kernel: Remove <sys/n{amei,lookup}.h> from all files that don't need it.
[dragonfly.git] / sys / vfs / hammer2 / hammer2_vnops.c
blob9d4810355a15ddbc31c040798c6f622e1b2609e7
1 /*
2 * Copyright (c) 2011-2018 The DragonFly Project. All rights reserved.
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@dragonflybsd.org>
6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
7 * by Daniel Flores (GSOC 2013 - mentored by Matthew Dillon, compression)
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 * 3. Neither the name of The DragonFly Project nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific, prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
26 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
27 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
28 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
29 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
30 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
31 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
32 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
33 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
37 * Kernel Filesystem interface
39 * NOTE! local ipdata pointers must be reloaded on any modifying operation
40 * to the inode as its underlying chain may have changed.
43 #include <sys/param.h>
44 #include <sys/systm.h>
45 #include <sys/kernel.h>
46 #include <sys/fcntl.h>
47 #include <sys/buf.h>
48 #include <sys/proc.h>
49 #include <sys/mount.h>
50 #include <sys/vnode.h>
51 #include <sys/mountctl.h>
52 #include <sys/dirent.h>
53 #include <sys/uio.h>
54 #include <sys/objcache.h>
55 #include <sys/event.h>
56 #include <sys/file.h>
57 #include <vfs/fifofs/fifo.h>
59 #include "hammer2.h"
61 static int hammer2_read_file(hammer2_inode_t *ip, struct uio *uio,
62 int seqcount);
63 static int hammer2_write_file(hammer2_inode_t *ip, struct uio *uio,
64 int ioflag, int seqcount);
65 static void hammer2_extend_file(hammer2_inode_t *ip, hammer2_key_t nsize);
66 static void hammer2_truncate_file(hammer2_inode_t *ip, hammer2_key_t nsize);
68 struct objcache *cache_xops;
70 static __inline
71 void
72 hammer2_knote(struct vnode *vp, int flags)
74 if (flags)
75 KNOTE(&vp->v_pollinfo.vpi_kqinfo.ki_note, flags);
79 * Last reference to a vnode is going away but it is still cached.
81 static
82 int
83 hammer2_vop_inactive(struct vop_inactive_args *ap)
85 hammer2_inode_t *ip;
86 struct vnode *vp;
88 vp = ap->a_vp;
89 ip = VTOI(vp);
92 * Degenerate case
94 if (ip == NULL) {
95 vrecycle(vp);
96 return (0);
100 * Check for deleted inodes and recycle immediately on the last
101 * release. Be sure to destroy any left-over buffer cache buffers
102 * so we do not waste time trying to flush them.
104 * Note that deleting the file block chains under the inode chain
105 * would just be a waste of energy, so don't do it.
107 * WARNING: nvtruncbuf() can only be safely called without the inode
108 * lock held due to the way our write thread works.
110 if (ip->flags & HAMMER2_INODE_ISUNLINKED) {
111 hammer2_key_t lbase;
112 int nblksize;
115 * Detect updates to the embedded data which may be
116 * synchronized by the strategy code. Simply mark the
117 * inode modified so it gets picked up by our normal flush.
119 nblksize = hammer2_calc_logical(ip, 0, &lbase, NULL);
120 nvtruncbuf(vp, 0, nblksize, 0, 0);
121 vrecycle(vp);
123 return (0);
127 * Reclaim a vnode so that it can be reused; after the inode is
128 * disassociated, the filesystem must manage it alone.
130 static
132 hammer2_vop_reclaim(struct vop_reclaim_args *ap)
134 hammer2_inode_t *ip;
135 hammer2_pfs_t *pmp;
136 struct vnode *vp;
138 vp = ap->a_vp;
139 ip = VTOI(vp);
140 if (ip == NULL) {
141 return(0);
143 pmp = ip->pmp;
146 * The final close of a deleted file or directory marks it for
147 * destruction. The DELETED flag allows the flusher to shortcut
148 * any modified blocks still unflushed (that is, just ignore them).
150 * HAMMER2 usually does not try to optimize the freemap by returning
151 * deleted blocks to it as it does not usually know how many snapshots
152 * might be referencing portions of the file/dir.
154 vp->v_data = NULL;
155 ip->vp = NULL;
158 * NOTE! We do not attempt to flush chains here, flushing is
159 * really fragile and could also deadlock.
161 vclrisdirty(vp);
164 * Modified inodes will already be on SIDEQ or SYNCQ. However,
165 * unlinked-but-open inodes may already have been synced and might
166 * still require deletion-on-reclaim.
168 if ((ip->flags & (HAMMER2_INODE_ISUNLINKED |
169 HAMMER2_INODE_DELETING)) ==
170 HAMMER2_INODE_ISUNLINKED) {
171 hammer2_inode_lock(ip, 0);
172 if ((ip->flags & (HAMMER2_INODE_ISUNLINKED |
173 HAMMER2_INODE_DELETING)) ==
174 HAMMER2_INODE_ISUNLINKED) {
175 atomic_set_int(&ip->flags, HAMMER2_INODE_DELETING);
176 hammer2_inode_delayed_sideq(ip);
178 hammer2_inode_unlock(ip);
182 * Modified inodes will already be on SIDEQ or SYNCQ, no further
183 * action is needed.
185 * We cannot safely synchronize the inode from inside the reclaim
186 * due to potentially deep locks held as-of when the reclaim occurs.
187 * Interactions and potential deadlocks abound. We also can't do it
188 * here without desynchronizing from the related directory entrie(s).
190 hammer2_inode_drop(ip); /* vp ref */
193 * XXX handle background sync when ip dirty, kernel will no longer
194 * notify us regarding this inode because there is no longer a
195 * vnode attached to it.
198 return (0);
202 * Currently this function synchronizes the front-end inode state to the
203 * backend chain topology, then flushes the inode's chain and sub-topology
204 * to backend media. This function does not flush the root topology down to
205 * the inode.
207 static
209 hammer2_vop_fsync(struct vop_fsync_args *ap)
211 hammer2_inode_t *ip;
212 struct vnode *vp;
213 int error1;
214 int error2;
216 vp = ap->a_vp;
217 ip = VTOI(vp);
218 error1 = 0;
220 hammer2_trans_init(ip->pmp, 0);
223 * Flush dirty buffers in the file's logical buffer cache.
224 * It is best to wait for the strategy code to commit the
225 * buffers to the device's backing buffer cache before
226 * then trying to flush the inode.
228 * This should be quick, but certain inode modifications cached
229 * entirely in the hammer2_inode structure may not trigger a
230 * buffer read until the flush so the fsync can wind up also
231 * doing scattered reads.
233 vfsync(vp, ap->a_waitfor, 1, NULL, NULL);
234 bio_track_wait(&vp->v_track_write, 0, 0);
237 * Flush any inode changes
239 hammer2_inode_lock(ip, 0);
240 if (ip->flags & (HAMMER2_INODE_RESIZED|HAMMER2_INODE_MODIFIED))
241 error1 = hammer2_inode_chain_sync(ip);
244 * Flush dirty chains related to the inode.
246 * NOTE! We are not in a flush transaction. The inode remains on
247 * the sideq so the filesystem syncer can synchronize it to
248 * the volume root.
250 error2 = hammer2_inode_chain_flush(ip, HAMMER2_XOP_INODE_STOP);
251 if (error2)
252 error1 = error2;
255 * We may be able to clear the vnode dirty flag. The
256 * hammer2_pfs_moderate() code depends on this usually working.
258 if ((ip->flags & (HAMMER2_INODE_MODIFIED |
259 HAMMER2_INODE_RESIZED |
260 HAMMER2_INODE_DIRTYDATA)) == 0 &&
261 RB_EMPTY(&vp->v_rbdirty_tree) &&
262 !bio_track_active(&vp->v_track_write)) {
263 vclrisdirty(vp);
265 hammer2_inode_unlock(ip);
266 hammer2_trans_done(ip->pmp, 0);
268 return (error1);
272 * No lock needed, just handle ip->update
274 static
276 hammer2_vop_access(struct vop_access_args *ap)
278 hammer2_inode_t *ip = VTOI(ap->a_vp);
279 uid_t uid;
280 gid_t gid;
281 mode_t mode;
282 uint32_t uflags;
283 int error;
284 int update;
286 retry:
287 update = spin_access_start(&ip->cluster_spin);
289 /*hammer2_inode_lock(ip, HAMMER2_RESOLVE_SHARED);*/
290 uid = hammer2_to_unix_xid(&ip->meta.uid);
291 gid = hammer2_to_unix_xid(&ip->meta.gid);
292 mode = ip->meta.mode;
293 uflags = ip->meta.uflags;
294 /*hammer2_inode_unlock(ip);*/
296 if (__predict_false(spin_access_end(&ip->cluster_spin, update)))
297 goto retry;
299 error = vop_helper_access(ap, uid, gid, mode, uflags);
301 return (error);
304 static
306 hammer2_vop_getattr(struct vop_getattr_args *ap)
308 hammer2_pfs_t *pmp;
309 hammer2_inode_t *ip;
310 struct vnode *vp;
311 struct vattr *vap;
312 hammer2_chain_t *chain;
313 int update;
314 int i;
316 vp = ap->a_vp;
317 vap = ap->a_vap;
319 ip = VTOI(vp);
320 pmp = ip->pmp;
322 retry:
323 update = spin_access_start(&ip->cluster_spin);
325 vap->va_fsid = pmp->mp->mnt_stat.f_fsid.val[0];
326 vap->va_fileid = ip->meta.inum;
327 vap->va_mode = ip->meta.mode;
328 vap->va_nlink = ip->meta.nlinks;
329 vap->va_uid = hammer2_to_unix_xid(&ip->meta.uid);
330 vap->va_gid = hammer2_to_unix_xid(&ip->meta.gid);
331 vap->va_rmajor = 0;
332 vap->va_rminor = 0;
333 vap->va_size = ip->meta.size; /* protected by shared lock */
334 vap->va_blocksize = HAMMER2_PBUFSIZE;
335 vap->va_flags = ip->meta.uflags;
336 hammer2_time_to_timespec(ip->meta.ctime, &vap->va_ctime);
337 hammer2_time_to_timespec(ip->meta.mtime, &vap->va_mtime);
338 hammer2_time_to_timespec(ip->meta.mtime, &vap->va_atime);
339 vap->va_gen = 1;
340 vap->va_bytes = 0;
341 if (ip->meta.type == HAMMER2_OBJTYPE_DIRECTORY) {
343 * Can't really calculate directory use sans the files under
344 * it, just assume one block for now.
