if entry is gone, do not try to release the parent
[unix-history] / usr / src / sys / ufs / lfs / lfs_vnops.c
CommitLineData
da7c5cc6 1/*
7188ac27
KM
2 * Copyright (c) 1982, 1986, 1989 Regents of the University of California.
3 * All rights reserved.
da7c5cc6 4 *
b702c21d 5 * %sccs.include.redist.c%
7188ac27 6 *
d9d75b8f 7 * @(#)lfs_vnops.c 7.51 (Berkeley) %G%
da7c5cc6 8 */
6459ebe0 9
94368568
JB
10#include "param.h"
11#include "systm.h"
94368568
JB
12#include "user.h"
13#include "kernel.h"
14#include "file.h"
15#include "stat.h"
94368568
JB
16#include "buf.h"
17#include "proc.h"
94368568
JB
18#include "socket.h"
19#include "socketvar.h"
7188ac27 20#include "conf.h"
94368568 21#include "mount.h"
7188ac27 22#include "vnode.h"
0f93ba7b 23#include "specdev.h"
0b0bf936
KM
24#include "fcntl.h"
25#include "malloc.h"
26#include "../ufs/lockf.h"
4b61628b 27#include "../ufs/quota.h"
7188ac27
KM
28#include "../ufs/inode.h"
29#include "../ufs/fs.h"
3e78e260 30
4f083fd7 31/*
7188ac27 32 * Global vfs data structures for ufs
4f083fd7 33 */
3e78e260 34
7188ac27
KM
35int ufs_lookup(),
36 ufs_create(),
37 ufs_mknod(),
38 ufs_open(),
39 ufs_close(),
40 ufs_access(),
41 ufs_getattr(),
42 ufs_setattr(),
43 ufs_read(),
44 ufs_write(),
45 ufs_ioctl(),
46 ufs_select(),
47 ufs_mmap(),
48 ufs_fsync(),
49 ufs_seek(),
50 ufs_remove(),
51 ufs_link(),
52 ufs_rename(),
53 ufs_mkdir(),
54 ufs_rmdir(),
55 ufs_symlink(),
56 ufs_readdir(),
57 ufs_readlink(),
58 ufs_abortop(),
59 ufs_inactive(),
e8a3816c 60 ufs_reclaim(),
7188ac27
KM
61 ufs_lock(),
62 ufs_unlock(),
63 ufs_bmap(),
e16fa59e 64 ufs_strategy(),
1c3ebc10 65 ufs_print(),
0b0bf936
KM
66 ufs_islocked(),
67 ufs_advlock();
7188ac27
KM
68
69struct vnodeops ufs_vnodeops = {
e16fa59e
KM
70 ufs_lookup, /* lookup */
71 ufs_create, /* create */
72 ufs_mknod, /* mknod */
73 ufs_open, /* open */
74 ufs_close, /* close */
75 ufs_access, /* access */
76 ufs_getattr, /* getattr */
77 ufs_setattr, /* setattr */
78 ufs_read, /* read */
79 ufs_write, /* write */
80 ufs_ioctl, /* ioctl */
81 ufs_select, /* select */
82 ufs_mmap, /* mmap */
83 ufs_fsync, /* fsync */
84 ufs_seek, /* seek */
85 ufs_remove, /* remove */
86 ufs_link, /* link */
87 ufs_rename, /* rename */
88 ufs_mkdir, /* mkdir */
89 ufs_rmdir, /* rmdir */
90 ufs_symlink, /* symlink */
91 ufs_readdir, /* readdir */
92 ufs_readlink, /* readlink */
93 ufs_abortop, /* abortop */
94 ufs_inactive, /* inactive */
95 ufs_reclaim, /* reclaim */
96 ufs_lock, /* lock */
97 ufs_unlock, /* unlock */
98 ufs_bmap, /* bmap */
99 ufs_strategy, /* strategy */
100 ufs_print, /* print */
1c3ebc10 101 ufs_islocked, /* islocked */
0b0bf936 102 ufs_advlock, /* advlock */
7188ac27
KM
103};
104
f09fe6d3
KM
105int spec_lookup(),
106 spec_open(),
24a31b70
KM
107 ufsspec_read(),
108 ufsspec_write(),
f09fe6d3 109 spec_strategy(),
e16fa59e 110 spec_bmap(),
f09fe6d3
KM
111 spec_ioctl(),
112 spec_select(),
24a31b70 113 ufsspec_close(),
0b0bf936 114 spec_advlock(),
f09fe6d3
KM
115 spec_badop(),
116 spec_nullop();
117
118struct vnodeops spec_inodeops = {
86cdabf6
KM
119 spec_lookup, /* lookup */
120 spec_badop, /* create */
121 spec_badop, /* mknod */
122 spec_open, /* open */
24a31b70 123 ufsspec_close, /* close */
86cdabf6
KM
124 ufs_access, /* access */
125 ufs_getattr, /* getattr */
126 ufs_setattr, /* setattr */
24a31b70
KM
127 ufsspec_read, /* read */
128 ufsspec_write, /* write */
86cdabf6
KM
129 spec_ioctl, /* ioctl */
130 spec_select, /* select */
131 spec_badop, /* mmap */
132 spec_nullop, /* fsync */
133 spec_badop, /* seek */
134 spec_badop, /* remove */
135 spec_badop, /* link */
136 spec_badop, /* rename */
137 spec_badop, /* mkdir */
138 spec_badop, /* rmdir */
139 spec_badop, /* symlink */
140 spec_badop, /* readdir */
141 spec_badop, /* readlink */
142 spec_badop, /* abortop */
143 ufs_inactive, /* inactive */
144 ufs_reclaim, /* reclaim */
145 ufs_lock, /* lock */
146 ufs_unlock, /* unlock */
e16fa59e 147 spec_bmap, /* bmap */
86cdabf6 148 spec_strategy, /* strategy */
e16fa59e 149 ufs_print, /* print */
1c3ebc10 150 ufs_islocked, /* islocked */
0b0bf936 151 spec_advlock, /* advlock */
f09fe6d3
KM
152};
153
d1c43d7f
KM
154#ifdef FIFO
155int fifo_lookup(),
156 fifo_open(),
157 ufsfifo_read(),
158 ufsfifo_write(),
159 fifo_bmap(),
160 fifo_ioctl(),
161 fifo_select(),
162 ufsfifo_close(),
163 fifo_print(),
0b0bf936 164 fifo_advlock(),
d1c43d7f
KM
165 fifo_badop(),
166 fifo_nullop();
167
168struct vnodeops fifo_inodeops = {
169 fifo_lookup, /* lookup */
170 fifo_badop, /* create */
171 fifo_badop, /* mknod */
172 fifo_open, /* open */
173 ufsfifo_close, /* close */
174 ufs_access, /* access */
175 ufs_getattr, /* getattr */
176 ufs_setattr, /* setattr */
177 ufsfifo_read, /* read */
178 ufsfifo_write, /* write */
179 fifo_ioctl, /* ioctl */
180 fifo_select, /* select */
181 fifo_badop, /* mmap */
182 fifo_nullop, /* fsync */
183 fifo_badop, /* seek */
184 fifo_badop, /* remove */
185 fifo_badop, /* link */
186 fifo_badop, /* rename */
187 fifo_badop, /* mkdir */
188 fifo_badop, /* rmdir */
189 fifo_badop, /* symlink */
190 fifo_badop, /* readdir */
191 fifo_badop, /* readlink */
192 fifo_badop, /* abortop */
193 ufs_inactive, /* inactive */
194 ufs_reclaim, /* reclaim */
195 ufs_lock, /* lock */
196 ufs_unlock, /* unlock */
197 fifo_bmap, /* bmap */
198 fifo_badop, /* strategy */
199 ufs_print, /* print */
200 ufs_islocked, /* islocked */
0b0bf936 201 fifo_advlock, /* advlock */
d1c43d7f
KM
202};
203#endif /* FIFO */
204
205enum vtype iftovt_tab[16] = {
206 VNON, VFIFO, VCHR, VNON, VDIR, VNON, VBLK, VNON,
207 VREG, VNON, VLNK, VNON, VSOCK, VNON, VNON, VBAD,
7188ac27 208};
d1c43d7f
KM
209int vttoif_tab[9] = {
210 0, IFREG, IFDIR, IFBLK, IFCHR, IFLNK, IFSOCK, IFIFO, IFMT,
7188ac27 211};
3e78e260 212
4f083fd7 213/*
7188ac27 214 * Create a regular file
4f083fd7 215 */
7188ac27
KM
216ufs_create(ndp, vap)
217 struct nameidata *ndp;
218 struct vattr *vap;
3e78e260 219{
7188ac27
KM
220 struct inode *ip;
221 int error;
3e78e260 222
7188ac27
KM
223 if (error = maknode(MAKEIMODE(vap->va_type, vap->va_mode), ndp, &ip))
224 return (error);
225 ndp->ni_vp = ITOV(ip);
226 return (0);
3e78e260
BJ
227}
228
4f083fd7 229/*
7188ac27 230 * Mknod vnode call
4f083fd7 231 */
7188ac27
KM
232/* ARGSUSED */
233ufs_mknod(ndp, vap, cred)
234 struct nameidata *ndp;
235 struct ucred *cred;
236 struct vattr *vap;
3e78e260 237{
f09fe6d3 238 register struct vnode *vp;
7188ac27
KM
239 struct inode *ip;
240 int error;
3e78e260 241
7188ac27
KM
242 if (error = maknode(MAKEIMODE(vap->va_type, vap->va_mode), ndp, &ip))
243 return (error);
d1c43d7f
KM
244 ip->i_flag |= IACC|IUPD|ICHG;
245 if (vap->va_rdev != VNOVAL) {
7188ac27
KM
246 /*
247 * Want to be able to use this to make badblock
248 * inodes, so don't truncate the dev number.
