|
|
|
|
const char *tnm = tcnp->cn_nameptr;
|
|
|
|
int tlen = tcnp->cn_namelen;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_RENAME_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Hmmm. The vnodes are already looked up. Perhaps they are locked?
|
|
|
|
This could be Bad. XXX */
|
1998-09-25 19:01:12 +04:00
|
|
|
#ifdef OLD_DIAGNOSTIC
|
1998-08-30 01:26:45 +04:00
|
|
|
if ((fcnp->cn_cred != tcnp->cn_cred)
|
2005-12-11 15:16:03 +03:00
|
|
|
|| (fcnp->cn_lwp != tcnp->cn_lwp))
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
2012-04-29 00:15:07 +04:00
|
|
|
panic("%s: component names don't agree", __func__);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
1998-09-25 19:01:12 +04:00
|
|
|
#endif
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/* Check for rename involving control object. */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (IS_CTL_NAME(odvp, fnm, flen) || IS_CTL_NAME(ndvp, tnm, tlen)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RENAME_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Problem with moving directories -- need to flush entry for .. */
|
|
|
|
if (odvp != ndvp) {
|
1998-09-12 19:05:47 +04:00
|
|
|
struct cnode *ovcp = coda_nc_lookup(VTOC(odvp), fnm, flen, cred);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (ovcp) {
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *ovp = CTOV(ovcp);
|
1998-08-30 01:26:45 +04:00
|
|
|
if ((ovp) &&
|
|
|
|
(ovp->v_type == VDIR)) /* If it's a directory */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_zapfile(VTOC(ovp),"..", 2);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove the entries for both source and target files */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_zapfile(VTOC(odvp), fnm, flen);
|
|
|
|
coda_nc_zapfile(VTOC(ndvp), tnm, tlen);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Invalidate the parent's attr cache, the modification time has changed */
|
|
|
|
VTOC(odvp)->c_flags &= ~C_VATTR;
|
|
|
|
VTOC(ndvp)->c_flags &= ~C_VATTR;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (flen+1 > CODA_MAXNAMLEN) {
|
|
|
|
MARK_INT_FAIL(CODA_RENAME_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (tlen+1 > CODA_MAXNAMLEN) {
|
|
|
|
MARK_INT_FAIL(CODA_RENAME_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_rename(vtomi(odvp), &odcp->c_fid, &ndcp->c_fid, fnm, flen, tnm, tlen, cred, l);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
exit:
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_RENAME, myprintf(("in rename result %d\n",error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
/* XXX - do we need to call cache pureg on the moved vnode? */
|
|
|
|
cache_purge(ap->a_fvp);
|
|
|
|
|
|
|
|
/* It seems to be incumbent on us to drop locks on all four vnodes */
|
|
|
|
/* From-vnodes are not locked, only ref'd. To-vnodes are locked. */
|
|
|
|
|
|
|
|
vrele(ap->a_fvp);
|
|
|
|
vrele(odvp);
|
|
|
|
|
|
|
|
if (ap->a_tvp) {
|
|
|
|
if (ap->a_tvp == ndvp) {
|
|
|
|
vrele(ap->a_tvp);
|
|
|
|
} else {
|
|
|
|
vput(ap->a_tvp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
vput(ndvp);
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_mkdir(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2014-01-23 14:13:55 +04:00
|
|
|
struct vop_mkdir_v3_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
2005-02-27 01:58:54 +03:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2000-03-30 15:24:16 +04:00
|
|
|
struct vattr *va = ap->a_vap;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t **vpp = ap->a_vpp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
|
|
|
struct cnode *cp;
|
2003-08-27 21:49:48 +04:00
|
|
|
CodaFid VFid;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct vattr ova;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_MKDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for mkdir of target object. */
|
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_MKDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (len+1 > CODA_MAXNAMLEN) {
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_MKDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EACCES);
|
|
|
|
}
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_mkdir(vtomi(dvp), &dcp->c_fid, nm, len, va, cred, l, &VFid, &ova);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
if (!error) {
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_find(&VFid) != NULL)
|
1998-08-30 01:26:45 +04:00
|
|
|
panic("cnode existed for newly created directory!");
|
2005-02-27 01:58:54 +03:00
|
|
|
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
cp = make_coda_node(&VFid, dvp->v_mount, va->va_type);
|
1998-08-30 01:26:45 +04:00
|
|
|
*vpp = CTOV(cp);
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* enter the new vnode in the Name Cache */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_enter(VTOC(dvp), nm, len, cred, VTOC(*vpp));
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* as a side effect, enter "." and ".." for the directory */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_enter(VTOC(*vpp), ".", 1, cred, VTOC(*vpp));
|
|
|
|
coda_nc_enter(VTOC(*vpp), "..", 2, cred, VTOC(dvp));
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_attr_cache) {
|
1998-08-30 01:26:45 +04:00
|
|
|
VTOC(*vpp)->c_vattr = ova; /* update the attr cache */
|
|
|
|
VTOC(*vpp)->c_flags |= C_VATTR; /* Valid attributes in cnode */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Invalidate the parent's attr cache, the modification time has changed */
|
|
|
|
VTOC(dvp)->c_flags &= ~C_VATTR;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG( CODA_MKDIR, myprintf(("%s: %s result %d\n", __func__,
|
|
|
|
coda_f2s(&VFid), error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
|
|
|
CODADEBUG(CODA_MKDIR, myprintf(("%s error %d\n", __func__, error));)
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_rmdir(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2017-04-26 06:02:47 +03:00
|
|
|
struct vop_rmdir_v2_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* true args */
|
|
|
|
int error;
|
|
|
|
const char *nm = cnp->cn_nameptr;
|
|
|
|
int len = cnp->cn_namelen;
|
|
|
|
struct cnode *cp;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_RMDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for rmdir of control object. */
|
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_RMDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Can't remove . in self. */
|
|
|
|
if (dvp == vp) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: dvp == vp\n", __func__);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2007-04-08 04:21:59 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/*
|
2007-04-08 04:21:59 +04:00
|
|
|
* The caller may not have adequate permissions, and the venus
|
|
|
|
* operation may fail, but it doesn't hurt from a correctness
|
|
|
|
* viewpoint to invalidate cache entries.
|
|
|
|
* XXX Why isn't this done after the venus_rmdir call?
