puffs_subr.c revision 1.13.2.2 1 1.13.2.2 yamt /* $NetBSD: puffs_subr.c,v 1.13.2.2 2006/12/30 20:50:01 yamt Exp $ */
2 1.13.2.2 yamt
3 1.13.2.2 yamt /*
4 1.13.2.2 yamt * Copyright (c) 2005, 2006 Antti Kantee. All Rights Reserved.
5 1.13.2.2 yamt *
6 1.13.2.2 yamt * Development of this software was supported by the
7 1.13.2.2 yamt * Google Summer of Code program and the Ulla Tuominen Foundation.
8 1.13.2.2 yamt * The Google SoC project was mentored by Bill Studenmund.
9 1.13.2.2 yamt *
10 1.13.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.13.2.2 yamt * modification, are permitted provided that the following conditions
12 1.13.2.2 yamt * are met:
13 1.13.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.13.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.13.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.13.2.2 yamt * 3. The name of the company nor the name of the author may be used to
19 1.13.2.2 yamt * endorse or promote products derived from this software without specific
20 1.13.2.2 yamt * prior written permission.
21 1.13.2.2 yamt *
22 1.13.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
23 1.13.2.2 yamt * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
24 1.13.2.2 yamt * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
25 1.13.2.2 yamt * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 1.13.2.2 yamt * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.13.2.2 yamt * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
28 1.13.2.2 yamt * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.13.2.2 yamt * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.13.2.2 yamt * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.13.2.2 yamt * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.13.2.2 yamt * SUCH DAMAGE.
33 1.13.2.2 yamt */
34 1.13.2.2 yamt
35 1.13.2.2 yamt #include <sys/cdefs.h>
36 1.13.2.2 yamt __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.13.2.2 2006/12/30 20:50:01 yamt Exp $");
37 1.13.2.2 yamt
38 1.13.2.2 yamt #include <sys/param.h>
39 1.13.2.2 yamt #include <sys/conf.h>
40 1.13.2.2 yamt #include <sys/malloc.h>
41 1.13.2.2 yamt #include <sys/mount.h>
42 1.13.2.2 yamt #include <sys/socketvar.h>
43 1.13.2.2 yamt #include <sys/vnode.h>
44 1.13.2.2 yamt #include <sys/kauth.h>
45 1.13.2.2 yamt #include <sys/namei.h>
46 1.13.2.2 yamt
47 1.13.2.2 yamt #include <fs/puffs/puffs_msgif.h>
48 1.13.2.2 yamt #include <fs/puffs/puffs_sys.h>
49 1.13.2.2 yamt
50 1.13.2.2 yamt #include <miscfs/genfs/genfs_node.h>
51 1.13.2.2 yamt #include <miscfs/specfs/specdev.h>
52 1.13.2.2 yamt
53 1.13.2.2 yamt POOL_INIT(puffs_pnpool, sizeof(struct puffs_node), 0, 0, 0, "puffspnpl",
54 1.13.2.2 yamt &pool_allocator_nointr);
55 1.13.2.2 yamt
56 1.13.2.2 yamt #ifdef DEBUG
57 1.13.2.2 yamt int puffsdebug;
58 1.13.2.2 yamt #endif
59 1.13.2.2 yamt
60 1.13.2.2 yamt
61 1.13.2.2 yamt static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
62 1.13.2.2 yamt static void puffs_gop_markupdate(struct vnode *, int);
63 1.13.2.2 yamt
64 1.13.2.2 yamt static const struct genfs_ops puffs_genfsops = {
65 1.13.2.2 yamt .gop_size = puffs_gop_size,
66 1.13.2.2 yamt .gop_write = genfs_gop_write,
67 1.13.2.2 yamt .gop_markupdate = puffs_gop_markupdate,
68 1.13.2.2 yamt #if 0
69 1.13.2.2 yamt .gop_alloc, should ask userspace
70 1.13.2.2 yamt #endif
71 1.13.2.2 yamt };
72 1.13.2.2 yamt
73 1.13.2.2 yamt /*
74 1.13.2.2 yamt * Grab a vnode, intialize all the puffs-dependant stuff.
