]>
Commit | Line | Data |
---|---|---|
716154c5 BB |
1 | /*****************************************************************************\ |
2 | * Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC. | |
3 | * Copyright (C) 2007 The Regents of the University of California. | |
4 | * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER). | |
5 | * Written by Brian Behlendorf <behlendorf1@llnl.gov>. | |
715f6251 | 6 | * UCRL-CODE-235197 |
7 | * | |
716154c5 BB |
8 | * This file is part of the SPL, Solaris Porting Layer. |
9 | * For details, see <http://github.com/behlendorf/spl/>. | |
10 | * | |
11 | * The SPL is free software; you can redistribute it and/or modify it | |
12 | * under the terms of the GNU General Public License as published by the | |
13 | * Free Software Foundation; either version 2 of the License, or (at your | |
14 | * option) any later version. | |
715f6251 | 15 | * |
716154c5 | 16 | * The SPL is distributed in the hope that it will be useful, but WITHOUT |
715f6251 | 17 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
18 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |
19 | * for more details. | |
20 | * | |
21 | * You should have received a copy of the GNU General Public License along | |
716154c5 BB |
22 | * with the SPL. If not, see <http://www.gnu.org/licenses/>. |
23 | ***************************************************************************** | |
24 | * Solaris Porting Layer (SPL) Vnode Implementation. | |
25 | \*****************************************************************************/ | |
715f6251 | 26 | |
4b171585 | 27 | #include <sys/vnode.h> |
55abb092 | 28 | #include <spl-debug.h> |
937879f1 | 29 | |
b17edc10 BB |
30 | #ifdef SS_DEBUG_SUBSYS |
31 | #undef SS_DEBUG_SUBSYS | |
937879f1 | 32 | #endif |
33 | ||
b17edc10 | 34 | #define SS_DEBUG_SUBSYS SS_VNODE |
937879f1 | 35 | |
51a727e9 | 36 | vnode_t *rootdir = (vnode_t *)0xabcd1234; |
4b171585 | 37 | EXPORT_SYMBOL(rootdir); |
38 | ||
7afde631 | 39 | static spl_kmem_cache_t *vn_cache; |
40 | static spl_kmem_cache_t *vn_file_cache; | |
e4f1d29f | 41 | |
42 | static spinlock_t vn_file_lock = SPIN_LOCK_UNLOCKED; | |
43 | static LIST_HEAD(vn_file_list); | |
af828292 | 44 | |
4295b530 BB |
45 | vtype_t |
46 | vn_mode_to_vtype(mode_t mode) | |
4b171585 | 47 | { |
48 | if (S_ISREG(mode)) | |
49 | return VREG; | |
50 | ||
51 | if (S_ISDIR(mode)) | |
52 | return VDIR; | |
53 | ||
54 | if (S_ISCHR(mode)) | |
55 | return VCHR; | |
56 | ||
57 | if (S_ISBLK(mode)) | |
58 | return VBLK; | |
59 | ||
60 | if (S_ISFIFO(mode)) | |
61 | return VFIFO; | |
62 | ||
63 | if (S_ISLNK(mode)) | |
64 | return VLNK; | |
65 | ||
66 | if (S_ISSOCK(mode)) | |
67 | return VSOCK; | |
68 | ||
69 | if (S_ISCHR(mode)) | |
70 | return VCHR; | |
71 | ||
72 | return VNON; | |
4295b530 BB |
73 | } /* vn_mode_to_vtype() */ |
74 | EXPORT_SYMBOL(vn_mode_to_vtype); | |
75 | ||
76 | mode_t | |
77 | vn_vtype_to_mode(vtype_t vtype) | |
78 | { | |
79 | if (vtype == VREG) | |
80 | return S_IFREG; | |
81 | ||
82 | if (vtype == VDIR) | |
83 | return S_IFDIR; | |
84 | ||
85 | if (vtype == VCHR) | |
86 | return S_IFCHR; | |
87 | ||
88 | if (vtype == VBLK) | |
89 | return S_IFBLK; | |
90 | ||
91 | if (vtype == VFIFO) | |
92 | return S_IFIFO; | |
93 | ||
94 | if (vtype == VLNK) | |
95 | return S_IFLNK; | |
96 | ||
97 | if (vtype == VSOCK) | |
98 | return S_IFSOCK; | |
99 | ||
100 | return VNON; | |
101 | } /* vn_vtype_to_mode() */ | |
102 | EXPORT_SYMBOL(vn_vtype_to_mode); | |
