Home | History | Annotate | Line # | Download | only in kern
vfs_vnode.c revision 1.11
      1  1.11  christos /*	$NetBSD: vfs_vnode.c,v 1.11 2011/09/29 20:51:38 christos Exp $	*/
      2   1.1     rmind 
      3   1.1     rmind /*-
      4   1.2     rmind  * Copyright (c) 1997-2011 The NetBSD Foundation, Inc.
      5   1.1     rmind  * All rights reserved.
      6   1.1     rmind  *
      7   1.1     rmind  * This code is derived from software contributed to The NetBSD Foundation
      8   1.1     rmind  * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
      9   1.1     rmind  * NASA Ames Research Center, by Charles M. Hannum, and by Andrew Doran.
     10   1.1     rmind  *
     11   1.1     rmind  * Redistribution and use in source and binary forms, with or without
     12   1.1     rmind  * modification, are permitted provided that the following conditions
     13   1.1     rmind  * are met:
     14   1.1     rmind  * 1. Redistributions of source code must retain the above copyright
     15   1.1     rmind  *    notice, this list of conditions and the following disclaimer.
     16   1.1     rmind  * 2. Redistributions in binary form must reproduce the above copyright
     17   1.1     rmind  *    notice, this list of conditions and the following disclaimer in the
     18   1.1     rmind  *    documentation and/or other materials provided with the distribution.
     19   1.1     rmind  *
     20   1.1     rmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     21   1.1     rmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22   1.1     rmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23   1.1     rmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     24   1.1     rmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     25   1.1     rmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     26   1.1     rmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     27   1.1     rmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     28   1.1     rmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29   1.1     rmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30   1.1     rmind  * POSSIBILITY OF SUCH DAMAGE.
     31   1.1     rmind  */
     32   1.1     rmind 
     33   1.1     rmind /*
     34   1.1     rmind  * Copyright (c) 1989, 1993
     35   1.1     rmind  *	The Regents of the University of California.  All rights reserved.
     36   1.1     rmind  * (c) UNIX System Laboratories, Inc.
     37   1.1     rmind  * All or some portions of this file are derived from material licensed
     38   1.1     rmind  * to the University of California by American Telephone and Telegraph
     39   1.1     rmind  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
     40   1.1     rmind  * the permission of UNIX System Laboratories, Inc.
     41   1.1     rmind  *
     42   1.1     rmind  * Redistribution and use in source and binary forms, with or without
     43   1.1     rmind  * modification, are permitted provided that the following conditions
     44   1.1     rmind  * are met:
     45   1.1     rmind  * 1. Redistributions of source code must retain the above copyright
     46   1.1     rmind  *    notice, this list of conditions and the following disclaimer.
     47   1.1     rmind  * 2. Redistributions in binary form must reproduce the above copyright
     48   1.1     rmind  *    notice, this list of conditions and the following disclaimer in the
     49   1.1     rmind  *    documentation and/or other materials provided with the distribution.
     50   1.1     rmind  * 3. Neither the name of the University nor the names of its contributors
     51   1.1     rmind  *    may be used to endorse or promote products derived from this software
     52   1.1     rmind  *    without specific prior written permission.
     53   1.1     rmind  *
     54   1.1     rmind  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     55   1.1     rmind  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     56   1.1     rmind  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     57   1.1     rmind  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     58   1.1     rmind  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     59   1.1     rmind  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     60   1.1     rmind  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     61   1.1     rmind  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     62   1.1     rmind  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     63   1.1     rmind  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     64   1.1     rmind  * SUCH DAMAGE.
     65   1.1     rmind  *
     66   1.1     rmind  *	@(#)vfs_subr.c	8.13 (Berkeley) 4/18/94
     67   1.1     rmind  */
     68   1.1     rmind 
     69   1.1     rmind /*
     70   1.8     rmind  * The vnode cache subsystem.
     71   1.1     rmind  *
     72   1.8     rmind  * Life-cycle
     73   1.1     rmind  *
     74   1.8     rmind  *	Normally, there are two points where new vnodes are created:
     75   1.8     rmind  *	VOP_CREATE(9) and VOP_LOOKUP(9).  The life-cycle of a vnode
     76   1.8     rmind  *	starts in one of the following ways:
     77   1.8     rmind  *
     78   1.8     rmind  *	- Allocation, via getnewvnode(9) and/or vnalloc(9).
     79   1.8     rmind  *	- Recycle from a free list, via getnewvnode(9) -> getcleanvnode(9).
     80   1.8     rmind  *	- Reclamation of inactive vnode, via vget(9).
     81   1.8     rmind  *
     82   1.8     rmind  *	The life-cycle ends when the last reference is dropped, usually
     83   1.8     rmind  *	in VOP_REMOVE(9).  In such case, VOP_INACTIVE(9) is called to inform
     84   1.8     rmind  *	the file system that vnode is inactive.  Via this call, file system
     85   1.8     rmind  *	indicates whether vnode should be recycled (usually, count of links
     86   1.8     rmind  *	is checked i.e. whether file was removed).
     87   1.8     rmind  *
     88   1.8     rmind  *	Depending on indication, vnode can be put into a free list (cache),
     89   1.8     rmind  *	or cleaned via vclean(9), which calls VOP_RECLAIM(9) to disassociate
     90   1.8     rmind  *	underlying file system from the vnode, and finally destroyed.
     91   1.8     rmind  *
     92   1.8     rmind  * Reference counting
     93   1.8     rmind  *
     94   1.8     rmind  *	Vnode is considered active, if reference count (vnode_t::v_usecount)
     95   1.8     rmind  *	is non-zero.  It is maintained using: vref(9) and vrele(9), as well
     96   1.8     rmind  *	as vput(9), routines.  Common points holding references are e.g.
     97   1.8     rmind  *	file openings, current working directory, mount points, etc.
     98   1.8     rmind  *
     99   1.8     rmind  * Note on v_usecount and its locking
    100   1.8     rmind  *
    101   1.8     rmind  *	At nearly all points it is known that v_usecount could be zero,
    102   1.8     rmind  *	the vnode_t::v_interlock will be held.  To change v_usecount away
    103   1.8     rmind  *	from zero, the interlock must be held.  To change from a non-zero
    104   1.8     rmind  *	value to zero, again the interlock must be held.
    105   1.8     rmind  *
    106   1.8     rmind  *	There is a flag bit, VC_XLOCK, embedded in v_usecount.  To raise
    107   1.8     rmind  *	v_usecount, if the VC_XLOCK bit is set in it, the interlock must
    108   1.8     rmind  *	be held.  To modify the VC_XLOCK bit, the interlock must be held.
    109   1.8     rmind  *	We always keep the usecount (v_usecount & VC_MASK) non-zero while
    110   1.8     rmind  *	the VC_XLOCK bit is set.
    111   1.8     rmind  *
    112   1.8     rmind  *	Unless the VC_XLOCK bit is set, changing the usecount from a non-zero
    113   1.8     rmind  *	value to a non-zero value can safely be done using atomic operations,
    114   1.8     rmind  *	without the interlock held.
    115   1.8     rmind  *
    116   1.8     rmind  *	Even if the VC_XLOCK bit is set, decreasing the usecount to a non-zero
    117   1.8     rmind  *	value can be done using atomic operations, without the interlock held.
    118   1.8     rmind  *
    119   1.8     rmind  *	Note: if VI_CLEAN is set, vnode_t::v_interlock will be released while
    120   1.8     rmind  *	mntvnode_lock is still held.
