]> git.proxmox.com Git - mirror_spl.git/blame - module/spl/spl-vnode.c
Linux 2.6.36 compat, wrap RLIM64_INFINITY
[mirror_spl.git] / module / spl / spl-vnode.c
CommitLineData
716154c5
BB
1/*****************************************************************************\
2 * Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC.
3 * Copyright (C) 2007 The Regents of the University of California.
4 * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
5 * Written by Brian Behlendorf <behlendorf1@llnl.gov>.
715f6251 6 * UCRL-CODE-235197
7 *
716154c5
BB
8 * This file is part of the SPL, Solaris Porting Layer.
9 * For details, see <http://github.com/behlendorf/spl/>.
10 *
11 * The SPL is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU General Public License as published by the
13 * Free Software Foundation; either version 2 of the License, or (at your
14 * option) any later version.
715f6251 15 *
716154c5 16 * The SPL is distributed in the hope that it will be useful, but WITHOUT
715f6251 17 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
18 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
19 * for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
716154c5
BB
22 * with the SPL. If not, see <http://www.gnu.org/licenses/>.
23 *****************************************************************************
24 * Solaris Porting Layer (SPL) Vnode Implementation.
25\*****************************************************************************/
715f6251 26
4b171585 27#include <sys/vnode.h>
55abb092 28#include <spl-debug.h>
937879f1 29
b17edc10
BB
30#ifdef SS_DEBUG_SUBSYS
31#undef SS_DEBUG_SUBSYS
937879f1 32#endif
33
b17edc10 34#define SS_DEBUG_SUBSYS SS_VNODE
937879f1 35
51a727e9 36vnode_t *rootdir = (vnode_t *)0xabcd1234;
4b171585 37EXPORT_SYMBOL(rootdir);
38
7afde631 39static spl_kmem_cache_t *vn_cache;
40static spl_kmem_cache_t *vn_file_cache;
e4f1d29f 41
42static spinlock_t vn_file_lock = SPIN_LOCK_UNLOCKED;
43static LIST_HEAD(vn_file_list);
af828292 44
4b171585 45static vtype_t
46vn_get_sol_type(umode_t mode)
47{
48 if (S_ISREG(mode))
49 return VREG;
50
51 if (S_ISDIR(mode))
52 return VDIR;
53
54 if (S_ISCHR(mode))
55 return VCHR;
56
57 if (S_ISBLK(mode))
58 return VBLK;
59
60 if (S_ISFIFO(mode))
61 return VFIFO;
62
63 if (S_ISLNK(mode))
64 return VLNK;
65
66 if (S_ISSOCK(mode))
67 return VSOCK;
68
69 if (S_ISCHR(mode))
70 return VCHR;
71
72 return VNON;
73} /* vn_get_sol_type() */
74
af828292 75vnode_t *
76vn_alloc(int flag)
77{
78 vnode_t *vp;
b17edc10 79 SENTRY;
af828292 80
81 vp = kmem_cache_alloc(vn_cache, flag);
af828292 82 if (vp != NULL) {
e4f1d29f 83 vp->v_file = NULL;
af828292 84 vp->v_type = 0;
85 }
86