249 */
b373e060 250 ip->i_rdev = vap->va_rdev;
7188ac27 251 }
7188ac27
KM
252 /*
253 * Remove inode so that it will be reloaded by iget and
254 * checked to see if it is an alias of an existing entry
255 * in the inode cache.
256 */
d1c43d7f
KM
257 vp = ITOV(ip);
258 vput(vp);
f09fe6d3
KM
259 vp->v_type = VNON;
260 vgone(vp);
7188ac27 261 return (0);
3e78e260
BJ
262}
263
264/*
7188ac27
KM
265 * Open called.
266 *
267 * Nothing to do.
3e78e260 268 */
7188ac27
KM
269/* ARGSUSED */
270ufs_open(vp, mode, cred)
271 struct vnode *vp;
272 int mode;
273 struct ucred *cred;
3e78e260 274{
3e78e260 275
7188ac27 276 return (0);
3e78e260
BJ
277}
278
279/*
7188ac27
KM
280 * Close called
281 *
282 * Update the times on the inode.
3e78e260 283 */
7188ac27
KM
284/* ARGSUSED */
285ufs_close(vp, fflag, cred)
286 struct vnode *vp;
287 int fflag;
288 struct ucred *cred;
3e78e260 289{
7188ac27 290 register struct inode *ip = VTOI(vp);
3e78e260 291
de67eefc 292 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
7188ac27
KM
293 ITIMES(ip, &time, &time);
294 return (0);
3e78e260
BJ
295}
296
4b61628b
KM
297/*
298 * Check mode permission on inode pointer. Mode is READ, WRITE or EXEC.
299 * The mode is shifted to select the owner/group/other fields. The
300 * super user is granted all permissions.
301 */
7188ac27
KM
302ufs_access(vp, mode, cred)
303 struct vnode *vp;
4b61628b 304 register int mode;
7188ac27 305 struct ucred *cred;
3e78e260 306{
4b61628b
KM
307 register struct inode *ip = VTOI(vp);
308 register gid_t *gp;
309 int i, error;
3e78e260 310
4b61628b
KM
311#ifdef DIAGNOSTIC
312 if (!VOP_ISLOCKED(vp)) {
313 vprint("ufs_access: not locked", vp);
314 panic("ufs_access: not locked");
315 }
316#endif
317#ifdef QUOTA
318 if (mode & VWRITE) {
319 switch (vp->v_type) {
320 case VREG: case VDIR: case VLNK:
321 if (error = getinoquota(ip))
322 return (error);
323 }
324 }
325#endif /* QUOTA */
326 /*
327 * If you're the super-user, you always get access.
328 */
329 if (cred->cr_uid == 0)
330 return (0);
331 /*
332 * Access check is based on only one of owner, group, public.
333 * If not owner, then check group. If not a member of the
334 * group, then check public access.
335 */
336 if (cred->cr_uid != ip->i_uid) {
337 mode >>= 3;
338 gp = cred->cr_groups;
339 for (i = 0; i < cred->cr_ngroups; i++, gp++)
340 if (ip->i_gid == *gp)
341 goto found;
342 mode >>= 3;
343found:
344 ;
345 }
346 if ((ip->i_mode & mode) != 0)
347 return (0);
348 return (EACCES);
3e78e260
BJ
349}
350
7188ac27
KM
351/* ARGSUSED */
352ufs_getattr(vp, vap, cred)
353 struct vnode *vp;
354 register struct vattr *vap;
355 struct ucred *cred;
3e78e260 356{
7188ac27 357 register struct inode *ip = VTOI(vp);
3e78e260 358
7188ac27 359 ITIMES(ip, &time, &time);
3e78e260 360 /*
7188ac27 361 * Copy from inode table
3e78e260 362 */
7188ac27
KM
363 vap->va_fsid = ip->i_dev;
364 vap->va_fileid = ip->i_number;
365 vap->va_mode = ip->i_mode & ~IFMT;
366 vap->va_nlink = ip->i_nlink;
367 vap->va_uid = ip->i_uid;
368 vap->va_gid = ip->i_gid;
369 vap->va_rdev = (dev_t)ip->i_rdev;
4b61628b
KM
370#ifdef tahoe
371 vap->va_size = ip->i_size;
372 vap->va_size_rsv = 0;
373#else
8fae943a 374 vap->va_qsize = ip->i_din.di_qsize;
4b61628b 375#endif
7188ac27 376 vap->va_atime.tv_sec = ip->i_atime;
6ef53d70 377 vap->va_atime.tv_usec = 0;
7188ac27 378 vap->va_mtime.tv_sec = ip->i_mtime;
6ef53d70 379 vap->va_mtime.tv_usec = 0;
7188ac27 380 vap->va_ctime.tv_sec = ip->i_ctime;
6ef53d70 381 vap->va_ctime.tv_usec = 0;
d07fc92a
KM
382 vap->va_flags = ip->i_flags;
383 vap->va_gen = ip->i_gen;
7188ac27
KM
384 /* this doesn't belong here */
385 if (vp->v_type == VBLK)
386 vap->va_blocksize = BLKDEV_IOSIZE;
387 else if (vp->v_type == VCHR)
388 vap->va_blocksize = MAXBSIZE;
8eee8525 389 else
7188ac27 390 vap->va_blocksize = ip->i_fs->fs_bsize;
a61a68d6 391 vap->va_bytes = dbtob(ip->i_blocks);
8fae943a 392 vap->va_bytes_rsv = 0;
7188ac27
KM
393 vap->va_type = vp->v_type;
394 return (0);
3e78e260
BJ
395}
396
397/*
7188ac27 398 * Set attribute vnode op. called from several syscalls
3e78e260 399 */
7188ac27
KM
400ufs_setattr(vp, vap, cred)
401 register struct vnode *vp;
402 register struct vattr *vap;
403 register struct ucred *cred;
3e78e260 404{
7188ac27
KM
405 register struct inode *ip = VTOI(vp);
406 int error = 0;
b4d1aee9 407
7188ac27
KM
408 /*
409 * Check for unsetable attributes.
410 */
411 if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
412 (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
413 (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
d07fc92a 414 ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
7188ac27 415 return (EINVAL);
b4d1aee9 416 }
7188ac27
KM
417 /*
418 * Go through the fields and update iff not VNOVAL.
419 */
420 if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL)
421 if (error = chown1(vp, vap->va_uid, vap->va_gid, cred))
422 return (error);
423 if (vap->va_size != VNOVAL) {
424 if (vp->v_type == VDIR)
425 return (EISDIR);
e16fa59e 426 if (error = itrunc(ip, vap->va_size, 0)) /* XXX IO_SYNC? */
7188ac27 427 return (error);
3e78e260 428 }
7188ac27 429 if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
de412887
KM
430 if (cred->cr_uid != ip->i_uid &&
431 (error = suser(cred, &u.u_acflag)))
432 return (error);
7188ac27
KM
433 if (vap->va_atime.tv_sec != VNOVAL)
434 ip->i_flag |= IACC;
435 if (vap->va_mtime.tv_sec != VNOVAL)
436 ip->i_flag |= IUPD;
437 ip->i_flag |= ICHG;
438 if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1))
439 return (error);
5485e062 440 }
7188ac27
KM
441 if (vap->va_mode != (u_short)VNOVAL)
442 error = chmod1(vp, (int)vap->va_mode, cred);
d07fc92a
KM
443 if (vap->va_flags != VNOVAL) {
444 if (cred->cr_uid != ip->i_uid &&
445 (error = suser(cred, &u.u_acflag)))
446 return (error);
447 if (cred->cr_uid == 0) {
448 ip->i_flags = vap->va_flags;
449 } else {
450 ip->i_flags &= 0xffff0000;
451 ip->i_flags |= (vap->va_flags & 0xffff);
452 }
453 ip->i_flag |= ICHG;
454 }
7188ac27 455 return (error);
528f664c
SL
456}
457
4f083fd7
SL
458/*
459 * Change the mode on a file.
460 * Inode must be locked before calling.
461 */
7188ac27
KM
462chmod1(vp, mode, cred)
463 register struct vnode *vp;
528f664c 464 register int mode;
7188ac27 465 struct ucred *cred;
528f664c 466{
7188ac27 467 register struct inode *ip = VTOI(vp);
de412887 468 int error;
197da11b 469
de412887
KM
470 if (cred->cr_uid != ip->i_uid &&
471 (error = suser(cred, &u.u_acflag)))
472 return (error);
7188ac27 473 if (cred->cr_uid) {
e57b6138 474 if (vp->v_type != VDIR && (mode & ISVTX))
39b5be4c 475 return (EFTYPE);
e57b6138 476 if (!groupmember(ip->i_gid, cred) && (mode & ISGID))
39b5be4c 477 return (EPERM);
f94ceb3b 478 }
39b5be4c 479 ip->i_mode &= ~07777;
7188ac27 480 ip->i_mode |= mode & 07777;
3e78e260 481 ip->i_flag |= ICHG;
7188ac27 482 if ((vp->v_flag & VTEXT) && (ip->i_mode & ISVTX) == 0)
8986c97c 483 (void) vnode_pager_uncache(vp);
47af7174 484 return (0);
5485e062
BJ
485}
486
528f664c
SL
487/*
488 * Perform chown operation on inode ip;
489 * inode must be locked prior to call.