    121   1.1     rmind  */
    122   1.1     rmind 
    123   1.1     rmind #include <sys/cdefs.h>
    124  1.11  christos __KERNEL_RCSID(0, "$NetBSD: vfs_vnode.c,v 1.11 2011/09/29 20:51:38 christos Exp $");
    125   1.1     rmind 
    126   1.1     rmind #include <sys/param.h>
    127   1.1     rmind #include <sys/kernel.h>
    128   1.1     rmind 
    129   1.1     rmind #include <sys/atomic.h>
    130   1.1     rmind #include <sys/buf.h>
    131   1.1     rmind #include <sys/conf.h>
    132   1.1     rmind #include <sys/device.h>
    133   1.1     rmind #include <sys/kauth.h>
    134   1.1     rmind #include <sys/kmem.h>
    135   1.1     rmind #include <sys/kthread.h>
    136   1.1     rmind #include <sys/module.h>
    137   1.1     rmind #include <sys/mount.h>
    138   1.1     rmind #include <sys/namei.h>
    139   1.1     rmind #include <sys/syscallargs.h>
    140   1.1     rmind #include <sys/sysctl.h>
    141   1.1     rmind #include <sys/systm.h>
    142   1.1     rmind #include <sys/vnode.h>
    143   1.1     rmind #include <sys/wapbl.h>
    144   1.1     rmind 
    145   1.1     rmind #include <uvm/uvm.h>
    146   1.1     rmind #include <uvm/uvm_readahead.h>
    147   1.1     rmind 
    148   1.6     rmind u_int			numvnodes		__cacheline_aligned;
    149   1.1     rmind 
    150   1.6     rmind static pool_cache_t	vnode_cache		__read_mostly;
    151   1.6     rmind static kmutex_t		vnode_free_list_lock	__cacheline_aligned;
    152   1.1     rmind 
    153   1.6     rmind static vnodelst_t	vnode_free_list		__cacheline_aligned;
    154   1.6     rmind static vnodelst_t	vnode_hold_list		__cacheline_aligned;
    155   1.6     rmind static vnodelst_t	vrele_list		__cacheline_aligned;
    156   1.6     rmind 
    157   1.6     rmind static kmutex_t		vrele_lock		__cacheline_aligned;
    158   1.6     rmind static kcondvar_t	vrele_cv		__cacheline_aligned;
    159   1.6     rmind static lwp_t *		vrele_lwp		__cacheline_aligned;
    160   1.6     rmind static int		vrele_pending		__cacheline_aligned;
    161   1.6     rmind static int		vrele_gen		__cacheline_aligned;
    162   1.1     rmind 
    163   1.1     rmind static vnode_t *	getcleanvnode(void);
    164   1.1     rmind static void		vrele_thread(void *);
    165  1.11  christos static void		vnpanic(vnode_t *, const char *, ...)
    166  1.11  christos     __attribute__((__format__(__printf__, 2, 3)));
    167   1.1     rmind 
    168   1.1     rmind /* Routines having to do with the management of the vnode table. */
    169   1.1     rmind extern int		(**dead_vnodeop_p)(void *);
    170   1.1     rmind 
    171   1.1     rmind void
    172   1.1     rmind vfs_vnode_sysinit(void)
    173   1.1     rmind {
    174   1.1     rmind 	int error;
    175   1.1     rmind 
    176   1.1     rmind 	vnode_cache = pool_cache_init(sizeof(vnode_t), 0, 0, 0, "vnodepl",
    177   1.1     rmind 	    NULL, IPL_NONE, NULL, NULL, NULL);
    178   1.1     rmind 	KASSERT(vnode_cache != NULL);
    179   1.1     rmind 
    180   1.1     rmind 	mutex_init(&vnode_free_list_lock, MUTEX_DEFAULT, IPL_NONE);
    181   1.1     rmind 	TAILQ_INIT(&vnode_free_list);
    182   1.1     rmind 	TAILQ_INIT(&vnode_hold_list);
    183   1.1     rmind 	TAILQ_INIT(&vrele_list);
    184   1.1     rmind 
    185   1.1     rmind 	mutex_init(&vrele_lock, MUTEX_DEFAULT, IPL_NONE);
    186   1.1     rmind 	cv_init(&vrele_cv, "vrele");
    187   1.1     rmind 	error = kthread_create(PRI_VM, KTHREAD_MPSAFE, NULL, vrele_thread,
    188   1.1     rmind 	    NULL, &vrele_lwp, "vrele");
    189   1.1     rmind 	KASSERT(error == 0);
    190   1.1     rmind }
    191   1.1     rmind 
    192   1.1     rmind /*
    193   1.1     rmind  * Allocate a new, uninitialized vnode.  If 'mp' is non-NULL, this is a
    194   1.1     rmind  * marker vnode and we are prepared to wait for the allocation.
    195   1.1     rmind  */
    196   1.1     rmind vnode_t *
    197   1.1     rmind vnalloc(struct mount *mp)
    198   1.1     rmind {
    199   1.1     rmind 	vnode_t *vp;
    200   1.1     rmind 
    201   1.1     rmind 	vp = pool_cache_get(vnode_cache, (mp != NULL ? PR_WAITOK : PR_NOWAIT));
    202   1.1     rmind 	if (vp == NULL) {
    203   1.1     rmind 		return NULL;
    204   1.1     rmind 	}
    205   1.1     rmind 
    206   1.1     rmind 	memset(vp, 0, sizeof(*vp));
    207   1.9     rmind 	uvm_obj_init(&vp->v_uobj, &uvm_vnodeops, true, 0);
    208   1.1     rmind 	cv_init(&vp->v_cv, "vnode");
    209   1.1     rmind 	/*
    210   1.1     rmind 	 * Done by memset() above.
    211   1.1     rmind 	 *	LIST_INIT(&vp->v_nclist);
    212   1.1     rmind 	 *	LIST_INIT(&vp->v_dnclist);
    213   1.1     rmind 	 */
    214   1.1     rmind 
    215   1.1     rmind 	if (mp != NULL) {
    216   1.1     rmind 		vp->v_mount = mp;
    217   1.1     rmind 		vp->v_type = VBAD;
    218   1.1     rmind 		vp->v_iflag = VI_MARKER;
    219   1.1     rmind 	} else {
    220   1.1     rmind 		rw_init(&vp->v_lock);
    221   1.1     rmind 	}
    222   1.1     rmind 
    223   1.1     rmind 	return vp;
    224   1.1     rmind }
    225   1.1     rmind 
    226   1.1     rmind /*
    227   1.1     rmind  * Free an unused, unreferenced vnode.
    228   1.1     rmind  */
    229   1.1     rmind void
    230   1.1     rmind vnfree(vnode_t *vp)
    231   1.1     rmind {
    232   1.1     rmind 
    233   1.1     rmind 	KASSERT(vp->v_usecount == 0);
    234   1.1     rmind 
    235   1.1     rmind 	if ((vp->v_iflag & VI_MARKER) == 0) {
    236   1.1     rmind 		rw_destroy(&vp->v_lock);
    237   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
    238   1.1     rmind 		numvnodes--;
    239   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    240   1.1     rmind 	}
    241   1.1     rmind 
    242   1.9     rmind 	/*
    243   1.9     rmind 	 * Note: the vnode interlock will either be freed, of reference
    244   1.9     rmind 	 * dropped (if VI_LOCKSHARE was in use).
    245   1.9     rmind 	 */
    246   1.9     rmind 	uvm_obj_destroy(&vp->v_uobj, true);
    247   1.1     rmind 	cv_destroy(&vp->v_cv);
    248   1.1     rmind 	pool_cache_put(vnode_cache, vp);
    249   1.1     rmind }
    250   1.1     rmind 
    251   1.1     rmind /*
    252   1.1     rmind  * getcleanvnode: grab a vnode from freelist and clean it.
    253   1.5     rmind  *
    254   1.5     rmind  * => Releases vnode_free_list_lock.
    255   1.5     rmind  * => Returns referenced vnode on success.
    256   1.1     rmind  */
    257   1.5     rmind static vnode_t *
    258   1.1     rmind getcleanvnode(void)
    259   1.1     rmind {
    260   1.1     rmind 	vnode_t *vp;
    261   1.1     rmind 	vnodelst_t *listhd;
    262   1.1     rmind 
    263   1.1     rmind 	KASSERT(mutex_owned(&vnode_free_list_lock));
    264   1.1     rmind retry:
    265   1.1     rmind 	listhd = &vnode_free_list;
    266   1.1     rmind try_nextlist:
    267   1.1     rmind 	TAILQ_FOREACH(vp, listhd, v_freelist) {
    268   1.1     rmind 		/*
    269   1.1     rmind 		 * It's safe to test v_usecount and v_iflag
    270   1.1     rmind 		 * without holding the interlock here, since
    271   1.1     rmind 		 * these vnodes should never appear on the
    272   1.1     rmind 		 * lists.
    273   1.1     rmind 		 */
    274   1.5     rmind 		KASSERT(vp->v_usecount == 0);
    275   1.5     rmind 		KASSERT((vp->v_iflag & VI_CLEAN) == 0);
    276   1.5     rmind 		KASSERT(vp->v_freelisthd == listhd);
    277   1.5     rmind 
    278   1.9     rmind 		if (!mutex_tryenter(vp->v_interlock))
    279   1.1     rmind 			continue;
    280   1.1     rmind 		if ((vp->v_iflag & VI_XLOCK) == 0)
    281   1.1     rmind 			break;
    282   1.9     rmind 		mutex_exit(vp->v_interlock);
    283   1.1     rmind 	}
    284   1.1     rmind 
    285   1.1     rmind 	if (vp == NULL) {
    286   1.1     rmind 		if (listhd == &vnode_free_list) {
    287   1.1     rmind 			listhd = &vnode_hold_list;
    288   1.1     rmind 			goto try_nextlist;
    289   1.1     rmind 		}
    290   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    291   1.1     rmind 		return NULL;
    292   1.1     rmind 	}
    293   1.1     rmind 
    294   1.1     rmind 	/* Remove it from the freelist. */
    295   1.1     rmind 	TAILQ_REMOVE(listhd, vp, v_freelist);
    296   1.1     rmind 	vp->v_freelisthd = NULL;
    297   1.1     rmind 	mutex_exit(&vnode_free_list_lock);
    298   1.1     rmind 
    299   1.1     rmind 	KASSERT(vp->v_usecount == 0);
    300   1.1     rmind 
    301   1.1     rmind 	/*
    302   1.1     rmind 	 * The vnode is still associated with a file system, so we must
    303   1.1     rmind 	 * clean it out before reusing it.  We need to add a reference
    304   1.1     rmind 	 * before doing this.  If the vnode gains another reference while
    305   1.1     rmind 	 * being cleaned out then we lose - retry.
