]>
Commit | Line | Data |
---|---|---|
9bccf70c | 1 | /* |
316670eb | 2 | * Copyright (c) 2000-2012 Apple Inc. All rights reserved. |
5d5c5d0d | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
9bccf70c | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
8f6c56a5 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
8f6c56a5 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
9bccf70c A |
27 | */ |
28 | ||
29 | #include <sys/systm.h> | |
cf7d32b8 | 30 | #include <sys/param.h> |
b0d623f7 | 31 | #include <sys/kernel.h> |
91447636 | 32 | #include <sys/file_internal.h> |
9bccf70c A |
33 | #include <sys/dirent.h> |
34 | #include <sys/stat.h> | |
35 | #include <sys/buf.h> | |
316670eb | 36 | #include <sys/buf_internal.h> |
9bccf70c | 37 | #include <sys/mount.h> |
2d21ac55 | 38 | #include <sys/vnode_if.h> |
91447636 | 39 | #include <sys/vnode_internal.h> |
9bccf70c | 40 | #include <sys/malloc.h> |
9bccf70c | 41 | #include <sys/ubc.h> |
2d21ac55 | 42 | #include <sys/ubc_internal.h> |
91447636 | 43 | #include <sys/paths.h> |
9bccf70c | 44 | #include <sys/quota.h> |
55e303ae A |
45 | #include <sys/time.h> |
46 | #include <sys/disk.h> | |
91447636 A |
47 | #include <sys/kauth.h> |
48 | #include <sys/uio_internal.h> | |
6d2010ae A |
49 | #include <sys/fsctl.h> |
50 | #include <sys/cprotect.h> | |
316670eb | 51 | #include <sys/xattr.h> |
6d2010ae | 52 | #include <string.h> |
9bccf70c A |
53 | |
54 | #include <miscfs/specfs/specdev.h> | |
55 | #include <miscfs/fifofs/fifo.h> | |
56 | #include <vfs/vfs_support.h> | |
57 | #include <machine/spl.h> | |
58 | ||
59 | #include <sys/kdebug.h> | |
3a60a9f5 | 60 | #include <sys/sysctl.h> |
9bccf70c A |
61 | |
62 | #include "hfs.h" | |
63 | #include "hfs_catalog.h" | |
64 | #include "hfs_cnode.h" | |
9bccf70c A |
65 | #include "hfs_dbg.h" |
66 | #include "hfs_mount.h" | |
67 | #include "hfs_quota.h" | |
68 | #include "hfs_endian.h" | |
69 | ||
70 | #include "hfscommon/headers/BTreesInternal.h" | |
71 | #include "hfscommon/headers/FileMgrInternal.h" | |
72 | ||
55e303ae | 73 | #define KNDETACH_VNLOCKED 0x00000001 |
9bccf70c | 74 | |
9bccf70c A |
75 | /* Global vfs data structures for hfs */ |
76 | ||
3a60a9f5 A |
77 | /* Always F_FULLFSYNC? 1=yes,0=no (default due to "various" reasons is 'no') */ |
78 | int always_do_fullfsync = 0; | |
b0d623f7 | 79 | SYSCTL_DECL(_vfs_generic); |
6d2010ae | 80 | SYSCTL_INT (_vfs_generic, OID_AUTO, always_do_fullfsync, CTLFLAG_RW | CTLFLAG_LOCKED, &always_do_fullfsync, 0, "always F_FULLFSYNC when fsync is called"); |
9bccf70c | 81 | |
6d2010ae | 82 | int hfs_makenode(struct vnode *dvp, struct vnode **vpp, |
91447636 A |
83 | struct componentname *cnp, struct vnode_attr *vap, |
84 | vfs_context_t ctx); | |
6d2010ae A |
85 | int hfs_metasync(struct hfsmount *hfsmp, daddr64_t node, __unused struct proc *p); |
86 | int hfs_metasync_all(struct hfsmount *hfsmp); | |
9bccf70c | 87 | |
6d2010ae A |
88 | int hfs_removedir(struct vnode *, struct vnode *, struct componentname *, |
89 | int, int); | |
90 | int hfs_removefile(struct vnode *, struct vnode *, struct componentname *, | |
91 | int, int, int, struct vnode *, int); | |
9bccf70c | 92 | |
316670eb A |
93 | /* Used here and in cnode teardown -- for symlinks */ |
94 | int hfs_removefile_callback(struct buf *bp, void *hfsmp); | |
95 | ||
6d2010ae A |
96 | int hfs_movedata (struct vnode *, struct vnode*); |
97 | static int hfs_move_fork (struct filefork *srcfork, struct cnode *src, | |
98 | struct filefork *dstfork, struct cnode *dst); | |
55e303ae | 99 | |
2d21ac55 A |
100 | #if FIFO |
101 | static int hfsfifo_read(struct vnop_read_args *); | |
102 | static int hfsfifo_write(struct vnop_write_args *); | |
103 | static int hfsfifo_close(struct vnop_close_args *); | |
2d21ac55 A |
104 | |
105 | extern int (**fifo_vnodeop_p)(void *); | |
106 | #endif /* FIFO */ | |
91447636 | 107 | |
6d2010ae A |
108 | int hfs_vnop_close(struct vnop_close_args*); |
109 | int hfs_vnop_create(struct vnop_create_args*); | |
110 | int hfs_vnop_exchange(struct vnop_exchange_args*); | |
111 | int hfs_vnop_fsync(struct vnop_fsync_args*); | |
112 | int hfs_vnop_mkdir(struct vnop_mkdir_args*); | |
113 | int hfs_vnop_mknod(struct vnop_mknod_args*); | |
114 | int hfs_vnop_getattr(struct vnop_getattr_args*); | |
115 | int hfs_vnop_open(struct vnop_open_args*); | |
116 | int hfs_vnop_readdir(struct vnop_readdir_args*); | |
117 | int hfs_vnop_remove(struct vnop_remove_args*); | |
118 | int hfs_vnop_rename(struct vnop_rename_args*); | |
119 | int hfs_vnop_rmdir(struct vnop_rmdir_args*); | |
120 | int hfs_vnop_symlink(struct vnop_symlink_args*); | |
121 | int hfs_vnop_setattr(struct vnop_setattr_args*); | |
122 | int hfs_vnop_readlink(struct vnop_readlink_args *); | |
123 | int hfs_vnop_pathconf(struct vnop_pathconf_args *); | |
124 | int hfs_vnop_whiteout(struct vnop_whiteout_args *); | |
125 | int hfs_vnop_mmap(struct vnop_mmap_args *ap); | |
126 | int hfsspec_read(struct vnop_read_args *); | |
127 | int hfsspec_write(struct vnop_write_args *); | |
128 | int hfsspec_close(struct vnop_close_args *); | |
55e303ae A |
129 | |
130 | /* Options for hfs_removedir and hfs_removefile */ | |
91447636 | 131 | #define HFSRM_SKIP_RESERVE 0x01 |
55e303ae A |
132 | |
133 | ||
9bccf70c | 134 | |
9bccf70c A |
135 | |
136 | /***************************************************************************** | |
137 | * | |
138 | * Common Operations on vnodes | |
139 | * | |
140 | *****************************************************************************/ | |
141 | ||
316670eb A |
142 | /* |
143 | * Is the given cnode either the .journal or .journal_info_block file on | |
144 | * a volume with an active journal? Many VNOPs use this to deny access | |
145 | * to those files. | |
146 | * | |
147 | * Note: the .journal file on a volume with an external journal still | |
148 | * returns true here, even though it does not actually hold the contents | |
149 | * of the volume's journal. | |
150 | */ | |
151 | static _Bool | |
152 | hfs_is_journal_file(struct hfsmount *hfsmp, struct cnode *cp) | |
153 | { | |
154 | if (hfsmp->jnl != NULL && | |
155 | (cp->c_fileid == hfsmp->hfs_jnlinfoblkid || | |
156 | cp->c_fileid == hfsmp->hfs_jnlfileid)) { | |
157 | return true; | |
158 | } else { | |
159 | return false; | |
160 | } | |
161 | } | |
162 | ||
9bccf70c | 163 | /* |
91447636 A |
164 | * Create a regular file. |
165 | */ | |
6d2010ae | 166 | int |
91447636 | 167 | hfs_vnop_create(struct vnop_create_args *ap) |
9bccf70c | 168 | { |
2d21ac55 A |
169 | int error; |
170 | ||
171 | again: | |
172 | error = hfs_makenode(ap->a_dvp, ap->a_vpp, ap->a_cnp, ap->a_vap, ap->a_context); | |
173 | ||
174 | /* | |
175 | * We speculatively skipped the original lookup of the leaf | |
176 | * for CREATE. Since it exists, go get it as long as they | |
177 | * didn't want an exclusive create. | |
178 | */ | |
179 | if ((error == EEXIST) && !(ap->a_vap->va_vaflags & VA_EXCLUSIVE)) { | |
180 | struct vnop_lookup_args args; | |
181 | ||
182 | args.a_desc = &vnop_lookup_desc; | |
183 | args.a_dvp = ap->a_dvp; | |
184 | args.a_vpp = ap->a_vpp; | |
185 | args.a_cnp = ap->a_cnp; | |
186 | args.a_context = ap->a_context; | |
187 | args.a_cnp->cn_nameiop = LOOKUP; | |
188 | error = hfs_vnop_lookup(&args); | |
189 | /* | |
190 | * We can also race with remove for this file. | |
191 | */ | |
192 | if (error == ENOENT) { | |
193 | goto again; | |
194 | } | |
195 | ||
196 | /* Make sure it was file. */ | |
197 | if ((error == 0) && !vnode_isreg(*args.a_vpp)) { | |
198 | vnode_put(*args.a_vpp); | |
6d2010ae | 199 | *args.a_vpp = NULLVP; |
2d21ac55 A |
200 | error = EEXIST; |
201 | } | |
202 | args.a_cnp->cn_nameiop = CREATE; | |
203 | } | |
204 | return (error); | |
9bccf70c A |
205 | } |
206 | ||
9bccf70c | 207 | /* |
91447636 A |
208 | * Make device special file. |
209 | */ | |
6d2010ae | 210 | int |
91447636 | 211 | hfs_vnop_mknod(struct vnop_mknod_args *ap) |
9bccf70c | 212 | { |
91447636 A |
213 | struct vnode_attr *vap = ap->a_vap; |
214 | struct vnode *dvp = ap->a_dvp; | |
9bccf70c A |
215 | struct vnode **vpp = ap->a_vpp; |
216 | struct cnode *cp; | |
217 | int error; | |
218 | ||
91447636 A |
219 | if (VTOVCB(dvp)->vcbSigWord != kHFSPlusSigWord) { |
220 | return (ENOTSUP); | |
9bccf70c A |
221 | } |
222 | ||
223 | /* Create the vnode */ | |
91447636 | 224 | error = hfs_makenode(dvp, vpp, ap->a_cnp, vap, ap->a_context); |
9bccf70c A |
225 | if (error) |
226 | return (error); | |
91447636 | 227 | |
9bccf70c | 228 | cp = VTOC(*vpp); |
91447636 A |
229 | cp->c_touch_acctime = TRUE; |
230 | cp->c_touch_chgtime = TRUE; | |
231 | cp->c_touch_modtime = TRUE; | |
232 | ||
9bccf70c A |
233 | if ((vap->va_rdev != VNOVAL) && |
234 | (vap->va_type == VBLK || vap->va_type == VCHR)) | |
235 | cp->c_rdev = vap->va_rdev; | |
91447636 | 236 | |
9bccf70c A |
237 | return (0); |
238 | } | |
239 | ||
b0d623f7 A |
240 | #if HFS_COMPRESSION |
241 | /* | |
242 | * hfs_ref_data_vp(): returns the data fork vnode for a given cnode. | |
243 | * In the (hopefully rare) case where the data fork vnode is not | |
244 | * present, it will use hfs_vget() to create a new vnode for the | |
245 | * data fork. | |
246 | * | |
247 | * NOTE: If successful and a vnode is returned, the caller is responsible | |
248 | * for releasing the returned vnode with vnode_rele(). | |
249 | */ | |
250 | static int | |
251 | hfs_ref_data_vp(struct cnode *cp, struct vnode **data_vp, int skiplock) | |
252 | { | |
7e4a7d39 A |
253 | int vref = 0; |
254 | ||
b0d623f7 A |
255 | if (!data_vp || !cp) /* sanity check incoming parameters */ |
256 | return EINVAL; | |
257 | ||
258 | /* maybe we should take the hfs cnode lock here, and if so, use the skiplock parameter to tell us not to */ | |
259 | ||
260 | if (!skiplock) hfs_lock(cp, HFS_SHARED_LOCK); | |
261 | struct vnode *c_vp = cp->c_vp; | |
262 | if (c_vp) { | |
263 | /* we already have a data vnode */ | |
264 | *data_vp = c_vp; | |
7e4a7d39 | 265 | vref = vnode_ref(*data_vp); |
b0d623f7 | 266 | if (!skiplock) hfs_unlock(cp); |
7e4a7d39 A |
267 | if (vref == 0) { |
268 | return 0; | |
269 | } | |
270 | return EINVAL; | |
b0d623f7 A |
271 | } |
272 | /* no data fork vnode in the cnode, so ask hfs for one. */ | |
273 | ||
274 | if (!cp->c_rsrc_vp) { | |
275 | /* if we don't have either a c_vp or c_rsrc_vp, we can't really do anything useful */ | |
276 | *data_vp = NULL; | |
277 | if (!skiplock) hfs_unlock(cp); | |
278 | return EINVAL; | |
279 | } | |
280 | ||
6d2010ae | 281 | if (0 == hfs_vget(VTOHFS(cp->c_rsrc_vp), cp->c_cnid, data_vp, 1, 0) && |
b0d623f7 | 282 | 0 != data_vp) { |
7e4a7d39 | 283 | vref = vnode_ref(*data_vp); |
b0d623f7 A |
284 | vnode_put(*data_vp); |
285 | if (!skiplock) hfs_unlock(cp); | |
7e4a7d39 A |
286 | if (vref == 0) { |
287 | return 0; | |
288 | } | |
289 | return EINVAL; | |
b0d623f7 A |
290 | } |
291 | /* there was an error getting the vnode */ | |
292 | *data_vp = NULL; | |
293 | if (!skiplock) hfs_unlock(cp); | |
294 | return EINVAL; | |
295 | } | |
296 | ||
297 | /* | |
298 | * hfs_lazy_init_decmpfs_cnode(): returns the decmpfs_cnode for a cnode, | |
299 | * allocating it if necessary; returns NULL if there was an allocation error | |
300 | */ | |
301 | static decmpfs_cnode * | |
302 | hfs_lazy_init_decmpfs_cnode(struct cnode *cp) | |
303 | { | |
304 | if (!cp->c_decmp) { | |
305 | decmpfs_cnode *dp = NULL; | |
306 | MALLOC_ZONE(dp, decmpfs_cnode *, sizeof(decmpfs_cnode), M_DECMPFS_CNODE, M_WAITOK); | |
307 | if (!dp) { | |
308 | /* error allocating a decmpfs cnode */ | |
309 | return NULL; | |
310 | } | |
311 | decmpfs_cnode_init(dp); | |
312 | if (!OSCompareAndSwapPtr(NULL, dp, (void * volatile *)&cp->c_decmp)) { | |
313 | /* another thread got here first, so free the decmpfs_cnode we allocated */ | |
314 | decmpfs_cnode_destroy(dp); | |
315 | FREE_ZONE(dp, sizeof(*dp), M_DECMPFS_CNODE); | |
316 | } | |
317 | } | |
318 | ||
319 | return cp->c_decmp; | |
320 | } | |
321 | ||
322 | /* | |
323 | * hfs_file_is_compressed(): returns 1 if the file is compressed, and 0 (zero) if not. | |
324 | * if the file's compressed flag is set, makes sure that the decmpfs_cnode field | |
325 | * is allocated by calling hfs_lazy_init_decmpfs_cnode(), then makes sure it is populated, | |
326 | * or else fills it in via the decmpfs_file_is_compressed() function. | |
327 | */ | |
328 | int | |
329 | hfs_file_is_compressed(struct cnode *cp, int skiplock) | |
330 | { | |
331 | int ret = 0; | |
332 | ||
333 | /* fast check to see if file is compressed. If flag is clear, just answer no */ | |
316670eb | 334 | if (!(cp->c_bsdflags & UF_COMPRESSED)) { |
b0d623f7 A |
335 | return 0; |
336 | } | |
337 | ||
338 | decmpfs_cnode *dp = hfs_lazy_init_decmpfs_cnode(cp); | |
339 | if (!dp) { | |
340 | /* error allocating a decmpfs cnode, treat the file as uncompressed */ | |
341 | return 0; | |
342 | } | |
343 | ||
344 | /* flag was set, see if the decmpfs_cnode state is valid (zero == invalid) */ | |
345 | uint32_t decmpfs_state = decmpfs_cnode_get_vnode_state(dp); | |
346 | switch(decmpfs_state) { | |
347 | case FILE_IS_COMPRESSED: | |
348 | case FILE_IS_CONVERTING: /* treat decompressing files as if they are compressed */ | |
349 | return 1; | |
350 | case FILE_IS_NOT_COMPRESSED: | |
351 | return 0; | |
352 | /* otherwise the state is not cached yet */ | |
353 | } | |
354 | ||
355 | /* decmpfs hasn't seen this file yet, so call decmpfs_file_is_compressed() to init the decmpfs_cnode struct */ | |
356 | struct vnode *data_vp = NULL; | |
357 | if (0 == hfs_ref_data_vp(cp, &data_vp, skiplock)) { | |
358 | if (data_vp) { | |
359 | ret = decmpfs_file_is_compressed(data_vp, VTOCMP(data_vp)); // fill in decmpfs_cnode | |
360 | vnode_rele(data_vp); | |
361 | } | |
362 | } | |
363 | return ret; | |
364 | } | |
365 | ||
366 | /* hfs_uncompressed_size_of_compressed_file() - get the uncompressed size of the file. | |
367 | * if the caller has passed a valid vnode (has a ref count > 0), then hfsmp and fid are not required. | |
368 | * if the caller doesn't have a vnode, pass NULL in vp, and pass valid hfsmp and fid. | |
369 | * files size is returned in size (required) | |
6d2010ae A |
370 | * if the indicated file is a directory (or something that doesn't have a data fork), then this call |
371 | * will return an error and the caller should fall back to treating the item as an uncompressed file | |
b0d623f7 A |
372 | */ |
373 | int | |
374 | hfs_uncompressed_size_of_compressed_file(struct hfsmount *hfsmp, struct vnode *vp, cnid_t fid, off_t *size, int skiplock) | |
375 | { | |
376 | int ret = 0; | |
377 | int putaway = 0; /* flag to remember if we used hfs_vget() */ | |
378 | ||
379 | if (!size) { | |
380 | return EINVAL; /* no place to put the file size */ | |
381 | } | |
382 | ||
383 | if (NULL == vp) { | |
384 | if (!hfsmp || !fid) { /* make sure we have the required parameters */ | |
385 | return EINVAL; | |
386 | } | |
6d2010ae | 387 | if (0 != hfs_vget(hfsmp, fid, &vp, skiplock, 0)) { /* vnode is null, use hfs_vget() to get it */ |
b0d623f7 A |
388 | vp = NULL; |
389 | } else { | |
390 | putaway = 1; /* note that hfs_vget() was used to aquire the vnode */ | |
391 | } | |
392 | } | |
393 | /* this double check for compression (hfs_file_is_compressed) | |
394 | * ensures the cached size is present in case decmpfs hasn't | |
395 | * encountered this node yet. | |
396 | */ | |
6d2010ae A |
397 | if (vp) { |
398 | if (hfs_file_is_compressed(VTOC(vp), skiplock) ) { | |
399 | *size = decmpfs_cnode_get_vnode_cached_size(VTOCMP(vp)); /* file info will be cached now, so get size */ | |
400 | } else { | |
401 | if (VTOCMP(vp) && VTOCMP(vp)->cmp_type >= CMP_MAX) { | |
402 | if (VTOCMP(vp)->cmp_type != DATALESS_CMPFS_TYPE) { | |
403 | // if we don't recognize this type, just use the real data fork size | |
404 | if (VTOC(vp)->c_datafork) { | |
405 | *size = VTOC(vp)->c_datafork->ff_size; | |
406 | ret = 0; | |
407 | } else { | |
408 | ret = EINVAL; | |
409 | } | |
410 | } else { | |
411 | *size = decmpfs_cnode_get_vnode_cached_size(VTOCMP(vp)); /* file info will be cached now, so get size */ | |
412 | ret = 0; | |
413 | } | |
414 | } else { | |
415 | ret = EINVAL; | |
416 | } | |
417 | } | |
b0d623f7 A |
418 | } |
419 | ||
420 | if (putaway) { /* did we use hfs_vget() to get this vnode? */ | |
421 | vnode_put(vp); /* if so, release it and set it to null */ | |
422 | vp = NULL; | |
423 | } | |
424 | return ret; | |
425 | } | |
426 | ||
427 | int | |
428 | hfs_hides_rsrc(vfs_context_t ctx, struct cnode *cp, int skiplock) | |
429 | { | |
430 | if (ctx == decmpfs_ctx) | |
431 | return 0; | |
432 | if (!hfs_file_is_compressed(cp, skiplock)) | |
433 | return 0; | |
434 | return decmpfs_hides_rsrc(ctx, cp->c_decmp); | |
435 | } | |
436 | ||
437 | int | |
438 | hfs_hides_xattr(vfs_context_t ctx, struct cnode *cp, const char *name, int skiplock) | |
439 | { | |
440 | if (ctx == decmpfs_ctx) | |
441 | return 0; | |
442 | if (!hfs_file_is_compressed(cp, skiplock)) | |
443 | return 0; | |
444 | return decmpfs_hides_xattr(ctx, cp->c_decmp, name); | |
445 | } | |
446 | #endif /* HFS_COMPRESSION */ | |
447 | ||
9bccf70c | 448 | /* |
91447636 A |
449 | * Open a file/directory. |
450 | */ | |
6d2010ae | 451 | int |
91447636 | 452 | hfs_vnop_open(struct vnop_open_args *ap) |
9bccf70c A |
453 | { |
454 | struct vnode *vp = ap->a_vp; | |
91447636 | 455 | struct filefork *fp; |
55e303ae | 456 | struct timeval tv; |
91447636 | 457 | int error; |
b0d623f7 A |
458 | static int past_bootup = 0; |
459 | struct cnode *cp = VTOC(vp); | |
460 | struct hfsmount *hfsmp = VTOHFS(vp); | |
461 | ||
462 | #if HFS_COMPRESSION | |
463 | if (ap->a_mode & FWRITE) { | |
464 | /* open for write */ | |
465 | if ( hfs_file_is_compressed(cp, 1) ) { /* 1 == don't take the cnode lock */ | |
466 | /* opening a compressed file for write, so convert it to decompressed */ | |
467 | struct vnode *data_vp = NULL; | |
468 | error = hfs_ref_data_vp(cp, &data_vp, 1); /* 1 == don't take the cnode lock */ | |
469 | if (0 == error) { | |
470 | if (data_vp) { | |
471 | error = decmpfs_decompress_file(data_vp, VTOCMP(data_vp), -1, 1, 0); | |
472 | vnode_rele(data_vp); | |
473 | } else { | |
474 | error = EINVAL; | |
475 | } | |
476 | } | |
477 | if (error != 0) | |
478 | return error; | |
479 | } | |
480 | } else { | |
481 | /* open for read */ | |
482 | if (hfs_file_is_compressed(cp, 1) ) { /* 1 == don't take the cnode lock */ | |
483 | if (VNODE_IS_RSRC(vp)) { | |
484 | /* opening the resource fork of a compressed file, so nothing to do */ | |
485 | } else { | |
486 | /* opening a compressed file for read, make sure it validates */ | |
487 | error = decmpfs_validate_compressed_file(vp, VTOCMP(vp)); | |
488 | if (error != 0) | |
489 | return error; | |
490 | } | |
491 | } | |
492 | } | |
493 | #endif | |
9bccf70c A |
494 | |
495 | /* | |
496 | * Files marked append-only must be opened for appending. | |
497 | */ | |
316670eb | 498 | if ((cp->c_bsdflags & APPEND) && !vnode_isdir(vp) && |
9bccf70c A |
499 | (ap->a_mode & (FWRITE | O_APPEND)) == FWRITE) |
500 | return (EPERM); | |
501 | ||
91447636 A |
502 | if (vnode_isreg(vp) && !UBCINFOEXISTS(vp)) |
503 | return (EBUSY); /* file is in use by the kernel */ | |
55e303ae | 504 | |
316670eb A |
505 | /* Don't allow journal to be opened externally. */ |
506 | if (hfs_is_journal_file(hfsmp, cp)) | |
91447636 | 507 | return (EPERM); |
b0d623f7 | 508 | |
b0d623f7 A |
509 | if ((hfsmp->hfs_flags & HFS_READ_ONLY) || |
510 | (hfsmp->jnl == NULL) || | |
2d21ac55 A |
511 | #if NAMEDSTREAMS |
512 | !vnode_isreg(vp) || vnode_isinuse(vp, 0) || vnode_isnamedstream(vp)) { | |
513 | #else | |
91447636 | 514 | !vnode_isreg(vp) || vnode_isinuse(vp, 0)) { |
2d21ac55 | 515 | #endif |
55e303ae A |
516 | return (0); |
517 | } | |
91447636 | 518 | |
b0d623f7 | 519 | if ((error = hfs_lock(cp, HFS_EXCLUSIVE_LOCK))) |
91447636 | 520 | return (error); |
ebb1b9f4 A |
521 | |
522 | #if QUOTA | |
523 | /* If we're going to write to the file, initialize quotas. */ | |
524 | if ((ap->a_mode & FWRITE) && (hfsmp->hfs_flags & HFS_QUOTAS)) | |
525 | (void)hfs_getinoquota(cp); | |
526 | #endif /* QUOTA */ | |
527 | ||
528 | /* | |
529 | * On the first (non-busy) open of a fragmented | |
530 | * file attempt to de-frag it (if its less than 20MB). | |
531 | */ | |
55e303ae A |
532 | fp = VTOF(vp); |
533 | if (fp->ff_blocks && | |
534 | fp->ff_extents[7].blockCount != 0 && | |
535 | fp->ff_size <= (20 * 1024 * 1024)) { | |
b0d623f7 | 536 | int no_mods = 0; |
2d21ac55 | 537 | struct timeval now; |
55e303ae A |
538 | /* |
539 | * Wait until system bootup is done (3 min). | |
2d21ac55 A |
540 | * And don't relocate a file that's been modified |
541 | * within the past minute -- this can lead to | |
542 | * system thrashing. | |
55e303ae | 543 | */ |
b0d623f7 A |
544 | |
545 | if (!past_bootup) { | |
546 | microuptime(&tv); | |
547 | if (tv.tv_sec > (60*3)) { | |
548 | past_bootup = 1; | |
549 | } | |
550 | } | |
551 | ||
2d21ac55 | 552 | microtime(&now); |
b0d623f7 A |
553 | if ((now.tv_sec - cp->c_mtime) > 60) { |
554 | no_mods = 1; | |
555 | } | |
556 | ||
557 | if (past_bootup && no_mods) { | |
558 | (void) hfs_relocate(vp, hfsmp->nextAllocation + 4096, | |
559 | vfs_context_ucred(ap->a_context), | |
560 | vfs_context_proc(ap->a_context)); | |
55e303ae | 561 | } |
55e303ae | 562 | } |
ebb1b9f4 | 563 | |
b0d623f7 | 564 | hfs_unlock(cp); |
55e303ae | 565 | |
9bccf70c A |
566 | return (0); |
567 | } | |
568 | ||
9bccf70c | 569 | |
91447636 A |
570 | /* |
571 | * Close a file/directory. | |
572 | */ | |
6d2010ae | 573 | int |
91447636 A |
574 | hfs_vnop_close(ap) |
575 | struct vnop_close_args /* { | |
9bccf70c A |
576 | struct vnode *a_vp; |
577 | int a_fflag; | |
91447636 | 578 | vfs_context_t a_context; |
9bccf70c A |
579 | } */ *ap; |
580 | { | |
581 | register struct vnode *vp = ap->a_vp; | |
91447636 A |
582 | register struct cnode *cp; |
583 | struct proc *p = vfs_context_proc(ap->a_context); | |
584 | struct hfsmount *hfsmp; | |
585 | int busy; | |
cf7d32b8 | 586 | int tooktrunclock = 0; |
b0d623f7 | 587 | int knownrefs = 0; |
55e303ae | 588 | |
91447636 | 589 | if ( hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK) != 0) |
9bccf70c | 590 | return (0); |
91447636 A |
591 | cp = VTOC(vp); |
592 | hfsmp = VTOHFS(vp); | |
9bccf70c | 593 | |
b0d623f7 A |
594 | /* |
595 | * If the rsrc fork is a named stream, it can cause the data fork to | |
596 | * stay around, preventing de-allocation of these blocks. | |
597 | * Do checks for truncation on close. Purge extra extents if they exist. | |
598 | * Make sure the vp is not a directory, and that it has a resource fork, | |
599 | * and that resource fork is also a named stream. | |
cf7d32b8 | 600 | */ |
b0d623f7 | 601 | |
cf7d32b8 A |
602 | if ((vp->v_type == VREG) && (cp->c_rsrc_vp) |
603 | && (vnode_isnamedstream(cp->c_rsrc_vp))) { | |
604 | uint32_t blks; | |
605 | ||
606 | blks = howmany(VTOF(vp)->ff_size, VTOVCB(vp)->blockSize); | |
607 | /* | |
b0d623f7 A |
608 | * If there are extra blocks and there are only 2 refs on |
609 | * this vp (ourselves + rsrc fork holding ref on us), go ahead | |
610 | * and try to truncate. | |
cf7d32b8 A |
611 | */ |
612 | if ((blks < VTOF(vp)->ff_blocks) && (!vnode_isinuse(vp, 2))) { | |
b0d623f7 A |
613 | // release cnode lock; must acquire truncate lock BEFORE cnode lock |
614 | hfs_unlock(cp); | |
cf7d32b8 | 615 | |
6d2010ae | 616 | hfs_lock_truncate(cp, HFS_EXCLUSIVE_LOCK); |
cf7d32b8 | 617 | tooktrunclock = 1; |
b0d623f7 A |
618 | |
619 | if (hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK) != 0) { | |
6d2010ae | 620 | hfs_unlock_truncate(cp, 0); |
b0d623f7 A |
621 | // bail out if we can't re-acquire cnode lock |
622 | return 0; | |
cf7d32b8 | 623 | } |
b0d623f7 | 624 | // now re-test to make sure it's still valid |
cf7d32b8 A |
625 | if (cp->c_rsrc_vp) { |
626 | knownrefs = 1 + vnode_isnamedstream(cp->c_rsrc_vp); | |
b0d623f7 A |
627 | if (!vnode_isinuse(vp, knownrefs)){ |
628 | // now we can truncate the file, if necessary | |
cf7d32b8 | 629 | blks = howmany(VTOF(vp)->ff_size, VTOVCB(vp)->blockSize); |
b0d623f7 A |
630 | if (blks < VTOF(vp)->ff_blocks){ |
631 | (void) hfs_truncate(vp, VTOF(vp)->ff_size, IO_NDELAY, 0, 0, ap->a_context); | |
cf7d32b8 A |
632 | } |
633 | } | |
634 | } | |
635 | } | |
636 | } | |
637 | ||
b0d623f7 | 638 | |
91447636 A |
639 | // if we froze the fs and we're exiting, then "thaw" the fs |
640 | if (hfsmp->hfs_freezing_proc == p && proc_exiting(p)) { | |
641 | hfsmp->hfs_freezing_proc = NULL; | |
6d2010ae A |
642 | hfs_unlock_global (hfsmp); |
643 | lck_rw_unlock_exclusive(&hfsmp->hfs_insync); | |
91447636 | 644 | } |
9bccf70c | 645 | |
91447636 | 646 | busy = vnode_isinuse(vp, 1); |
9bccf70c | 647 | |
91447636 A |
648 | if (busy) { |
649 | hfs_touchtimes(VTOHFS(vp), cp); | |
650 | } | |
651 | if (vnode_isdir(vp)) { | |
652 | hfs_reldirhints(cp, busy); | |
653 | } else if (vnode_issystem(vp) && !busy) { | |
654 | vnode_recycle(vp); | |
9bccf70c | 655 | } |
b0d623f7 A |
656 | |
657 | if (tooktrunclock){ | |
6d2010ae | 658 | hfs_unlock_truncate(cp, 0); |
cf7d32b8 | 659 | } |
91447636 | 660 | hfs_unlock(cp); |
e2fac8b1 A |
661 | |
662 | if (ap->a_fflag & FWASWRITTEN) { | |
663 | hfs_sync_ejectable(hfsmp); | |
664 | } | |
665 | ||
9bccf70c A |
666 | return (0); |
667 | } | |
668 | ||
669 | /* | |
91447636 A |
670 | * Get basic attributes. |
671 | */ | |
6d2010ae | 672 | int |
91447636 | 673 | hfs_vnop_getattr(struct vnop_getattr_args *ap) |
9bccf70c | 674 | { |
2d21ac55 A |
675 | #define VNODE_ATTR_TIMES \ |
676 | (VNODE_ATTR_va_access_time|VNODE_ATTR_va_change_time|VNODE_ATTR_va_modify_time) | |
677 | #define VNODE_ATTR_AUTH \ | |
678 | (VNODE_ATTR_va_mode | VNODE_ATTR_va_uid | VNODE_ATTR_va_gid | \ | |
679 | VNODE_ATTR_va_flags | VNODE_ATTR_va_acl) | |
680 | ||
9bccf70c | 681 | struct vnode *vp = ap->a_vp; |
91447636 | 682 | struct vnode_attr *vap = ap->a_vap; |
935ed37a | 683 | struct vnode *rvp = NULLVP; |
91447636 A |
684 | struct hfsmount *hfsmp; |
685 | struct cnode *cp; | |
2d21ac55 | 686 | uint64_t data_size; |
91447636 A |
687 | enum vtype v_type; |
688 | int error = 0; | |
91447636 | 689 | cp = VTOC(vp); |
2d21ac55 | 690 | |
b0d623f7 A |
691 | #if HFS_COMPRESSION |
692 | /* we need to inspect the decmpfs state of the file before we take the hfs cnode lock */ | |
693 | int compressed = 0; | |
694 | int hide_size = 0; | |
695 | off_t uncompressed_size = -1; | |
696 | if (VATTR_IS_ACTIVE(vap, va_data_size) || VATTR_IS_ACTIVE(vap, va_total_alloc) || VATTR_IS_ACTIVE(vap, va_data_alloc) || VATTR_IS_ACTIVE(vap, va_total_size)) { | |
697 | /* we only care about whether the file is compressed if asked for the uncompressed size */ | |
698 | if (VNODE_IS_RSRC(vp)) { | |
699 | /* if it's a resource fork, decmpfs may want us to hide the size */ | |
700 | hide_size = hfs_hides_rsrc(ap->a_context, cp, 0); | |
701 | } else { | |
702 | /* if it's a data fork, we need to know if it was compressed so we can report the uncompressed size */ | |
703 | compressed = hfs_file_is_compressed(cp, 0); | |
704 | } | |
6d2010ae A |
705 | if ((VATTR_IS_ACTIVE(vap, va_data_size) || VATTR_IS_ACTIVE(vap, va_total_size))) { |
706 | // if it's compressed | |
707 | if (compressed || (!VNODE_IS_RSRC(vp) && cp->c_decmp && cp->c_decmp->cmp_type >= CMP_MAX)) { | |
708 | if (0 != hfs_uncompressed_size_of_compressed_file(NULL, vp, 0, &uncompressed_size, 0)) { | |
709 | /* failed to get the uncompressed size, we'll check for this later */ | |
710 | uncompressed_size = -1; | |
711 | } else { | |
712 | // fake that it's compressed | |
713 | compressed = 1; | |
714 | } | |
b0d623f7 A |
715 | } |
716 | } | |
717 | } | |
718 | #endif | |
719 | ||
2d21ac55 A |
720 | /* |
721 | * Shortcut for vnode_authorize path. Each of the attributes | |
722 | * in this set is updated atomically so we don't need to take | |
723 | * the cnode lock to access them. | |
724 | */ | |
725 | if ((vap->va_active & ~VNODE_ATTR_AUTH) == 0) { | |
726 | /* Make sure file still exists. */ | |
727 | if (cp->c_flag & C_NOEXISTS) | |
728 | return (ENOENT); | |
729 | ||
730 | vap->va_uid = cp->c_uid; | |
731 | vap->va_gid = cp->c_gid; | |
732 | vap->va_mode = cp->c_mode; | |
316670eb | 733 | vap->va_flags = cp->c_bsdflags; |
2d21ac55 A |
734 | vap->va_supported |= VNODE_ATTR_AUTH & ~VNODE_ATTR_va_acl; |
735 | ||
736 | if ((cp->c_attr.ca_recflags & kHFSHasSecurityMask) == 0) { | |
737 | vap->va_acl = (kauth_acl_t) KAUTH_FILESEC_NONE; | |
738 | VATTR_SET_SUPPORTED(vap, va_acl); | |
739 | } | |
b0d623f7 | 740 | |
2d21ac55 A |
741 | return (0); |
742 | } | |
b0d623f7 | 743 | |
91447636 | 744 | hfsmp = VTOHFS(vp); |
91447636 | 745 | v_type = vnode_vtype(vp); |
2d21ac55 A |
746 | /* |
747 | * If time attributes are requested and we have cnode times | |
748 | * that require updating, then acquire an exclusive lock on | |
749 | * the cnode before updating the times. Otherwise we can | |
750 | * just acquire a shared lock. | |
751 | */ | |
752 | if ((vap->va_active & VNODE_ATTR_TIMES) && | |
753 | (cp->c_touch_acctime || cp->c_touch_chgtime || cp->c_touch_modtime)) { | |
754 | if ((error = hfs_lock(cp, HFS_EXCLUSIVE_LOCK))) | |
755 | return (error); | |
756 | hfs_touchtimes(hfsmp, cp); | |
b0d623f7 A |
757 | } |
758 | else { | |
2d21ac55 A |
759 | if ((error = hfs_lock(cp, HFS_SHARED_LOCK))) |
760 | return (error); | |
761 | } | |
762 | ||
91447636 | 763 | if (v_type == VDIR) { |
2d21ac55 A |
764 | data_size = (cp->c_entries + 2) * AVERAGE_HFSDIRENTRY_SIZE; |
765 | ||
91447636 | 766 | if (VATTR_IS_ACTIVE(vap, va_nlink)) { |
2d21ac55 | 767 | int nlink; |
91447636 | 768 | |
2d21ac55 A |
769 | /* |
770 | * For directories, the va_nlink is esentially a count | |
771 | * of the ".." references to a directory plus the "." | |
772 | * reference and the directory itself. So for HFS+ this | |
773 | * becomes the sub-directory count plus two. | |
774 | * | |
775 | * In the absence of a sub-directory count we use the | |
776 | * directory's item count. This will be too high in | |
777 | * most cases since it also includes files. | |
778 | */ | |
779 | if ((hfsmp->hfs_flags & HFS_FOLDERCOUNT) && | |
780 | (cp->c_attr.ca_recflags & kHFSHasFolderCountMask)) | |
781 | nlink = cp->c_attr.ca_dircount; /* implied ".." entries */ | |
782 | else | |
783 | nlink = cp->c_entries; | |
784 | ||
785 | /* Account for ourself and our "." entry */ | |
786 | nlink += 2; | |
787 | /* Hide our private directories. */ | |
788 | if (cp->c_cnid == kHFSRootFolderID) { | |
789 | if (hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid != 0) { | |
790 | --nlink; | |
791 | } | |
792 | if (hfsmp->hfs_private_desc[DIR_HARDLINKS].cd_cnid != 0) { | |
793 | --nlink; | |
794 | } | |
91447636 | 795 | } |
2d21ac55 A |
796 | VATTR_RETURN(vap, va_nlink, (u_int64_t)nlink); |
797 | } | |
91447636 A |
798 | if (VATTR_IS_ACTIVE(vap, va_nchildren)) { |
799 | int entries; | |
800 | ||
801 | entries = cp->c_entries; | |
2d21ac55 A |
802 | /* Hide our private files and directories. */ |
803 | if (cp->c_cnid == kHFSRootFolderID) { | |
804 | if (hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid != 0) | |
805 | --entries; | |
806 | if (hfsmp->hfs_private_desc[DIR_HARDLINKS].cd_cnid != 0) | |
807 | --entries; | |
808 | if (hfsmp->jnl || ((hfsmp->vcbAtrb & kHFSVolumeJournaledMask) && (hfsmp->hfs_flags & HFS_READ_ONLY))) | |
809 | entries -= 2; /* hide the journal files */ | |
