puffs_subr.c revision 1.22.2.12 1 /* $NetBSD: puffs_subr.c,v 1.22.2.12 2007/10/09 13:44:19 ad Exp $ */
2
3 /*
4 * Copyright (c) 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Ulla Tuominen Foundation and the Finnish Cultural Foundation.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
19 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
21 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
24 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 */
30
31 #include <sys/cdefs.h>
32 __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.22.2.12 2007/10/09 13:44:19 ad Exp $");
33
34 #include <sys/param.h>
35 #include <sys/conf.h>
36 #include <sys/hash.h>
37 #include <sys/kauth.h>
38 #include <sys/malloc.h>
39 #include <sys/mount.h>
40 #include <sys/namei.h>
41 #include <sys/poll.h>
42 #include <sys/socketvar.h>
43 #include <sys/vnode.h>
44 #include <sys/proc.h>
45
46 #include <fs/puffs/puffs_msgif.h>
47 #include <fs/puffs/puffs_sys.h>
48
49 #include <miscfs/genfs/genfs_node.h>
50 #include <miscfs/specfs/specdev.h>
51
52 struct pool puffs_pnpool;
53
54 #ifdef PUFFSDEBUG
55 int puffsdebug;
56 #endif
57
58 static __inline struct puffs_node_hashlist
59 *puffs_cookie2hashlist(struct puffs_mount *, void *);
60 static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
61
62 static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
63 static void puffs_gop_markupdate(struct vnode *, int);
64
65 static const struct genfs_ops puffs_genfsops = {
66 .gop_size = puffs_gop_size,
67 .gop_write = genfs_gop_write,
68 .gop_markupdate = puffs_gop_markupdate,
69 #if 0
70 .gop_alloc, should ask userspace
71 #endif
72 };
73
74 /*
75 * Grab a vnode, intialize all the puffs-dependant stuff.
76 */
77 int
78 puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
79 voff_t vsize, dev_t rdev, struct vnode **vpp)
80 {
81 struct puffs_mount *pmp;
82 struct vnode *vp, *nvp;
83 struct puffs_node *pnode;
84 struct puffs_node_hashlist *plist;
85 int error;
86
87 if (type <= VNON || type >= VBAD)
88 return EINVAL;
89
90 pmp = MPTOPUFFSMP(mp);
91
92 /*
93 * XXX: there is a deadlock condition between vfs_busy() and
94 * vnode locks. For an unmounting file system the mountpoint
95 * is frozen, but in unmount(FORCE) vflush() wants to access all
96 * of the vnodes. If we are here waiting for the mountpoint
97 * lock while holding on to a vnode lock, well, we ain't
98 * just pining for the fjords anymore. If we release the
99 * vnode lock, we will be in the situation "mount point
100 * is dying" and panic() will ensue in insmntque. So as a
101 * temporary workaround, get a vnode without putting it on
102 * the mount point list, check if mount point is still alive
103 * and kicking and only then add the vnode to the list.
104 */
105 error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
106 if (error)
107 return error;
108 vp->v_vnlock = NULL;
109 vp->v_type = type;
110
111 /*
112 * Check what mount point isn't going away. This will work
113 * until we decide to remove biglock or make the kernel
114 * preemptive. But hopefully the real problem will be fixed
115 * by then.
116 *
117 * XXX: yes, should call vfs_busy(), but thar be rabbits with
118 * vicious streaks a mile wide ...
119 */
120 if (mp->mnt_iflag & IMNT_UNMOUNT) {
121 DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
122 "vnode for cookie %p\n", mp, cookie));
123 ungetnewvnode(vp);
124 return ENXIO;
125 }
126
127 /* So it's not dead yet.. good.. inform new vnode of its master */
128 mutex_enter(&mntvnode_lock);
129 TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
130 mutex_exit(&mntvnode_lock);
131 vp->v_mount = mp;
132
133 /*
134 * clerical tasks & footwork
135 */
136
137 /* default size */
138 uvm_vnp_setsize(vp, 0);
139
140 /* dances based on vnode type. almost ufs_vinit(), but not quite */
141 switch (type) {
142 case VCHR:
143 case VBLK:
144 /*
145 * replace vnode operation vector with the specops vector.