    306   1.1     rmind 	 */
    307   1.1     rmind 	atomic_add_int(&vp->v_usecount, 1 + VC_XLOCK);
    308   1.1     rmind 	vclean(vp, DOCLOSE);
    309   1.1     rmind 	KASSERT(vp->v_usecount >= 1 + VC_XLOCK);
    310   1.1     rmind 	atomic_add_int(&vp->v_usecount, -VC_XLOCK);
    311   1.1     rmind 	if (vp->v_usecount == 1) {
    312   1.1     rmind 		/* We're about to dirty it. */
    313   1.1     rmind 		vp->v_iflag &= ~VI_CLEAN;
    314   1.9     rmind 		mutex_exit(vp->v_interlock);
    315   1.1     rmind 		if (vp->v_type == VBLK || vp->v_type == VCHR) {
    316   1.1     rmind 			spec_node_destroy(vp);
    317   1.1     rmind 		}
    318   1.1     rmind 		vp->v_type = VNON;
    319   1.1     rmind 	} else {
    320   1.1     rmind 		/*
    321   1.1     rmind 		 * Don't return to freelist - the holder of the last
    322   1.1     rmind 		 * reference will destroy it.
    323   1.1     rmind 		 */
    324   1.1     rmind 		vrelel(vp, 0); /* releases vp->v_interlock */
    325   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
    326   1.1     rmind 		goto retry;
    327   1.1     rmind 	}
    328   1.1     rmind 
    329   1.5     rmind 	KASSERT(vp->v_data == NULL);
    330   1.5     rmind 	KASSERT(vp->v_uobj.uo_npages == 0);
    331   1.5     rmind 	KASSERT(TAILQ_EMPTY(&vp->v_uobj.memq));
    332   1.5     rmind 	KASSERT(vp->v_numoutput == 0);
    333   1.5     rmind 	KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
    334   1.1     rmind 
    335   1.1     rmind 	return vp;
    336   1.1     rmind }
    337   1.1     rmind 
    338   1.1     rmind /*
    339   1.4     rmind  * getnewvnode: return the next vnode from the free list.
    340   1.5     rmind  *
    341   1.5     rmind  * => Returns referenced vnode, moved into the mount queue.
    342   1.9     rmind  * => Shares the interlock specified by 'slock', if it is not NULL.
    343   1.1     rmind  */
    344   1.1     rmind int
    345   1.1     rmind getnewvnode(enum vtagtype tag, struct mount *mp, int (**vops)(void *),
    346   1.9     rmind     kmutex_t *slock, vnode_t **vpp)
    347   1.1     rmind {
    348   1.1     rmind 	struct uvm_object *uobj;
    349   1.1     rmind 	static int toggle;
    350   1.1     rmind 	vnode_t *vp;
    351   1.1     rmind 	int error = 0, tryalloc;
    352   1.1     rmind 
    353   1.1     rmind try_again:
    354   1.1     rmind 	if (mp != NULL) {
    355   1.1     rmind 		/*
    356   1.4     rmind 		 * Mark filesystem busy while we are creating a vnode.
    357   1.4     rmind 		 * If unmount is in progress, this will fail.
    358   1.1     rmind 		 */
    359   1.1     rmind 		error = vfs_busy(mp, NULL);
    360   1.1     rmind 		if (error)
    361   1.1     rmind 			return error;
    362   1.1     rmind 	}
    363   1.1     rmind 
    364   1.1     rmind 	/*
    365   1.1     rmind 	 * We must choose whether to allocate a new vnode or recycle an
    366   1.1     rmind 	 * existing one. The criterion for allocating a new one is that
    367   1.1     rmind 	 * the total number of vnodes is less than the number desired or
    368   1.1     rmind 	 * there are no vnodes on either free list. Generally we only
    369   1.1     rmind 	 * want to recycle vnodes that have no buffers associated with
    370   1.1     rmind 	 * them, so we look first on the vnode_free_list. If it is empty,
    371   1.1     rmind 	 * we next consider vnodes with referencing buffers on the
    372   1.1     rmind 	 * vnode_hold_list. The toggle ensures that half the time we
    373   1.1     rmind 	 * will use a buffer from the vnode_hold_list, and half the time
    374   1.1     rmind 	 * we will allocate a new one unless the list has grown to twice
    375   1.1     rmind 	 * the desired size. We are reticent to recycle vnodes from the
    376   1.1     rmind 	 * vnode_hold_list because we will lose the identity of all its
    377   1.1     rmind 	 * referencing buffers.
    378   1.1     rmind 	 */
    379   1.1     rmind 
    380   1.1     rmind 	vp = NULL;
    381   1.1     rmind 
    382   1.1     rmind 	mutex_enter(&vnode_free_list_lock);
    383   1.1     rmind 
    384   1.1     rmind 	toggle ^= 1;
    385   1.1     rmind 	if (numvnodes > 2 * desiredvnodes)
    386   1.1     rmind 		toggle = 0;
    387   1.1     rmind 
    388   1.1     rmind 	tryalloc = numvnodes < desiredvnodes ||
    389   1.1     rmind 	    (TAILQ_FIRST(&vnode_free_list) == NULL &&
    390   1.1     rmind 	    (TAILQ_FIRST(&vnode_hold_list) == NULL || toggle));
    391   1.1     rmind 
    392   1.1     rmind 	if (tryalloc) {
    393   1.5     rmind 		/* Allocate a new vnode. */
    394   1.1     rmind 		numvnodes++;
    395   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    396   1.1     rmind 		if ((vp = vnalloc(NULL)) == NULL) {
    397   1.1     rmind 			mutex_enter(&vnode_free_list_lock);
    398   1.1     rmind 			numvnodes--;
    399   1.1     rmind 		} else
    400   1.1     rmind 			vp->v_usecount = 1;
    401   1.1     rmind 	}
    402   1.1     rmind 
    403   1.1     rmind 	if (vp == NULL) {
    404   1.5     rmind 		/* Recycle and get vnode clean. */
    405   1.1     rmind 		vp = getcleanvnode();
    406   1.1     rmind 		if (vp == NULL) {
    407   1.1     rmind 			if (mp != NULL) {
    408   1.1     rmind 				vfs_unbusy(mp, false, NULL);
    409   1.1     rmind 			}
    410   1.1     rmind 			if (tryalloc) {
    411   1.1     rmind 				printf("WARNING: unable to allocate new "
    412   1.1     rmind 				    "vnode, retrying...\n");
    413   1.1     rmind 				kpause("newvn", false, hz, NULL);
    414   1.1     rmind 				goto try_again;
    415   1.1     rmind 			}
    416   1.1     rmind 			tablefull("vnode", "increase kern.maxvnodes or NVNODE");
    417   1.1     rmind 			*vpp = 0;
    418   1.4     rmind 			return ENFILE;
    419   1.1     rmind 		}
    420   1.9     rmind 		if ((vp->v_iflag & VI_LOCKSHARE) != 0 || slock) {
    421   1.9     rmind 			/* We must remove vnode from the old mount point. */
    422   1.9     rmind 			if (vp->v_mount) {
    423   1.9     rmind 				vfs_insmntque(vp, NULL);
    424   1.9     rmind 			}
    425   1.9     rmind 			/* Allocate a new interlock, if it was shared. */
    426   1.9     rmind 			if (vp->v_iflag & VI_LOCKSHARE) {
    427   1.9     rmind 				uvm_obj_setlock(&vp->v_uobj, NULL);
    428   1.9     rmind 				vp->v_iflag &= ~VI_LOCKSHARE;
    429   1.9     rmind 			}
    430   1.9     rmind 		}
    431   1.1     rmind 		vp->v_iflag = 0;
    432   1.1     rmind 		vp->v_vflag = 0;
    433   1.1     rmind 		vp->v_uflag = 0;
    434   1.1     rmind 		vp->v_socket = NULL;
    435   1.1     rmind 	}
    436   1.1     rmind 
    437   1.1     rmind 	KASSERT(vp->v_usecount == 1);
    438   1.1     rmind 	KASSERT(vp->v_freelisthd == NULL);
    439   1.1     rmind 	KASSERT(LIST_EMPTY(&vp->v_nclist));
    440   1.1     rmind 	KASSERT(LIST_EMPTY(&vp->v_dnclist));
    441   1.1     rmind 
    442   1.5     rmind 	/* Initialize vnode. */
    443   1.1     rmind 	vp->v_type = VNON;
    444   1.1     rmind 	vp->v_tag = tag;
    445   1.1     rmind 	vp->v_op = vops;
    446   1.1     rmind 	vp->v_data = NULL;
    447   1.1     rmind 
    448   1.1     rmind 	uobj = &vp->v_uobj;
    449   1.1     rmind 	KASSERT(uobj->pgops == &uvm_vnodeops);
    450   1.1     rmind 	KASSERT(uobj->uo_npages == 0);
    451   1.1     rmind 	KASSERT(TAILQ_FIRST(&uobj->memq) == NULL);
    452   1.1     rmind 	vp->v_size = vp->v_writesize = VSIZENOTSET;
    453   1.1     rmind 
    454   1.9     rmind 	/* Share the vnode_t::v_interlock, if requested. */
    455   1.9     rmind 	if (slock) {
    456   1.9     rmind 		/* Set the interlock and mark that it is shared. */
    457   1.9     rmind 		KASSERT(vp->v_mount == NULL);
    458   1.9     rmind 		mutex_obj_hold(slock);
    459   1.9     rmind 		uvm_obj_setlock(&vp->v_uobj, slock);
    460   1.9     rmind 		KASSERT(vp->v_interlock == slock);
    461   1.9     rmind 		vp->v_iflag |= VI_LOCKSHARE;
    462   1.9     rmind 	}
    463   1.9     rmind 
    464   1.5     rmind 	/* Finally, move vnode into the mount queue. */
    465   1.5     rmind 	vfs_insmntque(vp, mp);
    466   1.5     rmind 
    467   1.1     rmind 	if (mp != NULL) {
    468   1.1     rmind 		if ((mp->mnt_iflag & IMNT_MPSAFE) != 0)
    469   1.1     rmind 			vp->v_vflag |= VV_MPSAFE;
    470   1.1     rmind 		vfs_unbusy(mp, true, NULL);
    471   1.1     rmind 	}
    472   1.1     rmind 
    473   1.5     rmind 	*vpp = vp;
    474   1.4     rmind 	return 0;
    475   1.1     rmind }
    476   1.1     rmind 
    477   1.1     rmind /*
    478   1.1     rmind  * This is really just the reverse of getnewvnode(). Needed for
    479   1.1     rmind  * VFS_VGET functions who may need to push back a vnode in case
    480   1.1     rmind  * of a locking race.
