Print this page
7656 unlinking directory on tmpfs can cause kernel panic
Split |
Close |
Expand all |
Collapse all |
--- old/usr/src/uts/common/fs/tmpfs/tmp_vnops.c
+++ new/usr/src/uts/common/fs/tmpfs/tmp_vnops.c
1 1 /*
2 2 * CDDL HEADER START
3 3 *
4 4 * The contents of this file are subject to the terms of the
5 5 * Common Development and Distribution License (the "License").
6 6 * You may not use this file except in compliance with the License.
7 7 *
8 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 9 * or http://www.opensolaris.org/os/licensing.
10 10 * See the License for the specific language governing permissions
11 11 * and limitations under the License.
12 12 *
13 13 * When distributing Covered Code, include this CDDL HEADER in each
14 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 15 * If applicable, add the following below this CDDL HEADER, with the
16 16 * fields enclosed by brackets "[]" replaced with your own identifying
17 17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 18 *
19 19 * CDDL HEADER END
20 20 */
21 21
22 22 /*
23 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
24 24 * Use is subject to license terms.
25 25 */
26 26
27 27 /*
28 28 * Copyright (c) 2015, Joyent, Inc. All rights reserved.
29 29 * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
30 30 * Copyright 2016 RackTop Systems.
31 31 */
32 32
33 33 #include <sys/types.h>
34 34 #include <sys/param.h>
35 35 #include <sys/t_lock.h>
36 36 #include <sys/systm.h>
37 37 #include <sys/sysmacros.h>
38 38 #include <sys/user.h>
39 39 #include <sys/time.h>
40 40 #include <sys/vfs.h>
41 41 #include <sys/vfs_opreg.h>
42 42 #include <sys/vnode.h>
43 43 #include <sys/file.h>
44 44 #include <sys/fcntl.h>
45 45 #include <sys/flock.h>
46 46 #include <sys/kmem.h>
47 47 #include <sys/uio.h>
48 48 #include <sys/errno.h>
49 49 #include <sys/stat.h>
50 50 #include <sys/cred.h>
51 51 #include <sys/dirent.h>
52 52 #include <sys/pathname.h>
53 53 #include <sys/vmsystm.h>
54 54 #include <sys/fs/tmp.h>
55 55 #include <sys/fs/tmpnode.h>
56 56 #include <sys/mman.h>
57 57 #include <vm/hat.h>
58 58 #include <vm/seg_vn.h>
59 59 #include <vm/seg_map.h>
60 60 #include <vm/seg.h>
61 61 #include <vm/anon.h>
62 62 #include <vm/as.h>
63 63 #include <vm/page.h>
64 64 #include <vm/pvn.h>
65 65 #include <sys/cmn_err.h>
66 66 #include <sys/debug.h>
67 67 #include <sys/swap.h>
68 68 #include <sys/buf.h>
69 69 #include <sys/vm.h>
70 70 #include <sys/vtrace.h>
71 71 #include <sys/policy.h>
72 72 #include <fs/fs_subr.h>
73 73
74 74 static int tmp_getapage(struct vnode *, u_offset_t, size_t, uint_t *,
75 75 page_t **, size_t, struct seg *, caddr_t, enum seg_rw, struct cred *);
76 76 static int tmp_putapage(struct vnode *, page_t *, u_offset_t *, size_t *,
77 77 int, struct cred *);
78 78
79 79 /* ARGSUSED1 */
80 80 static int
81 81 tmp_open(struct vnode **vpp, int flag, struct cred *cred, caller_context_t *ct)
82 82 {
83 83 /*
84 84 * swapon to a tmpfs file is not supported so access
85 85 * is denied on open if VISSWAP is set.
86 86 */
87 87 if ((*vpp)->v_flag & VISSWAP)
88 88 return (EINVAL);
89 89 return (0);
90 90 }
91 91
92 92 /* ARGSUSED1 */
93 93 static int
94 94 tmp_close(
95 95 struct vnode *vp,
96 96 int flag,
97 97 int count,
98 98 offset_t offset,
99 99 struct cred *cred,
100 100 caller_context_t *ct)
101 101 {
102 102 cleanlocks(vp, ttoproc(curthread)->p_pid, 0);
103 103 cleanshares(vp, ttoproc(curthread)->p_pid);
104 104 return (0);
105 105 }
106 106
107 107 /*
108 108 * wrtmp does the real work of write requests for tmpfs.
109 109 */
110 110 static int
111 111 wrtmp(
112 112 struct tmount *tm,
113 113 struct tmpnode *tp,
114 114 struct uio *uio,
115 115 struct cred *cr,
116 116 struct caller_context *ct)
117 117 {
118 118 pgcnt_t pageoffset; /* offset in pages */
119 119 ulong_t segmap_offset; /* pagesize byte offset into segmap */
120 120 caddr_t base; /* base of segmap */
121 121 ssize_t bytes; /* bytes to uiomove */
122 122 pfn_t pagenumber; /* offset in pages into tmp file */
123 123 struct vnode *vp;
124 124 int error = 0;
125 125 int pagecreate; /* == 1 if we allocated a page */
126 126 int newpage;
127 127 rlim64_t limit = uio->uio_llimit;
128 128 long oresid = uio->uio_resid;
129 129 timestruc_t now;
130 130
131 131 long tn_size_changed = 0;
132 132 long old_tn_size;
133 133 long new_tn_size;
134 134
135 135 vp = TNTOV(tp);
136 136 ASSERT(vp->v_type == VREG);
137 137
138 138 TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START,
139 139 "tmp_wrtmp_start:vp %p", vp);
140 140
141 141 ASSERT(RW_WRITE_HELD(&tp->tn_contents));
142 142 ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
143 143
144 144 if (MANDLOCK(vp, tp->tn_mode)) {
145 145 rw_exit(&tp->tn_contents);
146 146 /*
147 147 * tmp_getattr ends up being called by chklock
148 148 */
149 149 error = chklock(vp, FWRITE, uio->uio_loffset, uio->uio_resid,
150 150 uio->uio_fmode, ct);
151 151 rw_enter(&tp->tn_contents, RW_WRITER);
152 152 if (error != 0) {
153 153 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
154 154 "tmp_wrtmp_end:vp %p error %d", vp, error);
155 155 return (error);
156 156 }
157 157 }
158 158
159 159 if (uio->uio_loffset < 0)
160 160 return (EINVAL);
161 161
162 162 if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
163 163 limit = MAXOFFSET_T;
164 164
165 165 if (uio->uio_loffset >= limit) {
166 166 proc_t *p = ttoproc(curthread);
167 167
168 168 mutex_enter(&p->p_lock);
169 169 (void) rctl_action(rctlproc_legacy[RLIMIT_FSIZE], p->p_rctls,
170 170 p, RCA_UNSAFE_SIGINFO);
171 171 mutex_exit(&p->p_lock);
172 172 return (EFBIG);
173 173 }
174 174
175 175 if (uio->uio_loffset >= MAXOFF_T) {
176 176 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
177 177 "tmp_wrtmp_end:vp %p error %d", vp, EINVAL);
178 178 return (EFBIG);
179 179 }
180 180
181 181 if (uio->uio_resid == 0) {
182 182 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
183 183 "tmp_wrtmp_end:vp %p error %d", vp, 0);
184 184 return (0);
185 185 }
186 186
187 187 if (limit > MAXOFF_T)
188 188 limit = MAXOFF_T;
189 189
190 190 do {
191 191 long offset;
192 192 long delta;
193 193
194 194 offset = (long)uio->uio_offset;
195 195 pageoffset = offset & PAGEOFFSET;
196 196 /*
197 197 * A maximum of PAGESIZE bytes of data is transferred
198 198 * each pass through this loop
199 199 */
200 200 bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
201 201
202 202 if (offset + bytes >= limit) {
203 203 if (offset >= limit) {
204 204 error = EFBIG;
205 205 goto out;
206 206 }
207 207 bytes = limit - offset;
208 208 }
209 209 pagenumber = btop(offset);
210 210
211 211 /*
212 212 * delta is the amount of anonymous memory
213 213 * to reserve for the file.
214 214 * We always reserve in pagesize increments so
215 215 * unless we're extending the file into a new page,
216 216 * we don't need to call tmp_resv.
217 217 */
218 218 delta = offset + bytes -
219 219 P2ROUNDUP_TYPED(tp->tn_size, PAGESIZE, u_offset_t);
220 220 if (delta > 0) {
221 221 pagecreate = 1;
222 222 if (tmp_resv(tm, tp, delta, pagecreate)) {
223 223 /*
224 224 * Log file system full in the zone that owns
225 225 * the tmpfs mount, as well as in the global
226 226 * zone if necessary.
227 227 */
228 228 zcmn_err(tm->tm_vfsp->vfs_zone->zone_id,
229 229 CE_WARN, "%s: File system full, "
230 230 "swap space limit exceeded",
231 231 tm->tm_mntpath);
232 232
233 233 if (tm->tm_vfsp->vfs_zone->zone_id !=
234 234 GLOBAL_ZONEID) {
235 235
236 236 vfs_t *vfs = tm->tm_vfsp;
237 237
238 238 zcmn_err(GLOBAL_ZONEID,
239 239 CE_WARN, "%s: File system full, "
240 240 "swap space limit exceeded",
241 241 vfs->vfs_vnodecovered->v_path);
242 242 }
243 243 error = ENOSPC;
244 244 break;
245 245 }
246 246 tmpnode_growmap(tp, (ulong_t)offset + bytes);
247 247 }
248 248 /* grow the file to the new length */
249 249 if (offset + bytes > tp->tn_size) {
250 250 tn_size_changed = 1;
251 251 old_tn_size = tp->tn_size;
252 252 /*
253 253 * Postpone updating tp->tn_size until uiomove() is
254 254 * done.
255 255 */
256 256 new_tn_size = offset + bytes;
257 257 }
258 258 if (bytes == PAGESIZE) {
259 259 /*
260 260 * Writing whole page so reading from disk
261 261 * is a waste
262 262 */
263 263 pagecreate = 1;
264 264 } else {
265 265 pagecreate = 0;
266 266 }
267 267 /*
268 268 * If writing past EOF or filling in a hole
269 269 * we need to allocate an anon slot.
270 270 */
271 271 if (anon_get_ptr(tp->tn_anon, pagenumber) == NULL) {
272 272 (void) anon_set_ptr(tp->tn_anon, pagenumber,
273 273 anon_alloc(vp, ptob(pagenumber)), ANON_SLEEP);
274 274 pagecreate = 1;
275 275 tp->tn_nblocks++;
276 276 }
277 277
278 278 /*
279 279 * We have to drop the contents lock to allow the VM
280 280 * system to reacquire it in tmp_getpage()
281 281 */
282 282 rw_exit(&tp->tn_contents);
283 283
284 284 /*
285 285 * Touch the page and fault it in if it is not in core
286 286 * before segmap_getmapflt or vpm_data_copy can lock it.
287 287 * This is to avoid the deadlock if the buffer is mapped
288 288 * to the same file through mmap which we want to write.
289 289 */
290 290 uio_prefaultpages((long)bytes, uio);
291 291
292 292 newpage = 0;
293 293 if (vpm_enable) {
294 294 /*
295 295 * Copy data. If new pages are created, part of
296 296 * the page that is not written will be initizliazed
297 297 * with zeros.
298 298 */
299 299 error = vpm_data_copy(vp, offset, bytes, uio,
300 300 !pagecreate, &newpage, 1, S_WRITE);
301 301 } else {
302 302 /* Get offset within the segmap mapping */
303 303 segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
304 304 base = segmap_getmapflt(segkmap, vp,
305 305 (offset & MAXBMASK), PAGESIZE, !pagecreate,
306 306 S_WRITE);
307 307 }
308 308
309 309
310 310 if (!vpm_enable && pagecreate) {
311 311 /*
312 312 * segmap_pagecreate() returns 1 if it calls
313 313 * page_create_va() to allocate any pages.
314 314 */
315 315 newpage = segmap_pagecreate(segkmap,
316 316 base + segmap_offset, (size_t)PAGESIZE, 0);
317 317 /*
318 318 * Clear from the beginning of the page to the starting
319 319 * offset of the data.
320 320 */
321 321 if (pageoffset != 0)
322 322 (void) kzero(base + segmap_offset,
323 323 (size_t)pageoffset);
324 324 }
325 325
326 326 if (!vpm_enable) {
327 327 error = uiomove(base + segmap_offset + pageoffset,
328 328 (long)bytes, UIO_WRITE, uio);
329 329 }
330 330
331 331 if (!vpm_enable && pagecreate &&
332 332 uio->uio_offset < P2ROUNDUP(offset + bytes, PAGESIZE)) {
333 333 long zoffset; /* zero from offset into page */
334 334 /*
335 335 * We created pages w/o initializing them completely,
336 336 * thus we need to zero the part that wasn't set up.
