xref: /illumos-gate/usr/src/uts/common/fs/ufs/ufs_vnops.c (revision 80d5689f5d4588adc071138e25e9d0d5252d9b55)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
55b024a5bSbatschul  * Common Development and Distribution License (the "License").
65b024a5bSbatschul  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
21342440ecSPrasad Singamsetty 
227c478bd9Sstevel@tonic-gate /*
239b5097eeSOwen Roberts  * Copyright (c) 1984, 2010, Oracle and/or its affiliates. All rights reserved.
24*80d5689fSPatrick Mooney  * Copyright 2017 Joyent, Inc.
2548bbca81SDaniel Hoffman  * Copyright (c) 2016 by Delphix. All rights reserved.
267c478bd9Sstevel@tonic-gate  */
277c478bd9Sstevel@tonic-gate 
287c478bd9Sstevel@tonic-gate /*	Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T	*/
297c478bd9Sstevel@tonic-gate /*	  All Rights Reserved  	*/
307c478bd9Sstevel@tonic-gate 
317c478bd9Sstevel@tonic-gate /*
327c478bd9Sstevel@tonic-gate  * Portions of this source code were derived from Berkeley 4.3 BSD
337c478bd9Sstevel@tonic-gate  * under license from the Regents of the University of California.
347c478bd9Sstevel@tonic-gate  */
357c478bd9Sstevel@tonic-gate 
367c478bd9Sstevel@tonic-gate #include <sys/types.h>
377c478bd9Sstevel@tonic-gate #include <sys/t_lock.h>
387c478bd9Sstevel@tonic-gate #include <sys/ksynch.h>
397c478bd9Sstevel@tonic-gate #include <sys/param.h>
407c478bd9Sstevel@tonic-gate #include <sys/time.h>
417c478bd9Sstevel@tonic-gate #include <sys/systm.h>
427c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h>
437c478bd9Sstevel@tonic-gate #include <sys/resource.h>
447c478bd9Sstevel@tonic-gate #include <sys/signal.h>
457c478bd9Sstevel@tonic-gate #include <sys/cred.h>
467c478bd9Sstevel@tonic-gate #include <sys/user.h>
477c478bd9Sstevel@tonic-gate #include <sys/buf.h>
487c478bd9Sstevel@tonic-gate #include <sys/vfs.h>
49aa59c4cbSrsb #include <sys/vfs_opreg.h>
507c478bd9Sstevel@tonic-gate #include <sys/vnode.h>
517c478bd9Sstevel@tonic-gate #include <sys/proc.h>
527c478bd9Sstevel@tonic-gate #include <sys/disp.h>
537c478bd9Sstevel@tonic-gate #include <sys/file.h>
547c478bd9Sstevel@tonic-gate #include <sys/fcntl.h>
557c478bd9Sstevel@tonic-gate #include <sys/flock.h>
56bc69f433Saguzovsk #include <sys/atomic.h>
577c478bd9Sstevel@tonic-gate #include <sys/kmem.h>
587c478bd9Sstevel@tonic-gate #include <sys/uio.h>
597c478bd9Sstevel@tonic-gate #include <sys/dnlc.h>
607c478bd9Sstevel@tonic-gate #include <sys/conf.h>
617c478bd9Sstevel@tonic-gate #include <sys/mman.h>
627c478bd9Sstevel@tonic-gate #include <sys/pathname.h>
637c478bd9Sstevel@tonic-gate #include <sys/debug.h>
647c478bd9Sstevel@tonic-gate #include <sys/vmsystm.h>
657c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
667c478bd9Sstevel@tonic-gate #include <sys/filio.h>
677c478bd9Sstevel@tonic-gate #include <sys/policy.h>
687c478bd9Sstevel@tonic-gate 
697c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_fs.h>
707c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_lockfs.h>
717c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_filio.h>
727c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_inode.h>
737c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_fsdir.h>
747c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_quota.h>
757c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_log.h>
767c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_snap.h>
777c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_trans.h>
787c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_panic.h>
797c478bd9Sstevel@tonic-gate #include <sys/fs/ufs_bio.h>
807c478bd9Sstevel@tonic-gate #include <sys/dirent.h>		/* must be AFTER <sys/fs/fsdir.h>! */
817c478bd9Sstevel@tonic-gate #include <sys/errno.h>
827c478bd9Sstevel@tonic-gate #include <sys/fssnap_if.h>
837c478bd9Sstevel@tonic-gate #include <sys/unistd.h>
847c478bd9Sstevel@tonic-gate #include <sys/sunddi.h>
857c478bd9Sstevel@tonic-gate 
867c478bd9Sstevel@tonic-gate #include <sys/filio.h>		/* _FIOIO */
877c478bd9Sstevel@tonic-gate 
887c478bd9Sstevel@tonic-gate #include <vm/hat.h>
897c478bd9Sstevel@tonic-gate #include <vm/page.h>
907c478bd9Sstevel@tonic-gate #include <vm/pvn.h>
917c478bd9Sstevel@tonic-gate #include <vm/as.h>
927c478bd9Sstevel@tonic-gate #include <vm/seg.h>
937c478bd9Sstevel@tonic-gate #include <vm/seg_map.h>
947c478bd9Sstevel@tonic-gate #include <vm/seg_vn.h>
957c478bd9Sstevel@tonic-gate #include <vm/seg_kmem.h>
967c478bd9Sstevel@tonic-gate #include <vm/rm.h>
977c478bd9Sstevel@tonic-gate #include <sys/swap.h>
987c478bd9Sstevel@tonic-gate 
997c478bd9Sstevel@tonic-gate #include <fs/fs_subr.h>
1007c478bd9Sstevel@tonic-gate 
101986fd29aSsetje #include <sys/fs/decomp.h>
102986fd29aSsetje 
1037c478bd9Sstevel@tonic-gate static struct instats ins;
1047c478bd9Sstevel@tonic-gate 
1057c478bd9Sstevel@tonic-gate static 	int ufs_getpage_ra(struct vnode *, u_offset_t, struct seg *, caddr_t);
1067c478bd9Sstevel@tonic-gate static	int ufs_getpage_miss(struct vnode *, u_offset_t, size_t, struct seg *,
1077c478bd9Sstevel@tonic-gate 		caddr_t, struct page **, size_t, enum seg_rw, int);
108da6c28aaSamw static	int ufs_open(struct vnode **, int, struct cred *, caller_context_t *);
109da6c28aaSamw static	int ufs_close(struct vnode *, int, int, offset_t, struct cred *,
110da6c28aaSamw 		caller_context_t *);
1117c478bd9Sstevel@tonic-gate static	int ufs_read(struct vnode *, struct uio *, int, struct cred *,
112da6c28aaSamw 		struct caller_context *);
1137c478bd9Sstevel@tonic-gate static	int ufs_write(struct vnode *, struct uio *, int, struct cred *,
114da6c28aaSamw 		struct caller_context *);
115da6c28aaSamw static	int ufs_ioctl(struct vnode *, int, intptr_t, int, struct cred *,
116da6c28aaSamw 		int *, caller_context_t *);
117da6c28aaSamw static	int ufs_getattr(struct vnode *, struct vattr *, int, struct cred *,
118da6c28aaSamw 		caller_context_t *);
1197c478bd9Sstevel@tonic-gate static	int ufs_setattr(struct vnode *, struct vattr *, int, struct cred *,
120da6c28aaSamw 		caller_context_t *);
121da6c28aaSamw static	int ufs_access(struct vnode *, int, int, struct cred *,
122da6c28aaSamw 		caller_context_t *);
1237c478bd9Sstevel@tonic-gate static	int ufs_lookup(struct vnode *, char *, struct vnode **,
124da6c28aaSamw 		struct pathname *, int, struct vnode *, struct cred *,
125da6c28aaSamw 		caller_context_t *, int *, pathname_t *);
1267c478bd9Sstevel@tonic-gate static	int ufs_create(struct vnode *, char *, struct vattr *, enum vcexcl,
127da6c28aaSamw 		int, struct vnode **, struct cred *, int,
128da6c28aaSamw 		caller_context_t *, vsecattr_t  *);
129da6c28aaSamw static	int ufs_remove(struct vnode *, char *, struct cred *,
130da6c28aaSamw 		caller_context_t *, int);
131da6c28aaSamw static	int ufs_link(struct vnode *, struct vnode *, char *, struct cred *,
132da6c28aaSamw 		caller_context_t *, int);
1337c478bd9Sstevel@tonic-gate static	int ufs_rename(struct vnode *, char *, struct vnode *, char *,
134da6c28aaSamw 		struct cred *, caller_context_t *, int);
1357c478bd9Sstevel@tonic-gate static	int ufs_mkdir(struct vnode *, char *, struct vattr *, struct vnode **,
136da6c28aaSamw 		struct cred *, caller_context_t *, int, vsecattr_t *);
137da6c28aaSamw static	int ufs_rmdir(struct vnode *, char *, struct vnode *, struct cred *,
138da6c28aaSamw 		caller_context_t *, int);
139da6c28aaSamw static	int ufs_readdir(struct vnode *, struct uio *, struct cred *, int *,
140da6c28aaSamw 		caller_context_t *, int);
1417c478bd9Sstevel@tonic-gate static	int ufs_symlink(struct vnode *, char *, struct vattr *, char *,
142da6c28aaSamw 		struct cred *, caller_context_t *, int);
143da6c28aaSamw static	int ufs_readlink(struct vnode *, struct uio *, struct cred *,
144da6c28aaSamw 		caller_context_t *);
145da6c28aaSamw static	int ufs_fsync(struct vnode *, int, struct cred *, caller_context_t *);
146da6c28aaSamw static	void ufs_inactive(struct vnode *, struct cred *, caller_context_t *);
147da6c28aaSamw static	int ufs_fid(struct vnode *, struct fid *, caller_context_t *);
1487c478bd9Sstevel@tonic-gate static	int ufs_rwlock(struct vnode *, int, caller_context_t *);
1497c478bd9Sstevel@tonic-gate static	void ufs_rwunlock(struct vnode *, int, caller_context_t *);
150da6c28aaSamw static	int ufs_seek(struct vnode *, offset_t, offset_t *, caller_context_t *);
1517c478bd9Sstevel@tonic-gate static	int ufs_frlock(struct vnode *, int, struct flock64 *, int, offset_t,
152da6c28aaSamw 		struct flk_callback *, struct cred *,
153da6c28aaSamw 		caller_context_t *);
1547c478bd9Sstevel@tonic-gate static  int ufs_space(struct vnode *, int, struct flock64 *, int, offset_t,
1557c478bd9Sstevel@tonic-gate 		cred_t *, caller_context_t *);
1567c478bd9Sstevel@tonic-gate static	int ufs_getpage(struct vnode *, offset_t, size_t, uint_t *,
1577c478bd9Sstevel@tonic-gate 		struct page **, size_t, struct seg *, caddr_t,
158da6c28aaSamw 		enum seg_rw, struct cred *, caller_context_t *);
159da6c28aaSamw static	int ufs_putpage(struct vnode *, offset_t, size_t, int, struct cred *,
160da6c28aaSamw 		caller_context_t *);
1617c478bd9Sstevel@tonic-gate static	int ufs_putpages(struct vnode *, offset_t, size_t, int, struct cred *);
1627c478bd9Sstevel@tonic-gate static	int ufs_map(struct vnode *, offset_t, struct as *, caddr_t *, size_t,
163da6c28aaSamw 		uchar_t, uchar_t, uint_t, struct cred *, caller_context_t *);
1647c478bd9Sstevel@tonic-gate static	int ufs_addmap(struct vnode *, offset_t, struct as *, caddr_t,  size_t,
165da6c28aaSamw 		uchar_t, uchar_t, uint_t, struct cred *, caller_context_t *);
1667c478bd9Sstevel@tonic-gate static	int ufs_delmap(struct vnode *, offset_t, struct as *, caddr_t,  size_t,
167da6c28aaSamw 		uint_t, uint_t, uint_t, struct cred *, caller_context_t *);
168da6c28aaSamw static	int ufs_poll(vnode_t *, short, int, short *, struct pollhead **,
169da6c28aaSamw 		caller_context_t *);
170d7334e51Srm static	int ufs_dump(vnode_t *, caddr_t, offset_t, offset_t,
171d7334e51Srm     caller_context_t *);
172da6c28aaSamw static	int ufs_l_pathconf(struct vnode *, int, ulong_t *, struct cred *,
173da6c28aaSamw 		caller_context_t *);
1747c478bd9Sstevel@tonic-gate static	int ufs_pageio(struct vnode *, struct page *, u_offset_t, size_t, int,
175da6c28aaSamw 		struct cred *, caller_context_t *);
176d7334e51Srm static	int ufs_dumpctl(vnode_t *, int, offset_t *, caller_context_t *);
1777c478bd9Sstevel@tonic-gate static	daddr32_t *save_dblks(struct inode *, struct ufsvfs *, daddr32_t *,
178da6c28aaSamw 		daddr32_t *, int, int);
179da6c28aaSamw static	int ufs_getsecattr(struct vnode *, vsecattr_t *, int, struct cred *,
180da6c28aaSamw 		caller_context_t *);
181da6c28aaSamw static	int ufs_setsecattr(struct vnode *, vsecattr_t *, int, struct cred *,
182da6c28aaSamw 		caller_context_t *);
18360c8e821SFrank Batschulat static	int ufs_priv_access(void *, int, struct cred *);
1849b5097eeSOwen Roberts static	int ufs_eventlookup(struct vnode *, char *, struct cred *,
1859b5097eeSOwen Roberts     struct vnode **);
18602ff05a9Svsakar extern int as_map_locked(struct as *, caddr_t, size_t, int ((*)()), void *);
18702ff05a9Svsakar 
1887c478bd9Sstevel@tonic-gate /*
1897c478bd9Sstevel@tonic-gate  * For lockfs: ulockfs begin/end is now inlined in the ufs_xxx functions.
1907c478bd9Sstevel@tonic-gate  *
1917c478bd9Sstevel@tonic-gate  * XXX - ULOCKFS in fs_pathconf and ufs_ioctl is not inlined yet.
1927c478bd9Sstevel@tonic-gate  */
1937c478bd9Sstevel@tonic-gate struct vnodeops *ufs_vnodeops;
1947c478bd9Sstevel@tonic-gate 
195aa59c4cbSrsb /* NOTE: "not blkd" below  means that the operation isn't blocked by lockfs */
1967c478bd9Sstevel@tonic-gate const fs_operation_def_t ufs_vnodeops_template[] = {
197aa59c4cbSrsb 	VOPNAME_OPEN,		{ .vop_open = ufs_open },	/* not blkd */
198aa59c4cbSrsb 	VOPNAME_CLOSE,		{ .vop_close = ufs_close },	/* not blkd */
199aa59c4cbSrsb 	VOPNAME_READ,		{ .vop_read = ufs_read },
200aa59c4cbSrsb 	VOPNAME_WRITE,		{ .vop_write = ufs_write },
201aa59c4cbSrsb 	VOPNAME_IOCTL,		{ .vop_ioctl = ufs_ioctl },
202aa59c4cbSrsb 	VOPNAME_GETATTR,	{ .vop_getattr = ufs_getattr },
203aa59c4cbSrsb 	VOPNAME_SETATTR,	{ .vop_setattr = ufs_setattr },
204aa59c4cbSrsb 	VOPNAME_ACCESS,		{ .vop_access = ufs_access },
205aa59c4cbSrsb 	VOPNAME_LOOKUP,		{ .vop_lookup = ufs_lookup },
206aa59c4cbSrsb 	VOPNAME_CREATE,		{ .vop_create = ufs_create },
207aa59c4cbSrsb 	VOPNAME_REMOVE,		{ .vop_remove = ufs_remove },
208aa59c4cbSrsb 	VOPNAME_LINK,		{ .vop_link = ufs_link },
209aa59c4cbSrsb 	VOPNAME_RENAME,		{ .vop_rename = ufs_rename },
210aa59c4cbSrsb 	VOPNAME_MKDIR,		{ .vop_mkdir = ufs_mkdir },
211aa59c4cbSrsb 	VOPNAME_RMDIR,		{ .vop_rmdir = ufs_rmdir },
212aa59c4cbSrsb 	VOPNAME_READDIR,	{ .vop_readdir = ufs_readdir },
213aa59c4cbSrsb 	VOPNAME_SYMLINK,	{ .vop_symlink = ufs_symlink },
214aa59c4cbSrsb 	VOPNAME_READLINK,	{ .vop_readlink = ufs_readlink },
215aa59c4cbSrsb 	VOPNAME_FSYNC,		{ .vop_fsync = ufs_fsync },
216aa59c4cbSrsb 	VOPNAME_INACTIVE,	{ .vop_inactive = ufs_inactive }, /* not blkd */
217aa59c4cbSrsb 	VOPNAME_FID,		{ .vop_fid = ufs_fid },
218aa59c4cbSrsb 	VOPNAME_RWLOCK,		{ .vop_rwlock = ufs_rwlock },	/* not blkd */
219aa59c4cbSrsb 	VOPNAME_RWUNLOCK,	{ .vop_rwunlock = ufs_rwunlock }, /* not blkd */
220aa59c4cbSrsb 	VOPNAME_SEEK,		{ .vop_seek = ufs_seek },
221aa59c4cbSrsb 	VOPNAME_FRLOCK,		{ .vop_frlock = ufs_frlock },
222aa59c4cbSrsb 	VOPNAME_SPACE,		{ .vop_space = ufs_space },
223aa59c4cbSrsb 	VOPNAME_GETPAGE,	{ .vop_getpage = ufs_getpage },
224aa59c4cbSrsb 	VOPNAME_PUTPAGE,	{ .vop_putpage = ufs_putpage },
225aa59c4cbSrsb 	VOPNAME_MAP,		{ .vop_map = ufs_map },
226aa59c4cbSrsb 	VOPNAME_ADDMAP,		{ .vop_addmap = ufs_addmap },	/* not blkd */
227aa59c4cbSrsb 	VOPNAME_DELMAP,		{ .vop_delmap = ufs_delmap },	/* not blkd */
228aa59c4cbSrsb 	VOPNAME_POLL,		{ .vop_poll = ufs_poll },	/* not blkd */
229aa59c4cbSrsb 	VOPNAME_DUMP,		{ .vop_dump = ufs_dump },
230aa59c4cbSrsb 	VOPNAME_PATHCONF,	{ .vop_pathconf = ufs_l_pathconf },
231aa59c4cbSrsb 	VOPNAME_PAGEIO,		{ .vop_pageio = ufs_pageio },
232aa59c4cbSrsb 	VOPNAME_DUMPCTL,	{ .vop_dumpctl = ufs_dumpctl },
233aa59c4cbSrsb 	VOPNAME_GETSECATTR,	{ .vop_getsecattr = ufs_getsecattr },
234aa59c4cbSrsb 	VOPNAME_SETSECATTR,	{ .vop_setsecattr = ufs_setsecattr },
235aa59c4cbSrsb 	VOPNAME_VNEVENT,	{ .vop_vnevent = fs_vnevent_support },
236aa59c4cbSrsb 	NULL,			NULL
2377c478bd9Sstevel@tonic-gate };
2387c478bd9Sstevel@tonic-gate 
2397c478bd9Sstevel@tonic-gate #define	MAX_BACKFILE_COUNT	9999
2407c478bd9Sstevel@tonic-gate 
2417c478bd9Sstevel@tonic-gate /*
2427c478bd9Sstevel@tonic-gate  * Created by ufs_dumpctl() to store a file's disk block info into memory.
2437c478bd9Sstevel@tonic-gate  * Used by ufs_dump() to dump data to disk directly.
2447c478bd9Sstevel@tonic-gate  */
2457c478bd9Sstevel@tonic-gate struct dump {
2467c478bd9Sstevel@tonic-gate 	struct inode	*ip;		/* the file we contain */
2477c478bd9Sstevel@tonic-gate 	daddr_t		fsbs;		/* number of blocks stored */
2487c478bd9Sstevel@tonic-gate 	struct timeval32 time;		/* time stamp for the struct */
2497c478bd9Sstevel@tonic-gate 	daddr32_t 	dblk[1];	/* place holder for block info */
2507c478bd9Sstevel@tonic-gate };
2517c478bd9Sstevel@tonic-gate 
2527c478bd9Sstevel@tonic-gate static struct dump *dump_info = NULL;
2537c478bd9Sstevel@tonic-gate 
2547c478bd9Sstevel@tonic-gate /*
2557c478bd9Sstevel@tonic-gate  * Previously there was no special action required for ordinary files.
2567c478bd9Sstevel@tonic-gate  * (Devices are handled through the device file system.)
2577c478bd9Sstevel@tonic-gate  * Now we support Large Files and Large File API requires open to
2587c478bd9Sstevel@tonic-gate  * fail if file is large.
2597c478bd9Sstevel@tonic-gate  * We could take care to prevent data corruption
2607c478bd9Sstevel@tonic-gate  * by doing an atomic check of size and truncate if file is opened with
2617c478bd9Sstevel@tonic-gate  * FTRUNC flag set but traditionally this is being done by the vfs/vnode
2627c478bd9Sstevel@tonic-gate  * layers. So taking care of truncation here is a change in the existing
2637c478bd9Sstevel@tonic-gate  * semantics of VOP_OPEN and therefore we chose not to implement any thing
2647c478bd9Sstevel@tonic-gate  * here. The check for the size of the file > 2GB is being done at the
2657c478bd9Sstevel@tonic-gate  * vfs layer in routine vn_open().
2667c478bd9Sstevel@tonic-gate  */
2677c478bd9Sstevel@tonic-gate 
2687c478bd9Sstevel@tonic-gate /* ARGSUSED */
2697c478bd9Sstevel@tonic-gate static int
270da6c28aaSamw ufs_open(struct vnode **vpp, int flag, struct cred *cr, caller_context_t *ct)
2717c478bd9Sstevel@tonic-gate {
2727c478bd9Sstevel@tonic-gate 	return (0);
2737c478bd9Sstevel@tonic-gate }
2747c478bd9Sstevel@tonic-gate 
2757c478bd9Sstevel@tonic-gate /*ARGSUSED*/
2767c478bd9Sstevel@tonic-gate static int
2777c478bd9Sstevel@tonic-gate ufs_close(struct vnode *vp, int flag, int count, offset_t offset,
278*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct)
2797c478bd9Sstevel@tonic-gate {
2807c478bd9Sstevel@tonic-gate 	cleanlocks(vp, ttoproc(curthread)->p_pid, 0);
2817c478bd9Sstevel@tonic-gate 	cleanshares(vp, ttoproc(curthread)->p_pid);
2827c478bd9Sstevel@tonic-gate 
2837c478bd9Sstevel@tonic-gate 	/*
2847c478bd9Sstevel@tonic-gate 	 * Push partially filled cluster at last close.
2857c478bd9Sstevel@tonic-gate 	 * ``last close'' is approximated because the dnlc
2867c478bd9Sstevel@tonic-gate 	 * may have a hold on the vnode.
2877c478bd9Sstevel@tonic-gate 	 * Checking for VBAD here will also act as a forced umount check.
2887c478bd9Sstevel@tonic-gate 	 */
2897c478bd9Sstevel@tonic-gate 	if (vp->v_count <= 2 && vp->v_type != VBAD) {
2907c478bd9Sstevel@tonic-gate 		struct inode *ip = VTOI(vp);
2917c478bd9Sstevel@tonic-gate 		if (ip->i_delaylen) {
2927c478bd9Sstevel@tonic-gate 			ins.in_poc.value.ul++;
2937c478bd9Sstevel@tonic-gate 			(void) ufs_putpages(vp, ip->i_delayoff, ip->i_delaylen,
29480d34432Sfrankho 			    B_ASYNC | B_FREE, cr);
2957c478bd9Sstevel@tonic-gate 			ip->i_delaylen = 0;
2967c478bd9Sstevel@tonic-gate 		}
2977c478bd9Sstevel@tonic-gate 	}
2987c478bd9Sstevel@tonic-gate 
2997c478bd9Sstevel@tonic-gate 	return (0);
3007c478bd9Sstevel@tonic-gate }
3017c478bd9Sstevel@tonic-gate 
3027c478bd9Sstevel@tonic-gate /*ARGSUSED*/
3037c478bd9Sstevel@tonic-gate static int
3047c478bd9Sstevel@tonic-gate ufs_read(struct vnode *vp, struct uio *uiop, int ioflag, struct cred *cr,
305*80d5689fSPatrick Mooney     struct caller_context *ct)
3067c478bd9Sstevel@tonic-gate {
3077c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
3087c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
3097c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp = NULL;
3107c478bd9Sstevel@tonic-gate 	int error = 0;
3117c478bd9Sstevel@tonic-gate 	int intrans = 0;
3127c478bd9Sstevel@tonic-gate 
3137c478bd9Sstevel@tonic-gate 	ASSERT(RW_READ_HELD(&ip->i_rwlock));
3147c478bd9Sstevel@tonic-gate 
3157c478bd9Sstevel@tonic-gate 	/*
3167c478bd9Sstevel@tonic-gate 	 * Mandatory locking needs to be done before ufs_lockfs_begin()
3177c478bd9Sstevel@tonic-gate 	 * and TRANS_BEGIN_SYNC() calls since mandatory locks can sleep.
3187c478bd9Sstevel@tonic-gate 	 */
3197c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
3207c478bd9Sstevel@tonic-gate 		/*
3217c478bd9Sstevel@tonic-gate 		 * ufs_getattr ends up being called by chklock
3227c478bd9Sstevel@tonic-gate 		 */
3237c478bd9Sstevel@tonic-gate 		error = chklock(vp, FREAD, uiop->uio_loffset,
32480d34432Sfrankho 		    uiop->uio_resid, uiop->uio_fmode, ct);
3257c478bd9Sstevel@tonic-gate 		if (error)
3267c478bd9Sstevel@tonic-gate 			goto out;
3277c478bd9Sstevel@tonic-gate 	}
3287c478bd9Sstevel@tonic-gate 
3297c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
3307c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READ_MASK);
3317c478bd9Sstevel@tonic-gate 	if (error)
3327c478bd9Sstevel@tonic-gate 		goto out;
3337c478bd9Sstevel@tonic-gate 
3347c478bd9Sstevel@tonic-gate 	/*
3357c478bd9Sstevel@tonic-gate 	 * In the case that a directory is opened for reading as a file
3367c478bd9Sstevel@tonic-gate 	 * (eg "cat .") with the  O_RSYNC, O_SYNC and O_DSYNC flags set.
3377c478bd9Sstevel@tonic-gate 	 * The locking order had to be changed to avoid a deadlock with
3387c478bd9Sstevel@tonic-gate 	 * an update taking place on that directory at the same time.
3397c478bd9Sstevel@tonic-gate 	 */
3407c478bd9Sstevel@tonic-gate 	if ((ip->i_mode & IFMT) == IFDIR) {
3417c478bd9Sstevel@tonic-gate 
3427c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
3437c478bd9Sstevel@tonic-gate 		error = rdip(ip, uiop, ioflag, cr);
3447c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
3457c478bd9Sstevel@tonic-gate 
3467c478bd9Sstevel@tonic-gate 		if (error) {
3477c478bd9Sstevel@tonic-gate 			if (ulp)
3487c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
3497c478bd9Sstevel@tonic-gate 			goto out;
3507c478bd9Sstevel@tonic-gate 		}
3517c478bd9Sstevel@tonic-gate 
3527c478bd9Sstevel@tonic-gate 		if (ulp && (ioflag & FRSYNC) && (ioflag & (FSYNC | FDSYNC)) &&
3537c478bd9Sstevel@tonic-gate 		    TRANS_ISTRANS(ufsvfsp)) {
3547c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
3557c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_READ_SYNC, TOP_READ_SIZE,
3567c478bd9Sstevel@tonic-gate 			    error);
3577c478bd9Sstevel@tonic-gate 			ASSERT(!error);
3587c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_READ_SYNC,
3597c478bd9Sstevel@tonic-gate 			    TOP_READ_SIZE);
3607c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_rwlock, RW_READER);
3617c478bd9Sstevel@tonic-gate 		}
3627c478bd9Sstevel@tonic-gate 	} else {
3637c478bd9Sstevel@tonic-gate 		/*
3647c478bd9Sstevel@tonic-gate 		 * Only transact reads to files opened for sync-read and
3657c478bd9Sstevel@tonic-gate 		 * sync-write on a file system that is not write locked.
3667c478bd9Sstevel@tonic-gate 		 *
3677c478bd9Sstevel@tonic-gate 		 * The ``not write locked'' check prevents problems with
3687c478bd9Sstevel@tonic-gate 		 * enabling/disabling logging on a busy file system.  E.g.,
3697c478bd9Sstevel@tonic-gate 		 * logging exists at the beginning of the read but does not
3707c478bd9Sstevel@tonic-gate 		 * at the end.
3717c478bd9Sstevel@tonic-gate 		 *
3727c478bd9Sstevel@tonic-gate 		 */
3737c478bd9Sstevel@tonic-gate 		if (ulp && (ioflag & FRSYNC) && (ioflag & (FSYNC | FDSYNC)) &&
3747c478bd9Sstevel@tonic-gate 		    TRANS_ISTRANS(ufsvfsp)) {
3757c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_READ_SYNC, TOP_READ_SIZE,
3767c478bd9Sstevel@tonic-gate 			    error);
3777c478bd9Sstevel@tonic-gate 			ASSERT(!error);
3787c478bd9Sstevel@tonic-gate 			intrans = 1;
3797c478bd9Sstevel@tonic-gate 		}
3807c478bd9Sstevel@tonic-gate 
3817c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
3827c478bd9Sstevel@tonic-gate 		error = rdip(ip, uiop, ioflag, cr);
3837c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
3847c478bd9Sstevel@tonic-gate 
3857c478bd9Sstevel@tonic-gate 		if (intrans) {
3867c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_READ_SYNC,
3877c478bd9Sstevel@tonic-gate 			    TOP_READ_SIZE);
3887c478bd9Sstevel@tonic-gate 		}
3897c478bd9Sstevel@tonic-gate 	}
3907c478bd9Sstevel@tonic-gate 
3917c478bd9Sstevel@tonic-gate 	if (ulp) {
3927c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
3937c478bd9Sstevel@tonic-gate 	}
3947c478bd9Sstevel@tonic-gate out:
3957c478bd9Sstevel@tonic-gate 
3967c478bd9Sstevel@tonic-gate 	return (error);
3977c478bd9Sstevel@tonic-gate }
3987c478bd9Sstevel@tonic-gate 
3997c478bd9Sstevel@tonic-gate extern	int	ufs_HW;		/* high water mark */
4007c478bd9Sstevel@tonic-gate extern	int	ufs_LW;		/* low water mark */
4017c478bd9Sstevel@tonic-gate int	ufs_WRITES = 1;		/* XXX - enable/disable */
4027c478bd9Sstevel@tonic-gate int	ufs_throttles = 0;	/* throttling count */
4037c478bd9Sstevel@tonic-gate int	ufs_allow_shared_writes = 1;	/* directio shared writes */
4047c478bd9Sstevel@tonic-gate 
4057c478bd9Sstevel@tonic-gate static int
4067c478bd9Sstevel@tonic-gate ufs_check_rewrite(struct inode *ip, struct uio *uiop, int ioflag)
4077c478bd9Sstevel@tonic-gate {
408f90bab20Sswilcox 	int	shared_write;
409f90bab20Sswilcox 
410f90bab20Sswilcox 	/*
411f90bab20Sswilcox 	 * If the FDSYNC flag is set then ignore the global
412f90bab20Sswilcox 	 * ufs_allow_shared_writes in this case.
413f90bab20Sswilcox 	 */
414f90bab20Sswilcox 	shared_write = (ioflag & FDSYNC) | ufs_allow_shared_writes;
4157c478bd9Sstevel@tonic-gate 
4167c478bd9Sstevel@tonic-gate 	/*
4177c478bd9Sstevel@tonic-gate 	 * Filter to determine if this request is suitable as a
4187c478bd9Sstevel@tonic-gate 	 * concurrent rewrite. This write must not allocate blocks
4197c478bd9Sstevel@tonic-gate 	 * by extending the file or filling in holes. No use trying
4207c478bd9Sstevel@tonic-gate 	 * through FSYNC descriptors as the inode will be synchronously
4217c478bd9Sstevel@tonic-gate 	 * updated after the write. The uio structure has not yet been
4227c478bd9Sstevel@tonic-gate 	 * checked for sanity, so assume nothing.
4237c478bd9Sstevel@tonic-gate 	 */
4247c478bd9Sstevel@tonic-gate 	return (((ip->i_mode & IFMT) == IFREG) && !(ioflag & FAPPEND) &&
42580d34432Sfrankho 	    (uiop->uio_loffset >= (offset_t)0) &&
42680d34432Sfrankho 	    (uiop->uio_loffset < ip->i_size) && (uiop->uio_resid > 0) &&
42780d34432Sfrankho 	    ((ip->i_size - uiop->uio_loffset) >= uiop->uio_resid) &&
42880d34432Sfrankho 	    !(ioflag & FSYNC) && !bmap_has_holes(ip) &&
42980d34432Sfrankho 	    shared_write);
4307c478bd9Sstevel@tonic-gate }
4317c478bd9Sstevel@tonic-gate 
4327c478bd9Sstevel@tonic-gate /*ARGSUSED*/
4337c478bd9Sstevel@tonic-gate static int
4347c478bd9Sstevel@tonic-gate ufs_write(struct vnode *vp, struct uio *uiop, int ioflag, cred_t *cr,
435*80d5689fSPatrick Mooney     caller_context_t *ct)
4367c478bd9Sstevel@tonic-gate {
4377c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
4387c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
4397c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
4407c478bd9Sstevel@tonic-gate 	int retry = 1;
4417c478bd9Sstevel@tonic-gate 	int error, resv, resid = 0;
4427c478bd9Sstevel@tonic-gate 	int directio_status;
4437c478bd9Sstevel@tonic-gate 	int exclusive;
444f90bab20Sswilcox 	int rewriteflg;
4457c478bd9Sstevel@tonic-gate 	long start_resid = uiop->uio_resid;
4467c478bd9Sstevel@tonic-gate 
4477c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_rwlock));
4487c478bd9Sstevel@tonic-gate 
4497c478bd9Sstevel@tonic-gate retry_mandlock:
4507c478bd9Sstevel@tonic-gate 	/*
4517c478bd9Sstevel@tonic-gate 	 * Mandatory locking needs to be done before ufs_lockfs_begin()
4527c478bd9Sstevel@tonic-gate 	 * and TRANS_BEGIN_[A]SYNC() calls since mandatory locks can sleep.
4537c478bd9Sstevel@tonic-gate 	 * Check for forced unmounts normally done in ufs_lockfs_begin().
4547c478bd9Sstevel@tonic-gate 	 */
4557c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL) {
4567c478bd9Sstevel@tonic-gate 		error = EIO;
4577c478bd9Sstevel@tonic-gate 		goto out;
4587c478bd9Sstevel@tonic-gate 	}
4597c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
4607c478bd9Sstevel@tonic-gate 
4617c478bd9Sstevel@tonic-gate 		ASSERT(RW_WRITE_HELD(&ip->i_rwlock));
4627c478bd9Sstevel@tonic-gate 
4637c478bd9Sstevel@tonic-gate 		/*
4647c478bd9Sstevel@tonic-gate 		 * ufs_getattr ends up being called by chklock
4657c478bd9Sstevel@tonic-gate 		 */
4667c478bd9Sstevel@tonic-gate 		error = chklock(vp, FWRITE, uiop->uio_loffset,
46780d34432Sfrankho 		    uiop->uio_resid, uiop->uio_fmode, ct);
4687c478bd9Sstevel@tonic-gate 		if (error)
4697c478bd9Sstevel@tonic-gate 			goto out;
4707c478bd9Sstevel@tonic-gate 	}
4717c478bd9Sstevel@tonic-gate 
4727c478bd9Sstevel@tonic-gate 	/* i_rwlock can change in chklock */
4737c478bd9Sstevel@tonic-gate 	exclusive = rw_write_held(&ip->i_rwlock);
474f90bab20Sswilcox 	rewriteflg = ufs_check_rewrite(ip, uiop, ioflag);
4757c478bd9Sstevel@tonic-gate 
4767c478bd9Sstevel@tonic-gate 	/*
4777c478bd9Sstevel@tonic-gate 	 * Check for fast-path special case of directio re-writes.
4787c478bd9Sstevel@tonic-gate 	 */
4797c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) &&
480f90bab20Sswilcox 	    !exclusive && rewriteflg) {
4817c478bd9Sstevel@tonic-gate 
4827c478bd9Sstevel@tonic-gate 		error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_WRITE_MASK);
4837c478bd9Sstevel@tonic-gate 		if (error)
4847c478bd9Sstevel@tonic-gate 			goto out;
4857c478bd9Sstevel@tonic-gate 
4867c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
4877c478bd9Sstevel@tonic-gate 		error = ufs_directio_write(ip, uiop, ioflag, 1, cr,
48880d34432Sfrankho 		    &directio_status);
4897c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS) {
4907c478bd9Sstevel@tonic-gate 			uint_t i_flag_save;
4917c478bd9Sstevel@tonic-gate 
4927c478bd9Sstevel@tonic-gate 			if (start_resid != uiop->uio_resid)
4937c478bd9Sstevel@tonic-gate 				error = 0;
4947c478bd9Sstevel@tonic-gate 			/*
4957c478bd9Sstevel@tonic-gate 			 * Special treatment of access times for re-writes.
4967c478bd9Sstevel@tonic-gate 			 * If IMOD is not already set, then convert it
4977c478bd9Sstevel@tonic-gate 			 * to IMODACC for this operation. This defers
4987c478bd9Sstevel@tonic-gate 			 * entering a delta into the log until the inode
4997c478bd9Sstevel@tonic-gate 			 * is flushed. This mimics what is done for read
5007c478bd9Sstevel@tonic-gate 			 * operations and inode access time.
5017c478bd9Sstevel@tonic-gate 			 */
5027c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
5037c478bd9Sstevel@tonic-gate 			i_flag_save = ip->i_flag;
5047c478bd9Sstevel@tonic-gate 			ip->i_flag |= IUPD | ICHG;
5057c478bd9Sstevel@tonic-gate 			ip->i_seq++;
5067c478bd9Sstevel@tonic-gate 			ITIMES_NOLOCK(ip);
5077c478bd9Sstevel@tonic-gate 			if ((i_flag_save & IMOD) == 0) {
5087c478bd9Sstevel@tonic-gate 				ip->i_flag &= ~IMOD;
5097c478bd9Sstevel@tonic-gate 				ip->i_flag |= IMODACC;
5107c478bd9Sstevel@tonic-gate 			}
5117c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
5127c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
5137c478bd9Sstevel@tonic-gate 			if (ulp)
5147c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
5157c478bd9Sstevel@tonic-gate 			goto out;
5167c478bd9Sstevel@tonic-gate 		}
5177c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
5187c478bd9Sstevel@tonic-gate 		if (ulp)
5197c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
5207c478bd9Sstevel@tonic-gate 	}
5217c478bd9Sstevel@tonic-gate 
5227c478bd9Sstevel@tonic-gate 	if (!exclusive && !rw_tryupgrade(&ip->i_rwlock)) {
5237c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
5247c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
5257c478bd9Sstevel@tonic-gate 		/*
5267c478bd9Sstevel@tonic-gate 		 * Mandatory locking could have been enabled
5277c478bd9Sstevel@tonic-gate 		 * after dropping the i_rwlock.
5287c478bd9Sstevel@tonic-gate 		 */
5297c478bd9Sstevel@tonic-gate 		if (MANDLOCK(vp, ip->i_mode))
5307c478bd9Sstevel@tonic-gate 			goto retry_mandlock;
5317c478bd9Sstevel@tonic-gate 	}
5327c478bd9Sstevel@tonic-gate 
5337c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_WRITE_MASK);
5347c478bd9Sstevel@tonic-gate 	if (error)
5357c478bd9Sstevel@tonic-gate 		goto out;
5367c478bd9Sstevel@tonic-gate 
5377c478bd9Sstevel@tonic-gate 	/*
5387c478bd9Sstevel@tonic-gate 	 * Amount of log space needed for this write
5397c478bd9Sstevel@tonic-gate 	 */
540f90bab20Sswilcox 	if (!rewriteflg || !(ioflag & FDSYNC))
541f90bab20Sswilcox 		TRANS_WRITE_RESV(ip, uiop, ulp, &resv, &resid);
5427c478bd9Sstevel@tonic-gate 
5437c478bd9Sstevel@tonic-gate 	/*
5447c478bd9Sstevel@tonic-gate 	 * Throttle writes.
5457c478bd9Sstevel@tonic-gate 	 */
5467c478bd9Sstevel@tonic-gate 	if (ufs_WRITES && (ip->i_writes > ufs_HW)) {
5477c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
5487c478bd9Sstevel@tonic-gate 		while (ip->i_writes > ufs_HW) {
5497c478bd9Sstevel@tonic-gate 			ufs_throttles++;
5507c478bd9Sstevel@tonic-gate 			cv_wait(&ip->i_wrcv, &ip->i_tlock);
5517c478bd9Sstevel@tonic-gate 		}
5527c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
5537c478bd9Sstevel@tonic-gate 	}
5547c478bd9Sstevel@tonic-gate 
5557c478bd9Sstevel@tonic-gate 	/*
5567c478bd9Sstevel@tonic-gate 	 * Enter Transaction
557f90bab20Sswilcox 	 *
558f90bab20Sswilcox 	 * If the write is a rewrite there is no need to open a transaction
559f90bab20Sswilcox 	 * if the FDSYNC flag is set and not the FSYNC.  In this case just
560f90bab20Sswilcox 	 * set the IMODACC flag to modify do the update at a later time
561f90bab20Sswilcox 	 * thus avoiding the overhead of the logging transaction that is
562f90bab20Sswilcox 	 * not required.
5637c478bd9Sstevel@tonic-gate 	 */
5647c478bd9Sstevel@tonic-gate 	if (ioflag & (FSYNC|FDSYNC)) {
5657c478bd9Sstevel@tonic-gate 		if (ulp) {
566f90bab20Sswilcox 			if (rewriteflg) {
567f90bab20Sswilcox 				uint_t i_flag_save;
568f90bab20Sswilcox 
569f90bab20Sswilcox 				rw_enter(&ip->i_contents, RW_READER);
570f90bab20Sswilcox 				mutex_enter(&ip->i_tlock);
571f90bab20Sswilcox 				i_flag_save = ip->i_flag;
572f90bab20Sswilcox 				ip->i_flag |= IUPD | ICHG;
573f90bab20Sswilcox 				ip->i_seq++;
574f90bab20Sswilcox 				ITIMES_NOLOCK(ip);
575f90bab20Sswilcox 				if ((i_flag_save & IMOD) == 0) {
576f90bab20Sswilcox 					ip->i_flag &= ~IMOD;
577f90bab20Sswilcox 					ip->i_flag |= IMODACC;
578f90bab20Sswilcox 				}
579f90bab20Sswilcox 				mutex_exit(&ip->i_tlock);
580f90bab20Sswilcox 				rw_exit(&ip->i_contents);
581f90bab20Sswilcox 			} else {
582f90bab20Sswilcox 				int terr = 0;
583f90bab20Sswilcox 				TRANS_BEGIN_SYNC(ufsvfsp, TOP_WRITE_SYNC, resv,
584f90bab20Sswilcox 				    terr);
585f90bab20Sswilcox 				ASSERT(!terr);
586f90bab20Sswilcox 			}
5877c478bd9Sstevel@tonic-gate 		}
5887c478bd9Sstevel@tonic-gate 	} else {
5897c478bd9Sstevel@tonic-gate 		if (ulp)
5907c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_WRITE, resv);
5917c478bd9Sstevel@tonic-gate 	}
5927c478bd9Sstevel@tonic-gate 
5937c478bd9Sstevel@tonic-gate 	/*
5947c478bd9Sstevel@tonic-gate 	 * Write the file
5957c478bd9Sstevel@tonic-gate 	 */
5967c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
5977c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
5987c478bd9Sstevel@tonic-gate 	if ((ioflag & FAPPEND) != 0 && (ip->i_mode & IFMT) == IFREG) {
5997c478bd9Sstevel@tonic-gate 		/*
6007c478bd9Sstevel@tonic-gate 		 * In append mode start at end of file.
6017c478bd9Sstevel@tonic-gate 		 */
6027c478bd9Sstevel@tonic-gate 		uiop->uio_loffset = ip->i_size;
6037c478bd9Sstevel@tonic-gate 	}
6047c478bd9Sstevel@tonic-gate 
6057c478bd9Sstevel@tonic-gate 	/*
6067c478bd9Sstevel@tonic-gate 	 * Mild optimisation, don't call ufs_trans_write() unless we have to
6077c478bd9Sstevel@tonic-gate 	 * Also, suppress file system full messages if we will retry.
6087c478bd9Sstevel@tonic-gate 	 */
6097c478bd9Sstevel@tonic-gate 	if (retry)
6107c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
6117c478bd9Sstevel@tonic-gate 	if (resid) {
6127c478bd9Sstevel@tonic-gate 		TRANS_WRITE(ip, uiop, ioflag, error, ulp, cr, resv, resid);
6137c478bd9Sstevel@tonic-gate 	} else {
6147c478bd9Sstevel@tonic-gate 		error = wrip(ip, uiop, ioflag, cr);
6157c478bd9Sstevel@tonic-gate 	}
6167c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
6177c478bd9Sstevel@tonic-gate 
6187c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
6197c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
6207c478bd9Sstevel@tonic-gate 
6217c478bd9Sstevel@tonic-gate 	/*
6227c478bd9Sstevel@tonic-gate 	 * Leave Transaction
6237c478bd9Sstevel@tonic-gate 	 */
6247c478bd9Sstevel@tonic-gate 	if (ulp) {
6257c478bd9Sstevel@tonic-gate 		if (ioflag & (FSYNC|FDSYNC)) {
626f90bab20Sswilcox 			if (!rewriteflg) {
627f90bab20Sswilcox 				int terr = 0;
628f90bab20Sswilcox 
629f90bab20Sswilcox 				TRANS_END_SYNC(ufsvfsp, terr, TOP_WRITE_SYNC,
63080d34432Sfrankho 				    resv);
631f90bab20Sswilcox 				if (error == 0)
632f90bab20Sswilcox 					error = terr;
633f90bab20Sswilcox 			}
6347c478bd9Sstevel@tonic-gate 		} else {
6357c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_WRITE, resv);
6367c478bd9Sstevel@tonic-gate 		}
6377c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
6387c478bd9Sstevel@tonic-gate 	}
6397c478bd9Sstevel@tonic-gate out:
6407c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
6417c478bd9Sstevel@tonic-gate 		/*
6427c478bd9Sstevel@tonic-gate 		 * Any blocks tied up in pending deletes?
6437c478bd9Sstevel@tonic-gate 		 */
6447c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
6457c478bd9Sstevel@tonic-gate 		retry = 0;
6467c478bd9Sstevel@tonic-gate 		goto retry_mandlock;
6477c478bd9Sstevel@tonic-gate 	}
6487c478bd9Sstevel@tonic-gate 
6497c478bd9Sstevel@tonic-gate 	if (error == ENOSPC && (start_resid != uiop->uio_resid))
6507c478bd9Sstevel@tonic-gate 		error = 0;
6517c478bd9Sstevel@tonic-gate 
6527c478bd9Sstevel@tonic-gate 	return (error);
6537c478bd9Sstevel@tonic-gate }
6547c478bd9Sstevel@tonic-gate 
6557c478bd9Sstevel@tonic-gate /*
6567c478bd9Sstevel@tonic-gate  * Don't cache write blocks to files with the sticky bit set.
6577c478bd9Sstevel@tonic-gate  * Used to keep swap files from blowing the page cache on a server.
6587c478bd9Sstevel@tonic-gate  */
6597c478bd9Sstevel@tonic-gate int stickyhack = 1;
6607c478bd9Sstevel@tonic-gate 
6617c478bd9Sstevel@tonic-gate /*
6627c478bd9Sstevel@tonic-gate  * Free behind hacks.  The pager is busted.
6637c478bd9Sstevel@tonic-gate  * XXX - need to pass the information down to writedone() in a flag like B_SEQ
6647c478bd9Sstevel@tonic-gate  * or B_FREE_IF_TIGHT_ON_MEMORY.
6657c478bd9Sstevel@tonic-gate  */
6667c478bd9Sstevel@tonic-gate int	freebehind = 1;
667562eee46Srbourbon int	smallfile = 0;
668562eee46Srbourbon u_offset_t smallfile64 = 32 * 1024;
6697c478bd9Sstevel@tonic-gate 
6707c478bd9Sstevel@tonic-gate /*
6717c478bd9Sstevel@tonic-gate  * While we should, in most cases, cache the pages for write, we
6727c478bd9Sstevel@tonic-gate  * may also want to cache the pages for read as long as they are
6737c478bd9Sstevel@tonic-gate  * frequently re-usable.
6747c478bd9Sstevel@tonic-gate  *
6757c478bd9Sstevel@tonic-gate  * If cache_read_ahead = 1, the pages for read will go to the tail
6767c478bd9Sstevel@tonic-gate  * of the cache list when they are released, otherwise go to the head.
6777c478bd9Sstevel@tonic-gate  */
6787c478bd9Sstevel@tonic-gate int	cache_read_ahead = 0;
6797c478bd9Sstevel@tonic-gate 
680562eee46Srbourbon /*
681562eee46Srbourbon  * Freebehind exists  so that as we read  large files  sequentially we
682562eee46Srbourbon  * don't consume most of memory with pages  from a few files. It takes
683562eee46Srbourbon  * longer to re-read from disk multiple small files as it does reading
684562eee46Srbourbon  * one large one sequentially.  As system  memory grows customers need
685562eee46Srbourbon  * to retain bigger chunks   of files in  memory.   The advent of  the
686562eee46Srbourbon  * cachelist opens up of the possibility freeing pages  to the head or
687562eee46Srbourbon  * tail of the list.
688562eee46Srbourbon  *
689562eee46Srbourbon  * Not freeing a page is a bet that the page will be read again before
690562eee46Srbourbon  * it's segmap slot is needed for something else. If we loose the bet,
691562eee46Srbourbon  * it means some  other thread is  burdened with the  page free we did
692562eee46Srbourbon  * not do. If we win we save a free and reclaim.
693562eee46Srbourbon  *
694562eee46Srbourbon  * Freeing it at the tail  vs the head of cachelist  is a bet that the
695562eee46Srbourbon  * page will survive until the next  read.  It's also saying that this
696562eee46Srbourbon  * page is more likely to  be re-used than a  page freed some time ago
697562eee46Srbourbon  * and never reclaimed.
698562eee46Srbourbon  *
699562eee46Srbourbon  * Freebehind maintains a  range of  file offset [smallfile1; smallfile2]
700562eee46Srbourbon  *
701562eee46Srbourbon  *            0 < offset < smallfile1 : pages are not freed.
702562eee46Srbourbon  *   smallfile1 < offset < smallfile2 : pages freed to tail of cachelist.
703562eee46Srbourbon  *   smallfile2 < offset              : pages freed to head of cachelist.
704562eee46Srbourbon  *
705562eee46Srbourbon  * The range  is  computed  at most  once  per second  and  depends on
706562eee46Srbourbon  * freemem  and  ncpus_online.  Both parameters  are   bounded to be
707562eee46Srbourbon  * >= smallfile && >= smallfile64.
708562eee46Srbourbon  *
709562eee46Srbourbon  * smallfile1 = (free memory / ncpu) / 1000
710562eee46Srbourbon  * smallfile2 = (free memory / ncpu) / 10
711562eee46Srbourbon  *
712562eee46Srbourbon  * A few examples values:
713562eee46Srbourbon  *
714562eee46Srbourbon  *       Free Mem (in Bytes) [smallfile1; smallfile2]  [smallfile1; smallfile2]
715562eee46Srbourbon  *                                 ncpus_online = 4          ncpus_online = 64
716562eee46Srbourbon  *       ------------------  -----------------------   -----------------------
717562eee46Srbourbon  *             1G                   [256K;  25M]               [32K; 1.5M]
718562eee46Srbourbon  *            10G                   [2.5M; 250M]              [156K; 15M]
719562eee46Srbourbon  *           100G                    [25M; 2.5G]              [1.5M; 150M]
720562eee46Srbourbon  *
721562eee46Srbourbon  */
722562eee46Srbourbon 
723562eee46Srbourbon #define	SMALLFILE1_D 1000
724562eee46Srbourbon #define	SMALLFILE2_D 10
725562eee46Srbourbon static u_offset_t smallfile1 = 32 * 1024;
726562eee46Srbourbon static u_offset_t smallfile2 = 32 * 1024;
727562eee46Srbourbon static clock_t smallfile_update = 0; /* lbolt value of when to recompute */
728562eee46Srbourbon uint_t smallfile1_d = SMALLFILE1_D;
729562eee46Srbourbon uint_t smallfile2_d = SMALLFILE2_D;
730562eee46Srbourbon 
7317c478bd9Sstevel@tonic-gate /*
7327c478bd9Sstevel@tonic-gate  * wrip does the real work of write requests for ufs.
7337c478bd9Sstevel@tonic-gate  */
7347c478bd9Sstevel@tonic-gate int
7357c478bd9Sstevel@tonic-gate wrip(struct inode *ip, struct uio *uio, int ioflag, struct cred *cr)
7367c478bd9Sstevel@tonic-gate {
7377c478bd9Sstevel@tonic-gate 	rlim64_t limit = uio->uio_llimit;
7387c478bd9Sstevel@tonic-gate 	u_offset_t off;
7397c478bd9Sstevel@tonic-gate 	u_offset_t old_i_size;
7407c478bd9Sstevel@tonic-gate 	struct fs *fs;
7417c478bd9Sstevel@tonic-gate 	struct vnode *vp;
7427c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
7437c478bd9Sstevel@tonic-gate 	caddr_t base;
7447c478bd9Sstevel@tonic-gate 	long start_resid = uio->uio_resid;	/* save starting resid */
7457c478bd9Sstevel@tonic-gate 	long premove_resid;			/* resid before uiomove() */
7467c478bd9Sstevel@tonic-gate 	uint_t flags;
7477c478bd9Sstevel@tonic-gate 	int newpage;
7487c478bd9Sstevel@tonic-gate 	int iupdat_flag, directio_status;
7497c478bd9Sstevel@tonic-gate 	int n, on, mapon;
7507c478bd9Sstevel@tonic-gate 	int error, pagecreate;
7517c478bd9Sstevel@tonic-gate 	int do_dqrwlock;		/* drop/reacquire vfs_dqrwlock */
7527c478bd9Sstevel@tonic-gate 	int32_t	iblocks;
7537c478bd9Sstevel@tonic-gate 	int	new_iblocks;
7547c478bd9Sstevel@tonic-gate 
7557c478bd9Sstevel@tonic-gate 	/*
7567c478bd9Sstevel@tonic-gate 	 * ip->i_size is incremented before the uiomove
7577c478bd9Sstevel@tonic-gate 	 * is done on a write.  If the move fails (bad user
7587c478bd9Sstevel@tonic-gate 	 * address) reset ip->i_size.
7597c478bd9Sstevel@tonic-gate 	 * The better way would be to increment ip->i_size
7607c478bd9Sstevel@tonic-gate 	 * only if the uiomove succeeds.
7617c478bd9Sstevel@tonic-gate 	 */
7627c478bd9Sstevel@tonic-gate 	int i_size_changed = 0;
7637c478bd9Sstevel@tonic-gate 	o_mode_t type;
7647c478bd9Sstevel@tonic-gate 	int i_seq_needed = 0;
7657c478bd9Sstevel@tonic-gate 
7667c478bd9Sstevel@tonic-gate 	vp = ITOV(ip);
7677c478bd9Sstevel@tonic-gate 
7687c478bd9Sstevel@tonic-gate 	/*
7697c478bd9Sstevel@tonic-gate 	 * check for forced unmount - should not happen as
7707c478bd9Sstevel@tonic-gate 	 * the request passed the lockfs checks.
7717c478bd9Sstevel@tonic-gate 	 */
7727c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
7737c478bd9Sstevel@tonic-gate 		return (EIO);
7747c478bd9Sstevel@tonic-gate 
7757c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
7767c478bd9Sstevel@tonic-gate 
7777c478bd9Sstevel@tonic-gate 	ASSERT(RW_WRITE_HELD(&ip->i_contents));
7787c478bd9Sstevel@tonic-gate 
7797c478bd9Sstevel@tonic-gate 	/* check for valid filetype */
7807c478bd9Sstevel@tonic-gate 	type = ip->i_mode & IFMT;
7817c478bd9Sstevel@tonic-gate 	if ((type != IFREG) && (type != IFDIR) && (type != IFATTRDIR) &&
7827c478bd9Sstevel@tonic-gate 	    (type != IFLNK) && (type != IFSHAD)) {
7837c478bd9Sstevel@tonic-gate 		return (EIO);
7847c478bd9Sstevel@tonic-gate 	}
7857c478bd9Sstevel@tonic-gate 
7867c478bd9Sstevel@tonic-gate 	/*
7877c478bd9Sstevel@tonic-gate 	 * the actual limit of UFS file size
7887c478bd9Sstevel@tonic-gate 	 * is UFS_MAXOFFSET_T
7897c478bd9Sstevel@tonic-gate 	 */
7907c478bd9Sstevel@tonic-gate 	if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
7917c478bd9Sstevel@tonic-gate 		limit = MAXOFFSET_T;
7927c478bd9Sstevel@tonic-gate 
7937c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset >= limit) {
7947c478bd9Sstevel@tonic-gate 		proc_t *p = ttoproc(curthread);
7957c478bd9Sstevel@tonic-gate 
7967c478bd9Sstevel@tonic-gate 		mutex_enter(&p->p_lock);
7977c478bd9Sstevel@tonic-gate 		(void) rctl_action(rctlproc_legacy[RLIMIT_FSIZE], p->p_rctls,
7987c478bd9Sstevel@tonic-gate 		    p, RCA_UNSAFE_SIGINFO);
7997c478bd9Sstevel@tonic-gate 		mutex_exit(&p->p_lock);
8007c478bd9Sstevel@tonic-gate 		return (EFBIG);
8017c478bd9Sstevel@tonic-gate 	}
8027c478bd9Sstevel@tonic-gate 
8037c478bd9Sstevel@tonic-gate 	/*
8047c478bd9Sstevel@tonic-gate 	 * if largefiles are disallowed, the limit is
8057c478bd9Sstevel@tonic-gate 	 * the pre-largefiles value of 2GB
8067c478bd9Sstevel@tonic-gate 	 */
8077c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_lfflags & UFS_LARGEFILES)
8087c478bd9Sstevel@tonic-gate 		limit = MIN(UFS_MAXOFFSET_T, limit);
8097c478bd9Sstevel@tonic-gate 	else
8107c478bd9Sstevel@tonic-gate 		limit = MIN(MAXOFF32_T, limit);
8117c478bd9Sstevel@tonic-gate 
8127c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset < (offset_t)0) {
8137c478bd9Sstevel@tonic-gate 		return (EINVAL);
8147c478bd9Sstevel@tonic-gate 	}
8157c478bd9Sstevel@tonic-gate 	if (uio->uio_resid == 0) {
8167c478bd9Sstevel@tonic-gate 		return (0);
8177c478bd9Sstevel@tonic-gate 	}
8187c478bd9Sstevel@tonic-gate 
8197c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset >= limit)
8207c478bd9Sstevel@tonic-gate 		return (EFBIG);
8217c478bd9Sstevel@tonic-gate 
8227c478bd9Sstevel@tonic-gate 	ip->i_flag |= INOACC;	/* don't update ref time in getpage */
8237c478bd9Sstevel@tonic-gate 
8247c478bd9Sstevel@tonic-gate 	if (ioflag & (FSYNC|FDSYNC)) {
8257c478bd9Sstevel@tonic-gate 		ip->i_flag |= ISYNC;
8267c478bd9Sstevel@tonic-gate 		iupdat_flag = 1;
8277c478bd9Sstevel@tonic-gate 	}
8287c478bd9Sstevel@tonic-gate 	/*
8297c478bd9Sstevel@tonic-gate 	 * Try to go direct
8307c478bd9Sstevel@tonic-gate 	 */
8317c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) {
8327c478bd9Sstevel@tonic-gate 		uio->uio_llimit = limit;
8337c478bd9Sstevel@tonic-gate 		error = ufs_directio_write(ip, uio, ioflag, 0, cr,
83480d34432Sfrankho 		    &directio_status);
8357c478bd9Sstevel@tonic-gate 		/*
8367c478bd9Sstevel@tonic-gate 		 * If ufs_directio wrote to the file or set the flags,
8377c478bd9Sstevel@tonic-gate 		 * we need to update i_seq, but it may be deferred.
