1 /* 2 * Copyright (c) 2007-2008 The DragonFly Project. All rights reserved. 3 * 4 * This code is derived from software contributed to The DragonFly Project 5 * by Matthew Dillon <dillon@backplane.com> 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in 15 * the documentation and/or other materials provided with the 16 * distribution. 17 * 3. Neither the name of The DragonFly Project nor the names of its 18 * contributors may be used to endorse or promote products derived 19 * from this software without specific, prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 22 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 24 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 25 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 26 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, 27 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 28 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 29 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 30 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 31 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 * 34 * $DragonFly: src/sys/vfs/hammer/hammer_vfsops.c,v 1.74 2008/11/13 02:18:43 dillon Exp $ 35 */ 36 37 #include <sys/param.h> 38 #include <sys/systm.h> 39 #include <sys/kernel.h> 40 #include <sys/vnode.h> 41 #include <sys/mount.h> 42 #include <sys/malloc.h> 43 #include <sys/nlookup.h> 44 #include <sys/fcntl.h> 45 #include <sys/sysctl.h> 46 #include <sys/buf.h> 47 #include <sys/buf2.h> 48 #include "hammer.h" 49 50 /* 51 * NOTE! Global statistics may not be MPSAFE so HAMMER never uses them 52 * in conditionals. 53 */ 54 int hammer_supported_version = HAMMER_VOL_VERSION_DEFAULT; 55 int hammer_debug_io; 56 int hammer_debug_general; 57 int hammer_debug_debug = 1; /* medium-error panics */ 58 int hammer_debug_inode; 59 int hammer_debug_locks; 60 int hammer_debug_btree; 61 int hammer_debug_tid; 62 int hammer_debug_recover; /* -1 will disable, +1 will force */ 63 int hammer_debug_recover_faults; 64 int hammer_debug_critical; /* non-zero enter debugger on error */ 65 int hammer_cluster_enable = 1; /* enable read clustering by default */ 66 int hammer_live_dedup = 0; 67 int hammer_count_fsyncs; 68 int hammer_count_inodes; 69 int hammer_count_iqueued; 70 int hammer_count_reclaiming; 71 int hammer_count_records; 72 int hammer_count_record_datas; 73 int hammer_count_volumes; 74 int hammer_count_buffers; 75 int hammer_count_nodes; 76 int64_t hammer_count_extra_space_used; 77 int64_t hammer_stats_btree_lookups; 78 int64_t hammer_stats_btree_searches; 79 int64_t hammer_stats_btree_inserts; 80 int64_t hammer_stats_btree_deletes; 81 int64_t hammer_stats_btree_elements; 82 int64_t hammer_stats_btree_splits; 83 int64_t hammer_stats_btree_iterations; 84 int64_t hammer_stats_btree_root_iterations; 85 int64_t hammer_stats_record_iterations; 86 87 int64_t hammer_stats_file_read; 88 int64_t hammer_stats_file_write; 89 int64_t hammer_stats_file_iopsr; 90 int64_t hammer_stats_file_iopsw; 91 int64_t hammer_stats_disk_read; 92 int64_t hammer_stats_disk_write; 93 int64_t hammer_stats_inode_flushes; 94 int64_t hammer_stats_commits; 95 int64_t hammer_stats_undo; 96 int64_t hammer_stats_redo; 97 98 int hammer_count_dirtybufspace; /* global */ 99 int hammer_count_refedbufs; /* global */ 100 int hammer_count_reservations; 101 int hammer_count_io_running_read; 102 int hammer_count_io_running_write; 103 int hammer_count_io_locked; 104 int hammer_limit_dirtybufspace; /* per-mount */ 105 int hammer_limit_running_io; /* per-mount */ 106 int hammer_limit_recs; /* as a whole XXX */ 107 int hammer_limit_inode_recs = 2048; /* per inode */ 108 int hammer_limit_reclaim; 109 int hammer_live_dedup_cache_size = DEDUP_CACHE_SIZE; 110 int hammer_limit_redo = 4096 * 1024; /* per inode */ 111 int hammer_autoflush = 500; /* auto flush (typ on reclaim) */ 112 int hammer_bio_count; 113 int hammer_verify_zone; 114 int hammer_verify_data = 1; 115 int hammer_write_mode; 116 int hammer_double_buffer; 117 int hammer_yield_check = 16; 118 int hammer_fsync_mode = 3; 119 int64_t hammer_contention_count; 120 int64_t hammer_zone_limit; 121 122 /* 123 * Live dedup debug counters (sysctls are writable so that counters 124 * can be reset from userspace). 