]> git.proxmox.com Git - mirror_zfs.git/blame - module/zfs/zfs_vnops.c
OpenZFS 9235 - rename zpool_rewind_policy_t to zpool_load_policy_t
[mirror_zfs.git] / module / zfs / zfs_vnops.c
CommitLineData
34dc7c2f
BB
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
9b7b9cd3 21
34dc7c2f 22/*
428870ff 23 * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
19d55079 24 * Copyright (c) 2012, 2015 by Delphix. All rights reserved.
5475aada 25 * Copyright (c) 2015 by Chunwei Chen. All rights reserved.
9b7b9cd3 26 * Copyright 2017 Nexenta Systems, Inc.
34dc7c2f
BB
27 */
28
29/* Portions Copyright 2007 Jeremy Teo */
428870ff 30/* Portions Copyright 2010 Robert Milkowski */
34dc7c2f 31
60101509 32
34dc7c2f
BB
33#include <sys/types.h>
34#include <sys/param.h>
35#include <sys/time.h>
34dc7c2f 36#include <sys/sysmacros.h>
34dc7c2f 37#include <sys/vfs.h>
34dc7c2f
BB
38#include <sys/file.h>
39#include <sys/stat.h>
40#include <sys/kmem.h>
41#include <sys/taskq.h>
42#include <sys/uio.h>
43#include <sys/vmsystm.h>
44#include <sys/atomic.h>
34dc7c2f
BB
45#include <sys/pathname.h>
46#include <sys/cmn_err.h>
47#include <sys/errno.h>
34dc7c2f
BB
48#include <sys/zfs_dir.h>
49#include <sys/zfs_acl.h>
50#include <sys/zfs_ioctl.h>
51#include <sys/fs/zfs.h>
52#include <sys/dmu.h>
428870ff 53#include <sys/dmu_objset.h>
34dc7c2f
BB
54#include <sys/spa.h>
55#include <sys/txg.h>
56#include <sys/dbuf.h>
57#include <sys/zap.h>
428870ff 58#include <sys/sa.h>
34dc7c2f
BB
59#include <sys/policy.h>
60#include <sys/sunddi.h>
b128c09f 61#include <sys/sid.h>
bcf30822 62#include <sys/mode.h>
ebe7e575 63#include <sys/zfs_ctldir.h>
34dc7c2f 64#include <sys/zfs_fuid.h>
428870ff 65#include <sys/zfs_sa.h>
e5c39b95 66#include <sys/zfs_vnops.h>
34dc7c2f 67#include <sys/zfs_rlock.h>
428870ff 68#include <sys/cred.h>
218b8eaf 69#include <sys/zpl.h>
1ce23dca 70#include <sys/zil.h>
9c5167d1 71#include <sys/sa_impl.h>
34dc7c2f
BB
72
73/*
74 * Programming rules.
75 *
76 * Each vnode op performs some logical unit of work. To do this, the ZPL must
77 * properly lock its in-core state, create a DMU transaction, do the work,
78 * record this work in the intent log (ZIL), commit the DMU transaction,
79 * and wait for the intent log to commit if it is a synchronous operation.
80 * Moreover, the vnode ops must work in both normal and log replay context.
81 * The ordering of events is important to avoid deadlocks and references
82 * to freed memory. The example below illustrates the following Big Rules:
83 *
84 * (1) A check must be made in each zfs thread for a mounted file system.
0037b49e
BB
85 * This is done avoiding races using ZFS_ENTER(zfsvfs).
86 * A ZFS_EXIT(zfsvfs) is needed before all returns. Any znodes
34dc7c2f
BB
87 * must be checked with ZFS_VERIFY_ZP(zp). Both of these macros
88 * can return EIO from the calling function.
89 *
3558fd73 90 * (2) iput() should always be the last thing except for zil_commit()
34dc7c2f
BB
91 * (if necessary) and ZFS_EXIT(). This is for 3 reasons:
92 * First, if it's the last reference, the vnode/znode
93 * can be freed, so the zp may point to freed memory. Second, the last
94 * reference will call zfs_zinactive(), which may induce a lot of work --
95 * pushing cached pages (which acquires range locks) and syncing out
96 * cached atime changes. Third, zfs_zinactive() may require a new tx,
97 * which could deadlock the system if you were already holding one.
0a50679c 98 * If you must call iput() within a tx then use zfs_iput_async().
34dc7c2f
BB
99 *
100 * (3) All range locks must be grabbed before calling dmu_tx_assign(),
101 * as they can span dmu_tx_assign() calls.
102 *
384f8a09
MA
103 * (4) If ZPL locks are held, pass TXG_NOWAIT as the second argument to
104 * dmu_tx_assign(). This is critical because we don't want to block
105 * while holding locks.
106 *
107 * If no ZPL locks are held (aside from ZFS_ENTER()), use TXG_WAIT. This
108 * reduces lock contention and CPU usage when we must wait (note that if
109 * throughput is constrained by the storage, nearly every transaction
110 * must wait).
111 *
112 * Note, in particular, that if a lock is sometimes acquired before
113 * the tx assigns, and sometimes after (e.g. z_lock), then failing
114 * to use a non-blocking assign can deadlock the system. The scenario:
34dc7c2f
BB
115 *
116 * Thread A has grabbed a lock before calling dmu_tx_assign().
117 * Thread B is in an already-assigned tx, and blocks for this lock.
118 * Thread A calls dmu_tx_assign(TXG_WAIT) and blocks in txg_wait_open()
119 * forever, because the previous txg can't quiesce until B's tx commits.
120 *
0037b49e 121 * If dmu_tx_assign() returns ERESTART and zfsvfs->z_assign is TXG_NOWAIT,
e8b96c60 122 * then drop all locks, call dmu_tx_wait(), and try again. On subsequent
0735ecb3 123 * calls to dmu_tx_assign(), pass TXG_NOTHROTTLE in addition to TXG_NOWAIT,
e8b96c60
MA
124 * to indicate that this operation has already called dmu_tx_wait().
125 * This will ensure that we don't retry forever, waiting a short bit
126 * each time.
34dc7c2f
BB
127 *
128 * (5) If the operation succeeded, generate the intent log entry for it
129 * before dropping locks. This ensures that the ordering of events
130 * in the intent log matches the order in which they actually occurred.
d3cc8b15 131 * During ZIL replay the zfs_log_* functions will update the sequence
fb5f0bc8 132 * number to indicate the zil transaction has replayed.
34dc7c2f
BB
133 *
134 * (6) At the end of each vnode op, the DMU tx must always commit,
135 * regardless of whether there were any errors.
136 *
572e2857 137 * (7) After dropping all locks, invoke zil_commit(zilog, foid)
34dc7c2f
BB
138 * to ensure that synchronous semantics are provided when necessary.
139 *
140 * In general, this is how things should be ordered in each vnode op:
141 *
0037b49e 142 * ZFS_ENTER(zfsvfs); // exit if unmounted
34dc7c2f 143 * top:
3558fd73 144 * zfs_dirent_lock(&dl, ...) // lock directory entry (may igrab())
34dc7c2f
BB
145 * rw_enter(...); // grab any other locks you need
146 * tx = dmu_tx_create(...); // get DMU tx
147 * dmu_tx_hold_*(); // hold each object you might modify
0735ecb3 148 * error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
149 * if (error) {
150 * rw_exit(...); // drop locks
151 * zfs_dirent_unlock(dl); // unlock directory entry
3558fd73 152 * iput(...); // release held vnodes
fb5f0bc8 153 * if (error == ERESTART) {
e8b96c60 154 * waited = B_TRUE;
34dc7c2f
BB
155 * dmu_tx_wait(tx);
156 * dmu_tx_abort(tx);
157 * goto top;
158 * }
159 * dmu_tx_abort(tx); // abort DMU tx
0037b49e 160 * ZFS_EXIT(zfsvfs); // finished in zfs
34dc7c2f
BB
161 * return (error); // really out of space
162 * }
163 * error = do_real_work(); // do whatever this VOP does
164 * if (error == 0)
165 * zfs_log_*(...); // on success, make ZIL entry
166 * dmu_tx_commit(tx); // commit DMU tx -- error or not
167 * rw_exit(...); // drop locks
168 * zfs_dirent_unlock(dl); // unlock directory entry
3558fd73 169 * iput(...); // release held vnodes
572e2857 170 * zil_commit(zilog, foid); // synchronous when necessary
0037b49e 171 * ZFS_EXIT(zfsvfs); // finished in zfs
34dc7c2f
BB
172 * return (error); // done, report error
173 */
174
126400a1
BB
175/*
176 * Virus scanning is unsupported. It would be possible to add a hook
177 * here to performance the required virus scan. This could be done
178 * entirely in the kernel or potentially as an update to invoke a
179 * scanning utility.
180 */
181static int
182zfs_vscan(struct inode *ip, cred_t *cr, int async)
183{
184 return (0);
185}
186
187/* ARGSUSED */
188int
189zfs_open(struct inode *ip, int mode, int flag, cred_t *cr)
190{
191 znode_t *zp = ITOZ(ip);
0037b49e 192 zfsvfs_t *zfsvfs = ITOZSB(ip);
126400a1 193
0037b49e 194 ZFS_ENTER(zfsvfs);
126400a1
BB
195 ZFS_VERIFY_ZP(zp);
196
197 /* Honor ZFS_APPENDONLY file attribute */
198 if ((mode & FMODE_WRITE) && (zp->z_pflags & ZFS_APPENDONLY) &&
199 ((flag & O_APPEND) == 0)) {
0037b49e 200 ZFS_EXIT(zfsvfs);
2e528b49 201 return (SET_ERROR(EPERM));
126400a1
BB
202 }
203
204 /* Virus scan eligible files on open */
0037b49e 205 if (!zfs_has_ctldir(zp) && zfsvfs->z_vscan && S_ISREG(ip->i_mode) &&
126400a1
BB
206 !(zp->z_pflags & ZFS_AV_QUARANTINED) && zp->z_size > 0) {
207 if (zfs_vscan(ip, cr, 0) != 0) {
0037b49e 208 ZFS_EXIT(zfsvfs);
2e528b49 209 return (SET_ERROR(EACCES));
126400a1
BB
210 }
211 }
212
213 /* Keep a count of the synchronous opens in the znode */
214 if (flag & O_SYNC)
215 atomic_inc_32(&zp->z_sync_cnt);
216
0037b49e 217 ZFS_EXIT(zfsvfs);
126400a1
BB
218 return (0);
219}
126400a1
BB
220
221/* ARGSUSED */
222int
223zfs_close(struct inode *ip, int flag, cred_t *cr)
224{
225 znode_t *zp = ITOZ(ip);
0037b49e 226 zfsvfs_t *zfsvfs = ITOZSB(ip);
126400a1 227
0037b49e 228 ZFS_ENTER(zfsvfs);
126400a1
BB
229 ZFS_VERIFY_ZP(zp);
230
7dc71949 231 /* Decrement the synchronous opens in the znode */
126400a1 232 if (flag & O_SYNC)
7dc71949 233 atomic_dec_32(&zp->z_sync_cnt);
126400a1 234
0037b49e 235 if (!zfs_has_ctldir(zp) && zfsvfs->z_vscan && S_ISREG(ip->i_mode) &&
126400a1
BB
236 !(zp->z_pflags & ZFS_AV_QUARANTINED) && zp->z_size > 0)
237 VERIFY(zfs_vscan(ip, cr, 1) == 0);
238
0037b49e 239 ZFS_EXIT(zfsvfs);
8780c539 240 return (0);
126400a1 241}
126400a1 242
802e7b5f 243#if defined(SEEK_HOLE) && defined(SEEK_DATA)
cf91b2b6 244/*
802e7b5f
LD
245 * Lseek support for finding holes (cmd == SEEK_HOLE) and
246 * data (cmd == SEEK_DATA). "off" is an in/out parameter.
cf91b2b6
MA
247 */
248static int
802e7b5f 249zfs_holey_common(struct inode *ip, int cmd, loff_t *off)
cf91b2b6 250{
802e7b5f 251 znode_t *zp = ITOZ(ip);
cf91b2b6
MA
252 uint64_t noff = (uint64_t)*off; /* new offset */
253 uint64_t file_sz;
254 int error;
255 boolean_t hole;
256
257 file_sz = zp->z_size;
258 if (noff >= file_sz) {
2e528b49 259 return (SET_ERROR(ENXIO));
cf91b2b6
MA
260 }
261
802e7b5f 262 if (cmd == SEEK_HOLE)
cf91b2b6
MA
263 hole = B_TRUE;
264 else
265 hole = B_FALSE;
266
802e7b5f 267 error = dmu_offset_next(ZTOZSB(zp)->z_os, zp->z_id, hole, &noff);
cf91b2b6 268
d97aa48f 269 if (error == ESRCH)
2e528b49 270 return (SET_ERROR(ENXIO));
d97aa48f 271
6e03ec4f
DB
272 /* file was dirty, so fall back to using generic logic */
273 if (error == EBUSY) {
274 if (hole)
275 *off = file_sz;
276
277 return (0);
278 }
66aca247 279
d97aa48f
MA
280 /*
281 * We could find a hole that begins after the logical end-of-file,
282 * because dmu_offset_next() only works on whole blocks. If the
283 * EOF falls mid-block, then indicate that the "virtual hole"
284 * at the end of the file begins at the logical EOF, rather than
285 * at the end of the last block.
286 */
287 if (noff > file_sz) {
288 ASSERT(hole);
289 noff = file_sz;
cf91b2b6
MA
290 }
291
292 if (noff < *off)
293 return (error);
294 *off = noff;
295 return (error);
296}
802e7b5f
LD
297
298int
299zfs_holey(struct inode *ip, int cmd, loff_t *off)
300{
301 znode_t *zp = ITOZ(ip);
0037b49e 302 zfsvfs_t *zfsvfs = ITOZSB(ip);
802e7b5f
LD
303 int error;
304
0037b49e 305 ZFS_ENTER(zfsvfs);
802e7b5f
LD
306 ZFS_VERIFY_ZP(zp);
307
308 error = zfs_holey_common(ip, cmd, off);
309
0037b49e 310 ZFS_EXIT(zfsvfs);
802e7b5f
LD
311 return (error);
312}
802e7b5f 313#endif /* SEEK_HOLE && SEEK_DATA */
cf91b2b6 314
c0d35759 315#if defined(_KERNEL)
34dc7c2f
BB
316/*
317 * When a file is memory mapped, we must keep the IO data synchronized
318 * between the DMU cache and the memory mapped pages. What this means:
319 *
320 * On Write: If we find a memory mapped page, we write to *both*
321 * the page and the dmu buffer.
34dc7c2f 322 */
d164b209 323static void
c0d35759
BB
324update_pages(struct inode *ip, int64_t start, int len,
325 objset_t *os, uint64_t oid)
34dc7c2f 326{
c0d35759
BB
327 struct address_space *mp = ip->i_mapping;
328 struct page *pp;
329 uint64_t nbytes;
d164b209 330 int64_t off;
c0d35759 331 void *pb;
34dc7c2f 332
8b1899d3
BB
333 off = start & (PAGE_SIZE-1);
334 for (start &= PAGE_MASK; len > 0; start += PAGE_SIZE) {
335 nbytes = MIN(PAGE_SIZE - off, len);
34dc7c2f 336
8b1899d3 337 pp = find_lock_page(mp, start >> PAGE_SHIFT);
c0d35759
BB
338 if (pp) {
339 if (mapping_writably_mapped(mp))
340 flush_dcache_page(pp);
34dc7c2f 341
c0d35759
BB
342 pb = kmap(pp);
343 (void) dmu_read(os, oid, start+off, nbytes, pb+off,
9babb374 344 DMU_READ_PREFETCH);
c0d35759
BB
345 kunmap(pp);
346
347 if (mapping_writably_mapped(mp))
348 flush_dcache_page(pp);
349
350 mark_page_accessed(pp);
351 SetPageUptodate(pp);
352 ClearPageError(pp);
353 unlock_page(pp);
8b1899d3 354 put_page(pp);
34dc7c2f 355 }
c0d35759 356
d164b209 357 len -= nbytes;
34dc7c2f 358 off = 0;
34dc7c2f 359 }
34dc7c2f
BB
360}
361
362/*
363 * When a file is memory mapped, we must keep the IO data synchronized
364 * between the DMU cache and the memory mapped pages. What this means:
365 *
366 * On Read: We "read" preferentially from memory mapped pages,
367 * else we default from the dmu buffer.
368 *
369 * NOTE: We will always "break up" the IO into PAGESIZE uiomoves when
d3cc8b15 370 * the file is memory mapped.
34dc7c2f
BB
371 */
372static int
3558fd73 373mappedread(struct inode *ip, int nbytes, uio_t *uio)
34dc7c2f 374{
c0d35759
BB
375 struct address_space *mp = ip->i_mapping;
376 struct page *pp;
3558fd73 377 znode_t *zp = ITOZ(ip);
34dc7c2f 378 int64_t start, off;
c0d35759 379 uint64_t bytes;
34dc7c2f
BB
380 int len = nbytes;
381 int error = 0;
c0d35759 382 void *pb;
34dc7c2f
BB
383
384 start = uio->uio_loffset;
8b1899d3
BB
385 off = start & (PAGE_SIZE-1);
386 for (start &= PAGE_MASK; len > 0; start += PAGE_SIZE) {
387 bytes = MIN(PAGE_SIZE - off, len);
c0d35759 388
8b1899d3 389 pp = find_lock_page(mp, start >> PAGE_SHIFT);
c0d35759
BB
390 if (pp) {
391 ASSERT(PageUptodate(pp));
b2ab468d 392 unlock_page(pp);
c0d35759
BB
393
394 pb = kmap(pp);
395 error = uiomove(pb + off, bytes, UIO_READ, uio);
396 kunmap(pp);
397
398 if (mapping_writably_mapped(mp))
399 flush_dcache_page(pp);
400
401 mark_page_accessed(pp);
8b1899d3 402 put_page(pp);
34dc7c2f 403 } else {
804e0504
MA
404 error = dmu_read_uio_dbuf(sa_get_db(zp->z_sa_hdl),
405 uio, bytes);
34dc7c2f 406 }
c0d35759 407
34dc7c2f
BB
408 len -= bytes;
409 off = 0;
410 if (error)
411 break;
412 }
413 return (error);
414}
c0d35759 415#endif /* _KERNEL */
34dc7c2f 416
c409e464 417unsigned long zfs_read_chunk_size = 1024 * 1024; /* Tunable */
a966c564 418unsigned long zfs_delete_blocks = DMU_MAX_DELETEBLKCNT;
34dc7c2f
BB
419
420/*
421 * Read bytes from specified file into supplied buffer.
422 *
3558fd73 423 * IN: ip - inode of file to be read from.
34dc7c2f
BB
424 * uio - structure supplying read location, range info,
425 * and return buffer.
c0d35759
BB
426 * ioflag - FSYNC flags; used to provide FRSYNC semantics.
427 * O_DIRECT flag; used to bypass page cache.
34dc7c2f 428 * cr - credentials of caller.
34dc7c2f
BB
429 *
430 * OUT: uio - updated offset and range, buffer filled.
431 *
d3cc8b15 432 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
433 *
434 * Side Effects:
3558fd73 435 * inode - atime updated if byte count > 0
34dc7c2f
BB
436 */
437/* ARGSUSED */
e5c39b95 438int
3558fd73 439zfs_read(struct inode *ip, uio_t *uio, int ioflag, cred_t *cr)
34dc7c2f 440{
3558fd73 441 znode_t *zp = ITOZ(ip);
0037b49e 442 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f 443 ssize_t n, nbytes;
149e873a 444 int error = 0;
34dc7c2f 445 rl_t *rl;
3558fd73 446#ifdef HAVE_UIO_ZEROCOPY
428870ff 447 xuio_t *xuio = NULL;
3558fd73 448#endif /* HAVE_UIO_ZEROCOPY */
34dc7c2f 449
0037b49e 450 ZFS_ENTER(zfsvfs);
34dc7c2f 451 ZFS_VERIFY_ZP(zp);
34dc7c2f 452
428870ff 453 if (zp->z_pflags & ZFS_AV_QUARANTINED) {
0037b49e 454 ZFS_EXIT(zfsvfs);
2e528b49 455 return (SET_ERROR(EACCES));
34dc7c2f
BB
456 }
457
458 /*
459 * Validate file offset
460 */
461 if (uio->uio_loffset < (offset_t)0) {
0037b49e 462 ZFS_EXIT(zfsvfs);
2e528b49 463 return (SET_ERROR(EINVAL));
34dc7c2f
BB
464 }
465
466 /*
467 * Fasttrack empty reads
468 */
469 if (uio->uio_resid == 0) {
0037b49e 470 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
471 return (0);
472 }
473
34dc7c2f
BB
474 /*
475 * If we're in FRSYNC mode, sync out this znode before reading it.
37699482 476 * Only do this for non-snapshots.
34dc7c2f 477 */
37699482
CC
478 if (zfsvfs->z_log &&
479 (ioflag & FRSYNC || zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS))
0037b49e 480 zil_commit(zfsvfs->z_log, zp->z_id);
34dc7c2f
BB
481
482 /*
483 * Lock the range against changes.
484 */
d88895a0
CC
485 rl = zfs_range_lock(&zp->z_range_lock, uio->uio_loffset, uio->uio_resid,
486 RL_READER);
34dc7c2f
BB
487
488 /*
489 * If we are reading past end-of-file we can skip
490 * to the end; but we might still need to set atime.
491 */
428870ff 492 if (uio->uio_loffset >= zp->z_size) {
34dc7c2f
BB
493 error = 0;
494 goto out;
495 }
496
428870ff
BB
497 ASSERT(uio->uio_loffset < zp->z_size);
498 n = MIN(uio->uio_resid, zp->z_size - uio->uio_loffset);
499
3558fd73 500#ifdef HAVE_UIO_ZEROCOPY
428870ff
BB
501 if ((uio->uio_extflg == UIO_XUIO) &&
502 (((xuio_t *)uio)->xu_type == UIOTYPE_ZEROCOPY)) {
503 int nblk;
504 int blksz = zp->z_blksz;
505 uint64_t offset = uio->uio_loffset;
506
507 xuio = (xuio_t *)uio;
508 if ((ISP2(blksz))) {
509 nblk = (P2ROUNDUP(offset + n, blksz) - P2ALIGN(offset,
510 blksz)) / blksz;
511 } else {
512 ASSERT(offset + n <= blksz);
513 nblk = 1;
514 }
515 (void) dmu_xuio_init(xuio, nblk);
516
3558fd73 517 if (vn_has_cached_data(ip)) {
428870ff
BB
518 /*
519 * For simplicity, we always allocate a full buffer
520 * even if we only expect to read a portion of a block.
521 */
522 while (--nblk >= 0) {
523 (void) dmu_xuio_add(xuio,
524 dmu_request_arcbuf(sa_get_db(zp->z_sa_hdl),
525 blksz), 0, blksz);
526 }
527 }
528 }
3558fd73 529#endif /* HAVE_UIO_ZEROCOPY */
34dc7c2f
BB
530
531 while (n > 0) {
532 nbytes = MIN(n, zfs_read_chunk_size -
533 P2PHASE(uio->uio_loffset, zfs_read_chunk_size));
534
804e0504 535 if (zp->z_is_mapped && !(ioflag & O_DIRECT)) {
3558fd73 536 error = mappedread(ip, nbytes, uio);
804e0504
MA
537 } else {
538 error = dmu_read_uio_dbuf(sa_get_db(zp->z_sa_hdl),
539 uio, nbytes);
540 }
c0d35759 541
b128c09f
BB
542 if (error) {
543 /* convert checksum errors into IO errors */
544 if (error == ECKSUM)
2e528b49 545 error = SET_ERROR(EIO);
34dc7c2f 546 break;
b128c09f 547 }
34dc7c2f
BB
548
549 n -= nbytes;
550 }
34dc7c2f
BB
551out:
552 zfs_range_unlock(rl);
553
0037b49e 554 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
555 return (error);
556}
557
34dc7c2f
BB
558/*
559 * Write the bytes to a file.
560 *
3558fd73 561 * IN: ip - inode of file to be written to.
34dc7c2f
BB
562 * uio - structure supplying write location, range info,
563 * and data buffer.
564 * ioflag - FAPPEND flag set if in append mode.
c0d35759 565 * O_DIRECT flag; used to bypass page cache.
34dc7c2f 566 * cr - credentials of caller.
34dc7c2f
BB
567 *
568 * OUT: uio - updated offset and range.
569 *
570 * RETURN: 0 if success
571 * error code if failure
572 *
573 * Timestamps:
3558fd73 574 * ip - ctime|mtime updated if byte count > 0
34dc7c2f 575 */
428870ff 576
34dc7c2f 577/* ARGSUSED */
e5c39b95 578int
3558fd73 579zfs_write(struct inode *ip, uio_t *uio, int ioflag, cred_t *cr)
34dc7c2f 580{
3558fd73
BB
581 znode_t *zp = ITOZ(ip);
582 rlim64_t limit = uio->uio_limit;
34dc7c2f
BB
583 ssize_t start_resid = uio->uio_resid;
584 ssize_t tx_bytes;
585 uint64_t end_size;
586 dmu_tx_t *tx;
0037b49e 587 zfsvfs_t *zfsvfs = ZTOZSB(zp);
34dc7c2f
BB
588 zilog_t *zilog;
589 offset_t woff;
590 ssize_t n, nbytes;
591 rl_t *rl;
0037b49e 592 int max_blksz = zfsvfs->z_max_blksz;
3558fd73 593 int error = 0;
9babb374 594 arc_buf_t *abuf;
5475aada 595 const iovec_t *aiov = NULL;
428870ff 596 xuio_t *xuio = NULL;
428870ff
BB
597 int write_eof;
598 int count = 0;
599 sa_bulk_attr_t bulk[4];
600 uint64_t mtime[2], ctime[2];
2c6abf15 601 uint32_t uid;
5a6765cf 602#ifdef HAVE_UIO_ZEROCOPY
603 int i_iov = 0;
604 const iovec_t *iovp = uio->uio_iov;
3558fd73 605 ASSERTV(int iovcnt = uio->uio_iovcnt);
5a6765cf 606#endif
34dc7c2f 607
34dc7c2f
BB
608 /*
609 * Fasttrack empty write
610 */
611 n = start_resid;
612 if (n == 0)
613 return (0);
614
615 if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
616 limit = MAXOFFSET_T;
617
0037b49e 618 ZFS_ENTER(zfsvfs);
34dc7c2f 619 ZFS_VERIFY_ZP(zp);
b128c09f 620
0037b49e
BB
621 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_MTIME(zfsvfs), NULL, &mtime, 16);
622 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_CTIME(zfsvfs), NULL, &ctime, 16);
623 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_SIZE(zfsvfs), NULL,
624 &zp->z_size, 8);
625 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_FLAGS(zfsvfs), NULL,
428870ff
BB
626 &zp->z_pflags, 8);
627
f3c9dca0
MT
628 /*
629 * Callers might not be able to detect properly that we are read-only,
630 * so check it explicitly here.
631 */
0037b49e
BB
632 if (zfs_is_readonly(zfsvfs)) {
633 ZFS_EXIT(zfsvfs);
f3c9dca0
MT
634 return (SET_ERROR(EROFS));
635 }
636
b128c09f
BB
637 /*
638 * If immutable or not appending then return EPERM
639 */
428870ff
BB
640 if ((zp->z_pflags & (ZFS_IMMUTABLE | ZFS_READONLY)) ||
641 ((zp->z_pflags & ZFS_APPENDONLY) && !(ioflag & FAPPEND) &&
642 (uio->uio_loffset < zp->z_size))) {
0037b49e 643 ZFS_EXIT(zfsvfs);
2e528b49 644 return (SET_ERROR(EPERM));
b128c09f
BB
645 }
646
0037b49e 647 zilog = zfsvfs->z_log;
34dc7c2f 648
428870ff
BB
649 /*
650 * Validate file offset
651 */
652 woff = ioflag & FAPPEND ? zp->z_size : uio->uio_loffset;
653 if (woff < 0) {
0037b49e 654 ZFS_EXIT(zfsvfs);
2e528b49 655 return (SET_ERROR(EINVAL));
428870ff
BB
656 }
657
34dc7c2f
BB
658 /*
659 * Pre-fault the pages to ensure slow (eg NFS) pages
660 * don't hold up txg.
428870ff 661 * Skip this if uio contains loaned arc_buf.
34dc7c2f 662 */
9cac042c 663#ifdef HAVE_UIO_ZEROCOPY
428870ff
BB
664 if ((uio->uio_extflg == UIO_XUIO) &&
665 (((xuio_t *)uio)->xu_type == UIOTYPE_ZEROCOPY))
666 xuio = (xuio_t *)uio;
667 else
9cac042c 668#endif
572e2857 669 uio_prefaultpages(MIN(n, max_blksz), uio);
34dc7c2f
BB
670
671 /*
672 * If in append mode, set the io offset pointer to eof.
673 */
674 if (ioflag & FAPPEND) {
675 /*
428870ff
BB
676 * Obtain an appending range lock to guarantee file append
677 * semantics. We reset the write offset once we have the lock.
34dc7c2f 678 */
d88895a0 679 rl = zfs_range_lock(&zp->z_range_lock, 0, n, RL_APPEND);
428870ff 680 woff = rl->r_off;
34dc7c2f 681 if (rl->r_len == UINT64_MAX) {
428870ff
BB
682 /*
683 * We overlocked the file because this write will cause
684 * the file block size to increase.
685 * Note that zp_size cannot change with this lock held.