8387c478bd9Sstevel@tonic-gate 		 */
8397c478bd9Sstevel@tonic-gate 		if (start_resid != uio->uio_resid ||
84080d34432Sfrankho 		    (ip->i_flag & (ICHG|IUPD))) {
8417c478bd9Sstevel@tonic-gate 			i_seq_needed = 1;
8427c478bd9Sstevel@tonic-gate 			ip->i_flag |= ISEQ;
8437c478bd9Sstevel@tonic-gate 		}
8447c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS)
8457c478bd9Sstevel@tonic-gate 			goto out;
8467c478bd9Sstevel@tonic-gate 	}
8477c478bd9Sstevel@tonic-gate 
8487c478bd9Sstevel@tonic-gate 	/*
8497c478bd9Sstevel@tonic-gate 	 * Behavior with respect to dropping/reacquiring vfs_dqrwlock:
8507c478bd9Sstevel@tonic-gate 	 *
8517c478bd9Sstevel@tonic-gate 	 * o shadow inodes: vfs_dqrwlock is not held at all
8527c478bd9Sstevel@tonic-gate 	 * o quota updates: vfs_dqrwlock is read or write held
8537c478bd9Sstevel@tonic-gate 	 * o other updates: vfs_dqrwlock is read held
8547c478bd9Sstevel@tonic-gate 	 *
8557c478bd9Sstevel@tonic-gate 	 * The first case is the only one where we do not hold
8567c478bd9Sstevel@tonic-gate 	 * vfs_dqrwlock at all while entering wrip().
8577c478bd9Sstevel@tonic-gate 	 * We must make sure not to downgrade/drop vfs_dqrwlock if we
8587c478bd9Sstevel@tonic-gate 	 * have it as writer, i.e. if we are updating the quota inode.
8597c478bd9Sstevel@tonic-gate 	 * There is no potential deadlock scenario in this case as
8607c478bd9Sstevel@tonic-gate 	 * ufs_getpage() takes care of this and avoids reacquiring
8617c478bd9Sstevel@tonic-gate 	 * vfs_dqrwlock in that case.
8627c478bd9Sstevel@tonic-gate 	 *
8637c478bd9Sstevel@tonic-gate 	 * This check is done here since the above conditions do not change
8647c478bd9Sstevel@tonic-gate 	 * and we possibly loop below, so save a few cycles.
8657c478bd9Sstevel@tonic-gate 	 */
8667c478bd9Sstevel@tonic-gate 	if ((type == IFSHAD) ||
86780d34432Sfrankho 	    (rw_owner(&ufsvfsp->vfs_dqrwlock) == curthread)) {
868986fd29aSsetje 		do_dqrwlock = 0;
8697c478bd9Sstevel@tonic-gate 	} else {
8707c478bd9Sstevel@tonic-gate 		do_dqrwlock = 1;
8717c478bd9Sstevel@tonic-gate 	}
8727c478bd9Sstevel@tonic-gate 
8737c478bd9Sstevel@tonic-gate 	/*
8747c478bd9Sstevel@tonic-gate 	 * Large Files: We cast MAXBMASK to offset_t
8757c478bd9Sstevel@tonic-gate 	 * inorder to mask out the higher bits. Since offset_t
8767c478bd9Sstevel@tonic-gate 	 * is a signed value, the high order bit set in MAXBMASK
8777c478bd9Sstevel@tonic-gate 	 * value makes it do the right thing by having all bits 1
8787c478bd9Sstevel@tonic-gate 	 * in the higher word. May be removed for _SOLARIS64_.
8797c478bd9Sstevel@tonic-gate 	 */
8807c478bd9Sstevel@tonic-gate 
8817c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
8827c478bd9Sstevel@tonic-gate 	do {
8837c478bd9Sstevel@tonic-gate 		u_offset_t uoff = uio->uio_loffset;
8847c478bd9Sstevel@tonic-gate 		off = uoff & (offset_t)MAXBMASK;
8857c478bd9Sstevel@tonic-gate 		mapon = (int)(uoff & (offset_t)MAXBOFFSET);
8867c478bd9Sstevel@tonic-gate 		on = (int)blkoff(fs, uoff);
8877c478bd9Sstevel@tonic-gate 		n = (int)MIN(fs->fs_bsize - on, uio->uio_resid);
8887c478bd9Sstevel@tonic-gate 		new_iblocks = 1;
8897c478bd9Sstevel@tonic-gate 
8907c478bd9Sstevel@tonic-gate 		if (type == IFREG && uoff + n >= limit) {
8917c478bd9Sstevel@tonic-gate 			if (uoff >= limit) {
8927c478bd9Sstevel@tonic-gate 				error = EFBIG;
8937c478bd9Sstevel@tonic-gate 				goto out;
8947c478bd9Sstevel@tonic-gate 			}
8957c478bd9Sstevel@tonic-gate 			/*
8967c478bd9Sstevel@tonic-gate 			 * since uoff + n >= limit,
8977c478bd9Sstevel@tonic-gate 			 * therefore n >= limit - uoff, and n is an int
8987c478bd9Sstevel@tonic-gate 			 * so it is safe to cast it to an int
8997c478bd9Sstevel@tonic-gate 			 */
9007c478bd9Sstevel@tonic-gate 			n = (int)(limit - (rlim64_t)uoff);
9017c478bd9Sstevel@tonic-gate 		}
9027c478bd9Sstevel@tonic-gate 		if (uoff + n > ip->i_size) {
9037c478bd9Sstevel@tonic-gate 			/*
9047c478bd9Sstevel@tonic-gate 			 * We are extending the length of the file.
9057c478bd9Sstevel@tonic-gate 			 * bmap is used so that we are sure that
9067c478bd9Sstevel@tonic-gate 			 * if we need to allocate new blocks, that it
9077c478bd9Sstevel@tonic-gate 			 * is done here before we up the file size.
9087c478bd9Sstevel@tonic-gate 			 */
9097c478bd9Sstevel@tonic-gate 			error = bmap_write(ip, uoff, (int)(on + n),
910303bf60bSsdebnath 			    mapon == 0, NULL, cr);
9117c478bd9Sstevel@tonic-gate 			/*
9127c478bd9Sstevel@tonic-gate 			 * bmap_write never drops i_contents so if
9137c478bd9Sstevel@tonic-gate 			 * the flags are set it changed the file.
9147c478bd9Sstevel@tonic-gate 			 */
9157c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD)) {
9167c478bd9Sstevel@tonic-gate 				i_seq_needed = 1;
9177c478bd9Sstevel@tonic-gate 				ip->i_flag |= ISEQ;
9187c478bd9Sstevel@tonic-gate 			}
9197c478bd9Sstevel@tonic-gate 			if (error)
9207c478bd9Sstevel@tonic-gate 				break;
9217c478bd9Sstevel@tonic-gate 			/*
9227c478bd9Sstevel@tonic-gate 			 * There is a window of vulnerability here.
9237c478bd9Sstevel@tonic-gate 			 * The sequence of operations: allocate file
9247c478bd9Sstevel@tonic-gate 			 * system blocks, uiomove the data into pages,
9257c478bd9Sstevel@tonic-gate 			 * and then update the size of the file in the
9267c478bd9Sstevel@tonic-gate 			 * inode, must happen atomically.  However, due
9277c478bd9Sstevel@tonic-gate 			 * to current locking constraints, this can not
9287c478bd9Sstevel@tonic-gate 			 * be done.
9297c478bd9Sstevel@tonic-gate 			 */
9307c478bd9Sstevel@tonic-gate 			ASSERT(ip->i_writer == NULL);
9317c478bd9Sstevel@tonic-gate 			ip->i_writer = curthread;
9327c478bd9Sstevel@tonic-gate 			i_size_changed = 1;
9337c478bd9Sstevel@tonic-gate 			/*
9347c478bd9Sstevel@tonic-gate 			 * If we are writing from the beginning of
9357c478bd9Sstevel@tonic-gate 			 * the mapping, we can just create the
9367c478bd9Sstevel@tonic-gate 			 * pages without having to read them.
9377c478bd9Sstevel@tonic-gate 			 */
9387c478bd9Sstevel@tonic-gate 			pagecreate = (mapon == 0);
9397c478bd9Sstevel@tonic-gate 		} else if (n == MAXBSIZE) {
9407c478bd9Sstevel@tonic-gate 			/*
9417c478bd9Sstevel@tonic-gate 			 * Going to do a whole mappings worth,
9427c478bd9Sstevel@tonic-gate 			 * so we can just create the pages w/o
9437c478bd9Sstevel@tonic-gate 			 * having to read them in.  But before
9447c478bd9Sstevel@tonic-gate 			 * we do that, we need to make sure any
9457c478bd9Sstevel@tonic-gate 			 * needed blocks are allocated first.
9467c478bd9Sstevel@tonic-gate 			 */
9477c478bd9Sstevel@tonic-gate 			iblocks = ip->i_blocks;
948303bf60bSsdebnath 			error = bmap_write(ip, uoff, (int)(on + n),
949303bf60bSsdebnath 			    BI_ALLOC_ONLY, NULL, cr);
9507c478bd9Sstevel@tonic-gate 			/*
9517c478bd9Sstevel@tonic-gate 			 * bmap_write never drops i_contents so if
9527c478bd9Sstevel@tonic-gate 			 * the flags are set it changed the file.
9537c478bd9Sstevel@tonic-gate 			 */
9547c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD)) {
9557c478bd9Sstevel@tonic-gate 				i_seq_needed = 1;
9567c478bd9Sstevel@tonic-gate 				ip->i_flag |= ISEQ;
9577c478bd9Sstevel@tonic-gate 			}
9587c478bd9Sstevel@tonic-gate 			if (error)
9597c478bd9Sstevel@tonic-gate 				break;
9607c478bd9Sstevel@tonic-gate 			pagecreate = 1;
9617c478bd9Sstevel@tonic-gate 			/*
9627c478bd9Sstevel@tonic-gate 			 * check if the new created page needed the
9637c478bd9Sstevel@tonic-gate 			 * allocation of new disk blocks.
9647c478bd9Sstevel@tonic-gate 			 */
9657c478bd9Sstevel@tonic-gate 			if (iblocks == ip->i_blocks)
9667c478bd9Sstevel@tonic-gate 				new_iblocks = 0; /* no new blocks allocated */
9677c478bd9Sstevel@tonic-gate 		} else {
9687c478bd9Sstevel@tonic-gate 			pagecreate = 0;
9697c478bd9Sstevel@tonic-gate 			/*
9707c478bd9Sstevel@tonic-gate 			 * In sync mode flush the indirect blocks which
9717c478bd9Sstevel@tonic-gate 			 * may have been allocated and not written on
9727c478bd9Sstevel@tonic-gate 			 * disk. In above cases bmap_write will allocate
9737c478bd9Sstevel@tonic-gate 			 * in sync mode.
9747c478bd9Sstevel@tonic-gate 			 */
9757c478bd9Sstevel@tonic-gate 			if (ioflag & (FSYNC|FDSYNC)) {
9767c478bd9Sstevel@tonic-gate 				error = ufs_indirblk_sync(ip, uoff);
9777c478bd9Sstevel@tonic-gate 				if (error)
9787c478bd9Sstevel@tonic-gate 					break;
9797c478bd9Sstevel@tonic-gate 			}
9807c478bd9Sstevel@tonic-gate 		}
9817c478bd9Sstevel@tonic-gate 
9827c478bd9Sstevel@tonic-gate 		/*
9837c478bd9Sstevel@tonic-gate 		 * At this point we can enter ufs_getpage() in one
9847c478bd9Sstevel@tonic-gate 		 * of two ways:
9857c478bd9Sstevel@tonic-gate 		 * 1) segmap_getmapflt() calls ufs_getpage() when the
9867c478bd9Sstevel@tonic-gate 		 *    forcefault parameter is true (pagecreate == 0)
9877c478bd9Sstevel@tonic-gate 		 * 2) uiomove() causes a page fault.
9887c478bd9Sstevel@tonic-gate 		 *
9897c478bd9Sstevel@tonic-gate 		 * We have to drop the contents lock to prevent the VM
990da6c28aaSamw 		 * system from trying to reacquire it in ufs_getpage()
9917c478bd9Sstevel@tonic-gate 		 * should the uiomove cause a pagefault.
9927c478bd9Sstevel@tonic-gate 		 *
9937c478bd9Sstevel@tonic-gate 		 * We have to drop the reader vfs_dqrwlock here as well.
9947c478bd9Sstevel@tonic-gate 		 */
9957c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
9967c478bd9Sstevel@tonic-gate 		if (do_dqrwlock) {
9977c478bd9Sstevel@tonic-gate 			ASSERT(RW_LOCK_HELD(&ufsvfsp->vfs_dqrwlock));
9987c478bd9Sstevel@tonic-gate 			ASSERT(!(RW_WRITE_HELD(&ufsvfsp->vfs_dqrwlock)));
9997c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
10007c478bd9Sstevel@tonic-gate 		}
10017c478bd9Sstevel@tonic-gate 
1002a5652762Spraks 		newpage = 0;
1003a5652762Spraks 		premove_resid = uio->uio_resid;
10046f5f1c63SDonghai Qiao 
10056f5f1c63SDonghai Qiao 		/*
10066f5f1c63SDonghai Qiao 		 * Touch the page and fault it in if it is not in core
10076f5f1c63SDonghai Qiao 		 * before segmap_getmapflt or vpm_data_copy can lock it.
10086f5f1c63SDonghai Qiao 		 * This is to avoid the deadlock if the buffer is mapped
10096f5f1c63SDonghai Qiao 		 * to the same file through mmap which we want to write.
10106f5f1c63SDonghai Qiao 		 */
10116f5f1c63SDonghai Qiao 		uio_prefaultpages((long)n, uio);
10126f5f1c63SDonghai Qiao 
1013a5652762Spraks 		if (vpm_enable) {
1014a5652762Spraks 			/*
1015a5652762Spraks 			 * Copy data. If new pages are created, part of
1016a5652762Spraks 			 * the page that is not written will be initizliazed
1017a5652762Spraks 			 * with zeros.
1018a5652762Spraks 			 */
1019a5652762Spraks 			error = vpm_data_copy(vp, (off + mapon), (uint_t)n,
102080d34432Sfrankho 			    uio, !pagecreate, &newpage, 0, S_WRITE);
1021a5652762Spraks 		} else {
1022a5652762Spraks 
1023a5652762Spraks 			base = segmap_getmapflt(segkmap, vp, (off + mapon),
102480d34432Sfrankho 			    (uint_t)n, !pagecreate, S_WRITE);
10257c478bd9Sstevel@tonic-gate 
1026a5652762Spraks 			/*
1027a5652762Spraks 			 * segmap_pagecreate() returns 1 if it calls
1028a5652762Spraks 			 * page_create_va() to allocate any pages.
1029a5652762Spraks 			 */
10307c478bd9Sstevel@tonic-gate 
1031a5652762Spraks 			if (pagecreate)
1032a5652762Spraks 				newpage = segmap_pagecreate(segkmap, base,
1033a5652762Spraks 				    (size_t)n, 0);
10347c478bd9Sstevel@tonic-gate 
1035a5652762Spraks 			error = uiomove(base + mapon, (long)n, UIO_WRITE, uio);
1036a5652762Spraks 		}
10377c478bd9Sstevel@tonic-gate 
10387c478bd9Sstevel@tonic-gate 		/*
10397c478bd9Sstevel@tonic-gate 		 * If "newpage" is set, then a new page was created and it
10407c478bd9Sstevel@tonic-gate 		 * does not contain valid data, so it needs to be initialized
10417c478bd9Sstevel@tonic-gate 		 * at this point.
10427c478bd9Sstevel@tonic-gate 		 * Otherwise the page contains old data, which was overwritten
10437c478bd9Sstevel@tonic-gate 		 * partially or as a whole in uiomove.
10447c478bd9Sstevel@tonic-gate 		 * If there is only one iovec structure within uio, then
10457c478bd9Sstevel@tonic-gate 		 * on error uiomove will not be able to update uio->uio_loffset
10467c478bd9Sstevel@tonic-gate 		 * and we would zero the whole page here!
10477c478bd9Sstevel@tonic-gate 		 *
10487c478bd9Sstevel@tonic-gate 		 * If uiomove fails because of an error, the old valid data
10497c478bd9Sstevel@tonic-gate 		 * is kept instead of filling the rest of the page with zero's.
10507c478bd9Sstevel@tonic-gate 		 */
1051a5652762Spraks 		if (!vpm_enable && newpage &&
10527c478bd9Sstevel@tonic-gate 		    uio->uio_loffset < roundup(off + mapon + n, PAGESIZE)) {
10537c478bd9Sstevel@tonic-gate 			/*
10547c478bd9Sstevel@tonic-gate 			 * We created pages w/o initializing them completely,
10557c478bd9Sstevel@tonic-gate 			 * thus we need to zero the part that wasn't set up.
10567c478bd9Sstevel@tonic-gate 			 * This happens on most EOF write cases and if
10577c478bd9Sstevel@tonic-gate 			 * we had some sort of error during the uiomove.
10587c478bd9Sstevel@tonic-gate 			 */
10597c478bd9Sstevel@tonic-gate 			int nzero, nmoved;
10607c478bd9Sstevel@tonic-gate 
10617c478bd9Sstevel@tonic-gate 			nmoved = (int)(uio->uio_loffset - (off + mapon));
10627c478bd9Sstevel@tonic-gate 			ASSERT(nmoved >= 0 && nmoved <= n);
10637c478bd9Sstevel@tonic-gate 			nzero = roundup(on + n, PAGESIZE) - nmoved;
10647c478bd9Sstevel@tonic-gate 			ASSERT(nzero > 0 && mapon + nmoved + nzero <= MAXBSIZE);
10657c478bd9Sstevel@tonic-gate 			(void) kzero(base + mapon + nmoved, (uint_t)nzero);
10667c478bd9Sstevel@tonic-gate 		}
10677c478bd9Sstevel@tonic-gate 
10687c478bd9Sstevel@tonic-gate 		/*
10697c478bd9Sstevel@tonic-gate 		 * Unlock the pages allocated by page_create_va()
10707c478bd9Sstevel@tonic-gate 		 * in segmap_pagecreate()
10717c478bd9Sstevel@tonic-gate 		 */
1072a5652762Spraks 		if (!vpm_enable && newpage)
10737c478bd9Sstevel@tonic-gate 			segmap_pageunlock(segkmap, base, (size_t)n, S_WRITE);
10747c478bd9Sstevel@tonic-gate 
10757c478bd9Sstevel@tonic-gate 		/*
10767c478bd9Sstevel@tonic-gate 		 * If the size of the file changed, then update the
10777c478bd9Sstevel@tonic-gate 		 * size field in the inode now.  This can't be done
10787c478bd9Sstevel@tonic-gate 		 * before the call to segmap_pageunlock or there is
10797c478bd9Sstevel@tonic-gate 		 * a potential deadlock with callers to ufs_putpage().
10807c478bd9Sstevel@tonic-gate 		 * They will be holding i_contents and trying to lock
10817c478bd9Sstevel@tonic-gate 		 * a page, while this thread is holding a page locked
10827c478bd9Sstevel@tonic-gate 		 * and trying to acquire i_contents.
10837c478bd9Sstevel@tonic-gate 		 */
10847c478bd9Sstevel@tonic-gate 		if (i_size_changed) {
10857c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
10867c478bd9Sstevel@tonic-gate 			old_i_size = ip->i_size;
10877c478bd9Sstevel@tonic-gate 			UFS_SET_ISIZE(uoff + n, ip);
10887c478bd9Sstevel@tonic-gate 			TRANS_INODE(ufsvfsp, ip);
10897c478bd9Sstevel@tonic-gate 			/*
10907c478bd9Sstevel@tonic-gate 			 * file has grown larger than 2GB. Set flag
10917c478bd9Sstevel@tonic-gate 			 * in superblock to indicate this, if it
10927c478bd9Sstevel@tonic-gate 			 * is not already set.
10937c478bd9Sstevel@tonic-gate 			 */
10947c478bd9Sstevel@tonic-gate 			if ((ip->i_size > MAXOFF32_T) &&
10957c478bd9Sstevel@tonic-gate 			    !(fs->fs_flags & FSLARGEFILES)) {
10967c478bd9Sstevel@tonic-gate 				ASSERT(ufsvfsp->vfs_lfflags & UFS_LARGEFILES);
10977c478bd9Sstevel@tonic-gate 				mutex_enter(&ufsvfsp->vfs_lock);
10987c478bd9Sstevel@tonic-gate 				fs->fs_flags |= FSLARGEFILES;
10997c478bd9Sstevel@tonic-gate 				ufs_sbwrite(ufsvfsp);
11007c478bd9Sstevel@tonic-gate 				mutex_exit(&ufsvfsp->vfs_lock);
11017c478bd9Sstevel@tonic-gate 			}
11027c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
11037c478bd9Sstevel@tonic-gate 			ip->i_writer = NULL;
11047c478bd9Sstevel@tonic-gate 			cv_broadcast(&ip->i_wrcv);
11057c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
11067c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
11077c478bd9Sstevel@tonic-gate 		}
11087c478bd9Sstevel@tonic-gate 
11097c478bd9Sstevel@tonic-gate 		if (error) {
11107c478bd9Sstevel@tonic-gate 			/*
11117c478bd9Sstevel@tonic-gate 			 * If we failed on a write, we may have already
11127c478bd9Sstevel@tonic-gate 			 * allocated file blocks as well as pages.  It's
11137c478bd9Sstevel@tonic-gate 			 * hard to undo the block allocation, but we must
11147c478bd9Sstevel@tonic-gate 			 * be sure to invalidate any pages that may have
11157c478bd9Sstevel@tonic-gate 			 * been allocated.
11167c478bd9Sstevel@tonic-gate 			 *
11177c478bd9Sstevel@tonic-gate 			 * If the page was created without initialization
11187c478bd9Sstevel@tonic-gate 			 * then we must check if it should be possible
11197c478bd9Sstevel@tonic-gate 			 * to destroy the new page and to keep the old data
11207c478bd9Sstevel@tonic-gate 			 * on the disk.
11217c478bd9Sstevel@tonic-gate 			 *
11227c478bd9Sstevel@tonic-gate 			 * It is possible to destroy the page without
11237c478bd9Sstevel@tonic-gate 			 * having to write back its contents only when
11247c478bd9Sstevel@tonic-gate 			 * - the size of the file keeps unchanged
11257c478bd9Sstevel@tonic-gate 			 * - bmap_write() did not allocate new disk blocks
11267c478bd9Sstevel@tonic-gate 			 *   it is possible to create big files using "seek" and
11277c478bd9Sstevel@tonic-gate 			 *   write to the end of the file. A "write" to a
11287c478bd9Sstevel@tonic-gate 			 *   position before the end of the file would not
11297c478bd9Sstevel@tonic-gate 			 *   change the size of the file but it would allocate
11307c478bd9Sstevel@tonic-gate 			 *   new disk blocks.
11317c478bd9Sstevel@tonic-gate 			 * - uiomove intended to overwrite the whole page.
11327c478bd9Sstevel@tonic-gate 			 * - a new page was created (newpage == 1).
11337c478bd9Sstevel@tonic-gate 			 */
11347c478bd9Sstevel@tonic-gate 
11357c478bd9Sstevel@tonic-gate 			if (i_size_changed == 0 && new_iblocks == 0 &&
11367c478bd9Sstevel@tonic-gate 			    newpage) {
11377c478bd9Sstevel@tonic-gate 
11387c478bd9Sstevel@tonic-gate 				/* unwind what uiomove eventually last did */
11397c478bd9Sstevel@tonic-gate 				uio->uio_resid = premove_resid;
11407c478bd9Sstevel@tonic-gate 
11417c478bd9Sstevel@tonic-gate 				/*
11427c478bd9Sstevel@tonic-gate 				 * destroy the page, do not write ambiguous
11437c478bd9Sstevel@tonic-gate 				 * data to the disk.
11447c478bd9Sstevel@tonic-gate 				 */
11457c478bd9Sstevel@tonic-gate 				flags = SM_DESTROY;
11467c478bd9Sstevel@tonic-gate 			} else {
11477c478bd9Sstevel@tonic-gate 				/*
11487c478bd9Sstevel@tonic-gate 				 * write the page back to the disk, if dirty,
11497c478bd9Sstevel@tonic-gate 				 * and remove the page from the cache.
11507c478bd9Sstevel@tonic-gate 				 */
11517c478bd9Sstevel@tonic-gate 				flags = SM_INVAL;
11527c478bd9Sstevel@tonic-gate 			}
1153a5652762Spraks 
1154a5652762Spraks 			if (vpm_enable) {
1155a5652762Spraks 				/*
1156a5652762Spraks 				 *  Flush pages.
1157a5652762Spraks 				 */
1158a5652762Spraks 				(void) vpm_sync_pages(vp, off, n, flags);
1159a5652762Spraks 			} else {
1160a5652762Spraks 				(void) segmap_release(segkmap, base, flags);
1161a5652762Spraks 			}
11627c478bd9Sstevel@tonic-gate 		} else {
11637c478bd9Sstevel@tonic-gate 			flags = 0;
11647c478bd9Sstevel@tonic-gate 			/*
11657c478bd9Sstevel@tonic-gate 			 * Force write back for synchronous write cases.
11667c478bd9Sstevel@tonic-gate 			 */
11677c478bd9Sstevel@tonic-gate 			if ((ioflag & (FSYNC|FDSYNC)) || type == IFDIR) {
11687c478bd9Sstevel@tonic-gate 				/*
11697c478bd9Sstevel@tonic-gate 				 * If the sticky bit is set but the
11707c478bd9Sstevel@tonic-gate 				 * execute bit is not set, we do a
11717c478bd9Sstevel@tonic-gate 				 * synchronous write back and free
11727c478bd9Sstevel@tonic-gate 				 * the page when done.  We set up swap
11737c478bd9Sstevel@tonic-gate 				 * files to be handled this way to
11747c478bd9Sstevel@tonic-gate 				 * prevent servers from keeping around
11757c478bd9Sstevel@tonic-gate 				 * the client's swap pages too long.
11767c478bd9Sstevel@tonic-gate 				 * XXX - there ought to be a better way.
11777c478bd9Sstevel@tonic-gate 				 */
11787c478bd9Sstevel@tonic-gate 				if (IS_SWAPVP(vp)) {
11797c478bd9Sstevel@tonic-gate 					flags = SM_WRITE | SM_FREE |
11807c478bd9Sstevel@tonic-gate 					    SM_DONTNEED;
11817c478bd9Sstevel@tonic-gate 					iupdat_flag = 0;
11827c478bd9Sstevel@tonic-gate 				} else {
11837c478bd9Sstevel@tonic-gate 					flags = SM_WRITE;
11847c478bd9Sstevel@tonic-gate 				}
11857c478bd9Sstevel@tonic-gate 			} else if (n + on == MAXBSIZE || IS_SWAPVP(vp)) {
11867c478bd9Sstevel@tonic-gate 				/*
11877c478bd9Sstevel@tonic-gate 				 * Have written a whole block.
11887c478bd9Sstevel@tonic-gate 				 * Start an asynchronous write and
11897c478bd9Sstevel@tonic-gate 				 * mark the buffer to indicate that
11907c478bd9Sstevel@tonic-gate 				 * it won't be needed again soon.
11917c478bd9Sstevel@tonic-gate 				 */
11927c478bd9Sstevel@tonic-gate 				flags = SM_WRITE | SM_ASYNC | SM_DONTNEED;
11937c478bd9Sstevel@tonic-gate 			}
1194a5652762Spraks 			if (vpm_enable) {
1195a5652762Spraks 				/*
1196a5652762Spraks 				 * Flush pages.
1197a5652762Spraks 				 */
11983bd1497bSpraks 				error = vpm_sync_pages(vp, off, n, flags);
1199a5652762Spraks 			} else {
12003bd1497bSpraks 				error = segmap_release(segkmap, base, flags);
1201a5652762Spraks 			}
12027c478bd9Sstevel@tonic-gate 			/*
12037c478bd9Sstevel@tonic-gate 			 * If the operation failed and is synchronous,
12047c478bd9Sstevel@tonic-gate 			 * then we need to unwind what uiomove() last
12057c478bd9Sstevel@tonic-gate 			 * did so we can potentially return an error to
12067c478bd9Sstevel@tonic-gate 			 * the caller.  If this write operation was
12077c478bd9Sstevel@tonic-gate 			 * done in two pieces and the first succeeded,
12087c478bd9Sstevel@tonic-gate 			 * then we won't return an error for the second
12097c478bd9Sstevel@tonic-gate 			 * piece that failed.  However, we only want to
12107c478bd9Sstevel@tonic-gate 			 * return a resid value that reflects what was
12117c478bd9Sstevel@tonic-gate 			 * really done.
12127c478bd9Sstevel@tonic-gate 			 *
12137c478bd9Sstevel@tonic-gate 			 * Failures for non-synchronous operations can
12147c478bd9Sstevel@tonic-gate 			 * be ignored since the page subsystem will
12157c478bd9Sstevel@tonic-gate 			 * retry the operation until it succeeds or the
12167c478bd9Sstevel@tonic-gate 			 * file system is unmounted.
12177c478bd9Sstevel@tonic-gate 			 */
12187c478bd9Sstevel@tonic-gate 			if (error) {
12197c478bd9Sstevel@tonic-gate 				if ((ioflag & (FSYNC | FDSYNC)) ||
12207c478bd9Sstevel@tonic-gate 				    type == IFDIR) {
12217c478bd9Sstevel@tonic-gate 					uio->uio_resid = premove_resid;
12227c478bd9Sstevel@tonic-gate 				} else {
12237c478bd9Sstevel@tonic-gate 					error = 0;
12247c478bd9Sstevel@tonic-gate 				}
12257c478bd9Sstevel@tonic-gate 			}
12267c478bd9Sstevel@tonic-gate 		}
12277c478bd9Sstevel@tonic-gate 
12287c478bd9Sstevel@tonic-gate 		/*
12297c478bd9Sstevel@tonic-gate 		 * Re-acquire contents lock.
12307c478bd9Sstevel@tonic-gate 		 * If it was dropped, reacquire reader vfs_dqrwlock as well.
12317c478bd9Sstevel@tonic-gate 		 */
12327c478bd9Sstevel@tonic-gate 		if (do_dqrwlock)
12337c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
12347c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
12357c478bd9Sstevel@tonic-gate 
12367c478bd9Sstevel@tonic-gate 		/*
12377c478bd9Sstevel@tonic-gate 		 * If the uiomove() failed or if a synchronous
12387c478bd9Sstevel@tonic-gate 		 * page push failed, fix up i_size.
12397c478bd9Sstevel@tonic-gate 		 */
12407c478bd9Sstevel@tonic-gate 		if (error) {
12417c478bd9Sstevel@tonic-gate 			if (i_size_changed) {
12427c478bd9Sstevel@tonic-gate 				/*
12437c478bd9Sstevel@tonic-gate 				 * The uiomove failed, and we
12447c478bd9Sstevel@tonic-gate 				 * allocated blocks,so get rid
12457c478bd9Sstevel@tonic-gate 				 * of them.
12467c478bd9Sstevel@tonic-gate 				 */
12477c478bd9Sstevel@tonic-gate 				(void) ufs_itrunc(ip, old_i_size, 0, cr);
12487c478bd9Sstevel@tonic-gate 			}
12497c478bd9Sstevel@tonic-gate 		} else {
12507c478bd9Sstevel@tonic-gate 			/*
12517c478bd9Sstevel@tonic-gate 			 * XXX - Can this be out of the loop?
12527c478bd9Sstevel@tonic-gate 			 */
12537c478bd9Sstevel@tonic-gate 			ip->i_flag |= IUPD | ICHG;
12547c478bd9Sstevel@tonic-gate 			/*
12557c478bd9Sstevel@tonic-gate 			 * Only do one increase of i_seq for multiple
12567c478bd9Sstevel@tonic-gate 			 * pieces.  Because we drop locks, record
12577c478bd9Sstevel@tonic-gate 			 * the fact that we changed the timestamp and
12587c478bd9Sstevel@tonic-gate 			 * are deferring the increase in case another thread
12597c478bd9Sstevel@tonic-gate 			 * pushes our timestamp update.
12607c478bd9Sstevel@tonic-gate 			 */
12617c478bd9Sstevel@tonic-gate 			i_seq_needed = 1;
12627c478bd9Sstevel@tonic-gate 			ip->i_flag |= ISEQ;
12637c478bd9Sstevel@tonic-gate 			if (i_size_changed)
12647c478bd9Sstevel@tonic-gate 				ip->i_flag |= IATTCHG;
12657c478bd9Sstevel@tonic-gate 			if ((ip->i_mode & (IEXEC | (IEXEC >> 3) |
12667c478bd9Sstevel@tonic-gate 			    (IEXEC >> 6))) != 0 &&
12677c478bd9Sstevel@tonic-gate 			    (ip->i_mode & (ISUID | ISGID)) != 0 &&
12687c478bd9Sstevel@tonic-gate 			    secpolicy_vnode_setid_retain(cr,
12697c478bd9Sstevel@tonic-gate 			    (ip->i_mode & ISUID) != 0 && ip->i_uid == 0) != 0) {
12707c478bd9Sstevel@tonic-gate 				/*
12717c478bd9Sstevel@tonic-gate 				 * Clear Set-UID & Set-GID bits on
12727c478bd9Sstevel@tonic-gate 				 * successful write if not privileged
12737c478bd9Sstevel@tonic-gate 				 * and at least one of the execute bits
12747c478bd9Sstevel@tonic-gate 				 * is set.  If we always clear Set-GID,
12757c478bd9Sstevel@tonic-gate 				 * mandatory file and record locking is
12767c478bd9Sstevel@tonic-gate 				 * unuseable.
12777c478bd9Sstevel@tonic-gate 				 */
12787c478bd9Sstevel@tonic-gate 				ip->i_mode &= ~(ISUID | ISGID);
12797c478bd9Sstevel@tonic-gate 			}
12807c478bd9Sstevel@tonic-gate 		}
1281f90bab20Sswilcox 		/*
1282f90bab20Sswilcox 		 * In the case the FDSYNC flag is set and this is a
1283f90bab20Sswilcox 		 * "rewrite" we won't log a delta.
1284f90bab20Sswilcox 		 * The FSYNC flag overrides all cases.
1285f90bab20Sswilcox 		 */
1286f90bab20Sswilcox 		if (!ufs_check_rewrite(ip, uio, ioflag) || !(ioflag & FDSYNC)) {
1287f90bab20Sswilcox 			TRANS_INODE(ufsvfsp, ip);
1288f90bab20Sswilcox 		}
12897c478bd9Sstevel@tonic-gate 	} while (error == 0 && uio->uio_resid > 0 && n != 0);
12907c478bd9Sstevel@tonic-gate 
12917c478bd9Sstevel@tonic-gate out:
12927c478bd9Sstevel@tonic-gate 	/*
12937c478bd9Sstevel@tonic-gate 	 * Make sure i_seq is increased at least once per write
12947c478bd9Sstevel@tonic-gate 	 */
12957c478bd9Sstevel@tonic-gate 	if (i_seq_needed) {
12967c478bd9Sstevel@tonic-gate 		ip->i_seq++;
12977c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~ISEQ;	/* no longer deferred */
12987c478bd9Sstevel@tonic-gate 	}
12997c478bd9Sstevel@tonic-gate 
13007c478bd9Sstevel@tonic-gate 	/*
13017c478bd9Sstevel@tonic-gate 	 * Inode is updated according to this table -
13027c478bd9Sstevel@tonic-gate 	 *
13037c478bd9Sstevel@tonic-gate 	 *   FSYNC	  FDSYNC(posix.4)
13047c478bd9Sstevel@tonic-gate 	 *   --------------------------
13057c478bd9Sstevel@tonic-gate 	 *   always@	  IATTCHG|IBDWRITE
13067c478bd9Sstevel@tonic-gate 	 *
13077c478bd9Sstevel@tonic-gate 	 * @ - 	If we are doing synchronous write the only time we should
13087c478bd9Sstevel@tonic-gate 	 *	not be sync'ing the ip here is if we have the stickyhack
13097c478bd9Sstevel@tonic-gate 	 *	activated, the file is marked with the sticky bit and
13107c478bd9Sstevel@tonic-gate 	 *	no exec bit, the file length has not been changed and
13117c478bd9Sstevel@tonic-gate 	 *	no new blocks have been allocated during this write.
13127c478bd9Sstevel@tonic-gate 	 */
13137c478bd9Sstevel@tonic-gate 
13147c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & ISYNC) != 0) {
13157c478bd9Sstevel@tonic-gate 		/*
13167c478bd9Sstevel@tonic-gate 		 * we have eliminated nosync
13177c478bd9Sstevel@tonic-gate 		 */
13187c478bd9Sstevel@tonic-gate 		if ((ip->i_flag & (IATTCHG|IBDWRITE)) ||
131980d34432Sfrankho 		    ((ioflag & FSYNC) && iupdat_flag)) {
13207c478bd9Sstevel@tonic-gate 			ufs_iupdat(ip, 1);
13217c478bd9Sstevel@tonic-gate 		}
13227c478bd9Sstevel@tonic-gate 	}
13237c478bd9Sstevel@tonic-gate 
13247c478bd9Sstevel@tonic-gate 	/*
13257c478bd9Sstevel@tonic-gate 	 * If we've already done a partial-write, terminate
13267c478bd9Sstevel@tonic-gate 	 * the write but return no error unless the error is ENOSPC
13277c478bd9Sstevel@tonic-gate 	 * because the caller can detect this and free resources and
13287c478bd9Sstevel@tonic-gate 	 * try again.
13297c478bd9Sstevel@tonic-gate 	 */
13307c478bd9Sstevel@tonic-gate 	if ((start_resid != uio->uio_resid) && (error != ENOSPC))
13317c478bd9Sstevel@tonic-gate 		error = 0;
13327c478bd9Sstevel@tonic-gate 
13337c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~(INOACC | ISYNC);
13347c478bd9Sstevel@tonic-gate 	ITIMES_NOLOCK(ip);
13357c478bd9Sstevel@tonic-gate 	return (error);
13367c478bd9Sstevel@tonic-gate }
13377c478bd9Sstevel@tonic-gate 
13387c478bd9Sstevel@tonic-gate /*
13397c478bd9Sstevel@tonic-gate  * rdip does the real work of read requests for ufs.
13407c478bd9Sstevel@tonic-gate  */
13417c478bd9Sstevel@tonic-gate int
13427c478bd9Sstevel@tonic-gate rdip(struct inode *ip, struct uio *uio, int ioflag, cred_t *cr)
13437c478bd9Sstevel@tonic-gate {
13447c478bd9Sstevel@tonic-gate 	u_offset_t off;
13457c478bd9Sstevel@tonic-gate 	caddr_t base;
13467c478bd9Sstevel@tonic-gate 	struct fs *fs;
13477c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
13487c478bd9Sstevel@tonic-gate 	struct vnode *vp;
13497c478bd9Sstevel@tonic-gate 	long oresid = uio->uio_resid;
13507c478bd9Sstevel@tonic-gate 	u_offset_t n, on, mapon;
13517c478bd9Sstevel@tonic-gate 	int error = 0;
13527c478bd9Sstevel@tonic-gate 	int doupdate = 1;
1353562eee46Srbourbon 	uint_t flags;
13547c478bd9Sstevel@tonic-gate 	int dofree, directio_status;
13557c478bd9Sstevel@tonic-gate 	krw_t rwtype;
13567c478bd9Sstevel@tonic-gate 	o_mode_t type;
1357d3d50737SRafael Vanoni 	clock_t	now;
13587c478bd9Sstevel@tonic-gate 
13597c478bd9Sstevel@tonic-gate 	vp = ITOV(ip);
13607c478bd9Sstevel@tonic-gate 
13617c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
13627c478bd9Sstevel@tonic-gate 
13637c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
13647c478bd9Sstevel@tonic-gate 
13657c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
13667c478bd9Sstevel@tonic-gate 		return (EIO);
13677c478bd9Sstevel@tonic-gate 
13687c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
13697c478bd9Sstevel@tonic-gate 
13707c478bd9Sstevel@tonic-gate 	/* check for valid filetype */
13717c478bd9Sstevel@tonic-gate 	type = ip->i_mode & IFMT;
13727c478bd9Sstevel@tonic-gate 	if ((type != IFREG) && (type != IFDIR) && (type != IFATTRDIR) &&
13737c478bd9Sstevel@tonic-gate 	    (type != IFLNK) && (type != IFSHAD)) {
13747c478bd9Sstevel@tonic-gate 		return (EIO);
13757c478bd9Sstevel@tonic-gate 	}
13767c478bd9Sstevel@tonic-gate 
13777c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset > UFS_MAXOFFSET_T) {
13787c478bd9Sstevel@tonic-gate 		error = 0;
13797c478bd9Sstevel@tonic-gate 		goto out;
13807c478bd9Sstevel@tonic-gate 	}
13817c478bd9Sstevel@tonic-gate 	if (uio->uio_loffset < (offset_t)0) {
13827c478bd9Sstevel@tonic-gate 		return (EINVAL);
13837c478bd9Sstevel@tonic-gate 	}
13847c478bd9Sstevel@tonic-gate 	if (uio->uio_resid == 0) {
13857c478bd9Sstevel@tonic-gate 		return (0);
13867c478bd9Sstevel@tonic-gate 	}
13877c478bd9Sstevel@tonic-gate 
13887c478bd9Sstevel@tonic-gate 	if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) && (fs->fs_ronly == 0) &&
138980d34432Sfrankho 	    (!ufsvfsp->vfs_noatime)) {
13907c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
13917c478bd9Sstevel@tonic-gate 		ip->i_flag |= IACC;
13927c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
13937c478bd9Sstevel@tonic-gate 	}
13947c478bd9Sstevel@tonic-gate 	/*
13957c478bd9Sstevel@tonic-gate 	 * Try to go direct
13967c478bd9Sstevel@tonic-gate 	 */
13977c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio) {
13987c478bd9Sstevel@tonic-gate 		error = ufs_directio_read(ip, uio, cr, &directio_status);
13997c478bd9Sstevel@tonic-gate 		if (directio_status == DIRECTIO_SUCCESS)
14007c478bd9Sstevel@tonic-gate 			goto out;
14017c478bd9Sstevel@tonic-gate 	}
14027c478bd9Sstevel@tonic-gate 
14037c478bd9Sstevel@tonic-gate 	rwtype = (rw_write_held(&ip->i_contents)?RW_WRITER:RW_READER);
14047c478bd9Sstevel@tonic-gate 
14057c478bd9Sstevel@tonic-gate 	do {
14067c478bd9Sstevel@tonic-gate 		offset_t diff;
14077c478bd9Sstevel@tonic-gate 		u_offset_t uoff = uio->uio_loffset;
14087c478bd9Sstevel@tonic-gate 		off = uoff & (offset_t)MAXBMASK;
14097c478bd9Sstevel@tonic-gate 		mapon = (u_offset_t)(uoff & (offset_t)MAXBOFFSET);
14107c478bd9Sstevel@tonic-gate 		on = (u_offset_t)blkoff(fs, uoff);
14117c478bd9Sstevel@tonic-gate 		n = MIN((u_offset_t)fs->fs_bsize - on,
141280d34432Sfrankho 		    (u_offset_t)uio->uio_resid);
14137c478bd9Sstevel@tonic-gate 
14147c478bd9Sstevel@tonic-gate 		diff = ip->i_size - uoff;
14157c478bd9Sstevel@tonic-gate 
14167c478bd9Sstevel@tonic-gate 		if (diff <= (offset_t)0) {
14177c478bd9Sstevel@tonic-gate 			error = 0;
14187c478bd9Sstevel@tonic-gate 			goto out;
14197c478bd9Sstevel@tonic-gate 		}
14207c478bd9Sstevel@tonic-gate 		if (diff < (offset_t)n)
14217c478bd9Sstevel@tonic-gate 			n = (int)diff;
1422562eee46Srbourbon 
1423562eee46Srbourbon 		/*
1424562eee46Srbourbon 		 * We update smallfile2 and smallfile1 at most every second.
1425562eee46Srbourbon 		 */
1426d3d50737SRafael Vanoni 		now = ddi_get_lbolt();
1427d3d50737SRafael Vanoni 		if (now >= smallfile_update) {
1428562eee46Srbourbon 			uint64_t percpufreeb;
1429562eee46Srbourbon 			if (smallfile1_d == 0) smallfile1_d = SMALLFILE1_D;
1430562eee46Srbourbon 			if (smallfile2_d == 0) smallfile2_d = SMALLFILE2_D;
1431562eee46Srbourbon 			percpufreeb = ptob((uint64_t)freemem) / ncpus_online;
1432562eee46Srbourbon 			smallfile1 = percpufreeb / smallfile1_d;
1433562eee46Srbourbon 			smallfile2 = percpufreeb / smallfile2_d;
1434562eee46Srbourbon 			smallfile1 = MAX(smallfile1, smallfile);
1435562eee46Srbourbon 			smallfile1 = MAX(smallfile1, smallfile64);
1436562eee46Srbourbon 			smallfile2 = MAX(smallfile1, smallfile2);
1437d3d50737SRafael Vanoni 			smallfile_update = now + hz;
1438562eee46Srbourbon 		}
1439562eee46Srbourbon 
14407c478bd9Sstevel@tonic-gate 		dofree = freebehind &&
1441562eee46Srbourbon 		    ip->i_nextr == (off & PAGEMASK) && off > smallfile1;
14427c478bd9Sstevel@tonic-gate 
14437c478bd9Sstevel@tonic-gate 		/*
14447c478bd9Sstevel@tonic-gate 		 * At this point we can enter ufs_getpage() in one of two
14457c478bd9Sstevel@tonic-gate 		 * ways:
14467c478bd9Sstevel@tonic-gate 		 * 1) segmap_getmapflt() calls ufs_getpage() when the
14477c478bd9Sstevel@tonic-gate 		 *    forcefault parameter is true (value of 1 is passed)
14487c478bd9Sstevel@tonic-gate 		 * 2) uiomove() causes a page fault.
14497c478bd9Sstevel@tonic-gate 		 *
14507c478bd9Sstevel@tonic-gate 		 * We cannot hold onto an i_contents reader lock without
14517c478bd9Sstevel@tonic-gate 		 * risking deadlock in ufs_getpage() so drop a reader lock.
14527c478bd9Sstevel@tonic-gate 		 * The ufs_getpage() dolock logic already allows for a
14537c478bd9Sstevel@tonic-gate 		 * thread holding i_contents as writer to work properly
14547c478bd9Sstevel@tonic-gate 		 * so we keep a writer lock.
14557c478bd9Sstevel@tonic-gate 		 */
14567c478bd9Sstevel@tonic-gate 		if (rwtype == RW_READER)
14577c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
14587c478bd9Sstevel@tonic-gate 
1459a5652762Spraks 		if (vpm_enable) {
1460a5652762Spraks 			/*
1461a5652762Spraks 			 * Copy data.
1462a5652762Spraks 			 */
1463a5652762Spraks 			error = vpm_data_copy(vp, (off + mapon), (uint_t)n,
146480d34432Sfrankho 			    uio, 1, NULL, 0, S_READ);
1465a5652762Spraks 		} else {
1466a5652762Spraks 			base = segmap_getmapflt(segkmap, vp, (off + mapon),
146780d34432Sfrankho 			    (uint_t)n, 1, S_READ);
1468a5652762Spraks 			error = uiomove(base + mapon, (long)n, UIO_READ, uio);
1469a5652762Spraks 		}
14707c478bd9Sstevel@tonic-gate 
14717c478bd9Sstevel@tonic-gate 		flags = 0;
14727c478bd9Sstevel@tonic-gate 		if (!error) {
14737c478bd9Sstevel@tonic-gate 			/*
1474562eee46Srbourbon 			 * If  reading sequential  we won't need  this
1475562eee46Srbourbon 			 * buffer again  soon.  For  offsets in  range
1476562eee46Srbourbon 			 * [smallfile1,  smallfile2] release the pages
1477562eee46Srbourbon 			 * at   the  tail  of the   cache list, larger
1478562eee46Srbourbon 			 * offsets are released at the head.
14797c478bd9Sstevel@tonic-gate 			 */
14807c478bd9Sstevel@tonic-gate 			if (dofree) {
1481562eee46Srbourbon 				flags = SM_FREE | SM_ASYNC;
1482562eee46Srbourbon 				if ((cache_read_ahead == 0) &&
148380d34432Sfrankho 				    (off > smallfile2))
1484562eee46Srbourbon 					flags |=  SM_DONTNEED;
14857c478bd9Sstevel@tonic-gate 			}
14867c478bd9Sstevel@tonic-gate 			/*
14877c478bd9Sstevel@tonic-gate 			 * In POSIX SYNC (FSYNC and FDSYNC) read mode,
14887c478bd9Sstevel@tonic-gate 			 * we want to make sure that the page which has
14897c478bd9Sstevel@tonic-gate 			 * been read, is written on disk if it is dirty.
14907c478bd9Sstevel@tonic-gate 			 * And corresponding indirect blocks should also
14917c478bd9Sstevel@tonic-gate 			 * be flushed out.
14927c478bd9Sstevel@tonic-gate 			 */
14937c478bd9Sstevel@tonic-gate 			if ((ioflag & FRSYNC) && (ioflag & (FSYNC|FDSYNC))) {
14947c478bd9Sstevel@tonic-gate 				flags &= ~SM_ASYNC;
14957c478bd9Sstevel@tonic-gate 				flags |= SM_WRITE;
14967c478bd9Sstevel@tonic-gate 			}
1497a5652762Spraks 			if (vpm_enable) {
1498a5652762Spraks 				error = vpm_sync_pages(vp, off, n, flags);
1499a5652762Spraks 			} else {
1500a5652762Spraks 				error = segmap_release(segkmap, base, flags);
1501a5652762Spraks 			}
1502a5652762Spraks 		} else {
1503a5652762Spraks 			if (vpm_enable) {
1504a5652762Spraks 				(void) vpm_sync_pages(vp, off, n, flags);
1505a5652762Spraks 			} else {
1506a5652762Spraks 				(void) segmap_release(segkmap, base, flags);
1507a5652762Spraks 			}
1508a5652762Spraks 		}
15097c478bd9Sstevel@tonic-gate 
15107c478bd9Sstevel@tonic-gate 		if (rwtype == RW_READER)
15117c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, rwtype);
15127c478bd9Sstevel@tonic-gate 	} while (error == 0 && uio->uio_resid > 0 && n != 0);
15137c478bd9Sstevel@tonic-gate out:
15147c478bd9Sstevel@tonic-gate 	/*
15157c478bd9Sstevel@tonic-gate 	 * Inode is updated according to this table if FRSYNC is set.
15167c478bd9Sstevel@tonic-gate 	 *
15177c478bd9Sstevel@tonic-gate 	 *   FSYNC	  FDSYNC(posix.4)
15187c478bd9Sstevel@tonic-gate 	 *   --------------------------
15197c478bd9Sstevel@tonic-gate 	 *   always	  IATTCHG|IBDWRITE
15207c478bd9Sstevel@tonic-gate 	 */
15217c478bd9Sstevel@tonic-gate 	/*
15227c478bd9Sstevel@tonic-gate 	 * The inode is not updated if we're logging and the inode is a
15237c478bd9Sstevel@tonic-gate 	 * directory with FRSYNC, FSYNC and FDSYNC flags set.
15247c478bd9Sstevel@tonic-gate 	 */
15257c478bd9Sstevel@tonic-gate 	if (ioflag & FRSYNC) {
15267c478bd9Sstevel@tonic-gate 		if (TRANS_ISTRANS(ufsvfsp) && ((ip->i_mode & IFMT) == IFDIR)) {
1527986fd29aSsetje 			doupdate = 0;
15287c478bd9Sstevel@tonic-gate 		}
15297c478bd9Sstevel@tonic-gate 		if (doupdate) {
15307c478bd9Sstevel@tonic-gate 			if ((ioflag & FSYNC) ||
15317c478bd9Sstevel@tonic-gate 			    ((ioflag & FDSYNC) &&
15327c478bd9Sstevel@tonic-gate 			    (ip->i_flag & (IATTCHG|IBDWRITE)))) {
15337c478bd9Sstevel@tonic-gate 				ufs_iupdat(ip, 1);
15347c478bd9Sstevel@tonic-gate 			}
15357c478bd9Sstevel@tonic-gate 		}
15367c478bd9Sstevel@tonic-gate 	}
15377c478bd9Sstevel@tonic-gate 	/*
15387c478bd9Sstevel@tonic-gate 	 * If we've already done a partial read, terminate
15397c478bd9Sstevel@tonic-gate 	 * the read but return no error.
