51369649b0
Mainly focus on files that use BSD 3-Clause license. The Software Package Data Exchange (SPDX) group provides a specification to make it easier for automated tools to detect and summarize well known opensource licenses. We are gradually adopting the specification, noting that the tags are considered only advisory and do not, in any way, superceed or replace the license texts. Special thanks to Wind River for providing access to "The Duke of Highlander" tool: an older (2014) run over FreeBSD tree was useful as a starting point.
2563 lines
57 KiB
C
2563 lines
57 KiB
C
/*-
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*
|
|
* Copyright (c) 1992, 1993, 1994, 1995 Jan-Simon Pendry.
|
|
* Copyright (c) 1992, 1993, 1994, 1995
|
|
* The Regents of the University of California.
|
|
* Copyright (c) 2005, 2006, 2012 Masanori Ozawa <ozawa@ongs.co.jp>, ONGS Inc.
|
|
* Copyright (c) 2006, 2012 Daichi Goto <daichi@freebsd.org>
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to Berkeley by
|
|
* Jan-Simon Pendry.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* @(#)union_vnops.c 8.32 (Berkeley) 6/23/95
|
|
* $FreeBSD$
|
|
*
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/conf.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/lock.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/mutex.h>
|
|
#include <sys/namei.h>
|
|
#include <sys/sysctl.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/kdb.h>
|
|
#include <sys/fcntl.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/dirent.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/bio.h>
|
|
#include <sys/buf.h>
|
|
|
|
#include <fs/unionfs/union.h>
|
|
|
|
#include <vm/vm.h>
|
|
#include <vm/vm_extern.h>
|
|
#include <vm/vm_object.h>
|
|
#include <vm/vnode_pager.h>
|
|
|
|
#if 0
|
|
#define UNIONFS_INTERNAL_DEBUG(msg, args...) printf(msg, ## args)
|
|
#define UNIONFS_IDBG_RENAME
|
|
#else
|
|
#define UNIONFS_INTERNAL_DEBUG(msg, args...)
|
|
#endif
|
|
|
|
#define KASSERT_UNIONFS_VNODE(vp) \
|
|
KASSERT(((vp)->v_op == &unionfs_vnodeops), \
|
|
("unionfs: it is not unionfs-vnode"))
|
|
|
|
static int
|
|
unionfs_lookup(struct vop_cachedlookup_args *ap)
|
|
{
|
|
int iswhiteout;
|
|
int lockflag;
|
|
int error , uerror, lerror;
|
|
u_long nameiop;
|
|
u_long cnflags, cnflagsbk;
|
|
struct unionfs_node *dunp;
|
|
struct vnode *dvp, *udvp, *ldvp, *vp, *uvp, *lvp, *dtmpvp;
|
|
struct vattr va;
|
|
struct componentname *cnp;
|
|
struct thread *td;
|
|
|
|
iswhiteout = 0;
|
|
lockflag = 0;
|
|
error = uerror = lerror = ENOENT;
|
|
cnp = ap->a_cnp;
|
|
nameiop = cnp->cn_nameiop;
|
|
cnflags = cnp->cn_flags;
|
|
dvp = ap->a_dvp;
|
|
dunp = VTOUNIONFS(dvp);
|
|
udvp = dunp->un_uppervp;
|
|
ldvp = dunp->un_lowervp;
|
|
vp = uvp = lvp = NULLVP;
|
|
td = curthread;
|
|
*(ap->a_vpp) = NULLVP;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: enter: nameiop=%ld, flags=%lx, path=%s\n", nameiop, cnflags, cnp->cn_nameptr);
|
|
|
|
if (dvp->v_type != VDIR)
|
|
return (ENOTDIR);
|
|
|
|
/*
|
|
* If read-only and op is not LOOKUP, will return EROFS.
|
|
*/
|
|
if ((cnflags & ISLASTCN) &&
|
|
(dvp->v_mount->mnt_flag & MNT_RDONLY) &&
|
|
LOOKUP != nameiop)
|
|
return (EROFS);
|
|
|
|
/*
|
|
* lookup dotdot
|
|
*/
|
|
if (cnflags & ISDOTDOT) {
|
|
if (LOOKUP != nameiop && udvp == NULLVP)
|
|
return (EROFS);
|
|
|
|
if (udvp != NULLVP) {
|
|
dtmpvp = udvp;
|
|
if (ldvp != NULLVP)
|
|
VOP_UNLOCK(ldvp, LK_RELEASE);
|
|
}
|
|
else
|
|
dtmpvp = ldvp;
|
|
|
|
error = VOP_LOOKUP(dtmpvp, &vp, cnp);
|
|
|
|
if (dtmpvp == udvp && ldvp != NULLVP) {
|
|
VOP_UNLOCK(udvp, LK_RELEASE);
|
|
vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
|
|
}
|
|
|
|
if (error == 0) {
|
|
/*
|
|
* Exchange lock and reference from vp to
|
|
* dunp->un_dvp. vp is upper/lower vnode, but it
|
|
* will need to return the unionfs vnode.
|
|
*/
|
|
if (nameiop == DELETE || nameiop == RENAME ||
|
|
(cnp->cn_lkflags & LK_TYPE_MASK))
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
vrele(vp);
|
|
|
|
VOP_UNLOCK(dvp, LK_RELEASE);
|
|
*(ap->a_vpp) = dunp->un_dvp;
|
|
vref(dunp->un_dvp);
|
|
|
|
if (nameiop == DELETE || nameiop == RENAME)
|
|
vn_lock(dunp->un_dvp, LK_EXCLUSIVE | LK_RETRY);
|
|
else if (cnp->cn_lkflags & LK_TYPE_MASK)
|
|
vn_lock(dunp->un_dvp, cnp->cn_lkflags |
|
|
LK_RETRY);
|
|
|
|
vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
|
|
} else if (error == ENOENT && (cnflags & MAKEENTRY) != 0)
|
|
cache_enter(dvp, NULLVP, cnp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
/*
|
|
* lookup upper layer
|
|
*/
|
|
if (udvp != NULLVP) {
|
|
uerror = VOP_LOOKUP(udvp, &uvp, cnp);
|
|
|
|
if (uerror == 0) {
|
|
if (udvp == uvp) { /* is dot */
|
|
vrele(uvp);
|
|
*(ap->a_vpp) = dvp;
|
|
vref(dvp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: leave (%d)\n", uerror);
|
|
|
|
return (uerror);
|
|
}
|
|
if (nameiop == DELETE || nameiop == RENAME ||
|
|
(cnp->cn_lkflags & LK_TYPE_MASK))
|
|
VOP_UNLOCK(uvp, LK_RELEASE);
|
|
}
|
|
|
|
/* check whiteout */
|
|
if (uerror == ENOENT || uerror == EJUSTRETURN)
|
|
if (cnp->cn_flags & ISWHITEOUT)
|
|
iswhiteout = 1; /* don't lookup lower */
|
|
if (iswhiteout == 0 && ldvp != NULLVP)
|
|
if (!VOP_GETATTR(udvp, &va, cnp->cn_cred) &&
|
|
(va.va_flags & OPAQUE))
|
|
iswhiteout = 1; /* don't lookup lower */
|
|
#if 0
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: debug: whiteout=%d, path=%s\n", iswhiteout, cnp->cn_nameptr);
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* lookup lower layer
|
|
*/
|
|
if (ldvp != NULLVP && !(cnflags & DOWHITEOUT) && iswhiteout == 0) {
|
|
/* always op is LOOKUP */
|
|
cnp->cn_nameiop = LOOKUP;
|
|
cnflagsbk = cnp->cn_flags;
|
|
cnp->cn_flags = cnflags;
|
|
|
|
lerror = VOP_LOOKUP(ldvp, &lvp, cnp);
|
|
|
|
cnp->cn_nameiop = nameiop;
|
|
if (udvp != NULLVP && (uerror == 0 || uerror == EJUSTRETURN))
|
|
cnp->cn_flags = cnflagsbk;
|
|
|
|
if (lerror == 0) {
|
|
if (ldvp == lvp) { /* is dot */
|
|
if (uvp != NULLVP)
|
|
vrele(uvp); /* no need? */
|
|
vrele(lvp);
|
|
*(ap->a_vpp) = dvp;
|
|
vref(dvp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: leave (%d)\n", lerror);
|
|
|
|
return (lerror);
|
|
}
|
|
if (cnp->cn_lkflags & LK_TYPE_MASK)
|
|
VOP_UNLOCK(lvp, LK_RELEASE);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* check lookup result
|
|
*/
|
|
if (uvp == NULLVP && lvp == NULLVP) {
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: leave (%d)\n",
|
|
(udvp != NULLVP ? uerror : lerror));
|
|
return (udvp != NULLVP ? uerror : lerror);
|
|
}
|
|
|
|
/*
|
|
* check vnode type
|
|
*/
|
|
if (uvp != NULLVP && lvp != NULLVP && uvp->v_type != lvp->v_type) {
|
|
vrele(lvp);
|
|
lvp = NULLVP;
|
|
}
|
|
|
|
/*
|
|
* check shadow dir
|
|
*/
|
|
if (uerror != 0 && uerror != EJUSTRETURN && udvp != NULLVP &&
|
|
lerror == 0 && lvp != NULLVP && lvp->v_type == VDIR &&
|
|
!(dvp->v_mount->mnt_flag & MNT_RDONLY) &&
|
|
(1 < cnp->cn_namelen || '.' != *(cnp->cn_nameptr))) {
|
|
/* get unionfs vnode in order to create a new shadow dir. */
|
|
error = unionfs_nodeget(dvp->v_mount, NULLVP, lvp, dvp, &vp,
|
|
cnp, td);
|
|
if (error != 0)
|
|
goto unionfs_lookup_out;
|
|
|
|
if (LK_SHARED == (cnp->cn_lkflags & LK_TYPE_MASK))
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
if (LK_EXCLUSIVE != VOP_ISLOCKED(vp)) {
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
lockflag = 1;
|
|
}
|
|
error = unionfs_mkshadowdir(MOUNTTOUNIONFSMOUNT(dvp->v_mount),
|
|
udvp, VTOUNIONFS(vp), cnp, td);
|
|
if (lockflag != 0)
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
if (error != 0) {
|
|
UNIONFSDEBUG("unionfs_lookup: Unable to create shadow dir.");
|
|
if ((cnp->cn_lkflags & LK_TYPE_MASK) == LK_EXCLUSIVE)
|
|
vput(vp);
|
|
else
|
|
vrele(vp);
|
|
goto unionfs_lookup_out;
|
|
}
|
|
if ((cnp->cn_lkflags & LK_TYPE_MASK) == LK_SHARED)
|
|
vn_lock(vp, LK_SHARED | LK_RETRY);
|
|
}
|
|
/*
|
|
* get unionfs vnode.
