puffs_vnops.c revision 1.123 1 /* $NetBSD: puffs_vnops.c,v 1.123 2007/12/30 23:04:12 pooka Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.123 2007/12/30 23:04:12 pooka Exp $");
34
35 #include <sys/param.h>
36 #include <sys/fstrans.h>
37 #include <sys/malloc.h>
38 #include <sys/mount.h>
39 #include <sys/namei.h>
40 #include <sys/vnode.h>
41 #include <sys/proc.h>
42
43 #include <uvm/uvm.h>
44
45 #include <fs/puffs/puffs_msgif.h>
46 #include <fs/puffs/puffs_sys.h>
47
48 #include <miscfs/fifofs/fifo.h>
49 #include <miscfs/genfs/genfs.h>
50 #include <miscfs/specfs/specdev.h>
51
52 int puffs_vnop_lookup(void *);
53 int puffs_vnop_create(void *);
54 int puffs_vnop_access(void *);
55 int puffs_vnop_mknod(void *);
56 int puffs_vnop_open(void *);
57 int puffs_vnop_close(void *);
58 int puffs_vnop_getattr(void *);
59 int puffs_vnop_setattr(void *);
60 int puffs_vnop_reclaim(void *);
61 int puffs_vnop_readdir(void *);
62 int puffs_vnop_poll(void *);
63 int puffs_vnop_fsync(void *);
64 int puffs_vnop_seek(void *);
65 int puffs_vnop_remove(void *);
66 int puffs_vnop_mkdir(void *);
67 int puffs_vnop_rmdir(void *);
68 int puffs_vnop_link(void *);
69 int puffs_vnop_readlink(void *);
70 int puffs_vnop_symlink(void *);
71 int puffs_vnop_rename(void *);
72 int puffs_vnop_read(void *);
73 int puffs_vnop_write(void *);
74 int puffs_vnop_fcntl(void *);
75 int puffs_vnop_ioctl(void *);
76 int puffs_vnop_inactive(void *);
77 int puffs_vnop_print(void *);
78 int puffs_vnop_pathconf(void *);
79 int puffs_vnop_advlock(void *);
80 int puffs_vnop_strategy(void *);
81 int puffs_vnop_bmap(void *);
82 int puffs_vnop_mmap(void *);
83 int puffs_vnop_getpages(void *);
84
85 int puffs_vnop_spec_read(void *);
86 int puffs_vnop_spec_write(void *);
87 int puffs_vnop_fifo_read(void *);
88 int puffs_vnop_fifo_write(void *);
89
90 int puffs_vnop_checkop(void *);
91
92
93 #if 0
94 #define puffs_lock genfs_lock
95 #define puffs_unlock genfs_unlock
96 #define puffs_islocked genfs_islocked
97 #else
98 int puffs_vnop_lock(void *);
99 int puffs_vnop_unlock(void *);
100 int puffs_vnop_islocked(void *);
101 #endif
102
103 int (**puffs_vnodeop_p)(void *);
104 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
105 { &vop_default_desc, vn_default_error },
106 { &vop_lookup_desc, puffs_vnop_lookup }, /* REAL lookup */
107 { &vop_create_desc, puffs_vnop_checkop }, /* create */
108 { &vop_mknod_desc, puffs_vnop_checkop }, /* mknod */
109 { &vop_open_desc, puffs_vnop_open }, /* REAL open */
110 { &vop_close_desc, puffs_vnop_checkop }, /* close */
111 { &vop_access_desc, puffs_vnop_access }, /* REAL access */
112 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
113 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
114 { &vop_read_desc, puffs_vnop_checkop }, /* read */
115 { &vop_write_desc, puffs_vnop_checkop }, /* write */
116 { &vop_fsync_desc, puffs_vnop_fsync }, /* REAL fsync */
117 { &vop_seek_desc, puffs_vnop_checkop }, /* seek */
118 { &vop_remove_desc, puffs_vnop_checkop }, /* remove */
119 { &vop_link_desc, puffs_vnop_checkop }, /* link */
120 { &vop_rename_desc, puffs_vnop_checkop }, /* rename */
121 { &vop_mkdir_desc, puffs_vnop_checkop }, /* mkdir */
122 { &vop_rmdir_desc, puffs_vnop_checkop }, /* rmdir */
123 { &vop_symlink_desc, puffs_vnop_checkop }, /* symlink */
124 { &vop_readdir_desc, puffs_vnop_checkop }, /* readdir */
125 { &vop_readlink_desc, puffs_vnop_checkop }, /* readlink */
126 { &vop_getpages_desc, puffs_vnop_checkop }, /* getpages */
127 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
128 { &vop_pathconf_desc, puffs_vnop_checkop }, /* pathconf */
129 { &vop_advlock_desc, puffs_vnop_checkop }, /* advlock */
130 { &vop_strategy_desc, puffs_vnop_strategy }, /* REAL strategy */
131 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
132 { &vop_abortop_desc, genfs_abortop }, /* REAL abortop */
133 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
134 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
135 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
136 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
137 { &vop_bmap_desc, puffs_vnop_bmap }, /* REAL bmap */
138 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
139 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
140 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
141 { &vop_mmap_desc, puffs_vnop_mmap }, /* REAL mmap */
142 { &vop_poll_desc, puffs_vnop_poll }, /* REAL poll */
143
144 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
145 { NULL, NULL }
146 };
147 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
148 { &puffs_vnodeop_p, puffs_vnodeop_entries };
149
150
151 int (**puffs_specop_p)(void *);
152 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
153 { &vop_default_desc, vn_default_error },
154 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
155 { &vop_create_desc, spec_create }, /* genfs_badop */
156 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
157 { &vop_open_desc, spec_open }, /* spec_open */
158 { &vop_close_desc, spec_close }, /* spec_close */
159 { &vop_access_desc, puffs_vnop_checkop }, /* access */
160 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
161 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
162 { &vop_read_desc, puffs_vnop_spec_read }, /* update, read */
163 { &vop_write_desc, puffs_vnop_spec_write }, /* update, write */
164 { &vop_lease_desc, spec_lease_check }, /* genfs_nullop */
165 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
166 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
167 { &vop_poll_desc, spec_poll }, /* spec_poll */
168 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
169 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
170 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
171 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
172 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
173 { &vop_remove_desc, spec_remove }, /* genfs_badop */
174 { &vop_link_desc, spec_link }, /* genfs_badop */
175 { &vop_rename_desc, spec_rename }, /* genfs_badop */
176 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
177 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
178 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
179 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
180 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
181 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
182 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
183 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
184 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
185 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
186 { &vop_bmap_desc, spec_bmap }, /* dummy */
187 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
188 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
189 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
190 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
191 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
192 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
193 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
194 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
195 #if 0
196 { &vop_openextattr_desc, _openextattr }, /* openextattr */
197 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
198 { &vop_getextattr_desc, _getextattr }, /* getextattr */
199 { &vop_setextattr_desc, _setextattr }, /* setextattr */
200 { &vop_listextattr_desc, _listextattr }, /* listextattr */
201 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
202 #endif
203 { NULL, NULL }
204 };
205 const struct vnodeopv_desc puffs_specop_opv_desc =
206 { &puffs_specop_p, puffs_specop_entries };
207
208
209 int (**puffs_fifoop_p)(void *);
210 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
211 { &vop_default_desc, vn_default_error },
212 { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
213 { &vop_create_desc, fifo_create }, /* genfs_badop */
214 { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
215 { &vop_open_desc, fifo_open }, /* open */
216 { &vop_close_desc, fifo_close }, /* close */
217 { &vop_access_desc, puffs_vnop_checkop }, /* access */
218 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
219 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
220 { &vop_read_desc, puffs_vnop_fifo_read }, /* read, update */
221 { &vop_write_desc, puffs_vnop_fifo_write }, /* write, update */
222 { &vop_lease_desc, fifo_lease_check }, /* genfs_nullop */
223 { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
224 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
225 { &vop_poll_desc, fifo_poll }, /* poll */
226 { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
227 { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
228 { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
229 { &vop_fsync_desc, fifo_fsync }, /* genfs_nullop*/
230 { &vop_seek_desc, fifo_seek }, /* genfs_badop */
231 { &vop_remove_desc, fifo_remove }, /* genfs_badop */
232 { &vop_link_desc, fifo_link }, /* genfs_badop */
233 { &vop_rename_desc, fifo_rename }, /* genfs_badop */
234 { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
235 { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
236 { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
237 { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
238 { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
239 { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
240 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
241 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
242 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
243 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
244 { &vop_bmap_desc, fifo_bmap }, /* dummy */
245 { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
246 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
247 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
248 { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
249 { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
250 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
251 { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
252 #if 0
253 { &vop_openextattr_desc, _openextattr }, /* openextattr */
254 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
255 { &vop_getextattr_desc, _getextattr }, /* getextattr */
256 { &vop_setextattr_desc, _setextattr }, /* setextattr */
257 { &vop_listextattr_desc, _listextattr }, /* listextattr */
258 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
259 #endif
260 { NULL, NULL }
261 };
262 const struct vnodeopv_desc puffs_fifoop_opv_desc =
263 { &puffs_fifoop_p, puffs_fifoop_entries };
264
265
266 /* "real" vnode operations */
267 int (**puffs_msgop_p)(void *);
268 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
269 { &vop_default_desc, vn_default_error },
270 { &vop_create_desc, puffs_vnop_create }, /* create */
271 { &vop_mknod_desc, puffs_vnop_mknod }, /* mknod */
272 { &vop_open_desc, puffs_vnop_open }, /* open */
273 { &vop_close_desc, puffs_vnop_close }, /* close */
274 { &vop_access_desc, puffs_vnop_access }, /* access */
275 { &vop_getattr_desc, puffs_vnop_getattr }, /* getattr */
276 { &vop_setattr_desc, puffs_vnop_setattr }, /* setattr */
277 { &vop_read_desc, puffs_vnop_read }, /* read */
278 { &vop_write_desc, puffs_vnop_write }, /* write */
279 { &vop_seek_desc, puffs_vnop_seek }, /* seek */
280 { &vop_remove_desc, puffs_vnop_remove }, /* remove */
281 { &vop_link_desc, puffs_vnop_link }, /* link */
282 { &vop_rename_desc, puffs_vnop_rename }, /* rename */
283 { &vop_mkdir_desc, puffs_vnop_mkdir }, /* mkdir */
284 { &vop_rmdir_desc, puffs_vnop_rmdir }, /* rmdir */
285 { &vop_symlink_desc, puffs_vnop_symlink }, /* symlink */
286 { &vop_readdir_desc, puffs_vnop_readdir }, /* readdir */
287 { &vop_readlink_desc, puffs_vnop_readlink }, /* readlink */
288 { &vop_print_desc, puffs_vnop_print }, /* print */
289 { &vop_islocked_desc, puffs_vnop_islocked }, /* islocked */
290 { &vop_pathconf_desc, puffs_vnop_pathconf }, /* pathconf */
291 { &vop_advlock_desc, puffs_vnop_advlock }, /* advlock */
292 { &vop_getpages_desc, puffs_vnop_getpages }, /* getpages */
293 { NULL, NULL }
294 };
295 const struct vnodeopv_desc puffs_msgop_opv_desc =
296 { &puffs_msgop_p, puffs_msgop_entries };
297
298
299 #define ERROUT(err) \
300 do { \
301 error = err; \
302 goto out; \
303 } while (/*CONSTCOND*/0)
304
305 /*
306 * This is a generic vnode operation handler. It checks if the necessary
307 * operations for the called vnode operation are implemented by userspace
308 * and either returns a dummy return value or proceeds to call the real
309 * vnode operation from puffs_msgop_v.