    481   1.1     rmind  */
    482   1.1     rmind void
    483   1.1     rmind ungetnewvnode(vnode_t *vp)
    484   1.1     rmind {
    485   1.1     rmind 
    486   1.1     rmind 	KASSERT(vp->v_usecount == 1);
    487   1.1     rmind 	KASSERT(vp->v_data == NULL);
    488   1.1     rmind 	KASSERT(vp->v_freelisthd == NULL);
    489   1.1     rmind 
    490   1.9     rmind 	mutex_enter(vp->v_interlock);
    491   1.1     rmind 	vp->v_iflag |= VI_CLEAN;
    492   1.1     rmind 	vrelel(vp, 0);
    493   1.1     rmind }
    494   1.1     rmind 
    495   1.1     rmind /*
    496   1.1     rmind  * Remove a vnode from its freelist.
    497   1.1     rmind  */
    498   1.1     rmind void
    499   1.1     rmind vremfree(vnode_t *vp)
    500   1.1     rmind {
    501   1.1     rmind 
    502   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    503   1.1     rmind 	KASSERT(vp->v_usecount == 0);
    504   1.1     rmind 
    505   1.1     rmind 	/*
    506   1.1     rmind 	 * Note that the reference count must not change until
    507   1.1     rmind 	 * the vnode is removed.
    508   1.1     rmind 	 */
    509   1.1     rmind 	mutex_enter(&vnode_free_list_lock);
    510   1.1     rmind 	if (vp->v_holdcnt > 0) {
    511   1.1     rmind 		KASSERT(vp->v_freelisthd == &vnode_hold_list);
    512   1.1     rmind 	} else {
    513   1.1     rmind 		KASSERT(vp->v_freelisthd == &vnode_free_list);
    514   1.1     rmind 	}
    515   1.1     rmind 	TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    516   1.1     rmind 	vp->v_freelisthd = NULL;
    517   1.1     rmind 	mutex_exit(&vnode_free_list_lock);
    518   1.1     rmind }
    519   1.1     rmind 
    520   1.1     rmind /*
    521   1.1     rmind  * Try to gain a reference to a vnode, without acquiring its interlock.
    522   1.1     rmind  * The caller must hold a lock that will prevent the vnode from being
    523   1.1     rmind  * recycled or freed.
    524   1.1     rmind  */
    525   1.1     rmind bool
    526   1.1     rmind vtryget(vnode_t *vp)
    527   1.1     rmind {
    528   1.1     rmind 	u_int use, next;
    529   1.1     rmind 
    530   1.1     rmind 	/*
    531   1.1     rmind 	 * If the vnode is being freed, don't make life any harder
    532   1.1     rmind 	 * for vclean() by adding another reference without waiting.
    533   1.1     rmind 	 * This is not strictly necessary, but we'll do it anyway.
    534   1.1     rmind 	 */
    535   1.1     rmind 	if (__predict_false((vp->v_iflag & VI_XLOCK) != 0)) {
    536   1.1     rmind 		return false;
    537   1.1     rmind 	}
    538   1.1     rmind 	for (use = vp->v_usecount;; use = next) {
    539   1.1     rmind 		if (use == 0 || __predict_false((use & VC_XLOCK) != 0)) {
    540   1.1     rmind 			/* Need interlock held if first reference. */
    541   1.1     rmind 			return false;
    542   1.1     rmind 		}
    543   1.1     rmind 		next = atomic_cas_uint(&vp->v_usecount, use, use + 1);
    544   1.1     rmind 		if (__predict_true(next == use)) {
    545   1.1     rmind 			return true;
    546   1.1     rmind 		}
    547   1.1     rmind 	}
    548   1.1     rmind }
    549   1.1     rmind 
    550   1.1     rmind /*
    551   1.4     rmind  * vget: get a particular vnode from the free list, increment its reference
    552   1.4     rmind  * count and lock it.
    553   1.4     rmind  *
    554   1.4     rmind  * => Should be called with v_interlock held.
    555   1.4     rmind  *
    556   1.4     rmind  * If VI_XLOCK is set, the vnode is being eliminated in vgone()/vclean().
    557   1.4     rmind  * In that case, we cannot grab the vnode, so the process is awakened when
    558   1.4     rmind  * the transition is completed, and an error returned to indicate that the
    559   1.4     rmind  * vnode is no longer usable (e.g. changed to a new file system type).
    560   1.1     rmind  */
    561   1.1     rmind int
    562   1.1     rmind vget(vnode_t *vp, int flags)
    563   1.1     rmind {
    564   1.1     rmind 	int error = 0;
    565   1.1     rmind 
    566   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    567   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    568   1.1     rmind 	KASSERT((flags & ~(LK_SHARED|LK_EXCLUSIVE|LK_NOWAIT)) == 0);
    569   1.1     rmind 
    570   1.1     rmind 	/*
    571   1.1     rmind 	 * Before adding a reference, we must remove the vnode
    572   1.1     rmind 	 * from its freelist.
    573   1.1     rmind 	 */
    574   1.1     rmind 	if (vp->v_usecount == 0) {
    575   1.1     rmind 		vremfree(vp);
    576   1.1     rmind 		vp->v_usecount = 1;
    577   1.1     rmind 	} else {
    578   1.1     rmind 		atomic_inc_uint(&vp->v_usecount);
    579   1.1     rmind 	}
    580   1.1     rmind 
    581   1.1     rmind 	/*
    582   1.1     rmind 	 * If the vnode is in the process of being cleaned out for
    583   1.1     rmind 	 * another use, we wait for the cleaning to finish and then
    584   1.1     rmind 	 * return failure.  Cleaning is determined by checking if
    585   1.1     rmind 	 * the VI_XLOCK flag is set.
    586   1.1     rmind 	 */
    587   1.1     rmind 	if ((vp->v_iflag & VI_XLOCK) != 0) {
    588   1.1     rmind 		if ((flags & LK_NOWAIT) != 0) {
    589   1.1     rmind 			vrelel(vp, 0);
    590   1.1     rmind 			return EBUSY;
    591   1.1     rmind 		}
    592   1.1     rmind 		vwait(vp, VI_XLOCK);
    593   1.1     rmind 		vrelel(vp, 0);
    594   1.1     rmind 		return ENOENT;
    595   1.1     rmind 	}
    596   1.1     rmind 
    597   1.1     rmind 	/*
    598   1.1     rmind 	 * Ok, we got it in good shape.  Just locking left.