686 */
687 woff = zp->z_size;
34dc7c2f 688 }
428870ff 689 uio->uio_loffset = woff;
34dc7c2f 690 } else {
34dc7c2f 691 /*
428870ff
BB
692 * Note that if the file block size will change as a result of
693 * this write, then this range lock will lock the entire file
694 * so that we can re-write the block safely.
34dc7c2f 695 */
d88895a0 696 rl = zfs_range_lock(&zp->z_range_lock, woff, n, RL_WRITER);
34dc7c2f
BB
697 }
698
699 if (woff >= limit) {
700 zfs_range_unlock(rl);
0037b49e 701 ZFS_EXIT(zfsvfs);
2e528b49 702 return (SET_ERROR(EFBIG));
34dc7c2f
BB
703 }
704
705 if ((woff + n) > limit || woff > (limit - n))
706 n = limit - woff;
707
428870ff
BB
708 /* Will this write extend the file length? */
709 write_eof = (woff + n > zp->z_size);
710
711 end_size = MAX(zp->z_size, woff + n);
34dc7c2f
BB
712
713 /*
714 * Write the file in reasonable size chunks. Each chunk is written
715 * in a separate transaction; this keeps the intent log records small
716 * and allows us to do more fine-grained space accounting.
717 */
718 while (n > 0) {
9babb374
BB
719 abuf = NULL;
720 woff = uio->uio_loffset;
9c5167d1
NF
721 if (zfs_id_overblockquota(zfsvfs, DMU_USERUSED_OBJECT,
722 KUID_TO_SUID(ip->i_uid)) ||
723 zfs_id_overblockquota(zfsvfs, DMU_GROUPUSED_OBJECT,
724 KGID_TO_SGID(ip->i_gid)) ||
725 (zp->z_projid != ZFS_DEFAULT_PROJID &&
726 zfs_id_overblockquota(zfsvfs, DMU_PROJECTUSED_OBJECT,
727 zp->z_projid))) {
9babb374
BB
728 if (abuf != NULL)
729 dmu_return_arcbuf(abuf);
2e528b49 730 error = SET_ERROR(EDQUOT);
9babb374
BB
731 break;
732 }
733
428870ff 734 if (xuio && abuf == NULL) {
5a6765cf 735#ifdef HAVE_UIO_ZEROCOPY
428870ff 736 ASSERT(i_iov < iovcnt);
5475aada 737 ASSERT3U(uio->uio_segflg, !=, UIO_BVEC);
428870ff
BB
738 aiov = &iovp[i_iov];
739 abuf = dmu_xuio_arcbuf(xuio, i_iov);
740 dmu_xuio_clear(xuio, i_iov);
428870ff
BB
741 ASSERT((aiov->iov_base == abuf->b_data) ||
742 ((char *)aiov->iov_base - (char *)abuf->b_data +
743 aiov->iov_len == arc_buf_size(abuf)));
744 i_iov++;
5a6765cf 745#endif
428870ff
BB
746 } else if (abuf == NULL && n >= max_blksz &&
747 woff >= zp->z_size &&
9babb374
BB
748 P2PHASE(woff, max_blksz) == 0 &&
749 zp->z_blksz == max_blksz) {
428870ff
BB
750 /*
751 * This write covers a full block. "Borrow" a buffer
752 * from the dmu so that we can fill it before we enter
753 * a transaction. This avoids the possibility of
754 * holding up the transaction if the data copy hangs
755 * up on a pagefault (e.g., from an NFS server mapping).
756 */
9babb374
BB
757 size_t cbytes;
758
428870ff
BB
759 abuf = dmu_request_arcbuf(sa_get_db(zp->z_sa_hdl),
760 max_blksz);
9babb374
BB
761 ASSERT(abuf != NULL);
762 ASSERT(arc_buf_size(abuf) == max_blksz);
149e873a
BB
763 if ((error = uiocopy(abuf->b_data, max_blksz,
764 UIO_WRITE, uio, &cbytes))) {
9babb374
BB
765 dmu_return_arcbuf(abuf);
766 break;
767 }
768 ASSERT(cbytes == max_blksz);
769 }
770
34dc7c2f
BB
771 /*
772 * Start a transaction.
773 */
0037b49e 774 tx = dmu_tx_create(zfsvfs->z_os);
428870ff 775 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
34dc7c2f 776 dmu_tx_hold_write(tx, zp->z_id, woff, MIN(n, max_blksz));
428870ff 777 zfs_sa_upgrade_txholds(tx, zp);
384f8a09 778 error = dmu_tx_assign(tx, TXG_WAIT);
34dc7c2f 779 if (error) {
34dc7c2f 780 dmu_tx_abort(tx);
9babb374
BB
781 if (abuf != NULL)
782 dmu_return_arcbuf(abuf);
34dc7c2f
BB
783 break;
784 }
785
786 /*
787 * If zfs_range_lock() over-locked we grow the blocksize
788 * and then reduce the lock range. This will only happen
789 * on the first iteration since zfs_range_reduce() will
790 * shrink down r_len to the appropriate size.
791 */
792 if (rl->r_len == UINT64_MAX) {
793 uint64_t new_blksz;
794
795 if (zp->z_blksz > max_blksz) {
f1512ee6
MA
796 /*
797 * File's blocksize is already larger than the
798 * "recordsize" property. Only let it grow to
799 * the next power of 2.
800 */
34dc7c2f 801 ASSERT(!ISP2(zp->z_blksz));
f1512ee6
MA
802 new_blksz = MIN(end_size,
803 1 << highbit64(zp->z_blksz));
34dc7c2f
BB
804 } else {
805 new_blksz = MIN(end_size, max_blksz);
806 }
807 zfs_grow_blocksize(zp, new_blksz, tx);
808 zfs_range_reduce(rl, woff, n);
809 }
810
811 /*
812 * XXX - should we really limit each write to z_max_blksz?
813 * Perhaps we should use SPA_MAXBLOCKSIZE chunks?
814 */
815 nbytes = MIN(n, max_blksz - P2PHASE(woff, max_blksz));
34dc7c2f 816
9babb374
BB
817 if (abuf == NULL) {
818 tx_bytes = uio->uio_resid;
428870ff
BB
819 error = dmu_write_uio_dbuf(sa_get_db(zp->z_sa_hdl),
820 uio, nbytes, tx);
9babb374
BB
821 tx_bytes -= uio->uio_resid;
822 } else {
823 tx_bytes = nbytes;
428870ff
BB
824 ASSERT(xuio == NULL || tx_bytes == aiov->iov_len);
825 /*
826 * If this is not a full block write, but we are
827 * extending the file past EOF and this data starts
828 * block-aligned, use assign_arcbuf(). Otherwise,
829 * write via dmu_write().
830 */
831 if (tx_bytes < max_blksz && (!write_eof ||
832 aiov->iov_base != abuf->b_data)) {
833 ASSERT(xuio);
0037b49e 834 dmu_write(zfsvfs->z_os, zp->z_id, woff,
94183a9d 835 /* cppcheck-suppress nullPointer */
428870ff
BB
836 aiov->iov_len, aiov->iov_base, tx);
837 dmu_return_arcbuf(abuf);
838 xuio_stat_wbuf_copied();
839 } else {
840 ASSERT(xuio || tx_bytes == max_blksz);
440a3eb9
TC
841 dmu_assign_arcbuf_by_dbuf(
842 sa_get_db(zp->z_sa_hdl), woff, abuf, tx);
428870ff 843 }
9babb374
BB
844 ASSERT(tx_bytes <= uio->uio_resid);
845 uioskip(uio, tx_bytes);
846 }
0037b49e
BB
847 if (tx_bytes && zp->z_is_mapped && !(ioflag & O_DIRECT)) {
848 update_pages(ip, woff,
849 tx_bytes, zfsvfs->z_os, zp->z_id);
850 }
34dc7c2f
BB
851
852 /*
853 * If we made no progress, we're done. If we made even
854 * partial progress, update the znode and ZIL accordingly.
855 */
856 if (tx_bytes == 0) {
0037b49e 857 (void) sa_update(zp->z_sa_hdl, SA_ZPL_SIZE(zfsvfs),
428870ff 858 (void *)&zp->z_size, sizeof (uint64_t), tx);
34dc7c2f
BB
859 dmu_tx_commit(tx);
860 ASSERT(error != 0);
861 break;
862 }
863
864 /*
865 * Clear Set-UID/Set-GID bits on successful write if not
4e33ba4c 866 * privileged and at least one of the execute bits is set.
34dc7c2f
BB
867 *
868 * It would be nice to to this after all writes have
869 * been done, but that would still expose the ISUID/ISGID
870 * to another app after the partial write is committed.
871 *
572e2857
BB
872 * Note: we don't call zfs_fuid_map_id() here because
873 * user 0 is not an ephemeral uid.
34dc7c2f
BB
874 */
875 mutex_enter(&zp->z_acl_lock);
2c6abf15 876 uid = KUID_TO_SUID(ip->i_uid);
428870ff 877 if ((zp->z_mode & (S_IXUSR | (S_IXUSR >> 3) |
34dc7c2f 878 (S_IXUSR >> 6))) != 0 &&
428870ff 879 (zp->z_mode & (S_ISUID | S_ISGID)) != 0 &&
34dc7c2f 880 secpolicy_vnode_setid_retain(cr,
2c6abf15 881 ((zp->z_mode & S_ISUID) != 0 && uid == 0)) != 0) {
428870ff
BB
882 uint64_t newmode;
883 zp->z_mode &= ~(S_ISUID | S_ISGID);
12fa7f34 884 ip->i_mode = newmode = zp->z_mode;
0037b49e 885 (void) sa_update(zp->z_sa_hdl, SA_ZPL_MODE(zfsvfs),
428870ff 886 (void *)&newmode, sizeof (uint64_t), tx);
34dc7c2f
BB
887 }
888 mutex_exit(&zp->z_acl_lock);
889
0df9673f 890 zfs_tstamp_update_setup(zp, CONTENT_MODIFIED, mtime, ctime);
34dc7c2f
BB
891
892 /*
893 * Update the file size (zp_size) if it has changed;
894 * account for possible concurrent updates.
895 */
428870ff
BB
896 while ((end_size = zp->z_size) < uio->uio_loffset) {
897 (void) atomic_cas_64(&zp->z_size, end_size,
34dc7c2f 898 uio->uio_loffset);
428870ff
BB
899 ASSERT(error == 0);
900 }
572e2857
BB
901 /*
902 * If we are replaying and eof is non zero then force
903 * the file size to the specified eof. Note, there's no
904 * concurrency during replay.
905 */
0037b49e
BB
906 if (zfsvfs->z_replay && zfsvfs->z_replay_eof != 0)
907 zp->z_size = zfsvfs->z_replay_eof;
572e2857 908
428870ff
BB
909 error = sa_bulk_update(zp->z_sa_hdl, bulk, count, tx);
910
119a394a
ED
911 zfs_log_write(zilog, tx, TX_WRITE, zp, woff, tx_bytes, ioflag,
912 NULL, NULL);
34dc7c2f
BB
913 dmu_tx_commit(tx);
914
915 if (error != 0)
916 break;
917 ASSERT(tx_bytes == nbytes);
918 n -= nbytes;
572e2857
BB
919
920 if (!xuio && n > 0)
921 uio_prefaultpages(MIN(n, max_blksz), uio);
34dc7c2f
BB
922 }
923
2a53e2da 924 zfs_inode_update(zp);
34dc7c2f
BB
925 zfs_range_unlock(rl);
926
927 /*
928 * If we're in replay mode, or we made no progress, return error.
929 * Otherwise, it's at least a partial write, so it's successful.
930 */
0037b49e
BB
931 if (zfsvfs->z_replay || uio->uio_resid == start_resid) {
932 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
933 return (error);
934 }
935
428870ff 936 if (ioflag & (FSYNC | FDSYNC) ||
0037b49e 937 zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 938 zil_commit(zilog, zp->z_id);
34dc7c2f 939
0037b49e 940 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
941 return (0);
942}
943
7c502b0b 944/*
945 * Drop a reference on the passed inode asynchronously. This ensures
946 * that the caller will never drop the last reference on an inode in
947 * the current context. Doing so while holding open a tx could result
948 * in a deadlock if iput_final() re-enters the filesystem code.
949 */
0a50679c
BB
950void
951zfs_iput_async(struct inode *ip)
3558fd73 952{
0a50679c
BB
953 objset_t *os = ITOZSB(ip)->z_os;
954
3558fd73 955 ASSERT(atomic_read(&ip->i_count) > 0);
0a50679c
BB
956 ASSERT(os != NULL);
957
3558fd73 958 if (atomic_read(&ip->i_count) == 1)
7c502b0b 959 VERIFY(taskq_dispatch(dsl_pool_iput_taskq(dmu_objset_pool(os)),
48d3eb40 960 (task_func_t *)iput, ip, TQ_SLEEP) != TASKQID_INVALID);
3558fd73
BB
961 else
962 iput(ip);
963}
964
34dc7c2f 965void
428870ff 966zfs_get_done(zgd_t *zgd, int error)
34dc7c2f 967{
428870ff 968 znode_t *zp = zgd->zgd_private;
428870ff
BB
969
970 if (zgd->zgd_db)
971 dmu_buf_rele(zgd->zgd_db, zgd);
972
973 zfs_range_unlock(zgd->zgd_rl);
34dc7c2f 974
9babb374
BB
975 /*
976 * Release the vnode asynchronously as we currently have the
977 * txg stopped from syncing.
978 */
0a50679c 979 zfs_iput_async(ZTOI(zp));
428870ff
BB
980
981 if (error == 0 && zgd->zgd_bp)
1ce23dca 982 zil_lwb_add_block(zgd->zgd_lwb, zgd->zgd_bp);
428870ff 983
34dc7c2f
BB
984 kmem_free(zgd, sizeof (zgd_t));
985}
986
45d1cae3
BB
987#ifdef DEBUG
988static int zil_fault_io = 0;
989#endif
990
34dc7c2f
BB
991/*
992 * Get data to generate a TX_WRITE intent log record.
993 */
994int
1ce23dca 995zfs_get_data(void *arg, lr_write_t *lr, char *buf, struct lwb *lwb, zio_t *zio)
34dc7c2f 996{
0037b49e
BB
997 zfsvfs_t *zfsvfs = arg;
998 objset_t *os = zfsvfs->z_os;
34dc7c2f 999 znode_t *zp;
428870ff
BB
1000 uint64_t object = lr->lr_foid;
1001 uint64_t offset = lr->lr_offset;
1002 uint64_t size = lr->lr_length;
34dc7c2f 1003 dmu_buf_t *db;
34dc7c2f 1004 zgd_t *zgd;
34dc7c2f
BB
1005 int error = 0;
1006
1ce23dca
PS
1007 ASSERT3P(lwb, !=, NULL);
1008 ASSERT3P(zio, !=, NULL);
1009 ASSERT3U(size, !=, 0);
34dc7c2f
BB
1010
1011 /*
1012 * Nothing to do if the file has been removed
1013 */
0037b49e 1014 if (zfs_zget(zfsvfs, object, &zp) != 0)
2e528b49 1015 return (SET_ERROR(ENOENT));
34dc7c2f 1016 if (zp->z_unlinked) {
9babb374
BB
1017 /*
1018 * Release the vnode asynchronously as we currently have the
1019 * txg stopped from syncing.
1020 */
0a50679c 1021 zfs_iput_async(ZTOI(zp));
2e528b49 1022 return (SET_ERROR(ENOENT));
34dc7c2f
BB
1023 }
1024
79c76d5b 1025 zgd = (zgd_t *)kmem_zalloc(sizeof (zgd_t), KM_SLEEP);
1ce23dca 1026 zgd->zgd_lwb = lwb;
428870ff
BB
1027 zgd->zgd_private = zp;
1028
34dc7c2f
BB
1029 /*
1030 * Write records come in two flavors: immediate and indirect.
1031 * For small writes it's cheaper to store the data with the
1032 * log record (immediate); for large writes it's cheaper to
1033 * sync the data and get a pointer to it (indirect) so that
1034 * we don't have to write the data twice.
1035 */
1036 if (buf != NULL) { /* immediate write */
d88895a0
CC
1037 zgd->zgd_rl = zfs_range_lock(&zp->z_range_lock, offset, size,
1038 RL_READER);
34dc7c2f 1039 /* test for truncation needs to be done while range locked */
428870ff 1040 if (offset >= zp->z_size) {
2e528b49 1041 error = SET_ERROR(ENOENT);
428870ff
BB
1042 } else {
1043 error = dmu_read(os, object, offset, size, buf,
1044 DMU_READ_NO_PREFETCH);
34dc7c2f 1045 }
428870ff 1046 ASSERT(error == 0 || error == ENOENT);
34dc7c2f 1047 } else { /* indirect write */
34dc7c2f
BB
1048 /*
1049 * Have to lock the whole block to ensure when it's
f763c3d1 1050 * written out and its checksum is being calculated
34dc7c2f
BB
1051 * that no one can change the data. We need to re-check
1052 * blocksize after we get the lock in case it's changed!
1053 */
1054 for (;;) {
428870ff
BB
1055 uint64_t blkoff;
1056 size = zp->z_blksz;
1057 blkoff = ISP2(size) ? P2PHASE(offset, size) : offset;
1058 offset -= blkoff;
d88895a0
CC
1059 zgd->zgd_rl = zfs_range_lock(&zp->z_range_lock, offset,
1060 size, RL_READER);
428870ff 1061 if (zp->z_blksz == size)
34dc7c2f 1062 break;
428870ff
BB
1063 offset += blkoff;
1064 zfs_range_unlock(zgd->zgd_rl);
34dc7c2f
BB
1065 }
1066 /* test for truncation needs to be done while range locked */
428870ff 1067 if (lr->lr_offset >= zp->z_size)
2e528b49 1068 error = SET_ERROR(ENOENT);
45d1cae3
BB
1069#ifdef DEBUG
1070 if (zil_fault_io) {
2e528b49 1071 error = SET_ERROR(EIO);
45d1cae3 1072 zil_fault_io = 0;
45d1cae3 1073 }
45d1cae3 1074#endif
34dc7c2f 1075 if (error == 0)
428870ff
BB
1076 error = dmu_buf_hold(os, object, offset, zgd, &db,
1077 DMU_READ_NO_PREFETCH);
1078
1079 if (error == 0) {
02dc43bc 1080 blkptr_t *bp = &lr->lr_blkptr;
03c6040b 1081
428870ff
BB
1082 zgd->zgd_db = db;
1083 zgd->zgd_bp = bp;
1084
1085 ASSERT(db->db_offset == offset);
1086 ASSERT(db->db_size == size);
1087
1088 error = dmu_sync(zio, lr->lr_common.lrc_txg,
1089 zfs_get_done, zgd);
61ca48ff 1090 ASSERT(error || lr->lr_length <= size);
428870ff
BB
1091
1092 /*
1093 * On success, we need to wait for the write I/O
1094 * initiated by dmu_sync() to complete before we can
1095 * release this dbuf. We will finish everything up
1096 * in the zfs_get_done() callback.
1097 */
1098 if (error == 0)
1099 return (0);
1100
1101 if (error == EALREADY) {
1102 lr->lr_common.lrc_txtype = TX_WRITE2;
a1d477c2
MA
1103 /*
1104 * TX_WRITE2 relies on the data previously
1105 * written by the TX_WRITE that caused
1106 * EALREADY. We zero out the BP because
1107 * it is the old, currently-on-disk BP,
1108 * so there's no need to zio_flush() its
1109 * vdevs (flushing would needlesly hurt
1110 * performance, and doesn't work on
1111 * indirect vdevs).
1112 */
1113 zgd->zgd_bp = NULL;
1114 BP_ZERO(bp);
428870ff
BB
1115 error = 0;
1116 }
1117 }
34dc7c2f 1118 }
428870ff
BB
1119
1120 zfs_get_done(zgd, error);
1121
34dc7c2f
BB
1122 return (error);
1123}
1124
1125/*ARGSUSED*/
3558fd73
BB
1126int
1127zfs_access(struct inode *ip, int mode, int flag, cred_t *cr)
34dc7c2f 1128{
3558fd73 1129 znode_t *zp = ITOZ(ip);
0037b49e 1130 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
1131 int error;
1132
0037b49e 1133 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
1134 ZFS_VERIFY_ZP(zp);
1135
1136 if (flag & V_ACE_MASK)
1137 error = zfs_zaccess(zp, mode, flag, B_FALSE, cr);
1138 else
1139 error = zfs_zaccess_rwx(zp, mode, flag, cr);
1140
0037b49e 1141 ZFS_EXIT(zfsvfs);
45d1cae3
BB
1142 return (error);
1143}
45d1cae3 1144
34dc7c2f
BB
1145/*
1146 * Lookup an entry in a directory, or an extended attribute directory.
3558fd73 1147 * If it exists, return a held inode reference for it.
34dc7c2f 1148 *
3558fd73 1149 * IN: dip - inode of directory to search.
34dc7c2f 1150 * nm - name of entry to lookup.
34dc7c2f 1151 * flags - LOOKUP_XATTR set if looking for an attribute.
34dc7c2f 1152 * cr - credentials of caller.
34dc7c2f
BB
1153 * direntflags - directory lookup flags
1154 * realpnp - returned pathname.
1155 *
3558fd73 1156 * OUT: ipp - inode of located entry, NULL if not found.
34dc7c2f 1157 *
d3cc8b15 1158 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
1159 *
1160 * Timestamps:
1161 * NA
1162 */
1163/* ARGSUSED */
e5c39b95 1164int
3558fd73
BB
1165zfs_lookup(struct inode *dip, char *nm, struct inode **ipp, int flags,
1166 cred_t *cr, int *direntflags, pathname_t *realpnp)
34dc7c2f 1167{
3558fd73 1168 znode_t *zdp = ITOZ(dip);
0037b49e 1169 zfsvfs_t *zfsvfs = ITOZSB(dip);
3558fd73 1170 int error = 0;
45d1cae3 1171
9b7b9cd3
GM
1172 /*
1173 * Fast path lookup, however we must skip DNLC lookup
1174 * for case folding or normalizing lookups because the
1175 * DNLC code only stores the passed in name. This means
1176 * creating 'a' and removing 'A' on a case insensitive
1177 * file system would work, but DNLC still thinks 'a'
1178 * exists and won't let you create it again on the next
1179 * pass through fast path.
1180 */
45d1cae3
BB
1181 if (!(flags & (LOOKUP_XATTR | FIGNORECASE))) {
1182
3558fd73 1183 if (!S_ISDIR(dip->i_mode)) {
2e528b49 1184 return (SET_ERROR(ENOTDIR));
428870ff 1185 } else if (zdp->z_sa_hdl == NULL) {
2e528b49 1186 return (SET_ERROR(EIO));
45d1cae3
BB
1187 }
1188
1189 if (nm[0] == 0 || (nm[0] == '.' && nm[1] == '\0')) {
1190 error = zfs_fastaccesschk_execute(zdp, cr);
1191 if (!error) {
3558fd73
BB
1192 *ipp = dip;
1193 igrab(*ipp);
45d1cae3
BB
1194 return (0);
1195 }
1196 return (error);
3558fd73 1197#ifdef HAVE_DNLC
9b7b9cd3
GM
1198 } else if (!zdp->z_zfsvfs->z_norm &&
1199 (zdp->z_zfsvfs->z_case == ZFS_CASE_SENSITIVE)) {
1200
45d1cae3
BB
1201 vnode_t *tvp = dnlc_lookup(dvp, nm);
1202
1203 if (tvp) {
1204 error = zfs_fastaccesschk_execute(zdp, cr);
1205 if (error) {
3558fd73 1206 iput(tvp);
45d1cae3
BB
1207 return (error);
1208 }
1209 if (tvp == DNLC_NO_VNODE) {
3558fd73 1210 iput(tvp);
2e528b49 1211 return (SET_ERROR(ENOENT));
45d1cae3
BB
1212 } else {
1213 *vpp = tvp;
1214 return (specvp_check(vpp, cr));
1215 }
1216 }
3558fd73 1217#endif /* HAVE_DNLC */
45d1cae3
BB
1218 }
1219 }
1220
0037b49e 1221 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
1222 ZFS_VERIFY_ZP(zdp);
1223
3558fd73 1224 *ipp = NULL;
34dc7c2f
BB
1225
1226 if (flags & LOOKUP_XATTR) {
34dc7c2f
BB
1227 /*
1228 * We don't allow recursive attributes..
1229 * Maybe someday we will.
1230 */
428870ff 1231 if (zdp->z_pflags & ZFS_XATTR) {
0037b49e 1232 ZFS_EXIT(zfsvfs);
2e528b49 1233 return (SET_ERROR(EINVAL));
34dc7c2f
BB
1234 }
1235
3558fd73 1236 if ((error = zfs_get_xattrdir(zdp, ipp, cr, flags))) {
0037b49e 1237 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1238 return (error);
1239 }
1240
1241 /*
1242 * Do we have permission to get into attribute directory?
1243 */
1244
3558fd73 1245 if ((error = zfs_zaccess(ITOZ(*ipp), ACE_EXECUTE, 0,
149e873a 1246 B_FALSE, cr))) {
3558fd73
BB
1247 iput(*ipp);
1248 *ipp = NULL;
34dc7c2f
BB
1249 }
1250
0037b49e 1251 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1252 return (error);
1253 }
1254
3558fd73 1255 if (!S_ISDIR(dip->i_mode)) {
0037b49e 1256 ZFS_EXIT(zfsvfs);
2e528b49 1257 return (SET_ERROR(ENOTDIR));
34dc7c2f
BB
1258 }
1259
1260 /*
1261 * Check accessibility of directory.
1262 */
1263
149e873a 1264 if ((error = zfs_zaccess(zdp, ACE_EXECUTE, 0, B_FALSE, cr))) {
0037b49e 1265 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1266 return (error);
1267 }
1268
0037b49e 1269 if (zfsvfs->z_utf8 && u8_validate(nm, strlen(nm),
34dc7c2f 1270 NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 1271 ZFS_EXIT(zfsvfs);
2e528b49 1272 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
1273 }
1274
3558fd73
BB
1275 error = zfs_dirlook(zdp, nm, ipp, flags, direntflags, realpnp);
1276 if ((error == 0) && (*ipp))
1277 zfs_inode_update(ITOZ(*ipp));
34dc7c2f 1278
0037b49e 1279 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1280 return (error);
1281}
1282
1283/*
1284 * Attempt to create a new entry in a directory. If the entry
1285 * already exists, truncate the file if permissible, else return
3558fd73 1286 * an error. Return the ip of the created or trunc'd file.
34dc7c2f 1287 *
3558fd73 1288 * IN: dip - inode of directory to put new file entry in.
34dc7c2f
BB
1289 * name - name of new file entry.
1290 * vap - attributes of new file.
1291 * excl - flag indicating exclusive or non-exclusive mode.
1292 * mode - mode to open file with.
1293 * cr - credentials of caller.
1294 * flag - large file flag [UNUSED].
3558fd73 1295 * vsecp - ACL to be set
34dc7c2f 1296 *
3558fd73 1297 * OUT: ipp - inode of created or trunc'd entry.
34dc7c2f 1298 *
d3cc8b15 1299 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
1300 *
1301 * Timestamps:
3558fd73
BB
1302 * dip - ctime|mtime updated if new entry created
1303 * ip - ctime|mtime always, atime if new
34dc7c2f
BB
1304 */
1305
1306/* ARGSUSED */
e5c39b95 1307int
3558fd73
BB
1308zfs_create(struct inode *dip, char *name, vattr_t *vap, int excl,
1309 int mode, struct inode **ipp, cred_t *cr, int flag, vsecattr_t *vsecp)
34dc7c2f 1310{
3558fd73 1311 znode_t *zp, *dzp = ITOZ(dip);
0037b49e 1312 zfsvfs_t *zfsvfs = ITOZSB(dip);
34dc7c2f
BB
1313 zilog_t *zilog;
1314 objset_t *os;
1315 zfs_dirlock_t *dl;
1316 dmu_tx_t *tx;
1317 int error;
b128c09f 1318 uid_t uid;
149e873a 1319 gid_t gid;
428870ff 1320 zfs_acl_ids_t acl_ids;
9babb374 1321 boolean_t fuid_dirtied;
428870ff 1322 boolean_t have_acl = B_FALSE;
e8b96c60 1323 boolean_t waited = B_FALSE;
34dc7c2f
BB
1324
1325 /*
1326 * If we have an ephemeral id, ACL, or XVATTR then
1327 * make sure file system is at proper version
1328 */
1329
149e873a 1330 gid = crgetgid(cr);
3558fd73 1331 uid = crgetuid(cr);
b128c09f 1332
0037b49e 1333 if (zfsvfs->z_use_fuids == B_FALSE &&
3558fd73 1334 (vsecp || IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid)))
2e528b49 1335 return (SET_ERROR(EINVAL));
34dc7c2f 1336
32dec7bd 1337 if (name == NULL)
1338 return (SET_ERROR(EINVAL));
1339
0037b49e 1340 ZFS_ENTER(zfsvfs);
34dc7c2f 1341 ZFS_VERIFY_ZP(dzp);
0037b49e
BB
1342 os = zfsvfs->z_os;
1343 zilog = zfsvfs->z_log;
34dc7c2f 1344
0037b49e 1345 if (zfsvfs->z_utf8 && u8_validate(name, strlen(name),
34dc7c2f 1346 NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 1347 ZFS_EXIT(zfsvfs);
2e528b49 1348 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
1349 }
1350
5484965a 1351 if (vap->va_mask & ATTR_XVATTR) {
34dc7c2f 1352 if ((error = secpolicy_xvattr((xvattr_t *)vap,
3558fd73 1353 crgetuid(cr), cr, vap->va_mode)) != 0) {
0037b49e 1354 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1355 return (error);
1356 }
1357 }
34dc7c2f 1358
3558fd73
BB
1359top:
1360 *ipp = NULL;
34dc7c2f
BB
1361 if (*name == '\0') {
1362 /*
1363 * Null component name refers to the directory itself.
