puffs_subr.c revision 1.13.2.4 1 1.13.2.4 yamt /* $NetBSD: puffs_subr.c,v 1.13.2.4 2007/09/03 14:40:30 yamt Exp $ */
2 1.13.2.2 yamt
3 1.13.2.2 yamt /*
4 1.13.2.2 yamt * Copyright (c) 2005, 2006 Antti Kantee. All Rights Reserved.
5 1.13.2.2 yamt *
6 1.13.2.2 yamt * Development of this software was supported by the
7 1.13.2.2 yamt * Google Summer of Code program and the Ulla Tuominen Foundation.
8 1.13.2.2 yamt * The Google SoC project was mentored by Bill Studenmund.
9 1.13.2.2 yamt *
10 1.13.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.13.2.2 yamt * modification, are permitted provided that the following conditions
12 1.13.2.2 yamt * are met:
13 1.13.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.13.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.13.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.13.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.13.2.2 yamt *
19 1.13.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 1.13.2.2 yamt * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 1.13.2.2 yamt * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 1.13.2.2 yamt * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 1.13.2.2 yamt * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.13.2.2 yamt * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 1.13.2.2 yamt * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.13.2.2 yamt * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.13.2.2 yamt * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.13.2.2 yamt * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.13.2.2 yamt * SUCH DAMAGE.
30 1.13.2.2 yamt */
31 1.13.2.2 yamt
32 1.13.2.2 yamt #include <sys/cdefs.h>
33 1.13.2.4 yamt __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.13.2.4 2007/09/03 14:40:30 yamt Exp $");
34 1.13.2.2 yamt
35 1.13.2.2 yamt #include <sys/param.h>
36 1.13.2.2 yamt #include <sys/conf.h>
37 1.13.2.3 yamt #include <sys/hash.h>
38 1.13.2.4 yamt #include <sys/kauth.h>
39 1.13.2.2 yamt #include <sys/malloc.h>
40 1.13.2.2 yamt #include <sys/mount.h>
41 1.13.2.4 yamt #include <sys/namei.h>
42 1.13.2.4 yamt #include <sys/poll.h>
43 1.13.2.2 yamt #include <sys/socketvar.h>
44 1.13.2.2 yamt #include <sys/vnode.h>
45 1.13.2.4 yamt #include <sys/proc.h>
46 1.13.2.2 yamt
47 1.13.2.2 yamt #include <fs/puffs/puffs_msgif.h>
48 1.13.2.2 yamt #include <fs/puffs/puffs_sys.h>
49 1.13.2.2 yamt
50 1.13.2.2 yamt #include <miscfs/genfs/genfs_node.h>
51 1.13.2.2 yamt #include <miscfs/specfs/specdev.h>
52 1.13.2.2 yamt
53 1.13.2.4 yamt struct pool puffs_pnpool;
54 1.13.2.2 yamt
55 1.13.2.3 yamt #ifdef PUFFSDEBUG
56 1.13.2.2 yamt int puffsdebug;
57 1.13.2.2 yamt #endif
58 1.13.2.2 yamt
59 1.13.2.3 yamt static __inline struct puffs_node_hashlist
60 1.13.2.3 yamt *puffs_cookie2hashlist(struct puffs_mount *, void *);
61 1.13.2.3 yamt static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
62 1.13.2.2 yamt
63 1.13.2.2 yamt static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
64 1.13.2.2 yamt static void puffs_gop_markupdate(struct vnode *, int);
65 1.13.2.2 yamt
66 1.13.2.2 yamt static const struct genfs_ops puffs_genfsops = {
67 1.13.2.2 yamt .gop_size = puffs_gop_size,
68 1.13.2.2 yamt .gop_write = genfs_gop_write,
69 1.13.2.2 yamt .gop_markupdate = puffs_gop_markupdate,
70 1.13.2.2 yamt #if 0
71 1.13.2.2 yamt .gop_alloc, should ask userspace
72 1.13.2.2 yamt #endif
73 1.13.2.2 yamt };
74 1.13.2.2 yamt
75 1.13.2.2 yamt /*
76 1.13.2.2 yamt * Grab a vnode, intialize all the puffs-dependant stuff.