346 vap->va_bytes += HAMMER2_INODE_BYTES;
347 } else {
348 for (i = 0; i < ip->cluster.nchains; ++i) {
349 if ((chain = ip->cluster.array[i].chain) != NULL) {
350 if (vap->va_bytes <
351 chain->bref.embed.stats.data_count) {
352 vap->va_bytes =
353 chain->bref.embed.stats.data_count;
358 vap->va_type = hammer2_get_vtype(ip->meta.type);
359 vap->va_filerev = 0;
360 vap->va_uid_uuid = ip->meta.uid;
361 vap->va_gid_uuid = ip->meta.gid;
362 vap->va_vaflags = VA_UID_UUID_VALID | VA_GID_UUID_VALID |
363 VA_FSID_UUID_VALID;
365 if (__predict_false(spin_access_end(&ip->cluster_spin, update)))
366 goto retry;
368 return (0);
371 static
373 hammer2_vop_getattr_quick(struct vop_getattr_args *ap)
375 hammer2_pfs_t *pmp;
376 hammer2_inode_t *ip;
377 struct vnode *vp;
378 struct vattr *vap;
379 int update;
381 vp = ap->a_vp;
382 vap = ap->a_vap;
384 ip = VTOI(vp);
385 pmp = ip->pmp;
387 retry:
388 update = spin_access_start(&ip->cluster_spin);
390 vap->va_fsid = pmp->mp->mnt_stat.f_fsid.val[0];
391 vap->va_fileid = ip->meta.inum;
392 vap->va_mode = ip->meta.mode;
393 vap->va_nlink = ip->meta.nlinks;
394 vap->va_uid = hammer2_to_unix_xid(&ip->meta.uid);
395 vap->va_gid = hammer2_to_unix_xid(&ip->meta.gid);
396 vap->va_rmajor = 0;
397 vap->va_rminor = 0;
398 vap->va_size = -1;
399 vap->va_blocksize = HAMMER2_PBUFSIZE;
400 vap->va_flags = ip->meta.uflags;
401 vap->va_type = hammer2_get_vtype(ip->meta.type);
402 vap->va_filerev = 0;
403 vap->va_uid_uuid = ip->meta.uid;
404 vap->va_gid_uuid = ip->meta.gid;
405 vap->va_vaflags = VA_UID_UUID_VALID | VA_GID_UUID_VALID |
406 VA_FSID_UUID_VALID;
408 if (__predict_false(spin_access_end(&ip->cluster_spin, update)))
409 goto retry;
411 return (0);
414 static
416 hammer2_vop_setattr(struct vop_setattr_args *ap)
418 hammer2_inode_t *ip;
419 struct vnode *vp;
420 struct vattr *vap;
421 int error;
422 int kflags = 0;
423 uint64_t ctime;
425 vp = ap->a_vp;
426 vap = ap->a_vap;
427 hammer2_update_time(&ctime);
429 ip = VTOI(vp);
431 if (ip->pmp->ronly)
432 return (EROFS);
435 * Normally disallow setattr if there is no space, unless we
436 * are in emergency mode (might be needed to chflags -R noschg
437 * files prior to removal).
439 if ((ip->pmp->flags & HAMMER2_PMPF_EMERG) == 0 &&
440 hammer2_vfs_enospace(ip, 0, ap->a_cred) > 1) {
441 return (ENOSPC);
444 hammer2_trans_init(ip->pmp, 0);
445 hammer2_inode_lock(ip, 0);
446 error = 0;
448 if (vap->va_flags != VNOVAL) {
449 uint32_t flags;
451 flags = ip->meta.uflags;
452 error = vop_helper_setattr_flags(&flags, vap->va_flags,
453 hammer2_to_unix_xid(&ip->meta.uid),
454 ap->a_cred);
455 if (error == 0) {
456 if (ip->meta.uflags != flags) {
457 hammer2_inode_modify(ip);
458 spin_lock_update(&ip->cluster_spin);
459 ip->meta.uflags = flags;
460 ip->meta.ctime = ctime;
461 spin_unlock_update(&ip->cluster_spin);
462 kflags |= NOTE_ATTRIB;
464 if (ip->meta.uflags & (IMMUTABLE | APPEND)) {
465 error = 0;
466 goto done;
469 goto done;
471 if (ip->meta.uflags & (IMMUTABLE | APPEND)) {
472 error = EPERM;
473 goto done;
475 if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
476 mode_t cur_mode = ip->meta.mode;
477 uid_t cur_uid = hammer2_to_unix_xid(&ip->meta.uid);
478 gid_t cur_gid = hammer2_to_unix_xid(&ip->meta.gid);
479 uuid_t uuid_uid;
480 uuid_t uuid_gid;
482 error = vop_helper_chown(ap->a_vp, vap->va_uid, vap->va_gid,
483 ap->a_cred,
484 &cur_uid, &cur_gid, &cur_mode);
485 if (error == 0) {
486 hammer2_guid_to_uuid(&uuid_uid, cur_uid);
487 hammer2_guid_to_uuid(&uuid_gid, cur_gid);
488 if (bcmp(&uuid_uid, &ip->meta.uid, sizeof(uuid_uid)) ||
489 bcmp(&uuid_gid, &ip->meta.gid, sizeof(uuid_gid)) ||
490 ip->meta.mode != cur_mode
492 hammer2_inode_modify(ip);
493 spin_lock_update(&ip->cluster_spin);
494 ip->meta.uid = uuid_uid;
495 ip->meta.gid = uuid_gid;
496 ip->meta.mode = cur_mode;
497 ip->meta.ctime = ctime;
498 spin_unlock_update(&ip->cluster_spin);
500 kflags |= NOTE_ATTRIB;
505 * Resize the file
507 if (vap->va_size != VNOVAL && ip->meta.size != vap->va_size) {
508 switch(vp->v_type) {
509 case VREG:
510 if (vap->va_size == ip->meta.size)
511 break;
512 if (vap->va_size < ip->meta.size) {
513 hammer2_mtx_ex(&ip->truncate_lock);
514 hammer2_truncate_file(ip, vap->va_size);
515 hammer2_mtx_unlock(&ip->truncate_lock);
516 kflags |= NOTE_WRITE;
517 } else {
518 hammer2_extend_file(ip, vap->va_size);
519 kflags |= NOTE_WRITE | NOTE_EXTEND;
521 hammer2_inode_modify(ip);
522 ip->meta.mtime = ctime;
523 vclrflags(vp, VLASTWRITETS);
524 break;
525 default:
526 error = EINVAL;
527 goto done;
530 #if 0
531 /* atime not supported */
532 if (vap->va_atime.tv_sec != VNOVAL) {
533 hammer2_inode_modify(ip);
534 ip->meta.atime = hammer2_timespec_to_time(&vap->va_atime);
535 kflags |= NOTE_ATTRIB;
537 #endif
538 if (vap->va_mode != (mode_t)VNOVAL) {
539 mode_t cur_mode = ip->meta.mode;
540 uid_t cur_uid = hammer2_to_unix_xid(&ip->meta.uid);
541 gid_t cur_gid = hammer2_to_unix_xid(&ip->meta.gid);
543 error = vop_helper_chmod(ap->a_vp, vap->va_mode, ap->a_cred,
544 cur_uid, cur_gid, &cur_mode);
545 if (error == 0 && ip->meta.mode != cur_mode) {
546 hammer2_inode_modify(ip);
547 spin_lock_update(&ip->cluster_spin);
548 ip->meta.mode = cur_mode;
549 ip->meta.ctime = ctime;
550 spin_unlock_update(&ip->cluster_spin);
551 kflags |= NOTE_ATTRIB;
555 if (vap->va_mtime.tv_sec != VNOVAL) {
556 hammer2_inode_modify(ip);
557 ip->meta.mtime = hammer2_timespec_to_time(&vap->va_mtime);
558 kflags |= NOTE_ATTRIB;
559 vclrflags(vp, VLASTWRITETS);
562 done:
564 * If a truncation occurred we must call chain_sync() now in order
565 * to trim the related data chains, otherwise a later expansion can
566 * cause havoc.
568 * If an extend occured that changed the DIRECTDATA state, we must
569 * call inode_fsync now in order to prepare the inode's indirect
570 * block table.
572 * WARNING! This means we are making an adjustment to the inode's
573 * chain outside of sync/fsync, and not just to inode->meta, which
574 * may result in some consistency issues if a crash were to occur
575 * at just the wrong time.
577 if (ip->flags & HAMMER2_INODE_RESIZED)
578 hammer2_inode_chain_sync(ip);
581 * Cleanup.
583 hammer2_inode_unlock(ip);
584 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ);
585 hammer2_knote(ip->vp, kflags);
587 return (error);
590 static
592 hammer2_vop_readdir(struct vop_readdir_args *ap)
594 hammer2_xop_readdir_t *xop;
595 hammer2_blockref_t bref;
596 hammer2_inode_t *ip;
597 hammer2_tid_t inum;
598 hammer2_key_t lkey;
599 struct uio *uio;
600 off_t *cookies;
601 off_t saveoff;
602 int cookie_index;
603 int ncookies;
604 int error;
605 int eofflag;
606 int r;
608 ip = VTOI(ap->a_vp);
609 uio = ap->a_uio;
610 saveoff = uio->uio_offset;
611 eofflag = 0;
612 error = 0;
615 * Setup cookies directory entry cookies if requested
617 if (ap->a_ncookies) {
618 ncookies = uio->uio_resid / 16 + 1;
619 if (ncookies > 1024)
620 ncookies = 1024;
621 cookies = kmalloc(ncookies * sizeof(off_t), M_TEMP, M_WAITOK);
622 } else {
623 ncookies = -1;
624 cookies = NULL;
626 cookie_index = 0;
628 hammer2_inode_lock(ip, HAMMER2_RESOLVE_SHARED);
631 * Handle artificial entries. To ensure that only positive 64 bit
632 * quantities are returned to userland we always strip off bit 63.
633 * The hash code is designed such that codes 0x0000-0x7FFF are not
634 * used, allowing us to use these codes for articial entries.
636 * Entry 0 is used for '.' and entry 1 is used for '..'. Do not
637 * allow '..' to cross the mount point into (e.g.) the super-root.
639 if (saveoff == 0) {
640 inum = ip->meta.inum & HAMMER2_DIRHASH_USERMSK;
641 r = vop_write_dirent(&error, uio, inum, DT_DIR, 1, ".");
642 if (r)
643 goto done;
644 if (cookies)
645 cookies[cookie_index] = saveoff;
646 ++saveoff;
647 ++cookie_index;
648 if (cookie_index == ncookies)
649 goto done;
652 if (saveoff == 1) {
654 * Be careful with lockorder when accessing ".."
