puffs_vnops.c revision 1.6 1 1.6 pooka /* $NetBSD: puffs_vnops.c,v 1.6 2006/10/27 12:25:16 pooka Exp $ */
2 1.1 pooka
3 1.1 pooka /*
4 1.1 pooka * Copyright (c) 2005, 2006 Antti Kantee. All Rights Reserved.
5 1.1 pooka *
6 1.1 pooka * Development of this software was supported by the
7 1.1 pooka * Google Summer of Code program and the Ulla Tuominen Foundation.
8 1.1 pooka * The Google SoC project was mentored by Bill Studenmund.
9 1.1 pooka *
10 1.1 pooka * Redistribution and use in source and binary forms, with or without
11 1.1 pooka * modification, are permitted provided that the following conditions
12 1.1 pooka * are met:
13 1.1 pooka * 1. Redistributions of source code must retain the above copyright
14 1.1 pooka * notice, this list of conditions and the following disclaimer.
15 1.1 pooka * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 pooka * notice, this list of conditions and the following disclaimer in the
17 1.1 pooka * documentation and/or other materials provided with the distribution.
18 1.1 pooka * 3. The name of the company nor the name of the author may be used to
19 1.1 pooka * endorse or promote products derived from this software without specific
20 1.1 pooka * prior written permission.
21 1.1 pooka *
22 1.1 pooka * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
23 1.1 pooka * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
24 1.1 pooka * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
25 1.1 pooka * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 1.1 pooka * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 pooka * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
28 1.1 pooka * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 pooka * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 pooka * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 pooka * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 pooka * SUCH DAMAGE.
33 1.1 pooka */
34 1.1 pooka
35 1.1 pooka #include <sys/cdefs.h>
36 1.6 pooka __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.6 2006/10/27 12:25:16 pooka Exp $");
37 1.1 pooka
38 1.1 pooka #include <sys/param.h>
39 1.1 pooka #include <sys/vnode.h>
40 1.1 pooka #include <sys/mount.h>
41 1.1 pooka #include <sys/malloc.h>
42 1.1 pooka #include <sys/namei.h>
43 1.1 pooka
44 1.1 pooka #include <fs/puffs/puffs_msgif.h>
45 1.1 pooka #include <fs/puffs/puffs_sys.h>
46 1.1 pooka
47 1.6 pooka #include <miscfs/fifofs/fifo.h>
48 1.1 pooka #include <miscfs/genfs/genfs.h>
49 1.5 pooka #include <miscfs/specfs/specdev.h>
50 1.5 pooka
51 1.1 pooka int puffs_lookup(void *);
52 1.1 pooka int puffs_create(void *);
53 1.1 pooka int puffs_access(void *);
54 1.1 pooka int puffs_mknod(void *);
55 1.1 pooka int puffs_open(void *);
56 1.1 pooka int puffs_close(void *);
57 1.1 pooka int puffs_getattr(void *);
58 1.1 pooka int puffs_setattr(void *);
59 1.1 pooka int puffs_revoke(void *);
60 1.1 pooka int puffs_reclaim(void *);
61 1.1 pooka int puffs_readdir(void *);
62 1.1 pooka int puffs_poll(void *);
63 1.1 pooka int puffs_fsync(void *);
64 1.1 pooka int puffs_seek(void *);
65 1.1 pooka int puffs_remove(void *);
66 1.1 pooka int puffs_mkdir(void *);
67 1.1 pooka int puffs_rmdir(void *);
68 1.1 pooka int puffs_link(void *);
69 1.1 pooka int puffs_readlink(void *);
70 1.1 pooka int puffs_symlink(void *);
71 1.1 pooka int puffs_rename(void *);
72 1.1 pooka int puffs_read(void *);
73 1.1 pooka int puffs_write(void *);
74 1.1 pooka int puffs_fcntl(void *);
75 1.1 pooka int puffs_ioctl(void *);
76 1.1 pooka int puffs_inactive(void *);
77 1.1 pooka int puffs_print(void *);
78 1.1 pooka int puffs_pathconf(void *);
79 1.1 pooka int puffs_advlock(void *);
80 1.1 pooka
81 1.1 pooka
82 1.1 pooka /* Need to support */
83 1.1 pooka #define puffs_putpages puffs_generic
84 1.1 pooka #define puffs_getpages puffs_generic
85 1.1 pooka
86 1.1 pooka /* VOP_LEASE() not included */
87 1.1 pooka
88 1.1 pooka int puffs_generic(void *);
89 1.1 pooka
90 1.1 pooka #if 0
91 1.1 pooka #define puffs_lock genfs_lock
92 1.1 pooka #define puffs_unlock genfs_unlock
93 1.1 pooka #define puffs_islocked genfs_islocked
94 1.1 pooka #else
95 1.1 pooka int puffs_lock(void *);
96 1.1 pooka int puffs_unlock(void *);
97 1.1 pooka int puffs_islocked(void *);
98 1.1 pooka #endif
99 1.1 pooka
100 1.5 pooka /*
101 1.5 pooka * no special specops for now. hmm, probably don't want to handle
102 1.5 pooka * these synchronously, since they don't actually demand any
103 1.5 pooka * response. so maybe we need another touser-type thing...
104 1.5 pooka */
105 1.5 pooka #define puffsspec_read spec_read
106 1.5 pooka #define puffsspec_write spec_write
107 1.5 pooka #define puffsspec_close spec_close
108 1.6 pooka /* no special fifo-ooops either */
109 1.6 pooka #define puffsfifo_read fifo_read
110 1.6 pooka #define puffsfifo_write fifo_write
111 1.6 pooka #define puffsfifo_close fifo_close
112 1.5 pooka
113 1.1 pooka int (**puffs_vnodeop_p)(void *);
114 1.1 pooka const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
115 1.1 pooka { &vop_default_desc, vn_default_error },
116 1.1 pooka { &vop_lookup_desc, puffs_lookup }, /* lookup */
117 1.1 pooka { &vop_create_desc, puffs_create }, /* create */
118 1.1 pooka { &vop_mknod_desc, puffs_mknod }, /* mknod */
119 1.1 pooka { &vop_open_desc, puffs_open }, /* open */
120 1.1 pooka { &vop_close_desc, puffs_close }, /* close */
121 1.1 pooka { &vop_access_desc, puffs_access }, /* access */
122 1.1 pooka { &vop_getattr_desc, puffs_getattr }, /* getattr */
123 1.1 pooka { &vop_setattr_desc, puffs_setattr }, /* setattr */
124 1.1 pooka { &vop_read_desc, puffs_read }, /* read */
125 1.1 pooka { &vop_write_desc, puffs_write }, /* write */
126 1.1 pooka { &vop_fcntl_desc, puffs_fcntl }, /* fcntl */
127 1.1 pooka { &vop_ioctl_desc, puffs_ioctl }, /* ioctl */
128 1.1 pooka { &vop_revoke_desc, puffs_revoke }, /* revoke */
129 1.1 pooka { &vop_fsync_desc, puffs_fsync }, /* fsync */
130 1.1 pooka { &vop_seek_desc, puffs_seek }, /* seek */
131 1.1 pooka { &vop_remove_desc, puffs_remove }, /* remove */
132 1.1 pooka { &vop_link_desc, puffs_link }, /* link */
133 1.1 pooka { &vop_rename_desc, puffs_rename }, /* rename */
134 1.1 pooka { &vop_mkdir_desc, puffs_mkdir }, /* mkdir */
135 1.1 pooka { &vop_rmdir_desc, puffs_rmdir }, /* rmdir */
136 1.1 pooka { &vop_symlink_desc, puffs_symlink }, /* symlink */
137 1.1 pooka { &vop_readdir_desc, puffs_readdir }, /* readdir */
138 1.1 pooka { &vop_readlink_desc, puffs_readlink }, /* readlink */
139 1.1 pooka { &vop_abortop_desc, genfs_abortop }, /* abortop */
140 1.1 pooka { &vop_inactive_desc, puffs_inactive }, /* inactive */
141 1.1 pooka { &vop_reclaim_desc, puffs_reclaim }, /* reclaim */
142 1.1 pooka { &vop_lock_desc, puffs_lock }, /* lock */
143 1.1 pooka { &vop_unlock_desc, puffs_unlock }, /* unlock */
144 1.1 pooka { &vop_bmap_desc, genfs_eopnotsupp }, /* bmap */
145 1.1 pooka { &vop_strategy_desc, genfs_eopnotsupp }, /* strategy */
146 1.1 pooka { &vop_print_desc, puffs_print }, /* print */
147 1.1 pooka { &vop_islocked_desc, puffs_islocked }, /* islocked */
148 1.1 pooka { &vop_pathconf_desc, puffs_pathconf }, /* pathconf */
149 1.1 pooka { &vop_advlock_desc, puffs_advlock }, /* advlock */
150 1.1 pooka { &vop_bwrite_desc, genfs_nullop }, /* bwrite */
151 1.1 pooka #if 0
152 1.1 pooka { &vop_getpages_desc, puffs_getpages }, /* getpages */
153 1.1 pooka #endif
154 1.1 pooka { &vop_putpages_desc, genfs_null_putpages }, /* putpages */
155 1.1 pooka
156 1.1 pooka { &vop_poll_desc, genfs_eopnotsupp }, /* poll XXX */
157 1.1 pooka { &vop_poll_desc, genfs_eopnotsupp }, /* kqfilter XXX */
158 1.1 pooka { &vop_mmap_desc, genfs_eopnotsupp }, /* mmap XXX */
159 1.1 pooka { NULL, NULL }
160 1.1 pooka };
161 1.1 pooka const struct vnodeopv_desc puffs_vnodeop_opv_desc =
162 1.1 pooka { &puffs_vnodeop_p, puffs_vnodeop_entries };
163 1.1 pooka
164 1.5 pooka
165 1.5 pooka int (**puffs_specop_p)(void *);
166 1.5 pooka const struct vnodeopv_entry_desc puffs_specop_entries[] = {
167 1.5 pooka { &vop_default_desc, vn_default_error },
168 1.5 pooka { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
169 1.6 pooka { &vop_create_desc, spec_create }, /* genfs_badop */