b17edc10 87 SRETURN(vp);
af828292 88} /* vn_alloc() */
89EXPORT_SYMBOL(vn_alloc);
90
91void
92vn_free(vnode_t *vp)
93{
b17edc10 94 SENTRY;
af828292 95 kmem_cache_free(vn_cache, vp);
b17edc10 96 SEXIT;
af828292 97} /* vn_free() */
98EXPORT_SYMBOL(vn_free);
99
0b3cf046 100int
af828292 101vn_open(const char *path, uio_seg_t seg, int flags, int mode,
4b171585 102 vnode_t **vpp, int x1, void *x2)
0b3cf046 103{
f7e8739c
RC
104 struct file *fp;
105 struct kstat stat;
106 int rc, saved_umask = 0;
4be55565 107 gfp_t saved_gfp;
0b3cf046 108 vnode_t *vp;
b17edc10 109 SENTRY;
0b3cf046 110
937879f1 111 ASSERT(flags & (FWRITE | FREAD));
112 ASSERT(seg == UIO_SYSSPACE);
113 ASSERT(vpp);
4b171585 114 *vpp = NULL;
115
116 if (!(flags & FCREAT) && (flags & FWRITE))
117 flags |= FEXCL;
118
728b9dd8 119 /* Note for filp_open() the two low bits must be remapped to mean:
120 * 01 - read-only -> 00 read-only
121 * 10 - write-only -> 01 write-only
122 * 11 - read-write -> 10 read-write
123 */
124 flags--;
0b3cf046 125
126 if (flags & FCREAT)
4b171585 127 saved_umask = xchg(&current->fs->umask, 0);
0b3cf046 128
f7e8739c 129 fp = filp_open(path, flags, mode);
0b3cf046 130
131 if (flags & FCREAT)
4b171585 132 (void)xchg(&current->fs->umask, saved_umask);
0b3cf046 133
f7e8739c 134 if (IS_ERR(fp))
b17edc10 135 SRETURN(-PTR_ERR(fp));
0b3cf046 136
f7e8739c 137 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
4b171585 138 if (rc) {
139 filp_close(fp, 0);
b17edc10 140 SRETURN(-rc);
0b3cf046 141 }
142
af828292 143 vp = vn_alloc(KM_SLEEP);
4b171585 144 if (!vp) {
145 filp_close(fp, 0);
b17edc10 146 SRETURN(ENOMEM);
4b171585 147 }
0b3cf046 148
4be55565
LW
149 saved_gfp = mapping_gfp_mask(fp->f_mapping);
150 mapping_set_gfp_mask(fp->f_mapping, saved_gfp & ~(__GFP_IO|__GFP_FS));
151
e4f1d29f 152 mutex_enter(&vp->v_lock);
4b171585 153 vp->v_type = vn_get_sol_type(stat.mode);
e4f1d29f 154 vp->v_file = fp;
4be55565 155 vp->v_gfp_mask = saved_gfp;
4b171585 156 *vpp = vp;
e4f1d29f 157 mutex_exit(&vp->v_lock);
0b3cf046 158
b17edc10 159 SRETURN(0);
4b171585 160} /* vn_open() */
161EXPORT_SYMBOL(vn_open);
0b3cf046 162
0b3cf046 163int
af828292 164vn_openat(const char *path, uio_seg_t seg, int flags, int mode,
4b171585 165 vnode_t **vpp, int x1, void *x2, vnode_t *vp, int fd)
0b3cf046 166{
4b171585 167 char *realpath;
12018327 168 int len, rc;
b17edc10 169 SENTRY;
0b3cf046 170
937879f1 171 ASSERT(vp == rootdir);
0b3cf046 172
12018327 173 len = strlen(path) + 2;
174 realpath = kmalloc(len, GFP_KERNEL);
4b171585 175 if (!realpath)
b17edc10 176 SRETURN(ENOMEM);
0b3cf046 177
12018327 178 (void)snprintf(realpath, len, "/%s", path);
4b171585 179 rc = vn_open(realpath, seg, flags, mode, vpp, x1, x2);