    599   1.1     rmind 	 */
    600   1.1     rmind 	KASSERT((vp->v_iflag & VI_CLEAN) == 0);
    601   1.9     rmind 	mutex_exit(vp->v_interlock);
    602   1.1     rmind 	if (flags & (LK_EXCLUSIVE | LK_SHARED)) {
    603   1.1     rmind 		error = vn_lock(vp, flags);
    604   1.1     rmind 		if (error != 0) {
    605   1.1     rmind 			vrele(vp);
    606   1.1     rmind 		}
    607   1.1     rmind 	}
    608   1.1     rmind 	return error;
    609   1.1     rmind }
    610   1.1     rmind 
    611   1.1     rmind /*
    612   1.4     rmind  * vput: unlock and release the reference.
    613   1.1     rmind  */
    614   1.1     rmind void
    615   1.1     rmind vput(vnode_t *vp)
    616   1.1     rmind {
    617   1.1     rmind 
    618   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    619   1.1     rmind 
    620   1.1     rmind 	VOP_UNLOCK(vp);
    621   1.1     rmind 	vrele(vp);
    622   1.1     rmind }
    623   1.1     rmind 
    624   1.1     rmind /*
    625   1.1     rmind  * Try to drop reference on a vnode.  Abort if we are releasing the
    626   1.1     rmind  * last reference.  Note: this _must_ succeed if not the last reference.
    627   1.1     rmind  */
    628   1.1     rmind static inline bool
    629   1.1     rmind vtryrele(vnode_t *vp)
    630   1.1     rmind {
    631   1.1     rmind 	u_int use, next;
    632   1.1     rmind 
    633   1.1     rmind 	for (use = vp->v_usecount;; use = next) {
    634   1.1     rmind 		if (use == 1) {
    635   1.1     rmind 			return false;
    636   1.1     rmind 		}
    637   1.1     rmind 		KASSERT((use & VC_MASK) > 1);
    638   1.1     rmind 		next = atomic_cas_uint(&vp->v_usecount, use, use - 1);
    639   1.1     rmind 		if (__predict_true(next == use)) {
    640   1.1     rmind 			return true;
    641   1.1     rmind 		}
    642   1.1     rmind 	}
    643   1.1     rmind }
    644   1.1     rmind 
    645   1.1     rmind /*
    646   1.1     rmind  * Vnode release.  If reference count drops to zero, call inactive
    647   1.1     rmind  * routine and either return to freelist or free to the pool.
    648   1.1     rmind  */
    649   1.1     rmind void
    650   1.1     rmind vrelel(vnode_t *vp, int flags)
    651   1.1     rmind {
    652   1.1     rmind 	bool recycle, defer;
    653   1.1     rmind 	int error;
    654   1.1     rmind 
    655   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    656   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    657   1.1     rmind 	KASSERT(vp->v_freelisthd == NULL);
    658   1.1     rmind 
    659   1.1     rmind 	if (__predict_false(vp->v_op == dead_vnodeop_p &&
    660   1.1     rmind 	    (vp->v_iflag & (VI_CLEAN|VI_XLOCK)) == 0)) {
    661  1.11  christos 		vnpanic(vp, "dead but not clean");
    662   1.1     rmind 	}
    663   1.1     rmind 
    664   1.1     rmind 	/*
    665   1.1     rmind 	 * If not the last reference, just drop the reference count
    666   1.1     rmind 	 * and unlock.
    667   1.1     rmind 	 */
    668   1.1     rmind 	if (vtryrele(vp)) {
    669   1.1     rmind 		vp->v_iflag |= VI_INACTREDO;
    670   1.9     rmind 		mutex_exit(vp->v_interlock);
    671   1.1     rmind 		return;
    672   1.1     rmind 	}
    673   1.1     rmind 	if (vp->v_usecount <= 0 || vp->v_writecount != 0) {
    674  1.11  christos 		vnpanic(vp, "%s: bad ref count", __func__);
    675   1.1     rmind 	}
    676   1.1     rmind 
    677   1.1     rmind 	KASSERT((vp->v_iflag & VI_XLOCK) == 0);
    678   1.1     rmind 
    679   1.1     rmind 	/*
    680   1.1     rmind 	 * If not clean, deactivate the vnode, but preserve
    681   1.1     rmind 	 * our reference across the call to VOP_INACTIVE().
    682   1.1     rmind 	 */
    683   1.1     rmind retry:
    684   1.1     rmind 	if ((vp->v_iflag & VI_CLEAN) == 0) {
    685   1.1     rmind 		recycle = false;
    686   1.1     rmind 		vp->v_iflag |= VI_INACTNOW;
    687   1.1     rmind 
    688   1.1     rmind 		/*
    689   1.1     rmind 		 * XXX This ugly block can be largely eliminated if
    690   1.1     rmind 		 * locking is pushed down into the file systems.
    691   1.1     rmind 		 *
    692   1.1     rmind 		 * Defer vnode release to vrele_thread if caller
    693   1.1     rmind 		 * requests it explicitly.
    694   1.1     rmind 		 */
    695   1.1     rmind 		if ((curlwp == uvm.pagedaemon_lwp) ||
    696   1.1     rmind 		    (flags & VRELEL_ASYNC_RELE) != 0) {
    697   1.1     rmind 			/* The pagedaemon can't wait around; defer. */
    698   1.1     rmind 			defer = true;
    699   1.1     rmind 		} else if (curlwp == vrele_lwp) {
    700   1.1     rmind 			/* We have to try harder. */
    701   1.1     rmind 			vp->v_iflag &= ~VI_INACTREDO;
    702   1.9     rmind 			mutex_exit(vp->v_interlock);
    703   1.1     rmind 			error = vn_lock(vp, LK_EXCLUSIVE);
    704   1.1     rmind 			if (error != 0) {
    705   1.1     rmind 				/* XXX */
    706  1.11  christos 				vnpanic(vp, "%s: unable to lock %p",
    707  1.11  christos 				    __func__, vp);
    708   1.1     rmind 			}
    709   1.1     rmind 			defer = false;
    710   1.1     rmind 		} else if ((vp->v_iflag & VI_LAYER) != 0) {
    711   1.1     rmind 			/*
    712   1.1     rmind 			 * Acquiring the stack's lock in vclean() even
    713   1.1     rmind 			 * for an honest vput/vrele is dangerous because
    714   1.1     rmind 			 * our caller may hold other vnode locks; defer.
    715   1.1     rmind 			 */
    716   1.1     rmind 			defer = true;
    717   1.4     rmind 		} else {
    718   1.1     rmind 			/* If we can't acquire the lock, then defer. */
    719   1.1     rmind 			vp->v_iflag &= ~VI_INACTREDO;
    720   1.9     rmind 			mutex_exit(vp->v_interlock);
    721   1.1     rmind 			error = vn_lock(vp, LK_EXCLUSIVE | LK_NOWAIT);
    722   1.1     rmind 			if (error != 0) {
    723   1.1     rmind 				defer = true;
    724   1.9     rmind 				mutex_enter(vp->v_interlock);
    725   1.1     rmind 			} else {
    726   1.1     rmind 				defer = false;
    727   1.1     rmind 			}
    728   1.1     rmind 		}
    729   1.1     rmind 
    730   1.1     rmind 		if (defer) {
    731   1.1     rmind 			/*
    732   1.1     rmind 			 * Defer reclaim to the kthread; it's not safe to
    733   1.1     rmind 			 * clean it here.  We donate it our last reference.
    734   1.1     rmind 			 */
    735   1.9     rmind 			KASSERT(mutex_owned(vp->v_interlock));
    736   1.1     rmind 			KASSERT((vp->v_iflag & VI_INACTPEND) == 0);
    737   1.1     rmind 			vp->v_iflag &= ~VI_INACTNOW;
    738   1.1     rmind 			vp->v_iflag |= VI_INACTPEND;
    739   1.1     rmind 			mutex_enter(&vrele_lock);
    740   1.1     rmind 			TAILQ_INSERT_TAIL(&vrele_list, vp, v_freelist);
    741   1.1     rmind 			if (++vrele_pending > (desiredvnodes >> 8))
    742   1.1     rmind 				cv_signal(&vrele_cv);
    743   1.1     rmind 			mutex_exit(&vrele_lock);
    744   1.9     rmind 			mutex_exit(vp->v_interlock);
    745   1.1     rmind 			return;
    746   1.1     rmind 		}
    747   1.1     rmind 
    748   1.1     rmind #ifdef DIAGNOSTIC
    749   1.1     rmind 		if ((vp->v_type == VBLK || vp->v_type == VCHR) &&
    750   1.1     rmind 		    vp->v_specnode != NULL && vp->v_specnode->sn_opencnt != 0) {
    751   1.1     rmind 			vprint("vrelel: missing VOP_CLOSE()", vp);
    752   1.1     rmind 		}
    753   1.1     rmind #endif
    754   1.1     rmind 
    755   1.1     rmind 		/*
    756   1.1     rmind 		 * The vnode can gain another reference while being
    757   1.1     rmind 		 * deactivated.  If VOP_INACTIVE() indicates that
    758   1.1     rmind 		 * the described file has been deleted, then recycle
    759   1.1     rmind 		 * the vnode irrespective of additional references.