170 1.6 pooka { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
171 1.6 pooka { &vop_open_desc, spec_open }, /* spec_open */
172 1.5 pooka { &vop_close_desc, puffsspec_close }, /* close */
173 1.5 pooka { &vop_access_desc, puffs_access }, /* access */
174 1.5 pooka { &vop_getattr_desc, puffs_getattr }, /* getattr */
175 1.5 pooka { &vop_setattr_desc, puffs_setattr }, /* setattr */
176 1.5 pooka { &vop_read_desc, puffsspec_read }, /* read */
177 1.5 pooka { &vop_write_desc, puffsspec_write }, /* write */
178 1.5 pooka { &vop_lease_desc, spec_lease_check }, /* genfs_nullop */
179 1.5 pooka { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
180 1.5 pooka { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
181 1.5 pooka { &vop_poll_desc, spec_poll }, /* spec_poll */
182 1.5 pooka { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
183 1.5 pooka { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
184 1.5 pooka { &vop_mmap_desc, spec_mmap }, /* genfs_mmap (dummy) */
185 1.5 pooka { &vop_fsync_desc, puffs_fsync }, /* fsync */
186 1.5 pooka { &vop_seek_desc, spec_seek }, /* genfs_nullop */
187 1.5 pooka { &vop_remove_desc, spec_remove }, /* genfs_badop */
188 1.5 pooka { &vop_link_desc, spec_link }, /* genfs_badop */
189 1.5 pooka { &vop_rename_desc, spec_rename }, /* genfs_badop */
190 1.5 pooka { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
191 1.5 pooka { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
192 1.5 pooka { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
193 1.5 pooka { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
194 1.5 pooka { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
195 1.5 pooka { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
196 1.6 pooka { &vop_inactive_desc, puffs_inactive }, /* inactive */
197 1.6 pooka { &vop_reclaim_desc, puffs_reclaim }, /* reclaim */
198 1.5 pooka { &vop_lock_desc, puffs_lock }, /* lock */
199 1.5 pooka { &vop_unlock_desc, puffs_unlock }, /* unlock */
200 1.5 pooka { &vop_bmap_desc, spec_bmap }, /* dummy */
201 1.5 pooka { &vop_strategy_desc, spec_strategy }, /* dev strategy */
202 1.5 pooka { &vop_print_desc, puffs_print }, /* print */
203 1.5 pooka { &vop_islocked_desc, puffs_islocked }, /* islocked */
204 1.5 pooka { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
205 1.5 pooka { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
206 1.5 pooka { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
207 1.5 pooka { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
208 1.5 pooka { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
209 1.5 pooka #if 0
210 1.5 pooka { &vop_openextattr_desc, _openextattr }, /* openextattr */
211 1.5 pooka { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
212 1.5 pooka { &vop_getextattr_desc, _getextattr }, /* getextattr */
213 1.5 pooka { &vop_setextattr_desc, _setextattr }, /* setextattr */
214 1.5 pooka { &vop_listextattr_desc, _listextattr }, /* listextattr */
215 1.5 pooka { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
216 1.5 pooka #endif
217 1.5 pooka { NULL, NULL }
218 1.5 pooka };
219 1.5 pooka const struct vnodeopv_desc puffs_specop_opv_desc =
220 1.5 pooka { &puffs_specop_p, puffs_specop_entries };
221 1.5 pooka
222 1.6 pooka int (**puffs_fifoop_p)(void *);
223 1.6 pooka const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
224 1.6 pooka { &vop_default_desc, vn_default_error },
225 1.6 pooka { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
226 1.6 pooka { &vop_create_desc, fifo_create }, /* genfs_badop */
227 1.6 pooka { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
228 1.6 pooka { &vop_open_desc, fifo_open }, /* open */
229 1.6 pooka { &vop_close_desc, puffsfifo_close }, /* close */
230 1.6 pooka { &vop_access_desc, puffs_access }, /* access */
231 1.6 pooka { &vop_getattr_desc, puffs_getattr }, /* getattr */
232 1.6 pooka { &vop_setattr_desc, puffs_setattr }, /* setattr */
233 1.6 pooka { &vop_read_desc, puffsfifo_read }, /* read */
234 1.6 pooka { &vop_write_desc, puffsfifo_write }, /* write */
235 1.6 pooka { &vop_lease_desc, fifo_lease_check }, /* genfs_nullop */
236 1.6 pooka { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
237 1.6 pooka { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
238 1.6 pooka { &vop_poll_desc, fifo_poll }, /* poll */
239 1.6 pooka { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
240 1.6 pooka { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
241 1.6 pooka { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
242 1.6 pooka { &vop_fsync_desc, puffs_fsync }, /* fsync */
243 1.6 pooka { &vop_seek_desc, fifo_seek }, /* genfs_badop */
244 1.6 pooka { &vop_remove_desc, fifo_remove }, /* genfs_badop */
245 1.6 pooka { &vop_link_desc, fifo_link }, /* genfs_badop */
246 1.6 pooka { &vop_rename_desc, fifo_rename }, /* genfs_badop */
247 1.6 pooka { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
248 1.6 pooka { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
249 1.6 pooka { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
250 1.6 pooka { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
251 1.6 pooka { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
252 1.6 pooka { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
253 1.6 pooka { &vop_inactive_desc, puffs_inactive }, /* inactive */
254 1.6 pooka { &vop_reclaim_desc, puffs_reclaim }, /* reclaim */
255 1.6 pooka { &vop_lock_desc, puffs_lock }, /* lock */
256 1.6 pooka { &vop_unlock_desc, puffs_unlock }, /* unlock */
257 1.6 pooka { &vop_bmap_desc, fifo_bmap }, /* dummy */
258 1.6 pooka { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
259 1.6 pooka { &vop_print_desc, puffs_print }, /* print */
260 1.6 pooka { &vop_islocked_desc, puffs_islocked }, /* islocked */
261 1.6 pooka { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
262 1.6 pooka { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
263 1.6 pooka { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
264 1.6 pooka { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
265 1.6 pooka #if 0
266 1.6 pooka { &vop_openextattr_desc, _openextattr }, /* openextattr */
267 1.6 pooka { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
268 1.6 pooka { &vop_getextattr_desc, _getextattr }, /* getextattr */
269 1.6 pooka { &vop_setextattr_desc, _setextattr }, /* setextattr */
270 1.6 pooka { &vop_listextattr_desc, _listextattr }, /* listextattr */
271 1.6 pooka { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
272 1.6 pooka #endif
273 1.6 pooka { NULL, NULL }
274 1.6 pooka };
275 1.6 pooka const struct vnodeopv_desc puffs_fifoop_opv_desc =
276 1.6 pooka { &puffs_fifoop_p, puffs_fifoop_entries };
277 1.6 pooka
278 1.6 pooka
279 1.5 pooka
280 1.1 pooka #define LOCKEDVP(a) (VOP_ISLOCKED(a) ? (a) : NULL)
281 1.1 pooka
282 1.1 pooka
283 1.1 pooka int
284 1.1 pooka puffs_lookup(void *v)
285 1.1 pooka {
286 1.1 pooka struct vop_lookup_args /* {
287 1.1 pooka struct vnode * a_dvp;
288 1.1 pooka struct vnode ** a_vpp;
289 1.1 pooka struct componentname * a_cnp;
290 1.1 pooka } */ *ap = v;
291 1.1 pooka struct puffs_mount *pmp;
292 1.1 pooka struct componentname *cnp;
293 1.1 pooka struct vnode *vp, *dvp;
294 1.1 pooka int wantpunlock, isdot;
295 1.1 pooka int error;
296 1.1 pooka
297 1.1 pooka PUFFS_VNREQ(lookup);
298 1.1 pooka
299 1.1 pooka pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
300 1.1 pooka cnp = ap->a_cnp;
301 1.1 pooka dvp = ap->a_dvp;
302 1.1 pooka *ap->a_vpp = NULL;
303 1.1 pooka
304 1.1 pooka /* first things first: check access */
305 1.1 pooka error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, cnp->cn_lwp);
306 1.1 pooka if (error)
307 1.1 pooka return error;
308 1.1 pooka
309 1.1 pooka wantpunlock = ~cnp->cn_flags & (LOCKPARENT | ISLASTCN);
310 1.1 pooka isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
311 1.1 pooka
312 1.1 pooka DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %lx\n",
313 1.1 pooka cnp->cn_nameptr, dvp, cnp->cn_nameiop));
314 1.1 pooka
315 1.1 pooka /*
316 1.1 pooka * Do sanity checks we can do without consulting userland.
317 1.1 pooka */
318 1.1 pooka
319 1.1 pooka /*
320 1.1 pooka * last component check & ro fs
321 1.1 pooka *
322 1.1 pooka * hmmm... why doesn't this check for create?