490 */
7188ac27
KM
491chown1(vp, uid, gid, cred)
492 register struct vnode *vp;
493 uid_t uid;
494 gid_t gid;
495 struct ucred *cred;
528f664c 496{
7188ac27 497 register struct inode *ip = VTOI(vp);
4b61628b
KM
498 uid_t ouid;
499 gid_t ogid;
500 int error = 0;
528f664c 501#ifdef QUOTA
4b61628b
KM
502 register int i;
503 long change;
bb1b75f4 504#endif
528f664c 505
7188ac27 506 if (uid == (u_short)VNOVAL)
bb1b75f4 507 uid = ip->i_uid;
7188ac27 508 if (gid == (u_short)VNOVAL)
bb1b75f4 509 gid = ip->i_gid;
18b0bce6
KB
510 /*
511 * If we don't own the file, are trying to change the owner
512 * of the file, or are not a member of the target group,
513 * the caller must be superuser or the call fails.
514 */
7188ac27
KM
515 if ((cred->cr_uid != ip->i_uid || uid != ip->i_uid ||
516 !groupmember((gid_t)gid, cred)) &&
517 (error = suser(cred, &u.u_acflag)))
518 return (error);
4b61628b
KM
519 ouid = ip->i_uid;
520 ogid = ip->i_gid;
bb1b75f4 521#ifdef QUOTA
4b61628b
KM
522 if (error = getinoquota(ip))
523 return (error);
524 if (ouid == uid) {
525 dqrele(vp, ip->i_dquot[USRQUOTA]);
526 ip->i_dquot[USRQUOTA] = NODQUOT;
527 }
528 if (ogid == gid) {
529 dqrele(vp, ip->i_dquot[GRPQUOTA]);
530 ip->i_dquot[GRPQUOTA] = NODQUOT;
531 }
532 change = ip->i_blocks;
533 (void) chkdq(ip, -change, cred, CHOWN);
534 (void) chkiq(ip, -1, cred, CHOWN);
535 for (i = 0; i < MAXQUOTAS; i++) {
536 dqrele(vp, ip->i_dquot[i]);
537 ip->i_dquot[i] = NODQUOT;
538 }
f94ceb3b 539#endif
bb1b75f4
SL
540 ip->i_uid = uid;
541 ip->i_gid = gid;
528f664c 542#ifdef QUOTA
4b61628b
KM
543 if ((error = getinoquota(ip)) == 0) {
544 if (ouid == uid) {
545 dqrele(vp, ip->i_dquot[USRQUOTA]);
546 ip->i_dquot[USRQUOTA] = NODQUOT;
547 }
548 if (ogid == gid) {
549 dqrele(vp, ip->i_dquot[GRPQUOTA]);
550 ip->i_dquot[GRPQUOTA] = NODQUOT;
551 }
552 if ((error = chkdq(ip, change, cred, CHOWN)) == 0) {
553 if ((error = chkiq(ip, 1, cred, CHOWN)) == 0)
722a9b31 554 goto good;
4b61628b
KM
555 else
556 (void) chkdq(ip, -change, cred, CHOWN|FORCE);
557 }
558 for (i = 0; i < MAXQUOTAS; i++) {
559 dqrele(vp, ip->i_dquot[i]);
560 ip->i_dquot[i] = NODQUOT;
561 }
562 }
563 ip->i_uid = ouid;
564 ip->i_gid = ogid;
565 if (getinoquota(ip) == 0) {
566 if (ouid == uid) {
567 dqrele(vp, ip->i_dquot[USRQUOTA]);
568 ip->i_dquot[USRQUOTA] = NODQUOT;
569 }
570 if (ogid == gid) {
571 dqrele(vp, ip->i_dquot[GRPQUOTA]);
572 ip->i_dquot[GRPQUOTA] = NODQUOT;
573 }
722a9b31
KM
574 (void) chkdq(ip, change, cred, FORCE|CHOWN);
575 (void) chkiq(ip, 1, cred, FORCE|CHOWN);
6cb69bbe 576 (void) getinoquota(ip);
4b61628b 577 }
6cb69bbe 578 return (error);
722a9b31 579good:
6cb69bbe
KM
580 if (getinoquota(ip))
581 panic("chown: lost quota");
582#endif /* QUOTA */
4b61628b
KM
583 if (ouid != uid || ogid != gid)
584 ip->i_flag |= ICHG;
585 if (ouid != uid && cred->cr_uid != 0)
586 ip->i_mode &= ~ISUID;
587 if (ogid != gid && cred->cr_uid != 0)
588 ip->i_mode &= ~ISGID;
589 return (0);
d67a03eb
BJ
590}
591
b373e060
KM
592/*
593 * Vnode op for reading.
594 */
595/* ARGSUSED */
596ufs_read(vp, uio, ioflag, cred)
597 struct vnode *vp;
598 register struct uio *uio;
599 int ioflag;
600 struct ucred *cred;
601{
602 register struct inode *ip = VTOI(vp);
603 register struct fs *fs;
604 struct buf *bp;
605 daddr_t lbn, bn, rablock;
20aa076b 606 int size, diff, error = 0;
b373e060
KM
607 long n, on, type;
608
609 if (uio->uio_rw != UIO_READ)
610 panic("ufs_read mode");
611 type = ip->i_mode & IFMT;
612 if (type != IFDIR && type != IFREG && type != IFLNK)
613 panic("ufs_read type");
614 if (uio->uio_resid == 0)
615 return (0);
616 if (uio->uio_offset < 0)
617 return (EINVAL);
618 ip->i_flag |= IACC;
619 fs = ip->i_fs;
620 do {
621 lbn = lblkno(fs, uio->uio_offset);
622 on = blkoff(fs, uio->uio_offset);
623 n = MIN((unsigned)(fs->fs_bsize - on), uio->uio_resid);
624 diff = ip->i_size - uio->uio_offset;
625 if (diff <= 0)
626 return (0);
627 if (diff < n)
628 n = diff;
b373e060 629 size = blksize(fs, ip, lbn);
e16fa59e 630 rablock = lbn + 1;
20aa076b
KM
631 if (vp->v_lastr + 1 == lbn &&
632 lblktosize(fs, rablock) < ip->i_size)
633 error = breada(ITOV(ip), lbn, size, rablock,
634 blksize(fs, ip, rablock), NOCRED, &bp);
b373e060 635 else
e16fa59e 636 error = bread(ITOV(ip), lbn, size, NOCRED, &bp);
de67eefc 637 vp->v_lastr = lbn;
b373e060
KM
638 n = MIN(n, size - bp->b_resid);
639 if (error) {
640 brelse(bp);
641 return (error);
642 }
643 error = uiomove(bp->b_un.b_addr + on, (int)n, uio);
644 if (n + on == fs->fs_bsize || uio->uio_offset == ip->i_size)
645 bp->b_flags |= B_AGE;
646 brelse(bp);
647 } while (error == 0 && uio->uio_resid > 0 && n != 0);
648 return (error);
649}
650
651/*
652 * Vnode op for writing.
653 */
654ufs_write(vp, uio, ioflag, cred)
655 register struct vnode *vp;
656 struct uio *uio;
657 int ioflag;
658 struct ucred *cred;
659{
660 register struct inode *ip = VTOI(vp);
661 register struct fs *fs;
662 struct buf *bp;
663 daddr_t lbn, bn;
664 u_long osize;
8986c97c
KM
665 int n, on, flags;
666 int size, resid, error = 0;
b373e060
KM
667
668 if (uio->uio_rw != UIO_WRITE)
669 panic("ufs_write mode");
670 switch (vp->v_type) {
671 case VREG:
672 if (ioflag & IO_APPEND)
673 uio->uio_offset = ip->i_size;
674 /* fall through */
675 case VLNK:
676 break;
677
678 case VDIR:
679 if ((ioflag & IO_SYNC) == 0)
680 panic("ufs_write nonsync dir write");
681 break;
682
683 default:
684 panic("ufs_write type");
685 }
686 if (uio->uio_offset < 0)
687 return (EINVAL);
688 if (uio->uio_resid == 0)
689 return (0);
690 /*
691 * Maybe this should be above the vnode op call, but so long as
692 * file servers have no limits, i don't think it matters
693 */
694 if (vp->v_type == VREG &&
695 uio->uio_offset + uio->uio_resid >
696 u.u_rlimit[RLIMIT_FSIZE].rlim_cur) {
697 psignal(u.u_procp, SIGXFSZ);
698 return (EFBIG);
699 }
700 resid = uio->uio_resid;
701 osize = ip->i_size;
702 fs = ip->i_fs;
e16fa59e
KM
703 flags = 0;
704 if (ioflag & IO_SYNC)
705 flags = B_SYNC;
b373e060
KM
706 do {
707 lbn = lblkno(fs, uio->uio_offset);
708 on = blkoff(fs, uio->uio_offset);
709 n = MIN((unsigned)(fs->fs_bsize - on), uio->uio_resid);
710 if (n < fs->fs_bsize)
e16fa59e 711 flags |= B_CLRBUF;
b373e060 712 else
e16fa59e
KM
713 flags &= ~B_CLRBUF;
714 if (error = balloc(ip, lbn, (int)(on + n), &bp, flags))
b373e060 715 break;
e16fa59e 716 bn = bp->b_blkno;
8986c97c 717 if (uio->uio_offset + n > ip->i_size) {
b373e060 718 ip->i_size = uio->uio_offset + n;
8986c97c
KM
719 vnode_pager_setsize(vp, ip->i_size);
720 }
b373e060 721 size = blksize(fs, ip, lbn);
8986c97c 722 (void) vnode_pager_uncache(vp);
b373e060 723 n = MIN(n, size - bp->b_resid);
b373e060
KM
724 error = uiomove(bp->b_un.b_addr + on, n, uio);
725 if (ioflag & IO_SYNC)
726 (void) bwrite(bp);
727 else if (n + on == fs->fs_bsize) {
728 bp->b_flags |= B_AGE;
729 bawrite(bp);
730 } else
731 bdwrite(bp);
732 ip->i_flag |= IUPD|ICHG;
733 if (cred->cr_uid != 0)
734 ip->i_mode &= ~(ISUID|ISGID);
735 } while (error == 0 && uio->uio_resid > 0 && n != 0);
736 if (error && (ioflag & IO_UNIT)) {
e16fa59e 737 (void) itrunc(ip, osize, ioflag & IO_SYNC);
b373e060
KM
738 uio->uio_offset -= resid - uio->uio_resid;
739 uio->uio_resid = resid;
740 }
1c05ecaf
KM
741 if (!error && (ioflag & IO_SYNC))
742 error = iupdat(ip, &time, &time, 1);
b373e060
KM
743 return (error);
744}
745
7188ac27
KM
746/* ARGSUSED */
747ufs_ioctl(vp, com, data, fflag, cred)
748 struct vnode *vp;
749 int com;
750 caddr_t data;
751 int fflag;
752 struct ucred *cred;
bb1b75f4 753{
bb1b75f4 754
7188ac27
KM
755 return (ENOTTY);
756}
757
758/* ARGSUSED */
d1c43d7f 759ufs_select(vp, which, fflags, cred)
7188ac27 760 struct vnode *vp;
d1c43d7f 761 int which, fflags;
7188ac27
KM
762 struct ucred *cred;
763{
764
7188ac27 765 return (1); /* XXX */
bb1b75f4 766}
d67a03eb 767
4f083fd7 768/*
7188ac27
KM
769 * Mmap a file
770 *
771 * NB Currently unsupported.