91447636 A |
810 | } |
811 | VATTR_RETURN(vap, va_nchildren, entries); | |
812 | } | |
2d21ac55 A |
813 | /* |
814 | * The va_dirlinkcount is the count of real directory hard links. | |
815 | * (i.e. its not the sum of the implied "." and ".." references) | |
816 | */ | |
817 | if (VATTR_IS_ACTIVE(vap, va_dirlinkcount)) { | |
818 | VATTR_RETURN(vap, va_dirlinkcount, (uint32_t)cp->c_linkcount); | |
819 | } | |
820 | } else /* !VDIR */ { | |
821 | data_size = VCTOF(vp, cp)->ff_size; | |
822 | ||
823 | VATTR_RETURN(vap, va_nlink, (u_int64_t)cp->c_linkcount); | |
824 | if (VATTR_IS_ACTIVE(vap, va_data_alloc)) { | |
825 | u_int64_t blocks; | |
826 | ||
b0d623f7 A |
827 | #if HFS_COMPRESSION |
828 | if (hide_size) { | |
829 | VATTR_RETURN(vap, va_data_alloc, 0); | |
830 | } else if (compressed) { | |
831 | /* for compressed files, we report all allocated blocks as belonging to the data fork */ | |
832 | blocks = cp->c_blocks; | |
833 | VATTR_RETURN(vap, va_data_alloc, blocks * (u_int64_t)hfsmp->blockSize); | |
834 | } | |
835 | else | |
836 | #endif | |
837 | { | |
838 | blocks = VCTOF(vp, cp)->ff_blocks; | |
839 | VATTR_RETURN(vap, va_data_alloc, blocks * (u_int64_t)hfsmp->blockSize); | |
840 | } | |
2d21ac55 | 841 | } |
91447636 | 842 | } |
9bccf70c | 843 | |
91447636 A |
844 | /* conditional because 64-bit arithmetic can be expensive */ |
845 | if (VATTR_IS_ACTIVE(vap, va_total_size)) { | |
846 | if (v_type == VDIR) { | |
2d21ac55 | 847 | VATTR_RETURN(vap, va_total_size, (cp->c_entries + 2) * AVERAGE_HFSDIRENTRY_SIZE); |
91447636 | 848 | } else { |
b0d623f7 | 849 | u_int64_t total_size = ~0ULL; |
91447636 | 850 | struct cnode *rcp; |
b0d623f7 A |
851 | #if HFS_COMPRESSION |
852 | if (hide_size) { | |
853 | /* we're hiding the size of this file, so just return 0 */ | |
854 | total_size = 0; | |
855 | } else if (compressed) { | |
856 | if (uncompressed_size == -1) { | |
857 | /* | |
858 | * We failed to get the uncompressed size above, | |
859 | * so we'll fall back to the standard path below | |
860 | * since total_size is still -1 | |
861 | */ | |
862 | } else { | |
863 | /* use the uncompressed size we fetched above */ | |
864 | total_size = uncompressed_size; | |
865 | } | |
91447636 | 866 | } |
b0d623f7 A |
867 | #endif |
868 | if (total_size == ~0ULL) { | |
869 | if (cp->c_datafork) { | |
870 | total_size = cp->c_datafork->ff_size; | |
91447636 | 871 | } |
b0d623f7 A |
872 | |
873 | if (cp->c_blocks - VTOF(vp)->ff_blocks) { | |
874 | /* We deal with rsrc fork vnode iocount at the end of the function */ | |
6d2010ae | 875 | error = hfs_vgetrsrc(hfsmp, vp, &rvp, TRUE, FALSE); |
b0d623f7 | 876 | if (error) { |
6d2010ae A |
877 | /* |
878 | * Note that we call hfs_vgetrsrc with error_on_unlinked | |
879 | * set to FALSE. This is because we may be invoked via | |
880 | * fstat() on an open-unlinked file descriptor and we must | |
881 | * continue to support access to the rsrc fork until it disappears. | |
882 | * The code at the end of this function will be | |
883 | * responsible for releasing the iocount generated by | |
884 | * hfs_vgetrsrc. This is because we can't drop the iocount | |
885 | * without unlocking the cnode first. | |
b7266188 | 886 | */ |
b0d623f7 A |
887 | goto out; |
888 | } | |
889 | ||
890 | rcp = VTOC(rvp); | |
891 | if (rcp && rcp->c_rsrcfork) { | |
892 | total_size += rcp->c_rsrcfork->ff_size; | |
893 | } | |
91447636 A |
894 | } |
895 | } | |
b0d623f7 | 896 | |
91447636 | 897 | VATTR_RETURN(vap, va_total_size, total_size); |
91447636 | 898 | } |
9bccf70c | 899 | } |
91447636 A |
900 | if (VATTR_IS_ACTIVE(vap, va_total_alloc)) { |
901 | if (v_type == VDIR) { | |
902 | VATTR_RETURN(vap, va_total_alloc, 0); | |
903 | } else { | |
2d21ac55 | 904 | VATTR_RETURN(vap, va_total_alloc, (u_int64_t)cp->c_blocks * (u_int64_t)hfsmp->blockSize); |
91447636 | 905 | } |
9bccf70c A |
906 | } |
907 | ||
9bccf70c | 908 | /* |
91447636 A |
909 | * If the VFS wants extended security data, and we know that we |
910 | * don't have any (because it never told us it was setting any) | |
911 | * then we can return the supported bit and no data. If we do | |
912 | * have extended security, we can just leave the bit alone and | |
913 | * the VFS will use the fallback path to fetch it. | |
9bccf70c | 914 | */ |
91447636 A |
915 | if (VATTR_IS_ACTIVE(vap, va_acl)) { |
916 | if ((cp->c_attr.ca_recflags & kHFSHasSecurityMask) == 0) { | |
2d21ac55 | 917 | vap->va_acl = (kauth_acl_t) KAUTH_FILESEC_NONE; |
91447636 A |
918 | VATTR_SET_SUPPORTED(vap, va_acl); |
919 | } | |
55e303ae | 920 | } |
91447636 | 921 | if (VATTR_IS_ACTIVE(vap, va_access_time)) { |
2d21ac55 | 922 | /* Access times are lazily updated, get current time if needed */ |
91447636 A |
923 | if (cp->c_touch_acctime) { |
924 | struct timeval tv; | |
925 | ||
926 | microtime(&tv); | |
927 | vap->va_access_time.tv_sec = tv.tv_sec; | |
928 | } else { | |
929 | vap->va_access_time.tv_sec = cp->c_atime; | |
930 | } | |
931 | vap->va_access_time.tv_nsec = 0; | |
932 | VATTR_SET_SUPPORTED(vap, va_access_time); | |
933 | } | |
2d21ac55 A |
934 | vap->va_create_time.tv_sec = cp->c_itime; |
935 | vap->va_create_time.tv_nsec = 0; | |
91447636 A |
936 | vap->va_modify_time.tv_sec = cp->c_mtime; |
937 | vap->va_modify_time.tv_nsec = 0; | |
91447636 A |
938 | vap->va_change_time.tv_sec = cp->c_ctime; |
939 | vap->va_change_time.tv_nsec = 0; | |
91447636 | 940 | vap->va_backup_time.tv_sec = cp->c_btime; |
2d21ac55 A |
941 | vap->va_backup_time.tv_nsec = 0; |
942 | ||
6d2010ae A |
943 | /* See if we need to emit the date added field to the user */ |
944 | if (VATTR_IS_ACTIVE(vap, va_addedtime)) { | |
945 | u_int32_t dateadded = hfs_get_dateadded (cp); | |
946 | if (dateadded) { | |
947 | vap->va_addedtime.tv_sec = dateadded; | |
948 | vap->va_addedtime.tv_nsec = 0; | |
949 | VATTR_SET_SUPPORTED (vap, va_addedtime); | |
950 | } | |
951 | } | |
952 | ||
2d21ac55 A |
953 | /* XXX is this really a good 'optimal I/O size'? */ |
954 | vap->va_iosize = hfsmp->hfs_logBlockSize; | |
955 | vap->va_uid = cp->c_uid; | |
956 | vap->va_gid = cp->c_gid; | |
957 | vap->va_mode = cp->c_mode; | |
316670eb | 958 | vap->va_flags = cp->c_bsdflags; |
91447636 | 959 | |
9bccf70c A |
960 | /* |
961 | * Exporting file IDs from HFS Plus: | |
962 | * | |
963 | * For "normal" files the c_fileid is the same value as the | |
964 | * c_cnid. But for hard link files, they are different - the | |
965 | * c_cnid belongs to the active directory entry (ie the link) | |
966 | * and the c_fileid is for the actual inode (ie the data file). | |
967 | * | |
91447636 A |
968 | * The stat call (getattr) uses va_fileid and the Carbon APIs, |
969 | * which are hardlink-ignorant, will ask for va_linkid. | |
9bccf70c | 970 | */ |
2d21ac55 | 971 | vap->va_fileid = (u_int64_t)cp->c_fileid; |
935ed37a A |
972 | /* |
973 | * We need to use the origin cache for both hardlinked files | |
974 | * and directories. Hardlinked directories have multiple cnids | |
975 | * and parents (one per link). Hardlinked files also have their | |
976 | * own parents and link IDs separate from the indirect inode number. | |
977 | * If we don't use the cache, we could end up vending the wrong ID | |
978 | * because the cnode will only reflect the link that was looked up most recently. | |
979 | */ | |
980 | if (cp->c_flag & C_HARDLINK) { | |
2d21ac55 A |
981 | vap->va_linkid = (u_int64_t)hfs_currentcnid(cp); |
982 | vap->va_parentid = (u_int64_t)hfs_currentparent(cp); | |
983 | } else { | |
984 | vap->va_linkid = (u_int64_t)cp->c_cnid; | |
985 | vap->va_parentid = (u_int64_t)cp->c_parentcnid; | |
986 | } | |
b0d623f7 | 987 | vap->va_fsid = hfsmp->hfs_raw_dev; |
2d21ac55 A |
988 | vap->va_filerev = 0; |
989 | vap->va_encoding = cp->c_encoding; | |
990 | vap->va_rdev = (v_type == VBLK || v_type == VCHR) ? cp->c_rdev : 0; | |
b0d623f7 A |
991 | #if HFS_COMPRESSION |
992 | if (VATTR_IS_ACTIVE(vap, va_data_size)) { | |
993 | if (hide_size) | |
994 | vap->va_data_size = 0; | |
995 | else if (compressed) { | |
996 | if (uncompressed_size == -1) { | |
997 | /* failed to get the uncompressed size above, so just return data_size */ | |
998 | vap->va_data_size = data_size; | |
999 | } else { | |
1000 | /* use the uncompressed size we fetched above */ | |
1001 | vap->va_data_size = uncompressed_size; | |
1002 | } | |
1003 | } else | |
1004 | vap->va_data_size = data_size; | |
1005 | // vap->va_supported |= VNODE_ATTR_va_data_size; | |
1006 | VATTR_SET_SUPPORTED(vap, va_data_size); | |
1007 | } | |
1008 | #else | |
2d21ac55 | 1009 | vap->va_data_size = data_size; |
b0d623f7 A |
1010 | vap->va_supported |= VNODE_ATTR_va_data_size; |
1011 | #endif | |
1012 | ||
2d21ac55 A |
1013 | /* Mark them all at once instead of individual VATTR_SET_SUPPORTED calls. */ |
1014 | vap->va_supported |= VNODE_ATTR_va_create_time | VNODE_ATTR_va_modify_time | | |
1015 | VNODE_ATTR_va_change_time| VNODE_ATTR_va_backup_time | | |
1016 | VNODE_ATTR_va_iosize | VNODE_ATTR_va_uid | | |
1017 | VNODE_ATTR_va_gid | VNODE_ATTR_va_mode | | |
1018 | VNODE_ATTR_va_flags |VNODE_ATTR_va_fileid | | |
1019 | VNODE_ATTR_va_linkid | VNODE_ATTR_va_parentid | | |
1020 | VNODE_ATTR_va_fsid | VNODE_ATTR_va_filerev | | |
b0d623f7 | 1021 | VNODE_ATTR_va_encoding | VNODE_ATTR_va_rdev; |
91447636 | 1022 | |
b0d623f7 A |
1023 | /* If this is the root, let VFS to find out the mount name, which |
1024 | * may be different from the real name. Otherwise, we need to take care | |
1025 | * for hardlinked files, which need to be looked up, if necessary | |
935ed37a | 1026 | */ |
2d21ac55 | 1027 | if (VATTR_IS_ACTIVE(vap, va_name) && (cp->c_cnid != kHFSRootFolderID)) { |
935ed37a A |
1028 | struct cat_desc linkdesc; |
1029 | int lockflags; | |
1030 | int uselinkdesc = 0; | |
1031 | cnid_t nextlinkid = 0; | |
b0d623f7 | 1032 | cnid_t prevlinkid = 0; |
935ed37a A |
1033 | |
1034 | /* Get the name for ATTR_CMN_NAME. We need to take special care for hardlinks | |
1035 | * here because the info. for the link ID requested by getattrlist may be | |
1036 | * different than what's currently in the cnode. This is because the cnode | |
1037 | * will be filled in with the information for the most recent link ID that went | |
1038 | * through namei/lookup(). If there are competing lookups for hardlinks that point | |
b0d623f7 A |
1039 | * to the same inode, one (or more) getattrlists could be vended incorrect name information. |
1040 | * Also, we need to beware of open-unlinked files which could have a namelen of 0. | |
935ed37a | 1041 | */ |
b0d623f7 A |
1042 | |
1043 | if ((cp->c_flag & C_HARDLINK) && | |
935ed37a | 1044 | ((cp->c_desc.cd_namelen == 0) || (vap->va_linkid != cp->c_cnid))) { |
b0d623f7 A |
1045 | /* If we have no name and our link ID is the raw inode number, then we may |
1046 | * have an open-unlinked file. Go to the next link in this case. | |
935ed37a A |
1047 | */ |
1048 | if ((cp->c_desc.cd_namelen == 0) && (vap->va_linkid == cp->c_fileid)) { | |
6d2010ae | 1049 | if ((error = hfs_lookup_siblinglinks(hfsmp, vap->va_linkid, &prevlinkid, &nextlinkid))){ |
935ed37a A |
1050 | goto out; |
1051 | } | |
b0d623f7 | 1052 | } |
935ed37a | 1053 | else { |
b0d623f7 | 1054 | /* just use link obtained from vap above */ |
935ed37a | 1055 | nextlinkid = vap->va_linkid; |
2d21ac55 | 1056 | } |
b0d623f7 A |
1057 | |
1058 | /* We need to probe the catalog for the descriptor corresponding to the link ID | |
1059 | * stored in nextlinkid. Note that we don't know if we have the exclusive lock | |
1060 | * for the cnode here, so we can't just update the descriptor. Instead, | |
1061 | * we should just store the descriptor's value locally and then use it to pass | |
1062 | * out the name value as needed below. | |
1063 | */ | |
1064 | if (nextlinkid){ | |
935ed37a | 1065 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); |
b0d623f7 A |
1066 | error = cat_findname(hfsmp, nextlinkid, &linkdesc); |
1067 | hfs_systemfile_unlock(hfsmp, lockflags); | |
935ed37a A |
1068 | if (error == 0) { |
1069 | uselinkdesc = 1; | |
1070 | } | |
2d21ac55 | 1071 | } |
935ed37a | 1072 | } |
b0d623f7 A |
1073 | |
1074 | /* By this point, we've either patched up the name above and the c_desc | |
1075 | * points to the correct data, or it already did, in which case we just proceed | |
1076 | * by copying the name into the vap. Note that we will never set va_name to | |
1077 | * supported if nextlinkid is never initialized. This could happen in the degenerate | |
1078 | * case above involving the raw inode number, where it has no nextlinkid. In this case | |
1079 | * we will simply not mark the name bit as supported. | |
935ed37a A |
1080 | */ |
1081 | if (uselinkdesc) { | |
b0d623f7 | 1082 | strlcpy(vap->va_name, (const char*) linkdesc.cd_nameptr, MAXPATHLEN); |
935ed37a | 1083 | VATTR_SET_SUPPORTED(vap, va_name); |
b0d623f7 A |
1084 | cat_releasedesc(&linkdesc); |
1085 | } | |
935ed37a | 1086 | else if (cp->c_desc.cd_namelen) { |
b0d623f7 | 1087 | strlcpy(vap->va_name, (const char*) cp->c_desc.cd_nameptr, MAXPATHLEN); |
935ed37a | 1088 | VATTR_SET_SUPPORTED(vap, va_name); |
91447636 | 1089 | } |
9bccf70c | 1090 | } |
9bccf70c | 1091 | |
91447636 A |
1092 | out: |
1093 | hfs_unlock(cp); | |
b0d623f7 A |
1094 | /* |
1095 | * We need to vnode_put the rsrc fork vnode only *after* we've released | |
1096 | * the cnode lock, since vnode_put can trigger an inactive call, which | |
1097 | * will go back into HFS and try to acquire a cnode lock. | |
935ed37a | 1098 | */ |
91447636 | 1099 | if (rvp) { |
b0d623f7 | 1100 | vnode_put (rvp); |
91447636 | 1101 | } |
b0d623f7 | 1102 | |
91447636 A |
1103 | return (error); |
1104 | } | |
9bccf70c | 1105 | |
6d2010ae | 1106 | int |
91447636 A |
1107 | hfs_vnop_setattr(ap) |
1108 | struct vnop_setattr_args /* { | |
9bccf70c | 1109 | struct vnode *a_vp; |
91447636 A |
1110 | struct vnode_attr *a_vap; |
1111 | vfs_context_t a_context; | |
9bccf70c A |
1112 | } */ *ap; |
1113 | { | |
91447636 | 1114 | struct vnode_attr *vap = ap->a_vap; |
9bccf70c | 1115 | struct vnode *vp = ap->a_vp; |
91447636 A |
1116 | struct cnode *cp = NULL; |
1117 | struct hfsmount *hfsmp; | |
1118 | kauth_cred_t cred = vfs_context_ucred(ap->a_context); | |
1119 | struct proc *p = vfs_context_proc(ap->a_context); | |
1120 | int error = 0; | |
1121 | uid_t nuid; | |
1122 | gid_t ngid; | |
6d2010ae | 1123 | time_t orig_ctime; |
9bccf70c | 1124 | |
6d2010ae A |
1125 | orig_ctime = VTOC(vp)->c_ctime; |
1126 | ||
b0d623f7 A |
1127 | #if HFS_COMPRESSION |
1128 | int decmpfs_reset_state = 0; | |
1129 | /* | |
1130 | we call decmpfs_update_attributes even if the file is not compressed | |
1131 | because we want to update the incoming flags if the xattrs are invalid | |
1132 | */ | |
1133 | error = decmpfs_update_attributes(vp, vap); | |
1134 | if (error) | |
1135 | return error; | |
6d2010ae A |
1136 | |
1137 | // | |
1138 | // if this is not a size-changing setattr and it is not just | |
1139 | // an atime update, then check for a snapshot. | |
1140 | // | |
1141 | if (!VATTR_IS_ACTIVE(vap, va_data_size) && !(vap->va_active == VNODE_ATTR_va_access_time)) { | |
1142 | check_for_tracked_file(vp, orig_ctime, NAMESPACE_HANDLER_METADATA_MOD, NULL); | |
1143 | } | |
b0d623f7 A |
1144 | #endif |
1145 | ||
6d2010ae A |
1146 | |
1147 | #if CONFIG_PROTECT | |
316670eb | 1148 | if ((error = cp_handle_vnop(vp, CP_WRITE_ACCESS, 0)) != 0) { |
6d2010ae A |
1149 | return (error); |
1150 | } | |
1151 | #endif /* CONFIG_PROTECT */ | |
1152 | ||
91447636 | 1153 | hfsmp = VTOHFS(vp); |
9bccf70c | 1154 | |
316670eb A |
1155 | /* Don't allow modification of the journal. */ |
1156 | if (hfs_is_journal_file(hfsmp, VTOC(vp))) { | |
91447636 | 1157 | return (EPERM); |
55e303ae A |
1158 | } |
1159 | ||
91447636 A |
1160 | /* |
1161 | * File size change request. | |
1162 | * We are guaranteed that this is not a directory, and that | |
1163 | * the filesystem object is writeable. | |
b0d623f7 A |
1164 | * |
1165 | * NOTE: HFS COMPRESSION depends on the data_size being set *before* the bsd flags are updated | |
91447636 A |
1166 | */ |
1167 | VATTR_SET_SUPPORTED(vap, va_data_size); | |
1168 | if (VATTR_IS_ACTIVE(vap, va_data_size) && !vnode_islnk(vp)) { | |
b0d623f7 A |
1169 | #if HFS_COMPRESSION |
1170 | /* keep the compressed state locked until we're done truncating the file */ | |
1171 | decmpfs_cnode *dp = VTOCMP(vp); | |
1172 | if (!dp) { | |
1173 | /* | |
1174 | * call hfs_lazy_init_decmpfs_cnode() to make sure that the decmpfs_cnode | |
1175 | * is filled in; we need a decmpfs_cnode to lock out decmpfs state changes | |
1176 | * on this file while it's truncating | |
1177 | */ | |
1178 | dp = hfs_lazy_init_decmpfs_cnode(VTOC(vp)); | |
1179 | if (!dp) { | |
1180 | /* failed to allocate a decmpfs_cnode */ | |
1181 | return ENOMEM; /* what should this be? */ | |
1182 | } | |
1183 | } | |
1184 | ||
6d2010ae A |
1185 | check_for_tracked_file(vp, orig_ctime, vap->va_data_size == 0 ? NAMESPACE_HANDLER_TRUNCATE_OP|NAMESPACE_HANDLER_DELETE_OP : NAMESPACE_HANDLER_TRUNCATE_OP, NULL); |
1186 | ||
b0d623f7 A |
1187 | decmpfs_lock_compressed_data(dp, 1); |
1188 | if (hfs_file_is_compressed(VTOC(vp), 1)) { | |
1189 | error = decmpfs_decompress_file(vp, dp, -1/*vap->va_data_size*/, 0, 1); | |
1190 | if (error != 0) { | |
1191 | decmpfs_unlock_compressed_data(dp, 1); | |
1192 | return error; | |
1193 | } | |
1194 | } | |
1195 | #endif | |
55e303ae | 1196 | |
91447636 | 1197 | /* Take truncate lock before taking cnode lock. */ |
6d2010ae | 1198 | hfs_lock_truncate(VTOC(vp), HFS_EXCLUSIVE_LOCK); |
2d21ac55 A |
1199 | |
1200 | /* Perform the ubc_setsize before taking the cnode lock. */ | |
1201 | ubc_setsize(vp, vap->va_data_size); | |
1202 | ||
91447636 | 1203 | if ((error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK))) { |
6d2010ae | 1204 | hfs_unlock_truncate(VTOC(vp), 0); |
b0d623f7 A |
1205 | #if HFS_COMPRESSION |
1206 | decmpfs_unlock_compressed_data(dp, 1); | |
1207 | #endif | |
91447636 A |
1208 | return (error); |
1209 | } | |
1210 | cp = VTOC(vp); | |
55e303ae | 1211 | |
b0d623f7 | 1212 | error = hfs_truncate(vp, vap->va_data_size, vap->va_vaflags & 0xffff, 1, 0, ap->a_context); |
91447636 | 1213 | |
6d2010ae | 1214 | hfs_unlock_truncate(cp, 0); |
b0d623f7 A |
1215 | #if HFS_COMPRESSION |
1216 | decmpfs_unlock_compressed_data(dp, 1); | |
1217 | #endif | |
91447636 A |
1218 | if (error) |
1219 | goto out; | |
1220 | } | |
1221 | if (cp == NULL) { | |
1222 | if ((error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK))) | |
9bccf70c | 1223 | return (error); |
91447636 | 1224 | cp = VTOC(vp); |
9bccf70c A |
1225 | } |
1226 | ||
2d21ac55 A |
1227 | /* |
1228 | * If it is just an access time update request by itself | |
1229 | * we know the request is from kernel level code, and we | |
1230 | * can delay it without being as worried about consistency. | |
1231 | * This change speeds up mmaps, in the rare case that they | |
1232 | * get caught behind a sync. | |
1233 | */ | |
1234 | ||
1235 | if (vap->va_active == VNODE_ATTR_va_access_time) { | |
1236 | cp->c_touch_acctime=TRUE; | |
1237 | goto out; | |
1238 | } | |
1239 | ||
1240 | ||
1241 | ||
91447636 A |
1242 | /* |
1243 | * Owner/group change request. | |
1244 | * We are guaranteed that the new owner/group is valid and legal. | |
1245 | */ | |
1246 | VATTR_SET_SUPPORTED(vap, va_uid); | |
1247 | VATTR_SET_SUPPORTED(vap, va_gid); | |
1248 | nuid = VATTR_IS_ACTIVE(vap, va_uid) ? vap->va_uid : (uid_t)VNOVAL; | |
1249 | ngid = VATTR_IS_ACTIVE(vap, va_gid) ? vap->va_gid : (gid_t)VNOVAL; | |
1250 | if (((nuid != (uid_t)VNOVAL) || (ngid != (gid_t)VNOVAL)) && | |
1251 | ((error = hfs_chown(vp, nuid, ngid, cred, p)) != 0)) | |
1252 | goto out; | |
b4c24cb9 | 1253 | |
91447636 A |
1254 | /* |
1255 | * Mode change request. | |
1256 | * We are guaranteed that the mode value is valid and that in | |
1257 | * conjunction with the owner and group, this change is legal. | |
b0d623f7 | 1258 | */ |
91447636 A |
1259 | VATTR_SET_SUPPORTED(vap, va_mode); |
1260 | if (VATTR_IS_ACTIVE(vap, va_mode) && | |
1261 | ((error = hfs_chmod(vp, (int)vap->va_mode, cred, p)) != 0)) | |
1262 | goto out; | |
b4c24cb9 | 1263 | |
91447636 A |
1264 | /* |
1265 | * File flags change. | |
1266 | * We are guaranteed that only flags allowed to change given the | |
1267 | * current securelevel are being changed. | |
1268 | */ | |
1269 | VATTR_SET_SUPPORTED(vap, va_flags); | |
cc9f6e38 | 1270 | if (VATTR_IS_ACTIVE(vap, va_flags)) { |
2d21ac55 A |
1271 | u_int16_t *fdFlags; |
1272 | ||
b0d623f7 | 1273 | #if HFS_COMPRESSION |
316670eb | 1274 | if ((cp->c_bsdflags ^ vap->va_flags) & UF_COMPRESSED) { |
b0d623f7 A |
1275 | /* |
1276 | * the UF_COMPRESSED was toggled, so reset our cached compressed state | |
1277 | * but we don't want to actually do the update until we've released the cnode lock down below | |
1278 | * NOTE: turning the flag off doesn't actually decompress the file, so that we can | |
1279 | * turn off the flag and look at the "raw" file for debugging purposes | |
1280 | */ | |
1281 | decmpfs_reset_state = 1; | |
1282 | } | |
1283 | #endif | |
1284 | ||
316670eb | 1285 | cp->c_bsdflags = vap->va_flags; |
cc9f6e38 | 1286 | cp->c_touch_chgtime = TRUE; |
2d21ac55 A |
1287 | |
1288 | /* | |
1289 | * Mirror the UF_HIDDEN flag to the invisible bit of the Finder Info. | |
1290 | * | |
1291 | * The fdFlags for files and frFlags for folders are both 8 bytes | |
1292 | * into the userInfo (the first 16 bytes of the Finder Info). They | |
1293 | * are both 16-bit fields. | |
1294 | */ | |
1295 | fdFlags = (u_int16_t *) &cp->c_finderinfo[8]; | |
1296 | if (vap->va_flags & UF_HIDDEN) | |
1297 | *fdFlags |= OSSwapHostToBigConstInt16(kFinderInvisibleMask); | |
1298 | else | |
1299 | *fdFlags &= ~OSSwapHostToBigConstInt16(kFinderInvisibleMask); | |
9bccf70c | 1300 | } |
91447636 A |
1301 | |
1302 | /* | |
1303 | * Timestamp updates. | |
1304 | */ | |
1305 | VATTR_SET_SUPPORTED(vap, va_create_time); | |
1306 | VATTR_SET_SUPPORTED(vap, va_access_time); | |
1307 | VATTR_SET_SUPPORTED(vap, va_modify_time); | |
1308 | VATTR_SET_SUPPORTED(vap, va_backup_time); | |
1309 | VATTR_SET_SUPPORTED(vap, va_change_time); | |
1310 | if (VATTR_IS_ACTIVE(vap, va_create_time) || | |
1311 | VATTR_IS_ACTIVE(vap, va_access_time) || | |
1312 | VATTR_IS_ACTIVE(vap, va_modify_time) || | |
1313 | VATTR_IS_ACTIVE(vap, va_backup_time)) { | |
91447636 A |
1314 | if (VATTR_IS_ACTIVE(vap, va_create_time)) |
1315 | cp->c_itime = vap->va_create_time.tv_sec; | |
1316 | if (VATTR_IS_ACTIVE(vap, va_access_time)) { | |
1317 | cp->c_atime = vap->va_access_time.tv_sec; | |
1318 | cp->c_touch_acctime = FALSE; | |
9bccf70c | 1319 | } |
91447636 A |
1320 | if (VATTR_IS_ACTIVE(vap, va_modify_time)) { |
1321 | cp->c_mtime = vap->va_modify_time.tv_sec; | |
1322 | cp->c_touch_modtime = FALSE; | |
1323 | cp->c_touch_chgtime = TRUE; | |
1324 | ||
9bccf70c A |
1325 | /* |
1326 | * The utimes system call can reset the modification | |
1327 | * time but it doesn't know about HFS create times. | |
91447636 | 1328 | * So we need to ensure that the creation time is |
9bccf70c A |
1329 | * always at least as old as the modification time. |
1330 | */ | |
1331 | if ((VTOVCB(vp)->vcbSigWord == kHFSPlusSigWord) && | |
91447636 A |
1332 | (cp->c_cnid != kHFSRootFolderID) && |
1333 | (cp->c_mtime < cp->c_itime)) { | |
1334 | cp->c_itime = cp->c_mtime; | |
9bccf70c A |
1335 | } |
1336 | } | |
91447636 A |
1337 | if (VATTR_IS_ACTIVE(vap, va_backup_time)) |
1338 | cp->c_btime = vap->va_backup_time.tv_sec; | |
1339 | cp->c_flag |= C_MODIFIED; | |
9bccf70c | 1340 | } |
91447636 A |
1341 | |
1342 | /* | |
1343 | * Set name encoding. | |
1344 | */ | |
1345 | VATTR_SET_SUPPORTED(vap, va_encoding); | |
1346 | if (VATTR_IS_ACTIVE(vap, va_encoding)) { | |
1347 | cp->c_encoding = vap->va_encoding; | |
1348 | hfs_setencodingbits(hfsmp, cp->c_encoding); | |
9bccf70c | 1349 | } |
91447636 | 1350 | |
91447636 | 1351 | if ((error = hfs_update(vp, TRUE)) != 0) |
2d21ac55 | 1352 | goto out; |
91447636 | 1353 | out: |
b0d623f7 A |
1354 | if (cp) { |
1355 | /* Purge origin cache for cnode, since caller now has correct link ID for it | |
1356 | * We purge it here since it was acquired for us during lookup, and we no longer need it. | |
1357 | */ | |
1358 | if ((cp->c_flag & C_HARDLINK) && (vp->v_type != VDIR)){ | |
1359 | hfs_relorigin(cp, 0); | |
1360 | } | |
1361 | ||
91447636 | 1362 | hfs_unlock(cp); |
b0d623f7 A |
1363 | #if HFS_COMPRESSION |
1364 | if (decmpfs_reset_state) { | |
1365 | /* | |
1366 | * we've changed the UF_COMPRESSED flag, so reset the decmpfs state for this cnode | |
1367 | * but don't do it while holding the hfs cnode lock | |
1368 | */ | |
1369 | decmpfs_cnode *dp = VTOCMP(vp); | |
1370 | if (!dp) { | |
1371 | /* | |
1372 | * call hfs_lazy_init_decmpfs_cnode() to make sure that the decmpfs_cnode | |
1373 | * is filled in; we need a decmpfs_cnode to prevent decmpfs state changes | |
1374 | * on this file if it's locked | |
1375 | */ | |
1376 | dp = hfs_lazy_init_decmpfs_cnode(VTOC(vp)); | |
1377 | if (!dp) { | |
1378 | /* failed to allocate a decmpfs_cnode */ | |
1379 | return ENOMEM; /* what should this be? */ | |
1380 | } | |
1381 | } | |
1382 | decmpfs_cnode_set_vnode_state(dp, FILE_TYPE_UNKNOWN, 0); | |
1383 | } | |
1384 | #endif | |
1385 | } | |
9bccf70c A |
1386 | return (error); |
1387 | } | |
1388 | ||
1389 | ||
1390 | /* | |
1391 | * Change the mode on a file. | |
1392 | * cnode must be locked before calling. | |
1393 | */ | |
1394 | int | |
2d21ac55 | 1395 | hfs_chmod(struct vnode *vp, int mode, __unused kauth_cred_t cred, __unused struct proc *p) |
9bccf70c A |
1396 | { |
1397 | register struct cnode *cp = VTOC(vp); | |
9bccf70c A |
1398 | |
1399 | if (VTOVCB(vp)->vcbSigWord != kHFSPlusSigWord) | |
1400 | return (0); | |
1401 | ||
316670eb A |
1402 | // Don't allow modification of the journal or journal_info_block |
1403 | if (hfs_is_journal_file(VTOHFS(vp), cp)) { | |
1404 | return EPERM; | |
b4c24cb9 A |
1405 | } |
1406 | ||
9bccf70c | 1407 | #if OVERRIDE_UNKNOWN_PERMISSIONS |
91447636 | 1408 | if (((unsigned int)vfs_flags(VTOVFS(vp))) & MNT_UNKNOWNPERMISSIONS) { |
9bccf70c A |
1409 | return (0); |
1410 | }; | |
1411 | #endif | |
9bccf70c A |
1412 | cp->c_mode &= ~ALLPERMS; |
1413 | cp->c_mode |= (mode & ALLPERMS); | |
91447636 | 1414 | cp->c_touch_chgtime = TRUE; |
9bccf70c A |
1415 | return (0); |
1416 | } | |
1417 | ||
1418 | ||
1419 | int | |
91447636 | 1420 | hfs_write_access(struct vnode *vp, kauth_cred_t cred, struct proc *p, Boolean considerFlags) |
9bccf70c A |
1421 | { |
1422 | struct cnode *cp = VTOC(vp); | |
9bccf70c | 1423 | int retval = 0; |
91447636 | 1424 | int is_member; |
9bccf70c A |
1425 | |
1426 | /* | |
1427 | * Disallow write attempts on read-only file systems; | |
1428 | * unless the file is a socket, fifo, or a block or | |
1429 | * character device resident on the file system. | |
1430 | */ | |
91447636 | 1431 | switch (vnode_vtype(vp)) { |
9bccf70c A |
1432 | case VDIR: |
1433 | case VLNK: | |
1434 | case VREG: | |
55e303ae | 1435 | if (VTOHFS(vp)->hfs_flags & HFS_READ_ONLY) |
9bccf70c | 1436 | return (EROFS); |
55e303ae | 1437 | break; |
9bccf70c A |
1438 | default: |
1439 | break; | |
1440 | } | |
1441 | ||
1442 | /* If immutable bit set, nobody gets to write it. */ | |
316670eb | 1443 | if (considerFlags && (cp->c_bsdflags & IMMUTABLE)) |
9bccf70c A |
1444 | return (EPERM); |
1445 | ||
1446 | /* Otherwise, user id 0 always gets access. */ | |
91447636 | 1447 | if (!suser(cred, NULL)) |
9bccf70c A |
1448 | return (0); |
1449 | ||
1450 | /* Otherwise, check the owner. */ | |
1451 | if ((retval = hfs_owner_rights(VTOHFS(vp), cp->c_uid, cred, p, false)) == 0) | |
1452 | return ((cp->c_mode & S_IWUSR) == S_IWUSR ? 0 : EACCES); | |
1453 | ||
1454 | /* Otherwise, check the groups. */ | |
91447636 A |
1455 | if (kauth_cred_ismember_gid(cred, cp->c_gid, &is_member) == 0 && is_member) { |
1456 | return ((cp->c_mode & S_IWGRP) == S_IWGRP ? 0 : EACCES); | |
9bccf70c A |
1457 | } |
1458 | ||
1459 | /* Otherwise, check everyone else. */ | |
1460 | return ((cp->c_mode & S_IWOTH) == S_IWOTH ? 0 : EACCES); | |
1461 | } | |
1462 | ||
1463 | ||
9bccf70c A |
1464 | /* |
1465 | * Perform chown operation on cnode cp; | |
1466 | * code must be locked prior to call. | |
1467 | */ | |
1468 | int | |
2d21ac55 A |
1469 | #if !QUOTA |
1470 | hfs_chown(struct vnode *vp, uid_t uid, gid_t gid, __unused kauth_cred_t cred, | |
1471 | __unused struct proc *p) | |
1472 | #else | |
91447636 | 1473 | hfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred, |
2d21ac55 A |
1474 | __unused struct proc *p) |
1475 | #endif | |
9bccf70c A |
1476 | { |
1477 | register struct cnode *cp = VTOC(vp); | |
1478 | uid_t ouid; | |
1479 | gid_t ogid; | |
9bccf70c | 1480 | #if QUOTA |
2d21ac55 | 1481 | int error = 0; |
9bccf70c A |
1482 | register int i; |
1483 | int64_t change; | |
1484 | #endif /* QUOTA */ | |
1485 | ||
1486 | if (VTOVCB(vp)->vcbSigWord != kHFSPlusSigWord) | |
91447636 | 1487 | return (ENOTSUP); |
9bccf70c | 1488 | |
91447636 | 1489 | if (((unsigned int)vfs_flags(VTOVFS(vp))) & MNT_UNKNOWNPERMISSIONS) |
9bccf70c A |
1490 | return (0); |
1491 | ||
1492 | if (uid == (uid_t)VNOVAL) | |
1493 | uid = cp->c_uid; | |
1494 | if (gid == (gid_t)VNOVAL) | |
1495 | gid = cp->c_gid; | |
91447636 A |
1496 | |
1497 | #if 0 /* we are guaranteed that this is already the case */ | |
9bccf70c A |
1498 | /* |
1499 | * If we don't own the file, are trying to change the owner | |
1500 | * of the file, or are not a member of the target group, | |
1501 | * the caller must be superuser or the call fails. | |
1502 | */ | |
91447636 A |
1503 | if ((kauth_cred_getuid(cred) != cp->c_uid || uid != cp->c_uid || |
1504 | (gid != cp->c_gid && | |
1505 | (kauth_cred_ismember_gid(cred, gid, &is_member) || !is_member))) && | |
1506 | (error = suser(cred, 0))) | |
9bccf70c | 1507 | return (error); |
91447636 | 1508 | #endif |
9bccf70c A |
1509 | |
1510 | ogid = cp->c_gid; | |
1511 | ouid = cp->c_uid; | |
1512 | #if QUOTA | |
1513 | if ((error = hfs_getinoquota(cp))) | |
1514 | return (error); | |
1515 | if (ouid == uid) { | |
91447636 | 1516 | dqrele(cp->c_dquot[USRQUOTA]); |
9bccf70c A |
1517 | cp->c_dquot[USRQUOTA] = NODQUOT; |
1518 | } | |
1519 | if (ogid == gid) { | |
91447636 | 1520 | dqrele(cp->c_dquot[GRPQUOTA]); |
9bccf70c A |
1521 | cp->c_dquot[GRPQUOTA] = NODQUOT; |
1522 | } | |
1523 | ||
1524 | /* | |
1525 | * Eventually need to account for (fake) a block per directory | |
91447636 A |
1526 | * if (vnode_isdir(vp)) |
1527 | * change = VTOHFS(vp)->blockSize; | |
1528 | * else | |
9bccf70c A |
1529 | */ |
1530 | ||
1531 | change = (int64_t)(cp->c_blocks) * (int64_t)VTOVCB(vp)->blockSize; | |
1532 | (void) hfs_chkdq(cp, -change, cred, CHOWN); | |
1533 | (void) hfs_chkiq(cp, -1, cred, CHOWN); | |
1534 | for (i = 0; i < MAXQUOTAS; i++) { | |
91447636 | 1535 | dqrele(cp->c_dquot[i]); |
9bccf70c A |
1536 | cp->c_dquot[i] = NODQUOT; |
1537 | } | |
1538 | #endif /* QUOTA */ | |
1539 | cp->c_gid = gid; | |
1540 | cp->c_uid = uid; | |
1541 | #if QUOTA | |
1542 | if ((error = hfs_getinoquota(cp)) == 0) { | |
1543 | if (ouid == uid) { | |
91447636 | 1544 | dqrele(cp->c_dquot[USRQUOTA]); |
9bccf70c A |
1545 | cp->c_dquot[USRQUOTA] = NODQUOT; |
1546 | } | |
1547 | if (ogid == gid) { | |
91447636 | 1548 | dqrele(cp->c_dquot[GRPQUOTA]); |