4b171585 180 kfree(realpath);
181
b17edc10 182 SRETURN(rc);
4b171585 183} /* vn_openat() */
184EXPORT_SYMBOL(vn_openat);
0b3cf046 185
0b3cf046 186int
4b171585 187vn_rdwr(uio_rw_t uio, vnode_t *vp, void *addr, ssize_t len, offset_t off,
663e02a1 188 uio_seg_t seg, int ioflag, rlim64_t x2, void *x3, ssize_t *residp)
0b3cf046 189{
4b171585 190 loff_t offset;
191 mm_segment_t saved_fs;
192 struct file *fp;
193 int rc;
b17edc10 194 SENTRY;
4b171585 195
937879f1 196 ASSERT(uio == UIO_WRITE || uio == UIO_READ);
197 ASSERT(vp);
198 ASSERT(vp->v_file);
199 ASSERT(seg == UIO_SYSSPACE);
663e02a1 200 ASSERT((ioflag & ~FAPPEND) == 0);
937879f1 201 ASSERT(x2 == RLIM64_INFINITY);
4b171585 202
e4f1d29f 203 fp = vp->v_file;
4b171585 204
663e02a1
RC
205 offset = off;
206 if (ioflag & FAPPEND)
207 offset = fp->f_pos;
208
4b171585 209 /* Writable user data segment must be briefly increased for this
210 * process so we can use the user space read call paths to write
211 * in to memory allocated by the kernel. */
212 saved_fs = get_fs();
213 set_fs(get_ds());
214
215 if (uio & UIO_WRITE)
216 rc = vfs_write(fp, addr, len, &offset);
217 else
218 rc = vfs_read(fp, addr, len, &offset);
219
220 set_fs(saved_fs);
221
222 if (rc < 0)
b17edc10 223 SRETURN(-rc);
0b3cf046 224
4b171585 225 if (residp) {
226 *residp = len - rc;
0b3cf046 227 } else {
4b171585 228 if (rc != len)
b17edc10 229 SRETURN(EIO);
0b3cf046 230 }
231
b17edc10 232 SRETURN(0);
4b171585 233} /* vn_rdwr() */
234EXPORT_SYMBOL(vn_rdwr);
235
236int
2f5d55aa 237vn_close(vnode_t *vp, int flags, int x1, int x2, void *x3, void *x4)
4b171585 238{
239 int rc;
b17edc10 240 SENTRY;
4b171585 241
937879f1 242 ASSERT(vp);
243 ASSERT(vp->v_file);
4b171585 244
4be55565 245 mapping_set_gfp_mask(vp->v_file->f_mapping, vp->v_gfp_mask);
97735c39
BB
246 rc = filp_close(vp->v_file, 0);
247 vn_free(vp);
4b171585 248
b17edc10 249 SRETURN(-rc);
4b171585 250} /* vn_close() */
251EXPORT_SYMBOL(vn_close);
252
97735c39
BB
253/* vn_seek() does not actually seek it only performs bounds checking on the
254 * proposed seek. We perform minimal checking and allow vn_rdwr() to catch
255 * anything more serious. */
256int
257vn_seek(vnode_t *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct)
258{
259 return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
260}
261EXPORT_SYMBOL(vn_seek);
262
263static struct dentry *
264vn_lookup_hash(struct nameidata *nd)
4b171585 265{
849c50e7
BB
266 return lookup_one_len((const char *)nd->last.name,
267 nd->nd_dentry, nd->last.len);
4b171585 268} /* lookup_hash() */
269
97735c39
BB
270static void
271vn_path_release(struct nameidata *nd)
57d86234 272{
273 dput(nd->nd_dentry);
