2 * modified for EXT2FS support in Lites 1.1
4 * Aug 1995, Godmar Back (gback@cs.utah.edu)
5 * University of Utah, Department of Computer Science
8 * Copyright (c) 1982, 1986, 1989, 1993
9 * The Regents of the University of California. All rights reserved.
10 * (c) UNIX System Laboratories, Inc.
11 * All or some portions of this file are derived from material licensed
12 * to the University of California by American Telephone and Telegraph
13 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
14 * the permission of UNIX System Laboratories, Inc.
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
19 * 1. Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution.
24 * 3. All advertising materials mentioning features or use of this software
25 * must display the following acknowledgement:
26 * This product includes software developed by the University of
27 * California, Berkeley and its contributors.
28 * 4. Neither the name of the University nor the names of its contributors
29 * may be used to endorse or promote products derived from this software
30 * without specific prior written permission.
32 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
33 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
34 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
35 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
36 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
37 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
38 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
40 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
41 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44 * @(#)ufs_vnops.c 8.27 (Berkeley) 5/27/95
45 * @(#)ext2_vnops.c 8.7 (Berkeley) 2/3/94
46 * $FreeBSD: src/sys/gnu/ext2fs/ext2_vnops.c,v 1.51.2.2 2003/01/02 17:26:18 bde Exp $
47 * $DragonFly: src/sys/vfs/gnu/ext2fs/ext2_vnops.c,v 1.37 2006/12/23 00:41:29 swildner Exp $
50 #include "opt_quota.h"
51 #include "opt_suiddir.h"
53 #include <sys/param.h>
54 #include <sys/systm.h>
55 #include <sys/resourcevar.h>
56 #include <sys/kernel.h>
58 #include <sys/fcntl.h>
62 #include <sys/mount.h>
64 #include <sys/vnode.h>
65 #include <sys/dirent.h>
66 #include <sys/lockf.h>
67 #include <sys/event.h>
71 #include <sys/namei.h>
72 #include <sys/signalvar.h>
73 #include <sys/unistd.h>
76 #include <vm/vm_extern.h>
77 #include <vm/vm_zone.h>
78 #include <vm/vnode_pager.h>
81 #include <sys/thread2.h>
83 #include <vfs/fifofs/fifo.h>
88 #include "ext2mount.h"
89 #include "ext2_fs_sb.h"
91 #include "ext2_extern.h"
94 static int ext2_access (struct vop_access_args *);
95 static int ext2_advlock (struct vop_advlock_args *);
96 static int ext2_chmod (struct vnode *, int, struct ucred *);
97 static int ext2_chown (struct vnode *, uid_t, gid_t, struct ucred *);
98 static int ext2_close (struct vop_close_args *);
99 static int ext2_getattr (struct vop_getattr_args *);
100 static int ext2_makeinode (int mode, struct vnode *, struct vnode **, struct componentname *);
101 static int ext2_mmap (struct vop_mmap_args *);
102 static int ext2_open (struct vop_open_args *);
103 static int ext2_pathconf (struct vop_pathconf_args *);
104 static int ext2_print (struct vop_print_args *);
105 static int ext2_readlink (struct vop_readlink_args *);
106 static int ext2_setattr (struct vop_setattr_args *);
107 static int ext2_strategy (struct vop_strategy_args *);
108 static int ext2_whiteout (struct vop_old_whiteout_args *);
109 static int filt_ext2read (struct knote *kn, long hint);
110 static int filt_ext2write (struct knote *kn, long hint);
111 static int filt_ext2vnode (struct knote *kn, long hint);
112 static void filt_ext2detach (struct knote *kn);
113 static int ext2_kqfilter (struct vop_kqfilter_args *ap);
114 static int ext2spec_close (struct vop_close_args *);
115 static int ext2spec_read (struct vop_read_args *);
116 static int ext2spec_write (struct vop_write_args *);
117 static int ext2fifo_close (struct vop_close_args *);
118 static int ext2fifo_kqfilter (struct vop_kqfilter_args *);
119 static int ext2fifo_read (struct vop_read_args *);
120 static int ext2fifo_write (struct vop_write_args *);
122 static int ext2_fsync (struct vop_fsync_args *);
123 static int ext2_read (struct vop_read_args *);
124 static int ext2_write (struct vop_write_args *);
125 static int ext2_remove (struct vop_old_remove_args *);
126 static int ext2_link (struct vop_old_link_args *);
127 static int ext2_rename (struct vop_old_rename_args *);
128 static int ext2_mkdir (struct vop_old_mkdir_args *);
129 static int ext2_rmdir (struct vop_old_rmdir_args *);
130 static int ext2_create (struct vop_old_create_args *);
131 static int ext2_mknod (struct vop_old_mknod_args *);
132 static int ext2_symlink (struct vop_old_symlink_args *);
133 static int ext2_getpages (struct vop_getpages_args *);
134 static int ext2_putpages (struct vop_putpages_args *);
136 #include "ext2_readwrite.c"
142 #define SETHIGH(q, h) { \
145 tmp.val[_QUAD_HIGHWORD] = (h); \
148 #define SETLOW(q, l) { \
151 tmp.val[_QUAD_LOWWORD] = (l); \
154 #define VN_KNOTE(vp, b) \
155 KNOTE(&vp->v_pollinfo.vpi_selinfo.si_note, (b))
157 #define OFSFMT(vp) ((vp)->v_mount->mnt_maxsymlinklen <= 0)
160 * A virgin directory (no blushing please).
161 * Note that the type and namlen fields are reversed relative to ufs.
162 * Also, we don't use `struct odirtemplate', since it would just cause
163 * endianness problems.
165 static struct dirtemplate ext2_mastertemplate = {
166 0, 12, 1, EXT2_FT_DIR, ".",
167 0, DIRBLKSIZ - 12, 2, EXT2_FT_DIR, ".."
169 static struct dirtemplate ext2_omastertemplate = {
170 0, 12, 1, EXT2_FT_UNKNOWN, ".",
171 0, DIRBLKSIZ - 12, 2, EXT2_FT_UNKNOWN, ".."
175 * Create a regular file
177 * ext2_create(struct vnode *a_dvp, struct vnode **a_vpp,
178 * struct componentname *a_cnp, struct vattr *a_vap)
181 ext2_create(struct vop_old_create_args *ap)
186 ext2_makeinode(MAKEIMODE(ap->a_vap->va_type, ap->a_vap->va_mode),
187 ap->a_dvp, ap->a_vpp, ap->a_cnp);
194 * Synch an open file.
196 * ext2_fsync(struct vnode *a_vp, struct ucred *a_cred, int a_waitfor,
201 static int ext2_fsync_bp(struct buf *bp, void *data);
203 struct ext2_fsync_bp_info {
209 ext2_fsync(struct vop_fsync_args *ap)
211 struct ext2_fsync_bp_info info;
212 struct vnode *vp = ap->a_vp;
216 * XXX why is all this fs specific?
220 * Flush all dirty buffers associated with a vnode.