9bccf70c A |
1549 | cp->c_dquot[GRPQUOTA] = NODQUOT; |
1550 | } | |
1551 | if ((error = hfs_chkdq(cp, change, cred, CHOWN)) == 0) { | |
1552 | if ((error = hfs_chkiq(cp, 1, cred, CHOWN)) == 0) | |
1553 | goto good; | |
1554 | else | |
1555 | (void) hfs_chkdq(cp, -change, cred, CHOWN|FORCE); | |
1556 | } | |
1557 | for (i = 0; i < MAXQUOTAS; i++) { | |
91447636 | 1558 | dqrele(cp->c_dquot[i]); |
9bccf70c A |
1559 | cp->c_dquot[i] = NODQUOT; |
1560 | } | |
1561 | } | |
1562 | cp->c_gid = ogid; | |
1563 | cp->c_uid = ouid; | |
1564 | if (hfs_getinoquota(cp) == 0) { | |
1565 | if (ouid == uid) { | |
91447636 | 1566 | dqrele(cp->c_dquot[USRQUOTA]); |
9bccf70c A |
1567 | cp->c_dquot[USRQUOTA] = NODQUOT; |
1568 | } | |
1569 | if (ogid == gid) { | |
91447636 | 1570 | dqrele(cp->c_dquot[GRPQUOTA]); |
9bccf70c A |
1571 | cp->c_dquot[GRPQUOTA] = NODQUOT; |
1572 | } | |
1573 | (void) hfs_chkdq(cp, change, cred, FORCE|CHOWN); | |
1574 | (void) hfs_chkiq(cp, 1, cred, FORCE|CHOWN); | |
1575 | (void) hfs_getinoquota(cp); | |
1576 | } | |
1577 | return (error); | |
1578 | good: | |
1579 | if (hfs_getinoquota(cp)) | |
1580 | panic("hfs_chown: lost quota"); | |
1581 | #endif /* QUOTA */ | |
1582 | ||
2d21ac55 A |
1583 | |
1584 | /* | |
1585 | According to the SUSv3 Standard, chown() shall mark | |
1586 | for update the st_ctime field of the file. | |
1587 | (No exceptions mentioned) | |
1588 | */ | |
91447636 | 1589 | cp->c_touch_chgtime = TRUE; |
9bccf70c A |
1590 | return (0); |
1591 | } | |
1592 | ||
1593 | ||
1594 | /* | |
91447636 A |
1595 | * The hfs_exchange routine swaps the fork data in two files by |
1596 | * exchanging some of the information in the cnode. It is used | |
1597 | * to preserve the file ID when updating an existing file, in | |
1598 | * case the file is being tracked through its file ID. Typically | |
1599 | * its used after creating a new file during a safe-save. | |
9bccf70c | 1600 | */ |
6d2010ae | 1601 | int |
91447636 A |
1602 | hfs_vnop_exchange(ap) |
1603 | struct vnop_exchange_args /* { | |
9bccf70c A |
1604 | struct vnode *a_fvp; |
1605 | struct vnode *a_tvp; | |
91447636 A |
1606 | int a_options; |
1607 | vfs_context_t a_context; | |
9bccf70c A |
1608 | } */ *ap; |
1609 | { | |
1610 | struct vnode *from_vp = ap->a_fvp; | |
1611 | struct vnode *to_vp = ap->a_tvp; | |
91447636 A |
1612 | struct cnode *from_cp; |
1613 | struct cnode *to_cp; | |
1614 | struct hfsmount *hfsmp; | |
9bccf70c A |
1615 | struct cat_desc tempdesc; |
1616 | struct cat_attr tempattr; | |
2d21ac55 A |
1617 | const unsigned char *from_nameptr; |
1618 | const unsigned char *to_nameptr; | |
1619 | char from_iname[32]; | |
1620 | char to_iname[32]; | |
1621 | u_int32_t tempflag; | |
1622 | cnid_t from_parid; | |
1623 | cnid_t to_parid; | |
91447636 A |
1624 | int lockflags; |
1625 | int error = 0, started_tr = 0, got_cookie = 0; | |
1626 | cat_cookie_t cookie; | |
6d2010ae | 1627 | time_t orig_from_ctime, orig_to_ctime; |
9bccf70c A |
1628 | |
1629 | /* The files must be on the same volume. */ | |
91447636 | 1630 | if (vnode_mount(from_vp) != vnode_mount(to_vp)) |
9bccf70c A |
1631 | return (EXDEV); |
1632 | ||
91447636 A |
1633 | if (from_vp == to_vp) |
1634 | return (EINVAL); | |
1635 | ||
6d2010ae A |
1636 | orig_from_ctime = VTOC(from_vp)->c_ctime; |
1637 | orig_to_ctime = VTOC(to_vp)->c_ctime; | |
1638 | ||
316670eb A |
1639 | |
1640 | #if CONFIG_PROTECT | |
1641 | /* | |
1642 | * Do not allow exchangedata/F_MOVEDATAEXTENTS on data-protected filesystems | |
1643 | * because the EAs will not be swapped. As a result, the persistent keys would not | |
1644 | * match and the files will be garbage. | |
1645 | */ | |
1646 | if (cp_fs_protected (vnode_mount(from_vp))) { | |
1647 | return EINVAL; | |
1648 | } | |
1649 | #endif | |
1650 | ||
b0d623f7 A |
1651 | #if HFS_COMPRESSION |
1652 | if ( hfs_file_is_compressed(VTOC(from_vp), 0) ) { | |
1653 | if ( 0 != ( error = decmpfs_decompress_file(from_vp, VTOCMP(from_vp), -1, 0, 1) ) ) { | |
1654 | return error; | |
1655 | } | |
1656 | } | |
1657 | ||
1658 | if ( hfs_file_is_compressed(VTOC(to_vp), 0) ) { | |
1659 | if ( 0 != ( error = decmpfs_decompress_file(to_vp, VTOCMP(to_vp), -1, 0, 1) ) ) { | |
1660 | return error; | |
1661 | } | |
1662 | } | |
1663 | #endif // HFS_COMPRESSION | |
1664 | ||
6d2010ae A |
1665 | /* |
1666 | * Normally, we want to notify the user handlers about the event, | |
1667 | * except if it's a handler driving the event. | |
1668 | */ | |
1669 | if ((ap->a_options & FSOPT_EXCHANGE_DATA_ONLY) == 0) { | |
1670 | check_for_tracked_file(from_vp, orig_from_ctime, NAMESPACE_HANDLER_WRITE_OP, NULL); | |
1671 | check_for_tracked_file(to_vp, orig_to_ctime, NAMESPACE_HANDLER_WRITE_OP, NULL); | |
316670eb | 1672 | } else { |
6d2010ae A |
1673 | /* |
1674 | * We're doing a data-swap. | |
1675 | * Take the truncate lock/cnode lock, then verify there are no mmap references. | |
1676 | * Issue a hfs_filedone to flush out all of the remaining state for this file. | |
1677 | * Allow the rest of the codeflow to re-acquire the cnode locks in order. | |
1678 | */ | |
1679 | ||
1680 | hfs_lock_truncate (VTOC(from_vp), HFS_SHARED_LOCK); | |
1681 | ||
1682 | if ((error = hfs_lock(VTOC(from_vp), HFS_EXCLUSIVE_LOCK))) { | |
1683 | hfs_unlock_truncate (VTOC(from_vp), 0); | |
1684 | return error; | |
1685 | } | |
1686 | ||
1687 | /* Verify the source file is not in use by anyone besides us (including mmap refs) */ | |
1688 | if (vnode_isinuse(from_vp, 1)) { | |
1689 | error = EBUSY; | |
1690 | hfs_unlock(VTOC(from_vp)); | |
1691 | hfs_unlock_truncate (VTOC(from_vp), 0); | |
1692 | return error; | |
1693 | } | |
1694 | ||
1695 | /* Flush out the data in the source file */ | |
1696 | VTOC(from_vp)->c_flag |= C_SWAPINPROGRESS; | |
1697 | error = hfs_filedone (from_vp, ap->a_context); | |
1698 | VTOC(from_vp)->c_flag &= ~C_SWAPINPROGRESS; | |
1699 | hfs_unlock(VTOC(from_vp)); | |
1700 | hfs_unlock_truncate(VTOC(from_vp), 0); | |
1701 | ||
1702 | if (error) { | |
1703 | return error; | |
1704 | } | |
1705 | } | |
1706 | ||
91447636 A |
1707 | if ((error = hfs_lockpair(VTOC(from_vp), VTOC(to_vp), HFS_EXCLUSIVE_LOCK))) |
1708 | return (error); | |
1709 | ||
1710 | from_cp = VTOC(from_vp); | |
1711 | to_cp = VTOC(to_vp); | |
1712 | hfsmp = VTOHFS(from_vp); | |
1713 | ||
9bccf70c | 1714 | /* Only normal files can be exchanged. */ |
91447636 | 1715 | if (!vnode_isreg(from_vp) || !vnode_isreg(to_vp) || |
91447636 A |
1716 | VNODE_IS_RSRC(from_vp) || VNODE_IS_RSRC(to_vp)) { |
1717 | error = EINVAL; | |
1718 | goto exit; | |
1719 | } | |
9bccf70c | 1720 | |
316670eb A |
1721 | // Don't allow modification of the journal or journal_info_block |
1722 | if (hfs_is_journal_file(hfsmp, from_cp) || | |
1723 | hfs_is_journal_file(hfsmp, to_cp)) { | |
1724 | error = EPERM; | |
1725 | goto exit; | |
b4c24cb9 | 1726 | } |
316670eb | 1727 | |
6d2010ae A |
1728 | /* |
1729 | * Ok, now that all of the pre-flighting is done, call the underlying | |
1730 | * function if needed. | |
1731 | */ | |
1732 | if (ap->a_options & FSOPT_EXCHANGE_DATA_ONLY) { | |
1733 | error = hfs_movedata(from_vp, to_vp); | |
1734 | goto exit; | |
1735 | } | |
1736 | ||
316670eb | 1737 | |
91447636 A |
1738 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
1739 | goto exit; | |
b4c24cb9 | 1740 | } |
91447636 | 1741 | started_tr = 1; |
b4c24cb9 | 1742 | |
55e303ae A |
1743 | /* |
1744 | * Reserve some space in the Catalog file. | |
1745 | */ | |
91447636 A |
1746 | if ((error = cat_preflight(hfsmp, CAT_EXCHANGE, &cookie, vfs_context_proc(ap->a_context)))) { |
1747 | goto exit; | |
55e303ae | 1748 | } |
91447636 | 1749 | got_cookie = 1; |
9bccf70c A |
1750 | |
1751 | /* The backend code always tries to delete the virtual | |
2d21ac55 | 1752 | * extent id for exchanging files so we need to lock |
9bccf70c A |
1753 | * the extents b-tree. |
1754 | */ | |
91447636 | 1755 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG | SFL_EXTENTS | SFL_ATTRIBUTE, HFS_EXCLUSIVE_LOCK); |
9bccf70c | 1756 | |
2d21ac55 A |
1757 | /* Account for the location of the catalog objects. */ |
1758 | if (from_cp->c_flag & C_HARDLINK) { | |
1759 | MAKE_INODE_NAME(from_iname, sizeof(from_iname), | |
1760 | from_cp->c_attr.ca_linkref); | |
1761 | from_nameptr = (unsigned char *)from_iname; | |
1762 | from_parid = hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid; | |
1763 | from_cp->c_hint = 0; | |
1764 | } else { | |
1765 | from_nameptr = from_cp->c_desc.cd_nameptr; | |
1766 | from_parid = from_cp->c_parentcnid; | |
1767 | } | |
1768 | if (to_cp->c_flag & C_HARDLINK) { | |
1769 | MAKE_INODE_NAME(to_iname, sizeof(to_iname), | |
1770 | to_cp->c_attr.ca_linkref); | |
1771 | to_nameptr = (unsigned char *)to_iname; | |
1772 | to_parid = hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid; | |
1773 | to_cp->c_hint = 0; | |
1774 | } else { | |
1775 | to_nameptr = to_cp->c_desc.cd_nameptr; | |
1776 | to_parid = to_cp->c_parentcnid; | |
1777 | } | |
1778 | ||
9bccf70c | 1779 | /* Do the exchange */ |
2d21ac55 A |
1780 | error = ExchangeFileIDs(hfsmp, from_nameptr, to_nameptr, from_parid, |
1781 | to_parid, from_cp->c_hint, to_cp->c_hint); | |
91447636 | 1782 | hfs_systemfile_unlock(hfsmp, lockflags); |
9bccf70c | 1783 | |
91447636 A |
1784 | /* |
1785 | * Note that we don't need to exchange any extended attributes | |
1786 | * since the attributes are keyed by file ID. | |
1787 | */ | |
9bccf70c A |
1788 | |
1789 | if (error != E_NONE) { | |
91447636 A |
1790 | error = MacToVFSError(error); |
1791 | goto exit; | |
9bccf70c A |
1792 | } |
1793 | ||
1794 | /* Purge the vnodes from the name cache */ | |
1795 | if (from_vp) | |
1796 | cache_purge(from_vp); | |
1797 | if (to_vp) | |
1798 | cache_purge(to_vp); | |
1799 | ||
1800 | /* Save a copy of from attributes before swapping. */ | |
1801 | bcopy(&from_cp->c_desc, &tempdesc, sizeof(struct cat_desc)); | |
1802 | bcopy(&from_cp->c_attr, &tempattr, sizeof(struct cat_attr)); | |
2d21ac55 | 1803 | tempflag = from_cp->c_flag & (C_HARDLINK | C_HASXATTRS); |
9bccf70c A |
1804 | |
1805 | /* | |
1806 | * Swap the descriptors and all non-fork related attributes. | |
1807 | * (except the modify date) | |
1808 | */ | |
1809 | bcopy(&to_cp->c_desc, &from_cp->c_desc, sizeof(struct cat_desc)); | |
b4c24cb9 | 1810 | |
9bccf70c A |
1811 | from_cp->c_hint = 0; |
1812 | from_cp->c_fileid = from_cp->c_cnid; | |
1813 | from_cp->c_itime = to_cp->c_itime; | |
1814 | from_cp->c_btime = to_cp->c_btime; | |
1815 | from_cp->c_atime = to_cp->c_atime; | |
1816 | from_cp->c_ctime = to_cp->c_ctime; | |
1817 | from_cp->c_gid = to_cp->c_gid; | |
1818 | from_cp->c_uid = to_cp->c_uid; | |
316670eb | 1819 | from_cp->c_bsdflags = to_cp->c_bsdflags; |
9bccf70c | 1820 | from_cp->c_mode = to_cp->c_mode; |
2d21ac55 A |
1821 | from_cp->c_linkcount = to_cp->c_linkcount; |
1822 | from_cp->c_flag = to_cp->c_flag & (C_HARDLINK | C_HASXATTRS); | |
3a60a9f5 | 1823 | from_cp->c_attr.ca_recflags = to_cp->c_attr.ca_recflags; |
9bccf70c A |
1824 | bcopy(to_cp->c_finderinfo, from_cp->c_finderinfo, 32); |
1825 | ||
1826 | bcopy(&tempdesc, &to_cp->c_desc, sizeof(struct cat_desc)); | |
1827 | to_cp->c_hint = 0; | |
1828 | to_cp->c_fileid = to_cp->c_cnid; | |
1829 | to_cp->c_itime = tempattr.ca_itime; | |
1830 | to_cp->c_btime = tempattr.ca_btime; | |
1831 | to_cp->c_atime = tempattr.ca_atime; | |
1832 | to_cp->c_ctime = tempattr.ca_ctime; | |
1833 | to_cp->c_gid = tempattr.ca_gid; | |
1834 | to_cp->c_uid = tempattr.ca_uid; | |
316670eb | 1835 | to_cp->c_bsdflags = tempattr.ca_flags; |
9bccf70c | 1836 | to_cp->c_mode = tempattr.ca_mode; |
2d21ac55 A |
1837 | to_cp->c_linkcount = tempattr.ca_linkcount; |
1838 | to_cp->c_flag = tempflag; | |
3a60a9f5 | 1839 | to_cp->c_attr.ca_recflags = tempattr.ca_recflags; |
9bccf70c A |
1840 | bcopy(tempattr.ca_finderinfo, to_cp->c_finderinfo, 32); |
1841 | ||
91447636 | 1842 | /* Rehash the cnodes using their new file IDs */ |
b0d623f7 | 1843 | hfs_chash_rehash(hfsmp, from_cp, to_cp); |
90556fb8 A |
1844 | |
1845 | /* | |
1846 | * When a file moves out of "Cleanup At Startup" | |
1847 | * we can drop its NODUMP status. | |
1848 | */ | |
316670eb | 1849 | if ((from_cp->c_bsdflags & UF_NODUMP) && |
90556fb8 | 1850 | (from_cp->c_parentcnid != to_cp->c_parentcnid)) { |
316670eb | 1851 | from_cp->c_bsdflags &= ~UF_NODUMP; |
91447636 | 1852 | from_cp->c_touch_chgtime = TRUE; |
90556fb8 | 1853 | } |
316670eb | 1854 | if ((to_cp->c_bsdflags & UF_NODUMP) && |
90556fb8 | 1855 | (to_cp->c_parentcnid != from_cp->c_parentcnid)) { |
316670eb | 1856 | to_cp->c_bsdflags &= ~UF_NODUMP; |
91447636 | 1857 | to_cp->c_touch_chgtime = TRUE; |
90556fb8 A |
1858 | } |
1859 | ||
91447636 A |
1860 | exit: |
1861 | if (got_cookie) { | |
1862 | cat_postflight(hfsmp, &cookie, vfs_context_proc(ap->a_context)); | |
b4c24cb9 | 1863 | } |
91447636 A |
1864 | if (started_tr) { |
1865 | hfs_end_transaction(hfsmp); | |
b4c24cb9 A |
1866 | } |
1867 | ||
91447636 | 1868 | hfs_unlockpair(from_cp, to_cp); |
9bccf70c A |
1869 | return (error); |
1870 | } | |
1871 | ||
6d2010ae A |
1872 | int |
1873 | hfs_vnop_mmap(struct vnop_mmap_args *ap) | |
1874 | { | |
1875 | struct vnode *vp = ap->a_vp; | |
1876 | int error; | |
1877 | ||
1878 | if (VNODE_IS_RSRC(vp)) { | |
1879 | /* allow pageins of the resource fork */ | |
1880 | } else { | |
1881 | int compressed = hfs_file_is_compressed(VTOC(vp), 1); /* 1 == don't take the cnode lock */ | |
1882 | time_t orig_ctime = VTOC(vp)->c_ctime; | |
1883 | ||
316670eb | 1884 | if (!compressed && (VTOC(vp)->c_bsdflags & UF_COMPRESSED)) { |
6d2010ae A |
1885 | error = check_for_dataless_file(vp, NAMESPACE_HANDLER_READ_OP); |
1886 | if (error != 0) { | |
1887 | return error; | |
1888 | } | |
1889 | } | |
1890 | ||
1891 | if (ap->a_fflags & PROT_WRITE) { | |
1892 | check_for_tracked_file(vp, orig_ctime, NAMESPACE_HANDLER_WRITE_OP, NULL); | |
1893 | } | |
1894 | } | |
1895 | ||
1896 | // | |
1897 | // NOTE: we return ENOTSUP because we want the cluster layer | |
1898 | // to actually do all the real work. | |
1899 | // | |
1900 | return (ENOTSUP); | |
1901 | } | |
1902 | ||
1903 | /* | |
1904 | * hfs_movedata | |
1905 | * | |
1906 | * This is a non-symmetric variant of exchangedata. In this function, | |
1907 | * the contents of the fork in from_vp are moved to the fork | |
1908 | * specified by to_vp. | |
1909 | * | |
1910 | * The cnodes pointed to by 'from_vp' and 'to_vp' must be locked. | |
1911 | * | |
1912 | * The vnode pointed to by 'to_vp' *must* be empty prior to invoking this function. | |
1913 | * We impose this restriction because we may not be able to fully delete the entire | |
1914 | * file's contents in a single transaction, particularly if it has a lot of extents. | |
1915 | * In the normal file deletion codepath, the file is screened for two conditions: | |
1916 | * 1) bigger than 400MB, and 2) more than 8 extents. If so, the file is relocated to | |
1917 | * the hidden directory and the deletion is broken up into multiple truncates. We can't | |
1918 | * do that here because both files need to exist in the namespace. The main reason this | |
1919 | * is imposed is that we may have to touch a whole lot of bitmap blocks if there are | |
1920 | * many extents. | |
1921 | * | |
1922 | * Any data written to 'from_vp' after this call completes is not guaranteed | |
1923 | * to be moved. | |
1924 | * | |
1925 | * Arguments: | |
1926 | * vnode from_vp: source file | |
1927 | * vnode to_vp: destination file; must be empty | |
1928 | * | |
1929 | * Returns: | |
1930 | * EFBIG - Destination file was not empty | |
1931 | * 0 - success | |
1932 | * | |
1933 | * | |
1934 | */ | |
1935 | int hfs_movedata (struct vnode *from_vp, struct vnode *to_vp) { | |
316670eb | 1936 | |
6d2010ae A |
1937 | struct cnode *from_cp; |
1938 | struct cnode *to_cp; | |
1939 | struct hfsmount *hfsmp = NULL; | |
1940 | int error = 0; | |
1941 | int started_tr = 0; | |
1942 | int lockflags = 0; | |
1943 | int overflow_blocks; | |
1944 | int rsrc = 0; | |
316670eb A |
1945 | |
1946 | ||
6d2010ae A |
1947 | /* Get the HFS pointers */ |
1948 | from_cp = VTOC(from_vp); | |
1949 | to_cp = VTOC(to_vp); | |
1950 | hfsmp = VTOHFS(from_vp); | |
316670eb | 1951 | |
6d2010ae A |
1952 | /* Verify that neither source/dest file is open-unlinked */ |
1953 | if (from_cp->c_flag & (C_DELETED | C_NOEXISTS)) { | |
1954 | error = EBUSY; | |
1955 | goto movedata_exit; | |
1956 | } | |
1957 | ||
1958 | if (to_cp->c_flag & (C_DELETED | C_NOEXISTS)) { | |
1959 | error = EBUSY; | |
1960 | goto movedata_exit; | |
1961 | } | |
1962 | ||
1963 | /* | |
1964 | * Verify the source file is not in use by anyone besides us. | |
1965 | * | |
1966 | * This function is typically invoked by a namespace handler | |
1967 | * process responding to a temporarily stalled system call. | |
1968 | * The FD that it is working off of is opened O_EVTONLY, so | |
1969 | * it really has no active usecounts (the kusecount from O_EVTONLY | |
1970 | * is subtracted from the total usecounts). | |
1971 | * | |
1972 | * As a result, we shouldn't have any active usecounts against | |
1973 | * this vnode when we go to check it below. | |
1974 | */ | |
1975 | if (vnode_isinuse(from_vp, 0)) { | |
1976 | error = EBUSY; | |
1977 | goto movedata_exit; | |
1978 | } | |
1979 | ||
1980 | if (from_cp->c_rsrc_vp == from_vp) { | |
1981 | rsrc = 1; | |
1982 | } | |
316670eb | 1983 | |
6d2010ae A |
1984 | /* |
1985 | * We assume that the destination file is already empty. | |
1986 | * Verify that it is. | |
1987 | */ | |
1988 | if (rsrc) { | |
1989 | if (to_cp->c_rsrcfork->ff_size > 0) { | |
1990 | error = EFBIG; | |
1991 | goto movedata_exit; | |
1992 | } | |
1993 | } | |
1994 | else { | |
1995 | if (to_cp->c_datafork->ff_size > 0) { | |
1996 | error = EFBIG; | |
1997 | goto movedata_exit; | |
1998 | } | |
1999 | } | |
316670eb | 2000 | |
6d2010ae A |
2001 | /* If the source has the rsrc open, make sure the destination is also the rsrc */ |
2002 | if (rsrc) { | |
2003 | if (to_vp != to_cp->c_rsrc_vp) { | |
2004 | error = EINVAL; | |
2005 | goto movedata_exit; | |
2006 | } | |
2007 | } | |
2008 | else { | |
2009 | /* Verify that both forks are data forks */ | |
2010 | if (to_vp != to_cp->c_vp) { | |
2011 | error = EINVAL; | |
2012 | goto movedata_exit; | |
316670eb | 2013 | } |
6d2010ae | 2014 | } |
316670eb | 2015 | |
6d2010ae A |
2016 | /* |
2017 | * See if the source file has overflow extents. If it doesn't, we don't | |
2018 | * need to call into MoveData, and the catalog will be enough. | |
2019 | */ | |
2020 | if (rsrc) { | |
2021 | overflow_blocks = overflow_extents(from_cp->c_rsrcfork); | |
2022 | } | |
2023 | else { | |
2024 | overflow_blocks = overflow_extents(from_cp->c_datafork); | |
2025 | } | |
316670eb | 2026 | |
6d2010ae A |
2027 | if ((error = hfs_start_transaction (hfsmp)) != 0) { |
2028 | goto movedata_exit; | |
2029 | } | |
2030 | started_tr = 1; | |
316670eb | 2031 | |
6d2010ae A |
2032 | /* Lock the system files: catalog, extents, attributes */ |
2033 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG | SFL_EXTENTS | SFL_ATTRIBUTE, HFS_EXCLUSIVE_LOCK); | |
316670eb | 2034 | |
6d2010ae A |
2035 | /* Copy over any catalog allocation data into the new spot. */ |
2036 | if (rsrc) { | |
2037 | if ((error = hfs_move_fork (from_cp->c_rsrcfork, from_cp, to_cp->c_rsrcfork, to_cp))){ | |
2038 | hfs_systemfile_unlock(hfsmp, lockflags); | |
2039 | goto movedata_exit; | |
2040 | } | |
2041 | } | |
2042 | else { | |
2043 | if ((error = hfs_move_fork (from_cp->c_datafork, from_cp, to_cp->c_datafork, to_cp))) { | |
2044 | hfs_systemfile_unlock(hfsmp, lockflags); | |
2045 | goto movedata_exit; | |
2046 | } | |
2047 | } | |
316670eb | 2048 | |
6d2010ae A |
2049 | /* |
2050 | * Note that because all we're doing is moving the extents around, we can | |
2051 | * probably do this in a single transaction: Each extent record (group of 8) | |
2052 | * is 64 bytes. A extent overflow B-Tree node is typically 4k. This means | |
2053 | * each node can hold roughly ~60 extent records == (480 extents). | |
2054 | * | |
2055 | * If a file was massively fragmented and had 20k extents, this means we'd | |
2056 | * roughly touch 20k/480 == 41 to 42 nodes, plus the index nodes, for half | |
2057 | * of the operation. (inserting or deleting). So if we're manipulating 80-100 | |
2058 | * nodes, this is basically 320k of data to write to the journal in | |
2059 | * a bad case. | |
2060 | */ | |
2061 | if (overflow_blocks != 0) { | |
2062 | if (rsrc) { | |
2063 | error = MoveData(hfsmp, from_cp->c_cnid, to_cp->c_cnid, 1); | |
2064 | } | |
2065 | else { | |
2066 | error = MoveData (hfsmp, from_cp->c_cnid, to_cp->c_cnid, 0); | |
2067 | } | |
2068 | } | |
316670eb | 2069 | |
6d2010ae A |
2070 | if (error) { |
2071 | /* Reverse the operation. Copy the fork data back into the source */ | |
2072 | if (rsrc) { | |
2073 | hfs_move_fork (to_cp->c_rsrcfork, to_cp, from_cp->c_rsrcfork, from_cp); | |
2074 | } | |
2075 | else { | |
2076 | hfs_move_fork (to_cp->c_datafork, to_cp, from_cp->c_datafork, from_cp); | |
2077 | } | |
2078 | } | |
2079 | else { | |
2080 | struct cat_fork *src_data = NULL; | |
2081 | struct cat_fork *src_rsrc = NULL; | |
2082 | struct cat_fork *dst_data = NULL; | |
2083 | struct cat_fork *dst_rsrc = NULL; | |
316670eb | 2084 | |
6d2010ae A |
2085 | /* Touch the times*/ |
2086 | to_cp->c_touch_acctime = TRUE; | |
2087 | to_cp->c_touch_chgtime = TRUE; | |
2088 | to_cp->c_touch_modtime = TRUE; | |
316670eb | 2089 | |
6d2010ae A |
2090 | from_cp->c_touch_acctime = TRUE; |
2091 | from_cp->c_touch_chgtime = TRUE; | |
2092 | from_cp->c_touch_modtime = TRUE; | |
316670eb | 2093 | |
6d2010ae A |
2094 | hfs_touchtimes(hfsmp, to_cp); |
2095 | hfs_touchtimes(hfsmp, from_cp); | |
316670eb | 2096 | |
6d2010ae A |
2097 | if (from_cp->c_datafork) { |
2098 | src_data = &from_cp->c_datafork->ff_data; | |
2099 | } | |
2100 | if (from_cp->c_rsrcfork) { | |
2101 | src_rsrc = &from_cp->c_rsrcfork->ff_data; | |
2102 | } | |
316670eb | 2103 | |
6d2010ae A |
2104 | if (to_cp->c_datafork) { |
2105 | dst_data = &to_cp->c_datafork->ff_data; | |
2106 | } | |
2107 | if (to_cp->c_rsrcfork) { | |
2108 | dst_rsrc = &to_cp->c_rsrcfork->ff_data; | |
2109 | } | |
316670eb | 2110 | |
6d2010ae A |
2111 | /* Update the catalog nodes */ |
2112 | (void) cat_update(hfsmp, &from_cp->c_desc, &from_cp->c_attr, | |
316670eb A |
2113 | src_data, src_rsrc); |
2114 | ||
6d2010ae | 2115 | (void) cat_update(hfsmp, &to_cp->c_desc, &to_cp->c_attr, |
316670eb A |
2116 | dst_data, dst_rsrc); |
2117 | ||
6d2010ae A |
2118 | } |
2119 | /* unlock the system files */ | |
2120 | hfs_systemfile_unlock(hfsmp, lockflags); | |
316670eb A |
2121 | |
2122 | ||
6d2010ae A |
2123 | movedata_exit: |
2124 | if (started_tr) { | |
2125 | hfs_end_transaction(hfsmp); | |
2126 | } | |
316670eb | 2127 | |
6d2010ae | 2128 | return error; |
316670eb | 2129 | |
6d2010ae A |
2130 | } |
2131 | ||
2132 | /* | |
2133 | * Copy all of the catalog and runtime data in srcfork to dstfork. | |
2134 | * | |
2135 | * This allows us to maintain the invalid ranges across the movedata operation so | |
2136 | * we don't need to force all of the pending IO right now. In addition, we move all | |
2137 | * non overflow-extent extents into the destination here. | |
2138 | */ | |
2139 | static int hfs_move_fork (struct filefork *srcfork, struct cnode *src_cp, | |
316670eb | 2140 | struct filefork *dstfork, struct cnode *dst_cp) { |
6d2010ae A |
2141 | struct rl_entry *invalid_range; |
2142 | int size = sizeof(struct HFSPlusExtentDescriptor); | |
2143 | size = size * kHFSPlusExtentDensity; | |
316670eb | 2144 | |
6d2010ae A |
2145 | /* If the dstfork has any invalid ranges, bail out */ |
2146 | invalid_range = TAILQ_FIRST(&dstfork->ff_invalidranges); | |
2147 | if (invalid_range != NULL) { | |
2148 | return EFBIG; | |
2149 | } | |
316670eb | 2150 | |
6d2010ae A |
2151 | if (dstfork->ff_data.cf_size != 0 || dstfork->ff_data.cf_new_size != 0) { |
2152 | return EFBIG; | |
2153 | } | |
316670eb | 2154 | |
6d2010ae A |
2155 | /* First copy the invalid ranges */ |
2156 | while ((invalid_range = TAILQ_FIRST(&srcfork->ff_invalidranges))) { | |
2157 | off_t start = invalid_range->rl_start; | |
2158 | off_t end = invalid_range->rl_end; | |
316670eb | 2159 | |
6d2010ae A |
2160 | /* Remove it from the srcfork and add it to dstfork */ |
2161 | rl_remove(start, end, &srcfork->ff_invalidranges); | |
2162 | rl_add(start, end, &dstfork->ff_invalidranges); | |
2163 | } | |
316670eb | 2164 | |
6d2010ae A |
2165 | /* |
2166 | * Ignore the ff_union. We don't move symlinks or system files. | |
2167 | * Now copy the in-catalog extent information | |
2168 | */ | |
2169 | dstfork->ff_data.cf_size = srcfork->ff_data.cf_size; | |
2170 | dstfork->ff_data.cf_new_size = srcfork->ff_data.cf_new_size; | |
2171 | dstfork->ff_data.cf_vblocks = srcfork->ff_data.cf_vblocks; | |
2172 | dstfork->ff_data.cf_blocks = srcfork->ff_data.cf_blocks; | |
316670eb | 2173 | |
6d2010ae A |
2174 | /* just memcpy the whole array of extents to the new location. */ |
2175 | memcpy (dstfork->ff_data.cf_extents, srcfork->ff_data.cf_extents, size); | |
316670eb | 2176 | |
6d2010ae A |
2177 | /* |
2178 | * Copy the cnode attribute data. | |
2179 | * | |
2180 | */ | |
2181 | src_cp->c_blocks -= srcfork->ff_data.cf_vblocks; | |
2182 | src_cp->c_blocks -= srcfork->ff_data.cf_blocks; | |
316670eb | 2183 | |
6d2010ae A |
2184 | dst_cp->c_blocks += srcfork->ff_data.cf_vblocks; |
2185 | dst_cp->c_blocks += srcfork->ff_data.cf_blocks; | |
316670eb | 2186 | |
6d2010ae A |
2187 | /* Now delete the entries in the source fork */ |
2188 | srcfork->ff_data.cf_size = 0; | |
2189 | srcfork->ff_data.cf_new_size = 0; | |
2190 | srcfork->ff_data.cf_union.cfu_bytesread = 0; | |
2191 | srcfork->ff_data.cf_vblocks = 0; | |
2192 | srcfork->ff_data.cf_blocks = 0; | |
2193 | ||
2194 | /* Zero out the old extents */ | |
2195 | bzero (srcfork->ff_data.cf_extents, size); | |
2196 | return 0; | |
2197 | } | |
316670eb | 2198 | |
9bccf70c A |
2199 | |
2200 | /* | |
91447636 A |
2201 | * cnode must be locked |
2202 | */ | |
91447636 A |
2203 | int |
2204 | hfs_fsync(struct vnode *vp, int waitfor, int fullsync, struct proc *p) | |
9bccf70c | 2205 | { |
9bccf70c A |
2206 | struct cnode *cp = VTOC(vp); |
2207 | struct filefork *fp = NULL; | |
2208 | int retval = 0; | |
91447636 | 2209 | struct hfsmount *hfsmp = VTOHFS(vp); |
b0d623f7 | 2210 | struct rl_entry *invalid_range; |
9bccf70c | 2211 | struct timeval tv; |
b0d623f7 A |
2212 | int waitdata; /* attributes necessary for data retrieval */ |
2213 | int wait; /* all other attributes (e.g. atime, etc.) */ | |
91447636 A |
2214 | int lockflag; |
2215 | int took_trunc_lock = 0; | |
316670eb | 2216 | int locked_buffers = 0; |
9bccf70c | 2217 | |
b0d623f7 A |
2218 | /* |
2219 | * Applications which only care about data integrity rather than full | |
2220 | * file integrity may opt out of (delay) expensive metadata update | |
2221 | * operations as a performance optimization. | |
2222 | */ | |
91447636 | 2223 | wait = (waitfor == MNT_WAIT); |
b0d623f7 | 2224 | waitdata = (waitfor == MNT_DWAIT) | wait; |
2d21ac55 A |
2225 | if (always_do_fullfsync) |
2226 | fullsync = 1; | |
2227 | ||
9bccf70c | 2228 | /* HFS directories don't have any data blocks. */ |
91447636 | 2229 | if (vnode_isdir(vp)) |
9bccf70c | 2230 | goto metasync; |
b0d623f7 | 2231 | fp = VTOF(vp); |
9bccf70c A |
2232 | |
2233 | /* | |
2234 | * For system files flush the B-tree header and | |
2235 | * for regular files write out any clusters | |
2236 | */ | |
91447636 | 2237 | if (vnode_issystem(vp)) { |
b4c24cb9 A |
2238 | if (VTOF(vp)->fcbBTCBPtr != NULL) { |
2239 | // XXXdbg | |
55e303ae | 2240 | if (hfsmp->jnl == NULL) { |
b4c24cb9 A |
2241 | BTFlushPath(VTOF(vp)); |
2242 | } | |
2243 | } | |
91447636 A |
2244 | } else if (UBCINFOEXISTS(vp)) { |
2245 | hfs_unlock(cp); | |
6d2010ae | 2246 | hfs_lock_truncate(cp, HFS_SHARED_LOCK); |
91447636 | 2247 | took_trunc_lock = 1; |
9bccf70c | 2248 | |
b0d623f7 | 2249 | if (fp->ff_unallocblocks != 0) { |
6d2010ae | 2250 | hfs_unlock_truncate(cp, 0); |
b0d623f7 | 2251 | |
6d2010ae | 2252 | hfs_lock_truncate(cp, HFS_EXCLUSIVE_LOCK); |
b0d623f7 | 2253 | } |
91447636 | 2254 | /* Don't hold cnode lock when calling into cluster layer. */ |
b0d623f7 | 2255 | (void) cluster_push(vp, waitdata ? IO_SYNC : 0); |
91447636 A |
2256 | |
2257 | hfs_lock(cp, HFS_FORCE_LOCK); | |
2258 | } | |
9bccf70c A |
2259 | /* |
2260 | * When MNT_WAIT is requested and the zero fill timeout | |
2261 | * has expired then we must explicitly zero out any areas | |
2262 | * that are currently marked invalid (holes). | |
90556fb8 A |
2263 | * |
2264 | * Files with NODUMP can bypass zero filling here. | |
9bccf70c | 2265 | */ |
b0d623f7 A |
2266 | if (fp && (((cp->c_flag & C_ALWAYS_ZEROFILL) && !TAILQ_EMPTY(&fp->ff_invalidranges)) || |
2267 | ((wait || (cp->c_flag & C_ZFWANTSYNC)) && | |
316670eb | 2268 | ((cp->c_bsdflags & UF_NODUMP) == 0) && |
b0d623f7 A |
2269 | UBCINFOEXISTS(vp) && (vnode_issystem(vp) ==0) && |
2270 | cp->c_zftimeout != 0))) { | |
2271 | ||
91447636 | 2272 | microuptime(&tv); |
b0d623f7 | 2273 | if ((cp->c_flag & C_ALWAYS_ZEROFILL) == 0 && !fullsync && tv.tv_sec < (long)cp->c_zftimeout) { |
9bccf70c A |
2274 | /* Remember that a force sync was requested. */ |
2275 | cp->c_flag |= C_ZFWANTSYNC; | |
91447636 A |
2276 | goto datasync; |
2277 | } | |
b0d623f7 | 2278 | if (!TAILQ_EMPTY(&fp->ff_invalidranges)) { |
6d2010ae | 2279 | if (!took_trunc_lock || (cp->c_truncatelockowner == HFS_SHARED_OWNER)) { |
b0d623f7 | 2280 | hfs_unlock(cp); |
6d2010ae A |
2281 | if (took_trunc_lock) { |
2282 | hfs_unlock_truncate(cp, 0); | |
2283 | } | |
2284 | hfs_lock_truncate(cp, HFS_EXCLUSIVE_LOCK); | |
b0d623f7 A |
2285 | hfs_lock(cp, HFS_FORCE_LOCK); |
2286 | took_trunc_lock = 1; | |
2287 | } | |
2288 | while ((invalid_range = TAILQ_FIRST(&fp->ff_invalidranges))) { | |
2289 | off_t start = invalid_range->rl_start; | |
2290 | off_t end = invalid_range->rl_end; | |
9bccf70c | 2291 | |
b0d623f7 A |
2292 | /* The range about to be written must be validated |
2293 | * first, so that VNOP_BLOCKMAP() will return the | |
2294 | * appropriate mapping for the cluster code: | |
2295 | */ | |
2296 | rl_remove(start, end, &fp->ff_invalidranges); | |
9bccf70c | 2297 | |
b0d623f7 A |
2298 | /* Don't hold cnode lock when calling into cluster layer. */ |
2299 | hfs_unlock(cp); | |
2300 | (void) cluster_write(vp, (struct uio *) 0, | |
2301 | fp->ff_size, end + 1, start, (off_t)0, | |
2302 | IO_HEADZEROFILL | IO_NOZERODIRTY | IO_NOCACHE); | |
2303 | hfs_lock(cp, HFS_FORCE_LOCK); | |
2304 | cp->c_flag |= C_MODIFIED; | |
2305 | } | |
91447636 | 2306 | hfs_unlock(cp); |
b0d623f7 | 2307 | (void) cluster_push(vp, waitdata ? IO_SYNC : 0); |
91447636 | 2308 | hfs_lock(cp, HFS_FORCE_LOCK); |
9bccf70c | 2309 | } |
9bccf70c A |
2310 | cp->c_flag &= ~C_ZFWANTSYNC; |
2311 | cp->c_zftimeout = 0; | |
2312 | } | |
91447636 | 2313 | datasync: |
b0d623f7 | 2314 | if (took_trunc_lock) { |
6d2010ae | 2315 | hfs_unlock_truncate(cp, 0); |
b0d623f7 A |
2316 | took_trunc_lock = 0; |
2317 | } | |
91447636 A |
2318 | /* |
2319 | * if we have a journal and if journal_active() returns != 0 then the | |
2320 | * we shouldn't do anything to a locked block (because it is part | |
2321 | * of a transaction). otherwise we'll just go through the normal | |
