union_vnops.c revision 1.46 1 1.46 hannken /* $NetBSD: union_vnops.c,v 1.46 2011/08/23 07:39:37 hannken Exp $ */
2 1.1 jdolecek
3 1.1 jdolecek /*
4 1.1 jdolecek * Copyright (c) 1992, 1993, 1994, 1995
5 1.1 jdolecek * The Regents of the University of California. All rights reserved.
6 1.1 jdolecek *
7 1.1 jdolecek * This code is derived from software contributed to Berkeley by
8 1.1 jdolecek * Jan-Simon Pendry.
9 1.1 jdolecek *
10 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.1 jdolecek * modification, are permitted provided that the following conditions
12 1.1 jdolecek * are met:
13 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.1 jdolecek * documentation and/or other materials provided with the distribution.
18 1.7 agc * 3. Neither the name of the University nor the names of its contributors
19 1.7 agc * may be used to endorse or promote products derived from this software
20 1.7 agc * without specific prior written permission.
21 1.7 agc *
22 1.7 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.7 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.7 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.7 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.7 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.7 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.7 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.7 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.7 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.7 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.7 agc * SUCH DAMAGE.
33 1.7 agc *
34 1.7 agc * @(#)union_vnops.c 8.33 (Berkeley) 7/31/95
35 1.7 agc */
36 1.7 agc
37 1.7 agc /*
38 1.7 agc * Copyright (c) 1992, 1993, 1994, 1995 Jan-Simon Pendry.
39 1.7 agc *
40 1.7 agc * This code is derived from software contributed to Berkeley by
41 1.7 agc * Jan-Simon Pendry.
42 1.7 agc *
43 1.7 agc * Redistribution and use in source and binary forms, with or without
44 1.7 agc * modification, are permitted provided that the following conditions
45 1.7 agc * are met:
46 1.7 agc * 1. Redistributions of source code must retain the above copyright
47 1.7 agc * notice, this list of conditions and the following disclaimer.
48 1.7 agc * 2. Redistributions in binary form must reproduce the above copyright
49 1.7 agc * notice, this list of conditions and the following disclaimer in the
50 1.7 agc * documentation and/or other materials provided with the distribution.
51 1.1 jdolecek * 3. All advertising materials mentioning features or use of this software
52 1.1 jdolecek * must display the following acknowledgement:
53 1.1 jdolecek * This product includes software developed by the University of
54 1.1 jdolecek * California, Berkeley and its contributors.
55 1.1 jdolecek * 4. Neither the name of the University nor the names of its contributors
56 1.1 jdolecek * may be used to endorse or promote products derived from this software
57 1.1 jdolecek * without specific prior written permission.
58 1.1 jdolecek *
59 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
60 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
63 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69 1.1 jdolecek * SUCH DAMAGE.
70 1.1 jdolecek *
71 1.1 jdolecek * @(#)union_vnops.c 8.33 (Berkeley) 7/31/95
72 1.1 jdolecek */
73 1.1 jdolecek
74 1.1 jdolecek #include <sys/cdefs.h>
75 1.46 hannken __KERNEL_RCSID(0, "$NetBSD: union_vnops.c,v 1.46 2011/08/23 07:39:37 hannken Exp $");
76 1.1 jdolecek
77 1.1 jdolecek #include <sys/param.h>
78 1.1 jdolecek #include <sys/systm.h>
79 1.1 jdolecek #include <sys/proc.h>
80 1.1 jdolecek #include <sys/file.h>
81 1.1 jdolecek #include <sys/time.h>
82 1.1 jdolecek #include <sys/stat.h>
83 1.1 jdolecek #include <sys/vnode.h>
84 1.1 jdolecek #include <sys/mount.h>
85 1.1 jdolecek #include <sys/namei.h>
86 1.1 jdolecek #include <sys/malloc.h>
87 1.1 jdolecek #include <sys/buf.h>
88 1.1 jdolecek #include <sys/queue.h>
89 1.1 jdolecek #include <sys/lock.h>
90 1.16 elad #include <sys/kauth.h>
91 1.16 elad
92 1.1 jdolecek #include <fs/union/union.h>
93 1.1 jdolecek #include <miscfs/genfs/genfs.h>
94 1.44 hannken #include <miscfs/specfs/specdev.h>
95 1.1 jdolecek
96 1.12 xtraeme int union_lookup(void *);
97 1.12 xtraeme int union_create(void *);
98 1.12 xtraeme int union_whiteout(void *);
99 1.12 xtraeme int union_mknod(void *);
100 1.12 xtraeme int union_open(void *);
101 1.12 xtraeme int union_close(void *);
102 1.12 xtraeme int union_access(void *);
103 1.12 xtraeme int union_getattr(void *);
104 1.12 xtraeme int union_setattr(void *);
105 1.12 xtraeme int union_read(void *);
106 1.12 xtraeme int union_write(void *);
107 1.12 xtraeme int union_ioctl(void *);
108 1.12 xtraeme int union_poll(void *);
109 1.12 xtraeme int union_revoke(void *);
110 1.12 xtraeme int union_mmap(void *);
111 1.12 xtraeme int union_fsync(void *);
112 1.12 xtraeme int union_seek(void *);
113 1.12 xtraeme int union_remove(void *);
114 1.12 xtraeme int union_link(void *);
115 1.12 xtraeme int union_rename(void *);
116 1.12 xtraeme int union_mkdir(void *);
117 1.12 xtraeme int union_rmdir(void *);
118 1.12 xtraeme int union_symlink(void *);
119 1.12 xtraeme int union_readdir(void *);
120 1.12 xtraeme int union_readlink(void *);
121 1.12 xtraeme int union_abortop(void *);
122 1.12 xtraeme int union_inactive(void *);
123 1.12 xtraeme int union_reclaim(void *);
124 1.12 xtraeme int union_lock(void *);
125 1.12 xtraeme int union_unlock(void *);
126 1.12 xtraeme int union_bmap(void *);
127 1.12 xtraeme int union_print(void *);
128 1.12 xtraeme int union_islocked(void *);
129 1.12 xtraeme int union_pathconf(void *);
130 1.12 xtraeme int union_advlock(void *);
131 1.12 xtraeme int union_strategy(void *);
132 1.44 hannken int union_bwrite(void *);
133 1.12 xtraeme int union_getpages(void *);
134 1.12 xtraeme int union_putpages(void *);
135 1.12 xtraeme int union_kqfilter(void *);
136 1.12 xtraeme
137 1.12 xtraeme static void union_fixup(struct union_node *);
138 1.12 xtraeme static int union_lookup1(struct vnode *, struct vnode **,
139 1.12 xtraeme struct vnode **, struct componentname *);
140 1.1 jdolecek
141 1.1 jdolecek
142 1.1 jdolecek /*
143 1.1 jdolecek * Global vfs data structures
144 1.1 jdolecek */
145 1.12 xtraeme int (**union_vnodeop_p)(void *);
146 1.1 jdolecek const struct vnodeopv_entry_desc union_vnodeop_entries[] = {
147 1.1 jdolecek { &vop_default_desc, vn_default_error },
148 1.1 jdolecek { &vop_lookup_desc, union_lookup }, /* lookup */
149 1.1 jdolecek { &vop_create_desc, union_create }, /* create */
150 1.1 jdolecek { &vop_whiteout_desc, union_whiteout }, /* whiteout */
151 1.1 jdolecek { &vop_mknod_desc, union_mknod }, /* mknod */
152 1.1 jdolecek { &vop_open_desc, union_open }, /* open */
153 1.1 jdolecek { &vop_close_desc, union_close }, /* close */
154 1.1 jdolecek { &vop_access_desc, union_access }, /* access */
155 1.1 jdolecek { &vop_getattr_desc, union_getattr }, /* getattr */
156 1.1 jdolecek { &vop_setattr_desc, union_setattr }, /* setattr */
157 1.1 jdolecek { &vop_read_desc, union_read }, /* read */
158 1.1 jdolecek { &vop_write_desc, union_write }, /* write */
159 1.1 jdolecek { &vop_ioctl_desc, union_ioctl }, /* ioctl */
160 1.1 jdolecek { &vop_poll_desc, union_poll }, /* select */
161 1.1 jdolecek { &vop_revoke_desc, union_revoke }, /* revoke */
162 1.1 jdolecek { &vop_mmap_desc, union_mmap }, /* mmap */
163 1.1 jdolecek { &vop_fsync_desc, union_fsync }, /* fsync */
164 1.1 jdolecek { &vop_seek_desc, union_seek }, /* seek */
165 1.1 jdolecek { &vop_remove_desc, union_remove }, /* remove */
166 1.1 jdolecek { &vop_link_desc, union_link }, /* link */
167 1.1 jdolecek { &vop_rename_desc, union_rename }, /* rename */
168 1.1 jdolecek { &vop_mkdir_desc, union_mkdir }, /* mkdir */
169 1.1 jdolecek { &vop_rmdir_desc, union_rmdir }, /* rmdir */
170 1.1 jdolecek { &vop_symlink_desc, union_symlink }, /* symlink */
171 1.1 jdolecek { &vop_readdir_desc, union_readdir }, /* readdir */
172 1.1 jdolecek { &vop_readlink_desc, union_readlink }, /* readlink */
173 1.1 jdolecek { &vop_abortop_desc, union_abortop }, /* abortop */
174 1.1 jdolecek { &vop_inactive_desc, union_inactive }, /* inactive */
175 1.1 jdolecek { &vop_reclaim_desc, union_reclaim }, /* reclaim */
176 1.1 jdolecek { &vop_lock_desc, union_lock }, /* lock */
177 1.1 jdolecek { &vop_unlock_desc, union_unlock }, /* unlock */
178 1.1 jdolecek { &vop_bmap_desc, union_bmap }, /* bmap */
179 1.1 jdolecek { &vop_strategy_desc, union_strategy }, /* strategy */
180 1.44 hannken { &vop_bwrite_desc, union_bwrite }, /* bwrite */
181 1.1 jdolecek { &vop_print_desc, union_print }, /* print */
182 1.1 jdolecek { &vop_islocked_desc, union_islocked }, /* islocked */
183 1.1 jdolecek { &vop_pathconf_desc, union_pathconf }, /* pathconf */
184 1.1 jdolecek { &vop_advlock_desc, union_advlock }, /* advlock */
185 1.1 jdolecek { &vop_getpages_desc, union_getpages }, /* getpages */
186 1.1 jdolecek { &vop_putpages_desc, union_putpages }, /* putpages */
187 1.2 jdolecek { &vop_kqfilter_desc, union_kqfilter }, /* kqfilter */
188 1.1 jdolecek { NULL, NULL }
189 1.1 jdolecek };
190 1.1 jdolecek const struct vnodeopv_desc union_vnodeop_opv_desc =
191 1.1 jdolecek { &union_vnodeop_p, union_vnodeop_entries };
192 1.1 jdolecek
193 1.1 jdolecek #define FIXUP(un) { \
194 1.1 jdolecek if (((un)->un_flags & UN_ULOCK) == 0) { \
195 1.1 jdolecek union_fixup(un); \
196 1.1 jdolecek } \
197 1.1 jdolecek }
198 1.44 hannken #define NODE_IS_SPECIAL(vp) \
199 1.44 hannken ((vp)->v_type == VBLK || (vp)->v_type == VCHR || \
200 1.44 hannken (vp)->v_type == VSOCK || (vp)->v_type == VFIFO)
201 1.1 jdolecek
202 1.1 jdolecek static void
203 1.30 matt union_fixup(struct union_node *un)
204 1.1 jdolecek {
205 1.1 jdolecek
206 1.1 jdolecek vn_lock(un->un_uppervp, LK_EXCLUSIVE | LK_RETRY);
207 1.1 jdolecek un->un_flags |= UN_ULOCK;
208 1.1 jdolecek }
209 1.1 jdolecek
210 1.1 jdolecek static int
211 1.30 matt union_lookup1(struct vnode *udvp, struct vnode **dvpp, struct vnode **vpp,
212 1.30 matt struct componentname *cnp)
213 1.1 jdolecek {
214 1.1 jdolecek int error;
215 1.1 jdolecek struct vnode *tdvp;
216 1.1 jdolecek struct vnode *dvp;
217 1.1 jdolecek struct mount *mp;
218 1.1 jdolecek
219 1.1 jdolecek dvp = *dvpp;
220 1.1 jdolecek
221 1.1 jdolecek /*
222 1.1 jdolecek * If stepping up the directory tree, check for going
223 1.1 jdolecek * back across the mount point, in which case do what
224 1.1 jdolecek * lookup would do by stepping back down the mount
225 1.1 jdolecek * hierarchy.
226 1.1 jdolecek */
227 1.1 jdolecek if (cnp->cn_flags & ISDOTDOT) {
228 1.22 ad while ((dvp != udvp) && (dvp->v_vflag & VV_ROOT)) {
229 1.1 jdolecek /*
230 1.1 jdolecek * Don't do the NOCROSSMOUNT check
231 1.1 jdolecek * at this level. By definition,
232 1.1 jdolecek * union fs deals with namespaces, not
233 1.1 jdolecek * filesystems.
