2 * modified for EXT2FS support in Lites 1.1
4 * Aug 1995, Godmar Back (gback@cs.utah.edu)
5 * University of Utah, Department of Computer Science
8 * Copyright (c) 1982, 1986, 1989, 1993
9 * The Regents of the University of California. All rights reserved.
10 * (c) UNIX System Laboratories, Inc.
11 * All or some portions of this file are derived from material licensed
12 * to the University of California by American Telephone and Telegraph
13 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
14 * the permission of UNIX System Laboratories, Inc.
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
19 * 1. Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution.
24 * 3. Neither the name of the University nor the names of its contributors
25 * may be used to endorse or promote products derived from this software
26 * without specific prior written permission.
28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 * @(#)ufs_vnops.c 8.27 (Berkeley) 5/27/95
41 * @(#)ext2_vnops.c 8.7 (Berkeley) 2/3/94
42 * $FreeBSD: src/sys/gnu/ext2fs/ext2_vnops.c,v 1.51.2.2 2003/01/02 17:26:18 bde Exp $
45 #include "opt_quota.h"
46 #include "opt_suiddir.h"
48 #include <sys/param.h>
49 #include <sys/systm.h>
51 #include <sys/resourcevar.h>
52 #include <sys/kernel.h>
54 #include <sys/fcntl.h>
58 #include <sys/mount.h>
60 #include <sys/vnode.h>
61 #include <sys/dirent.h>
62 #include <sys/lockf.h>
63 #include <sys/event.h>
67 #include <sys/namei.h>
68 #include <sys/signalvar.h>
69 #include <sys/unistd.h>
72 #include <vm/vm_extern.h>
73 #include <vm/vm_zone.h>
74 #include <vm/vnode_pager.h>
78 #include <vfs/fifofs/fifo.h>
83 #include "ext2_mount.h"
84 #include "ext2_fs_sb.h"
86 #include "ext2_extern.h"
89 static int ext2_access (struct vop_access_args *);
90 static int ext2_advlock (struct vop_advlock_args *);
91 static int ext2_chmod (struct vnode *, int, struct ucred *);
92 static int ext2_chown (struct vnode *, uid_t, gid_t, struct ucred *);
93 static int ext2_close (struct vop_close_args *);
94 static int ext2_getattr (struct vop_getattr_args *);
95 static int ext2_makeinode (int mode, struct vnode *, struct vnode **, struct componentname *);
96 static int ext2_open (struct vop_open_args *);
97 static int ext2_pathconf (struct vop_pathconf_args *);
98 static int ext2_print (struct vop_print_args *);
99 static int ext2_readlink (struct vop_readlink_args *);
100 static int ext2_setattr (struct vop_setattr_args *);
101 static int ext2_strategy (struct vop_strategy_args *);
102 static int ext2_whiteout (struct vop_old_whiteout_args *);
103 static int filt_ext2read (struct knote *kn, long hint);
104 static int filt_ext2write (struct knote *kn, long hint);
105 static int filt_ext2vnode (struct knote *kn, long hint);
106 static void filt_ext2detach (struct knote *kn);
107 static int ext2_kqfilter (struct vop_kqfilter_args *ap);
108 static int ext2fifo_close (struct vop_close_args *);
109 static int ext2fifo_kqfilter (struct vop_kqfilter_args *);
110 static int ext2fifo_read (struct vop_read_args *);
111 static int ext2fifo_write (struct vop_write_args *);
113 static int ext2_fsync (struct vop_fsync_args *);
114 static int ext2_read (struct vop_read_args *);
115 static int ext2_write (struct vop_write_args *);
116 static int ext2_remove (struct vop_old_remove_args *);
117 static int ext2_link (struct vop_old_link_args *);
118 static int ext2_rename (struct vop_old_rename_args *);
119 static int ext2_mkdir (struct vop_old_mkdir_args *);
120 static int ext2_rmdir (struct vop_old_rmdir_args *);
121 static int ext2_create (struct vop_old_create_args *);
122 static int ext2_mknod (struct vop_old_mknod_args *);
123 static int ext2_symlink (struct vop_old_symlink_args *);
125 #include "ext2_readwrite.c"
127 #define VN_KNOTE(vp, b) \
128 KNOTE(&vp->v_pollinfo.vpi_kqinfo.ki_note, (b))
130 #define OFSFMT(vp) ((vp)->v_mount->mnt_maxsymlinklen <= 0)
133 * A virgin directory (no blushing please).
134 * Note that the type and namlen fields are reversed relative to ufs.
135 * Also, we don't use `struct odirtemplate', since it would just cause
136 * endianness problems.
138 static struct dirtemplate ext2_mastertemplate = {
139 0, 12, 1, EXT2_FT_DIR, ".",
140 0, DIRBLKSIZ - 12, 2, EXT2_FT_DIR, ".."
142 static struct dirtemplate ext2_omastertemplate = {
143 0, 12, 1, EXT2_FT_UNKNOWN, ".",
144 0, DIRBLKSIZ - 12, 2, EXT2_FT_UNKNOWN, ".."
148 * Create a regular file
150 * ext2_create(struct vnode *a_dvp, struct vnode **a_vpp,
151 * struct componentname *a_cnp, struct vattr *a_vap)
154 ext2_create(struct vop_old_create_args *ap)
159 ext2_makeinode(MAKEIMODE(ap->a_vap->va_type, ap->a_vap->va_mode),
160 ap->a_dvp, ap->a_vpp, ap->a_cnp);
167 * Synch an open file.
169 * ext2_fsync(struct vnode *a_vp, struct ucred *a_cred, int a_waitfor,
174 static int ext2_fsync_bp(struct buf *bp, void *data);
176 struct ext2_fsync_bp_info {
182 ext2_fsync(struct vop_fsync_args *ap)
184 struct ext2_fsync_bp_info info;
185 struct vnode *vp = ap->a_vp;
189 * XXX why is all this fs specific?
193 * Flush all dirty buffers associated with a vnode.
195 ext2_discard_prealloc(VTOI(vp));
197 lwkt_gettoken(&vp->v_token);
200 info.waitfor = ap->a_waitfor;
201 count = RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
202 ext2_fsync_bp, &info);
206 if (ap->a_waitfor == MNT_WAIT) {
207 bio_track_wait(&vp->v_track_write, 0, 0);
209 if (!RB_EMPTY(&vp->v_rbdirty_tree)) {
210 vprint("ext2_fsync: dirty", vp);
215 lwkt_reltoken(&vp->v_token);
216 return (EXT2_UPDATE(ap->a_vp, ap->a_waitfor == MNT_WAIT));
220 ext2_fsync_bp(struct buf *bp, void *data)
222 struct ext2_fsync_bp_info *info = data;
224 if (BUF_LOCK(bp, LK_EXCLUSIVE | LK_NOWAIT))
226 if ((bp->b_flags & B_DELWRI) == 0)
227 panic("ext2_fsync: not dirty");
231 * Wait for I/O associated with indirect blocks to complete,
232 * since there is no way to quickly wait for them below.
