ulfs_readwrite.c revision 1.9 1 1.9 riastrad /* $NetBSD: ulfs_readwrite.c,v 1.9 2015/03/27 19:47:14 riastradh Exp $ */
2 1.1 dholland /* from NetBSD: ufs_readwrite.c,v 1.105 2013/01/22 09:39:18 dholland Exp */
3 1.1 dholland
4 1.1 dholland /*-
5 1.1 dholland * Copyright (c) 1993
6 1.1 dholland * The Regents of the University of California. All rights reserved.
7 1.1 dholland *
8 1.1 dholland * Redistribution and use in source and binary forms, with or without
9 1.1 dholland * modification, are permitted provided that the following conditions
10 1.1 dholland * are met:
11 1.1 dholland * 1. Redistributions of source code must retain the above copyright
12 1.1 dholland * notice, this list of conditions and the following disclaimer.
13 1.1 dholland * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 dholland * notice, this list of conditions and the following disclaimer in the
15 1.1 dholland * documentation and/or other materials provided with the distribution.
16 1.1 dholland * 3. Neither the name of the University nor the names of its contributors
17 1.1 dholland * may be used to endorse or promote products derived from this software
18 1.1 dholland * without specific prior written permission.
19 1.1 dholland *
20 1.1 dholland * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 1.1 dholland * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.1 dholland * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.1 dholland * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 1.1 dholland * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.1 dholland * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.1 dholland * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.1 dholland * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.1 dholland * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.1 dholland * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.1 dholland * SUCH DAMAGE.
31 1.1 dholland *
32 1.1 dholland * @(#)ufs_readwrite.c 8.11 (Berkeley) 5/8/95
33 1.1 dholland */
34 1.1 dholland
35 1.1 dholland #include <sys/cdefs.h>
36 1.9 riastrad __KERNEL_RCSID(1, "$NetBSD: ulfs_readwrite.c,v 1.9 2015/03/27 19:47:14 riastradh Exp $");
37 1.1 dholland
38 1.1 dholland #ifdef LFS_READWRITE
39 1.1 dholland #define FS struct lfs
40 1.1 dholland #define I_FS i_lfs
41 1.1 dholland #define READ lfs_read
42 1.1 dholland #define READ_S "lfs_read"
43 1.1 dholland #define WRITE lfs_write
44 1.1 dholland #define WRITE_S "lfs_write"
45 1.8 riastrad #define BUFRD lfs_bufrd
46 1.8 riastrad #define BUFWR lfs_bufwr
47 1.1 dholland #define fs_bsize lfs_bsize
48 1.1 dholland #define fs_bmask lfs_bmask
49 1.1 dholland #else
50 1.1 dholland #define FS struct fs
51 1.1 dholland #define I_FS i_fs
52 1.1 dholland #define READ ffs_read
53 1.1 dholland #define READ_S "ffs_read"
54 1.1 dholland #define WRITE ffs_write
55 1.1 dholland #define WRITE_S "ffs_write"
56 1.8 riastrad #define BUFRD ffs_bufrd
57 1.8 riastrad #define BUFWR ffs_bufwr
58 1.1 dholland #endif
59 1.1 dholland
60 1.1 dholland /*
61 1.1 dholland * Vnode op for reading.
62 1.1 dholland */
63 1.1 dholland /* ARGSUSED */
64 1.1 dholland int
65 1.1 dholland READ(void *v)
66 1.1 dholland {
67 1.1 dholland struct vop_read_args /* {
68 1.1 dholland struct vnode *a_vp;
69 1.1 dholland struct uio *a_uio;
70 1.1 dholland int a_ioflag;
71 1.1 dholland kauth_cred_t a_cred;
