fixes for range locking
[unix-history] / usr / src / sys / ufs / ufs / ufs_vnops.c
CommitLineData
da7c5cc6 1/*
7188ac27
KM
2 * Copyright (c) 1982, 1986, 1989 Regents of the University of California.
3 * All rights reserved.
da7c5cc6 4 *
b702c21d 5 * %sccs.include.redist.c%
7188ac27 6 *
c412cb68 7 * @(#)ufs_vnops.c 7.53 (Berkeley) %G%
da7c5cc6 8 */
6459ebe0 9
94368568
JB
10#include "param.h"
11#include "systm.h"
94368568
JB
12#include "user.h"
13#include "kernel.h"
14#include "file.h"
15#include "stat.h"
94368568
JB
16#include "buf.h"
17#include "proc.h"
94368568
JB
18#include "socket.h"
19#include "socketvar.h"
7188ac27 20#include "conf.h"
94368568 21#include "mount.h"
7188ac27 22#include "vnode.h"
0f93ba7b 23#include "specdev.h"
0b0bf936
KM
24#include "fcntl.h"
25#include "malloc.h"
26#include "../ufs/lockf.h"
4b61628b 27#include "../ufs/quota.h"
7188ac27
KM
28#include "../ufs/inode.h"
29#include "../ufs/fs.h"
3e78e260 30
4f083fd7 31/*
7188ac27 32 * Global vfs data structures for ufs
4f083fd7 33 */
3e78e260 34
7188ac27
KM
35int ufs_lookup(),
36 ufs_create(),
37 ufs_mknod(),
38 ufs_open(),
39 ufs_close(),
40 ufs_access(),
41 ufs_getattr(),
42 ufs_setattr(),
43 ufs_read(),
44 ufs_write(),
45 ufs_ioctl(),
46 ufs_select(),
47 ufs_mmap(),
48 ufs_fsync(),
49 ufs_seek(),
50 ufs_remove(),
51 ufs_link(),
52 ufs_rename(),
53 ufs_mkdir(),
54 ufs_rmdir(),
55 ufs_symlink(),
56 ufs_readdir(),
57 ufs_readlink(),
58 ufs_abortop(),
59 ufs_inactive(),
e8a3816c 60 ufs_reclaim(),
7188ac27
KM
61 ufs_lock(),
62 ufs_unlock(),
63 ufs_bmap(),
e16fa59e 64 ufs_strategy(),
1c3ebc10 65 ufs_print(),
0b0bf936
KM
66 ufs_islocked(),
67 ufs_advlock();
7188ac27
KM
68
69struct vnodeops ufs_vnodeops = {
e16fa59e
KM
70 ufs_lookup, /* lookup */
71 ufs_create, /* create */
72 ufs_mknod, /* mknod */
73 ufs_open, /* open */
74 ufs_close, /* close */
75 ufs_access, /* access */
76 ufs_getattr, /* getattr */
77 ufs_setattr, /* setattr */
78 ufs_read, /* read */
79 ufs_write, /* write */
80 ufs_ioctl, /* ioctl */
81 ufs_select, /* select */
82 ufs_mmap, /* mmap */
83 ufs_fsync, /* fsync */
84 ufs_seek, /* seek */
85 ufs_remove, /* remove */
86 ufs_link, /* link */
87 ufs_rename, /* rename */
88 ufs_mkdir, /* mkdir */
89 ufs_rmdir, /* rmdir */
90 ufs_symlink, /* symlink */
91 ufs_readdir, /* readdir */
92 ufs_readlink, /* readlink */
93 ufs_abortop, /* abortop */
94 ufs_inactive, /* inactive */
95 ufs_reclaim, /* reclaim */
96 ufs_lock, /* lock */
97 ufs_unlock, /* unlock */
98 ufs_bmap, /* bmap */
99 ufs_strategy, /* strategy */
100 ufs_print, /* print */
1c3ebc10 101 ufs_islocked, /* islocked */
0b0bf936 102 ufs_advlock, /* advlock */
7188ac27
KM
103};
104
f09fe6d3
KM
105int spec_lookup(),
106 spec_open(),
24a31b70
KM
107 ufsspec_read(),
108 ufsspec_write(),
f09fe6d3 109 spec_strategy(),
e16fa59e 110 spec_bmap(),
f09fe6d3
KM
111 spec_ioctl(),
112 spec_select(),
24a31b70 113 ufsspec_close(),
0b0bf936 114 spec_advlock(),
f09fe6d3
KM
115 spec_badop(),
116 spec_nullop();
117
118struct vnodeops spec_inodeops = {
86cdabf6
KM
119 spec_lookup, /* lookup */
120 spec_badop, /* create */
121 spec_badop, /* mknod */
122 spec_open, /* open */
24a31b70 123 ufsspec_close, /* close */
86cdabf6
KM
124 ufs_access, /* access */
125 ufs_getattr, /* getattr */
126 ufs_setattr, /* setattr */
24a31b70
KM
127 ufsspec_read, /* read */
128 ufsspec_write, /* write */
86cdabf6
KM
129 spec_ioctl, /* ioctl */
130 spec_select, /* select */
131 spec_badop, /* mmap */
132 spec_nullop, /* fsync */
133 spec_badop, /* seek */
134 spec_badop, /* remove */
135 spec_badop, /* link */
136 spec_badop, /* rename */
137 spec_badop, /* mkdir */
138 spec_badop, /* rmdir */
139 spec_badop, /* symlink */
140 spec_badop, /* readdir */
141 spec_badop, /* readlink */
142 spec_badop, /* abortop */
143 ufs_inactive, /* inactive */
144 ufs_reclaim, /* reclaim */
145 ufs_lock, /* lock */
146 ufs_unlock, /* unlock */
e16fa59e 147 spec_bmap, /* bmap */
86cdabf6 148 spec_strategy, /* strategy */
e16fa59e 149 ufs_print, /* print */
1c3ebc10 150 ufs_islocked, /* islocked */
0b0bf936 151 spec_advlock, /* advlock */
f09fe6d3
KM
152};
153
d1c43d7f
KM
154#ifdef FIFO
155int fifo_lookup(),
156 fifo_open(),
157 ufsfifo_read(),
158 ufsfifo_write(),
159 fifo_bmap(),
160 fifo_ioctl(),
161 fifo_select(),
162 ufsfifo_close(),
163 fifo_print(),
0b0bf936 164 fifo_advlock(),
d1c43d7f
KM
165 fifo_badop(),
166 fifo_nullop();
167
168struct vnodeops fifo_inodeops = {
169 fifo_lookup, /* lookup */
170 fifo_badop, /* create */
171 fifo_badop, /* mknod */
172 fifo_open, /* open */
173 ufsfifo_close, /* close */
174 ufs_access, /* access */
175 ufs_getattr, /* getattr */
176 ufs_setattr, /* setattr */
177 ufsfifo_read, /* read */
178 ufsfifo_write, /* write */
179 fifo_ioctl, /* ioctl */
180 fifo_select, /* select */
181 fifo_badop, /* mmap */
182 fifo_nullop, /* fsync */
183 fifo_badop, /* seek */
184 fifo_badop, /* remove */
185 fifo_badop, /* link */
186 fifo_badop, /* rename */
187 fifo_badop, /* mkdir */
188 fifo_badop, /* rmdir */
189 fifo_badop, /* symlink */
190 fifo_badop, /* readdir */
191 fifo_badop, /* readlink */
192 fifo_badop, /* abortop */
193 ufs_inactive, /* inactive */
194 ufs_reclaim, /* reclaim */
195 ufs_lock, /* lock */
196 ufs_unlock, /* unlock */
197 fifo_bmap, /* bmap */
198 fifo_badop, /* strategy */
199 ufs_print, /* print */
200 ufs_islocked, /* islocked */
0b0bf936 201 fifo_advlock, /* advlock */
d1c43d7f
KM
202};
203#endif /* FIFO */
204
205enum vtype iftovt_tab[16] = {
206 VNON, VFIFO, VCHR, VNON, VDIR, VNON, VBLK, VNON,
207 VREG, VNON, VLNK, VNON, VSOCK, VNON, VNON, VBAD,
7188ac27 208};
d1c43d7f
KM
209int vttoif_tab[9] = {
210 0, IFREG, IFDIR, IFBLK, IFCHR, IFLNK, IFSOCK, IFIFO, IFMT,
7188ac27 211};
3e78e260 212
4f083fd7 213/*
7188ac27 214 * Create a regular file
4f083fd7 215 */
7188ac27
KM
216ufs_create(ndp, vap)
217 struct nameidata *ndp;
218 struct vattr *vap;
3e78e260 219{
7188ac27
KM
220 struct inode *ip;
221 int error;
3e78e260 222
7188ac27
KM
223 if (error = maknode(MAKEIMODE(vap->va_type, vap->va_mode), ndp, &ip))
224 return (error);
225 ndp->ni_vp = ITOV(ip);
226 return (0);
3e78e260
BJ
227}
228
4f083fd7 229/*
7188ac27 230 * Mknod vnode call
4f083fd7 231 */
7188ac27
KM
232/* ARGSUSED */
233ufs_mknod(ndp, vap, cred)
234 struct nameidata *ndp;
235 struct ucred *cred;
236 struct vattr *vap;
3e78e260 237{
f09fe6d3 238 register struct vnode *vp;
7188ac27
KM
239 struct inode *ip;
240 int error;
3e78e260 241
7188ac27
KM
242 if (error = maknode(MAKEIMODE(vap->va_type, vap->va_mode), ndp, &ip))
243 return (error);
d1c43d7f
KM
244 ip->i_flag |= IACC|IUPD|ICHG;
245 if (vap->va_rdev != VNOVAL) {
7188ac27
KM
246 /*
247 * Want to be able to use this to make badblock
248 * inodes, so don't truncate the dev number.
