2 * modified for EXT2FS support in Lites 1.1
4 * Aug 1995, Godmar Back (gback@cs.utah.edu)
5 * University of Utah, Department of Computer Science
8 * Copyright (c) 1982, 1986, 1989, 1993
9 * The Regents of the University of California. All rights reserved.
10 * (c) UNIX System Laboratories, Inc.
11 * All or some portions of this file are derived from material licensed
12 * to the University of California by American Telephone and Telegraph
13 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
14 * the permission of UNIX System Laboratories, Inc.
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
19 * 1. Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution.
24 * 3. All advertising materials mentioning features or use of this software
25 * must display the following acknowledgement:
26 * This product includes software developed by the University of
27 * California, Berkeley and its contributors.
28 * 4. Neither the name of the University nor the names of its contributors
29 * may be used to endorse or promote products derived from this software
30 * without specific prior written permission.
32 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
33 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
34 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
35 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
36 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
37 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
38 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
40 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
41 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44 * @(#)ufs_vnops.c 8.27 (Berkeley) 5/27/95
45 * @(#)ext2_vnops.c 8.7 (Berkeley) 2/3/94
46 * $FreeBSD: src/sys/gnu/ext2fs/ext2_vnops.c,v 1.51.2.2 2003/01/02 17:26:18 bde Exp $
47 * $DragonFly: src/sys/vfs/gnu/ext2fs/ext2_vnops.c,v 1.43 2008/06/19 23:27:39 dillon Exp $
50 #include "opt_quota.h"
51 #include "opt_suiddir.h"
53 #include <sys/param.h>
54 #include <sys/systm.h>
55 #include <sys/resourcevar.h>
56 #include <sys/kernel.h>
58 #include <sys/fcntl.h>
63 #include <sys/mount.h>
65 #include <sys/vnode.h>
66 #include <sys/dirent.h>
67 #include <sys/lockf.h>
68 #include <sys/event.h>
72 #include <sys/namei.h>
73 #include <sys/signalvar.h>
74 #include <sys/unistd.h>
77 #include <vm/vm_extern.h>
78 #include <vm/vm_zone.h>
79 #include <vm/vnode_pager.h>
82 #include <sys/thread2.h>
84 #include <vfs/fifofs/fifo.h>
89 #include "ext2mount.h"
90 #include "ext2_fs_sb.h"
92 #include "ext2_extern.h"
95 static int ext2_access (struct vop_access_args
*);
96 static int ext2_advlock (struct vop_advlock_args
*);
97 static int ext2_chmod (struct vnode
*, int, struct ucred
*);
98 static int ext2_chown (struct vnode
*, uid_t
, gid_t
, struct ucred
*);
99 static int ext2_close (struct vop_close_args
*);
100 static int ext2_getattr (struct vop_getattr_args
*);
101 static int ext2_makeinode (int mode
, struct vnode
*, struct vnode
**, struct componentname
*);
102 static int ext2_mmap (struct vop_mmap_args
*);
103 static int ext2_open (struct vop_open_args
*);
104 static int ext2_pathconf (struct vop_pathconf_args
*);
105 static int ext2_print (struct vop_print_args
*);
106 static int ext2_readlink (struct vop_readlink_args
*);
107 static int ext2_setattr (struct vop_setattr_args
*);
108 static int ext2_strategy (struct vop_strategy_args
*);
109 static int ext2_whiteout (struct vop_old_whiteout_args
*);
110 static int filt_ext2read (struct knote
*kn
, long hint
);
111 static int filt_ext2write (struct knote
*kn
, long hint
);
112 static int filt_ext2vnode (struct knote
*kn
, long hint
);
113 static void filt_ext2detach (struct knote
*kn
);
114 static int ext2_kqfilter (struct vop_kqfilter_args
*ap
);
115 static int ext2fifo_close (struct vop_close_args
*);
116 static int ext2fifo_kqfilter (struct vop_kqfilter_args
*);
117 static int ext2fifo_read (struct vop_read_args
*);
118 static int ext2fifo_write (struct vop_write_args
*);
120 static int ext2_fsync (struct vop_fsync_args
*);
121 static int ext2_read (struct vop_read_args
*);
122 static int ext2_write (struct vop_write_args
*);
123 static int ext2_remove (struct vop_old_remove_args
*);
124 static int ext2_link (struct vop_old_link_args
*);
125 static int ext2_rename (struct vop_old_rename_args
*);
126 static int ext2_mkdir (struct vop_old_mkdir_args
*);
127 static int ext2_rmdir (struct vop_old_rmdir_args
*);
128 static int ext2_create (struct vop_old_create_args
*);
129 static int ext2_mknod (struct vop_old_mknod_args
*);
130 static int ext2_symlink (struct vop_old_symlink_args
*);
132 #include "ext2_readwrite.c"
138 #define SETHIGH(q, h) { \
141 tmp.val[_QUAD_HIGHWORD] = (h); \
144 #define SETLOW(q, l) { \
147 tmp.val[_QUAD_LOWWORD] = (l); \
150 #define VN_KNOTE(vp, b) \
151 KNOTE(&vp->v_pollinfo.vpi_kqinfo.ki_note, (b))
153 #define OFSFMT(vp) ((vp)->v_mount->mnt_maxsymlinklen <= 0)
156 * A virgin directory (no blushing please).
157 * Note that the type and namlen fields are reversed relative to ufs.
158 * Also, we don't use `struct odirtemplate', since it would just cause
159 * endianness problems.
161 static struct dirtemplate ext2_mastertemplate
= {
162 0, 12, 1, EXT2_FT_DIR
, ".",
163 0, DIRBLKSIZ
- 12, 2, EXT2_FT_DIR
, ".."
165 static struct dirtemplate ext2_omastertemplate
= {
166 0, 12, 1, EXT2_FT_UNKNOWN
, ".",
167 0, DIRBLKSIZ
- 12, 2, EXT2_FT_UNKNOWN
, ".."
171 * Create a regular file
173 * ext2_create(struct vnode *a_dvp, struct vnode **a_vpp,
174 * struct componentname *a_cnp, struct vattr *a_vap)
177 ext2_create(struct vop_old_create_args
*ap
)
182 ext2_makeinode(MAKEIMODE(ap
->a_vap
->va_type
, ap
->a_vap
->va_mode
),
183 ap
->a_dvp
, ap
->a_vpp
, ap
->a_cnp
);
190 * Synch an open file.
192 * ext2_fsync(struct vnode *a_vp, struct ucred *a_cred, int a_waitfor,
197 static int ext2_fsync_bp(struct buf
*bp
, void *data
);
199 struct ext2_fsync_bp_info
{
205 ext2_fsync(struct vop_fsync_args
*ap
)
207 struct ext2_fsync_bp_info info
;
208 struct vnode
*vp
= ap
->a_vp
;
212 * XXX why is all this fs specific?
216 * Flush all dirty buffers associated with a vnode.
218 ext2_discard_prealloc(VTOI(vp
));
220 lwkt_gettoken(&vp
->v_token
);
223 info
.waitfor
= ap
->a_waitfor
;
224 count
= RB_SCAN(buf_rb_tree
, &vp
->v_rbdirty_tree
, NULL
,
225 ext2_fsync_bp
, &info
);
229 if (ap
->a_waitfor
== MNT_WAIT
) {
230 bio_track_wait(&vp
->v_track_write
, 0, 0);
232 if (!RB_EMPTY(&vp
->v_rbdirty_tree
)) {
233 vprint("ext2_fsync: dirty", vp
);
238 lwkt_reltoken(&vp
->v_token
);
239 return (EXT2_UPDATE(ap
->a_vp
, ap
->a_waitfor
== MNT_WAIT
));
243 ext2_fsync_bp(struct buf
*bp
, void *data
)
245 struct ext2_fsync_bp_info
*info
= data
;
247 if (BUF_LOCK(bp
, LK_EXCLUSIVE
| LK_NOWAIT
))
249 if ((bp
->b_flags
& B_DELWRI
) == 0)
250 panic("ext2_fsync: not dirty");
254 * Wait for I/O associated with indirect blocks to complete,
255 * since there is no way to quickly wait for them below.