72 1.1 dholland } */ *ap = v;
73 1.1 dholland struct vnode *vp;
74 1.1 dholland struct inode *ip;
75 1.1 dholland struct uio *uio;
76 1.1 dholland FS *fs;
77 1.1 dholland vsize_t bytelen;
78 1.8 riastrad int error, ioflag, advice;
79 1.1 dholland
80 1.1 dholland vp = ap->a_vp;
81 1.1 dholland ip = VTOI(vp);
82 1.6 dholland fs = ip->I_FS;
83 1.1 dholland uio = ap->a_uio;
84 1.1 dholland ioflag = ap->a_ioflag;
85 1.1 dholland error = 0;
86 1.1 dholland
87 1.1 dholland #ifdef DIAGNOSTIC
88 1.1 dholland if (uio->uio_rw != UIO_READ)
89 1.1 dholland panic("%s: mode", READ_S);
90 1.1 dholland
91 1.8 riastrad if (vp->v_type != VREG && vp->v_type != VDIR)
92 1.1 dholland panic("%s: type %d", READ_S, vp->v_type);
93 1.1 dholland #endif
94 1.8 riastrad /* XXX Eliminate me by refusing directory reads from userland. */
95 1.8 riastrad if (vp->v_type == VDIR)
96 1.8 riastrad return BUFRD(vp, uio, ioflag, ap->a_cred);
97 1.8 riastrad #ifdef LFS_READWRITE
98 1.8 riastrad /* XXX Eliminate me by using ufs_bufio in lfs. */
99 1.8 riastrad if (vp->v_type == VREG && ip->i_number == LFS_IFILE_INUM)
100 1.8 riastrad return BUFRD(vp, uio, ioflag, ap->a_cred);
101 1.8 riastrad #endif
102 1.6 dholland if ((u_int64_t)uio->uio_offset > fs->um_maxfilesize)
103 1.1 dholland return (EFBIG);
104 1.1 dholland if (uio->uio_resid == 0)
105 1.1 dholland return (0);
106 1.1 dholland
107 1.1 dholland #ifndef LFS_READWRITE
108 1.1 dholland if ((ip->i_flags & (SF_SNAPSHOT | SF_SNAPINVAL)) == SF_SNAPSHOT)
109 1.1 dholland return ffs_snapshot_read(vp, uio, ioflag);
110 1.1 dholland #endif /* !LFS_READWRITE */
111 1.1 dholland
112 1.1 dholland fstrans_start(vp->v_mount, FSTRANS_SHARED);
113 1.1 dholland
114 1.1 dholland if (uio->uio_offset >= ip->i_size)
115 1.1 dholland goto out;
116 1.1 dholland
117 1.8 riastrad KASSERT(vp->v_type == VREG);
118 1.8 riastrad advice = IO_ADV_DECODE(ap->a_ioflag);
119 1.8 riastrad while (uio->uio_resid > 0) {
120 1.8 riastrad if (ioflag & IO_DIRECT) {
121 1.8 riastrad genfs_directio(vp, uio, ioflag);
122 1.8 riastrad }
123 1.8 riastrad bytelen = MIN(ip->i_size - uio->uio_offset, uio->uio_resid);
124 1.8 riastrad if (bytelen == 0)
125 1.8 riastrad break;
126 1.8 riastrad error = ubc_uiomove(&vp->v_uobj, uio, bytelen, advice,
127 1.8 riastrad UBC_READ | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp));
128 1.8 riastrad if (error)
129 1.8 riastrad break;
130 1.8 riastrad }
131 1.1 dholland
132 1.8 riastrad out:
133 1.8 riastrad if (!(vp->v_mount->mnt_flag & MNT_NOATIME)) {
134 1.8 riastrad ip->i_flag |= IN_ACCESS;
135 1.8 riastrad if ((ap->a_ioflag & IO_SYNC) == IO_SYNC) {
136 1.8 riastrad error = lfs_update(vp, NULL, NULL, UPDATE_WAIT);
137 1.1 dholland }
138 1.8 riastrad }
139 1.8 riastrad
140 1.8 riastrad fstrans_done(vp->v_mount);
141 1.8 riastrad return (error);
142 1.8 riastrad }
143 1.8 riastrad
144 1.8 riastrad /*
145 1.8 riastrad * UFS op for reading via the buffer cache
146 1.8 riastrad */
147 1.8 riastrad int
148 1.8 riastrad BUFRD(struct vnode *vp, struct uio *uio, int ioflag, kauth_cred_t cred)
149 1.8 riastrad {
150 1.8 riastrad struct inode *ip;
151 1.8 riastrad FS *fs;
152 1.8 riastrad struct buf *bp;
153 1.8 riastrad daddr_t lbn, nextlbn;
154 1.8 riastrad off_t bytesinfile;
155 1.8 riastrad long size, xfersize, blkoffset;
156 1.8 riastrad int error;
157 1.8 riastrad
158 1.8 riastrad KASSERT(VOP_ISLOCKED(vp));