77 1.13.2.2 yamt */
78 1.13.2.2 yamt int
79 1.13.2.2 yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
80 1.13.2.2 yamt voff_t vsize, dev_t rdev, struct vnode **vpp)
81 1.13.2.2 yamt {
82 1.13.2.2 yamt struct puffs_mount *pmp;
83 1.13.2.2 yamt struct vnode *vp, *nvp;
84 1.13.2.2 yamt struct puffs_node *pnode;
85 1.13.2.3 yamt struct puffs_node_hashlist *plist;
86 1.13.2.2 yamt int error;
87 1.13.2.2 yamt
88 1.13.2.4 yamt if (type <= VNON || type >= VBAD)
89 1.13.2.4 yamt return EINVAL;
90 1.13.2.4 yamt
91 1.13.2.2 yamt pmp = MPTOPUFFSMP(mp);
92 1.13.2.2 yamt
93 1.13.2.2 yamt /*
94 1.13.2.2 yamt * XXX: there is a deadlock condition between vfs_busy() and
95 1.13.2.2 yamt * vnode locks. For an unmounting file system the mountpoint
96 1.13.2.2 yamt * is frozen, but in unmount(FORCE) vflush() wants to access all
97 1.13.2.2 yamt * of the vnodes. If we are here waiting for the mountpoint
98 1.13.2.2 yamt * lock while holding on to a vnode lock, well, we ain't
99 1.13.2.2 yamt * just pining for the fjords anymore. If we release the
100 1.13.2.2 yamt * vnode lock, we will be in the situation "mount point
101 1.13.2.2 yamt * is dying" and panic() will ensue in insmntque. So as a
102 1.13.2.2 yamt * temporary workaround, get a vnode without putting it on
103 1.13.2.2 yamt * the mount point list, check if mount point is still alive
104 1.13.2.2 yamt * and kicking and only then add the vnode to the list.
105 1.13.2.2 yamt */
106 1.13.2.2 yamt error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
107 1.13.2.2 yamt if (error)
108 1.13.2.2 yamt return error;
109 1.13.2.2 yamt vp->v_vnlock = NULL;
110 1.13.2.2 yamt vp->v_type = type;
111 1.13.2.2 yamt
112 1.13.2.2 yamt /*
113 1.13.2.2 yamt * Check what mount point isn't going away. This will work
114 1.13.2.2 yamt * until we decide to remove biglock or make the kernel
115 1.13.2.2 yamt * preemptive. But hopefully the real problem will be fixed
116 1.13.2.2 yamt * by then.
117 1.13.2.2 yamt *
118 1.13.2.2 yamt * XXX: yes, should call vfs_busy(), but thar be rabbits with
119 1.13.2.2 yamt * vicious streaks a mile wide ...
120 1.13.2.2 yamt */
121 1.13.2.2 yamt if (mp->mnt_iflag & IMNT_UNMOUNT) {
122 1.13.2.2 yamt DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
123 1.13.2.2 yamt "vnode for cookie %p\n", mp, cookie));
124 1.13.2.2 yamt ungetnewvnode(vp);
125 1.13.2.2 yamt return ENXIO;
126 1.13.2.2 yamt }
127 1.13.2.2 yamt
128 1.13.2.2 yamt /* So it's not dead yet.. good.. inform new vnode of its master */
129 1.13.2.2 yamt simple_lock(&mntvnode_slock);
130 1.13.2.3 yamt TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
131 1.13.2.2 yamt simple_unlock(&mntvnode_slock);
132 1.13.2.2 yamt vp->v_mount = mp;
133 1.13.2.2 yamt
134 1.13.2.2 yamt /*
135 1.13.2.2 yamt * clerical tasks & footwork
136 1.13.2.2 yamt */
137 1.13.2.2 yamt
138 1.13.2.4 yamt /* default size */
139 1.13.2.4 yamt uvm_vnp_setsize(vp, 0);
140 1.13.2.4 yamt
141 1.13.2.2 yamt /* dances based on vnode type. almost ufs_vinit(), but not quite */
142 1.13.2.2 yamt switch (type) {
143 1.13.2.2 yamt case VCHR:
144 1.13.2.2 yamt case VBLK:
145 1.13.2.2 yamt /*
146 1.13.2.2 yamt * replace vnode operation vector with the specops vector.