257 if (bp
->b_vp
== info
->vp
|| (info
->waitfor
& MNT_NOWAIT
))
267 * ext2_mknod(struct vnode *a_dvp, struct vnode **a_vpp,
268 * struct componentname *a_cnp, struct vattr *a_vap)
272 ext2_mknod(struct vop_old_mknod_args
*ap
)
274 struct vattr
*vap
= ap
->a_vap
;
275 struct vnode
**vpp
= ap
->a_vpp
;
280 if (vap
->va_rmajor
!= VNOVAL
&&
281 makeudev(vap
->va_rmajor
, vap
->va_rminor
) == NOUDEV
) {
285 error
= ext2_makeinode(MAKEIMODE(vap
->va_type
, vap
->va_mode
),
286 ap
->a_dvp
, vpp
, ap
->a_cnp
);
290 ip
->i_flag
|= IN_ACCESS
| IN_CHANGE
| IN_UPDATE
;
291 if (vap
->va_rmajor
!= VNOVAL
) {
293 * Want to be able to use this to make badblock
294 * inodes, so don't truncate the dev number.
296 ip
->i_rdev
= makeudev(vap
->va_rmajor
, vap
->va_rminor
);
299 * Remove inode, then reload it through VFS_VGET so it is
300 * checked to see if it is an alias of an existing entry in
303 (*vpp
)->v_type
= VNON
;
304 ino
= ip
->i_number
; /* Save this before vgone() invalidates ip. */
305 vgone_vxlocked(*vpp
);
307 error
= VFS_VGET(ap
->a_dvp
->v_mount
, NULL
, ino
, vpp
);
316 * ext2_remove(struct vnode *a_dvp, struct vnode *a_vp,
317 * struct componentname *a_cnp)
320 ext2_remove(struct vop_old_remove_args
*ap
)
323 struct vnode
*vp
= ap
->a_vp
;
324 struct vnode
*dvp
= ap
->a_dvp
;
328 if ((ip
->i_flags
& (NOUNLINK
| IMMUTABLE
| APPEND
)) ||
329 (VTOI(dvp
)->i_flags
& APPEND
)) {
333 error
= ext2_dirremove(dvp
, ap
->a_cnp
);
336 ip
->i_flag
|= IN_CHANGE
;
345 * ext2_link(struct vnode *a_tdvp, struct vnode *a_vp,
346 * struct componentname *a_cnp)
349 ext2_link(struct vop_old_link_args
*ap
)
351 struct vnode
*vp
= ap
->a_vp
;
352 struct vnode
*tdvp
= ap
->a_tdvp
;
353 struct componentname
*cnp
= ap
->a_cnp
;
357 if (tdvp
->v_mount
!= vp
->v_mount
) {
361 if (tdvp
!= vp
&& (error
= vn_lock(vp
, LK_EXCLUSIVE
))) {
365 if ((nlink_t
)ip
->i_nlink
>= LINK_MAX
) {
369 if (ip
->i_flags
& (IMMUTABLE
| APPEND
)) {
374 ip
->i_flag
|= IN_CHANGE
;
375 error
= EXT2_UPDATE(vp
, 1);
377 error
= ext2_direnter(ip
, tdvp
, cnp
);
380 ip
->i_flag
|= IN_CHANGE
;
390 * Rename system call. fdvp, fvp are ref'd. tvp, tdvp are ref'd and locked.
391 * all vp's are released and must be in an unlocked state on return.
393 * ext2_rename(struct vnode *a_fdvp, struct vnode *a_fvp,
394 * struct componentname *a_fcnp, struct vnode *a_tdvp,
395 * struct vnode *a_tvp, struct componentname *a_tcnp)
398 ext2_rename(struct vop_old_rename_args
*ap
)
400 struct vnode
*tvp
= ap
->a_tvp
;
401 struct vnode
*tdvp
= ap
->a_tdvp
;
402 struct vnode
*fvp
= ap
->a_fvp
;
403 struct vnode
*fdvp
= ap
->a_fdvp
;
404 struct componentname
*tcnp
= ap
->a_tcnp
;
405 struct componentname
*fcnp
= ap
->a_fcnp
;
406 struct inode
*ip
, *xp
, *dp
;
407 struct dirtemplate dirbuf
;
408 int doingdirectory
= 0, oldparent
= 0, newparent
= 0;
413 * Check for cross-device rename.
415 if ((fvp
->v_mount
!= tdvp
->v_mount
) ||
416 (tvp
&& (fvp
->v_mount
!= tvp
->v_mount
)) ||
431 if (tvp
&& ((VTOI(tvp
)->i_flags
& (NOUNLINK
| IMMUTABLE
| APPEND
)) ||
432 (VTOI(tdvp
)->i_flags
& APPEND
))) {
438 * Renaming a file to itself has no effect. The upper layers should
439 * not call us in that case. Temporarily just warn if they do.
446 if ((error
= vn_lock(fvp
, LK_EXCLUSIVE
)) != 0)
450 * fvp, tvp, tdvp locked. fdvp not locked but note that fdvp may
455 if (ip
->i_nlink
>= LINK_MAX
) {
460 if ((ip
->i_flags
& (NOUNLINK
| IMMUTABLE
| APPEND
))
461 || (dp
->i_flags
& APPEND
)) {
466 if ((ip
->i_mode
& IFMT
) == IFDIR
) {
468 * Avoid ".", "..", and aliases of "." for obvious reasons.
470 if ((fcnp
->cn_namelen
== 1 && fcnp
->cn_nameptr
[0] == '.') ||
471 dp
== ip
|| (fcnp
->cn_flags
| tcnp
->cn_flags
) & CNP_ISDOTDOT
||
472 (ip
->i_flag
& IN_RENAME
)) {
477 ip
->i_flag
|= IN_RENAME
;
478 oldparent
= dp
->i_number
;
483 * tvp is non-NULL if the target exists. fvp is still locked but
484 * we will unlock it soon. The 'bad' goto target requires dp and
485 * xp to be correctly assigned.
494 * 1) Bump link count while we're moving stuff
495 * around. If we crash somewhere before
496 * completing our work, the link count
497 * may be wrong, but correctable.
500 ip
->i_flag
|= IN_CHANGE
;
501 if ((error
= EXT2_UPDATE(fvp
, 1)) != 0) {
507 * If ".." must be changed (ie the directory gets a new
508 * parent) then the source directory must not be in the
509 * directory heirarchy above the target, as this would
510 * orphan everything below the source directory. Also
511 * the user must have write permission in the source so
512 * as to be able to change "..". We must repeat the call
513 * to namei, as the parent directory is unlocked by the
514 * call to checkpath().
516 error
= VOP_EACCESS(fvp
, VWRITE
, tcnp
->cn_cred
);
520 * tvp (if not NULL) and tdvp are locked. fvp and fdvp are not.
521 * dp and xp are set according to tdvp and tvp.
523 if (oldparent
!= dp
->i_number
)
524 newparent
= dp
->i_number
;
525 if (doingdirectory
&& newparent
) {
526 if (error
) /* write access check above */
530 * Prepare for relookup, get rid of xp
538 * checkpath vput()'s tdvp (VTOI(dp)) on return no matter what,
539 * get an extra ref so we wind up with just an unlocked, ref'd
540 * tdvp. The 'out' target skips xp and tdvp cleanups. Our
541 * tdvp is now unlocked so we have to clean it up ourselves.
544 error
= ext2_checkpath(ip
, dp
, tcnp
->cn_cred
);
545 tcnp
->cn_flags
|= CNP_PDIRUNLOCK
;
551 * relookup no longer messes with the ref count. An unlocked
552 * tdvp must be passed and if no error occurs a locked tdvp
553 * will be returned. We have to use the out target again.