2322 | * code path and flush the buffer. note journal_active() can return | |
2323 | * -1 if the journal is invalid -- however we still need to skip any | |
2324 | * locked blocks as they get cleaned up when we finish the transaction | |
2325 | * or close the journal. | |
2326 | */ | |
2327 | // if (hfsmp->jnl && journal_active(hfsmp->jnl) >= 0) | |
2328 | if (hfsmp->jnl) | |
2329 | lockflag = BUF_SKIP_LOCKED; | |
2330 | else | |
2331 | lockflag = 0; | |
9bccf70c A |
2332 | |
2333 | /* | |
2334 | * Flush all dirty buffers associated with a vnode. | |
316670eb | 2335 | * Record how many of them were dirty AND locked (if necessary). |
9bccf70c | 2336 | */ |
316670eb A |
2337 | locked_buffers = buf_flushdirtyblks_skipinfo(vp, waitdata, lockflag, "hfs_fsync"); |
2338 | if ((lockflag & BUF_SKIP_LOCKED) && (locked_buffers) && (vnode_vtype(vp) == VLNK)) { | |
2339 | /* | |
2340 | * If there are dirty symlink buffers, then we may need to take action | |
2341 | * to prevent issues later on if we are journaled. If we're fsyncing a | |
2342 | * symlink vnode then we are in one of three cases: | |
2343 | * | |
2344 | * 1) automatic sync has fired. In this case, we don't want the behavior to change. | |
2345 | * | |
2346 | * 2) Someone has opened the FD for the symlink (not what it points to) | |
2347 | * and has issued an fsync against it. This should be rare, and we don't | |
2348 | * want the behavior to change. | |
2349 | * | |
2350 | * 3) We are being called by a vclean which is trying to reclaim this | |
2351 | * symlink vnode. If this is the case, then allowing this fsync to | |
2352 | * proceed WITHOUT flushing the journal could result in the vclean | |
2353 | * invalidating the buffer's blocks before the journal transaction is | |
2354 | * written to disk. To prevent this, we force a journal flush | |
2355 | * if the vnode is in the middle of a recycle (VL_TERMINATE or VL_DEAD is set). | |
2356 | */ | |
2357 | if (vnode_isrecycled(vp)) { | |
2358 | fullsync = 1; | |
2359 | } | |
2360 | } | |
9bccf70c A |
2361 | |
2362 | metasync: | |
91447636 A |
2363 | if (vnode_isreg(vp) && vnode_issystem(vp)) { |
2364 | if (VTOF(vp)->fcbBTCBPtr != NULL) { | |
2365 | microuptime(&tv); | |
9bccf70c | 2366 | BTSetLastSync(VTOF(vp), tv.tv_sec); |
91447636 A |
2367 | } |
2368 | cp->c_touch_acctime = FALSE; | |
2369 | cp->c_touch_chgtime = FALSE; | |
2370 | cp->c_touch_modtime = FALSE; | |
3a60a9f5 | 2371 | } else if ( !(vp->v_flag & VSWAP) ) /* User file */ { |
91447636 | 2372 | retval = hfs_update(vp, wait); |
9bccf70c | 2373 | |
2d21ac55 A |
2374 | /* |
2375 | * When MNT_WAIT is requested push out the catalog record for | |
2376 | * this file. If they asked for a full fsync, we can skip this | |
2377 | * because the journal_flush or hfs_metasync_all will push out | |
2378 | * all of the metadata changes. | |
2379 | */ | |
2380 | if ((retval == 0) && wait && !fullsync && cp->c_hint && | |
9bccf70c | 2381 | !ISSET(cp->c_flag, C_DELETED | C_NOEXISTS)) { |
91447636 | 2382 | hfs_metasync(VTOHFS(vp), (daddr64_t)cp->c_hint, p); |
2d21ac55 | 2383 | } |
55e303ae | 2384 | |
2d21ac55 A |
2385 | /* |
2386 | * If this was a full fsync, make sure all metadata | |
2387 | * changes get to stable storage. | |
2388 | */ | |
2389 | if (fullsync) { | |
6d2010ae A |
2390 | if (hfsmp->jnl) { |
2391 | hfs_journal_flush(hfsmp, FALSE); | |
2392 | ||
2393 | if (journal_uses_fua(hfsmp->jnl)) { | |
2394 | /* | |
2395 | * the journal_flush did NOT issue a sync track cache command, | |
2396 | * and the fullsync indicates we are supposed to flush all cached | |
2397 | * data to the media, so issue the sync track cache command | |
2398 | * explicitly | |
2399 | */ | |
2400 | VNOP_IOCTL(hfsmp->hfs_devvp, DKIOCSYNCHRONIZECACHE, NULL, FWRITE, NULL); | |
2401 | } | |
2402 | } else { | |
2403 | retval = hfs_metasync_all(hfsmp); | |
2404 | /* XXX need to pass context! */ | |
2405 | VNOP_IOCTL(hfsmp->hfs_devvp, DKIOCSYNCHRONIZECACHE, NULL, FWRITE, NULL); | |
2406 | } | |
55e303ae | 2407 | } |
9bccf70c A |
2408 | } |
2409 | ||
2410 | return (retval); | |
2411 | } | |
2412 | ||
91447636 | 2413 | |
9bccf70c | 2414 | /* Sync an hfs catalog b-tree node */ |
6d2010ae | 2415 | int |
2d21ac55 | 2416 | hfs_metasync(struct hfsmount *hfsmp, daddr64_t node, __unused struct proc *p) |
9bccf70c | 2417 | { |
91447636 A |
2418 | vnode_t vp; |
2419 | buf_t bp; | |
2420 | int lockflags; | |
9bccf70c A |
2421 | |
2422 | vp = HFSTOVCB(hfsmp)->catalogRefNum; | |
2423 | ||
b4c24cb9 A |
2424 | // XXXdbg - don't need to do this on a journaled volume |
2425 | if (hfsmp->jnl) { | |
2426 | return 0; | |
2427 | } | |
2428 | ||
91447636 | 2429 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_EXCLUSIVE_LOCK); |
9bccf70c A |
2430 | /* |
2431 | * Look for a matching node that has been delayed | |
2432 | * but is not part of a set (B_LOCKED). | |
91447636 A |
2433 | * |
2434 | * BLK_ONLYVALID causes buf_getblk to return a | |
2435 | * buf_t for the daddr64_t specified only if it's | |
2436 | * currently resident in the cache... the size | |
2437 | * parameter to buf_getblk is ignored when this flag | |
2438 | * is set | |
9bccf70c | 2439 | */ |
91447636 A |
2440 | bp = buf_getblk(vp, node, 0, 0, 0, BLK_META | BLK_ONLYVALID); |
2441 | ||
2442 | if (bp) { | |
2443 | if ((buf_flags(bp) & (B_LOCKED | B_DELWRI)) == B_DELWRI) | |
2444 | (void) VNOP_BWRITE(bp); | |
2445 | else | |
2446 | buf_brelse(bp); | |
9bccf70c | 2447 | } |
91447636 A |
2448 | |
2449 | hfs_systemfile_unlock(hfsmp, lockflags); | |
9bccf70c A |
2450 | |
2451 | return (0); | |
2452 | } | |
2453 | ||
91447636 | 2454 | |
2d21ac55 A |
2455 | /* |
2456 | * Sync all hfs B-trees. Use this instead of journal_flush for a volume | |
2457 | * without a journal. Note that the volume bitmap does not get written; | |
2458 | * we rely on fsck_hfs to fix that up (which it can do without any loss | |
2459 | * of data). | |
2460 | */ | |
6d2010ae | 2461 | int |
2d21ac55 A |
2462 | hfs_metasync_all(struct hfsmount *hfsmp) |
2463 | { | |
2464 | int lockflags; | |
2465 | ||
2466 | /* Lock all of the B-trees so we get a mutually consistent state */ | |
2467 | lockflags = hfs_systemfile_lock(hfsmp, | |
2468 | SFL_CATALOG|SFL_EXTENTS|SFL_ATTRIBUTE, HFS_EXCLUSIVE_LOCK); | |
2469 | ||
2470 | /* Sync each of the B-trees */ | |
2471 | if (hfsmp->hfs_catalog_vp) | |
2472 | hfs_btsync(hfsmp->hfs_catalog_vp, 0); | |
2473 | if (hfsmp->hfs_extents_vp) | |
2474 | hfs_btsync(hfsmp->hfs_extents_vp, 0); | |
2475 | if (hfsmp->hfs_attribute_vp) | |
2476 | hfs_btsync(hfsmp->hfs_attribute_vp, 0); | |
2477 | ||
2478 | /* Wait for all of the writes to complete */ | |
2479 | if (hfsmp->hfs_catalog_vp) | |
2480 | vnode_waitforwrites(hfsmp->hfs_catalog_vp, 0, 0, 0, "hfs_metasync_all"); | |
2481 | if (hfsmp->hfs_extents_vp) | |
2482 | vnode_waitforwrites(hfsmp->hfs_extents_vp, 0, 0, 0, "hfs_metasync_all"); | |
2483 | if (hfsmp->hfs_attribute_vp) | |
2484 | vnode_waitforwrites(hfsmp->hfs_attribute_vp, 0, 0, 0, "hfs_metasync_all"); | |
2485 | ||
2486 | hfs_systemfile_unlock(hfsmp, lockflags); | |
2487 | ||
2488 | return 0; | |
2489 | } | |
2490 | ||
2491 | ||
91447636 A |
2492 | /*ARGSUSED 1*/ |
2493 | static int | |
2d21ac55 | 2494 | hfs_btsync_callback(struct buf *bp, __unused void *dummy) |
91447636 A |
2495 | { |
2496 | buf_clearflags(bp, B_LOCKED); | |
2497 | (void) buf_bawrite(bp); | |
2498 | ||
2499 | return(BUF_CLAIMED); | |
2500 | } | |
2501 | ||
2502 | ||
9bccf70c A |
2503 | int |
2504 | hfs_btsync(struct vnode *vp, int sync_transaction) | |
2505 | { | |
2506 | struct cnode *cp = VTOC(vp); | |
9bccf70c | 2507 | struct timeval tv; |
91447636 | 2508 | int flags = 0; |
9bccf70c | 2509 | |
91447636 A |
2510 | if (sync_transaction) |
2511 | flags |= BUF_SKIP_NONLOCKED; | |
9bccf70c A |
2512 | /* |
2513 | * Flush all dirty buffers associated with b-tree. | |
2514 | */ | |
91447636 | 2515 | buf_iterate(vp, hfs_btsync_callback, flags, 0); |
b4c24cb9 | 2516 | |
91447636 A |
2517 | microuptime(&tv); |
2518 | if (vnode_issystem(vp) && (VTOF(vp)->fcbBTCBPtr != NULL)) | |
9bccf70c | 2519 | (void) BTSetLastSync(VTOF(vp), tv.tv_sec); |
91447636 A |
2520 | cp->c_touch_acctime = FALSE; |
2521 | cp->c_touch_chgtime = FALSE; | |
2522 | cp->c_touch_modtime = FALSE; | |
9bccf70c A |
2523 | |
2524 | return 0; | |
2525 | } | |
2526 | ||
2527 | /* | |
91447636 | 2528 | * Remove a directory. |
9bccf70c | 2529 | */ |
6d2010ae | 2530 | int |
91447636 A |
2531 | hfs_vnop_rmdir(ap) |
2532 | struct vnop_rmdir_args /* { | |
9bccf70c A |
2533 | struct vnode *a_dvp; |
2534 | struct vnode *a_vp; | |
2535 | struct componentname *a_cnp; | |
91447636 | 2536 | vfs_context_t a_context; |
9bccf70c A |
2537 | } */ *ap; |
2538 | { | |
91447636 A |
2539 | struct vnode *dvp = ap->a_dvp; |
2540 | struct vnode *vp = ap->a_vp; | |
2d21ac55 A |
2541 | struct cnode *dcp = VTOC(dvp); |
2542 | struct cnode *cp = VTOC(vp); | |
91447636 | 2543 | int error; |
6d2010ae A |
2544 | time_t orig_ctime; |
2545 | ||
2546 | orig_ctime = VTOC(vp)->c_ctime; | |
91447636 | 2547 | |
2d21ac55 | 2548 | if (!S_ISDIR(cp->c_mode)) { |
91447636 A |
2549 | return (ENOTDIR); |
2550 | } | |
2551 | if (dvp == vp) { | |
2552 | return (EINVAL); | |
2553 | } | |
6d2010ae A |
2554 | |
2555 | check_for_tracked_file(vp, orig_ctime, NAMESPACE_HANDLER_DELETE_OP, NULL); | |
2556 | cp = VTOC(vp); | |
2557 | ||
2d21ac55 | 2558 | if ((error = hfs_lockpair(dcp, cp, HFS_EXCLUSIVE_LOCK))) { |
91447636 | 2559 | return (error); |
2d21ac55 | 2560 | } |
b0d623f7 A |
2561 | |
2562 | /* Check for a race with rmdir on the parent directory */ | |
2563 | if (dcp->c_flag & (C_DELETED | C_NOEXISTS)) { | |
2564 | hfs_unlockpair (dcp, cp); | |
2565 | return ENOENT; | |
2566 | } | |
6d2010ae | 2567 | error = hfs_removedir(dvp, vp, ap->a_cnp, 0, 0); |
b0d623f7 | 2568 | |
2d21ac55 | 2569 | hfs_unlockpair(dcp, cp); |
91447636 A |
2570 | |
2571 | return (error); | |
55e303ae A |
2572 | } |
2573 | ||
2574 | /* | |
91447636 A |
2575 | * Remove a directory |
2576 | * | |
2577 | * Both dvp and vp cnodes are locked | |
55e303ae | 2578 | */ |
6d2010ae | 2579 | int |
91447636 | 2580 | hfs_removedir(struct vnode *dvp, struct vnode *vp, struct componentname *cnp, |
6d2010ae | 2581 | int skip_reserve, int only_unlink) |
55e303ae | 2582 | { |
9bccf70c A |
2583 | struct cnode *cp; |
2584 | struct cnode *dcp; | |
2585 | struct hfsmount * hfsmp; | |
91447636 | 2586 | struct cat_desc desc; |
91447636 | 2587 | int lockflags; |
2d21ac55 | 2588 | int error = 0, started_tr = 0; |
9bccf70c A |
2589 | |
2590 | cp = VTOC(vp); | |
2591 | dcp = VTOC(dvp); | |
2592 | hfsmp = VTOHFS(vp); | |
2593 | ||
2d21ac55 | 2594 | if (dcp == cp) { |
9bccf70c | 2595 | return (EINVAL); /* cannot remove "." */ |
2d21ac55 A |
2596 | } |
2597 | if (cp->c_flag & (C_NOEXISTS | C_DELETED)) { | |
2598 | return (0); | |
2599 | } | |
2600 | if (cp->c_entries != 0) { | |
2601 | return (ENOTEMPTY); | |
2602 | } | |
6d2010ae A |
2603 | |
2604 | /* | |
2605 | * If the directory is open or in use (e.g. opendir() or current working | |
2606 | * directory for some process); wait for inactive/reclaim to actually | |
2607 | * remove cnode from the catalog. Both inactive and reclaim codepaths are capable | |
2608 | * of removing open-unlinked directories from the catalog, as well as getting rid | |
2609 | * of EAs still on the element. So change only_unlink to true, so that it will get | |
2610 | * cleaned up below. | |
2611 | * | |
2612 | * Otherwise, we can get into a weird old mess where the directory has C_DELETED, | |
2613 | * but it really means C_NOEXISTS because the item was actually removed from the | |
2614 | * catalog. Then when we try to remove the entry from the catalog later on, it won't | |
2615 | * really be there anymore. | |
2616 | */ | |
2617 | if (vnode_isinuse(vp, 0)) { | |
2618 | only_unlink = 1; | |
2619 | } | |
2d21ac55 | 2620 | |
6d2010ae | 2621 | /* Deal with directory hardlinks */ |
2d21ac55 | 2622 | if (cp->c_flag & C_HARDLINK) { |
6d2010ae A |
2623 | /* |
2624 | * Note that if we have a directory which was a hardlink at any point, | |
2625 | * its actual directory data is stored in the directory inode in the hidden | |
2626 | * directory rather than the leaf element(s) present in the namespace. | |
2627 | * | |
2628 | * If there are still other hardlinks to this directory, | |
2629 | * then we'll just eliminate this particular link and the vnode will still exist. | |
2630 | * If this is the last link to an empty directory, then we'll open-unlink the | |
2631 | * directory and it will be only tagged with C_DELETED (as opposed to C_NOEXISTS). | |
2632 | * | |
2633 | * We could also return EBUSY here. | |
2634 | */ | |
2635 | ||
2d21ac55 A |
2636 | return hfs_unlink(hfsmp, dvp, vp, cnp, skip_reserve); |
2637 | } | |
b0d623f7 A |
2638 | |
2639 | /* | |
6d2010ae A |
2640 | * In a few cases, we may want to allow the directory to persist in an |
2641 | * open-unlinked state. If the directory is being open-unlinked (still has usecount | |
2642 | * references), or if it has EAs, or if it was being deleted as part of a rename, | |
2643 | * then we go ahead and move it to the hidden directory. | |
2644 | * | |
2645 | * If the directory is being open-unlinked, then we want to keep the catalog entry | |
2646 | * alive so that future EA calls and fchmod/fstat etc. do not cause issues later. | |
2647 | * | |
2648 | * If the directory had EAs, then we want to use the open-unlink trick so that the | |
2649 | * EA removal is not done in one giant transaction. Otherwise, it could cause a panic | |
2650 | * due to overflowing the journal. | |
2651 | * | |
2652 | * Finally, if it was deleted as part of a rename, we move it to the hidden directory | |
2653 | * in order to maintain rename atomicity. | |
2654 | * | |
2655 | * Note that the allow_dirs argument to hfs_removefile specifies that it is | |
2656 | * supposed to handle directories for this case. | |
2657 | */ | |
2658 | ||
2659 | if (((hfsmp->hfs_attribute_vp != NULL) && | |
2660 | ((cp->c_attr.ca_recflags & kHFSHasAttributesMask) != 0)) || | |
2661 | (only_unlink != 0)) { | |
2662 | ||
2663 | int ret = hfs_removefile(dvp, vp, cnp, 0, 0, 1, NULL, only_unlink); | |
2664 | /* | |
2665 | * Even though hfs_vnop_rename calls vnode_recycle for us on tvp we call | |
2666 | * it here just in case we were invoked by rmdir() on a directory that had | |
2667 | * EAs. To ensure that we start reclaiming the space as soon as possible, | |
2668 | * we call vnode_recycle on the directory. | |
2669 | */ | |
2670 | vnode_recycle(vp); | |
2671 | ||
2672 | return ret; | |
2673 | ||
2d21ac55 A |
2674 | } |
2675 | ||
2676 | dcp->c_flag |= C_DIR_MODIFICATION; | |
b4c24cb9 | 2677 | |
d7e50217 | 2678 | #if QUOTA |
2d21ac55 A |
2679 | if (hfsmp->hfs_flags & HFS_QUOTAS) |
2680 | (void)hfs_getinoquota(cp); | |
d7e50217 | 2681 | #endif |
91447636 A |
2682 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
2683 | goto out; | |
b4c24cb9 | 2684 | } |
91447636 | 2685 | started_tr = 1; |
b4c24cb9 | 2686 | |
9bccf70c A |
2687 | /* |
2688 | * Verify the directory is empty (and valid). | |
2689 | * (Rmdir ".." won't be valid since | |
2690 | * ".." will contain a reference to | |
2691 | * the current directory and thus be | |
2692 | * non-empty.) | |
2693 | */ | |
316670eb | 2694 | if ((dcp->c_bsdflags & APPEND) || (cp->c_bsdflags & (IMMUTABLE | APPEND))) { |
9bccf70c A |
2695 | error = EPERM; |
2696 | goto out; | |
2697 | } | |
2698 | ||
2699 | /* Remove the entry from the namei cache: */ | |
2700 | cache_purge(vp); | |
2701 | ||
91447636 A |
2702 | /* |
2703 | * Protect against a race with rename by using the component | |
2704 | * name passed in and parent id from dvp (instead of using | |
2705 | * the cp->c_desc which may have changed). | |
2706 | */ | |
2d21ac55 | 2707 | desc.cd_nameptr = (const u_int8_t *)cnp->cn_nameptr; |
91447636 | 2708 | desc.cd_namelen = cnp->cn_namelen; |
2d21ac55 | 2709 | desc.cd_parentcnid = dcp->c_fileid; |
91447636 | 2710 | desc.cd_cnid = cp->c_cnid; |
2d21ac55 A |
2711 | desc.cd_flags = CD_ISDIR; |
2712 | desc.cd_encoding = cp->c_encoding; | |
2713 | desc.cd_hint = 0; | |
2714 | ||
6d2010ae | 2715 | if (!hfs_valid_cnode(hfsmp, dvp, cnp, cp->c_fileid, NULL, &error)) { |
2d21ac55 A |
2716 | error = 0; |
2717 | goto out; | |
2718 | } | |
9bccf70c | 2719 | |
9bccf70c | 2720 | /* Remove entry from catalog */ |
2d21ac55 A |
2721 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG | SFL_ATTRIBUTE | SFL_BITMAP, HFS_EXCLUSIVE_LOCK); |
2722 | ||
2723 | if (!skip_reserve) { | |
2724 | /* | |
2725 | * Reserve some space in the Catalog file. | |
2726 | */ | |
2727 | if ((error = cat_preflight(hfsmp, CAT_DELETE, NULL, 0))) { | |
2728 | hfs_systemfile_unlock(hfsmp, lockflags); | |
2729 | goto out; | |
2730 | } | |
2731 | } | |
2732 | ||
91447636 A |
2733 | error = cat_delete(hfsmp, &desc, &cp->c_attr); |
2734 | if (error == 0) { | |
2d21ac55 A |
2735 | /* The parent lost a child */ |
2736 | if (dcp->c_entries > 0) | |
2737 | dcp->c_entries--; | |
2738 | DEC_FOLDERCOUNT(hfsmp, dcp->c_attr); | |
2739 | dcp->c_dirchangecnt++; | |
2740 | dcp->c_touch_chgtime = TRUE; | |
2741 | dcp->c_touch_modtime = TRUE; | |
2742 | hfs_touchtimes(hfsmp, cp); | |
2743 | (void) cat_update(hfsmp, &dcp->c_desc, &dcp->c_attr, NULL, NULL); | |
2744 | cp->c_flag &= ~(C_MODIFIED | C_FORCEUPDATE); | |
91447636 | 2745 | } |
2d21ac55 | 2746 | |
91447636 | 2747 | hfs_systemfile_unlock(hfsmp, lockflags); |
9bccf70c | 2748 | |
91447636 A |
2749 | if (error) |
2750 | goto out; | |
9bccf70c A |
2751 | |
2752 | #if QUOTA | |
2d21ac55 A |
2753 | if (hfsmp->hfs_flags & HFS_QUOTAS) |
2754 | (void)hfs_chkiq(cp, -1, NOCRED, 0); | |
9bccf70c A |
2755 | #endif /* QUOTA */ |
2756 | ||
9bccf70c A |
2757 | hfs_volupdate(hfsmp, VOL_RMDIR, (dcp->c_cnid == kHFSRootFolderID)); |
2758 | ||
6d2010ae A |
2759 | /* Mark C_NOEXISTS since the catalog entry is now gone */ |
2760 | cp->c_flag |= C_NOEXISTS; | |
9bccf70c | 2761 | out: |
2d21ac55 A |
2762 | dcp->c_flag &= ~C_DIR_MODIFICATION; |
2763 | wakeup((caddr_t)&dcp->c_flag); | |
2764 | ||
b4c24cb9 | 2765 | if (started_tr) { |
91447636 | 2766 | hfs_end_transaction(hfsmp); |
b4c24cb9 A |
2767 | } |
2768 | ||
9bccf70c A |
2769 | return (error); |
2770 | } | |
2771 | ||
9bccf70c | 2772 | |
91447636 A |
2773 | /* |
2774 | * Remove a file or link. | |
2775 | */ | |
6d2010ae | 2776 | int |
91447636 A |
2777 | hfs_vnop_remove(ap) |
2778 | struct vnop_remove_args /* { | |
9bccf70c A |
2779 | struct vnode *a_dvp; |
2780 | struct vnode *a_vp; | |
2781 | struct componentname *a_cnp; | |
91447636 A |
2782 | int a_flags; |
2783 | vfs_context_t a_context; | |
9bccf70c A |
2784 | } */ *ap; |
2785 | { | |
91447636 A |
2786 | struct vnode *dvp = ap->a_dvp; |
2787 | struct vnode *vp = ap->a_vp; | |
2d21ac55 | 2788 | struct cnode *dcp = VTOC(dvp); |
6d2010ae | 2789 | struct cnode *cp; |
b0d623f7 | 2790 | struct vnode *rvp = NULL; |
b0d623f7 | 2791 | int error=0, recycle_rsrc=0; |
6d2010ae | 2792 | time_t orig_ctime; |
316670eb | 2793 | uint32_t rsrc_vid = 0; |
91447636 A |
2794 | |
2795 | if (dvp == vp) { | |
2796 | return (EINVAL); | |
2797 | } | |
2798 | ||
6d2010ae | 2799 | orig_ctime = VTOC(vp)->c_ctime; |
316670eb | 2800 | if ( (!vnode_isnamedstream(vp)) && ((ap->a_flags & VNODE_REMOVE_SKIP_NAMESPACE_EVENT) == 0)) { |
6d2010ae A |
2801 | error = check_for_tracked_file(vp, orig_ctime, NAMESPACE_HANDLER_DELETE_OP, NULL); |
2802 | if (error) { | |
2803 | // XXXdbg - decide on a policy for handling namespace handler failures! | |
2804 | // for now we just let them proceed. | |
2805 | } | |
2806 | } | |
2807 | error = 0; | |
2808 | ||
2809 | cp = VTOC(vp); | |
2810 | ||
316670eb A |
2811 | relock: |
2812 | ||
2813 | hfs_lock_truncate(cp, HFS_EXCLUSIVE_LOCK); | |
2814 | ||
2815 | if ((error = hfs_lockpair(dcp, cp, HFS_EXCLUSIVE_LOCK))) { | |
2816 | hfs_unlock_truncate(cp, 0); | |
2817 | if (rvp) { | |
2818 | vnode_put (rvp); | |
2819 | } | |
2820 | return (error); | |
2821 | } | |
2822 | ||
2823 | /* | |
2824 | * Lazily respond to determining if there is a valid resource fork | |
2825 | * vnode attached to 'cp' if it is a regular file or symlink. | |
2826 | * If the vnode does not exist, then we may proceed without having to | |
2827 | * create it. | |
2828 | * | |
2829 | * If, however, it does exist, then we need to acquire an iocount on the | |
2830 | * vnode after acquiring its vid. This ensures that if we have to do I/O | |
2831 | * against it, it can't get recycled from underneath us in the middle | |
2832 | * of this call. | |
2833 | * | |
b0d623f7 A |
2834 | * Note: this function may be invoked for directory hardlinks, so just skip these |
2835 | * steps if 'vp' is a directory. | |
2836 | */ | |
2837 | ||
2838 | ||
2839 | if ((vp->v_type == VLNK) || (vp->v_type == VREG)) { | |
316670eb A |
2840 | if ((cp->c_rsrc_vp) && (rvp == NULL)) { |
2841 | /* We need to acquire the rsrc vnode */ | |
2842 | rvp = cp->c_rsrc_vp; | |
2843 | rsrc_vid = vnode_vid (rvp); | |
2844 | ||
2845 | /* Unlock everything to acquire iocount on the rsrc vnode */ | |
2846 | hfs_unlock_truncate (cp, 0); | |
2847 | hfs_unlockpair (dcp, cp); | |
b0d623f7 | 2848 | |
316670eb A |
2849 | /* Use the vid to maintain identity on rvp */ |
2850 | if (vnode_getwithvid(rvp, rsrc_vid)) { | |
2851 | /* | |
2852 | * If this fails, then it was recycled or | |
2853 | * reclaimed in the interim. Reset fields and | |
2854 | * start over. | |
2855 | */ | |
b7266188 | 2856 | rvp = NULL; |
316670eb | 2857 | rsrc_vid = 0; |
b7266188 | 2858 | } |
316670eb | 2859 | goto relock; |
b0d623f7 | 2860 | } |
4a3eedf9 | 2861 | } |
b0d623f7 A |
2862 | |
2863 | /* | |
2864 | * Check to see if we raced rmdir for the parent directory | |
2865 | * hfs_removefile already checks for a race on vp/cp | |
2866 | */ | |
2867 | if (dcp->c_flag & (C_DELETED | C_NOEXISTS)) { | |
2868 | error = ENOENT; | |
2869 | goto rm_done; | |
2870 | } | |
2871 | ||
316670eb | 2872 | error = hfs_removefile(dvp, vp, ap->a_cnp, ap->a_flags, 0, 0, NULL, 0); |
6d2010ae A |
2873 | |
2874 | /* | |
2875 | * If the remove succeeded in deleting the file, then we may need to mark | |
2876 | * the resource fork for recycle so that it is reclaimed as quickly | |
2877 | * as possible. If it were not recycled quickly, then this resource fork | |
2878 | * vnode could keep a v_parent reference on the data fork, which prevents it | |
2879 | * from going through reclaim (by giving it extra usecounts), except in the force- | |
2880 | * unmount case. | |
2881 | * | |
2882 | * However, a caveat: we need to continue to supply resource fork | |
2883 | * access to open-unlinked files even if the resource fork is not open. This is | |
2884 | * a requirement for the compressed files work. Luckily, hfs_vgetrsrc will handle | |
2885 | * this already if the data fork has been re-parented to the hidden directory. | |
2886 | * | |
2887 | * As a result, all we really need to do here is mark the resource fork vnode | |
2888 | * for recycle. If it goes out of core, it can be brought in again if needed. | |
2889 | * If the cnode was instead marked C_NOEXISTS, then there wouldn't be any | |
2890 | * more work. | |
2891 | */ | |
2892 | if ((error == 0) && (rvp)) { | |
2d21ac55 A |
2893 | recycle_rsrc = 1; |
2894 | } | |
91447636 | 2895 | |
4a3eedf9 A |
2896 | /* |
2897 | * Drop the truncate lock before unlocking the cnode | |
2898 | * (which can potentially perform a vnode_put and | |
2899 | * recycle the vnode which in turn might require the | |
2900 | * truncate lock) | |
2901 | */ | |
b0d623f7 | 2902 | rm_done: |
6d2010ae | 2903 | hfs_unlock_truncate(cp, 0); |
4a3eedf9 | 2904 | hfs_unlockpair(dcp, cp); |
2d21ac55 | 2905 | |
b0d623f7 | 2906 | if (recycle_rsrc) { |
6d2010ae | 2907 | /* inactive or reclaim on rvp will clean up the blocks from the rsrc fork */ |
2d21ac55 | 2908 | vnode_recycle(rvp); |
2d21ac55 A |
2909 | } |
2910 | ||
316670eb | 2911 | if (rvp) { |
b0d623f7 A |
2912 | /* drop iocount on rsrc fork, was obtained at beginning of fxn */ |
2913 | vnode_put(rvp); | |
2914 | } | |
2915 | ||
91447636 | 2916 | return (error); |
55e303ae A |
2917 | } |
2918 | ||
2919 | ||
316670eb | 2920 | int |
91447636 A |
2921 | hfs_removefile_callback(struct buf *bp, void *hfsmp) { |
2922 | ||
2923 | if ( !(buf_flags(bp) & B_META)) | |
2d21ac55 | 2924 | panic("hfs: symlink bp @ %p is not marked meta-data!\n", bp); |
91447636 A |
2925 | /* |
2926 | * it's part of the current transaction, kill it. | |
2927 | */ | |
2928 | journal_kill_block(((struct hfsmount *)hfsmp)->jnl, bp); | |
2929 | ||
2930 | return (BUF_CLAIMED); | |
2931 | } | |
55e303ae A |
2932 | |
2933 | /* | |
2934 | * hfs_removefile | |
2935 | * | |
91447636 | 2936 | * Similar to hfs_vnop_remove except there are additional options. |
b0d623f7 A |
2937 | * This function may be used to remove directories if they have |
2938 | * lots of EA's -- note the 'allow_dirs' argument. | |
2939 | * | |
316670eb A |
2940 | * This function is able to delete blocks & fork data for the resource |
2941 | * fork even if it does not exist in core (and have a backing vnode). | |
2942 | * It should infer the correct behavior based on the number of blocks | |
2943 | * in the cnode and whether or not the resource fork pointer exists or | |
2944 | * not. As a result, one only need pass in the 'vp' corresponding to the | |
2945 | * data fork of this file (or main vnode in the case of a directory). | |
2946 | * Passing in a resource fork will result in an error. | |
2947 | * | |
2948 | * Because we do not create any vnodes in this function, we are not at | |
2949 | * risk of deadlocking against ourselves by double-locking. | |
91447636 A |
2950 | * |
2951 | * Requires cnode and truncate locks to be held. | |
55e303ae | 2952 | */ |
6d2010ae | 2953 | int |
91447636 | 2954 | hfs_removefile(struct vnode *dvp, struct vnode *vp, struct componentname *cnp, |
6d2010ae | 2955 | int flags, int skip_reserve, int allow_dirs, |
316670eb | 2956 | __unused struct vnode *rvp, int only_unlink) |
55e303ae | 2957 | { |
9bccf70c A |
2958 | struct cnode *cp; |
2959 | struct cnode *dcp; | |
316670eb | 2960 | struct vnode *rsrc_vp = NULL; |
9bccf70c | 2961 | struct hfsmount *hfsmp; |
91447636 A |
2962 | struct cat_desc desc; |
2963 | struct timeval tv; | |
9bccf70c A |
2964 | int dataforkbusy = 0; |
2965 | int rsrcforkbusy = 0; | |
91447636 | 2966 | int lockflags; |
9bccf70c | 2967 | int error = 0; |
2d21ac55 | 2968 | int started_tr = 0; |
4a3eedf9 | 2969 | int isbigfile = 0, defer_remove=0, isdir=0; |
6d2010ae | 2970 | int update_vh = 0; |
316670eb | 2971 | |
9bccf70c A |
2972 | cp = VTOC(vp); |
2973 | dcp = VTOC(dvp); | |
2974 | hfsmp = VTOHFS(vp); | |
91447636 | 2975 | |
2d21ac55 | 2976 | /* Check if we lost a race post lookup. */ |
91447636 | 2977 | if (cp->c_flag & (C_NOEXISTS | C_DELETED)) { |
2d21ac55 | 2978 | return (0); |
91447636 | 2979 | } |
2d21ac55 | 2980 | |
6d2010ae | 2981 | if (!hfs_valid_cnode(hfsmp, dvp, cnp, cp->c_fileid, NULL, &error)) { |
2d21ac55 | 2982 | return 0; |
9bccf70c A |
2983 | } |
2984 | ||
2985 | /* Make sure a remove is permitted */ | |
91447636 | 2986 | if (VNODE_IS_RSRC(vp)) { |
2d21ac55 | 2987 | return (EPERM); |
b4c24cb9 | 2988 | } |
316670eb A |
2989 | else { |
2990 | /* | |
2991 | * We know it's a data fork. | |
2992 | * Probe the cnode to see if we have a valid resource fork | |
2993 | * in hand or not. | |
2994 | */ | |
2995 | rsrc_vp = cp->c_rsrc_vp; | |
2996 | } | |
2997 | ||
2d21ac55 | 2998 | /* Don't allow deleting the journal or journal_info_block. */ |
316670eb | 2999 | if (hfs_is_journal_file(hfsmp, cp)) { |
2d21ac55 A |
3000 | return (EPERM); |
3001 | } | |
316670eb A |
3002 | |
3003 | /* | |
3004 | * If removing a symlink, then we need to ensure that the | |
3005 | * data blocks for the symlink are not still in-flight or pending. | |
3006 | * If so, we will unlink the symlink here, making its blocks | |
3007 | * available for re-allocation by a subsequent transaction. That is OK, but | |
3008 | * then the I/O for the data blocks could then go out before the journal | |
3009 | * transaction that created it was flushed, leading to I/O ordering issues. | |
3010 | */ | |
3011 | if (vp->v_type == VLNK) { | |
3012 | /* | |
3013 | * This will block if the asynchronous journal flush is in progress. | |
3014 | * If this symlink is not being renamed over and doesn't have any open FDs, | |
3015 | * then we'll remove it from the journal's bufs below in kill_block. | |
3016 | */ | |
3017 | buf_wait_for_shadow_io (vp, 0); | |
3018 | } | |
3019 | ||
2d21ac55 A |
3020 | /* |
3021 | * Hard links require special handling. | |
3022 | */ | |
3023 | if (cp->c_flag & C_HARDLINK) { | |
3024 | if ((flags & VNODE_REMOVE_NODELETEBUSY) && vnode_isinuse(vp, 0)) { | |
3025 | return (EBUSY); | |
3026 | } else { | |
3027 | /* A directory hard link with a link count of one is | |
3028 | * treated as a regular directory. Therefore it should | |
3029 | * only be removed using rmdir(). | |
3030 | */ | |
3031 | if ((vnode_isdir(vp) == 1) && (cp->c_linkcount == 1) && | |
3032 | (allow_dirs == 0)) { | |
3033 | return (EPERM); | |
3034 | } | |
3035 | return hfs_unlink(hfsmp, dvp, vp, cnp, skip_reserve); | |
3036 | } | |
3037 | } | |
316670eb | 3038 | |
2d21ac55 A |
3039 | /* Directories should call hfs_rmdir! (unless they have a lot of attributes) */ |
3040 | if (vnode_isdir(vp)) { | |
3041 | if (allow_dirs == 0) | |
3042 | return (EPERM); /* POSIX */ | |
3043 | isdir = 1; | |
3044 | } | |
3045 | /* Sanity check the parent ids. */ | |
3046 | if ((cp->c_parentcnid != hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid) && | |
3047 | (cp->c_parentcnid != dcp->c_fileid)) { | |
3048 | return (EINVAL); | |
3049 | } | |
3050 | ||
3051 | dcp->c_flag |= C_DIR_MODIFICATION; | |
3052 | ||
3053 | // this guy is going away so mark him as such | |
3054 | cp->c_flag |= C_DELETED; | |
3055 | ||
3056 | ||
3057 | /* Remove our entry from the namei cache. */ | |
3058 | cache_purge(vp); | |
316670eb | 3059 | |
9bccf70c | 3060 | /* |
316670eb A |
3061 | * If the caller was operating on a file (as opposed to a |
3062 | * directory with EAs), then we need to figure out | |
3063 | * whether or not it has a valid resource fork vnode. | |
3064 | * | |
3065 | * If there was a valid resource fork vnode, then we need | |
3066 | * to use hfs_truncate to eliminate its data. If there is | |
3067 | * no vnode, then we hold the cnode lock which would | |
3068 | * prevent it from being created. As a result, | |
3069 | * we can use the data deletion functions which do not | |
3070 | * require that a cnode/vnode pair exist. | |
9bccf70c | 3071 | */ |
b0d623f7 | 3072 | |
2d21ac55 A |
3073 | /* Check if this file is being used. */ |
3074 | if (isdir == 0) { | |
3075 | dataforkbusy = vnode_isinuse(vp, 0); | |
316670eb A |
3076 | /* |
3077 | * At this point, we know that 'vp' points to the | |
3078 | * a data fork because we checked it up front. And if | |
3079 | * there is no rsrc fork, rsrc_vp will be NULL. | |
3080 | */ | |
3081 | if (rsrc_vp && (cp->c_blocks - VTOF(vp)->ff_blocks)) { | |
3082 | rsrcforkbusy = vnode_isinuse(rsrc_vp, 0); | |
b0d623f7 | 3083 | } |
2d21ac55 A |
3084 | } |
3085 | ||
3086 | /* Check if we have to break the deletion into multiple pieces. */ | |
3087 | if (isdir == 0) { | |
3088 | isbigfile = ((cp->c_datafork->ff_size >= HFS_BIGFILE_SIZE) && overflow_extents(VTOF(vp))); | |
b4c24cb9 A |
3089 | } |