147 1.13.2.2 yamt * our user server has very little control over the node
148 1.13.2.2 yamt * if it decides its a character or block special file
149 1.13.2.2 yamt */
150 1.13.2.2 yamt vp->v_op = puffs_specop_p;
151 1.13.2.2 yamt
152 1.13.2.2 yamt /* do the standard checkalias-dance */
153 1.13.2.2 yamt if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
154 1.13.2.2 yamt /*
155 1.13.2.2 yamt * found: release & unallocate aliased
156 1.13.2.2 yamt * old (well, actually, new) node
157 1.13.2.2 yamt */
158 1.13.2.2 yamt vp->v_op = spec_vnodeop_p;
159 1.13.2.2 yamt vp->v_flag &= ~VLOCKSWORK;
160 1.13.2.2 yamt vrele(vp);
161 1.13.2.2 yamt vgone(vp); /* cya */
162 1.13.2.2 yamt
163 1.13.2.2 yamt /* init "new" vnode */
164 1.13.2.2 yamt vp = nvp;
165 1.13.2.2 yamt vp->v_vnlock = NULL;
166 1.13.2.2 yamt vp->v_mount = mp;
167 1.13.2.2 yamt }
168 1.13.2.2 yamt break;
169 1.13.2.2 yamt
170 1.13.2.2 yamt case VFIFO:
171 1.13.2.2 yamt vp->v_op = puffs_fifoop_p;
172 1.13.2.2 yamt break;
173 1.13.2.2 yamt
174 1.13.2.2 yamt case VREG:
175 1.13.2.2 yamt uvm_vnp_setsize(vp, vsize);
176 1.13.2.2 yamt break;
177 1.13.2.2 yamt
178 1.13.2.2 yamt case VDIR:
179 1.13.2.2 yamt case VLNK:
180 1.13.2.2 yamt case VSOCK:
181 1.13.2.2 yamt break;
182 1.13.2.2 yamt default:
183 1.13.2.2 yamt #ifdef DIAGNOSTIC
184 1.13.2.2 yamt panic("puffs_getvnode: invalid vtype %d", type);
185 1.13.2.2 yamt #endif
186 1.13.2.2 yamt break;
187 1.13.2.2 yamt }
188 1.13.2.2 yamt
189 1.13.2.2 yamt pnode = pool_get(&puffs_pnpool, PR_WAITOK);
190 1.13.2.4 yamt memset(pnode, 0, sizeof(struct puffs_node));
191 1.13.2.4 yamt
192 1.13.2.2 yamt pnode->pn_cookie = cookie;
193 1.13.2.4 yamt pnode->pn_refcount = 1;
194 1.13.2.4 yamt
195 1.13.2.4 yamt mutex_init(&pnode->pn_mtx, MUTEX_DEFAULT, IPL_NONE);
196 1.13.2.4 yamt SLIST_INIT(&pnode->pn_sel.sel_klist);
197 1.13.2.4 yamt
198 1.13.2.3 yamt plist = puffs_cookie2hashlist(pmp, cookie);
199 1.13.2.3 yamt LIST_INSERT_HEAD(plist, pnode, pn_hashent);
200 1.13.2.2 yamt vp->v_data = pnode;
201 1.13.2.2 yamt vp->v_type = type;
202 1.13.2.2 yamt pnode->pn_vp = vp;
203 1.13.2.4 yamt pnode->pn_serversize = vsize;
204 1.13.2.2 yamt
205 1.13.2.2 yamt genfs_node_init(vp, &puffs_genfsops);
206 1.13.2.2 yamt *vpp = vp;
207 1.13.2.2 yamt
208 1.13.2.2 yamt DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
209 1.13.2.2 yamt pnode, pnode->pn_cookie));
210 1.13.2.2 yamt
211 1.13.2.2 yamt return 0;
212 1.13.2.2 yamt }
213 1.13.2.2 yamt
214 1.13.2.2 yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
215 1.13.2.2 yamt int
216 1.13.2.2 yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
217 1.13.2.2 yamt void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
218 1.13.2.2 yamt {
219 1.13.2.2 yamt struct puffs_mount *pmp = MPTOPUFFSMP(mp);
220 1.13.2.2 yamt struct vnode *vp;
221 1.13.2.2 yamt int error;
222 1.13.2.2 yamt
223 1.13.2.2 yamt /* userspace probably has this as a NULL op */
224 1.13.2.2 yamt if (cookie == NULL) {
225 1.13.2.2 yamt error = EOPNOTSUPP;
226 1.13.2.2 yamt return error;
227 1.13.2.2 yamt }
228 1.13.2.2 yamt
229 1.13.2.3 yamt /*
230 1.13.2.3 yamt * Check for previous node with the same designation.
231 1.13.2.3 yamt * Explicitly check the root node cookie, since it might be
232 1.13.2.3 yamt * reclaimed from the kernel when this check is made.
233 1.13.2.3 yamt *
234 1.13.2.3 yamt * XXX: technically this error check should punish the fs,
235 1.13.2.3 yamt * not the caller.
