]> git.proxmox.com Git - mirror_spl-debian.git/blob - module/spl/spl-vnode.c
Linux Compat: inode->i_mutex/i_sem
[mirror_spl-debian.git] / module / spl / spl-vnode.c
1 /*****************************************************************************\
2 * Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC.
3 * Copyright (C) 2007 The Regents of the University of California.
4 * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
5 * Written by Brian Behlendorf <behlendorf1@llnl.gov>.
6 * UCRL-CODE-235197
7 *
8 * This file is part of the SPL, Solaris Porting Layer.
9 * For details, see <http://github.com/behlendorf/spl/>.
10 *
11 * The SPL is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU General Public License as published by the
13 * Free Software Foundation; either version 2 of the License, or (at your
14 * option) any later version.
15 *
16 * The SPL is distributed in the hope that it will be useful, but WITHOUT
17 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
18 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
19 * for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with the SPL. If not, see <http://www.gnu.org/licenses/>.
23 *****************************************************************************
24 * Solaris Porting Layer (SPL) Vnode Implementation.
25 \*****************************************************************************/
26
27 #include <sys/vnode.h>
28 #include <spl-debug.h>
29
30 #ifdef SS_DEBUG_SUBSYS
31 #undef SS_DEBUG_SUBSYS
32 #endif
33
34 #define SS_DEBUG_SUBSYS SS_VNODE
35
36 vnode_t *rootdir = (vnode_t *)0xabcd1234;
37 EXPORT_SYMBOL(rootdir);
38
39 static spl_kmem_cache_t *vn_cache;
40 static spl_kmem_cache_t *vn_file_cache;
41
42 static spinlock_t vn_file_lock = SPIN_LOCK_UNLOCKED;
43 static LIST_HEAD(vn_file_list);
44
45 static vtype_t
46 vn_get_sol_type(umode_t mode)
47 {
48 if (S_ISREG(mode))
49 return VREG;
50
51 if (S_ISDIR(mode))
52 return VDIR;
53
54 if (S_ISCHR(mode))
55 return VCHR;
56
57 if (S_ISBLK(mode))
58 return VBLK;
59
60 if (S_ISFIFO(mode))
61 return VFIFO;
62
63 if (S_ISLNK(mode))
64 return VLNK;
65
66 if (S_ISSOCK(mode))
67 return VSOCK;
68
69 if (S_ISCHR(mode))
70 return VCHR;
71
72 return VNON;
73 } /* vn_get_sol_type() */
74
75 vnode_t *
76 vn_alloc(int flag)
77 {
78 vnode_t *vp;
79 SENTRY;
80
81 vp = kmem_cache_alloc(vn_cache, flag);
82 if (vp != NULL) {
83 vp->v_file = NULL;
84 vp->v_type = 0;
85 }
86
87 SRETURN(vp);
88 } /* vn_alloc() */
89 EXPORT_SYMBOL(vn_alloc);
90
91 void
92 vn_free(vnode_t *vp)
93 {
94 SENTRY;
95 kmem_cache_free(vn_cache, vp);
96 SEXIT;
97 } /* vn_free() */
98 EXPORT_SYMBOL(vn_free);
99
100 int
101 vn_open(const char *path, uio_seg_t seg, int flags, int mode,
102 vnode_t **vpp, int x1, void *x2)
103 {
104 struct file *fp;
105 struct kstat stat;
106 int rc, saved_umask = 0;
107 gfp_t saved_gfp;
108 vnode_t *vp;
109 SENTRY;
110
111 ASSERT(flags & (FWRITE | FREAD));
112 ASSERT(seg == UIO_SYSSPACE);
113 ASSERT(vpp);
114 *vpp = NULL;
115
116 if (!(flags & FCREAT) && (flags & FWRITE))
117 flags |= FEXCL;
118
119 /* Note for filp_open() the two low bits must be remapped to mean:
120 * 01 - read-only -> 00 read-only
121 * 10 - write-only -> 01 write-only
122 * 11 - read-write -> 10 read-write