125 */ 126 int64_t hammer_live_dedup_vnode_bcmps = 0; 127 int64_t hammer_live_dedup_device_bcmps = 0; 128 int64_t hammer_live_dedup_findblk_failures = 0; 129 int64_t hammer_live_dedup_bmap_saves = 0; 130 131 132 SYSCTL_NODE(_vfs, OID_AUTO, hammer, CTLFLAG_RW, 0, "HAMMER filesystem"); 133 134 SYSCTL_INT(_vfs_hammer, OID_AUTO, supported_version, CTLFLAG_RD, 135 &hammer_supported_version, 0, ""); 136 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_general, CTLFLAG_RW, 137 &hammer_debug_general, 0, ""); 138 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_io, CTLFLAG_RW, 139 &hammer_debug_io, 0, ""); 140 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_debug, CTLFLAG_RW, 141 &hammer_debug_debug, 0, ""); 142 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_inode, CTLFLAG_RW, 143 &hammer_debug_inode, 0, ""); 144 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_locks, CTLFLAG_RW, 145 &hammer_debug_locks, 0, ""); 146 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_btree, CTLFLAG_RW, 147 &hammer_debug_btree, 0, ""); 148 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_tid, CTLFLAG_RW, 149 &hammer_debug_tid, 0, ""); 150 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_recover, CTLFLAG_RW, 151 &hammer_debug_recover, 0, ""); 152 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_recover_faults, CTLFLAG_RW, 153 &hammer_debug_recover_faults, 0, ""); 154 SYSCTL_INT(_vfs_hammer, OID_AUTO, debug_critical, CTLFLAG_RW, 155 &hammer_debug_critical, 0, ""); 156 SYSCTL_INT(_vfs_hammer, OID_AUTO, cluster_enable, CTLFLAG_RW, 157 &hammer_cluster_enable, 0, ""); 158 /* 159 * 0 - live dedup is disabled 160 * 1 - dedup cache is populated on reads only 161 * 2 - dedup cache is populated on both reads and writes 162 */ 163 SYSCTL_INT(_vfs_hammer, OID_AUTO, live_dedup, CTLFLAG_RW, 164 &hammer_live_dedup, 0, "Enable live dedup"); 165 166 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_dirtybufspace, CTLFLAG_RW, 167 &hammer_limit_dirtybufspace, 0, ""); 168 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_running_io, CTLFLAG_RW, 169 &hammer_limit_running_io, 0, ""); 170 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_recs, CTLFLAG_RW, 171 &hammer_limit_recs, 0, ""); 172 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_inode_recs, CTLFLAG_RW, 173 &hammer_limit_inode_recs, 0, ""); 174 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_reclaim, CTLFLAG_RW, 175 &hammer_limit_reclaim, 0, ""); 176 SYSCTL_INT(_vfs_hammer, OID_AUTO, live_dedup_cache_size, CTLFLAG_RW, 177 &hammer_live_dedup_cache_size, 0, 178 "Number of cache entries"); 179 SYSCTL_INT(_vfs_hammer, OID_AUTO, limit_redo, CTLFLAG_RW, 180 &hammer_limit_redo, 0, ""); 181 182 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_fsyncs, CTLFLAG_RD, 183 &hammer_count_fsyncs, 0, ""); 184 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_inodes, CTLFLAG_RD, 185 &hammer_count_inodes, 0, ""); 186 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_iqueued, CTLFLAG_RD, 187 &hammer_count_iqueued, 0, ""); 188 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_reclaiming, CTLFLAG_RD, 189 &hammer_count_reclaiming, 0, ""); 190 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_records, CTLFLAG_RD, 191 &hammer_count_records, 0, ""); 192 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_record_datas, CTLFLAG_RD, 193 &hammer_count_record_datas, 0, ""); 194 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_volumes, CTLFLAG_RD, 195 &hammer_count_volumes, 0, ""); 196 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_buffers, CTLFLAG_RD, 197 &hammer_count_buffers, 0, ""); 198 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_nodes, CTLFLAG_RD, 199 &hammer_count_nodes, 0, ""); 200 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, count_extra_space_used, CTLFLAG_RD, 201 &hammer_count_extra_space_used, 0, ""); 202 203 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_searches, CTLFLAG_RD, 204 &hammer_stats_btree_searches, 0, ""); 205 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_lookups, CTLFLAG_RD, 206 &hammer_stats_btree_lookups, 0, ""); 207 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_inserts, CTLFLAG_RD, 208 &hammer_stats_btree_inserts, 0, ""); 209 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_deletes, CTLFLAG_RD, 210 &hammer_stats_btree_deletes, 0, ""); 211 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_elements, CTLFLAG_RD, 212 &hammer_stats_btree_elements, 0, ""); 213 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_splits, CTLFLAG_RD, 214 &hammer_stats_btree_splits, 0, ""); 215 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_iterations, CTLFLAG_RD, 216 &hammer_stats_btree_iterations, 0, ""); 217 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_btree_root_iterations, CTLFLAG_RD, 218 &hammer_stats_btree_root_iterations, 0, ""); 219 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_record_iterations, CTLFLAG_RD, 220 &hammer_stats_record_iterations, 0, ""); 221 222 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_file_read, CTLFLAG_RD, 223 &hammer_stats_file_read, 0, ""); 224 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_file_write, CTLFLAG_RD, 225 &hammer_stats_file_write, 0, ""); 226 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_file_iopsr, CTLFLAG_RD, 227 &hammer_stats_file_iopsr, 0, ""); 228 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_file_iopsw, CTLFLAG_RD, 229 &hammer_stats_file_iopsw, 0, ""); 230 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_disk_read, CTLFLAG_RD, 231 &hammer_stats_disk_read, 0, ""); 232 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_disk_write, CTLFLAG_RD, 233 &hammer_stats_disk_write, 