222 ext2_discard_prealloc(VTOI(vp));
227 info.waitfor = ap->a_waitfor;
228 count = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
229 ext2_fsync_bp, &info);
233 if (ap->a_waitfor == MNT_WAIT) {
234 while (vp->v_track_write.bk_active) {
235 vp->v_track_write.bk_waitflag = 1;
236 tsleep(&vp->v_track_write, 0, "e2fsyn", 0);
239 if (!RB_EMPTY(&vp->v_rbdirty_tree)) {
240 vprint("ext2_fsync: dirty", vp);
246 return (EXT2_UPDATE(ap->a_vp, ap->a_waitfor == MNT_WAIT));
250 ext2_fsync_bp(struct buf *bp, void *data)
252 struct ext2_fsync_bp_info *info = data;
254 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT))
256 if ((bp->b_flags & B_DELWRI) == 0)
257 panic("ext2_fsync: not dirty");
262 * Wait for I/O associated with indirect blocks to complete,
263 * since there is no way to quickly wait for them below.
265 if (bp->b_vp == info->vp || info->waitfor == MNT_NOWAIT)
276 * ext2_mknod(struct vnode *a_dvp, struct vnode **a_vpp,
277 * struct componentname *a_cnp, struct vattr *a_vap)
281 ext2_mknod(struct vop_old_mknod_args *ap)
283 struct vattr *vap = ap->a_vap;
284 struct vnode **vpp = ap->a_vpp;
289 error = ext2_makeinode(MAKEIMODE(vap->va_type, vap->va_mode),
290 ap->a_dvp, vpp, ap->a_cnp);
294 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
295 if (vap->va_rdev != VNOVAL) {
297 * Want to be able to use this to make badblock
298 * inodes, so don't truncate the dev number.
300 ip->i_rdev = vap->va_rdev;
303 * Remove inode, then reload it through VFS_VGET so it is
304 * checked to see if it is an alias of an existing entry in
307 (*vpp)->v_type = VNON;
308 ino = ip->i_number; /* Save this before vgone() invalidates ip. */
311 error = VFS_VGET(ap->a_dvp->v_mount, ino, vpp);
320 * ext2_remove(struct vnode *a_dvp, struct vnode *a_vp,
321 * struct componentname *a_cnp)
324 ext2_remove(struct vop_old_remove_args *ap)
327 struct vnode *vp = ap->a_vp;
328 struct vnode *dvp = ap->a_dvp;
332 if ((ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
333 (VTOI(dvp)->i_flags & APPEND)) {
337 error = ext2_dirremove(dvp, ap->a_cnp);
340 ip->i_flag |= IN_CHANGE;
349 * ext2_link(struct vnode *a_tdvp, struct vnode *a_vp,
350 * struct componentname *a_cnp)
353 ext2_link(struct vop_old_link_args *ap)
355 struct vnode *vp = ap->a_vp;
356 struct vnode *tdvp = ap->a_tdvp;
357 struct componentname *cnp = ap->a_cnp;
361 if (tdvp->v_mount != vp->v_mount) {
365 if (tdvp != vp && (error = vn_lock(vp, LK_EXCLUSIVE))) {
369 if ((nlink_t)ip->i_nlink >= LINK_MAX) {
373 if (ip->i_flags & (IMMUTABLE | APPEND)) {
378 ip->i_flag |= IN_CHANGE;
379 error = EXT2_UPDATE(vp, 1);
381 error = ext2_direnter(ip, tdvp, cnp);
384 ip->i_flag |= IN_CHANGE;
394 * Rename system call. fdvp, fvp are ref'd. tvp, tdvp are ref'd and locked.
395 * all vp's are released and must be in an unlocked state on return.
397 * ext2_rename(struct vnode *a_fdvp, struct vnode *a_fvp,
398 * struct componentname *a_fcnp, struct vnode *a_tdvp,
399 * struct vnode *a_tvp, struct componentname *a_tcnp)
402 ext2_rename(struct vop_old_rename_args *ap)
404 struct vnode *tvp = ap->a_tvp;
405 struct vnode *tdvp = ap->a_tdvp;
406 struct vnode *fvp = ap->a_fvp;
407 struct vnode *fdvp = ap->a_fdvp;
408 struct componentname *tcnp = ap->a_tcnp;
409 struct componentname *fcnp = ap->a_fcnp;
410 struct inode *ip, *xp, *dp;
411 struct dirtemplate dirbuf;
412 int doingdirectory = 0, oldparent = 0, newparent = 0;
417 * Check for cross-device rename.
419 if ((fvp->v_mount != tdvp->v_mount) ||
420 (tvp && (fvp->v_mount != tvp->v_mount)) ||
435 if (tvp && ((VTOI(tvp)->i_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
436 (VTOI(tdvp)->i_flags & APPEND))) {
442 * Renaming a file to itself has no effect. The upper layers should
443 * not call us in that case. Temporarily just warn if they do.
450 if ((error = vn_lock(fvp, LK_EXCLUSIVE)) != 0)
454 * fvp, tvp, tdvp locked. fdvp not locked but note that fdvp may
459 if (ip->i_nlink >= LINK_MAX) {
464 if ((ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND))
465 || (dp->i_flags & APPEND)) {
470 if ((ip->i_mode & IFMT) == IFDIR) {
472 * Avoid ".", "..", and aliases of "." for obvious reasons.
474 if ((fcnp->cn_namelen == 1 && fcnp->cn_nameptr[0] == '.') ||
475 dp == ip || (fcnp->cn_flags | tcnp->cn_flags) & CNP_ISDOTDOT ||
476 (ip->i_flag & IN_RENAME)) {
481 ip->i_flag |= IN_RENAME;
482 oldparent = dp->i_number;
487 * tvp is non-NULL if the target exists. fvp is still locked but
488 * we will unlock it soon. The 'bad' goto target requires dp and
489 * xp to be correctly assigned.
498 * 1) Bump link count while we're moving stuff
499 * around. If we crash somewhere before
500 * completing our work, the link count
501 * may be wrong, but correctable.
504 ip->i_flag |= IN_CHANGE;
505 if ((error = EXT2_UPDATE(fvp, 1)) != 0) {
511 * If ".." must be changed (ie the directory gets a new
512 * parent) then the source directory must not be in the
513 * directory heirarchy above the target, as this would
514 * orphan everything below the source directory. Also
515 * the user must have write permission in the source so
516 * as to be able to change "..". We must repeat the call
517 * to namei, as the parent directory is unlocked by the
518 * call to checkpath().
520 error = VOP_ACCESS(fvp, VWRITE, tcnp->cn_cred);
524 * tvp (if not NULL) and tdvp are locked. fvp and fdvp are not.
525 * dp and xp are set according to tdvp and tvp.
527 if (oldparent != dp->i_number)
528 newparent = dp->i_number;
529 if (doingdirectory && newparent) {
530 if (error) /* write access check above */
534 * Prepare for relookup, get rid of xp
542 * checkpath vput()'s tdvp (VTOI(dp)) on return no matter what,
543 * get an extra ref so we wind up with just an unlocked, ref'd
544 * tdvp. The 'out' target skips xp and tdvp cleanups. Our
545 * tdvp is now unlocked so we have to clean it up ourselves.
548 error = ext2_checkpath(ip, dp, tcnp->cn_cred);
549 tcnp->cn_flags |= CNP_PDIRUNLOCK;
555 * relookup no longer messes with the ref count. An unlocked
556 * tdvp must be passed and if no error occurs a locked tdvp
557 * will be returned. We have to use the out target again.