15407c478bd9Sstevel@tonic-gate 	 */
15417c478bd9Sstevel@tonic-gate 	if (oresid != uio->uio_resid)
15427c478bd9Sstevel@tonic-gate 		error = 0;
15437c478bd9Sstevel@tonic-gate 	ITIMES(ip);
15447c478bd9Sstevel@tonic-gate 
15457c478bd9Sstevel@tonic-gate 	return (error);
15467c478bd9Sstevel@tonic-gate }
15477c478bd9Sstevel@tonic-gate 
15487c478bd9Sstevel@tonic-gate /* ARGSUSED */
15497c478bd9Sstevel@tonic-gate static int
15507c478bd9Sstevel@tonic-gate ufs_ioctl(
15517c478bd9Sstevel@tonic-gate 	struct vnode	*vp,
15527c478bd9Sstevel@tonic-gate 	int		cmd,
15537c478bd9Sstevel@tonic-gate 	intptr_t	arg,
15547c478bd9Sstevel@tonic-gate 	int		flag,
15557c478bd9Sstevel@tonic-gate 	struct cred	*cr,
1556da6c28aaSamw 	int		*rvalp,
1557da6c28aaSamw 	caller_context_t *ct)
15587c478bd9Sstevel@tonic-gate {
15597c478bd9Sstevel@tonic-gate 	struct lockfs	lockfs, lockfs_out;
15607c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
15617c478bd9Sstevel@tonic-gate 	char		*comment, *original_comment;
15627c478bd9Sstevel@tonic-gate 	struct fs	*fs;
15637c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
15647c478bd9Sstevel@tonic-gate 	offset_t	off;
15657c478bd9Sstevel@tonic-gate 	extern int	maxphys;
15667c478bd9Sstevel@tonic-gate 	int		error;
15677c478bd9Sstevel@tonic-gate 	int		issync;
15687c478bd9Sstevel@tonic-gate 	int		trans_size;
15697c478bd9Sstevel@tonic-gate 
15707c478bd9Sstevel@tonic-gate 
15717c478bd9Sstevel@tonic-gate 	/*
15727c478bd9Sstevel@tonic-gate 	 * forcibly unmounted
15737c478bd9Sstevel@tonic-gate 	 */
157402ffed0eSjr 	if (ufsvfsp == NULL || vp->v_vfsp == NULL ||
157502ffed0eSjr 	    vp->v_vfsp->vfs_flag & VFS_UNMOUNTED)
15767c478bd9Sstevel@tonic-gate 		return (EIO);
15777c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
15787c478bd9Sstevel@tonic-gate 
15797c478bd9Sstevel@tonic-gate 	if (cmd == Q_QUOTACTL) {
15807c478bd9Sstevel@tonic-gate 		error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_QUOTA_MASK);
15817c478bd9Sstevel@tonic-gate 		if (error)
15827c478bd9Sstevel@tonic-gate 			return (error);
15837c478bd9Sstevel@tonic-gate 
15847c478bd9Sstevel@tonic-gate 		if (ulp) {
15857c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_QUOTA,
158680d34432Sfrankho 			    TOP_SETQUOTA_SIZE(fs));
15877c478bd9Sstevel@tonic-gate 		}
15887c478bd9Sstevel@tonic-gate 
15897c478bd9Sstevel@tonic-gate 		error = quotactl(vp, arg, flag, cr);
15907c478bd9Sstevel@tonic-gate 
15917c478bd9Sstevel@tonic-gate 		if (ulp) {
15927c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_QUOTA,
159380d34432Sfrankho 			    TOP_SETQUOTA_SIZE(fs));
15947c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
15957c478bd9Sstevel@tonic-gate 		}
15967c478bd9Sstevel@tonic-gate 		return (error);
15977c478bd9Sstevel@tonic-gate 	}
15987c478bd9Sstevel@tonic-gate 
15997c478bd9Sstevel@tonic-gate 	switch (cmd) {
16007c478bd9Sstevel@tonic-gate 		case _FIOLFS:
16017c478bd9Sstevel@tonic-gate 			/*
16027c478bd9Sstevel@tonic-gate 			 * file system locking
16037c478bd9Sstevel@tonic-gate 			 */
16047c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
16057c478bd9Sstevel@tonic-gate 				return (EPERM);
16067c478bd9Sstevel@tonic-gate 
16077c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
16087c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs,
160980d34432Sfrankho 				    sizeof (struct lockfs)))
16107c478bd9Sstevel@tonic-gate 					return (EFAULT);
16117c478bd9Sstevel@tonic-gate 			}
16127c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
16137c478bd9Sstevel@tonic-gate 			else {
16147c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
16157c478bd9Sstevel@tonic-gate 				/* Translate ILP32 lockfs to LP64 lockfs */
16167c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs32,
16177c478bd9Sstevel@tonic-gate 				    sizeof (struct lockfs32)))
16187c478bd9Sstevel@tonic-gate 					return (EFAULT);
16197c478bd9Sstevel@tonic-gate 				lockfs.lf_lock = (ulong_t)lockfs32.lf_lock;
16207c478bd9Sstevel@tonic-gate 				lockfs.lf_flags = (ulong_t)lockfs32.lf_flags;
16217c478bd9Sstevel@tonic-gate 				lockfs.lf_key = (ulong_t)lockfs32.lf_key;
16227c478bd9Sstevel@tonic-gate 				lockfs.lf_comlen = (ulong_t)lockfs32.lf_comlen;
16237c478bd9Sstevel@tonic-gate 				lockfs.lf_comment =
162480d34432Sfrankho 				    (caddr_t)(uintptr_t)lockfs32.lf_comment;
16257c478bd9Sstevel@tonic-gate 			}
16267c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
16277c478bd9Sstevel@tonic-gate 
16287c478bd9Sstevel@tonic-gate 			if (lockfs.lf_comlen) {
16297c478bd9Sstevel@tonic-gate 				if (lockfs.lf_comlen > LOCKFS_MAXCOMMENTLEN)
16307c478bd9Sstevel@tonic-gate 					return (ENAMETOOLONG);
163180d34432Sfrankho 				comment =
163280d34432Sfrankho 				    kmem_alloc(lockfs.lf_comlen, KM_SLEEP);
16337c478bd9Sstevel@tonic-gate 				if (copyin(lockfs.lf_comment, comment,
163480d34432Sfrankho 				    lockfs.lf_comlen)) {
16357c478bd9Sstevel@tonic-gate 					kmem_free(comment, lockfs.lf_comlen);
16367c478bd9Sstevel@tonic-gate 					return (EFAULT);
16377c478bd9Sstevel@tonic-gate 				}
16387c478bd9Sstevel@tonic-gate 				original_comment = lockfs.lf_comment;
16397c478bd9Sstevel@tonic-gate 				lockfs.lf_comment = comment;
16407c478bd9Sstevel@tonic-gate 			}
16417c478bd9Sstevel@tonic-gate 			if ((error = ufs_fiolfs(vp, &lockfs, 0)) == 0) {
16427c478bd9Sstevel@tonic-gate 				lockfs.lf_comment = original_comment;
16437c478bd9Sstevel@tonic-gate 
16447c478bd9Sstevel@tonic-gate 				if ((flag & DATAMODEL_MASK) ==
16457c478bd9Sstevel@tonic-gate 				    DATAMODEL_NATIVE) {
16467c478bd9Sstevel@tonic-gate 					(void) copyout(&lockfs, (caddr_t)arg,
16477c478bd9Sstevel@tonic-gate 					    sizeof (struct lockfs));
16487c478bd9Sstevel@tonic-gate 				}
16497c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
16507c478bd9Sstevel@tonic-gate 				else {
16517c478bd9Sstevel@tonic-gate 					struct lockfs32	lockfs32;
16527c478bd9Sstevel@tonic-gate 					/* Translate LP64 to ILP32 lockfs */
16537c478bd9Sstevel@tonic-gate 					lockfs32.lf_lock =
16547c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_lock;
16557c478bd9Sstevel@tonic-gate 					lockfs32.lf_flags =
16567c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_flags;
16577c478bd9Sstevel@tonic-gate 					lockfs32.lf_key =
16587c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_key;
16597c478bd9Sstevel@tonic-gate 					lockfs32.lf_comlen =
16607c478bd9Sstevel@tonic-gate 					    (uint32_t)lockfs.lf_comlen;
16617c478bd9Sstevel@tonic-gate 					lockfs32.lf_comment =
166280d34432Sfrankho 					    (uint32_t)(uintptr_t)
166380d34432Sfrankho 					    lockfs.lf_comment;
16647c478bd9Sstevel@tonic-gate 					(void) copyout(&lockfs32, (caddr_t)arg,
16657c478bd9Sstevel@tonic-gate 					    sizeof (struct lockfs32));
16667c478bd9Sstevel@tonic-gate 				}
16677c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
16687c478bd9Sstevel@tonic-gate 
16697c478bd9Sstevel@tonic-gate 			} else {
16707c478bd9Sstevel@tonic-gate 				if (lockfs.lf_comlen)
16717c478bd9Sstevel@tonic-gate 					kmem_free(comment, lockfs.lf_comlen);
16727c478bd9Sstevel@tonic-gate 			}
16737c478bd9Sstevel@tonic-gate 			return (error);
16747c478bd9Sstevel@tonic-gate 
16757c478bd9Sstevel@tonic-gate 		case _FIOLFSS:
16767c478bd9Sstevel@tonic-gate 			/*
16777c478bd9Sstevel@tonic-gate 			 * get file system locking status
16787c478bd9Sstevel@tonic-gate 			 */
16797c478bd9Sstevel@tonic-gate 
16807c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
16817c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs,
168280d34432Sfrankho 				    sizeof (struct lockfs)))
16837c478bd9Sstevel@tonic-gate 					return (EFAULT);
16847c478bd9Sstevel@tonic-gate 			}
16857c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
16867c478bd9Sstevel@tonic-gate 			else {
16877c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
16887c478bd9Sstevel@tonic-gate 				/* Translate ILP32 lockfs to LP64 lockfs */
16897c478bd9Sstevel@tonic-gate 				if (copyin((caddr_t)arg, &lockfs32,
169080d34432Sfrankho 				    sizeof (struct lockfs32)))
16917c478bd9Sstevel@tonic-gate 					return (EFAULT);
16927c478bd9Sstevel@tonic-gate 				lockfs.lf_lock = (ulong_t)lockfs32.lf_lock;
16937c478bd9Sstevel@tonic-gate 				lockfs.lf_flags = (ulong_t)lockfs32.lf_flags;
16947c478bd9Sstevel@tonic-gate 				lockfs.lf_key = (ulong_t)lockfs32.lf_key;
16957c478bd9Sstevel@tonic-gate 				lockfs.lf_comlen = (ulong_t)lockfs32.lf_comlen;
16967c478bd9Sstevel@tonic-gate 				lockfs.lf_comment =
169780d34432Sfrankho 				    (caddr_t)(uintptr_t)lockfs32.lf_comment;
16987c478bd9Sstevel@tonic-gate 			}
16997c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
17007c478bd9Sstevel@tonic-gate 
17017c478bd9Sstevel@tonic-gate 			if (error =  ufs_fiolfss(vp, &lockfs_out))
17027c478bd9Sstevel@tonic-gate 				return (error);
17037c478bd9Sstevel@tonic-gate 			lockfs.lf_lock = lockfs_out.lf_lock;
17047c478bd9Sstevel@tonic-gate 			lockfs.lf_key = lockfs_out.lf_key;
17057c478bd9Sstevel@tonic-gate 			lockfs.lf_flags = lockfs_out.lf_flags;
17067c478bd9Sstevel@tonic-gate 			lockfs.lf_comlen = MIN(lockfs.lf_comlen,
170780d34432Sfrankho 			    lockfs_out.lf_comlen);
17087c478bd9Sstevel@tonic-gate 
17097c478bd9Sstevel@tonic-gate 			if ((flag & DATAMODEL_MASK) == DATAMODEL_NATIVE) {
17107c478bd9Sstevel@tonic-gate 				if (copyout(&lockfs, (caddr_t)arg,
171180d34432Sfrankho 				    sizeof (struct lockfs)))
17127c478bd9Sstevel@tonic-gate 					return (EFAULT);
17137c478bd9Sstevel@tonic-gate 			}
17147c478bd9Sstevel@tonic-gate #ifdef _SYSCALL32_IMPL
17157c478bd9Sstevel@tonic-gate 			else {
17167c478bd9Sstevel@tonic-gate 				/* Translate LP64 to ILP32 lockfs */
17177c478bd9Sstevel@tonic-gate 				struct lockfs32	lockfs32;
17187c478bd9Sstevel@tonic-gate 				lockfs32.lf_lock = (uint32_t)lockfs.lf_lock;
17197c478bd9Sstevel@tonic-gate 				lockfs32.lf_flags = (uint32_t)lockfs.lf_flags;
17207c478bd9Sstevel@tonic-gate 				lockfs32.lf_key = (uint32_t)lockfs.lf_key;
17217c478bd9Sstevel@tonic-gate 				lockfs32.lf_comlen = (uint32_t)lockfs.lf_comlen;
17227c478bd9Sstevel@tonic-gate 				lockfs32.lf_comment =
172380d34432Sfrankho 				    (uint32_t)(uintptr_t)lockfs.lf_comment;
17247c478bd9Sstevel@tonic-gate 				if (copyout(&lockfs32, (caddr_t)arg,
172580d34432Sfrankho 				    sizeof (struct lockfs32)))
17267c478bd9Sstevel@tonic-gate 					return (EFAULT);
17277c478bd9Sstevel@tonic-gate 			}
17287c478bd9Sstevel@tonic-gate #endif /* _SYSCALL32_IMPL */
17297c478bd9Sstevel@tonic-gate 
17307c478bd9Sstevel@tonic-gate 			if (lockfs.lf_comlen &&
17317c478bd9Sstevel@tonic-gate 			    lockfs.lf_comment && lockfs_out.lf_comment)
17327c478bd9Sstevel@tonic-gate 				if (copyout(lockfs_out.lf_comment,
173380d34432Sfrankho 				    lockfs.lf_comment, lockfs.lf_comlen))
17347c478bd9Sstevel@tonic-gate 					return (EFAULT);
17357c478bd9Sstevel@tonic-gate 			return (0);
17367c478bd9Sstevel@tonic-gate 
17377c478bd9Sstevel@tonic-gate 		case _FIOSATIME:
17387c478bd9Sstevel@tonic-gate 			/*
17397c478bd9Sstevel@tonic-gate 			 * set access time
17407c478bd9Sstevel@tonic-gate 			 */
17417c478bd9Sstevel@tonic-gate 
17427c478bd9Sstevel@tonic-gate 			/*
17437c478bd9Sstevel@tonic-gate 			 * if mounted w/o atime, return quietly.
17447c478bd9Sstevel@tonic-gate 			 * I briefly thought about returning ENOSYS, but
17457c478bd9Sstevel@tonic-gate 			 * figured that most apps would consider this fatal
17467c478bd9Sstevel@tonic-gate 			 * but the idea is to make this as seamless as poss.
17477c478bd9Sstevel@tonic-gate 			 */
17487c478bd9Sstevel@tonic-gate 			if (ufsvfsp->vfs_noatime)
17497c478bd9Sstevel@tonic-gate 				return (0);
17507c478bd9Sstevel@tonic-gate 
17517c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
175280d34432Sfrankho 			    ULOCKFS_SETATTR_MASK);
17537c478bd9Sstevel@tonic-gate 			if (error)
17547c478bd9Sstevel@tonic-gate 				return (error);
17557c478bd9Sstevel@tonic-gate 
17567c478bd9Sstevel@tonic-gate 			if (ulp) {
17577c478bd9Sstevel@tonic-gate 				trans_size = (int)TOP_SETATTR_SIZE(VTOI(vp));
17587c478bd9Sstevel@tonic-gate 				TRANS_BEGIN_CSYNC(ufsvfsp, issync,
175980d34432Sfrankho 				    TOP_SETATTR, trans_size);
17607c478bd9Sstevel@tonic-gate 			}
17617c478bd9Sstevel@tonic-gate 
17627c478bd9Sstevel@tonic-gate 			error = ufs_fiosatime(vp, (struct timeval *)arg,
176380d34432Sfrankho 			    flag, cr);
17647c478bd9Sstevel@tonic-gate 
17657c478bd9Sstevel@tonic-gate 			if (ulp) {
17667c478bd9Sstevel@tonic-gate 				TRANS_END_CSYNC(ufsvfsp, error, issync,
176780d34432Sfrankho 				    TOP_SETATTR, trans_size);
17687c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
17697c478bd9Sstevel@tonic-gate 			}
17707c478bd9Sstevel@tonic-gate 			return (error);
17717c478bd9Sstevel@tonic-gate 
17727c478bd9Sstevel@tonic-gate 		case _FIOSDIO:
17737c478bd9Sstevel@tonic-gate 			/*
17747c478bd9Sstevel@tonic-gate 			 * set delayed-io
17757c478bd9Sstevel@tonic-gate 			 */
17767c478bd9Sstevel@tonic-gate 			return (ufs_fiosdio(vp, (uint_t *)arg, flag, cr));
17777c478bd9Sstevel@tonic-gate 
17787c478bd9Sstevel@tonic-gate 		case _FIOGDIO:
17797c478bd9Sstevel@tonic-gate 			/*
17807c478bd9Sstevel@tonic-gate 			 * get delayed-io
17817c478bd9Sstevel@tonic-gate 			 */
17827c478bd9Sstevel@tonic-gate 			return (ufs_fiogdio(vp, (uint_t *)arg, flag, cr));
17837c478bd9Sstevel@tonic-gate 
17847c478bd9Sstevel@tonic-gate 		case _FIOIO:
17857c478bd9Sstevel@tonic-gate 			/*
17867c478bd9Sstevel@tonic-gate 			 * inode open
17877c478bd9Sstevel@tonic-gate 			 */
17887c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
178980d34432Sfrankho 			    ULOCKFS_VGET_MASK);
17907c478bd9Sstevel@tonic-gate 			if (error)
17917c478bd9Sstevel@tonic-gate 				return (error);
17927c478bd9Sstevel@tonic-gate 
17937c478bd9Sstevel@tonic-gate 			error = ufs_fioio(vp, (struct fioio *)arg, flag, cr);
17947c478bd9Sstevel@tonic-gate 
17957c478bd9Sstevel@tonic-gate 			if (ulp) {
17967c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
17977c478bd9Sstevel@tonic-gate 			}
17987c478bd9Sstevel@tonic-gate 			return (error);
17997c478bd9Sstevel@tonic-gate 
18007c478bd9Sstevel@tonic-gate 		case _FIOFFS:
18017c478bd9Sstevel@tonic-gate 			/*
18027c478bd9Sstevel@tonic-gate 			 * file system flush (push w/invalidate)
18037c478bd9Sstevel@tonic-gate 			 */
18047c478bd9Sstevel@tonic-gate 			if ((caddr_t)arg != NULL)
18057c478bd9Sstevel@tonic-gate 				return (EINVAL);
18067c478bd9Sstevel@tonic-gate 			return (ufs_fioffs(vp, NULL, cr));
18077c478bd9Sstevel@tonic-gate 
18087c478bd9Sstevel@tonic-gate 		case _FIOISBUSY:
18097c478bd9Sstevel@tonic-gate 			/*
18107c478bd9Sstevel@tonic-gate 			 * Contract-private interface for Legato
18117c478bd9Sstevel@tonic-gate 			 * Purge this vnode from the DNLC and decide
18127c478bd9Sstevel@tonic-gate 			 * if this vnode is busy (*arg == 1) or not
18137c478bd9Sstevel@tonic-gate 			 * (*arg == 0)
18147c478bd9Sstevel@tonic-gate 			 */
18157c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18167c478bd9Sstevel@tonic-gate 				return (EPERM);
18177c478bd9Sstevel@tonic-gate 			error = ufs_fioisbusy(vp, (int *)arg, cr);
18187c478bd9Sstevel@tonic-gate 			return (error);
18197c478bd9Sstevel@tonic-gate 
18207c478bd9Sstevel@tonic-gate 		case _FIODIRECTIO:
18217c478bd9Sstevel@tonic-gate 			return (ufs_fiodirectio(vp, (int)arg, cr));
18227c478bd9Sstevel@tonic-gate 
18237c478bd9Sstevel@tonic-gate 		case _FIOTUNE:
18247c478bd9Sstevel@tonic-gate 			/*
18257c478bd9Sstevel@tonic-gate 			 * Tune the file system (aka setting fs attributes)
18267c478bd9Sstevel@tonic-gate 			 */
18277c478bd9Sstevel@tonic-gate 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
182880d34432Sfrankho 			    ULOCKFS_SETATTR_MASK);
18297c478bd9Sstevel@tonic-gate 			if (error)
18307c478bd9Sstevel@tonic-gate 				return (error);
18317c478bd9Sstevel@tonic-gate 
18327c478bd9Sstevel@tonic-gate 			error = ufs_fiotune(vp, (struct fiotune *)arg, cr);
18337c478bd9Sstevel@tonic-gate 
18347c478bd9Sstevel@tonic-gate 			if (ulp)
18357c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
18367c478bd9Sstevel@tonic-gate 			return (error);
18377c478bd9Sstevel@tonic-gate 
18387c478bd9Sstevel@tonic-gate 		case _FIOLOGENABLE:
18397c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18407c478bd9Sstevel@tonic-gate 				return (EPERM);
18417c478bd9Sstevel@tonic-gate 			return (ufs_fiologenable(vp, (void *)arg, cr, flag));
18427c478bd9Sstevel@tonic-gate 
18437c478bd9Sstevel@tonic-gate 		case _FIOLOGDISABLE:
18447c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
18457c478bd9Sstevel@tonic-gate 				return (EPERM);
18467c478bd9Sstevel@tonic-gate 			return (ufs_fiologdisable(vp, (void *)arg, cr, flag));
18477c478bd9Sstevel@tonic-gate 
18487c478bd9Sstevel@tonic-gate 		case _FIOISLOG:
18497c478bd9Sstevel@tonic-gate 			return (ufs_fioislog(vp, (void *)arg, cr, flag));
18507c478bd9Sstevel@tonic-gate 
18517c478bd9Sstevel@tonic-gate 		case _FIOSNAPSHOTCREATE_MULTI:
18527c478bd9Sstevel@tonic-gate 		{
18537c478bd9Sstevel@tonic-gate 			struct fiosnapcreate_multi	fc, *fcp;
18547c478bd9Sstevel@tonic-gate 			size_t	fcm_size;
18557c478bd9Sstevel@tonic-gate 
18567c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, &fc, sizeof (fc)))
18577c478bd9Sstevel@tonic-gate 				return (EFAULT);
18587c478bd9Sstevel@tonic-gate 			if (fc.backfilecount > MAX_BACKFILE_COUNT)
18597c478bd9Sstevel@tonic-gate 				return (EINVAL);
18607c478bd9Sstevel@tonic-gate 			fcm_size = sizeof (struct fiosnapcreate_multi) +
18617c478bd9Sstevel@tonic-gate 			    (fc.backfilecount - 1) * sizeof (int);
18627c478bd9Sstevel@tonic-gate 			fcp = (struct fiosnapcreate_multi *)
18637c478bd9Sstevel@tonic-gate 			    kmem_alloc(fcm_size, KM_SLEEP);
18647c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, fcp, fcm_size)) {
18657c478bd9Sstevel@tonic-gate 				kmem_free(fcp, fcm_size);
18667c478bd9Sstevel@tonic-gate 				return (EFAULT);
18677c478bd9Sstevel@tonic-gate 			}
18687c478bd9Sstevel@tonic-gate 			error = ufs_snap_create(vp, fcp, cr);
186995b7dc1dSmishra 			/*
187095b7dc1dSmishra 			 * Do copyout even if there is an error because
187195b7dc1dSmishra 			 * the details of error is stored in fcp.
187295b7dc1dSmishra 			 */
187395b7dc1dSmishra 			if (copyout(fcp, (void *)arg, fcm_size))
18747c478bd9Sstevel@tonic-gate 				error = EFAULT;
18757c478bd9Sstevel@tonic-gate 			kmem_free(fcp, fcm_size);
18767c478bd9Sstevel@tonic-gate 			return (error);
18777c478bd9Sstevel@tonic-gate 		}
18787c478bd9Sstevel@tonic-gate 
18797c478bd9Sstevel@tonic-gate 		case _FIOSNAPSHOTDELETE:
18807c478bd9Sstevel@tonic-gate 		{
18817c478bd9Sstevel@tonic-gate 			struct fiosnapdelete	fc;
18827c478bd9Sstevel@tonic-gate 
18837c478bd9Sstevel@tonic-gate 			if (copyin((void *)arg, &fc, sizeof (fc)))
18847c478bd9Sstevel@tonic-gate 				return (EFAULT);
18857c478bd9Sstevel@tonic-gate 			error = ufs_snap_delete(vp, &fc, cr);
18867c478bd9Sstevel@tonic-gate 			if (!error && copyout(&fc, (void *)arg, sizeof (fc)))
18877c478bd9Sstevel@tonic-gate 				error = EFAULT;
18887c478bd9Sstevel@tonic-gate 			return (error);
18897c478bd9Sstevel@tonic-gate 		}
18907c478bd9Sstevel@tonic-gate 
18917c478bd9Sstevel@tonic-gate 		case _FIOGETSUPERBLOCK:
18927c478bd9Sstevel@tonic-gate 			if (copyout(fs, (void *)arg, SBSIZE))
18937c478bd9Sstevel@tonic-gate 				return (EFAULT);
18947c478bd9Sstevel@tonic-gate 			return (0);
18957c478bd9Sstevel@tonic-gate 
18967c478bd9Sstevel@tonic-gate 		case _FIOGETMAXPHYS:
18977c478bd9Sstevel@tonic-gate 			if (copyout(&maxphys, (void *)arg, sizeof (maxphys)))
18987c478bd9Sstevel@tonic-gate 				return (EFAULT);
18997c478bd9Sstevel@tonic-gate 			return (0);
19007c478bd9Sstevel@tonic-gate 
19017c478bd9Sstevel@tonic-gate 		/*
19027c478bd9Sstevel@tonic-gate 		 * The following 3 ioctls are for TSufs support
19037c478bd9Sstevel@tonic-gate 		 * although could potentially be used elsewhere
19047c478bd9Sstevel@tonic-gate 		 */
19057c478bd9Sstevel@tonic-gate 		case _FIO_SET_LUFS_DEBUG:
19067c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
19077c478bd9Sstevel@tonic-gate 				return (EPERM);
19087c478bd9Sstevel@tonic-gate 			lufs_debug = (uint32_t)arg;
19097c478bd9Sstevel@tonic-gate 			return (0);
19107c478bd9Sstevel@tonic-gate 
19117c478bd9Sstevel@tonic-gate 		case _FIO_SET_LUFS_ERROR:
19127c478bd9Sstevel@tonic-gate 			if (secpolicy_fs_config(cr, ufsvfsp->vfs_vfs) != 0)
19137c478bd9Sstevel@tonic-gate 				return (EPERM);
19147c478bd9Sstevel@tonic-gate 			TRANS_SETERROR(ufsvfsp);
19157c478bd9Sstevel@tonic-gate 			return (0);
19167c478bd9Sstevel@tonic-gate 
19177c478bd9Sstevel@tonic-gate 		case _FIO_GET_TOP_STATS:
19187c478bd9Sstevel@tonic-gate 		{
19197c478bd9Sstevel@tonic-gate 			fio_lufs_stats_t *ls;
19207c478bd9Sstevel@tonic-gate 			ml_unit_t *ul = ufsvfsp->vfs_log;
19217c478bd9Sstevel@tonic-gate 
19227c478bd9Sstevel@tonic-gate 			ls = kmem_zalloc(sizeof (*ls), KM_SLEEP);
19237c478bd9Sstevel@tonic-gate 			ls->ls_debug = ul->un_debug; /* return debug value */
19247c478bd9Sstevel@tonic-gate 			/* Copy stucture if statistics are being kept */
19257c478bd9Sstevel@tonic-gate 			if (ul->un_logmap->mtm_tops) {
19267c478bd9Sstevel@tonic-gate 				ls->ls_topstats = *(ul->un_logmap->mtm_tops);
19277c478bd9Sstevel@tonic-gate 			}
19287c478bd9Sstevel@tonic-gate 			error = 0;
19297c478bd9Sstevel@tonic-gate 			if (copyout(ls, (void *)arg, sizeof (*ls)))
19307c478bd9Sstevel@tonic-gate 				error = EFAULT;
19317c478bd9Sstevel@tonic-gate 			kmem_free(ls, sizeof (*ls));
19327c478bd9Sstevel@tonic-gate 			return (error);
19337c478bd9Sstevel@tonic-gate 		}
19347c478bd9Sstevel@tonic-gate 
19357c478bd9Sstevel@tonic-gate 		case _FIO_SEEK_DATA:
19367c478bd9Sstevel@tonic-gate 		case _FIO_SEEK_HOLE:
19377c478bd9Sstevel@tonic-gate 			if (ddi_copyin((void *)arg, &off, sizeof (off), flag))
19387c478bd9Sstevel@tonic-gate 				return (EFAULT);
19397c478bd9Sstevel@tonic-gate 			/* offset paramater is in/out */
19407c478bd9Sstevel@tonic-gate 			error = ufs_fio_holey(vp, cmd, &off);
19417c478bd9Sstevel@tonic-gate 			if (error)
19427c478bd9Sstevel@tonic-gate 				return (error);
19437c478bd9Sstevel@tonic-gate 			if (ddi_copyout(&off, (void *)arg, sizeof (off), flag))
19447c478bd9Sstevel@tonic-gate 				return (EFAULT);
19457c478bd9Sstevel@tonic-gate 			return (0);
19467c478bd9Sstevel@tonic-gate 
1947986fd29aSsetje 		case _FIO_COMPRESSED:
1948986fd29aSsetje 		{
1949986fd29aSsetje 			/*
1950986fd29aSsetje 			 * This is a project private ufs ioctl() to mark
1951986fd29aSsetje 			 * the inode as that belonging to a compressed
1952986fd29aSsetje 			 * file. This is used to mark individual
1953342440ecSPrasad Singamsetty 			 * compressed files in a miniroot archive.
1954986fd29aSsetje 			 * The files compressed in this manner are
1955986fd29aSsetje 			 * automatically decompressed by the dcfs filesystem
1956986fd29aSsetje 			 * (via an interception in ufs_lookup - see decompvp())
1957986fd29aSsetje 			 * which is layered on top of ufs on a system running
1958342440ecSPrasad Singamsetty 			 * from the archive. See uts/common/fs/dcfs for details.
1959986fd29aSsetje 			 * This ioctl only marks the file as compressed - the
1960986fd29aSsetje 			 * actual compression is done by fiocompress (a
1961986fd29aSsetje 			 * userland utility) which invokes this ioctl().
1962986fd29aSsetje 			 */
1963986fd29aSsetje 			struct inode *ip = VTOI(vp);
1964986fd29aSsetje 
1965986fd29aSsetje 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
1966986fd29aSsetje 			    ULOCKFS_SETATTR_MASK);
1967986fd29aSsetje 			if (error)
1968986fd29aSsetje 				return (error);
1969986fd29aSsetje 
1970986fd29aSsetje 			if (ulp) {
1971986fd29aSsetje 				TRANS_BEGIN_ASYNC(ufsvfsp, TOP_IUPDAT,
1972986fd29aSsetje 				    TOP_IUPDAT_SIZE(ip));
1973986fd29aSsetje 			}
1974986fd29aSsetje 
1975986fd29aSsetje 			error = ufs_mark_compressed(vp);
1976986fd29aSsetje 
1977986fd29aSsetje 			if (ulp) {
1978986fd29aSsetje 				TRANS_END_ASYNC(ufsvfsp, TOP_IUPDAT,
1979986fd29aSsetje 				    TOP_IUPDAT_SIZE(ip));
1980986fd29aSsetje 				ufs_lockfs_end(ulp);
1981986fd29aSsetje 			}
1982986fd29aSsetje 
1983986fd29aSsetje 			return (error);
1984986fd29aSsetje 
1985986fd29aSsetje 		}
1986986fd29aSsetje 
19877c478bd9Sstevel@tonic-gate 		default:
19887c478bd9Sstevel@tonic-gate 			return (ENOTTY);
19897c478bd9Sstevel@tonic-gate 	}
19907c478bd9Sstevel@tonic-gate }
19917c478bd9Sstevel@tonic-gate 
1992986fd29aSsetje 
19937c478bd9Sstevel@tonic-gate /* ARGSUSED */
19947c478bd9Sstevel@tonic-gate static int
19957c478bd9Sstevel@tonic-gate ufs_getattr(struct vnode *vp, struct vattr *vap, int flags,
1996*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct)
19977c478bd9Sstevel@tonic-gate {
19987c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
19997c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
20007c478bd9Sstevel@tonic-gate 	int err;
20017c478bd9Sstevel@tonic-gate 
20027c478bd9Sstevel@tonic-gate 	if (vap->va_mask == AT_SIZE) {
20037c478bd9Sstevel@tonic-gate 		/*
20047c478bd9Sstevel@tonic-gate 		 * for performance, if only the size is requested don't bother
20057c478bd9Sstevel@tonic-gate 		 * with anything else.
20067c478bd9Sstevel@tonic-gate 		 */
20077c478bd9Sstevel@tonic-gate 		UFS_GET_ISIZE(&vap->va_size, ip);
20087c478bd9Sstevel@tonic-gate 		return (0);
20097c478bd9Sstevel@tonic-gate 	}
20107c478bd9Sstevel@tonic-gate 
20117c478bd9Sstevel@tonic-gate 	/*
20127c478bd9Sstevel@tonic-gate 	 * inlined lockfs checks
20137c478bd9Sstevel@tonic-gate 	 */
20147c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
20157c478bd9Sstevel@tonic-gate 	if ((ufsvfsp == NULL) || ULOCKFS_IS_HLOCK(&ufsvfsp->vfs_ulockfs)) {
20167c478bd9Sstevel@tonic-gate 		err = EIO;
20177c478bd9Sstevel@tonic-gate 		goto out;
20187c478bd9Sstevel@tonic-gate 	}
20197c478bd9Sstevel@tonic-gate 
20207c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_READER);
20217c478bd9Sstevel@tonic-gate 	/*
20227c478bd9Sstevel@tonic-gate 	 * Return all the attributes.  This should be refined so
20237c478bd9Sstevel@tonic-gate 	 * that it only returns what's asked for.
20247c478bd9Sstevel@tonic-gate 	 */
20257c478bd9Sstevel@tonic-gate 
20267c478bd9Sstevel@tonic-gate 	/*
20277c478bd9Sstevel@tonic-gate 	 * Copy from inode table.
20287c478bd9Sstevel@tonic-gate 	 */
20297c478bd9Sstevel@tonic-gate 	vap->va_type = vp->v_type;
20307c478bd9Sstevel@tonic-gate 	vap->va_mode = ip->i_mode & MODEMASK;
20317c478bd9Sstevel@tonic-gate 	/*
20327c478bd9Sstevel@tonic-gate 	 * If there is an ACL and there is a mask entry, then do the
20337c478bd9Sstevel@tonic-gate 	 * extra work that completes the equivalent of an acltomode(3)
20347c478bd9Sstevel@tonic-gate 	 * call.  According to POSIX P1003.1e, the acl mask should be
20357c478bd9Sstevel@tonic-gate 	 * returned in the group permissions field.
20367c478bd9Sstevel@tonic-gate 	 *
20377c478bd9Sstevel@tonic-gate 	 * - start with the original permission and mode bits (from above)
20387c478bd9Sstevel@tonic-gate 	 * - clear the group owner bits
20397c478bd9Sstevel@tonic-gate 	 * - add in the mask bits.
20407c478bd9Sstevel@tonic-gate 	 */
20417c478bd9Sstevel@tonic-gate 	if (ip->i_ufs_acl && ip->i_ufs_acl->aclass.acl_ismask) {
20427c478bd9Sstevel@tonic-gate 		vap->va_mode &= ~((VREAD | VWRITE | VEXEC) >> 3);
20437c478bd9Sstevel@tonic-gate 		vap->va_mode |=
20447c478bd9Sstevel@tonic-gate 		    (ip->i_ufs_acl->aclass.acl_maskbits & PERMMASK) << 3;
20457c478bd9Sstevel@tonic-gate 	}
20467c478bd9Sstevel@tonic-gate 	vap->va_uid = ip->i_uid;
20477c478bd9Sstevel@tonic-gate 	vap->va_gid = ip->i_gid;
20487c478bd9Sstevel@tonic-gate 	vap->va_fsid = ip->i_dev;
20497c478bd9Sstevel@tonic-gate 	vap->va_nodeid = (ino64_t)ip->i_number;
20507c478bd9Sstevel@tonic-gate 	vap->va_nlink = ip->i_nlink;
20517c478bd9Sstevel@tonic-gate 	vap->va_size = ip->i_size;
20527c478bd9Sstevel@tonic-gate 	if (vp->v_type == VCHR || vp->v_type == VBLK)
20537c478bd9Sstevel@tonic-gate 		vap->va_rdev = ip->i_rdev;
20547c478bd9Sstevel@tonic-gate 	else
20557c478bd9Sstevel@tonic-gate 		vap->va_rdev = 0;	/* not a b/c spec. */
20567c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
20577c478bd9Sstevel@tonic-gate 	ITIMES_NOLOCK(ip);	/* mark correct time in inode */
20587c478bd9Sstevel@tonic-gate 	vap->va_seq = ip->i_seq;
20597c478bd9Sstevel@tonic-gate 	vap->va_atime.tv_sec = (time_t)ip->i_atime.tv_sec;
20607c478bd9Sstevel@tonic-gate 	vap->va_atime.tv_nsec = ip->i_atime.tv_usec*1000;
20617c478bd9Sstevel@tonic-gate 	vap->va_mtime.tv_sec = (time_t)ip->i_mtime.tv_sec;
20627c478bd9Sstevel@tonic-gate 	vap->va_mtime.tv_nsec = ip->i_mtime.tv_usec*1000;
20637c478bd9Sstevel@tonic-gate 	vap->va_ctime.tv_sec = (time_t)ip->i_ctime.tv_sec;
20647c478bd9Sstevel@tonic-gate 	vap->va_ctime.tv_nsec = ip->i_ctime.tv_usec*1000;
20657c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
20667c478bd9Sstevel@tonic-gate 
20677c478bd9Sstevel@tonic-gate 	switch (ip->i_mode & IFMT) {
20687c478bd9Sstevel@tonic-gate 
20697c478bd9Sstevel@tonic-gate 	case IFBLK:
20707c478bd9Sstevel@tonic-gate 		vap->va_blksize = MAXBSIZE;		/* was BLKDEV_IOSIZE */
20717c478bd9Sstevel@tonic-gate 		break;
20727c478bd9Sstevel@tonic-gate 
20737c478bd9Sstevel@tonic-gate 	case IFCHR:
20747c478bd9Sstevel@tonic-gate 		vap->va_blksize = MAXBSIZE;
20757c478bd9Sstevel@tonic-gate 		break;
20767c478bd9Sstevel@tonic-gate 
20777c478bd9Sstevel@tonic-gate 	default:
20787c478bd9Sstevel@tonic-gate 		vap->va_blksize = ip->i_fs->fs_bsize;
20797c478bd9Sstevel@tonic-gate 		break;
20807c478bd9Sstevel@tonic-gate 	}
20817c478bd9Sstevel@tonic-gate 	vap->va_nblocks = (fsblkcnt64_t)ip->i_blocks;
20827c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
20837c478bd9Sstevel@tonic-gate 	err = 0;
20847c478bd9Sstevel@tonic-gate 
20857c478bd9Sstevel@tonic-gate out:
20867c478bd9Sstevel@tonic-gate 	return (err);
20877c478bd9Sstevel@tonic-gate }
20887c478bd9Sstevel@tonic-gate 
208960c8e821SFrank Batschulat /*
209060c8e821SFrank Batschulat  * Special wrapper to provide a callback for secpolicy_vnode_setattr().
209160c8e821SFrank Batschulat  * The i_contents lock is already held by the caller and we need to
209260c8e821SFrank Batschulat  * declare the inode as 'void *' argument.
209360c8e821SFrank Batschulat  */
209460c8e821SFrank Batschulat static int
209560c8e821SFrank Batschulat ufs_priv_access(void *vip, int mode, struct cred *cr)
209660c8e821SFrank Batschulat {
209760c8e821SFrank Batschulat 	struct inode *ip = vip;
209860c8e821SFrank Batschulat 
209960c8e821SFrank Batschulat 	return (ufs_iaccess(ip, mode, cr, 0));
210060c8e821SFrank Batschulat }
210160c8e821SFrank Batschulat 
21027c478bd9Sstevel@tonic-gate /*ARGSUSED4*/
21037c478bd9Sstevel@tonic-gate static int
2104*80d5689fSPatrick Mooney ufs_setattr(struct vnode *vp, struct vattr *vap, int flags, struct cred *cr,
2105*80d5689fSPatrick Mooney     caller_context_t *ct)
21067c478bd9Sstevel@tonic-gate {
21077c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
21087c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
21097c478bd9Sstevel@tonic-gate 	struct fs *fs;
21107c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
21117c478bd9Sstevel@tonic-gate 	char *errmsg1;
21127c478bd9Sstevel@tonic-gate 	char *errmsg2;
21137c478bd9Sstevel@tonic-gate 	long blocks;
21147c478bd9Sstevel@tonic-gate 	long int mask = vap->va_mask;
21157c478bd9Sstevel@tonic-gate 	size_t len1, len2;
21167c478bd9Sstevel@tonic-gate 	int issync;
21177c478bd9Sstevel@tonic-gate 	int trans_size;
21187c478bd9Sstevel@tonic-gate 	int dotrans;
21197c478bd9Sstevel@tonic-gate 	int dorwlock;
21207c478bd9Sstevel@tonic-gate 	int error;
21217c478bd9Sstevel@tonic-gate 	int owner_change;
21227c478bd9Sstevel@tonic-gate 	int dodqlock;
21237c478bd9Sstevel@tonic-gate 	timestruc_t now;
21247c478bd9Sstevel@tonic-gate 	vattr_t oldva;
21257c478bd9Sstevel@tonic-gate 	int retry = 1;
212602ff05a9Svsakar 	int indeadlock;
21277c478bd9Sstevel@tonic-gate 
21287c478bd9Sstevel@tonic-gate 	/*
21297c478bd9Sstevel@tonic-gate 	 * Cannot set these attributes.
21307c478bd9Sstevel@tonic-gate 	 */
2131da6c28aaSamw 	if ((mask & AT_NOSET) || (mask & AT_XVATTR))
2132da6c28aaSamw 		return (EINVAL);
21337c478bd9Sstevel@tonic-gate 
21347c478bd9Sstevel@tonic-gate 	/*
21357c478bd9Sstevel@tonic-gate 	 * check for forced unmount
21367c478bd9Sstevel@tonic-gate 	 */
21377c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
21387c478bd9Sstevel@tonic-gate 		return (EIO);
21397c478bd9Sstevel@tonic-gate 
21407c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
21417c478bd9Sstevel@tonic-gate 	if (fs->fs_ronly != 0)
21427c478bd9Sstevel@tonic-gate 		return (EROFS);
21437c478bd9Sstevel@tonic-gate 
21447c478bd9Sstevel@tonic-gate again:
21457c478bd9Sstevel@tonic-gate 	errmsg1 = NULL;
21467c478bd9Sstevel@tonic-gate 	errmsg2 = NULL;
21477c478bd9Sstevel@tonic-gate 	dotrans = 0;
21487c478bd9Sstevel@tonic-gate 	dorwlock = 0;
21497c478bd9Sstevel@tonic-gate 	dodqlock = 0;
21507c478bd9Sstevel@tonic-gate 
21517c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SETATTR_MASK);
21527c478bd9Sstevel@tonic-gate 	if (error)
21537c478bd9Sstevel@tonic-gate 		goto out;
21547c478bd9Sstevel@tonic-gate 
21557c478bd9Sstevel@tonic-gate 	/*
21567c478bd9Sstevel@tonic-gate 	 * Acquire i_rwlock before TRANS_BEGIN_CSYNC() if this is a file.
21577c478bd9Sstevel@tonic-gate 	 * This follows the protocol for read()/write().
21587c478bd9Sstevel@tonic-gate 	 */
21597c478bd9Sstevel@tonic-gate 	if (vp->v_type != VDIR) {
216002ff05a9Svsakar 		/*
216102ff05a9Svsakar 		 * ufs_tryirwlock uses rw_tryenter and checks for SLOCK to
216202ff05a9Svsakar 		 * avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
216302ff05a9Svsakar 		 * possible, retries the operation.
216402ff05a9Svsakar 		 */
216502ff05a9Svsakar 		ufs_tryirwlock(&ip->i_rwlock, RW_WRITER, retry_file);
216602ff05a9Svsakar 		if (indeadlock) {
216702ff05a9Svsakar 			if (ulp)
216802ff05a9Svsakar 				ufs_lockfs_end(ulp);
216902ff05a9Svsakar 			goto again;
217002ff05a9Svsakar 		}
21717c478bd9Sstevel@tonic-gate 		dorwlock = 1;
21727c478bd9Sstevel@tonic-gate 	}
21737c478bd9Sstevel@tonic-gate 
21747c478bd9Sstevel@tonic-gate 	/*
21757c478bd9Sstevel@tonic-gate 	 * Truncate file.  Must have write permission and not be a directory.
21767c478bd9Sstevel@tonic-gate 	 */
21777c478bd9Sstevel@tonic-gate 	if (mask & AT_SIZE) {
21787c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
21797c478bd9Sstevel@tonic-gate 		if (vp->v_type == VDIR) {
21807c478bd9Sstevel@tonic-gate 			error = EISDIR;
21817c478bd9Sstevel@tonic-gate 			goto update_inode;
21827c478bd9Sstevel@tonic-gate 		}
218360c8e821SFrank Batschulat 		if (error = ufs_iaccess(ip, IWRITE, cr, 0))
21847c478bd9Sstevel@tonic-gate 			goto update_inode;
21857c478bd9Sstevel@tonic-gate 
21867c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
21877c478bd9Sstevel@tonic-gate 		error = TRANS_ITRUNC(ip, vap->va_size, 0, cr);
21887c478bd9Sstevel@tonic-gate 		if (error) {
21897c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
21907c478bd9Sstevel@tonic-gate 			goto update_inode;
21917c478bd9Sstevel@tonic-gate 		}
219272102e74SBryan Cantrill 
219372102e74SBryan Cantrill 		if (error == 0 && vap->va_size)
219472102e74SBryan Cantrill 			vnevent_truncate(vp, ct);
21957c478bd9Sstevel@tonic-gate 	}
21967c478bd9Sstevel@tonic-gate 
21977c478bd9Sstevel@tonic-gate 	if (ulp) {
21987c478bd9Sstevel@tonic-gate 		trans_size = (int)TOP_SETATTR_SIZE(ip);
21997c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_SETATTR, trans_size);
22007c478bd9Sstevel@tonic-gate 		++dotrans;
22017c478bd9Sstevel@tonic-gate 	}
22027c478bd9Sstevel@tonic-gate 
22037c478bd9Sstevel@tonic-gate 	/*
22047c478bd9Sstevel@tonic-gate 	 * Acquire i_rwlock after TRANS_BEGIN_CSYNC() if this is a directory.
22057c478bd9Sstevel@tonic-gate 	 * This follows the protocol established by
22067c478bd9Sstevel@tonic-gate 	 * ufs_link/create/remove/rename/mkdir/rmdir/symlink.
22077c478bd9Sstevel@tonic-gate 	 */
22087c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
220902ff05a9Svsakar 		ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_SETATTR,
221080d34432Sfrankho 		    retry_dir);
221102ff05a9Svsakar 		if (indeadlock)
221202ff05a9Svsakar 			goto again;
22137c478bd9Sstevel@tonic-gate 		dorwlock = 1;
22147c478bd9Sstevel@tonic-gate 	}
22157c478bd9Sstevel@tonic-gate 
22167c478bd9Sstevel@tonic-gate 	/*
22177c478bd9Sstevel@tonic-gate 	 * Grab quota lock if we are changing the file's owner.
22187c478bd9Sstevel@tonic-gate 	 */
22197c478bd9Sstevel@tonic-gate 	if (mask & AT_UID) {
22207c478bd9Sstevel@tonic-gate 		rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
22217c478bd9Sstevel@tonic-gate 		dodqlock = 1;
22227c478bd9Sstevel@tonic-gate 	}
22237c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
22247c478bd9Sstevel@tonic-gate 
22257c478bd9Sstevel@tonic-gate 	oldva.va_mode = ip->i_mode;
22267c478bd9Sstevel@tonic-gate 	oldva.va_uid = ip->i_uid;
22277c478bd9Sstevel@tonic-gate 	oldva.va_gid = ip->i_gid;
22287c478bd9Sstevel@tonic-gate 
22297c478bd9Sstevel@tonic-gate 	vap->va_mask &= ~AT_SIZE;
223060c8e821SFrank Batschulat 
22317c478bd9Sstevel@tonic-gate 	error = secpolicy_vnode_setattr(cr, vp, vap, &oldva, flags,
223260c8e821SFrank Batschulat 	    ufs_priv_access, ip);
22337c478bd9Sstevel@tonic-gate 	if (error)
22347c478bd9Sstevel@tonic-gate 		goto update_inode;
22357c478bd9Sstevel@tonic-gate 
22367c478bd9Sstevel@tonic-gate 	mask = vap->va_mask;
22377c478bd9Sstevel@tonic-gate 
22387c478bd9Sstevel@tonic-gate 	/*
22397c478bd9Sstevel@tonic-gate 	 * Change file access modes.
22407c478bd9Sstevel@tonic-gate 	 */
22417c478bd9Sstevel@tonic-gate 	if (mask & AT_MODE) {
22427c478bd9Sstevel@tonic-gate 		ip->i_mode = (ip->i_mode & IFMT) | (vap->va_mode & ~IFMT);
22437c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
22447c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
22457c478bd9Sstevel@tonic-gate 		if (stickyhack) {
22467c478bd9Sstevel@tonic-gate 			mutex_enter(&vp->v_lock);
22477c478bd9Sstevel@tonic-gate 			if ((ip->i_mode & (ISVTX | IEXEC | IFDIR)) == ISVTX)
22487c478bd9Sstevel@tonic-gate 				vp->v_flag |= VSWAPLIKE;
22497c478bd9Sstevel@tonic-gate 			else
22507c478bd9Sstevel@tonic-gate 				vp->v_flag &= ~VSWAPLIKE;
22517c478bd9Sstevel@tonic-gate 			mutex_exit(&vp->v_lock);
22527c478bd9Sstevel@tonic-gate 		}
22537c478bd9Sstevel@tonic-gate 	}
22547c478bd9Sstevel@tonic-gate 	if (mask & (AT_UID|AT_GID)) {
22557c478bd9Sstevel@tonic-gate 		if (mask & AT_UID) {
22567c478bd9Sstevel@tonic-gate 			/*
22577c478bd9Sstevel@tonic-gate 			 * Don't change ownership of the quota inode.
22587c478bd9Sstevel@tonic-gate 			 */
22597c478bd9Sstevel@tonic-gate 			if (ufsvfsp->vfs_qinod == ip) {
22607c478bd9Sstevel@tonic-gate 				ASSERT(ufsvfsp->vfs_qflags & MQ_ENABLED);
22617c478bd9Sstevel@tonic-gate 				error = EINVAL;
22627c478bd9Sstevel@tonic-gate 				goto update_inode;
22637c478bd9Sstevel@tonic-gate 			}
22647c478bd9Sstevel@tonic-gate 
22657c478bd9Sstevel@tonic-gate 			/*
22667c478bd9Sstevel@tonic-gate 			 * No real ownership change.
22677c478bd9Sstevel@tonic-gate 			 */
22687c478bd9Sstevel@tonic-gate 			if (ip->i_uid == vap->va_uid) {
22697c478bd9Sstevel@tonic-gate 				blocks = 0;
22707c478bd9Sstevel@tonic-gate 				owner_change = 0;
22717c478bd9Sstevel@tonic-gate 			}
22727c478bd9Sstevel@tonic-gate 			/*
22737c478bd9Sstevel@tonic-gate 			 * Remove the blocks and the file, from the old user's
22747c478bd9Sstevel@tonic-gate 			 * quota.
22757c478bd9Sstevel@tonic-gate 			 */
22767c478bd9Sstevel@tonic-gate 			else {
22777c478bd9Sstevel@tonic-gate 				blocks = ip->i_blocks;
22787c478bd9Sstevel@tonic-gate 				owner_change = 1;
22797c478bd9Sstevel@tonic-gate 
22807c478bd9Sstevel@tonic-gate 				(void) chkdq(ip, -blocks, /* force */ 1, cr,
228180d34432Sfrankho 				    (char **)NULL, (size_t *)NULL);
22827c478bd9Sstevel@tonic-gate 				(void) chkiq(ufsvfsp, /* change */ -1, ip,
228380d34432Sfrankho 				    (uid_t)ip->i_uid, /* force */ 1, cr,
228480d34432Sfrankho 				    (char **)NULL, (size_t *)NULL);
22857c478bd9Sstevel@tonic-gate 				dqrele(ip->i_dquot);
22867c478bd9Sstevel@tonic-gate 			}
22877c478bd9Sstevel@tonic-gate 
22887c478bd9Sstevel@tonic-gate 			ip->i_uid = vap->va_uid;
22897c478bd9Sstevel@tonic-gate 
22907c478bd9Sstevel@tonic-gate 			/*
22917c478bd9Sstevel@tonic-gate 			 * There is a real ownership change.
22927c478bd9Sstevel@tonic-gate 			 */
22937c478bd9Sstevel@tonic-gate 			if (owner_change) {
22947c478bd9Sstevel@tonic-gate 				/*
22957c478bd9Sstevel@tonic-gate 				 * Add the blocks and the file to the new
22967c478bd9Sstevel@tonic-gate 				 * user's quota.
22977c478bd9Sstevel@tonic-gate 				 */
22987c478bd9Sstevel@tonic-gate 				ip->i_dquot = getinoquota(ip);
22997c478bd9Sstevel@tonic-gate 				(void) chkdq(ip, blocks, /* force */ 1, cr,
230080d34432Sfrankho 				    &errmsg1, &len1);
23017c478bd9Sstevel@tonic-gate 				(void) chkiq(ufsvfsp, /* change */ 1,
230280d34432Sfrankho 				    (struct inode *)NULL, (uid_t)ip->i_uid,
230380d34432Sfrankho 				    /* force */ 1, cr, &errmsg2, &len2);
23047c478bd9Sstevel@tonic-gate 			}
23057c478bd9Sstevel@tonic-gate 		}
23067c478bd9Sstevel@tonic-gate 		if (mask & AT_GID) {
23077c478bd9Sstevel@tonic-gate 			ip->i_gid = vap->va_gid;
23087c478bd9Sstevel@tonic-gate 		}
23097c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
23107c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
23117c478bd9Sstevel@tonic-gate 	}
23127c478bd9Sstevel@tonic-gate 	/*
23137c478bd9Sstevel@tonic-gate 	 * Change file access or modified times.
23147c478bd9Sstevel@tonic-gate 	 */
23157c478bd9Sstevel@tonic-gate 	if (mask & (AT_ATIME|AT_MTIME)) {
23167c478bd9Sstevel@tonic-gate 		/* Check that the time value is within ufs range */
23177c478bd9Sstevel@tonic-gate 		if (((mask & AT_ATIME) && TIMESPEC_OVERFLOW(&vap->va_atime)) ||
23187c478bd9Sstevel@tonic-gate 		    ((mask & AT_MTIME) && TIMESPEC_OVERFLOW(&vap->va_mtime))) {
23197c478bd9Sstevel@tonic-gate 			error = EOVERFLOW;
23207c478bd9Sstevel@tonic-gate 			goto update_inode;
23217c478bd9Sstevel@tonic-gate 		}
23227c478bd9Sstevel@tonic-gate 
23237c478bd9Sstevel@tonic-gate 		/*
23247c478bd9Sstevel@tonic-gate 		 * if the "noaccess" mount option is set and only atime
23257c478bd9Sstevel@tonic-gate 		 * update is requested, do nothing. No error is returned.
23267c478bd9Sstevel@tonic-gate 		 */
23277c478bd9Sstevel@tonic-gate 		if ((ufsvfsp->vfs_noatime) &&
23287c478bd9Sstevel@tonic-gate 		    ((mask & (AT_ATIME|AT_MTIME)) == AT_ATIME))
23297c478bd9Sstevel@tonic-gate 			goto skip_atime;
23307c478bd9Sstevel@tonic-gate 
23317c478bd9Sstevel@tonic-gate 		if (mask & AT_ATIME) {
23327c478bd9Sstevel@tonic-gate 			ip->i_atime.tv_sec = vap->va_atime.tv_sec;
23337c478bd9Sstevel@tonic-gate 			ip->i_atime.tv_usec = vap->va_atime.tv_nsec / 1000;
23347c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~IACC;
23357c478bd9Sstevel@tonic-gate 		}
23367c478bd9Sstevel@tonic-gate 		if (mask & AT_MTIME) {
23377c478bd9Sstevel@tonic-gate 			ip->i_mtime.tv_sec = vap->va_mtime.tv_sec;
23387c478bd9Sstevel@tonic-gate 			ip->i_mtime.tv_usec = vap->va_mtime.tv_nsec / 1000;
23397c478bd9Sstevel@tonic-gate 			gethrestime(&now);
23407c478bd9Sstevel@tonic-gate 			if (now.tv_sec > TIME32_MAX) {
23417c478bd9Sstevel@tonic-gate 				/*
23427c478bd9Sstevel@tonic-gate 				 * In 2038, ctime sticks forever..
23437c478bd9Sstevel@tonic-gate 				 */
23447c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_sec = TIME32_MAX;
23457c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_usec = 0;
23467c478bd9Sstevel@tonic-gate 			} else {
23477c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_sec = now.tv_sec;
23487c478bd9Sstevel@tonic-gate 				ip->i_ctime.tv_usec = now.tv_nsec / 1000;
23497c478bd9Sstevel@tonic-gate 			}
23507c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~(IUPD|ICHG);
23517c478bd9Sstevel@tonic-gate 			ip->i_flag |= IMODTIME;
23527c478bd9Sstevel@tonic-gate 		}
23537c478bd9Sstevel@tonic-gate 		TRANS_INODE(ufsvfsp, ip);
23547c478bd9Sstevel@tonic-gate 		ip->i_flag |= IMOD;
23557c478bd9Sstevel@tonic-gate 	}
23567c478bd9Sstevel@tonic-gate 
23577c478bd9Sstevel@tonic-gate skip_atime:
23587c478bd9Sstevel@tonic-gate 	/*
23597c478bd9Sstevel@tonic-gate 	 * The presence of a shadow inode may indicate an ACL, but does
23607c478bd9Sstevel@tonic-gate 	 * not imply an ACL.  Future FSD types should be handled here too
23617c478bd9Sstevel@tonic-gate 	 * and check for the presence of the attribute-specific data
23627c478bd9Sstevel@tonic-gate 	 * before referencing it.
23637c478bd9Sstevel@tonic-gate 	 */
23647c478bd9Sstevel@tonic-gate 	if (ip->i_shadow) {
23657c478bd9Sstevel@tonic-gate 		/*
23667c478bd9Sstevel@tonic-gate 		 * XXX if ufs_iupdat is changed to sandbagged write fix
23677c478bd9Sstevel@tonic-gate 		 * ufs_acl_setattr to push ip to keep acls consistent
23687c478bd9Sstevel@tonic-gate 		 *
23697c478bd9Sstevel@tonic-gate 		 * Suppress out of inodes messages if we will retry.
23707c478bd9Sstevel@tonic-gate 		 */
23717c478bd9Sstevel@tonic-gate 		if (retry)
23727c478bd9Sstevel@tonic-gate 			ip->i_flag |= IQUIET;
23737c478bd9Sstevel@tonic-gate 		error = ufs_acl_setattr(ip, vap, cr);
23747c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~IQUIET;
23757c478bd9Sstevel@tonic-gate 	}
23767c478bd9Sstevel@tonic-gate 
23777c478bd9Sstevel@tonic-gate update_inode:
23787c478bd9Sstevel@tonic-gate 	/*
23797c478bd9Sstevel@tonic-gate 	 * Setattr always increases the sequence number
23807c478bd9Sstevel@tonic-gate 	 */
23817c478bd9Sstevel@tonic-gate 	ip->i_seq++;
23827c478bd9Sstevel@tonic-gate 
23837c478bd9Sstevel@tonic-gate 	/*
23847c478bd9Sstevel@tonic-gate 	 * if nfsd and not logging; push synchronously
23857c478bd9Sstevel@tonic-gate 	 */
23867c478bd9Sstevel@tonic-gate 	if ((curthread->t_flag & T_DONTPEND) && !TRANS_ISTRANS(ufsvfsp)) {
23877c478bd9Sstevel@tonic-gate 		ufs_iupdat(ip, 1);
23887c478bd9Sstevel@tonic-gate 	} else {
23897c478bd9Sstevel@tonic-gate 		ITIMES_NOLOCK(ip);
23907c478bd9Sstevel@tonic-gate 	}
23917c478bd9Sstevel@tonic-gate 
23927c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
23937c478bd9Sstevel@tonic-gate 	if (dodqlock) {
23947c478bd9Sstevel@tonic-gate 		rw_exit(&ufsvfsp->vfs_dqrwlock);
23957c478bd9Sstevel@tonic-gate 	}
23967c478bd9Sstevel@tonic-gate 	if (dorwlock)
23977c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
23987c478bd9Sstevel@tonic-gate 
23997c478bd9Sstevel@tonic-gate 	if (ulp) {
24007c478bd9Sstevel@tonic-gate 		if (dotrans) {
24017c478bd9Sstevel@tonic-gate 			int terr = 0;
24027c478bd9Sstevel@tonic-gate 			TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_SETATTR,
24037c478bd9Sstevel@tonic-gate 			    trans_size);
24047c478bd9Sstevel@tonic-gate 			if (error == 0)
24057c478bd9Sstevel@tonic-gate 				error = terr;
24067c478bd9Sstevel@tonic-gate 		}
24077c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
24087c478bd9Sstevel@tonic-gate 	}
24097c478bd9Sstevel@tonic-gate out:
24107c478bd9Sstevel@tonic-gate 	/*
24117c478bd9Sstevel@tonic-gate 	 * If out of inodes or blocks, see if we can free something
24127c478bd9Sstevel@tonic-gate 	 * up from the delete queue.
24137c478bd9Sstevel@tonic-gate 	 */
24147c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
24157c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
24167c478bd9Sstevel@tonic-gate 		retry = 0;
24177c478bd9Sstevel@tonic-gate 		if (errmsg1 != NULL)
24187c478bd9Sstevel@tonic-gate 			kmem_free(errmsg1, len1);
24197c478bd9Sstevel@tonic-gate 		if (errmsg2 != NULL)
24207c478bd9Sstevel@tonic-gate 			kmem_free(errmsg2, len2);
24217c478bd9Sstevel@tonic-gate 		goto again;
24227c478bd9Sstevel@tonic-gate 	}
24237c478bd9Sstevel@tonic-gate 	if (errmsg1 != NULL) {
24247c478bd9Sstevel@tonic-gate 		uprintf(errmsg1);
24257c478bd9Sstevel@tonic-gate 		kmem_free(errmsg1, len1);
24267c478bd9Sstevel@tonic-gate 	}
24277c478bd9Sstevel@tonic-gate 	if (errmsg2 != NULL) {
24287c478bd9Sstevel@tonic-gate 		uprintf(errmsg2);
24297c478bd9Sstevel@tonic-gate 		kmem_free(errmsg2, len2);
24307c478bd9Sstevel@tonic-gate 	}
24317c478bd9Sstevel@tonic-gate 	return (error);
24327c478bd9Sstevel@tonic-gate }
24337c478bd9Sstevel@tonic-gate 
24347c478bd9Sstevel@tonic-gate /*ARGSUSED*/
24357c478bd9Sstevel@tonic-gate static int
2436da6c28aaSamw ufs_access(struct vnode *vp, int mode, int flags, struct cred *cr,
2437*80d5689fSPatrick Mooney     caller_context_t *ct)
24387c478bd9Sstevel@tonic-gate {
24397c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
24407c478bd9Sstevel@tonic-gate 
24417c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
24427c478bd9Sstevel@tonic-gate 		return (EIO);
24437c478bd9Sstevel@tonic-gate 
24447c478bd9Sstevel@tonic-gate 	/*
24457c478bd9Sstevel@tonic-gate 	 * The ufs_iaccess function wants to be called with
24467c478bd9Sstevel@tonic-gate 	 * mode bits expressed as "ufs specific" bits.
24477c478bd9Sstevel@tonic-gate 	 * I.e., VWRITE|VREAD|VEXEC do not make sense to
24487c478bd9Sstevel@tonic-gate 	 * ufs_iaccess() but IWRITE|IREAD|IEXEC do.
24497c478bd9Sstevel@tonic-gate 	 * But since they're the same we just pass the vnode mode
24507c478bd9Sstevel@tonic-gate 	 * bit but just verify that assumption at compile time.
24517c478bd9Sstevel@tonic-gate 	 */
24527c478bd9Sstevel@tonic-gate #if IWRITE != VWRITE || IREAD != VREAD || IEXEC != VEXEC
24537c478bd9Sstevel@tonic-gate #error "ufs_access needs to map Vmodes to Imodes"
24547c478bd9Sstevel@tonic-gate #endif
245560c8e821SFrank Batschulat 	return (ufs_iaccess(ip, mode, cr, 1));
24567c478bd9Sstevel@tonic-gate }
24577c478bd9Sstevel@tonic-gate 
24587c478bd9Sstevel@tonic-gate /* ARGSUSED */
24597c478bd9Sstevel@tonic-gate static int
2460da6c28aaSamw ufs_readlink(struct vnode *vp, struct uio *uiop, struct cred *cr,
2461*80d5689fSPatrick Mooney     caller_context_t *ct)
24627c478bd9Sstevel@tonic-gate {
24637c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
24647c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
24657c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
24667c478bd9Sstevel@tonic-gate 	int error;
24677c478bd9Sstevel@tonic-gate 	int fastsymlink;
24687c478bd9Sstevel@tonic-gate 
24697c478bd9Sstevel@tonic-gate 	if (vp->v_type != VLNK) {
24707c478bd9Sstevel@tonic-gate 		error = EINVAL;
24717c478bd9Sstevel@tonic-gate 		goto nolockout;
24727c478bd9Sstevel@tonic-gate 	}
24737c478bd9Sstevel@tonic-gate 
24747c478bd9Sstevel@tonic-gate 	/*
24757c478bd9Sstevel@tonic-gate 	 * If the symbolic link is empty there is nothing to read.
