puffs_subr.c revision 1.13.2.3 1 1.13.2.3 yamt /* $NetBSD: puffs_subr.c,v 1.13.2.3 2007/02/26 09:10:57 yamt Exp $ */
2 1.13.2.2 yamt
3 1.13.2.2 yamt /*
4 1.13.2.2 yamt * Copyright (c) 2005, 2006 Antti Kantee. All Rights Reserved.
5 1.13.2.2 yamt *
6 1.13.2.2 yamt * Development of this software was supported by the
7 1.13.2.2 yamt * Google Summer of Code program and the Ulla Tuominen Foundation.
8 1.13.2.2 yamt * The Google SoC project was mentored by Bill Studenmund.
9 1.13.2.2 yamt *
10 1.13.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.13.2.2 yamt * modification, are permitted provided that the following conditions
12 1.13.2.2 yamt * are met:
13 1.13.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.13.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.13.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.13.2.2 yamt * 3. The name of the company nor the name of the author may be used to
19 1.13.2.2 yamt * endorse or promote products derived from this software without specific
20 1.13.2.2 yamt * prior written permission.
21 1.13.2.2 yamt *
22 1.13.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
23 1.13.2.2 yamt * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
24 1.13.2.2 yamt * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
25 1.13.2.2 yamt * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 1.13.2.2 yamt * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.13.2.2 yamt * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
28 1.13.2.2 yamt * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.13.2.2 yamt * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.13.2.2 yamt * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.13.2.2 yamt * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.13.2.2 yamt * SUCH DAMAGE.
33 1.13.2.2 yamt */
34 1.13.2.2 yamt
35 1.13.2.2 yamt #include <sys/cdefs.h>
36 1.13.2.3 yamt __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.13.2.3 2007/02/26 09:10:57 yamt Exp $");
37 1.13.2.2 yamt
38 1.13.2.2 yamt #include <sys/param.h>
39 1.13.2.2 yamt #include <sys/conf.h>
40 1.13.2.3 yamt #include <sys/hash.h>
41 1.13.2.2 yamt #include <sys/malloc.h>
42 1.13.2.2 yamt #include <sys/mount.h>
43 1.13.2.2 yamt #include <sys/socketvar.h>
44 1.13.2.2 yamt #include <sys/vnode.h>
45 1.13.2.2 yamt #include <sys/kauth.h>
46 1.13.2.2 yamt #include <sys/namei.h>
47 1.13.2.2 yamt
48 1.13.2.2 yamt #include <fs/puffs/puffs_msgif.h>
49 1.13.2.2 yamt #include <fs/puffs/puffs_sys.h>
50 1.13.2.2 yamt
51 1.13.2.2 yamt #include <miscfs/genfs/genfs_node.h>
52 1.13.2.2 yamt #include <miscfs/specfs/specdev.h>
53 1.13.2.2 yamt
54 1.13.2.2 yamt POOL_INIT(puffs_pnpool, sizeof(struct puffs_node), 0, 0, 0, "puffspnpl",
55 1.13.2.2 yamt &pool_allocator_nointr);
56 1.13.2.2 yamt
57 1.13.2.3 yamt #ifdef PUFFSDEBUG
58 1.13.2.2 yamt int puffsdebug;
59 1.13.2.2 yamt #endif
60 1.13.2.2 yamt
61 1.13.2.3 yamt static __inline struct puffs_node_hashlist
62 1.13.2.3 yamt *puffs_cookie2hashlist(struct puffs_mount *, void *);
63 1.13.2.3 yamt static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
64 1.13.2.2 yamt
65 1.13.2.2 yamt static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
66 1.13.2.2 yamt static void puffs_gop_markupdate(struct vnode *, int);
67 1.13.2.2 yamt
68 1.13.2.2 yamt static const struct genfs_ops puffs_genfsops = {
69 1.13.2.2 yamt .gop_size = puffs_gop_size,
70 1.13.2.2 yamt .gop_write = genfs_gop_write,
71 1.13.2.2 yamt .gop_markupdate = puffs_gop_markupdate,
72 1.13.2.2 yamt #if 0
73 1.13.2.2 yamt .gop_alloc, should ask userspace
74 1.13.2.2 yamt #endif
75 1.13.2.2 yamt };
76 1.13.2.2 yamt
77 1.13.2.2 yamt /*
78 1.13.2.2 yamt * Grab a vnode, intialize all the puffs-dependant stuff.