1364 */
3558fd73 1365 igrab(dip);
34dc7c2f
BB
1366 zp = dzp;
1367 dl = NULL;
1368 error = 0;
1369 } else {
3558fd73 1370 /* possible igrab(zp) */
34dc7c2f
BB
1371 int zflg = 0;
1372
1373 if (flag & FIGNORECASE)
1374 zflg |= ZCILOOK;
1375
1376 error = zfs_dirent_lock(&dl, dzp, name, &zp, zflg,
1377 NULL, NULL);
1378 if (error) {
572e2857
BB
1379 if (have_acl)
1380 zfs_acl_ids_free(&acl_ids);
34dc7c2f 1381 if (strcmp(name, "..") == 0)
2e528b49 1382 error = SET_ERROR(EISDIR);
0037b49e 1383 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1384 return (error);
1385 }
1386 }
428870ff 1387
34dc7c2f
BB
1388 if (zp == NULL) {
1389 uint64_t txtype;
9c5167d1 1390 uint64_t projid = ZFS_DEFAULT_PROJID;
34dc7c2f
BB
1391
1392 /*
1393 * Create a new file object and update the directory
1394 * to reference it.
1395 */
149e873a 1396 if ((error = zfs_zaccess(dzp, ACE_ADD_FILE, 0, B_FALSE, cr))) {
572e2857
BB
1397 if (have_acl)
1398 zfs_acl_ids_free(&acl_ids);
34dc7c2f
BB
1399 goto out;
1400 }
1401
1402 /*
1403 * We only support the creation of regular files in
1404 * extended attribute directories.
1405 */
428870ff 1406
3558fd73 1407 if ((dzp->z_pflags & ZFS_XATTR) && !S_ISREG(vap->va_mode)) {
572e2857
BB
1408 if (have_acl)
1409 zfs_acl_ids_free(&acl_ids);
2e528b49 1410 error = SET_ERROR(EINVAL);
34dc7c2f
BB
1411 goto out;
1412 }
1413
428870ff
BB
1414 if (!have_acl && (error = zfs_acl_ids_create(dzp, 0, vap,
1415 cr, vsecp, &acl_ids)) != 0)
9babb374 1416 goto out;
428870ff
BB
1417 have_acl = B_TRUE;
1418
9c5167d1
NF
1419 if (S_ISREG(vap->va_mode) || S_ISDIR(vap->va_mode))
1420 projid = zfs_inherit_projid(dzp);
1421 if (zfs_acl_ids_overquota(zfsvfs, &acl_ids, projid)) {
45d1cae3 1422 zfs_acl_ids_free(&acl_ids);
2e528b49 1423 error = SET_ERROR(EDQUOT);
9babb374
BB
1424 goto out;
1425 }
1426
34dc7c2f 1427 tx = dmu_tx_create(os);
428870ff
BB
1428
1429 dmu_tx_hold_sa_create(tx, acl_ids.z_aclp->z_acl_bytes +
1430 ZFS_SA_BASE_ATTR_SIZE);
1431
0037b49e 1432 fuid_dirtied = zfsvfs->z_fuid_dirty;
9babb374 1433 if (fuid_dirtied)
0037b49e 1434 zfs_fuid_txhold(zfsvfs, tx);
34dc7c2f 1435 dmu_tx_hold_zap(tx, dzp->z_id, TRUE, name);
428870ff 1436 dmu_tx_hold_sa(tx, dzp->z_sa_hdl, B_FALSE);
0037b49e 1437 if (!zfsvfs->z_use_sa &&
428870ff 1438 acl_ids.z_aclp->z_acl_bytes > ZFS_ACE_SPACE) {
34dc7c2f 1439 dmu_tx_hold_write(tx, DMU_NEW_OBJECT,
428870ff 1440 0, acl_ids.z_aclp->z_acl_bytes);
34dc7c2f 1441 }
599b8648 1442
0735ecb3
PS
1443 error = dmu_tx_assign(tx,
1444 (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
1445 if (error) {
1446 zfs_dirent_unlock(dl);
fb5f0bc8 1447 if (error == ERESTART) {
e8b96c60 1448 waited = B_TRUE;
34dc7c2f
BB
1449 dmu_tx_wait(tx);
1450 dmu_tx_abort(tx);
1451 goto top;
1452 }
428870ff 1453 zfs_acl_ids_free(&acl_ids);
34dc7c2f 1454 dmu_tx_abort(tx);
0037b49e 1455 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1456 return (error);
1457 }
428870ff 1458 zfs_mknode(dzp, vap, tx, cr, 0, &zp, &acl_ids);
9babb374 1459
599b8648
CC
1460 error = zfs_link_create(dl, zp, tx, ZNEW);
1461 if (error != 0) {
1462 /*
1463 * Since, we failed to add the directory entry for it,
1464 * delete the newly created dnode.
1465 */
1466 zfs_znode_delete(zp, tx);
1467 remove_inode_hash(ZTOI(zp));
1468 zfs_acl_ids_free(&acl_ids);
1469 dmu_tx_commit(tx);
1470 goto out;
1471 }
1472
9babb374 1473 if (fuid_dirtied)
0037b49e 1474 zfs_fuid_sync(zfsvfs, tx);
9babb374 1475
34dc7c2f
BB
1476 txtype = zfs_log_create_txtype(Z_FILE, vsecp, vap);
1477 if (flag & FIGNORECASE)
1478 txtype |= TX_CI;
1479 zfs_log_create(zilog, tx, txtype, dzp, zp, name,
9babb374
BB
1480 vsecp, acl_ids.z_fuidp, vap);
1481 zfs_acl_ids_free(&acl_ids);
34dc7c2f
BB
1482 dmu_tx_commit(tx);
1483 } else {
1484 int aflags = (flag & FAPPEND) ? V_APPEND : 0;
1485
572e2857
BB
1486 if (have_acl)
1487 zfs_acl_ids_free(&acl_ids);
1488 have_acl = B_FALSE;
1489
34dc7c2f
BB
1490 /*
1491 * A directory entry already exists for this name.
1492 */
1493 /*
1494 * Can't truncate an existing file if in exclusive mode.
1495 */
3558fd73 1496 if (excl) {
2e528b49 1497 error = SET_ERROR(EEXIST);
34dc7c2f
BB
1498 goto out;
1499 }
1500 /*
1501 * Can't open a directory for writing.
1502 */
3558fd73 1503 if (S_ISDIR(ZTOI(zp)->i_mode)) {
2e528b49 1504 error = SET_ERROR(EISDIR);
34dc7c2f
BB
1505 goto out;
1506 }
1507 /*
1508 * Verify requested access to file.
1509 */
1510 if (mode && (error = zfs_zaccess_rwx(zp, mode, aflags, cr))) {
1511 goto out;
1512 }
1513
1514 mutex_enter(&dzp->z_lock);
1515 dzp->z_seq++;
1516 mutex_exit(&dzp->z_lock);
1517
1518 /*
1519 * Truncate regular files if requested.
1520 */
3558fd73
BB
1521 if (S_ISREG(ZTOI(zp)->i_mode) &&
1522 (vap->va_mask & ATTR_SIZE) && (vap->va_size == 0)) {
b128c09f 1523 /* we can't hold any locks when calling zfs_freesp() */
609603a5
B
1524 if (dl) {
1525 zfs_dirent_unlock(dl);
1526 dl = NULL;
1527 }
34dc7c2f 1528 error = zfs_freesp(zp, 0, 0, mode, TRUE);
34dc7c2f
BB
1529 }
1530 }
1531out:
1532
1533 if (dl)
1534 zfs_dirent_unlock(dl);
1535
1536 if (error) {
1537 if (zp)
3558fd73 1538 iput(ZTOI(zp));
34dc7c2f 1539 } else {
960e08fe
BB
1540 zfs_inode_update(dzp);
1541 zfs_inode_update(zp);
3558fd73 1542 *ipp = ZTOI(zp);
34dc7c2f 1543 }
34dc7c2f 1544
0037b49e 1545 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 1546 zil_commit(zilog, 0);
428870ff 1547
0037b49e 1548 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1549 return (error);
1550}
1551
ace1eae8
CC
1552/* ARGSUSED */
1553int
1554zfs_tmpfile(struct inode *dip, vattr_t *vap, int excl,
1555 int mode, struct inode **ipp, cred_t *cr, int flag, vsecattr_t *vsecp)
1556{
1557 znode_t *zp = NULL, *dzp = ITOZ(dip);
0037b49e 1558 zfsvfs_t *zfsvfs = ITOZSB(dip);
ace1eae8
CC
1559 objset_t *os;
1560 dmu_tx_t *tx;
1561 int error;
1562 uid_t uid;
1563 gid_t gid;
1564 zfs_acl_ids_t acl_ids;
9c5167d1 1565 uint64_t projid = ZFS_DEFAULT_PROJID;
ace1eae8
CC
1566 boolean_t fuid_dirtied;
1567 boolean_t have_acl = B_FALSE;
1568 boolean_t waited = B_FALSE;
1569
1570 /*
1571 * If we have an ephemeral id, ACL, or XVATTR then
1572 * make sure file system is at proper version
1573 */
1574
1575 gid = crgetgid(cr);
1576 uid = crgetuid(cr);
1577
0037b49e 1578 if (zfsvfs->z_use_fuids == B_FALSE &&
ace1eae8
CC
1579 (vsecp || IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid)))
1580 return (SET_ERROR(EINVAL));
1581
0037b49e 1582 ZFS_ENTER(zfsvfs);
ace1eae8 1583 ZFS_VERIFY_ZP(dzp);
0037b49e 1584 os = zfsvfs->z_os;
ace1eae8
CC
1585
1586 if (vap->va_mask & ATTR_XVATTR) {
1587 if ((error = secpolicy_xvattr((xvattr_t *)vap,
1588 crgetuid(cr), cr, vap->va_mode)) != 0) {
0037b49e 1589 ZFS_EXIT(zfsvfs);
ace1eae8
CC
1590 return (error);
1591 }
1592 }
1593
1594top:
1595 *ipp = NULL;
1596
1597 /*
1598 * Create a new file object and update the directory
1599 * to reference it.
1600 */
1601 if ((error = zfs_zaccess(dzp, ACE_ADD_FILE, 0, B_FALSE, cr))) {
1602 if (have_acl)
1603 zfs_acl_ids_free(&acl_ids);
1604 goto out;
1605 }
1606
1607 if (!have_acl && (error = zfs_acl_ids_create(dzp, 0, vap,
1608 cr, vsecp, &acl_ids)) != 0)
1609 goto out;
1610 have_acl = B_TRUE;
1611
9c5167d1
NF
1612 if (S_ISREG(vap->va_mode) || S_ISDIR(vap->va_mode))
1613 projid = zfs_inherit_projid(dzp);
1614 if (zfs_acl_ids_overquota(zfsvfs, &acl_ids, projid)) {
ace1eae8
CC
1615 zfs_acl_ids_free(&acl_ids);
1616 error = SET_ERROR(EDQUOT);
1617 goto out;
1618 }
1619
1620 tx = dmu_tx_create(os);
1621
1622 dmu_tx_hold_sa_create(tx, acl_ids.z_aclp->z_acl_bytes +
1623 ZFS_SA_BASE_ATTR_SIZE);
0037b49e 1624 dmu_tx_hold_zap(tx, zfsvfs->z_unlinkedobj, FALSE, NULL);
ace1eae8 1625
0037b49e 1626 fuid_dirtied = zfsvfs->z_fuid_dirty;
ace1eae8 1627 if (fuid_dirtied)
0037b49e
BB
1628 zfs_fuid_txhold(zfsvfs, tx);
1629 if (!zfsvfs->z_use_sa &&
ace1eae8
CC
1630 acl_ids.z_aclp->z_acl_bytes > ZFS_ACE_SPACE) {
1631 dmu_tx_hold_write(tx, DMU_NEW_OBJECT,
1632 0, acl_ids.z_aclp->z_acl_bytes);
1633 }
0735ecb3 1634 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
ace1eae8
CC
1635 if (error) {
1636 if (error == ERESTART) {
1637 waited = B_TRUE;
1638 dmu_tx_wait(tx);
1639 dmu_tx_abort(tx);
1640 goto top;
1641 }
1642 zfs_acl_ids_free(&acl_ids);
1643 dmu_tx_abort(tx);
0037b49e 1644 ZFS_EXIT(zfsvfs);
ace1eae8
CC
1645 return (error);
1646 }
1647 zfs_mknode(dzp, vap, tx, cr, IS_TMPFILE, &zp, &acl_ids);
1648
1649 if (fuid_dirtied)
0037b49e 1650 zfs_fuid_sync(zfsvfs, tx);
ace1eae8
CC
1651
1652 /* Add to unlinked set */
1653 zp->z_unlinked = 1;
1654 zfs_unlinked_add(zp, tx);
1655 zfs_acl_ids_free(&acl_ids);
1656 dmu_tx_commit(tx);
1657out:
1658
1659 if (error) {
1660 if (zp)
1661 iput(ZTOI(zp));
1662 } else {
1663 zfs_inode_update(dzp);
1664 zfs_inode_update(zp);
1665 *ipp = ZTOI(zp);
1666 }
1667
0037b49e 1668 ZFS_EXIT(zfsvfs);
ace1eae8
CC
1669 return (error);
1670}
1671
34dc7c2f
BB
1672/*
1673 * Remove an entry from a directory.
1674 *
3558fd73 1675 * IN: dip - inode of directory to remove entry from.
34dc7c2f
BB
1676 * name - name of entry to remove.
1677 * cr - credentials of caller.
34dc7c2f
BB
1678 *
1679 * RETURN: 0 if success
1680 * error code if failure
1681 *
1682 * Timestamps:
3558fd73
BB
1683 * dip - ctime|mtime
1684 * ip - ctime (if nlink > 0)
34dc7c2f 1685 */
428870ff
BB
1686
1687uint64_t null_xattr = 0;
1688
34dc7c2f 1689/*ARGSUSED*/
e5c39b95 1690int
da5e151f 1691zfs_remove(struct inode *dip, char *name, cred_t *cr, int flags)
34dc7c2f 1692{
3558fd73 1693 znode_t *zp, *dzp = ITOZ(dip);
572e2857 1694 znode_t *xzp;
3558fd73 1695 struct inode *ip;
0037b49e 1696 zfsvfs_t *zfsvfs = ITOZSB(dip);
34dc7c2f 1697 zilog_t *zilog;
a966c564 1698 uint64_t acl_obj, xattr_obj;
3558fd73 1699 uint64_t xattr_obj_unlinked = 0;
572e2857 1700 uint64_t obj = 0;
dfbc8630 1701 uint64_t links;
34dc7c2f
BB
1702 zfs_dirlock_t *dl;
1703 dmu_tx_t *tx;
a966c564
K
1704 boolean_t may_delete_now, delete_now = FALSE;
1705 boolean_t unlinked, toobig = FALSE;
34dc7c2f
BB
1706 uint64_t txtype;
1707 pathname_t *realnmp = NULL;
1708 pathname_t realnm;
1709 int error;
1710 int zflg = ZEXISTS;
e8b96c60 1711 boolean_t waited = B_FALSE;
34dc7c2f 1712
32dec7bd 1713 if (name == NULL)
1714 return (SET_ERROR(EINVAL));
1715
0037b49e 1716 ZFS_ENTER(zfsvfs);
34dc7c2f 1717 ZFS_VERIFY_ZP(dzp);
0037b49e 1718 zilog = zfsvfs->z_log;
34dc7c2f
BB
1719
1720 if (flags & FIGNORECASE) {
1721 zflg |= ZCILOOK;
1722 pn_alloc(&realnm);
1723 realnmp = &realnm;
1724 }
1725
1726top:
572e2857
BB
1727 xattr_obj = 0;
1728 xzp = NULL;
34dc7c2f
BB
1729 /*
1730 * Attempt to lock directory; fail if entry doesn't exist.
1731 */
149e873a
BB
1732 if ((error = zfs_dirent_lock(&dl, dzp, name, &zp, zflg,
1733 NULL, realnmp))) {
34dc7c2f
BB
1734 if (realnmp)
1735 pn_free(realnmp);
0037b49e 1736 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1737 return (error);
1738 }
1739
3558fd73 1740 ip = ZTOI(zp);
34dc7c2f 1741
149e873a 1742 if ((error = zfs_zaccess_delete(dzp, zp, cr))) {
34dc7c2f
BB
1743 goto out;
1744 }
1745
1746 /*
1747 * Need to use rmdir for removing directories.
1748 */
3558fd73 1749 if (S_ISDIR(ip->i_mode)) {
2e528b49 1750 error = SET_ERROR(EPERM);
34dc7c2f
BB
1751 goto out;
1752 }
1753
3558fd73 1754#ifdef HAVE_DNLC
34dc7c2f
BB
1755 if (realnmp)
1756 dnlc_remove(dvp, realnmp->pn_buf);
1757 else
1758 dnlc_remove(dvp, name);
3558fd73 1759#endif /* HAVE_DNLC */
34dc7c2f 1760
19d55079
MA
1761 mutex_enter(&zp->z_lock);
1762 may_delete_now = atomic_read(&ip->i_count) == 1 && !(zp->z_is_mapped);
1763 mutex_exit(&zp->z_lock);
1764
34dc7c2f 1765 /*
a966c564
K
1766 * We may delete the znode now, or we may put it in the unlinked set;
1767 * it depends on whether we're the last link, and on whether there are
1768 * other holds on the inode. So we dmu_tx_hold() the right things to
1769 * allow for either case.
34dc7c2f 1770 */
572e2857 1771 obj = zp->z_id;
0037b49e 1772 tx = dmu_tx_create(zfsvfs->z_os);
34dc7c2f 1773 dmu_tx_hold_zap(tx, dzp->z_id, FALSE, name);
428870ff
BB
1774 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
1775 zfs_sa_upgrade_txholds(tx, zp);
1776 zfs_sa_upgrade_txholds(tx, dzp);
a966c564
K
1777 if (may_delete_now) {
1778 toobig = zp->z_size > zp->z_blksz * zfs_delete_blocks;
1779 /* if the file is too big, only hold_free a token amount */
1780 dmu_tx_hold_free(tx, zp->z_id, 0,
1781 (toobig ? DMU_MAX_ACCESS : DMU_OBJECT_END));
1782 }
34dc7c2f
BB
1783
1784 /* are there any extended attributes? */
0037b49e 1785 error = sa_lookup(zp->z_sa_hdl, SA_ZPL_XATTR(zfsvfs),
428870ff 1786 &xattr_obj, sizeof (xattr_obj));
572e2857 1787 if (error == 0 && xattr_obj) {
0037b49e 1788 error = zfs_zget(zfsvfs, xattr_obj, &xzp);
c99c9001 1789 ASSERT0(error);
428870ff
BB
1790 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_TRUE);
1791 dmu_tx_hold_sa(tx, xzp->z_sa_hdl, B_FALSE);
34dc7c2f
BB
1792 }
1793
a966c564
K
1794 mutex_enter(&zp->z_lock);
1795 if ((acl_obj = zfs_external_acl(zp)) != 0 && may_delete_now)
1796 dmu_tx_hold_free(tx, acl_obj, 0, DMU_OBJECT_END);
1797 mutex_exit(&zp->z_lock);
1798
34dc7c2f 1799 /* charge as an update -- would be nice not to charge at all */
0037b49e 1800 dmu_tx_hold_zap(tx, zfsvfs->z_unlinkedobj, FALSE, NULL);
34dc7c2f 1801
19d55079 1802 /*
1a04bab3 1803 * Mark this transaction as typically resulting in a net free of space
19d55079 1804 */
1a04bab3 1805 dmu_tx_mark_netfree(tx);
19d55079 1806
0735ecb3 1807 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
1808 if (error) {
1809 zfs_dirent_unlock(dl);
fb5f0bc8 1810 if (error == ERESTART) {
e8b96c60 1811 waited = B_TRUE;
34dc7c2f
BB
1812 dmu_tx_wait(tx);
1813 dmu_tx_abort(tx);
ea7e86d8
BB
1814 iput(ip);
1815 if (xzp)
1816 iput(ZTOI(xzp));
34dc7c2f
BB
1817 goto top;
1818 }
1819 if (realnmp)
1820 pn_free(realnmp);
1821 dmu_tx_abort(tx);
ea7e86d8
BB
1822 iput(ip);
1823 if (xzp)
1824 iput(ZTOI(xzp));
0037b49e 1825 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1826 return (error);
1827 }
1828
1829 /*
1830 * Remove the directory entry.
1831 */
1832 error = zfs_link_destroy(dl, zp, tx, zflg, &unlinked);
1833
1834 if (error) {
1835 dmu_tx_commit(tx);
1836 goto out;
1837 }
1838
1839 if (unlinked) {
572e2857
BB
1840 /*
1841 * Hold z_lock so that we can make sure that the ACL obj
1842 * hasn't changed. Could have been deleted due to
1843 * zfs_sa_upgrade().
1844 */
1845 mutex_enter(&zp->z_lock);
0037b49e 1846 (void) sa_lookup(zp->z_sa_hdl, SA_ZPL_XATTR(zfsvfs),
428870ff 1847 &xattr_obj_unlinked, sizeof (xattr_obj_unlinked));
a966c564
K
1848 delete_now = may_delete_now && !toobig &&
1849 atomic_read(&ip->i_count) == 1 && !(zp->z_is_mapped) &&
1850 xattr_obj == xattr_obj_unlinked && zfs_external_acl(zp) ==
1851 acl_obj;
1852 }
1853
1854 if (delete_now) {
1855 if (xattr_obj_unlinked) {
dfbc8630 1856 ASSERT3U(ZTOI(xzp)->i_nlink, ==, 2);
a966c564
K
1857 mutex_enter(&xzp->z_lock);
1858 xzp->z_unlinked = 1;
dfbc8630
CD
1859 clear_nlink(ZTOI(xzp));
1860 links = 0;
0037b49e 1861 error = sa_update(xzp->z_sa_hdl, SA_ZPL_LINKS(zfsvfs),
dfbc8630 1862 &links, sizeof (links), tx);
a966c564
K
1863 ASSERT3U(error, ==, 0);
1864 mutex_exit(&xzp->z_lock);
1865 zfs_unlinked_add(xzp, tx);
1866
1867 if (zp->z_is_sa)
1868 error = sa_remove(zp->z_sa_hdl,
0037b49e 1869 SA_ZPL_XATTR(zfsvfs), tx);
a966c564
K
1870 else
1871 error = sa_update(zp->z_sa_hdl,
0037b49e 1872 SA_ZPL_XATTR(zfsvfs), &null_xattr,
a966c564
K
1873 sizeof (uint64_t), tx);
1874 ASSERT0(error);
1875 }
1876 /*
1877 * Add to the unlinked set because a new reference could be
1878 * taken concurrently resulting in a deferred destruction.
1879 */
1880 zfs_unlinked_add(zp, tx);
1881 mutex_exit(&zp->z_lock);
a966c564 1882 } else if (unlinked) {
572e2857 1883 mutex_exit(&zp->z_lock);
34dc7c2f
BB
1884 zfs_unlinked_add(zp, tx);
1885 }
1886
1887 txtype = TX_REMOVE;
1888 if (flags & FIGNORECASE)
1889 txtype |= TX_CI;
572e2857 1890 zfs_log_remove(zilog, tx, txtype, dzp, name, obj);
34dc7c2f
BB
1891
1892 dmu_tx_commit(tx);
1893out:
1894 if (realnmp)
1895 pn_free(realnmp);
1896
1897 zfs_dirent_unlock(dl);
960e08fe 1898 zfs_inode_update(dzp);
ea7e86d8 1899 zfs_inode_update(zp);
34dc7c2f 1900
ea7e86d8
BB
1901 if (delete_now)
1902 iput(ip);
1903 else
a966c564 1904 zfs_iput_async(ip);
a966c564
K
1905
1906 if (xzp) {
1907 zfs_inode_update(xzp);
1908 zfs_iput_async(ZTOI(xzp));
1909 }
428870ff 1910
0037b49e 1911 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 1912 zil_commit(zilog, 0);
34dc7c2f 1913
0037b49e 1914 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1915 return (error);
1916}
1917
1918/*
3558fd73 1919 * Create a new directory and insert it into dip using the name
34dc7c2f
BB
1920 * provided. Return a pointer to the inserted directory.
1921 *
3558fd73 1922 * IN: dip - inode of directory to add subdir to.
34dc7c2f
BB
1923 * dirname - name of new directory.
1924 * vap - attributes of new directory.
1925 * cr - credentials of caller.
34dc7c2f
BB
1926 * vsecp - ACL to be set
1927 *
3558fd73 1928 * OUT: ipp - inode of created directory.
34dc7c2f
BB
1929 *
1930 * RETURN: 0 if success
1931 * error code if failure
1932 *
1933 * Timestamps:
3558fd73
BB
1934 * dip - ctime|mtime updated
1935 * ipp - ctime|mtime|atime updated
34dc7c2f
BB
1936 */
1937/*ARGSUSED*/
e5c39b95 1938int
3558fd73
BB
1939zfs_mkdir(struct inode *dip, char *dirname, vattr_t *vap, struct inode **ipp,
1940 cred_t *cr, int flags, vsecattr_t *vsecp)
34dc7c2f 1941{
3558fd73 1942 znode_t *zp, *dzp = ITOZ(dip);
0037b49e 1943 zfsvfs_t *zfsvfs = ITOZSB(dip);
34dc7c2f
BB
1944 zilog_t *zilog;
1945 zfs_dirlock_t *dl;
1946 uint64_t txtype;
1947 dmu_tx_t *tx;
1948 int error;
34dc7c2f 1949 int zf = ZNEW;
b128c09f
BB
1950 uid_t uid;
1951 gid_t gid = crgetgid(cr);
428870ff 1952 zfs_acl_ids_t acl_ids;
9babb374 1953 boolean_t fuid_dirtied;
e8b96c60 1954 boolean_t waited = B_FALSE;
34dc7c2f 1955
3558fd73 1956 ASSERT(S_ISDIR(vap->va_mode));
34dc7c2f
BB
1957
1958 /*
1959 * If we have an ephemeral id, ACL, or XVATTR then
1960 * make sure file system is at proper version
1961 */
1962
3558fd73 1963 uid = crgetuid(cr);
0037b49e 1964 if (zfsvfs->z_use_fuids == B_FALSE &&
3558fd73 1965 (vsecp || IS_EPHEMERAL(uid) || IS_EPHEMERAL(gid)))
2e528b49 1966 return (SET_ERROR(EINVAL));
34dc7c2f 1967
32dec7bd 1968 if (dirname == NULL)
1969 return (SET_ERROR(EINVAL));
1970
0037b49e 1971 ZFS_ENTER(zfsvfs);
34dc7c2f 1972 ZFS_VERIFY_ZP(dzp);
0037b49e 1973 zilog = zfsvfs->z_log;
34dc7c2f 1974
428870ff 1975 if (dzp->z_pflags & ZFS_XATTR) {
0037b49e 1976 ZFS_EXIT(zfsvfs);
2e528b49 1977 return (SET_ERROR(EINVAL));
34dc7c2f
BB
1978 }
1979
0037b49e 1980 if (zfsvfs->z_utf8 && u8_validate(dirname,
34dc7c2f 1981 strlen(dirname), NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 1982 ZFS_EXIT(zfsvfs);
2e528b49 1983 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
1984 }
1985 if (flags & FIGNORECASE)
1986 zf |= ZCILOOK;
1987
5484965a 1988 if (vap->va_mask & ATTR_XVATTR) {
34dc7c2f 1989 if ((error = secpolicy_xvattr((xvattr_t *)vap,
3558fd73 1990 crgetuid(cr), cr, vap->va_mode)) != 0) {
0037b49e 1991 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
1992 return (error);
1993 }
428870ff 1994 }
34dc7c2f 1995
428870ff
BB
1996 if ((error = zfs_acl_ids_create(dzp, 0, vap, cr,
1997 vsecp, &acl_ids)) != 0) {
0037b49e 1998 ZFS_EXIT(zfsvfs);
428870ff
BB
1999 return (error);
2000 }
34dc7c2f
BB
2001 /*
2002 * First make sure the new directory doesn't exist.
428870ff
BB
2003 *
2004 * Existence is checked first to make sure we don't return
2005 * EACCES instead of EEXIST which can cause some applications
2006 * to fail.
34dc7c2f
BB
2007 */
2008top:
3558fd73 2009 *ipp = NULL;
34dc7c2f 2010
149e873a
BB
2011 if ((error = zfs_dirent_lock(&dl, dzp, dirname, &zp, zf,
2012 NULL, NULL))) {
428870ff 2013 zfs_acl_ids_free(&acl_ids);
0037b49e 2014 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2015 return (error);
2016 }
2017
149e873a 2018 if ((error = zfs_zaccess(dzp, ACE_ADD_SUBDIRECTORY, 0, B_FALSE, cr))) {
428870ff 2019 zfs_acl_ids_free(&acl_ids);
34dc7c2f 2020 zfs_dirent_unlock(dl);
0037b49e 2021 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2022 return (error);
2023 }
2024
9c5167d1 2025 if (zfs_acl_ids_overquota(zfsvfs, &acl_ids, zfs_inherit_projid(dzp))) {
45d1cae3 2026 zfs_acl_ids_free(&acl_ids);
9babb374 2027 zfs_dirent_unlock(dl);
0037b49e 2028 ZFS_EXIT(zfsvfs);
2e528b49 2029 return (SET_ERROR(EDQUOT));
9babb374
BB
2030 }
2031
34dc7c2f
BB
2032 /*
2033 * Add a new entry to the directory.