656 * (ip is the current dir. xip is the parent dir).
658 inum = ip->meta.inum & HAMMER2_DIRHASH_USERMSK;
659 if (ip != ip->pmp->iroot)
660 inum = ip->meta.iparent & HAMMER2_DIRHASH_USERMSK;
661 r = vop_write_dirent(&error, uio, inum, DT_DIR, 2, "..");
662 if (r)
663 goto done;
664 if (cookies)
665 cookies[cookie_index] = saveoff;
666 ++saveoff;
667 ++cookie_index;
668 if (cookie_index == ncookies)
669 goto done;
672 lkey = saveoff | HAMMER2_DIRHASH_VISIBLE;
673 if (hammer2_debug & 0x0020)
674 kprintf("readdir: lkey %016jx\n", lkey);
675 if (error)
676 goto done;
679 * Use XOP for cluster scan.
681 * parent is the inode cluster, already locked for us. Don't
682 * double lock shared locks as this will screw up upgrades.
684 xop = hammer2_xop_alloc(ip, 0);
685 xop->lkey = lkey;
686 hammer2_xop_start(&xop->head, &hammer2_readdir_desc);
688 for (;;) {
689 const hammer2_inode_data_t *ripdata;
690 const char *dname;
691 int dtype;
693 error = hammer2_xop_collect(&xop->head, 0);
694 error = hammer2_error_to_errno(error);
695 if (error) {
696 break;
698 if (cookie_index == ncookies)
699 break;
700 if (hammer2_debug & 0x0020)
701 kprintf("cluster chain %p %p\n",
702 xop->head.cluster.focus,
703 (xop->head.cluster.focus ?
704 xop->head.cluster.focus->data : (void *)-1));
705 hammer2_cluster_bref(&xop->head.cluster, &bref);
707 if (bref.type == HAMMER2_BREF_TYPE_INODE) {
708 ripdata = &hammer2_xop_gdata(&xop->head)->ipdata;
709 dtype = hammer2_get_dtype(ripdata->meta.type);
710 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK;
711 r = vop_write_dirent(&error, uio,
712 ripdata->meta.inum &
713 HAMMER2_DIRHASH_USERMSK,
714 dtype,
715 ripdata->meta.name_len,
716 ripdata->filename);
717 hammer2_xop_pdata(&xop->head);
718 if (r)
719 break;
720 if (cookies)
721 cookies[cookie_index] = saveoff;
722 ++cookie_index;
723 } else if (bref.type == HAMMER2_BREF_TYPE_DIRENT) {
724 uint16_t namlen;
726 dtype = hammer2_get_dtype(bref.embed.dirent.type);
727 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK;
728 namlen = bref.embed.dirent.namlen;
729 if (namlen <= sizeof(bref.check.buf)) {
730 dname = bref.check.buf;
731 } else {
732 dname = hammer2_xop_gdata(&xop->head)->buf;
734 r = vop_write_dirent(&error, uio,
735 bref.embed.dirent.inum, dtype,
736 namlen, dname);
737 if (namlen > sizeof(bref.check.buf))
738 hammer2_xop_pdata(&xop->head);
739 if (r)
740 break;
741 if (cookies)
742 cookies[cookie_index] = saveoff;
743 ++cookie_index;
744 } else {
745 /* XXX chain error */
746 kprintf("bad chain type readdir %d\n", bref.type);
749 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
750 if (error == ENOENT) {
751 error = 0;
752 eofflag = 1;
753 saveoff = (hammer2_key_t)-1;
754 } else {
755 saveoff = bref.key & HAMMER2_DIRHASH_USERMSK;
757 done:
758 hammer2_inode_unlock(ip);
759 if (ap->a_eofflag)
760 *ap->a_eofflag = eofflag;
761 if (hammer2_debug & 0x0020)
762 kprintf("readdir: done at %016jx\n", saveoff);
763 uio->uio_offset = saveoff & ~HAMMER2_DIRHASH_VISIBLE;
764 if (error && cookie_index == 0) {
765 if (cookies) {
766 kfree(cookies, M_TEMP);
767 *ap->a_ncookies = 0;
768 *ap->a_cookies = NULL;
770 } else {
771 if (cookies) {
772 *ap->a_ncookies = cookie_index;
773 *ap->a_cookies = cookies;
776 return (error);
780 * hammer2_vop_readlink { vp, uio, cred }
782 static
784 hammer2_vop_readlink(struct vop_readlink_args *ap)
786 struct vnode *vp;
787 hammer2_inode_t *ip;
788 int error;
790 vp = ap->a_vp;
791 if (vp->v_type != VLNK)
792 return (EINVAL);
793 ip = VTOI(vp);
795 error = hammer2_read_file(ip, ap->a_uio, 0);
796 return (error);
799 static
801 hammer2_vop_read(struct vop_read_args *ap)
803 struct vnode *vp;
804 hammer2_inode_t *ip;
805 struct uio *uio;
806 int error;
807 int seqcount;
808 int bigread;
811 * Read operations supported on this vnode?
813 vp = ap->a_vp;
814 if (vp->v_type != VREG)
815 return (EINVAL);
818 * Misc
820 ip = VTOI(vp);
821 uio = ap->a_uio;
822 error = 0;
824 seqcount = ap->a_ioflag >> IO_SEQSHIFT;
825 bigread = (uio->uio_resid > 100 * 1024 * 1024);
827 error = hammer2_read_file(ip, uio, seqcount);
828 return (error);
831 static
833 hammer2_vop_write(struct vop_write_args *ap)
835 hammer2_inode_t *ip;
836 thread_t td;
837 struct vnode *vp;
838 struct uio *uio;
839 int error;
840 int seqcount;
841 int ioflag;
844 * Read operations supported on this vnode?
846 vp = ap->a_vp;
847 if (vp->v_type != VREG)
848 return (EINVAL);
851 * Misc
853 ip = VTOI(vp);
854 ioflag = ap->a_ioflag;
855 uio = ap->a_uio;
856 error = 0;
857 if (ip->pmp->ronly || (ip->pmp->flags & HAMMER2_PMPF_EMERG))
858 return (EROFS);
859 switch (hammer2_vfs_enospace(ip, uio->uio_resid, ap->a_cred)) {
860 case 2:
861 return (ENOSPC);
862 case 1:
863 ioflag |= IO_DIRECT; /* semi-synchronous */
864 /* fall through */
865 default:
866 break;
869 seqcount = ioflag >> IO_SEQSHIFT;
872 * Check resource limit
874 if (uio->uio_resid > 0 && (td = uio->uio_td) != NULL && td->td_proc &&
875 uio->uio_offset + uio->uio_resid >
876 td->td_proc->p_rlimit[RLIMIT_FSIZE].rlim_cur) {
877 lwpsignal(td->td_proc, td->td_lwp, SIGXFSZ);
878 return (EFBIG);
882 * The transaction interlocks against flush initiations
883 * (note: but will run concurrently with the actual flush).
885 * To avoid deadlocking against the VM system, we must flag any
886 * transaction related to the buffer cache or other direct
887 * VM page manipulation.
889 if (uio->uio_segflg == UIO_NOCOPY) {
890 hammer2_trans_init(ip->pmp, HAMMER2_TRANS_BUFCACHE);
891 } else {
892 hammer2_trans_init(ip->pmp, 0);
894 error = hammer2_write_file(ip, uio, ioflag, seqcount);
895 if (uio->uio_segflg == UIO_NOCOPY)
896 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_BUFCACHE |
897 HAMMER2_TRANS_SIDEQ);
898 else
899 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ);
901 return (error);
905 * Perform read operations on a file or symlink given an UNLOCKED
906 * inode and uio.
908 * The passed ip is not locked.
910 static
912 hammer2_read_file(hammer2_inode_t *ip, struct uio *uio, int seqcount)
914 hammer2_off_t size;
915 struct buf *bp;
916 int error;
918 error = 0;
921 * UIO read loop.
923 * WARNING! Assumes that the kernel interlocks size changes at the
924 * vnode level.
926 hammer2_mtx_sh(&ip->lock);
927 hammer2_mtx_sh(&ip->truncate_lock);
928 size = ip->meta.size;
929 hammer2_mtx_unlock(&ip->lock);
931 while (uio->uio_resid > 0 && uio->uio_offset < size) {
932 hammer2_key_t lbase;
933 hammer2_key_t leof;
934 int lblksize;
935 int loff;
936 int n;
938 lblksize = hammer2_calc_logical(ip, uio->uio_offset,
939 &lbase, &leof);
941 #if 1
942 bp = NULL;
943 error = cluster_readx(ip->vp, leof, lbase, lblksize,
944 B_NOTMETA | B_KVABIO,
945 uio->uio_resid,
946 seqcount * MAXBSIZE,
947 &bp);
948 #else
949 if (uio->uio_segflg == UIO_NOCOPY) {
950 bp = getblk(ip->vp, lbase, lblksize,
951 GETBLK_BHEAVY | GETBLK_KVABIO, 0);
952 if (bp->b_flags & B_CACHE) {
953 int i;
954 int j = 0;
955 if (bp->b_xio.xio_npages != 16)
956 kprintf("NPAGES BAD\n");
957 for (i = 0; i < bp->b_xio.xio_npages; ++i) {
958 vm_page_t m;
959 m = bp->b_xio.xio_pages[i];
960 if (m == NULL || m->valid == 0) {
961 kprintf("bp %016jx %016jx pg %d inv",
962 lbase, leof, i);
963 if (m)
964 kprintf("m->object %p/%p", m->object, ip->vp->v_object);
965 kprintf("\n");
966 j = 1;
969 if (j)
970 kprintf("b_flags %08x, b_error %d\n", bp->b_flags, bp->b_error);
972 bqrelse(bp);
974 error = bread_kvabio(ip->vp, lbase, lblksize, &bp);
975 #endif
976 if (error) {
977 brelse(bp);
978 break;
980 bkvasync(bp);
981 loff = (int)(uio->uio_offset - lbase);
982 n = lblksize - loff;
983 if (n > uio->uio_resid)
984 n = uio->uio_resid;
985 if (n > size - uio->uio_offset)
986 n = (int)(size - uio->uio_offset);
987 bp->b_flags |= B_AGE;
988 uiomovebp(bp, (char *)bp->b_data + loff, n, uio);
989 bqrelse(bp);
991 hammer2_mtx_unlock(&ip->truncate_lock);
993 return (error);
997 * Write to the file represented by the inode via the logical buffer cache.