79 1.13.2.2 yamt */
80 1.13.2.2 yamt int
81 1.13.2.2 yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
82 1.13.2.2 yamt voff_t vsize, dev_t rdev, struct vnode **vpp)
83 1.13.2.2 yamt {
84 1.13.2.2 yamt struct puffs_mount *pmp;
85 1.13.2.2 yamt struct vnode *vp, *nvp;
86 1.13.2.2 yamt struct puffs_node *pnode;
87 1.13.2.3 yamt struct puffs_node_hashlist *plist;
88 1.13.2.2 yamt int error;
89 1.13.2.2 yamt
90 1.13.2.2 yamt pmp = MPTOPUFFSMP(mp);
91 1.13.2.2 yamt
92 1.13.2.2 yamt /*
93 1.13.2.2 yamt * XXX: there is a deadlock condition between vfs_busy() and
94 1.13.2.2 yamt * vnode locks. For an unmounting file system the mountpoint
95 1.13.2.2 yamt * is frozen, but in unmount(FORCE) vflush() wants to access all
96 1.13.2.2 yamt * of the vnodes. If we are here waiting for the mountpoint
97 1.13.2.2 yamt * lock while holding on to a vnode lock, well, we ain't
98 1.13.2.2 yamt * just pining for the fjords anymore. If we release the
99 1.13.2.2 yamt * vnode lock, we will be in the situation "mount point
100 1.13.2.2 yamt * is dying" and panic() will ensue in insmntque. So as a
101 1.13.2.2 yamt * temporary workaround, get a vnode without putting it on
102 1.13.2.2 yamt * the mount point list, check if mount point is still alive
103 1.13.2.2 yamt * and kicking and only then add the vnode to the list.
104 1.13.2.2 yamt */
105 1.13.2.2 yamt error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
106 1.13.2.2 yamt if (error)
107 1.13.2.2 yamt return error;
108 1.13.2.2 yamt vp->v_vnlock = NULL;
109 1.13.2.2 yamt vp->v_type = type;
110 1.13.2.2 yamt
111 1.13.2.2 yamt /*
112 1.13.2.2 yamt * Check what mount point isn't going away. This will work
113 1.13.2.2 yamt * until we decide to remove biglock or make the kernel
114 1.13.2.2 yamt * preemptive. But hopefully the real problem will be fixed
115 1.13.2.2 yamt * by then.
116 1.13.2.2 yamt *
117 1.13.2.2 yamt * XXX: yes, should call vfs_busy(), but thar be rabbits with
118 1.13.2.2 yamt * vicious streaks a mile wide ...
119 1.13.2.2 yamt */
120 1.13.2.2 yamt if (mp->mnt_iflag & IMNT_UNMOUNT) {
121 1.13.2.2 yamt DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
122 1.13.2.2 yamt "vnode for cookie %p\n", mp, cookie));
123 1.13.2.2 yamt ungetnewvnode(vp);
124 1.13.2.2 yamt return ENXIO;
125 1.13.2.2 yamt }
126 1.13.2.2 yamt
127 1.13.2.2 yamt /* So it's not dead yet.. good.. inform new vnode of its master */
128 1.13.2.2 yamt simple_lock(&mntvnode_slock);
129 1.13.2.3 yamt TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
130 1.13.2.2 yamt simple_unlock(&mntvnode_slock);
131 1.13.2.2 yamt vp->v_mount = mp;
132 1.13.2.2 yamt
133 1.13.2.2 yamt /*
134 1.13.2.2 yamt * clerical tasks & footwork
135 1.13.2.2 yamt */
136 1.13.2.2 yamt
137 1.13.2.2 yamt /* dances based on vnode type. almost ufs_vinit(), but not quite */
138 1.13.2.2 yamt switch (type) {
139 1.13.2.2 yamt case VCHR:
140 1.13.2.2 yamt case VBLK:
141 1.13.2.2 yamt /*
142 1.13.2.2 yamt * replace vnode operation vector with the specops vector.