3090 | ||
2d21ac55 A |
3091 | /* Check if the file has xattrs. If it does we'll have to delete them in |
3092 | individual transactions in case there are too many */ | |
3093 | if ((hfsmp->hfs_attribute_vp != NULL) && | |
3094 | (cp->c_attr.ca_recflags & kHFSHasAttributesMask) != 0) { | |
4a3eedf9 | 3095 | defer_remove = 1; |
2d21ac55 | 3096 | } |
6d2010ae A |
3097 | |
3098 | /* If we are explicitly told to only unlink item and move to hidden dir, then do it */ | |
3099 | if (only_unlink) { | |
3100 | defer_remove = 1; | |
3101 | } | |
55e303ae | 3102 | |
9bccf70c A |
3103 | /* |
3104 | * Carbon semantics prohibit deleting busy files. | |
91447636 | 3105 | * (enforced when VNODE_REMOVE_NODELETEBUSY is requested) |
9bccf70c | 3106 | */ |
91447636 A |
3107 | if (dataforkbusy || rsrcforkbusy) { |
3108 | if ((flags & VNODE_REMOVE_NODELETEBUSY) || | |
2d21ac55 | 3109 | (hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid == 0)) { |
91447636 A |
3110 | error = EBUSY; |
3111 | goto out; | |
3112 | } | |
9bccf70c A |
3113 | } |
3114 | ||
d7e50217 | 3115 | #if QUOTA |
2d21ac55 A |
3116 | if (hfsmp->hfs_flags & HFS_QUOTAS) |
3117 | (void)hfs_getinoquota(cp); | |
d7e50217 | 3118 | #endif /* QUOTA */ |
6d2010ae A |
3119 | |
3120 | /* | |
3121 | * Do a ubc_setsize to indicate we need to wipe contents if: | |
3122 | * 1) item is a regular file. | |
3123 | * 2) Neither fork is busy AND we are not told to unlink this. | |
3124 | * | |
3125 | * We need to check for the defer_remove since it can be set without | |
3126 | * having a busy data or rsrc fork | |
3127 | */ | |
3128 | if (isdir == 0 && (!dataforkbusy || !rsrcforkbusy) && (defer_remove == 0)) { | |
91447636 | 3129 | /* |
0c530ab8 A |
3130 | * A ubc_setsize can cause a pagein so defer it |
3131 | * until after the cnode lock is dropped. The | |
3132 | * cnode lock cannot be dropped/reacquired here | |
3133 | * since we might already hold the journal lock. | |
91447636 | 3134 | */ |
91447636 | 3135 | if (!dataforkbusy && cp->c_datafork->ff_blocks && !isbigfile) { |
0c530ab8 | 3136 | cp->c_flag |= C_NEED_DATA_SETSIZE; |
91447636 | 3137 | } |
316670eb | 3138 | if (!rsrcforkbusy && rsrc_vp) { |
0c530ab8 | 3139 | cp->c_flag |= C_NEED_RSRC_SETSIZE; |
91447636 | 3140 | } |
91447636 A |
3141 | } |
3142 | ||
3143 | if ((error = hfs_start_transaction(hfsmp)) != 0) { | |
3144 | goto out; | |
b4c24cb9 | 3145 | } |
91447636 | 3146 | started_tr = 1; |
b4c24cb9 | 3147 | |
b4c24cb9 | 3148 | // XXXdbg - if we're journaled, kill any dirty symlink buffers |
6d2010ae | 3149 | if (hfsmp->jnl && vnode_islnk(vp) && (defer_remove == 0)) { |
91447636 | 3150 | buf_iterate(vp, hfs_removefile_callback, BUF_SKIP_NONLOCKED, (void *)hfsmp); |
6d2010ae | 3151 | } |
b4c24cb9 | 3152 | |
9bccf70c | 3153 | /* |
6d2010ae | 3154 | * Prepare to truncate any non-busy forks. Busy forks will |
2d21ac55 | 3155 | * get truncated when their vnode goes inactive. |
b0d623f7 A |
3156 | * Note that we will only enter this region if we |
3157 | * can avoid creating an open-unlinked file. If | |
3158 | * either region is busy, we will have to create an open | |
3159 | * unlinked file. | |
6d2010ae A |
3160 | * |
3161 | * Since we are deleting the file, we need to stagger the runtime | |
3162 | * modifications to do things in such a way that a crash won't | |
3163 | * result in us getting overlapped extents or any other | |
3164 | * bad inconsistencies. As such, we call prepare_release_storage | |
3165 | * which updates the UBC, updates quota information, and releases | |
3166 | * any loaned blocks that belong to this file. No actual | |
3167 | * truncation or bitmap manipulation is done until *AFTER* | |
3168 | * the catalog record is removed. | |
9bccf70c | 3169 | */ |
6d2010ae A |
3170 | if (isdir == 0 && (!dataforkbusy && !rsrcforkbusy) && (only_unlink == 0)) { |
3171 | ||
55e303ae | 3172 | if (!dataforkbusy && !isbigfile && cp->c_datafork->ff_blocks != 0) { |
6d2010ae A |
3173 | |
3174 | error = hfs_prepare_release_storage (hfsmp, vp); | |
3175 | if (error) { | |
9bccf70c | 3176 | goto out; |
6d2010ae A |
3177 | } |
3178 | update_vh = 1; | |
9bccf70c | 3179 | } |
316670eb A |
3180 | |
3181 | /* | |
3182 | * If the resource fork vnode does not exist, we can skip this step. | |
3183 | */ | |
3184 | if (!rsrcforkbusy && rsrc_vp) { | |
3185 | error = hfs_prepare_release_storage (hfsmp, rsrc_vp); | |
6d2010ae | 3186 | if (error) { |
9bccf70c | 3187 | goto out; |
6d2010ae A |
3188 | } |
3189 | update_vh = 1; | |
9bccf70c A |
3190 | } |
3191 | } | |
6d2010ae | 3192 | |
91447636 A |
3193 | /* |
3194 | * Protect against a race with rename by using the component | |
3195 | * name passed in and parent id from dvp (instead of using | |
b0d623f7 A |
3196 | * the cp->c_desc which may have changed). Also, be aware that |
3197 | * because we allow directories to be passed in, we need to special case | |
3198 | * this temporary descriptor in case we were handed a directory. | |
91447636 | 3199 | */ |
b0d623f7 A |
3200 | if (isdir) { |
3201 | desc.cd_flags = CD_ISDIR; | |
3202 | } | |
3203 | else { | |
3204 | desc.cd_flags = 0; | |
3205 | } | |
91447636 | 3206 | desc.cd_encoding = cp->c_desc.cd_encoding; |
2d21ac55 | 3207 | desc.cd_nameptr = (const u_int8_t *)cnp->cn_nameptr; |
91447636 | 3208 | desc.cd_namelen = cnp->cn_namelen; |
2d21ac55 | 3209 | desc.cd_parentcnid = dcp->c_fileid; |
91447636 | 3210 | desc.cd_hint = cp->c_desc.cd_hint; |
2d21ac55 | 3211 | desc.cd_cnid = cp->c_cnid; |
91447636 A |
3212 | microtime(&tv); |
3213 | ||
9bccf70c | 3214 | /* |
2d21ac55 | 3215 | * There are two cases to consider: |
b0d623f7 | 3216 | * 1. File/Dir is busy/big/defer_remove ==> move/rename the file/dir |
2d21ac55 | 3217 | * 2. File is not in use ==> remove the file |
b0d623f7 A |
3218 | * |
3219 | * We can get a directory in case 1 because it may have had lots of attributes, | |
3220 | * which need to get removed here. | |
9bccf70c | 3221 | */ |
4a3eedf9 | 3222 | if (dataforkbusy || rsrcforkbusy || isbigfile || defer_remove) { |
9bccf70c A |
3223 | char delname[32]; |
3224 | struct cat_desc to_desc; | |
3225 | struct cat_desc todir_desc; | |
3226 | ||
3227 | /* | |
b0d623f7 A |
3228 | * Orphan this file or directory (move to hidden directory). |
3229 | * Again, we need to take care that we treat directories as directories, | |
3230 | * and files as files. Because directories with attributes can be passed in | |
3231 | * check to make sure that we have a directory or a file before filling in the | |
3232 | * temporary descriptor's flags. We keep orphaned directories AND files in | |
3233 | * the FILE_HARDLINKS private directory since we're generalizing over all | |
3234 | * orphaned filesystem objects. | |
9bccf70c A |
3235 | */ |
3236 | bzero(&todir_desc, sizeof(todir_desc)); | |
3237 | todir_desc.cd_parentcnid = 2; | |
3238 | ||
2d21ac55 | 3239 | MAKE_DELETED_NAME(delname, sizeof(delname), cp->c_fileid); |
9bccf70c | 3240 | bzero(&to_desc, sizeof(to_desc)); |
2d21ac55 | 3241 | to_desc.cd_nameptr = (const u_int8_t *)delname; |
9bccf70c | 3242 | to_desc.cd_namelen = strlen(delname); |
2d21ac55 | 3243 | to_desc.cd_parentcnid = hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid; |
b0d623f7 A |
3244 | if (isdir) { |
3245 | to_desc.cd_flags = CD_ISDIR; | |
3246 | } | |
3247 | else { | |
3248 | to_desc.cd_flags = 0; | |
3249 | } | |
9bccf70c A |
3250 | to_desc.cd_cnid = cp->c_cnid; |
3251 | ||
91447636 | 3252 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_EXCLUSIVE_LOCK); |
2d21ac55 A |
3253 | if (!skip_reserve) { |
3254 | if ((error = cat_preflight(hfsmp, CAT_RENAME, NULL, 0))) { | |
3255 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3256 | goto out; | |
3257 | } | |
3258 | } | |
9bccf70c | 3259 | |
91447636 | 3260 | error = cat_rename(hfsmp, &desc, &todir_desc, |
9bccf70c A |
3261 | &to_desc, (struct cat_desc *)NULL); |
3262 | ||
b4c24cb9 | 3263 | if (error == 0) { |
2d21ac55 A |
3264 | hfsmp->hfs_private_attr[FILE_HARDLINKS].ca_entries++; |
3265 | if (isdir == 1) { | |
3266 | INC_FOLDERCOUNT(hfsmp, hfsmp->hfs_private_attr[FILE_HARDLINKS]); | |
3267 | } | |
3268 | (void) cat_update(hfsmp, &hfsmp->hfs_private_desc[FILE_HARDLINKS], | |
3269 | &hfsmp->hfs_private_attr[FILE_HARDLINKS], NULL, NULL); | |
91447636 A |
3270 | |
3271 | /* Update the parent directory */ | |
3272 | if (dcp->c_entries > 0) | |
3273 | dcp->c_entries--; | |
2d21ac55 A |
3274 | if (isdir == 1) { |
3275 | DEC_FOLDERCOUNT(hfsmp, dcp->c_attr); | |
3276 | } | |
3277 | dcp->c_dirchangecnt++; | |
91447636 A |
3278 | dcp->c_ctime = tv.tv_sec; |
3279 | dcp->c_mtime = tv.tv_sec; | |
3280 | (void) cat_update(hfsmp, &dcp->c_desc, &dcp->c_attr, NULL, NULL); | |
3281 | ||
b0d623f7 | 3282 | /* Update the file or directory's state */ |
91447636 A |
3283 | cp->c_flag |= C_DELETED; |
3284 | cp->c_ctime = tv.tv_sec; | |
2d21ac55 | 3285 | --cp->c_linkcount; |
91447636 | 3286 | (void) cat_update(hfsmp, &to_desc, &cp->c_attr, NULL, NULL); |
b4c24cb9 | 3287 | } |
91447636 A |
3288 | hfs_systemfile_unlock(hfsmp, lockflags); |
3289 | if (error) | |
3290 | goto out; | |
9bccf70c | 3291 | |
6d2010ae | 3292 | } |
316670eb A |
3293 | else { |
3294 | /* | |
3295 | * Nobody is using this item; we can safely remove everything. | |
3296 | */ | |
3297 | struct filefork *temp_rsrc_fork = NULL; | |
6d2010ae A |
3298 | #if QUOTA |
3299 | off_t savedbytes; | |
3300 | int blksize = hfsmp->blockSize; | |
3301 | #endif | |
3302 | u_int32_t fileid = cp->c_fileid; | |
316670eb A |
3303 | |
3304 | /* | |
3305 | * Figure out if we need to read the resource fork data into | |
3306 | * core before wiping out the catalog record. | |
3307 | * | |
3308 | * 1) Must not be a directory | |
3309 | * 2) cnode's c_rsrcfork ptr must be NULL. | |
3310 | * 3) rsrc fork must have actual blocks | |
3311 | */ | |
3312 | if ((isdir == 0) && (cp->c_rsrcfork == NULL) && | |
3313 | (cp->c_blocks - VTOF(vp)->ff_blocks)) { | |
3314 | /* | |
3315 | * The resource fork vnode & filefork did not exist. | |
3316 | * Create a temporary one for use in this function only. | |
3317 | */ | |
3318 | MALLOC_ZONE (temp_rsrc_fork, struct filefork *, sizeof (struct filefork), M_HFSFORK, M_WAITOK); | |
3319 | bzero(temp_rsrc_fork, sizeof(struct filefork)); | |
3320 | temp_rsrc_fork->ff_cp = cp; | |
3321 | rl_init(&temp_rsrc_fork->ff_invalidranges); | |
3322 | } | |
3323 | ||
2d21ac55 | 3324 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG | SFL_ATTRIBUTE | SFL_BITMAP, HFS_EXCLUSIVE_LOCK); |
316670eb A |
3325 | |
3326 | /* Look up the resource fork first, if necessary */ | |
3327 | if (temp_rsrc_fork) { | |
3328 | error = cat_lookup (hfsmp, &desc, 1, (struct cat_desc*) NULL, | |
3329 | (struct cat_attr*) NULL, &temp_rsrc_fork->ff_data, NULL); | |
3330 | if (error) { | |
3331 | FREE_ZONE (temp_rsrc_fork, sizeof(struct filefork), M_HFSFORK); | |
3332 | hfs_systemfile_unlock (hfsmp, lockflags); | |
3333 | goto out; | |
3334 | } | |
3335 | } | |
3336 | ||
2d21ac55 A |
3337 | if (!skip_reserve) { |
3338 | if ((error = cat_preflight(hfsmp, CAT_DELETE, NULL, 0))) { | |
316670eb A |
3339 | if (temp_rsrc_fork) { |
3340 | FREE_ZONE (temp_rsrc_fork, sizeof(struct filefork), M_HFSFORK); | |
3341 | } | |
2d21ac55 A |
3342 | hfs_systemfile_unlock(hfsmp, lockflags); |
3343 | goto out; | |
3344 | } | |
3345 | } | |
6d2010ae | 3346 | |
91447636 | 3347 | error = cat_delete(hfsmp, &desc, &cp->c_attr); |
6d2010ae A |
3348 | |
3349 | if (error && error != ENXIO && error != ENOENT) { | |
3350 | printf("hfs_removefile: deleting file %s (%d), err: %d\n", | |
3351 | cp->c_desc.cd_nameptr, cp->c_attr.ca_fileid, error); | |
b4c24cb9 | 3352 | } |
6d2010ae | 3353 | |
91447636 | 3354 | if (error == 0) { |
91447636 A |
3355 | /* Update the parent directory */ |
3356 | if (dcp->c_entries > 0) | |
3357 | dcp->c_entries--; | |
2d21ac55 | 3358 | dcp->c_dirchangecnt++; |
91447636 A |
3359 | dcp->c_ctime = tv.tv_sec; |
3360 | dcp->c_mtime = tv.tv_sec; | |
3361 | (void) cat_update(hfsmp, &dcp->c_desc, &dcp->c_attr, NULL, NULL); | |
3362 | } | |
3363 | hfs_systemfile_unlock(hfsmp, lockflags); | |
316670eb | 3364 | |
6d2010ae | 3365 | if (error) { |
316670eb A |
3366 | if (temp_rsrc_fork) { |
3367 | FREE_ZONE (temp_rsrc_fork, sizeof(struct filefork), M_HFSFORK); | |
3368 | } | |
91447636 | 3369 | goto out; |
6d2010ae A |
3370 | } |
3371 | ||
3372 | /* | |
3373 | * Now that we've wiped out the catalog record, the file effectively doesn't | |
3374 | * exist anymore. So update the quota records to reflect the loss of the | |
3375 | * data fork and the resource fork. | |
3376 | */ | |
9bccf70c | 3377 | #if QUOTA |
6d2010ae A |
3378 | if (cp->c_datafork->ff_blocks > 0) { |
3379 | savedbytes = ((off_t)cp->c_datafork->ff_blocks * (off_t)blksize); | |
3380 | (void) hfs_chkdq(cp, (int64_t)-(savedbytes), NOCRED, 0); | |
3381 | } | |
3382 | ||
316670eb A |
3383 | /* |
3384 | * We may have just deleted the catalog record for a resource fork even | |
3385 | * though it did not exist in core as a vnode. However, just because there | |
3386 | * was a resource fork pointer in the cnode does not mean that it had any blocks. | |
3387 | */ | |
3388 | if (temp_rsrc_fork || cp->c_rsrcfork) { | |
3389 | if (cp->c_rsrcfork) { | |
3390 | if (cp->c_rsrcfork->ff_blocks > 0) { | |
3391 | savedbytes = ((off_t)cp->c_rsrcfork->ff_blocks * (off_t)blksize); | |
3392 | (void) hfs_chkdq(cp, (int64_t)-(savedbytes), NOCRED, 0); | |
3393 | } | |
3394 | } | |
3395 | else { | |
3396 | /* we must have used a temporary fork */ | |
3397 | savedbytes = ((off_t)temp_rsrc_fork->ff_blocks * (off_t)blksize); | |
3398 | (void) hfs_chkdq(cp, (int64_t)-(savedbytes), NOCRED, 0); | |
3399 | } | |
6d2010ae A |
3400 | } |
3401 | ||
3402 | if (hfsmp->hfs_flags & HFS_QUOTAS) { | |
2d21ac55 | 3403 | (void)hfs_chkiq(cp, -1, NOCRED, 0); |
6d2010ae A |
3404 | } |
3405 | #endif | |
3406 | ||
6d2010ae A |
3407 | /* |
3408 | * If we didn't get any errors deleting the catalog entry, then go ahead | |
3409 | * and release the backing store now. The filefork pointers are still valid. | |
316670eb A |
3410 | */ |
3411 | if (temp_rsrc_fork) { | |
3412 | error = hfs_release_storage (hfsmp, cp->c_datafork, temp_rsrc_fork, fileid); | |
3413 | } | |
3414 | else { | |
3415 | /* if cp->c_rsrcfork == NULL, hfs_release_storage will skip over it. */ | |
3416 | error = hfs_release_storage (hfsmp, cp->c_datafork, cp->c_rsrcfork, fileid); | |
3417 | } | |
6d2010ae A |
3418 | if (error) { |
3419 | /* | |
3420 | * If we encountered an error updating the extents and bitmap, | |
3421 | * mark the volume inconsistent. At this point, the catalog record has | |
3422 | * already been deleted, so we can't recover it at this point. We need | |
3423 | * to proceed and update the volume header and mark the cnode C_NOEXISTS. | |
3424 | * The subsequent fsck should be able to recover the free space for us. | |
3425 | */ | |
3426 | hfs_mark_volume_inconsistent(hfsmp); | |
3427 | } | |
3428 | else { | |
3429 | /* reset update_vh to 0, since hfs_release_storage should have done it for us */ | |
3430 | update_vh = 0; | |
3431 | } | |
316670eb A |
3432 | |
3433 | /* Get rid of the temporary rsrc fork */ | |
3434 | if (temp_rsrc_fork) { | |
3435 | FREE_ZONE (temp_rsrc_fork, sizeof(struct filefork), M_HFSFORK); | |
3436 | } | |
3437 | ||
91447636 | 3438 | cp->c_flag |= C_NOEXISTS; |
2d21ac55 | 3439 | cp->c_flag &= ~C_DELETED; |
6d2010ae | 3440 | |
91447636 | 3441 | cp->c_touch_chgtime = TRUE; /* XXX needed ? */ |
2d21ac55 | 3442 | --cp->c_linkcount; |
6d2010ae | 3443 | |
b0d623f7 A |
3444 | /* |
3445 | * We must never get a directory if we're in this else block. We could | |
3446 | * accidentally drop the number of files in the volume header if we did. | |
3447 | */ | |
9bccf70c | 3448 | hfs_volupdate(hfsmp, VOL_RMFILE, (dcp->c_cnid == kHFSRootFolderID)); |
6d2010ae | 3449 | |
9bccf70c A |
3450 | } |
3451 | ||
3452 | /* | |
3453 | * All done with this cnode's descriptor... | |
3454 | * | |
2d21ac55 A |
3455 | * Note: all future catalog calls for this cnode must be by |
3456 | * fileid only. This is OK for HFS (which doesn't have file | |
3457 | * thread records) since HFS doesn't support the removal of | |
3458 | * busy files. | |
9bccf70c A |
3459 | */ |
3460 | cat_releasedesc(&cp->c_desc); | |
3461 | ||
55e303ae | 3462 | out: |
2d21ac55 A |
3463 | if (error) { |
3464 | cp->c_flag &= ~C_DELETED; | |
b4c24cb9 | 3465 | } |
6d2010ae A |
3466 | |
3467 | if (update_vh) { | |
3468 | /* | |
3469 | * If we bailed out earlier, we may need to update the volume header | |
3470 | * to deal with the borrowed blocks accounting. | |
3471 | */ | |
3472 | hfs_volupdate (hfsmp, VOL_UPDATE, 0); | |
3473 | } | |
b4c24cb9 | 3474 | |
b4c24cb9 | 3475 | if (started_tr) { |
91447636 | 3476 | hfs_end_transaction(hfsmp); |
b4c24cb9 A |
3477 | } |
3478 | ||
2d21ac55 A |
3479 | dcp->c_flag &= ~C_DIR_MODIFICATION; |
3480 | wakeup((caddr_t)&dcp->c_flag); | |
3481 | ||
9bccf70c A |
3482 | return (error); |
3483 | } | |
3484 | ||
3485 | ||
3486 | __private_extern__ void | |
3487 | replace_desc(struct cnode *cp, struct cat_desc *cdp) | |
3488 | { | |
2d21ac55 | 3489 | // fixes 4348457 and 4463138 |
0c530ab8 | 3490 | if (&cp->c_desc == cdp) { |
2d21ac55 | 3491 | return; |
0c530ab8 A |
3492 | } |
3493 | ||
9bccf70c A |
3494 | /* First release allocated name buffer */ |
3495 | if (cp->c_desc.cd_flags & CD_HASBUF && cp->c_desc.cd_nameptr != 0) { | |
2d21ac55 | 3496 | const u_int8_t *name = cp->c_desc.cd_nameptr; |
9bccf70c A |
3497 | |
3498 | cp->c_desc.cd_nameptr = 0; | |
3499 | cp->c_desc.cd_namelen = 0; | |
3500 | cp->c_desc.cd_flags &= ~CD_HASBUF; | |
2d21ac55 | 3501 | vfs_removename((const char *)name); |
9bccf70c A |
3502 | } |
3503 | bcopy(cdp, &cp->c_desc, sizeof(cp->c_desc)); | |
3504 | ||
3505 | /* Cnode now owns the name buffer */ | |
3506 | cdp->cd_nameptr = 0; | |
3507 | cdp->cd_namelen = 0; | |
3508 | cdp->cd_flags &= ~CD_HASBUF; | |
3509 | } | |
3510 | ||
316670eb | 3511 | |
9bccf70c A |
3512 | /* |
3513 | * Rename a cnode. | |
3514 | * | |
91447636 A |
3515 | * The VFS layer guarantees that: |
3516 | * - source and destination will either both be directories, or | |
3517 | * both not be directories. | |
3518 | * - all the vnodes are from the same file system | |
d7e50217 | 3519 | * |
91447636 | 3520 | * When the target is a directory, HFS must ensure that its empty. |
b0d623f7 A |
3521 | * |
3522 | * Note that this function requires up to 6 vnodes in order to work properly | |
3523 | * if it is operating on files (and not on directories). This is because only | |
3524 | * files can have resource forks, and we now require iocounts to be held on the | |
3525 | * vnodes corresponding to the resource forks (if applicable) as well as | |
3526 | * the files or directories undergoing rename. The problem with not holding | |
3527 | * iocounts on the resource fork vnodes is that it can lead to a deadlock | |
3528 | * situation: The rsrc fork of the source file may be recycled and reclaimed | |
3529 | * in order to provide a vnode for the destination file's rsrc fork. Since | |
3530 | * data and rsrc forks share the same cnode, we'd eventually try to lock the | |
3531 | * source file's cnode in order to sync its rsrc fork to disk, but it's already | |
3532 | * been locked. By taking the rsrc fork vnodes up front we ensure that they | |
3533 | * cannot be recycled, and that the situation mentioned above cannot happen. | |
9bccf70c | 3534 | */ |
6d2010ae | 3535 | int |
91447636 A |
3536 | hfs_vnop_rename(ap) |
3537 | struct vnop_rename_args /* { | |
9bccf70c A |
3538 | struct vnode *a_fdvp; |
3539 | struct vnode *a_fvp; | |
3540 | struct componentname *a_fcnp; | |
3541 | struct vnode *a_tdvp; | |
3542 | struct vnode *a_tvp; | |
3543 | struct componentname *a_tcnp; | |
91447636 | 3544 | vfs_context_t a_context; |
9bccf70c A |
3545 | } */ *ap; |
3546 | { | |
3547 | struct vnode *tvp = ap->a_tvp; | |
3548 | struct vnode *tdvp = ap->a_tdvp; | |
3549 | struct vnode *fvp = ap->a_fvp; | |
3550 | struct vnode *fdvp = ap->a_fdvp; | |
316670eb A |
3551 | /* |
3552 | * Note that we only need locals for the target/destination's | |
3553 | * resource fork vnode (and only if necessary). We don't care if the | |
3554 | * source has a resource fork vnode or not. | |
3555 | */ | |
b0d623f7 | 3556 | struct vnode *tvp_rsrc = NULLVP; |
316670eb | 3557 | uint32_t tvp_rsrc_vid = 0; |
9bccf70c A |
3558 | struct componentname *tcnp = ap->a_tcnp; |
3559 | struct componentname *fcnp = ap->a_fcnp; | |
91447636 A |
3560 | struct proc *p = vfs_context_proc(ap->a_context); |
3561 | struct cnode *fcp; | |
3562 | struct cnode *fdcp; | |
3563 | struct cnode *tdcp; | |
3564 | struct cnode *tcp; | |
b0d623f7 | 3565 | struct cnode *error_cnode; |
9bccf70c A |
3566 | struct cat_desc from_desc; |
3567 | struct cat_desc to_desc; | |
3568 | struct cat_desc out_desc; | |
91447636 A |
3569 | struct hfsmount *hfsmp; |
3570 | cat_cookie_t cookie; | |
3571 | int tvp_deleted = 0; | |
3572 | int started_tr = 0, got_cookie = 0; | |
3573 | int took_trunc_lock = 0; | |
3574 | int lockflags; | |
3575 | int error; | |
6d2010ae | 3576 | time_t orig_from_ctime, orig_to_ctime; |
7ee9d059 A |
3577 | int emit_rename = 1; |
3578 | int emit_delete = 1; | |
6d2010ae A |
3579 | |
3580 | orig_from_ctime = VTOC(fvp)->c_ctime; | |
3581 | if (tvp && VTOC(tvp)) { | |
3582 | orig_to_ctime = VTOC(tvp)->c_ctime; | |
3583 | } else { | |
3584 | orig_to_ctime = ~0; | |
3585 | } | |
b0d623f7 | 3586 | |
7ee9d059 A |
3587 | hfsmp = VTOHFS(tdvp); |
3588 | /* | |
3589 | * Do special case checks here. If fvp == tvp then we need to check the | |
3590 | * cnode with locks held. | |
3591 | */ | |
3592 | if (fvp == tvp) { | |
3593 | int is_hardlink = 0; | |
3594 | /* | |
3595 | * In this case, we do *NOT* ever emit a DELETE event. | |
3596 | * We may not necessarily emit a RENAME event | |
3597 | */ | |
3598 | emit_delete = 0; | |
3599 | if ((error = hfs_lock(VTOC(fvp), HFS_SHARED_LOCK))) { | |
3600 | return error; | |
3601 | } | |
3602 | /* Check to see if the item is a hardlink or not */ | |
3603 | is_hardlink = (VTOC(fvp)->c_flag & C_HARDLINK); | |
3604 | hfs_unlock (VTOC(fvp)); | |
3605 | ||
3606 | /* | |
3607 | * If the item is not a hardlink, then case sensitivity must be off, otherwise | |
3608 | * two names should not resolve to the same cnode unless they were case variants. | |
3609 | */ | |
3610 | if (is_hardlink) { | |
3611 | emit_rename = 0; | |
3612 | /* | |
3613 | * Hardlinks are a little trickier. We only want to emit a rename event | |
3614 | * if the item is a hardlink, the parent directories are the same, case sensitivity | |
3615 | * is off, and the case folded names are the same. See the fvp == tvp case below for more | |
3616 | * info. | |
3617 | */ | |
3618 | ||
3619 | if ((fdvp == tdvp) && ((hfsmp->hfs_flags & HFS_CASE_SENSITIVE) == 0)) { | |
3620 | if (hfs_namecmp((const u_int8_t *)fcnp->cn_nameptr, fcnp->cn_namelen, | |
3621 | (const u_int8_t *)tcnp->cn_nameptr, tcnp->cn_namelen) == 0) { | |
3622 | /* Then in this case only it is ok to emit a rename */ | |
3623 | emit_rename = 1; | |
3624 | } | |
3625 | } | |
3626 | } | |
3627 | } | |
3628 | if (emit_rename) { | |
3629 | check_for_tracked_file(fvp, orig_from_ctime, NAMESPACE_HANDLER_RENAME_OP, NULL); | |
3630 | } | |
b0d623f7 | 3631 | |
6d2010ae | 3632 | if (tvp && VTOC(tvp)) { |
7ee9d059 A |
3633 | if (emit_delete) { |
3634 | check_for_tracked_file(tvp, orig_to_ctime, NAMESPACE_HANDLER_DELETE_OP, NULL); | |
3635 | } | |
6d2010ae A |
3636 | } |
3637 | ||
316670eb | 3638 | retry: |
b0d623f7 | 3639 | /* When tvp exists, take the truncate lock for hfs_removefile(). */ |
2d21ac55 | 3640 | if (tvp && (vnode_isreg(tvp) || vnode_islnk(tvp))) { |
6d2010ae | 3641 | hfs_lock_truncate(VTOC(tvp), HFS_EXCLUSIVE_LOCK); |
91447636 A |
3642 | took_trunc_lock = 1; |
3643 | } | |
9bccf70c | 3644 | |
91447636 | 3645 | error = hfs_lockfour(VTOC(fdvp), VTOC(fvp), VTOC(tdvp), tvp ? VTOC(tvp) : NULL, |
b0d623f7 | 3646 | HFS_EXCLUSIVE_LOCK, &error_cnode); |
91447636 | 3647 | if (error) { |
593a1d5f | 3648 | if (took_trunc_lock) { |
6d2010ae | 3649 | hfs_unlock_truncate(VTOC(tvp), 0); |
593a1d5f A |
3650 | took_trunc_lock = 0; |
3651 | } | |
316670eb A |
3652 | |
3653 | /* | |
3654 | * We hit an error path. If we were trying to re-acquire the locks | |
3655 | * after coming through here once, we might have already obtained | |
3656 | * an iocount on tvp's resource fork vnode. Drop that before dealing | |
3657 | * with the failure. Note this is safe -- since we are in an | |
3658 | * error handling path, we can't be holding the cnode locks. | |
3659 | */ | |
3660 | if (tvp_rsrc) { | |
3661 | vnode_put (tvp_rsrc); | |
3662 | tvp_rsrc_vid = 0; | |
3663 | tvp_rsrc = NULL; | |
3664 | } | |
3665 | ||
b0d623f7 A |
3666 | /* |
3667 | * tvp might no longer exist. If the cause of the lock failure | |
3668 | * was tvp, then we can try again with tvp/tcp set to NULL. | |
3669 | * This is ok because the vfs syscall will vnode_put the vnodes | |
3670 | * after we return from hfs_vnop_rename. | |
3671 | */ | |
3672 | if ((error == ENOENT) && (tvp != NULL) && (error_cnode == VTOC(tvp))) { | |
3673 | tcp = NULL; | |
3674 | tvp = NULL; | |
3675 | goto retry; | |
3676 | } | |
316670eb | 3677 | |
91447636 | 3678 | return (error); |
55e303ae A |
3679 | } |
3680 | ||
91447636 A |
3681 | fdcp = VTOC(fdvp); |
3682 | fcp = VTOC(fvp); | |
3683 | tdcp = VTOC(tdvp); | |
3684 | tcp = tvp ? VTOC(tvp) : NULL; | |
55e303ae | 3685 | |
316670eb A |
3686 | /* |
3687 | * Acquire iocounts on the destination's resource fork vnode | |
3688 | * if necessary. If dst/src are files and the dst has a resource | |
3689 | * fork vnode, then we need to try and acquire an iocount on the rsrc vnode. | |
3690 | * If it does not exist, then we don't care and can skip it. | |
3691 | */ | |
3692 | if ((vnode_isreg(fvp)) || (vnode_islnk(fvp))) { | |
3693 | if ((tvp) && (tcp->c_rsrc_vp) && (tvp_rsrc == NULL)) { | |
3694 | tvp_rsrc = tcp->c_rsrc_vp; | |
3695 | /* | |
3696 | * We can look at the vid here because we're holding the | |
3697 | * cnode lock on the underlying cnode for this rsrc vnode. | |
3698 | */ | |
3699 | tvp_rsrc_vid = vnode_vid (tvp_rsrc); | |
3700 | ||
3701 | /* Unlock everything to acquire iocount on this rsrc vnode */ | |
3702 | if (took_trunc_lock) { | |
3703 | hfs_unlock_truncate (VTOC(tvp), 0); | |
3704 | took_trunc_lock = 0; | |
3705 | } | |
3706 | hfs_unlockfour(fdcp, fcp, tdcp, tcp); | |
3707 | ||
3708 | if (vnode_getwithvid (tvp_rsrc, tvp_rsrc_vid)) { | |
3709 | /* iocount acquisition failed. Reset fields and start over.. */ | |
3710 | tvp_rsrc_vid = 0; | |
3711 | tvp_rsrc = NULL; | |
3712 | } | |
3713 | goto retry; | |
3714 | } | |
3715 | } | |
3716 | ||
b0d623f7 A |
3717 | /* Ensure we didn't race src or dst parent directories with rmdir. */ |
3718 | if (fdcp->c_flag & (C_NOEXISTS | C_DELETED)) { | |
3719 | error = ENOENT; | |
3720 | goto out; | |
3721 | } | |
3722 | ||
3723 | if (tdcp->c_flag & (C_NOEXISTS | C_DELETED)) { | |
3724 | error = ENOENT; | |
3725 | goto out; | |
3726 | } | |
3727 | ||
3728 | ||
3729 | /* Check for a race against unlink. The hfs_valid_cnode checks validate | |
3730 | * the parent/child relationship with fdcp and tdcp, as well as the | |
3731 | * component name of the target cnodes. | |
3732 | */ | |
6d2010ae | 3733 | if ((fcp->c_flag & (C_NOEXISTS | C_DELETED)) || !hfs_valid_cnode(hfsmp, fdvp, fcnp, fcp->c_fileid, NULL, &error)) { |
91447636 A |
3734 | error = ENOENT; |
3735 | goto out; | |
9bccf70c | 3736 | } |
91447636 | 3737 | |
6d2010ae | 3738 | if (tcp && ((tcp->c_flag & (C_NOEXISTS | C_DELETED)) || !hfs_valid_cnode(hfsmp, tdvp, tcnp, tcp->c_fileid, NULL, &error))) { |
2d21ac55 A |
3739 | // |
3740 | // hmm, the destination vnode isn't valid any more. | |
3741 | // in this case we can just drop him and pretend he | |
3742 | // never existed in the first place. | |
3743 | // | |
3744 | if (took_trunc_lock) { | |
6d2010ae A |
3745 | hfs_unlock_truncate(VTOC(tvp), 0); |
3746 | took_trunc_lock = 0; | |
2d21ac55 | 3747 | } |
6d2010ae | 3748 | error = 0; |
2d21ac55 A |
3749 | |
3750 | hfs_unlockfour(fdcp, fcp, tdcp, tcp); | |
3751 | ||
3752 | tcp = NULL; | |
3753 | tvp = NULL; | |
3754 | ||
3755 | // retry the locking with tvp null'ed out | |
3756 | goto retry; | |
3757 | } | |
3758 | ||
3759 | fdcp->c_flag |= C_DIR_MODIFICATION; | |
3760 | if (fdvp != tdvp) { | |
3761 | tdcp->c_flag |= C_DIR_MODIFICATION; | |
3762 | } | |
3763 | ||
3764 | /* | |
3765 | * Disallow renaming of a directory hard link if the source and | |
3766 | * destination parent directories are different, or a directory whose | |
3767 | * descendant is a directory hard link and the one of the ancestors | |
3768 | * of the destination directory is a directory hard link. | |
3769 | */ | |
3770 | if (vnode_isdir(fvp) && (fdvp != tdvp)) { | |
3771 | if (fcp->c_flag & C_HARDLINK) { | |
3772 | error = EPERM; | |
3773 | goto out; | |
3774 | } | |
3775 | if (fcp->c_attr.ca_recflags & kHFSHasChildLinkMask) { | |
3776 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); | |
3777 | if (cat_check_link_ancestry(hfsmp, tdcp->c_fileid, 0)) { | |
3778 | error = EPERM; | |
3779 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3780 | goto out; | |
3781 | } | |
3782 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3783 | } | |
3784 | } | |
3785 | ||
9bccf70c | 3786 | /* |
55e303ae A |
3787 | * The following edge case is caught here: |
3788 | * (to cannot be a descendent of from) | |
3789 | * | |
3790 | * o fdvp | |
3791 | * / | |
3792 | * / | |
3793 | * o fvp | |
3794 | * \ | |
3795 | * \ | |
3796 | * o tdvp | |
3797 | * / | |
3798 | * / | |
3799 | * o tvp | |
9bccf70c | 3800 | */ |
2d21ac55 | 3801 | if (tdcp->c_parentcnid == fcp->c_fileid) { |
55e303ae A |
3802 | error = EINVAL; |
3803 | goto out; | |
3804 | } | |
3805 | ||
3806 | /* | |
3807 | * The following two edge cases are caught here: | |
3808 | * (note tvp is not empty) | |
3809 | * | |
3810 | * o tdvp o tdvp | |
3811 | * / / | |
3812 | * / / | |
3813 | * o tvp tvp o fdvp | |
3814 | * \ \ | |
3815 | * \ \ | |
3816 | * o fdvp o fvp | |
3817 | * / | |
3818 | * / | |
3819 | * o fvp | |
3820 | */ | |
91447636 | 3821 | if (tvp && vnode_isdir(tvp) && (tcp->c_entries != 0) && fvp != tvp) { |
55e303ae A |
3822 | error = ENOTEMPTY; |
3823 | goto out; | |
3824 | } | |
3825 | ||
3826 | /* | |
3827 | * The following edge case is caught here: | |
3828 | * (the from child and parent are the same) | |
3829 | * | |
3830 | * o tdvp | |
3831 | * / | |
3832 | * / | |
3833 | * fdvp o fvp | |
3834 | */ | |
3835 | if (fdvp == fvp) { | |
3836 | error = EINVAL; | |
d7e50217 | 3837 | goto out; |
9bccf70c A |
3838 | } |
3839 | ||
3840 | /* | |
d7e50217 | 3841 | * Make sure "from" vnode and its parent are changeable. |
9bccf70c | 3842 | */ |
316670eb | 3843 | if ((fcp->c_bsdflags & (IMMUTABLE | APPEND)) || (fdcp->c_bsdflags & APPEND)) { |
d7e50217 A |
3844 | error = EPERM; |
3845 | goto out; | |
9bccf70c A |
3846 | } |
3847 | ||
9bccf70c | 3848 | /* |
d7e50217 A |
3849 | * If the destination parent directory is "sticky", then the |
3850 | * user must own the parent directory, or the destination of | |
3851 | * the rename, otherwise the destination may not be changed | |
3852 | * (except by root). This implements append-only directories. | |
3853 | * | |
55e303ae | 3854 | * Note that checks for immutable and write access are done |