249 */
b373e060 250 ip->i_rdev = vap->va_rdev;
7188ac27 251 }
7188ac27
KM
252 /*
253 * Remove inode so that it will be reloaded by iget and
254 * checked to see if it is an alias of an existing entry
255 * in the inode cache.
256 */
d1c43d7f
KM
257 vp = ITOV(ip);
258 vput(vp);
f09fe6d3
KM
259 vp->v_type = VNON;
260 vgone(vp);
7188ac27 261 return (0);
3e78e260
BJ
262}
263
264/*
7188ac27
KM
265 * Open called.
266 *
267 * Nothing to do.
3e78e260 268 */
7188ac27
KM
269/* ARGSUSED */
270ufs_open(vp, mode, cred)
271 struct vnode *vp;
272 int mode;
273 struct ucred *cred;
3e78e260 274{
3e78e260 275
7188ac27 276 return (0);
3e78e260
BJ
277}
278
279/*
7188ac27
KM
280 * Close called
281 *
282 * Update the times on the inode.
3e78e260 283 */
7188ac27
KM
284/* ARGSUSED */
285ufs_close(vp, fflag, cred)
286 struct vnode *vp;
287 int fflag;
288 struct ucred *cred;
3e78e260 289{
7188ac27 290 register struct inode *ip = VTOI(vp);
3e78e260 291
de67eefc 292 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
7188ac27
KM
293 ITIMES(ip, &time, &time);
294 return (0);
3e78e260
BJ
295}
296
4b61628b
KM
297/*
298 * Check mode permission on inode pointer. Mode is READ, WRITE or EXEC.
299 * The mode is shifted to select the owner/group/other fields. The
300 * super user is granted all permissions.
301 */
7188ac27
KM
302ufs_access(vp, mode, cred)
303 struct vnode *vp;
4b61628b 304 register int mode;
7188ac27 305 struct ucred *cred;
3e78e260 306{
4b61628b
KM
307 register struct inode *ip = VTOI(vp);
308 register gid_t *gp;
309 int i, error;
3e78e260 310
4b61628b
KM
311#ifdef DIAGNOSTIC
312 if (!VOP_ISLOCKED(vp)) {
313 vprint("ufs_access: not locked", vp);
314 panic("ufs_access: not locked");
315 }
316#endif
317#ifdef QUOTA
318 if (mode & VWRITE) {
319 switch (vp->v_type) {
320 case VREG: case VDIR: case VLNK:
321 if (error = getinoquota(ip))
322 return (error);
323 }
324 }
325#endif /* QUOTA */
326 /*
327 * If you're the super-user, you always get access.
328 */
329 if (cred->cr_uid == 0)
330 return (0);
331 /*
332 * Access check is based on only one of owner, group, public.
333 * If not owner, then check group. If not a member of the
334 * group, then check public access.
335 */
336 if (cred->cr_uid != ip->i_uid) {
337 mode >>= 3;
338 gp = cred->cr_groups;
339 for (i = 0; i < cred->cr_ngroups; i++, gp++)
340 if (ip->i_gid == *gp)
341 goto found;
342 mode >>= 3;
343found:
344 ;
345 }
346 if ((ip->i_mode & mode) != 0)
347 return (0);
348 return (EACCES);
3e78e260
BJ
349}
350
7188ac27
KM
351/* ARGSUSED */
352ufs_getattr(vp, vap, cred)
353 struct vnode *vp;
354 register struct vattr *vap;
355 struct ucred *cred;
3e78e260 356{
7188ac27 357 register struct inode *ip = VTOI(vp);
3e78e260 358
7188ac27 359 ITIMES(ip, &time, &time);
3e78e260 360 /*
7188ac27 361 * Copy from inode table
3e78e260 362 */
7188ac27
KM
363 vap->va_fsid = ip->i_dev;
364 vap->va_fileid = ip->i_number;
365 vap->va_mode = ip->i_mode & ~IFMT;
366 vap->va_nlink = ip->i_nlink;
367 vap->va_uid = ip->i_uid;
368 vap->va_gid = ip->i_gid;
369 vap->va_rdev = (dev_t)ip->i_rdev;
4b61628b
KM
370#ifdef tahoe
371 vap->va_size = ip->i_size;
372 vap->va_size_rsv = 0;
373#else
8fae943a 374 vap->va_qsize = ip->i_din.di_qsize;
4b61628b 375#endif
7188ac27 376 vap->va_atime.tv_sec = ip->i_atime;
6ef53d70 377 vap->va_atime.tv_usec = 0;
7188ac27 378 vap->va_mtime.tv_sec = ip->i_mtime;
6ef53d70 379 vap->va_mtime.tv_usec = 0;
7188ac27 380 vap->va_ctime.tv_sec = ip->i_ctime;
6ef53d70 381 vap->va_ctime.tv_usec = 0;
d07fc92a
KM
382 vap->va_flags = ip->i_flags;
383 vap->va_gen = ip->i_gen;
7188ac27
KM
384 /* this doesn't belong here */
385 if (vp->v_type == VBLK)
386 vap->va_blocksize = BLKDEV_IOSIZE;
387 else if (vp->v_type == VCHR)
388 vap->va_blocksize = MAXBSIZE;
8eee8525 389 else
7188ac27 390 vap->va_blocksize = ip->i_fs->fs_bsize;
a61a68d6 391 vap->va_bytes = dbtob(ip->i_blocks);
8fae943a 392 vap->va_bytes_rsv = 0;
7188ac27
KM
393 vap->va_type = vp->v_type;
394 return (0);
3e78e260
BJ
395}
396
397/*
7188ac27 398 * Set attribute vnode op. called from several syscalls
3e78e260 399 */
7188ac27
KM
400ufs_setattr(vp, vap, cred)
401 register struct vnode *vp;
402 register struct vattr *vap;
403 register struct ucred *cred;
3e78e260 404{
7188ac27
KM
405 register struct inode *ip = VTOI(vp);
406 int error = 0;
b4d1aee9 407
7188ac27
KM
408 /*
409 * Check for unsetable attributes.
410 */
411 if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
412 (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
413 (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
d07fc92a 414 ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
7188ac27 415 return (EINVAL);
b4d1aee9 416 }
7188ac27
KM
417 /*
418 * Go through the fields and update iff not VNOVAL.
419 */
420 if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL)
421 if (error = chown1(vp, vap->va_uid, vap->va_gid, cred))
422 return (error);
423 if (vap->va_size != VNOVAL) {
424 if (vp->v_type == VDIR)
425 return (EISDIR);
e16fa59e 426 if (error = itrunc(ip, vap->va_size, 0)) /* XXX IO_SYNC? */
7188ac27 427 return (error);
3e78e260 428 }
7188ac27 429 if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
de412887
KM
430 if (cred->cr_uid != ip->i_uid &&
431 (error = suser(cred, &u.u_acflag)))
432 return (error);
7188ac27
KM
433 if (vap->va_atime.tv_sec != VNOVAL)
434 ip->i_flag |= IACC;
435 if (vap->va_mtime.tv_sec != VNOVAL)
436 ip->i_flag |= IUPD;
437 ip->i_flag |= ICHG;
438 if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1))
439 return (error);
5485e062 440 }
7188ac27
KM
441 if (vap->va_mode != (u_short)VNOVAL)
442 error = chmod1(vp, (int)vap->va_mode, cred);
d07fc92a
KM
443 if (vap->va_flags != VNOVAL) {
444 if (cred->cr_uid != ip->i_uid &&
445 (error = suser(cred, &u.u_acflag)))
446 return (error);
447 if (cred->cr_uid == 0) {
448 ip->i_flags = vap->va_flags;
449 } else {
450 ip->i_flags &= 0xffff0000;
451 ip->i_flags |= (vap->va_flags & 0xffff);
452 }
453 ip->i_flag |= ICHG;
454 }
7188ac27 455 return (error);
528f664c
SL
456}
457
4f083fd7
SL
458/*
459 * Change the mode on a file.
460 * Inode must be locked before calling.
461 */
7188ac27
KM
462chmod1(vp, mode, cred)
463 register struct vnode *vp;
528f664c 464 register int mode;
7188ac27 465 struct ucred *cred;
528f664c 466{
7188ac27 467 register struct inode *ip = VTOI(vp);
de412887 468 int error;
197da11b 469
de412887
KM
470 if (cred->cr_uid != ip->i_uid &&
471 (error = suser(cred, &u.u_acflag)))
472 return (error);
7188ac27 473 if (cred->cr_uid) {
e57b6138 474 if (vp->v_type != VDIR && (mode & ISVTX))
39b5be4c 475 return (EFTYPE);
e57b6138 476 if (!groupmember(ip->i_gid, cred) && (mode & ISGID))
39b5be4c 477 return (EPERM);
f94ceb3b 478 }
39b5be4c 479 ip->i_mode &= ~07777;
7188ac27 480 ip->i_mode |= mode & 07777;
3e78e260 481 ip->i_flag |= ICHG;
7188ac27 482 if ((vp->v_flag & VTEXT) && (ip->i_mode & ISVTX) == 0)
8986c97c 483 (void) vnode_pager_uncache(vp);
47af7174 484 return (0);
5485e062
BJ
485}
486
528f664c
SL
487/*
488 * Perform chown operation on inode ip;
489 * inode must be locked prior to call.
