puffs_node.c revision 1.6.4.3 1 1.6.4.3 yamt /* $NetBSD: puffs_node.c,v 1.6.4.3 2007/12/07 17:32:03 yamt Exp $ */
2 1.6.4.2 yamt
3 1.6.4.2 yamt /*
4 1.6.4.2 yamt * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 1.6.4.2 yamt *
6 1.6.4.2 yamt * Development of this software was supported by the
7 1.6.4.2 yamt * Google Summer of Code program, the Ulla Tuominen Foundation
8 1.6.4.2 yamt * and the Finnish Cultural Foundation.
9 1.6.4.2 yamt *
10 1.6.4.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.6.4.2 yamt * modification, are permitted provided that the following conditions
12 1.6.4.2 yamt * are met:
13 1.6.4.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.6.4.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.6.4.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.6.4.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.6.4.2 yamt * documentation and/or other materials provided with the distribution.
18 1.6.4.2 yamt *
19 1.6.4.2 yamt * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 1.6.4.2 yamt * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 1.6.4.2 yamt * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 1.6.4.2 yamt * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 1.6.4.2 yamt * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.6.4.2 yamt * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 1.6.4.2 yamt * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.6.4.2 yamt * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.6.4.2 yamt * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.6.4.2 yamt * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.6.4.2 yamt * SUCH DAMAGE.
30 1.6.4.2 yamt */
31 1.6.4.2 yamt
32 1.6.4.2 yamt #include <sys/cdefs.h>
33 1.6.4.3 yamt __KERNEL_RCSID(0, "$NetBSD: puffs_node.c,v 1.6.4.3 2007/12/07 17:32:03 yamt Exp $");
34 1.6.4.2 yamt
35 1.6.4.2 yamt #include <sys/param.h>
36 1.6.4.2 yamt #include <sys/hash.h>
37 1.6.4.2 yamt #include <sys/kmem.h>
38 1.6.4.2 yamt #include <sys/malloc.h>
39 1.6.4.2 yamt #include <sys/mount.h>
40 1.6.4.2 yamt #include <sys/namei.h>
41 1.6.4.2 yamt #include <sys/vnode.h>
42 1.6.4.2 yamt
43 1.6.4.2 yamt #include <fs/puffs/puffs_msgif.h>
44 1.6.4.2 yamt #include <fs/puffs/puffs_sys.h>
45 1.6.4.2 yamt
46 1.6.4.2 yamt #include <miscfs/genfs/genfs_node.h>
47 1.6.4.2 yamt #include <miscfs/specfs/specdev.h>
48 1.6.4.2 yamt
49 1.6.4.2 yamt static const struct genfs_ops puffs_genfsops = {
50 1.6.4.2 yamt .gop_size = puffs_gop_size,
51 1.6.4.2 yamt .gop_write = genfs_gop_write,
52 1.6.4.2 yamt .gop_markupdate = puffs_gop_markupdate,
53 1.6.4.2 yamt #if 0
54 1.6.4.2 yamt .gop_alloc, should ask userspace
55 1.6.4.2 yamt #endif
56 1.6.4.2 yamt };
57 1.6.4.2 yamt
58 1.6.4.2 yamt static __inline struct puffs_node_hashlist
59 1.6.4.2 yamt *puffs_cookie2hashlist(struct puffs_mount *, void *);
60 1.6.4.2 yamt static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
61 1.6.4.2 yamt
62 1.6.4.2 yamt struct pool puffs_pnpool;
63 1.6.4.2 yamt
64 1.6.4.2 yamt /*
65 1.6.4.2 yamt * Grab a vnode, intialize all the puffs-dependant stuff.