143 1.13.2.2 yamt * our user server has very little control over the node
144 1.13.2.2 yamt * if it decides its a character or block special file
145 1.13.2.2 yamt */
146 1.13.2.2 yamt vp->v_op = puffs_specop_p;
147 1.13.2.2 yamt
148 1.13.2.2 yamt /* do the standard checkalias-dance */
149 1.13.2.2 yamt if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
150 1.13.2.2 yamt /*
151 1.13.2.2 yamt * found: release & unallocate aliased
152 1.13.2.2 yamt * old (well, actually, new) node
153 1.13.2.2 yamt */
154 1.13.2.2 yamt vp->v_op = spec_vnodeop_p;
155 1.13.2.2 yamt vp->v_flag &= ~VLOCKSWORK;
156 1.13.2.2 yamt vrele(vp);
157 1.13.2.2 yamt vgone(vp); /* cya */
158 1.13.2.2 yamt
159 1.13.2.2 yamt /* init "new" vnode */
160 1.13.2.2 yamt vp = nvp;
161 1.13.2.2 yamt vp->v_vnlock = NULL;
162 1.13.2.2 yamt vp->v_mount = mp;
163 1.13.2.2 yamt }
164 1.13.2.2 yamt break;
165 1.13.2.2 yamt
166 1.13.2.2 yamt case VFIFO:
167 1.13.2.2 yamt vp->v_op = puffs_fifoop_p;
168 1.13.2.2 yamt break;
169 1.13.2.2 yamt
170 1.13.2.2 yamt case VREG:
171 1.13.2.2 yamt uvm_vnp_setsize(vp, vsize);
172 1.13.2.2 yamt break;
173 1.13.2.2 yamt
174 1.13.2.2 yamt case VDIR:
175 1.13.2.2 yamt case VLNK:
176 1.13.2.2 yamt case VSOCK:
177 1.13.2.2 yamt break;
178 1.13.2.2 yamt default:
179 1.13.2.2 yamt #ifdef DIAGNOSTIC
180 1.13.2.2 yamt panic("puffs_getvnode: invalid vtype %d", type);
181 1.13.2.2 yamt #endif
182 1.13.2.2 yamt break;
183 1.13.2.2 yamt }
184 1.13.2.2 yamt
185 1.13.2.2 yamt pnode = pool_get(&puffs_pnpool, PR_WAITOK);
186 1.13.2.2 yamt pnode->pn_cookie = cookie;
187 1.13.2.2 yamt pnode->pn_stat = 0;
188 1.13.2.3 yamt plist = puffs_cookie2hashlist(pmp, cookie);
189 1.13.2.3 yamt LIST_INSERT_HEAD(plist, pnode, pn_hashent);
190 1.13.2.2 yamt vp->v_data = pnode;
191 1.13.2.2 yamt vp->v_type = type;
192 1.13.2.2 yamt pnode->pn_vp = vp;
193 1.13.2.2 yamt
194 1.13.2.2 yamt genfs_node_init(vp, &puffs_genfsops);
195 1.13.2.2 yamt *vpp = vp;
196 1.13.2.2 yamt
197 1.13.2.2 yamt DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
198 1.13.2.2 yamt pnode, pnode->pn_cookie));
199 1.13.2.2 yamt
200 1.13.2.2 yamt return 0;
201 1.13.2.2 yamt }
202 1.13.2.2 yamt
203 1.13.2.2 yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
204 1.13.2.2 yamt int
205 1.13.2.2 yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
206 1.13.2.2 yamt void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
207 1.13.2.2 yamt {
208 1.13.2.2 yamt struct puffs_mount *pmp = MPTOPUFFSMP(mp);
209 1.13.2.2 yamt struct vnode *vp;
210 1.13.2.2 yamt int error;
211 1.13.2.2 yamt
212 1.13.2.2 yamt /* userspace probably has this as a NULL op */
213 1.13.2.2 yamt if (cookie == NULL) {
214 1.13.2.2 yamt error = EOPNOTSUPP;
215 1.13.2.2 yamt return error;
216 1.13.2.2 yamt }
217 1.13.2.2 yamt
218 1.13.2.3 yamt /*
219 1.13.2.3 yamt * Check for previous node with the same designation.
220 1.13.2.3 yamt * Explicitly check the root node cookie, since it might be
221 1.13.2.3 yamt * reclaimed from the kernel when this check is made.