323 1.1 pooka */
324 1.1 pooka if ((cnp->cn_flags & ISLASTCN)
325 1.1 pooka && (ap->a_dvp->v_mount->mnt_flag & MNT_RDONLY)
326 1.1 pooka && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
327 1.1 pooka DPRINTF(("puffs_lookup: write lookup for read-only fs!\n"));
328 1.1 pooka return EROFS;
329 1.1 pooka }
330 1.1 pooka
331 1.1 pooka /*
332 1.1 pooka * Check if someone fed it into the cache
333 1.1 pooka */
334 1.1 pooka error = cache_lookup(dvp, ap->a_vpp, cnp);
335 1.1 pooka if (error >= 0)
336 1.1 pooka return error;
337 1.1 pooka
338 1.1 pooka if (isdot) {
339 1.1 pooka vp = ap->a_dvp;
340 1.1 pooka vref(vp);
341 1.1 pooka *ap->a_vpp = vp;
342 1.1 pooka return 0;
343 1.1 pooka }
344 1.1 pooka
345 1.1 pooka puffs_makecn(&lookup_arg.pvnr_cn, cnp);
346 1.1 pooka
347 1.1 pooka if (cnp->cn_flags & ISDOTDOT)
348 1.1 pooka VOP_UNLOCK(dvp, 0);
349 1.1 pooka
350 1.1 pooka error = puffs_vntouser(pmp, PUFFS_VN_LOOKUP,
351 1.1 pooka &lookup_arg, sizeof(lookup_arg), VPTOPNC(dvp), LOCKEDVP(dvp), NULL);
352 1.1 pooka DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
353 1.1 pooka
354 1.1 pooka /*
355 1.1 pooka * In case of error, leave parent locked. There is no new
356 1.1 pooka * vnode to play with, so be happy with the NULL value given
357 1.1 pooka * to vpp in the beginning.
358 1.1 pooka */
359 1.1 pooka if (error) {
360 1.1 pooka if (error == -1) {
361 1.1 pooka if ((cnp->cn_flags & ISLASTCN)
362 1.1 pooka && (cnp->cn_nameiop == CREATE
363 1.1 pooka || cnp->cn_nameiop == RENAME)) {
364 1.1 pooka cnp->cn_flags |= SAVENAME;
365 1.1 pooka error = EJUSTRETURN;
366 1.1 pooka } else
367 1.1 pooka /* userspace is on crack */
368 1.1 pooka error = ENOENT;
369 1.1 pooka }
370 1.1 pooka *ap->a_vpp = NULL;
371 1.1 pooka if (cnp->cn_flags & ISDOTDOT)
372 1.1 pooka if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0)
373 1.1 pooka cnp->cn_flags |= PDIRUNLOCK;
374 1.1 pooka return error;
375 1.1 pooka }
376 1.1 pooka
377 1.1 pooka vp = puffs_pnode2vnode(pmp, lookup_arg.pvnr_newnode);
378 1.1 pooka if (!vp) {
379 1.1 pooka error = puffs_getvnode(dvp->v_mount,
380 1.5 pooka lookup_arg.pvnr_newnode, lookup_arg.pvnr_vtype,
381 1.5 pooka lookup_arg.pvnr_rdev, &vp);
382 1.1 pooka if (error) {
383 1.1 pooka if (cnp->cn_flags & ISDOTDOT)
384 1.1 pooka if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0)
385 1.1 pooka cnp->cn_flags |= PDIRUNLOCK;
386 1.1 pooka return error;
387 1.1 pooka }
388 1.1 pooka vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
389 1.1 pooka }
390 1.1 pooka
391 1.1 pooka if (cnp->cn_flags & ISDOTDOT) {
392 1.1 pooka if (cnp->cn_flags & LOCKPARENT &&
393 1.1 pooka cnp->cn_flags & ISLASTCN) {
394 1.1 pooka if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0) {
395 1.1 pooka cnp->cn_flags |= PDIRUNLOCK;
396 1.1 pooka }
397 1.1 pooka }
398 1.1 pooka } else {
399 1.1 pooka if (wantpunlock) {
400 1.1 pooka VOP_UNLOCK(dvp, 0);
401 1.1 pooka cnp->cn_flags |= PDIRUNLOCK;
402 1.1 pooka }
403 1.1 pooka }
404 1.1 pooka
405 1.1 pooka if (cnp->cn_flags & MAKEENTRY)
406 1.1 pooka cache_enter(dvp, vp, cnp);
407 1.1 pooka *ap->a_vpp = vp;
408 1.1 pooka
409 1.1 pooka return 0;
410 1.1 pooka }
411 1.1 pooka
412 1.1 pooka int
413 1.1 pooka puffs_create(void *v)
414 1.1 pooka {
415 1.1 pooka struct vop_create_args /* {
416 1.1 pooka const struct vnodeop_desc *a_desc;
417 1.1 pooka struct vnode *a_dvp;
418 1.1 pooka struct vnode **a_vpp;
419 1.1 pooka struct componentname *a_cnp;
420 1.1 pooka struct vattr *a_vap;
421 1.1 pooka } */ *ap = v;
422 1.1 pooka int error;
423 1.1 pooka
424 1.1 pooka PUFFS_VNREQ(create);
425 1.1 pooka
426 1.1 pooka puffs_makecn(&create_arg.pvnr_cn, ap->a_cnp);
427 1.1 pooka create_arg.pvnr_va = *ap->a_vap;
428 1.1 pooka
429 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount), PUFFS_VN_CREATE,
430 1.1 pooka &create_arg, sizeof(create_arg), VPTOPNC(ap->a_dvp),
431 1.1 pooka ap->a_dvp, NULL);
432 1.1 pooka if (error)
433 1.4 pooka goto out;
434 1.1 pooka
435 1.4 pooka error = puffs_newnode(ap->a_dvp->v_mount, ap->a_dvp, ap->a_vpp,
436 1.5 pooka create_arg.pvnr_newnode, ap->a_cnp, ap->a_vap->va_type, 0);
437 1.4 pooka
438 1.4 pooka out:
439 1.4 pooka if (error || (ap->a_cnp->cn_flags & SAVESTART) == 0)
440 1.4 pooka PNBUF_PUT(ap->a_cnp->cn_pnbuf);
441 1.4 pooka vput(ap->a_dvp);
442 1.4 pooka return error;
443 1.1 pooka }
444 1.1 pooka
445 1.1 pooka int
446 1.1 pooka puffs_mknod(void *v)
447 1.1 pooka {
448 1.1 pooka struct vop_mknod_args /* {
449 1.1 pooka const struct vnodeop_desc *a_desc;
450 1.1 pooka struct vnode *a_dvp;
451 1.1 pooka struct vnode **a_vpp;
452 1.1 pooka struct componentname *a_cnp;
453 1.1 pooka struct vattr *a_vap;
454 1.1 pooka } */ *ap = v;
455 1.1 pooka int error;
456 1.1 pooka
457 1.1 pooka PUFFS_VNREQ(mknod);
458 1.1 pooka
459 1.1 pooka puffs_makecn(&mknod_arg.pvnr_cn, ap->a_cnp);
460 1.1 pooka mknod_arg.pvnr_va = *ap->a_vap;
461 1.1 pooka
462 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount), PUFFS_VN_MKNOD,
463 1.1 pooka &mknod_arg, sizeof(mknod_arg), VPTOPNC(ap->a_dvp), ap->a_dvp, NULL);
464 1.1 pooka if (error)
465 1.4 pooka goto out;
466 1.1 pooka
467 1.4 pooka error = puffs_newnode(ap->a_dvp->v_mount, ap->a_dvp, ap->a_vpp,
468 1.5 pooka mknod_arg.pvnr_newnode, ap->a_cnp, ap->a_vap->va_type,
469 1.5 pooka ap->a_vap->va_rdev);
470 1.4 pooka
471 1.4 pooka out:
472 1.4 pooka if (error || (ap->a_cnp->cn_flags & SAVESTART) == 0)
473 1.4 pooka PNBUF_PUT(ap->a_cnp->cn_pnbuf);
474 1.4 pooka vput(ap->a_dvp);
475 1.4 pooka return error;
476 1.1 pooka }
477 1.1 pooka
478 1.1 pooka int
479 1.1 pooka puffs_open(void *v)
480 1.1 pooka {
481 1.1 pooka struct vop_open_args /* {
482 1.1 pooka const struct vnodeop_desc *a_desc;
483 1.1 pooka struct vnode *a_vp;
484 1.1 pooka int a_mode;
485 1.1 pooka kauth_cred_t a_cred;
486 1.1 pooka struct lwp *a_l;
487 1.1 pooka } */ *ap = v;
488 1.1 pooka
489 1.1 pooka PUFFS_VNREQ(open);
490 1.1 pooka
491 1.1 pooka open_arg.pvnr_mode = ap->a_mode;
492 1.1 pooka puffs_credcvt(&open_arg.pvnr_cred, ap->a_cred);
493 1.1 pooka open_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
494 1.1 pooka
495 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_OPEN,
496 1.1 pooka &open_arg, sizeof(open_arg), VPTOPNC(ap->a_vp), ap->a_vp, NULL);
497 1.1 pooka }
498 1.1 pooka
499 1.1 pooka int
500 1.1 pooka puffs_close(void *v)
501 1.1 pooka {
502 1.1 pooka struct vop_close_args /* {
503 1.1 pooka const struct vnodeop_desc *a_desc;
504 1.1 pooka struct vnode *a_vp;
505 1.1 pooka int a_fflag;
506 1.1 pooka kauth_cred_t a_cred;
507 1.1 pooka struct lwp *a_l;
508 1.1 pooka } */ *ap = v;
509 1.1 pooka
510 1.1 pooka PUFFS_VNREQ(close);
511 1.1 pooka
512 1.1 pooka close_arg.pvnr_fflag = ap->a_fflag;
513 1.1 pooka puffs_credcvt(&close_arg.pvnr_cred, ap->a_cred);
514 1.1 pooka close_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
515 1.1 pooka
516 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_CLOSE,
517 1.1 pooka &close_arg, sizeof(close_arg), VPTOPNC(ap->a_vp), ap->a_vp, NULL);
518 1.1 pooka }
519 1.1 pooka
520 1.1 pooka int
521 1.1 pooka puffs_access(void *v)
522 1.1 pooka {
523 1.1 pooka struct vop_access_args /* {
524 1.1 pooka const struct vnodeop_desc *a_desc;
525 1.1 pooka struct vnode *a_vp;
526 1.1 pooka int a_mode;
527 1.1 pooka kauth_cred_t a_cred;
528 1.1 pooka struct lwp *a_l;
529 1.1 pooka } */ *ap = v;
530 1.1 pooka int error;
531 1.1 pooka
532 1.1 pooka PUFFS_VNREQ(access);
533 1.1 pooka
534 1.1 pooka access_arg.pvnr_mode = ap->a_mode;
535 1.1 pooka access_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
536 1.1 pooka puffs_credcvt(&access_arg.pvnr_cred, ap->a_cred);
537 1.1 pooka
538 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_ACCESS,
539 1.1 pooka &access_arg, sizeof(access_arg), VPTOPNC(ap->a_vp), ap->a_vp, NULL);
540 1.1 pooka if (error)
541 1.1 pooka return error;
542 1.1 pooka
543 1.1 pooka /*
544 1.1 pooka * XXXtothepeople: no execute permissions yet. Otherwise
545 1.1 pooka * all hell will break loose if we try to execute a file
546 1.1 pooka * without VOP_GETPAGES support. It is forthcoming, just
547 1.1 pooka * not there yet ...