123 */
124 flags--;
125
126 if (flags & FCREAT)
127 saved_umask = xchg(&current->fs->umask, 0);
128
129 fp = filp_open(path, flags, mode);
130
131 if (flags & FCREAT)
132 (void)xchg(&current->fs->umask, saved_umask);
133
134 if (IS_ERR(fp))
135 SRETURN(-PTR_ERR(fp));
136
137 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
138 if (rc) {
139 filp_close(fp, 0);
140 SRETURN(-rc);
141 }
142
143 vp = vn_alloc(KM_SLEEP);
144 if (!vp) {
145 filp_close(fp, 0);
146 SRETURN(ENOMEM);
147 }
148
149 saved_gfp = mapping_gfp_mask(fp->f_mapping);
150 mapping_set_gfp_mask(fp->f_mapping, saved_gfp & ~(__GFP_IO|__GFP_FS));
151
152 mutex_enter(&vp->v_lock);
153 vp->v_type = vn_get_sol_type(stat.mode);
154 vp->v_file = fp;
155 vp->v_gfp_mask = saved_gfp;
156 *vpp = vp;
157 mutex_exit(&vp->v_lock);
158
159 SRETURN(0);
160 } /* vn_open() */
161 EXPORT_SYMBOL(vn_open);
162
163 int
164 vn_openat(const char *path, uio_seg_t seg, int flags, int mode,
165 vnode_t **vpp, int x1, void *x2, vnode_t *vp, int fd)
166 {
167 char *realpath;
168 int len, rc;
169 SENTRY;
170
171 ASSERT(vp == rootdir);
172
173 len = strlen(path) + 2;
174 realpath = kmalloc(len, GFP_KERNEL);
175 if (!realpath)
176 SRETURN(ENOMEM);
177
178 (void)snprintf(realpath, len, "/%s", path);
179 rc = vn_open(realpath, seg, flags, mode, vpp, x1, x2);
180 kfree(realpath);
181
182 SRETURN(rc);
183 } /* vn_openat() */
184 EXPORT_SYMBOL(vn_openat);
185
186 int
187 vn_rdwr(uio_rw_t uio, vnode_t *vp, void *addr, ssize_t len, offset_t off,
188 uio_seg_t seg, int ioflag, rlim64_t x2, void *x3, ssize_t *residp)
189 {
190 loff_t offset;
191 mm_segment_t saved_fs;
192 struct file *fp;
193 int rc;
194 SENTRY;
195
196 ASSERT(uio == UIO_WRITE || uio == UIO_READ);
197 ASSERT(vp);
198 ASSERT(vp->v_file);
199 ASSERT(seg == UIO_SYSSPACE);
200 ASSERT((ioflag & ~FAPPEND) == 0);
201 ASSERT(x2 == RLIM64_INFINITY);
202
203 fp = vp->v_file;
204
205 offset = off;
206 if (ioflag & FAPPEND)
207 offset = fp->f_pos;
208
209 /* Writable user data segment must be briefly increased for this
210 * process so we can use the user space read call paths to write
211 * in to memory allocated by the kernel. */
212 saved_fs = get_fs();
213 set_fs(get_ds());
214
215 if (uio & UIO_WRITE)
216 rc = vfs_write(fp, addr, len, &offset);
217 else
218 rc = vfs_read(fp, addr, len, &offset);
219
220 set_fs(saved_fs);
221
222 if (rc < 0)
223 SRETURN(-rc);
224
225 if (residp) {
226 *residp = len - rc;
227 } else {
228 if (rc != len)
229 SRETURN(EIO);
230 }
231
232 SRETURN(0);
233 } /* vn_rdwr() */
234 EXPORT_SYMBOL(vn_rdwr);
235
236 int
237 vn_close(vnode_t *vp, int flags, int x1, int x2, void *x3, void *x4)
238 {
239 int rc;
240 SENTRY;
241
242 ASSERT(vp);
243 ASSERT(vp->v_file);
244
245 mapping_set_gfp_mask(vp->v_file->f_mapping, vp->v_gfp_mask);
246 rc = filp_close(vp->v_file, 0);
247 vn_free(vp);
248
249 SRETURN(-rc);
250 } /* vn_close() */
251 EXPORT_SYMBOL(vn_close);
252
253 /* vn_seek() does not actually seek it only performs bounds checking on the
254 * proposed seek. We perform minimal checking and allow vn_rdwr() to catch
255 * anything more serious. */
256 int
257 vn_seek(vnode_t *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct)
258 {
