Home | History | Annotate | Line # | Download | only in puffs
puffs_subr.c revision 1.50
      1 /*	$NetBSD: puffs_subr.c,v 1.50 2007/09/27 21:44:12 pooka Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2005, 2006  Antti Kantee.  All Rights Reserved.
      5  *
      6  * Development of this software was supported by the
      7  * Google Summer of Code program and the Ulla Tuominen Foundation.
      8  * The Google SoC project was mentored by Bill Studenmund.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
     20  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     21  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     22  * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     25  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29  * SUCH DAMAGE.
     30  */
     31 
     32 #include <sys/cdefs.h>
     33 __KERNEL_RCSID(0, "$NetBSD: puffs_subr.c,v 1.50 2007/09/27 21:44:12 pooka Exp $");
     34 
     35 #include <sys/param.h>
     36 #include <sys/conf.h>
     37 #include <sys/hash.h>
     38 #include <sys/kauth.h>
     39 #include <sys/kmem.h>
     40 #include <sys/malloc.h>
     41 #include <sys/mount.h>
     42 #include <sys/namei.h>
     43 #include <sys/poll.h>
     44 #include <sys/socketvar.h>
     45 #include <sys/vnode.h>
     46 #include <sys/proc.h>
     47 
     48 #include <fs/puffs/puffs_msgif.h>
     49 #include <fs/puffs/puffs_sys.h>
     50 
     51 #include <miscfs/genfs/genfs_node.h>
     52 #include <miscfs/specfs/specdev.h>
     53 
     54 struct pool puffs_pnpool;
     55 
     56 #ifdef PUFFSDEBUG
     57 int puffsdebug;
     58 #endif
     59 
     60 static __inline struct puffs_node_hashlist
     61 	*puffs_cookie2hashlist(struct puffs_mount *, void *);
     62 static struct puffs_node *puffs_cookie2pnode(struct puffs_mount *, void *);
     63 
     64 static void puffs_gop_size(struct vnode *, off_t, off_t *, int);
     65 static void puffs_gop_markupdate(struct vnode *, int);
     66 
     67 static const struct genfs_ops puffs_genfsops = {
     68 	.gop_size = puffs_gop_size,
     69 	.gop_write = genfs_gop_write,
     70 	.gop_markupdate = puffs_gop_markupdate,
     71 #if 0
     72 	.gop_alloc, should ask userspace
     73 #endif
     74 };
     75 
     76 /*
     77  * Grab a vnode, intialize all the puffs-dependant stuff.
     78  */
     79 int
     80 puffs_getvnode(struct mount *mp, void *cookie, enum vtype type,
     81 	voff_t vsize, dev_t rdev, struct vnode **vpp)
     82 {
     83 	struct puffs_mount *pmp;
     84 	struct puffs_newcookie *pnc;
     85 	struct vnode *vp, *nvp;
     86 	struct puffs_node *pnode;
     87 	struct puffs_node_hashlist *plist;
     88 	int error;
     89 
     90 	pmp = MPTOPUFFSMP(mp);
     91 
     92 	error = EPROTO;
     93 	if (type <= VNON || type >= VBAD || vsize == VSIZENOTSET) {
     94 		puffs_errnotify(pmp, PUFFS_ERR_MAKENODE, EINVAL, cookie);
     95 		goto bad;
     96 	}
     97 
     98 	/*
     99 	 * XXX: there is a deadlock condition between vfs_busy() and
    100 	 * vnode locks.  For an unmounting file system the mountpoint
    101 	 * is frozen, but in unmount(FORCE) vflush() wants to access all
    102 	 * of the vnodes.  If we are here waiting for the mountpoint
    103 	 * lock while holding on to a vnode lock, well, we ain't
    104 	 * just pining for the fjords anymore.  If we release the
    105 	 * vnode lock, we will be in the situation "mount point
    106 	 * is dying" and panic() will ensue in insmntque.  So as a
    107 	 * temporary workaround, get a vnode without putting it on
    108 	 * the mount point list, check if mount point is still alive
    109 	 * and kicking and only then add the vnode to the list.
    110 	 */
    111 	error = getnewvnode(VT_PUFFS, NULL, puffs_vnodeop_p, &vp);
    112 	if (error)
    113 		goto bad;
    114 	vp->v_vnlock = NULL;
    115 	vp->v_type = type;
    116 
    117 	/*
    118 	 * Check what mount point isn't going away.  This will work
    119 	 * until we decide to remove biglock or make the kernel
    120 	 * preemptive.  But hopefully the real problem will be fixed
    121 	 * by then.