4f083fd7 772 */
7188ac27
KM
773/* ARGSUSED */
774ufs_mmap(vp, fflags, cred)
775 struct vnode *vp;
776 int fflags;
777 struct ucred *cred;
d67a03eb 778{
d67a03eb 779
7188ac27 780 return (EINVAL);
d67a03eb 781}
64d3a787 782
4f083fd7 783/*
7188ac27 784 * Synch an open file.
4f083fd7 785 */
7188ac27 786/* ARGSUSED */
86cdabf6 787ufs_fsync(vp, fflags, cred, waitfor)
7188ac27
KM
788 struct vnode *vp;
789 int fflags;
790 struct ucred *cred;
86cdabf6 791 int waitfor;
528f664c 792{
86cdabf6 793 struct inode *ip = VTOI(vp);
7188ac27 794
7188ac27
KM
795 if (fflags&FWRITE)
796 ip->i_flag |= ICHG;
e16fa59e
KM
797 vflushbuf(vp, waitfor == MNT_WAIT ? B_SYNC : 0);
798 return (iupdat(ip, &time, &time, waitfor == MNT_WAIT));
528f664c
SL
799}
800
4f083fd7 801/*
7188ac27
KM
802 * Seek on a file
803 *
804 * Nothing to do, so just return.
4f083fd7 805 */
7188ac27
KM
806/* ARGSUSED */
807ufs_seek(vp, oldoff, newoff, cred)
808 struct vnode *vp;
809 off_t oldoff, newoff;
810 struct ucred *cred;
528f664c 811{
7188ac27
KM
812
813 return (0);
814}
815
816/*
817 * ufs remove
818 * Hard to avoid races here, especially
819 * in unlinking directories.
820 */
821ufs_remove(ndp)
822 struct nameidata *ndp;
823{
824 register struct inode *ip, *dp;
825 int error;
826
827 ip = VTOI(ndp->ni_vp);
828 dp = VTOI(ndp->ni_dvp);
829 error = dirremove(ndp);
830 if (!error) {
831 ip->i_nlink--;
832 ip->i_flag |= ICHG;
528f664c 833 }
7188ac27
KM
834 if (dp == ip)
835 vrele(ITOV(ip));
836 else
837 iput(ip);
838 iput(dp);
839 return (error);
4f083fd7
SL
840}
841
842/*
7188ac27 843 * link vnode call
4f083fd7 844 */
7188ac27
KM
845ufs_link(vp, ndp)
846 register struct vnode *vp;
847 register struct nameidata *ndp;
4f083fd7 848{
7188ac27
KM
849 register struct inode *ip = VTOI(vp);
850 int error;
4f083fd7 851
7188ac27
KM
852 if (ndp->ni_dvp != vp)
853 ILOCK(ip);
854 if (ip->i_nlink == LINK_MAX - 1) {
855 error = EMLINK;
856 goto out;
857 }
858 ip->i_nlink++;
859 ip->i_flag |= ICHG;
860 error = iupdat(ip, &time, &time, 1);
861 if (!error)
862 error = direnter(ip, ndp);
863out:
864 if (ndp->ni_dvp != vp)
865 IUNLOCK(ip);
866 if (error) {
867 ip->i_nlink--;
82252d2b 868 ip->i_flag |= ICHG;
7188ac27
KM
869 }
870 return (error);
528f664c
SL
871}
872
4f083fd7
SL
873/*
874 * Rename system call.
875 * rename("foo", "bar");
876 * is essentially
877 * unlink("bar");
878 * link("foo", "bar");
879 * unlink("foo");
880 * but ``atomically''. Can't do full commit without saving state in the
881 * inode on disk which isn't feasible at this time. Best we can do is
882 * always guarantee the target exists.
883 *
884 * Basic algorithm is:
885 *
886 * 1) Bump link count on source while we're linking it to the
7188ac27 887 * target. This also ensure the inode won't be deleted out
68f21562
KM
888 * from underneath us while we work (it may be truncated by
889 * a concurrent `trunc' or `open' for creation).
4f083fd7
SL
890 * 2) Link source to destination. If destination already exists,
891 * delete it first.
68f21562
KM
892 * 3) Unlink source reference to inode if still around. If a
893 * directory was moved and the parent of the destination
4f083fd7
SL
894 * is different from the source, patch the ".." entry in the
895 * directory.
4f083fd7 896 */
7188ac27
KM
897ufs_rename(fndp, tndp)
898 register struct nameidata *fndp, *tndp;
528f664c 899{
4f083fd7 900 register struct inode *ip, *xp, *dp;
68f21562
KM
901 struct dirtemplate dirbuf;
902 int doingdirectory = 0, oldparent = 0, newparent = 0;
a5390dce 903 int error = 0;
4f083fd7 904
7188ac27
KM
905 dp = VTOI(fndp->ni_dvp);
906 ip = VTOI(fndp->ni_vp);
907 ILOCK(ip);
4f083fd7 908 if ((ip->i_mode&IFMT) == IFDIR) {
7188ac27 909 register struct direct *d = &fndp->ni_dent;
4f083fd7 910
4f083fd7 911 /*
046f18d1 912 * Avoid ".", "..", and aliases of "." for obvious reasons.
4f083fd7 913 */
7188ac27
KM
914 if ((d->d_namlen == 1 && d->d_name[0] == '.') || dp == ip ||
915 fndp->ni_isdotdot || (ip->i_flag & IRENAME)) {
66955caf
KM
916 VOP_ABORTOP(tndp);
917 vput(tndp->ni_dvp);
918 if (tndp->ni_vp)
919 vput(tndp->ni_vp);
920 VOP_ABORTOP(fndp);
921 vrele(fndp->ni_dvp);
922 vput(fndp->ni_vp);
7188ac27 923 return (EINVAL);
4f083fd7 924 }
68f21562 925 ip->i_flag |= IRENAME;
4f083fd7
SL
926 oldparent = dp->i_number;
927 doingdirectory++;
928 }
7188ac27 929 vrele(fndp->ni_dvp);
4f083fd7
SL
930
931 /*
932 * 1) Bump link count while we're moving stuff
933 * around. If we crash somewhere before
934 * completing our work, the link count
935 * may be wrong, but correctable.
936 */
937 ip->i_nlink++;
938 ip->i_flag |= ICHG;
7188ac27 939 error = iupdat(ip, &time, &time, 1);
a388503d 940 IUNLOCK(ip);
4f083fd7
SL
941
942 /*
943 * When the target exists, both the directory
7188ac27 944 * and target vnodes are returned locked.
4f083fd7 945 */
7188ac27
KM
946 dp = VTOI(tndp->ni_dvp);
947 xp = NULL;
948 if (tndp->ni_vp)
949 xp = VTOI(tndp->ni_vp);
046f18d1
SL
950 /*
951 * If ".." must be changed (ie the directory gets a new
81552f0f
KM
952 * parent) then the source directory must not be in the
953 * directory heirarchy above the target, as this would
954 * orphan everything below the source directory. Also
955 * the user must have write permission in the source so
956 * as to be able to change "..". We must repeat the call
957 * to namei, as the parent directory is unlocked by the
958 * call to checkpath().
