xref: /illumos-gate/usr/src/uts/common/fs/ufs/ufs_vnops.c (revision 342440ec94087b8c751c580ab9ed6c693d31d418)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
55b024a5bSbatschul  * Common Development and Distribution License (the "License").
65b024a5bSbatschul  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
21*342440ecSPrasad Singamsetty 
227c478bd9Sstevel@tonic-gate /*
236ac3b8a8Svsakar  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
247c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
257c478bd9Sstevel@tonic-gate  */
267c478bd9Sstevel@tonic-gate 
277c478bd9Sstevel@tonic-gate /*	Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T	*/
287c478bd9Sstevel@tonic-gate /*	  All Rights Reserved  	*/
297c478bd9Sstevel@tonic-gate 
307c478bd9Sstevel@tonic-gate /*
317c478bd9Sstevel@tonic-gate  * Portions of this source code were derived from Berkeley 4.3 BSD
327c478bd9Sstevel@tonic-gate  * under license from the Regents of the University of California.
337c478bd9Sstevel@tonic-gate  */
347c478bd9Sstevel@tonic-gate 
357c478bd9Sstevel@tonic-gate #include <sys/types.h>
367c478bd9Sstevel@tonic-gate #include <sys/t_lock.h>
377c478bd9Sstevel@tonic-gate #include <sys/ksynch.h>
387c478bd9Sstevel@tonic-gate #include <sys/param.h>
397c478bd9Sstevel@tonic-gate #include <sys/time.h>
407c478bd9Sstevel@tonic-gate #include <sys/systm.h>
417c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h>
427c478bd9Sstevel@tonic-gate #include <sys/resource.h>
437c478bd9Sstevel@tonic-gate #include <sys/signal.h>
447c478bd9Sstevel@tonic-gate #include <sys/cred.h>
457c478bd9Sstevel@tonic-gate #include <sys/user.h>
467c478bd9Sstevel@tonic-gate #include <sys/buf.h>
477c478bd9Sstevel@tonic-gate #include <sys/vfs.h>
48aa59c4cbSrsb #include <sys/vfs_opreg.h>
497c478bd9Sstevel@tonic-gate #include <sys/vnode.h>
507c478bd9Sstevel@tonic-gate #include <sys/proc.h>
517c478bd9Sstevel@tonic-gate #include <sys/disp.h>
527c478bd9Sstevel@tonic-gate #include <sys/file.h>
537c478bd9Sstevel@tonic-gate #include <sys/fcntl.h>
547c478bd9Sstevel@tonic-gate #include <sys/flock.h>
55bc69f433Saguzovsk #include <sys/atomic.h>
567c478bd9Sstevel@tonic-gate #include <sys/kmem.h>
577c478bd9Sstevel@tonic-gate #include <sys/uio.h>
587c478bd9Sstevel@tonic-gate #include <sys/dnlc.h>
597c478bd9Sstevel@tonic-gate #include <sys/conf.h>
607c478bd9Sstevel@tonic-gate #include <sys/mman.h>
617c478bd9Sstevel@tonic-gate #include <sys/pathname.h>
627c478bd9Sstevel@tonic-gate #include <sys/debug.h>
637c478bd9Sstevel@tonic-gate #include <sys/vmsystm.h>
647c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
657c478bd9Sstevel@tonic-gate #include <sys/filio.h>
667c478bd9Sstevel@tonic-gate #include <sys/policy.h>
677c478bd9Sstevel@tonic-gate 
687c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_fs.h>
697c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_lockfs.h>
707c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_filio.h>
717c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_inode.h>
727c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_fsdir.h>
737c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_quota.h>
747c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_log.h>
757c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_snap.h>
767c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_trans.h>
777c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_panic.h>
787c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_bio.h>
797c478bd9Sstevel@tonic-gate #include <sys/dirent.h>		/* must be AFTER <sys/fs/fsdir.h>! */
807c478bd9Sstevel@tonic-gate #include <sys/errno.h>
817c478bd9Sstevel@tonic-gate #include <sys/fssnap_if.h>
827c478bd9Sstevel@tonic-gate #include <sys/unistd.h>
837c478bd9Sstevel@tonic-gate #include <sys/sunddi.h>
847c478bd9Sstevel@tonic-gate 
857c478bd9Sstevel@tonic-gate #include <sys/filio.h>		/* _FIOIO */
867c478bd9Sstevel@tonic-gate 
877c478bd9Sstevel@tonic-gate #include <vm/hat.h>
887c478bd9Sstevel@tonic-gate #include <vm/page.h>
897c478bd9Sstevel@tonic-gate #include <vm/pvn.h>
907c478bd9Sstevel@tonic-gate #include <vm/as.h>
917c478bd9Sstevel@tonic-gate #include <vm/seg.h>
927c478bd9Sstevel@tonic-gate #include <vm/seg_map.h>
937c478bd9Sstevel@tonic-gate #include <vm/seg_vn.h>
947c478bd9Sstevel@tonic-gate #include <vm/seg_kmem.h>
957c478bd9Sstevel@tonic-gate #include <vm/rm.h>
967c478bd9Sstevel@tonic-gate #include <sys/swap.h>
977c478bd9Sstevel@tonic-gate 
987c478bd9Sstevel@tonic-gate #include <fs/fs_subr.h>
997c478bd9Sstevel@tonic-gate 
100986fd29aSsetje #include <sys/fs/decomp.h>
101986fd29aSsetje 
1027c478bd9Sstevel@tonic-gate static struct instats ins;
1037c478bd9Sstevel@tonic-gate 
1047c478bd9Sstevel@tonic-gate static 	int ufs_getpage_ra(struct vnode *, u_offset_t, struct seg *, caddr_t);
1057c478bd9Sstevel@tonic-gate static	int ufs_getpage_miss(struct vnode *, u_offset_t, size_t, struct seg *,
1067c478bd9Sstevel@tonic-gate 		caddr_t, struct page **, size_t, enum seg_rw, int);
107da6c28aaSamw static	int ufs_open(struct vnode **, int, struct cred *, caller_context_t *);
108da6c28aaSamw static	int ufs_close(struct vnode *, int, int, offset_t, struct cred *,
109da6c28aaSamw 		caller_context_t *);
1107c478bd9Sstevel@tonic-gate static	int ufs_read(struct vnode *, struct uio *, int, struct cred *,
111da6c28aaSamw 		struct caller_context *);
1127c478bd9Sstevel@tonic-gate static	int ufs_write(struct vnode *, struct uio *, int, struct cred *,
113da6c28aaSamw 		struct caller_context *);
114da6c28aaSamw static	int ufs_ioctl(struct vnode *, int, intptr_t, int, struct cred *,
115da6c28aaSamw 		int *, caller_context_t *);
116da6c28aaSamw static	int ufs_getattr(struct vnode *, struct vattr *, int, struct cred *,
117da6c28aaSamw 		caller_context_t *);
1187c478bd9Sstevel@tonic-gate static	int ufs_setattr(struct vnode *, struct vattr *, int, struct cred *,
119da6c28aaSamw 		caller_context_t *);
120da6c28aaSamw static	int ufs_access(struct vnode *, int, int, struct cred *,
121da6c28aaSamw 		caller_context_t *);
1227c478bd9Sstevel@tonic-gate static	int ufs_lookup(struct vnode *, char *, struct vnode **,
123da6c28aaSamw 		struct pathname *, int, struct vnode *, struct cred *,
124da6c28aaSamw 		caller_context_t *, int *, pathname_t *);
1257c478bd9Sstevel@tonic-gate static	int ufs_create(struct vnode *, char *, struct vattr *, enum vcexcl,
126da6c28aaSamw 		int, struct vnode **, struct cred *, int,
127da6c28aaSamw 		caller_context_t *, vsecattr_t  *);
128da6c28aaSamw static	int ufs_remove(struct vnode *, char *, struct cred *,
129da6c28aaSamw 		caller_context_t *, int);
130da6c28aaSamw static	int ufs_link(struct vnode *, struct vnode *, char *, struct cred *,
131da6c28aaSamw 		caller_context_t *, int);
1327c478bd9Sstevel@tonic-gate static	int ufs_rename(struct vnode *, char *, struct vnode *, char *,
133da6c28aaSamw 		struct cred *, caller_context_t *, int);
1347c478bd9Sstevel@tonic-gate static	int ufs_mkdir(struct vnode *, char *, struct vattr *, struct vnode **,
135da6c28aaSamw 		struct cred *, caller_context_t *, int, vsecattr_t *);
136da6c28aaSamw static	int ufs_rmdir(struct vnode *, char *, struct vnode *, struct cred *,
137da6c28aaSamw 		caller_context_t *, int);
138da6c28aaSamw static	int ufs_readdir(struct vnode *, struct uio *, struct cred *, int *,
139da6c28aaSamw 		caller_context_t *, int);
1407c478bd9Sstevel@tonic-gate static	int ufs_symlink(struct vnode *, char *, struct vattr *, char *,
141da6c28aaSamw 		struct cred *, caller_context_t *, int);
142da6c28aaSamw static	int ufs_readlink(struct vnode *, struct uio *, struct cred *,
143da6c28aaSamw 		caller_context_t *);
144da6c28aaSamw static	int ufs_fsync(struct vnode *, int, struct cred *, caller_context_t *);
145da6c28aaSamw static	void ufs_inactive(struct vnode *, struct cred *, caller_context_t *);
146da6c28aaSamw static	int ufs_fid(struct vnode *, struct fid *, caller_context_t *);
1477c478bd9Sstevel@tonic-gate static	int ufs_rwlock(struct vnode *, int, caller_context_t *);
1487c478bd9Sstevel@tonic-gate static	void ufs_rwunlock(struct vnode *, int, caller_context_t *);
149da6c28aaSamw static	int ufs_seek(struct vnode *, offset_t, offset_t *, caller_context_t *);
1507c478bd9Sstevel@tonic-gate static	int ufs_frlock(struct vnode *, int, struct flock64 *, int, offset_t,
151da6c28aaSamw 		struct flk_callback *, struct cred *,
152da6c28aaSamw 		caller_context_t *);
1537c478bd9Sstevel@tonic-gate static  int ufs_space(struct vnode *, int, struct flock64 *, int, offset_t,
1547c478bd9Sstevel@tonic-gate 		cred_t *, caller_context_t *);
1557c478bd9Sstevel@tonic-gate static	int ufs_getpage(struct vnode *, offset_t, size_t, uint_t *,
1567c478bd9Sstevel@tonic-gate 		struct page **, size_t, struct seg *, caddr_t,
157da6c28aaSamw 		enum seg_rw, struct cred *, caller_context_t *);
158da6c28aaSamw static	int ufs_putpage(struct vnode *, offset_t, size_t, int, struct cred *,
159da6c28aaSamw 		caller_context_t *);
1607c478bd9Sstevel@tonic-gate static	int ufs_putpages(struct vnode *, offset_t, size_t, int, struct cred *);
1617c478bd9Sstevel@tonic-gate static	int ufs_map(struct vnode *, offset_t, struct as *, caddr_t *, size_t,
162da6c28aaSamw 		uchar_t, uchar_t, uint_t, struct cred *, caller_context_t *);
1637c478bd9Sstevel@tonic-gate static	int ufs_addmap(struct vnode *, offset_t, struct as *, caddr_t,  size_t,
164da6c28aaSamw 		uchar_t, uchar_t, uint_t, struct cred *, caller_context_t *);
1657c478bd9Sstevel@tonic-gate static	int ufs_delmap(struct vnode *, offset_t, struct as *, caddr_t,  size_t,
166da6c28aaSamw 		uint_t, uint_t, uint_t, struct cred *, caller_context_t *);
167da6c28aaSamw static	int ufs_poll(vnode_t *, short, int, short *, struct pollhead **,
168da6c28aaSamw 		caller_context_t *);
169d7334e51Srm static	int ufs_dump(vnode_t *, caddr_t, offset_t, offset_t,
170d7334e51Srm     caller_context_t *);
171da6c28aaSamw static	int ufs_l_pathconf(struct vnode *, int, ulong_t *, struct cred *,
172da6c28aaSamw 		caller_context_t *);
1737c478bd9Sstevel@tonic-gate static	int ufs_pageio(struct vnode *, struct page *, u_offset_t, size_t, int,
174da6c28aaSamw 		struct cred *, caller_context_t *);
175d7334e51Srm static	int ufs_dumpctl(vnode_t *, int, offset_t *, caller_context_t *);
1767c478bd9Sstevel@tonic-gate static	daddr32_t *save_dblks(struct inode *, struct ufsvfs *, daddr32_t *,
177da6c28aaSamw 		daddr32_t *, int, int);
178da6c28aaSamw static	int ufs_getsecattr(struct vnode *, vsecattr_t *, int, struct cred *,
179da6c28aaSamw 		caller_context_t *);
180da6c28aaSamw static	int ufs_setsecattr(struct vnode *, vsecattr_t *, int, struct cred *,
181da6c28aaSamw 		caller_context_t *);
18202ff05a9Svsakar extern int as_map_locked(struct as *, caddr_t, size_t, int ((*)()), void *);
18302ff05a9Svsakar 
1847c478bd9Sstevel@tonic-gate /*
1857c478bd9Sstevel@tonic-gate  * For lockfs: ulockfs begin/end is now inlined in the ufs_xxx functions.
1867c478bd9Sstevel@tonic-gate  *
1877c478bd9Sstevel@tonic-gate  * XXX - ULOCKFS in fs_pathconf and ufs_ioctl is not inlined yet.
1887c478bd9Sstevel@tonic-gate  */
1897c478bd9Sstevel@tonic-gate struct vnodeops *ufs_vnodeops;
1907c478bd9Sstevel@tonic-gate 
191aa59c4cbSrsb /* NOTE: "not blkd" below  means that the operation isn't blocked by lockfs */
1927c478bd9Sstevel@tonic-gate const fs_operation_def_t ufs_vnodeops_template[] = {
193aa59c4cbSrsb 	VOPNAME_OPEN,		{ .vop_open = ufs_open },	/* not blkd */
194aa59c4cbSrsb 	VOPNAME_CLOSE,		{ .vop_close = ufs_close },	/* not blkd */
195aa59c4cbSrsb 	VOPNAME_READ,		{ .vop_read = ufs_read },
196aa59c4cbSrsb 	VOPNAME_WRITE,		{ .vop_write = ufs_write },
197aa59c4cbSrsb 	VOPNAME_IOCTL,		{ .vop_ioctl = ufs_ioctl },
198aa59c4cbSrsb 	VOPNAME_GETATTR,	{ .vop_getattr = ufs_getattr },
199aa59c4cbSrsb 	VOPNAME_SETATTR,	{ .vop_setattr = ufs_setattr },
200aa59c4cbSrsb 	VOPNAME_ACCESS,		{ .vop_access = ufs_access },
201aa59c4cbSrsb 	VOPNAME_LOOKUP,		{ .vop_lookup = ufs_lookup },
202aa59c4cbSrsb 	VOPNAME_CREATE,		{ .vop_create = ufs_create },
203aa59c4cbSrsb 	VOPNAME_REMOVE,		{ .vop_remove = ufs_remove },
204aa59c4cbSrsb 	VOPNAME_LINK,		{ .vop_link = ufs_link },
205aa59c4cbSrsb 	VOPNAME_RENAME,		{ .vop_rename = ufs_rename },
206aa59c4cbSrsb 	VOPNAME_MKDIR,		{ .vop_mkdir = ufs_mkdir },
207aa59c4cbSrsb 	VOPNAME_RMDIR,		{ .vop_rmdir = ufs_rmdir },
208aa59c4cbSrsb 	VOPNAME_READDIR,	{ .vop_readdir = ufs_readdir },
209aa59c4cbSrsb 	VOPNAME_SYMLINK,	{ .vop_symlink = ufs_symlink },
210aa59c4cbSrsb 	VOPNAME_READLINK,	{ .vop_readlink = ufs_readlink },
211aa59c4cbSrsb 	VOPNAME_FSYNC,		{ .vop_fsync = ufs_fsync },
212aa59c4cbSrsb 	VOPNAME_INACTIVE,	{ .vop_inactive = ufs_inactive }, /* not blkd */
213aa59c4cbSrsb 	VOPNAME_FID,		{ .vop_fid = ufs_fid },
214aa59c4cbSrsb 	VOPNAME_RWLOCK,		{ .vop_rwlock = ufs_rwlock },	/* not blkd */
215aa59c4cbSrsb 	VOPNAME_RWUNLOCK,	{ .vop_rwunlock = ufs_rwunlock }, /* not blkd */
216aa59c4cbSrsb 	VOPNAME_SEEK,		{ .vop_seek = ufs_seek },
217aa59c4cbSrsb 	VOPNAME_FRLOCK,		{ .vop_frlock = ufs_frlock },
218aa59c4cbSrsb 	VOPNAME_SPACE,		{ .vop_space = ufs_space },
219aa59c4cbSrsb 	VOPNAME_GETPAGE,	{ .vop_getpage = ufs_getpage },
220aa59c4cbSrsb 	VOPNAME_PUTPAGE,	{ .vop_putpage = ufs_putpage },
221aa59c4cbSrsb 	VOPNAME_MAP,		{ .vop_map = ufs_map },
222aa59c4cbSrsb 	VOPNAME_ADDMAP,		{ .vop_addmap = ufs_addmap },	/* not blkd */
223aa59c4cbSrsb 	VOPNAME_DELMAP,		{ .vop_delmap = ufs_delmap },	/* not blkd */
224aa59c4cbSrsb 	VOPNAME_POLL,		{ .vop_poll = ufs_poll },	/* not blkd */
225aa59c4cbSrsb 	VOPNAME_DUMP,		{ .vop_dump = ufs_dump },
226aa59c4cbSrsb 	VOPNAME_PATHCONF,	{ .vop_pathconf = ufs_l_pathconf },
227aa59c4cbSrsb 	VOPNAME_PAGEIO,		{ .vop_pageio = ufs_pageio },
228aa59c4cbSrsb 	VOPNAME_DUMPCTL,	{ .vop_dumpctl = ufs_dumpctl },
229aa59c4cbSrsb 	VOPNAME_GETSECATTR,	{ .vop_getsecattr = ufs_getsecattr },
230aa59c4cbSrsb 	VOPNAME_SETSECATTR,	{ .vop_setsecattr = ufs_setsecattr },
231aa59c4cbSrsb 	VOPNAME_VNEVENT,	{ .vop_vnevent = fs_vnevent_support },
232aa59c4cbSrsb 	NULL,			NULL
2337c478bd9Sstevel@tonic-gate };
2347c478bd9Sstevel@tonic-gate 
2357c478bd9Sstevel@tonic-gate #define	MAX_BACKFILE_COUNT	9999
2367c478bd9Sstevel@tonic-gate 
2377c478bd9Sstevel@tonic-gate /*
2387c478bd9Sstevel@tonic-gate  * Created by ufs_dumpctl() to store a file's disk block info into memory.
2397c478bd9Sstevel@tonic-gate  * Used by ufs_dump() to dump data to disk directly.
2407c478bd9Sstevel@tonic-gate  */
2417c478bd9Sstevel@tonic-gate struct dump {
2427c478bd9Sstevel@tonic-gate 	struct inode	*ip;		/* the file we contain */
2437c478bd9Sstevel@tonic-gate 	daddr_t		fsbs;		/* number of blocks stored */
2447c478bd9Sstevel@tonic-gate 	struct timeval32 time;		/* time stamp for the struct */
2457c478bd9Sstevel@tonic-gate 	daddr32_t 	dblk[1];	/* place holder for block info */
2467c478bd9Sstevel@tonic-gate };
2477c478bd9Sstevel@tonic-gate 
2487c478bd9Sstevel@tonic-gate static struct dump *dump_info = NULL;
2497c478bd9Sstevel@tonic-gate 
2507c478bd9Sstevel@tonic-gate /*
2517c478bd9Sstevel@tonic-gate  * Previously there was no special action required for ordinary files.
2527c478bd9Sstevel@tonic-gate  * (Devices are handled through the device file system.)
2537c478bd9Sstevel@tonic-gate  * Now we support Large Files and Large File API requires open to
2547c478bd9Sstevel@tonic-gate  * fail if file is large.
2557c478bd9Sstevel@tonic-gate  * We could take care to prevent data corruption
2567c478bd9Sstevel@tonic-gate  * by doing an atomic check of size and truncate if file is opened with
2577c478bd9Sstevel@tonic-gate  * FTRUNC flag set but traditionally this is being done by the vfs/vnode
2587c478bd9Sstevel@tonic-gate  * layers. So taking care of truncation here is a change in the existing
2597c478bd9Sstevel@tonic-gate  * semantics of VOP_OPEN and therefore we chose not to implement any thing
2607c478bd9Sstevel@tonic-gate  * here. The check for the size of the file > 2GB is being done at the
2617c478bd9Sstevel@tonic-gate  * vfs layer in routine vn_open().
2627c478bd9Sstevel@tonic-gate  */
2637c478bd9Sstevel@tonic-gate 
2647c478bd9Sstevel@tonic-gate /* ARGSUSED */
2657c478bd9Sstevel@tonic-gate static int
266da6c28aaSamw ufs_open(struct vnode **vpp, int flag, struct cred *cr, caller_context_t *ct)
2677c478bd9Sstevel@tonic-gate {
2687c478bd9Sstevel@tonic-gate 	return (0);
2697c478bd9Sstevel@tonic-gate }
2707c478bd9Sstevel@tonic-gate 
2717c478bd9Sstevel@tonic-gate /*ARGSUSED*/
2727c478bd9Sstevel@tonic-gate static int
2737c478bd9Sstevel@tonic-gate ufs_close(struct vnode *vp, int flag, int count, offset_t offset,
274da6c28aaSamw 	struct cred *cr, caller_context_t *ct)
2757c478bd9Sstevel@tonic-gate {
2767c478bd9Sstevel@tonic-gate 	cleanlocks(vp, ttoproc(curthread)->p_pid, 0);
2777c478bd9Sstevel@tonic-gate 	cleanshares(vp, ttoproc(curthread)->p_pid);
2787c478bd9Sstevel@tonic-gate 
2797c478bd9Sstevel@tonic-gate 	/*
2807c478bd9Sstevel@tonic-gate 	 * Push partially filled cluster at last close.
2817c478bd9Sstevel@tonic-gate 	 * ``last close'' is approximated because the dnlc
2827c478bd9Sstevel@tonic-gate 	 * may have a hold on the vnode.
2837c478bd9Sstevel@tonic-gate 	 * Checking for VBAD here will also act as a forced umount check.
2847c478bd9Sstevel@tonic-gate 	 */
2857c478bd9Sstevel@tonic-gate 	if (vp->v_count <= 2 && vp->v_type != VBAD) {
2867c478bd9Sstevel@tonic-gate 		struct inode *ip = VTOI(vp);
2877c478bd9Sstevel@tonic-gate 		if (ip->i_delaylen) {
2887c478bd9Sstevel@tonic-gate 			ins.in_poc.value.ul++;
2897c478bd9Sstevel@tonic-gate 			(void) ufs_putpages(vp, ip->i_delayoff, ip->i_delaylen,
29080d34432Sfrankho 			    B_ASYNC | B_FREE, cr);
2917c478bd9Sstevel@tonic-gate 			ip->i_delaylen = 0;
2927c478bd9Sstevel@tonic-gate 		}
2937c478bd9Sstevel@tonic-gate 	}
2947c478bd9Sstevel@tonic-gate 
2957c478bd9Sstevel@tonic-gate 	return (0);
2967c478bd9Sstevel@tonic-gate }
2977c478bd9Sstevel@tonic-gate 
2987c478bd9Sstevel@tonic-gate /*ARGSUSED*/
2997c478bd9Sstevel@tonic-gate static int
3007c478bd9Sstevel@tonic-gate ufs_read(struct vnode *vp, struct uio *uiop, int ioflag, struct cred *cr,
3017c478bd9Sstevel@tonic-gate 	struct caller_context *ct)
3027c478bd9Sstevel@tonic-gate {
3037c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
3047c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
3057c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp = NULL;
3067c478bd9Sstevel@tonic-gate 	int error = 0;
3077c478bd9Sstevel@tonic-gate 	int intrans = 0;
3087c478bd9Sstevel@tonic-gate 
3097c478bd9Sstevel@tonic-gate 	ASSERT(RW_READ_HELD(&ip->i_rwlock));
3107c478bd9Sstevel@tonic-gate 
3117c478bd9Sstevel@tonic-gate 	/*
3127c478bd9Sstevel@tonic-gate 	 * Mandatory locking needs to be done before ufs_lockfs_begin()
3137c478bd9Sstevel@tonic-gate 	 * and TRANS_BEGIN_SYNC() calls since mandatory locks can sleep.
3147c478bd9Sstevel@tonic-gate 	 */
3157c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
3167c478bd9Sstevel@tonic-gate 		/*
3177c478bd9Sstevel@tonic-gate 		 * ufs_getattr ends up being called by chklock
3187c478bd9Sstevel@tonic-gate 		 */
3197c478bd9Sstevel@tonic-gate 		error = chklock(vp, FREAD, uiop->uio_loffset,
32080d34432Sfrankho 		    uiop->uio_resid, uiop->uio_fmode, ct);
3217c478bd9Sstevel@tonic-gate 		if (error)
3227c478bd9Sstevel@tonic-gate 			goto out;
3237c478bd9Sstevel@tonic-gate 	}
3247c478bd9Sstevel@tonic-gate 
3257c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
3267c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READ_MASK);
3277c478bd9Sstevel@tonic-gate 	if (error)
3287c478bd9Sstevel@tonic-gate 		goto out;
3297c478bd9Sstevel@tonic-gate 
3307c478bd9Sstevel@tonic-gate 	/*
3317c478bd9Sstevel@tonic-gate 	 * In the case that a directory is opened for reading as a file
3327c478bd9Sstevel@tonic-gate 	 * (eg "cat .") with the  O_RSYNC, O_SYNC and O_DSYNC flags set.
3337c478bd9Sstevel@tonic-gate 	 * The locking order had to be changed to avoid a deadlock with
3347c478bd9Sstevel@tonic-gate 	 * an update taking place on that directory at the same time.
3357c478bd9Sstevel@tonic-gate 	 */
3367c478bd9Sstevel@tonic-gate 	if ((ip->i_mode & IFMT) == IFDIR) {
3377c478bd9Sstevel@tonic-gate 
3387c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
3397c478bd9Sstevel@tonic-gate 		error = rdip(ip, uiop, ioflag, cr);
3407c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
3417c478bd9Sstevel@tonic-gate 
3427c478bd9Sstevel@tonic-gate 		if (error) {
3437c478bd9Sstevel@tonic-gate 			if (ulp)
3447c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
3457c478bd9Sstevel@tonic-gate 			goto out;
3467c478bd9Sstevel@tonic-gate 		}
3477c478bd9Sstevel@tonic-gate 
3487c478bd9Sstevel@tonic-gate 		if (ulp && (ioflag & FRSYNC) && (ioflag & (FSYNC | FDSYNC)) &&
3497c478bd9Sstevel@tonic-gate 		    TRANS_ISTRANS(ufsvfsp)) {
3507c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
3517c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_READ_SYNC, TOP_READ_SIZE,
3527c478bd9Sstevel@tonic-gate 			    error);
3537c478bd9Sstevel@tonic-gate 			ASSERT(!error);
3547c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_READ_SYNC,
3557c478bd9Sstevel@tonic-gate 			    TOP_READ_SIZE);
3567c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_rwlock, RW_READER);
3577c478bd9Sstevel@tonic-gate 		}
3587c478bd9Sstevel@tonic-gate 	} else {
3597c478bd9Sstevel@tonic-gate 		/*
3607c478bd9Sstevel@tonic-gate 		 * Only transact reads to files opened for sync-read and
3617c478bd9Sstevel@tonic-gate 		 * sync-write on a file system that is not write locked.
3627c478bd9Sstevel@tonic-gate 		 *
3637c478bd9Sstevel@tonic-gate 		 * The ``not write locked'' check prevents problems with
3647c478bd9Sstevel@tonic-gate 		 * enabling/disabling logging on a busy file system.  E.g.,
3657c478bd9Sstevel@tonic-gate 		 * logging exists at the beginning of the read but does not
3667c478bd9Sstevel@tonic-gate 		 * at the end.
3677c478bd9Sstevel@tonic-gate 		 *
3687c478bd9Sstevel@tonic-gate 		 */
3697c478bd9Sstevel@tonic-gate 		if (ulp && (ioflag & FRSYNC) && (ioflag & (FSYNC | FDSYNC)) &&
3707c478bd9Sstevel@tonic-gate 		    TRANS_ISTRANS(ufsvfsp)) {
3717c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_READ_SYNC, TOP_READ_SIZE,
3727c478bd9Sstevel@tonic-gate 			    error);
3737c478bd9Sstevel@tonic-gate 			ASSERT(!error);
3747c478bd9Sstevel@tonic-gate 			intrans = 1;
3757c478bd9Sstevel@tonic-gate 		}
3767c478bd9Sstevel@tonic-gate 
3777c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
3787c478bd9Sstevel@tonic-gate 		error = rdip(ip, uiop, ioflag, cr);
3797c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
3807c478bd9Sstevel@tonic-gate 
3817c478bd9Sstevel@tonic-gate 		if (intrans) {
3827c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_READ_SYNC,
3837c478bd9Sstevel@tonic-gate 			    TOP_READ_SIZE);
3847c478bd9Sstevel@tonic-gate 		}
3857c478bd9Sstevel@tonic-gate 	}
3867c478bd9Sstevel@tonic-gate 
3877c478bd9Sstevel@tonic-gate 	if (ulp) {
3887c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
3897c478bd9Sstevel@tonic-gate 	}
3907c478bd9Sstevel@tonic-gate out:
3917c478bd9Sstevel@tonic-gate 
3927c478bd9Sstevel@tonic-gate 	return (error);
3937c478bd9Sstevel@tonic-gate }
3947c478bd9Sstevel@tonic-gate 
3957c478bd9Sstevel@tonic-gate extern	int	ufs_HW;		/* high water mark */
3967c478bd9Sstevel@tonic-gate extern	int	ufs_LW;		/* low water mark */
3977c478bd9Sstevel@tonic-gate int	ufs_WRITES = 1;		/* XXX - enable/disable */
3987c478bd9Sstevel@tonic-gate int	ufs_throttles = 0;	/* throttling count */
3997c478bd9Sstevel@tonic-gate int	ufs_allow_shared_writes = 1;	/* directio shared writes */
4007c478bd9Sstevel@tonic-gate 
4017c478bd9Sstevel@tonic-gate static int
4027c478bd9Sstevel@tonic-gate ufs_check_rewrite(struct inode *ip, struct uio *uiop, int ioflag)
4037c478bd9Sstevel@tonic-gate {
404f90bab20Sswilcox 	int	shared_write;
405f90bab20Sswilcox 
406f90bab20Sswilcox 	/*
407f90bab20Sswilcox 	 * If the FDSYNC flag is set then ignore the global
408f90bab20Sswilcox 	 * ufs_allow_shared_writes in this case.
409f90bab20Sswilcox 	 */
410f90bab20Sswilcox 	shared_write = (ioflag & FDSYNC) | ufs_allow_shared_writes;
4117c478bd9Sstevel@tonic-gate 
4127c478bd9Sstevel@tonic-gate 	/*
4137c478bd9Sstevel@tonic-gate 	 * Filter to determine if this request is suitable as a
4147c478bd9Sstevel@tonic-gate 	 * concurrent rewrite. This write must not allocate blocks
4157c478bd9Sstevel@tonic-gate 	 * by extending the file or filling in holes. No use trying
4167c478bd9Sstevel@tonic-gate 	 * through FSYNC descriptors as the inode will be synchronously
4177c478bd9Sstevel@tonic-gate 	 * updated after the write. The uio structure has not yet been
4187c478bd9Sstevel@tonic-gate 	 * checked for sanity, so assume nothing.
4197c478bd9Sstevel@tonic-gate 	 */
4207c478bd9Sstevel@tonic-gate 	return (((ip->i_mode & IFMT) == IFREG) && !(ioflag & FAPPEND) &&
42180d34432Sfrankho 	    (uiop->uio_loffset >= (offset_t)0) &&
42280d34432Sfrankho 	    (uiop->uio_loffset < ip->i_size) && (uiop->uio_resid > 0) &&
42380d34432Sfrankho 	    ((ip->i_size - uiop->uio_loffset) >= uiop->uio_resid) &&
42480d34432Sfrankho 	    !(ioflag & FSYNC) && !bmap_has_holes(ip) &&
42580d34432Sfrankho 	    shared_write);
4267c478bd9Sstevel@tonic-gate }
4277c478bd9Sstevel@tonic-gate 
4287c478bd9Sstevel@tonic-gate /*ARGSUSED*/
4297c478bd9Sstevel@tonic-gate static int
4307c478bd9Sstevel@tonic-gate ufs_write(struct vnode *vp, struct uio *uiop, int ioflag, cred_t *cr,
4317c478bd9Sstevel@tonic-gate 	caller_context_t *ct)
4327c478bd9Sstevel@tonic-gate {
4337c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
4347c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
4357c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
4367c478bd9Sstevel@tonic-gate 	int retry = 1;
4377c478bd9Sstevel@tonic-gate 	int error, resv, resid = 0;
4387c478bd9Sstevel@tonic-gate 	int directio_status;
4397c478bd9Sstevel@tonic-gate 	int exclusive;
440f90bab20Sswilcox 	int rewriteflg;
4417c478bd9Sstevel@tonic-gate 	long start_resid = uiop->uio_resid;
4427c478bd9Sstevel@tonic-gate 
4437c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_rwlock));
4447c478bd9Sstevel@tonic-gate 
4457c478bd9Sstevel@tonic-gate retry_mandlock:
4467c478bd9Sstevel@tonic-gate 	/*
4477c478bd9Sstevel@tonic-gate 	 * Mandatory locking needs to be done before ufs_lockfs_begin()
4487c478bd9Sstevel@tonic-gate 	 * and TRANS_BEGIN_[A]SYNC() calls since mandatory locks can sleep.
4497c478bd9Sstevel@tonic-gate 	 * Check for forced unmounts normally done in ufs_lockfs_begin().
4507c478bd9Sstevel@tonic-gate 	 */
4517c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL) {
4527c478bd9Sstevel@tonic-gate 		error = EIO;
4537c478bd9Sstevel@tonic-gate 		goto out;
4547c478bd9Sstevel@tonic-gate 	}
4557c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
4567c478bd9Sstevel@tonic-gate 
4577c478bd9Sstevel@tonic-gate 		ASSERT(RW_WRITE_HELD(&ip->i_rwlock));
4587c478bd9Sstevel@tonic-gate 
4597c478bd9Sstevel@tonic-gate 		/*
4607c478bd9Sstevel@tonic-gate 		 * ufs_getattr ends up being called by chklock
4617c478bd9Sstevel@tonic-gate 		 */
4627c478bd9Sstevel@tonic-gate 		error = chklock(vp, FWRITE, uiop->uio_loffset,
46380d34432Sfrankho 		    uiop->uio_resid, uiop->uio_fmode, ct);
4647c478bd9Sstevel@tonic-gate 		if (error)
4657c478bd9Sstevel@tonic-gate 			goto out;
4667c478bd9Sstevel@tonic-gate 	}
4677c478bd9Sstevel@tonic-gate 
4687c478bd9Sstevel@tonic-gate 	/* i_rwlock can change in chklock */
4697c478bd9Sstevel@tonic-gate 	exclusive = rw_write_held(&ip->i_rwlock);
470f90bab20Sswilcox 	rewriteflg = ufs_check_rewrite(ip, uiop, ioflag);
4717c478bd9Sstevel@tonic-gate 
4727c478bd9Sstevel@tonic-gate 	/*
4737c478bd9Sstevel@tonic-gate 	 * Check for fast-path special case of directio re-writes.
4747c478bd9Sstevel@tonic-gate 	 */
4757c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) &&
476f90bab20Sswilcox 	    !exclusive && rewriteflg) {
4777c478bd9Sstevel@tonic-gate 
4787c478bd9Sstevel@tonic-gate 		error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_WRITE_MASK);
4797c478bd9Sstevel@tonic-gate 		if (error)
4807c478bd9Sstevel@tonic-gate 			goto out;
4817c478bd9Sstevel@tonic-gate 
4827c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
4837c478bd9Sstevel@tonic-gate 		error = ufs_directio_write(ip, uiop, ioflag, 1, cr,
48480d34432Sfrankho 		    &directio_status);
4857c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS) {
4867c478bd9Sstevel@tonic-gate 			uint_t i_flag_save;
4877c478bd9Sstevel@tonic-gate 
4887c478bd9Sstevel@tonic-gate 			if (start_resid != uiop->uio_resid)
4897c478bd9Sstevel@tonic-gate 				error = 0;
4907c478bd9Sstevel@tonic-gate 			/*
4917c478bd9Sstevel@tonic-gate 			 * Special treatment of access times for re-writes.
4927c478bd9Sstevel@tonic-gate 			 * If IMOD is not already set, then convert it
4937c478bd9Sstevel@tonic-gate 			 * to IMODACC for this operation. This defers
4947c478bd9Sstevel@tonic-gate 			 * entering a delta into the log until the inode
4957c478bd9Sstevel@tonic-gate 			 * is flushed. This mimics what is done for read
4967c478bd9Sstevel@tonic-gate 			 * operations and inode access time.
4977c478bd9Sstevel@tonic-gate 			 */
4987c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
4997c478bd9Sstevel@tonic-gate 			i_flag_save = ip->i_flag;
5007c478bd9Sstevel@tonic-gate 			ip->i_flag |= IUPD | ICHG;
5017c478bd9Sstevel@tonic-gate 			ip->i_seq++;
5027c478bd9Sstevel@tonic-gate 			ITIMES_NOLOCK(ip);
5037c478bd9Sstevel@tonic-gate 			if ((i_flag_save & IMOD) == 0) {
5047c478bd9Sstevel@tonic-gate 				ip->i_flag &= ~IMOD;
5057c478bd9Sstevel@tonic-gate 				ip->i_flag |= IMODACC;
5067c478bd9Sstevel@tonic-gate 			}
5077c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
5087c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
5097c478bd9Sstevel@tonic-gate 			if (ulp)
5107c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
5117c478bd9Sstevel@tonic-gate 			goto out;
5127c478bd9Sstevel@tonic-gate 		}
5137c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
5147c478bd9Sstevel@tonic-gate 		if (ulp)
5157c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
5167c478bd9Sstevel@tonic-gate 	}
5177c478bd9Sstevel@tonic-gate 
5187c478bd9Sstevel@tonic-gate 	if (!exclusive && !rw_tryupgrade(&ip->i_rwlock)) {
5197c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
5207c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
5217c478bd9Sstevel@tonic-gate 		/*
5227c478bd9Sstevel@tonic-gate 		 * Mandatory locking could have been enabled
5237c478bd9Sstevel@tonic-gate 		 * after dropping the i_rwlock.
5247c478bd9Sstevel@tonic-gate 		 */
5257c478bd9Sstevel@tonic-gate 		if (MANDLOCK(vp, ip->i_mode))
5267c478bd9Sstevel@tonic-gate 			goto retry_mandlock;
5277c478bd9Sstevel@tonic-gate 	}
5287c478bd9Sstevel@tonic-gate 
5297c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_WRITE_MASK);
5307c478bd9Sstevel@tonic-gate 	if (error)
5317c478bd9Sstevel@tonic-gate 		goto out;
5327c478bd9Sstevel@tonic-gate 
5337c478bd9Sstevel@tonic-gate 	/*
5347c478bd9Sstevel@tonic-gate 	 * Amount of log space needed for this write
5357c478bd9Sstevel@tonic-gate 	 */
536f90bab20Sswilcox 	if (!rewriteflg || !(ioflag & FDSYNC))
537f90bab20Sswilcox 		TRANS_WRITE_RESV(ip, uiop, ulp, &resv, &resid);
5387c478bd9Sstevel@tonic-gate 
5397c478bd9Sstevel@tonic-gate 	/*
5407c478bd9Sstevel@tonic-gate 	 * Throttle writes.
5417c478bd9Sstevel@tonic-gate 	 */
5427c478bd9Sstevel@tonic-gate 	if (ufs_WRITES && (ip->i_writes > ufs_HW)) {
5437c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
5447c478bd9Sstevel@tonic-gate 		while (ip->i_writes > ufs_HW) {
5457c478bd9Sstevel@tonic-gate 			ufs_throttles++;
5467c478bd9Sstevel@tonic-gate 			cv_wait(&ip->i_wrcv, &ip->i_tlock);
5477c478bd9Sstevel@tonic-gate 		}
5487c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
5497c478bd9Sstevel@tonic-gate 	}
5507c478bd9Sstevel@tonic-gate 
5517c478bd9Sstevel@tonic-gate 	/*
5527c478bd9Sstevel@tonic-gate 	 * Enter Transaction
553f90bab20Sswilcox 	 *
554f90bab20Sswilcox 	 * If the write is a rewrite there is no need to open a transaction
555f90bab20Sswilcox 	 * if the FDSYNC flag is set and not the FSYNC.  In this case just
556f90bab20Sswilcox 	 * set the IMODACC flag to modify do the update at a later time
557f90bab20Sswilcox 	 * thus avoiding the overhead of the logging transaction that is
558f90bab20Sswilcox 	 * not required.
5597c478bd9Sstevel@tonic-gate 	 */
5607c478bd9Sstevel@tonic-gate 	if (ioflag & (FSYNC|FDSYNC)) {
5617c478bd9Sstevel@tonic-gate 		if (ulp) {
562f90bab20Sswilcox 			if (rewriteflg) {
563f90bab20Sswilcox 				uint_t i_flag_save;
564f90bab20Sswilcox 
565f90bab20Sswilcox 				rw_enter(&ip->i_contents, RW_READER);
566f90bab20Sswilcox 				mutex_enter(&ip->i_tlock);
567f90bab20Sswilcox 				i_flag_save = ip->i_flag;
568f90bab20Sswilcox 				ip->i_flag |= IUPD | ICHG;
569f90bab20Sswilcox 				ip->i_seq++;
570f90bab20Sswilcox 				ITIMES_NOLOCK(ip);
571f90bab20Sswilcox 				if ((i_flag_save & IMOD) == 0) {
572f90bab20Sswilcox 					ip->i_flag &= ~IMOD;
573f90bab20Sswilcox 					ip->i_flag |= IMODACC;
574f90bab20Sswilcox 				}
575f90bab20Sswilcox 				mutex_exit(&ip->i_tlock);
576f90bab20Sswilcox 				rw_exit(&ip->i_contents);
577f90bab20Sswilcox 			} else {
578f90bab20Sswilcox 				int terr = 0;
579f90bab20Sswilcox 				TRANS_BEGIN_SYNC(ufsvfsp, TOP_WRITE_SYNC, resv,
580f90bab20Sswilcox 				    terr);
581f90bab20Sswilcox 				ASSERT(!terr);
582f90bab20Sswilcox 			}
5837c478bd9Sstevel@tonic-gate 		}
5847c478bd9Sstevel@tonic-gate 	} else {
5857c478bd9Sstevel@tonic-gate 		if (ulp)
5867c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_WRITE, resv);
5877c478bd9Sstevel@tonic-gate 	}
5887c478bd9Sstevel@tonic-gate 
5897c478bd9Sstevel@tonic-gate 	/*
5907c478bd9Sstevel@tonic-gate 	 * Write the file
5917c478bd9Sstevel@tonic-gate 	 */
5927c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
5937c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
5947c478bd9Sstevel@tonic-gate 	if ((ioflag & FAPPEND) != 0 && (ip->i_mode & IFMT) == IFREG) {
5957c478bd9Sstevel@tonic-gate 		/*
5967c478bd9Sstevel@tonic-gate 		 * In append mode start at end of file.
5977c478bd9Sstevel@tonic-gate 		 */
5987c478bd9Sstevel@tonic-gate 		uiop->uio_loffset = ip->i_size;
5997c478bd9Sstevel@tonic-gate 	}
6007c478bd9Sstevel@tonic-gate 
6017c478bd9Sstevel@tonic-gate 	/*
6027c478bd9Sstevel@tonic-gate 	 * Mild optimisation, don't call ufs_trans_write() unless we have to
6037c478bd9Sstevel@tonic-gate 	 * Also, suppress file system full messages if we will retry.
6047c478bd9Sstevel@tonic-gate 	 */
6057c478bd9Sstevel@tonic-gate 	if (retry)
6067c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
6077c478bd9Sstevel@tonic-gate 	if (resid) {
6087c478bd9Sstevel@tonic-gate 		TRANS_WRITE(ip, uiop, ioflag, error, ulp, cr, resv, resid);
6097c478bd9Sstevel@tonic-gate 	} else {
6107c478bd9Sstevel@tonic-gate 		error = wrip(ip, uiop, ioflag, cr);
6117c478bd9Sstevel@tonic-gate 	}
6127c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
6137c478bd9Sstevel@tonic-gate 
6147c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
6157c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
6167c478bd9Sstevel@tonic-gate 
6177c478bd9Sstevel@tonic-gate 	/*
6187c478bd9Sstevel@tonic-gate 	 * Leave Transaction
6197c478bd9Sstevel@tonic-gate 	 */
6207c478bd9Sstevel@tonic-gate 	if (ulp) {
6217c478bd9Sstevel@tonic-gate 		if (ioflag & (FSYNC|FDSYNC)) {
622f90bab20Sswilcox 			if (!rewriteflg) {
623f90bab20Sswilcox 				int terr = 0;
624f90bab20Sswilcox 
625f90bab20Sswilcox 				TRANS_END_SYNC(ufsvfsp, terr, TOP_WRITE_SYNC,
62680d34432Sfrankho 				    resv);
627f90bab20Sswilcox 				if (error == 0)
628f90bab20Sswilcox 					error = terr;
629f90bab20Sswilcox 			}
6307c478bd9Sstevel@tonic-gate 		} else {
6317c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_WRITE, resv);
6327c478bd9Sstevel@tonic-gate 		}
6337c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
6347c478bd9Sstevel@tonic-gate 	}
6357c478bd9Sstevel@tonic-gate out:
6367c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
6377c478bd9Sstevel@tonic-gate 		/*
6387c478bd9Sstevel@tonic-gate 		 * Any blocks tied up in pending deletes?
6397c478bd9Sstevel@tonic-gate 		 */
6407c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
6417c478bd9Sstevel@tonic-gate 		retry = 0;
6427c478bd9Sstevel@tonic-gate 		goto retry_mandlock;
6437c478bd9Sstevel@tonic-gate 	}
6447c478bd9Sstevel@tonic-gate 
6457c478bd9Sstevel@tonic-gate 	if (error == ENOSPC && (start_resid != uiop->uio_resid))
6467c478bd9Sstevel@tonic-gate 		error = 0;
6477c478bd9Sstevel@tonic-gate 
6487c478bd9Sstevel@tonic-gate 	return (error);
6497c478bd9Sstevel@tonic-gate }
6507c478bd9Sstevel@tonic-gate 
6517c478bd9Sstevel@tonic-gate /*
6527c478bd9Sstevel@tonic-gate  * Don't cache write blocks to files with the sticky bit set.
6537c478bd9Sstevel@tonic-gate  * Used to keep swap files from blowing the page cache on a server.
6547c478bd9Sstevel@tonic-gate  */
6557c478bd9Sstevel@tonic-gate int stickyhack = 1;
6567c478bd9Sstevel@tonic-gate 
6577c478bd9Sstevel@tonic-gate /*
6587c478bd9Sstevel@tonic-gate  * Free behind hacks.  The pager is busted.
6597c478bd9Sstevel@tonic-gate  * XXX - need to pass the information down to writedone() in a flag like B_SEQ
6607c478bd9Sstevel@tonic-gate  * or B_FREE_IF_TIGHT_ON_MEMORY.
6617c478bd9Sstevel@tonic-gate  */
6627c478bd9Sstevel@tonic-gate int	freebehind = 1;
663562eee46Srbourbon int	smallfile = 0;
664562eee46Srbourbon u_offset_t smallfile64 = 32 * 1024;
6657c478bd9Sstevel@tonic-gate 
6667c478bd9Sstevel@tonic-gate /*
6677c478bd9Sstevel@tonic-gate  * While we should, in most cases, cache the pages for write, we
6687c478bd9Sstevel@tonic-gate  * may also want to cache the pages for read as long as they are
6697c478bd9Sstevel@tonic-gate  * frequently re-usable.
6707c478bd9Sstevel@tonic-gate  *
6717c478bd9Sstevel@tonic-gate  * If cache_read_ahead = 1, the pages for read will go to the tail
6727c478bd9Sstevel@tonic-gate  * of the cache list when they are released, otherwise go to the head.
6737c478bd9Sstevel@tonic-gate  */
6747c478bd9Sstevel@tonic-gate int	cache_read_ahead = 0;
6757c478bd9Sstevel@tonic-gate 
676562eee46Srbourbon /*
677562eee46Srbourbon  * Freebehind exists  so that as we read  large files  sequentially we
678562eee46Srbourbon  * don't consume most of memory with pages  from a few files. It takes
679562eee46Srbourbon  * longer to re-read from disk multiple small files as it does reading
680562eee46Srbourbon  * one large one sequentially.  As system  memory grows customers need
681562eee46Srbourbon  * to retain bigger chunks   of files in  memory.   The advent of  the
682562eee46Srbourbon  * cachelist opens up of the possibility freeing pages  to the head or
683562eee46Srbourbon  * tail of the list.
684562eee46Srbourbon  *
685562eee46Srbourbon  * Not freeing a page is a bet that the page will be read again before
686562eee46Srbourbon  * it's segmap slot is needed for something else. If we loose the bet,
687562eee46Srbourbon  * it means some  other thread is  burdened with the  page free we did
688562eee46Srbourbon  * not do. If we win we save a free and reclaim.
689562eee46Srbourbon  *
690562eee46Srbourbon  * Freeing it at the tail  vs the head of cachelist  is a bet that the
691562eee46Srbourbon  * page will survive until the next  read.  It's also saying that this
692562eee46Srbourbon  * page is more likely to  be re-used than a  page freed some time ago
693562eee46Srbourbon  * and never reclaimed.
694562eee46Srbourbon  *
695562eee46Srbourbon  * Freebehind maintains a  range of  file offset [smallfile1; smallfile2]
696562eee46Srbourbon  *
697562eee46Srbourbon  *            0 < offset < smallfile1 : pages are not freed.
698562eee46Srbourbon  *   smallfile1 < offset < smallfile2 : pages freed to tail of cachelist.
699562eee46Srbourbon  *   smallfile2 < offset              : pages freed to head of cachelist.
700562eee46Srbourbon  *
701562eee46Srbourbon  * The range  is  computed  at most  once  per second  and  depends on
702562eee46Srbourbon  * freemem  and  ncpus_online.  Both parameters  are   bounded to be
703562eee46Srbourbon  * >= smallfile && >= smallfile64.
704562eee46Srbourbon  *
705562eee46Srbourbon  * smallfile1 = (free memory / ncpu) / 1000
706562eee46Srbourbon  * smallfile2 = (free memory / ncpu) / 10
707562eee46Srbourbon  *
708562eee46Srbourbon  * A few examples values:
709562eee46Srbourbon  *
710562eee46Srbourbon  *       Free Mem (in Bytes) [smallfile1; smallfile2]  [smallfile1; smallfile2]
711562eee46Srbourbon  *                                 ncpus_online = 4          ncpus_online = 64
712562eee46Srbourbon  *       ------------------  -----------------------   -----------------------
713562eee46Srbourbon  *             1G                   [256K;  25M]               [32K; 1.5M]
714562eee46Srbourbon  *            10G                   [2.5M; 250M]              [156K; 15M]
715562eee46Srbourbon  *           100G                    [25M; 2.5G]              [1.5M; 150M]
716562eee46Srbourbon  *
717562eee46Srbourbon  */
718562eee46Srbourbon 
719562eee46Srbourbon #define	SMALLFILE1_D 1000
720562eee46Srbourbon #define	SMALLFILE2_D 10
721562eee46Srbourbon static u_offset_t smallfile1 = 32 * 1024;
722562eee46Srbourbon static u_offset_t smallfile2 = 32 * 1024;
723562eee46Srbourbon static clock_t smallfile_update = 0; /* lbolt value of when to recompute */
724562eee46Srbourbon uint_t smallfile1_d = SMALLFILE1_D;
725562eee46Srbourbon uint_t smallfile2_d = SMALLFILE2_D;
726562eee46Srbourbon 
7277c478bd9Sstevel@tonic-gate /*
7287c478bd9Sstevel@tonic-gate  * wrip does the real work of write requests for ufs.
7297c478bd9Sstevel@tonic-gate  */
7307c478bd9Sstevel@tonic-gate int
7317c478bd9Sstevel@tonic-gate wrip(struct inode *ip, struct uio *uio, int ioflag, struct cred *cr)
7327c478bd9Sstevel@tonic-gate {
7337c478bd9Sstevel@tonic-gate 	rlim64_t limit = uio->uio_llimit;
7347c478bd9Sstevel@tonic-gate 	u_offset_t off;
7357c478bd9Sstevel@tonic-gate 	u_offset_t old_i_size;
7367c478bd9Sstevel@tonic-gate 	struct fs *fs;
7377c478bd9Sstevel@tonic-gate 	struct vnode *vp;
7387c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
7397c478bd9Sstevel@tonic-gate 	caddr_t base;
7407c478bd9Sstevel@tonic-gate 	long start_resid = uio->uio_resid;	/* save starting resid */
7417c478bd9Sstevel@tonic-gate 	long premove_resid;			/* resid before uiomove() */
7427c478bd9Sstevel@tonic-gate 	uint_t flags;
7437c478bd9Sstevel@tonic-gate 	int newpage;
7447c478bd9Sstevel@tonic-gate 	int iupdat_flag, directio_status;
7457c478bd9Sstevel@tonic-gate 	int n, on, mapon;
7467c478bd9Sstevel@tonic-gate 	int error, pagecreate;
7477c478bd9Sstevel@tonic-gate 	int do_dqrwlock;		/* drop/reacquire vfs_dqrwlock */
7487c478bd9Sstevel@tonic-gate 	int32_t	iblocks;
7497c478bd9Sstevel@tonic-gate 	int	new_iblocks;
7507c478bd9Sstevel@tonic-gate 
7517c478bd9Sstevel@tonic-gate 	/*
7527c478bd9Sstevel@tonic-gate 	 * ip->i_size is incremented before the uiomove
7537c478bd9Sstevel@tonic-gate 	 * is done on a write.  If the move fails (bad user
7547c478bd9Sstevel@tonic-gate 	 * address) reset ip->i_size.
7557c478bd9Sstevel@tonic-gate 	 * The better way would be to increment ip->i_size
7567c478bd9Sstevel@tonic-gate 	 * only if the uiomove succeeds.
7577c478bd9Sstevel@tonic-gate 	 */
7587c478bd9Sstevel@tonic-gate 	int i_size_changed = 0;
7597c478bd9Sstevel@tonic-gate 	o_mode_t type;
7607c478bd9Sstevel@tonic-gate 	int i_seq_needed = 0;
7617c478bd9Sstevel@tonic-gate 
7627c478bd9Sstevel@tonic-gate 	vp = ITOV(ip);
7637c478bd9Sstevel@tonic-gate 
7647c478bd9Sstevel@tonic-gate 	/*
7657c478bd9Sstevel@tonic-gate 	 * check for forced unmount - should not happen as
7667c478bd9Sstevel@tonic-gate 	 * the request passed the lockfs checks.
7677c478bd9Sstevel@tonic-gate 	 */
7687c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
7697c478bd9Sstevel@tonic-gate 		return (EIO);
7707c478bd9Sstevel@tonic-gate 
7717c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
7727c478bd9Sstevel@tonic-gate 
7737c478bd9Sstevel@tonic-gate 	ASSERT(RW_WRITE_HELD(&ip->i_contents));
7747c478bd9Sstevel@tonic-gate 
7757c478bd9Sstevel@tonic-gate 	/* check for valid filetype */
7767c478bd9Sstevel@tonic-gate 	type = ip->i_mode & IFMT;
7777c478bd9Sstevel@tonic-gate 	if ((type != IFREG) && (type != IFDIR) && (type != IFATTRDIR) &&
7787c478bd9Sstevel@tonic-gate 	    (type != IFLNK) && (type != IFSHAD)) {
7797c478bd9Sstevel@tonic-gate 		return (EIO);
7807c478bd9Sstevel@tonic-gate 	}
7817c478bd9Sstevel@tonic-gate 
7827c478bd9Sstevel@tonic-gate 	/*
7837c478bd9Sstevel@tonic-gate 	 * the actual limit of UFS file size
7847c478bd9Sstevel@tonic-gate 	 * is UFS_MAXOFFSET_T
7857c478bd9Sstevel@tonic-gate 	 */
7867c478bd9Sstevel@tonic-gate 	if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
7877c478bd9Sstevel@tonic-gate 		limit = MAXOFFSET_T;
7887c478bd9Sstevel@tonic-gate 
7897c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset >= limit) {
7907c478bd9Sstevel@tonic-gate 		proc_t *p = ttoproc(curthread);
7917c478bd9Sstevel@tonic-gate 
7927c478bd9Sstevel@tonic-gate 		mutex_enter(&p->p_lock);
7937c478bd9Sstevel@tonic-gate 		(void) rctl_action(rctlproc_legacy[RLIMIT_FSIZE], p->p_rctls,
7947c478bd9Sstevel@tonic-gate 		    p, RCA_UNSAFE_SIGINFO);
7957c478bd9Sstevel@tonic-gate 		mutex_exit(&p->p_lock);
7967c478bd9Sstevel@tonic-gate 		return (EFBIG);
7977c478bd9Sstevel@tonic-gate 	}
7987c478bd9Sstevel@tonic-gate 
7997c478bd9Sstevel@tonic-gate 	/*
8007c478bd9Sstevel@tonic-gate 	 * if largefiles are disallowed, the limit is
8017c478bd9Sstevel@tonic-gate 	 * the pre-largefiles value of 2GB
8027c478bd9Sstevel@tonic-gate 	 */
8037c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_lfflags & UFS_LARGEFILES)
8047c478bd9Sstevel@tonic-gate 		limit = MIN(UFS_MAXOFFSET_T, limit);
8057c478bd9Sstevel@tonic-gate 	else
8067c478bd9Sstevel@tonic-gate 		limit = MIN(MAXOFF32_T, limit);
8077c478bd9Sstevel@tonic-gate 
8087c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset < (offset_t)0) {
8097c478bd9Sstevel@tonic-gate 		return (EINVAL);
8107c478bd9Sstevel@tonic-gate 	}
8117c478bd9Sstevel@tonic-gate 	if (uio->uio_resid == 0) {
8127c478bd9Sstevel@tonic-gate 		return (0);
8137c478bd9Sstevel@tonic-gate 	}
8147c478bd9Sstevel@tonic-gate 
8157c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset >= limit)
8167c478bd9Sstevel@tonic-gate 		return (EFBIG);
8177c478bd9Sstevel@tonic-gate 
8187c478bd9Sstevel@tonic-gate 	ip->i_flag |= INOACC;	/* don't update ref time in getpage */
8197c478bd9Sstevel@tonic-gate 
8207c478bd9Sstevel@tonic-gate 	if (ioflag & (FSYNC|FDSYNC)) {
8217c478bd9Sstevel@tonic-gate 		ip->i_flag |= ISYNC;
8227c478bd9Sstevel@tonic-gate 		iupdat_flag = 1;
8237c478bd9Sstevel@tonic-gate 	}
8247c478bd9Sstevel@tonic-gate 	/*
8257c478bd9Sstevel@tonic-gate 	 * Try to go direct
8267c478bd9Sstevel@tonic-gate 	 */
8277c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) {
8287c478bd9Sstevel@tonic-gate 		uio->uio_llimit = limit;
8297c478bd9Sstevel@tonic-gate 		error = ufs_directio_write(ip, uio, ioflag, 0, cr,
83080d34432Sfrankho 		    &directio_status);
8317c478bd9Sstevel@tonic-gate 		/*
8327c478bd9Sstevel@tonic-gate 		 * If ufs_directio wrote to the file or set the flags,
8337c478bd9Sstevel@tonic-gate 		 * we need to update i_seq, but it may be deferred.