0, ""); 234 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_inode_flushes, CTLFLAG_RD, 235 &hammer_stats_inode_flushes, 0, ""); 236 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_commits, CTLFLAG_RD, 237 &hammer_stats_commits, 0, ""); 238 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_undo, CTLFLAG_RD, 239 &hammer_stats_undo, 0, ""); 240 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, stats_redo, CTLFLAG_RD, 241 &hammer_stats_redo, 0, ""); 242 243 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, live_dedup_vnode_bcmps, CTLFLAG_RW, 244 &hammer_live_dedup_vnode_bcmps, 0, 245 "successful vnode buffer comparisons"); 246 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, live_dedup_device_bcmps, CTLFLAG_RW, 247 &hammer_live_dedup_device_bcmps, 0, 248 "successful device buffer comparisons"); 249 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, live_dedup_findblk_failures, CTLFLAG_RW, 250 &hammer_live_dedup_findblk_failures, 0, 251 "block lookup failures for comparison"); 252 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, live_dedup_bmap_saves, CTLFLAG_RW, 253 &hammer_live_dedup_bmap_saves, 0, 254 "useful physical block lookups"); 255 256 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_dirtybufspace, CTLFLAG_RD, 257 &hammer_count_dirtybufspace, 0, ""); 258 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_refedbufs, CTLFLAG_RD, 259 &hammer_count_refedbufs, 0, ""); 260 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_reservations, CTLFLAG_RD, 261 &hammer_count_reservations, 0, ""); 262 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_io_running_read, CTLFLAG_RD, 263 &hammer_count_io_running_read, 0, ""); 264 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_io_locked, CTLFLAG_RD, 265 &hammer_count_io_locked, 0, ""); 266 SYSCTL_INT(_vfs_hammer, OID_AUTO, count_io_running_write, CTLFLAG_RD, 267 &hammer_count_io_running_write, 0, ""); 268 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, zone_limit, CTLFLAG_RW, 269 &hammer_zone_limit, 0, ""); 270 SYSCTL_QUAD(_vfs_hammer, OID_AUTO, contention_count, CTLFLAG_RW, 271 &hammer_contention_count, 0, ""); 272 SYSCTL_INT(_vfs_hammer, OID_AUTO, autoflush, CTLFLAG_RW, 273 &hammer_autoflush, 0, ""); 274 SYSCTL_INT(_vfs_hammer, OID_AUTO, verify_zone, CTLFLAG_RW, 275 &hammer_verify_zone, 0, ""); 276 SYSCTL_INT(_vfs_hammer, OID_AUTO, verify_data, CTLFLAG_RW, 277 &hammer_verify_data, 0, ""); 278 SYSCTL_INT(_vfs_hammer, OID_AUTO, write_mode, CTLFLAG_RW, 279 &hammer_write_mode, 0, ""); 280 SYSCTL_INT(_vfs_hammer, OID_AUTO, double_buffer, CTLFLAG_RW, 281 &hammer_double_buffer, 0, ""); 282 SYSCTL_INT(_vfs_hammer, OID_AUTO, yield_check, CTLFLAG_RW, 283 &hammer_yield_check, 0, ""); 284 SYSCTL_INT(_vfs_hammer, OID_AUTO, fsync_mode, CTLFLAG_RW, 285 &hammer_fsync_mode, 0, ""); 286 287 KTR_INFO_MASTER(hammer); 288 289 /* 290 * VFS ABI 291 */ 292 static void hammer_free_hmp(struct mount *mp); 293 294 static int hammer_vfs_mount(struct mount *mp, char *path, caddr_t data, 295 struct ucred *cred); 296 static int hammer_vfs_unmount(struct mount *mp, int mntflags); 297 static int hammer_vfs_root(struct mount *mp, struct vnode **vpp); 298 static int hammer_vfs_statfs(struct mount *mp, struct statfs *sbp, 299 struct ucred *cred); 300 static int hammer_vfs_statvfs(struct mount *mp, struct statvfs *sbp, 301 struct ucred *cred); 302 static int hammer_vfs_sync(struct mount *mp, int waitfor); 303 static int hammer_vfs_vget(struct mount *mp, struct vnode *dvp, 304 ino_t ino, struct vnode **vpp); 305 static int hammer_vfs_init(struct vfsconf *conf); 306 static int hammer_vfs_fhtovp(struct mount *mp, struct vnode *rootvp, 307 struct fid *fhp, struct vnode **vpp); 308 static int hammer_vfs_vptofh(struct vnode *vp, struct fid *fhp); 309 static int hammer_vfs_checkexp(struct mount *mp, struct sockaddr *nam, 310 int *exflagsp, struct ucred **credanonp); 311 312 313 static struct vfsops hammer_vfsops = { 314 .vfs_mount = hammer_vfs_mount, 315 .vfs_unmount = hammer_vfs_unmount, 316 .vfs_root = hammer_vfs_root, 317 .vfs_statfs = hammer_vfs_statfs, 318 .vfs_statvfs = hammer_vfs_statvfs, 319 .vfs_sync = hammer_vfs_sync, 320 .vfs_vget = hammer_vfs_vget, 321 .vfs_init = hammer_vfs_init, 322 .vfs_vptofh = hammer_vfs_vptofh, 323 .vfs_fhtovp = hammer_vfs_fhtovp, 324 .vfs_checkexp = hammer_vfs_checkexp 325 }; 326 327 MALLOC_DEFINE(M_HAMMER, "HAMMER-mount", ""); 328 329 VFS_SET(hammer_vfsops, hammer, 0); 330 MODULE_VERSION(hammer, 1); 331 332 static int 333 hammer_vfs_init(struct vfsconf *conf) 334 { 335 int n; 336 337 if (hammer_limit_recs == 0) { 338 hammer_limit_recs = nbuf * 25; 339 n = kmalloc_limit(M_HAMMER) / 512; 340 if (hammer_limit_recs > n) 341 hammer_limit_recs = n; 342 } 343 if (hammer_limit_dirtybufspace == 0) { 344 hammer_limit_dirtybufspace = hidirtybufspace / 2; 345 if (hammer_limit_dirtybufspace < 100) 346 hammer_limit_dirtybufspace = 100; 347 } 348 349 /* 350 * Set reasonable limits to maintain an I/O pipeline. This is 351 * used by the flush code which explicitly initiates I/O, and 352 * is per-mount. 