4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
22 * Copyright (c) 2006, 2010, Oracle and/or its affiliates. All rights reserved.
25 * Copyright (c) 2013, Joyent, Inc. All rights reserved.
29 * vnode ops for the /dev filesystem
31 * - VDIR, VCHR, CBLK, and VLNK are considered must supported files
32 * - VREG and VDOOR are used for some internal implementations in
33 * the global zone, e.g. devname and devfsadm communication
34 * - other file types are unusual in this namespace and
35 * not supported for now
39 * sdev has a few basic goals:
40 * o Provide /dev for the global zone as well as various non-global zones.
41 * o Provide the basic functionality that devfsadm might need (mknod,
43 * o Allow persistent permissions on files in /dev.
44 * o Allow for dynamic directories and nodes for use by various services (pts,
47 * The sdev file system is primarily made up of sdev_node_t's which is sdev's
48 * counterpart to the vnode_t. There are two different classes of sdev_node_t's
49 * that we generally care about, dynamic and otherwise.
51 * Persisting Information
52 * ----------------------
54 * When sdev is mounted, it keeps track of the underlying file system it is
55 * mounted over. In certain situations, sdev will go and create entries in that
56 * underlying file system. These underlying 'back end' nodes are used as proxies
57 * for various changes in permissions. While specific sets of nodes, such as
58 * dynamic ones, are exempt, this process stores permission changes against
59 * these back end nodes. The point of all of this is to allow for these settings
60 * to persist across host and zone reboots. As an example, consider the entry
61 * /dev/dsk/c0t0d0 which is a character device and that / is in UFS. Upon
62 * changing the permissions on c0t0d0 you'd have the following logical
65 * +------------------+ sdev_vnode +--------------+
66 * | sdev_node_t |<---------------->| vnode_t |
67 * | /dev/dsk/c0t0d0 |<---------------->| for sdev |
68 * +------------------+ +--------------+
72 * | +---------------------+
73 * +--->| vnode_t for UFS|ZFS |
75 * +---------------------+
77 * sdev is generally in memory. Therefore when a lookup happens and there is no
78 * entry already inside of a directory cache, it will next check the backing
79 * store. If the backing store exists, we will reconstitute the sdev_node based
80 * on the information that we persisted. When we create the backing store node,
81 * we use the struct vattr information that we already have in sdev_node_t.
82 * Because of this, we already know if the entry was previously a symlink,
83 * directory, or some other kind of type. Note that not all types of nodes are
84 * supported. Currently only VDIR, VCHR, VBLK, VREG, VDOOR, and VLNK are
85 * eligible to be persisted.
87 * When the sdev_node is created and the lookup is done, we grab a hold on the
88 * underlying vnode as part of the call to VOP_LOOKUP. That reference is held
89 * until the sdev_node becomes inactive. Once its reference count reaches one
90 * and the VOP_INACTIVE callback fires leading to the destruction of the node,
91 * the reference on the underlying vnode will be released.
93 * The backing store node will be deleted only when the node itself is deleted
94 * through the means of a VOP_REMOVE, VOP_RMDIR, or similar call.
96 * Not everything can be persisted, see The Rules section for more details.
101 * Dynamic nodes allow for specific interactions with various kernel subsystems
102 * when looking up directory entries. This allows the lookup and readdir
103 * functions to check against the kernel subsystem's for validity. eg. does a
104 * zvol or nic still exist.
106 * More specifically, when we create various directories we check if the
107 * directory name matches that of one of the names in the vtab[] (sdev_subr.c).
108 * If it does, we swap out the vnode operations into a new set which combine the
109 * normal sdev vnode operations with the dynamic set here.
111 * In addition, various dynamic nodes implement a verification entry point. This
112 * verification entry is used as a part of lookup and readdir. The goal for
113 * these dynamic nodes is to allow them to check with the underlying subsystems
114 * to ensure that these devices are still present, or if they have gone away, to
115 * remove them from the results. This is indicated by using the SDEV_VTOR flag
118 * Dynamic nodes have additional restrictions placed upon them. They may only
119 * appear at the top level directory of the file system. In addition, users
120 * cannot create dirents below any leve of a dynamic node aside from its special
126 * Profiles exist for the purpose of non-global zones. They work with the zone
127 * brands and zoneadmd to set up a filter of allowed devices that can appear in
128 * a non-global zone's /dev. These are sent to sdev by means of libdevinfo and a
129 * modctl system call. Specifically it allows one to add patterns of device
130 * paths to include and exclude. It allows for a collection of symlinks to be
131 * added and it allows for remapping names.
133 * When operating in a non-global zone, several of the sdev vnops are redirected
134 * to the profile versions. These impose additional restrictions such as
135 * enforcing that a non-global zone's /dev is read only.
140 * A given sdev_node_t has a field called the sdev_state which describes where
141 * in the sdev life cycle it is. There are three primary states: SDEV_INIT,
142 * SDEV_READY, and SDEV_ZOMBIE.
144 * SDEV_INIT: When a new /dev file is first looked up, a sdev_node
145 * is allocated, initialized and added to the directory's
146 * sdev_node cache. A node at this state will also
147 * have the SDEV_LOOKUP flag set.
149 * Other threads that are trying to look up a node at
150 * this state will be blocked until the SDEV_LOOKUP flag
153 * When the SDEV_LOOKUP flag is cleared, the node may
154 * transition into the SDEV_READY state for a successful
155 * lookup or the node is removed from the directory cache
156 * and destroyed if the named node can not be found.
157 * An ENOENT error is returned for the second case.
159 * SDEV_READY: A /dev file has been successfully looked up and
160 * associated with a vnode. The /dev file is available
161 * for the supported /dev file system operations.
163 * SDEV_ZOMBIE: Deletion of a /dev file has been explicitly issued
164 * to an SDEV_READY node. The node is transitioned into
165 * the SDEV_ZOMBIE state if the vnode reference count
166 * is still held. A SDEV_ZOMBIE node does not support
167 * any of the /dev file system operations. A SDEV_ZOMBIE
168 * node is immediately removed from the directory cache
169 * and destroyed once the reference count reaches zero.
171 * Historically nodes that were marked SDEV_ZOMBIE were not removed from the
172 * underlying directory caches. This has been the source of numerous bugs and
173 * thus to better mimic what happens on a real file system, it is no longer the
176 * The following state machine describes the life cycle of a given node and its
180 * allocated via . +-------------+ . . . . . . . vnode_t refcount
181 * sdev_nodeinit() . | Unallocated | . reaches zero and
182 * +--------*-----| Memory |<--------*---+ sdev_inactive is
183 * | +-------------+ | called.
