xref: /openbsd-src/sys/kern/vfs_vops.c (revision 25c4e8bd056e974b28f4a0ffd39d76c190a56013)
1 /*	$OpenBSD: vfs_vops.c,v 1.35 2022/06/26 05:20:42 visa Exp $	*/
2 /*
3  * Copyright (c) 2010 Thordur I. Bjornsson <thib@openbsd.org>
4  *
5  * Permission to use, copy, modify, and distribute this software for any
6  * purpose with or without fee is hereby granted, provided that the above
7  * copyright notice and this permission notice appear in all copies.
8  *
9  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16  *
17  * Copyright (c) 1992, 1993
18  *	The Regents of the University of California.  All rights reserved.
19  *
20  * Redistribution and use in source and binary forms, with or without
21  * modification, are permitted provided that the following conditions
22  * are met:
23  * 1. Redistributions of source code must retain the above copyright
24  *    notice, this list of conditions and the following disclaimer.
25  * 2. Redistributions in binary form must reproduce the above copyright
26  *    notice, this list of conditions and the following disclaimer in the
27  *    documentation and/or other materials provided with the distribution.
28  * 3. Neither the name of the University nor the names of its contributors
29  *    may be used to endorse or promote products derived from this software
30  *    without specific prior written permission.
31  *
32  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS'' AND
33  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
34  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
35  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
36  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
37  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
38  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
40  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
41  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
42  * SUCH DAMAGE.
43  */
44 
45 #include <sys/param.h>
46 #include <sys/vnode.h>
47 #include <sys/unistd.h>
48 #include <sys/systm.h>
49 
50 #ifdef VFSLCKDEBUG
51 #define ASSERT_VP_ISLOCKED(vp) do {				\
52 	if (((vp)->v_flag & VLOCKSWORK) && !VOP_ISLOCKED(vp)) {	\
53 		VOP_PRINT(vp);					\
54 		panic("vp not locked");				\
55 	}							\
56 } while (0)
57 #else
58 #define ASSERT_VP_ISLOCKED(vp)  /* nothing */
59 #endif
60 
61 int
62 VOP_ISLOCKED(struct vnode *vp)
63 {
64 	struct vop_islocked_args a;
65 	a.a_vp = vp;
66 
67 	if (vp->v_op->vop_islocked == NULL)
68 		return (EOPNOTSUPP);
69 
70 	return ((vp->v_op->vop_islocked)(&a));
71 }
72 
73 int
74 VOP_LOOKUP(struct vnode *dvp, struct vnode **vpp,
75     struct componentname *cnp)
76 {
77 	struct vop_lookup_args a;
78 	a.a_dvp = dvp;
79 	a.a_vpp = vpp;
80 	a.a_cnp = cnp;
81 
82 	if (dvp->v_op->vop_lookup == NULL)
83 		return (EOPNOTSUPP);
84 
85 	return ((dvp->v_op->vop_lookup)(&a));
86 }
87 
88 int
89 VOP_CREATE(struct vnode *dvp, struct vnode **vpp,
90     struct componentname *cnp, struct vattr *vap)