548 1.1 pooka */
549 1.1 pooka if (ap->a_mode == VEXEC && ap->a_vp->v_type != VDIR)
550 1.1 pooka return EACCES;
551 1.1 pooka
552 1.1 pooka return 0;
553 1.1 pooka }
554 1.1 pooka
555 1.1 pooka int
556 1.1 pooka puffs_getattr(void *v)
557 1.1 pooka {
558 1.1 pooka struct vop_getattr_args /* {
559 1.1 pooka const struct vnodeop_desc *a_desc;
560 1.1 pooka struct vnode *a_vp;
561 1.1 pooka struct vattr *a_vap;
562 1.1 pooka kauth_cred_t a_cred;
563 1.1 pooka struct lwp *a_l;
564 1.1 pooka } */ *ap = v;
565 1.1 pooka int error;
566 1.1 pooka
567 1.1 pooka PUFFS_VNREQ(getattr);
568 1.1 pooka
569 1.1 pooka vattr_null(&getattr_arg.pvnr_va);
570 1.1 pooka puffs_credcvt(&getattr_arg.pvnr_cred, ap->a_cred);
571 1.1 pooka getattr_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
572 1.1 pooka
573 1.1 pooka /*
574 1.1 pooka * XXX + XX (dos equis): this can't go through the unlock/lock
575 1.1 pooka * cycle, since it can be called from uvn_attach(), which fiddles
576 1.1 pooka * around with VXLOCK and therefore breaks vn_lock(). Proper
577 1.1 pooka * fix pending.
578 1.1 pooka */
579 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_GETATTR,
580 1.1 pooka &getattr_arg, sizeof(getattr_arg), VPTOPNC(ap->a_vp),
581 1.1 pooka NULL /* XXXseeabove: should be LOCKEDVP(ap->a_vp) */, NULL);
582 1.1 pooka if (error)
583 1.1 pooka return error;
584 1.1 pooka
585 1.1 pooka (void)memcpy(ap->a_vap, &getattr_arg.pvnr_va, sizeof(struct vattr));
586 1.1 pooka
587 1.1 pooka /*
588 1.1 pooka * XXXtothepeople: adjust the return value so that we don't
589 1.1 pooka * advertise execute bits. Otherwise all hell will break
590 1.1 pooka * loose if we try to execute a file without VOP_GETPAGES
591 1.1 pooka * support. It is forthcoming, just not there yet ...
592 1.1 pooka */
593 1.1 pooka if (ap->a_vp->v_type != VDIR)
594 1.1 pooka ap->a_vap->va_mode &= ~0111;
595 1.1 pooka
596 1.1 pooka return 0;
597 1.1 pooka }
598 1.1 pooka
599 1.1 pooka int
600 1.1 pooka puffs_setattr(void *v)
601 1.1 pooka {
602 1.1 pooka struct vop_getattr_args /* {
603 1.1 pooka const struct vnodeop_desc *a_desc;
604 1.1 pooka struct vnode *a_vp;
605 1.1 pooka struct vattr *a_vap;
606 1.1 pooka kauth_cred_t a_cred;
607 1.1 pooka struct lwp *a_l;
608 1.1 pooka } */ *ap = v;
609 1.1 pooka
610 1.1 pooka PUFFS_VNREQ(setattr);
611 1.1 pooka
612 1.1 pooka (void)memcpy(&setattr_arg.pvnr_va, ap->a_vap, sizeof(struct vattr));
613 1.1 pooka puffs_credcvt(&setattr_arg.pvnr_cred, ap->a_cred);
614 1.1 pooka setattr_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
615 1.1 pooka
616 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_SETATTR,
617 1.1 pooka &setattr_arg, sizeof(setattr_arg), VPTOPNC(ap->a_vp),
618 1.1 pooka ap->a_vp, NULL);
619 1.1 pooka }
620 1.1 pooka
621 1.1 pooka int
622 1.1 pooka puffs_revoke(void *v)
623 1.1 pooka {
624 1.1 pooka struct vop_revoke_args /* {
625 1.1 pooka const struct vnodeop_desc *a_desc;
626 1.1 pooka struct vnode *a_vp;
627 1.1 pooka int a_flags;
628 1.1 pooka } */ *ap = v;
629 1.1 pooka PUFFS_VNREQ(revoke);
630 1.1 pooka
631 1.1 pooka revoke_arg.pvnr_flags = ap->a_flags;
632 1.1 pooka
633 1.1 pooka /* don't really care if userspace doesn't want to play along */
634 1.1 pooka puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_REVOKE,
635 1.1 pooka &revoke_arg, sizeof(revoke_arg), VPTOPNC(ap->a_vp), NULL, NULL);
636 1.1 pooka
637 1.1 pooka return genfs_revoke(v);
638 1.1 pooka }
639 1.1 pooka
640 1.1 pooka int
641 1.3 pooka puffs_inactive(void *v)
642 1.3 pooka {
643 1.3 pooka struct vop_inactive_args /* {
644 1.3 pooka const struct vnodeop_desc *a_desc;
645 1.3 pooka struct vnode *a_vp;
646 1.3 pooka struct lwp *a_l;
647 1.3 pooka } */ *ap = v;
648 1.3 pooka struct puffs_node *pnode;
649 1.3 pooka int rv, vnrefs;
650 1.3 pooka
651 1.3 pooka PUFFS_VNREQ(inactive);
652 1.3 pooka
653 1.3 pooka /*
654 1.3 pooka * XXX: think about this after we really start unlocking
655 1.3 pooka * when going to userspace
656 1.3 pooka */
657 1.3 pooka pnode = ap->a_vp->v_data;
658 1.3 pooka pnode->pn_stat |= PNODE_INACTIVE;
659 1.3 pooka
660 1.3 pooka inactive_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
661 1.3 pooka
662 1.3 pooka rv = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_INACTIVE,
663 1.3 pooka &inactive_arg, sizeof(inactive_arg), VPTOPNC(ap->a_vp),
664 1.3 pooka ap->a_vp, NULL);
665 1.3 pooka
666 1.3 pooka /* can't trust userspace return value? simulate safe answer */
667 1.3 pooka if (rv)
668 1.3 pooka vnrefs = 1;
669 1.3 pooka else
670 1.3 pooka vnrefs = inactive_arg.pvnr_backendrefs;
671 1.3 pooka
672 1.3 pooka VOP_UNLOCK(ap->a_vp, 0);
673 1.3 pooka
674 1.3 pooka /*
675 1.3 pooka * user server thinks it's gone? then don't be afraid care,
676 1.3 pooka * node's life was already all it would ever be
677 1.3 pooka */
678 1.3 pooka if (vnrefs == 0)
679 1.3 pooka vrecycle(ap->a_vp, NULL, ap->a_l);
680 1.3 pooka
681 1.3 pooka return 0;
682 1.3 pooka }
683 1.3 pooka
684 1.3 pooka int
685 1.1 pooka puffs_reclaim(void *v)
686 1.1 pooka {
687 1.1 pooka struct vop_reclaim_args /* {
688 1.1 pooka const struct vnodeop_desc *a_desc;
689 1.1 pooka struct vnode *a_vp;
690 1.1 pooka struct lwp *a_l;
691 1.1 pooka } */ *ap = v;
692 1.1 pooka struct puffs_mount *pmp;
693 1.1 pooka int error;
694 1.1 pooka
695 1.1 pooka PUFFS_VNREQ(reclaim);
696 1.1 pooka
697 1.1 pooka /*
698 1.1 pooka * first things first: check if someone is trying to reclaim the
699 1.1 pooka * root vnode. do not allow that to travel to userspace.
700 1.1 pooka * Note that we don't need to take the lock similarly to
701 1.1 pooka * puffs_root(), since there is only one of us.