222 1.13.2.3 yamt *
223 1.13.2.3 yamt * XXX: technically this error check should punish the fs,
224 1.13.2.3 yamt * not the caller.
225 1.13.2.3 yamt */
226 1.13.2.3 yamt simple_lock(&pmp->pmp_lock);
227 1.13.2.3 yamt if (cookie == pmp->pmp_rootcookie
228 1.13.2.3 yamt || puffs_cookie2pnode(pmp, cookie) != NULL) {
229 1.13.2.3 yamt simple_unlock(&pmp->pmp_lock);
230 1.13.2.3 yamt error = EEXIST;
231 1.13.2.3 yamt return error;
232 1.13.2.3 yamt }
233 1.13.2.3 yamt simple_unlock(&pmp->pmp_lock);
234 1.13.2.3 yamt
235 1.13.2.2 yamt error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
236 1.13.2.2 yamt if (error)
237 1.13.2.2 yamt return error;
238 1.13.2.2 yamt
239 1.13.2.2 yamt vp->v_type = type;
240 1.13.2.2 yamt vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
241 1.13.2.2 yamt *vpp = vp;
242 1.13.2.2 yamt
243 1.13.2.2 yamt if ((cnp->cn_flags & MAKEENTRY) && PUFFS_DOCACHE(pmp))
244 1.13.2.2 yamt cache_enter(dvp, vp, cnp);
245 1.13.2.2 yamt
246 1.13.2.2 yamt return 0;
247 1.13.2.2 yamt }
248 1.13.2.2 yamt
249 1.13.2.2 yamt void
250 1.13.2.2 yamt puffs_putvnode(struct vnode *vp)
251 1.13.2.2 yamt {
252 1.13.2.2 yamt struct puffs_mount *pmp;
253 1.13.2.2 yamt struct puffs_node *pnode;
254 1.13.2.2 yamt
255 1.13.2.2 yamt pmp = VPTOPUFFSMP(vp);
256 1.13.2.2 yamt pnode = VPTOPP(vp);
257 1.13.2.2 yamt
258 1.13.2.2 yamt #ifdef DIAGNOSTIC
259 1.13.2.2 yamt if (vp->v_tag != VT_PUFFS)
260 1.13.2.2 yamt panic("puffs_putvnode: %p not a puffs vnode", vp);
261 1.13.2.2 yamt #endif
262 1.13.2.2 yamt
263 1.13.2.3 yamt LIST_REMOVE(pnode, pn_hashent);
264 1.13.2.3 yamt genfs_node_destroy(vp);
265 1.13.2.2 yamt pool_put(&puffs_pnpool, vp->v_data);
266 1.13.2.2 yamt vp->v_data = NULL;
267 1.13.2.2 yamt
268 1.13.2.2 yamt return;
269 1.13.2.2 yamt }
270 1.13.2.2 yamt
271 1.13.2.3 yamt static __inline struct puffs_node_hashlist *
272 1.13.2.3 yamt puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
273 1.13.2.3 yamt {
274 1.13.2.3 yamt uint32_t hash;
275 1.13.2.3 yamt
276 1.13.2.3 yamt hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
277 1.13.2.3 yamt return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
278 1.13.2.3 yamt }
279 1.13.2.3 yamt
280 1.13.2.3 yamt /*
281 1.13.2.3 yamt * Translate cookie to puffs_node. Caller must hold mountpoint
282 1.13.2.3 yamt * lock and it will be held upon return.
283 1.13.2.3 yamt */
284 1.13.2.3 yamt static struct puffs_node *
285 1.13.2.3 yamt puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
286 1.13.2.3 yamt {
287 1.13.2.3 yamt struct puffs_node_hashlist *plist;
288 1.13.2.3 yamt struct puffs_node *pnode;
289 1.13.2.3 yamt
290 1.13.2.3 yamt plist = puffs_cookie2hashlist(pmp, cookie);
291 1.13.2.3 yamt LIST_FOREACH(pnode, plist, pn_hashent) {
292 1.13.2.3 yamt if (pnode->pn_cookie == cookie)
293 1.13.2.3 yamt break;
294 1.13.2.3 yamt }
295 1.13.2.3 yamt
296 1.13.2.3 yamt return pnode;
297 1.13.2.3 yamt }
298 1.13.2.3 yamt
299 1.13.2.2 yamt /*
300 1.13.2.2 yamt * Locate the in-kernel vnode based on the cookie received given
301 1.13.2.3 yamt * from userspace. Returns a vnode, if found, NULL otherwise.
