Add PCI IDs for Intel's ICH7 and ICH7M ATA/SATA hardware, used in
[dragonfly.git] / sys / kern / vfs_subr.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1989, 1993
3 * The Regents of the University of California. All rights reserved.
4 * (c) UNIX System Laboratories, Inc.
5 * All or some portions of this file are derived from material licensed
6 * to the University of California by American Telephone and Telegraph
7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8 * the permission of UNIX System Laboratories, Inc.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)vfs_subr.c 8.31 (Berkeley) 5/26/95
39 * $FreeBSD: src/sys/kern/vfs_subr.c,v 1.249.2.30 2003/04/04 20:35:57 tegge Exp $
54078292 40 * $DragonFly: src/sys/kern/vfs_subr.c,v 1.71 2006/03/24 18:35:33 dillon Exp $
984263bc
MD
41 */
42
43/*
44 * External virtual filesystem routines
45 */
46#include "opt_ddb.h"
47
48#include <sys/param.h>
49#include <sys/systm.h>
50#include <sys/buf.h>
51#include <sys/conf.h>
52#include <sys/dirent.h>
53#include <sys/domain.h>
54#include <sys/eventhandler.h>
55#include <sys/fcntl.h>
56#include <sys/kernel.h>
57#include <sys/kthread.h>
58#include <sys/malloc.h>
59#include <sys/mbuf.h>
60#include <sys/mount.h>
984263bc
MD
61#include <sys/proc.h>
62#include <sys/reboot.h>
63#include <sys/socket.h>
64#include <sys/stat.h>
65#include <sys/sysctl.h>
66#include <sys/syslog.h>
5d72d6ed 67#include <sys/unistd.h>
984263bc
MD
68#include <sys/vmmeter.h>
69#include <sys/vnode.h>
70
71#include <machine/limits.h>
72
73#include <vm/vm.h>
74#include <vm/vm_object.h>
75#include <vm/vm_extern.h>
6ef943a3 76#include <vm/vm_kern.h>
984263bc
MD
77#include <vm/pmap.h>
78#include <vm/vm_map.h>
79#include <vm/vm_page.h>
80#include <vm/vm_pager.h>
81#include <vm/vnode_pager.h>
82#include <vm/vm_zone.h>
83
3020e3be 84#include <sys/buf2.h>
f5865223 85#include <sys/thread2.h>
3020e3be 86
984263bc
MD
87static MALLOC_DEFINE(M_NETADDR, "Export Host", "Export host address structure");
88
5fd012e0 89int numvnodes;
984263bc 90SYSCTL_INT(_debug, OID_AUTO, numvnodes, CTLFLAG_RD, &numvnodes, 0, "");
36dbf6bd 91int vfs_fastdev = 1;
fad57d0e 92SYSCTL_INT(_vfs, OID_AUTO, fastdev, CTLFLAG_RW, &vfs_fastdev, 0, "");
984263bc
MD
93
94enum vtype iftovt_tab[16] = {
95 VNON, VFIFO, VCHR, VNON, VDIR, VNON, VBLK, VNON,
96 VREG, VNON, VLNK, VNON, VSOCK, VNON, VNON, VBAD,
97};
98int vttoif_tab[9] = {
99 0, S_IFREG, S_IFDIR, S_IFBLK, S_IFCHR, S_IFLNK,
100 S_IFSOCK, S_IFIFO, S_IFMT,
101};
102
984263bc 103static int reassignbufcalls;
dd98570a
MD
104SYSCTL_INT(_vfs, OID_AUTO, reassignbufcalls, CTLFLAG_RW,
105 &reassignbufcalls, 0, "");
984263bc 106static int reassignbufloops;
dd98570a
MD
107SYSCTL_INT(_vfs, OID_AUTO, reassignbufloops, CTLFLAG_RW,
108 &reassignbufloops, 0, "");
984263bc 109static int reassignbufsortgood;
dd98570a
MD
110SYSCTL_INT(_vfs, OID_AUTO, reassignbufsortgood, CTLFLAG_RW,
111 &reassignbufsortgood, 0, "");
984263bc 112static int reassignbufsortbad;
dd98570a
MD
113SYSCTL_INT(_vfs, OID_AUTO, reassignbufsortbad, CTLFLAG_RW,
114 &reassignbufsortbad, 0, "");
984263bc 115static int reassignbufmethod = 1;
dd98570a
MD
116SYSCTL_INT(_vfs, OID_AUTO, reassignbufmethod, CTLFLAG_RW,
117 &reassignbufmethod, 0, "");
984263bc 118
984263bc 119int nfs_mount_type = -1;
8a8d5d85 120static struct lwkt_token spechash_token;
984263bc 121struct nfs_public nfs_pub; /* publicly exported FS */
984263bc
MD
122
123int desiredvnodes;
124SYSCTL_INT(_kern, KERN_MAXVNODES, maxvnodes, CTLFLAG_RW,
dd98570a 125 &desiredvnodes, 0, "Maximum number of vnodes");
984263bc 126
402ed7e1
RG
127static void vfs_free_addrlist (struct netexport *nep);
128static int vfs_free_netcred (struct radix_node *rn, void *w);
129static int vfs_hang_addrlist (struct mount *mp, struct netexport *nep,
130 struct export_args *argp);
984263bc 131
e4c9c0c8 132extern int dev_ref_debug;
0961aa92 133extern struct vnodeopv_entry_desc spec_vnodeop_entries[];
e4c9c0c8 134
6bae6177
MD
135/*
136 * Red black tree functions
137 */
138static int rb_buf_compare(struct buf *b1, struct buf *b2);
54078292
MD
139RB_GENERATE2(buf_rb_tree, buf, b_rbnode, rb_buf_compare, off_t, b_loffset);
140RB_GENERATE2(buf_rb_hash, buf, b_rbhash, rb_buf_compare, off_t, b_loffset);
6bae6177
MD
141
142static int
143rb_buf_compare(struct buf *b1, struct buf *b2)
144{
54078292 145 if (b1->b_loffset < b2->b_loffset)
6bae6177 146 return(-1);
54078292 147 if (b1->b_loffset > b2->b_loffset)
6bae6177
MD
148 return(1);
149 return(0);
150}
151
41a01a4d 152/*
5fd012e0
MD
153 * Return 0 if the vnode is already on the free list or cannot be placed
154 * on the free list. Return 1 if the vnode can be placed on the free list.
41a01a4d 155 */
5fd012e0
MD
156static __inline int
157vshouldfree(struct vnode *vp, int usecount)
41a01a4d 158{
5fd012e0
MD
159 if (vp->v_flag & VFREE)
160 return (0); /* already free */
161 if (vp->v_holdcnt != 0 || vp->v_usecount != usecount)
162 return (0); /* other holderse */
163 if (vp->v_object &&
164 (vp->v_object->ref_count || vp->v_object->resident_page_count)) {
165 return (0);
166 }
167 return (1);
41a01a4d 168}
5fd012e0 169
984263bc 170/*
5fd012e0
MD
171 * Initialize the vnode management data structures.
172 *
173 * Called from vfsinit()
984263bc
MD
174 */
175void
5fd012e0 176vfs_subr_init(void)
984263bc 177{
6ef943a3
MD
178 /*
179 * Desired vnodes is a result of the physical page count
180 * and the size of kernel's heap. It scales in proportion
181 * to the amount of available physical memory. This can
182 * cause trouble on 64-bit and large memory platforms.
183 */
184 /* desiredvnodes = maxproc + vmstats.v_page_count / 4; */
185 desiredvnodes =
186 min(maxproc + vmstats.v_page_count /4,
187 2 * (VM_MAX_KERNEL_ADDRESS - VM_MIN_KERNEL_ADDRESS) /
188 (5 * (sizeof(struct vm_object) + sizeof(struct vnode))));
189
41a01a4d 190 lwkt_token_init(&spechash_token);
984263bc
MD
191}
192
193/*
194 * Knob to control the precision of file timestamps:
195 *
196 * 0 = seconds only; nanoseconds zeroed.
197 * 1 = seconds and nanoseconds, accurate within 1/HZ.
198 * 2 = seconds and nanoseconds, truncated to microseconds.
199 * >=3 = seconds and nanoseconds, maximum precision.
200 */
201enum { TSP_SEC, TSP_HZ, TSP_USEC, TSP_NSEC };
202
203static int timestamp_precision = TSP_SEC;
204SYSCTL_INT(_vfs, OID_AUTO, timestamp_precision, CTLFLAG_RW,
dd98570a 205 &timestamp_precision, 0, "");
984263bc
MD
206
207/*
208 * Get a current timestamp.
209 */
210void
dd98570a 211vfs_timestamp(struct timespec *tsp)
984263bc
MD
212{
213 struct timeval tv;
214
215 switch (timestamp_precision) {
216 case TSP_SEC:
217 tsp->tv_sec = time_second;
218 tsp->tv_nsec = 0;
219 break;
220 case TSP_HZ:
221 getnanotime(tsp);
222 break;
223 case TSP_USEC:
224 microtime(&tv);
225 TIMEVAL_TO_TIMESPEC(&tv, tsp);
226 break;
227 case TSP_NSEC:
228 default:
229 nanotime(tsp);
230 break;
231 }
232}
233
234/*
235 * Set vnode attributes to VNOVAL
236 */
237void
dd98570a 238vattr_null(struct vattr *vap)
984263bc 239{
984263bc
MD
240 vap->va_type = VNON;
241 vap->va_size = VNOVAL;
242 vap->va_bytes = VNOVAL;
243 vap->va_mode = VNOVAL;
244 vap->va_nlink = VNOVAL;
245 vap->va_uid = VNOVAL;
246 vap->va_gid = VNOVAL;
247 vap->va_fsid = VNOVAL;
248 vap->va_fileid = VNOVAL;
249 vap->va_blocksize = VNOVAL;
250 vap->va_rdev = VNOVAL;
251 vap->va_atime.tv_sec = VNOVAL;
252 vap->va_atime.tv_nsec = VNOVAL;
253 vap->va_mtime.tv_sec = VNOVAL;
254 vap->va_mtime.tv_nsec = VNOVAL;
255 vap->va_ctime.tv_sec = VNOVAL;
256 vap->va_ctime.tv_nsec = VNOVAL;
257 vap->va_flags = VNOVAL;
258 vap->va_gen = VNOVAL;
259 vap->va_vaflags = 0;
dc1be39c 260 vap->va_fsmid = VNOVAL;
984263bc
MD
261}
262
984263bc
MD
263/*
264 * Flush out and invalidate all buffers associated with a vnode.
