Home | History | Annotate | Line # | Download | only in puffs
puffs_subr.c revision 1.13.2.4
      1  1.13.2.4  yamt /*	$NetBSD: puffs_subr.c,v 1.13.2.4 2007/09/03 14:40:30 yamt Exp $	*/
      2  1.13.2.2  yamt 
      3  1.13.2.2  yamt /*
      4  1.13.2.2  yamt  * Copyright (c) 2005, 2006  Antti Kantee.  All Rights Reserved.
      5  1.13.2.2  yamt  *
      6  1.13.2.2  yamt  * Development of this software was supported by the
      7  1.13.2.2  yamt  * Google Summer of Code program and the Ulla Tuominen Foundation.
      8  1.13.2.2  yamt  * The Google SoC project was mentored by Bill Studenmund.
      9  1.13.2.2  yamt  *
     10  1.13.2.2  yamt  * Redistribution and use in source and binary forms, with or without
     11  1.13.2.2  yamt  * modification, are permitted provided that the following conditions
     12  1.13.2.2  yamt  * are met:
     13  1.13.2.2  yamt  * 1. Redistributions of source code must retain the above copyright
     14  1.13.2.2  yamt  *    notice, this list of conditions and the following disclaimer.
     15  1.13.2.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.13.2.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     17  1.13.2.2  yamt  *    documentation and/or other materials provided with the distribution.
     18  1.13.2.2  yamt  *
     19  1.13.2.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
     20  1.13.2.2  yamt  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     21  1.13.2.2  yamt  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     22  1.13.2.2  yamt  * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     23  1.13.2.2  yamt  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24  1.13.2.2  yamt  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     25  1.13.2.2  yamt  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26  1.13.2.2  yamt  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27  1.13.2.2  yamt  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28  1.13.2.2  yamt  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29  1.13.2.2  yamt  * SUCH DAMAGE.
     30  1.13.2.2  yamt  */
     31  1.13.2.2  yamt 
     32  1.13.2.2  yamt #include <sys/cdefs.h>
     33  1.13.2.4  yamt __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.13.2.4 2007/09/03 14:40:30 yamt Exp $");
     34  1.13.2.2  yamt 
     35  1.13.2.2  yamt #include <sys/param.h>
     36  1.13.2.2  yamt #include <sys/conf.h>
     37  1.13.2.3  yamt #include <sys/hash.h>
     38  1.13.2.4  yamt #include <sys/kauth.h>
     39  1.13.2.2  yamt #include <sys/malloc.h>
     40  1.13.2.2  yamt #include <sys/mount.h>
     41  1.13.2.4  yamt #include <sys/namei.h>
     42  1.13.2.4  yamt #include <sys/poll.h>
     43  1.13.2.2  yamt #include <sys/socketvar.h>
     44  1.13.2.2  yamt #include <sys/vnode.h>
     45  1.13.2.4  yamt #include <sys/proc.h>
     46  1.13.2.2  yamt 
     47  1.13.2.2  yamt #include <fs/puffs/puffs_msgif.h>
     48  1.13.2.2  yamt #include <fs/puffs/puffs_sys.h>
     49  1.13.2.2  yamt 
     50  1.13.2.2  yamt #include <miscfs/genfs/genfs_node.h>
     51  1.13.2.2  yamt #include <miscfs/specfs/specdev.h>
     52  1.13.2.2  yamt 
     53  1.13.2.4  yamt struct pool puffs_pnpool;
     54  1.13.2.2  yamt 
     55  1.13.2.3  yamt #ifdef PUFFSDEBUG
     56  1.13.2.2  yamt int puffsdebug;
     57  1.13.2.2  yamt #endif
     58  1.13.2.2  yamt 
     59  1.13.2.3  yamt static __inline struct puffs_node_hashlist
     60  1.13.2.3  yamt 	*puffs_cookie2hashlist(struct puffs_mount *, void *);
     61  1.13.2.3  yamt static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
     62  1.13.2.2  yamt 
     63  1.13.2.2  yamt static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
     64  1.13.2.2  yamt static void puffs_gop_markupdate(struct vnode *, int);
     65  1.13.2.2  yamt 
     66  1.13.2.2  yamt static const struct genfs_ops puffs_genfsops = {
     67  1.13.2.2  yamt 	.gop_size = puffs_gop_size,
     68  1.13.2.2  yamt 	.gop_write = genfs_gop_write,
     69  1.13.2.2  yamt 	.gop_markupdate = puffs_gop_markupdate,
     70  1.13.2.2  yamt #if 0
     71  1.13.2.2  yamt 	.gop_alloc, should ask userspace
     72  1.13.2.2  yamt #endif
     73  1.13.2.2  yamt };
     74  1.13.2.2  yamt 
     75  1.13.2.2  yamt /*
     76  1.13.2.2  yamt  * Grab a vnode, intialize all the puffs-dependant stuff.
