2010-05-17 22:18:00 +00:00
|
|
|
/*****************************************************************************\
|
|
|
|
* Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC.
|
|
|
|
* Copyright (C) 2007 The Regents of the University of California.
|
|
|
|
* Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
|
|
|
|
* Written by Brian Behlendorf <behlendorf1@llnl.gov>.
|
2008-05-26 04:38:26 +00:00
|
|
|
* UCRL-CODE-235197
|
|
|
|
*
|
2010-05-17 22:18:00 +00:00
|
|
|
* This file is part of the SPL, Solaris Porting Layer.
|
2013-03-05 01:26:55 +00:00
|
|
|
* For details, see <http://zfsonlinux.org/>.
|
2010-05-17 22:18:00 +00:00
|
|
|
*
|
|
|
|
* The SPL is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License as published by the
|
|
|
|
* Free Software Foundation; either version 2 of the License, or (at your
|
|
|
|
* option) any later version.
|
2008-05-26 04:38:26 +00:00
|
|
|
*
|
2010-05-17 22:18:00 +00:00
|
|
|
* The SPL is distributed in the hope that it will be useful, but WITHOUT
|
2008-05-26 04:38:26 +00:00
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
|
|
* for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
2010-05-17 22:18:00 +00:00
|
|
|
* with the SPL. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*****************************************************************************
|
|
|
|
* Solaris Porting Layer (SPL) Vnode Implementation.
|
|
|
|
\*****************************************************************************/
|
2008-05-26 04:38:26 +00:00
|
|
|
|
2013-07-13 20:34:56 +00:00
|
|
|
#include <sys/cred.h>
|
2008-03-12 20:52:46 +00:00
|
|
|
#include <sys/vnode.h>
|
2014-12-08 18:04:42 +00:00
|
|
|
#include <sys/kmem_cache.h>
|
2012-09-03 12:56:26 +00:00
|
|
|
#include <linux/falloc.h>
|
2014-11-14 18:18:05 +00:00
|
|
|
#include <linux/file_compat.h>
|
2008-04-21 17:29:47 +00:00
|
|
|
|
2009-10-01 23:06:15 +00:00
|
|
|
vnode_t *rootdir = (vnode_t *)0xabcd1234;
|
2008-03-12 20:52:46 +00:00
|
|
|
EXPORT_SYMBOL(rootdir);
|
|
|
|
|
2008-08-05 04:16:09 +00:00
|
|
|
static spl_kmem_cache_t *vn_cache;
|
|
|
|
static spl_kmem_cache_t *vn_file_cache;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2011-04-20 19:01:11 +00:00
|
|
|
static DEFINE_SPINLOCK(vn_file_lock);
|
2008-03-18 23:20:30 +00:00
|
|
|
static LIST_HEAD(vn_file_list);
|
2008-03-14 00:04:01 +00:00
|
|
|
|
2011-01-11 19:53:05 +00:00
|
|
|
vtype_t
|
|
|
|
vn_mode_to_vtype(mode_t mode)
|
2008-03-12 20:52:46 +00:00
|
|
|
{
|
|
|
|
if (S_ISREG(mode))
|
|
|
|
return VREG;
|
|
|
|
|
|
|
|
if (S_ISDIR(mode))
|
|
|
|
return VDIR;
|
|
|
|
|
|
|
|
if (S_ISCHR(mode))
|
|
|
|
return VCHR;
|
|
|
|
|
|
|
|
if (S_ISBLK(mode))
|
|
|
|
return VBLK;
|
|
|
|
|
|
|
|
if (S_ISFIFO(mode))
|
|
|
|
return VFIFO;
|
|
|
|
|
|
|
|
if (S_ISLNK(mode))
|
|
|
|
return VLNK;
|
|
|
|
|
|
|
|
if (S_ISSOCK(mode))
|
|
|
|
return VSOCK;
|
|
|
|
|
|
|
|
if (S_ISCHR(mode))
|
|
|
|
return VCHR;
|
|
|
|
|
|
|
|
return VNON;
|
2011-01-11 19:53:05 +00:00
|
|
|
} /* vn_mode_to_vtype() */
|
|
|
|
EXPORT_SYMBOL(vn_mode_to_vtype);
|
|
|
|
|
|
|
|
mode_t
|
|
|
|
vn_vtype_to_mode(vtype_t vtype)
|
|
|
|
{
|
|
|
|
if (vtype == VREG)
|
|
|
|
return S_IFREG;
|
|
|
|
|
|
|
|
if (vtype == VDIR)
|
|
|
|
return S_IFDIR;
|
|
|
|
|
|
|
|
if (vtype == VCHR)
|
|
|
|
return S_IFCHR;
|
|
|
|
|
|
|
|
if (vtype == VBLK)
|
|
|
|
return S_IFBLK;
|
|
|
|
|
|
|
|
if (vtype == VFIFO)
|
|
|
|
return S_IFIFO;
|
|
|
|
|
|
|
|
if (vtype == VLNK)
|
|
|
|
return S_IFLNK;
|
|
|
|
|
|
|
|
if (vtype == VSOCK)
|
|
|
|
return S_IFSOCK;
|
|
|
|
|
|
|
|
return VNON;
|
|
|
|
} /* vn_vtype_to_mode() */
|
|
|
|
EXPORT_SYMBOL(vn_vtype_to_mode);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2008-03-14 00:04:01 +00:00
|
|
|
vnode_t *
|
|
|
|
vn_alloc(int flag)
|
|
|
|
{
|
|
|
|
vnode_t *vp;
|
|
|
|
|
|
|
|
vp = kmem_cache_alloc(vn_cache, flag);
|
|
|
|
if (vp != NULL) {
|
2008-03-18 23:20:30 +00:00
|
|
|
vp->v_file = NULL;
|
2008-03-14 00:04:01 +00:00
|
|
|
vp->v_type = 0;
|
|
|
|
}
|
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (vp);
|
2008-03-14 00:04:01 +00:00
|
|
|
} /* vn_alloc() */
|
|
|
|
EXPORT_SYMBOL(vn_alloc);
|
|
|
|
|
|
|
|
void
|
|
|
|
vn_free(vnode_t *vp)
|
|
|
|
{
|
|
|
|
kmem_cache_free(vn_cache, vp);
|
|
|
|
} /* vn_free() */
|
|
|
|
EXPORT_SYMBOL(vn_free);
|
|
|
|
|
2008-03-07 23:07:02 +00:00
|
|
|
int
|
2008-03-14 00:04:01 +00:00
|
|
|
vn_open(const char *path, uio_seg_t seg, int flags, int mode,
|