234 1.1 jdolecek */
235 1.1 jdolecek tdvp = dvp;
236 1.1 jdolecek *dvpp = dvp = dvp->v_mount->mnt_vnodecovered;
237 1.36 hannken VOP_UNLOCK(tdvp);
238 1.1 jdolecek vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
239 1.1 jdolecek }
240 1.1 jdolecek }
241 1.1 jdolecek
242 1.1 jdolecek error = VOP_LOOKUP(dvp, &tdvp, cnp);
243 1.1 jdolecek if (error)
244 1.1 jdolecek return (error);
245 1.1 jdolecek
246 1.1 jdolecek dvp = tdvp;
247 1.1 jdolecek
248 1.1 jdolecek /*
249 1.1 jdolecek * Lastly check if the current node is a mount point in
250 1.1 jdolecek * which case walk up the mount hierarchy making sure not to
251 1.1 jdolecek * bump into the root of the mount tree (ie. dvp != udvp).
252 1.1 jdolecek */
253 1.1 jdolecek while (dvp != udvp && (dvp->v_type == VDIR) &&
254 1.1 jdolecek (mp = dvp->v_mountedhere)) {
255 1.33 ad if (vfs_busy(mp, NULL))
256 1.1 jdolecek continue;
257 1.19 chs vput(dvp);
258 1.5 thorpej error = VFS_ROOT(mp, &tdvp);
259 1.32 ad vfs_unbusy(mp, false, NULL);
260 1.1 jdolecek if (error) {
261 1.1 jdolecek return (error);
262 1.1 jdolecek }
263 1.1 jdolecek dvp = tdvp;
264 1.1 jdolecek }
265 1.1 jdolecek
266 1.1 jdolecek *vpp = dvp;
267 1.1 jdolecek return (0);
268 1.1 jdolecek }
269 1.1 jdolecek
270 1.1 jdolecek int
271 1.30 matt union_lookup(void *v)
272 1.1 jdolecek {
273 1.1 jdolecek struct vop_lookup_args /* {
274 1.1 jdolecek struct vnodeop_desc *a_desc;
275 1.1 jdolecek struct vnode *a_dvp;
276 1.1 jdolecek struct vnode **a_vpp;
277 1.1 jdolecek struct componentname *a_cnp;
278 1.1 jdolecek } */ *ap = v;
279 1.1 jdolecek int error;
280 1.1 jdolecek int uerror, lerror;
281 1.1 jdolecek struct vnode *uppervp, *lowervp;
282 1.1 jdolecek struct vnode *upperdvp, *lowerdvp;
283 1.1 jdolecek struct vnode *dvp = ap->a_dvp;
284 1.1 jdolecek struct union_node *dun = VTOUNION(dvp);
285 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
286 1.1 jdolecek struct union_mount *um = MOUNTTOUNIONMOUNT(dvp->v_mount);
287 1.16 elad kauth_cred_t saved_cred = NULL;
288 1.1 jdolecek int iswhiteout;
289 1.1 jdolecek struct vattr va;
290 1.1 jdolecek
291 1.1 jdolecek #ifdef notyet
292 1.1 jdolecek if (cnp->cn_namelen == 3 &&
293 1.1 jdolecek cnp->cn_nameptr[2] == '.' &&
294 1.1 jdolecek cnp->cn_nameptr[1] == '.' &&
295 1.1 jdolecek cnp->cn_nameptr[0] == '.') {
296 1.1 jdolecek dvp = *ap->a_vpp = LOWERVP(ap->a_dvp);
297 1.1 jdolecek if (dvp == NULLVP)
298 1.1 jdolecek return (ENOENT);
299 1.34 pooka vref(dvp);
300 1.1 jdolecek vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
301 1.1 jdolecek return (0);
302 1.1 jdolecek }
303 1.1 jdolecek #endif
304 1.1 jdolecek
305 1.1 jdolecek if ((cnp->cn_flags & ISLASTCN) &&
306 1.1 jdolecek (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
307 1.1 jdolecek (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
308 1.1 jdolecek return (EROFS);
309 1.1 jdolecek
310 1.41 hannken start:
311 1.1 jdolecek upperdvp = dun->un_uppervp;
312 1.1 jdolecek lowerdvp = dun->un_lowervp;
313 1.1 jdolecek uppervp = NULLVP;
314 1.1 jdolecek lowervp = NULLVP;
315 1.1 jdolecek iswhiteout = 0;
316 1.1 jdolecek
317 1.1 jdolecek /*
318 1.1 jdolecek * do the lookup in the upper level.
319 1.1 jdolecek * if that level comsumes additional pathnames,
320 1.1 jdolecek * then assume that something special is going
321 1.1 jdolecek * on and just return that vnode.
322 1.1 jdolecek */
323 1.1 jdolecek if (upperdvp != NULLVP) {
324 1.1 jdolecek FIXUP(dun);
325 1.1 jdolecek /*
326 1.1 jdolecek * If we're doing `..' in the underlying filesystem,
327 1.1 jdolecek * we must drop our lock on the union node before
328 1.1 jdolecek * going up the tree in the lower file system--if we block
329 1.1 jdolecek * on the lowervp lock, and that's held by someone else
330 1.1 jdolecek * coming down the tree and who's waiting for our lock,
331 1.1 jdolecek * we would be hosed.
332 1.1 jdolecek */
333 1.1 jdolecek if (cnp->cn_flags & ISDOTDOT) {
334 1.1 jdolecek /* retain lock on underlying VP */
335 1.1 jdolecek dun->un_flags |= UN_KLOCK;
336 1.36 hannken VOP_UNLOCK(dvp);
337 1.1 jdolecek }
338 1.1 jdolecek uerror = union_lookup1(um->um_uppervp, &upperdvp,
339 1.1 jdolecek &uppervp, cnp);
340 1.1 jdolecek
341 1.1 jdolecek if (cnp->cn_flags & ISDOTDOT) {
342 1.1 jdolecek if (dun->un_uppervp == upperdvp) {
343 1.1 jdolecek /*
344 1.1 jdolecek * we got the underlying bugger back locked...
345 1.1 jdolecek * now take back the union node lock. Since we
346 1.1 jdolecek * hold the uppervp lock, we can diddle union
347 1.1 jdolecek * locking flags at will. :)
348 1.1 jdolecek */
349 1.1 jdolecek dun->un_flags |= UN_ULOCK;
350 1.1 jdolecek }
351 1.1 jdolecek /*
352 1.1 jdolecek * if upperdvp got swapped out, it means we did
353 1.1 jdolecek * some mount point magic, and we do not have
354 1.1 jdolecek * dun->un_uppervp locked currently--so we get it
355 1.1 jdolecek * locked here (don't set the UN_ULOCK flag).
356 1.1 jdolecek */
357 1.1 jdolecek vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
358 1.1 jdolecek }
359 1.1 jdolecek if (cnp->cn_consume != 0) {
360 1.1 jdolecek *ap->a_vpp = uppervp;
361 1.1 jdolecek return (uerror);
362 1.1 jdolecek }
363 1.1 jdolecek if (uerror == ENOENT || uerror == EJUSTRETURN) {
364 1.1 jdolecek if (cnp->cn_flags & ISWHITEOUT) {
365 1.1 jdolecek iswhiteout = 1;
366 1.1 jdolecek } else if (lowerdvp != NULLVP) {
367 1.1 jdolecek lerror = VOP_GETATTR(upperdvp, &va,
368 1.23 pooka cnp->cn_cred);
369 1.1 jdolecek if (lerror == 0 && (va.va_flags & OPAQUE))
370 1.1 jdolecek iswhiteout = 1;
371 1.1 jdolecek }
372 1.1 jdolecek }
373 1.1 jdolecek } else {
374 1.1 jdolecek uerror = ENOENT;
375 1.1 jdolecek }
376 1.1 jdolecek
377 1.1 jdolecek /*
378 1.1 jdolecek * in a similar way to the upper layer, do the lookup
379 1.1 jdolecek * in the lower layer. this time, if there is some
380 1.1 jdolecek * component magic going on, then vput whatever we got
381 1.1 jdolecek * back from the upper layer and return the lower vnode
382 1.1 jdolecek * instead.
383 1.1 jdolecek */
384 1.1 jdolecek if (lowerdvp != NULLVP && !iswhiteout) {
385 1.1 jdolecek int nameiop;
386 1.1 jdolecek
387 1.1 jdolecek vn_lock(lowerdvp, LK_EXCLUSIVE | LK_RETRY);
388 1.1 jdolecek
389 1.1 jdolecek /*
390 1.1 jdolecek * Only do a LOOKUP on the bottom node, since
391 1.1 jdolecek * we won't be making changes to it anyway.
392 1.1 jdolecek */
393 1.1 jdolecek nameiop = cnp->cn_nameiop;
394 1.1 jdolecek cnp->cn_nameiop = LOOKUP;
395 1.1 jdolecek if (um->um_op == UNMNT_BELOW) {
396 1.1 jdolecek saved_cred = cnp->cn_cred;
397 1.1 jdolecek cnp->cn_cred = um->um_cred;
398 1.1 jdolecek }
399 1.18 chs
400 1.1 jdolecek /*
401 1.1 jdolecek * we shouldn't have to worry about locking interactions
402 1.1 jdolecek * between the lower layer and our union layer (w.r.t.
403 1.1 jdolecek * `..' processing) because we don't futz with lowervp
404 1.1 jdolecek * locks in the union-node instantiation code path.
405 1.1 jdolecek */
406 1.1 jdolecek lerror = union_lookup1(um->um_lowervp, &lowerdvp,
407 1.1 jdolecek &lowervp, cnp);
408 1.1 jdolecek if (um->um_op == UNMNT_BELOW)
409 1.1 jdolecek cnp->cn_cred = saved_cred;
410 1.1 jdolecek cnp->cn_nameiop = nameiop;
411 1.1 jdolecek
412 1.1 jdolecek if (lowervp != lowerdvp)
413 1.36 hannken VOP_UNLOCK(lowerdvp);
414 1.1 jdolecek
415 1.1 jdolecek if (cnp->cn_consume != 0) {
416 1.1 jdolecek if (uppervp != NULLVP) {
417 1.1 jdolecek if (uppervp == upperdvp)
418 1.1 jdolecek vrele(uppervp);
419 1.1 jdolecek else
420 1.1 jdolecek vput(uppervp);
421 1.1 jdolecek uppervp = NULLVP;
422 1.1 jdolecek }
423 1.1 jdolecek *ap->a_vpp = lowervp;
424 1.1 jdolecek return (lerror);
425 1.1 jdolecek }
426 1.1 jdolecek } else {
427 1.1 jdolecek lerror = ENOENT;
428 1.1 jdolecek if ((cnp->cn_flags & ISDOTDOT) && dun->un_pvp != NULLVP) {
429 1.1 jdolecek lowervp = LOWERVP(dun->un_pvp);
430 1.1 jdolecek if (lowervp != NULLVP) {
431 1.34 pooka vref(lowervp);
432 1.1 jdolecek vn_lock(lowervp, LK_EXCLUSIVE | LK_RETRY);
433 1.1 jdolecek lerror = 0;
434 1.1 jdolecek }
435 1.1 jdolecek }
436 1.1 jdolecek }
437 1.1 jdolecek
438 1.1 jdolecek /*
439 1.1 jdolecek * EJUSTRETURN is used by underlying filesystems to indicate that
440 1.1 jdolecek * a directory modification op was started successfully.
441 1.1 jdolecek * This will only happen in the upper layer, since
442 1.1 jdolecek * the lower layer only does LOOKUPs.
443 1.1 jdolecek * If this union is mounted read-only, bounce it now.
444 1.1 jdolecek */
445 1.1 jdolecek
446 1.1 jdolecek if ((uerror == EJUSTRETURN) && (cnp->cn_flags & ISLASTCN) &&
447 1.1 jdolecek (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
448 1.1 jdolecek ((cnp->cn_nameiop == CREATE) || (cnp->cn_nameiop == RENAME)))
449 1.1 jdolecek uerror = EROFS;
450 1.11 perry
451 1.1 jdolecek /*
452 1.1 jdolecek * at this point, we have uerror and lerror indicating
453 1.1 jdolecek * possible errors with the lookups in the upper and lower
454 1.1 jdolecek * layers. additionally, uppervp and lowervp are (locked)
455 1.1 jdolecek * references to existing vnodes in the upper and lower layers.
456 1.1 jdolecek *
457 1.1 jdolecek * there are now three cases to consider.
458 1.1 jdolecek * 1. if both layers returned an error, then return whatever
459 1.1 jdolecek * error the upper layer generated.
460 1.1 jdolecek *
461 1.1 jdolecek * 2. if the top layer failed and the bottom layer succeeded
462 1.1 jdolecek * then two subcases occur.
463 1.1 jdolecek * a. the bottom vnode is not a directory, in which
464 1.1 jdolecek * case just return a new union vnode referencing
465 1.1 jdolecek * an empty top layer and the existing bottom layer.
466 1.1 jdolecek * b. the bottom vnode is a directory, in which case
467 1.1 jdolecek * create a new directory in the top-level and
468 1.1 jdolecek * continue as in case 3.
469 1.1 jdolecek *
470 1.1 jdolecek * 3. if the top layer succeeded then return a new union
471 1.1 jdolecek * vnode referencing whatever the new top layer and
472 1.1 jdolecek * whatever the bottom layer returned.