184 * | +------------^ | called.
186 * +-----------+ * . . sdev_nodeready() +-------------+
187 * | SDEV_INIT | | or related setup | SDEV_ZOMBIE |
188 * +-----------+ | failure +-------------+
190 * | | +------------+ |
191 * +-*----------->| SDEV_READY |--------*-----+
192 * . +------------+ . The node is no longer
193 * . . node successfully . . . . . valid or we've been
194 * inserted into the asked to remove it.
195 * directory cache This happens via
196 * and sdev_nodready() sdev_dirdelete().
199 * Adding and Removing Dirents, Zombie Nodes
200 * -----------------------------------------
202 * As part of doing a lookup, readdir, or an explicit creation operation like
203 * mkdir or create, nodes may be created. Every directory has an avl tree which
204 * contains its children, the sdev_entries tree. This is only used if the type
205 * is VDIR. Access to this is controlled by the sdev_node_t's contents_lock and
206 * it is managed through sdev_cache_update().
208 * Every sdev_node_t has a field sdev_state, which describes the current state
209 * of the node. A node is generally speaking in the SDEV_READY state. When it is
210 * there, it can be looked up, accessed, and operations performed on it. When a
211 * node is going to be removed from the directory cache it is marked as a
212 * zombie. Once a node becomes a zombie, no other file system operations will
213 * succeed and it will continue to exist as a node until the vnode count on the
214 * node reaches zero. At that point, the node will be freed. However, once a
215 * node has been marked as a zombie, it will be removed immediately from the
216 * directory cache such that no one else may find it again. This means that
217 * someone else can insert a new entry into that directory with the same name
218 * and without a problem.
220 * To remove a node, see the section on that in The Rules.
224 * These are the rules to live by when working in sdev. These are not
227 * - Set 1: Working with Backing Nodes
228 * o If there is a SDEV_READY sdev_node_t, it knows about its backing node.
229 * o If we find a backing node when looking up an sdev_node_t for the first
230 * time, we use its attributes to build our sdev_node_t.
231 * o If there is a found backing node, or we create a backing node, that's
232 * when we grab the hold on its vnode.
233 * o If we mark an sdev_node_t a ZOMBIE, we must remove its backing node from
234 * the underlying file system. It must not be searchable or findable.
235 * o We release our hold on the backing node vnode when we destroy the
238 * - Set 2: Locking rules for sdev (not exhaustive)
239 * o The majority of nodes contain an sdev_contents rw lock. You must hold it
240 * for read or write if manipulating its contents appropriately.
241 * o You must lock your parent before yourself.
242 * o If you need your vnode's v_lock and the sdev_contents rw lock, you must
243 * grab the v_lock before the sdev_contents rw_lock.
244 * o If you release a lock on the node as a part of upgrading it, you must
245 * verify that the node has not become a zombie as a part of this process.
247 * - Set 3: Zombie Status and What it Means
248 * o If you encounter a node that is a ZOMBIE, that means that it has been
249 * unlinked from the backing store.
250 * o If you release your contents lock and acquire it again (say as part of
251 * trying to grab a write lock) you must check that the node has not become
253 * o You should VERIFY that a looked up node is not a zombie. This follows
254 * from the following logic. To mark something as a zombie means that it is
255 * removed from the parents directory cache. To do that, you must have a
256 * write lock on the parent's sdev_contents. To lookup through that
257 * directory you must have a read lock. This then becomes a simple ordering
258 * problem. If you've been granted the lock then the other operation cannot
259 * be in progress or must have already succeeded.
261 * - Set 4: Removing Directory Entries (aka making nodes Zombies)
262 * o Write lock must be held on the directory
263 * o Write lock must be held on the node
264 * o Remove the sdev_node_t from its parent cache
265 * o Remove the corresponding backing store node, if it exists, eg. use
266 * VOP_REMOVE or VOP_RMDIR.
267 * o You must NOT make any change in the vnode reference count! Nodes should
268 * only be cleaned up through VOP_INACTIVE callbacks.
269 * o VOP_INACTIVE is the only one responsible for doing the final vn_rele of
270 * the backing store vnode that was grabbed during lookup.
272 * - Set 5: What Nodes may be Persisted
273 * o The root, /dev is always persisted
274 * o Any node in vtab which is marked SDEV_DYNAMIC, may not be persisted
275 * unless it is also marked SDEV_PERSIST
276 * o Anything whose parent directory is marked SDEV_PERSIST will pass that
277 * along to the child as long as it does not contradict the above rules
280 #include <sys/types.h>
281 #include <sys/param.h>
282 #include <sys/t_lock.h>
283 #include <sys/systm.h>
284 #include <sys/sysmacros.h>
285 #include <sys/user.h>
286 #include <sys/time.h>
288 #include <sys/vnode.h>
289 #include <sys/vfs_opreg.h>
290 #include <sys/file.h>
291 #include <sys/fcntl.h>
292 #include <sys/flock.h>
293 #include <sys/kmem.h>