146 * our user server has very little control over the node
147 * if it decides its a character or block special file
148 */
149 vp->v_op = puffs_specop_p;
150
151 /* do the standard checkalias-dance */
152 if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
153 /*
154 * found: release & unallocate aliased
155 * old (well, actually, new) node
156 */
157 vp->v_op = spec_vnodeop_p;
158 mutex_enter(&vp->v_interlock);
159 vp->v_iflag &= ~VI_LOCKSWORK;
160 mutex_exit(&vp->v_interlock);
161 vgone(vp); /* cya */
162
163 /* init "new" vnode */
164 vp = nvp;
165 vp->v_vnlock = NULL;
166 vp->v_mount = mp;
167 }
168 break;
169
170 case VFIFO:
171 vp->v_op = puffs_fifoop_p;
172 break;
173
174 case VREG:
175 uvm_vnp_setsize(vp, vsize);
176 break;
177
178 case VDIR:
179 case VLNK:
180 case VSOCK:
181 break;
182 default:
183 #ifdef DIAGNOSTIC
184 panic("puffs_getvnode: invalid vtype %d", type);
185 #endif
186 break;
187 }
188
189 pnode = pool_get(&puffs_pnpool, PR_WAITOK);
190 memset(pnode, 0, sizeof(struct puffs_node));
191
192 pnode->pn_cookie = cookie;
193 pnode->pn_refcount = 1;
194
195 mutex_init(&pnode->pn_mtx, MUTEX_DEFAULT, IPL_NONE);
196 SLIST_INIT(&pnode->pn_sel.sel_klist);
197
198 plist = puffs_cookie2hashlist(pmp, cookie);
199 LIST_INSERT_HEAD(plist, pnode, pn_hashent);
200 vp->v_data = pnode;
201 vp->v_type = type;
202 pnode->pn_vp = vp;
203 pnode->pn_serversize = vsize;
204
205 genfs_node_init(vp, &puffs_genfsops);
206 *vpp = vp;
207
208 DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
209 pnode, pnode->pn_cookie));
210
211 return 0;
212 }
213
214 /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
215 int
216 puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
217 void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
218 {
219 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
220 struct vnode *vp;
221 int error;
222
223 /* userspace probably has this as a NULL op */
224 if (cookie == NULL) {
225 error = EOPNOTSUPP;
226 return error;
227 }
228
229 /*
230 * Check for previous node with the same designation.
231 * Explicitly check the root node cookie, since it might be
232 * reclaimed from the kernel when this check is made.
233 *
234 * XXX: technically this error check should punish the fs,
235 * not the caller.
236 */
237 mutex_enter(&pmp->pmp_lock);
238 if (cookie == pmp->pmp_root_cookie
239 || puffs_cookie2pnode(pmp, cookie) != NULL) {
240 mutex_exit(&pmp->pmp_lock);
241 error = EEXIST;
242 return error;
243 }
244 mutex_exit(&pmp->pmp_lock);
245
246 error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
247 if (error)
248 return error;
249
250 vp->v_type = type;
251 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
252 *vpp = vp;
253
254 if ((cnp->cn_flags & MAKEENTRY) && PUFFS_USE_NAMECACHE(pmp))
255 cache_enter(dvp, vp, cnp);
256
257 return 0;
258 }
259
260 /*
261 * Release pnode structure which dealing with references to the
262 * puffs_node instead of the vnode. Can't use vref()/vrele() on
263 * the vnode there, since that causes the lovely VOP_INACTIVE(),
264 * which in turn causes the lovely deadlock when called by the one
265 * who is supposed to handle it.
266 */
267 void
268 puffs_releasenode(struct puffs_node *pn)
269 {
270
271 mutex_enter(&pn->pn_mtx);
272 if (--pn->pn_refcount == 0) {
273 mutex_exit(&pn->pn_mtx);
274 mutex_destroy(&pn->pn_mtx);
275 pool_put(&puffs_pnpool, pn);
276 } else {
277 mutex_exit(&pn->pn_mtx);
278 }
279 }
280
281 /*
282 * Add reference to node.
283 * mutex held on entry and return
284 */
285 void
286 puffs_referencenode(struct puffs_node *pn)
287 {
288
289 KASSERT(mutex_owned(&pn->pn_mtx));
290 pn->pn_refcount++;
291 }
292
293 void
294 puffs_putvnode(struct vnode *vp)
295 {
296 struct puffs_mount *pmp;
297 struct puffs_node *pnode;
298
299 pmp = VPTOPUFFSMP(vp);
300 pnode = VPTOPP(vp);
301
302 #ifdef DIAGNOSTIC
303 if (vp->v_tag != VT_PUFFS)
304 panic("puffs_putvnode: %p not a puffs vnode", vp);
305 #endif
306
307 LIST_REMOVE(pnode, pn_hashent);
308 genfs_node_destroy(vp);
309 puffs_releasenode(pnode);
310 vp->v_data = NULL;
311
312 return;
313 }
314
315 static __inline struct puffs_node_hashlist *
316 puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
317 {
318 uint32_t hash;
319
320 hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
321 return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
322 }
323
324 /*
325 * Translate cookie to puffs_node. Caller must hold mountpoint
326 * lock and it will be held upon return.