91447636 | 3855 | * by the call to hfs_removefile. |
9bccf70c | 3856 | */ |
d7e50217 | 3857 | if (tvp && (tdcp->c_mode & S_ISTXT) && |
91447636 A |
3858 | (suser(vfs_context_ucred(tcnp->cn_context), NULL)) && |
3859 | (kauth_cred_getuid(vfs_context_ucred(tcnp->cn_context)) != tdcp->c_uid) && | |
3860 | (hfs_owner_rights(hfsmp, tcp->c_uid, vfs_context_ucred(tcnp->cn_context), p, false)) ) { | |
55e303ae A |
3861 | error = EPERM; |
3862 | goto out; | |
9bccf70c A |
3863 | } |
3864 | ||
316670eb A |
3865 | /* Don't allow modification of the journal or journal_info_block */ |
3866 | if (hfs_is_journal_file(hfsmp, fcp) || | |
3867 | (tcp && hfs_is_journal_file(hfsmp, tcp))) { | |
3868 | error = EPERM; | |
3869 | goto out; | |
3870 | } | |
3871 | ||
55e303ae A |
3872 | #if QUOTA |
3873 | if (tvp) | |
91447636 | 3874 | (void)hfs_getinoquota(tcp); |
55e303ae | 3875 | #endif |
91447636 | 3876 | /* Preflighting done, take fvp out of the name space. */ |
55e303ae A |
3877 | cache_purge(fvp); |
3878 | ||
9bccf70c | 3879 | bzero(&from_desc, sizeof(from_desc)); |
2d21ac55 | 3880 | from_desc.cd_nameptr = (const u_int8_t *)fcnp->cn_nameptr; |
9bccf70c | 3881 | from_desc.cd_namelen = fcnp->cn_namelen; |
2d21ac55 | 3882 | from_desc.cd_parentcnid = fdcp->c_fileid; |
9bccf70c A |
3883 | from_desc.cd_flags = fcp->c_desc.cd_flags & ~(CD_HASBUF | CD_DECOMPOSED); |
3884 | from_desc.cd_cnid = fcp->c_cnid; | |
d7e50217 | 3885 | |
9bccf70c | 3886 | bzero(&to_desc, sizeof(to_desc)); |
2d21ac55 | 3887 | to_desc.cd_nameptr = (const u_int8_t *)tcnp->cn_nameptr; |
9bccf70c | 3888 | to_desc.cd_namelen = tcnp->cn_namelen; |
2d21ac55 | 3889 | to_desc.cd_parentcnid = tdcp->c_fileid; |
9bccf70c A |
3890 | to_desc.cd_flags = fcp->c_desc.cd_flags & ~(CD_HASBUF | CD_DECOMPOSED); |
3891 | to_desc.cd_cnid = fcp->c_cnid; | |
3892 | ||
91447636 A |
3893 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
3894 | goto out; | |
3895 | } | |
3896 | started_tr = 1; | |
3897 | ||
2d21ac55 A |
3898 | /* hfs_vnop_link() and hfs_vnop_rename() set kHFSHasChildLinkMask |
3899 | * inside a journal transaction and without holding a cnode lock. | |
3900 | * As setting of this bit depends on being in journal transaction for | |
3901 | * concurrency, check this bit again after we start journal transaction for rename | |
3902 | * to ensure that this directory does not have any descendant that | |
3903 | * is a directory hard link. | |
3904 | */ | |
3905 | if (vnode_isdir(fvp) && (fdvp != tdvp)) { | |
3906 | if (fcp->c_attr.ca_recflags & kHFSHasChildLinkMask) { | |
3907 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); | |
3908 | if (cat_check_link_ancestry(hfsmp, tdcp->c_fileid, 0)) { | |
3909 | error = EPERM; | |
3910 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3911 | goto out; | |
3912 | } | |
3913 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3914 | } | |
3915 | } | |
3916 | ||
91447636 A |
3917 | // if it's a hardlink then re-lookup the name so |
3918 | // that we get the correct cnid in from_desc (see | |
3919 | // the comment in hfs_removefile for more details) | |
3920 | // | |
3921 | if (fcp->c_flag & C_HARDLINK) { | |
3922 | struct cat_desc tmpdesc; | |
3923 | cnid_t real_cnid; | |
3924 | ||
2d21ac55 | 3925 | tmpdesc.cd_nameptr = (const u_int8_t *)fcnp->cn_nameptr; |
91447636 | 3926 | tmpdesc.cd_namelen = fcnp->cn_namelen; |
2d21ac55 | 3927 | tmpdesc.cd_parentcnid = fdcp->c_fileid; |
91447636 | 3928 | tmpdesc.cd_hint = fdcp->c_childhint; |
2d21ac55 A |
3929 | tmpdesc.cd_flags = fcp->c_desc.cd_flags & CD_ISDIR; |
3930 | tmpdesc.cd_encoding = 0; | |
91447636 A |
3931 | |
3932 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); | |
3933 | ||
3934 | if (cat_lookup(hfsmp, &tmpdesc, 0, NULL, NULL, NULL, &real_cnid) != 0) { | |
3935 | hfs_systemfile_unlock(hfsmp, lockflags); | |
3936 | goto out; | |
55e303ae | 3937 | } |
91447636 A |
3938 | |
3939 | // use the real cnid instead of whatever happened to be there | |
3940 | from_desc.cd_cnid = real_cnid; | |
3941 | hfs_systemfile_unlock(hfsmp, lockflags); | |
55e303ae A |
3942 | } |
3943 | ||
3944 | /* | |
3945 | * Reserve some space in the Catalog file. | |
3946 | */ | |
3947 | if ((error = cat_preflight(hfsmp, CAT_RENAME + CAT_DELETE, &cookie, p))) { | |
3948 | goto out; | |
3949 | } | |
91447636 | 3950 | got_cookie = 1; |
55e303ae A |
3951 | |
3952 | /* | |
6d2010ae A |
3953 | * If the destination exists then it may need to be removed. |
3954 | * | |
3955 | * Due to HFS's locking system, we should always move the | |
3956 | * existing 'tvp' element to the hidden directory in hfs_vnop_rename. | |
3957 | * Because the VNOP_LOOKUP call enters and exits the filesystem independently | |
3958 | * of the actual vnop that it was trying to do (stat, link, readlink), | |
3959 | * we must release the cnode lock of that element during the interim to | |
3960 | * do MAC checking, vnode authorization, and other calls. In that time, | |
3961 | * the item can be deleted (or renamed over). However, only in the rename | |
3962 | * case is it inappropriate to return ENOENT from any of those calls. Either | |
3963 | * the call should return information about the old element (stale), or get | |
3964 | * information about the newer element that we are about to write in its place. | |
3965 | * | |
3966 | * HFS lookup has been modified to detect a rename and re-drive its | |
3967 | * lookup internally. For other calls that have already succeeded in | |
3968 | * their lookup call and are waiting to acquire the cnode lock in order | |
3969 | * to proceed, that cnode lock will not fail due to the cnode being marked | |
3970 | * C_NOEXISTS, because it won't have been marked as such. It will only | |
3971 | * have C_DELETED. Thus, they will simply act on the stale open-unlinked | |
3972 | * element. All future callers will get the new element. | |
3973 | * | |
3974 | * To implement this behavior, we pass the "only_unlink" argument to | |
3975 | * hfs_removefile and hfs_removedir. This will result in the vnode acting | |
3976 | * as though it is open-unlinked. Additionally, when we are done moving the | |
3977 | * element to the hidden directory, we vnode_recycle the target so that it is | |
3978 | * reclaimed as soon as possible. Reclaim and inactive are both | |
3979 | * capable of clearing out unused blocks for an open-unlinked file or dir. | |
55e303ae | 3980 | */ |
55e303ae | 3981 | if (tvp) { |
55e303ae | 3982 | /* |
2d21ac55 A |
3983 | * When fvp matches tvp they could be case variants |
3984 | * or matching hard links. | |
55e303ae | 3985 | */ |
91447636 | 3986 | if (fvp == tvp) { |
2d21ac55 | 3987 | if (!(fcp->c_flag & C_HARDLINK)) { |
7ee9d059 A |
3988 | /* |
3989 | * If they're not hardlinks, then fvp == tvp must mean we | |
3990 | * are using case-insensitive HFS because case-sensitive would | |
3991 | * not use the same vnode for both. In this case we just update | |
3992 | * the catalog for: a -> A | |
3993 | */ | |
2d21ac55 A |
3994 | goto skip_rm; /* simple case variant */ |
3995 | ||
7ee9d059 A |
3996 | } |
3997 | /* For all cases below, we must be using hardlinks */ | |
3998 | else if ((fdvp != tdvp) || | |
2d21ac55 | 3999 | (hfsmp->hfs_flags & HFS_CASE_SENSITIVE)) { |
7ee9d059 A |
4000 | /* |
4001 | * If the parent directories are not the same, AND the two items | |
4002 | * are hardlinks, posix says to do nothing: | |
4003 | * dir1/fred <-> dir2/bob and the op was mv dir1/fred -> dir2/bob | |
4004 | * We just return 0 in this case. | |
4005 | * | |
4006 | * If case sensitivity is on, and we are using hardlinks | |
4007 | * then renaming is supposed to do nothing. | |
4008 | * dir1/fred <-> dir2/FRED, and op == mv dir1/fred -> dir2/FRED | |
4009 | */ | |
2d21ac55 A |
4010 | goto out; /* matching hardlinks, nothing to do */ |
4011 | ||
4012 | } else if (hfs_namecmp((const u_int8_t *)fcnp->cn_nameptr, fcnp->cn_namelen, | |
4013 | (const u_int8_t *)tcnp->cn_nameptr, tcnp->cn_namelen) == 0) { | |
7ee9d059 A |
4014 | /* |
4015 | * If we get here, then the following must be true: | |
4016 | * a) We are running case-insensitive HFS+. | |
4017 | * b) Both paths 'fvp' and 'tvp' are in the same parent directory. | |
4018 | * c) the two names are case-variants of each other. | |
4019 | * | |
4020 | * In this case, we are really only dealing with a single catalog record | |
4021 | * whose name is being updated. | |
4022 | * | |
4023 | * op is dir1/fred -> dir1/FRED | |
4024 | * | |
4025 | * We need to special case the name matching, because if | |
4026 | * dir1/fred <-> dir1/bob were the two links, and the | |
4027 | * op was dir1/fred -> dir1/bob | |
4028 | * That would fail/do nothing. | |
4029 | */ | |
2d21ac55 A |
4030 | goto skip_rm; /* case-variant hardlink in the same dir */ |
4031 | } else { | |
4032 | goto out; /* matching hardlink, nothing to do */ | |
91447636 | 4033 | } |
91447636 A |
4034 | } |
4035 | ||
6d2010ae A |
4036 | |
4037 | if (vnode_isdir(tvp)) { | |
4038 | /* | |
4039 | * hfs_removedir will eventually call hfs_removefile on the directory | |
4040 | * we're working on, because only hfs_removefile does the renaming of the | |
4041 | * item to the hidden directory. The directory will stay around in the | |
4042 | * hidden directory with C_DELETED until it gets an inactive or a reclaim. | |
4043 | * That way, we can destroy all of the EAs as needed and allow new ones to be | |
4044 | * written. | |
cf7d32b8 | 4045 | */ |
6d2010ae A |
4046 | error = hfs_removedir(tdvp, tvp, tcnp, HFSRM_SKIP_RESERVE, 1); |
4047 | } | |
4048 | else { | |
316670eb | 4049 | error = hfs_removefile(tdvp, tvp, tcnp, 0, HFSRM_SKIP_RESERVE, 0, NULL, 1); |
6d2010ae A |
4050 | |
4051 | /* | |
4052 | * If the destination file had a resource fork vnode, then we need to get rid of | |
4053 | * its blocks when there are no more references to it. Because the call to | |
4054 | * hfs_removefile above always open-unlinks things, we need to force an inactive/reclaim | |
4055 | * on the resource fork vnode, in order to prevent block leaks. Otherwise, | |
4056 | * the resource fork vnode could prevent the data fork vnode from going out of scope | |
4057 | * because it holds a v_parent reference on it. So we mark it for termination | |
4058 | * with a call to vnode_recycle. hfs_vnop_reclaim has been modified so that it | |
4059 | * can clean up the blocks of open-unlinked files and resource forks. | |
4060 | * | |
4061 | * We can safely call vnode_recycle on the resource fork because we took an iocount | |
4062 | * reference on it at the beginning of the function. | |
4063 | */ | |
4064 | ||
4065 | if ((error == 0) && (tcp->c_flag & C_DELETED) && (tvp_rsrc)) { | |
4066 | vnode_recycle(tvp_rsrc); | |
4067 | } | |
91447636 | 4068 | } |
55e303ae | 4069 | |
6d2010ae | 4070 | if (error) { |
55e303ae | 4071 | goto out; |
6d2010ae A |
4072 | } |
4073 | ||
91447636 | 4074 | tvp_deleted = 1; |
6d2010ae A |
4075 | |
4076 | /* Mark 'tcp' as being deleted due to a rename */ | |
4077 | tcp->c_flag |= C_RENAMED; | |
4078 | ||
4079 | /* | |
4080 | * Aggressively mark tvp/tcp for termination to ensure that we recover all blocks | |
4081 | * as quickly as possible. | |
4082 | */ | |
4083 | vnode_recycle(tvp); | |
55e303ae | 4084 | } |
2d21ac55 | 4085 | skip_rm: |
55e303ae | 4086 | /* |
b0d623f7 A |
4087 | * All done with tvp and fvp. |
4088 | * | |
e2fac8b1 A |
4089 | * We also jump to this point if there was no destination observed during lookup and namei. |
4090 | * However, because only iocounts are held at the VFS layer, there is nothing preventing a | |
4091 | * competing thread from racing us and creating a file or dir at the destination of this rename | |
4092 | * operation. If this occurs, it may cause us to get a spurious EEXIST out of the cat_rename | |
4093 | * call below. To preserve rename's atomicity, we need to signal VFS to re-drive the | |
4094 | * namei/lookup and restart the rename operation. EEXIST is an allowable errno to be bubbled | |
4095 | * out of the rename syscall, but not for this reason, since it is a synonym errno for ENOTEMPTY. | |
4096 | * To signal VFS, we return ERECYCLE (which is also used for lookup restarts). This errno | |
4097 | * will be swallowed and it will restart the operation. | |
55e303ae | 4098 | */ |
b0d623f7 | 4099 | |
91447636 | 4100 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_EXCLUSIVE_LOCK); |
d7e50217 | 4101 | error = cat_rename(hfsmp, &from_desc, &tdcp->c_desc, &to_desc, &out_desc); |
91447636 | 4102 | hfs_systemfile_unlock(hfsmp, lockflags); |
55e303ae A |
4103 | |
4104 | if (error) { | |
e2fac8b1 A |
4105 | if (error == EEXIST) { |
4106 | error = ERECYCLE; | |
4107 | } | |
d7e50217 | 4108 | goto out; |
55e303ae | 4109 | } |
9bccf70c | 4110 | |
91447636 | 4111 | /* Invalidate negative cache entries in the destination directory */ |
2d21ac55 | 4112 | if (tdcp->c_flag & C_NEG_ENTRIES) { |
91447636 | 4113 | cache_purge_negatives(tdvp); |
2d21ac55 A |
4114 | tdcp->c_flag &= ~C_NEG_ENTRIES; |
4115 | } | |
91447636 | 4116 | |
d7e50217 | 4117 | /* Update cnode's catalog descriptor */ |
91447636 | 4118 | replace_desc(fcp, &out_desc); |
2d21ac55 | 4119 | fcp->c_parentcnid = tdcp->c_fileid; |
91447636 | 4120 | fcp->c_hint = 0; |
316670eb | 4121 | |
6d2010ae A |
4122 | /* Now indicate this cnode needs to have date-added written to the finderinfo */ |
4123 | fcp->c_flag |= C_NEEDS_DATEADDED; | |
4124 | (void) hfs_update (fvp, 0); | |
4125 | ||
9bccf70c | 4126 | |
91447636 | 4127 | hfs_volupdate(hfsmp, vnode_isdir(fvp) ? VOL_RMDIR : VOL_RMFILE, |
d7e50217 | 4128 | (fdcp->c_cnid == kHFSRootFolderID)); |
91447636 | 4129 | hfs_volupdate(hfsmp, vnode_isdir(fvp) ? VOL_MKDIR : VOL_MKFILE, |
d7e50217 A |
4130 | (tdcp->c_cnid == kHFSRootFolderID)); |
4131 | ||
d7e50217 | 4132 | /* Update both parent directories. */ |
b4c24cb9 | 4133 | if (fdvp != tdvp) { |
2d21ac55 A |
4134 | if (vnode_isdir(fvp)) { |
4135 | /* If the source directory has directory hard link | |
4136 | * descendants, set the kHFSHasChildLinkBit in the | |
4137 | * destination parent hierarchy | |
4138 | */ | |
4139 | if ((fcp->c_attr.ca_recflags & kHFSHasChildLinkMask) && | |
4140 | !(tdcp->c_attr.ca_recflags & kHFSHasChildLinkMask)) { | |
4141 | ||
4142 | tdcp->c_attr.ca_recflags |= kHFSHasChildLinkMask; | |
4143 | ||
4144 | error = cat_set_childlinkbit(hfsmp, tdcp->c_parentcnid); | |
4145 | if (error) { | |
4146 | printf ("hfs_vnop_rename: error updating parent chain for %u\n", tdcp->c_cnid); | |
4147 | error = 0; | |
4148 | } | |
4149 | } | |
4150 | INC_FOLDERCOUNT(hfsmp, tdcp->c_attr); | |
4151 | DEC_FOLDERCOUNT(hfsmp, fdcp->c_attr); | |
4152 | } | |
d7e50217 | 4153 | tdcp->c_entries++; |
2d21ac55 | 4154 | tdcp->c_dirchangecnt++; |
d7e50217 A |
4155 | if (fdcp->c_entries > 0) |
4156 | fdcp->c_entries--; | |
2d21ac55 | 4157 | fdcp->c_dirchangecnt++; |
91447636 A |
4158 | fdcp->c_touch_chgtime = TRUE; |
4159 | fdcp->c_touch_modtime = TRUE; | |
4160 | ||
4161 | fdcp->c_flag |= C_FORCEUPDATE; // XXXdbg - force it out! | |
4162 | (void) hfs_update(fdvp, 0); | |
b4c24cb9 | 4163 | } |
d7e50217 | 4164 | tdcp->c_childhint = out_desc.cd_hint; /* Cache directory's location */ |
91447636 A |
4165 | tdcp->c_touch_chgtime = TRUE; |
4166 | tdcp->c_touch_modtime = TRUE; | |
b4c24cb9 | 4167 | |
91447636 A |
4168 | tdcp->c_flag |= C_FORCEUPDATE; // XXXdbg - force it out! |
4169 | (void) hfs_update(tdvp, 0); | |
d7e50217 | 4170 | out: |
91447636 | 4171 | if (got_cookie) { |
55e303ae A |
4172 | cat_postflight(hfsmp, &cookie, p); |
4173 | } | |
b4c24cb9 | 4174 | if (started_tr) { |
91447636 | 4175 | hfs_end_transaction(hfsmp); |
b4c24cb9 A |
4176 | } |
4177 | ||
2d21ac55 A |
4178 | fdcp->c_flag &= ~C_DIR_MODIFICATION; |
4179 | wakeup((caddr_t)&fdcp->c_flag); | |
4180 | if (fdvp != tdvp) { | |
4181 | tdcp->c_flag &= ~C_DIR_MODIFICATION; | |
4182 | wakeup((caddr_t)&tdcp->c_flag); | |
4183 | } | |
4184 | ||
6d2010ae A |
4185 | if (took_trunc_lock) { |
4186 | hfs_unlock_truncate(VTOC(tvp), 0); | |
4187 | } | |
91447636 A |
4188 | |
4189 | hfs_unlockfour(fdcp, fcp, tdcp, tcp); | |
b0d623f7 | 4190 | |
316670eb | 4191 | /* Now vnode_put the resource fork vnode if necessary */ |
b0d623f7 A |
4192 | if (tvp_rsrc) { |
4193 | vnode_put(tvp_rsrc); | |
316670eb | 4194 | tvp_rsrc = NULL; |
b0d623f7 | 4195 | } |
cf7d32b8 | 4196 | |
d7e50217 | 4197 | /* After tvp is removed the only acceptable error is EIO */ |
55e303ae | 4198 | if (error && tvp_deleted) |
d7e50217 A |
4199 | error = EIO; |
4200 | ||
4201 | return (error); | |
9bccf70c A |
4202 | } |
4203 | ||
4204 | ||
9bccf70c | 4205 | /* |
91447636 A |
4206 | * Make a directory. |
4207 | */ | |
6d2010ae | 4208 | int |
91447636 | 4209 | hfs_vnop_mkdir(struct vnop_mkdir_args *ap) |
9bccf70c | 4210 | { |
91447636 A |
4211 | /***** HACK ALERT ********/ |
4212 | ap->a_cnp->cn_flags |= MAKEENTRY; | |
4213 | return hfs_makenode(ap->a_dvp, ap->a_vpp, ap->a_cnp, ap->a_vap, ap->a_context); | |
9bccf70c A |
4214 | } |
4215 | ||
4216 | ||
4217 | /* | |
91447636 A |
4218 | * Create a symbolic link. |
4219 | */ | |
6d2010ae | 4220 | int |
91447636 | 4221 | hfs_vnop_symlink(struct vnop_symlink_args *ap) |
9bccf70c | 4222 | { |
91447636 A |
4223 | struct vnode **vpp = ap->a_vpp; |
4224 | struct vnode *dvp = ap->a_dvp; | |
4225 | struct vnode *vp = NULL; | |
2d21ac55 | 4226 | struct cnode *cp = NULL; |
b4c24cb9 | 4227 | struct hfsmount *hfsmp; |
9bccf70c | 4228 | struct filefork *fp; |
9bccf70c | 4229 | struct buf *bp = NULL; |
91447636 A |
4230 | char *datap; |
4231 | int started_tr = 0; | |
2d21ac55 A |
4232 | u_int32_t len; |
4233 | int error; | |
9bccf70c A |
4234 | |
4235 | /* HFS standard disks don't support symbolic links */ | |
91447636 A |
4236 | if (VTOVCB(dvp)->vcbSigWord != kHFSPlusSigWord) |
4237 | return (ENOTSUP); | |
9bccf70c A |
4238 | |
4239 | /* Check for empty target name */ | |
91447636 | 4240 | if (ap->a_target[0] == 0) |
9bccf70c | 4241 | return (EINVAL); |
b4c24cb9 | 4242 | |
2d21ac55 A |
4243 | hfsmp = VTOHFS(dvp); |
4244 | len = strlen(ap->a_target); | |
4245 | ||
4246 | /* Check for free space */ | |
4247 | if (((u_int64_t)hfs_freeblks(hfsmp, 0) * (u_int64_t)hfsmp->blockSize) < len) { | |
4248 | return (ENOSPC); | |
4249 | } | |
4250 | ||
9bccf70c | 4251 | /* Create the vnode */ |
91447636 A |
4252 | ap->a_vap->va_mode |= S_IFLNK; |
4253 | if ((error = hfs_makenode(dvp, vpp, ap->a_cnp, ap->a_vap, ap->a_context))) { | |
4254 | goto out; | |
b4c24cb9 | 4255 | } |
9bccf70c | 4256 | vp = *vpp; |
2d21ac55 A |
4257 | if ((error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK))) { |
4258 | goto out; | |
4259 | } | |
4260 | cp = VTOC(vp); | |
9bccf70c | 4261 | fp = VTOF(vp); |
2d21ac55 A |
4262 | |
4263 | if (cp->c_flag & (C_NOEXISTS | C_DELETED)) { | |
4264 | goto out; | |
4265 | } | |
9bccf70c | 4266 | |
d7e50217 | 4267 | #if QUOTA |
2d21ac55 | 4268 | (void)hfs_getinoquota(cp); |
d7e50217 A |
4269 | #endif /* QUOTA */ |
4270 | ||
91447636 A |
4271 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
4272 | goto out; | |
b4c24cb9 | 4273 | } |
91447636 | 4274 | started_tr = 1; |
b4c24cb9 | 4275 | |
91447636 A |
4276 | /* |
4277 | * Allocate space for the link. | |
4278 | * | |
4279 | * Since we're already inside a transaction, | |
4280 | * tell hfs_truncate to skip the ubc_setsize. | |
4281 | * | |
4282 | * Don't need truncate lock since a symlink is treated as a system file. | |
4283 | */ | |
b0d623f7 | 4284 | error = hfs_truncate(vp, len, IO_NOZEROFILL, 1, 0, ap->a_context); |
2d21ac55 A |
4285 | |
4286 | /* On errors, remove the symlink file */ | |
4287 | if (error) { | |
4288 | /* | |
4289 | * End the transaction so we don't re-take the cnode lock | |
4290 | * below while inside a transaction (lock order violation). | |
4291 | */ | |
4292 | hfs_end_transaction(hfsmp); | |
4293 | ||
4294 | /* hfs_removefile() requires holding the truncate lock */ | |
4295 | hfs_unlock(cp); | |
6d2010ae | 4296 | hfs_lock_truncate(cp, HFS_EXCLUSIVE_LOCK); |
2d21ac55 A |
4297 | hfs_lock(cp, HFS_FORCE_LOCK); |
4298 | ||
4299 | if (hfs_start_transaction(hfsmp) != 0) { | |
4300 | started_tr = 0; | |
4301 | hfs_unlock_truncate(cp, TRUE); | |
4302 | goto out; | |
4303 | } | |
4304 | ||
6d2010ae A |
4305 | (void) hfs_removefile(dvp, vp, ap->a_cnp, 0, 0, 0, NULL, 0); |
4306 | hfs_unlock_truncate(cp, 0); | |
2d21ac55 A |
4307 | goto out; |
4308 | } | |
9bccf70c A |
4309 | |
4310 | /* Write the link to disk */ | |
593a1d5f | 4311 | bp = buf_getblk(vp, (daddr64_t)0, roundup((int)fp->ff_size, hfsmp->hfs_physical_block_size), |
9bccf70c | 4312 | 0, 0, BLK_META); |
b4c24cb9 A |
4313 | if (hfsmp->jnl) { |
4314 | journal_modify_block_start(hfsmp->jnl, bp); | |
4315 | } | |
91447636 A |
4316 | datap = (char *)buf_dataptr(bp); |
4317 | bzero(datap, buf_size(bp)); | |
4318 | bcopy(ap->a_target, datap, len); | |
4319 | ||
b4c24cb9 | 4320 | if (hfsmp->jnl) { |
2d21ac55 | 4321 | journal_modify_block_end(hfsmp->jnl, bp, NULL, NULL); |
b4c24cb9 | 4322 | } else { |
91447636 | 4323 | buf_bawrite(bp); |
b4c24cb9 | 4324 | } |
91447636 A |
4325 | /* |
4326 | * We defered the ubc_setsize for hfs_truncate | |
4327 | * since we were inside a transaction. | |
4328 | * | |
4329 | * We don't need to drop the cnode lock here | |
4330 | * since this is a symlink. | |
4331 | */ | |
4332 | ubc_setsize(vp, len); | |
9bccf70c | 4333 | out: |
91447636 A |
4334 | if (started_tr) |
4335 | hfs_end_transaction(hfsmp); | |
2d21ac55 A |
4336 | if ((cp != NULL) && (vp != NULL)) { |
4337 | hfs_unlock(cp); | |
4338 | } | |
4339 | if (error) { | |
4340 | if (vp) { | |
4341 | vnode_put(vp); | |
4342 | } | |
4343 | *vpp = NULL; | |
b4c24cb9 | 4344 | } |
9bccf70c A |
4345 | return (error); |
4346 | } | |
4347 | ||
4348 | ||
91447636 A |
4349 | /* structures to hold a "." or ".." directory entry */ |
4350 | struct hfs_stddotentry { | |
4351 | u_int32_t d_fileno; /* unique file number */ | |
4352 | u_int16_t d_reclen; /* length of this structure */ | |
4353 | u_int8_t d_type; /* dirent file type */ | |
4354 | u_int8_t d_namlen; /* len of filename */ | |
4355 | char d_name[4]; /* "." or ".." */ | |
9bccf70c A |
4356 | }; |
4357 | ||
91447636 A |
4358 | struct hfs_extdotentry { |
4359 | u_int64_t d_fileno; /* unique file number */ | |
4360 | u_int64_t d_seekoff; /* seek offset (optional, used by servers) */ | |
4361 | u_int16_t d_reclen; /* length of this structure */ | |
4362 | u_int16_t d_namlen; /* len of filename */ | |
4363 | u_int8_t d_type; /* dirent file type */ | |
4364 | u_char d_name[3]; /* "." or ".." */ | |
4365 | }; | |
9bccf70c | 4366 | |
91447636 A |
4367 | typedef union { |
4368 | struct hfs_stddotentry std; | |
4369 | struct hfs_extdotentry ext; | |
4370 | } hfs_dotentry_t; | |
9bccf70c A |
4371 | |
4372 | /* | |
91447636 A |
4373 | * hfs_vnop_readdir reads directory entries into the buffer pointed |
4374 | * to by uio, in a filesystem independent format. Up to uio_resid | |
4375 | * bytes of data can be transferred. The data in the buffer is a | |
4376 | * series of packed dirent structures where each one contains the | |
4377 | * following entries: | |
4378 | * | |
4379 | * u_int32_t d_fileno; // file number of entry | |
4380 | * u_int16_t d_reclen; // length of this record | |
4381 | * u_int8_t d_type; // file type | |
4382 | * u_int8_t d_namlen; // length of string in d_name | |
4383 | * char d_name[MAXNAMELEN+1]; // null terminated file name | |
4384 | * | |
4385 | * The current position (uio_offset) refers to the next block of | |
4386 | * entries. The offset can only be set to a value previously | |
4387 | * returned by hfs_vnop_readdir or zero. This offset does not have | |
4388 | * to match the number of bytes returned (in uio_resid). | |
4389 | * | |
4390 | * In fact, the offset used by HFS is essentially an index (26 bits) | |
4391 | * with a tag (6 bits). The tag is for associating the next request | |
4392 | * with the current request. This enables us to have multiple threads | |
4393 | * reading the directory while the directory is also being modified. | |
4394 | * | |
4395 | * Each tag/index pair is tied to a unique directory hint. The hint | |
4396 | * contains information (filename) needed to build the catalog b-tree | |
4397 | * key for finding the next set of entries. | |
2d21ac55 A |
4398 | * |
4399 | * If the directory is marked as deleted-but-in-use (cp->c_flag & C_DELETED), | |
4400 | * do NOT synthesize entries for "." and "..". | |
9bccf70c | 4401 | */ |
6d2010ae | 4402 | int |
91447636 A |
4403 | hfs_vnop_readdir(ap) |
4404 | struct vnop_readdir_args /* { | |
4405 | vnode_t a_vp; | |
4406 | uio_t a_uio; | |
4407 | int a_flags; | |
4408 | int *a_eofflag; | |
4409 | int *a_numdirent; | |
4410 | vfs_context_t a_context; | |
9bccf70c A |
4411 | } */ *ap; |
4412 | { | |
91447636 A |
4413 | struct vnode *vp = ap->a_vp; |
4414 | uio_t uio = ap->a_uio; | |
4415 | struct cnode *cp; | |
4416 | struct hfsmount *hfsmp; | |
4417 | directoryhint_t *dirhint = NULL; | |
4418 | directoryhint_t localhint; | |
4419 | off_t offset; | |
4420 | off_t startoffset; | |
4421 | int error = 0; | |
9bccf70c | 4422 | int eofflag = 0; |
91447636 A |
4423 | user_addr_t user_start = 0; |
4424 | user_size_t user_len = 0; | |
4425 | int index; | |
4426 | unsigned int tag; | |
4427 | int items; | |
4428 | int lockflags; | |
4429 | int extended; | |
4430 | int nfs_cookies; | |
91447636 A |
4431 | cnid_t cnid_hint = 0; |
4432 | ||
4433 | items = 0; | |
4434 | startoffset = offset = uio_offset(uio); | |
91447636 A |
4435 | extended = (ap->a_flags & VNODE_READDIR_EXTENDED); |
4436 | nfs_cookies = extended && (ap->a_flags & VNODE_READDIR_REQSEEKOFF); | |
4437 | ||
4438 | /* Sanity check the uio data. */ | |
b0d623f7 | 4439 | if (uio_iovcnt(uio) > 1) |
91447636 | 4440 | return (EINVAL); |
6d2010ae | 4441 | |
316670eb | 4442 | if (VTOC(vp)->c_bsdflags & UF_COMPRESSED) { |
6d2010ae A |
4443 | int compressed = hfs_file_is_compressed(VTOC(vp), 0); /* 0 == take the cnode lock */ |
4444 | if (VTOCMP(vp) != NULL && !compressed) { | |
4445 | error = check_for_dataless_file(vp, NAMESPACE_HANDLER_READ_OP); | |
4446 | if (error) { | |
4447 | return error; | |
4448 | } | |
4449 | } | |
4450 | } | |
4451 | ||
4452 | cp = VTOC(vp); | |
4453 | hfsmp = VTOHFS(vp); | |
4454 | ||
91447636 A |
4455 | /* Note that the dirhint calls require an exclusive lock. */ |
4456 | if ((error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK))) | |
4457 | return (error); | |
55e303ae | 4458 | |
91447636 A |
4459 | /* Pick up cnid hint (if any). */ |
4460 | if (nfs_cookies) { | |
4461 | cnid_hint = (cnid_t)(uio_offset(uio) >> 32); | |
4462 | uio_setoffset(uio, uio_offset(uio) & 0x00000000ffffffffLL); | |
3a60a9f5 A |
4463 | if (cnid_hint == INT_MAX) { /* searching pass the last item */ |
4464 | eofflag = 1; | |
4465 | goto out; | |
4466 | } | |
91447636 A |
4467 | } |
4468 | /* | |
2d21ac55 A |
4469 | * Synthesize entries for "." and "..", unless the directory has |
4470 | * been deleted, but not closed yet (lazy delete in progress). | |
91447636 | 4471 | */ |
2d21ac55 | 4472 | if (offset == 0 && !(cp->c_flag & C_DELETED)) { |
91447636 A |
4473 | hfs_dotentry_t dotentry[2]; |
4474 | size_t uiosize; | |
4475 | ||
4476 | if (extended) { | |
4477 | struct hfs_extdotentry *entry = &dotentry[0].ext; | |
4478 | ||
4479 | entry->d_fileno = cp->c_cnid; | |
4480 | entry->d_reclen = sizeof(struct hfs_extdotentry); | |
4481 | entry->d_type = DT_DIR; | |
4482 | entry->d_namlen = 1; | |
4483 | entry->d_name[0] = '.'; | |
4484 | entry->d_name[1] = '\0'; | |
4485 | entry->d_name[2] = '\0'; | |
4486 | entry->d_seekoff = 1; | |
4487 | ||
4488 | ++entry; | |
4489 | entry->d_fileno = cp->c_parentcnid; | |
4490 | entry->d_reclen = sizeof(struct hfs_extdotentry); | |
4491 | entry->d_type = DT_DIR; | |
4492 | entry->d_namlen = 2; | |
4493 | entry->d_name[0] = '.'; | |
4494 | entry->d_name[1] = '.'; | |
4495 | entry->d_name[2] = '\0'; | |
4496 | entry->d_seekoff = 2; | |
4497 | uiosize = 2 * sizeof(struct hfs_extdotentry); | |
4498 | } else { | |
4499 | struct hfs_stddotentry *entry = &dotentry[0].std; | |
4500 | ||
4501 | entry->d_fileno = cp->c_cnid; | |
4502 | entry->d_reclen = sizeof(struct hfs_stddotentry); | |
4503 | entry->d_type = DT_DIR; | |
4504 | entry->d_namlen = 1; | |
4505 | *(int *)&entry->d_name[0] = 0; | |
4506 | entry->d_name[0] = '.'; | |
4507 | ||
4508 | ++entry; | |
4509 | entry->d_fileno = cp->c_parentcnid; | |
4510 | entry->d_reclen = sizeof(struct hfs_stddotentry); | |
4511 | entry->d_type = DT_DIR; | |
4512 | entry->d_namlen = 2; | |
4513 | *(int *)&entry->d_name[0] = 0; | |
4514 | entry->d_name[0] = '.'; | |
4515 | entry->d_name[1] = '.'; | |
4516 | uiosize = 2 * sizeof(struct hfs_stddotentry); | |
4517 | } | |
4518 | if ((error = uiomove((caddr_t)&dotentry, uiosize, uio))) { | |
4519 | goto out; | |
4520 | } | |
4521 | offset += 2; | |
4522 | } | |
9bccf70c | 4523 | |
91447636 A |
4524 | /* If there are no real entries then we're done. */ |
4525 | if (cp->c_entries == 0) { | |
4526 | error = 0; | |
4527 | eofflag = 1; | |
4528 | uio_setoffset(uio, offset); | |
4529 | goto seekoffcalc; | |
4530 | } | |
4531 | ||
4532 | // | |
b4c24cb9 A |
4533 | // We have to lock the user's buffer here so that we won't |
4534 | // fault on it after we've acquired a shared lock on the | |
4535 | // catalog file. The issue is that you can get a 3-way | |
4536 | // deadlock if someone else starts a transaction and then | |
4537 | // tries to lock the catalog file but can't because we're | |
4538 | // here and we can't service our page fault because VM is | |
4539 | // blocked trying to start a transaction as a result of | |
4540 | // trying to free up pages for our page fault. It's messy | |
2d21ac55 | 4541 | // but it does happen on dual-processors that are paging |
b4c24cb9 A |
4542 | // heavily (see radar 3082639 for more info). By locking |
4543 | // the buffer up-front we prevent ourselves from faulting | |
4544 | // while holding the shared catalog file lock. | |
4545 | // | |
4546 | // Fortunately this and hfs_search() are the only two places | |
4547 | // currently (10/30/02) that can fault on user data with a | |
4548 | // shared lock on the catalog file. | |
4549 | // | |
91447636 A |
4550 | if (hfsmp->jnl && uio_isuserspace(uio)) { |
4551 | user_start = uio_curriovbase(uio); | |
4552 | user_len = uio_curriovlen(uio); | |
b4c24cb9 | 4553 | |
91447636 A |
4554 | if ((error = vslock(user_start, user_len)) != 0) { |
4555 | user_start = 0; | |
4556 | goto out; | |
b4c24cb9 A |
4557 | } |
4558 | } | |
91447636 A |
4559 | /* Convert offset into a catalog directory index. */ |
4560 | index = (offset & HFS_INDEX_MASK) - 2; | |
4561 | tag = offset & ~HFS_INDEX_MASK; | |
4562 | ||
4563 | /* Lock catalog during cat_findname and cat_getdirentries. */ | |
4564 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); | |
4565 | ||
4566 | /* When called from NFS, try and resolve a cnid hint. */ | |
4567 | if (nfs_cookies && cnid_hint != 0) { | |
4568 | if (cat_findname(hfsmp, cnid_hint, &localhint.dh_desc) == 0) { | |
2d21ac55 | 4569 | if ( localhint.dh_desc.cd_parentcnid == cp->c_fileid) { |
91447636 A |
4570 | localhint.dh_index = index - 1; |
4571 | localhint.dh_time = 0; | |
b36670ce | 4572 | bzero(&localhint.dh_link, sizeof(localhint.dh_link)); |
91447636 A |
4573 | dirhint = &localhint; /* don't forget to release the descriptor */ |
4574 | } else { | |
4575 | cat_releasedesc(&localhint.dh_desc); | |
4576 | } | |
