puffs_vfsops.c revision 1.60 1 /* $NetBSD: puffs_vfsops.c,v 1.60 2007/10/01 21:09:08 pooka Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vfsops.c,v 1.60 2007/10/01 21:09:08 pooka Exp $");
34
35 #include <sys/param.h>
36 #include <sys/mount.h>
37 #include <sys/malloc.h>
38 #include <sys/extattr.h>
39 #include <sys/queue.h>
40 #include <sys/vnode.h>
41 #include <sys/dirent.h>
42 #include <sys/kauth.h>
43 #include <sys/fstrans.h>
44 #include <sys/proc.h>
45
46 #include <lib/libkern/libkern.h>
47
48 #include <fs/puffs/puffs_msgif.h>
49 #include <fs/puffs/puffs_sys.h>
50
51 #include <nfs/nfsproto.h> /* for fh sizes */
52
53 VFS_PROTOS(puffs);
54
55 MALLOC_JUSTDEFINE(M_PUFFS, "puffs", "Pass-to-Userspace Framework File System");
56
57 #ifndef PUFFS_PNODEBUCKETS
58 #define PUFFS_PNODEBUCKETS 256
59 #endif
60 #ifndef PUFFS_MAXPNODEBUCKETS
61 #define PUFFS_MAXPNODEBUCKETS 8192
62 #endif
63 int puffs_pnodebuckets_default = PUFFS_PNODEBUCKETS;
64 int puffs_maxpnodebuckets = PUFFS_MAXPNODEBUCKETS;
65
66 int
67 puffs_mount(struct mount *mp, const char *path, void *data, size_t *data_len,
68 struct lwp *l)
69 {
70 struct puffs_mount *pmp = NULL;
71 struct puffs_kargs *args;
72 char fstype[_VFS_NAMELEN];
73 char *p;
74 int error = 0, i;
75
76 if (*data_len < sizeof *args)
77 return EINVAL;
78
79 if (mp->mnt_flag & MNT_GETARGS) {
80 pmp = MPTOPUFFSMP(mp);
81 *(struct puffs_kargs *)data = pmp->pmp_args;
82 *data_len = sizeof *args;
83 return 0;
84 }
85
86 /* update is not supported currently */
87 if (mp->mnt_flag & MNT_UPDATE)
88 return EOPNOTSUPP;
89
90 /*
91 * We need the file system name
92 */
93 if (!data)
94 return EINVAL;
95
96 MALLOC(args, struct puffs_kargs *, sizeof(struct puffs_kargs),
97 M_PUFFS, M_WAITOK);
98
99 *args = *(struct puffs_kargs *)data;
100
101 /* devel phase */
102 if (args->pa_vers != (PUFFSVERSION | PUFFSDEVELVERS)) {
103 printf("puffs_mount: development version mismatch\n");
104 error = EINVAL;
105 goto out;
106 }
107
108 if ((args->pa_flags & ~PUFFS_KFLAG_MASK) != 0) {
109 printf("puffs_mount: invalid KFLAGs 0x%x\n", args->pa_flags);
110 error = EINVAL;
111 goto out;
112 }
113 if ((args->pa_fhflags & ~PUFFS_FHFLAG_MASK) != 0) {
114 printf("puffs_mount: invalid FHFLAGs 0x%x\n", args->pa_fhflags);
115 error = EINVAL;
116 goto out;
117 }
118
119 /* use dummy value for passthrough */
120 if (args->pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH)
121 args->pa_fhsize = sizeof(struct fid);
122
123 /* sanitize file handle length */
124 if (PUFFS_TOFHSIZE(args->pa_fhsize) > FHANDLE_SIZE_MAX) {
125 printf("puffs_mount: handle size %zu too large\n",
126 args->pa_fhsize);
127 error = EINVAL;
128 goto out;
129 }
130 /* sanity check file handle max sizes */
131 if (args->pa_fhsize && args->pa_fhflags & PUFFS_FHFLAG_PROTOMASK) {
132 size_t kfhsize = PUFFS_TOFHSIZE(args->pa_fhsize);
133
134 if (args->pa_fhflags & PUFFS_FHFLAG_NFSV2) {
135 if (NFSX_FHTOOBIG_P(kfhsize, 0)) {
136 printf("puffs_mount: fhsize larger than "