|
|
*/
|
|
else {
|
|
if (uvp != NULLVP)
|
|
error = uerror;
|
|
else
|
|
error = lerror;
|
|
if (error != 0)
|
|
goto unionfs_lookup_out;
|
|
/*
|
|
* get socket vnode.
|
|
*/
|
|
if (uvp != NULLVP && uvp->v_type == VSOCK) {
|
|
vp = uvp;
|
|
vref(vp);
|
|
if (cnp->cn_lkflags & LK_TYPE_MASK)
|
|
vn_lock(vp, cnp->cn_lkflags | LK_RETRY);
|
|
}
|
|
else if (lvp != NULLVP && lvp->v_type == VSOCK) {
|
|
vp = lvp;
|
|
vref(vp);
|
|
if (cnp->cn_lkflags & LK_TYPE_MASK)
|
|
vn_lock(vp, cnp->cn_lkflags | LK_RETRY);
|
|
}
|
|
/*
|
|
* get unionfs vnode.
|
|
*/
|
|
else
|
|
error = unionfs_nodeget(dvp->v_mount, uvp, lvp,
|
|
dvp, &vp, cnp, td);
|
|
if (error != 0) {
|
|
UNIONFSDEBUG("unionfs_lookup: Unable to create unionfs vnode.");
|
|
goto unionfs_lookup_out;
|
|
}
|
|
if ((nameiop == DELETE || nameiop == RENAME) &&
|
|
(cnp->cn_lkflags & LK_TYPE_MASK) == 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
}
|
|
|
|
*(ap->a_vpp) = vp;
|
|
|
|
if ((cnflags & MAKEENTRY) && vp->v_type != VSOCK)
|
|
cache_enter(dvp, vp, cnp);
|
|
|
|
unionfs_lookup_out:
|
|
if (uvp != NULLVP)
|
|
vrele(uvp);
|
|
if (lvp != NULLVP)
|
|
vrele(lvp);
|
|
|
|
if (error == ENOENT && (cnflags & MAKEENTRY) != 0)
|
|
cache_enter(dvp, NULLVP, cnp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_lookup: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_create(struct vop_create_args *ap)
|
|
{
|
|
struct unionfs_node *dunp;
|
|
struct componentname *cnp;
|
|
struct vnode *udvp;
|
|
struct vnode *vp;
|
|
int error;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_create: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
cnp = ap->a_cnp;
|
|
udvp = dunp->un_uppervp;
|
|
error = EROFS;
|
|
|
|
if (udvp != NULLVP) {
|
|
error = VOP_CREATE(udvp, &vp, cnp, ap->a_vap);
|
|
if (error != 0)
|
|
goto unionfs_create_abort;
|
|
|
|
if (vp->v_type == VSOCK)
|
|
*(ap->a_vpp) = vp;
|
|
else {
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
error = unionfs_nodeget(ap->a_dvp->v_mount, vp, NULLVP,
|
|
ap->a_dvp, ap->a_vpp, cnp, curthread);
|
|
vrele(vp);
|
|
}
|
|
}
|
|
|
|
unionfs_create_abort:
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_create: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_whiteout(struct vop_whiteout_args *ap)
|
|
{
|
|
struct unionfs_node *dunp;
|
|
struct componentname *cnp;
|
|
struct vnode *udvp;
|
|
int error;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_whiteout: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
cnp = ap->a_cnp;
|
|
udvp = dunp->un_uppervp;
|
|
error = EOPNOTSUPP;
|
|
|
|
if (udvp != NULLVP) {
|
|
switch (ap->a_flags) {
|
|
case CREATE:
|
|
case DELETE:
|
|
case LOOKUP:
|
|
error = VOP_WHITEOUT(udvp, cnp, ap->a_flags);
|
|
break;
|
|
default:
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_whiteout: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_mknod(struct vop_mknod_args *ap)
|
|
{
|
|
struct unionfs_node *dunp;
|
|
struct componentname *cnp;
|
|
struct vnode *udvp;
|
|
struct vnode *vp;
|
|
int error;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_mknod: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
cnp = ap->a_cnp;
|
|
udvp = dunp->un_uppervp;
|
|
error = EROFS;
|
|
|
|
if (udvp != NULLVP) {
|
|
error = VOP_MKNOD(udvp, &vp, cnp, ap->a_vap);
|
|
if (error != 0)
|
|
goto unionfs_mknod_abort;
|
|
|
|
if (vp->v_type == VSOCK)
|
|
*(ap->a_vpp) = vp;
|
|
else {
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
error = unionfs_nodeget(ap->a_dvp->v_mount, vp, NULLVP,
|
|
ap->a_dvp, ap->a_vpp, cnp, curthread);
|
|
vrele(vp);
|
|
}
|
|
}
|
|
|
|
unionfs_mknod_abort:
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_mknod: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_open(struct vop_open_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct vnode *targetvp;
|
|
struct ucred *cred;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_open: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
targetvp = NULLVP;
|
|
cred = ap->a_cred;
|
|
td = ap->a_td;
|
|
|
|
unionfs_get_node_status(unp, td, &unsp);
|
|
|
|
if (unsp->uns_lower_opencnt > 0 || unsp->uns_upper_opencnt > 0) {
|
|
/* vnode is already opend. */
|
|
if (unsp->uns_upper_opencnt > 0)
|
|
targetvp = uvp;
|
|
else
|
|
targetvp = lvp;
|
|
|
|
if (targetvp == lvp &&
|
|
(ap->a_mode & FWRITE) && lvp->v_type == VREG)
|
|
targetvp = NULLVP;
|
|
}
|
|
if (targetvp == NULLVP) {
|
|
if (uvp == NULLVP) {
|
|
if ((ap->a_mode & FWRITE) && lvp->v_type == VREG) {
|
|
error = unionfs_copyfile(unp,
|
|
!(ap->a_mode & O_TRUNC), cred, td);
|
|
if (error != 0)
|
|
goto unionfs_open_abort;
|
|
targetvp = uvp = unp->un_uppervp;
|
|
} else
|
|
targetvp = lvp;
|
|
} else
|
|
targetvp = uvp;
|
|
}
|
|
|
|
error = VOP_OPEN(targetvp, ap->a_mode, cred, td, ap->a_fp);
|
|
if (error == 0) {
|
|
if (targetvp == uvp) {
|
|
if (uvp->v_type == VDIR && lvp != NULLVP &&
|
|
unsp->uns_lower_opencnt <= 0) {
|
|
/* open lower for readdir */
|
|
error = VOP_OPEN(lvp, FREAD, cred, td, NULL);
|
|
if (error != 0) {
|
|
VOP_CLOSE(uvp, ap->a_mode, cred, td);
|
|
goto unionfs_open_abort;
|
|
}
|
|
unsp->uns_node_flag |= UNS_OPENL_4_READDIR;
|
|
unsp->uns_lower_opencnt++;
|
|
}
|
|
unsp->uns_upper_opencnt++;
|
|
} else {
|
|
unsp->uns_lower_opencnt++;
|
|
unsp->uns_lower_openmode = ap->a_mode;
|
|
}
|
|
ap->a_vp->v_object = targetvp->v_object;
|
|
}
|
|
|
|
unionfs_open_abort:
|
|
if (error != 0)
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_open: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_close(struct vop_close_args *ap)
|
|
{
|
|
int error;
|
|
int locked;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct ucred *cred;
|
|
struct thread *td;
|
|
struct vnode *vp;
|
|
struct vnode *ovp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_close: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
locked = 0;
|
|
vp = ap->a_vp;
|
|
unp = VTOUNIONFS(vp);
|
|
cred = ap->a_cred;
|
|
td = ap->a_td;
|
|
|
|
if (VOP_ISLOCKED(vp) != LK_EXCLUSIVE) {
|
|
if (vn_lock(vp, LK_UPGRADE) != 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
locked = 1;
|
|
}
|
|
unionfs_get_node_status(unp, td, &unsp);
|
|
|
|
if (unsp->uns_lower_opencnt <= 0 && unsp->uns_upper_opencnt <= 0) {
|
|
#ifdef DIAGNOSTIC
|
|
printf("unionfs_close: warning: open count is 0\n");
|
|
#endif
|
|
if (unp->un_uppervp != NULLVP)
|
|
ovp = unp->un_uppervp;
|
|
else
|
|
ovp = unp->un_lowervp;
|
|
} else if (unsp->uns_upper_opencnt > 0)
|
|
ovp = unp->un_uppervp;
|
|
else
|
|
ovp = unp->un_lowervp;
|
|
|
|
error = VOP_CLOSE(ovp, ap->a_fflag, cred, td);
|
|
|
|
if (error != 0)
|
|
goto unionfs_close_abort;
|
|
|
|
vp->v_object = ovp->v_object;
|
|
|
|
if (ovp == unp->un_uppervp) {
|
|
unsp->uns_upper_opencnt--;
|
|
if (unsp->uns_upper_opencnt == 0) {
|
|
if (unsp->uns_node_flag & UNS_OPENL_4_READDIR) {
|
|
VOP_CLOSE(unp->un_lowervp, FREAD, cred, td);
|
|
unsp->uns_node_flag &= ~UNS_OPENL_4_READDIR;
|
|
unsp->uns_lower_opencnt--;
|
|
}
|
|
if (unsp->uns_lower_opencnt > 0)
|
|
vp->v_object = unp->un_lowervp->v_object;
|
|
}
|
|
} else
|
|
unsp->uns_lower_opencnt--;
|
|
|
|
unionfs_close_abort:
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
|
|
if (locked != 0)
|
|
vn_lock(vp, LK_DOWNGRADE | LK_RETRY);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_close: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
/*
|
|
* Check the access mode toward shadow file/dir.