259 return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
260 }
261 EXPORT_SYMBOL(vn_seek);
262
263 static struct dentry *
264 vn_lookup_hash(struct nameidata *nd)
265 {
266 return lookup_one_len((const char *)nd->last.name,
267 nd->nd_dentry, nd->last.len);
268 } /* lookup_hash() */
269
270 static void
271 vn_path_release(struct nameidata *nd)
272 {
273 dput(nd->nd_dentry);
274 mntput(nd->nd_mnt);
275 }
276
277 /* Modified do_unlinkat() from linux/fs/namei.c, only uses exported symbols */
278 int
279 vn_remove(const char *path, uio_seg_t seg, int flags)
280 {
281 struct dentry *dentry;
282 struct nameidata nd;
283 struct inode *inode = NULL;
284 int rc = 0;
285 SENTRY;
286
287 ASSERT(seg == UIO_SYSSPACE);
288 ASSERT(flags == RMFILE);
289
290 rc = path_lookup(path, LOOKUP_PARENT, &nd);
291 if (rc)
292 SGOTO(exit, rc);
293
294 rc = -EISDIR;
295 if (nd.last_type != LAST_NORM)
296 SGOTO(exit1, rc);
297
298 spl_inode_lock_nested(nd.nd_dentry->d_inode, I_MUTEX_PARENT);
299 dentry = vn_lookup_hash(&nd);
300 rc = PTR_ERR(dentry);
301 if (!IS_ERR(dentry)) {
302 /* Why not before? Because we want correct rc value */
303 if (nd.last.name[nd.last.len])
304 SGOTO(slashes, rc);
305
306 inode = dentry->d_inode;
307 if (inode)
308 atomic_inc(&inode->i_count);
309 #ifdef HAVE_2ARGS_VFS_UNLINK
310 rc = vfs_unlink(nd.nd_dentry->d_inode, dentry);
311 #else
312 rc = vfs_unlink(nd.nd_dentry->d_inode, dentry, nd.nd_mnt);
313 #endif /* HAVE_2ARGS_VFS_UNLINK */
314 exit2:
315 dput(dentry);
316 }
317
318 spl_inode_unlock(nd.nd_dentry->d_inode);
319 if (inode)
320 iput(inode); /* truncate the inode here */
321 exit1:
322 vn_path_release(&nd);
323 exit:
324 SRETURN(-rc);
325
326 slashes:
327 rc = !dentry->d_inode ? -ENOENT :
328 S_ISDIR(dentry->d_inode->i_mode) ? -EISDIR : -ENOTDIR;
329 SGOTO(exit2, rc);
330 } /* vn_remove() */
331 EXPORT_SYMBOL(vn_remove);
332
333 /* Modified do_rename() from linux/fs/namei.c, only uses exported symbols */
334 int
335 vn_rename(const char *oldname, const char *newname, int x1)
336 {
337 struct dentry *old_dir, *new_dir;
338 struct dentry *old_dentry, *new_dentry;
339 struct dentry *trap;
340 struct nameidata oldnd, newnd;
341 int rc = 0;
342 SENTRY;
343
344 rc = path_lookup(oldname, LOOKUP_PARENT, &oldnd);
345 if (rc)
346 SGOTO(exit, rc);
347
348 rc = path_lookup(newname, LOOKUP_PARENT, &newnd);
349 if (rc)
350 SGOTO(exit1, rc);
351
352 rc = -EXDEV;
353 if (oldnd.nd_mnt != newnd.nd_mnt)
354 SGOTO(exit2, rc);
355
356 old_dir = oldnd.nd_dentry;
357 rc = -EBUSY;
358 if (oldnd.last_type != LAST_NORM)
359 SGOTO(exit2, rc);
360
361 new_dir = newnd.nd_dentry;
362 if (newnd.last_type != LAST_NORM)
363 SGOTO(exit2, rc);
364
365 trap = lock_rename(new_dir, old_dir);
366
367 old_dentry = vn_lookup_hash(&oldnd);
368
369 rc = PTR_ERR(old_dentry);
370 if (IS_ERR(old_dentry))
371 SGOTO(exit3, rc);
372
373 /* source must exist */
374 rc = -ENOENT;
375 if (!old_dentry->d_inode)
376 SGOTO(exit4, rc);
377
378 /* unless the source is a directory trailing slashes give -ENOTDIR */
379 if (!S_ISDIR(old_dentry->d_inode->i_mode)) {
380 rc = -ENOTDIR;
381 if (oldnd.last.name[oldnd.last.len])
382 SGOTO(exit4, rc);
383 if (newnd.last.name[newnd.last.len])
384 SGOTO(exit4, rc);
385 }
386