5fd012e0
MD
265 *
266 * vp must be locked.
984263bc 267 */
6bae6177
MD
268static int vinvalbuf_bp(struct buf *bp, void *data);
269
270struct vinvalbuf_bp_info {
271 struct vnode *vp;
272 int slptimeo;
f2770c70 273 int lkflags;
6bae6177
MD
274 int flags;
275};
276
984263bc 277int
3b568787
MD
278vinvalbuf(struct vnode *vp, int flags, struct thread *td,
279 int slpflag, int slptimeo)
984263bc 280{
6bae6177 281 struct vinvalbuf_bp_info info;
e43a034f 282 int error;
984263bc
MD
283 vm_object_t object;
284
6bae6177
MD
285 /*
286 * If we are being asked to save, call fsync to ensure that the inode
287 * is updated.
288 */
984263bc 289 if (flags & V_SAVE) {
e43a034f 290 crit_enter();
81b5c339
MD
291 while (vp->v_track_write.bk_active) {
292 vp->v_track_write.bk_waitflag = 1;
293 error = tsleep(&vp->v_track_write, slpflag,
294 "vinvlbuf", slptimeo);
984263bc 295 if (error) {
e43a034f 296 crit_exit();
984263bc
MD
297 return (error);
298 }
299 }
6bae6177 300 if (!RB_EMPTY(&vp->v_rbdirty_tree)) {
e43a034f 301 crit_exit();
3b568787 302 if ((error = VOP_FSYNC(vp, MNT_WAIT, td)) != 0)
984263bc 303 return (error);
e43a034f 304 crit_enter();
81b5c339 305 if (vp->v_track_write.bk_active > 0 ||
6bae6177 306 !RB_EMPTY(&vp->v_rbdirty_tree))
984263bc
MD
307 panic("vinvalbuf: dirty bufs");
308 }
e43a034f 309 crit_exit();
984263bc 310 }
e43a034f 311 crit_enter();
6bae6177 312 info.slptimeo = slptimeo;
f2770c70
MD
313 info.lkflags = LK_EXCLUSIVE | LK_SLEEPFAIL;
314 if (slpflag & PCATCH)
315 info.lkflags |= LK_PCATCH;
6bae6177
MD
316 info.flags = flags;
317 info.vp = vp;
318
319 /*
320 * Flush the buffer cache until nothing is left.
321 */
322 while (!RB_EMPTY(&vp->v_rbclean_tree) ||
323 !RB_EMPTY(&vp->v_rbdirty_tree)) {
324 error = RB_SCAN(buf_rb_tree, &vp->v_rbclean_tree, NULL,
65c6c519 325 vinvalbuf_bp, &info);
6bae6177
MD
326 if (error == 0) {
327 error = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
328 vinvalbuf_bp, &info);
984263bc
MD
329 }
330 }
331
332 /*
333 * Wait for I/O to complete. XXX needs cleaning up. The vnode can
334 * have write I/O in-progress but if there is a VM object then the
335 * VM object can also have read-I/O in-progress.
336 */
337 do {
81b5c339
MD
338 while (vp->v_track_write.bk_active > 0) {
339 vp->v_track_write.bk_waitflag = 1;
340 tsleep(&vp->v_track_write, 0, "vnvlbv", 0);
984263bc
MD
341 }
342 if (VOP_GETVOBJECT(vp, &object) == 0) {
343 while (object->paging_in_progress)
344 vm_object_pip_sleep(object, "vnvlbx");
345 }
81b5c339 346 } while (vp->v_track_write.bk_active > 0);
984263bc 347
e43a034f 348 crit_exit();
984263bc
MD
349
350 /*
351 * Destroy the copy in the VM cache, too.
352 */
984263bc
MD
353 if (VOP_GETVOBJECT(vp, &object) == 0) {
354 vm_object_page_remove(object, 0, 0,
355 (flags & V_SAVE) ? TRUE : FALSE);
356 }
984263bc 357
6bae6177 358 if (!RB_EMPTY(&vp->v_rbdirty_tree) || !RB_EMPTY(&vp->v_rbclean_tree))
984263bc 359 panic("vinvalbuf: flush failed");
1f1ea522
MD
360 if (!RB_EMPTY(&vp->v_rbhash_tree))
361 panic("vinvalbuf: flush failed, buffers still present");
984263bc
MD
362 return (0);
363}
364
6bae6177
MD
365static int
366vinvalbuf_bp(struct buf *bp, void *data)
367{
368 struct vinvalbuf_bp_info *info = data;
369 int error;
370
371 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT)) {
f2770c70
MD
372 error = BUF_TIMELOCK(bp, info->lkflags,
373 "vinvalbuf", info->slptimeo);
6bae6177
MD
374 if (error == 0) {
375 BUF_UNLOCK(bp);
376 error = ENOLCK;
377 }
378 if (error == ENOLCK)
379 return(0);
380 return (-error);
381 }
65c6c519
MD
382
383 KKASSERT(bp->b_vp == info->vp);
384
6bae6177
MD
385 /*
386 * XXX Since there are no node locks for NFS, I
387 * believe there is a slight chance that a delayed
388 * write will occur while sleeping just above, so
389 * check for it. Note that vfs_bio_awrite expects
390 * buffers to reside on a queue, while VOP_BWRITE and
391 * brelse do not.
392 */
393 if (((bp->b_flags & (B_DELWRI | B_INVAL)) == B_DELWRI) &&
394 (info->flags & V_SAVE)) {
395 if (bp->b_vp == info->vp) {
396 if (bp->b_flags & B_CLUSTEROK) {
6bae6177
MD
397 vfs_bio_awrite(bp);
398 } else {
399 bremfree(bp);
400 bp->b_flags |= B_ASYNC;
401 VOP_BWRITE(bp->b_vp, bp);
402 }
403 } else {
404 bremfree(bp);
405 VOP_BWRITE(bp->b_vp, bp);
406 }
407 } else {
408 bremfree(bp);
409 bp->b_flags |= (B_INVAL | B_NOCACHE | B_RELBUF);
410 bp->b_flags &= ~B_ASYNC;
411 brelse(bp);
412 }
413 return(0);
414}
415
984263bc
MD
416/*
417 * Truncate a file's buffer and pages to a specified length. This
418 * is in lieu of the old vinvalbuf mechanism, which performed unneeded
419 * sync activity.
5fd012e0
MD
420 *
421 * The vnode must be locked.
984263bc 422 */
6bae6177
MD
423static int vtruncbuf_bp_trunc_cmp(struct buf *bp, void *data);
424static int vtruncbuf_bp_trunc(struct buf *bp, void *data);
425static int vtruncbuf_bp_metasync_cmp(struct buf *bp, void *data);
426static int vtruncbuf_bp_metasync(struct buf *bp, void *data);
427
984263bc 428int
3b568787 429vtruncbuf(struct vnode *vp, struct thread *td, off_t length, int blksize)
984263bc 430{
54078292 431 off_t truncloffset;
6bae6177 432 int count;
984263bc
MD
433
434 /*
54078292 435 * Round up to the *next* block, then destroy the buffers in question.
6bae6177
MD
436 * Since we are only removing some of the buffers we must rely on the
437 * scan count to determine whether a loop is necessary.
984263bc 438 */
54078292
MD
439 if ((count = (int)(length % blksize)) != 0)
440 truncloffset = length + (blksize - count);
441 else
442 truncloffset = length;
984263bc 443
e43a034f 444 crit_enter();
6bae6177
MD
445 do {
446 count = RB_SCAN(buf_rb_tree, &vp->v_rbclean_tree,
447 vtruncbuf_bp_trunc_cmp,
54078292 448 vtruncbuf_bp_trunc, &truncloffset);
6bae6177
MD
449 count += RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree,
450 vtruncbuf_bp_trunc_cmp,
54078292 451 vtruncbuf_bp_trunc, &truncloffset);
6bae6177 452 } while(count);
984263bc 453
6bae6177
MD
454 /*
455 * For safety, fsync any remaining metadata if the file is not being
456 * truncated to 0. Since the metadata does not represent the entire
457 * dirty list we have to rely on the hit count to ensure that we get
458 * all of it.
459 */
984263bc 460 if (length > 0) {
6bae6177
MD
461 do {
462 count = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree,
463 vtruncbuf_bp_metasync_cmp,
464 vtruncbuf_bp_metasync, vp);
465 } while (count);
984263bc
MD
466 }
467
6bae6177
MD
468 /*
469 * Wait for any in-progress I/O to complete before returning (why?)
470 */
81b5c339
MD
471 while (vp->v_track_write.bk_active > 0) {
472 vp->v_track_write.bk_waitflag = 1;
473 tsleep(&vp->v_track_write, 0, "vbtrunc", 0);
984263bc
MD
474 }
475
e43a034f 476 crit_exit();
984263bc
MD
477
478 vnode_pager_setsize(vp, length);
479
480 return (0);
481}
482
6bae6177
MD
483/*
484 * The callback buffer is beyond the new file EOF and must be destroyed.
485 * Note that the compare function must conform to the RB_SCAN's requirements.
486 */
487static
488int
489vtruncbuf_bp_trunc_cmp(struct buf *bp, void *data)
490{
54078292 491 if (bp->b_loffset >= *(off_t *)data)
6bae6177
MD
492 return(0);
493 return(-1);
494}
495
496static
497int
498vtruncbuf_bp_trunc(struct buf *bp, void *data)
499{
500 /*
501 * Do not try to use a buffer we cannot immediately lock, but sleep
502 * anyway to prevent a livelock. The code will loop until all buffers
503 * can be acted upon.