2034 */
0037b49e 2035 tx = dmu_tx_create(zfsvfs->z_os);
34dc7c2f
BB
2036 dmu_tx_hold_zap(tx, dzp->z_id, TRUE, dirname);
2037 dmu_tx_hold_zap(tx, DMU_NEW_OBJECT, FALSE, NULL);
0037b49e 2038 fuid_dirtied = zfsvfs->z_fuid_dirty;
9babb374 2039 if (fuid_dirtied)
0037b49e
BB
2040 zfs_fuid_txhold(zfsvfs, tx);
2041 if (!zfsvfs->z_use_sa && acl_ids.z_aclp->z_acl_bytes > ZFS_ACE_SPACE) {
428870ff
BB
2042 dmu_tx_hold_write(tx, DMU_NEW_OBJECT, 0,
2043 acl_ids.z_aclp->z_acl_bytes);
2044 }
2045
2046 dmu_tx_hold_sa_create(tx, acl_ids.z_aclp->z_acl_bytes +
2047 ZFS_SA_BASE_ATTR_SIZE);
2048
0735ecb3 2049 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
2050 if (error) {
2051 zfs_dirent_unlock(dl);
fb5f0bc8 2052 if (error == ERESTART) {
e8b96c60 2053 waited = B_TRUE;
34dc7c2f
BB
2054 dmu_tx_wait(tx);
2055 dmu_tx_abort(tx);
2056 goto top;
2057 }
428870ff 2058 zfs_acl_ids_free(&acl_ids);
34dc7c2f 2059 dmu_tx_abort(tx);
0037b49e 2060 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2061 return (error);
2062 }
2063
2064 /*
2065 * Create new node.
2066 */
428870ff 2067 zfs_mknode(dzp, vap, tx, cr, 0, &zp, &acl_ids);
34dc7c2f
BB
2068
2069 /*
2070 * Now put new name in parent dir.
2071 */
599b8648
CC
2072 error = zfs_link_create(dl, zp, tx, ZNEW);
2073 if (error != 0) {
2074 zfs_znode_delete(zp, tx);
2075 remove_inode_hash(ZTOI(zp));
2076 goto out;
2077 }
2078
2079 if (fuid_dirtied)
2080 zfs_fuid_sync(zfsvfs, tx);
34dc7c2f 2081
3558fd73 2082 *ipp = ZTOI(zp);
34dc7c2f
BB
2083
2084 txtype = zfs_log_create_txtype(Z_DIR, vsecp, vap);
2085 if (flags & FIGNORECASE)
2086 txtype |= TX_CI;
9babb374
BB
2087 zfs_log_create(zilog, tx, txtype, dzp, zp, dirname, vsecp,
2088 acl_ids.z_fuidp, vap);
34dc7c2f 2089
599b8648 2090out:
9babb374 2091 zfs_acl_ids_free(&acl_ids);
428870ff 2092
34dc7c2f
BB
2093 dmu_tx_commit(tx);
2094
2095 zfs_dirent_unlock(dl);
2096
0037b49e 2097 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 2098 zil_commit(zilog, 0);
428870ff 2099
599b8648
CC
2100 if (error != 0) {
2101 iput(ZTOI(zp));
2102 } else {
2103 zfs_inode_update(dzp);
2104 zfs_inode_update(zp);
2105 }
0037b49e 2106 ZFS_EXIT(zfsvfs);
599b8648 2107 return (error);
34dc7c2f
BB
2108}
2109
2110/*
2111 * Remove a directory subdir entry. If the current working
2112 * directory is the same as the subdir to be removed, the
2113 * remove will fail.
2114 *
3558fd73 2115 * IN: dip - inode of directory to remove from.
34dc7c2f 2116 * name - name of directory to be removed.
3558fd73 2117 * cwd - inode of current working directory.
34dc7c2f 2118 * cr - credentials of caller.
34dc7c2f
BB
2119 * flags - case flags
2120 *
d3cc8b15 2121 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
2122 *
2123 * Timestamps:
3558fd73 2124 * dip - ctime|mtime updated
34dc7c2f
BB
2125 */
2126/*ARGSUSED*/
e5c39b95 2127int
3558fd73
BB
2128zfs_rmdir(struct inode *dip, char *name, struct inode *cwd, cred_t *cr,
2129 int flags)
34dc7c2f 2130{
3558fd73 2131 znode_t *dzp = ITOZ(dip);
34dc7c2f 2132 znode_t *zp;
3558fd73 2133 struct inode *ip;
0037b49e 2134 zfsvfs_t *zfsvfs = ITOZSB(dip);
34dc7c2f
BB
2135 zilog_t *zilog;
2136 zfs_dirlock_t *dl;
2137 dmu_tx_t *tx;
2138 int error;
2139 int zflg = ZEXISTS;
e8b96c60 2140 boolean_t waited = B_FALSE;
34dc7c2f 2141
32dec7bd 2142 if (name == NULL)
2143 return (SET_ERROR(EINVAL));
2144
0037b49e 2145 ZFS_ENTER(zfsvfs);
34dc7c2f 2146 ZFS_VERIFY_ZP(dzp);
0037b49e 2147 zilog = zfsvfs->z_log;
34dc7c2f
BB
2148
2149 if (flags & FIGNORECASE)
2150 zflg |= ZCILOOK;
2151top:
2152 zp = NULL;
2153
2154 /*
2155 * Attempt to lock directory; fail if entry doesn't exist.
2156 */
149e873a
BB
2157 if ((error = zfs_dirent_lock(&dl, dzp, name, &zp, zflg,
2158 NULL, NULL))) {
0037b49e 2159 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2160 return (error);
2161 }
2162
3558fd73 2163 ip = ZTOI(zp);
34dc7c2f 2164
149e873a 2165 if ((error = zfs_zaccess_delete(dzp, zp, cr))) {
34dc7c2f
BB
2166 goto out;
2167 }
2168
3558fd73 2169 if (!S_ISDIR(ip->i_mode)) {
2e528b49 2170 error = SET_ERROR(ENOTDIR);
34dc7c2f
BB
2171 goto out;
2172 }
2173
3558fd73 2174 if (ip == cwd) {
2e528b49 2175 error = SET_ERROR(EINVAL);
34dc7c2f
BB
2176 goto out;
2177 }
2178
34dc7c2f 2179 /*
4e33ba4c 2180 * Grab a lock on the directory to make sure that no one is
34dc7c2f
BB
2181 * trying to add (or lookup) entries while we are removing it.
2182 */
2183 rw_enter(&zp->z_name_lock, RW_WRITER);
2184
2185 /*
2186 * Grab a lock on the parent pointer to make sure we play well
2187 * with the treewalk and directory rename code.
2188 */
2189 rw_enter(&zp->z_parent_lock, RW_WRITER);
2190
0037b49e 2191 tx = dmu_tx_create(zfsvfs->z_os);
34dc7c2f 2192 dmu_tx_hold_zap(tx, dzp->z_id, FALSE, name);
428870ff 2193 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
0037b49e 2194 dmu_tx_hold_zap(tx, zfsvfs->z_unlinkedobj, FALSE, NULL);
428870ff
BB
2195 zfs_sa_upgrade_txholds(tx, zp);
2196 zfs_sa_upgrade_txholds(tx, dzp);
db707ad0 2197 dmu_tx_mark_netfree(tx);
0735ecb3 2198 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
2199 if (error) {
2200 rw_exit(&zp->z_parent_lock);
2201 rw_exit(&zp->z_name_lock);
2202 zfs_dirent_unlock(dl);
fb5f0bc8 2203 if (error == ERESTART) {
e8b96c60 2204 waited = B_TRUE;
34dc7c2f
BB
2205 dmu_tx_wait(tx);
2206 dmu_tx_abort(tx);
ea7e86d8 2207 iput(ip);
34dc7c2f
BB
2208 goto top;
2209 }
2210 dmu_tx_abort(tx);
ea7e86d8 2211 iput(ip);
0037b49e 2212 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2213 return (error);
2214 }
2215
2216 error = zfs_link_destroy(dl, zp, tx, zflg, NULL);
2217
2218 if (error == 0) {
2219 uint64_t txtype = TX_RMDIR;
2220 if (flags & FIGNORECASE)
2221 txtype |= TX_CI;
572e2857 2222 zfs_log_remove(zilog, tx, txtype, dzp, name, ZFS_NO_OBJECT);
34dc7c2f
BB
2223 }
2224
2225 dmu_tx_commit(tx);
2226
2227 rw_exit(&zp->z_parent_lock);
2228 rw_exit(&zp->z_name_lock);
2229out:
2230 zfs_dirent_unlock(dl);
2231
59157910
BB
2232 zfs_inode_update(dzp);
2233 zfs_inode_update(zp);
3558fd73 2234 iput(ip);
34dc7c2f 2235
0037b49e 2236 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 2237 zil_commit(zilog, 0);
428870ff 2238
0037b49e 2239 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2240 return (error);
2241}
2242
2243/*
2244 * Read as many directory entries as will fit into the provided
3558fd73 2245 * dirent buffer from the given directory cursor position.
34dc7c2f 2246 *
3558fd73
BB
2247 * IN: ip - inode of directory to read.
2248 * dirent - buffer for directory entries.
34dc7c2f 2249 *
3558fd73 2250 * OUT: dirent - filler buffer of directory entries.
34dc7c2f
BB
2251 *
2252 * RETURN: 0 if success
2253 * error code if failure
2254 *
2255 * Timestamps:
3558fd73 2256 * ip - atime updated
34dc7c2f
BB
2257 *
2258 * Note that the low 4 bits of the cookie returned by zap is always zero.
2259 * This allows us to use the low range for "special" directory entries:
2260 * We use 0 for '.', and 1 for '..'. If this is the root of the filesystem,
2261 * we use the offset 2 for the '.zfs' directory.
2262 */
2263/* ARGSUSED */
3558fd73 2264int
9464b959 2265zfs_readdir(struct inode *ip, zpl_dir_context_t *ctx, cred_t *cr)
34dc7c2f 2266{
3558fd73 2267 znode_t *zp = ITOZ(ip);
0037b49e 2268 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f 2269 objset_t *os;
34dc7c2f
BB
2270 zap_cursor_t zc;
2271 zap_attribute_t zap;
34dc7c2f
BB
2272 int error;
2273 uint8_t prefetch;
c12e3a59 2274 uint8_t type;
3558fd73
BB
2275 int done = 0;
2276 uint64_t parent;
c12e3a59 2277 uint64_t offset; /* must be unsigned; checks for < 1 */
34dc7c2f 2278
0037b49e 2279 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
2280 ZFS_VERIFY_ZP(zp);
2281
0037b49e 2282 if ((error = sa_lookup(zp->z_sa_hdl, SA_ZPL_PARENT(zfsvfs),
3558fd73
BB
2283 &parent, sizeof (parent))) != 0)
2284 goto out;
34dc7c2f
BB
2285
2286 /*
2287 * Quit if directory has been removed (posix)
2288 */
3558fd73
BB
2289 if (zp->z_unlinked)
2290 goto out;
2291
c12e3a59 2292 error = 0;
0037b49e 2293 os = zfsvfs->z_os;
c12e3a59 2294 offset = ctx->pos;
34dc7c2f
BB
2295 prefetch = zp->z_zn_prefetch;
2296
2297 /*
2298 * Initialize the iterator cursor.
2299 */
c12e3a59 2300 if (offset <= 3) {
34dc7c2f
BB
2301 /*
2302 * Start iteration from the beginning of the directory.
2303 */
2304 zap_cursor_init(&zc, os, zp->z_id);
2305 } else {
2306 /*
2307 * The offset is a serialized cursor.
2308 */
c12e3a59 2309 zap_cursor_init_serialized(&zc, os, zp->z_id, offset);
34dc7c2f
BB
2310 }
2311
34dc7c2f
BB
2312 /*
2313 * Transform to file-system independent format
2314 */
3558fd73
BB
2315 while (!done) {
2316 uint64_t objnum;
34dc7c2f
BB
2317 /*
2318 * Special case `.', `..', and `.zfs'.
2319 */
c12e3a59 2320 if (offset == 0) {
34dc7c2f
BB
2321 (void) strcpy(zap.za_name, ".");
2322 zap.za_normalization_conflict = 0;
2323 objnum = zp->z_id;
c12e3a59
RY
2324 type = DT_DIR;
2325 } else if (offset == 1) {
34dc7c2f
BB
2326 (void) strcpy(zap.za_name, "..");
2327 zap.za_normalization_conflict = 0;
428870ff 2328 objnum = parent;
c12e3a59
RY
2329 type = DT_DIR;
2330 } else if (offset == 2 && zfs_show_ctldir(zp)) {
34dc7c2f
BB
2331 (void) strcpy(zap.za_name, ZFS_CTLDIR_NAME);
2332 zap.za_normalization_conflict = 0;
2333 objnum = ZFSCTL_INO_ROOT;
c12e3a59 2334 type = DT_DIR;
34dc7c2f
BB
2335 } else {
2336 /*
2337 * Grab next entry.
2338 */
3558fd73
BB
2339 if ((error = zap_cursor_retrieve(&zc, &zap))) {
2340 if (error == ENOENT)
34dc7c2f
BB
2341 break;
2342 else
2343 goto update;
2344 }
2345
0c5dde49
BB
2346 /*
2347 * Allow multiple entries provided the first entry is
2348 * the object id. Non-zpl consumers may safely make
2349 * use of the additional space.
2350 *
2351 * XXX: This should be a feature flag for compatibility
2352 */
34dc7c2f 2353 if (zap.za_integer_length != 8 ||
0c5dde49 2354 zap.za_num_integers == 0) {
34dc7c2f 2355 cmn_err(CE_WARN, "zap_readdir: bad directory "
0c5dde49
BB
2356 "entry, obj = %lld, offset = %lld, "
2357 "length = %d, num = %lld\n",
34dc7c2f 2358 (u_longlong_t)zp->z_id,
c12e3a59 2359 (u_longlong_t)offset,
0c5dde49
BB
2360 zap.za_integer_length,
2361 (u_longlong_t)zap.za_num_integers);
2e528b49 2362 error = SET_ERROR(ENXIO);
34dc7c2f
BB
2363 goto update;
2364 }
2365
2366 objnum = ZFS_DIRENT_OBJ(zap.za_first_integer);
c12e3a59 2367 type = ZFS_DIRENT_TYPE(zap.za_first_integer);
34dc7c2f 2368 }
0f37d0c8 2369
9464b959 2370 done = !zpl_dir_emit(ctx, zap.za_name, strlen(zap.za_name),
c12e3a59 2371 objnum, type);
0f37d0c8 2372 if (done)
34dc7c2f 2373 break;
34dc7c2f
BB
2374
2375 /* Prefetch znode */
3558fd73 2376 if (prefetch) {
fcff0f35
PD
2377 dmu_prefetch(os, objnum, 0, 0, 0,
2378 ZIO_PRIORITY_SYNC_READ);
3558fd73 2379 }
34dc7c2f 2380
c12e3a59
RY
2381 /*
2382 * Move to the next entry, fill in the previous offset.
2383 */
2384 if (offset > 2 || (offset == 2 && !zfs_show_ctldir(zp))) {
34dc7c2f 2385 zap_cursor_advance(&zc);
c12e3a59 2386 offset = zap_cursor_serialize(&zc);
34dc7c2f 2387 } else {
c12e3a59 2388 offset += 1;
34dc7c2f 2389 }
c12e3a59 2390 ctx->pos = offset;
34dc7c2f
BB
2391 }
2392 zp->z_zn_prefetch = B_FALSE; /* a lookup will re-enable pre-fetching */
2393
34dc7c2f
BB
2394update:
2395 zap_cursor_fini(&zc);
34dc7c2f
BB
2396 if (error == ENOENT)
2397 error = 0;
3558fd73 2398out:
0037b49e 2399 ZFS_EXIT(zfsvfs);
34dc7c2f 2400
34dc7c2f
BB
2401 return (error);
2402}
2403
d5446cfc
BB
2404ulong_t zfs_fsync_sync_cnt = 4;
2405
e5c39b95 2406int
3558fd73 2407zfs_fsync(struct inode *ip, int syncflag, cred_t *cr)
34dc7c2f 2408{
3558fd73 2409 znode_t *zp = ITOZ(ip);
0037b49e 2410 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f 2411
d5446cfc
BB
2412 (void) tsd_set(zfs_fsyncer_key, (void *)zfs_fsync_sync_cnt);
2413
0037b49e
BB
2414 if (zfsvfs->z_os->os_sync != ZFS_SYNC_DISABLED) {
2415 ZFS_ENTER(zfsvfs);
428870ff 2416 ZFS_VERIFY_ZP(zp);
0037b49e
BB
2417 zil_commit(zfsvfs->z_log, zp->z_id);
2418 ZFS_EXIT(zfsvfs);
428870ff 2419 }
07012da6
CC
2420 tsd_set(zfs_fsyncer_key, NULL);
2421
34dc7c2f
BB
2422 return (0);
2423}
2424
2425
2426/*
2427 * Get the requested file attributes and place them in the provided
2428 * vattr structure.
2429 *
3558fd73 2430 * IN: ip - inode of file.
5484965a
BB
2431 * vap - va_mask identifies requested attributes.
2432 * If ATTR_XVATTR set, then optional attrs are requested
34dc7c2f
BB
2433 * flags - ATTR_NOACLCHECK (CIFS server context)
2434 * cr - credentials of caller.
34dc7c2f 2435 *
5484965a
BB
2436 * OUT: vap - attribute values.
2437 *
2438 * RETURN: 0 (always succeeds)
34dc7c2f
BB
2439 */
2440/* ARGSUSED */
e5c39b95 2441int
5484965a 2442zfs_getattr(struct inode *ip, vattr_t *vap, int flags, cred_t *cr)
34dc7c2f 2443{
3558fd73 2444 znode_t *zp = ITOZ(ip);
0037b49e 2445 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
2446 int error = 0;
2447 uint64_t links;
0df9673f 2448 uint64_t atime[2], mtime[2], ctime[2];
5484965a
BB
2449 xvattr_t *xvap = (xvattr_t *)vap; /* vap may be an xvattr_t * */
2450 xoptattr_t *xoap = NULL;
34dc7c2f 2451 boolean_t skipaclchk = (flags & ATTR_NOACLCHECK) ? B_TRUE : B_FALSE;
0df9673f 2452 sa_bulk_attr_t bulk[3];
428870ff 2453 int count = 0;
34dc7c2f 2454
0037b49e 2455 ZFS_ENTER(zfsvfs);
34dc7c2f 2456 ZFS_VERIFY_ZP(zp);
428870ff 2457
5484965a 2458 zfs_fuid_map_ids(zp, cr, &vap->va_uid, &vap->va_gid);
572e2857 2459
0037b49e
BB
2460 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_ATIME(zfsvfs), NULL, &atime, 16);
2461 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_MTIME(zfsvfs), NULL, &mtime, 16);
2462 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_CTIME(zfsvfs), NULL, &ctime, 16);
428870ff
BB
2463
2464 if ((error = sa_bulk_lookup(zp->z_sa_hdl, bulk, count)) != 0) {
0037b49e 2465 ZFS_EXIT(zfsvfs);
428870ff
BB
2466 return (error);
2467 }
34dc7c2f 2468
34dc7c2f
BB
2469 /*
2470 * If ACL is trivial don't bother looking for ACE_READ_ATTRIBUTES.
2471 * Also, if we are the owner don't bother, since owner should
2472 * always be allowed to read basic attributes of file.
2473 */
572e2857 2474 if (!(zp->z_pflags & ZFS_ACL_TRIVIAL) &&
5484965a 2475 (vap->va_uid != crgetuid(cr))) {
149e873a
BB
2476 if ((error = zfs_zaccess(zp, ACE_READ_ATTRIBUTES, 0,
2477 skipaclchk, cr))) {
0037b49e 2478 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2479 return (error);
2480 }
2481 }
2482
2483 /*
2484 * Return all attributes. It's cheaper to provide the answer
2485 * than to determine whether we were asked the question.
2486 */
2487
9babb374 2488 mutex_enter(&zp->z_lock);
5484965a
BB
2489 vap->va_type = vn_mode_to_vtype(zp->z_mode);
2490 vap->va_mode = zp->z_mode;
53cf50e0 2491 vap->va_fsid = ZTOI(zp)->i_sb->s_dev;
5484965a 2492 vap->va_nodeid = zp->z_id;
0037b49e 2493 if ((zp->z_id == zfsvfs->z_root) && zfs_show_ctldir(zp))
dfbc8630 2494 links = ZTOI(zp)->i_nlink + 1;
34dc7c2f 2495 else
dfbc8630 2496 links = ZTOI(zp)->i_nlink;
5484965a
BB
2497 vap->va_nlink = MIN(links, ZFS_LINK_MAX);
2498 vap->va_size = i_size_read(ip);
2499 vap->va_rdev = ip->i_rdev;
2500 vap->va_seq = ip->i_generation;
2501
2502 /*
2503 * Add in any requested optional attributes and the create time.
2504 * Also set the corresponding bits in the returned attribute bitmap.
2505 */
0037b49e 2506 if ((xoap = xva_getxoptattr(xvap)) != NULL && zfsvfs->z_use_fuids) {
5484965a
BB
2507 if (XVA_ISSET_REQ(xvap, XAT_ARCHIVE)) {
2508 xoap->xoa_archive =
2509 ((zp->z_pflags & ZFS_ARCHIVE) != 0);
2510 XVA_SET_RTN(xvap, XAT_ARCHIVE);
2511 }
2512
2513 if (XVA_ISSET_REQ(xvap, XAT_READONLY)) {
2514 xoap->xoa_readonly =
2515 ((zp->z_pflags & ZFS_READONLY) != 0);
2516 XVA_SET_RTN(xvap, XAT_READONLY);
2517 }
2518
2519 if (XVA_ISSET_REQ(xvap, XAT_SYSTEM)) {
2520 xoap->xoa_system =
2521 ((zp->z_pflags & ZFS_SYSTEM) != 0);
2522 XVA_SET_RTN(xvap, XAT_SYSTEM);
2523 }
2524
2525 if (XVA_ISSET_REQ(xvap, XAT_HIDDEN)) {
2526 xoap->xoa_hidden =
2527 ((zp->z_pflags & ZFS_HIDDEN) != 0);
2528 XVA_SET_RTN(xvap, XAT_HIDDEN);
2529 }
2530
2531 if (XVA_ISSET_REQ(xvap, XAT_NOUNLINK)) {
2532 xoap->xoa_nounlink =
2533 ((zp->z_pflags & ZFS_NOUNLINK) != 0);
2534 XVA_SET_RTN(xvap, XAT_NOUNLINK);
2535 }
2536
2537 if (XVA_ISSET_REQ(xvap, XAT_IMMUTABLE)) {
2538 xoap->xoa_immutable =
2539 ((zp->z_pflags & ZFS_IMMUTABLE) != 0);
2540 XVA_SET_RTN(xvap, XAT_IMMUTABLE);
2541 }
2542
2543 if (XVA_ISSET_REQ(xvap, XAT_APPENDONLY)) {
2544 xoap->xoa_appendonly =
2545 ((zp->z_pflags & ZFS_APPENDONLY) != 0);
2546 XVA_SET_RTN(xvap, XAT_APPENDONLY);
2547 }
2548
2549 if (XVA_ISSET_REQ(xvap, XAT_NODUMP)) {
2550 xoap->xoa_nodump =
2551 ((zp->z_pflags & ZFS_NODUMP) != 0);
2552 XVA_SET_RTN(xvap, XAT_NODUMP);
2553 }
2554
2555 if (XVA_ISSET_REQ(xvap, XAT_OPAQUE)) {
2556 xoap->xoa_opaque =
2557 ((zp->z_pflags & ZFS_OPAQUE) != 0);
2558 XVA_SET_RTN(xvap, XAT_OPAQUE);
2559 }
2560
2561 if (XVA_ISSET_REQ(xvap, XAT_AV_QUARANTINED)) {
2562 xoap->xoa_av_quarantined =
2563 ((zp->z_pflags & ZFS_AV_QUARANTINED) != 0);
2564 XVA_SET_RTN(xvap, XAT_AV_QUARANTINED);
2565 }
2566
2567 if (XVA_ISSET_REQ(xvap, XAT_AV_MODIFIED)) {
2568 xoap->xoa_av_modified =
2569 ((zp->z_pflags & ZFS_AV_MODIFIED) != 0);
2570 XVA_SET_RTN(xvap, XAT_AV_MODIFIED);
2571 }
2572
2573 if (XVA_ISSET_REQ(xvap, XAT_AV_SCANSTAMP) &&
2574 S_ISREG(ip->i_mode)) {
2575 zfs_sa_get_scanstamp(zp, xvap);
2576 }
34dc7c2f 2577
5484965a
BB
2578 if (XVA_ISSET_REQ(xvap, XAT_CREATETIME)) {
2579 uint64_t times[2];
2580
0037b49e 2581 (void) sa_lookup(zp->z_sa_hdl, SA_ZPL_CRTIME(zfsvfs),
5484965a
BB
2582 times, sizeof (times));
2583 ZFS_TIME_DECODE(&xoap->xoa_createtime, times);
2584 XVA_SET_RTN(xvap, XAT_CREATETIME);
2585 }
2586
2587 if (XVA_ISSET_REQ(xvap, XAT_REPARSE)) {
2588 xoap->xoa_reparse = ((zp->z_pflags & ZFS_REPARSE) != 0);
2589 XVA_SET_RTN(xvap, XAT_REPARSE);
2590 }
2591 if (XVA_ISSET_REQ(xvap, XAT_GEN)) {
278f2236 2592 xoap->xoa_generation = ip->i_generation;
5484965a
BB
2593 XVA_SET_RTN(xvap, XAT_GEN);
2594 }
2595
2596 if (XVA_ISSET_REQ(xvap, XAT_OFFLINE)) {
2597 xoap->xoa_offline =
2598 ((zp->z_pflags & ZFS_OFFLINE) != 0);
2599 XVA_SET_RTN(xvap, XAT_OFFLINE);
2600 }
2601
2602 if (XVA_ISSET_REQ(xvap, XAT_SPARSE)) {
2603 xoap->xoa_sparse =
2604 ((zp->z_pflags & ZFS_SPARSE) != 0);
2605 XVA_SET_RTN(xvap, XAT_SPARSE);
2606 }
9c5167d1
NF
2607
2608 if (XVA_ISSET_REQ(xvap, XAT_PROJINHERIT)) {
2609 xoap->xoa_projinherit =
2610 ((zp->z_pflags & ZFS_PROJINHERIT) != 0);
2611 XVA_SET_RTN(xvap, XAT_PROJINHERIT);
2612 }
2613
2614 if (XVA_ISSET_REQ(xvap, XAT_PROJID)) {
2615 xoap->xoa_projid = zp->z_projid;
2616 XVA_SET_RTN(xvap, XAT_PROJID);
2617 }
5484965a
BB
2618 }
2619
0df9673f 2620 ZFS_TIME_DECODE(&vap->va_atime, atime);
5484965a
BB
2621 ZFS_TIME_DECODE(&vap->va_mtime, mtime);
2622 ZFS_TIME_DECODE(&vap->va_ctime, ctime);
34dc7c2f
BB
2623
2624 mutex_exit(&zp->z_lock);
2625
5484965a 2626 sa_object_size(zp->z_sa_hdl, &vap->va_blksize, &vap->va_nblocks);
34dc7c2f
BB
2627
2628 if (zp->z_blksz == 0) {
2629 /*
2630 * Block size hasn't been set; suggest maximal I/O transfers.
2631 */
0037b49e 2632 vap->va_blksize = zfsvfs->z_max_blksz;
34dc7c2f
BB
2633 }
2634
0037b49e 2635 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
2636 return (0);
2637}
2638
057e8eee
BB
2639/*
2640 * Get the basic file attributes and place them in the provided kstat
2641 * structure. The inode is assumed to be the authoritative source
2642 * for most of the attributes. However, the znode currently has the
2643 * authoritative atime, blksize, and block count.
2644 *
2645 * IN: ip - inode of file.
2646 *
2647 * OUT: sp - kstat values.
2648 *
2649 * RETURN: 0 (always succeeds)
2650 */
2651/* ARGSUSED */
2652int
2653zfs_getattr_fast(struct inode *ip, struct kstat *sp)
2654{
2655 znode_t *zp = ITOZ(ip);
0037b49e 2656 zfsvfs_t *zfsvfs = ITOZSB(ip);
b585bc4a
BB
2657 uint32_t blksize;
2658 u_longlong_t nblocks;
057e8eee 2659
0037b49e 2660 ZFS_ENTER(zfsvfs);
a7b125e9
GB
2661 ZFS_VERIFY_ZP(zp);
2662
057e8eee
BB
2663 mutex_enter(&zp->z_lock);
2664
2665 generic_fillattr(ip, sp);
057e8eee 2666
b585bc4a
BB
2667 sa_object_size(zp->z_sa_hdl, &blksize, &nblocks);
2668 sp->blksize = blksize;
2669 sp->blocks = nblocks;
2670
057e8eee
BB
2671 if (unlikely(zp->z_blksz == 0)) {
2672 /*
2673 * Block size hasn't been set; suggest maximal I/O transfers.
2674 */
0037b49e 2675 sp->blksize = zfsvfs->z_max_blksz;
057e8eee
BB
2676 }
2677
2678 mutex_exit(&zp->z_lock);
2679
aa9b2708
AV
2680 /*
2681 * Required to prevent NFS client from detecting different inode
2682 * numbers of snapshot root dentry before and after snapshot mount.