353 * 354 * The system-driven buffer cache uses vfs.lorunningspace and 355 * vfs.hirunningspace globally. 356 */ 357 if (hammer_limit_running_io == 0) 358 hammer_limit_running_io = hammer_limit_dirtybufspace; 359 if (hammer_limit_running_io > 10 * 1024 * 1024) 360 hammer_limit_running_io = 10 * 1024 * 1024; 361 362 /* 363 * The hammer_inode structure detaches from the vnode on reclaim. 364 * This limits the number of inodes in this state to prevent a 365 * memory pool blowout. 366 */ 367 if (hammer_limit_reclaim == 0) 368 hammer_limit_reclaim = desiredvnodes / 10; 369 370 return(0); 371 } 372 373 static int 374 hammer_vfs_mount(struct mount *mp, char *mntpt, caddr_t data, 375 struct ucred *cred) 376 { 377 struct hammer_mount_info info; 378 hammer_mount_t hmp; 379 hammer_volume_t rootvol; 380 struct vnode *rootvp; 381 struct vnode *devvp = NULL; 382 const char *upath; /* volume name in userspace */ 383 char *path; /* volume name in system space */ 384 int error; 385 int i; 386 int master_id; 387 char *next_volume_ptr = NULL; 388 389 /* 390 * Accept hammer_mount_info. mntpt is NULL for root mounts at boot. 391 */ 392 if (mntpt == NULL) { 393 bzero(&info, sizeof(info)); 394 info.asof = 0; 395 info.hflags = 0; 396 info.nvolumes = 1; 397 398 next_volume_ptr = mp->mnt_stat.f_mntfromname; 399 400 /* Count number of volumes separated by ':' */ 401 for (char *p = next_volume_ptr; *p != '\0'; ++p) { 402 if (*p == ':') { 403 ++info.nvolumes; 404 } 405 } 406 407 mp->mnt_flag &= ~MNT_RDONLY; /* mount R/W */ 408 } else { 409 if ((error = copyin(data, &info, sizeof(info))) != 0) 410 return (error); 411 } 412 413 /* 414 * updating or new mount 415 */ 416 if (mp->mnt_flag & MNT_UPDATE) { 417 hmp = (void *)mp->mnt_data; 418 KKASSERT(hmp != NULL); 419 } else { 420 if (info.nvolumes <= 0 || info.nvolumes >= 32768) 421 return (EINVAL); 422 hmp = NULL; 423 } 424 425 /* 426 * master-id validation. The master id may not be changed by a 427 * mount update. 428 */ 429 if (info.hflags & HMNT_MASTERID) { 430 if (hmp && hmp->master_id != info.master_id) { 431 kprintf("hammer: cannot change master id " 432 "with mount update\n"); 433 return(EINVAL); 434 } 435 master_id = info.master_id; 436 if (master_id < -1 || master_id >= HAMMER_MAX_MASTERS) 437 return (EINVAL); 438 } else { 439 if (hmp) 440 master_id = hmp->master_id; 441 else 442 master_id = 0; 443 } 444 445 /* 446 * Internal mount data structure 447 */ 448 if (hmp == NULL) { 449 hmp = kmalloc(sizeof(*hmp), M_HAMMER, M_WAITOK | M_ZERO); 450 mp->mnt_data = (qaddr_t)hmp; 451 hmp->mp = mp; 452 /*TAILQ_INIT(&hmp->recycle_list);*/ 453 454 /* 455 * Make sure kmalloc type limits are set appropriately. 456 * 457 * Our inode kmalloc group is sized based on maxvnodes 458 * (controlled by the system, not us). 459 */ 460 kmalloc_create(&hmp->m_misc, "HAMMER-others"); 461 kmalloc_create(&hmp->m_inodes, "HAMMER-inodes"); 462 463 kmalloc_raise_limit(hmp->m_inodes, 0); /* unlimited */ 464 465 hmp->root_btree_beg.localization = 0x00000000U; 466 hmp->root_btree_beg.obj_id = -0x8000000000000000LL; 467 hmp->root_btree_beg.key = -0x8000000000000000LL; 468 hmp->root_btree_beg.create_tid = 1; 469 hmp->root_btree_beg.delete_tid = 1; 470 hmp->root_btree_beg.rec_type = 0; 471 hmp->root_btree_beg.obj_type = 0; 472 473 hmp->root_btree_end.localization = 0xFFFFFFFFU; 474 hmp->root_btree_end.obj_id = 0x7FFFFFFFFFFFFFFFLL; 475 hmp->root_btree_end.key = 0x7FFFFFFFFFFFFFFFLL; 476 hmp->root_btree_end.create_tid = 0xFFFFFFFFFFFFFFFFULL; 477 hmp->root_btree_end.delete_tid = 0; /* special case */ 478 hmp->root_btree_end.rec_type = 0xFFFFU; 479 hmp->root_btree_end.obj_type = 0; 480 481 hmp->krate.freq = 1; /* maximum reporting rate (hz) */ 482 hmp->krate.count = -16; /* initial burst */ 483 484 hmp->sync_lock.refs = 1; 485 hmp->free_lock.refs = 1; 486 hmp->undo_lock.refs = 1; 487 hmp->blkmap_lock.refs = 1; 488 hmp->snapshot_lock.refs = 1; 489 hmp->volume_lock.refs = 1; 490 491 TAILQ_INIT(&hmp->delay_list); 492 TAILQ_INIT(&hmp->flush_group_list); 493 TAILQ_INIT(&hmp->objid_cache_list); 494 TAILQ_INIT(&hmp->undo_lru_list); 495 TAILQ_INIT(&hmp->reclaim_list); 496 497 RB_INIT(&hmp->rb_dedup_crc_root); 498 RB_INIT(&hmp->rb_dedup_off_root); 499 TAILQ_INIT(&hmp->dedup_lru_list); 500 } 501 hmp->hflags &= ~HMNT_USERFLAGS; 502 hmp->hflags |= info.hflags & HMNT_USERFLAGS; 503 504 hmp->master_id = master_id; 505 506 if (info.asof) { 507 mp->mnt_flag |= MNT_RDONLY; 508 hmp->asof = info.asof; 509 } else { 510 hmp->asof = HAMMER_MAX_TID; 511 } 512 513 hmp->volume_to_remove = -1; 514 515 /* 516 * Re-open read-write if originally read-only, or vise-versa. 