     77  1.13.2.2  yamt  */
     78  1.13.2.2  yamt int
     79  1.13.2.2  yamt puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
     80  1.13.2.2  yamt 	voff_t vsize, dev_t rdev, struct vnode **vpp)
     81  1.13.2.2  yamt {
     82  1.13.2.2  yamt 	struct puffs_mount *pmp;
     83  1.13.2.2  yamt 	struct vnode *vp, *nvp;
     84  1.13.2.2  yamt 	struct puffs_node *pnode;
     85  1.13.2.3  yamt 	struct puffs_node_hashlist *plist;
     86  1.13.2.2  yamt 	int error;
     87  1.13.2.2  yamt 
     88  1.13.2.4  yamt 	if (type <= VNON || type >= VBAD)
     89  1.13.2.4  yamt 		return EINVAL;
     90  1.13.2.4  yamt 
     91  1.13.2.2  yamt 	pmp = MPTOPUFFSMP(mp);
     92  1.13.2.2  yamt 
     93  1.13.2.2  yamt 	/*
     94  1.13.2.2  yamt 	 * XXX: there is a deadlock condition between vfs_busy() and
     95  1.13.2.2  yamt 	 * vnode locks.  For an unmounting file system the mountpoint
     96  1.13.2.2  yamt 	 * is frozen, but in unmount(FORCE) vflush() wants to access all
     97  1.13.2.2  yamt 	 * of the vnodes.  If we are here waiting for the mountpoint
     98  1.13.2.2  yamt 	 * lock while holding on to a vnode lock, well, we ain't
     99  1.13.2.2  yamt 	 * just pining for the fjords anymore.  If we release the
    100  1.13.2.2  yamt 	 * vnode lock, we will be in the situation "mount point
    101  1.13.2.2  yamt 	 * is dying" and panic() will ensue in insmntque.  So as a
    102  1.13.2.2  yamt 	 * temporary workaround, get a vnode without putting it on
    103  1.13.2.2  yamt 	 * the mount point list, check if mount point is still alive
    104  1.13.2.2  yamt 	 * and kicking and only then add the vnode to the list.
    105  1.13.2.2  yamt 	 */
    106  1.13.2.2  yamt 	error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
    107  1.13.2.2  yamt 	if (error)
    108  1.13.2.2  yamt 		return error;
    109  1.13.2.2  yamt 	vp->v_vnlock = NULL;
    110  1.13.2.2  yamt 	vp->v_type = type;
    111  1.13.2.2  yamt 
    112  1.13.2.2  yamt 	/*
    113  1.13.2.2  yamt 	 * Check what mount point isn't going away.  This will work
    114  1.13.2.2  yamt 	 * until we decide to remove biglock or make the kernel
    115  1.13.2.2  yamt 	 * preemptive.  But hopefully the real problem will be fixed
    116  1.13.2.2  yamt 	 * by then.
    117  1.13.2.2  yamt 	 *
    118  1.13.2.2  yamt 	 * XXX: yes, should call vfs_busy(), but thar be rabbits with
    119  1.13.2.2  yamt 	 * vicious streaks a mile wide ...
    120  1.13.2.2  yamt 	 */
    121  1.13.2.2  yamt 	if (mp->mnt_iflag & IMNT_UNMOUNT) {
    122  1.13.2.2  yamt 		DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
    123  1.13.2.2  yamt 		    "vnode for cookie %p\n", mp, cookie));
    124  1.13.2.2  yamt 		ungetnewvnode(vp);
    125  1.13.2.2  yamt 		return ENXIO;
    126  1.13.2.2  yamt 	}
    127  1.13.2.2  yamt 
    128  1.13.2.2  yamt 	/* So it's not dead yet.. good.. inform new vnode of its master */
    129  1.13.2.2  yamt 	simple_lock(&mntvnode_slock);
    130  1.13.2.3  yamt 	TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
    131  1.13.2.2  yamt 	simple_unlock(&mntvnode_slock);
    132  1.13.2.2  yamt 	vp->v_mount = mp;
    133  1.13.2.2  yamt 
    134  1.13.2.2  yamt 	/*
    135  1.13.2.2  yamt 	 * clerical tasks & footwork
    136  1.13.2.2  yamt 	 */
    137  1.13.2.2  yamt 
    138  1.13.2.4  yamt 	/* default size */
    139  1.13.2.4  yamt 	uvm_vnp_setsize(vp, 0);
    140  1.13.2.4  yamt 
    141  1.13.2.2  yamt 	/* dances based on vnode type. almost ufs_vinit(), but not quite */
    142  1.13.2.2  yamt 	switch (type) {
    143  1.13.2.2  yamt 	case VCHR:
    144  1.13.2.2  yamt 	case VBLK:
    145  1.13.2.2  yamt 		/*
    146  1.13.2.2  yamt 		 * replace vnode operation vector with the specops vector.
