Home | History | Annotate | Line # | Download | only in kern
vfs_vnode.c revision 1.8.2.1
      1  1.8.2.1  cherry /*	$NetBSD: vfs_vnode.c,v 1.8.2.1 2011/06/23 14:20:22 cherry Exp $	*/
      2      1.1   rmind 
      3      1.1   rmind /*-
      4      1.2   rmind  * Copyright (c) 1997-2011 The NetBSD Foundation, Inc.
      5      1.1   rmind  * All rights reserved.
      6      1.1   rmind  *
      7      1.1   rmind  * This code is derived from software contributed to The NetBSD Foundation
      8      1.1   rmind  * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
      9      1.1   rmind  * NASA Ames Research Center, by Charles M. Hannum, and by Andrew Doran.
     10      1.1   rmind  *
     11      1.1   rmind  * Redistribution and use in source and binary forms, with or without
     12      1.1   rmind  * modification, are permitted provided that the following conditions
     13      1.1   rmind  * are met:
     14      1.1   rmind  * 1. Redistributions of source code must retain the above copyright
     15      1.1   rmind  *    notice, this list of conditions and the following disclaimer.
     16      1.1   rmind  * 2. Redistributions in binary form must reproduce the above copyright
     17      1.1   rmind  *    notice, this list of conditions and the following disclaimer in the
     18      1.1   rmind  *    documentation and/or other materials provided with the distribution.
     19      1.1   rmind  *
     20      1.1   rmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     21      1.1   rmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22      1.1   rmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23      1.1   rmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     24      1.1   rmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     25      1.1   rmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     26      1.1   rmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     27      1.1   rmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     28      1.1   rmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29      1.1   rmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30      1.1   rmind  * POSSIBILITY OF SUCH DAMAGE.
     31      1.1   rmind  */
     32      1.1   rmind 
     33      1.1   rmind /*
     34      1.1   rmind  * Copyright (c) 1989, 1993
     35      1.1   rmind  *	The Regents of the University of California.  All rights reserved.
     36      1.1   rmind  * (c) UNIX System Laboratories, Inc.
     37      1.1   rmind  * All or some portions of this file are derived from material licensed
     38      1.1   rmind  * to the University of California by American Telephone and Telegraph
     39      1.1   rmind  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
     40      1.1   rmind  * the permission of UNIX System Laboratories, Inc.
     41      1.1   rmind  *
     42      1.1   rmind  * Redistribution and use in source and binary forms, with or without
     43      1.1   rmind  * modification, are permitted provided that the following conditions
     44      1.1   rmind  * are met:
     45      1.1   rmind  * 1. Redistributions of source code must retain the above copyright
     46      1.1   rmind  *    notice, this list of conditions and the following disclaimer.
     47      1.1   rmind  * 2. Redistributions in binary form must reproduce the above copyright
     48      1.1   rmind  *    notice, this list of conditions and the following disclaimer in the
     49      1.1   rmind  *    documentation and/or other materials provided with the distribution.
     50      1.1   rmind  * 3. Neither the name of the University nor the names of its contributors
     51      1.1   rmind  *    may be used to endorse or promote products derived from this software
     52      1.1   rmind  *    without specific prior written permission.
     53      1.1   rmind  *
     54      1.1   rmind  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     55      1.1   rmind  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     56      1.1   rmind  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     57      1.1   rmind  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     58      1.1   rmind  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     59      1.1   rmind  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     60      1.1   rmind  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     61      1.1   rmind  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     62      1.1   rmind  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     63      1.1   rmind  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     64      1.1   rmind  * SUCH DAMAGE.
     65      1.1   rmind  *
     66      1.1   rmind  *	@(#)vfs_subr.c	8.13 (Berkeley) 4/18/94
     67      1.1   rmind  */
     68      1.1   rmind 
     69      1.1   rmind /*
     70      1.8   rmind  * The vnode cache subsystem.
     71      1.1   rmind  *
     72      1.8   rmind  * Life-cycle
     73      1.1   rmind  *
     74      1.8   rmind  *	Normally, there are two points where new vnodes are created:
     75      1.8   rmind  *	VOP_CREATE(9) and VOP_LOOKUP(9).  The life-cycle of a vnode
     76      1.8   rmind  *	starts in one of the following ways:
     77      1.8   rmind  *
     78      1.8   rmind  *	- Allocation, via getnewvnode(9) and/or vnalloc(9).
     79      1.8   rmind  *	- Recycle from a free list, via getnewvnode(9) -> getcleanvnode(9).
     80      1.8   rmind  *	- Reclamation of inactive vnode, via vget(9).
     81      1.8   rmind  *
     82      1.8   rmind  *	The life-cycle ends when the last reference is dropped, usually
     83      1.8   rmind  *	in VOP_REMOVE(9).  In such case, VOP_INACTIVE(9) is called to inform
     84      1.8   rmind  *	the file system that vnode is inactive.  Via this call, file system
     85      1.8   rmind  *	indicates whether vnode should be recycled (usually, count of links
     86      1.8   rmind  *	is checked i.e. whether file was removed).
     87      1.8   rmind  *
     88      1.8   rmind  *	Depending on indication, vnode can be put into a free list (cache),
     89      1.8   rmind  *	or cleaned via vclean(9), which calls VOP_RECLAIM(9) to disassociate
     90      1.8   rmind  *	underlying file system from the vnode, and finally destroyed.
     91      1.8   rmind  *
     92      1.8   rmind  * Reference counting
     93      1.8   rmind  *
     94      1.8   rmind  *	Vnode is considered active, if reference count (vnode_t::v_usecount)
     95      1.8   rmind  *	is non-zero.  It is maintained using: vref(9) and vrele(9), as well
     96      1.8   rmind  *	as vput(9), routines.  Common points holding references are e.g.
     97      1.8   rmind  *	file openings, current working directory, mount points, etc.
     98      1.8   rmind  *
     99      1.8   rmind  * Note on v_usecount and its locking
    100      1.8   rmind  *
    101      1.8   rmind  *	At nearly all points it is known that v_usecount could be zero,
    102      1.8   rmind  *	the vnode_t::v_interlock will be held.  To change v_usecount away
    103      1.8   rmind  *	from zero, the interlock must be held.  To change from a non-zero
    104      1.8   rmind  *	value to zero, again the interlock must be held.
    105      1.8   rmind  *
    106      1.8   rmind  *	There is a flag bit, VC_XLOCK, embedded in v_usecount.  To raise
    107      1.8   rmind  *	v_usecount, if the VC_XLOCK bit is set in it, the interlock must
    108      1.8   rmind  *	be held.  To modify the VC_XLOCK bit, the interlock must be held.
    109      1.8   rmind  *	We always keep the usecount (v_usecount & VC_MASK) non-zero while
    110      1.8   rmind  *	the VC_XLOCK bit is set.
    111      1.8   rmind  *
    112      1.8   rmind  *	Unless the VC_XLOCK bit is set, changing the usecount from a non-zero
    113      1.8   rmind  *	value to a non-zero value can safely be done using atomic operations,
    114      1.8   rmind  *	without the interlock held.
    115      1.8   rmind  *
    116      1.8   rmind  *	Even if the VC_XLOCK bit is set, decreasing the usecount to a non-zero
    117      1.8   rmind  *	value can be done using atomic operations, without the interlock held.
    118      1.8   rmind  *
    119      1.8   rmind  *	Note: if VI_CLEAN is set, vnode_t::v_interlock will be released while
    120      1.8   rmind  *	mntvnode_lock is still held.