    122 	 *
    123 	 * XXX: yes, should call vfs_busy(), but thar be rabbits with
    124 	 * vicious streaks a mile wide ...
    125 	 *
    126 	 * XXX: there is a transient failure here: if someone is unmounting
    127 	 * the file system but doesn't succeed (due to it being busy),
    128 	 * we incorrectly fail new vnode allocation.  This is *very*
    129 	 * hard to fix with the current structure of file system unmounting.
    130 	 */
    131 	if (mp->mnt_iflag & IMNT_UNMOUNT) {
    132 		DPRINTF(("puffs_getvnode: mp %p unmount, unable to create "
    133 		    "vnode for cookie %p\n", mp, cookie));
    134 		ungetnewvnode(vp);
    135 		error = ENXIO;
    136 		goto bad;
    137 	}
    138 
    139 	/* So it's not dead yet.. good.. inform new vnode of its master */
    140 	simple_lock(&mntvnode_slock);
    141 	TAILQ_INSERT_TAIL(&mp->mnt_vnodelist, vp, v_mntvnodes);
    142 	simple_unlock(&mntvnode_slock);
    143 	vp->v_mount = mp;
    144 
    145 	/*
    146 	 * clerical tasks & footwork
    147 	 */
    148 
    149 	/* default size */
    150 	uvm_vnp_setsize(vp, 0);
    151 
    152 	/* dances based on vnode type. almost ufs_vinit(), but not quite */
    153 	switch (type) {
    154 	case VCHR:
    155 	case VBLK:
    156 		/*
    157 		 * replace vnode operation vector with the specops vector.
    158 		 * our user server has very little control over the node
    159 		 * if it decides its a character or block special file
    160 		 */
    161 		vp->v_op = puffs_specop_p;
    162 
    163 		/* do the standard checkalias-dance */
    164 		if ((nvp = checkalias(vp, rdev, mp)) != NULL) {
    165 			/*
    166 			 * found: release & unallocate aliased
    167 			 * old (well, actually, new) node
    168 			 */
    169 			vp->v_op = spec_vnodeop_p;
    170 			vp->v_flag &= ~VLOCKSWORK;
    171 			vrele(vp);
    172 			vgone(vp); /* cya */
    173 
    174 			/* init "new" vnode */
    175 			vp = nvp;
    176 			vp->v_vnlock = NULL;
    177 			vp->v_mount = mp;
    178 		}
    179 		break;
    180 
    181 	case VFIFO:
    182 		vp->v_op = puffs_fifoop_p;
    183 		break;
    184 
    185 	case VREG:
    186 		uvm_vnp_setsize(vp, vsize);
    187 		break;
    188 
    189 	case VDIR:
    190 	case VLNK:
    191 	case VSOCK:
    192 		break;
    193 	default:
    194 #ifdef DIAGNOSTIC
    195 		panic("puffs_getvnode: invalid vtype %d", type);
    196 #endif
    197 		break;
    198 	}
    199 
    200 	pnode = pool_get(&puffs_pnpool, PR_WAITOK);
    201 	memset(pnode, 0, sizeof(struct puffs_node));
    202 
    203 	pnode->pn_cookie = cookie;
    204 	pnode->pn_refcount = 1;
    205 
    206 	/* insert cookie on list, take off of interlock list */
    207 	mutex_init(&pnode->pn_mtx, MUTEX_DEFAULT, IPL_NONE);
    208 	SLIST_INIT(&pnode->pn_sel.sel_klist);
    209 	plist = puffs_cookie2hashlist(pmp, cookie);
    210 	mutex_enter(&pmp->pmp_lock);
    211 	LIST_INSERT_HEAD(plist, pnode, pn_hashent);
    212 	if (cookie != pmp->pmp_root_cookie) {
    213 		LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
    214 			if (pnc->pnc_cookie == cookie) {
    215 				LIST_REMOVE(pnc, pnc_entries);
    216 				kmem_free(pnc, sizeof(struct puffs_newcookie));
    217 				break;
    218 			}
    219 		}
    220 		KASSERT(pnc != NULL);
    221 	}
    222 	mutex_exit(&pmp->pmp_lock);
    223 
    224 	vp->v_data = pnode;
    225 	vp->v_type = type;
    226 	pnode->pn_vp = vp;
    227 	pnode->pn_serversize = vsize;
    228 
    229 	genfs_node_init(vp, &puffs_genfsops);
