puffs_vnops.c revision 1.132 1 /* $NetBSD: puffs_vnops.c,v 1.132 2009/09/12 18:17:55 tsutsui Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.132 2009/09/12 18:17:55 tsutsui Exp $");
34
35 #include <sys/param.h>
36 #include <sys/buf.h>
37 #include <sys/fstrans.h>
38 #include <sys/malloc.h>
39 #include <sys/mount.h>
40 #include <sys/namei.h>
41 #include <sys/vnode.h>
42 #include <sys/proc.h>
43
44 #include <uvm/uvm.h>
45
46 #include <fs/puffs/puffs_msgif.h>
47 #include <fs/puffs/puffs_sys.h>
48
49 #include <miscfs/fifofs/fifo.h>
50 #include <miscfs/genfs/genfs.h>
51 #include <miscfs/specfs/specdev.h>
52
53 int puffs_vnop_lookup(void *);
54 int puffs_vnop_create(void *);
55 int puffs_vnop_access(void *);
56 int puffs_vnop_mknod(void *);
57 int puffs_vnop_open(void *);
58 int puffs_vnop_close(void *);
59 int puffs_vnop_getattr(void *);
60 int puffs_vnop_setattr(void *);
61 int puffs_vnop_reclaim(void *);
62 int puffs_vnop_readdir(void *);
63 int puffs_vnop_poll(void *);
64 int puffs_vnop_fsync(void *);
65 int puffs_vnop_seek(void *);
66 int puffs_vnop_remove(void *);
67 int puffs_vnop_mkdir(void *);
68 int puffs_vnop_rmdir(void *);
69 int puffs_vnop_link(void *);
70 int puffs_vnop_readlink(void *);
71 int puffs_vnop_symlink(void *);
72 int puffs_vnop_rename(void *);
73 int puffs_vnop_read(void *);
74 int puffs_vnop_write(void *);
75 int puffs_vnop_fcntl(void *);
76 int puffs_vnop_ioctl(void *);
77 int puffs_vnop_inactive(void *);
78 int puffs_vnop_print(void *);
79 int puffs_vnop_pathconf(void *);
80 int puffs_vnop_advlock(void *);
81 int puffs_vnop_strategy(void *);
82 int puffs_vnop_bmap(void *);
83 int puffs_vnop_mmap(void *);
84 int puffs_vnop_getpages(void *);
85
86 int puffs_vnop_spec_read(void *);
87 int puffs_vnop_spec_write(void *);
88 int puffs_vnop_fifo_read(void *);
89 int puffs_vnop_fifo_write(void *);
90
91 int puffs_vnop_checkop(void *);
92
93
94 #if 0
95 #define puffs_lock genfs_lock
96 #define puffs_unlock genfs_unlock
97 #define puffs_islocked genfs_islocked
98 #else
99 int puffs_vnop_lock(void *);
100 int puffs_vnop_unlock(void *);
101 int puffs_vnop_islocked(void *);
102 #endif
103
104 int (**puffs_vnodeop_p)(void *);
105 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
106 { &vop_default_desc, vn_default_error },
107 { &vop_lookup_desc, puffs_vnop_lookup }, /* REAL lookup */
108 { &vop_create_desc, puffs_vnop_checkop }, /* create */
109 { &vop_mknod_desc, puffs_vnop_checkop }, /* mknod */
110 { &vop_open_desc, puffs_vnop_open }, /* REAL open */
111 { &vop_close_desc, puffs_vnop_checkop }, /* close */
112 { &vop_access_desc, puffs_vnop_access }, /* REAL access */
113 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
114 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
115 { &vop_read_desc, puffs_vnop_checkop }, /* read */
116 { &vop_write_desc, puffs_vnop_checkop }, /* write */
117 { &vop_fsync_desc, puffs_vnop_fsync }, /* REAL fsync */
118 { &vop_seek_desc, puffs_vnop_checkop }, /* seek */
119 { &vop_remove_desc, puffs_vnop_checkop }, /* remove */
120 { &vop_link_desc, puffs_vnop_checkop }, /* link */
121 { &vop_rename_desc, puffs_vnop_checkop }, /* rename */
122 { &vop_mkdir_desc, puffs_vnop_checkop }, /* mkdir */
123 { &vop_rmdir_desc, puffs_vnop_checkop }, /* rmdir */
124 { &vop_symlink_desc, puffs_vnop_checkop }, /* symlink */
125 { &vop_readdir_desc, puffs_vnop_checkop }, /* readdir */
126 { &vop_readlink_desc, puffs_vnop_checkop }, /* readlink */
127 { &vop_getpages_desc, puffs_vnop_checkop }, /* getpages */
128 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
129 { &vop_pathconf_desc, puffs_vnop_checkop }, /* pathconf */
130 { &vop_advlock_desc, puffs_vnop_checkop }, /* advlock */
131 { &vop_strategy_desc, puffs_vnop_strategy }, /* REAL strategy */
132 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
133 { &vop_abortop_desc, genfs_abortop }, /* REAL abortop */
134 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
135 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
136 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
137 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
138 { &vop_bmap_desc, puffs_vnop_bmap }, /* REAL bmap */
139 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
140 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
141 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
142 { &vop_mmap_desc, puffs_vnop_mmap }, /* REAL mmap */
143 { &vop_poll_desc, puffs_vnop_poll }, /* REAL poll */
144
145 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
146 { NULL, NULL }
147 };
148 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
149 { &puffs_vnodeop_p, puffs_vnodeop_entries };
150
151
152 int (**puffs_specop_p)(void *);
153 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
154 { &vop_default_desc, vn_default_error },
155 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
156 { &vop_create_desc, spec_create }, /* genfs_badop */
157 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
158 { &vop_open_desc, spec_open }, /* spec_open */
159 { &vop_close_desc, spec_close }, /* spec_close */
160 { &vop_access_desc, puffs_vnop_checkop }, /* access */
161 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
162 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
163 { &vop_read_desc, puffs_vnop_spec_read }, /* update, read */
164 { &vop_write_desc, puffs_vnop_spec_write }, /* update, write */
165 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
166 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
167 { &vop_poll_desc, spec_poll }, /* spec_poll */
168 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
169 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
170 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
171 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
172 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
173 { &vop_remove_desc, spec_remove }, /* genfs_badop */
174 { &vop_link_desc, spec_link }, /* genfs_badop */
175 { &vop_rename_desc, spec_rename }, /* genfs_badop */
176 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
177 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
178 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
179 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
180 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
181 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
182 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
183 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
184 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
185 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
186 { &vop_bmap_desc, spec_bmap }, /* dummy */
187 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
188 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
189 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
190 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
191 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
192 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
193 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
194 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
195 #if 0
196 { &vop_openextattr_desc, _openextattr }, /* openextattr */
197 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
198 { &vop_getextattr_desc, _getextattr }, /* getextattr */
199 { &vop_setextattr_desc, _setextattr }, /* setextattr */
200 { &vop_listextattr_desc, _listextattr }, /* listextattr */
201 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
202 #endif
203 { NULL, NULL }
204 };
205 const struct vnodeopv_desc puffs_specop_opv_desc =
206 { &puffs_specop_p, puffs_specop_entries };
207
208
209 int (**puffs_fifoop_p)(void *);
210 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
211 { &vop_default_desc, vn_default_error },
212 { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
213 { &vop_create_desc, fifo_create }, /* genfs_badop */
214 { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
215 { &vop_open_desc, fifo_open }, /* open */
216 { &vop_close_desc, fifo_close }, /* close */
217 { &vop_access_desc, puffs_vnop_checkop }, /* access */
218 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
219 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
220 { &vop_read_desc, puffs_vnop_fifo_read }, /* read, update */
221 { &vop_write_desc, puffs_vnop_fifo_write }, /* write, update */
222 { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
223 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
224 { &vop_poll_desc, fifo_poll }, /* poll */
225 { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
226 { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
227 { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
228 { &vop_fsync_desc, fifo_fsync }, /* genfs_nullop*/
229 { &vop_seek_desc, fifo_seek }, /* genfs_badop */
230 { &vop_remove_desc, fifo_remove }, /* genfs_badop */
231 { &vop_link_desc, fifo_link }, /* genfs_badop */
232 { &vop_rename_desc, fifo_rename }, /* genfs_badop */
233 { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
234 { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
235 { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
236 { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
237 { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
238 { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
239 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
240 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
241 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
242 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
243 { &vop_bmap_desc, fifo_bmap }, /* dummy */
244 { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
245 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
246 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
247 { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
248 { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
249 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
250 { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
251 #if 0
252 { &vop_openextattr_desc, _openextattr }, /* openextattr */
253 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
254 { &vop_getextattr_desc, _getextattr }, /* getextattr */
255 { &vop_setextattr_desc, _setextattr }, /* setextattr */
256 { &vop_listextattr_desc, _listextattr }, /* listextattr */
257 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
258 #endif
259 { NULL, NULL }
260 };
261 const struct vnodeopv_desc puffs_fifoop_opv_desc =
262 { &puffs_fifoop_p, puffs_fifoop_entries };
263
264
265 /* "real" vnode operations */
266 int (**puffs_msgop_p)(void *);
267 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
268 { &vop_default_desc, vn_default_error },
269 { &vop_create_desc, puffs_vnop_create }, /* create */
270 { &vop_mknod_desc, puffs_vnop_mknod }, /* mknod */
271 { &vop_open_desc, puffs_vnop_open }, /* open */
272 { &vop_close_desc, puffs_vnop_close }, /* close */
273 { &vop_access_desc, puffs_vnop_access }, /* access */
274 { &vop_getattr_desc, puffs_vnop_getattr }, /* getattr */
275 { &vop_setattr_desc, puffs_vnop_setattr }, /* setattr */
276 { &vop_read_desc, puffs_vnop_read }, /* read */
277 { &vop_write_desc, puffs_vnop_write }, /* write */
278 { &vop_seek_desc, puffs_vnop_seek }, /* seek */
279 { &vop_remove_desc, puffs_vnop_remove }, /* remove */
280 { &vop_link_desc, puffs_vnop_link }, /* link */
281 { &vop_rename_desc, puffs_vnop_rename }, /* rename */
282 { &vop_mkdir_desc, puffs_vnop_mkdir }, /* mkdir */
283 { &vop_rmdir_desc, puffs_vnop_rmdir }, /* rmdir */
284 { &vop_symlink_desc, puffs_vnop_symlink }, /* symlink */
285 { &vop_readdir_desc, puffs_vnop_readdir }, /* readdir */
286 { &vop_readlink_desc, puffs_vnop_readlink }, /* readlink */
287 { &vop_print_desc, puffs_vnop_print }, /* print */
288 { &vop_islocked_desc, puffs_vnop_islocked }, /* islocked */
289 { &vop_pathconf_desc, puffs_vnop_pathconf }, /* pathconf */
290 { &vop_advlock_desc, puffs_vnop_advlock }, /* advlock */
291 { &vop_getpages_desc, puffs_vnop_getpages }, /* getpages */
292 { NULL, NULL }
293 };
294 const struct vnodeopv_desc puffs_msgop_opv_desc =
295 { &puffs_msgop_p, puffs_msgop_entries };
296
297
298 #define ERROUT(err) \
299 do { \
300 error = err; \
301 goto out; \
302 } while (/*CONSTCOND*/0)
303
304 /*
305 * This is a generic vnode operation handler. It checks if the necessary
306 * operations for the called vnode operation are implemented by userspace
307 * and either returns a dummy return value or proceeds to call the real
308 * vnode operation from puffs_msgop_v.
