Home | History | Annotate | Line # | Download | only in puffs
puffs_subr.c revision 1.13.2.3
      1  1.13.2.3  yamt /*	$NetBSD: puffs_subr.c,v 1.13.2.3 2007/02/26 09:10:57 yamt Exp $	*/
      2  1.13.2.2  yamt 
      3  1.13.2.2  yamt /*
      4  1.13.2.2  yamt  * Copyright (c) 2005, 2006  Antti Kantee.  All Rights Reserved.
      5  1.13.2.2  yamt  *
      6  1.13.2.2  yamt  * Development of this software was supported by the
      7  1.13.2.2  yamt  * Google Summer of Code program and the Ulla Tuominen Foundation.
      8  1.13.2.2  yamt  * The Google SoC project was mentored by Bill Studenmund.
      9  1.13.2.2  yamt  *
     10  1.13.2.2  yamt  * Redistribution and use in source and binary forms, with or without
     11  1.13.2.2  yamt  * modification, are permitted provided that the following conditions
     12  1.13.2.2  yamt  * are met:
     13  1.13.2.2  yamt  * 1. Redistributions of source code must retain the above copyright
     14  1.13.2.2  yamt  *    notice, this list of conditions and the following disclaimer.
     15  1.13.2.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.13.2.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     17  1.13.2.2  yamt  *    documentation and/or other materials provided with the distribution.
     18  1.13.2.2  yamt  * 3. The name of the company nor the name of the author may be used to
     19  1.13.2.2  yamt  *    endorse or promote products derived from this software without specific
     20  1.13.2.2  yamt  *    prior written permission.
     21  1.13.2.2  yamt  *
     22  1.13.2.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
     23  1.13.2.2  yamt  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     24  1.13.2.2  yamt  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     25  1.13.2.2  yamt  * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     26  1.13.2.2  yamt  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     27  1.13.2.2  yamt  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     28  1.13.2.2  yamt  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     29  1.13.2.2  yamt  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     30  1.13.2.2  yamt  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     31  1.13.2.2  yamt  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     32  1.13.2.2  yamt  * SUCH DAMAGE.
     33  1.13.2.2  yamt  */
     34  1.13.2.2  yamt 
     35  1.13.2.2  yamt #include <sys/cdefs.h>
     36  1.13.2.3  yamt __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.13.2.3 2007/02/26 09:10:57 yamt Exp $");
     37  1.13.2.2  yamt 
     38  1.13.2.2  yamt #include <sys/param.h>
     39  1.13.2.2  yamt #include <sys/conf.h>
     40  1.13.2.3  yamt #include <sys/hash.h>
     41  1.13.2.2  yamt #include <sys/malloc.h>
     42  1.13.2.2  yamt #include <sys/mount.h>
     43  1.13.2.2  yamt #include <sys/socketvar.h>
     44  1.13.2.2  yamt #include <sys/vnode.h>
     45  1.13.2.2  yamt #include <sys/kauth.h>
     46  1.13.2.2  yamt #include <sys/namei.h>
     47  1.13.2.2  yamt 
     48  1.13.2.2  yamt #include <fs/puffs/puffs_msgif.h>
     49  1.13.2.2  yamt #include <fs/puffs/puffs_sys.h>
     50  1.13.2.2  yamt 
     51  1.13.2.2  yamt #include <miscfs/genfs/genfs_node.h>
     52  1.13.2.2  yamt #include <miscfs/specfs/specdev.h>
     53  1.13.2.2  yamt 
     54  1.13.2.2  yamt POOL_INIT(puffs_pnpool, sizeof(struct puffs_node), 0, 0, 0, "puffspnpl",
     55  1.13.2.2  yamt     &pool_allocator_nointr);
     56  1.13.2.2  yamt 
     57  1.13.2.3  yamt #ifdef PUFFSDEBUG
     58  1.13.2.2  yamt int puffsdebug;
     59  1.13.2.2  yamt #endif
     60  1.13.2.2  yamt 
     61  1.13.2.3  yamt static __inline struct puffs_node_hashlist
     62  1.13.2.3  yamt 	*puffs_cookie2hashlist(struct puffs_mount *, void *);
     63  1.13.2.3  yamt static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
     64  1.13.2.2  yamt 
     65  1.13.2.2  yamt static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
     66  1.13.2.2  yamt static void puffs_gop_markupdate(struct vnode *, int);
     67  1.13.2.2  yamt 
     68  1.13.2.2  yamt static const struct genfs_ops puffs_genfsops = {
     69  1.13.2.2  yamt 	.gop_size = puffs_gop_size,
     70  1.13.2.2  yamt 	.gop_write = genfs_gop_write,
     71  1.13.2.2  yamt 	.gop_markupdate = puffs_gop_markupdate,
     72  1.13.2.2  yamt #if 0
     73  1.13.2.2  yamt 	.gop_alloc, should ask userspace
     74  1.13.2.2  yamt #endif
     75  1.13.2.2  yamt };
     76  1.13.2.2  yamt 
     77  1.13.2.2  yamt /*
     78  1.13.2.2  yamt  * Grab a vnode, intialize all the puffs-dependant stuff.