998 * The inode may represent a regular file or a symlink.
1000 * The inode must not be locked.
1002 static
1004 hammer2_write_file(hammer2_inode_t *ip, struct uio *uio,
1005 int ioflag, int seqcount)
1007 hammer2_key_t old_eof;
1008 hammer2_key_t new_eof;
1009 struct buf *bp;
1010 int kflags;
1011 int error;
1012 int modified;
1015 * Setup if append
1017 * WARNING! Assumes that the kernel interlocks size changes at the
1018 * vnode level.
1020 hammer2_mtx_ex(&ip->lock);
1021 hammer2_mtx_sh(&ip->truncate_lock);
1022 if (ioflag & IO_APPEND)
1023 uio->uio_offset = ip->meta.size;
1024 old_eof = ip->meta.size;
1027 * Extend the file if necessary. If the write fails at some point
1028 * we will truncate it back down to cover as much as we were able
1029 * to write.
1031 * Doing this now makes it easier to calculate buffer sizes in
1032 * the loop.
1034 kflags = 0;
1035 error = 0;
1036 modified = 0;
1038 if (uio->uio_offset + uio->uio_resid > old_eof) {
1039 new_eof = uio->uio_offset + uio->uio_resid;
1040 modified = 1;
1041 hammer2_extend_file(ip, new_eof);
1042 kflags |= NOTE_EXTEND;
1043 } else {
1044 new_eof = old_eof;
1046 hammer2_mtx_unlock(&ip->lock);
1049 * UIO write loop
1051 while (uio->uio_resid > 0) {
1052 hammer2_key_t lbase;
1053 int trivial;
1054 int endofblk;
1055 int lblksize;
1056 int loff;
1057 int n;
1060 * Don't allow the buffer build to blow out the buffer
1061 * cache.
1063 if ((ioflag & IO_RECURSE) == 0)
1064 bwillwrite(HAMMER2_PBUFSIZE);
1067 * This nominally tells us how much we can cluster and
1068 * what the logical buffer size needs to be. Currently
1069 * we don't try to cluster the write and just handle one
1070 * block at a time.
1072 lblksize = hammer2_calc_logical(ip, uio->uio_offset,
1073 &lbase, NULL);
1074 loff = (int)(uio->uio_offset - lbase);
1076 KKASSERT(lblksize <= MAXBSIZE);
1079 * Calculate bytes to copy this transfer and whether the
1080 * copy completely covers the buffer or not.
1082 trivial = 0;
1083 n = lblksize - loff;
1084 if (n > uio->uio_resid) {
1085 n = uio->uio_resid;
1086 if (loff == lbase && uio->uio_offset + n == new_eof)
1087 trivial = 1;
1088 endofblk = 0;
1089 } else {
1090 if (loff == 0)
1091 trivial = 1;
1092 endofblk = 1;
1094 if (lbase >= new_eof)
1095 trivial = 1;
1098 * Get the buffer
1100 if (uio->uio_segflg == UIO_NOCOPY) {
1102 * Issuing a write with the same data backing the
1103 * buffer. Instantiate the buffer to collect the
1104 * backing vm pages, then read-in any missing bits.
1106 * This case is used by vop_stdputpages().
1108 bp = getblk(ip->vp, lbase, lblksize,
1109 GETBLK_BHEAVY | GETBLK_KVABIO, 0);
1110 if ((bp->b_flags & B_CACHE) == 0) {
1111 bqrelse(bp);
1112 error = bread_kvabio(ip->vp, lbase,
1113 lblksize, &bp);
1115 } else if (trivial) {
1117 * Even though we are entirely overwriting the buffer
1118 * we may still have to zero it out to avoid a
1119 * mmap/write visibility issue.
1121 bp = getblk(ip->vp, lbase, lblksize,
1122 GETBLK_BHEAVY | GETBLK_KVABIO, 0);
1123 if ((bp->b_flags & B_CACHE) == 0)
1124 vfs_bio_clrbuf(bp);
1125 } else {
1127 * Partial overwrite, read in any missing bits then
1128 * replace the portion being written.
1130 * (The strategy code will detect zero-fill physical
1131 * blocks for this case).
1133 error = bread_kvabio(ip->vp, lbase, lblksize, &bp);
1134 if (error == 0)
1135 bheavy(bp);
1138 if (error) {
1139 brelse(bp);
1140 break;
1144 * Ok, copy the data in
1146 bkvasync(bp);
1147 error = uiomovebp(bp, bp->b_data + loff, n, uio);
1148 kflags |= NOTE_WRITE;
1149 modified = 1;
1150 if (error) {
1151 brelse(bp);
1152 break;
1156 * WARNING: Pageout daemon will issue UIO_NOCOPY writes
1157 * with IO_SYNC or IO_ASYNC set. These writes
1158 * must be handled as the pageout daemon expects.
1160 * NOTE! H2 relies on cluster_write() here because it
1161 * cannot preallocate disk blocks at the logical
1162 * level due to not knowing what the compression
1163 * size will be at this time.
1165 * We must use cluster_write() here and we depend
1166 * on the write-behind feature to flush buffers
1167 * appropriately. If we let the buffer daemons do
1168 * it the block allocations will be all over the
1169 * map.
1171 if (ioflag & IO_SYNC) {
1172 bwrite(bp);
1173 } else if ((ioflag & IO_DIRECT) && endofblk) {
1174 bawrite(bp);
1175 } else if (ioflag & IO_ASYNC) {
1176 bawrite(bp);
1177 } else if (ip->vp->v_mount->mnt_flag & MNT_NOCLUSTERW) {
1178 bdwrite(bp);
1179 } else {
1180 #if 1
1181 bp->b_flags |= B_CLUSTEROK;
1182 cluster_write(bp, new_eof, lblksize, seqcount);
1183 #else
1184 bp->b_flags |= B_CLUSTEROK;
1185 bdwrite(bp);
1186 #endif
1191 * Cleanup. If we extended the file EOF but failed to write through
1192 * the entire write is a failure and we have to back-up.
1194 if (error && new_eof != old_eof) {
1195 hammer2_mtx_unlock(&ip->truncate_lock);
1196 hammer2_mtx_ex(&ip->lock); /* note lock order */
1197 hammer2_mtx_ex(&ip->truncate_lock); /* note lock order */
1198 hammer2_truncate_file(ip, old_eof);
1199 if (ip->flags & HAMMER2_INODE_MODIFIED)
1200 hammer2_inode_chain_sync(ip);
1201 hammer2_mtx_unlock(&ip->lock);
1202 } else if (modified) {
1203 struct vnode *vp = ip->vp;
1205 hammer2_mtx_ex(&ip->lock);
1206 hammer2_inode_modify(ip);
1207 if (uio->uio_segflg == UIO_NOCOPY) {
1208 if (vp->v_flag & VLASTWRITETS) {
1209 ip->meta.mtime =
1210 (unsigned long)vp->v_lastwrite_ts.tv_sec *
1211 1000000 +
1212 vp->v_lastwrite_ts.tv_nsec / 1000;
1214 } else {
1215 hammer2_update_time(&ip->meta.mtime);
1216 vclrflags(vp, VLASTWRITETS);
1219 #if 0
1221 * REMOVED - handled by hammer2_extend_file(). Do not issue
1222 * a chain_sync() outside of a sync/fsync except for DIRECTDATA
1223 * state changes.
1225 * Under normal conditions we only issue a chain_sync if
1226 * the inode's DIRECTDATA state changed.
1228 if (ip->flags & HAMMER2_INODE_RESIZED)
1229 hammer2_inode_chain_sync(ip);
1230 #endif
1231 hammer2_mtx_unlock(&ip->lock);
1232 hammer2_knote(ip->vp, kflags);
1234 hammer2_trans_assert_strategy(ip->pmp);
1235 hammer2_mtx_unlock(&ip->truncate_lock);
1237 return error;
1241 * Truncate the size of a file. The inode must be locked.
1243 * We must unconditionally set HAMMER2_INODE_RESIZED to properly
1244 * ensure that any on-media data beyond the new file EOF has been destroyed.
1246 * WARNING: nvtruncbuf() can only be safely called without the inode lock
1247 * held due to the way our write thread works. If the truncation
1248 * occurs in the middle of a buffer, nvtruncbuf() is responsible
1249 * for dirtying that buffer and zeroing out trailing bytes.
1251 * WARNING! Assumes that the kernel interlocks size changes at the
1252 * vnode level.
1254 * WARNING! Caller assumes responsibility for removing dead blocks
1255 * if INODE_RESIZED is set.
1257 static
1258 void
1259 hammer2_truncate_file(hammer2_inode_t *ip, hammer2_key_t nsize)
1261 hammer2_key_t lbase;
1262 int nblksize;
1264 hammer2_mtx_unlock(&ip->lock);
1265 if (ip->vp) {
1266 nblksize = hammer2_calc_logical(ip, nsize, &lbase, NULL);
1267 nvtruncbuf(ip->vp, nsize,
1268 nblksize, (int)nsize & (nblksize - 1),
1271 hammer2_mtx_ex(&ip->lock);
1272 KKASSERT((ip->flags & HAMMER2_INODE_RESIZED) == 0);
1273 ip->osize = ip->meta.size;
1274 ip->meta.size = nsize;
1275 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED);
1276 hammer2_inode_modify(ip);
1280 * Extend the size of a file. The inode must be locked.
1282 * Even though the file size is changing, we do not have to set the
1283 * INODE_RESIZED bit unless the file size crosses the EMBEDDED_BYTES
1284 * boundary. When this occurs a hammer2_inode_chain_sync() is required
1285 * to prepare the inode cluster's indirect block table, otherwise
1286 * async execution of the strategy code will implode on us.
1288 * WARNING! Assumes that the kernel interlocks size changes at the
1289 * vnode level.
1291 * WARNING! Caller assumes responsibility for transitioning out
1292 * of the inode DIRECTDATA mode if INODE_RESIZED is set.
1294 static
1295 void
1296 hammer2_extend_file(hammer2_inode_t *ip, hammer2_key_t nsize)
1298 hammer2_key_t lbase;
1299 hammer2_key_t osize;
1300 int oblksize;
1301 int nblksize;
1302 int error;
1304 KKASSERT((ip->flags & HAMMER2_INODE_RESIZED) == 0);
1305 hammer2_inode_modify(ip);
1306 osize = ip->meta.size;
1307 ip->osize = osize;
1308 ip->meta.size = nsize;
1311 * We must issue a chain_sync() when the DIRECTDATA state changes
1312 * to prevent confusion between the flush code and the in-memory
1313 * state. This is not perfect because we are doing it outside of
1314 * a sync/fsync operation, so it might not be fully synchronized
1315 * with the meta-data topology flush.