137 "NFSv2 max %d\n",
138 PUFFS_FROMFHSIZE(NFSX_V2FH));
139 error = EINVAL;
140 goto out;
141 }
142 }
143
144 if (args->pa_fhflags & PUFFS_FHFLAG_NFSV3) {
145 if (NFSX_FHTOOBIG_P(kfhsize, 1)) {
146 printf("puffs_mount: fhsize larger than "
147 "NFSv3 max %d\n",
148 PUFFS_FROMFHSIZE(NFSX_V3FHMAX));
149 error = EINVAL;
150 goto out;
151 }
152 }
153 }
154
155 /* don't allow non-printing characters (like my sweet umlauts.. snif) */
156 args->pa_typename[sizeof(args->pa_typename)-1] = '\0';
157 for (p = args->pa_typename; *p; p++)
158 if (*p < ' ' || *p > '~')
159 *p = '.';
160
161 args->pa_mntfromname[sizeof(args->pa_mntfromname)-1] = '\0';
162 for (p = args->pa_mntfromname; *p; p++)
163 if (*p < ' ' || *p > '~')
164 *p = '.';
165
166 /* build real name */
167 (void)strlcpy(fstype, PUFFS_TYPEPREFIX, sizeof(fstype));
168 (void)strlcat(fstype, args->pa_typename, sizeof(fstype));
169
170 /* inform user server if it got the max request size it wanted */
171 if (args->pa_maxreqlen == 0 || args->pa_maxreqlen > PUFFS_REQ_MAXSIZE)
172 args->pa_maxreqlen = PUFFS_REQ_MAXSIZE;
173 else if (args->pa_maxreqlen < 2*PUFFS_REQSTRUCT_MAX)
174 args->pa_maxreqlen = 2*PUFFS_REQSTRUCT_MAX;
175 (void)strlcpy(args->pa_typename, fstype, sizeof(args->pa_typename));
176
177 if (args->pa_nhashbuckets == 0)
178 args->pa_nhashbuckets = puffs_pnodebuckets_default;
179 if (args->pa_nhashbuckets < 1)
180 args->pa_nhashbuckets = 1;
181 if (args->pa_nhashbuckets > PUFFS_MAXPNODEBUCKETS) {
182 args->pa_nhashbuckets = puffs_maxpnodebuckets;
183 printf("puffs_mount: using %d hash buckets. "
184 "adjust puffs_maxpnodebuckets for more\n",
185 puffs_maxpnodebuckets);
186 }
187
188 error = set_statvfs_info(path, UIO_USERSPACE, args->pa_mntfromname,
189 UIO_SYSSPACE, fstype, mp, l);
190 if (error)
191 goto out;
192 mp->mnt_stat.f_iosize = DEV_BSIZE;
193
194 /*
195 * We can't handle the VFS_STATVFS() mount_domount() does
196 * after VFS_MOUNT() because we'd deadlock, so handle it
197 * here already.
198 */
199 copy_statvfs_info(&args->pa_svfsb, mp);
200 (void)memcpy(&mp->mnt_stat, &args->pa_svfsb, sizeof(mp->mnt_stat));
201
202 MALLOC(pmp, struct puffs_mount *, sizeof(struct puffs_mount),
203 M_PUFFS, M_WAITOK | M_ZERO);
204
205 mp->mnt_fs_bshift = DEV_BSHIFT;
206 mp->mnt_dev_bshift = DEV_BSHIFT;
207 mp->mnt_flag &= ~MNT_LOCAL; /* we don't really know, so ... */
208 mp->mnt_data = pmp;
209 mp->mnt_iflag |= IMNT_HAS_TRANS;
210
211 pmp->pmp_status = PUFFSTAT_MOUNTING;
212 pmp->pmp_nextreq = 0;
213 pmp->pmp_mp = mp;
214 pmp->pmp_req_maxsize = args->pa_maxreqlen;
215 pmp->pmp_args = *args;
216
217 pmp->pmp_npnodehash = args->pa_nhashbuckets;
218 pmp->pmp_pnodehash = malloc
219 (sizeof(struct puffs_pnode_hashlist *) * pmp->pmp_npnodehash,
220 M_PUFFS, M_WAITOK);
221 for (i = 0; i < pmp->pmp_npnodehash; i++)
222 LIST_INIT(&pmp->pmp_pnodehash[i]);
223 LIST_INIT(&pmp->pmp_newcookie);
224
225 /*
226 * Inform the fileops processing code that we have a mountpoint.