490 */
7188ac27
KM
491chown1(vp, uid, gid, cred)
492 register struct vnode *vp;
493 uid_t uid;
494 gid_t gid;
495 struct ucred *cred;
528f664c 496{
7188ac27 497 register struct inode *ip = VTOI(vp);
4b61628b
KM
498 uid_t ouid;
499 gid_t ogid;
500 int error = 0;
528f664c 501#ifdef QUOTA
4b61628b
KM
502 register int i;
503 long change;
bb1b75f4 504#endif
528f664c 505
7188ac27 506 if (uid == (u_short)VNOVAL)
bb1b75f4 507 uid = ip->i_uid;
7188ac27 508 if (gid == (u_short)VNOVAL)
bb1b75f4 509 gid = ip->i_gid;
18b0bce6
KB
510 /*
511 * If we don't own the file, are trying to change the owner
512 * of the file, or are not a member of the target group,
513 * the caller must be superuser or the call fails.
514 */
7188ac27
KM
515 if ((cred->cr_uid != ip->i_uid || uid != ip->i_uid ||
516 !groupmember((gid_t)gid, cred)) &&
517 (error = suser(cred, &u.u_acflag)))
518 return (error);
4b61628b
KM
519 ouid = ip->i_uid;
520 ogid = ip->i_gid;
bb1b75f4 521#ifdef QUOTA
4b61628b
KM
522 if (error = getinoquota(ip))
523 return (error);
524 if (ouid == uid) {
525 dqrele(vp, ip->i_dquot[USRQUOTA]);
526 ip->i_dquot[USRQUOTA] = NODQUOT;
527 }
528 if (ogid == gid) {
529 dqrele(vp, ip->i_dquot[GRPQUOTA]);
530 ip->i_dquot[GRPQUOTA] = NODQUOT;
531 }
532 change = ip->i_blocks;
533 (void) chkdq(ip, -change, cred, CHOWN);
534 (void) chkiq(ip, -1, cred, CHOWN);
535 for (i = 0; i < MAXQUOTAS; i++) {
536 dqrele(vp, ip->i_dquot[i]);
537 ip->i_dquot[i] = NODQUOT;
538 }
f94ceb3b 539#endif
bb1b75f4
SL
540 ip->i_uid = uid;
541 ip->i_gid = gid;
528f664c 542#ifdef QUOTA
4b61628b
KM
543 if ((error = getinoquota(ip)) == 0) {
544 if (ouid == uid) {
545 dqrele(vp, ip->i_dquot[USRQUOTA]);
546 ip->i_dquot[USRQUOTA] = NODQUOT;
547 }
548 if (ogid == gid) {
549 dqrele(vp, ip->i_dquot[GRPQUOTA]);
550 ip->i_dquot[GRPQUOTA] = NODQUOT;
551 }
552 if ((error = chkdq(ip, change, cred, CHOWN)) == 0) {
553 if ((error = chkiq(ip, 1, cred, CHOWN)) == 0)
722a9b31 554 goto good;
4b61628b
KM
555 else
556 (void) chkdq(ip, -change, cred, CHOWN|FORCE);
557 }
558 for (i = 0; i < MAXQUOTAS; i++) {
559 dqrele(vp, ip->i_dquot[i]);
560 ip->i_dquot[i] = NODQUOT;
561 }
562 }
563 ip->i_uid = ouid;
564 ip->i_gid = ogid;
565 if (getinoquota(ip) == 0) {
566 if (ouid == uid) {
567 dqrele(vp, ip->i_dquot[USRQUOTA]);
568 ip->i_dquot[USRQUOTA] = NODQUOT;
569 }
570 if (ogid == gid) {
571 dqrele(vp, ip->i_dquot[GRPQUOTA]);
572 ip->i_dquot[GRPQUOTA] = NODQUOT;
573 }
722a9b31
KM
574 (void) chkdq(ip, change, cred, FORCE|CHOWN);
575 (void) chkiq(ip, 1, cred, FORCE|CHOWN);
6cb69bbe 576 (void) getinoquota(ip);
4b61628b 577 }
6cb69bbe 578 return (error);
722a9b31 579good:
6cb69bbe
KM
580 if (getinoquota(ip))
581 panic("chown: lost quota");
582#endif /* QUOTA */
4b61628b
KM
583 if (ouid != uid || ogid != gid)
584 ip->i_flag |= ICHG;
585 if (ouid != uid && cred->cr_uid != 0)
586 ip->i_mode &= ~ISUID;
587 if (ogid != gid && cred->cr_uid != 0)
588 ip->i_mode &= ~ISGID;
589 return (0);
d67a03eb
BJ
590}
591
b373e060
KM
592/*
593 * Vnode op for reading.
594 */
595/* ARGSUSED */
596ufs_read(vp, uio, ioflag, cred)
597 struct vnode *vp;
598 register struct uio *uio;
599 int ioflag;
600 struct ucred *cred;
601{
602 register struct inode *ip = VTOI(vp);
603 register struct fs *fs;
604 struct buf *bp;
605 daddr_t lbn, bn, rablock;
20aa076b 606 int size, diff, error = 0;
b373e060
KM
607 long n, on, type;
608
609 if (uio->uio_rw != UIO_READ)
610 panic("ufs_read mode");
611 type = ip->i_mode & IFMT;
612 if (type != IFDIR && type != IFREG && type != IFLNK)
613 panic("ufs_read type");
614 if (uio->uio_resid == 0)
615 return (0);
616 if (uio->uio_offset < 0)
617 return (EINVAL);
618 ip->i_flag |= IACC;
619 fs = ip->i_fs;
620 do {
621 lbn = lblkno(fs, uio->uio_offset);
622 on = blkoff(fs, uio->uio_offset);
623 n = MIN((unsigned)(fs->fs_bsize - on), uio->uio_resid);
624 diff = ip->i_size - uio->uio_offset;
625 if (diff <= 0)
626 return (0);
627 if (diff < n)
628 n = diff;
b373e060 629 size = blksize(fs, ip, lbn);
e16fa59e 630 rablock = lbn + 1;
20aa076b
KM
631 if (vp->v_lastr + 1 == lbn &&
632 lblktosize(fs, rablock) < ip->i_size)
633 error = breada(ITOV(ip), lbn, size, rablock,
634 blksize(fs, ip, rablock), NOCRED, &bp);
b373e060 635 else
e16fa59e 636 error = bread(ITOV(ip), lbn, size, NOCRED, &bp);
de67eefc 637 vp->v_lastr = lbn;
b373e060
KM
638 n = MIN(n, size - bp->b_resid);
639 if (error) {
640 brelse(bp);
641 return (error);
642 }
643 error = uiomove(bp->b_un.b_addr + on, (int)n, uio);
644 if (n + on == fs->fs_bsize || uio->uio_offset == ip->i_size)
645 bp->b_flags |= B_AGE;
646 brelse(bp);
647 } while (error == 0 && uio->uio_resid > 0 && n != 0);
648 return (error);
649}
650
651/*
652 * Vnode op for writing.
653 */
654ufs_write(vp, uio, ioflag, cred)
655 register struct vnode *vp;
656 struct uio *uio;
657 int ioflag;
658 struct ucred *cred;
659{
660 register struct inode *ip = VTOI(vp);
661 register struct fs *fs;
662 struct buf *bp;
663 daddr_t lbn, bn;
664 u_long osize;
8986c97c
KM
665 int n, on, flags;
666 int size, resid, error = 0;
b373e060
KM
667
668 if (uio->uio_rw != UIO_WRITE)
669 panic("ufs_write mode");
670 switch (vp->v_type) {
671 case VREG:
672 if (ioflag & IO_APPEND)
673 uio->uio_offset = ip->i_size;
674 /* fall through */
675 case VLNK:
676 break;
677
678 case VDIR:
679 if ((ioflag & IO_SYNC) == 0)
680 panic("ufs_write nonsync dir write");
681 break;
682
683 default:
684 panic("ufs_write type");
685 }
686 if (uio->uio_offset < 0)
687 return (EINVAL);
688 if (uio->uio_resid == 0)
689 return (0);
690 /*
691 * Maybe this should be above the vnode op call, but so long as
692 * file servers have no limits, i don't think it matters
693 */
694 if (vp->v_type == VREG &&
695 uio->uio_offset + uio->uio_resid >
696 u.u_rlimit[RLIMIT_FSIZE].rlim_cur) {
697 psignal(u.u_procp, SIGXFSZ);
698 return (EFBIG);
699 }
700 resid = uio->uio_resid;
701 osize = ip->i_size;
702 fs = ip->i_fs;
e16fa59e
KM
703 flags = 0;
704 if (ioflag & IO_SYNC)
705 flags = B_SYNC;
b373e060
KM
706 do {
707 lbn = lblkno(fs, uio->uio_offset);
708 on = blkoff(fs, uio->uio_offset);
709 n = MIN((unsigned)(fs->fs_bsize - on), uio->uio_resid);
710 if (n < fs->fs_bsize)
e16fa59e 711 flags |= B_CLRBUF;
b373e060 712 else
e16fa59e
KM
713 flags &= ~B_CLRBUF;
714 if (error = balloc(ip, lbn, (int)(on + n), &bp, flags))
b373e060 715 break;
e16fa59e 716 bn = bp->b_blkno;
8986c97c 717 if (uio->uio_offset + n > ip->i_size) {
b373e060 718 ip->i_size = uio->uio_offset + n;
8986c97c
KM
719 vnode_pager_setsize(vp, ip->i_size);
720 }
b373e060 721 size = blksize(fs, ip, lbn);
8986c97c 722 (void) vnode_pager_uncache(vp);
b373e060 723 n = MIN(n, size - bp->b_resid);
b373e060
KM
724 error = uiomove(bp->b_un.b_addr + on, n, uio);
725 if (ioflag & IO_SYNC)
726 (void) bwrite(bp);
727 else if (n + on == fs->fs_bsize) {
728 bp->b_flags |= B_AGE;
729 bawrite(bp);
730 } else
731 bdwrite(bp);
732 ip->i_flag |= IUPD|ICHG;
733 if (cred->cr_uid != 0)
734 ip->i_mode &= ~(ISUID|ISGID);
735 } while (error == 0 && uio->uio_resid > 0 && n != 0);
736 if (error && (ioflag & IO_UNIT)) {
e16fa59e 737 (void) itrunc(ip, osize, ioflag & IO_SYNC);
b373e060
KM
738 uio->uio_offset -= resid - uio->uio_resid;
739 uio->uio_resid = resid;
740 }
1c05ecaf
KM
741 if (!error && (ioflag & IO_SYNC))
742 error = iupdat(ip, &time, &time, 1);
b373e060
KM
743 return (error);
744}
745
7188ac27
KM
746/* ARGSUSED */
747ufs_ioctl(vp, com, data, fflag, cred)
748 struct vnode *vp;
749 int com;
750 caddr_t data;
751 int fflag;
752 struct ucred *cred;
bb1b75f4 753{
bb1b75f4 754
7188ac27
KM
755 return (ENOTTY);
756}
757
758/* ARGSUSED */
d1c43d7f 759ufs_select(vp, which, fflags, cred)
7188ac27 760 struct vnode *vp;
d1c43d7f 761 int which, fflags;
7188ac27
KM
762 struct ucred *cred;
763{
764
7188ac27 765 return (1); /* XXX */
bb1b75f4 766}
d67a03eb 767
4f083fd7 768/*
7188ac27
KM
769 * Mmap a file
770 *
771 * NB Currently unsupported.