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Look up child in name cache (by name, from parent). */
|
1998-09-12 19:05:47 +04:00
|
|
|
cp = coda_nc_lookup(dcp, nm, len, cred);
|
2007-04-08 04:21:59 +04:00
|
|
|
/* If found, remove all children of the child (., ..). */
|
1998-09-12 19:05:47 +04:00
|
|
|
if (cp) coda_nc_zapParentfid(&(cp->c_fid), NOT_DOWNCALL);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Remove child's own entry. */
|
1998-09-12 19:05:47 +04:00
|
|
|
coda_nc_zapfile(dcp, nm, len);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Invalidate parent's attr cache (the modification time has changed). */
|
1998-08-30 01:26:45 +04:00
|
|
|
dcp->c_flags &= ~C_VATTR;
|
|
|
|
|
2005-12-11 15:16:03 +03:00
|
|
|
error = venus_rmdir(vtomi(dvp), &dcp->c_fid, nm, len, cred, l);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_RMDIR, myprintf(("in rmdir result %d\n", error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
exit:
|
2017-04-26 06:02:47 +03:00
|
|
|
/* unlock and release child */
|
2007-04-08 04:21:59 +04:00
|
|
|
if (dvp == vp) {
|
|
|
|
vrele(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
} else {
|
2007-04-08 04:21:59 +04:00
|
|
|
vput(vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_symlink(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2014-01-23 14:13:55 +04:00
|
|
|
struct vop_symlink_v3_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *dvp = ap->a_dvp;
|
2007-04-07 02:28:12 +04:00
|
|
|
struct cnode *dcp = VTOC(dvp);
|
|
|
|
/* a_vpp is used in place below */
|
1998-08-30 01:26:45 +04:00
|
|
|
struct componentname *cnp = ap->a_cnp;
|
|
|
|
struct vattr *tva = ap->a_vap;
|
|
|
|
char *path = ap->a_target;
|
2006-05-15 01:19:33 +04:00
|
|
|
kauth_cred_t cred = cnp->cn_cred;
|
2007-12-08 22:29:36 +03:00
|
|
|
struct lwp *l = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* locals */
|
|
|
|
int error;
|
2004-06-25 06:52:46 +04:00
|
|
|
u_long saved_cn_flags;
|
1998-09-08 21:12:46 +04:00
|
|
|
const char *nm = cnp->cn_nameptr;
|
1998-08-30 01:26:45 +04:00
|
|
|
int len = cnp->cn_namelen;
|
|
|
|
int plen = strlen(path);
|
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1998-08-30 01:26:45 +04:00
|
|
|
* Here's the strategy for the moment: perform the symlink, then
|
|
|
|
* do a lookup to grab the resulting vnode. I know this requires
|
2021-12-05 11:10:39 +03:00
|
|
|
* two communications with Venus for a new symbolic link, but
|
1998-08-30 01:26:45 +04:00
|
|
|
* that's the way the ball bounces. I don't yet want to change
|
|
|
|
* the way the Mach symlink works. When Mach support is
|
|
|
|
* deprecated, we should change symlink so that the common case
|
|
|
|
* returns the resultant vnode in a vpp argument.
|
|
|
|
*/
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_ENTRY(CODA_SYMLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
/* Check for symlink of control object. */
|
2007-04-07 02:28:12 +04:00
|
|
|
if (IS_CTL_NAME(dvp, nm, len)) {
|
1998-09-12 19:05:47 +04:00
|
|
|
MARK_INT_FAIL(CODA_SYMLINK_STATS);
|
2007-04-07 02:28:12 +04:00
|
|
|
error = EACCES;
|
|
|
|
goto exit;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (plen+1 > CODA_MAXPATHLEN) {
|
|
|
|
MARK_INT_FAIL(CODA_SYMLINK_STATS);
|
2007-04-07 02:28:12 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (len+1 > CODA_MAXNAMLEN) {
|
|
|
|
MARK_INT_FAIL(CODA_SYMLINK_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
error = EINVAL;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
error = venus_symlink(vtomi(dvp), &dcp->c_fid, path, plen, nm, len, tva, cred, l);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2007-04-07 02:28:12 +04:00
|
|
|
/* Invalidate the parent's attr cache (modification time has changed). */
|
|
|
|
dcp->c_flags &= ~C_VATTR;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2004-06-25 06:52:46 +04:00
|
|
|
if (!error) {
|
|
|
|
/*
|
|
|
|
* VOP_SYMLINK is not defined to pay attention to cnp->cn_flags;
|
|
|
|
* these are defined only for VOP_LOOKUP. We desire to reuse
|
|
|
|
* cnp for a VOP_LOOKUP operation, and must be sure to not pass
|
|
|
|
* stray flags passed to us. Such stray flags can occur because
|
|
|
|
* sys_symlink makes a namei call and then reuses the
|
|
|
|
* componentname structure.