2008-03-12 20:52:46 +00:00
|
|
|
vnode_t **vpp, int x1, void *x2)
|
2008-03-07 23:07:02 +00:00
|
|
|
{
|
2010-01-07 16:58:30 +00:00
|
|
|
struct file *fp;
|
|
|
|
struct kstat stat;
|
|
|
|
int rc, saved_umask = 0;
|
2010-08-12 16:24:31 +00:00
|
|
|
gfp_t saved_gfp;
|
2008-03-07 23:07:02 +00:00
|
|
|
vnode_t *vp;
|
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(flags & (FWRITE | FREAD));
|
|
|
|
ASSERT(seg == UIO_SYSSPACE);
|
|
|
|
ASSERT(vpp);
|
2008-03-12 20:52:46 +00:00
|
|
|
*vpp = NULL;
|
|
|
|
|
|
|
|
if (!(flags & FCREAT) && (flags & FWRITE))
|
|
|
|
flags |= FEXCL;
|
|
|
|
|
2008-04-04 17:08:12 +00:00
|
|
|
/* Note for filp_open() the two low bits must be remapped to mean:
|
|
|
|
* 01 - read-only -> 00 read-only
|
|
|
|
* 10 - write-only -> 01 write-only
|
|
|
|
* 11 - read-write -> 10 read-write
|
|
|
|
*/
|
|
|
|
flags--;
|
2008-03-07 23:07:02 +00:00
|
|
|
|
|
|
|
if (flags & FCREAT)
|
2008-03-12 20:52:46 +00:00
|
|
|
saved_umask = xchg(¤t->fs->umask, 0);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2010-01-07 16:58:30 +00:00
|
|
|
fp = filp_open(path, flags, mode);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
|
|
|
if (flags & FCREAT)
|
2008-03-12 20:52:46 +00:00
|
|
|
(void)xchg(¤t->fs->umask, saved_umask);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2010-01-07 16:58:30 +00:00
|
|
|
if (IS_ERR(fp))
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-PTR_ERR(fp));
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2013-03-04 05:02:43 +00:00
|
|
|
#ifdef HAVE_2ARGS_VFS_GETATTR
|
|
|
|
rc = vfs_getattr(&fp->f_path, &stat);
|
|
|
|
#else
|
2013-03-04 04:45:33 +00:00
|
|
|
rc = vfs_getattr(fp->f_path.mnt, fp->f_dentry, &stat);
|
2013-03-04 05:02:43 +00:00
|
|
|
#endif
|
2008-03-12 20:52:46 +00:00
|
|
|
if (rc) {
|
|
|
|
filp_close(fp, 0);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2008-03-07 23:07:02 +00:00
|
|
|
}
|
|
|
|
|
2008-03-14 00:04:01 +00:00
|
|
|
vp = vn_alloc(KM_SLEEP);
|
2008-03-12 20:52:46 +00:00
|
|
|
if (!vp) {
|
|
|
|
filp_close(fp, 0);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (ENOMEM);
|
2008-03-12 20:52:46 +00:00
|
|
|
}
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2010-08-12 16:24:31 +00:00
|
|
|
saved_gfp = mapping_gfp_mask(fp->f_mapping);
|
|
|
|
mapping_set_gfp_mask(fp->f_mapping, saved_gfp & ~(__GFP_IO|__GFP_FS));
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
mutex_enter(&vp->v_lock);
|
2011-01-11 19:53:05 +00:00
|
|
|
vp->v_type = vn_mode_to_vtype(stat.mode);
|
2008-03-18 23:20:30 +00:00
|
|
|
vp->v_file = fp;
|
2010-08-12 16:24:31 +00:00
|
|
|
vp->v_gfp_mask = saved_gfp;
|
2008-03-12 20:52:46 +00:00
|
|
|
*vpp = vp;
|
2008-03-18 23:20:30 +00:00
|
|
|
mutex_exit(&vp->v_lock);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2008-03-12 20:52:46 +00:00
|
|
|
} /* vn_open() */
|
|
|
|
EXPORT_SYMBOL(vn_open);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
|
|
|
int
|
2008-03-14 00:04:01 +00:00
|
|
|
vn_openat(const char *path, uio_seg_t seg, int flags, int mode,
|
2008-03-12 20:52:46 +00:00
|
|
|
vnode_t **vpp, int x1, void *x2, vnode_t *vp, int fd)
|
2008-03-07 23:07:02 +00:00
|
|
|
{
|
2008-03-12 20:52:46 +00:00
|
|
|
char *realpath;
|
2008-11-04 23:30:15 +00:00
|
|
|
int len, rc;
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(vp == rootdir);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2008-11-04 23:30:15 +00:00
|
|
|
len = strlen(path) + 2;
|
2015-01-21 17:21:51 +00:00
|
|
|
realpath = kmalloc(len, kmem_flags_convert(KM_SLEEP));
|
2008-03-12 20:52:46 +00:00
|
|
|
if (!realpath)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (ENOMEM);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2008-11-04 23:30:15 +00:00
|
|
|
(void)snprintf(realpath, len, "/%s", path);
|
2008-03-12 20:52:46 +00:00
|
|
|
rc = vn_open(realpath, seg, flags, mode, vpp, x1, x2);
|
|
|
|
kfree(realpath);
|
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (rc);
|
2008-03-12 20:52:46 +00:00
|
|
|
} /* vn_openat() */
|
|
|
|
EXPORT_SYMBOL(vn_openat);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
|
|
|
int
|
2008-03-12 20:52:46 +00:00
|
|
|
vn_rdwr(uio_rw_t uio, vnode_t *vp, void *addr, ssize_t len, offset_t off,
|
2010-04-23 19:19:10 +00:00
|
|
|
uio_seg_t seg, int ioflag, rlim64_t x2, void *x3, ssize_t *residp)
|
2008-03-07 23:07:02 +00:00
|
|
|
{
|
2008-03-12 20:52:46 +00:00
|
|
|
loff_t offset;
|
|
|
|
mm_segment_t saved_fs;
|
|
|
|
struct file *fp;
|
|