159 1.8 riastrad KASSERT(vp->v_type == VDIR || vp->v_type == VLNK ||
160 1.8 riastrad vp->v_type == VREG);
161 1.8 riastrad KASSERT(uio->uio_rw == UIO_READ);
162 1.8 riastrad
163 1.8 riastrad ip = VTOI(vp);
164 1.8 riastrad fs = ip->I_FS;
165 1.8 riastrad error = 0;
166 1.8 riastrad
167 1.8 riastrad KASSERT(vp->v_type != VLNK || ip->i_size < fs->um_maxsymlinklen);
168 1.8 riastrad KASSERT(vp->v_type != VLNK || fs->um_maxsymlinklen != 0 ||
169 1.8 riastrad DIP(ip, blocks) == 0);
170 1.8 riastrad KASSERT(vp->v_type != VREG || vp == fs->lfs_ivnode);
171 1.8 riastrad KASSERT(vp->v_type != VREG || ip->i_number == LFS_IFILE_INUM);
172 1.8 riastrad
173 1.8 riastrad if (uio->uio_offset > fs->um_maxfilesize)
174 1.8 riastrad return EFBIG;
175 1.8 riastrad if (uio->uio_resid == 0)
176 1.8 riastrad return 0;
177 1.8 riastrad
178 1.8 riastrad #ifndef LFS_READWRITE
179 1.8 riastrad KASSERT(!ISSET(ip->i_flags, (SF_SNAPSHOT | SF_SNAPINVAL)));
180 1.8 riastrad #endif
181 1.8 riastrad
182 1.8 riastrad fstrans_start(vp->v_mount, FSTRANS_SHARED);
183 1.8 riastrad
184 1.8 riastrad if (uio->uio_offset >= ip->i_size)
185 1.1 dholland goto out;
186 1.1 dholland
187 1.1 dholland for (error = 0, bp = NULL; uio->uio_resid > 0; bp = NULL) {
188 1.1 dholland bytesinfile = ip->i_size - uio->uio_offset;
189 1.1 dholland if (bytesinfile <= 0)
190 1.1 dholland break;
191 1.4 christos lbn = lfs_lblkno(fs, uio->uio_offset);
192 1.1 dholland nextlbn = lbn + 1;
193 1.4 christos size = lfs_blksize(fs, ip, lbn);
194 1.4 christos blkoffset = lfs_blkoff(fs, uio->uio_offset);
195 1.1 dholland xfersize = MIN(MIN(fs->fs_bsize - blkoffset, uio->uio_resid),
196 1.1 dholland bytesinfile);
197 1.1 dholland
198 1.4 christos if (lfs_lblktosize(fs, nextlbn) >= ip->i_size)
199 1.1 dholland error = bread(vp, lbn, size, NOCRED, 0, &bp);
200 1.1 dholland else {
201 1.4 christos int nextsize = lfs_blksize(fs, ip, nextlbn);
202 1.1 dholland error = breadn(vp, lbn,
203 1.1 dholland size, &nextlbn, &nextsize, 1, NOCRED, 0, &bp);
204 1.1 dholland }
205 1.1 dholland if (error)
206 1.1 dholland break;
207 1.1 dholland
208 1.1 dholland /*
209 1.1 dholland * We should only get non-zero b_resid when an I/O error
210 1.1 dholland * has occurred, which should cause us to break above.
211 1.1 dholland * However, if the short read did not cause an error,
212 1.1 dholland * then we want to ensure that we do not uiomove bad
213 1.1 dholland * or uninitialized data.
214 1.1 dholland */
215 1.1 dholland size -= bp->b_resid;
216 1.1 dholland if (size < xfersize) {
217 1.1 dholland if (size == 0)
218 1.1 dholland break;
219 1.1 dholland xfersize = size;
220 1.1 dholland }
221 1.1 dholland error = uiomove((char *)bp->b_data + blkoffset, xfersize, uio);
222 1.1 dholland if (error)
223 1.1 dholland break;
224 1.1 dholland brelse(bp, 0);
225 1.1 dholland }
226 1.1 dholland if (bp != NULL)
227 1.1 dholland brelse(bp, 0);
228 1.1 dholland
229 1.1 dholland out:
230 1.1 dholland if (!(vp->v_mount->mnt_flag & MNT_NOATIME)) {
231 1.1 dholland ip->i_flag |= IN_ACCESS;
232 1.8 riastrad if ((ioflag & IO_SYNC) == IO_SYNC) {
233 1.5 dholland error = lfs_update(vp, NULL, NULL, UPDATE_WAIT);
234 1.1 dholland }
235 1.1 dholland }
236 1.1 dholland
237 1.1 dholland fstrans_done(vp->v_mount);
238 1.1 dholland return (error);
239 1.1 dholland }
240 1.1 dholland
241 1.1 dholland /*
242 1.1 dholland * Vnode op for writing.