91 {
92 	struct vop_create_args a;
93 	a.a_dvp = dvp;
94 	a.a_vpp = vpp;
95 	a.a_cnp = cnp;
96 	a.a_vap = vap;
97 
98 	ASSERT_VP_ISLOCKED(dvp);
99 
100 	if (dvp->v_op->vop_create == NULL)
101 		return (EOPNOTSUPP);
102 
103 	return ((dvp->v_op->vop_create)(&a));
104 }
105 
106 int
107 VOP_MKNOD(struct vnode *dvp, struct vnode **vpp,
108     struct componentname *cnp, struct vattr *vap)
109 {
110 	struct vop_mknod_args a;
111 	a.a_dvp = dvp;
112 	a.a_vpp = vpp;
113 	a.a_cnp = cnp;
114 	a.a_vap = vap;
115 
116 	ASSERT_VP_ISLOCKED(dvp);
117 
118 	if (dvp->v_op->vop_mknod == NULL)
119 		return (EOPNOTSUPP);
120 
121 	return ((dvp->v_op->vop_mknod)(&a));
122 }
123 
124 int
125 VOP_OPEN(struct vnode *vp, int mode, struct ucred *cred, struct proc *p)
126 {
127 	struct vop_open_args a;
128 	a.a_vp = vp;
129 	a.a_mode = mode;
130 	a.a_cred = cred;
131 	a.a_p = p;
132 
133 	KASSERT(p == curproc);
134 
135 	if (vp->v_op->vop_open == NULL)
136 		return (EOPNOTSUPP);
137 
138 	return ((vp->v_op->vop_open)(&a));
139 }
140 
141 int
142 VOP_CLOSE(struct vnode *vp, int fflag, struct ucred *cred, struct proc *p)
143 {
144 	struct vop_close_args a;
145 	a.a_vp = vp;
146 	a.a_fflag = fflag;
147 	a.a_cred = cred;
148 	a.a_p = p;
149 
150 	KASSERT(p == NULL || p == curproc);
151 	ASSERT_VP_ISLOCKED(vp);
152 
153 	if (vp->v_op->vop_close == NULL)
154 		return (EOPNOTSUPP);
155 
156 	return ((vp->v_op->vop_close)(&a));
157 }
158 
159 int
160 VOP_ACCESS(struct vnode *vp, int mode, struct ucred *cred, struct proc *p)
161 {
162 	struct vop_access_args a;
163 	a.a_vp = vp;
164 	a.a_mode = mode;
165 	a.a_cred = cred;
166 	a.a_p = p;
167 
168 	KASSERT(p == curproc);
169 	ASSERT_VP_ISLOCKED(vp);
170 
171 	if (vp->v_op->vop_access == NULL)
172 		return (EOPNOTSUPP);
173 
174 	return ((vp->v_op->vop_access)(&a));
175 }
176 
177 int
178 VOP_GETATTR(struct vnode *vp, struct vattr *vap, struct ucred *cred,
179     struct proc *p)
180 {
181 	struct vop_getattr_args a;
182 	a.a_vp = vp;
183 	a.a_vap = vap;
184 	a.a_cred = cred;
185 	a.a_p = p;
186 
187 	KASSERT(p == curproc);
188 	if (vp->v_op->vop_getattr == NULL)
189 		return (EOPNOTSUPP);
190 
191 	return ((vp->v_op->vop_getattr)(&a));
192 }
193 
194 int
195 VOP_SETATTR(struct vnode *vp, struct vattr *vap, struct ucred *cred,
196     struct proc *p)
197 {
198 	struct vop_setattr_args a;
199 	a.a_vp = vp;
200 	a.a_vap = vap;
201 	a.a_cred = cred;
202 	a.a_p = p;
203 
204 	KASSERT(p == curproc);
205 	ASSERT_VP_ISLOCKED(vp);
206 
207 	if (vp->v_op->vop_setattr == NULL)
208 		return (EOPNOTSUPP);
209 
210 	return ((vp->v_op->vop_setattr)(&a));
211 }
212 
213 int
214 VOP_READ(struct vnode *vp, struct uio *uio, int ioflag, struct ucred *cred)
215 {
216 	struct vop_read_args a;
217 	a.a_vp = vp;
218 	a.a_uio = uio;
219 	a.a_ioflag = ioflag;
220 	a.a_cred = cred;
221 
222 	ASSERT_VP_ISLOCKED(vp);
223 
224 	if (vp->v_op->vop_read == NULL)
225 		return (EOPNOTSUPP);
226 