9bccf70c | 4577 | } |
9bccf70c A |
4578 | } |
4579 | ||
91447636 A |
4580 | /* Get a directory hint (cnode must be locked exclusive) */ |
4581 | if (dirhint == NULL) { | |
2d21ac55 | 4582 | dirhint = hfs_getdirhint(cp, ((index - 1) & HFS_INDEX_MASK) | tag, 0); |
55e303ae | 4583 | |
91447636 A |
4584 | /* Hide tag from catalog layer. */ |
4585 | dirhint->dh_index &= HFS_INDEX_MASK; | |
4586 | if (dirhint->dh_index == HFS_INDEX_MASK) { | |
4587 | dirhint->dh_index = -1; | |
ccc36f2f | 4588 | } |
55e303ae | 4589 | } |
91447636 | 4590 | |
2d21ac55 A |
4591 | if (index == 0) { |
4592 | dirhint->dh_threadhint = cp->c_dirthreadhint; | |
6d2010ae | 4593 | } |
7e4a7d39 A |
4594 | else { |
4595 | /* | |
4596 | * If we have a non-zero index, there is a possibility that during the last | |
4597 | * call to hfs_vnop_readdir we hit EOF for this directory. If that is the case | |
4598 | * then we don't want to return any new entries for the caller. Just return 0 | |
4599 | * items, mark the eofflag, and bail out. Because we won't have done any work, the | |
4600 | * code at the end of the function will release the dirhint for us. | |
4601 | * | |
4602 | * Don't forget to unlock the catalog lock on the way out, too. | |
4603 | */ | |
4604 | if (dirhint->dh_desc.cd_flags & CD_EOF) { | |
4605 | error = 0; | |
4606 | eofflag = 1; | |
4607 | uio_setoffset(uio, startoffset); | |
4608 | hfs_systemfile_unlock (hfsmp, lockflags); | |
4609 | ||
4610 | goto seekoffcalc; | |
4611 | } | |
4612 | } | |
2d21ac55 | 4613 | |
91447636 | 4614 | /* Pack the buffer with dirent entries. */ |
316670eb | 4615 | error = cat_getdirentries(hfsmp, cp->c_entries, dirhint, uio, ap->a_flags, &items, &eofflag); |
55e303ae | 4616 | |
2d21ac55 A |
4617 | if (index == 0 && error == 0) { |
4618 | cp->c_dirthreadhint = dirhint->dh_threadhint; | |
4619 | } | |
4620 | ||
91447636 A |
4621 | hfs_systemfile_unlock(hfsmp, lockflags); |
4622 | ||
4623 | if (error != 0) { | |
4624 | goto out; | |
4625 | } | |
4626 | ||
4627 | /* Get index to the next item */ | |
4628 | index += items; | |
4629 | ||
4630 | if (items >= (int)cp->c_entries) { | |
9bccf70c | 4631 | eofflag = 1; |
9bccf70c A |
4632 | } |
4633 | ||
91447636 A |
4634 | /* Convert catalog directory index back into an offset. */ |
4635 | while (tag == 0) | |
4636 | tag = (++cp->c_dirhinttag) << HFS_INDEX_BITS; | |
4637 | uio_setoffset(uio, (index + 2) | tag); | |
4638 | dirhint->dh_index |= tag; | |
9bccf70c | 4639 | |
91447636 A |
4640 | seekoffcalc: |
4641 | cp->c_touch_acctime = TRUE; | |
9bccf70c | 4642 | |
91447636 A |
4643 | if (ap->a_numdirent) { |
4644 | if (startoffset == 0) | |
4645 | items += 2; | |
4646 | *ap->a_numdirent = items; | |
9bccf70c | 4647 | } |
9bccf70c | 4648 | |
91447636 | 4649 | out: |
d1ecb069 | 4650 | if (user_start) { |
b4c24cb9 A |
4651 | vsunlock(user_start, user_len, TRUE); |
4652 | } | |
91447636 A |
4653 | /* If we didn't do anything then go ahead and dump the hint. */ |
4654 | if ((dirhint != NULL) && | |
4655 | (dirhint != &localhint) && | |
4656 | (uio_offset(uio) == startoffset)) { | |
4657 | hfs_reldirhint(cp, dirhint); | |
4658 | eofflag = 1; | |
4659 | } | |
4660 | if (ap->a_eofflag) { | |
9bccf70c | 4661 | *ap->a_eofflag = eofflag; |
91447636 A |
4662 | } |
4663 | if (dirhint == &localhint) { | |
4664 | cat_releasedesc(&localhint.dh_desc); | |
4665 | } | |
4666 | hfs_unlock(cp); | |
4667 | return (error); | |
9bccf70c A |
4668 | } |
4669 | ||
4670 | ||
4671 | /* | |
91447636 A |
4672 | * Read contents of a symbolic link. |
4673 | */ | |
6d2010ae | 4674 | int |
91447636 A |
4675 | hfs_vnop_readlink(ap) |
4676 | struct vnop_readlink_args /* { | |
9bccf70c A |
4677 | struct vnode *a_vp; |
4678 | struct uio *a_uio; | |
91447636 | 4679 | vfs_context_t a_context; |
9bccf70c A |
4680 | } */ *ap; |
4681 | { | |
9bccf70c A |
4682 | struct vnode *vp = ap->a_vp; |
4683 | struct cnode *cp; | |
4684 | struct filefork *fp; | |
91447636 | 4685 | int error; |
9bccf70c | 4686 | |
91447636 | 4687 | if (!vnode_islnk(vp)) |
9bccf70c A |
4688 | return (EINVAL); |
4689 | ||
91447636 A |
4690 | if ((error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK))) |
4691 | return (error); | |
9bccf70c A |
4692 | cp = VTOC(vp); |
4693 | fp = VTOF(vp); | |
4694 | ||
4695 | /* Zero length sym links are not allowed */ | |
4696 | if (fp->ff_size == 0 || fp->ff_size > MAXPATHLEN) { | |
91447636 A |
4697 | error = EINVAL; |
4698 | goto exit; | |
9bccf70c A |
4699 | } |
4700 | ||
4701 | /* Cache the path so we don't waste buffer cache resources */ | |
4702 | if (fp->ff_symlinkptr == NULL) { | |
4703 | struct buf *bp = NULL; | |
4704 | ||
4705 | MALLOC(fp->ff_symlinkptr, char *, fp->ff_size, M_TEMP, M_WAITOK); | |
b0d623f7 A |
4706 | if (fp->ff_symlinkptr == NULL) { |
4707 | error = ENOMEM; | |
4708 | goto exit; | |
4709 | } | |
91447636 | 4710 | error = (int)buf_meta_bread(vp, (daddr64_t)0, |
593a1d5f | 4711 | roundup((int)fp->ff_size, VTOHFS(vp)->hfs_physical_block_size), |
91447636 A |
4712 | vfs_context_ucred(ap->a_context), &bp); |
4713 | if (error) { | |
9bccf70c | 4714 | if (bp) |
91447636 | 4715 | buf_brelse(bp); |
9bccf70c A |
4716 | if (fp->ff_symlinkptr) { |
4717 | FREE(fp->ff_symlinkptr, M_TEMP); | |
4718 | fp->ff_symlinkptr = NULL; | |
4719 | } | |
91447636 | 4720 | goto exit; |
9bccf70c | 4721 | } |
91447636 | 4722 | bcopy((char *)buf_dataptr(bp), fp->ff_symlinkptr, (size_t)fp->ff_size); |
9bccf70c | 4723 | |
91447636 A |
4724 | if (VTOHFS(vp)->jnl && (buf_flags(bp) & B_LOCKED) == 0) { |
4725 | buf_markinvalid(bp); /* data no longer needed */ | |
4726 | } | |
4727 | buf_brelse(bp); | |
55e303ae | 4728 | } |
91447636 | 4729 | error = uiomove((caddr_t)fp->ff_symlinkptr, (int)fp->ff_size, ap->a_uio); |
9bccf70c | 4730 | |
91447636 A |
4731 | /* |
4732 | * Keep track blocks read | |
4733 | */ | |
4734 | if ((VTOHFS(vp)->hfc_stage == HFC_RECORDING) && (error == 0)) { | |
4735 | ||
4736 | /* | |
4737 | * If this file hasn't been seen since the start of | |
4738 | * the current sampling period then start over. | |
4739 | */ | |
4740 | if (cp->c_atime < VTOHFS(vp)->hfc_timebase) | |
4741 | VTOF(vp)->ff_bytesread = fp->ff_size; | |
4742 | else | |
4743 | VTOF(vp)->ff_bytesread += fp->ff_size; | |
4744 | ||
4745 | // if (VTOF(vp)->ff_bytesread > fp->ff_size) | |
4746 | // cp->c_touch_acctime = TRUE; | |
4747 | } | |
9bccf70c | 4748 | |
91447636 A |
4749 | exit: |
4750 | hfs_unlock(cp); | |
4751 | return (error); | |
9bccf70c A |
4752 | } |
4753 | ||
4754 | ||
4755 | /* | |
91447636 A |
4756 | * Get configurable pathname variables. |
4757 | */ | |
6d2010ae | 4758 | int |
91447636 A |
4759 | hfs_vnop_pathconf(ap) |
4760 | struct vnop_pathconf_args /* { | |
9bccf70c A |
4761 | struct vnode *a_vp; |
4762 | int a_name; | |
4763 | int *a_retval; | |
91447636 | 4764 | vfs_context_t a_context; |
9bccf70c A |
4765 | } */ *ap; |
4766 | { | |
9bccf70c A |
4767 | switch (ap->a_name) { |
4768 | case _PC_LINK_MAX: | |
91447636 | 4769 | if (VTOHFS(ap->a_vp)->hfs_flags & HFS_STANDARD) |
9bccf70c | 4770 | *ap->a_retval = 1; |
91447636 A |
4771 | else |
4772 | *ap->a_retval = HFS_LINK_MAX; | |
9bccf70c A |
4773 | break; |
4774 | case _PC_NAME_MAX: | |
91447636 | 4775 | if (VTOHFS(ap->a_vp)->hfs_flags & HFS_STANDARD) |
6d2010ae | 4776 | *ap->a_retval = kHFSMaxFileNameChars; /* 31 */ |
91447636 | 4777 | else |
6d2010ae | 4778 | *ap->a_retval = kHFSPlusMaxFileNameChars; /* 255 */ |
9bccf70c A |
4779 | break; |
4780 | case _PC_PATH_MAX: | |
91447636 | 4781 | *ap->a_retval = PATH_MAX; /* 1024 */ |
9bccf70c | 4782 | break; |
55e303ae A |
4783 | case _PC_PIPE_BUF: |
4784 | *ap->a_retval = PIPE_BUF; | |
4785 | break; | |
9bccf70c | 4786 | case _PC_CHOWN_RESTRICTED: |
2d21ac55 | 4787 | *ap->a_retval = 200112; /* _POSIX_CHOWN_RESTRICTED */ |
9bccf70c A |
4788 | break; |
4789 | case _PC_NO_TRUNC: | |
2d21ac55 | 4790 | *ap->a_retval = 200112; /* _POSIX_NO_TRUNC */ |
9bccf70c A |
4791 | break; |
4792 | case _PC_NAME_CHARS_MAX: | |
6d2010ae A |
4793 | if (VTOHFS(ap->a_vp)->hfs_flags & HFS_STANDARD) |
4794 | *ap->a_retval = kHFSMaxFileNameChars; /* 31 */ | |
4795 | else | |
4796 | *ap->a_retval = kHFSPlusMaxFileNameChars; /* 255 */ | |
9bccf70c A |
4797 | break; |
4798 | case _PC_CASE_SENSITIVE: | |
55e303ae A |
4799 | if (VTOHFS(ap->a_vp)->hfs_flags & HFS_CASE_SENSITIVE) |
4800 | *ap->a_retval = 1; | |
4801 | else | |
4802 | *ap->a_retval = 0; | |
9bccf70c A |
4803 | break; |
4804 | case _PC_CASE_PRESERVING: | |
4805 | *ap->a_retval = 1; | |
4806 | break; | |
2d21ac55 | 4807 | case _PC_FILESIZEBITS: |
b0d623f7 A |
4808 | if (VTOHFS(ap->a_vp)->hfs_flags & HFS_STANDARD) |
4809 | *ap->a_retval = 32; | |
4810 | else | |
4811 | *ap->a_retval = 64; /* number of bits to store max file size */ | |
2d21ac55 | 4812 | break; |
6d2010ae A |
4813 | case _PC_XATTR_SIZE_BITS: |
4814 | /* Number of bits to store maximum extended attribute size */ | |
4815 | *ap->a_retval = HFS_XATTR_SIZE_BITS; | |
4816 | break; | |
9bccf70c | 4817 | default: |
55e303ae | 4818 | return (EINVAL); |
9bccf70c A |
4819 | } |
4820 | ||
91447636 | 4821 | return (0); |
9bccf70c A |
4822 | } |
4823 | ||
4824 | ||
9bccf70c | 4825 | /* |
91447636 A |
4826 | * Update a cnode's on-disk metadata. |
4827 | * | |
4828 | * If waitfor is set, then wait for the disk write of | |
4829 | * the node to complete. | |
4830 | * | |
4831 | * The cnode must be locked exclusive | |
9bccf70c | 4832 | */ |
91447636 A |
4833 | int |
4834 | hfs_update(struct vnode *vp, __unused int waitfor) | |
9bccf70c | 4835 | { |
91447636 | 4836 | struct cnode *cp = VTOC(vp); |
9bccf70c A |
4837 | struct proc *p; |
4838 | struct cat_fork *dataforkp = NULL; | |
4839 | struct cat_fork *rsrcforkp = NULL; | |
4840 | struct cat_fork datafork; | |
4a3eedf9 | 4841 | struct cat_fork rsrcfork; |
b4c24cb9 | 4842 | struct hfsmount *hfsmp; |
91447636 | 4843 | int lockflags; |
9bccf70c A |
4844 | int error; |
4845 | ||
91447636 | 4846 | p = current_proc(); |
b4c24cb9 A |
4847 | hfsmp = VTOHFS(vp); |
4848 | ||
2d21ac55 A |
4849 | if (((vnode_issystem(vp) && (cp->c_cnid < kHFSFirstUserCatalogNodeID))) || |
4850 | hfsmp->hfs_catalog_vp == NULL){ | |
91447636 A |
4851 | return (0); |
4852 | } | |
4853 | if ((hfsmp->hfs_flags & HFS_READ_ONLY) || (cp->c_mode == 0)) { | |
4854 | cp->c_flag &= ~C_MODIFIED; | |
4855 | cp->c_touch_acctime = 0; | |
4856 | cp->c_touch_chgtime = 0; | |
4857 | cp->c_touch_modtime = 0; | |
9bccf70c A |
4858 | return (0); |
4859 | } | |
4860 | ||
91447636 | 4861 | hfs_touchtimes(hfsmp, cp); |
9bccf70c A |
4862 | |
4863 | /* Nothing to update. */ | |
91447636 | 4864 | if ((cp->c_flag & (C_MODIFIED | C_FORCEUPDATE)) == 0) { |
9bccf70c | 4865 | return (0); |
b4c24cb9 | 4866 | } |
9bccf70c A |
4867 | |
4868 | if (cp->c_datafork) | |
4869 | dataforkp = &cp->c_datafork->ff_data; | |
4870 | if (cp->c_rsrcfork) | |
4871 | rsrcforkp = &cp->c_rsrcfork->ff_data; | |
4872 | ||
9bccf70c A |
4873 | /* |
4874 | * For delayed allocations updates are | |
4875 | * postponed until an fsync or the file | |
4876 | * gets written to disk. | |
4877 | * | |
4878 | * Deleted files can defer meta data updates until inactive. | |
55e303ae A |
4879 | * |
4880 | * If we're ever called with the C_FORCEUPDATE flag though | |
4881 | * we have to do the update. | |
9bccf70c | 4882 | */ |
55e303ae | 4883 | if (ISSET(cp->c_flag, C_FORCEUPDATE) == 0 && |
2d21ac55 | 4884 | (ISSET(cp->c_flag, C_DELETED) || |
9bccf70c | 4885 | (dataforkp && cp->c_datafork->ff_unallocblocks) || |
55e303ae | 4886 | (rsrcforkp && cp->c_rsrcfork->ff_unallocblocks))) { |
91447636 | 4887 | // cp->c_flag &= ~(C_ACCESS | C_CHANGE | C_UPDATE); |
9bccf70c | 4888 | cp->c_flag |= C_MODIFIED; |
b4c24cb9 | 4889 | |
9bccf70c A |
4890 | return (0); |
4891 | } | |
4892 | ||
91447636 A |
4893 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
4894 | return error; | |
b4c24cb9 | 4895 | } |
b4c24cb9 | 4896 | |
316670eb A |
4897 | /* |
4898 | * Modify the values passed to cat_update based on whether or not | |
4899 | * the file has invalid ranges or borrowed blocks. | |
4900 | */ | |
4901 | if (dataforkp) { | |
4902 | off_t numbytes = 0; | |
4903 | ||
4904 | /* copy the datafork into a temporary copy so we don't pollute the cnode's */ | |
4905 | bcopy(dataforkp, &datafork, sizeof(datafork)); | |
4906 | dataforkp = &datafork; | |
4907 | ||
4908 | /* | |
4909 | * If there are borrowed blocks, ensure that they are subtracted | |
4910 | * from the total block count before writing the cnode entry to disk. | |
4911 | * Only extents that have actually been marked allocated in the bitmap | |
4912 | * should be reflected in the total block count for this fork. | |
4913 | */ | |
4914 | if (cp->c_datafork->ff_unallocblocks != 0) { | |
4915 | // make sure that we don't assign a negative block count | |
4916 | if (cp->c_datafork->ff_blocks < cp->c_datafork->ff_unallocblocks) { | |
4917 | panic("hfs: ff_blocks %d is less than unalloc blocks %d\n", | |
4918 | cp->c_datafork->ff_blocks, cp->c_datafork->ff_unallocblocks); | |
4919 | } | |
4920 | ||
4921 | /* Also cap the LEOF to the total number of bytes that are allocated. */ | |
4922 | datafork.cf_blocks = (cp->c_datafork->ff_blocks - cp->c_datafork->ff_unallocblocks); | |
4923 | datafork.cf_size = datafork.cf_blocks * HFSTOVCB(hfsmp)->blockSize; | |
4924 | } | |
4925 | ||
4926 | /* | |
4927 | * For files with invalid ranges (holes) the on-disk | |
4928 | * field representing the size of the file (cf_size) | |
4929 | * must be no larger than the start of the first hole. | |
4930 | * However, note that if the first invalid range exists | |
4931 | * solely within borrowed blocks, then our LEOF and block | |
4932 | * count should both be zero. As a result, set it to the | |
4933 | * min of the current cf_size and the start of the first | |
4934 | * invalid range, because it may have already been reduced | |
4935 | * to zero by the borrowed blocks check above. | |
4936 | */ | |
4937 | if (!TAILQ_EMPTY(&cp->c_datafork->ff_invalidranges)) { | |
4938 | numbytes = TAILQ_FIRST(&cp->c_datafork->ff_invalidranges)->rl_start; | |
4939 | datafork.cf_size = MIN((numbytes), (datafork.cf_size)); | |
4940 | } | |
4941 | } | |
4942 | ||
4a3eedf9 A |
4943 | /* |
4944 | * For resource forks with delayed allocations, make sure | |
4945 | * the block count and file size match the number of blocks | |
4946 | * actually allocated to the file on disk. | |
4947 | */ | |
4948 | if (rsrcforkp && (cp->c_rsrcfork->ff_unallocblocks != 0)) { | |
4949 | bcopy(rsrcforkp, &rsrcfork, sizeof(rsrcfork)); | |
4950 | rsrcfork.cf_blocks = (cp->c_rsrcfork->ff_blocks - cp->c_rsrcfork->ff_unallocblocks); | |
4951 | rsrcfork.cf_size = rsrcfork.cf_blocks * HFSTOVCB(hfsmp)->blockSize; | |
4952 | rsrcforkp = &rsrcfork; | |
4953 | } | |
4954 | ||
9bccf70c A |
4955 | /* |
4956 | * Lock the Catalog b-tree file. | |
9bccf70c | 4957 | */ |
2d21ac55 | 4958 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_EXCLUSIVE_LOCK); |
9bccf70c A |
4959 | |
4960 | /* XXX - waitfor is not enforced */ | |
b4c24cb9 | 4961 | error = cat_update(hfsmp, &cp->c_desc, &cp->c_attr, dataforkp, rsrcforkp); |
9bccf70c | 4962 | |
91447636 | 4963 | hfs_systemfile_unlock(hfsmp, lockflags); |
b4c24cb9 | 4964 | |
55e303ae | 4965 | /* After the updates are finished, clear the flags */ |
91447636 | 4966 | cp->c_flag &= ~(C_MODIFIED | C_FORCEUPDATE); |
55e303ae | 4967 | |
91447636 | 4968 | hfs_end_transaction(hfsmp); |
9bccf70c | 4969 | |
9bccf70c A |
4970 | return (error); |
4971 | } | |
4972 | ||
4973 | /* | |
4974 | * Allocate a new node | |
2d21ac55 | 4975 | * Note - Function does not create and return a vnode for whiteout creation. |
9bccf70c | 4976 | */ |
6d2010ae | 4977 | int |
91447636 A |
4978 | hfs_makenode(struct vnode *dvp, struct vnode **vpp, struct componentname *cnp, |
4979 | struct vnode_attr *vap, vfs_context_t ctx) | |
9bccf70c | 4980 | { |
91447636 | 4981 | struct cnode *cp = NULL; |
b0d623f7 | 4982 | struct cnode *dcp = NULL; |
9bccf70c A |
4983 | struct vnode *tvp; |
4984 | struct hfsmount *hfsmp; | |
9bccf70c A |
4985 | struct cat_desc in_desc, out_desc; |
4986 | struct cat_attr attr; | |
91447636 | 4987 | struct timeval tv; |
91447636 | 4988 | int lockflags; |
2d21ac55 | 4989 | int error, started_tr = 0; |
9bccf70c | 4990 | enum vtype vnodetype; |
91447636 | 4991 | int mode; |
6d2010ae | 4992 | int newvnode_flags = 0; |
6d2010ae | 4993 | u_int32_t gnv_flags = 0; |
316670eb A |
4994 | int protectable_target = 0; |
4995 | ||
4996 | #if CONFIG_PROTECT | |
4997 | struct cprotect *entry = NULL; | |
4998 | uint32_t cp_class = 0; | |
4999 | if (VATTR_IS_ACTIVE(vap, va_dataprotect_class)) { | |
5000 | cp_class = vap->va_dataprotect_class; | |
5001 | } | |
5002 | int protected_mount = 0; | |
5003 | #endif | |
5004 | ||
9bccf70c | 5005 | |
b0d623f7 | 5006 | if ((error = hfs_lock(VTOC(dvp), HFS_EXCLUSIVE_LOCK))) |
2d21ac55 A |
5007 | return (error); |
5008 | ||
b0d623f7 A |
5009 | /* set the cnode pointer only after successfully acquiring lock */ |
5010 | dcp = VTOC(dvp); | |
6d2010ae | 5011 | |
0b4c1975 | 5012 | /* Don't allow creation of new entries in open-unlinked directories */ |
6d2010ae A |
5013 | if ((error = hfs_checkdeleted(dcp))) { |
5014 | hfs_unlock(dcp); | |
0b4c1975 A |
5015 | return error; |
5016 | } | |
5017 | ||
2d21ac55 | 5018 | dcp->c_flag |= C_DIR_MODIFICATION; |
316670eb | 5019 | |
9bccf70c | 5020 | hfsmp = VTOHFS(dvp); |
316670eb | 5021 | |
9bccf70c A |
5022 | *vpp = NULL; |
5023 | tvp = NULL; | |
91447636 A |
5024 | out_desc.cd_flags = 0; |
5025 | out_desc.cd_nameptr = NULL; | |
5026 | ||
2d21ac55 A |
5027 | vnodetype = vap->va_type; |
5028 | if (vnodetype == VNON) | |
5029 | vnodetype = VREG; | |
5030 | mode = MAKEIMODE(vnodetype, vap->va_mode); | |
9bccf70c | 5031 | |
316670eb A |
5032 | if (S_ISDIR (mode) || S_ISREG (mode)) { |
5033 | protectable_target = 1; | |
6d2010ae | 5034 | } |
6d2010ae | 5035 | |
316670eb | 5036 | |
9bccf70c | 5037 | /* Check if were out of usable disk space. */ |
2d21ac55 | 5038 | if ((hfs_freeblks(hfsmp, 1) == 0) && (vfs_context_suser(ctx) != 0)) { |
9bccf70c A |
5039 | error = ENOSPC; |
5040 | goto exit; | |
5041 | } | |
5042 | ||
91447636 A |
5043 | microtime(&tv); |
5044 | ||
9bccf70c A |
5045 | /* Setup the default attributes */ |
5046 | bzero(&attr, sizeof(attr)); | |
5047 | attr.ca_mode = mode; | |
2d21ac55 A |
5048 | attr.ca_linkcount = 1; |
5049 | if (VATTR_IS_ACTIVE(vap, va_rdev)) { | |
5050 | attr.ca_rdev = vap->va_rdev; | |
5051 | } | |
5052 | if (VATTR_IS_ACTIVE(vap, va_create_time)) { | |
5053 | VATTR_SET_SUPPORTED(vap, va_create_time); | |
5054 | attr.ca_itime = vap->va_create_time.tv_sec; | |
5055 | } else { | |
5056 | attr.ca_itime = tv.tv_sec; | |
5057 | } | |
5058 | if ((hfsmp->hfs_flags & HFS_STANDARD) && gTimeZone.tz_dsttime) { | |
5059 | attr.ca_itime += 3600; /* Same as what hfs_update does */ | |
9bccf70c | 5060 | } |
2d21ac55 | 5061 | attr.ca_atime = attr.ca_ctime = attr.ca_mtime = attr.ca_itime; |
91447636 | 5062 | attr.ca_atimeondisk = attr.ca_atime; |
2d21ac55 A |
5063 | if (VATTR_IS_ACTIVE(vap, va_flags)) { |
5064 | VATTR_SET_SUPPORTED(vap, va_flags); | |
5065 | attr.ca_flags = vap->va_flags; | |
5066 | } | |
316670eb | 5067 | |
2d21ac55 A |
5068 | /* |
5069 | * HFS+ only: all files get ThreadExists | |
5070 | * HFSX only: dirs get HasFolderCount | |
5071 | */ | |
5072 | if (!(hfsmp->hfs_flags & HFS_STANDARD)) { | |
5073 | if (vnodetype == VDIR) { | |
5074 | if (hfsmp->hfs_flags & HFS_FOLDERCOUNT) | |
5075 | attr.ca_recflags = kHFSHasFolderCountMask; | |
5076 | } else { | |
5077 | attr.ca_recflags = kHFSThreadExistsMask; | |
5078 | } | |
5079 | } | |
91447636 | 5080 | |
316670eb A |
5081 | #if CONFIG_PROTECT |
5082 | if (cp_fs_protected(hfsmp->hfs_mp)) { | |
5083 | protected_mount = 1; | |
5084 | } | |
5085 | /* | |
5086 | * On a content-protected HFS+/HFSX filesystem, files and directories | |
5087 | * cannot be created without atomically setting/creating the EA that | |
5088 | * contains the protection class metadata and keys at the same time, in | |
5089 | * the same transaction. As a result, pre-set the "EAs exist" flag | |
5090 | * on the cat_attr for protectable catalog record creations. This will | |
5091 | * cause the cnode creation routine in hfs_getnewvnode to mark the cnode | |
5092 | * as having EAs. | |
5093 | */ | |
5094 | if ((protected_mount) && (protectable_target)) { | |
5095 | attr.ca_recflags |= kHFSHasAttributesMask; | |
5096 | } | |
5097 | #endif | |
5098 | ||
5099 | ||
5100 | /* | |
5101 | * Add the date added to the item. See above, as | |
5102 | * all of the dates are set to the itime. | |
5103 | */ | |
6d2010ae A |
5104 | hfs_write_dateadded (&attr, attr.ca_atime); |
5105 | ||
91447636 A |
5106 | attr.ca_uid = vap->va_uid; |
5107 | attr.ca_gid = vap->va_gid; | |
5108 | VATTR_SET_SUPPORTED(vap, va_mode); | |
5109 | VATTR_SET_SUPPORTED(vap, va_uid); | |
5110 | VATTR_SET_SUPPORTED(vap, va_gid); | |
9bccf70c | 5111 | |
b0d623f7 A |
5112 | #if QUOTA |
5113 | /* check to see if this node's creation would cause us to go over | |
5114 | * quota. If so, abort this operation. | |
5115 | */ | |
5116 | if (hfsmp->hfs_flags & HFS_QUOTAS) { | |
5117 | if ((error = hfs_quotacheck(hfsmp, 1, attr.ca_uid, attr.ca_gid, | |
5118 | vfs_context_ucred(ctx)))) { | |
5119 | goto exit; | |
5120 | } | |
5121 | } | |
5122 | #endif | |
5123 | ||
5124 | ||
9bccf70c A |
5125 | /* Tag symlinks with a type and creator. */ |
5126 | if (vnodetype == VLNK) { | |
5127 | struct FndrFileInfo *fip; | |
5128 | ||
5129 | fip = (struct FndrFileInfo *)&attr.ca_finderinfo; | |
5130 | fip->fdType = SWAP_BE32(kSymLinkFileType); | |
5131 | fip->fdCreator = SWAP_BE32(kSymLinkCreator); | |
5132 | } | |
9bccf70c A |
5133 | if (cnp->cn_flags & ISWHITEOUT) |
5134 | attr.ca_flags |= UF_OPAQUE; | |
5135 | ||
5136 | /* Setup the descriptor */ | |
2d21ac55 | 5137 | in_desc.cd_nameptr = (const u_int8_t *)cnp->cn_nameptr; |
9bccf70c | 5138 | in_desc.cd_namelen = cnp->cn_namelen; |
2d21ac55 | 5139 | in_desc.cd_parentcnid = dcp->c_fileid; |
9bccf70c | 5140 | in_desc.cd_flags = S_ISDIR(mode) ? CD_ISDIR : 0; |
91447636 A |
5141 | in_desc.cd_hint = dcp->c_childhint; |
5142 | in_desc.cd_encoding = 0; | |
9bccf70c | 5143 | |
316670eb A |
5144 | #if CONFIG_PROTECT |
5145 | /* | |
5146 | * To preserve file creation atomicity with regards to the content protection EA, | |
5147 | * we must create the file in the catalog and then write out the EA in the same | |
5148 | * transaction. Pre-flight any operations that we can (such as allocating/preparing | |
5149 | * the buffer, wrapping the keys) before we start the txn and take the requisite | |
5150 | * b-tree locks. We pass '0' as the fileid because we do not know it yet. | |
5151 | */ | |
5152 | if ((protected_mount) && (protectable_target)) { | |
5153 | error = cp_entry_create_keys (&entry, dcp, hfsmp, cp_class, 0, attr.ca_mode); | |
5154 | if (error) { | |
5155 | goto exit; | |
5156 | } | |
5157 | } | |
5158 | #endif | |
5159 | ||
91447636 A |
5160 | if ((error = hfs_start_transaction(hfsmp)) != 0) { |
5161 | goto exit; | |
b4c24cb9 | 5162 | } |
91447636 | 5163 | started_tr = 1; |
b4c24cb9 | 5164 | |
2d21ac55 A |
5165 | // have to also lock the attribute file because cat_create() needs |
5166 | // to check that any fileID it wants to use does not have orphaned | |
5167 | // attributes in it. | |
5168 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG | SFL_ATTRIBUTE, HFS_EXCLUSIVE_LOCK); | |
5169 | ||
5170 | /* Reserve some space in the Catalog file. */ | |
5171 | if ((error = cat_preflight(hfsmp, CAT_CREATE, NULL, 0))) { | |
5172 | hfs_systemfile_unlock(hfsmp, lockflags); | |
55e303ae A |
5173 | goto exit; |
5174 | } | |
9bccf70c | 5175 | error = cat_create(hfsmp, &in_desc, &attr, &out_desc); |
91447636 A |
5176 | if (error == 0) { |
5177 | /* Update the parent directory */ | |
5178 | dcp->c_childhint = out_desc.cd_hint; /* Cache directory's location */ | |
91447636 | 5179 | dcp->c_entries++; |
2d21ac55 A |
5180 | if (vnodetype == VDIR) { |
5181 | INC_FOLDERCOUNT(hfsmp, dcp->c_attr); | |
5182 | } | |
5183 | dcp->c_dirchangecnt++; | |
91447636 A |
5184 | dcp->c_ctime = tv.tv_sec; |
5185 | dcp->c_mtime = tv.tv_sec; | |
5186 | (void) cat_update(hfsmp, &dcp->c_desc, &dcp->c_attr, NULL, NULL); | |
316670eb A |
5187 | |
5188 | #if CONFIG_PROTECT | |
5189 | /* | |
5190 | * If we are creating a content protected file, now is when | |
5191 | * we create the EA. We must create it in the same transaction | |
5192 | * that creates the file. We can also guarantee that the file | |
5193 | * MUST exist because we are still holding the catalog lock | |
5194 | * at this point. | |
5195 | */ | |
5196 | if ((attr.ca_fileid != 0) && (protected_mount) && (protectable_target)) { | |
5197 | error = cp_setxattr (NULL, entry, hfsmp, attr.ca_fileid, XATTR_CREATE); | |
5198 | ||
5199 | if (error) { | |
5200 | int delete_err; | |
5201 | /* | |
5202 | * If we fail the EA creation, then we need to delete the file. | |
5203 | * Luckily, we are still holding all of the right locks. | |
5204 | */ | |
5205 | delete_err = cat_delete (hfsmp, &out_desc, &attr); | |
5206 | if (delete_err == 0) { | |
5207 | /* Update the parent directory */ | |
5208 | if (dcp->c_entries > 0) | |
5209 | dcp->c_entries--; | |
5210 | dcp->c_dirchangecnt++; | |
5211 | dcp->c_ctime = tv.tv_sec; | |
5212 | dcp->c_mtime = tv.tv_sec; | |
5213 | (void) cat_update(hfsmp, &dcp->c_desc, &dcp->c_attr, NULL, NULL); | |
5214 | } | |
5215 | ||
5216 | /* Emit EINVAL if we fail to create EA*/ | |
5217 | error = EINVAL; | |
5218 | } | |
5219 | } | |
5220 | #endif | |
91447636 A |
5221 | } |
5222 | hfs_systemfile_unlock(hfsmp, lockflags); | |
9bccf70c A |
5223 | if (error) |
5224 | goto exit; | |
5225 | ||
91447636 | 5226 | /* Invalidate negative cache entries in the directory */ |
2d21ac55 | 5227 | if (dcp->c_flag & C_NEG_ENTRIES) { |
91447636 | 5228 | cache_purge_negatives(dvp); |
2d21ac55 A |
5229 | dcp->c_flag &= ~C_NEG_ENTRIES; |
5230 | } | |
91447636 | 5231 | |
9bccf70c A |
5232 | hfs_volupdate(hfsmp, vnodetype == VDIR ? VOL_MKDIR : VOL_MKFILE, |
5233 | (dcp->c_cnid == kHFSRootFolderID)); | |
5234 | ||
b4c24cb9 A |
5235 | // XXXdbg |
5236 | // have to end the transaction here before we call hfs_getnewvnode() | |
5237 | // because that can cause us to try and reclaim a vnode on a different | |
5238 | // file system which could cause us to start a transaction which can | |
5239 | // deadlock with someone on that other file system (since we could be | |
5240 | // holding two transaction locks as well as various vnodes and we did | |
5241 | // not obtain the locks on them in the proper order). | |
91447636 | 5242 | // |
b4c24cb9 A |
5243 | // NOTE: this means that if the quota check fails or we have to update |
5244 | // the change time on a block-special device that those changes | |
5245 | // will happen as part of independent transactions. | |
5246 | // | |
5247 | if (started_tr) { | |
91447636 A |
5248 | hfs_end_transaction(hfsmp); |
5249 | started_tr = 0; | |
b4c24cb9 A |
5250 | } |
5251 | ||
316670eb A |
5252 | #if CONFIG_PROTECT |
5253 | /* | |
5254 | * At this point, we must have encountered success with writing the EA. | |
5255 | * Update MKB with the data for the cached key, then destroy it. This may | |
5256 | * prevent information leakage by ensuring the cache key is only unwrapped | |
5257 | * to perform file I/O and it is allowed. | |
5258 | */ | |
5259 | ||
5260 | if ((attr.ca_fileid != 0) && (protected_mount) && (protectable_target)) { | |
5261 | cp_update_mkb (entry, attr.ca_fileid); | |
5262 | cp_entry_destroy (&entry); | |
5263 | } | |
5264 | #endif | |
5265 | ||
2d21ac55 A |
5266 | /* Do not create vnode for whiteouts */ |
5267 | if (S_ISWHT(mode)) { | |
5268 | goto exit; | |
6d2010ae A |
5269 | } |
5270 | ||
5271 | gnv_flags |= GNV_CREATE; | |
2d21ac55 | 5272 | |
91447636 A |
5273 | /* |
5274 | * Create a vnode for the object just created. | |
b0d623f7 | 5275 | * |
7e4a7d39 A |
5276 | * NOTE: Maintaining the cnode lock on the parent directory is important, |
5277 | * as it prevents race conditions where other threads want to look up entries | |
5278 | * in the directory and/or add things as we are in the process of creating | |
5279 | * the vnode below. However, this has the potential for causing a | |
5280 | * double lock panic when dealing with shadow files on a HFS boot partition. | |
5281 | * The panic could occur if we are not cleaning up after ourselves properly | |
5282 | * when done with a shadow file or in the error cases. The error would occur if we | |
5283 | * try to create a new vnode, and then end up reclaiming another shadow vnode to | |
5284 | * create the new one. However, if everything is working properly, this should | |
5285 | * be a non-issue as we would never enter that reclaim codepath. | |
6d2010ae | 5286 | * |
91447636 A |
5287 | * The cnode is locked on successful return. |
5288 | */ | |
6d2010ae A |
5289 | error = hfs_getnewvnode(hfsmp, dvp, cnp, &out_desc, gnv_flags, &attr, |
5290 | NULL, &tvp, &newvnode_flags); | |
9bccf70c A |
5291 | if (error) |
5292 | goto exit; | |
5293 | ||
9bccf70c | 5294 | cp = VTOC(tvp); |
9bccf70c | 5295 | *vpp = tvp; |
6d2010ae | 5296 | |
6d2010ae A |
5297 | #if QUOTA |
5298 | /* | |
5299 | * Once we create this vnode, we need to initialize its quota data | |
5300 | * structures, if necessary. We know that it is OK to just go ahead and | |
5301 | * initialize because we've already validated earlier (through the hfs_quotacheck | |
5302 | * function) to see if creating this cnode/vnode would cause us to go over quota. | |
5303 | */ | |
5304 | if (hfsmp->hfs_flags & HFS_QUOTAS) { | |
5305 | (void) hfs_getinoquota(cp); | |
5306 | } | |
5307 | #endif | |
5308 | ||
9bccf70c A |
5309 | exit: |
5310 | cat_releasedesc(&out_desc); | |
b0d623f7 | 5311 | |
316670eb A |
5312 | #if CONFIG_PROTECT |
5313 | /* | |
5314 | * We may have jumped here in error-handling various situations above. | |
5315 | * If we haven't already dumped the temporary CP used to initialize | |
5316 | * the file atomically, then free it now. cp_entry_destroy should null | |
5317 | * out the pointer if it was called already. | |
5318 | */ | |
5319 | if (entry) { | |
5320 | cp_entry_destroy (&entry); | |
5321 | } | |
5322 | #endif | |
5323 | ||
90556fb8 | 5324 | /* |
7e4a7d39 | 5325 | * Make sure we release cnode lock on dcp. |
90556fb8 | 5326 | */ |
b0d623f7 | 5327 | if (dcp) { |
2d21ac55 A |
5328 | dcp->c_flag &= ~C_DIR_MODIFICATION; |
5329 | wakeup((caddr_t)&dcp->c_flag); | |
5330 | ||
91447636 A |
5331 | hfs_unlock(dcp); |
5332 | } | |
5333 | if (error == 0 && cp != NULL) { | |
5334 | hfs_unlock(cp); | |
b4c24cb9 | 5335 | } |
91447636 A |
5336 | if (started_tr) { |
5337 | hfs_end_transaction(hfsmp); | |
5338 | started_tr = 0; | |
b4c24cb9 A |
5339 | } |
5340 | ||
9bccf70c A |
5341 | return (error); |
5342 | } | |
5343 | ||
5344 | ||
6d2010ae A |
5345 | /* |
5346 | * hfs_vgetrsrc acquires a resource fork vnode corresponding to the cnode that is | |
b7266188 A |
5347 | * found in 'vp'. The rsrc fork vnode is returned with the cnode locked and iocount |
5348 | * on the rsrc vnode. | |
5349 | * | |
5350 | * *rvpp is an output argument for returning the pointer to the resource fork vnode. | |
5351 | * In most cases, the resource fork vnode will not be set if we return an error. | |
5352 | * However, if error_on_unlinked is set, we may have already acquired the resource fork vnode | |