    147  1.13.2.2  yamt 		 * our user server has very little control over the node
    148  1.13.2.2  yamt 		 * if it decides its a character or block special file
    149  1.13.2.2  yamt 		 */
    150  1.13.2.2  yamt 		vp->v_op = puffs_specop_p;
    151  1.13.2.2  yamt 
    152  1.13.2.2  yamt 		/* do the standard checkalias-dance */
    153  1.13.2.2  yamt 		if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
    154  1.13.2.2  yamt 			/*
    155  1.13.2.2  yamt 			 * found: release & unallocate aliased
    156  1.13.2.2  yamt 			 * old (well, actually, new) node
    157  1.13.2.2  yamt 			 */
    158  1.13.2.2  yamt 			vp->v_op = spec_vnodeop_p;
    159  1.13.2.2  yamt 			vp->v_flag &= ~VLOCKSWORK;
    160  1.13.2.2  yamt 			vrele(vp);
    161  1.13.2.2  yamt 			vgone(vp); /* cya */
    162  1.13.2.2  yamt 
    163  1.13.2.2  yamt 			/* init "new" vnode */
    164  1.13.2.2  yamt 			vp = nvp;
    165  1.13.2.2  yamt 			vp->v_vnlock = NULL;
    166  1.13.2.2  yamt 			vp->v_mount = mp;
    167  1.13.2.2  yamt 		}
    168  1.13.2.2  yamt 		break;
    169  1.13.2.2  yamt 
    170  1.13.2.2  yamt 	case VFIFO:
    171  1.13.2.2  yamt 		vp->v_op = puffs_fifoop_p;
    172  1.13.2.2  yamt 		break;
    173  1.13.2.2  yamt 
    174  1.13.2.2  yamt 	case VREG:
    175  1.13.2.2  yamt 		uvm_vnp_setsize(vp, vsize);
    176  1.13.2.2  yamt 		break;
    177  1.13.2.2  yamt 
    178  1.13.2.2  yamt 	case VDIR:
    179  1.13.2.2  yamt 	case VLNK:
    180  1.13.2.2  yamt 	case VSOCK:
    181  1.13.2.2  yamt 		break;
    182  1.13.2.2  yamt 	default:
    183  1.13.2.2  yamt #ifdef DIAGNOSTIC
    184  1.13.2.2  yamt 		panic("puffs_getvnode: invalid vtype %d", type);
    185  1.13.2.2  yamt #endif
    186  1.13.2.2  yamt 		break;
    187  1.13.2.2  yamt 	}
    188  1.13.2.2  yamt 
    189  1.13.2.2  yamt 	pnode = pool_get(&puffs_pnpool, PR_WAITOK);
    190  1.13.2.4  yamt 	memset(pnode, 0, sizeof(struct puffs_node));
    191  1.13.2.4  yamt 
    192  1.13.2.2  yamt 	pnode->pn_cookie = cookie;
    193  1.13.2.4  yamt 	pnode->pn_refcount = 1;
    194  1.13.2.4  yamt 
    195  1.13.2.4  yamt 	mutex_init(&pnode->pn_mtx, MUTEX_DEFAULT, IPL_NONE);
    196  1.13.2.4  yamt 	SLIST_INIT(&pnode->pn_sel.sel_klist);
    197  1.13.2.4  yamt 
    198  1.13.2.3  yamt 	plist = puffs_cookie2hashlist(pmp, cookie);
    199  1.13.2.3  yamt 	LIST_INSERT_HEAD(plist, pnode, pn_hashent);
    200  1.13.2.2  yamt 	vp->v_data = pnode;
    201  1.13.2.2  yamt 	vp->v_type = type;
    202  1.13.2.2  yamt 	pnode->pn_vp = vp;
    203  1.13.2.4  yamt 	pnode->pn_serversize = vsize;
    204  1.13.2.2  yamt 
    205  1.13.2.2  yamt 	genfs_node_init(vp, &puffs_genfsops);
    206  1.13.2.2  yamt 	*vpp = vp;
    207  1.13.2.2  yamt 
    208  1.13.2.2  yamt 	DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
    209  1.13.2.2  yamt 	    pnode, pnode->pn_cookie));
    210  1.13.2.2  yamt 
    211  1.13.2.2  yamt 	return 0;
    212  1.13.2.2  yamt }
    213  1.13.2.2  yamt 
    214  1.13.2.2  yamt /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
    215  1.13.2.2  yamt int
    216  1.13.2.2  yamt puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
    217  1.13.2.2  yamt 	void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
    218  1.13.2.2  yamt {
    219  1.13.2.2  yamt 	struct puffs_mount *pmp = MPTOPUFFSMP(mp);
    220  1.13.2.2  yamt 	struct vnode *vp;
    221  1.13.2.2  yamt 	int error;
    222  1.13.2.2  yamt 
    223  1.13.2.2  yamt 	/* userspace probably has this as a NULL op */
    224  1.13.2.2  yamt 	if (cookie == NULL) {
    225  1.13.2.2  yamt 		error = EOPNOTSUPP;
    226  1.13.2.2  yamt 		return error;
    227  1.13.2.2  yamt 	}
    228  1.13.2.2  yamt 
    229  1.13.2.3  yamt 	/*
    230  1.13.2.3  yamt 	 * Check for previous node with the same designation.
    231  1.13.2.3  yamt 	 * Explicitly check the root node cookie, since it might be
    232  1.13.2.3  yamt 	 * reclaimed from the kernel when this check is made.
    233  1.13.2.3  yamt 	 *
    234  1.13.2.3  yamt 	 * XXX: technically this error check should punish the fs,
    235  1.13.2.3  yamt 	 * not the caller.