236 1.13.2.3 yamt */
237 1.13.2.4 yamt mutex_enter(&pmp->pmp_lock);
238 1.13.2.4 yamt if (cookie == pmp->pmp_root_cookie
239 1.13.2.3 yamt || puffs_cookie2pnode(pmp, cookie) != NULL) {
240 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
241 1.13.2.3 yamt error = EEXIST;
242 1.13.2.3 yamt return error;
243 1.13.2.3 yamt }
244 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
245 1.13.2.3 yamt
246 1.13.2.2 yamt error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
247 1.13.2.2 yamt if (error)
248 1.13.2.2 yamt return error;
249 1.13.2.2 yamt
250 1.13.2.2 yamt vp->v_type = type;
251 1.13.2.2 yamt vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
252 1.13.2.2 yamt *vpp = vp;
253 1.13.2.2 yamt
254 1.13.2.4 yamt if ((cnp->cn_flags & MAKEENTRY) && PUFFS_USE_NAMECACHE(pmp))
255 1.13.2.2 yamt cache_enter(dvp, vp, cnp);
256 1.13.2.2 yamt
257 1.13.2.2 yamt return 0;
258 1.13.2.2 yamt }
259 1.13.2.2 yamt
260 1.13.2.4 yamt /*
261 1.13.2.4 yamt * Release pnode structure which dealing with references to the
262 1.13.2.4 yamt * puffs_node instead of the vnode. Can't use vref()/vrele() on
263 1.13.2.4 yamt * the vnode there, since that causes the lovely VOP_INACTIVE(),
264 1.13.2.4 yamt * which in turn causes the lovely deadlock when called by the one
265 1.13.2.4 yamt * who is supposed to handle it.
266 1.13.2.4 yamt */
267 1.13.2.4 yamt void
268 1.13.2.4 yamt puffs_releasenode(struct puffs_node *pn)
269 1.13.2.4 yamt {
270 1.13.2.4 yamt
271 1.13.2.4 yamt mutex_enter(&pn->pn_mtx);
272 1.13.2.4 yamt if (--pn->pn_refcount == 0) {
273 1.13.2.4 yamt mutex_exit(&pn->pn_mtx);
274 1.13.2.4 yamt mutex_destroy(&pn->pn_mtx);
275 1.13.2.4 yamt pool_put(&puffs_pnpool, pn);
276 1.13.2.4 yamt } else {
277 1.13.2.4 yamt mutex_exit(&pn->pn_mtx);
278 1.13.2.4 yamt }
279 1.13.2.4 yamt }
280 1.13.2.4 yamt
281 1.13.2.4 yamt /*
282 1.13.2.4 yamt * Add reference to node.
283 1.13.2.4 yamt * mutex held on entry and return
284 1.13.2.4 yamt */
285 1.13.2.4 yamt void
286 1.13.2.4 yamt puffs_referencenode(struct puffs_node *pn)
287 1.13.2.4 yamt {
288 1.13.2.4 yamt
289 1.13.2.4 yamt KASSERT(mutex_owned(&pn->pn_mtx));
290 1.13.2.4 yamt pn->pn_refcount++;
291 1.13.2.4 yamt }
292 1.13.2.4 yamt
293 1.13.2.2 yamt void
294 1.13.2.2 yamt puffs_putvnode(struct vnode *vp)
295 1.13.2.2 yamt {
296 1.13.2.2 yamt struct puffs_mount *pmp;
297 1.13.2.2 yamt struct puffs_node *pnode;
298 1.13.2.2 yamt
299 1.13.2.2 yamt pmp = VPTOPUFFSMP(vp);
300 1.13.2.2 yamt pnode = VPTOPP(vp);
301 1.13.2.2 yamt
302 1.13.2.2 yamt #ifdef DIAGNOSTIC
303 1.13.2.2 yamt if (vp->v_tag != VT_PUFFS)
304 1.13.2.2 yamt panic("puffs_putvnode: %p not a puffs vnode", vp);
305 1.13.2.2 yamt #endif
306 1.13.2.2 yamt
307 1.13.2.3 yamt LIST_REMOVE(pnode, pn_hashent);
308 1.13.2.3 yamt genfs_node_destroy(vp);
309 1.13.2.4 yamt puffs_releasenode(pnode);
310 1.13.2.2 yamt vp->v_data = NULL;
311 1.13.2.2 yamt
312 1.13.2.2 yamt return;
313 1.13.2.2 yamt }
314 1.13.2.2 yamt
315 1.13.2.3 yamt static __inline struct puffs_node_hashlist *
316 1.13.2.3 yamt puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
317 1.13.2.3 yamt {
318 1.13.2.3 yamt uint32_t hash;
319 1.13.2.3 yamt
320 1.13.2.3 yamt hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
321 1.13.2.3 yamt return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
322 1.13.2.3 yamt }
323 1.13.2.3 yamt
324 1.13.2.3 yamt /*
325 1.13.2.3 yamt * Translate cookie to puffs_node. Caller must hold mountpoint
326 1.13.2.3 yamt * lock and it will be held upon return.