|
|
*/
|
|
static int
|
|
unionfs_check_corrected_access(accmode_t accmode,
|
|
struct vattr *va,
|
|
struct ucred *cred)
|
|
{
|
|
int count;
|
|
uid_t uid; /* upper side vnode's uid */
|
|
gid_t gid; /* upper side vnode's gid */
|
|
u_short vmode; /* upper side vnode's mode */
|
|
u_short mask;
|
|
|
|
mask = 0;
|
|
uid = va->va_uid;
|
|
gid = va->va_gid;
|
|
vmode = va->va_mode;
|
|
|
|
/* check owner */
|
|
if (cred->cr_uid == uid) {
|
|
if (accmode & VEXEC)
|
|
mask |= S_IXUSR;
|
|
if (accmode & VREAD)
|
|
mask |= S_IRUSR;
|
|
if (accmode & VWRITE)
|
|
mask |= S_IWUSR;
|
|
return ((vmode & mask) == mask ? 0 : EACCES);
|
|
}
|
|
|
|
/* check group */
|
|
count = 0;
|
|
if (groupmember(gid, cred)) {
|
|
if (accmode & VEXEC)
|
|
mask |= S_IXGRP;
|
|
if (accmode & VREAD)
|
|
mask |= S_IRGRP;
|
|
if (accmode & VWRITE)
|
|
mask |= S_IWGRP;
|
|
return ((vmode & mask) == mask ? 0 : EACCES);
|
|
}
|
|
|
|
/* check other */
|
|
if (accmode & VEXEC)
|
|
mask |= S_IXOTH;
|
|
if (accmode & VREAD)
|
|
mask |= S_IROTH;
|
|
if (accmode & VWRITE)
|
|
mask |= S_IWOTH;
|
|
|
|
return ((vmode & mask) == mask ? 0 : EACCES);
|
|
}
|
|
|
|
static int
|
|
unionfs_access(struct vop_access_args *ap)
|
|
{
|
|
struct unionfs_mount *ump;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
struct vattr va;
|
|
accmode_t accmode;
|
|
int error;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_access: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
td = ap->a_td;
|
|
accmode = ap->a_accmode;
|
|
error = EACCES;
|
|
|
|
if ((accmode & VWRITE) &&
|
|
(ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)) {
|
|
switch (ap->a_vp->v_type) {
|
|
case VREG:
|
|
case VDIR:
|
|
case VLNK:
|
|
return (EROFS);
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (uvp != NULLVP) {
|
|
error = VOP_ACCESS(uvp, accmode, ap->a_cred, td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_access: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
if (lvp != NULLVP) {
|
|
if (accmode & VWRITE) {
|
|
if (ump->um_uppervp->v_mount->mnt_flag & MNT_RDONLY) {
|
|
switch (ap->a_vp->v_type) {
|
|
case VREG:
|
|
case VDIR:
|
|
case VLNK:
|
|
return (EROFS);
|
|
default:
|
|
break;
|
|
}
|
|
} else if (ap->a_vp->v_type == VREG || ap->a_vp->v_type == VDIR) {
|
|
/* check shadow file/dir */
|
|
if (ump->um_copymode != UNIONFS_TRANSPARENT) {
|
|
error = unionfs_create_uppervattr(ump,
|
|
lvp, &va, ap->a_cred, td);
|
|
if (error != 0)
|
|
return (error);
|
|
|
|
error = unionfs_check_corrected_access(
|
|
accmode, &va, ap->a_cred);
|
|
if (error != 0)
|
|
return (error);
|
|
}
|
|
}
|
|
accmode &= ~(VWRITE | VAPPEND);
|
|
accmode |= VREAD; /* will copy to upper */
|
|
}
|
|
error = VOP_ACCESS(lvp, accmode, ap->a_cred, td);
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_access: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_getattr(struct vop_getattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_mount *ump;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
struct vattr va;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getattr: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
td = curthread;
|
|
|
|
if (uvp != NULLVP) {
|
|
if ((error = VOP_GETATTR(uvp, ap->a_vap, ap->a_cred)) == 0)
|
|
ap->a_vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsid.val[0];
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getattr: leave mode=%o, uid=%d, gid=%d (%d)\n",
|
|
ap->a_vap->va_mode, ap->a_vap->va_uid,
|
|
ap->a_vap->va_gid, error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
error = VOP_GETATTR(lvp, ap->a_vap, ap->a_cred);
|
|
|
|
if (error == 0 && !(ump->um_uppervp->v_mount->mnt_flag & MNT_RDONLY)) {
|
|
/* correct the attr toward shadow file/dir. */
|
|
if (ap->a_vp->v_type == VREG || ap->a_vp->v_type == VDIR) {
|
|
unionfs_create_uppervattr_core(ump, ap->a_vap, &va, td);
|
|
ap->a_vap->va_mode = va.va_mode;
|
|
ap->a_vap->va_uid = va.va_uid;
|
|
ap->a_vap->va_gid = va.va_gid;
|
|
}
|
|
}
|
|
|
|
if (error == 0)
|
|
ap->a_vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsid.val[0];
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getattr: leave mode=%o, uid=%d, gid=%d (%d)\n",
|
|
ap->a_vap->va_mode, ap->a_vap->va_uid, ap->a_vap->va_gid, error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_setattr(struct vop_setattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
struct vattr *vap;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setattr: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = EROFS;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
td = curthread;
|
|
vap = ap->a_vap;
|
|
|
|
if ((ap->a_vp->v_mount->mnt_flag & MNT_RDONLY) &&
|
|
(vap->va_flags != VNOVAL || vap->va_uid != (uid_t)VNOVAL ||
|
|
vap->va_gid != (gid_t)VNOVAL || vap->va_atime.tv_sec != VNOVAL ||
|
|
vap->va_mtime.tv_sec != VNOVAL || vap->va_mode != (mode_t)VNOVAL))
|
|
return (EROFS);
|
|
|
|
if (uvp == NULLVP && lvp->v_type == VREG) {
|
|
error = unionfs_copyfile(unp, (vap->va_size != 0),
|
|
ap->a_cred, td);
|
|
if (error != 0)
|
|
return (error);
|
|
uvp = unp->un_uppervp;
|
|
}
|
|
|
|
if (uvp != NULLVP)
|
|
error = VOP_SETATTR(uvp, vap, ap->a_cred);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setattr: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_read(struct vop_read_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *tvp;
|
|
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_read: enter\n"); */
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
tvp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
error = VOP_READ(tvp, ap->a_uio, ap->a_ioflag, ap->a_cred);
|
|
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_read: leave (%d)\n", error); */
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_write(struct vop_write_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *tvp;
|
|
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_write: enter\n"); */
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
tvp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
error = VOP_WRITE(tvp, ap->a_uio, ap->a_ioflag, ap->a_cred);
|
|
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_write: leave (%d)\n", error); */
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_ioctl(struct vop_ioctl_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct vnode *ovp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_ioctl: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
vn_lock(ap->a_vp, LK_EXCLUSIVE | LK_RETRY);
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
unionfs_get_node_status(unp, ap->a_td, &unsp);
|
|
ovp = (unsp->uns_upper_opencnt ? unp->un_uppervp : unp->un_lowervp);
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
VOP_UNLOCK(ap->a_vp, LK_RELEASE);
|
|
|
|
if (ovp == NULLVP)
|
|
return (EBADF);
|
|
|
|
error = VOP_IOCTL(ovp, ap->a_command, ap->a_data, ap->a_fflag,
|
|
ap->a_cred, ap->a_td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_ioctl: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_poll(struct vop_poll_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct vnode *ovp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
vn_lock(ap->a_vp, LK_EXCLUSIVE | LK_RETRY);
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
unionfs_get_node_status(unp, ap->a_td, &unsp);
|
|
ovp = (unsp->uns_upper_opencnt ? unp->un_uppervp : unp->un_lowervp);
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
VOP_UNLOCK(ap->a_vp, LK_RELEASE);
|
|
|
|
if (ovp == NULLVP)
|
|
return (EBADF);
|
|
|
|
return (VOP_POLL(ovp, ap->a_events, ap->a_cred, ap->a_td));
|
|
}
|
|
|
|
static int
|
|
unionfs_fsync(struct vop_fsync_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct vnode *ovp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
unionfs_get_node_status(unp, ap->a_td, &unsp);
|
|
ovp = (unsp->uns_upper_opencnt ? unp->un_uppervp : unp->un_lowervp);
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
|
|
if (ovp == NULLVP)
|
|
return (EBADF);
|
|
|
|
return (VOP_FSYNC(ovp, ap->a_waitfor, ap->a_td));
|
|
}
|
|
|
|
static int
|
|
unionfs_remove(struct vop_remove_args *ap)
|
|
{
|
|
int error;
|
|
char *path;
|
|
struct unionfs_node *dunp;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_mount *ump;
|
|
struct vnode *udvp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct vnode *vp;
|
|
struct componentname *cnp;
|
|
struct componentname cn;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_remove: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
error = 0;
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
udvp = dunp->un_uppervp;
|
|
cnp = ap->a_cnp;
|
|
td = curthread;
|
|
|
|
if (ap->a_vp->v_op != &unionfs_vnodeops) {
|
|
if (ap->a_vp->v_type != VSOCK)
|
|
return (EINVAL);
|
|
ump = NULL;
|
|
vp = uvp = lvp = NULLVP;
|
|
/* search vnode */
|
|
VOP_UNLOCK(ap->a_vp, LK_RELEASE);
|
|
error = unionfs_relookup(udvp, &vp, cnp, &cn, td,
|
|
cnp->cn_nameptr, strlen(cnp->cn_nameptr), DELETE);
|
|
if (error != 0 && error != ENOENT) {
|
|
vn_lock(ap->a_vp, LK_EXCLUSIVE | LK_RETRY);
|
|
return (error);
|
|
}
|
|
|
|
if (error == 0 && vp == ap->a_vp) {
|
|
/* target vnode in upper */
|
|
uvp = vp;
|
|
vrele(vp);
|
|
path = NULL;
|
|
} else {
|
|
/* target vnode in lower */
|
|
if (vp != NULLVP) {
|
|
if (udvp == vp)
|
|
vrele(vp);
|
|
else
|
|
vput(vp);
|
|
}
|
|
vn_lock(ap->a_vp, LK_EXCLUSIVE | LK_RETRY);
|
|
lvp = ap->a_vp;
|
|
path = ap->a_cnp->cn_nameptr;
|
|
}
|
|
} else {
|
|
ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
path = unp->un_path;
|
|
}
|
|
|
|
if (udvp == NULLVP)
|
|
return (EROFS);
|
|
|
|
if (uvp != NULLVP) {
|
|
/*
|
|
* XXX: if the vnode type is VSOCK, it will create whiteout
|
|
* after remove.