559 error = relookup(tdvp, &tvp, tcnp);
561 if (tcnp->cn_flags & CNP_PDIRUNLOCK)
569 * tdvp is locked at this point. in the RENAME case tvp may
570 * be NULL without an error, assign xp accordingly. The
571 * 'bad' target can be used again after this.
578 * 2) If target doesn't exist, link the target
579 * to the source and unlink the source.
580 * Otherwise, rewrite the target directory
581 * entry to reference the source inode and
582 * expunge the original entry's existence.
584 * tdvp and tvp are cleaned up by this code. tvp is only good if
588 if (dp->i_dev != ip->i_dev)
589 panic("ext2_rename: EXDEV");
591 * Account for ".." in new directory.
592 * When source and destination have the same
593 * parent we don't fool with the link count.
595 if (doingdirectory && newparent) {
596 if ((nlink_t)dp->i_nlink >= LINK_MAX) {
601 dp->i_flag |= IN_CHANGE;
602 error = EXT2_UPDATE(tdvp, 1);
606 error = ext2_direnter(ip, tdvp, tcnp);
608 if (doingdirectory && newparent) {
610 dp->i_flag |= IN_CHANGE;
611 EXT2_UPDATE(tdvp, 1);
617 * manual cleanup, we can't use the bad or out target after
622 if (xp->i_dev != dp->i_dev || xp->i_dev != ip->i_dev)
623 panic("ext2_rename: EXDEV");
625 * Short circuit rename(foo, foo).
627 if (xp->i_number == ip->i_number)
628 panic("ext2_rename: same file");
630 * If the parent directory is "sticky", then the user must
631 * own the parent directory, or the destination of the rename,
632 * otherwise the destination may not be changed (except by
633 * root). This implements append-only directories.
635 if ((dp->i_mode & S_ISTXT) && tcnp->cn_cred->cr_uid != 0 &&
636 tcnp->cn_cred->cr_uid != dp->i_uid &&
637 xp->i_uid != tcnp->cn_cred->cr_uid) {
642 * Target must be empty if a directory and have no links
643 * to it. Also, ensure source and target are compatible
644 * (both directories, or both not directories).
646 if ((xp->i_mode&IFMT) == IFDIR) {
647 if (! ext2_dirempty(xp, dp->i_number, tcnp->cn_cred) ||
652 if (!doingdirectory) {
656 } else if (doingdirectory) {
660 error = ext2_dirrewrite(dp, ip, tcnp);
664 * If the target directory is in the same
665 * directory as the source directory,
666 * decrement the link count on the parent
667 * of the target directory.
669 if (doingdirectory && !newparent) {
671 dp->i_flag |= IN_CHANGE;
675 * manual cleanup, we can't use the bad or out target after
681 * Adjust the link count of the target to
682 * reflect the dirrewrite above. If this is
683 * a directory it is empty and there are
684 * no links to it, so we can squash the inode and
685 * any space associated with it. We disallowed
686 * renaming over top of a directory with links to
687 * it above, as the remaining link would point to
688 * a directory without "." or ".." entries.
691 if (doingdirectory) {
692 if (--xp->i_nlink != 0)
693 panic("ext2_rename: linked directory");
694 error = EXT2_TRUNCATE(tvp, (off_t)0, IO_SYNC,
697 xp->i_flag |= IN_CHANGE;
703 * tvp and tdvp have been cleaned up. The bad and out targets may
704 * not be used. fvp and fdvp are ref'd but not locked. ip
705 * still represents the old fvp and ip->i_flag may still have IN_RENAME
706 * set (if doingdirectory).
710 * 3) Unlink the source.
712 * fdvp is locked and ref'd. ap->a_fvp holds the old lookup unlocked
713 * and ref'd, fvp will hold the new lookup locked and ref'd.
715 * After the relookup ap->a_fvp must be released as part of our
716 * cleanup, not just fdvp and fvp. And, on success, fdvp and
717 * fvp will be locked so the bad and out targets cannot be used.
719 fcnp->cn_flags &= ~CNP_MODMASK;
720 fcnp->cn_flags |= CNP_LOCKPARENT;
721 KKASSERT(fcnp->cn_flags & CNP_PDIRUNLOCK);
722 error = relookup(fdvp, &fvp, fcnp);
725 * From name has disappeared.
728 panic("ext2_rename: lost dir entry");
729 /* ip->i_flag only sets IN_RENAME if doingdirectory */
731 if (fcnp->cn_flags & CNP_PDIRUNLOCK)
737 KKASSERT((fcnp->cn_flags & CNP_PDIRUNLOCK) == 0);
740 * This case shouldn't occur
744 * From name has disappeared.
747 panic("ext2_rename: lost dir entry");
748 /* ip->i_flag only sets IN_RENAME if doingdirectory */
756 * fvp and fdvp are both ref'd and locked.
762 * Ensure that the directory entry still exists and has not
763 * changed while the new name has been entered. If the source is
764 * a file then the entry may have been unlinked or renamed. In
765 * either case there is no further work to be done. If the source
766 * is a directory then it cannot have been rmdir'ed; its link
767 * count of three would cause a rmdir to fail with ENOTEMPTY.
768 * The IN_RENAME flag ensures that it cannot be moved by another
773 panic("ext2_rename: lost dir entry");
774 /* ip->i_flag only sets IN_RENAME if doingdirectory */
777 * If the source is a directory with a
778 * new parent, the link count of the old
779 * parent directory must be decremented
780 * and ".." set to point to the new parent.
782 if (doingdirectory && newparent) {
784 dp->i_flag |= IN_CHANGE;
785 error = vn_rdwr(UIO_READ, fvp, (caddr_t)&dirbuf,
786 sizeof (struct dirtemplate), (off_t)0,
787 UIO_SYSSPACE, IO_NODELOCKED,
788 tcnp->cn_cred, (int *)0);
790 /* Like ext2 little-endian: */
791 namlen = dirbuf.dotdot_type;
793 dirbuf.dotdot_name[0] != '.' ||
794 dirbuf.dotdot_name[1] != '.') {
795 ext2_dirbad(xp, (doff_t)12,
796 "rename: mangled dir");
798 dirbuf.dotdot_ino = newparent;
799 vn_rdwr(UIO_WRITE, fvp,
801 sizeof (struct dirtemplate),
802 (off_t)0, UIO_SYSSPACE,
803 IO_NODELOCKED|IO_SYNC,
804 tcnp->cn_cred, (int *)0);
808 error = ext2_dirremove(fdvp, fcnp);
811 xp->i_flag |= IN_CHANGE;
813 xp->i_flag &= ~IN_RENAME;
827 ip->i_flag &= ~IN_RENAME;
828 if (vn_lock(fvp, LK_EXCLUSIVE) == 0) {
830 ip->i_flag |= IN_CHANGE;
831 ip->i_flag &= ~IN_RENAME;
842 * ext2_mkdir(struct vnode *a_dvp, struct vnode **a_vpp,
843 * struct componentname *a_cnp, struct vattr *a_vap)
846 ext2_mkdir(struct vop_old_mkdir_args *ap)
848 struct vnode *dvp = ap->a_dvp;
849 struct vattr *vap = ap->a_vap;
850 struct componentname *cnp = ap->a_cnp;
851 struct inode *ip, *dp;
853 struct dirtemplate dirtemplate, *dtp;
857 if ((nlink_t)dp->i_nlink >= LINK_MAX) {
861 dmode = vap->va_mode & 0777;
864 * Must simulate part of ext2_makeinode here to acquire the inode,
865 * but not have it entered in the parent directory. The entry is
866 * made later after writing "." and ".." entries.