5353 | * before we discover the error (the file has gone open-unlinked). In this case only, | |
5354 | * we may return a vnode in the output argument despite an error. | |
5355 | * | |
5356 | * If can_drop_lock is set, then it is safe for this function to temporarily drop | |
5357 | * and then re-acquire the cnode lock. We may need to do this, for example, in order to | |
5358 | * acquire an iocount or promote our lock. | |
5359 | * | |
5360 | * error_on_unlinked is an argument which indicates that we are to return an error if we | |
5361 | * discover that the cnode has gone into an open-unlinked state ( C_DELETED or C_NOEXISTS) | |
5362 | * is set in the cnode flags. This is only necessary if can_drop_lock is true, otherwise | |
5363 | * there's really no reason to double-check for errors on the cnode. | |
91447636 | 5364 | */ |
b7266188 | 5365 | |
91447636 | 5366 | int |
6d2010ae A |
5367 | hfs_vgetrsrc(struct hfsmount *hfsmp, struct vnode *vp, struct vnode **rvpp, |
5368 | int can_drop_lock, int error_on_unlinked) | |
9bccf70c A |
5369 | { |
5370 | struct vnode *rvp; | |
cf7d32b8 | 5371 | struct vnode *dvp = NULLVP; |
9bccf70c A |
5372 | struct cnode *cp = VTOC(vp); |
5373 | int error; | |
91447636 | 5374 | int vid; |
b7266188 A |
5375 | int delete_status = 0; |
5376 | ||
6d2010ae A |
5377 | if (vnode_vtype(vp) == VDIR) { |
5378 | return EINVAL; | |
5379 | } | |
5380 | ||
b7266188 | 5381 | /* |
6d2010ae A |
5382 | * Need to check the status of the cnode to validate it hasn't gone |
5383 | * open-unlinked on us before we can actually do work with it. | |
b7266188 | 5384 | */ |
6d2010ae | 5385 | delete_status = hfs_checkdeleted(cp); |
b7266188 A |
5386 | if ((delete_status) && (error_on_unlinked)) { |
5387 | return delete_status; | |
5388 | } | |
9bccf70c | 5389 | |
4a3eedf9 | 5390 | restart: |
6d2010ae | 5391 | /* Attempt to use existing vnode */ |
9bccf70c | 5392 | if ((rvp = cp->c_rsrc_vp)) { |
91447636 A |
5393 | vid = vnode_vid(rvp); |
5394 | ||
2d21ac55 A |
5395 | /* |
5396 | * It is not safe to hold the cnode lock when calling vnode_getwithvid() | |
5397 | * for the alternate fork -- vnode_getwithvid() could deadlock waiting | |
5398 | * for a VL_WANTTERM while another thread has an iocount on the alternate | |
5399 | * fork vnode and is attempting to acquire the common cnode lock. | |
5400 | * | |
5401 | * But it's also not safe to drop the cnode lock when we're holding | |
5402 | * multiple cnode locks, like during a hfs_removefile() operation | |
5403 | * since we could lock out of order when re-acquiring the cnode lock. | |
5404 | * | |
5405 | * So we can only drop the lock here if its safe to drop it -- which is | |
5406 | * most of the time with the exception being hfs_removefile(). | |
5407 | */ | |
5408 | if (can_drop_lock) | |
5409 | hfs_unlock(cp); | |
5410 | ||
91447636 | 5411 | error = vnode_getwithvid(rvp, vid); |
2d21ac55 | 5412 | |
4a3eedf9 | 5413 | if (can_drop_lock) { |
2d21ac55 | 5414 | (void) hfs_lock(cp, HFS_FORCE_LOCK); |
b7266188 A |
5415 | |
5416 | /* | |
5417 | * When we relinquished our cnode lock, the cnode could have raced | |
5418 | * with a delete and gotten deleted. If the caller did not want | |
5419 | * us to ignore open-unlinked files, then re-check the C_DELETED | |
5420 | * state and see if we need to return an ENOENT here because the item | |
5421 | * got deleted in the intervening time. | |
5422 | */ | |
5423 | if (error_on_unlinked) { | |
5424 | if ((delete_status = hfs_checkdeleted(cp))) { | |
5425 | /* | |
5426 | * If error == 0, this means that we succeeded in acquiring an iocount on the | |
6d2010ae A |
5427 | * rsrc fork vnode. However, if we're in this block of code, that means that we noticed |
5428 | * that the cnode has gone open-unlinked. In this case, the caller requested that we | |
5429 | * not do any other work and return an errno. The caller will be responsible for | |
5430 | * dropping the iocount we just acquired because we can't do it until we've released | |
b7266188 A |
5431 | * the cnode lock. |
5432 | */ | |
5433 | if (error == 0) { | |
5434 | *rvpp = rvp; | |
5435 | } | |
5436 | return delete_status; | |
5437 | } | |
5438 | } | |
5439 | ||
4a3eedf9 A |
5440 | /* |
5441 | * When our lock was relinquished, the resource fork | |
5442 | * could have been recycled. Check for this and try | |
5443 | * again. | |
5444 | */ | |
5445 | if (error == ENOENT) | |
5446 | goto restart; | |
5447 | } | |
9bccf70c | 5448 | if (error) { |
2d21ac55 | 5449 | const char * name = (const char *)VTOC(vp)->c_desc.cd_nameptr; |
9bccf70c A |
5450 | |
5451 | if (name) | |
4a3eedf9 A |
5452 | printf("hfs_vgetrsrc: couldn't get resource" |
5453 | " fork for %s, err %d\n", name, error); | |
9bccf70c A |
5454 | return (error); |
5455 | } | |
5456 | } else { | |
5457 | struct cat_fork rsrcfork; | |
91447636 | 5458 | struct componentname cn; |
b0d623f7 A |
5459 | struct cat_desc *descptr = NULL; |
5460 | struct cat_desc to_desc; | |
5461 | char delname[32]; | |
91447636 | 5462 | int lockflags; |
6d2010ae A |
5463 | int newvnode_flags = 0; |
5464 | ||
743b1565 A |
5465 | /* |
5466 | * Make sure cnode lock is exclusive, if not upgrade it. | |
5467 | * | |
5468 | * We assume that we were called from a read-only VNOP (getattr) | |
5469 | * and that its safe to have the cnode lock dropped and reacquired. | |
5470 | */ | |
5471 | if (cp->c_lockowner != current_thread()) { | |
b0d623f7 | 5472 | if (!can_drop_lock) { |
2d21ac55 | 5473 | return (EINVAL); |
b0d623f7 | 5474 | } |
743b1565 | 5475 | /* |
b7266188 | 5476 | * If the upgrade fails we lose the lock and |
743b1565 A |
5477 | * have to take the exclusive lock on our own. |
5478 | */ | |
2d21ac55 | 5479 | if (lck_rw_lock_shared_to_exclusive(&cp->c_rwlock) == FALSE) |
743b1565 A |
5480 | lck_rw_lock_exclusive(&cp->c_rwlock); |
5481 | cp->c_lockowner = current_thread(); | |
5482 | } | |
5483 | ||
b0d623f7 A |
5484 | /* |
5485 | * hfs_vgetsrc may be invoked for a cnode that has already been marked | |
5486 | * C_DELETED. This is because we need to continue to provide rsrc | |
5487 | * fork access to open-unlinked files. In this case, build a fake descriptor | |
5488 | * like in hfs_removefile. If we don't do this, buildkey will fail in | |
b7266188 A |
5489 | * cat_lookup because this cnode has no name in its descriptor. However, |
5490 | * only do this if the caller did not specify that they wanted us to | |
5491 | * error out upon encountering open-unlinked files. | |
b0d623f7 A |
5492 | */ |
5493 | ||
b7266188 | 5494 | if ((error_on_unlinked) && (can_drop_lock)) { |
6d2010ae | 5495 | if ((error = hfs_checkdeleted(cp))) { |
b7266188 A |
5496 | return error; |
5497 | } | |
5498 | } | |
5499 | ||
b0d623f7 A |
5500 | if ((cp->c_flag & C_DELETED ) && (cp->c_desc.cd_namelen == 0)) { |
5501 | bzero (&to_desc, sizeof(to_desc)); | |
5502 | bzero (delname, 32); | |
5503 | MAKE_DELETED_NAME(delname, sizeof(delname), cp->c_fileid); | |
5504 | to_desc.cd_nameptr = (const u_int8_t*) delname; | |
5505 | to_desc.cd_namelen = strlen(delname); | |
5506 | to_desc.cd_parentcnid = hfsmp->hfs_private_desc[FILE_HARDLINKS].cd_cnid; | |
5507 | to_desc.cd_flags = 0; | |
5508 | to_desc.cd_cnid = cp->c_cnid; | |
5509 | ||
5510 | descptr = &to_desc; | |
5511 | } | |
5512 | else { | |
5513 | descptr = &cp->c_desc; | |
5514 | } | |
5515 | ||
5516 | ||
91447636 | 5517 | lockflags = hfs_systemfile_lock(hfsmp, SFL_CATALOG, HFS_SHARED_LOCK); |
9bccf70c A |
5518 | |
5519 | /* Get resource fork data */ | |
b0d623f7 | 5520 | error = cat_lookup(hfsmp, descptr, 1, (struct cat_desc *)0, |
91447636 | 5521 | (struct cat_attr *)0, &rsrcfork, NULL); |
9bccf70c | 5522 | |
91447636 | 5523 | hfs_systemfile_unlock(hfsmp, lockflags); |
b0d623f7 | 5524 | if (error) { |
9bccf70c | 5525 | return (error); |
b0d623f7 | 5526 | } |
91447636 A |
5527 | /* |
5528 | * Supply hfs_getnewvnode with a component name. | |
5529 | */ | |
5530 | cn.cn_pnbuf = NULL; | |
b0d623f7 | 5531 | if (descptr->cd_nameptr) { |
91447636 A |
5532 | MALLOC_ZONE(cn.cn_pnbuf, caddr_t, MAXPATHLEN, M_NAMEI, M_WAITOK); |
5533 | cn.cn_nameiop = LOOKUP; | |
5534 | cn.cn_flags = ISLASTCN | HASBUF; | |
5535 | cn.cn_context = NULL; | |
5536 | cn.cn_pnlen = MAXPATHLEN; | |
5537 | cn.cn_nameptr = cn.cn_pnbuf; | |
5538 | cn.cn_hash = 0; | |
5539 | cn.cn_consume = 0; | |
2d21ac55 | 5540 | cn.cn_namelen = snprintf(cn.cn_nameptr, MAXPATHLEN, |
b0d623f7 | 5541 | "%s%s", descptr->cd_nameptr, |
2d21ac55 | 5542 | _PATH_RSRCFORKSPEC); |
91447636 | 5543 | } |
cf7d32b8 A |
5544 | dvp = vnode_getparent(vp); |
5545 | error = hfs_getnewvnode(hfsmp, dvp, cn.cn_pnbuf ? &cn : NULL, | |
b0d623f7 | 5546 | descptr, GNV_WANTRSRC | GNV_SKIPLOCK, &cp->c_attr, |
6d2010ae | 5547 | &rsrcfork, &rvp, &newvnode_flags); |
cf7d32b8 A |
5548 | if (dvp) |
5549 | vnode_put(dvp); | |
91447636 A |
5550 | if (cn.cn_pnbuf) |
5551 | FREE_ZONE(cn.cn_pnbuf, cn.cn_pnlen, M_NAMEI); | |
9bccf70c A |
5552 | if (error) |
5553 | return (error); | |
5554 | } | |
5555 | ||
5556 | *rvpp = rvp; | |
5557 | return (0); | |
5558 | } | |
5559 | ||
9bccf70c A |
5560 | /* |
5561 | * Wrapper for special device reads | |
5562 | */ | |
6d2010ae | 5563 | int |
9bccf70c | 5564 | hfsspec_read(ap) |
91447636 | 5565 | struct vnop_read_args /* { |
9bccf70c A |
5566 | struct vnode *a_vp; |
5567 | struct uio *a_uio; | |
5568 | int a_ioflag; | |
91447636 | 5569 | vfs_context_t a_context; |
9bccf70c A |
5570 | } */ *ap; |
5571 | { | |
5572 | /* | |
5573 | * Set access flag. | |
5574 | */ | |
91447636 A |
5575 | VTOC(ap->a_vp)->c_touch_acctime = TRUE; |
5576 | return (VOCALL (spec_vnodeop_p, VOFFSET(vnop_read), ap)); | |
9bccf70c A |
5577 | } |
5578 | ||
5579 | /* | |
5580 | * Wrapper for special device writes | |
5581 | */ | |
6d2010ae | 5582 | int |
9bccf70c | 5583 | hfsspec_write(ap) |
91447636 | 5584 | struct vnop_write_args /* { |
9bccf70c A |
5585 | struct vnode *a_vp; |
5586 | struct uio *a_uio; | |
5587 | int a_ioflag; | |
91447636 | 5588 | vfs_context_t a_context; |
9bccf70c A |
5589 | } */ *ap; |
5590 | { | |
5591 | /* | |
5592 | * Set update and change flags. | |
5593 | */ | |
91447636 A |
5594 | VTOC(ap->a_vp)->c_touch_chgtime = TRUE; |
5595 | VTOC(ap->a_vp)->c_touch_modtime = TRUE; | |
5596 | return (VOCALL (spec_vnodeop_p, VOFFSET(vnop_write), ap)); | |
9bccf70c A |
5597 | } |
5598 | ||
5599 | /* | |
5600 | * Wrapper for special device close | |
5601 | * | |
5602 | * Update the times on the cnode then do device close. | |
5603 | */ | |
6d2010ae | 5604 | int |
9bccf70c | 5605 | hfsspec_close(ap) |
91447636 | 5606 | struct vnop_close_args /* { |
9bccf70c A |
5607 | struct vnode *a_vp; |
5608 | int a_fflag; | |
91447636 | 5609 | vfs_context_t a_context; |
9bccf70c A |
5610 | } */ *ap; |
5611 | { | |
5612 | struct vnode *vp = ap->a_vp; | |
91447636 | 5613 | struct cnode *cp; |
9bccf70c | 5614 | |
b0d623f7 | 5615 | if (vnode_isinuse(ap->a_vp, 0)) { |
91447636 A |
5616 | if (hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK) == 0) { |
5617 | cp = VTOC(vp); | |
5618 | hfs_touchtimes(VTOHFS(vp), cp); | |
5619 | hfs_unlock(cp); | |
5620 | } | |
5621 | } | |
5622 | return (VOCALL (spec_vnodeop_p, VOFFSET(vnop_close), ap)); | |
9bccf70c A |
5623 | } |
5624 | ||
5625 | #if FIFO | |
5626 | /* | |
5627 | * Wrapper for fifo reads | |
5628 | */ | |
5629 | static int | |
5630 | hfsfifo_read(ap) | |
91447636 | 5631 | struct vnop_read_args /* { |
9bccf70c A |
5632 | struct vnode *a_vp; |
5633 | struct uio *a_uio; | |
5634 | int a_ioflag; | |
91447636 | 5635 | vfs_context_t a_context; |
9bccf70c A |
5636 | } */ *ap; |
5637 | { | |
9bccf70c A |
5638 | /* |
5639 | * Set access flag. | |
5640 | */ | |
91447636 A |
5641 | VTOC(ap->a_vp)->c_touch_acctime = TRUE; |
5642 | return (VOCALL (fifo_vnodeop_p, VOFFSET(vnop_read), ap)); | |
9bccf70c A |
5643 | } |
5644 | ||
5645 | /* | |
5646 | * Wrapper for fifo writes | |
5647 | */ | |
5648 | static int | |
5649 | hfsfifo_write(ap) | |
91447636 | 5650 | struct vnop_write_args /* { |
9bccf70c A |
5651 | struct vnode *a_vp; |
5652 | struct uio *a_uio; | |
5653 | int a_ioflag; | |
91447636 | 5654 | vfs_context_t a_context; |
9bccf70c A |
5655 | } */ *ap; |
5656 | { | |
9bccf70c A |
5657 | /* |
5658 | * Set update and change flags. | |
5659 | */ | |
91447636 A |
5660 | VTOC(ap->a_vp)->c_touch_chgtime = TRUE; |
5661 | VTOC(ap->a_vp)->c_touch_modtime = TRUE; | |
5662 | return (VOCALL (fifo_vnodeop_p, VOFFSET(vnop_write), ap)); | |
9bccf70c A |
5663 | } |
5664 | ||
5665 | /* | |
5666 | * Wrapper for fifo close | |
5667 | * | |
5668 | * Update the times on the cnode then do device close. | |
5669 | */ | |
5670 | static int | |
5671 | hfsfifo_close(ap) | |
91447636 | 5672 | struct vnop_close_args /* { |
9bccf70c A |
5673 | struct vnode *a_vp; |
5674 | int a_fflag; | |
91447636 | 5675 | vfs_context_t a_context; |
9bccf70c A |
5676 | } */ *ap; |
5677 | { | |
9bccf70c | 5678 | struct vnode *vp = ap->a_vp; |
91447636 | 5679 | struct cnode *cp; |
9bccf70c | 5680 | |
91447636 A |
5681 | if (vnode_isinuse(ap->a_vp, 1)) { |
5682 | if (hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK) == 0) { | |
5683 | cp = VTOC(vp); | |
5684 | hfs_touchtimes(VTOHFS(vp), cp); | |
5685 | hfs_unlock(cp); | |
5686 | } | |
5687 | } | |
5688 | return (VOCALL (fifo_vnodeop_p, VOFFSET(vnop_close), ap)); | |
9bccf70c | 5689 | } |
55e303ae | 5690 | |
55e303ae | 5691 | |
9bccf70c A |
5692 | #endif /* FIFO */ |
5693 | ||
91447636 A |
5694 | /* |
5695 | * Synchronize a file's in-core state with that on disk. | |
5696 | */ | |
6d2010ae | 5697 | int |
91447636 A |
5698 | hfs_vnop_fsync(ap) |
5699 | struct vnop_fsync_args /* { | |
5700 | struct vnode *a_vp; | |
5701 | int a_waitfor; | |
5702 | vfs_context_t a_context; | |
5703 | } */ *ap; | |
5704 | { | |
5705 | struct vnode* vp = ap->a_vp; | |
5706 | int error; | |
5707 | ||
6d2010ae A |
5708 | /* Note: We check hfs flags instead of vfs mount flag because during |
5709 | * read-write update, hfs marks itself read-write much earlier than | |
5710 | * the vfs, and hence won't result in skipping of certain writes like | |
5711 | * zero'ing out of unused nodes, creation of hotfiles btree, etc. | |
5712 | */ | |
5713 | if (VTOHFS(vp)->hfs_flags & HFS_READ_ONLY) { | |
5714 | return 0; | |
5715 | } | |
5716 | ||
5717 | #if CONFIG_PROTECT | |
316670eb | 5718 | if ((error = cp_handle_vnop(vp, CP_WRITE_ACCESS, 0)) != 0) { |
6d2010ae A |
5719 | return (error); |
5720 | } | |
5721 | #endif /* CONFIG_PROTECT */ | |
5722 | ||
91447636 A |
5723 | /* |
5724 | * We need to allow ENOENT lock errors since unlink | |
5725 | * systenm call can call VNOP_FSYNC during vclean. | |
5726 | */ | |
5727 | error = hfs_lock(VTOC(vp), HFS_EXCLUSIVE_LOCK); | |
5728 | if (error) | |
5729 | return (0); | |
5730 | ||
5731 | error = hfs_fsync(vp, ap->a_waitfor, 0, vfs_context_proc(ap->a_context)); | |
5732 | ||
5733 | hfs_unlock(VTOC(vp)); | |
5734 | return (error); | |
5735 | } | |
9bccf70c | 5736 | |
2d21ac55 | 5737 | |
6d2010ae | 5738 | int |
2d21ac55 A |
5739 | hfs_vnop_whiteout(ap) |
5740 | struct vnop_whiteout_args /* { | |
5741 | struct vnode *a_dvp; | |
5742 | struct componentname *a_cnp; | |
5743 | int a_flags; | |
5744 | vfs_context_t a_context; | |
5745 | } */ *ap; | |
5746 | { | |
5747 | int error = 0; | |
5748 | struct vnode *vp = NULL; | |
5749 | struct vnode_attr va; | |
5750 | struct vnop_lookup_args lookup_args; | |
5751 | struct vnop_remove_args remove_args; | |
5752 | struct hfsmount *hfsmp; | |
5753 | ||
5754 | hfsmp = VTOHFS(ap->a_dvp); | |
5755 | if (hfsmp->hfs_flags & HFS_STANDARD) { | |
5756 | error = ENOTSUP; | |
5757 | goto exit; | |
5758 | } | |
5759 | ||
5760 | switch (ap->a_flags) { | |
5761 | case LOOKUP: | |
5762 | error = 0; | |
5763 | break; | |
5764 | ||
5765 | case CREATE: | |
5766 | VATTR_INIT(&va); | |
5767 | VATTR_SET(&va, va_type, VREG); | |
5768 | VATTR_SET(&va, va_mode, S_IFWHT); | |
5769 | VATTR_SET(&va, va_uid, 0); | |
5770 | VATTR_SET(&va, va_gid, 0); | |
5771 | ||
5772 | error = hfs_makenode(ap->a_dvp, &vp, ap->a_cnp, &va, ap->a_context); | |
5773 | /* No need to release the vnode as no vnode is created for whiteouts */ | |
5774 | break; | |
5775 | ||
5776 | case DELETE: | |
5777 | lookup_args.a_dvp = ap->a_dvp; | |
5778 | lookup_args.a_vpp = &vp; | |
5779 | lookup_args.a_cnp = ap->a_cnp; | |
5780 | lookup_args.a_context = ap->a_context; | |
5781 | ||
5782 | error = hfs_vnop_lookup(&lookup_args); | |
5783 | if (error) { | |
5784 | break; | |
5785 | } | |
5786 | ||
5787 | remove_args.a_dvp = ap->a_dvp; | |
5788 | remove_args.a_vp = vp; | |
5789 | remove_args.a_cnp = ap->a_cnp; | |
5790 | remove_args.a_flags = 0; | |
5791 | remove_args.a_context = ap->a_context; | |
5792 | ||
5793 | error = hfs_vnop_remove(&remove_args); | |
5794 | vnode_put(vp); | |
5795 | break; | |
5796 | ||
5797 | default: | |
5798 | panic("hfs_vnop_whiteout: unknown operation (flag = %x)\n", ap->a_flags); | |
5799 | }; | |
5800 | ||
5801 | exit: | |
5802 | return (error); | |
5803 | } | |
9bccf70c A |
5804 | |
5805 | int (**hfs_vnodeop_p)(void *); | |
b0d623f7 | 5806 | int (**hfs_std_vnodeop_p) (void *); |
9bccf70c A |
5807 | |
5808 | #define VOPFUNC int (*)(void *) | |
5809 | ||
b0d623f7 A |
5810 | static int hfs_readonly_op (__unused void* ap) { return (EROFS); } |
5811 | ||
5812 | /* | |
5813 | * In 10.6 and forward, HFS Standard is read-only and deprecated. The vnop table below | |
5814 | * is for use with HFS standard to block out operations that would modify the file system | |
5815 | */ | |
5816 | ||
5817 | struct vnodeopv_entry_desc hfs_standard_vnodeop_entries[] = { | |
5818 | { &vnop_default_desc, (VOPFUNC)vn_default_error }, | |
5819 | { &vnop_lookup_desc, (VOPFUNC)hfs_vnop_lookup }, /* lookup */ | |
5820 | { &vnop_create_desc, (VOPFUNC)hfs_readonly_op }, /* create (READONLY) */ | |
5821 | { &vnop_mknod_desc, (VOPFUNC)hfs_readonly_op }, /* mknod (READONLY) */ | |
5822 | { &vnop_open_desc, (VOPFUNC)hfs_vnop_open }, /* open */ | |
5823 | { &vnop_close_desc, (VOPFUNC)hfs_vnop_close }, /* close */ | |
5824 | { &vnop_getattr_desc, (VOPFUNC)hfs_vnop_getattr }, /* getattr */ | |
5825 | { &vnop_setattr_desc, (VOPFUNC)hfs_readonly_op }, /* setattr */ | |
5826 | { &vnop_read_desc, (VOPFUNC)hfs_vnop_read }, /* read */ | |
5827 | { &vnop_write_desc, (VOPFUNC)hfs_readonly_op }, /* write (READONLY) */ | |
5828 | { &vnop_ioctl_desc, (VOPFUNC)hfs_vnop_ioctl }, /* ioctl */ | |
5829 | { &vnop_select_desc, (VOPFUNC)hfs_vnop_select }, /* select */ | |
5830 | { &vnop_revoke_desc, (VOPFUNC)nop_revoke }, /* revoke */ | |
5831 | { &vnop_exchange_desc, (VOPFUNC)hfs_readonly_op }, /* exchange (READONLY)*/ | |
5832 | { &vnop_mmap_desc, (VOPFUNC)err_mmap }, /* mmap */ | |
5833 | { &vnop_fsync_desc, (VOPFUNC)hfs_readonly_op}, /* fsync (READONLY) */ | |
5834 | { &vnop_remove_desc, (VOPFUNC)hfs_readonly_op }, /* remove (READONLY) */ | |
5835 | { &vnop_link_desc, (VOPFUNC)hfs_readonly_op }, /* link ( READONLLY) */ | |
5836 | { &vnop_rename_desc, (VOPFUNC)hfs_readonly_op }, /* rename (READONLY)*/ | |
5837 | { &vnop_mkdir_desc, (VOPFUNC)hfs_readonly_op }, /* mkdir (READONLY) */ | |
5838 | { &vnop_rmdir_desc, (VOPFUNC)hfs_readonly_op }, /* rmdir (READONLY) */ | |
5839 | { &vnop_symlink_desc, (VOPFUNC)hfs_readonly_op }, /* symlink (READONLY) */ | |
5840 | { &vnop_readdir_desc, (VOPFUNC)hfs_vnop_readdir }, /* readdir */ | |
5841 | { &vnop_readdirattr_desc, (VOPFUNC)hfs_vnop_readdirattr }, /* readdirattr */ | |
5842 | { &vnop_readlink_desc, (VOPFUNC)hfs_vnop_readlink }, /* readlink */ | |
5843 | { &vnop_inactive_desc, (VOPFUNC)hfs_vnop_inactive }, /* inactive */ | |
5844 | { &vnop_reclaim_desc, (VOPFUNC)hfs_vnop_reclaim }, /* reclaim */ | |
5845 | { &vnop_strategy_desc, (VOPFUNC)hfs_vnop_strategy }, /* strategy */ | |
5846 | { &vnop_pathconf_desc, (VOPFUNC)hfs_vnop_pathconf }, /* pathconf */ | |
5847 | { &vnop_advlock_desc, (VOPFUNC)err_advlock }, /* advlock */ | |
5848 | { &vnop_allocate_desc, (VOPFUNC)hfs_readonly_op }, /* allocate (READONLY) */ | |
316670eb | 5849 | #if CONFIG_SEARCHFS |
b0d623f7 | 5850 | { &vnop_searchfs_desc, (VOPFUNC)hfs_vnop_search }, /* search fs */ |
316670eb A |
5851 | #else |
5852 | { &vnop_searchfs_desc, (VOPFUNC)err_searchfs }, /* search fs */ | |
5853 | #endif | |
b0d623f7 A |
5854 | { &vnop_bwrite_desc, (VOPFUNC)hfs_readonly_op }, /* bwrite (READONLY) */ |
5855 | { &vnop_pagein_desc, (VOPFUNC)hfs_vnop_pagein }, /* pagein */ | |
5856 | { &vnop_pageout_desc,(VOPFUNC) hfs_readonly_op }, /* pageout (READONLY) */ | |
5857 | { &vnop_copyfile_desc, (VOPFUNC)hfs_readonly_op }, /* copyfile (READONLY)*/ | |
5858 | { &vnop_blktooff_desc, (VOPFUNC)hfs_vnop_blktooff }, /* blktooff */ | |
5859 | { &vnop_offtoblk_desc, (VOPFUNC)hfs_vnop_offtoblk }, /* offtoblk */ | |
5860 | { &vnop_blockmap_desc, (VOPFUNC)hfs_vnop_blockmap }, /* blockmap */ | |
5861 | { &vnop_getxattr_desc, (VOPFUNC)hfs_vnop_getxattr}, | |
5862 | { &vnop_setxattr_desc, (VOPFUNC)hfs_readonly_op}, /* set xattr (READONLY) */ | |
5863 | { &vnop_removexattr_desc, (VOPFUNC)hfs_readonly_op}, /* remove xattr (READONLY) */ | |
5864 | { &vnop_listxattr_desc, (VOPFUNC)hfs_vnop_listxattr}, | |
5865 | { &vnop_whiteout_desc, (VOPFUNC)hfs_readonly_op}, /* whiteout (READONLY) */ | |
5866 | #if NAMEDSTREAMS | |
5867 | { &vnop_getnamedstream_desc, (VOPFUNC)hfs_vnop_getnamedstream }, | |
5868 | { &vnop_makenamedstream_desc, (VOPFUNC)hfs_readonly_op }, | |
5869 | { &vnop_removenamedstream_desc, (VOPFUNC)hfs_readonly_op }, | |
5870 | #endif | |
5871 | { NULL, (VOPFUNC)NULL } | |
5872 | }; | |
5873 | ||
5874 | struct vnodeopv_desc hfs_std_vnodeop_opv_desc = | |
5875 | { &hfs_std_vnodeop_p, hfs_standard_vnodeop_entries }; | |
5876 | ||
5877 | ||
5878 | /* VNOP table for HFS+ */ | |
9bccf70c | 5879 | struct vnodeopv_entry_desc hfs_vnodeop_entries[] = { |
91447636 A |
5880 | { &vnop_default_desc, (VOPFUNC)vn_default_error }, |
5881 | { &vnop_lookup_desc, (VOPFUNC)hfs_vnop_lookup }, /* lookup */ | |
5882 | { &vnop_create_desc, (VOPFUNC)hfs_vnop_create }, /* create */ | |
5883 | { &vnop_mknod_desc, (VOPFUNC)hfs_vnop_mknod }, /* mknod */ | |
5884 | { &vnop_open_desc, (VOPFUNC)hfs_vnop_open }, /* open */ | |
5885 | { &vnop_close_desc, (VOPFUNC)hfs_vnop_close }, /* close */ | |
5886 | { &vnop_getattr_desc, (VOPFUNC)hfs_vnop_getattr }, /* getattr */ | |
5887 | { &vnop_setattr_desc, (VOPFUNC)hfs_vnop_setattr }, /* setattr */ | |
5888 | { &vnop_read_desc, (VOPFUNC)hfs_vnop_read }, /* read */ | |
5889 | { &vnop_write_desc, (VOPFUNC)hfs_vnop_write }, /* write */ | |
5890 | { &vnop_ioctl_desc, (VOPFUNC)hfs_vnop_ioctl }, /* ioctl */ | |
5891 | { &vnop_select_desc, (VOPFUNC)hfs_vnop_select }, /* select */ | |
5892 | { &vnop_revoke_desc, (VOPFUNC)nop_revoke }, /* revoke */ | |
5893 | { &vnop_exchange_desc, (VOPFUNC)hfs_vnop_exchange }, /* exchange */ | |
6d2010ae | 5894 | { &vnop_mmap_desc, (VOPFUNC)hfs_vnop_mmap }, /* mmap */ |
91447636 A |
5895 | { &vnop_fsync_desc, (VOPFUNC)hfs_vnop_fsync }, /* fsync */ |
5896 | { &vnop_remove_desc, (VOPFUNC)hfs_vnop_remove }, /* remove */ | |
5897 | { &vnop_link_desc, (VOPFUNC)hfs_vnop_link }, /* link */ | |
5898 | { &vnop_rename_desc, (VOPFUNC)hfs_vnop_rename }, /* rename */ | |
5899 | { &vnop_mkdir_desc, (VOPFUNC)hfs_vnop_mkdir }, /* mkdir */ | |
5900 | { &vnop_rmdir_desc, (VOPFUNC)hfs_vnop_rmdir }, /* rmdir */ | |
5901 | { &vnop_symlink_desc, (VOPFUNC)hfs_vnop_symlink }, /* symlink */ | |
5902 | { &vnop_readdir_desc, (VOPFUNC)hfs_vnop_readdir }, /* readdir */ | |
5903 | { &vnop_readdirattr_desc, (VOPFUNC)hfs_vnop_readdirattr }, /* readdirattr */ | |
5904 | { &vnop_readlink_desc, (VOPFUNC)hfs_vnop_readlink }, /* readlink */ | |
5905 | { &vnop_inactive_desc, (VOPFUNC)hfs_vnop_inactive }, /* inactive */ | |
5906 | { &vnop_reclaim_desc, (VOPFUNC)hfs_vnop_reclaim }, /* reclaim */ | |
5907 | { &vnop_strategy_desc, (VOPFUNC)hfs_vnop_strategy }, /* strategy */ | |
5908 | { &vnop_pathconf_desc, (VOPFUNC)hfs_vnop_pathconf }, /* pathconf */ | |
5909 | { &vnop_advlock_desc, (VOPFUNC)err_advlock }, /* advlock */ | |
5910 | { &vnop_allocate_desc, (VOPFUNC)hfs_vnop_allocate }, /* allocate */ | |
316670eb | 5911 | #if CONFIG_SEARCHFS |
91447636 | 5912 | { &vnop_searchfs_desc, (VOPFUNC)hfs_vnop_search }, /* search fs */ |
316670eb A |
5913 | #else |
5914 | { &vnop_searchfs_desc, (VOPFUNC)err_searchfs }, /* search fs */ | |
5915 | #endif | |
91447636 A |
5916 | { &vnop_bwrite_desc, (VOPFUNC)hfs_vnop_bwrite }, /* bwrite */ |
5917 | { &vnop_pagein_desc, (VOPFUNC)hfs_vnop_pagein }, /* pagein */ | |
5918 | { &vnop_pageout_desc,(VOPFUNC) hfs_vnop_pageout }, /* pageout */ | |
5919 | { &vnop_copyfile_desc, (VOPFUNC)err_copyfile }, /* copyfile */ | |
5920 | { &vnop_blktooff_desc, (VOPFUNC)hfs_vnop_blktooff }, /* blktooff */ | |
5921 | { &vnop_offtoblk_desc, (VOPFUNC)hfs_vnop_offtoblk }, /* offtoblk */ | |
5922 | { &vnop_blockmap_desc, (VOPFUNC)hfs_vnop_blockmap }, /* blockmap */ | |
91447636 A |
5923 | { &vnop_getxattr_desc, (VOPFUNC)hfs_vnop_getxattr}, |
5924 | { &vnop_setxattr_desc, (VOPFUNC)hfs_vnop_setxattr}, | |
5925 | { &vnop_removexattr_desc, (VOPFUNC)hfs_vnop_removexattr}, | |
5926 | { &vnop_listxattr_desc, (VOPFUNC)hfs_vnop_listxattr}, | |
2d21ac55 A |
5927 | { &vnop_whiteout_desc, (VOPFUNC)hfs_vnop_whiteout}, |
5928 | #if NAMEDSTREAMS | |
5929 | { &vnop_getnamedstream_desc, (VOPFUNC)hfs_vnop_getnamedstream }, | |
5930 | { &vnop_makenamedstream_desc, (VOPFUNC)hfs_vnop_makenamedstream }, | |
5931 | { &vnop_removenamedstream_desc, (VOPFUNC)hfs_vnop_removenamedstream }, | |
5932 | #endif | |
9bccf70c A |
5933 | { NULL, (VOPFUNC)NULL } |
5934 | }; | |
5935 | ||
5936 | struct vnodeopv_desc hfs_vnodeop_opv_desc = | |
5937 | { &hfs_vnodeop_p, hfs_vnodeop_entries }; | |
5938 | ||
b0d623f7 A |
5939 | |
5940 | /* Spec Op vnop table for HFS+ */ | |
9bccf70c A |
5941 | int (**hfs_specop_p)(void *); |
5942 | struct vnodeopv_entry_desc hfs_specop_entries[] = { | |
91447636 A |
5943 | { &vnop_default_desc, (VOPFUNC)vn_default_error }, |
5944 | { &vnop_lookup_desc, (VOPFUNC)spec_lookup }, /* lookup */ | |
5945 | { &vnop_create_desc, (VOPFUNC)spec_create }, /* create */ | |
5946 | { &vnop_mknod_desc, (VOPFUNC)spec_mknod }, /* mknod */ | |
5947 | { &vnop_open_desc, (VOPFUNC)spec_open }, /* open */ | |
5948 | { &vnop_close_desc, (VOPFUNC)hfsspec_close }, /* close */ | |
5949 | { &vnop_getattr_desc, (VOPFUNC)hfs_vnop_getattr }, /* getattr */ | |
5950 | { &vnop_setattr_desc, (VOPFUNC)hfs_vnop_setattr }, /* setattr */ | |
5951 | { &vnop_read_desc, (VOPFUNC)hfsspec_read }, /* read */ | |
5952 | { &vnop_write_desc, (VOPFUNC)hfsspec_write }, /* write */ | |
5953 | { &vnop_ioctl_desc, (VOPFUNC)spec_ioctl }, /* ioctl */ | |
5954 | { &vnop_select_desc, (VOPFUNC)spec_select }, /* select */ | |
5955 | { &vnop_revoke_desc, (VOPFUNC)spec_revoke }, /* revoke */ | |
5956 | { &vnop_mmap_desc, (VOPFUNC)spec_mmap }, /* mmap */ | |
5957 | { &vnop_fsync_desc, (VOPFUNC)hfs_vnop_fsync }, /* fsync */ | |
5958 | { &vnop_remove_desc, (VOPFUNC)spec_remove }, /* remove */ | |
5959 | { &vnop_link_desc, (VOPFUNC)spec_link }, /* link */ | |
5960 | { &vnop_rename_desc, (VOPFUNC)spec_rename }, /* rename */ | |
5961 | { &vnop_mkdir_desc, (VOPFUNC)spec_mkdir }, /* mkdir */ | |
5962 | { &vnop_rmdir_desc, (VOPFUNC)spec_rmdir }, /* rmdir */ | |
5963 | { &vnop_symlink_desc, (VOPFUNC)spec_symlink }, /* symlink */ | |
5964 | { &vnop_readdir_desc, (VOPFUNC)spec_readdir }, /* readdir */ | |
5965 | { &vnop_readlink_desc, (VOPFUNC)spec_readlink }, /* readlink */ | |
5966 | { &vnop_inactive_desc, (VOPFUNC)hfs_vnop_inactive }, /* inactive */ | |
5967 | { &vnop_reclaim_desc, (VOPFUNC)hfs_vnop_reclaim }, /* reclaim */ | |
5968 | { &vnop_strategy_desc, (VOPFUNC)spec_strategy }, /* strategy */ | |
5969 | { &vnop_pathconf_desc, (VOPFUNC)spec_pathconf }, /* pathconf */ | |
5970 | { &vnop_advlock_desc, (VOPFUNC)err_advlock }, /* advlock */ | |
5971 | { &vnop_bwrite_desc, (VOPFUNC)hfs_vnop_bwrite }, | |
91447636 A |
5972 | { &vnop_pagein_desc, (VOPFUNC)hfs_vnop_pagein }, /* Pagein */ |
5973 | { &vnop_pageout_desc, (VOPFUNC)hfs_vnop_pageout }, /* Pageout */ | |
b0d623f7 | 5974 | { &vnop_copyfile_desc, (VOPFUNC)err_copyfile }, /* copyfile */ |
91447636 A |
5975 | { &vnop_blktooff_desc, (VOPFUNC)hfs_vnop_blktooff }, /* blktooff */ |
5976 | { &vnop_offtoblk_desc, (VOPFUNC)hfs_vnop_offtoblk }, /* offtoblk */ | |
9bccf70c A |
5977 | { (struct vnodeop_desc*)NULL, (VOPFUNC)NULL } |
5978 | }; | |
5979 | struct vnodeopv_desc hfs_specop_opv_desc = | |
5980 | { &hfs_specop_p, hfs_specop_entries }; | |
5981 | ||
5982 | #if FIFO | |
b0d623f7 | 5983 | /* HFS+ FIFO VNOP table */ |
9bccf70c A |
5984 | int (**hfs_fifoop_p)(void *); |
5985 | struct vnodeopv_entry_desc hfs_fifoop_entries[] = { | |
91447636 A |
5986 | { &vnop_default_desc, (VOPFUNC)vn_default_error }, |
5987 | { &vnop_lookup_desc, (VOPFUNC)fifo_lookup }, /* lookup */ | |
5988 | { &vnop_create_desc, (VOPFUNC)fifo_create }, /* create */ | |
5989 | { &vnop_mknod_desc, (VOPFUNC)fifo_mknod }, /* mknod */ | |
5990 | { &vnop_open_desc, (VOPFUNC)fifo_open }, /* open */ | |
5991 | { &vnop_close_desc, (VOPFUNC)hfsfifo_close }, /* close */ | |
5992 | { &vnop_getattr_desc, (VOPFUNC)hfs_vnop_getattr }, /* getattr */ | |
5993 | { &vnop_setattr_desc, (VOPFUNC)hfs_vnop_setattr }, /* setattr */ | |
5994 | { &vnop_read_desc, (VOPFUNC)hfsfifo_read }, /* read */ | |
5995 | { &vnop_write_desc, (VOPFUNC)hfsfifo_write }, /* write */ | |
5996 | { &vnop_ioctl_desc, (VOPFUNC)fifo_ioctl }, /* ioctl */ | |
5997 | { &vnop_select_desc, (VOPFUNC)fifo_select }, /* select */ | |
5998 | { &vnop_revoke_desc, (VOPFUNC)fifo_revoke }, /* revoke */ | |
5999 | { &vnop_mmap_desc, (VOPFUNC)fifo_mmap }, /* mmap */ | |
6000 | { &vnop_fsync_desc, (VOPFUNC)hfs_vnop_fsync }, /* fsync */ | |
6001 | { &vnop_remove_desc, (VOPFUNC)fifo_remove }, /* remove */ | |
6002 | { &vnop_link_desc, (VOPFUNC)fifo_link }, /* link */ | |
6003 | { &vnop_rename_desc, (VOPFUNC)fifo_rename }, /* rename */ | |
6004 | { &vnop_mkdir_desc, (VOPFUNC)fifo_mkdir }, /* mkdir */ | |
6005 | { &vnop_rmdir_desc, (VOPFUNC)fifo_rmdir }, /* rmdir */ | |
6006 | { &vnop_symlink_desc, (VOPFUNC)fifo_symlink }, /* symlink */ | |
6007 | { &vnop_readdir_desc, (VOPFUNC)fifo_readdir }, /* readdir */ | |
6008 | { &vnop_readlink_desc, (VOPFUNC)fifo_readlink }, /* readlink */ | |
6009 | { &vnop_inactive_desc, (VOPFUNC)hfs_vnop_inactive }, /* inactive */ | |
6010 | { &vnop_reclaim_desc, (VOPFUNC)hfs_vnop_reclaim }, /* reclaim */ | |
6011 | { &vnop_strategy_desc, (VOPFUNC)fifo_strategy }, /* strategy */ | |
6012 | { &vnop_pathconf_desc, (VOPFUNC)fifo_pathconf }, /* pathconf */ | |
6013 | { &vnop_advlock_desc, (VOPFUNC)err_advlock }, /* advlock */ | |
6014 | { &vnop_bwrite_desc, (VOPFUNC)hfs_vnop_bwrite }, | |
6015 | { &vnop_pagein_desc, (VOPFUNC)hfs_vnop_pagein }, /* Pagein */ | |
6016 | { &vnop_pageout_desc, (VOPFUNC)hfs_vnop_pageout }, /* Pageout */ | |
6017 | { &vnop_copyfile_desc, (VOPFUNC)err_copyfile }, /* copyfile */ | |
6018 | { &vnop_blktooff_desc, (VOPFUNC)hfs_vnop_blktooff }, /* blktooff */ | |
6019 | { &vnop_offtoblk_desc, (VOPFUNC)hfs_vnop_offtoblk }, /* offtoblk */ | |
6020 | { &vnop_blockmap_desc, (VOPFUNC)hfs_vnop_blockmap }, /* blockmap */ | |
9bccf70c A |
6021 | { (struct vnodeop_desc*)NULL, (VOPFUNC)NULL } |
6022 | }; | |
6023 | struct vnodeopv_desc hfs_fifoop_opv_desc = | |
6024 | { &hfs_fifoop_p, hfs_fifoop_entries }; | |
6025 | #endif /* FIFO */ | |
6026 | ||
6027 | ||
6028 |