517 * 518 * When going from read-only to read-write execute the stage2 519 * recovery if it has not already been run. 520 */ 521 if (mp->mnt_flag & MNT_UPDATE) { 522 lwkt_gettoken(&hmp->fs_token); 523 error = 0; 524 if (hmp->ronly && (mp->mnt_kern_flag & MNTK_WANTRDWR)) { 525 kprintf("HAMMER read-only -> read-write\n"); 526 hmp->ronly = 0; 527 RB_SCAN(hammer_vol_rb_tree, &hmp->rb_vols_root, NULL, 528 hammer_adjust_volume_mode, NULL); 529 rootvol = hammer_get_root_volume(hmp, &error); 530 if (rootvol) { 531 hammer_recover_flush_buffers(hmp, rootvol, 1); 532 error = hammer_recover_stage2(hmp, rootvol); 533 bcopy(rootvol->ondisk->vol0_blockmap, 534 hmp->blockmap, 535 sizeof(hmp->blockmap)); 536 hammer_rel_volume(rootvol, 0); 537 } 538 RB_SCAN(hammer_ino_rb_tree, &hmp->rb_inos_root, NULL, 539 hammer_reload_inode, NULL); 540 /* kernel clears MNT_RDONLY */ 541 } else if (hmp->ronly == 0 && (mp->mnt_flag & MNT_RDONLY)) { 542 kprintf("HAMMER read-write -> read-only\n"); 543 hmp->ronly = 1; /* messy */ 544 RB_SCAN(hammer_ino_rb_tree, &hmp->rb_inos_root, NULL, 545 hammer_reload_inode, NULL); 546 hmp->ronly = 0; 547 hammer_flusher_sync(hmp); 548 hammer_flusher_sync(hmp); 549 hammer_flusher_sync(hmp); 550 hmp->ronly = 1; 551 RB_SCAN(hammer_vol_rb_tree, &hmp->rb_vols_root, NULL, 552 hammer_adjust_volume_mode, NULL); 553 } 554 lwkt_reltoken(&hmp->fs_token); 555 return(error); 556 } 557 558 RB_INIT(&hmp->rb_vols_root); 559 RB_INIT(&hmp->rb_inos_root); 560 RB_INIT(&hmp->rb_redo_root); 561 RB_INIT(&hmp->rb_nods_root); 562 RB_INIT(&hmp->rb_undo_root); 563 RB_INIT(&hmp->rb_resv_root); 564 RB_INIT(&hmp->rb_bufs_root); 565 RB_INIT(&hmp->rb_pfsm_root); 566 567 hmp->ronly = ((mp->mnt_flag & MNT_RDONLY) != 0); 568 569 RB_INIT(&hmp->volu_root); 570 RB_INIT(&hmp->undo_root); 571 RB_INIT(&hmp->data_root); 572 RB_INIT(&hmp->meta_root); 573 RB_INIT(&hmp->lose_root); 574 TAILQ_INIT(&hmp->iorun_list); 575 576 lwkt_token_init(&hmp->fs_token, "hammerfs"); 577 lwkt_token_init(&hmp->io_token, "hammerio"); 578 579 lwkt_gettoken(&hmp->fs_token); 580 581 /* 582 * Load volumes 583 */ 584 path = objcache_get(namei_oc, M_WAITOK); 585 hmp->nvolumes = -1; 586 for (i = 0; i < info.nvolumes; ++i) { 587 if (mntpt == NULL) { 588 /* 589 * Root mount. 590 */ 591 KKASSERT(next_volume_ptr != NULL); 592 strcpy(path, ""); 593 if (*next_volume_ptr != '/') { 594 /* relative path */ 595 strcpy(path, "/dev/"); 596 } 597 int k; 598 for (k = strlen(path); k < MAXPATHLEN-1; ++k) { 599 if (*next_volume_ptr == '\0') { 600 break; 601 } else if (*next_volume_ptr == ':') { 602 ++next_volume_ptr; 603 break; 604 } else { 605 path[k] = *next_volume_ptr; 606 ++next_volume_ptr; 607 } 608 } 609 path[k] = '\0'; 610 611 error = 0; 612 cdev_t dev = kgetdiskbyname(path); 613 error = bdevvp(dev, &devvp); 614 if (error) { 615 kprintf("hammer_mountroot: can't find devvp\n"); 616 } 617 } else { 618 error = copyin(&info.volumes[i], &upath, 619 sizeof(char *)); 620 if (error == 0) 621 error = copyinstr(upath, path, 622 MAXPATHLEN, NULL); 623 } 624 if (error == 0) 625 error = hammer_install_volume(hmp, path, devvp); 626 if (error) 627 break; 628 } 629 objcache_put(namei_oc, path); 630 631 /* 632 * Make sure we found a root volume 633 */ 634 if (error == 0 && hmp->rootvol == NULL) { 635 kprintf("hammer_mount: No root volume found!\n"); 636 error = EINVAL; 637 } 638 639 /* 640 * Check that all required volumes are available 641 */ 642 if (error == 0 && hammer_mountcheck_volumes(hmp)) { 643 kprintf("hammer_mount: Missing volumes, cannot mount!\n"); 644 error = EINVAL; 645 } 646 647 if (error) { 648 /* called with fs_token held */ 649 hammer_free_hmp(mp); 650 return (error); 651 } 652 653 /* 654 * No errors, setup enough of the mount point so we can lookup the 655 * root vnode. 656 */ 657 mp->mnt_iosize_max = MAXPHYS; 658 mp->mnt_kern_flag |= MNTK_FSMID; 659 660 /* 661 * MPSAFE code. Note that VOPs and VFSops which are not MPSAFE 662 * will acquire a per-mount token prior to entry and release it 663 * on return, so even if we do not specify it we no longer get 664 * the BGL regardlless of how we are flagged. 665 */ 666 mp->mnt_kern_flag |= MNTK_ALL_MPSAFE; 667 /*MNTK_RD_MPSAFE | MNTK_GA_MPSAFE | MNTK_IN_MPSAFE;*/ 668 669 /* 670 * note: f_iosize is used by vnode_pager_haspage() when constructing 671 * its VOP_BMAP call. 672 */ 673 mp->mnt_stat.f_iosize = HAMMER_BUFSIZE; 674 mp->mnt_stat.f_bsize = HAMMER_BUFSIZE; 675 676 mp->mnt_vstat.f_frsize = HAMMER_BUFSIZE; 677 mp->mnt_vstat.f_bsize = HAMMER_BUFSIZE; 678 679 mp->mnt_maxsymlinklen = 255; 680 mp->mnt_flag |= MNT_LOCAL; 681 682 vfs_add_vnodeops(mp, &hammer_vnode_vops, &mp->mnt_vn_norm_ops); 683 vfs_add_vnodeops(mp, &hammer_spec_vops, &mp->mnt_vn_spec_ops); 684 vfs_add_vnodeops(mp, &hammer_fifo_vops, &mp->mnt_vn_fifo_ops); 685 686 /* 687 * The root volume's ondisk pointer is only valid if we hold a 688 * reference to it. 689 */ 690 rootvol = hammer_get_root_volume(hmp, &error); 691 if (error) 692 goto failed; 693 694 /* 695 * Perform any necessary UNDO operations. The recovery code does 696 * call hammer_undo_lookup() so we have to pre-cache the blockmap, 697 * and then re-copy it again after recovery is complete. 