387 /* source should not be ancestor of target */
388 rc = -EINVAL;
389 if (old_dentry == trap)
390 SGOTO(exit4, rc);
391
392 new_dentry = vn_lookup_hash(&newnd);
393 rc = PTR_ERR(new_dentry);
394 if (IS_ERR(new_dentry))
395 SGOTO(exit4, rc);
396
397 /* target should not be an ancestor of source */
398 rc = -ENOTEMPTY;
399 if (new_dentry == trap)
400 SGOTO(exit5, rc);
401
402 #ifdef HAVE_4ARGS_VFS_RENAME
403 rc = vfs_rename(old_dir->d_inode, old_dentry,
404 new_dir->d_inode, new_dentry);
405 #else
406 rc = vfs_rename(old_dir->d_inode, old_dentry, oldnd.nd_mnt,
407 new_dir->d_inode, new_dentry, newnd.nd_mnt);
408 #endif /* HAVE_4ARGS_VFS_RENAME */
409 exit5:
410 dput(new_dentry);
411 exit4:
412 dput(old_dentry);
413 exit3:
414 unlock_rename(new_dir, old_dir);
415 exit2:
416 vn_path_release(&newnd);
417 exit1:
418 vn_path_release(&oldnd);
419 exit:
420 SRETURN(-rc);
421 }
422 EXPORT_SYMBOL(vn_rename);
423
424 int
425 vn_getattr(vnode_t *vp, vattr_t *vap, int flags, void *x3, void *x4)
426 {
427 struct file *fp;
428 struct kstat stat;
429 int rc;
430 SENTRY;
431
432 ASSERT(vp);
433 ASSERT(vp->v_file);
434 ASSERT(vap);
435
436 fp = vp->v_file;
437
438 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
439 if (rc)
440 SRETURN(-rc);
441
442 vap->va_type = vn_get_sol_type(stat.mode);
443 vap->va_mode = stat.mode;
444 vap->va_uid = stat.uid;
445 vap->va_gid = stat.gid;
446 vap->va_fsid = 0;
447 vap->va_nodeid = stat.ino;
448 vap->va_nlink = stat.nlink;
449 vap->va_size = stat.size;
450 vap->va_blocksize = stat.blksize;
451 vap->va_atime.tv_sec = stat.atime.tv_sec;
452 vap->va_atime.tv_usec = stat.atime.tv_nsec / NSEC_PER_USEC;
453 vap->va_mtime.tv_sec = stat.mtime.tv_sec;
454 vap->va_mtime.tv_usec = stat.mtime.tv_nsec / NSEC_PER_USEC;
455 vap->va_ctime.tv_sec = stat.ctime.tv_sec;
456 vap->va_ctime.tv_usec = stat.ctime.tv_nsec / NSEC_PER_USEC;
457 vap->va_rdev = stat.rdev;
458 vap->va_blocks = stat.blocks;
459
460 SRETURN(0);
461 }
462 EXPORT_SYMBOL(vn_getattr);
463
464 int vn_fsync(vnode_t *vp, int flags, void *x3, void *x4)
465 {
466 int datasync = 0;
467 SENTRY;
468
469 ASSERT(vp);
470 ASSERT(vp->v_file);
471
472 if (flags & FDSYNC)
473 datasync = 1;
474
475 SRETURN(-spl_filp_fsync(vp->v_file, datasync));
476 } /* vn_fsync() */
477 EXPORT_SYMBOL(vn_fsync);
478
479 /* Function must be called while holding the vn_file_lock */
480 static file_t *
481 file_find(int fd)
482 {
483 file_t *fp;
484
485 ASSERT(spin_is_locked(&vn_file_lock));
486
487 list_for_each_entry(fp, &vn_file_list, f_list) {
488 if (fd == fp->f_fd) {
489 ASSERT(atomic_read(&fp->f_ref) != 0);
490 return fp;
491 }
492 }
493
494 return NULL;
495 } /* file_find() */
496
497 file_t *
498 vn_getf(int fd)
499 {
500 struct kstat stat;
501 struct file *lfp;
502 file_t *fp;
503 vnode_t *vp;
504 int rc = 0;
505 SENTRY;
506
507 /* Already open just take an extra reference */
508 spin_lock(&vn_file_lock);
509
510 fp = file_find(fd);
511 if (fp) {
512 atomic_inc(&fp->f_ref);
513 spin_unlock(&vn_file_lock);
514 SRETURN(fp);
515 }
516
517 spin_unlock(&vn_file_lock);
518
519 /* File was not yet opened create the object and setup */
520 fp = kmem_cache_alloc(vn_file_cache, KM_SLEEP);
521 if (fp == NULL)
522 SGOTO(out, rc);
523
524 mutex_enter(&fp->f_lock);