309 *
310 * XXX: this should described elsewhere and autogenerated, the complexity
311 * of the vnode operations vectors and their interrelationships is also
312 * getting a bit out of hand. Another problem is that we need this same
313 * information in the fs server code, so keeping the two in sync manually
314 * is not a viable (long term) plan.
315 */
316
317 /* not supported, handle locking protocol */
318 #define CHECKOP_NOTSUPP(op) \
319 case VOP_##op##_DESCOFFSET: \
320 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
321 return genfs_eopnotsupp(v); \
322 break
323
324 /* always succeed, no locking */
325 #define CHECKOP_SUCCESS(op) \
326 case VOP_##op##_DESCOFFSET: \
327 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
328 return 0; \
329 break
330
331 int
332 puffs_vnop_checkop(void *v)
333 {
334 struct vop_generic_args /* {
335 struct vnodeop_desc *a_desc;
336 spooky mystery contents;
337 } */ *ap = v;
338 struct vnodeop_desc *desc = ap->a_desc;
339 struct puffs_mount *pmp;
340 struct vnode *vp;
341 int offset, rv;
342
343 offset = ap->a_desc->vdesc_vp_offsets[0];
344 #ifdef DIAGNOSTIC
345 if (offset == VDESC_NO_OFFSET)
346 panic("puffs_checkop: no vnode, why did you call me?");
347 #endif
348 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
349 pmp = MPTOPUFFSMP(vp->v_mount);
350
351 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
352 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
353
354 if (!ALLOPS(pmp)) {
355 switch (desc->vdesc_offset) {
356 CHECKOP_NOTSUPP(CREATE);
357 CHECKOP_NOTSUPP(MKNOD);
358 CHECKOP_NOTSUPP(GETATTR);
359 CHECKOP_NOTSUPP(SETATTR);
360 CHECKOP_NOTSUPP(READ);
361 CHECKOP_NOTSUPP(WRITE);
362 CHECKOP_NOTSUPP(FCNTL);
363 CHECKOP_NOTSUPP(IOCTL);
364 CHECKOP_NOTSUPP(REMOVE);
365 CHECKOP_NOTSUPP(LINK);
366 CHECKOP_NOTSUPP(RENAME);
367 CHECKOP_NOTSUPP(MKDIR);
368 CHECKOP_NOTSUPP(RMDIR);
369 CHECKOP_NOTSUPP(SYMLINK);
370 CHECKOP_NOTSUPP(READDIR);
371 CHECKOP_NOTSUPP(READLINK);
372 CHECKOP_NOTSUPP(PRINT);
373 CHECKOP_NOTSUPP(PATHCONF);
374 CHECKOP_NOTSUPP(ADVLOCK);
375
376 CHECKOP_SUCCESS(ACCESS);
377 CHECKOP_SUCCESS(CLOSE);
378 CHECKOP_SUCCESS(SEEK);
379
380 case VOP_GETPAGES_DESCOFFSET:
381 if (!EXISTSOP(pmp, READ))
382 return genfs_eopnotsupp(v);
383 break;
384
385 default:
386 panic("puffs_checkop: unhandled vnop %d",
387 desc->vdesc_offset);
388 }
389 }
390
391 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
392
393 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
394 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
395
396 return rv;
397 }
398
399 static int callremove(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
400 struct componentname *);
401 static int callrmdir(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
402 struct componentname *);
403 static void callinactive(struct puffs_mount *, puffs_cookie_t, int);
404 static void callreclaim(struct puffs_mount *, puffs_cookie_t);
405
406 #define PUFFS_ABORT_LOOKUP 1
407 #define PUFFS_ABORT_CREATE 2
408 #define PUFFS_ABORT_MKNOD 3
409 #define PUFFS_ABORT_MKDIR 4
410 #define PUFFS_ABORT_SYMLINK 5
411
412 /*
413 * Press the pani^Wabort button! Kernel resource allocation failed.
414 */
415 static void
416 puffs_abortbutton(struct puffs_mount *pmp, int what,
417 puffs_cookie_t dck, puffs_cookie_t ck, struct componentname *cnp)
418 {
419
420 switch (what) {
421 case PUFFS_ABORT_CREATE:
422 case PUFFS_ABORT_MKNOD:
423 case PUFFS_ABORT_SYMLINK:
424 callremove(pmp, dck, ck, cnp);
425 break;
426 case PUFFS_ABORT_MKDIR:
427 callrmdir(pmp, dck, ck, cnp);
428 break;
429 }
430
431 callinactive(pmp, ck, 0);
432 callreclaim(pmp, ck);
433 }
434
435 /*
436 * Begin vnode operations.
437 *
438 * A word from the keymaster about locks: generally we don't want
439 * to use the vnode locks at all: it creates an ugly dependency between
440 * the userlandia file server and the kernel. But we'll play along with
441 * the kernel vnode locks for now. However, even currently we attempt
442 * to release locks as early as possible. This is possible for some
443 * operations which a) don't need a locked vnode after the userspace op
444 * and b) return with the vnode unlocked. Theoretically we could
445 * unlock-do op-lock for others and order the graph in userspace, but I
446 * don't want to think of the consequences for the time being.
447 */
448
449 int
450 puffs_vnop_lookup(void *v)
451 {
452 struct vop_lookup_args /* {
453 const struct vnodeop_desc *a_desc;
454 struct vnode *a_dvp;
455 struct vnode **a_vpp;
456 struct componentname *a_cnp;
457 } */ *ap = v;
458 PUFFS_MSG_VARS(vn, lookup);
459 struct puffs_mount *pmp;
460 struct componentname *cnp;
461 struct vnode *vp, *dvp;
462 struct puffs_node *dpn;
463 int isdot;
464 int error;
465
466 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
467 cnp = ap->a_cnp;
468 dvp = ap->a_dvp;
469 *ap->a_vpp = NULL;
470
471 /* r/o fs? we check create later to handle EEXIST */
472 if ((cnp->cn_flags & ISLASTCN)
473 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
474 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
475 return EROFS;
476
477 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
478
479 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
480 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
481
482 /*
483 * Check if someone fed it into the cache
484 */
485 if (PUFFS_USE_NAMECACHE(pmp)) {
486 error = cache_lookup(dvp, ap->a_vpp, cnp);
487
488 if (error >= 0)
489 return error;
490 }
491
492 if (isdot) {
493 vp = ap->a_dvp;
494 vref(vp);
495 *ap->a_vpp = vp;
496 return 0;
497 }
498
499 PUFFS_MSG_ALLOC(vn, lookup);
500 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
501 cnp, PUFFS_USE_FULLPNBUF(pmp));
502
503 if (cnp->cn_flags & ISDOTDOT)
504 VOP_UNLOCK(dvp, 0);
505
506 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
507 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
508 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
509 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
510
511 /*
512 * In case of error, there is no new vnode to play with, so be
513 * happy with the NULL value given to vpp in the beginning.
514 * Also, check if this really was an error or the target was not
515 * present. Either treat it as a non-error for CREATE/RENAME or
516 * enter the component into the negative name cache (if desired).
517 */
518 if (error) {
519 error = checkerr(pmp, error, __func__);
520 if (error == ENOENT) {
521 /* don't allow to create files on r/o fs */
522 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
523 && cnp->cn_nameiop == CREATE) {
524 error = EROFS;
525
526 /* adjust values if we are creating */
527 } else if ((cnp->cn_flags & ISLASTCN)
528 && (cnp->cn_nameiop == CREATE
529 || cnp->cn_nameiop == RENAME)) {
530 cnp->cn_flags |= SAVENAME;
531 error = EJUSTRETURN;
532
533 /* save negative cache entry */
534 } else {
535 if ((cnp->cn_flags & MAKEENTRY)
536 && PUFFS_USE_NAMECACHE(pmp))
537 cache_enter(dvp, NULL, cnp);
538 }
539 }
540 goto out;
541 }
542
543 /*
544 * Check that we don't get our parent node back, that would cause
545 * a pretty obvious deadlock.
