puffs_vnops.c revision 1.120 1 /* $NetBSD: puffs_vnops.c,v 1.120 2007/11/26 19:01:50 pooka Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.120 2007/11/26 19:01:50 pooka Exp $");
34
35 #include <sys/param.h>
36 #include <sys/fstrans.h>
37 #include <sys/malloc.h>
38 #include <sys/mount.h>
39 #include <sys/namei.h>
40 #include <sys/vnode.h>
41 #include <sys/proc.h>
42
43 #include <uvm/uvm.h>
44
45 #include <fs/puffs/puffs_msgif.h>
46 #include <fs/puffs/puffs_sys.h>
47
48 #include <miscfs/fifofs/fifo.h>
49 #include <miscfs/genfs/genfs.h>
50 #include <miscfs/specfs/specdev.h>
51
52 int puffs_lookup(void *);
53 int puffs_create(void *);
54 int puffs_access(void *);
55 int puffs_mknod(void *);
56 int puffs_open(void *);
57 int puffs_close(void *);
58 int puffs_getattr(void *);
59 int puffs_setattr(void *);
60 int puffs_reclaim(void *);
61 int puffs_readdir(void *);
62 int puffs_poll(void *);
63 int puffs_fsync(void *);
64 int puffs_seek(void *);
65 int puffs_remove(void *);
66 int puffs_mkdir(void *);
67 int puffs_rmdir(void *);
68 int puffs_link(void *);
69 int puffs_readlink(void *);
70 int puffs_symlink(void *);
71 int puffs_rename(void *);
72 int puffs_read(void *);
73 int puffs_write(void *);
74 int puffs_fcntl(void *);
75 int puffs_ioctl(void *);
76 int puffs_inactive(void *);
77 int puffs_print(void *);
78 int puffs_pathconf(void *);
79 int puffs_advlock(void *);
80 int puffs_strategy(void *);
81 int puffs_bmap(void *);
82 int puffs_mmap(void *);
83 int puffs_getpages(void *);
84
85 int puffs_spec_read(void *);
86 int puffs_spec_write(void *);
87 int puffs_fifo_read(void *);
88 int puffs_fifo_write(void *);
89
90 int puffs_checkop(void *);
91
92
93 /* VOP_LEASE() not included */
94
95 int puffs_generic(void *);
96
97 #if 0
98 #define puffs_lock genfs_lock
99 #define puffs_unlock genfs_unlock
100 #define puffs_islocked genfs_islocked
101 #else
102 int puffs_lock(void *);
103 int puffs_unlock(void *);
104 int puffs_islocked(void *);
105 #endif
106
107 int (**puffs_vnodeop_p)(void *);
108 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
109 { &vop_default_desc, vn_default_error },
110 { &vop_lookup_desc, puffs_lookup }, /* REAL lookup */
111 { &vop_create_desc, puffs_checkop }, /* create */
112 { &vop_mknod_desc, puffs_checkop }, /* mknod */
113 { &vop_open_desc, puffs_open }, /* REAL open */
114 { &vop_close_desc, puffs_checkop }, /* close */
115 { &vop_access_desc, puffs_access }, /* REAL access */
116 { &vop_getattr_desc, puffs_checkop }, /* getattr */
117 { &vop_setattr_desc, puffs_checkop }, /* setattr */
118 { &vop_read_desc, puffs_checkop }, /* read */
119 { &vop_write_desc, puffs_checkop }, /* write */
120 { &vop_fsync_desc, puffs_fsync }, /* REAL fsync */
121 { &vop_seek_desc, puffs_checkop }, /* seek */
122 { &vop_remove_desc, puffs_checkop }, /* remove */
123 { &vop_link_desc, puffs_checkop }, /* link */
124 { &vop_rename_desc, puffs_checkop }, /* rename */
125 { &vop_mkdir_desc, puffs_checkop }, /* mkdir */
126 { &vop_rmdir_desc, puffs_checkop }, /* rmdir */
127 { &vop_symlink_desc, puffs_checkop }, /* symlink */
128 { &vop_readdir_desc, puffs_checkop }, /* readdir */
129 { &vop_readlink_desc, puffs_checkop }, /* readlink */
130 { &vop_getpages_desc, puffs_checkop }, /* getpages */
131 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
132 { &vop_pathconf_desc, puffs_checkop }, /* pathconf */
133 { &vop_advlock_desc, puffs_checkop }, /* advlock */
134 { &vop_strategy_desc, puffs_strategy }, /* REAL strategy */
135 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
136 { &vop_abortop_desc, genfs_abortop }, /* REAL abortop */
137 { &vop_inactive_desc, puffs_inactive }, /* REAL inactive */
138 { &vop_reclaim_desc, puffs_reclaim }, /* REAL reclaim */
139 { &vop_lock_desc, puffs_lock }, /* REAL lock */
140 { &vop_unlock_desc, puffs_unlock }, /* REAL unlock */
141 { &vop_bmap_desc, puffs_bmap }, /* REAL bmap */
142 { &vop_print_desc, puffs_print }, /* REAL print */
143 { &vop_islocked_desc, puffs_islocked }, /* REAL islocked */
144 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
145 { &vop_mmap_desc, puffs_mmap }, /* REAL mmap */
146 { &vop_poll_desc, puffs_poll }, /* REAL poll */
147
148 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
149 { NULL, NULL }
150 };
151 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
152 { &puffs_vnodeop_p, puffs_vnodeop_entries };
153
154
155 int (**puffs_specop_p)(void *);
156 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
157 { &vop_default_desc, vn_default_error },
158 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
159 { &vop_create_desc, spec_create }, /* genfs_badop */
160 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
161 { &vop_open_desc, spec_open }, /* spec_open */
162 { &vop_close_desc, spec_close }, /* spec_close */
163 { &vop_access_desc, puffs_checkop }, /* access */
164 { &vop_getattr_desc, puffs_checkop }, /* getattr */
165 { &vop_setattr_desc, puffs_checkop }, /* setattr */
166 { &vop_read_desc, puffs_spec_read }, /* update, read */
167 { &vop_write_desc, puffs_spec_write }, /* update, write */
168 { &vop_lease_desc, spec_lease_check }, /* genfs_nullop */
169 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
170 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
171 { &vop_poll_desc, spec_poll }, /* spec_poll */
172 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
173 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
174 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
175 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
176 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
177 { &vop_remove_desc, spec_remove }, /* genfs_badop */
178 { &vop_link_desc, spec_link }, /* genfs_badop */
179 { &vop_rename_desc, spec_rename }, /* genfs_badop */
180 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
181 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
182 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
183 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
184 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
185 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
186 { &vop_inactive_desc, puffs_inactive }, /* REAL inactive */
187 { &vop_reclaim_desc, puffs_reclaim }, /* REAL reclaim */
188 { &vop_lock_desc, puffs_lock }, /* REAL lock */
189 { &vop_unlock_desc, puffs_unlock }, /* REAL unlock */
190 { &vop_bmap_desc, spec_bmap }, /* dummy */
191 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
192 { &vop_print_desc, puffs_print }, /* REAL print */
193 { &vop_islocked_desc, puffs_islocked }, /* REAL islocked */
194 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
195 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
196 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
197 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
198 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
199 #if 0
200 { &vop_openextattr_desc, _openextattr }, /* openextattr */
201 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
202 { &vop_getextattr_desc, _getextattr }, /* getextattr */
203 { &vop_setextattr_desc, _setextattr }, /* setextattr */
204 { &vop_listextattr_desc, _listextattr }, /* listextattr */
205 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
206 #endif
207 { NULL, NULL }
208 };
209 const struct vnodeopv_desc puffs_specop_opv_desc =
210 { &puffs_specop_p, puffs_specop_entries };
211
212
213 int (**puffs_fifoop_p)(void *);
214 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
215 { &vop_default_desc, vn_default_error },
216 { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
217 { &vop_create_desc, fifo_create }, /* genfs_badop */
218 { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
219 { &vop_open_desc, fifo_open }, /* open */
220 { &vop_close_desc, fifo_close }, /* close */
221 { &vop_access_desc, puffs_checkop }, /* access */
222 { &vop_getattr_desc, puffs_checkop }, /* getattr */
223 { &vop_setattr_desc, puffs_checkop }, /* setattr */
224 { &vop_read_desc, puffs_fifo_read }, /* read, update */
225 { &vop_write_desc, puffs_fifo_write }, /* write, update */
226 { &vop_lease_desc, fifo_lease_check }, /* genfs_nullop */
227 { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
228 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
229 { &vop_poll_desc, fifo_poll }, /* poll */
230 { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
231 { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
232 { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
233 { &vop_fsync_desc, fifo_fsync }, /* genfs_nullop*/
234 { &vop_seek_desc, fifo_seek }, /* genfs_badop */
235 { &vop_remove_desc, fifo_remove }, /* genfs_badop */
236 { &vop_link_desc, fifo_link }, /* genfs_badop */
237 { &vop_rename_desc, fifo_rename }, /* genfs_badop */
238 { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
239 { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
240 { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
241 { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
242 { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
243 { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
244 { &vop_inactive_desc, puffs_inactive }, /* REAL inactive */
245 { &vop_reclaim_desc, puffs_reclaim }, /* REAL reclaim */
246 { &vop_lock_desc, puffs_lock }, /* REAL lock */
247 { &vop_unlock_desc, puffs_unlock }, /* REAL unlock */
248 { &vop_bmap_desc, fifo_bmap }, /* dummy */
249 { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
250 { &vop_print_desc, puffs_print }, /* REAL print */
251 { &vop_islocked_desc, puffs_islocked }, /* REAL islocked */
252 { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
253 { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
254 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
255 { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
256 #if 0
257 { &vop_openextattr_desc, _openextattr }, /* openextattr */
258 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
259 { &vop_getextattr_desc, _getextattr }, /* getextattr */
260 { &vop_setextattr_desc, _setextattr }, /* setextattr */
261 { &vop_listextattr_desc, _listextattr }, /* listextattr */
262 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
263 #endif
264 { NULL, NULL }
265 };
266 const struct vnodeopv_desc puffs_fifoop_opv_desc =
267 { &puffs_fifoop_p, puffs_fifoop_entries };
268
269
270 /* "real" vnode operations */
271 int (**puffs_msgop_p)(void *);
272 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
273 { &vop_default_desc, vn_default_error },
274 { &vop_create_desc, puffs_create }, /* create */
275 { &vop_mknod_desc, puffs_mknod }, /* mknod */
276 { &vop_open_desc, puffs_open }, /* open */
277 { &vop_close_desc, puffs_close }, /* close */
278 { &vop_access_desc, puffs_access }, /* access */
279 { &vop_getattr_desc, puffs_getattr }, /* getattr */
280 { &vop_setattr_desc, puffs_setattr }, /* setattr */
281 { &vop_read_desc, puffs_read }, /* read */
282 { &vop_write_desc, puffs_write }, /* write */
283 { &vop_seek_desc, puffs_seek }, /* seek */
284 { &vop_remove_desc, puffs_remove }, /* remove */
285 { &vop_link_desc, puffs_link }, /* link */
286 { &vop_rename_desc, puffs_rename }, /* rename */
287 { &vop_mkdir_desc, puffs_mkdir }, /* mkdir */
288 { &vop_rmdir_desc, puffs_rmdir }, /* rmdir */
289 { &vop_symlink_desc, puffs_symlink }, /* symlink */
290 { &vop_readdir_desc, puffs_readdir }, /* readdir */
291 { &vop_readlink_desc, puffs_readlink }, /* readlink */
292 { &vop_print_desc, puffs_print }, /* print */
293 { &vop_islocked_desc, puffs_islocked }, /* islocked */
294 { &vop_pathconf_desc, puffs_pathconf }, /* pathconf */
295 { &vop_advlock_desc, puffs_advlock }, /* advlock */
296 { &vop_getpages_desc, puffs_getpages }, /* getpages */
297 { NULL, NULL }
298 };
299 const struct vnodeopv_desc puffs_msgop_opv_desc =
300 { &puffs_msgop_p, puffs_msgop_entries };
301
302
303 #define ERROUT(err) \
304 do { \
305 error = err; \
306 goto out; \
307 } while (/*CONSTCOND*/0)
308
309 /*
310 * This is a generic vnode operation handler. It checks if the necessary
311 * operations for the called vnode operation are implemented by userspace
312 * and either returns a dummy return value or proceeds to call the real
313 * vnode operation from puffs_msgop_v.