4b171585 | 103 | |
af828292 | 104 | vnode_t * |
105 | vn_alloc(int flag) | |
106 | { | |
107 | vnode_t *vp; | |
b17edc10 | 108 | SENTRY; |
af828292 | 109 | |
110 | vp = kmem_cache_alloc(vn_cache, flag); | |
af828292 | 111 | if (vp != NULL) { |
e4f1d29f | 112 | vp->v_file = NULL; |
af828292 | 113 | vp->v_type = 0; |
114 | } | |
115 | ||
b17edc10 | 116 | SRETURN(vp); |
af828292 | 117 | } /* vn_alloc() */ |
118 | EXPORT_SYMBOL(vn_alloc); | |
119 | ||
120 | void | |
121 | vn_free(vnode_t *vp) | |
122 | { | |
b17edc10 | 123 | SENTRY; |
af828292 | 124 | kmem_cache_free(vn_cache, vp); |
b17edc10 | 125 | SEXIT; |
af828292 | 126 | } /* vn_free() */ |
127 | EXPORT_SYMBOL(vn_free); | |
128 | ||
0b3cf046 | 129 | int |
af828292 | 130 | vn_open(const char *path, uio_seg_t seg, int flags, int mode, |
4b171585 | 131 | vnode_t **vpp, int x1, void *x2) |
0b3cf046 | 132 | { |
f7e8739c RC |
133 | struct file *fp; |
134 | struct kstat stat; | |
135 | int rc, saved_umask = 0; | |
4be55565 | 136 | gfp_t saved_gfp; |
0b3cf046 | 137 | vnode_t *vp; |
b17edc10 | 138 | SENTRY; |
0b3cf046 | 139 | |
937879f1 | 140 | ASSERT(flags & (FWRITE | FREAD)); |
141 | ASSERT(seg == UIO_SYSSPACE); | |
142 | ASSERT(vpp); | |
4b171585 | 143 | *vpp = NULL; |
144 | ||
145 | if (!(flags & FCREAT) && (flags & FWRITE)) | |
146 | flags |= FEXCL; | |
147 | ||
728b9dd8 | 148 | /* Note for filp_open() the two low bits must be remapped to mean: |
149 | * 01 - read-only -> 00 read-only | |
150 | * 10 - write-only -> 01 write-only | |
151 | * 11 - read-write -> 10 read-write | |
152 | */ | |
153 | flags--; | |
0b3cf046 | 154 | |
155 | if (flags & FCREAT) | |
4b171585 | 156 | saved_umask = xchg(¤t->fs->umask, 0); |
0b3cf046 | 157 | |
f7e8739c | 158 | fp = filp_open(path, flags, mode); |
0b3cf046 | 159 | |
160 | if (flags & FCREAT) | |
4b171585 | 161 | (void)xchg(¤t->fs->umask, saved_umask); |
0b3cf046 | 162 | |
f7e8739c | 163 | if (IS_ERR(fp)) |
b17edc10 | 164 | SRETURN(-PTR_ERR(fp)); |
0b3cf046 | 165 | |
f7e8739c | 166 | rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat); |
4b171585 | 167 | if (rc) { |
168 | filp_close(fp, 0); | |
b17edc10 | 169 | SRETURN(-rc); |
0b3cf046 | 170 | } |
171 | ||
af828292 | 172 | vp = vn_alloc(KM_SLEEP); |
4b171585 | 173 | if (!vp) { |
174 | filp_close(fp, 0); | |
b17edc10 | 175 | SRETURN(ENOMEM); |
4b171585 | 176 | } |
0b3cf046 | 177 | |
4be55565 LW |
178 | saved_gfp = mapping_gfp_mask(fp->f_mapping); |
179 | mapping_set_gfp_mask(fp->f_mapping, saved_gfp & ~(__GFP_IO|__GFP_FS)); | |
180 | ||
e4f1d29f | 181 | mutex_enter(&vp->v_lock); |
4295b530 | 182 | vp->v_type = vn_mode_to_vtype(stat.mode); |
e4f1d29f | 183 | vp->v_file = fp; |
4be55565 | 184 | vp->v_gfp_mask = saved_gfp; |
4b171585 | 185 | *vpp = vp; |
e4f1d29f | 186 | mutex_exit(&vp->v_lock); |
0b3cf046 | 187 | |
b17edc10 | 188 | SRETURN(0); |
4b171585 | 189 | } /* vn_open() */ |
190 | EXPORT_SYMBOL(vn_open); | |
0b3cf046 | 191 | |
0b3cf046 | 192 | int |
af828292 | 193 | vn_openat(const char *path, uio_seg_t seg, int flags, int mode, |
4b171585 | 194 | vnode_t **vpp, int x1, void *x2, vnode_t *vp, int fd) |
0b3cf046 | 195 | { |
4b171585 | 196 | char *realpath; |
12018327 | 197 | int len, rc; |
b17edc10 | 198 | SENTRY; |
0b3cf046 | 199 | |
937879f1 | 200 | ASSERT(vp == rootdir); |
0b3cf046 | 201 | |
12018327 | 202 | len = strlen(path) + 2; |
203 | realpath = kmalloc(len, GFP_KERNEL); | |
4b171585 | 204 | if (!realpath) |
b17edc10 | 205 | SRETURN(ENOMEM); |