337 337 * This happens on most EOF write cases and if
338 338 * we had some sort of error during the uiomove.
339 339 */
340 340 long nmoved;
341 341
342 342 nmoved = uio->uio_offset - offset;
343 343 ASSERT((nmoved + pageoffset) <= PAGESIZE);
344 344
345 345 /*
346 346 * Zero from the end of data in the page to the
347 347 * end of the page.
348 348 */
349 349 if ((zoffset = pageoffset + nmoved) < PAGESIZE)
350 350 (void) kzero(base + segmap_offset + zoffset,
351 351 (size_t)PAGESIZE - zoffset);
352 352 }
353 353
354 354 /*
355 355 * Unlock the pages which have been allocated by
356 356 * page_create_va() in segmap_pagecreate()
357 357 */
358 358 if (!vpm_enable && newpage) {
359 359 segmap_pageunlock(segkmap, base + segmap_offset,
360 360 (size_t)PAGESIZE, S_WRITE);
361 361 }
362 362
363 363 if (error) {
364 364 /*
365 365 * If we failed on a write, we must
366 366 * be sure to invalidate any pages that may have
367 367 * been allocated.
368 368 */
369 369 if (vpm_enable) {
370 370 (void) vpm_sync_pages(vp, offset, PAGESIZE,
371 371 SM_INVAL);
372 372 } else {
373 373 (void) segmap_release(segkmap, base, SM_INVAL);
374 374 }
375 375 } else {
376 376 if (vpm_enable) {
377 377 error = vpm_sync_pages(vp, offset, PAGESIZE,
378 378 0);
379 379 } else {
380 380 error = segmap_release(segkmap, base, 0);
381 381 }
382 382 }
383 383
384 384 /*
385 385 * Re-acquire contents lock.
386 386 */
387 387 rw_enter(&tp->tn_contents, RW_WRITER);
388 388
389 389 /*
390 390 * Update tn_size.
391 391 */
392 392 if (tn_size_changed)
393 393 tp->tn_size = new_tn_size;
394 394
395 395 /*
396 396 * If the uiomove failed, fix up tn_size.
397 397 */
398 398 if (error) {
399 399 if (tn_size_changed) {
400 400 /*
401 401 * The uiomove failed, and we
402 402 * allocated blocks,so get rid
403 403 * of them.
404 404 */
405 405 (void) tmpnode_trunc(tm, tp,
406 406 (ulong_t)old_tn_size);
407 407 }
408 408 } else {
409 409 /*
410 410 * XXX - Can this be out of the loop?
411 411 */
412 412 if ((tp->tn_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) &&
413 413 (tp->tn_mode & (S_ISUID | S_ISGID)) &&
414 414 secpolicy_vnode_setid_retain(cr,
415 415 (tp->tn_mode & S_ISUID) != 0 && tp->tn_uid == 0)) {
416 416 /*
417 417 * Clear Set-UID & Set-GID bits on
418 418 * successful write if not privileged
419 419 * and at least one of the execute bits
420 420 * is set. If we always clear Set-GID,
421 421 * mandatory file and record locking is
422 422 * unuseable.
423 423 */
424 424 tp->tn_mode &= ~(S_ISUID | S_ISGID);
425 425 }
426 426 gethrestime(&now);
427 427 tp->tn_mtime = now;
428 428 tp->tn_ctime = now;
429 429 }
430 430 } while (error == 0 && uio->uio_resid > 0 && bytes != 0);
431 431
432 432 out:
433 433 /*
434 434 * If we've already done a partial-write, terminate
435 435 * the write but return no error.
436 436 */
437 437 if (oresid != uio->uio_resid)
438 438 error = 0;
439 439 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
440 440 "tmp_wrtmp_end:vp %p error %d", vp, error);
441 441 return (error);
442 442 }
443 443
444 444 /*
445 445 * rdtmp does the real work of read requests for tmpfs.
446 446 */
447 447 static int
448 448 rdtmp(
449 449 struct tmount *tm,
450 450 struct tmpnode *tp,
451 451 struct uio *uio,
452 452 struct caller_context *ct)
453 453 {
454 454 ulong_t pageoffset; /* offset in tmpfs file (uio_offset) */
455 455 ulong_t segmap_offset; /* pagesize byte offset into segmap */
456 456 caddr_t base; /* base of segmap */
457 457 ssize_t bytes; /* bytes to uiomove */
458 458 struct vnode *vp;
459 459 int error;
460 460 long oresid = uio->uio_resid;
461 461
462 462 #if defined(lint)
463 463 tm = tm;
464 464 #endif
465 465 vp = TNTOV(tp);
466 466
467 467 TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START, "tmp_rdtmp_start:vp %p",
468 468 vp);
469 469
470 470 ASSERT(RW_LOCK_HELD(&tp->tn_contents));
471 471
472 472 if (MANDLOCK(vp, tp->tn_mode)) {
473 473 rw_exit(&tp->tn_contents);
474 474 /*
475 475 * tmp_getattr ends up being called by chklock
476 476 */
477 477 error = chklock(vp, FREAD, uio->uio_loffset, uio->uio_resid,
478 478 uio->uio_fmode, ct);
479 479 rw_enter(&tp->tn_contents, RW_READER);
480 480 if (error != 0) {
481 481 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
482 482 "tmp_rdtmp_end:vp %p error %d", vp, error);
483 483 return (error);
484 484 }
485 485 }
486 486 ASSERT(tp->tn_type == VREG);
487 487
488 488 if (uio->uio_loffset >= MAXOFF_T) {
489 489 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
490 490 "tmp_rdtmp_end:vp %p error %d", vp, EINVAL);
491 491 return (0);
492 492 }
493 493 if (uio->uio_loffset < 0)
494 494 return (EINVAL);
495 495 if (uio->uio_resid == 0) {
496 496 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
497 497 "tmp_rdtmp_end:vp %p error %d", vp, 0);
498 498 return (0);
499 499 }
500 500
501 501 vp = TNTOV(tp);
502 502
503 503 do {
504 504 long diff;
505 505 long offset;
506 506
507 507 offset = uio->uio_offset;
508 508 pageoffset = offset & PAGEOFFSET;
509 509 bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
510 510
511 511 diff = tp->tn_size - offset;
512 512
513 513 if (diff <= 0) {
514 514 error = 0;
515 515 goto out;
516 516 }
517 517 if (diff < bytes)
518 518 bytes = diff;
519 519
520 520 /*
521 521 * We have to drop the contents lock to allow the VM system
522 522 * to reacquire it in tmp_getpage() should the uiomove cause a
523 523 * pagefault.
524 524 */
525 525 rw_exit(&tp->tn_contents);
526 526
527 527 if (vpm_enable) {
528 528 /*
529 529 * Copy data.
530 530 */
531 531 error = vpm_data_copy(vp, offset, bytes, uio, 1, NULL,
532 532 0, S_READ);
533 533 } else {
534 534 segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
535 535 base = segmap_getmapflt(segkmap, vp, offset & MAXBMASK,
536 536 bytes, 1, S_READ);
537 537
538 538 error = uiomove(base + segmap_offset + pageoffset,
539 539 (long)bytes, UIO_READ, uio);
540 540 }
541 541
542 542 if (error) {
543 543 if (vpm_enable) {
544 544 (void) vpm_sync_pages(vp, offset, PAGESIZE, 0);
545 545 } else {
546 546 (void) segmap_release(segkmap, base, 0);
547 547 }
548 548 } else {
549 549 if (vpm_enable) {
550 550 error = vpm_sync_pages(vp, offset, PAGESIZE,
551 551 0);
552 552 } else {
553 553 error = segmap_release(segkmap, base, 0);
554 554 }
555 555 }
556 556
557 557 /*
558 558 * Re-acquire contents lock.
559 559 */
560 560 rw_enter(&tp->tn_contents, RW_READER);
561 561
562 562 } while (error == 0 && uio->uio_resid > 0);
563 563
564 564 out:
565 565 gethrestime(&tp->tn_atime);
566 566
567 567 /*
568 568 * If we've already done a partial read, terminate
569 569 * the read but return no error.
570 570 */
571 571 if (oresid != uio->uio_resid)
572 572 error = 0;
573 573
574 574 TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
575 575 "tmp_rdtmp_end:vp %x error %d", vp, error);
576 576 return (error);
577 577 }
578 578
579 579 /* ARGSUSED2 */
580 580 static int
581 581 tmp_read(struct vnode *vp, struct uio *uiop, int ioflag, cred_t *cred,
582 582 struct caller_context *ct)
583 583 {
584 584 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
585 585 struct tmount *tm = (struct tmount *)VTOTM(vp);
586 586 int error;
587 587
588 588 /*
589 589 * We don't currently support reading non-regular files
590 590 */
591 591 if (vp->v_type == VDIR)
592 592 return (EISDIR);
593 593 if (vp->v_type != VREG)
594 594 return (EINVAL);
595 595 /*
596 596 * tmp_rwlock should have already been called from layers above
597 597 */
598 598 ASSERT(RW_READ_HELD(&tp->tn_rwlock));
599 599
600 600 rw_enter(&tp->tn_contents, RW_READER);
601 601
602 602 error = rdtmp(tm, tp, uiop, ct);
603 603
604 604 rw_exit(&tp->tn_contents);
605 605
606 606 return (error);
607 607 }
608 608
609 609 static int
610 610 tmp_write(struct vnode *vp, struct uio *uiop, int ioflag, struct cred *cred,
611 611 struct caller_context *ct)
612 612 {
613 613 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
614 614 struct tmount *tm = (struct tmount *)VTOTM(vp);
615 615 int error;
616 616
617 617 /*
618 618 * We don't currently support writing to non-regular files
619 619 */
620 620 if (vp->v_type != VREG)
621 621 return (EINVAL); /* XXX EISDIR? */
622 622
623 623 /*
624 624 * tmp_rwlock should have already been called from layers above
625 625 */
626 626 ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
627 627
628 628 rw_enter(&tp->tn_contents, RW_WRITER);
629 629
630 630 if (ioflag & FAPPEND) {
631 631 /*
632 632 * In append mode start at end of file.
633 633 */
634 634 uiop->uio_loffset = tp->tn_size;
635 635 }
636 636
637 637 error = wrtmp(tm, tp, uiop, cred, ct);
638 638
639 639 rw_exit(&tp->tn_contents);
640 640
641 641 return (error);
642 642 }
643 643
644 644 /* ARGSUSED */
645 645 static int
646 646 tmp_ioctl(
647 647 struct vnode *vp,
648 648 int com,
649 649 intptr_t data,
650 650 int flag,
651 651 struct cred *cred,
652 652 int *rvalp,
653 653 caller_context_t *ct)
654 654 {
655 655 return (ENOTTY);
656 656 }
657 657
658 658 /* ARGSUSED2 */
659 659 static int
660 660 tmp_getattr(
661 661 struct vnode *vp,
662 662 struct vattr *vap,
663 663 int flags,
664 664 struct cred *cred,
665 665 caller_context_t *ct)
666 666 {
667 667 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
668 668 struct vnode *mvp;
669 669 struct vattr va;
670 670 int attrs = 1;
671 671
672 672 /*
673 673 * A special case to handle the root tnode on a diskless nfs
674 674 * client who may have had its uid and gid inherited
675 675 * from an nfs vnode with nobody ownership. Likely the
676 676 * root filesystem. After nfs is fully functional the uid/gid
677 677 * may be mapable so ask again.
678 678 * vfsp can't get unmounted because we hold vp.
679 679 */
680 680 if (vp->v_flag & VROOT &&
681 681 (mvp = vp->v_vfsp->vfs_vnodecovered) != NULL) {
682 682 mutex_enter(&tp->tn_tlock);
683 683 if (tp->tn_uid == UID_NOBODY || tp->tn_gid == GID_NOBODY) {
684 684 mutex_exit(&tp->tn_tlock);
685 685 bzero(&va, sizeof (struct vattr));
686 686 va.va_mask = AT_UID|AT_GID;
687 687 attrs = VOP_GETATTR(mvp, &va, 0, cred, ct);
688 688 } else {
689 689 mutex_exit(&tp->tn_tlock);
690 690 }
691 691 }
692 692 mutex_enter(&tp->tn_tlock);
693 693 if (attrs == 0) {
694 694 tp->tn_uid = va.va_uid;
695 695 tp->tn_gid = va.va_gid;
696 696 }
697 697 vap->va_type = vp->v_type;
698 698 vap->va_mode = tp->tn_mode & MODEMASK;
699 699 vap->va_uid = tp->tn_uid;
700 700 vap->va_gid = tp->tn_gid;
701 701 vap->va_fsid = tp->tn_fsid;
702 702 vap->va_nodeid = (ino64_t)tp->tn_nodeid;
703 703 vap->va_nlink = tp->tn_nlink;
704 704 vap->va_size = (u_offset_t)tp->tn_size;
705 705 vap->va_atime = tp->tn_atime;
706 706 vap->va_mtime = tp->tn_mtime;
707 707 vap->va_ctime = tp->tn_ctime;
708 708 vap->va_blksize = PAGESIZE;
709 709 vap->va_rdev = tp->tn_rdev;
710 710 vap->va_seq = tp->tn_seq;
711 711
712 712 /*
713 713 * XXX Holes are not taken into account. We could take the time to
714 714 * run through the anon array looking for allocated slots...