|
|
*/
|
|
if (ump == NULL || ump->um_whitemode == UNIONFS_WHITE_ALWAYS ||
|
|
lvp != NULLVP)
|
|
cnp->cn_flags |= DOWHITEOUT;
|
|
error = VOP_REMOVE(udvp, uvp, cnp);
|
|
} else if (lvp != NULLVP)
|
|
error = unionfs_mkwhiteout(udvp, cnp, td, path);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_remove: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_link(struct vop_link_args *ap)
|
|
{
|
|
int error;
|
|
int needrelookup;
|
|
struct unionfs_node *dunp;
|
|
struct unionfs_node *unp;
|
|
struct vnode *udvp;
|
|
struct vnode *uvp;
|
|
struct componentname *cnp;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_link: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_tdvp);
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
needrelookup = 0;
|
|
dunp = VTOUNIONFS(ap->a_tdvp);
|
|
unp = NULL;
|
|
udvp = dunp->un_uppervp;
|
|
uvp = NULLVP;
|
|
cnp = ap->a_cnp;
|
|
td = curthread;
|
|
|
|
if (udvp == NULLVP)
|
|
return (EROFS);
|
|
|
|
if (ap->a_vp->v_op != &unionfs_vnodeops)
|
|
uvp = ap->a_vp;
|
|
else {
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
|
|
if (unp->un_uppervp == NULLVP) {
|
|
if (ap->a_vp->v_type != VREG)
|
|
return (EOPNOTSUPP);
|
|
|
|
error = unionfs_copyfile(unp, 1, cnp->cn_cred, td);
|
|
if (error != 0)
|
|
return (error);
|
|
needrelookup = 1;
|
|
}
|
|
uvp = unp->un_uppervp;
|
|
}
|
|
|
|
if (needrelookup != 0)
|
|
error = unionfs_relookup_for_create(ap->a_tdvp, cnp, td);
|
|
|
|
if (error == 0)
|
|
error = VOP_LINK(udvp, uvp, cnp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_link: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_rename(struct vop_rename_args *ap)
|
|
{
|
|
int error;
|
|
struct vnode *fdvp;
|
|
struct vnode *fvp;
|
|
struct componentname *fcnp;
|
|
struct vnode *tdvp;
|
|
struct vnode *tvp;
|
|
struct componentname *tcnp;
|
|
struct vnode *ltdvp;
|
|
struct vnode *ltvp;
|
|
struct thread *td;
|
|
|
|
/* rename target vnodes */
|
|
struct vnode *rfdvp;
|
|
struct vnode *rfvp;
|
|
struct vnode *rtdvp;
|
|
struct vnode *rtvp;
|
|
|
|
int needrelookup;
|
|
struct unionfs_mount *ump;
|
|
struct unionfs_node *unp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_rename: enter\n");
|
|
|
|
error = 0;
|
|
fdvp = ap->a_fdvp;
|
|
fvp = ap->a_fvp;
|
|
fcnp = ap->a_fcnp;
|
|
tdvp = ap->a_tdvp;
|
|
tvp = ap->a_tvp;
|
|
tcnp = ap->a_tcnp;
|
|
ltdvp = NULLVP;
|
|
ltvp = NULLVP;
|
|
td = curthread;
|
|
rfdvp = fdvp;
|
|
rfvp = fvp;
|
|
rtdvp = tdvp;
|
|
rtvp = tvp;
|
|
needrelookup = 0;
|
|
|
|
#ifdef DIAGNOSTIC
|
|
if (!(fcnp->cn_flags & HASBUF) || !(tcnp->cn_flags & HASBUF))
|
|
panic("unionfs_rename: no name");
|
|
#endif
|
|
|
|
/* check for cross device rename */
|
|
if (fvp->v_mount != tdvp->v_mount ||
|
|
(tvp != NULLVP && fvp->v_mount != tvp->v_mount)) {
|
|
if (fvp->v_op != &unionfs_vnodeops)
|
|
error = ENODEV;
|
|
else
|
|
error = EXDEV;
|
|
goto unionfs_rename_abort;
|
|
}
|
|
|
|
/* Renaming a file to itself has no effect. */
|
|
if (fvp == tvp)
|
|
goto unionfs_rename_abort;
|
|
|
|
/*
|
|
* from/to vnode is unionfs node.
|
|
*/
|
|
|
|
KASSERT_UNIONFS_VNODE(fdvp);
|
|
KASSERT_UNIONFS_VNODE(fvp);
|
|
KASSERT_UNIONFS_VNODE(tdvp);
|
|
if (tvp != NULLVP)
|
|
KASSERT_UNIONFS_VNODE(tvp);
|
|
|
|
unp = VTOUNIONFS(fdvp);
|
|
#ifdef UNIONFS_IDBG_RENAME
|
|
UNIONFS_INTERNAL_DEBUG("fdvp=%p, ufdvp=%p, lfdvp=%p\n", fdvp, unp->un_uppervp, unp->un_lowervp);
|
|
#endif
|
|
if (unp->un_uppervp == NULLVP) {
|
|
error = ENODEV;
|
|
goto unionfs_rename_abort;
|
|
}
|
|
rfdvp = unp->un_uppervp;
|
|
vref(rfdvp);
|
|
|
|
unp = VTOUNIONFS(fvp);
|
|
#ifdef UNIONFS_IDBG_RENAME
|
|
UNIONFS_INTERNAL_DEBUG("fvp=%p, ufvp=%p, lfvp=%p\n", fvp, unp->un_uppervp, unp->un_lowervp);
|
|
#endif
|
|
ump = MOUNTTOUNIONFSMOUNT(fvp->v_mount);
|
|
if (unp->un_uppervp == NULLVP) {
|
|
switch (fvp->v_type) {
|
|
case VREG:
|
|
if ((error = vn_lock(fvp, LK_EXCLUSIVE)) != 0)
|
|
goto unionfs_rename_abort;
|
|
error = unionfs_copyfile(unp, 1, fcnp->cn_cred, td);
|
|
VOP_UNLOCK(fvp, LK_RELEASE);
|
|
if (error != 0)
|
|
goto unionfs_rename_abort;
|
|
break;
|
|
case VDIR:
|
|
if ((error = vn_lock(fvp, LK_EXCLUSIVE)) != 0)
|
|
goto unionfs_rename_abort;
|
|
error = unionfs_mkshadowdir(ump, rfdvp, unp, fcnp, td);
|
|
VOP_UNLOCK(fvp, LK_RELEASE);
|
|
if (error != 0)
|
|
goto unionfs_rename_abort;
|
|
break;
|
|
default:
|
|
error = ENODEV;
|
|
goto unionfs_rename_abort;
|
|
}
|
|
|
|
needrelookup = 1;
|
|
}
|
|
|
|
if (unp->un_lowervp != NULLVP)
|
|
fcnp->cn_flags |= DOWHITEOUT;
|
|
rfvp = unp->un_uppervp;
|
|
vref(rfvp);
|
|
|
|
unp = VTOUNIONFS(tdvp);
|
|
#ifdef UNIONFS_IDBG_RENAME
|
|
UNIONFS_INTERNAL_DEBUG("tdvp=%p, utdvp=%p, ltdvp=%p\n", tdvp, unp->un_uppervp, unp->un_lowervp);
|
|
#endif
|
|
if (unp->un_uppervp == NULLVP) {
|
|
error = ENODEV;
|
|
goto unionfs_rename_abort;
|
|
}
|
|
rtdvp = unp->un_uppervp;
|
|
ltdvp = unp->un_lowervp;
|
|
vref(rtdvp);
|
|
|
|
if (tdvp == tvp) {
|
|
rtvp = rtdvp;
|
|
vref(rtvp);
|
|
} else if (tvp != NULLVP) {
|
|
unp = VTOUNIONFS(tvp);
|
|
#ifdef UNIONFS_IDBG_RENAME
|
|
UNIONFS_INTERNAL_DEBUG("tvp=%p, utvp=%p, ltvp=%p\n", tvp, unp->un_uppervp, unp->un_lowervp);
|
|
#endif
|
|
if (unp->un_uppervp == NULLVP)
|
|
rtvp = NULLVP;
|
|
else {
|
|
if (tvp->v_type == VDIR) {
|
|
error = EINVAL;
|
|
goto unionfs_rename_abort;
|
|
}
|
|
rtvp = unp->un_uppervp;
|
|
ltvp = unp->un_lowervp;
|
|
vref(rtvp);
|
|
}
|
|
}
|
|
|
|
if (rfvp == rtvp)
|
|
goto unionfs_rename_abort;
|
|
|
|
if (needrelookup != 0) {
|
|
if ((error = vn_lock(fdvp, LK_EXCLUSIVE)) != 0)
|
|
goto unionfs_rename_abort;
|
|
error = unionfs_relookup_for_delete(fdvp, fcnp, td);
|
|
VOP_UNLOCK(fdvp, LK_RELEASE);
|
|
if (error != 0)
|
|
goto unionfs_rename_abort;
|
|
|
|
/* Locke of tvp is canceled in order to avoid recursive lock. */
|
|
if (tvp != NULLVP && tvp != tdvp)
|
|
VOP_UNLOCK(tvp, LK_RELEASE);
|
|
error = unionfs_relookup_for_rename(tdvp, tcnp, td);
|
|
if (tvp != NULLVP && tvp != tdvp)
|
|
vn_lock(tvp, LK_EXCLUSIVE | LK_RETRY);
|
|
if (error != 0)
|
|
goto unionfs_rename_abort;
|
|
}
|
|
|
|
error = VOP_RENAME(rfdvp, rfvp, fcnp, rtdvp, rtvp, tcnp);
|
|
|
|
if (error == 0) {
|
|
if (rtvp != NULLVP && rtvp->v_type == VDIR)
|
|
cache_purge(tdvp);
|
|
if (fvp->v_type == VDIR && fdvp != tdvp)
|
|
cache_purge(fdvp);
|
|
}
|
|
|
|
if (ltdvp != NULLVP)
|
|
VOP_UNLOCK(ltdvp, LK_RELEASE);
|
|
if (tdvp != rtdvp)
|
|
vrele(tdvp);
|
|
if (ltvp != NULLVP)
|
|
VOP_UNLOCK(ltvp, LK_RELEASE);
|
|
if (tvp != rtvp && tvp != NULLVP) {
|
|
if (rtvp == NULLVP)
|
|
vput(tvp);
|
|
else
|
|
vrele(tvp);
|
|
}
|
|
if (fdvp != rfdvp)
|
|
vrele(fdvp);
|
|
if (fvp != rfvp)
|
|
vrele(fvp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_rename: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
|
|
unionfs_rename_abort:
|
|
vput(tdvp);
|
|
if (tdvp != rtdvp)
|
|
vrele(rtdvp);
|
|
if (tvp != NULLVP) {
|
|
if (tdvp != tvp)
|
|
vput(tvp);
|
|
else
|
|
vrele(tvp);
|
|
}
|
|
if (tvp != rtvp && rtvp != NULLVP)
|
|
vrele(rtvp);
|
|
if (fdvp != rfdvp)
|
|
vrele(rfdvp);
|
|
if (fvp != rfvp)
|
|
vrele(rfvp);
|
|
vrele(fdvp);
|
|
vrele(fvp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_rename: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_mkdir(struct vop_mkdir_args *ap)
|
|
{
|
|
int error;
|
|
int lkflags;
|
|
struct unionfs_node *dunp;
|
|
struct componentname *cnp;
|
|
struct thread *td;
|
|
struct vnode *udvp;
|
|
struct vnode *uvp;
|
|
struct vattr va;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_mkdir: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
error = EROFS;
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
cnp = ap->a_cnp;
|
|
lkflags = cnp->cn_lkflags;
|
|
td = curthread;
|
|
udvp = dunp->un_uppervp;
|
|
|
|
if (udvp != NULLVP) {
|
|
/* check opaque */
|
|
if (!(cnp->cn_flags & ISWHITEOUT)) {
|
|
error = VOP_GETATTR(udvp, &va, cnp->cn_cred);
|
|
if (error != 0)
|
|
return (error);
|
|
if (va.va_flags & OPAQUE)
|
|
cnp->cn_flags |= ISWHITEOUT;
|
|
}
|
|
|
|
if ((error = VOP_MKDIR(udvp, &uvp, cnp, ap->a_vap)) == 0) {
|
|
VOP_UNLOCK(uvp, LK_RELEASE);
|
|
cnp->cn_lkflags = LK_EXCLUSIVE;
|
|
error = unionfs_nodeget(ap->a_dvp->v_mount, uvp, NULLVP,
|
|
ap->a_dvp, ap->a_vpp, cnp, td);
|
|
cnp->cn_lkflags = lkflags;
|
|
vrele(uvp);
|
|
}
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_mkdir: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_rmdir(struct vop_rmdir_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *dunp;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_mount *ump;
|
|
struct componentname *cnp;
|
|
struct thread *td;
|
|
struct vnode *udvp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_rmdir: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
cnp = ap->a_cnp;
|
|
td = curthread;
|
|
udvp = dunp->un_uppervp;
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
|
|
if (udvp == NULLVP)
|
|
return (EROFS);
|
|
|
|
if (udvp == uvp)
|
|
return (EOPNOTSUPP);
|
|
|
|
if (uvp != NULLVP) {
|
|
if (lvp != NULLVP) {
|
|
error = unionfs_check_rmdir(ap->a_vp, cnp->cn_cred, td);
|
|
if (error != 0)
|
|
return (error);
|
|
}
|
|
ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
|
|
if (ump->um_whitemode == UNIONFS_WHITE_ALWAYS || lvp != NULLVP)
|
|
cnp->cn_flags |= DOWHITEOUT;
|
|
error = unionfs_relookup_for_delete(ap->a_dvp, cnp, td);
|
|
if (!error)
|
|
error = VOP_RMDIR(udvp, uvp, cnp);
|
|
}
|
|
else if (lvp != NULLVP)
|
|
error = unionfs_mkwhiteout(udvp, cnp, td, unp->un_path);
|
|
|
|
if (error == 0) {
|
|
cache_purge(ap->a_dvp);
|
|
cache_purge(ap->a_vp);
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_rmdir: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_symlink(struct vop_symlink_args *ap)
|
|
{
|
|
int error;
|
|
int lkflags;
|
|
struct unionfs_node *dunp;
|
|
struct componentname *cnp;
|
|
struct thread *td;
|
|
struct vnode *udvp;
|
|
struct vnode *uvp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_symlink: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_dvp);
|
|
|
|
error = EROFS;
|
|
dunp = VTOUNIONFS(ap->a_dvp);
|
|
cnp = ap->a_cnp;
|
|
lkflags = cnp->cn_lkflags;
|
|
td = curthread;
|
|
udvp = dunp->un_uppervp;
|
|
|
|
if (udvp != NULLVP) {
|
|
error = VOP_SYMLINK(udvp, &uvp, cnp, ap->a_vap, ap->a_target);
|
|
if (error == 0) {
|
|
VOP_UNLOCK(uvp, LK_RELEASE);
|
|
cnp->cn_lkflags = LK_EXCLUSIVE;
|
|
error = unionfs_nodeget(ap->a_dvp->v_mount, uvp, NULLVP,
|
|
ap->a_dvp, ap->a_vpp, cnp, td);
|
|
cnp->cn_lkflags = lkflags;
|
|
vrele(uvp);
|
|
}
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_symlink: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_readdir(struct vop_readdir_args *ap)
|
|
{
|
|
int error;
|
|
int eofflag;
|
|
int locked;
|
|
int uio_offset_bk;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct uio *uio;
|
|
struct vnode *vp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
struct vattr va;
|
|
|
|
int ncookies_bk;
|
|
u_long *cookies_bk;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_readdir: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
eofflag = 0;
|
|
locked = 0;
|
|
uio_offset_bk = 0;
|
|
uio = ap->a_uio;
|
|
uvp = NULLVP;
|
|
lvp = NULLVP;
|
|
td = uio->uio_td;
|
|
ncookies_bk = 0;
|
|
cookies_bk = NULL;
|
|
|
|
vp = ap->a_vp;
|
|
if (vp->v_type != VDIR)
|
|
return (ENOTDIR);
|
|
|
|
/* check the open count. unionfs needs to open before readdir. */
|
|
if (VOP_ISLOCKED(vp) != LK_EXCLUSIVE) {
|
|
if (vn_lock(vp, LK_UPGRADE) != 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
locked = 1;
|
|
}
|
|
unp = VTOUNIONFS(vp);
|
|
if (unp == NULL)
|
|
error = EBADF;
|
|
else {
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
unionfs_get_node_status(unp, td, &unsp);
|
|
if ((uvp != NULLVP && unsp->uns_upper_opencnt <= 0) ||
|
|
(lvp != NULLVP && unsp->uns_lower_opencnt <= 0)) {
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
error = EBADF;
|
|
}
|
|
}
|
|
if (locked)
|
|
vn_lock(vp, LK_DOWNGRADE | LK_RETRY);
|
|
if (error != 0)
|
|
goto unionfs_readdir_exit;
|
|
|
|
/* check opaque */
|
|
if (uvp != NULLVP && lvp != NULLVP) {
|
|
if ((error = VOP_GETATTR(uvp, &va, ap->a_cred)) != 0)
|
|
goto unionfs_readdir_exit;
|
|
if (va.va_flags & OPAQUE)
|
|
lvp = NULLVP;
|
|
}
|
|
|
|
/* upper only */
|
|
if (uvp != NULLVP && lvp == NULLVP) {
|
|
error = VOP_READDIR(uvp, uio, ap->a_cred, ap->a_eofflag,
|
|
ap->a_ncookies, ap->a_cookies);
|
|
unsp->uns_readdir_status = 0;
|
|
|
|
goto unionfs_readdir_exit;
|
|
}
|
|
|
|
/* lower only */
|
|
if (uvp == NULLVP && lvp != NULLVP) {
|
|
error = VOP_READDIR(lvp, uio, ap->a_cred, ap->a_eofflag,
|
|
ap->a_ncookies, ap->a_cookies);
|
|
unsp->uns_readdir_status = 2;
|
|
|
|
goto unionfs_readdir_exit;
|
|
}
|
|
|
|
/*
|
|
* readdir upper and lower
|
|
*/
|
|
KASSERT(uvp != NULLVP, ("unionfs_readdir: null upper vp"));
|
|
KASSERT(lvp != NULLVP, ("unionfs_readdir: null lower vp"));
|
|
if (uio->uio_offset == 0)
|
|
unsp->uns_readdir_status = 0;
|
|
|
|
if (unsp->uns_readdir_status == 0) {
|
|
/* read upper */
|
|
error = VOP_READDIR(uvp, uio, ap->a_cred, &eofflag,
|
|
ap->a_ncookies, ap->a_cookies);
|
|
|
|
if (error != 0 || eofflag == 0)
|
|
goto unionfs_readdir_exit;
|
|
unsp->uns_readdir_status = 1;
|
|
|
|
/*
|
|
* UFS(and other FS) needs size of uio_resid larger than
|
|
* DIRBLKSIZ.
|
|
* size of DIRBLKSIZ equals DEV_BSIZE.
|
|
* (see: ufs/ufs/ufs_vnops.c ufs_readdir func , ufs/ufs/dir.h)
|
|
*/
|
|
if (uio->uio_resid <= (uio->uio_resid & (DEV_BSIZE -1)))
|
|
goto unionfs_readdir_exit;
|
|
|
|
/*
|
|
* Backup cookies.
|
|
* It prepares to readdir in lower.