227 * If it doesn't know about anyone with our pid/fd having the
228 * device open, punt
229 */
230 if (puffs_setpmp(l->l_proc->p_pid, args->pa_fd, pmp)) {
231 error = ENOENT;
232 goto out;
233 }
234
235 /* XXX: check parameters */
236 pmp->pmp_root_cookie = args->pa_root_cookie;
237 pmp->pmp_root_vtype = args->pa_root_vtype;
238 pmp->pmp_root_vsize = args->pa_root_vsize;
239 pmp->pmp_root_rdev = args->pa_root_rdev;
240
241 mutex_init(&pmp->pmp_lock, MUTEX_DEFAULT, IPL_NONE);
242 cv_init(&pmp->pmp_req_waiter_cv, "puffsget");
243 cv_init(&pmp->pmp_refcount_cv, "puffsref");
244 cv_init(&pmp->pmp_unmounting_cv, "puffsum");
245 TAILQ_INIT(&pmp->pmp_req_touser);
246 TAILQ_INIT(&pmp->pmp_req_replywait);
247 TAILQ_INIT(&pmp->pmp_req_sizepark);
248
249 DPRINTF(("puffs_mount: mount point at %p, puffs specific at %p\n",
250 mp, MPTOPUFFSMP(mp)));
251
252 vfs_getnewfsid(mp);
253
254 out:
255 if (error && pmp && pmp->pmp_pnodehash)
256 free(pmp->pmp_pnodehash, M_PUFFS);
257 if (error && pmp)
258 FREE(pmp, M_PUFFS);
259 FREE(args, M_PUFFS);
260 return error;
261 }
262
263 int
264 puffs_start(struct mount *mp, int flags, struct lwp *l)
265 {
266 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
267
268 KASSERT(pmp->pmp_status == PUFFSTAT_MOUNTING);
269 pmp->pmp_status = PUFFSTAT_RUNNING;
270
271 return 0;
272 }
273
274 int
275 puffs_unmount(struct mount *mp, int mntflags, struct lwp *l)
276 {
277 struct puffs_mount *pmp;
278 int error, force;
279
280 PUFFS_VFSREQ(unmount);
281
282 error = 0;
283 force = mntflags & MNT_FORCE;
284 pmp = MPTOPUFFSMP(mp);
285
286 DPRINTF(("puffs_unmount: detach filesystem from vfs, current "
287 "status 0x%x\n", pmp->pmp_status));
288
289 /*
290 * flush all the vnodes. VOP_RECLAIM() takes care that the
291 * root vnode does not get flushed until unmount. The
292 * userspace root node cookie is stored in the mount
293 * structure, so we can always re-instantiate a root vnode,
294 * should userspace unmount decide it doesn't want to
295 * cooperate.
296 */
297 error = vflush(mp, NULLVP, force ? FORCECLOSE : 0);
298 if (error)
299 goto out;
300
301 /*
302 * If we are not DYING, we should ask userspace's opinion
303 * about the situation
304 */
305 mutex_enter(&pmp->pmp_lock);
306 if (pmp->pmp_status != PUFFSTAT_DYING) {
307 pmp->pmp_unmounting = 1;
308 mutex_exit(&pmp->pmp_lock);
309
310 unmount_arg.pvfsr_flags = mntflags;
311 puffs_cidcvt(&unmount_arg.pvfsr_cid, l);
312
313 error = puffs_vfstouser(pmp, PUFFS_VFS_UNMOUNT,
314 &unmount_arg, sizeof(unmount_arg));
315 error = checkerr(pmp, error, __func__);
316 DPRINTF(("puffs_unmount: error %d force %d\n", error, force));
317
318 mutex_enter(&pmp->pmp_lock);
319 pmp->pmp_unmounting = 0;
320 cv_broadcast(&pmp->pmp_unmounting_cv);
321 }
322
323 /*
324 * if userspace cooperated or we really need to die,
325 * screw what userland thinks and just die.
326 */
327 if (error == 0 || force) {
328 /* tell waiters & other resources to go unwait themselves */
329 puffs_userdead(pmp);
330 puffs_nukebypmp(pmp);
331
332 /*
333 * Wait until there are no more users for the mount resource.