|
|
int rc;
|
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(uio == UIO_WRITE || uio == UIO_READ);
|
|
|
|
ASSERT(vp);
|
|
|
|
ASSERT(vp->v_file);
|
|
|
|
ASSERT(seg == UIO_SYSSPACE);
|
2010-04-23 19:19:10 +00:00
|
|
|
ASSERT((ioflag & ~FAPPEND) == 0);
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(x2 == RLIM64_INFINITY);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
fp = vp->v_file;
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2010-04-23 19:19:10 +00:00
|
|
|
offset = off;
|
|
|
|
if (ioflag & FAPPEND)
|
|
|
|
offset = fp->f_pos;
|
|
|
|
|
2008-03-12 20:52:46 +00:00
|
|
|
/* Writable user data segment must be briefly increased for this
|
|
|
|
* process so we can use the user space read call paths to write
|
|
|
|
* in to memory allocated by the kernel. */
|
|
|
|
saved_fs = get_fs();
|
|
|
|
set_fs(get_ds());
|
|
|
|
|
|
|
|
if (uio & UIO_WRITE)
|
|
|
|
rc = vfs_write(fp, addr, len, &offset);
|
|
|
|
else
|
|
|
|
rc = vfs_read(fp, addr, len, &offset);
|
|
|
|
|
|
|
|
set_fs(saved_fs);
|
2011-10-12 10:49:18 +00:00
|
|
|
fp->f_pos = offset;
|
2008-03-12 20:52:46 +00:00
|
|
|
|
|
|
|
if (rc < 0)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2008-03-07 23:07:02 +00:00
|
|
|
|
2008-03-12 20:52:46 +00:00
|
|
|
if (residp) {
|
|
|
|
*residp = len - rc;
|
2008-03-07 23:07:02 +00:00
|
|
|
} else {
|
2008-03-12 20:52:46 +00:00
|
|
|
if (rc != len)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (EIO);
|
2008-03-07 23:07:02 +00:00
|
|
|
}
|
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2008-03-12 20:52:46 +00:00
|
|
|
} /* vn_rdwr() */
|
|
|
|
EXPORT_SYMBOL(vn_rdwr);
|
|
|
|
|
|
|
|
int
|
2008-03-12 21:33:28 +00:00
|
|
|
vn_close(vnode_t *vp, int flags, int x1, int x2, void *x3, void *x4)
|
2008-03-12 20:52:46 +00:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(vp);
|
|
|
|
ASSERT(vp->v_file);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2010-08-12 16:24:31 +00:00
|
|
|
mapping_set_gfp_mask(vp->v_file->f_mapping, vp->v_gfp_mask);
|
2009-01-09 21:59:39 +00:00
|
|
|
rc = filp_close(vp->v_file, 0);
|
|
|
|
vn_free(vp);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2008-03-12 20:52:46 +00:00
|
|
|
} /* vn_close() */
|
|
|
|
EXPORT_SYMBOL(vn_close);
|
|
|
|
|
2009-01-09 21:59:39 +00:00
|
|
|
/* vn_seek() does not actually seek it only performs bounds checking on the
|
|
|
|
* proposed seek. We perform minimal checking and allow vn_rdwr() to catch
|
|
|
|
* anything more serious. */
|
|
|
|
int
|
2011-03-01 22:02:06 +00:00
|
|
|
vn_seek(vnode_t *vp, offset_t ooff, offset_t *noffp, void *ct)
|
2009-01-09 21:59:39 +00:00
|
|
|
{
|
|
|
|
return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(vn_seek);
|
|
|
|
|
2014-06-29 05:00:02 +00:00
|
|
|
/*
|
|
|
|
* spl_basename() takes a NULL-terminated string s as input containing a path.
|
|
|
|
* It returns a char pointer to a string and a length that describe the
|
|
|
|
* basename of the path. If the basename is not "." or "/", it will be an index
|
|
|
|
* into the string. While the string should be NULL terminated, the section
|
|
|
|
* referring to the basename is not. spl_basename is dual-licensed GPLv2+ and
|
|
|
|
* CC0. Anyone wishing to reuse it in another codebase may pick either license.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
spl_basename(const char *s, const char **str, int *len)
|
|
|
|
{
|
|
|
|
size_t i, end;
|
|
|
|
|
|
|
|
ASSERT(str);
|
|
|
|
ASSERT(len);
|
|
|
|
|
|
|
|
if (!s || !*s) {
|
|
|
|
*str = ".";
|
|
|
|
*len = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
i = strlen(s) - 1;
|
|
|
|
|
|
|
|
while (i && s[i--] == '/');
|
|
|
|
|
|
|
|
if (i == 0) {
|
|
|
|
*str = "/";
|
|
|
|
*len = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
end = i;
|
|
|
|
|
|
|
|
for (end = i; i; i--) {
|
|
|
|
if (s[i] == '/') {
|
|
|
|
*str = &s[i+1];
|
|
|
|
*len = end - i + 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*str = s;
|
|
|
|
*len = end + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dentry *
|
|
|
|
spl_kern_path_locked(const char *name, struct path *path)
|
|
|
|
{
|
|
|
|
struct path parent;
|
|
|
|
struct dentry *dentry;
|
|
|
|
const char *basename;
|
|
|
|
int len;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
ASSERT(name);
|
|
|
|
ASSERT(path);
|
|
|
|
|
|
|
|
spl_basename(name, &basename, &len);
|
|
|
|
|
|
|
|
/* We do not accept "." or ".." */
|
|
|
|
if (len <= 2 && basename[0] == '.')