    121      1.1   rmind  */
    122      1.1   rmind 
    123      1.1   rmind #include <sys/cdefs.h>
    124  1.8.2.1  cherry __KERNEL_RCSID(0, "$NetBSD: vfs_vnode.c,v 1.8.2.1 2011/06/23 14:20:22 cherry Exp $");
    125      1.1   rmind 
    126      1.1   rmind #include <sys/param.h>
    127      1.1   rmind #include <sys/kernel.h>
    128      1.1   rmind 
    129      1.1   rmind #include <sys/atomic.h>
    130      1.1   rmind #include <sys/buf.h>
    131      1.1   rmind #include <sys/conf.h>
    132      1.1   rmind #include <sys/device.h>
    133      1.1   rmind #include <sys/kauth.h>
    134      1.1   rmind #include <sys/kmem.h>
    135      1.1   rmind #include <sys/kthread.h>
    136      1.1   rmind #include <sys/module.h>
    137      1.1   rmind #include <sys/mount.h>
    138      1.1   rmind #include <sys/namei.h>
    139      1.1   rmind #include <sys/syscallargs.h>
    140      1.1   rmind #include <sys/sysctl.h>
    141      1.1   rmind #include <sys/systm.h>
    142      1.1   rmind #include <sys/vnode.h>
    143      1.1   rmind #include <sys/wapbl.h>
    144      1.1   rmind 
    145      1.1   rmind #include <uvm/uvm.h>
    146      1.1   rmind #include <uvm/uvm_readahead.h>
    147      1.1   rmind 
    148      1.6   rmind u_int			numvnodes		__cacheline_aligned;
    149      1.1   rmind 
    150      1.6   rmind static pool_cache_t	vnode_cache		__read_mostly;
    151      1.6   rmind static kmutex_t		vnode_free_list_lock	__cacheline_aligned;
    152      1.1   rmind 
    153      1.6   rmind static vnodelst_t	vnode_free_list		__cacheline_aligned;
    154      1.6   rmind static vnodelst_t	vnode_hold_list		__cacheline_aligned;
    155      1.6   rmind static vnodelst_t	vrele_list		__cacheline_aligned;
    156      1.6   rmind 
    157      1.6   rmind static kmutex_t		vrele_lock		__cacheline_aligned;
    158      1.6   rmind static kcondvar_t	vrele_cv		__cacheline_aligned;
    159      1.6   rmind static lwp_t *		vrele_lwp		__cacheline_aligned;
    160      1.6   rmind static int		vrele_pending		__cacheline_aligned;
    161      1.6   rmind static int		vrele_gen		__cacheline_aligned;
    162      1.1   rmind 
    163      1.1   rmind static vnode_t *	getcleanvnode(void);
    164      1.1   rmind static void		vrele_thread(void *);
    165      1.1   rmind static void		vpanic(vnode_t *, const char *);
    166      1.1   rmind 
    167      1.1   rmind /* Routines having to do with the management of the vnode table. */
    168      1.1   rmind extern int		(**dead_vnodeop_p)(void *);
    169      1.1   rmind 
    170      1.1   rmind void
    171      1.1   rmind vfs_vnode_sysinit(void)
    172      1.1   rmind {
    173      1.1   rmind 	int error;
    174      1.1   rmind 
    175      1.1   rmind 	vnode_cache = pool_cache_init(sizeof(vnode_t), 0, 0, 0, "vnodepl",
    176      1.1   rmind 	    NULL, IPL_NONE, NULL, NULL, NULL);
    177      1.1   rmind 	KASSERT(vnode_cache != NULL);
    178      1.1   rmind 
    179      1.1   rmind 	mutex_init(&vnode_free_list_lock, MUTEX_DEFAULT, IPL_NONE);
    180      1.1   rmind 	TAILQ_INIT(&vnode_free_list);
    181      1.1   rmind 	TAILQ_INIT(&vnode_hold_list);
    182      1.1   rmind 	TAILQ_INIT(&vrele_list);
    183      1.1   rmind 
    184      1.1   rmind 	mutex_init(&vrele_lock, MUTEX_DEFAULT, IPL_NONE);
    185      1.1   rmind 	cv_init(&vrele_cv, "vrele");
    186      1.1   rmind 	error = kthread_create(PRI_VM, KTHREAD_MPSAFE, NULL, vrele_thread,
    187      1.1   rmind 	    NULL, &vrele_lwp, "vrele");
    188      1.1   rmind 	KASSERT(error == 0);
    189      1.1   rmind }
    190      1.1   rmind 
    191      1.1   rmind /*
    192      1.1   rmind  * Allocate a new, uninitialized vnode.  If 'mp' is non-NULL, this is a
    193      1.1   rmind  * marker vnode and we are prepared to wait for the allocation.
    194      1.1   rmind  */
    195      1.1   rmind vnode_t *
    196      1.1   rmind vnalloc(struct mount *mp)
    197      1.1   rmind {
    198      1.1   rmind 	vnode_t *vp;
    199      1.1   rmind 
    200      1.1   rmind 	vp = pool_cache_get(vnode_cache, (mp != NULL ? PR_WAITOK : PR_NOWAIT));
    201      1.1   rmind 	if (vp == NULL) {
    202      1.1   rmind 		return NULL;
    203      1.1   rmind 	}
    204      1.1   rmind 
    205      1.1   rmind 	memset(vp, 0, sizeof(*vp));
    206  1.8.2.1  cherry 	uvm_obj_init(&vp->v_uobj, &uvm_vnodeops, true, 0);
    207      1.1   rmind 	cv_init(&vp->v_cv, "vnode");
    208      1.1   rmind 	/*
    209      1.1   rmind 	 * Done by memset() above.
    210      1.1   rmind 	 *	LIST_INIT(&vp->v_nclist);
    211      1.1   rmind 	 *	LIST_INIT(&vp->v_dnclist);
    212      1.1   rmind 	 */
    213      1.1   rmind 
    214      1.1   rmind 	if (mp != NULL) {
    215      1.1   rmind 		vp->v_mount = mp;
    216      1.1   rmind 		vp->v_type = VBAD;
    217      1.1   rmind 		vp->v_iflag = VI_MARKER;
    218      1.1   rmind 	} else {
    219      1.1   rmind 		rw_init(&vp->v_lock);
    220      1.1   rmind 	}
    221      1.1   rmind 
    222      1.1   rmind 	return vp;
    223      1.1   rmind }
    224      1.1   rmind 
    225      1.1   rmind /*
    226      1.1   rmind  * Free an unused, unreferenced vnode.
    227      1.1   rmind  */
    228      1.1   rmind void
    229      1.1   rmind vnfree(vnode_t *vp)
    230      1.1   rmind {
    231      1.1   rmind 
    232      1.1   rmind 	KASSERT(vp->v_usecount == 0);
    233      1.1   rmind 
    234      1.1   rmind 	if ((vp->v_iflag & VI_MARKER) == 0) {
    235      1.1   rmind 		rw_destroy(&vp->v_lock);
    236      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
    237      1.1   rmind 		numvnodes--;
    238      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    239      1.1   rmind 	}
    240      1.1   rmind 
    241  1.8.2.1  cherry 	/*
    242  1.8.2.1  cherry 	 * Note: the vnode interlock will either be freed, of reference
    243  1.8.2.1  cherry 	 * dropped (if VI_LOCKSHARE was in use).
    244  1.8.2.1  cherry 	 */
    245  1.8.2.1  cherry 	uvm_obj_destroy(&vp->v_uobj, true);
    246      1.1   rmind 	cv_destroy(&vp->v_cv);
    247      1.1   rmind 	pool_cache_put(vnode_cache, vp);
    248      1.1   rmind }
    249      1.1   rmind 
    250      1.1   rmind /*
    251      1.1   rmind  * getcleanvnode: grab a vnode from freelist and clean it.
    252      1.5   rmind  *
    253      1.5   rmind  * => Releases vnode_free_list_lock.
    254      1.5   rmind  * => Returns referenced vnode on success.
    255      1.1   rmind  */
    256      1.5   rmind static vnode_t *
    257      1.1   rmind getcleanvnode(void)
    258      1.1   rmind {
    259      1.1   rmind 	vnode_t *vp;
    260      1.1   rmind 	vnodelst_t *listhd;
    261      1.1   rmind 
    262      1.1   rmind 	KASSERT(mutex_owned(&vnode_free_list_lock));
    263      1.1   rmind retry:
    264      1.1   rmind 	listhd = &vnode_free_list;
    265      1.1   rmind try_nextlist:
    266      1.1   rmind 	TAILQ_FOREACH(vp, listhd, v_freelist) {
    267      1.1   rmind 		/*
    268      1.1   rmind 		 * It's safe to test v_usecount and v_iflag
    269      1.1   rmind 		 * without holding the interlock here, since
    270      1.1   rmind 		 * these vnodes should never appear on the
    271      1.1   rmind 		 * lists.
    272      1.1   rmind 		 */
    273      1.5   rmind 		KASSERT(vp->v_usecount == 0);
    274      1.5   rmind 		KASSERT((vp->v_iflag & VI_CLEAN) == 0);
    275      1.5   rmind 		KASSERT(vp->v_freelisthd == listhd);
    276      1.5   rmind 
    277  1.8.2.1  cherry 		if (!mutex_tryenter(vp->v_interlock))
    278      1.1   rmind 			continue;
    279      1.1   rmind 		if ((vp->v_iflag & VI_XLOCK) == 0)
    280      1.1   rmind 			break;
    281  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    282      1.1   rmind 	}
    283      1.1   rmind 
    284      1.1   rmind 	if (vp == NULL) {
    285      1.1   rmind 		if (listhd == &vnode_free_list) {
    286      1.1   rmind 			listhd = &vnode_hold_list;
    287      1.1   rmind 			goto try_nextlist;
    288      1.1   rmind 		}
    289      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    290      1.1   rmind 		return NULL;
    291      1.1   rmind 	}
    292      1.1   rmind 
    293      1.1   rmind 	/* Remove it from the freelist. */
    294      1.1   rmind 	TAILQ_REMOVE(listhd, vp, v_freelist);
    295      1.1   rmind 	vp->v_freelisthd = NULL;
    296      1.1   rmind 	mutex_exit(&vnode_free_list_lock);
    297      1.1   rmind 
    298      1.1   rmind 	KASSERT(vp->v_usecount == 0);
    299      1.1   rmind 
    300      1.1   rmind 	/*
    301      1.1   rmind 	 * The vnode is still associated with a file system, so we must
    302      1.1   rmind 	 * clean it out before reusing it.  We need to add a reference
    303      1.1   rmind 	 * before doing this.  If the vnode gains another reference while
    304      1.1   rmind 	 * being cleaned out then we lose - retry.