334 * Notice that this is hooked against transport_close
335 * and return from touser. In an ideal world, it would
336 * be hooked against final return from all operations.
337 * But currently it works well enough, since nobody
338 * does weird blocking voodoo after return from touser().
339 */
340 while (pmp->pmp_refcount != 0)
341 cv_wait(&pmp->pmp_refcount_cv, &pmp->pmp_lock);
342 mutex_exit(&pmp->pmp_lock);
343
344 /* free resources now that we hopefully have no waiters left */
345 cv_destroy(&pmp->pmp_unmounting_cv);
346 cv_destroy(&pmp->pmp_refcount_cv);
347 cv_destroy(&pmp->pmp_req_waiter_cv);
348 mutex_destroy(&pmp->pmp_lock);
349
350 free(pmp->pmp_pnodehash, M_PUFFS);
351 FREE(pmp, M_PUFFS);
352 error = 0;
353 } else {
354 mutex_exit(&pmp->pmp_lock);
355 }
356
357 out:
358 DPRINTF(("puffs_unmount: return %d\n", error));
359 return error;
360 }
361
362 /*
363 * This doesn't need to travel to userspace
364 */
365 int
366 puffs_root(struct mount *mp, struct vnode **vpp)
367 {
368 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
369 int rv;
370
371 rv = puffs_cookie2vnode(pmp, pmp->pmp_root_cookie, 1, 1, vpp);
372 KASSERT(rv != PUFFS_NOSUCHCOOKIE);
373 return rv;
374 }
375
376 int
377 puffs_statvfs(struct mount *mp, struct statvfs *sbp, struct lwp *l)
378 {
379 struct puffs_vfsreq_statvfs *statvfs_arg; /* too big for stack */
380 struct puffs_mount *pmp;
381 int error = 0;
382
383 pmp = MPTOPUFFSMP(mp);
384
385 /*
386 * If we are mounting, it means that the userspace counterpart
387 * is calling mount(2), but mount(2) also calls statvfs. So
388 * requesting statvfs from userspace would mean a deadlock.
389 * Compensate.
390 */
391 if (pmp->pmp_status == PUFFSTAT_MOUNTING)
392 return EINPROGRESS;
393
394 /* too big for stack */
395 MALLOC(statvfs_arg, struct puffs_vfsreq_statvfs *,
396 sizeof(struct puffs_vfsreq_statvfs), M_PUFFS, M_WAITOK | M_ZERO);
397 puffs_cidcvt(&statvfs_arg->pvfsr_cid, l);
398
399 error = puffs_vfstouser(pmp, PUFFS_VFS_STATVFS,
400 statvfs_arg, sizeof(*statvfs_arg));
401 error = checkerr(pmp, error, __func__);
402 statvfs_arg->pvfsr_sb.f_iosize = DEV_BSIZE;
403
404 /*
405 * Try to produce a sensible result even in the event
406 * of userspace error.
407 *
408 * XXX: cache the copy in non-error case
409 */
410 if (!error) {
411 copy_statvfs_info(&statvfs_arg->pvfsr_sb, mp);
412 (void)memcpy(sbp, &statvfs_arg->pvfsr_sb,
413 sizeof(struct statvfs));
414 } else {
415 copy_statvfs_info(sbp, mp);
416 }
417
418 FREE(statvfs_arg, M_PUFFS);
419 return error;
420 }
421
422 static int
423 pageflush(struct mount *mp, kauth_cred_t cred,
424 int waitfor, int suspending, struct lwp *l)
425 {
426 struct puffs_node *pn;
427 struct vnode *vp, *nvp;
428 int error, rv;
429
430 KASSERT(((waitfor == MNT_WAIT) && suspending) == 0);
431 KASSERT((suspending == 0)
432 || (fstrans_is_owner(mp)
433 && fstrans_getstate(mp) == FSTRANS_SUSPENDING));
434
435 error = 0;
436
437 /*
438 * Sync all cached data from regular vnodes (which are not
439 * currently locked, see below). After this we call VFS_SYNC
440 * for the fs server, which should handle data and metadata for
441 * all the nodes it knows to exist.