702 1.1 pooka */
703 1.1 pooka if (ap->a_vp->v_flag & VROOT) {
704 1.1 pooka pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
705 1.1 pooka #ifdef DIAGNOSTIC
706 1.1 pooka simple_lock(&pmp->pmp_lock);
707 1.1 pooka if (pmp->pmp_root == NULL)
708 1.1 pooka panic("puffs_reclaim: releasing root vnode (%p) twice",
709 1.1 pooka ap->a_vp);
710 1.1 pooka simple_unlock(&pmp->pmp_lock);
711 1.1 pooka #endif
712 1.1 pooka pmp->pmp_root = NULL;
713 1.1 pooka puffs_putvnode(ap->a_vp);
714 1.1 pooka return 0;
715 1.1 pooka }
716 1.1 pooka
717 1.1 pooka reclaim_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
718 1.1 pooka
719 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_RECLAIM,
720 1.1 pooka &reclaim_arg, sizeof(reclaim_arg), VPTOPNC(ap->a_vp), NULL, NULL);
721 1.1 pooka #if 0
722 1.1 pooka /*
723 1.1 pooka * XXX: if reclaim fails for any other reason than the userspace
724 1.1 pooka * being dead, we should consider unmounting the filesystem, since
725 1.1 pooka * we can't trust it to be in a consistent state anymore. But for
726 1.1 pooka * now, just ignore all errors.
727 1.1 pooka */
728 1.1 pooka if (error)
729 1.1 pooka return error;
730 1.1 pooka #endif
731 1.1 pooka
732 1.1 pooka puffs_putvnode(ap->a_vp);
733 1.1 pooka
734 1.1 pooka return 0;
735 1.1 pooka }
736 1.1 pooka
737 1.1 pooka int
738 1.1 pooka puffs_readdir(void *v)
739 1.1 pooka {
740 1.1 pooka struct vop_readdir_args /* {
741 1.1 pooka const struct vnodeop_desc *a_desc;
742 1.1 pooka struct vnode *a_vp;
743 1.1 pooka struct uio *a_uio;
744 1.1 pooka kauth_cred_t a_cred;
745 1.1 pooka int *a_eofflag;
746 1.1 pooka off_t **a_cookies;
747 1.1 pooka int *a_ncookies;
748 1.1 pooka } */ *ap = v;
749 1.1 pooka struct puffs_vnreq_readdir *readdir_argp;
750 1.1 pooka size_t argsize;
751 1.1 pooka struct uio *uio = ap->a_uio;
752 1.1 pooka size_t howmuch;
753 1.1 pooka int error;
754 1.1 pooka
755 1.1 pooka /* worry about these later */
756 1.1 pooka if (!(ap->a_cookies == NULL && ap->a_ncookies == NULL))
757 1.1 pooka return EOPNOTSUPP;
758 1.1 pooka
759 1.1 pooka argsize = sizeof(struct puffs_vnreq_readdir);
760 1.1 pooka readdir_argp = malloc(argsize, M_PUFFS, M_ZERO | M_WAITOK);
761 1.1 pooka
762 1.1 pooka puffs_credcvt(&readdir_argp->pvnr_cred, ap->a_cred);
763 1.1 pooka readdir_argp->pvnr_offset = uio->uio_offset;
764 1.1 pooka readdir_argp->pvnr_resid = uio->uio_resid;
765 1.1 pooka
766 1.1 pooka error = puffs_vntouser_adjbuf(MPTOPUFFSMP(ap->a_vp->v_mount),
767 1.1 pooka PUFFS_VN_READDIR, (void **)&readdir_argp, &argsize,
768 1.1 pooka sizeof(struct puffs_vnreq_readdir),
769 1.1 pooka VPTOPNC(ap->a_vp), ap->a_vp, NULL);
770 1.1 pooka if (error)
771 1.1 pooka goto out;
772 1.1 pooka
773 1.1 pooka /* userspace is cheating? */
774 1.1 pooka if (readdir_argp->pvnr_resid > uio->uio_resid) {
775 1.1 pooka error = EINVAL;
776 1.1 pooka goto out;
777 1.1 pooka }
778 1.1 pooka
779 1.1 pooka /* bouncy-wouncy with the directory data */
780 1.1 pooka howmuch = uio->uio_resid - readdir_argp->pvnr_resid;
781 1.1 pooka error = uiomove(readdir_argp->pvnr_dent, howmuch, uio);
782 1.1 pooka if (error)
783 1.1 pooka goto out;
784 1.1 pooka uio->uio_offset = readdir_argp->pvnr_offset;
785 1.1 pooka
786 1.1 pooka out:
787 1.1 pooka free(readdir_argp, M_PUFFS);
788 1.1 pooka return error;
789 1.1 pooka }
790 1.1 pooka
791 1.1 pooka int
792 1.1 pooka puffs_poll(void *v)
793 1.1 pooka {
794 1.1 pooka struct vop_poll_args /* {
795 1.1 pooka const struct vnodeop_desc *a_desc;
796 1.1 pooka struct vnode *a_vp;
797 1.1 pooka int a_events;
798 1.1 pooka struct lwp *a_l;
799 1.1 pooka }*/ *ap = v;
800 1.1 pooka
801 1.1 pooka PUFFS_VNREQ(poll);
802 1.1 pooka
803 1.1 pooka poll_arg.pvnr_events = ap->a_events;
804 1.1 pooka poll_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
805 1.1 pooka
806 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_POLL,
807 1.1 pooka &poll_arg, sizeof(poll_arg), VPTOPNC(ap->a_vp), NULL, NULL);
808 1.1 pooka }
809 1.1 pooka
810 1.1 pooka int
811 1.1 pooka puffs_fsync(void *v)
812 1.1 pooka {
813 1.1 pooka struct vop_fsync_args /* {
814 1.1 pooka const struct vnodeop_desc *a_desc;
815 1.1 pooka struct vnode *a_vp;
816 1.1 pooka kauth_cred_t a_cred;
817 1.1 pooka int a_flags;
818 1.1 pooka off_t a_offlo;
819 1.1 pooka off_t a_offhi;
820 1.1 pooka struct lwp *a_l;
821 1.1 pooka } */ *ap = v;
822 1.1 pooka
823 1.1 pooka PUFFS_VNREQ(fsync);
824 1.1 pooka
825 1.1 pooka puffs_credcvt(&fsync_arg.pvnr_cred, ap->a_cred);
826 1.1 pooka fsync_arg.pvnr_flags = ap->a_flags;
827 1.1 pooka fsync_arg.pvnr_offlo = ap->a_offlo;
828 1.1 pooka fsync_arg.pvnr_offhi = ap->a_offhi;
829 1.1 pooka fsync_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
830 1.1 pooka
831 1.1 pooka /*
832 1.1 pooka * XXX: see comment at puffs_getattr about locking
833 1.1 pooka */
834 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_FSYNC,
835 1.1 pooka &fsync_arg, sizeof(fsync_arg), VPTOPNC(ap->a_vp),
836 1.1 pooka NULL /* XXXshouldbe: ap->a_vp */, NULL);
837 1.1 pooka }
838 1.1 pooka
839 1.1 pooka int
840 1.1 pooka puffs_seek(void *v)
841 1.1 pooka {
842 1.1 pooka struct vop_seek_args /* {
843 1.1 pooka const struct vnodeop_desc *a_desc;
844 1.1 pooka struct vnode *a_vp;
845 1.1 pooka off_t a_oldoff;
846 1.1 pooka off_t a_newoff;
847 1.1 pooka kauth_cred_t a_cred;
848 1.1 pooka } */ *ap = v;
849 1.1 pooka
850 1.1 pooka PUFFS_VNREQ(seek);
851 1.1 pooka
852 1.1 pooka seek_arg.pvnr_oldoff = ap->a_oldoff;
853 1.1 pooka seek_arg.pvnr_newoff = ap->a_newoff;
854 1.1 pooka puffs_credcvt(&seek_arg.pvnr_cred, ap->a_cred);
855 1.1 pooka
856 1.1 pooka /*
857 1.1 pooka * XXX: seems like seek is called with an unlocked vp, but
858 1.1 pooka * it can't hurt to play safe
859 1.1 pooka */
860 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_SEEK,
861 1.1 pooka &seek_arg, sizeof(seek_arg), VPTOPNC(ap->a_vp),
862 1.1 pooka LOCKEDVP(ap->a_vp), NULL);
863 1.1 pooka }
864 1.1 pooka
865 1.1 pooka int
866 1.1 pooka puffs_remove(void *v)
867 1.1 pooka {
868 1.1 pooka struct vop_remove_args /* {
869 1.1 pooka const struct vnodeop_desc *a_desc;
870 1.1 pooka struct vnode *a_dvp;
871 1.1 pooka struct vnode *a_vp;
872 1.1 pooka struct componentname *a_cnp;
873 1.1 pooka } */ *ap = v;
874 1.1 pooka int error;
875 1.1 pooka
876 1.1 pooka PUFFS_VNREQ(remove);
877 1.1 pooka
878 1.1 pooka remove_arg.pvnr_cookie_targ = VPTOPNC(ap->a_vp);
879 1.1 pooka puffs_makecn(&remove_arg.pvnr_cn, ap->a_cnp);
880 1.1 pooka
881 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_REMOVE,
882 1.1 pooka &remove_arg, sizeof(remove_arg), VPTOPNC(ap->a_dvp),