327 */
328 static struct puffs_node *
329 puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
330 {
331 struct puffs_node_hashlist *plist;
332 struct puffs_node *pnode;
333
334 plist = puffs_cookie2hashlist(pmp, cookie);
335 LIST_FOREACH(pnode, plist, pn_hashent) {
336 if (pnode->pn_cookie == cookie)
337 break;
338 }
339
340 return pnode;
341 }
342
343 /*
344 * Make sure root vnode exists and reference it. Does NOT lock.
345 */
346 static int
347 puffs_makeroot(struct puffs_mount *pmp)
348 {
349 struct vnode *vp;
350 int rv;
351
352 /*
353 * pmp_lock must be held if vref()'ing or vrele()'ing the
354 * root vnode. the latter is controlled by puffs_inactive().
355 *
356 * pmp_root is set here and cleared in puffs_reclaim().
357 */
358 retry:
359 mutex_enter(&pmp->pmp_lock);
360 vp = pmp->pmp_root;
361 if (vp) {
362 mutex_enter(&vp->v_interlock);
363 mutex_exit(&pmp->pmp_lock);
364 if (vget(vp, LK_INTERLOCK) == 0)
365 return 0;
366 } else
367 mutex_exit(&pmp->pmp_lock);
368
369 /*
370 * So, didn't have the magic root vnode available.
371 * No matter, grab another an stuff it with the cookie.
372 */
373 if ((rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
374 pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp)))
375 return rv;
376
377 /*
378 * Someone magically managed to race us into puffs_getvnode?
379 * Put our previous new vnode back and retry.
380 */
381 mutex_enter(&pmp->pmp_lock);
382 if (pmp->pmp_root) {
383 mutex_exit(&pmp->pmp_lock);
384 puffs_putvnode(vp);
385 goto retry;
386 }
387
388 /* store cache */
389 vp->v_vflag = VV_ROOT;
390 pmp->pmp_root = vp;
391 mutex_exit(&pmp->pmp_lock);
392
393 return 0;
394 }
395
396 /*
397 * Locate the in-kernel vnode based on the cookie received given
398 * from userspace. Returns a vnode, if found, NULL otherwise.
399 * The parameter "lock" control whether to lock the possible or
400 * not. Locking always might cause us to lock against ourselves
401 * in situations where we want the vnode but don't care for the
402 * vnode lock, e.g. file server issued putpages.
403 */
404 int
405 puffs_pnode2vnode(struct puffs_mount *pmp, void *cookie, int lock,
406 struct vnode **vpp)
407 {
408 struct puffs_node *pnode;
409 struct vnode *vp;
410 int vgetflags, rv;
411
412 /*
413 * Handle root in a special manner, since we want to make sure
414 * pmp_root is properly set.
415 */
416 if (cookie == pmp->pmp_root_cookie) {
417 if ((rv = puffs_makeroot(pmp)))
418 return rv;
419 if (lock)
420 vn_lock(pmp->pmp_root, LK_EXCLUSIVE | LK_RETRY);
421
422 *vpp = pmp->pmp_root;
423 return 0;
424 }
425
426 mutex_enter(&pmp->pmp_lock);
427 pnode = puffs_cookie2pnode(pmp, cookie);
428
429 if (pnode == NULL) {
430 mutex_exit(&pmp->pmp_lock);
431 return ENOENT;
432 }
433
434 vp = pnode->pn_vp;
435 mutex_enter(&vp->v_interlock);
436 mutex_exit(&pmp->pmp_lock);
437
438 vgetflags = LK_INTERLOCK;
439 if (lock)
440 vgetflags |= LK_EXCLUSIVE | LK_RETRY;
441 if ((rv = vget(vp, vgetflags)))
442 return rv;
443
444 *vpp = vp;
445 return 0;
446 }
447
448 void
449 puffs_makecn(struct puffs_kcn *pkcn, struct puffs_kcred *pkcr,
450 struct puffs_kcid *pkcid, const struct componentname *cn, int full)
451 {
452
453 pkcn->pkcn_nameiop = cn->cn_nameiop;
454 pkcn->pkcn_flags = cn->cn_flags;
455 puffs_cidcvt(pkcid, cn->cn_lwp);
456
457 if (full) {
458 (void)strcpy(pkcn->pkcn_name, cn->cn_nameptr);
459 } else {
460 (void)memcpy(pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
461 pkcn->pkcn_name[cn->cn_namelen] = '\0';
462 }
463 pkcn->pkcn_namelen = cn->cn_namelen;
464 pkcn->pkcn_consume = 0;
465
466 puffs_credcvt(pkcr, cn->cn_cred);
467 }
468
469 /*
470 * Convert given credentials to struct puffs_kcred for userspace.