295 #include <sys/errno.h>
296 #include <sys/stat.h>
297 #include <sys/cred.h>
298 #include <sys/dirent.h>
299 #include <sys/pathname.h>
300 #include <sys/cmn_err.h>
301 #include <sys/debug.h>
302 #include <sys/policy.h>
304 #include <vm/seg_vn.h>
305 #include <vm/seg_map.h>
309 #include <sys/proc.h>
310 #include <sys/mode.h>
311 #include <sys/sunndi.h>
312 #include <sys/ptms.h>
313 #include <fs/fs_subr.h>
314 #include <sys/fs/dv_node.h>
315 #include <sys/fs/sdev_impl.h>
319 sdev_open(struct vnode
**vpp
, int flag
, struct cred
*cred
, caller_context_t
*ct
)
321 struct sdev_node
*dv
= VTOSDEV(*vpp
);
322 struct sdev_node
*ddv
= dv
->sdev_dotdot
;
325 if ((*vpp
)->v_type
== VDIR
)
328 if (!SDEV_IS_GLOBAL(dv
))
331 if ((*vpp
)->v_type
== VLNK
)
333 ASSERT((*vpp
)->v_type
== VREG
);
334 if ((*vpp
)->v_type
!= VREG
)
338 rw_enter(&ddv
->sdev_contents
, RW_READER
);
339 if (dv
->sdev_attrvp
== NULL
) {
340 rw_exit(&ddv
->sdev_contents
);
343 error
= VOP_OPEN(&(dv
->sdev_attrvp
), flag
, cred
, ct
);
344 rw_exit(&ddv
->sdev_contents
);
350 sdev_close(struct vnode
*vp
, int flag
, int count
,
351 offset_t offset
, struct cred
*cred
, caller_context_t
*ct
)
353 struct sdev_node
*dv
= VTOSDEV(vp
);
355 if (vp
->v_type
== VDIR
) {
356 cleanlocks(vp
, ttoproc(curthread
)->p_pid
, 0);
357 cleanshares(vp
, ttoproc(curthread
)->p_pid
);
361 if (!SDEV_IS_GLOBAL(dv
))
364 ASSERT(vp
->v_type
== VREG
);
365 if (vp
->v_type
!= VREG
)
368 ASSERT(dv
->sdev_attrvp
);
369 return (VOP_CLOSE(dv
->sdev_attrvp
, flag
, count
, offset
, cred
, ct
));
374 sdev_read(struct vnode
*vp
, struct uio
*uio
, int ioflag
, struct cred
*cred
,
375 struct caller_context
*ct
)
377 struct sdev_node
*dv
= (struct sdev_node
*)VTOSDEV(vp
);
380 if (!SDEV_IS_GLOBAL(dv
))
383 if (vp
->v_type
== VDIR
)
386 /* only supporting regular files in /dev */
387 ASSERT(vp
->v_type
== VREG
);
388 if (vp
->v_type
!= VREG
)
391 ASSERT(RW_READ_HELD(&VTOSDEV(vp
)->sdev_contents
));
392 ASSERT(dv
->sdev_attrvp
);
393 (void) VOP_RWLOCK(dv
->sdev_attrvp
, 0, ct
);
394 error
= VOP_READ(dv
->sdev_attrvp
, uio
, ioflag
, cred
, ct
);
395 VOP_RWUNLOCK(dv
->sdev_attrvp
, 0, ct
);
401 sdev_write(struct vnode
*vp
, struct uio
*uio
, int ioflag
, struct cred
*cred
,
402 struct caller_context
*ct
)
404 struct sdev_node
*dv
= VTOSDEV(vp
);
407 if (!SDEV_IS_GLOBAL(dv
))
410 if (vp
->v_type
== VDIR
)
413 /* only supporting regular files in /dev */
414 ASSERT(vp
->v_type
== VREG
);
415 if (vp
->v_type
!= VREG
)
418 ASSERT(dv
->sdev_attrvp
);
420 (void) VOP_RWLOCK(dv
->sdev_attrvp
, 1, ct
);
421 error
= VOP_WRITE(dv
->sdev_attrvp
, uio
, ioflag
, cred
, ct
);
422 VOP_RWUNLOCK(dv
->sdev_attrvp
, 1, ct
);
424 sdev_update_timestamps(dv
->sdev_attrvp
, kcred
,
432 sdev_ioctl(struct vnode
*vp
, int cmd
, intptr_t arg
, int flag
,
433 struct cred
*cred
, int *rvalp
, caller_context_t
*ct
)
435 struct sdev_node
*dv
= VTOSDEV(vp
);
437 if (!SDEV_IS_GLOBAL(dv
) || (vp
->v_type
== VDIR
))
440 ASSERT(vp
->v_type
== VREG
);
441 if (vp
->v_type
!= VREG
)
444 ASSERT(dv
->sdev_attrvp
);
445 return (VOP_IOCTL(dv
->sdev_attrvp
, cmd
, arg
, flag
, cred
, rvalp
, ct
));
449 sdev_getattr(struct vnode
*vp
, struct vattr
*vap
, int flags
,
450 struct cred
*cr
, caller_context_t
*ct
)
453 struct sdev_node
*dv
= VTOSDEV(vp
);
454 struct sdev_node
*parent
= dv
->sdev_dotdot
;
458 rw_enter(&parent
->sdev_contents
, RW_READER
);
459 ASSERT(dv
->sdev_attr
|| dv
->sdev_attrvp
);
463 * - for persistent nodes (SDEV_PERSIST): backstore
464 * - for non-persistent nodes: module ops if global, then memory
466 if (dv
->sdev_attrvp
) {
467 rw_exit(&parent
->sdev_contents
);
468 error
= VOP_GETATTR(dv
->sdev_attrvp
, vap
, flags
, cr
, ct
);
469 sdev_vattr_merge(dv
, vap
);
471 ASSERT(dv
->sdev_attr
);
472 *vap
= *dv
->sdev_attr
;
473 sdev_vattr_merge(dv
, vap
);
474 rw_exit(&parent
->sdev_contents
);
482 sdev_setattr(struct vnode
*vp
, struct vattr
*vap
, int flags
,
483 struct cred
*cred
, caller_context_t
*ctp
)
485 return (devname_setattr_func(vp
, vap
, flags
, cred
, NULL
, 0));
489 sdev_getsecattr(struct vnode
*vp
, struct vsecattr
*vsap
, int flags
,
490 struct cred
*cr
, caller_context_t
*ct
)
493 struct sdev_node
*dv
= VTOSDEV(vp
);
494 struct vnode
*avp
= dv
->sdev_attrvp
;
497 /* return fs_fab_acl() if flavor matches, else do nothing */
498 if ((SDEV_ACL_FLAVOR(vp
) == _ACL_ACLENT_ENABLED
&&
499 (vsap
->vsa_mask
& (VSA_ACLCNT
| VSA_DFACLCNT
))) ||
500 (SDEV_ACL_FLAVOR(vp
) == _ACL_ACE_ENABLED
&&
501 (vsap
->vsa_mask
& (VSA_ACECNT
| VSA_ACE
))))
502 return (fs_fab_acl(vp
, vsap
, flags
, cr
, ct
));
507 (void) VOP_RWLOCK(avp
, 1, ct
);
508 error
= VOP_GETSECATTR(avp
, vsap
, flags
, cr
, ct
);
509 VOP_RWUNLOCK(avp
, 1, ct
);
514 sdev_setsecattr(struct vnode
*vp
, struct vsecattr
*vsap
, int flags
,
515 struct cred
*cr
, caller_context_t
*ct
)
518 struct sdev_node
*dv
= VTOSDEV(vp
);
519 struct vnode
*avp
= dv
->sdev_attrvp
;
521 if (dv
->sdev_state
== SDEV_ZOMBIE
)
525 if (SDEV_IS_GLOBAL(dv
) && !SDEV_IS_PERSIST(dv
))
527 ASSERT(dv
->sdev_attr
);
529 * if coming in directly, the acl system call will
530 * have held the read-write lock via VOP_RWLOCK()
531 * If coming in via specfs, specfs will have
532 * held the rw lock on the realvp i.e. us.