883 1.1 pooka ap->a_dvp, ap->a_vp);
884 1.1 pooka
885 1.1 pooka vput(ap->a_vp);
886 1.1 pooka vput(ap->a_dvp);
887 1.1 pooka
888 1.1 pooka return error;
889 1.1 pooka }
890 1.1 pooka
891 1.1 pooka int
892 1.1 pooka puffs_mkdir(void *v)
893 1.1 pooka {
894 1.1 pooka struct vop_mkdir_args /* {
895 1.1 pooka const struct vnodeop_desc *a_desc;
896 1.1 pooka struct vnode *a_dvp;
897 1.1 pooka struct vnode **a_vpp;
898 1.1 pooka struct componentname *a_cnp;
899 1.1 pooka struct vattr *a_vap;
900 1.1 pooka } */ *ap = v;
901 1.1 pooka int error;
902 1.1 pooka
903 1.1 pooka PUFFS_VNREQ(mkdir);
904 1.1 pooka
905 1.1 pooka puffs_makecn(&mkdir_arg.pvnr_cn, ap->a_cnp);
906 1.1 pooka mkdir_arg.pvnr_va = *ap->a_vap;
907 1.1 pooka
908 1.1 pooka /* XXX: wouldn't need to relock dvp, but that's life */
909 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount), PUFFS_VN_MKDIR,
910 1.1 pooka &mkdir_arg, sizeof(mkdir_arg), VPTOPNC(ap->a_dvp), ap->a_dvp, NULL);
911 1.1 pooka if (error)
912 1.4 pooka goto out;
913 1.1 pooka
914 1.4 pooka error = puffs_newnode(ap->a_dvp->v_mount, ap->a_dvp, ap->a_vpp,
915 1.5 pooka mkdir_arg.pvnr_newnode, ap->a_cnp, VDIR, 0);
916 1.4 pooka
917 1.4 pooka out:
918 1.4 pooka if (error || (ap->a_cnp->cn_flags & SAVESTART) == 0)
919 1.4 pooka PNBUF_PUT(ap->a_cnp->cn_pnbuf);
920 1.4 pooka vput(ap->a_dvp);
921 1.4 pooka return error;
922 1.1 pooka }
923 1.1 pooka
924 1.1 pooka int
925 1.1 pooka puffs_rmdir(void *v)
926 1.1 pooka {
927 1.1 pooka struct vop_rmdir_args /* {
928 1.1 pooka const struct vnodeop_desc *a_desc;
929 1.1 pooka struct vnode *a_dvp;
930 1.1 pooka struct vnode *a_vp;
931 1.1 pooka struct componentname *a_cnp;
932 1.1 pooka } */ *ap = v;
933 1.1 pooka int error;
934 1.1 pooka
935 1.1 pooka PUFFS_VNREQ(rmdir);
936 1.1 pooka
937 1.1 pooka rmdir_arg.pvnr_cookie_targ = VPTOPNC(ap->a_vp);
938 1.1 pooka puffs_makecn(&rmdir_arg.pvnr_cn, ap->a_cnp);
939 1.1 pooka
940 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount), PUFFS_VN_RMDIR,
941 1.1 pooka &rmdir_arg, sizeof(rmdir_arg), VPTOPNC(ap->a_dvp),
942 1.1 pooka ap->a_dvp, ap->a_vp);
943 1.1 pooka
944 1.1 pooka vput(ap->a_dvp);
945 1.1 pooka vput(ap->a_vp);
946 1.1 pooka
947 1.1 pooka return error;
948 1.1 pooka }
949 1.1 pooka
950 1.1 pooka int
951 1.1 pooka puffs_link(void *v)
952 1.1 pooka {
953 1.1 pooka struct vop_link_args /* {
954 1.1 pooka const struct vnodeop_desc *a_desc;
955 1.1 pooka struct vnode *a_dvp;
956 1.1 pooka struct vnode *a_vp;
957 1.1 pooka struct componentname *a_cnp;
958 1.1 pooka }*/ *ap = v;
959 1.1 pooka int error;
960 1.1 pooka
961 1.1 pooka PUFFS_VNREQ(link);
962 1.1 pooka
963 1.1 pooka link_arg.pvnr_cookie_targ = VPTOPNC(ap->a_vp);
964 1.1 pooka puffs_makecn(&link_arg.pvnr_cn, ap->a_cnp);
965 1.1 pooka
966 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount), PUFFS_VN_LINK,
967 1.1 pooka &link_arg, sizeof(link_arg), VPTOPNC(ap->a_dvp), ap->a_dvp, NULL);
968 1.1 pooka
969 1.1 pooka vput(ap->a_dvp);
970 1.1 pooka
971 1.1 pooka return error;
972 1.1 pooka }
973 1.1 pooka
974 1.1 pooka int
975 1.1 pooka puffs_symlink(void *v)
976 1.1 pooka {
977 1.1 pooka struct vop_symlink_args /* {
978 1.1 pooka const struct vnodeop_desc *a_desc;
979 1.1 pooka struct vnode *a_dvp;
980 1.1 pooka struct vnode **a_vpp;
981 1.1 pooka struct componentname *a_cnp;
982 1.1 pooka struct vattr *a_vap;
983 1.1 pooka char *a_target;
984 1.1 pooka }*/ *ap = v;
985 1.1 pooka int error;
986 1.1 pooka
987 1.1 pooka PUFFS_VNREQ(symlink); /* XXX: large structure */
988 1.1 pooka
989 1.1 pooka *ap->a_vpp = NULL;
990 1.1 pooka
991 1.1 pooka puffs_makecn(&symlink_arg.pvnr_cn, ap->a_cnp);
992 1.1 pooka symlink_arg.pvnr_va = *ap->a_vap;
993 1.1 pooka (void)strlcpy(symlink_arg.pvnr_link, ap->a_target,
994 1.1 pooka sizeof(symlink_arg.pvnr_link));
995 1.1 pooka
996 1.1 pooka /* XXX: don't need to relock parent */
997 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_dvp->v_mount),
998 1.1 pooka PUFFS_VN_SYMLINK, &symlink_arg, sizeof(symlink_arg),
999 1.1 pooka VPTOPNC(ap->a_dvp), ap->a_dvp, NULL);
1000 1.1 pooka if (error)
1001 1.4 pooka goto out;
1002 1.1 pooka
1003 1.4 pooka error = puffs_newnode(ap->a_dvp->v_mount, ap->a_dvp, ap->a_vpp,
1004 1.5 pooka symlink_arg.pvnr_newnode, ap->a_cnp, VLNK, 0);
1005 1.4 pooka
1006 1.4 pooka out:
1007 1.4 pooka if (error || (ap->a_cnp->cn_flags & SAVESTART) == 0)
1008 1.4 pooka PNBUF_PUT(ap->a_cnp->cn_pnbuf);
1009 1.4 pooka vput(ap->a_dvp);
1010 1.4 pooka return error;
1011 1.1 pooka }
1012 1.1 pooka
1013 1.1 pooka int
1014 1.1 pooka puffs_readlink(void *v)
1015 1.1 pooka {
1016 1.1 pooka struct vop_readlink_args /* {
1017 1.1 pooka const struct vnodeop_desc *a_desc;
1018 1.1 pooka struct vnode *a_vp;
1019 1.1 pooka struct uio *a_uio;
1020 1.1 pooka kauth_cred_t a_cred;
1021 1.1 pooka } */ *ap = v;
1022 1.1 pooka int error;
1023 1.1 pooka
1024 1.1 pooka PUFFS_VNREQ(readlink);
1025 1.1 pooka
1026 1.1 pooka puffs_credcvt(&readlink_arg.pvnr_cred, ap->a_cred);
1027 1.1 pooka readlink_arg.pvnr_linklen = sizeof(readlink_arg.pvnr_link);
1028 1.1 pooka
1029 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount),
1030 1.1 pooka PUFFS_VN_READLINK, &readlink_arg, sizeof(readlink_arg),
1031 1.1 pooka VPTOPNC(ap->a_vp), ap->a_vp, NULL);
1032 1.1 pooka if (error)
1033 1.1 pooka return error;
1034 1.1 pooka
1035 1.1 pooka readlink_arg.pvnr_link[readlink_arg.pvnr_linklen] = '\0';
1036 1.1 pooka return uiomove(&readlink_arg.pvnr_link, readlink_arg.pvnr_linklen,
1037 1.1 pooka ap->a_uio);
1038 1.1 pooka }
1039 1.1 pooka
1040 1.1 pooka /* XXXXXXX: think about locking & userspace op delocking... */
1041 1.1 pooka int
1042 1.1 pooka puffs_rename(void *v)
1043 1.1 pooka {
1044 1.1 pooka struct vop_rename_args /* {
1045 1.1 pooka const struct vnodeop_desc *a_desc;
1046 1.1 pooka struct vnode *a_fdvp;
1047 1.1 pooka struct vnode *a_fvp;
1048 1.1 pooka struct componentname *a_fcnp;
1049 1.1 pooka struct vnode *a_tdvp;
1050 1.1 pooka struct vnode *a_tvp;
1051 1.1 pooka struct componentname *a_tcnp;
1052 1.1 pooka }*/ *ap = v;
1053 1.1 pooka int error;
1054 1.1 pooka
1055 1.1 pooka PUFFS_VNREQ(rename);
1056 1.1 pooka
1057 1.1 pooka /*
1058 1.1 pooka * participate in the duck hunt
1059 1.1 pooka * (I could do with some canard a la presse, so hopefully
1060 1.1 pooka * this is succesful)
1061 1.1 pooka */
1062 1.1 pooka KASSERT(ap->a_tdvp != ap->a_tvp);
1063 1.1 pooka
1064 1.1 pooka if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount) {
1065 1.1 pooka error = EXDEV;
1066 1.1 pooka goto out;
1067 1.1 pooka }
1068 1.1 pooka