     79  1.13.2.2  yamt  */
     80  1.13.2.2  yamt int
     81  1.13.2.2  yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
     82  1.13.2.2  yamt 	voff_t vsize, dev_t rdev, struct vnode **vpp)
     83  1.13.2.2  yamt {
     84  1.13.2.2  yamt 	struct puffs_mount *pmp;
     85  1.13.2.2  yamt 	struct vnode *vp, *nvp;
     86  1.13.2.2  yamt 	struct puffs_node *pnode;
     87  1.13.2.3  yamt 	struct puffs_node_hashlist *plist;
     88  1.13.2.2  yamt 	int error;
     89  1.13.2.2  yamt 
     90  1.13.2.2  yamt 	pmp = MPTOPUFFSMP(mp);
     91  1.13.2.2  yamt 
     92  1.13.2.2  yamt 	/*
     93  1.13.2.2  yamt 	 * XXX: there is a deadlock condition between vfs_busy() and
     94  1.13.2.2  yamt 	 * vnode locks.  For an unmounting file system the mountpoint
     95  1.13.2.2  yamt 	 * is frozen, but in unmount(FORCE) vflush() wants to access all
     96  1.13.2.2  yamt 	 * of the vnodes.  If we are here waiting for the mountpoint
     97  1.13.2.2  yamt 	 * lock while holding on to a vnode lock, well, we ain't
     98  1.13.2.2  yamt 	 * just pining for the fjords anymore.  If we release the
     99  1.13.2.2  yamt 	 * vnode lock, we will be in the situation "mount point
    100  1.13.2.2  yamt 	 * is dying" and panic() will ensue in insmntque.  So as a
    101  1.13.2.2  yamt 	 * temporary workaround, get a vnode without putting it on
    102  1.13.2.2  yamt 	 * the mount point list, check if mount point is still alive
    103  1.13.2.2  yamt 	 * and kicking and only then add the vnode to the list.
    104  1.13.2.2  yamt 	 */
    105  1.13.2.2  yamt 	error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
    106  1.13.2.2  yamt 	if (error)
    107  1.13.2.2  yamt 		return error;
    108  1.13.2.2  yamt 	vp->v_vnlock = NULL;
    109  1.13.2.2  yamt 	vp->v_type = type;
    110  1.13.2.2  yamt 
    111  1.13.2.2  yamt 	/*
    112  1.13.2.2  yamt 	 * Check what mount point isn't going away.  This will work
    113  1.13.2.2  yamt 	 * until we decide to remove biglock or make the kernel
    114  1.13.2.2  yamt 	 * preemptive.  But hopefully the real problem will be fixed
    115  1.13.2.2  yamt 	 * by then.
    116  1.13.2.2  yamt 	 *
    117  1.13.2.2  yamt 	 * XXX: yes, should call vfs_busy(), but thar be rabbits with
    118  1.13.2.2  yamt 	 * vicious streaks a mile wide ...