274 mntput(nd->nd_mnt);
275}
276
4b171585 277/* Modified do_unlinkat() from linux/fs/namei.c, only uses exported symbols */
278int
af828292 279vn_remove(const char *path, uio_seg_t seg, int flags)
4b171585 280{
281 struct dentry *dentry;
282 struct nameidata nd;
283 struct inode *inode = NULL;
284 int rc = 0;
b17edc10 285 SENTRY;
4b171585 286
3d061e9d 287 ASSERT(seg == UIO_SYSSPACE);
288 ASSERT(flags == RMFILE);
2f5d55aa 289
4b171585 290 rc = path_lookup(path, LOOKUP_PARENT, &nd);
291 if (rc)
b17edc10 292 SGOTO(exit, rc);
4b171585 293
294 rc = -EISDIR;
295 if (nd.last_type != LAST_NORM)
b17edc10 296 SGOTO(exit1, rc);
4b171585 297
3d061e9d 298#ifdef HAVE_INODE_I_MUTEX
57d86234 299 mutex_lock_nested(&nd.nd_dentry->d_inode->i_mutex, I_MUTEX_PARENT);
3d061e9d 300#else
301 down(&nd.nd_dentry->d_inode->i_sem);
a093c6a4 302#endif /* HAVE_INODE_I_MUTEX */
57d86234 303 dentry = vn_lookup_hash(&nd);
4b171585 304 rc = PTR_ERR(dentry);
305 if (!IS_ERR(dentry)) {
306 /* Why not before? Because we want correct rc value */
307 if (nd.last.name[nd.last.len])
b17edc10 308 SGOTO(slashes, rc);
937879f1 309
4b171585 310 inode = dentry->d_inode;
311 if (inode)
312 atomic_inc(&inode->i_count);
a093c6a4 313#ifdef HAVE_2ARGS_VFS_UNLINK
57d86234 314 rc = vfs_unlink(nd.nd_dentry->d_inode, dentry);
a093c6a4 315#else
21411161 316 rc = vfs_unlink(nd.nd_dentry->d_inode, dentry, nd.nd_mnt);
a093c6a4 317#endif /* HAVE_2ARGS_VFS_UNLINK */
4b171585 318exit2:
319 dput(dentry);
320 }
3d061e9d 321#ifdef HAVE_INODE_I_MUTEX
57d86234 322 mutex_unlock(&nd.nd_dentry->d_inode->i_mutex);
3d061e9d 323#else
324 up(&nd.nd_dentry->d_inode->i_sem);
a093c6a4 325#endif /* HAVE_INODE_I_MUTEX */
4b171585 326 if (inode)
327 iput(inode); /* truncate the inode here */
328exit1:
57d86234 329 vn_path_release(&nd);
4b171585 330exit:
b17edc10 331 SRETURN(-rc);
4b171585 332
333slashes:
334 rc = !dentry->d_inode ? -ENOENT :
335 S_ISDIR(dentry->d_inode->i_mode) ? -EISDIR : -ENOTDIR;
b17edc10 336 SGOTO(exit2, rc);
4b171585 337} /* vn_remove() */
338EXPORT_SYMBOL(vn_remove);
339
340/* Modified do_rename() from linux/fs/namei.c, only uses exported symbols */
341int
342vn_rename(const char *oldname, const char *newname, int x1)
343{
a093c6a4
BB
344 struct dentry *old_dir, *new_dir;
345 struct dentry *old_dentry, *new_dentry;
346 struct dentry *trap;
4b171585 347 struct nameidata oldnd, newnd;
348 int rc = 0;
b17edc10 349 SENTRY;
4b171585 350
351 rc = path_lookup(oldname, LOOKUP_PARENT, &oldnd);
352 if (rc)
b17edc10 353 SGOTO(exit, rc);
4b171585 354
355 rc = path_lookup(newname, LOOKUP_PARENT, &newnd);
356 if (rc)
b17edc10 357 SGOTO(exit1, rc);
4b171585 358
359 rc = -EXDEV;
57d86234 360 if (oldnd.nd_mnt != newnd.nd_mnt)