546 */
547 dpn = dvp->v_data;
548 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
549 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
550 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
551 error = EPROTO;
552 goto out;
553 }
554
555 error = puffs_cookie2vnode(pmp, lookup_msg->pvnr_newnode, 1, 1, &vp);
556 if (error == PUFFS_NOSUCHCOOKIE) {
557 error = puffs_getvnode(dvp->v_mount,
558 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
559 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
560 if (error) {
561 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
562 lookup_msg->pvnr_newnode, ap->a_cnp);
563 goto out;
564 }
565 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
566 } else if (error) {
567 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
568 lookup_msg->pvnr_newnode, ap->a_cnp);
569 goto out;
570 }
571
572 *ap->a_vpp = vp;
573
574 if ((cnp->cn_flags & MAKEENTRY) != 0 && PUFFS_USE_NAMECACHE(pmp))
575 cache_enter(dvp, vp, cnp);
576
577 /* XXX */
578 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
579 cnp->cn_flags &= ~REQUIREDIR;
580 if (lookup_msg->pvnr_cn.pkcn_consume)
581 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
582 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
583
584 out:
585 if (cnp->cn_flags & ISDOTDOT)
586 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
587
588 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
589 PUFFS_MSG_RELEASE(lookup);
590 return error;
591 }
592
593 #define REFPN_AND_UNLOCKVP(a, b) \
594 do { \
595 mutex_enter(&b->pn_mtx); \
596 puffs_referencenode(b); \
597 mutex_exit(&b->pn_mtx); \
598 VOP_UNLOCK(a, 0); \
599 } while (/*CONSTCOND*/0)
600
601 #define REFPN(b) \
602 do { \
603 mutex_enter(&b->pn_mtx); \
604 puffs_referencenode(b); \
605 mutex_exit(&b->pn_mtx); \
606 } while (/*CONSTCOND*/0)
607
608 #define RELEPN_AND_VP(a, b) \
609 do { \
610 puffs_releasenode(b); \
611 vrele(a); \
612 } while (/*CONSTCOND*/0)
613
614 int
615 puffs_vnop_create(void *v)
616 {
617 struct vop_create_args /* {
618 const struct vnodeop_desc *a_desc;
619 struct vnode *a_dvp;
620 struct vnode **a_vpp;
621 struct componentname *a_cnp;
622 struct vattr *a_vap;
623 } */ *ap = v;
624 PUFFS_MSG_VARS(vn, create);
625 struct vnode *dvp = ap->a_dvp;
626 struct puffs_node *dpn = VPTOPP(dvp);
627 struct componentname *cnp = ap->a_cnp;
628 struct mount *mp = dvp->v_mount;
629 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
630 int error;
631
632 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
633 dvp, ap->a_cnp->cn_nameptr));
634
635 PUFFS_MSG_ALLOC(vn, create);
636 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
637 cnp, PUFFS_USE_FULLPNBUF(pmp));
638 create_msg->pvnr_va = *ap->a_vap;
639 puffs_msg_setinfo(park_create, PUFFSOP_VN,
640 PUFFS_VN_CREATE, VPTOPNC(dvp));
641
642 /*
643 * Do the dance:
644 * + insert into queue ("interlock")
645 * + unlock vnode
646 * + wait for response
647 */
648 puffs_msg_enqueue(pmp, park_create);
649 REFPN_AND_UNLOCKVP(dvp, dpn);
650 error = puffs_msg_wait2(pmp, park_create, dpn, NULL);
651
652 error = checkerr(pmp, error, __func__);
653 if (error)
654 goto out;
655
656 error = puffs_newnode(mp, dvp, ap->a_vpp,
657 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
658 if (error)
659 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
660 create_msg->pvnr_newnode, cnp);
661
662 out:
663 if (error || (cnp->cn_flags & SAVESTART) == 0)
664 PNBUF_PUT(cnp->cn_pnbuf);
665
666 RELEPN_AND_VP(dvp, dpn);
667 DPRINTF(("puffs_create: return %d\n", error));
668 PUFFS_MSG_RELEASE(create);
669 return error;
670 }
671
672 int
673 puffs_vnop_mknod(void *v)
674 {
675 struct vop_mknod_args /* {
676 const struct vnodeop_desc *a_desc;
677 struct vnode *a_dvp;
678 struct vnode **a_vpp;
679 struct componentname *a_cnp;
680 struct vattr *a_vap;
681 } */ *ap = v;
682 PUFFS_MSG_VARS(vn, mknod);
683 struct vnode *dvp = ap->a_dvp;
684 struct puffs_node *dpn = VPTOPP(dvp);
685 struct componentname *cnp = ap->a_cnp;
686 struct mount *mp = dvp->v_mount;
687 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
688 int error;
689
690 PUFFS_MSG_ALLOC(vn, mknod);
691 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
692 cnp, PUFFS_USE_FULLPNBUF(pmp));
693 mknod_msg->pvnr_va = *ap->a_vap;
694 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
695 PUFFS_VN_MKNOD, VPTOPNC(dvp));
696
697 puffs_msg_enqueue(pmp, park_mknod);
698 REFPN_AND_UNLOCKVP(dvp, dpn);
699 error = puffs_msg_wait2(pmp, park_mknod, dpn, NULL);
700
701 error = checkerr(pmp, error, __func__);
702 if (error)
703 goto out;
704
705 error = puffs_newnode(mp, dvp, ap->a_vpp,
706 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
707 ap->a_vap->va_rdev);
708 if (error)
709 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
710 mknod_msg->pvnr_newnode, cnp);
711
712 out:
713 PUFFS_MSG_RELEASE(mknod);
714 if (error || (cnp->cn_flags & SAVESTART) == 0)
715 PNBUF_PUT(cnp->cn_pnbuf);
716 RELEPN_AND_VP(dvp, dpn);
717 return error;
718 }
719
720 int
721 puffs_vnop_open(void *v)
722 {
723 struct vop_open_args /* {
724 const struct vnodeop_desc *a_desc;
725 struct vnode *a_vp;
726 int a_mode;
727 kauth_cred_t a_cred;
728 } */ *ap = v;
729 PUFFS_MSG_VARS(vn, open);
730 struct vnode *vp = ap->a_vp;
731 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
732 int mode = ap->a_mode;
733 int error;
734
735 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
736
737 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
738 ERROUT(EROFS);
739
740 if (!EXISTSOP(pmp, OPEN))
741 ERROUT(0);
742
743 PUFFS_MSG_ALLOC(vn, open);
744 open_msg->pvnr_mode = mode;
745 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
746 puffs_msg_setinfo(park_open, PUFFSOP_VN,
747 PUFFS_VN_OPEN, VPTOPNC(vp));
748
749 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
750 error = checkerr(pmp, error, __func__);
751
752 out:
753 DPRINTF(("puffs_open: returning %d\n", error));
754 PUFFS_MSG_RELEASE(open);
755 return error;
756 }
757
758 int
759 puffs_vnop_close(void *v)
760 {
761 struct vop_close_args /* {
762 const struct vnodeop_desc *a_desc;
763 struct vnode *a_vp;
764 int a_fflag;
765 kauth_cred_t a_cred;
766 } */ *ap = v;
767 PUFFS_MSG_VARS(vn, close);
768 struct vnode *vp = ap->a_vp;
769 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
770
771 PUFFS_MSG_ALLOC(vn, close);
772 puffs_msg_setfaf(park_close);
773 close_msg->pvnr_fflag = ap->a_fflag;
774 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
775 puffs_msg_setinfo(park_close, PUFFSOP_VN,
776 PUFFS_VN_CLOSE, VPTOPNC(vp));
777
778 puffs_msg_enqueue(pmp, park_close);
779 PUFFS_MSG_RELEASE(close);
780 return 0;
781 }
782
783 int
784 puffs_vnop_access(void *v)
785 {
786 struct vop_access_args /* {
787 const struct vnodeop_desc *a_desc;
788 struct vnode *a_vp;
789 int a_mode;
790 kauth_cred_t a_cred;
791 } */ *ap = v;
792 PUFFS_MSG_VARS(vn, access);
793 struct vnode *vp = ap->a_vp;
794 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
795 int mode = ap->a_mode;
796 int error;
797
798 if (mode & VWRITE) {
799 switch (vp->v_type) {
800 case VDIR:
801 case VLNK:
802 case VREG:
803 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
804 || !EXISTSOP(pmp, WRITE))
805 return EROFS;
806 break;
807 default:
808 break;
809 }
810 }
811
812 if (!EXISTSOP(pmp, ACCESS))
813 return 0;
814
815 PUFFS_MSG_ALLOC(vn, access);
816 access_msg->pvnr_mode = ap->a_mode;
817 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
818 puffs_msg_setinfo(park_access, PUFFSOP_VN,
819 PUFFS_VN_ACCESS, VPTOPNC(vp));
820
821 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
822 error = checkerr(pmp, error, __func__);
823 PUFFS_MSG_RELEASE(access);
824
825 return error;
826 }
827
828 int
829 puffs_vnop_getattr(void *v)
830 {
831 struct vop_getattr_args /* {
832 const struct vnodeop_desc *a_desc;
833 struct vnode *a_vp;
834 struct vattr *a_vap;
835 kauth_cred_t a_cred;
836 } */ *ap = v;
837 PUFFS_MSG_VARS(vn, getattr);
838 struct vnode *vp = ap->a_vp;
839 struct mount *mp = vp->v_mount;
840 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
841 struct vattr *vap, *rvap;
842 struct puffs_node *pn;
843 int error = 0;
844
845 vap = ap->a_vap;
846
847 PUFFS_MSG_ALLOC(vn, getattr);
848 vattr_null(&getattr_msg->pvnr_va);
849 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
850 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
851 PUFFS_VN_GETATTR, VPTOPNC(vp));
852
853 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
854 error = checkerr(pmp, error, __func__);
855 if (error)
856 goto out;
857
858 rvap = &getattr_msg->pvnr_va;
859 /*
860 * Don't listen to the file server regarding special device
861 * size info, the file server doesn't know anything about them.
862 */
863 if (vp->v_type == VBLK || vp->v_type == VCHR)
864 rvap->va_size = vp->v_size;
865
866 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
867 if (vp->v_type == VBLK)
868 rvap->va_blocksize = BLKDEV_IOSIZE;
869 else if (vp->v_type == VCHR)
870 rvap->va_blocksize = MAXBSIZE;
871
872 (void) memcpy(vap, rvap, sizeof(struct vattr));
873 vap->va_fsid = mp->mnt_stat.f_fsidx.__fsid_val[0];
874
875 pn = VPTOPP(vp);
876 if (pn->pn_stat & PNODE_METACACHE_ATIME)
877 vap->va_atime = pn->pn_mc_atime;
878 if (pn->pn_stat & PNODE_METACACHE_CTIME)
879 vap->va_ctime = pn->pn_mc_ctime;
880 if (pn->pn_stat & PNODE_METACACHE_MTIME)
881 vap->va_mtime = pn->pn_mc_mtime;
882 if (pn->pn_stat & PNODE_METACACHE_SIZE) {
883 vap->va_size = pn->pn_mc_size;
884 } else {
885 if (rvap->va_size != VNOVAL
886 && vp->v_type != VBLK && vp->v_type != VCHR) {
887 uvm_vnp_setsize(vp, rvap->va_size);
888 pn->pn_serversize = rvap->va_size;
889 }
890 }
891
892 out:
893 PUFFS_MSG_RELEASE(getattr);
894 return error;
895 }
896
897 static int
898 dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred, int chsize)
899 {
900 PUFFS_MSG_VARS(vn, setattr);
901 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
902 struct puffs_node *pn = vp->v_data;
903 int error;
904
905 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
906 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
907 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
908 || vap->va_mode != (mode_t)VNOVAL))
909 return EROFS;
910
911 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
912 && vp->v_type == VREG && vap->va_size != VNOVAL)
913 return EROFS;
914
915 /*
916 * Flush metacache first. If we are called with some explicit
917 * parameters, treat them as information overriding metacache
918 * information.