    119  1.13.2.2  yamt 	 */
    120  1.13.2.2  yamt 	if (mp->mnt_iflag & IMNT_UNMOUNT) {
    121  1.13.2.2  yamt 		DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
    122  1.13.2.2  yamt 		    "vnode for cookie %p\n", mp, cookie));
    123  1.13.2.2  yamt 		ungetnewvnode(vp);
    124  1.13.2.2  yamt 		return ENXIO;
    125  1.13.2.2  yamt 	}
    126  1.13.2.2  yamt 
    127  1.13.2.2  yamt 	/* So it's not dead yet.. good.. inform new vnode of its master */
    128  1.13.2.2  yamt 	simple_lock(&mntvnode_slock);
    129  1.13.2.3  yamt 	TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
    130  1.13.2.2  yamt 	simple_unlock(&mntvnode_slock);
    131  1.13.2.2  yamt 	vp->v_mount = mp;
    132  1.13.2.2  yamt 
    133  1.13.2.2  yamt 	/*
    134  1.13.2.2  yamt 	 * clerical tasks & footwork
    135  1.13.2.2  yamt 	 */
    136  1.13.2.2  yamt 
    137  1.13.2.2  yamt 	/* dances based on vnode type. almost ufs_vinit(), but not quite */
    138  1.13.2.2  yamt 	switch (type) {
    139  1.13.2.2  yamt 	case VCHR:
    140  1.13.2.2  yamt 	case VBLK:
    141  1.13.2.2  yamt 		/*
    142  1.13.2.2  yamt 		 * replace vnode operation vector with the specops vector.
    143  1.13.2.2  yamt 		 * our user server has very little control over the node
    144  1.13.2.2  yamt 		 * if it decides its a character or block special file
    145  1.13.2.2  yamt 		 */
    146  1.13.2.2  yamt 		vp->v_op = puffs_specop_p;
    147  1.13.2.2  yamt 
    148  1.13.2.2  yamt 		/* do the standard checkalias-dance */
    149  1.13.2.2  yamt 		if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
    150  1.13.2.2  yamt 			/*
    151  1.13.2.2  yamt 			 * found: release & unallocate aliased
    152  1.13.2.2  yamt 			 * old (well, actually, new) node
    153  1.13.2.2  yamt 			 */
    154  1.13.2.2  yamt 			vp->v_op = spec_vnodeop_p;
    155  1.13.2.2  yamt 			vp->v_flag &= ~VLOCKSWORK;
    156  1.13.2.2  yamt 			vrele(vp);
    157  1.13.2.2  yamt 			vgone(vp); /* cya */
    158  1.13.2.2  yamt 
    159  1.13.2.2  yamt 			/* init "new" vnode */
    160  1.13.2.2  yamt 			vp = nvp;
    161  1.13.2.2  yamt 			vp->v_vnlock = NULL;
    162  1.13.2.2  yamt 			vp->v_mount = mp;
    163  1.13.2.2  yamt 		}
    164  1.13.2.2  yamt 		break;
    165  1.13.2.2  yamt 
    166  1.13.2.2  yamt 	case VFIFO:
    167  1.13.2.2  yamt 		vp->v_op = puffs_fifoop_p;
    168  1.13.2.2  yamt 		break;
    169  1.13.2.2  yamt 
    170  1.13.2.2  yamt 	case VREG:
    171  1.13.2.2  yamt 		uvm_vnp_setsize(vp, vsize);
    172  1.13.2.2  yamt 		break;
    173  1.13.2.2  yamt 
    174  1.13.2.2  yamt 	case VDIR:
    175  1.13.2.2  yamt 	case VLNK:
    176  1.13.2.2  yamt 	case VSOCK:
    177  1.13.2.2  yamt 		break;
    178  1.13.2.2  yamt 	default:
    179  1.13.2.2  yamt #ifdef DIAGNOSTIC
    180  1.13.2.2  yamt 		panic("puffs_getvnode: invalid vtype %d", type);
    181  1.13.2.2  yamt #endif
    182  1.13.2.2  yamt 		break;
    183  1.13.2.2  yamt 	}
    184  1.13.2.2  yamt 
    185  1.13.2.2  yamt 	pnode = pool_get(&puffs_pnpool, PR_WAITOK);
    186  1.13.2.2  yamt 	pnode->pn_cookie = cookie;
    187  1.13.2.2  yamt 	pnode->pn_stat = 0;