234 if (bp->b_vp == info->vp || (info->waitfor & MNT_NOWAIT))
244 * ext2_mknod(struct vnode *a_dvp, struct vnode **a_vpp,
245 * struct componentname *a_cnp, struct vattr *a_vap)
249 ext2_mknod(struct vop_old_mknod_args *ap)
251 struct vattr *vap = ap->a_vap;
252 struct vnode **vpp = ap->a_vpp;
257 if (vap->va_rmajor != VNOVAL &&
258 makeudev(vap->va_rmajor, vap->va_rminor) == NOUDEV) {
262 error = ext2_makeinode(MAKEIMODE(vap->va_type, vap->va_mode),
263 ap->a_dvp, vpp, ap->a_cnp);
267 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
268 if (vap->va_rmajor != VNOVAL) {
270 * Want to be able to use this to make badblock
271 * inodes, so don't truncate the dev number.
273 ip->i_rdev = makeudev(vap->va_rmajor, vap->va_rminor);
276 * Remove inode, then reload it through VFS_VGET so it is
277 * checked to see if it is an alias of an existing entry in
280 (*vpp)->v_type = VNON;
281 ino = ip->i_number; /* Save this before vgone() invalidates ip. */
282 vgone_vxlocked(*vpp);
284 error = VFS_VGET(ap->a_dvp->v_mount, NULL, ino, vpp);
293 * ext2_remove(struct vnode *a_dvp, struct vnode *a_vp,
294 * struct componentname *a_cnp)
297 ext2_remove(struct vop_old_remove_args *ap)
300 struct vnode *vp = ap->a_vp;
301 struct vnode *dvp = ap->a_dvp;
305 if ((ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
306 (VTOI(dvp)->i_flags & APPEND)) {
310 error = ext2_dirremove(dvp, ap->a_cnp);
313 ip->i_flag |= IN_CHANGE;
322 * ext2_link(struct vnode *a_tdvp, struct vnode *a_vp,
323 * struct componentname *a_cnp)
326 ext2_link(struct vop_old_link_args *ap)
328 struct vnode *vp = ap->a_vp;
329 struct vnode *tdvp = ap->a_tdvp;
330 struct componentname *cnp = ap->a_cnp;
334 if (tdvp->v_mount != vp->v_mount) {
339 error = vn_lock(vp, LK_EXCLUSIVE | LK_FAILRECLAIM);
344 if ((nlink_t)ip->i_nlink >= LINK_MAX) {
348 if (ip->i_flags & (IMMUTABLE | APPEND)) {
353 ip->i_flag |= IN_CHANGE;
354 error = EXT2_UPDATE(vp, 1);
356 error = ext2_direnter(ip, tdvp, cnp);
359 ip->i_flag |= IN_CHANGE;
369 * Rename system call. fdvp, fvp are ref'd. tvp, tdvp are ref'd and locked.
370 * all vp's are released and must be in an unlocked state on return.
372 * ext2_rename(struct vnode *a_fdvp, struct vnode *a_fvp,
373 * struct componentname *a_fcnp, struct vnode *a_tdvp,
374 * struct vnode *a_tvp, struct componentname *a_tcnp)
377 ext2_rename(struct vop_old_rename_args *ap)
379 struct vnode *tvp = ap->a_tvp;
380 struct vnode *tdvp = ap->a_tdvp;
381 struct vnode *fvp = ap->a_fvp;
382 struct vnode *fdvp = ap->a_fdvp;
383 struct componentname *tcnp = ap->a_tcnp;
384 struct componentname *fcnp = ap->a_fcnp;
385 struct inode *ip, *xp, *dp;
386 struct dirtemplate dirbuf;
387 int doingdirectory = 0, oldparent = 0, newparent = 0;
392 * Check for cross-device rename.
394 if ((fvp->v_mount != tdvp->v_mount) ||
395 (tvp && (fvp->v_mount != tvp->v_mount)) ||
410 if (tvp && ((VTOI(tvp)->i_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
411 (VTOI(tdvp)->i_flags & APPEND))) {
417 * Renaming a file to itself has no effect. The upper layers should
418 * not call us in that case. Temporarily just warn if they do.
425 error = vn_lock(fvp, LK_EXCLUSIVE | LK_FAILRECLAIM);
430 * fvp, tvp, tdvp locked. fdvp not locked but note that fdvp may
435 if (ip->i_nlink >= LINK_MAX) {
440 if ((ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND))
441 || (dp->i_flags & APPEND)) {
446 if ((ip->i_mode & IFMT) == IFDIR) {
448 * Avoid ".", "..", and aliases of "." for obvious reasons.
450 if ((fcnp->cn_namelen == 1 && fcnp->cn_nameptr[0] == '.') ||
451 dp == ip || (fcnp->cn_flags | tcnp->cn_flags) & CNP_ISDOTDOT ||
452 (ip->i_flag & IN_RENAME)) {
457 ip->i_flag |= IN_RENAME;
458 oldparent = dp->i_number;
463 * tvp is non-NULL if the target exists. fvp is still locked but
464 * we will unlock it soon. The 'bad' goto target requires dp and
465 * xp to be correctly assigned.
474 * 1) Bump link count while we're moving stuff
475 * around. If we crash somewhere before
476 * completing our work, the link count
477 * may be wrong, but correctable.
480 ip->i_flag |= IN_CHANGE;
481 if ((error = EXT2_UPDATE(fvp, 1)) != 0) {
487 * If ".." must be changed (ie the directory gets a new
488 * parent) then the source directory must not be in the
489 * directory heirarchy above the target, as this would
490 * orphan everything below the source directory. Also
491 * the user must have write permission in the source so
492 * as to be able to change "..". We must repeat the call
493 * to namei, as the parent directory is unlocked by the
494 * call to checkpath().
496 error = VOP_EACCESS(fvp, VWRITE, tcnp->cn_cred);
500 * tvp (if not NULL) and tdvp are locked. fvp and fdvp are not.
501 * dp and xp are set according to tdvp and tvp.
503 if (oldparent != dp->i_number)
504 newparent = dp->i_number;
505 if (doingdirectory && newparent) {
506 if (error) /* write access check above */
510 * Prepare for relookup, get rid of xp
518 * checkpath vput()'s tdvp (VTOI(dp)) on return no matter what,
519 * get an extra ref so we wind up with just an unlocked, ref'd
520 * tdvp. The 'out' target skips xp and tdvp cleanups. Our
521 * tdvp is now unlocked so we have to clean it up ourselves.
524 error = ext2_checkpath(ip, dp, tcnp->cn_cred);
525 tcnp->cn_flags |= CNP_PDIRUNLOCK;
531 * relookup no longer messes with the ref count. An unlocked
532 * tdvp must be passed and if no error occurs a locked tdvp
533 * will be returned. We have to use the out target again.