555 error
= relookup(tdvp
, &tvp
, tcnp
);
557 if (tcnp
->cn_flags
& CNP_PDIRUNLOCK
)
565 * tdvp is locked at this point. in the RENAME case tvp may
566 * be NULL without an error, assign xp accordingly. The
567 * 'bad' target can be used again after this.
574 * 2) If target doesn't exist, link the target
575 * to the source and unlink the source.
576 * Otherwise, rewrite the target directory
577 * entry to reference the source inode and
578 * expunge the original entry's existence.
580 * tdvp and tvp are cleaned up by this code. tvp is only good if
584 if (dp
->i_dev
!= ip
->i_dev
)
585 panic("ext2_rename: EXDEV");
587 * Account for ".." in new directory.
588 * When source and destination have the same
589 * parent we don't fool with the link count.
591 if (doingdirectory
&& newparent
) {
592 if ((nlink_t
)dp
->i_nlink
>= LINK_MAX
) {
597 dp
->i_flag
|= IN_CHANGE
;
598 error
= EXT2_UPDATE(tdvp
, 1);
602 error
= ext2_direnter(ip
, tdvp
, tcnp
);
604 if (doingdirectory
&& newparent
) {
606 dp
->i_flag
|= IN_CHANGE
;
607 EXT2_UPDATE(tdvp
, 1);
613 * manual cleanup, we can't use the bad or out target after
618 if (xp
->i_dev
!= dp
->i_dev
|| xp
->i_dev
!= ip
->i_dev
)
619 panic("ext2_rename: EXDEV");
621 * Short circuit rename(foo, foo).
623 if (xp
->i_number
== ip
->i_number
)
624 panic("ext2_rename: same file");
626 * If the parent directory is "sticky", then the user must
627 * own the parent directory, or the destination of the rename,
628 * otherwise the destination may not be changed (except by
629 * root). This implements append-only directories.
631 if ((dp
->i_mode
& S_ISTXT
) && tcnp
->cn_cred
->cr_uid
!= 0 &&
632 tcnp
->cn_cred
->cr_uid
!= dp
->i_uid
&&
633 xp
->i_uid
!= tcnp
->cn_cred
->cr_uid
) {
638 * Target must be empty if a directory and have no links
639 * to it. Also, ensure source and target are compatible
640 * (both directories, or both not directories).
642 if ((xp
->i_mode
&IFMT
) == IFDIR
) {
643 if (! ext2_dirempty(xp
, dp
->i_number
, tcnp
->cn_cred
) ||
648 if (!doingdirectory
) {
652 } else if (doingdirectory
) {
656 error
= ext2_dirrewrite(dp
, ip
, tcnp
);
660 * If the target directory is in the same
661 * directory as the source directory,
662 * decrement the link count on the parent
663 * of the target directory.
665 if (doingdirectory
&& !newparent
) {
667 dp
->i_flag
|= IN_CHANGE
;
671 * manual cleanup, we can't use the bad or out target after
677 * Adjust the link count of the target to
678 * reflect the dirrewrite above. If this is
679 * a directory it is empty and there are
680 * no links to it, so we can squash the inode and
681 * any space associated with it. We disallowed
682 * renaming over top of a directory with links to
683 * it above, as the remaining link would point to
684 * a directory without "." or ".." entries.
687 if (doingdirectory
) {
688 if (--xp
->i_nlink
!= 0)
689 panic("ext2_rename: linked directory");
690 error
= EXT2_TRUNCATE(tvp
, (off_t
)0, IO_SYNC
,
693 xp
->i_flag
|= IN_CHANGE
;
699 * tvp and tdvp have been cleaned up. The bad and out targets may
700 * not be used. fvp and fdvp are ref'd but not locked. ip
701 * still represents the old fvp and ip->i_flag may still have IN_RENAME
702 * set (if doingdirectory).
706 * 3) Unlink the source.
708 * fdvp is locked and ref'd. ap->a_fvp holds the old lookup unlocked
709 * and ref'd, fvp will hold the new lookup locked and ref'd.
711 * After the relookup ap->a_fvp must be released as part of our
712 * cleanup, not just fdvp and fvp. And, on success, fdvp and
713 * fvp will be locked so the bad and out targets cannot be used.
715 fcnp
->cn_flags
&= ~CNP_MODMASK
;
716 fcnp
->cn_flags
|= CNP_LOCKPARENT
;
717 KKASSERT(fcnp
->cn_flags
& CNP_PDIRUNLOCK
);
718 error
= relookup(fdvp
, &fvp
, fcnp
);
721 * From name has disappeared.
724 panic("ext2_rename: lost dir entry");
725 /* ip->i_flag only sets IN_RENAME if doingdirectory */
727 if (fcnp
->cn_flags
& CNP_PDIRUNLOCK
)
733 KKASSERT((fcnp
->cn_flags
& CNP_PDIRUNLOCK
) == 0);
736 * This case shouldn't occur
740 * From name has disappeared.
743 panic("ext2_rename: lost dir entry");
744 /* ip->i_flag only sets IN_RENAME if doingdirectory */
752 * fvp and fdvp are both ref'd and locked.
758 * Ensure that the directory entry still exists and has not
759 * changed while the new name has been entered. If the source is
760 * a file then the entry may have been unlinked or renamed. In
761 * either case there is no further work to be done. If the source
762 * is a directory then it cannot have been rmdir'ed; its link
763 * count of three would cause a rmdir to fail with ENOTEMPTY.
764 * The IN_RENAME flag ensures that it cannot be moved by another
769 panic("ext2_rename: lost dir entry");
770 /* ip->i_flag only sets IN_RENAME if doingdirectory */
773 * If the source is a directory with a
774 * new parent, the link count of the old
775 * parent directory must be decremented
776 * and ".." set to point to the new parent.
778 if (doingdirectory
&& newparent
) {
780 dp
->i_flag
|= IN_CHANGE
;
781 error
= vn_rdwr(UIO_READ
, fvp
, (caddr_t
)&dirbuf
,
782 sizeof (struct dirtemplate
), (off_t
)0,
783 UIO_SYSSPACE
, IO_NODELOCKED
,
784 tcnp
->cn_cred
, NULL
);
786 /* Like ext2 little-endian: */
787 namlen
= dirbuf
.dotdot_type
;
789 dirbuf
.dotdot_name
[0] != '.' ||
790 dirbuf
.dotdot_name
[1] != '.') {
791 ext2_dirbad(xp
, (doff_t
)12,
792 "rename: mangled dir");
794 dirbuf
.dotdot_ino
= newparent
;
795 vn_rdwr(UIO_WRITE
, fvp
,
797 sizeof (struct dirtemplate
),
798 (off_t
)0, UIO_SYSSPACE
,
799 IO_NODELOCKED
|IO_SYNC
,
800 tcnp
->cn_cred
, NULL
);
804 error
= ext2_dirremove(fdvp
, fcnp
);
807 xp
->i_flag
|= IN_CHANGE
;
809 xp
->i_flag
&= ~IN_RENAME
;
823 ip
->i_flag
&= ~IN_RENAME
;
824 if (vn_lock(fvp
, LK_EXCLUSIVE
) == 0) {
826 ip
->i_flag
|= IN_CHANGE
;
827 ip
->i_flag
&= ~IN_RENAME
;
838 * ext2_mkdir(struct vnode *a_dvp, struct vnode **a_vpp,
839 * struct componentname *a_cnp, struct vattr *a_vap)
842 ext2_mkdir(struct vop_old_mkdir_args
*ap
)
844 struct vnode
*dvp
= ap
->a_dvp
;
845 struct vattr
*vap
= ap
->a_vap
;
846 struct componentname
*cnp
= ap
->a_cnp
;
847 struct inode
*ip
, *dp
;
849 struct dirtemplate dirtemplate
, *dtp
;
853 if ((nlink_t
)dp
->i_nlink
>= LINK_MAX
) {
857 dmode
= vap
->va_mode
& 0777;
860 * Must simulate part of ext2_makeinode here to acquire the inode,
861 * but not have it entered in the parent directory. The entry is
862 * made later after writing "." and ".." entries.