    188  1.13.2.3  yamt 	plist = puffs_cookie2hashlist(pmp, cookie);
    189  1.13.2.3  yamt 	LIST_INSERT_HEAD(plist, pnode, pn_hashent);
    190  1.13.2.2  yamt 	vp->v_data = pnode;
    191  1.13.2.2  yamt 	vp->v_type = type;
    192  1.13.2.2  yamt 	pnode->pn_vp = vp;
    193  1.13.2.2  yamt 
    194  1.13.2.2  yamt 	genfs_node_init(vp, &puffs_genfsops);
    195  1.13.2.2  yamt 	*vpp = vp;
    196  1.13.2.2  yamt 
    197  1.13.2.2  yamt 	DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
    198  1.13.2.2  yamt 	    pnode, pnode->pn_cookie));
    199  1.13.2.2  yamt 
    200  1.13.2.2  yamt 	return 0;
    201  1.13.2.2  yamt }
    202  1.13.2.2  yamt 
    203  1.13.2.2  yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
    204  1.13.2.2  yamt int
    205  1.13.2.2  yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
    206  1.13.2.2  yamt 	void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
    207  1.13.2.2  yamt {
    208  1.13.2.2  yamt 	struct puffs_mount *pmp = MPTOPUFFSMP(mp);
    209  1.13.2.2  yamt 	struct vnode *vp;
    210  1.13.2.2  yamt 	int error;
    211  1.13.2.2  yamt 
    212  1.13.2.2  yamt 	/* userspace probably has this as a NULL op */
    213  1.13.2.2  yamt 	if (cookie == NULL) {
    214  1.13.2.2  yamt 		error = EOPNOTSUPP;
    215  1.13.2.2  yamt 		return error;
    216  1.13.2.2  yamt 	}
    217  1.13.2.2  yamt 
    218  1.13.2.3  yamt 	/*
    219  1.13.2.3  yamt 	 * Check for previous node with the same designation.
    220  1.13.2.3  yamt 	 * Explicitly check the root node cookie, since it might be
    221  1.13.2.3  yamt 	 * reclaimed from the kernel when this check is made.
    222  1.13.2.3  yamt 	 *
    223  1.13.2.3  yamt 	 * XXX: technically this error check should punish the fs,
    224  1.13.2.3  yamt 	 * not the caller.
    225  1.13.2.3  yamt 	 */
    226  1.13.2.3  yamt 	simple_lock(&pmp->pmp_lock);
    227  1.13.2.3  yamt 	if (cookie == pmp->pmp_rootcookie
    228  1.13.2.3  yamt 	    || puffs_cookie2pnode(pmp, cookie) != NULL) {
    229  1.13.2.3  yamt 		simple_unlock(&pmp->pmp_lock);
    230  1.13.2.3  yamt 		error = EEXIST;
    231  1.13.2.3  yamt 		return error;
    232  1.13.2.3  yamt 	}
    233  1.13.2.3  yamt 	simple_unlock(&pmp->pmp_lock);
    234  1.13.2.3  yamt 
    235  1.13.2.2  yamt 	error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
    236  1.13.2.2  yamt 	if (error)
    237  1.13.2.2  yamt 		return error;
    238  1.13.2.2  yamt 
    239  1.13.2.2  yamt 	vp->v_type = type;
    240  1.13.2.2  yamt 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    241  1.13.2.2  yamt 	*vpp = vp;
    242  1.13.2.2  yamt 
    243  1.13.2.2  yamt 	if ((cnp->cn_flags & MAKEENTRY) && PUFFS_DOCACHE(pmp))
    244  1.13.2.2  yamt 		cache_enter(dvp, vp, cnp);
    245  1.13.2.2  yamt 
    246  1.13.2.2  yamt 	return 0;
    247  1.13.2.2  yamt }
    248  1.13.2.2  yamt 
    249  1.13.2.2  yamt void
    250  1.13.2.2  yamt puffs_putvnode(struct vnode *vp)
    251  1.13.2.2  yamt {
    252  1.13.2.2  yamt 	struct puffs_mount *pmp;
    253  1.13.2.2  yamt 	struct puffs_node *pnode;
    254  1.13.2.2  yamt 