715 715 */
716 716 vap->va_nblocks = (fsblkcnt64_t)btodb(ptob(btopr(vap->va_size)));
717 717 mutex_exit(&tp->tn_tlock);
718 718 return (0);
719 719 }
720 720
721 721 /*ARGSUSED4*/
722 722 static int
723 723 tmp_setattr(
724 724 struct vnode *vp,
725 725 struct vattr *vap,
726 726 int flags,
727 727 struct cred *cred,
728 728 caller_context_t *ct)
729 729 {
730 730 struct tmount *tm = (struct tmount *)VTOTM(vp);
731 731 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
732 732 int error = 0;
733 733 struct vattr *get;
734 734 long mask;
735 735
736 736 /*
737 737 * Cannot set these attributes
738 738 */
739 739 if ((vap->va_mask & AT_NOSET) || (vap->va_mask & AT_XVATTR))
740 740 return (EINVAL);
741 741
742 742 mutex_enter(&tp->tn_tlock);
743 743
744 744 get = &tp->tn_attr;
745 745 /*
746 746 * Change file access modes. Must be owner or have sufficient
747 747 * privileges.
748 748 */
749 749 error = secpolicy_vnode_setattr(cred, vp, vap, get, flags, tmp_taccess,
750 750 tp);
751 751
752 752 if (error)
753 753 goto out;
754 754
755 755 mask = vap->va_mask;
756 756
757 757 if (mask & AT_MODE) {
758 758 get->va_mode &= S_IFMT;
759 759 get->va_mode |= vap->va_mode & ~S_IFMT;
760 760 }
761 761
762 762 if (mask & AT_UID)
763 763 get->va_uid = vap->va_uid;
764 764 if (mask & AT_GID)
765 765 get->va_gid = vap->va_gid;
766 766 if (mask & AT_ATIME)
767 767 get->va_atime = vap->va_atime;
768 768 if (mask & AT_MTIME)
769 769 get->va_mtime = vap->va_mtime;
770 770
771 771 if (mask & (AT_UID | AT_GID | AT_MODE | AT_MTIME))
772 772 gethrestime(&tp->tn_ctime);
773 773
774 774 if (mask & AT_SIZE) {
775 775 ASSERT(vp->v_type != VDIR);
776 776
777 777 /* Don't support large files. */
778 778 if (vap->va_size > MAXOFF_T) {
779 779 error = EFBIG;
780 780 goto out;
781 781 }
782 782 mutex_exit(&tp->tn_tlock);
783 783
784 784 rw_enter(&tp->tn_rwlock, RW_WRITER);
785 785 rw_enter(&tp->tn_contents, RW_WRITER);
786 786 error = tmpnode_trunc(tm, tp, (ulong_t)vap->va_size);
787 787 rw_exit(&tp->tn_contents);
788 788 rw_exit(&tp->tn_rwlock);
789 789
790 790 if (error == 0 && vap->va_size == 0)
791 791 vnevent_truncate(vp, ct);
792 792
793 793 goto out1;
794 794 }
795 795 out:
796 796 mutex_exit(&tp->tn_tlock);
797 797 out1:
798 798 return (error);
799 799 }
800 800
801 801 /* ARGSUSED2 */
802 802 static int
803 803 tmp_access(
804 804 struct vnode *vp,
805 805 int mode,
806 806 int flags,
807 807 struct cred *cred,
808 808 caller_context_t *ct)
809 809 {
810 810 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
811 811 int error;
812 812
813 813 mutex_enter(&tp->tn_tlock);
814 814 error = tmp_taccess(tp, mode, cred);
815 815 mutex_exit(&tp->tn_tlock);
816 816 return (error);
817 817 }
818 818
819 819 /* ARGSUSED3 */
820 820 static int
821 821 tmp_lookup(
822 822 struct vnode *dvp,
823 823 char *nm,
824 824 struct vnode **vpp,
825 825 struct pathname *pnp,
826 826 int flags,
827 827 struct vnode *rdir,
828 828 struct cred *cred,
829 829 caller_context_t *ct,
830 830 int *direntflags,
831 831 pathname_t *realpnp)
832 832 {
833 833 struct tmpnode *tp = (struct tmpnode *)VTOTN(dvp);
834 834 struct tmpnode *ntp = NULL;
835 835 int error;
836 836
837 837
838 838 /* allow cd into @ dir */
839 839 if (flags & LOOKUP_XATTR) {
840 840 struct tmpnode *xdp;
841 841 struct tmount *tm;
842 842
843 843 /*
844 844 * don't allow attributes if not mounted XATTR support
845 845 */
846 846 if (!(dvp->v_vfsp->vfs_flag & VFS_XATTR))
847 847 return (EINVAL);
848 848
849 849 if (tp->tn_flags & ISXATTR)
850 850 /* No attributes on attributes */
851 851 return (EINVAL);
852 852
853 853 rw_enter(&tp->tn_rwlock, RW_WRITER);
854 854 if (tp->tn_xattrdp == NULL) {
855 855 if (!(flags & CREATE_XATTR_DIR)) {
856 856 rw_exit(&tp->tn_rwlock);
857 857 return (ENOENT);
858 858 }
859 859
860 860 /*
861 861 * No attribute directory exists for this
862 862 * node - create the attr dir as a side effect
863 863 * of this lookup.
864 864 */
865 865
866 866 /*
867 867 * Make sure we have adequate permission...
868 868 */
869 869
870 870 if ((error = tmp_taccess(tp, VWRITE, cred)) != 0) {
871 871 rw_exit(&tp->tn_rwlock);
872 872 return (error);
873 873 }
874 874
875 875 xdp = tmp_memalloc(sizeof (struct tmpnode),
876 876 TMP_MUSTHAVE);
877 877 tm = VTOTM(dvp);
878 878 tmpnode_init(tm, xdp, &tp->tn_attr, NULL);
879 879 /*
880 880 * Fix-up fields unique to attribute directories.
881 881 */
882 882 xdp->tn_flags = ISXATTR;
883 883 xdp->tn_type = VDIR;
884 884 if (tp->tn_type == VDIR) {
885 885 xdp->tn_mode = tp->tn_attr.va_mode;
886 886 } else {
887 887 xdp->tn_mode = 0700;
888 888 if (tp->tn_attr.va_mode & 0040)
889 889 xdp->tn_mode |= 0750;
890 890 if (tp->tn_attr.va_mode & 0004)
891 891 xdp->tn_mode |= 0705;
892 892 }
893 893 xdp->tn_vnode->v_type = VDIR;
894 894 xdp->tn_vnode->v_flag |= V_XATTRDIR;
895 895 tdirinit(tp, xdp);
896 896 tp->tn_xattrdp = xdp;
897 897 } else {
898 898 VN_HOLD(tp->tn_xattrdp->tn_vnode);
899 899 }
900 900 *vpp = TNTOV(tp->tn_xattrdp);
901 901 rw_exit(&tp->tn_rwlock);
902 902 return (0);
903 903 }
904 904
905 905 /*
906 906 * Null component name is a synonym for directory being searched.
907 907 */
908 908 if (*nm == '\0') {
909 909 VN_HOLD(dvp);
910 910 *vpp = dvp;
911 911 return (0);
912 912 }
913 913 ASSERT(tp);
914 914
915 915 error = tdirlookup(tp, nm, &ntp, cred);
916 916
917 917 if (error == 0) {
918 918 ASSERT(ntp);
919 919 *vpp = TNTOV(ntp);
920 920 /*
921 921 * If vnode is a device return special vnode instead
922 922 */
923 923 if (IS_DEVVP(*vpp)) {
924 924 struct vnode *newvp;
925 925
926 926 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
927 927 cred);
928 928 VN_RELE(*vpp);
929 929 *vpp = newvp;
930 930 }
931 931 }
932 932 TRACE_4(TR_FAC_TMPFS, TR_TMPFS_LOOKUP,
933 933 "tmpfs lookup:vp %p name %s vpp %p error %d",
934 934 dvp, nm, vpp, error);
935 935 return (error);
936 936 }
937 937
938 938 /*ARGSUSED7*/
939 939 static int
940 940 tmp_create(
941 941 struct vnode *dvp,
942 942 char *nm,
943 943 struct vattr *vap,
944 944 enum vcexcl exclusive,
945 945 int mode,
946 946 struct vnode **vpp,
947 947 struct cred *cred,
948 948 int flag,
949 949 caller_context_t *ct,
950 950 vsecattr_t *vsecp)
951 951 {
952 952 struct tmpnode *parent;
953 953 struct tmount *tm;
954 954 struct tmpnode *self;
955 955 int error;
956 956 struct tmpnode *oldtp;
957 957
958 958 again:
959 959 parent = (struct tmpnode *)VTOTN(dvp);
960 960 tm = (struct tmount *)VTOTM(dvp);
961 961 self = NULL;
962 962 error = 0;
963 963 oldtp = NULL;
964 964
965 965 /* device files not allowed in ext. attr dirs */
966 966 if ((parent->tn_flags & ISXATTR) &&
967 967 (vap->va_type == VBLK || vap->va_type == VCHR ||
968 968 vap->va_type == VFIFO || vap->va_type == VDOOR ||
969 969 vap->va_type == VSOCK || vap->va_type == VPORT))
970 970 return (EINVAL);
971 971
972 972 if (vap->va_type == VREG && (vap->va_mode & VSVTX)) {
973 973 /* Must be privileged to set sticky bit */
974 974 if (secpolicy_vnode_stky_modify(cred))
975 975 vap->va_mode &= ~VSVTX;
976 976 } else if (vap->va_type == VNON) {
977 977 return (EINVAL);
978 978 }
979 979
980 980 /*
981 981 * Null component name is a synonym for directory being searched.
982 982 */
983 983 if (*nm == '\0') {
984 984 VN_HOLD(dvp);
985 985 oldtp = parent;
986 986 } else {
987 987 error = tdirlookup(parent, nm, &oldtp, cred);
988 988 }
989 989
990 990 if (error == 0) { /* name found */
991 991 boolean_t trunc = B_FALSE;
992 992
993 993 ASSERT(oldtp);
994 994
995 995 rw_enter(&oldtp->tn_rwlock, RW_WRITER);
996 996
997 997 /*
998 998 * if create/read-only an existing
999 999 * directory, allow it
1000 1000 */
1001 1001 if (exclusive == EXCL)
1002 1002 error = EEXIST;
1003 1003 else if ((oldtp->tn_type == VDIR) && (mode & VWRITE))
1004 1004 error = EISDIR;
1005 1005 else {
1006 1006 error = tmp_taccess(oldtp, mode, cred);
1007 1007 }
1008 1008
1009 1009 if (error) {
1010 1010 rw_exit(&oldtp->tn_rwlock);
1011 1011 tmpnode_rele(oldtp);
1012 1012 return (error);
1013 1013 }
1014 1014 *vpp = TNTOV(oldtp);
1015 1015 if ((*vpp)->v_type == VREG && (vap->va_mask & AT_SIZE) &&
1016 1016 vap->va_size == 0) {
1017 1017 rw_enter(&oldtp->tn_contents, RW_WRITER);
1018 1018 (void) tmpnode_trunc(tm, oldtp, 0);
1019 1019 rw_exit(&oldtp->tn_contents);
1020 1020 trunc = B_TRUE;
1021 1021 }
1022 1022 rw_exit(&oldtp->tn_rwlock);
1023 1023 if (IS_DEVVP(*vpp)) {
1024 1024 struct vnode *newvp;
1025 1025
1026 1026 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
1027 1027 cred);
1028 1028 VN_RELE(*vpp);
1029 1029 if (newvp == NULL) {
1030 1030 return (ENOSYS);
1031 1031 }
1032 1032 *vpp = newvp;
1033 1033 }
1034 1034
1035 1035 if (trunc)
1036 1036 vnevent_create(*vpp, ct);
1037 1037
1038 1038 return (0);
1039 1039 }
1040 1040
1041 1041 if (error != ENOENT)
1042 1042 return (error);
1043 1043
1044 1044 rw_enter(&parent->tn_rwlock, RW_WRITER);
1045 1045 error = tdirenter(tm, parent, nm, DE_CREATE,
1046 1046 (struct tmpnode *)NULL, (struct tmpnode *)NULL,
1047 1047 vap, &self, cred, ct);
1048 1048 rw_exit(&parent->tn_rwlock);
1049 1049
1050 1050 if (error) {
1051 1051 if (self)
1052 1052 tmpnode_rele(self);
1053 1053
1054 1054 if (error == EEXIST) {
1055 1055 /*
1056 1056 * This means that the file was created sometime
1057 1057 * after we checked and did not find it and when
1058 1058 * we went to create it.