0b3cf046 | 206 | |
12018327 | 207 | (void)snprintf(realpath, len, "/%s", path); |
4b171585 | 208 | rc = vn_open(realpath, seg, flags, mode, vpp, x1, x2); |
4b171585 | 209 | kfree(realpath); |
210 | ||
b17edc10 | 211 | SRETURN(rc); |
4b171585 | 212 | } /* vn_openat() */ |
213 | EXPORT_SYMBOL(vn_openat); | |
0b3cf046 | 214 | |
0b3cf046 | 215 | int |
4b171585 | 216 | vn_rdwr(uio_rw_t uio, vnode_t *vp, void *addr, ssize_t len, offset_t off, |
663e02a1 | 217 | uio_seg_t seg, int ioflag, rlim64_t x2, void *x3, ssize_t *residp) |
0b3cf046 | 218 | { |
4b171585 | 219 | loff_t offset; |
220 | mm_segment_t saved_fs; | |
221 | struct file *fp; | |
222 | int rc; | |
b17edc10 | 223 | SENTRY; |
4b171585 | 224 | |
937879f1 | 225 | ASSERT(uio == UIO_WRITE || uio == UIO_READ); |
226 | ASSERT(vp); | |
227 | ASSERT(vp->v_file); | |
228 | ASSERT(seg == UIO_SYSSPACE); | |
663e02a1 | 229 | ASSERT((ioflag & ~FAPPEND) == 0); |
937879f1 | 230 | ASSERT(x2 == RLIM64_INFINITY); |
4b171585 | 231 | |
e4f1d29f | 232 | fp = vp->v_file; |
4b171585 | 233 | |
663e02a1 RC |
234 | offset = off; |
235 | if (ioflag & FAPPEND) | |
236 | offset = fp->f_pos; | |
237 | ||
4b171585 | 238 | /* Writable user data segment must be briefly increased for this |
239 | * process so we can use the user space read call paths to write | |
240 | * in to memory allocated by the kernel. */ | |
241 | saved_fs = get_fs(); | |
242 | set_fs(get_ds()); | |
243 | ||
244 | if (uio & UIO_WRITE) | |
245 | rc = vfs_write(fp, addr, len, &offset); | |
246 | else | |
247 | rc = vfs_read(fp, addr, len, &offset); | |
248 | ||
249 | set_fs(saved_fs); | |
250 | ||
251 | if (rc < 0) | |
b17edc10 | 252 | SRETURN(-rc); |
0b3cf046 | 253 | |
4b171585 | 254 | if (residp) { |
255 | *residp = len - rc; | |
0b3cf046 | 256 | } else { |
4b171585 | 257 | if (rc != len) |
b17edc10 | 258 | SRETURN(EIO); |
0b3cf046 | 259 | } |
260 | ||
b17edc10 | 261 | SRETURN(0); |
4b171585 | 262 | } /* vn_rdwr() */ |
263 | EXPORT_SYMBOL(vn_rdwr); | |
264 | ||
265 | int | |
2f5d55aa | 266 | vn_close(vnode_t *vp, int flags, int x1, int x2, void *x3, void *x4) |
4b171585 | 267 | { |
268 | int rc; | |
b17edc10 | 269 | SENTRY; |
4b171585 | 270 | |
937879f1 | 271 | ASSERT(vp); |
272 | ASSERT(vp->v_file); | |
4b171585 | 273 | |
4be55565 | 274 | mapping_set_gfp_mask(vp->v_file->f_mapping, vp->v_gfp_mask); |
97735c39 BB |
275 | rc = filp_close(vp->v_file, 0); |
276 | vn_free(vp); | |
4b171585 | 277 | |
b17edc10 | 278 | SRETURN(-rc); |
4b171585 | 279 | } /* vn_close() */ |
280 | EXPORT_SYMBOL(vn_close); | |
281 | ||
97735c39 BB |
282 | /* vn_seek() does not actually seek it only performs bounds checking on the |
283 | * proposed seek. We perform minimal checking and allow vn_rdwr() to catch | |
284 | * anything more serious. */ | |
285 | int | |
286 | vn_seek(vnode_t *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct) | |
287 | { | |
288 | return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0); | |
289 | } | |
290 | EXPORT_SYMBOL(vn_seek); | |
291 | ||
292 | static struct dentry * | |
293 | vn_lookup_hash(struct nameidata *nd) | |
4b171585 | 294 | { |
849c50e7 BB |
295 | return lookup_one_len((const char *)nd->last.name, |
296 | nd->nd_dentry, nd->last.len); | |
4b171585 | 297 | } /* lookup_hash() */ |
298 | ||
97735c39 BB |
299 | static void |
300 | vn_path_release(struct nameidata *nd) | |
57d86234 | 301 | { |
302 | dput(nd->nd_dentry); | |
303 | mntput(nd->nd_mnt); | |
304 | } | |
305 | ||