868 error = EXT2_VALLOC(dvp, dmode, cnp->cn_cred, &tvp);
872 ip->i_gid = dp->i_gid;
876 struct ucred ucred, *ucp;
880 * if we are hacking owners here, (only do this where told to)
881 * and we are not giving it TOO root, (would subvert quotas)
882 * then go ahead and give it to the other user.
883 * The new directory also inherits the SUID bit.
884 * If user's UID and dir UID are the same,
885 * 'give it away' so that the SUID is still forced on.
887 if ( (dvp->v_mount->mnt_flag & MNT_SUIDDIR) &&
888 (dp->i_mode & ISUID) && dp->i_uid) {
890 ip->i_uid = dp->i_uid;
892 if (dp->i_uid != cnp->cn_cred->cr_uid) {
894 * make sure the correct user gets charged
896 * Make a dummy credential for the victim.
897 * XXX This seems to never be accessed out of
898 * our context so a stack variable is ok.
901 ucred.cr_uid = ip->i_uid;
902 ucred.cr_ngroups = 1;
903 ucred.cr_groups[0] = dp->i_gid;
908 ip->i_uid = cnp->cn_cred->cr_uid;
911 if ((error = ext2_getinoquota(ip)) ||
912 (error = ext2_chkiq(ip, 1, ucp, 0))) {
913 EXT2_VFREE(tvp, ip->i_number, dmode);
920 ip->i_uid = cnp->cn_cred->cr_uid;
922 if ((error = ext2_getinoquota(ip)) ||
923 (error = ext2_chkiq(ip, 1, cnp->cn_cred, 0))) {
924 EXT2_VFREE(tvp, ip->i_number, dmode);
930 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
932 tvp->v_type = VDIR; /* Rest init'd in getnewvnode(). */
934 if (cnp->cn_flags & CNP_ISWHITEOUT)
935 ip->i_flags |= UF_OPAQUE;
936 error = EXT2_UPDATE(tvp, 1);
939 * The vnode must have a VM object in order to issue buffer cache
945 * Bump link count in parent directory
946 * to reflect work done below. Should
947 * be done before reference is created
948 * so reparation is possible if we crash.
951 dp->i_flag |= IN_CHANGE;
952 error = EXT2_UPDATE(dvp, 1);
956 /* Initialize directory with "." and ".." from static template. */
957 if (EXT2_HAS_INCOMPAT_FEATURE(ip->i_e2fs->s_es,
958 EXT2_FEATURE_INCOMPAT_FILETYPE))
959 dtp = &ext2_mastertemplate;
961 dtp = &ext2_omastertemplate;
963 dirtemplate.dot_ino = ip->i_number;
964 dirtemplate.dotdot_ino = dp->i_number;
965 /* note that in ext2 DIRBLKSIZ == blocksize, not DEV_BSIZE
966 * so let's just redefine it - for this function only
969 #define DIRBLKSIZ VTOI(dvp)->i_e2fs->s_blocksize
970 dirtemplate.dotdot_reclen = DIRBLKSIZ - 12;
971 error = vn_rdwr(UIO_WRITE, tvp, (caddr_t)&dirtemplate,
972 sizeof (dirtemplate), (off_t)0, UIO_SYSSPACE,
973 IO_NODELOCKED|IO_SYNC, cnp->cn_cred, (int *)0);
976 dp->i_flag |= IN_CHANGE;
979 if (DIRBLKSIZ > VFSTOEXT2(dvp->v_mount)->um_mountp->mnt_stat.f_bsize)
980 panic("ext2_mkdir: blksize"); /* XXX should grow with balloc() */
982 ip->i_size = DIRBLKSIZ;
983 ip->i_flag |= IN_CHANGE;
986 /* Directory set up, now install its entry in the parent directory. */
987 error = ext2_direnter(ip, dvp, cnp);
990 dp->i_flag |= IN_CHANGE;
994 * No need to do an explicit VOP_TRUNCATE here, vrele will do this
995 * for us because we set the link count to 0.
999 ip->i_flag |= IN_CHANGE;
1006 #define DIRBLKSIZ DEV_BSIZE
1010 * Rmdir system call.
1012 * ext2_rmdir(struct vnode *a_dvp, struct vnode *a_vp,
1013 * struct componentname *a_cnp)
1016 ext2_rmdir(struct vop_old_rmdir_args *ap)
1018 struct vnode *vp = ap->a_vp;
1019 struct vnode *dvp = ap->a_dvp;
1020 struct componentname *cnp = ap->a_cnp;
1021 struct inode *ip, *dp;
1028 * Verify the directory is empty (and valid).
1029 * (Rmdir ".." won't be valid since
1030 * ".." will contain a reference to
1031 * the current directory and thus be
1035 if (ip->i_nlink != 2 || !ext2_dirempty(ip, dp->i_number, cnp->cn_cred)) {
1039 if ((dp->i_flags & APPEND)
1040 || (ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND))) {
1045 * Delete reference to directory before purging
1046 * inode. If we crash in between, the directory
1047 * will be reattached to lost+found,
1049 error = ext2_dirremove(dvp, cnp);
1053 dp->i_flag |= IN_CHANGE;
1056 * Truncate inode. The only stuff left
1057 * in the directory is "." and "..". The
1058 * "." reference is inconsequential since
1059 * we're quashing it. The ".." reference
1060 * has already been adjusted above. We've
1061 * removed the "." reference and the reference
1062 * in the parent directory, but there may be
1063 * other hard links so decrement by 2 and
1064 * worry about them later.
1067 error = EXT2_TRUNCATE(vp, (off_t)0, IO_SYNC, cnp->cn_cred);
1068 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
1074 * symlink -- make a symbolic link
1076 * ext2_symlink(struct vnode *a_dvp, struct vnode **a_vpp,
1077 * struct componentname *a_cnp, struct vattr *a_vap,
1081 ext2_symlink(struct vop_old_symlink_args *ap)
1083 struct vnode *vp, **vpp = ap->a_vpp;
1087 error = ext2_makeinode(IFLNK | ap->a_vap->va_mode, ap->a_dvp,
1092 len = strlen(ap->a_target);
1093 if (len < vp->v_mount->mnt_maxsymlinklen) {
1095 bcopy(ap->a_target, (char *)ip->i_shortlink, len);
1097 ip->i_flag |= IN_CHANGE | IN_UPDATE;
1100 * Make sure we have a VM object in order to use
1103 if (vp->v_object == NULL)
1106 error = vn_rdwr(UIO_WRITE, vp, ap->a_target, len, (off_t)0,
1107 UIO_SYSSPACE, IO_NODELOCKED,
1108 ap->a_cnp->cn_cred, (int *)0);
1118 * Allocate a new inode.
1121 ext2_makeinode(int mode, struct vnode *dvp, struct vnode **vpp,
1122 struct componentname *cnp)
1124 struct inode *ip, *pdir;
1130 if ((mode & IFMT) == 0)
1133 error = EXT2_VALLOC(dvp, mode, cnp->cn_cred, &tvp);
1138 ip->i_gid = pdir->i_gid;
1142 struct ucred ucred, *ucp;
1147 * not the owner of the directory,
1148 * and we are hacking owners here, (only do this where told to)
1149 * and we are not giving it TOO root, (would subvert quotas)
1150 * then go ahead and give it to the other user.