    305      1.1   rmind 	 */
    306      1.1   rmind 	atomic_add_int(&vp->v_usecount, 1 + VC_XLOCK);
    307      1.1   rmind 	vclean(vp, DOCLOSE);
    308      1.1   rmind 	KASSERT(vp->v_usecount >= 1 + VC_XLOCK);
    309      1.1   rmind 	atomic_add_int(&vp->v_usecount, -VC_XLOCK);
    310      1.1   rmind 	if (vp->v_usecount == 1) {
    311      1.1   rmind 		/* We're about to dirty it. */
    312      1.1   rmind 		vp->v_iflag &= ~VI_CLEAN;
    313  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    314      1.1   rmind 		if (vp->v_type == VBLK || vp->v_type == VCHR) {
    315      1.1   rmind 			spec_node_destroy(vp);
    316      1.1   rmind 		}
    317      1.1   rmind 		vp->v_type = VNON;
    318      1.1   rmind 	} else {
    319      1.1   rmind 		/*
    320      1.1   rmind 		 * Don't return to freelist - the holder of the last
    321      1.1   rmind 		 * reference will destroy it.
    322      1.1   rmind 		 */
    323      1.1   rmind 		vrelel(vp, 0); /* releases vp->v_interlock */
    324      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
    325      1.1   rmind 		goto retry;
    326      1.1   rmind 	}
    327      1.1   rmind 
    328      1.5   rmind 	KASSERT(vp->v_data == NULL);
    329      1.5   rmind 	KASSERT(vp->v_uobj.uo_npages == 0);
    330      1.5   rmind 	KASSERT(TAILQ_EMPTY(&vp->v_uobj.memq));
    331      1.5   rmind 	KASSERT(vp->v_numoutput == 0);
    332      1.5   rmind 	KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
    333      1.1   rmind 
    334      1.1   rmind 	return vp;
    335      1.1   rmind }
    336      1.1   rmind 
    337      1.1   rmind /*
    338      1.4   rmind  * getnewvnode: return the next vnode from the free list.
    339      1.5   rmind  *
    340      1.5   rmind  * => Returns referenced vnode, moved into the mount queue.
    341  1.8.2.1  cherry  * => Shares the interlock specified by 'slock', if it is not NULL.
    342      1.1   rmind  */
    343      1.1   rmind int
    344      1.1   rmind getnewvnode(enum vtagtype tag, struct mount *mp, int (**vops)(void *),
    345  1.8.2.1  cherry     kmutex_t *slock, vnode_t **vpp)
    346      1.1   rmind {
    347      1.1   rmind 	struct uvm_object *uobj;
    348      1.1   rmind 	static int toggle;
    349      1.1   rmind 	vnode_t *vp;
    350      1.1   rmind 	int error = 0, tryalloc;
    351      1.1   rmind 
    352      1.1   rmind try_again:
    353      1.1   rmind 	if (mp != NULL) {
    354      1.1   rmind 		/*
    355      1.4   rmind 		 * Mark filesystem busy while we are creating a vnode.
    356      1.4   rmind 		 * If unmount is in progress, this will fail.
    357      1.1   rmind 		 */
    358      1.1   rmind 		error = vfs_busy(mp, NULL);
    359      1.1   rmind 		if (error)
    360      1.1   rmind 			return error;
    361      1.1   rmind 	}
    362      1.1   rmind 
    363      1.1   rmind 	/*
    364      1.1   rmind 	 * We must choose whether to allocate a new vnode or recycle an
    365      1.1   rmind 	 * existing one. The criterion for allocating a new one is that
    366      1.1   rmind 	 * the total number of vnodes is less than the number desired or
    367      1.1   rmind 	 * there are no vnodes on either free list. Generally we only
    368      1.1   rmind 	 * want to recycle vnodes that have no buffers associated with
    369      1.1   rmind 	 * them, so we look first on the vnode_free_list. If it is empty,
    370      1.1   rmind 	 * we next consider vnodes with referencing buffers on the
    371      1.1   rmind 	 * vnode_hold_list. The toggle ensures that half the time we
    372      1.1   rmind 	 * will use a buffer from the vnode_hold_list, and half the time
    373      1.1   rmind 	 * we will allocate a new one unless the list has grown to twice
    374      1.1   rmind 	 * the desired size. We are reticent to recycle vnodes from the
    375      1.1   rmind 	 * vnode_hold_list because we will lose the identity of all its
    376      1.1   rmind 	 * referencing buffers.
    377      1.1   rmind 	 */
    378      1.1   rmind 
    379      1.1   rmind 	vp = NULL;
    380      1.1   rmind 
    381      1.1   rmind 	mutex_enter(&vnode_free_list_lock);
    382      1.1   rmind 
    383      1.1   rmind 	toggle ^= 1;
    384      1.1   rmind 	if (numvnodes > 2 * desiredvnodes)
    385      1.1   rmind 		toggle = 0;
    386      1.1   rmind 
    387      1.1   rmind 	tryalloc = numvnodes < desiredvnodes ||
    388      1.1   rmind 	    (TAILQ_FIRST(&vnode_free_list) == NULL &&
    389      1.1   rmind 	    (TAILQ_FIRST(&vnode_hold_list) == NULL || toggle));
    390      1.1   rmind 
    391      1.1   rmind 	if (tryalloc) {
    392      1.5   rmind 		/* Allocate a new vnode. */
    393      1.1   rmind 		numvnodes++;
    394      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    395      1.1   rmind 		if ((vp = vnalloc(NULL)) == NULL) {
    396      1.1   rmind 			mutex_enter(&vnode_free_list_lock);
    397      1.1   rmind 			numvnodes--;
    398      1.1   rmind 		} else
    399      1.1   rmind 			vp->v_usecount = 1;
    400      1.1   rmind 	}
    401      1.1   rmind 
    402      1.1   rmind 	if (vp == NULL) {
    403      1.5   rmind 		/* Recycle and get vnode clean. */
    404      1.1   rmind 		vp = getcleanvnode();
    405      1.1   rmind 		if (vp == NULL) {
    406      1.1   rmind 			if (mp != NULL) {
    407      1.1   rmind 				vfs_unbusy(mp, false, NULL);
    408      1.1   rmind 			}
    409      1.1   rmind 			if (tryalloc) {
    410      1.1   rmind 				printf("WARNING: unable to allocate new "
    411      1.1   rmind 				    "vnode, retrying...\n");
    412      1.1   rmind 				kpause("newvn", false, hz, NULL);
    413      1.1   rmind 				goto try_again;
    414      1.1   rmind 			}
    415      1.1   rmind 			tablefull("vnode", "increase kern.maxvnodes or NVNODE");
    416      1.1   rmind 			*vpp = 0;
    417      1.4   rmind 			return ENFILE;
    418      1.1   rmind 		}
    419  1.8.2.1  cherry 		if ((vp->v_iflag & VI_LOCKSHARE) != 0 || slock) {
    420  1.8.2.1  cherry 			/* We must remove vnode from the old mount point. */
    421  1.8.2.1  cherry 			if (vp->v_mount) {
    422  1.8.2.1  cherry 				vfs_insmntque(vp, NULL);
    423  1.8.2.1  cherry 			}
    424  1.8.2.1  cherry 			/* Allocate a new interlock, if it was shared. */
    425  1.8.2.1  cherry 			if (vp->v_iflag & VI_LOCKSHARE) {
    426  1.8.2.1  cherry 				uvm_obj_setlock(&vp->v_uobj, NULL);
    427  1.8.2.1  cherry 				vp->v_iflag &= ~VI_LOCKSHARE;
    428  1.8.2.1  cherry 			}
    429  1.8.2.1  cherry 		}
    430      1.1   rmind 		vp->v_iflag = 0;
    431      1.1   rmind 		vp->v_vflag = 0;
    432      1.1   rmind 		vp->v_uflag = 0;
    433      1.1   rmind 		vp->v_socket = NULL;
    434      1.1   rmind 	}
    435      1.1   rmind 
    436      1.1   rmind 	KASSERT(vp->v_usecount == 1);
    437      1.1   rmind 	KASSERT(vp->v_freelisthd == NULL);
    438      1.1   rmind 	KASSERT(LIST_EMPTY(&vp->v_nclist));
    439      1.1   rmind 	KASSERT(LIST_EMPTY(&vp->v_dnclist));
    440      1.1   rmind 
    441      1.5   rmind 	/* Initialize vnode. */
    442      1.1   rmind 	vp->v_type = VNON;
    443      1.1   rmind 	vp->v_tag = tag;
    444      1.1   rmind 	vp->v_op = vops;
    445      1.1   rmind 	vp->v_data = NULL;
    446      1.1   rmind 
    447      1.1   rmind 	uobj = &vp->v_uobj;