24767c478bd9Sstevel@tonic-gate 	 * Fast-track these empty symbolic links
24777c478bd9Sstevel@tonic-gate 	 */
24787c478bd9Sstevel@tonic-gate 	if (ip->i_size == 0) {
24797c478bd9Sstevel@tonic-gate 		error = 0;
24807c478bd9Sstevel@tonic-gate 		goto nolockout;
24817c478bd9Sstevel@tonic-gate 	}
24827c478bd9Sstevel@tonic-gate 
24837c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
24847c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READLINK_MASK);
24857c478bd9Sstevel@tonic-gate 	if (error)
24867c478bd9Sstevel@tonic-gate 		goto nolockout;
24877c478bd9Sstevel@tonic-gate 	/*
24887c478bd9Sstevel@tonic-gate 	 * The ip->i_rwlock protects the data blocks used for FASTSYMLINK
24897c478bd9Sstevel@tonic-gate 	 */
24907c478bd9Sstevel@tonic-gate again:
24917c478bd9Sstevel@tonic-gate 	fastsymlink = 0;
24927c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IFASTSYMLNK) {
24937c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
24947c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
24957c478bd9Sstevel@tonic-gate 		if (ip->i_flag & IFASTSYMLNK) {
24967c478bd9Sstevel@tonic-gate 			if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) &&
24977c478bd9Sstevel@tonic-gate 			    (ip->i_fs->fs_ronly == 0) &&
24987c478bd9Sstevel@tonic-gate 			    (!ufsvfsp->vfs_noatime)) {
24997c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
25007c478bd9Sstevel@tonic-gate 				ip->i_flag |= IACC;
25017c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
25027c478bd9Sstevel@tonic-gate 			}
25037c478bd9Sstevel@tonic-gate 			error = uiomove((caddr_t)&ip->i_db[1],
250480d34432Sfrankho 			    MIN(ip->i_size, uiop->uio_resid),
250580d34432Sfrankho 			    UIO_READ, uiop);
25067c478bd9Sstevel@tonic-gate 			ITIMES(ip);
25077c478bd9Sstevel@tonic-gate 			++fastsymlink;
25087c478bd9Sstevel@tonic-gate 		}
25097c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
25107c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
25117c478bd9Sstevel@tonic-gate 	}
25127c478bd9Sstevel@tonic-gate 	if (!fastsymlink) {
25137c478bd9Sstevel@tonic-gate 		ssize_t size;	/* number of bytes read  */
25147c478bd9Sstevel@tonic-gate 		caddr_t basep;	/* pointer to input data */
25157c478bd9Sstevel@tonic-gate 		ino_t ino;
25167c478bd9Sstevel@tonic-gate 		long  igen;
25177c478bd9Sstevel@tonic-gate 		struct uio tuio;	/* temp uio struct */
25187c478bd9Sstevel@tonic-gate 		struct uio *tuiop;
25197c478bd9Sstevel@tonic-gate 		iovec_t tiov;		/* temp iovec struct */
25207c478bd9Sstevel@tonic-gate 		char kbuf[FSL_SIZE];	/* buffer to hold fast symlink */
25217c478bd9Sstevel@tonic-gate 		int tflag = 0;		/* flag to indicate temp vars used */
25227c478bd9Sstevel@tonic-gate 
25237c478bd9Sstevel@tonic-gate 		ino = ip->i_number;
25247c478bd9Sstevel@tonic-gate 		igen = ip->i_gen;
25257c478bd9Sstevel@tonic-gate 		size = uiop->uio_resid;
25267c478bd9Sstevel@tonic-gate 		basep = uiop->uio_iov->iov_base;
25277c478bd9Sstevel@tonic-gate 		tuiop = uiop;
25287c478bd9Sstevel@tonic-gate 
25297c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
25307c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
25317c478bd9Sstevel@tonic-gate 		if (ip->i_flag & IFASTSYMLNK) {
25327c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
25337c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
25347c478bd9Sstevel@tonic-gate 			goto again;
25357c478bd9Sstevel@tonic-gate 		}
25367c478bd9Sstevel@tonic-gate 
25377c478bd9Sstevel@tonic-gate 		/* can this be a fast symlink and is it a user buffer? */
25387c478bd9Sstevel@tonic-gate 		if (ip->i_size <= FSL_SIZE &&
25397c478bd9Sstevel@tonic-gate 		    (uiop->uio_segflg == UIO_USERSPACE ||
25407c478bd9Sstevel@tonic-gate 		    uiop->uio_segflg == UIO_USERISPACE)) {
25417c478bd9Sstevel@tonic-gate 
25427c478bd9Sstevel@tonic-gate 			bzero(&tuio, sizeof (struct uio));
25437c478bd9Sstevel@tonic-gate 			/*
25447c478bd9Sstevel@tonic-gate 			 * setup a kernel buffer to read link into.  this
25457c478bd9Sstevel@tonic-gate 			 * is to fix a race condition where the user buffer
25467c478bd9Sstevel@tonic-gate 			 * got corrupted before copying it into the inode.
25477c478bd9Sstevel@tonic-gate 			 */
25487c478bd9Sstevel@tonic-gate 			size = ip->i_size;
25497c478bd9Sstevel@tonic-gate 			tiov.iov_len = size;
25507c478bd9Sstevel@tonic-gate 			tiov.iov_base = kbuf;
25517c478bd9Sstevel@tonic-gate 			tuio.uio_iov = &tiov;
25527c478bd9Sstevel@tonic-gate 			tuio.uio_iovcnt = 1;
25537c478bd9Sstevel@tonic-gate 			tuio.uio_offset = uiop->uio_offset;
25547c478bd9Sstevel@tonic-gate 			tuio.uio_segflg = UIO_SYSSPACE;
25557c478bd9Sstevel@tonic-gate 			tuio.uio_fmode = uiop->uio_fmode;
25567c478bd9Sstevel@tonic-gate 			tuio.uio_extflg = uiop->uio_extflg;
25577c478bd9Sstevel@tonic-gate 			tuio.uio_limit = uiop->uio_limit;
25587c478bd9Sstevel@tonic-gate 			tuio.uio_resid = size;
25597c478bd9Sstevel@tonic-gate 
25607c478bd9Sstevel@tonic-gate 			basep = tuio.uio_iov->iov_base;
25617c478bd9Sstevel@tonic-gate 			tuiop = &tuio;
25627c478bd9Sstevel@tonic-gate 			tflag = 1;
25637c478bd9Sstevel@tonic-gate 		}
25647c478bd9Sstevel@tonic-gate 
25657c478bd9Sstevel@tonic-gate 		error = rdip(ip, tuiop, 0, cr);
25667c478bd9Sstevel@tonic-gate 		if (!(error == 0 && ip->i_number == ino && ip->i_gen == igen)) {
25677c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
25687c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
25697c478bd9Sstevel@tonic-gate 			goto out;
25707c478bd9Sstevel@tonic-gate 		}
25717c478bd9Sstevel@tonic-gate 
25727c478bd9Sstevel@tonic-gate 		if (tflag == 0)
25737c478bd9Sstevel@tonic-gate 			size -= uiop->uio_resid;
25747c478bd9Sstevel@tonic-gate 
25757c478bd9Sstevel@tonic-gate 		if ((tflag == 0 && ip->i_size <= FSL_SIZE &&
25767c478bd9Sstevel@tonic-gate 		    ip->i_size == size) || (tflag == 1 &&
25777c478bd9Sstevel@tonic-gate 		    tuio.uio_resid == 0)) {
25787c478bd9Sstevel@tonic-gate 			error = kcopy(basep, &ip->i_db[1], ip->i_size);
25797c478bd9Sstevel@tonic-gate 			if (error == 0) {
25807c478bd9Sstevel@tonic-gate 				ip->i_flag |= IFASTSYMLNK;
25817c478bd9Sstevel@tonic-gate 				/*
25827c478bd9Sstevel@tonic-gate 				 * free page
25837c478bd9Sstevel@tonic-gate 				 */
25847c478bd9Sstevel@tonic-gate 				(void) VOP_PUTPAGE(ITOV(ip),
25857c478bd9Sstevel@tonic-gate 				    (offset_t)0, PAGESIZE,
25867c478bd9Sstevel@tonic-gate 				    (B_DONTNEED | B_FREE | B_FORCE | B_ASYNC),
2587da6c28aaSamw 				    cr, ct);
25887c478bd9Sstevel@tonic-gate 			} else {
25897c478bd9Sstevel@tonic-gate 				int i;
25907c478bd9Sstevel@tonic-gate 				/* error, clear garbage left behind */
25917c478bd9Sstevel@tonic-gate 				for (i = 1; i < NDADDR; i++)
25927c478bd9Sstevel@tonic-gate 					ip->i_db[i] = 0;
25937c478bd9Sstevel@tonic-gate 				for (i = 0; i < NIADDR; i++)
25947c478bd9Sstevel@tonic-gate 					ip->i_ib[i] = 0;
25957c478bd9Sstevel@tonic-gate 			}
25967c478bd9Sstevel@tonic-gate 		}
25977c478bd9Sstevel@tonic-gate 		if (tflag == 1) {
25987c478bd9Sstevel@tonic-gate 			/* now, copy it into the user buffer */
25997c478bd9Sstevel@tonic-gate 			error = uiomove((caddr_t)kbuf,
260080d34432Sfrankho 			    MIN(size, uiop->uio_resid),
260180d34432Sfrankho 			    UIO_READ, uiop);
26027c478bd9Sstevel@tonic-gate 		}
26037c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
26047c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
26057c478bd9Sstevel@tonic-gate 	}
26067c478bd9Sstevel@tonic-gate out:
26077c478bd9Sstevel@tonic-gate 	if (ulp) {
26087c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
26097c478bd9Sstevel@tonic-gate 	}
26107c478bd9Sstevel@tonic-gate nolockout:
26117c478bd9Sstevel@tonic-gate 	return (error);
26127c478bd9Sstevel@tonic-gate }
26137c478bd9Sstevel@tonic-gate 
26147c478bd9Sstevel@tonic-gate /* ARGSUSED */
26157c478bd9Sstevel@tonic-gate static int
2616*80d5689fSPatrick Mooney ufs_fsync(struct vnode *vp, int syncflag, struct cred *cr, caller_context_t *ct)
26177c478bd9Sstevel@tonic-gate {
26187c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
26197c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
26207c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
26217c478bd9Sstevel@tonic-gate 	int error;
26227c478bd9Sstevel@tonic-gate 
26237c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_FSYNC_MASK);
26247c478bd9Sstevel@tonic-gate 	if (error)
26257c478bd9Sstevel@tonic-gate 		return (error);
26267c478bd9Sstevel@tonic-gate 
26277c478bd9Sstevel@tonic-gate 	if (TRANS_ISTRANS(ufsvfsp)) {
26287c478bd9Sstevel@tonic-gate 		/*
26297c478bd9Sstevel@tonic-gate 		 * First push out any data pages
26307c478bd9Sstevel@tonic-gate 		 */
26317c478bd9Sstevel@tonic-gate 		if (vn_has_cached_data(vp) && !(syncflag & FNODSYNC) &&
26327c478bd9Sstevel@tonic-gate 		    (vp->v_type != VCHR) && !(IS_SWAPVP(vp))) {
26337c478bd9Sstevel@tonic-gate 			error = VOP_PUTPAGE(vp, (offset_t)0, (size_t)0,
2634da6c28aaSamw 			    0, CRED(), ct);
26357c478bd9Sstevel@tonic-gate 			if (error)
26367c478bd9Sstevel@tonic-gate 				goto out;
26377c478bd9Sstevel@tonic-gate 		}
26387c478bd9Sstevel@tonic-gate 
26397c478bd9Sstevel@tonic-gate 		/*
26407c478bd9Sstevel@tonic-gate 		 * Delta any delayed inode times updates
26417c478bd9Sstevel@tonic-gate 		 * and push inode to log.
26427c478bd9Sstevel@tonic-gate 		 * All other inode deltas will have already been delta'd
26437c478bd9Sstevel@tonic-gate 		 * and will be pushed during the commit.
26447c478bd9Sstevel@tonic-gate 		 */
26457c478bd9Sstevel@tonic-gate 		if (!(syncflag & FDSYNC) &&
26467c478bd9Sstevel@tonic-gate 		    ((ip->i_flag & (IMOD|IMODACC)) == IMODACC)) {
26477c478bd9Sstevel@tonic-gate 			if (ulp) {
26487c478bd9Sstevel@tonic-gate 				TRANS_BEGIN_ASYNC(ufsvfsp, TOP_FSYNC,
26497c478bd9Sstevel@tonic-gate 				    TOP_SYNCIP_SIZE);
26507c478bd9Sstevel@tonic-gate 			}
26517c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
26527c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
26537c478bd9Sstevel@tonic-gate 			ip->i_flag &= ~IMODTIME;
26547c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
26557c478bd9Sstevel@tonic-gate 			ufs_iupdat(ip, I_SYNC);
26567c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
26577c478bd9Sstevel@tonic-gate 			if (ulp) {
26587c478bd9Sstevel@tonic-gate 				TRANS_END_ASYNC(ufsvfsp, TOP_FSYNC,
26597c478bd9Sstevel@tonic-gate 				    TOP_SYNCIP_SIZE);
26607c478bd9Sstevel@tonic-gate 			}
26617c478bd9Sstevel@tonic-gate 		}
26627c478bd9Sstevel@tonic-gate 
26637c478bd9Sstevel@tonic-gate 		/*
26647c478bd9Sstevel@tonic-gate 		 * Commit the Moby transaction
26657c478bd9Sstevel@tonic-gate 		 *
26667c478bd9Sstevel@tonic-gate 		 * Deltas have already been made so we just need to
26677c478bd9Sstevel@tonic-gate 		 * commit them with a synchronous transaction.
26687c478bd9Sstevel@tonic-gate 		 * TRANS_BEGIN_SYNC() will return an error
26697c478bd9Sstevel@tonic-gate 		 * if there are no deltas to commit, for an
26707c478bd9Sstevel@tonic-gate 		 * empty transaction.
26717c478bd9Sstevel@tonic-gate 		 */
26727c478bd9Sstevel@tonic-gate 		if (ulp) {
26737c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_SYNC(ufsvfsp, TOP_FSYNC, TOP_COMMIT_SIZE,
26747c478bd9Sstevel@tonic-gate 			    error);
26757c478bd9Sstevel@tonic-gate 			if (error) {
26767c478bd9Sstevel@tonic-gate 				error = 0; /* commit wasn't needed */
26777c478bd9Sstevel@tonic-gate 				goto out;
26787c478bd9Sstevel@tonic-gate 			}
26797c478bd9Sstevel@tonic-gate 			TRANS_END_SYNC(ufsvfsp, error, TOP_FSYNC,
26807c478bd9Sstevel@tonic-gate 			    TOP_COMMIT_SIZE);
26817c478bd9Sstevel@tonic-gate 		}
26827c478bd9Sstevel@tonic-gate 	} else {	/* not logging */
26837c478bd9Sstevel@tonic-gate 		if (!(IS_SWAPVP(vp)))
26847c478bd9Sstevel@tonic-gate 			if (syncflag & FNODSYNC) {
26857c478bd9Sstevel@tonic-gate 				/* Just update the inode only */
26867c478bd9Sstevel@tonic-gate 				TRANS_IUPDAT(ip, 1);
26877c478bd9Sstevel@tonic-gate 				error = 0;
26887c478bd9Sstevel@tonic-gate 			} else if (syncflag & FDSYNC)
26897c478bd9Sstevel@tonic-gate 				/* Do data-synchronous writes */
26907c478bd9Sstevel@tonic-gate 				error = TRANS_SYNCIP(ip, 0, I_DSYNC, TOP_FSYNC);
26917c478bd9Sstevel@tonic-gate 			else
26927c478bd9Sstevel@tonic-gate 				/* Do synchronous writes */
26937c478bd9Sstevel@tonic-gate 				error = TRANS_SYNCIP(ip, 0, I_SYNC, TOP_FSYNC);
26947c478bd9Sstevel@tonic-gate 
26957c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
26967c478bd9Sstevel@tonic-gate 		if (!error)
26977c478bd9Sstevel@tonic-gate 			error = ufs_sync_indir(ip);
26987c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
26997c478bd9Sstevel@tonic-gate 	}
27007c478bd9Sstevel@tonic-gate out:
27017c478bd9Sstevel@tonic-gate 	if (ulp) {
27027c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
27037c478bd9Sstevel@tonic-gate 	}
27047c478bd9Sstevel@tonic-gate 	return (error);
27057c478bd9Sstevel@tonic-gate }
27067c478bd9Sstevel@tonic-gate 
27077c478bd9Sstevel@tonic-gate /*ARGSUSED*/
27087c478bd9Sstevel@tonic-gate static void
2709da6c28aaSamw ufs_inactive(struct vnode *vp, struct cred *cr, caller_context_t *ct)
27107c478bd9Sstevel@tonic-gate {
27117c478bd9Sstevel@tonic-gate 	ufs_iinactive(VTOI(vp));
27127c478bd9Sstevel@tonic-gate }
27137c478bd9Sstevel@tonic-gate 
27147c478bd9Sstevel@tonic-gate /*
27157c478bd9Sstevel@tonic-gate  * Unix file system operations having to do with directory manipulation.
27167c478bd9Sstevel@tonic-gate  */
27177c478bd9Sstevel@tonic-gate int ufs_lookup_idle_count = 2;	/* Number of inodes to idle each time */
27187c478bd9Sstevel@tonic-gate /* ARGSUSED */
27197c478bd9Sstevel@tonic-gate static int
27207c478bd9Sstevel@tonic-gate ufs_lookup(struct vnode *dvp, char *nm, struct vnode **vpp,
2721*80d5689fSPatrick Mooney     struct pathname *pnp, int flags, struct vnode *rdir, struct cred *cr,
2722*80d5689fSPatrick Mooney     caller_context_t *ct, int *direntflags, pathname_t *realpnp)
27237c478bd9Sstevel@tonic-gate {
27247c478bd9Sstevel@tonic-gate 	struct inode *ip;
27257c478bd9Sstevel@tonic-gate 	struct inode *sip;
27267c478bd9Sstevel@tonic-gate 	struct inode *xip;
27277c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
27287c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
27297c478bd9Sstevel@tonic-gate 	struct vnode *vp;
27307c478bd9Sstevel@tonic-gate 	int error;
27317c478bd9Sstevel@tonic-gate 
27327c478bd9Sstevel@tonic-gate 	/*
27337c478bd9Sstevel@tonic-gate 	 * Check flags for type of lookup (regular file or attribute file)
27347c478bd9Sstevel@tonic-gate 	 */
27357c478bd9Sstevel@tonic-gate 
27367c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
27377c478bd9Sstevel@tonic-gate 
27387c478bd9Sstevel@tonic-gate 	if (flags & LOOKUP_XATTR) {
27397c478bd9Sstevel@tonic-gate 
2740da6c28aaSamw 		/*
2741da6c28aaSamw 		 * If not mounted with XATTR support then return EINVAL
2742da6c28aaSamw 		 */
2743da6c28aaSamw 
2744da6c28aaSamw 		if (!(ip->i_ufsvfs->vfs_vfs->vfs_flag & VFS_XATTR))
2745da6c28aaSamw 			return (EINVAL);
27467c478bd9Sstevel@tonic-gate 		/*
27477c478bd9Sstevel@tonic-gate 		 * We don't allow recursive attributes...
27487c478bd9Sstevel@tonic-gate 		 * Maybe someday we will.
27497c478bd9Sstevel@tonic-gate 		 */
27507c478bd9Sstevel@tonic-gate 		if ((ip->i_cflags & IXATTR)) {
27517c478bd9Sstevel@tonic-gate 			return (EINVAL);
27527c478bd9Sstevel@tonic-gate 		}
27537c478bd9Sstevel@tonic-gate 
27547c478bd9Sstevel@tonic-gate 		if ((vp = dnlc_lookup(dvp, XATTR_DIR_NAME)) == NULL) {
27557c478bd9Sstevel@tonic-gate 			error = ufs_xattr_getattrdir(dvp, &sip, flags, cr);
27567c478bd9Sstevel@tonic-gate 			if (error) {
27577c478bd9Sstevel@tonic-gate 				*vpp = NULL;
27587c478bd9Sstevel@tonic-gate 				goto out;
27597c478bd9Sstevel@tonic-gate 			}
27607c478bd9Sstevel@tonic-gate 
27617c478bd9Sstevel@tonic-gate 			vp = ITOV(sip);
27627c478bd9Sstevel@tonic-gate 			dnlc_update(dvp, XATTR_DIR_NAME, vp);
27637c478bd9Sstevel@tonic-gate 		}
27647c478bd9Sstevel@tonic-gate 
27657c478bd9Sstevel@tonic-gate 		/*
27667c478bd9Sstevel@tonic-gate 		 * Check accessibility of directory.
27677c478bd9Sstevel@tonic-gate 		 */
27687c478bd9Sstevel@tonic-gate 		if (vp == DNLC_NO_VNODE) {
27697c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
27707c478bd9Sstevel@tonic-gate 			error = ENOENT;
27717c478bd9Sstevel@tonic-gate 			goto out;
27727c478bd9Sstevel@tonic-gate 		}
277360c8e821SFrank Batschulat 		if ((error = ufs_iaccess(VTOI(vp), IEXEC, cr, 1)) != 0) {
27747c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
27757c478bd9Sstevel@tonic-gate 			goto out;
27767c478bd9Sstevel@tonic-gate 		}
27777c478bd9Sstevel@tonic-gate 
27787c478bd9Sstevel@tonic-gate 		*vpp = vp;
27797c478bd9Sstevel@tonic-gate 		return (0);
27807c478bd9Sstevel@tonic-gate 	}
27817c478bd9Sstevel@tonic-gate 
27827c478bd9Sstevel@tonic-gate 	/*
27837c478bd9Sstevel@tonic-gate 	 * Check for a null component, which we should treat as
27847c478bd9Sstevel@tonic-gate 	 * looking at dvp from within it's parent, so we don't
27857c478bd9Sstevel@tonic-gate 	 * need a call to ufs_iaccess(), as it has already been
27867c478bd9Sstevel@tonic-gate 	 * done.
27877c478bd9Sstevel@tonic-gate 	 */
27887c478bd9Sstevel@tonic-gate 	if (nm[0] == 0) {
27897c478bd9Sstevel@tonic-gate 		VN_HOLD(dvp);
27907c478bd9Sstevel@tonic-gate 		error = 0;
27917c478bd9Sstevel@tonic-gate 		*vpp = dvp;
27927c478bd9Sstevel@tonic-gate 		goto out;
27937c478bd9Sstevel@tonic-gate 	}
27947c478bd9Sstevel@tonic-gate 
27957c478bd9Sstevel@tonic-gate 	/*
27967c478bd9Sstevel@tonic-gate 	 * Check for "." ie itself. this is a quick check and
27977c478bd9Sstevel@tonic-gate 	 * avoids adding "." into the dnlc (which have been seen
27987c478bd9Sstevel@tonic-gate 	 * to occupy >10% of the cache).
27997c478bd9Sstevel@tonic-gate 	 */
28007c478bd9Sstevel@tonic-gate 	if ((nm[0] == '.') && (nm[1] == 0)) {
28017c478bd9Sstevel@tonic-gate 		/*
28027c478bd9Sstevel@tonic-gate 		 * Don't return without checking accessibility
28037c478bd9Sstevel@tonic-gate 		 * of the directory. We only need the lock if
28047c478bd9Sstevel@tonic-gate 		 * we are going to return it.
28057c478bd9Sstevel@tonic-gate 		 */
280660c8e821SFrank Batschulat 		if ((error = ufs_iaccess(ip, IEXEC, cr, 1)) == 0) {
28077c478bd9Sstevel@tonic-gate 			VN_HOLD(dvp);
28087c478bd9Sstevel@tonic-gate 			*vpp = dvp;
28097c478bd9Sstevel@tonic-gate 		}
28107c478bd9Sstevel@tonic-gate 		goto out;
28117c478bd9Sstevel@tonic-gate 	}
28127c478bd9Sstevel@tonic-gate 
28137c478bd9Sstevel@tonic-gate 	/*
28147c478bd9Sstevel@tonic-gate 	 * Fast path: Check the directory name lookup cache.
28157c478bd9Sstevel@tonic-gate 	 */
28167c478bd9Sstevel@tonic-gate 	if (vp = dnlc_lookup(dvp, nm)) {
28177c478bd9Sstevel@tonic-gate 		/*
28187c478bd9Sstevel@tonic-gate 		 * Check accessibility of directory.
28197c478bd9Sstevel@tonic-gate 		 */
282060c8e821SFrank Batschulat 		if ((error = ufs_iaccess(ip, IEXEC, cr, 1)) != 0) {
28217c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
28227c478bd9Sstevel@tonic-gate 			goto out;
28237c478bd9Sstevel@tonic-gate 		}
28247c478bd9Sstevel@tonic-gate 		if (vp == DNLC_NO_VNODE) {
28257c478bd9Sstevel@tonic-gate 			VN_RELE(vp);
28267c478bd9Sstevel@tonic-gate 			error = ENOENT;
28277c478bd9Sstevel@tonic-gate 			goto out;
28287c478bd9Sstevel@tonic-gate 		}
28297c478bd9Sstevel@tonic-gate 		xip = VTOI(vp);
28307c478bd9Sstevel@tonic-gate 		ulp = NULL;
28317c478bd9Sstevel@tonic-gate 		goto fastpath;
28327c478bd9Sstevel@tonic-gate 	}
28337c478bd9Sstevel@tonic-gate 
28347c478bd9Sstevel@tonic-gate 	/*
28357c478bd9Sstevel@tonic-gate 	 * Keep the idle queue from getting too long by
28367c478bd9Sstevel@tonic-gate 	 * idling two inodes before attempting to allocate another.
28377c478bd9Sstevel@tonic-gate 	 *    This operation must be performed before entering
28387c478bd9Sstevel@tonic-gate 	 *    lockfs or a transaction.
28397c478bd9Sstevel@tonic-gate 	 */
28407c478bd9Sstevel@tonic-gate 	if (ufs_idle_q.uq_ne > ufs_idle_q.uq_hiwat)
28417c478bd9Sstevel@tonic-gate 		if ((curthread->t_flag & T_DONTBLOCK) == 0) {
28427c478bd9Sstevel@tonic-gate 			ins.in_lidles.value.ul += ufs_lookup_idle_count;
28437c478bd9Sstevel@tonic-gate 			ufs_idle_some(ufs_lookup_idle_count);
28447c478bd9Sstevel@tonic-gate 		}
28457c478bd9Sstevel@tonic-gate 
284602ff05a9Svsakar retry_lookup:
284760c8e821SFrank Batschulat 	/*
284860c8e821SFrank Batschulat 	 * Check accessibility of directory.
284960c8e821SFrank Batschulat 	 */
285060c8e821SFrank Batschulat 	if (error = ufs_diraccess(ip, IEXEC, cr))
285160c8e821SFrank Batschulat 		goto out;
285260c8e821SFrank Batschulat 
28537c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
28547c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_LOOKUP_MASK);
28557c478bd9Sstevel@tonic-gate 	if (error)
28567c478bd9Sstevel@tonic-gate 		goto out;
28577c478bd9Sstevel@tonic-gate 
28589b5097eeSOwen Roberts 	error = ufs_dirlook(ip, nm, &xip, cr, 1, 0);
28597c478bd9Sstevel@tonic-gate 
28607c478bd9Sstevel@tonic-gate fastpath:
28617c478bd9Sstevel@tonic-gate 	if (error == 0) {
28627c478bd9Sstevel@tonic-gate 		ip = xip;
28637c478bd9Sstevel@tonic-gate 		*vpp = ITOV(ip);
28647c478bd9Sstevel@tonic-gate 
28657c478bd9Sstevel@tonic-gate 		/*
28667c478bd9Sstevel@tonic-gate 		 * If vnode is a device return special vnode instead.
28677c478bd9Sstevel@tonic-gate 		 */
28687c478bd9Sstevel@tonic-gate 		if (IS_DEVVP(*vpp)) {
28697c478bd9Sstevel@tonic-gate 			struct vnode *newvp;
28707c478bd9Sstevel@tonic-gate 
28717c478bd9Sstevel@tonic-gate 			newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
28727c478bd9Sstevel@tonic-gate 			    cr);
28737c478bd9Sstevel@tonic-gate 			VN_RELE(*vpp);
28747c478bd9Sstevel@tonic-gate 			if (newvp == NULL)
28757c478bd9Sstevel@tonic-gate 				error = ENOSYS;
28767c478bd9Sstevel@tonic-gate 			else
28777c478bd9Sstevel@tonic-gate 				*vpp = newvp;
2878986fd29aSsetje 		} else if (ip->i_cflags & ICOMPRESS) {
2879986fd29aSsetje 			struct vnode *newvp;
2880986fd29aSsetje 
2881986fd29aSsetje 			/*
2882986fd29aSsetje 			 * Compressed file, substitute dcfs vnode
2883986fd29aSsetje 			 */
2884986fd29aSsetje 			newvp = decompvp(*vpp, cr, ct);
2885986fd29aSsetje 			VN_RELE(*vpp);
2886986fd29aSsetje 			if (newvp == NULL)
2887986fd29aSsetje 				error = ENOSYS;
2888986fd29aSsetje 			else
2889986fd29aSsetje 				*vpp = newvp;
28907c478bd9Sstevel@tonic-gate 		}
28917c478bd9Sstevel@tonic-gate 	}
28927c478bd9Sstevel@tonic-gate 	if (ulp) {
28937c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
28947c478bd9Sstevel@tonic-gate 	}
28957c478bd9Sstevel@tonic-gate 
289602ff05a9Svsakar 	if (error == EAGAIN)
289702ff05a9Svsakar 		goto retry_lookup;
289802ff05a9Svsakar 
28997c478bd9Sstevel@tonic-gate out:
29007c478bd9Sstevel@tonic-gate 	return (error);
29017c478bd9Sstevel@tonic-gate }
29027c478bd9Sstevel@tonic-gate 
2903da6c28aaSamw /*ARGSUSED*/
29047c478bd9Sstevel@tonic-gate static int
29057c478bd9Sstevel@tonic-gate ufs_create(struct vnode *dvp, char *name, struct vattr *vap, enum vcexcl excl,
2906*80d5689fSPatrick Mooney     int mode, struct vnode **vpp, struct cred *cr, int flag,
2907*80d5689fSPatrick Mooney     caller_context_t *ct, vsecattr_t *vsecp)
29087c478bd9Sstevel@tonic-gate {
29097c478bd9Sstevel@tonic-gate 	struct inode *ip;
29107c478bd9Sstevel@tonic-gate 	struct inode *xip;
29117c478bd9Sstevel@tonic-gate 	struct inode *dip;
29127c478bd9Sstevel@tonic-gate 	struct vnode *xvp;
29137c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
29147c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
29157c478bd9Sstevel@tonic-gate 	int error;
29167c478bd9Sstevel@tonic-gate 	int issync;
29177c478bd9Sstevel@tonic-gate 	int truncflag;
29187c478bd9Sstevel@tonic-gate 	int trans_size;
29197c478bd9Sstevel@tonic-gate 	int noentry;
29207c478bd9Sstevel@tonic-gate 	int defer_dip_seq_update = 0;	/* need to defer update of dip->i_seq */
29217c478bd9Sstevel@tonic-gate 	int retry = 1;
292202ff05a9Svsakar 	int indeadlock;
29237c478bd9Sstevel@tonic-gate 
29247c478bd9Sstevel@tonic-gate again:
29257c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
29267c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
29277c478bd9Sstevel@tonic-gate 	truncflag = 0;
29287c478bd9Sstevel@tonic-gate 
29297c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_CREATE_MASK);
29307c478bd9Sstevel@tonic-gate 	if (error)
29317c478bd9Sstevel@tonic-gate 		goto out;
29327c478bd9Sstevel@tonic-gate 
29337c478bd9Sstevel@tonic-gate 	if (ulp) {
29347c478bd9Sstevel@tonic-gate 		trans_size = (int)TOP_CREATE_SIZE(ip);
29357c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_CREATE, trans_size);
29367c478bd9Sstevel@tonic-gate 	}
29377c478bd9Sstevel@tonic-gate 
29387c478bd9Sstevel@tonic-gate 	if ((vap->va_mode & VSVTX) && secpolicy_vnode_stky_modify(cr) != 0)
29397c478bd9Sstevel@tonic-gate 		vap->va_mode &= ~VSVTX;
29407c478bd9Sstevel@tonic-gate 
29417c478bd9Sstevel@tonic-gate 	if (*name == '\0') {
29427c478bd9Sstevel@tonic-gate 		/*
29437c478bd9Sstevel@tonic-gate 		 * Null component name refers to the directory itself.
29447c478bd9Sstevel@tonic-gate 		 */
29457c478bd9Sstevel@tonic-gate 		VN_HOLD(dvp);
29467c478bd9Sstevel@tonic-gate 		/*
29477c478bd9Sstevel@tonic-gate 		 * Even though this is an error case, we need to grab the
29487c478bd9Sstevel@tonic-gate 		 * quota lock since the error handling code below is common.
29497c478bd9Sstevel@tonic-gate 		 */
29507c478bd9Sstevel@tonic-gate 		rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
29517c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
29527c478bd9Sstevel@tonic-gate 		error = EEXIST;
29537c478bd9Sstevel@tonic-gate 	} else {
29547c478bd9Sstevel@tonic-gate 		xip = NULL;
29557c478bd9Sstevel@tonic-gate 		noentry = 0;
295602ff05a9Svsakar 		/*
295702ff05a9Svsakar 		 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
295802ff05a9Svsakar 		 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
295902ff05a9Svsakar 		 * possible, retries the operation.
296002ff05a9Svsakar 		 */
296102ff05a9Svsakar 		ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_CREATE,
296280d34432Sfrankho 		    retry_dir);
296302ff05a9Svsakar 		if (indeadlock)
296402ff05a9Svsakar 			goto again;
296502ff05a9Svsakar 
29667c478bd9Sstevel@tonic-gate 		xvp = dnlc_lookup(dvp, name);
29677c478bd9Sstevel@tonic-gate 		if (xvp == DNLC_NO_VNODE) {
29687c478bd9Sstevel@tonic-gate 			noentry = 1;
29697c478bd9Sstevel@tonic-gate 			VN_RELE(xvp);
29707c478bd9Sstevel@tonic-gate 			xvp = NULL;
29717c478bd9Sstevel@tonic-gate 		}
29727c478bd9Sstevel@tonic-gate 		if (xvp) {
29737c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
297460c8e821SFrank Batschulat 			if (error = ufs_iaccess(ip, IEXEC, cr, 1)) {
29757c478bd9Sstevel@tonic-gate 				VN_RELE(xvp);
29767c478bd9Sstevel@tonic-gate 			} else {
29777c478bd9Sstevel@tonic-gate 				error = EEXIST;
29787c478bd9Sstevel@tonic-gate 				xip = VTOI(xvp);
29797c478bd9Sstevel@tonic-gate 			}
29807c478bd9Sstevel@tonic-gate 		} else {
29817c478bd9Sstevel@tonic-gate 			/*
29827c478bd9Sstevel@tonic-gate 			 * Suppress file system full message if we will retry
29837c478bd9Sstevel@tonic-gate 			 */
29847c478bd9Sstevel@tonic-gate 			error = ufs_direnter_cm(ip, name, DE_CREATE,
298580d34432Sfrankho 			    vap, &xip, cr, (noentry | (retry ? IQUIET : 0)));
298602ff05a9Svsakar 			if (error == EAGAIN) {
298702ff05a9Svsakar 				if (ulp) {
298802ff05a9Svsakar 					TRANS_END_CSYNC(ufsvfsp, error, issync,
298980d34432Sfrankho 					    TOP_CREATE, trans_size);
299002ff05a9Svsakar 					ufs_lockfs_end(ulp);
299102ff05a9Svsakar 				}
299202ff05a9Svsakar 				goto again;
299302ff05a9Svsakar 			}
29947c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
29957c478bd9Sstevel@tonic-gate 		}
29967c478bd9Sstevel@tonic-gate 		ip = xip;
29977c478bd9Sstevel@tonic-gate 		if (ip != NULL) {
29987c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
29997c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_WRITER);
30007c478bd9Sstevel@tonic-gate 		}
30017c478bd9Sstevel@tonic-gate 	}
30027c478bd9Sstevel@tonic-gate 
30037c478bd9Sstevel@tonic-gate 	/*
30047c478bd9Sstevel@tonic-gate 	 * If the file already exists and this is a non-exclusive create,
30057c478bd9Sstevel@tonic-gate 	 * check permissions and allow access for non-directories.
30067c478bd9Sstevel@tonic-gate 	 * Read-only create of an existing directory is also allowed.
30077c478bd9Sstevel@tonic-gate 	 * We fail an exclusive create of anything which already exists.
30087c478bd9Sstevel@tonic-gate 	 */
30097c478bd9Sstevel@tonic-gate 	if (error == EEXIST) {
30107c478bd9Sstevel@tonic-gate 		dip = VTOI(dvp);
30117c478bd9Sstevel@tonic-gate 		if (excl == NONEXCL) {
30127c478bd9Sstevel@tonic-gate 			if ((((ip->i_mode & IFMT) == IFDIR) ||
30137c478bd9Sstevel@tonic-gate 			    ((ip->i_mode & IFMT) == IFATTRDIR)) &&
30147c478bd9Sstevel@tonic-gate 			    (mode & IWRITE))
30157c478bd9Sstevel@tonic-gate 				error = EISDIR;
30167c478bd9Sstevel@tonic-gate 			else if (mode)
301760c8e821SFrank Batschulat 				error = ufs_iaccess(ip, mode, cr, 0);
30187c478bd9Sstevel@tonic-gate 			else
30197c478bd9Sstevel@tonic-gate 				error = 0;
30207c478bd9Sstevel@tonic-gate 		}
30217c478bd9Sstevel@tonic-gate 		if (error) {
30227c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
30237c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
30247c478bd9Sstevel@tonic-gate 			VN_RELE(ITOV(ip));
30257c478bd9Sstevel@tonic-gate 			goto unlock;
30267c478bd9Sstevel@tonic-gate 		}
30277c478bd9Sstevel@tonic-gate 		/*
30287c478bd9Sstevel@tonic-gate 		 * If the error EEXIST was set, then i_seq can not
30297c478bd9Sstevel@tonic-gate 		 * have been updated. The sequence number interface
30307c478bd9Sstevel@tonic-gate 		 * is defined such that a non-error VOP_CREATE must
30317c478bd9Sstevel@tonic-gate 		 * increase the dir va_seq it by at least one. If we
30327c478bd9Sstevel@tonic-gate 		 * have cleared the error, increase i_seq. Note that
30337c478bd9Sstevel@tonic-gate 		 * we are increasing the dir i_seq and in rare cases
30347c478bd9Sstevel@tonic-gate 		 * ip may actually be from the dvp, so we already have
30357c478bd9Sstevel@tonic-gate 		 * the locks and it will not be subject to truncation.
30367c478bd9Sstevel@tonic-gate 		 * In case we have to update i_seq of the parent
30377c478bd9Sstevel@tonic-gate 		 * directory dip, we have to defer it till we have
30387c478bd9Sstevel@tonic-gate 		 * released our locks on ip due to lock ordering requirements.
30397c478bd9Sstevel@tonic-gate 		 */
30407c478bd9Sstevel@tonic-gate 		if (ip != dip)
30417c478bd9Sstevel@tonic-gate 			defer_dip_seq_update = 1;
30427c478bd9Sstevel@tonic-gate 		else
30437c478bd9Sstevel@tonic-gate 			ip->i_seq++;
30447c478bd9Sstevel@tonic-gate 
30457c478bd9Sstevel@tonic-gate 		if (((ip->i_mode & IFMT) == IFREG) &&
30467c478bd9Sstevel@tonic-gate 		    (vap->va_mask & AT_SIZE) && vap->va_size == 0) {
30477c478bd9Sstevel@tonic-gate 			/*
30487c478bd9Sstevel@tonic-gate 			 * Truncate regular files, if requested by caller.
30497c478bd9Sstevel@tonic-gate 			 * Grab i_rwlock to make sure no one else is
30507c478bd9Sstevel@tonic-gate 			 * currently writing to the file (we promised
30517c478bd9Sstevel@tonic-gate 			 * bmap we would do this).
30527c478bd9Sstevel@tonic-gate 			 * Must get the locks in the correct order.
30537c478bd9Sstevel@tonic-gate 			 */
30547c478bd9Sstevel@tonic-gate 			if (ip->i_size == 0) {
30557c478bd9Sstevel@tonic-gate 				ip->i_flag |= ICHG | IUPD;
30567c478bd9Sstevel@tonic-gate 				ip->i_seq++;
30577c478bd9Sstevel@tonic-gate 				TRANS_INODE(ufsvfsp, ip);
30587c478bd9Sstevel@tonic-gate 			} else {
30597c478bd9Sstevel@tonic-gate 				/*
30607c478bd9Sstevel@tonic-gate 				 * Large Files: Why this check here?
30617c478bd9Sstevel@tonic-gate 				 * Though we do it in vn_create() we really
30627c478bd9Sstevel@tonic-gate 				 * want to guarantee that we do not destroy
30637c478bd9Sstevel@tonic-gate 				 * Large file data by atomically checking
30647c478bd9Sstevel@tonic-gate 				 * the size while holding the contents
30657c478bd9Sstevel@tonic-gate 				 * lock.
30667c478bd9Sstevel@tonic-gate 				 */
30677c478bd9Sstevel@tonic-gate 				if (flag && !(flag & FOFFMAX) &&
30687c478bd9Sstevel@tonic-gate 				    ((ip->i_mode & IFMT) == IFREG) &&
30697c478bd9Sstevel@tonic-gate 				    (ip->i_size > (offset_t)MAXOFF32_T)) {
30707c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
30717c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
30727c478bd9Sstevel@tonic-gate 					error = EOVERFLOW;
30737c478bd9Sstevel@tonic-gate 					goto unlock;
30747c478bd9Sstevel@tonic-gate 				}
30757c478bd9Sstevel@tonic-gate 				if (TRANS_ISTRANS(ufsvfsp))
30767c478bd9Sstevel@tonic-gate 					truncflag++;
30777c478bd9Sstevel@tonic-gate 				else {
30787c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
30797c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
308002ff05a9Svsakar 					ufs_tryirwlock_trans(&ip->i_rwlock,
308180d34432Sfrankho 					    RW_WRITER, TOP_CREATE,
308280d34432Sfrankho 					    retry_file);
308302ff05a9Svsakar 					if (indeadlock) {
308402ff05a9Svsakar 						VN_RELE(ITOV(ip));
308502ff05a9Svsakar 						goto again;
308602ff05a9Svsakar 					}
30877c478bd9Sstevel@tonic-gate 					rw_enter(&ufsvfsp->vfs_dqrwlock,
308880d34432Sfrankho 					    RW_READER);
30897c478bd9Sstevel@tonic-gate 					rw_enter(&ip->i_contents, RW_WRITER);
30907c478bd9Sstevel@tonic-gate 					(void) ufs_itrunc(ip, (u_offset_t)0, 0,
309180d34432Sfrankho 					    cr);
30927c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_rwlock);
30937c478bd9Sstevel@tonic-gate 				}
3094df2381bfSpraks 
3095df2381bfSpraks 			}
3096df2381bfSpraks 			if (error == 0) {
3097da6c28aaSamw 				vnevent_create(ITOV(ip), ct);
30987c478bd9Sstevel@tonic-gate 			}
30997c478bd9Sstevel@tonic-gate 		}
31007c478bd9Sstevel@tonic-gate 	}
31017c478bd9Sstevel@tonic-gate 
31027c478bd9Sstevel@tonic-gate 	if (error) {
31037c478bd9Sstevel@tonic-gate 		if (ip != NULL) {
31047c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
31057c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
31067c478bd9Sstevel@tonic-gate 		}
31077c478bd9Sstevel@tonic-gate 		goto unlock;
31087c478bd9Sstevel@tonic-gate 	}
31097c478bd9Sstevel@tonic-gate 
31107c478bd9Sstevel@tonic-gate 	*vpp = ITOV(ip);
31117c478bd9Sstevel@tonic-gate 	ITIMES(ip);
31127c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
31137c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
31147c478bd9Sstevel@tonic-gate 
31157c478bd9Sstevel@tonic-gate 	/*
31167c478bd9Sstevel@tonic-gate 	 * If vnode is a device return special vnode instead.
31177c478bd9Sstevel@tonic-gate 	 */
31187c478bd9Sstevel@tonic-gate 	if (!error && IS_DEVVP(*vpp)) {
31197c478bd9Sstevel@tonic-gate 		struct vnode *newvp;
31207c478bd9Sstevel@tonic-gate 
31217c478bd9Sstevel@tonic-gate 		newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type, cr);
31227c478bd9Sstevel@tonic-gate 		VN_RELE(*vpp);
31237c478bd9Sstevel@tonic-gate 		if (newvp == NULL) {
31247c478bd9Sstevel@tonic-gate 			error = ENOSYS;
31257c478bd9Sstevel@tonic-gate 			goto unlock;
31267c478bd9Sstevel@tonic-gate 		}
31277c478bd9Sstevel@tonic-gate 		truncflag = 0;
31287c478bd9Sstevel@tonic-gate 		*vpp = newvp;
31297c478bd9Sstevel@tonic-gate 	}
31307c478bd9Sstevel@tonic-gate unlock:
31317c478bd9Sstevel@tonic-gate 
31327c478bd9Sstevel@tonic-gate 	/*
31337c478bd9Sstevel@tonic-gate 	 * Do the deferred update of the parent directory's sequence
31347c478bd9Sstevel@tonic-gate 	 * number now.
31357c478bd9Sstevel@tonic-gate 	 */
31367c478bd9Sstevel@tonic-gate 	if (defer_dip_seq_update == 1) {
31377c478bd9Sstevel@tonic-gate 		rw_enter(&dip->i_contents, RW_READER);
31387c478bd9Sstevel@tonic-gate 		mutex_enter(&dip->i_tlock);
31397c478bd9Sstevel@tonic-gate 		dip->i_seq++;
31407c478bd9Sstevel@tonic-gate 		mutex_exit(&dip->i_tlock);
31417c478bd9Sstevel@tonic-gate 		rw_exit(&dip->i_contents);
31427c478bd9Sstevel@tonic-gate 	}
31437c478bd9Sstevel@tonic-gate 
31447c478bd9Sstevel@tonic-gate 	if (ulp) {
31457c478bd9Sstevel@tonic-gate 		int terr = 0;
31467c478bd9Sstevel@tonic-gate 
31477c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_CREATE,
31487c478bd9Sstevel@tonic-gate 		    trans_size);
31497c478bd9Sstevel@tonic-gate 
31507c478bd9Sstevel@tonic-gate 		/*
31517c478bd9Sstevel@tonic-gate 		 * If we haven't had a more interesting failure
31527c478bd9Sstevel@tonic-gate 		 * already, then anything that might've happened
31537c478bd9Sstevel@tonic-gate 		 * here should be reported.
31547c478bd9Sstevel@tonic-gate 		 */
31557c478bd9Sstevel@tonic-gate 		if (error == 0)
31567c478bd9Sstevel@tonic-gate 			error = terr;
31577c478bd9Sstevel@tonic-gate 	}
31587c478bd9Sstevel@tonic-gate 
31597c478bd9Sstevel@tonic-gate 	if (!error && truncflag) {
316002ff05a9Svsakar 		ufs_tryirwlock(&ip->i_rwlock, RW_WRITER, retry_trunc);
316102ff05a9Svsakar 		if (indeadlock) {
316202ff05a9Svsakar 			if (ulp)
316302ff05a9Svsakar 				ufs_lockfs_end(ulp);
316402ff05a9Svsakar 			VN_RELE(ITOV(ip));
316502ff05a9Svsakar 			goto again;
316602ff05a9Svsakar 		}
31677c478bd9Sstevel@tonic-gate 		(void) TRANS_ITRUNC(ip, (u_offset_t)0, 0, cr);
31687c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
31697c478bd9Sstevel@tonic-gate 	}
31707c478bd9Sstevel@tonic-gate 
31717c478bd9Sstevel@tonic-gate 	if (ulp)
31727c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
31737c478bd9Sstevel@tonic-gate 
31747c478bd9Sstevel@tonic-gate 	/*
31757c478bd9Sstevel@tonic-gate 	 * If no inodes available, try to free one up out of the
31767c478bd9Sstevel@tonic-gate 	 * pending delete queue.
31777c478bd9Sstevel@tonic-gate 	 */
31787c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
31797c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
31807c478bd9Sstevel@tonic-gate 		retry = 0;
31817c478bd9Sstevel@tonic-gate 		goto again;
31827c478bd9Sstevel@tonic-gate 	}
31837c478bd9Sstevel@tonic-gate 
31847c478bd9Sstevel@tonic-gate out:
31857c478bd9Sstevel@tonic-gate 	return (error);
31867c478bd9Sstevel@tonic-gate }
31877c478bd9Sstevel@tonic-gate 
31887c478bd9Sstevel@tonic-gate extern int ufs_idle_max;
31897c478bd9Sstevel@tonic-gate /*ARGSUSED*/
31907c478bd9Sstevel@tonic-gate static int
3191*80d5689fSPatrick Mooney ufs_remove(struct vnode *vp, char *nm, struct cred *cr, caller_context_t *ct,
3192*80d5689fSPatrick Mooney     int flags)
31937c478bd9Sstevel@tonic-gate {
31947c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
31957c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp	= ip->i_ufsvfs;
31967c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
31977c478bd9Sstevel@tonic-gate 	vnode_t *rmvp = NULL;	/* Vnode corresponding to name being removed */
319802ff05a9Svsakar 	int indeadlock;
31997c478bd9Sstevel@tonic-gate 	int error;
32007c478bd9Sstevel@tonic-gate 	int issync;
32017c478bd9Sstevel@tonic-gate 	int trans_size;
32027c478bd9Sstevel@tonic-gate 
32037c478bd9Sstevel@tonic-gate 	/*
32047c478bd9Sstevel@tonic-gate 	 * don't let the delete queue get too long
32057c478bd9Sstevel@tonic-gate 	 */
32067c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
32077c478bd9Sstevel@tonic-gate 		error = EIO;
32087c478bd9Sstevel@tonic-gate 		goto out;
32097c478bd9Sstevel@tonic-gate 	}
32107c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_delete.uq_ne > ufs_idle_max)
32117c478bd9Sstevel@tonic-gate 		ufs_delete_drain(vp->v_vfsp, 1, 1);
32127c478bd9Sstevel@tonic-gate 
32139b5097eeSOwen Roberts 	error = ufs_eventlookup(vp, nm, cr, &rmvp);
32149b5097eeSOwen Roberts 	if (rmvp != NULL) {
32159b5097eeSOwen Roberts 		/* Only send the event if there were no errors */
32169b5097eeSOwen Roberts 		if (error == 0)
32179b5097eeSOwen Roberts 			vnevent_remove(rmvp, vp, nm, ct);
32189b5097eeSOwen Roberts 		VN_RELE(rmvp);
32199b5097eeSOwen Roberts 	}
32209b5097eeSOwen Roberts 
322102ff05a9Svsakar retry_remove:
32227c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_REMOVE_MASK);
32237c478bd9Sstevel@tonic-gate 	if (error)
32247c478bd9Sstevel@tonic-gate 		goto out;
32257c478bd9Sstevel@tonic-gate 
32267c478bd9Sstevel@tonic-gate 	if (ulp)
32277c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_REMOVE,
32287c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_REMOVE_SIZE(VTOI(vp)));
32297c478bd9Sstevel@tonic-gate 
323002ff05a9Svsakar 	/*
323102ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
323202ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
323302ff05a9Svsakar 	 * possible, retries the operation.
323402ff05a9Svsakar 	 */
323502ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_REMOVE, retry);
323602ff05a9Svsakar 	if (indeadlock)
323702ff05a9Svsakar 		goto retry_remove;
32387c478bd9Sstevel@tonic-gate 	error = ufs_dirremove(ip, nm, (struct inode *)0, (struct vnode *)0,
32399b5097eeSOwen Roberts 	    DR_REMOVE, cr);
32407c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
32417c478bd9Sstevel@tonic-gate 
32427c478bd9Sstevel@tonic-gate 	if (ulp) {
32437c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_REMOVE, trans_size);
32447c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
32457c478bd9Sstevel@tonic-gate 	}
32467c478bd9Sstevel@tonic-gate 
32477c478bd9Sstevel@tonic-gate out:
32487c478bd9Sstevel@tonic-gate 	return (error);
32497c478bd9Sstevel@tonic-gate }
32507c478bd9Sstevel@tonic-gate 
32517c478bd9Sstevel@tonic-gate /*
32527c478bd9Sstevel@tonic-gate  * Link a file or a directory.  Only privileged processes are allowed to
32537c478bd9Sstevel@tonic-gate  * make links to directories.
32547c478bd9Sstevel@tonic-gate  */
3255da6c28aaSamw /*ARGSUSED*/
32567c478bd9Sstevel@tonic-gate static int
3257da6c28aaSamw ufs_link(struct vnode *tdvp, struct vnode *svp, char *tnm, struct cred *cr,
3258*80d5689fSPatrick Mooney     caller_context_t *ct, int flags)
32597c478bd9Sstevel@tonic-gate {
32607c478bd9Sstevel@tonic-gate 	struct inode *sip;
32617c478bd9Sstevel@tonic-gate 	struct inode *tdp = VTOI(tdvp);
32627c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = tdp->i_ufsvfs;
32637c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
32647c478bd9Sstevel@tonic-gate 	struct vnode *realvp;
32657c478bd9Sstevel@tonic-gate 	int error;
32667c478bd9Sstevel@tonic-gate 	int issync;
32677c478bd9Sstevel@tonic-gate 	int trans_size;
32687c478bd9Sstevel@tonic-gate 	int isdev;
326902ff05a9Svsakar 	int indeadlock;
32707c478bd9Sstevel@tonic-gate 
327102ff05a9Svsakar retry_link:
32727c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_LINK_MASK);
32737c478bd9Sstevel@tonic-gate 	if (error)
32747c478bd9Sstevel@tonic-gate 		goto out;
32757c478bd9Sstevel@tonic-gate 
32767c478bd9Sstevel@tonic-gate 	if (ulp)
32777c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_LINK,
32787c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_LINK_SIZE(VTOI(tdvp)));
32797c478bd9Sstevel@tonic-gate 
3280da6c28aaSamw 	if (VOP_REALVP(svp, &realvp, ct) == 0)
32817c478bd9Sstevel@tonic-gate 		svp = realvp;
32827c478bd9Sstevel@tonic-gate 
32837c478bd9Sstevel@tonic-gate 	/*
32847c478bd9Sstevel@tonic-gate 	 * Make sure link for extended attributes is valid
32857c478bd9Sstevel@tonic-gate 	 * We only support hard linking of attr in ATTRDIR to ATTRDIR
32867c478bd9Sstevel@tonic-gate 	 *
32877c478bd9Sstevel@tonic-gate 	 * Make certain we don't attempt to look at a device node as
32887c478bd9Sstevel@tonic-gate 	 * a ufs inode.
32897c478bd9Sstevel@tonic-gate 	 */
32907c478bd9Sstevel@tonic-gate 
32917c478bd9Sstevel@tonic-gate 	isdev = IS_DEVVP(svp);
32927c478bd9Sstevel@tonic-gate 	if (((isdev == 0) && ((VTOI(svp)->i_cflags & IXATTR) == 0) &&
32937c478bd9Sstevel@tonic-gate 	    ((tdp->i_mode & IFMT) == IFATTRDIR)) ||
32947c478bd9Sstevel@tonic-gate 	    ((isdev == 0) && (VTOI(svp)->i_cflags & IXATTR) &&
32957c478bd9Sstevel@tonic-gate 	    ((tdp->i_mode & IFMT) == IFDIR))) {
32967c478bd9Sstevel@tonic-gate 		error = EINVAL;
32977c478bd9Sstevel@tonic-gate 		goto unlock;
32987c478bd9Sstevel@tonic-gate 	}
32997c478bd9Sstevel@tonic-gate 
33007c478bd9Sstevel@tonic-gate 	sip = VTOI(svp);
33017c478bd9Sstevel@tonic-gate 	if ((svp->v_type == VDIR &&
33027c478bd9Sstevel@tonic-gate 	    secpolicy_fs_linkdir(cr, ufsvfsp->vfs_vfs) != 0) ||
33037c478bd9Sstevel@tonic-gate 	    (sip->i_uid != crgetuid(cr) && secpolicy_basic_link(cr) != 0)) {
33047c478bd9Sstevel@tonic-gate 		error = EPERM;
33057c478bd9Sstevel@tonic-gate 		goto unlock;
33067c478bd9Sstevel@tonic-gate 	}
330702ff05a9Svsakar 
330802ff05a9Svsakar 	/*
330902ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
331002ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
331102ff05a9Svsakar 	 * possible, retries the operation.
331202ff05a9Svsakar 	 */
331302ff05a9Svsakar 	ufs_tryirwlock_trans(&tdp->i_rwlock, RW_WRITER, TOP_LINK, retry);
331402ff05a9Svsakar 	if (indeadlock)
331502ff05a9Svsakar 		goto retry_link;
33167c478bd9Sstevel@tonic-gate 	error = ufs_direnter_lr(tdp, tnm, DE_LINK, (struct inode *)0,
33179b5097eeSOwen Roberts 	    sip, cr);
33187c478bd9Sstevel@tonic-gate 	rw_exit(&tdp->i_rwlock);
33197c478bd9Sstevel@tonic-gate 
33207c478bd9Sstevel@tonic-gate unlock:
33217c478bd9Sstevel@tonic-gate 	if (ulp) {
33227c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_LINK, trans_size);
33237c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
33247c478bd9Sstevel@tonic-gate 	}
3325df2381bfSpraks 
3326df2381bfSpraks 	if (!error) {
3327da6c28aaSamw 		vnevent_link(svp, ct);
3328df2381bfSpraks 	}
33297c478bd9Sstevel@tonic-gate out:
33307c478bd9Sstevel@tonic-gate 	return (error);
33317c478bd9Sstevel@tonic-gate }
33327c478bd9Sstevel@tonic-gate 
33337c478bd9Sstevel@tonic-gate uint64_t ufs_rename_retry_cnt;
33347c478bd9Sstevel@tonic-gate uint64_t ufs_rename_upgrade_retry_cnt;
33357c478bd9Sstevel@tonic-gate uint64_t ufs_rename_dircheck_retry_cnt;
33367c478bd9Sstevel@tonic-gate clock_t	 ufs_rename_backoff_delay = 1;
33377c478bd9Sstevel@tonic-gate 
33387c478bd9Sstevel@tonic-gate /*
33397c478bd9Sstevel@tonic-gate  * Rename a file or directory.
33407c478bd9Sstevel@tonic-gate  * We are given the vnode and entry string of the source and the
33417c478bd9Sstevel@tonic-gate  * vnode and entry string of the place we want to move the source
33427c478bd9Sstevel@tonic-gate  * to (the target). The essential operation is:
33437c478bd9Sstevel@tonic-gate  *	unlink(target);
33447c478bd9Sstevel@tonic-gate  *	link(source, target);
33457c478bd9Sstevel@tonic-gate  *	unlink(source);
33467c478bd9Sstevel@tonic-gate  * but "atomically".  Can't do full commit without saving state in
33477c478bd9Sstevel@tonic-gate  * the inode on disk, which isn't feasible at this time.  Best we
33487c478bd9Sstevel@tonic-gate  * can do is always guarantee that the TARGET exists.