1151 * Note that this drops off the execute bits for security.
1153 if ( (dvp->v_mount->mnt_flag & MNT_SUIDDIR) &&
1154 (pdir->i_mode & ISUID) &&
1155 (pdir->i_uid != cnp->cn_cred->cr_uid) && pdir->i_uid) {
1156 ip->i_uid = pdir->i_uid;
1160 * make sure the correct user gets charged
1162 * Quickly knock up a dummy credential for the victim.
1163 * XXX This seems to never be accessed out of our
1164 * context so a stack variable is ok.
1167 ucred.cr_uid = ip->i_uid;
1168 ucred.cr_ngroups = 1;
1169 ucred.cr_groups[0] = pdir->i_gid;
1173 ip->i_uid = cnp->cn_cred->cr_uid;
1177 if ((error = ext2_getinoquota(ip)) ||
1178 (error = ext2_chkiq(ip, 1, ucp, 0))) {
1179 EXT2_VFREE(tvp, ip->i_number, mode);
1186 ip->i_uid = cnp->cn_cred->cr_uid;
1188 if ((error = ext2_getinoquota(ip)) ||
1189 (error = ext2_chkiq(ip, 1, cnp->cn_cred, 0))) {
1190 EXT2_VFREE(tvp, ip->i_number, mode);
1196 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
1198 tvp->v_type = IFTOVT(mode); /* Rest init'd in getnewvnode(). */
1200 if ((ip->i_mode & ISGID) && !groupmember(ip->i_gid, cnp->cn_cred) &&
1201 suser_cred(cnp->cn_cred, PRISON_ROOT))
1202 ip->i_mode &= ~ISGID;
1204 if (cnp->cn_flags & CNP_ISWHITEOUT)
1205 ip->i_flags |= UF_OPAQUE;
1208 * Regular files and directories need VM objects. Softlinks do
1209 * not (not immediately anyway).
1211 if (tvp->v_type == VREG || tvp->v_type == VDIR)
1215 * Make sure inode goes to disk before directory entry.
1217 error = EXT2_UPDATE(tvp, 1);
1220 error = ext2_direnter(ip, dvp, cnp);
1229 * Write error occurred trying to update the inode
1230 * or the directory so must deallocate the inode.
1233 ip->i_flag |= IN_CHANGE;
1241 * XXX By default, wimp out... note that a_offset is ignored (and always
1245 ext2_getpages(struct vop_getpages_args *ap)
1247 return (vnode_pager_generic_getpages(ap->a_vp, ap->a_m, ap->a_count,
1254 * XXX By default, wimp out... note that a_offset is ignored (and always
1258 ext2_putpages(struct vop_putpages_args *ap)
1260 return (vnode_pager_generic_putpages(ap->a_vp, ap->a_m, ap->a_count,
1261 ap->a_sync, ap->a_rtvals));
1265 ext2_itimes(struct vnode *vp)
1271 if ((ip->i_flag & (IN_ACCESS | IN_CHANGE | IN_UPDATE)) == 0)
1273 if ((vp->v_type == VBLK || vp->v_type == VCHR) && !DOINGSOFTDEP(vp))
1274 ip->i_flag |= IN_LAZYMOD;
1276 ip->i_flag |= IN_MODIFIED;
1277 if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0) {
1279 if (ip->i_flag & IN_ACCESS) {
1280 ip->i_atime = ts.tv_sec;
1281 ip->i_atimensec = ts.tv_nsec;
1283 if (ip->i_flag & IN_UPDATE) {
1284 ip->i_mtime = ts.tv_sec;
1285 ip->i_mtimensec = ts.tv_nsec;
1288 if (ip->i_flag & IN_CHANGE) {
1289 ip->i_ctime = ts.tv_sec;
1290 ip->i_ctimensec = ts.tv_nsec;
1293 ip->i_flag &= ~(IN_ACCESS | IN_CHANGE | IN_UPDATE);
1301 * ext2_open(struct vnode *a_vp, int a_mode, struct ucred *a_cred)
1306 ext2_open(struct vop_open_args *ap)
1308 struct vnode *vp = ap->a_vp;
1311 * Files marked append-only must be opened for appending.
1313 if ((VTOI(vp)->i_flags & APPEND) &&
1314 (ap->a_mode & (FWRITE | O_APPEND)) == FWRITE) {
1317 return (vop_stdopen(ap));
1323 * Update the times on the inode.
1325 * ext2_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1330 ext2_close(struct vop_close_args *ap)
1332 struct vnode *vp = ap->a_vp;
1334 if (vp->v_usecount > 1)
1336 return (vop_stdclose(ap));
1340 * ext2_access(struct vnode *a_vp, int a_mode, struct ucred *a_cred)
1344 ext2_access(struct vop_access_args *ap)
1346 struct vnode *vp = ap->a_vp;
1347 struct inode *ip = VTOI(vp);
1348 struct ucred *cred = ap->a_cred;
1349 mode_t mask, mode = ap->a_mode;
1357 * Disallow write attempts on read-only filesystems;
1358 * unless the file is a socket, fifo, or a block or
1359 * character device resident on the filesystem.
1361 if (mode & VWRITE) {
1362 switch (vp->v_type) {
1366 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1369 if ((error = ext2_getinoquota(ip)) != 0)
1378 /* If immutable bit set, nobody gets to write it. */
1379 if ((mode & VWRITE) && (ip->i_flags & IMMUTABLE))
1382 /* Otherwise, user id 0 always gets access. */
1383 if (cred->cr_uid == 0)
1388 /* Otherwise, check the owner. */
1389 if (cred->cr_uid == ip->i_uid) {
1396 return ((ip->i_mode & mask) == mask ? 0 : EACCES);
1399 /* Otherwise, check the groups. */
1400 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
1401 if (ip->i_gid == *gp) {
1408 return ((ip->i_mode & mask) == mask ? 0 : EACCES);
1411 /* Otherwise, check everyone else. */
1418 return ((ip->i_mode & mask) == mask ? 0 : EACCES);
1422 * ext2_getattr(struct vnode *a_vp, struct vattr *a_vap)
1427 ext2_getattr(struct vop_getattr_args *ap)
1429 struct vnode *vp = ap->a_vp;
1430 struct inode *ip = VTOI(vp);
1431 struct vattr *vap = ap->a_vap;
1435 * Copy from inode table
1437 vap->va_fsid = dev2udev(ip->i_dev);
1438 vap->va_fileid = ip->i_number;
1439 vap->va_mode = ip->i_mode & ~IFMT;
1440 vap->va_nlink = VFSTOEXT2(vp->v_mount)->um_i_effnlink_valid ?