314 *
315 * XXX: this should described elsewhere and autogenerated, the complexity
316 * of the vnode operations vectors and their interrelationships is also
317 * getting a bit out of hand. Another problem is that we need this same
318 * information in the fs server code, so keeping the two in sync manually
319 * is not a viable (long term) plan.
320 */
321
322 /* not supported, handle locking protocol */
323 #define CHECKOP_NOTSUPP(op) \
324 case VOP_##op##_DESCOFFSET: \
325 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
326 return genfs_eopnotsupp(v); \
327 break
328
329 /* always succeed, no locking */
330 #define CHECKOP_SUCCESS(op) \
331 case VOP_##op##_DESCOFFSET: \
332 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
333 return 0; \
334 break
335
336 int
337 puffs_checkop(void *v)
338 {
339 struct vop_generic_args /* {
340 struct vnodeop_desc *a_desc;
341 spooky mystery contents;
342 } */ *ap = v;
343 struct vnodeop_desc *desc = ap->a_desc;
344 struct puffs_mount *pmp;
345 struct vnode *vp;
346 int offset, rv;
347
348 offset = ap->a_desc->vdesc_vp_offsets[0];
349 #ifdef DIAGNOSTIC
350 if (offset == VDESC_NO_OFFSET)
351 panic("puffs_checkop: no vnode, why did you call me?");
352 #endif
353 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
354 pmp = MPTOPUFFSMP(vp->v_mount);
355
356 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
357 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
358
359 if (!ALLOPS(pmp)) {
360 switch (desc->vdesc_offset) {
361 CHECKOP_NOTSUPP(CREATE);
362 CHECKOP_NOTSUPP(MKNOD);
363 CHECKOP_NOTSUPP(GETATTR);
364 CHECKOP_NOTSUPP(SETATTR);
365 CHECKOP_NOTSUPP(READ);
366 CHECKOP_NOTSUPP(WRITE);
367 CHECKOP_NOTSUPP(FCNTL);
368 CHECKOP_NOTSUPP(IOCTL);
369 CHECKOP_NOTSUPP(REMOVE);
370 CHECKOP_NOTSUPP(LINK);
371 CHECKOP_NOTSUPP(RENAME);
372 CHECKOP_NOTSUPP(MKDIR);
373 CHECKOP_NOTSUPP(RMDIR);
374 CHECKOP_NOTSUPP(SYMLINK);
375 CHECKOP_NOTSUPP(READDIR);
376 CHECKOP_NOTSUPP(READLINK);
377 CHECKOP_NOTSUPP(PRINT);
378 CHECKOP_NOTSUPP(PATHCONF);
379 CHECKOP_NOTSUPP(ADVLOCK);
380
381 CHECKOP_SUCCESS(ACCESS);
382 CHECKOP_SUCCESS(CLOSE);
383 CHECKOP_SUCCESS(SEEK);
384
385 case VOP_GETPAGES_DESCOFFSET:
386 if (!EXISTSOP(pmp, READ))
387 return genfs_eopnotsupp(v);
388 break;
389
390 default:
391 panic("puffs_checkop: unhandled vnop %d",
392 desc->vdesc_offset);
393 }
394 }
395
396 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
397
398 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
399 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
400
401 return rv;
402 }
403
404 static int puffs_callremove(struct puffs_mount *, void *, void *,
405 struct componentname *);
406 static int puffs_callrmdir(struct puffs_mount *, void *, void *,
407 struct componentname *);
408 static void puffs_callinactive(struct puffs_mount *, void *, int);
409 static void puffs_callreclaim(struct puffs_mount *, void *);
410
411 #define PUFFS_ABORT_LOOKUP 1
412 #define PUFFS_ABORT_CREATE 2
413 #define PUFFS_ABORT_MKNOD 3
414 #define PUFFS_ABORT_MKDIR 4
415 #define PUFFS_ABORT_SYMLINK 5
416
417 /*
418 * Press the pani^Wabort button! Kernel resource allocation failed.
419 */
420 static void
421 puffs_abortbutton(struct puffs_mount *pmp, int what,
422 void *dcookie, void *cookie, struct componentname *cnp)
423 {
424
425 switch (what) {
426 case PUFFS_ABORT_CREATE:
427 case PUFFS_ABORT_MKNOD:
428 case PUFFS_ABORT_SYMLINK:
429 puffs_callremove(pmp, dcookie, cookie, cnp);
430 break;
431 case PUFFS_ABORT_MKDIR:
432 puffs_callrmdir(pmp, dcookie, cookie, cnp);
433 break;
434 }
435
436 puffs_callinactive(pmp, cookie, 0);
437 puffs_callreclaim(pmp, cookie);
438 }
439
440 /*
441 * Begin vnode operations.
442 *
443 * A word from the keymaster about locks: generally we don't want
444 * to use the vnode locks at all: it creates an ugly dependency between
445 * the userlandia file server and the kernel. But we'll play along with
446 * the kernel vnode locks for now. However, even currently we attempt
447 * to release locks as early as possible. This is possible for some
448 * operations which a) don't need a locked vnode after the userspace op
449 * and b) return with the vnode unlocked. Theoretically we could
450 * unlock-do op-lock for others and order the graph in userspace, but I
451 * don't want to think of the consequences for the time being.
452 */
453
454 int
455 puffs_lookup(void *v)
456 {
457 struct vop_lookup_args /* {
458 const struct vnodeop_desc *a_desc;
459 struct vnode *a_dvp;
460 struct vnode **a_vpp;
461 struct componentname *a_cnp;
462 } */ *ap = v;
463 PUFFS_MSG_VARS(vn, lookup);
464 struct puffs_mount *pmp;
465 struct componentname *cnp;
466 struct vnode *vp, *dvp;
467 struct puffs_node *dpn;
468 int isdot;
469 int error;
470
471 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
472 cnp = ap->a_cnp;
473 dvp = ap->a_dvp;
474 *ap->a_vpp = NULL;
475
476 /* r/o fs? we check create later to handle EEXIST */
477 if ((cnp->cn_flags & ISLASTCN)
478 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
479 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
480 return EROFS;
481
482 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
483
484 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
485 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
486
487 /*
488 * Check if someone fed it into the cache
489 */
490 if (PUFFS_USE_NAMECACHE(pmp)) {
491 error = cache_lookup(dvp, ap->a_vpp, cnp);
492
493 if (error >= 0)
494 return error;
495 }
496
497 if (isdot) {
498 vp = ap->a_dvp;
499 vref(vp);
500 *ap->a_vpp = vp;
501 return 0;
502 }
503
504 PUFFS_MSG_ALLOC(vn, lookup);
505 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
506 &lookup_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
507
508 if (cnp->cn_flags & ISDOTDOT)
509 VOP_UNLOCK(dvp, 0);
510
511 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
512 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
513 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
514 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
515
516 /*
517 * In case of error, there is no new vnode to play with, so be
518 * happy with the NULL value given to vpp in the beginning.
519 * Also, check if this really was an error or the target was not
520 * present. Either treat it as a non-error for CREATE/RENAME or
521 * enter the component into the negative name cache (if desired).
522 */
523 if (error) {
524 error = checkerr(pmp, error, __func__);
525 if (error == ENOENT) {
526 /* don't allow to create files on r/o fs */
527 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
528 && cnp->cn_nameiop == CREATE) {
529 error = EROFS;
530
531 /* adjust values if we are creating */
532 } else if ((cnp->cn_flags & ISLASTCN)
533 && (cnp->cn_nameiop == CREATE
534 || cnp->cn_nameiop == RENAME)) {
535 cnp->cn_flags |= SAVENAME;
536 error = EJUSTRETURN;
537
538 /* save negative cache entry */
539 } else {
540 if ((cnp->cn_flags & MAKEENTRY)
541 && PUFFS_USE_NAMECACHE(pmp))
542 cache_enter(dvp, NULL, cnp);
543 }
544 }
545 goto out;
546 }
547
548 /*
549 * Check that we don't get our parent node back, that would cause
550 * a pretty obvious deadlock.