310 *
311 * XXX: this should described elsewhere and autogenerated, the complexity
312 * of the vnode operations vectors and their interrelationships is also
313 * getting a bit out of hand. Another problem is that we need this same
314 * information in the fs server code, so keeping the two in sync manually
315 * is not a viable (long term) plan.
316 */
317
318 /* not supported, handle locking protocol */
319 #define CHECKOP_NOTSUPP(op) \
320 case VOP_##op##_DESCOFFSET: \
321 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
322 return genfs_eopnotsupp(v); \
323 break
324
325 /* always succeed, no locking */
326 #define CHECKOP_SUCCESS(op) \
327 case VOP_##op##_DESCOFFSET: \
328 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
329 return 0; \
330 break
331
332 int
333 puffs_vnop_checkop(void *v)
334 {
335 struct vop_generic_args /* {
336 struct vnodeop_desc *a_desc;
337 spooky mystery contents;
338 } */ *ap = v;
339 struct vnodeop_desc *desc = ap->a_desc;
340 struct puffs_mount *pmp;
341 struct vnode *vp;
342 int offset, rv;
343
344 offset = ap->a_desc->vdesc_vp_offsets[0];
345 #ifdef DIAGNOSTIC
346 if (offset == VDESC_NO_OFFSET)
347 panic("puffs_checkop: no vnode, why did you call me?");
348 #endif
349 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
350 pmp = MPTOPUFFSMP(vp->v_mount);
351
352 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
353 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
354
355 if (!ALLOPS(pmp)) {
356 switch (desc->vdesc_offset) {
357 CHECKOP_NOTSUPP(CREATE);
358 CHECKOP_NOTSUPP(MKNOD);
359 CHECKOP_NOTSUPP(GETATTR);
360 CHECKOP_NOTSUPP(SETATTR);
361 CHECKOP_NOTSUPP(READ);
362 CHECKOP_NOTSUPP(WRITE);
363 CHECKOP_NOTSUPP(FCNTL);
364 CHECKOP_NOTSUPP(IOCTL);
365 CHECKOP_NOTSUPP(REMOVE);
366 CHECKOP_NOTSUPP(LINK);
367 CHECKOP_NOTSUPP(RENAME);
368 CHECKOP_NOTSUPP(MKDIR);
369 CHECKOP_NOTSUPP(RMDIR);
370 CHECKOP_NOTSUPP(SYMLINK);
371 CHECKOP_NOTSUPP(READDIR);
372 CHECKOP_NOTSUPP(READLINK);
373 CHECKOP_NOTSUPP(PRINT);
374 CHECKOP_NOTSUPP(PATHCONF);
375 CHECKOP_NOTSUPP(ADVLOCK);
376
377 CHECKOP_SUCCESS(ACCESS);
378 CHECKOP_SUCCESS(CLOSE);
379 CHECKOP_SUCCESS(SEEK);
380
381 case VOP_GETPAGES_DESCOFFSET:
382 if (!EXISTSOP(pmp, READ))
383 return genfs_eopnotsupp(v);
384 break;
385
386 default:
387 panic("puffs_checkop: unhandled vnop %d",
388 desc->vdesc_offset);
389 }
390 }
391
392 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
393
394 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
395 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
396
397 return rv;
398 }
399
400 static int callremove(struct puffs_mount *, void *, void *,
401 struct componentname *);
402 static int callrmdir(struct puffs_mount *, void *, void *,
403 struct componentname *);
404 static void callinactive(struct puffs_mount *, void *, int);
405 static void callreclaim(struct puffs_mount *, void *);
406
407 #define PUFFS_ABORT_LOOKUP 1
408 #define PUFFS_ABORT_CREATE 2
409 #define PUFFS_ABORT_MKNOD 3
410 #define PUFFS_ABORT_MKDIR 4
411 #define PUFFS_ABORT_SYMLINK 5
412
413 /*
414 * Press the pani^Wabort button! Kernel resource allocation failed.
415 */
416 static void
417 puffs_abortbutton(struct puffs_mount *pmp, int what,
418 void *dcookie, void *cookie, struct componentname *cnp)
419 {
420
421 switch (what) {
422 case PUFFS_ABORT_CREATE:
423 case PUFFS_ABORT_MKNOD:
424 case PUFFS_ABORT_SYMLINK:
425 callremove(pmp, dcookie, cookie, cnp);
426 break;
427 case PUFFS_ABORT_MKDIR:
428 callrmdir(pmp, dcookie, cookie, cnp);
429 break;
430 }
431
432 callinactive(pmp, cookie, 0);
433 callreclaim(pmp, cookie);
434 }
435
436 /*
437 * Begin vnode operations.
438 *
439 * A word from the keymaster about locks: generally we don't want
440 * to use the vnode locks at all: it creates an ugly dependency between
441 * the userlandia file server and the kernel. But we'll play along with
442 * the kernel vnode locks for now. However, even currently we attempt
443 * to release locks as early as possible. This is possible for some
444 * operations which a) don't need a locked vnode after the userspace op
445 * and b) return with the vnode unlocked. Theoretically we could
446 * unlock-do op-lock for others and order the graph in userspace, but I
447 * don't want to think of the consequences for the time being.
448 */
449
450 int
451 puffs_vnop_lookup(void *v)
452 {
453 struct vop_lookup_args /* {
454 const struct vnodeop_desc *a_desc;
455 struct vnode *a_dvp;
456 struct vnode **a_vpp;
457 struct componentname *a_cnp;
458 } */ *ap = v;
459 PUFFS_MSG_VARS(vn, lookup);
460 struct puffs_mount *pmp;
461 struct componentname *cnp;
462 struct vnode *vp, *dvp;
463 struct puffs_node *dpn;
464 int isdot;
465 int error;
466
467 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
468 cnp = ap->a_cnp;
469 dvp = ap->a_dvp;
470 *ap->a_vpp = NULL;
471
472 /* r/o fs? we check create later to handle EEXIST */
473 if ((cnp->cn_flags & ISLASTCN)
474 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
475 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
476 return EROFS;
477
478 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
479
480 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
481 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
482
483 /*
484 * Check if someone fed it into the cache
485 */
486 if (PUFFS_USE_NAMECACHE(pmp)) {
487 error = cache_lookup(dvp, ap->a_vpp, cnp);
488
489 if (error >= 0)
490 return error;
491 }
492
493 if (isdot) {
494 vp = ap->a_dvp;
495 vref(vp);
496 *ap->a_vpp = vp;
497 return 0;
498 }
499
500 PUFFS_MSG_ALLOC(vn, lookup);
501 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
502 cnp, PUFFS_USE_FULLPNBUF(pmp));
503
504 if (cnp->cn_flags & ISDOTDOT)
505 VOP_UNLOCK(dvp, 0);
506
507 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
508 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
509 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
510 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
511
512 /*
513 * In case of error, there is no new vnode to play with, so be
514 * happy with the NULL value given to vpp in the beginning.
515 * Also, check if this really was an error or the target was not
516 * present. Either treat it as a non-error for CREATE/RENAME or
517 * enter the component into the negative name cache (if desired).
518 */
519 if (error) {
520 error = checkerr(pmp, error, __func__);
521 if (error == ENOENT) {
522 /* don't allow to create files on r/o fs */
523 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
524 && cnp->cn_nameiop == CREATE) {
525 error = EROFS;
526
527 /* adjust values if we are creating */
528 } else if ((cnp->cn_flags & ISLASTCN)
529 && (cnp->cn_nameiop == CREATE
530 || cnp->cn_nameiop == RENAME)) {
531 cnp->cn_flags |= SAVENAME;
532 error = EJUSTRETURN;
533
534 /* save negative cache entry */
535 } else {
536 if ((cnp->cn_flags & MAKEENTRY)
537 && PUFFS_USE_NAMECACHE(pmp))
538 cache_enter(dvp, NULL, cnp);
539 }
540 }
541 goto out;
542 }
543
544 /*
545 * Check that we don't get our parent node back, that would cause
546 * a pretty obvious deadlock.