1441 ip->i_effnlink : ip->i_nlink;
1442 vap->va_uid = ip->i_uid;
1443 vap->va_gid = ip->i_gid;
1444 vap->va_rdev = ip->i_rdev;
1445 vap->va_size = ip->i_din.di_size;
1446 vap->va_atime.tv_sec = ip->i_atime;
1447 vap->va_atime.tv_nsec = ip->i_atimensec;
1448 vap->va_mtime.tv_sec = ip->i_mtime;
1449 vap->va_mtime.tv_nsec = ip->i_mtimensec;
1450 vap->va_ctime.tv_sec = ip->i_ctime;
1451 vap->va_ctime.tv_nsec = ip->i_ctimensec;
1452 vap->va_flags = ip->i_flags;
1453 vap->va_gen = ip->i_gen;
1454 vap->va_blocksize = vp->v_mount->mnt_stat.f_iosize;
1455 vap->va_bytes = dbtob((u_quad_t)ip->i_blocks);
1456 vap->va_type = IFTOVT(ip->i_mode);
1457 vap->va_filerev = ip->i_modrev;
1462 * Set attribute vnode op. called from several syscalls
1464 * ext2_setattr(struct vnode *a_vp, struct vattr *a_vap, struct ucred *a_cred)
1468 ext2_setattr(struct vop_setattr_args *ap)
1470 struct vattr *vap = ap->a_vap;
1471 struct vnode *vp = ap->a_vp;
1472 struct inode *ip = VTOI(vp);
1473 struct ucred *cred = ap->a_cred;
1477 * Check for unsettable attributes.
1479 if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
1480 (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
1481 (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
1482 ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
1485 if (vap->va_flags != VNOVAL) {
1486 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1488 if (cred->cr_uid != ip->i_uid &&
1489 (error = suser_cred(cred, PRISON_ROOT)))
1492 * Note that a root chflags becomes a user chflags when
1493 * we are jailed, unless the jail.chflags_allowed sysctl
1496 if (cred->cr_uid == 0 &&
1497 (!jailed(cred) || jail_chflags_allowed)) {
1499 & (SF_NOUNLINK | SF_IMMUTABLE | SF_APPEND)) &&
1502 ip->i_flags = vap->va_flags;
1505 & (SF_NOUNLINK | SF_IMMUTABLE | SF_APPEND) ||
1506 (vap->va_flags & UF_SETTABLE) != vap->va_flags)
1508 ip->i_flags &= SF_SETTABLE;
1509 ip->i_flags |= (vap->va_flags & UF_SETTABLE);
1511 ip->i_flag |= IN_CHANGE;
1512 if (vap->va_flags & (IMMUTABLE | APPEND))
1515 if (ip->i_flags & (IMMUTABLE | APPEND))
1518 * Go through the fields and update iff not VNOVAL.
1520 if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
1521 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1523 if ((error = ext2_chown(vp, vap->va_uid, vap->va_gid, cred)) != 0)
1526 if (vap->va_size != VNOVAL) {
1528 * Disallow write attempts on read-only filesystems;
1529 * unless the file is a socket, fifo, or a block or
1530 * character device resident on the filesystem.
1532 switch (vp->v_type) {
1537 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1543 if ((error = EXT2_TRUNCATE(vp, vap->va_size, 0, cred)) != 0)
1547 if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
1548 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1550 if (cred->cr_uid != ip->i_uid &&
1551 (error = suser_cred(cred, PRISON_ROOT)) &&
1552 ((vap->va_vaflags & VA_UTIMES_NULL) == 0 ||
1553 (error = VOP_ACCESS(vp, VWRITE, cred))))
1555 if (vap->va_atime.tv_sec != VNOVAL)
1556 ip->i_flag |= IN_ACCESS;
1557 if (vap->va_mtime.tv_sec != VNOVAL)
1558 ip->i_flag |= IN_CHANGE | IN_UPDATE;
1560 if (vap->va_atime.tv_sec != VNOVAL) {
1561 ip->i_atime = vap->va_atime.tv_sec;
1562 ip->i_atimensec = vap->va_atime.tv_nsec;
1564 if (vap->va_mtime.tv_sec != VNOVAL) {
1565 ip->i_mtime = vap->va_mtime.tv_sec;
1566 ip->i_mtimensec = vap->va_mtime.tv_nsec;
1568 error = EXT2_UPDATE(vp, 0);
1573 if (vap->va_mode != (mode_t)VNOVAL) {
1574 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1576 error = ext2_chmod(vp, (int)vap->va_mode, cred);
1578 VN_KNOTE(vp, NOTE_ATTRIB);
1583 * Change the mode on a file.
1584 * Inode must be locked before calling.
1587 ext2_chmod(struct vnode *vp, int mode, struct ucred *cred)
1589 struct inode *ip = VTOI(vp);
1592 if (cred->cr_uid != ip->i_uid) {
1593 error = suser_cred(cred, PRISON_ROOT);
1598 if (vp->v_type != VDIR && (mode & S_ISTXT))
1600 if (!groupmember(ip->i_gid, cred) && (mode & ISGID))
1603 ip->i_mode &= ~ALLPERMS;
1604 ip->i_mode |= (mode & ALLPERMS);
1605 ip->i_flag |= IN_CHANGE;
1610 * Perform chown operation on inode ip;
1611 * inode must be locked prior to call.
1614 ext2_chown(struct vnode *vp, uid_t uid, gid_t gid, struct ucred *cred)
1616 struct inode *ip = VTOI(vp);
1625 if (uid == (uid_t)VNOVAL)
1627 if (gid == (gid_t)VNOVAL)
1630 * If we don't own the file, are trying to change the owner
1631 * of the file, or are not a member of the target group,
1632 * the caller must be superuser or the call fails.
1634 if ((cred->cr_uid != ip->i_uid || uid != ip->i_uid ||
1635 (gid != ip->i_gid && !(cred->cr_gid == gid ||
1636 groupmember((gid_t)gid, cred)))) &&
1637 (error = suser_cred(cred, PRISON_ROOT)))
1642 if ((error = ext2_getinoquota(ip)) != 0)
1645 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1646 ip->i_dquot[USRQUOTA] = NODQUOT;
1649 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1650 ip->i_dquot[GRPQUOTA] = NODQUOT;
1652 change = ip->i_blocks;
1653 (void) ext2_chkdq(ip, -change, cred, CHOWN);
1654 (void) ext2_chkiq(ip, -1, cred, CHOWN);
1655 for (i = 0; i < MAXQUOTAS; i++) {
1656 ext2_dqrele(vp, ip->i_dquot[i]);
1657 ip->i_dquot[i] = NODQUOT;
1663 if ((error = ext2_getinoquota(ip)) == 0) {
1665 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1666 ip->i_dquot[USRQUOTA] = NODQUOT;
1669 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1670 ip->i_dquot[GRPQUOTA] = NODQUOT;
1672 if ((error = ext2_chkdq(ip, change, cred, CHOWN)) == 0) {
1673 if ((error = ext2_chkiq(ip, 1, cred, CHOWN)) == 0)
1676 (void)ext2_chkdq(ip, -change, cred, CHOWN|FORCE);
1678 for (i = 0; i < MAXQUOTAS; i++) {
1679 ext2_dqrele(vp, ip->i_dquot[i]);
1680 ip->i_dquot[i] = NODQUOT;
1685 if (ext2_getinoquota(ip) == 0) {
1687 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1688 ip->i_dquot[USRQUOTA] = NODQUOT;
1691 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1692 ip->i_dquot[GRPQUOTA] = NODQUOT;
1694 (void) ext2_chkdq(ip, change, cred, FORCE|CHOWN);
1695 (void) ext2_chkiq(ip, 1, cred, FORCE|CHOWN);
1696 (void) ext2_getinoquota(ip);
1700 if (ext2_getinoquota(ip))
1701 panic("ext2_chown: lost quota");
1703 ip->i_flag |= IN_CHANGE;
1704 if (cred->cr_uid != 0 && (ouid != uid || ogid != gid))
1705 ip->i_mode &= ~(ISUID | ISGID);
1712 * NB Currently unsupported.