046f18d1 959 */
68f21562
KM
960 if (oldparent != dp->i_number)
961 newparent = dp->i_number;
962 if (doingdirectory && newparent) {
48c3b6e8
KM
963 VOP_LOCK(fndp->ni_vp);
964 error = ufs_access(fndp->ni_vp, VWRITE, tndp->ni_cred);
965 VOP_UNLOCK(fndp->ni_vp);
966 if (error)
81552f0f 967 goto bad;
7188ac27 968 tndp->ni_nameiop = RENAME | LOCKPARENT | LOCKLEAF | NOCACHE;
81552f0f 969 do {
7188ac27 970 dp = VTOI(tndp->ni_dvp);
81552f0f 971 if (xp != NULL)
79cf21e2 972 iput(xp);
7188ac27 973 if (error = checkpath(ip, dp, tndp->ni_cred))
81552f0f 974 goto out;
7188ac27 975 if (error = namei(tndp))
81552f0f 976 goto out;
7188ac27
KM
977 xp = NULL;
978 if (tndp->ni_vp)
979 xp = VTOI(tndp->ni_vp);
980 } while (dp != VTOI(tndp->ni_dvp));
81552f0f 981 }
4f083fd7
SL
982 /*
983 * 2) If target doesn't exist, link the target
984 * to the source and unlink the source.
985 * Otherwise, rewrite the target directory
986 * entry to reference the source inode and
987 * expunge the original entry's existence.
988 */
4f083fd7 989 if (xp == NULL) {
7188ac27
KM
990 if (dp->i_dev != ip->i_dev)
991 panic("rename: EXDEV");
4f083fd7 992 /*
68f21562
KM
993 * Account for ".." in new directory.
994 * When source and destination have the same
995 * parent we don't fool with the link count.
4f083fd7 996 */
68f21562 997 if (doingdirectory && newparent) {
4f083fd7
SL
998 dp->i_nlink++;
999 dp->i_flag |= ICHG;
7188ac27 1000 error = iupdat(dp, &time, &time, 1);
4f083fd7 1001 }
7188ac27 1002 if (error = direnter(ip, tndp))
4f083fd7
SL
1003 goto out;
1004 } else {
7188ac27
KM
1005 if (xp->i_dev != dp->i_dev || xp->i_dev != ip->i_dev)
1006 panic("rename: EXDEV");
e69c3c9c
SL
1007 /*
1008 * Short circuit rename(foo, foo).
1009 */
1010 if (xp->i_number == ip->i_number)
7188ac27 1011 panic("rename: same file");
80cee150
JB
1012 /*
1013 * If the parent directory is "sticky", then the user must
1014 * own the parent directory, or the destination of the rename,
1015 * otherwise the destination may not be changed (except by
1016 * root). This implements append-only directories.
1017 */
7188ac27
KM
1018 if ((dp->i_mode & ISVTX) && tndp->ni_cred->cr_uid != 0 &&
1019 tndp->ni_cred->cr_uid != dp->i_uid &&
1020 xp->i_uid != tndp->ni_cred->cr_uid) {
80cee150
JB
1021 error = EPERM;
1022 goto bad;
1023 }
4f083fd7 1024 /*
a5390dce
SL
1025 * Target must be empty if a directory
1026 * and have no links to it.
4f083fd7
SL
1027 * Also, insure source and target are
1028 * compatible (both directories, or both
1029 * not directories).
1030 */
1031 if ((xp->i_mode&IFMT) == IFDIR) {
7188ac27
KM
1032 if (!dirempty(xp, dp->i_number, tndp->ni_cred) ||
1033 xp->i_nlink > 2) {
a5390dce 1034 error = ENOTEMPTY;
4f083fd7
SL
1035 goto bad;
1036 }
1037 if (!doingdirectory) {
a5390dce 1038 error = ENOTDIR;
4f083fd7
SL
1039 goto bad;
1040 }
7188ac27 1041 cache_purge(ITOV(dp));
4f083fd7 1042 } else if (doingdirectory) {
a5390dce 1043 error = EISDIR;
4f083fd7
SL
1044 goto bad;
1045 }
7188ac27
KM
1046 if (error = dirrewrite(dp, ip, tndp))
1047 goto bad;
a62786b9
KM
1048 /*
1049 * If the target directory is in the same
1050 * directory as the source directory,
1051 * decrement the link count on the parent
1052 * of the target directory.
1053 */
1054 if (doingdirectory && !newparent) {
1055 dp->i_nlink--;
1056 dp->i_flag |= ICHG;
1057 }
7188ac27 1058 vput(ITOV(dp));
4f083fd7 1059 /*
a5390dce
SL
1060 * Adjust the link count of the target to
1061 * reflect the dirrewrite above. If this is
1062 * a directory it is empty and there are
1063 * no links to it, so we can squash the inode and
1064 * any space associated with it. We disallowed
1065 * renaming over top of a directory with links to
68f21562
KM
1066 * it above, as the remaining link would point to
1067 * a directory without "." or ".." entries.
4f083fd7 1068 */
a5390dce 1069 xp->i_nlink--;
4f083fd7 1070 if (doingdirectory) {
a5390dce
SL
1071 if (--xp->i_nlink != 0)
1072 panic("rename: linked directory");
e16fa59e 1073 error = itrunc(xp, (u_long)0, IO_SYNC);
a5390dce 1074 }
4f083fd7 1075 xp->i_flag |= ICHG;
88d931ba 1076 iput(xp);
31db12cb 1077 xp = NULL;
4f083fd7
SL
1078 }
1079
1080 /*
1081 * 3) Unlink the source.
1082 */
7188ac27
KM
1083 fndp->ni_nameiop = DELETE | LOCKPARENT | LOCKLEAF;
1084 (void)namei(fndp);
1085 if (fndp->ni_vp != NULL) {
1086 xp = VTOI(fndp->ni_vp);
1087 dp = VTOI(fndp->ni_dvp);
1088 } else {
d9d75b8f
KM
1089 /*
1090 * From name has disappeared.
1091 */
1092 if (doingdirectory)
1093 panic("rename: lost dir entry");
1094 vrele(ITOV(ip));
1095 return (0);
7188ac27 1096 }
4f083fd7 1097 /*
7188ac27 1098 * Ensure that the directory entry still exists and has not
68f21562
KM
1099 * changed while the new name has been entered. If the source is
1100 * a file then the entry may have been unlinked or renamed. In
1101 * either case there is no further work to be done. If the source
1102 * is a directory then it cannot have been rmdir'ed; its link
1103 * count of three would cause a rmdir to fail with ENOTEMPTY.
7188ac27 1104 * The IRENAME flag ensures that it cannot be moved by another
68f21562 1105 * rename.
4f083fd7 1106 */
4f1a9037 1107 if (xp != ip) {
68f21562 1108 if (doingdirectory)
4f1a9037 1109 panic("rename: lost dir entry");
68f21562 1110 } else {
4f083fd7 1111 /*
68f21562
KM
1112 * If the source is a directory with a
1113 * new parent, the link count of the old
1114 * parent directory must be decremented
1115 * and ".." set to point to the new parent.
4f083fd7 1116 */
68f21562 1117 if (doingdirectory && newparent) {
4f083fd7
SL
1118 dp->i_nlink--;
1119 dp->i_flag |= ICHG;
86cdabf6 1120 error = vn_rdwr(UIO_READ, ITOV(xp), (caddr_t)&dirbuf,
7188ac27 1121 sizeof (struct dirtemplate), (off_t)0,
86cdabf6
KM
1122 UIO_SYSSPACE, IO_NODELOCKED,
1123 tndp->ni_cred, (int *)0);
68f21562
KM
1124 if (error == 0) {
1125 if (dirbuf.dotdot_namlen != 2 ||
1126 dirbuf.dotdot_name[0] != '.' ||
1127 dirbuf.dotdot_name[1] != '.') {
8ad54d9e 1128 dirbad(xp, 12, "rename: mangled dir");
68f21562
KM
1129 } else {
1130 dirbuf.dotdot_ino = newparent;
86cdabf6 1131 (void) vn_rdwr(UIO_WRITE, ITOV(xp),
68f21562
KM
1132 (caddr_t)&dirbuf,
1133 sizeof (struct dirtemplate),
93e273b9 1134 (off_t)0, UIO_SYSSPACE,
86cdabf6 1135 IO_NODELOCKED|IO_SYNC,
7188ac27
KM
1136 tndp->ni_cred, (int *)0);
1137 cache_purge(ITOV(dp));
68f21562
KM
1138 }
1139 }
4f083fd7 1140 }
7188ac27
KM
1141 error = dirremove(fndp);
1142 if (!error) {
68f21562
KM
1143 xp->i_nlink--;
1144 xp->i_flag |= ICHG;
4f083fd7 1145 }
68f21562 1146 xp->i_flag &= ~IRENAME;
4f083fd7 1147 }
4f083fd7 1148 if (dp)
7188ac27 1149 vput(ITOV(dp));
68f21562 1150 if (xp)
7188ac27
KM
1151 vput(ITOV(xp));
1152 vrele(ITOV(ip));
1153 return (error);
a5390dce 1154
4f083fd7 1155bad:
4f083fd7 1156 if (xp)
7188ac27
KM
1157 vput(ITOV(xp));
1158 vput(ITOV(dp));
4f083fd7
SL
1159out:
1160 ip->i_nlink--;
1161 ip->i_flag |= ICHG;
7188ac27
KM
1162 vrele(ITOV(ip));
1163 return (error);
64d3a787 1164}
88a7a62a
SL
1165
1166/*
1167 * A virgin directory (no blushing please).
1168 */
1169struct dirtemplate mastertemplate = {
1170 0, 12, 1, ".",
1171 0, DIRBLKSIZ - 12, 2, ".."