8347c478bd9Sstevel@tonic-gate 		 */
8357c478bd9Sstevel@tonic-gate 		if (start_resid != uio->uio_resid ||
83680d34432Sfrankho 		    (ip->i_flag & (ICHG|IUPD))) {
8377c478bd9Sstevel@tonic-gate 			i_seq_needed = 1;
8387c478bd9Sstevel@tonic-gate 			ip->i_flag |= ISEQ;
8397c478bd9Sstevel@tonic-gate 		}
8407c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS)
8417c478bd9Sstevel@tonic-gate 			goto out;
8427c478bd9Sstevel@tonic-gate 	}
8437c478bd9Sstevel@tonic-gate 
8447c478bd9Sstevel@tonic-gate 	/*
8457c478bd9Sstevel@tonic-gate 	 * Behavior with respect to dropping/reacquiring vfs_dqrwlock:
8467c478bd9Sstevel@tonic-gate 	 *
8477c478bd9Sstevel@tonic-gate 	 * o shadow inodes: vfs_dqrwlock is not held at all
8487c478bd9Sstevel@tonic-gate 	 * o quota updates: vfs_dqrwlock is read or write held
8497c478bd9Sstevel@tonic-gate 	 * o other updates: vfs_dqrwlock is read held
8507c478bd9Sstevel@tonic-gate 	 *
8517c478bd9Sstevel@tonic-gate 	 * The first case is the only one where we do not hold
8527c478bd9Sstevel@tonic-gate 	 * vfs_dqrwlock at all while entering wrip().
8537c478bd9Sstevel@tonic-gate 	 * We must make sure not to downgrade/drop vfs_dqrwlock if we
8547c478bd9Sstevel@tonic-gate 	 * have it as writer, i.e. if we are updating the quota inode.
8557c478bd9Sstevel@tonic-gate 	 * There is no potential deadlock scenario in this case as
8567c478bd9Sstevel@tonic-gate 	 * ufs_getpage() takes care of this and avoids reacquiring
8577c478bd9Sstevel@tonic-gate 	 * vfs_dqrwlock in that case.
8587c478bd9Sstevel@tonic-gate 	 *
8597c478bd9Sstevel@tonic-gate 	 * This check is done here since the above conditions do not change
8607c478bd9Sstevel@tonic-gate 	 * and we possibly loop below, so save a few cycles.
8617c478bd9Sstevel@tonic-gate 	 */
8627c478bd9Sstevel@tonic-gate 	if ((type == IFSHAD) ||
86380d34432Sfrankho 	    (rw_owner(&ufsvfsp->vfs_dqrwlock) == curthread)) {
864986fd29aSsetje 		do_dqrwlock = 0;
8657c478bd9Sstevel@tonic-gate 	} else {
8667c478bd9Sstevel@tonic-gate 		do_dqrwlock = 1;
8677c478bd9Sstevel@tonic-gate 	}
8687c478bd9Sstevel@tonic-gate 
8697c478bd9Sstevel@tonic-gate 	/*
8707c478bd9Sstevel@tonic-gate 	 * Large Files: We cast MAXBMASK to offset_t
8717c478bd9Sstevel@tonic-gate 	 * inorder to mask out the higher bits. Since offset_t
8727c478bd9Sstevel@tonic-gate 	 * is a signed value, the high order bit set in MAXBMASK
8737c478bd9Sstevel@tonic-gate 	 * value makes it do the right thing by having all bits 1
8747c478bd9Sstevel@tonic-gate 	 * in the higher word. May be removed for _SOLARIS64_.
8757c478bd9Sstevel@tonic-gate 	 */
8767c478bd9Sstevel@tonic-gate 
8777c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
8787c478bd9Sstevel@tonic-gate 	do {
8797c478bd9Sstevel@tonic-gate 		u_offset_t uoff = uio->uio_loffset;
8807c478bd9Sstevel@tonic-gate 		off = uoff & (offset_t)MAXBMASK;
8817c478bd9Sstevel@tonic-gate 		mapon = (int)(uoff & (offset_t)MAXBOFFSET);
8827c478bd9Sstevel@tonic-gate 		on = (int)blkoff(fs, uoff);
8837c478bd9Sstevel@tonic-gate 		n = (int)MIN(fs->fs_bsize - on, uio->uio_resid);
8847c478bd9Sstevel@tonic-gate 		new_iblocks = 1;
8857c478bd9Sstevel@tonic-gate 
8867c478bd9Sstevel@tonic-gate 		if (type == IFREG && uoff + n >= limit) {
8877c478bd9Sstevel@tonic-gate 			if (uoff >= limit) {
8887c478bd9Sstevel@tonic-gate 				error = EFBIG;
8897c478bd9Sstevel@tonic-gate 				goto out;
8907c478bd9Sstevel@tonic-gate 			}
8917c478bd9Sstevel@tonic-gate 			/*
8927c478bd9Sstevel@tonic-gate 			 * since uoff + n >= limit,
8937c478bd9Sstevel@tonic-gate 			 * therefore n >= limit - uoff, and n is an int
8947c478bd9Sstevel@tonic-gate 			 * so it is safe to cast it to an int
8957c478bd9Sstevel@tonic-gate 			 */
8967c478bd9Sstevel@tonic-gate 			n = (int)(limit - (rlim64_t)uoff);
8977c478bd9Sstevel@tonic-gate 		}
8987c478bd9Sstevel@tonic-gate 		if (uoff + n > ip->i_size) {
8997c478bd9Sstevel@tonic-gate 			/*
9007c478bd9Sstevel@tonic-gate 			 * We are extending the length of the file.
9017c478bd9Sstevel@tonic-gate 			 * bmap is used so that we are sure that
9027c478bd9Sstevel@tonic-gate 			 * if we need to allocate new blocks, that it
9037c478bd9Sstevel@tonic-gate 			 * is done here before we up the file size.
9047c478bd9Sstevel@tonic-gate 			 */
9057c478bd9Sstevel@tonic-gate 			error = bmap_write(ip, uoff, (int)(on + n),
906303bf60bSsdebnath 			    mapon == 0, NULL, cr);
9077c478bd9Sstevel@tonic-gate 			/*
9087c478bd9Sstevel@tonic-gate 			 * bmap_write never drops i_contents so if
9097c478bd9Sstevel@tonic-gate 			 * the flags are set it changed the file.
9107c478bd9Sstevel@tonic-gate 			 */
9117c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD)) {
9127c478bd9Sstevel@tonic-gate 				i_seq_needed = 1;
9137c478bd9Sstevel@tonic-gate 				ip->i_flag |= ISEQ;
9147c478bd9Sstevel@tonic-gate 			}
9157c478bd9Sstevel@tonic-gate 			if (error)
9167c478bd9Sstevel@tonic-gate 				break;
9177c478bd9Sstevel@tonic-gate 			/*
9187c478bd9Sstevel@tonic-gate 			 * There is a window of vulnerability here.
9197c478bd9Sstevel@tonic-gate 			 * The sequence of operations: allocate file
9207c478bd9Sstevel@tonic-gate 			 * system blocks, uiomove the data into pages,
9217c478bd9Sstevel@tonic-gate 			 * and then update the size of the file in the
9227c478bd9Sstevel@tonic-gate 			 * inode, must happen atomically.  However, due
9237c478bd9Sstevel@tonic-gate 			 * to current locking constraints, this can not
9247c478bd9Sstevel@tonic-gate 			 * be done.
9257c478bd9Sstevel@tonic-gate 			 */
9267c478bd9Sstevel@tonic-gate 			ASSERT(ip->i_writer == NULL);
9277c478bd9Sstevel@tonic-gate 			ip->i_writer = curthread;
9287c478bd9Sstevel@tonic-gate 			i_size_changed = 1;
9297c478bd9Sstevel@tonic-gate 			/*
9307c478bd9Sstevel@tonic-gate 			 * If we are writing from the beginning of
9317c478bd9Sstevel@tonic-gate 			 * the mapping, we can just create the
9327c478bd9Sstevel@tonic-gate 			 * pages without having to read them.
9337c478bd9Sstevel@tonic-gate 			 */
9347c478bd9Sstevel@tonic-gate 			pagecreate = (mapon == 0);
9357c478bd9Sstevel@tonic-gate 		} else if (n == MAXBSIZE) {
9367c478bd9Sstevel@tonic-gate 			/*
9377c478bd9Sstevel@tonic-gate 			 * Going to do a whole mappings worth,
9387c478bd9Sstevel@tonic-gate 			 * so we can just create the pages w/o
9397c478bd9Sstevel@tonic-gate 			 * having to read them in.  But before
9407c478bd9Sstevel@tonic-gate 			 * we do that, we need to make sure any
9417c478bd9Sstevel@tonic-gate 			 * needed blocks are allocated first.
9427c478bd9Sstevel@tonic-gate 			 */
9437c478bd9Sstevel@tonic-gate 			iblocks = ip->i_blocks;
944303bf60bSsdebnath 			error = bmap_write(ip, uoff, (int)(on + n),
945303bf60bSsdebnath 			    BI_ALLOC_ONLY, NULL, cr);
9467c478bd9Sstevel@tonic-gate 			/*
9477c478bd9Sstevel@tonic-gate 			 * bmap_write never drops i_contents so if
9487c478bd9Sstevel@tonic-gate 			 * the flags are set it changed the file.
9497c478bd9Sstevel@tonic-gate 			 */
9507c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD)) {
9517c478bd9Sstevel@tonic-gate 				i_seq_needed = 1;
9527c478bd9Sstevel@tonic-gate 				ip->i_flag |= ISEQ;
9537c478bd9Sstevel@tonic-gate 			}
9547c478bd9Sstevel@tonic-gate 			if (error)
9557c478bd9Sstevel@tonic-gate 				break;
9567c478bd9Sstevel@tonic-gate 			pagecreate = 1;
9577c478bd9Sstevel@tonic-gate 			/*
9587c478bd9Sstevel@tonic-gate 			 * check if the new created page needed the
9597c478bd9Sstevel@tonic-gate 			 * allocation of new disk blocks.
9607c478bd9Sstevel@tonic-gate 			 */
9617c478bd9Sstevel@tonic-gate 			if (iblocks == ip->i_blocks)
9627c478bd9Sstevel@tonic-gate 				new_iblocks = 0; /* no new blocks allocated */
9637c478bd9Sstevel@tonic-gate 		} else {
9647c478bd9Sstevel@tonic-gate 			pagecreate = 0;
9657c478bd9Sstevel@tonic-gate 			/*
9667c478bd9Sstevel@tonic-gate 			 * In sync mode flush the indirect blocks which
9677c478bd9Sstevel@tonic-gate 			 * may have been allocated and not written on
9687c478bd9Sstevel@tonic-gate 			 * disk. In above cases bmap_write will allocate
9697c478bd9Sstevel@tonic-gate 			 * in sync mode.
9707c478bd9Sstevel@tonic-gate 			 */
9717c478bd9Sstevel@tonic-gate 			if (ioflag & (FSYNC|FDSYNC)) {
9727c478bd9Sstevel@tonic-gate 				error = ufs_indirblk_sync(ip, uoff);
9737c478bd9Sstevel@tonic-gate 				if (error)
9747c478bd9Sstevel@tonic-gate 					break;
9757c478bd9Sstevel@tonic-gate 			}
9767c478bd9Sstevel@tonic-gate 		}
9777c478bd9Sstevel@tonic-gate 
9787c478bd9Sstevel@tonic-gate 		/*
9797c478bd9Sstevel@tonic-gate 		 * At this point we can enter ufs_getpage() in one
9807c478bd9Sstevel@tonic-gate 		 * of two ways:
9817c478bd9Sstevel@tonic-gate 		 * 1) segmap_getmapflt() calls ufs_getpage() when the
9827c478bd9Sstevel@tonic-gate 		 *    forcefault parameter is true (pagecreate == 0)
9837c478bd9Sstevel@tonic-gate 		 * 2) uiomove() causes a page fault.
9847c478bd9Sstevel@tonic-gate 		 *
9857c478bd9Sstevel@tonic-gate 		 * We have to drop the contents lock to prevent the VM
986da6c28aaSamw 		 * system from trying to reacquire it in ufs_getpage()
9877c478bd9Sstevel@tonic-gate 		 * should the uiomove cause a pagefault.
9887c478bd9Sstevel@tonic-gate 		 *
9897c478bd9Sstevel@tonic-gate 		 * We have to drop the reader vfs_dqrwlock here as well.
9907c478bd9Sstevel@tonic-gate 		 */
9917c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
9927c478bd9Sstevel@tonic-gate 		if (do_dqrwlock) {
9937c478bd9Sstevel@tonic-gate 			ASSERT(RW_LOCK_HELD(&ufsvfsp->vfs_dqrwlock));
9947c478bd9Sstevel@tonic-gate 			ASSERT(!(RW_WRITE_HELD(&ufsvfsp->vfs_dqrwlock)));
9957c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
9967c478bd9Sstevel@tonic-gate 		}
9977c478bd9Sstevel@tonic-gate 
998a5652762Spraks 		newpage = 0;
999a5652762Spraks 		premove_resid = uio->uio_resid;
1000a5652762Spraks 		if (vpm_enable) {
1001a5652762Spraks 			/*
1002a5652762Spraks 			 * Copy data. If new pages are created, part of
1003a5652762Spraks 			 * the page that is not written will be initizliazed
1004a5652762Spraks 			 * with zeros.
1005a5652762Spraks 			 */
1006a5652762Spraks 			error = vpm_data_copy(vp, (off + mapon), (uint_t)n,
100780d34432Sfrankho 			    uio, !pagecreate, &newpage, 0, S_WRITE);
1008a5652762Spraks 		} else {
1009a5652762Spraks 
1010a5652762Spraks 			base = segmap_getmapflt(segkmap, vp, (off + mapon),
101180d34432Sfrankho 			    (uint_t)n, !pagecreate, S_WRITE);
10127c478bd9Sstevel@tonic-gate 
1013a5652762Spraks 			/*
1014a5652762Spraks 			 * segmap_pagecreate() returns 1 if it calls
1015a5652762Spraks 			 * page_create_va() to allocate any pages.
1016a5652762Spraks 			 */
10177c478bd9Sstevel@tonic-gate 
1018a5652762Spraks 			if (pagecreate)
1019a5652762Spraks 				newpage = segmap_pagecreate(segkmap, base,
1020a5652762Spraks 				    (size_t)n, 0);
10217c478bd9Sstevel@tonic-gate 
1022a5652762Spraks 			error = uiomove(base + mapon, (long)n, UIO_WRITE, uio);
1023a5652762Spraks 		}
10247c478bd9Sstevel@tonic-gate 
10257c478bd9Sstevel@tonic-gate 		/*
10267c478bd9Sstevel@tonic-gate 		 * If "newpage" is set, then a new page was created and it
10277c478bd9Sstevel@tonic-gate 		 * does not contain valid data, so it needs to be initialized
10287c478bd9Sstevel@tonic-gate 		 * at this point.
10297c478bd9Sstevel@tonic-gate 		 * Otherwise the page contains old data, which was overwritten
10307c478bd9Sstevel@tonic-gate 		 * partially or as a whole in uiomove.
10317c478bd9Sstevel@tonic-gate 		 * If there is only one iovec structure within uio, then
10327c478bd9Sstevel@tonic-gate 		 * on error uiomove will not be able to update uio->uio_loffset
10337c478bd9Sstevel@tonic-gate 		 * and we would zero the whole page here!
10347c478bd9Sstevel@tonic-gate 		 *
10357c478bd9Sstevel@tonic-gate 		 * If uiomove fails because of an error, the old valid data
10367c478bd9Sstevel@tonic-gate 		 * is kept instead of filling the rest of the page with zero's.
10377c478bd9Sstevel@tonic-gate 		 */
1038a5652762Spraks 		if (!vpm_enable && newpage &&
10397c478bd9Sstevel@tonic-gate 		    uio->uio_loffset < roundup(off + mapon + n, PAGESIZE)) {
10407c478bd9Sstevel@tonic-gate 			/*
10417c478bd9Sstevel@tonic-gate 			 * We created pages w/o initializing them completely,
10427c478bd9Sstevel@tonic-gate 			 * thus we need to zero the part that wasn't set up.
10437c478bd9Sstevel@tonic-gate 			 * This happens on most EOF write cases and if
10447c478bd9Sstevel@tonic-gate 			 * we had some sort of error during the uiomove.
10457c478bd9Sstevel@tonic-gate 			 */
10467c478bd9Sstevel@tonic-gate 			int nzero, nmoved;
10477c478bd9Sstevel@tonic-gate 
10487c478bd9Sstevel@tonic-gate 			nmoved = (int)(uio->uio_loffset - (off + mapon));
10497c478bd9Sstevel@tonic-gate 			ASSERT(nmoved >= 0 && nmoved <= n);
10507c478bd9Sstevel@tonic-gate 			nzero = roundup(on + n, PAGESIZE) - nmoved;
10517c478bd9Sstevel@tonic-gate 			ASSERT(nzero > 0 && mapon + nmoved + nzero <= MAXBSIZE);
10527c478bd9Sstevel@tonic-gate 			(void) kzero(base + mapon + nmoved, (uint_t)nzero);
10537c478bd9Sstevel@tonic-gate 		}
10547c478bd9Sstevel@tonic-gate 
10557c478bd9Sstevel@tonic-gate 		/*
10567c478bd9Sstevel@tonic-gate 		 * Unlock the pages allocated by page_create_va()
10577c478bd9Sstevel@tonic-gate 		 * in segmap_pagecreate()
10587c478bd9Sstevel@tonic-gate 		 */
1059a5652762Spraks 		if (!vpm_enable && newpage)
10607c478bd9Sstevel@tonic-gate 			segmap_pageunlock(segkmap, base, (size_t)n, S_WRITE);
10617c478bd9Sstevel@tonic-gate 
10627c478bd9Sstevel@tonic-gate 		/*
10637c478bd9Sstevel@tonic-gate 		 * If the size of the file changed, then update the
10647c478bd9Sstevel@tonic-gate 		 * size field in the inode now.  This can't be done
10657c478bd9Sstevel@tonic-gate 		 * before the call to segmap_pageunlock or there is
10667c478bd9Sstevel@tonic-gate 		 * a potential deadlock with callers to ufs_putpage().
10677c478bd9Sstevel@tonic-gate 		 * They will be holding i_contents and trying to lock
10687c478bd9Sstevel@tonic-gate 		 * a page, while this thread is holding a page locked
10697c478bd9Sstevel@tonic-gate 		 * and trying to acquire i_contents.
10707c478bd9Sstevel@tonic-gate 		 */
10717c478bd9Sstevel@tonic-gate 		if (i_size_changed) {
10727c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
10737c478bd9Sstevel@tonic-gate 			old_i_size = ip->i_size;
10747c478bd9Sstevel@tonic-gate 			UFS_SET_ISIZE(uoff + n, ip);
10757c478bd9Sstevel@tonic-gate 			TRANS_INODE(ufsvfsp, ip);
10767c478bd9Sstevel@tonic-gate 			/*
10777c478bd9Sstevel@tonic-gate 			 * file has grown larger than 2GB. Set flag
10787c478bd9Sstevel@tonic-gate 			 * in superblock to indicate this, if it
10797c478bd9Sstevel@tonic-gate 			 * is not already set.
10807c478bd9Sstevel@tonic-gate 			 */
10817c478bd9Sstevel@tonic-gate 			if ((ip->i_size > MAXOFF32_T) &&
10827c478bd9Sstevel@tonic-gate 			    !(fs->fs_flags & FSLARGEFILES)) {
10837c478bd9Sstevel@tonic-gate 				ASSERT(ufsvfsp->vfs_lfflags & UFS_LARGEFILES);
10847c478bd9Sstevel@tonic-gate 				mutex_enter(&ufsvfsp->vfs_lock);
10857c478bd9Sstevel@tonic-gate 				fs->fs_flags |= FSLARGEFILES;
10867c478bd9Sstevel@tonic-gate 				ufs_sbwrite(ufsvfsp);
10877c478bd9Sstevel@tonic-gate 				mutex_exit(&ufsvfsp->vfs_lock);
10887c478bd9Sstevel@tonic-gate 			}
10897c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
10907c478bd9Sstevel@tonic-gate 			ip->i_writer = NULL;
10917c478bd9Sstevel@tonic-gate 			cv_broadcast(&ip->i_wrcv);
10927c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
10937c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
10947c478bd9Sstevel@tonic-gate 		}
10957c478bd9Sstevel@tonic-gate 
10967c478bd9Sstevel@tonic-gate 		if (error) {
10977c478bd9Sstevel@tonic-gate 			/*
10987c478bd9Sstevel@tonic-gate 			 * If we failed on a write, we may have already
10997c478bd9Sstevel@tonic-gate 			 * allocated file blocks as well as pages.  It's
11007c478bd9Sstevel@tonic-gate 			 * hard to undo the block allocation, but we must
11017c478bd9Sstevel@tonic-gate 			 * be sure to invalidate any pages that may have
11027c478bd9Sstevel@tonic-gate 			 * been allocated.
11037c478bd9Sstevel@tonic-gate 			 *
11047c478bd9Sstevel@tonic-gate 			 * If the page was created without initialization
11057c478bd9Sstevel@tonic-gate 			 * then we must check if it should be possible
11067c478bd9Sstevel@tonic-gate 			 * to destroy the new page and to keep the old data
11077c478bd9Sstevel@tonic-gate 			 * on the disk.
11087c478bd9Sstevel@tonic-gate 			 *
11097c478bd9Sstevel@tonic-gate 			 * It is possible to destroy the page without
11107c478bd9Sstevel@tonic-gate 			 * having to write back its contents only when
11117c478bd9Sstevel@tonic-gate 			 * - the size of the file keeps unchanged
11127c478bd9Sstevel@tonic-gate 			 * - bmap_write() did not allocate new disk blocks
11137c478bd9Sstevel@tonic-gate 			 *   it is possible to create big files using "seek" and
11147c478bd9Sstevel@tonic-gate 			 *   write to the end of the file. A "write" to a
11157c478bd9Sstevel@tonic-gate 			 *   position before the end of the file would not
11167c478bd9Sstevel@tonic-gate 			 *   change the size of the file but it would allocate
11177c478bd9Sstevel@tonic-gate 			 *   new disk blocks.
11187c478bd9Sstevel@tonic-gate 			 * - uiomove intended to overwrite the whole page.
11197c478bd9Sstevel@tonic-gate 			 * - a new page was created (newpage == 1).
11207c478bd9Sstevel@tonic-gate 			 */
11217c478bd9Sstevel@tonic-gate 
11227c478bd9Sstevel@tonic-gate 			if (i_size_changed == 0 && new_iblocks == 0 &&
11237c478bd9Sstevel@tonic-gate 			    newpage) {
11247c478bd9Sstevel@tonic-gate 
11257c478bd9Sstevel@tonic-gate 				/* unwind what uiomove eventually last did */
11267c478bd9Sstevel@tonic-gate 				uio->uio_resid = premove_resid;
11277c478bd9Sstevel@tonic-gate 
11287c478bd9Sstevel@tonic-gate 				/*
11297c478bd9Sstevel@tonic-gate 				 * destroy the page, do not write ambiguous
11307c478bd9Sstevel@tonic-gate 				 * data to the disk.
11317c478bd9Sstevel@tonic-gate 				 */
11327c478bd9Sstevel@tonic-gate 				flags = SM_DESTROY;
11337c478bd9Sstevel@tonic-gate 			} else {
11347c478bd9Sstevel@tonic-gate 				/*
11357c478bd9Sstevel@tonic-gate 				 * write the page back to the disk, if dirty,
11367c478bd9Sstevel@tonic-gate 				 * and remove the page from the cache.
11377c478bd9Sstevel@tonic-gate 				 */
11387c478bd9Sstevel@tonic-gate 				flags = SM_INVAL;
11397c478bd9Sstevel@tonic-gate 			}
1140a5652762Spraks 
1141a5652762Spraks 			if (vpm_enable) {
1142a5652762Spraks 				/*
1143a5652762Spraks 				 *  Flush pages.
1144a5652762Spraks 				 */
1145a5652762Spraks 				(void) vpm_sync_pages(vp, off, n, flags);
1146a5652762Spraks 			} else {
1147a5652762Spraks 				(void) segmap_release(segkmap, base, flags);
1148a5652762Spraks 			}
11497c478bd9Sstevel@tonic-gate 		} else {
11507c478bd9Sstevel@tonic-gate 			flags = 0;
11517c478bd9Sstevel@tonic-gate 			/*
11527c478bd9Sstevel@tonic-gate 			 * Force write back for synchronous write cases.
11537c478bd9Sstevel@tonic-gate 			 */
11547c478bd9Sstevel@tonic-gate 			if ((ioflag & (FSYNC|FDSYNC)) || type == IFDIR) {
11557c478bd9Sstevel@tonic-gate 				/*
11567c478bd9Sstevel@tonic-gate 				 * If the sticky bit is set but the
11577c478bd9Sstevel@tonic-gate 				 * execute bit is not set, we do a
11587c478bd9Sstevel@tonic-gate 				 * synchronous write back and free
11597c478bd9Sstevel@tonic-gate 				 * the page when done.  We set up swap
11607c478bd9Sstevel@tonic-gate 				 * files to be handled this way to
11617c478bd9Sstevel@tonic-gate 				 * prevent servers from keeping around
11627c478bd9Sstevel@tonic-gate 				 * the client's swap pages too long.
11637c478bd9Sstevel@tonic-gate 				 * XXX - there ought to be a better way.
11647c478bd9Sstevel@tonic-gate 				 */
11657c478bd9Sstevel@tonic-gate 				if (IS_SWAPVP(vp)) {
11667c478bd9Sstevel@tonic-gate 					flags = SM_WRITE | SM_FREE |
11677c478bd9Sstevel@tonic-gate 					    SM_DONTNEED;
11687c478bd9Sstevel@tonic-gate 					iupdat_flag = 0;
11697c478bd9Sstevel@tonic-gate 				} else {
11707c478bd9Sstevel@tonic-gate 					flags = SM_WRITE;
11717c478bd9Sstevel@tonic-gate 				}
11727c478bd9Sstevel@tonic-gate 			} else if (n + on == MAXBSIZE || IS_SWAPVP(vp)) {
11737c478bd9Sstevel@tonic-gate 				/*
11747c478bd9Sstevel@tonic-gate 				 * Have written a whole block.
11757c478bd9Sstevel@tonic-gate 				 * Start an asynchronous write and
11767c478bd9Sstevel@tonic-gate 				 * mark the buffer to indicate that
11777c478bd9Sstevel@tonic-gate 				 * it won't be needed again soon.
11787c478bd9Sstevel@tonic-gate 				 */
11797c478bd9Sstevel@tonic-gate 				flags = SM_WRITE | SM_ASYNC | SM_DONTNEED;
11807c478bd9Sstevel@tonic-gate 			}
1181a5652762Spraks 			if (vpm_enable) {
1182a5652762Spraks 				/*
1183a5652762Spraks 				 * Flush pages.
1184a5652762Spraks 				 */
11853bd1497bSpraks 				error = vpm_sync_pages(vp, off, n, flags);
1186a5652762Spraks 			} else {
11873bd1497bSpraks 				error = segmap_release(segkmap, base, flags);
1188a5652762Spraks 			}
11897c478bd9Sstevel@tonic-gate 			/*
11907c478bd9Sstevel@tonic-gate 			 * If the operation failed and is synchronous,
11917c478bd9Sstevel@tonic-gate 			 * then we need to unwind what uiomove() last
11927c478bd9Sstevel@tonic-gate 			 * did so we can potentially return an error to
11937c478bd9Sstevel@tonic-gate 			 * the caller.  If this write operation was
11947c478bd9Sstevel@tonic-gate 			 * done in two pieces and the first succeeded,
11957c478bd9Sstevel@tonic-gate 			 * then we won't return an error for the second
11967c478bd9Sstevel@tonic-gate 			 * piece that failed.  However, we only want to
11977c478bd9Sstevel@tonic-gate 			 * return a resid value that reflects what was
11987c478bd9Sstevel@tonic-gate 			 * really done.
11997c478bd9Sstevel@tonic-gate 			 *
12007c478bd9Sstevel@tonic-gate 			 * Failures for non-synchronous operations can
12017c478bd9Sstevel@tonic-gate 			 * be ignored since the page subsystem will
12027c478bd9Sstevel@tonic-gate 			 * retry the operation until it succeeds or the
12037c478bd9Sstevel@tonic-gate 			 * file system is unmounted.
12047c478bd9Sstevel@tonic-gate 			 */
12057c478bd9Sstevel@tonic-gate 			if (error) {
12067c478bd9Sstevel@tonic-gate 				if ((ioflag & (FSYNC | FDSYNC)) ||
12077c478bd9Sstevel@tonic-gate 				    type == IFDIR) {
12087c478bd9Sstevel@tonic-gate 					uio->uio_resid = premove_resid;
12097c478bd9Sstevel@tonic-gate 				} else {
12107c478bd9Sstevel@tonic-gate 					error = 0;
12117c478bd9Sstevel@tonic-gate 				}
12127c478bd9Sstevel@tonic-gate 			}
12137c478bd9Sstevel@tonic-gate 		}
12147c478bd9Sstevel@tonic-gate 
12157c478bd9Sstevel@tonic-gate 		/*
12167c478bd9Sstevel@tonic-gate 		 * Re-acquire contents lock.
12177c478bd9Sstevel@tonic-gate 		 * If it was dropped, reacquire reader vfs_dqrwlock as well.
12187c478bd9Sstevel@tonic-gate 		 */
12197c478bd9Sstevel@tonic-gate 		if (do_dqrwlock)
12207c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
12217c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
12227c478bd9Sstevel@tonic-gate 
12237c478bd9Sstevel@tonic-gate 		/*
12247c478bd9Sstevel@tonic-gate 		 * If the uiomove() failed or if a synchronous
12257c478bd9Sstevel@tonic-gate 		 * page push failed, fix up i_size.
12267c478bd9Sstevel@tonic-gate 		 */
12277c478bd9Sstevel@tonic-gate 		if (error) {
12287c478bd9Sstevel@tonic-gate 			if (i_size_changed) {
12297c478bd9Sstevel@tonic-gate 				/*
12307c478bd9Sstevel@tonic-gate 				 * The uiomove failed, and we
12317c478bd9Sstevel@tonic-gate 				 * allocated blocks,so get rid
12327c478bd9Sstevel@tonic-gate 				 * of them.
12337c478bd9Sstevel@tonic-gate 				 */
12347c478bd9Sstevel@tonic-gate 				(void) ufs_itrunc(ip, old_i_size, 0, cr);
12357c478bd9Sstevel@tonic-gate 			}
12367c478bd9Sstevel@tonic-gate 		} else {
12377c478bd9Sstevel@tonic-gate 			/*
12387c478bd9Sstevel@tonic-gate 			 * XXX - Can this be out of the loop?
12397c478bd9Sstevel@tonic-gate 			 */
12407c478bd9Sstevel@tonic-gate 			ip->i_flag |= IUPD | ICHG;
12417c478bd9Sstevel@tonic-gate 			/*
12427c478bd9Sstevel@tonic-gate 			 * Only do one increase of i_seq for multiple
12437c478bd9Sstevel@tonic-gate 			 * pieces.  Because we drop locks, record
12447c478bd9Sstevel@tonic-gate 			 * the fact that we changed the timestamp and
12457c478bd9Sstevel@tonic-gate 			 * are deferring the increase in case another thread
12467c478bd9Sstevel@tonic-gate 			 * pushes our timestamp update.
12477c478bd9Sstevel@tonic-gate 			 */
12487c478bd9Sstevel@tonic-gate 			i_seq_needed = 1;
12497c478bd9Sstevel@tonic-gate 			ip->i_flag |= ISEQ;
12507c478bd9Sstevel@tonic-gate 			if (i_size_changed)
12517c478bd9Sstevel@tonic-gate 				ip->i_flag |= IATTCHG;
12527c478bd9Sstevel@tonic-gate 			if ((ip->i_mode & (IEXEC | (IEXEC >> 3) |
12537c478bd9Sstevel@tonic-gate 			    (IEXEC >> 6))) != 0 &&
12547c478bd9Sstevel@tonic-gate 			    (ip->i_mode & (ISUID | ISGID)) != 0 &&
12557c478bd9Sstevel@tonic-gate 			    secpolicy_vnode_setid_retain(cr,
12567c478bd9Sstevel@tonic-gate 			    (ip->i_mode & ISUID) != 0 && ip->i_uid == 0) != 0) {
12577c478bd9Sstevel@tonic-gate 				/*
12587c478bd9Sstevel@tonic-gate 				 * Clear Set-UID & Set-GID bits on
12597c478bd9Sstevel@tonic-gate 				 * successful write if not privileged
12607c478bd9Sstevel@tonic-gate 				 * and at least one of the execute bits
12617c478bd9Sstevel@tonic-gate 				 * is set.  If we always clear Set-GID,
12627c478bd9Sstevel@tonic-gate 				 * mandatory file and record locking is
12637c478bd9Sstevel@tonic-gate 				 * unuseable.
12647c478bd9Sstevel@tonic-gate 				 */
12657c478bd9Sstevel@tonic-gate 				ip->i_mode &= ~(ISUID | ISGID);
12667c478bd9Sstevel@tonic-gate 			}
12677c478bd9Sstevel@tonic-gate 		}
1268f90bab20Sswilcox 		/*
1269f90bab20Sswilcox 		 * In the case the FDSYNC flag is set and this is a
1270f90bab20Sswilcox 		 * "rewrite" we won't log a delta.
1271f90bab20Sswilcox 		 * The FSYNC flag overrides all cases.
1272f90bab20Sswilcox 		 */
1273f90bab20Sswilcox 		if (!ufs_check_rewrite(ip, uio, ioflag) || !(ioflag & FDSYNC)) {
1274f90bab20Sswilcox 			TRANS_INODE(ufsvfsp, ip);
1275f90bab20Sswilcox 		}
12767c478bd9Sstevel@tonic-gate 	} while (error == 0 && uio->uio_resid > 0 && n != 0);
12777c478bd9Sstevel@tonic-gate 
12787c478bd9Sstevel@tonic-gate out:
12797c478bd9Sstevel@tonic-gate 	/*
12807c478bd9Sstevel@tonic-gate 	 * Make sure i_seq is increased at least once per write
12817c478bd9Sstevel@tonic-gate 	 */
12827c478bd9Sstevel@tonic-gate 	if (i_seq_needed) {
12837c478bd9Sstevel@tonic-gate 		ip->i_seq++;
12847c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~ISEQ;	/* no longer deferred */
12857c478bd9Sstevel@tonic-gate 	}
12867c478bd9Sstevel@tonic-gate 
12877c478bd9Sstevel@tonic-gate 	/*
12887c478bd9Sstevel@tonic-gate 	 * Inode is updated according to this table -
12897c478bd9Sstevel@tonic-gate 	 *
12907c478bd9Sstevel@tonic-gate 	 *   FSYNC	  FDSYNC(posix.4)
12917c478bd9Sstevel@tonic-gate 	 *   --------------------------
12927c478bd9Sstevel@tonic-gate 	 *   always@	  IATTCHG|IBDWRITE
12937c478bd9Sstevel@tonic-gate 	 *
12947c478bd9Sstevel@tonic-gate 	 * @ - 	If we are doing synchronous write the only time we should
12957c478bd9Sstevel@tonic-gate 	 *	not be sync'ing the ip here is if we have the stickyhack
12967c478bd9Sstevel@tonic-gate 	 *	activated, the file is marked with the sticky bit and
12977c478bd9Sstevel@tonic-gate 	 *	no exec bit, the file length has not been changed and
12987c478bd9Sstevel@tonic-gate 	 *	no new blocks have been allocated during this write.
12997c478bd9Sstevel@tonic-gate 	 */
13007c478bd9Sstevel@tonic-gate 
13017c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & ISYNC) != 0) {
13027c478bd9Sstevel@tonic-gate 		/*
13037c478bd9Sstevel@tonic-gate 		 * we have eliminated nosync
13047c478bd9Sstevel@tonic-gate 		 */
13057c478bd9Sstevel@tonic-gate 		if ((ip->i_flag & (IATTCHG|IBDWRITE)) ||
130680d34432Sfrankho 		    ((ioflag & FSYNC) && iupdat_flag)) {
13077c478bd9Sstevel@tonic-gate 			ufs_iupdat(ip, 1);
13087c478bd9Sstevel@tonic-gate 		}
13097c478bd9Sstevel@tonic-gate 	}
13107c478bd9Sstevel@tonic-gate 
13117c478bd9Sstevel@tonic-gate 	/*
13127c478bd9Sstevel@tonic-gate 	 * If we've already done a partial-write, terminate
13137c478bd9Sstevel@tonic-gate 	 * the write but return no error unless the error is ENOSPC
13147c478bd9Sstevel@tonic-gate 	 * because the caller can detect this and free resources and
13157c478bd9Sstevel@tonic-gate 	 * try again.
13167c478bd9Sstevel@tonic-gate 	 */
13177c478bd9Sstevel@tonic-gate 	if ((start_resid != uio->uio_resid) && (error != ENOSPC))
13187c478bd9Sstevel@tonic-gate 		error = 0;
13197c478bd9Sstevel@tonic-gate 
13207c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~(INOACC | ISYNC);
13217c478bd9Sstevel@tonic-gate 	ITIMES_NOLOCK(ip);
13227c478bd9Sstevel@tonic-gate 	return (error);
13237c478bd9Sstevel@tonic-gate }
13247c478bd9Sstevel@tonic-gate 
13257c478bd9Sstevel@tonic-gate /*
13267c478bd9Sstevel@tonic-gate  * rdip does the real work of read requests for ufs.
13277c478bd9Sstevel@tonic-gate  */
13287c478bd9Sstevel@tonic-gate int
13297c478bd9Sstevel@tonic-gate rdip(struct inode *ip, struct uio *uio, int ioflag, cred_t *cr)
13307c478bd9Sstevel@tonic-gate {
13317c478bd9Sstevel@tonic-gate 	u_offset_t off;
13327c478bd9Sstevel@tonic-gate 	caddr_t base;
13337c478bd9Sstevel@tonic-gate 	struct fs *fs;
13347c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
13357c478bd9Sstevel@tonic-gate 	struct vnode *vp;
13367c478bd9Sstevel@tonic-gate 	long oresid = uio->uio_resid;
13377c478bd9Sstevel@tonic-gate 	u_offset_t n, on, mapon;
13387c478bd9Sstevel@tonic-gate 	int error = 0;
13397c478bd9Sstevel@tonic-gate 	int doupdate = 1;
1340562eee46Srbourbon 	uint_t flags;
13417c478bd9Sstevel@tonic-gate 	int dofree, directio_status;
13427c478bd9Sstevel@tonic-gate 	krw_t rwtype;
13437c478bd9Sstevel@tonic-gate 	o_mode_t type;
13447c478bd9Sstevel@tonic-gate 
13457c478bd9Sstevel@tonic-gate 	vp = ITOV(ip);
13467c478bd9Sstevel@tonic-gate 
13477c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
13487c478bd9Sstevel@tonic-gate 
13497c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
13507c478bd9Sstevel@tonic-gate 
13517c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
13527c478bd9Sstevel@tonic-gate 		return (EIO);
13537c478bd9Sstevel@tonic-gate 
13547c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
13557c478bd9Sstevel@tonic-gate 
13567c478bd9Sstevel@tonic-gate 	/* check for valid filetype */
13577c478bd9Sstevel@tonic-gate 	type = ip->i_mode & IFMT;
13587c478bd9Sstevel@tonic-gate 	if ((type != IFREG) && (type != IFDIR) && (type != IFATTRDIR) &&
13597c478bd9Sstevel@tonic-gate 	    (type != IFLNK) && (type != IFSHAD)) {
13607c478bd9Sstevel@tonic-gate 		return (EIO);
13617c478bd9Sstevel@tonic-gate 	}
13627c478bd9Sstevel@tonic-gate 
13637c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset > UFS_MAXOFFSET_T) {
13647c478bd9Sstevel@tonic-gate 		error = 0;
13657c478bd9Sstevel@tonic-gate 		goto out;
13667c478bd9Sstevel@tonic-gate 	}
13677c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset < (offset_t)0) {
13687c478bd9Sstevel@tonic-gate 		return (EINVAL);
13697c478bd9Sstevel@tonic-gate 	}
13707c478bd9Sstevel@tonic-gate 	if (uio->uio_resid == 0) {
13717c478bd9Sstevel@tonic-gate 		return (0);
13727c478bd9Sstevel@tonic-gate 	}
13737c478bd9Sstevel@tonic-gate 
13747c478bd9Sstevel@tonic-gate 	if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) && (fs->fs_ronly == 0) &&
137580d34432Sfrankho 	    (!ufsvfsp->vfs_noatime)) {
13767c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
13777c478bd9Sstevel@tonic-gate 		ip->i_flag |= IACC;
13787c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
13797c478bd9Sstevel@tonic-gate 	}
13807c478bd9Sstevel@tonic-gate 	/*
13817c478bd9Sstevel@tonic-gate 	 * Try to go direct
13827c478bd9Sstevel@tonic-gate 	 */
13837c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) {
13847c478bd9Sstevel@tonic-gate 		error = ufs_directio_read(ip, uio, cr, &directio_status);
13857c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS)
13867c478bd9Sstevel@tonic-gate 			goto out;
13877c478bd9Sstevel@tonic-gate 	}
13887c478bd9Sstevel@tonic-gate 
13897c478bd9Sstevel@tonic-gate 	rwtype = (rw_write_held(&ip->i_contents)?RW_WRITER:RW_READER);
13907c478bd9Sstevel@tonic-gate 
13917c478bd9Sstevel@tonic-gate 	do {
13927c478bd9Sstevel@tonic-gate 		offset_t diff;
13937c478bd9Sstevel@tonic-gate 		u_offset_t uoff = uio->uio_loffset;
13947c478bd9Sstevel@tonic-gate 		off = uoff & (offset_t)MAXBMASK;
13957c478bd9Sstevel@tonic-gate 		mapon = (u_offset_t)(uoff & (offset_t)MAXBOFFSET);
13967c478bd9Sstevel@tonic-gate 		on = (u_offset_t)blkoff(fs, uoff);
13977c478bd9Sstevel@tonic-gate 		n = MIN((u_offset_t)fs->fs_bsize - on,
139880d34432Sfrankho 		    (u_offset_t)uio->uio_resid);
13997c478bd9Sstevel@tonic-gate 
14007c478bd9Sstevel@tonic-gate 		diff = ip->i_size - uoff;
14017c478bd9Sstevel@tonic-gate 
14027c478bd9Sstevel@tonic-gate 		if (diff <= (offset_t)0) {
14037c478bd9Sstevel@tonic-gate 			error = 0;
14047c478bd9Sstevel@tonic-gate 			goto out;
14057c478bd9Sstevel@tonic-gate 		}
14067c478bd9Sstevel@tonic-gate 		if (diff < (offset_t)n)
14077c478bd9Sstevel@tonic-gate 			n = (int)diff;
1408562eee46Srbourbon 
1409562eee46Srbourbon 		/*
1410562eee46Srbourbon 		 * We update smallfile2 and smallfile1 at most every second.
1411562eee46Srbourbon 		 */
1412562eee46Srbourbon 		if (lbolt >= smallfile_update) {
1413562eee46Srbourbon 			uint64_t percpufreeb;
1414562eee46Srbourbon 			if (smallfile1_d == 0) smallfile1_d = SMALLFILE1_D;
1415562eee46Srbourbon 			if (smallfile2_d == 0) smallfile2_d = SMALLFILE2_D;
1416562eee46Srbourbon 			percpufreeb = ptob((uint64_t)freemem) / ncpus_online;
1417562eee46Srbourbon 			smallfile1 = percpufreeb / smallfile1_d;
1418562eee46Srbourbon 			smallfile2 = percpufreeb / smallfile2_d;
1419562eee46Srbourbon 			smallfile1 = MAX(smallfile1, smallfile);
1420562eee46Srbourbon 			smallfile1 = MAX(smallfile1, smallfile64);
1421562eee46Srbourbon 			smallfile2 = MAX(smallfile1, smallfile2);
1422562eee46Srbourbon 			smallfile_update = lbolt + hz;
1423562eee46Srbourbon 		}
1424562eee46Srbourbon 
14257c478bd9Sstevel@tonic-gate 		dofree = freebehind &&
1426562eee46Srbourbon 		    ip->i_nextr == (off & PAGEMASK) && off > smallfile1;
14277c478bd9Sstevel@tonic-gate 
14287c478bd9Sstevel@tonic-gate 		/*
14297c478bd9Sstevel@tonic-gate 		 * At this point we can enter ufs_getpage() in one of two
14307c478bd9Sstevel@tonic-gate 		 * ways:
14317c478bd9Sstevel@tonic-gate 		 * 1) segmap_getmapflt() calls ufs_getpage() when the
14327c478bd9Sstevel@tonic-gate 		 *    forcefault parameter is true (value of 1 is passed)
14337c478bd9Sstevel@tonic-gate 		 * 2) uiomove() causes a page fault.
14347c478bd9Sstevel@tonic-gate 		 *
14357c478bd9Sstevel@tonic-gate 		 * We cannot hold onto an i_contents reader lock without
14367c478bd9Sstevel@tonic-gate 		 * risking deadlock in ufs_getpage() so drop a reader lock.
14377c478bd9Sstevel@tonic-gate 		 * The ufs_getpage() dolock logic already allows for a
14387c478bd9Sstevel@tonic-gate 		 * thread holding i_contents as writer to work properly
14397c478bd9Sstevel@tonic-gate 		 * so we keep a writer lock.
14407c478bd9Sstevel@tonic-gate 		 */
14417c478bd9Sstevel@tonic-gate 		if (rwtype == RW_READER)
14427c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
14437c478bd9Sstevel@tonic-gate 
1444a5652762Spraks 		if (vpm_enable) {
1445a5652762Spraks 			/*
1446a5652762Spraks 			 * Copy data.
1447a5652762Spraks 			 */
1448a5652762Spraks 			error = vpm_data_copy(vp, (off + mapon), (uint_t)n,
144980d34432Sfrankho 			    uio, 1, NULL, 0, S_READ);
1450a5652762Spraks 		} else {
1451a5652762Spraks 			base = segmap_getmapflt(segkmap, vp, (off + mapon),
145280d34432Sfrankho 			    (uint_t)n, 1, S_READ);
1453a5652762Spraks 			error = uiomove(base + mapon, (long)n, UIO_READ, uio);
1454a5652762Spraks 		}
14557c478bd9Sstevel@tonic-gate 
14567c478bd9Sstevel@tonic-gate 		flags = 0;
14577c478bd9Sstevel@tonic-gate 		if (!error) {
14587c478bd9Sstevel@tonic-gate 			/*
1459562eee46Srbourbon 			 * If  reading sequential  we won't need  this
1460562eee46Srbourbon 			 * buffer again  soon.  For  offsets in  range
1461562eee46Srbourbon 			 * [smallfile1,  smallfile2] release the pages
1462562eee46Srbourbon 			 * at   the  tail  of the   cache list, larger
1463562eee46Srbourbon 			 * offsets are released at the head.
14647c478bd9Sstevel@tonic-gate 			 */
14657c478bd9Sstevel@tonic-gate 			if (dofree) {
1466562eee46Srbourbon 				flags = SM_FREE | SM_ASYNC;
1467562eee46Srbourbon 				if ((cache_read_ahead == 0) &&
146880d34432Sfrankho 				    (off > smallfile2))
1469562eee46Srbourbon 					flags |=  SM_DONTNEED;
14707c478bd9Sstevel@tonic-gate 			}
14717c478bd9Sstevel@tonic-gate 			/*
14727c478bd9Sstevel@tonic-gate 			 * In POSIX SYNC (FSYNC and FDSYNC) read mode,
14737c478bd9Sstevel@tonic-gate 			 * we want to make sure that the page which has
14747c478bd9Sstevel@tonic-gate 			 * been read, is written on disk if it is dirty.
14757c478bd9Sstevel@tonic-gate 			 * And corresponding indirect blocks should also
14767c478bd9Sstevel@tonic-gate 			 * be flushed out.
14777c478bd9Sstevel@tonic-gate 			 */
14787c478bd9Sstevel@tonic-gate 			if ((ioflag & FRSYNC) && (ioflag & (FSYNC|FDSYNC))) {
14797c478bd9Sstevel@tonic-gate 				flags &= ~SM_ASYNC;
14807c478bd9Sstevel@tonic-gate 				flags |= SM_WRITE;
14817c478bd9Sstevel@tonic-gate 			}
1482a5652762Spraks 			if (vpm_enable) {
1483a5652762Spraks 				error = vpm_sync_pages(vp, off, n, flags);
1484a5652762Spraks 			} else {
1485a5652762Spraks 				error = segmap_release(segkmap, base, flags);
1486a5652762Spraks 			}
1487a5652762Spraks 		} else {
1488a5652762Spraks 			if (vpm_enable) {
1489a5652762Spraks 				(void) vpm_sync_pages(vp, off, n, flags);
1490a5652762Spraks 			} else {
1491a5652762Spraks 				(void) segmap_release(segkmap, base, flags);
1492a5652762Spraks 			}
1493a5652762Spraks 		}
14947c478bd9Sstevel@tonic-gate 
14957c478bd9Sstevel@tonic-gate 		if (rwtype == RW_READER)
14967c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, rwtype);
14977c478bd9Sstevel@tonic-gate 	} while (error == 0 && uio->uio_resid > 0 && n != 0);
14987c478bd9Sstevel@tonic-gate out:
14997c478bd9Sstevel@tonic-gate 	/*
15007c478bd9Sstevel@tonic-gate 	 * Inode is updated according to this table if FRSYNC is set.
15017c478bd9Sstevel@tonic-gate 	 *
15027c478bd9Sstevel@tonic-gate 	 *   FSYNC	  FDSYNC(posix.4)
15037c478bd9Sstevel@tonic-gate 	 *   --------------------------
15047c478bd9Sstevel@tonic-gate 	 *   always	  IATTCHG|IBDWRITE
15057c478bd9Sstevel@tonic-gate 	 */
15067c478bd9Sstevel@tonic-gate 	/*
15077c478bd9Sstevel@tonic-gate 	 * The inode is not updated if we're logging and the inode is a
15087c478bd9Sstevel@tonic-gate 	 * directory with FRSYNC, FSYNC and FDSYNC flags set.
15097c478bd9Sstevel@tonic-gate 	 */
15107c478bd9Sstevel@tonic-gate 	if (ioflag & FRSYNC) {
15117c478bd9Sstevel@tonic-gate 		if (TRANS_ISTRANS(ufsvfsp) && ((ip->i_mode & IFMT) == IFDIR)) {
1512986fd29aSsetje 			doupdate = 0;
15137c478bd9Sstevel@tonic-gate 		}
15147c478bd9Sstevel@tonic-gate 		if (doupdate) {
15157c478bd9Sstevel@tonic-gate 			if ((ioflag & FSYNC) ||
15167c478bd9Sstevel@tonic-gate 			    ((ioflag & FDSYNC) &&
15177c478bd9Sstevel@tonic-gate 			    (ip->i_flag & (IATTCHG|IBDWRITE)))) {
15187c478bd9Sstevel@tonic-gate 				ufs_iupdat(ip, 1);
15197c478bd9Sstevel@tonic-gate 			}
15207c478bd9Sstevel@tonic-gate 		}
15217c478bd9Sstevel@tonic-gate 	}
15227c478bd9Sstevel@tonic-gate 	/*
15237c478bd9Sstevel@tonic-gate 	 * If we've already done a partial read, terminate
15247c478bd9Sstevel@tonic-gate 	 * the read but return no error.