1714 * ext2_mmap(struct vnode *a_vp, int a_fflags, struct ucred *a_cred)
1719 ext2_mmap(struct vop_mmap_args *ap)
1725 * whiteout vnode call
1727 * ext2_whiteout(struct vnode *a_dvp, struct componentname *a_cnp, int a_flags)
1731 ext2_whiteout(struct vop_old_whiteout_args *ap)
1733 return (EOPNOTSUPP);
1737 * Return target name of a symbolic link
1739 * ext2_readlink(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred)
1743 ext2_readlink(struct vop_readlink_args *ap)
1745 struct vnode *vp = ap->a_vp;
1746 struct inode *ip = VTOI(vp);
1750 if ((isize < vp->v_mount->mnt_maxsymlinklen) ||
1751 (ip->i_din.di_blocks == 0)) { /* XXX - for old fastlink support */
1752 uiomove((char *)ip->i_shortlink, isize, ap->a_uio);
1755 return (VOP_READ(vp, ap->a_uio, 0, ap->a_cred));
1759 * Calculate the logical to physical mapping if not done already,
1760 * then call the device strategy routine.
1762 * In order to be able to swap to a file, the VOP_BMAP operation may not
1763 * deadlock on memory. See ext2_bmap() for details.
1765 * ext2_strategy(struct vnode *a_vp, struct bio *a_bio)
1769 ext2_strategy(struct vop_strategy_args *ap)
1771 struct bio *bio = ap->a_bio;
1773 struct buf *bp = bio->bio_buf;
1774 struct vnode *vp = ap->a_vp;
1779 if (vp->v_type == VBLK || vp->v_type == VCHR)
1780 panic("ext2_strategy: spec");
1781 nbio = push_bio(bio);
1782 if (nbio->bio_offset == NOOFFSET) {
1783 error = VOP_BMAP(vp, bio->bio_offset, NULL, &nbio->bio_offset,
1786 bp->b_error = error;
1787 bp->b_flags |= B_ERROR;
1788 /* I/O was never started on nbio, must biodone(bio) */
1792 if (nbio->bio_offset == NOOFFSET)
1795 if (nbio->bio_offset == NOOFFSET) {
1796 /* I/O was never started on nbio, must biodone(bio) */
1800 vn_strategy(ip->i_devvp, nbio);
1805 * Print out the contents of an inode.
1807 * ext2_print(struct vnode *a_vp)
1811 ext2_print(struct vop_print_args *ap)
1813 struct vnode *vp = ap->a_vp;
1814 struct inode *ip = VTOI(vp);
1816 kprintf("tag VT_EXT2FS, ino %lu, on dev %s (%d, %d)",
1817 (u_long)ip->i_number, devtoname(ip->i_dev), major(ip->i_dev),
1819 if (vp->v_type == VFIFO)
1821 lockmgr_printinfo(&vp->v_lock);
1827 * Read wrapper for special devices.
1829 * ext2spec_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1830 * struct ucred *a_cred)
1834 ext2spec_read(struct vop_read_args *ap)
1841 resid = uio->uio_resid;
1842 error = VOCALL(&spec_vnode_vops, &ap->a_head);
1844 * The inode may have been revoked during the call, so it must not
1845 * be accessed blindly here or in the other wrapper functions.
1847 ip = VTOI(ap->a_vp);
1848 if (ip != NULL && (uio->uio_resid != resid || (error == 0 && resid != 0)))
1849 ip->i_flag |= IN_ACCESS;
1854 * Write wrapper for special devices.
1856 * ext2spec_write(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1857 * struct ucred *a_cred)
1861 ext2spec_write(struct vop_write_args *ap)
1868 resid = uio->uio_resid;
1869 error = VOCALL(&spec_vnode_vops, &ap->a_head);
1870 ip = VTOI(ap->a_vp);
1871 if (ip != NULL && (uio->uio_resid != resid || (error == 0 && resid != 0)))
1872 VTOI(ap->a_vp)->i_flag |= IN_CHANGE | IN_UPDATE;
1877 * Close wrapper for special devices.
1879 * Update the times on the inode then do device close.
1881 * ext2spec_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1885 ext2spec_close(struct vop_close_args *ap)
1887 struct vnode *vp = ap->a_vp;
1889 if (vp->v_usecount > 1)
1891 return (VOCALL(&spec_vnode_vops, &ap->a_head));
1895 * Read wrapper for fifos.
1897 * ext2fifo_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1898 * struct ucred *a_cred)
1902 ext2fifo_read(struct vop_read_args *ap)
1909 resid = uio->uio_resid;
1910 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1911 ip = VTOI(ap->a_vp);
1912 if ((ap->a_vp->v_mount->mnt_flag & MNT_NOATIME) == 0 && ip != NULL &&
1913 (uio->uio_resid != resid || (error == 0 && resid != 0)))
1914 VTOI(ap->a_vp)->i_flag |= IN_ACCESS;
1919 * Write wrapper for fifos.
1921 * ext2fifo_write(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1922 * struct ucred *a_cred)
1926 ext2fifo_write(struct vop_write_args *ap)
1933 resid = uio->uio_resid;
1934 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1935 ip = VTOI(ap->a_vp);
1936 if (ip != NULL && (uio->uio_resid != resid || (error == 0 && resid != 0)))
1937 VTOI(ap->a_vp)->i_flag |= IN_CHANGE | IN_UPDATE;
1942 * Close wrapper for fifos.
1944 * Update the times on the inode then do device close.
1946 * ext2fifo_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1950 ext2fifo_close(struct vop_close_args *ap)
1952 struct vnode *vp = ap->a_vp;
1954 if (vp->v_usecount > 1)
1956 return (VOCALL(&fifo_vnode_vops, &ap->a_head));
1960 * Kqfilter wrapper for fifos.
1962 * Fall through to ext2 kqfilter routines if needed
1966 ext2fifo_kqfilter(struct vop_kqfilter_args *ap)
1970 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1972 error = ext2_kqfilter(ap);
1977 * Return POSIX pathconf information applicable to ext2 filesystems.
1979 * ext2_pathconf(struct vnode *a_vp, int a_name, int *a_retval)
1983 ext2_pathconf(struct vop_pathconf_args *ap)
1985 switch (ap->a_name) {
1987 *ap->a_retval = LINK_MAX;
1990 *ap->a_retval = NAME_MAX;
1993 *ap->a_retval = PATH_MAX;
1996 *ap->a_retval = PIPE_BUF;
1998 case _PC_CHOWN_RESTRICTED:
2011 * Advisory record locking support
2013 * ext2_advlock(struct vnode *a_vp, caddr_t a_id, int a_op, struct flock *a_fl,
2018 ext2_advlock(struct vop_advlock_args *ap)
2020 struct inode *ip = VTOI(ap->a_vp);
2022 return (lf_advlock(ap, &(ip->i_lockf), ip->i_size));
2026 * Initialize the vnode associated with a new inode, handle aliased
2030 ext2_vinit(struct mount *mntp, struct vnode **vpp)
2039 switch(vp->v_type = IFTOVT(ip->i_mode)) {
2042 vp->v_ops = &mntp->mnt_vn_spec_ops;
2043 addaliasu(vp, ip->i_rdev);
2046 vp->v_ops = &mntp->mnt_vn_fifo_ops;
2050 vinitvmio(vp, ip->i_size);
2053 if ((ip->i_size >= vp->v_mount->mnt_maxsymlinklen) &&
2054 ip->i_din.di_blocks != 0
2056 vinitvmio(vp, ip->i_size);
2064 if (ip->i_number == ROOTINO)
2065 vp->v_flag |= VROOT;
2067 * Initialize modrev times
2069 getmicrouptime(&tv);
2070 SETHIGH(ip->i_modrev, tv.tv_sec);
2071 SETLOW(ip->i_modrev, tv.tv_usec * 4294);
2076 static struct filterops ext2read_filtops =
2077 { 1, NULL, filt_ext2detach, filt_ext2read };
2078 static struct filterops ext2write_filtops =
2079 { 1, NULL, filt_ext2detach, filt_ext2write };
2080 static struct filterops ext2vnode_filtops =
2081 { 1, NULL, filt_ext2detach, filt_ext2vnode };
2084 * ext2_kqfilter(struct vnode *a_vp, struct knote *a_kn)
2087 ext2_kqfilter(struct vop_kqfilter_args *ap)
2089 struct vnode *vp = ap->a_vp;
2090 struct knote *kn = ap->a_kn;
2093 switch (kn->kn_filter) {
2095 kn->kn_fop = &ext2read_filtops;
2098 kn->kn_fop = &ext2write_filtops;
2101 kn->kn_fop = &ext2vnode_filtops;
2107 kn->kn_hook = (caddr_t)vp;
2109 lwkt_gettoken(&ilock, &vp->v_pollinfo.vpi_token);
2110 SLIST_INSERT_HEAD(&vp->v_pollinfo.vpi_selinfo.si_note, kn, kn_selnext);
2111 lwkt_reltoken(&ilock);
2117 filt_ext2detach(struct knote *kn)
2119 struct vnode *vp = (struct vnode *)kn->kn_hook;
2122 lwkt_gettoken(&ilock, &vp->v_pollinfo.vpi_token);
2123 SLIST_REMOVE(&vp->v_pollinfo.vpi_selinfo.si_note,
2124 kn, knote, kn_selnext);
2125 lwkt_reltoken(&ilock);
2130 filt_ext2read(struct knote *kn, long hint)
2132 struct vnode *vp = (struct vnode *)kn->kn_hook;
2133 struct inode *ip = VTOI(vp);
2136 * filesystem is gone, so set the EOF flag and schedule
2137 * the knote for deletion.
2139 if (hint == NOTE_REVOKE) {
2140 kn->kn_flags |= (EV_EOF | EV_ONESHOT);
2144 kn->kn_data = ip->i_size - kn->kn_fp->f_offset;
2145 return (kn->kn_data != 0);
2150 filt_ext2write(struct knote *kn, long hint)
2153 * filesystem is gone, so set the EOF flag and schedule
2154 * the knote for deletion.
2156 if (hint == NOTE_REVOKE)
2157 kn->kn_flags |= (EV_EOF | EV_ONESHOT);
2164 filt_ext2vnode(struct knote *kn, long hint)
2166 if (kn->kn_sfflags & hint)
2167 kn->kn_fflags |= hint;
2168 if (hint == NOTE_REVOKE) {
2169 kn->kn_flags |= EV_EOF;
2172 return (kn->kn_fflags != 0);
2175 struct vop_ops ext2_vnode_vops = {
2176 .vop_default = vop_defaultop,
2177 .vop_fsync = ext2_fsync,
2178 .vop_read = ext2_read,
2179 .vop_reallocblks = ext2_reallocblks,
2180 .vop_write = ext2_write,
2181 .vop_access = ext2_access,
2182 .vop_advlock = ext2_advlock,
2183 .vop_bmap = ext2_bmap,
2184 .vop_old_lookup = ext2_lookup,
2185 .vop_close = ext2_close,
2186 .vop_old_create = ext2_create,
2187 .vop_getattr = ext2_getattr,
2188 .vop_inactive = ext2_inactive,
2189 .vop_old_link = ext2_link,
2190 .vop_old_mkdir = ext2_mkdir,
2191 .vop_old_mknod = ext2_mknod,
2192 .vop_mmap = ext2_mmap,
2193 .vop_open = ext2_open,
2194 .vop_pathconf = ext2_pathconf,
2195 .vop_poll = vop_stdpoll,
2196 .vop_kqfilter = ext2_kqfilter,
2197 .vop_print = ext2_print,
2198 .vop_readdir = ext2_readdir,
2199 .vop_readlink = ext2_readlink,
2200 .vop_reclaim = ext2_reclaim,
2201 .vop_old_remove = ext2_remove,
2202 .vop_old_rename = ext2_rename,
2203 .vop_old_rmdir = ext2_rmdir,
2204 .vop_setattr = ext2_setattr,
2205 .vop_strategy = ext2_strategy,
2206 .vop_old_symlink = ext2_symlink,
2207 .vop_old_whiteout = ext2_whiteout,
2208 .vop_getpages = ext2_getpages,
2209 .vop_putpages = ext2_putpages
2212 struct vop_ops ext2_spec_vops = {
2213 .vop_default = ext2_vnoperatespec,
2214 .vop_fsync = ext2_fsync,
2215 .vop_access = ext2_access,
2216 .vop_close = ext2spec_close,
2217 .vop_getattr = ext2_getattr,
2218 .vop_inactive = ext2_inactive,
2219 .vop_print = ext2_print,
2220 .vop_read = ext2spec_read,
2221 .vop_reclaim = ext2_reclaim,
2222 .vop_setattr = ext2_setattr,
2223 .vop_write = ext2spec_write
2226 struct vop_ops ext2_fifo_vops = {
2227 .vop_default = ext2_vnoperatefifo,
2228 .vop_fsync = ext2_fsync,
2229 .vop_access = ext2_access,
2230 .vop_close = ext2fifo_close,
2231 .vop_getattr = ext2_getattr,
2232 .vop_inactive = ext2_inactive,
2233 .vop_kqfilter = ext2fifo_kqfilter,
2234 .vop_print = ext2_print,
2235 .vop_read = ext2fifo_read,
2236 .vop_reclaim = ext2_reclaim,
2237 .vop_setattr = ext2_setattr,
2238 .vop_write = ext2fifo_write
2241 VNODEOP_SET(ext2_vnode_vops);
2242 VNODEOP_SET(ext2_spec_vops);
2243 VNODEOP_SET(ext2_fifo_vops);
2249 ext2_vnoperate(struct vop_generic_args *ap)
2251 return (VOCALL(&ext2_vnode_vops, ap));
2255 * ext2_vnoperatefifo()
2258 ext2_vnoperatefifo(struct vop_generic_args *ap)
2260 return (VOCALL(&ext2_fifo_vops, ap));
2264 * ext2_vnoperatespec()
2267 ext2_vnoperatespec(struct vop_generic_args *ap)
2269 return (VOCALL(&ext2_spec_vops, ap));