535 error = relookup(tdvp, &tvp, tcnp);
537 if (tcnp->cn_flags & CNP_PDIRUNLOCK)
545 * tdvp is locked at this point. in the RENAME case tvp may
546 * be NULL without an error, assign xp accordingly. The
547 * 'bad' target can be used again after this.
554 * 2) If target doesn't exist, link the target
555 * to the source and unlink the source.
556 * Otherwise, rewrite the target directory
557 * entry to reference the source inode and
558 * expunge the original entry's existence.
560 * tdvp and tvp are cleaned up by this code. tvp is only good if
564 if (dp->i_dev != ip->i_dev)
565 panic("ext2_rename: EXDEV");
567 * Account for ".." in new directory.
568 * When source and destination have the same
569 * parent we don't fool with the link count.
571 if (doingdirectory && newparent) {
572 if ((nlink_t)dp->i_nlink >= LINK_MAX) {
577 dp->i_flag |= IN_CHANGE;
578 error = EXT2_UPDATE(tdvp, 1);
582 error = ext2_direnter(ip, tdvp, tcnp);
584 if (doingdirectory && newparent) {
586 dp->i_flag |= IN_CHANGE;
587 EXT2_UPDATE(tdvp, 1);
593 * manual cleanup, we can't use the bad or out target after
598 if (xp->i_dev != dp->i_dev || xp->i_dev != ip->i_dev)
599 panic("ext2_rename: EXDEV");
601 * Short circuit rename(foo, foo).
603 if (xp->i_number == ip->i_number)
604 panic("ext2_rename: same file");
606 * If the parent directory is "sticky", then the user must
607 * own the parent directory, or the destination of the rename,
608 * otherwise the destination may not be changed (except by
609 * root). This implements append-only directories.
611 if ((dp->i_mode & S_ISTXT) && tcnp->cn_cred->cr_uid != 0 &&
612 tcnp->cn_cred->cr_uid != dp->i_uid &&
613 xp->i_uid != tcnp->cn_cred->cr_uid) {
618 * Target must be empty if a directory and have no links
619 * to it. Also, ensure source and target are compatible
620 * (both directories, or both not directories).
622 if ((xp->i_mode&IFMT) == IFDIR) {
623 if (! ext2_dirempty(xp, dp->i_number, tcnp->cn_cred) ||
628 if (!doingdirectory) {
632 } else if (doingdirectory) {
636 error = ext2_dirrewrite(dp, ip, tcnp);
640 * If the target directory is in the same
641 * directory as the source directory,
642 * decrement the link count on the parent
643 * of the target directory.
645 if (doingdirectory && !newparent) {
647 dp->i_flag |= IN_CHANGE;
651 * manual cleanup, we can't use the bad or out target after
657 * Adjust the link count of the target to
658 * reflect the dirrewrite above. If this is
659 * a directory it is empty and there are
660 * no links to it, so we can squash the inode and
661 * any space associated with it. We disallowed
662 * renaming over top of a directory with links to
663 * it above, as the remaining link would point to
664 * a directory without "." or ".." entries.
667 if (doingdirectory) {
668 if (--xp->i_nlink != 0)
669 panic("ext2_rename: linked directory");
670 error = EXT2_TRUNCATE(tvp, (off_t)0, IO_SYNC,
673 xp->i_flag |= IN_CHANGE;
679 * tvp and tdvp have been cleaned up. The bad and out targets may
680 * not be used. fvp and fdvp are ref'd but not locked. ip
681 * still represents the old fvp and ip->i_flag may still have IN_RENAME
682 * set (if doingdirectory).
686 * 3) Unlink the source.
688 * fdvp is locked and ref'd. ap->a_fvp holds the old lookup unlocked
689 * and ref'd, fvp will hold the new lookup locked and ref'd.
691 * After the relookup ap->a_fvp must be released as part of our
692 * cleanup, not just fdvp and fvp. And, on success, fdvp and
693 * fvp will be locked so the bad and out targets cannot be used.
695 fcnp->cn_flags &= ~CNP_MODMASK;
696 fcnp->cn_flags |= CNP_LOCKPARENT;
697 KKASSERT(fcnp->cn_flags & CNP_PDIRUNLOCK);
698 error = relookup(fdvp, &fvp, fcnp);
701 * From name has disappeared.
704 panic("ext2_rename: lost dir entry");
705 /* ip->i_flag only sets IN_RENAME if doingdirectory */
707 if (fcnp->cn_flags & CNP_PDIRUNLOCK)
713 KKASSERT((fcnp->cn_flags & CNP_PDIRUNLOCK) == 0);
716 * This case shouldn't occur
720 * From name has disappeared.
723 panic("ext2_rename: lost dir entry");
724 /* ip->i_flag only sets IN_RENAME if doingdirectory */
732 * fvp and fdvp are both ref'd and locked.
738 * Ensure that the directory entry still exists and has not
739 * changed while the new name has been entered. If the source is
740 * a file then the entry may have been unlinked or renamed. In
741 * either case there is no further work to be done. If the source
742 * is a directory then it cannot have been rmdir'ed; its link
743 * count of three would cause a rmdir to fail with ENOTEMPTY.
744 * The IN_RENAME flag ensures that it cannot be moved by another
749 panic("ext2_rename: lost dir entry");
750 /* ip->i_flag only sets IN_RENAME if doingdirectory */
753 * If the source is a directory with a
754 * new parent, the link count of the old
755 * parent directory must be decremented
756 * and ".." set to point to the new parent.
758 if (doingdirectory && newparent) {
760 dp->i_flag |= IN_CHANGE;
761 error = vn_rdwr(UIO_READ, fvp, (caddr_t)&dirbuf,
762 sizeof (struct dirtemplate), (off_t)0,
763 UIO_SYSSPACE, IO_NODELOCKED,
764 tcnp->cn_cred, NULL);
766 /* Like ext2 little-endian: */
767 namlen = dirbuf.dotdot_type;
769 dirbuf.dotdot_name[0] != '.' ||
770 dirbuf.dotdot_name[1] != '.') {
771 ext2_dirbad(xp, (doff_t)12,
772 "rename: mangled dir");
774 dirbuf.dotdot_ino = newparent;
775 vn_rdwr(UIO_WRITE, fvp,
777 sizeof (struct dirtemplate),
778 (off_t)0, UIO_SYSSPACE,
779 IO_NODELOCKED|IO_SYNC,
780 tcnp->cn_cred, NULL);
784 error = ext2_dirremove(fdvp, fcnp);
787 xp->i_flag |= IN_CHANGE;
789 xp->i_flag &= ~IN_RENAME;
803 ip->i_flag &= ~IN_RENAME;
805 error = vn_lock(fvp, LK_EXCLUSIVE);
808 ip->i_flag |= IN_CHANGE;
809 ip->i_flag &= ~IN_RENAME;
820 * ext2_mkdir(struct vnode *a_dvp, struct vnode **a_vpp,
821 * struct componentname *a_cnp, struct vattr *a_vap)
824 ext2_mkdir(struct vop_old_mkdir_args *ap)
826 struct vnode *dvp = ap->a_dvp;
827 struct vattr *vap = ap->a_vap;
828 struct componentname *cnp = ap->a_cnp;
829 struct inode *ip, *dp;
831 struct dirtemplate dirtemplate, *dtp;
835 if ((nlink_t)dp->i_nlink >= LINK_MAX) {
839 dmode = vap->va_mode & 0777;
842 * Must simulate part of ext2_makeinode here to acquire the inode,
843 * but not have it entered in the parent directory. The entry is
844 * made later after writing "." and ".." entries.