551 */
552 dpn = dvp->v_data;
553 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
554 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
555 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
556 error = EPROTO;
557 goto out;
558 }
559
560 error = puffs_cookie2vnode(pmp, lookup_msg->pvnr_newnode, 1, 1, &vp);
561 if (error == PUFFS_NOSUCHCOOKIE) {
562 error = puffs_getvnode(dvp->v_mount,
563 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
564 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
565 if (error) {
566 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
567 lookup_msg->pvnr_newnode, ap->a_cnp);
568 goto out;
569 }
570 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
571 } else if (error) {
572 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
573 lookup_msg->pvnr_newnode, ap->a_cnp);
574 goto out;
575 }
576
577 *ap->a_vpp = vp;
578
579 if ((cnp->cn_flags & MAKEENTRY) != 0 && PUFFS_USE_NAMECACHE(pmp))
580 cache_enter(dvp, vp, cnp);
581
582 /* XXX */
583 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
584 cnp->cn_flags &= ~REQUIREDIR;
585 if (lookup_msg->pvnr_cn.pkcn_consume)
586 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
587 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
588
589 out:
590 if (cnp->cn_flags & ISDOTDOT)
591 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
592
593 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
594 PUFFS_MSG_RELEASE(lookup);
595 return error;
596 }
597
598 #define REFPN_AND_UNLOCKVP(a, b) \
599 do { \
600 mutex_enter(&b->pn_mtx); \
601 puffs_referencenode(b); \
602 mutex_exit(&b->pn_mtx); \
603 VOP_UNLOCK(a, 0); \
604 } while (/*CONSTCOND*/0)
605
606 #define REFPN(b) \
607 do { \
608 mutex_enter(&b->pn_mtx); \
609 puffs_referencenode(b); \
610 mutex_exit(&b->pn_mtx); \
611 } while (/*CONSTCOND*/0)
612
613 #define RELEPN_AND_VP(a, b) \
614 do { \
615 puffs_releasenode(b); \
616 vrele(a); \
617 } while (/*CONSTCOND*/0)
618
619 int
620 puffs_create(void *v)
621 {
622 struct vop_create_args /* {
623 const struct vnodeop_desc *a_desc;
624 struct vnode *a_dvp;
625 struct vnode **a_vpp;
626 struct componentname *a_cnp;
627 struct vattr *a_vap;
628 } */ *ap = v;
629 PUFFS_MSG_VARS(vn, create);
630 struct vnode *dvp = ap->a_dvp;
631 struct puffs_node *dpn = VPTOPP(dvp);
632 struct componentname *cnp = ap->a_cnp;
633 struct mount *mp = dvp->v_mount;
634 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
635 int error;
636
637 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
638 dvp, ap->a_cnp->cn_nameptr));
639
640 PUFFS_MSG_ALLOC(vn, create);
641 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
642 &create_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
643 create_msg->pvnr_va = *ap->a_vap;
644 puffs_msg_setinfo(park_create, PUFFSOP_VN,
645 PUFFS_VN_CREATE, VPTOPNC(dvp));
646
647 /*
648 * Do the dance:
649 * + insert into queue ("interlock")
650 * + unlock vnode
651 * + wait for response
652 */
653 puffs_msg_enqueue(pmp, park_create);
654 REFPN_AND_UNLOCKVP(dvp, dpn);
655 error = puffs_msg_wait2(pmp, park_create, dpn, NULL);
656
657 error = checkerr(pmp, error, __func__);
658 if (error)
659 goto out;
660
661 error = puffs_newnode(mp, dvp, ap->a_vpp,
662 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
663 if (error)
664 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
665 create_msg->pvnr_newnode, cnp);
666
667 out:
668 if (error || (cnp->cn_flags & SAVESTART) == 0)
669 PNBUF_PUT(cnp->cn_pnbuf);
670
671 RELEPN_AND_VP(dvp, dpn);
672 DPRINTF(("puffs_create: return %d\n", error));
673 PUFFS_MSG_RELEASE(create);
674 return error;
675 }
676
677 int
678 puffs_mknod(void *v)
679 {
680 struct vop_mknod_args /* {
681 const struct vnodeop_desc *a_desc;
682 struct vnode *a_dvp;
683 struct vnode **a_vpp;
684 struct componentname *a_cnp;
685 struct vattr *a_vap;
686 } */ *ap = v;
687 PUFFS_MSG_VARS(vn, mknod);
688 struct vnode *dvp = ap->a_dvp;
689 struct puffs_node *dpn = VPTOPP(dvp);
690 struct componentname *cnp = ap->a_cnp;
691 struct mount *mp = dvp->v_mount;
692 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
693 int error;
694
695 PUFFS_MSG_ALLOC(vn, mknod);
696 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
697 &mknod_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
698 mknod_msg->pvnr_va = *ap->a_vap;
699 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
700 PUFFS_VN_MKNOD, VPTOPNC(dvp));
701
702 puffs_msg_enqueue(pmp, park_mknod);
703 REFPN_AND_UNLOCKVP(dvp, dpn);
704 error = puffs_msg_wait2(pmp, park_mknod, dpn, NULL);
705
706 error = checkerr(pmp, error, __func__);
707 if (error)
708 goto out;
709
710 error = puffs_newnode(mp, dvp, ap->a_vpp,
711 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
712 ap->a_vap->va_rdev);
713 if (error)
714 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
715 mknod_msg->pvnr_newnode, cnp);
716
717 out:
718 PUFFS_MSG_RELEASE(mknod);
719 if (error || (cnp->cn_flags & SAVESTART) == 0)
720 PNBUF_PUT(cnp->cn_pnbuf);
721 RELEPN_AND_VP(dvp, dpn);
722 return error;
723 }
724
725 int
726 puffs_open(void *v)
727 {
728 struct vop_open_args /* {
729 const struct vnodeop_desc *a_desc;
730 struct vnode *a_vp;
731 int a_mode;
732 kauth_cred_t a_cred;
733 } */ *ap = v;
734 PUFFS_MSG_VARS(vn, open);
735 struct vnode *vp = ap->a_vp;
736 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
737 int mode = ap->a_mode;
738 int error;
739
740 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
741
742 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
743 ERROUT(EROFS);
744
745 if (!EXISTSOP(pmp, OPEN))
746 ERROUT(0);
747
748 PUFFS_MSG_ALLOC(vn, open);
749 open_msg->pvnr_mode = mode;
750 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
751 puffs_cidcvt(&open_msg->pvnr_cid, curlwp);
752 puffs_msg_setinfo(park_open, PUFFSOP_VN,
753 PUFFS_VN_OPEN, VPTOPNC(vp));
754
755 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
756 error = checkerr(pmp, error, __func__);
757
758 out:
759 DPRINTF(("puffs_open: returning %d\n", error));
760 PUFFS_MSG_RELEASE(open);
761 return error;
762 }
763
764 int
765 puffs_close(void *v)
766 {
767 struct vop_close_args /* {
768 const struct vnodeop_desc *a_desc;
769 struct vnode *a_vp;
770 int a_fflag;
771 kauth_cred_t a_cred;
772 } */ *ap = v;
773 PUFFS_MSG_VARS(vn, close);
774 struct vnode *vp = ap->a_vp;
775 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
776
777 PUFFS_MSG_ALLOC(vn, close);
778 puffs_msg_setfaf(park_close);
779 close_msg->pvnr_fflag = ap->a_fflag;
780 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
781 puffs_cidcvt(&close_msg->pvnr_cid, curlwp);
782 puffs_msg_setinfo(park_close, PUFFSOP_VN,
783 PUFFS_VN_CLOSE, VPTOPNC(vp));
784
785 puffs_msg_enqueue(pmp, park_close);
786 PUFFS_MSG_RELEASE(close);
787 return 0;
788 }
789
790 int
791 puffs_access(void *v)
792 {
793 struct vop_access_args /* {
794 const struct vnodeop_desc *a_desc;
795 struct vnode *a_vp;
796 int a_mode;
797 kauth_cred_t a_cred;
798 } */ *ap = v;
799 PUFFS_MSG_VARS(vn, access);
800 struct vnode *vp = ap->a_vp;
801 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
802 int mode = ap->a_mode;
803 int error;
804
805 if (mode & VWRITE) {
806 switch (vp->v_type) {
807 case VDIR:
808 case VLNK:
809 case VREG:
810 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
811 || !EXISTSOP(pmp, WRITE))
812 return EROFS;
813 break;
814 default:
815 break;
816 }
817 }
818
819 if (!EXISTSOP(pmp, ACCESS))
820 return 0;
821
822 PUFFS_MSG_ALLOC(vn, access);
823 access_msg->pvnr_mode = ap->a_mode;
824 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
825 puffs_cidcvt(&access_msg->pvnr_cid, curlwp);
826 puffs_msg_setinfo(park_access, PUFFSOP_VN,
827 PUFFS_VN_ACCESS, VPTOPNC(vp));
828
829 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
830 error = checkerr(pmp, error, __func__);
831 PUFFS_MSG_RELEASE(access);
832
833 return error;
834 }
835
836 int
837 puffs_getattr(void *v)
838 {
839 struct vop_getattr_args /* {
840 const struct vnodeop_desc *a_desc;
841 struct vnode *a_vp;
842 struct vattr *a_vap;
843 kauth_cred_t a_cred;
844 } */ *ap = v;
845 PUFFS_MSG_VARS(vn, getattr);
846 struct vnode *vp = ap->a_vp;
847 struct mount *mp = vp->v_mount;
848 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
849 struct vattr *vap, *rvap;
850 struct puffs_node *pn;
851 int error = 0;
852
853 vap = ap->a_vap;
854
855 PUFFS_MSG_ALLOC(vn, getattr);
856 vattr_null(&getattr_msg->pvnr_va);
857 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
858 puffs_cidcvt(&getattr_msg->pvnr_cid, curlwp);
859 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
860 PUFFS_VN_GETATTR, VPTOPNC(vp));
861
862 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
863 error = checkerr(pmp, error, __func__);
864 if (error)
865 goto out;
866
867 rvap = &getattr_msg->pvnr_va;
868 /*
869 * Don't listen to the file server regarding special device
870 * size info, the file server doesn't know anything about them.
871 */
872 if (vp->v_type == VBLK || vp->v_type == VCHR)
873 rvap->va_size = vp->v_size;
874
875 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
876 if (vp->v_type == VBLK)
877 rvap->va_blocksize = BLKDEV_IOSIZE;
878 else if (vp->v_type == VCHR)
879 rvap->va_blocksize = MAXBSIZE;
880
881 (void) memcpy(vap, rvap, sizeof(struct vattr));
882 vap->va_fsid = mp->mnt_stat.f_fsidx.__fsid_val[0];
883
884 pn = VPTOPP(vp);
885 if (pn->pn_stat & PNODE_METACACHE_ATIME)
886 vap->va_atime = pn->pn_mc_atime;
887 if (pn->pn_stat & PNODE_METACACHE_CTIME)
888 vap->va_ctime = pn->pn_mc_ctime;
889 if (pn->pn_stat & PNODE_METACACHE_MTIME)
890 vap->va_mtime = pn->pn_mc_mtime;
891 if (pn->pn_stat & PNODE_METACACHE_SIZE) {
892 vap->va_size = pn->pn_mc_size;
893 } else {
894 if (rvap->va_size != VNOVAL
895 && vp->v_type != VBLK && vp->v_type != VCHR) {
896 uvm_vnp_setsize(vp, rvap->va_size);
897 pn->pn_serversize = rvap->va_size;
898 }
899 }
900
901 out:
902 PUFFS_MSG_RELEASE(getattr);
903 return error;
904 }
905
906 static int
907 puffs_dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred,
908 int chsize)
909 {
910 PUFFS_MSG_VARS(vn, setattr);
911 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
912 struct puffs_node *pn = vp->v_data;
913 int error;
914
915 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
916 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
917 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
918 || vap->va_mode != (mode_t)VNOVAL))
919 return EROFS;
920
921 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
922 && vp->v_type == VREG && vap->va_size != VNOVAL)
923 return EROFS;
924
925 /*
926 * Flush metacache first. If we are called with some explicit
927 * parameters, treat them as information overriding metacache
928 * information.