66 1.6.4.2 yamt */
67 1.6.4.2 yamt int
68 1.6.4.2 yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
69 1.6.4.2 yamt voff_t vsize, dev_t rdev, struct vnode **vpp)
70 1.6.4.2 yamt {
71 1.6.4.2 yamt struct puffs_mount *pmp;
72 1.6.4.2 yamt struct puffs_newcookie *pnc;
73 1.6.4.2 yamt struct vnode *vp, *nvp;
74 1.6.4.2 yamt struct puffs_node *pnode;
75 1.6.4.2 yamt struct puffs_node_hashlist *plist;
76 1.6.4.2 yamt int error;
77 1.6.4.2 yamt
78 1.6.4.2 yamt pmp = MPTOPUFFSMP(mp);
79 1.6.4.2 yamt
80 1.6.4.2 yamt error = EPROTO;
81 1.6.4.2 yamt if (type <= VNON || type >= VBAD) {
82 1.6.4.3 yamt puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EINVAL,
83 1.6.4.2 yamt "bad node type", cookie);
84 1.6.4.2 yamt goto bad;
85 1.6.4.2 yamt }
86 1.6.4.2 yamt if (vsize == VSIZENOTSET) {
87 1.6.4.3 yamt puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EINVAL,
88 1.6.4.2 yamt "VSIZENOTSET is not a valid size", cookie);
89 1.6.4.2 yamt goto bad;
90 1.6.4.2 yamt }
91 1.6.4.2 yamt
92 1.6.4.2 yamt /*
93 1.6.4.2 yamt * XXX: there is a deadlock condition between vfs_busy() and
94 1.6.4.2 yamt * vnode locks. For an unmounting file system the mountpoint
95 1.6.4.2 yamt * is frozen, but in unmount(FORCE) vflush() wants to access all
96 1.6.4.2 yamt * of the vnodes. If we are here waiting for the mountpoint
97 1.6.4.2 yamt * lock while holding on to a vnode lock, well, we ain't
98 1.6.4.2 yamt * just pining for the fjords anymore. If we release the
99 1.6.4.2 yamt * vnode lock, we will be in the situation "mount point
100 1.6.4.2 yamt * is dying" and panic() will ensue in insmntque. So as a
101 1.6.4.2 yamt * temporary workaround, get a vnode without putting it on
102 1.6.4.2 yamt * the mount point list, check if mount point is still alive
103 1.6.4.2 yamt * and kicking and only then add the vnode to the list.
104 1.6.4.2 yamt */
105 1.6.4.2 yamt error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
106 1.6.4.2 yamt if (error)
107 1.6.4.2 yamt goto bad;
108 1.6.4.2 yamt vp->v_vnlock = NULL;
109 1.6.4.2 yamt vp->v_type = type;
110 1.6.4.2 yamt
111 1.6.4.2 yamt /*
112 1.6.4.2 yamt * Check what mount point isn't going away. This will work
113 1.6.4.2 yamt * until we decide to remove biglock or make the kernel
114 1.6.4.2 yamt * preemptive. But hopefully the real problem will be fixed
115 1.6.4.2 yamt * by then.
116 1.6.4.2 yamt *
117 1.6.4.2 yamt * XXX: yes, should call vfs_busy(), but thar be rabbits with
118 1.6.4.2 yamt * vicious streaks a mile wide ...
119 1.6.4.2 yamt *
120 1.6.4.2 yamt * XXX: there is a transient failure here: if someone is unmounting
121 1.6.4.2 yamt * the file system but doesn't succeed (due to it being busy),
122 1.6.4.2 yamt * we incorrectly fail new vnode allocation. This is *very*
123 1.6.4.2 yamt * hard to fix with the current structure of file system unmounting.
124 1.6.4.2 yamt */
125 1.6.4.2 yamt if (mp->mnt_iflag & IMNT_UNMOUNT) {
126 1.6.4.2 yamt DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
127 1.6.4.2 yamt "vnode for cookie %p\n", mp, cookie));
128 1.6.4.2 yamt ungetnewvnode(vp);
129 1.6.4.2 yamt error = ENXIO;
130 1.6.4.2 yamt goto bad;
131 1.6.4.2 yamt }
132 1.6.4.2 yamt
133 1.6.4.2 yamt /*
134 1.6.4.2 yamt * Creation should not fail after this point. Or if it does,
135 1.6.4.2 yamt * care must be taken so that VOP_INACTIVE() isn't called.
136 1.6.4.2 yamt */
137 1.6.4.2 yamt
138 1.6.4.2 yamt /* So mp is not dead yet.. good.. inform new vnode of its master */
139 1.6.4.2 yamt simple_lock(&mntvnode_slock);
140 1.6.4.2 yamt TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
141 1.6.4.2 yamt simple_unlock(&mntvnode_slock);
142 1.6.4.2 yamt vp->v_mount = mp;
143 1.6.4.2 yamt
144 1.6.4.2 yamt /*
145 1.6.4.2 yamt * clerical tasks & footwork
146 1.6.4.2 yamt */
147 1.6.4.2 yamt
148 1.6.4.2 yamt /* default size */
149 1.6.4.2 yamt uvm_vnp_setsize(vp, 0);
150 1.6.4.2 yamt
151 1.6.4.2 yamt /* dances based on vnode type. almost ufs_vinit(), but not quite */
152 1.6.4.2 yamt switch (type) {
153 1.6.4.2 yamt case VCHR:
154 1.6.4.2 yamt case VBLK:
155 1.6.4.2 yamt /*
156 1.6.4.2 yamt * replace vnode operation vector with the specops vector.