534 ASSERT(RW_WRITE_HELD(&dv
->sdev_contents
));
535 sdev_vattr_merge(dv
, dv
->sdev_attr
);
536 error
= sdev_shadow_node(dv
, cr
);
541 ASSERT(dv
->sdev_attrvp
);
542 /* clean out the memory copy if any */
544 kmem_free(dv
->sdev_attr
, sizeof (struct vattr
));
545 dv
->sdev_attr
= NULL
;
547 avp
= dv
->sdev_attrvp
;
551 (void) VOP_RWLOCK(avp
, V_WRITELOCK_TRUE
, ct
);
552 error
= VOP_SETSECATTR(avp
, vsap
, flags
, cr
, ct
);
553 VOP_RWUNLOCK(avp
, V_WRITELOCK_TRUE
, ct
);
558 sdev_unlocked_access(void *vdv
, int mode
, struct cred
*cr
)
560 struct sdev_node
*dv
= vdv
;
562 uid_t owner
= dv
->sdev_attr
->va_uid
;
564 if (crgetuid(cr
) != owner
) {
566 if (groupmember(dv
->sdev_attr
->va_gid
, cr
) == 0)
570 return (secpolicy_vnode_access2(cr
, SDEVTOV(dv
), owner
,
571 dv
->sdev_attr
->va_mode
<< shift
, mode
));
575 sdev_access(struct vnode
*vp
, int mode
, int flags
, struct cred
*cr
,
576 caller_context_t
*ct
)
578 struct sdev_node
*dv
= VTOSDEV(vp
);
581 rw_enter(&dv
->sdev_contents
, RW_READER
);
582 ASSERT(dv
->sdev_attr
|| dv
->sdev_attrvp
);
583 if (dv
->sdev_attrvp
) {
584 ret
= VOP_ACCESS(dv
->sdev_attrvp
, mode
, flags
, cr
, ct
);
585 } else if (dv
->sdev_attr
) {
586 ret
= sdev_unlocked_access(dv
, mode
, cr
);
590 rw_exit(&dv
->sdev_contents
);
600 sdev_lookup(struct vnode
*dvp
, char *nm
, struct vnode
**vpp
,
601 struct pathname
*pnp
, int flags
, struct vnode
*rdir
, struct cred
*cred
,
602 caller_context_t
*ct
, int *direntflags
, pathname_t
*realpnp
)
604 struct sdev_node
*parent
;
607 parent
= VTOSDEV(dvp
);
610 /* execute access is required to search the directory */
611 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0)
614 if (!SDEV_IS_GLOBAL(parent
))
615 return (prof_lookup(dvp
, nm
, vpp
, cred
));
616 return (devname_lookup_func(parent
, nm
, vpp
, cred
, NULL
, 0));
621 sdev_create(struct vnode
*dvp
, char *nm
, struct vattr
*vap
, vcexcl_t excl
,
622 int mode
, struct vnode
**vpp
, struct cred
*cred
, int flag
,
623 caller_context_t
*ct
, vsecattr_t
*vsecp
)
625 struct vnode
*vp
= NULL
;
627 struct sdev_node
*parent
;
628 struct sdev_node
*self
= NULL
;
630 vtype_t type
= vap
->va_type
;
632 ASSERT(type
!= VNON
&& type
!= VBAD
);
634 if ((type
== VFIFO
) || (type
== VSOCK
) ||
635 (type
== VPROC
) || (type
== VPORT
))
638 parent
= VTOSDEV(dvp
);
641 rw_enter(&parent
->sdev_dotdot
->sdev_contents
, RW_READER
);
642 if (parent
->sdev_state
== SDEV_ZOMBIE
) {
643 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
647 /* non-global do not allow pure node creation */
648 if (!SDEV_IS_GLOBAL(parent
)) {
649 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
650 return (prof_lookup(dvp
, nm
, vpp
, cred
));
652 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
654 /* execute access is required to search the directory */
655 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0)
658 /* check existing name */
659 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */
660 error
= VOP_LOOKUP(dvp
, nm
, &vp
, NULL
, 0, NULL
, cred
, ct
, NULL
, NULL
);
667 } else if ((vp
->v_type
== VDIR
) && (mode
& VWRITE
)) {
668 /* allowing create/read-only an existing directory */
671 error
= VOP_ACCESS(vp
, mode
, 0, cred
, ct
);
679 /* truncation first */
680 if ((vp
->v_type
== VREG
) && (vap
->va_mask
& AT_SIZE
) &&
681 (vap
->va_size
== 0)) {
682 ASSERT(parent
->sdev_attrvp
);
683 error
= VOP_CREATE(parent
->sdev_attrvp
,
684 nm
, vap
, excl
, mode
, &avp
, cred
, flag
, ct
, vsecp
);
692 sdev_update_timestamps(vp
, kcred
,
693 AT_CTIME
|AT_MTIME
|AT_ATIME
);
702 /* verify write access - compliance specifies ENXIO */
703 if ((error
= VOP_ACCESS(dvp
, VEXEC
|VWRITE
, 0, cred
, ct
)) != 0) {
710 * For memory-based (ROFS) directory:
711 * - either disallow node creation;
712 * - or implement VOP_CREATE of its own
714 rw_enter(&parent
->sdev_contents
, RW_WRITER
);
715 if (!SDEV_IS_PERSIST(parent
)) {
716 rw_exit(&parent
->sdev_contents
);
719 ASSERT(parent
->sdev_attrvp
);
720 error
= sdev_mknode(parent
, nm
, &self
, vap
, NULL
, NULL
,
723 rw_exit(&parent
->sdev_contents
);
728 rw_exit(&parent
->sdev_contents
);
731 /* take care the timestamps for the node and its parent */
732 sdev_update_timestamps(SDEVTOV(self
), kcred
,
733 AT_CTIME
|AT_MTIME
|AT_ATIME
);
734 sdev_update_timestamps(dvp
, kcred
, AT_MTIME
|AT_ATIME
);
735 if (SDEV_IS_GLOBAL(parent
))
736 atomic_inc_ulong(&parent
->sdev_gdir_gen
);
738 /* wake up other threads blocked on looking up this node */
739 mutex_enter(&self
->sdev_lookup_lock
);
740 SDEV_UNBLOCK_OTHERS(self
, SDEV_LOOKUP
);
741 mutex_exit(&self
->sdev_lookup_lock
);
742 error
= sdev_to_vp(self
, vpp
);
747 sdev_remove(struct vnode
*dvp
, char *nm
, struct cred
*cred
,
748 caller_context_t
*ct
, int flags
)
751 struct sdev_node
*parent
= (struct sdev_node
*)VTOSDEV(dvp
);
752 struct vnode
*vp
= NULL
;
753 struct sdev_node
*dv
= NULL
;
762 } else if (len
== 2 && nm
[1] == '.') {
768 rw_enter(&parent
->sdev_contents
, RW_READER
);
769 if (!SDEV_IS_GLOBAL(parent
)) {
770 rw_exit(&parent
->sdev_contents
);