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* XXX Arguably we should create our own componentname structure
|
|
|
|
* and not reuse the one that was passed in.
|
|
|
|
*/
|
|
|
|
saved_cn_flags = cnp->cn_flags;
|
|
|
|
cnp->cn_flags &= ~(MODMASK | OPMASK);
|
|
|
|
cnp->cn_flags |= LOOKUP;
|
2007-04-07 02:28:12 +04:00
|
|
|
error = VOP_LOOKUP(dvp, ap->a_vpp, cnp);
|
2004-06-25 06:52:46 +04:00
|
|
|
cnp->cn_flags = saved_cn_flags;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
exit:
|
1998-09-12 19:05:47 +04:00
|
|
|
CODADEBUG(CODA_SYMLINK, myprintf(("in symlink result %d\n",error)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Read directory entries.
|
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_readdir(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2020-11-14 14:42:56 +03:00
|
|
|
struct vop_readdir_args *ap = v;
|
|
|
|
vnode_t *vp = ap->a_vp;
|
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
struct uio *uiop = ap->a_uio;
|
|
|
|
kauth_cred_t cred = ap->a_cred;
|
|
|
|
int *eofflag = ap->a_eofflag;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
2020-11-14 14:42:56 +03:00
|
|
|
size_t initial_resid = uiop->uio_resid;
|
|
|
|
int error = 0;
|
|
|
|
int opened_internally = 0;
|
|
|
|
int ncookies;
|
|
|
|
char *buf;
|
|
|
|
struct vnode *cvp;
|
|
|
|
struct dirent *dirp;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2020-11-14 14:42:56 +03:00
|
|
|
MARK_ENTRY(CODA_READDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2020-11-14 14:42:56 +03:00
|
|
|
CODADEBUG(CODA_READDIR, myprintf(("%s: (%p, %lu, %lld)\n", __func__,
|
|
|
|
uiop->uio_iov->iov_base, (unsigned long) uiop->uio_resid,
|
|
|
|
(long long) uiop->uio_offset)); )
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2020-11-14 14:42:56 +03:00
|
|
|
/* Check for readdir of control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
|
|
|
MARK_INT_FAIL(CODA_READDIR_STATS);
|
|
|
|
return ENOENT;
|
|
|
|
}
|
2005-02-27 01:58:54 +03:00
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/* If directory is not already open do an "internal open" on it. */
|
|
|
|
if (cp->c_ovp == NULL) {
|
2020-11-14 14:42:56 +03:00
|
|
|
opened_internally = 1;
|
|
|
|
MARK_INT_GEN(CODA_OPEN_STATS);
|
|
|
|
error = VOP_OPEN(vp, FREAD, cred);
|
2000-04-05 22:39:09 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2020-11-14 14:42:56 +03:00
|
|
|
printf("%s: Internally Opening %p\n", __func__, vp);
|
2000-04-05 22:39:09 +04:00
|
|
|
#endif
|
2020-11-14 14:42:56 +03:00
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
KASSERT(cp->c_ovp != NULL);
|
|
|
|
}
|
|
|
|
cvp = cp->c_ovp;
|
2005-02-27 01:58:54 +03:00
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
CODADEBUG(CODA_READDIR, myprintf(("%s: fid = %s, refcnt = %d\n",
|
2020-11-14 14:42:56 +03:00
|
|
|
__func__, coda_f2s(&cp->c_fid), vrefcnt(cvp))); )
|
2018-11-20 22:05:25 +03:00
|
|
|
|
2020-11-14 14:42:56 +03:00
|
|
|
if (ap->a_ncookies) {
|
|
|
|
ncookies = ap->a_uio->uio_resid / _DIRENT_RECLEN(dirp, 1);
|
|
|
|
*ap->a_ncookies = 0;
|
|
|
|
*ap->a_cookies = malloc(ncookies * sizeof (off_t),
|
|
|
|
M_TEMP, M_WAITOK);
|
|
|
|
}
|
|
|
|
buf = kmem_alloc(CODA_DIRBLKSIZ, KM_SLEEP);
|
|
|
|
dirp = kmem_alloc(sizeof(*dirp), KM_SLEEP);
|
|
|
|
vn_lock(cvp, LK_EXCLUSIVE | LK_RETRY);
|
|
|
|
|
|
|
|
while (error == 0) {
|
|
|
|
size_t resid = 0;
|
|
|
|
char *dp, *ep;
|
|
|
|
|
|
|
|
if (!ALIGNED_POINTER(uiop->uio_offset, uint32_t)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
error = vn_rdwr(UIO_READ, cvp, buf,
|
|
|
|
CODA_DIRBLKSIZ, uiop->uio_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, cred, &resid, curlwp);
|
|
|
|
if (error || resid == CODA_DIRBLKSIZ)
|
|
|
|
break;
|
|
|
|
for (dp = buf, ep = dp + CODA_DIRBLKSIZ - resid; dp < ep; ) {
|
|
|
|
off_t off;
|
|
|
|
struct venus_dirent *vd = (struct venus_dirent *)dp;
|
|
|
|
|
|
|
|
if (!ALIGNED_POINTER(vd, uint32_t) ||
|
|
|
|
!ALIGNED_POINTER(vd->d_reclen, uint32_t) ||
|
|
|
|