1059 1059 * Since creat() is supposed to truncate a file
1060 1060 * that already exits go back to the begining
1061 1061 * of the function. This time we will find it
1062 1062 * and go down the tmp_trunc() path
1063 1063 */
1064 1064 goto again;
1065 1065 }
1066 1066 return (error);
1067 1067 }
1068 1068
1069 1069 *vpp = TNTOV(self);
1070 1070
1071 1071 if (!error && IS_DEVVP(*vpp)) {
1072 1072 struct vnode *newvp;
1073 1073
1074 1074 newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type, cred);
1075 1075 VN_RELE(*vpp);
1076 1076 if (newvp == NULL)
1077 1077 return (ENOSYS);
1078 1078 *vpp = newvp;
1079 1079 }
1080 1080 TRACE_3(TR_FAC_TMPFS, TR_TMPFS_CREATE,
1081 1081 "tmpfs create:dvp %p nm %s vpp %p", dvp, nm, vpp);
1082 1082 return (0);
1083 1083 }
1084 1084
1085 1085 /* ARGSUSED3 */
1086 1086 static int
1087 1087 tmp_remove(
1088 1088 struct vnode *dvp,
1089 1089 char *nm,
1090 1090 struct cred *cred,
1091 1091 caller_context_t *ct,
1092 1092 int flags)
1093 1093 {
1094 1094 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1095 1095 int error;
1096 1096 struct tmpnode *tp = NULL;
1097 1097
↓ open down ↓ |
1097 lines elided |
↑ open up ↑ |
1098 1098 error = tdirlookup(parent, nm, &tp, cred);
1099 1099 if (error)
1100 1100 return (error);
1101 1101
1102 1102 ASSERT(tp);
1103 1103 rw_enter(&parent->tn_rwlock, RW_WRITER);
1104 1104 rw_enter(&tp->tn_rwlock, RW_WRITER);
1105 1105
1106 1106 if (tp->tn_type != VDIR ||
1107 1107 (error = secpolicy_fs_linkdir(cred, dvp->v_vfsp)) == 0)
1108 - error = tdirdelete(parent, tp, nm, tp->tn_type == VDIR ?
1109 - DR_RMDIR : DR_REMOVE, cred);
1108 + error = tdirdelete(parent, tp, nm, DR_REMOVE, cred);
1110 1109
1111 1110 rw_exit(&tp->tn_rwlock);
1112 1111 rw_exit(&parent->tn_rwlock);
1113 1112 vnevent_remove(TNTOV(tp), dvp, nm, ct);
1114 1113 tmpnode_rele(tp);
1115 1114
1116 1115 TRACE_3(TR_FAC_TMPFS, TR_TMPFS_REMOVE,
1117 1116 "tmpfs remove:dvp %p nm %s error %d", dvp, nm, error);
1118 1117 return (error);
1119 1118 }
1120 1119
1121 1120 /* ARGSUSED4 */
1122 1121 static int
1123 1122 tmp_link(
1124 1123 struct vnode *dvp,
1125 1124 struct vnode *srcvp,
1126 1125 char *tnm,
1127 1126 struct cred *cred,
1128 1127 caller_context_t *ct,
1129 1128 int flags)
1130 1129 {
1131 1130 struct tmpnode *parent;
1132 1131 struct tmpnode *from;
1133 1132 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1134 1133 int error;
1135 1134 struct tmpnode *found = NULL;
1136 1135 struct vnode *realvp;
1137 1136
1138 1137 if (VOP_REALVP(srcvp, &realvp, ct) == 0)
1139 1138 srcvp = realvp;
1140 1139
1141 1140 parent = (struct tmpnode *)VTOTN(dvp);
1142 1141 from = (struct tmpnode *)VTOTN(srcvp);
1143 1142
1144 1143 if ((srcvp->v_type == VDIR &&
1145 1144 secpolicy_fs_linkdir(cred, dvp->v_vfsp)) ||
1146 1145 (from->tn_uid != crgetuid(cred) && secpolicy_basic_link(cred)))
1147 1146 return (EPERM);
1148 1147
1149 1148 /*
1150 1149 * Make sure link for extended attributes is valid
1151 1150 * We only support hard linking of xattr's in xattrdir to an xattrdir
1152 1151 */
1153 1152 if ((from->tn_flags & ISXATTR) != (parent->tn_flags & ISXATTR))
1154 1153 return (EINVAL);
1155 1154
1156 1155 error = tdirlookup(parent, tnm, &found, cred);
1157 1156 if (error == 0) {
1158 1157 ASSERT(found);
1159 1158 tmpnode_rele(found);
1160 1159 return (EEXIST);
1161 1160 }
1162 1161
1163 1162 if (error != ENOENT)
1164 1163 return (error);
1165 1164
1166 1165 rw_enter(&parent->tn_rwlock, RW_WRITER);
1167 1166 error = tdirenter(tm, parent, tnm, DE_LINK, (struct tmpnode *)NULL,
1168 1167 from, NULL, (struct tmpnode **)NULL, cred, ct);
1169 1168 rw_exit(&parent->tn_rwlock);
1170 1169 if (error == 0) {
1171 1170 vnevent_link(srcvp, ct);
1172 1171 }
1173 1172 return (error);
1174 1173 }
1175 1174
1176 1175 /* ARGSUSED5 */
1177 1176 static int
1178 1177 tmp_rename(
1179 1178 struct vnode *odvp, /* source parent vnode */
1180 1179 char *onm, /* source name */
1181 1180 struct vnode *ndvp, /* destination parent vnode */
1182 1181 char *nnm, /* destination name */
1183 1182 struct cred *cred,
1184 1183 caller_context_t *ct,
1185 1184 int flags)
1186 1185 {
1187 1186 struct tmpnode *fromparent;
1188 1187 struct tmpnode *toparent;
1189 1188 struct tmpnode *fromtp = NULL; /* source tmpnode */
1190 1189 struct tmpnode *totp; /* target tmpnode */
1191 1190 struct tmount *tm = (struct tmount *)VTOTM(odvp);
1192 1191 int error;
1193 1192 int samedir = 0; /* set if odvp == ndvp */
1194 1193 struct vnode *realvp;
1195 1194
1196 1195 if (VOP_REALVP(ndvp, &realvp, ct) == 0)
1197 1196 ndvp = realvp;
1198 1197
1199 1198 fromparent = (struct tmpnode *)VTOTN(odvp);
1200 1199 toparent = (struct tmpnode *)VTOTN(ndvp);
1201 1200
1202 1201 if ((fromparent->tn_flags & ISXATTR) != (toparent->tn_flags & ISXATTR))
1203 1202 return (EINVAL);
1204 1203
1205 1204 mutex_enter(&tm->tm_renamelck);
1206 1205
1207 1206 /*
1208 1207 * Look up tmpnode of file we're supposed to rename.
1209 1208 */
1210 1209 error = tdirlookup(fromparent, onm, &fromtp, cred);
1211 1210 if (error) {
1212 1211 mutex_exit(&tm->tm_renamelck);
1213 1212 return (error);
1214 1213 }
1215 1214
1216 1215 /*
1217 1216 * Make sure we can delete the old (source) entry. This
1218 1217 * requires write permission on the containing directory. If
1219 1218 * that directory is "sticky" it requires further checks.
1220 1219 */
1221 1220 if (((error = tmp_taccess(fromparent, VWRITE, cred)) != 0) ||
1222 1221 (error = tmp_sticky_remove_access(fromparent, fromtp, cred)) != 0)
1223 1222 goto done;
1224 1223
1225 1224 /*
1226 1225 * Check for renaming to or from '.' or '..' or that
1227 1226 * fromtp == fromparent
1228 1227 */
1229 1228 if ((onm[0] == '.' &&
1230 1229 (onm[1] == '\0' || (onm[1] == '.' && onm[2] == '\0'))) ||
1231 1230 (nnm[0] == '.' &&
1232 1231 (nnm[1] == '\0' || (nnm[1] == '.' && nnm[2] == '\0'))) ||
1233 1232 (fromparent == fromtp)) {
1234 1233 error = EINVAL;
1235 1234 goto done;
1236 1235 }
1237 1236
1238 1237 samedir = (fromparent == toparent);
1239 1238 /*
1240 1239 * Make sure we can search and rename into the new
1241 1240 * (destination) directory.
1242 1241 */
1243 1242 if (!samedir) {
1244 1243 error = tmp_taccess(toparent, VEXEC|VWRITE, cred);
1245 1244 if (error)
1246 1245 goto done;
1247 1246 }
1248 1247
1249 1248 if (tdirlookup(toparent, nnm, &totp, cred) == 0) {
1250 1249 vnevent_pre_rename_dest(TNTOV(totp), ndvp, nnm, ct);
1251 1250 tmpnode_rele(totp);
1252 1251 }
1253 1252
1254 1253 /* Notify the target dir. if not the same as the source dir. */
1255 1254 if (ndvp != odvp) {
1256 1255 vnevent_pre_rename_dest_dir(ndvp, TNTOV(fromtp), nnm, ct);
1257 1256 }
1258 1257
1259 1258 vnevent_pre_rename_src(TNTOV(fromtp), odvp, onm, ct);
1260 1259
1261 1260 /*
1262 1261 * Link source to new target
1263 1262 */
1264 1263 rw_enter(&toparent->tn_rwlock, RW_WRITER);
1265 1264 error = tdirenter(tm, toparent, nnm, DE_RENAME,
1266 1265 fromparent, fromtp, (struct vattr *)NULL,
1267 1266 (struct tmpnode **)NULL, cred, ct);
1268 1267 rw_exit(&toparent->tn_rwlock);
1269 1268
1270 1269 if (error) {
1271 1270 /*
1272 1271 * ESAME isn't really an error; it indicates that the
1273 1272 * operation should not be done because the source and target
1274 1273 * are the same file, but that no error should be reported.
1275 1274 */
1276 1275 if (error == ESAME)
1277 1276 error = 0;
1278 1277 goto done;
1279 1278 }
1280 1279
1281 1280 /*
1282 1281 * Unlink from source.
1283 1282 */
1284 1283 rw_enter(&fromparent->tn_rwlock, RW_WRITER);
1285 1284 rw_enter(&fromtp->tn_rwlock, RW_WRITER);
1286 1285
1287 1286 error = tdirdelete(fromparent, fromtp, onm, DR_RENAME, cred);
1288 1287
1289 1288 /*
1290 1289 * The following handles the case where our source tmpnode was
1291 1290 * removed before we got to it.
1292 1291 *
1293 1292 * XXX We should also cleanup properly in the case where tdirdelete
1294 1293 * fails for some other reason. Currently this case shouldn't happen.
1295 1294 * (see 1184991).
1296 1295 */
1297 1296 if (error == ENOENT)
1298 1297 error = 0;
1299 1298
1300 1299 rw_exit(&fromtp->tn_rwlock);
1301 1300 rw_exit(&fromparent->tn_rwlock);
1302 1301
1303 1302 if (error == 0) {
1304 1303 vnevent_rename_src(TNTOV(fromtp), odvp, onm, ct);
1305 1304 /*
1306 1305 * vnevent_rename_dest is called in tdirenter().
1307 1306 * Notify the target dir if not same as source dir.