15257c478bd9Sstevel@tonic-gate 	 */
15267c478bd9Sstevel@tonic-gate 	if (oresid != uio->uio_resid)
15277c478bd9Sstevel@tonic-gate 		error = 0;
15287c478bd9Sstevel@tonic-gate 	ITIMES(ip);
15297c478bd9Sstevel@tonic-gate 
15307c478bd9Sstevel@tonic-gate 	return (error);
15317c478bd9Sstevel@tonic-gate }
15327c478bd9Sstevel@tonic-gate 
15337c478bd9Sstevel@tonic-gate /* ARGSUSED */
15347c478bd9Sstevel@tonic-gate static int
15357c478bd9Sstevel@tonic-gate ufs_ioctl(
15367c478bd9Sstevel@tonic-gate 	struct vnode	*vp,
15377c478bd9Sstevel@tonic-gate 	int		cmd,
15387c478bd9Sstevel@tonic-gate 	intptr_t	arg,
15397c478bd9Sstevel@tonic-gate 	int		flag,
15407c478bd9Sstevel@tonic-gate 	struct cred	*cr,
1541da6c28aaSamw 	int		*rvalp,
1542da6c28aaSamw 	caller_context_t *ct)
15437c478bd9Sstevel@tonic-gate {
15447c478bd9Sstevel@tonic-gate 	struct lockfs	lockfs, lockfs_out;
15457c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
15467c478bd9Sstevel@tonic-gate 	char		*comment, *original_comment;
15477c478bd9Sstevel@tonic-gate 	struct fs	*fs;
15487c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
15497c478bd9Sstevel@tonic-gate 	offset_t	off;
15507c478bd9Sstevel@tonic-gate 	extern int	maxphys;
15517c478bd9Sstevel@tonic-gate 	int		error;
15527c478bd9Sstevel@tonic-gate 	int		issync;
15537c478bd9Sstevel@tonic-gate 	int		trans_size;
15547c478bd9Sstevel@tonic-gate 
15557c478bd9Sstevel@tonic-gate 
15567c478bd9Sstevel@tonic-gate 	/*
15577c478bd9Sstevel@tonic-gate 	 * forcibly unmounted
15587c478bd9Sstevel@tonic-gate 	 */
155902ffed0eSjr 	if (ufsvfsp == NULL || vp->v_vfsp == NULL ||
156002ffed0eSjr 	    vp->v_vfsp->vfs_flag & VFS_UNMOUNTED)
15617c478bd9Sstevel@tonic-gate 		return (EIO);
15627c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
15637c478bd9Sstevel@tonic-gate 
15647c478bd9Sstevel@tonic-gate 	if (cmd == Q_QUOTACTL) {
15657c478bd9Sstevel@tonic-gate 		error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_QUOTA_MASK);
15667c478bd9Sstevel@tonic-gate 		if (error)
15677c478bd9Sstevel@tonic-gate 			return (error);
15687c478bd9Sstevel@tonic-gate 
15697c478bd9Sstevel@tonic-gate 		if (ulp) {
15707c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_QUOTA,
157180d34432Sfrankho 			    TOP_SETQUOTA_SIZE(fs));
15727c478bd9Sstevel@tonic-gate 		}
15737c478bd9Sstevel@tonic-gate 
15747c478bd9Sstevel@tonic-gate 		error = quotactl(vp, arg, flag, cr);
15757c478bd9Sstevel@tonic-gate 
15767c478bd9Sstevel@tonic-gate 		if (ulp) {
15777c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_QUOTA,
157880d34432Sfrankho 			    TOP_SETQUOTA_SIZE(fs));
15797c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
15807c478bd9Sstevel@tonic-gate 		}
15817c478bd9Sstevel@tonic-gate 		return (error);
15827c478bd9Sstevel@tonic-gate 	}
15837c478bd9Sstevel@tonic-gate 
15847c478bd9Sstevel@tonic-gate 	switch (cmd) {
15857c478bd9Sstevel@tonic-gate 		case _FIOLFS:
15867c478bd9Sstevel@tonic-gate 			/*
15877c478bd9Sstevel@tonic-gate 			 * file system locking
15887c478bd9Sstevel@tonic-gate 			 */
15897c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
15907c478bd9Sstevel@tonic-gate 				return (EPERM);
15917c478bd9Sstevel@tonic-gate 
15927c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
15937c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs,
159480d34432Sfrankho 				    sizeof (struct lockfs)))
15957c478bd9Sstevel@tonic-gate 					return (EFAULT);
15967c478bd9Sstevel@tonic-gate 			}
15977c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
15987c478bd9Sstevel@tonic-gate 			else {
15997c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
16007c478bd9Sstevel@tonic-gate 				/* Translate ILP32 lockfs to LP64 lockfs */
16017c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs32,
16027c478bd9Sstevel@tonic-gate 				    sizeof (struct lockfs32)))
16037c478bd9Sstevel@tonic-gate 					return (EFAULT);
16047c478bd9Sstevel@tonic-gate 				lockfs.lf_lock = (ulong_t)lockfs32.lf_lock;
16057c478bd9Sstevel@tonic-gate 				lockfs.lf_flags = (ulong_t)lockfs32.lf_flags;
16067c478bd9Sstevel@tonic-gate 				lockfs.lf_key = (ulong_t)lockfs32.lf_key;
16077c478bd9Sstevel@tonic-gate 				lockfs.lf_comlen = (ulong_t)lockfs32.lf_comlen;
16087c478bd9Sstevel@tonic-gate 				lockfs.lf_comment =
160980d34432Sfrankho 				    (caddr_t)(uintptr_t)lockfs32.lf_comment;
16107c478bd9Sstevel@tonic-gate 			}
16117c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
16127c478bd9Sstevel@tonic-gate 
16137c478bd9Sstevel@tonic-gate 			if (lockfs.lf_comlen) {
16147c478bd9Sstevel@tonic-gate 				if (lockfs.lf_comlen > LOCKFS_MAXCOMMENTLEN)
16157c478bd9Sstevel@tonic-gate 					return (ENAMETOOLONG);
161680d34432Sfrankho 				comment =
161780d34432Sfrankho 				    kmem_alloc(lockfs.lf_comlen, KM_SLEEP);
16187c478bd9Sstevel@tonic-gate 				if (copyin(lockfs.lf_comment, comment,
161980d34432Sfrankho 				    lockfs.lf_comlen)) {
16207c478bd9Sstevel@tonic-gate 					kmem_free(comment, lockfs.lf_comlen);
16217c478bd9Sstevel@tonic-gate 					return (EFAULT);
16227c478bd9Sstevel@tonic-gate 				}
16237c478bd9Sstevel@tonic-gate 				original_comment = lockfs.lf_comment;
16247c478bd9Sstevel@tonic-gate 				lockfs.lf_comment = comment;
16257c478bd9Sstevel@tonic-gate 			}
16267c478bd9Sstevel@tonic-gate 			if ((error = ufs_fiolfs(vp, &lockfs, 0)) == 0) {
16277c478bd9Sstevel@tonic-gate 				lockfs.lf_comment = original_comment;
16287c478bd9Sstevel@tonic-gate 
16297c478bd9Sstevel@tonic-gate 				if ((flag & DATAMODEL_MASK) ==
16307c478bd9Sstevel@tonic-gate 				    DATAMODEL_NATIVE) {
16317c478bd9Sstevel@tonic-gate 					(void) copyout(&lockfs, (caddr_t)arg,
16327c478bd9Sstevel@tonic-gate 					    sizeof (struct lockfs));
16337c478bd9Sstevel@tonic-gate 				}
16347c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
16357c478bd9Sstevel@tonic-gate 				else {
16367c478bd9Sstevel@tonic-gate 					struct lockfs32	lockfs32;
16377c478bd9Sstevel@tonic-gate 					/* Translate LP64 to ILP32 lockfs */
16387c478bd9Sstevel@tonic-gate 					lockfs32.lf_lock =
16397c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_lock;
16407c478bd9Sstevel@tonic-gate 					lockfs32.lf_flags =
16417c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_flags;
16427c478bd9Sstevel@tonic-gate 					lockfs32.lf_key =
16437c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_key;
16447c478bd9Sstevel@tonic-gate 					lockfs32.lf_comlen =
16457c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_comlen;
16467c478bd9Sstevel@tonic-gate 					lockfs32.lf_comment =
164780d34432Sfrankho 					    (uint32_t)(uintptr_t)
164880d34432Sfrankho 					    lockfs.lf_comment;
16497c478bd9Sstevel@tonic-gate 					(void) copyout(&lockfs32, (caddr_t)arg,
16507c478bd9Sstevel@tonic-gate 					    sizeof (struct lockfs32));
16517c478bd9Sstevel@tonic-gate 				}
16527c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
16537c478bd9Sstevel@tonic-gate 
16547c478bd9Sstevel@tonic-gate 			} else {
16557c478bd9Sstevel@tonic-gate 				if (lockfs.lf_comlen)
16567c478bd9Sstevel@tonic-gate 					kmem_free(comment, lockfs.lf_comlen);
16577c478bd9Sstevel@tonic-gate 			}
16587c478bd9Sstevel@tonic-gate 			return (error);
16597c478bd9Sstevel@tonic-gate 
16607c478bd9Sstevel@tonic-gate 		case _FIOLFSS:
16617c478bd9Sstevel@tonic-gate 			/*
16627c478bd9Sstevel@tonic-gate 			 * get file system locking status
16637c478bd9Sstevel@tonic-gate 			 */
16647c478bd9Sstevel@tonic-gate 
16657c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
16667c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs,
166780d34432Sfrankho 				    sizeof (struct lockfs)))
16687c478bd9Sstevel@tonic-gate 					return (EFAULT);
16697c478bd9Sstevel@tonic-gate 			}
16707c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
16717c478bd9Sstevel@tonic-gate 			else {
16727c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
16737c478bd9Sstevel@tonic-gate 				/* Translate ILP32 lockfs to LP64 lockfs */
16747c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs32,
167580d34432Sfrankho 				    sizeof (struct lockfs32)))
16767c478bd9Sstevel@tonic-gate 					return (EFAULT);
16777c478bd9Sstevel@tonic-gate 				lockfs.lf_lock = (ulong_t)lockfs32.lf_lock;
16787c478bd9Sstevel@tonic-gate 				lockfs.lf_flags = (ulong_t)lockfs32.lf_flags;
16797c478bd9Sstevel@tonic-gate 				lockfs.lf_key = (ulong_t)lockfs32.lf_key;
16807c478bd9Sstevel@tonic-gate 				lockfs.lf_comlen = (ulong_t)lockfs32.lf_comlen;
16817c478bd9Sstevel@tonic-gate 				lockfs.lf_comment =
168280d34432Sfrankho 				    (caddr_t)(uintptr_t)lockfs32.lf_comment;
16837c478bd9Sstevel@tonic-gate 			}
16847c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
16857c478bd9Sstevel@tonic-gate 
16867c478bd9Sstevel@tonic-gate 			if (error =  ufs_fiolfss(vp, &lockfs_out))
16877c478bd9Sstevel@tonic-gate 				return (error);
16887c478bd9Sstevel@tonic-gate 			lockfs.lf_lock = lockfs_out.lf_lock;
16897c478bd9Sstevel@tonic-gate 			lockfs.lf_key = lockfs_out.lf_key;
16907c478bd9Sstevel@tonic-gate 			lockfs.lf_flags = lockfs_out.lf_flags;
16917c478bd9Sstevel@tonic-gate 			lockfs.lf_comlen = MIN(lockfs.lf_comlen,
169280d34432Sfrankho 			    lockfs_out.lf_comlen);
16937c478bd9Sstevel@tonic-gate 
16947c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
16957c478bd9Sstevel@tonic-gate 				if (copyout(&lockfs, (caddr_t)arg,
169680d34432Sfrankho 				    sizeof (struct lockfs)))
16977c478bd9Sstevel@tonic-gate 					return (EFAULT);
16987c478bd9Sstevel@tonic-gate 			}
16997c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
17007c478bd9Sstevel@tonic-gate 			else {
17017c478bd9Sstevel@tonic-gate 				/* Translate LP64 to ILP32 lockfs */
17027c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
17037c478bd9Sstevel@tonic-gate 				lockfs32.lf_lock = (uint32_t)lockfs.lf_lock;
17047c478bd9Sstevel@tonic-gate 				lockfs32.lf_flags = (uint32_t)lockfs.lf_flags;
17057c478bd9Sstevel@tonic-gate 				lockfs32.lf_key = (uint32_t)lockfs.lf_key;
17067c478bd9Sstevel@tonic-gate 				lockfs32.lf_comlen = (uint32_t)lockfs.lf_comlen;
17077c478bd9Sstevel@tonic-gate 				lockfs32.lf_comment =
170880d34432Sfrankho 				    (uint32_t)(uintptr_t)lockfs.lf_comment;
17097c478bd9Sstevel@tonic-gate 				if (copyout(&lockfs32, (caddr_t)arg,
171080d34432Sfrankho 				    sizeof (struct lockfs32)))
17117c478bd9Sstevel@tonic-gate 					return (EFAULT);
17127c478bd9Sstevel@tonic-gate 			}
17137c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
17147c478bd9Sstevel@tonic-gate 
17157c478bd9Sstevel@tonic-gate 			if (lockfs.lf_comlen &&
17167c478bd9Sstevel@tonic-gate 			    lockfs.lf_comment && lockfs_out.lf_comment)
17177c478bd9Sstevel@tonic-gate 				if (copyout(lockfs_out.lf_comment,
171880d34432Sfrankho 				    lockfs.lf_comment, lockfs.lf_comlen))
17197c478bd9Sstevel@tonic-gate 					return (EFAULT);
17207c478bd9Sstevel@tonic-gate 			return (0);
17217c478bd9Sstevel@tonic-gate 
17227c478bd9Sstevel@tonic-gate 		case _FIOSATIME:
17237c478bd9Sstevel@tonic-gate 			/*
17247c478bd9Sstevel@tonic-gate 			 * set access time
17257c478bd9Sstevel@tonic-gate 			 */
17267c478bd9Sstevel@tonic-gate 
17277c478bd9Sstevel@tonic-gate 			/*
17287c478bd9Sstevel@tonic-gate 			 * if mounted w/o atime, return quietly.
17297c478bd9Sstevel@tonic-gate 			 * I briefly thought about returning ENOSYS, but
17307c478bd9Sstevel@tonic-gate 			 * figured that most apps would consider this fatal
17317c478bd9Sstevel@tonic-gate 			 * but the idea is to make this as seamless as poss.
17327c478bd9Sstevel@tonic-gate 			 */
17337c478bd9Sstevel@tonic-gate 			if (ufsvfsp->vfs_noatime)
17347c478bd9Sstevel@tonic-gate 				return (0);
17357c478bd9Sstevel@tonic-gate 
17367c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
173780d34432Sfrankho 			    ULOCKFS_SETATTR_MASK);
17387c478bd9Sstevel@tonic-gate 			if (error)
17397c478bd9Sstevel@tonic-gate 				return (error);
17407c478bd9Sstevel@tonic-gate 
17417c478bd9Sstevel@tonic-gate 			if (ulp) {
17427c478bd9Sstevel@tonic-gate 				trans_size = (int)TOP_SETATTR_SIZE(VTOI(vp));
17437c478bd9Sstevel@tonic-gate 				TRANS_BEGIN_CSYNC(ufsvfsp, issync,
174480d34432Sfrankho 				    TOP_SETATTR, trans_size);
17457c478bd9Sstevel@tonic-gate 			}
17467c478bd9Sstevel@tonic-gate 
17477c478bd9Sstevel@tonic-gate 			error = ufs_fiosatime(vp, (struct timeval *)arg,
174880d34432Sfrankho 			    flag, cr);
17497c478bd9Sstevel@tonic-gate 
17507c478bd9Sstevel@tonic-gate 			if (ulp) {
17517c478bd9Sstevel@tonic-gate 				TRANS_END_CSYNC(ufsvfsp, error, issync,
175280d34432Sfrankho 				    TOP_SETATTR, trans_size);
17537c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
17547c478bd9Sstevel@tonic-gate 			}
17557c478bd9Sstevel@tonic-gate 			return (error);
17567c478bd9Sstevel@tonic-gate 
17577c478bd9Sstevel@tonic-gate 		case _FIOSDIO:
17587c478bd9Sstevel@tonic-gate 			/*
17597c478bd9Sstevel@tonic-gate 			 * set delayed-io
17607c478bd9Sstevel@tonic-gate 			 */
17617c478bd9Sstevel@tonic-gate 			return (ufs_fiosdio(vp, (uint_t *)arg, flag, cr));
17627c478bd9Sstevel@tonic-gate 
17637c478bd9Sstevel@tonic-gate 		case _FIOGDIO:
17647c478bd9Sstevel@tonic-gate 			/*
17657c478bd9Sstevel@tonic-gate 			 * get delayed-io
17667c478bd9Sstevel@tonic-gate 			 */
17677c478bd9Sstevel@tonic-gate 			return (ufs_fiogdio(vp, (uint_t *)arg, flag, cr));
17687c478bd9Sstevel@tonic-gate 
17697c478bd9Sstevel@tonic-gate 		case _FIOIO:
17707c478bd9Sstevel@tonic-gate 			/*
17717c478bd9Sstevel@tonic-gate 			 * inode open
17727c478bd9Sstevel@tonic-gate 			 */
17737c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
177480d34432Sfrankho 			    ULOCKFS_VGET_MASK);
17757c478bd9Sstevel@tonic-gate 			if (error)
17767c478bd9Sstevel@tonic-gate 				return (error);
17777c478bd9Sstevel@tonic-gate 
17787c478bd9Sstevel@tonic-gate 			error = ufs_fioio(vp, (struct fioio *)arg, flag, cr);
17797c478bd9Sstevel@tonic-gate 
17807c478bd9Sstevel@tonic-gate 			if (ulp) {
17817c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
17827c478bd9Sstevel@tonic-gate 			}
17837c478bd9Sstevel@tonic-gate 			return (error);
17847c478bd9Sstevel@tonic-gate 
17857c478bd9Sstevel@tonic-gate 		case _FIOFFS:
17867c478bd9Sstevel@tonic-gate 			/*
17877c478bd9Sstevel@tonic-gate 			 * file system flush (push w/invalidate)
17887c478bd9Sstevel@tonic-gate 			 */
17897c478bd9Sstevel@tonic-gate 			if ((caddr_t)arg != NULL)
17907c478bd9Sstevel@tonic-gate 				return (EINVAL);
17917c478bd9Sstevel@tonic-gate 			return (ufs_fioffs(vp, NULL, cr));
17927c478bd9Sstevel@tonic-gate 
17937c478bd9Sstevel@tonic-gate 		case _FIOISBUSY:
17947c478bd9Sstevel@tonic-gate 			/*
17957c478bd9Sstevel@tonic-gate 			 * Contract-private interface for Legato
17967c478bd9Sstevel@tonic-gate 			 * Purge this vnode from the DNLC and decide
17977c478bd9Sstevel@tonic-gate 			 * if this vnode is busy (*arg == 1) or not
17987c478bd9Sstevel@tonic-gate 			 * (*arg == 0)
17997c478bd9Sstevel@tonic-gate 			 */
18007c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18017c478bd9Sstevel@tonic-gate 				return (EPERM);
18027c478bd9Sstevel@tonic-gate 			error = ufs_fioisbusy(vp, (int *)arg, cr);
18037c478bd9Sstevel@tonic-gate 			return (error);
18047c478bd9Sstevel@tonic-gate 
18057c478bd9Sstevel@tonic-gate 		case _FIODIRECTIO:
18067c478bd9Sstevel@tonic-gate 			return (ufs_fiodirectio(vp, (int)arg, cr));
18077c478bd9Sstevel@tonic-gate 
18087c478bd9Sstevel@tonic-gate 		case _FIOTUNE:
18097c478bd9Sstevel@tonic-gate 			/*
18107c478bd9Sstevel@tonic-gate 			 * Tune the file system (aka setting fs attributes)
18117c478bd9Sstevel@tonic-gate 			 */
18127c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
181380d34432Sfrankho 			    ULOCKFS_SETATTR_MASK);
18147c478bd9Sstevel@tonic-gate 			if (error)
18157c478bd9Sstevel@tonic-gate 				return (error);
18167c478bd9Sstevel@tonic-gate 
18177c478bd9Sstevel@tonic-gate 			error = ufs_fiotune(vp, (struct fiotune *)arg, cr);
18187c478bd9Sstevel@tonic-gate 
18197c478bd9Sstevel@tonic-gate 			if (ulp)
18207c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
18217c478bd9Sstevel@tonic-gate 			return (error);
18227c478bd9Sstevel@tonic-gate 
18237c478bd9Sstevel@tonic-gate 		case _FIOLOGENABLE:
18247c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18257c478bd9Sstevel@tonic-gate 				return (EPERM);
18267c478bd9Sstevel@tonic-gate 			return (ufs_fiologenable(vp, (void *)arg, cr, flag));
18277c478bd9Sstevel@tonic-gate 
18287c478bd9Sstevel@tonic-gate 		case _FIOLOGDISABLE:
18297c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18307c478bd9Sstevel@tonic-gate 				return (EPERM);
18317c478bd9Sstevel@tonic-gate 			return (ufs_fiologdisable(vp, (void *)arg, cr, flag));
18327c478bd9Sstevel@tonic-gate 
18337c478bd9Sstevel@tonic-gate 		case _FIOISLOG:
18347c478bd9Sstevel@tonic-gate 			return (ufs_fioislog(vp, (void *)arg, cr, flag));
18357c478bd9Sstevel@tonic-gate 
18367c478bd9Sstevel@tonic-gate 		case _FIOSNAPSHOTCREATE_MULTI:
18377c478bd9Sstevel@tonic-gate 		{
18387c478bd9Sstevel@tonic-gate 			struct fiosnapcreate_multi	fc, *fcp;
18397c478bd9Sstevel@tonic-gate 			size_t	fcm_size;
18407c478bd9Sstevel@tonic-gate 
18417c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, &fc, sizeof (fc)))
18427c478bd9Sstevel@tonic-gate 				return (EFAULT);
18437c478bd9Sstevel@tonic-gate 			if (fc.backfilecount > MAX_BACKFILE_COUNT)
18447c478bd9Sstevel@tonic-gate 				return (EINVAL);
18457c478bd9Sstevel@tonic-gate 			fcm_size = sizeof (struct fiosnapcreate_multi) +
18467c478bd9Sstevel@tonic-gate 			    (fc.backfilecount - 1) * sizeof (int);
18477c478bd9Sstevel@tonic-gate 			fcp = (struct fiosnapcreate_multi *)
18487c478bd9Sstevel@tonic-gate 			    kmem_alloc(fcm_size, KM_SLEEP);
18497c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, fcp, fcm_size)) {
18507c478bd9Sstevel@tonic-gate 				kmem_free(fcp, fcm_size);
18517c478bd9Sstevel@tonic-gate 				return (EFAULT);
18527c478bd9Sstevel@tonic-gate 			}
18537c478bd9Sstevel@tonic-gate 			error = ufs_snap_create(vp, fcp, cr);
185495b7dc1dSmishra 			/*
185595b7dc1dSmishra 			 * Do copyout even if there is an error because
185695b7dc1dSmishra 			 * the details of error is stored in fcp.
185795b7dc1dSmishra 			 */
185895b7dc1dSmishra 			if (copyout(fcp, (void *)arg, fcm_size))
18597c478bd9Sstevel@tonic-gate 				error = EFAULT;
18607c478bd9Sstevel@tonic-gate 			kmem_free(fcp, fcm_size);
18617c478bd9Sstevel@tonic-gate 			return (error);
18627c478bd9Sstevel@tonic-gate 		}
18637c478bd9Sstevel@tonic-gate 
18647c478bd9Sstevel@tonic-gate 		case _FIOSNAPSHOTDELETE:
18657c478bd9Sstevel@tonic-gate 		{
18667c478bd9Sstevel@tonic-gate 			struct fiosnapdelete	fc;
18677c478bd9Sstevel@tonic-gate 
18687c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, &fc, sizeof (fc)))
18697c478bd9Sstevel@tonic-gate 				return (EFAULT);
18707c478bd9Sstevel@tonic-gate 			error = ufs_snap_delete(vp, &fc, cr);
18717c478bd9Sstevel@tonic-gate 			if (!error && copyout(&fc, (void *)arg, sizeof (fc)))
18727c478bd9Sstevel@tonic-gate 				error = EFAULT;
18737c478bd9Sstevel@tonic-gate 			return (error);
18747c478bd9Sstevel@tonic-gate 		}
18757c478bd9Sstevel@tonic-gate 
18767c478bd9Sstevel@tonic-gate 		case _FIOGETSUPERBLOCK:
18777c478bd9Sstevel@tonic-gate 			if (copyout(fs, (void *)arg, SBSIZE))
18787c478bd9Sstevel@tonic-gate 				return (EFAULT);
18797c478bd9Sstevel@tonic-gate 			return (0);
18807c478bd9Sstevel@tonic-gate 
18817c478bd9Sstevel@tonic-gate 		case _FIOGETMAXPHYS:
18827c478bd9Sstevel@tonic-gate 			if (copyout(&maxphys, (void *)arg, sizeof (maxphys)))
18837c478bd9Sstevel@tonic-gate 				return (EFAULT);
18847c478bd9Sstevel@tonic-gate 			return (0);
18857c478bd9Sstevel@tonic-gate 
18867c478bd9Sstevel@tonic-gate 		/*
18877c478bd9Sstevel@tonic-gate 		 * The following 3 ioctls are for TSufs support
18887c478bd9Sstevel@tonic-gate 		 * although could potentially be used elsewhere
18897c478bd9Sstevel@tonic-gate 		 */
18907c478bd9Sstevel@tonic-gate 		case _FIO_SET_LUFS_DEBUG:
18917c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18927c478bd9Sstevel@tonic-gate 				return (EPERM);
18937c478bd9Sstevel@tonic-gate 			lufs_debug = (uint32_t)arg;
18947c478bd9Sstevel@tonic-gate 			return (0);
18957c478bd9Sstevel@tonic-gate 
18967c478bd9Sstevel@tonic-gate 		case _FIO_SET_LUFS_ERROR:
18977c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18987c478bd9Sstevel@tonic-gate 				return (EPERM);
18997c478bd9Sstevel@tonic-gate 			TRANS_SETERROR(ufsvfsp);
19007c478bd9Sstevel@tonic-gate 			return (0);
19017c478bd9Sstevel@tonic-gate 
19027c478bd9Sstevel@tonic-gate 		case _FIO_GET_TOP_STATS:
19037c478bd9Sstevel@tonic-gate 		{
19047c478bd9Sstevel@tonic-gate 			fio_lufs_stats_t *ls;
19057c478bd9Sstevel@tonic-gate 			ml_unit_t *ul = ufsvfsp->vfs_log;
19067c478bd9Sstevel@tonic-gate 
19077c478bd9Sstevel@tonic-gate 			ls = kmem_zalloc(sizeof (*ls), KM_SLEEP);
19087c478bd9Sstevel@tonic-gate 			ls->ls_debug = ul->un_debug; /* return debug value */
19097c478bd9Sstevel@tonic-gate 			/* Copy stucture if statistics are being kept */
19107c478bd9Sstevel@tonic-gate 			if (ul->un_logmap->mtm_tops) {
19117c478bd9Sstevel@tonic-gate 				ls->ls_topstats = *(ul->un_logmap->mtm_tops);
19127c478bd9Sstevel@tonic-gate 			}
19137c478bd9Sstevel@tonic-gate 			error = 0;
19147c478bd9Sstevel@tonic-gate 			if (copyout(ls, (void *)arg, sizeof (*ls)))
19157c478bd9Sstevel@tonic-gate 				error = EFAULT;
19167c478bd9Sstevel@tonic-gate 			kmem_free(ls, sizeof (*ls));
19177c478bd9Sstevel@tonic-gate 			return (error);
19187c478bd9Sstevel@tonic-gate 		}
19197c478bd9Sstevel@tonic-gate 
19207c478bd9Sstevel@tonic-gate 		case _FIO_SEEK_DATA:
19217c478bd9Sstevel@tonic-gate 		case _FIO_SEEK_HOLE:
19227c478bd9Sstevel@tonic-gate 			if (ddi_copyin((void *)arg, &off, sizeof (off), flag))
19237c478bd9Sstevel@tonic-gate 				return (EFAULT);
19247c478bd9Sstevel@tonic-gate 			/* offset paramater is in/out */
19257c478bd9Sstevel@tonic-gate 			error = ufs_fio_holey(vp, cmd, &off);
19267c478bd9Sstevel@tonic-gate 			if (error)
19277c478bd9Sstevel@tonic-gate 				return (error);
19287c478bd9Sstevel@tonic-gate 			if (ddi_copyout(&off, (void *)arg, sizeof (off), flag))
19297c478bd9Sstevel@tonic-gate 				return (EFAULT);
19307c478bd9Sstevel@tonic-gate 			return (0);
19317c478bd9Sstevel@tonic-gate 
1932986fd29aSsetje 		case _FIO_COMPRESSED:
1933986fd29aSsetje 		{
1934986fd29aSsetje 			/*
1935986fd29aSsetje 			 * This is a project private ufs ioctl() to mark
1936986fd29aSsetje 			 * the inode as that belonging to a compressed
1937986fd29aSsetje 			 * file. This is used to mark individual
1938*342440ecSPrasad Singamsetty 			 * compressed files in a miniroot archive.
1939986fd29aSsetje 			 * The files compressed in this manner are
1940986fd29aSsetje 			 * automatically decompressed by the dcfs filesystem
1941986fd29aSsetje 			 * (via an interception in ufs_lookup - see decompvp())
1942986fd29aSsetje 			 * which is layered on top of ufs on a system running
1943*342440ecSPrasad Singamsetty 			 * from the archive. See uts/common/fs/dcfs for details.
1944986fd29aSsetje 			 * This ioctl only marks the file as compressed - the
1945986fd29aSsetje 			 * actual compression is done by fiocompress (a
1946986fd29aSsetje 			 * userland utility) which invokes this ioctl().
1947986fd29aSsetje 			 */
1948986fd29aSsetje 			struct inode *ip = VTOI(vp);
1949986fd29aSsetje 
1950986fd29aSsetje 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
1951986fd29aSsetje 			    ULOCKFS_SETATTR_MASK);
1952986fd29aSsetje 			if (error)
1953986fd29aSsetje 				return (error);
1954986fd29aSsetje 
1955986fd29aSsetje 			if (ulp) {
1956986fd29aSsetje 				TRANS_BEGIN_ASYNC(ufsvfsp, TOP_IUPDAT,
1957986fd29aSsetje 				    TOP_IUPDAT_SIZE(ip));
1958986fd29aSsetje 			}
1959986fd29aSsetje 
1960986fd29aSsetje 			error = ufs_mark_compressed(vp);
1961986fd29aSsetje 
1962986fd29aSsetje 			if (ulp) {
1963986fd29aSsetje 				TRANS_END_ASYNC(ufsvfsp, TOP_IUPDAT,
1964986fd29aSsetje 				    TOP_IUPDAT_SIZE(ip));
1965986fd29aSsetje 				ufs_lockfs_end(ulp);
1966986fd29aSsetje 			}
1967986fd29aSsetje 
1968986fd29aSsetje 			return (error);
1969986fd29aSsetje 
1970986fd29aSsetje 		}
1971986fd29aSsetje 
19727c478bd9Sstevel@tonic-gate 		default:
19737c478bd9Sstevel@tonic-gate 			return (ENOTTY);
19747c478bd9Sstevel@tonic-gate 	}
19757c478bd9Sstevel@tonic-gate }
19767c478bd9Sstevel@tonic-gate 
1977986fd29aSsetje 
19787c478bd9Sstevel@tonic-gate /* ARGSUSED */
19797c478bd9Sstevel@tonic-gate static int
19807c478bd9Sstevel@tonic-gate ufs_getattr(struct vnode *vp, struct vattr *vap, int flags,
1981da6c28aaSamw 	struct cred *cr, caller_context_t *ct)
19827c478bd9Sstevel@tonic-gate {
19837c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
19847c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
19857c478bd9Sstevel@tonic-gate 	int err;
19867c478bd9Sstevel@tonic-gate 
19877c478bd9Sstevel@tonic-gate 	if (vap->va_mask == AT_SIZE) {
19887c478bd9Sstevel@tonic-gate 		/*
19897c478bd9Sstevel@tonic-gate 		 * for performance, if only the size is requested don't bother
19907c478bd9Sstevel@tonic-gate 		 * with anything else.
19917c478bd9Sstevel@tonic-gate 		 */
19927c478bd9Sstevel@tonic-gate 		UFS_GET_ISIZE(&vap->va_size, ip);
19937c478bd9Sstevel@tonic-gate 		return (0);
19947c478bd9Sstevel@tonic-gate 	}
19957c478bd9Sstevel@tonic-gate 
19967c478bd9Sstevel@tonic-gate 	/*
19977c478bd9Sstevel@tonic-gate 	 * inlined lockfs checks
19987c478bd9Sstevel@tonic-gate 	 */
19997c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
20007c478bd9Sstevel@tonic-gate 	if ((ufsvfsp == NULL) || ULOCKFS_IS_HLOCK(&ufsvfsp->vfs_ulockfs)) {
20017c478bd9Sstevel@tonic-gate 		err = EIO;
20027c478bd9Sstevel@tonic-gate 		goto out;
20037c478bd9Sstevel@tonic-gate 	}
20047c478bd9Sstevel@tonic-gate 
20057c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_READER);
20067c478bd9Sstevel@tonic-gate 	/*
20077c478bd9Sstevel@tonic-gate 	 * Return all the attributes.  This should be refined so
20087c478bd9Sstevel@tonic-gate 	 * that it only returns what's asked for.
20097c478bd9Sstevel@tonic-gate 	 */
20107c478bd9Sstevel@tonic-gate 
20117c478bd9Sstevel@tonic-gate 	/*
20127c478bd9Sstevel@tonic-gate 	 * Copy from inode table.
20137c478bd9Sstevel@tonic-gate 	 */
20147c478bd9Sstevel@tonic-gate 	vap->va_type = vp->v_type;
20157c478bd9Sstevel@tonic-gate 	vap->va_mode = ip->i_mode & MODEMASK;
20167c478bd9Sstevel@tonic-gate 	/*
20177c478bd9Sstevel@tonic-gate 	 * If there is an ACL and there is a mask entry, then do the
20187c478bd9Sstevel@tonic-gate 	 * extra work that completes the equivalent of an acltomode(3)
20197c478bd9Sstevel@tonic-gate 	 * call.  According to POSIX P1003.1e, the acl mask should be
20207c478bd9Sstevel@tonic-gate 	 * returned in the group permissions field.
20217c478bd9Sstevel@tonic-gate 	 *
20227c478bd9Sstevel@tonic-gate 	 * - start with the original permission and mode bits (from above)
20237c478bd9Sstevel@tonic-gate 	 * - clear the group owner bits
20247c478bd9Sstevel@tonic-gate 	 * - add in the mask bits.
20257c478bd9Sstevel@tonic-gate 	 */
20267c478bd9Sstevel@tonic-gate 	if (ip->i_ufs_acl && ip->i_ufs_acl->aclass.acl_ismask) {
20277c478bd9Sstevel@tonic-gate 		vap->va_mode &= ~((VREAD | VWRITE | VEXEC) >> 3);
20287c478bd9Sstevel@tonic-gate 		vap->va_mode |=
20297c478bd9Sstevel@tonic-gate 		    (ip->i_ufs_acl->aclass.acl_maskbits & PERMMASK) << 3;
20307c478bd9Sstevel@tonic-gate 	}
20317c478bd9Sstevel@tonic-gate 	vap->va_uid = ip->i_uid;
20327c478bd9Sstevel@tonic-gate 	vap->va_gid = ip->i_gid;
20337c478bd9Sstevel@tonic-gate 	vap->va_fsid = ip->i_dev;
20347c478bd9Sstevel@tonic-gate 	vap->va_nodeid = (ino64_t)ip->i_number;
20357c478bd9Sstevel@tonic-gate 	vap->va_nlink = ip->i_nlink;
20367c478bd9Sstevel@tonic-gate 	vap->va_size = ip->i_size;
20377c478bd9Sstevel@tonic-gate 	if (vp->v_type == VCHR || vp->v_type == VBLK)
20387c478bd9Sstevel@tonic-gate 		vap->va_rdev = ip->i_rdev;
20397c478bd9Sstevel@tonic-gate 	else
20407c478bd9Sstevel@tonic-gate 		vap->va_rdev = 0;	/* not a b/c spec. */
20417c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
20427c478bd9Sstevel@tonic-gate 	ITIMES_NOLOCK(ip);	/* mark correct time in inode */
20437c478bd9Sstevel@tonic-gate 	vap->va_seq = ip->i_seq;
20447c478bd9Sstevel@tonic-gate 	vap->va_atime.tv_sec = (time_t)ip->i_atime.tv_sec;
20457c478bd9Sstevel@tonic-gate 	vap->va_atime.tv_nsec = ip->i_atime.tv_usec*1000;
20467c478bd9Sstevel@tonic-gate 	vap->va_mtime.tv_sec = (time_t)ip->i_mtime.tv_sec;
20477c478bd9Sstevel@tonic-gate 	vap->va_mtime.tv_nsec = ip->i_mtime.tv_usec*1000;
20487c478bd9Sstevel@tonic-gate 	vap->va_ctime.tv_sec = (time_t)ip->i_ctime.tv_sec;
20497c478bd9Sstevel@tonic-gate 	vap->va_ctime.tv_nsec = ip->i_ctime.tv_usec*1000;
20507c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
20517c478bd9Sstevel@tonic-gate 
20527c478bd9Sstevel@tonic-gate 	switch (ip->i_mode & IFMT) {
20537c478bd9Sstevel@tonic-gate 
20547c478bd9Sstevel@tonic-gate 	case IFBLK:
20557c478bd9Sstevel@tonic-gate 		vap->va_blksize = MAXBSIZE;		/* was BLKDEV_IOSIZE */
20567c478bd9Sstevel@tonic-gate 		break;
20577c478bd9Sstevel@tonic-gate 
20587c478bd9Sstevel@tonic-gate 	case IFCHR:
20597c478bd9Sstevel@tonic-gate 		vap->va_blksize = MAXBSIZE;
20607c478bd9Sstevel@tonic-gate 		break;
20617c478bd9Sstevel@tonic-gate 
20627c478bd9Sstevel@tonic-gate 	default:
20637c478bd9Sstevel@tonic-gate 		vap->va_blksize = ip->i_fs->fs_bsize;
20647c478bd9Sstevel@tonic-gate 		break;
20657c478bd9Sstevel@tonic-gate 	}
20667c478bd9Sstevel@tonic-gate 	vap->va_nblocks = (fsblkcnt64_t)ip->i_blocks;
20677c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
20687c478bd9Sstevel@tonic-gate 	err = 0;
20697c478bd9Sstevel@tonic-gate 
20707c478bd9Sstevel@tonic-gate out:
20717c478bd9Sstevel@tonic-gate 	return (err);
20727c478bd9Sstevel@tonic-gate }
20737c478bd9Sstevel@tonic-gate 
20747c478bd9Sstevel@tonic-gate /*ARGSUSED4*/
20757c478bd9Sstevel@tonic-gate static int
20767c478bd9Sstevel@tonic-gate ufs_setattr(
20777c478bd9Sstevel@tonic-gate 	struct vnode *vp,
20787c478bd9Sstevel@tonic-gate 	struct vattr *vap,
20797c478bd9Sstevel@tonic-gate 	int flags,
20807c478bd9Sstevel@tonic-gate 	struct cred *cr,
20817c478bd9Sstevel@tonic-gate 	caller_context_t *ct)
20827c478bd9Sstevel@tonic-gate {
20837c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
20847c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
20857c478bd9Sstevel@tonic-gate 	struct fs *fs;
20867c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
20877c478bd9Sstevel@tonic-gate 	char *errmsg1;
20887c478bd9Sstevel@tonic-gate 	char *errmsg2;
20897c478bd9Sstevel@tonic-gate 	long blocks;
20907c478bd9Sstevel@tonic-gate 	long int mask = vap->va_mask;
20917c478bd9Sstevel@tonic-gate 	size_t len1, len2;
20927c478bd9Sstevel@tonic-gate 	int issync;
20937c478bd9Sstevel@tonic-gate 	int trans_size;
20947c478bd9Sstevel@tonic-gate 	int dotrans;
20957c478bd9Sstevel@tonic-gate 	int dorwlock;
20967c478bd9Sstevel@tonic-gate 	int error;
20977c478bd9Sstevel@tonic-gate 	int owner_change;
20987c478bd9Sstevel@tonic-gate 	int dodqlock;
20997c478bd9Sstevel@tonic-gate 	timestruc_t now;
21007c478bd9Sstevel@tonic-gate 	vattr_t oldva;
21017c478bd9Sstevel@tonic-gate 	int retry = 1;
210202ff05a9Svsakar 	int indeadlock;
21037c478bd9Sstevel@tonic-gate 
21047c478bd9Sstevel@tonic-gate 	/*
21057c478bd9Sstevel@tonic-gate 	 * Cannot set these attributes.
21067c478bd9Sstevel@tonic-gate 	 */
2107da6c28aaSamw 	if ((mask & AT_NOSET) || (mask & AT_XVATTR))
2108da6c28aaSamw 		return (EINVAL);
21097c478bd9Sstevel@tonic-gate 
21107c478bd9Sstevel@tonic-gate 	/*
21117c478bd9Sstevel@tonic-gate 	 * check for forced unmount
21127c478bd9Sstevel@tonic-gate 	 */
21137c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
21147c478bd9Sstevel@tonic-gate 		return (EIO);
21157c478bd9Sstevel@tonic-gate 
21167c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
21177c478bd9Sstevel@tonic-gate 	if (fs->fs_ronly != 0)
21187c478bd9Sstevel@tonic-gate 		return (EROFS);
21197c478bd9Sstevel@tonic-gate 
21207c478bd9Sstevel@tonic-gate again:
21217c478bd9Sstevel@tonic-gate 	errmsg1 = NULL;
21227c478bd9Sstevel@tonic-gate 	errmsg2 = NULL;
21237c478bd9Sstevel@tonic-gate 	dotrans = 0;
21247c478bd9Sstevel@tonic-gate 	dorwlock = 0;
21257c478bd9Sstevel@tonic-gate 	dodqlock = 0;
21267c478bd9Sstevel@tonic-gate 
21277c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SETATTR_MASK);
21287c478bd9Sstevel@tonic-gate 	if (error)
21297c478bd9Sstevel@tonic-gate 		goto out;
21307c478bd9Sstevel@tonic-gate 
21317c478bd9Sstevel@tonic-gate 	/*
21327c478bd9Sstevel@tonic-gate 	 * Acquire i_rwlock before TRANS_BEGIN_CSYNC() if this is a file.
21337c478bd9Sstevel@tonic-gate 	 * This follows the protocol for read()/write().
21347c478bd9Sstevel@tonic-gate 	 */
21357c478bd9Sstevel@tonic-gate 	if (vp->v_type != VDIR) {
213602ff05a9Svsakar 		/*
213702ff05a9Svsakar 		 * ufs_tryirwlock uses rw_tryenter and checks for SLOCK to
213802ff05a9Svsakar 		 * avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
213902ff05a9Svsakar 		 * possible, retries the operation.
214002ff05a9Svsakar 		 */
214102ff05a9Svsakar 		ufs_tryirwlock(&ip->i_rwlock, RW_WRITER, retry_file);
214202ff05a9Svsakar 		if (indeadlock) {
214302ff05a9Svsakar 			if (ulp)
214402ff05a9Svsakar 				ufs_lockfs_end(ulp);
214502ff05a9Svsakar 			goto again;
214602ff05a9Svsakar 		}
21477c478bd9Sstevel@tonic-gate 		dorwlock = 1;
21487c478bd9Sstevel@tonic-gate 	}
21497c478bd9Sstevel@tonic-gate 
21507c478bd9Sstevel@tonic-gate 	/*
21517c478bd9Sstevel@tonic-gate 	 * Truncate file.  Must have write permission and not be a directory.
21527c478bd9Sstevel@tonic-gate 	 */
21537c478bd9Sstevel@tonic-gate 	if (mask & AT_SIZE) {
21547c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
21557c478bd9Sstevel@tonic-gate 		if (vp->v_type == VDIR) {
21567c478bd9Sstevel@tonic-gate 			error = EISDIR;
21577c478bd9Sstevel@tonic-gate 			goto update_inode;
21587c478bd9Sstevel@tonic-gate 		}
21597c478bd9Sstevel@tonic-gate 		if (error = ufs_iaccess(ip, IWRITE, cr))
21607c478bd9Sstevel@tonic-gate 			goto update_inode;
21617c478bd9Sstevel@tonic-gate 
21627c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
21637c478bd9Sstevel@tonic-gate 		error = TRANS_ITRUNC(ip, vap->va_size, 0, cr);
21647c478bd9Sstevel@tonic-gate 		if (error) {
21657c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
21667c478bd9Sstevel@tonic-gate 			goto update_inode;
21677c478bd9Sstevel@tonic-gate 		}
21687c478bd9Sstevel@tonic-gate 	}
21697c478bd9Sstevel@tonic-gate 
21707c478bd9Sstevel@tonic-gate 	if (ulp) {
21717c478bd9Sstevel@tonic-gate 		trans_size = (int)TOP_SETATTR_SIZE(ip);
21727c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_SETATTR, trans_size);
21737c478bd9Sstevel@tonic-gate 		++dotrans;
21747c478bd9Sstevel@tonic-gate 	}
21757c478bd9Sstevel@tonic-gate 
21767c478bd9Sstevel@tonic-gate 	/*
21777c478bd9Sstevel@tonic-gate 	 * Acquire i_rwlock after TRANS_BEGIN_CSYNC() if this is a directory.
21787c478bd9Sstevel@tonic-gate 	 * This follows the protocol established by
21797c478bd9Sstevel@tonic-gate 	 * ufs_link/create/remove/rename/mkdir/rmdir/symlink.
21807c478bd9Sstevel@tonic-gate 	 */
21817c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
218202ff05a9Svsakar 		ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_SETATTR,
218380d34432Sfrankho 		    retry_dir);
218402ff05a9Svsakar 		if (indeadlock)
218502ff05a9Svsakar 			goto again;
21867c478bd9Sstevel@tonic-gate 		dorwlock = 1;
21877c478bd9Sstevel@tonic-gate 	}
21887c478bd9Sstevel@tonic-gate 
21897c478bd9Sstevel@tonic-gate 	/*
21907c478bd9Sstevel@tonic-gate 	 * Grab quota lock if we are changing the file's owner.
21917c478bd9Sstevel@tonic-gate 	 */
21927c478bd9Sstevel@tonic-gate 	if (mask & AT_UID) {
21937c478bd9Sstevel@tonic-gate 		rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
21947c478bd9Sstevel@tonic-gate 		dodqlock = 1;
21957c478bd9Sstevel@tonic-gate 	}
21967c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
21977c478bd9Sstevel@tonic-gate 
21987c478bd9Sstevel@tonic-gate 	oldva.va_mode = ip->i_mode;
21997c478bd9Sstevel@tonic-gate 	oldva.va_uid = ip->i_uid;
22007c478bd9Sstevel@tonic-gate 	oldva.va_gid = ip->i_gid;
22017c478bd9Sstevel@tonic-gate 
22027c478bd9Sstevel@tonic-gate 	vap->va_mask &= ~AT_SIZE;
22037c478bd9Sstevel@tonic-gate 	/*
22047c478bd9Sstevel@tonic-gate 	 * ufs_iaccess is "close enough"; that's because it doesn't
22057c478bd9Sstevel@tonic-gate 	 * map the defines.
22067c478bd9Sstevel@tonic-gate 	 */
22077c478bd9Sstevel@tonic-gate 	error = secpolicy_vnode_setattr(cr, vp, vap, &oldva, flags,
220880d34432Sfrankho 	    ufs_iaccess, ip);
22097c478bd9Sstevel@tonic-gate 	if (error)
22107c478bd9Sstevel@tonic-gate 		goto update_inode;
22117c478bd9Sstevel@tonic-gate 
22127c478bd9Sstevel@tonic-gate 	mask = vap->va_mask;
22137c478bd9Sstevel@tonic-gate 
22147c478bd9Sstevel@tonic-gate 	/*
22157c478bd9Sstevel@tonic-gate 	 * Change file access modes.
22167c478bd9Sstevel@tonic-gate 	 */
22177c478bd9Sstevel@tonic-gate 	if (mask & AT_MODE) {
22187c478bd9Sstevel@tonic-gate 		ip->i_mode = (ip->i_mode & IFMT) | (vap->va_mode & ~IFMT);
22197c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
22207c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
22217c478bd9Sstevel@tonic-gate 		if (stickyhack) {
22227c478bd9Sstevel@tonic-gate 			mutex_enter(&vp->v_lock);
22237c478bd9Sstevel@tonic-gate 			if ((ip->i_mode & (ISVTX | IEXEC | IFDIR)) == ISVTX)
22247c478bd9Sstevel@tonic-gate 				vp->v_flag |= VSWAPLIKE;
22257c478bd9Sstevel@tonic-gate 			else
22267c478bd9Sstevel@tonic-gate 				vp->v_flag &= ~VSWAPLIKE;
22277c478bd9Sstevel@tonic-gate 			mutex_exit(&vp->v_lock);
22287c478bd9Sstevel@tonic-gate 		}
22297c478bd9Sstevel@tonic-gate 	}
22307c478bd9Sstevel@tonic-gate 	if (mask & (AT_UID|AT_GID)) {
22317c478bd9Sstevel@tonic-gate 		if (mask & AT_UID) {
22327c478bd9Sstevel@tonic-gate 			/*
22337c478bd9Sstevel@tonic-gate 			 * Don't change ownership of the quota inode.
22347c478bd9Sstevel@tonic-gate 			 */
22357c478bd9Sstevel@tonic-gate 			if (ufsvfsp->vfs_qinod == ip) {
22367c478bd9Sstevel@tonic-gate 				ASSERT(ufsvfsp->vfs_qflags & MQ_ENABLED);
22377c478bd9Sstevel@tonic-gate 				error = EINVAL;
22387c478bd9Sstevel@tonic-gate 				goto update_inode;
22397c478bd9Sstevel@tonic-gate 			}
22407c478bd9Sstevel@tonic-gate 
22417c478bd9Sstevel@tonic-gate 			/*
22427c478bd9Sstevel@tonic-gate 			 * No real ownership change.
22437c478bd9Sstevel@tonic-gate 			 */
22447c478bd9Sstevel@tonic-gate 			if (ip->i_uid == vap->va_uid) {
22457c478bd9Sstevel@tonic-gate 				blocks = 0;
22467c478bd9Sstevel@tonic-gate 				owner_change = 0;
22477c478bd9Sstevel@tonic-gate 			}
22487c478bd9Sstevel@tonic-gate 			/*
22497c478bd9Sstevel@tonic-gate 			 * Remove the blocks and the file, from the old user's
22507c478bd9Sstevel@tonic-gate 			 * quota.
22517c478bd9Sstevel@tonic-gate 			 */
22527c478bd9Sstevel@tonic-gate 			else {
22537c478bd9Sstevel@tonic-gate 				blocks = ip->i_blocks;
22547c478bd9Sstevel@tonic-gate 				owner_change = 1;
22557c478bd9Sstevel@tonic-gate 
22567c478bd9Sstevel@tonic-gate 				(void) chkdq(ip, -blocks, /* force */ 1, cr,
225780d34432Sfrankho 				    (char **)NULL, (size_t *)NULL);
22587c478bd9Sstevel@tonic-gate 				(void) chkiq(ufsvfsp, /* change */ -1, ip,
225980d34432Sfrankho 				    (uid_t)ip->i_uid, /* force */ 1, cr,
226080d34432Sfrankho 				    (char **)NULL, (size_t *)NULL);
22617c478bd9Sstevel@tonic-gate 				dqrele(ip->i_dquot);
22627c478bd9Sstevel@tonic-gate 			}
22637c478bd9Sstevel@tonic-gate 
22647c478bd9Sstevel@tonic-gate 			ip->i_uid = vap->va_uid;
22657c478bd9Sstevel@tonic-gate 
22667c478bd9Sstevel@tonic-gate 			/*
22677c478bd9Sstevel@tonic-gate 			 * There is a real ownership change.
22687c478bd9Sstevel@tonic-gate 			 */
22697c478bd9Sstevel@tonic-gate 			if (owner_change) {
22707c478bd9Sstevel@tonic-gate 				/*
22717c478bd9Sstevel@tonic-gate 				 * Add the blocks and the file to the new
22727c478bd9Sstevel@tonic-gate 				 * user's quota.
22737c478bd9Sstevel@tonic-gate 				 */
22747c478bd9Sstevel@tonic-gate 				ip->i_dquot = getinoquota(ip);
22757c478bd9Sstevel@tonic-gate 				(void) chkdq(ip, blocks, /* force */ 1, cr,
227680d34432Sfrankho 				    &errmsg1, &len1);
22777c478bd9Sstevel@tonic-gate 				(void) chkiq(ufsvfsp, /* change */ 1,
227880d34432Sfrankho 				    (struct inode *)NULL, (uid_t)ip->i_uid,
227980d34432Sfrankho 				    /* force */ 1, cr, &errmsg2, &len2);
22807c478bd9Sstevel@tonic-gate 			}
22817c478bd9Sstevel@tonic-gate 		}
22827c478bd9Sstevel@tonic-gate 		if (mask & AT_GID) {
22837c478bd9Sstevel@tonic-gate 			ip->i_gid = vap->va_gid;
22847c478bd9Sstevel@tonic-gate 		}
22857c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
22867c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
22877c478bd9Sstevel@tonic-gate 	}
22887c478bd9Sstevel@tonic-gate 	/*
22897c478bd9Sstevel@tonic-gate 	 * Change file access or modified times.
22907c478bd9Sstevel@tonic-gate 	 */
22917c478bd9Sstevel@tonic-gate 	if (mask & (AT_ATIME|AT_MTIME)) {
22927c478bd9Sstevel@tonic-gate 		/* Check that the time value is within ufs range */
22937c478bd9Sstevel@tonic-gate 		if (((mask & AT_ATIME) && TIMESPEC_OVERFLOW(&vap->va_atime)) ||
22947c478bd9Sstevel@tonic-gate 		    ((mask & AT_MTIME) && TIMESPEC_OVERFLOW(&vap->va_mtime))) {
22957c478bd9Sstevel@tonic-gate 			error = EOVERFLOW;
22967c478bd9Sstevel@tonic-gate 			goto update_inode;
22977c478bd9Sstevel@tonic-gate 		}
22987c478bd9Sstevel@tonic-gate 
22997c478bd9Sstevel@tonic-gate 		/*
23007c478bd9Sstevel@tonic-gate 		 * if the "noaccess" mount option is set and only atime
23017c478bd9Sstevel@tonic-gate 		 * update is requested, do nothing. No error is returned.
23027c478bd9Sstevel@tonic-gate 		 */
23037c478bd9Sstevel@tonic-gate 		if ((ufsvfsp->vfs_noatime) &&
23047c478bd9Sstevel@tonic-gate 		    ((mask & (AT_ATIME|AT_MTIME)) == AT_ATIME))
23057c478bd9Sstevel@tonic-gate 			goto skip_atime;
23067c478bd9Sstevel@tonic-gate 
23077c478bd9Sstevel@tonic-gate 		if (mask & AT_ATIME) {
23087c478bd9Sstevel@tonic-gate 			ip->i_atime.tv_sec = vap->va_atime.tv_sec;
23097c478bd9Sstevel@tonic-gate 			ip->i_atime.tv_usec = vap->va_atime.tv_nsec / 1000;
23107c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~IACC;
23117c478bd9Sstevel@tonic-gate 		}
23127c478bd9Sstevel@tonic-gate 		if (mask & AT_MTIME) {
23137c478bd9Sstevel@tonic-gate 			ip->i_mtime.tv_sec = vap->va_mtime.tv_sec;
23147c478bd9Sstevel@tonic-gate 			ip->i_mtime.tv_usec = vap->va_mtime.tv_nsec / 1000;
23157c478bd9Sstevel@tonic-gate 			gethrestime(&now);
23167c478bd9Sstevel@tonic-gate 			if (now.tv_sec > TIME32_MAX) {
23177c478bd9Sstevel@tonic-gate 				/*
23187c478bd9Sstevel@tonic-gate 				 * In 2038, ctime sticks forever..
23197c478bd9Sstevel@tonic-gate 				 */
23207c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_sec = TIME32_MAX;
23217c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_usec = 0;
23227c478bd9Sstevel@tonic-gate 			} else {
23237c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_sec = now.tv_sec;
23247c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_usec = now.tv_nsec / 1000;
23257c478bd9Sstevel@tonic-gate 			}
23267c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~(IUPD|ICHG);
23277c478bd9Sstevel@tonic-gate 			ip->i_flag |= IMODTIME;
23287c478bd9Sstevel@tonic-gate 		}
23297c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
23307c478bd9Sstevel@tonic-gate 		ip->i_flag |= IMOD;
23317c478bd9Sstevel@tonic-gate 	}
23327c478bd9Sstevel@tonic-gate 
23337c478bd9Sstevel@tonic-gate skip_atime:
23347c478bd9Sstevel@tonic-gate 	/*
23357c478bd9Sstevel@tonic-gate 	 * The presence of a shadow inode may indicate an ACL, but does
23367c478bd9Sstevel@tonic-gate 	 * not imply an ACL.  Future FSD types should be handled here too
23377c478bd9Sstevel@tonic-gate 	 * and check for the presence of the attribute-specific data
23387c478bd9Sstevel@tonic-gate 	 * before referencing it.
23397c478bd9Sstevel@tonic-gate 	 */
23407c478bd9Sstevel@tonic-gate 	if (ip->i_shadow) {
23417c478bd9Sstevel@tonic-gate 		/*
23427c478bd9Sstevel@tonic-gate 		 * XXX if ufs_iupdat is changed to sandbagged write fix
23437c478bd9Sstevel@tonic-gate 		 * ufs_acl_setattr to push ip to keep acls consistent
23447c478bd9Sstevel@tonic-gate 		 *
23457c478bd9Sstevel@tonic-gate 		 * Suppress out of inodes messages if we will retry.
23467c478bd9Sstevel@tonic-gate 		 */
23477c478bd9Sstevel@tonic-gate 		if (retry)
23487c478bd9Sstevel@tonic-gate 			ip->i_flag |= IQUIET;
23497c478bd9Sstevel@tonic-gate 		error = ufs_acl_setattr(ip, vap, cr);
23507c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~IQUIET;
23517c478bd9Sstevel@tonic-gate 	}
23527c478bd9Sstevel@tonic-gate 
23537c478bd9Sstevel@tonic-gate update_inode:
23547c478bd9Sstevel@tonic-gate 	/*
23557c478bd9Sstevel@tonic-gate 	 * Setattr always increases the sequence number
23567c478bd9Sstevel@tonic-gate 	 */
23577c478bd9Sstevel@tonic-gate 	ip->i_seq++;
23587c478bd9Sstevel@tonic-gate 
23597c478bd9Sstevel@tonic-gate 	/*
23607c478bd9Sstevel@tonic-gate 	 * if nfsd and not logging; push synchronously
23617c478bd9Sstevel@tonic-gate 	 */
23627c478bd9Sstevel@tonic-gate 	if ((curthread->t_flag & T_DONTPEND) && !TRANS_ISTRANS(ufsvfsp)) {
23637c478bd9Sstevel@tonic-gate 		ufs_iupdat(ip, 1);
23647c478bd9Sstevel@tonic-gate 	} else {
23657c478bd9Sstevel@tonic-gate 		ITIMES_NOLOCK(ip);
23667c478bd9Sstevel@tonic-gate 	}
23677c478bd9Sstevel@tonic-gate 
23687c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
23697c478bd9Sstevel@tonic-gate 	if (dodqlock) {
23707c478bd9Sstevel@tonic-gate 		rw_exit(&ufsvfsp->vfs_dqrwlock);
23717c478bd9Sstevel@tonic-gate 	}
23727c478bd9Sstevel@tonic-gate 	if (dorwlock)
23737c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
23747c478bd9Sstevel@tonic-gate 
23757c478bd9Sstevel@tonic-gate 	if (ulp) {
23767c478bd9Sstevel@tonic-gate 		if (dotrans) {
23777c478bd9Sstevel@tonic-gate 			int terr = 0;
23787c478bd9Sstevel@tonic-gate 			TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_SETATTR,
23797c478bd9Sstevel@tonic-gate 			    trans_size);
23807c478bd9Sstevel@tonic-gate 			if (error == 0)
23817c478bd9Sstevel@tonic-gate 				error = terr;
23827c478bd9Sstevel@tonic-gate 		}
23837c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
23847c478bd9Sstevel@tonic-gate 	}
23857c478bd9Sstevel@tonic-gate out:
23867c478bd9Sstevel@tonic-gate 	/*
23877c478bd9Sstevel@tonic-gate 	 * If out of inodes or blocks, see if we can free something
23887c478bd9Sstevel@tonic-gate 	 * up from the delete queue.
23897c478bd9Sstevel@tonic-gate 	 */
23907c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
23917c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
23927c478bd9Sstevel@tonic-gate 		retry = 0;
23937c478bd9Sstevel@tonic-gate 		if (errmsg1 != NULL)
23947c478bd9Sstevel@tonic-gate 			kmem_free(errmsg1, len1);
23957c478bd9Sstevel@tonic-gate 		if (errmsg2 != NULL)
23967c478bd9Sstevel@tonic-gate 			kmem_free(errmsg2, len2);
23977c478bd9Sstevel@tonic-gate 		goto again;
23987c478bd9Sstevel@tonic-gate 	}
23997c478bd9Sstevel@tonic-gate 	if (errmsg1 != NULL) {
24007c478bd9Sstevel@tonic-gate 		uprintf(errmsg1);
24017c478bd9Sstevel@tonic-gate 		kmem_free(errmsg1, len1);
24027c478bd9Sstevel@tonic-gate 	}
24037c478bd9Sstevel@tonic-gate 	if (errmsg2 != NULL) {
24047c478bd9Sstevel@tonic-gate 		uprintf(errmsg2);
24057c478bd9Sstevel@tonic-gate 		kmem_free(errmsg2, len2);
24067c478bd9Sstevel@tonic-gate 	}
24077c478bd9Sstevel@tonic-gate 	return (error);
24087c478bd9Sstevel@tonic-gate }
24097c478bd9Sstevel@tonic-gate 
24107c478bd9Sstevel@tonic-gate /*ARGSUSED*/
24117c478bd9Sstevel@tonic-gate static int
2412da6c28aaSamw ufs_access(struct vnode *vp, int mode, int flags, struct cred *cr,
2413da6c28aaSamw 	caller_context_t *ct)
24147c478bd9Sstevel@tonic-gate {
24157c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
24167c478bd9Sstevel@tonic-gate 	int error;
24177c478bd9Sstevel@tonic-gate 
24187c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
24197c478bd9Sstevel@tonic-gate 		return (EIO);
24207c478bd9Sstevel@tonic-gate 
24217c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_READER);
24227c478bd9Sstevel@tonic-gate 
24237c478bd9Sstevel@tonic-gate 	/*
24247c478bd9Sstevel@tonic-gate 	 * The ufs_iaccess function wants to be called with
24257c478bd9Sstevel@tonic-gate 	 * mode bits expressed as "ufs specific" bits.