    760   1.1     rmind 		 * Another thread may be waiting to re-use the on-disk
    761   1.1     rmind 		 * inode.
    762   1.1     rmind 		 *
    763   1.1     rmind 		 * Note that VOP_INACTIVE() will drop the vnode lock.
    764   1.1     rmind 		 */
    765   1.1     rmind 		VOP_INACTIVE(vp, &recycle);
    766   1.9     rmind 		mutex_enter(vp->v_interlock);
    767   1.1     rmind 		vp->v_iflag &= ~VI_INACTNOW;
    768   1.1     rmind 		if (!recycle) {
    769   1.1     rmind 			if (vtryrele(vp)) {
    770   1.9     rmind 				mutex_exit(vp->v_interlock);
    771   1.1     rmind 				return;
    772   1.1     rmind 			}
    773   1.1     rmind 
    774   1.1     rmind 			/*
    775   1.1     rmind 			 * If we grew another reference while
    776   1.1     rmind 			 * VOP_INACTIVE() was underway, retry.
    777   1.1     rmind 			 */
    778   1.1     rmind 			if ((vp->v_iflag & VI_INACTREDO) != 0) {
    779   1.1     rmind 				goto retry;
    780   1.1     rmind 			}
    781   1.1     rmind 		}
    782   1.1     rmind 
    783   1.1     rmind 		/* Take care of space accounting. */
    784   1.1     rmind 		if (vp->v_iflag & VI_EXECMAP) {
    785   1.1     rmind 			atomic_add_int(&uvmexp.execpages,
    786   1.1     rmind 			    -vp->v_uobj.uo_npages);
    787   1.1     rmind 			atomic_add_int(&uvmexp.filepages,
    788   1.1     rmind 			    vp->v_uobj.uo_npages);
    789   1.1     rmind 		}
    790   1.1     rmind 		vp->v_iflag &= ~(VI_TEXT|VI_EXECMAP|VI_WRMAP);
    791   1.1     rmind 		vp->v_vflag &= ~VV_MAPPED;
    792   1.1     rmind 
    793   1.1     rmind 		/*
    794   1.1     rmind 		 * Recycle the vnode if the file is now unused (unlinked),
    795   1.1     rmind 		 * otherwise just free it.
    796   1.1     rmind 		 */
    797   1.1     rmind 		if (recycle) {
    798   1.1     rmind 			vclean(vp, DOCLOSE);
    799   1.1     rmind 		}
    800   1.1     rmind 		KASSERT(vp->v_usecount > 0);
    801   1.1     rmind 	}
    802   1.1     rmind 
    803   1.1     rmind 	if (atomic_dec_uint_nv(&vp->v_usecount) != 0) {
    804   1.1     rmind 		/* Gained another reference while being reclaimed. */
    805   1.9     rmind 		mutex_exit(vp->v_interlock);
    806   1.1     rmind 		return;
    807   1.1     rmind 	}
    808   1.1     rmind 
    809   1.1     rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
    810   1.1     rmind 		/*
    811   1.1     rmind 		 * It's clean so destroy it.  It isn't referenced
    812   1.1     rmind 		 * anywhere since it has been reclaimed.
    813   1.1     rmind 		 */
    814   1.1     rmind 		KASSERT(vp->v_holdcnt == 0);
    815   1.1     rmind 		KASSERT(vp->v_writecount == 0);
    816   1.9     rmind 		mutex_exit(vp->v_interlock);
    817   1.1     rmind 		vfs_insmntque(vp, NULL);
    818   1.1     rmind 		if (vp->v_type == VBLK || vp->v_type == VCHR) {
    819   1.1     rmind 			spec_node_destroy(vp);
    820   1.1     rmind 		}
    821   1.1     rmind 		vnfree(vp);
    822   1.1     rmind 	} else {
    823   1.1     rmind 		/*
    824   1.1     rmind 		 * Otherwise, put it back onto the freelist.  It
    825   1.1     rmind 		 * can't be destroyed while still associated with
    826   1.1     rmind 		 * a file system.
    827   1.1     rmind 		 */
    828   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
    829   1.1     rmind 		if (vp->v_holdcnt > 0) {
    830   1.1     rmind 			vp->v_freelisthd = &vnode_hold_list;
    831   1.1     rmind 		} else {
    832   1.1     rmind 			vp->v_freelisthd = &vnode_free_list;
    833   1.1     rmind 		}
    834   1.1     rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    835   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    836   1.9     rmind 		mutex_exit(vp->v_interlock);
    837   1.1     rmind 	}
    838   1.1     rmind }
    839   1.1     rmind 
    840   1.1     rmind void
    841   1.1     rmind vrele(vnode_t *vp)
    842   1.1     rmind {
    843   1.1     rmind 
    844   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    845   1.1     rmind 
    846   1.1     rmind 	if ((vp->v_iflag & VI_INACTNOW) == 0 && vtryrele(vp)) {
    847   1.1     rmind 		return;
    848   1.1     rmind 	}
    849   1.9     rmind 	mutex_enter(vp->v_interlock);
    850   1.1     rmind 	vrelel(vp, 0);
    851   1.1     rmind }
    852   1.1     rmind 
    853   1.1     rmind /*
    854   1.1     rmind  * Asynchronous vnode release, vnode is released in different context.
    855   1.1     rmind  */
    856   1.1     rmind void
    857   1.1     rmind vrele_async(vnode_t *vp)
    858   1.1     rmind {
    859   1.1     rmind 
    860   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    861   1.1     rmind 
    862   1.1     rmind 	if ((vp->v_iflag & VI_INACTNOW) == 0 && vtryrele(vp)) {
    863   1.1     rmind 		return;
    864   1.1     rmind 	}
    865   1.9     rmind 	mutex_enter(vp->v_interlock);
    866   1.1     rmind 	vrelel(vp, VRELEL_ASYNC_RELE);
    867   1.1     rmind }
    868   1.1     rmind 
    869   1.1     rmind static void
    870   1.1     rmind vrele_thread(void *cookie)
    871   1.1     rmind {
    872   1.1     rmind 	vnode_t *vp;
    873   1.1     rmind 
    874   1.1     rmind 	for (;;) {
    875   1.1     rmind 		mutex_enter(&vrele_lock);
    876   1.1     rmind 		while (TAILQ_EMPTY(&vrele_list)) {
    877   1.1     rmind 			vrele_gen++;
    878   1.1     rmind 			cv_broadcast(&vrele_cv);
    879   1.1     rmind 			cv_timedwait(&vrele_cv, &vrele_lock, hz);
    880   1.1     rmind 		}
    881   1.1     rmind 		vp = TAILQ_FIRST(&vrele_list);
    882   1.1     rmind 		TAILQ_REMOVE(&vrele_list, vp, v_freelist);
    883   1.1     rmind 		vrele_pending--;
    884   1.1     rmind 		mutex_exit(&vrele_lock);
    885   1.1     rmind 
    886   1.1     rmind 		/*
    887   1.1     rmind 		 * If not the last reference, then ignore the vnode
    888   1.1     rmind 		 * and look for more work.
    889   1.1     rmind 		 */
    890   1.9     rmind 		mutex_enter(vp->v_interlock);
    891   1.1     rmind 		KASSERT((vp->v_iflag & VI_INACTPEND) != 0);
    892   1.1     rmind 		vp->v_iflag &= ~VI_INACTPEND;
    893   1.1     rmind 		vrelel(vp, 0);
    894   1.1     rmind 	}
    895   1.1     rmind }
    896   1.1     rmind 
    897   1.2     rmind void
    898   1.2     rmind vrele_flush(void)
    899   1.2     rmind {
    900   1.2     rmind 	int gen;
    901   1.2     rmind 
    902   1.2     rmind 	mutex_enter(&vrele_lock);
    903   1.2     rmind 	gen = vrele_gen;
    904   1.2     rmind 	while (vrele_pending && gen == vrele_gen) {
    905   1.2     rmind 		cv_broadcast(&vrele_cv);
    906   1.2     rmind 		cv_wait(&vrele_cv, &vrele_lock);
    907   1.2     rmind 	}
    908   1.2     rmind 	mutex_exit(&vrele_lock);
    909   1.2     rmind }
    910   1.2     rmind 
    911   1.1     rmind /*
    912   1.1     rmind  * Vnode reference, where a reference is already held by some other
    913   1.1     rmind  * object (for example, a file structure).