1308 1307 */
1309 1308 if (ndvp != odvp)
1310 1309 vnevent_rename_dest_dir(ndvp, ct);
1311 1310 }
1312 1311
1313 1312 done:
1314 1313 tmpnode_rele(fromtp);
1315 1314 mutex_exit(&tm->tm_renamelck);
1316 1315
1317 1316 TRACE_5(TR_FAC_TMPFS, TR_TMPFS_RENAME,
1318 1317 "tmpfs rename:ovp %p onm %s nvp %p nnm %s error %d", odvp, onm,
1319 1318 ndvp, nnm, error);
1320 1319 return (error);
1321 1320 }
1322 1321
1323 1322 /* ARGSUSED5 */
1324 1323 static int
1325 1324 tmp_mkdir(
1326 1325 struct vnode *dvp,
1327 1326 char *nm,
1328 1327 struct vattr *va,
1329 1328 struct vnode **vpp,
1330 1329 struct cred *cred,
1331 1330 caller_context_t *ct,
1332 1331 int flags,
1333 1332 vsecattr_t *vsecp)
1334 1333 {
1335 1334 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1336 1335 struct tmpnode *self = NULL;
1337 1336 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1338 1337 int error;
1339 1338
1340 1339 /* no new dirs allowed in xattr dirs */
1341 1340 if (parent->tn_flags & ISXATTR)
1342 1341 return (EINVAL);
1343 1342
1344 1343 /*
1345 1344 * Might be dangling directory. Catch it here,
1346 1345 * because a ENOENT return from tdirlookup() is
1347 1346 * an "o.k. return".
1348 1347 */
1349 1348 if (parent->tn_nlink == 0)
1350 1349 return (ENOENT);
1351 1350
1352 1351 error = tdirlookup(parent, nm, &self, cred);
1353 1352 if (error == 0) {
1354 1353 ASSERT(self);
1355 1354 tmpnode_rele(self);
1356 1355 return (EEXIST);
1357 1356 }
1358 1357 if (error != ENOENT)
1359 1358 return (error);
1360 1359
1361 1360 rw_enter(&parent->tn_rwlock, RW_WRITER);
1362 1361 error = tdirenter(tm, parent, nm, DE_MKDIR, (struct tmpnode *)NULL,
1363 1362 (struct tmpnode *)NULL, va, &self, cred, ct);
1364 1363 if (error) {
1365 1364 rw_exit(&parent->tn_rwlock);
1366 1365 if (self)
1367 1366 tmpnode_rele(self);
1368 1367 return (error);
1369 1368 }
1370 1369 rw_exit(&parent->tn_rwlock);
1371 1370 *vpp = TNTOV(self);
1372 1371 return (0);
1373 1372 }
1374 1373
1375 1374 /* ARGSUSED4 */
1376 1375 static int
1377 1376 tmp_rmdir(
1378 1377 struct vnode *dvp,
1379 1378 char *nm,
1380 1379 struct vnode *cdir,
1381 1380 struct cred *cred,
1382 1381 caller_context_t *ct,
1383 1382 int flags)
1384 1383 {
1385 1384 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1386 1385 struct tmpnode *self = NULL;
1387 1386 struct vnode *vp;
1388 1387 int error = 0;
1389 1388
1390 1389 /*
1391 1390 * Return error when removing . and ..
1392 1391 */
1393 1392 if (strcmp(nm, ".") == 0)
1394 1393 return (EINVAL);
1395 1394 if (strcmp(nm, "..") == 0)
1396 1395 return (EEXIST); /* Should be ENOTEMPTY */
1397 1396 error = tdirlookup(parent, nm, &self, cred);
1398 1397 if (error)
1399 1398 return (error);
1400 1399
1401 1400 rw_enter(&parent->tn_rwlock, RW_WRITER);
1402 1401 rw_enter(&self->tn_rwlock, RW_WRITER);
1403 1402
1404 1403 vp = TNTOV(self);
1405 1404 if (vp == dvp || vp == cdir) {
1406 1405 error = EINVAL;
1407 1406 goto done1;
1408 1407 }
1409 1408 if (self->tn_type != VDIR) {
1410 1409 error = ENOTDIR;
1411 1410 goto done1;
1412 1411 }
1413 1412
1414 1413 mutex_enter(&self->tn_tlock);
1415 1414 if (self->tn_nlink > 2) {
1416 1415 mutex_exit(&self->tn_tlock);
1417 1416 error = EEXIST;
1418 1417 goto done1;
1419 1418 }
1420 1419 mutex_exit(&self->tn_tlock);
1421 1420
1422 1421 if (vn_vfswlock(vp)) {
1423 1422 error = EBUSY;
1424 1423 goto done1;
1425 1424 }
1426 1425 if (vn_mountedvfs(vp) != NULL) {
1427 1426 error = EBUSY;
1428 1427 goto done;
1429 1428 }
1430 1429
1431 1430 /*
1432 1431 * Check for an empty directory
1433 1432 * i.e. only includes entries for "." and ".."
1434 1433 */
1435 1434 if (self->tn_dirents > 2) {
1436 1435 error = EEXIST; /* SIGH should be ENOTEMPTY */
1437 1436 /*
1438 1437 * Update atime because checking tn_dirents is logically
1439 1438 * equivalent to reading the directory
1440 1439 */
1441 1440 gethrestime(&self->tn_atime);
1442 1441 goto done;
1443 1442 }
1444 1443
1445 1444 error = tdirdelete(parent, self, nm, DR_RMDIR, cred);
1446 1445 done:
1447 1446 vn_vfsunlock(vp);
1448 1447 done1:
1449 1448 rw_exit(&self->tn_rwlock);
1450 1449 rw_exit(&parent->tn_rwlock);
1451 1450 vnevent_rmdir(TNTOV(self), dvp, nm, ct);
1452 1451 tmpnode_rele(self);
1453 1452
1454 1453 return (error);
1455 1454 }
1456 1455
1457 1456 /* ARGSUSED2 */
1458 1457 static int
1459 1458 tmp_readdir(
1460 1459 struct vnode *vp,
1461 1460 struct uio *uiop,
1462 1461 struct cred *cred,
1463 1462 int *eofp,
1464 1463 caller_context_t *ct,
1465 1464 int flags)
1466 1465 {
1467 1466 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1468 1467 struct tdirent *tdp;
1469 1468 int error = 0;
1470 1469 size_t namelen;
1471 1470 struct dirent64 *dp;
1472 1471 ulong_t offset;
1473 1472 ulong_t total_bytes_wanted;
1474 1473 long outcount = 0;
1475 1474 long bufsize;
1476 1475 int reclen;
1477 1476 caddr_t outbuf;
1478 1477
1479 1478 if (uiop->uio_loffset >= MAXOFF_T) {
1480 1479 if (eofp)
1481 1480 *eofp = 1;
1482 1481 return (0);
1483 1482 }
1484 1483 /*
1485 1484 * assuming system call has already called tmp_rwlock
1486 1485 */
1487 1486 ASSERT(RW_READ_HELD(&tp->tn_rwlock));
1488 1487
1489 1488 if (uiop->uio_iovcnt != 1)
1490 1489 return (EINVAL);
1491 1490
1492 1491 if (vp->v_type != VDIR)
1493 1492 return (ENOTDIR);
1494 1493
1495 1494 /*
1496 1495 * There's a window here where someone could have removed
1497 1496 * all the entries in the directory after we put a hold on the
1498 1497 * vnode but before we grabbed the rwlock. Just return.
1499 1498 */
1500 1499 if (tp->tn_dir == NULL) {
1501 1500 if (tp->tn_nlink) {
1502 1501 panic("empty directory 0x%p", (void *)tp);
1503 1502 /*NOTREACHED*/
1504 1503 }
1505 1504 return (0);
1506 1505 }
1507 1506
1508 1507 /*
1509 1508 * Get space for multiple directory entries
1510 1509 */
1511 1510 total_bytes_wanted = uiop->uio_iov->iov_len;
1512 1511 bufsize = total_bytes_wanted + sizeof (struct dirent64);
1513 1512 outbuf = kmem_alloc(bufsize, KM_SLEEP);
1514 1513
1515 1514 dp = (struct dirent64 *)outbuf;
1516 1515
1517 1516
1518 1517 offset = 0;
1519 1518 tdp = tp->tn_dir;
1520 1519 while (tdp) {
1521 1520 namelen = strlen(tdp->td_name); /* no +1 needed */
1522 1521 offset = tdp->td_offset;
1523 1522 if (offset >= uiop->uio_offset) {
1524 1523 reclen = (int)DIRENT64_RECLEN(namelen);
1525 1524 if (outcount + reclen > total_bytes_wanted) {
1526 1525 if (!outcount)
1527 1526 /*
1528 1527 * Buffer too small for any entries.
1529 1528 */
1530 1529 error = EINVAL;
1531 1530 break;
1532 1531 }
1533 1532 ASSERT(tdp->td_tmpnode != NULL);
1534 1533
1535 1534 /* use strncpy(9f) to zero out uninitialized bytes */
1536 1535
1537 1536 (void) strncpy(dp->d_name, tdp->td_name,
1538 1537 DIRENT64_NAMELEN(reclen));
1539 1538 dp->d_reclen = (ushort_t)reclen;
1540 1539 dp->d_ino = (ino64_t)tdp->td_tmpnode->tn_nodeid;
1541 1540 dp->d_off = (offset_t)tdp->td_offset + 1;
1542 1541 dp = (struct dirent64 *)
1543 1542 ((uintptr_t)dp + dp->d_reclen);
1544 1543 outcount += reclen;
1545 1544 ASSERT(outcount <= bufsize);
1546 1545 }
1547 1546 tdp = tdp->td_next;
1548 1547 }
1549 1548
1550 1549 if (!error)
1551 1550 error = uiomove(outbuf, outcount, UIO_READ, uiop);
1552 1551
1553 1552 if (!error) {
1554 1553 /* If we reached the end of the list our offset */
1555 1554 /* should now be just past the end. */
1556 1555 if (!tdp) {
1557 1556 offset += 1;
1558 1557 if (eofp)
1559 1558 *eofp = 1;
1560 1559 } else if (eofp)
1561 1560 *eofp = 0;
1562 1561 uiop->uio_offset = offset;
1563 1562 }
1564 1563 gethrestime(&tp->tn_atime);
1565 1564 kmem_free(outbuf, bufsize);
1566 1565 return (error);
1567 1566 }
1568 1567
1569 1568 /* ARGSUSED5 */
1570 1569 static int
1571 1570 tmp_symlink(
1572 1571 struct vnode *dvp,
1573 1572 char *lnm,
1574 1573 struct vattr *tva,
1575 1574 char *tnm,
1576 1575 struct cred *cred,
1577 1576 caller_context_t *ct,
1578 1577 int flags)
1579 1578 {
1580 1579 struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1581 1580 struct tmpnode *self = (struct tmpnode *)NULL;
1582 1581 struct tmount *tm = (struct tmount *)VTOTM(dvp);
1583 1582 char *cp = NULL;
1584 1583 int error;
1585 1584 size_t len;
1586 1585
1587 1586 /* no symlinks allowed to files in xattr dirs */
1588 1587 if (parent->tn_flags & ISXATTR)
1589 1588 return (EINVAL);
1590 1589
1591 1590 error = tdirlookup(parent, lnm, &self, cred);
1592 1591 if (error == 0) {
1593 1592 /*
1594 1593 * The entry already exists
1595 1594 */
1596 1595 tmpnode_rele(self);
1597 1596 return (EEXIST); /* was 0 */
1598 1597 }
1599 1598
1600 1599 if (error != ENOENT) {
1601 1600 if (self != NULL)
1602 1601 tmpnode_rele(self);
1603 1602 return (error);
1604 1603 }
1605 1604
1606 1605 rw_enter(&parent->tn_rwlock, RW_WRITER);
1607 1606 error = tdirenter(tm, parent, lnm, DE_CREATE, (struct tmpnode *)NULL,
1608 1607 (struct tmpnode *)NULL, tva, &self, cred, ct);
1609 1608 rw_exit(&parent->tn_rwlock);
1610 1609
1611 1610 if (error) {
1612 1611 if (self)
1613 1612 tmpnode_rele(self);
1614 1613 return (error);
1615 1614 }
1616 1615 len = strlen(tnm) + 1;
1617 1616 cp = tmp_memalloc(len, 0);
1618 1617 if (cp == NULL) {
1619 1618 tmpnode_rele(self);
1620 1619 return (ENOSPC);
1621 1620 }
1622 1621 (void) strcpy(cp, tnm);
1623 1622
1624 1623 self->tn_symlink = cp;
1625 1624 self->tn_size = len - 1;
1626 1625 tmpnode_rele(self);
1627 1626 return (error);
1628 1627 }
1629 1628
1630 1629 /* ARGSUSED2 */
1631 1630 static int
1632 1631 tmp_readlink(
1633 1632 struct vnode *vp,
1634 1633 struct uio *uiop,
1635 1634 struct cred *cred,
1636 1635 caller_context_t *ct)
1637 1636 {
1638 1637 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1639 1638 int error = 0;
1640 1639
1641 1640 if (vp->v_type != VLNK)
1642 1641 return (EINVAL);
1643 1642
1644 1643 rw_enter(&tp->tn_rwlock, RW_READER);
1645 1644 rw_enter(&tp->tn_contents, RW_READER);
1646 1645 error = uiomove(tp->tn_symlink, tp->tn_size, UIO_READ, uiop);
1647 1646 gethrestime(&tp->tn_atime);
1648 1647 rw_exit(&tp->tn_contents);
1649 1648 rw_exit(&tp->tn_rwlock);
1650 1649 return (error);
1651 1650 }
1652 1651
1653 1652 /* ARGSUSED */
1654 1653 static int
1655 1654 tmp_fsync(
1656 1655 struct vnode *vp,
1657 1656 int syncflag,
1658 1657 struct cred *cred,
1659 1658 caller_context_t *ct)
1660 1659 {
1661 1660 return (0);
1662 1661 }
1663 1662
1664 1663 /* ARGSUSED */
1665 1664 static void
1666 1665 tmp_inactive(struct vnode *vp, struct cred *cred, caller_context_t *ct)
1667 1666 {
1668 1667 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1669 1668 struct tmount *tm = (struct tmount *)VFSTOTM(vp->v_vfsp);
1670 1669
1671 1670 rw_enter(&tp->tn_rwlock, RW_WRITER);
1672 1671 top:
1673 1672 mutex_enter(&tp->tn_tlock);
1674 1673 mutex_enter(&vp->v_lock);
1675 1674 ASSERT(vp->v_count >= 1);
1676 1675
1677 1676 /*
1678 1677 * If we don't have the last hold or the link count is non-zero,
1679 1678 * there's little to do -- just drop our hold.