774 /* execute access is required to search the directory */
775 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0) {
776 rw_exit(&parent
->sdev_contents
);
780 /* check existence first */
781 dv
= sdev_cache_lookup(parent
, nm
);
783 rw_exit(&parent
->sdev_contents
);
788 if ((dv
->sdev_state
== SDEV_INIT
) ||
789 (dv
->sdev_state
== SDEV_ZOMBIE
)) {
790 rw_exit(&parent
->sdev_contents
);
795 /* write access is required to remove an entry */
796 if ((error
= VOP_ACCESS(dvp
, VWRITE
, 0, cred
, ct
)) != 0) {
797 rw_exit(&parent
->sdev_contents
);
802 bkstore
= SDEV_IS_PERSIST(dv
) ? 1 : 0;
803 if (!rw_tryupgrade(&parent
->sdev_contents
)) {
804 rw_exit(&parent
->sdev_contents
);
805 rw_enter(&parent
->sdev_contents
, RW_WRITER
);
806 /* Make sure we didn't become a zombie */
807 if (parent
->sdev_state
== SDEV_ZOMBIE
) {
808 rw_exit(&parent
->sdev_contents
);
814 /* we do not support unlinking a non-empty directory */
815 if (vp
->v_type
== VDIR
&& dv
->sdev_nlink
> 2) {
816 rw_exit(&parent
->sdev_contents
);
822 * sdev_dirdelete does the real job of:
823 * - make sure no open ref count
824 * - destroying the sdev_node
825 * - releasing the hold on attrvp
827 sdev_cache_update(parent
, &dv
, nm
, SDEV_CACHE_DELETE
);
829 rw_exit(&parent
->sdev_contents
);
832 * best efforts clean up the backing store
835 ASSERT(parent
->sdev_attrvp
);
836 error
= VOP_REMOVE(parent
->sdev_attrvp
, nm
, cred
,
839 * do not report BUSY error
840 * because the backing store ref count is released
841 * when the last ref count on the sdev_node is
844 if (error
== EBUSY
) {
845 sdcmn_err2(("sdev_remove: device %s is still on"
846 "disk %s\n", nm
, parent
->sdev_path
));
855 * Some restrictions for this file system:
856 * - both oldnm and newnm are in the scope of /dev file system,
857 * to simply the namespace management model.
861 sdev_rename(struct vnode
*odvp
, char *onm
, struct vnode
*ndvp
, char *nnm
,
862 struct cred
*cred
, caller_context_t
*ct
, int flags
)
864 struct sdev_node
*fromparent
= NULL
;
866 struct sdev_node
*toparent
;
867 struct sdev_node
*fromdv
= NULL
; /* source node */
868 struct vnode
*ovp
= NULL
; /* source vnode */
869 struct sdev_node
*todv
= NULL
; /* destination node */
870 struct vnode
*nvp
= NULL
; /* destination vnode */
871 int samedir
= 0; /* set if odvp == ndvp */
872 struct vnode
*realvp
;
878 /* prevent modifying "." and ".." */
879 if ((onm
[0] == '.' &&
880 (onm
[1] == '\0' || (onm
[1] == '.' && onm
[2] == '\0'))) ||
882 (nnm
[1] == '\0' || (nnm
[1] == '.' && nnm
[2] == '\0')))) {
886 fromparent
= VTOSDEV(odvp
);
887 toparent
= VTOSDEV(ndvp
);
889 /* ZOMBIE parent doesn't allow new node creation */
890 rw_enter(&fromparent
->sdev_dotdot
->sdev_contents
, RW_READER
);
891 if (fromparent
->sdev_state
== SDEV_ZOMBIE
) {
892 rw_exit(&fromparent
->sdev_dotdot
->sdev_contents
);
896 /* renaming only supported for global device nodes */
897 if (!SDEV_IS_GLOBAL(fromparent
)) {
898 rw_exit(&fromparent
->sdev_dotdot
->sdev_contents
);
901 rw_exit(&fromparent
->sdev_dotdot
->sdev_contents
);
903 rw_enter(&toparent
->sdev_dotdot
->sdev_contents
, RW_READER
);
904 if (toparent
->sdev_state
== SDEV_ZOMBIE
) {
905 rw_exit(&toparent
->sdev_dotdot
->sdev_contents
);
908 rw_exit(&toparent
->sdev_dotdot
->sdev_contents
);
911 * acquire the global lock to prevent
912 * mount/unmount/other rename activities.
914 mutex_enter(&sdev_lock
);
916 /* check existence of the source node */
917 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */
918 error
= VOP_LOOKUP(odvp
, onm
, &ovp
, NULL
, 0, NULL
, cred
, ct
,
921 sdcmn_err2(("sdev_rename: the source node %s exists\n",
923 mutex_exit(&sdev_lock
);
927 if (VOP_REALVP(ovp
, &realvp
, ct
) == 0) {
933 /* check existence of destination */
934 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */
935 error
= VOP_LOOKUP(ndvp
, nnm
, &nvp
, NULL
, 0, NULL
, cred
, ct
,
937 if (error
&& (error
!= ENOENT
)) {
938 mutex_exit(&sdev_lock
);
943 if (nvp
&& (VOP_REALVP(nvp
, &realvp
, ct
) == 0)) {
950 * make sure the source and the destination are
951 * in the same dev filesystem
954 vattr
.va_mask
= AT_FSID
;
955 if (error
= VOP_GETATTR(odvp
, &vattr
, 0, cred
, ct
)) {
956 mutex_exit(&sdev_lock
);
962 fsid
= vattr
.va_fsid
;
963 vattr
.va_mask
= AT_FSID
;
964 if (error
= VOP_GETATTR(ndvp
, &vattr
, 0, cred
, ct
)) {
965 mutex_exit(&sdev_lock
);
971 if (fsid
!= vattr
.va_fsid
) {
972 mutex_exit(&sdev_lock
);
980 /* make sure the old entry can be deleted */
981 error
= VOP_ACCESS(odvp
, VWRITE
, 0, cred
, ct
);
983 mutex_exit(&sdev_lock
);
990 /* make sure the destination allows creation */
991 samedir
= (fromparent
== toparent
);
993 error
= VOP_ACCESS(ndvp
, VEXEC
|VWRITE
, 0, cred
, ct
);
995 mutex_exit(&sdev_lock
);
1003 fromdv
= VTOSDEV(ovp
);
1006 /* destination file exists */
1008 todv
= VTOSDEV(nvp
);
1012 if ((fromdv
->sdev_flags
& SDEV_DYNAMIC
) != 0 ||
1013 (todv
!= NULL
&& (todv
->sdev_flags
& SDEV_DYNAMIC
) != 0)) {
1014 mutex_exit(&sdev_lock
);
1022 * link source to new target in the memory. Regardless of failure, we
1023 * must rele our hold on nvp.