157 1.6.4.2 yamt * our user server has very little control over the node
158 1.6.4.2 yamt * if it decides its a character or block special file
159 1.6.4.2 yamt */
160 1.6.4.2 yamt vp->v_op = puffs_specop_p;
161 1.6.4.2 yamt
162 1.6.4.2 yamt /* do the standard checkalias-dance */
163 1.6.4.2 yamt if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
164 1.6.4.2 yamt /*
165 1.6.4.2 yamt * found: release & unallocate aliased
166 1.6.4.2 yamt * old (well, actually, new) node
167 1.6.4.2 yamt */
168 1.6.4.2 yamt vp->v_op = spec_vnodeop_p;
169 1.6.4.2 yamt vp->v_vflag &= ~VV_LOCKSWORK;
170 1.6.4.2 yamt vrele(vp);
171 1.6.4.2 yamt vgone(vp); /* cya */
172 1.6.4.2 yamt
173 1.6.4.2 yamt /* init "new" vnode */
174 1.6.4.2 yamt vp = nvp;
175 1.6.4.2 yamt vp->v_vnlock = NULL;
176 1.6.4.2 yamt vp->v_mount = mp;
177 1.6.4.2 yamt }
178 1.6.4.2 yamt break;
179 1.6.4.2 yamt
180 1.6.4.2 yamt case VFIFO:
181 1.6.4.2 yamt vp->v_op = puffs_fifoop_p;
182 1.6.4.2 yamt break;
183 1.6.4.2 yamt
184 1.6.4.2 yamt case VREG:
185 1.6.4.2 yamt uvm_vnp_setsize(vp, vsize);
186 1.6.4.2 yamt break;
187 1.6.4.2 yamt
188 1.6.4.2 yamt case VDIR:
189 1.6.4.2 yamt case VLNK:
190 1.6.4.2 yamt case VSOCK:
191 1.6.4.2 yamt break;
192 1.6.4.2 yamt default:
193 1.6.4.2 yamt panic("puffs_getvnode: invalid vtype %d", type);
194 1.6.4.2 yamt }
195 1.6.4.2 yamt
196 1.6.4.2 yamt pnode = pool_get(&puffs_pnpool, PR_WAITOK);
197 1.6.4.2 yamt memset(pnode, 0, sizeof(struct puffs_node));
198 1.6.4.2 yamt
199 1.6.4.2 yamt pnode->pn_cookie = cookie;
200 1.6.4.2 yamt pnode->pn_refcount = 1;
201 1.6.4.2 yamt
202 1.6.4.2 yamt /* insert cookie on list, take off of interlock list */
203 1.6.4.2 yamt mutex_init(&pnode->pn_mtx, MUTEX_DEFAULT, IPL_NONE);
204 1.6.4.2 yamt SLIST_INIT(&pnode->pn_sel.sel_klist);
205 1.6.4.2 yamt plist = puffs_cookie2hashlist(pmp, cookie);
206 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
207 1.6.4.2 yamt LIST_INSERT_HEAD(plist, pnode, pn_hashent);
208 1.6.4.2 yamt if (cookie != pmp->pmp_root_cookie) {
209 1.6.4.2 yamt LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
210 1.6.4.2 yamt if (pnc->pnc_cookie == cookie) {
211 1.6.4.2 yamt LIST_REMOVE(pnc, pnc_entries);
212 1.6.4.2 yamt kmem_free(pnc, sizeof(struct puffs_newcookie));
213 1.6.4.2 yamt break;
214 1.6.4.2 yamt }
215 1.6.4.2 yamt }
216 1.6.4.2 yamt KASSERT(pnc != NULL);
217 1.6.4.2 yamt }
218 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
219 1.6.4.2 yamt
220 1.6.4.2 yamt vp->v_data = pnode;
221 1.6.4.2 yamt vp->v_type = type;
222 1.6.4.2 yamt pnode->pn_vp = vp;
223 1.6.4.2 yamt pnode->pn_serversize = vsize;
224 1.6.4.2 yamt
225 1.6.4.2 yamt genfs_node_init(vp, &puffs_genfsops);
226 1.6.4.2 yamt *vpp = vp;
227 1.6.4.2 yamt
228 1.6.4.2 yamt DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
229 1.6.4.2 yamt pnode, pnode->pn_cookie));
230 1.6.4.2 yamt
231 1.6.4.2 yamt return 0;
232 1.6.4.2 yamt
233 1.6.4.2 yamt bad:
234 1.6.4.2 yamt /* remove staging cookie from list */