1680 1679 */
1681 1680 if (vp->v_count > 1 || tp->tn_nlink != 0) {
1682 1681 vp->v_count--;
1683 1682 mutex_exit(&vp->v_lock);
1684 1683 mutex_exit(&tp->tn_tlock);
1685 1684 rw_exit(&tp->tn_rwlock);
1686 1685 return;
1687 1686 }
1688 1687
1689 1688 /*
1690 1689 * We have the last hold *and* the link count is zero, so this
1691 1690 * tmpnode is dead from the filesystem's viewpoint. However,
1692 1691 * if the tmpnode has any pages associated with it (i.e. if it's
1693 1692 * a normal file with non-zero size), the tmpnode can still be
1694 1693 * discovered by pageout or fsflush via the page vnode pointers.
1695 1694 * In this case we must drop all our locks, truncate the tmpnode,
1696 1695 * and try the whole dance again.
1697 1696 */
1698 1697 if (tp->tn_size != 0) {
1699 1698 if (tp->tn_type == VREG) {
1700 1699 mutex_exit(&vp->v_lock);
1701 1700 mutex_exit(&tp->tn_tlock);
1702 1701 rw_enter(&tp->tn_contents, RW_WRITER);
1703 1702 (void) tmpnode_trunc(tm, tp, 0);
1704 1703 rw_exit(&tp->tn_contents);
1705 1704 ASSERT(tp->tn_size == 0);
1706 1705 ASSERT(tp->tn_nblocks == 0);
1707 1706 goto top;
1708 1707 }
1709 1708 if (tp->tn_type == VLNK)
1710 1709 tmp_memfree(tp->tn_symlink, tp->tn_size + 1);
1711 1710 }
1712 1711
1713 1712 /*
1714 1713 * Remove normal file/dir's xattr dir and xattrs.
1715 1714 */
1716 1715 if (tp->tn_xattrdp) {
1717 1716 struct tmpnode *xtp = tp->tn_xattrdp;
1718 1717
1719 1718 ASSERT(xtp->tn_flags & ISXATTR);
1720 1719 tmpnode_hold(xtp);
1721 1720 rw_enter(&xtp->tn_rwlock, RW_WRITER);
1722 1721 tdirtrunc(xtp);
1723 1722 DECR_COUNT(&xtp->tn_nlink, &xtp->tn_tlock);
1724 1723 tp->tn_xattrdp = NULL;
1725 1724 rw_exit(&xtp->tn_rwlock);
1726 1725 tmpnode_rele(xtp);
1727 1726 }
1728 1727
1729 1728 mutex_exit(&vp->v_lock);
1730 1729 mutex_exit(&tp->tn_tlock);
1731 1730 /* Here's our chance to send invalid event while we're between locks */
1732 1731 vn_invalid(TNTOV(tp));
1733 1732 mutex_enter(&tm->tm_contents);
1734 1733 if (tp->tn_forw == NULL)
1735 1734 tm->tm_rootnode->tn_back = tp->tn_back;
1736 1735 else
1737 1736 tp->tn_forw->tn_back = tp->tn_back;
1738 1737 tp->tn_back->tn_forw = tp->tn_forw;
1739 1738 mutex_exit(&tm->tm_contents);
1740 1739 rw_exit(&tp->tn_rwlock);
1741 1740 rw_destroy(&tp->tn_rwlock);
1742 1741 mutex_destroy(&tp->tn_tlock);
1743 1742 vn_free(TNTOV(tp));
1744 1743 tmp_memfree(tp, sizeof (struct tmpnode));
1745 1744 }
1746 1745
1747 1746 /* ARGSUSED2 */
1748 1747 static int
1749 1748 tmp_fid(struct vnode *vp, struct fid *fidp, caller_context_t *ct)
1750 1749 {
1751 1750 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1752 1751 struct tfid *tfid;
1753 1752
1754 1753 if (fidp->fid_len < (sizeof (struct tfid) - sizeof (ushort_t))) {
1755 1754 fidp->fid_len = sizeof (struct tfid) - sizeof (ushort_t);
1756 1755 return (ENOSPC);
1757 1756 }
1758 1757
1759 1758 tfid = (struct tfid *)fidp;
1760 1759 bzero(tfid, sizeof (struct tfid));
1761 1760 tfid->tfid_len = (int)sizeof (struct tfid) - sizeof (ushort_t);
1762 1761
1763 1762 tfid->tfid_ino = tp->tn_nodeid;
1764 1763 tfid->tfid_gen = tp->tn_gen;
1765 1764
1766 1765 return (0);
1767 1766 }
1768 1767
1769 1768
1770 1769 /*
1771 1770 * Return all the pages from [off..off+len] in given file
1772 1771 */
1773 1772 /* ARGSUSED */
1774 1773 static int
1775 1774 tmp_getpage(
1776 1775 struct vnode *vp,
1777 1776 offset_t off,
1778 1777 size_t len,
1779 1778 uint_t *protp,
1780 1779 page_t *pl[],
1781 1780 size_t plsz,
1782 1781 struct seg *seg,
1783 1782 caddr_t addr,
1784 1783 enum seg_rw rw,
1785 1784 struct cred *cr,
1786 1785 caller_context_t *ct)
1787 1786 {
1788 1787 int err = 0;
1789 1788 struct tmpnode *tp = VTOTN(vp);
1790 1789 anoff_t toff = (anoff_t)off;
1791 1790 size_t tlen = len;
1792 1791 u_offset_t tmpoff;
1793 1792 timestruc_t now;
1794 1793
1795 1794 rw_enter(&tp->tn_contents, RW_READER);
1796 1795
1797 1796 if (off + len > tp->tn_size + PAGEOFFSET) {
1798 1797 err = EFAULT;
1799 1798 goto out;
1800 1799 }
1801 1800 /*
1802 1801 * Look for holes (no anon slot) in faulting range. If there are
1803 1802 * holes we have to switch to a write lock and fill them in. Swap
1804 1803 * space for holes was already reserved when the file was grown.
1805 1804 */
1806 1805 tmpoff = toff;
1807 1806 if (non_anon(tp->tn_anon, btop(off), &tmpoff, &tlen)) {
1808 1807 if (!rw_tryupgrade(&tp->tn_contents)) {
1809 1808 rw_exit(&tp->tn_contents);
1810 1809 rw_enter(&tp->tn_contents, RW_WRITER);
1811 1810 /* Size may have changed when lock was dropped */
1812 1811 if (off + len > tp->tn_size + PAGEOFFSET) {
1813 1812 err = EFAULT;
1814 1813 goto out;
1815 1814 }
1816 1815 }
1817 1816 for (toff = (anoff_t)off; toff < (anoff_t)off + len;
1818 1817 toff += PAGESIZE) {
1819 1818 if (anon_get_ptr(tp->tn_anon, btop(toff)) == NULL) {
1820 1819 /* XXX - may allocate mem w. write lock held */
1821 1820 (void) anon_set_ptr(tp->tn_anon, btop(toff),
1822 1821 anon_alloc(vp, toff), ANON_SLEEP);
1823 1822 tp->tn_nblocks++;
1824 1823 }
1825 1824 }
1826 1825 rw_downgrade(&tp->tn_contents);
1827 1826 }
1828 1827
1829 1828
1830 1829 err = pvn_getpages(tmp_getapage, vp, (u_offset_t)off, len, protp,
1831 1830 pl, plsz, seg, addr, rw, cr);
1832 1831
1833 1832 gethrestime(&now);
1834 1833 tp->tn_atime = now;
1835 1834 if (rw == S_WRITE)
1836 1835 tp->tn_mtime = now;
1837 1836
1838 1837 out:
1839 1838 rw_exit(&tp->tn_contents);
1840 1839 return (err);
1841 1840 }
1842 1841
1843 1842 /*
1844 1843 * Called from pvn_getpages to get a particular page.
1845 1844 */
1846 1845 /*ARGSUSED*/
1847 1846 static int
1848 1847 tmp_getapage(
1849 1848 struct vnode *vp,
1850 1849 u_offset_t off,
1851 1850 size_t len,
1852 1851 uint_t *protp,
1853 1852 page_t *pl[],
1854 1853 size_t plsz,
1855 1854 struct seg *seg,
1856 1855 caddr_t addr,
1857 1856 enum seg_rw rw,
1858 1857 struct cred *cr)
1859 1858 {
1860 1859 struct page *pp;
1861 1860 int flags;
1862 1861 int err = 0;
1863 1862 struct vnode *pvp;
1864 1863 u_offset_t poff;
1865 1864
1866 1865 if (protp != NULL)
1867 1866 *protp = PROT_ALL;
1868 1867 again:
1869 1868 if (pp = page_lookup(vp, off, rw == S_CREATE ? SE_EXCL : SE_SHARED)) {
1870 1869 if (pl) {
1871 1870 pl[0] = pp;
1872 1871 pl[1] = NULL;
1873 1872 } else {
1874 1873 page_unlock(pp);
1875 1874 }
1876 1875 } else {
1877 1876 pp = page_create_va(vp, off, PAGESIZE,
1878 1877 PG_WAIT | PG_EXCL, seg, addr);
1879 1878 /*
1880 1879 * Someone raced in and created the page after we did the
1881 1880 * lookup but before we did the create, so go back and
1882 1881 * try to look it up again.
1883 1882 */
1884 1883 if (pp == NULL)
1885 1884 goto again;
1886 1885 /*
1887 1886 * Fill page from backing store, if any. If none, then
1888 1887 * either this is a newly filled hole or page must have
1889 1888 * been unmodified and freed so just zero it out.
1890 1889 */
1891 1890 err = swap_getphysname(vp, off, &pvp, &poff);
1892 1891 if (err) {
1893 1892 panic("tmp_getapage: no anon slot vp %p "
1894 1893 "off %llx pp %p\n", (void *)vp, off, (void *)pp);
1895 1894 }
1896 1895 if (pvp) {
1897 1896 flags = (pl == NULL ? B_ASYNC|B_READ : B_READ);
1898 1897 err = VOP_PAGEIO(pvp, pp, (u_offset_t)poff, PAGESIZE,
1899 1898 flags, cr, NULL);
1900 1899 if (flags & B_ASYNC)
1901 1900 pp = NULL;
1902 1901 } else if (rw != S_CREATE) {
1903 1902 pagezero(pp, 0, PAGESIZE);
1904 1903 }
1905 1904 if (err && pp)
1906 1905 pvn_read_done(pp, B_ERROR);
1907 1906 if (err == 0) {
1908 1907 if (pl)
1909 1908 pvn_plist_init(pp, pl, plsz, off, PAGESIZE, rw);
1910 1909 else
1911 1910 pvn_io_done(pp);
1912 1911 }
1913 1912 }
1914 1913 return (err);
1915 1914 }
1916 1915
1917 1916
1918 1917 /*
1919 1918 * Flags are composed of {B_INVAL, B_DIRTY B_FREE, B_DONTNEED}.
1920 1919 * If len == 0, do from off to EOF.