243 1.1 dholland */
244 1.1 dholland int
245 1.1 dholland WRITE(void *v)
246 1.1 dholland {
247 1.1 dholland struct vop_write_args /* {
248 1.1 dholland struct vnode *a_vp;
249 1.1 dholland struct uio *a_uio;
250 1.1 dholland int a_ioflag;
251 1.1 dholland kauth_cred_t a_cred;
252 1.1 dholland } */ *ap = v;
253 1.1 dholland struct vnode *vp;
254 1.1 dholland struct uio *uio;
255 1.1 dholland struct inode *ip;
256 1.1 dholland FS *fs;
257 1.1 dholland kauth_cred_t cred;
258 1.1 dholland off_t osize, origoff, oldoff, preallocoff, endallocoff, nsize;
259 1.8 riastrad int blkoffset, error, flags, ioflag, resid;
260 1.1 dholland int aflag;
261 1.1 dholland int extended=0;
262 1.1 dholland vsize_t bytelen;
263 1.1 dholland bool async;
264 1.1 dholland
265 1.1 dholland cred = ap->a_cred;
266 1.1 dholland ioflag = ap->a_ioflag;
267 1.1 dholland uio = ap->a_uio;
268 1.1 dholland vp = ap->a_vp;
269 1.1 dholland ip = VTOI(vp);
270 1.1 dholland
271 1.1 dholland KASSERT(vp->v_size == ip->i_size);
272 1.1 dholland #ifdef DIAGNOSTIC
273 1.1 dholland if (uio->uio_rw != UIO_WRITE)
274 1.1 dholland panic("%s: mode", WRITE_S);
275 1.1 dholland #endif
276 1.1 dholland
277 1.1 dholland switch (vp->v_type) {
278 1.1 dholland case VREG:
279 1.1 dholland if (ioflag & IO_APPEND)
280 1.1 dholland uio->uio_offset = ip->i_size;
281 1.1 dholland if ((ip->i_flags & APPEND) && uio->uio_offset != ip->i_size)
282 1.1 dholland return (EPERM);
283 1.1 dholland break;
284 1.1 dholland default:
285 1.1 dholland panic("%s: type", WRITE_S);
286 1.1 dholland }
287 1.1 dholland
288 1.1 dholland fs = ip->I_FS;
289 1.1 dholland if (uio->uio_offset < 0 ||
290 1.6 dholland (u_int64_t)uio->uio_offset + uio->uio_resid > fs->um_maxfilesize)
291 1.1 dholland return (EFBIG);
292 1.1 dholland #ifdef LFS_READWRITE
293 1.1 dholland /* Disallow writes to the Ifile, even if noschg flag is removed */
294 1.1 dholland /* XXX can this go away when the Ifile is no longer in the namespace? */
295 1.1 dholland if (vp == fs->lfs_ivnode)
296 1.1 dholland return (EPERM);
297 1.1 dholland #endif
298 1.1 dholland if (uio->uio_resid == 0)
299 1.1 dholland return (0);
300 1.1 dholland
301 1.1 dholland fstrans_start(vp->v_mount, FSTRANS_SHARED);
302 1.1 dholland
303 1.1 dholland flags = ioflag & IO_SYNC ? B_SYNC : 0;
304 1.1 dholland async = vp->v_mount->mnt_flag & MNT_ASYNC;
305 1.1 dholland origoff = uio->uio_offset;
306 1.1 dholland resid = uio->uio_resid;
307 1.1 dholland osize = ip->i_size;
308 1.1 dholland error = 0;
309 1.1 dholland
310 1.8 riastrad KASSERT(vp->v_type == VREG);
311 1.1 dholland
312 1.1 dholland #ifdef LFS_READWRITE
313 1.1 dholland async = true;
314 1.4 christos lfs_availwait(fs, lfs_btofsb(fs, uio->uio_resid));
315 1.1 dholland lfs_check(vp, LFS_UNUSED_LBN, 0);
316 1.1 dholland #endif /* !LFS_READWRITE */
317 1.1 dholland
318 1.4 christos preallocoff = round_page(lfs_blkroundup(fs, MAX(osize, uio->uio_offset)));
319 1.1 dholland aflag = ioflag & IO_SYNC ? B_SYNC : 0;
320 1.1 dholland nsize = MAX(osize, uio->uio_offset + uio->uio_resid);
321 1.4 christos endallocoff = nsize - lfs_blkoff(fs, nsize);
322 1.1 dholland
323 1.1 dholland /*
324 1.1 dholland * if we're increasing the file size, deal with expanding
325 1.1 dholland * the fragment if there is one.