    230 	*vpp = vp;
    231 
    232 	DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
    233 	    pnode, pnode->pn_cookie));
    234 
    235 	return 0;
    236 
    237  bad:
    238 	/* remove staging cookie from list */
    239 	if (cookie != pmp->pmp_root_cookie) {
    240 		mutex_enter(&pmp->pmp_lock);
    241 		LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
    242 			if (pnc->pnc_cookie == cookie) {
    243 				LIST_REMOVE(pnc, pnc_entries);
    244 				kmem_free(pnc, sizeof(struct puffs_newcookie));
    245 				break;
    246 			}
    247 		}
    248 		KASSERT(pnc != NULL);
    249 		mutex_exit(&pmp->pmp_lock);
    250 	}
    251 
    252 	return error;
    253 }
    254 
    255 /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
    256 int
    257 puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
    258 	void *cookie, struct componentname *cnp, enum vtype type, dev_t rdev)
    259 {
    260 	struct puffs_mount *pmp = MPTOPUFFSMP(mp);
    261 	struct puffs_newcookie *pnc;
    262 	struct vnode *vp;
    263 	int error;
    264 
    265 	/* userspace probably has this as a NULL op */
    266 	if (cookie == NULL) {
    267 		error = EOPNOTSUPP;
    268 		return error;
    269 	}
    270 
    271 	/*
    272 	 * Check for previous node with the same designation.
    273 	 * Explicitly check the root node cookie, since it might be
    274 	 * reclaimed from the kernel when this check is made.
    275 	 *
    276 	 * XXX: technically this error check should punish the fs,
    277 	 * not the caller.
    278 	 */
    279 	mutex_enter(&pmp->pmp_lock);
    280 	if (cookie == pmp->pmp_root_cookie
    281 	    || puffs_cookie2pnode(pmp, cookie) != NULL) {
    282 		mutex_exit(&pmp->pmp_lock);
    283 		puffs_errnotify(pmp, PUFFS_ERR_MAKENODE, EEXIST, cookie);
    284 		return EPROTO;
    285 	}
    286 
    287 	LIST_FOREACH(pnc, &pmp->pmp_newcookie, pnc_entries) {
    288 		if (pnc->pnc_cookie == cookie) {
    289 			mutex_exit(&pmp->pmp_lock);
    290 			puffs_errnotify(pmp, PUFFS_ERR_MAKENODE, EEXIST,cookie);
    291 			return EPROTO;
    292 		}
    293 	}
    294 	pnc = kmem_alloc(sizeof(struct puffs_newcookie), KM_SLEEP);
    295 	pnc->pnc_cookie = cookie;
    296 	LIST_INSERT_HEAD(&pmp->pmp_newcookie, pnc, pnc_entries);
    297 	mutex_exit(&pmp->pmp_lock);
    298 
    299 	error = puffs_getvnode(dvp->v_mount, cookie, type, 0, rdev, &vp);
    300 	if (error)
    301 		return error;
    302 
    303 	vp->v_type = type;
    304 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    305 	*vpp = vp;
    306 
    307 	if ((cnp->cn_flags & MAKEENTRY) && PUFFS_USE_NAMECACHE(pmp))
    308 		cache_enter(dvp, vp, cnp);
    309 
    310 	return 0;
    311 }
    312 
    313 /*
    314  * Release pnode structure which dealing with references to the
    315  * puffs_node instead of the vnode.  Can't use vref()/vrele() on
    316  * the vnode there, since that causes the lovely VOP_INACTIVE(),
    317  * which in turn causes the lovely deadlock when called by the one
    318  * who is supposed to handle it.
    319  */
    320 void
    321 puffs_releasenode(struct puffs_node *pn)
    322 {
    323 
    324 	mutex_enter(&pn->pn_mtx);
    325 	if (--pn->pn_refcount == 0) {
    326 		mutex_exit(&pn->pn_mtx);
    327 		mutex_destroy(&pn->pn_mtx);
    328 		pool_put(&puffs_pnpool, pn);
    329 	} else {
    330 		mutex_exit(&pn->pn_mtx);
    331 	}
    332 }
    333 
    334 /*
    335  * Add reference to node.