302 1.13.2.3 yamt * The parameter "lock" control whether to lock the possible or
303 1.13.2.3 yamt * not. Locking always might cause us to lock against ourselves
304 1.13.2.3 yamt * in situations where we want the vnode but don't care for the
305 1.13.2.3 yamt * vnode lock, e.g. file server issued putpages.
306 1.13.2.2 yamt */
307 1.13.2.2 yamt struct vnode *
308 1.13.2.3 yamt puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie, int lock)
309 1.13.2.2 yamt {
310 1.13.2.2 yamt struct puffs_node *pnode;
311 1.13.2.2 yamt struct vnode *vp;
312 1.13.2.3 yamt int vgetflags;
313 1.13.2.3 yamt
314 1.13.2.3 yamt /*
315 1.13.2.3 yamt * If we're trying to get the root vnode, return it through
316 1.13.2.3 yamt * puffs_root() to get all the right things set. Lock must
317 1.13.2.3 yamt * be set, since VFS_ROOT() always locks the returned vnode.
318 1.13.2.3 yamt */
319 1.13.2.3 yamt if (cookie == pmp->pmp_rootcookie) {
320 1.13.2.3 yamt if (!lock)
321 1.13.2.3 yamt return NULL;
322 1.13.2.3 yamt if (VFS_ROOT(pmp->pmp_mp, &vp))
323 1.13.2.3 yamt return NULL;
324 1.13.2.3 yamt
325 1.13.2.3 yamt return vp;
326 1.13.2.3 yamt }
327 1.13.2.3 yamt
328 1.13.2.3 yamt vgetflags = LK_INTERLOCK;
329 1.13.2.3 yamt if (lock)
330 1.13.2.3 yamt vgetflags |= LK_EXCLUSIVE | LK_RETRY;
331 1.13.2.2 yamt
332 1.13.2.2 yamt simple_lock(&pmp->pmp_lock);
333 1.13.2.3 yamt pnode = puffs_cookie2pnode(pmp, cookie);
334 1.13.2.3 yamt
335 1.13.2.3 yamt if (pnode == NULL) {
336 1.13.2.3 yamt simple_unlock(&pmp->pmp_lock);
337 1.13.2.3 yamt return NULL;
338 1.13.2.2 yamt }
339 1.13.2.3 yamt vp = pnode->pn_vp;
340 1.13.2.3 yamt
341 1.13.2.3 yamt simple_lock(&vp->v_interlock);
342 1.13.2.2 yamt simple_unlock(&pmp->pmp_lock);
343 1.13.2.3 yamt
344 1.13.2.3 yamt if (vget(vp, vgetflags))
345 1.13.2.2 yamt return NULL;
346 1.13.2.2 yamt
347 1.13.2.2 yamt return vp;
348 1.13.2.2 yamt }
349 1.13.2.2 yamt
350 1.13.2.2 yamt void
351 1.13.2.2 yamt puffs_makecn(struct puffs_kcn *pkcn, const struct componentname *cn)
352 1.13.2.2 yamt {
353 1.13.2.2 yamt
354 1.13.2.2 yamt pkcn->pkcn_nameiop = cn->cn_nameiop;
355 1.13.2.2 yamt pkcn->pkcn_flags = cn->cn_flags;
356 1.13.2.2 yamt pkcn->pkcn_pid = cn->cn_lwp->l_proc->p_pid;
357 1.13.2.2 yamt puffs_credcvt(&pkcn->pkcn_cred, cn->cn_cred);
358 1.13.2.2 yamt
359 1.13.2.2 yamt (void)memcpy(&pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
360 1.13.2.2 yamt pkcn->pkcn_name[cn->cn_namelen] = '\0';
361 1.13.2.2 yamt pkcn->pkcn_namelen = cn->cn_namelen;
362 1.13.2.2 yamt }
363 1.13.2.2 yamt
364 1.13.2.2 yamt /*
365 1.13.2.2 yamt * Convert given credentials to struct puffs_cred for userspace.