442 */
443 simple_lock(&mntvnode_slock);
444 loop:
445 for (vp = TAILQ_FIRST(&mp->mnt_vnodelist); vp; vp = nvp) {
446 /* check if we're on the right list */
447 if (vp->v_mount != mp)
448 goto loop;
449
450 simple_lock(&vp->v_interlock);
451 pn = VPTOPP(vp);
452 nvp = TAILQ_NEXT(vp, v_mntvnodes);
453
454 if (vp->v_type != VREG || UVM_OBJ_IS_CLEAN(&vp->v_uobj)) {
455 simple_unlock(&vp->v_interlock);
456 continue;
457 }
458
459 simple_unlock(&mntvnode_slock);
460
461 /*
462 * Here we try to get a reference to the vnode and to
463 * lock it. This is mostly cargo-culted, but I will
464 * offer an explanation to why I believe this might
465 * actually do the right thing.
466 *
467 * If the vnode is a goner, we quite obviously don't need
468 * to sync it.
469 *
470 * If the vnode was busy, we don't need to sync it because
471 * this is never called with MNT_WAIT except from
472 * dounmount(), when we are wait-flushing all the dirty
473 * vnodes through other routes in any case. So there,
474 * sync() doesn't actually sync. Happy now?
475 *
476 * NOTE: if we're suspending, vget() does NOT lock.
477 * See puffs_lock() for details.
478 */
479 rv = vget(vp, LK_EXCLUSIVE | LK_NOWAIT | LK_INTERLOCK);
480 if (rv) {
481 simple_lock(&mntvnode_slock);
482 if (rv == ENOENT)
483 goto loop;
484 continue;
485 }
486
487 /*
488 * Thread information to puffs_strategy() through the
489 * pnode flags: we want to issue the putpages operations
490 * as FAF if we're suspending, since it's very probable
491 * that our execution context is that of the userspace
492 * daemon. We can do this because:
493 * + we send the "going to suspend" prior to this part
494 * + if any of the writes fails in userspace, it's the
495 * file system server's problem to decide if this was a
496 * failed snapshot when it gets the "snapshot complete"
497 * notification.
498 * + if any of the writes fail in the kernel already, we
499 * immediately fail *and* notify the user server of
500 * failure.
501 *
502 * We also do FAFs if we're called from the syncer. This
503 * is just general optimization for trickle sync: no need
504 * to really guarantee that the stuff ended on backing
505 * storage.
506 * TODO: Maybe also hint the user server of this twist?
507 */
508 if (suspending || waitfor == MNT_LAZY) {
509 simple_lock(&vp->v_interlock);
510 pn->pn_stat |= PNODE_SUSPEND;
511 simple_unlock(&vp->v_interlock);
512 }
513 rv = VOP_FSYNC(vp, cred, waitfor, 0, 0, l);
514 if (suspending || waitfor == MNT_LAZY) {
515 simple_lock(&vp->v_interlock);
516 pn->pn_stat &= ~PNODE_SUSPEND;
517 simple_unlock(&vp->v_interlock);
518 }
519 if (rv)
520 error = rv;
521 vput(vp);
522 simple_lock(&mntvnode_slock);
523 }
524 simple_unlock(&mntvnode_slock);
525
526 return error;
527 }
528
529 int
530 puffs_sync(struct mount *mp, int waitfor, struct kauth_cred *cred,
531 struct lwp *l)
532 {
533 int error, rv;
534
535 PUFFS_VFSREQ(sync);
536
537 error = pageflush(mp, cred, waitfor, 0, l);
538
539 /* sync fs */
540 sync_arg.pvfsr_waitfor = waitfor;
541 puffs_credcvt(&sync_arg.pvfsr_cred, cred);
542 puffs_cidcvt(&sync_arg.pvfsr_cid, l);
543
544 rv = puffs_vfstouser(MPTOPUFFSMP(mp), PUFFS_VFS_SYNC,
545 &sync_arg, sizeof(sync_arg));
546 rv = checkerr(MPTOPUFFSMP(mp), rv, __func__);
547 if (rv)