    336  *  mutex held on entry and return
    337  */
    338 void
    339 puffs_referencenode(struct puffs_node *pn)
    340 {
    341 
    342 	KASSERT(mutex_owned(&pn->pn_mtx));
    343 	pn->pn_refcount++;
    344 }
    345 
    346 void
    347 puffs_putvnode(struct vnode *vp)
    348 {
    349 	struct puffs_mount *pmp;
    350 	struct puffs_node *pnode;
    351 
    352 	pmp = VPTOPUFFSMP(vp);
    353 	pnode = VPTOPP(vp);
    354 
    355 #ifdef DIAGNOSTIC
    356 	if (vp->v_tag != VT_PUFFS)
    357 		panic("puffs_putvnode: %p not a puffs vnode", vp);
    358 #endif
    359 
    360 	LIST_REMOVE(pnode, pn_hashent);
    361 	genfs_node_destroy(vp);
    362 	puffs_releasenode(pnode);
    363 	vp->v_data = NULL;
    364 
    365 	return;
    366 }
    367 
    368 static __inline struct puffs_node_hashlist *
    369 puffs_cookie2hashlist(struct puffs_mount *pmp, void *cookie)
    370 {
    371 	uint32_t hash;
    372 
    373 	hash = hash32_buf(&cookie, sizeof(void *), HASH32_BUF_INIT);
    374 	return &pmp->pmp_pnodehash[hash % pmp->pmp_npnodehash];
    375 }
    376 
    377 /*
    378  * Translate cookie to puffs_node.  Caller must hold mountpoint
    379  * lock and it will be held upon return.
    380  */
    381 static struct puffs_node *
    382 puffs_cookie2pnode(struct puffs_mount *pmp, void *cookie)
    383 {
    384 	struct puffs_node_hashlist *plist;
    385 	struct puffs_node *pnode;
    386 
    387 	plist = puffs_cookie2hashlist(pmp, cookie);
    388 	LIST_FOREACH(pnode, plist, pn_hashent) {
    389 		if (pnode->pn_cookie == cookie)
    390 			break;
    391 	}
    392 
    393 	return pnode;
    394 }
    395 
    396 /*
    397  * Make sure root vnode exists and reference it.  Does NOT lock.
    398  */
    399 static int
    400 puffs_makeroot(struct puffs_mount *pmp)
    401 {
    402 	struct vnode *vp;
    403 	int rv;
    404 
    405 	/*
    406 	 * pmp_lock must be held if vref()'ing or vrele()'ing the
    407 	 * root vnode.  the latter is controlled by puffs_inactive().
    408 	 *
    409 	 * pmp_root is set here and cleared in puffs_reclaim().
    410 	 */
    411  retry:
    412 	mutex_enter(&pmp->pmp_lock);
    413 	vp = pmp->pmp_root;
    414 	if (vp) {
    415 		simple_lock(&vp->v_interlock);
    416 		mutex_exit(&pmp->pmp_lock);
    417 		if (vget(vp, LK_INTERLOCK) == 0)
    418 			return 0;
    419 	} else
    420 		mutex_exit(&pmp->pmp_lock);
    421 
    422 	/*
    423 	 * So, didn't have the magic root vnode available.
    424 	 * No matter, grab another and stuff it with the cookie.
    425 	 */
    426 	if ((rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
    427 	    pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp)))
    428 		return rv;
    429 
    430 	/*
    431 	 * Someone magically managed to race us into puffs_getvnode?
    432 	 * Put our previous new vnode back and retry.
    433 	 */
    434 	mutex_enter(&pmp->pmp_lock);
    435 	if (pmp->pmp_root) {
    436 		mutex_exit(&pmp->pmp_lock);
    437 		puffs_putvnode(vp);
    438 		goto retry;
    439 	}
    440 
    441 	/* store cache */
    442 	vp->v_flag = VROOT;
    443 	pmp->pmp_root = vp;
    444 	mutex_exit(&pmp->pmp_lock);
    445 
    446 	return 0;
    447 }
    448 
    449 /*
    450  * Locate the in-kernel vnode based on the cookie received given
    451  * from userspace.  Returns a vnode, if found, NULL otherwise.
    452  * The parameter "lock" control whether to lock the possible or
    453  * not.  Locking always might cause us to lock against ourselves
    454  * in situations where we want the vnode but don't care for the
    455  * vnode lock, e.g. file server issued putpages.