vd->d_reclen == 0) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (dp + vd->d_reclen > ep) {
|
|
|
|
error = ENAMETOOLONG;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (vd->d_namlen == 0) {
|
|
|
|
uiop->uio_offset += vd->d_reclen;
|
|
|
|
dp += vd->d_reclen;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
dirp->d_fileno = vd->d_fileno;
|
|
|
|
dirp->d_type = vd->d_type;
|
|
|
|
dirp->d_namlen = vd->d_namlen;
|
|
|
|
dirp->d_reclen = _DIRENT_SIZE(dirp);
|
|
|
|
strlcpy(dirp->d_name, vd->d_name, dirp->d_namlen + 1);
|
|
|
|
|
|
|
|
if (uiop->uio_resid < dirp->d_reclen) {
|
|
|
|
error = ENAMETOOLONG;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
off = uiop->uio_offset;
|
|
|
|
error = uiomove(dirp, dirp->d_reclen, uiop);
|
|
|
|
uiop->uio_offset = off;
|
|
|
|
if (error)
|
|
|
|
break;
|
|
|
|
|
|
|
|
uiop->uio_offset += vd->d_reclen;
|
|
|
|
dp += vd->d_reclen;
|
|
|
|
if (ap->a_ncookies)
|
|
|
|
(*ap->a_cookies)[(*ap->a_ncookies)++] =
|
|
|
|
uiop->uio_offset;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
VOP_UNLOCK(cvp);
|
|
|
|
kmem_free(dirp, sizeof(*dirp));
|
|
|
|
kmem_free(buf, CODA_DIRBLKSIZ);
|
|
|
|
if (eofflag && error == 0)
|
|
|
|
*eofflag = 1;
|
|
|
|
if (uiop->uio_resid < initial_resid && error == ENAMETOOLONG)
|
|
|
|
error = 0;
|
|
|
|
if (ap->a_ncookies && error) {
|
|
|
|
free(*ap->a_cookies, M_TEMP);
|
|
|
|
*ap->a_ncookies = 0;
|
|
|
|
*ap->a_cookies = NULL;
|
|
|
|
}
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error)
|
2020-11-14 14:42:56 +03:00
|
|
|
MARK_INT_FAIL(CODA_READDIR_STATS);
|
1998-08-30 01:26:45 +04:00
|
|
|
else
|
2020-11-14 14:42:56 +03:00
|
|
|
MARK_INT_SAT(CODA_READDIR_STATS);
|
2005-02-27 01:58:54 +03:00
|
|
|
|
|
|
|
/* Do an "internal close" if necessary. */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (opened_internally) {
|
2020-11-14 14:42:56 +03:00
|
|
|
MARK_INT_GEN(CODA_CLOSE_STATS);
|
|
|
|
(void)VOP_CLOSE(vp, FREAD, cred);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2020-11-14 14:42:56 +03:00
|
|
|
return error;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Convert from file system blocks to device blocks
|
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_bmap(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* XXX on the global proc */
|
|
|
|
/* true args */
|
|
|
|
struct vop_bmap_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp __unused = ap->a_vp; /* file's vnode */
|
2007-12-25 21:33:32 +03:00
|
|
|
daddr_t bn __unused = ap->a_bn; /* fs block number */
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t **vpp = ap->a_vpp; /* RETURN vp of device */
|
2007-12-25 21:33:32 +03:00
|
|
|
daddr_t *bnp __unused = ap->a_bnp; /* RETURN device block number */
|
|
|
|
struct lwp *l __unused = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
2012-04-29 00:15:07 +04:00
|
|
|
*vpp = (vnode_t *)0;
|
1998-09-12 19:05:47 +04:00
|
|
|
myprintf(("coda_bmap called!\n"));
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* I don't think the following two things are used anywhere, so I've
|
2005-02-27 01:58:54 +03:00
|
|
|
* commented them out
|
|
|
|
*
|
|
|
|
* struct buf *async_bufhead;
|
1998-08-30 01:26:45 +04:00
|
|
|
* int async_daemon_count;
|
|
|
|
*/
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_strategy(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_strategy_args *ap = v;
|
2007-12-25 21:33:32 +03:00
|
|
|
struct buf *bp __unused = ap->a_bp;
|
|
|
|
struct lwp *l __unused = curlwp;
|
1998-08-30 01:26:45 +04:00
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
myprintf(("coda_strategy called! "));
|
1998-08-30 01:26:45 +04:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_reclaim(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
2017-05-26 17:20:59 +03:00
|
|
|
struct vop_reclaim_v2_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
2017-05-26 17:20:59 +03:00
|
|
|
VOP_UNLOCK(vp);
|
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
/*
|
|
|
|
* Forced unmount/flush will let vnodes with non zero use be destroyed!