1069 1.1 pooka rename_arg.pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1070 1.1 pooka rename_arg.pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1071 1.1 pooka if (ap->a_tvp)
1072 1.1 pooka rename_arg.pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1073 1.1 pooka else
1074 1.1 pooka rename_arg.pvnr_cookie_targ = NULL;
1075 1.1 pooka puffs_makecn(&rename_arg.pvnr_cn_src, ap->a_fcnp);
1076 1.1 pooka puffs_makecn(&rename_arg.pvnr_cn_targ, ap->a_tcnp);
1077 1.1 pooka
1078 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_fdvp->v_mount),
1079 1.1 pooka PUFFS_VN_RENAME, &rename_arg, sizeof(rename_arg),
1080 1.1 pooka VPTOPNC(ap->a_fdvp), NULL, NULL);
1081 1.1 pooka
1082 1.1 pooka out:
1083 1.1 pooka vput(ap->a_tdvp);
1084 1.1 pooka if (ap->a_tvp != NULL)
1085 1.1 pooka vput(ap->a_tvp);
1086 1.1 pooka
1087 1.1 pooka vrele(ap->a_fdvp);
1088 1.1 pooka vrele(ap->a_fvp);
1089 1.1 pooka
1090 1.1 pooka return error;
1091 1.1 pooka }
1092 1.1 pooka
1093 1.1 pooka int
1094 1.1 pooka puffs_read(void *v)
1095 1.1 pooka {
1096 1.1 pooka struct vop_read_args /* {
1097 1.1 pooka const struct vnodeop_desc *a_desc;
1098 1.1 pooka struct vnode *a_vp;
1099 1.1 pooka struct uio *a_uio;
1100 1.1 pooka int a_ioflag;
1101 1.1 pooka kauth_cred_t a_cred;
1102 1.1 pooka } */ *ap = v;
1103 1.1 pooka struct puffs_vnreq_read *read_argp;
1104 1.1 pooka struct puffs_mount *pmp;
1105 1.1 pooka struct uio *uio;
1106 1.1 pooka size_t tomove, argsize;
1107 1.1 pooka int error;
1108 1.1 pooka
1109 1.1 pooka uio = ap->a_uio;
1110 1.1 pooka
1111 1.1 pooka pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1112 1.1 pooka tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1113 1.1 pooka argsize = sizeof(struct puffs_vnreq_read);
1114 1.1 pooka read_argp = malloc(argsize, M_PUFFS, M_WAITOK | M_ZERO);
1115 1.1 pooka
1116 1.1 pooka error = 0;
1117 1.1 pooka while (uio->uio_resid > 0) {
1118 1.1 pooka read_argp->pvnr_ioflag = ap->a_ioflag;
1119 1.1 pooka read_argp->pvnr_resid = tomove;
1120 1.1 pooka read_argp->pvnr_offset = uio->uio_offset;
1121 1.1 pooka puffs_credcvt(&read_argp->pvnr_cred, ap->a_cred);
1122 1.1 pooka
1123 1.1 pooka argsize = sizeof(struct puffs_vnreq_read);
1124 1.1 pooka error = puffs_vntouser_adjbuf(pmp, PUFFS_VN_READ,
1125 1.1 pooka (void **)&read_argp, &argsize,
1126 1.1 pooka sizeof(struct puffs_vnreq_read), VPTOPNC(ap->a_vp),
1127 1.1 pooka ap->a_vp, NULL);
1128 1.1 pooka if (error)
1129 1.1 pooka goto out;
1130 1.1 pooka
1131 1.1 pooka if (read_argp->pvnr_resid > tomove) {
1132 1.1 pooka error = EINVAL;
1133 1.1 pooka goto out;
1134 1.1 pooka }
1135 1.1 pooka
1136 1.1 pooka error = uiomove(read_argp->pvnr_data,
1137 1.1 pooka tomove - read_argp->pvnr_resid, uio);
1138 1.1 pooka
1139 1.1 pooka /*
1140 1.1 pooka * in case the file is out of juice, resid from userspace
1141 1.1 pooka * is != 0. and the error-case is quite obvious
1142 1.1 pooka */
1143 1.1 pooka if (error || read_argp->pvnr_resid)
1144 1.1 pooka goto out;
1145 1.1 pooka
1146 1.1 pooka tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1147 1.1 pooka }
1148 1.1 pooka
1149 1.1 pooka out:
1150 1.1 pooka free(read_argp, M_PUFFS);
1151 1.1 pooka return error;
1152 1.1 pooka }
1153 1.1 pooka
1154 1.1 pooka int
1155 1.1 pooka puffs_write(void *v)
1156 1.1 pooka {
1157 1.1 pooka struct vop_write_args /* {
1158 1.1 pooka const struct vnodeop_desc *a_desc;
1159 1.1 pooka struct vnode *a_vp;
1160 1.1 pooka struct uio *a_uio;
1161 1.1 pooka int a_ioflag;
1162 1.1 pooka kauth_cred_t a_cred;
1163 1.1 pooka }*/ *ap = v;
1164 1.1 pooka struct puffs_vnreq_write *write_argp;
1165 1.1 pooka struct puffs_mount *pmp;
1166 1.1 pooka struct uio *uio;
1167 1.1 pooka size_t tomove, argsize;
1168 1.1 pooka int error;
1169 1.1 pooka
1170 1.1 pooka uio = ap->a_uio;
1171 1.1 pooka
1172 1.1 pooka pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1173 1.1 pooka tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1174 1.1 pooka argsize = sizeof(struct puffs_vnreq_write) + tomove;
1175 1.1 pooka write_argp = malloc(argsize, M_PUFFS, M_WAITOK | M_ZERO);
1176 1.1 pooka
1177 1.1 pooka error = 0;
1178 1.1 pooka while (uio->uio_resid > 0) {
1179 1.1 pooka write_argp->pvnr_ioflag = ap->a_ioflag;
1180 1.1 pooka write_argp->pvnr_resid = tomove;
1181 1.1 pooka write_argp->pvnr_offset = uio->uio_offset;
1182 1.1 pooka puffs_credcvt(&write_argp->pvnr_cred, ap->a_cred);
1183 1.1 pooka error = uiomove(write_argp->pvnr_data, tomove, ap->a_uio);
1184 1.1 pooka if (error)
1185 1.1 pooka goto out;
1186 1.1 pooka
1187 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount),
1188 1.1 pooka PUFFS_VN_WRITE, write_argp, argsize, VPTOPNC(ap->a_vp),
1189 1.1 pooka ap->a_vp, NULL);
1190 1.1 pooka if (error) {
1191 1.1 pooka /* restore uiomove */
1192 1.1 pooka uio->uio_resid += tomove;
1193 1.1 pooka uio->uio_offset -= tomove;
1194 1.1 pooka goto out;
1195 1.1 pooka }
1196 1.1 pooka if (write_argp->pvnr_resid > tomove) {
1197 1.1 pooka error = EINVAL;
1198 1.1 pooka goto out;
1199 1.1 pooka }
1200 1.1 pooka
1201 1.1 pooka /* didn't move everything? bad userspace. bail */
1202 1.1 pooka if (write_argp->pvnr_resid != 0) {
1203 1.1 pooka uio->uio_resid += write_argp->pvnr_resid;
1204 1.1 pooka uio->uio_offset -= write_argp->pvnr_resid;
1205 1.1 pooka error = EIO;
1206 1.1 pooka break;
1207 1.1 pooka }
1208 1.1 pooka
1209 1.1 pooka tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1210 1.1 pooka }
1211 1.1 pooka
1212 1.1 pooka out:
1213 1.1 pooka free(write_argp, M_PUFFS);
1214 1.1 pooka return error;
1215 1.1 pooka }
1216 1.1 pooka
1217 1.1 pooka static int puffs_fcnioctl(struct vop_ioctl_args * /*XXX*/, int);
1218 1.1 pooka
1219 1.1 pooka #define FCNIOCTL_ARG_MAX 1<<16
1220 1.1 pooka int
1221 1.1 pooka puffs_fcnioctl(struct vop_ioctl_args *ap, int puffsop)
1222 1.1 pooka {
1223 1.1 pooka /* struct vop_ioctl_args {
1224 1.1 pooka const struct vnodeop_desc *a_desc;
1225 1.1 pooka struct vnode *a_vp;
1226 1.1 pooka u_long a_command;
1227 1.1 pooka void *a_data;
1228 1.1 pooka int a_fflag;
1229 1.1 pooka kauth_cred_t a_cred;
1230 1.1 pooka struct lwp *a_l;
1231 1.1 pooka }*ap = v; */
1232 1.1 pooka struct puffs_mount *pmp;
1233 1.1 pooka struct puffs_sizepark pspark;
1234 1.1 pooka void *kernbuf;
1235 1.1 pooka size_t copylen;
1236 1.1 pooka int error;
1237 1.1 pooka
1238 1.1 pooka PUFFS_VNREQ(fcnioctl);
1239 1.1 pooka
1240 1.1 pooka /*
1241 1.1 pooka * Since this op gives the filesystem (almost) complete control on
1242 1.1 pooka * how much it is allowed to copy from the calling process
1243 1.1 pooka * address space, do not enable it by default, since it would
1244 1.1 pooka * be a whopping security hole.