33497c478bd9Sstevel@tonic-gate  */
3350baa4d099Sswilcox 
33517c478bd9Sstevel@tonic-gate /*ARGSUSED*/
33527c478bd9Sstevel@tonic-gate static int
3353*80d5689fSPatrick Mooney ufs_rename(struct vnode *sdvp, char *snm, struct vnode *tdvp, char *tnm,
3354*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct, int flags)
33557c478bd9Sstevel@tonic-gate {
33567c478bd9Sstevel@tonic-gate 	struct inode *sip = NULL;	/* source inode */
3357baa4d099Sswilcox 	struct inode *ip = NULL;	/* check inode */
33587c478bd9Sstevel@tonic-gate 	struct inode *sdp;		/* old (source) parent inode */
33597c478bd9Sstevel@tonic-gate 	struct inode *tdp;		/* new (target) parent inode */
33609b5097eeSOwen Roberts 	struct vnode *svp = NULL;	/* source vnode */
33617c478bd9Sstevel@tonic-gate 	struct vnode *tvp = NULL;	/* target vnode, if it exists */
33627c478bd9Sstevel@tonic-gate 	struct vnode *realvp;
33637c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
336454207fd2SJerry Jelinek 	struct ulockfs *ulp = NULL;
33655b024a5bSbatschul 	struct ufs_slot slot;
3366baa4d099Sswilcox 	timestruc_t now;
33677c478bd9Sstevel@tonic-gate 	int error;
33687c478bd9Sstevel@tonic-gate 	int issync;
33697c478bd9Sstevel@tonic-gate 	int trans_size;
337002ff05a9Svsakar 	krwlock_t *first_lock;
337102ff05a9Svsakar 	krwlock_t *second_lock;
337202ff05a9Svsakar 	krwlock_t *reverse_lock;
33739b5097eeSOwen Roberts 	int serr, terr;
33747c478bd9Sstevel@tonic-gate 
33757c478bd9Sstevel@tonic-gate 	sdp = VTOI(sdvp);
3376baa4d099Sswilcox 	slot.fbp = NULL;
33777c478bd9Sstevel@tonic-gate 	ufsvfsp = sdp->i_ufsvfs;
33789b5097eeSOwen Roberts 
33799b5097eeSOwen Roberts 	if (VOP_REALVP(tdvp, &realvp, ct) == 0)
33809b5097eeSOwen Roberts 		tdvp = realvp;
33819b5097eeSOwen Roberts 
338254207fd2SJerry Jelinek 	/* Must do this before taking locks in case of DNLC miss */
33839b5097eeSOwen Roberts 	terr = ufs_eventlookup(tdvp, tnm, cr, &tvp);
33849b5097eeSOwen Roberts 	serr = ufs_eventlookup(sdvp, snm, cr, &svp);
33859b5097eeSOwen Roberts 
33869b5097eeSOwen Roberts 	if ((serr == 0) && ((terr == 0) || (terr == ENOENT))) {
33879b5097eeSOwen Roberts 		if (tvp != NULL)
338854207fd2SJerry Jelinek 			vnevent_pre_rename_dest(tvp, tdvp, tnm, ct);
33899b5097eeSOwen Roberts 
33909b5097eeSOwen Roberts 		/*
33919b5097eeSOwen Roberts 		 * Notify the target directory of the rename event
33929b5097eeSOwen Roberts 		 * if source and target directories are not the same.
33939b5097eeSOwen Roberts 		 */
33949b5097eeSOwen Roberts 		if (sdvp != tdvp)
339554207fd2SJerry Jelinek 			vnevent_pre_rename_dest_dir(tdvp, svp, tnm, ct);
33969b5097eeSOwen Roberts 
33979b5097eeSOwen Roberts 		if (svp != NULL)
339854207fd2SJerry Jelinek 			vnevent_pre_rename_src(svp, sdvp, snm, ct);
33999b5097eeSOwen Roberts 	}
34009b5097eeSOwen Roberts 
34019b5097eeSOwen Roberts 	if (svp != NULL)
34029b5097eeSOwen Roberts 		VN_RELE(svp);
34039b5097eeSOwen Roberts 
340402ff05a9Svsakar retry_rename:
34057c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_RENAME_MASK);
34067c478bd9Sstevel@tonic-gate 	if (error)
340754207fd2SJerry Jelinek 		goto unlock;
34087c478bd9Sstevel@tonic-gate 
34097c478bd9Sstevel@tonic-gate 	if (ulp)
34107c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_RENAME,
34117c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_RENAME_SIZE(sdp));
34127c478bd9Sstevel@tonic-gate 
3413da6c28aaSamw 	if (VOP_REALVP(tdvp, &realvp, ct) == 0)
34147c478bd9Sstevel@tonic-gate 		tdvp = realvp;
34157c478bd9Sstevel@tonic-gate 
34167c478bd9Sstevel@tonic-gate 	tdp = VTOI(tdvp);
34177c478bd9Sstevel@tonic-gate 
34187c478bd9Sstevel@tonic-gate 	/*
34197c478bd9Sstevel@tonic-gate 	 * We only allow renaming of attributes from ATTRDIR to ATTRDIR.
34207c478bd9Sstevel@tonic-gate 	 */
34217c478bd9Sstevel@tonic-gate 	if ((tdp->i_mode & IFMT) != (sdp->i_mode & IFMT)) {
34227c478bd9Sstevel@tonic-gate 		error = EINVAL;
34237c478bd9Sstevel@tonic-gate 		goto unlock;
34247c478bd9Sstevel@tonic-gate 	}
34257c478bd9Sstevel@tonic-gate 
342660c8e821SFrank Batschulat 	/*
342760c8e821SFrank Batschulat 	 * Check accessibility of directory.
342860c8e821SFrank Batschulat 	 */
342960c8e821SFrank Batschulat 	if (error = ufs_diraccess(sdp, IEXEC, cr))
343060c8e821SFrank Batschulat 		goto unlock;
343160c8e821SFrank Batschulat 
34327c478bd9Sstevel@tonic-gate 	/*
34337c478bd9Sstevel@tonic-gate 	 * Look up inode of file we're supposed to rename.
34347c478bd9Sstevel@tonic-gate 	 */
3435baa4d099Sswilcox 	gethrestime(&now);
34369b5097eeSOwen Roberts 	if (error = ufs_dirlook(sdp, snm, &sip, cr, 0, 0)) {
343702ff05a9Svsakar 		if (error == EAGAIN) {
343802ff05a9Svsakar 			if (ulp) {
343902ff05a9Svsakar 				TRANS_END_CSYNC(ufsvfsp, error, issync,
344080d34432Sfrankho 				    TOP_RENAME, trans_size);
344102ff05a9Svsakar 				ufs_lockfs_end(ulp);
344202ff05a9Svsakar 			}
344302ff05a9Svsakar 			goto retry_rename;
344402ff05a9Svsakar 		}
344502ff05a9Svsakar 
34467c478bd9Sstevel@tonic-gate 		goto unlock;
34477c478bd9Sstevel@tonic-gate 	}
34487c478bd9Sstevel@tonic-gate 
34497c478bd9Sstevel@tonic-gate 	/*
34507c478bd9Sstevel@tonic-gate 	 * Lock both the source and target directories (they may be
34517c478bd9Sstevel@tonic-gate 	 * the same) to provide the atomicity semantics that was
34527c478bd9Sstevel@tonic-gate 	 * previously provided by the per file system vfs_rename_lock
34537c478bd9Sstevel@tonic-gate 	 *
34547c478bd9Sstevel@tonic-gate 	 * with vfs_rename_lock removed to allow simultaneous renames
34557c478bd9Sstevel@tonic-gate 	 * within a file system, ufs_dircheckpath can deadlock while
34567c478bd9Sstevel@tonic-gate 	 * traversing back to ensure that source is not a parent directory
34577c478bd9Sstevel@tonic-gate 	 * of target parent directory. This is because we get into
34587c478bd9Sstevel@tonic-gate 	 * ufs_dircheckpath with the sdp and tdp locks held as RW_WRITER.
34597c478bd9Sstevel@tonic-gate 	 * If the tdp and sdp of the simultaneous renames happen to be
34607c478bd9Sstevel@tonic-gate 	 * in the path of each other, it can lead to a deadlock. This
34617c478bd9Sstevel@tonic-gate 	 * can be avoided by getting the locks as RW_READER here and then
34627c478bd9Sstevel@tonic-gate 	 * upgrading to RW_WRITER after completing the ufs_dircheckpath.
346302ff05a9Svsakar 	 *
346402ff05a9Svsakar 	 * We hold the target directory's i_rwlock after calling
346502ff05a9Svsakar 	 * ufs_lockfs_begin but in many other operations (like ufs_readdir)
346602ff05a9Svsakar 	 * VOP_RWLOCK is explicitly called by the filesystem independent code
346702ff05a9Svsakar 	 * before calling the file system operation. In these cases the order
346802ff05a9Svsakar 	 * is reversed (i.e i_rwlock is taken first and then ufs_lockfs_begin
346902ff05a9Svsakar 	 * is called). This is fine as long as ufs_lockfs_begin acts as a VOP
347002ff05a9Svsakar 	 * counter but with ufs_quiesce setting the SLOCK bit this becomes a
347102ff05a9Svsakar 	 * synchronizing object which might lead to a deadlock. So we use
347202ff05a9Svsakar 	 * rw_tryenter instead of rw_enter. If we fail to get this lock and
347302ff05a9Svsakar 	 * find that SLOCK bit is set, we call ufs_lockfs_end and restart the
347402ff05a9Svsakar 	 * operation.
34757c478bd9Sstevel@tonic-gate 	 */
34767c478bd9Sstevel@tonic-gate retry:
347702ff05a9Svsakar 	first_lock = &tdp->i_rwlock;
347802ff05a9Svsakar 	second_lock = &sdp->i_rwlock;
347902ff05a9Svsakar retry_firstlock:
348002ff05a9Svsakar 	if (!rw_tryenter(first_lock, RW_READER)) {
34817c478bd9Sstevel@tonic-gate 		/*
348202ff05a9Svsakar 		 * We didn't get the lock. Check if the SLOCK is set in the
348302ff05a9Svsakar 		 * ufsvfs. If yes, we might be in a deadlock. Safer to give up
348402ff05a9Svsakar 		 * and wait for SLOCK to be cleared.
34857c478bd9Sstevel@tonic-gate 		 */
348602ff05a9Svsakar 
348702ff05a9Svsakar 		if (ulp && ULOCKFS_IS_SLOCK(ulp)) {
348802ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME,
348980d34432Sfrankho 			    trans_size);
349002ff05a9Svsakar 			ufs_lockfs_end(ulp);
349102ff05a9Svsakar 			goto retry_rename;
349202ff05a9Svsakar 
349302ff05a9Svsakar 		} else {
34947c478bd9Sstevel@tonic-gate 			/*
349502ff05a9Svsakar 			 * SLOCK isn't set so this is a genuine synchronization
349602ff05a9Svsakar 			 * case. Let's try again after giving them a breather.
34977c478bd9Sstevel@tonic-gate 			 */
349802ff05a9Svsakar 			delay(RETRY_LOCK_DELAY);
349902ff05a9Svsakar 			goto  retry_firstlock;
350002ff05a9Svsakar 		}
350102ff05a9Svsakar 	}
350202ff05a9Svsakar 	/*
350302ff05a9Svsakar 	 * Need to check if the tdp and sdp are same !!!
350402ff05a9Svsakar 	 */
350502ff05a9Svsakar 	if ((tdp != sdp) && (!rw_tryenter(second_lock, RW_READER))) {
350602ff05a9Svsakar 		/*
350702ff05a9Svsakar 		 * We didn't get the lock. Check if the SLOCK is set in the
350802ff05a9Svsakar 		 * ufsvfs. If yes, we might be in a deadlock. Safer to give up
350902ff05a9Svsakar 		 * and wait for SLOCK to be cleared.
351002ff05a9Svsakar 		 */
351102ff05a9Svsakar 
351202ff05a9Svsakar 		rw_exit(first_lock);
351302ff05a9Svsakar 		if (ulp && ULOCKFS_IS_SLOCK(ulp)) {
351402ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME,
351580d34432Sfrankho 			    trans_size);
351602ff05a9Svsakar 			ufs_lockfs_end(ulp);
351702ff05a9Svsakar 			goto retry_rename;
351802ff05a9Svsakar 
351902ff05a9Svsakar 		} else {
352002ff05a9Svsakar 			/*
352102ff05a9Svsakar 			 * So we couldn't get the second level peer lock *and*
352202ff05a9Svsakar 			 * the SLOCK bit isn't set. Too bad we can be
352302ff05a9Svsakar 			 * contentding with someone wanting these locks otherway
352402ff05a9Svsakar 			 * round. Reverse the locks in case there is a heavy
352502ff05a9Svsakar 			 * contention for the second level lock.
352602ff05a9Svsakar 			 */
352702ff05a9Svsakar 			reverse_lock = first_lock;
352802ff05a9Svsakar 			first_lock = second_lock;
352902ff05a9Svsakar 			second_lock = reverse_lock;
353002ff05a9Svsakar 			ufs_rename_retry_cnt++;
353102ff05a9Svsakar 			goto  retry_firstlock;
35327c478bd9Sstevel@tonic-gate 		}
35337c478bd9Sstevel@tonic-gate 	}
35347c478bd9Sstevel@tonic-gate 
35357c478bd9Sstevel@tonic-gate 	if (sip == tdp) {
35367c478bd9Sstevel@tonic-gate 		error = EINVAL;
35377c478bd9Sstevel@tonic-gate 		goto errout;
35387c478bd9Sstevel@tonic-gate 	}
35397c478bd9Sstevel@tonic-gate 	/*
35407c478bd9Sstevel@tonic-gate 	 * Make sure we can delete the source entry.  This requires
35417c478bd9Sstevel@tonic-gate 	 * write permission on the containing directory.
35427c478bd9Sstevel@tonic-gate 	 * Check for sticky directories.
35437c478bd9Sstevel@tonic-gate 	 */
35447c478bd9Sstevel@tonic-gate 	rw_enter(&sdp->i_contents, RW_READER);
35457c478bd9Sstevel@tonic-gate 	rw_enter(&sip->i_contents, RW_READER);
354660c8e821SFrank Batschulat 	if ((error = ufs_iaccess(sdp, IWRITE, cr, 0)) != 0 ||
35477c478bd9Sstevel@tonic-gate 	    (error = ufs_sticky_remove_access(sdp, sip, cr)) != 0) {
35487c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35497c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35507c478bd9Sstevel@tonic-gate 		goto errout;
35517c478bd9Sstevel@tonic-gate 	}
35527c478bd9Sstevel@tonic-gate 
35537c478bd9Sstevel@tonic-gate 	/*
35547c478bd9Sstevel@tonic-gate 	 * If this is a rename of a directory and the parent is
35557c478bd9Sstevel@tonic-gate 	 * different (".." must be changed), then the source
35567c478bd9Sstevel@tonic-gate 	 * directory must not be in the directory hierarchy
35577c478bd9Sstevel@tonic-gate 	 * above the target, as this would orphan everything
35587c478bd9Sstevel@tonic-gate 	 * below the source directory.  Also the user must have
35597c478bd9Sstevel@tonic-gate 	 * write permission in the source so as to be able to
35607c478bd9Sstevel@tonic-gate 	 * change "..".
35617c478bd9Sstevel@tonic-gate 	 */
35627c478bd9Sstevel@tonic-gate 	if ((((sip->i_mode & IFMT) == IFDIR) ||
35637c478bd9Sstevel@tonic-gate 	    ((sip->i_mode & IFMT) == IFATTRDIR)) && sdp != tdp) {
35647c478bd9Sstevel@tonic-gate 		ino_t	inum;
35657c478bd9Sstevel@tonic-gate 
356660c8e821SFrank Batschulat 		if (error = ufs_iaccess(sip, IWRITE, cr, 0)) {
35677c478bd9Sstevel@tonic-gate 			rw_exit(&sip->i_contents);
35687c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_contents);
35697c478bd9Sstevel@tonic-gate 			goto errout;
35707c478bd9Sstevel@tonic-gate 		}
35717c478bd9Sstevel@tonic-gate 		inum = sip->i_number;
35727c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35737c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35747c478bd9Sstevel@tonic-gate 		if ((error = ufs_dircheckpath(inum, tdp, sdp, cr))) {
35757c478bd9Sstevel@tonic-gate 			/*
35767c478bd9Sstevel@tonic-gate 			 * If we got EAGAIN ufs_dircheckpath detected a
35777c478bd9Sstevel@tonic-gate 			 * potential deadlock and backed out. We need
35787c478bd9Sstevel@tonic-gate 			 * to retry the operation since sdp and tdp have
35797c478bd9Sstevel@tonic-gate 			 * to be released to avoid the deadlock.
35807c478bd9Sstevel@tonic-gate 			 */
35817c478bd9Sstevel@tonic-gate 			if (error == EAGAIN) {
35827c478bd9Sstevel@tonic-gate 				rw_exit(&tdp->i_rwlock);
35837c478bd9Sstevel@tonic-gate 				if (tdp != sdp)
35847c478bd9Sstevel@tonic-gate 					rw_exit(&sdp->i_rwlock);
35857c478bd9Sstevel@tonic-gate 				delay(ufs_rename_backoff_delay);
35867c478bd9Sstevel@tonic-gate 				ufs_rename_dircheck_retry_cnt++;
35877c478bd9Sstevel@tonic-gate 				goto retry;
35887c478bd9Sstevel@tonic-gate 			}
35897c478bd9Sstevel@tonic-gate 			goto errout;
35907c478bd9Sstevel@tonic-gate 		}
35917c478bd9Sstevel@tonic-gate 	} else {
35927c478bd9Sstevel@tonic-gate 		rw_exit(&sip->i_contents);
35937c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_contents);
35947c478bd9Sstevel@tonic-gate 	}
35957c478bd9Sstevel@tonic-gate 
35967c478bd9Sstevel@tonic-gate 
35977c478bd9Sstevel@tonic-gate 	/*
35987c478bd9Sstevel@tonic-gate 	 * Check for renaming '.' or '..' or alias of '.'
35997c478bd9Sstevel@tonic-gate 	 */
36007c478bd9Sstevel@tonic-gate 	if (strcmp(snm, ".") == 0 || strcmp(snm, "..") == 0 || sdp == sip) {
36017c478bd9Sstevel@tonic-gate 		error = EINVAL;
36027c478bd9Sstevel@tonic-gate 		goto errout;
36037c478bd9Sstevel@tonic-gate 	}
36047c478bd9Sstevel@tonic-gate 
36057c478bd9Sstevel@tonic-gate 	/*
36067c478bd9Sstevel@tonic-gate 	 * Simultaneous renames can deadlock in ufs_dircheckpath since it
36077c478bd9Sstevel@tonic-gate 	 * tries to traverse back the file tree with both tdp and sdp held
36087c478bd9Sstevel@tonic-gate 	 * as RW_WRITER. To avoid that we have to hold the tdp and sdp locks
36097c478bd9Sstevel@tonic-gate 	 * as RW_READERS  till ufs_dircheckpath is done.
36107c478bd9Sstevel@tonic-gate 	 * Now that ufs_dircheckpath is done with, we can upgrade the locks
36117c478bd9Sstevel@tonic-gate 	 * to RW_WRITER.
36127c478bd9Sstevel@tonic-gate 	 */
36137c478bd9Sstevel@tonic-gate 	if (!rw_tryupgrade(&tdp->i_rwlock)) {
36147c478bd9Sstevel@tonic-gate 		/*
36157c478bd9Sstevel@tonic-gate 		 * The upgrade failed. We got to give away the lock
36167c478bd9Sstevel@tonic-gate 		 * as to avoid deadlocking with someone else who is
36177c478bd9Sstevel@tonic-gate 		 * waiting for writer lock. With the lock gone, we
36187c478bd9Sstevel@tonic-gate 		 * cannot be sure the checks done above will hold
36197c478bd9Sstevel@tonic-gate 		 * good when we eventually get them back as writer.
36207c478bd9Sstevel@tonic-gate 		 * So if we can't upgrade we drop the locks and retry
36217c478bd9Sstevel@tonic-gate 		 * everything again.
36227c478bd9Sstevel@tonic-gate 		 */
36237c478bd9Sstevel@tonic-gate 		rw_exit(&tdp->i_rwlock);
36247c478bd9Sstevel@tonic-gate 		if (tdp != sdp)
36257c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_rwlock);
36267c478bd9Sstevel@tonic-gate 		delay(ufs_rename_backoff_delay);
36277c478bd9Sstevel@tonic-gate 		ufs_rename_upgrade_retry_cnt++;
36287c478bd9Sstevel@tonic-gate 		goto retry;
36297c478bd9Sstevel@tonic-gate 	}
36307c478bd9Sstevel@tonic-gate 	if (tdp != sdp) {
36317c478bd9Sstevel@tonic-gate 		if (!rw_tryupgrade(&sdp->i_rwlock)) {
36327c478bd9Sstevel@tonic-gate 			/*
36337c478bd9Sstevel@tonic-gate 			 * The upgrade failed. We got to give away the lock
36347c478bd9Sstevel@tonic-gate 			 * as to avoid deadlocking with someone else who is
36357c478bd9Sstevel@tonic-gate 			 * waiting for writer lock. With the lock gone, we
36367c478bd9Sstevel@tonic-gate 			 * cannot be sure the checks done above will hold
36377c478bd9Sstevel@tonic-gate 			 * good when we eventually get them back as writer.
36387c478bd9Sstevel@tonic-gate 			 * So if we can't upgrade we drop the locks and retry
36397c478bd9Sstevel@tonic-gate 			 * everything again.
36407c478bd9Sstevel@tonic-gate 			 */
36417c478bd9Sstevel@tonic-gate 			rw_exit(&tdp->i_rwlock);
36427c478bd9Sstevel@tonic-gate 			rw_exit(&sdp->i_rwlock);
36437c478bd9Sstevel@tonic-gate 			delay(ufs_rename_backoff_delay);
36447c478bd9Sstevel@tonic-gate 			ufs_rename_upgrade_retry_cnt++;
36457c478bd9Sstevel@tonic-gate 			goto retry;
36467c478bd9Sstevel@tonic-gate 		}
36477c478bd9Sstevel@tonic-gate 	}
3648baa4d099Sswilcox 
3649baa4d099Sswilcox 	/*
3650baa4d099Sswilcox 	 * Now that all the locks are held check to make sure another thread
3651baa4d099Sswilcox 	 * didn't slip in and take out the sip.
3652baa4d099Sswilcox 	 */
3653baa4d099Sswilcox 	slot.status = NONE;
3654baa4d099Sswilcox 	if ((sip->i_ctime.tv_usec * 1000) > now.tv_nsec ||
3655baa4d099Sswilcox 	    sip->i_ctime.tv_sec > now.tv_sec) {
3656baa4d099Sswilcox 		rw_enter(&sdp->i_ufsvfs->vfs_dqrwlock, RW_READER);
3657baa4d099Sswilcox 		rw_enter(&sdp->i_contents, RW_WRITER);
3658baa4d099Sswilcox 		error = ufs_dircheckforname(sdp, snm, strlen(snm), &slot,
3659baa4d099Sswilcox 		    &ip, cr, 0);
3660baa4d099Sswilcox 		rw_exit(&sdp->i_contents);
3661baa4d099Sswilcox 		rw_exit(&sdp->i_ufsvfs->vfs_dqrwlock);
3662baa4d099Sswilcox 		if (error) {
3663baa4d099Sswilcox 			goto errout;
3664baa4d099Sswilcox 		}
3665baa4d099Sswilcox 		if (ip == NULL) {
3666baa4d099Sswilcox 			error = ENOENT;
3667baa4d099Sswilcox 			goto errout;
3668baa4d099Sswilcox 		} else {
3669baa4d099Sswilcox 			/*
3670baa4d099Sswilcox 			 * If the inode was found need to drop the v_count
3671baa4d099Sswilcox 			 * so as not to keep the filesystem from being
3672baa4d099Sswilcox 			 * unmounted at a later time.
3673baa4d099Sswilcox 			 */
3674baa4d099Sswilcox 			VN_RELE(ITOV(ip));
3675baa4d099Sswilcox 		}
3676baa4d099Sswilcox 
3677baa4d099Sswilcox 		/*
3678baa4d099Sswilcox 		 * Release the slot.fbp that has the page mapped and
3679baa4d099Sswilcox 		 * locked SE_SHARED, and could be used in in
3680baa4d099Sswilcox 		 * ufs_direnter_lr() which needs to get the SE_EXCL lock
3681baa4d099Sswilcox 		 * on said page.
3682baa4d099Sswilcox 		 */
3683baa4d099Sswilcox 		if (slot.fbp) {
3684baa4d099Sswilcox 			fbrelse(slot.fbp, S_OTHER);
3685baa4d099Sswilcox 			slot.fbp = NULL;
3686baa4d099Sswilcox 		}
3687baa4d099Sswilcox 	}
3688baa4d099Sswilcox 
36897c478bd9Sstevel@tonic-gate 	/*
36909b5097eeSOwen Roberts 	 * Link source to the target.
36917c478bd9Sstevel@tonic-gate 	 */
36929b5097eeSOwen Roberts 	if (error = ufs_direnter_lr(tdp, tnm, DE_RENAME, sdp, sip, cr)) {
36937c478bd9Sstevel@tonic-gate 		/*
36947c478bd9Sstevel@tonic-gate 		 * ESAME isn't really an error; it indicates that the
36957c478bd9Sstevel@tonic-gate 		 * operation should not be done because the source and target
36967c478bd9Sstevel@tonic-gate 		 * are the same file, but that no error should be reported.
36977c478bd9Sstevel@tonic-gate 		 */
36987c478bd9Sstevel@tonic-gate 		if (error == ESAME)
36997c478bd9Sstevel@tonic-gate 			error = 0;
37007c478bd9Sstevel@tonic-gate 		goto errout;
37017c478bd9Sstevel@tonic-gate 	}
37027c478bd9Sstevel@tonic-gate 
370354207fd2SJerry Jelinek 	if (error == 0 && tvp != NULL)
370454207fd2SJerry Jelinek 		vnevent_rename_dest(tvp, tdvp, tnm, ct);
370554207fd2SJerry Jelinek 
37067c478bd9Sstevel@tonic-gate 	/*
37077c478bd9Sstevel@tonic-gate 	 * Unlink the source.
37087c478bd9Sstevel@tonic-gate 	 * Remove the source entry.  ufs_dirremove() checks that the entry
37097c478bd9Sstevel@tonic-gate 	 * still reflects sip, and returns an error if it doesn't.
37107c478bd9Sstevel@tonic-gate 	 * If the entry has changed just forget about it.  Release
37117c478bd9Sstevel@tonic-gate 	 * the source inode.
37127c478bd9Sstevel@tonic-gate 	 */
37137c478bd9Sstevel@tonic-gate 	if ((error = ufs_dirremove(sdp, snm, sip, (struct vnode *)0,
37149b5097eeSOwen Roberts 	    DR_RENAME, cr)) == ENOENT)
37157c478bd9Sstevel@tonic-gate 		error = 0;
37167c478bd9Sstevel@tonic-gate 
371754207fd2SJerry Jelinek 	if (error == 0) {
371854207fd2SJerry Jelinek 		vnevent_rename_src(ITOV(sip), sdvp, snm, ct);
371954207fd2SJerry Jelinek 		/*
372054207fd2SJerry Jelinek 		 * Notify the target directory of the rename event
372154207fd2SJerry Jelinek 		 * if source and target directories are not the same.
372254207fd2SJerry Jelinek 		 */
372354207fd2SJerry Jelinek 		if (sdvp != tdvp)
372454207fd2SJerry Jelinek 			vnevent_rename_dest_dir(tdvp, ct);
372554207fd2SJerry Jelinek 	}
372654207fd2SJerry Jelinek 
37277c478bd9Sstevel@tonic-gate errout:
3728baa4d099Sswilcox 	if (slot.fbp)
3729baa4d099Sswilcox 		fbrelse(slot.fbp, S_OTHER);
3730baa4d099Sswilcox 
37317c478bd9Sstevel@tonic-gate 	rw_exit(&tdp->i_rwlock);
37327c478bd9Sstevel@tonic-gate 	if (sdp != tdp) {
37337c478bd9Sstevel@tonic-gate 		rw_exit(&sdp->i_rwlock);
37347c478bd9Sstevel@tonic-gate 	}
37357c478bd9Sstevel@tonic-gate 
37367c478bd9Sstevel@tonic-gate unlock:
373754207fd2SJerry Jelinek 	if (tvp != NULL)
373854207fd2SJerry Jelinek 		VN_RELE(tvp);
373954207fd2SJerry Jelinek 	if (sip != NULL)
374054207fd2SJerry Jelinek 		VN_RELE(ITOV(sip));
374154207fd2SJerry Jelinek 
37427c478bd9Sstevel@tonic-gate 	if (ulp) {
37437c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RENAME, trans_size);
37447c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
37457c478bd9Sstevel@tonic-gate 	}
37467c478bd9Sstevel@tonic-gate 
37477c478bd9Sstevel@tonic-gate 	return (error);
37487c478bd9Sstevel@tonic-gate }
37497c478bd9Sstevel@tonic-gate 
37507c478bd9Sstevel@tonic-gate /*ARGSUSED*/
37517c478bd9Sstevel@tonic-gate static int
37527c478bd9Sstevel@tonic-gate ufs_mkdir(struct vnode *dvp, char *dirname, struct vattr *vap,
3753*80d5689fSPatrick Mooney     struct vnode **vpp, struct cred *cr, caller_context_t *ct, int flags,
3754*80d5689fSPatrick Mooney     vsecattr_t *vsecp)
37557c478bd9Sstevel@tonic-gate {
37567c478bd9Sstevel@tonic-gate 	struct inode *ip;
37577c478bd9Sstevel@tonic-gate 	struct inode *xip;
37587c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
37597c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
37607c478bd9Sstevel@tonic-gate 	int error;
37617c478bd9Sstevel@tonic-gate 	int issync;
37627c478bd9Sstevel@tonic-gate 	int trans_size;
376302ff05a9Svsakar 	int indeadlock;
37647c478bd9Sstevel@tonic-gate 	int retry = 1;
37657c478bd9Sstevel@tonic-gate 
37667c478bd9Sstevel@tonic-gate 	ASSERT((vap->va_mask & (AT_TYPE|AT_MODE)) == (AT_TYPE|AT_MODE));
37677c478bd9Sstevel@tonic-gate 
37687c478bd9Sstevel@tonic-gate 	/*
37697c478bd9Sstevel@tonic-gate 	 * Can't make directory in attr hidden dir
37707c478bd9Sstevel@tonic-gate 	 */
37717c478bd9Sstevel@tonic-gate 	if ((VTOI(dvp)->i_mode & IFMT) == IFATTRDIR)
37727c478bd9Sstevel@tonic-gate 		return (EINVAL);
37737c478bd9Sstevel@tonic-gate 
37747c478bd9Sstevel@tonic-gate again:
37757c478bd9Sstevel@tonic-gate 	ip = VTOI(dvp);
37767c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
37777c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_MKDIR_MASK);
37787c478bd9Sstevel@tonic-gate 	if (error)
37797c478bd9Sstevel@tonic-gate 		goto out;
37807c478bd9Sstevel@tonic-gate 	if (ulp)
37817c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_MKDIR,
37827c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_MKDIR_SIZE(ip));
37837c478bd9Sstevel@tonic-gate 
378402ff05a9Svsakar 	/*
378502ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
378602ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
378702ff05a9Svsakar 	 * possible, retries the operation.
378802ff05a9Svsakar 	 */
378902ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_MKDIR, retry);
379002ff05a9Svsakar 	if (indeadlock)
379102ff05a9Svsakar 		goto again;
37927c478bd9Sstevel@tonic-gate 
37937c478bd9Sstevel@tonic-gate 	error = ufs_direnter_cm(ip, dirname, DE_MKDIR, vap, &xip, cr,
379480d34432Sfrankho 	    (retry ? IQUIET : 0));
379502ff05a9Svsakar 	if (error == EAGAIN) {
379602ff05a9Svsakar 		if (ulp) {
379702ff05a9Svsakar 			TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_MKDIR,
379880d34432Sfrankho 			    trans_size);
379902ff05a9Svsakar 			ufs_lockfs_end(ulp);
380002ff05a9Svsakar 		}
380102ff05a9Svsakar 		goto again;
380202ff05a9Svsakar 	}
38037c478bd9Sstevel@tonic-gate 
38047c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
38057c478bd9Sstevel@tonic-gate 	if (error == 0) {
38067c478bd9Sstevel@tonic-gate 		ip = xip;
38077c478bd9Sstevel@tonic-gate 		*vpp = ITOV(ip);
38087c478bd9Sstevel@tonic-gate 	} else if (error == EEXIST)
38097c478bd9Sstevel@tonic-gate 		VN_RELE(ITOV(xip));
38107c478bd9Sstevel@tonic-gate 
38117c478bd9Sstevel@tonic-gate 	if (ulp) {
38127c478bd9Sstevel@tonic-gate 		int terr = 0;
38137c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_MKDIR, trans_size);
38147c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
38157c478bd9Sstevel@tonic-gate 		if (error == 0)
38167c478bd9Sstevel@tonic-gate 			error = terr;
38177c478bd9Sstevel@tonic-gate 	}
38187c478bd9Sstevel@tonic-gate out:
38197c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
38207c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
38217c478bd9Sstevel@tonic-gate 		retry = 0;
38227c478bd9Sstevel@tonic-gate 		goto again;
38237c478bd9Sstevel@tonic-gate 	}
38247c478bd9Sstevel@tonic-gate 
38257c478bd9Sstevel@tonic-gate 	return (error);
38267c478bd9Sstevel@tonic-gate }
38277c478bd9Sstevel@tonic-gate 
38287c478bd9Sstevel@tonic-gate /*ARGSUSED*/
38297c478bd9Sstevel@tonic-gate static int
3830da6c28aaSamw ufs_rmdir(struct vnode *vp, char *nm, struct vnode *cdir, struct cred *cr,
3831*80d5689fSPatrick Mooney     caller_context_t *ct, int flags)
38327c478bd9Sstevel@tonic-gate {
38337c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
38347c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
38357c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
38367c478bd9Sstevel@tonic-gate 	vnode_t *rmvp = NULL;	/* Vnode of removed directory */
38377c478bd9Sstevel@tonic-gate 	int error;
38387c478bd9Sstevel@tonic-gate 	int issync;
383902ff05a9Svsakar 	int trans_size;
384002ff05a9Svsakar 	int indeadlock;
38417c478bd9Sstevel@tonic-gate 
38427c478bd9Sstevel@tonic-gate 	/*
38437c478bd9Sstevel@tonic-gate 	 * don't let the delete queue get too long
38447c478bd9Sstevel@tonic-gate 	 */
38457c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
38467c478bd9Sstevel@tonic-gate 		error = EIO;
38477c478bd9Sstevel@tonic-gate 		goto out;
38487c478bd9Sstevel@tonic-gate 	}
38497c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_delete.uq_ne > ufs_idle_max)
38507c478bd9Sstevel@tonic-gate 		ufs_delete_drain(vp->v_vfsp, 1, 1);
38517c478bd9Sstevel@tonic-gate 
38529b5097eeSOwen Roberts 	error = ufs_eventlookup(vp, nm, cr, &rmvp);
38539b5097eeSOwen Roberts 	if (rmvp != NULL) {
38549b5097eeSOwen Roberts 		/* Only send the event if there were no errors */
38559b5097eeSOwen Roberts 		if (error == 0)
38569b5097eeSOwen Roberts 			vnevent_rmdir(rmvp, vp, nm, ct);
38579b5097eeSOwen Roberts 		VN_RELE(rmvp);
38589b5097eeSOwen Roberts 	}
38599b5097eeSOwen Roberts 
386002ff05a9Svsakar retry_rmdir:
38617c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_RMDIR_MASK);
38627c478bd9Sstevel@tonic-gate 	if (error)
38637c478bd9Sstevel@tonic-gate 		goto out;
38647c478bd9Sstevel@tonic-gate 
38657c478bd9Sstevel@tonic-gate 	if (ulp)
386602ff05a9Svsakar 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_RMDIR,
386780d34432Sfrankho 		    trans_size = TOP_RMDIR_SIZE);
38687c478bd9Sstevel@tonic-gate 
386902ff05a9Svsakar 	/*
387002ff05a9Svsakar 	 * ufs_tryirwlock_trans uses rw_tryenter and checks for SLOCK
387102ff05a9Svsakar 	 * to avoid i_rwlock, ufs_lockfs_begin deadlock. If deadlock
387202ff05a9Svsakar 	 * possible, retries the operation.
387302ff05a9Svsakar 	 */
387402ff05a9Svsakar 	ufs_tryirwlock_trans(&ip->i_rwlock, RW_WRITER, TOP_RMDIR, retry);
387502ff05a9Svsakar 	if (indeadlock)
387602ff05a9Svsakar 		goto retry_rmdir;
38779b5097eeSOwen Roberts 	error = ufs_dirremove(ip, nm, (struct inode *)0, cdir, DR_RMDIR, cr);
38789b5097eeSOwen Roberts 
38797c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
38807c478bd9Sstevel@tonic-gate 
38817c478bd9Sstevel@tonic-gate 	if (ulp) {
38827c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, error, issync, TOP_RMDIR,
388380d34432Sfrankho 		    trans_size);
38847c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
38857c478bd9Sstevel@tonic-gate 	}
38867c478bd9Sstevel@tonic-gate 
38877c478bd9Sstevel@tonic-gate out:
38887c478bd9Sstevel@tonic-gate 	return (error);
38897c478bd9Sstevel@tonic-gate }
38907c478bd9Sstevel@tonic-gate 
38917c478bd9Sstevel@tonic-gate /* ARGSUSED */
38927c478bd9Sstevel@tonic-gate static int
3893*80d5689fSPatrick Mooney ufs_readdir(struct vnode *vp, struct uio *uiop, struct cred *cr, int *eofp,
3894*80d5689fSPatrick Mooney     caller_context_t *ct, int flags)
38957c478bd9Sstevel@tonic-gate {
38967c478bd9Sstevel@tonic-gate 	struct iovec *iovp;
38977c478bd9Sstevel@tonic-gate 	struct inode *ip;
38987c478bd9Sstevel@tonic-gate 	struct direct *idp;
38997c478bd9Sstevel@tonic-gate 	struct dirent64 *odp;
39007c478bd9Sstevel@tonic-gate 	struct fbuf *fbp;
39017c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
39027c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
39037c478bd9Sstevel@tonic-gate 	caddr_t outbuf;
39047c478bd9Sstevel@tonic-gate 	size_t bufsize;
39057c478bd9Sstevel@tonic-gate 	uint_t offset;
39067c478bd9Sstevel@tonic-gate 	uint_t bytes_wanted, total_bytes_wanted;
39077c478bd9Sstevel@tonic-gate 	int incount = 0;
39087c478bd9Sstevel@tonic-gate 	int outcount = 0;
39097c478bd9Sstevel@tonic-gate 	int error;
39107c478bd9Sstevel@tonic-gate 
39117c478bd9Sstevel@tonic-gate 	ip = VTOI(vp);
39127c478bd9Sstevel@tonic-gate 	ASSERT(RW_READ_HELD(&ip->i_rwlock));
39137c478bd9Sstevel@tonic-gate 
39147c478bd9Sstevel@tonic-gate 	if (uiop->uio_loffset >= MAXOFF32_T) {
39157c478bd9Sstevel@tonic-gate 		if (eofp)
39167c478bd9Sstevel@tonic-gate 			*eofp = 1;
39177c478bd9Sstevel@tonic-gate 		return (0);
39187c478bd9Sstevel@tonic-gate 	}
39197c478bd9Sstevel@tonic-gate 
39207c478bd9Sstevel@tonic-gate 	/*
39217c478bd9Sstevel@tonic-gate 	 * Check if we have been called with a valid iov_len
39227c478bd9Sstevel@tonic-gate 	 * and bail out if not, otherwise we may potentially loop
39237c478bd9Sstevel@tonic-gate 	 * forever further down.
39247c478bd9Sstevel@tonic-gate 	 */
39257c478bd9Sstevel@tonic-gate 	if (uiop->uio_iov->iov_len <= 0) {
39267c478bd9Sstevel@tonic-gate 		error = EINVAL;
39277c478bd9Sstevel@tonic-gate 		goto out;
39287c478bd9Sstevel@tonic-gate 	}
39297c478bd9Sstevel@tonic-gate 
39307c478bd9Sstevel@tonic-gate 	/*
39317c478bd9Sstevel@tonic-gate 	 * Large Files: When we come here we are guaranteed that
39327c478bd9Sstevel@tonic-gate 	 * uio_offset can be used safely. The high word is zero.
39337c478bd9Sstevel@tonic-gate 	 */
39347c478bd9Sstevel@tonic-gate 
39357c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
39367c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_READDIR_MASK);
39377c478bd9Sstevel@tonic-gate 	if (error)
39387c478bd9Sstevel@tonic-gate 		goto out;
39397c478bd9Sstevel@tonic-gate 
39407c478bd9Sstevel@tonic-gate 	iovp = uiop->uio_iov;
39417c478bd9Sstevel@tonic-gate 	total_bytes_wanted = iovp->iov_len;
39427c478bd9Sstevel@tonic-gate 
39437c478bd9Sstevel@tonic-gate 	/* Large Files: directory files should not be "large" */
39447c478bd9Sstevel@tonic-gate 
39457c478bd9Sstevel@tonic-gate 	ASSERT(ip->i_size <= MAXOFF32_T);
39467c478bd9Sstevel@tonic-gate 
39477c478bd9Sstevel@tonic-gate 	/* Force offset to be valid (to guard against bogus lseek() values) */
39487c478bd9Sstevel@tonic-gate 	offset = (uint_t)uiop->uio_offset & ~(DIRBLKSIZ - 1);
39497c478bd9Sstevel@tonic-gate 
39507c478bd9Sstevel@tonic-gate 	/* Quit if at end of file or link count of zero (posix) */
39517c478bd9Sstevel@tonic-gate 	if (offset >= (uint_t)ip->i_size || ip->i_nlink <= 0) {
39527c478bd9Sstevel@tonic-gate 		if (eofp)
39537c478bd9Sstevel@tonic-gate 			*eofp = 1;
39547c478bd9Sstevel@tonic-gate 		error = 0;
39557c478bd9Sstevel@tonic-gate 		goto unlock;
39567c478bd9Sstevel@tonic-gate 	}
39577c478bd9Sstevel@tonic-gate 
39587c478bd9Sstevel@tonic-gate 	/*
39597c478bd9Sstevel@tonic-gate 	 * Get space to change directory entries into fs independent format.
39607c478bd9Sstevel@tonic-gate 	 * Do fast alloc for the most commonly used-request size (filesystem
39617c478bd9Sstevel@tonic-gate 	 * block size).
39627c478bd9Sstevel@tonic-gate 	 */
39637c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg != UIO_SYSSPACE || uiop->uio_iovcnt != 1) {
39647c478bd9Sstevel@tonic-gate 		bufsize = total_bytes_wanted;
39657c478bd9Sstevel@tonic-gate 		outbuf = kmem_alloc(bufsize, KM_SLEEP);
39667c478bd9Sstevel@tonic-gate 		odp = (struct dirent64 *)outbuf;
39677c478bd9Sstevel@tonic-gate 	} else {
39687c478bd9Sstevel@tonic-gate 		bufsize = total_bytes_wanted;
39697c478bd9Sstevel@tonic-gate 		odp = (struct dirent64 *)iovp->iov_base;
39707c478bd9Sstevel@tonic-gate 	}
39717c478bd9Sstevel@tonic-gate 
39727c478bd9Sstevel@tonic-gate nextblk:
39737c478bd9Sstevel@tonic-gate 	bytes_wanted = total_bytes_wanted;
39747c478bd9Sstevel@tonic-gate 
39757c478bd9Sstevel@tonic-gate 	/* Truncate request to file size */
39767c478bd9Sstevel@tonic-gate 	if (offset + bytes_wanted > (int)ip->i_size)
39777c478bd9Sstevel@tonic-gate 		bytes_wanted = (int)(ip->i_size - offset);
39787c478bd9Sstevel@tonic-gate 
39797c478bd9Sstevel@tonic-gate 	/* Comply with MAXBSIZE boundary restrictions of fbread() */
39807c478bd9Sstevel@tonic-gate 	if ((offset & MAXBOFFSET) + bytes_wanted > MAXBSIZE)
39817c478bd9Sstevel@tonic-gate 		bytes_wanted = MAXBSIZE - (offset & MAXBOFFSET);
39827c478bd9Sstevel@tonic-gate 
39837c478bd9Sstevel@tonic-gate 	/*
39847c478bd9Sstevel@tonic-gate 	 * Read in the next chunk.
39857c478bd9Sstevel@tonic-gate 	 * We are still holding the i_rwlock.
39867c478bd9Sstevel@tonic-gate 	 */
39877c478bd9Sstevel@tonic-gate 	error = fbread(vp, (offset_t)offset, bytes_wanted, S_OTHER, &fbp);
39887c478bd9Sstevel@tonic-gate 
39897c478bd9Sstevel@tonic-gate 	if (error)
39907c478bd9Sstevel@tonic-gate 		goto update_inode;
39917c478bd9Sstevel@tonic-gate 	if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) && (ip->i_fs->fs_ronly == 0) &&
39927c478bd9Sstevel@tonic-gate 	    (!ufsvfsp->vfs_noatime)) {
39937c478bd9Sstevel@tonic-gate 		ip->i_flag |= IACC;
39947c478bd9Sstevel@tonic-gate 	}
39957c478bd9Sstevel@tonic-gate 	incount = 0;
39967c478bd9Sstevel@tonic-gate 	idp = (struct direct *)fbp->fb_addr;
399780d34432Sfrankho 	if (idp->d_ino == 0 && idp->d_reclen == 0 && idp->d_namlen == 0) {
39987c478bd9Sstevel@tonic-gate 		cmn_err(CE_WARN, "ufs_readdir: bad dir, inumber = %llu, "
399980d34432Sfrankho 		    "fs = %s\n",
400080d34432Sfrankho 		    (u_longlong_t)ip->i_number, ufsvfsp->vfs_fs->fs_fsmnt);
40017c478bd9Sstevel@tonic-gate 		fbrelse(fbp, S_OTHER);
40027c478bd9Sstevel@tonic-gate 		error = ENXIO;
40037c478bd9Sstevel@tonic-gate 		goto update_inode;
40047c478bd9Sstevel@tonic-gate 	}
40057c478bd9Sstevel@tonic-gate 	/* Transform to file-system independent format */
40067c478bd9Sstevel@tonic-gate 	while (incount < bytes_wanted) {
40077c478bd9Sstevel@tonic-gate 		/*
40087c478bd9Sstevel@tonic-gate 		 * If the current directory entry is mangled, then skip
40097c478bd9Sstevel@tonic-gate 		 * to the next block.  It would be nice to set the FSBAD
40107c478bd9Sstevel@tonic-gate 		 * flag in the super-block so that a fsck is forced on
40117c478bd9Sstevel@tonic-gate 		 * next reboot, but locking is a problem.
40127c478bd9Sstevel@tonic-gate 		 */
40137c478bd9Sstevel@tonic-gate 		if (idp->d_reclen & 0x3) {
40147c478bd9Sstevel@tonic-gate 			offset = (offset + DIRBLKSIZ) & ~(DIRBLKSIZ-1);
40157c478bd9Sstevel@tonic-gate 			break;
40167c478bd9Sstevel@tonic-gate 		}
40177c478bd9Sstevel@tonic-gate 
40187c478bd9Sstevel@tonic-gate 		/* Skip to requested offset and skip empty entries */
40197c478bd9Sstevel@tonic-gate 		if (idp->d_ino != 0 && offset >= (uint_t)uiop->uio_offset) {
40207c478bd9Sstevel@tonic-gate 			ushort_t this_reclen =
40217c478bd9Sstevel@tonic-gate 			    DIRENT64_RECLEN(idp->d_namlen);
40227c478bd9Sstevel@tonic-gate 			/* Buffer too small for any entries */
40237c478bd9Sstevel@tonic-gate 			if (!outcount && this_reclen > bufsize) {
40247c478bd9Sstevel@tonic-gate 				fbrelse(fbp, S_OTHER);
40257c478bd9Sstevel@tonic-gate 				error = EINVAL;
40267c478bd9Sstevel@tonic-gate 				goto update_inode;
40277c478bd9Sstevel@tonic-gate 			}
40287c478bd9Sstevel@tonic-gate 			/* If would overrun the buffer, quit */
40297c478bd9Sstevel@tonic-gate 			if (outcount + this_reclen > bufsize) {
40307c478bd9Sstevel@tonic-gate 				break;
40317c478bd9Sstevel@tonic-gate 			}
40327c478bd9Sstevel@tonic-gate 			/* Take this entry */
40337c478bd9Sstevel@tonic-gate 			odp->d_ino = (ino64_t)idp->d_ino;
40347c478bd9Sstevel@tonic-gate 			odp->d_reclen = (ushort_t)this_reclen;
40357c478bd9Sstevel@tonic-gate 			odp->d_off = (offset_t)(offset + idp->d_reclen);
40367c478bd9Sstevel@tonic-gate 
40377c478bd9Sstevel@tonic-gate 			/* use strncpy(9f) to zero out uninitialized bytes */
40387c478bd9Sstevel@tonic-gate 
40397c478bd9Sstevel@tonic-gate 			ASSERT(strlen(idp->d_name) + 1 <=
40407c478bd9Sstevel@tonic-gate 			    DIRENT64_NAMELEN(this_reclen));
40417c478bd9Sstevel@tonic-gate 			(void) strncpy(odp->d_name, idp->d_name,
40427c478bd9Sstevel@tonic-gate 			    DIRENT64_NAMELEN(this_reclen));
40437c478bd9Sstevel@tonic-gate 			outcount += odp->d_reclen;
404480d34432Sfrankho 			odp = (struct dirent64 *)
404580d34432Sfrankho 			    ((intptr_t)odp + odp->d_reclen);
40467c478bd9Sstevel@tonic-gate 			ASSERT(outcount <= bufsize);
40477c478bd9Sstevel@tonic-gate 		}
40487c478bd9Sstevel@tonic-gate 		if (idp->d_reclen) {
40497c478bd9Sstevel@tonic-gate 			incount += idp->d_reclen;
40507c478bd9Sstevel@tonic-gate 			offset += idp->d_reclen;
40517c478bd9Sstevel@tonic-gate 			idp = (struct direct *)((intptr_t)idp + idp->d_reclen);
40527c478bd9Sstevel@tonic-gate 		} else {
40537c478bd9Sstevel@tonic-gate 			offset = (offset + DIRBLKSIZ) & ~(DIRBLKSIZ-1);
40547c478bd9Sstevel@tonic-gate 			break;
40557c478bd9Sstevel@tonic-gate 		}
40567c478bd9Sstevel@tonic-gate 	}
40577c478bd9Sstevel@tonic-gate 	/* Release the chunk */
40587c478bd9Sstevel@tonic-gate 	fbrelse(fbp, S_OTHER);
40597c478bd9Sstevel@tonic-gate 
40607c478bd9Sstevel@tonic-gate 	/* Read whole block, but got no entries, read another if not eof */
40617c478bd9Sstevel@tonic-gate 
40627c478bd9Sstevel@tonic-gate 	/*
40637c478bd9Sstevel@tonic-gate 	 * Large Files: casting i_size to int here is not a problem
40647c478bd9Sstevel@tonic-gate 	 * because directory sizes are always less than MAXOFF32_T.
40657c478bd9Sstevel@tonic-gate 	 * See assertion above.
40667c478bd9Sstevel@tonic-gate 	 */
40677c478bd9Sstevel@tonic-gate 
40687c478bd9Sstevel@tonic-gate 	if (offset < (int)ip->i_size && !outcount)
40697c478bd9Sstevel@tonic-gate 		goto nextblk;
40707c478bd9Sstevel@tonic-gate 
40717c478bd9Sstevel@tonic-gate 	/* Copy out the entry data */
40727c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg == UIO_SYSSPACE && uiop->uio_iovcnt == 1) {
40737c478bd9Sstevel@tonic-gate 		iovp->iov_base += outcount;
40747c478bd9Sstevel@tonic-gate 		iovp->iov_len -= outcount;
40757c478bd9Sstevel@tonic-gate 		uiop->uio_resid -= outcount;
40767c478bd9Sstevel@tonic-gate 		uiop->uio_offset = offset;
40777c478bd9Sstevel@tonic-gate 	} else if ((error = uiomove(outbuf, (long)outcount, UIO_READ,
407880d34432Sfrankho 	    uiop)) == 0)
40797c478bd9Sstevel@tonic-gate 		uiop->uio_offset = offset;
40807c478bd9Sstevel@tonic-gate update_inode:
40817c478bd9Sstevel@tonic-gate 	ITIMES(ip);
40827c478bd9Sstevel@tonic-gate 	if (uiop->uio_segflg != UIO_SYSSPACE || uiop->uio_iovcnt != 1)
40837c478bd9Sstevel@tonic-gate 		kmem_free(outbuf, bufsize);
40847c478bd9Sstevel@tonic-gate 
40857c478bd9Sstevel@tonic-gate 	if (eofp && error == 0)
40867c478bd9Sstevel@tonic-gate 		*eofp = (uiop->uio_offset >= (int)ip->i_size);
40877c478bd9Sstevel@tonic-gate unlock:
40887c478bd9Sstevel@tonic-gate 	if (ulp) {
40897c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
40907c478bd9Sstevel@tonic-gate 	}
40917c478bd9Sstevel@tonic-gate out:
40927c478bd9Sstevel@tonic-gate 	return (error);
40937c478bd9Sstevel@tonic-gate }
40947c478bd9Sstevel@tonic-gate 
40957c478bd9Sstevel@tonic-gate /*ARGSUSED*/
40967c478bd9Sstevel@tonic-gate static int
4097*80d5689fSPatrick Mooney ufs_symlink(struct vnode *dvp, char *linkname, struct vattr *vap, char *target,
4098*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct, int flags)
40997c478bd9Sstevel@tonic-gate {
41007c478bd9Sstevel@tonic-gate 	struct inode *ip, *dip = VTOI(dvp);
41017c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = dip->i_ufsvfs;
41027c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
41037c478bd9Sstevel@tonic-gate 	int error;
41047c478bd9Sstevel@tonic-gate 	int issync;
41057c478bd9Sstevel@tonic-gate 	int trans_size;
41067c478bd9Sstevel@tonic-gate 	int residual;
41077c478bd9Sstevel@tonic-gate 	int ioflag;
41087c478bd9Sstevel@tonic-gate 	int retry = 1;
41097c478bd9Sstevel@tonic-gate 
41107c478bd9Sstevel@tonic-gate 	/*
41117c478bd9Sstevel@tonic-gate 	 * No symlinks in attrdirs at this time
41127c478bd9Sstevel@tonic-gate 	 */
41137c478bd9Sstevel@tonic-gate 	if ((VTOI(dvp)->i_mode & IFMT) == IFATTRDIR)
41147c478bd9Sstevel@tonic-gate 		return (EINVAL);
41157c478bd9Sstevel@tonic-gate 
41167c478bd9Sstevel@tonic-gate again:
41177c478bd9Sstevel@tonic-gate 	ip = (struct inode *)NULL;
41187c478bd9Sstevel@tonic-gate 	vap->va_type = VLNK;
41197c478bd9Sstevel@tonic-gate 	vap->va_rdev = 0;
41207c478bd9Sstevel@tonic-gate 
41217c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SYMLINK_MASK);
41227c478bd9Sstevel@tonic-gate 	if (error)
41237c478bd9Sstevel@tonic-gate 		goto out;
41247c478bd9Sstevel@tonic-gate 
41257c478bd9Sstevel@tonic-gate 	if (ulp)
41267c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_CSYNC(ufsvfsp, issync, TOP_SYMLINK,
41277c478bd9Sstevel@tonic-gate 		    trans_size = (int)TOP_SYMLINK_SIZE(dip));
41287c478bd9Sstevel@tonic-gate 
41297c478bd9Sstevel@tonic-gate 	/*
41307c478bd9Sstevel@tonic-gate 	 * We must create the inode before the directory entry, to avoid
41317c478bd9Sstevel@tonic-gate 	 * racing with readlink().  ufs_dirmakeinode requires that we
41327c478bd9Sstevel@tonic-gate 	 * hold the quota lock as reader, and directory locks as writer.
41337c478bd9Sstevel@tonic-gate 	 */
41347c478bd9Sstevel@tonic-gate 
41357c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_rwlock, RW_WRITER);
41367c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
41377c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_contents, RW_WRITER);
41387c478bd9Sstevel@tonic-gate 
41397c478bd9Sstevel@tonic-gate 	/*
41407c478bd9Sstevel@tonic-gate 	 * Suppress any out of inodes messages if we will retry on
41417c478bd9Sstevel@tonic-gate 	 * ENOSP
41427c478bd9Sstevel@tonic-gate 	 */
41437c478bd9Sstevel@tonic-gate 	if (retry)
41447c478bd9Sstevel@tonic-gate 		dip->i_flag |= IQUIET;
41457c478bd9Sstevel@tonic-gate 
41467c478bd9Sstevel@tonic-gate 	error = ufs_dirmakeinode(dip, &ip, vap, DE_SYMLINK, cr);
41477c478bd9Sstevel@tonic-gate 
41487c478bd9Sstevel@tonic-gate 	dip->i_flag &= ~IQUIET;
41497c478bd9Sstevel@tonic-gate 
41507c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_contents);
41517c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
41527c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_rwlock);
41537c478bd9Sstevel@tonic-gate 
41547c478bd9Sstevel@tonic-gate 	if (error)
41557c478bd9Sstevel@tonic-gate 		goto unlock;
41567c478bd9Sstevel@tonic-gate 
41577c478bd9Sstevel@tonic-gate 	/*
41587c478bd9Sstevel@tonic-gate 	 * OK.  The inode has been created.  Write out the data of the
41597c478bd9Sstevel@tonic-gate 	 * symbolic link.  Since symbolic links are metadata, and should
41607c478bd9Sstevel@tonic-gate 	 * remain consistent across a system crash, we need to force the
41617c478bd9Sstevel@tonic-gate 	 * data out synchronously.
41627c478bd9Sstevel@tonic-gate 	 *
41637c478bd9Sstevel@tonic-gate 	 * (This is a change from the semantics in earlier releases, which
41647c478bd9Sstevel@tonic-gate 	 * only created symbolic links synchronously if the semi-documented
41657c478bd9Sstevel@tonic-gate 	 * 'syncdir' option was set, or if we were being invoked by the NFS
41667c478bd9Sstevel@tonic-gate 	 * server, which requires symbolic links to be created synchronously.)
41677c478bd9Sstevel@tonic-gate 	 *
41687c478bd9Sstevel@tonic-gate 	 * We need to pass in a pointer for the residual length; otherwise
41697c478bd9Sstevel@tonic-gate 	 * ufs_rdwri() will always return EIO if it can't write the data,
41707c478bd9Sstevel@tonic-gate 	 * even if the error was really ENOSPC or EDQUOT.
41717c478bd9Sstevel@tonic-gate 	 */
41727c478bd9Sstevel@tonic-gate 
41737c478bd9Sstevel@tonic-gate 	ioflag = FWRITE | FDSYNC;
41747c478bd9Sstevel@tonic-gate 	residual = 0;
41757c478bd9Sstevel@tonic-gate 
41767c478bd9Sstevel@tonic-gate 	rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
41777c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
41787c478bd9Sstevel@tonic-gate 
41797c478bd9Sstevel@tonic-gate 	/*
41807c478bd9Sstevel@tonic-gate 	 * Suppress file system full messages if we will retry
41817c478bd9Sstevel@tonic-gate 	 */
41827c478bd9Sstevel@tonic-gate 	if (retry)
41837c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
41847c478bd9Sstevel@tonic-gate 
41857c478bd9Sstevel@tonic-gate 	error = ufs_rdwri(UIO_WRITE, ioflag, ip, target, strlen(target),
41867c478bd9Sstevel@tonic-gate 	    (offset_t)0, UIO_SYSSPACE, &residual, cr);
41877c478bd9Sstevel@tonic-gate 
41887c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
41897c478bd9Sstevel@tonic-gate 
41907c478bd9Sstevel@tonic-gate 	if (error) {
41917c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
41927c478bd9Sstevel@tonic-gate 		rw_exit(&ufsvfsp->vfs_dqrwlock);
41937c478bd9Sstevel@tonic-gate 		goto remove;
41947c478bd9Sstevel@tonic-gate 	}
41957c478bd9Sstevel@tonic-gate 
41967c478bd9Sstevel@tonic-gate 	/*
41977c478bd9Sstevel@tonic-gate 	 * If the link's data is small enough, we can cache it in the inode.
41987c478bd9Sstevel@tonic-gate 	 * This is a "fast symbolic link".  We don't use the first direct
41997c478bd9Sstevel@tonic-gate 	 * block because that's actually used to point at the symbolic link's
42007c478bd9Sstevel@tonic-gate 	 * contents on disk; but we know that none of the other direct or
42017c478bd9Sstevel@tonic-gate 	 * indirect blocks can be used because symbolic links are restricted
42027c478bd9Sstevel@tonic-gate 	 * to be smaller than a file system block.