525
526 fp->f_fd = fd;
527 fp->f_offset = 0;
528 atomic_inc(&fp->f_ref);
529
530 lfp = fget(fd);
531 if (lfp == NULL)
532 SGOTO(out_mutex, rc);
533
534 vp = vn_alloc(KM_SLEEP);
535 if (vp == NULL)
536 SGOTO(out_fget, rc);
537
538 if (vfs_getattr(lfp->f_vfsmnt, lfp->f_dentry, &stat))
539 SGOTO(out_vnode, rc);
540
541 mutex_enter(&vp->v_lock);
542 vp->v_type = vn_get_sol_type(stat.mode);
543 vp->v_file = lfp;
544 mutex_exit(&vp->v_lock);
545
546 fp->f_vnode = vp;
547 fp->f_file = lfp;
548
549 /* Put it on the tracking list */
550 spin_lock(&vn_file_lock);
551 list_add(&fp->f_list, &vn_file_list);
552 spin_unlock(&vn_file_lock);
553
554 mutex_exit(&fp->f_lock);
555 SRETURN(fp);
556
557 out_vnode:
558 vn_free(vp);
559 out_fget:
560 fput(lfp);
561 out_mutex:
562 mutex_exit(&fp->f_lock);
563 kmem_cache_free(vn_file_cache, fp);
564 out:
565 SRETURN(NULL);
566 } /* getf() */
567 EXPORT_SYMBOL(getf);
568
569 static void releasef_locked(file_t *fp)
570 {
571 ASSERT(fp->f_file);
572 ASSERT(fp->f_vnode);
573
574 /* Unlinked from list, no refs, safe to free outside mutex */
575 fput(fp->f_file);
576 vn_free(fp->f_vnode);
577
578 kmem_cache_free(vn_file_cache, fp);
579 }
580
581 void
582 vn_releasef(int fd)
583 {
584 file_t *fp;
585 SENTRY;
586
587 spin_lock(&vn_file_lock);
588 fp = file_find(fd);
589 if (fp) {
590 atomic_dec(&fp->f_ref);
591 if (atomic_read(&fp->f_ref) > 0) {
592 spin_unlock(&vn_file_lock);
593 SEXIT;
594 return;
595 }
596
597 list_del(&fp->f_list);
598 releasef_locked(fp);
599 }
600 spin_unlock(&vn_file_lock);
601
602 SEXIT;
603 return;
604 } /* releasef() */
605 EXPORT_SYMBOL(releasef);
606
607 #ifndef HAVE_SET_FS_PWD
608 # ifdef HAVE_2ARGS_SET_FS_PWD
609 /* Used from 2.6.25 - 2.6.31+ */
610 void
611 set_fs_pwd(struct fs_struct *fs, struct path *path)
612 {
613 struct path old_pwd;
614
615 # ifdef HAVE_FS_STRUCT_SPINLOCK
616 spin_lock(&fs->lock);
617 old_pwd = fs->pwd;
618 fs->pwd = *path;
619 path_get(path);
620 spin_unlock(&fs->lock);
621 # else
622 write_lock(&fs->lock);
623 old_pwd = fs->pwd;
624 fs->pwd = *path;
625 path_get(path);
626 write_unlock(&fs->lock);
627 # endif /* HAVE_FS_STRUCT_SPINLOCK */
628
629 if (old_pwd.dentry)
630 path_put(&old_pwd);
631 }
632 # else
633 /* Used from 2.6.11 - 2.6.24 */
634 void
635 set_fs_pwd(struct fs_struct *fs, struct vfsmount *mnt, struct dentry *dentry)
636 {
637 struct dentry *old_pwd;
638 struct vfsmount *old_pwdmnt;
639
640 write_lock(&fs->lock);
641 old_pwd = fs->pwd;
642 old_pwdmnt = fs->pwdmnt;
643 fs->pwdmnt = mntget(mnt);
644 fs->pwd = dget(dentry);
645 write_unlock(&fs->lock);
646
647 if (old_pwd) {
648 dput(old_pwd);
649 mntput(old_pwdmnt);
650 }
651 }
652 # endif /* HAVE_2ARGS_SET_FS_PWD */
653 #endif /* HAVE_SET_FS_PWD */
654
655 int
656 vn_set_pwd(const char *filename)
657 {
658 #if defined(HAVE_2ARGS_SET_FS_PWD) && defined(HAVE_USER_PATH_DIR)
659 struct path path;
660 #else
661 struct nameidata nd;
662 #endif /* HAVE_2ARGS_SET_FS_PWD */
663 mm_segment_t saved_fs;
664 int rc;
665 SENTRY;
666
667 /*
668 * user_path_dir() and __user_walk() both expect 'filename' to be
669 * a user space address so we must briefly increase the data segment
670 * size to ensure strncpy_from_user() does not fail with -EFAULT.