547 */
548 dpn = dvp->v_data;
549 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
550 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
551 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
552 error = EPROTO;
553 goto out;
554 }
555
556 error = puffs_cookie2vnode(pmp, lookup_msg->pvnr_newnode, 1, 1, &vp);
557 if (error == PUFFS_NOSUCHCOOKIE) {
558 error = puffs_getvnode(dvp->v_mount,
559 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
560 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
561 if (error) {
562 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
563 lookup_msg->pvnr_newnode, ap->a_cnp);
564 goto out;
565 }
566 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
567 } else if (error) {
568 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
569 lookup_msg->pvnr_newnode, ap->a_cnp);
570 goto out;
571 }
572
573 *ap->a_vpp = vp;
574
575 if ((cnp->cn_flags & MAKEENTRY) != 0 && PUFFS_USE_NAMECACHE(pmp))
576 cache_enter(dvp, vp, cnp);
577
578 /* XXX */
579 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
580 cnp->cn_flags &= ~REQUIREDIR;
581 if (lookup_msg->pvnr_cn.pkcn_consume)
582 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
583 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
584
585 out:
586 if (cnp->cn_flags & ISDOTDOT)
587 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
588
589 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
590 PUFFS_MSG_RELEASE(lookup);
591 return error;
592 }
593
594 #define REFPN_AND_UNLOCKVP(a, b) \
595 do { \
596 mutex_enter(&b->pn_mtx); \
597 puffs_referencenode(b); \
598 mutex_exit(&b->pn_mtx); \
599 VOP_UNLOCK(a, 0); \
600 } while (/*CONSTCOND*/0)
601
602 #define REFPN(b) \
603 do { \
604 mutex_enter(&b->pn_mtx); \
605 puffs_referencenode(b); \
606 mutex_exit(&b->pn_mtx); \
607 } while (/*CONSTCOND*/0)
608
609 #define RELEPN_AND_VP(a, b) \
610 do { \
611 puffs_releasenode(b); \
612 vrele(a); \
613 } while (/*CONSTCOND*/0)
614
615 int
616 puffs_vnop_create(void *v)
617 {
618 struct vop_create_args /* {
619 const struct vnodeop_desc *a_desc;
620 struct vnode *a_dvp;
621 struct vnode **a_vpp;
622 struct componentname *a_cnp;
623 struct vattr *a_vap;
624 } */ *ap = v;
625 PUFFS_MSG_VARS(vn, create);
626 struct vnode *dvp = ap->a_dvp;
627 struct puffs_node *dpn = VPTOPP(dvp);
628 struct componentname *cnp = ap->a_cnp;
629 struct mount *mp = dvp->v_mount;
630 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
631 int error;
632
633 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
634 dvp, ap->a_cnp->cn_nameptr));
635
636 PUFFS_MSG_ALLOC(vn, create);
637 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
638 cnp, PUFFS_USE_FULLPNBUF(pmp));
639 create_msg->pvnr_va = *ap->a_vap;
640 puffs_msg_setinfo(park_create, PUFFSOP_VN,
641 PUFFS_VN_CREATE, VPTOPNC(dvp));
642
643 /*
644 * Do the dance:
645 * + insert into queue ("interlock")
646 * + unlock vnode
647 * + wait for response
648 */
649 puffs_msg_enqueue(pmp, park_create);
650 REFPN_AND_UNLOCKVP(dvp, dpn);
651 error = puffs_msg_wait2(pmp, park_create, dpn, NULL);
652
653 error = checkerr(pmp, error, __func__);
654 if (error)
655 goto out;
656
657 error = puffs_newnode(mp, dvp, ap->a_vpp,
658 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
659 if (error)
660 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
661 create_msg->pvnr_newnode, cnp);
662
663 out:
664 if (error || (cnp->cn_flags & SAVESTART) == 0)
665 PNBUF_PUT(cnp->cn_pnbuf);
666
667 RELEPN_AND_VP(dvp, dpn);
668 DPRINTF(("puffs_create: return %d\n", error));
669 PUFFS_MSG_RELEASE(create);
670 return error;
671 }
672
673 int
674 puffs_vnop_mknod(void *v)
675 {
676 struct vop_mknod_args /* {
677 const struct vnodeop_desc *a_desc;
678 struct vnode *a_dvp;
679 struct vnode **a_vpp;
680 struct componentname *a_cnp;
681 struct vattr *a_vap;
682 } */ *ap = v;
683 PUFFS_MSG_VARS(vn, mknod);
684 struct vnode *dvp = ap->a_dvp;
685 struct puffs_node *dpn = VPTOPP(dvp);
686 struct componentname *cnp = ap->a_cnp;
687 struct mount *mp = dvp->v_mount;
688 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
689 int error;
690
691 PUFFS_MSG_ALLOC(vn, mknod);
692 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
693 cnp, PUFFS_USE_FULLPNBUF(pmp));
694 mknod_msg->pvnr_va = *ap->a_vap;
695 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
696 PUFFS_VN_MKNOD, VPTOPNC(dvp));
697
698 puffs_msg_enqueue(pmp, park_mknod);
699 REFPN_AND_UNLOCKVP(dvp, dpn);
700 error = puffs_msg_wait2(pmp, park_mknod, dpn, NULL);
701
702 error = checkerr(pmp, error, __func__);
703 if (error)
704 goto out;
705
706 error = puffs_newnode(mp, dvp, ap->a_vpp,
707 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
708 ap->a_vap->va_rdev);
709 if (error)
710 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
711 mknod_msg->pvnr_newnode, cnp);
712
713 out:
714 PUFFS_MSG_RELEASE(mknod);
715 if (error || (cnp->cn_flags & SAVESTART) == 0)
716 PNBUF_PUT(cnp->cn_pnbuf);
717 RELEPN_AND_VP(dvp, dpn);
718 return error;
719 }
720
721 int
722 puffs_vnop_open(void *v)
723 {
724 struct vop_open_args /* {
725 const struct vnodeop_desc *a_desc;
726 struct vnode *a_vp;
727 int a_mode;
728 kauth_cred_t a_cred;
729 } */ *ap = v;
730 PUFFS_MSG_VARS(vn, open);
731 struct vnode *vp = ap->a_vp;
732 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
733 int mode = ap->a_mode;
734 int error;
735
736 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
737
738 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
739 ERROUT(EROFS);
740
741 if (!EXISTSOP(pmp, OPEN))
742 ERROUT(0);
743
744 PUFFS_MSG_ALLOC(vn, open);
745 open_msg->pvnr_mode = mode;
746 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
747 puffs_msg_setinfo(park_open, PUFFSOP_VN,
748 PUFFS_VN_OPEN, VPTOPNC(vp));
749
750 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
751 error = checkerr(pmp, error, __func__);
752
753 out:
754 DPRINTF(("puffs_open: returning %d\n", error));
755 PUFFS_MSG_RELEASE(open);
756 return error;
757 }
758
759 int
760 puffs_vnop_close(void *v)
761 {
762 struct vop_close_args /* {
763 const struct vnodeop_desc *a_desc;
764 struct vnode *a_vp;
765 int a_fflag;
766 kauth_cred_t a_cred;
767 } */ *ap = v;
768 PUFFS_MSG_VARS(vn, close);
769 struct vnode *vp = ap->a_vp;
770 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
771
772 PUFFS_MSG_ALLOC(vn, close);
773 puffs_msg_setfaf(park_close);
774 close_msg->pvnr_fflag = ap->a_fflag;
775 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
776 puffs_msg_setinfo(park_close, PUFFSOP_VN,
777 PUFFS_VN_CLOSE, VPTOPNC(vp));
778
779 puffs_msg_enqueue(pmp, park_close);
780 PUFFS_MSG_RELEASE(close);
781 return 0;
782 }
783
784 int
785 puffs_vnop_access(void *v)
786 {
787 struct vop_access_args /* {
788 const struct vnodeop_desc *a_desc;
789 struct vnode *a_vp;
790 int a_mode;
791 kauth_cred_t a_cred;
792 } */ *ap = v;
793 PUFFS_MSG_VARS(vn, access);
794 struct vnode *vp = ap->a_vp;
795 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
796 int mode = ap->a_mode;
797 int error;
798
799 if (mode & VWRITE) {
800 switch (vp->v_type) {
801 case VDIR:
802 case VLNK:
803 case VREG:
804 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
805 || !EXISTSOP(pmp, WRITE))
806 return EROFS;
807 break;
808 default:
809 break;
810 }
811 }
812
813 if (!EXISTSOP(pmp, ACCESS))
814 return 0;
815
816 PUFFS_MSG_ALLOC(vn, access);
817 access_msg->pvnr_mode = ap->a_mode;
818 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
819 puffs_msg_setinfo(park_access, PUFFSOP_VN,
820 PUFFS_VN_ACCESS, VPTOPNC(vp));
821
822 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
823 error = checkerr(pmp, error, __func__);
824 PUFFS_MSG_RELEASE(access);
825
826 return error;
827 }
828
829 int
830 puffs_vnop_getattr(void *v)
831 {
832 struct vop_getattr_args /* {
833 const struct vnodeop_desc *a_desc;
834 struct vnode *a_vp;
835 struct vattr *a_vap;
836 kauth_cred_t a_cred;
837 } */ *ap = v;
838 PUFFS_MSG_VARS(vn, getattr);
839 struct vnode *vp = ap->a_vp;
840 struct mount *mp = vp->v_mount;
841 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
842 struct vattr *vap, *rvap;
843 struct puffs_node *pn;
844 int error = 0;
845
846 vap = ap->a_vap;
847
848 PUFFS_MSG_ALLOC(vn, getattr);
849 vattr_null(&getattr_msg->pvnr_va);
850 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
851 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
852 PUFFS_VN_GETATTR, VPTOPNC(vp));
853
854 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
855 error = checkerr(pmp, error, __func__);
856 if (error)
857 goto out;
858
859 rvap = &getattr_msg->pvnr_va;
860 /*
861 * Don't listen to the file server regarding special device
862 * size info, the file server doesn't know anything about them.
863 */
864 if (vp->v_type == VBLK || vp->v_type == VCHR)
865 rvap->va_size = vp->v_size;
866
867 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
868 if (vp->v_type == VBLK)
869 rvap->va_blocksize = BLKDEV_IOSIZE;
870 else if (vp->v_type == VCHR)
871 rvap->va_blocksize = MAXBSIZE;
872
873 (void) memcpy(vap, rvap, sizeof(struct vattr));
874 vap->va_fsid = mp->mnt_stat.f_fsidx.__fsid_val[0];
875
876 pn = VPTOPP(vp);
877 if (pn->pn_stat & PNODE_METACACHE_ATIME)
878 vap->va_atime = pn->pn_mc_atime;
879 if (pn->pn_stat & PNODE_METACACHE_CTIME)
880 vap->va_ctime = pn->pn_mc_ctime;
881 if (pn->pn_stat & PNODE_METACACHE_MTIME)
882 vap->va_mtime = pn->pn_mc_mtime;
883 if (pn->pn_stat & PNODE_METACACHE_SIZE) {
884 vap->va_size = pn->pn_mc_size;
885 } else {
886 if (rvap->va_size != VNOVAL
887 && vp->v_type != VBLK && vp->v_type != VCHR) {
888 uvm_vnp_setsize(vp, rvap->va_size);
889 pn->pn_serversize = rvap->va_size;
890 }
891 }
892
893 out:
894 PUFFS_MSG_RELEASE(getattr);
895 return error;
896 }
897
898 static int
899 dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred, int chsize)
900 {
901 PUFFS_MSG_VARS(vn, setattr);
902 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
903 struct puffs_node *pn = vp->v_data;
904 int error;
905
906 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
907 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
908 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
909 || vap->va_mode != (mode_t)VNOVAL))
910 return EROFS;
911
912 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
913 && vp->v_type == VREG && vap->va_size != VNOVAL)
914 return EROFS;
915
916 /*
917 * Flush metacache first. If we are called with some explicit
918 * parameters, treat them as information overriding metacache
919 * information.