2683 */
0037b49e 2684 if (zfsvfs->z_issnap) {
aa9b2708
AV
2685 if (ip->i_sb->s_root->d_inode == ip)
2686 sp->ino = ZFSCTL_INO_SNAPDIRS -
0037b49e 2687 dmu_objset_id(zfsvfs->z_os);
aa9b2708
AV
2688 }
2689
0037b49e 2690 ZFS_EXIT(zfsvfs);
a7b125e9 2691
057e8eee
BB
2692 return (0);
2693}
057e8eee 2694
9c5167d1
NF
2695/*
2696 * For the operation of changing file's user/group/project, we need to
2697 * handle not only the main object that is assigned to the file directly,
2698 * but also the ones that are used by the file via hidden xattr directory.
2699 *
2700 * Because the xattr directory may contains many EA entries, as to it may
2701 * be impossible to change all of them via the transaction of changing the
2702 * main object's user/group/project attributes. Then we have to change them
2703 * via other multiple independent transactions one by one. It may be not good
2704 * solution, but we have no better idea yet.
2705 */
2706static int
2707zfs_setattr_dir(znode_t *dzp)
2708{
2709 struct inode *dxip = ZTOI(dzp);
2710 struct inode *xip = NULL;
2711 zfsvfs_t *zfsvfs = ITOZSB(dxip);
2712 objset_t *os = zfsvfs->z_os;
2713 zap_cursor_t zc;
2714 zap_attribute_t zap;
2715 zfs_dirlock_t *dl;
2716 znode_t *zp;
2717 dmu_tx_t *tx = NULL;
2718 uint64_t uid, gid;
2719 sa_bulk_attr_t bulk[4];
2720 int count = 0;
2721 int err;
2722
2723 zap_cursor_init(&zc, os, dzp->z_id);
2724 while ((err = zap_cursor_retrieve(&zc, &zap)) == 0) {
2725 if (zap.za_integer_length != 8 || zap.za_num_integers != 1) {
2726 err = ENXIO;
2727 break;
2728 }
2729
2730 err = zfs_dirent_lock(&dl, dzp, (char *)zap.za_name, &zp,
2731 ZEXISTS, NULL, NULL);
2732 if (err == ENOENT)
2733 goto next;
2734 if (err)
2735 break;
2736
2737 xip = ZTOI(zp);
2738 if (KUID_TO_SUID(xip->i_uid) == KUID_TO_SUID(dxip->i_uid) &&
2739 KGID_TO_SGID(xip->i_gid) == KGID_TO_SGID(dxip->i_gid) &&
2740 zp->z_projid == dzp->z_projid)
2741 goto next;
2742
2743 tx = dmu_tx_create(os);
2744 if (!(zp->z_pflags & ZFS_PROJID))
2745 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_TRUE);
2746 else
2747 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
2748
2749 err = dmu_tx_assign(tx, TXG_WAIT);
2750 if (err)
2751 break;
2752
2753 mutex_enter(&dzp->z_lock);
2754
2755 if (KUID_TO_SUID(xip->i_uid) != KUID_TO_SUID(dxip->i_uid)) {
2756 xip->i_uid = dxip->i_uid;
2757 uid = zfs_uid_read(dxip);
2758 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_UID(zfsvfs), NULL,
2759 &uid, sizeof (uid));
2760 }
2761
2762 if (KGID_TO_SGID(xip->i_gid) != KGID_TO_SGID(dxip->i_gid)) {
2763 xip->i_gid = dxip->i_gid;
2764 gid = zfs_gid_read(dxip);
2765 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_GID(zfsvfs), NULL,
2766 &gid, sizeof (gid));
2767 }
2768
2769 if (zp->z_projid != dzp->z_projid) {
2770 if (!(zp->z_pflags & ZFS_PROJID)) {
2771 zp->z_pflags |= ZFS_PROJID;
2772 SA_ADD_BULK_ATTR(bulk, count,
2773 SA_ZPL_FLAGS(zfsvfs), NULL, &zp->z_pflags,
2774 sizeof (zp->z_pflags));
2775 }
2776
2777 zp->z_projid = dzp->z_projid;
2778 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_PROJID(zfsvfs),
2779 NULL, &zp->z_projid, sizeof (zp->z_projid));
2780 }
2781
2782 mutex_exit(&dzp->z_lock);
2783
2784 if (likely(count > 0)) {
2785 err = sa_bulk_update(zp->z_sa_hdl, bulk, count, tx);
2786 dmu_tx_commit(tx);
2787 } else {
2788 dmu_tx_abort(tx);
2789 }
2790 tx = NULL;
2791 if (err != 0 && err != ENOENT)
2792 break;
2793
2794next:
2795 if (xip) {
2796 iput(xip);
2797 xip = NULL;
2798 zfs_dirent_unlock(dl);
2799 }
2800 zap_cursor_advance(&zc);
2801 }
2802
2803 if (tx)
2804 dmu_tx_abort(tx);
2805 if (xip) {
2806 iput(xip);
2807 zfs_dirent_unlock(dl);
2808 }
2809 zap_cursor_fini(&zc);
2810
2811 return (err == ENOENT ? 0 : err);
2812}
2813
34dc7c2f
BB
2814/*
2815 * Set the file attributes to the values contained in the
2816 * vattr structure.
2817 *
3558fd73 2818 * IN: ip - inode of file to be modified.
34dc7c2f 2819 * vap - new attribute values.
5484965a 2820 * If ATTR_XVATTR set, then optional attrs are being set
34dc7c2f
BB
2821 * flags - ATTR_UTIME set if non-default time values provided.
2822 * - ATTR_NOACLCHECK (CIFS context only).
2823 * cr - credentials of caller.
34dc7c2f
BB
2824 *
2825 * RETURN: 0 if success
2826 * error code if failure
2827 *
2828 * Timestamps:
3558fd73 2829 * ip - ctime updated, mtime updated if size changed.
34dc7c2f
BB
2830 */
2831/* ARGSUSED */
e5c39b95 2832int
5484965a 2833zfs_setattr(struct inode *ip, vattr_t *vap, int flags, cred_t *cr)
34dc7c2f 2834{
3558fd73 2835 znode_t *zp = ITOZ(ip);
0037b49e 2836 zfsvfs_t *zfsvfs = ITOZSB(ip);
9c5167d1 2837 objset_t *os = zfsvfs->z_os;
34dc7c2f
BB
2838 zilog_t *zilog;
2839 dmu_tx_t *tx;
2840 vattr_t oldva;
f4ea75d4 2841 xvattr_t *tmpxvattr;
5484965a 2842 uint_t mask = vap->va_mask;
a117a6d6 2843 uint_t saved_mask = 0;
34dc7c2f
BB
2844 int trim_mask = 0;
2845 uint64_t new_mode;
64aefee1 2846 uint64_t new_kuid = 0, new_kgid = 0, new_uid, new_gid;
572e2857 2847 uint64_t xattr_obj;
0df9673f 2848 uint64_t mtime[2], ctime[2], atime[2];
9c5167d1 2849 uint64_t projid = ZFS_INVALID_PROJID;
34dc7c2f
BB
2850 znode_t *attrzp;
2851 int need_policy = FALSE;
9c5167d1 2852 int err, err2 = 0;
34dc7c2f 2853 zfs_fuid_info_t *fuidp = NULL;
5484965a
BB
2854 xvattr_t *xvap = (xvattr_t *)vap; /* vap may be an xvattr_t * */
2855 xoptattr_t *xoap;
2856 zfs_acl_t *aclp;
34dc7c2f 2857 boolean_t skipaclchk = (flags & ATTR_NOACLCHECK) ? B_TRUE : B_FALSE;
428870ff 2858 boolean_t fuid_dirtied = B_FALSE;
9c5167d1 2859 boolean_t handle_eadir = B_FALSE;
17c37660 2860 sa_bulk_attr_t *bulk, *xattr_bulk;
9c5167d1 2861 int count = 0, xattr_count = 0, bulks = 8;
34dc7c2f
BB
2862
2863 if (mask == 0)
2864 return (0);
2865
0037b49e 2866 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
2867 ZFS_VERIFY_ZP(zp);
2868
9c5167d1
NF
2869 /*
2870 * If this is a xvattr_t, then get a pointer to the structure of
2871 * optional attributes. If this is NULL, then we have a vattr_t.
2872 */
2873 xoap = xva_getxoptattr(xvap);
2874 if (xoap != NULL && (mask & ATTR_XVATTR)) {
2875 if (XVA_ISSET_REQ(xvap, XAT_PROJID)) {
2876 if (!dmu_objset_projectquota_enabled(os) ||
2877 (!S_ISREG(ip->i_mode) && !S_ISDIR(ip->i_mode))) {
2878 ZFS_EXIT(zfsvfs);
2879 return (SET_ERROR(ENOTSUP));
2880 }
2881
2882 projid = xoap->xoa_projid;
2883 if (unlikely(projid == ZFS_INVALID_PROJID)) {
2884 ZFS_EXIT(zfsvfs);
2885 return (SET_ERROR(EINVAL));
2886 }
2887
2888 if (projid == zp->z_projid && zp->z_pflags & ZFS_PROJID)
2889 projid = ZFS_INVALID_PROJID;
2890 else
2891 need_policy = TRUE;
2892 }
2893
2894 if (XVA_ISSET_REQ(xvap, XAT_PROJINHERIT) &&
2705ebf0
NF
2895 (xoap->xoa_projinherit !=
2896 ((zp->z_pflags & ZFS_PROJINHERIT) != 0)) &&
9c5167d1
NF
2897 (!dmu_objset_projectquota_enabled(os) ||
2898 (!S_ISREG(ip->i_mode) && !S_ISDIR(ip->i_mode)))) {
2705ebf0
NF
2899 ZFS_EXIT(zfsvfs);
2900 return (SET_ERROR(ENOTSUP));
9c5167d1
NF
2901 }
2902 }
2903
0037b49e 2904 zilog = zfsvfs->z_log;
34dc7c2f
BB
2905
2906 /*
2907 * Make sure that if we have ephemeral uid/gid or xvattr specified
2908 * that file system is at proper version level
2909 */
5484965a 2910
0037b49e 2911 if (zfsvfs->z_use_fuids == B_FALSE &&
5484965a
BB
2912 (((mask & ATTR_UID) && IS_EPHEMERAL(vap->va_uid)) ||
2913 ((mask & ATTR_GID) && IS_EPHEMERAL(vap->va_gid)) ||
2914 (mask & ATTR_XVATTR))) {
0037b49e 2915 ZFS_EXIT(zfsvfs);
2e528b49 2916 return (SET_ERROR(EINVAL));
34dc7c2f
BB
2917 }
2918
3558fd73 2919 if (mask & ATTR_SIZE && S_ISDIR(ip->i_mode)) {
0037b49e 2920 ZFS_EXIT(zfsvfs);
2e528b49 2921 return (SET_ERROR(EISDIR));
34dc7c2f
BB
2922 }
2923
3558fd73 2924 if (mask & ATTR_SIZE && !S_ISREG(ip->i_mode) && !S_ISFIFO(ip->i_mode)) {
0037b49e 2925 ZFS_EXIT(zfsvfs);
2e528b49 2926 return (SET_ERROR(EINVAL));
34dc7c2f
BB
2927 }
2928
d1d7e268 2929 tmpxvattr = kmem_alloc(sizeof (xvattr_t), KM_SLEEP);
f4ea75d4 2930 xva_init(tmpxvattr);
5484965a 2931
9c5167d1
NF
2932 bulk = kmem_alloc(sizeof (sa_bulk_attr_t) * bulks, KM_SLEEP);
2933 xattr_bulk = kmem_alloc(sizeof (sa_bulk_attr_t) * bulks, KM_SLEEP);
17c37660 2934
5484965a
BB
2935 /*
2936 * Immutable files can only alter immutable bit and atime
2937 */
2938 if ((zp->z_pflags & ZFS_IMMUTABLE) &&
2939 ((mask & (ATTR_SIZE|ATTR_UID|ATTR_GID|ATTR_MTIME|ATTR_MODE)) ||
2940 ((mask & ATTR_XVATTR) && XVA_ISSET_REQ(xvap, XAT_CREATETIME)))) {
ecb2b7dc 2941 err = SET_ERROR(EPERM);
f4ea75d4 2942 goto out3;
5484965a
BB
2943 }
2944
3558fd73 2945 if ((mask & ATTR_SIZE) && (zp->z_pflags & ZFS_READONLY)) {
ecb2b7dc 2946 err = SET_ERROR(EPERM);
f4ea75d4 2947 goto out3;
34dc7c2f
BB
2948 }
2949
5484965a
BB
2950 /*
2951 * Verify timestamps doesn't overflow 32 bits.
2952 * ZFS can handle large timestamps, but 32bit syscalls can't
2953 * handle times greater than 2039. This check should be removed
2954 * once large timestamps are fully supported.
2955 */
2956 if (mask & (ATTR_ATIME | ATTR_MTIME)) {
d1d7e268
MK
2957 if (((mask & ATTR_ATIME) &&
2958 TIMESPEC_OVERFLOW(&vap->va_atime)) ||
2959 ((mask & ATTR_MTIME) &&
2960 TIMESPEC_OVERFLOW(&vap->va_mtime))) {
ecb2b7dc 2961 err = SET_ERROR(EOVERFLOW);
f4ea75d4 2962 goto out3;
5484965a
BB
2963 }
2964 }
2965
34dc7c2f
BB
2966top:
2967 attrzp = NULL;
572e2857 2968 aclp = NULL;
34dc7c2f 2969
45d1cae3 2970 /* Can this be moved to before the top label? */
0037b49e 2971 if (zfs_is_readonly(zfsvfs)) {
ecb2b7dc 2972 err = SET_ERROR(EROFS);
f4ea75d4 2973 goto out3;
34dc7c2f
BB
2974 }
2975
2976 /*
2977 * First validate permissions
2978 */
2979
3558fd73 2980 if (mask & ATTR_SIZE) {
34dc7c2f 2981 err = zfs_zaccess(zp, ACE_WRITE_DATA, 0, skipaclchk, cr);
f4ea75d4
BB
2982 if (err)
2983 goto out3;
2984
34dc7c2f
BB
2985 /*
2986 * XXX - Note, we are not providing any open
2987 * mode flags here (like FNDELAY), so we may
2988 * block if there are locks present... this
2989 * should be addressed in openat().
2990 */
b128c09f 2991 /* XXX - would it be OK to generate a log record here? */
5484965a 2992 err = zfs_freesp(zp, vap->va_size, 0, 0, FALSE);
f4ea75d4
BB
2993 if (err)
2994 goto out3;
428870ff 2995 }
34dc7c2f 2996
5484965a
BB
2997 if (mask & (ATTR_ATIME|ATTR_MTIME) ||
2998 ((mask & ATTR_XVATTR) && (XVA_ISSET_REQ(xvap, XAT_HIDDEN) ||
2999 XVA_ISSET_REQ(xvap, XAT_READONLY) ||
3000 XVA_ISSET_REQ(xvap, XAT_ARCHIVE) ||
3001 XVA_ISSET_REQ(xvap, XAT_OFFLINE) ||
3002 XVA_ISSET_REQ(xvap, XAT_SPARSE) ||
3003 XVA_ISSET_REQ(xvap, XAT_CREATETIME) ||
3004 XVA_ISSET_REQ(xvap, XAT_SYSTEM)))) {
3005 need_policy = zfs_zaccess(zp, ACE_WRITE_ATTRIBUTES, 0,
3006 skipaclchk, cr);
3007 }
3008
3558fd73
BB
3009 if (mask & (ATTR_UID|ATTR_GID)) {
3010 int idmask = (mask & (ATTR_UID|ATTR_GID));
34dc7c2f
BB
3011 int take_owner;
3012 int take_group;
3013
3014 /*
3015 * NOTE: even if a new mode is being set,
3016 * we may clear S_ISUID/S_ISGID bits.
3017 */
3018
3558fd73 3019 if (!(mask & ATTR_MODE))
5484965a 3020 vap->va_mode = zp->z_mode;
34dc7c2f
BB
3021
3022 /*
3023 * Take ownership or chgrp to group we are a member of
3024 */
3025
5484965a 3026 take_owner = (mask & ATTR_UID) && (vap->va_uid == crgetuid(cr));
3558fd73 3027 take_group = (mask & ATTR_GID) &&
0037b49e 3028 zfs_groupmember(zfsvfs, vap->va_gid, cr);
34dc7c2f
BB
3029
3030 /*
5484965a 3031 * If both ATTR_UID and ATTR_GID are set then take_owner and
34dc7c2f
BB
3032 * take_group must both be set in order to allow taking
3033 * ownership.
3034 *
3035 * Otherwise, send the check through secpolicy_vnode_setattr()
3036 *
3037 */
3038
3558fd73
BB
3039 if (((idmask == (ATTR_UID|ATTR_GID)) &&
3040 take_owner && take_group) ||
3041 ((idmask == ATTR_UID) && take_owner) ||
3042 ((idmask == ATTR_GID) && take_group)) {
34dc7c2f
BB
3043 if (zfs_zaccess(zp, ACE_WRITE_OWNER, 0,
3044 skipaclchk, cr) == 0) {
3045 /*
3046 * Remove setuid/setgid for non-privileged users
3047 */
5484965a 3048 (void) secpolicy_setid_clear(vap, cr);
3558fd73 3049 trim_mask = (mask & (ATTR_UID|ATTR_GID));
34dc7c2f
BB
3050 } else {
3051 need_policy = TRUE;
3052 }
3053 } else {
3054 need_policy = TRUE;
3055 }
3056 }
3057
3058 mutex_enter(&zp->z_lock);
428870ff 3059 oldva.va_mode = zp->z_mode;
572e2857 3060 zfs_fuid_map_ids(zp, cr, &oldva.va_uid, &oldva.va_gid);
5484965a
BB
3061 if (mask & ATTR_XVATTR) {
3062 /*
3063 * Update xvattr mask to include only those attributes
3064 * that are actually changing.
3065 *
3066 * the bits will be restored prior to actually setting
3067 * the attributes so the caller thinks they were set.
3068 */
3069 if (XVA_ISSET_REQ(xvap, XAT_APPENDONLY)) {
3070 if (xoap->xoa_appendonly !=
3071 ((zp->z_pflags & ZFS_APPENDONLY) != 0)) {
3072 need_policy = TRUE;
3073 } else {
3074 XVA_CLR_REQ(xvap, XAT_APPENDONLY);
f4ea75d4 3075 XVA_SET_REQ(tmpxvattr, XAT_APPENDONLY);
5484965a
BB
3076 }
3077 }
3078
9c5167d1
NF
3079 if (XVA_ISSET_REQ(xvap, XAT_PROJINHERIT)) {
3080 if (xoap->xoa_projinherit !=
3081 ((zp->z_pflags & ZFS_PROJINHERIT) != 0)) {
3082 need_policy = TRUE;
3083 } else {
3084 XVA_CLR_REQ(xvap, XAT_PROJINHERIT);
3085 XVA_SET_REQ(tmpxvattr, XAT_PROJINHERIT);
3086 }
3087 }
3088
5484965a
BB
3089 if (XVA_ISSET_REQ(xvap, XAT_NOUNLINK)) {
3090 if (xoap->xoa_nounlink !=
3091 ((zp->z_pflags & ZFS_NOUNLINK) != 0)) {
3092 need_policy = TRUE;
3093 } else {
3094 XVA_CLR_REQ(xvap, XAT_NOUNLINK);
f4ea75d4 3095 XVA_SET_REQ(tmpxvattr, XAT_NOUNLINK);
5484965a
BB
3096 }
3097 }
3098
3099 if (XVA_ISSET_REQ(xvap, XAT_IMMUTABLE)) {
3100 if (xoap->xoa_immutable !=
3101 ((zp->z_pflags & ZFS_IMMUTABLE) != 0)) {
3102 need_policy = TRUE;
3103 } else {
3104 XVA_CLR_REQ(xvap, XAT_IMMUTABLE);
f4ea75d4 3105 XVA_SET_REQ(tmpxvattr, XAT_IMMUTABLE);
5484965a
BB
3106 }
3107 }
3108
3109 if (XVA_ISSET_REQ(xvap, XAT_NODUMP)) {
3110 if (xoap->xoa_nodump !=
3111 ((zp->z_pflags & ZFS_NODUMP) != 0)) {
3112 need_policy = TRUE;
3113 } else {
3114 XVA_CLR_REQ(xvap, XAT_NODUMP);
f4ea75d4 3115 XVA_SET_REQ(tmpxvattr, XAT_NODUMP);
5484965a
BB
3116 }
3117 }
3118
3119 if (XVA_ISSET_REQ(xvap, XAT_AV_MODIFIED)) {
3120 if (xoap->xoa_av_modified !=
3121 ((zp->z_pflags & ZFS_AV_MODIFIED) != 0)) {
3122 need_policy = TRUE;
3123 } else {
3124 XVA_CLR_REQ(xvap, XAT_AV_MODIFIED);
f4ea75d4 3125 XVA_SET_REQ(tmpxvattr, XAT_AV_MODIFIED);
5484965a
BB
3126 }
3127 }
3128
3129 if (XVA_ISSET_REQ(xvap, XAT_AV_QUARANTINED)) {
3130 if ((!S_ISREG(ip->i_mode) &&
3131 xoap->xoa_av_quarantined) ||
3132 xoap->xoa_av_quarantined !=
3133 ((zp->z_pflags & ZFS_AV_QUARANTINED) != 0)) {
3134 need_policy = TRUE;
3135 } else {
3136 XVA_CLR_REQ(xvap, XAT_AV_QUARANTINED);
f4ea75d4 3137 XVA_SET_REQ(tmpxvattr, XAT_AV_QUARANTINED);
5484965a
BB
3138 }
3139 }
3140
3141 if (XVA_ISSET_REQ(xvap, XAT_REPARSE)) {
3142 mutex_exit(&zp->z_lock);
ecb2b7dc 3143 err = SET_ERROR(EPERM);
f4ea75d4 3144 goto out3;
5484965a
BB
3145 }
3146
3147 if (need_policy == FALSE &&
3148 (XVA_ISSET_REQ(xvap, XAT_AV_SCANSTAMP) ||
3149 XVA_ISSET_REQ(xvap, XAT_OPAQUE))) {
3150 need_policy = TRUE;
3151 }
3152 }
34dc7c2f
BB
3153
3154 mutex_exit(&zp->z_lock);
3155
3558fd73 3156 if (mask & ATTR_MODE) {
34dc7c2f 3157 if (zfs_zaccess(zp, ACE_WRITE_ACL, 0, skipaclchk, cr) == 0) {
5484965a 3158 err = secpolicy_setid_setsticky_clear(ip, vap,
34dc7c2f 3159 &oldva, cr);
f4ea75d4
BB
3160 if (err)
3161 goto out3;
3162
3558fd73 3163 trim_mask |= ATTR_MODE;
34dc7c2f
BB
3164 } else {
3165 need_policy = TRUE;
3166 }
3167 }
3168
3169 if (need_policy) {
3170 /*
3171 * If trim_mask is set then take ownership
3172 * has been granted or write_acl is present and user
3173 * has the ability to modify mode. In that case remove
3174 * UID|GID and or MODE from mask so that
3175 * secpolicy_vnode_setattr() doesn't revoke it.
3176 */
3177
3178 if (trim_mask) {
5484965a
BB
3179 saved_mask = vap->va_mask;
3180 vap->va_mask &= ~trim_mask;
34dc7c2f 3181 }
5484965a 3182 err = secpolicy_vnode_setattr(cr, ip, vap, &oldva, flags,
34dc7c2f 3183 (int (*)(void *, int, cred_t *))zfs_zaccess_unix, zp);
f4ea75d4
BB
3184 if (err)
3185 goto out3;
34dc7c2f
BB
3186
3187 if (trim_mask)
5484965a 3188 vap->va_mask |= saved_mask;
34dc7c2f
BB
3189 }
3190
3191 /*
3192 * secpolicy_vnode_setattr, or take ownership may have
3193 * changed va_mask
3194 */
5484965a 3195 mask = vap->va_mask;
34dc7c2f 3196
9c5167d1
NF
3197 if ((mask & (ATTR_UID | ATTR_GID)) || projid != ZFS_INVALID_PROJID) {
3198 handle_eadir = B_TRUE;
0037b49e 3199 err = sa_lookup(zp->z_sa_hdl, SA_ZPL_XATTR(zfsvfs),
572e2857 3200 &xattr_obj, sizeof (xattr_obj));
428870ff 3201
572e2857 3202 if (err == 0 && xattr_obj) {
3558fd73 3203 err = zfs_zget(ZTOZSB(zp), xattr_obj, &attrzp);
428870ff
BB
3204 if (err)
3205 goto out2;
3206 }
3558fd73 3207 if (mask & ATTR_UID) {
0037b49e 3208 new_kuid = zfs_fuid_create(zfsvfs,
5484965a 3209 (uint64_t)vap->va_uid, cr, ZFS_OWNER, &fuidp);
64aefee1 3210 if (new_kuid != KUID_TO_SUID(ZTOI(zp)->i_uid) &&
9c5167d1
NF
3211 zfs_id_overquota(zfsvfs, DMU_USERUSED_OBJECT,
3212 new_kuid)) {
572e2857 3213 if (attrzp)
3558fd73 3214 iput(ZTOI(attrzp));
ecb2b7dc 3215 err = SET_ERROR(EDQUOT);
428870ff
BB
3216 goto out2;
3217 }
3218 }
3219
3558fd73 3220 if (mask & ATTR_GID) {
0037b49e
BB
3221 new_kgid = zfs_fuid_create(zfsvfs,
3222 (uint64_t)vap->va_gid, cr, ZFS_GROUP, &fuidp);
64aefee1 3223 if (new_kgid != KGID_TO_SGID(ZTOI(zp)->i_gid) &&
9c5167d1
NF
3224 zfs_id_overquota(zfsvfs, DMU_GROUPUSED_OBJECT,
3225 new_kgid)) {
572e2857 3226 if (attrzp)
3558fd73 3227 iput(ZTOI(attrzp));
ecb2b7dc 3228 err = SET_ERROR(EDQUOT);
428870ff
BB
3229 goto out2;
3230 }
3231 }
9c5167d1
NF
3232
3233 if (projid != ZFS_INVALID_PROJID &&
3234 zfs_id_overquota(zfsvfs, DMU_PROJECTUSED_OBJECT, projid)) {
3235 if (attrzp)
3236 iput(ZTOI(attrzp));
3237 err = EDQUOT;
3238 goto out2;
3239 }
428870ff 3240 }
9c5167d1 3241 tx = dmu_tx_create(os);
34dc7c2f 3242
3558fd73 3243 if (mask & ATTR_MODE) {
428870ff 3244 uint64_t pmode = zp->z_mode;
572e2857 3245 uint64_t acl_obj;
5484965a 3246 new_mode = (pmode & S_IFMT) | (vap->va_mode & ~S_IFMT);
34dc7c2f 3247
572e2857 3248 zfs_acl_chmod_setattr(zp, &aclp, new_mode);
428870ff 3249
572e2857
BB
3250 mutex_enter(&zp->z_lock);
3251 if (!zp->z_is_sa && ((acl_obj = zfs_external_acl(zp)) != 0)) {
428870ff
BB
3252 /*
3253 * Are we upgrading ACL from old V0 format
3254 * to V1 format?
3255 */
0037b49e 3256 if (zfsvfs->z_version >= ZPL_VERSION_FUID &&
572e2857 3257 zfs_znode_acl_version(zp) ==
34dc7c2f 3258 ZFS_ACL_VERSION_INITIAL) {
572e2857 3259 dmu_tx_hold_free(tx, acl_obj, 0,
34dc7c2f
BB
3260 DMU_OBJECT_END);
3261 dmu_tx_hold_write(tx, DMU_NEW_OBJECT,
3262 0, aclp->z_acl_bytes);
3263 } else {
572e2857 3264 dmu_tx_hold_write(tx, acl_obj, 0,
34dc7c2f
BB
3265 aclp->z_acl_bytes);
3266 }
428870ff 3267 } else if (!zp->z_is_sa && aclp->z_acl_bytes > ZFS_ACE_SPACE) {
34dc7c2f
BB
3268 dmu_tx_hold_write(tx, DMU_NEW_OBJECT,
3269 0, aclp->z_acl_bytes);
3270 }
572e2857 3271 mutex_exit(&zp->z_lock);
428870ff
BB
3272 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_TRUE);
3273 } else {
9c5167d1
NF
3274 if (((mask & ATTR_XVATTR) &&
3275 XVA_ISSET_REQ(xvap, XAT_AV_SCANSTAMP)) ||
3276 (projid != ZFS_INVALID_PROJID &&
3277 !(zp->z_pflags & ZFS_PROJID)))
5484965a
BB
3278 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_TRUE);
3279 else
3280 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
34dc7c2f
BB
3281 }
3282
428870ff
BB
3283 if (attrzp) {
3284 dmu_tx_hold_sa(tx, attrzp->z_sa_hdl, B_FALSE);
34dc7c2f
BB
3285 }
3286
0037b49e 3287 fuid_dirtied = zfsvfs->z_fuid_dirty;
428870ff 3288 if (fuid_dirtied)
0037b49e 3289 zfs_fuid_txhold(zfsvfs, tx);
428870ff
BB
3290
3291 zfs_sa_upgrade_txholds(tx, zp);
3292
384f8a09
MA
3293 err = dmu_tx_assign(tx, TXG_WAIT);
3294 if (err)
9babb374 3295 goto out;
34dc7c2f 3296
428870ff 3297 count = 0;
34dc7c2f
BB
3298 /*
3299 * Set each attribute requested.
3300 * We group settings according to the locks they need to acquire.