671 */
672 saved_fs = get_fs();
673 set_fs(get_ds());
674
675 #ifdef HAVE_2ARGS_SET_FS_PWD
676 # ifdef HAVE_USER_PATH_DIR
677 rc = user_path_dir(filename, &path);
678 if (rc)
679 SGOTO(out, rc);
680
681 rc = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_ACCESS);
682 if (rc)
683 SGOTO(dput_and_out, rc);
684
685 set_fs_pwd(current->fs, &path);
686
687 dput_and_out:
688 path_put(&path);
689 # else
690 rc = __user_walk(filename,
691 LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd);
692 if (rc)
693 SGOTO(out, rc);
694
695 rc = vfs_permission(&nd, MAY_EXEC);
696 if (rc)
697 SGOTO(dput_and_out, rc);
698
699 set_fs_pwd(current->fs, &nd.path);
700
701 dput_and_out:
702 path_put(&nd.path);
703 # endif /* HAVE_USER_PATH_DIR */
704 #else
705 rc = __user_walk(filename,
706 LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd);
707 if (rc)
708 SGOTO(out, rc);
709
710 rc = vfs_permission(&nd, MAY_EXEC);
711 if (rc)
712 SGOTO(dput_and_out, rc);
713
714 set_fs_pwd(current->fs, nd.nd_mnt, nd.nd_dentry);
715
716 dput_and_out:
717 vn_path_release(&nd);
718 #endif /* HAVE_2ARGS_SET_FS_PWD */
719 out:
720 set_fs(saved_fs);
721
722 SRETURN(-rc);
723 } /* vn_set_pwd() */
724 EXPORT_SYMBOL(vn_set_pwd);
725
726 static int
727 vn_cache_constructor(void *buf, void *cdrarg, int kmflags)
728 {
729 struct vnode *vp = buf;
730
731 mutex_init(&vp->v_lock, NULL, MUTEX_DEFAULT, NULL);
732
733 return (0);
734 } /* vn_cache_constructor() */
735
736 static void
737 vn_cache_destructor(void *buf, void *cdrarg)
738 {
739 struct vnode *vp = buf;
740
741 mutex_destroy(&vp->v_lock);
742 } /* vn_cache_destructor() */
743
744 static int
745 vn_file_cache_constructor(void *buf, void *cdrarg, int kmflags)
746 {
747 file_t *fp = buf;
748
749 atomic_set(&fp->f_ref, 0);
750 mutex_init(&fp->f_lock, NULL, MUTEX_DEFAULT, NULL);
751 INIT_LIST_HEAD(&fp->f_list);
752
753 return (0);
754 } /* file_cache_constructor() */
755
756 static void
757 vn_file_cache_destructor(void *buf, void *cdrarg)
758 {
759 file_t *fp = buf;
760
761 mutex_destroy(&fp->f_lock);
762 } /* vn_file_cache_destructor() */
763
764 int
765 vn_init(void)
766 {
767 SENTRY;
768 vn_cache = kmem_cache_create("spl_vn_cache",
769 sizeof(struct vnode), 64,
770 vn_cache_constructor,
771 vn_cache_destructor,
772 NULL, NULL, NULL, 0);
773
774 vn_file_cache = kmem_cache_create("spl_vn_file_cache",
775 sizeof(file_t), 64,
776 vn_file_cache_constructor,
777 vn_file_cache_destructor,
778 NULL, NULL, NULL, 0);
779 SRETURN(0);
780 } /* vn_init() */
781
782 void
783 vn_fini(void)
784 {
785 file_t *fp, *next_fp;
786 int leaked = 0;
787 SENTRY;
788
789 spin_lock(&vn_file_lock);
790
791 list_for_each_entry_safe(fp, next_fp, &vn_file_list, f_list) {
792 list_del(&fp->f_list);
793 releasef_locked(fp);
794 leaked++;
795 }
796
797 kmem_cache_destroy(vn_file_cache);
798 vn_file_cache = NULL;
799 spin_unlock(&vn_file_lock);
800
801 if (leaked > 0)
802 SWARN("Warning %d files leaked\n", leaked);
803
804 kmem_cache_destroy(vn_cache);
805
806 SEXIT;
807 return;
808 } /* vn_fini() */