b17edc10 361 SGOTO(exit2, rc);
4b171585 362
57d86234 363 old_dir = oldnd.nd_dentry;
4b171585 364 rc = -EBUSY;
365 if (oldnd.last_type != LAST_NORM)
b17edc10 366 SGOTO(exit2, rc);
4b171585 367
57d86234 368 new_dir = newnd.nd_dentry;
4b171585 369 if (newnd.last_type != LAST_NORM)
b17edc10 370 SGOTO(exit2, rc);
4b171585 371
372 trap = lock_rename(new_dir, old_dir);
373
57d86234 374 old_dentry = vn_lookup_hash(&oldnd);
4b171585 375
376 rc = PTR_ERR(old_dentry);
377 if (IS_ERR(old_dentry))
b17edc10 378 SGOTO(exit3, rc);
4b171585 379
380 /* source must exist */
381 rc = -ENOENT;
382 if (!old_dentry->d_inode)
b17edc10 383 SGOTO(exit4, rc);
4b171585 384
385 /* unless the source is a directory trailing slashes give -ENOTDIR */
386 if (!S_ISDIR(old_dentry->d_inode->i_mode)) {
387 rc = -ENOTDIR;
388 if (oldnd.last.name[oldnd.last.len])
b17edc10 389 SGOTO(exit4, rc);
4b171585 390 if (newnd.last.name[newnd.last.len])
b17edc10 391 SGOTO(exit4, rc);
4b171585 392 }
393
394 /* source should not be ancestor of target */
395 rc = -EINVAL;
396 if (old_dentry == trap)
b17edc10 397 SGOTO(exit4, rc);
4b171585 398
57d86234 399 new_dentry = vn_lookup_hash(&newnd);
4b171585 400 rc = PTR_ERR(new_dentry);
401 if (IS_ERR(new_dentry))
b17edc10 402 SGOTO(exit4, rc);
4b171585 403
404 /* target should not be an ancestor of source */
405 rc = -ENOTEMPTY;
406 if (new_dentry == trap)
b17edc10 407 SGOTO(exit5, rc);
4b171585 408
a093c6a4 409#ifdef HAVE_4ARGS_VFS_RENAME
4b171585 410 rc = vfs_rename(old_dir->d_inode, old_dentry,
411 new_dir->d_inode, new_dentry);
a093c6a4 412#else
21411161
BB
413 rc = vfs_rename(old_dir->d_inode, old_dentry, oldnd.nd_mnt,
414 new_dir->d_inode, new_dentry, newnd.nd_mnt);
a093c6a4 415#endif /* HAVE_4ARGS_VFS_RENAME */
4b171585 416exit5:
417 dput(new_dentry);
418exit4:
419 dput(old_dentry);
420exit3:
421 unlock_rename(new_dir, old_dir);
422exit2:
57d86234 423 vn_path_release(&newnd);
4b171585 424exit1:
57d86234 425 vn_path_release(&oldnd);
4b171585 426exit:
b17edc10 427 SRETURN(-rc);
0b3cf046 428}
4b171585 429EXPORT_SYMBOL(vn_rename);
0b3cf046 430
4b171585 431int
36e6f861 432vn_getattr(vnode_t *vp, vattr_t *vap, int flags, void *x3, void *x4)
0b3cf046 433{
4b171585 434 struct file *fp;
435 struct kstat stat;
436 int rc;
b17edc10 437 SENTRY;
4b171585 438
937879f1 439 ASSERT(vp);
440 ASSERT(vp->v_file);
441 ASSERT(vap);
4b171585 442
e4f1d29f 443 fp = vp->v_file;
4b171585 444
445 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
446 if (rc)
b17edc10 447 SRETURN(-rc);
4b171585 448
449 vap->va_type = vn_get_sol_type(stat.mode);
450 vap->va_mode = stat.mode;
451 vap->va_uid = stat.uid;
452 vap->va_gid = stat.gid;