24267c478bd9Sstevel@tonic-gate 	 * I.e., VWRITE|VREAD|VEXEC do not make sense to
24277c478bd9Sstevel@tonic-gate 	 * ufs_iaccess() but IWRITE|IREAD|IEXEC do.
24287c478bd9Sstevel@tonic-gate 	 * But since they're the same we just pass the vnode mode
24297c478bd9Sstevel@tonic-gate 	 * bit but just verify that assumption at compile time.
24307c478bd9Sstevel@tonic-gate 	 */
24317c478bd9Sstevel@tonic-gate #if IWRITE != VWRITE || IREAD != VREAD || IEXEC != VEXEC
24327c478bd9Sstevel@tonic-gate #error "ufs_access needs to map Vmodes to Imodes"
24337c478bd9Sstevel@tonic-gate #endif
24347c478bd9Sstevel@tonic-gate 	error = ufs_iaccess(ip, mode, cr);
24357c478bd9Sstevel@tonic-gate 
24367c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
24377c478bd9Sstevel@tonic-gate 
24387c478bd9Sstevel@tonic-gate 	return (error);
24397c478bd9Sstevel@tonic-gate }
24407c478bd9Sstevel@tonic-gate 
24417c478bd9Sstevel@tonic-gate /* ARGSUSED */
24427c478bd9Sstevel@tonic-gate static int
2443da6c28aaSamw ufs_readlink(struct vnode *vp, struct uio *uiop, struct cred *cr,
2444da6c28aaSamw 	caller_context_t *ct)
24457c478bd9Sstevel@tonic-gate {
24467c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
24477c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
24487c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
24497c478bd9Sstevel@tonic-gate 	int error;
24507c478bd9Sstevel@tonic-gate 	int fastsymlink;
24517c478bd9Sstevel@tonic-gate 
24527c478bd9Sstevel@tonic-gate 	if (vp->v_type != VLNK) {
24537c478bd9Sstevel@tonic-gate 		error = EINVAL;
24547c478bd9Sstevel@tonic-gate 		goto nolockout;
24557c478bd9Sstevel@tonic-gate 	}
24567c478bd9Sstevel@tonic-gate 
24577c478bd9Sstevel@tonic-gate 	/*
24587c478bd9Sstevel@tonic-gate 	 * If the symbolic link is empty there is nothing to read.
24597c478bd9Sstevel@tonic-gate 	 * Fast-track these empty symbolic links
24607c478bd9Sstevel@tonic-gate 	 */
24617c478bd9Sstevel@tonic-gate 	if (ip->i_size == 0) {
24627c478bd9Sstevel@tonic-gate 		error = 0;
24637c478bd9Sstevel@tonic-gate 		goto nolockout;
24647c478bd9Sstevel@tonic-gate 	}
24657c478bd9Sstevel@tonic-gate 
24667c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
24677c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READLINK_MASK);
24687c478bd9Sstevel@tonic-gate 	if (error)
24697c478bd9Sstevel@tonic-gate 		goto nolockout;
24707c478bd9Sstevel@tonic-gate 	/*
24717c478bd9Sstevel@tonic-gate 	 * The ip->i_rwlock protects the data blocks used for FASTSYMLINK
24727c478bd9Sstevel@tonic-gate 	 */
24737c478bd9Sstevel@tonic-gate again:
24747c478bd9Sstevel@tonic-gate 	fastsymlink = 0;
24757c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IFASTSYMLNK) {
24767c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
24777c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
24787c478bd9Sstevel@tonic-gate 		if (ip->i_flag & IFASTSYMLNK) {
24797c478bd9Sstevel@tonic-gate 			if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) &&
24807c478bd9Sstevel@tonic-gate 			    (ip->i_fs->fs_ronly == 0) &&
24817c478bd9Sstevel@tonic-gate 			    (!ufsvfsp->vfs_noatime)) {
24827c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
24837c478bd9Sstevel@tonic-gate 				ip->i_flag |= IACC;
24847c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
24857c478bd9Sstevel@tonic-gate 			}
24867c478bd9Sstevel@tonic-gate 			error = uiomove((caddr_t)&ip->i_db[1],
248780d34432Sfrankho 			    MIN(ip->i_size, uiop->uio_resid),
248880d34432Sfrankho 			    UIO_READ, uiop);
24897c478bd9Sstevel@tonic-gate 			ITIMES(ip);
24907c478bd9Sstevel@tonic-gate 			++fastsymlink;
24917c478bd9Sstevel@tonic-gate 		}
24927c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
24937c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
24947c478bd9Sstevel@tonic-gate 	}
24957c478bd9Sstevel@tonic-gate 	if (!fastsymlink) {
24967c478bd9Sstevel@tonic-gate 		ssize_t size;	/* number of bytes read  */
24977c478bd9Sstevel@tonic-gate 		caddr_t basep;	/* pointer to input data */
24987c478bd9Sstevel@tonic-gate 		ino_t ino;
24997c478bd9Sstevel@tonic-gate 		long  igen;
25007c478bd9Sstevel@tonic-gate 		struct uio tuio;	/* temp uio struct */
25017c478bd9Sstevel@tonic-gate 		struct uio *tuiop;
25027c478bd9Sstevel@tonic-gate 		iovec_t tiov;		/* temp iovec struct */
25037c478bd9Sstevel@tonic-gate 		char kbuf[FSL_SIZE];	/* buffer to hold fast symlink */
25047c478bd9Sstevel@tonic-gate 		int tflag = 0;		/* flag to indicate temp vars used */
25057c478bd9Sstevel@tonic-gate 
25067c478bd9Sstevel@tonic-gate 		ino = ip->i_number;
25077c478bd9Sstevel@tonic-gate 		igen = ip->i_gen;
25087c478bd9Sstevel@tonic-gate 		size = uiop->uio_resid;
25097c478bd9Sstevel@tonic-gate 		basep = uiop->uio_iov->iov_base;
25107c478bd9Sstevel@tonic-gate 		tuiop = uiop;
25117c478bd9Sstevel@tonic-gate 
25127c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
25137c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
25147c478bd9Sstevel@tonic-gate 		if (ip->i_flag & IFASTSYMLNK) {
25157c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
25167c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
25177c478bd9Sstevel@tonic-gate 			goto again;
25187c478bd9Sstevel@tonic-gate 		}
25197c478bd9Sstevel@tonic-gate 
25207c478bd9Sstevel@tonic-gate 		/* can this be a fast symlink and is it a user buffer? */
25217c478bd9Sstevel@tonic-gate 		if (ip->i_size <= FSL_SIZE &&
25227c478bd9Sstevel@tonic-gate 		    (uiop->uio_segflg == UIO_USERSPACE ||
25237c478bd9Sstevel@tonic-gate 		    uiop->uio_segflg == UIO_USERISPACE)) {
25247c478bd9Sstevel@tonic-gate 
25257c478bd9Sstevel@tonic-gate 			bzero(&tuio, sizeof (struct uio));
25267c478bd9Sstevel@tonic-gate 			/*
25277c478bd9Sstevel@tonic-gate 			 * setup a kernel buffer to read link into.  this
25287c478bd9Sstevel@tonic-gate 			 * is to fix a race condition where the user buffer
25297c478bd9Sstevel@tonic-gate 			 * got corrupted before copying it into the inode.
25307c478bd9Sstevel@tonic-gate 			 */
25317c478bd9Sstevel@tonic-gate 			size = ip->i_size;
25327c478bd9Sstevel@tonic-gate 			tiov.iov_len = size;
25337c478bd9Sstevel@tonic-gate 			tiov.iov_base = kbuf;
25347c478bd9Sstevel@tonic-gate 			tuio.uio_iov = &tiov;
25357c478bd9Sstevel@tonic-gate 			tuio.uio_iovcnt = 1;
25367c478bd9Sstevel@tonic-gate 			tuio.uio_offset = uiop->uio_offset;
25377c478bd9Sstevel@tonic-gate 			tuio.uio_segflg = UIO_SYSSPACE;
25387c478bd9Sstevel@tonic-gate 			tuio.uio_fmode = uiop->uio_fmode;
25397c478bd9Sstevel@tonic-gate 			tuio.uio_extflg = uiop->uio_extflg;
25407c478bd9Sstevel@tonic-gate 			tuio.uio_limit = uiop->uio_limit;
25417c478bd9Sstevel@tonic-gate 			tuio.uio_resid = size;
25427c478bd9Sstevel@tonic-gate 
25437c478bd9Sstevel@tonic-gate 			basep = tuio.uio_iov->iov_base;
25447c478bd9Sstevel@tonic-gate 			tuiop = &tuio;
25457c478bd9Sstevel@tonic-gate 			tflag = 1;
25467c478bd9Sstevel@tonic-gate 		}
25477c478bd9Sstevel@tonic-gate 
25487c478bd9Sstevel@tonic-gate 		error = rdip(ip, tuiop, 0, cr);
25497c478bd9Sstevel@tonic-gate 		if (!(error == 0 && ip->i_number == ino && ip->i_gen == igen)) {
25507c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
25517c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
25527c478bd9Sstevel@tonic-gate 			goto out;
25537c478bd9Sstevel@tonic-gate 		}
25547c478bd9Sstevel@tonic-gate 
25557c478bd9Sstevel@tonic-gate 		if (tflag == 0)
25567c478bd9Sstevel@tonic-gate 			size -= uiop->uio_resid;
25577c478bd9Sstevel@tonic-gate 
25587c478bd9Sstevel@tonic-gate 		if ((tflag == 0 && ip->i_size <= FSL_SIZE &&
25597c478bd9Sstevel@tonic-gate 		    ip->i_size == size) || (tflag == 1 &&
25607c478bd9Sstevel@tonic-gate 		    tuio.uio_resid == 0)) {
25617c478bd9Sstevel@tonic-gate 			error = kcopy(basep, &ip->i_db[1], ip->i_size);
25627c478bd9Sstevel@tonic-gate 			if (error == 0) {
25637c478bd9Sstevel@tonic-gate 				ip->i_flag |= IFASTSYMLNK;
25647c478bd9Sstevel@tonic-gate 				/*
25657c478bd9Sstevel@tonic-gate 				 * free page
25667c478bd9Sstevel@tonic-gate 				 */
25677c478bd9Sstevel@tonic-gate 				(void) VOP_PUTPAGE(ITOV(ip),
25687c478bd9Sstevel@tonic-gate 				    (offset_t)0, PAGESIZE,
25697c478bd9Sstevel@tonic-gate 				    (B_DONTNEED | B_FREE | B_FORCE | B_ASYNC),
2570da6c28aaSamw 				    cr, ct);
25717c478bd9Sstevel@tonic-gate 			} else {
25727c478bd9Sstevel@tonic-gate 				int i;
25737c478bd9Sstevel@tonic-gate 				/* error, clear garbage left behind */
25747c478bd9Sstevel@tonic-gate 				for (i = 1; i < NDADDR; i++)
25757c478bd9Sstevel@tonic-gate 					ip->i_db[i] = 0;
25767c478bd9Sstevel@tonic-gate 				for (i = 0; i < NIADDR; i++)
25777c478bd9Sstevel@tonic-gate 					ip->i_ib[i] = 0;
25787c478bd9Sstevel@tonic-gate 			}
25797c478bd9Sstevel@tonic-gate 		}
25807c478bd9Sstevel@tonic-gate 		if (tflag == 1) {
25817c478bd9Sstevel@tonic-gate 			/* now, copy it into the user buffer */
25827c478bd9Sstevel@tonic-gate 			error = uiomove((caddr_t)kbuf,
258380d34432Sfrankho 			    MIN(size, uiop->uio_resid),
258480d34432Sfrankho 			    UIO_READ, uiop);
25857c478bd9Sstevel@tonic-gate 		}
25867c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
25877c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
25887c478bd9Sstevel@tonic-gate 	}
25897c478bd9Sstevel@tonic-gate out:
25907c478bd9Sstevel@tonic-gate 	if (ulp) {
25917c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
25927c478bd9Sstevel@tonic-gate 	}
25937c478bd9Sstevel@tonic-gate nolockout:
25947c478bd9Sstevel@tonic-gate 	return (error);
25957c478bd9Sstevel@tonic-gate }
25967c478bd9Sstevel@tonic-gate 
25977c478bd9Sstevel@tonic-gate /* ARGSUSED */
25987c478bd9Sstevel@tonic-gate static int
2599da6c28aaSamw ufs_fsync(struct vnode *vp, int syncflag, struct cred *cr,
2600da6c28aaSamw 	caller_context_t *ct)
26017c478bd9Sstevel@tonic-gate {
26027c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
26037c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
26047c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
26057c478bd9Sstevel@tonic-gate 	int error;
26067c478bd9Sstevel@tonic-gate 
26077c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_FSYNC_MASK);
26087c478bd9Sstevel@tonic-gate 	if (error)
26097c478bd9Sstevel@tonic-gate 		return (error);
26107c478bd9Sstevel@tonic-gate 
26117c478bd9Sstevel@tonic-gate 	if (TRANS_ISTRANS(ufsvfsp)) {
26127c478bd9Sstevel@tonic-gate 		/*
26137c478bd9Sstevel@tonic-gate 		 * First push out any data pages
26147c478bd9Sstevel@tonic-gate 		 */
26157c478bd9Sstevel@tonic-gate 		if (vn_has_cached_data(vp) && !(syncflag & FNODSYNC) &&
26167c478bd9Sstevel@tonic-gate 		    (vp->v_type != VCHR) && !(IS_SWAPVP(vp))) {
26177c478bd9Sstevel@tonic-gate 			error = VOP_PUTPAGE(vp, (offset_t)0, (size_t)0,
2618da6c28aaSamw 			    0, CRED(), ct);
26197c478bd9Sstevel@tonic-gate 			if (error)
26207c478bd9Sstevel@tonic-gate 				goto out;
26217c478bd9Sstevel@tonic-gate 		}
26227c478bd9Sstevel@tonic-gate 
26237c478bd9Sstevel@tonic-gate 		/*
26247c478bd9Sstevel@tonic-gate 		 * Delta any delayed inode times updates
26257c478bd9Sstevel@tonic-gate 		 * and push inode to log.
26267c478bd9Sstevel@tonic-gate 		 * All other inode deltas will have already been delta'd
26277c478bd9Sstevel@tonic-gate 		 * and will be pushed during the commit.
26287c478bd9Sstevel@tonic-gate 		 */
26297c478bd9Sstevel@tonic-gate 		if (!(syncflag & FDSYNC) &&
26307c478bd9Sstevel@tonic-gate 		    ((ip->i_flag & (IMOD|IMODACC)) == IMODACC)) {
26317c478bd9Sstevel@tonic-gate 			if (ulp) {
26327c478bd9Sstevel@tonic-gate 				TRANS_BEGIN_ASYNC(ufsvfsp, TOP_FSYNC,
26337c478bd9Sstevel@tonic-gate 				    TOP_SYNCIP_SIZE);
26347c478bd9Sstevel@tonic-gate 			}
26357c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
26367c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
26377c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~IMODTIME;
26387c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
26397c478bd9Sstevel@tonic-gate 			ufs_iupdat(ip, I_SYNC);
26407c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
26417c478bd9Sstevel@tonic-gate 			if (ulp) {
26427c478bd9Sstevel@tonic-gate 				TRANS_END_ASYNC(ufsvfsp, TOP_FSYNC,
26437c478bd9Sstevel@tonic-gate 				    TOP_SYNCIP_SIZE);
26447c478bd9Sstevel@tonic-gate 			}
26457c478bd9Sstevel@tonic-gate 		}
26467c478bd9Sstevel@tonic-gate 
26477c478bd9Sstevel@tonic-gate 		/*
26487c478bd9Sstevel@tonic-gate 		 * Commit the Moby transaction
26497c478bd9Sstevel@tonic-gate 		 *
26507c478bd9Sstevel@tonic-gate 		 * Deltas have already been made so we just need to
26517c478bd9Sstevel@tonic-gate 		 * commit them with a synchronous transaction.
26527c478bd9Sstevel@tonic-gate 		 * TRANS_BEGIN_SYNC() will return an error
26537c478bd9Sstevel@tonic-gate 		 * if there are no deltas to commit, for an
26547c478bd9Sstevel@tonic-gate 		 * empty transaction.
26557c478bd9Sstevel@tonic-gate 		 */
26567c478bd9Sstevel@tonic-gate 		if (ulp) {
26577c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_FSYNC, TOP_COMMIT_SIZE,
26587c478bd9Sstevel@tonic-gate 			    error);
26597c478bd9Sstevel@tonic-gate 			if (error) {
26607c478bd9Sstevel@tonic-gate 				error = 0; /* commit wasn't needed */
26617c478bd9Sstevel@tonic-gate 				goto out;
26627c478bd9Sstevel@tonic-gate 			}
26637c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_FSYNC,
26647c478bd9Sstevel@tonic-gate 			    TOP_COMMIT_SIZE);
26657c478bd9Sstevel@tonic-gate 		}
26667c478bd9Sstevel@tonic-gate 	} else {	/* not logging */
26677c478bd9Sstevel@tonic-gate 		if (!(IS_SWAPVP(vp)))
26687c478bd9Sstevel@tonic-gate 			if (syncflag & FNODSYNC) {
26697c478bd9Sstevel@tonic-gate 				/* Just update the inode only */
26707c478bd9Sstevel@tonic-gate 				TRANS_IUPDAT(ip, 1);
26717c478bd9Sstevel@tonic-gate 				error = 0;
26727c478bd9Sstevel@tonic-gate 			} else if (syncflag & FDSYNC)
26737c478bd9Sstevel@tonic-gate 				/* Do data-synchronous writes */
26747c478bd9Sstevel@tonic-gate 				error = TRANS_SYNCIP(ip, 0, I_DSYNC, TOP_FSYNC);
26757c478bd9Sstevel@tonic-gate 			else
26767c478bd9Sstevel@tonic-gate 				/* Do synchronous writes */
26777c478bd9Sstevel@tonic-gate 				error = TRANS_SYNCIP(ip, 0, I_SYNC, TOP_FSYNC);
26787c478bd9Sstevel@tonic-gate 
26797c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
26807c478bd9Sstevel@tonic-gate 		if (!error)
26817c478bd9Sstevel@tonic-gate 			error = ufs_sync_indir(ip);
26827c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
26837c478bd9Sstevel@tonic-gate 	}
26847c478bd9Sstevel@tonic-gate out:
26857c478bd9Sstevel@tonic-gate 	if (ulp) {
26867c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
26877c478bd9Sstevel@tonic-gate 	}
26887c478bd9Sstevel@tonic-gate 	return (error);
26897c478bd9Sstevel@tonic-gate }
26907c478bd9Sstevel@tonic-gate 
26917c478bd9Sstevel@tonic-gate /*ARGSUSED*/
26927c478bd9Sstevel@tonic-gate static void
2693da6c28aaSamw ufs_inactive(struct vnode *vp, struct cred *cr, caller_context_t *ct)
26947c478bd9Sstevel@tonic-gate {
26957c478bd9Sstevel@tonic-gate 	ufs_iinactive(VTOI(vp));
26967c478bd9Sstevel@tonic-gate }
26977c478bd9Sstevel@tonic-gate 
26987c478bd9Sstevel@tonic-gate /*
26997c478bd9Sstevel@tonic-gate  * Unix file system operations having to do with directory manipulation.
27007c478bd9Sstevel@tonic-gate  */
27017c478bd9Sstevel@tonic-gate int ufs_lookup_idle_count = 2;	/* Number of inodes to idle each time */
27027c478bd9Sstevel@tonic-gate /* ARGSUSED */
27037c478bd9Sstevel@tonic-gate static int
27047c478bd9Sstevel@tonic-gate ufs_lookup(struct vnode *dvp, char *nm, struct vnode **vpp,
2705da6c28aaSamw 	struct pathname *pnp, int flags, struct vnode *rdir, struct cred *cr,
2706da6c28aaSamw 	caller_context_t *ct, int *direntflags, pathname_t *realpnp)
27077c478bd9Sstevel@tonic-gate {
27087c478bd9Sstevel@tonic-gate 	struct inode *ip;
27097c478bd9Sstevel@tonic-gate 	struct inode *sip;
27107c478bd9Sstevel@tonic-gate 	struct inode *xip;
27117c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
27127c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
27137c478bd9Sstevel@tonic-gate 	struct vnode *vp;
27147c478bd9Sstevel@tonic-gate 	int error;
27157c478bd9Sstevel@tonic-gate 
27167c478bd9Sstevel@tonic-gate 	/*
27177c478bd9Sstevel@tonic-gate 	 * Check flags for type of lookup (regular file or attribute file)
27187c478bd9Sstevel@tonic-gate 	 */
27197c478bd9Sstevel@tonic-gate 
27207c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
27217c478bd9Sstevel@tonic-gate 
27227c478bd9Sstevel@tonic-gate 	if (flags & LOOKUP_XATTR) {
27237c478bd9Sstevel@tonic-gate 
2724da6c28aaSamw 		/*
2725da6c28aaSamw 		 * If not mounted with XATTR support then return EINVAL
2726da6c28aaSamw 		 */
2727da6c28aaSamw 
2728da6c28aaSamw 		if (!(ip->i_ufsvfs->vfs_vfs->vfs_flag & VFS_XATTR))
2729da6c28aaSamw 			return (EINVAL);
27307c478bd9Sstevel@tonic-gate 		/*
27317c478bd9Sstevel@tonic-gate 		 * We don't allow recursive attributes...
27327c478bd9Sstevel@tonic-gate 		 * Maybe someday we will.
27337c478bd9Sstevel@tonic-gate 		 */
27347c478bd9Sstevel@tonic-gate 		if ((ip->i_cflags & IXATTR)) {
27357c478bd9Sstevel@tonic-gate 			return (EINVAL);
27367c478bd9Sstevel@tonic-gate 		}
27377c478bd9Sstevel@tonic-gate 
27387c478bd9Sstevel@tonic-gate 		if ((vp = dnlc_lookup(dvp, XATTR_DIR_NAME)) == NULL) {
27397c478bd9Sstevel@tonic-gate 			error = ufs_xattr_getattrdir(dvp, &sip, flags, cr);
27407c478bd9Sstevel@tonic-gate 			if (error) {
27417c478bd9Sstevel@tonic-gate 				*vpp = NULL;
27427c478bd9Sstevel@tonic-gate 				goto out;
27437c478bd9Sstevel@tonic-gate 			}
27447c478bd9Sstevel@tonic-gate 
27457c478bd9Sstevel@tonic-gate 			vp = ITOV(sip);
27467c478bd9Sstevel@tonic-gate 			dnlc_update(dvp, XATTR_DIR_NAME, vp);
27477c478bd9Sstevel@tonic-gate 		}
27487c478bd9Sstevel@tonic-gate 
27497c478bd9Sstevel@tonic-gate 		/*
27507c478bd9Sstevel@tonic-gate 		 * Check accessibility of directory.
27517c478bd9Sstevel@tonic-gate 		 */
27527c478bd9Sstevel@tonic-gate 		if (vp == DNLC_NO_VNODE) {
27537c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
27547c478bd9Sstevel@tonic-gate 			error = ENOENT;
27557c478bd9Sstevel@tonic-gate 			goto out;
27567c478bd9Sstevel@tonic-gate 		}
27577c478bd9Sstevel@tonic-gate 		if ((error = ufs_iaccess(VTOI(vp), IEXEC, cr)) != 0) {
27587c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
27597c478bd9Sstevel@tonic-gate 			goto out;
27607c478bd9Sstevel@tonic-gate 		}
27617c478bd9Sstevel@tonic-gate 
27627c478bd9Sstevel@tonic-gate 		*vpp = vp;
27637c478bd9Sstevel@tonic-gate 		return (0);
27647c478bd9Sstevel@tonic-gate 	}
27657c478bd9Sstevel@tonic-gate 
27667c478bd9Sstevel@tonic-gate 	/*
27677c478bd9Sstevel@tonic-gate 	 * Check for a null component, which we should treat as
27687c478bd9Sstevel@tonic-gate 	 * looking at dvp from within it's parent, so we don't
27697c478bd9Sstevel@tonic-gate 	 * need a call to ufs_iaccess(), as it has already been
27707c478bd9Sstevel@tonic-gate 	 * done.
27717c478bd9Sstevel@tonic-gate 	 */
27727c478bd9Sstevel@tonic-gate 	if (nm[0] == 0) {
27737c478bd9Sstevel@tonic-gate 		VN_HOLD(dvp);
27747c478bd9Sstevel@tonic-gate 		error = 0;
27757c478bd9Sstevel@tonic-gate 		*vpp = dvp;
27767c478bd9Sstevel@tonic-gate 		goto out;
27777c478bd9Sstevel@tonic-gate 	}
27787c478bd9Sstevel@tonic-gate 
27797c478bd9Sstevel@tonic-gate 	/*
27807c478bd9Sstevel@tonic-gate 	 * Check for "." ie itself. this is a quick check and
27817c478bd9Sstevel@tonic-gate 	 * avoids adding "." into the dnlc (which have been seen
27827c478bd9Sstevel@tonic-gate 	 * to occupy >10% of the cache).
27837c478bd9Sstevel@tonic-gate 	 */
27847c478bd9Sstevel@tonic-gate 	if ((nm[0] == '.') && (nm[1] == 0)) {
27857c478bd9Sstevel@tonic-gate 		/*
27867c478bd9Sstevel@tonic-gate 		 * Don't return without checking accessibility
27877c478bd9Sstevel@tonic-gate 		 * of the directory. We only need the lock if
27887c478bd9Sstevel@tonic-gate 		 * we are going to return it.
27897c478bd9Sstevel@tonic-gate 		 */
27907c478bd9Sstevel@tonic-gate 		if ((error = ufs_iaccess(ip, IEXEC, cr)) == 0) {
27917c478bd9Sstevel@tonic-gate 			VN_HOLD(dvp);
27927c478bd9Sstevel@tonic-gate 			*vpp = dvp;
27937c478bd9Sstevel@tonic-gate 		}
27947c478bd9Sstevel@tonic-gate 		goto out;
27957c478bd9Sstevel@tonic-gate 	}
27967c478bd9Sstevel@tonic-gate 
27977c478bd9Sstevel@tonic-gate 	/*
27987c478bd9Sstevel@tonic-gate 	 * Fast path: Check the directory name lookup cache.
27997c478bd9Sstevel@tonic-gate 	 */
28007c478bd9Sstevel@tonic-gate 	if (vp = dnlc_lookup(dvp, nm)) {
28017c478bd9Sstevel@tonic-gate 		/*
28027c478bd9Sstevel@tonic-gate 		 * Check accessibility of directory.
28037c478bd9Sstevel@tonic-gate 		 */
28047c478bd9Sstevel@tonic-gate 		if ((error = ufs_iaccess(ip, IEXEC, cr)) != 0) {
28057c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
28067c478bd9Sstevel@tonic-gate 			goto out;
28077c478bd9Sstevel@tonic-gate 		}
28087c478bd9Sstevel@tonic-gate 		if (vp == DNLC_NO_VNODE) {
28097c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
28107c478bd9Sstevel@tonic-gate 			error = ENOENT;
28117c478bd9Sstevel@tonic-gate 			goto out;
28127c478bd9Sstevel@tonic-gate 		}
28137c478bd9Sstevel@tonic-gate 		xip = VTOI(vp);
28147c478bd9Sstevel@tonic-gate 		ulp = NULL;
28157c478bd9Sstevel@tonic-gate 		goto fastpath;
28167c478bd9Sstevel@tonic-gate 	}
28177c478bd9Sstevel@tonic-gate 
28187c478bd9Sstevel@tonic-gate 	/*
28197c478bd9Sstevel@tonic-gate 	 * Keep the idle queue from getting too long by
28207c478bd9Sstevel@tonic-gate 	 * idling two inodes before attempting to allocate another.
28217c478bd9Sstevel@tonic-gate 	 *    This operation must be performed before entering
28227c478bd9Sstevel@tonic-gate 	 *    lockfs or a transaction.
28237c478bd9Sstevel@tonic-gate 	 */
28247c478bd9Sstevel@tonic-gate 	if (ufs_idle_q.uq_ne > ufs_idle_q.uq_hiwat)
28257c478bd9Sstevel@tonic-gate 		if ((curthread->t_flag & T_DONTBLOCK) == 0) {
28267c478bd9Sstevel@tonic-gate 			ins.in_lidles.value.ul += ufs_lookup_idle_count;
28277c478bd9Sstevel@tonic-gate 			ufs_idle_some(ufs_lookup_idle_count);
28287c478bd9Sstevel@tonic-gate 		}
28297c478bd9Sstevel@tonic-gate 
283002ff05a9Svsakar retry_lookup:
28317c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
28327c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_LOOKUP_MASK);
28337c478bd9Sstevel@tonic-gate 	if (error)
28347c478bd9Sstevel@tonic-gate 		goto out;
28357c478bd9Sstevel@tonic-gate 
28367c478bd9Sstevel@tonic-gate 	error = ufs_dirlook(ip, nm, &xip, cr, 1);
28377c478bd9Sstevel@tonic-gate 
28387c478bd9Sstevel@tonic-gate fastpath:
28397c478bd9Sstevel@tonic-gate 	if (error == 0) {
28407c478bd9Sstevel@tonic-gate 		ip = xip;
28417c478bd9Sstevel@tonic-gate 		*vpp = ITOV(ip);
28427c478bd9Sstevel@tonic-gate 
28437c478bd9Sstevel@tonic-gate 		/*
28447c478bd9Sstevel@tonic-gate 		 * If vnode is a device return special vnode instead.
28457c478bd9Sstevel@tonic-gate 		 */
28467c478bd9Sstevel@tonic-gate 		if (IS_DEVVP(*vpp)) {
28477c478bd9Sstevel@tonic-gate 			struct vnode *newvp;
28487c478bd9Sstevel@tonic-gate 
28497c478bd9Sstevel@tonic-gate 			newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
28507c478bd9Sstevel@tonic-gate 			    cr);
28517c478bd9Sstevel@tonic-gate 			VN_RELE(*vpp);
28527c478bd9Sstevel@tonic-gate 			if (newvp == NULL)
28537c478bd9Sstevel@tonic-gate 				error = ENOSYS;
28547c478bd9Sstevel@tonic-gate 			else
28557c478bd9Sstevel@tonic-gate 				*vpp = newvp;
2856986fd29aSsetje 		} else if (ip->i_cflags & ICOMPRESS) {
2857986fd29aSsetje 			struct vnode *newvp;
2858986fd29aSsetje 
2859986fd29aSsetje 			/*
2860986fd29aSsetje 			 * Compressed file, substitute dcfs vnode
2861986fd29aSsetje 			 */
2862986fd29aSsetje 			newvp = decompvp(*vpp, cr, ct);
2863986fd29aSsetje 			VN_RELE(*vpp);
2864986fd29aSsetje 			if (newvp == NULL)
2865986fd29aSsetje 				error = ENOSYS;
2866986fd29aSsetje 			else
2867986fd29aSsetje 				*vpp = newvp;
28687c478bd9Sstevel@tonic-gate 		}
28697c478bd9Sstevel@tonic-gate 	}
28707c478bd9Sstevel@tonic-gate 	if (ulp) {
28717c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
28727c478bd9Sstevel@tonic-gate 	}
28737c478bd9Sstevel@tonic-gate 
287402ff05a9Svsakar 	if (error == EAGAIN)
287502ff05a9Svsakar 		goto retry_lookup;
287602ff05a9Svsakar 
28777c478bd9Sstevel@tonic-gate out:
28787c478bd9Sstevel@tonic-gate 	return (error);
28797c478bd9Sstevel@tonic-gate }
28807c478bd9Sstevel@tonic-gate 
2881da6c28aaSamw /*ARGSUSED*/
28827c478bd9Sstevel@tonic-gate static int
28837c478bd9Sstevel@tonic-gate ufs_create(struct vnode *dvp, char *name, struct vattr *vap, enum vcexcl excl,
2884da6c28aaSamw 	int mode, struct vnode **vpp, struct cred *cr, int flag,
2885da6c28aaSamw 	caller_context_t *ct, vsecattr_t *vsecp)
28867c478bd9Sstevel@tonic-gate {
28877c478bd9Sstevel@tonic-gate 	struct inode *ip;
28887c478bd9Sstevel@tonic-gate 	struct inode *xip;
28897c478bd9Sstevel@tonic-gate 	struct inode *dip;
28907c478bd9Sstevel@tonic-gate 	struct vnode *xvp;
28917c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
28927c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
28937c478bd9Sstevel@tonic-gate 	int error;
28947c478bd9Sstevel@tonic-gate 	int issync;
28957c478bd9Sstevel@tonic-gate 	int truncflag;
28967c478bd9Sstevel@tonic-gate 	int trans_size;
28977c478bd9Sstevel@tonic-gate 	int noentry;
28987c478bd9Sstevel@tonic-gate 	int defer_dip_seq_update = 0;	/* need to defer update of dip->i_seq */
28997c478bd9Sstevel@tonic-gate 	int retry = 1;
290002ff05a9Svsakar 	int indeadlock;
29017c478bd9Sstevel@tonic-gate 
29027c478bd9Sstevel@tonic-gate again:
29037c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
29047c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
29057c478bd9Sstevel@tonic-gate 	truncflag = 0;
29067c478bd9Sstevel@tonic-gate 
29077c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_CREATE_MASK);
29087c478bd9Sstevel@tonic-gate 	if (error)
29097c478bd9Sstevel@tonic-gate 		goto out;
29107c478bd9Sstevel@tonic-gate 
29117c478bd9Sstevel@tonic-gate 	if (ulp) {
29127c478bd9Sstevel@tonic-gate 		trans_size = (int)TOP_CREATE_SIZE(ip);
29137c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_CREATE, trans_size);
29147c478bd9Sstevel@tonic-gate 	}
29157c478bd9Sstevel@tonic-gate 
29167c478bd9Sstevel@tonic-gate 	if ((vap->va_mode & VSVTX) && secpolicy_vnode_stky_modify(cr) != 0)
29177c478bd9Sstevel@tonic-gate 		vap->va_mode &= ~VSVTX;
29187c478bd9Sstevel@tonic-gate 
29197c478bd9Sstevel@tonic-gate 	if (*name == '\0') {
29207c478bd9Sstevel@tonic-gate 		/*
29217c478bd9Sstevel@tonic-gate 		 * Null component name refers to the directory itself.
29227c478bd9Sstevel@tonic-gate 		 */
29237c478bd9Sstevel@tonic-gate 		VN_HOLD(dvp);
29247c478bd9Sstevel@tonic-gate 		/*
29257c478bd9Sstevel@tonic-gate 		 * Even though this is an error case, we need to grab the
29267c478bd9Sstevel@tonic-gate 		 * quota lock since the error handling code below is common.
29277c478bd9Sstevel@tonic-gate 		 */
29287c478bd9Sstevel@tonic-gate 		rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
29297c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
29307c478bd9Sstevel@tonic-gate 		error = EEXIST;
29317c478bd9Sstevel@tonic-gate 	} else {
29327c478bd9Sstevel@tonic-gate 		xip = NULL;
29337c478bd9Sstevel@tonic-gate 		noentry = 0;
293402ff05a9Svsakar 		/*
293502ff05a9Svsakar 		 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
293602ff05a9Svsakar 		 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
293702ff05a9Svsakar 		 * possible, retries the operation.
293802ff05a9Svsakar 		 */
293902ff05a9Svsakar 		ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_CREATE,
294080d34432Sfrankho 		    retry_dir);
294102ff05a9Svsakar 		if (indeadlock)
294202ff05a9Svsakar 			goto again;
294302ff05a9Svsakar 
29447c478bd9Sstevel@tonic-gate 		xvp = dnlc_lookup(dvp, name);
29457c478bd9Sstevel@tonic-gate 		if (xvp == DNLC_NO_VNODE) {
29467c478bd9Sstevel@tonic-gate 			noentry = 1;
29477c478bd9Sstevel@tonic-gate 			VN_RELE(xvp);
29487c478bd9Sstevel@tonic-gate 			xvp = NULL;
29497c478bd9Sstevel@tonic-gate 		}
29507c478bd9Sstevel@tonic-gate 		if (xvp) {
29517c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
29527c478bd9Sstevel@tonic-gate 			if (error = ufs_iaccess(ip, IEXEC, cr)) {
29537c478bd9Sstevel@tonic-gate 				VN_RELE(xvp);
29547c478bd9Sstevel@tonic-gate 			} else {
29557c478bd9Sstevel@tonic-gate 				error = EEXIST;
29567c478bd9Sstevel@tonic-gate 				xip = VTOI(xvp);
29577c478bd9Sstevel@tonic-gate 			}
29587c478bd9Sstevel@tonic-gate 		} else {
29597c478bd9Sstevel@tonic-gate 			/*
29607c478bd9Sstevel@tonic-gate 			 * Suppress file system full message if we will retry
29617c478bd9Sstevel@tonic-gate 			 */
29627c478bd9Sstevel@tonic-gate 			error = ufs_direnter_cm(ip, name, DE_CREATE,
296380d34432Sfrankho 			    vap, &xip, cr, (noentry | (retry ? IQUIET : 0)));
296402ff05a9Svsakar 			if (error == EAGAIN) {
296502ff05a9Svsakar 				if (ulp) {
296602ff05a9Svsakar 					TRANS_END_CSYNC(ufsvfsp, error, issync,
296780d34432Sfrankho 					    TOP_CREATE, trans_size);
296802ff05a9Svsakar 					ufs_lockfs_end(ulp);
296902ff05a9Svsakar 				}
297002ff05a9Svsakar 				goto again;
297102ff05a9Svsakar 			}
29727c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
29737c478bd9Sstevel@tonic-gate 		}
29747c478bd9Sstevel@tonic-gate 		ip = xip;
29757c478bd9Sstevel@tonic-gate 		if (ip != NULL) {
29767c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
29777c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
29787c478bd9Sstevel@tonic-gate 		}
29797c478bd9Sstevel@tonic-gate 	}
29807c478bd9Sstevel@tonic-gate 
29817c478bd9Sstevel@tonic-gate 	/*
29827c478bd9Sstevel@tonic-gate 	 * If the file already exists and this is a non-exclusive create,
29837c478bd9Sstevel@tonic-gate 	 * check permissions and allow access for non-directories.
29847c478bd9Sstevel@tonic-gate 	 * Read-only create of an existing directory is also allowed.
29857c478bd9Sstevel@tonic-gate 	 * We fail an exclusive create of anything which already exists.
29867c478bd9Sstevel@tonic-gate 	 */
29877c478bd9Sstevel@tonic-gate 	if (error == EEXIST) {
29887c478bd9Sstevel@tonic-gate 		dip = VTOI(dvp);
29897c478bd9Sstevel@tonic-gate 		if (excl == NONEXCL) {
29907c478bd9Sstevel@tonic-gate 			if ((((ip->i_mode & IFMT) == IFDIR) ||
29917c478bd9Sstevel@tonic-gate 			    ((ip->i_mode & IFMT) == IFATTRDIR)) &&
29927c478bd9Sstevel@tonic-gate 			    (mode & IWRITE))
29937c478bd9Sstevel@tonic-gate 				error = EISDIR;
29947c478bd9Sstevel@tonic-gate 			else if (mode)
29957c478bd9Sstevel@tonic-gate 				error = ufs_iaccess(ip, mode, cr);
29967c478bd9Sstevel@tonic-gate 			else
29977c478bd9Sstevel@tonic-gate 				error = 0;
29987c478bd9Sstevel@tonic-gate 		}
29997c478bd9Sstevel@tonic-gate 		if (error) {
30007c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
30017c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
30027c478bd9Sstevel@tonic-gate 			VN_RELE(ITOV(ip));
30037c478bd9Sstevel@tonic-gate 			goto unlock;
30047c478bd9Sstevel@tonic-gate 		}
30057c478bd9Sstevel@tonic-gate 		/*
30067c478bd9Sstevel@tonic-gate 		 * If the error EEXIST was set, then i_seq can not
30077c478bd9Sstevel@tonic-gate 		 * have been updated. The sequence number interface
30087c478bd9Sstevel@tonic-gate 		 * is defined such that a non-error VOP_CREATE must
30097c478bd9Sstevel@tonic-gate 		 * increase the dir va_seq it by at least one. If we
30107c478bd9Sstevel@tonic-gate 		 * have cleared the error, increase i_seq. Note that
30117c478bd9Sstevel@tonic-gate 		 * we are increasing the dir i_seq and in rare cases
30127c478bd9Sstevel@tonic-gate 		 * ip may actually be from the dvp, so we already have
30137c478bd9Sstevel@tonic-gate 		 * the locks and it will not be subject to truncation.
30147c478bd9Sstevel@tonic-gate 		 * In case we have to update i_seq of the parent
30157c478bd9Sstevel@tonic-gate 		 * directory dip, we have to defer it till we have
30167c478bd9Sstevel@tonic-gate 		 * released our locks on ip due to lock ordering requirements.
30177c478bd9Sstevel@tonic-gate 		 */
30187c478bd9Sstevel@tonic-gate 		if (ip != dip)
30197c478bd9Sstevel@tonic-gate 			defer_dip_seq_update = 1;
30207c478bd9Sstevel@tonic-gate 		else
30217c478bd9Sstevel@tonic-gate 			ip->i_seq++;
30227c478bd9Sstevel@tonic-gate 
30237c478bd9Sstevel@tonic-gate 		if (((ip->i_mode & IFMT) == IFREG) &&
30247c478bd9Sstevel@tonic-gate 		    (vap->va_mask & AT_SIZE) && vap->va_size == 0) {
30257c478bd9Sstevel@tonic-gate 			/*
30267c478bd9Sstevel@tonic-gate 			 * Truncate regular files, if requested by caller.
30277c478bd9Sstevel@tonic-gate 			 * Grab i_rwlock to make sure no one else is
30287c478bd9Sstevel@tonic-gate 			 * currently writing to the file (we promised
30297c478bd9Sstevel@tonic-gate 			 * bmap we would do this).
30307c478bd9Sstevel@tonic-gate 			 * Must get the locks in the correct order.
30317c478bd9Sstevel@tonic-gate 			 */
30327c478bd9Sstevel@tonic-gate 			if (ip->i_size == 0) {
30337c478bd9Sstevel@tonic-gate 				ip->i_flag |= ICHG | IUPD;
30347c478bd9Sstevel@tonic-gate 				ip->i_seq++;
30357c478bd9Sstevel@tonic-gate 				TRANS_INODE(ufsvfsp, ip);
30367c478bd9Sstevel@tonic-gate 			} else {
30377c478bd9Sstevel@tonic-gate 				/*
30387c478bd9Sstevel@tonic-gate 				 * Large Files: Why this check here?
30397c478bd9Sstevel@tonic-gate 				 * Though we do it in vn_create() we really
30407c478bd9Sstevel@tonic-gate 				 * want to guarantee that we do not destroy
30417c478bd9Sstevel@tonic-gate 				 * Large file data by atomically checking
30427c478bd9Sstevel@tonic-gate 				 * the size while holding the contents
30437c478bd9Sstevel@tonic-gate 				 * lock.
30447c478bd9Sstevel@tonic-gate 				 */
30457c478bd9Sstevel@tonic-gate 				if (flag && !(flag & FOFFMAX) &&
30467c478bd9Sstevel@tonic-gate 				    ((ip->i_mode & IFMT) == IFREG) &&
30477c478bd9Sstevel@tonic-gate 				    (ip->i_size > (offset_t)MAXOFF32_T)) {
30487c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
30497c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
30507c478bd9Sstevel@tonic-gate 					error = EOVERFLOW;
30517c478bd9Sstevel@tonic-gate 					goto unlock;
30527c478bd9Sstevel@tonic-gate 				}
30537c478bd9Sstevel@tonic-gate 				if (TRANS_ISTRANS(ufsvfsp))
30547c478bd9Sstevel@tonic-gate 					truncflag++;
30557c478bd9Sstevel@tonic-gate 				else {
30567c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
30577c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
305802ff05a9Svsakar 					ufs_tryirwlock_trans(&ip->i_rwlock,
305980d34432Sfrankho 					    RW_WRITER, TOP_CREATE,
306080d34432Sfrankho 					    retry_file);
306102ff05a9Svsakar 					if (indeadlock) {
306202ff05a9Svsakar 						VN_RELE(ITOV(ip));
306302ff05a9Svsakar 						goto again;
306402ff05a9Svsakar 					}
30657c478bd9Sstevel@tonic-gate 					rw_enter(&ufsvfsp->vfs_dqrwlock,
306680d34432Sfrankho 					    RW_READER);
30677c478bd9Sstevel@tonic-gate 					rw_enter(&ip->i_contents, RW_WRITER);
30687c478bd9Sstevel@tonic-gate 					(void) ufs_itrunc(ip, (u_offset_t)0, 0,
306980d34432Sfrankho 					    cr);
30707c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_rwlock);
30717c478bd9Sstevel@tonic-gate 				}
3072df2381bfSpraks 
3073df2381bfSpraks 			}
3074df2381bfSpraks 			if (error == 0) {
3075da6c28aaSamw 				vnevent_create(ITOV(ip), ct);
30767c478bd9Sstevel@tonic-gate 			}
30777c478bd9Sstevel@tonic-gate 		}
30787c478bd9Sstevel@tonic-gate 	}
30797c478bd9Sstevel@tonic-gate 
30807c478bd9Sstevel@tonic-gate 	if (error) {
30817c478bd9Sstevel@tonic-gate 		if (ip != NULL) {
30827c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
30837c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
30847c478bd9Sstevel@tonic-gate 		}
30857c478bd9Sstevel@tonic-gate 		goto unlock;
30867c478bd9Sstevel@tonic-gate 	}
30877c478bd9Sstevel@tonic-gate 
30887c478bd9Sstevel@tonic-gate 	*vpp = ITOV(ip);
30897c478bd9Sstevel@tonic-gate 	ITIMES(ip);
30907c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
30917c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
30927c478bd9Sstevel@tonic-gate 
30937c478bd9Sstevel@tonic-gate 	/*
30947c478bd9Sstevel@tonic-gate 	 * If vnode is a device return special vnode instead.
30957c478bd9Sstevel@tonic-gate 	 */
30967c478bd9Sstevel@tonic-gate 	if (!error && IS_DEVVP(*vpp)) {
30977c478bd9Sstevel@tonic-gate 		struct vnode *newvp;
30987c478bd9Sstevel@tonic-gate 
30997c478bd9Sstevel@tonic-gate 		newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type, cr);
31007c478bd9Sstevel@tonic-gate 		VN_RELE(*vpp);
31017c478bd9Sstevel@tonic-gate 		if (newvp == NULL) {
31027c478bd9Sstevel@tonic-gate 			error = ENOSYS;
31037c478bd9Sstevel@tonic-gate 			goto unlock;
31047c478bd9Sstevel@tonic-gate 		}
31057c478bd9Sstevel@tonic-gate 		truncflag = 0;
31067c478bd9Sstevel@tonic-gate 		*vpp = newvp;
31077c478bd9Sstevel@tonic-gate 	}
31087c478bd9Sstevel@tonic-gate unlock:
31097c478bd9Sstevel@tonic-gate 
31107c478bd9Sstevel@tonic-gate 	/*
31117c478bd9Sstevel@tonic-gate 	 * Do the deferred update of the parent directory's sequence
31127c478bd9Sstevel@tonic-gate 	 * number now.
31137c478bd9Sstevel@tonic-gate 	 */
31147c478bd9Sstevel@tonic-gate 	if (defer_dip_seq_update == 1) {
31157c478bd9Sstevel@tonic-gate 		rw_enter(&dip->i_contents, RW_READER);
31167c478bd9Sstevel@tonic-gate 		mutex_enter(&dip->i_tlock);
31177c478bd9Sstevel@tonic-gate 		dip->i_seq++;
31187c478bd9Sstevel@tonic-gate 		mutex_exit(&dip->i_tlock);
31197c478bd9Sstevel@tonic-gate 		rw_exit(&dip->i_contents);
31207c478bd9Sstevel@tonic-gate 	}
31217c478bd9Sstevel@tonic-gate 
31227c478bd9Sstevel@tonic-gate 	if (ulp) {
31237c478bd9Sstevel@tonic-gate 		int terr = 0;
31247c478bd9Sstevel@tonic-gate 
31257c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_CREATE,
31267c478bd9Sstevel@tonic-gate 		    trans_size);
31277c478bd9Sstevel@tonic-gate 
31287c478bd9Sstevel@tonic-gate 		/*
31297c478bd9Sstevel@tonic-gate 		 * If we haven't had a more interesting failure
31307c478bd9Sstevel@tonic-gate 		 * already, then anything that might've happened
31317c478bd9Sstevel@tonic-gate 		 * here should be reported.
31327c478bd9Sstevel@tonic-gate 		 */
31337c478bd9Sstevel@tonic-gate 		if (error == 0)
31347c478bd9Sstevel@tonic-gate 			error = terr;
31357c478bd9Sstevel@tonic-gate 	}
31367c478bd9Sstevel@tonic-gate 
31377c478bd9Sstevel@tonic-gate 	if (!error && truncflag) {
313802ff05a9Svsakar 		ufs_tryirwlock(&ip->i_rwlock, RW_WRITER, retry_trunc);
313902ff05a9Svsakar 		if (indeadlock) {
314002ff05a9Svsakar 			if (ulp)
314102ff05a9Svsakar 				ufs_lockfs_end(ulp);
314202ff05a9Svsakar 			VN_RELE(ITOV(ip));
314302ff05a9Svsakar 			goto again;
314402ff05a9Svsakar 		}
31457c478bd9Sstevel@tonic-gate 		(void) TRANS_ITRUNC(ip, (u_offset_t)0, 0, cr);
31467c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
31477c478bd9Sstevel@tonic-gate 	}
31487c478bd9Sstevel@tonic-gate 
31497c478bd9Sstevel@tonic-gate 	if (ulp)
31507c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
31517c478bd9Sstevel@tonic-gate 
31527c478bd9Sstevel@tonic-gate 	/*
31537c478bd9Sstevel@tonic-gate 	 * If no inodes available, try to free one up out of the
31547c478bd9Sstevel@tonic-gate 	 * pending delete queue.
31557c478bd9Sstevel@tonic-gate 	 */
31567c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
31577c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
31587c478bd9Sstevel@tonic-gate 		retry = 0;
31597c478bd9Sstevel@tonic-gate 		goto again;
31607c478bd9Sstevel@tonic-gate 	}
31617c478bd9Sstevel@tonic-gate 
31627c478bd9Sstevel@tonic-gate out:
31637c478bd9Sstevel@tonic-gate 	return (error);
31647c478bd9Sstevel@tonic-gate }
31657c478bd9Sstevel@tonic-gate 
31667c478bd9Sstevel@tonic-gate extern int ufs_idle_max;
31677c478bd9Sstevel@tonic-gate /*ARGSUSED*/
31687c478bd9Sstevel@tonic-gate static int
3169da6c28aaSamw ufs_remove(struct vnode *vp, char *nm, struct cred *cr,
3170da6c28aaSamw 	caller_context_t *ct, int flags)
31717c478bd9Sstevel@tonic-gate {
31727c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
31737c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp	= ip->i_ufsvfs;
31747c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
31757c478bd9Sstevel@tonic-gate 	vnode_t *rmvp = NULL;	/* Vnode corresponding to name being removed */
317602ff05a9Svsakar 	int indeadlock;
31777c478bd9Sstevel@tonic-gate 	int error;
31787c478bd9Sstevel@tonic-gate 	int issync;
31797c478bd9Sstevel@tonic-gate 	int trans_size;
31807c478bd9Sstevel@tonic-gate 
31817c478bd9Sstevel@tonic-gate 	/*
31827c478bd9Sstevel@tonic-gate 	 * don't let the delete queue get too long
31837c478bd9Sstevel@tonic-gate 	 */
31847c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
31857c478bd9Sstevel@tonic-gate 		error = EIO;
31867c478bd9Sstevel@tonic-gate 		goto out;
31877c478bd9Sstevel@tonic-gate 	}
31887c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_delete.uq_ne > ufs_idle_max)
31897c478bd9Sstevel@tonic-gate 		ufs_delete_drain(vp->v_vfsp, 1, 1);
31907c478bd9Sstevel@tonic-gate 
319102ff05a9Svsakar retry_remove:
31927c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_REMOVE_MASK);
31937c478bd9Sstevel@tonic-gate 	if (error)
31947c478bd9Sstevel@tonic-gate 		goto out;
31957c478bd9Sstevel@tonic-gate 
31967c478bd9Sstevel@tonic-gate 	if (ulp)
31977c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_REMOVE,
31987c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_REMOVE_SIZE(VTOI(vp)));
31997c478bd9Sstevel@tonic-gate 
320002ff05a9Svsakar 	/*
320102ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
320202ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
320302ff05a9Svsakar 	 * possible, retries the operation.
320402ff05a9Svsakar 	 */
320502ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_REMOVE, retry);
320602ff05a9Svsakar 	if (indeadlock)
320702ff05a9Svsakar 		goto retry_remove;
32087c478bd9Sstevel@tonic-gate 	error = ufs_dirremove(ip, nm, (struct inode *)0, (struct vnode *)0,
32097c478bd9Sstevel@tonic-gate 	    DR_REMOVE, cr, &rmvp);
32107c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
32117c478bd9Sstevel@tonic-gate 
32127c478bd9Sstevel@tonic-gate 	if (ulp) {
32137c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_REMOVE, trans_size);
32147c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
32157c478bd9Sstevel@tonic-gate 	}
32167c478bd9Sstevel@tonic-gate 
32177c478bd9Sstevel@tonic-gate 	/*
32187c478bd9Sstevel@tonic-gate 	 * This must be called after the remove transaction is closed.
32197c478bd9Sstevel@tonic-gate 	 */
32207c478bd9Sstevel@tonic-gate 	if (rmvp != NULL) {
32217c478bd9Sstevel@tonic-gate 		/* Only send the event if there were no errors */
32227c478bd9Sstevel@tonic-gate 		if (error == 0)
3223da6c28aaSamw 			vnevent_remove(rmvp, vp, nm, ct);
32247c478bd9Sstevel@tonic-gate 		VN_RELE(rmvp);
32257c478bd9Sstevel@tonic-gate 	}
32267c478bd9Sstevel@tonic-gate out:
32277c478bd9Sstevel@tonic-gate 	return (error);
32287c478bd9Sstevel@tonic-gate }
32297c478bd9Sstevel@tonic-gate 
32307c478bd9Sstevel@tonic-gate /*
32317c478bd9Sstevel@tonic-gate  * Link a file or a directory.  Only privileged processes are allowed to
32327c478bd9Sstevel@tonic-gate  * make links to directories.
32337c478bd9Sstevel@tonic-gate  */
3234da6c28aaSamw /*ARGSUSED*/
32357c478bd9Sstevel@tonic-gate static int
3236da6c28aaSamw ufs_link(struct vnode *tdvp, struct vnode *svp, char *tnm, struct cred *cr,
3237da6c28aaSamw 	caller_context_t *ct, int flags)
32387c478bd9Sstevel@tonic-gate {
32397c478bd9Sstevel@tonic-gate 	struct inode *sip;
32407c478bd9Sstevel@tonic-gate 	struct inode *tdp = VTOI(tdvp);
32417c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = tdp->i_ufsvfs;
32427c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
32437c478bd9Sstevel@tonic-gate 	struct vnode *realvp;
32447c478bd9Sstevel@tonic-gate 	int error;
32457c478bd9Sstevel@tonic-gate 	int issync;
32467c478bd9Sstevel@tonic-gate 	int trans_size;
32477c478bd9Sstevel@tonic-gate 	int isdev;
324802ff05a9Svsakar 	int indeadlock;
32497c478bd9Sstevel@tonic-gate 
325002ff05a9Svsakar retry_link:
32517c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_LINK_MASK);
32527c478bd9Sstevel@tonic-gate 	if (error)
32537c478bd9Sstevel@tonic-gate 		goto out;
32547c478bd9Sstevel@tonic-gate 
32557c478bd9Sstevel@tonic-gate 	if (ulp)
32567c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_LINK,
32577c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_LINK_SIZE(VTOI(tdvp)));
32587c478bd9Sstevel@tonic-gate 
3259da6c28aaSamw 	if (VOP_REALVP(svp, &realvp, ct) == 0)
32607c478bd9Sstevel@tonic-gate 		svp = realvp;
32617c478bd9Sstevel@tonic-gate 
32627c478bd9Sstevel@tonic-gate 	/*
32637c478bd9Sstevel@tonic-gate 	 * Make sure link for extended attributes is valid
32647c478bd9Sstevel@tonic-gate 	 * We only support hard linking of attr in ATTRDIR to ATTRDIR
32657c478bd9Sstevel@tonic-gate 	 *
32667c478bd9Sstevel@tonic-gate 	 * Make certain we don't attempt to look at a device node as
32677c478bd9Sstevel@tonic-gate 	 * a ufs inode.
32687c478bd9Sstevel@tonic-gate 	 */
32697c478bd9Sstevel@tonic-gate 
32707c478bd9Sstevel@tonic-gate 	isdev = IS_DEVVP(svp);
32717c478bd9Sstevel@tonic-gate 	if (((isdev == 0) && ((VTOI(svp)->i_cflags & IXATTR) == 0) &&
32727c478bd9Sstevel@tonic-gate 	    ((tdp->i_mode & IFMT) == IFATTRDIR)) ||
32737c478bd9Sstevel@tonic-gate 	    ((isdev == 0) && (VTOI(svp)->i_cflags & IXATTR) &&
32747c478bd9Sstevel@tonic-gate 	    ((tdp->i_mode & IFMT) == IFDIR))) {
32757c478bd9Sstevel@tonic-gate 		error = EINVAL;
32767c478bd9Sstevel@tonic-gate 		goto unlock;
32777c478bd9Sstevel@tonic-gate 	}
32787c478bd9Sstevel@tonic-gate 
32797c478bd9Sstevel@tonic-gate 	sip = VTOI(svp);
32807c478bd9Sstevel@tonic-gate 	if ((svp->v_type == VDIR &&
32817c478bd9Sstevel@tonic-gate 	    secpolicy_fs_linkdir(cr, ufsvfsp->vfs_vfs) != 0) ||
32827c478bd9Sstevel@tonic-gate 	    (sip->i_uid != crgetuid(cr) && secpolicy_basic_link(cr) != 0)) {
32837c478bd9Sstevel@tonic-gate 		error = EPERM;
32847c478bd9Sstevel@tonic-gate 		goto unlock;
32857c478bd9Sstevel@tonic-gate 	}
328602ff05a9Svsakar 
328702ff05a9Svsakar 	/*
328802ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
328902ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
329002ff05a9Svsakar 	 * possible, retries the operation.