471 */
472 void
473 puffs_credcvt(struct puffs_kcred *pkcr, const kauth_cred_t cred)
474 {
475
476 memset(pkcr, 0, sizeof(struct puffs_kcred));
477
478 if (cred == NOCRED || cred == FSCRED) {
479 pkcr->pkcr_type = PUFFCRED_TYPE_INTERNAL;
480 if (cred == NOCRED)
481 pkcr->pkcr_internal = PUFFCRED_CRED_NOCRED;
482 if (cred == FSCRED)
483 pkcr->pkcr_internal = PUFFCRED_CRED_FSCRED;
484 } else {
485 pkcr->pkcr_type = PUFFCRED_TYPE_UUC;
486 kauth_cred_to_uucred(&pkcr->pkcr_uuc, cred);
487 }
488 }
489
490 void
491 puffs_cidcvt(struct puffs_kcid *pkcid, const struct lwp *l)
492 {
493
494 if (l) {
495 pkcid->pkcid_type = PUFFCID_TYPE_REAL;
496 pkcid->pkcid_pid = l->l_proc->p_pid;
497 pkcid->pkcid_lwpid = l->l_lid;
498 } else {
499 pkcid->pkcid_type = PUFFCID_TYPE_FAKE;
500 pkcid->pkcid_pid = 0;
501 pkcid->pkcid_lwpid = 0;
502 }
503 }
504
505 void
506 puffs_parkdone_asyncbioread(struct puffs_mount *pmp,
507 struct puffs_req *preq, void *arg)
508 {
509 struct puffs_vnreq_read *read_argp = (void *)preq;
510 struct buf *bp = arg;
511 size_t moved;
512
513 bp->b_error = checkerr(pmp, preq->preq_rv, __func__);
514 if (bp->b_error == 0) {
515 moved = bp->b_bcount - read_argp->pvnr_resid;
516 bp->b_resid = read_argp->pvnr_resid;
517
518 memcpy(bp->b_data, read_argp->pvnr_data, moved);
519 }
520
521 biodone(bp);
522 free(preq, M_PUFFS);
523 }
524
525 /* XXX: userspace can leak kernel resources */
526 void
527 puffs_parkdone_poll(struct puffs_mount *pmp, struct puffs_req *preq, void *arg)
528 {
529 struct puffs_vnreq_poll *poll_argp = (void *)preq;
530 struct puffs_node *pn = arg;
531 int revents, error;
532
533 error = checkerr(pmp, preq->preq_rv, __func__);
534 if (error)
535 revents = poll_argp->pvnr_events;
536 else
537 revents = POLLERR;
538
539 mutex_enter(&pn->pn_mtx);
540 pn->pn_revents |= revents;
541 mutex_exit(&pn->pn_mtx);
542
543 selnotify(&pn->pn_sel, 0);
544 free(preq, M_PUFFS);
545
546 puffs_releasenode(pn);
547 }
548
549 void
550 puffs_mp_reference(struct puffs_mount *pmp)
551 {
552
553 KASSERT(mutex_owned(&pmp->pmp_lock));
554 pmp->pmp_refcount++;
555 }
556
557 void
558 puffs_mp_release(struct puffs_mount *pmp)
559 {
560
561 KASSERT(mutex_owned(&pmp->pmp_lock));
562 if (--pmp->pmp_refcount == 0)
563 cv_broadcast(&pmp->pmp_refcount_cv);
564 }
565
566 void
567 puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
568 int flags)
569 {
570
571 *eobp = size;
572 }
573
574 void
575 puffs_gop_markupdate(struct vnode *vp, int flags)
576 {
577 int uflags = 0;
578
579 if (flags & GOP_UPDATE_ACCESSED)
580 uflags |= PUFFS_UPDATEATIME;
581 if (flags & GOP_UPDATE_MODIFIED)
582 uflags |= PUFFS_UPDATEMTIME;
583
584 puffs_updatenode(vp, uflags);
585 }
586