504 */
505 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT)) {
506 if (BUF_LOCK(bp, LK_EXCLUSIVE|LK_SLEEPFAIL) == 0)
507 BUF_UNLOCK(bp);
508 } else {
509 bremfree(bp);
510 bp->b_flags |= (B_INVAL | B_RELBUF);
511 bp->b_flags &= ~B_ASYNC;
512 brelse(bp);
513 }
514 return(1);
515}
516
517/*
518 * Fsync all meta-data after truncating a file to be non-zero. Only metadata
54078292 519 * blocks (with a negative loffset) are scanned.
6bae6177
MD
520 * Note that the compare function must conform to the RB_SCAN's requirements.
521 */
522static int
523vtruncbuf_bp_metasync_cmp(struct buf *bp, void *data)
524{
54078292 525 if (bp->b_loffset < 0)
6bae6177
MD
526 return(0);
527 return(1);
528}
529
530static int
531vtruncbuf_bp_metasync(struct buf *bp, void *data)
532{
533 struct vnode *vp = data;
534
535 if (bp->b_flags & B_DELWRI) {
536 /*
537 * Do not try to use a buffer we cannot immediately lock,
538 * but sleep anyway to prevent a livelock. The code will
539 * loop until all buffers can be acted upon.
540 */
541 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT)) {
542 if (BUF_LOCK(bp, LK_EXCLUSIVE|LK_SLEEPFAIL) == 0)
543 BUF_UNLOCK(bp);
544 } else {
545 bremfree(bp);
546 if (bp->b_vp == vp) {
547 bp->b_flags |= B_ASYNC;
548 } else {
549 bp->b_flags &= ~B_ASYNC;
550 }
551 VOP_BWRITE(bp->b_vp, bp);
552 }
553 return(1);
554 } else {
555 return(0);
556 }
557}
558
559/*
560 * vfsync - implements a multipass fsync on a file which understands
561 * dependancies and meta-data. The passed vnode must be locked. The
562 * waitfor argument may be MNT_WAIT or MNT_NOWAIT, or MNT_LAZY.
563 *
564 * When fsyncing data asynchronously just do one consolidated pass starting
565 * with the most negative block number. This may not get all the data due
566 * to dependancies.
567 *
568 * When fsyncing data synchronously do a data pass, then a metadata pass,
569 * then do additional data+metadata passes to try to get all the data out.
570 */
571static int vfsync_wait_output(struct vnode *vp,
572 int (*waitoutput)(struct vnode *, struct thread *));
573static int vfsync_data_only_cmp(struct buf *bp, void *data);
574static int vfsync_meta_only_cmp(struct buf *bp, void *data);
575static int vfsync_lazy_range_cmp(struct buf *bp, void *data);
576static int vfsync_bp(struct buf *bp, void *data);
577
578struct vfsync_info {
579 struct vnode *vp;
580 int synchronous;
581 int syncdeps;
582 int lazycount;
583 int lazylimit;
54078292
MD
584 int skippedbufs;
585 off_t loffset;
6bae6177
MD
586 int (*checkdef)(struct buf *);
587};
588
589int
54078292 590vfsync(struct vnode *vp, int waitfor, int passes, off_t loffset,
6bae6177
MD
591 int (*checkdef)(struct buf *),
592 int (*waitoutput)(struct vnode *, struct thread *))
593{
594 struct vfsync_info info;
595 int error;
596
597 bzero(&info, sizeof(info));
598 info.vp = vp;
54078292 599 info.loffset = loffset;
6bae6177
MD
600 if ((info.checkdef = checkdef) == NULL)
601 info.syncdeps = 1;
602
e43a034f
MD
603 crit_enter();
604
6bae6177
MD
605 switch(waitfor) {
606 case MNT_LAZY:
607 /*
608 * Lazy (filesystem syncer typ) Asynchronous plus limit the
609 * number of data (not meta) pages we try to flush to 1MB.
610 * A non-zero return means that lazy limit was reached.
611 */
612 info.lazylimit = 1024 * 1024;
613 info.syncdeps = 1;
614 error = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree,
615 vfsync_lazy_range_cmp, vfsync_bp, &info);
616 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree,
617 vfsync_meta_only_cmp, vfsync_bp, &info);
618 if (error == 0)
619 vp->v_lazyw = 0;
620 else if (!RB_EMPTY(&vp->v_rbdirty_tree))
621 vn_syncer_add_to_worklist(vp, 1);
622 error = 0;
623 break;
624 case MNT_NOWAIT:
625 /*
626 * Asynchronous. Do a data-only pass and a meta-only pass.
627 */
628 info.syncdeps = 1;
629 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, vfsync_data_only_cmp,
630 vfsync_bp, &info);
631 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, vfsync_meta_only_cmp,
632 vfsync_bp, &info);
633 error = 0;
634 break;
635 default:
636 /*
637 * Synchronous. Do a data-only pass, then a meta-data+data
638 * pass, then additional integrated passes to try to get
639 * all the dependancies flushed.
640 */
641 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, vfsync_data_only_cmp,
642 vfsync_bp, &info);
643 error = vfsync_wait_output(vp, waitoutput);
644 if (error == 0) {
54078292 645 info.skippedbufs = 0;
6bae6177
MD
646 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
647 vfsync_bp, &info);
648 error = vfsync_wait_output(vp, waitoutput);
54078292
MD
649 if (info.skippedbufs)
650 printf("Warning: vfsync skipped %d dirty bufs in pass2!\n", info.skippedbufs);
6bae6177
MD
651 }
652 while (error == 0 && passes > 0 &&
653 !RB_EMPTY(&vp->v_rbdirty_tree)) {
654 if (--passes == 0) {
655 info.synchronous = 1;
656 info.syncdeps = 1;
657 }
658 error = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
659 vfsync_bp, &info);
660 if (error < 0)
661 error = -error;
662 info.syncdeps = 1;
663 if (error == 0)
664 error = vfsync_wait_output(vp, waitoutput);
665 }
666 break;
667 }
e43a034f 668 crit_exit();
6bae6177
MD
669 return(error);
670}
671
672static int
673vfsync_wait_output(struct vnode *vp, int (*waitoutput)(struct vnode *, struct thread *))
674{
675 int error = 0;
676
81b5c339
MD
677 while (vp->v_track_write.bk_active) {
678 vp->v_track_write.bk_waitflag = 1;
679 tsleep(&vp->v_track_write, 0, "fsfsn", 0);
6bae6177
MD
680 }
681 if (waitoutput)
682 error = waitoutput(vp, curthread);
683 return(error);
684}
685
686static int
687vfsync_data_only_cmp(struct buf *bp, void *data)
688{
54078292 689 if (bp->b_loffset < 0)
6bae6177
MD
690 return(-1);
691 return(0);
692}
693
694static int
695vfsync_meta_only_cmp(struct buf *bp, void *data)
696{
54078292 697 if (bp->b_loffset < 0)
6bae6177
MD
698 return(0);
699 return(1);
700}
701
702static int
703vfsync_lazy_range_cmp(struct buf *bp, void *data)
704{
705 struct vfsync_info *info = data;
54078292 706 if (bp->b_loffset < info->vp->v_lazyw)
6bae6177
MD
707 return(-1);
708 return(0);
709}
710
711static int
712vfsync_bp(struct buf *bp, void *data)
713{
714 struct vfsync_info *info = data;
715 struct vnode *vp = info->vp;
716 int error;
717
718 /*
719 * if syncdeps is not set we do not try to write buffers which have
720 * dependancies.
721 */
722 if (!info->synchronous && info->syncdeps == 0 && info->checkdef(bp))
723 return(0);
724
725 /*
726 * Ignore buffers that we cannot immediately lock. XXX
727 */
54078292
MD
728 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT)) {
729 printf("Warning: vfsync_bp skipping dirty buffer %p\n", bp);
730 ++info->skippedbufs;
6bae6177 731 return(0);
54078292 732 }
6bae6177
MD
733 if ((bp->b_flags & B_DELWRI) == 0)
734 panic("vfsync_bp: buffer not dirty");
735 if (vp != bp->b_vp)
736 panic("vfsync_bp: buffer vp mismatch");
737
738 /*
739 * B_NEEDCOMMIT (primarily used by NFS) is a state where the buffer
740 * has been written but an additional handshake with the device
741 * is required before we can dispose of the buffer. We have no idea
742 * how to do this so we have to skip these buffers.
743 */
744 if (bp->b_flags & B_NEEDCOMMIT) {
745 BUF_UNLOCK(bp);
746 return(0);
747 }
748
749 /*
750 * (LEGACY FROM UFS, REMOVE WHEN POSSIBLE) - invalidate any dirty
751 * buffers beyond the file EOF.
752 */
54078292
MD
753 if (info->loffset != NOOFFSET && vp->v_type == VREG &&
754 bp->b_loffset >= info->loffset) {
6bae6177
MD
755 bremfree(bp);
756 bp->b_flags |= B_INVAL | B_NOCACHE;
e43a034f 757 crit_exit();
6bae6177 758 brelse(bp);
e43a034f 759 crit_enter();
6bae6177
MD
760 }
761
762 if (info->synchronous) {
763 /*
764 * Synchronous flushing. An error may be returned.
765 */
766 bremfree(bp);
e43a034f 767 crit_exit();
6bae6177 768 error = bwrite(bp);
e43a034f 769 crit_enter();
6bae6177
MD
770 } else {
771 /*
772 * Asynchronous flushing. A negative return value simply
773 * stops the scan and is not considered an error. We use
774 * this to support limited MNT_LAZY flushes.
775 */
54078292 776 vp->v_lazyw = bp->b_loffset;
6bae6177 777 if ((vp->v_flag & VOBJBUF) && (bp->b_flags & B_CLUSTEROK)) {
6bae6177
MD
778 info->lazycount += vfs_bio_awrite(bp);
779 } else {
780 info->lazycount += bp->b_bufsize;
781 bremfree(bp);
e43a034f 782 crit_exit();
6bae6177 783 bawrite(bp);
e43a034f 784 crit_enter();
6bae6177
MD
785 }
786 if (info->lazylimit && info->lazycount >= info->lazylimit)
787 error = 1;
788 else
789 error = 0;
790 }
791 return(-error);
792}
793
984263bc
MD
794/*
795 * Associate a buffer with a vnode.