4f083fd7 772 */
7188ac27
KM
773/* ARGSUSED */
774ufs_mmap(vp, fflags, cred)
775 struct vnode *vp;
776 int fflags;
777 struct ucred *cred;
d67a03eb 778{
d67a03eb 779
7188ac27 780 return (EINVAL);
d67a03eb 781}
64d3a787 782
4f083fd7 783/*
7188ac27 784 * Synch an open file.
4f083fd7 785 */
7188ac27 786/* ARGSUSED */
86cdabf6 787ufs_fsync(vp, fflags, cred, waitfor)
7188ac27
KM
788 struct vnode *vp;
789 int fflags;
790 struct ucred *cred;
86cdabf6 791 int waitfor;
528f664c 792{
86cdabf6 793 struct inode *ip = VTOI(vp);
7188ac27 794
7188ac27
KM
795 if (fflags&FWRITE)
796 ip->i_flag |= ICHG;
e16fa59e
KM
797 vflushbuf(vp, waitfor == MNT_WAIT ? B_SYNC : 0);
798 return (iupdat(ip, &time, &time, waitfor == MNT_WAIT));
528f664c
SL
799}
800
4f083fd7 801/*
7188ac27
KM
802 * Seek on a file
803 *
804 * Nothing to do, so just return.
4f083fd7 805 */
7188ac27
KM
806/* ARGSUSED */
807ufs_seek(vp, oldoff, newoff, cred)
808 struct vnode *vp;
809 off_t oldoff, newoff;
810 struct ucred *cred;
528f664c 811{
7188ac27
KM
812
813 return (0);
814}
815
816/*
817 * ufs remove
818 * Hard to avoid races here, especially
819 * in unlinking directories.
820 */
821ufs_remove(ndp)
822 struct nameidata *ndp;
823{
824 register struct inode *ip, *dp;
825 int error;
826
827 ip = VTOI(ndp->ni_vp);
828 dp = VTOI(ndp->ni_dvp);
829 error = dirremove(ndp);
830 if (!error) {
831 ip->i_nlink--;
832 ip->i_flag |= ICHG;
528f664c 833 }
7188ac27
KM
834 if (dp == ip)
835 vrele(ITOV(ip));
836 else
837 iput(ip);
838 iput(dp);
839 return (error);
4f083fd7
SL
840}
841
842/*
7188ac27 843 * link vnode call
4f083fd7 844 */
7188ac27
KM
845ufs_link(vp, ndp)
846 register struct vnode *vp;
847 register struct nameidata *ndp;
4f083fd7 848{
7188ac27
KM
849 register struct inode *ip = VTOI(vp);
850 int error;
4f083fd7 851
986aedaa
KM
852 if ((unsigned short)ip->i_nlink >= LINK_MAX)
853 return (EMLINK);
7188ac27
KM
854 if (ndp->ni_dvp != vp)
855 ILOCK(ip);
7188ac27
KM
856 ip->i_nlink++;
857 ip->i_flag |= ICHG;
858 error = iupdat(ip, &time, &time, 1);
859 if (!error)
860 error = direnter(ip, ndp);
7188ac27
KM
861 if (ndp->ni_dvp != vp)
862 IUNLOCK(ip);
863 if (error) {
864 ip->i_nlink--;
82252d2b 865 ip->i_flag |= ICHG;
7188ac27
KM
866 }
867 return (error);
528f664c
SL
868}
869
4f083fd7
SL
870/*
871 * Rename system call.
872 * rename("foo", "bar");
873 * is essentially
874 * unlink("bar");
875 * link("foo", "bar");
876 * unlink("foo");
877 * but ``atomically''. Can't do full commit without saving state in the
878 * inode on disk which isn't feasible at this time. Best we can do is
879 * always guarantee the target exists.
880 *
881 * Basic algorithm is:
882 *
883 * 1) Bump link count on source while we're linking it to the
7188ac27 884 * target. This also ensure the inode won't be deleted out
68f21562
KM
885 * from underneath us while we work (it may be truncated by
886 * a concurrent `trunc' or `open' for creation).
4f083fd7
SL
887 * 2) Link source to destination. If destination already exists,
888 * delete it first.
68f21562
KM
889 * 3) Unlink source reference to inode if still around. If a
890 * directory was moved and the parent of the destination
4f083fd7
SL
891 * is different from the source, patch the ".." entry in the
892 * directory.
4f083fd7 893 */
7188ac27
KM
894ufs_rename(fndp, tndp)
895 register struct nameidata *fndp, *tndp;
528f664c 896{
4f083fd7 897 register struct inode *ip, *xp, *dp;
68f21562
KM
898 struct dirtemplate dirbuf;
899 int doingdirectory = 0, oldparent = 0, newparent = 0;
a5390dce 900 int error = 0;
4f083fd7 901
7188ac27
KM
902 dp = VTOI(fndp->ni_dvp);
903 ip = VTOI(fndp->ni_vp);
904 ILOCK(ip);
4f083fd7 905 if ((ip->i_mode&IFMT) == IFDIR) {
7188ac27 906 register struct direct *d = &fndp->ni_dent;
4f083fd7 907
4f083fd7 908 /*
046f18d1 909 * Avoid ".", "..", and aliases of "." for obvious reasons.
4f083fd7 910 */
7188ac27
KM
911 if ((d->d_namlen == 1 && d->d_name[0] == '.') || dp == ip ||
912 fndp->ni_isdotdot || (ip->i_flag & IRENAME)) {
66955caf
KM
913 VOP_ABORTOP(tndp);
914 vput(tndp->ni_dvp);
915 if (tndp->ni_vp)
916 vput(tndp->ni_vp);
917 VOP_ABORTOP(fndp);
918 vrele(fndp->ni_dvp);
919 vput(fndp->ni_vp);
7188ac27 920 return (EINVAL);
4f083fd7 921 }
68f21562 922 ip->i_flag |= IRENAME;
4f083fd7
SL
923 oldparent = dp->i_number;
924 doingdirectory++;
925 }
7188ac27 926 vrele(fndp->ni_dvp);
4f083fd7
SL
927
928 /*
929 * 1) Bump link count while we're moving stuff
930 * around. If we crash somewhere before
931 * completing our work, the link count
932 * may be wrong, but correctable.
933 */
934 ip->i_nlink++;
935 ip->i_flag |= ICHG;
7188ac27 936 error = iupdat(ip, &time, &time, 1);
a388503d 937 IUNLOCK(ip);
4f083fd7
SL
938
939 /*
940 * When the target exists, both the directory
7188ac27 941 * and target vnodes are returned locked.
4f083fd7 942 */
7188ac27
KM
943 dp = VTOI(tndp->ni_dvp);
944 xp = NULL;
945 if (tndp->ni_vp)
946 xp = VTOI(tndp->ni_vp);
046f18d1
SL
947 /*
948 * If ".." must be changed (ie the directory gets a new
81552f0f
KM
949 * parent) then the source directory must not be in the
950 * directory heirarchy above the target, as this would
951 * orphan everything below the source directory. Also
952 * the user must have write permission in the source so
953 * as to be able to change "..". We must repeat the call
954 * to namei, as the parent directory is unlocked by the
955 * call to checkpath().
046f18d1 956 */
68f21562
KM
957 if (oldparent != dp->i_number)
958 newparent = dp->i_number;
959 if (doingdirectory && newparent) {
48c3b6e8
KM
960 VOP_LOCK(fndp->ni_vp);
961 error = ufs_access(fndp->ni_vp, VWRITE, tndp->ni_cred);
962 VOP_UNLOCK(fndp->ni_vp);
963 if (error)
81552f0f 964 goto bad;
7188ac27 965 tndp->ni_nameiop = RENAME | LOCKPARENT | LOCKLEAF | NOCACHE;
81552f0f 966 do {
7188ac27 967 dp = VTOI(tndp->ni_dvp);
81552f0f 968 if (xp != NULL)
79cf21e2 969 iput(xp);
7188ac27 970 if (error = checkpath(ip, dp, tndp->ni_cred))
81552f0f 971 goto out;
7188ac27 972 if (error = namei(tndp))
81552f0f 973 goto out;
7188ac27
KM
974 xp = NULL;
975 if (tndp->ni_vp)
976 xp = VTOI(tndp->ni_vp);
977 } while (dp != VTOI(tndp->ni_dvp));
81552f0f 978 }
4f083fd7
SL
979 /*
980 * 2) If target doesn't exist, link the target
981 * to the source and unlink the source.