|
|
*/
|
|
if (ap->a_ncookies != NULL) {
|
|
ncookies_bk = *(ap->a_ncookies);
|
|
*(ap->a_ncookies) = 0;
|
|
}
|
|
if (ap->a_cookies != NULL) {
|
|
cookies_bk = *(ap->a_cookies);
|
|
*(ap->a_cookies) = NULL;
|
|
}
|
|
}
|
|
|
|
/* initialize for readdir in lower */
|
|
if (unsp->uns_readdir_status == 1) {
|
|
unsp->uns_readdir_status = 2;
|
|
/*
|
|
* Backup uio_offset. See the comment after the
|
|
* VOP_READDIR call on the lower layer.
|
|
*/
|
|
uio_offset_bk = uio->uio_offset;
|
|
uio->uio_offset = 0;
|
|
}
|
|
|
|
if (lvp == NULLVP) {
|
|
error = EBADF;
|
|
goto unionfs_readdir_exit;
|
|
}
|
|
/* read lower */
|
|
error = VOP_READDIR(lvp, uio, ap->a_cred, ap->a_eofflag,
|
|
ap->a_ncookies, ap->a_cookies);
|
|
|
|
/*
|
|
* We can't return an uio_offset of 0: this would trigger an
|
|
* infinite loop, because the next call to unionfs_readdir would
|
|
* always restart with the upper layer (uio_offset == 0) and
|
|
* always return some data.
|
|
*
|
|
* This happens when the lower layer root directory is removed.
|
|
* (A root directory deleting of unionfs should not be permitted.
|
|
* But current VFS can not do it.)
|
|
*/
|
|
if (uio->uio_offset == 0)
|
|
uio->uio_offset = uio_offset_bk;
|
|
|
|
if (cookies_bk != NULL) {
|
|
/* merge cookies */
|
|
int size;
|
|
u_long *newcookies, *pos;
|
|
|
|
size = *(ap->a_ncookies) + ncookies_bk;
|
|
newcookies = (u_long *) malloc(size * sizeof(u_long),
|
|
M_TEMP, M_WAITOK);
|
|
pos = newcookies;
|
|
|
|
memcpy(pos, cookies_bk, ncookies_bk * sizeof(u_long));
|
|
pos += ncookies_bk;
|
|
memcpy(pos, *(ap->a_cookies), *(ap->a_ncookies) * sizeof(u_long));
|
|
free(cookies_bk, M_TEMP);
|
|
free(*(ap->a_cookies), M_TEMP);
|
|
*(ap->a_ncookies) = size;
|
|
*(ap->a_cookies) = newcookies;
|
|
}
|
|
|
|
unionfs_readdir_exit:
|
|
if (error != 0 && ap->a_eofflag != NULL)
|
|
*(ap->a_eofflag) = 1;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_readdir: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_readlink(struct vop_readlink_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_readlink: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
error = VOP_READLINK(vp, ap->a_uio, ap->a_cred);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_readlink: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_getwritemount(struct vop_getwritemount_args *ap)
|
|
{
|
|
int error;
|
|
struct vnode *uvp;
|
|
struct vnode *vp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getwritemount: enter\n");
|
|
|
|
error = 0;
|
|
vp = ap->a_vp;
|
|
|
|
if (vp == NULLVP || (vp->v_mount->mnt_flag & MNT_RDONLY))
|
|
return (EACCES);
|
|
|
|
KASSERT_UNIONFS_VNODE(vp);
|
|
|
|
uvp = UNIONFSVPTOUPPERVP(vp);
|
|
if (uvp == NULLVP && VREG == vp->v_type)
|
|
uvp = UNIONFSVPTOUPPERVP(VTOUNIONFS(vp)->un_dvp);
|
|
|
|
if (uvp != NULLVP)
|
|
error = VOP_GETWRITEMOUNT(uvp, ap->a_mpp);
|
|
else {
|
|
VI_LOCK(vp);
|
|
if (vp->v_iflag & VI_FREE)
|
|
error = EOPNOTSUPP;
|
|
else
|
|
error = EACCES;
|
|
VI_UNLOCK(vp);
|
|
}
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getwritemount: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_inactive(struct vop_inactive_args *ap)
|
|
{
|
|
ap->a_vp->v_object = NULL;
|
|
vrecycle(ap->a_vp);
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
unionfs_reclaim(struct vop_reclaim_args *ap)
|
|
{
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_reclaim: enter\n"); */
|
|
|
|
unionfs_noderem(ap->a_vp, ap->a_td);
|
|
|
|
/* UNIONFS_INTERNAL_DEBUG("unionfs_reclaim: leave\n"); */
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
unionfs_print(struct vop_print_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
/* struct unionfs_node_status *unsp; */
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
/* unionfs_get_node_status(unp, curthread, &unsp); */
|
|
|
|
printf("unionfs_vp=%p, uppervp=%p, lowervp=%p\n",
|
|
ap->a_vp, unp->un_uppervp, unp->un_lowervp);
|
|
/*
|
|
printf("unionfs opencnt: uppervp=%d, lowervp=%d\n",
|
|
unsp->uns_upper_opencnt, unsp->uns_lower_opencnt);
|
|
*/
|
|
|
|
if (unp->un_uppervp != NULLVP)
|
|
vn_printf(unp->un_uppervp, "unionfs: upper ");
|
|
if (unp->un_lowervp != NULLVP)
|
|
vn_printf(unp->un_lowervp, "unionfs: lower ");
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
unionfs_islocked(struct vop_islocked_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
if (unp == NULL)
|
|
return (vop_stdislocked(ap));
|
|
|
|
if (unp->un_uppervp != NULLVP)
|
|
return (VOP_ISLOCKED(unp->un_uppervp));
|
|
if (unp->un_lowervp != NULLVP)
|
|
return (VOP_ISLOCKED(unp->un_lowervp));
|
|
return (vop_stdislocked(ap));
|
|
}
|
|
|
|
static int
|
|
unionfs_get_llt_revlock(struct vnode *vp, int flags)
|
|
{
|
|
int revlock;
|
|
|
|
revlock = 0;
|
|
|
|
switch (flags & LK_TYPE_MASK) {
|
|
case LK_SHARED:
|
|
if (VOP_ISLOCKED(vp) == LK_EXCLUSIVE)
|
|
revlock = LK_UPGRADE;
|
|
else
|
|
revlock = LK_RELEASE;
|
|
break;
|
|
case LK_EXCLUSIVE:
|
|
case LK_UPGRADE:
|
|
revlock = LK_RELEASE;
|
|
break;
|
|
case LK_DOWNGRADE:
|
|
revlock = LK_UPGRADE;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return (revlock);
|
|
}
|
|
|
|
/*
|
|
* The state of an acquired lock is adjusted similarly to
|
|
* the time of error generating.
|
|
* flags: LK_RELEASE or LK_UPGRADE
|
|
*/
|
|
static void
|
|
unionfs_revlock(struct vnode *vp, int flags)
|
|
{
|
|
if (flags & LK_RELEASE)
|
|
VOP_UNLOCK(vp, flags);
|
|
else {
|
|
/* UPGRADE */
|
|
if (vn_lock(vp, flags) != 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
}
|
|
}
|
|
|
|
static int
|
|
unionfs_lock(struct vop_lock1_args *ap)
|
|
{
|
|
int error;
|
|
int flags;
|
|
int revlock;
|
|
int interlock;
|
|
int uhold;
|
|
struct mount *mp;
|
|
struct unionfs_mount *ump;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
interlock = 1;
|
|
uhold = 0;
|
|
flags = ap->a_flags;
|
|
vp = ap->a_vp;
|
|
|
|
if (LK_RELEASE == (flags & LK_TYPE_MASK) || !(flags & LK_TYPE_MASK))
|
|
return (VOP_UNLOCK(vp, flags | LK_RELEASE));
|
|
|
|
if ((flags & LK_INTERLOCK) == 0)
|
|
VI_LOCK(vp);
|
|
|
|
mp = vp->v_mount;
|
|
if (mp == NULL)
|
|
goto unionfs_lock_null_vnode;
|
|
|
|
ump = MOUNTTOUNIONFSMOUNT(mp);
|
|
unp = VTOUNIONFS(vp);
|
|
if (ump == NULL || unp == NULL)
|
|
goto unionfs_lock_null_vnode;
|
|
lvp = unp->un_lowervp;
|
|
uvp = unp->un_uppervp;
|
|
|
|
if ((revlock = unionfs_get_llt_revlock(vp, flags)) == 0)
|
|
panic("unknown lock type: 0x%x", flags & LK_TYPE_MASK);
|
|
|
|
if ((vp->v_iflag & VI_OWEINACT) != 0)
|
|
flags |= LK_NOWAIT;
|
|
|
|
/*
|
|
* Sometimes, lower or upper is already exclusive locked.
|
|
* (ex. vfs_domount: mounted vnode is already locked.)