796 */
797void
dd98570a 798bgetvp(struct vnode *vp, struct buf *bp)
984263bc 799{
984263bc 800 KASSERT(bp->b_vp == NULL, ("bgetvp: not free"));
1f1ea522
MD
801 KKASSERT((bp->b_flags & (B_HASHED|B_DELWRI)) == 0);
802 KKASSERT((bp->b_xflags & (BX_VNCLEAN|BX_VNDIRTY)) == 0);
984263bc
MD
803
804 vhold(vp);
984263bc
MD
805 /*
806 * Insert onto list for new vnode.
807 */
5fd012e0 808 crit_enter();
1f1ea522
MD
809 bp->b_vp = vp;
810 bp->b_flags |= B_HASHED;
811 if (buf_rb_hash_RB_INSERT(&vp->v_rbhash_tree, bp))
812 panic("reassignbuf: dup lblk vp %p bp %p", vp, bp);
813
984263bc 814 bp->b_xflags |= BX_VNCLEAN;
6bae6177 815 if (buf_rb_tree_RB_INSERT(&vp->v_rbclean_tree, bp))
1f1ea522 816 panic("reassignbuf: dup lblk/clean vp %p bp %p", vp, bp);
5fd012e0 817 crit_exit();
984263bc
MD
818}
819
820/*
821 * Disassociate a buffer from a vnode.
822 */
823void
dd98570a 824brelvp(struct buf *bp)
984263bc
MD
825{
826 struct vnode *vp;
984263bc
MD
827
828 KASSERT(bp->b_vp != NULL, ("brelvp: NULL"));
829
830 /*
831 * Delete from old vnode list, if on one.
832 */
833 vp = bp->b_vp;
5fd012e0 834 crit_enter();
984263bc
MD
835 if (bp->b_xflags & (BX_VNDIRTY | BX_VNCLEAN)) {
836 if (bp->b_xflags & BX_VNDIRTY)
6bae6177
MD
837 buf_rb_tree_RB_REMOVE(&vp->v_rbdirty_tree, bp);
838 else
839 buf_rb_tree_RB_REMOVE(&vp->v_rbclean_tree, bp);
984263bc
MD
840 bp->b_xflags &= ~(BX_VNDIRTY | BX_VNCLEAN);
841 }
1f1ea522
MD
842 if (bp->b_flags & B_HASHED) {
843 buf_rb_hash_RB_REMOVE(&vp->v_rbhash_tree, bp);
844 bp->b_flags &= ~B_HASHED;
845 }
6bae6177 846 if ((vp->v_flag & VONWORKLST) && RB_EMPTY(&vp->v_rbdirty_tree)) {
984263bc
MD
847 vp->v_flag &= ~VONWORKLST;
848 LIST_REMOVE(vp, v_synclist);
849 }
f5865223 850 crit_exit();
5fd012e0
MD
851 bp->b_vp = NULL;
852 vdrop(vp);
984263bc
MD
853}
854
855/*
856 * Associate a p-buffer with a vnode.
857 *
858 * Also sets B_PAGING flag to indicate that vnode is not fully associated
859 * with the buffer. i.e. the bp has not been linked into the vnode or
860 * ref-counted.
861 */
862void
dd98570a 863pbgetvp(struct vnode *vp, struct buf *bp)
984263bc 864{
984263bc 865 KASSERT(bp->b_vp == NULL, ("pbgetvp: not free"));
1f1ea522 866 KKASSERT((bp->b_flags & B_HASHED) == 0);
984263bc
MD
867
868 bp->b_vp = vp;
869 bp->b_flags |= B_PAGING;
984263bc
MD
870}
871
872/*
873 * Disassociate a p-buffer from a vnode.
874 */
875void
dd98570a 876pbrelvp(struct buf *bp)
984263bc 877{
984263bc 878 KASSERT(bp->b_vp != NULL, ("pbrelvp: NULL"));
1f1ea522 879 KKASSERT((bp->b_flags & B_HASHED) == 0);
984263bc 880
6bae6177 881 bp->b_vp = NULL;
984263bc
MD
882 bp->b_flags &= ~B_PAGING;
883}
884
984263bc 885/*
1f1ea522
MD
886 * Reassign the buffer to the proper clean/dirty list based on B_DELWRI.
887 * This routine is called when the state of the B_DELWRI bit is changed.
984263bc
MD
888 */
889void
1f1ea522 890reassignbuf(struct buf *bp)
984263bc 891{
1f1ea522 892 struct vnode *vp = bp->b_vp;
984263bc 893 int delay;
984263bc 894
1f1ea522 895 KKASSERT(vp != NULL);
984263bc
MD
896 ++reassignbufcalls;
897
898 /*
899 * B_PAGING flagged buffers cannot be reassigned because their vp
900 * is not fully linked in.
901 */
902 if (bp->b_flags & B_PAGING)
903 panic("cannot reassign paging buffer");
904
5fd012e0 905 crit_enter();
984263bc 906 if (bp->b_flags & B_DELWRI) {
1f1ea522
MD
907 /*
908 * Move to the dirty list, add the vnode to the worklist
909 */
910 if (bp->b_xflags & BX_VNCLEAN) {
911 buf_rb_tree_RB_REMOVE(&vp->v_rbclean_tree, bp);
912 bp->b_xflags &= ~BX_VNCLEAN;
913 }
914 if ((bp->b_xflags & BX_VNDIRTY) == 0) {
915 if (buf_rb_tree_RB_INSERT(&vp->v_rbdirty_tree, bp)) {
916 panic("reassignbuf: dup lblk vp %p bp %p",
917 vp, bp);
918 }
919 bp->b_xflags |= BX_VNDIRTY;
920 }
921 if ((vp->v_flag & VONWORKLST) == 0) {
922 switch (vp->v_type) {
984263bc
MD
923 case VDIR:
924 delay = dirdelay;
925 break;
926 case VCHR:
927 case VBLK:
1f1ea522
MD
928 if (vp->v_rdev &&
929 vp->v_rdev->si_mountpoint != NULL) {
984263bc
MD
930 delay = metadelay;
931 break;
932 }
933 /* fall through */
934 default:
935 delay = filedelay;
936 }
1f1ea522 937 vn_syncer_add_to_worklist(vp, delay);
984263bc 938 }
984263bc 939 } else {
1f1ea522
MD
940 /*
941 * Move to the clean list, remove the vnode from the worklist
942 * if no dirty blocks remain.
943 */
944 if (bp->b_xflags & BX_VNDIRTY) {
945 buf_rb_tree_RB_REMOVE(&vp->v_rbdirty_tree, bp);
946 bp->b_xflags &= ~BX_VNDIRTY;
947 }
948 if ((bp->b_xflags & BX_VNCLEAN) == 0) {
949 if (buf_rb_tree_RB_INSERT(&vp->v_rbclean_tree, bp)) {
950 panic("reassignbuf: dup lblk vp %p bp %p",
951 vp, bp);
952 }
953 bp->b_xflags |= BX_VNCLEAN;
954 }
955 if ((vp->v_flag & VONWORKLST) &&
956 RB_EMPTY(&vp->v_rbdirty_tree)) {
957 vp->v_flag &= ~VONWORKLST;
958 LIST_REMOVE(vp, v_synclist);
984263bc 959 }
984263bc 960 }
5fd012e0 961 crit_exit();
984263bc
MD
962}
963
964/*
965 * Create a vnode for a block device.
966 * Used for mounting the root file system.
967 */
968int
e4c9c0c8 969bdevvp(dev_t dev, struct vnode **vpp)
984263bc 970{
1fd87d54 971 struct vnode *vp;
984263bc
MD
972 struct vnode *nvp;
973 int error;
974
975 if (dev == NODEV) {
976 *vpp = NULLVP;
977 return (ENXIO);
978 }
6ddb7618 979 error = getspecialvnode(VT_NON, NULL, &spec_vnode_vops, &nvp, 0, 0);
984263bc
MD
980 if (error) {
981 *vpp = NULLVP;
982 return (error);
983 }
984 vp = nvp;
e4c9c0c8
MD
985 vp->v_type = VCHR;
986 vp->v_udev = dev->si_udev;
5fd012e0 987 vx_unlock(vp);
984263bc
MD
988 *vpp = vp;
989 return (0);
5fd012e0 990}
41a01a4d 991
984263bc 992int
5fd012e0 993v_associate_rdev(struct vnode *vp, dev_t dev)
984263bc 994{
5fd012e0 995 lwkt_tokref ilock;
984263bc 996
5fd012e0
MD
997 if (dev == NULL || dev == NODEV)
998 return(ENXIO);
999 if (dev_is_good(dev) == 0)
1000 return(ENXIO);
1001 KKASSERT(vp->v_rdev == NULL);
1002 if (dev_ref_debug)
1003 printf("Z1");
1004 vp->v_rdev = reference_dev(dev);
1005 lwkt_gettoken(&ilock, &spechash_token);
1006 SLIST_INSERT_HEAD(&dev->si_hlist, vp, v_specnext);
1007 lwkt_reltoken(&ilock);
1008 return(0);
1009}
984263bc 1010
5fd012e0
MD
1011void
1012v_release_rdev(struct vnode *vp)
1013{
1014 lwkt_tokref ilock;
1015 dev_t dev;
984263bc 1016
5fd012e0
MD
1017 if ((dev = vp->v_rdev) != NULL) {
1018 lwkt_gettoken(&ilock, &spechash_token);
1019 SLIST_REMOVE(&dev->si_hlist, vp, vnode, v_specnext);
1020 if (dev_ref_debug && vp->v_opencount != 0) {
1021 printf("releasing rdev with non-0 "
1022 "v_opencount(%d) (revoked?)\n",
1023 vp->v_opencount);
41a01a4d 1024 }
5fd012e0
MD
1025 vp->v_rdev = NULL;
1026 vp->v_opencount = 0;
1027 release_dev(dev);
1028 lwkt_reltoken(&ilock);
984263bc 1029 }
984263bc
MD
1030}
1031
1032/*
5fd012e0
MD
1033 * Add a vnode to the alias list hung off the dev_t. We only associate
1034 * the device number with the vnode. The actual device is not associated
1035 * until the vnode is opened (usually in spec_open()), and will be
1036 * disassociated on last close.