    456  */
    457 int
    458 puffs_cookie2vnode(struct puffs_mount *pmp, void *cookie, int lock,
    459 	int willcreate, struct vnode **vpp)
    460 {
    461 	struct puffs_node *pnode;
    462 	struct puffs_newcookie *pnc;
    463 	struct vnode *vp;
    464 	int vgetflags, rv;
    465 
    466 	/*
    467 	 * Handle root in a special manner, since we want to make sure
    468 	 * pmp_root is properly set.
    469 	 */
    470 	if (cookie == pmp->pmp_root_cookie) {
    471 		if ((rv = puffs_makeroot(pmp)))
    472 			return rv;
    473 		if (lock)
    474 			vn_lock(pmp->pmp_root, LK_EXCLUSIVE | LK_RETRY);
    475 
    476 		*vpp = pmp->pmp_root;
    477 		return 0;
    478 	}
    479 
    480 	mutex_enter(&pmp->pmp_lock);
    481 	pnode = puffs_cookie2pnode(pmp, cookie);
    482 	if (pnode == NULL) {
    483 		if (willcreate) {
    484 			pnc = kmem_alloc(sizeof(struct puffs_newcookie),
    485 			    KM_SLEEP);
    486 			pnc->pnc_cookie = cookie;
    487 			LIST_INSERT_HEAD(&pmp->pmp_newcookie, pnc, pnc_entries);
    488 		}
    489 		mutex_exit(&pmp->pmp_lock);
    490 		return PUFFS_NOSUCHCOOKIE;
    491 	}
    492 	vp = pnode->pn_vp;
    493 	simple_lock(&vp->v_interlock);
    494 	mutex_exit(&pmp->pmp_lock);
    495 
    496 	vgetflags = LK_INTERLOCK;
    497 	if (lock)
    498 		vgetflags |= LK_EXCLUSIVE | LK_RETRY;
    499 	if ((rv = vget(vp, vgetflags)))
    500 		return rv;
    501 
    502 	*vpp = vp;
    503 	return 0;
    504 }
    505 
    506 void
    507 puffs_makecn(struct puffs_kcn *pkcn, struct puffs_kcred *pkcr,
    508 	struct puffs_kcid *pkcid, const struct componentname *cn, int full)
    509 {
    510 
    511 	pkcn->pkcn_nameiop = cn->cn_nameiop;
    512 	pkcn->pkcn_flags = cn->cn_flags;
    513 	puffs_cidcvt(pkcid, cn->cn_lwp);
    514 
    515 	if (full) {
    516 		(void)strcpy(pkcn->pkcn_name, cn->cn_nameptr);
    517 	} else {
    518 		(void)memcpy(pkcn->pkcn_name, cn->cn_nameptr, cn->cn_namelen);
    519 		pkcn->pkcn_name[cn->cn_namelen] = '\0';
    520 	}
    521 	pkcn->pkcn_namelen = cn->cn_namelen;
    522 	pkcn->pkcn_consume = 0;
    523 
    524 	puffs_credcvt(pkcr, cn->cn_cred);
    525 }
    526 
    527 /*
    528  * Convert given credentials to struct puffs_kcred for userspace.