327 1.13.2.3 yamt */
328 1.13.2.3 yamt static struct puffs_node *
329 1.13.2.3 yamt puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
330 1.13.2.3 yamt {
331 1.13.2.3 yamt struct puffs_node_hashlist *plist;
332 1.13.2.3 yamt struct puffs_node *pnode;
333 1.13.2.3 yamt
334 1.13.2.3 yamt plist = puffs_cookie2hashlist(pmp, cookie);
335 1.13.2.3 yamt LIST_FOREACH(pnode, plist, pn_hashent) {
336 1.13.2.3 yamt if (pnode->pn_cookie == cookie)
337 1.13.2.3 yamt break;
338 1.13.2.3 yamt }
339 1.13.2.3 yamt
340 1.13.2.3 yamt return pnode;
341 1.13.2.3 yamt }
342 1.13.2.3 yamt
343 1.13.2.2 yamt /*
344 1.13.2.4 yamt * Make sure root vnode exists and reference it. Does NOT lock.
345 1.13.2.4 yamt */
346 1.13.2.4 yamt static int
347 1.13.2.4 yamt puffs_makeroot(struct puffs_mount *pmp)
348 1.13.2.4 yamt {
349 1.13.2.4 yamt struct vnode *vp;
350 1.13.2.4 yamt int rv;
351 1.13.2.4 yamt
352 1.13.2.4 yamt /*
353 1.13.2.4 yamt * pmp_lock must be held if vref()'ing or vrele()'ing the
354 1.13.2.4 yamt * root vnode. the latter is controlled by puffs_inactive().
355 1.13.2.4 yamt *
356 1.13.2.4 yamt * pmp_root is set here and cleared in puffs_reclaim().
357 1.13.2.4 yamt */
358 1.13.2.4 yamt retry:
359 1.13.2.4 yamt mutex_enter(&pmp->pmp_lock);
360 1.13.2.4 yamt vp = pmp->pmp_root;
361 1.13.2.4 yamt if (vp) {
362 1.13.2.4 yamt simple_lock(&vp->v_interlock);
363 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
364 1.13.2.4 yamt if (vget(vp, LK_INTERLOCK) == 0)
365 1.13.2.4 yamt return 0;
366 1.13.2.4 yamt } else
367 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
368 1.13.2.4 yamt
369 1.13.2.4 yamt /*
370 1.13.2.4 yamt * So, didn't have the magic root vnode available.
371 1.13.2.4 yamt * No matter, grab another an stuff it with the cookie.
372 1.13.2.4 yamt */
373 1.13.2.4 yamt if ((rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
374 1.13.2.4 yamt pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp)))
375 1.13.2.4 yamt return rv;
376 1.13.2.4 yamt
377 1.13.2.4 yamt /*
378 1.13.2.4 yamt * Someone magically managed to race us into puffs_getvnode?
379 1.13.2.4 yamt * Put our previous new vnode back and retry.
380 1.13.2.4 yamt */
381 1.13.2.4 yamt mutex_enter(&pmp->pmp_lock);
382 1.13.2.4 yamt if (pmp->pmp_root) {
383 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
384 1.13.2.4 yamt puffs_putvnode(vp);
385 1.13.2.4 yamt goto retry;
386 1.13.2.4 yamt }
387 1.13.2.4 yamt
388 1.13.2.4 yamt /* store cache */
389 1.13.2.4 yamt vp->v_flag = VROOT;
390 1.13.2.4 yamt pmp->pmp_root = vp;
391 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
392 1.13.2.4 yamt
393 1.13.2.4 yamt return 0;
394 1.13.2.4 yamt }
395 1.13.2.4 yamt
396 1.13.2.4 yamt /*
397 1.13.2.2 yamt * Locate the in-kernel vnode based on the cookie received given
398 1.13.2.3 yamt * from userspace. Returns a vnode, if found, NULL otherwise.
399 1.13.2.3 yamt * The parameter "lock" control whether to lock the possible or
400 1.13.2.3 yamt * not. Locking always might cause us to lock against ourselves
401 1.13.2.3 yamt * in situations where we want the vnode but don't care for the
402 1.13.2.3 yamt * vnode lock, e.g. file server issued putpages.