|
|
|
|
*/
|
|
|
|
ENTRY;
|
|
|
|
|
|
|
|
if (IS_UNMOUNTING(cp)) {
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (VTOC(vp)->c_ovp) {
|
|
|
|
if (IS_UNMOUNTING(cp))
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: c_ovp not void: vp %p, cp %p\n", __func__, vp, cp);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
} else {
|
1998-09-25 19:01:12 +04:00
|
|
|
#ifdef OLD_DIAGNOSTIC
|
2020-04-13 22:23:17 +03:00
|
|
|
if (vrefcnt(vp) != 0)
|
2012-04-29 00:15:07 +04:00
|
|
|
print("%s: pushing active %p\n", __func__, vp);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (VTOC(vp)->c_ovp) {
|
2012-04-29 00:15:07 +04:00
|
|
|
panic("%s: c_ovp not void", __func__);
|
1998-09-08 21:12:46 +04:00
|
|
|
}
|
1998-09-25 19:01:12 +04:00
|
|
|
#endif
|
1998-09-08 21:12:46 +04:00
|
|
|
}
|
2014-12-13 18:59:03 +03:00
|
|
|
/* If an array has been allocated to hold the symlink, deallocate it */
|
|
|
|
if ((coda_symlink_cache) && (VALID_SYMLINK(cp))) {
|
|
|
|
if (cp->c_symlink == NULL)
|
|
|
|
panic("%s: null symlink pointer in cnode", __func__);
|
|
|
|
|
|
|
|
CODA_FREE(cp->c_symlink, cp->c_symlen);
|
|
|
|
cp->c_flags &= ~C_SYMLINK;
|
|
|
|
cp->c_symlen = 0;
|
|
|
|
}
|
|
|
|
|
2014-12-13 18:59:30 +03:00
|
|
|
mutex_enter(vp->v_interlock);
|
|
|
|
mutex_enter(&cp->c_lock);
|
2001-11-24 04:11:34 +03:00
|
|
|
SET_VTOC(vp) = NULL;
|
2014-12-13 18:59:30 +03:00
|
|
|
mutex_exit(&cp->c_lock);
|
|
|
|
mutex_exit(vp->v_interlock);
|
|
|
|
mutex_destroy(&cp->c_lock);
|
|
|
|
kmem_free(cp, sizeof(*cp));
|
|
|
|
|
1998-08-30 01:26:45 +04:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_lock(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_lock_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
|
|
|
ENTRY;
|
|
|
|
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_lockdebug) {
|
2003-08-27 21:49:48 +04:00
|
|
|
myprintf(("Attempting lock on %s\n",
|
|
|
|
coda_f2s(&cp->c_fid)));
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2010-07-01 17:00:54 +04:00
|
|
|
return genfs_lock(v);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_unlock(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
struct vop_unlock_args *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp;
|
1998-08-30 01:26:45 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
/* upcall decl */
|
|
|
|
/* locals */
|
|
|
|
|
|
|
|
ENTRY;
|
1998-09-12 19:05:47 +04:00
|
|
|
if (coda_lockdebug) {
|
2003-08-27 21:49:48 +04:00
|
|
|
myprintf(("Attempting unlock on %s\n",
|
|
|
|
coda_f2s(&cp->c_fid)));
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2010-07-01 17:00:54 +04:00
|
|
|
return genfs_unlock(v);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_islocked(void *v)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
/* true args */
|
|
|
|
ENTRY;
|
|
|
|
|
2010-07-01 17:00:54 +04:00
|
|
|
return genfs_islocked(v);
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
|
|
|
|
2020-11-14 14:42:05 +03:00
|
|
|
int
|
|
|
|
coda_pathconf(void *v)
|
|
|
|
{
|
|
|
|
struct vop_pathconf_args *ap = v;
|
|
|
|
|
|
|
|
switch (ap->a_name) {
|
|
|
|
default:
|
|
|
|
return EINVAL;
|
|
|
|
}
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* Given a device and inode, obtain a locked vnode. One reference is
|
|
|
|
* obtained and passed back to the caller.
|
|
|
|
*/
|
1998-08-30 01:26:45 +04:00
|
|
|
int
|
2012-04-29 00:15:07 +04:00
|
|
|
coda_grab_vnode(vnode_t *uvp, dev_t dev, ino_t ino, vnode_t **vpp)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct mount *mp;
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/* Obtain mount point structure from device. */
|
1998-08-30 01:26:45 +04:00
|
|
|
if (!(mp = devtomp(dev))) {
|
2012-04-29 00:15:07 +04:00
|
|
|
myprintf(("%s: devtomp(0x%llx) returns NULL\n", __func__,
|
2009-01-11 05:45:45 +03:00
|
|
|
(unsigned long long)dev));
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENXIO);
|
|
|
|
}
|
|
|
|
|
2007-04-08 04:21:59 +04:00
|
|
|
/*
|
|
|
|
* Obtain vnode from mount point and inode.