920 */
921 if (pn->pn_stat & PNODE_METACACHE_MASK) {
922 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
923 && vap->va_atime.tv_sec == VNOVAL)
924 vap->va_atime = pn->pn_mc_atime;
925 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
926 && vap->va_ctime.tv_sec == VNOVAL)
927 vap->va_ctime = pn->pn_mc_ctime;
928 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
929 && vap->va_mtime.tv_sec == VNOVAL)
930 vap->va_mtime = pn->pn_mc_mtime;
931 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
932 && vap->va_size == VNOVAL)
933 vap->va_size = pn->pn_mc_size;
934
935 pn->pn_stat &= ~PNODE_METACACHE_MASK;
936 }
937
938 PUFFS_MSG_ALLOC(vn, setattr);
939 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
940 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
941 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
942 PUFFS_VN_SETATTR, VPTOPNC(vp));
943
944 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setattr, vp->v_data, NULL, error);
945 PUFFS_MSG_RELEASE(setattr);
946 error = checkerr(pmp, error, __func__);
947 if (error)
948 return error;
949
950 if (vap->va_size != VNOVAL) {
951 pn->pn_serversize = vap->va_size;
952 if (chsize)
953 uvm_vnp_setsize(vp, vap->va_size);
954 }
955
956 return 0;
957 }
958
959 int
960 puffs_vnop_setattr(void *v)
961 {
962 struct vop_getattr_args /* {
963 const struct vnodeop_desc *a_desc;
964 struct vnode *a_vp;
965 struct vattr *a_vap;
966 kauth_cred_t a_cred;
967 } */ *ap = v;
968
969 return dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, 1);
970 }
971
972 static __inline int
973 doinact(struct puffs_mount *pmp, int iaflag)
974 {
975
976 if (EXISTSOP(pmp, INACTIVE))
977 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
978 if (iaflag || ALLOPS(pmp))
979 return 1;
980 else
981 return 0;
982 else
983 return 1;
984 else
985 return 0;
986 }
987
988 static void
989 callinactive(struct puffs_mount *pmp, void *cookie, int iaflag)
990 {
991 int error;
992 PUFFS_MSG_VARS(vn, inactive);
993
994 if (doinact(pmp, iaflag)) {
995 PUFFS_MSG_ALLOC(vn, inactive);
996 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
997 PUFFS_VN_INACTIVE, cookie);
998
999 PUFFS_MSG_ENQUEUEWAIT(pmp, park_inactive, error);
1000 PUFFS_MSG_RELEASE(inactive);
1001 }
1002 }
1003
1004 /* XXX: callinactive can't setback */
1005 int
1006 puffs_vnop_inactive(void *v)
1007 {
1008 struct vop_inactive_args /* {
1009 const struct vnodeop_desc *a_desc;
1010 struct vnode *a_vp;
1011 } */ *ap = v;
1012 PUFFS_MSG_VARS(vn, inactive);
1013 struct vnode *vp = ap->a_vp;
1014 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1015 struct puffs_node *pnode;
1016 int error;
1017
1018 pnode = vp->v_data;
1019
1020 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1021 PUFFS_MSG_ALLOC(vn, inactive);
1022 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1023 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1024
1025 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_inactive, vp->v_data,
1026 NULL, error);
1027 PUFFS_MSG_RELEASE(inactive);
1028 }
1029 pnode->pn_stat &= ~PNODE_DOINACT;
1030
1031 VOP_UNLOCK(vp, 0);
1032
1033 /*
1034 * file server thinks it's gone? then don't be afraid care,
1035 * node's life was already all it would ever be
1036 */
1037 if (pnode->pn_stat & PNODE_NOREFS) {
1038 pnode->pn_stat |= PNODE_DYING;
1039 vrecycle(vp, NULL, curlwp);
1040 }
1041
1042 return 0;
1043 }
1044
1045 static void
1046 callreclaim(struct puffs_mount *pmp, void *cookie)
1047 {
1048 PUFFS_MSG_VARS(vn, reclaim);
1049
1050 if (!EXISTSOP(pmp, RECLAIM))
1051 return;
1052
1053 PUFFS_MSG_ALLOC(vn, reclaim);
1054 puffs_msg_setfaf(park_reclaim);
1055 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, cookie);
1056
1057 puffs_msg_enqueue(pmp, park_reclaim);
1058 PUFFS_MSG_RELEASE(reclaim);
1059 }
1060
1061 /*
1062 * always FAF, we don't really care if the server wants to fail to
1063 * reclaim the node or not
1064 */
1065 int
1066 puffs_vnop_reclaim(void *v)
1067 {
1068 struct vop_reclaim_args /* {
1069 const struct vnodeop_desc *a_desc;
1070 struct vnode *a_vp;
1071 } */ *ap = v;
1072 struct vnode *vp = ap->a_vp;
1073 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1074
1075 /*
1076 * first things first: check if someone is trying to reclaim the
1077 * root vnode. do not allow that to travel to userspace.
1078 * Note that we don't need to take the lock similarly to
1079 * puffs_root(), since there is only one of us.
1080 */
1081 if (vp->v_vflag & VV_ROOT) {
1082 mutex_enter(&pmp->pmp_lock);
1083 KASSERT(pmp->pmp_root != NULL);
1084 pmp->pmp_root = NULL;
1085 mutex_exit(&pmp->pmp_lock);
1086 goto out;
1087 }
1088
1089 callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp));
1090
1091 out:
1092 if (PUFFS_USE_NAMECACHE(pmp))
1093 cache_purge(vp);
1094 puffs_putvnode(vp);
1095
1096 return 0;
1097 }
1098
1099 #define CSIZE sizeof(**ap->a_cookies)
1100 int
1101 puffs_vnop_readdir(void *v)
1102 {
1103 struct vop_readdir_args /* {
1104 const struct vnodeop_desc *a_desc;
1105 struct vnode *a_vp;
1106 struct uio *a_uio;
1107 kauth_cred_t a_cred;
1108 int *a_eofflag;
1109 off_t **a_cookies;
1110 int *a_ncookies;
1111 } */ *ap = v;
1112 PUFFS_MSG_VARS(vn, readdir);
1113 struct vnode *vp = ap->a_vp;
1114 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1115 size_t argsize, tomove, cookiemem, cookiesmax;
1116 struct uio *uio = ap->a_uio;
1117 size_t howmuch, resid;
1118 int error;
1119
1120 /*
1121 * ok, so we need: resid + cookiemem = maxreq
1122 * => resid + cookiesize * (resid/minsize) = maxreq
1123 * => resid + cookiesize/minsize * resid = maxreq
1124 * => (cookiesize/minsize + 1) * resid = maxreq
1125 * => resid = maxreq / (cookiesize/minsize + 1)
1126 *
1127 * Since cookiesize <= minsize and we're not very big on floats,
1128 * we approximate that to be 1. Therefore:
1129 *
1130 * resid = maxreq / 2;
1131 *
1132 * Well, at least we didn't have to use differential equations
1133 * or the Gram-Schmidt process.
1134 *
1135 * (yes, I'm very afraid of this)
1136 */
1137 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1138
1139 if (ap->a_cookies) {
1140 KASSERT(ap->a_ncookies != NULL);
1141 if (pmp->pmp_args.pa_fhsize == 0)
1142 return EOPNOTSUPP;
1143 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1144 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1145 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1146 } else {
1147 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1148 cookiesmax = 0;
1149 cookiemem = 0;
1150 }
1151
1152 argsize = sizeof(struct puffs_vnmsg_readdir);
1153 tomove = resid + cookiemem;
1154 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1155 (void **)&readdir_msg, 1);
1156
1157 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1158 readdir_msg->pvnr_offset = uio->uio_offset;
1159 readdir_msg->pvnr_resid = resid;
1160 readdir_msg->pvnr_ncookies = cookiesmax;
1161 readdir_msg->pvnr_eofflag = 0;
1162 readdir_msg->pvnr_dentoff = cookiemem;
1163 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1164 PUFFS_VN_READDIR, VPTOPNC(vp));
1165 puffs_msg_setdelta(park_readdir, tomove);
1166
1167 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1168 error = checkerr(pmp, error, __func__);
1169 if (error)
1170 goto out;
1171
1172 /* userspace is cheating? */
1173 if (readdir_msg->pvnr_resid > resid) {
1174 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1175 "resid grew", VPTOPNC(vp));
1176 ERROUT(EPROTO);
1177 }
1178 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1179 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1180 "too many cookies", VPTOPNC(vp));
1181 ERROUT(EPROTO);
1182 }
1183
1184 /* check eof */
1185 if (readdir_msg->pvnr_eofflag)
1186 *ap->a_eofflag = 1;
1187
1188 /* bouncy-wouncy with the directory data */
1189 howmuch = resid - readdir_msg->pvnr_resid;
1190
1191 /* force eof if no data was returned (getcwd() needs this) */
1192 if (howmuch == 0) {
1193 *ap->a_eofflag = 1;
1194 goto out;
1195 }
1196
1197 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1198 if (error)
1199 goto out;
1200
1201 /* provide cookies to caller if so desired */
1202 if (ap->a_cookies) {
1203 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1204 M_TEMP, M_WAITOK);
1205 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1206 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1207 *ap->a_ncookies*CSIZE);
1208 }
1209
1210 /* next readdir starts here */
1211 uio->uio_offset = readdir_msg->pvnr_offset;
1212
1213 out:
1214 puffs_msgmem_release(park_readdir);
1215 return error;
1216 }
1217 #undef CSIZE
1218
1219 /*
1220 * poll works by consuming the bitmask in pn_revents. If there are
1221 * events available, poll returns immediately. If not, it issues a
1222 * poll to userspace, selrecords itself and returns with no available
1223 * events. When the file server returns, it executes puffs_parkdone_poll(),
1224 * where available events are added to the bitmask. selnotify() is
1225 * then also executed by that function causing us to enter here again
1226 * and hopefully find the missing bits (unless someone got them first,
1227 * in which case it starts all over again).
1228 */
1229 int
1230 puffs_vnop_poll(void *v)
1231 {
1232 struct vop_poll_args /* {
1233 const struct vnodeop_desc *a_desc;
1234 struct vnode *a_vp;
1235 int a_events;
1236 }*/ *ap = v;
1237 PUFFS_MSG_VARS(vn, poll);
1238 struct vnode *vp = ap->a_vp;
1239 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1240 struct puffs_node *pn = vp->v_data;
1241 int events, error;
1242
1243 if (EXISTSOP(pmp, POLL)) {
1244 mutex_enter(&pn->pn_mtx);
1245 events = pn->pn_revents & ap->a_events;
1246 if (events & ap->a_events) {
1247 pn->pn_revents &= ~ap->a_events;
1248 mutex_exit(&pn->pn_mtx);
1249
1250 return events;
1251 } else {
1252 puffs_referencenode(pn);
1253 mutex_exit(&pn->pn_mtx);
1254
1255 PUFFS_MSG_ALLOC(vn, poll);
1256 poll_msg->pvnr_events = ap->a_events;
1257 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1258 PUFFS_VN_POLL, VPTOPNC(vp));
1259 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1260 selrecord(curlwp, &pn->pn_sel);
1261
1262 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_poll, vp->v_data,
1263 NULL, error);
1264 PUFFS_MSG_RELEASE(poll);
1265
1266 return 0;
1267 }
1268 } else {
1269 return genfs_poll(v);
1270 }
1271 }
1272
1273 int
1274 puffs_vnop_fsync(void *v)
1275 {
1276 struct vop_fsync_args /* {
1277 const struct vnodeop_desc *a_desc;
1278 struct vnode *a_vp;
1279 kauth_cred_t a_cred;
1280 int a_flags;
1281 off_t a_offlo;
1282 off_t a_offhi;
1283 } */ *ap = v;
1284 PUFFS_MSG_VARS(vn, fsync);
1285 struct vnode *vp = ap->a_vp;
1286 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1287 struct puffs_node *pn;
1288 struct vattr va;
1289 int pflags, error, dofaf;
1290
1291 pn = VPTOPP(vp);
1292
1293 /* flush out information from our metacache, see vop_setattr */
1294 if (pn->pn_stat & PNODE_METACACHE_MASK
1295 && (pn->pn_stat & PNODE_DYING) == 0) {
1296 vattr_null(&va);
1297 error = VOP_SETATTR(vp, &va, FSCRED);
1298 if (error)
1299 return error;
1300 }
1301
1302 /*
1303 * flush pages to avoid being overly dirty
1304 */
1305 pflags = PGO_CLEANIT;
1306 if (ap->a_flags & FSYNC_WAIT)
1307 pflags |= PGO_SYNCIO;
1308 simple_lock(&vp->v_interlock);
1309 error = VOP_PUTPAGES(vp, trunc_page(ap->a_offlo),
1310 round_page(ap->a_offhi), pflags);
1311 if (error)
1312 return error;
1313
1314 /*
1315 * HELLO! We exit already here if the user server does not
1316 * support fsync OR if we should call fsync for a node which
1317 * has references neither in the kernel or the fs server.