4b171585 | 306 | /* Modified do_unlinkat() from linux/fs/namei.c, only uses exported symbols */ |
307 | int | |
af828292 | 308 | vn_remove(const char *path, uio_seg_t seg, int flags) |
4b171585 | 309 | { |
310 | struct dentry *dentry; | |
311 | struct nameidata nd; | |
312 | struct inode *inode = NULL; | |
313 | int rc = 0; | |
b17edc10 | 314 | SENTRY; |
4b171585 | 315 | |
3d061e9d | 316 | ASSERT(seg == UIO_SYSSPACE); |
317 | ASSERT(flags == RMFILE); | |
2f5d55aa | 318 | |
4b171585 | 319 | rc = path_lookup(path, LOOKUP_PARENT, &nd); |
320 | if (rc) | |
b17edc10 | 321 | SGOTO(exit, rc); |
4b171585 | 322 | |
323 | rc = -EISDIR; | |
324 | if (nd.last_type != LAST_NORM) | |
b17edc10 | 325 | SGOTO(exit1, rc); |
4b171585 | 326 | |
6bf4d76f | 327 | spl_inode_lock_nested(nd.nd_dentry->d_inode, I_MUTEX_PARENT); |
57d86234 | 328 | dentry = vn_lookup_hash(&nd); |
4b171585 | 329 | rc = PTR_ERR(dentry); |
330 | if (!IS_ERR(dentry)) { | |
331 | /* Why not before? Because we want correct rc value */ | |
332 | if (nd.last.name[nd.last.len]) | |
b17edc10 | 333 | SGOTO(slashes, rc); |
937879f1 | 334 | |
4b171585 | 335 | inode = dentry->d_inode; |
336 | if (inode) | |
337 | atomic_inc(&inode->i_count); | |
a093c6a4 | 338 | #ifdef HAVE_2ARGS_VFS_UNLINK |
57d86234 | 339 | rc = vfs_unlink(nd.nd_dentry->d_inode, dentry); |
a093c6a4 | 340 | #else |
21411161 | 341 | rc = vfs_unlink(nd.nd_dentry->d_inode, dentry, nd.nd_mnt); |
a093c6a4 | 342 | #endif /* HAVE_2ARGS_VFS_UNLINK */ |
4b171585 | 343 | exit2: |
344 | dput(dentry); | |
345 | } | |
6bf4d76f BB |
346 | |
347 | spl_inode_unlock(nd.nd_dentry->d_inode); | |
4b171585 | 348 | if (inode) |
349 | iput(inode); /* truncate the inode here */ | |
350 | exit1: | |
57d86234 | 351 | vn_path_release(&nd); |
4b171585 | 352 | exit: |
b17edc10 | 353 | SRETURN(-rc); |
4b171585 | 354 | |
355 | slashes: | |
356 | rc = !dentry->d_inode ? -ENOENT : | |
357 | S_ISDIR(dentry->d_inode->i_mode) ? -EISDIR : -ENOTDIR; | |
b17edc10 | 358 | SGOTO(exit2, rc); |
4b171585 | 359 | } /* vn_remove() */ |
360 | EXPORT_SYMBOL(vn_remove); | |
361 | ||
362 | /* Modified do_rename() from linux/fs/namei.c, only uses exported symbols */ | |
363 | int | |
364 | vn_rename(const char *oldname, const char *newname, int x1) | |
365 | { | |
a093c6a4 BB |
366 | struct dentry *old_dir, *new_dir; |
367 | struct dentry *old_dentry, *new_dentry; | |
368 | struct dentry *trap; | |
4b171585 | 369 | struct nameidata oldnd, newnd; |
370 | int rc = 0; | |
b17edc10 | 371 | SENTRY; |
4b171585 | 372 | |
373 | rc = path_lookup(oldname, LOOKUP_PARENT, &oldnd); | |
374 | if (rc) | |
b17edc10 | 375 | SGOTO(exit, rc); |
4b171585 | 376 | |
377 | rc = path_lookup(newname, LOOKUP_PARENT, &newnd); | |
378 | if (rc) | |
b17edc10 | 379 | SGOTO(exit1, rc); |
4b171585 | 380 | |
381 | rc = -EXDEV; | |
57d86234 | 382 | if (oldnd.nd_mnt != newnd.nd_mnt) |
b17edc10 | 383 | SGOTO(exit2, rc); |
4b171585 | 384 | |
57d86234 | 385 | old_dir = oldnd.nd_dentry; |
4b171585 | 386 | rc = -EBUSY; |
387 | if (oldnd.last_type != LAST_NORM) | |
b17edc10 | 388 | SGOTO(exit2, rc); |
4b171585 | 389 | |
57d86234 | 390 | new_dir = newnd.nd_dentry; |
4b171585 | 391 | if (newnd.last_type != LAST_NORM) |
b17edc10 | 392 | SGOTO(exit2, rc); |
4b171585 | 393 | |
394 | trap = lock_rename(new_dir, old_dir); | |
395 | ||
57d86234 | 396 | old_dentry = vn_lookup_hash(&oldnd); |
4b171585 | 397 | |
398 | rc = PTR_ERR(old_dentry); | |
399 | if (IS_ERR(old_dentry)) | |
b17edc10 | 400 | SGOTO(exit3, rc); |