846 error = EXT2_VALLOC(dvp, dmode, cnp->cn_cred, &tvp);
850 ip->i_gid = dp->i_gid;
854 struct ucred ucred, *ucp;
858 * if we are hacking owners here, (only do this where told to)
859 * and we are not giving it TOO root, (would subvert quotas)
860 * then go ahead and give it to the other user.
861 * The new directory also inherits the SUID bit.
862 * If user's UID and dir UID are the same,
863 * 'give it away' so that the SUID is still forced on.
865 if ( (dvp->v_mount->mnt_flag & MNT_SUIDDIR) &&
866 (dp->i_mode & ISUID) && dp->i_uid) {
868 ip->i_uid = dp->i_uid;
870 if (dp->i_uid != cnp->cn_cred->cr_uid) {
872 * make sure the correct user gets charged
874 * Make a dummy credential for the victim.
875 * XXX This seems to never be accessed out of
876 * our context so a stack variable is ok.
879 ucred.cr_uid = ip->i_uid;
880 ucred.cr_ngroups = 1;
881 ucred.cr_groups[0] = dp->i_gid;
886 ip->i_uid = cnp->cn_cred->cr_uid;
889 if ((error = ext2_getinoquota(ip)) ||
890 (error = ext2_chkiq(ip, 1, ucp, 0))) {
891 EXT2_VFREE(tvp, ip->i_number, dmode);
898 ip->i_uid = cnp->cn_cred->cr_uid;
900 if ((error = ext2_getinoquota(ip)) ||
901 (error = ext2_chkiq(ip, 1, cnp->cn_cred, 0))) {
902 EXT2_VFREE(tvp, ip->i_number, dmode);
908 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
910 tvp->v_type = VDIR; /* Rest init'd in getnewvnode(). */
912 if (cnp->cn_flags & CNP_ISWHITEOUT)
913 ip->i_flags |= UF_OPAQUE;
914 error = EXT2_UPDATE(tvp, 1);
917 * The vnode must have a VM object in order to issue buffer cache
920 vinitvmio(tvp, 0, PAGE_SIZE, -1);
923 * Bump link count in parent directory
924 * to reflect work done below. Should
925 * be done before reference is created
926 * so reparation is possible if we crash.
929 dp->i_flag |= IN_CHANGE;
930 error = EXT2_UPDATE(dvp, 1);
934 /* Initialize directory with "." and ".." from static template. */
935 if (EXT2_HAS_INCOMPAT_FEATURE(ip->i_e2fs->s_es,
936 EXT2_FEATURE_INCOMPAT_FILETYPE))
937 dtp = &ext2_mastertemplate;
939 dtp = &ext2_omastertemplate;
941 dirtemplate.dot_ino = ip->i_number;
942 dirtemplate.dotdot_ino = dp->i_number;
943 /* note that in ext2 DIRBLKSIZ == blocksize, not DEV_BSIZE
944 * so let's just redefine it - for this function only
947 #define DIRBLKSIZ VTOI(dvp)->i_e2fs->s_blocksize
948 dirtemplate.dotdot_reclen = DIRBLKSIZ - 12;
949 error = vn_rdwr(UIO_WRITE, tvp, (caddr_t)&dirtemplate,
950 sizeof (dirtemplate), (off_t)0, UIO_SYSSPACE,
951 IO_NODELOCKED|IO_SYNC, cnp->cn_cred, NULL);
954 dp->i_flag |= IN_CHANGE;
957 if (DIRBLKSIZ > VFSTOEXT2(dvp->v_mount)->um_mountp->mnt_stat.f_bsize)
958 panic("ext2_mkdir: blksize"); /* XXX should grow with balloc() */
960 ip->i_size = DIRBLKSIZ;
961 ip->i_flag |= IN_CHANGE;
964 /* Directory set up, now install its entry in the parent directory. */
965 error = ext2_direnter(ip, dvp, cnp);
968 dp->i_flag |= IN_CHANGE;
972 * No need to do an explicit VOP_TRUNCATE here, vrele will do this
973 * for us because we set the link count to 0.
977 ip->i_flag |= IN_CHANGE;
984 #define DIRBLKSIZ DEV_BSIZE
990 * ext2_rmdir(struct vnode *a_dvp, struct vnode *a_vp,
991 * struct componentname *a_cnp)
994 ext2_rmdir(struct vop_old_rmdir_args *ap)
996 struct vnode *vp = ap->a_vp;
997 struct vnode *dvp = ap->a_dvp;
998 struct componentname *cnp = ap->a_cnp;
999 struct inode *ip, *dp;
1006 * Verify the directory is empty (and valid).
1007 * (Rmdir ".." won't be valid since
1008 * ".." will contain a reference to
1009 * the current directory and thus be
1013 if (ip->i_nlink != 2 || !ext2_dirempty(ip, dp->i_number, cnp->cn_cred)) {
1017 if ((dp->i_flags & APPEND)
1018 || (ip->i_flags & (NOUNLINK | IMMUTABLE | APPEND))) {
1023 * Delete reference to directory before purging
1024 * inode. If we crash in between, the directory
1025 * will be reattached to lost+found,
1027 error = ext2_dirremove(dvp, cnp);
1031 dp->i_flag |= IN_CHANGE;
1034 * Truncate inode. The only stuff left
1035 * in the directory is "." and "..". The
1036 * "." reference is inconsequential since
1037 * we're quashing it. The ".." reference
1038 * has already been adjusted above. We've
1039 * removed the "." reference and the reference
1040 * in the parent directory, but there may be
1041 * other hard links so decrement by 2 and
1042 * worry about them later.