698 * 699 * If this is a read-only mount the UNDO information is retained 700 * in memory in the form of dirty buffer cache buffers, and not 701 * written back to the media. 702 */ 703 bcopy(rootvol->ondisk->vol0_blockmap, hmp->blockmap, 704 sizeof(hmp->blockmap)); 705 706 /* 707 * Check filesystem version 708 */ 709 hmp->version = rootvol->ondisk->vol_version; 710 if (hmp->version < HAMMER_VOL_VERSION_MIN || 711 hmp->version > HAMMER_VOL_VERSION_MAX) { 712 kprintf("HAMMER: mount unsupported fs version %d\n", 713 hmp->version); 714 error = ERANGE; 715 goto done; 716 } 717 718 /* 719 * The undo_rec_limit limits the size of flush groups to avoid 720 * blowing out the UNDO FIFO. This calculation is typically in 721 * the tens of thousands and is designed primarily when small 722 * HAMMER filesystems are created. 723 */ 724 hmp->undo_rec_limit = hammer_undo_max(hmp) / 8192 + 100; 725 if (hammer_debug_general & 0x0001) 726 kprintf("HAMMER: undo_rec_limit %d\n", hmp->undo_rec_limit); 727 728 /* 729 * NOTE: Recover stage1 not only handles meta-data recovery, it 730 * also sets hmp->undo_seqno for HAMMER VERSION 4+ filesystems. 731 */ 732 error = hammer_recover_stage1(hmp, rootvol); 733 if (error) { 734 kprintf("Failed to recover HAMMER filesystem on mount\n"); 735 goto done; 736 } 737 738 /* 739 * Finish setup now that we have a good root volume. 740 * 741 * The top 16 bits of fsid.val[1] is a pfs id. 742 */ 743 ksnprintf(mp->mnt_stat.f_mntfromname, 744 sizeof(mp->mnt_stat.f_mntfromname), "%s", 745 rootvol->ondisk->vol_name); 746 mp->mnt_stat.f_fsid.val[0] = 747 crc32((char *)&rootvol->ondisk->vol_fsid + 0, 8); 748 mp->mnt_stat.f_fsid.val[1] = 749 crc32((char *)&rootvol->ondisk->vol_fsid + 8, 8); 750 mp->mnt_stat.f_fsid.val[1] &= 0x0000FFFF; 751 752 mp->mnt_vstat.f_fsid_uuid = rootvol->ondisk->vol_fsid; 753 mp->mnt_vstat.f_fsid = crc32(&mp->mnt_vstat.f_fsid_uuid, 754 sizeof(mp->mnt_vstat.f_fsid_uuid)); 755 756 /* 757 * Certain often-modified fields in the root volume are cached in 758 * the hammer_mount structure so we do not have to generate lots 759 * of little UNDO structures for them. 760 * 761 * Recopy after recovery. This also has the side effect of 762 * setting our cached undo FIFO's first_offset, which serves to 763 * placemark the FIFO start for the NEXT flush cycle while the 764 * on-disk first_offset represents the LAST flush cycle. 765 */ 766 hmp->next_tid = rootvol->ondisk->vol0_next_tid; 767 hmp->flush_tid1 = hmp->next_tid; 768 hmp->flush_tid2 = hmp->next_tid; 769 bcopy(rootvol->ondisk->vol0_blockmap, hmp->blockmap, 770 sizeof(hmp->blockmap)); 771 hmp->copy_stat_freebigblocks = rootvol->ondisk->vol0_stat_freebigblocks; 772 773 hammer_flusher_create(hmp); 774 775 /* 776 * Locate the root directory using the root cluster's B-Tree as a 777 * starting point. The root directory uses an obj_id of 1. 778 * 779 * FUTURE: Leave the root directory cached referenced but unlocked 780 * in hmp->rootvp (need to flush it on unmount). 781 */ 782 error = hammer_vfs_vget(mp, NULL, 1, &rootvp); 783 if (error) 784 goto done; 785 vput(rootvp); 786 /*vn_unlock(hmp->rootvp);*/ 787 if (hmp->ronly == 0) 788 error = hammer_recover_stage2(hmp, rootvol); 789 790 /* 791 * If the stage2 recovery fails be sure to clean out all cached 792 * vnodes before throwing away the mount structure or bad things 793 * will happen. 794 */ 795 if (error) 796 vflush(mp, 0, 0); 797 798 done: 799 hammer_rel_volume(rootvol, 0); 800 failed: 801 /* 802 * Cleanup and return. 803 */ 804 if (error) { 805 /* called with fs_token held */ 806 hammer_free_hmp(mp); 807 } else { 808 lwkt_reltoken(&hmp->fs_token); 809 } 810 return (error); 811 } 812 813 static int 814 hammer_vfs_unmount(struct mount *mp, int mntflags) 815 { 816 hammer_mount_t hmp = (void *)mp->mnt_data; 817 int flags; 818 int error; 819 820 /* 821 * Clean out the vnodes 822 */ 823 lwkt_gettoken(&hmp->fs_token); 824 flags = 0; 825 if (mntflags & MNT_FORCE) 826 flags |= FORCECLOSE; 827 error = vflush(mp, 0, flags); 828 829 /* 830 * Clean up the internal mount structure and related entities. This 831 * may issue I/O. 832 */ 833 if (error == 0) { 834 /* called with fs_token held */ 835 hammer_free_hmp(mp); 836 } else { 837 lwkt_reltoken(&hmp->fs_token); 838 } 839 return(error); 840 } 841 842 /* 843 * Clean up the internal mount structure and disassociate it from the mount. 844 * This may issue I/O. 845 * 846 * Called with fs_token held. 847 */ 848 static void 849 hammer_free_hmp(struct mount *mp) 850 { 851 hammer_mount_t hmp = (void *)mp->mnt_data; 852 hammer_flush_group_t flg; 853 int count; 854 int dummy; 855 856 /* 857 * Flush anything dirty. This won't even run if the 858 * filesystem errored-out. 859 */ 860 count = 0; 861 while (hammer_flusher_haswork(hmp)) { 862 hammer_flusher_sync(hmp); 863 ++count; 864 if (count >= 5) { 865 if (count == 5) 866 kprintf("HAMMER: umount flushing."); 867 else 868 kprintf("."); 869 tsleep(&dummy, 0, "hmrufl", hz); 870 } 871 if (count == 30) { 872 kprintf("giving up\n"); 873 break; 874 } 875 } 876 if (count >= 5 && count < 30) 877 kprintf("\n"); 878 879 /* 880 * If the mount had a critical error we have to destroy any 881 * remaining inodes before we can finish cleaning up the flusher. 882 */ 883 if (hmp->flags & HAMMER_MOUNT_CRITICAL_ERROR) { 884 RB_SCAN(hammer_ino_rb_tree, &hmp->rb_inos_root, NULL, 885 hammer_destroy_inode_callback, NULL); 886 } 887 888 /* 889 * There shouldn't be any inodes left now and any left over 890 * flush groups should now be empty. 891 */ 892 KKASSERT(RB_EMPTY(&hmp->rb_inos_root)); 893 while ((flg = TAILQ_FIRST(&hmp->flush_group_list)) != NULL) { 894 TAILQ_REMOVE(&hmp->flush_group_list, flg, flush_entry); 895 KKASSERT(RB_EMPTY(&flg->flush_tree)); 896 if (flg->refs) { 897 kprintf("HAMMER: Warning, flush_group %p was " 898 "not empty on umount!\n", flg); 899 } 900 kfree(flg, hmp->m_misc); 901 } 902 903 /* 904 * We can finally destroy the flusher 905 */ 906 hammer_flusher_destroy(hmp); 907 908 /* 909 * We may have held recovered buffers due to a read-only mount. 910 * These must be discarded. 911 */ 912 if (hmp->ronly) 913 hammer_recover_flush_buffers(hmp, NULL, -1); 914 915 /* 916 * Unload buffers and then volumes 917 */ 918 RB_SCAN(hammer_buf_rb_tree, &hmp->rb_bufs_root, NULL, 919 hammer_unload_buffer, NULL); 920 RB_SCAN(hammer_vol_rb_tree, &hmp->rb_vols_root, NULL, 921 hammer_unload_volume, NULL); 922 923 mp->mnt_data = NULL; 924 mp->mnt_flag &= ~MNT_LOCAL; 925 hmp->mp = NULL; 926 hammer_destroy_objid_cache(hmp); 927 hammer_destroy_dedup_cache(hmp); 928 if (hmp->dedup_free_cache != NULL) { 929 kfree(hmp->dedup_free_cache, hmp->m_misc); 930 hmp->dedup_free_cache = NULL; 931 } 932 kmalloc_destroy(&hmp->m_misc); 933 kmalloc_destroy(&hmp->m_inodes); 934 lwkt_reltoken(&hmp->fs_token); 935 kfree(hmp, M_HAMMER); 936 } 937 938 /* 939 * Report critical errors. ip may be NULL. 940 */ 941 void 942 hammer_critical_error(hammer_mount_t hmp, hammer_inode_t ip, 943 int error, const char *msg) 944 { 945 hmp->flags |= HAMMER_MOUNT_CRITICAL_ERROR; 946 947 krateprintf(&hmp->krate, 948 "HAMMER(%s): Critical error inode=%jd error=%d %s\n", 949 hmp->mp->mnt_stat.f_mntfromname, 950 (intmax_t)(ip ? ip->obj_id : -1), 951 error, msg); 952 953 if (hmp->ronly == 0) { 954 hmp->ronly = 2; /* special errored read-only mode */ 955 hmp->mp->mnt_flag |= MNT_RDONLY; 956 RB_SCAN(hammer_vol_rb_tree, &hmp->rb_vols_root, NULL, 957 hammer_adjust_volume_mode, NULL); 958 kprintf("HAMMER(%s): Forcing read-only mode\n", 959 hmp->mp->mnt_stat.f_mntfromname); 960 } 961 hmp->error = error; 962 if (hammer_debug_critical) 963 Debugger("Entering debugger"); 964 } 965 966 967 /* 968 * Obtain a vnode for the specified inode number. An exclusively locked 969 * vnode is returned. 970 */ 971 int 972 hammer_vfs_vget(struct mount *mp, struct vnode *dvp, 973 ino_t ino, struct vnode **vpp) 974 { 975 struct hammer_transaction trans; 976 struct hammer_mount *hmp = (void *)mp->mnt_data; 977 struct hammer_inode *ip; 978 int error; 979 u_int32_t localization; 980 981 lwkt_gettoken(&hmp->fs_token); 982 hammer_simple_transaction(&trans, hmp); 983 984 /* 985 * If a directory vnode is supplied (mainly NFS) then we can acquire 986 * the PFS domain from it. Otherwise we would only be able to vget 987 * inodes in the root PFS. 988 */ 989 if (dvp) { 990 localization = HAMMER_DEF_LOCALIZATION + 991 VTOI(dvp)->obj_localization; 992 } else { 993 localization = HAMMER_DEF_LOCALIZATION; 994 } 995 996 /* 997 * Lookup the requested HAMMER inode. The structure must be 998 * left unlocked while we manipulate the related vnode to avoid 999 * a deadlock. 1000 */ 1001 ip = hammer_get_inode(&trans, NULL, ino, 1002 hmp->asof, localization, 1003 0, &error); 1004 if (ip == NULL) { 1005 *vpp = NULL; 1006 } else { 1007 error = hammer_get_vnode(ip, vpp); 1008 hammer_rel_inode(ip, 0); 1009 } 1010 hammer_done_transaction(&trans); 1011 lwkt_reltoken(&hmp->fs_token); 1012 return (error); 1013 } 1014 1015 /* 1016 * Return the root vnode for the filesystem. 1017 * 1018 * HAMMER stores the root vnode in the hammer_mount structure so 1019 * getting it is easy. 1020 */ 1021 static int 1022 hammer_vfs_root(struct mount *mp, struct vnode **vpp) 1023 { 1024 int error; 1025 1026 error = hammer_vfs_vget(mp, NULL, 1, vpp); 1027 return (error); 1028 } 1029 1030 static int 1031 hammer_vfs_statfs(struct mount *mp, struct statfs *sbp, struct ucred *cred) 1032 { 1033 struct hammer_mount *hmp = (void *)mp->mnt_data; 1034 hammer_volume_t volume; 1035 hammer_volume_ondisk_t ondisk; 1036 int error; 1037 int64_t bfree; 1038 int64_t breserved; 1039 1040 lwkt_gettoken(&hmp->fs_token); 1041 volume = hammer_get_root_volume(hmp, &error); 1042 if (error) { 1043 lwkt_reltoken(&hmp->fs_token); 1044 return(error); 1045 } 1046 ondisk = volume->ondisk; 1047 1048 /* 1049 * Basic stats 1050 */ 1051 _hammer_checkspace(hmp, HAMMER_CHKSPC_WRITE, &breserved); 1052 mp->mnt_stat.f_files = ondisk->vol0_stat_inodes; 1053 bfree = ondisk->vol0_stat_freebigblocks * HAMMER_LARGEBLOCK_SIZE; 1054 hammer_rel_volume(volume, 