1317 * We must retain and re-dirty the buffer cache buffer containing
1318 * the direct data so it can be written to a real block. It should
1319 * not be possible for a bread error to occur since the original data
1320 * is extracted from the inode structure directly.
1322 if (osize <= HAMMER2_EMBEDDED_BYTES && nsize > HAMMER2_EMBEDDED_BYTES) {
1323 if (osize) {
1324 struct buf *bp;
1326 oblksize = hammer2_calc_logical(ip, 0, NULL, NULL);
1327 error = bread_kvabio(ip->vp, 0, oblksize, &bp);
1328 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED);
1329 hammer2_inode_chain_sync(ip);
1330 if (error == 0) {
1331 bheavy(bp);
1332 bdwrite(bp);
1333 } else {
1334 brelse(bp);
1336 } else {
1337 atomic_set_int(&ip->flags, HAMMER2_INODE_RESIZED);
1338 hammer2_inode_chain_sync(ip);
1341 hammer2_mtx_unlock(&ip->lock);
1342 if (ip->vp) {
1343 oblksize = hammer2_calc_logical(ip, osize, &lbase, NULL);
1344 nblksize = hammer2_calc_logical(ip, nsize, &lbase, NULL);
1345 nvextendbuf(ip->vp,
1346 osize, nsize,
1347 oblksize, nblksize,
1348 -1, -1, 0);
1350 hammer2_mtx_ex(&ip->lock);
1353 static
1355 hammer2_vop_nresolve(struct vop_nresolve_args *ap)
1357 hammer2_xop_nresolve_t *xop;
1358 hammer2_inode_t *ip;
1359 hammer2_inode_t *dip;
1360 struct namecache *ncp;
1361 struct vnode *vp;
1362 int error;
1364 dip = VTOI(ap->a_dvp);
1365 xop = hammer2_xop_alloc(dip, 0);
1367 ncp = ap->a_nch->ncp;
1368 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen);
1371 * Note: In DragonFly the kernel handles '.' and '..'.
1373 hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);
1374 hammer2_xop_start(&xop->head, &hammer2_nresolve_desc);
1376 error = hammer2_xop_collect(&xop->head, 0);
1377 error = hammer2_error_to_errno(error);
1378 if (error) {
1379 ip = NULL;
1380 } else {
1381 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1);
1383 hammer2_inode_unlock(dip);
1386 * Acquire the related vnode
1388 * NOTE: For error processing, only ENOENT resolves the namecache
1389 * entry to NULL, otherwise we just return the error and
1390 * leave the namecache unresolved.
1392 * NOTE: multiple hammer2_inode structures can be aliased to the
1393 * same chain element, for example for hardlinks. This
1394 * use case does not 'reattach' inode associations that
1395 * might already exist, but always allocates a new one.
1397 * WARNING: inode structure is locked exclusively via inode_get
1398 * but chain was locked shared. inode_unlock()
1399 * will handle it properly.
1401 if (ip) {
1402 vp = hammer2_igetv(ip, &error); /* error set to UNIX error */
1403 if (error == 0) {
1404 vn_unlock(vp);
1405 cache_setvp(ap->a_nch, vp);
1406 } else if (error == ENOENT) {
1407 cache_setvp(ap->a_nch, NULL);
1409 hammer2_inode_unlock(ip);
1412 * The vp should not be released until after we've disposed
1413 * of our locks, because it might cause vop_inactive() to
1414 * be called.
1416 if (vp)
1417 vrele(vp);
1418 } else {
1419 error = ENOENT;
1420 cache_setvp(ap->a_nch, NULL);
1422 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
1423 KASSERT(error || ap->a_nch->ncp->nc_vp != NULL,
1424 ("resolve error %d/%p ap %p\n",
1425 error, ap->a_nch->ncp->nc_vp, ap));
1427 return error;
1430 static
1432 hammer2_vop_nlookupdotdot(struct vop_nlookupdotdot_args *ap)
1434 hammer2_inode_t *dip;
1435 hammer2_tid_t inum;
1436 int error;
1438 dip = VTOI(ap->a_dvp);
1439 inum = dip->meta.iparent;
1440 *ap->a_vpp = NULL;
1442 if (inum) {
1443 error = hammer2_vfs_vget(ap->a_dvp->v_mount, NULL,
1444 inum, ap->a_vpp);
1445 } else {
1446 error = ENOENT;
1448 return error;
1451 static
1453 hammer2_vop_nmkdir(struct vop_nmkdir_args *ap)
1455 hammer2_inode_t *dip;
1456 hammer2_inode_t *nip;
1457 struct namecache *ncp;
1458 const uint8_t *name;
1459 size_t name_len;
1460 hammer2_tid_t inum;
1461 int error;
1463 dip = VTOI(ap->a_dvp);
1464 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG))
1465 return (EROFS);
1466 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
1467 return (ENOSPC);
1469 ncp = ap->a_nch->ncp;
1470 name = ncp->nc_name;
1471 name_len = ncp->nc_nlen;
1473 hammer2_trans_init(dip->pmp, 0);
1475 inum = hammer2_trans_newinum(dip->pmp);
1478 * Create the actual inode as a hidden file in the iroot, then
1479 * create the directory entry. The creation of the actual inode
1480 * sets its nlinks to 1 which is the value we desire.
1482 * dip must be locked before nip to avoid deadlock.
1484 hammer2_inode_lock(dip, 0);
1485 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred,
1486 inum, &error);
1487 if (error) {
1488 error = hammer2_error_to_errno(error);
1489 } else {
1490 error = hammer2_dirent_create(dip, name, name_len,
1491 nip->meta.inum, nip->meta.type);
1492 /* returns UNIX error code */
1494 if (error) {
1495 if (nip) {
1496 hammer2_inode_unlink_finisher(nip, 0);
1497 hammer2_inode_unlock(nip);
1498 nip = NULL;
1500 *ap->a_vpp = NULL;
1501 } else {
1503 * inode_depend() must occur before the igetv() because
1504 * the igetv() can temporarily release the inode lock.
1506 hammer2_inode_depend(dip, nip); /* before igetv */
1507 *ap->a_vpp = hammer2_igetv(nip, &error);
1508 hammer2_inode_unlock(nip);
1512 * Update dip's mtime
1514 * We can use a shared inode lock and allow the meta.mtime update
1515 * SMP race. hammer2_inode_modify() is MPSAFE w/a shared lock.
1517 if (error == 0) {
1518 uint64_t mtime;
1520 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
1521 hammer2_update_time(&mtime);
1522 hammer2_inode_modify(dip);
1523 dip->meta.mtime = mtime;
1524 /*hammer2_inode_unlock(dip);*/
1526 hammer2_inode_unlock(dip);
1528 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
1530 if (error == 0) {
1531 cache_setunresolved(ap->a_nch);
1532 cache_setvp(ap->a_nch, *ap->a_vpp);
1533 hammer2_knote(ap->a_dvp, NOTE_WRITE | NOTE_LINK);
1535 return error;
1538 static
1540 hammer2_vop_open(struct vop_open_args *ap)
1542 return vop_stdopen(ap);
1546 * hammer2_vop_advlock { vp, id, op, fl, flags }
1548 static
1550 hammer2_vop_advlock(struct vop_advlock_args *ap)
1552 hammer2_inode_t *ip = VTOI(ap->a_vp);
1553 hammer2_off_t size;
1555 size = ip->meta.size;
1556 return (lf_advlock(ap, &ip->advlock, size));
1559 static
1561 hammer2_vop_close(struct vop_close_args *ap)
1563 return vop_stdclose(ap);
1567 * hammer2_vop_nlink { nch, dvp, vp, cred }
1569 * Create a hardlink from (vp) to {dvp, nch}.
1571 static
1573 hammer2_vop_nlink(struct vop_nlink_args *ap)
1575 hammer2_inode_t *tdip; /* target directory to create link in */
1576 hammer2_inode_t *ip; /* inode we are hardlinking to */
1577 struct namecache *ncp;
1578 const uint8_t *name;
1579 size_t name_len;
1580 int error;
1582 if (ap->a_dvp->v_mount != ap->a_vp->v_mount)
1583 return(EXDEV);
1585 tdip = VTOI(ap->a_dvp);
1586 if (tdip->pmp->ronly || (tdip->pmp->flags & HAMMER2_PMPF_EMERG))
1587 return (EROFS);
1588 if (hammer2_vfs_enospace(tdip, 0, ap->a_cred) > 1)
1589 return (ENOSPC);
1591 ncp = ap->a_nch->ncp;
1592 name = ncp->nc_name;
1593 name_len = ncp->nc_nlen;
1596 * ip represents the file being hardlinked. The file could be a
1597 * normal file or a hardlink target if it has already been hardlinked.
1598 * (with the new semantics, it will almost always be a hardlink
1599 * target).
1601 * Bump nlinks and potentially also create or move the hardlink
1602 * target in the parent directory common to (ip) and (tdip). The
1603 * consolidation code can modify ip->cluster. The returned cluster
1604 * is locked.
1606 ip = VTOI(ap->a_vp);
1607 KASSERT(ip->pmp, ("ip->pmp is NULL %p %p", ip, ip->pmp));
1608 hammer2_trans_init(ip->pmp, 0);
1611 * Target should be an indexed inode or there's no way we will ever
1612 * be able to find it!
1614 KKASSERT((ip->meta.name_key & HAMMER2_DIRHASH_VISIBLE) == 0);
1616 error = 0;
1619 * Can return NULL and error == EXDEV if the common parent
1620 * crosses a directory with the xlink flag set.
1622 hammer2_inode_lock4(tdip, ip, NULL, NULL);
1625 * Create the directory entry and bump nlinks.
1627 if (error == 0) {
1628 error = hammer2_dirent_create(tdip, name, name_len,
1629 ip->meta.inum, ip->meta.type);
1630 hammer2_inode_modify(ip);
1631 ++ip->meta.nlinks;
1633 if (error == 0) {
1635 * Update dip's mtime
1637 uint64_t mtime;
1639 hammer2_update_time(&mtime);
1640 hammer2_inode_modify(tdip);
1641 tdip->meta.mtime = mtime;
1643 cache_setunresolved(ap->a_nch);
1644 cache_setvp(ap->a_nch, ap->a_vp);
1646 hammer2_inode_unlock(ip);
1647 hammer2_inode_unlock(tdip);
1649 hammer2_trans_done(ip->pmp, HAMMER2_TRANS_SIDEQ);
1650 hammer2_knote(ap->a_vp, NOTE_LINK);
1651 hammer2_knote(ap->a_dvp, NOTE_WRITE);
1653 return error;
1657 * hammer2_vop_ncreate { nch, dvp, vpp, cred, vap }
1659 * The operating system has already ensured that the directory entry
1660 * does not exist and done all appropriate namespace locking.