1045 error = EXT2_TRUNCATE(vp, (off_t)0, IO_SYNC, cnp->cn_cred);
1046 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
1052 * symlink -- make a symbolic link
1054 * ext2_symlink(struct vnode *a_dvp, struct vnode **a_vpp,
1055 * struct componentname *a_cnp, struct vattr *a_vap,
1059 ext2_symlink(struct vop_old_symlink_args *ap)
1061 struct vnode *vp, **vpp = ap->a_vpp;
1065 error = ext2_makeinode(IFLNK | ap->a_vap->va_mode, ap->a_dvp,
1070 len = strlen(ap->a_target);
1071 if (len < vp->v_mount->mnt_maxsymlinklen) {
1073 bcopy(ap->a_target, (char *)ip->i_shortlink, len);
1075 ip->i_flag |= IN_CHANGE | IN_UPDATE;
1078 * Make sure we have a VM object in order to use
1081 if (vp->v_object == NULL)
1082 vinitvmio(vp, 0, PAGE_SIZE, -1);
1084 error = vn_rdwr(UIO_WRITE, vp, ap->a_target, len, (off_t)0,
1085 UIO_SYSSPACE, IO_NODELOCKED,
1086 ap->a_cnp->cn_cred, NULL);
1096 * Allocate a new inode.
1099 ext2_makeinode(int mode, struct vnode *dvp, struct vnode **vpp,
1100 struct componentname *cnp)
1102 struct inode *ip, *pdir;
1108 if ((mode & IFMT) == 0)
1111 error = EXT2_VALLOC(dvp, mode, cnp->cn_cred, &tvp);
1116 ip->i_gid = pdir->i_gid;
1120 struct ucred ucred, *ucp;
1125 * not the owner of the directory,
1126 * and we are hacking owners here, (only do this where told to)
1127 * and we are not giving it TOO root, (would subvert quotas)
1128 * then go ahead and give it to the other user.
1129 * Note that this drops off the execute bits for security.
1131 if ( (dvp->v_mount->mnt_flag & MNT_SUIDDIR) &&
1132 (pdir->i_mode & ISUID) &&
1133 (pdir->i_uid != cnp->cn_cred->cr_uid) && pdir->i_uid) {
1134 ip->i_uid = pdir->i_uid;
1138 * make sure the correct user gets charged
1140 * Quickly knock up a dummy credential for the victim.
1141 * XXX This seems to never be accessed out of our
1142 * context so a stack variable is ok.
1145 ucred.cr_uid = ip->i_uid;
1146 ucred.cr_ngroups = 1;
1147 ucred.cr_groups[0] = pdir->i_gid;
1151 ip->i_uid = cnp->cn_cred->cr_uid;
1155 if ((error = ext2_getinoquota(ip)) ||
1156 (error = ext2_chkiq(ip, 1, ucp, 0))) {
1157 EXT2_VFREE(tvp, ip->i_number, mode);
1164 ip->i_uid = cnp->cn_cred->cr_uid;
1166 if ((error = ext2_getinoquota(ip)) ||
1167 (error = ext2_chkiq(ip, 1, cnp->cn_cred, 0))) {
1168 EXT2_VFREE(tvp, ip->i_number, mode);
1174 ip->i_flag |= IN_ACCESS | IN_CHANGE | IN_UPDATE;
1176 tvp->v_type = IFTOVT(mode); /* Rest init'd in getnewvnode(). */
1178 if ((ip->i_mode & ISGID) && !groupmember(ip->i_gid, cnp->cn_cred) &&
1179 priv_check_cred(cnp->cn_cred, PRIV_VFS_SETGID, 0))
1180 ip->i_mode &= ~ISGID;
1182 if (cnp->cn_flags & CNP_ISWHITEOUT)
1183 ip->i_flags |= UF_OPAQUE;
1186 * Regular files and directories need VM objects. Softlinks do
1187 * not (not immediately anyway).
1189 if (tvp->v_type == VREG || tvp->v_type == VDIR)
1190 vinitvmio(tvp, 0, PAGE_SIZE, -1);
1193 * Make sure inode goes to disk before directory entry.
1195 error = EXT2_UPDATE(tvp, 1);
1198 error = ext2_direnter(ip, dvp, cnp);
1207 * Write error occurred trying to update the inode
1208 * or the directory so must deallocate the inode.
1211 ip->i_flag |= IN_CHANGE;
1217 ext2_itimes(struct vnode *vp)
1223 if ((ip->i_flag & (IN_ACCESS | IN_CHANGE | IN_UPDATE)) == 0)
1225 if ((vp->v_type == VBLK || vp->v_type == VCHR) && !DOINGSOFTDEP(vp))
1226 ip->i_flag |= IN_LAZYMOD;
1228 ip->i_flag |= IN_MODIFIED;
1229 if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0) {
1231 if (ip->i_flag & IN_ACCESS) {
1232 ip->i_atime = ts.tv_sec;
1233 ip->i_atimensec = ts.tv_nsec;
1235 if (ip->i_flag & IN_UPDATE) {
1236 ip->i_mtime = ts.tv_sec;
1237 ip->i_mtimensec = ts.tv_nsec;
1240 if (ip->i_flag & IN_CHANGE) {
1241 ip->i_ctime = ts.tv_sec;
1242 ip->i_ctimensec = ts.tv_nsec;
1245 ip->i_flag &= ~(IN_ACCESS | IN_CHANGE | IN_UPDATE);
1253 * ext2_open(struct vnode *a_vp, int a_mode, struct ucred *a_cred,
1254 * struct file *a_fp)
1259 ext2_open(struct vop_open_args *ap)
1261 struct vnode *vp = ap->a_vp;
1264 * Files marked append-only must be opened for appending.
1266 if ((VTOI(vp)->i_flags & APPEND) &&
1267 (ap->a_mode & (FWRITE | O_APPEND)) == FWRITE) {
1270 return (vop_stdopen(ap));
1276 * Update the times on the inode.
1278 * ext2_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1283 ext2_close(struct vop_close_args *ap)
1285 struct vnode *vp = ap->a_vp;
1287 if (VREFCNT(vp) > 1)
1289 return (vop_stdclose(ap));
1293 * ext2_access(struct vnode *a_vp, int a_mode, struct ucred *a_cred)
1297 ext2_access(struct vop_access_args *ap)
1299 struct vnode *vp = ap->a_vp;
1300 struct inode *ip = VTOI(vp);
1304 if (ap->a_mode & VWRITE) {
1305 switch (vp->v_type) {
1309 if ((error = ext2_getinoquota(ip)) != 0)
1318 error = vop_helper_access(ap, ip->i_uid, ip->i_gid, ip->i_mode,
1324 * ext2_getattr(struct vnode *a_vp, struct vattr *a_vap)
1329 ext2_getattr(struct vop_getattr_args *ap)
1331 struct vnode *vp = ap->a_vp;
1332 struct inode *ip = VTOI(vp);
1333 struct vattr *vap = ap->a_vap;
1337 * Copy from inode table
1339 vap->va_fsid = dev2udev(ip->i_dev);
1340 vap->va_fileid = ip->i_number;
1341 vap->va_mode = ip->i_mode & ~IFMT;
1342 vap->va_nlink = VFSTOEXT2(vp->v_mount)->um_i_effnlink_valid ?