1318 * Otherwise we continue to issue fsync() forward.
1319 */
1320 if (!EXISTSOP(pmp, FSYNC) || (pn->pn_stat & PNODE_DYING))
1321 return 0;
1322
1323 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1324 /*
1325 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1326 * only FAFs for those. Otherwise there's a danger of deadlock,
1327 * since the execution context here might be the user server
1328 * doing some operation on another fs, which in turn caused a
1329 * vnode to be reclaimed from the freelist for this fs.
1330 */
1331 if (dofaf == 0) {
1332 simple_lock(&vp->v_interlock);
1333 if (vp->v_iflag & VI_XLOCK)
1334 dofaf = 1;
1335 simple_unlock(&vp->v_interlock);
1336 }
1337
1338 PUFFS_MSG_ALLOC(vn, fsync);
1339 if (dofaf)
1340 puffs_msg_setfaf(park_fsync);
1341
1342 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1343 fsync_msg->pvnr_flags = ap->a_flags;
1344 fsync_msg->pvnr_offlo = ap->a_offlo;
1345 fsync_msg->pvnr_offhi = ap->a_offhi;
1346 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1347 PUFFS_VN_FSYNC, VPTOPNC(vp));
1348
1349 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1350 PUFFS_MSG_RELEASE(fsync);
1351
1352 error = checkerr(pmp, error, __func__);
1353
1354 return error;
1355 }
1356
1357 int
1358 puffs_vnop_seek(void *v)
1359 {
1360 struct vop_seek_args /* {
1361 const struct vnodeop_desc *a_desc;
1362 struct vnode *a_vp;
1363 off_t a_oldoff;
1364 off_t a_newoff;
1365 kauth_cred_t a_cred;
1366 } */ *ap = v;
1367 PUFFS_MSG_VARS(vn, seek);
1368 struct vnode *vp = ap->a_vp;
1369 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1370 int error;
1371
1372 PUFFS_MSG_ALLOC(vn, seek);
1373 seek_msg->pvnr_oldoff = ap->a_oldoff;
1374 seek_msg->pvnr_newoff = ap->a_newoff;
1375 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1376 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1377 PUFFS_VN_SEEK, VPTOPNC(vp));
1378
1379 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1380 PUFFS_MSG_RELEASE(seek);
1381 return checkerr(pmp, error, __func__);
1382 }
1383
1384 static int
1385 callremove(struct puffs_mount *pmp, void *dcookie, void *cookie,
1386 struct componentname *cnp)
1387 {
1388 PUFFS_MSG_VARS(vn, remove);
1389 int error;
1390
1391 PUFFS_MSG_ALLOC(vn, remove);
1392 remove_msg->pvnr_cookie_targ = cookie;
1393 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1394 cnp, PUFFS_USE_FULLPNBUF(pmp));
1395 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dcookie);
1396
1397 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1398 PUFFS_MSG_RELEASE(remove);
1399
1400 return checkerr(pmp, error, __func__);
1401 }
1402
1403 /*
1404 * XXX: can't use callremove now because can't catch setbacks with
1405 * it due to lack of a pnode argument.
1406 */
1407 int
1408 puffs_vnop_remove(void *v)
1409 {
1410 struct vop_remove_args /* {
1411 const struct vnodeop_desc *a_desc;
1412 struct vnode *a_dvp;
1413 struct vnode *a_vp;
1414 struct componentname *a_cnp;
1415 } */ *ap = v;
1416 PUFFS_MSG_VARS(vn, remove);
1417 struct vnode *dvp = ap->a_dvp;
1418 struct vnode *vp = ap->a_vp;
1419 struct puffs_node *dpn = VPTOPP(dvp);
1420 struct puffs_node *pn = VPTOPP(vp);
1421 struct componentname *cnp = ap->a_cnp;
1422 struct mount *mp = dvp->v_mount;
1423 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1424 int error;
1425
1426 PUFFS_MSG_ALLOC(vn, remove);
1427 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1428 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1429 cnp, PUFFS_USE_FULLPNBUF(pmp));
1430 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1431 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1432
1433 puffs_msg_enqueue(pmp, park_remove);
1434 REFPN_AND_UNLOCKVP(dvp, dpn);
1435 if (dvp == vp)
1436 REFPN(pn);
1437 else
1438 REFPN_AND_UNLOCKVP(vp, pn);
1439 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1440
1441 PUFFS_MSG_RELEASE(remove);
1442
1443 RELEPN_AND_VP(dvp, dpn);
1444 RELEPN_AND_VP(vp, pn);
1445
1446 error = checkerr(pmp, error, __func__);
1447 return error;
1448 }
1449
1450 int
1451 puffs_vnop_mkdir(void *v)
1452 {
1453 struct vop_mkdir_args /* {
1454 const struct vnodeop_desc *a_desc;
1455 struct vnode *a_dvp;
1456 struct vnode **a_vpp;
1457 struct componentname *a_cnp;
1458 struct vattr *a_vap;
1459 } */ *ap = v;
1460 PUFFS_MSG_VARS(vn, mkdir);
1461 struct vnode *dvp = ap->a_dvp;
1462 struct puffs_node *dpn = VPTOPP(dvp);
1463 struct componentname *cnp = ap->a_cnp;
1464 struct mount *mp = dvp->v_mount;
1465 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1466 int error;
1467
1468 PUFFS_MSG_ALLOC(vn, mkdir);
1469 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1470 cnp, PUFFS_USE_FULLPNBUF(pmp));
1471 mkdir_msg->pvnr_va = *ap->a_vap;
1472 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1473 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1474
1475 puffs_msg_enqueue(pmp, park_mkdir);
1476 REFPN_AND_UNLOCKVP(dvp, dpn);
1477 error = puffs_msg_wait2(pmp, park_mkdir, dpn, NULL);
1478
1479 error = checkerr(pmp, error, __func__);
1480 if (error)
1481 goto out;
1482
1483 error = puffs_newnode(mp, dvp, ap->a_vpp,
1484 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1485 if (error)
1486 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1487 mkdir_msg->pvnr_newnode, cnp);
1488
1489 out:
1490 PUFFS_MSG_RELEASE(mkdir);
1491 if (error || (cnp->cn_flags & SAVESTART) == 0)
1492 PNBUF_PUT(cnp->cn_pnbuf);
1493 RELEPN_AND_VP(dvp, dpn);
1494 return error;
1495 }
1496
1497 static int
1498 callrmdir(struct puffs_mount *pmp, void *dcookie, void *cookie,
1499 struct componentname *cnp)
1500 {
1501 PUFFS_MSG_VARS(vn, rmdir);
1502 int error;
1503
1504 PUFFS_MSG_ALLOC(vn, rmdir);
1505 rmdir_msg->pvnr_cookie_targ = cookie;
1506 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1507 cnp, PUFFS_USE_FULLPNBUF(pmp));
1508 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dcookie);
1509
1510 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1511 PUFFS_MSG_RELEASE(rmdir);
1512
1513 return checkerr(pmp, error, __func__);
1514 }
1515
1516 int
1517 puffs_vnop_rmdir(void *v)
1518 {
1519 struct vop_rmdir_args /* {
1520 const struct vnodeop_desc *a_desc;
1521 struct vnode *a_dvp;
1522 struct vnode *a_vp;
1523 struct componentname *a_cnp;
1524 } */ *ap = v;
1525 PUFFS_MSG_VARS(vn, rmdir);
1526 struct vnode *dvp = ap->a_dvp;
1527 struct vnode *vp = ap->a_vp;
1528 struct puffs_node *dpn = VPTOPP(dvp);
1529 struct puffs_node *pn = VPTOPP(vp);
1530 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1531 struct componentname *cnp = ap->a_cnp;
1532 int error;
1533
1534 PUFFS_MSG_ALLOC(vn, rmdir);
1535 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1536 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1537 cnp, PUFFS_USE_FULLPNBUF(pmp));
1538 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1539 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1540
1541 puffs_msg_enqueue(pmp, park_rmdir);
1542 REFPN_AND_UNLOCKVP(dvp, dpn);
1543 REFPN_AND_UNLOCKVP(vp, pn);
1544 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1545
1546 PUFFS_MSG_RELEASE(rmdir);
1547
1548 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1549 RELEPN_AND_VP(dvp, dpn);
1550 RELEPN_AND_VP(vp, pn);
1551
1552 return error;
1553 }
1554
1555 int
1556 puffs_vnop_link(void *v)
1557 {
1558 struct vop_link_args /* {
1559 const struct vnodeop_desc *a_desc;
1560 struct vnode *a_dvp;
1561 struct vnode *a_vp;
1562 struct componentname *a_cnp;
1563 }*/ *ap = v;
1564 PUFFS_MSG_VARS(vn, link);
1565 struct vnode *dvp = ap->a_dvp;
1566 struct vnode *vp = ap->a_vp;
1567 struct puffs_node *dpn = VPTOPP(dvp);
1568 struct puffs_node *pn = VPTOPP(vp);
1569 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1570 struct componentname *cnp = ap->a_cnp;
1571 int error;
1572
1573 PUFFS_MSG_ALLOC(vn, link);
1574 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
1575 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
1576 cnp, PUFFS_USE_FULLPNBUF(pmp));
1577 puffs_msg_setinfo(park_link, PUFFSOP_VN,
1578 PUFFS_VN_LINK, VPTOPNC(dvp));
1579
1580 puffs_msg_enqueue(pmp, park_link);
1581 REFPN_AND_UNLOCKVP(dvp, dpn);
1582 REFPN(pn);
1583 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
1584
1585 PUFFS_MSG_RELEASE(link);
1586
1587 error = checkerr(pmp, error, __func__);
1588
1589 /*
1590 * XXX: stay in touch with the cache. I don't like this, but
1591 * don't have a better solution either. See also puffs_rename().