1245 1.1 pooka */
1246 1.1 pooka pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1247 1.1 pooka if ((pmp->pmp_args.pa_flags & PUFFS_FLAG_ALLOWCTL) == 0)
1248 1.1 pooka return EINVAL; /* only shoe that fits */
1249 1.1 pooka
1250 1.1 pooka /* fill in sizereq and store it */
1251 1.1 pooka pspark.pkso_reqid = puffs_getreqid(pmp);
1252 1.1 pooka pspark.pkso_reqtype = PUFFS_SIZEOPREQ_BUF_IN;
1253 1.1 pooka pspark.pkso_copybuf = ap->a_data;
1254 1.1 pooka pspark.pkso_bufsize = FCNIOCTL_ARG_MAX;
1255 1.1 pooka TAILQ_INSERT_TAIL(&pmp->pmp_req_sizepark, &pspark, pkso_entries);
1256 1.1 pooka
1257 1.1 pooka /* then fill in actual request and shoot it off */
1258 1.1 pooka fcnioctl_arg.pvnr_command = ap->a_command;
1259 1.1 pooka fcnioctl_arg.pvnr_fflag = ap->a_fflag;
1260 1.1 pooka puffs_credcvt(&fcnioctl_arg.pvnr_cred, ap->a_cred);
1261 1.1 pooka fcnioctl_arg.pvnr_pid = puffs_lwp2pid(ap->a_l);
1262 1.1 pooka
1263 1.1 pooka error = puffs_vntouser_req(MPTOPUFFSMP(ap->a_vp->v_mount), puffsop,
1264 1.1 pooka &fcnioctl_arg, sizeof(fcnioctl_arg), VPTOPNC(ap->a_vp),
1265 1.1 pooka pspark.pkso_reqid, NULL, NULL);
1266 1.1 pooka
1267 1.1 pooka /* if we don't need to copy data, we're done */
1268 1.1 pooka if (error || !fcnioctl_arg.pvnr_copyback)
1269 1.1 pooka return error;
1270 1.1 pooka
1271 1.1 pooka copylen = MIN(FCNIOCTL_ARG_MAX, fcnioctl_arg.pvnr_datalen);
1272 1.1 pooka kernbuf = malloc(copylen, M_PUFFS, M_WAITOK);
1273 1.1 pooka error = copyin(fcnioctl_arg.pvnr_data, kernbuf, copylen);
1274 1.1 pooka if (error)
1275 1.1 pooka goto out;
1276 1.1 pooka error = copyout(kernbuf, ap->a_data, copylen);
1277 1.1 pooka
1278 1.1 pooka out:
1279 1.1 pooka free(kernbuf, M_PUFFS);
1280 1.1 pooka return error;
1281 1.1 pooka }
1282 1.1 pooka
1283 1.1 pooka int
1284 1.1 pooka puffs_ioctl(void *v)
1285 1.1 pooka {
1286 1.1 pooka
1287 1.1 pooka return puffs_fcnioctl(v, PUFFS_VN_IOCTL);
1288 1.1 pooka }
1289 1.1 pooka
1290 1.1 pooka int
1291 1.1 pooka puffs_fcntl(void *v)
1292 1.1 pooka {
1293 1.1 pooka
1294 1.1 pooka return puffs_fcnioctl(v, PUFFS_VN_FCNTL);
1295 1.1 pooka }
1296 1.1 pooka
1297 1.1 pooka int
1298 1.1 pooka puffs_print(void *v)
1299 1.1 pooka {
1300 1.1 pooka struct vop_print_args /* {
1301 1.1 pooka struct vnode *a_vp;
1302 1.1 pooka } */ *ap = v;
1303 1.1 pooka struct vnode *vp = ap->a_vp;
1304 1.2 pooka struct puffs_node *pn = vp->v_data;
1305 1.1 pooka
1306 1.1 pooka PUFFS_VNREQ(print);
1307 1.1 pooka
1308 1.1 pooka /* kernel portion */
1309 1.2 pooka printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
1310 1.2 pooka " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
1311 1.6 pooka if (vp->v_type == VFIFO)
1312 1.6 pooka fifo_printinfo(vp);
1313 1.1 pooka lockmgr_printinfo(&vp->v_lock);
1314 1.1 pooka
1315 1.1 pooka /* userspace portion */
1316 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_PRINT,
1317 1.1 pooka &print_arg, sizeof(print_arg), VPTOPNC(ap->a_vp),
1318 1.1 pooka LOCKEDVP(ap->a_vp), NULL);
1319 1.1 pooka }
1320 1.1 pooka
1321 1.1 pooka int
1322 1.1 pooka puffs_pathconf(void *v)
1323 1.1 pooka {
1324 1.1 pooka struct vop_pathconf_args /* {
1325 1.1 pooka const struct vnodeop_desc *a_desc;
1326 1.1 pooka struct vnode *a_vp;
1327 1.1 pooka int a_name;
1328 1.1 pooka register_t *a_retval;
1329 1.1 pooka } */ *ap = v;
1330 1.1 pooka int error;
1331 1.1 pooka
1332 1.1 pooka PUFFS_VNREQ(pathconf);
1333 1.1 pooka
1334 1.1 pooka pathconf_arg.pvnr_name = ap->a_name;
1335 1.1 pooka
1336 1.1 pooka error = puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount),
1337 1.1 pooka PUFFS_VN_PATHCONF, &pathconf_arg, sizeof(pathconf_arg),
1338 1.1 pooka VPTOPNC(ap->a_vp), ap->a_vp, NULL);
1339 1.1 pooka if (error)
1340 1.1 pooka return error;
1341 1.1 pooka
1342 1.1 pooka *ap->a_retval = pathconf_arg.pvnr_retval;
1343 1.1 pooka
1344 1.1 pooka return 0;
1345 1.1 pooka }
1346 1.1 pooka
1347 1.1 pooka int
1348 1.1 pooka puffs_advlock(void *v)
1349 1.1 pooka {
1350 1.1 pooka struct vop_advlock_args /* {
1351 1.1 pooka const struct vnodeop_desc *a_desc;
1352 1.1 pooka struct vnode *a_vp;
1353 1.1 pooka void *a_id;
1354 1.1 pooka int a_op;
1355 1.1 pooka struct flock *a_fl;
1356 1.1 pooka int a_flags;
1357 1.1 pooka } */ *ap = v;
1358 1.1 pooka int error;
1359 1.1 pooka
1360 1.1 pooka PUFFS_VNREQ(advlock);
1361 1.1 pooka
1362 1.1 pooka error = copyin(ap->a_fl, &advlock_arg.pvnr_fl, sizeof(struct flock));
1363 1.1 pooka if (error)
1364 1.1 pooka return error;
1365 1.1 pooka advlock_arg.pvnr_id = ap->a_id;
1366 1.1 pooka advlock_arg.pvnr_op = ap->a_op;
1367 1.1 pooka advlock_arg.pvnr_flags = ap->a_flags;
1368 1.1 pooka
1369 1.1 pooka return puffs_vntouser(MPTOPUFFSMP(ap->a_vp->v_mount), PUFFS_VN_ADVLOCK,
1370 1.1 pooka &advlock_arg, sizeof(advlock_arg), VPTOPNC(ap->a_vp), NULL, NULL);
1371 1.1 pooka }
1372 1.1 pooka
1373 1.1 pooka /*
1374 1.1 pooka * The rest don't get a free trip to userspace and back, they
1375 1.1 pooka * have to stay within the kernel.
1376 1.1 pooka */
1377 1.1 pooka
1378 1.1 pooka /*
1379 1.1 pooka * moreXXX: yes, todo
1380 1.1 pooka */
1381 1.1 pooka int
1382 1.1 pooka puffs_lock(void *v)
1383 1.1 pooka {
1384 1.1 pooka struct vop_lock_args /* {
1385 1.1 pooka struct vnode *a_vp;
1386 1.1 pooka int a_flags;
1387 1.1 pooka }*/ *ap = v;
1388 1.1 pooka struct vnode *vp = ap->a_vp;
1389 1.1 pooka
1390 1.1 pooka #if 0
1391 1.1 pooka DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
1392 1.1 pooka #endif
1393 1.1 pooka
1394 1.1 pooka return lockmgr(&vp->v_lock, ap->a_flags, &vp->v_interlock);
1395 1.1 pooka }
1396 1.1 pooka
1397 1.1 pooka int
1398 1.1 pooka puffs_unlock(void *v)
1399 1.1 pooka {
1400 1.1 pooka struct vop_unlock_args /* {
1401 1.1 pooka struct vnode *a_vp;
1402 1.1 pooka int a_flags;
1403 1.1 pooka } */ *ap = v;
1404 1.1 pooka struct vnode *vp = ap->a_vp;
1405 1.1 pooka
1406 1.1 pooka #if 0
1407 1.1 pooka DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
1408 1.1 pooka #endif
1409 1.1 pooka
1410 1.1 pooka return lockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE, &vp->v_interlock);
1411 1.1 pooka }
1412 1.1 pooka
1413 1.1 pooka int
1414 1.1 pooka puffs_islocked(void *v)
1415 1.1 pooka {
1416 1.1 pooka struct vop_islocked_args *ap = v;
1417 1.1 pooka int rv;
1418 1.1 pooka
1419 1.1 pooka rv = lockstatus(&ap->a_vp->v_lock);
1420 1.1 pooka return rv;
1421 1.1 pooka }
1422 1.1 pooka
1423 1.1 pooka #if 0
1424 1.1 pooka int
1425 1.1 pooka puffs_getpages(void *v)
1426 1.1 pooka {
1427 1.1 pooka struct vop_getpages_args /* {
1428 1.1 pooka const struct vnodeop_desc *a_desc;
1429 1.1 pooka struct vnode *a_vp;
1430 1.1 pooka voff_t a_offset;
1431 1.1 pooka struct vm_page **a_m;
1432 1.1 pooka int *a_count;
1433 1.1 pooka int a_centeridx;
1434 1.1 pooka vm_prot_t a_access_type;
1435 1.1 pooka int a_advice;
1436 1.1 pooka int a_flags;
1437 1.1 pooka } */ *ap = v;
1438 1.1 pooka
1439 1.1 pooka
1440 1.1 pooka }
1441 1.1 pooka #endif
1442 1.1 pooka
1443 1.1 pooka int
1444 1.1 pooka puffs_generic(void *v)
1445 1.1 pooka {
1446 1.1 pooka struct vop_generic_args *ap = v;
1447 1.1 pooka
1448 1.1 pooka (void)ap;
1449 1.1 pooka DPRINTF(("puffs_generic: ap->a_desc = %s\n", ap->a_desc->vdesc_name));
1450 1.1 pooka
1451 1.1 pooka return EOPNOTSUPP;
1452 1.1 pooka }
1453