864 error
= EXT2_VALLOC(dvp
, dmode
, cnp
->cn_cred
, &tvp
);
868 ip
->i_gid
= dp
->i_gid
;
872 struct ucred ucred
, *ucp
;
876 * if we are hacking owners here, (only do this where told to)
877 * and we are not giving it TOO root, (would subvert quotas)
878 * then go ahead and give it to the other user.
879 * The new directory also inherits the SUID bit.
880 * If user's UID and dir UID are the same,
881 * 'give it away' so that the SUID is still forced on.
883 if ( (dvp
->v_mount
->mnt_flag
& MNT_SUIDDIR
) &&
884 (dp
->i_mode
& ISUID
) && dp
->i_uid
) {
886 ip
->i_uid
= dp
->i_uid
;
888 if (dp
->i_uid
!= cnp
->cn_cred
->cr_uid
) {
890 * make sure the correct user gets charged
892 * Make a dummy credential for the victim.
893 * XXX This seems to never be accessed out of
894 * our context so a stack variable is ok.
897 ucred
.cr_uid
= ip
->i_uid
;
898 ucred
.cr_ngroups
= 1;
899 ucred
.cr_groups
[0] = dp
->i_gid
;
904 ip
->i_uid
= cnp
->cn_cred
->cr_uid
;
907 if ((error
= ext2_getinoquota(ip
)) ||
908 (error
= ext2_chkiq(ip
, 1, ucp
, 0))) {
909 EXT2_VFREE(tvp
, ip
->i_number
, dmode
);
916 ip
->i_uid
= cnp
->cn_cred
->cr_uid
;
918 if ((error
= ext2_getinoquota(ip
)) ||
919 (error
= ext2_chkiq(ip
, 1, cnp
->cn_cred
, 0))) {
920 EXT2_VFREE(tvp
, ip
->i_number
, dmode
);
926 ip
->i_flag
|= IN_ACCESS
| IN_CHANGE
| IN_UPDATE
;
928 tvp
->v_type
= VDIR
; /* Rest init'd in getnewvnode(). */
930 if (cnp
->cn_flags
& CNP_ISWHITEOUT
)
931 ip
->i_flags
|= UF_OPAQUE
;
932 error
= EXT2_UPDATE(tvp
, 1);
935 * The vnode must have a VM object in order to issue buffer cache
938 vinitvmio(tvp
, 0, PAGE_SIZE
, -1);
941 * Bump link count in parent directory
942 * to reflect work done below. Should
943 * be done before reference is created
944 * so reparation is possible if we crash.
947 dp
->i_flag
|= IN_CHANGE
;
948 error
= EXT2_UPDATE(dvp
, 1);
952 /* Initialize directory with "." and ".." from static template. */
953 if (EXT2_HAS_INCOMPAT_FEATURE(ip
->i_e2fs
->s_es
,
954 EXT2_FEATURE_INCOMPAT_FILETYPE
))
955 dtp
= &ext2_mastertemplate
;
957 dtp
= &ext2_omastertemplate
;
959 dirtemplate
.dot_ino
= ip
->i_number
;
960 dirtemplate
.dotdot_ino
= dp
->i_number
;
961 /* note that in ext2 DIRBLKSIZ == blocksize, not DEV_BSIZE
962 * so let's just redefine it - for this function only
965 #define DIRBLKSIZ VTOI(dvp)->i_e2fs->s_blocksize
966 dirtemplate
.dotdot_reclen
= DIRBLKSIZ
- 12;
967 error
= vn_rdwr(UIO_WRITE
, tvp
, (caddr_t
)&dirtemplate
,
968 sizeof (dirtemplate
), (off_t
)0, UIO_SYSSPACE
,
969 IO_NODELOCKED
|IO_SYNC
, cnp
->cn_cred
, NULL
);
972 dp
->i_flag
|= IN_CHANGE
;
975 if (DIRBLKSIZ
> VFSTOEXT2(dvp
->v_mount
)->um_mountp
->mnt_stat
.f_bsize
)
976 panic("ext2_mkdir: blksize"); /* XXX should grow with balloc() */
978 ip
->i_size
= DIRBLKSIZ
;
979 ip
->i_flag
|= IN_CHANGE
;
982 /* Directory set up, now install its entry in the parent directory. */
983 error
= ext2_direnter(ip
, dvp
, cnp
);
986 dp
->i_flag
|= IN_CHANGE
;
990 * No need to do an explicit VOP_TRUNCATE here, vrele will do this
991 * for us because we set the link count to 0.
995 ip
->i_flag
|= IN_CHANGE
;
1002 #define DIRBLKSIZ DEV_BSIZE
1006 * Rmdir system call.
1008 * ext2_rmdir(struct vnode *a_dvp, struct vnode *a_vp,
1009 * struct componentname *a_cnp)
1012 ext2_rmdir(struct vop_old_rmdir_args
*ap
)
1014 struct vnode
*vp
= ap
->a_vp
;
1015 struct vnode
*dvp
= ap
->a_dvp
;
1016 struct componentname
*cnp
= ap
->a_cnp
;
1017 struct inode
*ip
, *dp
;
1024 * Verify the directory is empty (and valid).
1025 * (Rmdir ".." won't be valid since
1026 * ".." will contain a reference to
1027 * the current directory and thus be
1031 if (ip
->i_nlink
!= 2 || !ext2_dirempty(ip
, dp
->i_number
, cnp
->cn_cred
)) {
1035 if ((dp
->i_flags
& APPEND
)
1036 || (ip
->i_flags
& (NOUNLINK
| IMMUTABLE
| APPEND
))) {
1041 * Delete reference to directory before purging
1042 * inode. If we crash in between, the directory
1043 * will be reattached to lost+found,
1045 error
= ext2_dirremove(dvp
, cnp
);
1049 dp
->i_flag
|= IN_CHANGE
;
1052 * Truncate inode. The only stuff left
1053 * in the directory is "." and "..". The
1054 * "." reference is inconsequential since
1055 * we're quashing it. The ".." reference
1056 * has already been adjusted above. We've
1057 * removed the "." reference and the reference
1058 * in the parent directory, but there may be
1059 * other hard links so decrement by 2 and
1060 * worry about them later.
1063 error
= EXT2_TRUNCATE(vp
, (off_t
)0, IO_SYNC
, cnp
->cn_cred
);
1064 vn_lock(dvp
, LK_EXCLUSIVE
| LK_RETRY
);
1070 * symlink -- make a symbolic link
1072 * ext2_symlink(struct vnode *a_dvp, struct vnode **a_vpp,
1073 * struct componentname *a_cnp, struct vattr *a_vap,
1077 ext2_symlink(struct vop_old_symlink_args
*ap
)
1079 struct vnode
*vp
, **vpp
= ap
->a_vpp
;
1083 error
= ext2_makeinode(IFLNK
| ap
->a_vap
->va_mode
, ap
->a_dvp
,
1088 len
= strlen(ap
->a_target
);
1089 if (len
< vp
->v_mount
->mnt_maxsymlinklen
) {
1091 bcopy(ap
->a_target
, (char *)ip
->i_shortlink
, len
);
1093 ip
->i_flag
|= IN_CHANGE
| IN_UPDATE
;
1096 * Make sure we have a VM object in order to use
1099 if (vp
->v_object
== NULL
)
1100 vinitvmio(vp
, 0, PAGE_SIZE
, -1);
1102 error
= vn_rdwr(UIO_WRITE
, vp
, ap
->a_target
, len
, (off_t
)0,
1103 UIO_SYSSPACE
, IO_NODELOCKED
,
1104 ap
->a_cnp
->cn_cred
, NULL
);
1114 * Allocate a new inode.