1592 */
1593 if (error == 0)
1594 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
1595
1596 PNBUF_PUT(cnp->cn_pnbuf);
1597 RELEPN_AND_VP(dvp, dpn);
1598 puffs_releasenode(pn);
1599
1600 return error;
1601 }
1602
1603 int
1604 puffs_vnop_symlink(void *v)
1605 {
1606 struct vop_symlink_args /* {
1607 const struct vnodeop_desc *a_desc;
1608 struct vnode *a_dvp;
1609 struct vnode **a_vpp;
1610 struct componentname *a_cnp;
1611 struct vattr *a_vap;
1612 char *a_target;
1613 }*/ *ap = v;
1614 PUFFS_MSG_VARS(vn, symlink);
1615 struct vnode *dvp = ap->a_dvp;
1616 struct puffs_node *dpn = VPTOPP(dvp);
1617 struct mount *mp = dvp->v_mount;
1618 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1619 struct componentname *cnp = ap->a_cnp;
1620 int error;
1621
1622 *ap->a_vpp = NULL;
1623
1624 PUFFS_MSG_ALLOC(vn, symlink);
1625 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
1626 cnp, PUFFS_USE_FULLPNBUF(pmp));
1627 symlink_msg->pvnr_va = *ap->a_vap;
1628 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
1629 sizeof(symlink_msg->pvnr_link));
1630 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
1631 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
1632
1633 puffs_msg_enqueue(pmp, park_symlink);
1634 REFPN_AND_UNLOCKVP(dvp, dpn);
1635 error = puffs_msg_wait2(pmp, park_symlink, dpn, NULL);
1636
1637 error = checkerr(pmp, error, __func__);
1638 if (error)
1639 goto out;
1640
1641 error = puffs_newnode(mp, dvp, ap->a_vpp,
1642 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
1643 if (error)
1644 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
1645 symlink_msg->pvnr_newnode, cnp);
1646
1647 out:
1648 PUFFS_MSG_RELEASE(symlink);
1649 if (error || (cnp->cn_flags & SAVESTART) == 0)
1650 PNBUF_PUT(cnp->cn_pnbuf);
1651 RELEPN_AND_VP(dvp, dpn);
1652
1653 return error;
1654 }
1655
1656 int
1657 puffs_vnop_readlink(void *v)
1658 {
1659 struct vop_readlink_args /* {
1660 const struct vnodeop_desc *a_desc;
1661 struct vnode *a_vp;
1662 struct uio *a_uio;
1663 kauth_cred_t a_cred;
1664 } */ *ap = v;
1665 PUFFS_MSG_VARS(vn, readlink);
1666 struct vnode *vp = ap->a_vp;
1667 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1668 size_t linklen;
1669 int error;
1670
1671 PUFFS_MSG_ALLOC(vn, readlink);
1672 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
1673 linklen = sizeof(readlink_msg->pvnr_link);
1674 readlink_msg->pvnr_linklen = linklen;
1675 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
1676 PUFFS_VN_READLINK, VPTOPNC(vp));
1677
1678 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
1679 error = checkerr(pmp, error, __func__);
1680 if (error)
1681 goto out;
1682
1683 /* bad bad user file server */
1684 if (readlink_msg->pvnr_linklen > linklen) {
1685 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
1686 "linklen too big", VPTOPNC(ap->a_vp));
1687 error = EPROTO;
1688 goto out;
1689 }
1690
1691 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
1692 ap->a_uio);
1693 out:
1694 PUFFS_MSG_RELEASE(readlink);
1695 return error;
1696 }
1697
1698 int
1699 puffs_vnop_rename(void *v)
1700 {
1701 struct vop_rename_args /* {
1702 const struct vnodeop_desc *a_desc;
1703 struct vnode *a_fdvp;
1704 struct vnode *a_fvp;
1705 struct componentname *a_fcnp;
1706 struct vnode *a_tdvp;
1707 struct vnode *a_tvp;
1708 struct componentname *a_tcnp;
1709 }*/ *ap = v;
1710 PUFFS_MSG_VARS(vn, rename);
1711 struct vnode *fdvp = ap->a_fdvp;
1712 struct puffs_node *fpn = ap->a_fvp->v_data;
1713 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
1714 int error;
1715
1716 if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount)
1717 ERROUT(EXDEV);
1718
1719 PUFFS_MSG_ALLOC(vn, rename);
1720 rename_msg->pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1721 rename_msg->pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1722 if (ap->a_tvp)
1723 rename_msg->pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1724 else
1725 rename_msg->pvnr_cookie_targ = NULL;
1726 puffs_makecn(&rename_msg->pvnr_cn_src, &rename_msg->pvnr_cn_src_cred,
1727 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
1728 puffs_makecn(&rename_msg->pvnr_cn_targ, &rename_msg->pvnr_cn_targ_cred,
1729 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
1730 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
1731 PUFFS_VN_RENAME, VPTOPNC(fdvp));
1732
1733 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
1734 error = checkerr(pmp, error, __func__);
1735
1736 /*
1737 * XXX: stay in touch with the cache. I don't like this, but
1738 * don't have a better solution either. See also puffs_link().
1739 */
1740 if (error == 0)
1741 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
1742
1743 out:
1744 PUFFS_MSG_RELEASE(rename);
1745 if (ap->a_tvp != NULL)
1746 vput(ap->a_tvp);
1747 if (ap->a_tdvp == ap->a_tvp)
1748 vrele(ap->a_tdvp);
1749 else
1750 vput(ap->a_tdvp);
1751
1752 vrele(ap->a_fdvp);
1753 vrele(ap->a_fvp);
1754
1755 return error;
1756 }
1757
1758 #define RWARGS(cont, iofl, move, offset, creds) \
1759 (cont)->pvnr_ioflag = (iofl); \
1760 (cont)->pvnr_resid = (move); \
1761 (cont)->pvnr_offset = (offset); \
1762 puffs_credcvt(&(cont)->pvnr_cred, creds)
1763
1764 int
1765 puffs_vnop_read(void *v)
1766 {
1767 struct vop_read_args /* {
1768 const struct vnodeop_desc *a_desc;
1769 struct vnode *a_vp;
1770 struct uio *a_uio;
1771 int a_ioflag;
1772 kauth_cred_t a_cred;
1773 } */ *ap = v;
1774 PUFFS_MSG_VARS(vn, read);
1775 struct vnode *vp = ap->a_vp;
1776 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1777 struct uio *uio = ap->a_uio;
1778 void *win;
1779 size_t tomove, argsize;
1780 vsize_t bytelen;
1781 int error, ubcflags;
1782
1783 read_msg = NULL;
1784 error = 0;
1785
1786 /* std sanity */
1787 if (uio->uio_resid == 0)
1788 return 0;
1789 if (uio->uio_offset < 0)
1790 return EINVAL;
1791
1792 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1793 const int advice = IO_ADV_DECODE(ap->a_ioflag);
1794
1795 ubcflags = 0;
1796 if (UBC_WANT_UNMAP(vp))
1797 ubcflags = UBC_UNMAP;
1798
1799 while (uio->uio_resid > 0) {
1800 bytelen = MIN(uio->uio_resid,
1801 vp->v_size - uio->uio_offset);
1802 if (bytelen == 0)
1803 break;
1804
1805 win = ubc_alloc(&vp->v_uobj, uio->uio_offset,
1806 &bytelen, advice, UBC_READ);
1807 error = uiomove(win, bytelen, uio);
1808 ubc_release(win, ubcflags);
1809 if (error)
1810 break;
1811 }
1812
1813 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
1814 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
1815 } else {
1816 /*
1817 * in case it's not a regular file or we're operating
1818 * uncached, do read in the old-fashioned style,
1819 * i.e. explicit read operations
1820 */
1821
1822 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1823 argsize = sizeof(struct puffs_vnmsg_read);
1824 puffs_msgmem_alloc(argsize + tomove, &park_read,
1825 (void **)&read_msg, 1);
1826
1827 error = 0;
1828 while (uio->uio_resid > 0) {
1829 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1830 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
1831 RWARGS(read_msg, ap->a_ioflag, tomove,
1832 uio->uio_offset, ap->a_cred);
1833 puffs_msg_setinfo(park_read, PUFFSOP_VN,
1834 PUFFS_VN_READ, VPTOPNC(vp));
1835 puffs_msg_setdelta(park_read, tomove);
1836
1837 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
1838 NULL, error);
1839 error = checkerr(pmp, error, __func__);
1840 if (error)
1841 break;
1842
1843 if (read_msg->pvnr_resid > tomove) {
1844 puffs_senderr(pmp, PUFFS_ERR_READ,
1845 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1846 error = EPROTO;
1847 break;
1848 }
1849
1850 error = uiomove(read_msg->pvnr_data,
1851 tomove - read_msg->pvnr_resid, uio);
1852
1853 /*
1854 * in case the file is out of juice, resid from
1855 * userspace is != 0. and the error-case is
1856 * quite obvious
1857 */
1858 if (error || read_msg->pvnr_resid)
1859 break;
1860 }
1861
1862 puffs_msgmem_release(park_read);
1863 }
1864
1865 return error;
1866 }
1867
1868 /*
1869 * XXX: in case of a failure, this leaves uio in a bad state.
1870 * We could theoretically copy the uio and iovecs and "replay"
1871 * them the right amount after the userspace trip, but don't
1872 * bother for now.
1873 */
1874 int
1875 puffs_vnop_write(void *v)
1876 {
1877 struct vop_write_args /* {
1878 const struct vnodeop_desc *a_desc;
1879 struct vnode *a_vp;
1880 struct uio *a_uio;
1881 int a_ioflag;
1882 kauth_cred_t a_cred;
1883 } */ *ap = v;
1884 PUFFS_MSG_VARS(vn, write);
1885 struct vnode *vp = ap->a_vp;
1886 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1887 struct uio *uio = ap->a_uio;
1888 size_t tomove, argsize;
1889 off_t oldoff, newoff, origoff;
1890 vsize_t bytelen;
1891 int error, uflags;
1892 int ubcflags;
1893
1894 error = uflags = 0;
1895 write_msg = NULL;
1896
1897 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1898 ubcflags = UBC_WRITE | UBC_PARTIALOK;
1899 if (UBC_WANT_UNMAP(vp))
1900 ubcflags |= UBC_UNMAP;
1901
1902 /*
1903 * userspace *should* be allowed to control this,
1904 * but with UBC it's a bit unclear how to handle it
1905 */
1906 if (ap->a_ioflag & IO_APPEND)
1907 uio->uio_offset = vp->v_size;
1908
1909 origoff = uio->uio_offset;
1910 while (uio->uio_resid > 0) {
1911 uflags |= PUFFS_UPDATECTIME;
1912 uflags |= PUFFS_UPDATEMTIME;
1913 oldoff = uio->uio_offset;
1914 bytelen = uio->uio_resid;
1915
1916 newoff = oldoff + bytelen;
1917 if (vp->v_size < newoff) {
1918 uvm_vnp_setwritesize(vp, newoff);
1919 }
1920 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
1921 UVM_ADV_RANDOM, ubcflags);
1922
1923 /*
1924 * In case of a ubc_uiomove() error,
1925 * opt to not extend the file at all and
1926 * return an error. Otherwise, if we attempt
1927 * to clear the memory we couldn't fault to,
1928 * we might generate a kernel page fault.
1929 */
1930 if (vp->v_size < newoff) {
1931 if (error == 0) {
1932 uflags |= PUFFS_UPDATESIZE;
1933 uvm_vnp_setsize(vp, newoff);
1934 } else {
1935 uvm_vnp_setwritesize(vp, vp->v_size);
1936 }
1937 }
1938 if (error)
1939 break;
1940
1941 /*
1942 * If we're writing large files, flush to file server
1943 * every 64k. Otherwise we can very easily exhaust
1944 * kernel and user memory, as the file server cannot
1945 * really keep up with our writing speed.
1946 *
1947 * Note: this does *NOT* honor MNT_ASYNC, because
1948 * that gives userland too much say in the kernel.