235 1.6.4.2 yamt if (cookie != pmp->pmp_root_cookie) {
236 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
237 1.6.4.2 yamt LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
238 1.6.4.2 yamt if (pnc->pnc_cookie == cookie) {
239 1.6.4.2 yamt LIST_REMOVE(pnc, pnc_entries);
240 1.6.4.2 yamt kmem_free(pnc, sizeof(struct puffs_newcookie));
241 1.6.4.2 yamt break;
242 1.6.4.2 yamt }
243 1.6.4.2 yamt }
244 1.6.4.2 yamt KASSERT(pnc != NULL);
245 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
246 1.6.4.2 yamt }
247 1.6.4.2 yamt
248 1.6.4.2 yamt return error;
249 1.6.4.2 yamt }
250 1.6.4.2 yamt
251 1.6.4.2 yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
252 1.6.4.2 yamt int
253 1.6.4.2 yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
254 1.6.4.2 yamt void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
255 1.6.4.2 yamt {
256 1.6.4.2 yamt struct puffs_mount *pmp = MPTOPUFFSMP(mp);
257 1.6.4.2 yamt struct puffs_newcookie *pnc;
258 1.6.4.2 yamt struct vnode *vp;
259 1.6.4.2 yamt int error;
260 1.6.4.2 yamt
261 1.6.4.2 yamt /* userspace probably has this as a NULL op */
262 1.6.4.2 yamt if (cookie == NULL) {
263 1.6.4.2 yamt error = EOPNOTSUPP;
264 1.6.4.2 yamt return error;
265 1.6.4.2 yamt }
266 1.6.4.2 yamt
267 1.6.4.2 yamt /*
268 1.6.4.2 yamt * Check for previous node with the same designation.
269 1.6.4.2 yamt * Explicitly check the root node cookie, since it might be
270 1.6.4.2 yamt * reclaimed from the kernel when this check is made.
271 1.6.4.2 yamt */
272 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
273 1.6.4.2 yamt if (cookie == pmp->pmp_root_cookie
274 1.6.4.2 yamt || puffs_cookie2pnode(pmp, cookie) != NULL) {
275 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
276 1.6.4.3 yamt puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EEXIST,
277 1.6.4.2 yamt "cookie exists", cookie);
278 1.6.4.2 yamt return EPROTO;
279 1.6.4.2 yamt }
280 1.6.4.2 yamt
281 1.6.4.2 yamt LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
282 1.6.4.2 yamt if (pnc->pnc_cookie == cookie) {
283 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
284 1.6.4.3 yamt puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EEXIST,
285 1.6.4.2 yamt "cookie exists", cookie);
286 1.6.4.2 yamt return EPROTO;
287 1.6.4.2 yamt }
288 1.6.4.2 yamt }
289 1.6.4.2 yamt pnc = kmem_alloc(sizeof(struct puffs_newcookie), KM_SLEEP);
290 1.6.4.2 yamt pnc->pnc_cookie = cookie;
291 1.6.4.2 yamt LIST_INSERT_HEAD(&pmp->pmp_newcookie, pnc, pnc_entries);
292 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
293 1.6.4.2 yamt
294 1.6.4.2 yamt error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
295 1.6.4.2 yamt if (error)
296 1.6.4.2 yamt return error;
297 1.6.4.2 yamt
298 1.6.4.2 yamt vp->v_type = type;
299 1.6.4.2 yamt vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
300 1.6.4.2 yamt *vpp = vp;
301 1.6.4.2 yamt
302 1.6.4.2 yamt if ((cnp->cn_flags & MAKEENTRY) && PUFFS_USE_NAMECACHE(pmp))
303 1.6.4.2 yamt cache_enter(dvp, vp, cnp);
304 1.6.4.2 yamt