1117 ext2_makeinode(int mode
, struct vnode
*dvp
, struct vnode
**vpp
,
1118 struct componentname
*cnp
)
1120 struct inode
*ip
, *pdir
;
1126 if ((mode
& IFMT
) == 0)
1129 error
= EXT2_VALLOC(dvp
, mode
, cnp
->cn_cred
, &tvp
);
1134 ip
->i_gid
= pdir
->i_gid
;
1138 struct ucred ucred
, *ucp
;
1143 * not the owner of the directory,
1144 * and we are hacking owners here, (only do this where told to)
1145 * and we are not giving it TOO root, (would subvert quotas)
1146 * then go ahead and give it to the other user.
1147 * Note that this drops off the execute bits for security.
1149 if ( (dvp
->v_mount
->mnt_flag
& MNT_SUIDDIR
) &&
1150 (pdir
->i_mode
& ISUID
) &&
1151 (pdir
->i_uid
!= cnp
->cn_cred
->cr_uid
) && pdir
->i_uid
) {
1152 ip
->i_uid
= pdir
->i_uid
;
1156 * make sure the correct user gets charged
1158 * Quickly knock up a dummy credential for the victim.
1159 * XXX This seems to never be accessed out of our
1160 * context so a stack variable is ok.
1163 ucred
.cr_uid
= ip
->i_uid
;
1164 ucred
.cr_ngroups
= 1;
1165 ucred
.cr_groups
[0] = pdir
->i_gid
;
1169 ip
->i_uid
= cnp
->cn_cred
->cr_uid
;
1173 if ((error
= ext2_getinoquota(ip
)) ||
1174 (error
= ext2_chkiq(ip
, 1, ucp
, 0))) {
1175 EXT2_VFREE(tvp
, ip
->i_number
, mode
);
1182 ip
->i_uid
= cnp
->cn_cred
->cr_uid
;
1184 if ((error
= ext2_getinoquota(ip
)) ||
1185 (error
= ext2_chkiq(ip
, 1, cnp
->cn_cred
, 0))) {
1186 EXT2_VFREE(tvp
, ip
->i_number
, mode
);
1192 ip
->i_flag
|= IN_ACCESS
| IN_CHANGE
| IN_UPDATE
;
1194 tvp
->v_type
= IFTOVT(mode
); /* Rest init'd in getnewvnode(). */
1196 if ((ip
->i_mode
& ISGID
) && !groupmember(ip
->i_gid
, cnp
->cn_cred
) &&
1197 priv_check_cred(cnp
->cn_cred
, PRIV_VFS_SETGID
, 0))
1198 ip
->i_mode
&= ~ISGID
;
1200 if (cnp
->cn_flags
& CNP_ISWHITEOUT
)
1201 ip
->i_flags
|= UF_OPAQUE
;
1204 * Regular files and directories need VM objects. Softlinks do
1205 * not (not immediately anyway).
1207 if (tvp
->v_type
== VREG
|| tvp
->v_type
== VDIR
)
1208 vinitvmio(tvp
, 0, PAGE_SIZE
, -1);
1211 * Make sure inode goes to disk before directory entry.
1213 error
= EXT2_UPDATE(tvp
, 1);
1216 error
= ext2_direnter(ip
, dvp
, cnp
);
1225 * Write error occurred trying to update the inode
1226 * or the directory so must deallocate the inode.
1229 ip
->i_flag
|= IN_CHANGE
;
1235 ext2_itimes(struct vnode
*vp
)
1241 if ((ip
->i_flag
& (IN_ACCESS
| IN_CHANGE
| IN_UPDATE
)) == 0)
1243 if ((vp
->v_type
== VBLK
|| vp
->v_type
== VCHR
) && !DOINGSOFTDEP(vp
))
1244 ip
->i_flag
|= IN_LAZYMOD
;
1246 ip
->i_flag
|= IN_MODIFIED
;
1247 if ((vp
->v_mount
->mnt_flag
& MNT_RDONLY
) == 0) {
1249 if (ip
->i_flag
& IN_ACCESS
) {
1250 ip
->i_atime
= ts
.tv_sec
;
1251 ip
->i_atimensec
= ts
.tv_nsec
;
1253 if (ip
->i_flag
& IN_UPDATE
) {
1254 ip
->i_mtime
= ts
.tv_sec
;
1255 ip
->i_mtimensec
= ts
.tv_nsec
;
1258 if (ip
->i_flag
& IN_CHANGE
) {
1259 ip
->i_ctime
= ts
.tv_sec
;
1260 ip
->i_ctimensec
= ts
.tv_nsec
;
1263 ip
->i_flag
&= ~(IN_ACCESS
| IN_CHANGE
| IN_UPDATE
);
1271 * ext2_open(struct vnode *a_vp, int a_mode, struct ucred *a_cred,
1272 * struct file *a_fp)
1277 ext2_open(struct vop_open_args
*ap
)
1279 struct vnode
*vp
= ap
->a_vp
;
1282 * Files marked append-only must be opened for appending.
1284 if ((VTOI(vp
)->i_flags
& APPEND
) &&
1285 (ap
->a_mode
& (FWRITE
| O_APPEND
)) == FWRITE
) {
1288 return (vop_stdopen(ap
));
1294 * Update the times on the inode.
1296 * ext2_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1301 ext2_close(struct vop_close_args
*ap
)
1303 struct vnode
*vp
= ap
->a_vp
;
1305 if (vp
->v_sysref
.refcnt
> 1)
1307 return (vop_stdclose(ap
));
1311 * ext2_access(struct vnode *a_vp, int a_mode, struct ucred *a_cred)
1315 ext2_access(struct vop_access_args
*ap
)
1317 struct vnode
*vp
= ap
->a_vp
;
1318 struct inode
*ip
= VTOI(vp
);
1322 if (ap
->a_mode
& VWRITE
) {
1323 switch (vp
->v_type
) {
1327 if ((error
= ext2_getinoquota(ip
)) != 0)
1336 error
= vop_helper_access(ap
, ip
->i_uid
, ip
->i_gid
, ip
->i_mode
,
1342 * ext2_getattr(struct vnode *a_vp, struct vattr *a_vap)
1347 ext2_getattr(struct vop_getattr_args
*ap
)
1349 struct vnode
*vp
= ap
->a_vp
;
1350 struct inode
*ip
= VTOI(vp
);
1351 struct vattr
*vap
= ap
->a_vap
;
1355 * Copy from inode table
1357 vap
->va_fsid
= dev2udev(ip
->i_dev
);
1358 vap
->va_fileid
= ip
->i_number
;
1359 vap
->va_mode
= ip
->i_mode
& ~IFMT
;
1360 vap
->va_nlink
= VFSTOEXT2(vp
->v_mount
)->um_i_effnlink_valid
?
1361 ip
->i_effnlink
: ip
->i_nlink
;
1362 vap
->va_uid
= ip
->i_uid
;
1363 vap
->va_gid
= ip
->i_gid
;
1364 vap
->va_rmajor
= umajor(ip
->i_rdev
);
1365 vap
->va_rminor
= uminor(ip
->i_rdev
);
1366 vap
->va_size
= ip
->i_din
.di_size
;
1367 vap
->va_atime
.tv_sec
= ip
->i_atime
;
1368 vap
->va_atime
.tv_nsec
= ip
->i_atimensec
;
1369 vap
->va_mtime
.tv_sec
= ip
->i_mtime
;
1370 vap
->va_mtime
.tv_nsec
= ip
->i_mtimensec
;
1371 vap
->va_ctime
.tv_sec
= ip
->i_ctime
;
1372 vap
->va_ctime
.tv_nsec
= ip
->i_ctimensec
;
1373 vap
->va_flags
= ip
->i_flags
;
1374 vap
->va_gen
= ip
->i_gen
;
1375 vap
->va_blocksize
= vp
->v_mount
->mnt_stat
.f_iosize
;
1376 vap
->va_bytes
= dbtob((u_quad_t
)ip
->i_blocks
);
1377 vap
->va_type
= IFTOVT(ip
->i_mode
);
1378 vap
->va_filerev
= ip
->i_modrev
;
1383 * Set attribute vnode op. called from several syscalls
1385 * ext2_setattr(struct vnode *a_vp, struct vattr *a_vap, struct ucred *a_cred)
1389 ext2_setattr(struct vop_setattr_args
*ap
)
1391 struct vattr
*vap
= ap
->a_vap
;
1392 struct vnode
*vp
= ap
->a_vp
;
1393 struct inode
*ip
= VTOI(vp
);
1394 struct ucred
*cred
= ap
->a_cred
;
1398 * Check for unsettable attributes.