1172};
1173
1174/*
1175 * Mkdir system call
1176 */
7188ac27
KM
1177ufs_mkdir(ndp, vap)
1178 struct nameidata *ndp;
1179 struct vattr *vap;
88a7a62a 1180{
88a7a62a 1181 register struct inode *ip, *dp;
7188ac27
KM
1182 struct inode *tip;
1183 struct vnode *dvp;
88a7a62a 1184 struct dirtemplate dirtemplate;
7188ac27
KM
1185 int error;
1186 int dmode;
1187
1188 dvp = ndp->ni_dvp;
1189 dp = VTOI(dvp);
1190 dmode = vap->va_mode&0777;
1191 dmode |= IFDIR;
88a7a62a
SL
1192 /*
1193 * Must simulate part of maknode here
1194 * in order to acquire the inode, but
1195 * not have it entered in the parent
1196 * directory. The entry is made later
1197 * after writing "." and ".." entries out.
1198 */
4b61628b 1199 if (error = ialloc(dp, dirpref(dp->i_fs), dmode, ndp->ni_cred, &tip)) {
88a7a62a 1200 iput(dp);
7188ac27 1201 return (error);
88a7a62a 1202 }
7188ac27 1203 ip = tip;
4b61628b
KM
1204 ip->i_uid = ndp->ni_cred->cr_uid;
1205 ip->i_gid = dp->i_gid;
88a7a62a 1206#ifdef QUOTA
4b61628b
KM
1207 if ((error = getinoquota(ip)) ||
1208 (error = chkiq(ip, 1, ndp->ni_cred, 0))) {
1209 ifree(ip, ip->i_number, dmode);
1210 iput(ip);
1211 iput(dp);
1212 return (error);
1213 }
88a7a62a
SL
1214#endif
1215 ip->i_flag |= IACC|IUPD|ICHG;
7188ac27
KM
1216 ip->i_mode = dmode;
1217 ITOV(ip)->v_type = VDIR; /* Rest init'd in iget() */
88a7a62a 1218 ip->i_nlink = 2;
7188ac27 1219 error = iupdat(ip, &time, &time, 1);
88a7a62a
SL
1220
1221 /*
1222 * Bump link count in parent directory
1223 * to reflect work done below. Should
1224 * be done before reference is created
1225 * so reparation is possible if we crash.
1226 */
1227 dp->i_nlink++;
1228 dp->i_flag |= ICHG;
7188ac27 1229 error = iupdat(dp, &time, &time, 1);
88a7a62a
SL
1230
1231 /*
1232 * Initialize directory with "."
1233 * and ".." from static template.
1234 */
1235 dirtemplate = mastertemplate;
1236 dirtemplate.dot_ino = ip->i_number;
1237 dirtemplate.dotdot_ino = dp->i_number;
86cdabf6 1238 error = vn_rdwr(UIO_WRITE, ITOV(ip), (caddr_t)&dirtemplate,
7188ac27 1239 sizeof (dirtemplate), (off_t)0, UIO_SYSSPACE,
86cdabf6 1240 IO_NODELOCKED|IO_SYNC, ndp->ni_cred, (int *)0);
7188ac27 1241 if (error) {
88a7a62a
SL
1242 dp->i_nlink--;
1243 dp->i_flag |= ICHG;
1244 goto bad;
1245 }
15365e07 1246 if (DIRBLKSIZ > dp->i_fs->fs_fsize) {
7188ac27 1247 panic("mkdir: blksize"); /* XXX - should grow w/balloc() */
15365e07 1248 } else {
23de9f20 1249 ip->i_size = DIRBLKSIZ;
15365e07
KM
1250 ip->i_flag |= ICHG;
1251 }
88a7a62a
SL
1252 /*
1253 * Directory all set up, now
1254 * install the entry for it in
1255 * the parent directory.
1256 */
7188ac27 1257 error = direnter(ip, ndp);
88a7a62a 1258 dp = NULL;
7188ac27 1259 if (error) {
715baff1 1260 ndp->ni_nameiop = LOOKUP | NOCACHE;
7188ac27
KM
1261 error = namei(ndp);
1262 if (!error) {
1263 dp = VTOI(ndp->ni_vp);
88a7a62a
SL
1264 dp->i_nlink--;
1265 dp->i_flag |= ICHG;
1266 }
1267 }
1268bad:
1269 /*
1270 * No need to do an explicit itrunc here,
7188ac27 1271 * vrele will do this for us because we set
88a7a62a
SL
1272 * the link count to 0.
1273 */
7188ac27 1274 if (error) {
88a7a62a
SL
1275 ip->i_nlink = 0;
1276 ip->i_flag |= ICHG;
cbcdacd6
KM
1277 iput(ip);
1278 } else
1279 ndp->ni_vp = ITOV(ip);
88a7a62a
SL
1280 if (dp)
1281 iput(dp);
7188ac27 1282 return (error);
88a7a62a
SL
1283}
1284
1285/*
1286 * Rmdir system call.
1287 */
7188ac27
KM
1288ufs_rmdir(ndp)
1289 register struct nameidata *ndp;
88a7a62a 1290{
88a7a62a 1291 register struct inode *ip, *dp;
7188ac27
KM
1292 int error = 0;
1293
1294 ip = VTOI(ndp->ni_vp);
1295 dp = VTOI(ndp->ni_dvp);
88a7a62a
SL
1296 /*
1297 * No rmdir "." please.
1298 */
1299 if (dp == ip) {
7188ac27 1300 vrele(ITOV(dp));
88a7a62a 1301 iput(ip);
7188ac27 1302 return (EINVAL);
88a7a62a
SL
1303 }
1304 /*
1305 * Verify the directory is empty (and valid).
1306 * (Rmdir ".." won't be valid since
1307 * ".." will contain a reference to
1308 * the current directory and thus be
1309 * non-empty.)
1310 */
7188ac27
KM
1311 if (ip->i_nlink != 2 || !dirempty(ip, dp->i_number, ndp->ni_cred)) {
1312 error = ENOTEMPTY;
88a7a62a
SL
1313 goto out;
1314 }
1315 /*
1316 * Delete reference to directory before purging
1317 * inode. If we crash in between, the directory
1318 * will be reattached to lost+found,
1319 */
7188ac27 1320 if (error = dirremove(ndp))
88a7a62a
SL
1321 goto out;
1322 dp->i_nlink--;
1323 dp->i_flag |= ICHG;
7188ac27 1324 cache_purge(ITOV(dp));
88a7a62a 1325 iput(dp);
7188ac27 1326 ndp->ni_dvp = NULL;
88a7a62a
SL
1327 /*
1328 * Truncate inode. The only stuff left
1329 * in the directory is "." and "..". The
1330 * "." reference is inconsequential since
1331 * we're quashing it. The ".." reference
1332 * has already been adjusted above. We've
1333 * removed the "." reference and the reference
1334 * in the parent directory, but there may be
1335 * other hard links so decrement by 2 and
1336 * worry about them later.
1337 */
1338 ip->i_nlink -= 2;
e16fa59e 1339 error = itrunc(ip, (u_long)0, IO_SYNC);
7188ac27 1340 cache_purge(ITOV(ip));
88a7a62a 1341out:
7188ac27 1342 if (ndp->ni_dvp)
88a7a62a
SL
1343 iput(dp);
1344 iput(ip);
7188ac27 1345 return (error);
88a7a62a
SL
1346}
1347
7188ac27
KM
1348/*
1349 * symlink -- make a symbolic link
1350 */
1351ufs_symlink(ndp, vap, target)
1352 struct nameidata *ndp;
1353 struct vattr *vap;
1354 char *target;
1355{
1356 struct inode *ip;
1357 int error;
1358
1359 error = maknode(IFLNK | vap->va_mode, ndp, &ip);
1360 if (error)
1361 return (error);
86cdabf6
KM
1362 error = vn_rdwr(UIO_WRITE, ITOV(ip), target, strlen(target), (off_t)0,
1363 UIO_SYSSPACE, IO_NODELOCKED, ndp->ni_cred, (int *)0);
7188ac27
KM
1364 iput(ip);
1365 return (error);
1366}
1367
1368/*
1369 * Vnode op for read and write
1370 */
930730fd 1371ufs_readdir(vp, uio, cred, eofflagp)
7188ac27
KM
1372 struct vnode *vp;
1373 register struct uio *uio;
7188ac27 1374 struct ucred *cred;
930730fd 1375 int *eofflagp;
88a7a62a 1376{
86cdabf6 1377 int count, lost, error;
88a7a62a 1378
7188ac27
KM
1379 count = uio->uio_resid;
1380 count &= ~(DIRBLKSIZ - 1);
86cdabf6
KM
1381 lost = uio->uio_resid - count;
1382 if (count < DIRBLKSIZ || (uio->uio_offset & (DIRBLKSIZ -1)))
7188ac27 1383 return (EINVAL);
7188ac27
KM
1384 uio->uio_resid = count;
1385 uio->uio_iov->iov_len = count;
86cdabf6
KM
1386 error = ufs_read(vp, uio, 0, cred);
1387 uio->uio_resid += lost;
930730fd
KM
1388 if ((VTOI(vp)->i_size - uio->uio_offset) <= 0)
1389 *eofflagp = 1;
1390 else
1391 *eofflagp = 0;
7188ac27
KM
1392 return (error);
1393}
1394
1395/*
1396 * Return target name of a symbolic link
1397 */
1398ufs_readlink(vp, uiop, cred)
1399 struct vnode *vp;
1400 struct uio *uiop;
1401 struct ucred *cred;
1402{
1403
86cdabf6 1404 return (ufs_read(vp, uiop, 0, cred));
7188ac27
KM
1405}
1406
1407/*
1408 * Ufs abort op, called after namei() when a CREATE/DELETE isn't actually
66955caf 1409 * done. Nothing to do at the moment.
7188ac27 1410 */
66955caf 1411/* ARGSUSED */
7188ac27 1412ufs_abortop(ndp)
66955caf 1413 struct nameidata *ndp;
7188ac27 1414{
7188ac27 1415
66955caf 1416 return (0);
7188ac27
KM
1417}
1418
1c3ebc10
KM
1419/*
1420 * Lock an inode.