919 */
920 if (pn->pn_stat & PNODE_METACACHE_MASK) {
921 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
922 && vap->va_atime.tv_sec == VNOVAL)
923 vap->va_atime = pn->pn_mc_atime;
924 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
925 && vap->va_ctime.tv_sec == VNOVAL)
926 vap->va_ctime = pn->pn_mc_ctime;
927 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
928 && vap->va_mtime.tv_sec == VNOVAL)
929 vap->va_mtime = pn->pn_mc_mtime;
930 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
931 && vap->va_size == VNOVAL)
932 vap->va_size = pn->pn_mc_size;
933
934 pn->pn_stat &= ~PNODE_METACACHE_MASK;
935 }
936
937 PUFFS_MSG_ALLOC(vn, setattr);
938 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
939 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
940 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
941 PUFFS_VN_SETATTR, VPTOPNC(vp));
942
943 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setattr, vp->v_data, NULL, error);
944 PUFFS_MSG_RELEASE(setattr);
945 error = checkerr(pmp, error, __func__);
946 if (error)
947 return error;
948
949 if (vap->va_size != VNOVAL) {
950 pn->pn_serversize = vap->va_size;
951 if (chsize)
952 uvm_vnp_setsize(vp, vap->va_size);
953 }
954
955 return 0;
956 }
957
958 int
959 puffs_vnop_setattr(void *v)
960 {
961 struct vop_getattr_args /* {
962 const struct vnodeop_desc *a_desc;
963 struct vnode *a_vp;
964 struct vattr *a_vap;
965 kauth_cred_t a_cred;
966 } */ *ap = v;
967
968 return dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, 1);
969 }
970
971 static __inline int
972 doinact(struct puffs_mount *pmp, int iaflag)
973 {
974
975 if (EXISTSOP(pmp, INACTIVE))
976 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
977 if (iaflag || ALLOPS(pmp))
978 return 1;
979 else
980 return 0;
981 else
982 return 1;
983 else
984 return 0;
985 }
986
987 static void
988 callinactive(struct puffs_mount *pmp, puffs_cookie_t ck, int iaflag)
989 {
990 int error;
991 PUFFS_MSG_VARS(vn, inactive);
992
993 if (doinact(pmp, iaflag)) {
994 PUFFS_MSG_ALLOC(vn, inactive);
995 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
996 PUFFS_VN_INACTIVE, ck);
997
998 PUFFS_MSG_ENQUEUEWAIT(pmp, park_inactive, error);
999 PUFFS_MSG_RELEASE(inactive);
1000 }
1001 }
1002
1003 /* XXX: callinactive can't setback */
1004 int
1005 puffs_vnop_inactive(void *v)
1006 {
1007 struct vop_inactive_args /* {
1008 const struct vnodeop_desc *a_desc;
1009 struct vnode *a_vp;
1010 } */ *ap = v;
1011 PUFFS_MSG_VARS(vn, inactive);
1012 struct vnode *vp = ap->a_vp;
1013 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1014 struct puffs_node *pnode;
1015 int error;
1016
1017 pnode = vp->v_data;
1018
1019 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1020 PUFFS_MSG_ALLOC(vn, inactive);
1021 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1022 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1023
1024 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_inactive, vp->v_data,
1025 NULL, error);
1026 PUFFS_MSG_RELEASE(inactive);
1027 }
1028 pnode->pn_stat &= ~PNODE_DOINACT;
1029
1030 /*
1031 * file server thinks it's gone? then don't be afraid care,
1032 * node's life was already all it would ever be
1033 */
1034 *ap->a_recycle = ((pnode->pn_stat & PNODE_NOREFS) != 0);
1035
1036 VOP_UNLOCK(vp, 0);
1037
1038 return 0;
1039 }
1040
1041 static void
1042 callreclaim(struct puffs_mount *pmp, puffs_cookie_t ck)
1043 {
1044 PUFFS_MSG_VARS(vn, reclaim);
1045
1046 if (!EXISTSOP(pmp, RECLAIM))
1047 return;
1048
1049 PUFFS_MSG_ALLOC(vn, reclaim);
1050 puffs_msg_setfaf(park_reclaim);
1051 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, ck);
1052
1053 puffs_msg_enqueue(pmp, park_reclaim);
1054 PUFFS_MSG_RELEASE(reclaim);
1055 }
1056
1057 /*
1058 * always FAF, we don't really care if the server wants to fail to
1059 * reclaim the node or not
1060 */
1061 int
1062 puffs_vnop_reclaim(void *v)
1063 {
1064 struct vop_reclaim_args /* {
1065 const struct vnodeop_desc *a_desc;
1066 struct vnode *a_vp;
1067 } */ *ap = v;
1068 struct vnode *vp = ap->a_vp;
1069 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1070
1071 /*
1072 * first things first: check if someone is trying to reclaim the
1073 * root vnode. do not allow that to travel to userspace.
1074 * Note that we don't need to take the lock similarly to
1075 * puffs_root(), since there is only one of us.
1076 */
1077 if (vp->v_vflag & VV_ROOT) {
1078 mutex_enter(&pmp->pmp_lock);
1079 KASSERT(pmp->pmp_root != NULL);
1080 pmp->pmp_root = NULL;
1081 mutex_exit(&pmp->pmp_lock);
1082 goto out;
1083 }
1084
1085 callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp));
1086
1087 out:
1088 if (PUFFS_USE_NAMECACHE(pmp))
1089 cache_purge(vp);
1090 puffs_putvnode(vp);
1091
1092 return 0;
1093 }
1094
1095 #define CSIZE sizeof(**ap->a_cookies)
1096 int
1097 puffs_vnop_readdir(void *v)
1098 {
1099 struct vop_readdir_args /* {
1100 const struct vnodeop_desc *a_desc;
1101 struct vnode *a_vp;
1102 struct uio *a_uio;
1103 kauth_cred_t a_cred;
1104 int *a_eofflag;
1105 off_t **a_cookies;
1106 int *a_ncookies;
1107 } */ *ap = v;
1108 PUFFS_MSG_VARS(vn, readdir);
1109 struct vnode *vp = ap->a_vp;
1110 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1111 size_t argsize, tomove, cookiemem, cookiesmax;
1112 struct uio *uio = ap->a_uio;
1113 size_t howmuch, resid;
1114 int error;
1115
1116 /*
1117 * ok, so we need: resid + cookiemem = maxreq
1118 * => resid + cookiesize * (resid/minsize) = maxreq
1119 * => resid + cookiesize/minsize * resid = maxreq
1120 * => (cookiesize/minsize + 1) * resid = maxreq
1121 * => resid = maxreq / (cookiesize/minsize + 1)
1122 *
1123 * Since cookiesize <= minsize and we're not very big on floats,
1124 * we approximate that to be 1. Therefore:
1125 *
1126 * resid = maxreq / 2;
1127 *
1128 * Well, at least we didn't have to use differential equations
1129 * or the Gram-Schmidt process.
1130 *
1131 * (yes, I'm very afraid of this)
1132 */
1133 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1134
1135 if (ap->a_cookies) {
1136 KASSERT(ap->a_ncookies != NULL);
1137 if (pmp->pmp_args.pa_fhsize == 0)
1138 return EOPNOTSUPP;
1139 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1140 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1141 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1142 } else {
1143 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1144 cookiesmax = 0;
1145 cookiemem = 0;
1146 }
1147
1148 argsize = sizeof(struct puffs_vnmsg_readdir);
1149 tomove = resid + cookiemem;
1150 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1151 (void *)&readdir_msg, 1);
1152
1153 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1154 readdir_msg->pvnr_offset = uio->uio_offset;
1155 readdir_msg->pvnr_resid = resid;
1156 readdir_msg->pvnr_ncookies = cookiesmax;
1157 readdir_msg->pvnr_eofflag = 0;
1158 readdir_msg->pvnr_dentoff = cookiemem;
1159 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1160 PUFFS_VN_READDIR, VPTOPNC(vp));
1161 puffs_msg_setdelta(park_readdir, tomove);
1162
1163 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1164 error = checkerr(pmp, error, __func__);
1165 if (error)
1166 goto out;
1167
1168 /* userspace is cheating? */
1169 if (readdir_msg->pvnr_resid > resid) {
1170 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1171 "resid grew", VPTOPNC(vp));
1172 ERROUT(EPROTO);
1173 }
1174 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1175 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1176 "too many cookies", VPTOPNC(vp));
1177 ERROUT(EPROTO);
1178 }
1179
1180 /* check eof */
1181 if (readdir_msg->pvnr_eofflag)
1182 *ap->a_eofflag = 1;
1183
1184 /* bouncy-wouncy with the directory data */
1185 howmuch = resid - readdir_msg->pvnr_resid;
1186
1187 /* force eof if no data was returned (getcwd() needs this) */
1188 if (howmuch == 0) {
1189 *ap->a_eofflag = 1;
1190 goto out;
1191 }
1192
1193 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1194 if (error)
1195 goto out;
1196
1197 /* provide cookies to caller if so desired */
1198 if (ap->a_cookies) {
1199 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1200 M_TEMP, M_WAITOK);
1201 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1202 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1203 *ap->a_ncookies*CSIZE);
1204 }
1205
1206 /* next readdir starts here */
1207 uio->uio_offset = readdir_msg->pvnr_offset;
1208
1209 out:
1210 puffs_msgmem_release(park_readdir);
1211 return error;
1212 }
1213 #undef CSIZE
1214
1215 /*
1216 * poll works by consuming the bitmask in pn_revents. If there are
1217 * events available, poll returns immediately. If not, it issues a
1218 * poll to userspace, selrecords itself and returns with no available
1219 * events. When the file server returns, it executes puffs_parkdone_poll(),
1220 * where available events are added to the bitmask. selnotify() is
1221 * then also executed by that function causing us to enter here again
1222 * and hopefully find the missing bits (unless someone got them first,
1223 * in which case it starts all over again).