    448      1.1   rmind 	KASSERT(uobj->pgops == &uvm_vnodeops);
    449      1.1   rmind 	KASSERT(uobj->uo_npages == 0);
    450      1.1   rmind 	KASSERT(TAILQ_FIRST(&uobj->memq) == NULL);
    451      1.1   rmind 	vp->v_size = vp->v_writesize = VSIZENOTSET;
    452      1.1   rmind 
    453  1.8.2.1  cherry 	/* Share the vnode_t::v_interlock, if requested. */
    454  1.8.2.1  cherry 	if (slock) {
    455  1.8.2.1  cherry 		/* Set the interlock and mark that it is shared. */
    456  1.8.2.1  cherry 		KASSERT(vp->v_mount == NULL);
    457  1.8.2.1  cherry 		mutex_obj_hold(slock);
    458  1.8.2.1  cherry 		uvm_obj_setlock(&vp->v_uobj, slock);
    459  1.8.2.1  cherry 		KASSERT(vp->v_interlock == slock);
    460  1.8.2.1  cherry 		vp->v_iflag |= VI_LOCKSHARE;
    461  1.8.2.1  cherry 	}
    462  1.8.2.1  cherry 
    463      1.5   rmind 	/* Finally, move vnode into the mount queue. */
    464      1.5   rmind 	vfs_insmntque(vp, mp);
    465      1.5   rmind 
    466      1.1   rmind 	if (mp != NULL) {
    467      1.1   rmind 		if ((mp->mnt_iflag & IMNT_MPSAFE) != 0)
    468      1.1   rmind 			vp->v_vflag |= VV_MPSAFE;
    469      1.1   rmind 		vfs_unbusy(mp, true, NULL);
    470      1.1   rmind 	}
    471      1.1   rmind 
    472      1.5   rmind 	*vpp = vp;
    473      1.4   rmind 	return 0;
    474      1.1   rmind }
    475      1.1   rmind 
    476      1.1   rmind /*
    477      1.1   rmind  * This is really just the reverse of getnewvnode(). Needed for
    478      1.1   rmind  * VFS_VGET functions who may need to push back a vnode in case
    479      1.1   rmind  * of a locking race.
    480      1.1   rmind  */
    481      1.1   rmind void
    482      1.1   rmind ungetnewvnode(vnode_t *vp)
    483      1.1   rmind {
    484      1.1   rmind 
    485      1.1   rmind 	KASSERT(vp->v_usecount == 1);
    486      1.1   rmind 	KASSERT(vp->v_data == NULL);
    487      1.1   rmind 	KASSERT(vp->v_freelisthd == NULL);
    488      1.1   rmind 
    489  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
    490      1.1   rmind 	vp->v_iflag |= VI_CLEAN;
    491      1.1   rmind 	vrelel(vp, 0);
    492      1.1   rmind }
    493      1.1   rmind 
    494      1.1   rmind /*
    495      1.1   rmind  * Remove a vnode from its freelist.
    496      1.1   rmind  */
    497      1.1   rmind void
    498      1.1   rmind vremfree(vnode_t *vp)
    499      1.1   rmind {
    500      1.1   rmind 
    501  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    502      1.1   rmind 	KASSERT(vp->v_usecount == 0);
    503      1.1   rmind 
    504      1.1   rmind 	/*
    505      1.1   rmind 	 * Note that the reference count must not change until
    506      1.1   rmind 	 * the vnode is removed.
    507      1.1   rmind 	 */
    508      1.1   rmind 	mutex_enter(&vnode_free_list_lock);
    509      1.1   rmind 	if (vp->v_holdcnt > 0) {
    510      1.1   rmind 		KASSERT(vp->v_freelisthd == &vnode_hold_list);
    511      1.1   rmind 	} else {
    512      1.1   rmind 		KASSERT(vp->v_freelisthd == &vnode_free_list);
    513      1.1   rmind 	}
    514      1.1   rmind 	TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    515      1.1   rmind 	vp->v_freelisthd = NULL;
    516      1.1   rmind 	mutex_exit(&vnode_free_list_lock);
    517      1.1   rmind }
    518      1.1   rmind 
    519      1.1   rmind /*
    520      1.1   rmind  * Try to gain a reference to a vnode, without acquiring its interlock.
    521      1.1   rmind  * The caller must hold a lock that will prevent the vnode from being
    522      1.1   rmind  * recycled or freed.
    523      1.1   rmind  */
    524      1.1   rmind bool
    525      1.1   rmind vtryget(vnode_t *vp)
    526      1.1   rmind {
    527      1.1   rmind 	u_int use, next;
    528      1.1   rmind 
    529      1.1   rmind 	/*
    530      1.1   rmind 	 * If the vnode is being freed, don't make life any harder
    531      1.1   rmind 	 * for vclean() by adding another reference without waiting.
    532      1.1   rmind 	 * This is not strictly necessary, but we'll do it anyway.
    533      1.1   rmind 	 */
    534      1.1   rmind 	if (__predict_false((vp->v_iflag & VI_XLOCK) != 0)) {
    535      1.1   rmind 		return false;
    536      1.1   rmind 	}
    537      1.1   rmind 	for (use = vp->v_usecount;; use = next) {
    538      1.1   rmind 		if (use == 0 || __predict_false((use & VC_XLOCK) != 0)) {
    539      1.1   rmind 			/* Need interlock held if first reference. */
    540      1.1   rmind 			return false;
    541      1.1   rmind 		}
    542      1.1   rmind 		next = atomic_cas_uint(&vp->v_usecount, use, use + 1);
    543      1.1   rmind 		if (__predict_true(next == use)) {
    544      1.1   rmind 			return true;
    545      1.1   rmind 		}
    546      1.1   rmind 	}
    547      1.1   rmind }
    548      1.1   rmind 
    549      1.1   rmind /*
    550      1.4   rmind  * vget: get a particular vnode from the free list, increment its reference
    551      1.4   rmind  * count and lock it.
    552      1.4   rmind  *
    553      1.4   rmind  * => Should be called with v_interlock held.
    554      1.4   rmind  *
    555      1.4   rmind  * If VI_XLOCK is set, the vnode is being eliminated in vgone()/vclean().
    556      1.4   rmind  * In that case, we cannot grab the vnode, so the process is awakened when
    557      1.4   rmind  * the transition is completed, and an error returned to indicate that the
    558      1.4   rmind  * vnode is no longer usable (e.g. changed to a new file system type).
    559      1.1   rmind  */
    560      1.1   rmind int
    561      1.1   rmind vget(vnode_t *vp, int flags)
    562      1.1   rmind {
    563      1.1   rmind 	int error = 0;
    564      1.1   rmind 
    565      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    566  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    567      1.1   rmind 	KASSERT((flags & ~(LK_SHARED|LK_EXCLUSIVE|LK_NOWAIT)) == 0);
    568      1.1   rmind 
    569      1.1   rmind 	/*
    570      1.1   rmind 	 * Before adding a reference, we must remove the vnode
    571      1.1   rmind 	 * from its freelist.
    572      1.1   rmind 	 */
    573      1.1   rmind 	if (vp->v_usecount == 0) {
    574      1.1   rmind 		vremfree(vp);
    575      1.1   rmind 		vp->v_usecount = 1;
    576      1.1   rmind 	} else {
    577      1.1   rmind 		atomic_inc_uint(&vp->v_usecount);
    578      1.1   rmind 	}
    579      1.1   rmind 
    580      1.1   rmind 	/*
    581      1.1   rmind 	 * If the vnode is in the process of being cleaned out for
    582      1.1   rmind 	 * another use, we wait for the cleaning to finish and then
    583      1.1   rmind 	 * return failure.  Cleaning is determined by checking if
    584      1.1   rmind 	 * the VI_XLOCK flag is set.
    585      1.1   rmind 	 */
    586      1.1   rmind 	if ((vp->v_iflag & VI_XLOCK) != 0) {
    587      1.1   rmind 		if ((flags & LK_NOWAIT) != 0) {
    588      1.1   rmind 			vrelel(vp, 0);
    589      1.1   rmind 			return EBUSY;
    590      1.1   rmind 		}
    591      1.1   rmind 		vwait(vp, VI_XLOCK);
    592      1.1   rmind 		vrelel(vp, 0);
    593      1.1   rmind 		return ENOENT;
    594      1.1   rmind 	}
    595      1.1   rmind 
    596      1.1   rmind 	/*
    597      1.1   rmind 	 * Ok, we got it in good shape.  Just locking left.