|
|
|
|
if (len == 1 || basename[1] == '.')
|
|
|
|
return (ERR_PTR(-EACCES));
|
|
|
|
|
|
|
|
rc = kern_path(name, LOOKUP_PARENT, &parent);
|
|
|
|
if (rc)
|
|
|
|
return (ERR_PTR(rc));
|
|
|
|
|
2014-10-01 21:07:46 +00:00
|
|
|
spl_inode_lock(parent.dentry->d_inode);
|
2014-06-29 05:00:02 +00:00
|
|
|
|
|
|
|
dentry = lookup_one_len(basename, parent.dentry, len);
|
|
|
|
if (IS_ERR(dentry)) {
|
|
|
|
spl_inode_unlock(parent.dentry->d_inode);
|
|
|
|
path_put(&parent);
|
|
|
|
} else {
|
|
|
|
*path = parent;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (dentry);
|
|
|
|
}
|
|
|
|
|
2012-10-11 14:41:33 +00:00
|
|
|
/* Based on do_unlinkat() from linux/fs/namei.c */
|
|
|
|
int
|
|
|
|
vn_remove(const char *path, uio_seg_t seg, int flags)
|
|
|
|
{
|
|
|
|
struct dentry *dentry;
|
|
|
|
struct path parent;
|
|
|
|
struct inode *inode = NULL;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
ASSERT(seg == UIO_SYSSPACE);
|
|
|
|
ASSERT(flags == RMFILE);
|
|
|
|
|
|
|
|
dentry = spl_kern_path_locked(path, &parent);
|
|
|
|
rc = PTR_ERR(dentry);
|
|
|
|
if (!IS_ERR(dentry)) {
|
2014-11-05 22:30:35 +00:00
|
|
|
if (parent.dentry->d_name.name[parent.dentry->d_name.len]) {
|
|
|
|
rc = 0;
|
|
|
|
goto slashes;
|
|
|
|
}
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
inode = dentry->d_inode;
|
2014-11-05 22:30:35 +00:00
|
|
|
if (inode) {
|
2014-06-29 05:00:02 +00:00
|
|
|
atomic_inc(&inode->i_count);
|
2014-11-05 22:30:35 +00:00
|
|
|
} else {
|
|
|
|
rc = 0;
|
|
|
|
goto slashes;
|
|
|
|
}
|
2012-10-11 14:41:33 +00:00
|
|
|
|
2013-11-25 16:22:33 +00:00
|
|
|
#ifdef HAVE_2ARGS_VFS_UNLINK
|
2012-10-11 14:41:33 +00:00
|
|
|
rc = vfs_unlink(parent.dentry->d_inode, dentry);
|
2013-11-25 16:22:33 +00:00
|
|
|
#else
|
|
|
|
rc = vfs_unlink(parent.dentry->d_inode, dentry, NULL);
|
|
|
|
#endif /* HAVE_2ARGS_VFS_UNLINK */
|
2012-10-11 14:41:33 +00:00
|
|
|
exit1:
|
|
|
|
dput(dentry);
|
2012-12-03 20:01:28 +00:00
|
|
|
} else {
|
|
|
|
return (-rc);
|
2012-10-11 14:41:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
spl_inode_unlock(parent.dentry->d_inode);
|
|
|
|
if (inode)
|
|
|
|
iput(inode); /* truncate the inode here */
|
|
|
|
|
|
|
|
path_put(&parent);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
slashes:
|
|
|
|
rc = !dentry->d_inode ? -ENOENT :
|
|
|
|
S_ISDIR(dentry->d_inode->i_mode) ? -EISDIR : -ENOTDIR;
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit1;
|
2012-10-11 14:41:33 +00:00
|
|
|
} /* vn_remove() */
|
|
|
|
EXPORT_SYMBOL(vn_remove);
|
|
|
|
|
|
|
|
/* Based on do_rename() from linux/fs/namei.c */
|
|
|
|
int
|
|
|
|
vn_rename(const char *oldname, const char *newname, int x1)
|
|
|
|
{
|
|
|
|
struct dentry *old_dir, *new_dir;
|
|
|
|
struct dentry *old_dentry, *new_dentry;
|
|
|
|
struct dentry *trap;
|
|
|
|
struct path old_parent, new_parent;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
old_dentry = spl_kern_path_locked(oldname, &old_parent);
|
2014-11-05 22:30:35 +00:00
|
|
|
if (IS_ERR(old_dentry)) {
|
|
|
|
rc = PTR_ERR(old_dentry);
|
|
|
|
goto exit;
|
|
|
|
}
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
spl_inode_unlock(old_parent.dentry->d_inode);
|
|
|
|
|
|
|
|
new_dentry = spl_kern_path_locked(newname, &new_parent);
|
2014-11-05 22:30:35 +00:00
|
|
|
if (IS_ERR(new_dentry)) {
|
|
|
|
rc = PTR_ERR(new_dentry);
|
|
|
|
goto exit2;
|
|
|
|
}
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
spl_inode_unlock(new_parent.dentry->d_inode);
|
|
|
|
|
|
|
|
rc = -EXDEV;
|
|
|
|
if (old_parent.mnt != new_parent.mnt)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit3;
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
old_dir = old_parent.dentry;
|
|
|
|
new_dir = new_parent.dentry;
|
|
|
|
trap = lock_rename(new_dir, old_dir);
|
|
|
|
|
|
|
|
/* source should not be ancestor of target */
|
|
|
|
rc = -EINVAL;
|
|
|
|
if (old_dentry == trap)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit4;
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
/* target should not be an ancestor of source */
|
|
|
|
rc = -ENOTEMPTY;
|
|
|
|