227 	return ((vp->v_op->vop_read)(&a));
228 }
229 
230 int
231 VOP_WRITE(struct vnode *vp, struct uio *uio, int ioflag,
232     struct ucred *cred)
233 {
234 	struct vop_write_args a;
235 	a.a_vp = vp;
236 	a.a_uio = uio;
237 	a.a_ioflag = ioflag;
238 	a.a_cred = cred;
239 
240 	ASSERT_VP_ISLOCKED(vp);
241 
242 	if (vp->v_op->vop_write == NULL)
243 		return (EOPNOTSUPP);
244 
245 	return ((vp->v_op->vop_write)(&a));
246 }
247 
248 int
249 VOP_IOCTL(struct vnode *vp, u_long command, void *data, int fflag,
250     struct ucred *cred, struct proc *p)
251 {
252 	struct vop_ioctl_args a;
253 	a.a_vp = vp;
254 	a.a_command = command;
255 	a.a_data = data;
256 	a.a_fflag = fflag;
257 	a.a_cred = cred;
258 	a.a_p = p;
259 
260 	KASSERT(p == curproc);
261 	if (vp->v_op->vop_ioctl == NULL)
262 		return (EOPNOTSUPP);
263 
264 	return ((vp->v_op->vop_ioctl)(&a));
265 }
266 
267 int
268 VOP_KQFILTER(struct vnode *vp, int fflag, struct knote *kn)
269 {
270 	struct vop_kqfilter_args a;
271 	a.a_vp = vp;
272 	a.a_fflag = fflag;
273 	a.a_kn = kn;
274 
275 	if (vp->v_op->vop_kqfilter == NULL)
276 		return (EOPNOTSUPP);
277 
278 	return ((vp->v_op->vop_kqfilter)(&a));
279 }
280 
281 int
282 VOP_REVOKE(struct vnode *vp, int flags)
283 {
284 	struct vop_revoke_args a;
285 	a.a_vp = vp;
286 	a.a_flags = flags;
287 
288 	if (vp->v_op->vop_revoke == NULL)
289 		return (EOPNOTSUPP);
290 
291 	return ((vp->v_op->vop_revoke)(&a));
292 }
293 
294 int
295 VOP_FSYNC(struct vnode *vp, struct ucred *cred, int waitfor,
296     struct proc *p)
297 {
298 	int r, s;
299 	struct vop_fsync_args a;
300 	a.a_vp = vp;
301 	a.a_cred = cred;
302 	a.a_waitfor = waitfor;
303 	a.a_p = p;
304 
305 	KASSERT(p == curproc);
306 	ASSERT_VP_ISLOCKED(vp);
307 
308 	if (vp->v_op->vop_fsync == NULL)
309 		return (EOPNOTSUPP);
310 
311 	r = (vp->v_op->vop_fsync)(&a);
312 	s = splbio();
313 	if (r == 0 && vp->v_bioflag & VBIOERROR)
314 		r = EIO;
315 	splx(s);
316 	return r;
317 }
318 
319 int
320 VOP_REMOVE(struct vnode *dvp, struct vnode *vp, struct componentname *cnp)
321 {
322 	struct vop_remove_args a;
323 	a.a_dvp = dvp;
324         a.a_vp = vp;
325 	a.a_cnp = cnp;
326 
327 	ASSERT_VP_ISLOCKED(dvp);
328 	ASSERT_VP_ISLOCKED(vp);
329 
330 	if (dvp->v_op->vop_remove == NULL)
331 		return (EOPNOTSUPP);
332 
333 	return ((dvp->v_op->vop_remove)(&a));
334 }
335 
336 int
337 VOP_LINK(struct vnode *dvp, struct vnode *vp, struct componentname *cnp)
338 {
339 	struct vop_link_args a;
340 	a.a_dvp = dvp;
341 	a.a_vp = vp;
342 	a.a_cnp = cnp;
343 
344 	ASSERT_VP_ISLOCKED(dvp);
345 
346 	if (dvp->v_op->vop_link == NULL)
347 		return (EOPNOTSUPP);
348 
349 	return ((dvp->v_op->vop_link)(&a));
350 }
351 
352 int
353 VOP_RENAME(struct vnode *fdvp, struct vnode *fvp,
354     struct componentname *fcnp, struct vnode *tdvp, struct vnode *tvp,
355     struct componentname *tcnp)
356 {
357 	struct vop_rename_args a;
358 	a.a_fdvp = fdvp;
359 	a.a_fvp = fvp;
360 	a.a_fcnp = fcnp;
361 	a.a_tdvp = tdvp;