1921 1920 */
1922 1921 static int tmp_nopage = 0; /* Don't do tmp_putpage's if set */
1923 1922
1924 1923 /* ARGSUSED */
1925 1924 int
1926 1925 tmp_putpage(
1927 1926 register struct vnode *vp,
1928 1927 offset_t off,
1929 1928 size_t len,
1930 1929 int flags,
1931 1930 struct cred *cr,
1932 1931 caller_context_t *ct)
1933 1932 {
1934 1933 register page_t *pp;
1935 1934 u_offset_t io_off;
1936 1935 size_t io_len = 0;
1937 1936 int err = 0;
1938 1937 struct tmpnode *tp = VTOTN(vp);
1939 1938 int dolock;
1940 1939
1941 1940 if (tmp_nopage)
1942 1941 return (0);
1943 1942
1944 1943 ASSERT(vp->v_count != 0);
1945 1944
1946 1945 if (vp->v_flag & VNOMAP)
1947 1946 return (ENOSYS);
1948 1947
1949 1948 /*
1950 1949 * This being tmpfs, we don't ever do i/o unless we really
1951 1950 * have to (when we're low on memory and pageout calls us
1952 1951 * with B_ASYNC | B_FREE or the user explicitly asks for it with
1953 1952 * B_DONTNEED).
1954 1953 * XXX to approximately track the mod time like ufs we should
1955 1954 * update the times here. The problem is, once someone does a
1956 1955 * store we never clear the mod bit and do i/o, thus fsflush
1957 1956 * will keep calling us every 30 seconds to do the i/o and we'll
1958 1957 * continually update the mod time. At least we update the mod
1959 1958 * time on the first store because this results in a call to getpage.
1960 1959 */
1961 1960 if (flags != (B_ASYNC | B_FREE) && (flags & B_INVAL) == 0 &&
1962 1961 (flags & B_DONTNEED) == 0)
1963 1962 return (0);
1964 1963 /*
1965 1964 * If this thread owns the lock, i.e., this thread grabbed it
1966 1965 * as writer somewhere above, then we don't need to grab the
1967 1966 * lock as reader in this routine.
1968 1967 */
1969 1968 dolock = (rw_owner(&tp->tn_contents) != curthread);
1970 1969
1971 1970 /*
1972 1971 * If this is pageout don't block on the lock as you could deadlock
1973 1972 * when freemem == 0 (another thread has the read lock and is blocked
1974 1973 * creating a page, and a third thread is waiting to get the writers
1975 1974 * lock - waiting writers priority blocks us from getting the read
1976 1975 * lock). Of course, if the only freeable pages are on this tmpnode
1977 1976 * we're hosed anyways. A better solution might be a new lock type.
1978 1977 * Note: ufs has the same problem.
1979 1978 */
1980 1979 if (curproc == proc_pageout) {
1981 1980 if (!rw_tryenter(&tp->tn_contents, RW_READER))
1982 1981 return (ENOMEM);
1983 1982 } else if (dolock)
1984 1983 rw_enter(&tp->tn_contents, RW_READER);
1985 1984
1986 1985 if (!vn_has_cached_data(vp))
1987 1986 goto out;
1988 1987
1989 1988 if (len == 0) {
1990 1989 if (curproc == proc_pageout) {
1991 1990 panic("tmp: pageout can't block");
1992 1991 /*NOTREACHED*/
1993 1992 }
1994 1993
1995 1994 /* Search the entire vp list for pages >= off. */
1996 1995 err = pvn_vplist_dirty(vp, (u_offset_t)off, tmp_putapage,
1997 1996 flags, cr);
1998 1997 } else {
1999 1998 u_offset_t eoff;
2000 1999
2001 2000 /*
2002 2001 * Loop over all offsets in the range [off...off + len]
2003 2002 * looking for pages to deal with.
2004 2003 */
2005 2004 eoff = MIN(off + len, tp->tn_size);
2006 2005 for (io_off = off; io_off < eoff; io_off += io_len) {
2007 2006 /*
2008 2007 * If we are not invalidating, synchronously
2009 2008 * freeing or writing pages use the routine
2010 2009 * page_lookup_nowait() to prevent reclaiming
2011 2010 * them from the free list.
2012 2011 */
2013 2012 if ((flags & B_INVAL) || ((flags & B_ASYNC) == 0)) {
2014 2013 pp = page_lookup(vp, io_off,
2015 2014 (flags & (B_INVAL | B_FREE)) ?
2016 2015 SE_EXCL : SE_SHARED);
2017 2016 } else {
2018 2017 pp = page_lookup_nowait(vp, io_off,
2019 2018 (flags & B_FREE) ? SE_EXCL : SE_SHARED);
2020 2019 }
2021 2020
2022 2021 if (pp == NULL || pvn_getdirty(pp, flags) == 0)
2023 2022 io_len = PAGESIZE;
2024 2023 else {
2025 2024 err = tmp_putapage(vp, pp, &io_off, &io_len,
2026 2025 flags, cr);
2027 2026 if (err != 0)
2028 2027 break;
2029 2028 }
2030 2029 }
2031 2030 }
2032 2031 /* If invalidating, verify all pages on vnode list are gone. */
2033 2032 if (err == 0 && off == 0 && len == 0 &&
2034 2033 (flags & B_INVAL) && vn_has_cached_data(vp)) {
2035 2034 panic("tmp_putpage: B_INVAL, pages not gone");
2036 2035 /*NOTREACHED*/
2037 2036 }
2038 2037 out:
2039 2038 if ((curproc == proc_pageout) || dolock)
2040 2039 rw_exit(&tp->tn_contents);
2041 2040 /*
2042 2041 * Only reason putapage is going to give us SE_NOSWAP as error
2043 2042 * is when we ask a page to be written to physical backing store
2044 2043 * and there is none. Ignore this because we might be dealing
2045 2044 * with a swap page which does not have any backing store
2046 2045 * on disk. In any other case we won't get this error over here.
2047 2046 */
2048 2047 if (err == SE_NOSWAP)
2049 2048 err = 0;
2050 2049 return (err);
2051 2050 }
2052 2051
2053 2052 long tmp_putpagecnt, tmp_pagespushed;
2054 2053
2055 2054 /*
2056 2055 * Write out a single page.
2057 2056 * For tmpfs this means choose a physical swap slot and write the page
2058 2057 * out using VOP_PAGEIO. For performance, we attempt to kluster; i.e.,
2059 2058 * we try to find a bunch of other dirty pages adjacent in the file
2060 2059 * and a bunch of contiguous swap slots, and then write all the pages
2061 2060 * out in a single i/o.
2062 2061 */
2063 2062 /*ARGSUSED*/
2064 2063 static int
2065 2064 tmp_putapage(
2066 2065 struct vnode *vp,
2067 2066 page_t *pp,
2068 2067 u_offset_t *offp,
2069 2068 size_t *lenp,
2070 2069 int flags,
2071 2070 struct cred *cr)
2072 2071 {
2073 2072 int err;
2074 2073 ulong_t klstart, kllen;
2075 2074 page_t *pplist, *npplist;
2076 2075 extern int klustsize;
2077 2076 long tmp_klustsize;
2078 2077 struct tmpnode *tp;
2079 2078 size_t pp_off, pp_len;
2080 2079 u_offset_t io_off;
2081 2080 size_t io_len;
2082 2081 struct vnode *pvp;
2083 2082 u_offset_t pstart;
2084 2083 u_offset_t offset;
2085 2084 u_offset_t tmpoff;
2086 2085
2087 2086 ASSERT(PAGE_LOCKED(pp));
2088 2087
2089 2088 /* Kluster in tmp_klustsize chunks */
2090 2089 tp = VTOTN(vp);
2091 2090 tmp_klustsize = klustsize;
2092 2091 offset = pp->p_offset;
2093 2092 klstart = (offset / tmp_klustsize) * tmp_klustsize;
2094 2093 kllen = MIN(tmp_klustsize, tp->tn_size - klstart);
2095 2094
2096 2095 /* Get a kluster of pages */
2097 2096 pplist =
2098 2097 pvn_write_kluster(vp, pp, &tmpoff, &pp_len, klstart, kllen, flags);
2099 2098
2100 2099 pp_off = (size_t)tmpoff;
2101 2100
2102 2101 /*
2103 2102 * Get a cluster of physical offsets for the pages; the amount we
2104 2103 * get may be some subrange of what we ask for (io_off, io_len).
2105 2104 */
2106 2105 io_off = pp_off;
2107 2106 io_len = pp_len;
2108 2107 err = swap_newphysname(vp, offset, &io_off, &io_len, &pvp, &pstart);
2109 2108 ASSERT(err != SE_NOANON); /* anon slot must have been filled */
2110 2109 if (err) {
2111 2110 pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2112 2111 /*
2113 2112 * If this routine is called as a result of segvn_sync
2114 2113 * operation and we have no physical swap then we can get an
2115 2114 * error here. In such case we would return SE_NOSWAP as error.
2116 2115 * At this point, we expect only SE_NOSWAP.
2117 2116 */
2118 2117 ASSERT(err == SE_NOSWAP);
2119 2118 if (flags & B_INVAL)
2120 2119 err = ENOMEM;
2121 2120 goto out;
2122 2121 }
2123 2122 ASSERT(pp_off <= io_off && io_off + io_len <= pp_off + pp_len);
2124 2123 ASSERT(io_off <= offset && offset < io_off + io_len);
2125 2124
2126 2125 /* Toss pages at front/rear that we couldn't get physical backing for */
2127 2126 if (io_off != pp_off) {
2128 2127 npplist = NULL;
2129 2128 page_list_break(&pplist, &npplist, btop(io_off - pp_off));
2130 2129 ASSERT(pplist->p_offset == pp_off);
2131 2130 ASSERT(pplist->p_prev->p_offset == io_off - PAGESIZE);
2132 2131 pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2133 2132 pplist = npplist;
2134 2133 }
2135 2134 if (io_off + io_len < pp_off + pp_len) {
2136 2135 npplist = NULL;
2137 2136 page_list_break(&pplist, &npplist, btop(io_len));
2138 2137 ASSERT(npplist->p_offset == io_off + io_len);
2139 2138 ASSERT(npplist->p_prev->p_offset == pp_off + pp_len - PAGESIZE);
2140 2139 pvn_write_done(npplist, B_ERROR | B_WRITE | flags);
2141 2140 }
2142 2141
2143 2142 ASSERT(pplist->p_offset == io_off);
2144 2143 ASSERT(pplist->p_prev->p_offset == io_off + io_len - PAGESIZE);
2145 2144 ASSERT(btopr(io_len) <= btopr(kllen));
2146 2145
2147 2146 /* Do i/o on the remaining kluster */
2148 2147 err = VOP_PAGEIO(pvp, pplist, (u_offset_t)pstart, io_len,
2149 2148 B_WRITE | flags, cr, NULL);
2150 2149
2151 2150 if ((flags & B_ASYNC) == 0) {
2152 2151 pvn_write_done(pplist, ((err) ? B_ERROR : 0) | B_WRITE | flags);
2153 2152 }
2154 2153 out:
2155 2154 if (!err) {
2156 2155 if (offp)
2157 2156 *offp = io_off;
2158 2157 if (lenp)
2159 2158 *lenp = io_len;
2160 2159 tmp_putpagecnt++;
2161 2160 tmp_pagespushed += btop(io_len);
2162 2161 }
2163 2162 if (err && err != ENOMEM && err != SE_NOSWAP)
2164 2163 cmn_err(CE_WARN, "tmp_putapage: err %d\n", err);
2165 2164 return (err);
2166 2165 }
2167 2166
2168 2167 /* ARGSUSED */
2169 2168 static int
2170 2169 tmp_map(
2171 2170 struct vnode *vp,
2172 2171 offset_t off,
2173 2172 struct as *as,
2174 2173 caddr_t *addrp,
2175 2174 size_t len,
2176 2175 uchar_t prot,
2177 2176 uchar_t maxprot,
2178 2177 uint_t flags,
2179 2178 struct cred *cred,
2180 2179 caller_context_t *ct)
2181 2180 {
2182 2181 struct segvn_crargs vn_a;
2183 2182 struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
2184 2183 int error;
2185 2184
2186 2185 #ifdef _ILP32
2187 2186 if (len > MAXOFF_T)
2188 2187 return (ENOMEM);
2189 2188 #endif
2190 2189
2191 2190 if (vp->v_flag & VNOMAP)
2192 2191 return (ENOSYS);
2193 2192
2194 2193 if (off < 0 || (offset_t)(off + len) < 0 ||
2195 2194 off > MAXOFF_T || (off + len) > MAXOFF_T)
2196 2195 return (ENXIO);
2197 2196
2198 2197 if (vp->v_type != VREG)
2199 2198 return (ENODEV);
2200 2199
2201 2200 /*
2202 2201 * Don't allow mapping to locked file
2203 2202 */
2204 2203 if (vn_has_mandatory_locks(vp, tp->tn_mode)) {
2205 2204 return (EAGAIN);
2206 2205 }
2207 2206
2208 2207 as_rangelock(as);
2209 2208 error = choose_addr(as, addrp, len, off, ADDR_VACALIGN, flags);
2210 2209 if (error != 0) {
2211 2210 as_rangeunlock(as);
2212 2211 return (error);
2213 2212 }
2214 2213
2215 2214 vn_a.vp = vp;
2216 2215 vn_a.offset = (u_offset_t)off;
2217 2216 vn_a.type = flags & MAP_TYPE;
2218 2217 vn_a.prot = prot;
2219 2218 vn_a.maxprot = maxprot;
2220 2219 vn_a.flags = flags & ~MAP_TYPE;
2221 2220 vn_a.cred = cred;
2222 2221 vn_a.amp = NULL;
2223 2222 vn_a.szc = 0;
2224 2223 vn_a.lgrp_mem_policy_flags = 0;
2225 2224
2226 2225 error = as_map(as, *addrp, len, segvn_create, &vn_a);
2227 2226 as_rangeunlock(as);
2228 2227 return (error);
2229 2228 }
2230 2229
2231 2230 /*
2232 2231 * tmp_addmap and tmp_delmap can't be called since the vp
2233 2232 * maintained in the segvn mapping is NULL.