if (new_dentry == trap)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit4;
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
/* source must exist */
|
|
|
|
rc = -ENOENT;
|
|
|
|
if (!old_dentry->d_inode)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit4;
|
2012-10-11 14:41:33 +00:00
|
|
|
|
|
|
|
/* unless the source is a directory trailing slashes give -ENOTDIR */
|
|
|
|
if (!S_ISDIR(old_dentry->d_inode->i_mode)) {
|
|
|
|
rc = -ENOTDIR;
|
|
|
|
if (old_dentry->d_name.name[old_dentry->d_name.len])
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit4;
|
2012-10-11 14:41:33 +00:00
|
|
|
if (new_dentry->d_name.name[new_dentry->d_name.len])
|
2014-11-05 22:30:35 +00:00
|
|
|
goto exit4;
|
2012-10-11 14:41:33 +00:00
|
|
|
}
|
|
|
|
|
2014-05-07 17:54:37 +00:00
|
|
|
#if defined(HAVE_4ARGS_VFS_RENAME)
|
2012-10-11 14:41:33 +00:00
|
|
|
rc = vfs_rename(old_dir->d_inode, old_dentry,
|
2013-11-25 16:22:33 +00:00
|
|
|
new_dir->d_inode, new_dentry);
|
2014-05-07 17:54:37 +00:00
|
|
|
#elif defined(HAVE_5ARGS_VFS_RENAME)
|
2013-11-25 16:22:33 +00:00
|
|
|
rc = vfs_rename(old_dir->d_inode, old_dentry,
|
|
|
|
new_dir->d_inode, new_dentry, NULL);
|
2014-05-07 17:54:37 +00:00
|
|
|
#else
|
|
|
|
rc = vfs_rename(old_dir->d_inode, old_dentry,
|
|
|
|
new_dir->d_inode, new_dentry, NULL, 0);
|
|
|
|
#endif
|
2012-10-11 14:41:33 +00:00
|
|
|
exit4:
|
|
|
|
unlock_rename(new_dir, old_dir);
|
|
|
|
exit3:
|
|
|
|
dput(new_dentry);
|
|
|
|
path_put(&new_parent);
|
|
|
|
exit2:
|
|
|
|
dput(old_dentry);
|
|
|
|
path_put(&old_parent);
|
|
|
|
exit:
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2012-10-11 14:41:33 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(vn_rename);
|
|
|
|
|
2008-03-12 20:52:46 +00:00
|
|
|
int
|
2008-03-12 23:48:28 +00:00
|
|
|
vn_getattr(vnode_t *vp, vattr_t *vap, int flags, void *x3, void *x4)
|
2008-03-07 23:07:02 +00:00
|
|
|
{
|
2008-03-12 20:52:46 +00:00
|
|
|
struct file *fp;
|
2011-01-11 19:56:00 +00:00
|
|
|
struct kstat stat;
|
2008-03-12 20:52:46 +00:00
|
|
|
int rc;
|
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(vp);
|
|
|
|
ASSERT(vp->v_file);
|
|
|
|
ASSERT(vap);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
fp = vp->v_file;
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2013-03-04 05:02:43 +00:00
|
|
|
#ifdef HAVE_2ARGS_VFS_GETATTR
|
|
|
|
rc = vfs_getattr(&fp->f_path, &stat);
|
|
|
|
#else
|
|
|
|
rc = vfs_getattr(fp->f_path.mnt, fp->f_dentry, &stat);
|
|
|
|
#endif
|
2008-03-12 20:52:46 +00:00
|
|
|
if (rc)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2011-01-11 19:53:05 +00:00
|
|
|
vap->va_type = vn_mode_to_vtype(stat.mode);
|
2008-03-12 20:52:46 +00:00
|
|
|
vap->va_mode = stat.mode;
|
2013-07-13 20:34:56 +00:00
|
|
|
vap->va_uid = KUID_TO_SUID(stat.uid);
|
|
|
|
vap->va_gid = KGID_TO_SGID(stat.gid);
|
2008-03-12 20:52:46 +00:00
|
|
|
vap->va_fsid = 0;
|
|
|
|
vap->va_nodeid = stat.ino;
|
|
|
|
vap->va_nlink = stat.nlink;
|
|
|
|
vap->va_size = stat.size;
|
2011-03-01 22:02:06 +00:00
|
|
|
vap->va_blksize = stat.blksize;
|
2011-01-11 19:56:00 +00:00
|
|
|
vap->va_atime = stat.atime;
|
|
|
|
vap->va_mtime = stat.mtime;
|
|
|
|
vap->va_ctime = stat.ctime;
|
2008-03-12 20:52:46 +00:00
|
|
|
vap->va_rdev = stat.rdev;
|
2011-01-11 19:56:00 +00:00
|
|
|
vap->va_nblocks = stat.blocks;
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2008-03-07 23:07:02 +00:00
|
|
|
}
|
2008-03-12 20:52:46 +00:00
|
|
|
EXPORT_SYMBOL(vn_getattr);
|
|
|
|
|
2008-03-12 21:33:28 +00:00
|
|
|
int vn_fsync(vnode_t *vp, int flags, void *x3, void *x4)
|
2008-03-12 20:52:46 +00:00
|
|
|
{
|
2008-03-12 23:48:28 +00:00
|
|
|
int datasync = 0;
|
2015-04-07 17:05:17 +00:00
|
|
|
int error;
|
|
|
|
int fstrans;
|
2008-03-12 23:48:28 +00:00
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(vp);
|
|
|
|
ASSERT(vp->v_file);
|
2008-03-12 20:52:46 +00:00
|
|
|
|
2008-03-12 23:48:28 +00:00
|
|
|
if (flags & FDSYNC)
|
|
|
|
datasync = 1;
|
|
|
|
|
2015-04-07 17:05:17 +00:00
|
|
|
/*
|
|
|
|
* May enter XFS which generates a warning when PF_FSTRANS is set.
|
|
|
|
* To avoid this the flag is cleared over vfs_sync() and then reset.