1025 error
= sdev_rnmnode(fromparent
, fromdv
, toparent
, &todv
, nnm
, cred
);
1029 sdcmn_err2(("sdev_rename: renaming %s to %s failed "
1030 " with error %d\n", onm
, nnm
, error
));
1031 mutex_exit(&sdev_lock
);
1037 * unlink from source
1039 rw_enter(&fromparent
->sdev_contents
, RW_READER
);
1040 fromdv
= sdev_cache_lookup(fromparent
, onm
);
1041 if (fromdv
== NULL
) {
1042 rw_exit(&fromparent
->sdev_contents
);
1043 mutex_exit(&sdev_lock
);
1045 sdcmn_err2(("sdev_rename: the source is deleted already\n"));
1049 if (fromdv
->sdev_state
== SDEV_ZOMBIE
) {
1050 rw_exit(&fromparent
->sdev_contents
);
1051 mutex_exit(&sdev_lock
);
1052 VN_RELE(SDEVTOV(fromdv
));
1054 sdcmn_err2(("sdev_rename: the source is being deleted\n"));
1057 rw_exit(&fromparent
->sdev_contents
);
1058 ASSERT(SDEVTOV(fromdv
) == ovp
);
1061 /* clean out the directory contents before it can be removed */
1062 type
= SDEVTOV(fromdv
)->v_type
;
1064 error
= sdev_cleandir(fromdv
, NULL
, 0);
1065 sdcmn_err2(("sdev_rename: cleandir finished with %d\n",
1071 rw_enter(&fromparent
->sdev_contents
, RW_WRITER
);
1072 bkstore
= SDEV_IS_PERSIST(fromdv
) ? 1 : 0;
1073 sdev_cache_update(fromparent
, &fromdv
, onm
,
1075 VN_RELE(SDEVTOV(fromdv
));
1077 /* best effforts clean up the backing store */
1079 ASSERT(fromparent
->sdev_attrvp
);
1081 /* XXXci - We may need to translate the C-I flags on VOP_REMOVE */
1082 error
= VOP_REMOVE(fromparent
->sdev_attrvp
,
1085 /* XXXci - We may need to translate the C-I flags on VOP_RMDIR */
1086 error
= VOP_RMDIR(fromparent
->sdev_attrvp
,
1087 onm
, fromparent
->sdev_attrvp
, kcred
, ct
, 0);
1091 sdcmn_err2(("sdev_rename: device %s is "
1092 "still on disk %s\n", onm
,
1093 fromparent
->sdev_path
));
1097 rw_exit(&fromparent
->sdev_contents
);
1098 mutex_exit(&sdev_lock
);
1100 /* once reached to this point, the rename is regarded successful */
1105 * dev-fs version of "ln -s path dev-name"
1106 * tnm - path, e.g. /devices/... or /dev/...
1111 sdev_symlink(struct vnode
*dvp
, char *lnm
, struct vattr
*tva
,
1112 char *tnm
, struct cred
*cred
, caller_context_t
*ct
, int flags
)
1115 struct vnode
*vp
= NULL
;
1116 struct sdev_node
*parent
= (struct sdev_node
*)VTOSDEV(dvp
);
1117 struct sdev_node
*self
= (struct sdev_node
*)NULL
;
1120 rw_enter(&parent
->sdev_dotdot
->sdev_contents
, RW_READER
);
1121 if (parent
->sdev_state
== SDEV_ZOMBIE
) {
1122 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1123 sdcmn_err2(("sdev_symlink: parent %s is ZOMBIED \n",
1124 parent
->sdev_name
));
1128 if (!SDEV_IS_GLOBAL(parent
)) {
1129 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1132 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1134 /* execute access is required to search a directory */
1135 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0)
1138 /* find existing name */
1139 /* XXXci - We may need to translate the C-I flags here */
1140 error
= VOP_LOOKUP(dvp
, lnm
, &vp
, NULL
, 0, NULL
, cred
, ct
, NULL
, NULL
);
1144 sdcmn_err2(("sdev_symlink: node %s already exists\n", lnm
));
1147 if (error
!= ENOENT
)
1150 /* write access is required to create a symlink */
1151 if ((error
= VOP_ACCESS(dvp
, VWRITE
, 0, cred
, ct
)) != 0)
1154 /* put it into memory cache */
1155 rw_enter(&parent
->sdev_contents
, RW_WRITER
);
1156 error
= sdev_mknode(parent
, lnm
, &self
, tva
, NULL
, (void *)tnm
,
1159 rw_exit(&parent
->sdev_contents
);
1160 sdcmn_err2(("sdev_symlink: node %s creation failed\n", lnm
));
1166 ASSERT(self
&& (self
->sdev_state
== SDEV_READY
));
1167 rw_exit(&parent
->sdev_contents
);
1169 /* take care the timestamps for the node and its parent */
1170 sdev_update_timestamps(SDEVTOV(self
), kcred
,
1171 AT_CTIME
|AT_MTIME
|AT_ATIME
);
1172 sdev_update_timestamps(dvp
, kcred
, AT_MTIME
|AT_ATIME
);
1173 if (SDEV_IS_GLOBAL(parent
))
1174 atomic_inc_ulong(&parent
->sdev_gdir_gen
);
1176 /* wake up other threads blocked on looking up this node */
1177 mutex_enter(&self
->sdev_lookup_lock
);
1178 SDEV_UNBLOCK_OTHERS(self
, SDEV_LOOKUP
);
1179 mutex_exit(&self
->sdev_lookup_lock
);
1180 SDEV_RELE(self
); /* don't return with vnode held */
1186 sdev_mkdir(struct vnode
*dvp
, char *nm
, struct vattr
*va
, struct vnode
**vpp
,
1187 struct cred
*cred
, caller_context_t
*ct
, int flags
, vsecattr_t
*vsecp
)
1190 struct sdev_node
*parent
= (struct sdev_node
*)VTOSDEV(dvp
);
1191 struct sdev_node
*self
= NULL
;
1192 struct vnode
*vp
= NULL
;
1194 ASSERT(parent
&& parent
->sdev_dotdot
);
1195 rw_enter(&parent
->sdev_dotdot
->sdev_contents
, RW_READER
);
1196 if (parent
->sdev_state
== SDEV_ZOMBIE
) {
1197 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1201 /* non-global do not allow pure directory creation */
1202 if (!SDEV_IS_GLOBAL(parent
)) {
1203 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1204 return (prof_lookup(dvp