|
|
|
|
*/
|
2020-01-17 23:08:06 +03:00
|
|
|
error = VFS_VGET(mp, ino, LK_EXCLUSIVE, vpp);
|
1998-08-30 01:26:45 +04:00
|
|
|
if (error) {
|
2012-04-29 00:15:07 +04:00
|
|
|
myprintf(("%s: iget/vget(0x%llx, %llu) returns %p, err %d\n", __func__,
|
2009-01-11 05:45:45 +03:00
|
|
|
(unsigned long long)dev, (unsigned long long)ino, *vpp, error));
|
1998-08-30 01:26:45 +04:00
|
|
|
return(ENOENT);
|
|
|
|
}
|
2012-05-02 20:51:01 +04:00
|
|
|
/* share the underlying vnode lock with the coda vnode */
|
2020-02-23 18:46:38 +03:00
|
|
|
vshareilock(*vpp, uvp);
|
2014-02-27 20:51:37 +04:00
|
|
|
KASSERT(VOP_ISLOCKED(*vpp));
|
1998-08-30 01:26:45 +04:00
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
2012-08-02 20:06:58 +04:00
|
|
|
static void
|
|
|
|
coda_print_vattr(struct vattr *attr)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
2005-05-30 01:05:25 +04:00
|
|
|
const char *typestr;
|
1998-08-30 01:26:45 +04:00
|
|
|
|
|
|
|
switch (attr->va_type) {
|
|
|
|
case VNON:
|
|
|
|
typestr = "VNON";
|
|
|
|
break;
|
|
|
|
case VREG:
|
|
|
|
typestr = "VREG";
|
|
|
|
break;
|
|
|
|
case VDIR:
|
|
|
|
typestr = "VDIR";
|
|
|
|
break;
|
|
|
|
case VBLK:
|
|
|
|
typestr = "VBLK";
|
|
|
|
break;
|
|
|
|
case VCHR:
|
|
|
|
typestr = "VCHR";
|
|
|
|
break;
|
|
|
|
case VLNK:
|
|
|
|
typestr = "VLNK";
|
|
|
|
break;
|
|
|
|
case VSOCK:
|
|
|
|
typestr = "VSCK";
|
|
|
|
break;
|
|
|
|
case VFIFO:
|
|
|
|
typestr = "VFFO";
|
|
|
|
break;
|
|
|
|
case VBAD:
|
|
|
|
typestr = "VBAD";
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
typestr = "????";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
myprintf(("attr: type %s mode %d uid %d gid %d fsid %d rdev %d\n",
|
|
|
|
typestr, (int)attr->va_mode, (int)attr->va_uid,
|
|
|
|
(int)attr->va_gid, (int)attr->va_fsid, (int)attr->va_rdev));
|
|
|
|
|
|
|
|
myprintf((" fileid %d nlink %d size %d blocksize %d bytes %d\n",
|
2005-02-27 01:58:54 +03:00
|
|
|
(int)attr->va_fileid, (int)attr->va_nlink,
|
1998-08-30 01:26:45 +04:00
|
|
|
(int)attr->va_size,
|
|
|
|
(int)attr->va_blocksize,(int)attr->va_bytes));
|
|
|
|
myprintf((" gen %ld flags %ld vaflags %d\n",
|
|
|
|
attr->va_gen, attr->va_flags, attr->va_vaflags));
|
|
|
|
myprintf((" atime sec %d nsec %d\n",
|
|
|
|
(int)attr->va_atime.tv_sec, (int)attr->va_atime.tv_nsec));
|
|
|
|
myprintf((" mtime sec %d nsec %d\n",
|
|
|
|
(int)attr->va_mtime.tv_sec, (int)attr->va_mtime.tv_nsec));
|
|
|
|
myprintf((" ctime sec %d nsec %d\n",
|
|
|
|
(int)attr->va_ctime.tv_sec, (int)attr->va_ctime.tv_nsec));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return a vnode for the given fid.
|
|
|
|
* If no cnode exists for this fid create one and put it
|
2003-08-27 21:49:48 +04:00
|
|
|
* in a table hashed by coda_f2i(). If the cnode for
|
1998-08-30 01:26:45 +04:00
|
|
|
* this fid is already in the table return it (ref count is
|
1998-09-12 19:05:47 +04:00
|
|
|
* incremented by coda_find. The cnode will be flushed from the
|
|
|
|
* table when coda_inactive calls coda_unsave.
|
1998-08-30 01:26:45 +04:00
|
|
|
*/
|
|
|
|
struct cnode *
|
2012-05-04 05:40:13 +04:00
|
|
|
make_coda_node(CodaFid *fid, struct mount *fvsp, short type)
|
1998-08-30 01:26:45 +04:00
|
|
|
{
|
2014-12-13 18:59:30 +03:00
|
|
|
int error __diagused;
|
|
|
|
struct vnode *vp;
|
|
|
|
struct cnode *cp;
|
|
|
|
|
|
|
|
error = vcache_get(fvsp, fid, sizeof(CodaFid), &vp);
|
|
|
|
KASSERT(error == 0);
|
|
|
|
|
|
|
|
mutex_enter(vp->v_interlock);
|
|
|
|
cp = VTOC(vp);
|
|
|
|
KASSERT(cp != NULL);
|
|
|
|
mutex_enter(&cp->c_lock);
|
|
|
|
mutex_exit(vp->v_interlock);
|
|
|
|
|
|
|
|
if (vp->v_type != type) {
|
|
|
|
if (vp->v_type == VCHR || vp->v_type == VBLK)
|
|
|
|
spec_node_destroy(vp);
|
|
|
|
vp->v_type = type;
|
|
|
|
if (type == VCHR || type == VBLK)
|
|
|
|
spec_node_init(vp, NODEV);
|
|
|
|
uvm_vnp_setsize(vp, 0);
|
2005-02-27 01:58:54 +03:00
|
|
|
}
|
2014-12-13 18:59:30 +03:00
|
|
|
mutex_exit(&cp->c_lock);
|
1998-08-30 01:26:45 +04:00
|
|
|
|
2014-12-13 18:59:30 +03:00
|
|
|
return cp;
|
1998-08-30 01:26:45 +04:00
|
|
|
}
|
2001-07-03 10:46:52 +04:00
|
|
|
|
2007-04-13 03:34:50 +04:00
|
|
|
/*
|
|
|
|
* coda_getpages may be called on a vnode which has not been opened,
|
|
|
|
* e.g. to fault in pages to execute a program. In that case, we must
|
|
|
|
* open the file to get the container. The vnode may or may not be
|
|
|
|
* locked, and we must leave it in the same state.