    236  1.13.2.3  yamt 	 */
    237  1.13.2.4  yamt 	mutex_enter(&pmp->pmp_lock);
    238  1.13.2.4  yamt 	if (cookie == pmp->pmp_root_cookie
    239  1.13.2.3  yamt 	    || puffs_cookie2pnode(pmp, cookie) != NULL) {
    240  1.13.2.4  yamt 		mutex_exit(&pmp->pmp_lock);
    241  1.13.2.3  yamt 		error = EEXIST;
    242  1.13.2.3  yamt 		return error;
    243  1.13.2.3  yamt 	}
    244  1.13.2.4  yamt 	mutex_exit(&pmp->pmp_lock);
    245  1.13.2.3  yamt 
    246  1.13.2.2  yamt 	error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
    247  1.13.2.2  yamt 	if (error)
    248  1.13.2.2  yamt 		return error;
    249  1.13.2.2  yamt 
    250  1.13.2.2  yamt 	vp->v_type = type;
    251  1.13.2.2  yamt 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    252  1.13.2.2  yamt 	*vpp = vp;
    253  1.13.2.2  yamt 
    254  1.13.2.4  yamt 	if ((cnp->cn_flags & MAKEENTRY) && PUFFS_USE_NAMECACHE(pmp))
    255  1.13.2.2  yamt 		cache_enter(dvp, vp, cnp);
    256  1.13.2.2  yamt 
    257  1.13.2.2  yamt 	return 0;
    258  1.13.2.2  yamt }
    259  1.13.2.2  yamt 
    260  1.13.2.4  yamt /*
    261  1.13.2.4  yamt  * Release pnode structure which dealing with references to the
    262  1.13.2.4  yamt  * puffs_node instead of the vnode.  Can't use vref()/vrele() on
    263  1.13.2.4  yamt  * the vnode there, since that causes the lovely VOP_INACTIVE(),
    264  1.13.2.4  yamt  * which in turn causes the lovely deadlock when called by the one
    265  1.13.2.4  yamt  * who is supposed to handle it.
    266  1.13.2.4  yamt  */
    267  1.13.2.4  yamt void
    268  1.13.2.4  yamt puffs_releasenode(struct puffs_node *pn)
    269  1.13.2.4  yamt {
    270  1.13.2.4  yamt 
    271  1.13.2.4  yamt 	mutex_enter(&pn->pn_mtx);
    272  1.13.2.4  yamt 	if (--pn->pn_refcount == 0) {
    273  1.13.2.4  yamt 		mutex_exit(&pn->pn_mtx);
    274  1.13.2.4  yamt 		mutex_destroy(&pn->pn_mtx);
    275  1.13.2.4  yamt 		pool_put(&puffs_pnpool, pn);
    276  1.13.2.4  yamt 	} else {
    277  1.13.2.4  yamt 		mutex_exit(&pn->pn_mtx);
    278  1.13.2.4  yamt 	}
    279  1.13.2.4  yamt }
    280  1.13.2.4  yamt 
    281  1.13.2.4  yamt /*
    282  1.13.2.4  yamt  * Add reference to node.
    283  1.13.2.4  yamt  *  mutex held on entry and return
    284  1.13.2.4  yamt  */
    285  1.13.2.4  yamt void
    286  1.13.2.4  yamt puffs_referencenode(struct puffs_node *pn)
    287  1.13.2.4  yamt {
    288  1.13.2.4  yamt 
    289  1.13.2.4  yamt 	KASSERT(mutex_owned(&pn->pn_mtx));
    290  1.13.2.4  yamt 	pn->pn_refcount++;
    291  1.13.2.4  yamt }
    292  1.13.2.4  yamt 
    293  1.13.2.2  yamt void
    294  1.13.2.2  yamt puffs_putvnode(struct vnode *vp)
    295  1.13.2.2  yamt {
    296  1.13.2.2  yamt 	struct puffs_mount *pmp;
    297  1.13.2.2  yamt 	struct puffs_node *pnode;
    298  1.13.2.2  yamt 
    299  1.13.2.2  yamt 	pmp = VPTOPUFFSMP(vp);
    300  1.13.2.2  yamt 	pnode = VPTOPP(vp);
    301  1.13.2.2  yamt 
    302  1.13.2.2  yamt #ifdef DIAGNOSTIC
    303  1.13.2.2  yamt 	if (vp->v_tag != VT_PUFFS)
    304  1.13.2.2  yamt 		panic("puffs_putvnode: %p not a puffs vnode", vp);
    305  1.13.2.2  yamt #endif
    306  1.13.2.2  yamt 
    307  1.13.2.3  yamt 	LIST_REMOVE(pnode, pn_hashent);
    308  1.13.2.3  yamt 	genfs_node_destroy(vp);
    309  1.13.2.4  yamt 	puffs_releasenode(pnode);
    310  1.13.2.2  yamt 	vp->v_data = NULL;
    311  1.13.2.2  yamt 
    312  1.13.2.2  yamt 	return;
    313  1.13.2.2  yamt }
    314  1.13.2.2  yamt 
    315  1.13.2.3  yamt static __inline struct puffs_node_hashlist *
    316  1.13.2.3  yamt puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
    317  1.13.2.3  yamt {
    318  1.13.2.3  yamt 	uint32_t hash;
    319  1.13.2.3  yamt 
    320  1.13.2.3  yamt 	hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
    321  1.13.2.3  yamt 	return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
    322  1.13.2.3  yamt }
    323  1.13.2.3  yamt 
    324  1.13.2.3  yamt /*
    325  1.13.2.3  yamt  * Translate cookie to puffs_node.  Caller must hold mountpoint
    326  1.13.2.3  yamt  * lock and it will be held upon return.