1662 static
1664 hammer2_vop_ncreate(struct vop_ncreate_args *ap)
1666 hammer2_inode_t *dip;
1667 hammer2_inode_t *nip;
1668 struct namecache *ncp;
1669 const uint8_t *name;
1670 size_t name_len;
1671 hammer2_tid_t inum;
1672 int error;
1674 dip = VTOI(ap->a_dvp);
1675 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG))
1676 return (EROFS);
1677 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
1678 return (ENOSPC);
1680 ncp = ap->a_nch->ncp;
1681 name = ncp->nc_name;
1682 name_len = ncp->nc_nlen;
1683 hammer2_trans_init(dip->pmp, 0);
1685 inum = hammer2_trans_newinum(dip->pmp);
1688 * Create the actual inode as a hidden file in the iroot, then
1689 * create the directory entry. The creation of the actual inode
1690 * sets its nlinks to 1 which is the value we desire.
1692 * dip must be locked before nip to avoid deadlock.
1694 hammer2_inode_lock(dip, 0);
1695 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred,
1696 inum, &error);
1698 if (error) {
1699 error = hammer2_error_to_errno(error);
1700 } else {
1701 error = hammer2_dirent_create(dip, name, name_len,
1702 nip->meta.inum, nip->meta.type);
1704 if (error) {
1705 if (nip) {
1706 hammer2_inode_unlink_finisher(nip, 0);
1707 hammer2_inode_unlock(nip);
1708 nip = NULL;
1710 *ap->a_vpp = NULL;
1711 } else {
1712 hammer2_inode_depend(dip, nip); /* before igetv */
1713 *ap->a_vpp = hammer2_igetv(nip, &error);
1714 hammer2_inode_unlock(nip);
1718 * Update dip's mtime
1720 if (error == 0) {
1721 uint64_t mtime;
1723 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
1724 hammer2_update_time(&mtime);
1725 hammer2_inode_modify(dip);
1726 dip->meta.mtime = mtime;
1727 /*hammer2_inode_unlock(dip);*/
1729 hammer2_inode_unlock(dip);
1731 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
1733 if (error == 0) {
1734 cache_setunresolved(ap->a_nch);
1735 cache_setvp(ap->a_nch, *ap->a_vpp);
1736 hammer2_knote(ap->a_dvp, NOTE_WRITE);
1738 return error;
1742 * Make a device node (typically a fifo)
1744 static
1746 hammer2_vop_nmknod(struct vop_nmknod_args *ap)
1748 hammer2_inode_t *dip;
1749 hammer2_inode_t *nip;
1750 struct namecache *ncp;
1751 const uint8_t *name;
1752 size_t name_len;
1753 hammer2_tid_t inum;
1754 int error;
1756 dip = VTOI(ap->a_dvp);
1757 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG))
1758 return (EROFS);
1759 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
1760 return (ENOSPC);
1762 ncp = ap->a_nch->ncp;
1763 name = ncp->nc_name;
1764 name_len = ncp->nc_nlen;
1765 hammer2_trans_init(dip->pmp, 0);
1768 * Create the device inode and then create the directory entry.
1770 * dip must be locked before nip to avoid deadlock.
1772 inum = hammer2_trans_newinum(dip->pmp);
1774 hammer2_inode_lock(dip, 0);
1775 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred,
1776 inum, &error);
1777 if (error == 0) {
1778 error = hammer2_dirent_create(dip, name, name_len,
1779 nip->meta.inum, nip->meta.type);
1781 if (error) {
1782 if (nip) {
1783 hammer2_inode_unlink_finisher(nip, 0);
1784 hammer2_inode_unlock(nip);
1785 nip = NULL;
1787 *ap->a_vpp = NULL;
1788 } else {
1789 hammer2_inode_depend(dip, nip); /* before igetv */
1790 *ap->a_vpp = hammer2_igetv(nip, &error);
1791 hammer2_inode_unlock(nip);
1795 * Update dip's mtime
1797 if (error == 0) {
1798 uint64_t mtime;
1800 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
1801 hammer2_update_time(&mtime);
1802 hammer2_inode_modify(dip);
1803 dip->meta.mtime = mtime;
1804 /*hammer2_inode_unlock(dip);*/
1806 hammer2_inode_unlock(dip);
1808 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
1810 if (error == 0) {
1811 cache_setunresolved(ap->a_nch);
1812 cache_setvp(ap->a_nch, *ap->a_vpp);
1813 hammer2_knote(ap->a_dvp, NOTE_WRITE);
1815 return error;
1819 * hammer2_vop_nsymlink { nch, dvp, vpp, cred, vap, target }
1821 static
1823 hammer2_vop_nsymlink(struct vop_nsymlink_args *ap)
1825 hammer2_inode_t *dip;
1826 hammer2_inode_t *nip;
1827 struct namecache *ncp;
1828 const uint8_t *name;
1829 size_t name_len;
1830 hammer2_tid_t inum;
1831 int error;
1833 dip = VTOI(ap->a_dvp);
1834 if (dip->pmp->ronly || (dip->pmp->flags & HAMMER2_PMPF_EMERG))
1835 return (EROFS);
1836 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
1837 return (ENOSPC);
1839 ncp = ap->a_nch->ncp;
1840 name = ncp->nc_name;
1841 name_len = ncp->nc_nlen;
1842 hammer2_trans_init(dip->pmp, 0);
1844 ap->a_vap->va_type = VLNK; /* enforce type */
1847 * Create the softlink as an inode and then create the directory
1848 * entry.
1850 * dip must be locked before nip to avoid deadlock.
1852 inum = hammer2_trans_newinum(dip->pmp);
1854 hammer2_inode_lock(dip, 0);
1855 nip = hammer2_inode_create_normal(dip, ap->a_vap, ap->a_cred,
1856 inum, &error);
1857 if (error == 0) {
1858 error = hammer2_dirent_create(dip, name, name_len,
1859 nip->meta.inum, nip->meta.type);
1861 if (error) {
1862 if (nip) {
1863 hammer2_inode_unlink_finisher(nip, 0);
1864 hammer2_inode_unlock(nip);
1865 nip = NULL;
1867 *ap->a_vpp = NULL;
1868 hammer2_inode_unlock(dip);
1869 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
1870 return error;
1872 hammer2_inode_depend(dip, nip); /* before igetv */
1873 *ap->a_vpp = hammer2_igetv(nip, &error);
1876 * Build the softlink (~like file data) and finalize the namecache.
1878 if (error == 0) {
1879 size_t bytes;
1880 struct uio auio;
1881 struct iovec aiov;
1883 bytes = strlen(ap->a_target);
1885 hammer2_inode_unlock(nip);
1886 bzero(&auio, sizeof(auio));
1887 bzero(&aiov, sizeof(aiov));
1888 auio.uio_iov = &aiov;
1889 auio.uio_segflg = UIO_SYSSPACE;
1890 auio.uio_rw = UIO_WRITE;
1891 auio.uio_resid = bytes;
1892 auio.uio_iovcnt = 1;
1893 auio.uio_td = curthread;
1894 aiov.iov_base = ap->a_target;
1895 aiov.iov_len = bytes;
1896 error = hammer2_write_file(nip, &auio, IO_APPEND, 0);
1897 /* XXX handle error */
1898 error = 0;
1899 } else {
1900 hammer2_inode_unlock(nip);
1904 * Update dip's mtime
1906 if (error == 0) {
1907 uint64_t mtime;
1909 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
1910 hammer2_update_time(&mtime);
1911 hammer2_inode_modify(dip);
1912 dip->meta.mtime = mtime;
1913 /*hammer2_inode_unlock(dip);*/
1915 hammer2_inode_unlock(dip);
1917 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
1920 * Finalize namecache
1922 if (error == 0) {
1923 cache_setunresolved(ap->a_nch);
1924 cache_setvp(ap->a_nch, *ap->a_vpp);
1925 hammer2_knote(ap->a_dvp, NOTE_WRITE);
1927 return error;
1931 * hammer2_vop_nremove { nch, dvp, cred }
1933 static
1935 hammer2_vop_nremove(struct vop_nremove_args *ap)
1937 hammer2_xop_unlink_t *xop;
1938 hammer2_inode_t *dip;
1939 hammer2_inode_t *ip;
1940 struct namecache *ncp;
1941 int error;
1942 int isopen;
1944 dip = VTOI(ap->a_dvp);
1945 if (dip->pmp->ronly)
1946 return (EROFS);
1947 #if 0
1948 /* allow removals, except user to also bulkfree */
1949 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
1950 return (ENOSPC);
1951 #endif
1953 ncp = ap->a_nch->ncp;
1955 if (hammer2_debug_inode && dip->meta.inum == hammer2_debug_inode) {
1956 kprintf("hammer2: attempt to delete inside debug inode: %s\n",
1957 ncp->nc_name);
1958 while (hammer2_debug_inode &&
1959 dip->meta.inum == hammer2_debug_inode) {
1960 tsleep(&hammer2_debug_inode, 0, "h2debug", hz*5);
1964 hammer2_trans_init(dip->pmp, 0);
1965 hammer2_inode_lock(dip, 0);
1968 * The unlink XOP unlinks the path from the directory and
1969 * locates and returns the cluster associated with the real inode.
1970 * We have to handle nlinks here on the frontend.
1972 xop = hammer2_xop_alloc(dip, HAMMER2_XOP_MODIFYING);
1973 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen);
1976 * The namecache entry is locked so nobody can use this namespace.
1977 * Calculate isopen to determine if this namespace has an open vp
1978 * associated with it and resolve the vp only if it does.
1980 * We try to avoid resolving the vnode if nobody has it open, but
1981 * note that the test is via this namespace only.
1983 isopen = cache_isopen(ap->a_nch);
1984 xop->isdir = 0;
1985 xop->dopermanent = 0;
1986 hammer2_xop_start(&xop->head, &hammer2_unlink_desc);
1989 * Collect the real inode and adjust nlinks, destroy the real
1990 * inode if nlinks transitions to 0 and it was the real inode
1991 * (else it has already been removed).