|
|
|
|
*/
|
2001-07-03 10:46:52 +04:00
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_getpages(void *v)
|
2001-07-03 10:46:52 +04:00
|
|
|
{
|
|
|
|
struct vop_getpages_args /* {
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *a_vp;
|
2001-07-03 10:46:52 +04:00
|
|
|
voff_t a_offset;
|
|
|
|
struct vm_page **a_m;
|
|
|
|
int *a_count;
|
|
|
|
int a_centeridx;
|
|
|
|
vm_prot_t a_access_type;
|
|
|
|
int a_advice;
|
|
|
|
int a_flags;
|
|
|
|
} */ *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp, *cvp;
|
2001-07-03 10:46:52 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
2005-12-11 15:16:03 +03:00
|
|
|
struct lwp *l = curlwp;
|
2006-07-21 20:48:45 +04:00
|
|
|
kauth_cred_t cred = l->l_cred;
|
2007-04-13 03:34:50 +04:00
|
|
|
int error, cerror;
|
|
|
|
int waslocked; /* 1 if vnode lock was held on entry */
|
|
|
|
int didopen = 0; /* 1 if we opened container file */
|
2020-02-24 23:53:11 +03:00
|
|
|
krw_t op;
|
2007-04-13 03:34:50 +04:00
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/*
|
|
|
|
* Handle a case that uvm_fault doesn't quite use yet.
|
|
|
|
* See layer_vnops.c. for inspiration.
|
|
|
|
*/
|
2007-04-13 03:34:50 +04:00
|
|
|
if (ap->a_flags & PGO_LOCKED) {
|
|
|
|
return EBUSY;
|
|
|
|
}
|
2001-07-03 10:46:52 +04:00
|
|
|
|
2020-02-24 23:53:11 +03:00
|
|
|
KASSERT(rw_lock_held(vp->v_uobj.vmobjlock));
|
2012-05-03 18:26:42 +04:00
|
|
|
|
2001-07-03 10:46:52 +04:00
|
|
|
/* Check for control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: control object %p\n", __func__, vp);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2001-07-03 10:46:52 +04:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/*
|
|
|
|
* XXX It's really not ok to be releasing the lock we get,
|
|
|
|
* because we could be overlapping with another call to
|
|
|
|
* getpages and drop a lock they are relying on. We need to
|
|
|
|
* figure out whether getpages ever is called holding the
|
|
|
|
* lock, and if we should serialize getpages calls by some
|
|
|
|
* mechanism.
|
|
|
|
*/
|
2010-06-24 11:54:46 +04:00
|
|
|
/* XXX VOP_ISLOCKED() may not be used for lock decisions. */
|
2020-02-24 23:53:11 +03:00
|
|
|
op = rw_lock_op(vp->v_uobj.vmobjlock);
|
2007-04-13 03:34:50 +04:00
|
|
|
waslocked = VOP_ISLOCKED(vp);
|
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/* Get container file if not already present. */
|
2012-04-29 00:01:09 +04:00
|
|
|
cvp = cp->c_ovp;
|
|
|
|
if (cvp == NULL) {
|
2007-04-13 03:34:50 +04:00
|
|
|
/*
|
|
|
|
* VOP_OPEN requires a locked vnode. We must avoid
|
|
|
|
* locking the vnode if it is already locked, and
|
|
|
|
* leave it in the same state on exit.
|
|
|
|
*/
|
|
|
|
if (waslocked == 0) {
|
2020-02-24 23:53:11 +03:00
|
|
|
rw_exit(vp->v_uobj.vmobjlock);
|
2007-04-13 03:34:50 +04:00
|
|
|
cerror = vn_lock(vp, LK_EXCLUSIVE);
|
|
|
|
if (cerror) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: can't lock vnode %p\n",
|
|
|
|
__func__, vp);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2007-04-13 03:34:50 +04:00
|
|
|
return cerror;
|
|
|
|
}
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: locked vnode %p\n", __func__, vp);
|
2007-04-13 03:34:50 +04:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Open file (causes upcall to venus).
|
|
|
|
* XXX Perhaps we should not fully open the file, but
|
|
|
|
* simply obtain a container file.
|
|
|
|
*/
|
2014-03-20 10:48:54 +04:00
|
|
|
/* XXX Is it ok to do this while holding the mutex? */
|
2007-11-26 22:01:26 +03:00
|
|
|
cerror = VOP_OPEN(vp, FREAD, cred);
|
2007-04-13 03:34:50 +04:00
|
|
|
|
|
|
|
if (cerror) {
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: cannot open vnode %p => %d\n", __func__,
|
2012-05-04 21:57:22 +04:00
|
|
|
vp, cerror);
|
|
|
|
#endif
|
2007-04-13 03:34:50 +04:00
|
|
|
if (waslocked == 0)
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2007-04-13 03:34:50 +04:00
|
|
|
return cerror;
|
|
|
|
}
|
|
|
|
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: opened vnode %p\n", __func__, vp);
|
2007-04-13 03:34:50 +04:00
|
|
|
#endif
|
2012-04-29 00:01:09 +04:00
|
|
|
cvp = cp->c_ovp;
|
2007-04-13 03:34:50 +04:00
|
|
|
didopen = 1;
|
2012-05-04 05:40:13 +04:00
|
|
|
if (waslocked == 0)
|
2020-02-24 23:53:11 +03:00
|
|
|
rw_enter(vp->v_uobj.vmobjlock, op);
|
2001-07-03 10:46:52 +04:00
|
|
|
}
|
2012-04-29 00:01:09 +04:00
|
|
|
KASSERT(cvp != NULL);
|
2007-04-13 03:34:50 +04:00
|
|
|
|
2007-04-15 16:59:04 +04:00
|
|
|
/* Munge the arg structure to refer to the container vnode. */
|
2020-02-24 23:53:11 +03:00
|
|
|
KASSERT(cvp->v_uobj.vmobjlock == vp->v_uobj.vmobjlock);
|
2001-07-03 10:46:52 +04:00
|
|
|
ap->a_vp = cp->c_ovp;
|
2007-04-13 03:34:50 +04:00
|
|
|
|
2012-04-29 00:01:09 +04:00
|
|
|
/* Finally, call getpages on it. */
|
2007-04-13 03:34:50 +04:00
|
|
|
error = VCALL(ap->a_vp, VOFFSET(vop_getpages), ap);
|
|
|
|
|
|
|
|
/* If we opened the vnode, we must close it. */
|
|
|
|
if (didopen) {
|
|
|
|
/*
|
|
|
|
* VOP_CLOSE requires a locked vnode, but we are still
|
2007-04-15 16:45:39 +04:00
|
|
|
* holding the lock (or riding a caller's lock).