984263bc 1037 */
5fd012e0
MD
1038void
1039addaliasu(struct vnode *nvp, udev_t nvp_udev)
984263bc 1040{
5fd012e0
MD
1041 if (nvp->v_type != VBLK && nvp->v_type != VCHR)
1042 panic("addaliasu on non-special vnode");
1043 nvp->v_udev = nvp_udev;
984263bc
MD
1044}
1045
1046/*
5fd012e0
MD
1047 * Disassociate a vnode from its underlying filesystem.
1048 *
1049 * The vnode must be VX locked and refd
1050 *
1051 * If there are v_usecount references to the vnode other then ours we have
1052 * to VOP_CLOSE the vnode before we can deactivate and reclaim it.
984263bc 1053 */
5fd012e0
MD
1054void
1055vclean(struct vnode *vp, int flags, struct thread *td)
984263bc
MD
1056{
1057 int active;
dc1be39c 1058 int retflags = 0;
984263bc
MD
1059
1060 /*
5fd012e0 1061 * If the vnode has already been reclaimed we have nothing to do.
984263bc 1062 */
5fd012e0
MD
1063 if (vp->v_flag & VRECLAIMED)
1064 return;
1065 vp->v_flag |= VRECLAIMED;
984263bc
MD
1066
1067 /*
5fd012e0 1068 * Scrap the vfs cache
984263bc 1069 */
dc1be39c 1070 while (cache_inval_vp(vp, 0, &retflags) != 0) {
25cb3304
MD
1071 printf("Warning: vnode %p clean/cache_resolution race detected\n", vp);
1072 tsleep(vp, 0, "vclninv", 2);
1073 }
41a01a4d 1074
984263bc 1075 /*
5fd012e0
MD
1076 * Check to see if the vnode is in use. If so we have to reference it
1077 * before we clean it out so that its count cannot fall to zero and
1078 * generate a race against ourselves to recycle it.
984263bc 1079 */
5fd012e0 1080 active = (vp->v_usecount > 1);
984263bc
MD
1081
1082 /*
5fd012e0
MD
1083 * Clean out any buffers associated with the vnode and destroy its
1084 * object, if it has one.
984263bc 1085 */
3b568787 1086 vinvalbuf(vp, V_SAVE, td, 0, 0);
984263bc
MD
1087 VOP_DESTROYVOBJECT(vp);
1088
1089 /*
1090 * If purging an active vnode, it must be closed and
5fd012e0
MD
1091 * deactivated before being reclaimed. XXX
1092 *
1093 * Note that neither of these routines unlocks the vnode.
984263bc
MD
1094 */
1095 if (active) {
1096 if (flags & DOCLOSE)
3b568787 1097 VOP_CLOSE(vp, FNONBLOCK, td);
5fd012e0
MD
1098 }
1099
1100 /*
1101 * If the vnode has not be deactivated, deactivated it.
1102 */
1103 if ((vp->v_flag & VINACTIVE) == 0) {
1104 vp->v_flag |= VINACTIVE;
dadab5e9 1105 VOP_INACTIVE(vp, td);
984263bc 1106 }
5fd012e0 1107
984263bc
MD
1108 /*
1109 * Reclaim the vnode.
1110 */
dc1be39c 1111 if (VOP_RECLAIM(vp, retflags, td))
984263bc
MD
1112 panic("vclean: cannot reclaim");
1113
984263bc
MD
1114 /*
1115 * Done with purge, notify sleepers of the grim news.
1116 */
6ddb7618 1117 vp->v_ops = &dead_vnode_vops;
984263bc
MD
1118 vn_pollgone(vp);
1119 vp->v_tag = VT_NON;
984263bc
MD
1120}
1121
1122/*
1123 * Eliminate all activity associated with the requested vnode
1124 * and with all vnodes aliased to the requested vnode.
dd98570a 1125 *
5fd012e0
MD
1126 * The vnode must be referenced and vx_lock()'d
1127 *
dd98570a 1128 * revoke { struct vnode *a_vp, int a_flags }
984263bc
MD
1129 */
1130int
2d3e977e 1131vop_stdrevoke(struct vop_revoke_args *ap)
984263bc
MD
1132{
1133 struct vnode *vp, *vq;
41a01a4d 1134 lwkt_tokref ilock;
984263bc
MD
1135 dev_t dev;
1136
1137 KASSERT((ap->a_flags & REVOKEALL) != 0, ("vop_revoke"));
1138
1139 vp = ap->a_vp;
5fd012e0 1140
984263bc 1141 /*
5fd012e0 1142 * If the vnode is already dead don't try to revoke it
984263bc 1143 */
5fd012e0 1144 if (vp->v_flag & VRECLAIMED)
984263bc 1145 return (0);
e4c9c0c8
MD
1146
1147 /*
1148 * If the vnode has a device association, scrap all vnodes associated
1149 * with the device. Don't let the device disappear on us while we
1150 * are scrapping the vnodes.
5fd012e0
MD
1151 *
1152 * The passed vp will probably show up in the list, do not VX lock
1153 * it twice!
e4c9c0c8
MD
1154 */
1155 if (vp->v_type != VCHR && vp->v_type != VBLK)
1156 return(0);
1157 if ((dev = vp->v_rdev) == NULL) {
1158 if ((dev = udev2dev(vp->v_udev, vp->v_type == VBLK)) == NODEV)
1159 return(0);
1160 }
1161 reference_dev(dev);
5fd012e0
MD
1162 lwkt_gettoken(&ilock, &spechash_token);
1163 while ((vq = SLIST_FIRST(&dev->si_hlist)) != NULL) {
1164 if (vp == vq || vx_get(vq) == 0) {
1165 if (vq == SLIST_FIRST(&dev->si_hlist))
1166 vgone(vq);
1167 if (vp != vq)
1168 vx_put(vq);
1169 }
984263bc 1170 }
5fd012e0 1171 lwkt_reltoken(&ilock);
e4c9c0c8 1172 release_dev(dev);
984263bc
MD
1173 return (0);
1174}
1175
1176/*
1177 * Recycle an unused vnode to the front of the free list.
5fd012e0
MD
1178 *
1179 * Returns 1 if we were successfully able to recycle the vnode,
1180 * 0 otherwise.
984263bc
MD
1181 */
1182int
5fd012e0 1183vrecycle(struct vnode *vp, struct thread *td)
984263bc 1184{
5fd012e0
MD
1185 if (vp->v_usecount == 1) {
1186 vgone(vp);
984263bc
MD
1187 return (1);
1188 }
984263bc
MD
1189 return (0);
1190}
1191
1192/*
5fd012e0
MD
1193 * Eliminate all activity associated with a vnode in preparation for reuse.
1194 *
57ac0c99
MD
1195 * The vnode must be VX locked and refd and will remain VX locked and refd
1196 * on return. This routine may be called with the vnode in any state, as
1197 * long as it is VX locked. The vnode will be cleaned out and marked
1198 * VRECLAIMED but will not actually be reused until all existing refs and
1199 * holds go away.
5fd012e0
MD
1200 *
1201 * NOTE: This routine may be called on a vnode which has not yet been
1202 * already been deactivated (VOP_INACTIVE), or on a vnode which has
1203 * already been reclaimed.
1204 *
1205 * This routine is not responsible for placing us back on the freelist.
1206 * Instead, it happens automatically when the caller releases the VX lock
1207 * (assuming there aren't any other references).
984263bc
MD
1208 */
1209void
dadab5e9 1210vgone(struct vnode *vp)
984263bc 1211{
984263bc 1212 /*
5fd012e0
MD
1213 * assert that the VX lock is held. This is an absolute requirement
1214 * now for vgone() to be called.
984263bc 1215 */
5fd012e0 1216 KKASSERT(vp->v_lock.lk_exclusivecount == 1);
984263bc
MD
1217
1218 /*
5fd012e0
MD
1219 * Clean out the filesystem specific data and set the VRECLAIMED
1220 * bit. Also deactivate the vnode if necessary.
984263bc 1221 */
5fd012e0 1222 vclean(vp, DOCLOSE, curthread);
984263bc
MD
1223
1224 /*
1225 * Delete from old mount point vnode list, if on one.
1226 */
1227 if (vp->v_mount != NULL)
5fd012e0 1228 insmntque(vp, NULL);
dd98570a 1229
984263bc
MD
1230 /*
1231 * If special device, remove it from special device alias list
1fbb5fc0
MD
1232 * if it is on one. This should normally only occur if a vnode is
1233 * being revoked as the device should otherwise have been released
1234 * naturally.
984263bc
MD
1235 */
1236 if ((vp->v_type == VBLK || vp->v_type == VCHR) && vp->v_rdev != NULL) {
e4c9c0c8 1237 v_release_rdev(vp);
984263bc
MD
1238 }
1239
1240 /*
5fd012e0 1241 * Set us to VBAD
984263bc 1242 */
984263bc 1243 vp->v_type = VBAD;
984263bc
MD
1244}
1245
1246/*
1247 * Lookup a vnode by device number.
1248 */
1249int
dd98570a 1250vfinddev(dev_t dev, enum vtype type, struct vnode **vpp)
984263bc 1251{
41a01a4d 1252 lwkt_tokref ilock;
984263bc
MD
1253 struct vnode *vp;
1254
41a01a4d 1255 lwkt_gettoken(&ilock, &spechash_token);
984263bc
MD
1256 SLIST_FOREACH(vp, &dev->si_hlist, v_specnext) {
1257 if (type == vp->v_type) {
1258 *vpp = vp;
41a01a4d 1259 lwkt_reltoken(&ilock);
984263bc
MD
1260 return (1);
1261 }
1262 }
41a01a4d 1263 lwkt_reltoken(&ilock);
984263bc
MD
1264 return (0);
1265}
1266
1267/*
e4c9c0c8
MD
1268 * Calculate the total number of references to a special device. This
1269 * routine may only be called for VBLK and VCHR vnodes since v_rdev is
1270 * an overloaded field. Since udev2dev can now return NODEV, we have
1271 * to check for a NULL v_rdev.