    598      1.1   rmind 	 */
    599      1.1   rmind 	KASSERT((vp->v_iflag & VI_CLEAN) == 0);
    600  1.8.2.1  cherry 	mutex_exit(vp->v_interlock);
    601      1.1   rmind 	if (flags & (LK_EXCLUSIVE | LK_SHARED)) {
    602      1.1   rmind 		error = vn_lock(vp, flags);
    603      1.1   rmind 		if (error != 0) {
    604      1.1   rmind 			vrele(vp);
    605      1.1   rmind 		}
    606      1.1   rmind 	}
    607      1.1   rmind 	return error;
    608      1.1   rmind }
    609      1.1   rmind 
    610      1.1   rmind /*
    611      1.4   rmind  * vput: unlock and release the reference.
    612      1.1   rmind  */
    613      1.1   rmind void
    614      1.1   rmind vput(vnode_t *vp)
    615      1.1   rmind {
    616      1.1   rmind 
    617      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    618      1.1   rmind 
    619      1.1   rmind 	VOP_UNLOCK(vp);
    620      1.1   rmind 	vrele(vp);
    621      1.1   rmind }
    622      1.1   rmind 
    623      1.1   rmind /*
    624      1.1   rmind  * Try to drop reference on a vnode.  Abort if we are releasing the
    625      1.1   rmind  * last reference.  Note: this _must_ succeed if not the last reference.
    626      1.1   rmind  */
    627      1.1   rmind static inline bool
    628      1.1   rmind vtryrele(vnode_t *vp)
    629      1.1   rmind {
    630      1.1   rmind 	u_int use, next;
    631      1.1   rmind 
    632      1.1   rmind 	for (use = vp->v_usecount;; use = next) {
    633      1.1   rmind 		if (use == 1) {
    634      1.1   rmind 			return false;
    635      1.1   rmind 		}
    636      1.1   rmind 		KASSERT((use & VC_MASK) > 1);
    637      1.1   rmind 		next = atomic_cas_uint(&vp->v_usecount, use, use - 1);
    638      1.1   rmind 		if (__predict_true(next == use)) {
    639      1.1   rmind 			return true;
    640      1.1   rmind 		}
    641      1.1   rmind 	}
    642      1.1   rmind }
    643      1.1   rmind 
    644      1.1   rmind /*
    645      1.1   rmind  * Vnode release.  If reference count drops to zero, call inactive
    646      1.1   rmind  * routine and either return to freelist or free to the pool.
    647      1.1   rmind  */
    648      1.1   rmind void
    649      1.1   rmind vrelel(vnode_t *vp, int flags)
    650      1.1   rmind {
    651      1.1   rmind 	bool recycle, defer;
    652      1.1   rmind 	int error;
    653      1.1   rmind 
    654  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    655      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    656      1.1   rmind 	KASSERT(vp->v_freelisthd == NULL);
    657      1.1   rmind 
    658      1.1   rmind 	if (__predict_false(vp->v_op == dead_vnodeop_p &&
    659      1.1   rmind 	    (vp->v_iflag & (VI_CLEAN|VI_XLOCK)) == 0)) {
    660      1.1   rmind 		vpanic(vp, "dead but not clean");
    661      1.1   rmind 	}
    662      1.1   rmind 
    663      1.1   rmind 	/*
    664      1.1   rmind 	 * If not the last reference, just drop the reference count
    665      1.1   rmind 	 * and unlock.
    666      1.1   rmind 	 */
    667      1.1   rmind 	if (vtryrele(vp)) {
    668      1.1   rmind 		vp->v_iflag |= VI_INACTREDO;
    669  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    670      1.1   rmind 		return;
    671      1.1   rmind 	}
    672      1.1   rmind 	if (vp->v_usecount <= 0 || vp->v_writecount != 0) {
    673      1.1   rmind 		vpanic(vp, "vrelel: bad ref count");
    674      1.1   rmind 	}
    675      1.1   rmind 
    676      1.1   rmind 	KASSERT((vp->v_iflag & VI_XLOCK) == 0);
    677      1.1   rmind 
    678      1.1   rmind 	/*
    679      1.1   rmind 	 * If not clean, deactivate the vnode, but preserve
    680      1.1   rmind 	 * our reference across the call to VOP_INACTIVE().
    681      1.1   rmind 	 */
    682      1.1   rmind retry:
    683      1.1   rmind 	if ((vp->v_iflag & VI_CLEAN) == 0) {
    684      1.1   rmind 		recycle = false;
    685      1.1   rmind 		vp->v_iflag |= VI_INACTNOW;
    686      1.1   rmind 
    687      1.1   rmind 		/*
    688      1.1   rmind 		 * XXX This ugly block can be largely eliminated if
    689      1.1   rmind 		 * locking is pushed down into the file systems.
    690      1.1   rmind 		 *
    691      1.1   rmind 		 * Defer vnode release to vrele_thread if caller
    692      1.1   rmind 		 * requests it explicitly.
    693      1.1   rmind 		 */
    694      1.1   rmind 		if ((curlwp == uvm.pagedaemon_lwp) ||
    695      1.1   rmind 		    (flags & VRELEL_ASYNC_RELE) != 0) {
    696      1.1   rmind 			/* The pagedaemon can't wait around; defer. */
    697      1.1   rmind 			defer = true;
    698      1.1   rmind 		} else if (curlwp == vrele_lwp) {
    699      1.1   rmind 			/* We have to try harder. */
    700      1.1   rmind 			vp->v_iflag &= ~VI_INACTREDO;
    701  1.8.2.1  cherry 			mutex_exit(vp->v_interlock);
    702      1.1   rmind 			error = vn_lock(vp, LK_EXCLUSIVE);
    703      1.1   rmind 			if (error != 0) {
    704      1.1   rmind 				/* XXX */
    705      1.1   rmind 				vpanic(vp, "vrele: unable to lock %p");
    706      1.1   rmind 			}
    707      1.1   rmind 			defer = false;
    708      1.1   rmind 		} else if ((vp->v_iflag & VI_LAYER) != 0) {
    709      1.1   rmind 			/*
    710      1.1   rmind 			 * Acquiring the stack's lock in vclean() even
    711      1.1   rmind 			 * for an honest vput/vrele is dangerous because
    712      1.1   rmind 			 * our caller may hold other vnode locks; defer.
    713      1.1   rmind 			 */
    714      1.1   rmind 			defer = true;
    715      1.4   rmind 		} else {
    716      1.1   rmind 			/* If we can't acquire the lock, then defer. */
    717      1.1   rmind 			vp->v_iflag &= ~VI_INACTREDO;
    718  1.8.2.1  cherry 			mutex_exit(vp->v_interlock);
    719      1.1   rmind 			error = vn_lock(vp, LK_EXCLUSIVE | LK_NOWAIT);
    720      1.1   rmind 			if (error != 0) {
    721      1.1   rmind 				defer = true;
    722  1.8.2.1  cherry 				mutex_enter(vp->v_interlock);
    723      1.1   rmind 			} else {
    724      1.1   rmind 				defer = false;
    725      1.1   rmind 			}
    726      1.1   rmind 		}
    727      1.1   rmind 
    728      1.1   rmind 		if (defer) {
    729      1.1   rmind 			/*
    730      1.1   rmind 			 * Defer reclaim to the kthread; it's not safe to
    731      1.1   rmind 			 * clean it here.  We donate it our last reference.
    732      1.1   rmind 			 */
    733  1.8.2.1  cherry 			KASSERT(mutex_owned(vp->v_interlock));
    734      1.1   rmind 			KASSERT((vp->v_iflag & VI_INACTPEND) == 0);
    735      1.1   rmind 			vp->v_iflag &= ~VI_INACTNOW;
    736      1.1   rmind 			vp->v_iflag |= VI_INACTPEND;
    737      1.1   rmind 			mutex_enter(&vrele_lock);
    738      1.1   rmind 			TAILQ_INSERT_TAIL(&vrele_list, vp, v_freelist);
    739      1.1   rmind 			if (++vrele_pending > (desiredvnodes >> 8))
    740      1.1   rmind 				cv_signal(&vrele_cv);
    741      1.1   rmind 			mutex_exit(&vrele_lock);
    742  1.8.2.1  cherry 			mutex_exit(vp->v_interlock);
    743      1.1   rmind 			return;
    744      1.1   rmind 		}
    745      1.1   rmind 
    746      1.1   rmind #ifdef DIAGNOSTIC
    747      1.1   rmind 		if ((vp->v_type == VBLK || vp->v_type == VCHR) &&
    748      1.1   rmind 		    vp->v_specnode != NULL && vp->v_specnode->sn_opencnt != 0) {
    749      1.1   rmind 			vprint("vrelel: missing VOP_CLOSE()", vp);
    750      1.1   rmind 		}
    751      1.1   rmind #endif
    752      1.1   rmind 
    753      1.1   rmind 		/*
    754      1.1   rmind 		 * The vnode can gain another reference while being
    755      1.1   rmind 		 * deactivated.  If VOP_INACTIVE() indicates that
    756      1.1   rmind 		 * the described file has been deleted, then recycle
    757      1.1   rmind 		 * the vnode irrespective of additional references.