982 * Otherwise, rewrite the target directory
983 * entry to reference the source inode and
984 * expunge the original entry's existence.
985 */
4f083fd7 986 if (xp == NULL) {
7188ac27
KM
987 if (dp->i_dev != ip->i_dev)
988 panic("rename: EXDEV");
4f083fd7 989 /*
68f21562
KM
990 * Account for ".." in new directory.
991 * When source and destination have the same
992 * parent we don't fool with the link count.
4f083fd7 993 */
68f21562 994 if (doingdirectory && newparent) {
986aedaa
KM
995 if ((unsigned short)dp->i_nlink >= LINK_MAX) {
996 error = EMLINK;
997 goto bad;
998 }
4f083fd7
SL
999 dp->i_nlink++;
1000 dp->i_flag |= ICHG;
986aedaa
KM
1001 if (error = iupdat(dp, &time, &time, 1))
1002 goto bad;
4f083fd7 1003 }
7188ac27 1004 if (error = direnter(ip, tndp))
4f083fd7
SL
1005 goto out;
1006 } else {
7188ac27
KM
1007 if (xp->i_dev != dp->i_dev || xp->i_dev != ip->i_dev)
1008 panic("rename: EXDEV");
e69c3c9c
SL
1009 /*
1010 * Short circuit rename(foo, foo).
1011 */
1012 if (xp->i_number == ip->i_number)
7188ac27 1013 panic("rename: same file");
80cee150
JB
1014 /*
1015 * If the parent directory is "sticky", then the user must
1016 * own the parent directory, or the destination of the rename,
1017 * otherwise the destination may not be changed (except by
1018 * root). This implements append-only directories.
1019 */
7188ac27
KM
1020 if ((dp->i_mode & ISVTX) && tndp->ni_cred->cr_uid != 0 &&
1021 tndp->ni_cred->cr_uid != dp->i_uid &&
1022 xp->i_uid != tndp->ni_cred->cr_uid) {
80cee150
JB
1023 error = EPERM;
1024 goto bad;
1025 }
4f083fd7 1026 /*
a5390dce
SL
1027 * Target must be empty if a directory
1028 * and have no links to it.
4f083fd7
SL
1029 * Also, insure source and target are
1030 * compatible (both directories, or both
1031 * not directories).
1032 */
1033 if ((xp->i_mode&IFMT) == IFDIR) {
7188ac27
KM
1034 if (!dirempty(xp, dp->i_number, tndp->ni_cred) ||
1035 xp->i_nlink > 2) {
a5390dce 1036 error = ENOTEMPTY;
4f083fd7
SL
1037 goto bad;
1038 }
1039 if (!doingdirectory) {
a5390dce 1040 error = ENOTDIR;
4f083fd7
SL
1041 goto bad;
1042 }
7188ac27 1043 cache_purge(ITOV(dp));
4f083fd7 1044 } else if (doingdirectory) {
a5390dce 1045 error = EISDIR;
4f083fd7
SL
1046 goto bad;
1047 }
7188ac27
KM
1048 if (error = dirrewrite(dp, ip, tndp))
1049 goto bad;
a62786b9
KM
1050 /*
1051 * If the target directory is in the same
1052 * directory as the source directory,
1053 * decrement the link count on the parent
1054 * of the target directory.
1055 */
1056 if (doingdirectory && !newparent) {
1057 dp->i_nlink--;
1058 dp->i_flag |= ICHG;
1059 }
7188ac27 1060 vput(ITOV(dp));
4f083fd7 1061 /*
a5390dce
SL
1062 * Adjust the link count of the target to
1063 * reflect the dirrewrite above. If this is
1064 * a directory it is empty and there are
1065 * no links to it, so we can squash the inode and
1066 * any space associated with it. We disallowed
1067 * renaming over top of a directory with links to
68f21562
KM
1068 * it above, as the remaining link would point to
1069 * a directory without "." or ".." entries.
4f083fd7 1070 */
a5390dce 1071 xp->i_nlink--;
4f083fd7 1072 if (doingdirectory) {
a5390dce
SL
1073 if (--xp->i_nlink != 0)
1074 panic("rename: linked directory");
e16fa59e 1075 error = itrunc(xp, (u_long)0, IO_SYNC);
a5390dce 1076 }
4f083fd7 1077 xp->i_flag |= ICHG;
88d931ba 1078 iput(xp);
31db12cb 1079 xp = NULL;
4f083fd7
SL
1080 }
1081
1082 /*
1083 * 3) Unlink the source.
1084 */
7188ac27
KM
1085 fndp->ni_nameiop = DELETE | LOCKPARENT | LOCKLEAF;
1086 (void)namei(fndp);
1087 if (fndp->ni_vp != NULL) {
1088 xp = VTOI(fndp->ni_vp);
1089 dp = VTOI(fndp->ni_dvp);
1090 } else {
d9d75b8f
KM
1091 /*
1092 * From name has disappeared.
1093 */
1094 if (doingdirectory)
1095 panic("rename: lost dir entry");
1096 vrele(ITOV(ip));
1097 return (0);
7188ac27 1098 }
4f083fd7 1099 /*
7188ac27 1100 * Ensure that the directory entry still exists and has not
68f21562
KM
1101 * changed while the new name has been entered. If the source is
1102 * a file then the entry may have been unlinked or renamed. In
1103 * either case there is no further work to be done. If the source
1104 * is a directory then it cannot have been rmdir'ed; its link
1105 * count of three would cause a rmdir to fail with ENOTEMPTY.
7188ac27 1106 * The IRENAME flag ensures that it cannot be moved by another
68f21562 1107 * rename.
4f083fd7 1108 */
4f1a9037 1109 if (xp != ip) {
68f21562 1110 if (doingdirectory)
4f1a9037 1111 panic("rename: lost dir entry");
68f21562 1112 } else {
4f083fd7 1113 /*
68f21562
KM
1114 * If the source is a directory with a
1115 * new parent, the link count of the old
1116 * parent directory must be decremented
1117 * and ".." set to point to the new parent.
4f083fd7 1118 */
68f21562 1119 if (doingdirectory && newparent) {
4f083fd7
SL
1120 dp->i_nlink--;
1121 dp->i_flag |= ICHG;
86cdabf6 1122 error = vn_rdwr(UIO_READ, ITOV(xp), (caddr_t)&dirbuf,
7188ac27 1123 sizeof (struct dirtemplate), (off_t)0,
86cdabf6
KM
1124 UIO_SYSSPACE, IO_NODELOCKED,
1125 tndp->ni_cred, (int *)0);
68f21562
KM
1126 if (error == 0) {
1127 if (dirbuf.dotdot_namlen != 2 ||
1128 dirbuf.dotdot_name[0] != '.' ||
1129 dirbuf.dotdot_name[1] != '.') {
8ad54d9e 1130 dirbad(xp, 12, "rename: mangled dir");
68f21562
KM
1131 } else {
1132 dirbuf.dotdot_ino = newparent;
86cdabf6 1133 (void) vn_rdwr(UIO_WRITE, ITOV(xp),
68f21562
KM
1134 (caddr_t)&dirbuf,
1135 sizeof (struct dirtemplate),
93e273b9 1136 (off_t)0, UIO_SYSSPACE,
86cdabf6 1137 IO_NODELOCKED|IO_SYNC,
7188ac27
KM
1138 tndp->ni_cred, (int *)0);
1139 cache_purge(ITOV(dp));
68f21562
KM
1140 }
1141 }
4f083fd7 1142 }
7188ac27
KM
1143 error = dirremove(fndp);
1144 if (!error) {
68f21562
KM
1145 xp->i_nlink--;
1146 xp->i_flag |= ICHG;
4f083fd7 1147 }
68f21562 1148 xp->i_flag &= ~IRENAME;
4f083fd7 1149 }
4f083fd7 1150 if (dp)
7188ac27 1151 vput(ITOV(dp));
68f21562 1152 if (xp)
7188ac27
KM
1153 vput(ITOV(xp));
1154 vrele(ITOV(ip));
1155 return (error);
a5390dce 1156
4f083fd7 1157bad:
4f083fd7 1158 if (xp)
7188ac27
KM
1159 vput(ITOV(xp));
1160 vput(ITOV(dp));
4f083fd7
SL
1161out:
1162 ip->i_nlink--;
1163 ip->i_flag |= ICHG;
7188ac27
KM
1164 vrele(ITOV(ip));
1165 return (error);
64d3a787 1166}
88a7a62a
SL
1167
1168/*
1169 * A virgin directory (no blushing please).
1170 */
1171struct dirtemplate mastertemplate = {
1172 0, 12, 1, ".",
1173 0, DIRBLKSIZ - 12, 2, ".."
1174};
1175
1176/*
1177 * Mkdir system call
1178 */
7188ac27
KM
1179ufs_mkdir(ndp, vap)
1180 struct nameidata *ndp;
1181 struct vattr *vap;
88a7a62a 1182{
88a7a62a 1183 register struct inode *ip, *dp;
7188ac27
KM
1184 struct inode *tip;
1185 struct vnode *dvp;
88a7a62a 1186 struct dirtemplate dirtemplate;
7188ac27
KM
1187 int error;
1188 int dmode;
1189
1190 dvp = ndp->ni_dvp;
1191 dp = VTOI(dvp);
986aedaa
KM
1192 if ((unsigned short)dp->i_nlink >= LINK_MAX) {
1193 iput(dp);
1194 return (EMLINK);
1195 }
7188ac27
KM
1196 dmode = vap->va_mode&0777;
1197 dmode |= IFDIR;
88a7a62a
SL
1198 /*
1199 * Must simulate part of maknode here
1200 * in order to acquire the inode, but
1201 * not have it entered in the parent
1202 * directory. The entry is made later
1203 * after writing "." and ".." entries out.