329102ff05a9Svsakar 	 */
329202ff05a9Svsakar 	ufs_tryirwlock_trans(&tdp->i_rwlock, RW_WRITER, TOP_LINK, retry);
329302ff05a9Svsakar 	if (indeadlock)
329402ff05a9Svsakar 		goto retry_link;
32957c478bd9Sstevel@tonic-gate 	error = ufs_direnter_lr(tdp, tnm, DE_LINK, (struct inode *)0,
32967c478bd9Sstevel@tonic-gate 	    sip, cr, NULL);
32977c478bd9Sstevel@tonic-gate 	rw_exit(&tdp->i_rwlock);
32987c478bd9Sstevel@tonic-gate 
32997c478bd9Sstevel@tonic-gate unlock:
33007c478bd9Sstevel@tonic-gate 	if (ulp) {
33017c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_LINK, trans_size);
33027c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
33037c478bd9Sstevel@tonic-gate 	}
3304df2381bfSpraks 
3305df2381bfSpraks 	if (!error) {
3306da6c28aaSamw 		vnevent_link(svp, ct);
3307df2381bfSpraks 	}
33087c478bd9Sstevel@tonic-gate out:
33097c478bd9Sstevel@tonic-gate 	return (error);
33107c478bd9Sstevel@tonic-gate }
33117c478bd9Sstevel@tonic-gate 
33127c478bd9Sstevel@tonic-gate uint64_t ufs_rename_retry_cnt;
33137c478bd9Sstevel@tonic-gate uint64_t ufs_rename_upgrade_retry_cnt;
33147c478bd9Sstevel@tonic-gate uint64_t ufs_rename_dircheck_retry_cnt;
33157c478bd9Sstevel@tonic-gate clock_t	 ufs_rename_backoff_delay = 1;
33167c478bd9Sstevel@tonic-gate 
33177c478bd9Sstevel@tonic-gate /*
33187c478bd9Sstevel@tonic-gate  * Rename a file or directory.
33197c478bd9Sstevel@tonic-gate  * We are given the vnode and entry string of the source and the
33207c478bd9Sstevel@tonic-gate  * vnode and entry string of the place we want to move the source
33217c478bd9Sstevel@tonic-gate  * to (the target). The essential operation is:
33227c478bd9Sstevel@tonic-gate  *	unlink(target);
33237c478bd9Sstevel@tonic-gate  *	link(source, target);
33247c478bd9Sstevel@tonic-gate  *	unlink(source);
33257c478bd9Sstevel@tonic-gate  * but "atomically".  Can't do full commit without saving state in
33267c478bd9Sstevel@tonic-gate  * the inode on disk, which isn't feasible at this time.  Best we
33277c478bd9Sstevel@tonic-gate  * can do is always guarantee that the TARGET exists.
33287c478bd9Sstevel@tonic-gate  */
3329baa4d099Sswilcox 
33307c478bd9Sstevel@tonic-gate /*ARGSUSED*/
33317c478bd9Sstevel@tonic-gate static int
33327c478bd9Sstevel@tonic-gate ufs_rename(
33337c478bd9Sstevel@tonic-gate 	struct vnode *sdvp,		/* old (source) parent vnode */
33347c478bd9Sstevel@tonic-gate 	char *snm,			/* old (source) entry name */
33357c478bd9Sstevel@tonic-gate 	struct vnode *tdvp,		/* new (target) parent vnode */
33367c478bd9Sstevel@tonic-gate 	char *tnm,			/* new (target) entry name */
3337da6c28aaSamw 	struct cred *cr,
3338da6c28aaSamw 	caller_context_t *ct,
3339da6c28aaSamw 	int flags)
33407c478bd9Sstevel@tonic-gate {
33417c478bd9Sstevel@tonic-gate 	struct inode *sip = NULL;	/* source inode */
3342baa4d099Sswilcox 	struct inode *ip = NULL;	/* check inode */
33437c478bd9Sstevel@tonic-gate 	struct inode *sdp;		/* old (source) parent inode */
33447c478bd9Sstevel@tonic-gate 	struct inode *tdp;		/* new (target) parent inode */
33457c478bd9Sstevel@tonic-gate 	struct vnode *tvp = NULL;	/* target vnode, if it exists */
33467c478bd9Sstevel@tonic-gate 	struct vnode *realvp;
33477c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
33487c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
33495b024a5bSbatschul 	struct ufs_slot slot;
3350baa4d099Sswilcox 	timestruc_t now;
33517c478bd9Sstevel@tonic-gate 	int error;
33527c478bd9Sstevel@tonic-gate 	int issync;
33537c478bd9Sstevel@tonic-gate 	int trans_size;
335402ff05a9Svsakar 	krwlock_t *first_lock;
335502ff05a9Svsakar 	krwlock_t *second_lock;
335602ff05a9Svsakar 	krwlock_t *reverse_lock;
33577c478bd9Sstevel@tonic-gate 
33587c478bd9Sstevel@tonic-gate 	sdp = VTOI(sdvp);
3359baa4d099Sswilcox 	slot.fbp = NULL;
33607c478bd9Sstevel@tonic-gate 	ufsvfsp = sdp->i_ufsvfs;
336102ff05a9Svsakar retry_rename:
33627c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_RENAME_MASK);
33637c478bd9Sstevel@tonic-gate 	if (error)
33647c478bd9Sstevel@tonic-gate 		goto out;
33657c478bd9Sstevel@tonic-gate 
33667c478bd9Sstevel@tonic-gate 	if (ulp)
33677c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_RENAME,
33687c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_RENAME_SIZE(sdp));
33697c478bd9Sstevel@tonic-gate 
3370da6c28aaSamw 	if (VOP_REALVP(tdvp, &realvp, ct) == 0)
33717c478bd9Sstevel@tonic-gate 		tdvp = realvp;
33727c478bd9Sstevel@tonic-gate 
33737c478bd9Sstevel@tonic-gate 	tdp = VTOI(tdvp);
33747c478bd9Sstevel@tonic-gate 
3375baa4d099Sswilcox 
33767c478bd9Sstevel@tonic-gate 	/*
33777c478bd9Sstevel@tonic-gate 	 * We only allow renaming of attributes from ATTRDIR to ATTRDIR.
33787c478bd9Sstevel@tonic-gate 	 */
33797c478bd9Sstevel@tonic-gate 	if ((tdp->i_mode & IFMT) != (sdp->i_mode & IFMT)) {
33807c478bd9Sstevel@tonic-gate 		error = EINVAL;
33817c478bd9Sstevel@tonic-gate 		goto unlock;
33827c478bd9Sstevel@tonic-gate 	}
33837c478bd9Sstevel@tonic-gate 
33847c478bd9Sstevel@tonic-gate 	/*
33857c478bd9Sstevel@tonic-gate 	 * Look up inode of file we're supposed to rename.
33867c478bd9Sstevel@tonic-gate 	 */
3387baa4d099Sswilcox 	gethrestime(&now);
33887c478bd9Sstevel@tonic-gate 	if (error = ufs_dirlook(sdp, snm, &sip, cr, 0)) {
338902ff05a9Svsakar 		if (error == EAGAIN) {
339002ff05a9Svsakar 			if (ulp) {
339102ff05a9Svsakar 				TRANS_END_CSYNC(ufsvfsp, error, issync,
339280d34432Sfrankho 				    TOP_RENAME, trans_size);
339302ff05a9Svsakar 				ufs_lockfs_end(ulp);
339402ff05a9Svsakar 			}
339502ff05a9Svsakar 			goto retry_rename;
339602ff05a9Svsakar 		}
339702ff05a9Svsakar 
33987c478bd9Sstevel@tonic-gate 		goto unlock;
33997c478bd9Sstevel@tonic-gate 	}
34007c478bd9Sstevel@tonic-gate 
34017c478bd9Sstevel@tonic-gate 	/*
34027c478bd9Sstevel@tonic-gate 	 * Lock both the source and target directories (they may be
34037c478bd9Sstevel@tonic-gate 	 * the same) to provide the atomicity semantics that was
34047c478bd9Sstevel@tonic-gate 	 * previously provided by the per file system vfs_rename_lock
34057c478bd9Sstevel@tonic-gate 	 *
34067c478bd9Sstevel@tonic-gate 	 * with vfs_rename_lock removed to allow simultaneous renames
34077c478bd9Sstevel@tonic-gate 	 * within a file system, ufs_dircheckpath can deadlock while
34087c478bd9Sstevel@tonic-gate 	 * traversing back to ensure that source is not a parent directory
34097c478bd9Sstevel@tonic-gate 	 * of target parent directory. This is because we get into
34107c478bd9Sstevel@tonic-gate 	 * ufs_dircheckpath with the sdp and tdp locks held as RW_WRITER.
34117c478bd9Sstevel@tonic-gate 	 * If the tdp and sdp of the simultaneous renames happen to be
34127c478bd9Sstevel@tonic-gate 	 * in the path of each other, it can lead to a deadlock. This
34137c478bd9Sstevel@tonic-gate 	 * can be avoided by getting the locks as RW_READER here and then
34147c478bd9Sstevel@tonic-gate 	 * upgrading to RW_WRITER after completing the ufs_dircheckpath.
341502ff05a9Svsakar 	 *
341602ff05a9Svsakar 	 * We hold the target directory's i_rwlock after calling
341702ff05a9Svsakar 	 * ufs_lockfs_begin but in many other operations (like ufs_readdir)
341802ff05a9Svsakar 	 * VOP_RWLOCK is explicitly called by the filesystem independent code
341902ff05a9Svsakar 	 * before calling the file system operation. In these cases the order
342002ff05a9Svsakar 	 * is reversed (i.e i_rwlock is taken first and then ufs_lockfs_begin
342102ff05a9Svsakar 	 * is called). This is fine as long as ufs_lockfs_begin acts as a VOP
342202ff05a9Svsakar 	 * counter but with ufs_quiesce setting the SLOCK bit this becomes a
342302ff05a9Svsakar 	 * synchronizing object which might lead to a deadlock. So we use
342402ff05a9Svsakar 	 * rw_tryenter instead of rw_enter. If we fail to get this lock and
342502ff05a9Svsakar 	 * find that SLOCK bit is set, we call ufs_lockfs_end and restart the
342602ff05a9Svsakar 	 * operation.
34277c478bd9Sstevel@tonic-gate 	 */
34287c478bd9Sstevel@tonic-gate retry:
342902ff05a9Svsakar 	first_lock = &tdp->i_rwlock;
343002ff05a9Svsakar 	second_lock = &sdp->i_rwlock;
343102ff05a9Svsakar retry_firstlock:
343202ff05a9Svsakar 	if (!rw_tryenter(first_lock, RW_READER)) {
34337c478bd9Sstevel@tonic-gate 		/*
343402ff05a9Svsakar 		 * We didn't get the lock. Check if the SLOCK is set in the
343502ff05a9Svsakar 		 * ufsvfs. If yes, we might be in a deadlock. Safer to give up
343602ff05a9Svsakar 		 * and wait for SLOCK to be cleared.
34377c478bd9Sstevel@tonic-gate 		 */
343802ff05a9Svsakar 
343902ff05a9Svsakar 		if (ulp && ULOCKFS_IS_SLOCK(ulp)) {
344002ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME,
344180d34432Sfrankho 			    trans_size);
344202ff05a9Svsakar 			ufs_lockfs_end(ulp);
344302ff05a9Svsakar 			goto retry_rename;
344402ff05a9Svsakar 
344502ff05a9Svsakar 		} else {
34467c478bd9Sstevel@tonic-gate 			/*
344702ff05a9Svsakar 			 * SLOCK isn't set so this is a genuine synchronization
344802ff05a9Svsakar 			 * case. Let's try again after giving them a breather.
34497c478bd9Sstevel@tonic-gate 			 */
345002ff05a9Svsakar 			delay(RETRY_LOCK_DELAY);
345102ff05a9Svsakar 			goto  retry_firstlock;
345202ff05a9Svsakar 		}
345302ff05a9Svsakar 	}
345402ff05a9Svsakar 	/*
345502ff05a9Svsakar 	 * Need to check if the tdp and sdp are same !!!
345602ff05a9Svsakar 	 */
345702ff05a9Svsakar 	if ((tdp != sdp) && (!rw_tryenter(second_lock, RW_READER))) {
345802ff05a9Svsakar 		/*
345902ff05a9Svsakar 		 * We didn't get the lock. Check if the SLOCK is set in the
346002ff05a9Svsakar 		 * ufsvfs. If yes, we might be in a deadlock. Safer to give up
346102ff05a9Svsakar 		 * and wait for SLOCK to be cleared.
346202ff05a9Svsakar 		 */
346302ff05a9Svsakar 
346402ff05a9Svsakar 		rw_exit(first_lock);
346502ff05a9Svsakar 		if (ulp && ULOCKFS_IS_SLOCK(ulp)) {
346602ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME,
346780d34432Sfrankho 			    trans_size);
346802ff05a9Svsakar 			ufs_lockfs_end(ulp);
346902ff05a9Svsakar 			goto retry_rename;
347002ff05a9Svsakar 
347102ff05a9Svsakar 		} else {
347202ff05a9Svsakar 			/*
347302ff05a9Svsakar 			 * So we couldn't get the second level peer lock *and*
347402ff05a9Svsakar 			 * the SLOCK bit isn't set. Too bad we can be
347502ff05a9Svsakar 			 * contentding with someone wanting these locks otherway
347602ff05a9Svsakar 			 * round. Reverse the locks in case there is a heavy
347702ff05a9Svsakar 			 * contention for the second level lock.
347802ff05a9Svsakar 			 */
347902ff05a9Svsakar 			reverse_lock = first_lock;
348002ff05a9Svsakar 			first_lock = second_lock;
348102ff05a9Svsakar 			second_lock = reverse_lock;
348202ff05a9Svsakar 			ufs_rename_retry_cnt++;
348302ff05a9Svsakar 			goto  retry_firstlock;
34847c478bd9Sstevel@tonic-gate 		}
34857c478bd9Sstevel@tonic-gate 	}
34867c478bd9Sstevel@tonic-gate 
34877c478bd9Sstevel@tonic-gate 	if (sip == tdp) {
34887c478bd9Sstevel@tonic-gate 		error = EINVAL;
34897c478bd9Sstevel@tonic-gate 		goto errout;
34907c478bd9Sstevel@tonic-gate 	}
34917c478bd9Sstevel@tonic-gate 	/*
34927c478bd9Sstevel@tonic-gate 	 * Make sure we can delete the source entry.  This requires
34937c478bd9Sstevel@tonic-gate 	 * write permission on the containing directory.
34947c478bd9Sstevel@tonic-gate 	 * Check for sticky directories.
34957c478bd9Sstevel@tonic-gate 	 */
34967c478bd9Sstevel@tonic-gate 	rw_enter(&sdp->i_contents, RW_READER);
34977c478bd9Sstevel@tonic-gate 	rw_enter(&sip->i_contents, RW_READER);
34987c478bd9Sstevel@tonic-gate 	if ((error = ufs_iaccess(sdp, IWRITE, cr)) != 0 ||
34997c478bd9Sstevel@tonic-gate 	    (error = ufs_sticky_remove_access(sdp, sip, cr)) != 0) {
35007c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35017c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35027c478bd9Sstevel@tonic-gate 		goto errout;
35037c478bd9Sstevel@tonic-gate 	}
35047c478bd9Sstevel@tonic-gate 
35057c478bd9Sstevel@tonic-gate 	/*
35067c478bd9Sstevel@tonic-gate 	 * If this is a rename of a directory and the parent is
35077c478bd9Sstevel@tonic-gate 	 * different (".." must be changed), then the source
35087c478bd9Sstevel@tonic-gate 	 * directory must not be in the directory hierarchy
35097c478bd9Sstevel@tonic-gate 	 * above the target, as this would orphan everything
35107c478bd9Sstevel@tonic-gate 	 * below the source directory.  Also the user must have
35117c478bd9Sstevel@tonic-gate 	 * write permission in the source so as to be able to
35127c478bd9Sstevel@tonic-gate 	 * change "..".
35137c478bd9Sstevel@tonic-gate 	 */
35147c478bd9Sstevel@tonic-gate 	if ((((sip->i_mode & IFMT) == IFDIR) ||
35157c478bd9Sstevel@tonic-gate 	    ((sip->i_mode & IFMT) == IFATTRDIR)) && sdp != tdp) {
35167c478bd9Sstevel@tonic-gate 		ino_t	inum;
35177c478bd9Sstevel@tonic-gate 
35187c478bd9Sstevel@tonic-gate 		if ((error = ufs_iaccess(sip, IWRITE, cr))) {
35197c478bd9Sstevel@tonic-gate 			rw_exit(&sip->i_contents);
35207c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_contents);
35217c478bd9Sstevel@tonic-gate 			goto errout;
35227c478bd9Sstevel@tonic-gate 		}
35237c478bd9Sstevel@tonic-gate 		inum = sip->i_number;
35247c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35257c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35267c478bd9Sstevel@tonic-gate 		if ((error = ufs_dircheckpath(inum, tdp, sdp, cr))) {
35277c478bd9Sstevel@tonic-gate 			/*
35287c478bd9Sstevel@tonic-gate 			 * If we got EAGAIN ufs_dircheckpath detected a
35297c478bd9Sstevel@tonic-gate 			 * potential deadlock and backed out. We need
35307c478bd9Sstevel@tonic-gate 			 * to retry the operation since sdp and tdp have
35317c478bd9Sstevel@tonic-gate 			 * to be released to avoid the deadlock.
35327c478bd9Sstevel@tonic-gate 			 */
35337c478bd9Sstevel@tonic-gate 			if (error == EAGAIN) {
35347c478bd9Sstevel@tonic-gate 				rw_exit(&tdp->i_rwlock);
35357c478bd9Sstevel@tonic-gate 				if (tdp != sdp)
35367c478bd9Sstevel@tonic-gate 					rw_exit(&sdp->i_rwlock);
35377c478bd9Sstevel@tonic-gate 				delay(ufs_rename_backoff_delay);
35387c478bd9Sstevel@tonic-gate 				ufs_rename_dircheck_retry_cnt++;
35397c478bd9Sstevel@tonic-gate 				goto retry;
35407c478bd9Sstevel@tonic-gate 			}
35417c478bd9Sstevel@tonic-gate 			goto errout;
35427c478bd9Sstevel@tonic-gate 		}
35437c478bd9Sstevel@tonic-gate 	} else {
35447c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35457c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35467c478bd9Sstevel@tonic-gate 	}
35477c478bd9Sstevel@tonic-gate 
35487c478bd9Sstevel@tonic-gate 
35497c478bd9Sstevel@tonic-gate 	/*
35507c478bd9Sstevel@tonic-gate 	 * Check for renaming '.' or '..' or alias of '.'
35517c478bd9Sstevel@tonic-gate 	 */
35527c478bd9Sstevel@tonic-gate 	if (strcmp(snm, ".") == 0 || strcmp(snm, "..") == 0 || sdp == sip) {
35537c478bd9Sstevel@tonic-gate 		error = EINVAL;
35547c478bd9Sstevel@tonic-gate 		goto errout;
35557c478bd9Sstevel@tonic-gate 	}
35567c478bd9Sstevel@tonic-gate 
35577c478bd9Sstevel@tonic-gate 	/*
35587c478bd9Sstevel@tonic-gate 	 * Simultaneous renames can deadlock in ufs_dircheckpath since it
35597c478bd9Sstevel@tonic-gate 	 * tries to traverse back the file tree with both tdp and sdp held
35607c478bd9Sstevel@tonic-gate 	 * as RW_WRITER. To avoid that we have to hold the tdp and sdp locks
35617c478bd9Sstevel@tonic-gate 	 * as RW_READERS  till ufs_dircheckpath is done.
35627c478bd9Sstevel@tonic-gate 	 * Now that ufs_dircheckpath is done with, we can upgrade the locks
35637c478bd9Sstevel@tonic-gate 	 * to RW_WRITER.
35647c478bd9Sstevel@tonic-gate 	 */
35657c478bd9Sstevel@tonic-gate 	if (!rw_tryupgrade(&tdp->i_rwlock)) {
35667c478bd9Sstevel@tonic-gate 		/*
35677c478bd9Sstevel@tonic-gate 		 * The upgrade failed. We got to give away the lock
35687c478bd9Sstevel@tonic-gate 		 * as to avoid deadlocking with someone else who is
35697c478bd9Sstevel@tonic-gate 		 * waiting for writer lock. With the lock gone, we
35707c478bd9Sstevel@tonic-gate 		 * cannot be sure the checks done above will hold
35717c478bd9Sstevel@tonic-gate 		 * good when we eventually get them back as writer.
35727c478bd9Sstevel@tonic-gate 		 * So if we can't upgrade we drop the locks and retry
35737c478bd9Sstevel@tonic-gate 		 * everything again.
35747c478bd9Sstevel@tonic-gate 		 */
35757c478bd9Sstevel@tonic-gate 		rw_exit(&tdp->i_rwlock);
35767c478bd9Sstevel@tonic-gate 		if (tdp != sdp)
35777c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_rwlock);
35787c478bd9Sstevel@tonic-gate 		delay(ufs_rename_backoff_delay);
35797c478bd9Sstevel@tonic-gate 		ufs_rename_upgrade_retry_cnt++;
35807c478bd9Sstevel@tonic-gate 		goto retry;
35817c478bd9Sstevel@tonic-gate 	}
35827c478bd9Sstevel@tonic-gate 	if (tdp != sdp) {
35837c478bd9Sstevel@tonic-gate 		if (!rw_tryupgrade(&sdp->i_rwlock)) {
35847c478bd9Sstevel@tonic-gate 			/*
35857c478bd9Sstevel@tonic-gate 			 * The upgrade failed. We got to give away the lock
35867c478bd9Sstevel@tonic-gate 			 * as to avoid deadlocking with someone else who is
35877c478bd9Sstevel@tonic-gate 			 * waiting for writer lock. With the lock gone, we
35887c478bd9Sstevel@tonic-gate 			 * cannot be sure the checks done above will hold
35897c478bd9Sstevel@tonic-gate 			 * good when we eventually get them back as writer.
35907c478bd9Sstevel@tonic-gate 			 * So if we can't upgrade we drop the locks and retry
35917c478bd9Sstevel@tonic-gate 			 * everything again.
35927c478bd9Sstevel@tonic-gate 			 */
35937c478bd9Sstevel@tonic-gate 			rw_exit(&tdp->i_rwlock);
35947c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_rwlock);
35957c478bd9Sstevel@tonic-gate 			delay(ufs_rename_backoff_delay);
35967c478bd9Sstevel@tonic-gate 			ufs_rename_upgrade_retry_cnt++;
35977c478bd9Sstevel@tonic-gate 			goto retry;
35987c478bd9Sstevel@tonic-gate 		}
35997c478bd9Sstevel@tonic-gate 	}
3600baa4d099Sswilcox 
3601baa4d099Sswilcox 	/*
3602baa4d099Sswilcox 	 * Now that all the locks are held check to make sure another thread
3603baa4d099Sswilcox 	 * didn't slip in and take out the sip.
3604baa4d099Sswilcox 	 */
3605baa4d099Sswilcox 	slot.status = NONE;
3606baa4d099Sswilcox 	if ((sip->i_ctime.tv_usec * 1000) > now.tv_nsec ||
3607baa4d099Sswilcox 	    sip->i_ctime.tv_sec > now.tv_sec) {
3608baa4d099Sswilcox 		rw_enter(&sdp->i_ufsvfs->vfs_dqrwlock, RW_READER);
3609baa4d099Sswilcox 		rw_enter(&sdp->i_contents, RW_WRITER);
3610baa4d099Sswilcox 		error = ufs_dircheckforname(sdp, snm, strlen(snm), &slot,
3611baa4d099Sswilcox 		    &ip, cr, 0);
3612baa4d099Sswilcox 		rw_exit(&sdp->i_contents);
3613baa4d099Sswilcox 		rw_exit(&sdp->i_ufsvfs->vfs_dqrwlock);
3614baa4d099Sswilcox 		if (error) {
3615baa4d099Sswilcox 			goto errout;
3616baa4d099Sswilcox 		}
3617baa4d099Sswilcox 		if (ip == NULL) {
3618baa4d099Sswilcox 			error = ENOENT;
3619baa4d099Sswilcox 			goto errout;
3620baa4d099Sswilcox 		} else {
3621baa4d099Sswilcox 			/*
3622baa4d099Sswilcox 			 * If the inode was found need to drop the v_count
3623baa4d099Sswilcox 			 * so as not to keep the filesystem from being
3624baa4d099Sswilcox 			 * unmounted at a later time.
3625baa4d099Sswilcox 			 */
3626baa4d099Sswilcox 			VN_RELE(ITOV(ip));
3627baa4d099Sswilcox 		}
3628baa4d099Sswilcox 
3629baa4d099Sswilcox 		/*
3630baa4d099Sswilcox 		 * Release the slot.fbp that has the page mapped and
3631baa4d099Sswilcox 		 * locked SE_SHARED, and could be used in in
3632baa4d099Sswilcox 		 * ufs_direnter_lr() which needs to get the SE_EXCL lock
3633baa4d099Sswilcox 		 * on said page.
3634baa4d099Sswilcox 		 */
3635baa4d099Sswilcox 		if (slot.fbp) {
3636baa4d099Sswilcox 			fbrelse(slot.fbp, S_OTHER);
3637baa4d099Sswilcox 			slot.fbp = NULL;
3638baa4d099Sswilcox 		}
3639baa4d099Sswilcox 	}
3640baa4d099Sswilcox 
36417c478bd9Sstevel@tonic-gate 	/*
36427c478bd9Sstevel@tonic-gate 	 * Link source to the target.  If a target exists, return its
36437c478bd9Sstevel@tonic-gate 	 * vnode pointer in tvp.  We'll release it after sending the
36447c478bd9Sstevel@tonic-gate 	 * vnevent.
36457c478bd9Sstevel@tonic-gate 	 */
36467c478bd9Sstevel@tonic-gate 	if (error = ufs_direnter_lr(tdp, tnm, DE_RENAME, sdp, sip, cr, &tvp)) {
36477c478bd9Sstevel@tonic-gate 		/*
36487c478bd9Sstevel@tonic-gate 		 * ESAME isn't really an error; it indicates that the
36497c478bd9Sstevel@tonic-gate 		 * operation should not be done because the source and target
36507c478bd9Sstevel@tonic-gate 		 * are the same file, but that no error should be reported.
36517c478bd9Sstevel@tonic-gate 		 */
36527c478bd9Sstevel@tonic-gate 		if (error == ESAME)
36537c478bd9Sstevel@tonic-gate 			error = 0;
36547c478bd9Sstevel@tonic-gate 		goto errout;
36557c478bd9Sstevel@tonic-gate 	}
36567c478bd9Sstevel@tonic-gate 
36577c478bd9Sstevel@tonic-gate 	/*
36587c478bd9Sstevel@tonic-gate 	 * Unlink the source.
36597c478bd9Sstevel@tonic-gate 	 * Remove the source entry.  ufs_dirremove() checks that the entry
36607c478bd9Sstevel@tonic-gate 	 * still reflects sip, and returns an error if it doesn't.
36617c478bd9Sstevel@tonic-gate 	 * If the entry has changed just forget about it.  Release
36627c478bd9Sstevel@tonic-gate 	 * the source inode.
36637c478bd9Sstevel@tonic-gate 	 */
36647c478bd9Sstevel@tonic-gate 	if ((error = ufs_dirremove(sdp, snm, sip, (struct vnode *)0,
36657c478bd9Sstevel@tonic-gate 	    DR_RENAME, cr, NULL)) == ENOENT)
36667c478bd9Sstevel@tonic-gate 		error = 0;
36677c478bd9Sstevel@tonic-gate 
36687c478bd9Sstevel@tonic-gate errout:
3669baa4d099Sswilcox 	if (slot.fbp)
3670baa4d099Sswilcox 		fbrelse(slot.fbp, S_OTHER);
3671baa4d099Sswilcox 
36727c478bd9Sstevel@tonic-gate 	rw_exit(&tdp->i_rwlock);
36737c478bd9Sstevel@tonic-gate 	if (sdp != tdp) {
36747c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_rwlock);
36757c478bd9Sstevel@tonic-gate 	}
36767c478bd9Sstevel@tonic-gate 
36777c478bd9Sstevel@tonic-gate unlock:
36787c478bd9Sstevel@tonic-gate 	if (ulp) {
36797c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME, trans_size);
36807c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
36817c478bd9Sstevel@tonic-gate 	}
36827c478bd9Sstevel@tonic-gate 
36837c478bd9Sstevel@tonic-gate 	/*
36847c478bd9Sstevel@tonic-gate 	 * If no errors, send the appropriate events on the source
36857c478bd9Sstevel@tonic-gate 	 * and destination (a.k.a, target) vnodes, if they exist.
36867c478bd9Sstevel@tonic-gate 	 * This has to be done after the rename transaction has closed.
36877c478bd9Sstevel@tonic-gate 	 */
36887c478bd9Sstevel@tonic-gate 	if (error == 0) {
36897c478bd9Sstevel@tonic-gate 		if (tvp != NULL)
3690da6c28aaSamw 			vnevent_rename_dest(tvp, tdvp, tnm, ct);
3691df2381bfSpraks 
3692df2381bfSpraks 		/*
3693df2381bfSpraks 		 * Notify the target directory of the rename event
3694df2381bfSpraks 		 * if source and target directories are not same.
3695df2381bfSpraks 		 */
3696df2381bfSpraks 		if (sdvp != tdvp)
3697da6c28aaSamw 			vnevent_rename_dest_dir(tdvp, ct);
3698df2381bfSpraks 
36997c478bd9Sstevel@tonic-gate 		/*
37007c478bd9Sstevel@tonic-gate 		 * Note that if ufs_direnter_lr() returned ESAME then
37017c478bd9Sstevel@tonic-gate 		 * this event will still be sent.  This isn't expected
37027c478bd9Sstevel@tonic-gate 		 * to be a problem for anticipated usage by consumers.
37037c478bd9Sstevel@tonic-gate 		 */
37047c478bd9Sstevel@tonic-gate 		if (sip != NULL)
3705da6c28aaSamw 			vnevent_rename_src(ITOV(sip), sdvp, snm, ct);
37067c478bd9Sstevel@tonic-gate 	}
37077c478bd9Sstevel@tonic-gate 
37087c478bd9Sstevel@tonic-gate 	if (tvp != NULL)
37097c478bd9Sstevel@tonic-gate 		VN_RELE(tvp);
37107c478bd9Sstevel@tonic-gate 
37117c478bd9Sstevel@tonic-gate 	if (sip != NULL)
37127c478bd9Sstevel@tonic-gate 		VN_RELE(ITOV(sip));
37137c478bd9Sstevel@tonic-gate 
37147c478bd9Sstevel@tonic-gate out:
37157c478bd9Sstevel@tonic-gate 	return (error);
37167c478bd9Sstevel@tonic-gate }
37177c478bd9Sstevel@tonic-gate 
37187c478bd9Sstevel@tonic-gate /*ARGSUSED*/
37197c478bd9Sstevel@tonic-gate static int
37207c478bd9Sstevel@tonic-gate ufs_mkdir(struct vnode *dvp, char *dirname, struct vattr *vap,
3721da6c28aaSamw 	struct vnode **vpp, struct cred *cr, caller_context_t *ct, int flags,
3722da6c28aaSamw 	vsecattr_t *vsecp)
37237c478bd9Sstevel@tonic-gate {
37247c478bd9Sstevel@tonic-gate 	struct inode *ip;
37257c478bd9Sstevel@tonic-gate 	struct inode *xip;
37267c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
37277c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
37287c478bd9Sstevel@tonic-gate 	int error;
37297c478bd9Sstevel@tonic-gate 	int issync;
37307c478bd9Sstevel@tonic-gate 	int trans_size;
373102ff05a9Svsakar 	int indeadlock;
37327c478bd9Sstevel@tonic-gate 	int retry = 1;
37337c478bd9Sstevel@tonic-gate 
37347c478bd9Sstevel@tonic-gate 	ASSERT((vap->va_mask & (AT_TYPE|AT_MODE)) == (AT_TYPE|AT_MODE));
37357c478bd9Sstevel@tonic-gate 
37367c478bd9Sstevel@tonic-gate 	/*
37377c478bd9Sstevel@tonic-gate 	 * Can't make directory in attr hidden dir
37387c478bd9Sstevel@tonic-gate 	 */
37397c478bd9Sstevel@tonic-gate 	if ((VTOI(dvp)->i_mode & IFMT) == IFATTRDIR)
37407c478bd9Sstevel@tonic-gate 		return (EINVAL);
37417c478bd9Sstevel@tonic-gate 
37427c478bd9Sstevel@tonic-gate again:
37437c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
37447c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
37457c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_MKDIR_MASK);
37467c478bd9Sstevel@tonic-gate 	if (error)
37477c478bd9Sstevel@tonic-gate 		goto out;
37487c478bd9Sstevel@tonic-gate 	if (ulp)
37497c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_MKDIR,
37507c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_MKDIR_SIZE(ip));
37517c478bd9Sstevel@tonic-gate 
375202ff05a9Svsakar 	/*
375302ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
375402ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
375502ff05a9Svsakar 	 * possible, retries the operation.
375602ff05a9Svsakar 	 */
375702ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_MKDIR, retry);
375802ff05a9Svsakar 	if (indeadlock)
375902ff05a9Svsakar 		goto again;
37607c478bd9Sstevel@tonic-gate 
37617c478bd9Sstevel@tonic-gate 	error = ufs_direnter_cm(ip, dirname, DE_MKDIR, vap, &xip, cr,
376280d34432Sfrankho 	    (retry ? IQUIET : 0));
376302ff05a9Svsakar 	if (error == EAGAIN) {
376402ff05a9Svsakar 		if (ulp) {
376502ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_MKDIR,
376680d34432Sfrankho 			    trans_size);
376702ff05a9Svsakar 			ufs_lockfs_end(ulp);
376802ff05a9Svsakar 		}
376902ff05a9Svsakar 		goto again;
377002ff05a9Svsakar 	}
37717c478bd9Sstevel@tonic-gate 
37727c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
37737c478bd9Sstevel@tonic-gate 	if (error == 0) {
37747c478bd9Sstevel@tonic-gate 		ip = xip;
37757c478bd9Sstevel@tonic-gate 		*vpp = ITOV(ip);
37767c478bd9Sstevel@tonic-gate 	} else if (error == EEXIST)
37777c478bd9Sstevel@tonic-gate 		VN_RELE(ITOV(xip));
37787c478bd9Sstevel@tonic-gate 
37797c478bd9Sstevel@tonic-gate 	if (ulp) {
37807c478bd9Sstevel@tonic-gate 		int terr = 0;
37817c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_MKDIR, trans_size);
37827c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
37837c478bd9Sstevel@tonic-gate 		if (error == 0)
37847c478bd9Sstevel@tonic-gate 			error = terr;
37857c478bd9Sstevel@tonic-gate 	}
37867c478bd9Sstevel@tonic-gate out:
37877c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
37887c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
37897c478bd9Sstevel@tonic-gate 		retry = 0;
37907c478bd9Sstevel@tonic-gate 		goto again;
37917c478bd9Sstevel@tonic-gate 	}
37927c478bd9Sstevel@tonic-gate 
37937c478bd9Sstevel@tonic-gate 	return (error);
37947c478bd9Sstevel@tonic-gate }
37957c478bd9Sstevel@tonic-gate 
37967c478bd9Sstevel@tonic-gate /*ARGSUSED*/
37977c478bd9Sstevel@tonic-gate static int
3798da6c28aaSamw ufs_rmdir(struct vnode *vp, char *nm, struct vnode *cdir, struct cred *cr,
3799da6c28aaSamw 	caller_context_t *ct, int flags)
38007c478bd9Sstevel@tonic-gate {
38017c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
38027c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
38037c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
38047c478bd9Sstevel@tonic-gate 	vnode_t *rmvp = NULL;	/* Vnode of removed directory */
38057c478bd9Sstevel@tonic-gate 	int error;
38067c478bd9Sstevel@tonic-gate 	int issync;
380702ff05a9Svsakar 	int trans_size;
380802ff05a9Svsakar 	int indeadlock;
38097c478bd9Sstevel@tonic-gate 
38107c478bd9Sstevel@tonic-gate 	/*
38117c478bd9Sstevel@tonic-gate 	 * don't let the delete queue get too long
38127c478bd9Sstevel@tonic-gate 	 */
38137c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
38147c478bd9Sstevel@tonic-gate 		error = EIO;
38157c478bd9Sstevel@tonic-gate 		goto out;
38167c478bd9Sstevel@tonic-gate 	}
38177c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_delete.uq_ne > ufs_idle_max)
38187c478bd9Sstevel@tonic-gate 		ufs_delete_drain(vp->v_vfsp, 1, 1);
38197c478bd9Sstevel@tonic-gate 
382002ff05a9Svsakar retry_rmdir:
38217c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_RMDIR_MASK);
38227c478bd9Sstevel@tonic-gate 	if (error)
38237c478bd9Sstevel@tonic-gate 		goto out;
38247c478bd9Sstevel@tonic-gate 
38257c478bd9Sstevel@tonic-gate 	if (ulp)
382602ff05a9Svsakar 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_RMDIR,
382780d34432Sfrankho 		    trans_size = TOP_RMDIR_SIZE);
38287c478bd9Sstevel@tonic-gate 
382902ff05a9Svsakar 	/*
383002ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
383102ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
383202ff05a9Svsakar 	 * possible, retries the operation.
383302ff05a9Svsakar 	 */
383402ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_RMDIR, retry);
383502ff05a9Svsakar 	if (indeadlock)
383602ff05a9Svsakar 		goto retry_rmdir;
38377c478bd9Sstevel@tonic-gate 	error = ufs_dirremove(ip, nm, (struct inode *)0, cdir, DR_RMDIR, cr,
383880d34432Sfrankho 	    &rmvp);
38397c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
38407c478bd9Sstevel@tonic-gate 
38417c478bd9Sstevel@tonic-gate 	if (ulp) {
38427c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RMDIR,
384380d34432Sfrankho 		    trans_size);
38447c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
38457c478bd9Sstevel@tonic-gate 	}
38467c478bd9Sstevel@tonic-gate 
38477c478bd9Sstevel@tonic-gate 	/*
38487c478bd9Sstevel@tonic-gate 	 * This must be done AFTER the rmdir transaction has closed.
38497c478bd9Sstevel@tonic-gate 	 */
38507c478bd9Sstevel@tonic-gate 	if (rmvp != NULL) {
38517c478bd9Sstevel@tonic-gate 		/* Only send the event if there were no errors */
38527c478bd9Sstevel@tonic-gate 		if (error == 0)
3853da6c28aaSamw 			vnevent_rmdir(rmvp, vp, nm, ct);
38547c478bd9Sstevel@tonic-gate 		VN_RELE(rmvp);
38557c478bd9Sstevel@tonic-gate 	}
38567c478bd9Sstevel@tonic-gate out:
38577c478bd9Sstevel@tonic-gate 	return (error);
38587c478bd9Sstevel@tonic-gate }
38597c478bd9Sstevel@tonic-gate 
38607c478bd9Sstevel@tonic-gate /* ARGSUSED */
38617c478bd9Sstevel@tonic-gate static int
38627c478bd9Sstevel@tonic-gate ufs_readdir(
38637c478bd9Sstevel@tonic-gate 	struct vnode *vp,
38647c478bd9Sstevel@tonic-gate 	struct uio *uiop,
38657c478bd9Sstevel@tonic-gate 	struct cred *cr,
3866da6c28aaSamw 	int *eofp,
3867da6c28aaSamw 	caller_context_t *ct,
3868da6c28aaSamw 	int flags)
38697c478bd9Sstevel@tonic-gate {
38707c478bd9Sstevel@tonic-gate 	struct iovec *iovp;
38717c478bd9Sstevel@tonic-gate 	struct inode *ip;
38727c478bd9Sstevel@tonic-gate 	struct direct *idp;
38737c478bd9Sstevel@tonic-gate 	struct dirent64 *odp;
38747c478bd9Sstevel@tonic-gate 	struct fbuf *fbp;
38757c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
38767c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
38777c478bd9Sstevel@tonic-gate 	caddr_t outbuf;
38787c478bd9Sstevel@tonic-gate 	size_t bufsize;
38797c478bd9Sstevel@tonic-gate 	uint_t offset;
38807c478bd9Sstevel@tonic-gate 	uint_t bytes_wanted, total_bytes_wanted;
38817c478bd9Sstevel@tonic-gate 	int incount = 0;
38827c478bd9Sstevel@tonic-gate 	int outcount = 0;
38837c478bd9Sstevel@tonic-gate 	int error;
38847c478bd9Sstevel@tonic-gate 
38857c478bd9Sstevel@tonic-gate 	ip = VTOI(vp);
38867c478bd9Sstevel@tonic-gate 	ASSERT(RW_READ_HELD(&ip->i_rwlock));
38877c478bd9Sstevel@tonic-gate 
38887c478bd9Sstevel@tonic-gate 	if (uiop->uio_loffset >= MAXOFF32_T) {
38897c478bd9Sstevel@tonic-gate 		if (eofp)
38907c478bd9Sstevel@tonic-gate 			*eofp = 1;
38917c478bd9Sstevel@tonic-gate 		return (0);
38927c478bd9Sstevel@tonic-gate 	}
38937c478bd9Sstevel@tonic-gate 
38947c478bd9Sstevel@tonic-gate 	/*
38957c478bd9Sstevel@tonic-gate 	 * Check if we have been called with a valid iov_len
38967c478bd9Sstevel@tonic-gate 	 * and bail out if not, otherwise we may potentially loop
38977c478bd9Sstevel@tonic-gate 	 * forever further down.
38987c478bd9Sstevel@tonic-gate 	 */
38997c478bd9Sstevel@tonic-gate 	if (uiop->uio_iov->iov_len <= 0) {
39007c478bd9Sstevel@tonic-gate 		error = EINVAL;
39017c478bd9Sstevel@tonic-gate 		goto out;
39027c478bd9Sstevel@tonic-gate 	}
39037c478bd9Sstevel@tonic-gate 
39047c478bd9Sstevel@tonic-gate 	/*
39057c478bd9Sstevel@tonic-gate 	 * Large Files: When we come here we are guaranteed that
39067c478bd9Sstevel@tonic-gate 	 * uio_offset can be used safely. The high word is zero.
39077c478bd9Sstevel@tonic-gate 	 */
39087c478bd9Sstevel@tonic-gate 
39097c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
39107c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READDIR_MASK);
39117c478bd9Sstevel@tonic-gate 	if (error)
39127c478bd9Sstevel@tonic-gate 		goto out;
39137c478bd9Sstevel@tonic-gate 
39147c478bd9Sstevel@tonic-gate 	iovp = uiop->uio_iov;
39157c478bd9Sstevel@tonic-gate 	total_bytes_wanted = iovp->iov_len;
39167c478bd9Sstevel@tonic-gate 
39177c478bd9Sstevel@tonic-gate 	/* Large Files: directory files should not be "large" */
39187c478bd9Sstevel@tonic-gate 
39197c478bd9Sstevel@tonic-gate 	ASSERT(ip->i_size <= MAXOFF32_T);
39207c478bd9Sstevel@tonic-gate 
39217c478bd9Sstevel@tonic-gate 	/* Force offset to be valid (to guard against bogus lseek() values) */
39227c478bd9Sstevel@tonic-gate 	offset = (uint_t)uiop->uio_offset & ~(DIRBLKSIZ - 1);
39237c478bd9Sstevel@tonic-gate 
39247c478bd9Sstevel@tonic-gate 	/* Quit if at end of file or link count of zero (posix) */
39257c478bd9Sstevel@tonic-gate 	if (offset >= (uint_t)ip->i_size || ip->i_nlink <= 0) {
39267c478bd9Sstevel@tonic-gate 		if (eofp)
39277c478bd9Sstevel@tonic-gate 			*eofp = 1;
39287c478bd9Sstevel@tonic-gate 		error = 0;
39297c478bd9Sstevel@tonic-gate 		goto unlock;
39307c478bd9Sstevel@tonic-gate 	}
39317c478bd9Sstevel@tonic-gate 
39327c478bd9Sstevel@tonic-gate 	/*
39337c478bd9Sstevel@tonic-gate 	 * Get space to change directory entries into fs independent format.
39347c478bd9Sstevel@tonic-gate 	 * Do fast alloc for the most commonly used-request size (filesystem
39357c478bd9Sstevel@tonic-gate 	 * block size).
39367c478bd9Sstevel@tonic-gate 	 */
39377c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg != UIO_SYSSPACE || uiop->uio_iovcnt != 1) {
39387c478bd9Sstevel@tonic-gate 		bufsize = total_bytes_wanted;
39397c478bd9Sstevel@tonic-gate 		outbuf = kmem_alloc(bufsize, KM_SLEEP);
39407c478bd9Sstevel@tonic-gate 		odp = (struct dirent64 *)outbuf;
39417c478bd9Sstevel@tonic-gate 	} else {
39427c478bd9Sstevel@tonic-gate 		bufsize = total_bytes_wanted;
39437c478bd9Sstevel@tonic-gate 		odp = (struct dirent64 *)iovp->iov_base;
39447c478bd9Sstevel@tonic-gate 	}
39457c478bd9Sstevel@tonic-gate 
39467c478bd9Sstevel@tonic-gate nextblk:
39477c478bd9Sstevel@tonic-gate 	bytes_wanted = total_bytes_wanted;
39487c478bd9Sstevel@tonic-gate 
39497c478bd9Sstevel@tonic-gate 	/* Truncate request to file size */
39507c478bd9Sstevel@tonic-gate 	if (offset + bytes_wanted > (int)ip->i_size)
39517c478bd9Sstevel@tonic-gate 		bytes_wanted = (int)(ip->i_size - offset);
39527c478bd9Sstevel@tonic-gate 
39537c478bd9Sstevel@tonic-gate 	/* Comply with MAXBSIZE boundary restrictions of fbread() */
39547c478bd9Sstevel@tonic-gate 	if ((offset & MAXBOFFSET) + bytes_wanted > MAXBSIZE)
39557c478bd9Sstevel@tonic-gate 		bytes_wanted = MAXBSIZE - (offset & MAXBOFFSET);
39567c478bd9Sstevel@tonic-gate 
39577c478bd9Sstevel@tonic-gate 	/*
39587c478bd9Sstevel@tonic-gate 	 * Read in the next chunk.
39597c478bd9Sstevel@tonic-gate 	 * We are still holding the i_rwlock.
39607c478bd9Sstevel@tonic-gate 	 */
39617c478bd9Sstevel@tonic-gate 	error = fbread(vp, (offset_t)offset, bytes_wanted, S_OTHER, &fbp);
39627c478bd9Sstevel@tonic-gate 
39637c478bd9Sstevel@tonic-gate 	if (error)
39647c478bd9Sstevel@tonic-gate 		goto update_inode;
39657c478bd9Sstevel@tonic-gate 	if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) && (ip->i_fs->fs_ronly == 0) &&
39667c478bd9Sstevel@tonic-gate 	    (!ufsvfsp->vfs_noatime)) {
39677c478bd9Sstevel@tonic-gate 		ip->i_flag |= IACC;
39687c478bd9Sstevel@tonic-gate 	}
39697c478bd9Sstevel@tonic-gate 	incount = 0;
39707c478bd9Sstevel@tonic-gate 	idp = (struct direct *)fbp->fb_addr;
397180d34432Sfrankho 	if (idp->d_ino == 0 && idp->d_reclen == 0 && idp->d_namlen == 0) {
39727c478bd9Sstevel@tonic-gate 		cmn_err(CE_WARN, "ufs_readdir: bad dir, inumber = %llu, "
397380d34432Sfrankho 		    "fs = %s\n",
397480d34432Sfrankho 		    (u_longlong_t)ip->i_number, ufsvfsp->vfs_fs->fs_fsmnt);
39757c478bd9Sstevel@tonic-gate 		fbrelse(fbp, S_OTHER);
39767c478bd9Sstevel@tonic-gate 		error = ENXIO;
39777c478bd9Sstevel@tonic-gate 		goto update_inode;
39787c478bd9Sstevel@tonic-gate 	}
39797c478bd9Sstevel@tonic-gate 	/* Transform to file-system independent format */
39807c478bd9Sstevel@tonic-gate 	while (incount < bytes_wanted) {
39817c478bd9Sstevel@tonic-gate 		/*
39827c478bd9Sstevel@tonic-gate 		 * If the current directory entry is mangled, then skip
39837c478bd9Sstevel@tonic-gate 		 * to the next block.  It would be nice to set the FSBAD
39847c478bd9Sstevel@tonic-gate 		 * flag in the super-block so that a fsck is forced on
39857c478bd9Sstevel@tonic-gate 		 * next reboot, but locking is a problem.
39867c478bd9Sstevel@tonic-gate 		 */
39877c478bd9Sstevel@tonic-gate 		if (idp->d_reclen & 0x3) {
39887c478bd9Sstevel@tonic-gate 			offset = (offset + DIRBLKSIZ) & ~(DIRBLKSIZ-1);
39897c478bd9Sstevel@tonic-gate 			break;
39907c478bd9Sstevel@tonic-gate 		}
39917c478bd9Sstevel@tonic-gate 
39927c478bd9Sstevel@tonic-gate 		/* Skip to requested offset and skip empty entries */
39937c478bd9Sstevel@tonic-gate 		if (idp->d_ino != 0 && offset >= (uint_t)uiop->uio_offset) {
39947c478bd9Sstevel@tonic-gate 			ushort_t this_reclen =
39957c478bd9Sstevel@tonic-gate 			    DIRENT64_RECLEN(idp->d_namlen);
39967c478bd9Sstevel@tonic-gate 			/* Buffer too small for any entries */
39977c478bd9Sstevel@tonic-gate 			if (!outcount && this_reclen > bufsize) {
39987c478bd9Sstevel@tonic-gate 				fbrelse(fbp, S_OTHER);
39997c478bd9Sstevel@tonic-gate 				error = EINVAL;
40007c478bd9Sstevel@tonic-gate 				goto update_inode;
40017c478bd9Sstevel@tonic-gate 			}
40027c478bd9Sstevel@tonic-gate 			/* If would overrun the buffer, quit */
40037c478bd9Sstevel@tonic-gate 			if (outcount + this_reclen > bufsize) {
40047c478bd9Sstevel@tonic-gate 				break;
40057c478bd9Sstevel@tonic-gate 			}
40067c478bd9Sstevel@tonic-gate 			/* Take this entry */
40077c478bd9Sstevel@tonic-gate 			odp->d_ino = (ino64_t)idp->d_ino;
40087c478bd9Sstevel@tonic-gate 			odp->d_reclen = (ushort_t)this_reclen;
40097c478bd9Sstevel@tonic-gate 			odp->d_off = (offset_t)(offset + idp->d_reclen);
40107c478bd9Sstevel@tonic-gate 
40117c478bd9Sstevel@tonic-gate 			/* use strncpy(9f) to zero out uninitialized bytes */
40127c478bd9Sstevel@tonic-gate 
40137c478bd9Sstevel@tonic-gate 			ASSERT(strlen(idp->d_name) + 1 <=
40147c478bd9Sstevel@tonic-gate 			    DIRENT64_NAMELEN(this_reclen));
40157c478bd9Sstevel@tonic-gate 			(void) strncpy(odp->d_name, idp->d_name,
40167c478bd9Sstevel@tonic-gate 			    DIRENT64_NAMELEN(this_reclen));
40177c478bd9Sstevel@tonic-gate 			outcount += odp->d_reclen;
401880d34432Sfrankho 			odp = (struct dirent64 *)
401980d34432Sfrankho 			    ((intptr_t)odp + odp->d_reclen);
40207c478bd9Sstevel@tonic-gate 			ASSERT(outcount <= bufsize);
40217c478bd9Sstevel@tonic-gate 		}
40227c478bd9Sstevel@tonic-gate 		if (idp->d_reclen) {
40237c478bd9Sstevel@tonic-gate 			incount += idp->d_reclen;
40247c478bd9Sstevel@tonic-gate 			offset += idp->d_reclen;
40257c478bd9Sstevel@tonic-gate 			idp = (struct direct *)((intptr_t)idp + idp->d_reclen);
40267c478bd9Sstevel@tonic-gate 		} else {
40277c478bd9Sstevel@tonic-gate 			offset = (offset + DIRBLKSIZ) & ~(DIRBLKSIZ-1);
40287c478bd9Sstevel@tonic-gate 			break;
40297c478bd9Sstevel@tonic-gate 		}
40307c478bd9Sstevel@tonic-gate 	}
40317c478bd9Sstevel@tonic-gate 	/* Release the chunk */
40327c478bd9Sstevel@tonic-gate 	fbrelse(fbp, S_OTHER);
40337c478bd9Sstevel@tonic-gate 
40347c478bd9Sstevel@tonic-gate 	/* Read whole block, but got no entries, read another if not eof */
40357c478bd9Sstevel@tonic-gate 
40367c478bd9Sstevel@tonic-gate 	/*
40377c478bd9Sstevel@tonic-gate 	 * Large Files: casting i_size to int here is not a problem
40387c478bd9Sstevel@tonic-gate 	 * because directory sizes are always less than MAXOFF32_T.
40397c478bd9Sstevel@tonic-gate 	 * See assertion above.
40407c478bd9Sstevel@tonic-gate 	 */
40417c478bd9Sstevel@tonic-gate 
40427c478bd9Sstevel@tonic-gate 	if (offset < (int)ip->i_size && !outcount)
40437c478bd9Sstevel@tonic-gate 		goto nextblk;
40447c478bd9Sstevel@tonic-gate 
40457c478bd9Sstevel@tonic-gate 	/* Copy out the entry data */
40467c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg == UIO_SYSSPACE && uiop->uio_iovcnt == 1) {
40477c478bd9Sstevel@tonic-gate 		iovp->iov_base += outcount;
40487c478bd9Sstevel@tonic-gate 		iovp->iov_len -= outcount;
40497c478bd9Sstevel@tonic-gate 		uiop->uio_resid -= outcount;
40507c478bd9Sstevel@tonic-gate 		uiop->uio_offset = offset;
40517c478bd9Sstevel@tonic-gate 	} else if ((error = uiomove(outbuf, (long)outcount, UIO_READ,
405280d34432Sfrankho 	    uiop)) == 0)
40537c478bd9Sstevel@tonic-gate 		uiop->uio_offset = offset;
40547c478bd9Sstevel@tonic-gate update_inode:
40557c478bd9Sstevel@tonic-gate 	ITIMES(ip);
40567c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg != UIO_SYSSPACE || uiop->uio_iovcnt != 1)
40577c478bd9Sstevel@tonic-gate 		kmem_free(outbuf, bufsize);
40587c478bd9Sstevel@tonic-gate 
40597c478bd9Sstevel@tonic-gate 	if (eofp && error == 0)
40607c478bd9Sstevel@tonic-gate 		*eofp = (uiop->uio_offset >= (int)ip->i_size);
40617c478bd9Sstevel@tonic-gate unlock:
40627c478bd9Sstevel@tonic-gate 	if (ulp) {
40637c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
40647c478bd9Sstevel@tonic-gate 	}
40657c478bd9Sstevel@tonic-gate out:
40667c478bd9Sstevel@tonic-gate 	return (error);
40677c478bd9Sstevel@tonic-gate }
40687c478bd9Sstevel@tonic-gate 
40697c478bd9Sstevel@tonic-gate /*ARGSUSED*/
40707c478bd9Sstevel@tonic-gate static int
40717c478bd9Sstevel@tonic-gate ufs_symlink(
40727c478bd9Sstevel@tonic-gate 	struct vnode *dvp,		/* ptr to parent dir vnode */
40737c478bd9Sstevel@tonic-gate 	char *linkname,			/* name of symbolic link */
40747c478bd9Sstevel@tonic-gate 	struct vattr *vap,		/* attributes */
40757c478bd9Sstevel@tonic-gate 	char *target,			/* target path */
4076da6c28aaSamw 	struct cred *cr,		/* user credentials */
4077da6c28aaSamw 	caller_context_t *ct,
4078da6c28aaSamw 	int flags)
40797c478bd9Sstevel@tonic-gate {
40807c478bd9Sstevel@tonic-gate 	struct inode *ip, *dip = VTOI(dvp);
40817c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = dip->i_ufsvfs;
40827c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
40837c478bd9Sstevel@tonic-gate 	int error;
40847c478bd9Sstevel@tonic-gate 	int issync;
40857c478bd9Sstevel@tonic-gate 	int trans_size;
40867c478bd9Sstevel@tonic-gate 	int residual;
40877c478bd9Sstevel@tonic-gate 	int ioflag;
40887c478bd9Sstevel@tonic-gate 	int retry = 1;
40897c478bd9Sstevel@tonic-gate 
40907c478bd9Sstevel@tonic-gate 	/*
40917c478bd9Sstevel@tonic-gate 	 * No symlinks in attrdirs at this time
40927c478bd9Sstevel@tonic-gate 	 */
40937c478bd9Sstevel@tonic-gate 	if ((VTOI(dvp)->i_mode & IFMT) == IFATTRDIR)
40947c478bd9Sstevel@tonic-gate 		return (EINVAL);
40957c478bd9Sstevel@tonic-gate 
40967c478bd9Sstevel@tonic-gate again:
40977c478bd9Sstevel@tonic-gate 	ip = (struct inode *)NULL;
40987c478bd9Sstevel@tonic-gate 	vap->va_type = VLNK;
40997c478bd9Sstevel@tonic-gate 	vap->va_rdev = 0;
41007c478bd9Sstevel@tonic-gate 
41017c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SYMLINK_MASK);
41027c478bd9Sstevel@tonic-gate 	if (error)
41037c478bd9Sstevel@tonic-gate 		goto out;
41047c478bd9Sstevel@tonic-gate 
41057c478bd9Sstevel@tonic-gate 	if (ulp)
41067c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_SYMLINK,
41077c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_SYMLINK_SIZE(dip));
41087c478bd9Sstevel@tonic-gate 
41097c478bd9Sstevel@tonic-gate 	/*
41107c478bd9Sstevel@tonic-gate 	 * We must create the inode before the directory entry, to avoid
41117c478bd9Sstevel@tonic-gate 	 * racing with readlink().  ufs_dirmakeinode requires that we
41127c478bd9Sstevel@tonic-gate 	 * hold the quota lock as reader, and directory locks as writer.