1949 */
1950 if (oldoff >> 16 != uio->uio_offset >> 16) {
1951 simple_lock(&vp->v_interlock);
1952 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
1953 uio->uio_offset & ~0xffff,
1954 PGO_CLEANIT | PGO_SYNCIO);
1955 if (error)
1956 break;
1957 }
1958 }
1959
1960 /* synchronous I/O? */
1961 if (error == 0 && ap->a_ioflag & IO_SYNC) {
1962 simple_lock(&vp->v_interlock);
1963 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1964 round_page(uio->uio_offset),
1965 PGO_CLEANIT | PGO_SYNCIO);
1966
1967 /* write through page cache? */
1968 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
1969 simple_lock(&vp->v_interlock);
1970 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1971 round_page(uio->uio_offset), PGO_CLEANIT);
1972 }
1973
1974 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
1975 } else {
1976 /* tomove is non-increasing */
1977 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1978 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
1979 puffs_msgmem_alloc(argsize, &park_write, (void **)&write_msg,1);
1980
1981 while (uio->uio_resid > 0) {
1982 /* move data to buffer */
1983 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1984 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
1985 RWARGS(write_msg, ap->a_ioflag, tomove,
1986 uio->uio_offset, ap->a_cred);
1987 error = uiomove(write_msg->pvnr_data, tomove, uio);
1988 if (error)
1989 break;
1990
1991 /* move buffer to userspace */
1992 puffs_msg_setinfo(park_write, PUFFSOP_VN,
1993 PUFFS_VN_WRITE, VPTOPNC(vp));
1994 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
1995 NULL, error);
1996 error = checkerr(pmp, error, __func__);
1997 if (error)
1998 break;
1999
2000 if (write_msg->pvnr_resid > tomove) {
2001 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2002 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2003 error = EPROTO;
2004 break;
2005 }
2006
2007 /* adjust file size */
2008 if (vp->v_size < uio->uio_offset)
2009 uvm_vnp_setsize(vp, uio->uio_offset);
2010
2011 /* didn't move everything? bad userspace. bail */
2012 if (write_msg->pvnr_resid != 0) {
2013 error = EIO;
2014 break;
2015 }
2016 }
2017 puffs_msgmem_release(park_write);
2018 }
2019
2020 return error;
2021 }
2022
2023 int
2024 puffs_vnop_print(void *v)
2025 {
2026 struct vop_print_args /* {
2027 struct vnode *a_vp;
2028 } */ *ap = v;
2029 PUFFS_MSG_VARS(vn, print);
2030 struct vnode *vp = ap->a_vp;
2031 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2032 struct puffs_node *pn = vp->v_data;
2033 int error;
2034
2035 /* kernel portion */
2036 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2037 " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
2038 if (vp->v_type == VFIFO)
2039 fifo_printinfo(vp);
2040 lockmgr_printinfo(&vp->v_lock);
2041
2042 /* userspace portion */
2043 if (EXISTSOP(pmp, PRINT)) {
2044 PUFFS_MSG_ALLOC(vn, print);
2045 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2046 PUFFS_VN_PRINT, VPTOPNC(vp));
2047 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_print, vp->v_data,
2048 NULL, error);
2049 PUFFS_MSG_RELEASE(print);
2050 }
2051
2052 return 0;
2053 }
2054
2055 int
2056 puffs_vnop_pathconf(void *v)
2057 {
2058 struct vop_pathconf_args /* {
2059 const struct vnodeop_desc *a_desc;
2060 struct vnode *a_vp;
2061 int a_name;
2062 register_t *a_retval;
2063 } */ *ap = v;
2064 PUFFS_MSG_VARS(vn, pathconf);
2065 struct vnode *vp = ap->a_vp;
2066 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2067 int error;
2068
2069 PUFFS_MSG_ALLOC(vn, pathconf);
2070 pathconf_msg->pvnr_name = ap->a_name;
2071 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2072 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2073 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2074 error = checkerr(pmp, error, __func__);
2075 if (!error)
2076 *ap->a_retval = pathconf_msg->pvnr_retval;
2077 PUFFS_MSG_RELEASE(pathconf);
2078
2079 return error;
2080 }
2081
2082 int
2083 puffs_vnop_advlock(void *v)
2084 {
2085 struct vop_advlock_args /* {
2086 const struct vnodeop_desc *a_desc;
2087 struct vnode *a_vp;
2088 void *a_id;
2089 int a_op;
2090 struct flock *a_fl;
2091 int a_flags;
2092 } */ *ap = v;
2093 PUFFS_MSG_VARS(vn, advlock);
2094 struct vnode *vp = ap->a_vp;
2095 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2096 int error;
2097
2098 PUFFS_MSG_ALLOC(vn, advlock);
2099 error = copyin(ap->a_fl, &advlock_msg->pvnr_fl, sizeof(struct flock));
2100 if (error)
2101 goto out;
2102 advlock_msg->pvnr_id = ap->a_id;
2103 advlock_msg->pvnr_op = ap->a_op;
2104 advlock_msg->pvnr_flags = ap->a_flags;
2105 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2106 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2107
2108 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2109 error = checkerr(pmp, error, __func__);
2110
2111 out:
2112 PUFFS_MSG_RELEASE(advlock);
2113 return error;
2114 }
2115
2116 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2117
2118 /*
2119 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2120 */
2121 int
2122 puffs_vnop_strategy(void *v)
2123 {
2124 struct vop_strategy_args /* {
2125 const struct vnodeop_desc *a_desc;
2126 struct vnode *a_vp;
2127 struct buf *a_bp;
2128 } */ *ap = v;
2129 PUFFS_MSG_VARS(vn, rw);
2130 struct vnode *vp = ap->a_vp;
2131 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2132 struct puffs_node *pn;
2133 struct buf *bp;
2134 size_t argsize;
2135 size_t tomove, moved;
2136 int error, dofaf, dobiodone;
2137
2138 pmp = MPTOPUFFSMP(vp->v_mount);
2139 bp = ap->a_bp;
2140 error = 0;
2141 dofaf = 0;
2142 pn = VPTOPP(vp);
2143 park_rw = NULL; /* explicit */
2144 dobiodone = 1;
2145
2146 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2147 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2148 ERROUT(EOPNOTSUPP);
2149
2150 /*
2151 * Short-circuit optimization: don't flush buffer in between
2152 * VOP_INACTIVE and VOP_RECLAIM in case the node has no references.
2153 */
2154 if (pn->pn_stat & PNODE_DYING) {
2155 KASSERT(BUF_ISWRITE(bp));
2156 bp->b_resid = 0;
2157 goto out;
2158 }
2159
2160 #ifdef DIAGNOSTIC
2161 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2162 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2163 bp->b_bcount);
2164 #endif
2165
2166 /*
2167 * See explanation for the necessity of a FAF in puffs_fsync.
2168 *
2169 * Also, do FAF in case we're suspending.
2170 * See puffs_vfsops.c:pageflush()
2171 */
2172 if (BUF_ISWRITE(bp)) {
2173 simple_lock(&vp->v_interlock);
2174 if (vp->v_iflag & VI_XLOCK)
2175 dofaf = 1;
2176 if (pn->pn_stat & PNODE_SUSPEND)
2177 dofaf = 1;
2178 simple_unlock(&vp->v_interlock);
2179 }
2180
2181 #ifdef DIAGNOSTIC
2182 if (curlwp == uvm.pagedaemon_lwp)
2183 KASSERT(dofaf || BIOASYNC(bp));
2184 #endif
2185
2186 /* allocate transport structure */
2187 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2188 argsize = sizeof(struct puffs_vnmsg_rw);
2189 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2190 (void **)&rw_msg, dofaf ? 0 : 1);
2191 if (error)
2192 goto out;
2193 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2194
2195 /* 2x2 cases: read/write, faf/nofaf */
2196 if (BUF_ISREAD(bp)) {
2197 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2198 PUFFS_VN_READ, VPTOPNC(vp));
2199 puffs_msg_setdelta(park_rw, tomove);
2200 if (BIOASYNC(bp)) {
2201 puffs_msg_setcall(park_rw,
2202 puffs_parkdone_asyncbioread, bp);
2203 puffs_msg_enqueue(pmp, park_rw);
2204 dobiodone = 0;
2205 } else {
2206 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2207 NULL, error);
2208 error = checkerr(pmp, error, __func__);
2209 if (error)
2210 goto out;
2211
2212 if (rw_msg->pvnr_resid > tomove) {
2213 puffs_senderr(pmp, PUFFS_ERR_READ,
2214 E2BIG, "resid grew", VPTOPNC(vp));
2215 ERROUT(EPROTO);
2216 }
2217
2218 moved = tomove - rw_msg->pvnr_resid;
2219
2220 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2221 bp->b_resid = bp->b_bcount - moved;
2222 }
2223 } else {
2224 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2225 PUFFS_VN_WRITE, VPTOPNC(vp));
2226 /*
2227 * make pages read-only before we write them if we want
2228 * write caching info
2229 */
2230 if (PUFFS_WCACHEINFO(pmp)) {
2231 struct uvm_object *uobj = &vp->v_uobj;
2232 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2233 struct vm_page *vmp;
2234 int i;
2235
2236 for (i = 0; i < npages; i++) {
2237 vmp= uvm_pageratop((vaddr_t)bp->b_data
2238 + (i << PAGE_SHIFT));
2239 DPRINTF(("puffs_strategy: write-protecting "
2240 "vp %p page %p, offset %" PRId64"\n",
2241 vp, vmp, vmp->offset));
2242 simple_lock(&uobj->vmobjlock);
2243 vmp->flags |= PG_RDONLY;
2244 pmap_page_protect(vmp, VM_PROT_READ);
2245 simple_unlock(&uobj->vmobjlock);
2246 }
2247 }
2248
2249 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2250 if (dofaf) {
2251 puffs_msg_setfaf(park_rw);
2252 } else if (BIOASYNC(bp)) {
2253 puffs_msg_setcall(park_rw,
2254 puffs_parkdone_asyncbiowrite, bp);
2255 dobiodone = 0;
2256 }
2257
2258 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2259
2260 if (dobiodone == 0)
2261 goto out;
2262
2263 /*
2264 * XXXXXXXX: wrong, but kernel can't survive strategy
2265 * failure currently. Here, have one more X: X.
2266 */
2267 if (error != ENOMEM)
2268 error = 0;
2269
2270 error = checkerr(pmp, error, __func__);
2271 if (error)
2272 goto out;
2273
2274 if (rw_msg->pvnr_resid > tomove) {
2275 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2276 E2BIG, "resid grew", VPTOPNC(vp));
2277 ERROUT(EPROTO);
2278 }
2279
2280 /*
2281 * FAF moved everything. Frankly, we don't
2282 * really have a choice.