1421 */
7188ac27
KM
1422ufs_lock(vp)
1423 struct vnode *vp;
1424{
1425 register struct inode *ip = VTOI(vp);
1426
1427 ILOCK(ip);
1428 return (0);
1429}
1430
1c3ebc10
KM
1431/*
1432 * Unlock an inode.
1433 */
7188ac27
KM
1434ufs_unlock(vp)
1435 struct vnode *vp;
1436{
1437 register struct inode *ip = VTOI(vp);
1438
1439 if (!(ip->i_flag & ILOCKED))
1440 panic("ufs_unlock NOT LOCKED");
1441 IUNLOCK(ip);
1442 return (0);
1443}
1444
1c3ebc10
KM
1445/*
1446 * Check for a locked inode.
1447 */
1448ufs_islocked(vp)
1449 struct vnode *vp;
1450{
1451
1452 if (VTOI(vp)->i_flag & ILOCKED)
1453 return (1);
1454 return (0);
1455}
1456
7188ac27
KM
1457/*
1458 * Get access to bmap
1459 */
1460ufs_bmap(vp, bn, vpp, bnp)
1461 struct vnode *vp;
1462 daddr_t bn;
1463 struct vnode **vpp;
1464 daddr_t *bnp;
1465{
1466 struct inode *ip = VTOI(vp);
1467
1468 if (vpp != NULL)
1469 *vpp = ip->i_devvp;
1470 if (bnp == NULL)
1471 return (0);
4f1ff475 1472 return (bmap(ip, bn, bnp));
88a7a62a
SL
1473}
1474
1475/*
4f1ff475
KM
1476 * Calculate the logical to physical mapping if not done already,
1477 * then call the device strategy routine.
88a7a62a 1478 */
4f1ff475 1479int checkoverlap = 0;
e16fa59e 1480
7188ac27
KM
1481ufs_strategy(bp)
1482 register struct buf *bp;
88a7a62a 1483{
e16fa59e 1484 register struct inode *ip = VTOI(bp->b_vp);
e16fa59e 1485 struct vnode *vp;
e16fa59e
KM
1486 int error;
1487
1488 if (bp->b_vp->v_type == VBLK || bp->b_vp->v_type == VCHR)
1489 panic("ufs_strategy: spec");
1490 if (bp->b_blkno == bp->b_lblkno) {
1491 if (error = bmap(ip, bp->b_lblkno, &bp->b_blkno))
1492 return (error);
20aa076b 1493 if ((long)bp->b_blkno == -1)
e16fa59e 1494 clrbuf(bp);
e16fa59e 1495 }
20aa076b
KM
1496 if ((long)bp->b_blkno == -1) {
1497 biodone(bp);
e16fa59e 1498 return (0);
20aa076b 1499 }
4f1ff475 1500#ifdef DIAGNOSTIC
e16fa59e 1501 if (checkoverlap) {
4f1ff475
KM
1502 register struct buf *ep;
1503 struct buf *ebp;
1504 daddr_t start, last;
1505
e16fa59e
KM
1506 ebp = &buf[nbuf];
1507 start = bp->b_blkno;
1508 last = start + btodb(bp->b_bcount) - 1;
1509 for (ep = buf; ep < ebp; ep++) {
1510 if (ep == bp || (ep->b_flags & B_INVAL) ||
fcd4f15a 1511 ep->b_vp == NULLVP)
e16fa59e
KM
1512 continue;
1513 if (VOP_BMAP(ep->b_vp, (daddr_t)0, &vp, (daddr_t)0))
1514 continue;
1515 if (vp != ip->i_devvp)
1516 continue;
1517 /* look for overlap */
1518 if (ep->b_bcount == 0 || ep->b_blkno > last ||
1519 ep->b_blkno + btodb(ep->b_bcount) <= start)
1520 continue;
20aa076b
KM
1521 vprint("Disk overlap", vp);
1522 printf("\tstart %d, end %d overlap start %d, end %d\n",
1523 start, last, ep->b_blkno,
1524 ep->b_blkno + btodb(ep->b_bcount) - 1);
4f1ff475 1525 panic("Disk buffer overlap");
e16fa59e
KM
1526 }
1527 }
4f1ff475 1528#endif /* DIAGNOSTIC */
e16fa59e
KM
1529 vp = ip->i_devvp;
1530 bp->b_dev = vp->v_rdev;
1531 (*(vp->v_op->vn_strategy))(bp);
7188ac27
KM
1532 return (0);
1533}
88a7a62a 1534
e16fa59e
KM
1535/*
1536 * Print out the contents of an inode.
1537 */
1538ufs_print(vp)
1539 struct vnode *vp;
1540{
1541 register struct inode *ip = VTOI(vp);
1542
a8f829ed
KM
1543 printf("tag VT_UFS, ino %d, on dev %d, %d", ip->i_number,
1544 major(ip->i_dev), minor(ip->i_dev));
1545#ifdef FIFO
1546 if (vp->v_type == VFIFO)
1547 fifo_printinfo(vp);
1548#endif /* FIFO */
1549 printf("%s\n", (ip->i_flag & ILOCKED) ? " (LOCKED)" : "");
96bae3e0
KM
1550 if (ip->i_spare0 == 0)
1551 return;
1552 printf("\towner pid %d", ip->i_spare0);
1553 if (ip->i_spare1)
1554 printf(" waiting pid %d", ip->i_spare1);
1555 printf("\n");
e16fa59e
KM
1556}
1557
24a31b70
KM
1558/*
1559 * Read wrapper for special devices.
1560 */
1561ufsspec_read(vp, uio, ioflag, cred)
1562 struct vnode *vp;
1563 struct uio *uio;
1564 int ioflag;
1565 struct ucred *cred;
1566{
1567
1568 /*
1569 * Set access flag.
1570 */
1571 VTOI(vp)->i_flag |= IACC;
1572 return (spec_read(vp, uio, ioflag, cred));
1573}
1574
1575/*
1576 * Write wrapper for special devices.
1577 */
1578ufsspec_write(vp, uio, ioflag, cred)
1579 struct vnode *vp;
1580 struct uio *uio;
1581 int ioflag;
1582 struct ucred *cred;
1583{
1584
1585 /*
1586 * Set update and change flags.
1587 */
1588 VTOI(vp)->i_flag |= IUPD|ICHG;
1589 return (spec_write(vp, uio, ioflag, cred));
1590}
1591
1592/*
1593 * Close wrapper for special devices.
1594 *
1595 * Update the times on the inode then do device close.
1596 */
1597ufsspec_close(vp, fflag, cred)
1598 struct vnode *vp;
1599 int fflag;
1600 struct ucred *cred;
1601{
1602 register struct inode *ip = VTOI(vp);
1603
de67eefc 1604 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
24a31b70
KM
1605 ITIMES(ip, &time, &time);
1606 return (spec_close(vp, fflag, cred));
1607}
1608
d1c43d7f
KM
1609#ifdef FIFO
1610/*
1611 * Read wrapper for fifo's
1612 */
1613ufsfifo_read(vp, uio, ioflag, cred)
1614 struct vnode *vp;
1615 struct uio *uio;
1616 int ioflag;
1617 struct ucred *cred;
1618{
1619
1620 /*
1621 * Set access flag.
1622 */
1623 VTOI(vp)->i_flag |= IACC;
1624 return (fifo_read(vp, uio, ioflag, cred));
1625}
1626
1627/*
1628 * Write wrapper for fifo's.
1629 */
1630ufsfifo_write(vp, uio, ioflag, cred)
1631 struct vnode *vp;
1632 struct uio *uio;
1633 int ioflag;
1634 struct ucred *cred;
1635{
1636
1637 /*
1638 * Set update and change flags.
1639 */
1640 VTOI(vp)->i_flag |= IUPD|ICHG;
1641 return (fifo_write(vp, uio, ioflag, cred));
1642}
1643
1644/*
1645 * Close wrapper for fifo's.
1646 *
1647 * Update the times on the inode then do device close.
1648 */
1649ufsfifo_close(vp, fflag, cred)
1650 struct vnode *vp;
1651 int fflag;
1652 struct ucred *cred;
1653{
1654 register struct inode *ip = VTOI(vp);
1655
1656 if (vp->v_usecount > 1 && !(ip->i_flag & ILOCKED))
1657 ITIMES(ip, &time, &time);
1658 return (fifo_close(vp, fflag, cred));
1659}
1660#endif /* FIFO */
1661
7188ac27
KM
1662/*
1663 * Make a new file.