    914   1.1     rmind  */
    915   1.1     rmind void
    916   1.1     rmind vref(vnode_t *vp)
    917   1.1     rmind {
    918   1.1     rmind 
    919   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    920   1.1     rmind 	KASSERT(vp->v_usecount != 0);
    921   1.1     rmind 
    922   1.1     rmind 	atomic_inc_uint(&vp->v_usecount);
    923   1.1     rmind }
    924   1.1     rmind 
    925   1.1     rmind /*
    926   1.1     rmind  * Page or buffer structure gets a reference.
    927   1.1     rmind  * Called with v_interlock held.
    928   1.1     rmind  */
    929   1.1     rmind void
    930   1.1     rmind vholdl(vnode_t *vp)
    931   1.1     rmind {
    932   1.1     rmind 
    933   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    934   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    935   1.1     rmind 
    936   1.1     rmind 	if (vp->v_holdcnt++ == 0 && vp->v_usecount == 0) {
    937   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
    938   1.1     rmind 		KASSERT(vp->v_freelisthd == &vnode_free_list);
    939   1.1     rmind 		TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    940   1.1     rmind 		vp->v_freelisthd = &vnode_hold_list;
    941   1.1     rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    942   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    943   1.1     rmind 	}
    944   1.1     rmind }
    945   1.1     rmind 
    946   1.1     rmind /*
    947   1.1     rmind  * Page or buffer structure frees a reference.
    948   1.1     rmind  * Called with v_interlock held.
    949   1.1     rmind  */
    950   1.1     rmind void
    951   1.1     rmind holdrelel(vnode_t *vp)
    952   1.1     rmind {
    953   1.1     rmind 
    954   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    955   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    956   1.1     rmind 
    957   1.1     rmind 	if (vp->v_holdcnt <= 0) {
    958  1.11  christos 		vnpanic(vp, "%s: holdcnt vp %p", __func__, vp);
    959   1.1     rmind 	}
    960   1.1     rmind 
    961   1.1     rmind 	vp->v_holdcnt--;
    962   1.1     rmind 	if (vp->v_holdcnt == 0 && vp->v_usecount == 0) {
    963   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
    964   1.1     rmind 		KASSERT(vp->v_freelisthd == &vnode_hold_list);
    965   1.1     rmind 		TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    966   1.1     rmind 		vp->v_freelisthd = &vnode_free_list;
    967   1.1     rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    968   1.1     rmind 		mutex_exit(&vnode_free_list_lock);
    969   1.1     rmind 	}
    970   1.1     rmind }
    971   1.1     rmind 
    972   1.1     rmind /*
    973   1.1     rmind  * Disassociate the underlying file system from a vnode.
    974   1.1     rmind  *
    975   1.1     rmind  * Must be called with the interlock held, and will return with it held.
    976   1.1     rmind  */
    977   1.1     rmind void
    978   1.1     rmind vclean(vnode_t *vp, int flags)
    979   1.1     rmind {
    980   1.1     rmind 	lwp_t *l = curlwp;
    981   1.1     rmind 	bool recycle, active;
    982   1.1     rmind 	int error;
    983   1.1     rmind 
    984   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
    985   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    986   1.1     rmind 	KASSERT(vp->v_usecount != 0);
    987   1.1     rmind 
    988   1.1     rmind 	/* If cleaning is already in progress wait until done and return. */
    989   1.1     rmind 	if (vp->v_iflag & VI_XLOCK) {
    990   1.1     rmind 		vwait(vp, VI_XLOCK);
    991   1.1     rmind 		return;
    992   1.1     rmind 	}
    993   1.1     rmind 
    994   1.1     rmind 	/* If already clean, nothing to do. */
    995   1.1     rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
    996   1.1     rmind 		return;
    997   1.1     rmind 	}
    998   1.1     rmind 
    999   1.1     rmind 	/*
   1000   1.1     rmind 	 * Prevent the vnode from being recycled or brought into use
   1001   1.1     rmind 	 * while we clean it out.
   1002   1.1     rmind 	 */
   1003   1.1     rmind 	vp->v_iflag |= VI_XLOCK;
   1004   1.1     rmind 	if (vp->v_iflag & VI_EXECMAP) {
   1005   1.1     rmind 		atomic_add_int(&uvmexp.execpages, -vp->v_uobj.uo_npages);
   1006   1.1     rmind 		atomic_add_int(&uvmexp.filepages, vp->v_uobj.uo_npages);
   1007   1.1     rmind 	}
   1008   1.1     rmind 	vp->v_iflag &= ~(VI_TEXT|VI_EXECMAP);
   1009   1.1     rmind 	active = (vp->v_usecount & VC_MASK) > 1;
   1010   1.1     rmind 
   1011   1.1     rmind 	/* XXXAD should not lock vnode under layer */
   1012   1.9     rmind 	mutex_exit(vp->v_interlock);
   1013   1.1     rmind 	VOP_LOCK(vp, LK_EXCLUSIVE);
   1014   1.1     rmind 
   1015   1.1     rmind 	/*
   1016   1.1     rmind 	 * Clean out any cached data associated with the vnode.
   1017   1.1     rmind 	 * If purging an active vnode, it must be closed and
   1018   1.1     rmind 	 * deactivated before being reclaimed. Note that the
   1019   1.1     rmind 	 * VOP_INACTIVE will unlock the vnode.
   1020   1.1     rmind 	 */
   1021   1.1     rmind 	if (flags & DOCLOSE) {
   1022   1.1     rmind 		error = vinvalbuf(vp, V_SAVE, NOCRED, l, 0, 0);
   1023   1.1     rmind 		if (error != 0) {
   1024   1.1     rmind 			/* XXX, fix vn_start_write's grab of mp and use that. */
   1025   1.1     rmind 
   1026   1.1     rmind 			if (wapbl_vphaswapbl(vp))
   1027   1.1     rmind 				WAPBL_DISCARD(wapbl_vptomp(vp));
   1028   1.1     rmind 			error = vinvalbuf(vp, 0, NOCRED, l, 0, 0);
   1029   1.1     rmind 		}
   1030   1.1     rmind 		KASSERT(error == 0);
   1031   1.1     rmind 		KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
   1032   1.1     rmind 		if (active && (vp->v_type == VBLK || vp->v_type == VCHR)) {
   1033   1.1     rmind 			 spec_node_revoke(vp);
   1034   1.1     rmind 		}
   1035   1.1     rmind 	}
   1036   1.1     rmind 	if (active) {
   1037   1.1     rmind 		VOP_INACTIVE(vp, &recycle);
   1038   1.1     rmind 	} else {
   1039   1.1     rmind 		/*
   1040   1.1     rmind 		 * Any other processes trying to obtain this lock must first
   1041   1.1     rmind 		 * wait for VI_XLOCK to clear, then call the new lock operation.
   1042   1.1     rmind 		 */
   1043   1.1     rmind 		VOP_UNLOCK(vp);
   1044   1.1     rmind 	}
   1045   1.1     rmind 
   1046   1.1     rmind 	/* Disassociate the underlying file system from the vnode. */
   1047   1.1     rmind 	if (VOP_RECLAIM(vp)) {
   1048  1.11  christos 		vnpanic(vp, "%s: cannot reclaim", __func__);
   1049   1.1     rmind 	}
   1050   1.1     rmind 
   1051   1.7     rmind 	KASSERT(vp->v_data == NULL);
   1052   1.1     rmind 	KASSERT(vp->v_uobj.uo_npages == 0);
   1053   1.7     rmind 
   1054   1.1     rmind 	if (vp->v_type == VREG && vp->v_ractx != NULL) {
   1055   1.1     rmind 		uvm_ra_freectx(vp->v_ractx);
   1056   1.1     rmind 		vp->v_ractx = NULL;
   1057   1.1     rmind 	}
   1058   1.7     rmind 
   1059   1.7     rmind 	/* Purge name cache. */
   1060   1.1     rmind 	cache_purge(vp);
   1061   1.1     rmind 
   1062   1.1     rmind 	/* Done with purge, notify sleepers of the grim news. */
   1063   1.9     rmind 	mutex_enter(vp->v_interlock);
   1064   1.1     rmind 	vp->v_op = dead_vnodeop_p;
   1065   1.1     rmind 	vp->v_tag = VT_NON;
   1066   1.1     rmind 	KNOTE(&vp->v_klist, NOTE_REVOKE);
   1067   1.1     rmind 	vp->v_iflag &= ~VI_XLOCK;
   1068   1.1     rmind 	vp->v_vflag &= ~VV_LOCKSWORK;
   1069   1.1     rmind 	if ((flags & DOCLOSE) != 0) {
   1070   1.1     rmind 		vp->v_iflag |= VI_CLEAN;
   1071   1.1     rmind 	}
   1072   1.1     rmind 	cv_broadcast(&vp->v_cv);
   1073   1.1     rmind 
   1074   1.1     rmind 	KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
   1075   1.1     rmind }
   1076   1.1     rmind 
   1077   1.1     rmind /*
   1078   1.1     rmind  * Recycle an unused vnode to the front of the free list.