3301 *
3302 * Note: you cannot set ctime directly, although it will be
3303 * updated as a side-effect of calling this function.
3304 */
3305
9c5167d1
NF
3306 if (projid != ZFS_INVALID_PROJID && !(zp->z_pflags & ZFS_PROJID)) {
3307 /*
3308 * For the existed object that is upgraded from old system,
3309 * its on-disk layout has no slot for the project ID attribute.
3310 * But quota accounting logic needs to access related slots by
3311 * offset directly. So we need to adjust old objects' layout
3312 * to make the project ID to some unified and fixed offset.
3313 */
3314 if (attrzp)
3315 err = sa_add_projid(attrzp->z_sa_hdl, tx, projid);
3316 if (err == 0)
3317 err = sa_add_projid(zp->z_sa_hdl, tx, projid);
3318
3319 if (unlikely(err == EEXIST))
3320 err = 0;
3321 else if (err != 0)
3322 goto out;
3323 else
3324 projid = ZFS_INVALID_PROJID;
3325 }
572e2857 3326
3558fd73 3327 if (mask & (ATTR_UID|ATTR_GID|ATTR_MODE))
572e2857 3328 mutex_enter(&zp->z_acl_lock);
34dc7c2f
BB
3329 mutex_enter(&zp->z_lock);
3330
0037b49e 3331 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_FLAGS(zfsvfs), NULL,
428870ff
BB
3332 &zp->z_pflags, sizeof (zp->z_pflags));
3333
3334 if (attrzp) {
3558fd73 3335 if (mask & (ATTR_UID|ATTR_GID|ATTR_MODE))
572e2857 3336 mutex_enter(&attrzp->z_acl_lock);
428870ff
BB
3337 mutex_enter(&attrzp->z_lock);
3338 SA_ADD_BULK_ATTR(xattr_bulk, xattr_count,
0037b49e 3339 SA_ZPL_FLAGS(zfsvfs), NULL, &attrzp->z_pflags,
428870ff 3340 sizeof (attrzp->z_pflags));
9c5167d1
NF
3341 if (projid != ZFS_INVALID_PROJID) {
3342 attrzp->z_projid = projid;
3343 SA_ADD_BULK_ATTR(xattr_bulk, xattr_count,
3344 SA_ZPL_PROJID(zfsvfs), NULL, &attrzp->z_projid,
3345 sizeof (attrzp->z_projid));
3346 }
428870ff
BB
3347 }
3348
3558fd73 3349 if (mask & (ATTR_UID|ATTR_GID)) {
428870ff 3350
3558fd73 3351 if (mask & ATTR_UID) {
64aefee1
NB
3352 ZTOI(zp)->i_uid = SUID_TO_KUID(new_kuid);
3353 new_uid = zfs_uid_read(ZTOI(zp));
0037b49e 3354 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_UID(zfsvfs), NULL,
428870ff 3355 &new_uid, sizeof (new_uid));
428870ff
BB
3356 if (attrzp) {
3357 SA_ADD_BULK_ATTR(xattr_bulk, xattr_count,
0037b49e 3358 SA_ZPL_UID(zfsvfs), NULL, &new_uid,
428870ff 3359 sizeof (new_uid));
2c6abf15 3360 ZTOI(attrzp)->i_uid = SUID_TO_KUID(new_uid);
428870ff
BB
3361 }
3362 }
3363
3558fd73 3364 if (mask & ATTR_GID) {
64aefee1
NB
3365 ZTOI(zp)->i_gid = SGID_TO_KGID(new_kgid);
3366 new_gid = zfs_gid_read(ZTOI(zp));
0037b49e 3367 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_GID(zfsvfs),
428870ff 3368 NULL, &new_gid, sizeof (new_gid));
428870ff
BB
3369 if (attrzp) {
3370 SA_ADD_BULK_ATTR(xattr_bulk, xattr_count,
0037b49e 3371 SA_ZPL_GID(zfsvfs), NULL, &new_gid,
428870ff 3372 sizeof (new_gid));
64aefee1 3373 ZTOI(attrzp)->i_gid = SGID_TO_KGID(new_kgid);
428870ff
BB
3374 }
3375 }
3558fd73 3376 if (!(mask & ATTR_MODE)) {
0037b49e 3377 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_MODE(zfsvfs),
428870ff
BB
3378 NULL, &new_mode, sizeof (new_mode));
3379 new_mode = zp->z_mode;
3380 }
3381 err = zfs_acl_chown_setattr(zp);
3382 ASSERT(err == 0);
3383 if (attrzp) {
3384 err = zfs_acl_chown_setattr(attrzp);
3385 ASSERT(err == 0);
3386 }
3387 }
3388
3558fd73 3389 if (mask & ATTR_MODE) {
0037b49e 3390 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_MODE(zfsvfs), NULL,
428870ff 3391 &new_mode, sizeof (new_mode));
12fa7f34 3392 zp->z_mode = ZTOI(zp)->i_mode = new_mode;
99c564bc 3393 ASSERT3P(aclp, !=, NULL);
9babb374 3394 err = zfs_aclset_common(zp, aclp, cr, tx);
c99c9001 3395 ASSERT0(err);
572e2857
BB
3396 if (zp->z_acl_cached)
3397 zfs_acl_free(zp->z_acl_cached);
45d1cae3
BB
3398 zp->z_acl_cached = aclp;
3399 aclp = NULL;
34dc7c2f
BB
3400 }
3401
704cd075
CC
3402 if ((mask & ATTR_ATIME) || zp->z_atime_dirty) {
3403 zp->z_atime_dirty = 0;
3404 ZFS_TIME_ENCODE(&ip->i_atime, atime);
0037b49e 3405 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_ATIME(zfsvfs), NULL,
0df9673f 3406 &atime, sizeof (atime));
34dc7c2f
BB
3407 }
3408
99834d19 3409 if (mask & (ATTR_MTIME | ATTR_SIZE)) {
5484965a 3410 ZFS_TIME_ENCODE(&vap->va_mtime, mtime);
87f9371a
NB
3411 ZTOI(zp)->i_mtime = timespec_trunc(vap->va_mtime,
3412 ZTOI(zp)->i_sb->s_time_gran);
3413
0037b49e 3414 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_MTIME(zfsvfs), NULL,
428870ff 3415 mtime, sizeof (mtime));
34dc7c2f
BB
3416 }
3417
99834d19 3418 if (mask & (ATTR_CTIME | ATTR_SIZE)) {
87f9371a
NB
3419 ZFS_TIME_ENCODE(&vap->va_ctime, ctime);
3420 ZTOI(zp)->i_ctime = timespec_trunc(vap->va_ctime,
3421 ZTOI(zp)->i_sb->s_time_gran);
0037b49e 3422 SA_ADD_BULK_ATTR(bulk, count, SA_ZPL_CTIME(zfsvfs), NULL,
87f9371a 3423 ctime, sizeof (ctime));
428870ff 3424 }
87f9371a 3425
9c5167d1
NF
3426 if (projid != ZFS_INVALID_PROJID) {
3427 zp->z_projid = projid;
3428 SA_ADD_BULK_ATTR(bulk, count,
3429 SA_ZPL_PROJID(zfsvfs), NULL, &zp->z_projid,
3430 sizeof (zp->z_projid));
3431 }
3432
87f9371a
NB
3433 if (attrzp && mask) {
3434 SA_ADD_BULK_ATTR(xattr_bulk, xattr_count,
0037b49e 3435 SA_ZPL_CTIME(zfsvfs), NULL, &ctime,
87f9371a
NB
3436 sizeof (ctime));
3437 }
3438
34dc7c2f
BB
3439 /*
3440 * Do this after setting timestamps to prevent timestamp
3441 * update from toggling bit
3442 */
3443
5484965a
BB
3444 if (xoap && (mask & ATTR_XVATTR)) {
3445
3446 /*
3447 * restore trimmed off masks
3448 * so that return masks can be set for caller.
3449 */
3450
f4ea75d4 3451 if (XVA_ISSET_REQ(tmpxvattr, XAT_APPENDONLY)) {
5484965a
BB
3452 XVA_SET_REQ(xvap, XAT_APPENDONLY);
3453 }
f4ea75d4 3454 if (XVA_ISSET_REQ(tmpxvattr, XAT_NOUNLINK)) {
5484965a
BB
3455 XVA_SET_REQ(xvap, XAT_NOUNLINK);
3456 }
f4ea75d4 3457 if (XVA_ISSET_REQ(tmpxvattr, XAT_IMMUTABLE)) {
5484965a
BB
3458 XVA_SET_REQ(xvap, XAT_IMMUTABLE);
3459 }
f4ea75d4 3460 if (XVA_ISSET_REQ(tmpxvattr, XAT_NODUMP)) {
5484965a
BB
3461 XVA_SET_REQ(xvap, XAT_NODUMP);
3462 }
f4ea75d4 3463 if (XVA_ISSET_REQ(tmpxvattr, XAT_AV_MODIFIED)) {
5484965a
BB
3464 XVA_SET_REQ(xvap, XAT_AV_MODIFIED);
3465 }
f4ea75d4 3466 if (XVA_ISSET_REQ(tmpxvattr, XAT_AV_QUARANTINED)) {
5484965a
BB
3467 XVA_SET_REQ(xvap, XAT_AV_QUARANTINED);
3468 }
9c5167d1
NF
3469 if (XVA_ISSET_REQ(tmpxvattr, XAT_PROJINHERIT)) {
3470 XVA_SET_REQ(xvap, XAT_PROJINHERIT);
3471 }
5484965a
BB
3472
3473 if (XVA_ISSET_REQ(xvap, XAT_AV_SCANSTAMP))
3474 ASSERT(S_ISREG(ip->i_mode));
3475
3476 zfs_xvattr_set(zp, xvap, tx);
3477 }
3478
9babb374 3479 if (fuid_dirtied)
0037b49e 3480 zfs_fuid_sync(zfsvfs, tx);
9babb374 3481
34dc7c2f 3482 if (mask != 0)
5484965a 3483 zfs_log_setattr(zilog, tx, TX_SETATTR, zp, vap, mask, fuidp);
34dc7c2f 3484
34dc7c2f 3485 mutex_exit(&zp->z_lock);
3558fd73 3486 if (mask & (ATTR_UID|ATTR_GID|ATTR_MODE))
572e2857 3487 mutex_exit(&zp->z_acl_lock);
34dc7c2f 3488
572e2857 3489 if (attrzp) {
3558fd73 3490 if (mask & (ATTR_UID|ATTR_GID|ATTR_MODE))
572e2857
BB
3491 mutex_exit(&attrzp->z_acl_lock);
3492 mutex_exit(&attrzp->z_lock);
3493 }
9babb374 3494out:
9c5167d1 3495 if (err == 0 && xattr_count > 0) {
428870ff
BB
3496 err2 = sa_bulk_update(attrzp->z_sa_hdl, xattr_bulk,
3497 xattr_count, tx);
3498 ASSERT(err2 == 0);
3499 }
3500
45d1cae3 3501 if (aclp)
9babb374 3502 zfs_acl_free(aclp);
9babb374
BB
3503
3504 if (fuidp) {
3505 zfs_fuid_info_free(fuidp);
3506 fuidp = NULL;
3507 }
3508
428870ff 3509 if (err) {
9babb374 3510 dmu_tx_abort(tx);
ea7e86d8
BB
3511 if (attrzp)
3512 iput(ZTOI(attrzp));
428870ff
BB
3513 if (err == ERESTART)
3514 goto top;
3515 } else {
9c5167d1
NF
3516 if (count > 0)
3517 err2 = sa_bulk_update(zp->z_sa_hdl, bulk, count, tx);
9babb374 3518 dmu_tx_commit(tx);
9c5167d1
NF
3519 if (attrzp) {
3520 if (err2 == 0 && handle_eadir)
3521 err2 = zfs_setattr_dir(attrzp);
ea7e86d8 3522 iput(ZTOI(attrzp));
9c5167d1 3523 }
037849f8 3524 zfs_inode_update(zp);
428870ff
BB
3525 }
3526
428870ff 3527out2:
9c5167d1 3528 if (os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 3529 zil_commit(zilog, 0);
34dc7c2f 3530
f4ea75d4 3531out3:
9c5167d1
NF
3532 kmem_free(xattr_bulk, sizeof (sa_bulk_attr_t) * bulks);
3533 kmem_free(bulk, sizeof (sa_bulk_attr_t) * bulks);
d1d7e268 3534 kmem_free(tmpxvattr, sizeof (xvattr_t));
0037b49e 3535 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
3536 return (err);
3537}
3538
3539typedef struct zfs_zlock {
3540 krwlock_t *zl_rwlock; /* lock we acquired */
3541 znode_t *zl_znode; /* znode we held */
3542 struct zfs_zlock *zl_next; /* next in list */
3543} zfs_zlock_t;
3544
3545/*
3546 * Drop locks and release vnodes that were held by zfs_rename_lock().
3547 */
3548static void
3549zfs_rename_unlock(zfs_zlock_t **zlpp)
3550{
3551 zfs_zlock_t *zl;
3552
3553 while ((zl = *zlpp) != NULL) {
3554 if (zl->zl_znode != NULL)
ea7e86d8 3555 zfs_iput_async(ZTOI(zl->zl_znode));
34dc7c2f
BB
3556 rw_exit(zl->zl_rwlock);
3557 *zlpp = zl->zl_next;
3558 kmem_free(zl, sizeof (*zl));
3559 }
3560}
3561
3562/*
3563 * Search back through the directory tree, using the ".." entries.
3564 * Lock each directory in the chain to prevent concurrent renames.
3565 * Fail any attempt to move a directory into one of its own descendants.
3566 * XXX - z_parent_lock can overlap with map or grow locks
3567 */
3568static int
3569zfs_rename_lock(znode_t *szp, znode_t *tdzp, znode_t *sdzp, zfs_zlock_t **zlpp)
3570{
3571 zfs_zlock_t *zl;
3572 znode_t *zp = tdzp;
3558fd73 3573 uint64_t rootid = ZTOZSB(zp)->z_root;
428870ff 3574 uint64_t oidp = zp->z_id;
34dc7c2f
BB
3575 krwlock_t *rwlp = &szp->z_parent_lock;
3576 krw_t rw = RW_WRITER;
3577
3578 /*
3579 * First pass write-locks szp and compares to zp->z_id.
3580 * Later passes read-lock zp and compare to zp->z_parent.
3581 */
3582 do {
3583 if (!rw_tryenter(rwlp, rw)) {
3584 /*
3585 * Another thread is renaming in this path.
3586 * Note that if we are a WRITER, we don't have any
3587 * parent_locks held yet.
3588 */
3589 if (rw == RW_READER && zp->z_id > szp->z_id) {
3590 /*
3591 * Drop our locks and restart
3592 */
3593 zfs_rename_unlock(&zl);
3594 *zlpp = NULL;
3595 zp = tdzp;
428870ff 3596 oidp = zp->z_id;
34dc7c2f
BB
3597 rwlp = &szp->z_parent_lock;
3598 rw = RW_WRITER;
3599 continue;
3600 } else {
3601 /*
3602 * Wait for other thread to drop its locks
3603 */
3604 rw_enter(rwlp, rw);
3605 }
3606 }
3607
3608 zl = kmem_alloc(sizeof (*zl), KM_SLEEP);
3609 zl->zl_rwlock = rwlp;
3610 zl->zl_znode = NULL;
3611 zl->zl_next = *zlpp;
3612 *zlpp = zl;
3613
428870ff 3614 if (oidp == szp->z_id) /* We're a descendant of szp */
2e528b49 3615 return (SET_ERROR(EINVAL));
34dc7c2f 3616
428870ff 3617 if (oidp == rootid) /* We've hit the top */
34dc7c2f
BB
3618 return (0);
3619
3620 if (rw == RW_READER) { /* i.e. not the first pass */
3558fd73 3621 int error = zfs_zget(ZTOZSB(zp), oidp, &zp);
34dc7c2f
BB
3622 if (error)
3623 return (error);
3624 zl->zl_znode = zp;
3625 }
3558fd73 3626 (void) sa_lookup(zp->z_sa_hdl, SA_ZPL_PARENT(ZTOZSB(zp)),
428870ff 3627 &oidp, sizeof (oidp));
34dc7c2f
BB
3628 rwlp = &zp->z_parent_lock;
3629 rw = RW_READER;
3630
3631 } while (zp->z_id != sdzp->z_id);
3632
3633 return (0);
3634}
3635
3636/*
3637 * Move an entry from the provided source directory to the target
3638 * directory. Change the entry name as indicated.
3639 *
3558fd73 3640 * IN: sdip - Source directory containing the "old entry".
34dc7c2f 3641 * snm - Old entry name.
3558fd73 3642 * tdip - Target directory to contain the "new entry".
34dc7c2f
BB
3643 * tnm - New entry name.
3644 * cr - credentials of caller.
34dc7c2f
BB
3645 * flags - case flags
3646 *
d3cc8b15 3647 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
3648 *
3649 * Timestamps:
3558fd73 3650 * sdip,tdip - ctime|mtime updated
34dc7c2f
BB
3651 */
3652/*ARGSUSED*/
e5c39b95 3653int
3558fd73
BB
3654zfs_rename(struct inode *sdip, char *snm, struct inode *tdip, char *tnm,
3655 cred_t *cr, int flags)
34dc7c2f
BB
3656{
3657 znode_t *tdzp, *szp, *tzp;
3558fd73 3658 znode_t *sdzp = ITOZ(sdip);
0037b49e 3659 zfsvfs_t *zfsvfs = ITOZSB(sdip);
34dc7c2f 3660 zilog_t *zilog;
34dc7c2f
BB
3661 zfs_dirlock_t *sdl, *tdl;
3662 dmu_tx_t *tx;
3663 zfs_zlock_t *zl;
3664 int cmp, serr, terr;
3665 int error = 0;
3666 int zflg = 0;
e8b96c60 3667 boolean_t waited = B_FALSE;
34dc7c2f 3668
32dec7bd 3669 if (snm == NULL || tnm == NULL)
3670 return (SET_ERROR(EINVAL));
3671
0037b49e 3672 ZFS_ENTER(zfsvfs);
34dc7c2f 3673 ZFS_VERIFY_ZP(sdzp);
0037b49e 3674 zilog = zfsvfs->z_log;
34dc7c2f 3675
812e91a7
MT
3676 tdzp = ITOZ(tdip);
3677 ZFS_VERIFY_ZP(tdzp);
3678
3679 /*
3680 * We check i_sb because snapshots and the ctldir must have different
3681 * super blocks.
3682 */
c0ebc844 3683 if (tdip->i_sb != sdip->i_sb || zfsctl_is_node(tdip)) {
0037b49e 3684 ZFS_EXIT(zfsvfs);
2e528b49 3685 return (SET_ERROR(EXDEV));
34dc7c2f
BB
3686 }
3687
0037b49e 3688 if (zfsvfs->z_utf8 && u8_validate(tnm,
34dc7c2f 3689 strlen(tnm), NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 3690 ZFS_EXIT(zfsvfs);
2e528b49 3691 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
3692 }
3693
3694 if (flags & FIGNORECASE)
3695 zflg |= ZCILOOK;
3696
3697top:
3698 szp = NULL;
3699 tzp = NULL;
3700 zl = NULL;
3701
3702 /*
3703 * This is to prevent the creation of links into attribute space
3704 * by renaming a linked file into/outof an attribute directory.
3705 * See the comment in zfs_link() for why this is considered bad.
3706 */
428870ff 3707 if ((tdzp->z_pflags & ZFS_XATTR) != (sdzp->z_pflags & ZFS_XATTR)) {
0037b49e 3708 ZFS_EXIT(zfsvfs);
2e528b49 3709 return (SET_ERROR(EINVAL));
34dc7c2f
BB
3710 }
3711
3712 /*
3713 * Lock source and target directory entries. To prevent deadlock,
3714 * a lock ordering must be defined. We lock the directory with
3715 * the smallest object id first, or if it's a tie, the one with
3716 * the lexically first name.
3717 */
3718 if (sdzp->z_id < tdzp->z_id) {
3719 cmp = -1;
3720 } else if (sdzp->z_id > tdzp->z_id) {
3721 cmp = 1;
3722 } else {
3723 /*
3724 * First compare the two name arguments without
3725 * considering any case folding.
3726 */
0037b49e 3727 int nofold = (zfsvfs->z_norm & ~U8_TEXTPREP_TOUPPER);
34dc7c2f
BB
3728
3729 cmp = u8_strcmp(snm, tnm, 0, nofold, U8_UNICODE_LATEST, &error);
0037b49e 3730 ASSERT(error == 0 || !zfsvfs->z_utf8);
34dc7c2f
BB
3731 if (cmp == 0) {
3732 /*
3733 * POSIX: "If the old argument and the new argument
3734 * both refer to links to the same existing file,
3735 * the rename() function shall return successfully
3736 * and perform no other action."
3737 */
0037b49e 3738 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
3739 return (0);
3740 }
3741 /*
3742 * If the file system is case-folding, then we may
3743 * have some more checking to do. A case-folding file
3744 * system is either supporting mixed case sensitivity
3745 * access or is completely case-insensitive. Note
3746 * that the file system is always case preserving.
3747 *
3748 * In mixed sensitivity mode case sensitive behavior
3749 * is the default. FIGNORECASE must be used to
3750 * explicitly request case insensitive behavior.
3751 *
3752 * If the source and target names provided differ only
3753 * by case (e.g., a request to rename 'tim' to 'Tim'),
3754 * we will treat this as a special case in the
3755 * case-insensitive mode: as long as the source name
3756 * is an exact match, we will allow this to proceed as
3757 * a name-change request.
3758 */
0037b49e
BB
3759 if ((zfsvfs->z_case == ZFS_CASE_INSENSITIVE ||
3760 (zfsvfs->z_case == ZFS_CASE_MIXED &&
34dc7c2f 3761 flags & FIGNORECASE)) &&
0037b49e 3762 u8_strcmp(snm, tnm, 0, zfsvfs->z_norm, U8_UNICODE_LATEST,
34dc7c2f
BB
3763 &error) == 0) {
3764 /*
3765 * case preserving rename request, require exact
3766 * name matches
3767 */
3768 zflg |= ZCIEXACT;
3769 zflg &= ~ZCILOOK;
3770 }
3771 }
3772
428870ff
BB
3773 /*
3774 * If the source and destination directories are the same, we should
3775 * grab the z_name_lock of that directory only once.
3776 */
3777 if (sdzp == tdzp) {
3778 zflg |= ZHAVELOCK;
3779 rw_enter(&sdzp->z_name_lock, RW_READER);
3780 }
3781
34dc7c2f
BB
3782 if (cmp < 0) {
3783 serr = zfs_dirent_lock(&sdl, sdzp, snm, &szp,
3784 ZEXISTS | zflg, NULL, NULL);
3785 terr = zfs_dirent_lock(&tdl,
3786 tdzp, tnm, &tzp, ZRENAMING | zflg, NULL, NULL);
3787 } else {
3788 terr = zfs_dirent_lock(&tdl,
3789 tdzp, tnm, &tzp, zflg, NULL, NULL);
3790 serr = zfs_dirent_lock(&sdl,
3791 sdzp, snm, &szp, ZEXISTS | ZRENAMING | zflg,
3792 NULL, NULL);
3793 }
3794
3795 if (serr) {
3796 /*
3797 * Source entry invalid or not there.
3798 */
3799 if (!terr) {
3800 zfs_dirent_unlock(tdl);
3801 if (tzp)
3558fd73 3802 iput(ZTOI(tzp));
34dc7c2f 3803 }
428870ff
BB
3804
3805 if (sdzp == tdzp)
3806 rw_exit(&sdzp->z_name_lock);
3807
34dc7c2f
BB
3808 if (strcmp(snm, "..") == 0)
3809 serr = EINVAL;
0037b49e 3810 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
3811 return (serr);
3812 }
3813 if (terr) {
3814 zfs_dirent_unlock(sdl);
3558fd73 3815 iput(ZTOI(szp));
428870ff
BB
3816
3817 if (sdzp == tdzp)
3818 rw_exit(&sdzp->z_name_lock);
3819
34dc7c2f
BB
3820 if (strcmp(tnm, "..") == 0)
3821 terr = EINVAL;
0037b49e 3822 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
3823 return (terr);
3824 }
3825
9c5167d1
NF
3826 /*
3827 * If we are using project inheritance, means if the directory has
3828 * ZFS_PROJINHERIT set, then its descendant directories will inherit
3829 * not only the project ID, but also the ZFS_PROJINHERIT flag. Under
3830 * such case, we only allow renames into our tree when the project
3831 * IDs are the same.
3832 */
3833 if (tdzp->z_pflags & ZFS_PROJINHERIT &&
3834 tdzp->z_projid != szp->z_projid) {
3835 error = SET_ERROR(EXDEV);
3836 goto out;
3837 }
3838
34dc7c2f
BB
3839 /*
3840 * Must have write access at the source to remove the old entry
3841 * and write access at the target to create the new entry.
3842 * Note that if target and source are the same, this can be
3843 * done in a single check.
3844 */
3845
149e873a 3846 if ((error = zfs_zaccess_rename(sdzp, szp, tdzp, tzp, cr)))
34dc7c2f
BB
3847 goto out;
3848
3558fd73 3849 if (S_ISDIR(ZTOI(szp)->i_mode)) {
34dc7c2f
BB
3850 /*
3851 * Check to make sure rename is valid.
3852 * Can't do a move like this: /usr/a/b to /usr/a/b/c/d
3853 */
149e873a 3854 if ((error = zfs_rename_lock(szp, tdzp, sdzp, &zl)))
34dc7c2f
BB
3855 goto out;
3856 }
3857
3858 /*
3859 * Does target exist?
3860 */
3861 if (tzp) {
3862 /*
3863 * Source and target must be the same type.
3864 */
3558fd73
BB
3865 if (S_ISDIR(ZTOI(szp)->i_mode)) {
3866 if (!S_ISDIR(ZTOI(tzp)->i_mode)) {
2e528b49 3867 error = SET_ERROR(ENOTDIR);
34dc7c2f
BB
3868 goto out;
3869 }
3870 } else {
3558fd73 3871 if (S_ISDIR(ZTOI(tzp)->i_mode)) {
2e528b49 3872 error = SET_ERROR(EISDIR);
34dc7c2f
BB
3873 goto out;
3874 }
3875 }
3876 /*
3877 * POSIX dictates that when the source and target
3878 * entries refer to the same file object, rename
3879 * must do nothing and exit without error.
3880 */
3881 if (szp->z_id == tzp->z_id) {
3882 error = 0;
3883 goto out;
3884 }
3885 }
3886
0037b49e 3887 tx = dmu_tx_create(zfsvfs->z_os);
428870ff
BB
3888 dmu_tx_hold_sa(tx, szp->z_sa_hdl, B_FALSE);
3889 dmu_tx_hold_sa(tx, sdzp->z_sa_hdl, B_FALSE);
34dc7c2f
BB
3890 dmu_tx_hold_zap(tx, sdzp->z_id, FALSE, snm);
3891 dmu_tx_hold_zap(tx, tdzp->z_id, TRUE, tnm);
428870ff
BB
3892 if (sdzp != tdzp) {
3893 dmu_tx_hold_sa(tx, tdzp->z_sa_hdl, B_FALSE);
3894 zfs_sa_upgrade_txholds(tx, tdzp);
3895 }
3896 if (tzp) {
3897 dmu_tx_hold_sa(tx, tzp->z_sa_hdl, B_FALSE);
3898 zfs_sa_upgrade_txholds(tx, tzp);
3899 }
3900
3901 zfs_sa_upgrade_txholds(tx, szp);
0037b49e 3902 dmu_tx_hold_zap(tx, zfsvfs->z_unlinkedobj, FALSE, NULL);
0735ecb3 3903 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
3904 if (error) {
3905 if (zl != NULL)
3906 zfs_rename_unlock(&zl);
3907 zfs_dirent_unlock(sdl);
3908 zfs_dirent_unlock(tdl);
428870ff
BB
3909
3910 if (sdzp == tdzp)
3911 rw_exit(&sdzp->z_name_lock);
3912
fb5f0bc8 3913 if (error == ERESTART) {
e8b96c60 3914 waited = B_TRUE;
34dc7c2f
BB
3915 dmu_tx_wait(tx);
3916 dmu_tx_abort(tx);
ea7e86d8
BB
3917 iput(ZTOI(szp));
3918 if (tzp)
3919 iput(ZTOI(tzp));
34dc7c2f
BB
3920 goto top;
3921 }
3922 dmu_tx_abort(tx);
ea7e86d8
BB
3923 iput(ZTOI(szp));
3924 if (tzp)
3925 iput(ZTOI(tzp));
0037b49e 3926 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
3927 return (error);
3928 }
3929
3930 if (tzp) /* Attempt to remove the existing target */
3931 error = zfs_link_destroy(tdl, tzp, tx, zflg, NULL);
3932
3933 if (error == 0) {
3934 error = zfs_link_create(tdl, szp, tx, ZRENAMING);
3935 if (error == 0) {
428870ff 3936 szp->z_pflags |= ZFS_AV_MODIFIED;
9c5167d1
NF
3937 if (tdzp->z_pflags & ZFS_PROJINHERIT)
3938 szp->z_pflags |= ZFS_PROJINHERIT;
34dc7c2f 3939
0037b49e 3940 error = sa_update(szp->z_sa_hdl, SA_ZPL_FLAGS(zfsvfs),
428870ff 3941 (void *)&szp->z_pflags, sizeof (uint64_t), tx);
c99c9001 3942 ASSERT0(error);
34dc7c2f 3943
428870ff
BB
3944 error = zfs_link_destroy(sdl, szp, tx, ZRENAMING, NULL);
3945 if (error == 0) {
3946 zfs_log_rename(zilog, tx, TX_RENAME |
572e2857
BB
3947 (flags & FIGNORECASE ? TX_CI : 0), sdzp,
3948 sdl->dl_name, tdzp, tdl->dl_name, szp);
428870ff
BB
3949 } else {
3950 /*
3951 * At this point, we have successfully created
3952 * the target name, but have failed to remove
3953 * the source name. Since the create was done
3954 * with the ZRENAMING flag, there are
3955 * complications; for one, the link count is
3956 * wrong. The easiest way to deal with this
3957 * is to remove the newly created target, and
3958 * return the original error. This must
3959 * succeed; fortunately, it is very unlikely to
3960 * fail, since we just created it.