4b171585 | 401 | |
402 | /* source must exist */ | |
403 | rc = -ENOENT; | |
404 | if (!old_dentry->d_inode) | |
b17edc10 | 405 | SGOTO(exit4, rc); |
4b171585 | 406 | |
407 | /* unless the source is a directory trailing slashes give -ENOTDIR */ | |
408 | if (!S_ISDIR(old_dentry->d_inode->i_mode)) { | |
409 | rc = -ENOTDIR; | |
410 | if (oldnd.last.name[oldnd.last.len]) | |
b17edc10 | 411 | SGOTO(exit4, rc); |
4b171585 | 412 | if (newnd.last.name[newnd.last.len]) |
b17edc10 | 413 | SGOTO(exit4, rc); |
4b171585 | 414 | } |
415 | ||
416 | /* source should not be ancestor of target */ | |
417 | rc = -EINVAL; | |
418 | if (old_dentry == trap) | |
b17edc10 | 419 | SGOTO(exit4, rc); |
4b171585 | 420 | |
57d86234 | 421 | new_dentry = vn_lookup_hash(&newnd); |
4b171585 | 422 | rc = PTR_ERR(new_dentry); |
423 | if (IS_ERR(new_dentry)) | |
b17edc10 | 424 | SGOTO(exit4, rc); |
4b171585 | 425 | |
426 | /* target should not be an ancestor of source */ | |
427 | rc = -ENOTEMPTY; | |
428 | if (new_dentry == trap) | |
b17edc10 | 429 | SGOTO(exit5, rc); |
4b171585 | 430 | |
a093c6a4 | 431 | #ifdef HAVE_4ARGS_VFS_RENAME |
4b171585 | 432 | rc = vfs_rename(old_dir->d_inode, old_dentry, |
433 | new_dir->d_inode, new_dentry); | |
a093c6a4 | 434 | #else |
21411161 BB |
435 | rc = vfs_rename(old_dir->d_inode, old_dentry, oldnd.nd_mnt, |
436 | new_dir->d_inode, new_dentry, newnd.nd_mnt); | |
a093c6a4 | 437 | #endif /* HAVE_4ARGS_VFS_RENAME */ |
4b171585 | 438 | exit5: |
439 | dput(new_dentry); | |
440 | exit4: | |
441 | dput(old_dentry); | |
442 | exit3: | |
443 | unlock_rename(new_dir, old_dir); | |
444 | exit2: | |
57d86234 | 445 | vn_path_release(&newnd); |
4b171585 | 446 | exit1: |
57d86234 | 447 | vn_path_release(&oldnd); |
4b171585 | 448 | exit: |
b17edc10 | 449 | SRETURN(-rc); |
0b3cf046 | 450 | } |
4b171585 | 451 | EXPORT_SYMBOL(vn_rename); |
0b3cf046 | 452 | |
4b171585 | 453 | int |
36e6f861 | 454 | vn_getattr(vnode_t *vp, vattr_t *vap, int flags, void *x3, void *x4) |
0b3cf046 | 455 | { |
4b171585 | 456 | struct file *fp; |
457 | struct kstat stat; | |
458 | int rc; | |
b17edc10 | 459 | SENTRY; |
4b171585 | 460 | |
937879f1 | 461 | ASSERT(vp); |
462 | ASSERT(vp->v_file); | |
463 | ASSERT(vap); | |
4b171585 | 464 | |
e4f1d29f | 465 | fp = vp->v_file; |
4b171585 | 466 | |
467 | rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat); | |
468 | if (rc) | |
b17edc10 | 469 | SRETURN(-rc); |
4b171585 | 470 | |
4295b530 | 471 | vap->va_type = vn_mode_to_vtype(stat.mode); |
4b171585 | 472 | vap->va_mode = stat.mode; |
473 | vap->va_uid = stat.uid; | |
474 | vap->va_gid = stat.gid; | |
475 | vap->va_fsid = 0; | |
476 | vap->va_nodeid = stat.ino; | |
477 | vap->va_nlink = stat.nlink; | |
478 | vap->va_size = stat.size; | |
479 | vap->va_blocksize = stat.blksize; | |
480 | vap->va_atime.tv_sec = stat.atime.tv_sec; | |
481 | vap->va_atime.tv_usec = stat.atime.tv_nsec / NSEC_PER_USEC; | |
482 | vap->va_mtime.tv_sec = stat.mtime.tv_sec; | |
483 | vap->va_mtime.tv_usec = stat.mtime.tv_nsec / NSEC_PER_USEC; | |
484 | vap->va_ctime.tv_sec = stat.ctime.tv_sec; | |
485 | vap->va_ctime.tv_usec = stat.ctime.tv_nsec / NSEC_PER_USEC; | |
486 | vap->va_rdev = stat.rdev; | |
487 | vap->va_blocks = stat.blocks; | |
488 | ||
b17edc10 | 489 | SRETURN(0); |
0b3cf046 | 490 | } |
4b171585 | 491 | EXPORT_SYMBOL(vn_getattr); |
492 | ||
2f5d55aa | 493 | int vn_fsync(vnode_t *vp, int flags, void *x3, void *x4) |
4b171585 | 494 | { |
36e6f861 | 495 | int datasync = 0; |