548 error = rv;
549
550 return error;
551 }
552
553 int
554 puffs_fhtovp(struct mount *mp, struct fid *fhp, struct vnode **vpp)
555 {
556 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
557 struct puffs_vfsreq_fhtonode *fhtonode_argp;
558 struct vnode *vp;
559 void *fhdata;
560 size_t argsize, fhlen;
561 int error;
562
563 if (pmp->pmp_args.pa_fhsize == 0)
564 return EOPNOTSUPP;
565
566 if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH) {
567 fhlen = fhp->fid_len;
568 fhdata = fhp;
569 } else {
570 fhlen = PUFFS_FROMFHSIZE(fhp->fid_len);
571 fhdata = fhp->fid_data;
572
573 if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_DYNAMIC) {
574 if (pmp->pmp_args.pa_fhsize < fhlen)
575 return EINVAL;
576 } else {
577 if (pmp->pmp_args.pa_fhsize != fhlen)
578 return EINVAL;
579 }
580 }
581
582 argsize = sizeof(struct puffs_vfsreq_fhtonode) + fhlen;
583 fhtonode_argp = malloc(argsize, M_PUFFS, M_ZERO | M_WAITOK);
584 fhtonode_argp->pvfsr_dsize = fhlen;
585 memcpy(fhtonode_argp->pvfsr_data, fhdata, fhlen);
586
587 error = puffs_vfstouser(pmp, PUFFS_VFS_FHTOVP, fhtonode_argp, argsize);
588 error = checkerr(pmp, error, __func__);
589 if (error)
590 goto out;
591
592 error = puffs_cookie2vnode(pmp, fhtonode_argp->pvfsr_fhcookie, 1,1,&vp);
593 DPRINTF(("puffs_fhtovp: got cookie %p, existing vnode %p\n",
594 fhtonode_argp->pvfsr_fhcookie, vp));
595 if (error == PUFFS_NOSUCHCOOKIE) {
596 error = puffs_getvnode(mp, fhtonode_argp->pvfsr_fhcookie,
597 fhtonode_argp->pvfsr_vtype, fhtonode_argp->pvfsr_size,
598 fhtonode_argp->pvfsr_rdev, &vp);
599 if (error)
600 goto out;
601 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
602 } else if (error) {
603 goto out;
604 }
605
606 *vpp = vp;
607 out:
608 free(fhtonode_argp, M_PUFFS);
609 return error;
610 }
611
612 int
613 puffs_vptofh(struct vnode *vp, struct fid *fhp, size_t *fh_size)
614 {
615 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
616 struct puffs_vfsreq_nodetofh *nodetofh_argp;
617 size_t argsize, fhlen;
618 int error;
619
620 if (pmp->pmp_args.pa_fhsize == 0)
621 return EOPNOTSUPP;
622
623 /* if file handles are static len, we can test len immediately */
624 if (((pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_DYNAMIC) == 0)
625 && ((pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH) == 0)
626 && (PUFFS_FROMFHSIZE(*fh_size) < pmp->pmp_args.pa_fhsize)) {
627 *fh_size = PUFFS_TOFHSIZE(pmp->pmp_args.pa_fhsize);
628 return E2BIG;
629 }
630
631 if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH)
632 fhlen = *fh_size;
633 else
634 fhlen = PUFFS_FROMFHSIZE(*fh_size);
635
636 argsize = sizeof(struct puffs_vfsreq_nodetofh) + fhlen;
637 nodetofh_argp = malloc(argsize, M_PUFFS, M_ZERO | M_WAITOK);
638 nodetofh_argp->pvfsr_fhcookie = VPTOPNC(vp);
639 nodetofh_argp->pvfsr_dsize = fhlen;
640
641 error = puffs_vfstouser(pmp, PUFFS_VFS_VPTOFH, nodetofh_argp, argsize);
642 error = checkerr(pmp, error, __func__);
643
644 if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH)
645 fhlen = nodetofh_argp->pvfsr_dsize;
646 else if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_DYNAMIC)
647 fhlen = PUFFS_TOFHSIZE(nodetofh_argp->pvfsr_dsize);
648 else
649 fhlen = PUFFS_TOFHSIZE(pmp->pmp_args.pa_fhsize);
650
651 if (error) {
652 if (error == E2BIG)