326 1.1 dholland */
327 1.1 dholland
328 1.4 christos if (nsize > osize && lfs_lblkno(fs, osize) < ULFS_NDADDR &&
329 1.4 christos lfs_lblkno(fs, osize) != lfs_lblkno(fs, nsize) &&
330 1.4 christos lfs_blkroundup(fs, osize) != osize) {
331 1.1 dholland off_t eob;
332 1.1 dholland
333 1.4 christos eob = lfs_blkroundup(fs, osize);
334 1.1 dholland uvm_vnp_setwritesize(vp, eob);
335 1.2 dholland error = ulfs_balloc_range(vp, osize, eob - osize, cred, aflag);
336 1.1 dholland if (error)
337 1.1 dholland goto out;
338 1.1 dholland if (flags & B_SYNC) {
339 1.1 dholland mutex_enter(vp->v_interlock);
340 1.1 dholland VOP_PUTPAGES(vp, trunc_page(osize & fs->fs_bmask),
341 1.1 dholland round_page(eob),
342 1.1 dholland PGO_CLEANIT | PGO_SYNCIO | PGO_JOURNALLOCKED);
343 1.1 dholland }
344 1.1 dholland }
345 1.1 dholland
346 1.1 dholland while (uio->uio_resid > 0) {
347 1.1 dholland int ubc_flags = UBC_WRITE;
348 1.1 dholland bool overwrite; /* if we're overwrite a whole block */
349 1.1 dholland off_t newoff;
350 1.1 dholland
351 1.1 dholland if (ioflag & IO_DIRECT) {
352 1.1 dholland genfs_directio(vp, uio, ioflag | IO_JOURNALLOCKED);
353 1.1 dholland }
354 1.1 dholland
355 1.1 dholland oldoff = uio->uio_offset;
356 1.4 christos blkoffset = lfs_blkoff(fs, uio->uio_offset);
357 1.1 dholland bytelen = MIN(fs->fs_bsize - blkoffset, uio->uio_resid);
358 1.1 dholland if (bytelen == 0) {
359 1.1 dholland break;
360 1.1 dholland }
361 1.1 dholland
362 1.1 dholland /*
363 1.1 dholland * if we're filling in a hole, allocate the blocks now and
364 1.1 dholland * initialize the pages first. if we're extending the file,
365 1.1 dholland * we can safely allocate blocks without initializing pages
366 1.1 dholland * since the new blocks will be inaccessible until the write
367 1.1 dholland * is complete.
368 1.1 dholland */
369 1.1 dholland overwrite = uio->uio_offset >= preallocoff &&
370 1.1 dholland uio->uio_offset < endallocoff;
371 1.1 dholland if (!overwrite && (vp->v_vflag & VV_MAPPED) == 0 &&
372 1.4 christos lfs_blkoff(fs, uio->uio_offset) == 0 &&
373 1.1 dholland (uio->uio_offset & PAGE_MASK) == 0) {
374 1.1 dholland vsize_t len;
375 1.1 dholland
376 1.1 dholland len = trunc_page(bytelen);
377 1.4 christos len -= lfs_blkoff(fs, len);
378 1.1 dholland if (len > 0) {
379 1.1 dholland overwrite = true;
380 1.1 dholland bytelen = len;
381 1.1 dholland }
382 1.1 dholland }
383 1.1 dholland
384 1.1 dholland newoff = oldoff + bytelen;
385 1.1 dholland if (vp->v_size < newoff) {
386 1.1 dholland uvm_vnp_setwritesize(vp, newoff);
387 1.1 dholland }
388 1.1 dholland
389 1.1 dholland if (!overwrite) {
390 1.2 dholland error = ulfs_balloc_range(vp, uio->uio_offset, bytelen,
391 1.1 dholland cred, aflag);
392 1.1 dholland if (error)
393 1.1 dholland break;
394 1.1 dholland } else {
395 1.1 dholland genfs_node_wrlock(vp);
396 1.1 dholland error = GOP_ALLOC(vp, uio->uio_offset, bytelen,
397 1.1 dholland aflag, cred);
398 1.1 dholland genfs_node_unlock(vp);
399 1.1 dholland if (error)
400 1.1 dholland break;
401 1.1 dholland ubc_flags |= UBC_FAULTBUSY;
402 1.1 dholland }
403 1.1 dholland
404 1.1 dholland /*
405 1.1 dholland * copy the data.
406 1.1 dholland */
407 1.1 dholland
408 1.1 dholland error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
409 1.1 dholland IO_ADV_DECODE(ioflag), ubc_flags | UBC_UNMAP_FLAG(vp));
410 1.1 dholland
411 1.1 dholland /*
412 1.1 dholland * update UVM's notion of the size now that we've
413 1.1 dholland * copied the data into the vnode's pages.
414 1.1 dholland *
415 1.1 dholland * we should update the size even when uiomove failed.
416 1.1 dholland */
417 1.1 dholland
418 1.1 dholland if (vp->v_size < newoff) {
419 1.1 dholland uvm_vnp_setsize(vp, newoff);
420 1.1 dholland extended = 1;
421 1.1 dholland }
422 1.1 dholland
423 1.1 dholland if (error)
424 1.1 dholland break;
425 1.1 dholland
426 1.1 dholland /*
427 1.1 dholland * flush what we just wrote if necessary.