75 1.13.2.2 yamt */
76 1.13.2.2 yamt int
77 1.13.2.2 yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
78 1.13.2.2 yamt voff_t vsize, dev_t rdev, struct vnode **vpp)
79 1.13.2.2 yamt {
80 1.13.2.2 yamt struct puffs_mount *pmp;
81 1.13.2.2 yamt struct vnode *vp, *nvp;
82 1.13.2.2 yamt struct puffs_node *pnode;
83 1.13.2.2 yamt int error;
84 1.13.2.2 yamt
85 1.13.2.2 yamt pmp = MPTOPUFFSMP(mp);
86 1.13.2.2 yamt
87 1.13.2.2 yamt /*
88 1.13.2.2 yamt * XXX: there is a deadlock condition between vfs_busy() and
89 1.13.2.2 yamt * vnode locks. For an unmounting file system the mountpoint
90 1.13.2.2 yamt * is frozen, but in unmount(FORCE) vflush() wants to access all
91 1.13.2.2 yamt * of the vnodes. If we are here waiting for the mountpoint
92 1.13.2.2 yamt * lock while holding on to a vnode lock, well, we ain't
93 1.13.2.2 yamt * just pining for the fjords anymore. If we release the
94 1.13.2.2 yamt * vnode lock, we will be in the situation "mount point
95 1.13.2.2 yamt * is dying" and panic() will ensue in insmntque. So as a
96 1.13.2.2 yamt * temporary workaround, get a vnode without putting it on
97 1.13.2.2 yamt * the mount point list, check if mount point is still alive
98 1.13.2.2 yamt * and kicking and only then add the vnode to the list.
99 1.13.2.2 yamt */
100 1.13.2.2 yamt error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
101 1.13.2.2 yamt if (error)
102 1.13.2.2 yamt return error;
103 1.13.2.2 yamt vp->v_vnlock = NULL;
104 1.13.2.2 yamt vp->v_type = type;
105 1.13.2.2 yamt
106 1.13.2.2 yamt /*
107 1.13.2.2 yamt * Check what mount point isn't going away. This will work
108 1.13.2.2 yamt * until we decide to remove biglock or make the kernel
109 1.13.2.2 yamt * preemptive. But hopefully the real problem will be fixed
110 1.13.2.2 yamt * by then.
111 1.13.2.2 yamt *
112 1.13.2.2 yamt * XXX: yes, should call vfs_busy(), but thar be rabbits with
113 1.13.2.2 yamt * vicious streaks a mile wide ...
114 1.13.2.2 yamt */
115 1.13.2.2 yamt if (mp->mnt_iflag & IMNT_UNMOUNT) {
116 1.13.2.2 yamt DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
117 1.13.2.2 yamt "vnode for cookie %p\n", mp, cookie));
118 1.13.2.2 yamt ungetnewvnode(vp);
119 1.13.2.2 yamt return ENXIO;
120 1.13.2.2 yamt }
121 1.13.2.2 yamt
122 1.13.2.2 yamt /* So it's not dead yet.. good.. inform new vnode of its master */
123 1.13.2.2 yamt simple_lock(&mntvnode_slock);
124 1.13.2.2 yamt if (TAILQ_EMPTY(&mp->mnt_vnodelist))
125 1.13.2.2 yamt TAILQ_INSERT_HEAD(&mp->mnt_vnodelist, vp, v_mntvnodes);
126 1.13.2.2 yamt else
127 1.13.2.2 yamt TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
128 1.13.2.2 yamt simple_unlock(&mntvnode_slock);
129 1.13.2.2 yamt vp->v_mount = mp;
130 1.13.2.2 yamt
131 1.13.2.2 yamt /*
132 1.13.2.2 yamt * clerical tasks & footwork
133 1.13.2.2 yamt */
134 1.13.2.2 yamt
135 1.13.2.2 yamt /* dances based on vnode type. almost ufs_vinit(), but not quite */
136 1.13.2.2 yamt switch (type) {
137 1.13.2.2 yamt case VCHR:
138 1.13.2.2 yamt case VBLK:
139 1.13.2.2 yamt /*
140 1.13.2.2 yamt * replace vnode operation vector with the specops vector.