|
|
*/
|
|
if ((flags & LK_TYPE_MASK) == LK_EXCLUSIVE &&
|
|
vp == ump->um_rootvp)
|
|
flags |= LK_CANRECURSE;
|
|
|
|
if (lvp != NULLVP) {
|
|
if (uvp != NULLVP && flags & LK_UPGRADE) {
|
|
/* Share Lock is once released and a deadlock is avoided. */
|
|
VI_LOCK_FLAGS(uvp, MTX_DUPOK);
|
|
vholdl(uvp);
|
|
uhold = 1;
|
|
VI_UNLOCK(vp);
|
|
VOP_UNLOCK(uvp, LK_RELEASE | LK_INTERLOCK);
|
|
VI_LOCK(vp);
|
|
unp = VTOUNIONFS(vp);
|
|
if (unp == NULL) {
|
|
/* vnode is released. */
|
|
VI_UNLOCK(vp);
|
|
VOP_UNLOCK(lvp, LK_RELEASE);
|
|
vdrop(uvp);
|
|
return (EBUSY);
|
|
}
|
|
}
|
|
VI_LOCK_FLAGS(lvp, MTX_DUPOK);
|
|
flags |= LK_INTERLOCK;
|
|
vholdl(lvp);
|
|
|
|
VI_UNLOCK(vp);
|
|
ap->a_flags &= ~LK_INTERLOCK;
|
|
|
|
error = VOP_LOCK(lvp, flags);
|
|
|
|
VI_LOCK(vp);
|
|
unp = VTOUNIONFS(vp);
|
|
if (unp == NULL) {
|
|
/* vnode is released. */
|
|
VI_UNLOCK(vp);
|
|
if (error == 0)
|
|
VOP_UNLOCK(lvp, LK_RELEASE);
|
|
vdrop(lvp);
|
|
if (uhold != 0)
|
|
vdrop(uvp);
|
|
return (vop_stdlock(ap));
|
|
}
|
|
}
|
|
|
|
if (error == 0 && uvp != NULLVP) {
|
|
if (uhold && flags & LK_UPGRADE) {
|
|
flags &= ~LK_TYPE_MASK;
|
|
flags |= LK_EXCLUSIVE;
|
|
}
|
|
VI_LOCK_FLAGS(uvp, MTX_DUPOK);
|
|
flags |= LK_INTERLOCK;
|
|
if (uhold == 0) {
|
|
vholdl(uvp);
|
|
uhold = 1;
|
|
}
|
|
|
|
VI_UNLOCK(vp);
|
|
ap->a_flags &= ~LK_INTERLOCK;
|
|
|
|
error = VOP_LOCK(uvp, flags);
|
|
|
|
VI_LOCK(vp);
|
|
unp = VTOUNIONFS(vp);
|
|
if (unp == NULL) {
|
|
/* vnode is released. */
|
|
VI_UNLOCK(vp);
|
|
if (error == 0)
|
|
VOP_UNLOCK(uvp, LK_RELEASE);
|
|
vdrop(uvp);
|
|
if (lvp != NULLVP) {
|
|
VOP_UNLOCK(lvp, LK_RELEASE);
|
|
vdrop(lvp);
|
|
}
|
|
return (vop_stdlock(ap));
|
|
}
|
|
if (error != 0 && lvp != NULLVP) {
|
|
/* rollback */
|
|
VI_UNLOCK(vp);
|
|
unionfs_revlock(lvp, revlock);
|
|
interlock = 0;
|
|
}
|
|
}
|
|
|
|
if (interlock)
|
|
VI_UNLOCK(vp);
|
|
if (lvp != NULLVP)
|
|
vdrop(lvp);
|
|
if (uhold != 0)
|
|
vdrop(uvp);
|
|
|
|
return (error);
|
|
|
|
unionfs_lock_null_vnode:
|
|
ap->a_flags |= LK_INTERLOCK;
|
|
return (vop_stdlock(ap));
|
|
}
|
|
|
|
static int
|
|
unionfs_unlock(struct vop_unlock_args *ap)
|
|
{
|
|
int error;
|
|
int flags;
|
|
int mtxlkflag;
|
|
int uhold;
|
|
struct vnode *vp;
|
|
struct vnode *lvp;
|
|
struct vnode *uvp;
|
|
struct unionfs_node *unp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = 0;
|
|
mtxlkflag = 0;
|
|
uhold = 0;
|
|
flags = ap->a_flags | LK_RELEASE;
|
|
vp = ap->a_vp;
|
|
|
|
if ((flags & LK_INTERLOCK) != 0)
|
|
mtxlkflag = 1;
|
|
else if (mtx_owned(VI_MTX(vp)) == 0) {
|
|
VI_LOCK(vp);
|
|
mtxlkflag = 2;
|
|
}
|
|
|
|
unp = VTOUNIONFS(vp);
|
|
if (unp == NULL)
|
|
goto unionfs_unlock_null_vnode;
|
|
lvp = unp->un_lowervp;
|
|
uvp = unp->un_uppervp;
|
|
|
|
if (lvp != NULLVP) {
|
|
VI_LOCK_FLAGS(lvp, MTX_DUPOK);
|
|
flags |= LK_INTERLOCK;
|
|
vholdl(lvp);
|
|
|
|
VI_UNLOCK(vp);
|
|
ap->a_flags &= ~LK_INTERLOCK;
|
|
|
|
error = VOP_UNLOCK(lvp, flags);
|
|
|
|
VI_LOCK(vp);
|
|
}
|
|
|
|
if (error == 0 && uvp != NULLVP) {
|
|
VI_LOCK_FLAGS(uvp, MTX_DUPOK);
|
|
flags |= LK_INTERLOCK;
|
|
vholdl(uvp);
|
|
uhold = 1;
|
|
|
|
VI_UNLOCK(vp);
|
|
ap->a_flags &= ~LK_INTERLOCK;
|
|
|
|
error = VOP_UNLOCK(uvp, flags);
|
|
|
|
VI_LOCK(vp);
|
|
}
|
|
|
|
VI_UNLOCK(vp);
|
|
if (lvp != NULLVP)
|
|
vdrop(lvp);
|
|
if (uhold != 0)
|
|
vdrop(uvp);
|
|
if (mtxlkflag == 0)
|
|
VI_LOCK(vp);
|
|
|
|
return error;
|
|
|
|
unionfs_unlock_null_vnode:
|
|
if (mtxlkflag == 2)
|
|
VI_UNLOCK(vp);
|
|
return (vop_stdunlock(ap));
|
|
}
|
|
|
|
static int
|
|
unionfs_pathconf(struct vop_pathconf_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
return (VOP_PATHCONF(vp, ap->a_name, ap->a_retval));
|
|
}
|
|
|
|
static int
|
|
unionfs_advlock(struct vop_advlock_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct unionfs_node_status *unsp;
|
|
struct vnode *vp;
|
|
struct vnode *uvp;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_advlock: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
vp = ap->a_vp;
|
|
td = curthread;
|
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
|
|
if (uvp == NULLVP) {
|
|
error = unionfs_copyfile(unp, 1, td->td_ucred, td);
|
|
if (error != 0)
|
|
goto unionfs_advlock_abort;
|
|
uvp = unp->un_uppervp;
|
|
|
|
unionfs_get_node_status(unp, td, &unsp);
|
|
if (unsp->uns_lower_opencnt > 0) {
|
|
/* try reopen the vnode */
|
|
error = VOP_OPEN(uvp, unsp->uns_lower_openmode,
|
|
td->td_ucred, td, NULL);
|
|
if (error)
|
|
goto unionfs_advlock_abort;
|
|
unsp->uns_upper_opencnt++;
|
|
VOP_CLOSE(unp->un_lowervp, unsp->uns_lower_openmode, td->td_ucred, td);
|
|
unsp->uns_lower_opencnt--;
|
|
} else
|
|
unionfs_tryrem_node_status(unp, unsp);
|
|
}
|
|
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
|
|
error = VOP_ADVLOCK(uvp, ap->a_id, ap->a_op, ap->a_fl, ap->a_flags);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_advlock: leave (%d)\n", error);
|
|
|
|
return error;
|
|
|
|
unionfs_advlock_abort:
|
|
VOP_UNLOCK(vp, LK_RELEASE);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_advlock: leave (%d)\n", error);
|
|
|
|
return error;
|
|
}
|
|
|
|
static int
|
|
unionfs_strategy(struct vop_strategy_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
#ifdef DIAGNOSTIC
|
|
if (vp == NULLVP)
|
|
panic("unionfs_strategy: nullvp");
|
|
|
|
if (ap->a_bp->b_iocmd == BIO_WRITE && vp == unp->un_lowervp)
|
|
panic("unionfs_strategy: writing to lowervp");
|
|
#endif
|
|
|
|
return (VOP_STRATEGY(vp, ap->a_bp));
|
|
}
|
|
|
|
static int
|
|
unionfs_getacl(struct vop_getacl_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getacl: enter\n");
|
|
|
|
error = VOP_GETACL(vp, ap->a_type, ap->a_aclp, ap->a_cred, ap->a_td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_getacl: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_setacl(struct vop_setacl_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setacl: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = EROFS;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
td = ap->a_td;
|
|
|
|
if (ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)
|
|
return (EROFS);
|
|
|
|
if (uvp == NULLVP && lvp->v_type == VREG) {
|
|
if ((error = unionfs_copyfile(unp, 1, ap->a_cred, td)) != 0)
|
|
return (error);
|
|
uvp = unp->un_uppervp;
|
|
}
|
|
|
|
if (uvp != NULLVP)
|
|
error = VOP_SETACL(uvp, ap->a_type, ap->a_aclp, ap->a_cred, td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setacl: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_aclcheck(struct vop_aclcheck_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_aclcheck: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
error = VOP_ACLCHECK(vp, ap->a_type, ap->a_aclp, ap->a_cred, ap->a_td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_aclcheck: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_openextattr(struct vop_openextattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
struct vnode *tvp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
vp = ap->a_vp;
|
|
unp = VTOUNIONFS(vp);
|
|
tvp = (unp->un_uppervp != NULLVP ? unp->un_uppervp : unp->un_lowervp);
|
|
|
|
if ((tvp == unp->un_uppervp && (unp->un_flag & UNIONFS_OPENEXTU)) ||
|
|
(tvp == unp->un_lowervp && (unp->un_flag & UNIONFS_OPENEXTL)))
|
|
return (EBUSY);
|
|
|
|
error = VOP_OPENEXTATTR(tvp, ap->a_cred, ap->a_td);
|
|
|
|
if (error == 0) {
|
|
if (vn_lock(vp, LK_UPGRADE) != 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
if (tvp == unp->un_uppervp)
|
|
unp->un_flag |= UNIONFS_OPENEXTU;
|
|
else
|
|
unp->un_flag |= UNIONFS_OPENEXTL;
|
|
vn_lock(vp, LK_DOWNGRADE | LK_RETRY);
|
|
}
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_closeextattr(struct vop_closeextattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