453 vap->va_fsid = 0;
454 vap->va_nodeid = stat.ino;
455 vap->va_nlink = stat.nlink;
456 vap->va_size = stat.size;
457 vap->va_blocksize = stat.blksize;
458 vap->va_atime.tv_sec = stat.atime.tv_sec;
459 vap->va_atime.tv_usec = stat.atime.tv_nsec / NSEC_PER_USEC;
460 vap->va_mtime.tv_sec = stat.mtime.tv_sec;
461 vap->va_mtime.tv_usec = stat.mtime.tv_nsec / NSEC_PER_USEC;
462 vap->va_ctime.tv_sec = stat.ctime.tv_sec;
463 vap->va_ctime.tv_usec = stat.ctime.tv_nsec / NSEC_PER_USEC;
464 vap->va_rdev = stat.rdev;
465 vap->va_blocks = stat.blocks;
466
b17edc10 467 SRETURN(0);
0b3cf046 468}
4b171585 469EXPORT_SYMBOL(vn_getattr);
470
2f5d55aa 471int vn_fsync(vnode_t *vp, int flags, void *x3, void *x4)
4b171585 472{
36e6f861 473 int datasync = 0;
b17edc10 474 SENTRY;
36e6f861 475
937879f1 476 ASSERT(vp);
477 ASSERT(vp->v_file);
4b171585 478
36e6f861 479 if (flags & FDSYNC)
480 datasync = 1;
481
b17edc10 482 SRETURN(-spl_filp_fsync(vp->v_file, datasync));
4b171585 483} /* vn_fsync() */
484EXPORT_SYMBOL(vn_fsync);
af828292 485
e4f1d29f 486/* Function must be called while holding the vn_file_lock */
487static file_t *
488file_find(int fd)
489{
490 file_t *fp;
491
937879f1 492 ASSERT(spin_is_locked(&vn_file_lock));
e4f1d29f 493
494 list_for_each_entry(fp, &vn_file_list, f_list) {
495 if (fd == fp->f_fd) {
937879f1 496 ASSERT(atomic_read(&fp->f_ref) != 0);
e4f1d29f 497 return fp;
498 }
499 }
500
501 return NULL;
502} /* file_find() */
503
504file_t *
505vn_getf(int fd)
506{
507 struct kstat stat;
508 struct file *lfp;
509 file_t *fp;
510 vnode_t *vp;
937879f1 511 int rc = 0;
b17edc10 512 SENTRY;
e4f1d29f 513
514 /* Already open just take an extra reference */
515 spin_lock(&vn_file_lock);
516
517 fp = file_find(fd);
518 if (fp) {
519 atomic_inc(&fp->f_ref);
520 spin_unlock(&vn_file_lock);
b17edc10 521 SRETURN(fp);
e4f1d29f 522 }
523
524 spin_unlock(&vn_file_lock);
525
526 /* File was not yet opened create the object and setup */
4afaaefa 527 fp = kmem_cache_alloc(vn_file_cache, KM_SLEEP);
e4f1d29f 528 if (fp == NULL)
b17edc10 529 SGOTO(out, rc);
e4f1d29f 530
531 mutex_enter(&fp->f_lock);
532
533 fp->f_fd = fd;
534 fp->f_offset = 0;
535 atomic_inc(&fp->f_ref);
536
537 lfp = fget(fd);
538 if (lfp == NULL)
b17edc10 539 SGOTO(out_mutex, rc);
e4f1d29f 540
541 vp = vn_alloc(KM_SLEEP);
542 if (vp == NULL)
b17edc10 543 SGOTO(out_fget, rc);
e4f1d29f 544
545 if (vfs_getattr(lfp->f_vfsmnt, lfp->f_dentry, &stat))
b17edc10 546 SGOTO(out_vnode, rc);
e4f1d29f 547
548 mutex_enter(&vp->v_lock);
549 vp->v_type = vn_get_sol_type(stat.mode);
550 vp->v_file = lfp;
551 mutex_exit(&vp->v_lock);
552
553 fp->f_vnode = vp;
554 fp->f_file = lfp;
555
556 /* Put it on the tracking list */