    758      1.1   rmind 		 * Another thread may be waiting to re-use the on-disk
    759      1.1   rmind 		 * inode.
    760      1.1   rmind 		 *
    761      1.1   rmind 		 * Note that VOP_INACTIVE() will drop the vnode lock.
    762      1.1   rmind 		 */
    763      1.1   rmind 		VOP_INACTIVE(vp, &recycle);
    764  1.8.2.1  cherry 		mutex_enter(vp->v_interlock);
    765      1.1   rmind 		vp->v_iflag &= ~VI_INACTNOW;
    766      1.1   rmind 		if (!recycle) {
    767      1.1   rmind 			if (vtryrele(vp)) {
    768  1.8.2.1  cherry 				mutex_exit(vp->v_interlock);
    769      1.1   rmind 				return;
    770      1.1   rmind 			}
    771      1.1   rmind 
    772      1.1   rmind 			/*
    773      1.1   rmind 			 * If we grew another reference while
    774      1.1   rmind 			 * VOP_INACTIVE() was underway, retry.
    775      1.1   rmind 			 */
    776      1.1   rmind 			if ((vp->v_iflag & VI_INACTREDO) != 0) {
    777      1.1   rmind 				goto retry;
    778      1.1   rmind 			}
    779      1.1   rmind 		}
    780      1.1   rmind 
    781      1.1   rmind 		/* Take care of space accounting. */
    782      1.1   rmind 		if (vp->v_iflag & VI_EXECMAP) {
    783      1.1   rmind 			atomic_add_int(&uvmexp.execpages,
    784      1.1   rmind 			    -vp->v_uobj.uo_npages);
    785      1.1   rmind 			atomic_add_int(&uvmexp.filepages,
    786      1.1   rmind 			    vp->v_uobj.uo_npages);
    787      1.1   rmind 		}
    788      1.1   rmind 		vp->v_iflag &= ~(VI_TEXT|VI_EXECMAP|VI_WRMAP);
    789      1.1   rmind 		vp->v_vflag &= ~VV_MAPPED;
    790      1.1   rmind 
    791      1.1   rmind 		/*
    792      1.1   rmind 		 * Recycle the vnode if the file is now unused (unlinked),
    793      1.1   rmind 		 * otherwise just free it.
    794      1.1   rmind 		 */
    795      1.1   rmind 		if (recycle) {
    796      1.1   rmind 			vclean(vp, DOCLOSE);
    797      1.1   rmind 		}
    798      1.1   rmind 		KASSERT(vp->v_usecount > 0);
    799      1.1   rmind 	}
    800      1.1   rmind 
    801      1.1   rmind 	if (atomic_dec_uint_nv(&vp->v_usecount) != 0) {
    802      1.1   rmind 		/* Gained another reference while being reclaimed. */
    803  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    804      1.1   rmind 		return;
    805      1.1   rmind 	}
    806      1.1   rmind 
    807      1.1   rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
    808      1.1   rmind 		/*
    809      1.1   rmind 		 * It's clean so destroy it.  It isn't referenced
    810      1.1   rmind 		 * anywhere since it has been reclaimed.
    811      1.1   rmind 		 */
    812      1.1   rmind 		KASSERT(vp->v_holdcnt == 0);
    813      1.1   rmind 		KASSERT(vp->v_writecount == 0);
    814  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    815      1.1   rmind 		vfs_insmntque(vp, NULL);
    816      1.1   rmind 		if (vp->v_type == VBLK || vp->v_type == VCHR) {
    817      1.1   rmind 			spec_node_destroy(vp);
    818      1.1   rmind 		}
    819      1.1   rmind 		vnfree(vp);
    820      1.1   rmind 	} else {
    821      1.1   rmind 		/*
    822      1.1   rmind 		 * Otherwise, put it back onto the freelist.  It
    823      1.1   rmind 		 * can't be destroyed while still associated with
    824      1.1   rmind 		 * a file system.
    825      1.1   rmind 		 */
    826      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
    827      1.1   rmind 		if (vp->v_holdcnt > 0) {
    828      1.1   rmind 			vp->v_freelisthd = &vnode_hold_list;
    829      1.1   rmind 		} else {
    830      1.1   rmind 			vp->v_freelisthd = &vnode_free_list;
    831      1.1   rmind 		}
    832      1.1   rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    833      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    834  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
    835      1.1   rmind 	}
    836      1.1   rmind }
    837      1.1   rmind 
    838      1.1   rmind void
    839      1.1   rmind vrele(vnode_t *vp)
    840      1.1   rmind {
    841      1.1   rmind 
    842      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    843      1.1   rmind 
    844      1.1   rmind 	if ((vp->v_iflag & VI_INACTNOW) == 0 && vtryrele(vp)) {
    845      1.1   rmind 		return;
    846      1.1   rmind 	}
    847  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
    848      1.1   rmind 	vrelel(vp, 0);
    849      1.1   rmind }
    850      1.1   rmind 
    851      1.1   rmind /*
    852      1.1   rmind  * Asynchronous vnode release, vnode is released in different context.
    853      1.1   rmind  */
    854      1.1   rmind void
    855      1.1   rmind vrele_async(vnode_t *vp)
    856      1.1   rmind {
    857      1.1   rmind 
    858      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    859      1.1   rmind 
    860      1.1   rmind 	if ((vp->v_iflag & VI_INACTNOW) == 0 && vtryrele(vp)) {
    861      1.1   rmind 		return;
    862      1.1   rmind 	}
    863  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
    864      1.1   rmind 	vrelel(vp, VRELEL_ASYNC_RELE);
    865      1.1   rmind }
    866      1.1   rmind 
    867      1.1   rmind static void
    868      1.1   rmind vrele_thread(void *cookie)
    869      1.1   rmind {
    870      1.1   rmind 	vnode_t *vp;
    871      1.1   rmind 
    872      1.1   rmind 	for (;;) {
    873      1.1   rmind 		mutex_enter(&vrele_lock);
    874      1.1   rmind 		while (TAILQ_EMPTY(&vrele_list)) {
    875      1.1   rmind 			vrele_gen++;
    876      1.1   rmind 			cv_broadcast(&vrele_cv);
    877      1.1   rmind 			cv_timedwait(&vrele_cv, &vrele_lock, hz);
    878      1.1   rmind 		}
    879      1.1   rmind 		vp = TAILQ_FIRST(&vrele_list);
    880      1.1   rmind 		TAILQ_REMOVE(&vrele_list, vp, v_freelist);
    881      1.1   rmind 		vrele_pending--;
    882      1.1   rmind 		mutex_exit(&vrele_lock);
    883      1.1   rmind 
    884      1.1   rmind 		/*
    885      1.1   rmind 		 * If not the last reference, then ignore the vnode
    886      1.1   rmind 		 * and look for more work.
    887      1.1   rmind 		 */
    888  1.8.2.1  cherry 		mutex_enter(vp->v_interlock);
    889      1.1   rmind 		KASSERT((vp->v_iflag & VI_INACTPEND) != 0);
    890      1.1   rmind 		vp->v_iflag &= ~VI_INACTPEND;
    891      1.1   rmind 		vrelel(vp, 0);
    892      1.1   rmind 	}
    893      1.1   rmind }
    894      1.1   rmind 
    895      1.2   rmind void
    896      1.2   rmind vrele_flush(void)
    897      1.2   rmind {
    898      1.2   rmind 	int gen;
    899      1.2   rmind 
    900      1.2   rmind 	mutex_enter(&vrele_lock);
    901      1.2   rmind 	gen = vrele_gen;
    902      1.2   rmind 	while (vrele_pending && gen == vrele_gen) {
    903      1.2   rmind 		cv_broadcast(&vrele_cv);
    904      1.2   rmind 		cv_wait(&vrele_cv, &vrele_lock);
    905      1.2   rmind 	}
    906      1.2   rmind 	mutex_exit(&vrele_lock);
    907      1.2   rmind }
    908      1.2   rmind 
    909      1.1   rmind /*
    910      1.1   rmind  * Vnode reference, where a reference is already held by some other
    911      1.1   rmind  * object (for example, a file structure).