b17edc10 | 496 | SENTRY; |
36e6f861 | 497 | |
937879f1 | 498 | ASSERT(vp); |
499 | ASSERT(vp->v_file); | |
4b171585 | 500 | |
36e6f861 | 501 | if (flags & FDSYNC) |
502 | datasync = 1; | |
503 | ||
b17edc10 | 504 | SRETURN(-spl_filp_fsync(vp->v_file, datasync)); |
4b171585 | 505 | } /* vn_fsync() */ |
506 | EXPORT_SYMBOL(vn_fsync); | |
af828292 | 507 | |
e4f1d29f | 508 | /* Function must be called while holding the vn_file_lock */ |
509 | static file_t * | |
510 | file_find(int fd) | |
511 | { | |
512 | file_t *fp; | |
513 | ||
937879f1 | 514 | ASSERT(spin_is_locked(&vn_file_lock)); |
e4f1d29f | 515 | |
516 | list_for_each_entry(fp, &vn_file_list, f_list) { | |
517 | if (fd == fp->f_fd) { | |
937879f1 | 518 | ASSERT(atomic_read(&fp->f_ref) != 0); |
e4f1d29f | 519 | return fp; |
520 | } | |
521 | } | |
522 | ||
523 | return NULL; | |
524 | } /* file_find() */ | |
525 | ||
526 | file_t * | |
527 | vn_getf(int fd) | |
528 | { | |
529 | struct kstat stat; | |
530 | struct file *lfp; | |
531 | file_t *fp; | |
532 | vnode_t *vp; | |
937879f1 | 533 | int rc = 0; |
b17edc10 | 534 | SENTRY; |
e4f1d29f | 535 | |
536 | /* Already open just take an extra reference */ | |
537 | spin_lock(&vn_file_lock); | |
538 | ||
539 | fp = file_find(fd); | |
540 | if (fp) { | |
541 | atomic_inc(&fp->f_ref); | |
542 | spin_unlock(&vn_file_lock); | |
b17edc10 | 543 | SRETURN(fp); |
e4f1d29f | 544 | } |
545 | ||
546 | spin_unlock(&vn_file_lock); | |
547 | ||
548 | /* File was not yet opened create the object and setup */ | |
4afaaefa | 549 | fp = kmem_cache_alloc(vn_file_cache, KM_SLEEP); |
e4f1d29f | 550 | if (fp == NULL) |
b17edc10 | 551 | SGOTO(out, rc); |
e4f1d29f | 552 | |
553 | mutex_enter(&fp->f_lock); | |
554 | ||
555 | fp->f_fd = fd; | |
556 | fp->f_offset = 0; | |
557 | atomic_inc(&fp->f_ref); | |
558 | ||
559 | lfp = fget(fd); | |
560 | if (lfp == NULL) | |
b17edc10 | 561 | SGOTO(out_mutex, rc); |
e4f1d29f | 562 | |
563 | vp = vn_alloc(KM_SLEEP); | |
564 | if (vp == NULL) | |
b17edc10 | 565 | SGOTO(out_fget, rc); |
e4f1d29f | 566 | |
567 | if (vfs_getattr(lfp->f_vfsmnt, lfp->f_dentry, &stat)) | |
b17edc10 | 568 | SGOTO(out_vnode, rc); |
e4f1d29f | 569 | |
570 | mutex_enter(&vp->v_lock); | |
4295b530 | 571 | vp->v_type = vn_mode_to_vtype(stat.mode); |
e4f1d29f | 572 | vp->v_file = lfp; |
573 | mutex_exit(&vp->v_lock); | |
574 | ||
575 | fp->f_vnode = vp; | |
576 | fp->f_file = lfp; | |
577 | ||
578 | /* Put it on the tracking list */ | |
579 | spin_lock(&vn_file_lock); | |
580 | list_add(&fp->f_list, &vn_file_list); | |
581 | spin_unlock(&vn_file_lock); | |
582 | ||
583 | mutex_exit(&fp->f_lock); | |
b17edc10 | 584 | SRETURN(fp); |
e4f1d29f | 585 | |
586 | out_vnode: | |
e4f1d29f | 587 | vn_free(vp); |
588 | out_fget: | |
e4f1d29f | 589 | fput(lfp); |
590 | out_mutex: | |
e4f1d29f | 591 | mutex_exit(&fp->f_lock); |
592 | kmem_cache_free(vn_file_cache, fp); | |
593 | out: | |
b17edc10 | 594 | SRETURN(NULL); |
e4f1d29f | 595 | } /* getf() */ |
596 | EXPORT_SYMBOL(getf); | |
597 | ||
598 | static void releasef_locked(file_t *fp) | |
599 | { | |
937879f1 | 600 | ASSERT(fp->f_file); |
601 | ASSERT(fp->f_vnode); | |
e4f1d29f | 602 | |
603 | /* Unlinked from list, no refs, safe to free outside mutex */ | |
604 | fput(fp->f_file); | |
605 | vn_free(fp->f_vnode); | |
606 | ||
607 | kmem_cache_free(vn_file_cache, fp); | |
608 | } | |
609 | ||
610 | void | |
611 | vn_releasef(int fd) | |
612 | { | |
613 | file_t *fp; | |