2283 */
2284 if (dofaf && error == 0)
2285 moved = tomove;
2286 else
2287 moved = tomove - rw_msg->pvnr_resid;
2288
2289 bp->b_resid = bp->b_bcount - moved;
2290 if (bp->b_resid != 0) {
2291 ERROUT(EIO);
2292 }
2293 }
2294
2295 out:
2296 if (park_rw)
2297 puffs_msgmem_release(park_rw);
2298
2299 if (error)
2300 bp->b_error = error;
2301
2302 if (error || dobiodone)
2303 biodone(bp);
2304
2305 return error;
2306 }
2307
2308 int
2309 puffs_vnop_mmap(void *v)
2310 {
2311 struct vop_mmap_args /* {
2312 const struct vnodeop_desc *a_desc;
2313 struct vnode *a_vp;
2314 vm_prot_t a_prot;
2315 kauth_cred_t a_cred;
2316 } */ *ap = v;
2317 PUFFS_MSG_VARS(vn, mmap);
2318 struct vnode *vp = ap->a_vp;
2319 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2320 int error;
2321
2322 if (!PUFFS_USE_PAGECACHE(pmp))
2323 return genfs_eopnotsupp(v);
2324
2325 if (EXISTSOP(pmp, MMAP)) {
2326 PUFFS_MSG_ALLOC(vn, mmap);
2327 mmap_msg->pvnr_prot = ap->a_prot;
2328 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2329 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2330 PUFFS_VN_MMAP, VPTOPNC(vp));
2331
2332 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2333 error = checkerr(pmp, error, __func__);
2334 PUFFS_MSG_RELEASE(mmap);
2335 } else {
2336 error = genfs_mmap(v);
2337 }
2338
2339 return error;
2340 }
2341
2342
2343 /*
2344 * The rest don't get a free trip to userspace and back, they
2345 * have to stay within the kernel.
2346 */
2347
2348 /*
2349 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2350 * well, maybe somehow, somewhere, some day ....
2351 */
2352 int
2353 puffs_vnop_bmap(void *v)
2354 {
2355 struct vop_bmap_args /* {
2356 const struct vnodeop_desc *a_desc;
2357 struct vnode *a_vp;
2358 daddr_t a_bn;
2359 struct vnode **a_vpp;
2360 daddr_t *a_bnp;
2361 int *a_runp;
2362 } */ *ap = v;
2363 struct puffs_mount *pmp;
2364
2365 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2366
2367 if (ap->a_vpp)
2368 *ap->a_vpp = ap->a_vp;
2369 if (ap->a_bnp)
2370 *ap->a_bnp = ap->a_bn;
2371 if (ap->a_runp)
2372 *ap->a_runp
2373 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2374
2375 return 0;
2376 }
2377
2378 /*
2379 * Handle getpages faults in puffs. We let genfs_getpages() do most
2380 * of the dirty work, but we come in this route to do accounting tasks.
2381 * If the user server has specified functions for cache notifications
2382 * about reads and/or writes, we record which type of operation we got,
2383 * for which page range, and proceed to issue a FAF notification to the
2384 * server about it.
2385 */
2386 int
2387 puffs_vnop_getpages(void *v)
2388 {
2389 struct vop_getpages_args /* {
2390 const struct vnodeop_desc *a_desc;
2391 struct vnode *a_vp;
2392 voff_t a_offset;
2393 struct vm_page **a_m;
2394 int *a_count;
2395 int a_centeridx;
2396 vm_prot_t a_access_type;
2397 int a_advice;
2398 int a_flags;
2399 } */ *ap = v;
2400 struct puffs_mount *pmp;
2401 struct puffs_node *pn;
2402 struct vnode *vp;
2403 struct vm_page **pgs;
2404 struct puffs_cacheinfo *pcinfo = NULL;
2405 struct puffs_cacherun *pcrun;
2406 void *parkmem = NULL;
2407 size_t runsizes;
2408 int i, npages, si, streakon;
2409 int error, locked, write;
2410
2411 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2412 npages = *ap->a_count;
2413 pgs = ap->a_m;
2414 vp = ap->a_vp;
2415 pn = vp->v_data;
2416 locked = (ap->a_flags & PGO_LOCKED) != 0;
2417 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
2418
2419 /* ccg xnaht - gets Wuninitialized wrong */
2420 pcrun = NULL;
2421 runsizes = 0;
2422
2423 /*
2424 * Check that we aren't trying to fault in pages which our file
2425 * server doesn't know about. This happens if we extend a file by
2426 * skipping some pages and later try to fault in pages which
2427 * are between pn_serversize and vp_size. This check optimizes
2428 * away the common case where a file is being extended.
2429 */
2430 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
2431 struct vattr va;
2432
2433 /* try again later when we can block */
2434 if (locked)
2435 ERROUT(EBUSY);
2436
2437 simple_unlock(&vp->v_interlock);
2438 vattr_null(&va);
2439 va.va_size = vp->v_size;
2440 error = dosetattr(vp, &va, FSCRED, 0);
2441 if (error)
2442 ERROUT(error);
2443 simple_lock(&vp->v_interlock);
2444 }
2445
2446 if (write && PUFFS_WCACHEINFO(pmp)) {
2447 #ifdef notnowjohn
2448 /* allocate worst-case memory */
2449 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
2450 pcinfo = kmem_zalloc(sizeof_puffs_cacheinfo) + runsize,
2451 locked ? KM_NOSLEEP : KM_SLEEP);
2452
2453 /*
2454 * can't block if we're locked and can't mess up caching
2455 * information for fs server. so come back later, please
2456 */
2457 if (pcinfo == NULL)
2458 ERROUT(ENOMEM);
2459
2460 parkmem = puffs_park_alloc(locked == 0);
2461 if (parkmem == NULL)
2462 ERROUT(ENOMEM);
2463
2464 pcrun = pcinfo->pcache_runs;
2465 #else
2466 (void)parkmem;
2467 #endif
2468 }
2469
2470 error = genfs_getpages(v);
2471 if (error)
2472 goto out;
2473
2474 if (PUFFS_WCACHEINFO(pmp) == 0)
2475 goto out;
2476
2477 /*
2478 * Let's see whose fault it was and inform the user server of
2479 * possibly read/written pages. Map pages from read faults
2480 * strictly read-only, since otherwise we might miss info on
2481 * when the page is actually write-faulted to.
2482 */
2483 if (!locked)
2484 simple_lock(&vp->v_uobj.vmobjlock);
2485 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
2486 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
2487 if (streakon && write) {
2488 streakon = 0;
2489 pcrun[si].pcache_runend
2490 = trunc_page(pgs[i]->offset) + PAGE_MASK;
2491 si++;
2492 }
2493 continue;
2494 }
2495 if (streakon == 0 && write) {
2496 streakon = 1;
2497 pcrun[si].pcache_runstart = pgs[i]->offset;
2498 }
2499
2500 if (!write)
2501 pgs[i]->flags |= PG_RDONLY;
2502 }
2503 /* was the last page part of our streak? */
2504 if (streakon) {
2505 pcrun[si].pcache_runend
2506 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
2507 si++;
2508 }
2509 if (!locked)
2510 simple_unlock(&vp->v_uobj.vmobjlock);
2511
2512 KASSERT(si <= (npages / 2) + 1);
2513
2514 #ifdef notnowjohn
2515 /* send results to userspace */
2516 if (write)
2517 puffs_cacheop(pmp, parkmem, pcinfo,
2518 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
2519 #endif
2520
2521 out:
2522 if (error) {
2523 if (pcinfo != NULL)
2524 kmem_free(pcinfo,
2525 sizeof(struct puffs_cacheinfo) + runsizes);
2526 #ifdef notnowjohn
2527 if (parkmem != NULL)
2528 puffs_park_release(parkmem, 1);
2529 #endif
2530 }
2531
2532 return error;
2533 }
2534
2535 int
2536 puffs_vnop_lock(void *v)
2537 {
2538 struct vop_lock_args /* {
2539 struct vnode *a_vp;
2540 int a_flags;
2541 }*/ *ap = v;
2542 struct vnode *vp = ap->a_vp;
2543 struct mount *mp = vp->v_mount;
2544
2545 #if 0
2546 DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
2547 #endif
2548
2549 /*
2550 * XXX: this avoids deadlocking when we're suspending.
2551 * e.g. some ops holding the vnode lock might be blocked for
2552 * the vfs transaction lock so we'd deadlock.
2553 *
2554 * Now once again this is skating on the thin ice of modern life,
2555 * since we are breaking the consistency guarantee provided
2556 * _to the user server_ by vnode locking. Hopefully this will
2557 * get fixed soon enough by getting rid of the dependency on
2558 * vnode locks alltogether.
2559 */
2560 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2561 if (ap->a_flags & LK_INTERLOCK)
2562 simple_unlock(&vp->v_interlock);
2563 return 0;
2564 }
2565
2566 return lockmgr(&vp->v_lock, ap->a_flags, &vp->v_interlock);
2567 }
2568
2569 int
2570 puffs_vnop_unlock(void *v)
2571 {
2572 struct vop_unlock_args /* {
2573 struct vnode *a_vp;
2574 int a_flags;
2575 } */ *ap = v;
2576 struct vnode *vp = ap->a_vp;
2577 struct mount *mp = vp->v_mount;
2578
2579 #if 0
2580 DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
2581 #endif
2582
2583 /* XXX: see puffs_lock() */
2584 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2585 if (ap->a_flags & LK_INTERLOCK)
2586 simple_unlock(&vp->v_interlock);
2587 return 0;
2588 }
2589
2590 return lockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE, &vp->v_interlock);
2591 }
2592
2593 int
2594 puffs_vnop_islocked(void *v)
2595 {
2596 struct vop_islocked_args *ap = v;
2597 int rv;
2598
2599 rv = lockstatus(&ap->a_vp->v_lock);
2600 return rv;
2601 }
2602
2603
2604 /*
2605 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
2606 * FAF update information for the puffs node first.
2607 */
2608 int
2609 puffs_vnop_spec_read(void *v)
2610 {
2611 struct vop_read_args /* {
2612 const struct vnodeop_desc *a_desc;
2613 struct vnode *a_vp;
2614 struct uio *a_uio;
2615 int a_ioflag;
2616 kauth_cred_t a_cred;
2617 } */ *ap = v;
2618
2619 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2620 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
2621 }
2622
2623 int
2624 puffs_vnop_spec_write(void *v)
2625 {
2626 struct vop_write_args /* {
2627 const struct vnodeop_desc *a_desc;
2628 struct vnode *a_vp;
2629 struct uio *a_uio;
2630 int a_ioflag;
2631 kauth_cred_t a_cred;
2632 }*/ *ap = v;
2633
2634 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2635 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
2636 }
2637
2638 int
2639 puffs_vnop_fifo_read(void *v)
2640 {
2641 struct vop_read_args /* {
2642 const struct vnodeop_desc *a_desc;
2643 struct vnode *a_vp;
2644 struct uio *a_uio;
2645 int a_ioflag;
2646 kauth_cred_t a_cred;
2647 } */ *ap = v;
2648
2649 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2650 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
2651 }
2652
2653 int
2654 puffs_vnop_fifo_write(void *v)
2655 {
2656 struct vop_write_args /* {
2657 const struct vnodeop_desc *a_desc;
2658 struct vnode *a_vp;
2659 struct uio *a_uio;
2660 int a_ioflag;
2661 kauth_cred_t a_cred;
2662 }*/ *ap = v;
2663
2664 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2665 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
2666 }
2667