362 	a.a_tvp = tvp;
363 	a.a_tcnp = tcnp;
364 
365 	ASSERT_VP_ISLOCKED(tdvp);
366 
367 	if (fdvp->v_op->vop_rename == NULL)
368 		return (EOPNOTSUPP);
369 
370 	return ((fdvp->v_op->vop_rename)(&a));
371 }
372 
373 int
374 VOP_MKDIR(struct vnode *dvp, struct vnode **vpp,
375     struct componentname *cnp, struct vattr *vap)
376 {
377 	struct vop_mkdir_args a;
378 	a.a_dvp = dvp;
379 	a.a_vpp = vpp;
380 	a.a_cnp = cnp;
381 	a.a_vap = vap;
382 
383 	ASSERT_VP_ISLOCKED(dvp);
384 
385 	if (dvp->v_op->vop_mkdir == NULL)
386 		return (EOPNOTSUPP);
387 
388 	return ((dvp->v_op->vop_mkdir)(&a));
389 }
390 
391 int
392 VOP_RMDIR(struct vnode *dvp, struct vnode *vp, struct componentname *cnp)
393 {
394 	struct vop_rmdir_args a;
395 	a.a_dvp = dvp;
396 	a.a_vp = vp;
397 	a.a_cnp = cnp;
398 
399 	ASSERT_VP_ISLOCKED(dvp);
400 	ASSERT_VP_ISLOCKED(vp);
401 
402 	KASSERT(dvp != vp);
403 
404 	if (dvp->v_op->vop_rmdir == NULL)
405 		return (EOPNOTSUPP);
406 
407 	return ((dvp->v_op->vop_rmdir)(&a));
408 }
409 
410 int
411 VOP_SYMLINK(struct vnode *dvp, struct vnode **vpp,
412     struct componentname *cnp, struct vattr *vap, char *target)
413 {
414 	struct vop_symlink_args a;
415 	a.a_dvp = dvp;
416 	a.a_vpp = vpp;
417 	a.a_cnp = cnp;
418 	a.a_vap = vap;
419 	a.a_target = target;
420 
421 	ASSERT_VP_ISLOCKED(dvp);
422 
423 	if (dvp->v_op->vop_symlink == NULL)
424 		return (EOPNOTSUPP);
425 
426 	return ((dvp->v_op->vop_symlink)(&a));
427 }
428 
429 int
430 VOP_READDIR(struct vnode *vp, struct uio *uio, struct ucred *cred,
431     int *eofflag)
432 {
433 	struct vop_readdir_args a;
434 	a.a_vp = vp;
435 	a.a_uio = uio;
436 	a.a_cred = cred;
437 	a.a_eofflag = eofflag;
438 
439 	ASSERT_VP_ISLOCKED(vp);
440 
441 	if (vp->v_op->vop_readdir == NULL)
442 		return (EOPNOTSUPP);
443 
444 	return ((vp->v_op->vop_readdir)(&a));
445 }
446 
447 int
448 VOP_READLINK(struct vnode *vp, struct uio *uio, struct ucred *cred)
449 {
450 	struct vop_readlink_args a;
451 	a.a_vp = vp;
452 	a.a_uio = uio;
453 	a.a_cred = cred;
454 
455 	ASSERT_VP_ISLOCKED(vp);
456 
457 	if (vp->v_op->vop_readlink == NULL)
458 		return (EOPNOTSUPP);
459 
460 	return ((vp->v_op->vop_readlink)(&a));
461 }
462 
463 int
464 VOP_ABORTOP(struct vnode *dvp, struct componentname *cnp)
465 {
466 	struct vop_abortop_args a;
467 	a.a_dvp = dvp;
468 	a.a_cnp = cnp;
469 
470 	if (dvp->v_op->vop_abortop == NULL)
471 		return (EOPNOTSUPP);
472 
473 	return ((dvp->v_op->vop_abortop)(&a));
474 }
475 
476 int
477 VOP_INACTIVE(struct vnode *vp, struct proc *p)
478 {
479 	struct vop_inactive_args a;
480 	a.a_vp = vp;
481 	a.a_p = p;
482 
483 	KASSERT(p == curproc);
484 	ASSERT_VP_ISLOCKED(vp);
485 
486 	if (vp->v_op->vop_inactive == NULL)
487 		return (EOPNOTSUPP);
488 
489 	return ((vp->v_op->vop_inactive)(&a));
490 }
491 
492 int
493 VOP_RECLAIM(struct vnode *vp, struct proc *p)
494 {
495 	struct vop_reclaim_args a;
496 	a.a_vp = vp;
497 	a.a_p = p;
498 
499 	KASSERT(p == curproc);