1224 */
1225 int
1226 puffs_vnop_poll(void *v)
1227 {
1228 struct vop_poll_args /* {
1229 const struct vnodeop_desc *a_desc;
1230 struct vnode *a_vp;
1231 int a_events;
1232 } */ *ap = v;
1233 PUFFS_MSG_VARS(vn, poll);
1234 struct vnode *vp = ap->a_vp;
1235 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1236 struct puffs_node *pn = vp->v_data;
1237 int events, error;
1238
1239 if (EXISTSOP(pmp, POLL)) {
1240 mutex_enter(&pn->pn_mtx);
1241 events = pn->pn_revents & ap->a_events;
1242 if (events & ap->a_events) {
1243 pn->pn_revents &= ~ap->a_events;
1244 mutex_exit(&pn->pn_mtx);
1245
1246 return events;
1247 } else {
1248 puffs_referencenode(pn);
1249 mutex_exit(&pn->pn_mtx);
1250
1251 PUFFS_MSG_ALLOC(vn, poll);
1252 poll_msg->pvnr_events = ap->a_events;
1253 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1254 PUFFS_VN_POLL, VPTOPNC(vp));
1255 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1256 selrecord(curlwp, &pn->pn_sel);
1257
1258 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_poll, vp->v_data,
1259 NULL, error);
1260 PUFFS_MSG_RELEASE(poll);
1261
1262 return 0;
1263 }
1264 } else {
1265 return genfs_poll(v);
1266 }
1267 }
1268
1269 int
1270 puffs_vnop_fsync(void *v)
1271 {
1272 struct vop_fsync_args /* {
1273 const struct vnodeop_desc *a_desc;
1274 struct vnode *a_vp;
1275 kauth_cred_t a_cred;
1276 int a_flags;
1277 off_t a_offlo;
1278 off_t a_offhi;
1279 } */ *ap = v;
1280 PUFFS_MSG_VARS(vn, fsync);
1281 struct vnode *vp = ap->a_vp;
1282 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1283 struct puffs_node *pn;
1284 struct vattr va;
1285 int pflags, error, dofaf;
1286
1287 pn = VPTOPP(vp);
1288
1289 /* flush out information from our metacache, see vop_setattr */
1290 if (pn->pn_stat & PNODE_METACACHE_MASK) {
1291 vattr_null(&va);
1292 error = VOP_SETATTR(vp, &va, FSCRED);
1293 if (error)
1294 return error;
1295 }
1296
1297 /*
1298 * flush pages to avoid being overly dirty
1299 */
1300 pflags = PGO_CLEANIT;
1301 if (ap->a_flags & FSYNC_WAIT)
1302 pflags |= PGO_SYNCIO;
1303 mutex_enter(&vp->v_interlock);
1304 error = VOP_PUTPAGES(vp, trunc_page(ap->a_offlo),
1305 round_page(ap->a_offhi), pflags);
1306 if (error)
1307 return error;
1308
1309 /*
1310 * HELLO! We exit already here if the user server does not
1311 * support fsync OR if we should call fsync for a node which
1312 * has references neither in the kernel or the fs server.
1313 * Otherwise we continue to issue fsync() forward.
1314 */
1315 if (!EXISTSOP(pmp, FSYNC))
1316 return 0;
1317
1318 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1319 /*
1320 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1321 * only FAFs for those. Otherwise there's a danger of deadlock,
1322 * since the execution context here might be the user server
1323 * doing some operation on another fs, which in turn caused a
1324 * vnode to be reclaimed from the freelist for this fs.
1325 */
1326 if (dofaf == 0) {
1327 mutex_enter(&vp->v_interlock);
1328 if (vp->v_iflag & VI_XLOCK)
1329 dofaf = 1;
1330 mutex_exit(&vp->v_interlock);
1331 }
1332
1333 PUFFS_MSG_ALLOC(vn, fsync);
1334 if (dofaf)
1335 puffs_msg_setfaf(park_fsync);
1336
1337 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1338 fsync_msg->pvnr_flags = ap->a_flags;
1339 fsync_msg->pvnr_offlo = ap->a_offlo;
1340 fsync_msg->pvnr_offhi = ap->a_offhi;
1341 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1342 PUFFS_VN_FSYNC, VPTOPNC(vp));
1343
1344 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1345 PUFFS_MSG_RELEASE(fsync);
1346
1347 error = checkerr(pmp, error, __func__);
1348
1349 return error;
1350 }
1351
1352 int
1353 puffs_vnop_seek(void *v)
1354 {
1355 struct vop_seek_args /* {
1356 const struct vnodeop_desc *a_desc;
1357 struct vnode *a_vp;
1358 off_t a_oldoff;
1359 off_t a_newoff;
1360 kauth_cred_t a_cred;
1361 } */ *ap = v;
1362 PUFFS_MSG_VARS(vn, seek);
1363 struct vnode *vp = ap->a_vp;
1364 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1365 int error;
1366
1367 PUFFS_MSG_ALLOC(vn, seek);
1368 seek_msg->pvnr_oldoff = ap->a_oldoff;
1369 seek_msg->pvnr_newoff = ap->a_newoff;
1370 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1371 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1372 PUFFS_VN_SEEK, VPTOPNC(vp));
1373
1374 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1375 PUFFS_MSG_RELEASE(seek);
1376 return checkerr(pmp, error, __func__);
1377 }
1378
1379 static int
1380 callremove(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1381 struct componentname *cnp)
1382 {
1383 PUFFS_MSG_VARS(vn, remove);
1384 int error;
1385
1386 PUFFS_MSG_ALLOC(vn, remove);
1387 remove_msg->pvnr_cookie_targ = ck;
1388 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1389 cnp, PUFFS_USE_FULLPNBUF(pmp));
1390 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dck);
1391
1392 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1393 PUFFS_MSG_RELEASE(remove);
1394
1395 return checkerr(pmp, error, __func__);
1396 }
1397
1398 /*
1399 * XXX: can't use callremove now because can't catch setbacks with
1400 * it due to lack of a pnode argument.
1401 */
1402 int
1403 puffs_vnop_remove(void *v)
1404 {
1405 struct vop_remove_args /* {
1406 const struct vnodeop_desc *a_desc;
1407 struct vnode *a_dvp;
1408 struct vnode *a_vp;
1409 struct componentname *a_cnp;
1410 } */ *ap = v;
1411 PUFFS_MSG_VARS(vn, remove);
1412 struct vnode *dvp = ap->a_dvp;
1413 struct vnode *vp = ap->a_vp;
1414 struct puffs_node *dpn = VPTOPP(dvp);
1415 struct puffs_node *pn = VPTOPP(vp);
1416 struct componentname *cnp = ap->a_cnp;
1417 struct mount *mp = dvp->v_mount;
1418 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1419 int error;
1420
1421 PUFFS_MSG_ALLOC(vn, remove);
1422 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1423 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1424 cnp, PUFFS_USE_FULLPNBUF(pmp));
1425 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1426 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1427
1428 puffs_msg_enqueue(pmp, park_remove);
1429 REFPN_AND_UNLOCKVP(dvp, dpn);
1430 if (dvp == vp)
1431 REFPN(pn);
1432 else
1433 REFPN_AND_UNLOCKVP(vp, pn);
1434 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1435
1436 PUFFS_MSG_RELEASE(remove);
1437
1438 RELEPN_AND_VP(dvp, dpn);
1439 RELEPN_AND_VP(vp, pn);
1440
1441 error = checkerr(pmp, error, __func__);
1442 return error;
1443 }
1444
1445 int
1446 puffs_vnop_mkdir(void *v)
1447 {
1448 struct vop_mkdir_args /* {
1449 const struct vnodeop_desc *a_desc;
1450 struct vnode *a_dvp;
1451 struct vnode **a_vpp;
1452 struct componentname *a_cnp;
1453 struct vattr *a_vap;
1454 } */ *ap = v;
1455 PUFFS_MSG_VARS(vn, mkdir);
1456 struct vnode *dvp = ap->a_dvp;
1457 struct puffs_node *dpn = VPTOPP(dvp);
1458 struct componentname *cnp = ap->a_cnp;
1459 struct mount *mp = dvp->v_mount;
1460 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1461 int error;
1462
1463 PUFFS_MSG_ALLOC(vn, mkdir);
1464 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1465 cnp, PUFFS_USE_FULLPNBUF(pmp));
1466 mkdir_msg->pvnr_va = *ap->a_vap;
1467 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1468 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1469
1470 puffs_msg_enqueue(pmp, park_mkdir);
1471 REFPN_AND_UNLOCKVP(dvp, dpn);
1472 error = puffs_msg_wait2(pmp, park_mkdir, dpn, NULL);
1473
1474 error = checkerr(pmp, error, __func__);
1475 if (error)
1476 goto out;
1477
1478 error = puffs_newnode(mp, dvp, ap->a_vpp,
1479 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1480 if (error)
1481 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1482 mkdir_msg->pvnr_newnode, cnp);
1483
1484 out:
1485 PUFFS_MSG_RELEASE(mkdir);
1486 if (error || (cnp->cn_flags & SAVESTART) == 0)
1487 PNBUF_PUT(cnp->cn_pnbuf);
1488 RELEPN_AND_VP(dvp, dpn);
1489 return error;
1490 }
1491
1492 static int
1493 callrmdir(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1494 struct componentname *cnp)
1495 {
1496 PUFFS_MSG_VARS(vn, rmdir);
1497 int error;
1498
1499 PUFFS_MSG_ALLOC(vn, rmdir);
1500 rmdir_msg->pvnr_cookie_targ = ck;
1501 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1502 cnp, PUFFS_USE_FULLPNBUF(pmp));
1503 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dck);
1504
1505 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1506 PUFFS_MSG_RELEASE(rmdir);
1507
1508 return checkerr(pmp, error, __func__);
1509 }
1510
1511 int
1512 puffs_vnop_rmdir(void *v)
1513 {
1514 struct vop_rmdir_args /* {
1515 const struct vnodeop_desc *a_desc;
1516 struct vnode *a_dvp;
1517 struct vnode *a_vp;
1518 struct componentname *a_cnp;
1519 } */ *ap = v;
1520 PUFFS_MSG_VARS(vn, rmdir);
1521 struct vnode *dvp = ap->a_dvp;
1522 struct vnode *vp = ap->a_vp;
1523 struct puffs_node *dpn = VPTOPP(dvp);
1524 struct puffs_node *pn = VPTOPP(vp);
1525 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1526 struct componentname *cnp = ap->a_cnp;
1527 int error;
1528
1529 PUFFS_MSG_ALLOC(vn, rmdir);
1530 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1531 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1532 cnp, PUFFS_USE_FULLPNBUF(pmp));
1533 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1534 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1535
1536 puffs_msg_enqueue(pmp, park_rmdir);
1537 REFPN_AND_UNLOCKVP(dvp, dpn);
1538 REFPN_AND_UNLOCKVP(vp, pn);
1539 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1540
1541 PUFFS_MSG_RELEASE(rmdir);
1542
1543 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1544 RELEPN_AND_VP(dvp, dpn);
1545 RELEPN_AND_VP(vp, pn);
1546
1547 return error;
1548 }
1549
1550 int
1551 puffs_vnop_link(void *v)
1552 {
1553 struct vop_link_args /* {
1554 const struct vnodeop_desc *a_desc;
1555 struct vnode *a_dvp;
1556 struct vnode *a_vp;
1557 struct componentname *a_cnp;
1558 } */ *ap = v;
1559 PUFFS_MSG_VARS(vn, link);
1560 struct vnode *dvp = ap->a_dvp;
1561 struct vnode *vp = ap->a_vp;
1562 struct puffs_node *dpn = VPTOPP(dvp);
1563 struct puffs_node *pn = VPTOPP(vp);
1564 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1565 struct componentname *cnp = ap->a_cnp;
1566 int error;
1567
1568 PUFFS_MSG_ALLOC(vn, link);
1569 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
1570 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
1571 cnp, PUFFS_USE_FULLPNBUF(pmp));
1572 puffs_msg_setinfo(park_link, PUFFSOP_VN,
1573 PUFFS_VN_LINK, VPTOPNC(dvp));
1574
1575 puffs_msg_enqueue(pmp, park_link);
1576 REFPN_AND_UNLOCKVP(dvp, dpn);
1577 REFPN(pn);
1578 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
1579
1580 PUFFS_MSG_RELEASE(link);
1581
1582 error = checkerr(pmp, error, __func__);
1583
1584 /*
1585 * XXX: stay in touch with the cache. I don't like this, but
1586 * don't have a better solution either. See also puffs_rename().