473 1.1 jdolecek */
474 1.1 jdolecek
475 1.1 jdolecek *ap->a_vpp = NULLVP;
476 1.1 jdolecek
477 1.11 perry
478 1.1 jdolecek /* case 1. */
479 1.1 jdolecek if ((uerror != 0) && (lerror != 0)) {
480 1.1 jdolecek return (uerror);
481 1.1 jdolecek }
482 1.1 jdolecek
483 1.1 jdolecek /* case 2. */
484 1.1 jdolecek if (uerror != 0 /* && (lerror == 0) */ ) {
485 1.1 jdolecek if (lowervp->v_type == VDIR) { /* case 2b. */
486 1.1 jdolecek /*
487 1.1 jdolecek * We may be racing another process to make the
488 1.1 jdolecek * upper-level shadow directory. Be careful with
489 1.1 jdolecek * locks/etc!
490 1.41 hannken * If we have to create a shadow directory and want
491 1.41 hannken * to commit the node we have to restart the lookup
492 1.41 hannken * to get the componentname right.
493 1.1 jdolecek */
494 1.15 christos if (upperdvp) {
495 1.15 christos dun->un_flags &= ~UN_ULOCK;
496 1.36 hannken VOP_UNLOCK(upperdvp);
497 1.15 christos uerror = union_mkshadow(um, upperdvp, cnp,
498 1.15 christos &uppervp);
499 1.15 christos vn_lock(upperdvp, LK_EXCLUSIVE | LK_RETRY);
500 1.15 christos dun->un_flags |= UN_ULOCK;
501 1.41 hannken if (uerror == 0 && cnp->cn_nameiop != LOOKUP) {
502 1.41 hannken vput(uppervp);
503 1.41 hannken if (lowervp != NULLVP)
504 1.41 hannken vput(lowervp);
505 1.41 hannken goto start;
506 1.41 hannken }
507 1.15 christos }
508 1.1 jdolecek if (uerror) {
509 1.1 jdolecek if (lowervp != NULLVP) {
510 1.1 jdolecek vput(lowervp);
511 1.1 jdolecek lowervp = NULLVP;
512 1.1 jdolecek }
513 1.1 jdolecek return (uerror);
514 1.1 jdolecek }
515 1.1 jdolecek }
516 1.1 jdolecek }
517 1.1 jdolecek
518 1.1 jdolecek if (lowervp != NULLVP)
519 1.36 hannken VOP_UNLOCK(lowervp);
520 1.1 jdolecek
521 1.1 jdolecek error = union_allocvp(ap->a_vpp, dvp->v_mount, dvp, upperdvp, cnp,
522 1.5 thorpej uppervp, lowervp, 1);
523 1.1 jdolecek
524 1.1 jdolecek if (error) {
525 1.1 jdolecek if (uppervp != NULLVP)
526 1.1 jdolecek vput(uppervp);
527 1.1 jdolecek if (lowervp != NULLVP)
528 1.1 jdolecek vrele(lowervp);
529 1.1 jdolecek }
530 1.1 jdolecek
531 1.1 jdolecek return (error);
532 1.1 jdolecek }
533 1.1 jdolecek
534 1.1 jdolecek int
535 1.30 matt union_create(void *v)
536 1.1 jdolecek {
537 1.1 jdolecek struct vop_create_args /* {
538 1.1 jdolecek struct vnode *a_dvp;
539 1.1 jdolecek struct vnode **a_vpp;
540 1.1 jdolecek struct componentname *a_cnp;
541 1.1 jdolecek struct vattr *a_vap;
542 1.1 jdolecek } */ *ap = v;
543 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
544 1.1 jdolecek struct vnode *dvp = un->un_uppervp;
545 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
546 1.1 jdolecek
547 1.1 jdolecek if (dvp != NULLVP) {
548 1.1 jdolecek int error;
549 1.1 jdolecek struct vnode *vp;
550 1.1 jdolecek struct mount *mp;
551 1.1 jdolecek
552 1.1 jdolecek FIXUP(un);
553 1.1 jdolecek
554 1.34 pooka vref(dvp);
555 1.1 jdolecek un->un_flags |= UN_KLOCK;
556 1.1 jdolecek mp = ap->a_dvp->v_mount;
557 1.1 jdolecek vput(ap->a_dvp);
558 1.1 jdolecek error = VOP_CREATE(dvp, &vp, cnp, ap->a_vap);
559 1.1 jdolecek if (error)
560 1.1 jdolecek return (error);
561 1.1 jdolecek
562 1.1 jdolecek error = union_allocvp(ap->a_vpp, mp, NULLVP, NULLVP, cnp, vp,
563 1.5 thorpej NULLVP, 1);
564 1.1 jdolecek if (error)
565 1.1 jdolecek vput(vp);
566 1.1 jdolecek return (error);
567 1.1 jdolecek }
568 1.1 jdolecek
569 1.1 jdolecek vput(ap->a_dvp);
570 1.1 jdolecek return (EROFS);
571 1.1 jdolecek }
572 1.1 jdolecek
573 1.1 jdolecek int
574 1.30 matt union_whiteout(void *v)
575 1.1 jdolecek {
576 1.1 jdolecek struct vop_whiteout_args /* {
577 1.1 jdolecek struct vnode *a_dvp;
578 1.1 jdolecek struct componentname *a_cnp;
579 1.1 jdolecek int a_flags;
580 1.1 jdolecek } */ *ap = v;
581 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
582 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
583 1.1 jdolecek
584 1.1 jdolecek if (un->un_uppervp == NULLVP)
585 1.1 jdolecek return (EOPNOTSUPP);
586 1.1 jdolecek
587 1.1 jdolecek FIXUP(un);
588 1.1 jdolecek return (VOP_WHITEOUT(un->un_uppervp, cnp, ap->a_flags));
589 1.1 jdolecek }
590 1.1 jdolecek
591 1.1 jdolecek int
592 1.30 matt union_mknod(void *v)
593 1.1 jdolecek {
594 1.1 jdolecek struct vop_mknod_args /* {
595 1.1 jdolecek struct vnode *a_dvp;
596 1.1 jdolecek struct vnode **a_vpp;
597 1.1 jdolecek struct componentname *a_cnp;
598 1.1 jdolecek struct vattr *a_vap;
599 1.1 jdolecek } */ *ap = v;
600 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
601 1.1 jdolecek struct vnode *dvp = un->un_uppervp;
602 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
603 1.1 jdolecek
604 1.1 jdolecek if (dvp != NULLVP) {
605 1.1 jdolecek int error;
606 1.1 jdolecek struct vnode *vp;
607 1.1 jdolecek struct mount *mp;
608 1.1 jdolecek
609 1.1 jdolecek FIXUP(un);
610 1.1 jdolecek
611 1.34 pooka vref(dvp);
612 1.1 jdolecek un->un_flags |= UN_KLOCK;
613 1.1 jdolecek mp = ap->a_dvp->v_mount;
614 1.1 jdolecek vput(ap->a_dvp);
615 1.1 jdolecek error = VOP_MKNOD(dvp, &vp, cnp, ap->a_vap);
616 1.1 jdolecek if (error)
617 1.1 jdolecek return (error);
618 1.1 jdolecek
619 1.1 jdolecek error = union_allocvp(ap->a_vpp, mp, NULLVP, NULLVP,
620 1.5 thorpej cnp, vp, NULLVP, 1);
621 1.1 jdolecek if (error)
622 1.1 jdolecek vput(vp);
623 1.1 jdolecek return (error);
624 1.1 jdolecek }
625 1.1 jdolecek
626 1.1 jdolecek vput(ap->a_dvp);
627 1.1 jdolecek return (EROFS);
628 1.1 jdolecek }
629 1.1 jdolecek
630 1.1 jdolecek int
631 1.30 matt union_open(void *v)
632 1.1 jdolecek {
633 1.1 jdolecek struct vop_open_args /* {
634 1.1 jdolecek struct vnodeop_desc *a_desc;
635 1.1 jdolecek struct vnode *a_vp;
636 1.1 jdolecek int a_mode;
637 1.16 elad kauth_cred_t a_cred;
638 1.1 jdolecek } */ *ap = v;
639 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
640 1.1 jdolecek struct vnode *tvp;
641 1.1 jdolecek int mode = ap->a_mode;
642 1.16 elad kauth_cred_t cred = ap->a_cred;
643 1.23 pooka struct lwp *l = curlwp;
644 1.1 jdolecek int error;
645 1.1 jdolecek
646 1.1 jdolecek /*
647 1.1 jdolecek * If there is an existing upper vp then simply open that.
648 1.1 jdolecek */
649 1.1 jdolecek tvp = un->un_uppervp;
650 1.1 jdolecek if (tvp == NULLVP) {
651 1.1 jdolecek /*
652 1.1 jdolecek * If the lower vnode is being opened for writing, then
653 1.1 jdolecek * copy the file contents to the upper vnode and open that,
654 1.1 jdolecek * otherwise can simply open the lower vnode.
655 1.1 jdolecek */
656 1.1 jdolecek tvp = un->un_lowervp;
657 1.1 jdolecek if ((ap->a_mode & FWRITE) && (tvp->v_type == VREG)) {
658 1.14 christos error = union_copyup(un, (mode&O_TRUNC) == 0, cred, l);
659 1.1 jdolecek if (error == 0)
660 1.23 pooka error = VOP_OPEN(un->un_uppervp, mode, cred);
661 1.1 jdolecek return (error);
662 1.1 jdolecek }
663 1.1 jdolecek
664 1.1 jdolecek /*
665 1.1 jdolecek * Just open the lower vnode, but check for nodev mount flag
666 1.1 jdolecek */
667 1.1 jdolecek if ((tvp->v_type == VBLK || tvp->v_type == VCHR) &&
668 1.1 jdolecek (ap->a_vp->v_mount->mnt_flag & MNT_NODEV))
669 1.1 jdolecek return ENXIO;
670 1.1 jdolecek un->un_openl++;
671 1.1 jdolecek vn_lock(tvp, LK_EXCLUSIVE | LK_RETRY);
672 1.23 pooka error = VOP_OPEN(tvp, mode, cred);
673 1.36 hannken VOP_UNLOCK(tvp);
674 1.1 jdolecek
675 1.1 jdolecek return (error);
676 1.1 jdolecek }
677 1.1 jdolecek /*
678 1.1 jdolecek * Just open the upper vnode, checking for nodev mount flag first
679 1.1 jdolecek */
680 1.1 jdolecek if ((tvp->v_type == VBLK || tvp->v_type == VCHR) &&
681 1.1 jdolecek (ap->a_vp->v_mount->mnt_flag & MNT_NODEV))
682 1.1 jdolecek return ENXIO;
683 1.1 jdolecek
684 1.1 jdolecek FIXUP(un);
685 1.1 jdolecek
686 1.23 pooka error = VOP_OPEN(tvp, mode, cred);
687 1.1 jdolecek
688 1.1 jdolecek return (error);
689 1.1 jdolecek }
690 1.1 jdolecek
691 1.1 jdolecek int
692 1.30 matt union_close(void *v)
693 1.1 jdolecek {
694 1.1 jdolecek struct vop_close_args /* {
695 1.1 jdolecek struct vnode *a_vp;
696 1.1 jdolecek int a_fflag;
697 1.16 elad kauth_cred_t a_cred;
698 1.1 jdolecek } */ *ap = v;
699 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
700 1.1 jdolecek struct vnode *vp;
701 1.44 hannken int error;
702 1.44 hannken bool do_lock;
703 1.1 jdolecek
704 1.1 jdolecek vp = un->un_uppervp;
705 1.44 hannken if (vp != NULLVP) {
706 1.44 hannken do_lock = false;
707 1.44 hannken } else {
708 1.44 hannken KASSERT(un->un_openl > 0);
709 1.1 jdolecek --un->un_openl;
710 1.1 jdolecek vp = un->un_lowervp;
711 1.44 hannken do_lock = true;
712 1.1 jdolecek }
713 1.1 jdolecek
714 1.44 hannken KASSERT(vp != NULLVP);
715 1.44 hannken ap->a_vp = vp;
716 1.44 hannken if (do_lock)
717 1.44 hannken vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
718 1.44 hannken error = VCALL(vp, VOFFSET(vop_close), ap);
719 1.44 hannken if (do_lock)
720 1.44 hannken VOP_UNLOCK(vp);
721 1.1 jdolecek
722 1.44 hannken return error;
723 1.1 jdolecek }
724 1.1 jdolecek
725 1.1 jdolecek /*
726 1.1 jdolecek * Check access permission on the union vnode.
727 1.1 jdolecek * The access check being enforced is to check
728 1.1 jdolecek * against both the underlying vnode, and any
729 1.1 jdolecek * copied vnode. This ensures that no additional
730 1.1 jdolecek * file permissions are given away simply because
731 1.1 jdolecek * the user caused an implicit file copy.