929 */
930 if (pn->pn_stat & PNODE_METACACHE_MASK) {
931 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
932 && vap->va_atime.tv_sec == VNOVAL)
933 vap->va_atime = pn->pn_mc_atime;
934 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
935 && vap->va_ctime.tv_sec == VNOVAL)
936 vap->va_ctime = pn->pn_mc_ctime;
937 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
938 && vap->va_mtime.tv_sec == VNOVAL)
939 vap->va_mtime = pn->pn_mc_mtime;
940 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
941 && vap->va_size == VNOVAL)
942 vap->va_size = pn->pn_mc_size;
943
944 pn->pn_stat &= ~PNODE_METACACHE_MASK;
945 }
946
947 PUFFS_MSG_ALLOC(vn, setattr);
948 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
949 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
950 puffs_cidcvt(&setattr_msg->pvnr_cid, curlwp);
951 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
952 PUFFS_VN_SETATTR, VPTOPNC(vp));
953
954 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setattr, vp->v_data, NULL, error);
955 PUFFS_MSG_RELEASE(setattr);
956 error = checkerr(pmp, error, __func__);
957 if (error)
958 return error;
959
960 if (vap->va_size != VNOVAL) {
961 pn->pn_serversize = vap->va_size;
962 if (chsize)
963 uvm_vnp_setsize(vp, vap->va_size);
964 }
965
966 return 0;
967 }
968
969 int
970 puffs_setattr(void *v)
971 {
972 struct vop_getattr_args /* {
973 const struct vnodeop_desc *a_desc;
974 struct vnode *a_vp;
975 struct vattr *a_vap;
976 kauth_cred_t a_cred;
977 } */ *ap = v;
978
979 return puffs_dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, 1);
980 }
981
982 static __inline int
983 doinact(struct puffs_mount *pmp, int iaflag)
984 {
985
986 if (EXISTSOP(pmp, INACTIVE))
987 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
988 if (iaflag || ALLOPS(pmp))
989 return 1;
990 else
991 return 0;
992 else
993 return 1;
994 else
995 return 0;
996 }
997
998 static void
999 puffs_callinactive(struct puffs_mount *pmp, void *cookie, int iaflag)
1000 {
1001 int error;
1002 PUFFS_MSG_VARS(vn, inactive);
1003
1004 if (doinact(pmp, iaflag)) {
1005 PUFFS_MSG_ALLOC(vn, inactive);
1006 puffs_cidcvt(&inactive_msg->pvnr_cid, curlwp);
1007 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1008 PUFFS_VN_INACTIVE, cookie);
1009
1010 PUFFS_MSG_ENQUEUEWAIT(pmp, park_inactive, error);
1011 PUFFS_MSG_RELEASE(inactive);
1012 }
1013 }
1014
1015 /* XXX: callinactive can't setback */
1016 int
1017 puffs_inactive(void *v)
1018 {
1019 struct vop_inactive_args /* {
1020 const struct vnodeop_desc *a_desc;
1021 struct vnode *a_vp;
1022 } */ *ap = v;
1023 PUFFS_MSG_VARS(vn, inactive);
1024 struct vnode *vp = ap->a_vp;
1025 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1026 struct puffs_node *pnode;
1027 int error;
1028
1029 pnode = vp->v_data;
1030
1031 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1032 PUFFS_MSG_ALLOC(vn, inactive);
1033 puffs_cidcvt(&inactive_msg->pvnr_cid, curlwp);
1034 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1035 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1036
1037 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_inactive, vp->v_data,
1038 NULL, error);
1039 PUFFS_MSG_RELEASE(inactive);
1040 }
1041 pnode->pn_stat &= ~PNODE_DOINACT;
1042
1043 VOP_UNLOCK(vp, 0);
1044
1045 /*
1046 * file server thinks it's gone? then don't be afraid care,
1047 * node's life was already all it would ever be
1048 */
1049 if (pnode->pn_stat & PNODE_NOREFS) {
1050 pnode->pn_stat |= PNODE_DYING;
1051 vrecycle(vp, NULL, curlwp);
1052 }
1053
1054 return 0;
1055 }
1056
1057 static void
1058 puffs_callreclaim(struct puffs_mount *pmp, void *cookie)
1059 {
1060 PUFFS_MSG_VARS(vn, reclaim);
1061
1062 if (!EXISTSOP(pmp, RECLAIM))
1063 return;
1064
1065 PUFFS_MSG_ALLOC(vn, reclaim);
1066 puffs_msg_setfaf(park_reclaim);
1067 puffs_cidcvt(&reclaim_msg->pvnr_cid, curlwp);
1068 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, cookie);
1069
1070 puffs_msg_enqueue(pmp, park_reclaim);
1071 PUFFS_MSG_RELEASE(reclaim);
1072 }
1073
1074 /*
1075 * always FAF, we don't really care if the server wants to fail to
1076 * reclaim the node or not
1077 */
1078 int
1079 puffs_reclaim(void *v)
1080 {
1081 struct vop_reclaim_args /* {
1082 const struct vnodeop_desc *a_desc;
1083 struct vnode *a_vp;
1084 } */ *ap = v;
1085 struct vnode *vp = ap->a_vp;
1086 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1087
1088 /*
1089 * first things first: check if someone is trying to reclaim the
1090 * root vnode. do not allow that to travel to userspace.
1091 * Note that we don't need to take the lock similarly to
1092 * puffs_root(), since there is only one of us.
1093 */
1094 if (vp->v_vflag & VV_ROOT) {
1095 mutex_enter(&pmp->pmp_lock);
1096 KASSERT(pmp->pmp_root != NULL);
1097 pmp->pmp_root = NULL;
1098 mutex_exit(&pmp->pmp_lock);
1099 goto out;
1100 }
1101
1102 puffs_callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp));
1103
1104 out:
1105 if (PUFFS_USE_NAMECACHE(pmp))
1106 cache_purge(vp);
1107 puffs_putvnode(vp);
1108
1109 return 0;
1110 }
1111
1112 #define CSIZE sizeof(**ap->a_cookies)
1113 int
1114 puffs_readdir(void *v)
1115 {
1116 struct vop_readdir_args /* {
1117 const struct vnodeop_desc *a_desc;
1118 struct vnode *a_vp;
1119 struct uio *a_uio;
1120 kauth_cred_t a_cred;
1121 int *a_eofflag;
1122 off_t **a_cookies;
1123 int *a_ncookies;
1124 } */ *ap = v;
1125 PUFFS_MSG_VARS(vn, readdir);
1126 struct vnode *vp = ap->a_vp;
1127 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1128 size_t argsize, tomove, cookiemem, cookiesmax;
1129 struct uio *uio = ap->a_uio;
1130 size_t howmuch, resid;
1131 int error;
1132
1133 /*
1134 * ok, so we need: resid + cookiemem = maxreq
1135 * => resid + cookiesize * (resid/minsize) = maxreq
1136 * => resid + cookiesize/minsize * resid = maxreq
1137 * => (cookiesize/minsize + 1) * resid = maxreq
1138 * => resid = maxreq / (cookiesize/minsize + 1)
1139 *
1140 * Since cookiesize <= minsize and we're not very big on floats,
1141 * we approximate that to be 1. Therefore:
1142 *
1143 * resid = maxreq / 2;
1144 *
1145 * Well, at least we didn't have to use differential equations
1146 * or the Gram-Schmidt process.
1147 *
1148 * (yes, I'm very afraid of this)
1149 */
1150 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1151
1152 if (ap->a_cookies) {
1153 KASSERT(ap->a_ncookies != NULL);
1154 if (pmp->pmp_args.pa_fhsize == 0)
1155 return EOPNOTSUPP;
1156 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1157 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1158 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1159 } else {
1160 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1161 cookiesmax = 0;
1162 cookiemem = 0;
1163 }
1164
1165 argsize = sizeof(struct puffs_vnmsg_readdir);
1166 tomove = resid + cookiemem;
1167 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1168 (void **)&readdir_msg, 1);
1169
1170 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1171 readdir_msg->pvnr_offset = uio->uio_offset;
1172 readdir_msg->pvnr_resid = resid;
1173 readdir_msg->pvnr_ncookies = cookiesmax;
1174 readdir_msg->pvnr_eofflag = 0;
1175 readdir_msg->pvnr_dentoff = cookiemem;
1176 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1177 PUFFS_VN_READDIR, VPTOPNC(vp));
1178 puffs_msg_setdelta(park_readdir, tomove);
1179
1180 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1181 error = checkerr(pmp, error, __func__);
1182 if (error)
1183 goto out;
1184
1185 /* userspace is cheating? */
1186 if (readdir_msg->pvnr_resid > resid) {
1187 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1188 "resid grew", VPTOPNC(vp));
1189 ERROUT(EPROTO);
1190 }
1191 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1192 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1193 "too many cookies", VPTOPNC(vp));
1194 ERROUT(EPROTO);
1195 }
1196
1197 /* check eof */
1198 if (readdir_msg->pvnr_eofflag)
1199 *ap->a_eofflag = 1;
1200
1201 /* bouncy-wouncy with the directory data */
1202 howmuch = resid - readdir_msg->pvnr_resid;
1203
1204 /* force eof if no data was returned (getcwd() needs this) */
1205 if (howmuch == 0) {
1206 *ap->a_eofflag = 1;
1207 goto out;
1208 }
1209
1210 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1211 if (error)
1212 goto out;
1213
1214 /* provide cookies to caller if so desired */
1215 if (ap->a_cookies) {
1216 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1217 M_TEMP, M_WAITOK);
1218 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1219 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1220 *ap->a_ncookies*CSIZE);
1221 }
1222
1223 /* next readdir starts here */
1224 uio->uio_offset = readdir_msg->pvnr_offset;
1225
1226 out:
1227 puffs_msgmem_release(park_readdir);
1228 return error;
1229 }
1230 #undef CSIZE
1231
1232 /*
1233 * poll works by consuming the bitmask in pn_revents. If there are
1234 * events available, poll returns immediately. If not, it issues a
1235 * poll to userspace, selrecords itself and returns with no available
1236 * events. When the file server returns, it executes puffs_parkdone_poll(),
1237 * where available events are added to the bitmask. selnotify() is
1238 * then also executed by that function causing us to enter here again
1239 * and hopefully find the missing bits (unless someone got them first,
1240 * in which case it starts all over again).
1241 */
1242 int
1243 puffs_poll(void *v)
1244 {
1245 struct vop_poll_args /* {
1246 const struct vnodeop_desc *a_desc;
1247 struct vnode *a_vp;
1248 int a_events;
1249 }*/ *ap = v;
1250 PUFFS_MSG_VARS(vn, poll);
1251 struct vnode *vp = ap->a_vp;
1252 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1253 struct puffs_node *pn = vp->v_data;
1254 int events, error;
1255
1256 if (EXISTSOP(pmp, POLL)) {
1257 mutex_enter(&pn->pn_mtx);
1258 events = pn->pn_revents & ap->a_events;
1259 if (events & ap->a_events) {
1260 pn->pn_revents &= ~ap->a_events;
1261 mutex_exit(&pn->pn_mtx);
1262
1263 return events;
1264 } else {
1265 puffs_referencenode(pn);
1266 mutex_exit(&pn->pn_mtx);
1267
1268 PUFFS_MSG_ALLOC(vn, poll);
1269 poll_msg->pvnr_events = ap->a_events;
1270 puffs_cidcvt(&poll_msg->pvnr_cid, curlwp);
1271 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1272 PUFFS_VN_POLL, VPTOPNC(vp));
1273 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1274 selrecord(curlwp, &pn->pn_sel);
1275
1276 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_poll, vp->v_data,
1277 NULL, error);
1278 PUFFS_MSG_RELEASE(poll);
1279
1280 return 0;
1281 }
1282 } else {
1283 return genfs_poll(v);
1284 }
1285 }
1286
1287 int
1288 puffs_fsync(void *v)
1289 {
1290 struct vop_fsync_args /* {
1291 const struct vnodeop_desc *a_desc;
1292 struct vnode *a_vp;
1293 kauth_cred_t a_cred;
1294 int a_flags;
1295 off_t a_offlo;
1296 off_t a_offhi;
1297 } */ *ap = v;
1298 PUFFS_MSG_VARS(vn, fsync);
1299 struct vnode *vp = ap->a_vp;
1300 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1301 struct puffs_node *pn;
1302 struct vattr va;
1303 int pflags, error, dofaf;
1304
1305 pn = VPTOPP(vp);
1306
1307 /* flush out information from our metacache, see vop_setattr */
1308 if (pn->pn_stat & PNODE_METACACHE_MASK
1309 && (pn->pn_stat & PNODE_DYING) == 0) {
1310 vattr_null(&va);
1311 error = VOP_SETATTR(vp, &va, FSCRED);
1312 if (error)
1313 return error;
1314 }
1315
1316 /*
1317 * flush pages to avoid being overly dirty
1318 */
1319 pflags = PGO_CLEANIT;
1320 if (ap->a_flags & FSYNC_WAIT)
1321 pflags |= PGO_SYNCIO;
1322 simple_lock(&vp->v_interlock);
1323 error = VOP_PUTPAGES(vp, trunc_page(ap->a_offlo),
1324 round_page(ap->a_offhi), pflags);
1325 if (error)
1326 return error;
1327
1328 /*
1329 * HELLO! We exit already here if the user server does not
1330 * support fsync OR if we should call fsync for a node which
1331 * has references neither in the kernel or the fs server.