428 1.1 dholland * XXXUBC simplistic async flushing.
429 1.1 dholland */
430 1.1 dholland
431 1.1 dholland #ifndef LFS_READWRITE
432 1.1 dholland if (!async && oldoff >> 16 != uio->uio_offset >> 16) {
433 1.1 dholland mutex_enter(vp->v_interlock);
434 1.1 dholland error = VOP_PUTPAGES(vp, (oldoff >> 16) << 16,
435 1.1 dholland (uio->uio_offset >> 16) << 16,
436 1.1 dholland PGO_CLEANIT | PGO_JOURNALLOCKED | PGO_LAZY);
437 1.1 dholland if (error)
438 1.1 dholland break;
439 1.1 dholland }
440 1.7 christos #else
441 1.7 christos __USE(async);
442 1.1 dholland #endif
443 1.1 dholland }
444 1.1 dholland if (error == 0 && ioflag & IO_SYNC) {
445 1.1 dholland mutex_enter(vp->v_interlock);
446 1.1 dholland error = VOP_PUTPAGES(vp, trunc_page(origoff & fs->fs_bmask),
447 1.4 christos round_page(lfs_blkroundup(fs, uio->uio_offset)),
448 1.1 dholland PGO_CLEANIT | PGO_SYNCIO | PGO_JOURNALLOCKED);
449 1.1 dholland }
450 1.1 dholland
451 1.8 riastrad /*
452 1.8 riastrad * If we successfully wrote any data, and we are not the superuser
453 1.8 riastrad * we clear the setuid and setgid bits as a precaution against
454 1.8 riastrad * tampering.
455 1.8 riastrad */
456 1.8 riastrad out:
457 1.8 riastrad ip->i_flag |= IN_CHANGE | IN_UPDATE;
458 1.8 riastrad if (vp->v_mount->mnt_flag & MNT_RELATIME)
459 1.8 riastrad ip->i_flag |= IN_ACCESS;
460 1.8 riastrad if (resid > uio->uio_resid && ap->a_cred) {
461 1.8 riastrad if (ip->i_mode & ISUID) {
462 1.8 riastrad if (kauth_authorize_vnode(ap->a_cred,
463 1.8 riastrad KAUTH_VNODE_RETAIN_SUID, vp, NULL, EPERM) != 0) {
464 1.8 riastrad ip->i_mode &= ~ISUID;
465 1.8 riastrad DIP_ASSIGN(ip, mode, ip->i_mode);
466 1.8 riastrad }
467 1.8 riastrad }
468 1.8 riastrad
469 1.8 riastrad if (ip->i_mode & ISGID) {
470 1.8 riastrad if (kauth_authorize_vnode(ap->a_cred,
471 1.8 riastrad KAUTH_VNODE_RETAIN_SGID, vp, NULL, EPERM) != 0) {
472 1.8 riastrad ip->i_mode &= ~ISGID;
473 1.8 riastrad DIP_ASSIGN(ip, mode, ip->i_mode);
474 1.8 riastrad }
475 1.8 riastrad }
476 1.8 riastrad }
477 1.8 riastrad if (resid > uio->uio_resid)
478 1.8 riastrad VN_KNOTE(vp, NOTE_WRITE | (extended ? NOTE_EXTEND : 0));
479 1.8 riastrad if (error) {
480 1.8 riastrad (void) lfs_truncate(vp, osize, ioflag & IO_SYNC, ap->a_cred);
481 1.8 riastrad uio->uio_offset -= resid - uio->uio_resid;
482 1.8 riastrad uio->uio_resid = resid;
483 1.8 riastrad } else if (resid > uio->uio_resid && (ioflag & IO_SYNC) == IO_SYNC) {
484 1.8 riastrad error = lfs_update(vp, NULL, NULL, UPDATE_WAIT);
485 1.8 riastrad } else {
486 1.8 riastrad /* nothing */
487 1.8 riastrad }
488 1.8 riastrad KASSERT(vp->v_size == ip->i_size);
489 1.8 riastrad fstrans_done(vp->v_mount);
490 1.8 riastrad
491 1.8 riastrad return (error);
492 1.8 riastrad }
493 1.8 riastrad
494 1.8 riastrad /*
495 1.8 riastrad * UFS op for writing via the buffer cache
496 1.8 riastrad */
497 1.8 riastrad int
498 1.8 riastrad BUFWR(struct vnode *vp, struct uio *uio, int ioflag, kauth_cred_t cred)
499 1.8 riastrad {
500 1.8 riastrad struct inode *ip;
501 1.8 riastrad FS *fs;
502 1.8 riastrad int flags;
503 1.8 riastrad struct buf *bp;
504 1.8 riastrad off_t osize, origoff;
505 1.8 riastrad int resid, xfersize, size, blkoffset;
506 1.8 riastrad daddr_t lbn;
507 1.8 riastrad int extended=0;
508 1.8 riastrad int error;
509 1.8 riastrad #ifdef LFS_READWRITE
510 1.8 riastrad bool need_unreserve = false;