141 1.13.2.2 yamt * our user server has very little control over the node
142 1.13.2.2 yamt * if it decides its a character or block special file
143 1.13.2.2 yamt */
144 1.13.2.2 yamt vp->v_op = puffs_specop_p;
145 1.13.2.2 yamt
146 1.13.2.2 yamt /* do the standard checkalias-dance */
147 1.13.2.2 yamt if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
148 1.13.2.2 yamt /*
149 1.13.2.2 yamt * found: release & unallocate aliased
150 1.13.2.2 yamt * old (well, actually, new) node
151 1.13.2.2 yamt */
152 1.13.2.2 yamt vp->v_op = spec_vnodeop_p;
153 1.13.2.2 yamt vp->v_flag &= ~VLOCKSWORK;
154 1.13.2.2 yamt vrele(vp);
155 1.13.2.2 yamt vgone(vp); /* cya */
156 1.13.2.2 yamt
157 1.13.2.2 yamt /* init "new" vnode */
158 1.13.2.2 yamt vp = nvp;
159 1.13.2.2 yamt vp->v_vnlock = NULL;
160 1.13.2.2 yamt vp->v_mount = mp;
161 1.13.2.2 yamt }
162 1.13.2.2 yamt break;
163 1.13.2.2 yamt
164 1.13.2.2 yamt case VFIFO:
165 1.13.2.2 yamt vp->v_op = puffs_fifoop_p;
166 1.13.2.2 yamt break;
167 1.13.2.2 yamt
168 1.13.2.2 yamt case VREG:
169 1.13.2.2 yamt uvm_vnp_setsize(vp, vsize);
170 1.13.2.2 yamt break;
171 1.13.2.2 yamt
172 1.13.2.2 yamt case VDIR:
173 1.13.2.2 yamt case VLNK:
174 1.13.2.2 yamt case VSOCK:
175 1.13.2.2 yamt break;
176 1.13.2.2 yamt default:
177 1.13.2.2 yamt #ifdef DIAGNOSTIC
178 1.13.2.2 yamt panic("puffs_getvnode: invalid vtype %d", type);
179 1.13.2.2 yamt #endif
180 1.13.2.2 yamt break;
181 1.13.2.2 yamt }
182 1.13.2.2 yamt
183 1.13.2.2 yamt pnode = pool_get(&puffs_pnpool, PR_WAITOK);
184 1.13.2.2 yamt pnode->pn_cookie = cookie;
185 1.13.2.2 yamt pnode->pn_stat = 0;
186 1.13.2.2 yamt LIST_INSERT_HEAD(&pmp->pmp_pnodelist, pnode, pn_entries);
187 1.13.2.2 yamt vp->v_data = pnode;
188 1.13.2.2 yamt vp->v_type = type;
189 1.13.2.2 yamt pnode->pn_vp = vp;
190 1.13.2.2 yamt
191 1.13.2.2 yamt genfs_node_init(vp, &puffs_genfsops);
192 1.13.2.2 yamt *vpp = vp;
193 1.13.2.2 yamt
194 1.13.2.2 yamt DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
195 1.13.2.2 yamt pnode, pnode->pn_cookie));
196 1.13.2.2 yamt
197 1.13.2.2 yamt return 0;
198 1.13.2.2 yamt }
199 1.13.2.2 yamt
200 1.13.2.2 yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
201 1.13.2.2 yamt int
202 1.13.2.2 yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
203 1.13.2.2 yamt void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
204 1.13.2.2 yamt {
205 1.13.2.2 yamt struct puffs_mount *pmp = MPTOPUFFSMP(mp);
206 1.13.2.2 yamt struct vnode *vp;
207 1.13.2.2 yamt int error;
208 1.13.2.2 yamt
209 1.13.2.2 yamt /* userspace probably has this as a NULL op */
210 1.13.2.2 yamt if (cookie == NULL) {
211 1.13.2.2 yamt error = EOPNOTSUPP;
212 1.13.2.2 yamt return error;
213 1.13.2.2 yamt }
214 1.13.2.2 yamt
215 1.13.2.2 yamt error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
216 1.13.2.2 yamt if (error)
217 1.13.2.2 yamt return error;
218 1.13.2.2 yamt
219 1.13.2.2 yamt vp->v_type = type;
220 1.13.2.2 yamt vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