732 1.1 jdolecek */
733 1.1 jdolecek int
734 1.30 matt union_access(void *v)
735 1.1 jdolecek {
736 1.1 jdolecek struct vop_access_args /* {
737 1.1 jdolecek struct vnodeop_desc *a_desc;
738 1.1 jdolecek struct vnode *a_vp;
739 1.1 jdolecek int a_mode;
740 1.16 elad kauth_cred_t a_cred;
741 1.1 jdolecek } */ *ap = v;
742 1.1 jdolecek struct vnode *vp = ap->a_vp;
743 1.1 jdolecek struct union_node *un = VTOUNION(vp);
744 1.1 jdolecek int error = EACCES;
745 1.1 jdolecek struct union_mount *um = MOUNTTOUNIONMOUNT(vp->v_mount);
746 1.1 jdolecek
747 1.1 jdolecek /*
748 1.1 jdolecek * Disallow write attempts on read-only file systems;
749 1.1 jdolecek * unless the file is a socket, fifo, or a block or
750 1.1 jdolecek * character device resident on the file system.
751 1.1 jdolecek */
752 1.1 jdolecek if (ap->a_mode & VWRITE) {
753 1.1 jdolecek switch (vp->v_type) {
754 1.1 jdolecek case VDIR:
755 1.1 jdolecek case VLNK:
756 1.1 jdolecek case VREG:
757 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
758 1.1 jdolecek return (EROFS);
759 1.1 jdolecek break;
760 1.1 jdolecek case VBAD:
761 1.1 jdolecek case VBLK:
762 1.1 jdolecek case VCHR:
763 1.1 jdolecek case VSOCK:
764 1.1 jdolecek case VFIFO:
765 1.1 jdolecek case VNON:
766 1.1 jdolecek default:
767 1.1 jdolecek break;
768 1.1 jdolecek }
769 1.1 jdolecek }
770 1.11 perry
771 1.1 jdolecek
772 1.1 jdolecek if ((vp = un->un_uppervp) != NULLVP) {
773 1.1 jdolecek FIXUP(un);
774 1.1 jdolecek ap->a_vp = vp;
775 1.1 jdolecek return (VCALL(vp, VOFFSET(vop_access), ap));
776 1.1 jdolecek }
777 1.1 jdolecek
778 1.1 jdolecek if ((vp = un->un_lowervp) != NULLVP) {
779 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
780 1.1 jdolecek ap->a_vp = vp;
781 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_access), ap);
782 1.1 jdolecek if (error == 0) {
783 1.1 jdolecek if (um->um_op == UNMNT_BELOW) {
784 1.1 jdolecek ap->a_cred = um->um_cred;
785 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_access), ap);
786 1.1 jdolecek }
787 1.1 jdolecek }
788 1.36 hannken VOP_UNLOCK(vp);
789 1.1 jdolecek if (error)
790 1.1 jdolecek return (error);
791 1.1 jdolecek }
792 1.1 jdolecek
793 1.1 jdolecek return (error);
794 1.1 jdolecek }
795 1.1 jdolecek
796 1.1 jdolecek /*
797 1.1 jdolecek * We handle getattr only to change the fsid and
798 1.1 jdolecek * track object sizes
799 1.1 jdolecek */
800 1.1 jdolecek int
801 1.30 matt union_getattr(void *v)
802 1.1 jdolecek {
803 1.1 jdolecek struct vop_getattr_args /* {
804 1.1 jdolecek struct vnode *a_vp;
805 1.1 jdolecek struct vattr *a_vap;
806 1.16 elad kauth_cred_t a_cred;
807 1.1 jdolecek } */ *ap = v;
808 1.1 jdolecek int error;
809 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
810 1.1 jdolecek struct vnode *vp = un->un_uppervp;
811 1.1 jdolecek struct vattr *vap;
812 1.1 jdolecek struct vattr va;
813 1.1 jdolecek
814 1.1 jdolecek
815 1.1 jdolecek /*
816 1.1 jdolecek * Some programs walk the filesystem hierarchy by counting
817 1.1 jdolecek * links to directories to avoid stat'ing all the time.
818 1.1 jdolecek * This means the link count on directories needs to be "correct".
819 1.1 jdolecek * The only way to do that is to call getattr on both layers
820 1.1 jdolecek * and fix up the link count. The link count will not necessarily
821 1.1 jdolecek * be accurate but will be large enough to defeat the tree walkers.
822 1.1 jdolecek *
823 1.1 jdolecek * To make life more interesting, some filesystems don't keep
824 1.1 jdolecek * track of link counts in the expected way, and return a
825 1.1 jdolecek * link count of `1' for those directories; if either of the
826 1.1 jdolecek * component directories returns a link count of `1', we return a 1.
827 1.1 jdolecek */
828 1.1 jdolecek
829 1.1 jdolecek vap = ap->a_vap;
830 1.1 jdolecek
831 1.1 jdolecek vp = un->un_uppervp;
832 1.1 jdolecek if (vp != NULLVP) {
833 1.1 jdolecek /*
834 1.1 jdolecek * It's not clear whether VOP_GETATTR is to be
835 1.1 jdolecek * called with the vnode locked or not. stat() calls
836 1.1 jdolecek * it with (vp) locked, and fstat calls it with
837 1.1 jdolecek * (vp) unlocked.
838 1.1 jdolecek * In the mean time, compensate here by checking
839 1.1 jdolecek * the union_node's lock flag.
840 1.1 jdolecek */
841 1.1 jdolecek if (un->un_flags & UN_LOCKED)
842 1.1 jdolecek FIXUP(un);
843 1.1 jdolecek
844 1.23 pooka error = VOP_GETATTR(vp, vap, ap->a_cred);
845 1.1 jdolecek if (error)
846 1.1 jdolecek return (error);
847 1.1 jdolecek union_newsize(ap->a_vp, vap->va_size, VNOVAL);
848 1.1 jdolecek }
849 1.1 jdolecek
850 1.1 jdolecek if (vp == NULLVP) {
851 1.1 jdolecek vp = un->un_lowervp;
852 1.1 jdolecek } else if (vp->v_type == VDIR) {
853 1.1 jdolecek vp = un->un_lowervp;
854 1.1 jdolecek if (vp != NULLVP)
855 1.1 jdolecek vap = &va;
856 1.1 jdolecek } else {
857 1.1 jdolecek vp = NULLVP;
858 1.1 jdolecek }
859 1.1 jdolecek
860 1.1 jdolecek if (vp != NULLVP) {
861 1.23 pooka error = VOP_GETATTR(vp, vap, ap->a_cred);
862 1.1 jdolecek if (error)
863 1.1 jdolecek return (error);
864 1.1 jdolecek union_newsize(ap->a_vp, VNOVAL, vap->va_size);
865 1.1 jdolecek }
866 1.1 jdolecek
867 1.1 jdolecek if ((vap != ap->a_vap) && (vap->va_type == VDIR)) {
868 1.1 jdolecek /*
869 1.1 jdolecek * Link count manipulation:
870 1.1 jdolecek * - If both return "2", return 2 (no subdirs)
871 1.1 jdolecek * - If one or the other return "1", return "1" (ENOCLUE)
872 1.1 jdolecek */
873 1.1 jdolecek if ((ap->a_vap->va_nlink == 2) &&
874 1.1 jdolecek (vap->va_nlink == 2))
875 1.1 jdolecek ;
876 1.1 jdolecek else if (ap->a_vap->va_nlink != 1) {
877 1.1 jdolecek if (vap->va_nlink == 1)
878 1.1 jdolecek ap->a_vap->va_nlink = 1;
879 1.1 jdolecek else
880 1.1 jdolecek ap->a_vap->va_nlink += vap->va_nlink;
881 1.1 jdolecek }
882 1.1 jdolecek }
883 1.9 christos ap->a_vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
884 1.1 jdolecek return (0);
885 1.1 jdolecek }
886 1.1 jdolecek
887 1.1 jdolecek int
888 1.30 matt union_setattr(void *v)
889 1.1 jdolecek {
890 1.1 jdolecek struct vop_setattr_args /* {
891 1.1 jdolecek struct vnode *a_vp;
892 1.1 jdolecek struct vattr *a_vap;
893 1.16 elad kauth_cred_t a_cred;
894 1.1 jdolecek } */ *ap = v;
895 1.1 jdolecek struct vattr *vap = ap->a_vap;
896 1.1 jdolecek struct vnode *vp = ap->a_vp;
897 1.1 jdolecek struct union_node *un = VTOUNION(vp);
898 1.43 hannken bool size_only; /* All but va_size are VNOVAL. */
899 1.1 jdolecek int error;
900 1.1 jdolecek
901 1.43 hannken size_only = (vap->va_flags == VNOVAL && vap->va_uid == (uid_t)VNOVAL &&
902 1.43 hannken vap->va_gid == (gid_t)VNOVAL && vap->va_atime.tv_sec == VNOVAL &&
903 1.43 hannken vap->va_mtime.tv_sec == VNOVAL && vap->va_mode == (mode_t)VNOVAL);
904 1.43 hannken
905 1.43 hannken if (!size_only && (vp->v_mount->mnt_flag & MNT_RDONLY))
906 1.1 jdolecek return (EROFS);
907 1.1 jdolecek if (vap->va_size != VNOVAL) {
908 1.1 jdolecek switch (vp->v_type) {
909 1.1 jdolecek case VDIR:
910 1.1 jdolecek return (EISDIR);
911 1.1 jdolecek case VCHR:
912 1.1 jdolecek case VBLK:
913 1.1 jdolecek case VSOCK:
914 1.1 jdolecek case VFIFO:
915 1.1 jdolecek break;
916 1.1 jdolecek case VREG:
917 1.1 jdolecek case VLNK:
918 1.1 jdolecek default:
919 1.1 jdolecek /*
920 1.1 jdolecek * Disallow write attempts if the filesystem is
921 1.1 jdolecek * mounted read-only.
922 1.1 jdolecek */
923 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
924 1.1 jdolecek return (EROFS);
925 1.1 jdolecek }
926 1.1 jdolecek }
927 1.11 perry
928 1.1 jdolecek /*
929 1.1 jdolecek * Handle case of truncating lower object to zero size,
930 1.1 jdolecek * by creating a zero length upper object. This is to
931 1.1 jdolecek * handle the case of open with O_TRUNC and O_CREAT.
932 1.1 jdolecek */
933 1.1 jdolecek if ((un->un_uppervp == NULLVP) &&
934 1.1 jdolecek /* assert(un->un_lowervp != NULLVP) */
935 1.1 jdolecek (un->un_lowervp->v_type == VREG)) {
936 1.1 jdolecek error = union_copyup(un, (vap->va_size != 0),
937 1.23 pooka ap->a_cred, curlwp);
938 1.1 jdolecek if (error)
939 1.1 jdolecek return (error);
940 1.1 jdolecek }
941 1.1 jdolecek
942 1.1 jdolecek /*
943 1.43 hannken * Try to set attributes in upper layer, ignore size change to zero
944 1.43 hannken * for devices to handle O_TRUNC and return read-only filesystem error
945 1.43 hannken * otherwise.
946 1.1 jdolecek */
947 1.1 jdolecek if (un->un_uppervp != NULLVP) {
948 1.1 jdolecek FIXUP(un);
949 1.23 pooka error = VOP_SETATTR(un->un_uppervp, vap, ap->a_cred);
950 1.1 jdolecek if ((error == 0) && (vap->va_size != VNOVAL))
951 1.1 jdolecek union_newsize(ap->a_vp, vap->va_size, VNOVAL);
952 1.1 jdolecek } else {
953 1.43 hannken KASSERT(un->un_lowervp != NULLVP);
954 1.44 hannken if (NODE_IS_SPECIAL(un->un_lowervp)) {
955 1.43 hannken if (size_only &&
956 1.43 hannken (vap->va_size == 0 || vap->va_size == VNOVAL))
957 1.43 hannken error = 0;
958 1.43 hannken else
959 1.43 hannken error = EROFS;
960 1.44 hannken } else {
961 1.43 hannken error = EROFS;
962 1.43 hannken }
963 1.1 jdolecek }
964 1.1 jdolecek
965 1.1 jdolecek return (error);
966 1.1 jdolecek }
967 1.1 jdolecek
968 1.1 jdolecek int
969 1.30 matt union_read(void *v)
970 1.1 jdolecek {
971 1.1 jdolecek struct vop_read_args /* {
972 1.1 jdolecek struct vnode *a_vp;
973 1.1 jdolecek struct uio *a_uio;
974 1.1 jdolecek int a_ioflag;
975 1.16 elad kauth_cred_t a_cred;
976 1.1 jdolecek } */ *ap = v;
977 1.1 jdolecek int error;
978 1.1 jdolecek struct vnode *vp = OTHERVP(ap->a_vp);
979 1.1 jdolecek int dolock = (vp == LOWERVP(ap->a_vp));
980 1.1 jdolecek
981 1.1 jdolecek if (dolock)
982 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
983 1.1 jdolecek else
984 1.1 jdolecek FIXUP(VTOUNION(ap->a_vp));
985 1.1 jdolecek error = VOP_READ(vp, ap->a_uio, ap->a_ioflag, ap->a_cred);
986 1.1 jdolecek if (dolock)
987 1.36 hannken VOP_UNLOCK(vp);
988 1.1 jdolecek
989 1.1 jdolecek /*
990 1.1 jdolecek * XXX
991 1.1 jdolecek * perhaps the size of the underlying object has changed under
992 1.1 jdolecek * our feet. take advantage of the offset information present
993 1.1 jdolecek * in the uio structure.