42037c478bd9Sstevel@tonic-gate 	 */
42047c478bd9Sstevel@tonic-gate 
42057c478bd9Sstevel@tonic-gate 	ASSERT(MAXPATHLEN <= VBSIZE(ITOV(ip)));
42067c478bd9Sstevel@tonic-gate 
42077c478bd9Sstevel@tonic-gate 	if (ip->i_size > 0 && ip->i_size <= FSL_SIZE) {
42087c478bd9Sstevel@tonic-gate 		if (kcopy(target, &ip->i_db[1], ip->i_size) == 0) {
42097c478bd9Sstevel@tonic-gate 			ip->i_flag |= IFASTSYMLNK;
42107c478bd9Sstevel@tonic-gate 		} else {
42117c478bd9Sstevel@tonic-gate 			int i;
42127c478bd9Sstevel@tonic-gate 			/* error, clear garbage left behind */
42137c478bd9Sstevel@tonic-gate 			for (i = 1; i < NDADDR; i++)
42147c478bd9Sstevel@tonic-gate 				ip->i_db[i] = 0;
42157c478bd9Sstevel@tonic-gate 			for (i = 0; i < NIADDR; i++)
42167c478bd9Sstevel@tonic-gate 				ip->i_ib[i] = 0;
42177c478bd9Sstevel@tonic-gate 		}
42187c478bd9Sstevel@tonic-gate 	}
42197c478bd9Sstevel@tonic-gate 
42207c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
42217c478bd9Sstevel@tonic-gate 	rw_exit(&ufsvfsp->vfs_dqrwlock);
42227c478bd9Sstevel@tonic-gate 
42237c478bd9Sstevel@tonic-gate 	/*
42247c478bd9Sstevel@tonic-gate 	 * OK.  We've successfully created the symbolic link.  All that
42257c478bd9Sstevel@tonic-gate 	 * remains is to insert it into the appropriate directory.
42267c478bd9Sstevel@tonic-gate 	 */
42277c478bd9Sstevel@tonic-gate 
42287c478bd9Sstevel@tonic-gate 	rw_enter(&dip->i_rwlock, RW_WRITER);
42299b5097eeSOwen Roberts 	error = ufs_direnter_lr(dip, linkname, DE_SYMLINK, NULL, ip, cr);
42307c478bd9Sstevel@tonic-gate 	rw_exit(&dip->i_rwlock);
42317c478bd9Sstevel@tonic-gate 
42327c478bd9Sstevel@tonic-gate 	/*
42337c478bd9Sstevel@tonic-gate 	 * Fall through into remove-on-error code.  We're either done, or we
42347c478bd9Sstevel@tonic-gate 	 * need to remove the inode (if we couldn't insert it).
42357c478bd9Sstevel@tonic-gate 	 */
42367c478bd9Sstevel@tonic-gate 
42377c478bd9Sstevel@tonic-gate remove:
42387c478bd9Sstevel@tonic-gate 	if (error && (ip != NULL)) {
42397c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_WRITER);
42407c478bd9Sstevel@tonic-gate 		ip->i_nlink--;
42417c478bd9Sstevel@tonic-gate 		ip->i_flag |= ICHG;
42427c478bd9Sstevel@tonic-gate 		ip->i_seq++;
42437c478bd9Sstevel@tonic-gate 		ufs_setreclaim(ip);
42447c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
42457c478bd9Sstevel@tonic-gate 	}
42467c478bd9Sstevel@tonic-gate 
42477c478bd9Sstevel@tonic-gate unlock:
42487c478bd9Sstevel@tonic-gate 	if (ip != NULL)
42497c478bd9Sstevel@tonic-gate 		VN_RELE(ITOV(ip));
42507c478bd9Sstevel@tonic-gate 
42517c478bd9Sstevel@tonic-gate 	if (ulp) {
42527c478bd9Sstevel@tonic-gate 		int terr = 0;
42537c478bd9Sstevel@tonic-gate 
42547c478bd9Sstevel@tonic-gate 		TRANS_END_CSYNC(ufsvfsp, terr, issync, TOP_SYMLINK,
425580d34432Sfrankho 		    trans_size);
42567c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
42577c478bd9Sstevel@tonic-gate 		if (error == 0)
42587c478bd9Sstevel@tonic-gate 			error = terr;
42597c478bd9Sstevel@tonic-gate 	}
42607c478bd9Sstevel@tonic-gate 
42617c478bd9Sstevel@tonic-gate 	/*
42627c478bd9Sstevel@tonic-gate 	 * We may have failed due to lack of an inode or of a block to
42637c478bd9Sstevel@tonic-gate 	 * store the target in.  Try flushing the delete queue to free
42647c478bd9Sstevel@tonic-gate 	 * logically-available things up and try again.
42657c478bd9Sstevel@tonic-gate 	 */
42667c478bd9Sstevel@tonic-gate 	if ((error == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
42677c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
42687c478bd9Sstevel@tonic-gate 		retry = 0;
42697c478bd9Sstevel@tonic-gate 		goto again;
42707c478bd9Sstevel@tonic-gate 	}
42717c478bd9Sstevel@tonic-gate 
42727c478bd9Sstevel@tonic-gate out:
42737c478bd9Sstevel@tonic-gate 	return (error);
42747c478bd9Sstevel@tonic-gate }
42757c478bd9Sstevel@tonic-gate 
42767c478bd9Sstevel@tonic-gate /*
42777c478bd9Sstevel@tonic-gate  * Ufs specific routine used to do ufs io.
42787c478bd9Sstevel@tonic-gate  */
42797c478bd9Sstevel@tonic-gate int
42807c478bd9Sstevel@tonic-gate ufs_rdwri(enum uio_rw rw, int ioflag, struct inode *ip, caddr_t base,
4281*80d5689fSPatrick Mooney     ssize_t len, offset_t offset, enum uio_seg seg, int *aresid,
4282*80d5689fSPatrick Mooney     struct cred *cr)
42837c478bd9Sstevel@tonic-gate {
42847c478bd9Sstevel@tonic-gate 	struct uio auio;
42857c478bd9Sstevel@tonic-gate 	struct iovec aiov;
42867c478bd9Sstevel@tonic-gate 	int error;
42877c478bd9Sstevel@tonic-gate 
42887c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
42897c478bd9Sstevel@tonic-gate 
42907c478bd9Sstevel@tonic-gate 	bzero((caddr_t)&auio, sizeof (uio_t));
42917c478bd9Sstevel@tonic-gate 	bzero((caddr_t)&aiov, sizeof (iovec_t));
42927c478bd9Sstevel@tonic-gate 
42937c478bd9Sstevel@tonic-gate 	aiov.iov_base = base;
42947c478bd9Sstevel@tonic-gate 	aiov.iov_len = len;
42957c478bd9Sstevel@tonic-gate 	auio.uio_iov = &aiov;
42967c478bd9Sstevel@tonic-gate 	auio.uio_iovcnt = 1;
42977c478bd9Sstevel@tonic-gate 	auio.uio_loffset = offset;
42987c478bd9Sstevel@tonic-gate 	auio.uio_segflg = (short)seg;
42997c478bd9Sstevel@tonic-gate 	auio.uio_resid = len;
43007c478bd9Sstevel@tonic-gate 
43017c478bd9Sstevel@tonic-gate 	if (rw == UIO_WRITE) {
43027c478bd9Sstevel@tonic-gate 		auio.uio_fmode = FWRITE;
43037c478bd9Sstevel@tonic-gate 		auio.uio_extflg = UIO_COPY_DEFAULT;
43047c478bd9Sstevel@tonic-gate 		auio.uio_llimit = curproc->p_fsz_ctl;
43057c478bd9Sstevel@tonic-gate 		error = wrip(ip, &auio, ioflag, cr);
43067c478bd9Sstevel@tonic-gate 	} else {
43077c478bd9Sstevel@tonic-gate 		auio.uio_fmode = FREAD;
43087c478bd9Sstevel@tonic-gate 		auio.uio_extflg = UIO_COPY_CACHED;
43097c478bd9Sstevel@tonic-gate 		auio.uio_llimit = MAXOFFSET_T;
43107c478bd9Sstevel@tonic-gate 		error = rdip(ip, &auio, ioflag, cr);
43117c478bd9Sstevel@tonic-gate 	}
43127c478bd9Sstevel@tonic-gate 
43137c478bd9Sstevel@tonic-gate 	if (aresid) {
43147c478bd9Sstevel@tonic-gate 		*aresid = auio.uio_resid;
43157c478bd9Sstevel@tonic-gate 	} else if (auio.uio_resid) {
43167c478bd9Sstevel@tonic-gate 		error = EIO;
43177c478bd9Sstevel@tonic-gate 	}
43187c478bd9Sstevel@tonic-gate 	return (error);
43197c478bd9Sstevel@tonic-gate }
43207c478bd9Sstevel@tonic-gate 
4321da6c28aaSamw /*ARGSUSED*/
43227c478bd9Sstevel@tonic-gate static int
4323da6c28aaSamw ufs_fid(struct vnode *vp, struct fid *fidp, caller_context_t *ct)
43247c478bd9Sstevel@tonic-gate {
43257c478bd9Sstevel@tonic-gate 	struct ufid *ufid;
43267c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
43277c478bd9Sstevel@tonic-gate 
43287c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
43297c478bd9Sstevel@tonic-gate 		return (EIO);
43307c478bd9Sstevel@tonic-gate 
43317c478bd9Sstevel@tonic-gate 	if (fidp->fid_len < (sizeof (struct ufid) - sizeof (ushort_t))) {
43327c478bd9Sstevel@tonic-gate 		fidp->fid_len = sizeof (struct ufid) - sizeof (ushort_t);
43337c478bd9Sstevel@tonic-gate 		return (ENOSPC);
43347c478bd9Sstevel@tonic-gate 	}
43357c478bd9Sstevel@tonic-gate 
43367c478bd9Sstevel@tonic-gate 	ufid = (struct ufid *)fidp;
43377c478bd9Sstevel@tonic-gate 	bzero((char *)ufid, sizeof (struct ufid));
43387c478bd9Sstevel@tonic-gate 	ufid->ufid_len = sizeof (struct ufid) - sizeof (ushort_t);
43397c478bd9Sstevel@tonic-gate 	ufid->ufid_ino = ip->i_number;
43407c478bd9Sstevel@tonic-gate 	ufid->ufid_gen = ip->i_gen;
43417c478bd9Sstevel@tonic-gate 
43427c478bd9Sstevel@tonic-gate 	return (0);
43437c478bd9Sstevel@tonic-gate }
43447c478bd9Sstevel@tonic-gate 
43457c478bd9Sstevel@tonic-gate /* ARGSUSED2 */
43467c478bd9Sstevel@tonic-gate static int
43477c478bd9Sstevel@tonic-gate ufs_rwlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
43487c478bd9Sstevel@tonic-gate {
43497c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
43507c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp;
43517c478bd9Sstevel@tonic-gate 	int		forcedirectio;
43527c478bd9Sstevel@tonic-gate 
43537c478bd9Sstevel@tonic-gate 	/*
43547c478bd9Sstevel@tonic-gate 	 * Read case is easy.
43557c478bd9Sstevel@tonic-gate 	 */
43567c478bd9Sstevel@tonic-gate 	if (!write_lock) {
43577c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
43587c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_FALSE);
43597c478bd9Sstevel@tonic-gate 	}
43607c478bd9Sstevel@tonic-gate 
43617c478bd9Sstevel@tonic-gate 	/*
43627c478bd9Sstevel@tonic-gate 	 * Caller has requested a writer lock, but that inhibits any
43637c478bd9Sstevel@tonic-gate 	 * concurrency in the VOPs that follow. Acquire the lock shared
43647c478bd9Sstevel@tonic-gate 	 * and defer exclusive access until it is known to be needed in
43657c478bd9Sstevel@tonic-gate 	 * other VOP handlers. Some cases can be determined here.
43667c478bd9Sstevel@tonic-gate 	 */
43677c478bd9Sstevel@tonic-gate 
43687c478bd9Sstevel@tonic-gate 	/*
43697c478bd9Sstevel@tonic-gate 	 * If directio is not set, there is no chance of concurrency,
43707c478bd9Sstevel@tonic-gate 	 * so just acquire the lock exclusive. Beware of a forced
43717c478bd9Sstevel@tonic-gate 	 * unmount before looking at the mount option.
43727c478bd9Sstevel@tonic-gate 	 */
43737c478bd9Sstevel@tonic-gate 	ufsvfsp = ip->i_ufsvfs;
43747c478bd9Sstevel@tonic-gate 	forcedirectio = ufsvfsp ? ufsvfsp->vfs_forcedirectio : 0;
43757c478bd9Sstevel@tonic-gate 	if (!(ip->i_flag & IDIRECTIO || forcedirectio) ||
43767c478bd9Sstevel@tonic-gate 	    !ufs_allow_shared_writes) {
43777c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43787c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43797c478bd9Sstevel@tonic-gate 	}
43807c478bd9Sstevel@tonic-gate 
43817c478bd9Sstevel@tonic-gate 	/*
43827c478bd9Sstevel@tonic-gate 	 * Mandatory locking forces acquiring i_rwlock exclusive.
43837c478bd9Sstevel@tonic-gate 	 */
43847c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
43857c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43867c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43877c478bd9Sstevel@tonic-gate 	}
43887c478bd9Sstevel@tonic-gate 
43897c478bd9Sstevel@tonic-gate 	/*
43907c478bd9Sstevel@tonic-gate 	 * Acquire the lock shared in case a concurrent write follows.
43917c478bd9Sstevel@tonic-gate 	 * Mandatory locking could have become enabled before the lock
43927c478bd9Sstevel@tonic-gate 	 * was acquired. Re-check and upgrade if needed.
43937c478bd9Sstevel@tonic-gate 	 */
43947c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_rwlock, RW_READER);
43957c478bd9Sstevel@tonic-gate 	if (MANDLOCK(vp, ip->i_mode)) {
43967c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
43977c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
43987c478bd9Sstevel@tonic-gate 		return (V_WRITELOCK_TRUE);
43997c478bd9Sstevel@tonic-gate 	}
44007c478bd9Sstevel@tonic-gate 	return (V_WRITELOCK_FALSE);
44017c478bd9Sstevel@tonic-gate }
44027c478bd9Sstevel@tonic-gate 
44037c478bd9Sstevel@tonic-gate /*ARGSUSED*/
44047c478bd9Sstevel@tonic-gate static void
44057c478bd9Sstevel@tonic-gate ufs_rwunlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
44067c478bd9Sstevel@tonic-gate {
44077c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
44087c478bd9Sstevel@tonic-gate 
44097c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_rwlock);
44107c478bd9Sstevel@tonic-gate }
44117c478bd9Sstevel@tonic-gate 
44127c478bd9Sstevel@tonic-gate /* ARGSUSED */
44137c478bd9Sstevel@tonic-gate static int
4414*80d5689fSPatrick Mooney ufs_seek(struct vnode *vp, offset_t ooff, offset_t *noffp, caller_context_t *ct)
44157c478bd9Sstevel@tonic-gate {
44167c478bd9Sstevel@tonic-gate 	return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
44177c478bd9Sstevel@tonic-gate }
44187c478bd9Sstevel@tonic-gate 
44197c478bd9Sstevel@tonic-gate /* ARGSUSED */
44207c478bd9Sstevel@tonic-gate static int
44217c478bd9Sstevel@tonic-gate ufs_frlock(struct vnode *vp, int cmd, struct flock64 *bfp, int flag,
4422*80d5689fSPatrick Mooney     offset_t offset, struct flk_callback *flk_cbp, struct cred *cr,
4423*80d5689fSPatrick Mooney     caller_context_t *ct)
44247c478bd9Sstevel@tonic-gate {
44257c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
44267c478bd9Sstevel@tonic-gate 
44277c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
44287c478bd9Sstevel@tonic-gate 		return (EIO);
44297c478bd9Sstevel@tonic-gate 
44307c478bd9Sstevel@tonic-gate 	/*
44317c478bd9Sstevel@tonic-gate 	 * If file is being mapped, disallow frlock.
44327c478bd9Sstevel@tonic-gate 	 * XXX I am not holding tlock while checking i_mapcnt because the
44337c478bd9Sstevel@tonic-gate 	 * current locking strategy drops all locks before calling fs_frlock.
44347c478bd9Sstevel@tonic-gate 	 * So, mapcnt could change before we enter fs_frlock making is
44357c478bd9Sstevel@tonic-gate 	 * meaningless to have held tlock in the first place.
44367c478bd9Sstevel@tonic-gate 	 */
44377c478bd9Sstevel@tonic-gate 	if (ip->i_mapcnt > 0 && MANDLOCK(vp, ip->i_mode))
44387c478bd9Sstevel@tonic-gate 		return (EAGAIN);
4439da6c28aaSamw 	return (fs_frlock(vp, cmd, bfp, flag, offset, flk_cbp, cr, ct));
44407c478bd9Sstevel@tonic-gate }
44417c478bd9Sstevel@tonic-gate 
44427c478bd9Sstevel@tonic-gate /* ARGSUSED */
44437c478bd9Sstevel@tonic-gate static int
4444303bf60bSsdebnath ufs_space(struct vnode *vp, int cmd, struct flock64 *bfp, int flag,
4445*80d5689fSPatrick Mooney     offset_t offset, cred_t *cr, caller_context_t *ct)
44467c478bd9Sstevel@tonic-gate {
4447303bf60bSsdebnath 	struct ufsvfs *ufsvfsp = VTOI(vp)->i_ufsvfs;
44487c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
44497c478bd9Sstevel@tonic-gate 	int error;
44507c478bd9Sstevel@tonic-gate 
4451303bf60bSsdebnath 	if ((error = convoff(vp, bfp, 0, offset)) == 0) {
4452303bf60bSsdebnath 		if (cmd == F_FREESP) {
4453303bf60bSsdebnath 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
4454303bf60bSsdebnath 			    ULOCKFS_SPACE_MASK);
4455303bf60bSsdebnath 			if (error)
4456303bf60bSsdebnath 				return (error);
4457303bf60bSsdebnath 			error = ufs_freesp(vp, bfp, flag, cr);
445872102e74SBryan Cantrill 
445972102e74SBryan Cantrill 			if (error == 0 && bfp->l_start == 0)
446072102e74SBryan Cantrill 				vnevent_truncate(vp, ct);
4461303bf60bSsdebnath 		} else if (cmd == F_ALLOCSP) {
4462303bf60bSsdebnath 			error = ufs_lockfs_begin(ufsvfsp, &ulp,
4463303bf60bSsdebnath 			    ULOCKFS_FALLOCATE_MASK);
4464303bf60bSsdebnath 			if (error)
4465303bf60bSsdebnath 				return (error);
4466303bf60bSsdebnath 			error = ufs_allocsp(vp, bfp, cr);
4467303bf60bSsdebnath 		} else
4468303bf60bSsdebnath 			return (EINVAL); /* Command not handled here */
44697c478bd9Sstevel@tonic-gate 
4470303bf60bSsdebnath 		if (ulp)
4471303bf60bSsdebnath 			ufs_lockfs_end(ulp);
44727c478bd9Sstevel@tonic-gate 
4473303bf60bSsdebnath 	}
44747c478bd9Sstevel@tonic-gate 	return (error);
44757c478bd9Sstevel@tonic-gate }
44767c478bd9Sstevel@tonic-gate 
44777c478bd9Sstevel@tonic-gate /*
44787c478bd9Sstevel@tonic-gate  * Used to determine if read ahead should be done. Also used to
44797c478bd9Sstevel@tonic-gate  * to determine when write back occurs.
44807c478bd9Sstevel@tonic-gate  */
44817c478bd9Sstevel@tonic-gate #define	CLUSTSZ(ip)		((ip)->i_ufsvfs->vfs_ioclustsz)
44827c478bd9Sstevel@tonic-gate 
44837c478bd9Sstevel@tonic-gate /*
44847c478bd9Sstevel@tonic-gate  * A faster version of ufs_getpage.
44857c478bd9Sstevel@tonic-gate  *
44867c478bd9Sstevel@tonic-gate  * We optimize by inlining the pvn_getpages iterator, eliminating
44877c478bd9Sstevel@tonic-gate  * calls to bmap_read if file doesn't have UFS holes, and avoiding
44887c478bd9Sstevel@tonic-gate  * the overhead of page_exists().
44897c478bd9Sstevel@tonic-gate  *
44907c478bd9Sstevel@tonic-gate  * When files has UFS_HOLES and ufs_getpage is called with S_READ,
44917c478bd9Sstevel@tonic-gate  * we set *protp to PROT_READ to avoid calling bmap_read. This approach
44927c478bd9Sstevel@tonic-gate  * victimizes performance when a file with UFS holes is faulted
44937c478bd9Sstevel@tonic-gate  * first in the S_READ mode, and then in the S_WRITE mode. We will get
44947c478bd9Sstevel@tonic-gate  * two MMU faults in this case.
44957c478bd9Sstevel@tonic-gate  *
44967c478bd9Sstevel@tonic-gate  * XXX - the inode fields which control the sequential mode are not
44977c478bd9Sstevel@tonic-gate  *	 protected by any mutex. The read ahead will act wild if
44987c478bd9Sstevel@tonic-gate  *	 multiple processes will access the file concurrently and
44997c478bd9Sstevel@tonic-gate  *	 some of them in sequential mode. One particulary bad case
45007c478bd9Sstevel@tonic-gate  *	 is if another thread will change the value of i_nextrio between
45017c478bd9Sstevel@tonic-gate  *	 the time this thread tests the i_nextrio value and then reads it
45027c478bd9Sstevel@tonic-gate  *	 again to use it as the offset for the read ahead.
45037c478bd9Sstevel@tonic-gate  */
4504da6c28aaSamw /*ARGSUSED*/
45057c478bd9Sstevel@tonic-gate static int
45067c478bd9Sstevel@tonic-gate ufs_getpage(struct vnode *vp, offset_t off, size_t len, uint_t *protp,
4507*80d5689fSPatrick Mooney     page_t *plarr[], size_t plsz, struct seg *seg, caddr_t addr,
4508*80d5689fSPatrick Mooney     enum seg_rw rw, struct cred *cr, caller_context_t *ct)
45097c478bd9Sstevel@tonic-gate {
45107c478bd9Sstevel@tonic-gate 	u_offset_t	uoff = (u_offset_t)off; /* type conversion */
45117c478bd9Sstevel@tonic-gate 	u_offset_t	pgoff;
45127c478bd9Sstevel@tonic-gate 	u_offset_t	eoff;
45137c478bd9Sstevel@tonic-gate 	struct inode 	*ip = VTOI(vp);
45147c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = ip->i_ufsvfs;
45157c478bd9Sstevel@tonic-gate 	struct fs 	*fs;
45167c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
45177c478bd9Sstevel@tonic-gate 	page_t		**pl;
45187c478bd9Sstevel@tonic-gate 	caddr_t		pgaddr;
45197c478bd9Sstevel@tonic-gate 	krw_t		rwtype;
45207c478bd9Sstevel@tonic-gate 	int 		err;
45217c478bd9Sstevel@tonic-gate 	int		has_holes;
45227c478bd9Sstevel@tonic-gate 	int		beyond_eof;
45237c478bd9Sstevel@tonic-gate 	int		seqmode;
45247c478bd9Sstevel@tonic-gate 	int		pgsize = PAGESIZE;
45257c478bd9Sstevel@tonic-gate 	int		dolock;
45267c478bd9Sstevel@tonic-gate 	int		do_qlock;
45277c478bd9Sstevel@tonic-gate 	int		trans_size;
45287c478bd9Sstevel@tonic-gate 
45297c478bd9Sstevel@tonic-gate 	ASSERT((uoff & PAGEOFFSET) == 0);
45307c478bd9Sstevel@tonic-gate 
45317c478bd9Sstevel@tonic-gate 	if (protp)
45327c478bd9Sstevel@tonic-gate 		*protp = PROT_ALL;
45337c478bd9Sstevel@tonic-gate 
45347c478bd9Sstevel@tonic-gate 	/*
45357c478bd9Sstevel@tonic-gate 	 * Obey the lockfs protocol
45367c478bd9Sstevel@tonic-gate 	 */
45377c478bd9Sstevel@tonic-gate 	err = ufs_lockfs_begin_getpage(ufsvfsp, &ulp, seg,
453880d34432Sfrankho 	    rw == S_READ || rw == S_EXEC, protp);
45397c478bd9Sstevel@tonic-gate 	if (err)
45407c478bd9Sstevel@tonic-gate 		goto out;
45417c478bd9Sstevel@tonic-gate 
45427c478bd9Sstevel@tonic-gate 	fs = ufsvfsp->vfs_fs;
45437c478bd9Sstevel@tonic-gate 
45447c478bd9Sstevel@tonic-gate 	if (ulp && (rw == S_CREATE || rw == S_WRITE) &&
45457c478bd9Sstevel@tonic-gate 	    !(vp->v_flag & VISSWAP)) {
45467c478bd9Sstevel@tonic-gate 		/*
45477c478bd9Sstevel@tonic-gate 		 * Try to start a transaction, will return if blocking is
45487c478bd9Sstevel@tonic-gate 		 * expected to occur and the address space is not the
45497c478bd9Sstevel@tonic-gate 		 * kernel address space.
45507c478bd9Sstevel@tonic-gate 		 */
45517c478bd9Sstevel@tonic-gate 		trans_size = TOP_GETPAGE_SIZE(ip);
45527c478bd9Sstevel@tonic-gate 		if (seg->s_as != &kas) {
45537c478bd9Sstevel@tonic-gate 			TRANS_TRY_BEGIN_ASYNC(ufsvfsp, TOP_GETPAGE,
455480d34432Sfrankho 			    trans_size, err)
45557c478bd9Sstevel@tonic-gate 			if (err == EWOULDBLOCK) {
45567c478bd9Sstevel@tonic-gate 				/*
45577c478bd9Sstevel@tonic-gate 				 * Use EDEADLK here because the VM code
45587c478bd9Sstevel@tonic-gate 				 * can normally never see this error.
45597c478bd9Sstevel@tonic-gate 				 */
45607c478bd9Sstevel@tonic-gate 				err = EDEADLK;
45617c478bd9Sstevel@tonic-gate 				ufs_lockfs_end(ulp);
45627c478bd9Sstevel@tonic-gate 				goto out;
45637c478bd9Sstevel@tonic-gate 			}
45647c478bd9Sstevel@tonic-gate 		} else {
45657c478bd9Sstevel@tonic-gate 			TRANS_BEGIN_ASYNC(ufsvfsp, TOP_GETPAGE, trans_size);
45667c478bd9Sstevel@tonic-gate 		}
45677c478bd9Sstevel@tonic-gate 	}
45687c478bd9Sstevel@tonic-gate 
45697c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
45707c478bd9Sstevel@tonic-gate 		err = ENOSYS;
45717c478bd9Sstevel@tonic-gate 		goto unlock;
45727c478bd9Sstevel@tonic-gate 	}
45737c478bd9Sstevel@tonic-gate 
45747c478bd9Sstevel@tonic-gate 	seqmode = ip->i_nextr == uoff && rw != S_CREATE;
45757c478bd9Sstevel@tonic-gate 
45767c478bd9Sstevel@tonic-gate 	rwtype = RW_READER;		/* start as a reader */
45777c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
45787c478bd9Sstevel@tonic-gate 	/*
45797c478bd9Sstevel@tonic-gate 	 * If this thread owns the lock, i.e., this thread grabbed it
45807c478bd9Sstevel@tonic-gate 	 * as writer somewhere above, then we don't need to grab the
45817c478bd9Sstevel@tonic-gate 	 * lock as reader in this routine.
45827c478bd9Sstevel@tonic-gate 	 */
45837c478bd9Sstevel@tonic-gate 	do_qlock = (rw_owner(&ufsvfsp->vfs_dqrwlock) != curthread);
45847c478bd9Sstevel@tonic-gate 
45857c478bd9Sstevel@tonic-gate retrylock:
45867c478bd9Sstevel@tonic-gate 	if (dolock) {
45877c478bd9Sstevel@tonic-gate 		/*
45887c478bd9Sstevel@tonic-gate 		 * Grab the quota lock if we need to call
45897c478bd9Sstevel@tonic-gate 		 * bmap_write() below (with i_contents as writer).
45907c478bd9Sstevel@tonic-gate 		 */
45917c478bd9Sstevel@tonic-gate 		if (do_qlock && rwtype == RW_WRITER)
45927c478bd9Sstevel@tonic-gate 			rw_enter(&ufsvfsp->vfs_dqrwlock, RW_READER);
45937c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, rwtype);
45947c478bd9Sstevel@tonic-gate 	}
45957c478bd9Sstevel@tonic-gate 
45967c478bd9Sstevel@tonic-gate 	/*
45977c478bd9Sstevel@tonic-gate 	 * We may be getting called as a side effect of a bmap using
45987c478bd9Sstevel@tonic-gate 	 * fbread() when the blocks might be being allocated and the
45997c478bd9Sstevel@tonic-gate 	 * size has not yet been up'ed.  In this case we want to be
46007c478bd9Sstevel@tonic-gate 	 * able to return zero pages if we get back UFS_HOLE from
46017c478bd9Sstevel@tonic-gate 	 * calling bmap for a non write case here.  We also might have
46027c478bd9Sstevel@tonic-gate 	 * to read some frags from the disk into a page if we are
46037c478bd9Sstevel@tonic-gate 	 * extending the number of frags for a given lbn in bmap().
46047c478bd9Sstevel@tonic-gate 	 * Large Files: The read of i_size here is atomic because
46057c478bd9Sstevel@tonic-gate 	 * i_contents is held here. If dolock is zero, the lock
46067c478bd9Sstevel@tonic-gate 	 * is held in bmap routines.
46077c478bd9Sstevel@tonic-gate 	 */
4608120107ddSmc 	beyond_eof = uoff + len >
4609bcfec3c7Smc 	    P2ROUNDUP_TYPED(ip->i_size, PAGESIZE, u_offset_t);
46107c478bd9Sstevel@tonic-gate 	if (beyond_eof && seg != segkmap) {
46117c478bd9Sstevel@tonic-gate 		if (dolock) {
46127c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
46137c478bd9Sstevel@tonic-gate 			if (do_qlock && rwtype == RW_WRITER)
46147c478bd9Sstevel@tonic-gate 				rw_exit(&ufsvfsp->vfs_dqrwlock);
46157c478bd9Sstevel@tonic-gate 		}
46167c478bd9Sstevel@tonic-gate 		err = EFAULT;
46177c478bd9Sstevel@tonic-gate 		goto unlock;
46187c478bd9Sstevel@tonic-gate 	}
46197c478bd9Sstevel@tonic-gate 
46207c478bd9Sstevel@tonic-gate 	/*
46217c478bd9Sstevel@tonic-gate 	 * Must hold i_contents lock throughout the call to pvn_getpages
46227c478bd9Sstevel@tonic-gate 	 * since locked pages are returned from each call to ufs_getapage.
46237c478bd9Sstevel@tonic-gate 	 * Must *not* return locked pages and then try for contents lock
46247c478bd9Sstevel@tonic-gate 	 * due to lock ordering requirements (inode > page)
46257c478bd9Sstevel@tonic-gate 	 */
46267c478bd9Sstevel@tonic-gate 
46277c478bd9Sstevel@tonic-gate 	has_holes = bmap_has_holes(ip);
46287c478bd9Sstevel@tonic-gate 
46297c478bd9Sstevel@tonic-gate 	if ((rw == S_WRITE || rw == S_CREATE) && has_holes && !beyond_eof) {
46307c478bd9Sstevel@tonic-gate 		int	blk_size;
46317c478bd9Sstevel@tonic-gate 		u_offset_t offset;
46327c478bd9Sstevel@tonic-gate 
46337c478bd9Sstevel@tonic-gate 		/*
46347c478bd9Sstevel@tonic-gate 		 * We must acquire the RW_WRITER lock in order to
46357c478bd9Sstevel@tonic-gate 		 * call bmap_write().
46367c478bd9Sstevel@tonic-gate 		 */
46377c478bd9Sstevel@tonic-gate 		if (dolock && rwtype == RW_READER) {
46387c478bd9Sstevel@tonic-gate 			rwtype = RW_WRITER;
46397c478bd9Sstevel@tonic-gate 
46407c478bd9Sstevel@tonic-gate 			/*
46417c478bd9Sstevel@tonic-gate 			 * Grab the quota lock before
46427c478bd9Sstevel@tonic-gate 			 * upgrading i_contents, but if we can't grab it
46437c478bd9Sstevel@tonic-gate 			 * don't wait here due to lock order:
46447c478bd9Sstevel@tonic-gate 			 * vfs_dqrwlock > i_contents.
46457c478bd9Sstevel@tonic-gate 			 */
464680d34432Sfrankho 			if (do_qlock &&
464780d34432Sfrankho 			    rw_tryenter(&ufsvfsp->vfs_dqrwlock, RW_READER)
464880d34432Sfrankho 			    == 0) {
46497c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
46507c478bd9Sstevel@tonic-gate 				goto retrylock;
46517c478bd9Sstevel@tonic-gate 			}
46527c478bd9Sstevel@tonic-gate 			if (!rw_tryupgrade(&ip->i_contents)) {
46537c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
46547c478bd9Sstevel@tonic-gate 				if (do_qlock)
46557c478bd9Sstevel@tonic-gate 					rw_exit(&ufsvfsp->vfs_dqrwlock);
46567c478bd9Sstevel@tonic-gate 				goto retrylock;
46577c478bd9Sstevel@tonic-gate 			}
46587c478bd9Sstevel@tonic-gate 		}
46597c478bd9Sstevel@tonic-gate 
46607c478bd9Sstevel@tonic-gate 		/*
46617c478bd9Sstevel@tonic-gate 		 * May be allocating disk blocks for holes here as
46627c478bd9Sstevel@tonic-gate 		 * a result of mmap faults. write(2) does the bmap_write
46637c478bd9Sstevel@tonic-gate 		 * in rdip/wrip, not here. We are not dealing with frags
46647c478bd9Sstevel@tonic-gate 		 * in this case.
46657c478bd9Sstevel@tonic-gate 		 */
46667c478bd9Sstevel@tonic-gate 		/*
46677c478bd9Sstevel@tonic-gate 		 * Large Files: We cast fs_bmask field to offset_t
46687c478bd9Sstevel@tonic-gate 		 * just as we do for MAXBMASK because uoff is a 64-bit
46697c478bd9Sstevel@tonic-gate 		 * data type. fs_bmask will still be a 32-bit type
46707c478bd9Sstevel@tonic-gate 		 * as we cannot change any ondisk data structures.
46717c478bd9Sstevel@tonic-gate 		 */
46727c478bd9Sstevel@tonic-gate 
46737c478bd9Sstevel@tonic-gate 		offset = uoff & (offset_t)fs->fs_bmask;
46747c478bd9Sstevel@tonic-gate 		while (offset < uoff + len) {
46757c478bd9Sstevel@tonic-gate 			blk_size = (int)blksize(fs, ip, lblkno(fs, offset));
4676303bf60bSsdebnath 			err = bmap_write(ip, offset, blk_size,
4677303bf60bSsdebnath 			    BI_NORMAL, NULL, cr);
46787c478bd9Sstevel@tonic-gate 			if (ip->i_flag & (ICHG|IUPD))
46797c478bd9Sstevel@tonic-gate 				ip->i_seq++;
46807c478bd9Sstevel@tonic-gate 			if (err)
46817c478bd9Sstevel@tonic-gate 				goto update_inode;
46827c478bd9Sstevel@tonic-gate 			offset += blk_size; /* XXX - make this contig */
46837c478bd9Sstevel@tonic-gate 		}
46847c478bd9Sstevel@tonic-gate 	}
46857c478bd9Sstevel@tonic-gate 
46867c478bd9Sstevel@tonic-gate 	/*
46877c478bd9Sstevel@tonic-gate 	 * Can be a reader from now on.
46887c478bd9Sstevel@tonic-gate 	 */
46897c478bd9Sstevel@tonic-gate 	if (dolock && rwtype == RW_WRITER) {
46907c478bd9Sstevel@tonic-gate 		rw_downgrade(&ip->i_contents);
46917c478bd9Sstevel@tonic-gate 		/*
46927c478bd9Sstevel@tonic-gate 		 * We can release vfs_dqrwlock early so do it, but make
46937c478bd9Sstevel@tonic-gate 		 * sure we don't try to release it again at the bottom.
46947c478bd9Sstevel@tonic-gate 		 */
46957c478bd9Sstevel@tonic-gate 		if (do_qlock) {
46967c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
46977c478bd9Sstevel@tonic-gate 			do_qlock = 0;
46987c478bd9Sstevel@tonic-gate 		}
46997c478bd9Sstevel@tonic-gate 	}
47007c478bd9Sstevel@tonic-gate 
47017c478bd9Sstevel@tonic-gate 	/*
47027c478bd9Sstevel@tonic-gate 	 * We remove PROT_WRITE in cases when the file has UFS holes
47037c478bd9Sstevel@tonic-gate 	 * because we don't  want to call bmap_read() to check each
47047c478bd9Sstevel@tonic-gate 	 * page if it is backed with a disk block.
47057c478bd9Sstevel@tonic-gate 	 */
47067c478bd9Sstevel@tonic-gate 	if (protp && has_holes && rw != S_WRITE && rw != S_CREATE)
47077c478bd9Sstevel@tonic-gate 		*protp &= ~PROT_WRITE;
47087c478bd9Sstevel@tonic-gate 
47097c478bd9Sstevel@tonic-gate 	err = 0;
47107c478bd9Sstevel@tonic-gate 
47117c478bd9Sstevel@tonic-gate 	/*
47127c478bd9Sstevel@tonic-gate 	 * The loop looks up pages in the range [off, off + len).
47137c478bd9Sstevel@tonic-gate 	 * For each page, we first check if we should initiate an asynchronous
47147c478bd9Sstevel@tonic-gate 	 * read ahead before we call page_lookup (we may sleep in page_lookup
47157c478bd9Sstevel@tonic-gate 	 * for a previously initiated disk read).
47167c478bd9Sstevel@tonic-gate 	 */
47177c478bd9Sstevel@tonic-gate 	eoff = (uoff + len);
47187c478bd9Sstevel@tonic-gate 	for (pgoff = uoff, pgaddr = addr, pl = plarr;
47197c478bd9Sstevel@tonic-gate 	    pgoff < eoff; /* empty */) {
47207c478bd9Sstevel@tonic-gate 		page_t	*pp;
47217c478bd9Sstevel@tonic-gate 		u_offset_t	nextrio;
47227c478bd9Sstevel@tonic-gate 		se_t	se;
47237c478bd9Sstevel@tonic-gate 		int retval;
47247c478bd9Sstevel@tonic-gate 
47257c478bd9Sstevel@tonic-gate 		se = ((rw == S_CREATE || rw == S_OTHER) ? SE_EXCL : SE_SHARED);
47267c478bd9Sstevel@tonic-gate 
47277c478bd9Sstevel@tonic-gate 		/* Handle async getpage (faultahead) */
47287c478bd9Sstevel@tonic-gate 		if (plarr == NULL) {
47297c478bd9Sstevel@tonic-gate 			ip->i_nextrio = pgoff;
47307c478bd9Sstevel@tonic-gate 			(void) ufs_getpage_ra(vp, pgoff, seg, pgaddr);
47317c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
47327c478bd9Sstevel@tonic-gate 			pgaddr += pgsize;
47337c478bd9Sstevel@tonic-gate 			continue;
47347c478bd9Sstevel@tonic-gate 		}
47357c478bd9Sstevel@tonic-gate 		/*
47367c478bd9Sstevel@tonic-gate 		 * Check if we should initiate read ahead of next cluster.
47377c478bd9Sstevel@tonic-gate 		 * We call page_exists only when we need to confirm that
47387c478bd9Sstevel@tonic-gate 		 * we have the current page before we initiate the read ahead.
47397c478bd9Sstevel@tonic-gate 		 */
47407c478bd9Sstevel@tonic-gate 		nextrio = ip->i_nextrio;
47417c478bd9Sstevel@tonic-gate 		if (seqmode &&
47427c478bd9Sstevel@tonic-gate 		    pgoff + CLUSTSZ(ip) >= nextrio && pgoff <= nextrio &&
47437c478bd9Sstevel@tonic-gate 		    nextrio < ip->i_size && page_exists(vp, pgoff)) {
47447c478bd9Sstevel@tonic-gate 			retval = ufs_getpage_ra(vp, pgoff, seg, pgaddr);
47457c478bd9Sstevel@tonic-gate 			/*
47467c478bd9Sstevel@tonic-gate 			 * We always read ahead the next cluster of data
47477c478bd9Sstevel@tonic-gate 			 * starting from i_nextrio. If the page (vp,nextrio)
47487c478bd9Sstevel@tonic-gate 			 * is actually in core at this point, the routine
47497c478bd9Sstevel@tonic-gate 			 * ufs_getpage_ra() will stop pre-fetching data
47507c478bd9Sstevel@tonic-gate 			 * until we read that page in a synchronized manner
47517c478bd9Sstevel@tonic-gate 			 * through ufs_getpage_miss(). So, we should increase
47527c478bd9Sstevel@tonic-gate 			 * i_nextrio if the page (vp, nextrio) exists.
47537c478bd9Sstevel@tonic-gate 			 */
47547c478bd9Sstevel@tonic-gate 			if ((retval == 0) && page_exists(vp, nextrio)) {
47557c478bd9Sstevel@tonic-gate 				ip->i_nextrio = nextrio + pgsize;
47567c478bd9Sstevel@tonic-gate 			}
47577c478bd9Sstevel@tonic-gate 		}
47587c478bd9Sstevel@tonic-gate 
47597c478bd9Sstevel@tonic-gate 		if ((pp = page_lookup(vp, pgoff, se)) != NULL) {
47607c478bd9Sstevel@tonic-gate 			/*
47617c478bd9Sstevel@tonic-gate 			 * We found the page in the page cache.
47627c478bd9Sstevel@tonic-gate 			 */
47637c478bd9Sstevel@tonic-gate 			*pl++ = pp;
47647c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
47657c478bd9Sstevel@tonic-gate 			pgaddr += pgsize;
47667c478bd9Sstevel@tonic-gate 			len -= pgsize;
47677c478bd9Sstevel@tonic-gate 			plsz -= pgsize;
47687c478bd9Sstevel@tonic-gate 		} else  {
47697c478bd9Sstevel@tonic-gate 			/*
47707c478bd9Sstevel@tonic-gate 			 * We have to create the page, or read it from disk.
47717c478bd9Sstevel@tonic-gate 			 */
47727c478bd9Sstevel@tonic-gate 			if (err = ufs_getpage_miss(vp, pgoff, len, seg, pgaddr,
47737c478bd9Sstevel@tonic-gate 			    pl, plsz, rw, seqmode))
47747c478bd9Sstevel@tonic-gate 				goto error;
47757c478bd9Sstevel@tonic-gate 
47767c478bd9Sstevel@tonic-gate 			while (*pl != NULL) {
47777c478bd9Sstevel@tonic-gate 				pl++;
47787c478bd9Sstevel@tonic-gate 				pgoff += pgsize;
47797c478bd9Sstevel@tonic-gate 				pgaddr += pgsize;
47807c478bd9Sstevel@tonic-gate 				len -= pgsize;
47817c478bd9Sstevel@tonic-gate 				plsz -= pgsize;
47827c478bd9Sstevel@tonic-gate 			}
47837c478bd9Sstevel@tonic-gate 		}
47847c478bd9Sstevel@tonic-gate 	}
47857c478bd9Sstevel@tonic-gate 
47867c478bd9Sstevel@tonic-gate 	/*
47877c478bd9Sstevel@tonic-gate 	 * Return pages up to plsz if they are in the page cache.
47887c478bd9Sstevel@tonic-gate 	 * We cannot return pages if there is a chance that they are
47897c478bd9Sstevel@tonic-gate 	 * backed with a UFS hole and rw is S_WRITE or S_CREATE.
47907c478bd9Sstevel@tonic-gate 	 */
47917c478bd9Sstevel@tonic-gate 	if (plarr && !(has_holes && (rw == S_WRITE || rw == S_CREATE))) {
47927c478bd9Sstevel@tonic-gate 
47937c478bd9Sstevel@tonic-gate 		ASSERT((protp == NULL) ||
479480d34432Sfrankho 		    !(has_holes && (*protp & PROT_WRITE)));
47957c478bd9Sstevel@tonic-gate 
47967c478bd9Sstevel@tonic-gate 		eoff = pgoff + plsz;
47977c478bd9Sstevel@tonic-gate 		while (pgoff < eoff) {
47987c478bd9Sstevel@tonic-gate 			page_t		*pp;
47997c478bd9Sstevel@tonic-gate 
48007c478bd9Sstevel@tonic-gate 			if ((pp = page_lookup_nowait(vp, pgoff,
48017c478bd9Sstevel@tonic-gate 			    SE_SHARED)) == NULL)
48027c478bd9Sstevel@tonic-gate 				break;
48037c478bd9Sstevel@tonic-gate 
48047c478bd9Sstevel@tonic-gate 			*pl++ = pp;
48057c478bd9Sstevel@tonic-gate 			pgoff += pgsize;
48067c478bd9Sstevel@tonic-gate 			plsz -= pgsize;
48077c478bd9Sstevel@tonic-gate 		}
48087c478bd9Sstevel@tonic-gate 	}
48097c478bd9Sstevel@tonic-gate 
48107c478bd9Sstevel@tonic-gate 	if (plarr)
48117c478bd9Sstevel@tonic-gate 		*pl = NULL;			/* Terminate page list */
48127c478bd9Sstevel@tonic-gate 	ip->i_nextr = pgoff;
48137c478bd9Sstevel@tonic-gate 
48147c478bd9Sstevel@tonic-gate error:
48157c478bd9Sstevel@tonic-gate 	if (err && plarr) {
48167c478bd9Sstevel@tonic-gate 		/*
48177c478bd9Sstevel@tonic-gate 		 * Release any pages we have locked.
48187c478bd9Sstevel@tonic-gate 		 */
48197c478bd9Sstevel@tonic-gate 		while (pl > &plarr[0])
48207c478bd9Sstevel@tonic-gate 			page_unlock(*--pl);
48217c478bd9Sstevel@tonic-gate 
48227c478bd9Sstevel@tonic-gate 		plarr[0] = NULL;
48237c478bd9Sstevel@tonic-gate 	}
48247c478bd9Sstevel@tonic-gate 
48257c478bd9Sstevel@tonic-gate update_inode:
48267c478bd9Sstevel@tonic-gate 	/*
48277c478bd9Sstevel@tonic-gate 	 * If the inode is not already marked for IACC (in rdip() for read)
48287c478bd9Sstevel@tonic-gate 	 * and the inode is not marked for no access time update (in wrip()
48297c478bd9Sstevel@tonic-gate 	 * for write) then update the inode access time and mod time now.
48307c478bd9Sstevel@tonic-gate 	 */
48317c478bd9Sstevel@tonic-gate 	if ((ip->i_flag & (IACC | INOACC)) == 0) {
48327c478bd9Sstevel@tonic-gate 		if ((rw != S_OTHER) && (ip->i_mode & IFMT) != IFDIR) {
48337c478bd9Sstevel@tonic-gate 			if (!ULOCKFS_IS_NOIACC(ITOUL(ip)) &&
48347c478bd9Sstevel@tonic-gate 			    (fs->fs_ronly == 0) &&
48357c478bd9Sstevel@tonic-gate 			    (!ufsvfsp->vfs_noatime)) {
48367c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
48377c478bd9Sstevel@tonic-gate 				ip->i_flag |= IACC;
48387c478bd9Sstevel@tonic-gate 				ITIMES_NOLOCK(ip);
48397c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
48407c478bd9Sstevel@tonic-gate 			}
48417c478bd9Sstevel@tonic-gate 		}
48427c478bd9Sstevel@tonic-gate 	}
48437c478bd9Sstevel@tonic-gate 
48447c478bd9Sstevel@tonic-gate 	if (dolock) {
48457c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
48467c478bd9Sstevel@tonic-gate 		if (do_qlock && rwtype == RW_WRITER)
48477c478bd9Sstevel@tonic-gate 			rw_exit(&ufsvfsp->vfs_dqrwlock);
48487c478bd9Sstevel@tonic-gate 	}
48497c478bd9Sstevel@tonic-gate 
48507c478bd9Sstevel@tonic-gate unlock:
48517c478bd9Sstevel@tonic-gate 	if (ulp) {
48527c478bd9Sstevel@tonic-gate 		if ((rw == S_CREATE || rw == S_WRITE) &&
48537c478bd9Sstevel@tonic-gate 		    !(vp->v_flag & VISSWAP)) {
48547c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_GETPAGE, trans_size);
48557c478bd9Sstevel@tonic-gate 		}
48567c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
48577c478bd9Sstevel@tonic-gate 	}
48587c478bd9Sstevel@tonic-gate out:
48597c478bd9Sstevel@tonic-gate 	return (err);
48607c478bd9Sstevel@tonic-gate }
48617c478bd9Sstevel@tonic-gate 
48627c478bd9Sstevel@tonic-gate /*
48637c478bd9Sstevel@tonic-gate  * ufs_getpage_miss is called when ufs_getpage missed the page in the page
48647c478bd9Sstevel@tonic-gate  * cache. The page is either read from the disk, or it's created.
48657c478bd9Sstevel@tonic-gate  * A page is created (without disk read) if rw == S_CREATE, or if
48667c478bd9Sstevel@tonic-gate  * the page is not backed with a real disk block (UFS hole).
48677c478bd9Sstevel@tonic-gate  */
48687c478bd9Sstevel@tonic-gate /* ARGSUSED */
48697c478bd9Sstevel@tonic-gate static int
48707c478bd9Sstevel@tonic-gate ufs_getpage_miss(struct vnode *vp, u_offset_t off, size_t len, struct seg *seg,
4871*80d5689fSPatrick Mooney     caddr_t addr, page_t *pl[], size_t plsz, enum seg_rw rw, int seq)
48727c478bd9Sstevel@tonic-gate {
48737c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
48747c478bd9Sstevel@tonic-gate 	page_t		*pp;
48757c478bd9Sstevel@tonic-gate 	daddr_t		bn;
48767c478bd9Sstevel@tonic-gate 	size_t		io_len;
4877303bf60bSsdebnath 	int		crpage = 0;
48787c478bd9Sstevel@tonic-gate 	int		err;
48797c478bd9Sstevel@tonic-gate 	int		contig;
48807c478bd9Sstevel@tonic-gate 	int		bsize = ip->i_fs->fs_bsize;
48817c478bd9Sstevel@tonic-gate 
48827c478bd9Sstevel@tonic-gate 	/*
48837c478bd9Sstevel@tonic-gate 	 * Figure out whether the page can be created, or must be
48847c478bd9Sstevel@tonic-gate 	 * must be read from the disk.
48857c478bd9Sstevel@tonic-gate 	 */
48867c478bd9Sstevel@tonic-gate 	if (rw == S_CREATE)
48877c478bd9Sstevel@tonic-gate 		crpage = 1;
48887c478bd9Sstevel@tonic-gate 	else {
48897c478bd9Sstevel@tonic-gate 		contig = 0;
48907c478bd9Sstevel@tonic-gate 		if (err = bmap_read(ip, off, &bn, &contig))
48917c478bd9Sstevel@tonic-gate 			return (err);
4892303bf60bSsdebnath 
48937c478bd9Sstevel@tonic-gate 		crpage = (bn == UFS_HOLE);
4894303bf60bSsdebnath 
4895303bf60bSsdebnath 		/*
4896303bf60bSsdebnath 		 * If its also a fallocated block that hasn't been written to
4897303bf60bSsdebnath 		 * yet, we will treat it just like a UFS_HOLE and create
4898303bf60bSsdebnath 		 * a zero page for it
4899303bf60bSsdebnath 		 */
4900303bf60bSsdebnath 		if (ISFALLOCBLK(ip, bn))
4901303bf60bSsdebnath 			crpage = 1;
49027c478bd9Sstevel@tonic-gate 	}
49037c478bd9Sstevel@tonic-gate 
49047c478bd9Sstevel@tonic-gate 	if (crpage) {
49057c478bd9Sstevel@tonic-gate 		if ((pp = page_create_va(vp, off, PAGESIZE, PG_WAIT, seg,
49067c478bd9Sstevel@tonic-gate 		    addr)) == NULL) {
49077c478bd9Sstevel@tonic-gate 			return (ufs_fault(vp,
490880d34432Sfrankho 			    "ufs_getpage_miss: page_create == NULL"));
49097c478bd9Sstevel@tonic-gate 		}
49107c478bd9Sstevel@tonic-gate 
49117c478bd9Sstevel@tonic-gate 		if (rw != S_CREATE)
49127c478bd9Sstevel@tonic-gate 			pagezero(pp, 0, PAGESIZE);
4913303bf60bSsdebnath 
49147c478bd9Sstevel@tonic-gate 		io_len = PAGESIZE;
49157c478bd9Sstevel@tonic-gate 	} else {
49167c478bd9Sstevel@tonic-gate 		u_offset_t	io_off;
49177c478bd9Sstevel@tonic-gate 		uint_t	xlen;
49187c478bd9Sstevel@tonic-gate 		struct buf	*bp;
49197c478bd9Sstevel@tonic-gate 		ufsvfs_t	*ufsvfsp = ip->i_ufsvfs;
49207c478bd9Sstevel@tonic-gate 
49217c478bd9Sstevel@tonic-gate 		/*
49227c478bd9Sstevel@tonic-gate 		 * If access is not in sequential order, we read from disk
49237c478bd9Sstevel@tonic-gate 		 * in bsize units.
49247c478bd9Sstevel@tonic-gate 		 *
49257c478bd9Sstevel@tonic-gate 		 * We limit the size of the transfer to bsize if we are reading
49267c478bd9Sstevel@tonic-gate 		 * from the beginning of the file. Note in this situation we
49277c478bd9Sstevel@tonic-gate 		 * will hedge our bets and initiate an async read ahead of
49287c478bd9Sstevel@tonic-gate 		 * the second block.
49297c478bd9Sstevel@tonic-gate 		 */
49307c478bd9Sstevel@tonic-gate 		if (!seq || off == 0)
49317c478bd9Sstevel@tonic-gate 			contig = MIN(contig, bsize);
49327c478bd9Sstevel@tonic-gate 
49337c478bd9Sstevel@tonic-gate 		pp = pvn_read_kluster(vp, off, seg, addr, &io_off,
49347c478bd9Sstevel@tonic-gate 		    &io_len, off, contig, 0);
49357c478bd9Sstevel@tonic-gate 
49367c478bd9Sstevel@tonic-gate 		/*
49377c478bd9Sstevel@tonic-gate 		 * Some other thread has entered the page.
49387c478bd9Sstevel@tonic-gate 		 * ufs_getpage will retry page_lookup.
49397c478bd9Sstevel@tonic-gate 		 */
49407c478bd9Sstevel@tonic-gate 		if (pp == NULL) {
49417c478bd9Sstevel@tonic-gate 			pl[0] = NULL;
49427c478bd9Sstevel@tonic-gate 			return (0);
49437c478bd9Sstevel@tonic-gate 		}
49447c478bd9Sstevel@tonic-gate 
49457c478bd9Sstevel@tonic-gate 		/*
49467c478bd9Sstevel@tonic-gate 		 * Zero part of the page which we are not
49477c478bd9Sstevel@tonic-gate 		 * going to read from the disk.
49487c478bd9Sstevel@tonic-gate 		 */
49497c478bd9Sstevel@tonic-gate 		xlen = io_len & PAGEOFFSET;
49507c478bd9Sstevel@tonic-gate 		if (xlen != 0)
49517c478bd9Sstevel@tonic-gate 			pagezero(pp->p_prev, xlen, PAGESIZE - xlen);
49527c478bd9Sstevel@tonic-gate 
49537c478bd9Sstevel@tonic-gate 		bp = pageio_setup(pp, io_len, ip->i_devvp, B_READ);
49547c478bd9Sstevel@tonic-gate 		bp->b_edev = ip->i_dev;
49557c478bd9Sstevel@tonic-gate 		bp->b_dev = cmpdev(ip->i_dev);
49567c478bd9Sstevel@tonic-gate 		bp->b_blkno = bn;
49577c478bd9Sstevel@tonic-gate 		bp->b_un.b_addr = (caddr_t)0;
49587c478bd9Sstevel@tonic-gate 		bp->b_file = ip->i_vnode;
49597c478bd9Sstevel@tonic-gate 		bp->b_offset = off;
49607c478bd9Sstevel@tonic-gate 
49617c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
49627c478bd9Sstevel@tonic-gate 			lufs_read_strategy(ufsvfsp->vfs_log, bp);
49637c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
49647c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
49657c478bd9Sstevel@tonic-gate 		} else {
4966d3d50737SRafael Vanoni 			ufsvfsp->vfs_iotstamp = ddi_get_lbolt();
49677c478bd9Sstevel@tonic-gate 			ub.ub_getpages.value.ul++;
49687c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
49697c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_INBLK, 1);
49707c478bd9Sstevel@tonic-gate 		}
49717c478bd9Sstevel@tonic-gate 
49727c478bd9Sstevel@tonic-gate 		ip->i_nextrio = off + ((io_len + PAGESIZE - 1) & PAGEMASK);
49737c478bd9Sstevel@tonic-gate 
49747c478bd9Sstevel@tonic-gate 		/*
49757c478bd9Sstevel@tonic-gate 		 * If the file access is sequential, initiate read ahead
49767c478bd9Sstevel@tonic-gate 		 * of the next cluster.
49777c478bd9Sstevel@tonic-gate 		 */
49787c478bd9Sstevel@tonic-gate 		if (seq && ip->i_nextrio < ip->i_size)
49797c478bd9Sstevel@tonic-gate 			(void) ufs_getpage_ra(vp, off, seg, addr);
49807c478bd9Sstevel@tonic-gate 		err = biowait(bp);
49817c478bd9Sstevel@tonic-gate 		pageio_done(bp);
49827c478bd9Sstevel@tonic-gate 
49837c478bd9Sstevel@tonic-gate 		if (err) {
49847c478bd9Sstevel@tonic-gate 			pvn_read_done(pp, B_ERROR);
49857c478bd9Sstevel@tonic-gate 			return (err);
49867c478bd9Sstevel@tonic-gate 		}
49877c478bd9Sstevel@tonic-gate 	}
49887c478bd9Sstevel@tonic-gate 
49897c478bd9Sstevel@tonic-gate 	pvn_plist_init(pp, pl, plsz, off, io_len, rw);
49907c478bd9Sstevel@tonic-gate 	return (0);
49917c478bd9Sstevel@tonic-gate }
49927c478bd9Sstevel@tonic-gate 
49937c478bd9Sstevel@tonic-gate /*
49947c478bd9Sstevel@tonic-gate  * Read ahead a cluster from the disk. Returns the length in bytes.
49957c478bd9Sstevel@tonic-gate  */
49967c478bd9Sstevel@tonic-gate static int
49977c478bd9Sstevel@tonic-gate ufs_getpage_ra(struct vnode *vp, u_offset_t off, struct seg *seg, caddr_t addr)
49987c478bd9Sstevel@tonic-gate {
49997c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
50007c478bd9Sstevel@tonic-gate 	page_t		*pp;
50017c478bd9Sstevel@tonic-gate 	u_offset_t	io_off = ip->i_nextrio;
50027c478bd9Sstevel@tonic-gate 	ufsvfs_t	*ufsvfsp;
50037c478bd9Sstevel@tonic-gate 	caddr_t		addr2 = addr + (io_off - off);
50047c478bd9Sstevel@tonic-gate 	struct buf	*bp;
50057c478bd9Sstevel@tonic-gate 	daddr_t		bn;
50067c478bd9Sstevel@tonic-gate 	size_t		io_len;
5007303bf60bSsdebnath 	int		err;
50087c478bd9Sstevel@tonic-gate 	int		contig;
50097c478bd9Sstevel@tonic-gate 	int		xlen;
50107c478bd9Sstevel@tonic-gate 	int		bsize = ip->i_fs->fs_bsize;
50117c478bd9Sstevel@tonic-gate 
50127c478bd9Sstevel@tonic-gate 	/*
50137c478bd9Sstevel@tonic-gate 	 * If the directio advisory is in effect on this file,
50147c478bd9Sstevel@tonic-gate 	 * then do not do buffered read ahead. Read ahead makes
50157c478bd9Sstevel@tonic-gate 	 * it more difficult on threads using directio as they
50167c478bd9Sstevel@tonic-gate 	 * will be forced to flush the pages from this vnode.