    327  1.13.2.3  yamt  */
    328  1.13.2.3  yamt static struct puffs_node *
    329  1.13.2.3  yamt puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
    330  1.13.2.3  yamt {
    331  1.13.2.3  yamt 	struct puffs_node_hashlist *plist;
    332  1.13.2.3  yamt 	struct puffs_node *pnode;
    333  1.13.2.3  yamt 
    334  1.13.2.3  yamt 	plist = puffs_cookie2hashlist(pmp, cookie);
    335  1.13.2.3  yamt 	LIST_FOREACH(pnode, plist, pn_hashent) {
    336  1.13.2.3  yamt 		if (pnode->pn_cookie == cookie)
    337  1.13.2.3  yamt 			break;
    338  1.13.2.3  yamt 	}
    339  1.13.2.3  yamt 
    340  1.13.2.3  yamt 	return pnode;
    341  1.13.2.3  yamt }
    342  1.13.2.3  yamt 
    343  1.13.2.2  yamt /*
    344  1.13.2.4  yamt  * Make sure root vnode exists and reference it.  Does NOT lock.
    345  1.13.2.4  yamt  */
    346  1.13.2.4  yamt static int
    347  1.13.2.4  yamt puffs_makeroot(struct puffs_mount *pmp)
    348  1.13.2.4  yamt {
    349  1.13.2.4  yamt 	struct vnode *vp;
    350  1.13.2.4  yamt 	int rv;
    351  1.13.2.4  yamt 
    352  1.13.2.4  yamt 	/*
    353  1.13.2.4  yamt 	 * pmp_lock must be held if vref()'ing or vrele()'ing the
    354  1.13.2.4  yamt 	 * root vnode.  the latter is controlled by puffs_inactive().
    355  1.13.2.4  yamt 	 *
    356  1.13.2.4  yamt 	 * pmp_root is set here and cleared in puffs_reclaim().
    357  1.13.2.4  yamt 	 */
    358  1.13.2.4  yamt  retry:
    359  1.13.2.4  yamt 	mutex_enter(&pmp->pmp_lock);
    360  1.13.2.4  yamt 	vp = pmp->pmp_root;
    361  1.13.2.4  yamt 	if (vp) {
    362  1.13.2.4  yamt 		simple_lock(&vp->v_interlock);
    363  1.13.2.4  yamt 		mutex_exit(&pmp->pmp_lock);
    364  1.13.2.4  yamt 		if (vget(vp, LK_INTERLOCK) == 0)
    365  1.13.2.4  yamt 			return 0;
    366  1.13.2.4  yamt 	} else
    367  1.13.2.4  yamt 		mutex_exit(&pmp->pmp_lock);
    368  1.13.2.4  yamt 
    369  1.13.2.4  yamt 	/*
    370  1.13.2.4  yamt 	 * So, didn't have the magic root vnode available.
    371  1.13.2.4  yamt 	 * No matter, grab another an stuff it with the cookie.
    372  1.13.2.4  yamt 	 */
    373  1.13.2.4  yamt 	if ((rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
    374  1.13.2.4  yamt 	    pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp)))
    375  1.13.2.4  yamt 		return rv;
    376  1.13.2.4  yamt 
    377  1.13.2.4  yamt 	/*
    378  1.13.2.4  yamt 	 * Someone magically managed to race us into puffs_getvnode?
    379  1.13.2.4  yamt 	 * Put our previous new vnode back and retry.
    380  1.13.2.4  yamt 	 */
    381  1.13.2.4  yamt 	mutex_enter(&pmp->pmp_lock);
    382  1.13.2.4  yamt 	if (pmp->pmp_root) {
    383  1.13.2.4  yamt 		mutex_exit(&pmp->pmp_lock);
    384  1.13.2.4  yamt 		puffs_putvnode(vp);
    385  1.13.2.4  yamt 		goto retry;
    386  1.13.2.4  yamt 	}
    387  1.13.2.4  yamt 
    388  1.13.2.4  yamt 	/* store cache */
    389  1.13.2.4  yamt 	vp->v_flag = VROOT;
    390  1.13.2.4  yamt 	pmp->pmp_root = vp;
    391  1.13.2.4  yamt 	mutex_exit(&pmp->pmp_lock);
    392  1.13.2.4  yamt 
    393  1.13.2.4  yamt 	return 0;
    394  1.13.2.4  yamt }
    395  1.13.2.4  yamt 
    396  1.13.2.4  yamt /*
    397  1.13.2.2  yamt  * Locate the in-kernel vnode based on the cookie received given
    398  1.13.2.3  yamt  * from userspace.  Returns a vnode, if found, NULL otherwise.