557 spin_lock(&vn_file_lock);
558 list_add(&fp->f_list, &vn_file_list);
559 spin_unlock(&vn_file_lock);
560
561 mutex_exit(&fp->f_lock);
b17edc10 562 SRETURN(fp);
e4f1d29f 563
564out_vnode:
e4f1d29f 565 vn_free(vp);
566out_fget:
e4f1d29f 567 fput(lfp);
568out_mutex:
e4f1d29f 569 mutex_exit(&fp->f_lock);
570 kmem_cache_free(vn_file_cache, fp);
571out:
b17edc10 572 SRETURN(NULL);
e4f1d29f 573} /* getf() */
574EXPORT_SYMBOL(getf);
575
576static void releasef_locked(file_t *fp)
577{
937879f1 578 ASSERT(fp->f_file);
579 ASSERT(fp->f_vnode);
e4f1d29f 580
581 /* Unlinked from list, no refs, safe to free outside mutex */
582 fput(fp->f_file);
583 vn_free(fp->f_vnode);
584
585 kmem_cache_free(vn_file_cache, fp);
586}
587
588void
589vn_releasef(int fd)
590{
591 file_t *fp;
b17edc10 592 SENTRY;
e4f1d29f 593
594 spin_lock(&vn_file_lock);
595 fp = file_find(fd);
596 if (fp) {
597 atomic_dec(&fp->f_ref);
598 if (atomic_read(&fp->f_ref) > 0) {
599 spin_unlock(&vn_file_lock);
b17edc10 600 SEXIT;
e4f1d29f 601 return;
602 }
603
604 list_del(&fp->f_list);
605 releasef_locked(fp);
606 }
607 spin_unlock(&vn_file_lock);
608
b17edc10 609 SEXIT;
e4f1d29f 610 return;
611} /* releasef() */
612EXPORT_SYMBOL(releasef);
613
51a727e9
BB
614#ifndef HAVE_SET_FS_PWD
615# ifdef HAVE_2ARGS_SET_FS_PWD
616/* Used from 2.6.25 - 2.6.31+ */
617void
618set_fs_pwd(struct fs_struct *fs, struct path *path)
619{
620 struct path old_pwd;
621
622 write_lock(&fs->lock);
623 old_pwd = fs->pwd;
624 fs->pwd = *path;
625 path_get(path);
626 write_unlock(&fs->lock);
627
628 if (old_pwd.dentry)
629 path_put(&old_pwd);
630}
631# else
632/* Used from 2.6.11 - 2.6.24 */
633void
634set_fs_pwd(struct fs_struct *fs, struct vfsmount *mnt, struct dentry *dentry)
635{
636 struct dentry *old_pwd;
637 struct vfsmount *old_pwdmnt;
638
639 write_lock(&fs->lock);
640 old_pwd = fs->pwd;
641 old_pwdmnt = fs->pwdmnt;
642 fs->pwdmnt = mntget(mnt);
643 fs->pwd = dget(dentry);
644 write_unlock(&fs->lock);
645
646 if (old_pwd) {
647 dput(old_pwd);
648 mntput(old_pwdmnt);
649 }
650}
651# endif /* HAVE_2ARGS_SET_FS_PWD */
652#endif /* HAVE_SET_FS_PWD */
653
654int
655vn_set_pwd(const char *filename)
656{
7119bf70 657#if defined(HAVE_2ARGS_SET_FS_PWD) && defined(HAVE_USER_PATH_DIR)
51a727e9 658 struct path path;
82a358d9
BB
659#else
660 struct nameidata nd;
661#endif /* HAVE_2ARGS_SET_FS_PWD */
662 mm_segment_t saved_fs;
51a727e9 663 int rc;
b17edc10 664 SENTRY;
51a727e9 665
82a358d9
BB
666 /*
667 * user_path_dir() and __user_walk() both expect 'filename' to be
668 * a user space address so we must briefly increase the data segment
669 * size to ensure strncpy_from_user() does not fail with -EFAULT.