    255  1.13.2.2  yamt 	pmp = VPTOPUFFSMP(vp);
    256  1.13.2.2  yamt 	pnode = VPTOPP(vp);
    257  1.13.2.2  yamt 
    258  1.13.2.2  yamt #ifdef DIAGNOSTIC
    259  1.13.2.2  yamt 	if (vp->v_tag != VT_PUFFS)
    260  1.13.2.2  yamt 		panic("puffs_putvnode: %p not a puffs vnode", vp);
    261  1.13.2.2  yamt #endif
    262  1.13.2.2  yamt 
    263  1.13.2.3  yamt 	LIST_REMOVE(pnode, pn_hashent);
    264  1.13.2.3  yamt 	genfs_node_destroy(vp);
    265  1.13.2.2  yamt 	pool_put(&puffs_pnpool, vp->v_data);
    266  1.13.2.2  yamt 	vp->v_data = NULL;
    267  1.13.2.2  yamt 
    268  1.13.2.2  yamt 	return;
    269  1.13.2.2  yamt }
    270  1.13.2.2  yamt 
    271  1.13.2.3  yamt static __inline struct puffs_node_hashlist *
    272  1.13.2.3  yamt puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
    273  1.13.2.3  yamt {
    274  1.13.2.3  yamt 	uint32_t hash;
    275  1.13.2.3  yamt 
    276  1.13.2.3  yamt 	hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
    277  1.13.2.3  yamt 	return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
    278  1.13.2.3  yamt }
    279  1.13.2.3  yamt 
    280  1.13.2.3  yamt /*
    281  1.13.2.3  yamt  * Translate cookie to puffs_node.  Caller must hold mountpoint
    282  1.13.2.3  yamt  * lock and it will be held upon return.
    283  1.13.2.3  yamt  */
    284  1.13.2.3  yamt static struct puffs_node *
    285  1.13.2.3  yamt puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
    286  1.13.2.3  yamt {
    287  1.13.2.3  yamt 	struct puffs_node_hashlist *plist;
    288  1.13.2.3  yamt 	struct puffs_node *pnode;
    289  1.13.2.3  yamt 
    290  1.13.2.3  yamt 	plist = puffs_cookie2hashlist(pmp, cookie);
    291  1.13.2.3  yamt 	LIST_FOREACH(pnode, plist, pn_hashent) {
    292  1.13.2.3  yamt 		if (pnode->pn_cookie == cookie)
    293  1.13.2.3  yamt 			break;
    294  1.13.2.3  yamt 	}
    295  1.13.2.3  yamt 
    296  1.13.2.3  yamt 	return pnode;
    297  1.13.2.3  yamt }
    298  1.13.2.3  yamt 
    299  1.13.2.2  yamt /*
    300  1.13.2.2  yamt  * Locate the in-kernel vnode based on the cookie received given
    301  1.13.2.3  yamt  * from userspace.  Returns a vnode, if found, NULL otherwise.
    302  1.13.2.3  yamt  * The parameter "lock" control whether to lock the possible or
    303  1.13.2.3  yamt  * not.  Locking always might cause us to lock against ourselves
    304  1.13.2.3  yamt  * in situations where we want the vnode but don't care for the
    305  1.13.2.3  yamt  * vnode lock, e.g. file server issued putpages.
    306  1.13.2.2  yamt  */
    307  1.13.2.2  yamt struct vnode *
    308  1.13.2.3  yamt puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie, int lock)
    309  1.13.2.2  yamt {
    310  1.13.2.2  yamt 	struct puffs_node *pnode;
    311  1.13.2.2  yamt 	struct vnode *vp;
    312  1.13.2.3  yamt 	int vgetflags;
    313  1.13.2.3  yamt 
    314  1.13.2.3  yamt 	/*
    315  1.13.2.3  yamt 	 * If we're trying to get the root vnode, return it through
    316  1.13.2.3  yamt 	 * puffs_root() to get all the right things set.  Lock must
    317  1.13.2.3  yamt 	 * be set, since VFS_ROOT() always locks the returned vnode.