1343 ip->i_effnlink : ip->i_nlink;
1344 vap->va_uid = ip->i_uid;
1345 vap->va_gid = ip->i_gid;
1346 vap->va_rmajor = umajor(ip->i_rdev);
1347 vap->va_rminor = uminor(ip->i_rdev);
1348 vap->va_size = ip->i_din.di_size;
1349 vap->va_atime.tv_sec = ip->i_atime;
1350 vap->va_atime.tv_nsec = ip->i_atimensec;
1351 vap->va_mtime.tv_sec = ip->i_mtime;
1352 vap->va_mtime.tv_nsec = ip->i_mtimensec;
1353 vap->va_ctime.tv_sec = ip->i_ctime;
1354 vap->va_ctime.tv_nsec = ip->i_ctimensec;
1355 vap->va_flags = ip->i_flags;
1356 vap->va_gen = ip->i_gen;
1357 vap->va_blocksize = vp->v_mount->mnt_stat.f_iosize;
1358 vap->va_bytes = dbtob((u_quad_t)ip->i_blocks);
1359 vap->va_type = IFTOVT(ip->i_mode);
1360 vap->va_filerev = ip->i_modrev;
1365 * Set attribute vnode op. called from several syscalls
1367 * ext2_setattr(struct vnode *a_vp, struct vattr *a_vap, struct ucred *a_cred)
1371 ext2_setattr(struct vop_setattr_args *ap)
1373 struct vattr *vap = ap->a_vap;
1374 struct vnode *vp = ap->a_vp;
1375 struct inode *ip = VTOI(vp);
1376 struct ucred *cred = ap->a_cred;
1380 * Check for unsettable attributes.
1382 if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
1383 (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
1384 (vap->va_blocksize != VNOVAL) || (vap->va_rmajor != VNOVAL) ||
1385 ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
1388 if (vap->va_flags != VNOVAL) {
1389 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1391 if (cred->cr_uid != ip->i_uid &&
1392 (error = priv_check_cred(cred, PRIV_VFS_SETATTR, 0)))
1395 * Note that a root chflags becomes a user chflags when
1396 * we are jailed, unless the jail.chflags_allowed sysctl
1399 if (cred->cr_uid == 0 &&
1400 (!jailed(cred) || jail_chflags_allowed)) {
1402 & (SF_NOUNLINK | SF_IMMUTABLE | SF_APPEND)) &&
1405 ip->i_flags = vap->va_flags;
1408 & (SF_NOUNLINK | SF_IMMUTABLE | SF_APPEND) ||
1409 (vap->va_flags & UF_SETTABLE) != vap->va_flags)
1411 ip->i_flags &= SF_SETTABLE;
1412 ip->i_flags |= (vap->va_flags & UF_SETTABLE);
1414 ip->i_flag |= IN_CHANGE;
1415 if (vap->va_flags & (IMMUTABLE | APPEND))
1418 if (ip->i_flags & (IMMUTABLE | APPEND))
1421 * Go through the fields and update iff not VNOVAL.
1423 if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
1424 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1426 if ((error = ext2_chown(vp, vap->va_uid, vap->va_gid, cred)) != 0)
1429 if (vap->va_size != VNOVAL) {
1431 * Disallow write attempts on read-only filesystems;
1432 * unless the file is a socket, fifo, or a block or
1433 * character device resident on the filesystem.
1435 switch (vp->v_type) {
1440 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1446 if ((error = EXT2_TRUNCATE(vp, vap->va_size, 0, cred)) != 0)
1450 if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
1451 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1453 if (cred->cr_uid != ip->i_uid &&
1454 (error = priv_check_cred(cred, PRIV_VFS_SETATTR, 0)) &&
1455 ((vap->va_vaflags & VA_UTIMES_NULL) == 0 ||
1456 (error = VOP_EACCESS(vp, VWRITE, cred))))
1458 if (vap->va_atime.tv_sec != VNOVAL)
1459 ip->i_flag |= IN_ACCESS;
1460 if (vap->va_mtime.tv_sec != VNOVAL)
1461 ip->i_flag |= IN_CHANGE | IN_UPDATE;
1463 if (vap->va_atime.tv_sec != VNOVAL) {
1464 ip->i_atime = vap->va_atime.tv_sec;
1465 ip->i_atimensec = vap->va_atime.tv_nsec;
1467 if (vap->va_mtime.tv_sec != VNOVAL) {
1468 ip->i_mtime = vap->va_mtime.tv_sec;
1469 ip->i_mtimensec = vap->va_mtime.tv_nsec;
1471 error = EXT2_UPDATE(vp, 0);
1476 if (vap->va_mode != (mode_t)VNOVAL) {
1477 if (vp->v_mount->mnt_flag & MNT_RDONLY)
1479 error = ext2_chmod(vp, (int)vap->va_mode, cred);
1481 VN_KNOTE(vp, NOTE_ATTRIB);
1486 * Change the mode on a file.
1487 * Inode must be locked before calling.
1490 ext2_chmod(struct vnode *vp, int mode, struct ucred *cred)
1492 struct inode *ip = VTOI(vp);
1495 if (cred->cr_uid != ip->i_uid) {
1496 error = priv_check_cred(cred, PRIV_VFS_CHMOD, 0);
1501 if (vp->v_type != VDIR && (mode & S_ISTXT))
1503 if (!groupmember(ip->i_gid, cred) && (mode & ISGID))
1506 ip->i_mode &= ~ALLPERMS;
1507 ip->i_mode |= (mode & ALLPERMS);
1508 ip->i_flag |= IN_CHANGE;
1513 * Perform chown operation on inode ip;
1514 * inode must be locked prior to call.
1517 ext2_chown(struct vnode *vp, uid_t uid, gid_t gid, struct ucred *cred)
1519 struct inode *ip = VTOI(vp);
1528 if (uid == (uid_t)VNOVAL)
1530 if (gid == (gid_t)VNOVAL)
1533 * If we don't own the file, are trying to change the owner
1534 * of the file, or are not a member of the target group,
1535 * the caller must be superuser or the call fails.