1332 * Otherwise we continue to issue fsync() forward.
1333 */
1334 if (!EXISTSOP(pmp, FSYNC) || (pn->pn_stat & PNODE_DYING))
1335 return 0;
1336
1337 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1338 /*
1339 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1340 * only FAFs for those. Otherwise there's a danger of deadlock,
1341 * since the execution context here might be the user server
1342 * doing some operation on another fs, which in turn caused a
1343 * vnode to be reclaimed from the freelist for this fs.
1344 */
1345 if (dofaf == 0) {
1346 simple_lock(&vp->v_interlock);
1347 if (vp->v_iflag & VI_XLOCK)
1348 dofaf = 1;
1349 simple_unlock(&vp->v_interlock);
1350 }
1351
1352 PUFFS_MSG_ALLOC(vn, fsync);
1353 if (dofaf)
1354 puffs_msg_setfaf(park_fsync);
1355
1356 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1357 fsync_msg->pvnr_flags = ap->a_flags;
1358 fsync_msg->pvnr_offlo = ap->a_offlo;
1359 fsync_msg->pvnr_offhi = ap->a_offhi;
1360 puffs_cidcvt(&fsync_msg->pvnr_cid, curlwp);
1361 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1362 PUFFS_VN_FSYNC, VPTOPNC(vp));
1363
1364 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1365 PUFFS_MSG_RELEASE(fsync);
1366
1367 error = checkerr(pmp, error, __func__);
1368
1369 return error;
1370 }
1371
1372 int
1373 puffs_seek(void *v)
1374 {
1375 struct vop_seek_args /* {
1376 const struct vnodeop_desc *a_desc;
1377 struct vnode *a_vp;
1378 off_t a_oldoff;
1379 off_t a_newoff;
1380 kauth_cred_t a_cred;
1381 } */ *ap = v;
1382 PUFFS_MSG_VARS(vn, seek);
1383 struct vnode *vp = ap->a_vp;
1384 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1385 int error;
1386
1387 PUFFS_MSG_ALLOC(vn, seek);
1388 seek_msg->pvnr_oldoff = ap->a_oldoff;
1389 seek_msg->pvnr_newoff = ap->a_newoff;
1390 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1391 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1392 PUFFS_VN_SEEK, VPTOPNC(vp));
1393
1394 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1395 PUFFS_MSG_RELEASE(seek);
1396 return checkerr(pmp, error, __func__);
1397 }
1398
1399 static int
1400 puffs_callremove(struct puffs_mount *pmp, void *dcookie, void *cookie,
1401 struct componentname *cnp)
1402 {
1403 PUFFS_MSG_VARS(vn, remove);
1404 int error;
1405
1406 PUFFS_MSG_ALLOC(vn, remove);
1407 remove_msg->pvnr_cookie_targ = cookie;
1408 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1409 &remove_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1410 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dcookie);
1411
1412 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1413 PUFFS_MSG_RELEASE(remove);
1414
1415 return checkerr(pmp, error, __func__);
1416 }
1417
1418 /*
1419 * XXX: can't use callremove now because can't catch setbacks with
1420 * it due to lack of a pnode argument.
1421 */
1422 int
1423 puffs_remove(void *v)
1424 {
1425 struct vop_remove_args /* {
1426 const struct vnodeop_desc *a_desc;
1427 struct vnode *a_dvp;
1428 struct vnode *a_vp;
1429 struct componentname *a_cnp;
1430 } */ *ap = v;
1431 PUFFS_MSG_VARS(vn, remove);
1432 struct vnode *dvp = ap->a_dvp;
1433 struct vnode *vp = ap->a_vp;
1434 struct puffs_node *dpn = VPTOPP(dvp);
1435 struct puffs_node *pn = VPTOPP(vp);
1436 struct componentname *cnp = ap->a_cnp;
1437 struct mount *mp = dvp->v_mount;
1438 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1439 int error;
1440
1441 PUFFS_MSG_ALLOC(vn, remove);
1442 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1443 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1444 &remove_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1445 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1446 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1447
1448 puffs_msg_enqueue(pmp, park_remove);
1449 REFPN_AND_UNLOCKVP(dvp, dpn);
1450 if (dvp == vp)
1451 REFPN(pn);
1452 else
1453 REFPN_AND_UNLOCKVP(vp, pn);
1454 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1455
1456 PUFFS_MSG_RELEASE(remove);
1457
1458 RELEPN_AND_VP(dvp, dpn);
1459 RELEPN_AND_VP(vp, pn);
1460
1461 error = checkerr(pmp, error, __func__);
1462 return error;
1463 }
1464
1465 int
1466 puffs_mkdir(void *v)
1467 {
1468 struct vop_mkdir_args /* {
1469 const struct vnodeop_desc *a_desc;
1470 struct vnode *a_dvp;
1471 struct vnode **a_vpp;
1472 struct componentname *a_cnp;
1473 struct vattr *a_vap;
1474 } */ *ap = v;
1475 PUFFS_MSG_VARS(vn, mkdir);
1476 struct vnode *dvp = ap->a_dvp;
1477 struct puffs_node *dpn = VPTOPP(dvp);
1478 struct componentname *cnp = ap->a_cnp;
1479 struct mount *mp = dvp->v_mount;
1480 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1481 int error;
1482
1483 PUFFS_MSG_ALLOC(vn, mkdir);
1484 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1485 &mkdir_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1486 mkdir_msg->pvnr_va = *ap->a_vap;
1487 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1488 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1489
1490 puffs_msg_enqueue(pmp, park_mkdir);
1491 REFPN_AND_UNLOCKVP(dvp, dpn);
1492 error = puffs_msg_wait2(pmp, park_mkdir, dpn, NULL);
1493
1494 error = checkerr(pmp, error, __func__);
1495 if (error)
1496 goto out;
1497
1498 error = puffs_newnode(mp, dvp, ap->a_vpp,
1499 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1500 if (error)
1501 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1502 mkdir_msg->pvnr_newnode, cnp);
1503
1504 out:
1505 PUFFS_MSG_RELEASE(mkdir);
1506 if (error || (cnp->cn_flags & SAVESTART) == 0)
1507 PNBUF_PUT(cnp->cn_pnbuf);
1508 RELEPN_AND_VP(dvp, dpn);
1509 return error;
1510 }
1511
1512 static int
1513 puffs_callrmdir(struct puffs_mount *pmp, void *dcookie, void *cookie,
1514 struct componentname *cnp)
1515 {
1516 PUFFS_MSG_VARS(vn, rmdir);
1517 int error;
1518
1519 PUFFS_MSG_ALLOC(vn, rmdir);
1520 rmdir_msg->pvnr_cookie_targ = cookie;
1521 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1522 &rmdir_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1523 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dcookie);
1524
1525 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1526 PUFFS_MSG_RELEASE(rmdir);
1527
1528 return checkerr(pmp, error, __func__);
1529 }
1530
1531 int
1532 puffs_rmdir(void *v)
1533 {
1534 struct vop_rmdir_args /* {
1535 const struct vnodeop_desc *a_desc;
1536 struct vnode *a_dvp;
1537 struct vnode *a_vp;
1538 struct componentname *a_cnp;
1539 } */ *ap = v;
1540 PUFFS_MSG_VARS(vn, rmdir);
1541 struct vnode *dvp = ap->a_dvp;
1542 struct vnode *vp = ap->a_vp;
1543 struct puffs_node *dpn = VPTOPP(dvp);
1544 struct puffs_node *pn = VPTOPP(vp);
1545 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1546 struct componentname *cnp = ap->a_cnp;
1547 int error;
1548
1549 PUFFS_MSG_ALLOC(vn, rmdir);
1550 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1551 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1552 &rmdir_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1553 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1554 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1555
1556 puffs_msg_enqueue(pmp, park_rmdir);
1557 REFPN_AND_UNLOCKVP(dvp, dpn);
1558 REFPN_AND_UNLOCKVP(vp, pn);
1559 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1560
1561 PUFFS_MSG_RELEASE(rmdir);
1562
1563 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1564 RELEPN_AND_VP(dvp, dpn);
1565 RELEPN_AND_VP(vp, pn);
1566
1567 return error;
1568 }
1569
1570 int
1571 puffs_link(void *v)
1572 {
1573 struct vop_link_args /* {
1574 const struct vnodeop_desc *a_desc;
1575 struct vnode *a_dvp;
1576 struct vnode *a_vp;
1577 struct componentname *a_cnp;
1578 }*/ *ap = v;
1579 PUFFS_MSG_VARS(vn, link);
1580 struct vnode *dvp = ap->a_dvp;
1581 struct vnode *vp = ap->a_vp;
1582 struct puffs_node *dpn = VPTOPP(dvp);
1583 struct puffs_node *pn = VPTOPP(vp);
1584 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1585 struct componentname *cnp = ap->a_cnp;
1586 int error;
1587
1588 PUFFS_MSG_ALLOC(vn, link);
1589 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
1590 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
1591 &link_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1592 puffs_msg_setinfo(park_link, PUFFSOP_VN,
1593 PUFFS_VN_LINK, VPTOPNC(dvp));
1594
1595 puffs_msg_enqueue(pmp, park_link);
1596 REFPN_AND_UNLOCKVP(dvp, dpn);
1597 REFPN(pn);
1598 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
1599
1600 PUFFS_MSG_RELEASE(link);
1601
1602 error = checkerr(pmp, error, __func__);
1603
1604 /*
1605 * XXX: stay in touch with the cache. I don't like this, but
1606 * don't have a better solution either. See also puffs_rename().