403 1.13.2.2 yamt */
404 1.13.2.4 yamt int
405 1.13.2.4 yamt puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie, int lock,
406 1.13.2.4 yamt struct vnode **vpp)
407 1.13.2.2 yamt {
408 1.13.2.2 yamt struct puffs_node *pnode;
409 1.13.2.2 yamt struct vnode *vp;
410 1.13.2.4 yamt int vgetflags, rv;
411 1.13.2.3 yamt
412 1.13.2.3 yamt /*
413 1.13.2.4 yamt * Handle root in a special manner, since we want to make sure
414 1.13.2.4 yamt * pmp_root is properly set.
415 1.13.2.3 yamt */
416 1.13.2.4 yamt if (cookie == pmp->pmp_root_cookie) {
417 1.13.2.4 yamt if ((rv = puffs_makeroot(pmp)))
418 1.13.2.4 yamt return rv;
419 1.13.2.4 yamt if (lock)
420 1.13.2.4 yamt vn_lock(pmp->pmp_root, LK_EXCLUSIVE | LK_RETRY);
421 1.13.2.3 yamt
422 1.13.2.4 yamt *vpp = pmp->pmp_root;
423 1.13.2.4 yamt return 0;
424 1.13.2.3 yamt }
425 1.13.2.3 yamt
426 1.13.2.4 yamt mutex_enter(&pmp->pmp_lock);
427 1.13.2.3 yamt pnode = puffs_cookie2pnode(pmp, cookie);
428 1.13.2.3 yamt
429 1.13.2.3 yamt if (pnode == NULL) {
430 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
431 1.13.2.4 yamt return ENOENT;
432 1.13.2.2 yamt }
433 1.13.2.3 yamt
434 1.13.2.4 yamt vp = pnode->pn_vp;
435 1.13.2.3 yamt simple_lock(&vp->v_interlock);
436 1.13.2.4 yamt mutex_exit(&pmp->pmp_lock);
437 1.13.2.3 yamt
438 1.13.2.4 yamt vgetflags = LK_INTERLOCK;
439 1.13.2.4 yamt if (lock)
440 1.13.2.4 yamt vgetflags |= LK_EXCLUSIVE | LK_RETRY;
441 1.13.2.4 yamt if ((rv = vget(vp, vgetflags)))
442 1.13.2.4 yamt return rv;
443 1.13.2.2 yamt
444 1.13.2.4 yamt *vpp = vp;
445 1.13.2.4 yamt return 0;
446 1.13.2.2 yamt }
447 1.13.2.2 yamt
448 1.13.2.2 yamt void
449 1.13.2.4 yamt puffs_makecn(struct puffs_kcn *pkcn, struct puffs_kcred *pkcr,
450 1.13.2.4 yamt struct puffs_kcid *pkcid, const struct componentname *cn, int full)
451 1.13.2.2 yamt {
452 1.13.2.2 yamt
453 1.13.2.2 yamt pkcn->pkcn_nameiop = cn->cn_nameiop;
454 1.13.2.2 yamt pkcn->pkcn_flags = cn->cn_flags;
455 1.13.2.4 yamt puffs_cidcvt(pkcid, cn->cn_lwp);
456 1.13.2.2 yamt
457 1.13.2.4 yamt if (full) {
458 1.13.2.4 yamt (void)strcpy(pkcn->pkcn_name, cn->cn_nameptr);
459 1.13.2.4 yamt } else {
460 1.13.2.4 yamt (void)memcpy(pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
461 1.13.2.4 yamt pkcn->pkcn_name[cn->cn_namelen] = '\0';
462 1.13.2.4 yamt }
463 1.13.2.2 yamt pkcn->pkcn_namelen = cn->cn_namelen;
464 1.13.2.4 yamt pkcn->pkcn_consume = 0;
465 1.13.2.4 yamt
466 1.13.2.4 yamt puffs_credcvt(pkcr, cn->cn_cred);
467 1.13.2.2 yamt }
468 1.13.2.2 yamt
469 1.13.2.2 yamt /*
470 1.13.2.4 yamt * Convert given credentials to struct puffs_kcred for userspace.