366 1.13.2.2 yamt */
367 1.13.2.2 yamt void
368 1.13.2.2 yamt puffs_credcvt(struct puffs_cred *pcr, const kauth_cred_t cred)
369 1.13.2.2 yamt {
370 1.13.2.2 yamt
371 1.13.2.2 yamt memset(pcr, 0, sizeof(struct puffs_cred));
372 1.13.2.2 yamt
373 1.13.2.2 yamt if (cred == NOCRED || cred == FSCRED) {
374 1.13.2.2 yamt pcr->pcr_type = PUFFCRED_TYPE_INTERNAL;
375 1.13.2.2 yamt if (cred == NOCRED)
376 1.13.2.2 yamt pcr->pcr_internal = PUFFCRED_CRED_NOCRED;
377 1.13.2.2 yamt if (cred == FSCRED)
378 1.13.2.2 yamt pcr->pcr_internal = PUFFCRED_CRED_FSCRED;
379 1.13.2.2 yamt } else {
380 1.13.2.2 yamt pcr->pcr_type = PUFFCRED_TYPE_UUC;
381 1.13.2.2 yamt kauth_cred_to_uucred(&pcr->pcr_uuc, cred);
382 1.13.2.2 yamt }
383 1.13.2.2 yamt }
384 1.13.2.2 yamt
385 1.13.2.2 yamt /*
386 1.13.2.2 yamt * Return pid. In case the operation is coming from within the
387 1.13.2.2 yamt * kernel without any process context, borrow the swapper's pid.
388 1.13.2.2 yamt */
389 1.13.2.2 yamt pid_t
390 1.13.2.2 yamt puffs_lwp2pid(struct lwp *l)
391 1.13.2.2 yamt {
392 1.13.2.2 yamt
393 1.13.2.2 yamt return l ? l->l_proc->p_pid : 0;
394 1.13.2.2 yamt }
395 1.13.2.2 yamt
396 1.13.2.2 yamt
397 1.13.2.2 yamt static void
398 1.13.2.2 yamt puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
399 1.13.2.2 yamt int flags)
400 1.13.2.2 yamt {
401 1.13.2.2 yamt
402 1.13.2.2 yamt *eobp = size;
403 1.13.2.2 yamt }
404 1.13.2.2 yamt
405 1.13.2.2 yamt static void
406 1.13.2.2 yamt puffs_gop_markupdate(struct vnode *vp, int flags)
407 1.13.2.2 yamt {
408 1.13.2.2 yamt int uflags = 0;
409 1.13.2.2 yamt
410 1.13.2.2 yamt if (flags & GOP_UPDATE_ACCESSED)
411 1.13.2.2 yamt uflags |= PUFFS_UPDATEATIME;
412 1.13.2.2 yamt if (flags & GOP_UPDATE_MODIFIED)
413 1.13.2.2 yamt uflags |= PUFFS_UPDATEMTIME;
414 1.13.2.2 yamt
415 1.13.2.2 yamt puffs_updatenode(vp, uflags);
416 1.13.2.2 yamt }
417 1.13.2.2 yamt
418 1.13.2.2 yamt void
419 1.13.2.2 yamt puffs_updatenode(struct vnode *vp, int flags)
420 1.13.2.2 yamt {
421 1.13.2.2 yamt struct timespec ts;
422 1.13.2.2 yamt struct puffs_vnreq_setattr *setattr_arg;
423 1.13.2.2 yamt
424 1.13.2.2 yamt if (flags == 0)
425 1.13.2.2 yamt return;
426 1.13.2.2 yamt
427 1.13.2.2 yamt setattr_arg = malloc(sizeof(struct puffs_vnreq_setattr), M_PUFFS,
428 1.13.2.2 yamt M_NOWAIT | M_ZERO);
429 1.13.2.2 yamt if (setattr_arg == NULL)
430 1.13.2.2 yamt return; /* 2bad */
431 1.13.2.2 yamt
432 1.13.2.2 yamt nanotime(&ts);
433 1.13.2.2 yamt
434 1.13.2.2 yamt VATTR_NULL(&setattr_arg->pvnr_va);
435 1.13.2.2 yamt if (flags & PUFFS_UPDATEATIME)
436 1.13.2.2 yamt setattr_arg->pvnr_va.va_atime = ts;