1537 if ((cred->cr_uid != ip->i_uid || uid != ip->i_uid ||
1538 (gid != ip->i_gid && !(cred->cr_gid == gid ||
1539 groupmember(gid, cred)))) &&
1540 (error = priv_check_cred(cred, PRIV_VFS_CHOWN, 0)))
1545 if ((error = ext2_getinoquota(ip)) != 0)
1548 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1549 ip->i_dquot[USRQUOTA] = NODQUOT;
1552 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1553 ip->i_dquot[GRPQUOTA] = NODQUOT;
1555 change = ip->i_blocks;
1556 (void) ext2_chkdq(ip, -change, cred, CHOWN);
1557 (void) ext2_chkiq(ip, -1, cred, CHOWN);
1558 for (i = 0; i < MAXQUOTAS; i++) {
1559 ext2_dqrele(vp, ip->i_dquot[i]);
1560 ip->i_dquot[i] = NODQUOT;
1566 if ((error = ext2_getinoquota(ip)) == 0) {
1568 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1569 ip->i_dquot[USRQUOTA] = NODQUOT;
1572 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1573 ip->i_dquot[GRPQUOTA] = NODQUOT;
1575 if ((error = ext2_chkdq(ip, change, cred, CHOWN)) == 0) {
1576 if ((error = ext2_chkiq(ip, 1, cred, CHOWN)) == 0)
1579 (void)ext2_chkdq(ip, -change, cred, CHOWN|FORCE);
1581 for (i = 0; i < MAXQUOTAS; i++) {
1582 ext2_dqrele(vp, ip->i_dquot[i]);
1583 ip->i_dquot[i] = NODQUOT;
1588 if (ext2_getinoquota(ip) == 0) {
1590 ext2_dqrele(vp, ip->i_dquot[USRQUOTA]);
1591 ip->i_dquot[USRQUOTA] = NODQUOT;
1594 ext2_dqrele(vp, ip->i_dquot[GRPQUOTA]);
1595 ip->i_dquot[GRPQUOTA] = NODQUOT;
1597 (void) ext2_chkdq(ip, change, cred, FORCE|CHOWN);
1598 (void) ext2_chkiq(ip, 1, cred, FORCE|CHOWN);
1599 (void) ext2_getinoquota(ip);
1603 if (ext2_getinoquota(ip))
1604 panic("ext2_chown: lost quota");
1606 ip->i_flag |= IN_CHANGE;
1607 if (cred->cr_uid != 0 && (ouid != uid || ogid != gid))
1608 ip->i_mode &= ~(ISUID | ISGID);
1613 * whiteout vnode call
1615 * ext2_whiteout(struct vnode *a_dvp, struct componentname *a_cnp, int a_flags)
1619 ext2_whiteout(struct vop_old_whiteout_args *ap)
1621 return (EOPNOTSUPP);
1625 * Return target name of a symbolic link
1627 * ext2_readlink(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred)
1631 ext2_readlink(struct vop_readlink_args *ap)
1633 struct vnode *vp = ap->a_vp;
1634 struct inode *ip = VTOI(vp);
1638 if ((isize < vp->v_mount->mnt_maxsymlinklen) ||
1639 (ip->i_din.di_blocks == 0)) { /* XXX - for old fastlink support */
1640 uiomove((char *)ip->i_shortlink, isize, ap->a_uio);
1643 return (VOP_READ(vp, ap->a_uio, 0, ap->a_cred));
1647 * Calculate the logical to physical mapping if not done already,
1648 * then call the device strategy routine.
1650 * In order to be able to swap to a file, the VOP_BMAP operation may not
1651 * deadlock on memory. See ext2_bmap() for details.
1653 * ext2_strategy(struct vnode *a_vp, struct bio *a_bio)
1657 ext2_strategy(struct vop_strategy_args *ap)
1659 struct bio *bio = ap->a_bio;
1661 struct buf *bp = bio->bio_buf;
1662 struct vnode *vp = ap->a_vp;
1667 if (vp->v_type == VBLK || vp->v_type == VCHR)
1668 panic("ext2_strategy: spec");
1669 nbio = push_bio(bio);
1670 if (nbio->bio_offset == NOOFFSET) {
1671 error = VOP_BMAP(vp, bio->bio_offset, &nbio->bio_offset,
1672 NULL, NULL, bp->b_cmd);
1674 bp->b_error = error;
1675 bp->b_flags |= B_ERROR;
1676 /* I/O was never started on nbio, must biodone(bio) */
1680 if (nbio->bio_offset == NOOFFSET)
1683 if (nbio->bio_offset == NOOFFSET) {
1684 /* I/O was never started on nbio, must biodone(bio) */
1688 vn_strategy(ip->i_devvp, nbio);
1693 * Print out the contents of an inode.
1695 * ext2_print(struct vnode *a_vp)
1699 ext2_print(struct vop_print_args *ap)
1701 struct vnode *vp = ap->a_vp;
1702 struct inode *ip = VTOI(vp);
1704 kprintf("tag VT_EXT2FS, ino %lu, on dev %s (%d, %d)",
1705 (u_long)ip->i_number, devtoname(ip->i_dev), major(ip->i_dev),
1707 if (vp->v_type == VFIFO)
1709 lockmgr_printinfo(&vp->v_lock);
1715 * Read wrapper for fifos.
1717 * ext2fifo_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1718 * struct ucred *a_cred)
1722 ext2fifo_read(struct vop_read_args *ap)
1729 resid = uio->uio_resid;
1730 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1731 ip = VTOI(ap->a_vp);
1732 if ((ap->a_vp->v_mount->mnt_flag & MNT_NOATIME) == 0 && ip != NULL &&
1733 (uio->uio_resid != resid || (error == 0 && resid != 0)))
1734 VTOI(ap->a_vp)->i_flag |= IN_ACCESS;
1739 * Write wrapper for fifos.
1741 * ext2fifo_write(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1742 * struct ucred *a_cred)
1746 ext2fifo_write(struct vop_write_args *ap)
1753 resid = uio->uio_resid;
1754 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1755 ip = VTOI(ap->a_vp);
1756 if (ip != NULL && (uio->uio_resid != resid || (error == 0 && resid != 0)))
1757 VTOI(ap->a_vp)->i_flag |= IN_CHANGE | IN_UPDATE;
1762 * Close wrapper for fifos.
1764 * Update the times on the inode then do device close.
1766 * ext2fifo_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1770 ext2fifo_close(struct vop_close_args *ap)
1772 struct vnode *vp = ap->a_vp;
1774 if (VREFCNT(vp) > 1)
1776 return (VOCALL(&fifo_vnode_vops, &ap->a_head));
1780 * Kqfilter wrapper for fifos.
1782 * Fall through to ext2 kqfilter routines if needed
1786 ext2fifo_kqfilter(struct vop_kqfilter_args *ap)
1790 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
1792 error = ext2_kqfilter(ap);
1797 * Return POSIX pathconf information applicable to ext2 filesystems.