struct vnode *tvp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
vp = ap->a_vp;
|
|
unp = VTOUNIONFS(vp);
|
|
tvp = NULLVP;
|
|
|
|
if (unp->un_flag & UNIONFS_OPENEXTU)
|
|
tvp = unp->un_uppervp;
|
|
else if (unp->un_flag & UNIONFS_OPENEXTL)
|
|
tvp = unp->un_lowervp;
|
|
|
|
if (tvp == NULLVP)
|
|
return (EOPNOTSUPP);
|
|
|
|
error = VOP_CLOSEEXTATTR(tvp, ap->a_commit, ap->a_cred, ap->a_td);
|
|
|
|
if (error == 0) {
|
|
if (vn_lock(vp, LK_UPGRADE) != 0)
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
if (tvp == unp->un_uppervp)
|
|
unp->un_flag &= ~UNIONFS_OPENEXTU;
|
|
else
|
|
unp->un_flag &= ~UNIONFS_OPENEXTL;
|
|
vn_lock(vp, LK_DOWNGRADE | LK_RETRY);
|
|
}
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_getextattr(struct vop_getextattr_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = NULLVP;
|
|
|
|
if (unp->un_flag & UNIONFS_OPENEXTU)
|
|
vp = unp->un_uppervp;
|
|
else if (unp->un_flag & UNIONFS_OPENEXTL)
|
|
vp = unp->un_lowervp;
|
|
|
|
if (vp == NULLVP)
|
|
return (EOPNOTSUPP);
|
|
|
|
return (VOP_GETEXTATTR(vp, ap->a_attrnamespace, ap->a_name,
|
|
ap->a_uio, ap->a_size, ap->a_cred, ap->a_td));
|
|
}
|
|
|
|
static int
|
|
unionfs_setextattr(struct vop_setextattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct vnode *ovp;
|
|
struct ucred *cred;
|
|
struct thread *td;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = EROFS;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
ovp = NULLVP;
|
|
cred = ap->a_cred;
|
|
td = ap->a_td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setextattr: enter (un_flag=%x)\n", unp->un_flag);
|
|
|
|
if (ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)
|
|
return (EROFS);
|
|
|
|
if (unp->un_flag & UNIONFS_OPENEXTU)
|
|
ovp = unp->un_uppervp;
|
|
else if (unp->un_flag & UNIONFS_OPENEXTL)
|
|
ovp = unp->un_lowervp;
|
|
|
|
if (ovp == NULLVP)
|
|
return (EOPNOTSUPP);
|
|
|
|
if (ovp == lvp && lvp->v_type == VREG) {
|
|
VOP_CLOSEEXTATTR(lvp, 0, cred, td);
|
|
if (uvp == NULLVP &&
|
|
(error = unionfs_copyfile(unp, 1, cred, td)) != 0) {
|
|
unionfs_setextattr_reopen:
|
|
if ((unp->un_flag & UNIONFS_OPENEXTL) &&
|
|
VOP_OPENEXTATTR(lvp, cred, td)) {
|
|
#ifdef DIAGNOSTIC
|
|
panic("unionfs: VOP_OPENEXTATTR failed");
|
|
#endif
|
|
unp->un_flag &= ~UNIONFS_OPENEXTL;
|
|
}
|
|
goto unionfs_setextattr_abort;
|
|
}
|
|
uvp = unp->un_uppervp;
|
|
if ((error = VOP_OPENEXTATTR(uvp, cred, td)) != 0)
|
|
goto unionfs_setextattr_reopen;
|
|
unp->un_flag &= ~UNIONFS_OPENEXTL;
|
|
unp->un_flag |= UNIONFS_OPENEXTU;
|
|
ovp = uvp;
|
|
}
|
|
|
|
if (ovp == uvp)
|
|
error = VOP_SETEXTATTR(ovp, ap->a_attrnamespace, ap->a_name,
|
|
ap->a_uio, cred, td);
|
|
|
|
unionfs_setextattr_abort:
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setextattr: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_listextattr(struct vop_listextattr_args *ap)
|
|
{
|
|
struct unionfs_node *unp;
|
|
struct vnode *vp;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
vp = NULLVP;
|
|
|
|
if (unp->un_flag & UNIONFS_OPENEXTU)
|
|
vp = unp->un_uppervp;
|
|
else if (unp->un_flag & UNIONFS_OPENEXTL)
|
|
vp = unp->un_lowervp;
|
|
|
|
if (vp == NULLVP)
|
|
return (EOPNOTSUPP);
|
|
|
|
return (VOP_LISTEXTATTR(vp, ap->a_attrnamespace, ap->a_uio,
|
|
ap->a_size, ap->a_cred, ap->a_td));
|
|
}
|
|
|
|
static int
|
|
unionfs_deleteextattr(struct vop_deleteextattr_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct vnode *ovp;
|
|
struct ucred *cred;
|
|
struct thread *td;
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = EROFS;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
ovp = NULLVP;
|
|
cred = ap->a_cred;
|
|
td = ap->a_td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_deleteextattr: enter (un_flag=%x)\n", unp->un_flag);
|
|
|
|
if (ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)
|
|
return (EROFS);
|
|
|
|
if (unp->un_flag & UNIONFS_OPENEXTU)
|
|
ovp = unp->un_uppervp;
|
|
else if (unp->un_flag & UNIONFS_OPENEXTL)
|
|
ovp = unp->un_lowervp;
|
|
|
|
if (ovp == NULLVP)
|
|
return (EOPNOTSUPP);
|
|
|
|
if (ovp == lvp && lvp->v_type == VREG) {
|
|
VOP_CLOSEEXTATTR(lvp, 0, cred, td);
|
|
if (uvp == NULLVP &&
|
|
(error = unionfs_copyfile(unp, 1, cred, td)) != 0) {
|
|
unionfs_deleteextattr_reopen:
|
|
if ((unp->un_flag & UNIONFS_OPENEXTL) &&
|
|
VOP_OPENEXTATTR(lvp, cred, td)) {
|
|
#ifdef DIAGNOSTIC
|
|
panic("unionfs: VOP_OPENEXTATTR failed");
|
|
#endif
|
|
unp->un_flag &= ~UNIONFS_OPENEXTL;
|
|
}
|
|
goto unionfs_deleteextattr_abort;
|
|
}
|
|
uvp = unp->un_uppervp;
|
|
if ((error = VOP_OPENEXTATTR(uvp, cred, td)) != 0)
|
|
goto unionfs_deleteextattr_reopen;
|
|
unp->un_flag &= ~UNIONFS_OPENEXTL;
|
|
unp->un_flag |= UNIONFS_OPENEXTU;
|
|
ovp = uvp;
|
|
}
|
|
|
|
if (ovp == uvp)
|
|
error = VOP_DELETEEXTATTR(ovp, ap->a_attrnamespace, ap->a_name,
|
|
ap->a_cred, ap->a_td);
|
|
|
|
unionfs_deleteextattr_abort:
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_deleteextattr: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_setlabel(struct vop_setlabel_args *ap)
|
|
{
|
|
int error;
|
|
struct unionfs_node *unp;
|
|
struct vnode *uvp;
|
|
struct vnode *lvp;
|
|
struct thread *td;
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setlabel: enter\n");
|
|
|
|
KASSERT_UNIONFS_VNODE(ap->a_vp);
|
|
|
|
error = EROFS;
|
|
unp = VTOUNIONFS(ap->a_vp);
|
|
uvp = unp->un_uppervp;
|
|
lvp = unp->un_lowervp;
|
|
td = ap->a_td;
|
|
|
|
if (ap->a_vp->v_mount->mnt_flag & MNT_RDONLY)
|
|
return (EROFS);
|
|
|
|
if (uvp == NULLVP && lvp->v_type == VREG) {
|
|
if ((error = unionfs_copyfile(unp, 1, ap->a_cred, td)) != 0)
|
|
return (error);
|
|
uvp = unp->un_uppervp;
|
|
}
|
|
|
|
if (uvp != NULLVP)
|
|
error = VOP_SETLABEL(uvp, ap->a_label, ap->a_cred, td);
|
|
|
|
UNIONFS_INTERNAL_DEBUG("unionfs_setlabel: leave (%d)\n", error);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
unionfs_vptofh(struct vop_vptofh_args *ap)
|
|
{
|
|
return (EOPNOTSUPP);
|
|
}
|
|
|
|
struct vop_vector unionfs_vnodeops = {
|
|
.vop_default = &default_vnodeops,
|
|
|
|
.vop_access = unionfs_access,
|
|
.vop_aclcheck = unionfs_aclcheck,
|
|
.vop_advlock = unionfs_advlock,
|
|
.vop_bmap = VOP_EOPNOTSUPP,
|
|
.vop_cachedlookup = unionfs_lookup,
|
|
.vop_close = unionfs_close,
|
|
.vop_closeextattr = unionfs_closeextattr,
|
|
.vop_create = unionfs_create,
|
|
.vop_deleteextattr = unionfs_deleteextattr,
|
|
.vop_fsync = unionfs_fsync,
|
|
.vop_getacl = unionfs_getacl,
|
|
.vop_getattr = unionfs_getattr,
|
|
.vop_getextattr = unionfs_getextattr,
|
|
.vop_getwritemount = unionfs_getwritemount,
|
|
.vop_inactive = unionfs_inactive,
|
|
.vop_islocked = unionfs_islocked,
|
|
.vop_ioctl = unionfs_ioctl,
|
|
.vop_link = unionfs_link,
|
|
.vop_listextattr = unionfs_listextattr,
|
|
.vop_lock1 = unionfs_lock,
|
|
.vop_lookup = vfs_cache_lookup,
|
|
.vop_mkdir = unionfs_mkdir,
|
|
.vop_mknod = unionfs_mknod,
|
|
.vop_open = unionfs_open,
|
|
.vop_openextattr = unionfs_openextattr,
|
|
.vop_pathconf = unionfs_pathconf,
|
|
.vop_poll = unionfs_poll,
|
|
.vop_print = unionfs_print,
|
|
.vop_read = unionfs_read,
|
|
.vop_readdir = unionfs_readdir,
|
|
.vop_readlink = unionfs_readlink,
|
|
.vop_reclaim = unionfs_reclaim,
|
|
.vop_remove = unionfs_remove,
|
|
.vop_rename = unionfs_rename,
|
|
.vop_rmdir = unionfs_rmdir,
|
|
.vop_setacl = unionfs_setacl,
|
|
.vop_setattr = unionfs_setattr,
|
|
.vop_setextattr = unionfs_setextattr,
|
|
.vop_setlabel = unionfs_setlabel,
|
|
.vop_strategy = unionfs_strategy,
|
|
.vop_symlink = unionfs_symlink,
|
|
.vop_unlock = unionfs_unlock,
|
|
.vop_whiteout = unionfs_whiteout,
|
|
.vop_write = unionfs_write,
|
|
.vop_vptofh = unionfs_vptofh,
|
|
};
|