471 1.13.2.2 yamt */
472 1.13.2.2 yamt void
473 1.13.2.4 yamt puffs_credcvt(struct puffs_kcred *pkcr, const kauth_cred_t cred)
474 1.13.2.2 yamt {
475 1.13.2.2 yamt
476 1.13.2.4 yamt memset(pkcr, 0, sizeof(struct puffs_kcred));
477 1.13.2.2 yamt
478 1.13.2.2 yamt if (cred == NOCRED || cred == FSCRED) {
479 1.13.2.4 yamt pkcr->pkcr_type = PUFFCRED_TYPE_INTERNAL;
480 1.13.2.2 yamt if (cred == NOCRED)
481 1.13.2.4 yamt pkcr->pkcr_internal = PUFFCRED_CRED_NOCRED;
482 1.13.2.2 yamt if (cred == FSCRED)
483 1.13.2.4 yamt pkcr->pkcr_internal = PUFFCRED_CRED_FSCRED;
484 1.13.2.2 yamt } else {
485 1.13.2.4 yamt pkcr->pkcr_type = PUFFCRED_TYPE_UUC;
486 1.13.2.4 yamt kauth_cred_to_uucred(&pkcr->pkcr_uuc, cred);
487 1.13.2.2 yamt }
488 1.13.2.2 yamt }
489 1.13.2.2 yamt
490 1.13.2.4 yamt void
491 1.13.2.4 yamt puffs_cidcvt(struct puffs_kcid *pkcid, const struct lwp *l)
492 1.13.2.2 yamt {
493 1.13.2.2 yamt
494 1.13.2.4 yamt if (l) {
495 1.13.2.4 yamt pkcid->pkcid_type = PUFFCID_TYPE_REAL;
496 1.13.2.4 yamt pkcid->pkcid_pid = l->l_proc->p_pid;
497 1.13.2.4 yamt pkcid->pkcid_lwpid = l->l_lid;
498 1.13.2.4 yamt } else {
499 1.13.2.4 yamt pkcid->pkcid_type = PUFFCID_TYPE_FAKE;
500 1.13.2.4 yamt pkcid->pkcid_pid = 0;
501 1.13.2.4 yamt pkcid->pkcid_lwpid = 0;
502 1.13.2.4 yamt }
503 1.13.2.2 yamt }
504 1.13.2.2 yamt
505 1.13.2.2 yamt static void
506 1.13.2.2 yamt puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
507 1.13.2.2 yamt int flags)
508 1.13.2.2 yamt {
509 1.13.2.2 yamt
510 1.13.2.2 yamt *eobp = size;
511 1.13.2.2 yamt }
512 1.13.2.2 yamt
513 1.13.2.2 yamt static void
514 1.13.2.2 yamt puffs_gop_markupdate(struct vnode *vp, int flags)
515 1.13.2.2 yamt {
516 1.13.2.2 yamt int uflags = 0;
517 1.13.2.2 yamt
518 1.13.2.2 yamt if (flags & GOP_UPDATE_ACCESSED)
519 1.13.2.2 yamt uflags |= PUFFS_UPDATEATIME;
520 1.13.2.2 yamt if (flags & GOP_UPDATE_MODIFIED)
521 1.13.2.2 yamt uflags |= PUFFS_UPDATEMTIME;
522 1.13.2.2 yamt
523 1.13.2.2 yamt puffs_updatenode(vp, uflags);
524 1.13.2.2 yamt }
525 1.13.2.2 yamt
526 1.13.2.2 yamt void
527 1.13.2.2 yamt puffs_updatenode(struct vnode *vp, int flags)
528 1.13.2.2 yamt {
529 1.13.2.4 yamt struct puffs_node *pn;
530 1.13.2.2 yamt struct timespec ts;
531 1.13.2.2 yamt
532 1.13.2.2 yamt if (flags == 0)
533 1.13.2.2 yamt return;
534 1.13.2.2 yamt
535 1.13.2.4 yamt pn = VPTOPP(vp);
536 1.13.2.2 yamt nanotime(&ts);
537 1.13.2.2 yamt
538 1.13.2.4 yamt if (flags & PUFFS_UPDATEATIME) {
539 1.13.2.4 yamt pn->pn_mc_atime = ts;
540 1.13.2.4 yamt pn->pn_stat |= PNODE_METACACHE_ATIME;
541 1.13.2.4 yamt }
542 1.13.2.4 yamt if (flags & PUFFS_UPDATECTIME) {
543 1.13.2.4 yamt pn->pn_mc_ctime = ts;
544 1.13.2.4 yamt pn->pn_stat |= PNODE_METACACHE_CTIME;
545 1.13.2.4 yamt }
546 1.13.2.4 yamt if (flags & PUFFS_UPDATEMTIME) {
547 1.13.2.4 yamt pn->pn_mc_mtime = ts;