3961 */
3962 VERIFY3U(zfs_link_destroy(tdl, szp, tx,
3963 ZRENAMING, NULL), ==, 0);
3964 }
599b8648
CC
3965 } else {
3966 /*
3967 * If we had removed the existing target, subsequent
3968 * call to zfs_link_create() to add back the same entry
3969 * but, the new dnode (szp) should not fail.
3970 */
3971 ASSERT(tzp == NULL);
34dc7c2f
BB
3972 }
3973 }
3974
3975 dmu_tx_commit(tx);
3976out:
3977 if (zl != NULL)
3978 zfs_rename_unlock(&zl);
3979
3980 zfs_dirent_unlock(sdl);
3981 zfs_dirent_unlock(tdl);
3982
960e08fe 3983 zfs_inode_update(sdzp);
428870ff
BB
3984 if (sdzp == tdzp)
3985 rw_exit(&sdzp->z_name_lock);
3986
960e08fe
BB
3987 if (sdzp != tdzp)
3988 zfs_inode_update(tdzp);
428870ff 3989
960e08fe 3990 zfs_inode_update(szp);
3558fd73 3991 iput(ZTOI(szp));
960e08fe
BB
3992 if (tzp) {
3993 zfs_inode_update(tzp);
3558fd73 3994 iput(ZTOI(tzp));
960e08fe 3995 }
34dc7c2f 3996
0037b49e 3997 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 3998 zil_commit(zilog, 0);
428870ff 3999
0037b49e 4000 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4001 return (error);
4002}
4003
4004/*
4005 * Insert the indicated symbolic reference entry into the directory.
4006 *
3558fd73 4007 * IN: dip - Directory to contain new symbolic link.
34dc7c2f
BB
4008 * link - Name for new symlink entry.
4009 * vap - Attributes of new entry.
4010 * target - Target path of new symlink.
3558fd73 4011 *
34dc7c2f 4012 * cr - credentials of caller.
34dc7c2f
BB
4013 * flags - case flags
4014 *
d3cc8b15 4015 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
4016 *
4017 * Timestamps:
3558fd73 4018 * dip - ctime|mtime updated
34dc7c2f
BB
4019 */
4020/*ARGSUSED*/
e5c39b95 4021int
3558fd73
BB
4022zfs_symlink(struct inode *dip, char *name, vattr_t *vap, char *link,
4023 struct inode **ipp, cred_t *cr, int flags)
34dc7c2f 4024{
3558fd73 4025 znode_t *zp, *dzp = ITOZ(dip);
34dc7c2f
BB
4026 zfs_dirlock_t *dl;
4027 dmu_tx_t *tx;
0037b49e 4028 zfsvfs_t *zfsvfs = ITOZSB(dip);
34dc7c2f 4029 zilog_t *zilog;
428870ff 4030 uint64_t len = strlen(link);
34dc7c2f
BB
4031 int error;
4032 int zflg = ZNEW;
9babb374
BB
4033 zfs_acl_ids_t acl_ids;
4034 boolean_t fuid_dirtied;
428870ff 4035 uint64_t txtype = TX_SYMLINK;
e8b96c60 4036 boolean_t waited = B_FALSE;
34dc7c2f 4037
3558fd73 4038 ASSERT(S_ISLNK(vap->va_mode));
34dc7c2f 4039
32dec7bd 4040 if (name == NULL)
4041 return (SET_ERROR(EINVAL));
4042
0037b49e 4043 ZFS_ENTER(zfsvfs);
34dc7c2f 4044 ZFS_VERIFY_ZP(dzp);
0037b49e 4045 zilog = zfsvfs->z_log;
34dc7c2f 4046
0037b49e 4047 if (zfsvfs->z_utf8 && u8_validate(name, strlen(name),
34dc7c2f 4048 NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 4049 ZFS_EXIT(zfsvfs);
2e528b49 4050 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
4051 }
4052 if (flags & FIGNORECASE)
4053 zflg |= ZCILOOK;
34dc7c2f
BB
4054
4055 if (len > MAXPATHLEN) {
0037b49e 4056 ZFS_EXIT(zfsvfs);
2e528b49 4057 return (SET_ERROR(ENAMETOOLONG));
34dc7c2f
BB
4058 }
4059
428870ff
BB
4060 if ((error = zfs_acl_ids_create(dzp, 0,
4061 vap, cr, NULL, &acl_ids)) != 0) {
0037b49e 4062 ZFS_EXIT(zfsvfs);
428870ff
BB
4063 return (error);
4064 }
4065top:
3558fd73
BB
4066 *ipp = NULL;
4067
34dc7c2f
BB
4068 /*
4069 * Attempt to lock directory; fail if entry already exists.
4070 */
4071 error = zfs_dirent_lock(&dl, dzp, name, &zp, zflg, NULL, NULL);
4072 if (error) {
428870ff 4073 zfs_acl_ids_free(&acl_ids);
0037b49e 4074 ZFS_EXIT(zfsvfs);
428870ff
BB
4075 return (error);
4076 }
4077
149e873a 4078 if ((error = zfs_zaccess(dzp, ACE_ADD_FILE, 0, B_FALSE, cr))) {
428870ff
BB
4079 zfs_acl_ids_free(&acl_ids);
4080 zfs_dirent_unlock(dl);
0037b49e 4081 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4082 return (error);
4083 }
4084
9c5167d1 4085 if (zfs_acl_ids_overquota(zfsvfs, &acl_ids, ZFS_DEFAULT_PROJID)) {
9babb374
BB
4086 zfs_acl_ids_free(&acl_ids);
4087 zfs_dirent_unlock(dl);
0037b49e 4088 ZFS_EXIT(zfsvfs);
2e528b49 4089 return (SET_ERROR(EDQUOT));
9babb374 4090 }
0037b49e
BB
4091 tx = dmu_tx_create(zfsvfs->z_os);
4092 fuid_dirtied = zfsvfs->z_fuid_dirty;
34dc7c2f 4093 dmu_tx_hold_write(tx, DMU_NEW_OBJECT, 0, MAX(1, len));
34dc7c2f 4094 dmu_tx_hold_zap(tx, dzp->z_id, TRUE, name);
428870ff
BB
4095 dmu_tx_hold_sa_create(tx, acl_ids.z_aclp->z_acl_bytes +
4096 ZFS_SA_BASE_ATTR_SIZE + len);
4097 dmu_tx_hold_sa(tx, dzp->z_sa_hdl, B_FALSE);
0037b49e 4098 if (!zfsvfs->z_use_sa && acl_ids.z_aclp->z_acl_bytes > ZFS_ACE_SPACE) {
428870ff
BB
4099 dmu_tx_hold_write(tx, DMU_NEW_OBJECT, 0,
4100 acl_ids.z_aclp->z_acl_bytes);
4101 }
9babb374 4102 if (fuid_dirtied)
0037b49e 4103 zfs_fuid_txhold(zfsvfs, tx);
0735ecb3 4104 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
4105 if (error) {
4106 zfs_dirent_unlock(dl);
fb5f0bc8 4107 if (error == ERESTART) {
e8b96c60 4108 waited = B_TRUE;
34dc7c2f
BB
4109 dmu_tx_wait(tx);
4110 dmu_tx_abort(tx);
4111 goto top;
4112 }
428870ff 4113 zfs_acl_ids_free(&acl_ids);
34dc7c2f 4114 dmu_tx_abort(tx);
0037b49e 4115 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4116 return (error);
4117 }
4118
34dc7c2f
BB
4119 /*
4120 * Create a new object for the symlink.
428870ff 4121 * for version 4 ZPL datsets the symlink will be an SA attribute
34dc7c2f 4122 */
428870ff 4123 zfs_mknode(dzp, vap, tx, cr, 0, &zp, &acl_ids);
9babb374 4124
428870ff 4125 if (fuid_dirtied)
0037b49e 4126 zfs_fuid_sync(zfsvfs, tx);
34dc7c2f 4127
572e2857 4128 mutex_enter(&zp->z_lock);
428870ff 4129 if (zp->z_is_sa)
0037b49e 4130 error = sa_update(zp->z_sa_hdl, SA_ZPL_SYMLINK(zfsvfs),
428870ff
BB
4131 link, len, tx);
4132 else
4133 zfs_sa_symlink(zp, link, len, tx);
572e2857 4134 mutex_exit(&zp->z_lock);
34dc7c2f 4135
428870ff 4136 zp->z_size = len;
0037b49e 4137 (void) sa_update(zp->z_sa_hdl, SA_ZPL_SIZE(zfsvfs),
428870ff 4138 &zp->z_size, sizeof (zp->z_size), tx);
34dc7c2f
BB
4139 /*
4140 * Insert the new object into the directory.
4141 */
599b8648
CC
4142 error = zfs_link_create(dl, zp, tx, ZNEW);
4143 if (error != 0) {
4144 zfs_znode_delete(zp, tx);
4145 remove_inode_hash(ZTOI(zp));
4146 } else {
4147 if (flags & FIGNORECASE)
4148 txtype |= TX_CI;
4149 zfs_log_symlink(zilog, tx, txtype, dzp, zp, name, link);
4f301661 4150
599b8648
CC
4151 zfs_inode_update(dzp);
4152 zfs_inode_update(zp);
4153 }
960e08fe 4154
9babb374 4155 zfs_acl_ids_free(&acl_ids);
34dc7c2f
BB
4156
4157 dmu_tx_commit(tx);
4158
4159 zfs_dirent_unlock(dl);
4160
599b8648
CC
4161 if (error == 0) {
4162 *ipp = ZTOI(zp);
34dc7c2f 4163
599b8648
CC
4164 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
4165 zil_commit(zilog, 0);
4166 } else {
4167 iput(ZTOI(zp));
4168 }
428870ff 4169
0037b49e 4170 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4171 return (error);
4172}
4173
4174/*
4175 * Return, in the buffer contained in the provided uio structure,
3558fd73 4176 * the symbolic path referred to by ip.
34dc7c2f 4177 *
8b4f9a2d
BB
4178 * IN: ip - inode of symbolic link
4179 * uio - structure to contain the link path.
4180 * cr - credentials of caller.
34dc7c2f
BB
4181 *
4182 * RETURN: 0 if success
4183 * error code if failure
4184 *
4185 * Timestamps:
3558fd73 4186 * ip - atime updated
34dc7c2f
BB
4187 */
4188/* ARGSUSED */
e5c39b95 4189int
8b4f9a2d 4190zfs_readlink(struct inode *ip, uio_t *uio, cred_t *cr)
34dc7c2f 4191{
3558fd73 4192 znode_t *zp = ITOZ(ip);
0037b49e 4193 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
4194 int error;
4195
0037b49e 4196 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
4197 ZFS_VERIFY_ZP(zp);
4198
572e2857 4199 mutex_enter(&zp->z_lock);
428870ff 4200 if (zp->z_is_sa)
8b4f9a2d 4201 error = sa_lookup_uio(zp->z_sa_hdl,
0037b49e 4202 SA_ZPL_SYMLINK(zfsvfs), uio);
428870ff 4203 else
8b4f9a2d 4204 error = zfs_sa_readlink(zp, uio);
572e2857 4205 mutex_exit(&zp->z_lock);
34dc7c2f 4206
0037b49e 4207 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4208 return (error);
4209}
4210
4211/*
3558fd73 4212 * Insert a new entry into directory tdip referencing sip.
34dc7c2f 4213 *
3558fd73
BB
4214 * IN: tdip - Directory to contain new entry.
4215 * sip - inode of new entry.
34dc7c2f
BB
4216 * name - name of new entry.
4217 * cr - credentials of caller.
34dc7c2f
BB
4218 *
4219 * RETURN: 0 if success
4220 * error code if failure
4221 *
4222 * Timestamps:
3558fd73
BB
4223 * tdip - ctime|mtime updated
4224 * sip - ctime updated
34dc7c2f
BB
4225 */
4226/* ARGSUSED */
e5c39b95 4227int
da5e151f
BB
4228zfs_link(struct inode *tdip, struct inode *sip, char *name, cred_t *cr,
4229 int flags)
34dc7c2f 4230{
3558fd73 4231 znode_t *dzp = ITOZ(tdip);
34dc7c2f 4232 znode_t *tzp, *szp;
0037b49e 4233 zfsvfs_t *zfsvfs = ITOZSB(tdip);
34dc7c2f
BB
4234 zilog_t *zilog;
4235 zfs_dirlock_t *dl;
4236 dmu_tx_t *tx;
34dc7c2f
BB
4237 int error;
4238 int zf = ZNEW;
428870ff 4239 uint64_t parent;
572e2857 4240 uid_t owner;
e8b96c60 4241 boolean_t waited = B_FALSE;
ace1eae8
CC
4242 boolean_t is_tmpfile = 0;
4243 uint64_t txg;
4244#ifdef HAVE_TMPFILE
4245 is_tmpfile = (sip->i_nlink == 0 && (sip->i_state & I_LINKABLE));
4246#endif
3558fd73 4247 ASSERT(S_ISDIR(tdip->i_mode));
34dc7c2f 4248
32dec7bd 4249 if (name == NULL)
4250 return (SET_ERROR(EINVAL));
4251
0037b49e 4252 ZFS_ENTER(zfsvfs);
34dc7c2f 4253 ZFS_VERIFY_ZP(dzp);
0037b49e 4254 zilog = zfsvfs->z_log;
34dc7c2f 4255
428870ff
BB
4256 /*
4257 * POSIX dictates that we return EPERM here.
4258 * Better choices include ENOTSUP or EISDIR.
4259 */
3558fd73 4260 if (S_ISDIR(sip->i_mode)) {
0037b49e 4261 ZFS_EXIT(zfsvfs);
2e528b49 4262 return (SET_ERROR(EPERM));
428870ff
BB
4263 }
4264
812e91a7
MT
4265 szp = ITOZ(sip);
4266 ZFS_VERIFY_ZP(szp);
4267
9c5167d1
NF
4268 /*
4269 * If we are using project inheritance, means if the directory has
4270 * ZFS_PROJINHERIT set, then its descendant directories will inherit
4271 * not only the project ID, but also the ZFS_PROJINHERIT flag. Under
4272 * such case, we only allow hard link creation in our tree when the
4273 * project IDs are the same.
4274 */
4275 if (dzp->z_pflags & ZFS_PROJINHERIT && dzp->z_projid != szp->z_projid) {
4276 ZFS_EXIT(zfsvfs);
4277 return (SET_ERROR(EXDEV));
4278 }
4279
812e91a7
MT
4280 /*
4281 * We check i_sb because snapshots and the ctldir must have different
4282 * super blocks.
4283 */
c0ebc844 4284 if (sip->i_sb != tdip->i_sb || zfsctl_is_node(sip)) {
0037b49e 4285 ZFS_EXIT(zfsvfs);
2e528b49 4286 return (SET_ERROR(EXDEV));
34dc7c2f 4287 }
428870ff 4288
428870ff
BB
4289 /* Prevent links to .zfs/shares files */
4290
0037b49e 4291 if ((error = sa_lookup(szp->z_sa_hdl, SA_ZPL_PARENT(zfsvfs),
428870ff 4292 &parent, sizeof (uint64_t))) != 0) {
0037b49e 4293 ZFS_EXIT(zfsvfs);
428870ff
BB
4294 return (error);
4295 }
0037b49e
BB
4296 if (parent == zfsvfs->z_shares_dir) {
4297 ZFS_EXIT(zfsvfs);
2e528b49 4298 return (SET_ERROR(EPERM));
428870ff
BB
4299 }
4300
0037b49e 4301 if (zfsvfs->z_utf8 && u8_validate(name,
34dc7c2f 4302 strlen(name), NULL, U8_VALIDATE_ENTIRE, &error) < 0) {
0037b49e 4303 ZFS_EXIT(zfsvfs);
2e528b49 4304 return (SET_ERROR(EILSEQ));
34dc7c2f
BB
4305 }
4306 if (flags & FIGNORECASE)
4307 zf |= ZCILOOK;
4308
34dc7c2f
BB
4309 /*
4310 * We do not support links between attributes and non-attributes
4311 * because of the potential security risk of creating links
4312 * into "normal" file space in order to circumvent restrictions
4313 * imposed in attribute space.
4314 */
428870ff 4315 if ((szp->z_pflags & ZFS_XATTR) != (dzp->z_pflags & ZFS_XATTR)) {
0037b49e 4316 ZFS_EXIT(zfsvfs);
2e528b49 4317 return (SET_ERROR(EINVAL));
34dc7c2f
BB
4318 }
4319
0037b49e
BB
4320 owner = zfs_fuid_map_id(zfsvfs, KUID_TO_SUID(sip->i_uid),
4321 cr, ZFS_OWNER);
572e2857 4322 if (owner != crgetuid(cr) && secpolicy_basic_link(cr) != 0) {
0037b49e 4323 ZFS_EXIT(zfsvfs);
2e528b49 4324 return (SET_ERROR(EPERM));
34dc7c2f
BB
4325 }
4326
149e873a 4327 if ((error = zfs_zaccess(dzp, ACE_ADD_FILE, 0, B_FALSE, cr))) {
0037b49e 4328 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4329 return (error);
4330 }
4331
428870ff 4332top:
34dc7c2f
BB
4333 /*
4334 * Attempt to lock directory; fail if entry already exists.
4335 */
4336 error = zfs_dirent_lock(&dl, dzp, name, &tzp, zf, NULL, NULL);
4337 if (error) {
0037b49e 4338 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4339 return (error);
4340 }
4341
0037b49e 4342 tx = dmu_tx_create(zfsvfs->z_os);
428870ff 4343 dmu_tx_hold_sa(tx, szp->z_sa_hdl, B_FALSE);
34dc7c2f 4344 dmu_tx_hold_zap(tx, dzp->z_id, TRUE, name);
ace1eae8 4345 if (is_tmpfile)
0037b49e 4346 dmu_tx_hold_zap(tx, zfsvfs->z_unlinkedobj, FALSE, NULL);
ace1eae8 4347
428870ff
BB
4348 zfs_sa_upgrade_txholds(tx, szp);
4349 zfs_sa_upgrade_txholds(tx, dzp);
0735ecb3 4350 error = dmu_tx_assign(tx, (waited ? TXG_NOTHROTTLE : 0) | TXG_NOWAIT);
34dc7c2f
BB
4351 if (error) {
4352 zfs_dirent_unlock(dl);
fb5f0bc8 4353 if (error == ERESTART) {
e8b96c60 4354 waited = B_TRUE;
34dc7c2f
BB
4355 dmu_tx_wait(tx);
4356 dmu_tx_abort(tx);
4357 goto top;
4358 }
4359 dmu_tx_abort(tx);
0037b49e 4360 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4361 return (error);
4362 }
ace1eae8
CC
4363 /* unmark z_unlinked so zfs_link_create will not reject */
4364 if (is_tmpfile)
4365 szp->z_unlinked = 0;
34dc7c2f
BB
4366 error = zfs_link_create(dl, szp, tx, 0);
4367
4368 if (error == 0) {
4369 uint64_t txtype = TX_LINK;
ace1eae8
CC
4370 /*
4371 * tmpfile is created to be in z_unlinkedobj, so remove it.
4372 * Also, we don't log in ZIL, be cause all previous file
4373 * operation on the tmpfile are ignored by ZIL. Instead we
4374 * always wait for txg to sync to make sure all previous
4375 * operation are sync safe.
4376 */
4377 if (is_tmpfile) {
0037b49e
BB
4378 VERIFY(zap_remove_int(zfsvfs->z_os,
4379 zfsvfs->z_unlinkedobj, szp->z_id, tx) == 0);
ace1eae8
CC
4380 } else {
4381 if (flags & FIGNORECASE)
4382 txtype |= TX_CI;
4383 zfs_log_link(zilog, tx, txtype, dzp, szp, name);
4384 }
4385 } else if (is_tmpfile) {
4386 /* restore z_unlinked since when linking failed */
4387 szp->z_unlinked = 1;
34dc7c2f 4388 }
ace1eae8 4389 txg = dmu_tx_get_txg(tx);
34dc7c2f
BB
4390 dmu_tx_commit(tx);
4391
4392 zfs_dirent_unlock(dl);
4393
0037b49e 4394 if (!is_tmpfile && zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 4395 zil_commit(zilog, 0);
428870ff 4396
ace1eae8 4397 if (is_tmpfile)
0037b49e 4398 txg_wait_synced(dmu_objset_pool(zfsvfs->z_os), txg);
ace1eae8 4399
960e08fe
BB
4400 zfs_inode_update(dzp);
4401 zfs_inode_update(szp);
0037b49e 4402 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4403 return (error);
4404}
4405
3c0e5c0f 4406static void
119a394a 4407zfs_putpage_commit_cb(void *arg)
3c0e5c0f
BB
4408{
4409 struct page *pp = arg;
4410
119a394a 4411 ClearPageError(pp);
3c0e5c0f
BB
4412 end_page_writeback(pp);
4413}
4414
34dc7c2f 4415/*
3c0e5c0f
BB
4416 * Push a page out to disk, once the page is on stable storage the
4417 * registered commit callback will be run as notification of completion.
34dc7c2f 4418 *
3c0e5c0f
BB
4419 * IN: ip - page mapped for inode.
4420 * pp - page to push (page is locked)
4421 * wbc - writeback control data
34dc7c2f
BB
4422 *
4423 * RETURN: 0 if success
4424 * error code if failure
4425 *
3c0e5c0f
BB
4426 * Timestamps:
4427 * ip - ctime|mtime updated
34dc7c2f
BB
4428 */
4429/* ARGSUSED */
3c0e5c0f
BB
4430int
4431zfs_putpage(struct inode *ip, struct page *pp, struct writeback_control *wbc)
34dc7c2f 4432{
3c0e5c0f 4433 znode_t *zp = ITOZ(ip);
0037b49e 4434 zfsvfs_t *zfsvfs = ITOZSB(ip);
3c0e5c0f
BB
4435 loff_t offset;
4436 loff_t pgoff;
4c837f0d
BB
4437 unsigned int pglen;
4438 rl_t *rl;
3c0e5c0f
BB
4439 dmu_tx_t *tx;
4440 caddr_t va;
4441 int err = 0;
4442 uint64_t mtime[2], ctime[2];
4443 sa_bulk_attr_t bulk[3];
4444 int cnt = 0;
21a96fb6 4445 struct address_space *mapping;
3c0e5c0f 4446
0037b49e 4447 ZFS_ENTER(zfsvfs);
4c837f0d 4448 ZFS_VERIFY_ZP(zp);
d164b209 4449
3c0e5c0f
BB
4450 ASSERT(PageLocked(pp));
4451
d1d7e268
MK
4452 pgoff = page_offset(pp); /* Page byte-offset in file */
4453 offset = i_size_read(ip); /* File length in bytes */
8b1899d3
BB
4454 pglen = MIN(PAGE_SIZE, /* Page length in bytes */
4455 P2ROUNDUP(offset, PAGE_SIZE)-pgoff);
3c0e5c0f
BB
4456
4457 /* Page is beyond end of file */
4458 if (pgoff >= offset) {
4459 unlock_page(pp);
0037b49e 4460 ZFS_EXIT(zfsvfs);
3c0e5c0f
BB
4461 return (0);
4462 }
4463
4464 /* Truncate page length to end of file */
4465 if (pgoff + pglen > offset)
4466 pglen = offset - pgoff;
4467
4468#if 0
34dc7c2f 4469 /*
3c0e5c0f
BB
4470 * FIXME: Allow mmap writes past its quota. The correct fix
4471 * is to register a page_mkwrite() handler to count the page
4472 * against its quota when it is about to be dirtied.
34dc7c2f 4473 */
9c5167d1
NF
4474 if (zfs_id_overblockquota(zfsvfs, DMU_USERUSED_OBJECT,
4475 KUID_TO_SUID(ip->i_uid)) ||
4476 zfs_id_overblockquota(zfsvfs, DMU_GROUPUSED_OBJECT,
4477 KGID_TO_SGID(ip->i_gid)) ||
4478 (zp->z_projid != ZFS_DEFAULT_PROJID &&
4479 zfs_id_overblockquota(zfsvfs, DMU_PROJECTUSED_OBJECT,
4480 zp->z_projid))) {
9babb374 4481 err = EDQUOT;
9babb374 4482 }
3c0e5c0f
BB
4483#endif
4484
d958324f
BB
4485 /*
4486 * The ordering here is critical and must adhere to the following
4487 * rules in order to avoid deadlocking in either zfs_read() or
4488 * zfs_free_range() due to a lock inversion.
4489 *
4490 * 1) The page must be unlocked prior to acquiring the range lock.
4491 * This is critical because zfs_read() calls find_lock_page()
4492 * which may block on the page lock while holding the range lock.
4493 *
4494 * 2) Before setting or clearing write back on a page the range lock
4495 * must be held in order to prevent a lock inversion with the
4496 * zfs_free_range() function.
21a96fb6
CC
4497 *
4498 * This presents a problem because upon entering this function the
4499 * page lock is already held. To safely acquire the range lock the
4500 * page lock must be dropped. This creates a window where another
4501 * process could truncate, invalidate, dirty, or write out the page.
4502 *
4503 * Therefore, after successfully reacquiring the range and page locks
4504 * the current page state is checked. In the common case everything
4505 * will be as is expected and it can be written out. However, if
4506 * the page state has changed it must be handled accordingly.
d958324f 4507 */
21a96fb6
CC
4508 mapping = pp->mapping;
4509 redirty_page_for_writepage(wbc, pp);
d958324f 4510 unlock_page(pp);
21a96fb6 4511
d88895a0 4512 rl = zfs_range_lock(&zp->z_range_lock, pgoff, pglen, RL_WRITER);
21a96fb6
CC
4513 lock_page(pp);
4514
4515 /* Page mapping changed or it was no longer dirty, we're done */
4516 if (unlikely((mapping != pp->mapping) || !PageDirty(pp))) {
4517 unlock_page(pp);
4518 zfs_range_unlock(rl);
0037b49e 4519 ZFS_EXIT(zfsvfs);
21a96fb6
CC
4520 return (0);
4521 }
4522
4523 /* Another process started write block if required */
4524 if (PageWriteback(pp)) {
4525 unlock_page(pp);
4526 zfs_range_unlock(rl);
4527
4528 if (wbc->sync_mode != WB_SYNC_NONE)
4529 wait_on_page_writeback(pp);
4530
0037b49e 4531 ZFS_EXIT(zfsvfs);
21a96fb6
CC
4532 return (0);
4533 }
4534
4535 /* Clear the dirty flag the required locks are held */
4536 if (!clear_page_dirty_for_io(pp)) {
4537 unlock_page(pp);
4538 zfs_range_unlock(rl);
0037b49e 4539 ZFS_EXIT(zfsvfs);
21a96fb6
CC
4540 return (0);
4541 }
4542
4543 /*
4544 * Counterpart for redirty_page_for_writepage() above. This page
4545 * was in fact not skipped and should not be counted as if it were.
4546 */
4547 wbc->pages_skipped--;
3c0e5c0f 4548 set_page_writeback(pp);
21a96fb6 4549 unlock_page(pp);
3c0e5c0f 4550
0037b49e 4551 tx = dmu_tx_create(zfsvfs->z_os);
3c0e5c0f 4552 dmu_tx_hold_write(tx, zp->z_id, pgoff, pglen);
428870ff
BB
4553 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
4554 zfs_sa_upgrade_txholds(tx, zp);
d958324f 4555
fb5f0bc8 4556 err = dmu_tx_assign(tx, TXG_NOWAIT);
34dc7c2f 4557 if (err != 0) {
3c0e5c0f 4558 if (err == ERESTART)
34dc7c2f 4559 dmu_tx_wait(tx);
3c0e5c0f 4560
34dc7c2f 4561 dmu_tx_abort(tx);
119a394a
ED
4562 __set_page_dirty_nobuffers(pp);
4563 ClearPageError(pp);
4564 end_page_writeback(pp);
4c837f0d 4565 zfs_range_unlock(rl);
0037b49e 4566 ZFS_EXIT(zfsvfs);
3c0e5c0f 4567 return (err);
34dc7c2f
BB
4568 }
4569
dde471ef 4570 va = kmap(pp);
8b1899d3 4571 ASSERT3U(pglen, <=, PAGE_SIZE);
0037b49e 4572 dmu_write(zfsvfs->z_os, zp->z_id, pgoff, pglen, va, tx);
dde471ef 4573 kunmap(pp);
34dc7c2f 4574
0037b49e
BB
4575 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_MTIME(zfsvfs), NULL, &mtime, 16);
4576 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_CTIME(zfsvfs), NULL, &ctime, 16);
4577 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_FLAGS(zfsvfs), NULL,
4578 &zp->z_pflags, 8);
428870ff 4579
d3aa3ea9
BB
4580 /* Preserve the mtime and ctime provided by the inode */
4581 ZFS_TIME_ENCODE(&ip->i_mtime, mtime);
4582 ZFS_TIME_ENCODE(&ip->i_ctime, ctime);
4583 zp->z_atime_dirty = 0;
4584 zp->z_seq++;
4585
4586 err = sa_bulk_update(zp->z_sa_hdl, bulk, cnt, tx);
4587
0037b49e 4588 zfs_log_write(zfsvfs->z_log, tx, TX_WRITE, zp, pgoff, pglen, 0,
119a394a 4589 zfs_putpage_commit_cb, pp);
45d1cae3 4590 dmu_tx_commit(tx);
d3aa3ea9 4591
4c837f0d 4592 zfs_range_unlock(rl);
34dc7c2f 4593
119a394a
ED
4594 if (wbc->sync_mode != WB_SYNC_NONE) {
4595 /*
4596 * Note that this is rarely called under writepages(), because
4597 * writepages() normally handles the entire commit for
4598 * performance reasons.