   1079   1.1     rmind  * Release the passed interlock if the vnode will be recycled.
   1080   1.1     rmind  */
   1081   1.1     rmind int
   1082   1.1     rmind vrecycle(vnode_t *vp, kmutex_t *inter_lkp, struct lwp *l)
   1083   1.1     rmind {
   1084   1.1     rmind 
   1085   1.1     rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
   1086   1.1     rmind 
   1087   1.9     rmind 	mutex_enter(vp->v_interlock);
   1088   1.1     rmind 	if (vp->v_usecount != 0) {
   1089   1.9     rmind 		mutex_exit(vp->v_interlock);
   1090   1.4     rmind 		return 0;
   1091   1.1     rmind 	}
   1092   1.1     rmind 	if (inter_lkp) {
   1093   1.1     rmind 		mutex_exit(inter_lkp);
   1094   1.1     rmind 	}
   1095   1.1     rmind 	vremfree(vp);
   1096   1.1     rmind 	vp->v_usecount = 1;
   1097   1.1     rmind 	vclean(vp, DOCLOSE);
   1098   1.1     rmind 	vrelel(vp, 0);
   1099   1.4     rmind 	return 1;
   1100   1.1     rmind }
   1101   1.1     rmind 
   1102   1.1     rmind /*
   1103   1.1     rmind  * Eliminate all activity associated with the requested vnode
   1104   1.1     rmind  * and with all vnodes aliased to the requested vnode.
   1105   1.1     rmind  */
   1106   1.1     rmind void
   1107   1.1     rmind vrevoke(vnode_t *vp)
   1108   1.1     rmind {
   1109   1.1     rmind 	vnode_t *vq, **vpp;
   1110   1.1     rmind 	enum vtype type;
   1111   1.1     rmind 	dev_t dev;
   1112   1.1     rmind 
   1113   1.1     rmind 	KASSERT(vp->v_usecount > 0);
   1114   1.1     rmind 
   1115   1.9     rmind 	mutex_enter(vp->v_interlock);
   1116   1.1     rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
   1117   1.9     rmind 		mutex_exit(vp->v_interlock);
   1118   1.1     rmind 		return;
   1119   1.1     rmind 	} else if (vp->v_type != VBLK && vp->v_type != VCHR) {
   1120   1.1     rmind 		atomic_inc_uint(&vp->v_usecount);
   1121   1.1     rmind 		vclean(vp, DOCLOSE);
   1122   1.1     rmind 		vrelel(vp, 0);
   1123   1.1     rmind 		return;
   1124   1.1     rmind 	} else {
   1125   1.1     rmind 		dev = vp->v_rdev;
   1126   1.1     rmind 		type = vp->v_type;
   1127   1.9     rmind 		mutex_exit(vp->v_interlock);
   1128   1.1     rmind 	}
   1129   1.1     rmind 
   1130   1.1     rmind 	vpp = &specfs_hash[SPECHASH(dev)];
   1131   1.1     rmind 	mutex_enter(&device_lock);
   1132   1.1     rmind 	for (vq = *vpp; vq != NULL;) {
   1133   1.1     rmind 		/* If clean or being cleaned, then ignore it. */
   1134   1.9     rmind 		mutex_enter(vq->v_interlock);
   1135   1.1     rmind 		if ((vq->v_iflag & (VI_CLEAN | VI_XLOCK)) != 0 ||
   1136  1.10  christos 		    vq->v_type != type || vq->v_rdev != dev) {
   1137   1.9     rmind 			mutex_exit(vq->v_interlock);
   1138   1.1     rmind 			vq = vq->v_specnext;
   1139   1.1     rmind 			continue;
   1140   1.1     rmind 		}
   1141   1.1     rmind 		mutex_exit(&device_lock);
   1142   1.1     rmind 		if (vq->v_usecount == 0) {
   1143   1.1     rmind 			vremfree(vq);
   1144   1.1     rmind 			vq->v_usecount = 1;
   1145   1.1     rmind 		} else {
   1146   1.1     rmind 			atomic_inc_uint(&vq->v_usecount);
   1147   1.1     rmind 		}
   1148   1.1     rmind 		vclean(vq, DOCLOSE);
   1149   1.1     rmind 		vrelel(vq, 0);
   1150   1.1     rmind 		mutex_enter(&device_lock);
   1151   1.1     rmind 		vq = *vpp;
   1152   1.1     rmind 	}
   1153   1.1     rmind 	mutex_exit(&device_lock);
   1154   1.1     rmind }
   1155   1.1     rmind 
   1156   1.1     rmind /*
   1157   1.1     rmind  * Eliminate all activity associated with a vnode in preparation for
   1158   1.1     rmind  * reuse.  Drops a reference from the vnode.
   1159   1.1     rmind  */
   1160   1.1     rmind void
   1161   1.1     rmind vgone(vnode_t *vp)
   1162   1.1     rmind {
   1163   1.1     rmind 
   1164   1.9     rmind 	mutex_enter(vp->v_interlock);
   1165   1.1     rmind 	vclean(vp, DOCLOSE);
   1166   1.1     rmind 	vrelel(vp, 0);
   1167   1.1     rmind }
   1168   1.1     rmind 
   1169   1.1     rmind /*
   1170   1.1     rmind  * Update outstanding I/O count and do wakeup if requested.
   1171   1.1     rmind  */
   1172   1.1     rmind void
   1173   1.1     rmind vwakeup(struct buf *bp)
   1174   1.1     rmind {
   1175   1.1     rmind 	vnode_t *vp;
   1176   1.1     rmind 
   1177   1.1     rmind 	if ((vp = bp->b_vp) == NULL)
   1178   1.1     rmind 		return;
   1179   1.1     rmind 
   1180   1.9     rmind 	KASSERT(bp->b_objlock == vp->v_interlock);
   1181   1.1     rmind 	KASSERT(mutex_owned(bp->b_objlock));
   1182   1.1     rmind 
   1183   1.1     rmind 	if (--vp->v_numoutput < 0)
   1184  1.11  christos 		vnpanic(vp, "%s: neg numoutput, vp %p", __func__, vp);
   1185   1.1     rmind 	if (vp->v_numoutput == 0)
   1186   1.1     rmind 		cv_broadcast(&vp->v_cv);
   1187   1.1     rmind }
   1188   1.1     rmind 
   1189   1.1     rmind /*
   1190   1.1     rmind  * Wait for a vnode (typically with VI_XLOCK set) to be cleaned or
   1191   1.1     rmind  * recycled.
   1192   1.1     rmind  */
   1193   1.1     rmind void
   1194   1.1     rmind vwait(vnode_t *vp, int flags)
   1195   1.1     rmind {
   1196   1.1     rmind 
   1197   1.9     rmind 	KASSERT(mutex_owned(vp->v_interlock));
   1198   1.1     rmind 	KASSERT(vp->v_usecount != 0);
   1199   1.1     rmind 
   1200   1.1     rmind 	while ((vp->v_iflag & flags) != 0)
   1201   1.9     rmind 		cv_wait(&vp->v_cv, vp->v_interlock);
   1202   1.1     rmind }
   1203   1.1     rmind 
   1204   1.1     rmind int
   1205   1.3     rmind vfs_drainvnodes(long target)
   1206   1.1     rmind {
   1207   1.1     rmind 
   1208   1.1     rmind 	while (numvnodes > target) {
   1209   1.1     rmind 		vnode_t *vp;
   1210   1.1     rmind 
   1211   1.1     rmind 		mutex_enter(&vnode_free_list_lock);
   1212   1.1     rmind 		vp = getcleanvnode();
   1213   1.3     rmind 		if (vp == NULL) {
   1214   1.3     rmind 			return EBUSY;
   1215   1.3     rmind 		}
   1216   1.1     rmind 		ungetnewvnode(vp);
   1217   1.1     rmind 	}
   1218   1.1     rmind 	return 0;
   1219   1.1     rmind }
   1220   1.1     rmind 
   1221   1.1     rmind void
   1222  1.11  christos vnpanic(vnode_t *vp, const char *fmt, ...)
   1223   1.1     rmind {
   1224  1.11  christos 	va_list ap;
   1225  1.11  christos 
   1226   1.1     rmind #ifdef DIAGNOSTIC
   1227   1.1     rmind 	vprint(NULL, vp);
   1228   1.1     rmind #endif
   1229  1.11  christos 	va_start(ap, fmt);
   1230  1.11  christos 	vpanic(fmt, ap);
   1231  1.11  christos 	va_end(ap);
   1232   1.1     rmind }
   1233