50177c478bd9Sstevel@tonic-gate 	 */
50187c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
50197c478bd9Sstevel@tonic-gate 		return (0);
50207c478bd9Sstevel@tonic-gate 	if (ip->i_flag & IDIRECTIO || ufsvfsp->vfs_forcedirectio)
50217c478bd9Sstevel@tonic-gate 		return (0);
50227c478bd9Sstevel@tonic-gate 
50237c478bd9Sstevel@tonic-gate 	/*
50247c478bd9Sstevel@tonic-gate 	 * Is this test needed?
50257c478bd9Sstevel@tonic-gate 	 */
50267c478bd9Sstevel@tonic-gate 	if (addr2 >= seg->s_base + seg->s_size)
50277c478bd9Sstevel@tonic-gate 		return (0);
50287c478bd9Sstevel@tonic-gate 
50297c478bd9Sstevel@tonic-gate 	contig = 0;
5030303bf60bSsdebnath 	err = bmap_read(ip, io_off, &bn, &contig);
5031303bf60bSsdebnath 	/*
5032303bf60bSsdebnath 	 * If its a UFS_HOLE or a fallocated block, do not perform
5033303bf60bSsdebnath 	 * any read ahead's since there probably is nothing to read ahead
5034303bf60bSsdebnath 	 */
5035303bf60bSsdebnath 	if (err || bn == UFS_HOLE || ISFALLOCBLK(ip, bn))
50367c478bd9Sstevel@tonic-gate 		return (0);
50377c478bd9Sstevel@tonic-gate 
50387c478bd9Sstevel@tonic-gate 	/*
50397c478bd9Sstevel@tonic-gate 	 * Limit the transfer size to bsize if this is the 2nd block.
50407c478bd9Sstevel@tonic-gate 	 */
50417c478bd9Sstevel@tonic-gate 	if (io_off == (u_offset_t)bsize)
50427c478bd9Sstevel@tonic-gate 		contig = MIN(contig, bsize);
50437c478bd9Sstevel@tonic-gate 
50447c478bd9Sstevel@tonic-gate 	if ((pp = pvn_read_kluster(vp, io_off, seg, addr2, &io_off,
50457c478bd9Sstevel@tonic-gate 	    &io_len, io_off, contig, 1)) == NULL)
50467c478bd9Sstevel@tonic-gate 		return (0);
50477c478bd9Sstevel@tonic-gate 
50487c478bd9Sstevel@tonic-gate 	/*
50497c478bd9Sstevel@tonic-gate 	 * Zero part of page which we are not going to read from disk
50507c478bd9Sstevel@tonic-gate 	 */
50517c478bd9Sstevel@tonic-gate 	if ((xlen = (io_len & PAGEOFFSET)) > 0)
50527c478bd9Sstevel@tonic-gate 		pagezero(pp->p_prev, xlen, PAGESIZE - xlen);
50537c478bd9Sstevel@tonic-gate 
50547c478bd9Sstevel@tonic-gate 	ip->i_nextrio = (io_off + io_len + PAGESIZE - 1) & PAGEMASK;
50557c478bd9Sstevel@tonic-gate 
50567c478bd9Sstevel@tonic-gate 	bp = pageio_setup(pp, io_len, ip->i_devvp, B_READ | B_ASYNC);
50577c478bd9Sstevel@tonic-gate 	bp->b_edev = ip->i_dev;
50587c478bd9Sstevel@tonic-gate 	bp->b_dev = cmpdev(ip->i_dev);
50597c478bd9Sstevel@tonic-gate 	bp->b_blkno = bn;
50607c478bd9Sstevel@tonic-gate 	bp->b_un.b_addr = (caddr_t)0;
50617c478bd9Sstevel@tonic-gate 	bp->b_file = ip->i_vnode;
50627c478bd9Sstevel@tonic-gate 	bp->b_offset = off;
50637c478bd9Sstevel@tonic-gate 
50647c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_log) {
50657c478bd9Sstevel@tonic-gate 		lufs_read_strategy(ufsvfsp->vfs_log, bp);
50667c478bd9Sstevel@tonic-gate 	} else if (ufsvfsp->vfs_snapshot) {
50677c478bd9Sstevel@tonic-gate 		fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
50687c478bd9Sstevel@tonic-gate 	} else {
5069d3d50737SRafael Vanoni 		ufsvfsp->vfs_iotstamp = ddi_get_lbolt();
50707c478bd9Sstevel@tonic-gate 		ub.ub_getras.value.ul++;
50717c478bd9Sstevel@tonic-gate 		(void) bdev_strategy(bp);
50727c478bd9Sstevel@tonic-gate 		lwp_stat_update(LWP_STAT_INBLK, 1);
50737c478bd9Sstevel@tonic-gate 	}
50747c478bd9Sstevel@tonic-gate 
50757c478bd9Sstevel@tonic-gate 	return (io_len);
50767c478bd9Sstevel@tonic-gate }
50777c478bd9Sstevel@tonic-gate 
50787c478bd9Sstevel@tonic-gate int	ufs_delay = 1;
50797c478bd9Sstevel@tonic-gate /*
50807c478bd9Sstevel@tonic-gate  * Flags are composed of {B_INVAL, B_FREE, B_DONTNEED, B_FORCE, B_ASYNC}
50817c478bd9Sstevel@tonic-gate  *
50827c478bd9Sstevel@tonic-gate  * LMXXX - the inode really ought to contain a pointer to one of these
50837c478bd9Sstevel@tonic-gate  * async args.  Stuff gunk in there and just hand the whole mess off.
50847c478bd9Sstevel@tonic-gate  * This would replace i_delaylen, i_delayoff.
50857c478bd9Sstevel@tonic-gate  */
50867c478bd9Sstevel@tonic-gate /*ARGSUSED*/
50877c478bd9Sstevel@tonic-gate static int
50887c478bd9Sstevel@tonic-gate ufs_putpage(struct vnode *vp, offset_t off, size_t len, int flags,
5089*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct)
50907c478bd9Sstevel@tonic-gate {
50917c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
50927c478bd9Sstevel@tonic-gate 	int err = 0;
50937c478bd9Sstevel@tonic-gate 
50947c478bd9Sstevel@tonic-gate 	if (vp->v_count == 0) {
50957c478bd9Sstevel@tonic-gate 		return (ufs_fault(vp, "ufs_putpage: bad v_count == 0"));
50967c478bd9Sstevel@tonic-gate 	}
50977c478bd9Sstevel@tonic-gate 
50987c478bd9Sstevel@tonic-gate 	/*
50997c478bd9Sstevel@tonic-gate 	 * XXX - Why should this check be made here?
51007c478bd9Sstevel@tonic-gate 	 */
51017c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
51027c478bd9Sstevel@tonic-gate 		err = ENOSYS;
51037c478bd9Sstevel@tonic-gate 		goto errout;
51047c478bd9Sstevel@tonic-gate 	}
51057c478bd9Sstevel@tonic-gate 
51067c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL) {
51077c478bd9Sstevel@tonic-gate 		err = EIO;
51087c478bd9Sstevel@tonic-gate 		goto errout;
51097c478bd9Sstevel@tonic-gate 	}
51107c478bd9Sstevel@tonic-gate 
51117c478bd9Sstevel@tonic-gate 	if (flags & B_ASYNC) {
51127c478bd9Sstevel@tonic-gate 		if (ufs_delay && len &&
51137c478bd9Sstevel@tonic-gate 		    (flags & ~(B_ASYNC|B_DONTNEED|B_FREE)) == 0) {
51147c478bd9Sstevel@tonic-gate 			mutex_enter(&ip->i_tlock);
51157c478bd9Sstevel@tonic-gate 			/*
51167c478bd9Sstevel@tonic-gate 			 * If nobody stalled, start a new cluster.
51177c478bd9Sstevel@tonic-gate 			 */
51187c478bd9Sstevel@tonic-gate 			if (ip->i_delaylen == 0) {
51197c478bd9Sstevel@tonic-gate 				ip->i_delayoff = off;
51207c478bd9Sstevel@tonic-gate 				ip->i_delaylen = len;
51217c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
51227c478bd9Sstevel@tonic-gate 				goto errout;
51237c478bd9Sstevel@tonic-gate 			}
51247c478bd9Sstevel@tonic-gate 			/*
51257c478bd9Sstevel@tonic-gate 			 * If we have a full cluster or they are not contig,
51267c478bd9Sstevel@tonic-gate 			 * then push last cluster and start over.
51277c478bd9Sstevel@tonic-gate 			 */
51287c478bd9Sstevel@tonic-gate 			if (ip->i_delaylen >= CLUSTSZ(ip) ||
51297c478bd9Sstevel@tonic-gate 			    ip->i_delayoff + ip->i_delaylen != off) {
51307c478bd9Sstevel@tonic-gate 				u_offset_t doff;
51317c478bd9Sstevel@tonic-gate 				size_t dlen;
51327c478bd9Sstevel@tonic-gate 
51337c478bd9Sstevel@tonic-gate 				doff = ip->i_delayoff;
51347c478bd9Sstevel@tonic-gate 				dlen = ip->i_delaylen;
51357c478bd9Sstevel@tonic-gate 				ip->i_delayoff = off;
51367c478bd9Sstevel@tonic-gate 				ip->i_delaylen = len;
51377c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
51387c478bd9Sstevel@tonic-gate 				err = ufs_putpages(vp, doff, dlen,
51397c478bd9Sstevel@tonic-gate 				    flags, cr);
51407c478bd9Sstevel@tonic-gate 				/* LMXXX - flags are new val, not old */
51417c478bd9Sstevel@tonic-gate 				goto errout;
51427c478bd9Sstevel@tonic-gate 			}
51437c478bd9Sstevel@tonic-gate 			/*
51447c478bd9Sstevel@tonic-gate 			 * There is something there, it's not full, and
51457c478bd9Sstevel@tonic-gate 			 * it is contig.
51467c478bd9Sstevel@tonic-gate 			 */
51477c478bd9Sstevel@tonic-gate 			ip->i_delaylen += len;
51487c478bd9Sstevel@tonic-gate 			mutex_exit(&ip->i_tlock);
51497c478bd9Sstevel@tonic-gate 			goto errout;
51507c478bd9Sstevel@tonic-gate 		}
51517c478bd9Sstevel@tonic-gate 		/*
51527c478bd9Sstevel@tonic-gate 		 * Must have weird flags or we are not clustering.
51537c478bd9Sstevel@tonic-gate 		 */
51547c478bd9Sstevel@tonic-gate 	}
51557c478bd9Sstevel@tonic-gate 
51567c478bd9Sstevel@tonic-gate 	err = ufs_putpages(vp, off, len, flags, cr);
51577c478bd9Sstevel@tonic-gate 
51587c478bd9Sstevel@tonic-gate errout:
51597c478bd9Sstevel@tonic-gate 	return (err);
51607c478bd9Sstevel@tonic-gate }
51617c478bd9Sstevel@tonic-gate 
51627c478bd9Sstevel@tonic-gate /*
51637c478bd9Sstevel@tonic-gate  * If len == 0, do from off to EOF.
51647c478bd9Sstevel@tonic-gate  *
51657c478bd9Sstevel@tonic-gate  * The normal cases should be len == 0 & off == 0 (entire vp list),
51667c478bd9Sstevel@tonic-gate  * len == MAXBSIZE (from segmap_release actions), and len == PAGESIZE
51677c478bd9Sstevel@tonic-gate  * (from pageout).
51687c478bd9Sstevel@tonic-gate  */
51697c478bd9Sstevel@tonic-gate /*ARGSUSED*/
51707c478bd9Sstevel@tonic-gate static int
5171*80d5689fSPatrick Mooney ufs_putpages(struct vnode *vp, offset_t off, size_t len, int flags,
5172*80d5689fSPatrick Mooney     struct cred *cr)
51737c478bd9Sstevel@tonic-gate {
51747c478bd9Sstevel@tonic-gate 	u_offset_t io_off;
51757c478bd9Sstevel@tonic-gate 	u_offset_t eoff;
51767c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
51777c478bd9Sstevel@tonic-gate 	page_t *pp;
51787c478bd9Sstevel@tonic-gate 	size_t io_len;
51797c478bd9Sstevel@tonic-gate 	int err = 0;
51807c478bd9Sstevel@tonic-gate 	int dolock;
51817c478bd9Sstevel@tonic-gate 
51827c478bd9Sstevel@tonic-gate 	if (vp->v_count == 0)
51837c478bd9Sstevel@tonic-gate 		return (ufs_fault(vp, "ufs_putpages: v_count == 0"));
51847c478bd9Sstevel@tonic-gate 	/*
51857c478bd9Sstevel@tonic-gate 	 * Acquire the readers/write inode lock before locking
51867c478bd9Sstevel@tonic-gate 	 * any pages in this inode.
51877c478bd9Sstevel@tonic-gate 	 * The inode lock is held during i/o.
51887c478bd9Sstevel@tonic-gate 	 */
51897c478bd9Sstevel@tonic-gate 	if (len == 0) {
51907c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
51917c478bd9Sstevel@tonic-gate 		ip->i_delayoff = ip->i_delaylen = 0;
51927c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
51937c478bd9Sstevel@tonic-gate 	}
51947c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
51957c478bd9Sstevel@tonic-gate 	if (dolock) {
51967c478bd9Sstevel@tonic-gate 		/*
51977c478bd9Sstevel@tonic-gate 		 * Must synchronize this thread and any possible thread
51987c478bd9Sstevel@tonic-gate 		 * operating in the window of vulnerability in wrip().
51997c478bd9Sstevel@tonic-gate 		 * It is dangerous to allow both a thread doing a putpage
52007c478bd9Sstevel@tonic-gate 		 * and a thread writing, so serialize them.  The exception
52017c478bd9Sstevel@tonic-gate 		 * is when the thread in wrip() does something which causes
52027c478bd9Sstevel@tonic-gate 		 * a putpage operation.  Then, the thread must be allowed
52037c478bd9Sstevel@tonic-gate 		 * to continue.  It may encounter a bmap_read problem in
52047c478bd9Sstevel@tonic-gate 		 * ufs_putapage, but that is handled in ufs_putapage.
52057c478bd9Sstevel@tonic-gate 		 * Allow async writers to proceed, we don't want to block
52067c478bd9Sstevel@tonic-gate 		 * the pageout daemon.
52077c478bd9Sstevel@tonic-gate 		 */
52087c478bd9Sstevel@tonic-gate 		if (ip->i_writer == curthread)
52097c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
52107c478bd9Sstevel@tonic-gate 		else {
52117c478bd9Sstevel@tonic-gate 			for (;;) {
52127c478bd9Sstevel@tonic-gate 				rw_enter(&ip->i_contents, RW_READER);
52137c478bd9Sstevel@tonic-gate 				mutex_enter(&ip->i_tlock);
52147c478bd9Sstevel@tonic-gate 				/*
52157c478bd9Sstevel@tonic-gate 				 * If there is no thread in the critical
52167c478bd9Sstevel@tonic-gate 				 * section of wrip(), then proceed.
52177c478bd9Sstevel@tonic-gate 				 * Otherwise, wait until there isn't one.
52187c478bd9Sstevel@tonic-gate 				 */
52197c478bd9Sstevel@tonic-gate 				if (ip->i_writer == NULL) {
52207c478bd9Sstevel@tonic-gate 					mutex_exit(&ip->i_tlock);
52217c478bd9Sstevel@tonic-gate 					break;
52227c478bd9Sstevel@tonic-gate 				}
52237c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
52247c478bd9Sstevel@tonic-gate 				/*
52257c478bd9Sstevel@tonic-gate 				 * Bounce async writers when we have a writer
52267c478bd9Sstevel@tonic-gate 				 * working on this file so we don't deadlock
52277c478bd9Sstevel@tonic-gate 				 * the pageout daemon.
52287c478bd9Sstevel@tonic-gate 				 */
52297c478bd9Sstevel@tonic-gate 				if (flags & B_ASYNC) {
52307c478bd9Sstevel@tonic-gate 					mutex_exit(&ip->i_tlock);
52317c478bd9Sstevel@tonic-gate 					return (0);
52327c478bd9Sstevel@tonic-gate 				}
52337c478bd9Sstevel@tonic-gate 				cv_wait(&ip->i_wrcv, &ip->i_tlock);
52347c478bd9Sstevel@tonic-gate 				mutex_exit(&ip->i_tlock);
52357c478bd9Sstevel@tonic-gate 			}
52367c478bd9Sstevel@tonic-gate 		}
52377c478bd9Sstevel@tonic-gate 	}
52387c478bd9Sstevel@tonic-gate 
52397c478bd9Sstevel@tonic-gate 	if (!vn_has_cached_data(vp)) {
52407c478bd9Sstevel@tonic-gate 		if (dolock)
52417c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
52427c478bd9Sstevel@tonic-gate 		return (0);
52437c478bd9Sstevel@tonic-gate 	}
52447c478bd9Sstevel@tonic-gate 
52457c478bd9Sstevel@tonic-gate 	if (len == 0) {
52467c478bd9Sstevel@tonic-gate 		/*
52477c478bd9Sstevel@tonic-gate 		 * Search the entire vp list for pages >= off.
52487c478bd9Sstevel@tonic-gate 		 */
52497c478bd9Sstevel@tonic-gate 		err = pvn_vplist_dirty(vp, (u_offset_t)off, ufs_putapage,
525080d34432Sfrankho 		    flags, cr);
52517c478bd9Sstevel@tonic-gate 	} else {
52527c478bd9Sstevel@tonic-gate 		/*
52537c478bd9Sstevel@tonic-gate 		 * Loop over all offsets in the range looking for
52547c478bd9Sstevel@tonic-gate 		 * pages to deal with.
52557c478bd9Sstevel@tonic-gate 		 */
52567c478bd9Sstevel@tonic-gate 		if ((eoff = blkroundup(ip->i_fs, ip->i_size)) != 0)
52577c478bd9Sstevel@tonic-gate 			eoff = MIN(off + len, eoff);
52587c478bd9Sstevel@tonic-gate 		else
52597c478bd9Sstevel@tonic-gate 			eoff = off + len;
52607c478bd9Sstevel@tonic-gate 
52617c478bd9Sstevel@tonic-gate 		for (io_off = off; io_off < eoff; io_off += io_len) {
52627c478bd9Sstevel@tonic-gate 			/*
52637c478bd9Sstevel@tonic-gate 			 * If we are not invalidating, synchronously
52647c478bd9Sstevel@tonic-gate 			 * freeing or writing pages, use the routine
52657c478bd9Sstevel@tonic-gate 			 * page_lookup_nowait() to prevent reclaiming
52667c478bd9Sstevel@tonic-gate 			 * them from the free list.
52677c478bd9Sstevel@tonic-gate 			 */
52687c478bd9Sstevel@tonic-gate 			if ((flags & B_INVAL) || ((flags & B_ASYNC) == 0)) {
52697c478bd9Sstevel@tonic-gate 				pp = page_lookup(vp, io_off,
527080d34432Sfrankho 				    (flags & (B_INVAL | B_FREE)) ?
527180d34432Sfrankho 				    SE_EXCL : SE_SHARED);
52727c478bd9Sstevel@tonic-gate 			} else {
52737c478bd9Sstevel@tonic-gate 				pp = page_lookup_nowait(vp, io_off,
527480d34432Sfrankho 				    (flags & B_FREE) ? SE_EXCL : SE_SHARED);
52757c478bd9Sstevel@tonic-gate 			}
52767c478bd9Sstevel@tonic-gate 
52777c478bd9Sstevel@tonic-gate 			if (pp == NULL || pvn_getdirty(pp, flags) == 0)
52787c478bd9Sstevel@tonic-gate 				io_len = PAGESIZE;
52797c478bd9Sstevel@tonic-gate 			else {
52807c478bd9Sstevel@tonic-gate 				u_offset_t *io_offp = &io_off;
52817c478bd9Sstevel@tonic-gate 
52827c478bd9Sstevel@tonic-gate 				err = ufs_putapage(vp, pp, io_offp, &io_len,
52837c478bd9Sstevel@tonic-gate 				    flags, cr);
52847c478bd9Sstevel@tonic-gate 				if (err != 0)
52857c478bd9Sstevel@tonic-gate 					break;
52867c478bd9Sstevel@tonic-gate 				/*
52877c478bd9Sstevel@tonic-gate 				 * "io_off" and "io_len" are returned as
52887c478bd9Sstevel@tonic-gate 				 * the range of pages we actually wrote.
52897c478bd9Sstevel@tonic-gate 				 * This allows us to skip ahead more quickly
52907c478bd9Sstevel@tonic-gate 				 * since several pages may've been dealt
52917c478bd9Sstevel@tonic-gate 				 * with by this iteration of the loop.
52927c478bd9Sstevel@tonic-gate 				 */
52937c478bd9Sstevel@tonic-gate 			}
52947c478bd9Sstevel@tonic-gate 		}
52957c478bd9Sstevel@tonic-gate 	}
52967c478bd9Sstevel@tonic-gate 	if (err == 0 && off == 0 && (len == 0 || len >= ip->i_size)) {
52977c478bd9Sstevel@tonic-gate 		/*
52987c478bd9Sstevel@tonic-gate 		 * We have just sync'ed back all the pages on
52997c478bd9Sstevel@tonic-gate 		 * the inode, turn off the IMODTIME flag.
53007c478bd9Sstevel@tonic-gate 		 */
53017c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
53027c478bd9Sstevel@tonic-gate 		ip->i_flag &= ~IMODTIME;
53037c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
53047c478bd9Sstevel@tonic-gate 	}
53057c478bd9Sstevel@tonic-gate 	if (dolock)
53067c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
53077c478bd9Sstevel@tonic-gate 	return (err);
53087c478bd9Sstevel@tonic-gate }
53097c478bd9Sstevel@tonic-gate 
53107c478bd9Sstevel@tonic-gate static void
53117c478bd9Sstevel@tonic-gate ufs_iodone(buf_t *bp)
53127c478bd9Sstevel@tonic-gate {
53137c478bd9Sstevel@tonic-gate 	struct inode *ip;
53147c478bd9Sstevel@tonic-gate 
53157c478bd9Sstevel@tonic-gate 	ASSERT((bp->b_pages->p_vnode != NULL) && !(bp->b_flags & B_READ));
53167c478bd9Sstevel@tonic-gate 
53177c478bd9Sstevel@tonic-gate 	bp->b_iodone = NULL;
53187c478bd9Sstevel@tonic-gate 
53197c478bd9Sstevel@tonic-gate 	ip = VTOI(bp->b_pages->p_vnode);
53207c478bd9Sstevel@tonic-gate 
53217c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
53227c478bd9Sstevel@tonic-gate 	if (ip->i_writes >= ufs_LW) {
53237c478bd9Sstevel@tonic-gate 		if ((ip->i_writes -= bp->b_bcount) <= ufs_LW)
53247c478bd9Sstevel@tonic-gate 			if (ufs_WRITES)
53257c478bd9Sstevel@tonic-gate 				cv_broadcast(&ip->i_wrcv); /* wake all up */
53267c478bd9Sstevel@tonic-gate 	} else {
53277c478bd9Sstevel@tonic-gate 		ip->i_writes -= bp->b_bcount;
53287c478bd9Sstevel@tonic-gate 	}
53297c478bd9Sstevel@tonic-gate 
53307c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
53317c478bd9Sstevel@tonic-gate 	iodone(bp);
53327c478bd9Sstevel@tonic-gate }
53337c478bd9Sstevel@tonic-gate 
53347c478bd9Sstevel@tonic-gate /*
53357c478bd9Sstevel@tonic-gate  * Write out a single page, possibly klustering adjacent
53367c478bd9Sstevel@tonic-gate  * dirty pages.  The inode lock must be held.
53377c478bd9Sstevel@tonic-gate  *
53387c478bd9Sstevel@tonic-gate  * LMXXX - bsize < pagesize not done.
53397c478bd9Sstevel@tonic-gate  */
53407c478bd9Sstevel@tonic-gate /*ARGSUSED*/
53417c478bd9Sstevel@tonic-gate int
5342*80d5689fSPatrick Mooney ufs_putapage(struct vnode *vp, page_t *pp, u_offset_t *offp, size_t *lenp,
5343*80d5689fSPatrick Mooney     int flags, struct cred *cr)
53447c478bd9Sstevel@tonic-gate {
53457c478bd9Sstevel@tonic-gate 	u_offset_t io_off;
53467c478bd9Sstevel@tonic-gate 	u_offset_t off;
53477c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
53487c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = ip->i_ufsvfs;
53497c478bd9Sstevel@tonic-gate 	struct fs *fs;
53507c478bd9Sstevel@tonic-gate 	struct buf *bp;
53517c478bd9Sstevel@tonic-gate 	size_t io_len;
53527c478bd9Sstevel@tonic-gate 	daddr_t bn;
53537c478bd9Sstevel@tonic-gate 	int err;
53547c478bd9Sstevel@tonic-gate 	int contig;
5355b9dc641bSfrankho 	int dotrans;
53567c478bd9Sstevel@tonic-gate 
53577c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_contents));
53587c478bd9Sstevel@tonic-gate 
53597c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL) {
53607c478bd9Sstevel@tonic-gate 		err = EIO;
53617c478bd9Sstevel@tonic-gate 		goto out_trace;
53627c478bd9Sstevel@tonic-gate 	}
53637c478bd9Sstevel@tonic-gate 
53647c478bd9Sstevel@tonic-gate 	fs = ip->i_fs;
53657c478bd9Sstevel@tonic-gate 	ASSERT(fs->fs_ronly == 0);
53667c478bd9Sstevel@tonic-gate 
53677c478bd9Sstevel@tonic-gate 	/*
53687c478bd9Sstevel@tonic-gate 	 * If the modified time on the inode has not already been
5369956bc340Sdm 	 * set elsewhere (e.g. for write/setattr) we set the time now.
53707c478bd9Sstevel@tonic-gate 	 * This gives us approximate modified times for mmap'ed files
53717c478bd9Sstevel@tonic-gate 	 * which are modified via stores in the user address space.
53727c478bd9Sstevel@tonic-gate 	 */
5373956bc340Sdm 	if ((ip->i_flag & IMODTIME) == 0) {
53747c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
53757c478bd9Sstevel@tonic-gate 		ip->i_flag |= IUPD;
53767c478bd9Sstevel@tonic-gate 		ip->i_seq++;
53777c478bd9Sstevel@tonic-gate 		ITIMES_NOLOCK(ip);
53787c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
53797c478bd9Sstevel@tonic-gate 	}
53807c478bd9Sstevel@tonic-gate 
53817c478bd9Sstevel@tonic-gate 	/*
53827c478bd9Sstevel@tonic-gate 	 * Align the request to a block boundry (for old file systems),
53837c478bd9Sstevel@tonic-gate 	 * and go ask bmap() how contiguous things are for this file.
53847c478bd9Sstevel@tonic-gate 	 */
53857c478bd9Sstevel@tonic-gate 	off = pp->p_offset & (offset_t)fs->fs_bmask;	/* block align it */
53867c478bd9Sstevel@tonic-gate 	contig = 0;
53877c478bd9Sstevel@tonic-gate 	err = bmap_read(ip, off, &bn, &contig);
53887c478bd9Sstevel@tonic-gate 	if (err)
53897c478bd9Sstevel@tonic-gate 		goto out;
53907c478bd9Sstevel@tonic-gate 	if (bn == UFS_HOLE) {			/* putpage never allocates */
53917c478bd9Sstevel@tonic-gate 		/*
53927c478bd9Sstevel@tonic-gate 		 * logging device is in error mode; simply return EIO
53937c478bd9Sstevel@tonic-gate 		 */
53947c478bd9Sstevel@tonic-gate 		if (TRANS_ISERROR(ufsvfsp)) {
53957c478bd9Sstevel@tonic-gate 			err = EIO;
53967c478bd9Sstevel@tonic-gate 			goto out;
53977c478bd9Sstevel@tonic-gate 		}
53987c478bd9Sstevel@tonic-gate 		/*
53997c478bd9Sstevel@tonic-gate 		 * Oops, the thread in the window in wrip() did some
54007c478bd9Sstevel@tonic-gate 		 * sort of operation which caused a putpage in the bad
54017c478bd9Sstevel@tonic-gate 		 * range.  In this case, just return an error which will
54027c478bd9Sstevel@tonic-gate 		 * cause the software modified bit on the page to set
54037c478bd9Sstevel@tonic-gate 		 * and the page will get written out again later.
54047c478bd9Sstevel@tonic-gate 		 */
54057c478bd9Sstevel@tonic-gate 		if (ip->i_writer == curthread) {
54067c478bd9Sstevel@tonic-gate 			err = EIO;
54077c478bd9Sstevel@tonic-gate 			goto out;
54087c478bd9Sstevel@tonic-gate 		}
54097c478bd9Sstevel@tonic-gate 		/*
54107c478bd9Sstevel@tonic-gate 		 * If the pager is trying to push a page in the bad range
541148bbca81SDaniel Hoffman 		 * just tell it to try again later when things are better.
54127c478bd9Sstevel@tonic-gate 		 */
54137c478bd9Sstevel@tonic-gate 		if (flags & B_ASYNC) {
54147c478bd9Sstevel@tonic-gate 			err = EAGAIN;
54157c478bd9Sstevel@tonic-gate 			goto out;
54167c478bd9Sstevel@tonic-gate 		}
54177c478bd9Sstevel@tonic-gate 		err = ufs_fault(ITOV(ip), "ufs_putapage: bn == UFS_HOLE");
54187c478bd9Sstevel@tonic-gate 		goto out;
54197c478bd9Sstevel@tonic-gate 	}
54207c478bd9Sstevel@tonic-gate 
5421303bf60bSsdebnath 	/*
5422303bf60bSsdebnath 	 * If it is an fallocate'd block, reverse the negativity since
5423303bf60bSsdebnath 	 * we are now writing to it
5424303bf60bSsdebnath 	 */
5425303bf60bSsdebnath 	if (ISFALLOCBLK(ip, bn)) {
5426303bf60bSsdebnath 		err = bmap_set_bn(vp, off, dbtofsb(fs, -bn));
5427303bf60bSsdebnath 		if (err)
5428303bf60bSsdebnath 			goto out;
5429303bf60bSsdebnath 
5430303bf60bSsdebnath 		bn = -bn;
5431303bf60bSsdebnath 	}
5432303bf60bSsdebnath 
54337c478bd9Sstevel@tonic-gate 	/*
54347c478bd9Sstevel@tonic-gate 	 * Take the length (of contiguous bytes) passed back from bmap()
54357c478bd9Sstevel@tonic-gate 	 * and _try_ and get a set of pages covering that extent.
54367c478bd9Sstevel@tonic-gate 	 */
54377c478bd9Sstevel@tonic-gate 	pp = pvn_write_kluster(vp, pp, &io_off, &io_len, off, contig, flags);
54387c478bd9Sstevel@tonic-gate 
54397c478bd9Sstevel@tonic-gate 	/*
54407c478bd9Sstevel@tonic-gate 	 * May have run out of memory and not clustered backwards.
54417c478bd9Sstevel@tonic-gate 	 * off		p_offset
54427c478bd9Sstevel@tonic-gate 	 * [  pp - 1  ][   pp   ]
54437c478bd9Sstevel@tonic-gate 	 * [	block		]
54447c478bd9Sstevel@tonic-gate 	 * We told bmap off, so we have to adjust the bn accordingly.
54457c478bd9Sstevel@tonic-gate 	 */
54467c478bd9Sstevel@tonic-gate 	if (io_off > off) {
54477c478bd9Sstevel@tonic-gate 		bn += btod(io_off - off);
54487c478bd9Sstevel@tonic-gate 		contig -= (io_off - off);
54497c478bd9Sstevel@tonic-gate 	}
54507c478bd9Sstevel@tonic-gate 
54517c478bd9Sstevel@tonic-gate 	/*
54527c478bd9Sstevel@tonic-gate 	 * bmap was carefull to tell us the right size so use that.
54537c478bd9Sstevel@tonic-gate 	 * There might be unallocated frags at the end.
54547c478bd9Sstevel@tonic-gate 	 * LMXXX - bzero the end of the page?  We must be writing after EOF.
54557c478bd9Sstevel@tonic-gate 	 */
54567c478bd9Sstevel@tonic-gate 	if (io_len > contig) {
54577c478bd9Sstevel@tonic-gate 		ASSERT(io_len - contig < fs->fs_bsize);
54587c478bd9Sstevel@tonic-gate 		io_len -= (io_len - contig);
54597c478bd9Sstevel@tonic-gate 	}
54607c478bd9Sstevel@tonic-gate 
54617c478bd9Sstevel@tonic-gate 	/*
54627c478bd9Sstevel@tonic-gate 	 * Handle the case where we are writing the last page after EOF.
54637c478bd9Sstevel@tonic-gate 	 *
54647c478bd9Sstevel@tonic-gate 	 * XXX - just a patch for i-mt3.
54657c478bd9Sstevel@tonic-gate 	 */
54667c478bd9Sstevel@tonic-gate 	if (io_len == 0) {
546780d34432Sfrankho 		ASSERT(pp->p_offset >=
546880d34432Sfrankho 		    (u_offset_t)(roundup(ip->i_size, PAGESIZE)));
54697c478bd9Sstevel@tonic-gate 		io_len = PAGESIZE;
54707c478bd9Sstevel@tonic-gate 	}
54717c478bd9Sstevel@tonic-gate 
54727c478bd9Sstevel@tonic-gate 	bp = pageio_setup(pp, io_len, ip->i_devvp, B_WRITE | flags);
54737c478bd9Sstevel@tonic-gate 
54747c478bd9Sstevel@tonic-gate 	ULOCKFS_SET_MOD(ITOUL(ip));
54757c478bd9Sstevel@tonic-gate 
54767c478bd9Sstevel@tonic-gate 	bp->b_edev = ip->i_dev;
54777c478bd9Sstevel@tonic-gate 	bp->b_dev = cmpdev(ip->i_dev);
54787c478bd9Sstevel@tonic-gate 	bp->b_blkno = bn;
54797c478bd9Sstevel@tonic-gate 	bp->b_un.b_addr = (caddr_t)0;
54807c478bd9Sstevel@tonic-gate 	bp->b_file = ip->i_vnode;
54817c478bd9Sstevel@tonic-gate 
5482b9dc641bSfrankho 	/*
5483b9dc641bSfrankho 	 * File contents of shadow or quota inodes are metadata, and updates
5484b9dc641bSfrankho 	 * to these need to be put into a logging transaction. All direct
5485b9dc641bSfrankho 	 * callers in UFS do that, but fsflush can come here _before_ the
5486b9dc641bSfrankho 	 * normal codepath. An example would be updating ACL information, for
5487b9dc641bSfrankho 	 * which the normal codepath would be:
5488b9dc641bSfrankho 	 *	ufs_si_store()
5489b9dc641bSfrankho 	 *	ufs_rdwri()
5490b9dc641bSfrankho 	 *	wrip()
5491b9dc641bSfrankho 	 *	segmap_release()
5492b9dc641bSfrankho 	 *	VOP_PUTPAGE()
5493b9dc641bSfrankho 	 * Here, fsflush can pick up the dirty page before segmap_release()
5494b9dc641bSfrankho 	 * forces it out. If that happens, there's no transaction.
5495b9dc641bSfrankho 	 * We therefore need to test whether a transaction exists, and if not
5496b9dc641bSfrankho 	 * create one - for fsflush.
5497b9dc641bSfrankho 	 */
5498b9dc641bSfrankho 	dotrans =
5499b9dc641bSfrankho 	    (((ip->i_mode & IFMT) == IFSHAD || ufsvfsp->vfs_qinod == ip) &&
5500b9dc641bSfrankho 	    ((curthread->t_flag & T_DONTBLOCK) == 0) &&
5501b9dc641bSfrankho 	    (TRANS_ISTRANS(ufsvfsp)));
5502b9dc641bSfrankho 
5503b9dc641bSfrankho 	if (dotrans) {
5504b9dc641bSfrankho 		curthread->t_flag |= T_DONTBLOCK;
5505b9dc641bSfrankho 		TRANS_BEGIN_ASYNC(ufsvfsp, TOP_PUTPAGE, TOP_PUTPAGE_SIZE(ip));
5506b9dc641bSfrankho 	}
55077c478bd9Sstevel@tonic-gate 	if (TRANS_ISTRANS(ufsvfsp)) {
55087c478bd9Sstevel@tonic-gate 		if ((ip->i_mode & IFMT) == IFSHAD) {
55097c478bd9Sstevel@tonic-gate 			TRANS_BUF(ufsvfsp, 0, io_len, bp, DT_SHAD);
55107c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_qinod == ip) {
55117c478bd9Sstevel@tonic-gate 			TRANS_DELTA(ufsvfsp, ldbtob(bn), bp->b_bcount, DT_QR,
55127c478bd9Sstevel@tonic-gate 			    0, 0);
55137c478bd9Sstevel@tonic-gate 		}
55147c478bd9Sstevel@tonic-gate 	}
5515b9dc641bSfrankho 	if (dotrans) {
5516b9dc641bSfrankho 		TRANS_END_ASYNC(ufsvfsp, TOP_PUTPAGE, TOP_PUTPAGE_SIZE(ip));
5517b9dc641bSfrankho 		curthread->t_flag &= ~T_DONTBLOCK;
5518b9dc641bSfrankho 	}
55197c478bd9Sstevel@tonic-gate 
55207c478bd9Sstevel@tonic-gate 	/* write throttle */
55217c478bd9Sstevel@tonic-gate 
55227c478bd9Sstevel@tonic-gate 	ASSERT(bp->b_iodone == NULL);
55237c478bd9Sstevel@tonic-gate 	bp->b_iodone = (int (*)())ufs_iodone;
55247c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
55257c478bd9Sstevel@tonic-gate 	ip->i_writes += bp->b_bcount;
55267c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
55277c478bd9Sstevel@tonic-gate 
55287c478bd9Sstevel@tonic-gate 	if (bp->b_flags & B_ASYNC) {
55297c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
55307c478bd9Sstevel@tonic-gate 			lufs_write_strategy(ufsvfsp->vfs_log, bp);
55317c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
55327c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
55337c478bd9Sstevel@tonic-gate 		} else {
5534d3d50737SRafael Vanoni 			ufsvfsp->vfs_iotstamp = ddi_get_lbolt();
55357c478bd9Sstevel@tonic-gate 			ub.ub_putasyncs.value.ul++;
55367c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
55377c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
55387c478bd9Sstevel@tonic-gate 		}
55397c478bd9Sstevel@tonic-gate 	} else {
55407c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_log) {
55417c478bd9Sstevel@tonic-gate 			lufs_write_strategy(ufsvfsp->vfs_log, bp);
55427c478bd9Sstevel@tonic-gate 		} else if (ufsvfsp->vfs_snapshot) {
55437c478bd9Sstevel@tonic-gate 			fssnap_strategy(&ufsvfsp->vfs_snapshot, bp);
55447c478bd9Sstevel@tonic-gate 		} else {
5545d3d50737SRafael Vanoni 			ufsvfsp->vfs_iotstamp = ddi_get_lbolt();
55467c478bd9Sstevel@tonic-gate 			ub.ub_putsyncs.value.ul++;
55477c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
55487c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
55497c478bd9Sstevel@tonic-gate 		}
55507c478bd9Sstevel@tonic-gate 		err = biowait(bp);
55517c478bd9Sstevel@tonic-gate 		pageio_done(bp);
55527c478bd9Sstevel@tonic-gate 		pvn_write_done(pp, ((err) ? B_ERROR : 0) | B_WRITE | flags);
55537c478bd9Sstevel@tonic-gate 	}
55547c478bd9Sstevel@tonic-gate 
55557c478bd9Sstevel@tonic-gate 	pp = NULL;
55567c478bd9Sstevel@tonic-gate 
55577c478bd9Sstevel@tonic-gate out:
55587c478bd9Sstevel@tonic-gate 	if (err != 0 && pp != NULL)
55597c478bd9Sstevel@tonic-gate 		pvn_write_done(pp, B_ERROR | B_WRITE | flags);
55607c478bd9Sstevel@tonic-gate 
55617c478bd9Sstevel@tonic-gate 	if (offp)
55627c478bd9Sstevel@tonic-gate 		*offp = io_off;
55637c478bd9Sstevel@tonic-gate 	if (lenp)
55647c478bd9Sstevel@tonic-gate 		*lenp = io_len;
55657c478bd9Sstevel@tonic-gate out_trace:
55667c478bd9Sstevel@tonic-gate 	return (err);
55677c478bd9Sstevel@tonic-gate }
55687c478bd9Sstevel@tonic-gate 
55696ac3b8a8Svsakar uint64_t ufs_map_alock_retry_cnt;
55706ac3b8a8Svsakar uint64_t ufs_map_lockfs_retry_cnt;
55716ac3b8a8Svsakar 
55727c478bd9Sstevel@tonic-gate /* ARGSUSED */
55737c478bd9Sstevel@tonic-gate static int
5574*80d5689fSPatrick Mooney ufs_map(struct vnode *vp, offset_t off, struct as *as, caddr_t *addrp,
5575*80d5689fSPatrick Mooney     size_t len, uchar_t prot, uchar_t maxprot, uint_t flags, struct cred *cr,
5576*80d5689fSPatrick Mooney     caller_context_t *ct)
55777c478bd9Sstevel@tonic-gate {
55787c478bd9Sstevel@tonic-gate 	struct segvn_crargs vn_a;
55797c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp = VTOI(vp)->i_ufsvfs;
55807c478bd9Sstevel@tonic-gate 	struct ulockfs *ulp;
55816ac3b8a8Svsakar 	int error, sig;
55826ac3b8a8Svsakar 	k_sigset_t smask;
558357846e82Svsakar 	caddr_t hint = *addrp;
55847c478bd9Sstevel@tonic-gate 
55857c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
55867c478bd9Sstevel@tonic-gate 		error = ENOSYS;
55876ac3b8a8Svsakar 		goto out;
55887c478bd9Sstevel@tonic-gate 	}
55897c478bd9Sstevel@tonic-gate 
55907c478bd9Sstevel@tonic-gate 	if (off < (offset_t)0 || (offset_t)(off + len) < (offset_t)0) {
55917c478bd9Sstevel@tonic-gate 		error = ENXIO;
55926ac3b8a8Svsakar 		goto out;
55937c478bd9Sstevel@tonic-gate 	}
55947c478bd9Sstevel@tonic-gate 
55957c478bd9Sstevel@tonic-gate 	if (vp->v_type != VREG) {
55967c478bd9Sstevel@tonic-gate 		error = ENODEV;
55976ac3b8a8Svsakar 		goto out;
55987c478bd9Sstevel@tonic-gate 	}
55997c478bd9Sstevel@tonic-gate 
56006ac3b8a8Svsakar retry_map:
560157846e82Svsakar 	*addrp = hint;
56027c478bd9Sstevel@tonic-gate 	/*
56037c478bd9Sstevel@tonic-gate 	 * If file is being locked, disallow mapping.
56047c478bd9Sstevel@tonic-gate 	 */
56057c478bd9Sstevel@tonic-gate 	if (vn_has_mandatory_locks(vp, VTOI(vp)->i_mode)) {
56067c478bd9Sstevel@tonic-gate 		error = EAGAIN;
56076ac3b8a8Svsakar 		goto out;
56087c478bd9Sstevel@tonic-gate 	}
56097c478bd9Sstevel@tonic-gate 
56107c478bd9Sstevel@tonic-gate 	as_rangelock(as);
561160946fe0Smec 	/*
561260946fe0Smec 	 * Note that if we are retrying (because ufs_lockfs_trybegin failed in
561360946fe0Smec 	 * the previous attempt), some other thread could have grabbed
561460946fe0Smec 	 * the same VA range if MAP_FIXED is set. In that case, choose_addr
561560946fe0Smec 	 * would unmap the valid VA range, that is ok.
561660946fe0Smec 	 */
561760946fe0Smec 	error = choose_addr(as, addrp, len, off, ADDR_VACALIGN, flags);
561860946fe0Smec 	if (error != 0) {
561960946fe0Smec 		as_rangeunlock(as);
562060946fe0Smec 		goto out;
56217c478bd9Sstevel@tonic-gate 	}
56227c478bd9Sstevel@tonic-gate 
56236ac3b8a8Svsakar 	/*
56246ac3b8a8Svsakar 	 * a_lock has to be acquired before entering the lockfs protocol
56256ac3b8a8Svsakar 	 * because that is the order in which pagefault works. Also we cannot
56266ac3b8a8Svsakar 	 * block on a_lock here because this waiting writer will prevent
56276ac3b8a8Svsakar 	 * further readers like ufs_read from progressing and could cause
56286ac3b8a8Svsakar 	 * deadlock between ufs_read/ufs_map/pagefault when a quiesce is
56296ac3b8a8Svsakar 	 * pending.
56306ac3b8a8Svsakar 	 */
5631dc32d872SJosef 'Jeff' Sipek 	while (!AS_LOCK_TRYENTER(as, RW_WRITER)) {
56326ac3b8a8Svsakar 		ufs_map_alock_retry_cnt++;
56336ac3b8a8Svsakar 		delay(RETRY_LOCK_DELAY);
56346ac3b8a8Svsakar 	}
56356ac3b8a8Svsakar 
56366ac3b8a8Svsakar 	/*
56376ac3b8a8Svsakar 	 * We can't hold as->a_lock and wait for lockfs to succeed because
56386ac3b8a8Svsakar 	 * the proc tools might hang on a_lock, so call ufs_lockfs_trybegin()
56396ac3b8a8Svsakar 	 * instead.
56406ac3b8a8Svsakar 	 */
56416ac3b8a8Svsakar 	if (error = ufs_lockfs_trybegin(ufsvfsp, &ulp, ULOCKFS_MAP_MASK)) {
56426ac3b8a8Svsakar 		/*
56436ac3b8a8Svsakar 		 * ufs_lockfs_trybegin() did not succeed. It is safer to give up
56446ac3b8a8Svsakar 		 * as->a_lock and wait for ulp->ul_fs_lock status to change.
56456ac3b8a8Svsakar 		 */
56466ac3b8a8Svsakar 		ufs_map_lockfs_retry_cnt++;
5647dc32d872SJosef 'Jeff' Sipek 		AS_LOCK_EXIT(as);
56486ac3b8a8Svsakar 		as_rangeunlock(as);
56496ac3b8a8Svsakar 		if (error == EIO)
56506ac3b8a8Svsakar 			goto out;
56516ac3b8a8Svsakar 
56526ac3b8a8Svsakar 		mutex_enter(&ulp->ul_lock);
56536ac3b8a8Svsakar 		while (ulp->ul_fs_lock & ULOCKFS_MAP_MASK) {
56546ac3b8a8Svsakar 			if (ULOCKFS_IS_SLOCK(ulp) || ufsvfsp->vfs_nointr) {
56556ac3b8a8Svsakar 				cv_wait(&ulp->ul_cv, &ulp->ul_lock);
56566ac3b8a8Svsakar 			} else {
56576ac3b8a8Svsakar 				sigintr(&smask, 1);
56586ac3b8a8Svsakar 				sig = cv_wait_sig(&ulp->ul_cv, &ulp->ul_lock);
56596ac3b8a8Svsakar 				sigunintr(&smask);
56606ac3b8a8Svsakar 				if (((ulp->ul_fs_lock & ULOCKFS_MAP_MASK) &&
56616ac3b8a8Svsakar 				    !sig) || ufsvfsp->vfs_dontblock) {
56626ac3b8a8Svsakar 					mutex_exit(&ulp->ul_lock);
56636ac3b8a8Svsakar 					return (EINTR);
56646ac3b8a8Svsakar 				}
56656ac3b8a8Svsakar 			}
56666ac3b8a8Svsakar 		}
56676ac3b8a8Svsakar 		mutex_exit(&ulp->ul_lock);
56686ac3b8a8Svsakar 		goto retry_map;
56696ac3b8a8Svsakar 	}
56706ac3b8a8Svsakar 
56717c478bd9Sstevel@tonic-gate 	vn_a.vp = vp;
56727c478bd9Sstevel@tonic-gate 	vn_a.offset = (u_offset_t)off;
56737c478bd9Sstevel@tonic-gate 	vn_a.type = flags & MAP_TYPE;
56747c478bd9Sstevel@tonic-gate 	vn_a.prot = prot;
56757c478bd9Sstevel@tonic-gate 	vn_a.maxprot = maxprot;
56767c478bd9Sstevel@tonic-gate 	vn_a.cred = cr;
56777c478bd9Sstevel@tonic-gate 	vn_a.amp = NULL;
56787c478bd9Sstevel@tonic-gate 	vn_a.flags = flags & ~MAP_TYPE;
56797c478bd9Sstevel@tonic-gate 	vn_a.szc = 0;
56807c478bd9Sstevel@tonic-gate 	vn_a.lgrp_mem_policy_flags = 0;
56817c478bd9Sstevel@tonic-gate 
568202ff05a9Svsakar 	error = as_map_locked(as, *addrp, len, segvn_create, &vn_a);
56836ac3b8a8Svsakar 	if (ulp)
56847c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
56856ac3b8a8Svsakar 	as_rangeunlock(as);
56867c478bd9Sstevel@tonic-gate out:
56877c478bd9Sstevel@tonic-gate 	return (error);
56887c478bd9Sstevel@tonic-gate }
56897c478bd9Sstevel@tonic-gate 
56907c478bd9Sstevel@tonic-gate /* ARGSUSED */
56917c478bd9Sstevel@tonic-gate static int
5692*80d5689fSPatrick Mooney ufs_addmap(struct vnode *vp, offset_t off, struct as *as, caddr_t addr,
5693*80d5689fSPatrick Mooney     size_t len, uchar_t  prot, uchar_t  maxprot, uint_t    flags,
5694*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct)
56957c478bd9Sstevel@tonic-gate {
56967c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
56977c478bd9Sstevel@tonic-gate 
56987c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
56997c478bd9Sstevel@tonic-gate 		return (ENOSYS);
57007c478bd9Sstevel@tonic-gate 	}
57017c478bd9Sstevel@tonic-gate 
57027c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
57037c478bd9Sstevel@tonic-gate 	ip->i_mapcnt += btopr(len);
57047c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
57057c478bd9Sstevel@tonic-gate 	return (0);
57067c478bd9Sstevel@tonic-gate }
57077c478bd9Sstevel@tonic-gate 
57087c478bd9Sstevel@tonic-gate /*ARGSUSED*/
57097c478bd9Sstevel@tonic-gate static int
57107c478bd9Sstevel@tonic-gate ufs_delmap(struct vnode *vp, offset_t off, struct as *as, caddr_t addr,
5711*80d5689fSPatrick Mooney     size_t len, uint_t prot,  uint_t maxprot,  uint_t flags, struct cred *cr,
5712*80d5689fSPatrick Mooney     caller_context_t *ct)
57137c478bd9Sstevel@tonic-gate {
57147c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
57157c478bd9Sstevel@tonic-gate 
57167c478bd9Sstevel@tonic-gate 	if (vp->v_flag & VNOMAP) {
57177c478bd9Sstevel@tonic-gate 		return (ENOSYS);
57187c478bd9Sstevel@tonic-gate 	}
57197c478bd9Sstevel@tonic-gate 
57207c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
57217c478bd9Sstevel@tonic-gate 	ip->i_mapcnt -= btopr(len); 	/* Count released mappings */
57227c478bd9Sstevel@tonic-gate 	ASSERT(ip->i_mapcnt >= 0);
57237c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
57247c478bd9Sstevel@tonic-gate 	return (0);
57257c478bd9Sstevel@tonic-gate }
57267c478bd9Sstevel@tonic-gate /*
57277c478bd9Sstevel@tonic-gate  * Return the answer requested to poll() for non-device files
57287c478bd9Sstevel@tonic-gate  */
57297c478bd9Sstevel@tonic-gate struct pollhead ufs_pollhd;
57307c478bd9Sstevel@tonic-gate 
57317c478bd9Sstevel@tonic-gate /* ARGSUSED */
57327c478bd9Sstevel@tonic-gate int
5733da6c28aaSamw ufs_poll(vnode_t *vp, short ev, int any, short *revp, struct pollhead **phpp,
5734*80d5689fSPatrick Mooney     caller_context_t *ct)
57357c478bd9Sstevel@tonic-gate {
57367c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp;
57377c478bd9Sstevel@tonic-gate 
5738*80d5689fSPatrick Mooney 	/*
5739*80d5689fSPatrick Mooney 	 * Regular files reject edge-triggered pollers.
5740*80d5689fSPatrick Mooney 	 * See the comment in fs_poll() for a more detailed explanation.
5741*80d5689fSPatrick Mooney 	 */
5742*80d5689fSPatrick Mooney 	if (ev & POLLET) {
5743*80d5689fSPatrick Mooney 		return (EPERM);
5744*80d5689fSPatrick Mooney 	}
5745*80d5689fSPatrick Mooney 
57467c478bd9Sstevel@tonic-gate 	*revp = 0;
57477c478bd9Sstevel@tonic-gate 	ufsvfsp = VTOI(vp)->i_ufsvfs;
57487c478bd9Sstevel@tonic-gate 
57497c478bd9Sstevel@tonic-gate 	if (!ufsvfsp) {
57507c478bd9Sstevel@tonic-gate 		*revp = POLLHUP;
57517c478bd9Sstevel@tonic-gate 		goto out;
57527c478bd9Sstevel@tonic-gate 	}
57537c478bd9Sstevel@tonic-gate 
57547c478bd9Sstevel@tonic-gate 	if (ULOCKFS_IS_HLOCK(&ufsvfsp->vfs_ulockfs) ||
57557c478bd9Sstevel@tonic-gate 	    ULOCKFS_IS_ELOCK(&ufsvfsp->vfs_ulockfs)) {
57567c478bd9Sstevel@tonic-gate 		*revp |= POLLERR;
57577c478bd9Sstevel@tonic-gate 
57587c478bd9Sstevel@tonic-gate 	} else {
57597c478bd9Sstevel@tonic-gate 		if ((ev & POLLOUT) && !ufsvfsp->vfs_fs->fs_ronly &&
57607c478bd9Sstevel@tonic-gate 		    !ULOCKFS_IS_WLOCK(&ufsvfsp->vfs_ulockfs))
57617c478bd9Sstevel@tonic-gate 			*revp |= POLLOUT;
57627c478bd9Sstevel@tonic-gate 
57637c478bd9Sstevel@tonic-gate 		if ((ev & POLLWRBAND) && !ufsvfsp->vfs_fs->fs_ronly &&
57647c478bd9Sstevel@tonic-gate 		    !ULOCKFS_IS_WLOCK(&ufsvfsp->vfs_ulockfs))
57657c478bd9Sstevel@tonic-gate 			*revp |= POLLWRBAND;
57667c478bd9Sstevel@tonic-gate 
57677c478bd9Sstevel@tonic-gate 		if (ev & POLLIN)
57687c478bd9Sstevel@tonic-gate 			*revp |= POLLIN;
57697c478bd9Sstevel@tonic-gate 
57707c478bd9Sstevel@tonic-gate 		if (ev & POLLRDNORM)
57717c478bd9Sstevel@tonic-gate 			*revp |= POLLRDNORM;
57727c478bd9Sstevel@tonic-gate 
57737c478bd9Sstevel@tonic-gate 		if (ev & POLLRDBAND)
57747c478bd9Sstevel@tonic-gate 			*revp |= POLLRDBAND;
57757c478bd9Sstevel@tonic-gate 	}
57767c478bd9Sstevel@tonic-gate 
57777c478bd9Sstevel@tonic-gate 	if ((ev & POLLPRI) && (*revp & (POLLERR|POLLHUP)))
57787c478bd9Sstevel@tonic-gate 		*revp |= POLLPRI;
57797c478bd9Sstevel@tonic-gate out:
5780*80d5689fSPatrick Mooney 	if (*revp == 0 && ! any) {
5781*80d5689fSPatrick Mooney 		*phpp = &ufs_pollhd;
5782*80d5689fSPatrick Mooney 	}
57837c478bd9Sstevel@tonic-gate 
57847c478bd9Sstevel@tonic-gate 	return (0);
57857c478bd9Sstevel@tonic-gate }
57867c478bd9Sstevel@tonic-gate 
57877c478bd9Sstevel@tonic-gate /* ARGSUSED */
57887c478bd9Sstevel@tonic-gate static int
5789da6c28aaSamw ufs_l_pathconf(struct vnode *vp, int cmd, ulong_t *valp, struct cred *cr,
5790*80d5689fSPatrick Mooney     caller_context_t *ct)
57917c478bd9Sstevel@tonic-gate {
57927c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
57937c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp = NULL;
57947c478bd9Sstevel@tonic-gate 	struct inode 	*sip = NULL;
57957c478bd9Sstevel@tonic-gate 	int		error;
57967c478bd9Sstevel@tonic-gate 	struct inode 	*ip = VTOI(vp);
57977c478bd9Sstevel@tonic-gate 	int		issync;
57987c478bd9Sstevel@tonic-gate 
57997c478bd9Sstevel@tonic-gate 	error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_PATHCONF_MASK);
58007c478bd9Sstevel@tonic-gate 	if (error)
58017c478bd9Sstevel@tonic-gate 		return (error);
58027c478bd9Sstevel@tonic-gate 
58037c478bd9Sstevel@tonic-gate 	switch (cmd) {
58047c478bd9Sstevel@tonic-gate 		/*
58057c478bd9Sstevel@tonic-gate 		 * Have to handle _PC_NAME_MAX here, because the normal way
58067c478bd9Sstevel@tonic-gate 		 * [fs_pathconf() -> VOP_STATVFS() -> ufs_statvfs()]
58077c478bd9Sstevel@tonic-gate 		 * results in a lock ordering reversal between
58087c478bd9Sstevel@tonic-gate 		 * ufs_lockfs_{begin,end}() and
58097c478bd9Sstevel@tonic-gate 		 * ufs_thread_{suspend,continue}().
58107c478bd9Sstevel@tonic-gate 		 *
58117c478bd9Sstevel@tonic-gate 		 * Keep in sync with ufs_statvfs().