221 1.13.2.2 yamt *vpp = vp;
222 1.13.2.2 yamt
223 1.13.2.2 yamt if ((cnp->cn_flags & MAKEENTRY) && PUFFS_DOCACHE(pmp))
224 1.13.2.2 yamt cache_enter(dvp, vp, cnp);
225 1.13.2.2 yamt
226 1.13.2.2 yamt return 0;
227 1.13.2.2 yamt }
228 1.13.2.2 yamt
229 1.13.2.2 yamt void
230 1.13.2.2 yamt puffs_putvnode(struct vnode *vp)
231 1.13.2.2 yamt {
232 1.13.2.2 yamt struct puffs_mount *pmp;
233 1.13.2.2 yamt struct puffs_node *pnode;
234 1.13.2.2 yamt
235 1.13.2.2 yamt pmp = VPTOPUFFSMP(vp);
236 1.13.2.2 yamt pnode = VPTOPP(vp);
237 1.13.2.2 yamt
238 1.13.2.2 yamt #ifdef DIAGNOSTIC
239 1.13.2.2 yamt if (vp->v_tag != VT_PUFFS)
240 1.13.2.2 yamt panic("puffs_putvnode: %p not a puffs vnode", vp);
241 1.13.2.2 yamt #endif
242 1.13.2.2 yamt
243 1.13.2.2 yamt LIST_REMOVE(pnode, pn_entries);
244 1.13.2.2 yamt pool_put(&puffs_pnpool, vp->v_data);
245 1.13.2.2 yamt vp->v_data = NULL;
246 1.13.2.2 yamt
247 1.13.2.2 yamt return;
248 1.13.2.2 yamt }
249 1.13.2.2 yamt
250 1.13.2.2 yamt /*
251 1.13.2.2 yamt * Locate the in-kernel vnode based on the cookie received given
252 1.13.2.2 yamt * from userspace. Returns a locked & referenced vnode, if found,
253 1.13.2.2 yamt * NULL otherwise.
254 1.13.2.2 yamt *
255 1.13.2.2 yamt * XXX: lists, although lookup cache mostly shields us from this
256 1.13.2.2 yamt */
257 1.13.2.2 yamt struct vnode *
258 1.13.2.2 yamt puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie)
259 1.13.2.2 yamt {
260 1.13.2.2 yamt struct puffs_node *pnode;
261 1.13.2.2 yamt struct vnode *vp;
262 1.13.2.2 yamt
263 1.13.2.2 yamt simple_lock(&pmp->pmp_lock);
264 1.13.2.2 yamt LIST_FOREACH(pnode, &pmp->pmp_pnodelist, pn_entries) {
265 1.13.2.2 yamt if (pnode->pn_cookie == cookie)
266 1.13.2.2 yamt break;
267 1.13.2.2 yamt }
268 1.13.2.2 yamt simple_unlock(&pmp->pmp_lock);
269 1.13.2.2 yamt if (!pnode)
270 1.13.2.2 yamt return NULL;
271 1.13.2.2 yamt vp = pnode->pn_vp;
272 1.13.2.2 yamt
273 1.13.2.2 yamt if (pnode->pn_stat & PNODE_INACTIVE) {
274 1.13.2.2 yamt if (vget(vp, LK_EXCLUSIVE | LK_RETRY))
275 1.13.2.2 yamt return NULL;
276 1.13.2.2 yamt } else {
277 1.13.2.2 yamt vref(vp);
278 1.13.2.2 yamt vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
279 1.13.2.2 yamt }
280 1.13.2.2 yamt return vp;
281 1.13.2.2 yamt }
282 1.13.2.2 yamt
283 1.13.2.2 yamt void
284 1.13.2.2 yamt puffs_makecn(struct puffs_kcn *pkcn, const struct componentname *cn)
285 1.13.2.2 yamt {
286 1.13.2.2 yamt
287 1.13.2.2 yamt pkcn->pkcn_nameiop = cn->cn_nameiop;
288 1.13.2.2 yamt pkcn->pkcn_flags = cn->cn_flags;
289 1.13.2.2 yamt pkcn->pkcn_pid = cn->cn_lwp->l_proc->p_pid;
290 1.13.2.2 yamt puffs_credcvt(&pkcn->pkcn_cred, cn->cn_cred);
291 1.13.2.2 yamt
292 1.13.2.2 yamt (void)memcpy(&pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
293 1.13.2.2 yamt pkcn->pkcn_name[cn->cn_namelen] = '\0';
294 1.13.2.2 yamt pkcn->pkcn_namelen = cn->cn_namelen;
295 1.13.2.2 yamt }
296 1.13.2.2 yamt
297 1.13.2.2 yamt /*
298 1.13.2.2 yamt * Convert given credentials to struct puffs_cred for userspace.