1587 */
1588 if (error == 0)
1589 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
1590
1591 PNBUF_PUT(cnp->cn_pnbuf);
1592 RELEPN_AND_VP(dvp, dpn);
1593 puffs_releasenode(pn);
1594
1595 return error;
1596 }
1597
1598 int
1599 puffs_vnop_symlink(void *v)
1600 {
1601 struct vop_symlink_args /* {
1602 const struct vnodeop_desc *a_desc;
1603 struct vnode *a_dvp;
1604 struct vnode **a_vpp;
1605 struct componentname *a_cnp;
1606 struct vattr *a_vap;
1607 char *a_target;
1608 } */ *ap = v;
1609 PUFFS_MSG_VARS(vn, symlink);
1610 struct vnode *dvp = ap->a_dvp;
1611 struct puffs_node *dpn = VPTOPP(dvp);
1612 struct mount *mp = dvp->v_mount;
1613 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1614 struct componentname *cnp = ap->a_cnp;
1615 int error;
1616
1617 *ap->a_vpp = NULL;
1618
1619 PUFFS_MSG_ALLOC(vn, symlink);
1620 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
1621 cnp, PUFFS_USE_FULLPNBUF(pmp));
1622 symlink_msg->pvnr_va = *ap->a_vap;
1623 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
1624 sizeof(symlink_msg->pvnr_link));
1625 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
1626 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
1627
1628 puffs_msg_enqueue(pmp, park_symlink);
1629 REFPN_AND_UNLOCKVP(dvp, dpn);
1630 error = puffs_msg_wait2(pmp, park_symlink, dpn, NULL);
1631
1632 error = checkerr(pmp, error, __func__);
1633 if (error)
1634 goto out;
1635
1636 error = puffs_newnode(mp, dvp, ap->a_vpp,
1637 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
1638 if (error)
1639 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
1640 symlink_msg->pvnr_newnode, cnp);
1641
1642 out:
1643 PUFFS_MSG_RELEASE(symlink);
1644 if (error || (cnp->cn_flags & SAVESTART) == 0)
1645 PNBUF_PUT(cnp->cn_pnbuf);
1646 RELEPN_AND_VP(dvp, dpn);
1647
1648 return error;
1649 }
1650
1651 int
1652 puffs_vnop_readlink(void *v)
1653 {
1654 struct vop_readlink_args /* {
1655 const struct vnodeop_desc *a_desc;
1656 struct vnode *a_vp;
1657 struct uio *a_uio;
1658 kauth_cred_t a_cred;
1659 } */ *ap = v;
1660 PUFFS_MSG_VARS(vn, readlink);
1661 struct vnode *vp = ap->a_vp;
1662 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1663 size_t linklen;
1664 int error;
1665
1666 PUFFS_MSG_ALLOC(vn, readlink);
1667 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
1668 linklen = sizeof(readlink_msg->pvnr_link);
1669 readlink_msg->pvnr_linklen = linklen;
1670 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
1671 PUFFS_VN_READLINK, VPTOPNC(vp));
1672
1673 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
1674 error = checkerr(pmp, error, __func__);
1675 if (error)
1676 goto out;
1677
1678 /* bad bad user file server */
1679 if (readlink_msg->pvnr_linklen > linklen) {
1680 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
1681 "linklen too big", VPTOPNC(ap->a_vp));
1682 error = EPROTO;
1683 goto out;
1684 }
1685
1686 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
1687 ap->a_uio);
1688 out:
1689 PUFFS_MSG_RELEASE(readlink);
1690 return error;
1691 }
1692
1693 int
1694 puffs_vnop_rename(void *v)
1695 {
1696 struct vop_rename_args /* {
1697 const struct vnodeop_desc *a_desc;
1698 struct vnode *a_fdvp;
1699 struct vnode *a_fvp;
1700 struct componentname *a_fcnp;
1701 struct vnode *a_tdvp;
1702 struct vnode *a_tvp;
1703 struct componentname *a_tcnp;
1704 } */ *ap = v;
1705 PUFFS_MSG_VARS(vn, rename);
1706 struct vnode *fdvp = ap->a_fdvp;
1707 struct puffs_node *fpn = ap->a_fvp->v_data;
1708 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
1709 int error;
1710
1711 if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount)
1712 ERROUT(EXDEV);
1713
1714 PUFFS_MSG_ALLOC(vn, rename);
1715 rename_msg->pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1716 rename_msg->pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1717 if (ap->a_tvp)
1718 rename_msg->pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1719 else
1720 rename_msg->pvnr_cookie_targ = NULL;
1721 puffs_makecn(&rename_msg->pvnr_cn_src, &rename_msg->pvnr_cn_src_cred,
1722 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
1723 puffs_makecn(&rename_msg->pvnr_cn_targ, &rename_msg->pvnr_cn_targ_cred,
1724 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
1725 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
1726 PUFFS_VN_RENAME, VPTOPNC(fdvp));
1727
1728 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
1729 error = checkerr(pmp, error, __func__);
1730
1731 /*
1732 * XXX: stay in touch with the cache. I don't like this, but
1733 * don't have a better solution either. See also puffs_link().
1734 */
1735 if (error == 0)
1736 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
1737
1738 out:
1739 PUFFS_MSG_RELEASE(rename);
1740 if (ap->a_tvp != NULL)
1741 vput(ap->a_tvp);
1742 if (ap->a_tdvp == ap->a_tvp)
1743 vrele(ap->a_tdvp);
1744 else
1745 vput(ap->a_tdvp);
1746
1747 vrele(ap->a_fdvp);
1748 vrele(ap->a_fvp);
1749
1750 return error;
1751 }
1752
1753 #define RWARGS(cont, iofl, move, offset, creds) \
1754 (cont)->pvnr_ioflag = (iofl); \
1755 (cont)->pvnr_resid = (move); \
1756 (cont)->pvnr_offset = (offset); \
1757 puffs_credcvt(&(cont)->pvnr_cred, creds)
1758
1759 int
1760 puffs_vnop_read(void *v)
1761 {
1762 struct vop_read_args /* {
1763 const struct vnodeop_desc *a_desc;
1764 struct vnode *a_vp;
1765 struct uio *a_uio;
1766 int a_ioflag;
1767 kauth_cred_t a_cred;
1768 } */ *ap = v;
1769 PUFFS_MSG_VARS(vn, read);
1770 struct vnode *vp = ap->a_vp;
1771 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1772 struct uio *uio = ap->a_uio;
1773 size_t tomove, argsize;
1774 vsize_t bytelen;
1775 int error;
1776
1777 read_msg = NULL;
1778 error = 0;
1779
1780 /* std sanity */
1781 if (uio->uio_resid == 0)
1782 return 0;
1783 if (uio->uio_offset < 0)
1784 return EINVAL;
1785
1786 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1787 const int advice = IO_ADV_DECODE(ap->a_ioflag);
1788
1789 while (uio->uio_resid > 0) {
1790 bytelen = MIN(uio->uio_resid,
1791 vp->v_size - uio->uio_offset);
1792 if (bytelen == 0)
1793 break;
1794
1795 error = ubc_uiomove(&vp->v_uobj, uio, bytelen, advice,
1796 UBC_READ | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp));
1797 if (error)
1798 break;
1799 }
1800
1801 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
1802 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
1803 } else {
1804 /*
1805 * in case it's not a regular file or we're operating
1806 * uncached, do read in the old-fashioned style,
1807 * i.e. explicit read operations
1808 */
1809
1810 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1811 argsize = sizeof(struct puffs_vnmsg_read);
1812 puffs_msgmem_alloc(argsize + tomove, &park_read,
1813 (void *)&read_msg, 1);
1814
1815 error = 0;
1816 while (uio->uio_resid > 0) {
1817 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1818 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
1819 RWARGS(read_msg, ap->a_ioflag, tomove,
1820 uio->uio_offset, ap->a_cred);
1821 puffs_msg_setinfo(park_read, PUFFSOP_VN,
1822 PUFFS_VN_READ, VPTOPNC(vp));
1823 puffs_msg_setdelta(park_read, tomove);
1824
1825 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
1826 NULL, error);
1827 error = checkerr(pmp, error, __func__);
1828 if (error)
1829 break;
1830
1831 if (read_msg->pvnr_resid > tomove) {
1832 puffs_senderr(pmp, PUFFS_ERR_READ,
1833 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1834 error = EPROTO;
1835 break;
1836 }
1837
1838 error = uiomove(read_msg->pvnr_data,
1839 tomove - read_msg->pvnr_resid, uio);
1840
1841 /*
1842 * in case the file is out of juice, resid from
1843 * userspace is != 0. and the error-case is
1844 * quite obvious
1845 */
1846 if (error || read_msg->pvnr_resid)
1847 break;
1848 }
1849
1850 puffs_msgmem_release(park_read);
1851 }
1852
1853 return error;
1854 }
1855
1856 /*
1857 * XXX: in case of a failure, this leaves uio in a bad state.
1858 * We could theoretically copy the uio and iovecs and "replay"
1859 * them the right amount after the userspace trip, but don't
1860 * bother for now.