1607 */
1608 if (error == 0)
1609 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
1610
1611 PNBUF_PUT(cnp->cn_pnbuf);
1612 RELEPN_AND_VP(dvp, dpn);
1613 puffs_releasenode(pn);
1614
1615 return error;
1616 }
1617
1618 int
1619 puffs_symlink(void *v)
1620 {
1621 struct vop_symlink_args /* {
1622 const struct vnodeop_desc *a_desc;
1623 struct vnode *a_dvp;
1624 struct vnode **a_vpp;
1625 struct componentname *a_cnp;
1626 struct vattr *a_vap;
1627 char *a_target;
1628 }*/ *ap = v;
1629 PUFFS_MSG_VARS(vn, symlink);
1630 struct vnode *dvp = ap->a_dvp;
1631 struct puffs_node *dpn = VPTOPP(dvp);
1632 struct mount *mp = dvp->v_mount;
1633 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1634 struct componentname *cnp = ap->a_cnp;
1635 int error;
1636
1637 *ap->a_vpp = NULL;
1638
1639 PUFFS_MSG_ALLOC(vn, symlink);
1640 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
1641 &symlink_msg->pvnr_cn_cid, cnp, PUFFS_USE_FULLPNBUF(pmp));
1642 symlink_msg->pvnr_va = *ap->a_vap;
1643 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
1644 sizeof(symlink_msg->pvnr_link));
1645 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
1646 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
1647
1648 puffs_msg_enqueue(pmp, park_symlink);
1649 REFPN_AND_UNLOCKVP(dvp, dpn);
1650 error = puffs_msg_wait2(pmp, park_symlink, dpn, NULL);
1651
1652 error = checkerr(pmp, error, __func__);
1653 if (error)
1654 goto out;
1655
1656 error = puffs_newnode(mp, dvp, ap->a_vpp,
1657 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
1658 if (error)
1659 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
1660 symlink_msg->pvnr_newnode, cnp);
1661
1662 out:
1663 PUFFS_MSG_RELEASE(symlink);
1664 if (error || (cnp->cn_flags & SAVESTART) == 0)
1665 PNBUF_PUT(cnp->cn_pnbuf);
1666 RELEPN_AND_VP(dvp, dpn);
1667
1668 return error;
1669 }
1670
1671 int
1672 puffs_readlink(void *v)
1673 {
1674 struct vop_readlink_args /* {
1675 const struct vnodeop_desc *a_desc;
1676 struct vnode *a_vp;
1677 struct uio *a_uio;
1678 kauth_cred_t a_cred;
1679 } */ *ap = v;
1680 PUFFS_MSG_VARS(vn, readlink);
1681 struct vnode *vp = ap->a_vp;
1682 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1683 size_t linklen;
1684 int error;
1685
1686 PUFFS_MSG_ALLOC(vn, readlink);
1687 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
1688 linklen = sizeof(readlink_msg->pvnr_link);
1689 readlink_msg->pvnr_linklen = linklen;
1690 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
1691 PUFFS_VN_READLINK, VPTOPNC(vp));
1692
1693 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
1694 error = checkerr(pmp, error, __func__);
1695 if (error)
1696 goto out;
1697
1698 /* bad bad user file server */
1699 if (readlink_msg->pvnr_linklen > linklen) {
1700 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
1701 "linklen too big", VPTOPNC(ap->a_vp));
1702 error = EPROTO;
1703 goto out;
1704 }
1705
1706 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
1707 ap->a_uio);
1708 out:
1709 PUFFS_MSG_RELEASE(readlink);
1710 return error;
1711 }
1712
1713 int
1714 puffs_rename(void *v)
1715 {
1716 struct vop_rename_args /* {
1717 const struct vnodeop_desc *a_desc;
1718 struct vnode *a_fdvp;
1719 struct vnode *a_fvp;
1720 struct componentname *a_fcnp;
1721 struct vnode *a_tdvp;
1722 struct vnode *a_tvp;
1723 struct componentname *a_tcnp;
1724 }*/ *ap = v;
1725 PUFFS_MSG_VARS(vn, rename);
1726 struct vnode *fdvp = ap->a_fdvp;
1727 struct puffs_node *fpn = ap->a_fvp->v_data;
1728 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
1729 int error;
1730
1731 if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount)
1732 ERROUT(EXDEV);
1733
1734 PUFFS_MSG_ALLOC(vn, rename);
1735 rename_msg->pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1736 rename_msg->pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1737 if (ap->a_tvp)
1738 rename_msg->pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1739 else
1740 rename_msg->pvnr_cookie_targ = NULL;
1741 puffs_makecn(&rename_msg->pvnr_cn_src,
1742 &rename_msg->pvnr_cn_src_cred, &rename_msg->pvnr_cn_src_cid,
1743 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
1744 puffs_makecn(&rename_msg->pvnr_cn_targ,
1745 &rename_msg->pvnr_cn_targ_cred, &rename_msg->pvnr_cn_targ_cid,
1746 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
1747 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
1748 PUFFS_VN_RENAME, VPTOPNC(fdvp));
1749
1750 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
1751 error = checkerr(pmp, error, __func__);
1752
1753 /*
1754 * XXX: stay in touch with the cache. I don't like this, but
1755 * don't have a better solution either. See also puffs_link().
1756 */
1757 if (error == 0)
1758 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
1759
1760 out:
1761 PUFFS_MSG_RELEASE(rename);
1762 if (ap->a_tvp != NULL)
1763 vput(ap->a_tvp);
1764 if (ap->a_tdvp == ap->a_tvp)
1765 vrele(ap->a_tdvp);
1766 else
1767 vput(ap->a_tdvp);
1768
1769 vrele(ap->a_fdvp);
1770 vrele(ap->a_fvp);
1771
1772 return error;
1773 }
1774
1775 #define RWARGS(cont, iofl, move, offset, creds) \
1776 (cont)->pvnr_ioflag = (iofl); \
1777 (cont)->pvnr_resid = (move); \
1778 (cont)->pvnr_offset = (offset); \
1779 puffs_credcvt(&(cont)->pvnr_cred, creds)
1780
1781 int
1782 puffs_read(void *v)
1783 {
1784 struct vop_read_args /* {
1785 const struct vnodeop_desc *a_desc;
1786 struct vnode *a_vp;
1787 struct uio *a_uio;
1788 int a_ioflag;
1789 kauth_cred_t a_cred;
1790 } */ *ap = v;
1791 PUFFS_MSG_VARS(vn, read);
1792 struct vnode *vp = ap->a_vp;
1793 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1794 struct uio *uio = ap->a_uio;
1795 void *win;
1796 size_t tomove, argsize;
1797 vsize_t bytelen;
1798 int error, ubcflags;
1799
1800 read_msg = NULL;
1801 error = 0;
1802
1803 /* std sanity */
1804 if (uio->uio_resid == 0)
1805 return 0;
1806 if (uio->uio_offset < 0)
1807 return EINVAL;
1808
1809 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1810 const int advice = IO_ADV_DECODE(ap->a_ioflag);
1811
1812 ubcflags = 0;
1813 if (UBC_WANT_UNMAP(vp))
1814 ubcflags = UBC_UNMAP;
1815
1816 while (uio->uio_resid > 0) {
1817 bytelen = MIN(uio->uio_resid,
1818 vp->v_size - uio->uio_offset);
1819 if (bytelen == 0)
1820 break;
1821
1822 win = ubc_alloc(&vp->v_uobj, uio->uio_offset,
1823 &bytelen, advice, UBC_READ);
1824 error = uiomove(win, bytelen, uio);
1825 ubc_release(win, ubcflags);
1826 if (error)
1827 break;
1828 }
1829
1830 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
1831 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
1832 } else {
1833 /*
1834 * in case it's not a regular file or we're operating
1835 * uncached, do read in the old-fashioned style,
1836 * i.e. explicit read operations
1837 */
1838
1839 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1840 argsize = sizeof(struct puffs_vnmsg_read);
1841 puffs_msgmem_alloc(argsize + tomove, &park_read,
1842 (void **)&read_msg, 1);
1843
1844 error = 0;
1845 while (uio->uio_resid > 0) {
1846 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1847 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
1848 RWARGS(read_msg, ap->a_ioflag, tomove,
1849 uio->uio_offset, ap->a_cred);
1850 puffs_msg_setinfo(park_read, PUFFSOP_VN,
1851 PUFFS_VN_READ, VPTOPNC(vp));
1852 puffs_msg_setdelta(park_read, tomove);
1853
1854 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
1855 NULL, error);
1856 error = checkerr(pmp, error, __func__);
1857 if (error)
1858 break;
1859
1860 if (read_msg->pvnr_resid > tomove) {
1861 puffs_senderr(pmp, PUFFS_ERR_READ,
1862 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1863 error = EPROTO;
1864 break;
1865 }
1866
1867 error = uiomove(read_msg->pvnr_data,
1868 tomove - read_msg->pvnr_resid, uio);
1869
1870 /*
1871 * in case the file is out of juice, resid from
1872 * userspace is != 0. and the error-case is
1873 * quite obvious
1874 */
1875 if (error || read_msg->pvnr_resid)
1876 break;
1877 }
1878
1879 puffs_msgmem_release(park_read);
1880 }
1881
1882 return error;
1883 }
1884
1885 /*
1886 * XXX: in case of a failure, this leaves uio in a bad state.
1887 * We could theoretically copy the uio and iovecs and "replay"
1888 * them the right amount after the userspace trip, but don't
1889 * bother for now.
1890 */
1891 int
1892 puffs_write(void *v)
1893 {
1894 struct vop_write_args /* {
1895 const struct vnodeop_desc *a_desc;
1896 struct vnode *a_vp;
1897 struct uio *a_uio;
1898 int a_ioflag;
1899 kauth_cred_t a_cred;
1900 } */ *ap = v;
1901 PUFFS_MSG_VARS(vn, write);
1902 struct vnode *vp = ap->a_vp;
1903 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1904 struct uio *uio = ap->a_uio;
1905 size_t tomove, argsize;
1906 off_t oldoff, newoff, origoff;
1907 vsize_t bytelen;
1908 int error, uflags;
1909 int ubcflags;
1910
1911 error = uflags = 0;
1912 write_msg = NULL;
1913
1914 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1915 ubcflags = UBC_WRITE | UBC_PARTIALOK;
1916 if (UBC_WANT_UNMAP(vp))
1917 ubcflags |= UBC_UNMAP;
1918
1919 /*
1920 * userspace *should* be allowed to control this,
1921 * but with UBC it's a bit unclear how to handle it
1922 */
1923 if (ap->a_ioflag & IO_APPEND)
1924 uio->uio_offset = vp->v_size;
1925
1926 origoff = uio->uio_offset;
1927 while (uio->uio_resid > 0) {
1928 uflags |= PUFFS_UPDATECTIME;
1929 uflags |= PUFFS_UPDATEMTIME;
1930 oldoff = uio->uio_offset;
1931 bytelen = uio->uio_resid;
1932
1933 newoff = oldoff + bytelen;
1934 if (vp->v_size < newoff) {
1935 uvm_vnp_setwritesize(vp, newoff);
1936 }
1937 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
1938 UVM_ADV_RANDOM, ubcflags);
1939
1940 /*
1941 * In case of a ubc_uiomove() error,
1942 * opt to not extend the file at all and
1943 * return an error. Otherwise, if we attempt
1944 * to clear the memory we couldn't fault to,
1945 * we might generate a kernel page fault.
1946 */
1947 if (vp->v_size < newoff) {
1948 if (error == 0) {
1949 uflags |= PUFFS_UPDATESIZE;
1950 uvm_vnp_setsize(vp, newoff);
1951 } else {
1952 uvm_vnp_setwritesize(vp, vp->v_size);
1953 }
1954 }
1955 if (error)
1956 break;
1957
1958 /*
1959 * If we're writing large files, flush to file server
1960 * every 64k. Otherwise we can very easily exhaust
1961 * kernel and user memory, as the file server cannot
1962 * really keep up with our writing speed.
1963 *
1964 * Note: this does *NOT* honor MNT_ASYNC, because
1965 * that gives userland too much say in the kernel.