|
2007-04-13 03:34:50 +04:00
|
|
|
*/
|
2007-11-26 22:01:26 +03:00
|
|
|
cerror = VOP_CLOSE(vp, FREAD, cred);
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2007-04-13 03:34:50 +04:00
|
|
|
if (cerror != 0)
|
|
|
|
/* XXX How should we handle this? */
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: closed vnode %p -> %d\n", __func__,
|
|
|
|
vp, cerror);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2007-04-13 03:34:50 +04:00
|
|
|
|
2007-04-15 16:45:39 +04:00
|
|
|
/* If we obtained a lock, drop it. */
|
2007-04-13 03:34:50 +04:00
|
|
|
if (waslocked == 0)
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2007-04-13 03:34:50 +04:00
|
|
|
}
|
|
|
|
|
2001-07-03 10:46:52 +04:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2007-04-13 03:34:50 +04:00
|
|
|
/*
|
2012-04-29 00:01:09 +04:00
|
|
|
* The protocol requires v_interlock to be held by the caller.
|
2007-04-13 03:34:50 +04:00
|
|
|
*/
|
2001-07-03 10:46:52 +04:00
|
|
|
int
|
2005-08-31 02:24:11 +04:00
|
|
|
coda_putpages(void *v)
|
2001-07-03 10:46:52 +04:00
|
|
|
{
|
|
|
|
struct vop_putpages_args /* {
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *a_vp;
|
2001-07-03 10:46:52 +04:00
|
|
|
voff_t a_offlo;
|
|
|
|
voff_t a_offhi;
|
|
|
|
int a_flags;
|
|
|
|
} */ *ap = v;
|
2012-04-29 00:15:07 +04:00
|
|
|
vnode_t *vp = ap->a_vp, *cvp;
|
2007-04-13 03:34:50 +04:00
|
|
|
struct cnode *cp = VTOC(vp);
|
|
|
|
int error;
|
2001-12-06 07:27:40 +03:00
|
|
|
|
2020-02-24 23:53:11 +03:00
|
|
|
KASSERT(rw_write_held(vp->v_uobj.vmobjlock));
|
2007-04-15 16:59:04 +04:00
|
|
|
|
2001-07-03 10:46:52 +04:00
|
|
|
/* Check for control object. */
|
|
|
|
if (IS_CTL_VP(vp)) {
|
2020-02-24 23:53:11 +03:00
|
|
|
rw_exit(vp->v_uobj.vmobjlock);
|
2012-05-04 21:57:22 +04:00
|
|
|
#ifdef CODA_VERBOSE
|
2012-04-29 00:15:07 +04:00
|
|
|
printf("%s: control object %p\n", __func__, vp);
|
2012-05-04 21:57:22 +04:00
|
|
|
#endif
|
2014-12-13 18:57:46 +03:00
|
|
|
return 0;
|
2001-07-03 10:46:52 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2007-04-13 03:34:50 +04:00
|
|
|
* If container object is not present, then there are no pages
|
|
|
|
* to put; just return without error. This happens all the
|
|
|
|
* time, apparently during discard of a closed vnode (which
|
|
|
|
* trivially can't have dirty pages).
|
2001-07-03 10:46:52 +04:00
|
|
|
*/
|
2012-04-29 00:01:09 +04:00
|
|
|
cvp = cp->c_ovp;
|
|
|
|
if (cvp == NULL) {
|
2020-02-24 23:53:11 +03:00
|
|
|
rw_exit(vp->v_uobj.vmobjlock);
|
2007-04-13 03:34:50 +04:00
|
|
|
return 0;
|
2012-04-29 00:01:09 +04:00
|
|
|
}
|
2001-07-03 10:46:52 +04:00
|
|
|
|
2007-04-15 16:59:04 +04:00
|
|
|
/* Munge the arg structure to refer to the container vnode. */
|
2020-02-24 23:53:11 +03:00
|
|
|
KASSERT(cvp->v_uobj.vmobjlock == vp->v_uobj.vmobjlock);
|
2012-04-29 00:01:09 +04:00
|
|
|
ap->a_vp = cvp;
|
2007-04-13 03:34:50 +04:00
|
|
|
|
2012-04-29 00:01:09 +04:00
|
|
|
/* Finally, call putpages on it. */
|
2007-04-13 03:34:50 +04:00
|
|
|
error = VCALL(ap->a_vp, VOFFSET(vop_putpages), ap);
|
|
|
|
|
|
|
|
return error;
|
2001-07-03 10:46:52 +04:00
|
|
|
}
|