1861 */
1862 int
1863 puffs_vnop_write(void *v)
1864 {
1865 struct vop_write_args /* {
1866 const struct vnodeop_desc *a_desc;
1867 struct vnode *a_vp;
1868 struct uio *a_uio;
1869 int a_ioflag;
1870 kauth_cred_t a_cred;
1871 } */ *ap = v;
1872 PUFFS_MSG_VARS(vn, write);
1873 struct vnode *vp = ap->a_vp;
1874 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1875 struct uio *uio = ap->a_uio;
1876 size_t tomove, argsize;
1877 off_t oldoff, newoff, origoff;
1878 vsize_t bytelen;
1879 int error, uflags;
1880 int ubcflags;
1881
1882 error = uflags = 0;
1883 write_msg = NULL;
1884
1885 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1886 ubcflags = UBC_WRITE | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp);
1887
1888 /*
1889 * userspace *should* be allowed to control this,
1890 * but with UBC it's a bit unclear how to handle it
1891 */
1892 if (ap->a_ioflag & IO_APPEND)
1893 uio->uio_offset = vp->v_size;
1894
1895 origoff = uio->uio_offset;
1896 while (uio->uio_resid > 0) {
1897 uflags |= PUFFS_UPDATECTIME;
1898 uflags |= PUFFS_UPDATEMTIME;
1899 oldoff = uio->uio_offset;
1900 bytelen = uio->uio_resid;
1901
1902 newoff = oldoff + bytelen;
1903 if (vp->v_size < newoff) {
1904 uvm_vnp_setwritesize(vp, newoff);
1905 }
1906 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
1907 UVM_ADV_RANDOM, ubcflags);
1908
1909 /*
1910 * In case of a ubc_uiomove() error,
1911 * opt to not extend the file at all and
1912 * return an error. Otherwise, if we attempt
1913 * to clear the memory we couldn't fault to,
1914 * we might generate a kernel page fault.
1915 */
1916 if (vp->v_size < newoff) {
1917 if (error == 0) {
1918 uflags |= PUFFS_UPDATESIZE;
1919 uvm_vnp_setsize(vp, newoff);
1920 } else {
1921 uvm_vnp_setwritesize(vp, vp->v_size);
1922 }
1923 }
1924 if (error)
1925 break;
1926
1927 /*
1928 * If we're writing large files, flush to file server
1929 * every 64k. Otherwise we can very easily exhaust
1930 * kernel and user memory, as the file server cannot
1931 * really keep up with our writing speed.
1932 *
1933 * Note: this does *NOT* honor MNT_ASYNC, because
1934 * that gives userland too much say in the kernel.
1935 */
1936 if (oldoff >> 16 != uio->uio_offset >> 16) {
1937 mutex_enter(&vp->v_interlock);
1938 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
1939 uio->uio_offset & ~0xffff,
1940 PGO_CLEANIT | PGO_SYNCIO);
1941 if (error)
1942 break;
1943 }
1944 }
1945
1946 /* synchronous I/O? */
1947 if (error == 0 && ap->a_ioflag & IO_SYNC) {
1948 mutex_enter(&vp->v_interlock);
1949 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1950 round_page(uio->uio_offset),
1951 PGO_CLEANIT | PGO_SYNCIO);
1952
1953 /* write through page cache? */
1954 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
1955 mutex_enter(&vp->v_interlock);
1956 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1957 round_page(uio->uio_offset), PGO_CLEANIT);
1958 }
1959
1960 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
1961 } else {
1962 /* tomove is non-increasing */
1963 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1964 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
1965 puffs_msgmem_alloc(argsize, &park_write, (void *)&write_msg,1);
1966
1967 while (uio->uio_resid > 0) {
1968 /* move data to buffer */
1969 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1970 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
1971 RWARGS(write_msg, ap->a_ioflag, tomove,
1972 uio->uio_offset, ap->a_cred);
1973 error = uiomove(write_msg->pvnr_data, tomove, uio);
1974 if (error)
1975 break;
1976
1977 /* move buffer to userspace */
1978 puffs_msg_setinfo(park_write, PUFFSOP_VN,
1979 PUFFS_VN_WRITE, VPTOPNC(vp));
1980 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
1981 NULL, error);
1982 error = checkerr(pmp, error, __func__);
1983 if (error)
1984 break;
1985
1986 if (write_msg->pvnr_resid > tomove) {
1987 puffs_senderr(pmp, PUFFS_ERR_WRITE,
1988 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1989 error = EPROTO;
1990 break;
1991 }
1992
1993 /* adjust file size */
1994 if (vp->v_size < uio->uio_offset)
1995 uvm_vnp_setsize(vp, uio->uio_offset);
1996
1997 /* didn't move everything? bad userspace. bail */
1998 if (write_msg->pvnr_resid != 0) {
1999 error = EIO;
2000 break;
2001 }
2002 }
2003 puffs_msgmem_release(park_write);
2004 }
2005
2006 return error;
2007 }
2008
2009 int
2010 puffs_vnop_print(void *v)
2011 {
2012 struct vop_print_args /* {
2013 struct vnode *a_vp;
2014 } */ *ap = v;
2015 PUFFS_MSG_VARS(vn, print);
2016 struct vnode *vp = ap->a_vp;
2017 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2018 struct puffs_node *pn = vp->v_data;
2019 int error;
2020
2021 /* kernel portion */
2022 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2023 " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
2024 if (vp->v_type == VFIFO)
2025 fifo_printinfo(vp);
2026
2027 /* userspace portion */
2028 if (EXISTSOP(pmp, PRINT)) {
2029 PUFFS_MSG_ALLOC(vn, print);
2030 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2031 PUFFS_VN_PRINT, VPTOPNC(vp));
2032 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_print, vp->v_data,
2033 NULL, error);
2034 PUFFS_MSG_RELEASE(print);
2035 }
2036
2037 return 0;
2038 }
2039
2040 int
2041 puffs_vnop_pathconf(void *v)
2042 {
2043 struct vop_pathconf_args /* {
2044 const struct vnodeop_desc *a_desc;
2045 struct vnode *a_vp;
2046 int a_name;
2047 register_t *a_retval;
2048 } */ *ap = v;
2049 PUFFS_MSG_VARS(vn, pathconf);
2050 struct vnode *vp = ap->a_vp;
2051 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2052 int error;
2053
2054 PUFFS_MSG_ALLOC(vn, pathconf);
2055 pathconf_msg->pvnr_name = ap->a_name;
2056 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2057 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2058 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2059 error = checkerr(pmp, error, __func__);
2060 if (!error)
2061 *ap->a_retval = pathconf_msg->pvnr_retval;
2062 PUFFS_MSG_RELEASE(pathconf);
2063
2064 return error;
2065 }
2066
2067 int
2068 puffs_vnop_advlock(void *v)
2069 {
2070 struct vop_advlock_args /* {
2071 const struct vnodeop_desc *a_desc;
2072 struct vnode *a_vp;
2073 void *a_id;
2074 int a_op;
2075 struct flock *a_fl;
2076 int a_flags;
2077 } */ *ap = v;
2078 PUFFS_MSG_VARS(vn, advlock);
2079 struct vnode *vp = ap->a_vp;
2080 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2081 int error;
2082
2083 PUFFS_MSG_ALLOC(vn, advlock);
2084 error = copyin(ap->a_fl, &advlock_msg->pvnr_fl, sizeof(struct flock));
2085 if (error)
2086 goto out;
2087 advlock_msg->pvnr_id = ap->a_id;
2088 advlock_msg->pvnr_op = ap->a_op;
2089 advlock_msg->pvnr_flags = ap->a_flags;
2090 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2091 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2092
2093 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2094 error = checkerr(pmp, error, __func__);
2095
2096 out:
2097 PUFFS_MSG_RELEASE(advlock);
2098 return error;
2099 }
2100
2101 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2102
2103 /*
2104 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2105 */
2106 int
2107 puffs_vnop_strategy(void *v)
2108 {
2109 struct vop_strategy_args /* {
2110 const struct vnodeop_desc *a_desc;
2111 struct vnode *a_vp;
2112 struct buf *a_bp;
2113 } */ *ap = v;
2114 PUFFS_MSG_VARS(vn, rw);
2115 struct vnode *vp = ap->a_vp;
2116 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2117 struct puffs_node *pn;
2118 struct buf *bp;
2119 size_t argsize;
2120 size_t tomove, moved;
2121 int error, dofaf, dobiodone;
2122
2123 pmp = MPTOPUFFSMP(vp->v_mount);
2124 bp = ap->a_bp;
2125 error = 0;
2126 dofaf = 0;
2127 pn = VPTOPP(vp);
2128 park_rw = NULL; /* explicit */
2129 dobiodone = 1;
2130
2131 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2132 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2133 ERROUT(EOPNOTSUPP);
2134
2135 #ifdef DIAGNOSTIC
2136 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2137 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2138 bp->b_bcount);
2139 #endif
2140
2141 /*
2142 * See explanation for the necessity of a FAF in puffs_fsync.
2143 *
2144 * Also, do FAF in case we're suspending.
2145 * See puffs_vfsops.c:pageflush()
2146 */
2147 if (BUF_ISWRITE(bp)) {
2148 mutex_enter(&vp->v_interlock);
2149 if (vp->v_iflag & VI_XLOCK)
2150 dofaf = 1;
2151 if (pn->pn_stat & PNODE_SUSPEND)
2152 dofaf = 1;
2153 mutex_exit(&vp->v_interlock);
2154 }
2155
2156 #ifdef DIAGNOSTIC
2157 if (curlwp == uvm.pagedaemon_lwp)
2158 KASSERT(dofaf || BIOASYNC(bp));
2159 #endif
2160
2161 /* allocate transport structure */
2162 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2163 argsize = sizeof(struct puffs_vnmsg_rw);
2164 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2165 (void *)&rw_msg, dofaf ? 0 : 1);
2166 if (error)
2167 goto out;
2168 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2169
2170 /* 2x2 cases: read/write, faf/nofaf */
2171 if (BUF_ISREAD(bp)) {
2172 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2173 PUFFS_VN_READ, VPTOPNC(vp));
2174 puffs_msg_setdelta(park_rw, tomove);
2175 if (BIOASYNC(bp)) {
2176 puffs_msg_setcall(park_rw,
2177 puffs_parkdone_asyncbioread, bp);
2178 puffs_msg_enqueue(pmp, park_rw);
2179 dobiodone = 0;
2180 } else {
2181 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2182 NULL, error);
2183 error = checkerr(pmp, error, __func__);
2184 if (error)
2185 goto out;
2186
2187 if (rw_msg->pvnr_resid > tomove) {
2188 puffs_senderr(pmp, PUFFS_ERR_READ,
2189 E2BIG, "resid grew", VPTOPNC(vp));
2190 ERROUT(EPROTO);
2191 }
2192
2193 moved = tomove - rw_msg->pvnr_resid;
2194
2195 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2196 bp->b_resid = bp->b_bcount - moved;
2197 }
2198 } else {
2199 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2200 PUFFS_VN_WRITE, VPTOPNC(vp));
2201 /*
2202 * make pages read-only before we write them if we want
2203 * write caching info
2204 */
2205 if (PUFFS_WCACHEINFO(pmp)) {
2206 struct uvm_object *uobj = &vp->v_uobj;
2207 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2208 struct vm_page *vmp;
2209 int i;
2210
2211 for (i = 0; i < npages; i++) {
2212 vmp= uvm_pageratop((vaddr_t)bp->b_data
2213 + (i << PAGE_SHIFT));
2214 DPRINTF(("puffs_strategy: write-protecting "
2215 "vp %p page %p, offset %" PRId64"\n",
2216 vp, vmp, vmp->offset));
2217 mutex_enter(&uobj->vmobjlock);
2218 vmp->flags |= PG_RDONLY;
2219 pmap_page_protect(vmp, VM_PROT_READ);
2220 mutex_exit(&uobj->vmobjlock);
2221 }
2222 }
2223
2224 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2225 if (dofaf) {
2226 puffs_msg_setfaf(park_rw);
2227 } else if (BIOASYNC(bp)) {
2228 puffs_msg_setcall(park_rw,
2229 puffs_parkdone_asyncbiowrite, bp);
2230 dobiodone = 0;
2231 }
2232
2233 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2234
2235 if (dobiodone == 0)
2236 goto out;
2237
2238 /*
2239 * XXXXXXXX: wrong, but kernel can't survive strategy
2240 * failure currently. Here, have one more X: X.