1664 */
1665maknode(mode, ndp, ipp)
1666 int mode;
1667 register struct nameidata *ndp;
1668 struct inode **ipp;
1669{
1670 register struct inode *ip;
1671 struct inode *tip;
1672 register struct inode *pdir = VTOI(ndp->ni_dvp);
1673 ino_t ipref;
1674 int error;
1675
1676 *ipp = 0;
4b61628b
KM
1677 if ((mode & IFMT) == 0)
1678 mode |= IFREG;
7188ac27
KM
1679 if ((mode & IFMT) == IFDIR)
1680 ipref = dirpref(pdir->i_fs);
1681 else
1682 ipref = pdir->i_number;
4b61628b 1683 if (error = ialloc(pdir, ipref, mode, ndp->ni_cred, &tip)) {
7188ac27
KM
1684 iput(pdir);
1685 return (error);
1686 }
1687 ip = tip;
4b61628b
KM
1688 ip->i_uid = ndp->ni_cred->cr_uid;
1689 ip->i_gid = pdir->i_gid;
7188ac27 1690#ifdef QUOTA
4b61628b
KM
1691 if ((error = getinoquota(ip)) ||
1692 (error = chkiq(ip, 1, ndp->ni_cred, 0))) {
1693 ifree(ip, ip->i_number, mode);
1694 iput(ip);
1695 iput(pdir);
1696 return (error);
1697 }
7188ac27
KM
1698#endif
1699 ip->i_flag |= IACC|IUPD|ICHG;
7188ac27
KM
1700 ip->i_mode = mode;
1701 ITOV(ip)->v_type = IFTOVT(mode); /* Rest init'd in iget() */
1702 ip->i_nlink = 1;
7188ac27
KM
1703 if ((ip->i_mode & ISGID) && !groupmember(ip->i_gid, ndp->ni_cred) &&
1704 suser(ndp->ni_cred, NULL))
1705 ip->i_mode &= ~ISGID;
7188ac27
KM
1706
1707 /*
1708 * Make sure inode goes to disk before directory entry.
1709 */
4b61628b
KM
1710 if (error = iupdat(ip, &time, &time, 1))
1711 goto bad;
1712 if (error = direnter(ip, ndp)) {
1713 pdir = NULL;
1714 goto bad;
7188ac27
KM
1715 }
1716 *ipp = ip;
1717 return (0);
4b61628b
KM
1718
1719bad:
1720 /*
1721 * Write error occurred trying to update the inode
1722 * or the directory so must deallocate the inode.
1723 */
1724 if (pdir)
1725 iput(pdir);
1726 ip->i_nlink = 0;
1727 ip->i_flag |= ICHG;
1728 iput(ip);
1729 return (error);
88a7a62a 1730}
0b0bf936
KM
1731
1732/*
1733 * Advisory record locking support
1734 */
1735ufs_advlock(vp, id, op, fl, flags)
1736 struct vnode *vp;
1737 caddr_t id;
1738 int op;
1739 register struct flock *fl;
1740 int flags;
1741{
1742 register struct inode *ip = VTOI(vp);
1743 register struct lockf *lock;
1744 off_t start, end;
1745 int error;
1746
1747 /*
1748 * Avoid the common case of unlocking when inode has no locks.
1749 */
1750 if (ip->i_lockf == (struct lockf *)0) {
1751 if (op != F_SETLK) {
1752 fl->l_type = F_UNLCK;
1753 return (0);
1754 }
1755 }
1756 /*
1757 * Convert the flock structure into a start and end.
1758 */
1759 switch (fl->l_whence) {
1760
1761 case SEEK_SET:
1762 case SEEK_CUR:
1763 /*
1764 * Caller is responsible for adding any necessary offset
1765 * when SEEK_CUR is used.
1766 */
1767 start = fl->l_start;
1768 break;
1769
1770 case SEEK_END:
1771 start = ip->i_size + fl->l_start;
1772 break;
1773
1774 default:
1775 return (EINVAL);
1776 }
1777 if (start < 0)
1778 return (EINVAL);
1779 if (fl->l_len == 0)
1780 end = -1;
1781 else
1782 end = start + fl->l_len;
1783 /*
1784 * Create the lockf structure
1785 */
1786 MALLOC(lock, struct lockf *, sizeof *lock, M_LOCKF, M_WAITOK);
1787 lock->lf_start = start;
1788 lock->lf_end = end;
1789 lock->lf_id = id;
1790 lock->lf_inode = ip;
1791 lock->lf_type = fl->l_type;
1792 lock->lf_next = (struct lockf *)0;
1793 lock->lf_block = (struct lockf *)0;
1794 lock->lf_flags = flags;
1795 /*
1796 * Do the requested operation.
1797 */
1798 switch(op) {
1799 case F_SETLK:
1800 return (ufs_setlock(lock));
1801
1802 case F_UNLCK:
1803 return (ufs_advunlock(lock));
1804
1805 case F_GETLK:
1806 return (ufs_advgetlock(lock, fl));
1807
1808 default:
1809 free(lock, M_LOCKF);
1810 return (EINVAL);
1811 }
1812 /* NOTREACHED */
1813}
1814
1815/*
1816 * This variable controls the maximum number of processes that will
1817 * be checked in doing deadlock detection.
1818 */
1819int maxlockdepth = MAXDEPTH;
1820
1821/*
1822 * Set a byte-range lock.
1823 */
1824ufs_setlock(lock)
1825 register struct lockf *lock;
1826{
1827 register struct inode *ip = lock->lf_inode;
1828 register struct lockf *block;
1829 static char lockstr[] = "lockf";
1830 int priority, error;
1831
1832#ifdef LOCKF_DEBUG
1833 if (lockf_debug & 4)
1834 lf_print("ufs_setlock", lock);
1835#endif /* LOCKF_DEBUG */
1836
1837 /*
1838 * Set the priority
1839 */
1840 priority = PLOCK;
1841 if ((lock->lf_type & F_WRLCK) == 0)
1842 priority += 4;
1843 priority |= PCATCH;
1844 /*
1845 * Scan lock list for this file looking for locks that would block us.
1846 */
1847 while (block = lf_getblock(lock)) {
1848 /*
1849 * Free the structure and return if nonblocking.
1850 */
1851 if ((lock->lf_flags & F_WAIT) == 0) {
1852 free(lock, M_LOCKF);
1853 return (EAGAIN);
1854 }
1855 /*
1856 * We are blocked. Since flock style locks cover
1857 * the whole file, there is no chance for deadlock.
1858 * For byte-range locks we must check for deadlock.
1859 *
1860 * Deadlock detection is done by looking through the
1861 * wait channels to see if there are any cycles that
1862 * involve us. MAXDEPTH is set just to make sure we
1863 * do not go off into neverland.
1864 */
1865 if ((lock->lf_flags & F_POSIX) &&
1866 (block->lf_flags & F_POSIX)) {
1867 register struct proc *wproc;
1868 register struct lockf *waitblock;
1869 int i = 0;
1870
1871 /* The block is waiting on something */
1872 wproc = (struct proc *)block->lf_id;
1873 while (wproc->p_wchan &&
1874 (wproc->p_wmesg == lockstr) &&
1875 (i++ < maxlockdepth)) {
1876 waitblock = (struct lockf *)wproc->p_wchan;
1877 /* Get the owner of the blocking lock */
1878 waitblock = waitblock->lf_next;
1879 if ((waitblock->lf_flags & F_POSIX) == 0)
1880 break;
1881 wproc = (struct proc *)waitblock->lf_id;
1882 if (wproc == (struct proc *)lock->lf_id) {
1883 free(lock, M_LOCKF);
1884 return (EDEADLK);
1885 }
1886 }
1887 }
1888 /*
1889 * Add our lock to the blocked
1890 * list and sleep until we're free.
1891 */
1892#ifdef LOCKF_DEBUG
1893 if (lockf_debug & 4)
1894 lf_print("ufs_advlock: blocking on", block);
1895#endif /* LOCKF_DEBUG */
1896 /*
1897 * Remember who blocked us (for deadlock detection)
1898 */
1899 lock->lf_next = block;
1900 lf_addblock(block, lock);
1901 if (error = tsleep((caddr_t *)lock, priority, lockstr, 0)) {
1902 free(lock, M_LOCKF);
1903 return (error);
1904 }
1905 }
1906 /*
1907 * No blocks!! Add the lock. Note that addlock will
1908 * downgrade or upgrade any overlapping locks this
1909 * process already owns.
1910 */
1911#ifdef LOCKF_DEBUG
1912 if (lockf_debug & 4)
1913 lf_print("ufs_advlock: got the lock", lock);
1914#endif /* LOCKF_DEBUG */
1915 lf_addlock(lock);
1916 return (0);
1917}
1918
1919/*
1920 * Remove a byte-range lock on an inode.
1921 */
1922ufs_advunlock(lock)
1923 struct lockf *lock;
1924{
1925 struct lockf *blocklist;
1926
1927 if (lock->lf_inode->i_lockf == (struct lockf *)0)
1928 return (0);
1929#ifdef LOCKF_DEBUG
1930 if (lockf_debug & 4)
1931 lf_print("ufs_advunlock", lock);
1932#endif /* LOCKF_DEBUG */
1933 /*
1934 * Generally, find the lock (or an overlap to that lock)
1935 * and remove it (or shrink it), then wakeup anyone we can.
1936 */
1937 blocklist = lf_remove(lock);
1938 FREE(lock, M_LOCKF);
1939 lf_wakelock(blocklist);
1940 return (0);
1941}
1942
1943/*
1944 * Return the blocking pid
1945 */
1946ufs_advgetlock(lock, fl)
1947 register struct lockf *lock;
1948 register struct flock *fl;
1949{
1950 register struct lockf *block;
1951 off_t start, end;
1952
1953#ifdef LOCKF_DEBUG
1954 if (lockf_debug & 4)
1955 lf_print("ufs_advgetlock", lock);
1956#endif /* LOCKF_DEBUG */
1957
1958 if (block = lf_getblock(lock)) {
1959 fl->l_type = block->lf_type;
1960 fl->l_whence = SEEK_SET;
1961 fl->l_start = block->lf_start;
1962 if (block->lf_end == -1)
1963 fl->l_len = 0;
1964 else
1965 fl->l_len = block->lf_end - block->lf_start;
1966 if (block->lf_flags & F_POSIX)
1967 fl->l_pid = ((struct proc *)(block->lf_id))->p_pid;
1968 else
1969 fl->l_pid = -1;
1970 }
1971 FREE(lock, M_LOCKF);
1972 return (0);
1973}