|
|
|
|
*/
|
|
|
|
fstrans = spl_fstrans_check();
|
|
|
|
if (fstrans)
|
|
|
|
current->flags &= ~(PF_FSTRANS);
|
|
|
|
|
|
|
|
error = -spl_filp_fsync(vp->v_file, datasync);
|
|
|
|
if (fstrans)
|
|
|
|
current->flags |= PF_FSTRANS;
|
|
|
|
|
|
|
|
return (error);
|
2008-03-12 20:52:46 +00:00
|
|
|
} /* vn_fsync() */
|
|
|
|
EXPORT_SYMBOL(vn_fsync);
|
2008-03-14 00:04:01 +00:00
|
|
|
|
2012-09-03 12:56:26 +00:00
|
|
|
int vn_space(vnode_t *vp, int cmd, struct flock *bfp, int flag,
|
|
|
|
offset_t offset, void *x6, void *x7)
|
|
|
|
{
|
|
|
|
int error = EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (cmd != F_FREESP || bfp->l_whence != 0)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (EOPNOTSUPP);
|
2012-09-03 12:56:26 +00:00
|
|
|
|
|
|
|
ASSERT(vp);
|
|
|
|
ASSERT(vp->v_file);
|
|
|
|
ASSERT(bfp->l_start >= 0 && bfp->l_len > 0);
|
|
|
|
|
|
|
|
#ifdef FALLOC_FL_PUNCH_HOLE
|
2013-01-08 17:42:49 +00:00
|
|
|
/*
|
|
|
|
* When supported by the underlying file system preferentially
|
|
|
|
* use the fallocate() callback to preallocate the space.
|
|
|
|
*/
|
|
|
|
error = -spl_filp_fallocate(vp->v_file,
|
|
|
|
FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,
|
|
|
|
bfp->l_start, bfp->l_len);
|
|
|
|
if (error == 0)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2012-09-03 12:56:26 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_INODE_TRUNCATE_RANGE
|
|
|
|
if (vp->v_file->f_dentry && vp->v_file->f_dentry->d_inode &&
|
|
|
|
vp->v_file->f_dentry->d_inode->i_op &&
|
|
|
|
vp->v_file->f_dentry->d_inode->i_op->truncate_range) {
|
|
|
|
off_t end = bfp->l_start + bfp->l_len;
|
|
|
|
/*
|
|
|
|
* Judging from the code in shmem_truncate_range(),
|
|
|
|
* it seems the kernel expects the end offset to be
|
|
|
|
* inclusive and aligned to the end of a page.
|
|
|
|
*/
|
|
|
|
if (end % PAGE_SIZE != 0) {
|
|
|
|
end &= ~(off_t)(PAGE_SIZE - 1);
|
|
|
|
if (end <= bfp->l_start)
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2012-09-03 12:56:26 +00:00
|
|
|
}
|
|
|
|
--end;
|
|
|
|
|
|
|
|
vp->v_file->f_dentry->d_inode->i_op->truncate_range(
|
|
|
|
vp->v_file->f_dentry->d_inode,
|
|
|
|
bfp->l_start, end
|
|
|
|
);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2012-09-03 12:56:26 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (error);
|
2012-09-03 12:56:26 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(vn_space);
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
/* Function must be called while holding the vn_file_lock */
|
|
|
|
static file_t *
|
2015-02-17 15:12:56 +00:00
|
|
|
file_find(int fd, struct task_struct *task)
|
2008-03-18 23:20:30 +00:00
|
|
|
{
|
|
|
|
file_t *fp;
|
|
|
|
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(spin_is_locked(&vn_file_lock));
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
list_for_each_entry(fp, &vn_file_list, f_list) {
|
2015-02-17 15:12:56 +00:00
|
|
|
if (fd == fp->f_fd && fp->f_task == task) {
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(atomic_read(&fp->f_ref) != 0);
|
2008-03-18 23:20:30 +00:00
|
|
|
return fp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
} /* file_find() */
|
|
|
|
|
|
|
|
file_t *
|
|
|
|
vn_getf(int fd)
|
|
|
|
{
|
|
|
|
struct kstat stat;
|
|
|
|
struct file *lfp;
|
|
|
|
file_t *fp;
|
|
|
|
vnode_t *vp;
|
2008-04-21 17:29:47 +00:00
|
|
|
int rc = 0;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2015-04-16 14:29:41 +00:00
|
|
|
if (fd < 0)
|
|
|
|
return (NULL);
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
/* Already open just take an extra reference */
|
|
|
|
spin_lock(&vn_file_lock);
|
|
|
|
|
2015-02-17 15:12:56 +00:00
|
|
|
fp = file_find(fd, current);
|
2008-03-18 23:20:30 +00:00
|
|
|
if (fp) {
|
2015-11-04 21:41:13 +00:00
|
|
|
lfp = fget(fd);
|
|
|
|
fput(fp->f_file);
|
|
|
|
/*
|
|
|
|
* areleasef() can cause us to see a stale reference when
|
|
|
|
* userspace has reused a file descriptor before areleasef()
|
|
|
|
* has run. fput() the stale reference and replace it. We
|
|
|
|
* retain the original reference count such that the concurrent
|
|
|
|
* areleasef() will decrement its reference and terminate.