1993 error = hammer2_xop_collect(&xop->head, 0);
1994 error = hammer2_error_to_errno(error);
1996 if (error == 0) {
1997 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1);
1998 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
1999 if (ip) {
2000 if (hammer2_debug_inode &&
2001 ip->meta.inum == hammer2_debug_inode) {
2002 kprintf("hammer2: attempt to delete debug "
2003 "inode!\n");
2004 while (hammer2_debug_inode &&
2005 ip->meta.inum == hammer2_debug_inode) {
2006 tsleep(&hammer2_debug_inode, 0,
2007 "h2debug", hz*5);
2010 hammer2_inode_unlink_finisher(ip, isopen);
2011 hammer2_inode_depend(dip, ip); /* after modified */
2012 hammer2_inode_unlock(ip);
2014 } else {
2015 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
2019 * Update dip's mtime
2021 if (error == 0) {
2022 uint64_t mtime;
2024 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
2025 hammer2_update_time(&mtime);
2026 hammer2_inode_modify(dip);
2027 dip->meta.mtime = mtime;
2028 /*hammer2_inode_unlock(dip);*/
2030 hammer2_inode_unlock(dip);
2032 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
2033 if (error == 0) {
2034 cache_unlink(ap->a_nch);
2035 hammer2_knote(ap->a_dvp, NOTE_WRITE);
2037 return (error);
2041 * hammer2_vop_nrmdir { nch, dvp, cred }
2043 static
2045 hammer2_vop_nrmdir(struct vop_nrmdir_args *ap)
2047 hammer2_xop_unlink_t *xop;
2048 hammer2_inode_t *dip;
2049 hammer2_inode_t *ip;
2050 struct namecache *ncp;
2051 int isopen;
2052 int error;
2054 dip = VTOI(ap->a_dvp);
2055 if (dip->pmp->ronly)
2056 return (EROFS);
2057 #if 0
2058 /* allow removals, except user to also bulkfree */
2059 if (hammer2_vfs_enospace(dip, 0, ap->a_cred) > 1)
2060 return (ENOSPC);
2061 #endif
2063 hammer2_trans_init(dip->pmp, 0);
2064 hammer2_inode_lock(dip, 0);
2066 xop = hammer2_xop_alloc(dip, HAMMER2_XOP_MODIFYING);
2068 ncp = ap->a_nch->ncp;
2069 hammer2_xop_setname(&xop->head, ncp->nc_name, ncp->nc_nlen);
2070 isopen = cache_isopen(ap->a_nch);
2071 xop->isdir = 1;
2072 xop->dopermanent = 0;
2073 hammer2_xop_start(&xop->head, &hammer2_unlink_desc);
2076 * Collect the real inode and adjust nlinks, destroy the real
2077 * inode if nlinks transitions to 0 and it was the real inode
2078 * (else it has already been removed).
2080 error = hammer2_xop_collect(&xop->head, 0);
2081 error = hammer2_error_to_errno(error);
2083 if (error == 0) {
2084 ip = hammer2_inode_get(dip->pmp, &xop->head, -1, -1);
2085 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
2086 if (ip) {
2087 hammer2_inode_unlink_finisher(ip, isopen);
2088 hammer2_inode_depend(dip, ip); /* after modified */
2089 hammer2_inode_unlock(ip);
2091 } else {
2092 hammer2_xop_retire(&xop->head, HAMMER2_XOPMASK_VOP);
2096 * Update dip's mtime
2098 if (error == 0) {
2099 uint64_t mtime;
2101 /*hammer2_inode_lock(dip, HAMMER2_RESOLVE_SHARED);*/
2102 hammer2_update_time(&mtime);
2103 hammer2_inode_modify(dip);
2104 dip->meta.mtime = mtime;
2105 /*hammer2_inode_unlock(dip);*/
2107 hammer2_inode_unlock(dip);
2109 hammer2_trans_done(dip->pmp, HAMMER2_TRANS_SIDEQ);
2110 if (error == 0) {
2111 cache_unlink(ap->a_nch);
2112 hammer2_knote(ap->a_dvp, NOTE_WRITE | NOTE_LINK);
2114 return (error);
2118 * hammer2_vop_nrename { fnch, tnch, fdvp, tdvp, cred }
2120 static
2122 hammer2_vop_nrename(struct vop_nrename_args *ap)
2124 struct namecache *fncp;
2125 struct namecache *tncp;
2126 hammer2_inode_t *fdip; /* source directory */
2127 hammer2_inode_t *tdip; /* target directory */
2128 hammer2_inode_t *ip; /* file being renamed */
2129 hammer2_inode_t *tip; /* replaced target during rename or NULL */
2130 const uint8_t *fname;
2131 size_t fname_len;
2132 const uint8_t *tname;
2133 size_t tname_len;
2134 int error;
2135 int update_tdip;
2136 int update_fdip;
2137 hammer2_key_t tlhc;
2139 if (ap->a_fdvp->v_mount != ap->a_tdvp->v_mount)
2140 return(EXDEV);
2141 if (ap->a_fdvp->v_mount != ap->a_fnch->ncp->nc_vp->v_mount)
2142 return(EXDEV);
2144 fdip = VTOI(ap->a_fdvp); /* source directory */
2145 tdip = VTOI(ap->a_tdvp); /* target directory */
2147 if (fdip->pmp->ronly || (fdip->pmp->flags & HAMMER2_PMPF_EMERG))
2148 return (EROFS);
2149 if (hammer2_vfs_enospace(fdip, 0, ap->a_cred) > 1)
2150 return (ENOSPC);
2152 fncp = ap->a_fnch->ncp; /* entry name in source */
2153 fname = fncp->nc_name;
2154 fname_len = fncp->nc_nlen;
2156 tncp = ap->a_tnch->ncp; /* entry name in target */
2157 tname = tncp->nc_name;
2158 tname_len = tncp->nc_nlen;
2160 hammer2_trans_init(tdip->pmp, 0);
2162 update_tdip = 0;
2163 update_fdip = 0;
2165 ip = VTOI(fncp->nc_vp);
2166 hammer2_inode_ref(ip); /* extra ref */
2169 * Lookup the target name to determine if a directory entry
2170 * is being overwritten. We only hold related inode locks
2171 * temporarily, the operating system is expected to protect
2172 * against rename races.
2174 tip = tncp->nc_vp ? VTOI(tncp->nc_vp) : NULL;
2175 if (tip)
2176 hammer2_inode_ref(tip); /* extra ref */
2179 * Can return NULL and error == EXDEV if the common parent
2180 * crosses a directory with the xlink flag set.
2182 * For now try to avoid deadlocks with a simple pointer address
2183 * test. (tip) can be NULL.
2185 error = 0;
2187 hammer2_inode_t *ip1 = fdip;
2188 hammer2_inode_t *ip2 = tdip;
2189 hammer2_inode_t *ip3 = ip;
2190 hammer2_inode_t *ip4 = tip; /* may be NULL */
2192 if (fdip > tdip) {
2193 ip1 = tdip;
2194 ip2 = fdip;
2196 if (tip && ip > tip) {
2197 ip3 = tip;
2198 ip4 = ip;
2200 hammer2_inode_lock4(ip1, ip2, ip3, ip4);
2204 * Resolve the collision space for (tdip, tname, tname_len)
2206 * tdip must be held exclusively locked to prevent races since
2207 * multiple filenames can end up in the same collision space.
2210 hammer2_xop_scanlhc_t *sxop;
2211 hammer2_tid_t lhcbase;
2213 tlhc = hammer2_dirhash(tname, tname_len);
2214 lhcbase = tlhc;
2215 sxop = hammer2_xop_alloc(tdip, HAMMER2_XOP_MODIFYING);
2216 sxop->lhc = tlhc;
2217 hammer2_xop_start(&sxop->head, &hammer2_scanlhc_desc);
2218 while ((error = hammer2_xop_collect(&sxop->head, 0)) == 0) {
2219 if (tlhc != sxop->head.cluster.focus->bref.key)
2220 break;
2221 ++tlhc;
2223 error = hammer2_error_to_errno(error);
2224 hammer2_xop_retire(&sxop->head, HAMMER2_XOPMASK_VOP);
2226 if (error) {
2227 if (error != ENOENT)
2228 goto done2;
2229 ++tlhc;
2230 error = 0;
2232 if ((lhcbase ^ tlhc) & ~HAMMER2_DIRHASH_LOMASK) {
2233 error = ENOSPC;
2234 goto done2;
2239 * Ready to go, issue the rename to the backend. Note that meta-data
2240 * updates to the related inodes occur separately from the rename
2241 * operation.
2243 * NOTE: While it is not necessary to update ip->meta.name*, doing
2244 * so aids catastrophic recovery and debugging.
2246 if (error == 0) {
2247 hammer2_xop_nrename_t *xop4;
2249 xop4 = hammer2_xop_alloc(fdip, HAMMER2_XOP_MODIFYING);
2250 xop4->lhc = tlhc;
2251 xop4->ip_key = ip->meta.name_key;
2252 hammer2_xop_setip2(&xop4->head, ip);
2253 hammer2_xop_setip3(&xop4->head, tdip);
2254 hammer2_xop_setname(&xop4->head, fname, fname_len);
2255 hammer2_xop_setname2(&xop4->head, tname, tname_len);
2256 hammer2_xop_start(&xop4->head, &hammer2_nrename_desc);
2258 error = hammer2_xop_collect(&xop4->head, 0);
2259 error = hammer2_error_to_errno(error);
2260 hammer2_xop_retire(&xop4->head, HAMMER2_XOPMASK_VOP);
2262 if (error == ENOENT)
2263 error = 0;
2266 * Update inode meta-data.
2268 * WARNING! The in-memory inode (ip) structure does not
2269 * maintain a copy of the inode's filename buffer.
2271 if (error == 0 &&
2272 (ip->meta.name_key & HAMMER2_DIRHASH_VISIBLE)) {
2273 hammer2_inode_modify(ip);
2274 ip->meta.name_len = tname_len;
2275 ip->meta.name_key = tlhc;
2277 if (error == 0) {
2278 hammer2_inode_modify(ip);
2279 ip->meta.iparent = tdip->meta.inum;
2281 update_fdip = 1;
2282 update_tdip = 1;
2285 done2:
2287 * If no error, the backend has replaced the target directory entry.
2288 * We must adjust nlinks on the original replace target if it exists.
2290 if (error == 0 && tip) {
2291 int isopen;
2293 isopen = cache_isopen(ap->a_tnch);
2294 hammer2_inode_unlink_finisher(tip, isopen);
2298 * Update directory mtimes to represent the something changed.