    529  */
    530 void
    531 puffs_credcvt(struct puffs_kcred *pkcr, const kauth_cred_t cred)
    532 {
    533 
    534 	memset(pkcr, 0, sizeof(struct puffs_kcred));
    535 
    536 	if (cred == NOCRED || cred == FSCRED) {
    537 		pkcr->pkcr_type = PUFFCRED_TYPE_INTERNAL;
    538 		if (cred == NOCRED)
    539 			pkcr->pkcr_internal = PUFFCRED_CRED_NOCRED;
    540 		if (cred == FSCRED)
    541 			pkcr->pkcr_internal = PUFFCRED_CRED_FSCRED;
    542  	} else {
    543 		pkcr->pkcr_type = PUFFCRED_TYPE_UUC;
    544 		kauth_cred_to_uucred(&pkcr->pkcr_uuc, cred);
    545 	}
    546 }
    547 
    548 void
    549 puffs_cidcvt(struct puffs_kcid *pkcid, const struct lwp *l)
    550 {
    551 
    552 	if (l) {
    553 		pkcid->pkcid_type = PUFFCID_TYPE_REAL;
    554 		pkcid->pkcid_pid = l->l_proc->p_pid;
    555 		pkcid->pkcid_lwpid = l->l_lid;
    556 	} else {
    557 		pkcid->pkcid_type = PUFFCID_TYPE_FAKE;
    558 		pkcid->pkcid_pid = 0;
    559 		pkcid->pkcid_lwpid = 0;
    560 	}
    561 }
    562 
    563 static void
    564 puffs_gop_size(struct vnode *vp, off_t size, off_t *eobp,
    565 	int flags)
    566 {
    567 
    568 	*eobp = size;
    569 }
    570 
    571 static void
    572 puffs_gop_markupdate(struct vnode *vp, int flags)
    573 {
    574 	int uflags = 0;
    575 
    576 	if (flags & GOP_UPDATE_ACCESSED)
    577 		uflags |= PUFFS_UPDATEATIME;
    578 	if (flags & GOP_UPDATE_MODIFIED)
    579 		uflags |= PUFFS_UPDATEMTIME;
    580 
    581 	puffs_updatenode(vp, uflags);
    582 }
    583 
    584 void
    585 puffs_updatenode(struct vnode *vp, int flags)
    586 {
    587 	struct puffs_node *pn;
    588 	struct timespec ts;
    589 
    590 	if (flags == 0)
    591 		return;
    592 
    593 	pn = VPTOPP(vp);
    594 	nanotime(&ts);
    595 
    596 	if (flags & PUFFS_UPDATEATIME) {
    597 		pn->pn_mc_atime = ts;
    598 		pn->pn_stat |= PNODE_METACACHE_ATIME;
    599 	}
    600 	if (flags & PUFFS_UPDATECTIME) {
    601 		pn->pn_mc_ctime = ts;
    602 		pn->pn_stat |= PNODE_METACACHE_CTIME;
    603 	}
    604 	if (flags & PUFFS_UPDATEMTIME) {
    605 		pn->pn_mc_mtime = ts;
    606 		pn->pn_stat |= PNODE_METACACHE_MTIME;
    607 	}
    608 	if (flags & PUFFS_UPDATESIZE) {
    609 		pn->pn_mc_size = vp->v_size;
    610 		pn->pn_stat |= PNODE_METACACHE_SIZE;
    611 	}
    612 }
    613 
    614 void
    615 puffs_parkdone_asyncbioread(struct puffs_req *preq, void *arg)
    616 {
    617 	struct puffs_vnreq_read *read_argp = (void *)preq;
    618 	struct buf *bp = arg;
    619 	size_t moved;
    620 
    621 	bp->b_error = preq->preq_rv;
    622 	if (bp->b_error == 0) {
    623 		moved = bp->b_bcount - read_argp->pvnr_resid;
    624 		bp->b_resid = read_argp->pvnr_resid;
    625 
    626 		memcpy(bp->b_data, read_argp->pvnr_data, moved);
    627 	}
    628 
    629 	biodone(bp);
    630 	free(preq, M_PUFFS);
    631 }
    632 
    633 /* XXX: userspace can leak kernel resources */
    634 void
    635 puffs_parkdone_poll(struct puffs_req *preq, void *arg)
    636 {
    637 	struct puffs_vnreq_poll *poll_argp = (void *)preq;
    638 	struct puffs_node *pn = arg;
    639 	int revents;
    640 
    641 	if (preq->preq_rv == 0)
    642 		revents = poll_argp->pvnr_events;
    643 	else
    644 		revents = POLLERR;
    645 
    646 	mutex_enter(&pn->pn_mtx);
    647 	pn->pn_revents |= revents;
    648 	mutex_exit(&pn->pn_mtx);
    649 
    650 	selnotify(&pn->pn_sel, 0);
    651 	free(preq, M_PUFFS);
    652 
    653 	puffs_releasenode(pn);
    654 }
    655 
    656 void
    657 puffs_mp_reference(struct puffs_mount *pmp)
    658 {
    659 
    660 	KASSERT(mutex_owned(&pmp->pmp_lock));
    661 	pmp->pmp_refcount++;
    662 }
    663 
    664 void
    665 puffs_mp_release(struct puffs_mount *pmp)
    666 {
    667 
    668 	KASSERT(mutex_owned(&pmp->pmp_lock));
    669 	if (--pmp->pmp_refcount == 0)
    670 		cv_broadcast(&pmp->pmp_refcount_cv);
    671 }
    672