2234 2233 */
2235 2234 /* ARGSUSED */
2236 2235 static int
2237 2236 tmp_addmap(
2238 2237 struct vnode *vp,
2239 2238 offset_t off,
2240 2239 struct as *as,
2241 2240 caddr_t addr,
2242 2241 size_t len,
2243 2242 uchar_t prot,
2244 2243 uchar_t maxprot,
2245 2244 uint_t flags,
2246 2245 struct cred *cred,
2247 2246 caller_context_t *ct)
2248 2247 {
2249 2248 return (0);
2250 2249 }
2251 2250
2252 2251 /* ARGSUSED */
2253 2252 static int
2254 2253 tmp_delmap(
2255 2254 struct vnode *vp,
2256 2255 offset_t off,
2257 2256 struct as *as,
2258 2257 caddr_t addr,
2259 2258 size_t len,
2260 2259 uint_t prot,
2261 2260 uint_t maxprot,
2262 2261 uint_t flags,
2263 2262 struct cred *cred,
2264 2263 caller_context_t *ct)
2265 2264 {
2266 2265 return (0);
2267 2266 }
2268 2267
2269 2268 static int
2270 2269 tmp_freesp(struct vnode *vp, struct flock64 *lp, int flag)
2271 2270 {
2272 2271 register int i;
2273 2272 register struct tmpnode *tp = VTOTN(vp);
2274 2273 int error;
2275 2274
2276 2275 ASSERT(vp->v_type == VREG);
2277 2276 ASSERT(lp->l_start >= 0);
2278 2277
2279 2278 if (lp->l_len != 0)
2280 2279 return (EINVAL);
2281 2280
2282 2281 rw_enter(&tp->tn_rwlock, RW_WRITER);
2283 2282 if (tp->tn_size == lp->l_start) {
2284 2283 rw_exit(&tp->tn_rwlock);
2285 2284 return (0);
2286 2285 }
2287 2286
2288 2287 /*
2289 2288 * Check for any mandatory locks on the range
2290 2289 */
2291 2290 if (MANDLOCK(vp, tp->tn_mode)) {
2292 2291 long save_start;
2293 2292
2294 2293 save_start = lp->l_start;
2295 2294
2296 2295 if (tp->tn_size < lp->l_start) {
2297 2296 /*
2298 2297 * "Truncate up" case: need to make sure there
2299 2298 * is no lock beyond current end-of-file. To
2300 2299 * do so, we need to set l_start to the size
2301 2300 * of the file temporarily.
2302 2301 */
2303 2302 lp->l_start = tp->tn_size;
2304 2303 }
2305 2304 lp->l_type = F_WRLCK;
2306 2305 lp->l_sysid = 0;
2307 2306 lp->l_pid = ttoproc(curthread)->p_pid;
2308 2307 i = (flag & (FNDELAY|FNONBLOCK)) ? 0 : SLPFLCK;
2309 2308 if ((i = reclock(vp, lp, i, 0, lp->l_start, NULL)) != 0 ||
2310 2309 lp->l_type != F_UNLCK) {
2311 2310 rw_exit(&tp->tn_rwlock);
2312 2311 return (i ? i : EAGAIN);
2313 2312 }
2314 2313
2315 2314 lp->l_start = save_start;
2316 2315 }
2317 2316 VFSTOTM(vp->v_vfsp);
2318 2317
2319 2318 rw_enter(&tp->tn_contents, RW_WRITER);
2320 2319 error = tmpnode_trunc((struct tmount *)VFSTOTM(vp->v_vfsp),
2321 2320 tp, (ulong_t)lp->l_start);
2322 2321 rw_exit(&tp->tn_contents);
2323 2322 rw_exit(&tp->tn_rwlock);
2324 2323 return (error);
2325 2324 }
2326 2325
2327 2326 /* ARGSUSED */
2328 2327 static int
2329 2328 tmp_space(
2330 2329 struct vnode *vp,
2331 2330 int cmd,
2332 2331 struct flock64 *bfp,
2333 2332 int flag,
2334 2333 offset_t offset,
2335 2334 cred_t *cred,
2336 2335 caller_context_t *ct)
2337 2336 {
2338 2337 int error;
2339 2338
2340 2339 if (cmd != F_FREESP)
2341 2340 return (EINVAL);
2342 2341 if ((error = convoff(vp, bfp, 0, (offset_t)offset)) == 0) {
2343 2342 if ((bfp->l_start > MAXOFF_T) || (bfp->l_len > MAXOFF_T))
2344 2343 return (EFBIG);
2345 2344 error = tmp_freesp(vp, bfp, flag);
2346 2345
2347 2346 if (error == 0 && bfp->l_start == 0)
2348 2347 vnevent_truncate(vp, ct);
2349 2348 }
2350 2349 return (error);
2351 2350 }
2352 2351
2353 2352 /* ARGSUSED */
2354 2353 static int
2355 2354 tmp_seek(
2356 2355 struct vnode *vp,
2357 2356 offset_t ooff,
2358 2357 offset_t *noffp,
2359 2358 caller_context_t *ct)
2360 2359 {
2361 2360 return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
2362 2361 }
2363 2362
2364 2363 /* ARGSUSED2 */
2365 2364 static int
2366 2365 tmp_rwlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2367 2366 {
2368 2367 struct tmpnode *tp = VTOTN(vp);
2369 2368
2370 2369 if (write_lock) {
2371 2370 rw_enter(&tp->tn_rwlock, RW_WRITER);
2372 2371 } else {
2373 2372 rw_enter(&tp->tn_rwlock, RW_READER);
2374 2373 }
2375 2374 return (write_lock);
2376 2375 }
2377 2376
2378 2377 /* ARGSUSED1 */
2379 2378 static void
2380 2379 tmp_rwunlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2381 2380 {
2382 2381 struct tmpnode *tp = VTOTN(vp);
2383 2382
2384 2383 rw_exit(&tp->tn_rwlock);
2385 2384 }
2386 2385
2387 2386 static int
2388 2387 tmp_pathconf(
2389 2388 struct vnode *vp,
2390 2389 int cmd,
2391 2390 ulong_t *valp,
2392 2391 cred_t *cr,
2393 2392 caller_context_t *ct)
2394 2393 {
2395 2394 struct tmpnode *tp = NULL;
2396 2395 int error;
2397 2396
2398 2397 switch (cmd) {
2399 2398 case _PC_XATTR_EXISTS:
2400 2399 if (vp->v_vfsp->vfs_flag & VFS_XATTR) {
2401 2400 *valp = 0; /* assume no attributes */
2402 2401 error = 0; /* okay to ask */
2403 2402 tp = VTOTN(vp);
2404 2403 rw_enter(&tp->tn_rwlock, RW_READER);
2405 2404 if (tp->tn_xattrdp) {
2406 2405 rw_enter(&tp->tn_xattrdp->tn_rwlock, RW_READER);
2407 2406 /* do not count "." and ".." */
2408 2407 if (tp->tn_xattrdp->tn_dirents > 2)
2409 2408 *valp = 1;
2410 2409 rw_exit(&tp->tn_xattrdp->tn_rwlock);
2411 2410 }
2412 2411 rw_exit(&tp->tn_rwlock);
2413 2412 } else {
2414 2413 error = EINVAL;
2415 2414 }
2416 2415 break;
2417 2416 case _PC_SATTR_ENABLED:
2418 2417 case _PC_SATTR_EXISTS:
2419 2418 *valp = vfs_has_feature(vp->v_vfsp, VFSFT_SYSATTR_VIEWS) &&
2420 2419 (vp->v_type == VREG || vp->v_type == VDIR);
2421 2420 error = 0;
2422 2421 break;
2423 2422 case _PC_TIMESTAMP_RESOLUTION:
2424 2423 /* nanosecond timestamp resolution */
2425 2424 *valp = 1L;
2426 2425 error = 0;
2427 2426 break;
2428 2427 default:
2429 2428 error = fs_pathconf(vp, cmd, valp, cr, ct);
2430 2429 }
2431 2430 return (error);
2432 2431 }
2433 2432
2434 2433
2435 2434 struct vnodeops *tmp_vnodeops;
2436 2435
2437 2436 const fs_operation_def_t tmp_vnodeops_template[] = {
2438 2437 VOPNAME_OPEN, { .vop_open = tmp_open },
2439 2438 VOPNAME_CLOSE, { .vop_close = tmp_close },
2440 2439 VOPNAME_READ, { .vop_read = tmp_read },
2441 2440 VOPNAME_WRITE, { .vop_write = tmp_write },
2442 2441 VOPNAME_IOCTL, { .vop_ioctl = tmp_ioctl },
2443 2442 VOPNAME_GETATTR, { .vop_getattr = tmp_getattr },
2444 2443 VOPNAME_SETATTR, { .vop_setattr = tmp_setattr },
2445 2444 VOPNAME_ACCESS, { .vop_access = tmp_access },
2446 2445 VOPNAME_LOOKUP, { .vop_lookup = tmp_lookup },
2447 2446 VOPNAME_CREATE, { .vop_create = tmp_create },
2448 2447 VOPNAME_REMOVE, { .vop_remove = tmp_remove },
2449 2448 VOPNAME_LINK, { .vop_link = tmp_link },
2450 2449 VOPNAME_RENAME, { .vop_rename = tmp_rename },
2451 2450 VOPNAME_MKDIR, { .vop_mkdir = tmp_mkdir },
2452 2451 VOPNAME_RMDIR, { .vop_rmdir = tmp_rmdir },
2453 2452 VOPNAME_READDIR, { .vop_readdir = tmp_readdir },
2454 2453 VOPNAME_SYMLINK, { .vop_symlink = tmp_symlink },
2455 2454 VOPNAME_READLINK, { .vop_readlink = tmp_readlink },
2456 2455 VOPNAME_FSYNC, { .vop_fsync = tmp_fsync },
2457 2456 VOPNAME_INACTIVE, { .vop_inactive = tmp_inactive },
2458 2457 VOPNAME_FID, { .vop_fid = tmp_fid },
2459 2458 VOPNAME_RWLOCK, { .vop_rwlock = tmp_rwlock },
2460 2459 VOPNAME_RWUNLOCK, { .vop_rwunlock = tmp_rwunlock },
2461 2460 VOPNAME_SEEK, { .vop_seek = tmp_seek },
2462 2461 VOPNAME_SPACE, { .vop_space = tmp_space },
2463 2462 VOPNAME_GETPAGE, { .vop_getpage = tmp_getpage },
2464 2463 VOPNAME_PUTPAGE, { .vop_putpage = tmp_putpage },
2465 2464 VOPNAME_MAP, { .vop_map = tmp_map },
2466 2465 VOPNAME_ADDMAP, { .vop_addmap = tmp_addmap },
2467 2466 VOPNAME_DELMAP, { .vop_delmap = tmp_delmap },
2468 2467 VOPNAME_PATHCONF, { .vop_pathconf = tmp_pathconf },
2469 2468 VOPNAME_VNEVENT, { .vop_vnevent = fs_vnevent_support },
2470 2469 NULL, NULL
2471 2470 };
↓ open down ↓ |
1352 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX