1 /* 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 2022 Tomohiro Kusumi <tkusumi@netbsd.org> 5 * Copyright (c) 2011-2022 The DragonFly Project. All rights reserved. 6 * 7 * This code is derived from software contributed to The DragonFly Project 8 * by Matthew Dillon <dillon@dragonflybsd.org> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in 18 * the documentation and/or other materials provided with the 19 * distribution. 20 * 3. Neither the name of The DragonFly Project nor the names of its 21 * contributors may be used to endorse or promote products derived 22 * from this software without specific, prior written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 25 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 26 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 27 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 28 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 29 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, 30 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 31 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 32 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 33 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 34 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 */ 37 /* 38 * Kernel Filesystem interface 39 * 40 * NOTE! local ipdata pointers must be reloaded on any modifying operation 41 * to the inode as its underlying chain may have changed. 42 */ 43 44 /* 45 #include <sys/param.h> 46 #include <sys/systm.h> 47 #include <sys/kernel.h> 48 #include <sys/fcntl.h> 49 #include <sys/buf.h> 50 #include <sys/proc.h> 51 #include <sys/mount.h> 52 #include <sys/vnode.h> 53 #include <sys/mountctl.h> 54 #include <sys/dirent.h> 55 #include <sys/uio.h> 56 #include <sys/objcache.h> 57 #include <sys/event.h> 58 #include <sys/file.h> 59 #include <vfs/fifofs/fifo.h> 60 */ 61 62 #include "hammer2.h" 63 64 static int hammer2_read_file(hammer2_inode_t *ip, struct uio *uio, 65 int seqcount); 66 static int hammer2_write_file(hammer2_inode_t *ip, struct uio *uio, 67 int ioflag, int seqcount); 68 static void hammer2_extend_file(hammer2_inode_t *ip, hammer2_key_t nsize); 69 static void hammer2_truncate_file(hammer2_inode_t *ip, hammer2_key_t nsize); 70 71 /* 72 * Last reference to a vnode is going away but it is still cached. 73 */ 74 static 75 int 76 hammer2_vop_inactive(struct vop_inactive_args *ap) 77 { 78 #if 0 79 hammer2_inode_t *ip; 80 struct m_vnode *vp; 81 82 vp = ap->a_vp; 83 ip = VTOI(vp); 84 85 /* 86 * Degenerate case 87 */ 88 if (ip == NULL) { 89 vrecycle(vp); 90 return (0); 91 } 92 93 /* 94 * Aquire the inode lock to interlock against vp updates via 95 * the inode path and file deletions and such (which can be 96 * namespace-only operations that might not hold the vnode). 97 */ 98 hammer2_inode_lock(ip, 0); 99 if (ip->flags & HAMMER2_INODE_ISUNLINKED) { 100 hammer2_key_t lbase; 101 int nblksize; 102 103 /* 104 * If the inode has been unlinked we can throw away all 105 * buffers (dirty or not) and clean the file out. 106 * 107 * Because vrecycle() calls are not guaranteed, try to 108 * dispose of the inode as much as possible right here. 109 */ 110 nblksize = hammer2_calc_logical(ip, 0, &lbase, NULL); 111 nvtruncbuf(vp, 0, nblksize, 0, 0); 112 113 /* 114 * Delete the file on-media. 115 */ 116 if ((ip->flags & HAMMER2_INODE_DELETING) == 0) { 117 atomic_set_int(&ip->flags, HAMMER2_INODE_DELETING); 118 hammer2_inode_delayed_sideq(ip); 119 } 120 hammer2_inode_unlock(ip); 121 122 /* 123 * Recycle immediately if possible 124 */ 125 vrecycle(vp); 126 } else { 127 hammer2_inode_unlock(ip); 128 } 129 return (0); 130 #endif 131 return (EOPNOTSUPP); 132 } 133 134 /* 135 * Reclaim a vnode so that it can be reused; after the inode is 136 * disassociated, the filesystem must manage it alone. 137 */ 138 static 139 int 140 hammer2_vop_reclaim(struct vop_reclaim_args *ap) 141 { 142 hammer2_inode_t *ip; 143 struct m_vnode *vp; 144 145 vp = ap->a_vp; 146 ip = VTOI(vp); 147 if (ip == NULL) 148 return(0); 149 150 /* 151 * NOTE! We do not attempt to flush chains here, flushing is 152 * really fragile and could also deadlock. 153 */ 154 vclrisdirty(vp); 155 156 /* 157 * The inode lock is required to disconnect it. 158 */ 159 hammer2_inode_lock(ip, 0); 160 vp->v_data = NULL; 161 ip->vp = NULL; 162 163 /* 164 * Delete the file on-media. This should have been handled by the 165 * inactivation. The operation is likely still queued on the inode 166 * though so only complain if the stars don't align. 167 */ 168 if ((ip->flags & (HAMMER2_INODE_ISUNLINKED | HAMMER2_INODE_DELETING)) == 169 HAMMER2_INODE_ISUNLINKED) 170 { 171 assert(0); 172 atomic_set_int(&ip->flags, HAMMER2_INODE_DELETING); 173 hammer2_inode_delayed_sideq(ip); 174 kprintf("hammer2: vp=%p ip=%p unlinked but not disposed\n", 175 vp, ip); 176 } 177 hammer2_inode_unlock(ip); 178 179 /* 180 * Modified inodes will already be on SIDEQ or SYNCQ, no further 181 * action is needed. 182 * 183 * We cannot safely synchronize the inode from inside the reclaim 184 * due to potentially deep locks held as-of when the reclaim occurs. 185 * Interactions and potential deadlocks abound. We also can't do it 186 * here without desynchronizing from the related directory entrie(s). 187 */ 188 hammer2_inode_drop(ip); /* vp ref */ 189 190 /* 191 * XXX handle background sync when ip dirty, kernel will no longer 192 * notify us regarding this inode because there is no longer a 193 * vnode attached to it. 194 */ 195 196 return (0); 197 } 198 199 int 200 hammer2_reclaim(struct m_vnode *vp) 201 { 202 struct vop_reclaim_args ap = { 203 .a_vp = vp, 204 }; 205 206 return hammer2_vop_reclaim(&ap); 207 } 208 209 /* 210 * Currently this function synchronizes the front-end inode state to the 211 * backend chain topology, then flushes the inode's chain and sub-topology 212 * to backend media. This function does not flush the root topology down to 213 * the inode. 214 */ 215 static 216 int 217 hammer2_vop_fsync(struct vop_fsync_args *ap) 218 { 219 #if 0 220 hammer2_inode_t *ip; 221 struct m_vnode *vp; 222 int error1; 223 int error2; 224 225 vp = ap->a_vp; 226 ip = VTOI(vp); 227 error1 = 0; 228 229 hammer2_trans_init(ip->pmp, 0); 230 231 /* 232 * Flush dirty buffers in the file's logical buffer cache. 233 * It is best to wait for the strategy code to commit the 234 * buffers to the device's backing buffer cache before 235 * then trying to flush the inode. 236 * 237 * This should be quick, but certain inode modifications cached 238 * entirely in the hammer2_inode structure may not trigger a 239 * buffer read until the flush so the fsync can wind up also 240 * doing scattered reads. 241 */ 242 vfsync(vp, ap->a_waitfor, 1, NULL, NULL); 243 bio_track_wait(&vp->v_track_write, 0, 0); 244 245 /* 246 * Flush any inode changes 247 */ 248 hammer2_inode_lock(ip, 0); 249 if (ip->flags & (HAMMER2_INODE_RESIZED|HAMMER2_INODE_MODIFIED)) 250 error1 = hammer2_inode_chain_sync(ip); 251 252 /* 253 * Flush dirty chains related to the inode. 254 * 255 * NOTE! We are not in a flush transaction. The inode remains on 256 * the sideq so the filesystem syncer can synchronize it to 257 * the volume root. 258 */ 259 error2 = hammer2_inode_chain_flush(ip, HAMMER2_XOP_INODE_STOP); 260 if (error2) 261 error1 = error2; 262 263 /* 264 * We may be able to clear the vnode dirty flag. 265 */ 266 if ((ip->flags & (HAMMER2_INODE_MODIFIED | 267 HAMMER2_INODE_RESIZED | 268 HAMMER2_INODE_DIRTYDATA)) == 0 && 269 RB_EMPTY(&vp->v_rbdirty_tree) && 270 !bio_track_active(&vp->v_track_write)) { 271 vclrisdirty(vp); 272 } 273 hammer2_inode_unlock(ip); 274 hammer2_trans_done(ip->pmp, 0); 275 276 return (error1); 277 #endif 278 return (EOPNOTSUPP); 279 } 280 281 /* 282 * No lock needed, just handle ip->update 283 */ 284 static 285 int 286 hammer2_vop_access(struct vop_access_args *ap) 287 { 288 #if 0 289 hammer2_inode_t *ip = VTOI(ap->a_vp); 290 uid_t uid; 291 gid_t gid; 292 mode_t mode; 293 uint32_t uflags; 294 int error; 295 int update; 296 297 retry: 298 update = spin_access_start(&ip->cluster_spin); 299 300 /*hammer2_inode_lock(ip, HAMMER2_RESOLVE_SHARED);*/ 301 uid = hammer2_to_unix_xid(&ip->meta.uid); 302 gid = hammer2_to_unix_xid(&ip->meta.gid); 303 mode = ip->meta.mode; 304 uflags = ip->meta.uflags; 305 /*hammer2_inode_unlock(ip);*/ 306 307 if (__predict_false(spin_access_end(&ip->cluster_spin, update))) 308 goto retry; 309 310 error = vop_helper_access(ap, uid, gid, mode, uflags); 311 312 return (error); 313 #endif 314 return (EOPNOTSUPP); 315 } 316 317 static 318 int 319 hammer2_vop_getattr(struct vop_getattr_args *ap) 320 { 321 #if 0 322 hammer2_pfs_t *pmp; 323 hammer2_inode_t *ip; 324 struct m_vnode *vp; 325 struct vattr *vap; 326 int update; 327 328 vp = ap->a_vp; 329 vap = ap->a_vap; 330 331 ip = VTOI(vp); 332 pmp = ip->pmp; 333 334 retry: 335 update = spin_access_start(&ip->cluster_spin); 336 337 vap->va_fsid = pmp->mp->mnt_stat.f_fsid.val[0]; 338 vap->va_fileid = ip->meta.inum; 339 vap->va_mode = ip->meta.mode; 340 vap->va_nlink = ip->meta.nlinks; 341 vap->va_uid = hammer2_to_unix_xid(&ip->meta.uid); 342 vap->va_gid = hammer2_to_unix_xid(&ip->meta.gid); 343 vap->va_rmajor = 0; 344 vap->va_rminor = 0; 345 vap->va_size = ip->meta.size; /* protected by shared lock */ 346 vap->va_blocksize = HAMMER2_PBUFSIZE; 347 vap->va_flags = ip->meta.uflags; 348 hammer2_time_to_timespec(ip->meta.ctime, &vap->va_ctime); 349 hammer2_time_to_timespec(ip->meta.mtime, &vap->va_mtime); 350 hammer2_time_to_timespec(ip->meta.mtime, &vap->va_atime); 351 vap->va_gen = 1; 352 vap->va_bytes = 0; 353 if (ip->meta.type == HAMMER2_OBJTYPE_DIRECTORY) { 354 /* 355 * Can't really calculate directory use sans the files under 356 * it, just assume one block for now. 357 */ 358 vap->va_bytes += HAMMER2_INODE_BYTES; 359 } else { 360 vap->va_bytes = hammer2_inode_data_count(ip); 361 } 362 vap->va_type = hammer2_get_vtype(ip->meta.type); 363 vap->va_filerev = 0; 364 vap->va_uid_uuid = ip->meta.uid; 365 vap->va_gid_uuid = ip->meta.gid; 366 vap->va_vaflags = VA_UID_UUID_VALID | VA_GID_UUID_VALID | 367 VA_FSID_UUID_VALID; 368 369 if (__predict_false(spin_access_end(&ip->cluster_spin, update))) 370 goto retry; 371 372 return (0); 373 #endif 374 return (EOPNOTSUPP); 375 } 376 377 static 378 int 379 hammer2_vop_getattr_lite(struct vop_getattr_lite_args *ap) 380 { 381 #if 0 382 hammer2_pfs_t *pmp; 383 hammer2_inode_t *ip; 384 struct m_vnode *vp; 385 struct vattr_lite *lvap; 386 int update; 387 388 vp = ap->a_vp; 389 lvap = ap->a_lvap; 390 391 ip = VTOI(vp); 392 pmp = ip->pmp; 393 394 retry: 395 update = spin_access_start(&ip->cluster_spin); 396 397 #if 0 398 vap->va_fsid = pmp->mp->mnt_stat.f_fsid.val[0]; 399 vap->va_fileid = ip->meta.inum; 400 #endif 401 lvap->va_mode = ip->meta.mode; 402 lvap->va_nlink = ip->meta.nlinks; 403 lvap->va_uid = hammer2_to_unix_xid(&ip->meta.uid); 404 lvap->va_gid = hammer2_to_unix_xid(&ip->meta.gid); 405 #if 0 406 vap->va_rmajor = 0; 407 vap->va_rminor = 0; 408 #endif 409 lvap->va_size = ip->meta.size; 410 #if 0 411 vap->va_blocksize = HAMMER2_PBUFSIZE; 412 #endif 413 lvap->va_flags = ip->meta.uflags; 414 lvap->va_type = hammer2_get_vtype(ip->meta.type); 415 #if 0 416 vap->va_filerev = 0; 417 vap->va_uid_uuid = ip->meta.uid; 418 vap->va_gid_uuid = ip->meta.gid; 419 vap->va_vaflags = VA_UID_UUID_VALID | VA_GID_UUID_VALID | 420 VA_FSID_UUID_VALID; 421 #endif 422 423 if (__predict_false(spin_access_end(&ip->cluster_spin, update))) 424 goto retry; 425 426 return (0); 427 #endif 428 return (EOPNOTSUPP); 429 } 430 431 static 432 int 433 hammer2_vop_setattr(struct vop_setattr_args *ap) 434 { 435 #if 0 436 hammer2_inode_t *ip; 437 struct m_vnode *vp; 438 struct vattr *vap; 439 int error; 440 int kflags = 0; 441 uint64_t ctime; 442 443 vp = ap->a_vp; 444 vap = ap->a_vap; 445 hammer2_update_time(&ctime); 446 447 ip = VTOI(vp); 448 449 if (ip->pmp->ronly) 450 return (EROFS); 451 452 /* 453 * Normally disallow setattr if there is no space, unless we 454 * are in emergency mode (might be needed to chflags -R noschg 455 * files prior to removal). 456 */ 457 if ((ip->pmp->flags & HAMMER2_PMPF_EMERG) == 0 && 458 hammer2_vfs_enospace(ip, 0, ap->a_cred) > 1) { 459 return (ENOSPC); 460 } 461 462 hammer2_trans_init(ip->pmp, 0); 463 hammer2_inode_lock(ip, 0); 464 error = 0; 465 466 if (vap->va_flags != VNOVAL) { 467 uint32_t flags; 468 469 flags = ip->meta.uflags; 470 error = vop_helper_setattr_flags(&flags, vap->va_flags, 471 hammer2_to_unix_xid(&ip->meta.uid), 472 ap->a_cred); 473 if (error == 0) { 474 if (ip->meta.uflags != flags) { 475 hammer2_inode_modify(ip); 476 hammer2_spin_lock_update(&ip->cluster_spin); 477 ip->meta.uflags = flags; 478 ip->meta.ctime = ctime; 479 hammer2_spin_unlock_update(&ip->cluster_spin); 480 kflags |= NOTE_ATTRIB; 481 } 482 if (ip->meta.uflags & (IMMUTABLE | APPEND)) { 483 error = 0; 484 goto done; 485 } 486 } 487 goto done; 488 } 489 if (ip->meta.uflags & (IMMUTABLE | APPEND)) { 490 error = EPERM; 491 goto done; 492 } 493 if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) { 494 mode_t cur_mode = ip->meta.mode; 495 uid_t cur_uid = hammer2_to_unix_xid(&ip->meta.uid); 496 gid_t cur_gid = hammer2_to_unix_xid(&ip->meta.gid); 497 uuid_t uuid_uid; 498 uuid_t uuid_gid; 499 500 error = vop_helper_chown(ap->a_vp, vap->va_uid, vap->va_gid, 501 ap->a_cred, 502 &cur_uid, &cur_gid, &cur_mode); 503 if (error == 0) { 504 hammer2_guid_to_uuid(&uuid_uid, cur_uid); 505 hammer2_guid_to_uuid(&uuid_gid, cur_gid); 506 if (bcmp(&uuid_uid, &ip->meta.uid, sizeof(uuid_uid)) || 507 bcmp(&uuid_gid, &ip->meta.gid, sizeof(uuid_gid)) || 508 ip->meta.mode != cur_mode 509 ) { 510 hammer2_inode_modify(ip); 511 hammer2_spin_lock_update(&ip->cluster_spin); 512 ip->meta.uid = uuid_uid; 513 ip->meta.gid = uuid_gid; 514 ip->meta.mode = cur_mode; 515 ip->meta.ctime = ctime; 516 hammer2_spin_unlock_update(&ip->cluster_spin); 517 } 518 kflags |= NOTE_ATTRIB; 519 } 520 } 521 522 /* 523 * Resize the file 524 */ 525 if (vap->va_size != VNOVAL && ip->meta.size != vap->va_size) { 526 switch(vp->v_type) { 527 case VREG: 528 if (vap->va_size == ip->meta.size) 529 break; 530 if (vap->va_size < ip->meta.size) { 531 hammer2_mtx_ex(&ip->truncate_lock); 532 hammer2_truncate_file(ip, vap->va_size); 533 hammer2_mtx_unlock(&ip->truncate_lock); 534 kflags |= NOTE_WRITE; 535 } else { 536 hammer2_extend_file(ip, vap->va_size); 537 kflags |= NOTE_WRITE | NOTE_EXTEND; 538 } 539 hammer2_inode_modify(ip); 540 ip->meta.mtime = ctime; 541 vclrflags(vp, VLASTWRITETS); 542 break; 543 default: 544 error = EINVAL; 545 goto done; 546 } 547 } 548 #if 0 549 /* atime not supported */ 550 if (vap->va_atime.tv_sec != VNOVAL) { 551 hammer2_inode_modify(ip); 552 ip->meta.atime = hammer2_timespec_to_time(&vap->va_atime); 553 kflags |= NOTE_ATTRIB; 554 } 555 #endif 556 if (vap->va_mode != (mode_t)VNOVAL) { 557 mode_t cur_mode = ip->meta.mode; 558 uid_t cur_uid = hammer2_to_unix_xid(&ip->meta.uid); 559 gid_t cur_gid = hammer2_to_unix_xid(&ip->meta.gid); 560 561 error = vop_helper_chmod(ap->a_vp, vap->va_mode, ap->a_cred, 562 cur_uid, cur_gid, &cur_mode); 563 if (error == 0) { 564 hammer2_inode_modify(ip); 565 hammer2_spin_lock_update(&ip->cluster_spin); 566 ip->meta.mode = cur_mode; 567 ip->meta.ctime = ctime; 568 hammer2_spin_unlock_update(&ip->cluster_spin); 569 kflags |= NOTE_ATTRIB; 570 } 571 } 572 573 if (vap->va_mtime.tv_sec != VNOVAL) { 574 hammer2_inode_modify(ip); 575 ip->meta.mtime = hammer2_timespec_to_time(&vap->va_mtime); 576 kflags |= NOTE_ATTRIB; 577 vclrflags(vp, VLASTWRITETS); 578 } 579 580 done: 581 /* 582 * If a truncation occurred we must call chain_sync() now in order 583 * to trim the related data chains, otherwise a later expansion can 584 * cause havoc. 585 * 586 * If an extend occured that changed the DIRECTDATA state, we must 587 * call inode_chain_sync now in order to prepare the inode's indirect 588 * block table. 589 * 590 * WARNING! This means we are making an adjustment to the inode's 591 * chain outside of sync/fsync, and not just to inode->meta, which 592 * may result in some consistency issues if a crash were to occur 593 * at just the wrong time. 594 */ 595 if (ip->flags & HAMMER2_INODE_RESIZED) 596 hammer2_inode_chain_sync(ip); 597 598 /* 599 * Cleanup. 600 */ 601 hammer2_inode_unlock(ip); 602 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ); 603 hammer2_knote(ip->vp, kflags); 604 605 return (error); 606 #endif 607 return (EOPNOTSUPP); 608 } 609 610 static 611 int 612 hammer2_vop_readdir(struct vop_readdir_args *ap) 613 { 614 #if 0 615 hammer2_xop_readdir_t *xop; 616 hammer2_blockref_t bref; 617 hammer2_inode_t *ip; 618 hammer2_tid_t inum; 619 hammer2_key_t lkey; 620 struct uio *uio; 621 off_t *cookies; 622 off_t saveoff; 623 int cookie_index; 624 int ncookies; 625 int error; 626 int eofflag; 627 int r; 628 629 ip = VTOI(ap->a_vp); 630 uio = ap->a_uio; 631 saveoff = uio->uio_offset; 632 eofflag = 0; 633 error = 0; 634 635 /* 636 * Setup cookies directory entry cookies if requested 637 */ 638 if (ap->a_ncookies) { 639 ncookies = uio->uio_resid / 16 + 1; 640 if (ncookies > 1024) 641 ncookies = 1024; 642 cookies = kmalloc(ncookies * sizeof(off_t), M_TEMP, M_WAITOK); 643 } else { 644 ncookies = -1; 645 cookies = NULL; 646 } 647 cookie_index = 0; 648 649 hammer2_inode_lock(ip, HAMMER2_RESOLVE_SHARED); 650 651 /* 652 * Handle artificial entries. To ensure that only positive 64 bit 653 * quantities are returned to userland we always strip off bit 63. 654 * The hash code is designed such that codes 0x0000-0x7FFF are not 655 * used, allowing us to use these codes for articial entries. 656 * 657 * Entry 0 is used for '.' and entry 1 is used for '..'. Do not 658 * allow '..' to cross the mount point into (e.g.) the super-root. 659 */ 660 if (saveoff == 0) { 661 inum = ip->meta.inum & HAMMER2_DIRHASH_USERMSK; 662 r = vop_write_dirent(&error, uio, inum, DT_DIR, 1, "."); 663 if (r) 664 goto done; 665 if (cookies) 666 cookies[cookie_index] = saveoff; 667 ++saveoff; 668 ++cookie_index; 669 if (cookie_index == ncookies) 670 goto done; 671 } 672 673 if (saveoff == 1) { 674 inum = ip->meta.inum & HAMMER2_DIRHASH_USERMSK; 675 if (ip != ip->pmp->iroot) 676 inum = ip->meta.iparent & HAMMER2_DIRHASH_USERMSK; 677 r = vop_write_dirent(&error, uio, inum, DT_DIR, 2, ".."); 678 if (r) 679 goto done; 680 if (cookies) 681 cookies[cookie_index] = saveoff; 682 ++saveoff; 683 ++cookie_index; 684 if (cookie_index == ncookies) 685 goto done; 686 } 687 688 lkey = saveoff | HAMMER2_DIRHASH_VISIBLE; 689 if (hammer2_debug & 0x0020) 690 kprintf("readdir: lkey %016jx\n", lkey); 691 if (error) 692 goto done; 693 694 xop = hammer2_xop_alloc(ip, 0); 695 xop->lkey = lkey; 696 hammer2_xop_start(&xop->head, &hammer2_readdir_desc); 697 698 for (;;) { 699 const hammer2_inode_data_t *ripdata; 700 const char *dname; 701 int dtype; 702 703 error = hammer2_xop_collect(&xop->head, 0); 704 error = hammer2_error_to_errno(error); 705 if (error) { 706 break; 707 } 708 if (cookie_index == ncookies) 709 break; 710 if (hammer2_debug & 0x0020) 711 kprintf("cluster chain %p %p\n", 712 xop->head.cluster.focus, 713 (xop->head.cluster.focus ? 714 xop->head.cluster.focus->data : (void *)-1)); 715 hammer2_cluster_bref(&xop->head.cluster, &bref); 716 717 if (bref.type == HAMMER2_BREF_TYPE_INODE) { 718 ripdata = &hammer2_xop_gdata(&xop->head)->ipdata; 719 dtype = hammer2_get_dtype(ripdata->meta.type); 720 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK; 721 r = vop_write_dirent(&error, uio, 722 ripdata->meta.inum & 723 HAMMER2_DIRHASH_USERMSK, 724 dtype, 725 ripdata->meta.name_len, 726 ripdata->filename); 727 hammer2_xop_pdata(&xop->head); 728 if (r) 729 break; 730 if (cookies) 731 cookies[cookie_index] = saveoff; 732 ++cookie_index; 733 } else if (bref.type == HAMMER2_BREF_TYPE_DIRENT) { 734 uint16_t namlen; 735 736 dtype = hammer2_get_dtype(bref.embed.dirent.type); 737 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK; 738 namlen = bref.embed.dirent.namlen; 739 if (namlen <= sizeof(bref.check.buf)) { 740 dname = bref.check.buf; 741 } else { 742 dname = hammer2_xop_gdata(&xop->head)->buf; 743 } 744 r = vop_write_dirent(&error, uio, 745 bref.embed.dirent.inum, dtype, 746 namlen, dname); 747 if (namlen > sizeof(bref.check.buf)) 748 hammer2_xop_pdata(&xop->head); 749 if (r) 750 break; 751 if (cookies) 752 cookies[cookie_index] = saveoff; 753 ++cookie_index; 754 } else { 755 /* XXX chain error */ 756 kprintf("bad chain type readdir %d\n", bref.type); 757 } 758 } 759 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 760 if (error == ENOENT) { 761 error = 0; 762 eofflag = 1; 763 saveoff = (hammer2_key_t)-1; 764 } else { 765 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK; 766 } 767 done: 768 hammer2_inode_unlock(ip); 769 if (ap->a_eofflag) 770 *ap->a_eofflag = eofflag; 771 if (hammer2_debug & 0x0020) 772 kprintf("readdir: done at %016jx\n", saveoff); 773 uio->uio_offset = saveoff & ~HAMMER2_DIRHASH_VISIBLE; 774 if (error && cookie_index == 0) { 775 if (cookies) { 776 kfree(cookies, M_TEMP); 777 *ap->a_ncookies = 0; 778 *ap->a_cookies = NULL; 779 } 780 } else { 781 if (cookies) { 782 *ap->a_ncookies = cookie_index; 783 *ap->a_cookies = cookies; 784 } 785 } 786 return (error); 787 #endif 788 return (EOPNOTSUPP); 789 } 790 791 /* 792 * hammer2_vop_readlink { vp, uio, cred } 793 */ 794 static 795 int 796 hammer2_vop_readlink(struct vop_readlink_args *ap) 797 { 798 struct m_vnode *vp; 799 hammer2_inode_t *ip; 800 int error; 801 802 vp = ap->a_vp; 803 if (vp->v_type != VLNK) 804 return (EINVAL); 805 ip = VTOI(vp); 806 807 error = hammer2_read_file(ip, ap->a_uio, 0); 808 return (error); 809 } 810 811 int 812 hammer2_readlink(struct m_vnode *vp, void *buf, size_t size) 813 { 814 assert(buf); 815 assert(size > 0); 816 assert(size <= HAMMER2_PBUFSIZE); 817 818 struct iovec iov = { 819 .iov_base = buf, 820 .iov_len = size, 821 }; 822 struct uio uio = { 823 .uio_iov = &iov, 824 .uio_iovcnt = 1, 825 .uio_offset = 0, 826 .uio_resid = size, 827 .uio_segflg = UIO_USERSPACE, 828 .uio_rw = UIO_READ, 829 .uio_td = NULL, 830 }; 831 struct vop_readlink_args ap = { 832 .a_vp = vp, 833 .a_uio = &uio, 834 .a_cred = NULL, 835 }; 836 837 return hammer2_vop_readlink(&ap); 838 } 839 840 static 841 int 842 hammer2_vop_read(struct vop_read_args *ap) 843 { 844 struct m_vnode *vp; 845 hammer2_inode_t *ip; 846 struct uio *uio; 847 int error; 848 int seqcount; 849 850 /* 851 * Read operations supported on this vnode? 852 */ 853 vp = ap->a_vp; 854 if (vp->v_type == VDIR) 855 return (EISDIR); 856 if (vp->v_type != VREG) 857 return (EINVAL); 858 859 /* 860 * Misc 861 */ 862 ip = VTOI(vp); 863 uio = ap->a_uio; 864 error = 0; 865 866 seqcount = ap->a_ioflag >> IO_SEQSHIFT; 867 868 error = hammer2_read_file(ip, uio, seqcount); 869 return (error); 870 } 871 872 int 873 hammer2_read(struct m_vnode *vp, void *buf, size_t size, off_t offset) 874 { 875 assert(buf); 876 assert(size > 0); 877 assert(size <= HAMMER2_PBUFSIZE); 878 879 struct iovec iov = { 880 .iov_base = buf, 881 .iov_len = size, 882 }; 883 struct uio uio = { 884 .uio_iov = &iov, 885 .uio_iovcnt = 1, 886 .uio_offset = offset, 887 .uio_resid = size, 888 .uio_segflg = UIO_USERSPACE, 889 .uio_rw = UIO_READ, 890 .uio_td = NULL, 891 }; 892 struct vop_read_args ap = { 893 .a_vp = vp, 894 .a_uio = &uio, 895 .a_ioflag = 0, 896 .a_cred = NULL, 897 }; 898 899 return hammer2_vop_read(&ap); 900 } 901 902 static 903 int 904 hammer2_vop_write(struct vop_write_args *ap) 905 { 906 hammer2_inode_t *ip; 907 //thread_t td; 908 struct m_vnode *vp; 909 struct uio *uio; 910 int error; 911 int seqcount; 912 int ioflag; 913 914 /* 915 * Read operations supported on this vnode? 916 */ 917 vp = ap->a_vp; 918 if (vp->v_type != VREG) 919 return (EINVAL); 920 921 /* 922 * Misc 923 */ 924 ip = VTOI(vp); 925 ioflag = ap->a_ioflag; 926 uio = ap->a_uio; 927 error = 0; 928 if (ip->pmp->ronly || (ip->pmp->flags & HAMMER2_PMPF_EMERG)) 929 return (EROFS); 930 switch (hammer2_vfs_enospace(ip, uio->uio_resid, ap->a_cred)) { 931 case 2: 932 return (ENOSPC); 933 case 1: 934 ioflag |= IO_DIRECT; /* semi-synchronous */ 935 /* fall through */ 936 default: 937 break; 938 } 939 940 seqcount = ioflag >> IO_SEQSHIFT; 941 942 /* 943 * Check resource limit 944 */ 945 /* 946 if (uio->uio_resid > 0 && (td = uio->uio_td) != NULL && td->td_proc && 947 uio->uio_offset + uio->uio_resid > 948 td->td_proc->p_rlimit[RLIMIT_FSIZE].rlim_cur) { 949 lwpsignal(td->td_proc, td->td_lwp, SIGXFSZ); 950 return (EFBIG); 951 } 952 */ 953 954 /* 955 * The transaction interlocks against flush initiations 956 * (note: but will run concurrently with the actual flush). 957 * 958 * To avoid deadlocking against the VM system, we must flag any 959 * transaction related to the buffer cache or other direct 960 * VM page manipulation. 961 */ 962 if (uio->uio_segflg == UIO_NOCOPY) { 963 assert(0); /* no UIO_NOCOPY in makefs */ 964 hammer2_trans_init(ip->pmp, HAMMER2_TRANS_BUFCACHE); 965 } else { 966 hammer2_trans_init(ip->pmp, 0); 967 } 968 error = hammer2_write_file(ip, uio, ioflag, seqcount); 969 if (uio->uio_segflg == UIO_NOCOPY) { 970 assert(0); /* no UIO_NOCOPY in makefs */ 971 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_BUFCACHE | 972 HAMMER2_TRANS_SIDEQ); 973 } else 974 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ); 975 976 return (error); 977 } 978 979 int 980 hammer2_write(struct m_vnode *vp, void *buf, size_t size, off_t offset) 981 { 982 assert(buf); 983 assert(size > 0); 984 assert(size <= HAMMER2_PBUFSIZE); 985 986 struct iovec iov = { 987 .iov_base = buf, 988 .iov_len = size, 989 }; 990 struct uio uio = { 991 .uio_iov = &iov, 992 .uio_iovcnt = 1, 993 .uio_offset = offset, 994 .uio_resid = size, 995 .uio_segflg = UIO_USERSPACE, 996 .uio_rw = UIO_WRITE, 997 .uio_td = NULL, 998 }; 999 struct vop_write_args ap = { 1000 .a_vp = vp, 1001 .a_uio = &uio, 1002 .a_ioflag = 0, 1003 .a_cred = NULL, 1004 }; 1005 1006 return hammer2_vop_write(&ap); 1007 } 1008 1009 /* 1010 * Perform read operations on a file or symlink given an UNLOCKED 1011 * inode and uio. 1012 * 1013 * The passed ip is not locked. 1014 */ 1015 static 1016 int 1017 hammer2_read_file(hammer2_inode_t *ip, struct uio *uio, int seqcount) 1018 { 1019 hammer2_off_t size; 1020 struct m_buf *bp; 1021 int error; 1022 1023 error = 0; 1024 1025 /* 1026 * UIO read loop. 1027 * 1028 * WARNING! Assumes that the kernel interlocks size changes at the 1029 * vnode level. 1030 */ 1031 hammer2_mtx_sh(&ip->lock); 1032 hammer2_mtx_sh(&ip->truncate_lock); 1033 size = ip->meta.size; 1034 hammer2_mtx_unlock(&ip->lock); 1035 1036 while (uio->uio_resid > 0 && uio->uio_offset < size) { 1037 hammer2_key_t lbase; 1038 hammer2_key_t leof; 1039 int lblksize; 1040 int loff; 1041 int n; 1042 1043 lblksize = hammer2_calc_logical(ip, uio->uio_offset, 1044 &lbase, &leof); 1045 #if 0 1046 #if 1 1047 bp = NULL; 1048 error = cluster_readx(ip->vp, leof, lbase, lblksize, 1049 B_NOTMETA | B_KVABIO, 1050 uio->uio_resid, 1051 seqcount * MAXBSIZE, 1052 &bp); 1053 #else 1054 if (uio->uio_segflg == UIO_NOCOPY) { 1055 bp = getblk(ip->vp, lbase, lblksize, 1056 GETBLK_BHEAVY | GETBLK_KVABIO, 0); 1057 if (bp->b_flags & B_CACHE) { 1058 int i; 1059 int j = 0; 1060 if (bp->b_xio.xio_npages != 16) 1061 kprintf("NPAGES BAD\n"); 1062 for (i = 0; i < bp->b_xio.xio_npages; ++i) { 1063 vm_page_t m; 1064 m = bp->b_xio.xio_pages[i]; 1065 if (m == NULL || m->valid == 0) { 1066 kprintf("bp %016jx %016jx pg %d inv", 1067 lbase, leof, i); 1068 if (m) 1069 kprintf("m->object %p/%p", m->object, ip->vp->v_object); 1070 kprintf("\n"); 1071 j = 1; 1072 } 1073 } 1074 if (j) 1075 kprintf("b_flags %08x, b_error %d\n", bp->b_flags, bp->b_error); 1076 } 1077 bqrelse(bp); 1078 } 1079 error = bread_kvabio(ip->vp, lbase, lblksize, &bp); 1080 #endif 1081 #else 1082 bp = getblkx(ip->vp, lbase, lblksize, 1083 GETBLK_BHEAVY | GETBLK_KVABIO, 0); 1084 bp->b_cmd = BUF_CMD_READ; 1085 1086 struct bio bio; 1087 bio.bio_buf = bp; 1088 bio.bio_offset = lbase; 1089 1090 struct vop_strategy_args ap; 1091 ap.a_vp = ip->vp; 1092 ap.a_bio = &bio; 1093 1094 error = hammer2_vop_strategy(&ap); 1095 assert(!error); 1096 #endif 1097 if (error) { 1098 brelse(bp); 1099 break; 1100 } 1101 bkvasync(bp); 1102 loff = (int)(uio->uio_offset - lbase); 1103 n = lblksize - loff; 1104 if (n > uio->uio_resid) 1105 n = uio->uio_resid; 1106 if (n > size - uio->uio_offset) 1107 n = (int)(size - uio->uio_offset); 1108 //bp->b_flags |= B_AGE; 1109 uiomovebp(bp, bp->b_data + loff, n, uio); 1110 bqrelse(bp); 1111 } 1112 hammer2_mtx_unlock(&ip->truncate_lock); 1113 1114 return (error); 1115 } 1116 1117 /* 1118 * Write to the file represented by the inode via the logical buffer cache. 1119 * The inode may represent a regular file or a symlink. 1120 * 1121 * The inode must not be locked. 1122 */ 1123 static 1124 int 1125 hammer2_write_file(hammer2_inode_t *ip, struct uio *uio, 1126 int ioflag, int seqcount) 1127 { 1128 hammer2_key_t old_eof; 1129 hammer2_key_t new_eof; 1130 struct m_buf *bp; 1131 int kflags; 1132 int error; 1133 int modified; 1134 1135 /* 1136 * Setup if append 1137 * 1138 * WARNING! Assumes that the kernel interlocks size changes at the 1139 * vnode level. 1140 */ 1141 hammer2_mtx_ex(&ip->lock); 1142 hammer2_mtx_sh(&ip->truncate_lock); 1143 if (ioflag & IO_APPEND) 1144 uio->uio_offset = ip->meta.size; 1145 old_eof = ip->meta.size; 1146 1147 /* 1148 * Extend the file if necessary. If the write fails at some point 1149 * we will truncate it back down to cover as much as we were able 1150 * to write. 1151 * 1152 * Doing this now makes it easier to calculate buffer sizes in 1153 * the loop. 1154 */ 1155 kflags = 0; 1156 error = 0; 1157 modified = 0; 1158 1159 if (uio->uio_offset + uio->uio_resid > old_eof) { 1160 new_eof = uio->uio_offset + uio->uio_resid; 1161 modified = 1; 1162 hammer2_extend_file(ip, new_eof); 1163 kflags |= NOTE_EXTEND; 1164 } else { 1165 new_eof = old_eof; 1166 } 1167 hammer2_mtx_unlock(&ip->lock); 1168 1169 /* 1170 * UIO write loop 1171 */ 1172 while (uio->uio_resid > 0) { 1173 hammer2_key_t lbase; 1174 int trivial; 1175 int endofblk; 1176 int lblksize; 1177 int loff; 1178 int n; 1179 1180 /* 1181 * Don't allow the buffer build to blow out the buffer 1182 * cache. 1183 */ 1184 if ((ioflag & IO_RECURSE) == 0) 1185 bwillwrite(HAMMER2_PBUFSIZE); 1186 1187 /* 1188 * This nominally tells us how much we can cluster and 1189 * what the logical buffer size needs to be. Currently 1190 * we don't try to cluster the write and just handle one 1191 * block at a time. 1192 */ 1193 lblksize = hammer2_calc_logical(ip, uio->uio_offset, 1194 &lbase, NULL); 1195 loff = (int)(uio->uio_offset - lbase); 1196 1197 KKASSERT(lblksize <= MAXBSIZE); 1198 1199 /* 1200 * Calculate bytes to copy this transfer and whether the 1201 * copy completely covers the buffer or not. 1202 */ 1203 trivial = 0; 1204 n = lblksize - loff; 1205 if (n > uio->uio_resid) { 1206 n = uio->uio_resid; 1207 if (loff == lbase && uio->uio_offset + n == new_eof) 1208 trivial = 1; 1209 endofblk = 0; 1210 } else { 1211 if (loff == 0) 1212 trivial = 1; 1213 endofblk = 1; 1214 } 1215 if (lbase >= new_eof) 1216 trivial = 1; 1217 trivial = 1; /* force trivial for makefs */ 1218 1219 /* 1220 * Get the buffer 1221 */ 1222 if (uio->uio_segflg == UIO_NOCOPY) { 1223 assert(0); /* no UIO_NOCOPY in makefs */ 1224 /* 1225 * Issuing a write with the same data backing the 1226 * buffer. Instantiate the buffer to collect the 1227 * backing vm pages, then read-in any missing bits. 1228 * 1229 * This case is used by vop_stdputpages(). 1230 */ 1231 bp = getblkx(ip->vp, lbase, lblksize, 1232 GETBLK_BHEAVY | GETBLK_KVABIO, 0); 1233 /* 1234 if ((bp->b_flags & B_CACHE) == 0) { 1235 bqrelse(bp); 1236 error = bread_kvabio(ip->vp, lbase, 1237 lblksize, &bp); 1238 } 1239 */ 1240 } else if (trivial) { 1241 /* 1242 * Even though we are entirely overwriting the buffer 1243 * we may still have to zero it out to avoid a 1244 * mmap/write visibility issue. 1245 */ 1246 bp = getblkx(ip->vp, lbase, lblksize, 1247 GETBLK_BHEAVY | GETBLK_KVABIO, 0); 1248 /* 1249 if ((bp->b_flags & B_CACHE) == 0) 1250 vfs_bio_clrbuf(bp); 1251 */ 1252 } else { 1253 assert(0); /* no partial write in makefs */ 1254 /* 1255 * Partial overwrite, read in any missing bits then 1256 * replace the portion being written. 1257 * 1258 * (The strategy code will detect zero-fill physical 1259 * blocks for this case). 1260 */ 1261 error = bread_kvabio(ip->vp, lbase, lblksize, &bp); 1262 if (error == 0) 1263 bheavy(bp); 1264 } 1265 1266 if (error) { 1267 brelse(bp); 1268 break; 1269 } 1270 1271 /* 1272 * Ok, copy the data in 1273 */ 1274 bkvasync(bp); 1275 error = uiomovebp(bp, bp->b_data + loff, n, uio); 1276 kflags |= NOTE_WRITE; 1277 modified = 1; 1278 if (error) { 1279 brelse(bp); 1280 break; 1281 } 1282 1283 /* 1284 * WARNING: Pageout daemon will issue UIO_NOCOPY writes 1285 * with IO_SYNC or IO_ASYNC set. These writes 1286 * must be handled as the pageout daemon expects. 1287 * 1288 * NOTE! H2 relies on cluster_write() here because it 1289 * cannot preallocate disk blocks at the logical 1290 * level due to not knowing what the compression 1291 * size will be at this time. 1292 * 1293 * We must use cluster_write() here and we depend 1294 * on the write-behind feature to flush buffers 1295 * appropriately. If we let the buffer daemons do 1296 * it the block allocations will be all over the 1297 * map. 1298 */ 1299 if (1) { 1300 bp->b_cmd = BUF_CMD_WRITE; 1301 1302 struct bio bio; 1303 bio.bio_buf = bp; 1304 bio.bio_offset = lbase; 1305 1306 struct vop_strategy_args ap; 1307 ap.a_vp = ip->vp; 1308 ap.a_bio = &bio; 1309 1310 error = hammer2_vop_strategy(&ap); 1311 assert(!error); 1312 1313 brelse(bp); 1314 } else if (ioflag & IO_SYNC) { 1315 assert(0); 1316 bwrite(bp); 1317 } else if ((ioflag & IO_DIRECT) && endofblk) { 1318 assert(0); 1319 bawrite(bp); 1320 } else if (ioflag & IO_ASYNC) { 1321 assert(0); 1322 bawrite(bp); 1323 } else if (0 /*ip->vp->v_mount->mnt_flag & MNT_NOCLUSTERW*/) { 1324 assert(0); 1325 bdwrite(bp); 1326 } else { 1327 assert(0); 1328 #if 0 1329 #if 1 1330 bp->b_flags |= B_CLUSTEROK; 1331 cluster_write(bp, new_eof, lblksize, seqcount); 1332 #else 1333 bp->b_flags |= B_CLUSTEROK; 1334 bdwrite(bp); 1335 #endif 1336 #endif 1337 } 1338 } 1339 1340 /* 1341 * Cleanup. If we extended the file EOF but failed to write through 1342 * the entire write is a failure and we have to back-up. 1343 */ 1344 if (error && new_eof != old_eof) { 1345 hammer2_mtx_unlock(&ip->truncate_lock); 1346 hammer2_mtx_ex(&ip->lock); /* note lock order */ 1347 hammer2_mtx_ex(&ip->truncate_lock); /* note lock order */ 1348 hammer2_truncate_file(ip, old_eof); 1349 if (ip->flags & HAMMER2_INODE_MODIFIED) 1350 hammer2_inode_chain_sync(ip); 1351 hammer2_mtx_unlock(&ip->lock); 1352 } else if (modified) { 1353 struct m_vnode *vp = ip->vp; 1354 1355 hammer2_mtx_ex(&ip->lock); 1356 hammer2_inode_modify(ip); 1357 if (uio->uio_segflg == UIO_NOCOPY) { 1358 assert(0); /* no UIO_NOCOPY in makefs */ 1359 /* 1360 if (vp->v_flag & VLASTWRITETS) { 1361 ip->meta.mtime = 1362 (unsigned long)vp->v_lastwrite_ts.tv_sec * 1363 1000000 + 1364 vp->v_lastwrite_ts.tv_nsec / 1000; 1365 } 1366 */ 1367 } else { 1368 hammer2_update_time(&ip->meta.mtime, true); 1369 vclrflags(vp, VLASTWRITETS); 1370 } 1371 1372 #if 0 1373 /* 1374 * REMOVED - handled by hammer2_extend_file(). Do not issue 1375 * a chain_sync() outside of a sync/fsync except for DIRECTDATA 1376 * state changes. 1377 * 1378 * Under normal conditions we only issue a chain_sync if 1379 * the inode's DIRECTDATA state changed. 1380 */ 1381 if (ip->flags & HAMMER2_INODE_RESIZED) 1382 hammer2_inode_chain_sync(ip); 1383 #endif 1384 hammer2_mtx_unlock(&ip->lock); 1385 hammer2_knote(ip->vp, kflags); 1386 } 1387 hammer2_trans_assert_strategy(ip->pmp); 1388 hammer2_mtx_unlock(&ip->truncate_lock); 1389 1390 return error; 1391 } 1392 1393 /* 1394 * Truncate the size of a file. The inode must be locked. 1395 * 1396 * We must unconditionally set HAMMER2_INODE_RESIZED to properly 1397 * ensure that any on-media data beyond the new file EOF has been destroyed. 1398 * 1399 * WARNING: nvtruncbuf() can only be safely called without the inode lock 1400 * held due to the way our write thread works. If the truncation 1401 * occurs in the middle of a buffer, nvtruncbuf() is responsible 1402 * for dirtying that buffer and zeroing out trailing bytes. 1403 * 1404 * WARNING! Assumes that the kernel interlocks size changes at the 1405 * vnode level. 1406 * 1407 * WARNING! Caller assumes responsibility for removing dead blocks 1408 * if INODE_RESIZED is set. 1409 */ 1410 static 1411 void 1412 hammer2_truncate_file(hammer2_inode_t *ip, hammer2_key_t nsize) 1413 { 1414 hammer2_key_t lbase; 1415 int nblksize; 1416 1417 hammer2_mtx_unlock(&ip->lock); 1418 if (ip->vp) { 1419 nblksize = hammer2_calc_logical(ip, nsize, &lbase, NULL); 1420 nvtruncbuf(ip->vp, nsize, 1421 nblksize, (int)nsize & (nblksize - 1), 1422 0); 1423 } 1424 hammer2_mtx_ex(&ip->lock); 1425 KKASSERT((ip->flags & HAMMER2_INODE_RESIZED) == 0); 1426 ip->osize = ip->meta.size; 1427 ip->meta.size = nsize; 1428 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED); 1429 hammer2_inode_modify(ip); 1430 } 1431 1432 /* 1433 * Extend the size of a file. The inode must be locked. 1434 * 1435 * Even though the file size is changing, we do not have to set the 1436 * INODE_RESIZED bit unless the file size crosses the EMBEDDED_BYTES 1437 * boundary. When this occurs a hammer2_inode_chain_sync() is required 1438 * to prepare the inode cluster's indirect block table, otherwise 1439 * async execution of the strategy code will implode on us. 1440 * 1441 * WARNING! Assumes that the kernel interlocks size changes at the 1442 * vnode level. 1443 * 1444 * WARNING! Caller assumes responsibility for transitioning out 1445 * of the inode DIRECTDATA mode if INODE_RESIZED is set. 1446 */ 1447 static 1448 void 1449 hammer2_extend_file(hammer2_inode_t *ip, hammer2_key_t nsize) 1450 { 1451 hammer2_key_t lbase; 1452 hammer2_key_t osize; 1453 int oblksize; 1454 int nblksize; 1455 int error; 1456 1457 KKASSERT((ip->flags & HAMMER2_INODE_RESIZED) == 0); 1458 hammer2_inode_modify(ip); 1459 osize = ip->meta.size; 1460 ip->osize = osize; 1461 ip->meta.size = nsize; 1462 1463 /* 1464 * We must issue a chain_sync() when the DIRECTDATA state changes 1465 * to prevent confusion between the flush code and the in-memory 1466 * state. This is not perfect because we are doing it outside of 1467 * a sync/fsync operation, so it might not be fully synchronized 1468 * with the meta-data topology flush. 1469 * 1470 * We must retain and re-dirty the buffer cache buffer containing 1471 * the direct data so it can be written to a real block. It should 1472 * not be possible for a bread error to occur since the original data 1473 * is extracted from the inode structure directly. 1474 */ 1475 if (osize <= HAMMER2_EMBEDDED_BYTES && nsize > HAMMER2_EMBEDDED_BYTES) { 1476 if (osize) { 1477 assert(0); /* no such transition in makefs */ 1478 struct m_buf *bp; 1479 1480 oblksize = hammer2_calc_logical(ip, 0, NULL, NULL); 1481 error = bread_kvabio(ip->vp, 0, oblksize, &bp); 1482 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED); 1483 hammer2_inode_chain_sync(ip); 1484 if (error == 0) { 1485 bheavy(bp); 1486 bdwrite(bp); 1487 } else { 1488 brelse(bp); 1489 } 1490 } else { 1491 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED); 1492 hammer2_inode_chain_sync(ip); 1493 } 1494 } 1495 hammer2_mtx_unlock(&ip->lock); 1496 if (ip->vp) { 1497 oblksize = hammer2_calc_logical(ip, osize, &lbase, NULL); 1498 nblksize = hammer2_calc_logical(ip, nsize, &lbase, NULL); 1499 nvextendbuf(ip->vp, 1500 osize, nsize, 1501 oblksize, nblksize, 1502 -1, -1, 0); 1503 } 1504 hammer2_mtx_ex(&ip->lock); 1505 } 1506 1507 static 1508 int 1509 hammer2_vop_nresolve(struct vop_nresolve_args *ap) 1510 { 1511 hammer2_xop_nresolve_t *xop; 1512 hammer2_inode_t *ip; 1513 hammer2_inode_t *dip; 1514 struct namecache *ncp; 1515 struct m_vnode *vp; 1516 int error; 1517 1518 dip = VTOI(ap->a_dvp); 1519 xop = hammer2_xop_alloc(dip, 0); 1520 1521 ncp = ap->a_nch->ncp; 1522 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen); 1523 1524 /* 1525 * Note: In DragonFly the kernel handles '.' and '..'. 1526 */ 1527 hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED); 1528 hammer2_xop_start(&xop->head, &hammer2_nresolve_desc); 1529 1530 error = hammer2_xop_collect(&xop->head, 0); 1531 error = hammer2_error_to_errno(error); 1532 if (error) { 1533 ip = NULL; 1534 } else { 1535 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1); 1536 } 1537 hammer2_inode_unlock(dip); 1538 1539 /* 1540 * Acquire the related vnode 1541 * 1542 * NOTE: For error processing, only ENOENT resolves the namecache 1543 * entry to NULL, otherwise we just return the error and 1544 * leave the namecache unresolved. 1545 * 1546 * WARNING: inode structure is locked exclusively via inode_get 1547 * but chain was locked shared. inode_unlock() 1548 * will handle it properly. 1549 */ 1550 if (ip) { 1551 vp = hammer2_igetv(ip, &error); /* error set to UNIX error */ 1552 if (error == 0) { 1553 vn_unlock(vp); 1554 cache_setvp(ap->a_nch, vp); 1555 *ap->a_vpp = vp; 1556 } else if (error == ENOENT) { 1557 cache_setvp(ap->a_nch, NULL); 1558 } 1559 hammer2_inode_unlock(ip); 1560 1561 /* 1562 * The vp should not be released until after we've disposed 1563 * of our locks, because it might cause vop_inactive() to 1564 * be called. 1565 */ 1566 if (vp) 1567 vrele(vp); 1568 } else { 1569 error = ENOENT; 1570 cache_setvp(ap->a_nch, NULL); 1571 } 1572 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 1573 /* 1574 KASSERT(error || ap->a_nch->ncp->nc_vp != NULL, 1575 ("resolve error %d/%p ap %p\n", 1576 error, ap->a_nch->ncp->nc_vp, ap)); 1577 */ 1578 1579 return error; 1580 } 1581 1582 int 1583 hammer2_nresolve(struct m_vnode *dvp, struct m_vnode **vpp, char *name, int nlen) 1584 { 1585 *vpp = NULL; 1586 struct namecache nc = { 1587 .nc_name = name, 1588 .nc_nlen = nlen, 1589 }; 1590 struct nchandle nch = { 1591 .ncp = &nc, 1592 }; 1593 struct vop_nresolve_args ap = { 1594 .a_nch = &nch, 1595 .a_dvp = dvp, 1596 .a_vpp = vpp, 1597 }; 1598 1599 return hammer2_vop_nresolve(&ap); 1600 } 1601 1602 static 1603 int 1604 hammer2_vop_nlookupdotdot(struct vop_nlookupdotdot_args *ap) 1605 { 1606 #if 0 1607 hammer2_inode_t *dip; 1608 hammer2_tid_t inum; 1609 int error; 1610 1611 dip = VTOI(ap->a_dvp); 1612 inum = dip->meta.iparent; 1613 *ap->a_vpp = NULL; 1614 1615 if (inum) { 1616 error = hammer2_vfs_vget(ap->a_dvp->v_mount, NULL, 1617 inum, ap->a_vpp); 1618 } else { 1619 error = ENOENT; 1620 } 1621 return error; 1622 #endif 1623 return (EOPNOTSUPP); 1624 } 1625 1626 static 1627 int 1628 hammer2_vop_nmkdir(struct vop_nmkdir_args *ap) 1629 { 1630 hammer2_inode_t *dip; 1631 hammer2_inode_t *nip; 1632 struct namecache *ncp; 1633 const char *name; 1634 size_t name_len; 1635 hammer2_tid_t inum; 1636 int error; 1637 1638 dip = VTOI(ap->a_dvp); 1639 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG)) 1640 return (EROFS); 1641 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 1642 return (ENOSPC); 1643 1644 ncp = ap->a_nch->ncp; 1645 name = ncp->nc_name; 1646 name_len = ncp->nc_nlen; 1647 1648 hammer2_trans_init(dip->pmp, 0); 1649 1650 inum = hammer2_trans_newinum(dip->pmp); 1651 1652 /* 1653 * Create the actual inode as a hidden file in the iroot, then 1654 * create the directory entry. The creation of the actual inode 1655 * sets its nlinks to 1 which is the value we desire. 1656 * 1657 * dip must be locked before nip to avoid deadlock. 1658 */ 1659 hammer2_inode_lock(dip, 0); 1660 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred, 1661 inum, &error); 1662 if (error) { 1663 error = hammer2_error_to_errno(error); 1664 } else { 1665 error = hammer2_dirent_create(dip, name, name_len, 1666 nip->meta.inum, nip->meta.type); 1667 /* returns UNIX error code */ 1668 } 1669 if (error) { 1670 if (nip) { 1671 hammer2_inode_unlink_finisher(nip, NULL); 1672 hammer2_inode_unlock(nip); 1673 nip = NULL; 1674 } 1675 *ap->a_vpp = NULL; 1676 } else { 1677 /* 1678 * inode_depend() must occur before the igetv() because 1679 * the igetv() can temporarily release the inode lock. 1680 */ 1681 hammer2_inode_depend(dip, nip); /* before igetv */ 1682 *ap->a_vpp = hammer2_igetv(nip, &error); 1683 hammer2_inode_unlock(nip); 1684 } 1685 1686 /* 1687 * Update dip's mtime 1688 * 1689 * We can use a shared inode lock and allow the meta.mtime update 1690 * SMP race. hammer2_inode_modify() is MPSAFE w/a shared lock. 1691 */ 1692 if (error == 0) { 1693 uint64_t mtime; 1694 1695 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 1696 hammer2_update_time(&mtime, true); 1697 hammer2_inode_modify(dip); 1698 dip->meta.mtime = mtime; 1699 /*hammer2_inode_unlock(dip);*/ 1700 } 1701 hammer2_inode_unlock(dip); 1702 1703 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 1704 1705 if (error == 0) { 1706 cache_setunresolved(ap->a_nch); 1707 cache_setvp(ap->a_nch, *ap->a_vpp); 1708 hammer2_knote(ap->a_dvp, NOTE_WRITE | NOTE_LINK); 1709 } 1710 return error; 1711 } 1712 1713 int 1714 hammer2_nmkdir(struct m_vnode *dvp, struct m_vnode **vpp, char *name, int nlen, 1715 mode_t mode) 1716 { 1717 struct namecache nc = { 1718 .nc_name = name, 1719 .nc_nlen = nlen, 1720 }; 1721 struct nchandle nch = { 1722 .ncp = &nc, 1723 }; 1724 uid_t va_uid = VNOVAL; //getuid(); 1725 uid_t va_gid = VNOVAL; //getgid(); 1726 struct vattr va = { 1727 .va_type = VDIR, 1728 .va_mode = mode & ~S_IFMT, 1729 .va_uid = va_uid, 1730 .va_gid = va_gid, 1731 }; 1732 struct vop_nmkdir_args ap = { 1733 .a_nch = &nch, 1734 .a_dvp = dvp, 1735 .a_vpp = vpp, 1736 .a_vap = &va, 1737 }; 1738 1739 return hammer2_vop_nmkdir(&ap); 1740 } 1741 1742 static 1743 int 1744 hammer2_vop_open(struct vop_open_args *ap) 1745 { 1746 #if 0 1747 return vop_stdopen(ap); 1748 #endif 1749 return (EOPNOTSUPP); 1750 } 1751 1752 /* 1753 * hammer2_vop_advlock { vp, id, op, fl, flags } 1754 */ 1755 static 1756 int 1757 hammer2_vop_advlock(struct vop_advlock_args *ap) 1758 { 1759 #if 0 1760 hammer2_inode_t *ip = VTOI(ap->a_vp); 1761 hammer2_off_t size; 1762 1763 size = ip->meta.size; 1764 return (lf_advlock(ap, &ip->advlock, size)); 1765 #endif 1766 return (EOPNOTSUPP); 1767 } 1768 1769 static 1770 int 1771 hammer2_vop_close(struct vop_close_args *ap) 1772 { 1773 #if 0 1774 return vop_stdclose(ap); 1775 #endif 1776 return (EOPNOTSUPP); 1777 } 1778 1779 /* 1780 * hammer2_vop_nlink { nch, dvp, vp, cred } 1781 * 1782 * Create a hardlink from (vp) to {dvp, nch}. 1783 */ 1784 static 1785 int 1786 hammer2_vop_nlink(struct vop_nlink_args *ap) 1787 { 1788 hammer2_inode_t *tdip; /* target directory to create link in */ 1789 hammer2_inode_t *ip; /* inode we are hardlinking to */ 1790 struct namecache *ncp; 1791 const char *name; 1792 size_t name_len; 1793 int error; 1794 uint64_t cmtime; 1795 1796 /* We know it's the same in makefs */ 1797 /* 1798 if (ap->a_dvp->v_mount != ap->a_vp->v_mount) 1799 return(EXDEV); 1800 */ 1801 1802 tdip = VTOI(ap->a_dvp); 1803 if (tdip->pmp->ronly || (tdip->pmp->flags & HAMMER2_PMPF_EMERG)) 1804 return (EROFS); 1805 if (hammer2_vfs_enospace(tdip, 0, ap->a_cred) > 1) 1806 return (ENOSPC); 1807 1808 ncp = ap->a_nch->ncp; 1809 name = ncp->nc_name; 1810 name_len = ncp->nc_nlen; 1811 1812 /* 1813 * ip represents the file being hardlinked. The file could be a 1814 * normal file or a hardlink target if it has already been hardlinked. 1815 * (with the new semantics, it will almost always be a hardlink 1816 * target). 1817 * 1818 * Bump nlinks and potentially also create or move the hardlink 1819 * target in the parent directory common to (ip) and (tdip). The 1820 * consolidation code can modify ip->cluster. The returned cluster 1821 * is locked. 1822 */ 1823 ip = VTOI(ap->a_vp); 1824 KASSERT(ip->pmp, ("ip->pmp is NULL %p %p", ip, ip->pmp)); 1825 hammer2_trans_init(ip->pmp, 0); 1826 1827 /* 1828 * Target should be an indexed inode or there's no way we will ever 1829 * be able to find it! 1830 */ 1831 KKASSERT((ip->meta.name_key & HAMMER2_DIRHASH_VISIBLE) == 0); 1832 1833 error = 0; 1834 1835 /* 1836 * Can return NULL and error == EXDEV if the common parent 1837 * crosses a directory with the xlink flag set. 1838 */ 1839 hammer2_inode_lock4(tdip, ip, NULL, NULL); 1840 1841 hammer2_update_time(&cmtime, true); 1842 1843 /* 1844 * Create the directory entry and bump nlinks. 1845 * Also update ip's ctime. 1846 */ 1847 if (error == 0) { 1848 error = hammer2_dirent_create(tdip, name, name_len, 1849 ip->meta.inum, ip->meta.type); 1850 hammer2_inode_modify(ip); 1851 ++ip->meta.nlinks; 1852 ip->meta.ctime = cmtime; 1853 } 1854 if (error == 0) { 1855 /* 1856 * Update dip's [cm]time 1857 */ 1858 hammer2_inode_modify(tdip); 1859 tdip->meta.mtime = cmtime; 1860 tdip->meta.ctime = cmtime; 1861 1862 cache_setunresolved(ap->a_nch); 1863 cache_setvp(ap->a_nch, ap->a_vp); 1864 } 1865 hammer2_inode_unlock(ip); 1866 hammer2_inode_unlock(tdip); 1867 1868 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ); 1869 hammer2_knote(ap->a_vp, NOTE_LINK); 1870 hammer2_knote(ap->a_dvp, NOTE_WRITE); 1871 1872 return error; 1873 } 1874 1875 int 1876 hammer2_nlink(struct m_vnode *dvp, struct m_vnode *vp, char *name, int nlen) 1877 { 1878 struct namecache nc = { 1879 .nc_name = name, 1880 .nc_nlen = nlen, 1881 }; 1882 struct nchandle nch = { 1883 .ncp = &nc, 1884 }; 1885 struct vop_nlink_args ap = { 1886 .a_nch = &nch, 1887 .a_dvp = dvp, 1888 .a_vp = vp, 1889 }; 1890 1891 return hammer2_vop_nlink(&ap); 1892 } 1893 1894 /* 1895 * hammer2_vop_ncreate { nch, dvp, vpp, cred, vap } 1896 * 1897 * The operating system has already ensured that the directory entry 1898 * does not exist and done all appropriate namespace locking. 1899 */ 1900 static 1901 int 1902 hammer2_vop_ncreate(struct vop_ncreate_args *ap) 1903 { 1904 hammer2_inode_t *dip; 1905 hammer2_inode_t *nip; 1906 struct namecache *ncp; 1907 const char *name; 1908 size_t name_len; 1909 hammer2_tid_t inum; 1910 int error; 1911 1912 dip = VTOI(ap->a_dvp); 1913 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG)) 1914 return (EROFS); 1915 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 1916 return (ENOSPC); 1917 1918 ncp = ap->a_nch->ncp; 1919 name = ncp->nc_name; 1920 name_len = ncp->nc_nlen; 1921 hammer2_trans_init(dip->pmp, 0); 1922 1923 inum = hammer2_trans_newinum(dip->pmp); 1924 1925 /* 1926 * Create the actual inode as a hidden file in the iroot, then 1927 * create the directory entry. The creation of the actual inode 1928 * sets its nlinks to 1 which is the value we desire. 1929 * 1930 * dip must be locked before nip to avoid deadlock. 1931 */ 1932 hammer2_inode_lock(dip, 0); 1933 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred, 1934 inum, &error); 1935 1936 if (error) { 1937 error = hammer2_error_to_errno(error); 1938 } else { 1939 error = hammer2_dirent_create(dip, name, name_len, 1940 nip->meta.inum, nip->meta.type); 1941 } 1942 if (error) { 1943 if (nip) { 1944 hammer2_inode_unlink_finisher(nip, NULL); 1945 hammer2_inode_unlock(nip); 1946 nip = NULL; 1947 } 1948 *ap->a_vpp = NULL; 1949 } else { 1950 hammer2_inode_depend(dip, nip); /* before igetv */ 1951 *ap->a_vpp = hammer2_igetv(nip, &error); 1952 hammer2_inode_unlock(nip); 1953 } 1954 1955 /* 1956 * Update dip's mtime 1957 */ 1958 if (error == 0) { 1959 uint64_t mtime; 1960 1961 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 1962 hammer2_update_time(&mtime, true); 1963 hammer2_inode_modify(dip); 1964 dip->meta.mtime = mtime; 1965 /*hammer2_inode_unlock(dip);*/ 1966 } 1967 hammer2_inode_unlock(dip); 1968 1969 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 1970 1971 if (error == 0) { 1972 cache_setunresolved(ap->a_nch); 1973 cache_setvp(ap->a_nch, *ap->a_vpp); 1974 hammer2_knote(ap->a_dvp, NOTE_WRITE); 1975 } 1976 return error; 1977 } 1978 1979 int 1980 hammer2_ncreate(struct m_vnode *dvp, struct m_vnode **vpp, char *name, int nlen, 1981 mode_t mode) 1982 { 1983 struct namecache nc = { 1984 .nc_name = name, 1985 .nc_nlen = nlen, 1986 }; 1987 struct nchandle nch = { 1988 .ncp = &nc, 1989 }; 1990 uid_t va_uid = VNOVAL; //getuid(); 1991 uid_t va_gid = VNOVAL; //getgid(); 1992 struct vattr va = { 1993 .va_type = VREG, 1994 .va_mode = mode & ~S_IFMT, 1995 .va_uid = va_uid, 1996 .va_gid = va_gid, 1997 }; 1998 struct vop_ncreate_args ap = { 1999 .a_nch = &nch, 2000 .a_dvp = dvp, 2001 .a_vpp = vpp, 2002 .a_vap = &va, 2003 }; 2004 2005 return hammer2_vop_ncreate(&ap); 2006 } 2007 2008 /* 2009 * Make a device node (typically a fifo) 2010 */ 2011 static 2012 int 2013 hammer2_vop_nmknod(struct vop_nmknod_args *ap) 2014 { 2015 hammer2_inode_t *dip; 2016 hammer2_inode_t *nip; 2017 struct namecache *ncp; 2018 const char *name; 2019 size_t name_len; 2020 hammer2_tid_t inum; 2021 int error; 2022 2023 dip = VTOI(ap->a_dvp); 2024 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG)) 2025 return (EROFS); 2026 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 2027 return (ENOSPC); 2028 2029 ncp = ap->a_nch->ncp; 2030 name = ncp->nc_name; 2031 name_len = ncp->nc_nlen; 2032 hammer2_trans_init(dip->pmp, 0); 2033 2034 /* 2035 * Create the device inode and then create the directory entry. 2036 * 2037 * dip must be locked before nip to avoid deadlock. 2038 */ 2039 inum = hammer2_trans_newinum(dip->pmp); 2040 2041 hammer2_inode_lock(dip, 0); 2042 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred, 2043 inum, &error); 2044 if (error == 0) { 2045 error = hammer2_dirent_create(dip, name, name_len, 2046 nip->meta.inum, nip->meta.type); 2047 } 2048 if (error) { 2049 if (nip) { 2050 hammer2_inode_unlink_finisher(nip, NULL); 2051 hammer2_inode_unlock(nip); 2052 nip = NULL; 2053 } 2054 *ap->a_vpp = NULL; 2055 } else { 2056 hammer2_inode_depend(dip, nip); /* before igetv */ 2057 *ap->a_vpp = hammer2_igetv(nip, &error); 2058 hammer2_inode_unlock(nip); 2059 } 2060 2061 /* 2062 * Update dip's mtime 2063 */ 2064 if (error == 0) { 2065 uint64_t mtime; 2066 2067 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 2068 hammer2_update_time(&mtime, true); 2069 hammer2_inode_modify(dip); 2070 dip->meta.mtime = mtime; 2071 /*hammer2_inode_unlock(dip);*/ 2072 } 2073 hammer2_inode_unlock(dip); 2074 2075 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 2076 2077 if (error == 0) { 2078 cache_setunresolved(ap->a_nch); 2079 cache_setvp(ap->a_nch, *ap->a_vpp); 2080 hammer2_knote(ap->a_dvp, NOTE_WRITE); 2081 } 2082 return error; 2083 } 2084 2085 int 2086 hammer2_nmknod(struct m_vnode *dvp, struct m_vnode **vpp, char *name, int nlen, 2087 int type, mode_t mode) 2088 { 2089 struct namecache nc = { 2090 .nc_name = name, 2091 .nc_nlen = nlen, 2092 }; 2093 struct nchandle nch = { 2094 .ncp = &nc, 2095 }; 2096 uid_t va_uid = VNOVAL; //getuid(); 2097 uid_t va_gid = VNOVAL; //getgid(); 2098 struct vattr va = { 2099 .va_type = type, 2100 .va_mode = mode & ~S_IFMT, 2101 .va_uid = va_uid, 2102 .va_gid = va_gid, 2103 }; 2104 struct vop_nmknod_args ap = { 2105 .a_nch = &nch, 2106 .a_dvp = dvp, 2107 .a_vpp = vpp, 2108 .a_vap = &va, 2109 }; 2110 2111 return hammer2_vop_nmknod(&ap); 2112 } 2113 2114 /* 2115 * hammer2_vop_nsymlink { nch, dvp, vpp, cred, vap, target } 2116 */ 2117 static 2118 int 2119 hammer2_vop_nsymlink(struct vop_nsymlink_args *ap) 2120 { 2121 hammer2_inode_t *dip; 2122 hammer2_inode_t *nip; 2123 struct namecache *ncp; 2124 const char *name; 2125 size_t name_len; 2126 hammer2_tid_t inum; 2127 int error; 2128 2129 dip = VTOI(ap->a_dvp); 2130 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG)) 2131 return (EROFS); 2132 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 2133 return (ENOSPC); 2134 2135 ncp = ap->a_nch->ncp; 2136 name = ncp->nc_name; 2137 name_len = ncp->nc_nlen; 2138 hammer2_trans_init(dip->pmp, 0); 2139 2140 ap->a_vap->va_type = VLNK; /* enforce type */ 2141 2142 /* 2143 * Create the softlink as an inode and then create the directory 2144 * entry. 2145 * 2146 * dip must be locked before nip to avoid deadlock. 2147 */ 2148 inum = hammer2_trans_newinum(dip->pmp); 2149 2150 hammer2_inode_lock(dip, 0); 2151 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred, 2152 inum, &error); 2153 if (error == 0) { 2154 error = hammer2_dirent_create(dip, name, name_len, 2155 nip->meta.inum, nip->meta.type); 2156 } 2157 if (error) { 2158 if (nip) { 2159 hammer2_inode_unlink_finisher(nip, NULL); 2160 hammer2_inode_unlock(nip); 2161 nip = NULL; 2162 } 2163 *ap->a_vpp = NULL; 2164 hammer2_inode_unlock(dip); 2165 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 2166 return error; 2167 } 2168 hammer2_inode_depend(dip, nip); /* before igetv */ 2169 *ap->a_vpp = hammer2_igetv(nip, &error); 2170 2171 /* 2172 * Build the softlink (~like file data) and finalize the namecache. 2173 */ 2174 if (error == 0) { 2175 size_t bytes; 2176 struct uio auio; 2177 struct iovec aiov; 2178 2179 bytes = strlen(ap->a_target); 2180 2181 hammer2_inode_unlock(nip); 2182 bzero(&auio, sizeof(auio)); 2183 bzero(&aiov, sizeof(aiov)); 2184 auio.uio_iov = &aiov; 2185 auio.uio_segflg = UIO_SYSSPACE; 2186 auio.uio_rw = UIO_WRITE; 2187 auio.uio_resid = bytes; 2188 auio.uio_iovcnt = 1; 2189 auio.uio_td = curthread; 2190 aiov.iov_base = ap->a_target; 2191 aiov.iov_len = bytes; 2192 error = hammer2_write_file(nip, &auio, IO_APPEND, 0); 2193 /* XXX handle error */ 2194 error = 0; 2195 } else { 2196 hammer2_inode_unlock(nip); 2197 } 2198 2199 /* 2200 * Update dip's mtime 2201 */ 2202 if (error == 0) { 2203 uint64_t mtime; 2204 2205 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 2206 hammer2_update_time(&mtime, true); 2207 hammer2_inode_modify(dip); 2208 dip->meta.mtime = mtime; 2209 /*hammer2_inode_unlock(dip);*/ 2210 } 2211 hammer2_inode_unlock(dip); 2212 2213 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 2214 2215 /* 2216 * Finalize namecache 2217 */ 2218 if (error == 0) { 2219 cache_setunresolved(ap->a_nch); 2220 cache_setvp(ap->a_nch, *ap->a_vpp); 2221 hammer2_knote(ap->a_dvp, NOTE_WRITE); 2222 } 2223 return error; 2224 } 2225 2226 int 2227 hammer2_nsymlink(struct m_vnode *dvp, struct m_vnode **vpp, char *name, int nlen, 2228 char *target, mode_t mode) 2229 { 2230 struct namecache nc = { 2231 .nc_name = name, 2232 .nc_nlen = nlen, 2233 }; 2234 struct nchandle nch = { 2235 .ncp = &nc, 2236 }; 2237 uid_t va_uid = VNOVAL; //getuid(); 2238 uid_t va_gid = VNOVAL; //getgid(); 2239 struct vattr va = { 2240 .va_type = VDIR, 2241 .va_mode = mode & ~S_IFMT, 2242 .va_uid = va_uid, 2243 .va_gid = va_gid, 2244 }; 2245 struct vop_nsymlink_args ap = { 2246 .a_nch = &nch, 2247 .a_dvp = dvp, 2248 .a_vpp = vpp, 2249 .a_vap = &va, 2250 .a_target = target, 2251 }; 2252 2253 return hammer2_vop_nsymlink(&ap); 2254 } 2255 2256 /* 2257 * hammer2_vop_nremove { nch, dvp, cred } 2258 */ 2259 static 2260 int 2261 hammer2_vop_nremove(struct vop_nremove_args *ap) 2262 { 2263 #if 0 2264 hammer2_xop_unlink_t *xop; 2265 hammer2_inode_t *dip; 2266 hammer2_inode_t *ip; 2267 struct m_vnode *vprecycle; 2268 struct namecache *ncp; 2269 int error; 2270 2271 dip = VTOI(ap->a_dvp); 2272 if (dip->pmp->ronly) 2273 return (EROFS); 2274 #if 0 2275 /* allow removals, except user to also bulkfree */ 2276 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 2277 return (ENOSPC); 2278 #endif 2279 2280 ncp = ap->a_nch->ncp; 2281 2282 if (hammer2_debug_inode && dip->meta.inum == hammer2_debug_inode) { 2283 kprintf("hammer2: attempt to delete inside debug inode: %s\n", 2284 ncp->nc_name); 2285 while (hammer2_debug_inode && 2286 dip->meta.inum == hammer2_debug_inode) { 2287 tsleep(&hammer2_debug_inode, 0, "h2debug", hz*5); 2288 } 2289 } 2290 2291 hammer2_trans_init(dip->pmp, 0); 2292 hammer2_inode_lock(dip, 0); 2293 2294 /* 2295 * The unlink XOP unlinks the path from the directory and 2296 * locates and returns the cluster associated with the real inode. 2297 * We have to handle nlinks here on the frontend. 2298 */ 2299 xop = hammer2_xop_alloc(dip, HAMMER2_XOP_MODIFYING); 2300 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen); 2301 2302 xop->isdir = 0; 2303 xop->dopermanent = 0; 2304 hammer2_xop_start(&xop->head, &hammer2_unlink_desc); 2305 2306 /* 2307 * Collect the real inode and adjust nlinks, destroy the real 2308 * inode if nlinks transitions to 0 and it was the real inode 2309 * (else it has already been removed). 2310 */ 2311 error = hammer2_xop_collect(&xop->head, 0); 2312 error = hammer2_error_to_errno(error); 2313 vprecycle = NULL; 2314 2315 if (error == 0) { 2316 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1); 2317 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 2318 if (ip) { 2319 if (hammer2_debug_inode && 2320 ip->meta.inum == hammer2_debug_inode) { 2321 kprintf("hammer2: attempt to delete debug " 2322 "inode!\n"); 2323 while (hammer2_debug_inode && 2324 ip->meta.inum == hammer2_debug_inode) { 2325 tsleep(&hammer2_debug_inode, 0, 2326 "h2debug", hz*5); 2327 } 2328 } 2329 hammer2_inode_unlink_finisher(ip, &vprecycle); 2330 hammer2_inode_depend(dip, ip); /* after modified */ 2331 hammer2_inode_unlock(ip); 2332 } 2333 } else { 2334 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 2335 } 2336 2337 /* 2338 * Update dip's mtime 2339 */ 2340 if (error == 0) { 2341 uint64_t mtime; 2342 2343 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 2344 hammer2_update_time(&mtime); 2345 hammer2_inode_modify(dip); 2346 dip->meta.mtime = mtime; 2347 /*hammer2_inode_unlock(dip);*/ 2348 } 2349 hammer2_inode_unlock(dip); 2350 2351 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 2352 if (error == 0) { 2353 cache_unlink(ap->a_nch); 2354 hammer2_knote(ap->a_dvp, NOTE_WRITE); 2355 } 2356 if (vprecycle) 2357 hammer2_inode_vprecycle(vprecycle); 2358 2359 return (error); 2360 #endif 2361 return (EOPNOTSUPP); 2362 } 2363 2364 /* 2365 * hammer2_vop_nrmdir { nch, dvp, cred } 2366 */ 2367 static 2368 int 2369 hammer2_vop_nrmdir(struct vop_nrmdir_args *ap) 2370 { 2371 #if 0 2372 hammer2_xop_unlink_t *xop; 2373 hammer2_inode_t *dip; 2374 hammer2_inode_t *ip; 2375 struct namecache *ncp; 2376 struct m_vnode *vprecycle; 2377 int error; 2378 2379 dip = VTOI(ap->a_dvp); 2380 if (dip->pmp->ronly) 2381 return (EROFS); 2382 #if 0 2383 /* allow removals, except user to also bulkfree */ 2384 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1) 2385 return (ENOSPC); 2386 #endif 2387 2388 hammer2_trans_init(dip->pmp, 0); 2389 hammer2_inode_lock(dip, 0); 2390 2391 xop = hammer2_xop_alloc(dip, HAMMER2_XOP_MODIFYING); 2392 2393 ncp = ap->a_nch->ncp; 2394 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen); 2395 xop->isdir = 1; 2396 xop->dopermanent = 0; 2397 hammer2_xop_start(&xop->head, &hammer2_unlink_desc); 2398 2399 /* 2400 * Collect the real inode and adjust nlinks, destroy the real 2401 * inode if nlinks transitions to 0 and it was the real inode 2402 * (else it has already been removed). 2403 */ 2404 error = hammer2_xop_collect(&xop->head, 0); 2405 error = hammer2_error_to_errno(error); 2406 vprecycle = NULL; 2407 2408 if (error == 0) { 2409 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1); 2410 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 2411 if (ip) { 2412 hammer2_inode_unlink_finisher(ip, &vprecycle); 2413 hammer2_inode_depend(dip, ip); /* after modified */ 2414 hammer2_inode_unlock(ip); 2415 } 2416 } else { 2417 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP); 2418 } 2419 2420 /* 2421 * Update dip's mtime 2422 */ 2423 if (error == 0) { 2424 uint64_t mtime; 2425 2426 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/ 2427 hammer2_update_time(&mtime); 2428 hammer2_inode_modify(dip); 2429 dip->meta.mtime = mtime; 2430 /*hammer2_inode_unlock(dip);*/ 2431 } 2432 hammer2_inode_unlock(dip); 2433 2434 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ); 2435 if (error == 0) { 2436 cache_unlink(ap->a_nch); 2437 hammer2_knote(ap->a_dvp, NOTE_WRITE | NOTE_LINK); 2438 } 2439 if (vprecycle) 2440 hammer2_inode_vprecycle(vprecycle); 2441 return (error); 2442 #endif 2443 return (EOPNOTSUPP); 2444 } 2445 2446 /* 2447 * hammer2_vop_nrename { fnch, tnch, fdvp, tdvp, cred } 2448 */ 2449 static 2450 int 2451 hammer2_vop_nrename(struct vop_nrename_args *ap) 2452 { 2453 #if 0 2454 struct namecache *fncp; 2455 struct namecache *tncp; 2456 hammer2_inode_t *fdip; /* source directory */ 2457 hammer2_inode_t *tdip; /* target directory */ 2458 hammer2_inode_t *ip; /* file being renamed */ 2459 hammer2_inode_t *tip; /* replaced target during rename or NULL */ 2460 struct m_vnode *vprecycle; 2461 const char *fname; 2462 size_t fname_len; 2463 const char *tname; 2464 size_t tname_len; 2465 int error; 2466 int update_tdip; 2467 int update_fdip; 2468 hammer2_key_t tlhc; 2469 2470 if (ap->a_fdvp->v_mount != ap->a_tdvp->v_mount) 2471 return(EXDEV); 2472 if (ap->a_fdvp->v_mount != ap->a_fnch->ncp->nc_vp->v_mount) 2473 return(EXDEV); 2474 2475 fdip = VTOI(ap->a_fdvp); /* source directory */ 2476 tdip = VTOI(ap->a_tdvp); /* target directory */ 2477 2478 if (fdip->pmp->ronly || (fdip->pmp->flags & HAMMER2_PMPF_EMERG)) 2479 return (EROFS); 2480 if (hammer2_vfs_enospace(fdip, 0, ap->a_cred) > 1) 2481 return (ENOSPC); 2482 2483 fncp = ap->a_fnch->ncp; /* entry name in source */ 2484 fname = fncp->nc_name; 2485 fname_len = fncp->nc_nlen; 2486 2487 tncp = ap->a_tnch->ncp; /* entry name in target */ 2488 tname = tncp->nc_name; 2489 tname_len = tncp->nc_nlen; 2490 2491 hammer2_trans_init(tdip->pmp, 0); 2492 2493 update_tdip = 0; 2494 update_fdip = 0; 2495 2496 ip = VTOI(fncp->nc_vp); 2497 hammer2_inode_ref(ip); /* extra ref */ 2498 2499 /* 2500 * Lookup the target name to determine if a directory entry 2501 * is being overwritten. We only hold related inode locks 2502 * temporarily, the operating system is expected to protect 2503 * against rename races. 2504 */ 2505 tip = tncp->nc_vp ? VTOI(tncp->nc_vp) : NULL; 2506 if (tip) 2507 hammer2_inode_ref(tip); /* extra ref */ 2508 2509 /* 2510 * Can return NULL and error == EXDEV if the common parent 2511 * crosses a directory with the xlink flag set. 2512 * 2513 * For now try to avoid deadlocks with a simple pointer address 2514 * test. (tip) can be NULL. 2515 */ 2516 error = 0; 2517 { 2518 hammer2_inode_t *ip1 = fdip; 2519 hammer2_inode_t *ip2 = tdip; 2520 hammer2_inode_t *ip3 = ip; 2521 hammer2_inode_t *ip4 = tip; /* may be NULL */ 2522 2523 if (fdip > tdip) { 2524 ip1 = tdip; 2525 ip2 = fdip; 2526 } 2527 if (tip && ip > tip) { 2528 ip3 = tip; 2529 ip4 = ip; 2530 } 2531 hammer2_inode_lock4(ip1, ip2, ip3, ip4); 2532 } 2533 2534 /* 2535 * Resolve the collision space for (tdip, tname, tname_len) 2536 * 2537 * tdip must be held exclusively locked to prevent races since 2538 * multiple filenames can end up in the same collision space. 2539 */ 2540 { 2541 hammer2_xop_scanlhc_t *sxop; 2542 hammer2_tid_t lhcbase; 2543 2544 tlhc = hammer2_dirhash(tname, tname_len); 2545 lhcbase = tlhc; 2546 sxop = hammer2_xop_alloc(tdip, HAMMER2_XOP_MODIFYING); 2547 sxop->lhc = tlhc; 2548 hammer2_xop_start(&sxop->head, &hammer2_scanlhc_desc); 2549 while ((error = hammer2_xop_collect(&sxop->head, 0)) == 0) { 2550 if (tlhc != sxop->head.cluster.focus->bref.key) 2551 break; 2552 ++tlhc; 2553 } 2554 error = hammer2_error_to_errno(error); 2555 hammer2_xop_retire(&sxop->head, HAMMER2_XOPMASK_VOP); 2556 2557 if (error) { 2558 if (error != ENOENT) 2559 goto done2; 2560 ++tlhc; 2561 error = 0; 2562 } 2563 if ((lhcbase ^ tlhc) & ~HAMMER2_DIRHASH_LOMASK) { 2564 error = ENOSPC; 2565 goto done2; 2566 } 2567 } 2568 2569 /* 2570 * Ready to go, issue the rename to the backend. Note that meta-data 2571 * updates to the related inodes occur separately from the rename 2572 * operation. 2573 * 2574 * NOTE: While it is not necessary to update ip->meta.name*, doing 2575 * so aids catastrophic recovery and debugging. 2576 */ 2577 if (error == 0) { 2578 hammer2_xop_nrename_t *xop4; 2579 2580 xop4 = hammer2_xop_alloc(fdip, HAMMER2_XOP_MODIFYING); 2581 xop4->lhc = tlhc; 2582 xop4->ip_key = ip->meta.name_key; 2583 hammer2_xop_setip2(&xop4->head, ip); 2584 hammer2_xop_setip3(&xop4->head, tdip); 2585 if (tip && tip->meta.type == HAMMER2_OBJTYPE_DIRECTORY) 2586 hammer2_xop_setip4(&xop4->head, tip); 2587 hammer2_xop_setname(&xop4->head, fname, fname_len); 2588 hammer2_xop_setname2(&xop4->head, tname, tname_len); 2589 hammer2_xop_start(&xop4->head, &hammer2_nrename_desc); 2590 2591 error = hammer2_xop_collect(&xop4->head, 0); 2592 error = hammer2_error_to_errno(error); 2593 hammer2_xop_retire(&xop4->head, HAMMER2_XOPMASK_VOP); 2594 2595 if (error == ENOENT) 2596 error = 0; 2597 2598 /* 2599 * Update inode meta-data. 2600 * 2601 * WARNING! The in-memory inode (ip) structure does not 2602 * maintain a copy of the inode's filename buffer. 2603 */ 2604 if (error == 0 && 2605 (ip->meta.name_key & HAMMER2_DIRHASH_VISIBLE)) { 2606 hammer2_inode_modify(ip); 2607 ip->meta.name_len = tname_len; 2608 ip->meta.name_key = tlhc; 2609 } 2610 if (error == 0) { 2611 hammer2_inode_modify(ip); 2612 ip->meta.iparent = tdip->meta.inum; 2613 } 2614 update_fdip = 1; 2615 update_tdip = 1; 2616 } 2617 2618 done2: 2619 /* 2620 * If no error, the backend has replaced the target directory entry. 2621 * We must adjust nlinks on the original replace target if it exists. 2622 */ 2623 vprecycle = NULL; 2624 if (error == 0 && tip) { 2625 hammer2_inode_unlink_finisher(tip, &vprecycle); 2626 } 2627 2628 /* 2629 * Update directory mtimes to represent the something changed. 2630 */ 2631 if (update_fdip || update_tdip) { 2632 uint64_t mtime; 2633 2634 hammer2_update_time(&mtime); 2635 if (update_fdip) { 2636 hammer2_inode_modify(fdip); 2637 fdip->meta.mtime = mtime; 2638 } 2639 if (update_tdip) { 2640 hammer2_inode_modify(tdip); 2641 tdip->meta.mtime = mtime; 2642 } 2643 } 2644 if (tip) { 2645 hammer2_inode_unlock(tip); 2646 hammer2_inode_drop(tip); 2647 } 2648 hammer2_inode_unlock(ip); 2649 hammer2_inode_unlock(tdip); 2650 hammer2_inode_unlock(fdip); 2651 hammer2_inode_drop(ip); 2652 hammer2_trans_done(tdip->pmp, HAMMER2_TRANS_SIDEQ); 2653 2654 /* 2655 * Issue the namecache update after unlocking all the internal 2656 * hammer2 structures, otherwise we might deadlock. 2657 * 2658 * WARNING! The target namespace must be updated atomically, 2659 * and we depend on cache_rename() to handle that for 2660 * us. Do not do a separate cache_unlink() because 2661 * that leaves a small window of opportunity for other 2662 * threads to allocate the target namespace before we 2663 * manage to complete our rename. 2664 * 2665 * WARNING! cache_rename() (and cache_unlink()) will properly 2666 * set VREF_FINALIZE on any attached vnode. Do not 2667 * call cache_setunresolved() manually before-hand as 2668 * this will prevent the flag from being set later via 2669 * cache_rename(). If VREF_FINALIZE is not properly set 2670 * and the inode is no longer in the topology, related 2671 * chains can remain dirty indefinitely. 2672 */ 2673 if (error == 0 && tip) { 2674 /*cache_unlink(ap->a_tnch); see above */ 2675 /*cache_setunresolved(ap->a_tnch); see above */ 2676 } 2677 if (error == 0) { 2678 cache_rename(ap->a_fnch, ap->a_tnch); 2679 hammer2_knote(ap->a_fdvp, NOTE_WRITE); 2680 hammer2_knote(ap->a_tdvp, NOTE_WRITE); 2681 hammer2_knote(fncp->nc_vp, NOTE_RENAME); 2682 } 2683 if (vprecycle) 2684 hammer2_inode_vprecycle(vprecycle); 2685 2686 return (error); 2687 #endif 2688 return (EOPNOTSUPP); 2689 } 2690 2691 /* 2692 * hammer2_vop_ioctl { vp, command, data, fflag, cred } 2693 */ 2694 static 2695 int 2696 hammer2_vop_ioctl(struct vop_ioctl_args *ap) 2697 { 2698 #if 0 2699 hammer2_inode_t *ip; 2700 int error; 2701 2702 ip = VTOI(ap->a_vp); 2703 2704 error = hammer2_ioctl(ip, ap->a_command, (void *)ap->a_data, 2705 ap->a_fflag, ap->a_cred); 2706 return (error); 2707 #endif 2708 return (EOPNOTSUPP); 2709 } 2710 2711 static 2712 int 2713 hammer2_vop_mountctl(struct vop_mountctl_args *ap) 2714 { 2715 #if 0 2716 struct mount *mp; 2717 hammer2_pfs_t *pmp; 2718 int rc; 2719 2720 switch (ap->a_op) { 2721 case (MOUNTCTL_SET_EXPORT): 2722 mp = ap->a_head.a_ops->head.vv_mount; 2723 pmp = MPTOPMP(mp); 2724 2725 if (ap->a_ctllen != sizeof(struct export_args)) 2726 rc = (EINVAL); 2727 else 2728 rc = vfs_export(mp, &pmp->export, 2729 (const struct export_args *)ap->a_ctl); 2730 break; 2731 default: 2732 rc = vop_stdmountctl(ap); 2733 break; 2734 } 2735 return (rc); 2736 #endif 2737 return (EOPNOTSUPP); 2738 } 2739 2740 /* 2741 * KQFILTER 2742 */ 2743 /* 2744 static void filt_hammer2detach(struct knote *kn); 2745 static int filt_hammer2read(struct knote *kn, long hint); 2746 static int filt_hammer2write(struct knote *kn, long hint); 2747 static int filt_hammer2vnode(struct knote *kn, long hint); 2748 2749 static struct filterops hammer2read_filtops = 2750 { FILTEROP_ISFD | FILTEROP_MPSAFE, 2751 NULL, filt_hammer2detach, filt_hammer2read }; 2752 static struct filterops hammer2write_filtops = 2753 { FILTEROP_ISFD | FILTEROP_MPSAFE, 2754 NULL, filt_hammer2detach, filt_hammer2write }; 2755 static struct filterops hammer2vnode_filtops = 2756 { FILTEROP_ISFD | FILTEROP_MPSAFE, 2757 NULL, filt_hammer2detach, filt_hammer2vnode }; 2758 */ 2759 2760 static 2761 int 2762 hammer2_vop_kqfilter(struct vop_kqfilter_args *ap) 2763 { 2764 #if 0 2765 struct m_vnode *vp = ap->a_vp; 2766 struct knote *kn = ap->a_kn; 2767 2768 switch (kn->kn_filter) { 2769 case EVFILT_READ: 2770 kn->kn_fop = &hammer2read_filtops; 2771 break; 2772 case EVFILT_WRITE: 2773 kn->kn_fop = &hammer2write_filtops; 2774 break; 2775 case EVFILT_VNODE: 2776 kn->kn_fop = &hammer2vnode_filtops; 2777 break; 2778 default: 2779 return (EOPNOTSUPP); 2780 } 2781 2782 kn->kn_hook = (caddr_t)vp; 2783 2784 knote_insert(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn); 2785 2786 return(0); 2787 #endif 2788 return (EOPNOTSUPP); 2789 } 2790 2791 #if 0 2792 static void 2793 filt_hammer2detach(struct knote *kn) 2794 { 2795 struct m_vnode *vp = (void *)kn->kn_hook; 2796 2797 knote_remove(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn); 2798 } 2799 2800 static int 2801 filt_hammer2read(struct knote *kn, long hint) 2802 { 2803 struct m_vnode *vp = (void *)kn->kn_hook; 2804 hammer2_inode_t *ip = VTOI(vp); 2805 off_t off; 2806 2807 if (hint == NOTE_REVOKE) { 2808 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT); 2809 return(1); 2810 } 2811 off = ip->meta.size - kn->kn_fp->f_offset; 2812 kn->kn_data = (off < INTPTR_MAX) ? off : INTPTR_MAX; 2813 if (kn->kn_sfflags & NOTE_OLDAPI) 2814 return(1); 2815 return (kn->kn_data != 0); 2816 } 2817 2818 2819 static int 2820 filt_hammer2write(struct knote *kn, long hint) 2821 { 2822 if (hint == NOTE_REVOKE) 2823 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT); 2824 kn->kn_data = 0; 2825 return (1); 2826 } 2827 2828 static int 2829 filt_hammer2vnode(struct knote *kn, long hint) 2830 { 2831 if (kn->kn_sfflags & hint) 2832 kn->kn_fflags |= hint; 2833 if (hint == NOTE_REVOKE) { 2834 kn->kn_flags |= (EV_EOF | EV_NODATA); 2835 return (1); 2836 } 2837 return (kn->kn_fflags != 0); 2838 } 2839 #endif 2840 2841 /* 2842 * FIFO VOPS 2843 */ 2844 static 2845 int 2846 hammer2_vop_markatime(struct vop_markatime_args *ap) 2847 { 2848 #if 0 2849 hammer2_inode_t *ip; 2850 struct m_vnode *vp; 2851 2852 vp = ap->a_vp; 2853 ip = VTOI(vp); 2854 2855 if (ip->pmp->ronly || (ip->pmp->flags & HAMMER2_PMPF_EMERG)) 2856 return (EROFS); 2857 return(0); 2858 #endif 2859 return (EOPNOTSUPP); 2860 } 2861 2862 static 2863 int 2864 hammer2_vop_fifokqfilter(struct vop_kqfilter_args *ap) 2865 { 2866 #if 0 2867 int error; 2868 2869 error = VOCALL(&fifo_vnode_vops, &ap->a_head); 2870 if (error) 2871 error = hammer2_vop_kqfilter(ap); 2872 return(error); 2873 #endif 2874 return (EOPNOTSUPP); 2875 } 2876 2877 /* 2878 * VOPS vector 2879 */ 2880 struct vop_ops hammer2_vnode_vops = { 2881 .vop_default = vop_defaultop, 2882 .vop_fsync = hammer2_vop_fsync, 2883 .vop_getpages = vop_stdgetpages, 2884 .vop_putpages = vop_stdputpages, 2885 .vop_access = hammer2_vop_access, 2886 .vop_advlock = hammer2_vop_advlock, 2887 .vop_close = hammer2_vop_close, 2888 .vop_nlink = hammer2_vop_nlink, 2889 .vop_ncreate = hammer2_vop_ncreate, 2890 .vop_nsymlink = hammer2_vop_nsymlink, 2891 .vop_nremove = hammer2_vop_nremove, 2892 .vop_nrmdir = hammer2_vop_nrmdir, 2893 .vop_nrename = hammer2_vop_nrename, 2894 .vop_getattr = hammer2_vop_getattr, 2895 .vop_getattr_lite = hammer2_vop_getattr_lite, 2896 .vop_setattr = hammer2_vop_setattr, 2897 .vop_readdir = hammer2_vop_readdir, 2898 .vop_readlink = hammer2_vop_readlink, 2899 .vop_read = hammer2_vop_read, 2900 .vop_write = hammer2_vop_write, 2901 .vop_open = hammer2_vop_open, 2902 .vop_inactive = hammer2_vop_inactive, 2903 .vop_reclaim = hammer2_vop_reclaim, 2904 .vop_nresolve = hammer2_vop_nresolve, 2905 .vop_nlookupdotdot = hammer2_vop_nlookupdotdot, 2906 .vop_nmkdir = hammer2_vop_nmkdir, 2907 .vop_nmknod = hammer2_vop_nmknod, 2908 .vop_ioctl = hammer2_vop_ioctl, 2909 .vop_mountctl = hammer2_vop_mountctl, 2910 .vop_bmap = hammer2_vop_bmap, 2911 .vop_strategy = hammer2_vop_strategy, 2912 .vop_kqfilter = hammer2_vop_kqfilter 2913 }; 2914 2915 struct vop_ops hammer2_spec_vops = { 2916 .vop_default = vop_defaultop, 2917 .vop_fsync = hammer2_vop_fsync, 2918 .vop_read = vop_stdnoread, 2919 .vop_write = vop_stdnowrite, 2920 .vop_access = hammer2_vop_access, 2921 .vop_close = hammer2_vop_close, 2922 .vop_markatime = hammer2_vop_markatime, 2923 .vop_getattr = hammer2_vop_getattr, 2924 .vop_inactive = hammer2_vop_inactive, 2925 .vop_reclaim = hammer2_vop_reclaim, 2926 .vop_setattr = hammer2_vop_setattr 2927 }; 2928 2929 struct vop_ops hammer2_fifo_vops = { 2930 .vop_default = fifo_vnoperate, 2931 .vop_fsync = hammer2_vop_fsync, 2932 #if 0 2933 .vop_read = hammer2_vop_fiforead, 2934 .vop_write = hammer2_vop_fifowrite, 2935 #endif 2936 .vop_access = hammer2_vop_access, 2937 #if 0 2938 .vop_close = hammer2_vop_fifoclose, 2939 #endif 2940 .vop_markatime = hammer2_vop_markatime, 2941 .vop_getattr = hammer2_vop_getattr, 2942 .vop_inactive = hammer2_vop_inactive, 2943 .vop_reclaim = hammer2_vop_reclaim, 2944 .vop_setattr = hammer2_vop_setattr, 2945 .vop_kqfilter = hammer2_vop_fifokqfilter 2946 }; 2947 2948