b17edc10 | 614 | SENTRY; |
e4f1d29f | 615 | |
616 | spin_lock(&vn_file_lock); | |
617 | fp = file_find(fd); | |
618 | if (fp) { | |
619 | atomic_dec(&fp->f_ref); | |
620 | if (atomic_read(&fp->f_ref) > 0) { | |
621 | spin_unlock(&vn_file_lock); | |
b17edc10 | 622 | SEXIT; |
e4f1d29f | 623 | return; |
624 | } | |
625 | ||
626 | list_del(&fp->f_list); | |
627 | releasef_locked(fp); | |
628 | } | |
629 | spin_unlock(&vn_file_lock); | |
630 | ||
b17edc10 | 631 | SEXIT; |
e4f1d29f | 632 | return; |
633 | } /* releasef() */ | |
634 | EXPORT_SYMBOL(releasef); | |
635 | ||
51a727e9 BB |
636 | #ifndef HAVE_SET_FS_PWD |
637 | # ifdef HAVE_2ARGS_SET_FS_PWD | |
638 | /* Used from 2.6.25 - 2.6.31+ */ | |
639 | void | |
640 | set_fs_pwd(struct fs_struct *fs, struct path *path) | |
641 | { | |
9b2048c2 BB |
642 | struct path old_pwd; |
643 | ||
644 | # ifdef HAVE_FS_STRUCT_SPINLOCK | |
645 | spin_lock(&fs->lock); | |
646 | old_pwd = fs->pwd; | |
647 | fs->pwd = *path; | |
648 | path_get(path); | |
649 | spin_unlock(&fs->lock); | |
650 | # else | |
651 | write_lock(&fs->lock); | |
652 | old_pwd = fs->pwd; | |
653 | fs->pwd = *path; | |
654 | path_get(path); | |
655 | write_unlock(&fs->lock); | |
656 | # endif /* HAVE_FS_STRUCT_SPINLOCK */ | |
657 | ||
658 | if (old_pwd.dentry) | |
659 | path_put(&old_pwd); | |
51a727e9 BB |
660 | } |
661 | # else | |
662 | /* Used from 2.6.11 - 2.6.24 */ | |
663 | void | |
664 | set_fs_pwd(struct fs_struct *fs, struct vfsmount *mnt, struct dentry *dentry) | |
665 | { | |
666 | struct dentry *old_pwd; | |
667 | struct vfsmount *old_pwdmnt; | |
668 | ||
669 | write_lock(&fs->lock); | |
670 | old_pwd = fs->pwd; | |
671 | old_pwdmnt = fs->pwdmnt; | |
672 | fs->pwdmnt = mntget(mnt); | |
673 | fs->pwd = dget(dentry); | |
674 | write_unlock(&fs->lock); | |
675 | ||
676 | if (old_pwd) { | |
677 | dput(old_pwd); | |
678 | mntput(old_pwdmnt); | |
679 | } | |
680 | } | |
681 | # endif /* HAVE_2ARGS_SET_FS_PWD */ | |
682 | #endif /* HAVE_SET_FS_PWD */ | |
683 | ||
684 | int | |
685 | vn_set_pwd(const char *filename) | |
686 | { | |
7119bf70 | 687 | #if defined(HAVE_2ARGS_SET_FS_PWD) && defined(HAVE_USER_PATH_DIR) |
51a727e9 | 688 | struct path path; |
82a358d9 BB |
689 | #else |
690 | struct nameidata nd; | |
691 | #endif /* HAVE_2ARGS_SET_FS_PWD */ | |
692 | mm_segment_t saved_fs; | |
51a727e9 | 693 | int rc; |
b17edc10 | 694 | SENTRY; |
51a727e9 | 695 | |
82a358d9 BB |
696 | /* |
697 | * user_path_dir() and __user_walk() both expect 'filename' to be | |
698 | * a user space address so we must briefly increase the data segment | |
699 | * size to ensure strncpy_from_user() does not fail with -EFAULT. | |
700 | */ | |
701 | saved_fs = get_fs(); | |
702 | set_fs(get_ds()); | |
703 | ||
704 | #ifdef HAVE_2ARGS_SET_FS_PWD | |
7119bf70 | 705 | # ifdef HAVE_USER_PATH_DIR |
51a727e9 BB |
706 | rc = user_path_dir(filename, &path); |
707 | if (rc) | |
b17edc10 | 708 | SGOTO(out, rc); |
51a727e9 BB |
709 | |
710 | rc = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_ACCESS); | |
711 | if (rc) | |
b17edc10 | 712 | SGOTO(dput_and_out, rc); |
51a727e9 BB |
713 | |
714 | set_fs_pwd(current->fs, &path); | |
715 | ||
716 | dput_and_out: | |
717 | path_put(&path); | |
7119bf70 BB |
718 | # else |
719 | rc = __user_walk(filename, | |
720 | LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd); | |
721 | if (rc) | |
b17edc10 | 722 | SGOTO(out, rc); |
7119bf70 BB |
723 | |
724 | rc = vfs_permission(&nd, MAY_EXEC); | |