305 1.6.4.2 yamt return 0;
306 1.6.4.2 yamt }
307 1.6.4.2 yamt
308 1.6.4.2 yamt void
309 1.6.4.2 yamt puffs_putvnode(struct vnode *vp)
310 1.6.4.2 yamt {
311 1.6.4.2 yamt struct puffs_mount *pmp;
312 1.6.4.2 yamt struct puffs_node *pnode;
313 1.6.4.2 yamt
314 1.6.4.2 yamt pmp = VPTOPUFFSMP(vp);
315 1.6.4.2 yamt pnode = VPTOPP(vp);
316 1.6.4.2 yamt
317 1.6.4.2 yamt #ifdef DIAGNOSTIC
318 1.6.4.2 yamt if (vp->v_tag != VT_PUFFS)
319 1.6.4.2 yamt panic("puffs_putvnode: %p not a puffs vnode", vp);
320 1.6.4.2 yamt #endif
321 1.6.4.2 yamt
322 1.6.4.2 yamt LIST_REMOVE(pnode, pn_hashent);
323 1.6.4.2 yamt genfs_node_destroy(vp);
324 1.6.4.2 yamt puffs_releasenode(pnode);
325 1.6.4.2 yamt vp->v_data = NULL;
326 1.6.4.2 yamt
327 1.6.4.2 yamt return;
328 1.6.4.2 yamt }
329 1.6.4.2 yamt
330 1.6.4.2 yamt static __inline struct puffs_node_hashlist *
331 1.6.4.2 yamt puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
332 1.6.4.2 yamt {
333 1.6.4.2 yamt uint32_t hash;
334 1.6.4.2 yamt
335 1.6.4.2 yamt hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
336 1.6.4.2 yamt return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
337 1.6.4.2 yamt }
338 1.6.4.2 yamt
339 1.6.4.2 yamt /*
340 1.6.4.2 yamt * Translate cookie to puffs_node. Caller must hold pmp_lock
341 1.6.4.2 yamt * and it will be held upon return.
342 1.6.4.2 yamt */
343 1.6.4.2 yamt static struct puffs_node *
344 1.6.4.2 yamt puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
345 1.6.4.2 yamt {
346 1.6.4.2 yamt struct puffs_node_hashlist *plist;
347 1.6.4.2 yamt struct puffs_node *pnode;
348 1.6.4.2 yamt
349 1.6.4.2 yamt plist = puffs_cookie2hashlist(pmp, cookie);
350 1.6.4.2 yamt LIST_FOREACH(pnode, plist, pn_hashent) {
351 1.6.4.2 yamt if (pnode->pn_cookie == cookie)
352 1.6.4.2 yamt break;
353 1.6.4.2 yamt }
354 1.6.4.2 yamt
355 1.6.4.2 yamt return pnode;
356 1.6.4.2 yamt }
357 1.6.4.2 yamt
358 1.6.4.2 yamt /*
359 1.6.4.2 yamt * Make sure root vnode exists and reference it. Does NOT lock.
360 1.6.4.2 yamt */
361 1.6.4.2 yamt static int
362 1.6.4.2 yamt puffs_makeroot(struct puffs_mount *pmp)
363 1.6.4.2 yamt {
364 1.6.4.2 yamt struct vnode *vp;
365 1.6.4.2 yamt int rv;
366 1.6.4.2 yamt
367 1.6.4.2 yamt /*
368 1.6.4.2 yamt * pmp_lock must be held if vref()'ing or vrele()'ing the
369 1.6.4.2 yamt * root vnode. the latter is controlled by puffs_inactive().
370 1.6.4.2 yamt *
371 1.6.4.2 yamt * pmp_root is set here and cleared in puffs_reclaim().
372 1.6.4.2 yamt */
373 1.6.4.2 yamt retry:
374 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
375 1.6.4.2 yamt vp = pmp->pmp_root;
376 1.6.4.2 yamt if (vp) {
377 1.6.4.2 yamt simple_lock(&vp->v_interlock);
378 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
379 1.6.4.2 yamt if (vget(vp, LK_INTERLOCK) == 0)
380 1.6.4.2 yamt return 0;
381 1.6.4.2 yamt } else
382 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
383 1.6.4.2 yamt
384 1.6.4.2 yamt /*
385 1.6.4.2 yamt * So, didn't have the magic root vnode available.