437 1.13.2.2 yamt if (flags & PUFFS_UPDATECTIME)
438 1.13.2.2 yamt setattr_arg->pvnr_va.va_ctime = ts;
439 1.13.2.2 yamt if (flags & PUFFS_UPDATEMTIME)
440 1.13.2.2 yamt setattr_arg->pvnr_va.va_mtime = ts;
441 1.13.2.2 yamt if (flags & PUFFS_UPDATESIZE)
442 1.13.2.2 yamt setattr_arg->pvnr_va.va_size = vp->v_size;
443 1.13.2.2 yamt
444 1.13.2.2 yamt setattr_arg->pvnr_pid = 0;
445 1.13.2.2 yamt puffs_credcvt(&setattr_arg->pvnr_cred, NOCRED);
446 1.13.2.2 yamt
447 1.13.2.2 yamt /* setattr_arg ownership shifted to callee */
448 1.13.2.2 yamt puffs_vntouser_faf(MPTOPUFFSMP(vp->v_mount), PUFFS_VN_SETATTR,
449 1.13.2.2 yamt setattr_arg, sizeof(struct puffs_vnreq_setattr), VPTOPNC(vp));
450 1.13.2.2 yamt }
451 1.13.2.2 yamt
452 1.13.2.2 yamt void
453 1.13.2.2 yamt puffs_updatevpsize(struct vnode *vp)
454 1.13.2.2 yamt {
455 1.13.2.2 yamt struct vattr va;
456 1.13.2.2 yamt
457 1.13.2.2 yamt if (VOP_GETATTR(vp, &va, FSCRED, NULL))
458 1.13.2.2 yamt return;
459 1.13.2.2 yamt
460 1.13.2.2 yamt if (va.va_size != VNOVAL)
461 1.13.2.2 yamt vp->v_size = va.va_size;
462 1.13.2.2 yamt }
463 1.13.2.2 yamt
464 1.13.2.2 yamt /*
465 1.13.2.2 yamt * We're dead, kaput, RIP, slightly more than merely pining for the
466 1.13.2.2 yamt * fjords, belly-up, fallen, lifeless, finished, expired, gone to meet
467 1.13.2.2 yamt * our maker, ceased to be, etcetc. YASD. It's a dead FS!
468 1.13.2.3 yamt *
469 1.13.2.3 yamt * Caller must hold puffs spinlock.
470 1.13.2.2 yamt */
471 1.13.2.2 yamt void
472 1.13.2.2 yamt puffs_userdead(struct puffs_mount *pmp)
473 1.13.2.2 yamt {
474 1.13.2.2 yamt struct puffs_park *park;
475 1.13.2.2 yamt
476 1.13.2.2 yamt /*
477 1.13.2.2 yamt * Mark filesystem status as dying so that operations don't
478 1.13.2.2 yamt * attempt to march to userspace any longer.
479 1.13.2.2 yamt */
480 1.13.2.2 yamt pmp->pmp_status = PUFFSTAT_DYING;
481 1.13.2.2 yamt
482 1.13.2.2 yamt /* and wakeup processes waiting for a reply from userspace */
483 1.13.2.2 yamt TAILQ_FOREACH(park, &pmp->pmp_req_replywait, park_entries) {
484 1.13.2.2 yamt park->park_preq->preq_rv = ENXIO;
485 1.13.2.2 yamt TAILQ_REMOVE(&pmp->pmp_req_replywait, park, park_entries);
486 1.13.2.2 yamt wakeup(park);
487 1.13.2.2 yamt }
488 1.13.2.2 yamt
489 1.13.2.2 yamt /* wakeup waiters for completion of vfs/vnode requests */
490 1.13.2.2 yamt TAILQ_FOREACH(park, &pmp->pmp_req_touser, park_entries) {
491 1.13.2.2 yamt park->park_preq->preq_rv = ENXIO;
492 1.13.2.2 yamt TAILQ_REMOVE(&pmp->pmp_req_touser, park, park_entries);
493 1.13.2.2 yamt wakeup(park);
494 1.13.2.2 yamt }
495 1.13.2.2 yamt }
496