299 1.13.2.2 yamt */
300 1.13.2.2 yamt void
301 1.13.2.2 yamt puffs_credcvt(struct puffs_cred *pcr, const kauth_cred_t cred)
302 1.13.2.2 yamt {
303 1.13.2.2 yamt
304 1.13.2.2 yamt memset(pcr, 0, sizeof(struct puffs_cred));
305 1.13.2.2 yamt
306 1.13.2.2 yamt if (cred == NOCRED || cred == FSCRED) {
307 1.13.2.2 yamt pcr->pcr_type = PUFFCRED_TYPE_INTERNAL;
308 1.13.2.2 yamt if (cred == NOCRED)
309 1.13.2.2 yamt pcr->pcr_internal = PUFFCRED_CRED_NOCRED;
310 1.13.2.2 yamt if (cred == FSCRED)
311 1.13.2.2 yamt pcr->pcr_internal = PUFFCRED_CRED_FSCRED;
312 1.13.2.2 yamt } else {
313 1.13.2.2 yamt pcr->pcr_type = PUFFCRED_TYPE_UUC;
314 1.13.2.2 yamt kauth_cred_to_uucred(&pcr->pcr_uuc, cred);
315 1.13.2.2 yamt }
316 1.13.2.2 yamt }
317 1.13.2.2 yamt
318 1.13.2.2 yamt /*
319 1.13.2.2 yamt * Return pid. In case the operation is coming from within the
320 1.13.2.2 yamt * kernel without any process context, borrow the swapper's pid.
321 1.13.2.2 yamt */
322 1.13.2.2 yamt pid_t
323 1.13.2.2 yamt puffs_lwp2pid(struct lwp *l)
324 1.13.2.2 yamt {
325 1.13.2.2 yamt
326 1.13.2.2 yamt return l ? l->l_proc->p_pid : 0;
327 1.13.2.2 yamt }
328 1.13.2.2 yamt
329 1.13.2.2 yamt
330 1.13.2.2 yamt static void
331 1.13.2.2 yamt puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
332 1.13.2.2 yamt int flags)
333 1.13.2.2 yamt {
334 1.13.2.2 yamt
335 1.13.2.2 yamt *eobp = size;
336 1.13.2.2 yamt }
337 1.13.2.2 yamt
338 1.13.2.2 yamt static void
339 1.13.2.2 yamt puffs_gop_markupdate(struct vnode *vp, int flags)
340 1.13.2.2 yamt {
341 1.13.2.2 yamt int uflags = 0;
342 1.13.2.2 yamt
343 1.13.2.2 yamt if (flags & GOP_UPDATE_ACCESSED)
344 1.13.2.2 yamt uflags |= PUFFS_UPDATEATIME;
345 1.13.2.2 yamt if (flags & GOP_UPDATE_MODIFIED)
346 1.13.2.2 yamt uflags |= PUFFS_UPDATEMTIME;
347 1.13.2.2 yamt
348 1.13.2.2 yamt puffs_updatenode(vp, uflags);
349 1.13.2.2 yamt }
350 1.13.2.2 yamt
351 1.13.2.2 yamt void
352 1.13.2.2 yamt puffs_updatenode(struct vnode *vp, int flags)
353 1.13.2.2 yamt {
354 1.13.2.2 yamt struct timespec ts;
355 1.13.2.2 yamt struct puffs_vnreq_setattr *setattr_arg;
356 1.13.2.2 yamt
357 1.13.2.2 yamt if (flags == 0)
358 1.13.2.2 yamt return;
359 1.13.2.2 yamt
360 1.13.2.2 yamt setattr_arg = malloc(sizeof(struct puffs_vnreq_setattr), M_PUFFS,
361 1.13.2.2 yamt M_NOWAIT | M_ZERO);
362 1.13.2.2 yamt if (setattr_arg == NULL)
363 1.13.2.2 yamt return; /* 2bad */
364 1.13.2.2 yamt
365 1.13.2.2 yamt nanotime(&ts);
366 1.13.2.2 yamt
367 1.13.2.2 yamt VATTR_NULL(&setattr_arg->pvnr_va);
368 1.13.2.2 yamt if (flags & PUFFS_UPDATEATIME)
369 1.13.2.2 yamt setattr_arg->pvnr_va.va_atime = ts;