1204 */
4b61628b 1205 if (error = ialloc(dp, dirpref(dp->i_fs), dmode, ndp->ni_cred, &tip)) {
88a7a62a 1206 iput(dp);
7188ac27 1207 return (error);
88a7a62a 1208 }
7188ac27 1209 ip = tip;
4b61628b
KM
1210 ip->i_uid = ndp->ni_cred->cr_uid;
1211 ip->i_gid = dp->i_gid;
88a7a62a 1212#ifdef QUOTA
4b61628b
KM
1213 if ((error = getinoquota(ip)) ||
1214 (error = chkiq(ip, 1, ndp->ni_cred, 0))) {
1215 ifree(ip, ip->i_number, dmode);
1216 iput(ip);
1217 iput(dp);
1218 return (error);
1219 }
88a7a62a
SL
1220#endif
1221 ip->i_flag |= IACC|IUPD|ICHG;
7188ac27
KM
1222 ip->i_mode = dmode;
1223 ITOV(ip)->v_type = VDIR; /* Rest init'd in iget() */
88a7a62a 1224 ip->i_nlink = 2;
7188ac27 1225 error = iupdat(ip, &time, &time, 1);
88a7a62a
SL
1226
1227 /*
1228 * Bump link count in parent directory
1229 * to reflect work done below. Should
1230 * be done before reference is created
1231 * so reparation is possible if we crash.
1232 */
1233 dp->i_nlink++;
1234 dp->i_flag |= ICHG;
7188ac27 1235 error = iupdat(dp, &time, &time, 1);
88a7a62a
SL
1236
1237 /*
1238 * Initialize directory with "."
1239 * and ".." from static template.
1240 */
1241 dirtemplate = mastertemplate;
1242 dirtemplate.dot_ino = ip->i_number;
1243 dirtemplate.dotdot_ino = dp->i_number;
86cdabf6 1244 error = vn_rdwr(UIO_WRITE, ITOV(ip), (caddr_t)&dirtemplate,
7188ac27 1245 sizeof (dirtemplate), (off_t)0, UIO_SYSSPACE,
86cdabf6 1246 IO_NODELOCKED|IO_SYNC, ndp->ni_cred, (int *)0);
7188ac27 1247 if (error) {
88a7a62a
SL
1248 dp->i_nlink--;
1249 dp->i_flag |= ICHG;
1250 goto bad;
1251 }
15365e07 1252 if (DIRBLKSIZ > dp->i_fs->fs_fsize) {
7188ac27 1253 panic("mkdir: blksize"); /* XXX - should grow w/balloc() */
15365e07 1254 } else {
23de9f20 1255 ip->i_size = DIRBLKSIZ;
15365e07
KM
1256 ip->i_flag |= ICHG;
1257 }
88a7a62a
SL
1258 /*
1259 * Directory all set up, now
1260 * install the entry for it in
1261 * the parent directory.
1262 */
7188ac27 1263 error = direnter(ip, ndp);
88a7a62a 1264 dp = NULL;
7188ac27 1265 if (error) {
715baff1 1266 ndp->ni_nameiop = LOOKUP | NOCACHE;
7188ac27
KM
1267 error = namei(ndp);
1268 if (!error) {
1269 dp = VTOI(ndp->ni_vp);
88a7a62a
SL
1270 dp->i_nlink--;
1271 dp->i_flag |= ICHG;
1272 }
1273 }
1274bad:
1275 /*
1276 * No need to do an explicit itrunc here,
7188ac27 1277 * vrele will do this for us because we set
88a7a62a
SL
1278 * the link count to 0.
1279 */
7188ac27 1280 if (error) {
88a7a62a
SL
1281 ip->i_nlink = 0;
1282 ip->i_flag |= ICHG;
cbcdacd6
KM
1283 iput(ip);
1284 } else
1285 ndp->ni_vp = ITOV(ip);
88a7a62a
SL
1286 if (dp)
1287 iput(dp);
7188ac27 1288 return (error);
88a7a62a
SL
1289}
1290
1291/*
1292 * Rmdir system call.
1293 */
7188ac27
KM
1294ufs_rmdir(ndp)
1295 register struct nameidata *ndp;
88a7a62a 1296{
88a7a62a 1297 register struct inode *ip, *dp;
7188ac27
KM
1298 int error = 0;
1299
1300 ip = VTOI(ndp->ni_vp);
1301 dp = VTOI(ndp->ni_dvp);
88a7a62a
SL
1302 /*
1303 * No rmdir "." please.
1304 */
1305 if (dp == ip) {
7188ac27 1306 vrele(ITOV(dp));
88a7a62a 1307 iput(ip);
7188ac27 1308 return (EINVAL);
88a7a62a
SL
1309 }
1310 /*
1311 * Verify the directory is empty (and valid).
1312 * (Rmdir ".." won't be valid since
1313 * ".." will contain a reference to
1314 * the current directory and thus be
1315 * non-empty.)
1316 */
7188ac27
KM
1317 if (ip->i_nlink != 2 || !dirempty(ip, dp->i_number, ndp->ni_cred)) {
1318 error = ENOTEMPTY;
88a7a62a
SL
1319 goto out;
1320 }
1321 /*
1322 * Delete reference to directory before purging
1323 * inode. If we crash in between, the directory
1324 * will be reattached to lost+found,
1325 */
7188ac27 1326 if (error = dirremove(ndp))
88a7a62a
SL
1327 goto out;
1328 dp->i_nlink--;
1329 dp->i_flag |= ICHG;
7188ac27 1330 cache_purge(ITOV(dp));
88a7a62a 1331 iput(dp);
7188ac27 1332 ndp->ni_dvp = NULL;
88a7a62a
SL
1333 /*
1334 * Truncate inode. The only stuff left
1335 * in the directory is "." and "..". The
1336 * "." reference is inconsequential since
1337 * we're quashing it. The ".." reference
1338 * has already been adjusted above. We've
1339 * removed the "." reference and the reference
1340 * in the parent directory, but there may be
1341 * other hard links so decrement by 2 and
1342 * worry about them later.
1343 */
1344 ip->i_nlink -= 2;
e16fa59e 1345 error = itrunc(ip, (u_long)0, IO_SYNC);
7188ac27 1346 cache_purge(ITOV(ip));
88a7a62a 1347out:
7188ac27 1348 if (ndp->ni_dvp)
88a7a62a
SL
1349 iput(dp);
1350 iput(ip);
7188ac27 1351 return (error);
88a7a62a
SL
1352}
1353
7188ac27
KM
1354/*
1355 * symlink -- make a symbolic link
1356 */
1357ufs_symlink(ndp, vap, target)
1358 struct nameidata *ndp;
1359 struct vattr *vap;
1360 char *target;
1361{
1362 struct inode *ip;
1363 int error;
1364
1365 error = maknode(IFLNK | vap->va_mode, ndp, &ip);
1366 if (error)
1367 return (error);
86cdabf6
KM
1368 error = vn_rdwr(UIO_WRITE, ITOV(ip), target, strlen(target), (off_t)0,
1369 UIO_SYSSPACE, IO_NODELOCKED, ndp->ni_cred, (int *)0);
7188ac27
KM
1370 iput(ip);
1371 return (error);
1372}
1373
1374/*
1375 * Vnode op for read and write
1376 */
930730fd 1377ufs_readdir(vp, uio, cred, eofflagp)
7188ac27
KM
1378 struct vnode *vp;
1379 register struct uio *uio;
7188ac27 1380 struct ucred *cred;
930730fd 1381 int *eofflagp;
88a7a62a 1382{
86cdabf6 1383 int count, lost, error;
88a7a62a 1384
7188ac27
KM
1385 count = uio->uio_resid;
1386 count &= ~(DIRBLKSIZ - 1);
86cdabf6
KM
1387 lost = uio->uio_resid - count;
1388 if (count < DIRBLKSIZ || (uio->uio_offset & (DIRBLKSIZ -1)))
7188ac27 1389 return (EINVAL);
7188ac27
KM
1390 uio->uio_resid = count;
1391 uio->uio_iov->iov_len = count;
86cdabf6
KM
1392 error = ufs_read(vp, uio, 0, cred);
1393 uio->uio_resid += lost;
930730fd
KM
1394 if ((VTOI(vp)->i_size - uio->uio_offset) <= 0)
1395 *eofflagp = 1;
1396 else
1397 *eofflagp = 0;
7188ac27
KM
1398 return (error);
1399}
1400
1401/*
1402 * Return target name of a symbolic link
1403 */
1404ufs_readlink(vp, uiop, cred)
1405 struct vnode *vp;
1406 struct uio *uiop;
1407 struct ucred *cred;
1408{
1409
86cdabf6 1410 return (ufs_read(vp, uiop, 0, cred));
7188ac27
KM
1411}
1412
1413/*
1414 * Ufs abort op, called after namei() when a CREATE/DELETE isn't actually
66955caf 1415 * done. Nothing to do at the moment.
7188ac27 1416 */
66955caf 1417/* ARGSUSED */
7188ac27 1418ufs_abortop(ndp)
66955caf 1419 struct nameidata *ndp;
7188ac27 1420{
7188ac27 1421
66955caf 1422 return (0);
7188ac27
KM
1423}
1424
1c3ebc10
KM
1425/*
1426 * Lock an inode.