1400 if ((vap
->va_type
!= VNON
) || (vap
->va_nlink
!= VNOVAL
) ||
1401 (vap
->va_fsid
!= VNOVAL
) || (vap
->va_fileid
!= VNOVAL
) ||
1402 (vap
->va_blocksize
!= VNOVAL
) || (vap
->va_rmajor
!= VNOVAL
) ||
1403 ((int)vap
->va_bytes
!= VNOVAL
) || (vap
->va_gen
!= VNOVAL
)) {
1406 if (vap
->va_flags
!= VNOVAL
) {
1407 if (vp
->v_mount
->mnt_flag
& MNT_RDONLY
)
1409 if (cred
->cr_uid
!= ip
->i_uid
&&
1410 (error
= priv_check_cred(cred
, PRIV_VFS_SETATTR
, 0)))
1413 * Note that a root chflags becomes a user chflags when
1414 * we are jailed, unless the jail.chflags_allowed sysctl
1417 if (cred
->cr_uid
== 0 &&
1418 (!jailed(cred
) || jail_chflags_allowed
)) {
1420 & (SF_NOUNLINK
| SF_IMMUTABLE
| SF_APPEND
)) &&
1423 ip
->i_flags
= vap
->va_flags
;
1426 & (SF_NOUNLINK
| SF_IMMUTABLE
| SF_APPEND
) ||
1427 (vap
->va_flags
& UF_SETTABLE
) != vap
->va_flags
)
1429 ip
->i_flags
&= SF_SETTABLE
;
1430 ip
->i_flags
|= (vap
->va_flags
& UF_SETTABLE
);
1432 ip
->i_flag
|= IN_CHANGE
;
1433 if (vap
->va_flags
& (IMMUTABLE
| APPEND
))
1436 if (ip
->i_flags
& (IMMUTABLE
| APPEND
))
1439 * Go through the fields and update iff not VNOVAL.
1441 if (vap
->va_uid
!= (uid_t
)VNOVAL
|| vap
->va_gid
!= (gid_t
)VNOVAL
) {
1442 if (vp
->v_mount
->mnt_flag
& MNT_RDONLY
)
1444 if ((error
= ext2_chown(vp
, vap
->va_uid
, vap
->va_gid
, cred
)) != 0)
1447 if (vap
->va_size
!= VNOVAL
) {
1449 * Disallow write attempts on read-only filesystems;
1450 * unless the file is a socket, fifo, or a block or
1451 * character device resident on the filesystem.
1453 switch (vp
->v_type
) {
1458 if (vp
->v_mount
->mnt_flag
& MNT_RDONLY
)
1464 if ((error
= EXT2_TRUNCATE(vp
, vap
->va_size
, 0, cred
)) != 0)
1468 if (vap
->va_atime
.tv_sec
!= VNOVAL
|| vap
->va_mtime
.tv_sec
!= VNOVAL
) {
1469 if (vp
->v_mount
->mnt_flag
& MNT_RDONLY
)
1471 if (cred
->cr_uid
!= ip
->i_uid
&&
1472 (error
= priv_check_cred(cred
, PRIV_VFS_SETATTR
, 0)) &&
1473 ((vap
->va_vaflags
& VA_UTIMES_NULL
) == 0 ||
1474 (error
= VOP_EACCESS(vp
, VWRITE
, cred
))))
1476 if (vap
->va_atime
.tv_sec
!= VNOVAL
)
1477 ip
->i_flag
|= IN_ACCESS
;
1478 if (vap
->va_mtime
.tv_sec
!= VNOVAL
)
1479 ip
->i_flag
|= IN_CHANGE
| IN_UPDATE
;
1481 if (vap
->va_atime
.tv_sec
!= VNOVAL
) {
1482 ip
->i_atime
= vap
->va_atime
.tv_sec
;
1483 ip
->i_atimensec
= vap
->va_atime
.tv_nsec
;
1485 if (vap
->va_mtime
.tv_sec
!= VNOVAL
) {
1486 ip
->i_mtime
= vap
->va_mtime
.tv_sec
;
1487 ip
->i_mtimensec
= vap
->va_mtime
.tv_nsec
;
1489 error
= EXT2_UPDATE(vp
, 0);
1494 if (vap
->va_mode
!= (mode_t
)VNOVAL
) {
1495 if (vp
->v_mount
->mnt_flag
& MNT_RDONLY
)
1497 error
= ext2_chmod(vp
, (int)vap
->va_mode
, cred
);
1499 VN_KNOTE(vp
, NOTE_ATTRIB
);
1504 * Change the mode on a file.
1505 * Inode must be locked before calling.
1508 ext2_chmod(struct vnode
*vp
, int mode
, struct ucred
*cred
)
1510 struct inode
*ip
= VTOI(vp
);
1513 if (cred
->cr_uid
!= ip
->i_uid
) {
1514 error
= priv_check_cred(cred
, PRIV_VFS_CHMOD
, 0);
1519 if (vp
->v_type
!= VDIR
&& (mode
& S_ISTXT
))
1521 if (!groupmember(ip
->i_gid
, cred
) && (mode
& ISGID
))
1524 ip
->i_mode
&= ~ALLPERMS
;
1525 ip
->i_mode
|= (mode
& ALLPERMS
);
1526 ip
->i_flag
|= IN_CHANGE
;
1531 * Perform chown operation on inode ip;
1532 * inode must be locked prior to call.
1535 ext2_chown(struct vnode
*vp
, uid_t uid
, gid_t gid
, struct ucred
*cred
)
1537 struct inode
*ip
= VTOI(vp
);
1546 if (uid
== (uid_t
)VNOVAL
)
1548 if (gid
== (gid_t
)VNOVAL
)
1551 * If we don't own the file, are trying to change the owner
1552 * of the file, or are not a member of the target group,
1553 * the caller must be superuser or the call fails.
1555 if ((cred
->cr_uid
!= ip
->i_uid
|| uid
!= ip
->i_uid
||
1556 (gid
!= ip
->i_gid
&& !(cred
->cr_gid
== gid
||
1557 groupmember((gid_t
)gid
, cred
)))) &&
1558 (error
= priv_check_cred(cred
, PRIV_VFS_CHOWN
, 0)))
1563 if ((error
= ext2_getinoquota(ip
)) != 0)
1566 ext2_dqrele(vp
, ip
->i_dquot
[USRQUOTA
]);
1567 ip
->i_dquot
[USRQUOTA
] = NODQUOT
;
1570 ext2_dqrele(vp
, ip
->i_dquot
[GRPQUOTA
]);
1571 ip
->i_dquot
[GRPQUOTA
] = NODQUOT
;
1573 change
= ip
->i_blocks
;
1574 (void) ext2_chkdq(ip
, -change
, cred
, CHOWN
);
1575 (void) ext2_chkiq(ip
, -1, cred
, CHOWN
);
1576 for (i
= 0; i
< MAXQUOTAS
; i
++) {
1577 ext2_dqrele(vp
, ip
->i_dquot
[i
]);
1578 ip
->i_dquot
[i
] = NODQUOT
;
1584 if ((error
= ext2_getinoquota(ip
)) == 0) {
1586 ext2_dqrele(vp
, ip
->i_dquot
[USRQUOTA
]);
1587 ip
->i_dquot
[USRQUOTA
] = NODQUOT
;
1590 ext2_dqrele(vp
, ip
->i_dquot
[GRPQUOTA
]);
1591 ip
->i_dquot
[GRPQUOTA
] = NODQUOT
;
1593 if ((error
= ext2_chkdq(ip
, change
, cred
, CHOWN
)) == 0) {
1594 if ((error
= ext2_chkiq(ip
, 1, cred
, CHOWN
)) == 0)
1597 (void)ext2_chkdq(ip
, -change
, cred
, CHOWN
|FORCE
);
1599 for (i
= 0; i
< MAXQUOTAS
; i
++) {
1600 ext2_dqrele(vp
, ip
->i_dquot
[i
]);
1601 ip
->i_dquot
[i
] = NODQUOT
;
1606 if (ext2_getinoquota(ip
) == 0) {
1608 ext2_dqrele(vp
, ip
->i_dquot
[USRQUOTA
]);
1609 ip
->i_dquot
[USRQUOTA
] = NODQUOT
;
1612 ext2_dqrele(vp
, ip
->i_dquot
[GRPQUOTA
]);
1613 ip
->i_dquot
[GRPQUOTA
] = NODQUOT
;
1615 (void) ext2_chkdq(ip
, change
, cred
, FORCE
|CHOWN
);
1616 (void) ext2_chkiq(ip
, 1, cred
, FORCE
|CHOWN
);
1617 (void) ext2_getinoquota(ip
);
1621 if (ext2_getinoquota(ip
))
1622 panic("ext2_chown: lost quota");
1624 ip
->i_flag
|= IN_CHANGE
;
1625 if (cred
->cr_uid
!= 0 && (ouid
!= uid
|| ogid
!= gid
))
1626 ip
->i_mode
&= ~(ISUID
| ISGID
);
1633 * NB Currently unsupported.