1966 */
1967 if (oldoff >> 16 != uio->uio_offset >> 16) {
1968 simple_lock(&vp->v_interlock);
1969 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
1970 uio->uio_offset & ~0xffff,
1971 PGO_CLEANIT | PGO_SYNCIO);
1972 if (error)
1973 break;
1974 }
1975 }
1976
1977 /* synchronous I/O? */
1978 if (error == 0 && ap->a_ioflag & IO_SYNC) {
1979 simple_lock(&vp->v_interlock);
1980 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1981 round_page(uio->uio_offset),
1982 PGO_CLEANIT | PGO_SYNCIO);
1983
1984 /* write through page cache? */
1985 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
1986 simple_lock(&vp->v_interlock);
1987 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1988 round_page(uio->uio_offset), PGO_CLEANIT);
1989 }
1990
1991 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
1992 } else {
1993 /* tomove is non-increasing */
1994 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1995 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
1996 puffs_msgmem_alloc(argsize, &park_write, (void **)&write_msg,1);
1997
1998 while (uio->uio_resid > 0) {
1999 /* move data to buffer */
2000 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
2001 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
2002 RWARGS(write_msg, ap->a_ioflag, tomove,
2003 uio->uio_offset, ap->a_cred);
2004 error = uiomove(write_msg->pvnr_data, tomove, uio);
2005 if (error)
2006 break;
2007
2008 /* move buffer to userspace */
2009 puffs_msg_setinfo(park_write, PUFFSOP_VN,
2010 PUFFS_VN_WRITE, VPTOPNC(vp));
2011 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
2012 NULL, error);
2013 error = checkerr(pmp, error, __func__);
2014 if (error)
2015 break;
2016
2017 if (write_msg->pvnr_resid > tomove) {
2018 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2019 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2020 error = EPROTO;
2021 break;
2022 }
2023
2024 /* adjust file size */
2025 if (vp->v_size < uio->uio_offset)
2026 uvm_vnp_setsize(vp, uio->uio_offset);
2027
2028 /* didn't move everything? bad userspace. bail */
2029 if (write_msg->pvnr_resid != 0) {
2030 error = EIO;
2031 break;
2032 }
2033 }
2034 puffs_msgmem_release(park_write);
2035 }
2036
2037 return error;
2038 }
2039
2040 int
2041 puffs_print(void *v)
2042 {
2043 struct vop_print_args /* {
2044 struct vnode *a_vp;
2045 } */ *ap = v;
2046 PUFFS_MSG_VARS(vn, print);
2047 struct vnode *vp = ap->a_vp;
2048 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2049 struct puffs_node *pn = vp->v_data;
2050 int error;
2051
2052 /* kernel portion */
2053 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2054 " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
2055 if (vp->v_type == VFIFO)
2056 fifo_printinfo(vp);
2057 lockmgr_printinfo(&vp->v_lock);
2058
2059 /* userspace portion */
2060 if (EXISTSOP(pmp, PRINT)) {
2061 PUFFS_MSG_ALLOC(vn, print);
2062 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2063 PUFFS_VN_PRINT, VPTOPNC(vp));
2064 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_print, vp->v_data,
2065 NULL, error);
2066 PUFFS_MSG_RELEASE(print);
2067 }
2068
2069 return 0;
2070 }
2071
2072 int
2073 puffs_pathconf(void *v)
2074 {
2075 struct vop_pathconf_args /* {
2076 const struct vnodeop_desc *a_desc;
2077 struct vnode *a_vp;
2078 int a_name;
2079 register_t *a_retval;
2080 } */ *ap = v;
2081 PUFFS_MSG_VARS(vn, pathconf);
2082 struct vnode *vp = ap->a_vp;
2083 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2084 int error;
2085
2086 PUFFS_MSG_ALLOC(vn, pathconf);
2087 pathconf_msg->pvnr_name = ap->a_name;
2088 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2089 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2090 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2091 error = checkerr(pmp, error, __func__);
2092 if (!error)
2093 *ap->a_retval = pathconf_msg->pvnr_retval;
2094 PUFFS_MSG_RELEASE(pathconf);
2095
2096 return error;
2097 }
2098
2099 int
2100 puffs_advlock(void *v)
2101 {
2102 struct vop_advlock_args /* {
2103 const struct vnodeop_desc *a_desc;
2104 struct vnode *a_vp;
2105 void *a_id;
2106 int a_op;
2107 struct flock *a_fl;
2108 int a_flags;
2109 } */ *ap = v;
2110 PUFFS_MSG_VARS(vn, advlock);
2111 struct vnode *vp = ap->a_vp;
2112 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2113 int error;
2114
2115 PUFFS_MSG_ALLOC(vn, advlock);
2116 error = copyin(ap->a_fl, &advlock_msg->pvnr_fl, sizeof(struct flock));
2117 if (error)
2118 goto out;
2119 advlock_msg->pvnr_id = ap->a_id;
2120 advlock_msg->pvnr_op = ap->a_op;
2121 advlock_msg->pvnr_flags = ap->a_flags;
2122 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2123 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2124
2125 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2126 error = checkerr(pmp, error, __func__);
2127
2128 out:
2129 PUFFS_MSG_RELEASE(advlock);
2130 return error;
2131 }
2132
2133 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2134
2135 /*
2136 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2137 */
2138 int
2139 puffs_strategy(void *v)
2140 {
2141 struct vop_strategy_args /* {
2142 const struct vnodeop_desc *a_desc;
2143 struct vnode *a_vp;
2144 struct buf *a_bp;
2145 } */ *ap = v;
2146 PUFFS_MSG_VARS(vn, rw);
2147 struct vnode *vp = ap->a_vp;
2148 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2149 struct puffs_node *pn;
2150 struct buf *bp;
2151 size_t argsize;
2152 size_t tomove, moved;
2153 int error, dofaf, dobiodone;
2154
2155 pmp = MPTOPUFFSMP(vp->v_mount);
2156 bp = ap->a_bp;
2157 error = 0;
2158 dofaf = 0;
2159 pn = VPTOPP(vp);
2160 park_rw = NULL; /* explicit */
2161 dobiodone = 1;
2162
2163 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2164 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2165 ERROUT(EOPNOTSUPP);
2166
2167 /*
2168 * Short-circuit optimization: don't flush buffer in between
2169 * VOP_INACTIVE and VOP_RECLAIM in case the node has no references.
2170 */
2171 if (pn->pn_stat & PNODE_DYING) {
2172 KASSERT(BUF_ISWRITE(bp));
2173 bp->b_resid = 0;
2174 goto out;
2175 }
2176
2177 #ifdef DIAGNOSTIC
2178 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2179 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2180 bp->b_bcount);
2181 #endif
2182
2183 /*
2184 * See explanation for the necessity of a FAF in puffs_fsync.
2185 *
2186 * Also, do FAF in case we're suspending.
2187 * See puffs_vfsops.c:pageflush()
2188 */
2189 if (BUF_ISWRITE(bp)) {
2190 simple_lock(&vp->v_interlock);
2191 if (vp->v_iflag & VI_XLOCK)
2192 dofaf = 1;
2193 if (pn->pn_stat & PNODE_SUSPEND)
2194 dofaf = 1;
2195 simple_unlock(&vp->v_interlock);
2196 }
2197
2198 #ifdef DIAGNOSTIC
2199 if (curlwp == uvm.pagedaemon_lwp)
2200 KASSERT(dofaf || BIOASYNC(bp));
2201 #endif
2202
2203 /* allocate transport structure */
2204 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2205 argsize = sizeof(struct puffs_vnmsg_rw);
2206 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2207 (void **)&rw_msg, dofaf ? 0 : 1);
2208 if (error)
2209 goto out;
2210 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2211
2212 /* 2x2 cases: read/write, faf/nofaf */
2213 if (BUF_ISREAD(bp)) {
2214 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2215 PUFFS_VN_READ, VPTOPNC(vp));
2216 puffs_msg_setdelta(park_rw, tomove);
2217 if (BIOASYNC(bp)) {
2218 puffs_msg_setcall(park_rw,
2219 puffs_parkdone_asyncbioread, bp);
2220 puffs_msg_enqueue(pmp, park_rw);
2221 dobiodone = 0;
2222 } else {
2223 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2224 NULL, error);
2225 error = checkerr(pmp, error, __func__);
2226 if (error)
2227 goto out;
2228
2229 if (rw_msg->pvnr_resid > tomove) {
2230 puffs_senderr(pmp, PUFFS_ERR_READ,
2231 E2BIG, "resid grew", VPTOPNC(vp));
2232 ERROUT(EPROTO);
2233 }
2234
2235 moved = tomove - rw_msg->pvnr_resid;
2236
2237 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2238 bp->b_resid = bp->b_bcount - moved;
2239 }
2240 } else {
2241 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2242 PUFFS_VN_WRITE, VPTOPNC(vp));
2243 /*
2244 * make pages read-only before we write them if we want
2245 * write caching info
2246 */
2247 if (PUFFS_WCACHEINFO(pmp)) {
2248 struct uvm_object *uobj = &vp->v_uobj;
2249 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2250 struct vm_page *vmp;
2251 int i;
2252
2253 for (i = 0; i < npages; i++) {
2254 vmp= uvm_pageratop((vaddr_t)bp->b_data
2255 + (i << PAGE_SHIFT));
2256 DPRINTF(("puffs_strategy: write-protecting "
2257 "vp %p page %p, offset %" PRId64"\n",
2258 vp, vmp, vmp->offset));
2259 simple_lock(&uobj->vmobjlock);
2260 vmp->flags |= PG_RDONLY;
2261 pmap_page_protect(vmp, VM_PROT_READ);
2262 simple_unlock(&uobj->vmobjlock);
2263 }
2264 }
2265
2266 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2267 if (dofaf) {
2268 puffs_msg_setfaf(park_rw);
2269 } else if (BIOASYNC(bp)) {
2270 puffs_msg_setcall(park_rw,
2271 puffs_parkdone_asyncbiowrite, bp);
2272 dobiodone = 0;
2273 }
2274
2275 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2276
2277 if (dobiodone == 0)
2278 goto out;
2279
2280 /*
2281 * XXXXXXXX: wrong, but kernel can't survive strategy
2282 * failure currently. Here, have one more X: X.
2283 */
2284 if (error != ENOMEM)
2285 error = 0;
2286
2287 error = checkerr(pmp, error, __func__);
2288 if (error)
2289 goto out;
2290
2291 if (rw_msg->pvnr_resid > tomove) {
2292 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2293 E2BIG, "resid grew", VPTOPNC(vp));
2294 ERROUT(EPROTO);
2295 }
2296
2297 /*
2298 * FAF moved everything. Frankly, we don't
2299 * really have a choice.