    399  1.13.2.3  yamt  * The parameter "lock" control whether to lock the possible or
    400  1.13.2.3  yamt  * not.  Locking always might cause us to lock against ourselves
    401  1.13.2.3  yamt  * in situations where we want the vnode but don't care for the
    402  1.13.2.3  yamt  * vnode lock, e.g. file server issued putpages.
    403  1.13.2.2  yamt  */
    404  1.13.2.4  yamt int
    405  1.13.2.4  yamt puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie, int lock,
    406  1.13.2.4  yamt 	struct vnode **vpp)
    407  1.13.2.2  yamt {
    408  1.13.2.2  yamt 	struct puffs_node *pnode;
    409  1.13.2.2  yamt 	struct vnode *vp;
    410  1.13.2.4  yamt 	int vgetflags, rv;
    411  1.13.2.3  yamt 
    412  1.13.2.3  yamt 	/*
    413  1.13.2.4  yamt 	 * Handle root in a special manner, since we want to make sure
    414  1.13.2.4  yamt 	 * pmp_root is properly set.
    415  1.13.2.3  yamt 	 */
    416  1.13.2.4  yamt 	if (cookie == pmp->pmp_root_cookie) {
    417  1.13.2.4  yamt 		if ((rv = puffs_makeroot(pmp)))
    418  1.13.2.4  yamt 			return rv;
    419  1.13.2.4  yamt 		if (lock)
    420  1.13.2.4  yamt 			vn_lock(pmp->pmp_root, LK_EXCLUSIVE | LK_RETRY);
    421  1.13.2.3  yamt 
    422  1.13.2.4  yamt 		*vpp = pmp->pmp_root;
    423  1.13.2.4  yamt 		return 0;
    424  1.13.2.3  yamt 	}
    425  1.13.2.3  yamt 
    426  1.13.2.4  yamt 	mutex_enter(&pmp->pmp_lock);
    427  1.13.2.3  yamt 	pnode = puffs_cookie2pnode(pmp, cookie);
    428  1.13.2.3  yamt 
    429  1.13.2.3  yamt 	if (pnode == NULL) {
    430  1.13.2.4  yamt 		mutex_exit(&pmp->pmp_lock);
    431  1.13.2.4  yamt 		return ENOENT;
    432  1.13.2.2  yamt 	}
    433  1.13.2.3  yamt 
    434  1.13.2.4  yamt 	vp = pnode->pn_vp;
    435  1.13.2.3  yamt 	simple_lock(&vp->v_interlock);
    436  1.13.2.4  yamt 	mutex_exit(&pmp->pmp_lock);
    437  1.13.2.3  yamt 
    438  1.13.2.4  yamt 	vgetflags = LK_INTERLOCK;
    439  1.13.2.4  yamt 	if (lock)
    440  1.13.2.4  yamt 		vgetflags |= LK_EXCLUSIVE | LK_RETRY;
    441  1.13.2.4  yamt 	if ((rv = vget(vp, vgetflags)))
    442  1.13.2.4  yamt 		return rv;
    443  1.13.2.2  yamt 
    444  1.13.2.4  yamt 	*vpp = vp;
    445  1.13.2.4  yamt 	return 0;
    446  1.13.2.2  yamt }
    447  1.13.2.2  yamt 
    448  1.13.2.2  yamt void
    449  1.13.2.4  yamt puffs_makecn(struct puffs_kcn *pkcn, struct puffs_kcred *pkcr,
    450  1.13.2.4  yamt 	struct puffs_kcid *pkcid, const struct componentname *cn, int full)
    451  1.13.2.2  yamt {
    452  1.13.2.2  yamt 
    453  1.13.2.2  yamt 	pkcn->pkcn_nameiop = cn->cn_nameiop;
    454  1.13.2.2  yamt 	pkcn->pkcn_flags = cn->cn_flags;
    455  1.13.2.4  yamt 	puffs_cidcvt(pkcid, cn->cn_lwp);
    456  1.13.2.2  yamt 
    457  1.13.2.4  yamt 	if (full) {
    458  1.13.2.4  yamt 		(void)strcpy(pkcn->pkcn_name, cn->cn_nameptr);
    459  1.13.2.4  yamt 	} else {
    460  1.13.2.4  yamt 		(void)memcpy(pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
    461  1.13.2.4  yamt 		pkcn->pkcn_name[cn->cn_namelen] = '\0';
    462  1.13.2.4  yamt 	}
    463  1.13.2.2  yamt 	pkcn->pkcn_namelen = cn->cn_namelen;
    464  1.13.2.4  yamt 	pkcn->pkcn_consume = 0;
    465  1.13.2.4  yamt 
    466  1.13.2.4  yamt 	puffs_credcvt(pkcr, cn->cn_cred);
    467  1.13.2.2  yamt }
    468  1.13.2.2  yamt 
    469  1.13.2.2  yamt /*
    470  1.13.2.4  yamt  * Convert given credentials to struct puffs_kcred for userspace.