548 1.13.2.4 yamt pn->pn_stat |= PNODE_METACACHE_MTIME;
549 1.13.2.4 yamt }
550 1.13.2.4 yamt if (flags & PUFFS_UPDATESIZE) {
551 1.13.2.4 yamt pn->pn_mc_size = vp->v_size;
552 1.13.2.4 yamt pn->pn_stat |= PNODE_METACACHE_SIZE;
553 1.13.2.4 yamt }
554 1.13.2.2 yamt }
555 1.13.2.2 yamt
556 1.13.2.2 yamt void
557 1.13.2.2 yamt puffs_updatevpsize(struct vnode *vp)
558 1.13.2.2 yamt {
559 1.13.2.2 yamt struct vattr va;
560 1.13.2.2 yamt
561 1.13.2.2 yamt if (VOP_GETATTR(vp, &va, FSCRED, NULL))
562 1.13.2.2 yamt return;
563 1.13.2.2 yamt
564 1.13.2.2 yamt if (va.va_size != VNOVAL)
565 1.13.2.2 yamt vp->v_size = va.va_size;
566 1.13.2.2 yamt }
567 1.13.2.2 yamt
568 1.13.2.2 yamt void
569 1.13.2.4 yamt puffs_parkdone_asyncbioread(struct puffs_req *preq, void *arg)
570 1.13.2.2 yamt {
571 1.13.2.4 yamt struct puffs_vnreq_read *read_argp = (void *)preq;
572 1.13.2.4 yamt struct buf *bp = arg;
573 1.13.2.4 yamt size_t moved;
574 1.13.2.4 yamt
575 1.13.2.4 yamt bp->b_error = preq->preq_rv;
576 1.13.2.4 yamt if (bp->b_error == 0) {
577 1.13.2.4 yamt moved = bp->b_bcount - read_argp->pvnr_resid;
578 1.13.2.4 yamt bp->b_resid = read_argp->pvnr_resid;
579 1.13.2.2 yamt
580 1.13.2.4 yamt memcpy(bp->b_data, read_argp->pvnr_data, moved);
581 1.13.2.2 yamt }
582 1.13.2.2 yamt
583 1.13.2.4 yamt biodone(bp);
584 1.13.2.4 yamt free(preq, M_PUFFS);
585 1.13.2.4 yamt }
586 1.13.2.4 yamt
587 1.13.2.4 yamt /* XXX: userspace can leak kernel resources */
588 1.13.2.4 yamt void
589 1.13.2.4 yamt puffs_parkdone_poll(struct puffs_req *preq, void *arg)
590 1.13.2.4 yamt {
591 1.13.2.4 yamt struct puffs_vnreq_poll *poll_argp = (void *)preq;
592 1.13.2.4 yamt struct puffs_node *pn = arg;
593 1.13.2.4 yamt int revents;
594 1.13.2.4 yamt
595 1.13.2.4 yamt if (preq->preq_rv == 0)
596 1.13.2.4 yamt revents = poll_argp->pvnr_events;
597 1.13.2.4 yamt else
598 1.13.2.4 yamt revents = POLLERR;
599 1.13.2.4 yamt
600 1.13.2.4 yamt mutex_enter(&pn->pn_mtx);
601 1.13.2.4 yamt pn->pn_revents |= revents;
602 1.13.2.4 yamt mutex_exit(&pn->pn_mtx);
603 1.13.2.4 yamt
604 1.13.2.4 yamt selnotify(&pn->pn_sel, 0);
605 1.13.2.4 yamt free(preq, M_PUFFS);
606 1.13.2.4 yamt
607 1.13.2.4 yamt puffs_releasenode(pn);
608 1.13.2.4 yamt }
609 1.13.2.4 yamt
610 1.13.2.4 yamt void
611 1.13.2.4 yamt puffs_mp_reference(struct puffs_mount *pmp)
612 1.13.2.4 yamt {
613 1.13.2.4 yamt
614 1.13.2.4 yamt KASSERT(mutex_owned(&pmp->pmp_lock));
615 1.13.2.4 yamt pmp->pmp_refcount++;
616 1.13.2.4 yamt }
617 1.13.2.4 yamt
618 1.13.2.4 yamt void
619 1.13.2.4 yamt puffs_mp_release(struct puffs_mount *pmp)
620 1.13.2.4 yamt {
621 1.13.2.4 yamt
622 1.13.2.4 yamt KASSERT(mutex_owned(&pmp->pmp_lock));
623 1.13.2.4 yamt if (--pmp->pmp_refcount == 0)
624 1.13.2.4 yamt cv_broadcast(&pmp->pmp_refcount_cv);
625 1.13.2.2 yamt }
626