1427 */
7188ac27
KM
1428ufs_lock(vp)
1429 struct vnode *vp;
1430{
1431 register struct inode *ip = VTOI(vp);
1432
1433 ILOCK(ip);
1434 return (0);
1435}
1436
1c3ebc10
KM
1437/*
1438 * Unlock an inode.
1439 */
7188ac27
KM
1440ufs_unlock(vp)
1441 struct vnode *vp;
1442{
1443 register struct inode *ip = VTOI(vp);
1444
1445 if (!(ip->i_flag & ILOCKED))
1446 panic("ufs_unlock NOT LOCKED");
1447 IUNLOCK(ip);
1448 return (0);
1449}
1450
1c3ebc10
KM
1451/*
1452 * Check for a locked inode.
1453 */
1454ufs_islocked(vp)
1455 struct vnode *vp;
1456{
1457
1458 if (VTOI(vp)->i_flag & ILOCKED)
1459 return (1);
1460 return (0);
1461}
1462
7188ac27
KM
1463/*
1464 * Get access to bmap
1465 */
1466ufs_bmap(vp, bn, vpp, bnp)
1467 struct vnode *vp;
1468 daddr_t bn;
1469 struct vnode **vpp;
1470 daddr_t *bnp;
1471{
1472 struct inode *ip = VTOI(vp);
1473
1474 if (vpp != NULL)
1475 *vpp = ip->i_devvp;
1476 if (bnp == NULL)
1477 return (0);
4f1ff475 1478 return (bmap(ip, bn, bnp));
88a7a62a
SL
1479}
1480
1481/*
4f1ff475
KM
1482 * Calculate the logical to physical mapping if not done already,
1483 * then call the device strategy routine.
88a7a62a 1484 */
4f1ff475 1485int checkoverlap = 0;
e16fa59e 1486
7188ac27
KM
1487ufs_strategy(bp)
1488 register struct buf *bp;
88a7a62a 1489{
e16fa59e 1490 register struct inode *ip = VTOI(bp->b_vp);
e16fa59e 1491 struct vnode *vp;
e16fa59e
KM
1492 int error;
1493
1494 if (bp->b_vp->v_type == VBLK || bp->b_vp->v_type == VCHR)
1495 panic("ufs_strategy: spec");
1496 if (bp->b_blkno == bp->b_lblkno) {
1497 if (error = bmap(ip, bp->b_lblkno, &bp->b_blkno))
1498 return (error);
20aa076b 1499 if ((long)bp->b_blkno == -1)
e16fa59e 1500 clrbuf(bp);
e16fa59e 1501 }
20aa076b
KM
1502 if ((long)bp->b_blkno == -1) {
1503 biodone(bp);
e16fa59e 1504 return (0);
20aa076b 1505 }
4f1ff475 1506#ifdef DIAGNOSTIC
e16fa59e 1507 if (checkoverlap) {
4f1ff475
KM
1508 register struct buf *ep;
1509 struct buf *ebp;
1510 daddr_t start, last;
1511
e16fa59e
KM
1512 ebp = &buf[nbuf];
1513 start = bp->b_blkno;
1514 last = start + btodb(bp->b_bcount) - 1;
1515 for (ep = buf; ep < ebp; ep++) {
1516 if (ep == bp || (ep->b_flags & B_INVAL) ||
fcd4f15a 1517 ep->b_vp == NULLVP)
e16fa59e
KM
1518 continue;
1519 if (VOP_BMAP(ep->b_vp, (daddr_t)0, &vp, (daddr_t)0))
1520 continue;
1521 if (vp != ip->i_devvp)
1522 continue;
1523 /* look for overlap */
1524 if (ep->b_bcount == 0 || ep->b_blkno > last ||
1525 ep->b_blkno + btodb(ep->b_bcount) <= start)
1526 continue;
20aa076b
KM
1527 vprint("Disk overlap", vp);
1528 printf("\tstart %d, end %d overlap start %d, end %d\n",
1529 start, last, ep->b_blkno,
1530 ep->b_blkno + btodb(ep->b_bcount) - 1);
4f1ff475 1531 panic("Disk buffer overlap");
e16fa59e
KM
1532 }
1533 }
4f1ff475 1534#endif /* DIAGNOSTIC */
e16fa59e
KM
1535 vp = ip->i_devvp;
1536 bp->b_dev = vp->v_rdev;
1537 (*(vp->v_op->vn_strategy))(bp);
7188ac27
KM
1538 return (0);
1539}
88a7a62a 1540
e16fa59e
KM
1541/*
1542 * Print out the contents of an inode.
1543 */
1544ufs_print(vp)
1545 struct vnode *vp;
1546{
1547 register struct inode *ip = VTOI(vp);
1548
a8f829ed
KM
1549 printf("tag VT_UFS, ino %d, on dev %d, %d", ip->i_number,
1550 major(ip->i_dev), minor(ip->i_dev));
1551#ifdef FIFO
1552 if (vp->v_type == VFIFO)
1553 fifo_printinfo(vp);
1554#endif /* FIFO */
1555 printf("%s\n", (ip->i_flag & ILOCKED) ? " (LOCKED)" : "");
96bae3e0
KM
1556 if (ip->i_spare0 == 0)
1557 return;
1558 printf("\towner pid %d", ip->i_spare0);
1559 if (ip->i_spare1)
1560 printf(" waiting pid %d", ip->i_spare1);
1561 printf("\n");
e16fa59e
KM
1562}
1563
24a31b70
KM
1564/*
1565 * Read wrapper for special devices.
1566 */
1567ufsspec_read(vp, uio, ioflag, cred)
1568 struct vnode *vp;
1569 struct uio *uio;
1570 int ioflag;
1571 struct ucred *cred;
1572{
1573
1574 /*
1575 * Set access flag.
1576 */
1577 VTOI(vp)->i_flag |= IACC;
1578 return (spec_read(vp, uio, ioflag, cred));
1579}
1580
1581/*
1582 * Write wrapper for special devices.
1583 */
1584ufsspec_write(vp, uio, ioflag, cred)
1585 struct vnode *vp;
1586 struct uio *uio;
1587 int ioflag;
1588 struct ucred *cred;
1589{
1590
1591 /*
1592 * Set update and change flags.
1593 */
1594 VTOI(vp)->i_flag |= IUPD|ICHG;
1595 return (spec_write(vp, uio, ioflag, cred));
1596}
1597
1598/*
1599 * Close wrapper for special devices.
1600 *
1601 * Update the times on the inode then do device close.
1602 */
1603ufsspec_close(vp, fflag, cred)
1604 struct vnode *vp;
1605 int fflag;
1606 struct ucred *cred;
1607{
1608 register struct inode *ip = VTOI(vp);
1609
de67eefc 1610 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
24a31b70
KM
1611 ITIMES(ip, &time, &time);
1612 return (spec_close(vp, fflag, cred));
1613}
1614
d1c43d7f
KM
1615#ifdef FIFO
1616/*
1617 * Read wrapper for fifo's
1618 */
1619ufsfifo_read(vp, uio, ioflag, cred)
1620 struct vnode *vp;
1621 struct uio *uio;
1622 int ioflag;
1623 struct ucred *cred;
1624{
1625
1626 /*
1627 * Set access flag.
1628 */
1629 VTOI(vp)->i_flag |= IACC;
1630 return (fifo_read(vp, uio, ioflag, cred));
1631}
1632
1633/*
1634 * Write wrapper for fifo's.
1635 */
1636ufsfifo_write(vp, uio, ioflag, cred)
1637 struct vnode *vp;
1638 struct uio *uio;
1639 int ioflag;
1640 struct ucred *cred;
1641{
1642
1643 /*
1644 * Set update and change flags.
1645 */
1646 VTOI(vp)->i_flag |= IUPD|ICHG;
1647 return (fifo_write(vp, uio, ioflag, cred));
1648}
1649
1650/*
1651 * Close wrapper for fifo's.
1652 *
1653 * Update the times on the inode then do device close.
1654 */
1655ufsfifo_close(vp, fflag, cred)
1656 struct vnode *vp;
1657 int fflag;
1658 struct ucred *cred;
1659{
1660 register struct inode *ip = VTOI(vp);
1661
1662 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
1663 ITIMES(ip, &time, &time);
1664 return (fifo_close(vp, fflag, cred));
1665}
1666#endif /* FIFO */
1667
7188ac27
KM
1668/*
1669 * Make a new file.
1670 */
1671maknode(mode, ndp, ipp)
1672 int mode;
1673 register struct nameidata *ndp;
1674 struct inode **ipp;
1675{
1676 register struct inode *ip;
1677 struct inode *tip;
1678 register struct inode *pdir = VTOI(ndp->ni_dvp);
1679 ino_t ipref;
1680 int error;
1681
1682 *ipp = 0;
4b61628b
KM
1683 if ((mode & IFMT) == 0)
1684 mode |= IFREG;
7188ac27
KM
1685 if ((mode & IFMT) == IFDIR)
1686 ipref = dirpref(pdir->i_fs);
1687 else
1688 ipref = pdir->i_number;
4b61628b 1689 if (error = ialloc(pdir, ipref, mode, ndp->ni_cred, &tip)) {
7188ac27
KM
1690 iput(pdir);
1691 return (error);
1692 }
1693 ip = tip;
4b61628b
KM
1694 ip->i_uid = ndp->ni_cred->cr_uid;
1695 ip->i_gid = pdir->i_gid;
7188ac27 1696#ifdef QUOTA
4b61628b
KM
1697 if ((error = getinoquota(ip)) ||
1698 (error = chkiq(ip, 1, ndp->ni_cred, 0))) {
1699 ifree(ip, ip->i_number, mode);
1700 iput(ip);
1701 iput(pdir);
1702 return (error);
1703 }
7188ac27
KM
1704#endif
1705 ip->i_flag |= IACC|IUPD|ICHG;
7188ac27
KM
1706 ip->i_mode = mode;
1707 ITOV(ip)->v_type = IFTOVT(mode); /* Rest init'd in iget() */
1708 ip->i_nlink = 1;
7188ac27
KM
1709 if ((ip->i_mode & ISGID) && !groupmember(ip->i_gid, ndp->ni_cred) &&
1710 suser(ndp->ni_cred, NULL))
1711 ip->i_mode &= ~ISGID;
7188ac27
KM
1712
1713 /*
1714 * Make sure inode goes to disk before directory entry.