41137c478bd9Sstevel@tonic-gate 	 */
41147c478bd9Sstevel@tonic-gate 
41157c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_rwlock, RW_WRITER);
41167c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
41177c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_contents, RW_WRITER);
41187c478bd9Sstevel@tonic-gate 
41197c478bd9Sstevel@tonic-gate 	/*
41207c478bd9Sstevel@tonic-gate 	 * Suppress any out of inodes messages if we will retry on
41217c478bd9Sstevel@tonic-gate 	 * ENOSP
41227c478bd9Sstevel@tonic-gate 	 */
41237c478bd9Sstevel@tonic-gate 	if (retry)
41247c478bd9Sstevel@tonic-gate 		dip->i_flag |= IQUIET;
41257c478bd9Sstevel@tonic-gate 
41267c478bd9Sstevel@tonic-gate 	error = ufs_dirmakeinode(dip, &ip, vap, DE_SYMLINK, cr);
41277c478bd9Sstevel@tonic-gate 
41287c478bd9Sstevel@tonic-gate 	dip->i_flag &= ~IQUIET;
41297c478bd9Sstevel@tonic-gate 
41307c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_contents);
41317c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
41327c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_rwlock);
41337c478bd9Sstevel@tonic-gate 
41347c478bd9Sstevel@tonic-gate 	if (error)
41357c478bd9Sstevel@tonic-gate 		goto unlock;
41367c478bd9Sstevel@tonic-gate 
41377c478bd9Sstevel@tonic-gate 	/*
41387c478bd9Sstevel@tonic-gate 	 * OK.  The inode has been created.  Write out the data of the
41397c478bd9Sstevel@tonic-gate 	 * symbolic link.  Since symbolic links are metadata, and should
41407c478bd9Sstevel@tonic-gate 	 * remain consistent across a system crash, we need to force the
41417c478bd9Sstevel@tonic-gate 	 * data out synchronously.
41427c478bd9Sstevel@tonic-gate 	 *
41437c478bd9Sstevel@tonic-gate 	 * (This is a change from the semantics in earlier releases, which
41447c478bd9Sstevel@tonic-gate 	 * only created symbolic links synchronously if the semi-documented
41457c478bd9Sstevel@tonic-gate 	 * 'syncdir' option was set, or if we were being invoked by the NFS
41467c478bd9Sstevel@tonic-gate 	 * server, which requires symbolic links to be created synchronously.)
41477c478bd9Sstevel@tonic-gate 	 *
41487c478bd9Sstevel@tonic-gate 	 * We need to pass in a pointer for the residual length; otherwise
41497c478bd9Sstevel@tonic-gate 	 * ufs_rdwri() will always return EIO if it can't write the data,
41507c478bd9Sstevel@tonic-gate 	 * even if the error was really ENOSPC or EDQUOT.
41517c478bd9Sstevel@tonic-gate 	 */
41527c478bd9Sstevel@tonic-gate 
41537c478bd9Sstevel@tonic-gate 	ioflag = FWRITE | FDSYNC;
41547c478bd9Sstevel@tonic-gate 	residual = 0;
41557c478bd9Sstevel@tonic-gate 
41567c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
41577c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
41587c478bd9Sstevel@tonic-gate 
41597c478bd9Sstevel@tonic-gate 	/*
41607c478bd9Sstevel@tonic-gate 	 * Suppress file system full messages if we will retry
41617c478bd9Sstevel@tonic-gate 	 */
41627c478bd9Sstevel@tonic-gate 	if (retry)
41637c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
41647c478bd9Sstevel@tonic-gate 
41657c478bd9Sstevel@tonic-gate 	error = ufs_rdwri(UIO_WRITE, ioflag, ip, target, strlen(target),
41667c478bd9Sstevel@tonic-gate 	    (offset_t)0, UIO_SYSSPACE, &residual, cr);
41677c478bd9Sstevel@tonic-gate 
41687c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
41697c478bd9Sstevel@tonic-gate 
41707c478bd9Sstevel@tonic-gate 	if (error) {
41717c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
41727c478bd9Sstevel@tonic-gate 		rw_exit(&ufsvfsp->vfs_dqrwlock);
41737c478bd9Sstevel@tonic-gate 		goto remove;
41747c478bd9Sstevel@tonic-gate 	}
41757c478bd9Sstevel@tonic-gate 
41767c478bd9Sstevel@tonic-gate 	/*
41777c478bd9Sstevel@tonic-gate 	 * If the link's data is small enough, we can cache it in the inode.
41787c478bd9Sstevel@tonic-gate 	 * This is a "fast symbolic link".  We don't use the first direct
41797c478bd9Sstevel@tonic-gate 	 * block because that's actually used to point at the symbolic link's
41807c478bd9Sstevel@tonic-gate 	 * contents on disk; but we know that none of the other direct or
41817c478bd9Sstevel@tonic-gate 	 * indirect blocks can be used because symbolic links are restricted
41827c478bd9Sstevel@tonic-gate 	 * to be smaller than a file system block.
41837c478bd9Sstevel@tonic-gate 	 */
41847c478bd9Sstevel@tonic-gate 
41857c478bd9Sstevel@tonic-gate 	ASSERT(MAXPATHLEN <= VBSIZE(ITOV(ip)));
41867c478bd9Sstevel@tonic-gate 
41877c478bd9Sstevel@tonic-gate 	if (ip->i_size > 0 && ip->i_size <= FSL_SIZE) {
41887c478bd9Sstevel@tonic-gate 		if (kcopy(target, &ip->i_db[1], ip->i_size) == 0) {
41897c478bd9Sstevel@tonic-gate 			ip->i_flag |= IFASTSYMLNK;
41907c478bd9Sstevel@tonic-gate 		} else {
41917c478bd9Sstevel@tonic-gate 			int i;
41927c478bd9Sstevel@tonic-gate 			/* error, clear garbage left behind */
41937c478bd9Sstevel@tonic-gate 			for (i = 1; i < NDADDR; i++)
41947c478bd9Sstevel@tonic-gate 				ip->i_db[i] = 0;
41957c478bd9Sstevel@tonic-gate 			for (i = 0; i < NIADDR; i++)
41967c478bd9Sstevel@tonic-gate 				ip->i_ib[i] = 0;
41977c478bd9Sstevel@tonic-gate 		}
41987c478bd9Sstevel@tonic-gate 	}
41997c478bd9Sstevel@tonic-gate 
42007c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
42017c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
42027c478bd9Sstevel@tonic-gate 
42037c478bd9Sstevel@tonic-gate 	/*
42047c478bd9Sstevel@tonic-gate 	 * OK.  We've successfully created the symbolic link.  All that
42057c478bd9Sstevel@tonic-gate 	 * remains is to insert it into the appropriate directory.
42067c478bd9Sstevel@tonic-gate 	 */
42077c478bd9Sstevel@tonic-gate 
42087c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_rwlock, RW_WRITER);
42097c478bd9Sstevel@tonic-gate 	error = ufs_direnter_lr(dip, linkname, DE_SYMLINK, NULL, ip, cr, NULL);
42107c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_rwlock);
42117c478bd9Sstevel@tonic-gate 
42127c478bd9Sstevel@tonic-gate 	/*
42137c478bd9Sstevel@tonic-gate 	 * Fall through into remove-on-error code.  We're either done, or we
42147c478bd9Sstevel@tonic-gate 	 * need to remove the inode (if we couldn't insert it).
42157c478bd9Sstevel@tonic-gate 	 */
42167c478bd9Sstevel@tonic-gate 
42177c478bd9Sstevel@tonic-gate remove:
42187c478bd9Sstevel@tonic-gate 	if (error && (ip != NULL)) {
42197c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
42207c478bd9Sstevel@tonic-gate 		ip->i_nlink--;
42217c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
42227c478bd9Sstevel@tonic-gate 		ip->i_seq++;
42237c478bd9Sstevel@tonic-gate 		ufs_setreclaim(ip);
42247c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
42257c478bd9Sstevel@tonic-gate 	}
42267c478bd9Sstevel@tonic-gate 
42277c478bd9Sstevel@tonic-gate unlock:
42287c478bd9Sstevel@tonic-gate 	if (ip != NULL)
42297c478bd9Sstevel@tonic-gate 		VN_RELE(ITOV(ip));
42307c478bd9Sstevel@tonic-gate 
42317c478bd9Sstevel@tonic-gate 	if (ulp) {
42327c478bd9Sstevel@tonic-gate 		int terr = 0;
42337c478bd9Sstevel@tonic-gate 
42347c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_SYMLINK,
423580d34432Sfrankho 		    trans_size);
42367c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
42377c478bd9Sstevel@tonic-gate 		if (error == 0)
42387c478bd9Sstevel@tonic-gate 			error = terr;
42397c478bd9Sstevel@tonic-gate 	}
42407c478bd9Sstevel@tonic-gate 
42417c478bd9Sstevel@tonic-gate 	/*
42427c478bd9Sstevel@tonic-gate 	 * We may have failed due to lack of an inode or of a block to
42437c478bd9Sstevel@tonic-gate 	 * store the target in.  Try flushing the delete queue to free
42447c478bd9Sstevel@tonic-gate 	 * logically-available things up and try again.
42457c478bd9Sstevel@tonic-gate 	 */
42467c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
42477c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
42487c478bd9Sstevel@tonic-gate 		retry = 0;
42497c478bd9Sstevel@tonic-gate 		goto again;
42507c478bd9Sstevel@tonic-gate 	}
42517c478bd9Sstevel@tonic-gate 
42527c478bd9Sstevel@tonic-gate out:
42537c478bd9Sstevel@tonic-gate 	return (error);
42547c478bd9Sstevel@tonic-gate }
42557c478bd9Sstevel@tonic-gate 
42567c478bd9Sstevel@tonic-gate /*
42577c478bd9Sstevel@tonic-gate  * Ufs specific routine used to do ufs io.
42587c478bd9Sstevel@tonic-gate  */
42597c478bd9Sstevel@tonic-gate int
42607c478bd9Sstevel@tonic-gate ufs_rdwri(enum uio_rw rw, int ioflag, struct inode *ip, caddr_t base,
42617c478bd9Sstevel@tonic-gate 	ssize_t len, offset_t offset, enum uio_seg seg, int *aresid,
42627c478bd9Sstevel@tonic-gate 	struct cred *cr)
42637c478bd9Sstevel@tonic-gate {
42647c478bd9Sstevel@tonic-gate 	struct uio auio;
42657c478bd9Sstevel@tonic-gate 	struct iovec aiov;
42667c478bd9Sstevel@tonic-gate 	int error;
42677c478bd9Sstevel@tonic-gate 
42687c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
42697c478bd9Sstevel@tonic-gate 
42707c478bd9Sstevel@tonic-gate 	bzero((caddr_t)&auio, sizeof (uio_t));
42717c478bd9Sstevel@tonic-gate 	bzero((caddr_t)&aiov, sizeof (iovec_t));
42727c478bd9Sstevel@tonic-gate 
42737c478bd9Sstevel@tonic-gate 	aiov.iov_base = base;
42747c478bd9Sstevel@tonic-gate 	aiov.iov_len = len;
42757c478bd9Sstevel@tonic-gate 	auio.uio_iov = &aiov;
42767c478bd9Sstevel@tonic-gate 	auio.uio_iovcnt = 1;
42777c478bd9Sstevel@tonic-gate 	auio.uio_loffset = offset;
42787c478bd9Sstevel@tonic-gate 	auio.uio_segflg = (short)seg;
42797c478bd9Sstevel@tonic-gate 	auio.uio_resid = len;
42807c478bd9Sstevel@tonic-gate 
42817c478bd9Sstevel@tonic-gate 	if (rw == UIO_WRITE) {
42827c478bd9Sstevel@tonic-gate 		auio.uio_fmode = FWRITE;
42837c478bd9Sstevel@tonic-gate 		auio.uio_extflg = UIO_COPY_DEFAULT;
42847c478bd9Sstevel@tonic-gate 		auio.uio_llimit = curproc->p_fsz_ctl;
42857c478bd9Sstevel@tonic-gate 		error = wrip(ip, &auio, ioflag, cr);
42867c478bd9Sstevel@tonic-gate 	} else {
42877c478bd9Sstevel@tonic-gate 		auio.uio_fmode = FREAD;
42887c478bd9Sstevel@tonic-gate 		auio.uio_extflg = UIO_COPY_CACHED;
42897c478bd9Sstevel@tonic-gate 		auio.uio_llimit = MAXOFFSET_T;
42907c478bd9Sstevel@tonic-gate 		error = rdip(ip, &auio, ioflag, cr);
42917c478bd9Sstevel@tonic-gate 	}
42927c478bd9Sstevel@tonic-gate 
42937c478bd9Sstevel@tonic-gate 	if (aresid) {
42947c478bd9Sstevel@tonic-gate 		*aresid = auio.uio_resid;
42957c478bd9Sstevel@tonic-gate 	} else if (auio.uio_resid) {
42967c478bd9Sstevel@tonic-gate 		error = EIO;
42977c478bd9Sstevel@tonic-gate 	}
42987c478bd9Sstevel@tonic-gate 	return (error);
42997c478bd9Sstevel@tonic-gate }
43007c478bd9Sstevel@tonic-gate 
4301da6c28aaSamw /*ARGSUSED*/
43027c478bd9Sstevel@tonic-gate static int
4303da6c28aaSamw ufs_fid(struct vnode *vp, struct fid *fidp, caller_context_t *ct)
43047c478bd9Sstevel@tonic-gate {
43057c478bd9Sstevel@tonic-gate 	struct ufid *ufid;
43067c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
43077c478bd9Sstevel@tonic-gate 
43087c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
43097c478bd9Sstevel@tonic-gate 		return (EIO);
43107c478bd9Sstevel@tonic-gate 
43117c478bd9Sstevel@tonic-gate 	if (fidp->fid_len < (sizeof (struct ufid) - sizeof (ushort_t))) {
43127c478bd9Sstevel@tonic-gate 		fidp->fid_len = sizeof (struct ufid) - sizeof (ushort_t);
43137c478bd9Sstevel@tonic-gate 		return (ENOSPC);
43147c478bd9Sstevel@tonic-gate 	}
43157c478bd9Sstevel@tonic-gate 
43167c478bd9Sstevel@tonic-gate 	ufid = (struct ufid *)fidp;
43177c478bd9Sstevel@tonic-gate 	bzero((char *)ufid, sizeof (struct ufid));
43187c478bd9Sstevel@tonic-gate 	ufid->ufid_len = sizeof (struct ufid) - sizeof (ushort_t);
43197c478bd9Sstevel@tonic-gate 	ufid->ufid_ino = ip->i_number;
43207c478bd9Sstevel@tonic-gate 	ufid->ufid_gen = ip->i_gen;
43217c478bd9Sstevel@tonic-gate 
43227c478bd9Sstevel@tonic-gate 	return (0);
43237c478bd9Sstevel@tonic-gate }
43247c478bd9Sstevel@tonic-gate 
43257c478bd9Sstevel@tonic-gate /* ARGSUSED2 */
43267c478bd9Sstevel@tonic-gate static int
43277c478bd9Sstevel@tonic-gate ufs_rwlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
43287c478bd9Sstevel@tonic-gate {
43297c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
43307c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp;
43317c478bd9Sstevel@tonic-gate 	int		forcedirectio;
43327c478bd9Sstevel@tonic-gate 
43337c478bd9Sstevel@tonic-gate 	/*
43347c478bd9Sstevel@tonic-gate 	 * Read case is easy.
43357c478bd9Sstevel@tonic-gate 	 */
43367c478bd9Sstevel@tonic-gate 	if (!write_lock) {
43377c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
43387c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_FALSE);
43397c478bd9Sstevel@tonic-gate 	}
43407c478bd9Sstevel@tonic-gate 
43417c478bd9Sstevel@tonic-gate 	/*
43427c478bd9Sstevel@tonic-gate 	 * Caller has requested a writer lock, but that inhibits any
43437c478bd9Sstevel@tonic-gate 	 * concurrency in the VOPs that follow. Acquire the lock shared
43447c478bd9Sstevel@tonic-gate 	 * and defer exclusive access until it is known to be needed in
43457c478bd9Sstevel@tonic-gate 	 * other VOP handlers. Some cases can be determined here.
43467c478bd9Sstevel@tonic-gate 	 */
43477c478bd9Sstevel@tonic-gate 
43487c478bd9Sstevel@tonic-gate 	/*
43497c478bd9Sstevel@tonic-gate 	 * If directio is not set, there is no chance of concurrency,
43507c478bd9Sstevel@tonic-gate 	 * so just acquire the lock exclusive. Beware of a forced
43517c478bd9Sstevel@tonic-gate 	 * unmount before looking at the mount option.
43527c478bd9Sstevel@tonic-gate 	 */
43537c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
43547c478bd9Sstevel@tonic-gate 	forcedirectio = ufsvfsp ? ufsvfsp->vfs_forcedirectio : 0;
43557c478bd9Sstevel@tonic-gate 	if (!(ip->i_flag & IDIRECTIO || forcedirectio) ||
43567c478bd9Sstevel@tonic-gate 	    !ufs_allow_shared_writes) {
43577c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43587c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43597c478bd9Sstevel@tonic-gate 	}
43607c478bd9Sstevel@tonic-gate 
43617c478bd9Sstevel@tonic-gate 	/*
43627c478bd9Sstevel@tonic-gate 	 * Mandatory locking forces acquiring i_rwlock exclusive.
43637c478bd9Sstevel@tonic-gate 	 */
43647c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
43657c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43667c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43677c478bd9Sstevel@tonic-gate 	}
43687c478bd9Sstevel@tonic-gate 
43697c478bd9Sstevel@tonic-gate 	/*
43707c478bd9Sstevel@tonic-gate 	 * Acquire the lock shared in case a concurrent write follows.
43717c478bd9Sstevel@tonic-gate 	 * Mandatory locking could have become enabled before the lock
43727c478bd9Sstevel@tonic-gate 	 * was acquired. Re-check and upgrade if needed.
43737c478bd9Sstevel@tonic-gate 	 */
43747c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_rwlock, RW_READER);
43757c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
43767c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
43777c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43787c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43797c478bd9Sstevel@tonic-gate 	}
43807c478bd9Sstevel@tonic-gate 	return (V_WRITELOCK_FALSE);
43817c478bd9Sstevel@tonic-gate }
43827c478bd9Sstevel@tonic-gate 
43837c478bd9Sstevel@tonic-gate /*ARGSUSED*/
43847c478bd9Sstevel@tonic-gate static void
43857c478bd9Sstevel@tonic-gate ufs_rwunlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
43867c478bd9Sstevel@tonic-gate {
43877c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
43887c478bd9Sstevel@tonic-gate 
43897c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
43907c478bd9Sstevel@tonic-gate }
43917c478bd9Sstevel@tonic-gate 
43927c478bd9Sstevel@tonic-gate /* ARGSUSED */
43937c478bd9Sstevel@tonic-gate static int
4394da6c28aaSamw ufs_seek(struct vnode *vp, offset_t ooff, offset_t *noffp,
4395da6c28aaSamw 	caller_context_t *ct)
43967c478bd9Sstevel@tonic-gate {
43977c478bd9Sstevel@tonic-gate 	return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
43987c478bd9Sstevel@tonic-gate }
43997c478bd9Sstevel@tonic-gate 
44007c478bd9Sstevel@tonic-gate /* ARGSUSED */
44017c478bd9Sstevel@tonic-gate static int
44027c478bd9Sstevel@tonic-gate ufs_frlock(struct vnode *vp, int cmd, struct flock64 *bfp, int flag,
4403da6c28aaSamw 	offset_t offset, struct flk_callback *flk_cbp, struct cred *cr,
4404da6c28aaSamw 	caller_context_t *ct)
44057c478bd9Sstevel@tonic-gate {
44067c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
44077c478bd9Sstevel@tonic-gate 
44087c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
44097c478bd9Sstevel@tonic-gate 		return (EIO);
44107c478bd9Sstevel@tonic-gate 
44117c478bd9Sstevel@tonic-gate 	/*
44127c478bd9Sstevel@tonic-gate 	 * If file is being mapped, disallow frlock.
44137c478bd9Sstevel@tonic-gate 	 * XXX I am not holding tlock while checking i_mapcnt because the
44147c478bd9Sstevel@tonic-gate 	 * current locking strategy drops all locks before calling fs_frlock.
44157c478bd9Sstevel@tonic-gate 	 * So, mapcnt could change before we enter fs_frlock making is
44167c478bd9Sstevel@tonic-gate 	 * meaningless to have held tlock in the first place.
44177c478bd9Sstevel@tonic-gate 	 */
44187c478bd9Sstevel@tonic-gate 	if (ip->i_mapcnt > 0 && MANDLOCK(vp, ip->i_mode))
44197c478bd9Sstevel@tonic-gate 		return (EAGAIN);
4420da6c28aaSamw 	return (fs_frlock(vp, cmd, bfp, flag, offset, flk_cbp, cr, ct));
44217c478bd9Sstevel@tonic-gate }
44227c478bd9Sstevel@tonic-gate 
44237c478bd9Sstevel@tonic-gate /* ARGSUSED */
44247c478bd9Sstevel@tonic-gate static int
4425303bf60bSsdebnath ufs_space(struct vnode *vp, int cmd, struct flock64 *bfp, int flag,
4426303bf60bSsdebnath 	offset_t offset, cred_t *cr, caller_context_t *ct)
44277c478bd9Sstevel@tonic-gate {
4428303bf60bSsdebnath 	struct ufsvfs *ufsvfsp = VTOI(vp)->i_ufsvfs;
44297c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
44307c478bd9Sstevel@tonic-gate 	int error;
44317c478bd9Sstevel@tonic-gate 
4432303bf60bSsdebnath 	if ((error = convoff(vp, bfp, 0, offset)) == 0) {
4433303bf60bSsdebnath 		if (cmd == F_FREESP) {
4434303bf60bSsdebnath 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
4435303bf60bSsdebnath 			    ULOCKFS_SPACE_MASK);
4436303bf60bSsdebnath 			if (error)
4437303bf60bSsdebnath 				return (error);
4438303bf60bSsdebnath 			error = ufs_freesp(vp, bfp, flag, cr);
4439303bf60bSsdebnath 		} else if (cmd == F_ALLOCSP) {
4440303bf60bSsdebnath 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
4441303bf60bSsdebnath 			    ULOCKFS_FALLOCATE_MASK);
4442303bf60bSsdebnath 			if (error)
4443303bf60bSsdebnath 				return (error);
4444303bf60bSsdebnath 			error = ufs_allocsp(vp, bfp, cr);
4445303bf60bSsdebnath 		} else
4446303bf60bSsdebnath 			return (EINVAL); /* Command not handled here */
44477c478bd9Sstevel@tonic-gate 
4448303bf60bSsdebnath 		if (ulp)
4449303bf60bSsdebnath 			ufs_lockfs_end(ulp);
44507c478bd9Sstevel@tonic-gate 
4451303bf60bSsdebnath 	}
44527c478bd9Sstevel@tonic-gate 	return (error);
44537c478bd9Sstevel@tonic-gate }
44547c478bd9Sstevel@tonic-gate 
44557c478bd9Sstevel@tonic-gate /*
44567c478bd9Sstevel@tonic-gate  * Used to determine if read ahead should be done. Also used to
44577c478bd9Sstevel@tonic-gate  * to determine when write back occurs.
44587c478bd9Sstevel@tonic-gate  */
44597c478bd9Sstevel@tonic-gate #define	CLUSTSZ(ip)		((ip)->i_ufsvfs->vfs_ioclustsz)
44607c478bd9Sstevel@tonic-gate 
44617c478bd9Sstevel@tonic-gate /*
44627c478bd9Sstevel@tonic-gate  * A faster version of ufs_getpage.
44637c478bd9Sstevel@tonic-gate  *
44647c478bd9Sstevel@tonic-gate  * We optimize by inlining the pvn_getpages iterator, eliminating
44657c478bd9Sstevel@tonic-gate  * calls to bmap_read if file doesn't have UFS holes, and avoiding
44667c478bd9Sstevel@tonic-gate  * the overhead of page_exists().
44677c478bd9Sstevel@tonic-gate  *
44687c478bd9Sstevel@tonic-gate  * When files has UFS_HOLES and ufs_getpage is called with S_READ,
44697c478bd9Sstevel@tonic-gate  * we set *protp to PROT_READ to avoid calling bmap_read. This approach
44707c478bd9Sstevel@tonic-gate  * victimizes performance when a file with UFS holes is faulted
44717c478bd9Sstevel@tonic-gate  * first in the S_READ mode, and then in the S_WRITE mode. We will get
44727c478bd9Sstevel@tonic-gate  * two MMU faults in this case.
44737c478bd9Sstevel@tonic-gate  *
44747c478bd9Sstevel@tonic-gate  * XXX - the inode fields which control the sequential mode are not
44757c478bd9Sstevel@tonic-gate  *	 protected by any mutex. The read ahead will act wild if
44767c478bd9Sstevel@tonic-gate  *	 multiple processes will access the file concurrently and
44777c478bd9Sstevel@tonic-gate  *	 some of them in sequential mode. One particulary bad case
44787c478bd9Sstevel@tonic-gate  *	 is if another thread will change the value of i_nextrio between
44797c478bd9Sstevel@tonic-gate  *	 the time this thread tests the i_nextrio value and then reads it
44807c478bd9Sstevel@tonic-gate  *	 again to use it as the offset for the read ahead.
44817c478bd9Sstevel@tonic-gate  */
4482da6c28aaSamw /*ARGSUSED*/
44837c478bd9Sstevel@tonic-gate static int
44847c478bd9Sstevel@tonic-gate ufs_getpage(struct vnode *vp, offset_t off, size_t len, uint_t *protp,
44857c478bd9Sstevel@tonic-gate 	page_t *plarr[], size_t plsz, struct seg *seg, caddr_t addr,
4486da6c28aaSamw 	enum seg_rw rw, struct cred *cr, caller_context_t *ct)
44877c478bd9Sstevel@tonic-gate {
44887c478bd9Sstevel@tonic-gate 	u_offset_t	uoff = (u_offset_t)off; /* type conversion */
44897c478bd9Sstevel@tonic-gate 	u_offset_t	pgoff;
44907c478bd9Sstevel@tonic-gate 	u_offset_t	eoff;
44917c478bd9Sstevel@tonic-gate 	struct inode 	*ip = VTOI(vp);
44927c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = ip->i_ufsvfs;
44937c478bd9Sstevel@tonic-gate 	struct fs 	*fs;
44947c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
44957c478bd9Sstevel@tonic-gate 	page_t		**pl;
44967c478bd9Sstevel@tonic-gate 	caddr_t		pgaddr;
44977c478bd9Sstevel@tonic-gate 	krw_t		rwtype;
44987c478bd9Sstevel@tonic-gate 	int 		err;
44997c478bd9Sstevel@tonic-gate 	int		has_holes;
45007c478bd9Sstevel@tonic-gate 	int		beyond_eof;
45017c478bd9Sstevel@tonic-gate 	int		seqmode;
45027c478bd9Sstevel@tonic-gate 	int		pgsize = PAGESIZE;
45037c478bd9Sstevel@tonic-gate 	int		dolock;
45047c478bd9Sstevel@tonic-gate 	int		do_qlock;
45057c478bd9Sstevel@tonic-gate 	int		trans_size;
45067c478bd9Sstevel@tonic-gate 
45077c478bd9Sstevel@tonic-gate 	ASSERT((uoff & PAGEOFFSET) == 0);
45087c478bd9Sstevel@tonic-gate 
45097c478bd9Sstevel@tonic-gate 	if (protp)
45107c478bd9Sstevel@tonic-gate 		*protp = PROT_ALL;
45117c478bd9Sstevel@tonic-gate 
45127c478bd9Sstevel@tonic-gate 	/*
45137c478bd9Sstevel@tonic-gate 	 * Obey the lockfs protocol
45147c478bd9Sstevel@tonic-gate 	 */
45157c478bd9Sstevel@tonic-gate 	err = ufs_lockfs_begin_getpage(ufsvfsp, &ulp, seg,
451680d34432Sfrankho 	    rw == S_READ || rw == S_EXEC, protp);
45177c478bd9Sstevel@tonic-gate 	if (err)
45187c478bd9Sstevel@tonic-gate 		goto out;
45197c478bd9Sstevel@tonic-gate 
45207c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
45217c478bd9Sstevel@tonic-gate 
45227c478bd9Sstevel@tonic-gate 	if (ulp && (rw == S_CREATE || rw == S_WRITE) &&
45237c478bd9Sstevel@tonic-gate 	    !(vp->v_flag & VISSWAP)) {
45247c478bd9Sstevel@tonic-gate 		/*
45257c478bd9Sstevel@tonic-gate 		 * Try to start a transaction, will return if blocking is
45267c478bd9Sstevel@tonic-gate 		 * expected to occur and the address space is not the
45277c478bd9Sstevel@tonic-gate 		 * kernel address space.
45287c478bd9Sstevel@tonic-gate 		 */
45297c478bd9Sstevel@tonic-gate 		trans_size = TOP_GETPAGE_SIZE(ip);
45307c478bd9Sstevel@tonic-gate 		if (seg->s_as != &kas) {
45317c478bd9Sstevel@tonic-gate 			TRANS_TRY_BEGIN_ASYNC(ufsvfsp, TOP_GETPAGE,
453280d34432Sfrankho 			    trans_size, err)
45337c478bd9Sstevel@tonic-gate 			if (err == EWOULDBLOCK) {
45347c478bd9Sstevel@tonic-gate 				/*
45357c478bd9Sstevel@tonic-gate 				 * Use EDEADLK here because the VM code
45367c478bd9Sstevel@tonic-gate 				 * can normally never see this error.
45377c478bd9Sstevel@tonic-gate 				 */
45387c478bd9Sstevel@tonic-gate 				err = EDEADLK;
45397c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
45407c478bd9Sstevel@tonic-gate 				goto out;
45417c478bd9Sstevel@tonic-gate 			}
45427c478bd9Sstevel@tonic-gate 		} else {
45437c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_GETPAGE, trans_size);
45447c478bd9Sstevel@tonic-gate 		}
45457c478bd9Sstevel@tonic-gate 	}
45467c478bd9Sstevel@tonic-gate 
45477c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
45487c478bd9Sstevel@tonic-gate 		err = ENOSYS;
45497c478bd9Sstevel@tonic-gate 		goto unlock;
45507c478bd9Sstevel@tonic-gate 	}
45517c478bd9Sstevel@tonic-gate 
45527c478bd9Sstevel@tonic-gate 	seqmode = ip->i_nextr == uoff && rw != S_CREATE;
45537c478bd9Sstevel@tonic-gate 
45547c478bd9Sstevel@tonic-gate 	rwtype = RW_READER;		/* start as a reader */
45557c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
45567c478bd9Sstevel@tonic-gate 	/*
45577c478bd9Sstevel@tonic-gate 	 * If this thread owns the lock, i.e., this thread grabbed it
45587c478bd9Sstevel@tonic-gate 	 * as writer somewhere above, then we don't need to grab the
45597c478bd9Sstevel@tonic-gate 	 * lock as reader in this routine.
45607c478bd9Sstevel@tonic-gate 	 */
45617c478bd9Sstevel@tonic-gate 	do_qlock = (rw_owner(&ufsvfsp->vfs_dqrwlock) != curthread);
45627c478bd9Sstevel@tonic-gate 
45637c478bd9Sstevel@tonic-gate retrylock:
45647c478bd9Sstevel@tonic-gate 	if (dolock) {
45657c478bd9Sstevel@tonic-gate 		/*
45667c478bd9Sstevel@tonic-gate 		 * Grab the quota lock if we need to call
45677c478bd9Sstevel@tonic-gate 		 * bmap_write() below (with i_contents as writer).
45687c478bd9Sstevel@tonic-gate 		 */
45697c478bd9Sstevel@tonic-gate 		if (do_qlock && rwtype == RW_WRITER)
45707c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
45717c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, rwtype);
45727c478bd9Sstevel@tonic-gate 	}
45737c478bd9Sstevel@tonic-gate 
45747c478bd9Sstevel@tonic-gate 	/*
45757c478bd9Sstevel@tonic-gate 	 * We may be getting called as a side effect of a bmap using
45767c478bd9Sstevel@tonic-gate 	 * fbread() when the blocks might be being allocated and the
45777c478bd9Sstevel@tonic-gate 	 * size has not yet been up'ed.  In this case we want to be
45787c478bd9Sstevel@tonic-gate 	 * able to return zero pages if we get back UFS_HOLE from
45797c478bd9Sstevel@tonic-gate 	 * calling bmap for a non write case here.  We also might have
45807c478bd9Sstevel@tonic-gate 	 * to read some frags from the disk into a page if we are
45817c478bd9Sstevel@tonic-gate 	 * extending the number of frags for a given lbn in bmap().
45827c478bd9Sstevel@tonic-gate 	 * Large Files: The read of i_size here is atomic because
45837c478bd9Sstevel@tonic-gate 	 * i_contents is held here. If dolock is zero, the lock
45847c478bd9Sstevel@tonic-gate 	 * is held in bmap routines.
45857c478bd9Sstevel@tonic-gate 	 */
4586120107ddSmc 	beyond_eof = uoff + len >
4587bcfec3c7Smc 	    P2ROUNDUP_TYPED(ip->i_size, PAGESIZE, u_offset_t);
45887c478bd9Sstevel@tonic-gate 	if (beyond_eof && seg != segkmap) {
45897c478bd9Sstevel@tonic-gate 		if (dolock) {
45907c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
45917c478bd9Sstevel@tonic-gate 			if (do_qlock && rwtype == RW_WRITER)
45927c478bd9Sstevel@tonic-gate 				rw_exit(&ufsvfsp->vfs_dqrwlock);
45937c478bd9Sstevel@tonic-gate 		}
45947c478bd9Sstevel@tonic-gate 		err = EFAULT;
45957c478bd9Sstevel@tonic-gate 		goto unlock;
45967c478bd9Sstevel@tonic-gate 	}
45977c478bd9Sstevel@tonic-gate 
45987c478bd9Sstevel@tonic-gate 	/*
45997c478bd9Sstevel@tonic-gate 	 * Must hold i_contents lock throughout the call to pvn_getpages
46007c478bd9Sstevel@tonic-gate 	 * since locked pages are returned from each call to ufs_getapage.
46017c478bd9Sstevel@tonic-gate 	 * Must *not* return locked pages and then try for contents lock
46027c478bd9Sstevel@tonic-gate 	 * due to lock ordering requirements (inode > page)
46037c478bd9Sstevel@tonic-gate 	 */
46047c478bd9Sstevel@tonic-gate 
46057c478bd9Sstevel@tonic-gate 	has_holes = bmap_has_holes(ip);
46067c478bd9Sstevel@tonic-gate 
46077c478bd9Sstevel@tonic-gate 	if ((rw == S_WRITE || rw == S_CREATE) && has_holes && !beyond_eof) {
46087c478bd9Sstevel@tonic-gate 		int	blk_size;
46097c478bd9Sstevel@tonic-gate 		u_offset_t offset;
46107c478bd9Sstevel@tonic-gate 
46117c478bd9Sstevel@tonic-gate 		/*
46127c478bd9Sstevel@tonic-gate 		 * We must acquire the RW_WRITER lock in order to
46137c478bd9Sstevel@tonic-gate 		 * call bmap_write().
46147c478bd9Sstevel@tonic-gate 		 */
46157c478bd9Sstevel@tonic-gate 		if (dolock && rwtype == RW_READER) {
46167c478bd9Sstevel@tonic-gate 			rwtype = RW_WRITER;
46177c478bd9Sstevel@tonic-gate 
46187c478bd9Sstevel@tonic-gate 			/*
46197c478bd9Sstevel@tonic-gate 			 * Grab the quota lock before
46207c478bd9Sstevel@tonic-gate 			 * upgrading i_contents, but if we can't grab it
46217c478bd9Sstevel@tonic-gate 			 * don't wait here due to lock order:
46227c478bd9Sstevel@tonic-gate 			 * vfs_dqrwlock > i_contents.
46237c478bd9Sstevel@tonic-gate 			 */
462480d34432Sfrankho 			if (do_qlock &&
462580d34432Sfrankho 			    rw_tryenter(&ufsvfsp->vfs_dqrwlock, RW_READER)
462680d34432Sfrankho 			    == 0) {
46277c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
46287c478bd9Sstevel@tonic-gate 				goto retrylock;
46297c478bd9Sstevel@tonic-gate 			}
46307c478bd9Sstevel@tonic-gate 			if (!rw_tryupgrade(&ip->i_contents)) {
46317c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
46327c478bd9Sstevel@tonic-gate 				if (do_qlock)
46337c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
46347c478bd9Sstevel@tonic-gate 				goto retrylock;
46357c478bd9Sstevel@tonic-gate 			}
46367c478bd9Sstevel@tonic-gate 		}
46377c478bd9Sstevel@tonic-gate 
46387c478bd9Sstevel@tonic-gate 		/*
46397c478bd9Sstevel@tonic-gate 		 * May be allocating disk blocks for holes here as
46407c478bd9Sstevel@tonic-gate 		 * a result of mmap faults. write(2) does the bmap_write
46417c478bd9Sstevel@tonic-gate 		 * in rdip/wrip, not here. We are not dealing with frags
46427c478bd9Sstevel@tonic-gate 		 * in this case.
46437c478bd9Sstevel@tonic-gate 		 */
46447c478bd9Sstevel@tonic-gate 		/*
46457c478bd9Sstevel@tonic-gate 		 * Large Files: We cast fs_bmask field to offset_t
46467c478bd9Sstevel@tonic-gate 		 * just as we do for MAXBMASK because uoff is a 64-bit
46477c478bd9Sstevel@tonic-gate 		 * data type. fs_bmask will still be a 32-bit type
46487c478bd9Sstevel@tonic-gate 		 * as we cannot change any ondisk data structures.
46497c478bd9Sstevel@tonic-gate 		 */
46507c478bd9Sstevel@tonic-gate 
46517c478bd9Sstevel@tonic-gate 		offset = uoff & (offset_t)fs->fs_bmask;
46527c478bd9Sstevel@tonic-gate 		while (offset < uoff + len) {
46537c478bd9Sstevel@tonic-gate 			blk_size = (int)blksize(fs, ip, lblkno(fs, offset));
4654303bf60bSsdebnath 			err = bmap_write(ip, offset, blk_size,
4655303bf60bSsdebnath 			    BI_NORMAL, NULL, cr);
46567c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD))
46577c478bd9Sstevel@tonic-gate 				ip->i_seq++;
46587c478bd9Sstevel@tonic-gate 			if (err)
46597c478bd9Sstevel@tonic-gate 				goto update_inode;
46607c478bd9Sstevel@tonic-gate 			offset += blk_size; /* XXX - make this contig */
46617c478bd9Sstevel@tonic-gate 		}
46627c478bd9Sstevel@tonic-gate 	}
46637c478bd9Sstevel@tonic-gate 
46647c478bd9Sstevel@tonic-gate 	/*
46657c478bd9Sstevel@tonic-gate 	 * Can be a reader from now on.
46667c478bd9Sstevel@tonic-gate 	 */
46677c478bd9Sstevel@tonic-gate 	if (dolock && rwtype == RW_WRITER) {
46687c478bd9Sstevel@tonic-gate 		rw_downgrade(&ip->i_contents);
46697c478bd9Sstevel@tonic-gate 		/*
46707c478bd9Sstevel@tonic-gate 		 * We can release vfs_dqrwlock early so do it, but make
46717c478bd9Sstevel@tonic-gate 		 * sure we don't try to release it again at the bottom.
46727c478bd9Sstevel@tonic-gate 		 */
46737c478bd9Sstevel@tonic-gate 		if (do_qlock) {
46747c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
46757c478bd9Sstevel@tonic-gate 			do_qlock = 0;
46767c478bd9Sstevel@tonic-gate 		}
46777c478bd9Sstevel@tonic-gate 	}
46787c478bd9Sstevel@tonic-gate 
46797c478bd9Sstevel@tonic-gate 	/*
46807c478bd9Sstevel@tonic-gate 	 * We remove PROT_WRITE in cases when the file has UFS holes
46817c478bd9Sstevel@tonic-gate 	 * because we don't  want to call bmap_read() to check each
46827c478bd9Sstevel@tonic-gate 	 * page if it is backed with a disk block.
46837c478bd9Sstevel@tonic-gate 	 */
46847c478bd9Sstevel@tonic-gate 	if (protp && has_holes && rw != S_WRITE && rw != S_CREATE)
46857c478bd9Sstevel@tonic-gate 		*protp &= ~PROT_WRITE;
46867c478bd9Sstevel@tonic-gate 
46877c478bd9Sstevel@tonic-gate 	err = 0;
46887c478bd9Sstevel@tonic-gate 
46897c478bd9Sstevel@tonic-gate 	/*
46907c478bd9Sstevel@tonic-gate 	 * The loop looks up pages in the range [off, off + len).
46917c478bd9Sstevel@tonic-gate 	 * For each page, we first check if we should initiate an asynchronous
46927c478bd9Sstevel@tonic-gate 	 * read ahead before we call page_lookup (we may sleep in page_lookup
46937c478bd9Sstevel@tonic-gate 	 * for a previously initiated disk read).
46947c478bd9Sstevel@tonic-gate 	 */
46957c478bd9Sstevel@tonic-gate 	eoff = (uoff + len);
46967c478bd9Sstevel@tonic-gate 	for (pgoff = uoff, pgaddr = addr, pl = plarr;
46977c478bd9Sstevel@tonic-gate 	    pgoff < eoff; /* empty */) {
46987c478bd9Sstevel@tonic-gate 		page_t	*pp;
46997c478bd9Sstevel@tonic-gate 		u_offset_t	nextrio;
47007c478bd9Sstevel@tonic-gate 		se_t	se;
47017c478bd9Sstevel@tonic-gate 		int retval;
47027c478bd9Sstevel@tonic-gate 
47037c478bd9Sstevel@tonic-gate 		se = ((rw == S_CREATE || rw == S_OTHER) ? SE_EXCL : SE_SHARED);
47047c478bd9Sstevel@tonic-gate 
47057c478bd9Sstevel@tonic-gate 		/* Handle async getpage (faultahead) */
47067c478bd9Sstevel@tonic-gate 		if (plarr == NULL) {
47077c478bd9Sstevel@tonic-gate 			ip->i_nextrio = pgoff;
47087c478bd9Sstevel@tonic-gate 			(void) ufs_getpage_ra(vp, pgoff, seg, pgaddr);
47097c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
47107c478bd9Sstevel@tonic-gate 			pgaddr += pgsize;
47117c478bd9Sstevel@tonic-gate 			continue;
47127c478bd9Sstevel@tonic-gate 		}
47137c478bd9Sstevel@tonic-gate 		/*
47147c478bd9Sstevel@tonic-gate 		 * Check if we should initiate read ahead of next cluster.
47157c478bd9Sstevel@tonic-gate 		 * We call page_exists only when we need to confirm that
47167c478bd9Sstevel@tonic-gate 		 * we have the current page before we initiate the read ahead.
47177c478bd9Sstevel@tonic-gate 		 */
47187c478bd9Sstevel@tonic-gate 		nextrio = ip->i_nextrio;
47197c478bd9Sstevel@tonic-gate 		if (seqmode &&
47207c478bd9Sstevel@tonic-gate 		    pgoff + CLUSTSZ(ip) >= nextrio && pgoff <= nextrio &&
47217c478bd9Sstevel@tonic-gate 		    nextrio < ip->i_size && page_exists(vp, pgoff)) {
47227c478bd9Sstevel@tonic-gate 			retval = ufs_getpage_ra(vp, pgoff, seg, pgaddr);
47237c478bd9Sstevel@tonic-gate 			/*
47247c478bd9Sstevel@tonic-gate 			 * We always read ahead the next cluster of data
47257c478bd9Sstevel@tonic-gate 			 * starting from i_nextrio. If the page (vp,nextrio)
47267c478bd9Sstevel@tonic-gate 			 * is actually in core at this point, the routine
47277c478bd9Sstevel@tonic-gate 			 * ufs_getpage_ra() will stop pre-fetching data
47287c478bd9Sstevel@tonic-gate 			 * until we read that page in a synchronized manner
47297c478bd9Sstevel@tonic-gate 			 * through ufs_getpage_miss(). So, we should increase
47307c478bd9Sstevel@tonic-gate 			 * i_nextrio if the page (vp, nextrio) exists.
47317c478bd9Sstevel@tonic-gate 			 */
47327c478bd9Sstevel@tonic-gate 			if ((retval == 0) && page_exists(vp, nextrio)) {
47337c478bd9Sstevel@tonic-gate 				ip->i_nextrio = nextrio + pgsize;
47347c478bd9Sstevel@tonic-gate 			}
47357c478bd9Sstevel@tonic-gate 		}
47367c478bd9Sstevel@tonic-gate 
47377c478bd9Sstevel@tonic-gate 		if ((pp = page_lookup(vp, pgoff, se)) != NULL) {
47387c478bd9Sstevel@tonic-gate 			/*
47397c478bd9Sstevel@tonic-gate 			 * We found the page in the page cache.
47407c478bd9Sstevel@tonic-gate 			 */
47417c478bd9Sstevel@tonic-gate 			*pl++ = pp;
47427c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
47437c478bd9Sstevel@tonic-gate 			pgaddr += pgsize;
47447c478bd9Sstevel@tonic-gate 			len -= pgsize;
47457c478bd9Sstevel@tonic-gate 			plsz -= pgsize;
47467c478bd9Sstevel@tonic-gate 		} else  {
47477c478bd9Sstevel@tonic-gate 			/*
47487c478bd9Sstevel@tonic-gate 			 * We have to create the page, or read it from disk.
47497c478bd9Sstevel@tonic-gate 			 */
47507c478bd9Sstevel@tonic-gate 			if (err = ufs_getpage_miss(vp, pgoff, len, seg, pgaddr,
47517c478bd9Sstevel@tonic-gate 			    pl, plsz, rw, seqmode))
47527c478bd9Sstevel@tonic-gate 				goto error;
47537c478bd9Sstevel@tonic-gate 
47547c478bd9Sstevel@tonic-gate 			while (*pl != NULL) {
47557c478bd9Sstevel@tonic-gate 				pl++;
47567c478bd9Sstevel@tonic-gate 				pgoff += pgsize;
47577c478bd9Sstevel@tonic-gate 				pgaddr += pgsize;
47587c478bd9Sstevel@tonic-gate 				len -= pgsize;
47597c478bd9Sstevel@tonic-gate 				plsz -= pgsize;
47607c478bd9Sstevel@tonic-gate 			}
47617c478bd9Sstevel@tonic-gate 		}
47627c478bd9Sstevel@tonic-gate 	}
47637c478bd9Sstevel@tonic-gate 
47647c478bd9Sstevel@tonic-gate 	/*
47657c478bd9Sstevel@tonic-gate 	 * Return pages up to plsz if they are in the page cache.
47667c478bd9Sstevel@tonic-gate 	 * We cannot return pages if there is a chance that they are
47677c478bd9Sstevel@tonic-gate 	 * backed with a UFS hole and rw is S_WRITE or S_CREATE.
47687c478bd9Sstevel@tonic-gate 	 */
47697c478bd9Sstevel@tonic-gate 	if (plarr && !(has_holes && (rw == S_WRITE || rw == S_CREATE))) {
47707c478bd9Sstevel@tonic-gate 
47717c478bd9Sstevel@tonic-gate 		ASSERT((protp == NULL) ||
477280d34432Sfrankho 		    !(has_holes && (*protp & PROT_WRITE)));
47737c478bd9Sstevel@tonic-gate 
47747c478bd9Sstevel@tonic-gate 		eoff = pgoff + plsz;
47757c478bd9Sstevel@tonic-gate 		while (pgoff < eoff) {
47767c478bd9Sstevel@tonic-gate 			page_t		*pp;
47777c478bd9Sstevel@tonic-gate 
47787c478bd9Sstevel@tonic-gate 			if ((pp = page_lookup_nowait(vp, pgoff,
47797c478bd9Sstevel@tonic-gate 			    SE_SHARED)) == NULL)
47807c478bd9Sstevel@tonic-gate 				break;
47817c478bd9Sstevel@tonic-gate 
47827c478bd9Sstevel@tonic-gate 			*pl++ = pp;
47837c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
47847c478bd9Sstevel@tonic-gate 			plsz -= pgsize;
47857c478bd9Sstevel@tonic-gate 		}
47867c478bd9Sstevel@tonic-gate 	}
47877c478bd9Sstevel@tonic-gate 
47887c478bd9Sstevel@tonic-gate 	if (plarr)
47897c478bd9Sstevel@tonic-gate 		*pl = NULL;			/* Terminate page list */
47907c478bd9Sstevel@tonic-gate 	ip->i_nextr = pgoff;
47917c478bd9Sstevel@tonic-gate 
47927c478bd9Sstevel@tonic-gate error:
47937c478bd9Sstevel@tonic-gate 	if (err && plarr) {
47947c478bd9Sstevel@tonic-gate 		/*
47957c478bd9Sstevel@tonic-gate 		 * Release any pages we have locked.
47967c478bd9Sstevel@tonic-gate 		 */
47977c478bd9Sstevel@tonic-gate 		while (pl > &plarr[0])
47987c478bd9Sstevel@tonic-gate 			page_unlock(*--pl);
47997c478bd9Sstevel@tonic-gate 
48007c478bd9Sstevel@tonic-gate 		plarr[0] = NULL;
48017c478bd9Sstevel@tonic-gate 	}
48027c478bd9Sstevel@tonic-gate 
48037c478bd9Sstevel@tonic-gate update_inode:
48047c478bd9Sstevel@tonic-gate 	/*
48057c478bd9Sstevel@tonic-gate 	 * If the inode is not already marked for IACC (in rdip() for read)
48067c478bd9Sstevel@tonic-gate 	 * and the inode is not marked for no access time update (in wrip()
48077c478bd9Sstevel@tonic-gate 	 * for write) then update the inode access time and mod time now.
48087c478bd9Sstevel@tonic-gate 	 */
48097c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & (IACC | INOACC)) == 0) {
48107c478bd9Sstevel@tonic-gate 		if ((rw != S_OTHER) && (ip->i_mode & IFMT) != IFDIR) {
48117c478bd9Sstevel@tonic-gate 			if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) &&
48127c478bd9Sstevel@tonic-gate 			    (fs->fs_ronly == 0) &&
48137c478bd9Sstevel@tonic-gate 			    (!ufsvfsp->vfs_noatime)) {
48147c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
48157c478bd9Sstevel@tonic-gate 				ip->i_flag |= IACC;
48167c478bd9Sstevel@tonic-gate 				ITIMES_NOLOCK(ip);
48177c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
48187c478bd9Sstevel@tonic-gate 			}
48197c478bd9Sstevel@tonic-gate 		}
48207c478bd9Sstevel@tonic-gate 	}
48217c478bd9Sstevel@tonic-gate 
48227c478bd9Sstevel@tonic-gate 	if (dolock) {
48237c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
48247c478bd9Sstevel@tonic-gate 		if (do_qlock && rwtype == RW_WRITER)
48257c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
48267c478bd9Sstevel@tonic-gate 	}
48277c478bd9Sstevel@tonic-gate 
48287c478bd9Sstevel@tonic-gate unlock:
48297c478bd9Sstevel@tonic-gate 	if (ulp) {
48307c478bd9Sstevel@tonic-gate 		if ((rw == S_CREATE || rw == S_WRITE) &&
48317c478bd9Sstevel@tonic-gate 		    !(vp->v_flag & VISSWAP)) {
48327c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_GETPAGE, trans_size);
48337c478bd9Sstevel@tonic-gate 		}
48347c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
48357c478bd9Sstevel@tonic-gate 	}
48367c478bd9Sstevel@tonic-gate out:
48377c478bd9Sstevel@tonic-gate 	return (err);
48387c478bd9Sstevel@tonic-gate }
48397c478bd9Sstevel@tonic-gate 
48407c478bd9Sstevel@tonic-gate /*
48417c478bd9Sstevel@tonic-gate  * ufs_getpage_miss is called when ufs_getpage missed the page in the page
48427c478bd9Sstevel@tonic-gate  * cache. The page is either read from the disk, or it's created.
48437c478bd9Sstevel@tonic-gate  * A page is created (without disk read) if rw == S_CREATE, or if
48447c478bd9Sstevel@tonic-gate  * the page is not backed with a real disk block (UFS hole).
48457c478bd9Sstevel@tonic-gate  */
48467c478bd9Sstevel@tonic-gate /* ARGSUSED */
48477c478bd9Sstevel@tonic-gate static int
48487c478bd9Sstevel@tonic-gate ufs_getpage_miss(struct vnode *vp, u_offset_t off, size_t len, struct seg *seg,
48497c478bd9Sstevel@tonic-gate 	caddr_t addr, page_t *pl[], size_t plsz, enum seg_rw rw, int seq)
48507c478bd9Sstevel@tonic-gate {
48517c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
48527c478bd9Sstevel@tonic-gate 	page_t		*pp;
48537c478bd9Sstevel@tonic-gate 	daddr_t		bn;
48547c478bd9Sstevel@tonic-gate 	size_t		io_len;
4855303bf60bSsdebnath 	int		crpage = 0;
48567c478bd9Sstevel@tonic-gate 	int		err;
48577c478bd9Sstevel@tonic-gate 	int		contig;
48587c478bd9Sstevel@tonic-gate 	int		bsize = ip->i_fs->fs_bsize;
48597c478bd9Sstevel@tonic-gate 
48607c478bd9Sstevel@tonic-gate 	/*
48617c478bd9Sstevel@tonic-gate 	 * Figure out whether the page can be created, or must be
48627c478bd9Sstevel@tonic-gate 	 * must be read from the disk.
48637c478bd9Sstevel@tonic-gate 	 */
48647c478bd9Sstevel@tonic-gate 	if (rw == S_CREATE)
48657c478bd9Sstevel@tonic-gate 		crpage = 1;
48667c478bd9Sstevel@tonic-gate 	else {
48677c478bd9Sstevel@tonic-gate 		contig = 0;
48687c478bd9Sstevel@tonic-gate 		if (err = bmap_read(ip, off, &bn, &contig))
48697c478bd9Sstevel@tonic-gate 			return (err);
4870303bf60bSsdebnath 
48717c478bd9Sstevel@tonic-gate 		crpage = (bn == UFS_HOLE);
4872303bf60bSsdebnath 
4873303bf60bSsdebnath 		/*
4874303bf60bSsdebnath 		 * If its also a fallocated block that hasn't been written to
4875303bf60bSsdebnath 		 * yet, we will treat it just like a UFS_HOLE and create
4876303bf60bSsdebnath 		 * a zero page for it
4877303bf60bSsdebnath 		 */
4878303bf60bSsdebnath 		if (ISFALLOCBLK(ip, bn))
4879303bf60bSsdebnath 			crpage = 1;
48807c478bd9Sstevel@tonic-gate 	}
48817c478bd9Sstevel@tonic-gate 
48827c478bd9Sstevel@tonic-gate 	if (crpage) {
48837c478bd9Sstevel@tonic-gate 		if ((pp = page_create_va(vp, off, PAGESIZE, PG_WAIT, seg,
48847c478bd9Sstevel@tonic-gate 		    addr)) == NULL) {
48857c478bd9Sstevel@tonic-gate 			return (ufs_fault(vp,
488680d34432Sfrankho 			    "ufs_getpage_miss: page_create == NULL"));
48877c478bd9Sstevel@tonic-gate 		}
48887c478bd9Sstevel@tonic-gate 
48897c478bd9Sstevel@tonic-gate 		if (rw != S_CREATE)
48907c478bd9Sstevel@tonic-gate 			pagezero(pp, 0, PAGESIZE);
4891303bf60bSsdebnath 
48927c478bd9Sstevel@tonic-gate 		io_len = PAGESIZE;
48937c478bd9Sstevel@tonic-gate 	} else {
48947c478bd9Sstevel@tonic-gate 		u_offset_t	io_off;
48957c478bd9Sstevel@tonic-gate 		uint_t	xlen;
48967c478bd9Sstevel@tonic-gate 		struct buf	*bp;
48977c478bd9Sstevel@tonic-gate 		ufsvfs_t	*ufsvfsp = ip->i_ufsvfs;
48987c478bd9Sstevel@tonic-gate 
48997c478bd9Sstevel@tonic-gate 		/*
49007c478bd9Sstevel@tonic-gate 		 * If access is not in sequential order, we read from disk
49017c478bd9Sstevel@tonic-gate 		 * in bsize units.
49027c478bd9Sstevel@tonic-gate 		 *
49037c478bd9Sstevel@tonic-gate 		 * We limit the size of the transfer to bsize if we are reading
49047c478bd9Sstevel@tonic-gate 		 * from the beginning of the file. Note in this situation we
49057c478bd9Sstevel@tonic-gate 		 * will hedge our bets and initiate an async read ahead of
49067c478bd9Sstevel@tonic-gate 		 * the second block.
49077c478bd9Sstevel@tonic-gate 		 */
49087c478bd9Sstevel@tonic-gate 		if (!seq || off == 0)
49097c478bd9Sstevel@tonic-gate 			contig = MIN(contig, bsize);
49107c478bd9Sstevel@tonic-gate 
49117c478bd9Sstevel@tonic-gate 		pp = pvn_read_kluster(vp, off, seg, addr, &io_off,
49127c478bd9Sstevel@tonic-gate 		    &io_len, off, contig, 0);
49137c478bd9Sstevel@tonic-gate 
49147c478bd9Sstevel@tonic-gate 		/*
49157c478bd9Sstevel@tonic-gate 		 * Some other thread has entered the page.