1799 * ext2_pathconf(struct vnode *a_vp, int a_name, int *a_retval)
1803 ext2_pathconf(struct vop_pathconf_args *ap)
1805 switch (ap->a_name) {
1807 *ap->a_retval = LINK_MAX;
1810 *ap->a_retval = NAME_MAX;
1813 *ap->a_retval = PATH_MAX;
1816 *ap->a_retval = PIPE_BUF;
1818 case _PC_CHOWN_RESTRICTED:
1831 * Advisory record locking support
1833 * ext2_advlock(struct vnode *a_vp, caddr_t a_id, int a_op, struct flock *a_fl,
1838 ext2_advlock(struct vop_advlock_args *ap)
1840 struct inode *ip = VTOI(ap->a_vp);
1842 return (lf_advlock(ap, &(ip->i_lockf), ip->i_size));
1846 * Initialize the vnode associated with a new inode, handle aliased
1850 ext2_vinit(struct mount *mntp, struct vnode **vpp)
1858 switch(vp->v_type = IFTOVT(ip->i_mode)) {
1861 vp->v_ops = &mntp->mnt_vn_spec_ops;
1862 addaliasu(vp, umajor(ip->i_rdev), uminor(ip->i_rdev));
1865 vp->v_ops = &mntp->mnt_vn_fifo_ops;
1869 vinitvmio(vp, ip->i_size, PAGE_SIZE, -1); /* XXX */
1872 if ((ip->i_size >= vp->v_mount->mnt_maxsymlinklen) &&
1873 ip->i_din.di_blocks != 0
1875 vinitvmio(vp, ip->i_size, PAGE_SIZE, -1);
1883 if (ip->i_number == EXT2_ROOTINO)
1884 vp->v_flag |= VROOT;
1886 * Initialize modrev times
1888 ip->i_modrev = init_va_filerev();
1893 static struct filterops ext2read_filtops =
1894 { FILTEROP_ISFD, NULL, filt_ext2detach, filt_ext2read };
1895 static struct filterops ext2write_filtops =
1896 { FILTEROP_ISFD, NULL, filt_ext2detach, filt_ext2write };
1897 static struct filterops ext2vnode_filtops =
1898 { FILTEROP_ISFD, NULL, filt_ext2detach, filt_ext2vnode };
1901 * ext2_kqfilter(struct vnode *a_vp, struct knote *a_kn)
1904 ext2_kqfilter(struct vop_kqfilter_args *ap)
1906 struct vnode *vp = ap->a_vp;
1907 struct knote *kn = ap->a_kn;
1909 switch (kn->kn_filter) {
1911 kn->kn_fop = &ext2read_filtops;
1914 kn->kn_fop = &ext2write_filtops;
1917 kn->kn_fop = &ext2vnode_filtops;
1920 return (EOPNOTSUPP);
1923 kn->kn_hook = (caddr_t)vp;
1925 /* XXX: kq token actually protects the list */
1926 lwkt_gettoken(&vp->v_token);
1927 knote_insert(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
1928 lwkt_reltoken(&vp->v_token);
1934 filt_ext2detach(struct knote *kn)
1936 struct vnode *vp = (struct vnode *)kn->kn_hook;
1938 lwkt_gettoken(&vp->v_token);
1939 knote_remove(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
1940 lwkt_reltoken(&vp->v_token);
1945 filt_ext2read(struct knote *kn, long hint)
1947 struct vnode *vp = (struct vnode *)kn->kn_hook;
1948 struct inode *ip = VTOI(vp);
1952 * filesystem is gone, so set the EOF flag and schedule
1953 * the knote for deletion.
1955 if (hint == NOTE_REVOKE) {
1956 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT);
1959 off = ip->i_size - kn->kn_fp->f_offset;
1960 kn->kn_data = (off < INTPTR_MAX) ? off : INTPTR_MAX;
1961 if (kn->kn_sfflags & NOTE_OLDAPI)
1963 return (kn->kn_data != 0);
1968 filt_ext2write(struct knote *kn, long hint)
1971 * filesystem is gone, so set the EOF flag and schedule
1972 * the knote for deletion.
1974 if (hint == NOTE_REVOKE)
1975 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT);
1982 filt_ext2vnode(struct knote *kn, long hint)
1984 if (kn->kn_sfflags & hint)
1985 kn->kn_fflags |= hint;
1986 if (hint == NOTE_REVOKE) {
1987 kn->kn_flags |= (EV_EOF | EV_NODATA);
1990 return (kn->kn_fflags != 0);
1993 struct vop_ops ext2_vnode_vops = {
1994 .vop_default = vop_defaultop,
1995 .vop_fsync = ext2_fsync,
1996 .vop_read = ext2_read,
1997 .vop_reallocblks = ext2_reallocblks,
1998 .vop_write = ext2_write,
1999 .vop_access = ext2_access,
2000 .vop_advlock = ext2_advlock,
2001 .vop_bmap = ext2_bmap,
2002 .vop_old_lookup = ext2_lookup,
2003 .vop_close = ext2_close,
2004 .vop_old_create = ext2_create,
2005 .vop_getattr = ext2_getattr,
2006 .vop_inactive = ext2_inactive,
2007 .vop_old_link = ext2_link,
2008 .vop_old_mkdir = ext2_mkdir,
2009 .vop_old_mknod = ext2_mknod,
2010 .vop_open = ext2_open,
2011 .vop_pathconf = ext2_pathconf,
2012 .vop_kqfilter = ext2_kqfilter,
2013 .vop_print = ext2_print,
2014 .vop_readdir = ext2_readdir,
2015 .vop_readlink = ext2_readlink,
2016 .vop_reclaim = ext2_reclaim,
2017 .vop_old_remove = ext2_remove,
2018 .vop_old_rename = ext2_rename,
2019 .vop_old_rmdir = ext2_rmdir,
2020 .vop_setattr = ext2_setattr,
2021 .vop_strategy = ext2_strategy,
2022 .vop_old_symlink = ext2_symlink,
2023 .vop_old_whiteout = ext2_whiteout,
2024 .vop_getpages = vop_stdgetpages,
2025 .vop_putpages = vop_stdputpages
2028 struct vop_ops ext2_spec_vops = {
2029 .vop_default = vop_defaultop,
2030 .vop_fsync = ext2_fsync,
2031 .vop_access = ext2_access,
2032 .vop_close = ext2_close,
2033 .vop_getattr = ext2_getattr,
2034 .vop_inactive = ext2_inactive,
2035 .vop_print = ext2_print,
2036 .vop_read = vop_stdnoread,
2037 .vop_reclaim = ext2_reclaim,
2038 .vop_setattr = ext2_setattr,
2039 .vop_write = vop_stdnowrite
2042 struct vop_ops ext2_fifo_vops = {
2043 .vop_default = ext2_vnoperatefifo,
2044 .vop_fsync = ext2_fsync,
2045 .vop_access = ext2_access,
2046 .vop_close = ext2fifo_close,
2047 .vop_getattr = ext2_getattr,
2048 .vop_inactive = ext2_inactive,
2049 .vop_kqfilter = ext2fifo_kqfilter,
2050 .vop_print = ext2_print,
2051 .vop_read = ext2fifo_read,
2052 .vop_reclaim = ext2_reclaim,
2053 .vop_setattr = ext2_setattr,
2054 .vop_write = ext2fifo_write
2057 VNODEOP_SET(ext2_vnode_vops);
2058 VNODEOP_SET(ext2_spec_vops);
2059 VNODEOP_SET(ext2_fifo_vops);
2065 ext2_vnoperate(struct vop_generic_args *ap)
2067 return (VOCALL(&ext2_vnode_vops, ap));
2071 * ext2_vnoperatefifo()
2074 ext2_vnoperatefifo(struct vop_generic_args *ap)
2076 return (VOCALL(&ext2_fifo_vops, ap));