    471  1.13.2.2  yamt  */
    472  1.13.2.2  yamt void
    473  1.13.2.4  yamt puffs_credcvt(struct puffs_kcred *pkcr, const kauth_cred_t cred)
    474  1.13.2.2  yamt {
    475  1.13.2.2  yamt 
    476  1.13.2.4  yamt 	memset(pkcr, 0, sizeof(struct puffs_kcred));
    477  1.13.2.2  yamt 
    478  1.13.2.2  yamt 	if (cred == NOCRED || cred == FSCRED) {
    479  1.13.2.4  yamt 		pkcr->pkcr_type = PUFFCRED_TYPE_INTERNAL;
    480  1.13.2.2  yamt 		if (cred == NOCRED)
    481  1.13.2.4  yamt 			pkcr->pkcr_internal = PUFFCRED_CRED_NOCRED;
    482  1.13.2.2  yamt 		if (cred == FSCRED)
    483  1.13.2.4  yamt 			pkcr->pkcr_internal = PUFFCRED_CRED_FSCRED;
    484  1.13.2.2  yamt  	} else {
    485  1.13.2.4  yamt 		pkcr->pkcr_type = PUFFCRED_TYPE_UUC;
    486  1.13.2.4  yamt 		kauth_cred_to_uucred(&pkcr->pkcr_uuc, cred);
    487  1.13.2.2  yamt 	}
    488  1.13.2.2  yamt }
    489  1.13.2.2  yamt 
    490  1.13.2.4  yamt void
    491  1.13.2.4  yamt puffs_cidcvt(struct puffs_kcid *pkcid, const struct lwp *l)
    492  1.13.2.2  yamt {
    493  1.13.2.2  yamt 
    494  1.13.2.4  yamt 	if (l) {
    495  1.13.2.4  yamt 		pkcid->pkcid_type = PUFFCID_TYPE_REAL;
    496  1.13.2.4  yamt 		pkcid->pkcid_pid = l->l_proc->p_pid;
    497  1.13.2.4  yamt 		pkcid->pkcid_lwpid = l->l_lid;
    498  1.13.2.4  yamt 	} else {
    499  1.13.2.4  yamt 		pkcid->pkcid_type = PUFFCID_TYPE_FAKE;
    500  1.13.2.4  yamt 		pkcid->pkcid_pid = 0;
    501  1.13.2.4  yamt 		pkcid->pkcid_lwpid = 0;
    502  1.13.2.4  yamt 	}
    503  1.13.2.2  yamt }
    504  1.13.2.2  yamt 
    505  1.13.2.2  yamt static void
    506  1.13.2.2  yamt puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
    507  1.13.2.2  yamt 	int flags)
    508  1.13.2.2  yamt {
    509  1.13.2.2  yamt 
    510  1.13.2.2  yamt 	*eobp = size;
    511  1.13.2.2  yamt }
    512  1.13.2.2  yamt 
    513  1.13.2.2  yamt static void
    514  1.13.2.2  yamt puffs_gop_markupdate(struct vnode *vp, int flags)
    515  1.13.2.2  yamt {
    516  1.13.2.2  yamt 	int uflags = 0;
    517  1.13.2.2  yamt 
    518  1.13.2.2  yamt 	if (flags & GOP_UPDATE_ACCESSED)
    519  1.13.2.2  yamt 		uflags |= PUFFS_UPDATEATIME;
    520  1.13.2.2  yamt 	if (flags & GOP_UPDATE_MODIFIED)
    521  1.13.2.2  yamt 		uflags |= PUFFS_UPDATEMTIME;
    522  1.13.2.2  yamt 
    523  1.13.2.2  yamt 	puffs_updatenode(vp, uflags);
    524  1.13.2.2  yamt }
    525  1.13.2.2  yamt 
    526  1.13.2.2  yamt void
    527  1.13.2.2  yamt puffs_updatenode(struct vnode *vp, int flags)
    528  1.13.2.2  yamt {
    529  1.13.2.4  yamt 	struct puffs_node *pn;
    530  1.13.2.2  yamt 	struct timespec ts;
    531  1.13.2.2  yamt 
    532  1.13.2.2  yamt 	if (flags == 0)
    533  1.13.2.2  yamt 		return;
    534  1.13.2.2  yamt 
    535  1.13.2.4  yamt 	pn = VPTOPP(vp);
    536  1.13.2.2  yamt 	nanotime(&ts);
    537  1.13.2.2  yamt 
    538  1.13.2.4  yamt 	if (flags & PUFFS_UPDATEATIME) {
    539  1.13.2.4  yamt 		pn->pn_mc_atime = ts;
    540  1.13.2.4  yamt 		pn->pn_stat |= PNODE_METACACHE_ATIME;
    541  1.13.2.4  yamt 	}
    542  1.13.2.4  yamt 	if (flags & PUFFS_UPDATECTIME) {
    543  1.13.2.4  yamt 		pn->pn_mc_ctime = ts;
    544  1.13.2.4  yamt 		pn->pn_stat |= PNODE_METACACHE_CTIME;
    545  1.13.2.4  yamt 	}
    546  1.13.2.4  yamt 	if (flags & PUFFS_UPDATEMTIME) {
    547  1.13.2.4  yamt 		pn->pn_mc_mtime = ts;