984263bc
MD
1272 */
1273int
e4c9c0c8 1274count_dev(dev_t dev)
984263bc 1275{
41a01a4d 1276 lwkt_tokref ilock;
e4c9c0c8
MD
1277 struct vnode *vp;
1278 int count = 0;
984263bc 1279
e4c9c0c8
MD
1280 if (SLIST_FIRST(&dev->si_hlist)) {
1281 lwkt_gettoken(&ilock, &spechash_token);
1282 SLIST_FOREACH(vp, &dev->si_hlist, v_specnext) {
1283 count += vp->v_usecount;
1284 }
1285 lwkt_reltoken(&ilock);
1286 }
1287 return(count);
984263bc
MD
1288}
1289
984263bc 1290int
e4c9c0c8 1291count_udev(udev_t udev)
984263bc 1292{
e4c9c0c8 1293 dev_t dev;
984263bc 1294
e4c9c0c8
MD
1295 if ((dev = udev2dev(udev, 0)) == NODEV)
1296 return(0);
1297 return(count_dev(dev));
1298}
1299
1300int
1301vcount(struct vnode *vp)
1302{
1303 if (vp->v_rdev == NULL)
1304 return(0);
1305 return(count_dev(vp->v_rdev));
984263bc
MD
1306}
1307
1308/*
1309 * Print out a description of a vnode.
1310 */
1311static char *typename[] =
1312{"VNON", "VREG", "VDIR", "VBLK", "VCHR", "VLNK", "VSOCK", "VFIFO", "VBAD"};
1313
1314void
dd98570a 1315vprint(char *label, struct vnode *vp)
984263bc
MD
1316{
1317 char buf[96];
1318
1319 if (label != NULL)
1320 printf("%s: %p: ", label, (void *)vp);
1321 else
1322 printf("%p: ", (void *)vp);
1323 printf("type %s, usecount %d, writecount %d, refcount %d,",
1324 typename[vp->v_type], vp->v_usecount, vp->v_writecount,
1325 vp->v_holdcnt);
1326 buf[0] = '\0';
1327 if (vp->v_flag & VROOT)
1328 strcat(buf, "|VROOT");
1329 if (vp->v_flag & VTEXT)
1330 strcat(buf, "|VTEXT");
1331 if (vp->v_flag & VSYSTEM)
1332 strcat(buf, "|VSYSTEM");
984263bc
MD
1333 if (vp->v_flag & VFREE)
1334 strcat(buf, "|VFREE");
1335 if (vp->v_flag & VOBJBUF)
1336 strcat(buf, "|VOBJBUF");
1337 if (buf[0] != '\0')
1338 printf(" flags (%s)", &buf[1]);
1339 if (vp->v_data == NULL) {
1340 printf("\n");
1341 } else {
1342 printf("\n\t");
1343 VOP_PRINT(vp);
1344 }
1345}
1346
1347#ifdef DDB
1348#include <ddb/ddb.h>
861905fb
MD
1349
1350static int db_show_locked_vnodes(struct mount *mp, void *data);
1351
984263bc
MD
1352/*
1353 * List all of the locked vnodes in the system.
1354 * Called when debugging the kernel.
1355 */
1356DB_SHOW_COMMAND(lockedvnodes, lockedvnodes)
1357{
861905fb
MD
1358 printf("Locked vnodes\n");
1359 mountlist_scan(db_show_locked_vnodes, NULL,
1360 MNTSCAN_FORWARD|MNTSCAN_NOBUSY);
1361}
1362
1363static int
1364db_show_locked_vnodes(struct mount *mp, void *data __unused)
1365{
984263bc
MD
1366 struct vnode *vp;
1367
861905fb
MD
1368 TAILQ_FOREACH(vp, &mp->mnt_nvnodelist, v_nmntvnodes) {
1369 if (VOP_ISLOCKED(vp, NULL))
1370 vprint((char *)0, vp);
984263bc 1371 }
861905fb 1372 return(0);
984263bc
MD
1373}
1374#endif
1375
1376/*
1377 * Top level filesystem related information gathering.
1378 */
402ed7e1 1379static int sysctl_ovfs_conf (SYSCTL_HANDLER_ARGS);
984263bc
MD
1380
1381static int
1382vfs_sysctl(SYSCTL_HANDLER_ARGS)
1383{
1384 int *name = (int *)arg1 - 1; /* XXX */
1385 u_int namelen = arg2 + 1; /* XXX */
1386 struct vfsconf *vfsp;
1387
1388#if 1 || defined(COMPAT_PRELITE2)
1389 /* Resolve ambiguity between VFS_VFSCONF and VFS_GENERIC. */
1390 if (namelen == 1)
1391 return (sysctl_ovfs_conf(oidp, arg1, arg2, req));
1392#endif
1393
1394#ifdef notyet
1395 /* all sysctl names at this level are at least name and field */
1396 if (namelen < 2)
1397 return (ENOTDIR); /* overloaded */
1398 if (name[0] != VFS_GENERIC) {
1399 for (vfsp = vfsconf; vfsp; vfsp = vfsp->vfc_next)
1400 if (vfsp->vfc_typenum == name[0])
1401 break;
1402 if (vfsp == NULL)
1403 return (EOPNOTSUPP);
1404 return ((*vfsp->vfc_vfsops->vfs_sysctl)(&name[1], namelen - 1,
1405 oldp, oldlenp, newp, newlen, p));
1406 }
1407#endif
1408 switch (name[1]) {
1409 case VFS_MAXTYPENUM:
1410 if (namelen != 2)
1411 return (ENOTDIR);
1412 return (SYSCTL_OUT(req, &maxvfsconf, sizeof(int)));
1413 case VFS_CONF:
1414 if (namelen != 3)
1415 return (ENOTDIR); /* overloaded */
1416 for (vfsp = vfsconf; vfsp; vfsp = vfsp->vfc_next)
1417 if (vfsp->vfc_typenum == name[2])
1418 break;
1419 if (vfsp == NULL)
1420 return (EOPNOTSUPP);
1421 return (SYSCTL_OUT(req, vfsp, sizeof *vfsp));
1422 }
1423 return (EOPNOTSUPP);
1424}
1425
1426SYSCTL_NODE(_vfs, VFS_GENERIC, generic, CTLFLAG_RD, vfs_sysctl,
1427 "Generic filesystem");
1428
1429#if 1 || defined(COMPAT_PRELITE2)
1430
1431static int
1432sysctl_ovfs_conf(SYSCTL_HANDLER_ARGS)
1433{
1434 int error;
1435 struct vfsconf *vfsp;
1436 struct ovfsconf ovfs;
1437
1438 for (vfsp = vfsconf; vfsp; vfsp = vfsp->vfc_next) {
8573f096 1439 bzero(&ovfs, sizeof(ovfs));
984263bc
MD
1440 ovfs.vfc_vfsops = vfsp->vfc_vfsops; /* XXX used as flag */
1441 strcpy(ovfs.vfc_name, vfsp->vfc_name);
1442 ovfs.vfc_index = vfsp->vfc_typenum;
1443 ovfs.vfc_refcount = vfsp->vfc_refcount;
1444 ovfs.vfc_flags = vfsp->vfc_flags;
1445 error = SYSCTL_OUT(req, &ovfs, sizeof ovfs);
1446 if (error)
1447 return error;
1448 }
1449 return 0;
1450}
1451
1452#endif /* 1 || COMPAT_PRELITE2 */
1453
984263bc
MD
1454/*
1455 * Check to see if a filesystem is mounted on a block device.
1456 */
1457int
e4c9c0c8 1458vfs_mountedon(struct vnode *vp)
984263bc 1459{
e4c9c0c8 1460 dev_t dev;
984263bc 1461
e4c9c0c8
MD
1462 if ((dev = vp->v_rdev) == NULL)
1463 dev = udev2dev(vp->v_udev, (vp->v_type == VBLK));
1464 if (dev != NODEV && dev->si_mountpoint)
984263bc
MD
1465 return (EBUSY);
1466 return (0);
1467}
1468
1469/*
1470 * Unmount all filesystems. The list is traversed in reverse order
1471 * of mounting to avoid dependencies.
1472 */
861905fb
MD
1473
1474static int vfs_umountall_callback(struct mount *mp, void *data);
1475
984263bc 1476void
dd98570a 1477vfs_unmountall(void)
984263bc 1478{
dadab5e9 1479 struct thread *td = curthread;
861905fb 1480 int count;
984263bc 1481
dadab5e9
MD
1482 if (td->td_proc == NULL)
1483 td = initproc->p_thread; /* XXX XXX use proc0 instead? */
1484
861905fb
MD
1485 do {
1486 count = mountlist_scan(vfs_umountall_callback,
1487 &td, MNTSCAN_REVERSE|MNTSCAN_NOBUSY);
1488 } while (count);
1489}
1490
1491static
1492int
1493vfs_umountall_callback(struct mount *mp, void *data)
1494{
1495 struct thread *td = *(struct thread **)data;
1496 int error;
1497
1498 error = dounmount(mp, MNT_FORCE, td);
1499 if (error) {
1500 mountlist_remove(mp);
1501 printf("unmount of filesystem mounted from %s failed (",
1502 mp->mnt_stat.f_mntfromname);
1503 if (error == EBUSY)
1504 printf("BUSY)\n");
1505 else
1506 printf("%d)\n", error);
984263bc 1507 }
861905fb 1508 return(1);
984263bc
MD
1509}
1510
1511/*
1512 * Build hash lists of net addresses and hang them off the mount point.
1513 * Called by ufs_mount() to set up the lists of export addresses.