, nm
, vpp
, cred
));
1206 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1208 /* execute access is required to search the directory */
1209 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0) {
1213 /* find existing name */
1214 /* XXXci - We may need to translate the C-I flags on VOP_LOOKUP */
1215 error
= VOP_LOOKUP(dvp
, nm
, &vp
, NULL
, 0, NULL
, cred
, ct
, NULL
, NULL
);
1220 if (error
!= ENOENT
)
1223 /* require write access to create a directory */
1224 if ((error
= VOP_ACCESS(dvp
, VWRITE
, 0, cred
, ct
)) != 0) {
1228 /* put it into memory */
1229 rw_enter(&parent
->sdev_contents
, RW_WRITER
);
1230 error
= sdev_mknode(parent
, nm
, &self
,
1231 va
, NULL
, NULL
, cred
, SDEV_READY
);
1233 rw_exit(&parent
->sdev_contents
);
1238 ASSERT(self
&& (self
->sdev_state
== SDEV_READY
));
1239 rw_exit(&parent
->sdev_contents
);
1241 /* take care the timestamps for the node and its parent */
1242 sdev_update_timestamps(SDEVTOV(self
), kcred
,
1243 AT_CTIME
|AT_MTIME
|AT_ATIME
);
1244 sdev_update_timestamps(dvp
, kcred
, AT_MTIME
|AT_ATIME
);
1245 if (SDEV_IS_GLOBAL(parent
))
1246 atomic_inc_ulong(&parent
->sdev_gdir_gen
);
1248 /* wake up other threads blocked on looking up this node */
1249 mutex_enter(&self
->sdev_lookup_lock
);
1250 SDEV_UNBLOCK_OTHERS(self
, SDEV_LOOKUP
);
1251 mutex_exit(&self
->sdev_lookup_lock
);
1252 *vpp
= SDEVTOV(self
);
1257 * allowing removing an empty directory under /dev
1261 sdev_rmdir(struct vnode
*dvp
, char *nm
, struct vnode
*cdir
, struct cred
*cred
,
1262 caller_context_t
*ct
, int flags
)
1265 struct sdev_node
*parent
= (struct sdev_node
*)VTOSDEV(dvp
);
1266 struct sdev_node
*self
= NULL
;
1267 struct vnode
*vp
= NULL
;
1269 /* bail out early */
1270 if (strcmp(nm
, ".") == 0)
1272 if (strcmp(nm
, "..") == 0)
1273 return (EEXIST
); /* should be ENOTEMPTY */
1275 /* no destruction of non-global node */
1276 ASSERT(parent
&& parent
->sdev_dotdot
);
1277 rw_enter(&parent
->sdev_dotdot
->sdev_contents
, RW_READER
);
1278 if (!SDEV_IS_GLOBAL(parent
)) {
1279 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1282 rw_exit(&parent
->sdev_dotdot
->sdev_contents
);
1284 /* execute access is required to search the directory */
1285 if ((error
= VOP_ACCESS(dvp
, VEXEC
|VWRITE
, 0, cred
, ct
)) != 0)
1288 /* check existing name */
1289 rw_enter(&parent
->sdev_contents
, RW_WRITER
);
1290 self
= sdev_cache_lookup(parent
, nm
);
1292 rw_exit(&parent
->sdev_contents
);
1297 if ((self
->sdev_state
== SDEV_INIT
) ||
1298 (self
->sdev_state
== SDEV_ZOMBIE
)) {
1299 rw_exit(&parent
->sdev_contents
);
1304 /* some sanity checks */
1305 if (vp
== dvp
|| vp
== cdir
) {
1306 rw_exit(&parent
->sdev_contents
);
1311 if (vp
->v_type
!= VDIR
) {
1312 rw_exit(&parent
->sdev_contents
);
1317 if (vn_vfswlock(vp
)) {
1318 rw_exit(&parent
->sdev_contents
);
1323 if (vn_mountedvfs(vp
) != NULL
) {
1324 rw_exit(&parent
->sdev_contents
);
1331 /* bail out on a non-empty directory */
1332 rw_enter(&self
->sdev_contents
, RW_READER
);
1333 if (self
->sdev_nlink
> 2) {
1334 rw_exit(&self
->sdev_contents
);
1335 rw_exit(&parent
->sdev_contents
);
1340 rw_exit(&self
->sdev_contents
);
1342 /* unlink it from the directory cache */
1343 sdev_cache_update(parent
, &self
, nm
, SDEV_CACHE_DELETE
);
1344 rw_exit(&parent
->sdev_contents
);
1348 /* best effort to clean up the backing store */
1349 if (SDEV_IS_PERSIST(parent
)) {
1350 ASSERT(parent
->sdev_attrvp
);
1351 error
= VOP_RMDIR(parent
->sdev_attrvp
, nm
,
1352 parent
->sdev_attrvp
, kcred
, ct
, flags
);
1355 sdcmn_err2(("sdev_rmdir: cleaning device %s is on"
1356 " disk error %d\n", parent
->sdev_path
, error
));
1366 * read the contents of a symbolic link
1369 sdev_readlink(struct vnode
*vp
, struct uio
*uiop
, struct cred
*cred
,
1370 caller_context_t
*ct
)
1372 struct sdev_node
*dv
;
1375 ASSERT(vp
->v_type
== VLNK
);
1379 if (dv
->sdev_attrvp
) {
1380 /* non-NULL attrvp implys a persisted node at READY state */
1381 return (VOP_READLINK(dv
->sdev_attrvp
, uiop
, cred
, ct
));
1382 } else if (dv
->sdev_symlink
!= NULL
) {
1383 /* memory nodes, e.g. local nodes */
1384 rw_enter(&dv
->sdev_contents
, RW_READER
);
1385 sdcmn_err2(("sdev_readlink link is %s\n", dv
->sdev_symlink
));
1386 error
= uiomove(dv
->sdev_symlink
, strlen(dv
->sdev_symlink
),
1388 rw_exit(&dv
->sdev_contents
);
1397 sdev_readdir(struct vnode
*dvp
, struct uio
*uiop
, struct cred
*cred
, int *eofp
,
1398 caller_context_t
*ct
, int flags
)
1400 struct sdev_node
*parent
= VTOSDEV(dvp
);
1404 * We must check that we have execute access to search the directory --
1405 * but because our sdev_contents lock is already held as a reader (the
1406 * caller must have done a VOP_RWLOCK()), we call directly into the
1407 * underlying access routine if sdev_attr is non-NULL.