4599 */
0037b49e 4600 zil_commit(zfsvfs->z_log, zp->z_id);
2b286136 4601 }
3c0e5c0f 4602
0037b49e 4603 ZFS_EXIT(zfsvfs);
3c0e5c0f 4604 return (err);
34dc7c2f
BB
4605}
4606
8780c539
BB
4607/*
4608 * Update the system attributes when the inode has been dirtied. For the
023699cd 4609 * moment we only update the mode, atime, mtime, and ctime.
8780c539
BB
4610 */
4611int
4612zfs_dirty_inode(struct inode *ip, int flags)
4613{
4614 znode_t *zp = ITOZ(ip);
0037b49e 4615 zfsvfs_t *zfsvfs = ITOZSB(ip);
8780c539 4616 dmu_tx_t *tx;
023699cd
MM
4617 uint64_t mode, atime[2], mtime[2], ctime[2];
4618 sa_bulk_attr_t bulk[4];
704cd075 4619 int error = 0;
8780c539
BB
4620 int cnt = 0;
4621
0037b49e 4622 if (zfs_is_readonly(zfsvfs) || dmu_objset_is_snapshot(zfsvfs->z_os))
c944be5d
BB
4623 return (0);
4624
0037b49e 4625 ZFS_ENTER(zfsvfs);
8780c539
BB
4626 ZFS_VERIFY_ZP(zp);
4627
704cd075
CC
4628#ifdef I_DIRTY_TIME
4629 /*
4630 * This is the lazytime semantic indroduced in Linux 4.0
4631 * This flag will only be called from update_time when lazytime is set.
4632 * (Note, I_DIRTY_SYNC will also set if not lazytime)
4633 * Fortunately mtime and ctime are managed within ZFS itself, so we
4634 * only need to dirty atime.
4635 */
4636 if (flags == I_DIRTY_TIME) {
4637 zp->z_atime_dirty = 1;
4638 goto out;
4639 }
4640#endif
4641
0037b49e 4642 tx = dmu_tx_create(zfsvfs->z_os);
8780c539
BB
4643
4644 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
4645 zfs_sa_upgrade_txholds(tx, zp);
4646
4647 error = dmu_tx_assign(tx, TXG_WAIT);
4648 if (error) {
4649 dmu_tx_abort(tx);
4650 goto out;
4651 }
4652
4653 mutex_enter(&zp->z_lock);
704cd075
CC
4654 zp->z_atime_dirty = 0;
4655
0037b49e
BB
4656 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_MODE(zfsvfs), NULL, &mode, 8);
4657 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_ATIME(zfsvfs), NULL, &atime, 16);
4658 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_MTIME(zfsvfs), NULL, &mtime, 16);
4659 SA_ADD_BULK_ATTR(bulk, cnt, SA_ZPL_CTIME(zfsvfs), NULL, &ctime, 16);
8780c539 4660
023699cd 4661 /* Preserve the mode, mtime and ctime provided by the inode */
8780c539
BB
4662 ZFS_TIME_ENCODE(&ip->i_atime, atime);
4663 ZFS_TIME_ENCODE(&ip->i_mtime, mtime);
4664 ZFS_TIME_ENCODE(&ip->i_ctime, ctime);
023699cd
MM
4665 mode = ip->i_mode;
4666
4667 zp->z_mode = mode;
8780c539
BB
4668
4669 error = sa_bulk_update(zp->z_sa_hdl, bulk, cnt, tx);
4670 mutex_exit(&zp->z_lock);
4671
4672 dmu_tx_commit(tx);
4673out:
0037b49e 4674 ZFS_EXIT(zfsvfs);
8780c539
BB
4675 return (error);
4676}
8780c539 4677
34dc7c2f
BB
4678/*ARGSUSED*/
4679void
c0d35759 4680zfs_inactive(struct inode *ip)
34dc7c2f 4681{
c0d35759 4682 znode_t *zp = ITOZ(ip);
0037b49e 4683 zfsvfs_t *zfsvfs = ITOZSB(ip);
0df9673f 4684 uint64_t atime[2];
34dc7c2f 4685 int error;
cafbd2ac 4686 int need_unlock = 0;
34dc7c2f 4687
cafbd2ac 4688 /* Only read lock if we haven't already write locked, e.g. rollback */
0037b49e 4689 if (!RW_WRITE_HELD(&zfsvfs->z_teardown_inactive_lock)) {
cafbd2ac 4690 need_unlock = 1;
0037b49e 4691 rw_enter(&zfsvfs->z_teardown_inactive_lock, RW_READER);
cafbd2ac 4692 }
c0d35759 4693 if (zp->z_sa_hdl == NULL) {
cafbd2ac 4694 if (need_unlock)
0037b49e 4695 rw_exit(&zfsvfs->z_teardown_inactive_lock);
c0d35759 4696 return;
34dc7c2f
BB
4697 }
4698
4699 if (zp->z_atime_dirty && zp->z_unlinked == 0) {
0037b49e 4700 dmu_tx_t *tx = dmu_tx_create(zfsvfs->z_os);
34dc7c2f 4701
428870ff
BB
4702 dmu_tx_hold_sa(tx, zp->z_sa_hdl, B_FALSE);
4703 zfs_sa_upgrade_txholds(tx, zp);
34dc7c2f
BB
4704 error = dmu_tx_assign(tx, TXG_WAIT);
4705 if (error) {
4706 dmu_tx_abort(tx);
4707 } else {
0df9673f 4708 ZFS_TIME_ENCODE(&ip->i_atime, atime);
34dc7c2f 4709 mutex_enter(&zp->z_lock);
0037b49e 4710 (void) sa_update(zp->z_sa_hdl, SA_ZPL_ATIME(zfsvfs),
0df9673f 4711 (void *)&atime, sizeof (atime), tx);
34dc7c2f
BB
4712 zp->z_atime_dirty = 0;
4713 mutex_exit(&zp->z_lock);
4714 dmu_tx_commit(tx);
4715 }
4716 }
4717
4718 zfs_zinactive(zp);
cafbd2ac 4719 if (need_unlock)
0037b49e 4720 rw_exit(&zfsvfs->z_teardown_inactive_lock);
34dc7c2f
BB
4721}
4722
4723/*
4724 * Bounds-check the seek operation.
4725 *
3558fd73 4726 * IN: ip - inode seeking within
34dc7c2f
BB
4727 * ooff - old file offset
4728 * noffp - pointer to new file offset
4729 * ct - caller context
4730 *
4731 * RETURN: 0 if success
4732 * EINVAL if new offset invalid
4733 */
4734/* ARGSUSED */
3558fd73 4735int
9623f736 4736zfs_seek(struct inode *ip, offset_t ooff, offset_t *noffp)
34dc7c2f 4737{
3558fd73 4738 if (S_ISDIR(ip->i_mode))
34dc7c2f
BB
4739 return (0);
4740 return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
4741}
4742
34dc7c2f 4743/*
dde471ef 4744 * Fill pages with data from the disk.
34dc7c2f
BB
4745 */
4746static int
dde471ef 4747zfs_fillpage(struct inode *ip, struct page *pl[], int nr_pages)
34dc7c2f 4748{
d1d7e268 4749 znode_t *zp = ITOZ(ip);
0037b49e 4750 zfsvfs_t *zfsvfs = ITOZSB(ip);
d1d7e268 4751 objset_t *os;
dde471ef 4752 struct page *cur_pp;
d1d7e268
MK
4753 u_offset_t io_off, total;
4754 size_t io_len;
4755 loff_t i_size;
4756 unsigned page_idx;
4757 int err;
34dc7c2f 4758
0037b49e 4759 os = zfsvfs->z_os;
8b1899d3 4760 io_len = nr_pages << PAGE_SHIFT;
dde471ef
PJ
4761 i_size = i_size_read(ip);
4762 io_off = page_offset(pl[0]);
4763
4764 if (io_off + io_len > i_size)
4765 io_len = i_size - io_off;
34dc7c2f
BB
4766
4767 /*
dde471ef 4768 * Iterate over list of pages and read each page individually.
34dc7c2f 4769 */
dde471ef 4770 page_idx = 0;
34dc7c2f 4771 for (total = io_off + io_len; io_off < total; io_off += PAGESIZE) {
d164b209
BB
4772 caddr_t va;
4773
540c3927 4774 cur_pp = pl[page_idx++];
dde471ef 4775 va = kmap(cur_pp);
9babb374
BB
4776 err = dmu_read(os, zp->z_id, io_off, PAGESIZE, va,
4777 DMU_READ_PREFETCH);
dde471ef 4778 kunmap(cur_pp);
34dc7c2f 4779 if (err) {
b128c09f
BB
4780 /* convert checksum errors into IO errors */
4781 if (err == ECKSUM)
2e528b49 4782 err = SET_ERROR(EIO);
34dc7c2f
BB
4783 return (err);
4784 }
34dc7c2f 4785 }
d164b209 4786
34dc7c2f
BB
4787 return (0);
4788}
4789
4790/*
dde471ef 4791 * Uses zfs_fillpage to read data from the file and fill the pages.
34dc7c2f 4792 *
dde471ef
PJ
4793 * IN: ip - inode of file to get data from.
4794 * pl - list of pages to read
4795 * nr_pages - number of pages to read
34dc7c2f 4796 *
d3cc8b15 4797 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
4798 *
4799 * Timestamps:
4800 * vp - atime updated
4801 */
4802/* ARGSUSED */
dde471ef
PJ
4803int
4804zfs_getpage(struct inode *ip, struct page *pl[], int nr_pages)
34dc7c2f 4805{
dde471ef 4806 znode_t *zp = ITOZ(ip);
0037b49e 4807 zfsvfs_t *zfsvfs = ITOZSB(ip);
dde471ef 4808 int err;
d164b209 4809
d164b209
BB
4810 if (pl == NULL)
4811 return (0);
34dc7c2f 4812
0037b49e 4813 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
4814 ZFS_VERIFY_ZP(zp);
4815
dde471ef 4816 err = zfs_fillpage(ip, pl, nr_pages);
34dc7c2f 4817
0037b49e 4818 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4819 return (err);
4820}
4821
4822/*
e2e7aa2d 4823 * Check ZFS specific permissions to memory map a section of a file.
34dc7c2f 4824 *
e2e7aa2d
BB
4825 * IN: ip - inode of the file to mmap
4826 * off - file offset
4827 * addrp - start address in memory region
4828 * len - length of memory region
4829 * vm_flags- address flags
34dc7c2f 4830 *
e2e7aa2d
BB
4831 * RETURN: 0 if success
4832 * error code if failure
34dc7c2f
BB
4833 */
4834/*ARGSUSED*/
e2e7aa2d
BB
4835int
4836zfs_map(struct inode *ip, offset_t off, caddr_t *addrp, size_t len,
4837 unsigned long vm_flags)
34dc7c2f 4838{
e2e7aa2d 4839 znode_t *zp = ITOZ(ip);
0037b49e 4840 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f 4841
0037b49e 4842 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
4843 ZFS_VERIFY_ZP(zp);
4844
e2e7aa2d 4845 if ((vm_flags & VM_WRITE) && (zp->z_pflags &
428870ff 4846 (ZFS_IMMUTABLE | ZFS_READONLY | ZFS_APPENDONLY))) {
0037b49e 4847 ZFS_EXIT(zfsvfs);
2e528b49 4848 return (SET_ERROR(EPERM));
34dc7c2f
BB
4849 }
4850
e2e7aa2d 4851 if ((vm_flags & (VM_READ | VM_EXEC)) &&
428870ff 4852 (zp->z_pflags & ZFS_AV_QUARANTINED)) {
0037b49e 4853 ZFS_EXIT(zfsvfs);
2e528b49 4854 return (SET_ERROR(EACCES));
34dc7c2f
BB
4855 }
4856
34dc7c2f 4857 if (off < 0 || len > MAXOFFSET_T - off) {
0037b49e 4858 ZFS_EXIT(zfsvfs);
2e528b49 4859 return (SET_ERROR(ENXIO));
34dc7c2f
BB
4860 }
4861
0037b49e 4862 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4863 return (0);
4864}
4865
3558fd73
BB
4866/*
4867 * convoff - converts the given data (start, whence) to the
4868 * given whence.
4869 */
4870int
4871convoff(struct inode *ip, flock64_t *lckdat, int whence, offset_t offset)
4872{
5484965a 4873 vattr_t vap;
3558fd73
BB
4874 int error;
4875
4876 if ((lckdat->l_whence == 2) || (whence == 2)) {
d95a5980 4877 if ((error = zfs_getattr(ip, &vap, 0, CRED())))
3558fd73
BB
4878 return (error);
4879 }
4880
4881 switch (lckdat->l_whence) {
4882 case 1:
4883 lckdat->l_start += offset;
4884 break;
4885 case 2:
5484965a 4886 lckdat->l_start += vap.va_size;
3558fd73
BB
4887 /* FALLTHRU */
4888 case 0:
4889 break;
4890 default:
2e528b49 4891 return (SET_ERROR(EINVAL));
3558fd73
BB
4892 }
4893
4894 if (lckdat->l_start < 0)
2e528b49 4895 return (SET_ERROR(EINVAL));
3558fd73
BB
4896
4897 switch (whence) {
4898 case 1:
4899 lckdat->l_start -= offset;
4900 break;
4901 case 2:
5484965a 4902 lckdat->l_start -= vap.va_size;
3558fd73
BB
4903 /* FALLTHRU */
4904 case 0:
4905 break;
4906 default:
2e528b49 4907 return (SET_ERROR(EINVAL));
3558fd73
BB
4908 }
4909
4910 lckdat->l_whence = (short)whence;
4911 return (0);
4912}
4913
34dc7c2f
BB
4914/*
4915 * Free or allocate space in a file. Currently, this function only
4916 * supports the `F_FREESP' command. However, this command is somewhat
4917 * misnamed, as its functionality includes the ability to allocate as
4918 * well as free space.
4919 *
3558fd73 4920 * IN: ip - inode of file to free data in.
34dc7c2f
BB
4921 * cmd - action to take (only F_FREESP supported).
4922 * bfp - section of file to free/alloc.
4923 * flag - current file open mode flags.
4924 * offset - current file offset.
4925 * cr - credentials of caller [UNUSED].
34dc7c2f 4926 *
d3cc8b15 4927 * RETURN: 0 on success, error code on failure.
34dc7c2f
BB
4928 *
4929 * Timestamps:
3558fd73 4930 * ip - ctime|mtime updated
34dc7c2f
BB
4931 */
4932/* ARGSUSED */
e5c39b95 4933int
3558fd73
BB
4934zfs_space(struct inode *ip, int cmd, flock64_t *bfp, int flag,
4935 offset_t offset, cred_t *cr)
34dc7c2f 4936{
3558fd73 4937 znode_t *zp = ITOZ(ip);
0037b49e 4938 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
4939 uint64_t off, len;
4940 int error;
4941
0037b49e 4942 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
4943 ZFS_VERIFY_ZP(zp);
4944
34dc7c2f 4945 if (cmd != F_FREESP) {
0037b49e 4946 ZFS_EXIT(zfsvfs);
2e528b49 4947 return (SET_ERROR(EINVAL));
34dc7c2f
BB
4948 }
4949
f3c9dca0
MT
4950 /*
4951 * Callers might not be able to detect properly that we are read-only,
4952 * so check it explicitly here.
4953 */
0037b49e
BB
4954 if (zfs_is_readonly(zfsvfs)) {
4955 ZFS_EXIT(zfsvfs);
f3c9dca0
MT
4956 return (SET_ERROR(EROFS));
4957 }
4958
3558fd73 4959 if ((error = convoff(ip, bfp, 0, offset))) {
0037b49e 4960 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4961 return (error);
4962 }
4963
4964 if (bfp->l_len < 0) {
0037b49e 4965 ZFS_EXIT(zfsvfs);
2e528b49 4966 return (SET_ERROR(EINVAL));
34dc7c2f
BB
4967 }
4968
aec69371
ED
4969 /*
4970 * Permissions aren't checked on Solaris because on this OS
4971 * zfs_space() can only be called with an opened file handle.
4972 * On Linux we can get here through truncate_range() which
4973 * operates directly on inodes, so we need to check access rights.
4974 */
4975 if ((error = zfs_zaccess(zp, ACE_WRITE_DATA, 0, B_FALSE, cr))) {
0037b49e 4976 ZFS_EXIT(zfsvfs);
aec69371
ED
4977 return (error);
4978 }
4979
34dc7c2f
BB
4980 off = bfp->l_start;
4981 len = bfp->l_len; /* 0 means from off to end of file */
4982
b128c09f 4983 error = zfs_freesp(zp, off, len, flag, TRUE);
34dc7c2f 4984
0037b49e 4985 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
4986 return (error);
4987}
4988
4989/*ARGSUSED*/
e5c39b95 4990int
3558fd73 4991zfs_fid(struct inode *ip, fid_t *fidp)
34dc7c2f 4992{
3558fd73 4993 znode_t *zp = ITOZ(ip);
0037b49e 4994 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f 4995 uint32_t gen;
428870ff 4996 uint64_t gen64;
34dc7c2f
BB
4997 uint64_t object = zp->z_id;
4998 zfid_short_t *zfid;
428870ff 4999 int size, i, error;
34dc7c2f 5000
0037b49e 5001 ZFS_ENTER(zfsvfs);
34dc7c2f 5002 ZFS_VERIFY_ZP(zp);
428870ff 5003
0037b49e 5004 if ((error = sa_lookup(zp->z_sa_hdl, SA_ZPL_GEN(zfsvfs),
428870ff 5005 &gen64, sizeof (uint64_t))) != 0) {
0037b49e 5006 ZFS_EXIT(zfsvfs);
428870ff
BB
5007 return (error);
5008 }
5009
5010 gen = (uint32_t)gen64;
34dc7c2f 5011
9b77d1c9 5012 size = SHORT_FID_LEN;
34dc7c2f
BB
5013
5014 zfid = (zfid_short_t *)fidp;
5015
5016 zfid->zf_len = size;
5017
5018 for (i = 0; i < sizeof (zfid->zf_object); i++)
5019 zfid->zf_object[i] = (uint8_t)(object >> (8 * i));
5020
5021 /* Must have a non-zero generation number to distinguish from .zfs */
5022 if (gen == 0)
5023 gen = 1;
5024 for (i = 0; i < sizeof (zfid->zf_gen); i++)
5025 zfid->zf_gen[i] = (uint8_t)(gen >> (8 * i));
5026
0037b49e 5027 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
5028 return (0);
5029}
5030
34dc7c2f 5031/*ARGSUSED*/
e5c39b95 5032int
3558fd73 5033zfs_getsecattr(struct inode *ip, vsecattr_t *vsecp, int flag, cred_t *cr)
34dc7c2f 5034{
3558fd73 5035 znode_t *zp = ITOZ(ip);
0037b49e 5036 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
5037 int error;
5038 boolean_t skipaclchk = (flag & ATTR_NOACLCHECK) ? B_TRUE : B_FALSE;
5039
0037b49e 5040 ZFS_ENTER(zfsvfs);
34dc7c2f
BB
5041 ZFS_VERIFY_ZP(zp);
5042 error = zfs_getacl(zp, vsecp, skipaclchk, cr);
0037b49e 5043 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
5044
5045 return (error);
5046}
5047
5048/*ARGSUSED*/
e5c39b95 5049int
3558fd73 5050zfs_setsecattr(struct inode *ip, vsecattr_t *vsecp, int flag, cred_t *cr)
34dc7c2f 5051{
3558fd73 5052 znode_t *zp = ITOZ(ip);
0037b49e 5053 zfsvfs_t *zfsvfs = ITOZSB(ip);
34dc7c2f
BB
5054 int error;
5055 boolean_t skipaclchk = (flag & ATTR_NOACLCHECK) ? B_TRUE : B_FALSE;
0037b49e 5056 zilog_t *zilog = zfsvfs->z_log;
34dc7c2f 5057
0037b49e 5058 ZFS_ENTER(zfsvfs);
34dc7c2f 5059 ZFS_VERIFY_ZP(zp);
428870ff 5060
34dc7c2f 5061 error = zfs_setacl(zp, vsecp, skipaclchk, cr);
428870ff 5062
0037b49e 5063 if (zfsvfs->z_os->os_sync == ZFS_SYNC_ALWAYS)
572e2857 5064 zil_commit(zilog, 0);
428870ff 5065
0037b49e 5066 ZFS_EXIT(zfsvfs);
34dc7c2f
BB
5067 return (error);
5068}
5069
3558fd73 5070#ifdef HAVE_UIO_ZEROCOPY
428870ff
BB
5071/*
5072 * Tunable, both must be a power of 2.
5073 *
5074 * zcr_blksz_min: the smallest read we may consider to loan out an arcbuf
5075 * zcr_blksz_max: if set to less than the file block size, allow loaning out of
3558fd73 5076 * an arcbuf for a partial block read
428870ff
BB
5077 */
5078int zcr_blksz_min = (1 << 10); /* 1K */
5079int zcr_blksz_max = (1 << 17); /* 128K */
5080
5081/*ARGSUSED*/
5082static int
3558fd73 5083zfs_reqzcbuf(struct inode *ip, enum uio_rw ioflag, xuio_t *xuio, cred_t *cr)
428870ff 5084{
3558fd73 5085 znode_t *zp = ITOZ(ip);
0037b49e
BB
5086 zfsvfs_t *zfsvfs = ITOZSB(ip);
5087 int max_blksz = zfsvfs->z_max_blksz;
428870ff
BB
5088 uio_t *uio = &xuio->xu_uio;
5089 ssize_t size = uio->uio_resid;
5090 offset_t offset = uio->uio_loffset;
5091 int blksz;
5092 int fullblk, i;
5093 arc_buf_t *abuf;
5094 ssize_t maxsize;
5095 int preamble, postamble;
5096
5097 if (xuio->xu_type != UIOTYPE_ZEROCOPY)
2e528b49 5098 return (SET_ERROR(EINVAL));
428870ff 5099
0037b49e 5100 ZFS_ENTER(zfsvfs);
428870ff
BB
5101 ZFS_VERIFY_ZP(zp);
5102 switch (ioflag) {
5103 case UIO_WRITE:
5104 /*
5105 * Loan out an arc_buf for write if write size is bigger than
5106 * max_blksz, and the file's block size is also max_blksz.
5107 */
5108 blksz = max_blksz;
5109 if (size < blksz || zp->z_blksz != blksz) {
0037b49e 5110 ZFS_EXIT(zfsvfs);
2e528b49 5111 return (SET_ERROR(EINVAL));
428870ff
BB
5112 }
5113 /*
5114 * Caller requests buffers for write before knowing where the
5115 * write offset might be (e.g. NFS TCP write).
5116 */
5117 if (offset == -1) {
5118 preamble = 0;
5119 } else {
5120 preamble = P2PHASE(offset, blksz);
5121 if (preamble) {
5122 preamble = blksz - preamble;
5123 size -= preamble;
5124 }
5125 }
5126
5127 postamble = P2PHASE(size, blksz);
5128 size -= postamble;
5129
5130 fullblk = size / blksz;
5131 (void) dmu_xuio_init(xuio,
5132 (preamble != 0) + fullblk + (postamble != 0));
428870ff
BB
5133
5134 /*
5135 * Have to fix iov base/len for partial buffers. They
5136 * currently represent full arc_buf's.
5137 */
5138 if (preamble) {
5139 /* data begins in the middle of the arc_buf */
5140 abuf = dmu_request_arcbuf(sa_get_db(zp->z_sa_hdl),
5141 blksz);
5142 ASSERT(abuf);
5143 (void) dmu_xuio_add(xuio, abuf,
5144 blksz - preamble, preamble);
5145 }
5146
5147 for (i = 0; i < fullblk; i++) {
5148 abuf = dmu_request_arcbuf(sa_get_db(zp->z_sa_hdl),
5149 blksz);
5150 ASSERT(abuf);
5151 (void) dmu_xuio_add(xuio, abuf, 0, blksz);
5152 }
5153
5154 if (postamble) {
5155 /* data ends in the middle of the arc_buf */
5156 abuf = dmu_request_arcbuf(sa_get_db(zp->z_sa_hdl),
5157 blksz);
5158 ASSERT(abuf);
5159 (void) dmu_xuio_add(xuio, abuf, 0, postamble);
5160 }
5161 break;
5162 case UIO_READ:
5163 /*
5164 * Loan out an arc_buf for read if the read size is larger than
5165 * the current file block size. Block alignment is not
5166 * considered. Partial arc_buf will be loaned out for read.
5167 */
5168 blksz = zp->z_blksz;
5169 if (blksz < zcr_blksz_min)
5170 blksz = zcr_blksz_min;
5171 if (blksz > zcr_blksz_max)
5172 blksz = zcr_blksz_max;
5173 /* avoid potential complexity of dealing with it */
5174 if (blksz > max_blksz) {
0037b49e 5175 ZFS_EXIT(zfsvfs);
2e528b49 5176 return (SET_ERROR(EINVAL));
428870ff
BB
5177 }
5178
5179 maxsize = zp->z_size - uio->uio_loffset;
5180 if (size > maxsize)
5181 size = maxsize;
5182
3558fd73 5183 if (size < blksz) {
0037b49e 5184 ZFS_EXIT(zfsvfs);
2e528b49 5185 return (SET_ERROR(EINVAL));
428870ff
BB
5186 }
5187 break;
5188 default:
0037b49e 5189 ZFS_EXIT(zfsvfs);
2e528b49 5190 return (SET_ERROR(EINVAL));
428870ff
BB
5191 }
5192
5193 uio->uio_extflg = UIO_XUIO;
5194 XUIO_XUZC_RW(xuio) = ioflag;
0037b49e 5195 ZFS_EXIT(zfsvfs);
428870ff
BB
5196 return (0);
5197}
5198
5199/*ARGSUSED*/
5200static int
3558fd73 5201zfs_retzcbuf(struct inode *ip, xuio_t *xuio, cred_t *cr)
428870ff
BB
5202{
5203 int i;
5204 arc_buf_t *abuf;
5205 int ioflag = XUIO_XUZC_RW(xuio);
5206
5207 ASSERT(xuio->xu_type == UIOTYPE_ZEROCOPY);
5208
5209 i = dmu_xuio_cnt(xuio);
5210 while (i-- > 0) {
5211 abuf = dmu_xuio_arcbuf(xuio, i);
5212 /*
5213 * if abuf == NULL, it must be a write buffer
5214 * that has been returned in zfs_write().
5215 */
5216 if (abuf)
5217 dmu_return_arcbuf(abuf);
5218 ASSERT(abuf || ioflag == UIO_WRITE);
5219 }
5220
5221 dmu_xuio_fini(xuio);
5222 return (0);
5223}
3558fd73 5224#endif /* HAVE_UIO_ZEROCOPY */
c409e464 5225
93ce2b4c 5226#if defined(_KERNEL)
f298b24d
BB
5227EXPORT_SYMBOL(zfs_open);
5228EXPORT_SYMBOL(zfs_close);
5229EXPORT_SYMBOL(zfs_read);
5230EXPORT_SYMBOL(zfs_write);
5231EXPORT_SYMBOL(zfs_access);
5232EXPORT_SYMBOL(zfs_lookup);
5233EXPORT_SYMBOL(zfs_create);
5234EXPORT_SYMBOL(zfs_tmpfile);
5235EXPORT_SYMBOL(zfs_remove);
5236EXPORT_SYMBOL(zfs_mkdir);
5237EXPORT_SYMBOL(zfs_rmdir);
5238EXPORT_SYMBOL(zfs_readdir);
5239EXPORT_SYMBOL(zfs_fsync);
5240EXPORT_SYMBOL(zfs_getattr);
5241EXPORT_SYMBOL(zfs_getattr_fast);
5242EXPORT_SYMBOL(zfs_setattr);
5243EXPORT_SYMBOL(zfs_rename);
5244EXPORT_SYMBOL(zfs_symlink);
5245EXPORT_SYMBOL(zfs_readlink);
5246EXPORT_SYMBOL(zfs_link);
5247EXPORT_SYMBOL(zfs_inactive);
5248EXPORT_SYMBOL(zfs_space);
5249EXPORT_SYMBOL(zfs_fid);
5250EXPORT_SYMBOL(zfs_getsecattr);
5251EXPORT_SYMBOL(zfs_setsecattr);
5252EXPORT_SYMBOL(zfs_getpage);
5253EXPORT_SYMBOL(zfs_putpage);
5254EXPORT_SYMBOL(zfs_dirty_inode);
5255EXPORT_SYMBOL(zfs_map);
5256
02730c33 5257/* CSTYLED */
a966c564
K
5258module_param(zfs_delete_blocks, ulong, 0644);
5259MODULE_PARM_DESC(zfs_delete_blocks, "Delete files larger than N blocks async");
c409e464
BB
5260module_param(zfs_read_chunk_size, long, 0644);
5261MODULE_PARM_DESC(zfs_read_chunk_size, "Bytes to read per chunk");
5262#endif