653 *fh_size = fhlen;
654 goto out;
655 }
656
657 if (fhlen > FHANDLE_SIZE_MAX) {
658 puffs_errnotify(pmp, PUFFS_ERR_VPTOFH, E2BIG,
659 "file handle too big", VPTOPNC(vp));
660 error = EPROTO;
661 goto out;
662 }
663
664 if (*fh_size < fhlen) {
665 *fh_size = fhlen;
666 error = E2BIG;
667 goto out;
668 }
669 *fh_size = fhlen;
670
671 if (fhp) {
672 if (pmp->pmp_args.pa_fhflags & PUFFS_FHFLAG_PASSTHROUGH) {
673 memcpy(fhp, nodetofh_argp->pvfsr_data, fhlen);
674 } else {
675 fhp->fid_len = *fh_size;
676 memcpy(fhp->fid_data, nodetofh_argp->pvfsr_data,
677 nodetofh_argp->pvfsr_dsize);
678 }
679 }
680
681 out:
682 free(nodetofh_argp, M_PUFFS);
683 return error;
684 }
685
686 void
687 puffs_init()
688 {
689
690 /* some checks depend on this */
691 KASSERT(VNOVAL == VSIZENOTSET);
692
693 malloc_type_attach(M_PUFFS);
694
695 pool_init(&puffs_pnpool, sizeof(struct puffs_node), 0, 0, 0,
696 "puffpnpl", &pool_allocator_nointr, IPL_NONE);
697 puffs_transport_init();
698 puffs_msgif_init();
699 }
700
701 void
702 puffs_done()
703 {
704
705 puffs_msgif_destroy();
706 puffs_transport_destroy();
707 pool_destroy(&puffs_pnpool);
708
709 malloc_type_detach(M_PUFFS);
710 }
711
712 int
713 puffs_snapshot(struct mount *mp, struct vnode *vp, struct timespec *ts)
714 {
715
716 return EOPNOTSUPP;
717 }
718
719 int
720 puffs_suspendctl(struct mount *mp, int cmd)
721 {
722 struct puffs_mount *pmp;
723 int error;
724
725 pmp = MPTOPUFFSMP(mp);
726 switch (cmd) {
727 case SUSPEND_SUSPEND:
728 DPRINTF(("puffs_suspendctl: suspending\n"));
729 if ((error = fstrans_setstate(mp, FSTRANS_SUSPENDING)) != 0)
730 break;
731 puffs_suspendtouser(pmp, PUFFS_SUSPEND_START);
732
733 error = pageflush(mp, FSCRED, 0, 1, curlwp);
734 if (error == 0)
735 error = fstrans_setstate(mp, FSTRANS_SUSPENDED);
736
737 if (error != 0) {
738 puffs_suspendtouser(pmp, PUFFS_SUSPEND_ERROR);
739 (void) fstrans_setstate(mp, FSTRANS_NORMAL);
740 break;
741 }
742
743 puffs_suspendtouser(pmp, PUFFS_SUSPEND_SUSPENDED);
744
745 break;
746
747 case SUSPEND_RESUME:
748 DPRINTF(("puffs_suspendctl: resume\n"));
749 error = 0;
750 (void) fstrans_setstate(mp, FSTRANS_NORMAL);
751 puffs_suspendtouser(pmp, PUFFS_SUSPEND_RESUME);
752 break;
753
754 default:
755 error = EINVAL;
756 break;
757 }
758
759 DPRINTF(("puffs_suspendctl: return %d\n", error));
760 return error;
761 }
762
763 const struct vnodeopv_desc * const puffs_vnodeopv_descs[] = {
764 &puffs_vnodeop_opv_desc,
765 &puffs_specop_opv_desc,
766 &puffs_fifoop_opv_desc,
767 &puffs_msgop_opv_desc,
768 NULL,
769 };
770
771 struct vfsops puffs_vfsops = {
772 MOUNT_PUFFS,
773 sizeof (struct puffs_kargs),
774 puffs_mount, /* mount */
775 puffs_start, /* start */
776 puffs_unmount, /* unmount */
777 puffs_root, /* root */
778 (void *)eopnotsupp, /* quotactl */
779 puffs_statvfs, /* statvfs */
780 puffs_sync, /* sync */
781 (void *)eopnotsupp, /* vget */
782 puffs_fhtovp, /* fhtovp */
783 puffs_vptofh, /* vptofh */
784 puffs_init, /* init */
785 NULL, /* reinit */
786 puffs_done, /* done */
787 NULL, /* mountroot */
788 puffs_snapshot, /* snapshot */
789 vfs_stdextattrctl, /* extattrctl */
790 puffs_suspendctl, /* suspendctl */
791 puffs_vnodeopv_descs, /* vnodeops */
792 0, /* refcount */
793 { NULL, NULL }
794 };
795 VFS_ATTACH(puffs_vfsops);
796