58127c478bd9Sstevel@tonic-gate 		 */
58137c478bd9Sstevel@tonic-gate 	case _PC_NAME_MAX:
58147c478bd9Sstevel@tonic-gate 		*valp = MAXNAMLEN;
58157c478bd9Sstevel@tonic-gate 		break;
58167c478bd9Sstevel@tonic-gate 
58177c478bd9Sstevel@tonic-gate 	case _PC_FILESIZEBITS:
58187c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_lfflags & UFS_LARGEFILES)
58197c478bd9Sstevel@tonic-gate 			*valp = UFS_FILESIZE_BITS;
58207c478bd9Sstevel@tonic-gate 		else
58217c478bd9Sstevel@tonic-gate 			*valp = 32;
58227c478bd9Sstevel@tonic-gate 		break;
58237c478bd9Sstevel@tonic-gate 
58247c478bd9Sstevel@tonic-gate 	case _PC_XATTR_EXISTS:
58257c478bd9Sstevel@tonic-gate 		if (vp->v_vfsp->vfs_flag & VFS_XATTR) {
58267c478bd9Sstevel@tonic-gate 
582780d34432Sfrankho 			error =
582880d34432Sfrankho 			    ufs_xattr_getattrdir(vp, &sip, LOOKUP_XATTR, cr);
58297c478bd9Sstevel@tonic-gate 			if (error ==  0 && sip != NULL) {
58307c478bd9Sstevel@tonic-gate 				/* Start transaction */
58317c478bd9Sstevel@tonic-gate 				if (ulp) {
58327c478bd9Sstevel@tonic-gate 					TRANS_BEGIN_CSYNC(ufsvfsp, issync,
58337c478bd9Sstevel@tonic-gate 					    TOP_RMDIR, TOP_RMDIR_SIZE);
58347c478bd9Sstevel@tonic-gate 				}
58357c478bd9Sstevel@tonic-gate 				/*
58367c478bd9Sstevel@tonic-gate 				 * Is directory empty
58377c478bd9Sstevel@tonic-gate 				 */
58387c478bd9Sstevel@tonic-gate 				rw_enter(&sip->i_rwlock, RW_WRITER);
58397c478bd9Sstevel@tonic-gate 				rw_enter(&sip->i_contents, RW_WRITER);
58407c478bd9Sstevel@tonic-gate 				if (ufs_xattrdirempty(sip,
584180d34432Sfrankho 				    sip->i_number, CRED())) {
58427c478bd9Sstevel@tonic-gate 					rw_enter(&ip->i_contents, RW_WRITER);
58437c478bd9Sstevel@tonic-gate 					ufs_unhook_shadow(ip, sip);
58447c478bd9Sstevel@tonic-gate 					rw_exit(&ip->i_contents);
58457c478bd9Sstevel@tonic-gate 
58467c478bd9Sstevel@tonic-gate 					*valp = 0;
58477c478bd9Sstevel@tonic-gate 
58487c478bd9Sstevel@tonic-gate 				} else
58497c478bd9Sstevel@tonic-gate 					*valp = 1;
58507c478bd9Sstevel@tonic-gate 				rw_exit(&sip->i_contents);
58517c478bd9Sstevel@tonic-gate 				rw_exit(&sip->i_rwlock);
58527c478bd9Sstevel@tonic-gate 				if (ulp) {
58537c478bd9Sstevel@tonic-gate 					TRANS_END_CSYNC(ufsvfsp, error, issync,
58547c478bd9Sstevel@tonic-gate 					    TOP_RMDIR, TOP_RMDIR_SIZE);
58557c478bd9Sstevel@tonic-gate 				}
58567c478bd9Sstevel@tonic-gate 				VN_RELE(ITOV(sip));
58577c478bd9Sstevel@tonic-gate 			} else if (error == ENOENT) {
58587c478bd9Sstevel@tonic-gate 				*valp = 0;
58597c478bd9Sstevel@tonic-gate 				error = 0;
58607c478bd9Sstevel@tonic-gate 			}
58617c478bd9Sstevel@tonic-gate 		} else {
5862da6c28aaSamw 			error = fs_pathconf(vp, cmd, valp, cr, ct);
58637c478bd9Sstevel@tonic-gate 		}
58647c478bd9Sstevel@tonic-gate 		break;
58657c478bd9Sstevel@tonic-gate 
58667c478bd9Sstevel@tonic-gate 	case _PC_ACL_ENABLED:
58677c478bd9Sstevel@tonic-gate 		*valp = _ACL_ACLENT_ENABLED;
58687c478bd9Sstevel@tonic-gate 		break;
58697c478bd9Sstevel@tonic-gate 
58707c478bd9Sstevel@tonic-gate 	case _PC_MIN_HOLE_SIZE:
58717c478bd9Sstevel@tonic-gate 		*valp = (ulong_t)ip->i_fs->fs_bsize;
58727c478bd9Sstevel@tonic-gate 		break;
58737c478bd9Sstevel@tonic-gate 
5874da6c28aaSamw 	case _PC_SATTR_ENABLED:
5875da6c28aaSamw 	case _PC_SATTR_EXISTS:
58769660e5cbSJanice Chang 		*valp = vfs_has_feature(vp->v_vfsp, VFSFT_SYSATTR_VIEWS) &&
5877da6c28aaSamw 		    (vp->v_type == VREG || vp->v_type == VDIR);
5878da6c28aaSamw 		break;
5879da6c28aaSamw 
58803b862e9aSRoger A. Faulkner 	case _PC_TIMESTAMP_RESOLUTION:
58813b862e9aSRoger A. Faulkner 		/*
58823b862e9aSRoger A. Faulkner 		 * UFS keeps only microsecond timestamp resolution.
58833b862e9aSRoger A. Faulkner 		 * This is historical and will probably never change.
58843b862e9aSRoger A. Faulkner 		 */
58853b862e9aSRoger A. Faulkner 		*valp = 1000L;
58863b862e9aSRoger A. Faulkner 		break;
58873b862e9aSRoger A. Faulkner 
58887c478bd9Sstevel@tonic-gate 	default:
5889da6c28aaSamw 		error = fs_pathconf(vp, cmd, valp, cr, ct);
58903b862e9aSRoger A. Faulkner 		break;
58917c478bd9Sstevel@tonic-gate 	}
58927c478bd9Sstevel@tonic-gate 
58937c478bd9Sstevel@tonic-gate 	if (ulp != NULL) {
58947c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
58957c478bd9Sstevel@tonic-gate 	}
58967c478bd9Sstevel@tonic-gate 	return (error);
58977c478bd9Sstevel@tonic-gate }
58987c478bd9Sstevel@tonic-gate 
58997c478bd9Sstevel@tonic-gate int ufs_pageio_writes, ufs_pageio_reads;
59007c478bd9Sstevel@tonic-gate 
59017c478bd9Sstevel@tonic-gate /*ARGSUSED*/
59027c478bd9Sstevel@tonic-gate static int
59037c478bd9Sstevel@tonic-gate ufs_pageio(struct vnode *vp, page_t *pp, u_offset_t io_off, size_t io_len,
5904*80d5689fSPatrick Mooney     int flags, struct cred *cr, caller_context_t *ct)
59057c478bd9Sstevel@tonic-gate {
59067c478bd9Sstevel@tonic-gate 	struct inode *ip = VTOI(vp);
59077c478bd9Sstevel@tonic-gate 	struct ufsvfs *ufsvfsp;
59087c478bd9Sstevel@tonic-gate 	page_t *npp = NULL, *opp = NULL, *cpp = pp;
59097c478bd9Sstevel@tonic-gate 	struct buf *bp;
59107c478bd9Sstevel@tonic-gate 	daddr_t bn;
59117c478bd9Sstevel@tonic-gate 	size_t done_len = 0, cur_len = 0;
59127c478bd9Sstevel@tonic-gate 	int err = 0;
59137c478bd9Sstevel@tonic-gate 	int contig = 0;
59147c478bd9Sstevel@tonic-gate 	int dolock;
59157c478bd9Sstevel@tonic-gate 	int vmpss = 0;
5916bc69f433Saguzovsk 	struct ulockfs *ulp;
59177c478bd9Sstevel@tonic-gate 
59187c478bd9Sstevel@tonic-gate 	if ((flags & B_READ) && pp != NULL && pp->p_vnode == vp &&
59197c478bd9Sstevel@tonic-gate 	    vp->v_mpssdata != NULL) {
59207c478bd9Sstevel@tonic-gate 		vmpss = 1;
59217c478bd9Sstevel@tonic-gate 	}
59227c478bd9Sstevel@tonic-gate 
59237c478bd9Sstevel@tonic-gate 	dolock = (rw_owner(&ip->i_contents) != curthread);
59247c478bd9Sstevel@tonic-gate 	/*
59257c478bd9Sstevel@tonic-gate 	 * We need a better check.  Ideally, we would use another
59267c478bd9Sstevel@tonic-gate 	 * vnodeops so that hlocked and forcibly unmounted file
59277c478bd9Sstevel@tonic-gate 	 * systems would return EIO where appropriate and w/o the
59287c478bd9Sstevel@tonic-gate 	 * need for these checks.
59297c478bd9Sstevel@tonic-gate 	 */
59307c478bd9Sstevel@tonic-gate 	if ((ufsvfsp = ip->i_ufsvfs) == NULL)
59317c478bd9Sstevel@tonic-gate 		return (EIO);
59327c478bd9Sstevel@tonic-gate 
5933bc69f433Saguzovsk 	/*
5934bc69f433Saguzovsk 	 * For vmpss (pp can be NULL) case respect the quiesce protocol.
5935bc69f433Saguzovsk 	 * ul_lock must be taken before locking pages so we can't use it here
5936bc69f433Saguzovsk 	 * if pp is non NULL because segvn already locked pages
5937bc69f433Saguzovsk 	 * SE_EXCL. Instead we rely on the fact that a forced umount or
5938bc69f433Saguzovsk 	 * applying a filesystem lock via ufs_fiolfs() will block in the
5939bc69f433Saguzovsk 	 * implicit call to ufs_flush() until we unlock the pages after the
5940bc69f433Saguzovsk 	 * return to segvn. Other ufs_quiesce() callers keep ufs_quiesce_pend
5941bc69f433Saguzovsk 	 * above 0 until they are done. We have to be careful not to increment
5942bc69f433Saguzovsk 	 * ul_vnops_cnt here after forceful unmount hlocks the file system.
5943bc69f433Saguzovsk 	 *
5944bc69f433Saguzovsk 	 * If pp is NULL use ul_lock to make sure we don't increment
5945bc69f433Saguzovsk 	 * ul_vnops_cnt after forceful unmount hlocks the file system.
5946bc69f433Saguzovsk 	 */
5947bc69f433Saguzovsk 	if (vmpss || pp == NULL) {
5948bc69f433Saguzovsk 		ulp = &ufsvfsp->vfs_ulockfs;
5949bc69f433Saguzovsk 		if (pp == NULL)
5950bc69f433Saguzovsk 			mutex_enter(&ulp->ul_lock);
5951bc69f433Saguzovsk 		if (ulp->ul_fs_lock & ULOCKFS_GETREAD_MASK) {
5952bc69f433Saguzovsk 			if (pp == NULL) {
5953bc69f433Saguzovsk 				mutex_exit(&ulp->ul_lock);
5954bc69f433Saguzovsk 			}
5955bc69f433Saguzovsk 			return (vmpss ? EIO : EINVAL);
5956bc69f433Saguzovsk 		}
59571a5e258fSJosef 'Jeff' Sipek 		atomic_inc_ulong(&ulp->ul_vnops_cnt);
5958bc69f433Saguzovsk 		if (pp == NULL)
5959bc69f433Saguzovsk 			mutex_exit(&ulp->ul_lock);
5960bc69f433Saguzovsk 		if (ufs_quiesce_pend) {
59611a5e258fSJosef 'Jeff' Sipek 			if (!atomic_dec_ulong_nv(&ulp->ul_vnops_cnt))
5962bc69f433Saguzovsk 				cv_broadcast(&ulp->ul_cv);
5963bc69f433Saguzovsk 			return (vmpss ? EIO : EINVAL);
5964bc69f433Saguzovsk 		}
5965bc69f433Saguzovsk 	}
5966bc69f433Saguzovsk 
59677c478bd9Sstevel@tonic-gate 	if (dolock) {
59687c478bd9Sstevel@tonic-gate 		/*
59697c478bd9Sstevel@tonic-gate 		 * segvn may call VOP_PAGEIO() instead of VOP_GETPAGE() to
59707c478bd9Sstevel@tonic-gate 		 * handle a fault against a segment that maps vnode pages with
59717c478bd9Sstevel@tonic-gate 		 * large mappings.  Segvn creates pages and holds them locked
59727c478bd9Sstevel@tonic-gate 		 * SE_EXCL during VOP_PAGEIO() call. In this case we have to
59737c478bd9Sstevel@tonic-gate 		 * use rw_tryenter() to avoid a potential deadlock since in
59747c478bd9Sstevel@tonic-gate 		 * lock order i_contents needs to be taken first.
59757c478bd9Sstevel@tonic-gate 		 * Segvn will retry via VOP_GETPAGE() if VOP_PAGEIO() fails.
59767c478bd9Sstevel@tonic-gate 		 */
59777c478bd9Sstevel@tonic-gate 		if (!vmpss) {
59787c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_contents, RW_READER);
59797c478bd9Sstevel@tonic-gate 		} else if (!rw_tryenter(&ip->i_contents, RW_READER)) {
59801a5e258fSJosef 'Jeff' Sipek 			if (!atomic_dec_ulong_nv(&ulp->ul_vnops_cnt))
5981bc69f433Saguzovsk 				cv_broadcast(&ulp->ul_cv);
59827c478bd9Sstevel@tonic-gate 			return (EDEADLK);
59837c478bd9Sstevel@tonic-gate 		}
59847c478bd9Sstevel@tonic-gate 	}
59857c478bd9Sstevel@tonic-gate 
598637fbc076Saguzovsk 	/*
598737fbc076Saguzovsk 	 * Return an error to segvn because the pagefault request is beyond
598837fbc076Saguzovsk 	 * PAGESIZE rounded EOF.
598937fbc076Saguzovsk 	 */
599037fbc076Saguzovsk 	if (vmpss && btopr(io_off + io_len) > btopr(ip->i_size)) {
599137fbc076Saguzovsk 		if (dolock)
599237fbc076Saguzovsk 			rw_exit(&ip->i_contents);
59931a5e258fSJosef 'Jeff' Sipek 		if (!atomic_dec_ulong_nv(&ulp->ul_vnops_cnt))
5994bc69f433Saguzovsk 			cv_broadcast(&ulp->ul_cv);
599537fbc076Saguzovsk 		return (EFAULT);
599637fbc076Saguzovsk 	}
599737fbc076Saguzovsk 
59987c478bd9Sstevel@tonic-gate 	if (pp == NULL) {
59997c478bd9Sstevel@tonic-gate 		if (bmap_has_holes(ip)) {
60007c478bd9Sstevel@tonic-gate 			err = ENOSYS;
60017c478bd9Sstevel@tonic-gate 		} else {
60027c478bd9Sstevel@tonic-gate 			err = EINVAL;
60037c478bd9Sstevel@tonic-gate 		}
60047c478bd9Sstevel@tonic-gate 		if (dolock)
60057c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
60061a5e258fSJosef 'Jeff' Sipek 		if (!atomic_dec_ulong_nv(&ulp->ul_vnops_cnt))
6007bc69f433Saguzovsk 			cv_broadcast(&ulp->ul_cv);
60087c478bd9Sstevel@tonic-gate 		return (err);
60097c478bd9Sstevel@tonic-gate 	}
60107c478bd9Sstevel@tonic-gate 
60117c478bd9Sstevel@tonic-gate 	/*
60127c478bd9Sstevel@tonic-gate 	 * Break the io request into chunks, one for each contiguous
60137c478bd9Sstevel@tonic-gate 	 * stretch of disk blocks in the target file.
60147c478bd9Sstevel@tonic-gate 	 */
60157c478bd9Sstevel@tonic-gate 	while (done_len < io_len) {
60167c478bd9Sstevel@tonic-gate 		ASSERT(cpp);
60177c478bd9Sstevel@tonic-gate 		contig = 0;
60187c478bd9Sstevel@tonic-gate 		if (err = bmap_read(ip, (u_offset_t)(io_off + done_len),
601980d34432Sfrankho 		    &bn, &contig))
60207c478bd9Sstevel@tonic-gate 			break;
60217c478bd9Sstevel@tonic-gate 
60227c478bd9Sstevel@tonic-gate 		if (bn == UFS_HOLE) {	/* No holey swapfiles */
60237c478bd9Sstevel@tonic-gate 			if (vmpss) {
60247c478bd9Sstevel@tonic-gate 				err = EFAULT;
60257c478bd9Sstevel@tonic-gate 				break;
60267c478bd9Sstevel@tonic-gate 			}
60277c478bd9Sstevel@tonic-gate 			err = ufs_fault(ITOV(ip), "ufs_pageio: bn == UFS_HOLE");
60287c478bd9Sstevel@tonic-gate 			break;
60297c478bd9Sstevel@tonic-gate 		}
60307c478bd9Sstevel@tonic-gate 
60317c478bd9Sstevel@tonic-gate 		cur_len = MIN(io_len - done_len, contig);
60327c478bd9Sstevel@tonic-gate 		/*
60337c478bd9Sstevel@tonic-gate 		 * Zero out a page beyond EOF, when the last block of
60347c478bd9Sstevel@tonic-gate 		 * a file is a UFS fragment so that ufs_pageio() can be used
60357c478bd9Sstevel@tonic-gate 		 * instead of ufs_getpage() to handle faults against
60367c478bd9Sstevel@tonic-gate 		 * segvn segments that use large pages.
60377c478bd9Sstevel@tonic-gate 		 */
60387c478bd9Sstevel@tonic-gate 		page_list_break(&cpp, &npp, btopr(cur_len));
60397c478bd9Sstevel@tonic-gate 		if ((flags & B_READ) && (cur_len & PAGEOFFSET)) {
60407c478bd9Sstevel@tonic-gate 			size_t xlen = cur_len & PAGEOFFSET;
60417c478bd9Sstevel@tonic-gate 			pagezero(cpp->p_prev, xlen, PAGESIZE - xlen);
60427c478bd9Sstevel@tonic-gate 		}
60437c478bd9Sstevel@tonic-gate 
60447c478bd9Sstevel@tonic-gate 		bp = pageio_setup(cpp, cur_len, ip->i_devvp, flags);
60457c478bd9Sstevel@tonic-gate 		ASSERT(bp != NULL);
60467c478bd9Sstevel@tonic-gate 
60477c478bd9Sstevel@tonic-gate 		bp->b_edev = ip->i_dev;
60487c478bd9Sstevel@tonic-gate 		bp->b_dev = cmpdev(ip->i_dev);
60497c478bd9Sstevel@tonic-gate 		bp->b_blkno = bn;
60507c478bd9Sstevel@tonic-gate 		bp->b_un.b_addr = (caddr_t)0;
60517c478bd9Sstevel@tonic-gate 		bp->b_file = ip->i_vnode;
60527c478bd9Sstevel@tonic-gate 
6053d3d50737SRafael Vanoni 		ufsvfsp->vfs_iotstamp = ddi_get_lbolt();
60547c478bd9Sstevel@tonic-gate 		ub.ub_pageios.value.ul++;
60557c478bd9Sstevel@tonic-gate 		if (ufsvfsp->vfs_snapshot)
60567c478bd9Sstevel@tonic-gate 			fssnap_strategy(&(ufsvfsp->vfs_snapshot), bp);
60577c478bd9Sstevel@tonic-gate 		else
60587c478bd9Sstevel@tonic-gate 			(void) bdev_strategy(bp);
60597c478bd9Sstevel@tonic-gate 
60607c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60617c478bd9Sstevel@tonic-gate 			ufs_pageio_reads++;
60627c478bd9Sstevel@tonic-gate 		else
60637c478bd9Sstevel@tonic-gate 			ufs_pageio_writes++;
60647c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60657c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_INBLK, 1);
60667c478bd9Sstevel@tonic-gate 		else
60677c478bd9Sstevel@tonic-gate 			lwp_stat_update(LWP_STAT_OUBLK, 1);
60687c478bd9Sstevel@tonic-gate 		/*
60697c478bd9Sstevel@tonic-gate 		 * If the request is not B_ASYNC, wait for i/o to complete
60707c478bd9Sstevel@tonic-gate 		 * and re-assemble the page list to return to the caller.
60717c478bd9Sstevel@tonic-gate 		 * If it is B_ASYNC we leave the page list in pieces and
60727c478bd9Sstevel@tonic-gate 		 * cleanup() will dispose of them.
60737c478bd9Sstevel@tonic-gate 		 */
60747c478bd9Sstevel@tonic-gate 		if ((flags & B_ASYNC) == 0) {
60757c478bd9Sstevel@tonic-gate 			err = biowait(bp);
60767c478bd9Sstevel@tonic-gate 			pageio_done(bp);
60777c478bd9Sstevel@tonic-gate 			if (err)
60787c478bd9Sstevel@tonic-gate 				break;
60797c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &cpp);
60807c478bd9Sstevel@tonic-gate 		}
60817c478bd9Sstevel@tonic-gate 		cpp = npp;
60827c478bd9Sstevel@tonic-gate 		npp = NULL;
60837c478bd9Sstevel@tonic-gate 		if (flags & B_READ)
60847c478bd9Sstevel@tonic-gate 			cur_len = P2ROUNDUP_TYPED(cur_len, PAGESIZE, size_t);
60857c478bd9Sstevel@tonic-gate 		done_len += cur_len;
60867c478bd9Sstevel@tonic-gate 	}
60877c478bd9Sstevel@tonic-gate 	ASSERT(err || (cpp == NULL && npp == NULL && done_len == io_len));
60887c478bd9Sstevel@tonic-gate 	if (err) {
60897c478bd9Sstevel@tonic-gate 		if (flags & B_ASYNC) {
60907c478bd9Sstevel@tonic-gate 			/* Cleanup unprocessed parts of list */
60917c478bd9Sstevel@tonic-gate 			page_list_concat(&cpp, &npp);
60927c478bd9Sstevel@tonic-gate 			if (flags & B_READ)
60937c478bd9Sstevel@tonic-gate 				pvn_read_done(cpp, B_ERROR);
60947c478bd9Sstevel@tonic-gate 			else
60957c478bd9Sstevel@tonic-gate 				pvn_write_done(cpp, B_ERROR);
60967c478bd9Sstevel@tonic-gate 		} else {
60977c478bd9Sstevel@tonic-gate 			/* Re-assemble list and let caller clean up */
60987c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &cpp);
60997c478bd9Sstevel@tonic-gate 			page_list_concat(&opp, &npp);
61007c478bd9Sstevel@tonic-gate 		}
61017c478bd9Sstevel@tonic-gate 	}
6102bc69f433Saguzovsk 
6103bc69f433Saguzovsk 	if (vmpss && !(ip->i_flag & IACC) && !ULOCKFS_IS_NOIACC(ulp) &&
6104bc69f433Saguzovsk 	    ufsvfsp->vfs_fs->fs_ronly == 0 && !ufsvfsp->vfs_noatime) {
6105bc69f433Saguzovsk 		mutex_enter(&ip->i_tlock);
6106bc69f433Saguzovsk 		ip->i_flag |= IACC;
6107bc69f433Saguzovsk 		ITIMES_NOLOCK(ip);
6108bc69f433Saguzovsk 		mutex_exit(&ip->i_tlock);
6109bc69f433Saguzovsk 	}
6110bc69f433Saguzovsk 
61117c478bd9Sstevel@tonic-gate 	if (dolock)
61127c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
61131a5e258fSJosef 'Jeff' Sipek 	if (vmpss && !atomic_dec_ulong_nv(&ulp->ul_vnops_cnt))
6114bc69f433Saguzovsk 		cv_broadcast(&ulp->ul_cv);
61157c478bd9Sstevel@tonic-gate 	return (err);
61167c478bd9Sstevel@tonic-gate }
61177c478bd9Sstevel@tonic-gate 
61187c478bd9Sstevel@tonic-gate /*
61197c478bd9Sstevel@tonic-gate  * Called when the kernel is in a frozen state to dump data
61207c478bd9Sstevel@tonic-gate  * directly to the device. It uses a private dump data structure,
61217c478bd9Sstevel@tonic-gate  * set up by dump_ctl, to locate the correct disk block to which to dump.
61227c478bd9Sstevel@tonic-gate  */
6123da6c28aaSamw /*ARGSUSED*/
61247c478bd9Sstevel@tonic-gate static int
6125d7334e51Srm ufs_dump(vnode_t *vp, caddr_t addr, offset_t ldbn, offset_t dblks,
6126d7334e51Srm     caller_context_t *ct)
61277c478bd9Sstevel@tonic-gate {
61287c478bd9Sstevel@tonic-gate 	u_offset_t	file_size;
61297c478bd9Sstevel@tonic-gate 	struct inode    *ip = VTOI(vp);
61307c478bd9Sstevel@tonic-gate 	struct fs	*fs = ip->i_fs;
61317c478bd9Sstevel@tonic-gate 	daddr_t		dbn, lfsbn;
61327c478bd9Sstevel@tonic-gate 	int		disk_blks = fs->fs_bsize >> DEV_BSHIFT;
61337c478bd9Sstevel@tonic-gate 	int		error = 0;
61347c478bd9Sstevel@tonic-gate 	int		ndbs, nfsbs;
61357c478bd9Sstevel@tonic-gate 
61367c478bd9Sstevel@tonic-gate 	/*
61377c478bd9Sstevel@tonic-gate 	 * forced unmount case
61387c478bd9Sstevel@tonic-gate 	 */
61397c478bd9Sstevel@tonic-gate 	if (ip->i_ufsvfs == NULL)
61407c478bd9Sstevel@tonic-gate 		return (EIO);
61417c478bd9Sstevel@tonic-gate 	/*
61427c478bd9Sstevel@tonic-gate 	 * Validate the inode that it has not been modified since
61437c478bd9Sstevel@tonic-gate 	 * the dump structure is allocated.
61447c478bd9Sstevel@tonic-gate 	 */
61457c478bd9Sstevel@tonic-gate 	mutex_enter(&ip->i_tlock);
61467c478bd9Sstevel@tonic-gate 	if ((dump_info == NULL) ||
61477c478bd9Sstevel@tonic-gate 	    (dump_info->ip != ip) ||
61487c478bd9Sstevel@tonic-gate 	    (dump_info->time.tv_sec != ip->i_mtime.tv_sec) ||
61497c478bd9Sstevel@tonic-gate 	    (dump_info->time.tv_usec != ip->i_mtime.tv_usec)) {
61507c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
61517c478bd9Sstevel@tonic-gate 		return (-1);
61527c478bd9Sstevel@tonic-gate 	}
61537c478bd9Sstevel@tonic-gate 	mutex_exit(&ip->i_tlock);
61547c478bd9Sstevel@tonic-gate 
61557c478bd9Sstevel@tonic-gate 	/*
61567c478bd9Sstevel@tonic-gate 	 * See that the file has room for this write
61577c478bd9Sstevel@tonic-gate 	 */
61587c478bd9Sstevel@tonic-gate 	UFS_GET_ISIZE(&file_size, ip);
61597c478bd9Sstevel@tonic-gate 
6160d7334e51Srm 	if (ldbtob(ldbn + dblks) > file_size)
61617c478bd9Sstevel@tonic-gate 		return (ENOSPC);
61627c478bd9Sstevel@tonic-gate 
61637c478bd9Sstevel@tonic-gate 	/*
61647c478bd9Sstevel@tonic-gate 	 * Find the physical disk block numbers from the dump
61657c478bd9Sstevel@tonic-gate 	 * private data structure directly and write out the data
61667c478bd9Sstevel@tonic-gate 	 * in contiguous block lumps
61677c478bd9Sstevel@tonic-gate 	 */
61687c478bd9Sstevel@tonic-gate 	while (dblks > 0 && !error) {
6169d7334e51Srm 		lfsbn = (daddr_t)lblkno(fs, ldbtob(ldbn));
61707c478bd9Sstevel@tonic-gate 		dbn = fsbtodb(fs, dump_info->dblk[lfsbn]) + ldbn % disk_blks;
61717c478bd9Sstevel@tonic-gate 		nfsbs = 1;
61727c478bd9Sstevel@tonic-gate 		ndbs = disk_blks - ldbn % disk_blks;
61737c478bd9Sstevel@tonic-gate 		while (ndbs < dblks && fsbtodb(fs, dump_info->dblk[lfsbn +
61747c478bd9Sstevel@tonic-gate 		    nfsbs]) == dbn + ndbs) {
61757c478bd9Sstevel@tonic-gate 			nfsbs++;
61767c478bd9Sstevel@tonic-gate 			ndbs += disk_blks;
61777c478bd9Sstevel@tonic-gate 		}
61787c478bd9Sstevel@tonic-gate 		if (ndbs > dblks)
61797c478bd9Sstevel@tonic-gate 			ndbs = dblks;
61807c478bd9Sstevel@tonic-gate 		error = bdev_dump(ip->i_dev, addr, dbn, ndbs);
61817c478bd9Sstevel@tonic-gate 		addr += ldbtob((offset_t)ndbs);
61827c478bd9Sstevel@tonic-gate 		dblks -= ndbs;
61837c478bd9Sstevel@tonic-gate 		ldbn += ndbs;
61847c478bd9Sstevel@tonic-gate 	}
61857c478bd9Sstevel@tonic-gate 	return (error);
61867c478bd9Sstevel@tonic-gate 
61877c478bd9Sstevel@tonic-gate }
61887c478bd9Sstevel@tonic-gate 
61897c478bd9Sstevel@tonic-gate /*
61907c478bd9Sstevel@tonic-gate  * Prepare the file system before and after the dump operation.
61917c478bd9Sstevel@tonic-gate  *
61927c478bd9Sstevel@tonic-gate  * action = DUMP_ALLOC:
61937c478bd9Sstevel@tonic-gate  * Preparation before dump, allocate dump private data structure
61947c478bd9Sstevel@tonic-gate  * to hold all the direct and indirect block info for dump.
61957c478bd9Sstevel@tonic-gate  *
61967c478bd9Sstevel@tonic-gate  * action = DUMP_FREE:
61977c478bd9Sstevel@tonic-gate  * Clean up after dump, deallocate the dump private data structure.
61987c478bd9Sstevel@tonic-gate  *
61997c478bd9Sstevel@tonic-gate  * action = DUMP_SCAN:
62007c478bd9Sstevel@tonic-gate  * Scan dump_info for *blkp DEV_BSIZE blocks of contig fs space;
62017c478bd9Sstevel@tonic-gate  * if found, the starting file-relative DEV_BSIZE lbn is written
62027c478bd9Sstevel@tonic-gate  * to *bklp; that lbn is intended for use with VOP_DUMP()
62037c478bd9Sstevel@tonic-gate  */
6204da6c28aaSamw /*ARGSUSED*/
62057c478bd9Sstevel@tonic-gate static int
6206d7334e51Srm ufs_dumpctl(vnode_t *vp, int action, offset_t *blkp, caller_context_t *ct)
62077c478bd9Sstevel@tonic-gate {
62087c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
62097c478bd9Sstevel@tonic-gate 	ufsvfs_t	*ufsvfsp = ip->i_ufsvfs;
62107c478bd9Sstevel@tonic-gate 	struct fs	*fs;
62117c478bd9Sstevel@tonic-gate 	daddr32_t	*dblk, *storeblk;
62127c478bd9Sstevel@tonic-gate 	daddr32_t	*nextblk, *endblk;
62137c478bd9Sstevel@tonic-gate 	struct buf	*bp;
62147c478bd9Sstevel@tonic-gate 	int		i, entry, entries;
62157c478bd9Sstevel@tonic-gate 	int		n, ncontig;
62167c478bd9Sstevel@tonic-gate 
62177c478bd9Sstevel@tonic-gate 	/*
62187c478bd9Sstevel@tonic-gate 	 * check for forced unmount
62197c478bd9Sstevel@tonic-gate 	 */
62207c478bd9Sstevel@tonic-gate 	if (ufsvfsp == NULL)
62217c478bd9Sstevel@tonic-gate 		return (EIO);
62227c478bd9Sstevel@tonic-gate 
62237c478bd9Sstevel@tonic-gate 	if (action == DUMP_ALLOC) {
62247c478bd9Sstevel@tonic-gate 		/*
62257c478bd9Sstevel@tonic-gate 		 * alloc and record dump_info
62267c478bd9Sstevel@tonic-gate 		 */
62277c478bd9Sstevel@tonic-gate 		if (dump_info != NULL)
62287c478bd9Sstevel@tonic-gate 			return (EINVAL);
62297c478bd9Sstevel@tonic-gate 
62307c478bd9Sstevel@tonic-gate 		ASSERT(vp->v_type == VREG);
62317c478bd9Sstevel@tonic-gate 		fs = ufsvfsp->vfs_fs;
62327c478bd9Sstevel@tonic-gate 
62337c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
62347c478bd9Sstevel@tonic-gate 
62357c478bd9Sstevel@tonic-gate 		if (bmap_has_holes(ip)) {
62367c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_contents);
62377c478bd9Sstevel@tonic-gate 			return (EFAULT);
62387c478bd9Sstevel@tonic-gate 		}
62397c478bd9Sstevel@tonic-gate 
62407c478bd9Sstevel@tonic-gate 		/*
62417c478bd9Sstevel@tonic-gate 		 * calculate and allocate space needed according to i_size
62427c478bd9Sstevel@tonic-gate 		 */
62437c478bd9Sstevel@tonic-gate 		entries = (int)lblkno(fs, blkroundup(fs, ip->i_size));
624480d34432Sfrankho 		dump_info = kmem_alloc(sizeof (struct dump) +
624580d34432Sfrankho 		    (entries - 1) * sizeof (daddr32_t), KM_NOSLEEP);
624680d34432Sfrankho 		if (dump_info == NULL) {
624780d34432Sfrankho 			rw_exit(&ip->i_contents);
624880d34432Sfrankho 			return (ENOMEM);
62497c478bd9Sstevel@tonic-gate 		}
62507c478bd9Sstevel@tonic-gate 
62517c478bd9Sstevel@tonic-gate 		/* Start saving the info */
62527c478bd9Sstevel@tonic-gate 		dump_info->fsbs = entries;
62537c478bd9Sstevel@tonic-gate 		dump_info->ip = ip;
62547c478bd9Sstevel@tonic-gate 		storeblk = &dump_info->dblk[0];
62557c478bd9Sstevel@tonic-gate 
62567c478bd9Sstevel@tonic-gate 		/* Direct Blocks */
62577c478bd9Sstevel@tonic-gate 		for (entry = 0; entry < NDADDR && entry < entries; entry++)
62587c478bd9Sstevel@tonic-gate 			*storeblk++ = ip->i_db[entry];
62597c478bd9Sstevel@tonic-gate 
62607c478bd9Sstevel@tonic-gate 		/* Indirect Blocks */
62617c478bd9Sstevel@tonic-gate 		for (i = 0; i < NIADDR; i++) {
62627c478bd9Sstevel@tonic-gate 			int error = 0;
62637c478bd9Sstevel@tonic-gate 
62647c478bd9Sstevel@tonic-gate 			bp = UFS_BREAD(ufsvfsp,
626580d34432Sfrankho 			    ip->i_dev, fsbtodb(fs, ip->i_ib[i]), fs->fs_bsize);
62667c478bd9Sstevel@tonic-gate 			if (bp->b_flags & B_ERROR)
62677c478bd9Sstevel@tonic-gate 				error = EIO;
62687c478bd9Sstevel@tonic-gate 			else {
62697c478bd9Sstevel@tonic-gate 				dblk = bp->b_un.b_daddr;
62707c478bd9Sstevel@tonic-gate 				if ((storeblk = save_dblks(ip, ufsvfsp,
62717c478bd9Sstevel@tonic-gate 				    storeblk, dblk, i, entries)) == NULL)
62727c478bd9Sstevel@tonic-gate 					error = EIO;
62737c478bd9Sstevel@tonic-gate 			}
62747c478bd9Sstevel@tonic-gate 
62757c478bd9Sstevel@tonic-gate 			brelse(bp);
62767c478bd9Sstevel@tonic-gate 
62777c478bd9Sstevel@tonic-gate 			if (error != 0) {
62787c478bd9Sstevel@tonic-gate 				kmem_free(dump_info, sizeof (struct dump) +
62797c478bd9Sstevel@tonic-gate 				    (entries - 1) * sizeof (daddr32_t));
62807c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_contents);
62817c478bd9Sstevel@tonic-gate 				dump_info = NULL;
62827c478bd9Sstevel@tonic-gate 				return (error);
62837c478bd9Sstevel@tonic-gate 			}
62847c478bd9Sstevel@tonic-gate 		}
62857c478bd9Sstevel@tonic-gate 		/* and time stamp the information */
62867c478bd9Sstevel@tonic-gate 		mutex_enter(&ip->i_tlock);
62877c478bd9Sstevel@tonic-gate 		dump_info->time = ip->i_mtime;
62887c478bd9Sstevel@tonic-gate 		mutex_exit(&ip->i_tlock);
62897c478bd9Sstevel@tonic-gate 
62907c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
62917c478bd9Sstevel@tonic-gate 	} else if (action == DUMP_FREE) {
62927c478bd9Sstevel@tonic-gate 		/*
62937c478bd9Sstevel@tonic-gate 		 * free dump_info
62947c478bd9Sstevel@tonic-gate 		 */
62957c478bd9Sstevel@tonic-gate 		if (dump_info == NULL)
62967c478bd9Sstevel@tonic-gate 			return (EINVAL);
62977c478bd9Sstevel@tonic-gate 		entries = dump_info->fsbs - 1;
62987c478bd9Sstevel@tonic-gate 		kmem_free(dump_info, sizeof (struct dump) +
62997c478bd9Sstevel@tonic-gate 		    entries * sizeof (daddr32_t));
63007c478bd9Sstevel@tonic-gate 		dump_info = NULL;
63017c478bd9Sstevel@tonic-gate 	} else if (action == DUMP_SCAN) {
63027c478bd9Sstevel@tonic-gate 		/*
63037c478bd9Sstevel@tonic-gate 		 * scan dump_info
63047c478bd9Sstevel@tonic-gate 		 */
63057c478bd9Sstevel@tonic-gate 		if (dump_info == NULL)
63067c478bd9Sstevel@tonic-gate 			return (EINVAL);
63077c478bd9Sstevel@tonic-gate 
63087c478bd9Sstevel@tonic-gate 		dblk = dump_info->dblk;
63097c478bd9Sstevel@tonic-gate 		nextblk = dblk + 1;
63107c478bd9Sstevel@tonic-gate 		endblk = dblk + dump_info->fsbs - 1;
63117c478bd9Sstevel@tonic-gate 		fs = ufsvfsp->vfs_fs;
63127c478bd9Sstevel@tonic-gate 		ncontig = *blkp >> (fs->fs_bshift - DEV_BSHIFT);
63137c478bd9Sstevel@tonic-gate 
63147c478bd9Sstevel@tonic-gate 		/*
63157c478bd9Sstevel@tonic-gate 		 * scan dblk[] entries; contig fs space is found when:
63167c478bd9Sstevel@tonic-gate 		 * ((current blkno + frags per block) == next blkno)
63177c478bd9Sstevel@tonic-gate 		 */
63187c478bd9Sstevel@tonic-gate 		n = 0;
63197c478bd9Sstevel@tonic-gate 		while (n < ncontig && dblk < endblk) {
63207c478bd9Sstevel@tonic-gate 			if ((*dblk + fs->fs_frag) == *nextblk)
63217c478bd9Sstevel@tonic-gate 				n++;
63227c478bd9Sstevel@tonic-gate 			else
63237c478bd9Sstevel@tonic-gate 				n = 0;
63247c478bd9Sstevel@tonic-gate 			dblk++;
63257c478bd9Sstevel@tonic-gate 			nextblk++;
63267c478bd9Sstevel@tonic-gate 		}
63277c478bd9Sstevel@tonic-gate 
63287c478bd9Sstevel@tonic-gate 		/*
63297c478bd9Sstevel@tonic-gate 		 * index is where size bytes of contig space begins;
63307c478bd9Sstevel@tonic-gate 		 * conversion from index to the file's DEV_BSIZE lbn
63317c478bd9Sstevel@tonic-gate 		 * is equivalent to:  (index * fs_bsize) / DEV_BSIZE
63327c478bd9Sstevel@tonic-gate 		 */
63337c478bd9Sstevel@tonic-gate 		if (n == ncontig) {
63347c478bd9Sstevel@tonic-gate 			i = (dblk - dump_info->dblk) - ncontig;
63357c478bd9Sstevel@tonic-gate 			*blkp = i << (fs->fs_bshift - DEV_BSHIFT);
63367c478bd9Sstevel@tonic-gate 		} else
63377c478bd9Sstevel@tonic-gate 			return (EFAULT);
63387c478bd9Sstevel@tonic-gate 	}
63397c478bd9Sstevel@tonic-gate 	return (0);
63407c478bd9Sstevel@tonic-gate }
63417c478bd9Sstevel@tonic-gate 
63427c478bd9Sstevel@tonic-gate /*
63437c478bd9Sstevel@tonic-gate  * Recursive helper function for ufs_dumpctl().  It follows the indirect file
63447c478bd9Sstevel@tonic-gate  * system  blocks until it reaches the the disk block addresses, which are
63457c478bd9Sstevel@tonic-gate  * then stored into the given buffer, storeblk.
63467c478bd9Sstevel@tonic-gate  */
63477c478bd9Sstevel@tonic-gate static daddr32_t *
63487c478bd9Sstevel@tonic-gate save_dblks(struct inode *ip, struct ufsvfs *ufsvfsp,  daddr32_t *storeblk,
63497c478bd9Sstevel@tonic-gate     daddr32_t *dblk, int level, int entries)
63507c478bd9Sstevel@tonic-gate {
63517c478bd9Sstevel@tonic-gate 	struct fs	*fs = ufsvfsp->vfs_fs;
63527c478bd9Sstevel@tonic-gate 	struct buf	*bp;
63537c478bd9Sstevel@tonic-gate 	int		i;
63547c478bd9Sstevel@tonic-gate 
63557c478bd9Sstevel@tonic-gate 	if (level == 0) {
63567c478bd9Sstevel@tonic-gate 		for (i = 0; i < NINDIR(fs); i++) {
63577c478bd9Sstevel@tonic-gate 			if (storeblk - dump_info->dblk >= entries)
63587c478bd9Sstevel@tonic-gate 				break;
63597c478bd9Sstevel@tonic-gate 			*storeblk++ = dblk[i];
63607c478bd9Sstevel@tonic-gate 		}
63617c478bd9Sstevel@tonic-gate 		return (storeblk);
63627c478bd9Sstevel@tonic-gate 	}
63637c478bd9Sstevel@tonic-gate 	for (i = 0; i < NINDIR(fs); i++) {
63647c478bd9Sstevel@tonic-gate 		if (storeblk - dump_info->dblk >= entries)
63657c478bd9Sstevel@tonic-gate 			break;
63667c478bd9Sstevel@tonic-gate 		bp = UFS_BREAD(ufsvfsp,
636780d34432Sfrankho 		    ip->i_dev, fsbtodb(fs, dblk[i]), fs->fs_bsize);
63687c478bd9Sstevel@tonic-gate 		if (bp->b_flags & B_ERROR) {
63697c478bd9Sstevel@tonic-gate 			brelse(bp);
63707c478bd9Sstevel@tonic-gate 			return (NULL);
63717c478bd9Sstevel@tonic-gate 		}
63727c478bd9Sstevel@tonic-gate 		storeblk = save_dblks(ip, ufsvfsp, storeblk, bp->b_un.b_daddr,
63737c478bd9Sstevel@tonic-gate 		    level - 1, entries);
63747c478bd9Sstevel@tonic-gate 		brelse(bp);
63757c478bd9Sstevel@tonic-gate 
63767c478bd9Sstevel@tonic-gate 		if (storeblk == NULL)
63777c478bd9Sstevel@tonic-gate 			return (NULL);
63787c478bd9Sstevel@tonic-gate 	}
63797c478bd9Sstevel@tonic-gate 	return (storeblk);
63807c478bd9Sstevel@tonic-gate }
63817c478bd9Sstevel@tonic-gate 
63827c478bd9Sstevel@tonic-gate /* ARGSUSED */
63837c478bd9Sstevel@tonic-gate static int
63847c478bd9Sstevel@tonic-gate ufs_getsecattr(struct vnode *vp, vsecattr_t *vsap, int flag,
6385*80d5689fSPatrick Mooney     struct cred *cr, caller_context_t *ct)
63867c478bd9Sstevel@tonic-gate {
63877c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
63887c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp;
63897c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = ip->i_ufsvfs;
63907c478bd9Sstevel@tonic-gate 	ulong_t		vsa_mask = vsap->vsa_mask;
63917c478bd9Sstevel@tonic-gate 	int		err = EINVAL;
63927c478bd9Sstevel@tonic-gate 
63937c478bd9Sstevel@tonic-gate 	vsa_mask &= (VSA_ACL | VSA_ACLCNT | VSA_DFACL | VSA_DFACLCNT);
63947c478bd9Sstevel@tonic-gate 
63957c478bd9Sstevel@tonic-gate 	/*
63967c478bd9Sstevel@tonic-gate 	 * Only grab locks if needed - they're not needed to check vsa_mask
63977c478bd9Sstevel@tonic-gate 	 * or if the mask contains no acl flags.
63987c478bd9Sstevel@tonic-gate 	 */
63997c478bd9Sstevel@tonic-gate 	if (vsa_mask != 0) {
64007c478bd9Sstevel@tonic-gate 		if (err = ufs_lockfs_begin(ufsvfsp, &ulp,
64017c478bd9Sstevel@tonic-gate 		    ULOCKFS_GETATTR_MASK))
64027c478bd9Sstevel@tonic-gate 			return (err);
64037c478bd9Sstevel@tonic-gate 
64047c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_contents, RW_READER);
64057c478bd9Sstevel@tonic-gate 		err = ufs_acl_get(ip, vsap, flag, cr);
64067c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_contents);
64077c478bd9Sstevel@tonic-gate 
64087c478bd9Sstevel@tonic-gate 		if (ulp)
64097c478bd9Sstevel@tonic-gate 			ufs_lockfs_end(ulp);
64107c478bd9Sstevel@tonic-gate 	}
64117c478bd9Sstevel@tonic-gate 	return (err);
64127c478bd9Sstevel@tonic-gate }
64137c478bd9Sstevel@tonic-gate 
64147c478bd9Sstevel@tonic-gate /* ARGSUSED */
64157c478bd9Sstevel@tonic-gate static int
6416da6c28aaSamw ufs_setsecattr(struct vnode *vp, vsecattr_t *vsap, int flag, struct cred *cr,
6417*80d5689fSPatrick Mooney     caller_context_t *ct)
64187c478bd9Sstevel@tonic-gate {
64197c478bd9Sstevel@tonic-gate 	struct inode	*ip = VTOI(vp);
64207c478bd9Sstevel@tonic-gate 	struct ulockfs	*ulp = NULL;
64217c478bd9Sstevel@tonic-gate 	struct ufsvfs	*ufsvfsp = VTOI(vp)->i_ufsvfs;
64227c478bd9Sstevel@tonic-gate 	ulong_t		vsa_mask = vsap->vsa_mask;
64237c478bd9Sstevel@tonic-gate 	int		err;
64247c478bd9Sstevel@tonic-gate 	int		haverwlock = 1;
64257c478bd9Sstevel@tonic-gate 	int		trans_size;
64267c478bd9Sstevel@tonic-gate 	int		donetrans = 0;
64277c478bd9Sstevel@tonic-gate 	int		retry = 1;
64287c478bd9Sstevel@tonic-gate 
64297c478bd9Sstevel@tonic-gate 	ASSERT(RW_LOCK_HELD(&ip->i_rwlock));
64307c478bd9Sstevel@tonic-gate 
64317c478bd9Sstevel@tonic-gate 	/* Abort now if the request is either empty or invalid. */
64327c478bd9Sstevel@tonic-gate 	vsa_mask &= (VSA_ACL | VSA_ACLCNT | VSA_DFACL | VSA_DFACLCNT);
64337c478bd9Sstevel@tonic-gate 	if ((vsa_mask == 0) ||
64347c478bd9Sstevel@tonic-gate 	    ((vsap->vsa_aclentp == NULL) &&
64357c478bd9Sstevel@tonic-gate 	    (vsap->vsa_dfaclentp == NULL))) {
64367c478bd9Sstevel@tonic-gate 		err = EINVAL;
64377c478bd9Sstevel@tonic-gate 		goto out;
64387c478bd9Sstevel@tonic-gate 	}
64397c478bd9Sstevel@tonic-gate 
64407c478bd9Sstevel@tonic-gate 	/*
64417c478bd9Sstevel@tonic-gate 	 * Following convention, if this is a directory then we acquire the
64427c478bd9Sstevel@tonic-gate 	 * inode's i_rwlock after starting a UFS logging transaction;
64437c478bd9Sstevel@tonic-gate 	 * otherwise, we acquire it beforehand. Since we were called (and
64447c478bd9Sstevel@tonic-gate 	 * must therefore return) with the lock held, we will have to drop it,
64457c478bd9Sstevel@tonic-gate 	 * and later reacquire it, if operating on a directory.
64467c478bd9Sstevel@tonic-gate 	 */
64477c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
64487c478bd9Sstevel@tonic-gate 		rw_exit(&ip->i_rwlock);
64497c478bd9Sstevel@tonic-gate 		haverwlock = 0;
64507c478bd9Sstevel@tonic-gate 	} else {
64517c478bd9Sstevel@tonic-gate 		/* Upgrade the lock if required. */
64527c478bd9Sstevel@tonic-gate 		if (!rw_write_held(&ip->i_rwlock)) {
64537c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
64547c478bd9Sstevel@tonic-gate 			rw_enter(&ip->i_rwlock, RW_WRITER);
64557c478bd9Sstevel@tonic-gate 		}
64567c478bd9Sstevel@tonic-gate 	}
64577c478bd9Sstevel@tonic-gate 
64587c478bd9Sstevel@tonic-gate again:
64597c478bd9Sstevel@tonic-gate 	ASSERT(!(vp->v_type == VDIR && haverwlock));
64607c478bd9Sstevel@tonic-gate 	if (err = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_SETATTR_MASK)) {
64617c478bd9Sstevel@tonic-gate 		ulp = NULL;
64627c478bd9Sstevel@tonic-gate 		retry = 0;
64637c478bd9Sstevel@tonic-gate 		goto out;
64647c478bd9Sstevel@tonic-gate 	}
64657c478bd9Sstevel@tonic-gate 
64667c478bd9Sstevel@tonic-gate 	/*
64677c478bd9Sstevel@tonic-gate 	 * Check that the file system supports this operation. Note that
64687c478bd9Sstevel@tonic-gate 	 * ufs_lockfs_begin() will have checked that the file system had
64697c478bd9Sstevel@tonic-gate 	 * not been forcibly unmounted.
64707c478bd9Sstevel@tonic-gate 	 */
64717c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_fs->fs_ronly) {
64727c478bd9Sstevel@tonic-gate 		err = EROFS;
64737c478bd9Sstevel@tonic-gate 		goto out;
64747c478bd9Sstevel@tonic-gate 	}
64757c478bd9Sstevel@tonic-gate 	if (ufsvfsp->vfs_nosetsec) {
64767c478bd9Sstevel@tonic-gate 		err = ENOSYS;
64777c478bd9Sstevel@tonic-gate 		goto out;
64787c478bd9Sstevel@tonic-gate 	}
64797c478bd9Sstevel@tonic-gate 
64807c478bd9Sstevel@tonic-gate 	if (ulp) {
64817c478bd9Sstevel@tonic-gate 		TRANS_BEGIN_ASYNC(ufsvfsp, TOP_SETSECATTR,
648280d34432Sfrankho 		    trans_size = TOP_SETSECATTR_SIZE(VTOI(vp)));
64837c478bd9Sstevel@tonic-gate 		donetrans = 1;
64847c478bd9Sstevel@tonic-gate 	}
64857c478bd9Sstevel@tonic-gate 
64867c478bd9Sstevel@tonic-gate 	if (vp->v_type == VDIR) {
64877c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_WRITER);
64887c478bd9Sstevel@tonic-gate 		haverwlock = 1;
64897c478bd9Sstevel@tonic-gate 	}
64907c478bd9Sstevel@tonic-gate 
64917c478bd9Sstevel@tonic-gate 	ASSERT(haverwlock);
64927c478bd9Sstevel@tonic-gate 
64937c478bd9Sstevel@tonic-gate 	/* Do the actual work. */
64947c478bd9Sstevel@tonic-gate 	rw_enter(&ip->i_contents, RW_WRITER);
64957c478bd9Sstevel@tonic-gate 	/*
64967c478bd9Sstevel@tonic-gate 	 * Suppress out of inodes messages if we will retry.
64977c478bd9Sstevel@tonic-gate 	 */
64987c478bd9Sstevel@tonic-gate 	if (retry)
64997c478bd9Sstevel@tonic-gate 		ip->i_flag |= IQUIET;
65007c478bd9Sstevel@tonic-gate 	err = ufs_acl_set(ip, vsap, flag, cr);
65017c478bd9Sstevel@tonic-gate 	ip->i_flag &= ~IQUIET;
65027c478bd9Sstevel@tonic-gate 	rw_exit(&ip->i_contents);
65037c478bd9Sstevel@tonic-gate 
65047c478bd9Sstevel@tonic-gate out:
65057c478bd9Sstevel@tonic-gate 	if (ulp) {
65067c478bd9Sstevel@tonic-gate 		if (donetrans) {
65077c478bd9Sstevel@tonic-gate 			/*
65087c478bd9Sstevel@tonic-gate 			 * top_end_async() can eventually call
65097c478bd9Sstevel@tonic-gate 			 * top_end_sync(), which can block. We must
65107c478bd9Sstevel@tonic-gate 			 * therefore observe the lock-ordering protocol
65117c478bd9Sstevel@tonic-gate 			 * here as well.
65127c478bd9Sstevel@tonic-gate 			 */
65137c478bd9Sstevel@tonic-gate 			if (vp->v_type == VDIR) {
65147c478bd9Sstevel@tonic-gate 				rw_exit(&ip->i_rwlock);
65157c478bd9Sstevel@tonic-gate 				haverwlock = 0;
65167c478bd9Sstevel@tonic-gate 			}
65177c478bd9Sstevel@tonic-gate 			TRANS_END_ASYNC(ufsvfsp, TOP_SETSECATTR, trans_size);
65187c478bd9Sstevel@tonic-gate 		}
65197c478bd9Sstevel@tonic-gate 		ufs_lockfs_end(ulp);
65207c478bd9Sstevel@tonic-gate 	}
65217c478bd9Sstevel@tonic-gate 	/*
65227c478bd9Sstevel@tonic-gate 	 * If no inodes available, try scaring a logically-
65237c478bd9Sstevel@tonic-gate 	 * free one out of the delete queue to someplace
65247c478bd9Sstevel@tonic-gate 	 * that we can find it.
65257c478bd9Sstevel@tonic-gate 	 */
65267c478bd9Sstevel@tonic-gate 	if ((err == ENOSPC) && retry && TRANS_ISTRANS(ufsvfsp)) {
65277c478bd9Sstevel@tonic-gate 		ufs_delete_drain_wait(ufsvfsp, 1);
65287c478bd9Sstevel@tonic-gate 		retry = 0;
65297c478bd9Sstevel@tonic-gate 		if (vp->v_type == VDIR && haverwlock) {
65307c478bd9Sstevel@tonic-gate 			rw_exit(&ip->i_rwlock);
65317c478bd9Sstevel@tonic-gate 			haverwlock = 0;
65327c478bd9Sstevel@tonic-gate 		}
65337c478bd9Sstevel@tonic-gate 		goto again;
65347c478bd9Sstevel@tonic-gate 	}
65357c478bd9Sstevel@tonic-gate 	/*
65367c478bd9Sstevel@tonic-gate 	 * If we need to reacquire the lock then it is safe to do so
65377c478bd9Sstevel@tonic-gate 	 * as a reader. This is because ufs_rwunlock(), which will be
65387c478bd9Sstevel@tonic-gate 	 * called by our caller after we return, does not differentiate
65397c478bd9Sstevel@tonic-gate 	 * between shared and exclusive locks.
65407c478bd9Sstevel@tonic-gate 	 */
65417c478bd9Sstevel@tonic-gate 	if (!haverwlock) {
65427c478bd9Sstevel@tonic-gate 		ASSERT(vp->v_type == VDIR);
65437c478bd9Sstevel@tonic-gate 		rw_enter(&ip->i_rwlock, RW_READER);
65447c478bd9Sstevel@tonic-gate 	}
65457c478bd9Sstevel@tonic-gate 
65467c478bd9Sstevel@tonic-gate 	return (err);
65477c478bd9Sstevel@tonic-gate }
65489b5097eeSOwen Roberts 
65499b5097eeSOwen Roberts /*
65509b5097eeSOwen Roberts  * Locate the vnode to be used for an event notification. As this will
65519b5097eeSOwen Roberts  * be called prior to the name space change perform basic verification
65529b5097eeSOwen Roberts  * that the change will be allowed.
65539b5097eeSOwen Roberts  */
65549b5097eeSOwen Roberts 
65559b5097eeSOwen Roberts static int
65569b5097eeSOwen Roberts ufs_eventlookup(struct vnode *dvp, char *nm, struct cred *cr,
65579b5097eeSOwen Roberts     struct vnode **vpp)
65589b5097eeSOwen Roberts {
65599b5097eeSOwen Roberts 	int	namlen;
65609b5097eeSOwen Roberts 	int	error;
65619b5097eeSOwen Roberts 	struct vnode	*vp;
65629b5097eeSOwen Roberts 	struct inode	*ip;
65639b5097eeSOwen Roberts 	struct inode	*xip;
65649b5097eeSOwen Roberts 	struct ufsvfs	*ufsvfsp;
65659b5097eeSOwen Roberts 	struct ulockfs	*ulp;
65669b5097eeSOwen Roberts 
65679b5097eeSOwen Roberts 	ip = VTOI(dvp);
65689b5097eeSOwen Roberts 	*vpp = NULL;
65699b5097eeSOwen Roberts 
65709b5097eeSOwen Roberts 	if ((namlen = strlen(nm)) == 0)
65719b5097eeSOwen Roberts 		return (EINVAL);
65729b5097eeSOwen Roberts 
65739b5097eeSOwen Roberts 	if (nm[0] == '.') {
65749b5097eeSOwen Roberts 		if (namlen == 1)
65759b5097eeSOwen Roberts 			return (EINVAL);
65769b5097eeSOwen Roberts 		else if ((namlen == 2) && nm[1] == '.') {
65779b5097eeSOwen Roberts 			return (EEXIST);
65789b5097eeSOwen Roberts 		}
65799b5097eeSOwen Roberts 	}
65809b5097eeSOwen Roberts 
65819b5097eeSOwen Roberts 	/*
65829b5097eeSOwen Roberts 	 * Check accessibility and write access of parent directory as we
65839b5097eeSOwen Roberts 	 * only want to post the event if we're able to make a change.
65849b5097eeSOwen Roberts 	 */
65859b5097eeSOwen Roberts 	if (error = ufs_diraccess(ip, IEXEC|IWRITE, cr))
65869b5097eeSOwen Roberts 		return (error);
65879b5097eeSOwen Roberts 
65889b5097eeSOwen Roberts 	if (vp = dnlc_lookup(dvp, nm)) {
65899b5097eeSOwen Roberts 		if (vp == DNLC_NO_VNODE) {
65909b5097eeSOwen Roberts 			VN_RELE(vp);
65919b5097eeSOwen Roberts 			return (ENOENT);
65929b5097eeSOwen Roberts 		}
65939b5097eeSOwen Roberts 
65949b5097eeSOwen Roberts 		*vpp = vp;
65959b5097eeSOwen Roberts 		return (0);
65969b5097eeSOwen Roberts 	}
65979b5097eeSOwen Roberts 
65989b5097eeSOwen Roberts 	/*
65999b5097eeSOwen Roberts 	 * Keep the idle queue from getting too long by idling two
66009b5097eeSOwen Roberts 	 * inodes before attempting to allocate another.
66019b5097eeSOwen Roberts 	 * This operation must be performed before entering lockfs
66029b5097eeSOwen Roberts 	 * or a transaction.
66039b5097eeSOwen Roberts 	 */
66049b5097eeSOwen Roberts 	if (ufs_idle_q.uq_ne > ufs_idle_q.uq_hiwat)
66059b5097eeSOwen Roberts 		if ((curthread->t_flag & T_DONTBLOCK) == 0) {
66069b5097eeSOwen Roberts 			ins.in_lidles.value.ul += ufs_lookup_idle_count;
66079b5097eeSOwen Roberts 			ufs_idle_some(ufs_lookup_idle_count);
66089b5097eeSOwen Roberts 		}
66099b5097eeSOwen Roberts 
66109b5097eeSOwen Roberts 	ufsvfsp = ip->i_ufsvfs;
66119b5097eeSOwen Roberts 
66129b5097eeSOwen Roberts retry_lookup:
66139b5097eeSOwen Roberts 	if (error = ufs_lockfs_begin(ufsvfsp, &ulp, ULOCKFS_LOOKUP_MASK))
66149b5097eeSOwen Roberts 		return (error);
66159b5097eeSOwen Roberts 
66169b5097eeSOwen Roberts 	if ((error = ufs_dirlook(ip, nm, &xip, cr, 1, 1)) == 0) {
66179b5097eeSOwen Roberts 		vp = ITOV(xip);
66189b5097eeSOwen Roberts 		*vpp = vp;
66199b5097eeSOwen Roberts 	}
66209b5097eeSOwen Roberts 
66219b5097eeSOwen Roberts 	if (ulp) {
66229b5097eeSOwen Roberts 		ufs_lockfs_end(ulp);
66239b5097eeSOwen Roberts 	}
66249b5097eeSOwen Roberts 
66259b5097eeSOwen Roberts 	if (error == EAGAIN)
66269b5097eeSOwen Roberts 		goto retry_lookup;
66279b5097eeSOwen Roberts 
66289b5097eeSOwen Roberts 	return (error);
66299b5097eeSOwen Roberts }
6630