    912      1.1   rmind  */
    913      1.1   rmind void
    914      1.1   rmind vref(vnode_t *vp)
    915      1.1   rmind {
    916      1.1   rmind 
    917      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    918      1.1   rmind 	KASSERT(vp->v_usecount != 0);
    919      1.1   rmind 
    920      1.1   rmind 	atomic_inc_uint(&vp->v_usecount);
    921      1.1   rmind }
    922      1.1   rmind 
    923      1.1   rmind /*
    924      1.1   rmind  * Page or buffer structure gets a reference.
    925      1.1   rmind  * Called with v_interlock held.
    926      1.1   rmind  */
    927      1.1   rmind void
    928      1.1   rmind vholdl(vnode_t *vp)
    929      1.1   rmind {
    930      1.1   rmind 
    931  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    932      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    933      1.1   rmind 
    934      1.1   rmind 	if (vp->v_holdcnt++ == 0 && vp->v_usecount == 0) {
    935      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
    936      1.1   rmind 		KASSERT(vp->v_freelisthd == &vnode_free_list);
    937      1.1   rmind 		TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    938      1.1   rmind 		vp->v_freelisthd = &vnode_hold_list;
    939      1.1   rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    940      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    941      1.1   rmind 	}
    942      1.1   rmind }
    943      1.1   rmind 
    944      1.1   rmind /*
    945      1.1   rmind  * Page or buffer structure frees a reference.
    946      1.1   rmind  * Called with v_interlock held.
    947      1.1   rmind  */
    948      1.1   rmind void
    949      1.1   rmind holdrelel(vnode_t *vp)
    950      1.1   rmind {
    951      1.1   rmind 
    952  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    953      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    954      1.1   rmind 
    955      1.1   rmind 	if (vp->v_holdcnt <= 0) {
    956      1.1   rmind 		vpanic(vp, "holdrelel: holdcnt vp %p");
    957      1.1   rmind 	}
    958      1.1   rmind 
    959      1.1   rmind 	vp->v_holdcnt--;
    960      1.1   rmind 	if (vp->v_holdcnt == 0 && vp->v_usecount == 0) {
    961      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
    962      1.1   rmind 		KASSERT(vp->v_freelisthd == &vnode_hold_list);
    963      1.1   rmind 		TAILQ_REMOVE(vp->v_freelisthd, vp, v_freelist);
    964      1.1   rmind 		vp->v_freelisthd = &vnode_free_list;
    965      1.1   rmind 		TAILQ_INSERT_TAIL(vp->v_freelisthd, vp, v_freelist);
    966      1.1   rmind 		mutex_exit(&vnode_free_list_lock);
    967      1.1   rmind 	}
    968      1.1   rmind }
    969      1.1   rmind 
    970      1.1   rmind /*
    971      1.1   rmind  * Disassociate the underlying file system from a vnode.
    972      1.1   rmind  *
    973      1.1   rmind  * Must be called with the interlock held, and will return with it held.
    974      1.1   rmind  */
    975      1.1   rmind void
    976      1.1   rmind vclean(vnode_t *vp, int flags)
    977      1.1   rmind {
    978      1.1   rmind 	lwp_t *l = curlwp;
    979      1.1   rmind 	bool recycle, active;
    980      1.1   rmind 	int error;
    981      1.1   rmind 
    982  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
    983      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
    984      1.1   rmind 	KASSERT(vp->v_usecount != 0);
    985      1.1   rmind 
    986      1.1   rmind 	/* If cleaning is already in progress wait until done and return. */
    987      1.1   rmind 	if (vp->v_iflag & VI_XLOCK) {
    988      1.1   rmind 		vwait(vp, VI_XLOCK);
    989      1.1   rmind 		return;
    990      1.1   rmind 	}
    991      1.1   rmind 
    992      1.1   rmind 	/* If already clean, nothing to do. */
    993      1.1   rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
    994      1.1   rmind 		return;
    995      1.1   rmind 	}
    996      1.1   rmind 
    997      1.1   rmind 	/*
    998      1.1   rmind 	 * Prevent the vnode from being recycled or brought into use
    999      1.1   rmind 	 * while we clean it out.
   1000      1.1   rmind 	 */
   1001      1.1   rmind 	vp->v_iflag |= VI_XLOCK;
   1002      1.1   rmind 	if (vp->v_iflag & VI_EXECMAP) {
   1003      1.1   rmind 		atomic_add_int(&uvmexp.execpages, -vp->v_uobj.uo_npages);
   1004      1.1   rmind 		atomic_add_int(&uvmexp.filepages, vp->v_uobj.uo_npages);
   1005      1.1   rmind 	}
   1006      1.1   rmind 	vp->v_iflag &= ~(VI_TEXT|VI_EXECMAP);
   1007      1.1   rmind 	active = (vp->v_usecount & VC_MASK) > 1;
   1008      1.1   rmind 
   1009      1.1   rmind 	/* XXXAD should not lock vnode under layer */
   1010  1.8.2.1  cherry 	mutex_exit(vp->v_interlock);
   1011      1.1   rmind 	VOP_LOCK(vp, LK_EXCLUSIVE);
   1012      1.1   rmind 
   1013      1.1   rmind 	/*
   1014      1.1   rmind 	 * Clean out any cached data associated with the vnode.
   1015      1.1   rmind 	 * If purging an active vnode, it must be closed and
   1016      1.1   rmind 	 * deactivated before being reclaimed. Note that the
   1017      1.1   rmind 	 * VOP_INACTIVE will unlock the vnode.
   1018      1.1   rmind 	 */
   1019      1.1   rmind 	if (flags & DOCLOSE) {
   1020      1.1   rmind 		error = vinvalbuf(vp, V_SAVE, NOCRED, l, 0, 0);
   1021      1.1   rmind 		if (error != 0) {
   1022      1.1   rmind 			/* XXX, fix vn_start_write's grab of mp and use that. */
   1023      1.1   rmind 
   1024      1.1   rmind 			if (wapbl_vphaswapbl(vp))
   1025      1.1   rmind 				WAPBL_DISCARD(wapbl_vptomp(vp));
   1026      1.1   rmind 			error = vinvalbuf(vp, 0, NOCRED, l, 0, 0);
   1027      1.1   rmind 		}
   1028      1.1   rmind 		KASSERT(error == 0);
   1029      1.1   rmind 		KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
   1030      1.1   rmind 		if (active && (vp->v_type == VBLK || vp->v_type == VCHR)) {
   1031      1.1   rmind 			 spec_node_revoke(vp);
   1032      1.1   rmind 		}
   1033      1.1   rmind 	}
   1034      1.1   rmind 	if (active) {
   1035      1.1   rmind 		VOP_INACTIVE(vp, &recycle);
   1036      1.1   rmind 	} else {
   1037      1.1   rmind 		/*
   1038      1.1   rmind 		 * Any other processes trying to obtain this lock must first
   1039      1.1   rmind 		 * wait for VI_XLOCK to clear, then call the new lock operation.
   1040      1.1   rmind 		 */
   1041      1.1   rmind 		VOP_UNLOCK(vp);
   1042      1.1   rmind 	}
   1043      1.1   rmind 
   1044      1.1   rmind 	/* Disassociate the underlying file system from the vnode. */
   1045      1.1   rmind 	if (VOP_RECLAIM(vp)) {
   1046      1.1   rmind 		vpanic(vp, "vclean: cannot reclaim");
   1047      1.1   rmind 	}
   1048      1.1   rmind 
   1049      1.7   rmind 	KASSERT(vp->v_data == NULL);
   1050      1.1   rmind 	KASSERT(vp->v_uobj.uo_npages == 0);
   1051      1.7   rmind 
   1052      1.1   rmind 	if (vp->v_type == VREG && vp->v_ractx != NULL) {
   1053      1.1   rmind 		uvm_ra_freectx(vp->v_ractx);
   1054      1.1   rmind 		vp->v_ractx = NULL;
   1055      1.1   rmind 	}
   1056      1.7   rmind 
   1057      1.7   rmind 	/* Purge name cache. */
   1058      1.1   rmind 	cache_purge(vp);
   1059      1.1   rmind 
   1060      1.1   rmind 	/* Done with purge, notify sleepers of the grim news. */
   1061  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
   1062      1.1   rmind 	vp->v_op = dead_vnodeop_p;
   1063      1.1   rmind 	vp->v_tag = VT_NON;
   1064      1.1   rmind 	KNOTE(&vp->v_klist, NOTE_REVOKE);
   1065      1.1   rmind 	vp->v_iflag &= ~VI_XLOCK;
   1066      1.1   rmind 	vp->v_vflag &= ~VV_LOCKSWORK;
   1067      1.1   rmind 	if ((flags & DOCLOSE) != 0) {
   1068      1.1   rmind 		vp->v_iflag |= VI_CLEAN;
   1069      1.1   rmind 	}
   1070      1.1   rmind 	cv_broadcast(&vp->v_cv);
   1071      1.1   rmind 
   1072      1.1   rmind 	KASSERT((vp->v_iflag & VI_ONWORKLST) == 0);
   1073      1.1   rmind }
   1074      1.1   rmind 
   1075      1.1   rmind /*
   1076      1.1   rmind  * Recycle an unused vnode to the front of the free list.