2300 if (update_fdip || update_tdip) {
2301 uint64_t mtime;
2303 hammer2_update_time(&mtime);
2304 if (update_fdip) {
2305 hammer2_inode_modify(fdip);
2306 fdip->meta.mtime = mtime;
2308 if (update_tdip) {
2309 hammer2_inode_modify(tdip);
2310 tdip->meta.mtime = mtime;
2313 if (tip) {
2314 hammer2_inode_unlock(tip);
2315 hammer2_inode_drop(tip);
2317 hammer2_inode_unlock(ip);
2318 hammer2_inode_unlock(tdip);
2319 hammer2_inode_unlock(fdip);
2320 hammer2_inode_drop(ip);
2321 hammer2_trans_done(tdip->pmp, HAMMER2_TRANS_SIDEQ);
2324 * Issue the namecache update after unlocking all the internal
2325 * hammer2 structures, otherwise we might deadlock.
2327 * WARNING! The target namespace must be updated atomically,
2328 * and we depend on cache_rename() to handle that for
2329 * us. Do not do a separate cache_unlink() because
2330 * that leaves a small window of opportunity for other
2331 * threads to allocate the target namespace before we
2332 * manage to complete our rename.
2334 * WARNING! cache_rename() (and cache_unlink()) will properly
2335 * set VREF_FINALIZE on any attached vnode. Do not
2336 * call cache_setunresolved() manually before-hand as
2337 * this will prevent the flag from being set later via
2338 * cache_rename(). If VREF_FINALIZE is not properly set
2339 * and the inode is no longer in the topology, related
2340 * chains can remain dirty indefinitely.
2342 if (error == 0 && tip) {
2343 /*cache_unlink(ap->a_tnch); see above */
2344 /*cache_setunresolved(ap->a_tnch); see above */
2346 if (error == 0) {
2347 cache_rename(ap->a_fnch, ap->a_tnch);
2348 hammer2_knote(ap->a_fdvp, NOTE_WRITE);
2349 hammer2_knote(ap->a_tdvp, NOTE_WRITE);
2350 hammer2_knote(fncp->nc_vp, NOTE_RENAME);
2353 return (error);
2357 * hammer2_vop_ioctl { vp, command, data, fflag, cred }
2359 static
2361 hammer2_vop_ioctl(struct vop_ioctl_args *ap)
2363 hammer2_inode_t *ip;
2364 int error;
2366 ip = VTOI(ap->a_vp);
2368 error = hammer2_ioctl(ip, ap->a_command, (void *)ap->a_data,
2369 ap->a_fflag, ap->a_cred);
2370 return (error);
2373 static
2375 hammer2_vop_mountctl(struct vop_mountctl_args *ap)
2377 struct mount *mp;
2378 hammer2_pfs_t *pmp;
2379 int rc;
2381 switch (ap->a_op) {
2382 case (MOUNTCTL_SET_EXPORT):
2383 mp = ap->a_head.a_ops->head.vv_mount;
2384 pmp = MPTOPMP(mp);
2386 if (ap->a_ctllen != sizeof(struct export_args))
2387 rc = (EINVAL);
2388 else
2389 rc = vfs_export(mp, &pmp->export,
2390 (const struct export_args *)ap->a_ctl);
2391 break;
2392 default:
2393 rc = vop_stdmountctl(ap);
2394 break;
2396 return (rc);
2400 * KQFILTER
2402 static void filt_hammer2detach(struct knote *kn);
2403 static int filt_hammer2read(struct knote *kn, long hint);
2404 static int filt_hammer2write(struct knote *kn, long hint);
2405 static int filt_hammer2vnode(struct knote *kn, long hint);
2407 static struct filterops hammer2read_filtops =
2408 { FILTEROP_ISFD | FILTEROP_MPSAFE,
2409 NULL, filt_hammer2detach, filt_hammer2read };
2410 static struct filterops hammer2write_filtops =
2411 { FILTEROP_ISFD | FILTEROP_MPSAFE,
2412 NULL, filt_hammer2detach, filt_hammer2write };
2413 static struct filterops hammer2vnode_filtops =
2414 { FILTEROP_ISFD | FILTEROP_MPSAFE,
2415 NULL, filt_hammer2detach, filt_hammer2vnode };
2417 static
2419 hammer2_vop_kqfilter(struct vop_kqfilter_args *ap)
2421 struct vnode *vp = ap->a_vp;
2422 struct knote *kn = ap->a_kn;
2424 switch (kn->kn_filter) {
2425 case EVFILT_READ:
2426 kn->kn_fop = &hammer2read_filtops;
2427 break;
2428 case EVFILT_WRITE:
2429 kn->kn_fop = &hammer2write_filtops;
2430 break;
2431 case EVFILT_VNODE:
2432 kn->kn_fop = &hammer2vnode_filtops;
2433 break;
2434 default:
2435 return (EOPNOTSUPP);
2438 kn->kn_hook = (caddr_t)vp;
2440 knote_insert(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
2442 return(0);
2445 static void
2446 filt_hammer2detach(struct knote *kn)
2448 struct vnode *vp = (void *)kn->kn_hook;
2450 knote_remove(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
2453 static int
2454 filt_hammer2read(struct knote *kn, long hint)
2456 struct vnode *vp = (void *)kn->kn_hook;
2457 hammer2_inode_t *ip = VTOI(vp);
2458 off_t off;
2460 if (hint == NOTE_REVOKE) {
2461 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT);
2462 return(1);
2464 off = ip->meta.size - kn->kn_fp->f_offset;
2465 kn->kn_data = (off < INTPTR_MAX) ? off : INTPTR_MAX;
2466 if (kn->kn_sfflags & NOTE_OLDAPI)
2467 return(1);
2468 return (kn->kn_data != 0);
2472 static int
2473 filt_hammer2write(struct knote *kn, long hint)
2475 if (hint == NOTE_REVOKE)
2476 kn->kn_flags |= (EV_EOF | EV_NODATA | EV_ONESHOT);
2477 kn->kn_data = 0;
2478 return (1);
2481 static int
2482 filt_hammer2vnode(struct knote *kn, long hint)
2484 if (kn->kn_sfflags & hint)
2485 kn->kn_fflags |= hint;
2486 if (hint == NOTE_REVOKE) {
2487 kn->kn_flags |= (EV_EOF | EV_NODATA);
2488 return (1);
2490 return (kn->kn_fflags != 0);
2494 * FIFO VOPS
2496 static
2498 hammer2_vop_markatime(struct vop_markatime_args *ap)
2500 hammer2_inode_t *ip;
2501 struct vnode *vp;
2503 vp = ap->a_vp;
2504 ip = VTOI(vp);
2506 if (ip->pmp->ronly || (ip->pmp->flags & HAMMER2_PMPF_EMERG))
2507 return (EROFS);
2508 return(0);
2511 static
2513 hammer2_vop_fifokqfilter(struct vop_kqfilter_args *ap)
2515 int error;
2517 error = VOCALL(&fifo_vnode_vops, &ap->a_head);
2518 if (error)
2519 error = hammer2_vop_kqfilter(ap);
2520 return(error);
2524 * VOPS vector
2526 struct vop_ops hammer2_vnode_vops = {
2527 .vop_default = vop_defaultop,
2528 .vop_fsync = hammer2_vop_fsync,
2529 .vop_getpages = vop_stdgetpages,
2530 .vop_putpages = vop_stdputpages,
2531 .vop_access = hammer2_vop_access,
2532 .vop_advlock = hammer2_vop_advlock,
2533 .vop_close = hammer2_vop_close,
2534 .vop_nlink = hammer2_vop_nlink,
2535 .vop_ncreate = hammer2_vop_ncreate,
2536 .vop_nsymlink = hammer2_vop_nsymlink,
2537 .vop_nremove = hammer2_vop_nremove,
2538 .vop_nrmdir = hammer2_vop_nrmdir,
2539 .vop_nrename = hammer2_vop_nrename,
2540 .vop_getattr = hammer2_vop_getattr,
2541 .vop_getattr_quick = hammer2_vop_getattr_quick,
2542 .vop_setattr = hammer2_vop_setattr,
2543 .vop_readdir = hammer2_vop_readdir,
2544 .vop_readlink = hammer2_vop_readlink,
2545 .vop_read = hammer2_vop_read,
2546 .vop_write = hammer2_vop_write,
2547 .vop_open = hammer2_vop_open,
2548 .vop_inactive = hammer2_vop_inactive,
2549 .vop_reclaim = hammer2_vop_reclaim,
2550 .vop_nresolve = hammer2_vop_nresolve,
2551 .vop_nlookupdotdot = hammer2_vop_nlookupdotdot,
2552 .vop_nmkdir = hammer2_vop_nmkdir,
2553 .vop_nmknod = hammer2_vop_nmknod,
2554 .vop_ioctl = hammer2_vop_ioctl,
2555 .vop_mountctl = hammer2_vop_mountctl,
2556 .vop_bmap = hammer2_vop_bmap,
2557 .vop_strategy = hammer2_vop_strategy,
2558 .vop_kqfilter = hammer2_vop_kqfilter
2561 struct vop_ops hammer2_spec_vops = {
2562 .vop_default = vop_defaultop,
2563 .vop_fsync = hammer2_vop_fsync,
2564 .vop_read = vop_stdnoread,
2565 .vop_write = vop_stdnowrite,
2566 .vop_access = hammer2_vop_access,
2567 .vop_close = hammer2_vop_close,
2568 .vop_markatime = hammer2_vop_markatime,
2569 .vop_getattr = hammer2_vop_getattr,
2570 .vop_inactive = hammer2_vop_inactive,
2571 .vop_reclaim = hammer2_vop_reclaim,
2572 .vop_setattr = hammer2_vop_setattr
2575 struct vop_ops hammer2_fifo_vops = {
2576 .vop_default = fifo_vnoperate,
2577 .vop_fsync = hammer2_vop_fsync,
2578 #if 0
2579 .vop_read = hammer2_vop_fiforead,
2580 .vop_write = hammer2_vop_fifowrite,
2581 #endif
2582 .vop_access = hammer2_vop_access,
2583 #if 0
2584 .vop_close = hammer2_vop_fifoclose,
2585 #endif
2586 .vop_markatime = hammer2_vop_markatime,
2587 .vop_getattr = hammer2_vop_getattr,
2588 .vop_inactive = hammer2_vop_inactive,
2589 .vop_reclaim = hammer2_vop_reclaim,
2590 .vop_setattr = hammer2_vop_setattr,
2591 .vop_kqfilter = hammer2_vop_fifokqfilter