511 1.8 riastrad #endif
512 1.8 riastrad
513 1.9 riastrad KASSERT(ISSET(ioflag, IO_NODELOCKED));
514 1.8 riastrad KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
515 1.8 riastrad KASSERT(vp->v_type == VDIR || vp->v_type == VLNK);
516 1.8 riastrad KASSERT(vp->v_type != VDIR || ISSET(ioflag, IO_SYNC));
517 1.8 riastrad KASSERT(uio->uio_rw == UIO_WRITE);
518 1.8 riastrad
519 1.8 riastrad ip = VTOI(vp);
520 1.8 riastrad fs = ip->I_FS;
521 1.8 riastrad
522 1.8 riastrad KASSERT(vp->v_size == ip->i_size);
523 1.8 riastrad
524 1.8 riastrad if (uio->uio_offset < 0 ||
525 1.8 riastrad uio->uio_resid > fs->um_maxfilesize ||
526 1.8 riastrad uio->uio_offset > (fs->um_maxfilesize - uio->uio_resid))
527 1.8 riastrad return EFBIG;
528 1.8 riastrad #ifdef LFS_READWRITE
529 1.8 riastrad KASSERT(vp != fs->lfs_ivnode);
530 1.8 riastrad #endif
531 1.8 riastrad if (uio->uio_resid == 0)
532 1.8 riastrad return 0;
533 1.8 riastrad
534 1.8 riastrad fstrans_start(vp->v_mount, FSTRANS_SHARED);
535 1.8 riastrad
536 1.8 riastrad flags = ioflag & IO_SYNC ? B_SYNC : 0;
537 1.8 riastrad origoff = uio->uio_offset;
538 1.8 riastrad resid = uio->uio_resid;
539 1.8 riastrad osize = ip->i_size;
540 1.8 riastrad error = 0;
541 1.8 riastrad
542 1.8 riastrad KASSERT(vp->v_type != VREG);
543 1.8 riastrad
544 1.8 riastrad #ifdef LFS_READWRITE
545 1.8 riastrad lfs_availwait(fs, lfs_btofsb(fs, uio->uio_resid));
546 1.8 riastrad lfs_check(vp, LFS_UNUSED_LBN, 0);
547 1.8 riastrad #endif /* !LFS_READWRITE */
548 1.8 riastrad
549 1.8 riastrad /* XXX Should never have cached pages here. */
550 1.1 dholland mutex_enter(vp->v_interlock);
551 1.1 dholland VOP_PUTPAGES(vp, trunc_page(origoff), round_page(origoff + resid),
552 1.1 dholland PGO_CLEANIT | PGO_FREE | PGO_SYNCIO | PGO_JOURNALLOCKED);
553 1.1 dholland while (uio->uio_resid > 0) {
554 1.4 christos lbn = lfs_lblkno(fs, uio->uio_offset);
555 1.4 christos blkoffset = lfs_blkoff(fs, uio->uio_offset);
556 1.1 dholland xfersize = MIN(fs->fs_bsize - blkoffset, uio->uio_resid);
557 1.1 dholland if (fs->fs_bsize > xfersize)
558 1.1 dholland flags |= B_CLRBUF;
559 1.1 dholland else
560 1.1 dholland flags &= ~B_CLRBUF;
561 1.1 dholland
562 1.1 dholland #ifdef LFS_READWRITE
563 1.1 dholland error = lfs_reserve(fs, vp, NULL,
564 1.4 christos lfs_btofsb(fs, (ULFS_NIADDR + 1) << fs->lfs_bshift));
565 1.1 dholland if (error)
566 1.1 dholland break;
567 1.1 dholland need_unreserve = true;
568 1.1 dholland #endif
569 1.8 riastrad error = lfs_balloc(vp, uio->uio_offset, xfersize, cred, flags,
570 1.8 riastrad &bp);
571 1.1 dholland
572 1.1 dholland if (error)
573 1.1 dholland break;
574 1.1 dholland if (uio->uio_offset + xfersize > ip->i_size) {
575 1.1 dholland ip->i_size = uio->uio_offset + xfersize;
576 1.1 dholland DIP_ASSIGN(ip, size, ip->i_size);
577 1.1 dholland uvm_vnp_setsize(vp, ip->i_size);
578 1.1 dholland extended = 1;
579 1.1 dholland }
580 1.4 christos size = lfs_blksize(fs, ip, lbn) - bp->b_resid;
581 1.1 dholland if (xfersize > size)
582 1.1 dholland xfersize = size;
583 1.1 dholland
584 1.1 dholland error = uiomove((char *)bp->b_data + blkoffset, xfersize, uio);
585 1.1 dholland
586 1.1 dholland /*
587 1.1 dholland * if we didn't clear the block and the uiomove failed,
588 1.1 dholland * the buf will now contain part of some other file,
589 1.1 dholland * so we need to invalidate it.