1514 */
1515static int
dd98570a
MD
1516vfs_hang_addrlist(struct mount *mp, struct netexport *nep,
1517 struct export_args *argp)
984263bc 1518{
1fd87d54
RG
1519 struct netcred *np;
1520 struct radix_node_head *rnh;
1521 int i;
984263bc
MD
1522 struct radix_node *rn;
1523 struct sockaddr *saddr, *smask = 0;
1524 struct domain *dom;
1525 int error;
1526
1527 if (argp->ex_addrlen == 0) {
1528 if (mp->mnt_flag & MNT_DEFEXPORTED)
1529 return (EPERM);
1530 np = &nep->ne_defexported;
1531 np->netc_exflags = argp->ex_flags;
1532 np->netc_anon = argp->ex_anon;
1533 np->netc_anon.cr_ref = 1;
1534 mp->mnt_flag |= MNT_DEFEXPORTED;
1535 return (0);
1536 }
1537
0260ddf9
MD
1538 if (argp->ex_addrlen < 0 || argp->ex_addrlen > MLEN)
1539 return (EINVAL);
1540 if (argp->ex_masklen < 0 || argp->ex_masklen > MLEN)
984263bc
MD
1541 return (EINVAL);
1542
1543 i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
1544 np = (struct netcred *) malloc(i, M_NETADDR, M_WAITOK);
1545 bzero((caddr_t) np, i);
1546 saddr = (struct sockaddr *) (np + 1);
1547 if ((error = copyin(argp->ex_addr, (caddr_t) saddr, argp->ex_addrlen)))
1548 goto out;
1549 if (saddr->sa_len > argp->ex_addrlen)
1550 saddr->sa_len = argp->ex_addrlen;
1551 if (argp->ex_masklen) {
dd98570a
MD
1552 smask = (struct sockaddr *)((caddr_t)saddr + argp->ex_addrlen);
1553 error = copyin(argp->ex_mask, (caddr_t)smask, argp->ex_masklen);
984263bc
MD
1554 if (error)
1555 goto out;
1556 if (smask->sa_len > argp->ex_masklen)
1557 smask->sa_len = argp->ex_masklen;
1558 }
1559 i = saddr->sa_family;
1560 if ((rnh = nep->ne_rtable[i]) == 0) {
1561 /*
1562 * Seems silly to initialize every AF when most are not used,
1563 * do so on demand here
1564 */
9c70fe43 1565 SLIST_FOREACH(dom, &domains, dom_next)
984263bc
MD
1566 if (dom->dom_family == i && dom->dom_rtattach) {
1567 dom->dom_rtattach((void **) &nep->ne_rtable[i],
1568 dom->dom_rtoffset);
1569 break;
1570 }
1571 if ((rnh = nep->ne_rtable[i]) == 0) {
1572 error = ENOBUFS;
1573 goto out;
1574 }
1575 }
2e9572df 1576 rn = (*rnh->rnh_addaddr) ((char *) saddr, (char *) smask, rnh,
984263bc
MD
1577 np->netc_rnodes);
1578 if (rn == 0 || np != (struct netcred *) rn) { /* already exists */
1579 error = EPERM;
1580 goto out;
1581 }
1582 np->netc_exflags = argp->ex_flags;
1583 np->netc_anon = argp->ex_anon;
1584 np->netc_anon.cr_ref = 1;
1585 return (0);
1586out:
1587 free(np, M_NETADDR);
1588 return (error);
1589}
1590
1591/* ARGSUSED */
1592static int
dd98570a 1593vfs_free_netcred(struct radix_node *rn, void *w)
984263bc 1594{
1fd87d54 1595 struct radix_node_head *rnh = (struct radix_node_head *) w;
984263bc
MD
1596
1597 (*rnh->rnh_deladdr) (rn->rn_key, rn->rn_mask, rnh);
1598 free((caddr_t) rn, M_NETADDR);
1599 return (0);
1600}
1601
1602/*
1603 * Free the net address hash lists that are hanging off the mount points.
1604 */
1605static void
dd98570a 1606vfs_free_addrlist(struct netexport *nep)
984263bc 1607{
1fd87d54
RG
1608 int i;
1609 struct radix_node_head *rnh;
984263bc
MD
1610
1611 for (i = 0; i <= AF_MAX; i++)
1612 if ((rnh = nep->ne_rtable[i])) {
1613 (*rnh->rnh_walktree) (rnh, vfs_free_netcred,
1614 (caddr_t) rnh);
1615 free((caddr_t) rnh, M_RTABLE);
1616 nep->ne_rtable[i] = 0;
1617 }
1618}
1619
1620int
dd98570a 1621vfs_export(struct mount *mp, struct netexport *nep, struct export_args *argp)
984263bc
MD
1622{
1623 int error;
1624
1625 if (argp->ex_flags & MNT_DELEXPORT) {
1626 if (mp->mnt_flag & MNT_EXPUBLIC) {
1627 vfs_setpublicfs(NULL, NULL, NULL);
1628 mp->mnt_flag &= ~MNT_EXPUBLIC;
1629 }
1630 vfs_free_addrlist(nep);
1631 mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
1632 }
1633 if (argp->ex_flags & MNT_EXPORTED) {
1634 if (argp->ex_flags & MNT_EXPUBLIC) {
1635 if ((error = vfs_setpublicfs(mp, nep, argp)) != 0)
1636 return (error);
1637 mp->mnt_flag |= MNT_EXPUBLIC;
1638 }
1639 if ((error = vfs_hang_addrlist(mp, nep, argp)))
1640 return (error);
1641 mp->mnt_flag |= MNT_EXPORTED;
1642 }
1643 return (0);
1644}
1645
1646
1647/*
1648 * Set the publicly exported filesystem (WebNFS). Currently, only
1649 * one public filesystem is possible in the spec (RFC 2054 and 2055)
1650 */
1651int
dd98570a
MD
1652vfs_setpublicfs(struct mount *mp, struct netexport *nep,
1653 struct export_args *argp)
984263bc
MD
1654{
1655 int error;
1656 struct vnode *rvp;
1657 char *cp;
1658
1659 /*
1660 * mp == NULL -> invalidate the current info, the FS is
1661 * no longer exported. May be called from either vfs_export
1662 * or unmount, so check if it hasn't already been done.
1663 */
1664 if (mp == NULL) {
1665 if (nfs_pub.np_valid) {
1666 nfs_pub.np_valid = 0;
1667 if (nfs_pub.np_index != NULL) {
1668 FREE(nfs_pub.np_index, M_TEMP);
1669 nfs_pub.np_index = NULL;
1670 }
1671 }
1672 return (0);
1673 }
1674
1675 /*
1676 * Only one allowed at a time.
1677 */
1678 if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
1679 return (EBUSY);
1680
1681 /*
1682 * Get real filehandle for root of exported FS.
1683 */
1684 bzero((caddr_t)&nfs_pub.np_handle, sizeof(nfs_pub.np_handle));
1685 nfs_pub.np_handle.fh_fsid = mp->mnt_stat.f_fsid;
1686
1687 if ((error = VFS_ROOT(mp, &rvp)))
1688 return (error);
1689
1690 if ((error = VFS_VPTOFH(rvp, &nfs_pub.np_handle.fh_fid)))
1691 return (error);
1692
1693 vput(rvp);
1694
1695 /*
1696 * If an indexfile was specified, pull it in.
1697 */
1698 if (argp->ex_indexfile != NULL) {
b80c9733
JS
1699 int namelen;
1700
1701 error = vn_get_namelen(rvp, &namelen);
1702 if (error)
1703 return (error);
1704 MALLOC(nfs_pub.np_index, char *, namelen, M_TEMP,
984263bc
MD
1705 M_WAITOK);
1706 error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
b80c9733 1707 namelen, (size_t *)0);
984263bc
MD
1708 if (!error) {
1709 /*
1710 * Check for illegal filenames.
1711 */
1712 for (cp = nfs_pub.np_index; *cp; cp++) {
1713 if (*cp == '/') {
1714 error = EINVAL;
1715 break;
1716 }
1717 }
1718 }
1719 if (error) {
1720 FREE(nfs_pub.np_index, M_TEMP);
1721 return (error);
1722 }
1723 }
1724
1725 nfs_pub.np_mount = mp;
1726 nfs_pub.np_valid = 1;
1727 return (0);
1728}
1729
1730struct netcred *
dd98570a
MD
1731vfs_export_lookup(struct mount *mp, struct netexport *nep,
1732 struct sockaddr *nam)
984263bc 1733{
1fd87d54
RG
1734 struct netcred *np;
1735 struct radix_node_head *rnh;
984263bc
MD
1736 struct sockaddr *saddr;
1737
1738 np = NULL;
1739 if (mp->mnt_flag & MNT_EXPORTED) {
1740 /*
1741 * Lookup in the export list first.
1742 */
1743 if (nam != NULL) {
1744 saddr = nam;
1745 rnh = nep->ne_rtable[saddr->sa_family];
1746 if (rnh != NULL) {
1747 np = (struct netcred *)
2e9572df 1748 (*rnh->rnh_matchaddr)((char *)saddr,
984263bc
MD
1749 rnh);
1750 if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
1751 np = NULL;
1752 }
1753 }
1754 /*
1755 * If no address match, use the default if it exists.
1756 */
1757 if (np == NULL && mp->mnt_flag & MNT_DEFEXPORTED)
1758 np = &nep->ne_defexported;
1759 }
1760 return (np);
1761}
1762
1763/*
41a01a4d
MD
1764 * perform msync on all vnodes under a mount point. The mount point must
1765 * be locked. This code is also responsible for lazy-freeing unreferenced
1766 * vnodes whos VM objects no longer contain pages.
1767 *
1768 * NOTE: MNT_WAIT still skips vnodes in the VXLOCK state.
03a964e9
MD
1769 *
1770 * NOTE: XXX VOP_PUTPAGES and friends requires that the vnode be locked,
1771 * but vnode_pager_putpages() doesn't lock the vnode. We have to do it
1772 * way up in this high level function.
984263bc 1773 */
41a01a4d 1774static int vfs_msync_scan1(struct mount *mp, struct vnode *vp, void *data);
5fd012e0 1775static int vfs_msync_scan2(struct mount *mp, struct vnode *vp, void *data);
41a01a4d 1776
984263bc
MD
1777void
1778vfs_msync(struct mount *mp, int flags)
1779{
03a964e9
MD
1780 int vmsc_flags;
1781
1782 vmsc_flags = VMSC_GETVP;
1783 if (flags != MNT_WAIT)
1784 vmsc_flags |= VMSC_NOWAIT;
1785 vmntvnodescan(mp, vmsc_flags, vfs_msync_scan1, vfs_msync_scan2,
5fd012e0 1786 (void *)flags);
41a01a4d 1787}
984263bc 1788
41a01a4d
MD
1789/*
1790 * scan1 is a fast pre-check. There could be hundreds of thousands of
1791 * vnodes, we cannot afford to do anything heavy weight until we have a
1792 * fairly good indication that there is work to do.