1715 */
4b61628b
KM
1716 if (error = iupdat(ip, &time, &time, 1))
1717 goto bad;
1718 if (error = direnter(ip, ndp)) {
1719 pdir = NULL;
1720 goto bad;
7188ac27
KM
1721 }
1722 *ipp = ip;
1723 return (0);
4b61628b
KM
1724
1725bad:
1726 /*
1727 * Write error occurred trying to update the inode
1728 * or the directory so must deallocate the inode.
1729 */
1730 if (pdir)
1731 iput(pdir);
1732 ip->i_nlink = 0;
1733 ip->i_flag |= ICHG;
1734 iput(ip);
1735 return (error);
88a7a62a 1736}
0b0bf936
KM
1737
1738/*
1739 * Advisory record locking support
1740 */
1741ufs_advlock(vp, id, op, fl, flags)
1742 struct vnode *vp;
1743 caddr_t id;
1744 int op;
1745 register struct flock *fl;
1746 int flags;
1747{
1748 register struct inode *ip = VTOI(vp);
1749 register struct lockf *lock;
1750 off_t start, end;
1751 int error;
1752
1753 /*
1754 * Avoid the common case of unlocking when inode has no locks.
1755 */
1756 if (ip->i_lockf == (struct lockf *)0) {
1757 if (op != F_SETLK) {
1758 fl->l_type = F_UNLCK;
1759 return (0);
1760 }
1761 }
1762 /*
1763 * Convert the flock structure into a start and end.
1764 */
1765 switch (fl->l_whence) {
1766
1767 case SEEK_SET:
1768 case SEEK_CUR:
1769 /*
1770 * Caller is responsible for adding any necessary offset
1771 * when SEEK_CUR is used.
1772 */
1773 start = fl->l_start;
1774 break;
1775
1776 case SEEK_END:
1777 start = ip->i_size + fl->l_start;
1778 break;
1779
1780 default:
1781 return (EINVAL);
1782 }
1783 if (start < 0)
1784 return (EINVAL);
1785 if (fl->l_len == 0)
1786 end = -1;
1787 else
c412cb68 1788 end = start + fl->l_len - 1;
0b0bf936
KM
1789 /*
1790 * Create the lockf structure
1791 */
1792 MALLOC(lock, struct lockf *, sizeof *lock, M_LOCKF, M_WAITOK);
1793 lock->lf_start = start;
1794 lock->lf_end = end;
1795 lock->lf_id = id;
1796 lock->lf_inode = ip;
1797 lock->lf_type = fl->l_type;
1798 lock->lf_next = (struct lockf *)0;
1799 lock->lf_block = (struct lockf *)0;
1800 lock->lf_flags = flags;
1801 /*
1802 * Do the requested operation.
1803 */
1804 switch(op) {
1805 case F_SETLK:
1806 return (ufs_setlock(lock));
1807
1808 case F_UNLCK:
1809 return (ufs_advunlock(lock));
1810
1811 case F_GETLK:
1812 return (ufs_advgetlock(lock, fl));
1813
1814 default:
1815 free(lock, M_LOCKF);
1816 return (EINVAL);
1817 }
1818 /* NOTREACHED */
1819}
1820
1821/*
1822 * This variable controls the maximum number of processes that will
1823 * be checked in doing deadlock detection.
1824 */
1825int maxlockdepth = MAXDEPTH;
1826
1827/*
1828 * Set a byte-range lock.
1829 */
1830ufs_setlock(lock)
1831 register struct lockf *lock;
1832{
1833 register struct inode *ip = lock->lf_inode;
1834 register struct lockf *block;
1835 static char lockstr[] = "lockf";
1836 int priority, error;
1837
1838#ifdef LOCKF_DEBUG
1839 if (lockf_debug & 4)
1840 lf_print("ufs_setlock", lock);
1841#endif /* LOCKF_DEBUG */
1842
1843 /*
1844 * Set the priority
1845 */
1846 priority = PLOCK;
1847 if ((lock->lf_type & F_WRLCK) == 0)
1848 priority += 4;
1849 priority |= PCATCH;
1850 /*
1851 * Scan lock list for this file looking for locks that would block us.
1852 */
1853 while (block = lf_getblock(lock)) {
1854 /*
1855 * Free the structure and return if nonblocking.
1856 */
1857 if ((lock->lf_flags & F_WAIT) == 0) {
1858 free(lock, M_LOCKF);
1859 return (EAGAIN);
1860 }
1861 /*
1862 * We are blocked. Since flock style locks cover
1863 * the whole file, there is no chance for deadlock.
1864 * For byte-range locks we must check for deadlock.
1865 *
1866 * Deadlock detection is done by looking through the
1867 * wait channels to see if there are any cycles that
1868 * involve us. MAXDEPTH is set just to make sure we
1869 * do not go off into neverland.
1870 */
1871 if ((lock->lf_flags & F_POSIX) &&
1872 (block->lf_flags & F_POSIX)) {
1873 register struct proc *wproc;
1874 register struct lockf *waitblock;
1875 int i = 0;
1876
1877 /* The block is waiting on something */
1878 wproc = (struct proc *)block->lf_id;
1879 while (wproc->p_wchan &&
1880 (wproc->p_wmesg == lockstr) &&
1881 (i++ < maxlockdepth)) {
1882 waitblock = (struct lockf *)wproc->p_wchan;
1883 /* Get the owner of the blocking lock */
1884 waitblock = waitblock->lf_next;
1885 if ((waitblock->lf_flags & F_POSIX) == 0)
1886 break;
1887 wproc = (struct proc *)waitblock->lf_id;
1888 if (wproc == (struct proc *)lock->lf_id) {
1889 free(lock, M_LOCKF);
1890 return (EDEADLK);
1891 }
1892 }
1893 }
1894 /*
1895 * Add our lock to the blocked
1896 * list and sleep until we're free.
1897 */
c412cb68 1898#ifdef LOCKF_DEBUG
0b0bf936
KM
1899 if (lockf_debug & 4)
1900 lf_print("ufs_advlock: blocking on", block);
1901#endif /* LOCKF_DEBUG */
1902 /*
1903 * Remember who blocked us (for deadlock detection)
1904 */
1905 lock->lf_next = block;
1906 lf_addblock(block, lock);
1907 if (error = tsleep((caddr_t *)lock, priority, lockstr, 0)) {
1908 free(lock, M_LOCKF);
1909 return (error);
1910 }
1911 }
1912 /*
1913 * No blocks!! Add the lock. Note that addlock will
1914 * downgrade or upgrade any overlapping locks this
1915 * process already owns.
1916 */
c412cb68
KM
1917 lf_addlock(lock);
1918#ifdef LOCKF_DEBUG
1919 if (lockf_debug & 4) {
0b0bf936 1920 lf_print("ufs_advlock: got the lock", lock);
c412cb68
KM
1921 lf_printlist(lock);
1922 }
0b0bf936 1923#endif /* LOCKF_DEBUG */
0b0bf936
KM
1924 return (0);
1925}
1926
1927/*
1928 * Remove a byte-range lock on an inode.
1929 */
1930ufs_advunlock(lock)
1931 struct lockf *lock;
1932{
1933 struct lockf *blocklist;
1934
1935 if (lock->lf_inode->i_lockf == (struct lockf *)0)
1936 return (0);
c412cb68 1937#ifdef LOCKF_DEBUG
0b0bf936
KM
1938 if (lockf_debug & 4)
1939 lf_print("ufs_advunlock", lock);
1940#endif /* LOCKF_DEBUG */
1941 /*
1942 * Generally, find the lock (or an overlap to that lock)
1943 * and remove it (or shrink it), then wakeup anyone we can.
1944 */
1945 blocklist = lf_remove(lock);
c412cb68
KM
1946#ifdef LOCKF_DEBUG
1947 lf_printlist(lock);
1948#endif /* LOCKF_DEBUG */
0b0bf936
KM
1949 FREE(lock, M_LOCKF);
1950 lf_wakelock(blocklist);
1951 return (0);
1952}
1953
1954/*
1955 * Return the blocking pid
1956 */
1957ufs_advgetlock(lock, fl)
1958 register struct lockf *lock;
1959 register struct flock *fl;
1960{
1961 register struct lockf *block;
1962 off_t start, end;
1963
c412cb68 1964#ifdef LOCKF_DEBUG
0b0bf936
KM
1965 if (lockf_debug & 4)
1966 lf_print("ufs_advgetlock", lock);
1967#endif /* LOCKF_DEBUG */
1968
1969 if (block = lf_getblock(lock)) {
1970 fl->l_type = block->lf_type;
1971 fl->l_whence = SEEK_SET;
1972 fl->l_start = block->lf_start;
1973 if (block->lf_end == -1)
1974 fl->l_len = 0;
1975 else
c412cb68 1976 fl->l_len = block->lf_end - block->lf_start + 1;
0b0bf936
KM
1977 if (block->lf_flags & F_POSIX)
1978 fl->l_pid = ((struct proc *)(block->lf_id))->p_pid;
1979 else
1980 fl->l_pid = -1;
1981 }
1982 FREE(lock, M_LOCKF);
1983 return (0);
1984}