370 1.13.2.2 yamt if (flags & PUFFS_UPDATECTIME)
371 1.13.2.2 yamt setattr_arg->pvnr_va.va_ctime = ts;
372 1.13.2.2 yamt if (flags & PUFFS_UPDATEMTIME)
373 1.13.2.2 yamt setattr_arg->pvnr_va.va_mtime = ts;
374 1.13.2.2 yamt if (flags & PUFFS_UPDATESIZE)
375 1.13.2.2 yamt setattr_arg->pvnr_va.va_size = vp->v_size;
376 1.13.2.2 yamt
377 1.13.2.2 yamt setattr_arg->pvnr_pid = 0;
378 1.13.2.2 yamt puffs_credcvt(&setattr_arg->pvnr_cred, NOCRED);
379 1.13.2.2 yamt
380 1.13.2.2 yamt /* setattr_arg ownership shifted to callee */
381 1.13.2.2 yamt puffs_vntouser_faf(MPTOPUFFSMP(vp->v_mount), PUFFS_VN_SETATTR,
382 1.13.2.2 yamt setattr_arg, sizeof(struct puffs_vnreq_setattr), VPTOPNC(vp));
383 1.13.2.2 yamt }
384 1.13.2.2 yamt
385 1.13.2.2 yamt void
386 1.13.2.2 yamt puffs_updatevpsize(struct vnode *vp)
387 1.13.2.2 yamt {
388 1.13.2.2 yamt struct vattr va;
389 1.13.2.2 yamt
390 1.13.2.2 yamt if (VOP_GETATTR(vp, &va, FSCRED, NULL))
391 1.13.2.2 yamt return;
392 1.13.2.2 yamt
393 1.13.2.2 yamt if (va.va_size != VNOVAL)
394 1.13.2.2 yamt vp->v_size = va.va_size;
395 1.13.2.2 yamt }
396 1.13.2.2 yamt
397 1.13.2.2 yamt /*
398 1.13.2.2 yamt * We're dead, kaput, RIP, slightly more than merely pining for the
399 1.13.2.2 yamt * fjords, belly-up, fallen, lifeless, finished, expired, gone to meet
400 1.13.2.2 yamt * our maker, ceased to be, etcetc. YASD. It's a dead FS!
401 1.13.2.2 yamt */
402 1.13.2.2 yamt void
403 1.13.2.2 yamt puffs_userdead(struct puffs_mount *pmp)
404 1.13.2.2 yamt {
405 1.13.2.2 yamt struct puffs_park *park;
406 1.13.2.2 yamt
407 1.13.2.2 yamt simple_lock(&pmp->pmp_lock);
408 1.13.2.2 yamt
409 1.13.2.2 yamt /*
410 1.13.2.2 yamt * Mark filesystem status as dying so that operations don't
411 1.13.2.2 yamt * attempt to march to userspace any longer.
412 1.13.2.2 yamt */
413 1.13.2.2 yamt pmp->pmp_status = PUFFSTAT_DYING;
414 1.13.2.2 yamt
415 1.13.2.2 yamt /* and wakeup processes waiting for a reply from userspace */
416 1.13.2.2 yamt TAILQ_FOREACH(park, &pmp->pmp_req_replywait, park_entries) {
417 1.13.2.2 yamt park->park_preq->preq_rv = ENXIO;
418 1.13.2.2 yamt TAILQ_REMOVE(&pmp->pmp_req_replywait, park, park_entries);
419 1.13.2.2 yamt wakeup(park);
420 1.13.2.2 yamt }
421 1.13.2.2 yamt
422 1.13.2.2 yamt /* wakeup waiters for completion of vfs/vnode requests */
423 1.13.2.2 yamt TAILQ_FOREACH(park, &pmp->pmp_req_touser, park_entries) {
424 1.13.2.2 yamt park->park_preq->preq_rv = ENXIO;
425 1.13.2.2 yamt TAILQ_REMOVE(&pmp->pmp_req_touser, park, park_entries);
426 1.13.2.2 yamt wakeup(park);
427 1.13.2.2 yamt }
428 1.13.2.2 yamt
429 1.13.2.2 yamt simple_unlock(&pmp->pmp_lock);
430 1.13.2.2 yamt }
431