1409 if (parent
->sdev_attr
!= NULL
) {
1410 VERIFY(RW_READ_HELD(&parent
->sdev_contents
));
1412 if (sdev_unlocked_access(parent
, VEXEC
, cred
) != 0)
1415 if ((error
= VOP_ACCESS(dvp
, VEXEC
, 0, cred
, ct
)) != 0)
1420 if (!SDEV_IS_GLOBAL(parent
))
1421 prof_filldir(parent
);
1422 return (devname_readdir_func(dvp
, uiop
, cred
, eofp
, SDEV_BROWSE
));
1427 sdev_inactive(struct vnode
*vp
, struct cred
*cred
, caller_context_t
*ct
)
1429 devname_inactive_func(vp
, cred
, NULL
);
1434 sdev_fid(struct vnode
*vp
, struct fid
*fidp
, caller_context_t
*ct
)
1436 struct sdev_node
*dv
= VTOSDEV(vp
);
1437 struct sdev_fid
*sdev_fid
;
1439 if (fidp
->fid_len
< (sizeof (struct sdev_fid
) - sizeof (ushort_t
))) {
1440 fidp
->fid_len
= sizeof (struct sdev_fid
) - sizeof (ushort_t
);
1444 sdev_fid
= (struct sdev_fid
*)fidp
;
1445 bzero(sdev_fid
, sizeof (struct sdev_fid
));
1446 sdev_fid
->sdevfid_len
=
1447 (int)sizeof (struct sdev_fid
) - sizeof (ushort_t
);
1448 sdev_fid
->sdevfid_ino
= dv
->sdev_ino
;
1454 * This pair of routines bracket all VOP_READ, VOP_WRITE
1455 * and VOP_READDIR requests. The contents lock stops things
1456 * moving around while we're looking at them.
1460 sdev_rwlock(struct vnode
*vp
, int write_flag
, caller_context_t
*ctp
)
1462 rw_enter(&VTOSDEV(vp
)->sdev_contents
,
1463 write_flag
? RW_WRITER
: RW_READER
);
1464 return (write_flag
? V_WRITELOCK_TRUE
: V_WRITELOCK_FALSE
);
1469 sdev_rwunlock(struct vnode
*vp
, int write_flag
, caller_context_t
*ctp
)
1471 rw_exit(&VTOSDEV(vp
)->sdev_contents
);
1476 sdev_seek(struct vnode
*vp
, offset_t ooff
, offset_t
*noffp
,
1477 caller_context_t
*ct
)
1479 struct vnode
*attrvp
= VTOSDEV(vp
)->sdev_attrvp
;
1481 ASSERT(vp
->v_type
!= VCHR
&&
1482 vp
->v_type
!= VBLK
&& vp
->v_type
!= VLNK
);
1484 if (vp
->v_type
== VDIR
)
1485 return (fs_seek(vp
, ooff
, noffp
, ct
));
1488 return (VOP_SEEK(attrvp
, ooff
, noffp
, ct
));
1493 sdev_frlock(struct vnode
*vp
, int cmd
, struct flock64
*bfp
, int flag
,
1494 offset_t offset
, struct flk_callback
*flk_cbp
, struct cred
*cr
,
1495 caller_context_t
*ct
)
1498 struct sdev_node
*dv
= VTOSDEV(vp
);
1501 ASSERT(dv
->sdev_attrvp
);
1502 error
= VOP_FRLOCK(dv
->sdev_attrvp
, cmd
, bfp
, flag
, offset
,
1509 sdev_pathconf(vnode_t
*vp
, int cmd
, ulong_t
*valp
, cred_t
*cr
,
1510 caller_context_t
*ct
)
1513 case _PC_ACL_ENABLED
:
1514 *valp
= SDEV_ACL_FLAVOR(vp
);
1518 return (fs_pathconf(vp
, cmd
, valp
, cr
, ct
));
1521 vnodeops_t
*sdev_vnodeops
;
1523 const fs_operation_def_t sdev_vnodeops_tbl
[] = {
1524 VOPNAME_OPEN
, { .vop_open
= sdev_open
},
1525 VOPNAME_CLOSE
, { .vop_close
= sdev_close
},
1526 VOPNAME_READ
, { .vop_read
= sdev_read
},
1527 VOPNAME_WRITE
, { .vop_write
= sdev_write
},
1528 VOPNAME_IOCTL
, { .vop_ioctl
= sdev_ioctl
},
1529 VOPNAME_GETATTR
, { .vop_getattr
= sdev_getattr
},
1530 VOPNAME_SETATTR
, { .vop_setattr
= sdev_setattr
},
1531 VOPNAME_ACCESS
, { .vop_access
= sdev_access
},
1532 VOPNAME_LOOKUP
, { .vop_lookup
= sdev_lookup
},
1533 VOPNAME_CREATE
, { .vop_create
= sdev_create
},
1534 VOPNAME_RENAME
, { .vop_rename
= sdev_rename
},
1535 VOPNAME_REMOVE
, { .vop_remove
= sdev_remove
},
1536 VOPNAME_MKDIR
, { .vop_mkdir
= sdev_mkdir
},
1537 VOPNAME_RMDIR
, { .vop_rmdir
= sdev_rmdir
},
1538 VOPNAME_READDIR
, { .vop_readdir
= sdev_readdir
},
1539 VOPNAME_SYMLINK
, { .vop_symlink
= sdev_symlink
},
1540 VOPNAME_READLINK
, { .vop_readlink
= sdev_readlink
},
1541 VOPNAME_INACTIVE
, { .vop_inactive
= sdev_inactive
},
1542 VOPNAME_FID
, { .vop_fid
= sdev_fid
},
1543 VOPNAME_RWLOCK
, { .vop_rwlock
= sdev_rwlock
},
1544 VOPNAME_RWUNLOCK
, { .vop_rwunlock
= sdev_rwunlock
},
1545 VOPNAME_SEEK
, { .vop_seek
= sdev_seek
},
1546 VOPNAME_FRLOCK
, { .vop_frlock
= sdev_frlock
},
1547 VOPNAME_PATHCONF
, { .vop_pathconf
= sdev_pathconf
},
1548 VOPNAME_SETSECATTR
, { .vop_setsecattr
= sdev_setsecattr
},
1549 VOPNAME_GETSECATTR
, { .vop_getsecattr
= sdev_getsecattr
},
1553 int sdev_vnodeops_tbl_size
= sizeof (sdev_vnodeops_tbl
);