    318  1.13.2.3  yamt 	 */
    319  1.13.2.3  yamt 	if (cookie == pmp->pmp_rootcookie) {
    320  1.13.2.3  yamt 		if (!lock)
    321  1.13.2.3  yamt 			return NULL;
    322  1.13.2.3  yamt 		if (VFS_ROOT(pmp->pmp_mp, &vp))
    323  1.13.2.3  yamt 			return NULL;
    324  1.13.2.3  yamt 
    325  1.13.2.3  yamt 		return vp;
    326  1.13.2.3  yamt 	}
    327  1.13.2.3  yamt 
    328  1.13.2.3  yamt 	vgetflags = LK_INTERLOCK;
    329  1.13.2.3  yamt 	if (lock)
    330  1.13.2.3  yamt 		vgetflags |= LK_EXCLUSIVE | LK_RETRY;
    331  1.13.2.2  yamt 
    332  1.13.2.2  yamt 	simple_lock(&pmp->pmp_lock);
    333  1.13.2.3  yamt 	pnode = puffs_cookie2pnode(pmp, cookie);
    334  1.13.2.3  yamt 
    335  1.13.2.3  yamt 	if (pnode == NULL) {
    336  1.13.2.3  yamt 		simple_unlock(&pmp->pmp_lock);
    337  1.13.2.3  yamt 		return NULL;
    338  1.13.2.2  yamt 	}
    339  1.13.2.3  yamt 	vp = pnode->pn_vp;
    340  1.13.2.3  yamt 
    341  1.13.2.3  yamt 	simple_lock(&vp->v_interlock);
    342  1.13.2.2  yamt 	simple_unlock(&pmp->pmp_lock);
    343  1.13.2.3  yamt 
    344  1.13.2.3  yamt 	if (vget(vp, vgetflags))
    345  1.13.2.2  yamt 		return NULL;
    346  1.13.2.2  yamt 
    347  1.13.2.2  yamt 	return vp;
    348  1.13.2.2  yamt }
    349  1.13.2.2  yamt 
    350  1.13.2.2  yamt void
    351  1.13.2.2  yamt puffs_makecn(struct puffs_kcn *pkcn, const struct componentname *cn)
    352  1.13.2.2  yamt {
    353  1.13.2.2  yamt 
    354  1.13.2.2  yamt 	pkcn->pkcn_nameiop = cn->cn_nameiop;
    355  1.13.2.2  yamt 	pkcn->pkcn_flags = cn->cn_flags;
    356  1.13.2.2  yamt 	pkcn->pkcn_pid = cn->cn_lwp->l_proc->p_pid;
    357  1.13.2.2  yamt 	puffs_credcvt(&pkcn->pkcn_cred, cn->cn_cred);
    358  1.13.2.2  yamt 
    359  1.13.2.2  yamt 	(void)memcpy(&pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
    360  1.13.2.2  yamt 	pkcn->pkcn_name[cn->cn_namelen] = '\0';
    361  1.13.2.2  yamt 	pkcn->pkcn_namelen = cn->cn_namelen;
    362  1.13.2.2  yamt }
    363  1.13.2.2  yamt 
    364  1.13.2.2  yamt /*
    365  1.13.2.2  yamt  * Convert given credentials to struct puffs_cred for userspace.
    366  1.13.2.2  yamt  */
    367  1.13.2.2  yamt void
    368  1.13.2.2  yamt puffs_credcvt(struct puffs_cred *pcr, const kauth_cred_t cred)
    369  1.13.2.2  yamt {
    370  1.13.2.2  yamt 
    371  1.13.2.2  yamt 	memset(pcr, 0, sizeof(struct puffs_cred));
    372  1.13.2.2  yamt 
    373  1.13.2.2  yamt 	if (cred == NOCRED || cred == FSCRED) {
    374  1.13.2.2  yamt 		pcr->pcr_type = PUFFCRED_TYPE_INTERNAL;
    375  1.13.2.2  yamt 		if (cred == NOCRED)
    376  1.13.2.2  yamt 			pcr->pcr_internal = PUFFCRED_CRED_NOCRED;
    377  1.13.2.2  yamt 		if (cred == FSCRED)
    378  1.13.2.2  yamt 			pcr->pcr_internal = PUFFCRED_CRED_FSCRED;
    379  1.13.2.2  yamt  	} else {
    380  1.13.2.2  yamt 		pcr->pcr_type = PUFFCRED_TYPE_UUC;
    381  1.13.2.2  yamt 		kauth_cred_to_uucred(&pcr->pcr_uuc, cred);
    382  1.13.2.2  yamt 	}
    383  1.13.2.2  yamt }
    384  1.13.2.2  yamt 
    385  1.13.2.2  yamt /*
    386  1.13.2.2  yamt  * Return pid.  In case the operation is coming from within the
    387  1.13.2.2  yamt  * kernel without any process context, borrow the swapper's pid.