994 1.1 jdolecek */
995 1.1 jdolecek if (error == 0) {
996 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
997 1.1 jdolecek off_t cur = ap->a_uio->uio_offset;
998 1.1 jdolecek
999 1.1 jdolecek if (vp == un->un_uppervp) {
1000 1.1 jdolecek if (cur > un->un_uppersz)
1001 1.1 jdolecek union_newsize(ap->a_vp, cur, VNOVAL);
1002 1.1 jdolecek } else {
1003 1.1 jdolecek if (cur > un->un_lowersz)
1004 1.1 jdolecek union_newsize(ap->a_vp, VNOVAL, cur);
1005 1.1 jdolecek }
1006 1.1 jdolecek }
1007 1.1 jdolecek
1008 1.1 jdolecek return (error);
1009 1.1 jdolecek }
1010 1.1 jdolecek
1011 1.1 jdolecek int
1012 1.30 matt union_write(void *v)
1013 1.1 jdolecek {
1014 1.1 jdolecek struct vop_read_args /* {
1015 1.1 jdolecek struct vnode *a_vp;
1016 1.1 jdolecek struct uio *a_uio;
1017 1.1 jdolecek int a_ioflag;
1018 1.16 elad kauth_cred_t a_cred;
1019 1.1 jdolecek } */ *ap = v;
1020 1.1 jdolecek int error;
1021 1.1 jdolecek struct vnode *vp;
1022 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1023 1.1 jdolecek
1024 1.1 jdolecek vp = UPPERVP(ap->a_vp);
1025 1.43 hannken if (vp == NULLVP) {
1026 1.43 hannken vp = LOWERVP(ap->a_vp);
1027 1.44 hannken if (NODE_IS_SPECIAL(vp)) {
1028 1.43 hannken vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1029 1.43 hannken error = VOP_WRITE(vp, ap->a_uio, ap->a_ioflag,
1030 1.43 hannken ap->a_cred);
1031 1.43 hannken VOP_UNLOCK(vp);
1032 1.43 hannken return error;
1033 1.43 hannken }
1034 1.44 hannken panic("union: missing upper layer in write");
1035 1.43 hannken }
1036 1.1 jdolecek
1037 1.1 jdolecek FIXUP(un);
1038 1.1 jdolecek error = VOP_WRITE(vp, ap->a_uio, ap->a_ioflag, ap->a_cred);
1039 1.1 jdolecek
1040 1.1 jdolecek /*
1041 1.1 jdolecek * the size of the underlying object may be changed by the
1042 1.1 jdolecek * write.
1043 1.1 jdolecek */
1044 1.1 jdolecek if (error == 0) {
1045 1.1 jdolecek off_t cur = ap->a_uio->uio_offset;
1046 1.1 jdolecek
1047 1.1 jdolecek if (cur > un->un_uppersz)
1048 1.1 jdolecek union_newsize(ap->a_vp, cur, VNOVAL);
1049 1.1 jdolecek }
1050 1.1 jdolecek
1051 1.1 jdolecek return (error);
1052 1.1 jdolecek }
1053 1.1 jdolecek
1054 1.1 jdolecek int
1055 1.30 matt union_ioctl(void *v)
1056 1.1 jdolecek {
1057 1.1 jdolecek struct vop_ioctl_args /* {
1058 1.1 jdolecek struct vnode *a_vp;
1059 1.1 jdolecek int a_command;
1060 1.10 jrf void *a_data;
1061 1.1 jdolecek int a_fflag;
1062 1.16 elad kauth_cred_t a_cred;
1063 1.1 jdolecek } */ *ap = v;
1064 1.1 jdolecek struct vnode *ovp = OTHERVP(ap->a_vp);
1065 1.1 jdolecek
1066 1.1 jdolecek ap->a_vp = ovp;
1067 1.1 jdolecek return (VCALL(ovp, VOFFSET(vop_ioctl), ap));
1068 1.1 jdolecek }
1069 1.1 jdolecek
1070 1.1 jdolecek int
1071 1.30 matt union_poll(void *v)
1072 1.1 jdolecek {
1073 1.1 jdolecek struct vop_poll_args /* {
1074 1.1 jdolecek struct vnode *a_vp;
1075 1.1 jdolecek int a_events;
1076 1.1 jdolecek } */ *ap = v;
1077 1.1 jdolecek struct vnode *ovp = OTHERVP(ap->a_vp);
1078 1.1 jdolecek
1079 1.1 jdolecek ap->a_vp = ovp;
1080 1.1 jdolecek return (VCALL(ovp, VOFFSET(vop_poll), ap));
1081 1.1 jdolecek }
1082 1.1 jdolecek
1083 1.1 jdolecek int
1084 1.30 matt union_revoke(void *v)
1085 1.1 jdolecek {
1086 1.1 jdolecek struct vop_revoke_args /* {
1087 1.1 jdolecek struct vnode *a_vp;
1088 1.1 jdolecek int a_flags;
1089 1.6 fvdl struct proc *a_p;
1090 1.1 jdolecek } */ *ap = v;
1091 1.1 jdolecek struct vnode *vp = ap->a_vp;
1092 1.1 jdolecek
1093 1.1 jdolecek if (UPPERVP(vp))
1094 1.1 jdolecek VOP_REVOKE(UPPERVP(vp), ap->a_flags);
1095 1.1 jdolecek if (LOWERVP(vp))
1096 1.1 jdolecek VOP_REVOKE(LOWERVP(vp), ap->a_flags);
1097 1.25 ad vgone(vp); /* XXXAD?? */
1098 1.1 jdolecek return (0);
1099 1.1 jdolecek }
1100 1.1 jdolecek
1101 1.1 jdolecek int
1102 1.30 matt union_mmap(void *v)
1103 1.1 jdolecek {
1104 1.1 jdolecek struct vop_mmap_args /* {
1105 1.1 jdolecek struct vnode *a_vp;
1106 1.21 pooka vm_prot_t a_prot;
1107 1.16 elad kauth_cred_t a_cred;
1108 1.1 jdolecek } */ *ap = v;
1109 1.1 jdolecek struct vnode *ovp = OTHERVP(ap->a_vp);
1110 1.1 jdolecek
1111 1.1 jdolecek ap->a_vp = ovp;
1112 1.1 jdolecek return (VCALL(ovp, VOFFSET(vop_mmap), ap));
1113 1.1 jdolecek }
1114 1.1 jdolecek
1115 1.1 jdolecek int
1116 1.30 matt union_fsync(void *v)
1117 1.1 jdolecek {
1118 1.1 jdolecek struct vop_fsync_args /* {
1119 1.1 jdolecek struct vnode *a_vp;
1120 1.16 elad kauth_cred_t a_cred;
1121 1.1 jdolecek int a_flags;
1122 1.1 jdolecek off_t offhi;
1123 1.1 jdolecek off_t offlo;
1124 1.1 jdolecek } */ *ap = v;
1125 1.1 jdolecek int error = 0;
1126 1.1 jdolecek struct vnode *targetvp;
1127 1.1 jdolecek
1128 1.1 jdolecek /*
1129 1.1 jdolecek * If vinvalbuf is calling us, it's a "shallow fsync" -- don't
1130 1.1 jdolecek * bother syncing the underlying vnodes, since (a) they'll be
1131 1.1 jdolecek * fsync'ed when reclaimed and (b) we could deadlock if
1132 1.1 jdolecek * they're locked; otherwise, pass it through to the
1133 1.1 jdolecek * underlying layer.
1134 1.1 jdolecek */
1135 1.44 hannken if (ap->a_vp->v_type == VBLK || ap->a_vp->v_type == VCHR) {
1136 1.44 hannken error = spec_fsync(v);
1137 1.44 hannken if (error)
1138 1.44 hannken return error;
1139 1.44 hannken }
1140 1.44 hannken
1141 1.1 jdolecek if (ap->a_flags & FSYNC_RECLAIM)
1142 1.1 jdolecek return 0;
1143 1.11 perry
1144 1.1 jdolecek targetvp = OTHERVP(ap->a_vp);
1145 1.1 jdolecek if (targetvp != NULLVP) {
1146 1.1 jdolecek int dolock = (targetvp == LOWERVP(ap->a_vp));
1147 1.1 jdolecek
1148 1.1 jdolecek if (dolock)
1149 1.1 jdolecek vn_lock(targetvp, LK_EXCLUSIVE | LK_RETRY);
1150 1.1 jdolecek else
1151 1.1 jdolecek FIXUP(VTOUNION(ap->a_vp));
1152 1.1 jdolecek error = VOP_FSYNC(targetvp, ap->a_cred, ap->a_flags,
1153 1.23 pooka ap->a_offlo, ap->a_offhi);
1154 1.1 jdolecek if (dolock)
1155 1.36 hannken VOP_UNLOCK(targetvp);
1156 1.1 jdolecek }
1157 1.1 jdolecek
1158 1.1 jdolecek return (error);
1159 1.1 jdolecek }
1160 1.1 jdolecek
1161 1.1 jdolecek int
1162 1.30 matt union_seek(void *v)
1163 1.1 jdolecek {
1164 1.1 jdolecek struct vop_seek_args /* {
1165 1.1 jdolecek struct vnode *a_vp;
1166 1.1 jdolecek off_t a_oldoff;
1167 1.1 jdolecek off_t a_newoff;
1168 1.16 elad kauth_cred_t a_cred;
1169 1.1 jdolecek } */ *ap = v;
1170 1.1 jdolecek struct vnode *ovp = OTHERVP(ap->a_vp);
1171 1.1 jdolecek
1172 1.1 jdolecek ap->a_vp = ovp;
1173 1.1 jdolecek return (VCALL(ovp, VOFFSET(vop_seek), ap));
1174 1.1 jdolecek }
1175 1.1 jdolecek
1176 1.1 jdolecek int
1177 1.30 matt union_remove(void *v)
1178 1.1 jdolecek {
1179 1.1 jdolecek struct vop_remove_args /* {
1180 1.1 jdolecek struct vnode *a_dvp;
1181 1.1 jdolecek struct vnode *a_vp;
1182 1.1 jdolecek struct componentname *a_cnp;
1183 1.1 jdolecek } */ *ap = v;
1184 1.1 jdolecek int error;
1185 1.1 jdolecek struct union_node *dun = VTOUNION(ap->a_dvp);
1186 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1187 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
1188 1.1 jdolecek
1189 1.1 jdolecek if (dun->un_uppervp == NULLVP)
1190 1.1 jdolecek panic("union remove: null upper vnode");
1191 1.1 jdolecek
1192 1.1 jdolecek if (un->un_uppervp != NULLVP) {
1193 1.1 jdolecek struct vnode *dvp = dun->un_uppervp;
1194 1.1 jdolecek struct vnode *vp = un->un_uppervp;
1195 1.1 jdolecek
1196 1.1 jdolecek FIXUP(dun);
1197 1.34 pooka vref(dvp);
1198 1.1 jdolecek dun->un_flags |= UN_KLOCK;
1199 1.1 jdolecek vput(ap->a_dvp);
1200 1.1 jdolecek FIXUP(un);
1201 1.34 pooka vref(vp);
1202 1.1 jdolecek un->un_flags |= UN_KLOCK;
1203 1.1 jdolecek vput(ap->a_vp);
1204 1.1 jdolecek
1205 1.24 pooka if (union_dowhiteout(un, cnp->cn_cred))
1206 1.1 jdolecek cnp->cn_flags |= DOWHITEOUT;
1207 1.1 jdolecek error = VOP_REMOVE(dvp, vp, cnp);
1208 1.1 jdolecek if (!error)
1209 1.1 jdolecek union_removed_upper(un);
1210 1.1 jdolecek } else {
1211 1.1 jdolecek FIXUP(dun);
1212 1.1 jdolecek error = union_mkwhiteout(
1213 1.1 jdolecek MOUNTTOUNIONMOUNT(UNIONTOV(dun)->v_mount),
1214 1.46 hannken dun->un_uppervp, ap->a_cnp, un);
1215 1.1 jdolecek vput(ap->a_dvp);
1216 1.1 jdolecek vput(ap->a_vp);
1217 1.1 jdolecek }
1218 1.1 jdolecek
1219 1.1 jdolecek return (error);
1220 1.1 jdolecek }
1221 1.1 jdolecek
1222 1.1 jdolecek int
1223 1.30 matt union_link(void *v)
1224 1.1 jdolecek {
1225 1.1 jdolecek struct vop_link_args /* {
1226 1.1 jdolecek struct vnode *a_dvp;
1227 1.1 jdolecek struct vnode *a_vp;
1228 1.1 jdolecek struct componentname *a_cnp;
1229 1.1 jdolecek } */ *ap = v;
1230 1.1 jdolecek int error = 0;
1231 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
1232 1.1 jdolecek struct union_node *dun;
1233 1.1 jdolecek struct vnode *vp;
1234 1.1 jdolecek struct vnode *dvp;
1235 1.1 jdolecek
1236 1.1 jdolecek dun = VTOUNION(ap->a_dvp);
1237 1.1 jdolecek
1238 1.45 hannken KASSERT((ap->a_cnp->cn_flags & LOCKPARENT) != 0);
1239 1.1 jdolecek
1240 1.1 jdolecek if (ap->a_dvp->v_op != ap->a_vp->v_op) {
1241 1.1 jdolecek vp = ap->a_vp;
1242 1.1 jdolecek } else {
1243 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1244 1.1 jdolecek if (un->un_uppervp == NULLVP) {
1245 1.1 jdolecek /*
1246 1.1 jdolecek * Needs to be copied before we can link it.