49167c478bd9Sstevel@tonic-gate 		 * ufs_getpage will retry page_lookup.
49177c478bd9Sstevel@tonic-gate 		 */
49187c478bd9Sstevel@tonic-gate 		if (pp == NULL) {
49197c478bd9Sstevel@tonic-gate 			pl[0] = NULL;
49207c478bd9Sstevel@tonic-gate 			return (0);
49217c478bd9Sstevel@tonic-gate 		}
49227c478bd9Sstevel@tonic-gate 
49237c478bd9Sstevel@tonic-gate 		/*
49247c478bd9Sstevel@tonic-gate 		 * Zero part of the page which we are not
49257c478bd9Sstevel@tonic-gate 		 * going to read from the disk.
49267c478bd9Sstevel@tonic-gate 		 */
49277c478bd9Sstevel@tonic-gate 		xlen = io_len & PAGEOFFSET;
49287c478bd9Sstevel@tonic-gate 		if (xlen != 0)
49297c478bd9Sstevel@tonic-gate 			pagezero(pp->p_prev, xlen, PAGESIZE - xlen);
49307c478bd9Sstevel@tonic-gate 
49317c478bd9Sstevel@tonic-gate 		bp = pageio_setup(pp, io_len, ip->i_devvp, B_READ);
49327c478bd9Sstevel@tonic-gate 		bp->b_edev = ip->i_dev;
49337c478bd9Sstevel@tonic-gate 		bp->b_dev = cmpdev(ip->i_dev);
49347c478bd9Sstevel@tonic-gate 		bp->b_blkno = bn;
49357c478bd9Sstevel@tonic-gate 		bp->b_un.b_addr = (caddr_t)0;
49367c478bd9Sstevel@tonic-gate 		bp->b_file = ip->i_vnode;
49377c478bd9Sstevel@tonic-gate 		bp->b_offset = off;
49387c478bd9Sstevel@tonic-gate 
49397c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
49407c478bd9Sstevel@tonic-gate 			lufs_read_strategy(ufsvfsp->vfs_log, bp);
49417c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
49427c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
49437c478bd9Sstevel@tonic-gate 		} else {
49447c478bd9Sstevel@tonic-gate 			ufsvfsp->vfs_iotstamp = lbolt;
49457c478bd9Sstevel@tonic-gate 			ub.ub_getpages.value.ul++;
49467c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
49477c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_INBLK, 1);
49487c478bd9Sstevel@tonic-gate 		}
49497c478bd9Sstevel@tonic-gate 
49507c478bd9Sstevel@tonic-gate 		ip->i_nextrio = off + ((io_len + PAGESIZE - 1) & PAGEMASK);
49517c478bd9Sstevel@tonic-gate 
49527c478bd9Sstevel@tonic-gate 		/*
49537c478bd9Sstevel@tonic-gate 		 * If the file access is sequential, initiate read ahead
49547c478bd9Sstevel@tonic-gate 		 * of the next cluster.
49557c478bd9Sstevel@tonic-gate 		 */
49567c478bd9Sstevel@tonic-gate 		if (seq && ip->i_nextrio < ip->i_size)
49577c478bd9Sstevel@tonic-gate 			(void) ufs_getpage_ra(vp, off, seg, addr);
49587c478bd9Sstevel@tonic-gate 		err = biowait(bp);
49597c478bd9Sstevel@tonic-gate 		pageio_done(bp);
49607c478bd9Sstevel@tonic-gate 
49617c478bd9Sstevel@tonic-gate 		if (err) {
49627c478bd9Sstevel@tonic-gate 			pvn_read_done(pp, B_ERROR);
49637c478bd9Sstevel@tonic-gate 			return (err);
49647c478bd9Sstevel@tonic-gate 		}
49657c478bd9Sstevel@tonic-gate 	}
49667c478bd9Sstevel@tonic-gate 
49677c478bd9Sstevel@tonic-gate 	pvn_plist_init(pp, pl, plsz, off, io_len, rw);
49687c478bd9Sstevel@tonic-gate 	return (0);
49697c478bd9Sstevel@tonic-gate }
49707c478bd9Sstevel@tonic-gate 
49717c478bd9Sstevel@tonic-gate /*
49727c478bd9Sstevel@tonic-gate  * Read ahead a cluster from the disk. Returns the length in bytes.
49737c478bd9Sstevel@tonic-gate  */
49747c478bd9Sstevel@tonic-gate static int
49757c478bd9Sstevel@tonic-gate ufs_getpage_ra(struct vnode *vp, u_offset_t off, struct seg *seg, caddr_t addr)
49767c478bd9Sstevel@tonic-gate {
49777c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
49787c478bd9Sstevel@tonic-gate 	page_t		*pp;
49797c478bd9Sstevel@tonic-gate 	u_offset_t	io_off = ip->i_nextrio;
49807c478bd9Sstevel@tonic-gate 	ufsvfs_t	*ufsvfsp;
49817c478bd9Sstevel@tonic-gate 	caddr_t		addr2 = addr + (io_off - off);
49827c478bd9Sstevel@tonic-gate 	struct buf	*bp;
49837c478bd9Sstevel@tonic-gate 	daddr_t		bn;
49847c478bd9Sstevel@tonic-gate 	size_t		io_len;
4985303bf60bSsdebnath 	int		err;
49867c478bd9Sstevel@tonic-gate 	int		contig;
49877c478bd9Sstevel@tonic-gate 	int		xlen;
49887c478bd9Sstevel@tonic-gate 	int		bsize = ip->i_fs->fs_bsize;
49897c478bd9Sstevel@tonic-gate 
49907c478bd9Sstevel@tonic-gate 	/*
49917c478bd9Sstevel@tonic-gate 	 * If the directio advisory is in effect on this file,
49927c478bd9Sstevel@tonic-gate 	 * then do not do buffered read ahead. Read ahead makes
49937c478bd9Sstevel@tonic-gate 	 * it more difficult on threads using directio as they
49947c478bd9Sstevel@tonic-gate 	 * will be forced to flush the pages from this vnode.
49957c478bd9Sstevel@tonic-gate 	 */
49967c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
49977c478bd9Sstevel@tonic-gate 		return (0);
49987c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio)
49997c478bd9Sstevel@tonic-gate 		return (0);
50007c478bd9Sstevel@tonic-gate 
50017c478bd9Sstevel@tonic-gate 	/*
50027c478bd9Sstevel@tonic-gate 	 * Is this test needed?
50037c478bd9Sstevel@tonic-gate 	 */
50047c478bd9Sstevel@tonic-gate 	if (addr2 >= seg->s_base + seg->s_size)
50057c478bd9Sstevel@tonic-gate 		return (0);
50067c478bd9Sstevel@tonic-gate 
50077c478bd9Sstevel@tonic-gate 	contig = 0;
5008303bf60bSsdebnath 	err = bmap_read(ip, io_off, &bn, &contig);
5009303bf60bSsdebnath 	/*
5010303bf60bSsdebnath 	 * If its a UFS_HOLE or a fallocated block, do not perform
5011303bf60bSsdebnath 	 * any read ahead's since there probably is nothing to read ahead
5012303bf60bSsdebnath 	 */
5013303bf60bSsdebnath 	if (err || bn == UFS_HOLE || ISFALLOCBLK(ip, bn))
50147c478bd9Sstevel@tonic-gate 		return (0);
50157c478bd9Sstevel@tonic-gate 
50167c478bd9Sstevel@tonic-gate 	/*
50177c478bd9Sstevel@tonic-gate 	 * Limit the transfer size to bsize if this is the 2nd block.
50187c478bd9Sstevel@tonic-gate 	 */
50197c478bd9Sstevel@tonic-gate 	if (io_off == (u_offset_t)bsize)
50207c478bd9Sstevel@tonic-gate 		contig = MIN(contig, bsize);
50217c478bd9Sstevel@tonic-gate 
50227c478bd9Sstevel@tonic-gate 	if ((pp = pvn_read_kluster(vp, io_off, seg, addr2, &io_off,
50237c478bd9Sstevel@tonic-gate 	    &io_len, io_off, contig, 1)) == NULL)
50247c478bd9Sstevel@tonic-gate 		return (0);
50257c478bd9Sstevel@tonic-gate 
50267c478bd9Sstevel@tonic-gate 	/*
50277c478bd9Sstevel@tonic-gate 	 * Zero part of page which we are not going to read from disk
50287c478bd9Sstevel@tonic-gate 	 */
50297c478bd9Sstevel@tonic-gate 	if ((xlen = (io_len & PAGEOFFSET)) > 0)
50307c478bd9Sstevel@tonic-gate 		pagezero(pp->p_prev, xlen, PAGESIZE - xlen);
50317c478bd9Sstevel@tonic-gate 
50327c478bd9Sstevel@tonic-gate 	ip->i_nextrio = (io_off + io_len + PAGESIZE - 1) & PAGEMASK;
50337c478bd9Sstevel@tonic-gate 
50347c478bd9Sstevel@tonic-gate 	bp = pageio_setup(pp, io_len, ip->i_devvp, B_READ | B_ASYNC);
50357c478bd9Sstevel@tonic-gate 	bp->b_edev = ip->i_dev;
50367c478bd9Sstevel@tonic-gate 	bp->b_dev = cmpdev(ip->i_dev);
50377c478bd9Sstevel@tonic-gate 	bp->b_blkno = bn;
50387c478bd9Sstevel@tonic-gate 	bp->b_un.b_addr = (caddr_t)0;
50397c478bd9Sstevel@tonic-gate 	bp->b_file = ip->i_vnode;
50407c478bd9Sstevel@tonic-gate 	bp->b_offset = off;
50417c478bd9Sstevel@tonic-gate 
50427c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_log) {
50437c478bd9Sstevel@tonic-gate 		lufs_read_strategy(ufsvfsp->vfs_log, bp);
50447c478bd9Sstevel@tonic-gate 	} else if (ufsvfsp->vfs_snapshot) {
50457c478bd9Sstevel@tonic-gate 		fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
50467c478bd9Sstevel@tonic-gate 	} else {
50477c478bd9Sstevel@tonic-gate 		ufsvfsp->vfs_iotstamp = lbolt;
50487c478bd9Sstevel@tonic-gate 		ub.ub_getras.value.ul++;
50497c478bd9Sstevel@tonic-gate 		(void) bdev_strategy(bp);
50507c478bd9Sstevel@tonic-gate 		lwp_stat_update(LWP_STAT_INBLK, 1);
50517c478bd9Sstevel@tonic-gate 	}
50527c478bd9Sstevel@tonic-gate 
50537c478bd9Sstevel@tonic-gate 	return (io_len);
50547c478bd9Sstevel@tonic-gate }
50557c478bd9Sstevel@tonic-gate 
50567c478bd9Sstevel@tonic-gate int	ufs_delay = 1;
50577c478bd9Sstevel@tonic-gate /*
50587c478bd9Sstevel@tonic-gate  * Flags are composed of {B_INVAL, B_FREE, B_DONTNEED, B_FORCE, B_ASYNC}
50597c478bd9Sstevel@tonic-gate  *
50607c478bd9Sstevel@tonic-gate  * LMXXX - the inode really ought to contain a pointer to one of these
50617c478bd9Sstevel@tonic-gate  * async args.  Stuff gunk in there and just hand the whole mess off.
50627c478bd9Sstevel@tonic-gate  * This would replace i_delaylen, i_delayoff.
50637c478bd9Sstevel@tonic-gate  */
50647c478bd9Sstevel@tonic-gate /*ARGSUSED*/
50657c478bd9Sstevel@tonic-gate static int
50667c478bd9Sstevel@tonic-gate ufs_putpage(struct vnode *vp, offset_t off, size_t len, int flags,
5067da6c28aaSamw 	struct cred *cr, caller_context_t *ct)
50687c478bd9Sstevel@tonic-gate {
50697c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
50707c478bd9Sstevel@tonic-gate 	int err = 0;
50717c478bd9Sstevel@tonic-gate 
50727c478bd9Sstevel@tonic-gate 	if (vp->v_count == 0) {
50737c478bd9Sstevel@tonic-gate 		return (ufs_fault(vp, "ufs_putpage: bad v_count == 0"));
50747c478bd9Sstevel@tonic-gate 	}
50757c478bd9Sstevel@tonic-gate 
50767c478bd9Sstevel@tonic-gate 	/*
50777c478bd9Sstevel@tonic-gate 	 * XXX - Why should this check be made here?
50787c478bd9Sstevel@tonic-gate 	 */
50797c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
50807c478bd9Sstevel@tonic-gate 		err = ENOSYS;
50817c478bd9Sstevel@tonic-gate 		goto errout;
50827c478bd9Sstevel@tonic-gate 	}
50837c478bd9Sstevel@tonic-gate 
50847c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL) {
50857c478bd9Sstevel@tonic-gate 		err = EIO;
50867c478bd9Sstevel@tonic-gate 		goto errout;
50877c478bd9Sstevel@tonic-gate 	}
50887c478bd9Sstevel@tonic-gate 
50897c478bd9Sstevel@tonic-gate 	if (flags & B_ASYNC) {
50907c478bd9Sstevel@tonic-gate 		if (ufs_delay && len &&
50917c478bd9Sstevel@tonic-gate 		    (flags & ~(B_ASYNC|B_DONTNEED|B_FREE)) == 0) {
50927c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
50937c478bd9Sstevel@tonic-gate 			/*
50947c478bd9Sstevel@tonic-gate 			 * If nobody stalled, start a new cluster.
50957c478bd9Sstevel@tonic-gate 			 */
50967c478bd9Sstevel@tonic-gate 			if (ip->i_delaylen == 0) {
50977c478bd9Sstevel@tonic-gate 				ip->i_delayoff = off;
50987c478bd9Sstevel@tonic-gate 				ip->i_delaylen = len;
50997c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
51007c478bd9Sstevel@tonic-gate 				goto errout;
51017c478bd9Sstevel@tonic-gate 			}
51027c478bd9Sstevel@tonic-gate 			/*
51037c478bd9Sstevel@tonic-gate 			 * If we have a full cluster or they are not contig,
51047c478bd9Sstevel@tonic-gate 			 * then push last cluster and start over.
51057c478bd9Sstevel@tonic-gate 			 */
51067c478bd9Sstevel@tonic-gate 			if (ip->i_delaylen >= CLUSTSZ(ip) ||
51077c478bd9Sstevel@tonic-gate 			    ip->i_delayoff + ip->i_delaylen != off) {
51087c478bd9Sstevel@tonic-gate 				u_offset_t doff;
51097c478bd9Sstevel@tonic-gate 				size_t dlen;
51107c478bd9Sstevel@tonic-gate 
51117c478bd9Sstevel@tonic-gate 				doff = ip->i_delayoff;
51127c478bd9Sstevel@tonic-gate 				dlen = ip->i_delaylen;
51137c478bd9Sstevel@tonic-gate 				ip->i_delayoff = off;
51147c478bd9Sstevel@tonic-gate 				ip->i_delaylen = len;
51157c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
51167c478bd9Sstevel@tonic-gate 				err = ufs_putpages(vp, doff, dlen,
51177c478bd9Sstevel@tonic-gate 				    flags, cr);
51187c478bd9Sstevel@tonic-gate 				/* LMXXX - flags are new val, not old */
51197c478bd9Sstevel@tonic-gate 				goto errout;
51207c478bd9Sstevel@tonic-gate 			}
51217c478bd9Sstevel@tonic-gate 			/*
51227c478bd9Sstevel@tonic-gate 			 * There is something there, it's not full, and
51237c478bd9Sstevel@tonic-gate 			 * it is contig.
51247c478bd9Sstevel@tonic-gate 			 */
51257c478bd9Sstevel@tonic-gate 			ip->i_delaylen += len;
51267c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
51277c478bd9Sstevel@tonic-gate 			goto errout;
51287c478bd9Sstevel@tonic-gate 		}
51297c478bd9Sstevel@tonic-gate 		/*
51307c478bd9Sstevel@tonic-gate 		 * Must have weird flags or we are not clustering.
51317c478bd9Sstevel@tonic-gate 		 */
51327c478bd9Sstevel@tonic-gate 	}
51337c478bd9Sstevel@tonic-gate 
51347c478bd9Sstevel@tonic-gate 	err = ufs_putpages(vp, off, len, flags, cr);
51357c478bd9Sstevel@tonic-gate 
51367c478bd9Sstevel@tonic-gate errout:
51377c478bd9Sstevel@tonic-gate 	return (err);
51387c478bd9Sstevel@tonic-gate }
51397c478bd9Sstevel@tonic-gate 
51407c478bd9Sstevel@tonic-gate /*
51417c478bd9Sstevel@tonic-gate  * If len == 0, do from off to EOF.
51427c478bd9Sstevel@tonic-gate  *
51437c478bd9Sstevel@tonic-gate  * The normal cases should be len == 0 & off == 0 (entire vp list),
51447c478bd9Sstevel@tonic-gate  * len == MAXBSIZE (from segmap_release actions), and len == PAGESIZE
51457c478bd9Sstevel@tonic-gate  * (from pageout).
51467c478bd9Sstevel@tonic-gate  */
51477c478bd9Sstevel@tonic-gate /*ARGSUSED*/
51487c478bd9Sstevel@tonic-gate static int
51497c478bd9Sstevel@tonic-gate ufs_putpages(
51507c478bd9Sstevel@tonic-gate 	struct vnode *vp,
51517c478bd9Sstevel@tonic-gate 	offset_t off,
51527c478bd9Sstevel@tonic-gate 	size_t len,
51537c478bd9Sstevel@tonic-gate 	int flags,
51547c478bd9Sstevel@tonic-gate 	struct cred *cr)
51557c478bd9Sstevel@tonic-gate {
51567c478bd9Sstevel@tonic-gate 	u_offset_t io_off;
51577c478bd9Sstevel@tonic-gate 	u_offset_t eoff;
51587c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
51597c478bd9Sstevel@tonic-gate 	page_t *pp;
51607c478bd9Sstevel@tonic-gate 	size_t io_len;
51617c478bd9Sstevel@tonic-gate 	int err = 0;
51627c478bd9Sstevel@tonic-gate 	int dolock;
51637c478bd9Sstevel@tonic-gate 
51647c478bd9Sstevel@tonic-gate 	if (vp->v_count == 0)
51657c478bd9Sstevel@tonic-gate 		return (ufs_fault(vp, "ufs_putpages: v_count == 0"));
51667c478bd9Sstevel@tonic-gate 	/*
51677c478bd9Sstevel@tonic-gate 	 * Acquire the readers/write inode lock before locking
51687c478bd9Sstevel@tonic-gate 	 * any pages in this inode.
51697c478bd9Sstevel@tonic-gate 	 * The inode lock is held during i/o.
51707c478bd9Sstevel@tonic-gate 	 */
51717c478bd9Sstevel@tonic-gate 	if (len == 0) {
51727c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
51737c478bd9Sstevel@tonic-gate 		ip->i_delayoff = ip->i_delaylen = 0;
51747c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
51757c478bd9Sstevel@tonic-gate 	}
51767c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
51777c478bd9Sstevel@tonic-gate 	if (dolock) {
51787c478bd9Sstevel@tonic-gate 		/*
51797c478bd9Sstevel@tonic-gate 		 * Must synchronize this thread and any possible thread
51807c478bd9Sstevel@tonic-gate 		 * operating in the window of vulnerability in wrip().
51817c478bd9Sstevel@tonic-gate 		 * It is dangerous to allow both a thread doing a putpage
51827c478bd9Sstevel@tonic-gate 		 * and a thread writing, so serialize them.  The exception
51837c478bd9Sstevel@tonic-gate 		 * is when the thread in wrip() does something which causes
51847c478bd9Sstevel@tonic-gate 		 * a putpage operation.  Then, the thread must be allowed
51857c478bd9Sstevel@tonic-gate 		 * to continue.  It may encounter a bmap_read problem in
51867c478bd9Sstevel@tonic-gate 		 * ufs_putapage, but that is handled in ufs_putapage.
51877c478bd9Sstevel@tonic-gate 		 * Allow async writers to proceed, we don't want to block
51887c478bd9Sstevel@tonic-gate 		 * the pageout daemon.
51897c478bd9Sstevel@tonic-gate 		 */
51907c478bd9Sstevel@tonic-gate 		if (ip->i_writer == curthread)
51917c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
51927c478bd9Sstevel@tonic-gate 		else {
51937c478bd9Sstevel@tonic-gate 			for (;;) {
51947c478bd9Sstevel@tonic-gate 				rw_enter(&ip->i_contents, RW_READER);
51957c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
51967c478bd9Sstevel@tonic-gate 				/*
51977c478bd9Sstevel@tonic-gate 				 * If there is no thread in the critical
51987c478bd9Sstevel@tonic-gate 				 * section of wrip(), then proceed.
51997c478bd9Sstevel@tonic-gate 				 * Otherwise, wait until there isn't one.
52007c478bd9Sstevel@tonic-gate 				 */
52017c478bd9Sstevel@tonic-gate 				if (ip->i_writer == NULL) {
52027c478bd9Sstevel@tonic-gate 					mutex_exit(&ip->i_tlock);
52037c478bd9Sstevel@tonic-gate 					break;
52047c478bd9Sstevel@tonic-gate 				}
52057c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
52067c478bd9Sstevel@tonic-gate 				/*
52077c478bd9Sstevel@tonic-gate 				 * Bounce async writers when we have a writer
52087c478bd9Sstevel@tonic-gate 				 * working on this file so we don't deadlock
52097c478bd9Sstevel@tonic-gate 				 * the pageout daemon.
52107c478bd9Sstevel@tonic-gate 				 */
52117c478bd9Sstevel@tonic-gate 				if (flags & B_ASYNC) {
52127c478bd9Sstevel@tonic-gate 					mutex_exit(&ip->i_tlock);
52137c478bd9Sstevel@tonic-gate 					return (0);
52147c478bd9Sstevel@tonic-gate 				}
52157c478bd9Sstevel@tonic-gate 				cv_wait(&ip->i_wrcv, &ip->i_tlock);
52167c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
52177c478bd9Sstevel@tonic-gate 			}
52187c478bd9Sstevel@tonic-gate 		}
52197c478bd9Sstevel@tonic-gate 	}
52207c478bd9Sstevel@tonic-gate 
52217c478bd9Sstevel@tonic-gate 	if (!vn_has_cached_data(vp)) {
52227c478bd9Sstevel@tonic-gate 		if (dolock)
52237c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
52247c478bd9Sstevel@tonic-gate 		return (0);
52257c478bd9Sstevel@tonic-gate 	}
52267c478bd9Sstevel@tonic-gate 
52277c478bd9Sstevel@tonic-gate 	if (len == 0) {
52287c478bd9Sstevel@tonic-gate 		/*
52297c478bd9Sstevel@tonic-gate 		 * Search the entire vp list for pages >= off.
52307c478bd9Sstevel@tonic-gate 		 */
52317c478bd9Sstevel@tonic-gate 		err = pvn_vplist_dirty(vp, (u_offset_t)off, ufs_putapage,
523280d34432Sfrankho 		    flags, cr);
52337c478bd9Sstevel@tonic-gate 	} else {
52347c478bd9Sstevel@tonic-gate 		/*
52357c478bd9Sstevel@tonic-gate 		 * Loop over all offsets in the range looking for
52367c478bd9Sstevel@tonic-gate 		 * pages to deal with.
52377c478bd9Sstevel@tonic-gate 		 */
52387c478bd9Sstevel@tonic-gate 		if ((eoff = blkroundup(ip->i_fs, ip->i_size)) != 0)
52397c478bd9Sstevel@tonic-gate 			eoff = MIN(off + len, eoff);
52407c478bd9Sstevel@tonic-gate 		else
52417c478bd9Sstevel@tonic-gate 			eoff = off + len;
52427c478bd9Sstevel@tonic-gate 
52437c478bd9Sstevel@tonic-gate 		for (io_off = off; io_off < eoff; io_off += io_len) {
52447c478bd9Sstevel@tonic-gate 			/*
52457c478bd9Sstevel@tonic-gate 			 * If we are not invalidating, synchronously
52467c478bd9Sstevel@tonic-gate 			 * freeing or writing pages, use the routine
52477c478bd9Sstevel@tonic-gate 			 * page_lookup_nowait() to prevent reclaiming
52487c478bd9Sstevel@tonic-gate 			 * them from the free list.
52497c478bd9Sstevel@tonic-gate 			 */
52507c478bd9Sstevel@tonic-gate 			if ((flags & B_INVAL) || ((flags & B_ASYNC) == 0)) {
52517c478bd9Sstevel@tonic-gate 				pp = page_lookup(vp, io_off,
525280d34432Sfrankho 				    (flags & (B_INVAL | B_FREE)) ?
525380d34432Sfrankho 				    SE_EXCL : SE_SHARED);
52547c478bd9Sstevel@tonic-gate 			} else {
52557c478bd9Sstevel@tonic-gate 				pp = page_lookup_nowait(vp, io_off,
525680d34432Sfrankho 				    (flags & B_FREE) ? SE_EXCL : SE_SHARED);
52577c478bd9Sstevel@tonic-gate 			}
52587c478bd9Sstevel@tonic-gate 
52597c478bd9Sstevel@tonic-gate 			if (pp == NULL || pvn_getdirty(pp, flags) == 0)
52607c478bd9Sstevel@tonic-gate 				io_len = PAGESIZE;
52617c478bd9Sstevel@tonic-gate 			else {
52627c478bd9Sstevel@tonic-gate 				u_offset_t *io_offp = &io_off;
52637c478bd9Sstevel@tonic-gate 
52647c478bd9Sstevel@tonic-gate 				err = ufs_putapage(vp, pp, io_offp, &io_len,
52657c478bd9Sstevel@tonic-gate 				    flags, cr);
52667c478bd9Sstevel@tonic-gate 				if (err != 0)
52677c478bd9Sstevel@tonic-gate 					break;
52687c478bd9Sstevel@tonic-gate 				/*
52697c478bd9Sstevel@tonic-gate 				 * "io_off" and "io_len" are returned as
52707c478bd9Sstevel@tonic-gate 				 * the range of pages we actually wrote.
52717c478bd9Sstevel@tonic-gate 				 * This allows us to skip ahead more quickly
52727c478bd9Sstevel@tonic-gate 				 * since several pages may've been dealt
52737c478bd9Sstevel@tonic-gate 				 * with by this iteration of the loop.
52747c478bd9Sstevel@tonic-gate 				 */
52757c478bd9Sstevel@tonic-gate 			}
52767c478bd9Sstevel@tonic-gate 		}
52777c478bd9Sstevel@tonic-gate 	}
52787c478bd9Sstevel@tonic-gate 	if (err == 0 && off == 0 && (len == 0 || len >= ip->i_size)) {
52797c478bd9Sstevel@tonic-gate 		/*
52807c478bd9Sstevel@tonic-gate 		 * We have just sync'ed back all the pages on
52817c478bd9Sstevel@tonic-gate 		 * the inode, turn off the IMODTIME flag.
52827c478bd9Sstevel@tonic-gate 		 */
52837c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
52847c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~IMODTIME;
52857c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
52867c478bd9Sstevel@tonic-gate 	}
52877c478bd9Sstevel@tonic-gate 	if (dolock)
52887c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
52897c478bd9Sstevel@tonic-gate 	return (err);
52907c478bd9Sstevel@tonic-gate }
52917c478bd9Sstevel@tonic-gate 
52927c478bd9Sstevel@tonic-gate static void
52937c478bd9Sstevel@tonic-gate ufs_iodone(buf_t *bp)
52947c478bd9Sstevel@tonic-gate {
52957c478bd9Sstevel@tonic-gate 	struct inode *ip;
52967c478bd9Sstevel@tonic-gate 
52977c478bd9Sstevel@tonic-gate 	ASSERT((bp->b_pages->p_vnode != NULL) && !(bp->b_flags & B_READ));
52987c478bd9Sstevel@tonic-gate 
52997c478bd9Sstevel@tonic-gate 	bp->b_iodone = NULL;
53007c478bd9Sstevel@tonic-gate 
53017c478bd9Sstevel@tonic-gate 	ip = VTOI(bp->b_pages->p_vnode);
53027c478bd9Sstevel@tonic-gate 
53037c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
53047c478bd9Sstevel@tonic-gate 	if (ip->i_writes >= ufs_LW) {
53057c478bd9Sstevel@tonic-gate 		if ((ip->i_writes -= bp->b_bcount) <= ufs_LW)
53067c478bd9Sstevel@tonic-gate 			if (ufs_WRITES)
53077c478bd9Sstevel@tonic-gate 				cv_broadcast(&ip->i_wrcv); /* wake all up */
53087c478bd9Sstevel@tonic-gate 	} else {
53097c478bd9Sstevel@tonic-gate 		ip->i_writes -= bp->b_bcount;
53107c478bd9Sstevel@tonic-gate 	}
53117c478bd9Sstevel@tonic-gate 
53127c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
53137c478bd9Sstevel@tonic-gate 	iodone(bp);
53147c478bd9Sstevel@tonic-gate }
53157c478bd9Sstevel@tonic-gate 
53167c478bd9Sstevel@tonic-gate /*
53177c478bd9Sstevel@tonic-gate  * Write out a single page, possibly klustering adjacent
53187c478bd9Sstevel@tonic-gate  * dirty pages.  The inode lock must be held.
53197c478bd9Sstevel@tonic-gate  *
53207c478bd9Sstevel@tonic-gate  * LMXXX - bsize < pagesize not done.
53217c478bd9Sstevel@tonic-gate  */
53227c478bd9Sstevel@tonic-gate /*ARGSUSED*/
53237c478bd9Sstevel@tonic-gate int
53247c478bd9Sstevel@tonic-gate ufs_putapage(
53257c478bd9Sstevel@tonic-gate 	struct vnode *vp,
53267c478bd9Sstevel@tonic-gate 	page_t *pp,
53277c478bd9Sstevel@tonic-gate 	u_offset_t *offp,
53287c478bd9Sstevel@tonic-gate 	size_t *lenp,		/* return values */
53297c478bd9Sstevel@tonic-gate 	int flags,
53307c478bd9Sstevel@tonic-gate 	struct cred *cr)
53317c478bd9Sstevel@tonic-gate {
53327c478bd9Sstevel@tonic-gate 	u_offset_t io_off;
53337c478bd9Sstevel@tonic-gate 	u_offset_t off;
53347c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
53357c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
53367c478bd9Sstevel@tonic-gate 	struct fs *fs;
53377c478bd9Sstevel@tonic-gate 	struct buf *bp;
53387c478bd9Sstevel@tonic-gate 	size_t io_len;
53397c478bd9Sstevel@tonic-gate 	daddr_t bn;
53407c478bd9Sstevel@tonic-gate 	int err;
53417c478bd9Sstevel@tonic-gate 	int contig;
5342b9dc641bSfrankho 	int dotrans;
53437c478bd9Sstevel@tonic-gate 
53447c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
53457c478bd9Sstevel@tonic-gate 
53467c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
53477c478bd9Sstevel@tonic-gate 		err = EIO;
53487c478bd9Sstevel@tonic-gate 		goto out_trace;
53497c478bd9Sstevel@tonic-gate 	}
53507c478bd9Sstevel@tonic-gate 
53517c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
53527c478bd9Sstevel@tonic-gate 	ASSERT(fs->fs_ronly == 0);
53537c478bd9Sstevel@tonic-gate 
53547c478bd9Sstevel@tonic-gate 	/*
53557c478bd9Sstevel@tonic-gate 	 * If the modified time on the inode has not already been
5356956bc340Sdm 	 * set elsewhere (e.g. for write/setattr) we set the time now.
53577c478bd9Sstevel@tonic-gate 	 * This gives us approximate modified times for mmap'ed files
53587c478bd9Sstevel@tonic-gate 	 * which are modified via stores in the user address space.
53597c478bd9Sstevel@tonic-gate 	 */
5360956bc340Sdm 	if ((ip->i_flag & IMODTIME) == 0) {
53617c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
53627c478bd9Sstevel@tonic-gate 		ip->i_flag |= IUPD;
53637c478bd9Sstevel@tonic-gate 		ip->i_seq++;
53647c478bd9Sstevel@tonic-gate 		ITIMES_NOLOCK(ip);
53657c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
53667c478bd9Sstevel@tonic-gate 	}
53677c478bd9Sstevel@tonic-gate 
53687c478bd9Sstevel@tonic-gate 	/*
53697c478bd9Sstevel@tonic-gate 	 * Align the request to a block boundry (for old file systems),
53707c478bd9Sstevel@tonic-gate 	 * and go ask bmap() how contiguous things are for this file.
53717c478bd9Sstevel@tonic-gate 	 */
53727c478bd9Sstevel@tonic-gate 	off = pp->p_offset & (offset_t)fs->fs_bmask;	/* block align it */
53737c478bd9Sstevel@tonic-gate 	contig = 0;
53747c478bd9Sstevel@tonic-gate 	err = bmap_read(ip, off, &bn, &contig);
53757c478bd9Sstevel@tonic-gate 	if (err)
53767c478bd9Sstevel@tonic-gate 		goto out;
53777c478bd9Sstevel@tonic-gate 	if (bn == UFS_HOLE) {			/* putpage never allocates */
53787c478bd9Sstevel@tonic-gate 		/*
53797c478bd9Sstevel@tonic-gate 		 * logging device is in error mode; simply return EIO
53807c478bd9Sstevel@tonic-gate 		 */
53817c478bd9Sstevel@tonic-gate 		if (TRANS_ISERROR(ufsvfsp)) {
53827c478bd9Sstevel@tonic-gate 			err = EIO;
53837c478bd9Sstevel@tonic-gate 			goto out;
53847c478bd9Sstevel@tonic-gate 		}
53857c478bd9Sstevel@tonic-gate 		/*
53867c478bd9Sstevel@tonic-gate 		 * Oops, the thread in the window in wrip() did some
53877c478bd9Sstevel@tonic-gate 		 * sort of operation which caused a putpage in the bad
53887c478bd9Sstevel@tonic-gate 		 * range.  In this case, just return an error which will
53897c478bd9Sstevel@tonic-gate 		 * cause the software modified bit on the page to set
53907c478bd9Sstevel@tonic-gate 		 * and the page will get written out again later.
53917c478bd9Sstevel@tonic-gate 		 */
53927c478bd9Sstevel@tonic-gate 		if (ip->i_writer == curthread) {
53937c478bd9Sstevel@tonic-gate 			err = EIO;
53947c478bd9Sstevel@tonic-gate 			goto out;
53957c478bd9Sstevel@tonic-gate 		}
53967c478bd9Sstevel@tonic-gate 		/*
53977c478bd9Sstevel@tonic-gate 		 * If the pager is trying to push a page in the bad range
53987c478bd9Sstevel@tonic-gate 		 * just tell him to try again later when things are better.
53997c478bd9Sstevel@tonic-gate 		 */
54007c478bd9Sstevel@tonic-gate 		if (flags & B_ASYNC) {
54017c478bd9Sstevel@tonic-gate 			err = EAGAIN;
54027c478bd9Sstevel@tonic-gate 			goto out;
54037c478bd9Sstevel@tonic-gate 		}
54047c478bd9Sstevel@tonic-gate 		err = ufs_fault(ITOV(ip), "ufs_putapage: bn == UFS_HOLE");
54057c478bd9Sstevel@tonic-gate 		goto out;
54067c478bd9Sstevel@tonic-gate 	}
54077c478bd9Sstevel@tonic-gate 
5408303bf60bSsdebnath 	/*
5409303bf60bSsdebnath 	 * If it is an fallocate'd block, reverse the negativity since
5410303bf60bSsdebnath 	 * we are now writing to it
5411303bf60bSsdebnath 	 */
5412303bf60bSsdebnath 	if (ISFALLOCBLK(ip, bn)) {
5413303bf60bSsdebnath 		err = bmap_set_bn(vp, off, dbtofsb(fs, -bn));
5414303bf60bSsdebnath 		if (err)
5415303bf60bSsdebnath 			goto out;
5416303bf60bSsdebnath 
5417303bf60bSsdebnath 		bn = -bn;
5418303bf60bSsdebnath 	}
5419303bf60bSsdebnath 
54207c478bd9Sstevel@tonic-gate 	/*
54217c478bd9Sstevel@tonic-gate 	 * Take the length (of contiguous bytes) passed back from bmap()
54227c478bd9Sstevel@tonic-gate 	 * and _try_ and get a set of pages covering that extent.
54237c478bd9Sstevel@tonic-gate 	 */
54247c478bd9Sstevel@tonic-gate 	pp = pvn_write_kluster(vp, pp, &io_off, &io_len, off, contig, flags);
54257c478bd9Sstevel@tonic-gate 
54267c478bd9Sstevel@tonic-gate 	/*
54277c478bd9Sstevel@tonic-gate 	 * May have run out of memory and not clustered backwards.
54287c478bd9Sstevel@tonic-gate 	 * off		p_offset
54297c478bd9Sstevel@tonic-gate 	 * [  pp - 1  ][   pp   ]
54307c478bd9Sstevel@tonic-gate 	 * [	block		]
54317c478bd9Sstevel@tonic-gate 	 * We told bmap off, so we have to adjust the bn accordingly.
54327c478bd9Sstevel@tonic-gate 	 */
54337c478bd9Sstevel@tonic-gate 	if (io_off > off) {
54347c478bd9Sstevel@tonic-gate 		bn += btod(io_off - off);
54357c478bd9Sstevel@tonic-gate 		contig -= (io_off - off);
54367c478bd9Sstevel@tonic-gate 	}
54377c478bd9Sstevel@tonic-gate 
54387c478bd9Sstevel@tonic-gate 	/*
54397c478bd9Sstevel@tonic-gate 	 * bmap was carefull to tell us the right size so use that.
54407c478bd9Sstevel@tonic-gate 	 * There might be unallocated frags at the end.
54417c478bd9Sstevel@tonic-gate 	 * LMXXX - bzero the end of the page?  We must be writing after EOF.
54427c478bd9Sstevel@tonic-gate 	 */
54437c478bd9Sstevel@tonic-gate 	if (io_len > contig) {
54447c478bd9Sstevel@tonic-gate 		ASSERT(io_len - contig < fs->fs_bsize);
54457c478bd9Sstevel@tonic-gate 		io_len -= (io_len - contig);
54467c478bd9Sstevel@tonic-gate 	}
54477c478bd9Sstevel@tonic-gate 
54487c478bd9Sstevel@tonic-gate 	/*
54497c478bd9Sstevel@tonic-gate 	 * Handle the case where we are writing the last page after EOF.
54507c478bd9Sstevel@tonic-gate 	 *
54517c478bd9Sstevel@tonic-gate 	 * XXX - just a patch for i-mt3.
54527c478bd9Sstevel@tonic-gate 	 */
54537c478bd9Sstevel@tonic-gate 	if (io_len == 0) {
545480d34432Sfrankho 		ASSERT(pp->p_offset >=
545580d34432Sfrankho 		    (u_offset_t)(roundup(ip->i_size, PAGESIZE)));
54567c478bd9Sstevel@tonic-gate 		io_len = PAGESIZE;
54577c478bd9Sstevel@tonic-gate 	}
54587c478bd9Sstevel@tonic-gate 
54597c478bd9Sstevel@tonic-gate 	bp = pageio_setup(pp, io_len, ip->i_devvp, B_WRITE | flags);
54607c478bd9Sstevel@tonic-gate 
54617c478bd9Sstevel@tonic-gate 	ULOCKFS_SET_MOD(ITOUL(ip));
54627c478bd9Sstevel@tonic-gate 
54637c478bd9Sstevel@tonic-gate 	bp->b_edev = ip->i_dev;
54647c478bd9Sstevel@tonic-gate 	bp->b_dev = cmpdev(ip->i_dev);
54657c478bd9Sstevel@tonic-gate 	bp->b_blkno = bn;
54667c478bd9Sstevel@tonic-gate 	bp->b_un.b_addr = (caddr_t)0;
54677c478bd9Sstevel@tonic-gate 	bp->b_file = ip->i_vnode;
54687c478bd9Sstevel@tonic-gate 
5469b9dc641bSfrankho 	/*
5470b9dc641bSfrankho 	 * File contents of shadow or quota inodes are metadata, and updates
5471b9dc641bSfrankho 	 * to these need to be put into a logging transaction. All direct
5472b9dc641bSfrankho 	 * callers in UFS do that, but fsflush can come here _before_ the
5473b9dc641bSfrankho 	 * normal codepath. An example would be updating ACL information, for
5474b9dc641bSfrankho 	 * which the normal codepath would be:
5475b9dc641bSfrankho 	 *	ufs_si_store()
5476b9dc641bSfrankho 	 *	ufs_rdwri()
5477b9dc641bSfrankho 	 *	wrip()
5478b9dc641bSfrankho 	 *	segmap_release()
5479b9dc641bSfrankho 	 *	VOP_PUTPAGE()
5480b9dc641bSfrankho 	 * Here, fsflush can pick up the dirty page before segmap_release()
5481b9dc641bSfrankho 	 * forces it out. If that happens, there's no transaction.
5482b9dc641bSfrankho 	 * We therefore need to test whether a transaction exists, and if not
5483b9dc641bSfrankho 	 * create one - for fsflush.
5484b9dc641bSfrankho 	 */
5485b9dc641bSfrankho 	dotrans =
5486b9dc641bSfrankho 	    (((ip->i_mode & IFMT) == IFSHAD || ufsvfsp->vfs_qinod == ip) &&
5487b9dc641bSfrankho 	    ((curthread->t_flag & T_DONTBLOCK) == 0) &&
5488b9dc641bSfrankho 	    (TRANS_ISTRANS(ufsvfsp)));
5489b9dc641bSfrankho 
5490b9dc641bSfrankho 	if (dotrans) {
5491b9dc641bSfrankho 		curthread->t_flag |= T_DONTBLOCK;
5492b9dc641bSfrankho 		TRANS_BEGIN_ASYNC(ufsvfsp, TOP_PUTPAGE, TOP_PUTPAGE_SIZE(ip));
5493b9dc641bSfrankho 	}
54947c478bd9Sstevel@tonic-gate 	if (TRANS_ISTRANS(ufsvfsp)) {
54957c478bd9Sstevel@tonic-gate 		if ((ip->i_mode & IFMT) == IFSHAD) {
54967c478bd9Sstevel@tonic-gate 			TRANS_BUF(ufsvfsp, 0, io_len, bp, DT_SHAD);
54977c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_qinod == ip) {
54987c478bd9Sstevel@tonic-gate 			TRANS_DELTA(ufsvfsp, ldbtob(bn), bp->b_bcount, DT_QR,
54997c478bd9Sstevel@tonic-gate 			    0, 0);
55007c478bd9Sstevel@tonic-gate 		}
55017c478bd9Sstevel@tonic-gate 	}
5502b9dc641bSfrankho 	if (dotrans) {
5503b9dc641bSfrankho 		TRANS_END_ASYNC(ufsvfsp, TOP_PUTPAGE, TOP_PUTPAGE_SIZE(ip));
5504b9dc641bSfrankho 		curthread->t_flag &= ~T_DONTBLOCK;
5505b9dc641bSfrankho 	}
55067c478bd9Sstevel@tonic-gate 
55077c478bd9Sstevel@tonic-gate 	/* write throttle */
55087c478bd9Sstevel@tonic-gate 
55097c478bd9Sstevel@tonic-gate 	ASSERT(bp->b_iodone == NULL);
55107c478bd9Sstevel@tonic-gate 	bp->b_iodone = (int (*)())ufs_iodone;
55117c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
55127c478bd9Sstevel@tonic-gate 	ip->i_writes += bp->b_bcount;
55137c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
55147c478bd9Sstevel@tonic-gate 
55157c478bd9Sstevel@tonic-gate 	if (bp->b_flags & B_ASYNC) {
55167c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
55177c478bd9Sstevel@tonic-gate 			lufs_write_strategy(ufsvfsp->vfs_log, bp);
55187c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
55197c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
55207c478bd9Sstevel@tonic-gate 		} else {
55217c478bd9Sstevel@tonic-gate 			ufsvfsp->vfs_iotstamp = lbolt;
55227c478bd9Sstevel@tonic-gate 			ub.ub_putasyncs.value.ul++;
55237c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
55247c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
55257c478bd9Sstevel@tonic-gate 		}
55267c478bd9Sstevel@tonic-gate 	} else {
55277c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
55287c478bd9Sstevel@tonic-gate 			lufs_write_strategy(ufsvfsp->vfs_log, bp);
55297c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
55307c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
55317c478bd9Sstevel@tonic-gate 		} else {
55327c478bd9Sstevel@tonic-gate 			ufsvfsp->vfs_iotstamp = lbolt;
55337c478bd9Sstevel@tonic-gate 			ub.ub_putsyncs.value.ul++;
55347c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
55357c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
55367c478bd9Sstevel@tonic-gate 		}
55377c478bd9Sstevel@tonic-gate 		err = biowait(bp);
55387c478bd9Sstevel@tonic-gate 		pageio_done(bp);
55397c478bd9Sstevel@tonic-gate 		pvn_write_done(pp, ((err) ? B_ERROR : 0) | B_WRITE | flags);
55407c478bd9Sstevel@tonic-gate 	}
55417c478bd9Sstevel@tonic-gate 
55427c478bd9Sstevel@tonic-gate 	pp = NULL;
55437c478bd9Sstevel@tonic-gate 
55447c478bd9Sstevel@tonic-gate out:
55457c478bd9Sstevel@tonic-gate 	if (err != 0 && pp != NULL)
55467c478bd9Sstevel@tonic-gate 		pvn_write_done(pp, B_ERROR | B_WRITE | flags);
55477c478bd9Sstevel@tonic-gate 
55487c478bd9Sstevel@tonic-gate 	if (offp)
55497c478bd9Sstevel@tonic-gate 		*offp = io_off;
55507c478bd9Sstevel@tonic-gate 	if (lenp)
55517c478bd9Sstevel@tonic-gate 		*lenp = io_len;
55527c478bd9Sstevel@tonic-gate out_trace:
55537c478bd9Sstevel@tonic-gate 	return (err);
55547c478bd9Sstevel@tonic-gate }
55557c478bd9Sstevel@tonic-gate 
55566ac3b8a8Svsakar uint64_t ufs_map_alock_retry_cnt;
55576ac3b8a8Svsakar uint64_t ufs_map_lockfs_retry_cnt;
55586ac3b8a8Svsakar 
55597c478bd9Sstevel@tonic-gate /* ARGSUSED */
55607c478bd9Sstevel@tonic-gate static int
55617c478bd9Sstevel@tonic-gate ufs_map(struct vnode *vp,
55627c478bd9Sstevel@tonic-gate 	offset_t off,
55637c478bd9Sstevel@tonic-gate 	struct as *as,
55647c478bd9Sstevel@tonic-gate 	caddr_t *addrp,
55657c478bd9Sstevel@tonic-gate 	size_t len,
55667c478bd9Sstevel@tonic-gate 	uchar_t prot,
55677c478bd9Sstevel@tonic-gate 	uchar_t maxprot,
55687c478bd9Sstevel@tonic-gate 	uint_t flags,
5569da6c28aaSamw 	struct cred *cr,
5570da6c28aaSamw 	caller_context_t *ct)
55717c478bd9Sstevel@tonic-gate {
55727c478bd9Sstevel@tonic-gate 	struct segvn_crargs vn_a;
55737c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = VTOI(vp)->i_ufsvfs;
55747c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
55756ac3b8a8Svsakar 	int error, sig;
55766ac3b8a8Svsakar 	k_sigset_t smask;
557757846e82Svsakar 	caddr_t hint = *addrp;
55787c478bd9Sstevel@tonic-gate 
55797c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
55807c478bd9Sstevel@tonic-gate 		error = ENOSYS;
55816ac3b8a8Svsakar 		goto out;
55827c478bd9Sstevel@tonic-gate 	}
55837c478bd9Sstevel@tonic-gate 
55847c478bd9Sstevel@tonic-gate 	if (off < (offset_t)0 || (offset_t)(off + len) < (offset_t)0) {
55857c478bd9Sstevel@tonic-gate 		error = ENXIO;
55866ac3b8a8Svsakar 		goto out;
55877c478bd9Sstevel@tonic-gate 	}
55887c478bd9Sstevel@tonic-gate 
55897c478bd9Sstevel@tonic-gate 	if (vp->v_type != VREG) {
55907c478bd9Sstevel@tonic-gate 		error = ENODEV;
55916ac3b8a8Svsakar 		goto out;
55927c478bd9Sstevel@tonic-gate 	}
55937c478bd9Sstevel@tonic-gate 
55946ac3b8a8Svsakar retry_map:
559557846e82Svsakar 	*addrp = hint;
55967c478bd9Sstevel@tonic-gate 	/*
55977c478bd9Sstevel@tonic-gate 	 * If file is being locked, disallow mapping.
55987c478bd9Sstevel@tonic-gate 	 */
55997c478bd9Sstevel@tonic-gate 	if (vn_has_mandatory_locks(vp, VTOI(vp)->i_mode)) {
56007c478bd9Sstevel@tonic-gate 		error = EAGAIN;
56016ac3b8a8Svsakar 		goto out;
56027c478bd9Sstevel@tonic-gate 	}
56037c478bd9Sstevel@tonic-gate 
56047c478bd9Sstevel@tonic-gate 	as_rangelock(as);
560560946fe0Smec 	/*
560660946fe0Smec 	 * Note that if we are retrying (because ufs_lockfs_trybegin failed in
560760946fe0Smec 	 * the previous attempt), some other thread could have grabbed
560860946fe0Smec 	 * the same VA range if MAP_FIXED is set. In that case, choose_addr
560960946fe0Smec 	 * would unmap the valid VA range, that is ok.
561060946fe0Smec 	 */
561160946fe0Smec 	error = choose_addr(as, addrp, len, off, ADDR_VACALIGN, flags);
561260946fe0Smec 	if (error != 0) {
561360946fe0Smec 		as_rangeunlock(as);
561460946fe0Smec 		goto out;
56157c478bd9Sstevel@tonic-gate 	}
56167c478bd9Sstevel@tonic-gate 
56176ac3b8a8Svsakar 	/*
56186ac3b8a8Svsakar 	 * a_lock has to be acquired before entering the lockfs protocol
56196ac3b8a8Svsakar 	 * because that is the order in which pagefault works. Also we cannot
56206ac3b8a8Svsakar 	 * block on a_lock here because this waiting writer will prevent
56216ac3b8a8Svsakar 	 * further readers like ufs_read from progressing and could cause
56226ac3b8a8Svsakar 	 * deadlock between ufs_read/ufs_map/pagefault when a quiesce is
56236ac3b8a8Svsakar 	 * pending.
56246ac3b8a8Svsakar 	 */
56256ac3b8a8Svsakar 	while (!AS_LOCK_TRYENTER(as, &as->a_lock, RW_WRITER)) {
56266ac3b8a8Svsakar 		ufs_map_alock_retry_cnt++;
56276ac3b8a8Svsakar 		delay(RETRY_LOCK_DELAY);
56286ac3b8a8Svsakar 	}
56296ac3b8a8Svsakar 
56306ac3b8a8Svsakar 	/*
56316ac3b8a8Svsakar 	 * We can't hold as->a_lock and wait for lockfs to succeed because
56326ac3b8a8Svsakar 	 * the proc tools might hang on a_lock, so call ufs_lockfs_trybegin()
56336ac3b8a8Svsakar 	 * instead.
56346ac3b8a8Svsakar 	 */
56356ac3b8a8Svsakar 	if (error = ufs_lockfs_trybegin(ufsvfsp, &ulp, ULOCKFS_MAP_MASK)) {
56366ac3b8a8Svsakar 		/*
56376ac3b8a8Svsakar 		 * ufs_lockfs_trybegin() did not succeed. It is safer to give up
56386ac3b8a8Svsakar 		 * as->a_lock and wait for ulp->ul_fs_lock status to change.
56396ac3b8a8Svsakar 		 */
56406ac3b8a8Svsakar 		ufs_map_lockfs_retry_cnt++;
56416ac3b8a8Svsakar 		AS_LOCK_EXIT(as, &as->a_lock);
56426ac3b8a8Svsakar 		as_rangeunlock(as);
56436ac3b8a8Svsakar 		if (error == EIO)
56446ac3b8a8Svsakar 			goto out;
56456ac3b8a8Svsakar 
56466ac3b8a8Svsakar 		mutex_enter(&ulp->ul_lock);
56476ac3b8a8Svsakar 		while (ulp->ul_fs_lock & ULOCKFS_MAP_MASK) {
56486ac3b8a8Svsakar 			if (ULOCKFS_IS_SLOCK(ulp) || ufsvfsp->vfs_nointr) {
56496ac3b8a8Svsakar 				cv_wait(&ulp->ul_cv, &ulp->ul_lock);
56506ac3b8a8Svsakar 			} else {
56516ac3b8a8Svsakar 				sigintr(&smask, 1);
56526ac3b8a8Svsakar 				sig = cv_wait_sig(&ulp->ul_cv, &ulp->ul_lock);
56536ac3b8a8Svsakar 				sigunintr(&smask);
56546ac3b8a8Svsakar 				if (((ulp->ul_fs_lock & ULOCKFS_MAP_MASK) &&
56556ac3b8a8Svsakar 				    !sig) || ufsvfsp->vfs_dontblock) {
56566ac3b8a8Svsakar 					mutex_exit(&ulp->ul_lock);
56576ac3b8a8Svsakar 					return (EINTR);
56586ac3b8a8Svsakar 				}
56596ac3b8a8Svsakar 			}
56606ac3b8a8Svsakar 		}
56616ac3b8a8Svsakar 		mutex_exit(&ulp->ul_lock);
56626ac3b8a8Svsakar 		goto retry_map;
56636ac3b8a8Svsakar 	}
56646ac3b8a8Svsakar 
56657c478bd9Sstevel@tonic-gate 	vn_a.vp = vp;
56667c478bd9Sstevel@tonic-gate 	vn_a.offset = (u_offset_t)off;
56677c478bd9Sstevel@tonic-gate 	vn_a.type = flags & MAP_TYPE;
56687c478bd9Sstevel@tonic-gate 	vn_a.prot = prot;
56697c478bd9Sstevel@tonic-gate 	vn_a.maxprot = maxprot;
56707c478bd9Sstevel@tonic-gate 	vn_a.cred = cr;
56717c478bd9Sstevel@tonic-gate 	vn_a.amp = NULL;
56727c478bd9Sstevel@tonic-gate 	vn_a.flags = flags & ~MAP_TYPE;
56737c478bd9Sstevel@tonic-gate 	vn_a.szc = 0;
56747c478bd9Sstevel@tonic-gate 	vn_a.lgrp_mem_policy_flags = 0;
56757c478bd9Sstevel@tonic-gate 
567602ff05a9Svsakar 	error = as_map_locked(as, *addrp, len, segvn_create, &vn_a);
56776ac3b8a8Svsakar 	if (ulp)
56787c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
56796ac3b8a8Svsakar 	as_rangeunlock(as);
56807c478bd9Sstevel@tonic-gate out:
56817c478bd9Sstevel@tonic-gate 	return (error);
56827c478bd9Sstevel@tonic-gate }
56837c478bd9Sstevel@tonic-gate 
56847c478bd9Sstevel@tonic-gate /* ARGSUSED */
56857c478bd9Sstevel@tonic-gate static int
56867c478bd9Sstevel@tonic-gate ufs_addmap(struct vnode *vp,
56877c478bd9Sstevel@tonic-gate 	offset_t off,
56887c478bd9Sstevel@tonic-gate 	struct as *as,
56897c478bd9Sstevel@tonic-gate 	caddr_t addr,
56907c478bd9Sstevel@tonic-gate 	size_t	len,
56917c478bd9Sstevel@tonic-gate 	uchar_t  prot,
56927c478bd9Sstevel@tonic-gate 	uchar_t  maxprot,
56937c478bd9Sstevel@tonic-gate 	uint_t    flags,
5694da6c28aaSamw 	struct cred *cr,
5695da6c28aaSamw 	caller_context_t *ct)
56967c478bd9Sstevel@tonic-gate {
56977c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
56987c478bd9Sstevel@tonic-gate 
56997c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
57007c478bd9Sstevel@tonic-gate 		return (ENOSYS);
57017c478bd9Sstevel@tonic-gate 	}
57027c478bd9Sstevel@tonic-gate 
57037c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
57047c478bd9Sstevel@tonic-gate 	ip->i_mapcnt += btopr(len);
57057c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
57067c478bd9Sstevel@tonic-gate 	return (0);
57077c478bd9Sstevel@tonic-gate }
57087c478bd9Sstevel@tonic-gate 
57097c478bd9Sstevel@tonic-gate /*ARGSUSED*/
57107c478bd9Sstevel@tonic-gate static int
57117c478bd9Sstevel@tonic-gate ufs_delmap(struct vnode *vp, offset_t off, struct as *as, caddr_t addr,
57127c478bd9Sstevel@tonic-gate 	size_t len, uint_t prot,  uint_t maxprot,  uint_t flags,
5713da6c28aaSamw 	struct cred *cr, caller_context_t *ct)
57147c478bd9Sstevel@tonic-gate {
57157c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
57167c478bd9Sstevel@tonic-gate 
57177c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
57187c478bd9Sstevel@tonic-gate 		return (ENOSYS);
57197c478bd9Sstevel@tonic-gate 	}
57207c478bd9Sstevel@tonic-gate 
57217c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
57227c478bd9Sstevel@tonic-gate 	ip->i_mapcnt -= btopr(len); 	/* Count released mappings */
57237c478bd9Sstevel@tonic-gate 	ASSERT(ip->i_mapcnt >= 0);
57247c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
57257c478bd9Sstevel@tonic-gate 	return (0);
57267c478bd9Sstevel@tonic-gate }
57277c478bd9Sstevel@tonic-gate /*
57287c478bd9Sstevel@tonic-gate  * Return the answer requested to poll() for non-device files
57297c478bd9Sstevel@tonic-gate  */
57307c478bd9Sstevel@tonic-gate struct pollhead ufs_pollhd;
57317c478bd9Sstevel@tonic-gate 
57327c478bd9Sstevel@tonic-gate /* ARGSUSED */
57337c478bd9Sstevel@tonic-gate int
5734da6c28aaSamw ufs_poll(vnode_t *vp, short ev, int any, short *revp, struct pollhead **phpp,
5735da6c28aaSamw 	caller_context_t *ct)
57367c478bd9Sstevel@tonic-gate {
57377c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp;
57387c478bd9Sstevel@tonic-gate 
57397c478bd9Sstevel@tonic-gate 	*revp = 0;
57407c478bd9Sstevel@tonic-gate 	ufsvfsp = VTOI(vp)->i_ufsvfs;
57417c478bd9Sstevel@tonic-gate 
57427c478bd9Sstevel@tonic-gate 	if (!ufsvfsp) {
57437c478bd9Sstevel@tonic-gate 		*revp = POLLHUP;
57447c478bd9Sstevel@tonic-gate 		goto out;
57457c478bd9Sstevel@tonic-gate 	}
57467c478bd9Sstevel@tonic-gate 
57477c478bd9Sstevel@tonic-gate 	if (ULOCKFS_IS_HLOCK(&ufsvfsp->vfs_ulockfs) ||
57487c478bd9Sstevel@tonic-gate 	    ULOCKFS_IS_ELOCK(&ufsvfsp->vfs_ulockfs)) {
57497c478bd9Sstevel@tonic-gate 		*revp |= POLLERR;
57507c478bd9Sstevel@tonic-gate 
57517c478bd9Sstevel@tonic-gate 	} else {
57527c478bd9Sstevel@tonic-gate 		if ((ev & POLLOUT) && !ufsvfsp->vfs_fs->fs_ronly &&
57537c478bd9Sstevel@tonic-gate 		    !ULOCKFS_IS_WLOCK(&ufsvfsp->vfs_ulockfs))
57547c478bd9Sstevel@tonic-gate 			*revp |= POLLOUT;
57557c478bd9Sstevel@tonic-gate 
57567c478bd9Sstevel@tonic-gate 		if ((ev & POLLWRBAND) && !ufsvfsp->vfs_fs->fs_ronly &&
57577c478bd9Sstevel@tonic-gate 		    !ULOCKFS_IS_WLOCK(&ufsvfsp->vfs_ulockfs))
57587c478bd9Sstevel@tonic-gate 			*revp |= POLLWRBAND;
57597c478bd9Sstevel@tonic-gate 
57607c478bd9Sstevel@tonic-gate 		if (ev & POLLIN)
57617c478bd9Sstevel@tonic-gate 			*revp |= POLLIN;
57627c478bd9Sstevel@tonic-gate 
57637c478bd9Sstevel@tonic-gate 		if (ev & POLLRDNORM)
57647c478bd9Sstevel@tonic-gate 			*revp |= POLLRDNORM;
57657c478bd9Sstevel@tonic-gate 
57667c478bd9Sstevel@tonic-gate 		if (ev & POLLRDBAND)
57677c478bd9Sstevel@tonic-gate 			*revp |= POLLRDBAND;
57687c478bd9Sstevel@tonic-gate 	}
57697c478bd9Sstevel@tonic-gate 
57707c478bd9Sstevel@tonic-gate 	if ((ev & POLLPRI) && (*revp & (POLLERR|POLLHUP)))
57717c478bd9Sstevel@tonic-gate 		*revp |= POLLPRI;
57727c478bd9Sstevel@tonic-gate out:
57737c478bd9Sstevel@tonic-gate 	*phpp = !any && !*revp ? &ufs_pollhd : (struct pollhead *)NULL;
57747c478bd9Sstevel@tonic-gate 
57757c478bd9Sstevel@tonic-gate 	return (0);
57767c478bd9Sstevel@tonic-gate }
57777c478bd9Sstevel@tonic-gate 
57787c478bd9Sstevel@tonic-gate /* ARGSUSED */
57797c478bd9Sstevel@tonic-gate static int
5780da6c28aaSamw ufs_l_pathconf(struct vnode *vp, int cmd, ulong_t *valp, struct cred *cr,
5781da6c28aaSamw 	caller_context_t *ct)
57827c478bd9Sstevel@tonic-gate {
57837c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
57847c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp = NULL;
57857c478bd9Sstevel@tonic-gate 	struct inode 	*sip = NULL;
57867c478bd9Sstevel@tonic-gate 	int		error;
57877c478bd9Sstevel@tonic-gate 	struct inode 	*ip = VTOI(vp);
57887c478bd9Sstevel@tonic-gate 	int		issync;
57897c478bd9Sstevel@tonic-gate 
57907c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_PATHCONF_MASK);
57917c478bd9Sstevel@tonic-gate 	if (error)
57927c478bd9Sstevel@tonic-gate 		return (error);
57937c478bd9Sstevel@tonic-gate 
57947c478bd9Sstevel@tonic-gate 	switch (cmd) {
57957c478bd9Sstevel@tonic-gate 		/*
57967c478bd9Sstevel@tonic-gate 		 * Have to handle _PC_NAME_MAX here, because the normal way
57977c478bd9Sstevel@tonic-gate 		 * [fs_pathconf() -> VOP_STATVFS() -> ufs_statvfs()]
57987c478bd9Sstevel@tonic-gate 		 * results in a lock ordering reversal between
57997c478bd9Sstevel@tonic-gate 		 * ufs_lockfs_{begin,end}() and
58007c478bd9Sstevel@tonic-gate 		 * ufs_thread_{suspend,continue}().