|
|
|
|
*/
|
|
|
|
if (lfp != fp->f_file) {
|
|
|
|
fp->f_file = lfp;
|
|
|
|
fp->f_vnode->v_file = lfp;
|
|
|
|
}
|
2008-03-18 23:20:30 +00:00
|
|
|
atomic_inc(&fp->f_ref);
|
|
|
|
spin_unlock(&vn_file_lock);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (fp);
|
2008-03-18 23:20:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock(&vn_file_lock);
|
|
|
|
|
|
|
|
/* File was not yet opened create the object and setup */
|
2008-06-25 20:57:45 +00:00
|
|
|
fp = kmem_cache_alloc(vn_file_cache, KM_SLEEP);
|
2008-03-18 23:20:30 +00:00
|
|
|
if (fp == NULL)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto out;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
mutex_enter(&fp->f_lock);
|
|
|
|
|
|
|
|
fp->f_fd = fd;
|
2011-10-11 16:50:52 +00:00
|
|
|
fp->f_task = current;
|
2008-03-18 23:20:30 +00:00
|
|
|
fp->f_offset = 0;
|
|
|
|
atomic_inc(&fp->f_ref);
|
|
|
|
|
|
|
|
lfp = fget(fd);
|
|
|
|
if (lfp == NULL)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto out_mutex;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
vp = vn_alloc(KM_SLEEP);
|
|
|
|
if (vp == NULL)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto out_fget;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2013-03-04 05:02:43 +00:00
|
|
|
#ifdef HAVE_2ARGS_VFS_GETATTR
|
|
|
|
rc = vfs_getattr(&lfp->f_path, &stat);
|
|
|
|
#else
|
|
|
|
rc = vfs_getattr(lfp->f_path.mnt, lfp->f_dentry, &stat);
|
|
|
|
#endif
|
|
|
|
if (rc)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto out_vnode;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
mutex_enter(&vp->v_lock);
|
2011-01-11 19:53:05 +00:00
|
|
|
vp->v_type = vn_mode_to_vtype(stat.mode);
|
2008-03-18 23:20:30 +00:00
|
|
|
vp->v_file = lfp;
|
|
|
|
mutex_exit(&vp->v_lock);
|
|
|
|
|
|
|
|
fp->f_vnode = vp;
|
|
|
|
fp->f_file = lfp;
|
|
|
|
|
|
|
|
/* Put it on the tracking list */
|
|
|
|
spin_lock(&vn_file_lock);
|
|
|
|
list_add(&fp->f_list, &vn_file_list);
|
|
|
|
spin_unlock(&vn_file_lock);
|
|
|
|
|
|
|
|
mutex_exit(&fp->f_lock);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (fp);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
out_vnode:
|
|
|
|
vn_free(vp);
|
|
|
|
out_fget:
|
|
|
|
fput(lfp);
|
|
|
|
out_mutex:
|
|
|
|
mutex_exit(&fp->f_lock);
|
|
|
|
kmem_cache_free(vn_file_cache, fp);
|
|
|
|
out:
|
2014-11-05 22:30:35 +00:00
|
|
|
return (NULL);
|
2008-03-18 23:20:30 +00:00
|
|
|
} /* getf() */
|
|
|
|
EXPORT_SYMBOL(getf);
|
|
|
|
|
|
|
|
static void releasef_locked(file_t *fp)
|
|
|
|
{
|
2008-04-21 17:29:47 +00:00
|
|
|
ASSERT(fp->f_file);
|
|
|
|
ASSERT(fp->f_vnode);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
/* Unlinked from list, no refs, safe to free outside mutex */
|
|
|
|
fput(fp->f_file);
|
|
|
|
vn_free(fp->f_vnode);
|
|
|
|
|
|
|
|
kmem_cache_free(vn_file_cache, fp);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vn_releasef(int fd)
|
2015-02-17 15:12:56 +00:00
|
|
|
{
|
|
|
|
areleasef(fd, P_FINFO(current));
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(releasef);
|
|
|
|
|
|
|
|
void
|
|
|
|
vn_areleasef(int fd, uf_info_t *fip)
|
2008-03-18 23:20:30 +00:00
|
|
|
{
|
|
|
|
file_t *fp;
|
2015-02-17 15:12:56 +00:00
|
|
|
struct task_struct *task = (struct task_struct *)fip;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2015-04-16 14:29:41 +00:00
|
|
|
if (fd < 0)
|
|
|
|
return;
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
spin_lock(&vn_file_lock);
|
2015-02-17 15:12:56 +00:00
|
|
|
fp = file_find(fd, task);
|
2008-03-18 23:20:30 +00:00
|
|
|
if (fp) {
|
|
|
|
atomic_dec(&fp->f_ref);
|
|
|
|
if (atomic_read(&fp->f_ref) > 0) {
|
|
|
|
spin_unlock(&vn_file_lock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
list_del(&fp->f_list);
|
|
|
|
releasef_locked(fp);
|
|
|
|
}
|
|
|
|
spin_unlock(&vn_file_lock);
|
|
|
|
|
|
|
|
return;
|
|
|
|
} /* releasef() */
|
2015-02-17 15:12:56 +00:00
|
|
|
EXPORT_SYMBOL(areleasef);
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2014-10-02 16:47:09 +00:00
|
|
|
static void
|
|
|
|
#ifdef HAVE_SET_FS_PWD_WITH_CONST
|
|
|
|
vn_set_fs_pwd(struct fs_struct *fs, const struct path *path)
|
|
|
|
#else
|
|
|
|
vn_set_fs_pwd(struct fs_struct *fs, struct path *path)
|
|
|
|
#endif /* HAVE_SET_FS_PWD_WITH_CONST */
|
2009-10-01 23:06:15 +00:00
|
|
|
{
|
2010-11-09 19:15:32 +00:00
|
|
|
struct path old_pwd;
|
|
|
|
|
2014-10-02 16:47:09 +00:00
|
|
|
#ifdef HAVE_FS_STRUCT_SPINLOCK
|
2010-11-09 19:15:32 +00:00
|
|
|
spin_lock(&fs->lock);
|
|
|
|
old_pwd = fs->pwd;
|
|
|
|
fs->pwd = *path;
|
|
|
|
path_get(path);
|
|
|
|
spin_unlock(&fs->lock);
|
2014-10-02 16:47:09 +00:00
|
|
|
#else
|
2010-11-09 19:15:32 +00:00
|
|
|
write_lock(&fs->lock);
|
|
|
|
old_pwd = fs->pwd;
|
|
|
|
fs->pwd = *path;
|
|
|
|
path_get(path);
|
|
|
|
write_unlock(&fs->lock);
|
2014-10-02 16:47:09 +00:00
|
|
|
#endif /* HAVE_FS_STRUCT_SPINLOCK */
|
2010-11-09 19:15:32 +00:00
|
|
|
|
|
|
|
if (old_pwd.dentry)
|
|
|
|
path_put(&old_pwd);
|
2009-10-01 23:06:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vn_set_pwd(const char *filename)
|
|
|
|
{
|
|
|
|
struct path path;
|
2010-04-22 19:48:40 +00:00
|
|
|
mm_segment_t saved_fs;
|
2009-10-01 23:06:15 +00:00
|
|
|
int rc;
|
|
|
|
|
2010-04-22 19:48:40 +00:00
|
|
|
/*
|
|
|
|
* user_path_dir() and __user_walk() both expect 'filename' to be
|
|
|
|
* a user space address so we must briefly increase the data segment
|
|
|
|
* size to ensure strncpy_from_user() does not fail with -EFAULT.