2300 */
2301 if (dofaf && error == 0)
2302 moved = tomove;
2303 else
2304 moved = tomove - rw_msg->pvnr_resid;
2305
2306 bp->b_resid = bp->b_bcount - moved;
2307 if (bp->b_resid != 0) {
2308 ERROUT(EIO);
2309 }
2310 }
2311
2312 out:
2313 if (park_rw)
2314 puffs_msgmem_release(park_rw);
2315
2316 if (error)
2317 bp->b_error = error;
2318
2319 if (error || dobiodone)
2320 biodone(bp);
2321
2322 return error;
2323 }
2324
2325 int
2326 puffs_mmap(void *v)
2327 {
2328 struct vop_mmap_args /* {
2329 const struct vnodeop_desc *a_desc;
2330 struct vnode *a_vp;
2331 vm_prot_t a_prot;
2332 kauth_cred_t a_cred;
2333 } */ *ap = v;
2334 PUFFS_MSG_VARS(vn, mmap);
2335 struct vnode *vp = ap->a_vp;
2336 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2337 int error;
2338
2339 if (!PUFFS_USE_PAGECACHE(pmp))
2340 return genfs_eopnotsupp(v);
2341
2342 if (EXISTSOP(pmp, MMAP)) {
2343 PUFFS_MSG_ALLOC(vn, mmap);
2344 mmap_msg->pvnr_prot = ap->a_prot;
2345 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2346 puffs_cidcvt(&mmap_msg->pvnr_cid, curlwp);
2347 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2348 PUFFS_VN_MMAP, VPTOPNC(vp));
2349
2350 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2351 error = checkerr(pmp, error, __func__);
2352 PUFFS_MSG_RELEASE(mmap);
2353 } else {
2354 error = genfs_mmap(v);
2355 }
2356
2357 return error;
2358 }
2359
2360
2361 /*
2362 * The rest don't get a free trip to userspace and back, they
2363 * have to stay within the kernel.
2364 */
2365
2366 /*
2367 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2368 * well, maybe somehow, somewhere, some day ....
2369 */
2370 int
2371 puffs_bmap(void *v)
2372 {
2373 struct vop_bmap_args /* {
2374 const struct vnodeop_desc *a_desc;
2375 struct vnode *a_vp;
2376 daddr_t a_bn;
2377 struct vnode **a_vpp;
2378 daddr_t *a_bnp;
2379 int *a_runp;
2380 } */ *ap = v;
2381 struct puffs_mount *pmp;
2382
2383 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2384
2385 if (ap->a_vpp)
2386 *ap->a_vpp = ap->a_vp;
2387 if (ap->a_bnp)
2388 *ap->a_bnp = ap->a_bn;
2389 if (ap->a_runp)
2390 *ap->a_runp
2391 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2392
2393 return 0;
2394 }
2395
2396 /*
2397 * Handle getpages faults in puffs. We let genfs_getpages() do most
2398 * of the dirty work, but we come in this route to do accounting tasks.
2399 * If the user server has specified functions for cache notifications
2400 * about reads and/or writes, we record which type of operation we got,
2401 * for which page range, and proceed to issue a FAF notification to the
2402 * server about it.
2403 */
2404 int
2405 puffs_getpages(void *v)
2406 {
2407 struct vop_getpages_args /* {
2408 const struct vnodeop_desc *a_desc;
2409 struct vnode *a_vp;
2410 voff_t a_offset;
2411 struct vm_page **a_m;
2412 int *a_count;
2413 int a_centeridx;
2414 vm_prot_t a_access_type;
2415 int a_advice;
2416 int a_flags;
2417 } */ *ap = v;
2418 struct puffs_mount *pmp;
2419 struct puffs_node *pn;
2420 struct vnode *vp;
2421 struct vm_page **pgs;
2422 struct puffs_cacheinfo *pcinfo = NULL;
2423 struct puffs_cacherun *pcrun;
2424 void *parkmem = NULL;
2425 size_t runsizes;
2426 int i, npages, si, streakon;
2427 int error, locked, write;
2428
2429 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2430 npages = *ap->a_count;
2431 pgs = ap->a_m;
2432 vp = ap->a_vp;
2433 pn = vp->v_data;
2434 locked = (ap->a_flags & PGO_LOCKED) != 0;
2435 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
2436
2437 /* ccg xnaht - gets Wuninitialized wrong */
2438 pcrun = NULL;
2439 runsizes = 0;
2440
2441 /*
2442 * Check that we aren't trying to fault in pages which our file
2443 * server doesn't know about. This happens if we extend a file by
2444 * skipping some pages and later try to fault in pages which
2445 * are between pn_serversize and vp_size. This check optimizes
2446 * away the common case where a file is being extended.
2447 */
2448 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
2449 struct vattr va;
2450
2451 /* try again later when we can block */
2452 if (locked)
2453 ERROUT(EBUSY);
2454
2455 simple_unlock(&vp->v_interlock);
2456 vattr_null(&va);
2457 va.va_size = vp->v_size;
2458 error = puffs_dosetattr(vp, &va, FSCRED, 0);
2459 if (error)
2460 ERROUT(error);
2461 simple_lock(&vp->v_interlock);
2462 }
2463
2464 if (write && PUFFS_WCACHEINFO(pmp)) {
2465 #ifdef notnowjohn
2466 /* allocate worst-case memory */
2467 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
2468 pcinfo = kmem_zalloc(sizeof_puffs_cacheinfo) + runsize,
2469 locked ? KM_NOSLEEP : KM_SLEEP);
2470
2471 /*
2472 * can't block if we're locked and can't mess up caching
2473 * information for fs server. so come back later, please
2474 */
2475 if (pcinfo == NULL)
2476 ERROUT(ENOMEM);
2477
2478 parkmem = puffs_park_alloc(locked == 0);
2479 if (parkmem == NULL)
2480 ERROUT(ENOMEM);
2481
2482 pcrun = pcinfo->pcache_runs;
2483 #else
2484 (void)parkmem;
2485 #endif
2486 }
2487
2488 error = genfs_getpages(v);
2489 if (error)
2490 goto out;
2491
2492 if (PUFFS_WCACHEINFO(pmp) == 0)
2493 goto out;
2494
2495 /*
2496 * Let's see whose fault it was and inform the user server of
2497 * possibly read/written pages. Map pages from read faults
2498 * strictly read-only, since otherwise we might miss info on
2499 * when the page is actually write-faulted to.
2500 */
2501 if (!locked)
2502 simple_lock(&vp->v_uobj.vmobjlock);
2503 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
2504 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
2505 if (streakon && write) {
2506 streakon = 0;
2507 pcrun[si].pcache_runend
2508 = trunc_page(pgs[i]->offset) + PAGE_MASK;
2509 si++;
2510 }
2511 continue;
2512 }
2513 if (streakon == 0 && write) {
2514 streakon = 1;
2515 pcrun[si].pcache_runstart = pgs[i]->offset;
2516 }
2517
2518 if (!write)
2519 pgs[i]->flags |= PG_RDONLY;
2520 }
2521 /* was the last page part of our streak? */
2522 if (streakon) {
2523 pcrun[si].pcache_runend
2524 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
2525 si++;
2526 }
2527 if (!locked)
2528 simple_unlock(&vp->v_uobj.vmobjlock);
2529
2530 KASSERT(si <= (npages / 2) + 1);
2531
2532 #ifdef notnowjohn
2533 /* send results to userspace */
2534 if (write)
2535 puffs_cacheop(pmp, parkmem, pcinfo,
2536 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
2537 #endif
2538
2539 out:
2540 if (error) {
2541 if (pcinfo != NULL)
2542 kmem_free(pcinfo,
2543 sizeof(struct puffs_cacheinfo) + runsizes);
2544 #ifdef notnowjohn
2545 if (parkmem != NULL)
2546 puffs_park_release(parkmem, 1);
2547 #endif
2548 }
2549
2550 return error;
2551 }
2552
2553 int
2554 puffs_lock(void *v)
2555 {
2556 struct vop_lock_args /* {
2557 struct vnode *a_vp;
2558 int a_flags;
2559 }*/ *ap = v;
2560 struct vnode *vp = ap->a_vp;
2561 struct mount *mp = vp->v_mount;
2562
2563 #if 0
2564 DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
2565 #endif
2566
2567 /*
2568 * XXX: this avoids deadlocking when we're suspending.
2569 * e.g. some ops holding the vnode lock might be blocked for
2570 * the vfs transaction lock so we'd deadlock.
2571 *
2572 * Now once again this is skating on the thin ice of modern life,
2573 * since we are breaking the consistency guarantee provided
2574 * _to the user server_ by vnode locking. Hopefully this will
2575 * get fixed soon enough by getting rid of the dependency on
2576 * vnode locks alltogether.
2577 */
2578 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2579 if (ap->a_flags & LK_INTERLOCK)
2580 simple_unlock(&vp->v_interlock);
2581 return 0;
2582 }
2583
2584 return lockmgr(&vp->v_lock, ap->a_flags, &vp->v_interlock);
2585 }
2586
2587 int
2588 puffs_unlock(void *v)
2589 {
2590 struct vop_unlock_args /* {
2591 struct vnode *a_vp;
2592 int a_flags;
2593 } */ *ap = v;
2594 struct vnode *vp = ap->a_vp;
2595 struct mount *mp = vp->v_mount;
2596
2597 #if 0
2598 DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
2599 #endif
2600
2601 /* XXX: see puffs_lock() */
2602 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2603 if (ap->a_flags & LK_INTERLOCK)
2604 simple_unlock(&vp->v_interlock);
2605 return 0;
2606 }
2607
2608 return lockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE, &vp->v_interlock);
2609 }
2610
2611 int
2612 puffs_islocked(void *v)
2613 {
2614 struct vop_islocked_args *ap = v;
2615 int rv;
2616
2617 rv = lockstatus(&ap->a_vp->v_lock);
2618 return rv;
2619 }
2620
2621 int
2622 puffs_generic(void *v)
2623 {
2624 struct vop_generic_args *ap = v;
2625
2626 (void)ap;
2627 DPRINTF(("puffs_generic: ap->a_desc = %s\n", ap->a_desc->vdesc_name));
2628
2629 return EOPNOTSUPP;
2630 }
2631
2632
2633 /*
2634 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
2635 * FAF update information for the puffs node first.
2636 */
2637 int
2638 puffs_spec_read(void *v)
2639 {
2640 struct vop_read_args /* {
2641 const struct vnodeop_desc *a_desc;
2642 struct vnode *a_vp;
2643 struct uio *a_uio;
2644 int a_ioflag;
2645 kauth_cred_t a_cred;
2646 } */ *ap = v;
2647
2648 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2649 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
2650 }
2651
2652 int
2653 puffs_spec_write(void *v)
2654 {
2655 struct vop_write_args /* {
2656 const struct vnodeop_desc *a_desc;
2657 struct vnode *a_vp;
2658 struct uio *a_uio;
2659 int a_ioflag;
2660 kauth_cred_t a_cred;
2661 }*/ *ap = v;
2662
2663 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2664 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
2665 }
2666
2667 int
2668 puffs_fifo_read(void *v)
2669 {
2670 struct vop_read_args /* {
2671 const struct vnodeop_desc *a_desc;
2672 struct vnode *a_vp;
2673 struct uio *a_uio;
2674 int a_ioflag;
2675 kauth_cred_t a_cred;
2676 } */ *ap = v;
2677
2678 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2679 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
2680 }
2681
2682 int
2683 puffs_fifo_write(void *v)
2684 {
2685 struct vop_write_args /* {
2686 const struct vnodeop_desc *a_desc;
2687 struct vnode *a_vp;
2688 struct uio *a_uio;
2689 int a_ioflag;
2690 kauth_cred_t a_cred;
2691 }*/ *ap = v;
2692
2693 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2694 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
2695 }
2696