1793 */
1794static
1795int
1796vfs_msync_scan1(struct mount *mp, struct vnode *vp, void *data)
1797{
1798 int flags = (int)data;
984263bc 1799
5fd012e0
MD
1800 if ((vp->v_flag & VRECLAIMED) == 0) {
1801 if (vshouldfree(vp, 0))
1802 return(0); /* call scan2 */
41a01a4d
MD
1803 if ((mp->mnt_flag & MNT_RDONLY) == 0 &&
1804 (vp->v_flag & VOBJDIRTY) &&
984263bc 1805 (flags == MNT_WAIT || VOP_ISLOCKED(vp, NULL) == 0)) {
5fd012e0 1806 return(0); /* call scan2 */
41a01a4d
MD
1807 }
1808 }
5fd012e0
MD
1809
1810 /*
1811 * do not call scan2, continue the loop
1812 */
41a01a4d
MD
1813 return(-1);
1814}
1815
03a964e9
MD
1816/*
1817 * This callback is handed a locked vnode.
1818 */
41a01a4d
MD
1819static
1820int
5fd012e0 1821vfs_msync_scan2(struct mount *mp, struct vnode *vp, void *data)
41a01a4d
MD
1822{
1823 vm_object_t obj;
41a01a4d
MD
1824 int flags = (int)data;
1825
5fd012e0 1826 if (vp->v_flag & VRECLAIMED)
41a01a4d
MD
1827 return(0);
1828
1829 if ((mp->mnt_flag & MNT_RDONLY) == 0 &&
03a964e9 1830 (vp->v_flag & VOBJDIRTY)) {
5fd012e0
MD
1831 if (VOP_GETVOBJECT(vp, &obj) == 0) {
1832 vm_object_page_clean(obj, 0, 0,
1833 flags == MNT_WAIT ? OBJPC_SYNC : OBJPC_NOSYNC);
984263bc
MD
1834 }
1835 }
41a01a4d 1836 return(0);
984263bc
MD
1837}
1838
1839/*
1840 * Create the VM object needed for VMIO and mmap support. This
1841 * is done for all VREG files in the system. Some filesystems might
1842 * afford the additional metadata buffering capability of the
1843 * VMIO code by making the device node be VMIO mode also.
1844 *
1845 * vp must be locked when vfs_object_create is called.
1846 */
1847int
3b568787 1848vfs_object_create(struct vnode *vp, struct thread *td)
984263bc 1849{
3b568787 1850 return (VOP_CREATEVOBJECT(vp, td));
984263bc
MD
1851}
1852
984263bc
MD
1853/*
1854 * Record a process's interest in events which might happen to
1855 * a vnode. Because poll uses the historic select-style interface
1856 * internally, this routine serves as both the ``check for any
1857 * pending events'' and the ``record my interest in future events''
1858 * functions. (These are done together, while the lock is held,
1859 * to avoid race conditions.)
1860 */
1861int
dadab5e9 1862vn_pollrecord(struct vnode *vp, struct thread *td, int events)
984263bc 1863{
41a01a4d
MD
1864 lwkt_tokref ilock;
1865
1866 lwkt_gettoken(&ilock, &vp->v_pollinfo.vpi_token);
984263bc
MD
1867 if (vp->v_pollinfo.vpi_revents & events) {
1868 /*
1869 * This leaves events we are not interested
1870 * in available for the other process which
1871 * which presumably had requested them
1872 * (otherwise they would never have been
1873 * recorded).
1874 */
1875 events &= vp->v_pollinfo.vpi_revents;
1876 vp->v_pollinfo.vpi_revents &= ~events;
1877
41a01a4d 1878 lwkt_reltoken(&ilock);
984263bc
MD
1879 return events;
1880 }
1881 vp->v_pollinfo.vpi_events |= events;
dadab5e9 1882 selrecord(td, &vp->v_pollinfo.vpi_selinfo);
41a01a4d 1883 lwkt_reltoken(&ilock);
984263bc
MD
1884 return 0;
1885}
1886
1887/*
1888 * Note the occurrence of an event. If the VN_POLLEVENT macro is used,
1889 * it is possible for us to miss an event due to race conditions, but
1890 * that condition is expected to be rare, so for the moment it is the
1891 * preferred interface.
1892 */
1893void
dd98570a 1894vn_pollevent(struct vnode *vp, int events)
984263bc 1895{
41a01a4d
MD
1896 lwkt_tokref ilock;
1897
1898 lwkt_gettoken(&ilock, &vp->v_pollinfo.vpi_token);
984263bc
MD
1899 if (vp->v_pollinfo.vpi_events & events) {
1900 /*
1901 * We clear vpi_events so that we don't
1902 * call selwakeup() twice if two events are
1903 * posted before the polling process(es) is
1904 * awakened. This also ensures that we take at
1905 * most one selwakeup() if the polling process
1906 * is no longer interested. However, it does
1907 * mean that only one event can be noticed at
1908 * a time. (Perhaps we should only clear those
1909 * event bits which we note?) XXX
1910 */
1911 vp->v_pollinfo.vpi_events = 0; /* &= ~events ??? */
1912 vp->v_pollinfo.vpi_revents |= events;
1913 selwakeup(&vp->v_pollinfo.vpi_selinfo);
1914 }
41a01a4d 1915 lwkt_reltoken(&ilock);
984263bc
MD
1916}
1917
1918/*
1919 * Wake up anyone polling on vp because it is being revoked.
1920 * This depends on dead_poll() returning POLLHUP for correct
1921 * behavior.
1922 */
1923void
dd98570a 1924vn_pollgone(struct vnode *vp)
984263bc 1925{
41a01a4d
MD
1926 lwkt_tokref ilock;
1927
1928 lwkt_gettoken(&ilock, &vp->v_pollinfo.vpi_token);
984263bc
MD
1929 if (vp->v_pollinfo.vpi_events) {
1930 vp->v_pollinfo.vpi_events = 0;
1931 selwakeup(&vp->v_pollinfo.vpi_selinfo);
1932 }
41a01a4d 1933 lwkt_reltoken(&ilock);
984263bc
MD
1934}
1935
984263bc 1936/*
e4c9c0c8
MD
1937 * extract the dev_t from a VBLK or VCHR. The vnode must have been opened
1938 * (or v_rdev might be NULL).
984263bc
MD
1939 */
1940dev_t
e4c9c0c8 1941vn_todev(struct vnode *vp)
984263bc
MD
1942{
1943 if (vp->v_type != VBLK && vp->v_type != VCHR)
1944 return (NODEV);
e4c9c0c8 1945 KKASSERT(vp->v_rdev != NULL);
984263bc
MD
1946 return (vp->v_rdev);
1947}
1948
1949/*
e4c9c0c8
MD
1950 * Check if vnode represents a disk device. The vnode does not need to be
1951 * opened.
984263bc
MD
1952 */
1953int
e4c9c0c8 1954vn_isdisk(struct vnode *vp, int *errp)
984263bc 1955{
e4c9c0c8
MD
1956 dev_t dev;
1957
984263bc
MD
1958 if (vp->v_type != VBLK && vp->v_type != VCHR) {
1959 if (errp != NULL)
1960 *errp = ENOTBLK;
1961 return (0);
1962 }
e4c9c0c8
MD
1963
1964 if ((dev = vp->v_rdev) == NULL)
1965 dev = udev2dev(vp->v_udev, (vp->v_type == VBLK));
1966 if (dev == NULL || dev == NODEV) {
984263bc
MD
1967 if (errp != NULL)
1968 *errp = ENXIO;
1969 return (0);
1970 }
e4c9c0c8 1971 if (dev_is_good(dev) == 0) {
984263bc
MD
1972 if (errp != NULL)
1973 *errp = ENXIO;
1974 return (0);
1975 }
e4c9c0c8 1976 if ((dev_dflags(dev) & D_DISK) == 0) {
984263bc
MD
1977 if (errp != NULL)
1978 *errp = ENOTBLK;
1979 return (0);
1980 }
1981 if (errp != NULL)
1982 *errp = 0;
1983 return (1);
1984}
1985
4f322a84
EN
1986#ifdef DEBUG_VFS_LOCKS
1987
1988void
1989assert_vop_locked(struct vnode *vp, const char *str)
1990{
4f322a84
EN
1991 if (vp && IS_LOCKING_VFS(vp) && !VOP_ISLOCKED(vp, NULL)) {
1992 panic("%s: %p is not locked shared but should be", str, vp);
1993 }
1994}
1995
1996void
1997assert_vop_unlocked(struct vnode *vp, const char *str)
1998{
4f322a84
EN
1999 if (vp && IS_LOCKING_VFS(vp)) {
2000 if (VOP_ISLOCKED(vp, curthread) == LK_EXCLUSIVE) {
2001 panic("%s: %p is locked but should not be", str, vp);
2002 }
2003 }
2004}
2005
2006#endif
5d72d6ed
JS
2007
2008int
2009vn_get_namelen(struct vnode *vp, int *namelen)
2010{
2011 int error, retval[2];
2012
2013 error = VOP_PATHCONF(vp, _PC_NAME_MAX, retval);
2014 if (error)
2015 return (error);
2016 *namelen = *retval;
2017 return (0);
2018}
fc46f680
JS
2019
2020int
b45c5139
MD
2021vop_write_dirent(int *error, struct uio *uio, ino_t d_ino, uint8_t d_type,
2022 uint16_t d_namlen, const char *d_name)
fc46f680 2023{
01f31ab3
JS
2024 struct dirent *dp;
2025 size_t len;
fc46f680 2026
01f31ab3
JS
2027 len = _DIRENT_RECLEN(d_namlen);
2028 if (len > uio->uio_resid)
fc46f680
JS
2029 return(1);
2030
01f31ab3
JS
2031 dp = malloc(len, M_TEMP, M_WAITOK | M_ZERO);
2032
2033 dp->d_ino = d_ino;
2034 dp->d_namlen = d_namlen;
fc46f680
JS
2035 dp->d_type = d_type;
2036 bcopy(d_name, dp->d_name, d_namlen);
fc46f680 2037
01f31ab3
JS
2038 *error = uiomove((caddr_t)dp, len, uio);
2039
2040 free(dp, M_TEMP);
fc46f680
JS
2041
2042 return(0);
2043}