58017c478bd9Sstevel@tonic-gate 		 *
58027c478bd9Sstevel@tonic-gate 		 * Keep in sync with ufs_statvfs().
58037c478bd9Sstevel@tonic-gate 		 */
58047c478bd9Sstevel@tonic-gate 	case _PC_NAME_MAX:
58057c478bd9Sstevel@tonic-gate 		*valp = MAXNAMLEN;
58067c478bd9Sstevel@tonic-gate 		break;
58077c478bd9Sstevel@tonic-gate 
58087c478bd9Sstevel@tonic-gate 	case _PC_FILESIZEBITS:
58097c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_lfflags & UFS_LARGEFILES)
58107c478bd9Sstevel@tonic-gate 			*valp = UFS_FILESIZE_BITS;
58117c478bd9Sstevel@tonic-gate 		else
58127c478bd9Sstevel@tonic-gate 			*valp = 32;
58137c478bd9Sstevel@tonic-gate 		break;
58147c478bd9Sstevel@tonic-gate 
58157c478bd9Sstevel@tonic-gate 	case _PC_XATTR_EXISTS:
58167c478bd9Sstevel@tonic-gate 		if (vp->v_vfsp->vfs_flag & VFS_XATTR) {
58177c478bd9Sstevel@tonic-gate 
581880d34432Sfrankho 			error =
581980d34432Sfrankho 			    ufs_xattr_getattrdir(vp, &sip, LOOKUP_XATTR, cr);
58207c478bd9Sstevel@tonic-gate 			if (error ==  0 && sip != NULL) {
58217c478bd9Sstevel@tonic-gate 				/* Start transaction */
58227c478bd9Sstevel@tonic-gate 				if (ulp) {
58237c478bd9Sstevel@tonic-gate 					TRANS_BEGIN_CSYNC(ufsvfsp, issync,
58247c478bd9Sstevel@tonic-gate 					    TOP_RMDIR, TOP_RMDIR_SIZE);
58257c478bd9Sstevel@tonic-gate 				}
58267c478bd9Sstevel@tonic-gate 				/*
58277c478bd9Sstevel@tonic-gate 				 * Is directory empty
58287c478bd9Sstevel@tonic-gate 				 */
58297c478bd9Sstevel@tonic-gate 				rw_enter(&sip->i_rwlock, RW_WRITER);
58307c478bd9Sstevel@tonic-gate 				rw_enter(&sip->i_contents, RW_WRITER);
58317c478bd9Sstevel@tonic-gate 				if (ufs_xattrdirempty(sip,
583280d34432Sfrankho 				    sip->i_number, CRED())) {
58337c478bd9Sstevel@tonic-gate 					rw_enter(&ip->i_contents, RW_WRITER);
58347c478bd9Sstevel@tonic-gate 					ufs_unhook_shadow(ip, sip);
58357c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
58367c478bd9Sstevel@tonic-gate 
58377c478bd9Sstevel@tonic-gate 					*valp = 0;
58387c478bd9Sstevel@tonic-gate 
58397c478bd9Sstevel@tonic-gate 				} else
58407c478bd9Sstevel@tonic-gate 					*valp = 1;
58417c478bd9Sstevel@tonic-gate 				rw_exit(&sip->i_contents);
58427c478bd9Sstevel@tonic-gate 				rw_exit(&sip->i_rwlock);
58437c478bd9Sstevel@tonic-gate 				if (ulp) {
58447c478bd9Sstevel@tonic-gate 					TRANS_END_CSYNC(ufsvfsp, error, issync,
58457c478bd9Sstevel@tonic-gate 					    TOP_RMDIR, TOP_RMDIR_SIZE);
58467c478bd9Sstevel@tonic-gate 				}
58477c478bd9Sstevel@tonic-gate 				VN_RELE(ITOV(sip));
58487c478bd9Sstevel@tonic-gate 			} else if (error == ENOENT) {
58497c478bd9Sstevel@tonic-gate 				*valp = 0;
58507c478bd9Sstevel@tonic-gate 				error = 0;
58517c478bd9Sstevel@tonic-gate 			}
58527c478bd9Sstevel@tonic-gate 		} else {
5853da6c28aaSamw 			error = fs_pathconf(vp, cmd, valp, cr, ct);
58547c478bd9Sstevel@tonic-gate 		}
58557c478bd9Sstevel@tonic-gate 		break;
58567c478bd9Sstevel@tonic-gate 
58577c478bd9Sstevel@tonic-gate 	case _PC_ACL_ENABLED:
58587c478bd9Sstevel@tonic-gate 		*valp = _ACL_ACLENT_ENABLED;
58597c478bd9Sstevel@tonic-gate 		break;
58607c478bd9Sstevel@tonic-gate 
58617c478bd9Sstevel@tonic-gate 	case _PC_MIN_HOLE_SIZE:
58627c478bd9Sstevel@tonic-gate 		*valp = (ulong_t)ip->i_fs->fs_bsize;
58637c478bd9Sstevel@tonic-gate 		break;
58647c478bd9Sstevel@tonic-gate 
5865da6c28aaSamw 	case _PC_SATTR_ENABLED:
5866da6c28aaSamw 	case _PC_SATTR_EXISTS:
5867da6c28aaSamw 		*valp = vfs_has_feature(vp->v_vfsp, VFSFT_XVATTR) &&
5868da6c28aaSamw 		    (vp->v_type == VREG || vp->v_type == VDIR);
5869da6c28aaSamw 		break;
5870da6c28aaSamw 
58717c478bd9Sstevel@tonic-gate 	default:
5872da6c28aaSamw 		error = fs_pathconf(vp, cmd, valp, cr, ct);
58737c478bd9Sstevel@tonic-gate 	}
58747c478bd9Sstevel@tonic-gate 
58757c478bd9Sstevel@tonic-gate 	if (ulp != NULL) {
58767c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
58777c478bd9Sstevel@tonic-gate 	}
58787c478bd9Sstevel@tonic-gate 	return (error);
58797c478bd9Sstevel@tonic-gate }
58807c478bd9Sstevel@tonic-gate 
58817c478bd9Sstevel@tonic-gate int ufs_pageio_writes, ufs_pageio_reads;
58827c478bd9Sstevel@tonic-gate 
58837c478bd9Sstevel@tonic-gate /*ARGSUSED*/
58847c478bd9Sstevel@tonic-gate static int
58857c478bd9Sstevel@tonic-gate ufs_pageio(struct vnode *vp, page_t *pp, u_offset_t io_off, size_t io_len,
5886da6c28aaSamw 	int flags, struct cred *cr, caller_context_t *ct)
58877c478bd9Sstevel@tonic-gate {
58887c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
58897c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
58907c478bd9Sstevel@tonic-gate 	page_t *npp = NULL, *opp = NULL, *cpp = pp;
58917c478bd9Sstevel@tonic-gate 	struct buf *bp;
58927c478bd9Sstevel@tonic-gate 	daddr_t bn;
58937c478bd9Sstevel@tonic-gate 	size_t done_len = 0, cur_len = 0;
58947c478bd9Sstevel@tonic-gate 	int err = 0;
58957c478bd9Sstevel@tonic-gate 	int contig = 0;
58967c478bd9Sstevel@tonic-gate 	int dolock;
58977c478bd9Sstevel@tonic-gate 	int vmpss = 0;
5898bc69f433Saguzovsk 	struct ulockfs *ulp;
58997c478bd9Sstevel@tonic-gate 
59007c478bd9Sstevel@tonic-gate 	if ((flags & B_READ) && pp != NULL && pp->p_vnode == vp &&
59017c478bd9Sstevel@tonic-gate 	    vp->v_mpssdata != NULL) {
59027c478bd9Sstevel@tonic-gate 		vmpss = 1;
59037c478bd9Sstevel@tonic-gate 	}
59047c478bd9Sstevel@tonic-gate 
59057c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
59067c478bd9Sstevel@tonic-gate 	/*
59077c478bd9Sstevel@tonic-gate 	 * We need a better check.  Ideally, we would use another
59087c478bd9Sstevel@tonic-gate 	 * vnodeops so that hlocked and forcibly unmounted file
59097c478bd9Sstevel@tonic-gate 	 * systems would return EIO where appropriate and w/o the
59107c478bd9Sstevel@tonic-gate 	 * need for these checks.
59117c478bd9Sstevel@tonic-gate 	 */
59127c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
59137c478bd9Sstevel@tonic-gate 		return (EIO);
59147c478bd9Sstevel@tonic-gate 
5915bc69f433Saguzovsk 	/*
5916bc69f433Saguzovsk 	 * For vmpss (pp can be NULL) case respect the quiesce protocol.
5917bc69f433Saguzovsk 	 * ul_lock must be taken before locking pages so we can't use it here
5918bc69f433Saguzovsk 	 * if pp is non NULL because segvn already locked pages
5919bc69f433Saguzovsk 	 * SE_EXCL. Instead we rely on the fact that a forced umount or
5920bc69f433Saguzovsk 	 * applying a filesystem lock via ufs_fiolfs() will block in the
5921bc69f433Saguzovsk 	 * implicit call to ufs_flush() until we unlock the pages after the
5922bc69f433Saguzovsk 	 * return to segvn. Other ufs_quiesce() callers keep ufs_quiesce_pend
5923bc69f433Saguzovsk 	 * above 0 until they are done. We have to be careful not to increment
5924bc69f433Saguzovsk 	 * ul_vnops_cnt here after forceful unmount hlocks the file system.
5925bc69f433Saguzovsk 	 *
5926bc69f433Saguzovsk 	 * If pp is NULL use ul_lock to make sure we don't increment
5927bc69f433Saguzovsk 	 * ul_vnops_cnt after forceful unmount hlocks the file system.
5928bc69f433Saguzovsk 	 */
5929bc69f433Saguzovsk 	if (vmpss || pp == NULL) {
5930bc69f433Saguzovsk 		ulp = &ufsvfsp->vfs_ulockfs;
5931bc69f433Saguzovsk 		if (pp == NULL)
5932bc69f433Saguzovsk 			mutex_enter(&ulp->ul_lock);
5933bc69f433Saguzovsk 		if (ulp->ul_fs_lock & ULOCKFS_GETREAD_MASK) {
5934bc69f433Saguzovsk 			if (pp == NULL) {
5935bc69f433Saguzovsk 				mutex_exit(&ulp->ul_lock);
5936bc69f433Saguzovsk 			}
5937bc69f433Saguzovsk 			return (vmpss ? EIO : EINVAL);
5938bc69f433Saguzovsk 		}
5939bc69f433Saguzovsk 		atomic_add_long(&ulp->ul_vnops_cnt, 1);
5940bc69f433Saguzovsk 		if (pp == NULL)
5941bc69f433Saguzovsk 			mutex_exit(&ulp->ul_lock);
5942bc69f433Saguzovsk 		if (ufs_quiesce_pend) {
5943bc69f433Saguzovsk 			if (!atomic_add_long_nv(&ulp->ul_vnops_cnt, -1))
5944bc69f433Saguzovsk 				cv_broadcast(&ulp->ul_cv);
5945bc69f433Saguzovsk 			return (vmpss ? EIO : EINVAL);
5946bc69f433Saguzovsk 		}
5947bc69f433Saguzovsk 	}
5948bc69f433Saguzovsk 
59497c478bd9Sstevel@tonic-gate 	if (dolock) {
59507c478bd9Sstevel@tonic-gate 		/*
59517c478bd9Sstevel@tonic-gate 		 * segvn may call VOP_PAGEIO() instead of VOP_GETPAGE() to
59527c478bd9Sstevel@tonic-gate 		 * handle a fault against a segment that maps vnode pages with
59537c478bd9Sstevel@tonic-gate 		 * large mappings.  Segvn creates pages and holds them locked
59547c478bd9Sstevel@tonic-gate 		 * SE_EXCL during VOP_PAGEIO() call. In this case we have to
59557c478bd9Sstevel@tonic-gate 		 * use rw_tryenter() to avoid a potential deadlock since in
59567c478bd9Sstevel@tonic-gate 		 * lock order i_contents needs to be taken first.
59577c478bd9Sstevel@tonic-gate 		 * Segvn will retry via VOP_GETPAGE() if VOP_PAGEIO() fails.
59587c478bd9Sstevel@tonic-gate 		 */
59597c478bd9Sstevel@tonic-gate 		if (!vmpss) {
59607c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
59617c478bd9Sstevel@tonic-gate 		} else if (!rw_tryenter(&ip->i_contents, RW_READER)) {
5962bc69f433Saguzovsk 			if (!atomic_add_long_nv(&ulp->ul_vnops_cnt, -1))
5963bc69f433Saguzovsk 				cv_broadcast(&ulp->ul_cv);
59647c478bd9Sstevel@tonic-gate 			return (EDEADLK);
59657c478bd9Sstevel@tonic-gate 		}
59667c478bd9Sstevel@tonic-gate 	}
59677c478bd9Sstevel@tonic-gate 
596837fbc076Saguzovsk 	/*
596937fbc076Saguzovsk 	 * Return an error to segvn because the pagefault request is beyond
597037fbc076Saguzovsk 	 * PAGESIZE rounded EOF.
597137fbc076Saguzovsk 	 */
597237fbc076Saguzovsk 	if (vmpss && btopr(io_off + io_len) > btopr(ip->i_size)) {
597337fbc076Saguzovsk 		if (dolock)
597437fbc076Saguzovsk 			rw_exit(&ip->i_contents);
5975bc69f433Saguzovsk 		if (!atomic_add_long_nv(&ulp->ul_vnops_cnt, -1))
5976bc69f433Saguzovsk 			cv_broadcast(&ulp->ul_cv);
597737fbc076Saguzovsk 		return (EFAULT);
597837fbc076Saguzovsk 	}
597937fbc076Saguzovsk 
59807c478bd9Sstevel@tonic-gate 	if (pp == NULL) {
59817c478bd9Sstevel@tonic-gate 		if (bmap_has_holes(ip)) {
59827c478bd9Sstevel@tonic-gate 			err = ENOSYS;
59837c478bd9Sstevel@tonic-gate 		} else {
59847c478bd9Sstevel@tonic-gate 			err = EINVAL;
59857c478bd9Sstevel@tonic-gate 		}
59867c478bd9Sstevel@tonic-gate 		if (dolock)
59877c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
5988bc69f433Saguzovsk 		if (!atomic_add_long_nv(&ulp->ul_vnops_cnt, -1))
5989bc69f433Saguzovsk 			cv_broadcast(&ulp->ul_cv);
59907c478bd9Sstevel@tonic-gate 		return (err);
59917c478bd9Sstevel@tonic-gate 	}
59927c478bd9Sstevel@tonic-gate 
59937c478bd9Sstevel@tonic-gate 	/*
59947c478bd9Sstevel@tonic-gate 	 * Break the io request into chunks, one for each contiguous
59957c478bd9Sstevel@tonic-gate 	 * stretch of disk blocks in the target file.
59967c478bd9Sstevel@tonic-gate 	 */
59977c478bd9Sstevel@tonic-gate 	while (done_len < io_len) {
59987c478bd9Sstevel@tonic-gate 		ASSERT(cpp);
59997c478bd9Sstevel@tonic-gate 		contig = 0;
60007c478bd9Sstevel@tonic-gate 		if (err = bmap_read(ip, (u_offset_t)(io_off + done_len),
600180d34432Sfrankho 		    &bn, &contig))
60027c478bd9Sstevel@tonic-gate 			break;
60037c478bd9Sstevel@tonic-gate 
60047c478bd9Sstevel@tonic-gate 		if (bn == UFS_HOLE) {	/* No holey swapfiles */
60057c478bd9Sstevel@tonic-gate 			if (vmpss) {
60067c478bd9Sstevel@tonic-gate 				err = EFAULT;
60077c478bd9Sstevel@tonic-gate 				break;
60087c478bd9Sstevel@tonic-gate 			}
60097c478bd9Sstevel@tonic-gate 			err = ufs_fault(ITOV(ip), "ufs_pageio: bn == UFS_HOLE");
60107c478bd9Sstevel@tonic-gate 			break;
60117c478bd9Sstevel@tonic-gate 		}
60127c478bd9Sstevel@tonic-gate 
60137c478bd9Sstevel@tonic-gate 		cur_len = MIN(io_len - done_len, contig);
60147c478bd9Sstevel@tonic-gate 		/*
60157c478bd9Sstevel@tonic-gate 		 * Zero out a page beyond EOF, when the last block of
60167c478bd9Sstevel@tonic-gate 		 * a file is a UFS fragment so that ufs_pageio() can be used
60177c478bd9Sstevel@tonic-gate 		 * instead of ufs_getpage() to handle faults against
60187c478bd9Sstevel@tonic-gate 		 * segvn segments that use large pages.
60197c478bd9Sstevel@tonic-gate 		 */
60207c478bd9Sstevel@tonic-gate 		page_list_break(&cpp, &npp, btopr(cur_len));
60217c478bd9Sstevel@tonic-gate 		if ((flags & B_READ) && (cur_len & PAGEOFFSET)) {
60227c478bd9Sstevel@tonic-gate 			size_t xlen = cur_len & PAGEOFFSET;
60237c478bd9Sstevel@tonic-gate 			pagezero(cpp->p_prev, xlen, PAGESIZE - xlen);
60247c478bd9Sstevel@tonic-gate 		}
60257c478bd9Sstevel@tonic-gate 
60267c478bd9Sstevel@tonic-gate 		bp = pageio_setup(cpp, cur_len, ip->i_devvp, flags);
60277c478bd9Sstevel@tonic-gate 		ASSERT(bp != NULL);
60287c478bd9Sstevel@tonic-gate 
60297c478bd9Sstevel@tonic-gate 		bp->b_edev = ip->i_dev;
60307c478bd9Sstevel@tonic-gate 		bp->b_dev = cmpdev(ip->i_dev);
60317c478bd9Sstevel@tonic-gate 		bp->b_blkno = bn;
60327c478bd9Sstevel@tonic-gate 		bp->b_un.b_addr = (caddr_t)0;
60337c478bd9Sstevel@tonic-gate 		bp->b_file = ip->i_vnode;
60347c478bd9Sstevel@tonic-gate 
60357c478bd9Sstevel@tonic-gate 		ufsvfsp->vfs_iotstamp = lbolt;
60367c478bd9Sstevel@tonic-gate 		ub.ub_pageios.value.ul++;
60377c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_snapshot)
60387c478bd9Sstevel@tonic-gate 			fssnap_strategy(&(ufsvfsp->vfs_snapshot), bp);
60397c478bd9Sstevel@tonic-gate 		else
60407c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
60417c478bd9Sstevel@tonic-gate 
60427c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60437c478bd9Sstevel@tonic-gate 			ufs_pageio_reads++;
60447c478bd9Sstevel@tonic-gate 		else
60457c478bd9Sstevel@tonic-gate 			ufs_pageio_writes++;
60467c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60477c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_INBLK, 1);
60487c478bd9Sstevel@tonic-gate 		else
60497c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
60507c478bd9Sstevel@tonic-gate 		/*
60517c478bd9Sstevel@tonic-gate 		 * If the request is not B_ASYNC, wait for i/o to complete
60527c478bd9Sstevel@tonic-gate 		 * and re-assemble the page list to return to the caller.
60537c478bd9Sstevel@tonic-gate 		 * If it is B_ASYNC we leave the page list in pieces and
60547c478bd9Sstevel@tonic-gate 		 * cleanup() will dispose of them.
60557c478bd9Sstevel@tonic-gate 		 */
60567c478bd9Sstevel@tonic-gate 		if ((flags & B_ASYNC) == 0) {
60577c478bd9Sstevel@tonic-gate 			err = biowait(bp);
60587c478bd9Sstevel@tonic-gate 			pageio_done(bp);
60597c478bd9Sstevel@tonic-gate 			if (err)
60607c478bd9Sstevel@tonic-gate 				break;
60617c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &cpp);
60627c478bd9Sstevel@tonic-gate 		}
60637c478bd9Sstevel@tonic-gate 		cpp = npp;
60647c478bd9Sstevel@tonic-gate 		npp = NULL;
60657c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60667c478bd9Sstevel@tonic-gate 			cur_len = P2ROUNDUP_TYPED(cur_len, PAGESIZE, size_t);
60677c478bd9Sstevel@tonic-gate 		done_len += cur_len;
60687c478bd9Sstevel@tonic-gate 	}
60697c478bd9Sstevel@tonic-gate 	ASSERT(err || (cpp == NULL && npp == NULL && done_len == io_len));
60707c478bd9Sstevel@tonic-gate 	if (err) {
60717c478bd9Sstevel@tonic-gate 		if (flags & B_ASYNC) {
60727c478bd9Sstevel@tonic-gate 			/* Cleanup unprocessed parts of list */
60737c478bd9Sstevel@tonic-gate 			page_list_concat(&cpp, &npp);
60747c478bd9Sstevel@tonic-gate 			if (flags & B_READ)
60757c478bd9Sstevel@tonic-gate 				pvn_read_done(cpp, B_ERROR);
60767c478bd9Sstevel@tonic-gate 			else
60777c478bd9Sstevel@tonic-gate 				pvn_write_done(cpp, B_ERROR);
60787c478bd9Sstevel@tonic-gate 		} else {
60797c478bd9Sstevel@tonic-gate 			/* Re-assemble list and let caller clean up */
60807c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &cpp);
60817c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &npp);
60827c478bd9Sstevel@tonic-gate 		}
60837c478bd9Sstevel@tonic-gate 	}
6084bc69f433Saguzovsk 
6085bc69f433Saguzovsk 	if (vmpss && !(ip->i_flag & IACC) && !ULOCKFS_IS_NOIACC(ulp) &&
6086bc69f433Saguzovsk 	    ufsvfsp->vfs_fs->fs_ronly == 0 && !ufsvfsp->vfs_noatime) {
6087bc69f433Saguzovsk 		mutex_enter(&ip->i_tlock);
6088bc69f433Saguzovsk 		ip->i_flag |= IACC;
6089bc69f433Saguzovsk 		ITIMES_NOLOCK(ip);
6090bc69f433Saguzovsk 		mutex_exit(&ip->i_tlock);
6091bc69f433Saguzovsk 	}
6092bc69f433Saguzovsk 
60937c478bd9Sstevel@tonic-gate 	if (dolock)
60947c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
6095bc69f433Saguzovsk 	if (vmpss && !atomic_add_long_nv(&ulp->ul_vnops_cnt, -1))
6096bc69f433Saguzovsk 		cv_broadcast(&ulp->ul_cv);
60977c478bd9Sstevel@tonic-gate 	return (err);
60987c478bd9Sstevel@tonic-gate }
60997c478bd9Sstevel@tonic-gate 
61007c478bd9Sstevel@tonic-gate /*
61017c478bd9Sstevel@tonic-gate  * Called when the kernel is in a frozen state to dump data
61027c478bd9Sstevel@tonic-gate  * directly to the device. It uses a private dump data structure,
61037c478bd9Sstevel@tonic-gate  * set up by dump_ctl, to locate the correct disk block to which to dump.
61047c478bd9Sstevel@tonic-gate  */
6105da6c28aaSamw /*ARGSUSED*/
61067c478bd9Sstevel@tonic-gate static int
6107d7334e51Srm ufs_dump(vnode_t *vp, caddr_t addr, offset_t ldbn, offset_t dblks,
6108d7334e51Srm     caller_context_t *ct)
61097c478bd9Sstevel@tonic-gate {
61107c478bd9Sstevel@tonic-gate 	u_offset_t	file_size;
61117c478bd9Sstevel@tonic-gate 	struct inode    *ip = VTOI(vp);
61127c478bd9Sstevel@tonic-gate 	struct fs	*fs = ip->i_fs;
61137c478bd9Sstevel@tonic-gate 	daddr_t		dbn, lfsbn;
61147c478bd9Sstevel@tonic-gate 	int		disk_blks = fs->fs_bsize >> DEV_BSHIFT;
61157c478bd9Sstevel@tonic-gate 	int		error = 0;
61167c478bd9Sstevel@tonic-gate 	int		ndbs, nfsbs;
61177c478bd9Sstevel@tonic-gate 
61187c478bd9Sstevel@tonic-gate 	/*
61197c478bd9Sstevel@tonic-gate 	 * forced unmount case
61207c478bd9Sstevel@tonic-gate 	 */
61217c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
61227c478bd9Sstevel@tonic-gate 		return (EIO);
61237c478bd9Sstevel@tonic-gate 	/*
61247c478bd9Sstevel@tonic-gate 	 * Validate the inode that it has not been modified since
61257c478bd9Sstevel@tonic-gate 	 * the dump structure is allocated.
61267c478bd9Sstevel@tonic-gate 	 */
61277c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
61287c478bd9Sstevel@tonic-gate 	if ((dump_info == NULL) ||
61297c478bd9Sstevel@tonic-gate 	    (dump_info->ip != ip) ||
61307c478bd9Sstevel@tonic-gate 	    (dump_info->time.tv_sec != ip->i_mtime.tv_sec) ||
61317c478bd9Sstevel@tonic-gate 	    (dump_info->time.tv_usec != ip->i_mtime.tv_usec)) {
61327c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
61337c478bd9Sstevel@tonic-gate 		return (-1);
61347c478bd9Sstevel@tonic-gate 	}
61357c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
61367c478bd9Sstevel@tonic-gate 
61377c478bd9Sstevel@tonic-gate 	/*
61387c478bd9Sstevel@tonic-gate 	 * See that the file has room for this write
61397c478bd9Sstevel@tonic-gate 	 */
61407c478bd9Sstevel@tonic-gate 	UFS_GET_ISIZE(&file_size, ip);
61417c478bd9Sstevel@tonic-gate 
6142d7334e51Srm 	if (ldbtob(ldbn + dblks) > file_size)
61437c478bd9Sstevel@tonic-gate 		return (ENOSPC);
61447c478bd9Sstevel@tonic-gate 
61457c478bd9Sstevel@tonic-gate 	/*
61467c478bd9Sstevel@tonic-gate 	 * Find the physical disk block numbers from the dump
61477c478bd9Sstevel@tonic-gate 	 * private data structure directly and write out the data
61487c478bd9Sstevel@tonic-gate 	 * in contiguous block lumps
61497c478bd9Sstevel@tonic-gate 	 */
61507c478bd9Sstevel@tonic-gate 	while (dblks > 0 && !error) {
6151d7334e51Srm 		lfsbn = (daddr_t)lblkno(fs, ldbtob(ldbn));
61527c478bd9Sstevel@tonic-gate 		dbn = fsbtodb(fs, dump_info->dblk[lfsbn]) + ldbn % disk_blks;
61537c478bd9Sstevel@tonic-gate 		nfsbs = 1;
61547c478bd9Sstevel@tonic-gate 		ndbs = disk_blks - ldbn % disk_blks;
61557c478bd9Sstevel@tonic-gate 		while (ndbs < dblks && fsbtodb(fs, dump_info->dblk[lfsbn +
61567c478bd9Sstevel@tonic-gate 		    nfsbs]) == dbn + ndbs) {
61577c478bd9Sstevel@tonic-gate 			nfsbs++;
61587c478bd9Sstevel@tonic-gate 			ndbs += disk_blks;
61597c478bd9Sstevel@tonic-gate 		}
61607c478bd9Sstevel@tonic-gate 		if (ndbs > dblks)
61617c478bd9Sstevel@tonic-gate 			ndbs = dblks;
61627c478bd9Sstevel@tonic-gate 		error = bdev_dump(ip->i_dev, addr, dbn, ndbs);
61637c478bd9Sstevel@tonic-gate 		addr += ldbtob((offset_t)ndbs);
61647c478bd9Sstevel@tonic-gate 		dblks -= ndbs;
61657c478bd9Sstevel@tonic-gate 		ldbn += ndbs;
61667c478bd9Sstevel@tonic-gate 	}
61677c478bd9Sstevel@tonic-gate 	return (error);
61687c478bd9Sstevel@tonic-gate 
61697c478bd9Sstevel@tonic-gate }
61707c478bd9Sstevel@tonic-gate 
61717c478bd9Sstevel@tonic-gate /*
61727c478bd9Sstevel@tonic-gate  * Prepare the file system before and after the dump operation.
61737c478bd9Sstevel@tonic-gate  *
61747c478bd9Sstevel@tonic-gate  * action = DUMP_ALLOC:
61757c478bd9Sstevel@tonic-gate  * Preparation before dump, allocate dump private data structure
61767c478bd9Sstevel@tonic-gate  * to hold all the direct and indirect block info for dump.
61777c478bd9Sstevel@tonic-gate  *
61787c478bd9Sstevel@tonic-gate  * action = DUMP_FREE:
61797c478bd9Sstevel@tonic-gate  * Clean up after dump, deallocate the dump private data structure.
61807c478bd9Sstevel@tonic-gate  *
61817c478bd9Sstevel@tonic-gate  * action = DUMP_SCAN:
61827c478bd9Sstevel@tonic-gate  * Scan dump_info for *blkp DEV_BSIZE blocks of contig fs space;
61837c478bd9Sstevel@tonic-gate  * if found, the starting file-relative DEV_BSIZE lbn is written
61847c478bd9Sstevel@tonic-gate  * to *bklp; that lbn is intended for use with VOP_DUMP()
61857c478bd9Sstevel@tonic-gate  */
6186da6c28aaSamw /*ARGSUSED*/
61877c478bd9Sstevel@tonic-gate static int
6188d7334e51Srm ufs_dumpctl(vnode_t *vp, int action, offset_t *blkp, caller_context_t *ct)
61897c478bd9Sstevel@tonic-gate {
61907c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
61917c478bd9Sstevel@tonic-gate 	ufsvfs_t	*ufsvfsp = ip->i_ufsvfs;
61927c478bd9Sstevel@tonic-gate 	struct fs	*fs;
61937c478bd9Sstevel@tonic-gate 	daddr32_t	*dblk, *storeblk;
61947c478bd9Sstevel@tonic-gate 	daddr32_t	*nextblk, *endblk;
61957c478bd9Sstevel@tonic-gate 	struct buf	*bp;
61967c478bd9Sstevel@tonic-gate 	int		i, entry, entries;
61977c478bd9Sstevel@tonic-gate 	int		n, ncontig;
61987c478bd9Sstevel@tonic-gate 
61997c478bd9Sstevel@tonic-gate 	/*
62007c478bd9Sstevel@tonic-gate 	 * check for forced unmount
62017c478bd9Sstevel@tonic-gate 	 */
62027c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
62037c478bd9Sstevel@tonic-gate 		return (EIO);
62047c478bd9Sstevel@tonic-gate 
62057c478bd9Sstevel@tonic-gate 	if (action == DUMP_ALLOC) {
62067c478bd9Sstevel@tonic-gate 		/*
62077c478bd9Sstevel@tonic-gate 		 * alloc and record dump_info
62087c478bd9Sstevel@tonic-gate 		 */
62097c478bd9Sstevel@tonic-gate 		if (dump_info != NULL)
62107c478bd9Sstevel@tonic-gate 			return (EINVAL);
62117c478bd9Sstevel@tonic-gate 
62127c478bd9Sstevel@tonic-gate 		ASSERT(vp->v_type == VREG);
62137c478bd9Sstevel@tonic-gate 		fs = ufsvfsp->vfs_fs;
62147c478bd9Sstevel@tonic-gate 
62157c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
62167c478bd9Sstevel@tonic-gate 
62177c478bd9Sstevel@tonic-gate 		if (bmap_has_holes(ip)) {
62187c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
62197c478bd9Sstevel@tonic-gate 			return (EFAULT);
62207c478bd9Sstevel@tonic-gate 		}
62217c478bd9Sstevel@tonic-gate 
62227c478bd9Sstevel@tonic-gate 		/*
62237c478bd9Sstevel@tonic-gate 		 * calculate and allocate space needed according to i_size
62247c478bd9Sstevel@tonic-gate 		 */
62257c478bd9Sstevel@tonic-gate 		entries = (int)lblkno(fs, blkroundup(fs, ip->i_size));
622680d34432Sfrankho 		dump_info = kmem_alloc(sizeof (struct dump) +
622780d34432Sfrankho 		    (entries - 1) * sizeof (daddr32_t), KM_NOSLEEP);
622880d34432Sfrankho 		if (dump_info == NULL) {
622980d34432Sfrankho 			rw_exit(&ip->i_contents);
623080d34432Sfrankho 			return (ENOMEM);
62317c478bd9Sstevel@tonic-gate 		}
62327c478bd9Sstevel@tonic-gate 
62337c478bd9Sstevel@tonic-gate 		/* Start saving the info */
62347c478bd9Sstevel@tonic-gate 		dump_info->fsbs = entries;
62357c478bd9Sstevel@tonic-gate 		dump_info->ip = ip;
62367c478bd9Sstevel@tonic-gate 		storeblk = &dump_info->dblk[0];
62377c478bd9Sstevel@tonic-gate 
62387c478bd9Sstevel@tonic-gate 		/* Direct Blocks */
62397c478bd9Sstevel@tonic-gate 		for (entry = 0; entry < NDADDR && entry < entries; entry++)
62407c478bd9Sstevel@tonic-gate 			*storeblk++ = ip->i_db[entry];
62417c478bd9Sstevel@tonic-gate 
62427c478bd9Sstevel@tonic-gate 		/* Indirect Blocks */
62437c478bd9Sstevel@tonic-gate 		for (i = 0; i < NIADDR; i++) {
62447c478bd9Sstevel@tonic-gate 			int error = 0;
62457c478bd9Sstevel@tonic-gate 
62467c478bd9Sstevel@tonic-gate 			bp = UFS_BREAD(ufsvfsp,
624780d34432Sfrankho 			    ip->i_dev, fsbtodb(fs, ip->i_ib[i]), fs->fs_bsize);
62487c478bd9Sstevel@tonic-gate 			if (bp->b_flags & B_ERROR)
62497c478bd9Sstevel@tonic-gate 				error = EIO;
62507c478bd9Sstevel@tonic-gate 			else {
62517c478bd9Sstevel@tonic-gate 				dblk = bp->b_un.b_daddr;
62527c478bd9Sstevel@tonic-gate 				if ((storeblk = save_dblks(ip, ufsvfsp,
62537c478bd9Sstevel@tonic-gate 				    storeblk, dblk, i, entries)) == NULL)
62547c478bd9Sstevel@tonic-gate 					error = EIO;
62557c478bd9Sstevel@tonic-gate 			}
62567c478bd9Sstevel@tonic-gate 
62577c478bd9Sstevel@tonic-gate 			brelse(bp);
62587c478bd9Sstevel@tonic-gate 
62597c478bd9Sstevel@tonic-gate 			if (error != 0) {
62607c478bd9Sstevel@tonic-gate 				kmem_free(dump_info, sizeof (struct dump) +
62617c478bd9Sstevel@tonic-gate 				    (entries - 1) * sizeof (daddr32_t));
62627c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
62637c478bd9Sstevel@tonic-gate 				dump_info = NULL;
62647c478bd9Sstevel@tonic-gate 				return (error);
62657c478bd9Sstevel@tonic-gate 			}
62667c478bd9Sstevel@tonic-gate 		}
62677c478bd9Sstevel@tonic-gate 		/* and time stamp the information */
62687c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
62697c478bd9Sstevel@tonic-gate 		dump_info->time = ip->i_mtime;
62707c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
62717c478bd9Sstevel@tonic-gate 
62727c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
62737c478bd9Sstevel@tonic-gate 	} else if (action == DUMP_FREE) {
62747c478bd9Sstevel@tonic-gate 		/*
62757c478bd9Sstevel@tonic-gate 		 * free dump_info
62767c478bd9Sstevel@tonic-gate 		 */
62777c478bd9Sstevel@tonic-gate 		if (dump_info == NULL)
62787c478bd9Sstevel@tonic-gate 			return (EINVAL);
62797c478bd9Sstevel@tonic-gate 		entries = dump_info->fsbs - 1;
62807c478bd9Sstevel@tonic-gate 		kmem_free(dump_info, sizeof (struct dump) +
62817c478bd9Sstevel@tonic-gate 		    entries * sizeof (daddr32_t));
62827c478bd9Sstevel@tonic-gate 		dump_info = NULL;
62837c478bd9Sstevel@tonic-gate 	} else if (action == DUMP_SCAN) {
62847c478bd9Sstevel@tonic-gate 		/*
62857c478bd9Sstevel@tonic-gate 		 * scan dump_info
62867c478bd9Sstevel@tonic-gate 		 */
62877c478bd9Sstevel@tonic-gate 		if (dump_info == NULL)
62887c478bd9Sstevel@tonic-gate 			return (EINVAL);
62897c478bd9Sstevel@tonic-gate 
62907c478bd9Sstevel@tonic-gate 		dblk = dump_info->dblk;
62917c478bd9Sstevel@tonic-gate 		nextblk = dblk + 1;
62927c478bd9Sstevel@tonic-gate 		endblk = dblk + dump_info->fsbs - 1;
62937c478bd9Sstevel@tonic-gate 		fs = ufsvfsp->vfs_fs;
62947c478bd9Sstevel@tonic-gate 		ncontig = *blkp >> (fs->fs_bshift - DEV_BSHIFT);
62957c478bd9Sstevel@tonic-gate 
62967c478bd9Sstevel@tonic-gate 		/*
62977c478bd9Sstevel@tonic-gate 		 * scan dblk[] entries; contig fs space is found when:
62987c478bd9Sstevel@tonic-gate 		 * ((current blkno + frags per block) == next blkno)
62997c478bd9Sstevel@tonic-gate 		 */
63007c478bd9Sstevel@tonic-gate 		n = 0;
63017c478bd9Sstevel@tonic-gate 		while (n < ncontig && dblk < endblk) {
63027c478bd9Sstevel@tonic-gate 			if ((*dblk + fs->fs_frag) == *nextblk)
63037c478bd9Sstevel@tonic-gate 				n++;
63047c478bd9Sstevel@tonic-gate 			else
63057c478bd9Sstevel@tonic-gate 				n = 0;
63067c478bd9Sstevel@tonic-gate 			dblk++;
63077c478bd9Sstevel@tonic-gate 			nextblk++;
63087c478bd9Sstevel@tonic-gate 		}
63097c478bd9Sstevel@tonic-gate 
63107c478bd9Sstevel@tonic-gate 		/*
63117c478bd9Sstevel@tonic-gate 		 * index is where size bytes of contig space begins;
63127c478bd9Sstevel@tonic-gate 		 * conversion from index to the file's DEV_BSIZE lbn
63137c478bd9Sstevel@tonic-gate 		 * is equivalent to:  (index * fs_bsize) / DEV_BSIZE
63147c478bd9Sstevel@tonic-gate 		 */
63157c478bd9Sstevel@tonic-gate 		if (n == ncontig) {
63167c478bd9Sstevel@tonic-gate 			i = (dblk - dump_info->dblk) - ncontig;
63177c478bd9Sstevel@tonic-gate 			*blkp = i << (fs->fs_bshift - DEV_BSHIFT);
63187c478bd9Sstevel@tonic-gate 		} else
63197c478bd9Sstevel@tonic-gate 			return (EFAULT);
63207c478bd9Sstevel@tonic-gate 	}
63217c478bd9Sstevel@tonic-gate 	return (0);
63227c478bd9Sstevel@tonic-gate }
63237c478bd9Sstevel@tonic-gate 
63247c478bd9Sstevel@tonic-gate /*
63257c478bd9Sstevel@tonic-gate  * Recursive helper function for ufs_dumpctl().  It follows the indirect file
63267c478bd9Sstevel@tonic-gate  * system  blocks until it reaches the the disk block addresses, which are
63277c478bd9Sstevel@tonic-gate  * then stored into the given buffer, storeblk.
63287c478bd9Sstevel@tonic-gate  */
63297c478bd9Sstevel@tonic-gate static daddr32_t *
63307c478bd9Sstevel@tonic-gate save_dblks(struct inode *ip, struct ufsvfs *ufsvfsp,  daddr32_t *storeblk,
63317c478bd9Sstevel@tonic-gate     daddr32_t *dblk, int level, int entries)
63327c478bd9Sstevel@tonic-gate {
63337c478bd9Sstevel@tonic-gate 	struct fs	*fs = ufsvfsp->vfs_fs;
63347c478bd9Sstevel@tonic-gate 	struct buf	*bp;
63357c478bd9Sstevel@tonic-gate 	int		i;
63367c478bd9Sstevel@tonic-gate 
63377c478bd9Sstevel@tonic-gate 	if (level == 0) {
63387c478bd9Sstevel@tonic-gate 		for (i = 0; i < NINDIR(fs); i++) {
63397c478bd9Sstevel@tonic-gate 			if (storeblk - dump_info->dblk >= entries)
63407c478bd9Sstevel@tonic-gate 				break;
63417c478bd9Sstevel@tonic-gate 			*storeblk++ = dblk[i];
63427c478bd9Sstevel@tonic-gate 		}
63437c478bd9Sstevel@tonic-gate 		return (storeblk);
63447c478bd9Sstevel@tonic-gate 	}
63457c478bd9Sstevel@tonic-gate 	for (i = 0; i < NINDIR(fs); i++) {
63467c478bd9Sstevel@tonic-gate 		if (storeblk - dump_info->dblk >= entries)
63477c478bd9Sstevel@tonic-gate 			break;
63487c478bd9Sstevel@tonic-gate 		bp = UFS_BREAD(ufsvfsp,
634980d34432Sfrankho 		    ip->i_dev, fsbtodb(fs, dblk[i]), fs->fs_bsize);
63507c478bd9Sstevel@tonic-gate 		if (bp->b_flags & B_ERROR) {
63517c478bd9Sstevel@tonic-gate 			brelse(bp);
63527c478bd9Sstevel@tonic-gate 			return (NULL);
63537c478bd9Sstevel@tonic-gate 		}
63547c478bd9Sstevel@tonic-gate 		storeblk = save_dblks(ip, ufsvfsp, storeblk, bp->b_un.b_daddr,
63557c478bd9Sstevel@tonic-gate 		    level - 1, entries);
63567c478bd9Sstevel@tonic-gate 		brelse(bp);
63577c478bd9Sstevel@tonic-gate 
63587c478bd9Sstevel@tonic-gate 		if (storeblk == NULL)
63597c478bd9Sstevel@tonic-gate 			return (NULL);
63607c478bd9Sstevel@tonic-gate 	}
63617c478bd9Sstevel@tonic-gate 	return (storeblk);
63627c478bd9Sstevel@tonic-gate }
63637c478bd9Sstevel@tonic-gate 
63647c478bd9Sstevel@tonic-gate /* ARGSUSED */
63657c478bd9Sstevel@tonic-gate static int
63667c478bd9Sstevel@tonic-gate ufs_getsecattr(struct vnode *vp, vsecattr_t *vsap, int flag,
6367da6c28aaSamw 	struct cred *cr, caller_context_t *ct)
63687c478bd9Sstevel@tonic-gate {
63697c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
63707c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
63717c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = ip->i_ufsvfs;
63727c478bd9Sstevel@tonic-gate 	ulong_t		vsa_mask = vsap->vsa_mask;
63737c478bd9Sstevel@tonic-gate 	int		err = EINVAL;
63747c478bd9Sstevel@tonic-gate 
63757c478bd9Sstevel@tonic-gate 	vsa_mask &= (VSA_ACL | VSA_ACLCNT | VSA_DFACL | VSA_DFACLCNT);
63767c478bd9Sstevel@tonic-gate 
63777c478bd9Sstevel@tonic-gate 	/*
63787c478bd9Sstevel@tonic-gate 	 * Only grab locks if needed - they're not needed to check vsa_mask
63797c478bd9Sstevel@tonic-gate 	 * or if the mask contains no acl flags.
63807c478bd9Sstevel@tonic-gate 	 */
63817c478bd9Sstevel@tonic-gate 	if (vsa_mask != 0) {
63827c478bd9Sstevel@tonic-gate 		if (err = ufs_lockfs_begin(ufsvfsp, &ulp,
63837c478bd9Sstevel@tonic-gate 		    ULOCKFS_GETATTR_MASK))
63847c478bd9Sstevel@tonic-gate 			return (err);
63857c478bd9Sstevel@tonic-gate 
63867c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
63877c478bd9Sstevel@tonic-gate 		err = ufs_acl_get(ip, vsap, flag, cr);
63887c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
63897c478bd9Sstevel@tonic-gate 
63907c478bd9Sstevel@tonic-gate 		if (ulp)
63917c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
63927c478bd9Sstevel@tonic-gate 	}
63937c478bd9Sstevel@tonic-gate 	return (err);
63947c478bd9Sstevel@tonic-gate }
63957c478bd9Sstevel@tonic-gate 
63967c478bd9Sstevel@tonic-gate /* ARGSUSED */
63977c478bd9Sstevel@tonic-gate static int
6398da6c28aaSamw ufs_setsecattr(struct vnode *vp, vsecattr_t *vsap, int flag, struct cred *cr,
6399da6c28aaSamw 	caller_context_t *ct)
64007c478bd9Sstevel@tonic-gate {
64017c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
64027c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp = NULL;
64037c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
64047c478bd9Sstevel@tonic-gate 	ulong_t		vsa_mask = vsap->vsa_mask;
64057c478bd9Sstevel@tonic-gate 	int		err;
64067c478bd9Sstevel@tonic-gate 	int		haverwlock = 1;
64077c478bd9Sstevel@tonic-gate 	int		trans_size;
64087c478bd9Sstevel@tonic-gate 	int		donetrans = 0;
64097c478bd9Sstevel@tonic-gate 	int		retry = 1;
64107c478bd9Sstevel@tonic-gate 
64117c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_rwlock));
64127c478bd9Sstevel@tonic-gate 
64137c478bd9Sstevel@tonic-gate 	/* Abort now if the request is either empty or invalid. */
64147c478bd9Sstevel@tonic-gate 	vsa_mask &= (VSA_ACL | VSA_ACLCNT | VSA_DFACL | VSA_DFACLCNT);
64157c478bd9Sstevel@tonic-gate 	if ((vsa_mask == 0) ||
64167c478bd9Sstevel@tonic-gate 	    ((vsap->vsa_aclentp == NULL) &&
64177c478bd9Sstevel@tonic-gate 	    (vsap->vsa_dfaclentp == NULL))) {
64187c478bd9Sstevel@tonic-gate 		err = EINVAL;
64197c478bd9Sstevel@tonic-gate 		goto out;
64207c478bd9Sstevel@tonic-gate 	}
64217c478bd9Sstevel@tonic-gate 
64227c478bd9Sstevel@tonic-gate 	/*
64237c478bd9Sstevel@tonic-gate 	 * Following convention, if this is a directory then we acquire the
64247c478bd9Sstevel@tonic-gate 	 * inode's i_rwlock after starting a UFS logging transaction;
64257c478bd9Sstevel@tonic-gate 	 * otherwise, we acquire it beforehand. Since we were called (and
64267c478bd9Sstevel@tonic-gate 	 * must therefore return) with the lock held, we will have to drop it,
64277c478bd9Sstevel@tonic-gate 	 * and later reacquire it, if operating on a directory.
64287c478bd9Sstevel@tonic-gate 	 */
64297c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
64307c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
64317c478bd9Sstevel@tonic-gate 		haverwlock = 0;
64327c478bd9Sstevel@tonic-gate 	} else {
64337c478bd9Sstevel@tonic-gate 		/* Upgrade the lock if required. */
64347c478bd9Sstevel@tonic-gate 		if (!rw_write_held(&ip->i_rwlock)) {
64357c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
64367c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_rwlock, RW_WRITER);
64377c478bd9Sstevel@tonic-gate 		}
64387c478bd9Sstevel@tonic-gate 	}
64397c478bd9Sstevel@tonic-gate 
64407c478bd9Sstevel@tonic-gate again:
64417c478bd9Sstevel@tonic-gate 	ASSERT(!(vp->v_type == VDIR && haverwlock));
64427c478bd9Sstevel@tonic-gate 	if (err = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SETATTR_MASK)) {
64437c478bd9Sstevel@tonic-gate 		ulp = NULL;
64447c478bd9Sstevel@tonic-gate 		retry = 0;
64457c478bd9Sstevel@tonic-gate 		goto out;
64467c478bd9Sstevel@tonic-gate 	}
64477c478bd9Sstevel@tonic-gate 
64487c478bd9Sstevel@tonic-gate 	/*
64497c478bd9Sstevel@tonic-gate 	 * Check that the file system supports this operation. Note that
64507c478bd9Sstevel@tonic-gate 	 * ufs_lockfs_begin() will have checked that the file system had
64517c478bd9Sstevel@tonic-gate 	 * not been forcibly unmounted.
64527c478bd9Sstevel@tonic-gate 	 */
64537c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_fs->fs_ronly) {
64547c478bd9Sstevel@tonic-gate 		err = EROFS;
64557c478bd9Sstevel@tonic-gate 		goto out;
64567c478bd9Sstevel@tonic-gate 	}
64577c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_nosetsec) {
64587c478bd9Sstevel@tonic-gate 		err = ENOSYS;
64597c478bd9Sstevel@tonic-gate 		goto out;
64607c478bd9Sstevel@tonic-gate 	}
64617c478bd9Sstevel@tonic-gate 
64627c478bd9Sstevel@tonic-gate 	if (ulp) {
64637c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_ASYNC(ufsvfsp, TOP_SETSECATTR,
646480d34432Sfrankho 		    trans_size = TOP_SETSECATTR_SIZE(VTOI(vp)));
64657c478bd9Sstevel@tonic-gate 		donetrans = 1;
64667c478bd9Sstevel@tonic-gate 	}
64677c478bd9Sstevel@tonic-gate 
64687c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
64697c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
64707c478bd9Sstevel@tonic-gate 		haverwlock = 1;
64717c478bd9Sstevel@tonic-gate 	}
64727c478bd9Sstevel@tonic-gate 
64737c478bd9Sstevel@tonic-gate 	ASSERT(haverwlock);
64747c478bd9Sstevel@tonic-gate 
64757c478bd9Sstevel@tonic-gate 	/* Do the actual work. */
64767c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
64777c478bd9Sstevel@tonic-gate 	/*
64787c478bd9Sstevel@tonic-gate 	 * Suppress out of inodes messages if we will retry.
64797c478bd9Sstevel@tonic-gate 	 */
64807c478bd9Sstevel@tonic-gate 	if (retry)
64817c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
64827c478bd9Sstevel@tonic-gate 	err = ufs_acl_set(ip, vsap, flag, cr);
64837c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
64847c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
64857c478bd9Sstevel@tonic-gate 
64867c478bd9Sstevel@tonic-gate out:
64877c478bd9Sstevel@tonic-gate 	if (ulp) {
64887c478bd9Sstevel@tonic-gate 		if (donetrans) {
64897c478bd9Sstevel@tonic-gate 			/*
64907c478bd9Sstevel@tonic-gate 			 * top_end_async() can eventually call
64917c478bd9Sstevel@tonic-gate 			 * top_end_sync(), which can block. We must
64927c478bd9Sstevel@tonic-gate 			 * therefore observe the lock-ordering protocol
64937c478bd9Sstevel@tonic-gate 			 * here as well.
64947c478bd9Sstevel@tonic-gate 			 */
64957c478bd9Sstevel@tonic-gate 			if (vp->v_type == VDIR) {
64967c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_rwlock);
64977c478bd9Sstevel@tonic-gate 				haverwlock = 0;
64987c478bd9Sstevel@tonic-gate 			}
64997c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_SETSECATTR, trans_size);
65007c478bd9Sstevel@tonic-gate 		}
65017c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
65027c478bd9Sstevel@tonic-gate 	}
65037c478bd9Sstevel@tonic-gate 	/*
65047c478bd9Sstevel@tonic-gate 	 * If no inodes available, try scaring a logically-
65057c478bd9Sstevel@tonic-gate 	 * free one out of the delete queue to someplace
65067c478bd9Sstevel@tonic-gate 	 * that we can find it.
65077c478bd9Sstevel@tonic-gate 	 */
65087c478bd9Sstevel@tonic-gate 	if ((err == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
65097c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
65107c478bd9Sstevel@tonic-gate 		retry = 0;
65117c478bd9Sstevel@tonic-gate 		if (vp->v_type == VDIR && haverwlock) {
65127c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
65137c478bd9Sstevel@tonic-gate 			haverwlock = 0;
65147c478bd9Sstevel@tonic-gate 		}
65157c478bd9Sstevel@tonic-gate 		goto again;
65167c478bd9Sstevel@tonic-gate 	}
65177c478bd9Sstevel@tonic-gate 	/*
65187c478bd9Sstevel@tonic-gate 	 * If we need to reacquire the lock then it is safe to do so
65197c478bd9Sstevel@tonic-gate 	 * as a reader. This is because ufs_rwunlock(), which will be
65207c478bd9Sstevel@tonic-gate 	 * called by our caller after we return, does not differentiate
65217c478bd9Sstevel@tonic-gate 	 * between shared and exclusive locks.
65227c478bd9Sstevel@tonic-gate 	 */
65237c478bd9Sstevel@tonic-gate 	if (!haverwlock) {
65247c478bd9Sstevel@tonic-gate 		ASSERT(vp->v_type == VDIR);
65257c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
65267c478bd9Sstevel@tonic-gate 	}
65277c478bd9Sstevel@tonic-gate 
65287c478bd9Sstevel@tonic-gate 	return (err);
65297c478bd9Sstevel@tonic-gate }
6530