670 */
671 saved_fs = get_fs();
672 set_fs(get_ds());
673
674#ifdef HAVE_2ARGS_SET_FS_PWD
7119bf70 675# ifdef HAVE_USER_PATH_DIR
51a727e9
BB
676 rc = user_path_dir(filename, &path);
677 if (rc)
b17edc10 678 SGOTO(out, rc);
51a727e9
BB
679
680 rc = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_ACCESS);
681 if (rc)
b17edc10 682 SGOTO(dput_and_out, rc);
51a727e9
BB
683
684 set_fs_pwd(current->fs, &path);
685
686dput_and_out:
687 path_put(&path);
7119bf70
BB
688# else
689 rc = __user_walk(filename,
690 LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd);
691 if (rc)
b17edc10 692 SGOTO(out, rc);
7119bf70
BB
693
694 rc = vfs_permission(&nd, MAY_EXEC);
695 if (rc)
b17edc10 696 SGOTO(dput_and_out, rc);
7119bf70
BB
697
698 set_fs_pwd(current->fs, &nd.path);
699
700dput_and_out:
701 path_put(&nd.path);
702# endif /* HAVE_USER_PATH_DIR */
51a727e9 703#else
51a727e9
BB
704 rc = __user_walk(filename,
705 LOOKUP_FOLLOW|LOOKUP_DIRECTORY|LOOKUP_CHDIR, &nd);
706 if (rc)
b17edc10 707 SGOTO(out, rc);
51a727e9
BB
708
709 rc = vfs_permission(&nd, MAY_EXEC);
710 if (rc)
b17edc10 711 SGOTO(dput_and_out, rc);
51a727e9
BB
712
713 set_fs_pwd(current->fs, nd.nd_mnt, nd.nd_dentry);
714
715dput_and_out:
716 vn_path_release(&nd);
717#endif /* HAVE_2ARGS_SET_FS_PWD */
718out:
82a358d9
BB
719 set_fs(saved_fs);
720
b17edc10 721 SRETURN(-rc);
51a727e9
BB
722} /* vn_set_pwd() */
723EXPORT_SYMBOL(vn_set_pwd);
724
af828292 725static int
726vn_cache_constructor(void *buf, void *cdrarg, int kmflags)
727{
728 struct vnode *vp = buf;
729
730 mutex_init(&vp->v_lock, NULL, MUTEX_DEFAULT, NULL);
731
732 return (0);
733} /* vn_cache_constructor() */
734
735static void
736vn_cache_destructor(void *buf, void *cdrarg)
737{
738 struct vnode *vp = buf;
739
740 mutex_destroy(&vp->v_lock);
741} /* vn_cache_destructor() */
742
e4f1d29f 743static int
744vn_file_cache_constructor(void *buf, void *cdrarg, int kmflags)
745{
746 file_t *fp = buf;
747
748 atomic_set(&fp->f_ref, 0);
749 mutex_init(&fp->f_lock, NULL, MUTEX_DEFAULT, NULL);
4e62fd41 750 INIT_LIST_HEAD(&fp->f_list);
e4f1d29f 751
752 return (0);
753} /* file_cache_constructor() */
754
755static void
756vn_file_cache_destructor(void *buf, void *cdrarg)
757{
758 file_t *fp = buf;
759
760 mutex_destroy(&fp->f_lock);
761} /* vn_file_cache_destructor() */
762
af828292 763int
764vn_init(void)
765{
b17edc10 766 SENTRY;
57d86234 767 vn_cache = kmem_cache_create("spl_vn_cache",
768 sizeof(struct vnode), 64,
5d86345d 769 vn_cache_constructor,
770 vn_cache_destructor,
af828292 771 NULL, NULL, NULL, 0);
e4f1d29f 772
773 vn_file_cache = kmem_cache_create("spl_vn_file_cache",
774 sizeof(file_t), 64,
775 vn_file_cache_constructor,
776 vn_file_cache_destructor,
777 NULL, NULL, NULL, 0);
b17edc10 778 SRETURN(0);
af828292 779} /* vn_init() */
780
781void
782vn_fini(void)
783{
e4f1d29f 784 file_t *fp, *next_fp;
2fb9b26a 785 int leaked = 0;
b17edc10 786 SENTRY;
e4f1d29f 787
788 spin_lock(&vn_file_lock);
789
790 list_for_each_entry_safe(fp, next_fp, &vn_file_list, f_list) {
791 list_del(&fp->f_list);
792 releasef_locked(fp);
793 leaked++;
794 }
795
2fb9b26a 796 kmem_cache_destroy(vn_file_cache);
e4f1d29f 797 vn_file_cache = NULL;
798 spin_unlock(&vn_file_lock);
799
800 if (leaked > 0)
b17edc10 801 SWARN("Warning %d files leaked\n", leaked);
e4f1d29f 802
2fb9b26a 803 kmem_cache_destroy(vn_cache);
e4f1d29f 804
b17edc10 805 SEXIT;
e4f1d29f 806 return;
af828292 807} /* vn_fini() */