0); 1055 1056 mp->mnt_stat.f_bfree = (bfree - breserved) / HAMMER_BUFSIZE; 1057 mp->mnt_stat.f_bavail = mp->mnt_stat.f_bfree; 1058 if (mp->mnt_stat.f_files < 0) 1059 mp->mnt_stat.f_files = 0; 1060 1061 *sbp = mp->mnt_stat; 1062 lwkt_reltoken(&hmp->fs_token); 1063 return(0); 1064 } 1065 1066 static int 1067 hammer_vfs_statvfs(struct mount *mp, struct statvfs *sbp, struct ucred *cred) 1068 { 1069 struct hammer_mount *hmp = (void *)mp->mnt_data; 1070 hammer_volume_t volume; 1071 hammer_volume_ondisk_t ondisk; 1072 int error; 1073 int64_t bfree; 1074 int64_t breserved; 1075 1076 lwkt_gettoken(&hmp->fs_token); 1077 volume = hammer_get_root_volume(hmp, &error); 1078 if (error) { 1079 lwkt_reltoken(&hmp->fs_token); 1080 return(error); 1081 } 1082 ondisk = volume->ondisk; 1083 1084 /* 1085 * Basic stats 1086 */ 1087 _hammer_checkspace(hmp, HAMMER_CHKSPC_WRITE, &breserved); 1088 mp->mnt_vstat.f_files = ondisk->vol0_stat_inodes; 1089 bfree = ondisk->vol0_stat_freebigblocks * HAMMER_LARGEBLOCK_SIZE; 1090 hammer_rel_volume(volume, 0); 1091 1092 mp->mnt_vstat.f_bfree = (bfree - breserved) / HAMMER_BUFSIZE; 1093 mp->mnt_vstat.f_bavail = mp->mnt_vstat.f_bfree; 1094 if (mp->mnt_vstat.f_files < 0) 1095 mp->mnt_vstat.f_files = 0; 1096 *sbp = mp->mnt_vstat; 1097 lwkt_reltoken(&hmp->fs_token); 1098 return(0); 1099 } 1100 1101 /* 1102 * Sync the filesystem. Currently we have to run it twice, the second 1103 * one will advance the undo start index to the end index, so if a crash 1104 * occurs no undos will be run on mount. 1105 * 1106 * We do not sync the filesystem if we are called from a panic. If we did 1107 * we might end up blowing up a sync that was already in progress. 1108 */ 1109 static int 1110 hammer_vfs_sync(struct mount *mp, int waitfor) 1111 { 1112 struct hammer_mount *hmp = (void *)mp->mnt_data; 1113 int error; 1114 1115 lwkt_gettoken(&hmp->fs_token); 1116 if (panicstr == NULL) { 1117 error = hammer_sync_hmp(hmp, waitfor); 1118 } else { 1119 error = EIO; 1120 } 1121 lwkt_reltoken(&hmp->fs_token); 1122 return (error); 1123 } 1124 1125 /* 1126 * Convert a vnode to a file handle. 1127 * 1128 * Accesses read-only fields on already-referenced structures so 1129 * no token is needed. 1130 */ 1131 static int 1132 hammer_vfs_vptofh(struct vnode *vp, struct fid *fhp) 1133 { 1134 hammer_inode_t ip; 1135 1136 KKASSERT(MAXFIDSZ >= 16); 1137 ip = VTOI(vp); 1138 fhp->fid_len = offsetof(struct fid, fid_data[16]); 1139 fhp->fid_ext = ip->obj_localization >> 16; 1140 bcopy(&ip->obj_id, fhp->fid_data + 0, sizeof(ip->obj_id)); 1141 bcopy(&ip->obj_asof, fhp->fid_data + 8, sizeof(ip->obj_asof)); 1142 return(0); 1143 } 1144 1145 1146 /* 1147 * Convert a file handle back to a vnode. 1148 * 1149 * Use rootvp to enforce PFS isolation when a PFS is exported via a 1150 * null mount. 1151 */ 1152 static int 1153 hammer_vfs_fhtovp(struct mount *mp, struct vnode *rootvp, 1154 struct fid *fhp, struct vnode **vpp) 1155 { 1156 hammer_mount_t hmp = (void *)mp->mnt_data; 1157 struct hammer_transaction trans; 1158 struct hammer_inode *ip; 1159 struct hammer_inode_info info; 1160 int error; 1161 u_int32_t localization; 1162 1163 bcopy(fhp->fid_data + 0, &info.obj_id, sizeof(info.obj_id)); 1164 bcopy(fhp->fid_data + 8, &info.obj_asof, sizeof(info.obj_asof)); 1165 if (rootvp) 1166 localization = VTOI(rootvp)->obj_localization; 1167 else 1168 localization = (u_int32_t)fhp->fid_ext << 16; 1169 1170 lwkt_gettoken(&hmp->fs_token); 1171 hammer_simple_transaction(&trans, hmp); 1172 1173 /* 1174 * Get/allocate the hammer_inode structure. The structure must be 1175 * unlocked while we manipulate the related vnode to avoid a 1176 * deadlock. 1177 */ 1178 ip = hammer_get_inode(&trans, NULL, info.obj_id, 1179 info.obj_asof, localization, 0, &error); 1180 if (ip) { 1181 error = hammer_get_vnode(ip, vpp); 1182 hammer_rel_inode(ip, 0); 1183 } else { 1184 *vpp = NULL; 1185 } 1186 hammer_done_transaction(&trans); 1187 lwkt_reltoken(&hmp->fs_token); 1188 return (error); 1189 } 1190 1191 static int 1192 hammer_vfs_checkexp(struct mount *mp, struct sockaddr *nam, 1193 int *exflagsp, struct ucred **credanonp) 1194 { 1195 hammer_mount_t hmp = (void *)mp->mnt_data; 1196 struct netcred *np; 1197 int error; 1198 1199 lwkt_gettoken(&hmp->fs_token); 1200 np = vfs_export_lookup(mp, &hmp->export, nam); 1201 if (np) { 1202 *exflagsp = np->netc_exflags; 1203 *credanonp = &np->netc_anon; 1204 error = 0; 1205 } else { 1206 error = EACCES; 1207 } 1208 lwkt_reltoken(&hmp->fs_token); 1209 return (error); 1210 1211 } 1212 1213 int 1214 hammer_vfs_export(struct mount *mp, int op, const struct export_args *export) 1215 { 1216 hammer_mount_t hmp = (void *)mp->mnt_data; 1217 int error; 1218 1219 lwkt_gettoken(&hmp->fs_token); 1220 1221 switch(op) { 1222 case MOUNTCTL_SET_EXPORT: 1223 error = vfs_export(mp, &hmp->export, export); 1224 break; 1225 default: 1226 error = EOPNOTSUPP; 1227 break; 1228 } 1229 lwkt_reltoken(&hmp->fs_token); 1230 1231 return(error); 1232 } 1233 1234