725 | if (rc) | |
b17edc10 | 726 | SGOTO(dput_and_out, rc); |
7119bf70 BB |
727 | |
728 | set_fs_pwd(current->fs, &nd.path); | |
729 | ||
730 | dput_and_out: | |
731 | path_put(&nd.path); | |
732 | # endif /* HAVE_USER_PATH_DIR */ | |
51a727e9 | 733 | #else |
51a727e9 BB |
734 | rc = __user_walk(filename, |
735 | LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd); | |
736 | if (rc) | |
b17edc10 | 737 | SGOTO(out, rc); |
51a727e9 BB |
738 | |
739 | rc = vfs_permission(&nd, MAY_EXEC); | |
740 | if (rc) | |
b17edc10 | 741 | SGOTO(dput_and_out, rc); |
51a727e9 BB |
742 | |
743 | set_fs_pwd(current->fs, nd.nd_mnt, nd.nd_dentry); | |
744 | ||
745 | dput_and_out: | |
746 | vn_path_release(&nd); | |
747 | #endif /* HAVE_2ARGS_SET_FS_PWD */ | |
748 | out: | |
82a358d9 BB |
749 | set_fs(saved_fs); |
750 | ||
b17edc10 | 751 | SRETURN(-rc); |
51a727e9 BB |
752 | } /* vn_set_pwd() */ |
753 | EXPORT_SYMBOL(vn_set_pwd); | |
754 | ||
af828292 | 755 | static int |
756 | vn_cache_constructor(void *buf, void *cdrarg, int kmflags) | |
757 | { | |
758 | struct vnode *vp = buf; | |
759 | ||
760 | mutex_init(&vp->v_lock, NULL, MUTEX_DEFAULT, NULL); | |
761 | ||
762 | return (0); | |
763 | } /* vn_cache_constructor() */ | |
764 | ||
765 | static void | |
766 | vn_cache_destructor(void *buf, void *cdrarg) | |
767 | { | |
768 | struct vnode *vp = buf; | |
769 | ||
770 | mutex_destroy(&vp->v_lock); | |
771 | } /* vn_cache_destructor() */ | |
772 | ||
e4f1d29f | 773 | static int |
774 | vn_file_cache_constructor(void *buf, void *cdrarg, int kmflags) | |
775 | { | |
776 | file_t *fp = buf; | |
777 | ||
778 | atomic_set(&fp->f_ref, 0); | |
779 | mutex_init(&fp->f_lock, NULL, MUTEX_DEFAULT, NULL); | |
4e62fd41 | 780 | INIT_LIST_HEAD(&fp->f_list); |
e4f1d29f | 781 | |
782 | return (0); | |
783 | } /* file_cache_constructor() */ | |
784 | ||
785 | static void | |
786 | vn_file_cache_destructor(void *buf, void *cdrarg) | |
787 | { | |
788 | file_t *fp = buf; | |
789 | ||
790 | mutex_destroy(&fp->f_lock); | |
791 | } /* vn_file_cache_destructor() */ | |
792 | ||
af828292 | 793 | int |
794 | vn_init(void) | |
795 | { | |
b17edc10 | 796 | SENTRY; |
57d86234 | 797 | vn_cache = kmem_cache_create("spl_vn_cache", |
798 | sizeof(struct vnode), 64, | |
5d86345d | 799 | vn_cache_constructor, |
800 | vn_cache_destructor, | |
af828292 | 801 | NULL, NULL, NULL, 0); |
e4f1d29f | 802 | |
803 | vn_file_cache = kmem_cache_create("spl_vn_file_cache", | |
804 | sizeof(file_t), 64, | |
805 | vn_file_cache_constructor, | |
806 | vn_file_cache_destructor, | |
807 | NULL, NULL, NULL, 0); | |
b17edc10 | 808 | SRETURN(0); |
af828292 | 809 | } /* vn_init() */ |
810 | ||
811 | void | |
812 | vn_fini(void) | |
813 | { | |
e4f1d29f | 814 | file_t *fp, *next_fp; |
2fb9b26a | 815 | int leaked = 0; |
b17edc10 | 816 | SENTRY; |
e4f1d29f | 817 | |
818 | spin_lock(&vn_file_lock); | |
819 | ||
820 | list_for_each_entry_safe(fp, next_fp, &vn_file_list, f_list) { | |
821 | list_del(&fp->f_list); | |
822 | releasef_locked(fp); | |
823 | leaked++; | |
824 | } | |
825 | ||
2fb9b26a | 826 | kmem_cache_destroy(vn_file_cache); |
e4f1d29f | 827 | vn_file_cache = NULL; |
828 | spin_unlock(&vn_file_lock); | |
829 | ||
830 | if (leaked > 0) | |
b17edc10 | 831 | SWARN("Warning %d files leaked\n", leaked); |
e4f1d29f | 832 | |
2fb9b26a | 833 | kmem_cache_destroy(vn_cache); |
e4f1d29f | 834 | |
b17edc10 | 835 | SEXIT; |
e4f1d29f | 836 | return; |
af828292 | 837 | } /* vn_fini() */ |