1247 1.1 jdolecek */
1248 1.1 jdolecek vn_lock(ap->a_vp, LK_EXCLUSIVE | LK_RETRY);
1249 1.1 jdolecek if (dun->un_uppervp == un->un_dirvp) {
1250 1.1 jdolecek dun->un_flags &= ~UN_ULOCK;
1251 1.36 hannken VOP_UNLOCK(dun->un_uppervp);
1252 1.1 jdolecek }
1253 1.24 pooka error = union_copyup(un, 1, cnp->cn_cred, curlwp);
1254 1.1 jdolecek if (dun->un_uppervp == un->un_dirvp) {
1255 1.1 jdolecek /*
1256 1.1 jdolecek * During copyup, we dropped the lock on the
1257 1.1 jdolecek * dir and invalidated any saved namei lookup
1258 1.1 jdolecek * state for the directory we'll be entering
1259 1.1 jdolecek * the link in. We need to re-run the lookup
1260 1.1 jdolecek * in that directory to reset any state needed
1261 1.1 jdolecek * for VOP_LINK.
1262 1.1 jdolecek * Call relookup on the union-layer to reset
1263 1.1 jdolecek * the state.
1264 1.1 jdolecek */
1265 1.1 jdolecek vp = NULLVP;
1266 1.1 jdolecek if (dun->un_uppervp == NULLVP)
1267 1.1 jdolecek panic("union: null upperdvp?");
1268 1.39 dholland error = relookup(ap->a_dvp, &vp, ap->a_cnp, 0);
1269 1.1 jdolecek if (error) {
1270 1.36 hannken VOP_UNLOCK(ap->a_vp);
1271 1.1 jdolecek return EROFS; /* ? */
1272 1.1 jdolecek }
1273 1.1 jdolecek if (vp != NULLVP) {
1274 1.1 jdolecek /*
1275 1.1 jdolecek * The name we want to create has
1276 1.1 jdolecek * mysteriously appeared (a race?)
1277 1.1 jdolecek */
1278 1.1 jdolecek error = EEXIST;
1279 1.36 hannken VOP_UNLOCK(ap->a_vp);
1280 1.18 chs vput(ap->a_dvp);
1281 1.18 chs vput(vp);
1282 1.18 chs return (error);
1283 1.1 jdolecek }
1284 1.1 jdolecek }
1285 1.36 hannken VOP_UNLOCK(ap->a_vp);
1286 1.1 jdolecek }
1287 1.1 jdolecek vp = un->un_uppervp;
1288 1.1 jdolecek }
1289 1.1 jdolecek
1290 1.1 jdolecek dvp = dun->un_uppervp;
1291 1.1 jdolecek if (dvp == NULLVP)
1292 1.1 jdolecek error = EROFS;
1293 1.1 jdolecek
1294 1.1 jdolecek if (error) {
1295 1.1 jdolecek vput(ap->a_dvp);
1296 1.1 jdolecek return (error);
1297 1.1 jdolecek }
1298 1.1 jdolecek
1299 1.1 jdolecek FIXUP(dun);
1300 1.34 pooka vref(dvp);
1301 1.1 jdolecek dun->un_flags |= UN_KLOCK;
1302 1.1 jdolecek vput(ap->a_dvp);
1303 1.1 jdolecek
1304 1.1 jdolecek return (VOP_LINK(dvp, vp, cnp));
1305 1.1 jdolecek }
1306 1.1 jdolecek
1307 1.1 jdolecek int
1308 1.30 matt union_rename(void *v)
1309 1.1 jdolecek {
1310 1.1 jdolecek struct vop_rename_args /* {
1311 1.1 jdolecek struct vnode *a_fdvp;
1312 1.1 jdolecek struct vnode *a_fvp;
1313 1.1 jdolecek struct componentname *a_fcnp;
1314 1.1 jdolecek struct vnode *a_tdvp;
1315 1.1 jdolecek struct vnode *a_tvp;
1316 1.1 jdolecek struct componentname *a_tcnp;
1317 1.1 jdolecek } */ *ap = v;
1318 1.1 jdolecek int error;
1319 1.1 jdolecek
1320 1.1 jdolecek struct vnode *fdvp = ap->a_fdvp;
1321 1.1 jdolecek struct vnode *fvp = ap->a_fvp;
1322 1.1 jdolecek struct vnode *tdvp = ap->a_tdvp;
1323 1.1 jdolecek struct vnode *tvp = ap->a_tvp;
1324 1.1 jdolecek
1325 1.1 jdolecek if (fdvp->v_op == union_vnodeop_p) { /* always true */
1326 1.1 jdolecek struct union_node *un = VTOUNION(fdvp);
1327 1.1 jdolecek if (un->un_uppervp == NULLVP) {
1328 1.1 jdolecek /*
1329 1.1 jdolecek * this should never happen in normal
1330 1.1 jdolecek * operation but might if there was
1331 1.1 jdolecek * a problem creating the top-level shadow
1332 1.1 jdolecek * directory.
1333 1.1 jdolecek */
1334 1.1 jdolecek error = EXDEV;
1335 1.1 jdolecek goto bad;
1336 1.1 jdolecek }
1337 1.1 jdolecek
1338 1.1 jdolecek fdvp = un->un_uppervp;
1339 1.34 pooka vref(fdvp);
1340 1.1 jdolecek }
1341 1.1 jdolecek
1342 1.1 jdolecek if (fvp->v_op == union_vnodeop_p) { /* always true */
1343 1.1 jdolecek struct union_node *un = VTOUNION(fvp);
1344 1.1 jdolecek if (un->un_uppervp == NULLVP) {
1345 1.1 jdolecek /* XXX: should do a copyup */
1346 1.1 jdolecek error = EXDEV;
1347 1.1 jdolecek goto bad;
1348 1.1 jdolecek }
1349 1.1 jdolecek
1350 1.1 jdolecek if (un->un_lowervp != NULLVP)
1351 1.1 jdolecek ap->a_fcnp->cn_flags |= DOWHITEOUT;
1352 1.1 jdolecek
1353 1.1 jdolecek fvp = un->un_uppervp;
1354 1.34 pooka vref(fvp);
1355 1.1 jdolecek }
1356 1.1 jdolecek
1357 1.1 jdolecek if (tdvp->v_op == union_vnodeop_p) {
1358 1.1 jdolecek struct union_node *un = VTOUNION(tdvp);
1359 1.1 jdolecek if (un->un_uppervp == NULLVP) {
1360 1.1 jdolecek /*
1361 1.1 jdolecek * this should never happen in normal
1362 1.1 jdolecek * operation but might if there was
1363 1.1 jdolecek * a problem creating the top-level shadow
1364 1.1 jdolecek * directory.
1365 1.1 jdolecek */
1366 1.1 jdolecek error = EXDEV;
1367 1.1 jdolecek goto bad;
1368 1.1 jdolecek }
1369 1.1 jdolecek
1370 1.1 jdolecek tdvp = un->un_uppervp;
1371 1.34 pooka vref(tdvp);
1372 1.1 jdolecek un->un_flags |= UN_KLOCK;
1373 1.1 jdolecek vput(ap->a_tdvp);
1374 1.1 jdolecek }
1375 1.1 jdolecek
1376 1.1 jdolecek if (tvp != NULLVP && tvp->v_op == union_vnodeop_p) {
1377 1.1 jdolecek struct union_node *un = VTOUNION(tvp);
1378 1.1 jdolecek
1379 1.1 jdolecek tvp = un->un_uppervp;
1380 1.1 jdolecek if (tvp != NULLVP) {
1381 1.34 pooka vref(tvp);
1382 1.1 jdolecek un->un_flags |= UN_KLOCK;
1383 1.1 jdolecek }
1384 1.1 jdolecek vput(ap->a_tvp);
1385 1.1 jdolecek }
1386 1.1 jdolecek
1387 1.18 chs error = VOP_RENAME(fdvp, fvp, ap->a_fcnp, tdvp, tvp, ap->a_tcnp);
1388 1.18 chs goto out;
1389 1.1 jdolecek
1390 1.1 jdolecek bad:
1391 1.1 jdolecek vput(tdvp);
1392 1.1 jdolecek if (tvp != NULLVP)
1393 1.1 jdolecek vput(tvp);
1394 1.18 chs vrele(fdvp);
1395 1.18 chs vrele(fvp);
1396 1.1 jdolecek
1397 1.18 chs out:
1398 1.18 chs if (fdvp != ap->a_fdvp) {
1399 1.18 chs vrele(ap->a_fdvp);
1400 1.18 chs }
1401 1.18 chs if (fvp != ap->a_fvp) {
1402 1.18 chs vrele(ap->a_fvp);
1403 1.18 chs }
1404 1.1 jdolecek return (error);
1405 1.1 jdolecek }
1406 1.1 jdolecek
1407 1.1 jdolecek int
1408 1.30 matt union_mkdir(void *v)
1409 1.1 jdolecek {
1410 1.1 jdolecek struct vop_mkdir_args /* {
1411 1.1 jdolecek struct vnode *a_dvp;
1412 1.1 jdolecek struct vnode **a_vpp;
1413 1.1 jdolecek struct componentname *a_cnp;
1414 1.1 jdolecek struct vattr *a_vap;
1415 1.1 jdolecek } */ *ap = v;
1416 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
1417 1.1 jdolecek struct vnode *dvp = un->un_uppervp;
1418 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
1419 1.1 jdolecek
1420 1.1 jdolecek if (dvp != NULLVP) {
1421 1.1 jdolecek int error;
1422 1.1 jdolecek struct vnode *vp;
1423 1.1 jdolecek
1424 1.1 jdolecek FIXUP(un);
1425 1.34 pooka vref(dvp);
1426 1.1 jdolecek un->un_flags |= UN_KLOCK;
1427 1.36 hannken VOP_UNLOCK(ap->a_dvp);
1428 1.1 jdolecek error = VOP_MKDIR(dvp, &vp, cnp, ap->a_vap);
1429 1.1 jdolecek if (error) {
1430 1.1 jdolecek vrele(ap->a_dvp);
1431 1.1 jdolecek return (error);
1432 1.1 jdolecek }
1433 1.1 jdolecek
1434 1.1 jdolecek error = union_allocvp(ap->a_vpp, ap->a_dvp->v_mount, ap->a_dvp,
1435 1.5 thorpej NULLVP, cnp, vp, NULLVP, 1);
1436 1.1 jdolecek if (error)
1437 1.1 jdolecek vput(vp);
1438 1.18 chs vrele(ap->a_dvp);
1439 1.1 jdolecek return (error);
1440 1.1 jdolecek }
1441 1.1 jdolecek
1442 1.1 jdolecek vput(ap->a_dvp);
1443 1.1 jdolecek return (EROFS);
1444 1.1 jdolecek }
1445 1.1 jdolecek
1446 1.1 jdolecek int
1447 1.30 matt union_rmdir(void *v)
1448 1.1 jdolecek {
1449 1.1 jdolecek struct vop_rmdir_args /* {
1450 1.1 jdolecek struct vnode *a_dvp;
1451 1.1 jdolecek struct vnode *a_vp;
1452 1.1 jdolecek struct componentname *a_cnp;
1453 1.1 jdolecek } */ *ap = v;
1454 1.1 jdolecek int error;
1455 1.1 jdolecek struct union_node *dun = VTOUNION(ap->a_dvp);
1456 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1457 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
1458 1.1 jdolecek
1459 1.1 jdolecek if (dun->un_uppervp == NULLVP)
1460 1.1 jdolecek panic("union rmdir: null upper vnode");
1461 1.1 jdolecek
1462 1.42 hannken error = union_check_rmdir(un, cnp->cn_cred);
1463 1.42 hannken if (error) {
1464 1.42 hannken vput(ap->a_dvp);
1465 1.42 hannken vput(ap->a_vp);
1466 1.42 hannken return error;
1467 1.42 hannken }
1468 1.42 hannken
1469 1.1 jdolecek if (un->un_uppervp != NULLVP) {
1470 1.1 jdolecek struct vnode *dvp = dun->un_uppervp;
1471 1.1 jdolecek struct vnode *vp = un->un_uppervp;
1472 1.1 jdolecek
1473 1.1 jdolecek FIXUP(dun);
1474 1.34 pooka vref(dvp);
1475 1.1 jdolecek dun->un_flags |= UN_KLOCK;
1476 1.1 jdolecek vput(ap->a_dvp);
1477 1.1 jdolecek FIXUP(un);
1478 1.34 pooka vref(vp);
1479 1.1 jdolecek un->un_flags |= UN_KLOCK;
1480 1.1 jdolecek vput(ap->a_vp);
1481 1.1 jdolecek
1482 1.24 pooka if (union_dowhiteout(un, cnp->cn_cred))
1483 1.1 jdolecek cnp->cn_flags |= DOWHITEOUT;
1484 1.1 jdolecek error = VOP_RMDIR(dvp, vp, ap->a_cnp);
1485 1.1 jdolecek if (!error)
1486 1.1 jdolecek union_removed_upper(un);
1487 1.1 jdolecek } else {
1488 1.1 jdolecek FIXUP(dun);
1489 1.1 jdolecek error = union_mkwhiteout(
1490 1.1 jdolecek MOUNTTOUNIONMOUNT(UNIONTOV(dun)->v_mount),
1491 1.46 hannken dun->un_uppervp, ap->a_cnp, un);
1492 1.1 jdolecek vput(ap->a_dvp);
1493 1.1 jdolecek vput(ap->a_vp);
1494 1.1 jdolecek }
1495 1.1 jdolecek
1496 1.1 jdolecek return (error);
1497 1.1 jdolecek }
1498 1.1 jdolecek
1499 1.1 jdolecek int
1500 1.30 matt union_symlink(void *v)
1501 1.1 jdolecek {
1502 1.1 jdolecek struct vop_symlink_args /* {
1503 1.1 jdolecek struct vnode *a_dvp;
1504 1.1 jdolecek struct vnode **a_vpp;
1505 1.1 jdolecek struct componentname *a_cnp;
1506 1.1 jdolecek struct vattr *a_vap;
1507 1.1 jdolecek char *a_target;
1508 1.1 jdolecek } */ *ap = v;
1509 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
1510 1.1 jdolecek struct vnode *dvp = un->un_uppervp;
1511 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
1512 1.1 jdolecek
1513 1.1 jdolecek if (dvp != NULLVP) {
1514 1.1 jdolecek int error;
1515 1.1 jdolecek
1516 1.1 jdolecek FIXUP(un);
1517 1.34 pooka vref(dvp);
1518 1.1 jdolecek un->un_flags |= UN_KLOCK;
1519 1.1 jdolecek vput(ap->a_dvp);
1520 1.1 jdolecek error = VOP_SYMLINK(dvp, ap->a_vpp, cnp, ap->a_vap,
1521 1.1 jdolecek ap->a_target);
1522 1.1 jdolecek return (error);
1523 1.1 jdolecek }
1524 1.1 jdolecek
1525 1.1 jdolecek vput(ap->a_dvp);
1526 1.1 jdolecek return (EROFS);
1527 1.1 jdolecek }
1528 1.1 jdolecek
1529 1.1 jdolecek /*
1530 1.1 jdolecek * union_readdir works in concert with getdirentries and
1531 1.1 jdolecek * readdir(3) to provide a list of entries in the unioned
1532 1.1 jdolecek * directories. getdirentries is responsible for walking
1533 1.1 jdolecek * down the union stack. readdir(3) is responsible for
1534 1.1 jdolecek * eliminating duplicate names from the returned data stream.