500 	if (vp->v_op->vop_reclaim == NULL)
501 		return (EOPNOTSUPP);
502 
503 	return ((vp->v_op->vop_reclaim)(&a));
504 }
505 
506 int
507 VOP_LOCK(struct vnode *vp, int flags)
508 {
509 	struct vop_lock_args a;
510 	a.a_vp = vp;
511 	a.a_flags = flags;
512 
513 	MUTEX_ASSERT_UNLOCKED(&vnode_mtx);
514 
515 	if (vp->v_op->vop_lock == NULL)
516 		return (EOPNOTSUPP);
517 
518 	return ((vp->v_op->vop_lock)(&a));
519 }
520 
521 int
522 VOP_UNLOCK(struct vnode *vp)
523 {
524 	struct vop_unlock_args a;
525 	a.a_vp = vp;
526 
527 	if (vp->v_op->vop_unlock == NULL)
528 		return (EOPNOTSUPP);
529 
530 	return ((vp->v_op->vop_unlock)(&a));
531 }
532 
533 int
534 VOP_BMAP(struct vnode *vp, daddr_t bn, struct vnode **vpp,
535     daddr_t *bnp, int *runp)
536 {
537 	struct vop_bmap_args a;
538 	a.a_vp = vp;
539 	a.a_bn = bn;
540 	a.a_vpp = vpp;
541 	a.a_bnp = bnp;
542 	a.a_runp = runp;
543 
544 	ASSERT_VP_ISLOCKED(vp);
545 
546 	if (vp->v_op->vop_bmap == NULL)
547 		return (EOPNOTSUPP);
548 
549 	return ((vp->v_op->vop_bmap)(&a));
550 }
551 
552 int
553 VOP_PRINT(struct vnode *vp)
554 {
555 	struct vop_print_args a;
556 	a.a_vp = vp;
557 
558 	if (vp->v_op->vop_print == NULL)
559 		return (EOPNOTSUPP);
560 
561 	return ((vp->v_op->vop_print)(&a));
562 }
563 
564 int
565 VOP_PATHCONF(struct vnode *vp, int name, register_t *retval)
566 {
567 	struct vop_pathconf_args a;
568 
569 	/*
570 	 * Handle names that are constant across filesystem
571 	 */
572 	switch (name) {
573 	case _PC_PATH_MAX:
574 		*retval = PATH_MAX;
575 		return (0);
576 	case _PC_PIPE_BUF:
577 		*retval = PIPE_BUF;
578 		return (0);
579 	case _PC_ASYNC_IO:
580 	case _PC_PRIO_IO:
581 	case _PC_SYNC_IO:
582 		*retval = 0;
583 		return (0);
584 
585 	}
586 
587 	a.a_vp = vp;
588 	a.a_name = name;
589 	a.a_retval = retval;
590 
591 	ASSERT_VP_ISLOCKED(vp);
592 
593 	if (vp->v_op->vop_pathconf == NULL)
594 		return (EOPNOTSUPP);
595 
596 	return ((vp->v_op->vop_pathconf)(&a));
597 }
598 
599 int
600 VOP_ADVLOCK(struct vnode *vp, void *id, int op, struct flock *fl, int flags)
601 {
602 	struct vop_advlock_args a;
603 	a.a_vp = vp;
604 	a.a_id = id;
605 	a.a_op = op;
606 	a.a_fl = fl;
607 	a.a_flags = flags;
608 
609 	if (vp->v_op->vop_advlock == NULL)
610 		return (EOPNOTSUPP);
611 
612 	return (vp->v_op->vop_advlock)(&a);
613 }
614 
615 int
616 VOP_STRATEGY(struct vnode *vp, struct buf *bp)
617 {
618 	struct vop_strategy_args a;
619 	a.a_vp = vp;
620 	a.a_bp = bp;
621 
622 	if ((ISSET(bp->b_flags, B_BC)) && (!ISSET(bp->b_flags, B_DMA)))
623 		panic("Non dma reachable buffer passed to VOP_STRATEGY");
624 
625 	if (vp->v_op->vop_strategy == NULL)
626 		return (EOPNOTSUPP);
627 
628 	return ((vp->v_op->vop_strategy)(&a));
629 }
630 
631 int
632 VOP_BWRITE(struct buf *bp)
633 {
634 	struct vop_bwrite_args a;
635 	a.a_bp = bp;
636 
637 	if (bp->b_vp->v_op->vop_bwrite == NULL)
638 		return (EOPNOTSUPP);
639 
640 	return ((bp->b_vp->v_op->vop_bwrite)(&a));
641 }
642