590 1.1 dholland */
591 1.1 dholland if (error && (flags & B_CLRBUF) == 0) {
592 1.1 dholland brelse(bp, BC_INVAL);
593 1.1 dholland break;
594 1.1 dholland }
595 1.1 dholland #ifdef LFS_READWRITE
596 1.1 dholland (void)VOP_BWRITE(bp->b_vp, bp);
597 1.1 dholland lfs_reserve(fs, vp, NULL,
598 1.4 christos -lfs_btofsb(fs, (ULFS_NIADDR + 1) << fs->lfs_bshift));
599 1.1 dholland need_unreserve = false;
600 1.1 dholland #else
601 1.1 dholland if (ioflag & IO_SYNC)
602 1.1 dholland (void)bwrite(bp);
603 1.1 dholland else if (xfersize + blkoffset == fs->fs_bsize)
604 1.1 dholland bawrite(bp);
605 1.1 dholland else
606 1.1 dholland bdwrite(bp);
607 1.1 dholland #endif
608 1.1 dholland if (error || xfersize == 0)
609 1.1 dholland break;
610 1.1 dholland }
611 1.1 dholland #ifdef LFS_READWRITE
612 1.1 dholland if (need_unreserve) {
613 1.1 dholland lfs_reserve(fs, vp, NULL,
614 1.4 christos -lfs_btofsb(fs, (ULFS_NIADDR + 1) << fs->lfs_bshift));
615 1.1 dholland }
616 1.1 dholland #endif
617 1.1 dholland
618 1.1 dholland /*
619 1.1 dholland * If we successfully wrote any data, and we are not the superuser
620 1.1 dholland * we clear the setuid and setgid bits as a precaution against
621 1.1 dholland * tampering.
622 1.1 dholland */
623 1.1 dholland ip->i_flag |= IN_CHANGE | IN_UPDATE;
624 1.1 dholland if (vp->v_mount->mnt_flag & MNT_RELATIME)
625 1.1 dholland ip->i_flag |= IN_ACCESS;
626 1.8 riastrad if (resid > uio->uio_resid && cred) {
627 1.1 dholland if (ip->i_mode & ISUID) {
628 1.8 riastrad if (kauth_authorize_vnode(cred,
629 1.1 dholland KAUTH_VNODE_RETAIN_SUID, vp, NULL, EPERM) != 0) {
630 1.1 dholland ip->i_mode &= ~ISUID;
631 1.1 dholland DIP_ASSIGN(ip, mode, ip->i_mode);
632 1.1 dholland }
633 1.1 dholland }
634 1.1 dholland
635 1.1 dholland if (ip->i_mode & ISGID) {
636 1.8 riastrad if (kauth_authorize_vnode(cred,
637 1.1 dholland KAUTH_VNODE_RETAIN_SGID, vp, NULL, EPERM) != 0) {
638 1.1 dholland ip->i_mode &= ~ISGID;
639 1.1 dholland DIP_ASSIGN(ip, mode, ip->i_mode);
640 1.1 dholland }
641 1.1 dholland }
642 1.1 dholland }
643 1.1 dholland if (resid > uio->uio_resid)
644 1.1 dholland VN_KNOTE(vp, NOTE_WRITE | (extended ? NOTE_EXTEND : 0));
645 1.1 dholland if (error) {
646 1.8 riastrad (void) lfs_truncate(vp, osize, ioflag & IO_SYNC, cred);
647 1.1 dholland uio->uio_offset -= resid - uio->uio_resid;
648 1.1 dholland uio->uio_resid = resid;
649 1.3 dholland } else if (resid > uio->uio_resid && (ioflag & IO_SYNC) == IO_SYNC) {
650 1.5 dholland error = lfs_update(vp, NULL, NULL, UPDATE_WAIT);
651 1.3 dholland } else {
652 1.3 dholland /* nothing */
653 1.3 dholland }
654 1.1 dholland KASSERT(vp->v_size == ip->i_size);
655 1.1 dholland fstrans_done(vp->v_mount);
656 1.1 dholland
657 1.1 dholland return (error);
658 1.1 dholland }
659