1535 1.1 jdolecek */
1536 1.1 jdolecek int
1537 1.30 matt union_readdir(void *v)
1538 1.1 jdolecek {
1539 1.1 jdolecek struct vop_readdir_args /* {
1540 1.1 jdolecek struct vnodeop_desc *a_desc;
1541 1.1 jdolecek struct vnode *a_vp;
1542 1.1 jdolecek struct uio *a_uio;
1543 1.16 elad kauth_cred_t a_cred;
1544 1.1 jdolecek int *a_eofflag;
1545 1.1 jdolecek u_long *a_cookies;
1546 1.1 jdolecek int a_ncookies;
1547 1.1 jdolecek } */ *ap = v;
1548 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1549 1.1 jdolecek struct vnode *uvp = un->un_uppervp;
1550 1.1 jdolecek
1551 1.1 jdolecek if (uvp == NULLVP)
1552 1.1 jdolecek return (0);
1553 1.1 jdolecek
1554 1.1 jdolecek FIXUP(un);
1555 1.1 jdolecek ap->a_vp = uvp;
1556 1.1 jdolecek return (VCALL(uvp, VOFFSET(vop_readdir), ap));
1557 1.1 jdolecek }
1558 1.1 jdolecek
1559 1.1 jdolecek int
1560 1.30 matt union_readlink(void *v)
1561 1.1 jdolecek {
1562 1.1 jdolecek struct vop_readlink_args /* {
1563 1.1 jdolecek struct vnode *a_vp;
1564 1.1 jdolecek struct uio *a_uio;
1565 1.16 elad kauth_cred_t a_cred;
1566 1.1 jdolecek } */ *ap = v;
1567 1.1 jdolecek int error;
1568 1.1 jdolecek struct vnode *vp = OTHERVP(ap->a_vp);
1569 1.1 jdolecek int dolock = (vp == LOWERVP(ap->a_vp));
1570 1.1 jdolecek
1571 1.1 jdolecek if (dolock)
1572 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1573 1.1 jdolecek else
1574 1.1 jdolecek FIXUP(VTOUNION(ap->a_vp));
1575 1.1 jdolecek ap->a_vp = vp;
1576 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_readlink), ap);
1577 1.1 jdolecek if (dolock)
1578 1.36 hannken VOP_UNLOCK(vp);
1579 1.1 jdolecek
1580 1.1 jdolecek return (error);
1581 1.1 jdolecek }
1582 1.1 jdolecek
1583 1.1 jdolecek int
1584 1.30 matt union_abortop(void *v)
1585 1.1 jdolecek {
1586 1.1 jdolecek struct vop_abortop_args /* {
1587 1.1 jdolecek struct vnode *a_dvp;
1588 1.1 jdolecek struct componentname *a_cnp;
1589 1.1 jdolecek } */ *ap = v;
1590 1.1 jdolecek int error;
1591 1.1 jdolecek struct vnode *vp = OTHERVP(ap->a_dvp);
1592 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_dvp);
1593 1.1 jdolecek int islocked = un->un_flags & UN_LOCKED;
1594 1.1 jdolecek int dolock = (vp == LOWERVP(ap->a_dvp));
1595 1.1 jdolecek
1596 1.1 jdolecek if (islocked) {
1597 1.1 jdolecek if (dolock)
1598 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1599 1.1 jdolecek else
1600 1.1 jdolecek FIXUP(VTOUNION(ap->a_dvp));
1601 1.1 jdolecek }
1602 1.1 jdolecek ap->a_dvp = vp;
1603 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_abortop), ap);
1604 1.1 jdolecek if (islocked && dolock)
1605 1.36 hannken VOP_UNLOCK(vp);
1606 1.1 jdolecek
1607 1.1 jdolecek return (error);
1608 1.1 jdolecek }
1609 1.1 jdolecek
1610 1.1 jdolecek int
1611 1.30 matt union_inactive(void *v)
1612 1.1 jdolecek {
1613 1.1 jdolecek struct vop_inactive_args /* {
1614 1.14 christos const struct vnodeop_desc *a_desc;
1615 1.1 jdolecek struct vnode *a_vp;
1616 1.25 ad bool *a_recycle;
1617 1.1 jdolecek } */ *ap = v;
1618 1.1 jdolecek struct vnode *vp = ap->a_vp;
1619 1.1 jdolecek struct union_node *un = VTOUNION(vp);
1620 1.1 jdolecek struct vnode **vpp;
1621 1.1 jdolecek
1622 1.1 jdolecek /*
1623 1.1 jdolecek * Do nothing (and _don't_ bypass).
1624 1.1 jdolecek * Wait to vrele lowervp until reclaim,
1625 1.1 jdolecek * so that until then our union_node is in the
1626 1.1 jdolecek * cache and reusable.
1627 1.1 jdolecek *
1628 1.1 jdolecek * NEEDSWORK: Someday, consider inactive'ing
1629 1.1 jdolecek * the lowervp and then trying to reactivate it
1630 1.1 jdolecek * with capabilities (v_id)
1631 1.1 jdolecek * like they do in the name lookup cache code.
1632 1.1 jdolecek * That's too much work for now.
1633 1.1 jdolecek */
1634 1.1 jdolecek
1635 1.1 jdolecek if (un->un_dircache != 0) {
1636 1.1 jdolecek for (vpp = un->un_dircache; *vpp != NULLVP; vpp++)
1637 1.1 jdolecek vrele(*vpp);
1638 1.1 jdolecek free(un->un_dircache, M_TEMP);
1639 1.1 jdolecek un->un_dircache = 0;
1640 1.1 jdolecek }
1641 1.1 jdolecek
1642 1.25 ad *ap->a_recycle = ((un->un_flags & UN_CACHED) == 0);
1643 1.36 hannken VOP_UNLOCK(vp);
1644 1.1 jdolecek
1645 1.1 jdolecek return (0);
1646 1.1 jdolecek }
1647 1.1 jdolecek
1648 1.1 jdolecek int
1649 1.30 matt union_reclaim(void *v)
1650 1.1 jdolecek {
1651 1.1 jdolecek struct vop_reclaim_args /* {
1652 1.1 jdolecek struct vnode *a_vp;
1653 1.1 jdolecek } */ *ap = v;
1654 1.1 jdolecek
1655 1.1 jdolecek union_freevp(ap->a_vp);
1656 1.1 jdolecek
1657 1.1 jdolecek return (0);
1658 1.1 jdolecek }
1659 1.1 jdolecek
1660 1.1 jdolecek int
1661 1.30 matt union_lock(void *v)
1662 1.1 jdolecek {
1663 1.1 jdolecek struct vop_lock_args /* {
1664 1.1 jdolecek struct vnode *a_vp;
1665 1.1 jdolecek int a_flags;
1666 1.1 jdolecek } */ *ap = v;
1667 1.1 jdolecek struct vnode *vp = ap->a_vp;
1668 1.1 jdolecek int flags = ap->a_flags;
1669 1.1 jdolecek struct union_node *un;
1670 1.1 jdolecek int error;
1671 1.1 jdolecek
1672 1.19 chs /* XXX unionfs can't handle shared locks yet */
1673 1.37 hannken if ((flags & LK_SHARED) != 0) {
1674 1.37 hannken flags = (flags & ~LK_SHARED) | LK_EXCLUSIVE;
1675 1.19 chs }
1676 1.19 chs
1677 1.1 jdolecek start:
1678 1.1 jdolecek un = VTOUNION(vp);
1679 1.1 jdolecek
1680 1.1 jdolecek if (un->un_uppervp != NULLVP) {
1681 1.1 jdolecek if (((un->un_flags & UN_ULOCK) == 0) &&
1682 1.1 jdolecek (vp->v_usecount != 0)) {
1683 1.1 jdolecek /*
1684 1.1 jdolecek * We MUST always use the order of: take upper
1685 1.1 jdolecek * vp lock, manipulate union node flags, drop
1686 1.1 jdolecek * upper vp lock. This code must not be an
1687 1.29 dholland * exception.
1688 1.1 jdolecek */
1689 1.1 jdolecek error = vn_lock(un->un_uppervp, flags);
1690 1.1 jdolecek if (error)
1691 1.1 jdolecek return (error);
1692 1.1 jdolecek un->un_flags |= UN_ULOCK;
1693 1.1 jdolecek }
1694 1.1 jdolecek #ifdef DIAGNOSTIC
1695 1.1 jdolecek if (un->un_flags & UN_KLOCK) {
1696 1.1 jdolecek vprint("union: dangling klock", vp);
1697 1.1 jdolecek panic("union: dangling upper lock (%p)", vp);
1698 1.1 jdolecek }
1699 1.1 jdolecek #endif
1700 1.1 jdolecek }
1701 1.1 jdolecek
1702 1.1 jdolecek /* XXX ignores LK_NOWAIT */
1703 1.1 jdolecek if (un->un_flags & UN_LOCKED) {
1704 1.45 hannken KASSERT(curlwp == NULL || un->un_lwp == NULL ||
1705 1.45 hannken un->un_lwp != curlwp);
1706 1.1 jdolecek un->un_flags |= UN_WANTED;
1707 1.10 jrf tsleep(&un->un_flags, PINOD, "unionlk2", 0);
1708 1.1 jdolecek goto start;
1709 1.1 jdolecek }
1710 1.1 jdolecek
1711 1.45 hannken un->un_lwp = curlwp;
1712 1.1 jdolecek
1713 1.1 jdolecek un->un_flags |= UN_LOCKED;
1714 1.1 jdolecek return (0);
1715 1.1 jdolecek }
1716 1.1 jdolecek
1717 1.1 jdolecek /*
1718 1.1 jdolecek * When operations want to vput() a union node yet retain a lock on
1719 1.1 jdolecek * the upper vnode (say, to do some further operations like link(),
1720 1.1 jdolecek * mkdir(), ...), they set UN_KLOCK on the union node, then call
1721 1.1 jdolecek * vput() which calls VOP_UNLOCK() and comes here. union_unlock()
1722 1.1 jdolecek * unlocks the union node (leaving the upper vnode alone), clears the
1723 1.1 jdolecek * KLOCK flag, and then returns to vput(). The caller then does whatever
1724 1.1 jdolecek * is left to do with the upper vnode, and ensures that it gets unlocked.
1725 1.1 jdolecek *
1726 1.1 jdolecek * If UN_KLOCK isn't set, then the upper vnode is unlocked here.