    388  1.13.2.2  yamt  */
    389  1.13.2.2  yamt pid_t
    390  1.13.2.2  yamt puffs_lwp2pid(struct lwp *l)
    391  1.13.2.2  yamt {
    392  1.13.2.2  yamt 
    393  1.13.2.2  yamt 	return l ? l->l_proc->p_pid : 0;
    394  1.13.2.2  yamt }
    395  1.13.2.2  yamt 
    396  1.13.2.2  yamt 
    397  1.13.2.2  yamt static void
    398  1.13.2.2  yamt puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
    399  1.13.2.2  yamt 	int flags)
    400  1.13.2.2  yamt {
    401  1.13.2.2  yamt 
    402  1.13.2.2  yamt 	*eobp = size;
    403  1.13.2.2  yamt }
    404  1.13.2.2  yamt 
    405  1.13.2.2  yamt static void
    406  1.13.2.2  yamt puffs_gop_markupdate(struct vnode *vp, int flags)
    407  1.13.2.2  yamt {
    408  1.13.2.2  yamt 	int uflags = 0;
    409  1.13.2.2  yamt 
    410  1.13.2.2  yamt 	if (flags & GOP_UPDATE_ACCESSED)
    411  1.13.2.2  yamt 		uflags |= PUFFS_UPDATEATIME;
    412  1.13.2.2  yamt 	if (flags & GOP_UPDATE_MODIFIED)
    413  1.13.2.2  yamt 		uflags |= PUFFS_UPDATEMTIME;
    414  1.13.2.2  yamt 
    415  1.13.2.2  yamt 	puffs_updatenode(vp, uflags);
    416  1.13.2.2  yamt }
    417  1.13.2.2  yamt 
    418  1.13.2.2  yamt void
    419  1.13.2.2  yamt puffs_updatenode(struct vnode *vp, int flags)
    420  1.13.2.2  yamt {
    421  1.13.2.2  yamt 	struct timespec ts;
    422  1.13.2.2  yamt 	struct puffs_vnreq_setattr *setattr_arg;
    423  1.13.2.2  yamt 
    424  1.13.2.2  yamt 	if (flags == 0)
    425  1.13.2.2  yamt 		return;
    426  1.13.2.2  yamt 
    427  1.13.2.2  yamt 	setattr_arg = malloc(sizeof(struct puffs_vnreq_setattr), M_PUFFS,
    428  1.13.2.2  yamt 	    M_NOWAIT | M_ZERO);
    429  1.13.2.2  yamt 	if (setattr_arg == NULL)
    430  1.13.2.2  yamt 		return; /* 2bad */
    431  1.13.2.2  yamt 
    432  1.13.2.2  yamt 	nanotime(&ts);
    433  1.13.2.2  yamt 
    434  1.13.2.2  yamt 	VATTR_NULL(&setattr_arg->pvnr_va);
    435  1.13.2.2  yamt 	if (flags & PUFFS_UPDATEATIME)
    436  1.13.2.2  yamt 		setattr_arg->pvnr_va.va_atime = ts;
    437  1.13.2.2  yamt 	if (flags & PUFFS_UPDATECTIME)
    438  1.13.2.2  yamt 		setattr_arg->pvnr_va.va_ctime = ts;
    439  1.13.2.2  yamt 	if (flags & PUFFS_UPDATEMTIME)
    440  1.13.2.2  yamt 		setattr_arg->pvnr_va.va_mtime = ts;
    441  1.13.2.2  yamt 	if (flags & PUFFS_UPDATESIZE)
    442  1.13.2.2  yamt 		setattr_arg->pvnr_va.va_size = vp->v_size;
    443  1.13.2.2  yamt 
    444  1.13.2.2  yamt 	setattr_arg->pvnr_pid = 0;
    445  1.13.2.2  yamt 	puffs_credcvt(&setattr_arg->pvnr_cred, NOCRED);