1635 * ext2_mmap(struct vnode *a_vp, int a_fflags, struct ucred *a_cred)
1640 ext2_mmap(struct vop_mmap_args
*ap
)
1646 * whiteout vnode call
1648 * ext2_whiteout(struct vnode *a_dvp, struct componentname *a_cnp, int a_flags)
1652 ext2_whiteout(struct vop_old_whiteout_args
*ap
)
1654 return (EOPNOTSUPP
);
1658 * Return target name of a symbolic link
1660 * ext2_readlink(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred)
1664 ext2_readlink(struct vop_readlink_args
*ap
)
1666 struct vnode
*vp
= ap
->a_vp
;
1667 struct inode
*ip
= VTOI(vp
);
1671 if ((isize
< vp
->v_mount
->mnt_maxsymlinklen
) ||
1672 (ip
->i_din
.di_blocks
== 0)) { /* XXX - for old fastlink support */
1673 uiomove((char *)ip
->i_shortlink
, isize
, ap
->a_uio
);
1676 return (VOP_READ(vp
, ap
->a_uio
, 0, ap
->a_cred
));
1680 * Calculate the logical to physical mapping if not done already,
1681 * then call the device strategy routine.
1683 * In order to be able to swap to a file, the VOP_BMAP operation may not
1684 * deadlock on memory. See ext2_bmap() for details.
1686 * ext2_strategy(struct vnode *a_vp, struct bio *a_bio)
1690 ext2_strategy(struct vop_strategy_args
*ap
)
1692 struct bio
*bio
= ap
->a_bio
;
1694 struct buf
*bp
= bio
->bio_buf
;
1695 struct vnode
*vp
= ap
->a_vp
;
1700 if (vp
->v_type
== VBLK
|| vp
->v_type
== VCHR
)
1701 panic("ext2_strategy: spec");
1702 nbio
= push_bio(bio
);
1703 if (nbio
->bio_offset
== NOOFFSET
) {
1704 error
= VOP_BMAP(vp
, bio
->bio_offset
, &nbio
->bio_offset
,
1705 NULL
, NULL
, bp
->b_cmd
);
1707 bp
->b_error
= error
;
1708 bp
->b_flags
|= B_ERROR
;
1709 /* I/O was never started on nbio, must biodone(bio) */
1713 if (nbio
->bio_offset
== NOOFFSET
)
1716 if (nbio
->bio_offset
== NOOFFSET
) {
1717 /* I/O was never started on nbio, must biodone(bio) */
1721 vn_strategy(ip
->i_devvp
, nbio
);
1726 * Print out the contents of an inode.
1728 * ext2_print(struct vnode *a_vp)
1732 ext2_print(struct vop_print_args
*ap
)
1734 struct vnode
*vp
= ap
->a_vp
;
1735 struct inode
*ip
= VTOI(vp
);
1737 kprintf("tag VT_EXT2FS, ino %lu, on dev %s (%d, %d)",
1738 (u_long
)ip
->i_number
, devtoname(ip
->i_dev
), major(ip
->i_dev
),
1740 if (vp
->v_type
== VFIFO
)
1742 lockmgr_printinfo(&vp
->v_lock
);
1748 * Read wrapper for fifos.
1750 * ext2fifo_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1751 * struct ucred *a_cred)
1755 ext2fifo_read(struct vop_read_args
*ap
)
1762 resid
= uio
->uio_resid
;
1763 error
= VOCALL(&fifo_vnode_vops
, &ap
->a_head
);
1764 ip
= VTOI(ap
->a_vp
);
1765 if ((ap
->a_vp
->v_mount
->mnt_flag
& MNT_NOATIME
) == 0 && ip
!= NULL
&&
1766 (uio
->uio_resid
!= resid
|| (error
== 0 && resid
!= 0)))
1767 VTOI(ap
->a_vp
)->i_flag
|= IN_ACCESS
;
1772 * Write wrapper for fifos.
1774 * ext2fifo_write(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
1775 * struct ucred *a_cred)
1779 ext2fifo_write(struct vop_write_args
*ap
)
1786 resid
= uio
->uio_resid
;
1787 error
= VOCALL(&fifo_vnode_vops
, &ap
->a_head
);
1788 ip
= VTOI(ap
->a_vp
);
1789 if (ip
!= NULL
&& (uio
->uio_resid
!= resid
|| (error
== 0 && resid
!= 0)))
1790 VTOI(ap
->a_vp
)->i_flag
|= IN_CHANGE
| IN_UPDATE
;
1795 * Close wrapper for fifos.
1797 * Update the times on the inode then do device close.
1799 * ext2fifo_close(struct vnode *a_vp, int a_fflag, struct ucred *a_cred)
1803 ext2fifo_close(struct vop_close_args
*ap
)
1805 struct vnode
*vp
= ap
->a_vp
;
1807 if (vp
->v_sysref
.refcnt
> 1)
1809 return (VOCALL(&fifo_vnode_vops
, &ap
->a_head
));
1813 * Kqfilter wrapper for fifos.
1815 * Fall through to ext2 kqfilter routines if needed
1819 ext2fifo_kqfilter(struct vop_kqfilter_args
*ap
)
1823 error
= VOCALL(&fifo_vnode_vops
, &ap
->a_head
);
1825 error
= ext2_kqfilter(ap
);
1830 * Return POSIX pathconf information applicable to ext2 filesystems.