386 1.6.4.2 yamt * No matter, grab another and stuff it with the cookie.
387 1.6.4.2 yamt */
388 1.6.4.2 yamt if ((rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
389 1.6.4.2 yamt pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp)))
390 1.6.4.2 yamt return rv;
391 1.6.4.2 yamt
392 1.6.4.2 yamt /*
393 1.6.4.2 yamt * Someone magically managed to race us into puffs_getvnode?
394 1.6.4.2 yamt * Put our previous new vnode back and retry.
395 1.6.4.2 yamt */
396 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
397 1.6.4.2 yamt if (pmp->pmp_root) {
398 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
399 1.6.4.2 yamt puffs_putvnode(vp);
400 1.6.4.2 yamt goto retry;
401 1.6.4.2 yamt }
402 1.6.4.2 yamt
403 1.6.4.2 yamt /* store cache */
404 1.6.4.2 yamt vp->v_vflag |= VV_ROOT;
405 1.6.4.2 yamt pmp->pmp_root = vp;
406 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
407 1.6.4.2 yamt
408 1.6.4.2 yamt return 0;
409 1.6.4.2 yamt }
410 1.6.4.2 yamt
411 1.6.4.2 yamt /*
412 1.6.4.2 yamt * Locate the in-kernel vnode based on the cookie received given
413 1.6.4.2 yamt * from userspace. Returns a vnode, if found, NULL otherwise.
414 1.6.4.2 yamt * The parameter "lock" control whether to lock the possible or
415 1.6.4.2 yamt * not. Locking always might cause us to lock against ourselves
416 1.6.4.2 yamt * in situations where we want the vnode but don't care for the
417 1.6.4.2 yamt * vnode lock, e.g. file server issued putpages.
418 1.6.4.2 yamt */
419 1.6.4.2 yamt int
420 1.6.4.2 yamt puffs_cookie2vnode(struct puffs_mount *pmp, void *cookie, int lock,
421 1.6.4.2 yamt int willcreate, struct vnode **vpp)
422 1.6.4.2 yamt {
423 1.6.4.2 yamt struct puffs_node *pnode;
424 1.6.4.2 yamt struct puffs_newcookie *pnc;
425 1.6.4.2 yamt struct vnode *vp;
426 1.6.4.2 yamt int vgetflags, rv;
427 1.6.4.2 yamt
428 1.6.4.2 yamt /*
429 1.6.4.2 yamt * Handle root in a special manner, since we want to make sure
430 1.6.4.2 yamt * pmp_root is properly set.
431 1.6.4.2 yamt */
432 1.6.4.2 yamt if (cookie == pmp->pmp_root_cookie) {
433 1.6.4.2 yamt if ((rv = puffs_makeroot(pmp)))
434 1.6.4.2 yamt return rv;
435 1.6.4.2 yamt if (lock)
436 1.6.4.2 yamt vn_lock(pmp->pmp_root, LK_EXCLUSIVE | LK_RETRY);
437 1.6.4.2 yamt
438 1.6.4.2 yamt *vpp = pmp->pmp_root;
439 1.6.4.2 yamt return 0;
440 1.6.4.2 yamt }
441 1.6.4.2 yamt
442 1.6.4.2 yamt mutex_enter(&pmp->pmp_lock);
443 1.6.4.2 yamt pnode = puffs_cookie2pnode(pmp, cookie);
444 1.6.4.2 yamt if (pnode == NULL) {
445 1.6.4.2 yamt if (willcreate) {
446 1.6.4.2 yamt pnc = kmem_alloc(sizeof(struct puffs_newcookie),
447 1.6.4.2 yamt KM_SLEEP);
448 1.6.4.2 yamt pnc->pnc_cookie = cookie;
449 1.6.4.2 yamt LIST_INSERT_HEAD(&pmp->pmp_newcookie, pnc, pnc_entries);
450 1.6.4.2 yamt }