    548  1.13.2.4  yamt 		pn->pn_stat |= PNODE_METACACHE_MTIME;
    549  1.13.2.4  yamt 	}
    550  1.13.2.4  yamt 	if (flags & PUFFS_UPDATESIZE) {
    551  1.13.2.4  yamt 		pn->pn_mc_size = vp->v_size;
    552  1.13.2.4  yamt 		pn->pn_stat |= PNODE_METACACHE_SIZE;
    553  1.13.2.4  yamt 	}
    554  1.13.2.2  yamt }
    555  1.13.2.2  yamt 
    556  1.13.2.2  yamt void
    557  1.13.2.2  yamt puffs_updatevpsize(struct vnode *vp)
    558  1.13.2.2  yamt {
    559  1.13.2.2  yamt 	struct vattr va;
    560  1.13.2.2  yamt 
    561  1.13.2.2  yamt 	if (VOP_GETATTR(vp, &va, FSCRED, NULL))
    562  1.13.2.2  yamt 		return;
    563  1.13.2.2  yamt 
    564  1.13.2.2  yamt 	if (va.va_size != VNOVAL)
    565  1.13.2.2  yamt 		vp->v_size = va.va_size;
    566  1.13.2.2  yamt }
    567  1.13.2.2  yamt 
    568  1.13.2.2  yamt void
    569  1.13.2.4  yamt puffs_parkdone_asyncbioread(struct puffs_req *preq, void *arg)
    570  1.13.2.2  yamt {
    571  1.13.2.4  yamt 	struct puffs_vnreq_read *read_argp = (void *)preq;
    572  1.13.2.4  yamt 	struct buf *bp = arg;
    573  1.13.2.4  yamt 	size_t moved;
    574  1.13.2.4  yamt 
    575  1.13.2.4  yamt 	bp->b_error = preq->preq_rv;
    576  1.13.2.4  yamt 	if (bp->b_error == 0) {
    577  1.13.2.4  yamt 		moved = bp->b_bcount - read_argp->pvnr_resid;
    578  1.13.2.4  yamt 		bp->b_resid = read_argp->pvnr_resid;
    579  1.13.2.2  yamt 
    580  1.13.2.4  yamt 		memcpy(bp->b_data, read_argp->pvnr_data, moved);
    581  1.13.2.2  yamt 	}
    582  1.13.2.2  yamt 
    583  1.13.2.4  yamt 	biodone(bp);
    584  1.13.2.4  yamt 	free(preq, M_PUFFS);
    585  1.13.2.4  yamt }
    586  1.13.2.4  yamt 
    587  1.13.2.4  yamt /* XXX: userspace can leak kernel resources */
    588  1.13.2.4  yamt void
    589  1.13.2.4  yamt puffs_parkdone_poll(struct puffs_req *preq, void *arg)
    590  1.13.2.4  yamt {
    591  1.13.2.4  yamt 	struct puffs_vnreq_poll *poll_argp = (void *)preq;
    592  1.13.2.4  yamt 	struct puffs_node *pn = arg;
    593  1.13.2.4  yamt 	int revents;
    594  1.13.2.4  yamt 
    595  1.13.2.4  yamt 	if (preq->preq_rv == 0)
    596  1.13.2.4  yamt 		revents = poll_argp->pvnr_events;
    597  1.13.2.4  yamt 	else
    598  1.13.2.4  yamt 		revents = POLLERR;
    599  1.13.2.4  yamt 
    600  1.13.2.4  yamt 	mutex_enter(&pn->pn_mtx);
    601  1.13.2.4  yamt 	pn->pn_revents |= revents;
    602  1.13.2.4  yamt 	mutex_exit(&pn->pn_mtx);
    603  1.13.2.4  yamt 
    604  1.13.2.4  yamt 	selnotify(&pn->pn_sel, 0);
    605  1.13.2.4  yamt 	free(preq, M_PUFFS);
    606  1.13.2.4  yamt 
    607  1.13.2.4  yamt 	puffs_releasenode(pn);
    608  1.13.2.4  yamt }
    609  1.13.2.4  yamt 
    610  1.13.2.4  yamt void
    611  1.13.2.4  yamt puffs_mp_reference(struct puffs_mount *pmp)
    612  1.13.2.4  yamt {
    613  1.13.2.4  yamt 
    614  1.13.2.4  yamt 	KASSERT(mutex_owned(&pmp->pmp_lock));
    615  1.13.2.4  yamt 	pmp->pmp_refcount++;
    616  1.13.2.4  yamt }
    617  1.13.2.4  yamt 
    618  1.13.2.4  yamt void
    619  1.13.2.4  yamt puffs_mp_release(struct puffs_mount *pmp)
    620  1.13.2.4  yamt {
    621  1.13.2.4  yamt 
    622  1.13.2.4  yamt 	KASSERT(mutex_owned(&pmp->pmp_lock));
    623  1.13.2.4  yamt 	if (--pmp->pmp_refcount == 0)
    624  1.13.2.4  yamt 		cv_broadcast(&pmp->pmp_refcount_cv);
    625  1.13.2.2  yamt }
    626