1727 1.1 jdolecek */
1728 1.1 jdolecek int
1729 1.30 matt union_unlock(void *v)
1730 1.1 jdolecek {
1731 1.1 jdolecek struct vop_unlock_args /* {
1732 1.1 jdolecek struct vnode *a_vp;
1733 1.1 jdolecek int a_flags;
1734 1.1 jdolecek } */ *ap = v;
1735 1.1 jdolecek struct union_node *un = VTOUNION(ap->a_vp);
1736 1.1 jdolecek
1737 1.45 hannken KASSERT((un->un_flags & UN_LOCKED) != 0);
1738 1.45 hannken KASSERT(curlwp == NULL || un->un_lwp == NULL ||
1739 1.45 hannken un->un_lwp == curlwp);
1740 1.1 jdolecek
1741 1.1 jdolecek un->un_flags &= ~UN_LOCKED;
1742 1.1 jdolecek
1743 1.1 jdolecek if ((un->un_flags & (UN_ULOCK|UN_KLOCK)) == UN_ULOCK)
1744 1.36 hannken VOP_UNLOCK(un->un_uppervp);
1745 1.1 jdolecek
1746 1.1 jdolecek un->un_flags &= ~(UN_ULOCK|UN_KLOCK);
1747 1.1 jdolecek
1748 1.1 jdolecek if (un->un_flags & UN_WANTED) {
1749 1.1 jdolecek un->un_flags &= ~UN_WANTED;
1750 1.10 jrf wakeup( &un->un_flags);
1751 1.1 jdolecek }
1752 1.1 jdolecek
1753 1.45 hannken un->un_lwp = NULL;
1754 1.1 jdolecek
1755 1.1 jdolecek return (0);
1756 1.1 jdolecek }
1757 1.1 jdolecek
1758 1.1 jdolecek int
1759 1.30 matt union_bmap(void *v)
1760 1.1 jdolecek {
1761 1.1 jdolecek struct vop_bmap_args /* {
1762 1.1 jdolecek struct vnode *a_vp;
1763 1.1 jdolecek daddr_t a_bn;
1764 1.1 jdolecek struct vnode **a_vpp;
1765 1.1 jdolecek daddr_t *a_bnp;
1766 1.1 jdolecek int *a_runp;
1767 1.1 jdolecek } */ *ap = v;
1768 1.1 jdolecek int error;
1769 1.1 jdolecek struct vnode *vp = OTHERVP(ap->a_vp);
1770 1.1 jdolecek int dolock = (vp == LOWERVP(ap->a_vp));
1771 1.1 jdolecek
1772 1.1 jdolecek if (dolock)
1773 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1774 1.1 jdolecek else
1775 1.1 jdolecek FIXUP(VTOUNION(ap->a_vp));
1776 1.1 jdolecek ap->a_vp = vp;
1777 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_bmap), ap);
1778 1.1 jdolecek if (dolock)
1779 1.36 hannken VOP_UNLOCK(vp);
1780 1.1 jdolecek
1781 1.1 jdolecek return (error);
1782 1.1 jdolecek }
1783 1.1 jdolecek
1784 1.1 jdolecek int
1785 1.30 matt union_print(void *v)
1786 1.1 jdolecek {
1787 1.1 jdolecek struct vop_print_args /* {
1788 1.1 jdolecek struct vnode *a_vp;
1789 1.1 jdolecek } */ *ap = v;
1790 1.1 jdolecek struct vnode *vp = ap->a_vp;
1791 1.1 jdolecek
1792 1.1 jdolecek printf("\ttag VT_UNION, vp=%p, uppervp=%p, lowervp=%p\n",
1793 1.1 jdolecek vp, UPPERVP(vp), LOWERVP(vp));
1794 1.1 jdolecek if (UPPERVP(vp) != NULLVP)
1795 1.1 jdolecek vprint("union: upper", UPPERVP(vp));
1796 1.1 jdolecek if (LOWERVP(vp) != NULLVP)
1797 1.1 jdolecek vprint("union: lower", LOWERVP(vp));
1798 1.1 jdolecek if (VTOUNION(vp)->un_dircache) {
1799 1.1 jdolecek struct vnode **vpp;
1800 1.1 jdolecek for (vpp = VTOUNION(vp)->un_dircache; *vpp != NULLVP; vpp++)
1801 1.1 jdolecek vprint("dircache:", *vpp);
1802 1.1 jdolecek }
1803 1.1 jdolecek
1804 1.1 jdolecek return (0);
1805 1.1 jdolecek }
1806 1.1 jdolecek
1807 1.1 jdolecek int
1808 1.30 matt union_islocked(void *v)
1809 1.1 jdolecek {
1810 1.1 jdolecek struct vop_islocked_args /* {
1811 1.1 jdolecek struct vnode *a_vp;
1812 1.1 jdolecek } */ *ap = v;
1813 1.1 jdolecek
1814 1.35 pooka return ((VTOUNION(ap->a_vp)->un_flags & UN_LOCKED) ? LK_EXCLUSIVE : 0);
1815 1.1 jdolecek }
1816 1.1 jdolecek
1817 1.1 jdolecek int
1818 1.30 matt union_pathconf(void *v)
1819 1.1 jdolecek {
1820 1.1 jdolecek struct vop_pathconf_args /* {
1821 1.1 jdolecek struct vnode *a_vp;
1822 1.1 jdolecek int a_name;
1823 1.1 jdolecek int *a_retval;
1824 1.1 jdolecek } */ *ap = v;
1825 1.1 jdolecek int error;
1826 1.1 jdolecek struct vnode *vp = OTHERVP(ap->a_vp);
1827 1.1 jdolecek int dolock = (vp == LOWERVP(ap->a_vp));
1828 1.1 jdolecek
1829 1.1 jdolecek if (dolock)
1830 1.1 jdolecek vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1831 1.1 jdolecek else
1832 1.1 jdolecek FIXUP(VTOUNION(ap->a_vp));
1833 1.1 jdolecek ap->a_vp = vp;
1834 1.1 jdolecek error = VCALL(vp, VOFFSET(vop_pathconf), ap);
1835 1.1 jdolecek if (dolock)
1836 1.36 hannken VOP_UNLOCK(vp);
1837 1.1 jdolecek
1838 1.1 jdolecek return (error);
1839 1.1 jdolecek }
1840 1.1 jdolecek
1841 1.1 jdolecek int
1842 1.30 matt union_advlock(void *v)
1843 1.1 jdolecek {
1844 1.1 jdolecek struct vop_advlock_args /* {
1845 1.1 jdolecek struct vnode *a_vp;
1846 1.10 jrf void *a_id;
1847 1.1 jdolecek int a_op;
1848 1.1 jdolecek struct flock *a_fl;
1849 1.1 jdolecek int a_flags;
1850 1.1 jdolecek } */ *ap = v;
1851 1.1 jdolecek struct vnode *ovp = OTHERVP(ap->a_vp);
1852 1.1 jdolecek
1853 1.1 jdolecek ap->a_vp = ovp;
1854 1.1 jdolecek return (VCALL(ovp, VOFFSET(vop_advlock), ap));
1855 1.1 jdolecek }
1856 1.1 jdolecek
1857 1.1 jdolecek int
1858 1.30 matt union_strategy(void *v)
1859 1.1 jdolecek {
1860 1.1 jdolecek struct vop_strategy_args /* {
1861 1.8 hannken struct vnode *a_vp;
1862 1.1 jdolecek struct buf *a_bp;
1863 1.1 jdolecek } */ *ap = v;
1864 1.8 hannken struct vnode *ovp = OTHERVP(ap->a_vp);
1865 1.1 jdolecek struct buf *bp = ap->a_bp;
1866 1.1 jdolecek
1867 1.45 hannken KASSERT(ovp != NULLVP);
1868 1.45 hannken if (!NODE_IS_SPECIAL(ovp))
1869 1.45 hannken KASSERT((bp->b_flags & B_READ) || ovp != LOWERVP(bp->b_vp));
1870 1.1 jdolecek
1871 1.8 hannken return (VOP_STRATEGY(ovp, bp));
1872 1.1 jdolecek }
1873 1.1 jdolecek
1874 1.1 jdolecek int
1875 1.44 hannken union_bwrite(void *v)
1876 1.44 hannken {
1877 1.44 hannken struct vop_bwrite_args /* {
1878 1.44 hannken struct vnode *a_vp;
1879 1.44 hannken struct buf *a_bp;
1880 1.44 hannken } */ *ap = v;
1881 1.44 hannken struct vnode *ovp = OTHERVP(ap->a_vp);
1882 1.44 hannken struct buf *bp = ap->a_bp;
1883 1.44 hannken
1884 1.45 hannken KASSERT(ovp != NULLVP);
1885 1.45 hannken if (!NODE_IS_SPECIAL(ovp))
1886 1.45 hannken KASSERT((bp->b_flags & B_READ) || ovp != LOWERVP(bp->b_vp));
1887 1.44 hannken
1888 1.44 hannken return (VOP_BWRITE(ovp, bp));
1889 1.44 hannken }
1890 1.44 hannken
1891 1.44 hannken int
1892 1.30 matt union_getpages(void *v)
1893 1.1 jdolecek {
1894 1.1 jdolecek struct vop_getpages_args /* {
1895 1.1 jdolecek struct vnode *a_vp;
1896 1.1 jdolecek voff_t a_offset;
1897 1.1 jdolecek struct vm_page **a_m;
1898 1.1 jdolecek int *a_count;
1899 1.1 jdolecek int a_centeridx;
1900 1.1 jdolecek vm_prot_t a_access_type;
1901 1.1 jdolecek int a_advice;
1902 1.1 jdolecek int a_flags;
1903 1.1 jdolecek } */ *ap = v;
1904 1.1 jdolecek struct vnode *vp = ap->a_vp;
1905 1.1 jdolecek
1906 1.40 rmind KASSERT(mutex_owned(vp->v_interlock));
1907 1.1 jdolecek
1908 1.1 jdolecek if (ap->a_flags & PGO_LOCKED) {
1909 1.1 jdolecek return EBUSY;
1910 1.1 jdolecek }
1911 1.1 jdolecek ap->a_vp = OTHERVP(vp);
1912 1.40 rmind KASSERT(vp->v_interlock == ap->a_vp->v_interlock);
1913 1.40 rmind
1914 1.40 rmind /* Just pass the request on to the underlying layer. */
1915 1.40 rmind return VCALL(ap->a_vp, VOFFSET(vop_getpages), ap);
1916 1.1 jdolecek }
1917 1.1 jdolecek
1918 1.1 jdolecek int
1919 1.30 matt union_putpages(void *v)
1920 1.1 jdolecek {
1921 1.1 jdolecek struct vop_putpages_args /* {
1922 1.1 jdolecek struct vnode *a_vp;
1923 1.1 jdolecek voff_t a_offlo;
1924 1.1 jdolecek voff_t a_offhi;
1925 1.1 jdolecek int a_flags;
1926 1.1 jdolecek } */ *ap = v;
1927 1.1 jdolecek struct vnode *vp = ap->a_vp;
1928 1.1 jdolecek
1929 1.40 rmind KASSERT(mutex_owned(vp->v_interlock));
1930 1.1 jdolecek
1931 1.1 jdolecek ap->a_vp = OTHERVP(vp);
1932 1.40 rmind KASSERT(vp->v_interlock == ap->a_vp->v_interlock);
1933 1.40 rmind
1934 1.20 chs if (ap->a_flags & PGO_RECLAIM) {
1935 1.40 rmind mutex_exit(vp->v_interlock);
1936 1.20 chs return 0;
1937 1.20 chs }
1938 1.40 rmind
1939 1.40 rmind /* Just pass the request on to the underlying layer. */
1940 1.40 rmind return VCALL(ap->a_vp, VOFFSET(vop_putpages), ap);
1941 1.2 jdolecek }
1942 1.2 jdolecek
1943 1.2 jdolecek int
1944 1.2 jdolecek union_kqfilter(void *v)
1945 1.2 jdolecek {
1946 1.2 jdolecek struct vop_kqfilter_args /* {
1947 1.2 jdolecek struct vnode *a_vp;
1948 1.2 jdolecek struct knote *a_kn;
1949 1.2 jdolecek } */ *ap = v;
1950 1.2 jdolecek int error;
1951 1.2 jdolecek
1952 1.2 jdolecek /*
1953 1.2 jdolecek * We watch either the upper layer file (if it already exists),
1954 1.2 jdolecek * or the lower layer one. If there is lower layer file only
1955 1.2 jdolecek * at this moment, we will keep watching that lower layer file
1956 1.2 jdolecek * even if upper layer file would be created later on.
1957 1.2 jdolecek */
1958 1.2 jdolecek if (UPPERVP(ap->a_vp))
1959 1.2 jdolecek error = VOP_KQFILTER(UPPERVP(ap->a_vp), ap->a_kn);
1960 1.2 jdolecek else if (LOWERVP(ap->a_vp))
1961 1.2 jdolecek error = VOP_KQFILTER(LOWERVP(ap->a_vp), ap->a_kn);
1962 1.2 jdolecek else {
1963 1.2 jdolecek /* panic? */
1964 1.2 jdolecek error = EOPNOTSUPP;
1965 1.2 jdolecek }
1966 1.2 jdolecek
1967 1.2 jdolecek return (error);
1968 1.1 jdolecek }
1969