451 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
452 1.6.4.2 yamt return PUFFS_NOSUCHCOOKIE;
453 1.6.4.2 yamt }
454 1.6.4.2 yamt vp = pnode->pn_vp;
455 1.6.4.2 yamt simple_lock(&vp->v_interlock);
456 1.6.4.2 yamt mutex_exit(&pmp->pmp_lock);
457 1.6.4.2 yamt
458 1.6.4.2 yamt vgetflags = LK_INTERLOCK;
459 1.6.4.2 yamt if (lock)
460 1.6.4.2 yamt vgetflags |= LK_EXCLUSIVE | LK_RETRY;
461 1.6.4.2 yamt if ((rv = vget(vp, vgetflags)))
462 1.6.4.2 yamt return rv;
463 1.6.4.2 yamt
464 1.6.4.2 yamt *vpp = vp;
465 1.6.4.2 yamt return 0;
466 1.6.4.2 yamt }
467 1.6.4.2 yamt
468 1.6.4.2 yamt void
469 1.6.4.3 yamt puffs_updatenode(struct puffs_node *pn, int flags, voff_t size)
470 1.6.4.2 yamt {
471 1.6.4.2 yamt struct timespec ts;
472 1.6.4.2 yamt
473 1.6.4.2 yamt if (flags == 0)
474 1.6.4.2 yamt return;
475 1.6.4.2 yamt
476 1.6.4.2 yamt nanotime(&ts);
477 1.6.4.2 yamt
478 1.6.4.2 yamt if (flags & PUFFS_UPDATEATIME) {
479 1.6.4.2 yamt pn->pn_mc_atime = ts;
480 1.6.4.2 yamt pn->pn_stat |= PNODE_METACACHE_ATIME;
481 1.6.4.2 yamt }
482 1.6.4.2 yamt if (flags & PUFFS_UPDATECTIME) {
483 1.6.4.2 yamt pn->pn_mc_ctime = ts;
484 1.6.4.2 yamt pn->pn_stat |= PNODE_METACACHE_CTIME;
485 1.6.4.2 yamt }
486 1.6.4.2 yamt if (flags & PUFFS_UPDATEMTIME) {
487 1.6.4.2 yamt pn->pn_mc_mtime = ts;
488 1.6.4.2 yamt pn->pn_stat |= PNODE_METACACHE_MTIME;
489 1.6.4.2 yamt }
490 1.6.4.2 yamt if (flags & PUFFS_UPDATESIZE) {
491 1.6.4.3 yamt pn->pn_mc_size = size;
492 1.6.4.2 yamt pn->pn_stat |= PNODE_METACACHE_SIZE;
493 1.6.4.2 yamt }
494 1.6.4.2 yamt }
495 1.6.4.2 yamt
496 1.6.4.2 yamt /*
497 1.6.4.2 yamt * Add reference to node.
498 1.6.4.2 yamt * mutex held on entry and return
499 1.6.4.2 yamt */
500 1.6.4.2 yamt void
501 1.6.4.2 yamt puffs_referencenode(struct puffs_node *pn)
502 1.6.4.2 yamt {
503 1.6.4.2 yamt
504 1.6.4.2 yamt KASSERT(mutex_owned(&pn->pn_mtx));
505 1.6.4.2 yamt pn->pn_refcount++;
506 1.6.4.2 yamt }
507 1.6.4.2 yamt
508 1.6.4.2 yamt /*
509 1.6.4.2 yamt * Release pnode structure which dealing with references to the
510 1.6.4.2 yamt * puffs_node instead of the vnode. Can't use vref()/vrele() on
511 1.6.4.2 yamt * the vnode there, since that causes the lovely VOP_INACTIVE(),
512 1.6.4.2 yamt * which in turn causes the lovely deadlock when called by the one
513 1.6.4.2 yamt * who is supposed to handle it.
514 1.6.4.2 yamt */
515 1.6.4.2 yamt void
516 1.6.4.2 yamt puffs_releasenode(struct puffs_node *pn)
517 1.6.4.2 yamt {
518 1.6.4.2 yamt
519 1.6.4.2 yamt mutex_enter(&pn->pn_mtx);
520 1.6.4.2 yamt if (--pn->pn_refcount == 0) {
521 1.6.4.2 yamt mutex_exit(&pn->pn_mtx);
522 1.6.4.2 yamt mutex_destroy(&pn->pn_mtx);
523 1.6.4.2 yamt pool_put(&puffs_pnpool, pn);
524 1.6.4.2 yamt } else {
525 1.6.4.2 yamt mutex_exit(&pn->pn_mtx);
526 1.6.4.2 yamt }
527 1.6.4.2 yamt }
528