    446  1.13.2.2  yamt 
    447  1.13.2.2  yamt 	/* setattr_arg ownership shifted to callee */
    448  1.13.2.2  yamt 	puffs_vntouser_faf(MPTOPUFFSMP(vp->v_mount), PUFFS_VN_SETATTR,
    449  1.13.2.2  yamt 	    setattr_arg, sizeof(struct puffs_vnreq_setattr), VPTOPNC(vp));
    450  1.13.2.2  yamt }
    451  1.13.2.2  yamt 
    452  1.13.2.2  yamt void
    453  1.13.2.2  yamt puffs_updatevpsize(struct vnode *vp)
    454  1.13.2.2  yamt {
    455  1.13.2.2  yamt 	struct vattr va;
    456  1.13.2.2  yamt 
    457  1.13.2.2  yamt 	if (VOP_GETATTR(vp, &va, FSCRED, NULL))
    458  1.13.2.2  yamt 		return;
    459  1.13.2.2  yamt 
    460  1.13.2.2  yamt 	if (va.va_size != VNOVAL)
    461  1.13.2.2  yamt 		vp->v_size = va.va_size;
    462  1.13.2.2  yamt }
    463  1.13.2.2  yamt 
    464  1.13.2.2  yamt /*
    465  1.13.2.2  yamt  * We're dead, kaput, RIP, slightly more than merely pining for the
    466  1.13.2.2  yamt  * fjords, belly-up, fallen, lifeless, finished, expired, gone to meet
    467  1.13.2.2  yamt  * our maker, ceased to be, etcetc.  YASD.  It's a dead FS!
    468  1.13.2.3  yamt  *
    469  1.13.2.3  yamt  * Caller must hold puffs spinlock.
    470  1.13.2.2  yamt  */
    471  1.13.2.2  yamt void
    472  1.13.2.2  yamt puffs_userdead(struct puffs_mount *pmp)
    473  1.13.2.2  yamt {
    474  1.13.2.2  yamt 	struct puffs_park *park;
    475  1.13.2.2  yamt 
    476  1.13.2.2  yamt 	/*
    477  1.13.2.2  yamt 	 * Mark filesystem status as dying so that operations don't
    478  1.13.2.2  yamt 	 * attempt to march to userspace any longer.
    479  1.13.2.2  yamt 	 */
    480  1.13.2.2  yamt 	pmp->pmp_status = PUFFSTAT_DYING;
    481  1.13.2.2  yamt 
    482  1.13.2.2  yamt 	/* and wakeup processes waiting for a reply from userspace */
    483  1.13.2.2  yamt 	TAILQ_FOREACH(park, &pmp->pmp_req_replywait, park_entries) {
    484  1.13.2.2  yamt 		park->park_preq->preq_rv = ENXIO;
    485  1.13.2.2  yamt 		TAILQ_REMOVE(&pmp->pmp_req_replywait, park, park_entries);
    486  1.13.2.2  yamt 		wakeup(park);
    487  1.13.2.2  yamt 	}
    488  1.13.2.2  yamt 
    489  1.13.2.2  yamt 	/* wakeup waiters for completion of vfs/vnode requests */
    490  1.13.2.2  yamt 	TAILQ_FOREACH(park, &pmp->pmp_req_touser, park_entries) {
    491  1.13.2.2  yamt 		park->park_preq->preq_rv = ENXIO;
    492  1.13.2.2  yamt 		TAILQ_REMOVE(&pmp->pmp_req_touser, park, park_entries);
    493  1.13.2.2  yamt 		wakeup(park);
    494  1.13.2.2  yamt 	}
    495  1.13.2.2  yamt }
    496