|
|
|
|
*/
|
|
|
|
saved_fs = get_fs();
|
|
|
|
set_fs(get_ds());
|
|
|
|
|
2009-10-01 23:06:15 +00:00
|
|
|
rc = user_path_dir(filename, &path);
|
|
|
|
if (rc)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto out;
|
2009-10-01 23:06:15 +00:00
|
|
|
|
|
|
|
rc = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_ACCESS);
|
|
|
|
if (rc)
|
2014-11-05 22:30:35 +00:00
|
|
|
goto dput_and_out;
|
2009-10-01 23:06:15 +00:00
|
|
|
|
2014-10-02 16:47:09 +00:00
|
|
|
vn_set_fs_pwd(current->fs, &path);
|
2009-10-01 23:06:15 +00:00
|
|
|
|
|
|
|
dput_and_out:
|
|
|
|
path_put(&path);
|
|
|
|
out:
|
2010-04-22 19:48:40 +00:00
|
|
|
set_fs(saved_fs);
|
|
|
|
|
2014-11-05 22:30:35 +00:00
|
|
|
return (-rc);
|
2009-10-01 23:06:15 +00:00
|
|
|
} /* vn_set_pwd() */
|
|
|
|
EXPORT_SYMBOL(vn_set_pwd);
|
|
|
|
|
2008-03-14 00:04:01 +00:00
|
|
|
static int
|
|
|
|
vn_cache_constructor(void *buf, void *cdrarg, int kmflags)
|
|
|
|
{
|
|
|
|
struct vnode *vp = buf;
|
|
|
|
|
|
|
|
mutex_init(&vp->v_lock, NULL, MUTEX_DEFAULT, NULL);
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
} /* vn_cache_constructor() */
|
|
|
|
|
|
|
|
static void
|
|
|
|
vn_cache_destructor(void *buf, void *cdrarg)
|
|
|
|
{
|
|
|
|
struct vnode *vp = buf;
|
|
|
|
|
|
|
|
mutex_destroy(&vp->v_lock);
|
|
|
|
} /* vn_cache_destructor() */
|
|
|
|
|
2008-03-18 23:20:30 +00:00
|
|
|
static int
|
|
|
|
vn_file_cache_constructor(void *buf, void *cdrarg, int kmflags)
|
|
|
|
{
|
|
|
|
file_t *fp = buf;
|
|
|
|
|
|
|
|
atomic_set(&fp->f_ref, 0);
|
|
|
|
mutex_init(&fp->f_lock, NULL, MUTEX_DEFAULT, NULL);
|
2008-03-20 23:30:15 +00:00
|
|
|
INIT_LIST_HEAD(&fp->f_list);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
} /* file_cache_constructor() */
|
|
|
|
|
|
|
|
static void
|
|
|
|
vn_file_cache_destructor(void *buf, void *cdrarg)
|
|
|
|
{
|
|
|
|
file_t *fp = buf;
|
|
|
|
|
|
|
|
mutex_destroy(&fp->f_lock);
|
|
|
|
} /* vn_file_cache_destructor() */
|
|
|
|
|
2008-03-14 00:04:01 +00:00
|
|
|
int
|
2011-11-09 20:29:51 +00:00
|
|
|
spl_vn_init(void)
|
2008-03-14 00:04:01 +00:00
|
|
|
{
|
2008-06-02 17:28:49 +00:00
|
|
|
vn_cache = kmem_cache_create("spl_vn_cache",
|
|
|
|
sizeof(struct vnode), 64,
|
2008-03-18 04:56:43 +00:00
|
|
|
vn_cache_constructor,
|
|
|
|
vn_cache_destructor,
|
2011-01-11 19:57:02 +00:00
|
|
|
NULL, NULL, NULL, KMC_KMEM);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
vn_file_cache = kmem_cache_create("spl_vn_file_cache",
|
|
|
|
sizeof(file_t), 64,
|
|
|
|
vn_file_cache_constructor,
|
|
|
|
vn_file_cache_destructor,
|
2011-01-11 19:57:02 +00:00
|
|
|
NULL, NULL, NULL, KMC_KMEM);
|
2014-11-05 22:30:35 +00:00
|
|
|
return (0);
|
2008-03-14 00:04:01 +00:00
|
|
|
} /* vn_init() */
|
|
|
|
|
|
|
|
void
|
2011-11-09 20:29:51 +00:00
|
|
|
spl_vn_fini(void)
|
2008-03-14 00:04:01 +00:00
|
|
|
{
|
2008-03-18 23:20:30 +00:00
|
|
|
file_t *fp, *next_fp;
|
2008-06-13 23:41:06 +00:00
|
|
|
int leaked = 0;
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
spin_lock(&vn_file_lock);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(fp, next_fp, &vn_file_list, f_list) {
|
|
|
|
list_del(&fp->f_list);
|
|
|
|
releasef_locked(fp);
|
|
|
|
leaked++;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock(&vn_file_lock);
|
|
|
|
|
|
|
|
if (leaked > 0)
|
2014-11-05 22:30:35 +00:00
|
|
|
printk(KERN_WARNING "WARNING: %d vnode files leaked\n", leaked);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
2012-06-11 16:12:37 +00:00
|
|
|
kmem_cache_destroy(vn_file_cache);
|
2008-06-13 23:41:06 +00:00
|
|
|
kmem_cache_destroy(vn_cache);
|
2008-03-18 23:20:30 +00:00
|
|
|
|
|
|
|
return;
|
2008-03-14 00:04:01 +00:00
|
|
|
} /* vn_fini() */
|