   1077      1.1   rmind  * Release the passed interlock if the vnode will be recycled.
   1078      1.1   rmind  */
   1079      1.1   rmind int
   1080      1.1   rmind vrecycle(vnode_t *vp, kmutex_t *inter_lkp, struct lwp *l)
   1081      1.1   rmind {
   1082      1.1   rmind 
   1083      1.1   rmind 	KASSERT((vp->v_iflag & VI_MARKER) == 0);
   1084      1.1   rmind 
   1085  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
   1086      1.1   rmind 	if (vp->v_usecount != 0) {
   1087  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
   1088      1.4   rmind 		return 0;
   1089      1.1   rmind 	}
   1090      1.1   rmind 	if (inter_lkp) {
   1091      1.1   rmind 		mutex_exit(inter_lkp);
   1092      1.1   rmind 	}
   1093      1.1   rmind 	vremfree(vp);
   1094      1.1   rmind 	vp->v_usecount = 1;
   1095      1.1   rmind 	vclean(vp, DOCLOSE);
   1096      1.1   rmind 	vrelel(vp, 0);
   1097      1.4   rmind 	return 1;
   1098      1.1   rmind }
   1099      1.1   rmind 
   1100      1.1   rmind /*
   1101      1.1   rmind  * Eliminate all activity associated with the requested vnode
   1102      1.1   rmind  * and with all vnodes aliased to the requested vnode.
   1103      1.1   rmind  */
   1104      1.1   rmind void
   1105      1.1   rmind vrevoke(vnode_t *vp)
   1106      1.1   rmind {
   1107      1.1   rmind 	vnode_t *vq, **vpp;
   1108      1.1   rmind 	enum vtype type;
   1109      1.1   rmind 	dev_t dev;
   1110      1.1   rmind 
   1111      1.1   rmind 	KASSERT(vp->v_usecount > 0);
   1112      1.1   rmind 
   1113  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
   1114      1.1   rmind 	if ((vp->v_iflag & VI_CLEAN) != 0) {
   1115  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
   1116      1.1   rmind 		return;
   1117      1.1   rmind 	} else if (vp->v_type != VBLK && vp->v_type != VCHR) {
   1118      1.1   rmind 		atomic_inc_uint(&vp->v_usecount);
   1119      1.1   rmind 		vclean(vp, DOCLOSE);
   1120      1.1   rmind 		vrelel(vp, 0);
   1121      1.1   rmind 		return;
   1122      1.1   rmind 	} else {
   1123      1.1   rmind 		dev = vp->v_rdev;
   1124      1.1   rmind 		type = vp->v_type;
   1125  1.8.2.1  cherry 		mutex_exit(vp->v_interlock);
   1126      1.1   rmind 	}
   1127      1.1   rmind 
   1128      1.1   rmind 	vpp = &specfs_hash[SPECHASH(dev)];
   1129      1.1   rmind 	mutex_enter(&device_lock);
   1130      1.1   rmind 	for (vq = *vpp; vq != NULL;) {
   1131      1.1   rmind 		/* If clean or being cleaned, then ignore it. */
   1132  1.8.2.1  cherry 		mutex_enter(vq->v_interlock);
   1133      1.1   rmind 		if ((vq->v_iflag & (VI_CLEAN | VI_XLOCK)) != 0 ||
   1134      1.1   rmind 		    vq->v_rdev != dev || vq->v_type != type) {
   1135  1.8.2.1  cherry 			mutex_exit(vq->v_interlock);
   1136      1.1   rmind 			vq = vq->v_specnext;
   1137      1.1   rmind 			continue;
   1138      1.1   rmind 		}
   1139      1.1   rmind 		mutex_exit(&device_lock);
   1140      1.1   rmind 		if (vq->v_usecount == 0) {
   1141      1.1   rmind 			vremfree(vq);
   1142      1.1   rmind 			vq->v_usecount = 1;
   1143      1.1   rmind 		} else {
   1144      1.1   rmind 			atomic_inc_uint(&vq->v_usecount);
   1145      1.1   rmind 		}
   1146      1.1   rmind 		vclean(vq, DOCLOSE);
   1147      1.1   rmind 		vrelel(vq, 0);
   1148      1.1   rmind 		mutex_enter(&device_lock);
   1149      1.1   rmind 		vq = *vpp;
   1150      1.1   rmind 	}
   1151      1.1   rmind 	mutex_exit(&device_lock);
   1152      1.1   rmind }
   1153      1.1   rmind 
   1154      1.1   rmind /*
   1155      1.1   rmind  * Eliminate all activity associated with a vnode in preparation for
   1156      1.1   rmind  * reuse.  Drops a reference from the vnode.
   1157      1.1   rmind  */
   1158      1.1   rmind void
   1159      1.1   rmind vgone(vnode_t *vp)
   1160      1.1   rmind {
   1161      1.1   rmind 
   1162  1.8.2.1  cherry 	mutex_enter(vp->v_interlock);
   1163      1.1   rmind 	vclean(vp, DOCLOSE);
   1164      1.1   rmind 	vrelel(vp, 0);
   1165      1.1   rmind }
   1166      1.1   rmind 
   1167      1.1   rmind /*
   1168      1.1   rmind  * Update outstanding I/O count and do wakeup if requested.
   1169      1.1   rmind  */
   1170      1.1   rmind void
   1171      1.1   rmind vwakeup(struct buf *bp)
   1172      1.1   rmind {
   1173      1.1   rmind 	vnode_t *vp;
   1174      1.1   rmind 
   1175      1.1   rmind 	if ((vp = bp->b_vp) == NULL)
   1176      1.1   rmind 		return;
   1177      1.1   rmind 
   1178  1.8.2.1  cherry 	KASSERT(bp->b_objlock == vp->v_interlock);
   1179      1.1   rmind 	KASSERT(mutex_owned(bp->b_objlock));
   1180      1.1   rmind 
   1181      1.1   rmind 	if (--vp->v_numoutput < 0)
   1182      1.1   rmind 		panic("vwakeup: neg numoutput, vp %p", vp);
   1183      1.1   rmind 	if (vp->v_numoutput == 0)
   1184      1.1   rmind 		cv_broadcast(&vp->v_cv);
   1185      1.1   rmind }
   1186      1.1   rmind 
   1187      1.1   rmind /*
   1188      1.1   rmind  * Wait for a vnode (typically with VI_XLOCK set) to be cleaned or
   1189      1.1   rmind  * recycled.
   1190      1.1   rmind  */
   1191      1.1   rmind void
   1192      1.1   rmind vwait(vnode_t *vp, int flags)
   1193      1.1   rmind {
   1194      1.1   rmind 
   1195  1.8.2.1  cherry 	KASSERT(mutex_owned(vp->v_interlock));
   1196      1.1   rmind 	KASSERT(vp->v_usecount != 0);
   1197      1.1   rmind 
   1198      1.1   rmind 	while ((vp->v_iflag & flags) != 0)
   1199  1.8.2.1  cherry 		cv_wait(&vp->v_cv, vp->v_interlock);
   1200      1.1   rmind }
   1201      1.1   rmind 
   1202      1.1   rmind int
   1203      1.3   rmind vfs_drainvnodes(long target)
   1204      1.1   rmind {
   1205      1.1   rmind 
   1206      1.1   rmind 	while (numvnodes > target) {
   1207      1.1   rmind 		vnode_t *vp;
   1208      1.1   rmind 
   1209      1.1   rmind 		mutex_enter(&vnode_free_list_lock);
   1210      1.1   rmind 		vp = getcleanvnode();
   1211      1.3   rmind 		if (vp == NULL) {
   1212      1.3   rmind 			return EBUSY;
   1213      1.3   rmind 		}
   1214      1.1   rmind 		ungetnewvnode(vp);
   1215      1.1   rmind 	}
   1216      1.1   rmind 	return 0;
   1217      1.1   rmind }
   1218      1.1   rmind 
   1219      1.1   rmind void
   1220      1.1   rmind vpanic(vnode_t *vp, const char *msg)
   1221      1.1   rmind {
   1222      1.1   rmind #ifdef DIAGNOSTIC
   1223      1.1   rmind 
   1224      1.1   rmind 	vprint(NULL, vp);
   1225      1.1   rmind 	panic("%s\n", msg);
   1226      1.1   rmind #endif
   1227      1.1   rmind }
   1228