1832 * ext2_pathconf(struct vnode *a_vp, int a_name, int *a_retval)
1836 ext2_pathconf(struct vop_pathconf_args
*ap
)
1838 switch (ap
->a_name
) {
1840 *ap
->a_retval
= LINK_MAX
;
1843 *ap
->a_retval
= NAME_MAX
;
1846 *ap
->a_retval
= PATH_MAX
;
1849 *ap
->a_retval
= PIPE_BUF
;
1851 case _PC_CHOWN_RESTRICTED
:
1864 * Advisory record locking support
1866 * ext2_advlock(struct vnode *a_vp, caddr_t a_id, int a_op, struct flock *a_fl,
1871 ext2_advlock(struct vop_advlock_args
*ap
)
1873 struct inode
*ip
= VTOI(ap
->a_vp
);
1875 return (lf_advlock(ap
, &(ip
->i_lockf
), ip
->i_size
));
1879 * Initialize the vnode associated with a new inode, handle aliased
1883 ext2_vinit(struct mount
*mntp
, struct vnode
**vpp
)
1892 switch(vp
->v_type
= IFTOVT(ip
->i_mode
)) {
1895 vp
->v_ops
= &mntp
->mnt_vn_spec_ops
;
1896 addaliasu(vp
, umajor(ip
->i_rdev
), uminor(ip
->i_rdev
));
1899 vp
->v_ops
= &mntp
->mnt_vn_fifo_ops
;
1903 vinitvmio(vp
, ip
->i_size
, PAGE_SIZE
, -1); /* XXX */
1906 if ((ip
->i_size
>= vp
->v_mount
->mnt_maxsymlinklen
) &&
1907 ip
->i_din
.di_blocks
!= 0
1909 vinitvmio(vp
, ip
->i_size
, PAGE_SIZE
, -1);
1917 if (ip
->i_number
== ROOTINO
)
1918 vp
->v_flag
|= VROOT
;
1920 * Initialize modrev times
1922 getmicrouptime(&tv
);
1923 SETHIGH(ip
->i_modrev
, tv
.tv_sec
);
1924 SETLOW(ip
->i_modrev
, tv
.tv_usec
* 4294);
1929 static struct filterops ext2read_filtops
=
1930 { FILTEROP_ISFD
, NULL
, filt_ext2detach
, filt_ext2read
};
1931 static struct filterops ext2write_filtops
=
1932 { FILTEROP_ISFD
, NULL
, filt_ext2detach
, filt_ext2write
};
1933 static struct filterops ext2vnode_filtops
=
1934 { FILTEROP_ISFD
, NULL
, filt_ext2detach
, filt_ext2vnode
};
1937 * ext2_kqfilter(struct vnode *a_vp, struct knote *a_kn)
1940 ext2_kqfilter(struct vop_kqfilter_args
*ap
)
1942 struct vnode
*vp
= ap
->a_vp
;
1943 struct knote
*kn
= ap
->a_kn
;
1945 switch (kn
->kn_filter
) {
1947 kn
->kn_fop
= &ext2read_filtops
;
1950 kn
->kn_fop
= &ext2write_filtops
;
1953 kn
->kn_fop
= &ext2vnode_filtops
;
1956 return (EOPNOTSUPP
);
1959 kn
->kn_hook
= (caddr_t
)vp
;
1961 /* XXX: kq token actually protects the list */
1962 lwkt_gettoken(&vp
->v_token
);
1963 knote_insert(&vp
->v_pollinfo
.vpi_kqinfo
.ki_note
, kn
);
1964 lwkt_reltoken(&vp
->v_token
);
1970 filt_ext2detach(struct knote
*kn
)
1972 struct vnode
*vp
= (struct vnode
*)kn
->kn_hook
;
1974 lwkt_gettoken(&vp
->v_token
);
1975 knote_remove(&vp
->v_pollinfo
.vpi_kqinfo
.ki_note
, kn
);
1976 lwkt_reltoken(&vp
->v_token
);
1981 filt_ext2read(struct knote
*kn
, long hint
)
1983 struct vnode
*vp
= (struct vnode
*)kn
->kn_hook
;
1984 struct inode
*ip
= VTOI(vp
);
1988 * filesystem is gone, so set the EOF flag and schedule
1989 * the knote for deletion.
1991 if (hint
== NOTE_REVOKE
) {
1992 kn
->kn_flags
|= (EV_EOF
| EV_NODATA
| EV_ONESHOT
);
1995 off
= ip
->i_size
- kn
->kn_fp
->f_offset
;
1996 kn
->kn_data
= (off
< INTPTR_MAX
) ? off
: INTPTR_MAX
;
1997 if (kn
->kn_sfflags
& NOTE_OLDAPI
)
1999 return (kn
->kn_data
!= 0);
2004 filt_ext2write(struct knote
*kn
, long hint
)
2007 * filesystem is gone, so set the EOF flag and schedule
2008 * the knote for deletion.
2010 if (hint
== NOTE_REVOKE
)
2011 kn
->kn_flags
|= (EV_EOF
| EV_NODATA
| EV_ONESHOT
);
2018 filt_ext2vnode(struct knote
*kn
, long hint
)
2020 if (kn
->kn_sfflags
& hint
)
2021 kn
->kn_fflags
|= hint
;
2022 if (hint
== NOTE_REVOKE
) {
2023 kn
->kn_flags
|= (EV_EOF
| EV_NODATA
);
2026 return (kn
->kn_fflags
!= 0);
2029 struct vop_ops ext2_vnode_vops
= {
2030 .vop_default
= vop_defaultop
,
2031 .vop_fsync
= ext2_fsync
,
2032 .vop_read
= ext2_read
,
2033 .vop_reallocblks
= ext2_reallocblks
,
2034 .vop_write
= ext2_write
,
2035 .vop_access
= ext2_access
,
2036 .vop_advlock
= ext2_advlock
,
2037 .vop_bmap
= ext2_bmap
,
2038 .vop_old_lookup
= ext2_lookup
,
2039 .vop_close
= ext2_close
,
2040 .vop_old_create
= ext2_create
,
2041 .vop_getattr
= ext2_getattr
,
2042 .vop_inactive
= ext2_inactive
,
2043 .vop_old_link
= ext2_link
,
2044 .vop_old_mkdir
= ext2_mkdir
,
2045 .vop_old_mknod
= ext2_mknod
,
2046 .vop_mmap
= ext2_mmap
,
2047 .vop_open
= ext2_open
,
2048 .vop_pathconf
= ext2_pathconf
,
2049 .vop_kqfilter
= ext2_kqfilter
,
2050 .vop_print
= ext2_print
,
2051 .vop_readdir
= ext2_readdir
,
2052 .vop_readlink
= ext2_readlink
,
2053 .vop_reclaim
= ext2_reclaim
,
2054 .vop_old_remove
= ext2_remove
,
2055 .vop_old_rename
= ext2_rename
,
2056 .vop_old_rmdir
= ext2_rmdir
,
2057 .vop_setattr
= ext2_setattr
,
2058 .vop_strategy
= ext2_strategy
,
2059 .vop_old_symlink
= ext2_symlink
,
2060 .vop_old_whiteout
= ext2_whiteout
,
2061 .vop_getpages
= vop_stdgetpages
,
2062 .vop_putpages
= vop_stdputpages
2065 struct vop_ops ext2_spec_vops
= {
2066 .vop_default
= vop_defaultop
,
2067 .vop_fsync
= ext2_fsync
,
2068 .vop_access
= ext2_access
,
2069 .vop_close
= ext2_close
,
2070 .vop_getattr
= ext2_getattr
,
2071 .vop_inactive
= ext2_inactive
,
2072 .vop_print
= ext2_print
,
2073 .vop_read
= vop_stdnoread
,
2074 .vop_reclaim
= ext2_reclaim
,
2075 .vop_setattr
= ext2_setattr
,
2076 .vop_write
= vop_stdnowrite
2079 struct vop_ops ext2_fifo_vops
= {
2080 .vop_default
= ext2_vnoperatefifo
,
2081 .vop_fsync
= ext2_fsync
,
2082 .vop_access
= ext2_access
,
2083 .vop_close
= ext2fifo_close
,
2084 .vop_getattr
= ext2_getattr
,
2085 .vop_inactive
= ext2_inactive
,
2086 .vop_kqfilter
= ext2fifo_kqfilter
,
2087 .vop_print
= ext2_print
,
2088 .vop_read
= ext2fifo_read
,
2089 .vop_reclaim
= ext2_reclaim
,
2090 .vop_setattr
= ext2_setattr
,
2091 .vop_write
= ext2fifo_write
2094 VNODEOP_SET(ext2_vnode_vops
);
2095 VNODEOP_SET(ext2_spec_vops
);
2096 VNODEOP_SET(ext2_fifo_vops
);
2102 ext2_vnoperate(struct vop_generic_args
*ap
)
2104 return (VOCALL(&ext2_vnode_vops
, ap
));
2108 * ext2_vnoperatefifo()
2111 ext2_vnoperatefifo(struct vop_generic_args
*ap
)
2113 return (VOCALL(&ext2_fifo_vops
, ap
));