2241 */
2242 if (error != ENOMEM)
2243 error = 0;
2244
2245 error = checkerr(pmp, error, __func__);
2246 if (error)
2247 goto out;
2248
2249 if (rw_msg->pvnr_resid > tomove) {
2250 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2251 E2BIG, "resid grew", VPTOPNC(vp));
2252 ERROUT(EPROTO);
2253 }
2254
2255 /*
2256 * FAF moved everything. Frankly, we don't
2257 * really have a choice.
2258 */
2259 if (dofaf && error == 0)
2260 moved = tomove;
2261 else
2262 moved = tomove - rw_msg->pvnr_resid;
2263
2264 bp->b_resid = bp->b_bcount - moved;
2265 if (bp->b_resid != 0) {
2266 ERROUT(EIO);
2267 }
2268 }
2269
2270 out:
2271 if (park_rw)
2272 puffs_msgmem_release(park_rw);
2273
2274 if (error)
2275 bp->b_error = error;
2276
2277 if (error || dobiodone)
2278 biodone(bp);
2279
2280 return error;
2281 }
2282
2283 int
2284 puffs_vnop_mmap(void *v)
2285 {
2286 struct vop_mmap_args /* {
2287 const struct vnodeop_desc *a_desc;
2288 struct vnode *a_vp;
2289 vm_prot_t a_prot;
2290 kauth_cred_t a_cred;
2291 } */ *ap = v;
2292 PUFFS_MSG_VARS(vn, mmap);
2293 struct vnode *vp = ap->a_vp;
2294 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2295 int error;
2296
2297 if (!PUFFS_USE_PAGECACHE(pmp))
2298 return genfs_eopnotsupp(v);
2299
2300 if (EXISTSOP(pmp, MMAP)) {
2301 PUFFS_MSG_ALLOC(vn, mmap);
2302 mmap_msg->pvnr_prot = ap->a_prot;
2303 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2304 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2305 PUFFS_VN_MMAP, VPTOPNC(vp));
2306
2307 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2308 error = checkerr(pmp, error, __func__);
2309 PUFFS_MSG_RELEASE(mmap);
2310 } else {
2311 error = genfs_mmap(v);
2312 }
2313
2314 return error;
2315 }
2316
2317
2318 /*
2319 * The rest don't get a free trip to userspace and back, they
2320 * have to stay within the kernel.
2321 */
2322
2323 /*
2324 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2325 * well, maybe somehow, somewhere, some day ....
2326 */
2327 int
2328 puffs_vnop_bmap(void *v)
2329 {
2330 struct vop_bmap_args /* {
2331 const struct vnodeop_desc *a_desc;
2332 struct vnode *a_vp;
2333 daddr_t a_bn;
2334 struct vnode **a_vpp;
2335 daddr_t *a_bnp;
2336 int *a_runp;
2337 } */ *ap = v;
2338 struct puffs_mount *pmp;
2339
2340 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2341
2342 if (ap->a_vpp)
2343 *ap->a_vpp = ap->a_vp;
2344 if (ap->a_bnp)
2345 *ap->a_bnp = ap->a_bn;
2346 if (ap->a_runp)
2347 *ap->a_runp
2348 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2349
2350 return 0;
2351 }
2352
2353 /*
2354 * Handle getpages faults in puffs. We let genfs_getpages() do most
2355 * of the dirty work, but we come in this route to do accounting tasks.
2356 * If the user server has specified functions for cache notifications
2357 * about reads and/or writes, we record which type of operation we got,
2358 * for which page range, and proceed to issue a FAF notification to the
2359 * server about it.
2360 */
2361 int
2362 puffs_vnop_getpages(void *v)
2363 {
2364 struct vop_getpages_args /* {
2365 const struct vnodeop_desc *a_desc;
2366 struct vnode *a_vp;
2367 voff_t a_offset;
2368 struct vm_page **a_m;
2369 int *a_count;
2370 int a_centeridx;
2371 vm_prot_t a_access_type;
2372 int a_advice;
2373 int a_flags;
2374 } */ *ap = v;
2375 struct puffs_mount *pmp;
2376 struct puffs_node *pn;
2377 struct vnode *vp;
2378 struct vm_page **pgs;
2379 struct puffs_cacheinfo *pcinfo = NULL;
2380 struct puffs_cacherun *pcrun;
2381 void *parkmem = NULL;
2382 size_t runsizes;
2383 int i, npages, si, streakon;
2384 int error, locked, write;
2385
2386 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2387 npages = *ap->a_count;
2388 pgs = ap->a_m;
2389 vp = ap->a_vp;
2390 pn = vp->v_data;
2391 locked = (ap->a_flags & PGO_LOCKED) != 0;
2392 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
2393
2394 /* ccg xnaht - gets Wuninitialized wrong */
2395 pcrun = NULL;
2396 runsizes = 0;
2397
2398 /*
2399 * Check that we aren't trying to fault in pages which our file
2400 * server doesn't know about. This happens if we extend a file by
2401 * skipping some pages and later try to fault in pages which
2402 * are between pn_serversize and vp_size. This check optimizes
2403 * away the common case where a file is being extended.
2404 */
2405 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
2406 struct vattr va;
2407
2408 /* try again later when we can block */
2409 if (locked)
2410 ERROUT(EBUSY);
2411
2412 mutex_exit(&vp->v_interlock);
2413 vattr_null(&va);
2414 va.va_size = vp->v_size;
2415 error = dosetattr(vp, &va, FSCRED, 0);
2416 if (error)
2417 ERROUT(error);
2418 mutex_enter(&vp->v_interlock);
2419 }
2420
2421 if (write && PUFFS_WCACHEINFO(pmp)) {
2422 #ifdef notnowjohn
2423 /* allocate worst-case memory */
2424 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
2425 pcinfo = kmem_zalloc(sizeof(struct puffs_cacheinfo) + runsize,
2426 locked ? KM_NOSLEEP : KM_SLEEP);
2427
2428 /*
2429 * can't block if we're locked and can't mess up caching
2430 * information for fs server. so come back later, please
2431 */
2432 if (pcinfo == NULL)
2433 ERROUT(ENOMEM);
2434
2435 parkmem = puffs_park_alloc(locked == 0);
2436 if (parkmem == NULL)
2437 ERROUT(ENOMEM);
2438
2439 pcrun = pcinfo->pcache_runs;
2440 #else
2441 (void)parkmem;
2442 #endif
2443 }
2444
2445 error = genfs_getpages(v);
2446 if (error)
2447 goto out;
2448
2449 if (PUFFS_WCACHEINFO(pmp) == 0)
2450 goto out;
2451
2452 /*
2453 * Let's see whose fault it was and inform the user server of
2454 * possibly read/written pages. Map pages from read faults
2455 * strictly read-only, since otherwise we might miss info on
2456 * when the page is actually write-faulted to.
2457 */
2458 if (!locked)
2459 mutex_enter(&vp->v_uobj.vmobjlock);
2460 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
2461 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
2462 if (streakon && write) {
2463 streakon = 0;
2464 pcrun[si].pcache_runend
2465 = trunc_page(pgs[i]->offset) + PAGE_MASK;
2466 si++;
2467 }
2468 continue;
2469 }
2470 if (streakon == 0 && write) {
2471 streakon = 1;
2472 pcrun[si].pcache_runstart = pgs[i]->offset;
2473 }
2474
2475 if (!write)
2476 pgs[i]->flags |= PG_RDONLY;
2477 }
2478 /* was the last page part of our streak? */
2479 if (streakon) {
2480 pcrun[si].pcache_runend
2481 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
2482 si++;
2483 }
2484 if (!locked)
2485 mutex_exit(&vp->v_uobj.vmobjlock);
2486
2487 KASSERT(si <= (npages / 2) + 1);
2488
2489 #ifdef notnowjohn
2490 /* send results to userspace */
2491 if (write)
2492 puffs_cacheop(pmp, parkmem, pcinfo,
2493 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
2494 #endif
2495
2496 out:
2497 if (error) {
2498 if (pcinfo != NULL)
2499 kmem_free(pcinfo,
2500 sizeof(struct puffs_cacheinfo) + runsizes);
2501 #ifdef notnowjohn
2502 if (parkmem != NULL)
2503 puffs_park_release(parkmem, 1);
2504 #endif
2505 }
2506
2507 return error;
2508 }
2509
2510 int
2511 puffs_vnop_lock(void *v)
2512 {
2513 struct vop_lock_args /* {
2514 struct vnode *a_vp;
2515 int a_flags;
2516 } */ *ap = v;
2517 struct vnode *vp = ap->a_vp;
2518 struct mount *mp = vp->v_mount;
2519 int flags = ap->a_flags;
2520
2521 #if 0
2522 DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
2523 #endif
2524
2525 if (flags & LK_INTERLOCK) {
2526 mutex_exit(&vp->v_interlock);
2527 flags &= ~LK_INTERLOCK;
2528 }
2529
2530 /*
2531 * XXX: this avoids deadlocking when we're suspending.
2532 * e.g. some ops holding the vnode lock might be blocked for
2533 * the vfs transaction lock so we'd deadlock.
2534 *
2535 * Now once again this is skating on the thin ice of modern life,
2536 * since we are breaking the consistency guarantee provided
2537 * _to the user server_ by vnode locking. Hopefully this will
2538 * get fixed soon enough by getting rid of the dependency on
2539 * vnode locks alltogether.
2540 */
2541 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2542 return 0;
2543 }
2544
2545 return vlockmgr(&vp->v_lock, flags);
2546 }
2547
2548 int
2549 puffs_vnop_unlock(void *v)
2550 {
2551 struct vop_unlock_args /* {
2552 struct vnode *a_vp;
2553 int a_flags;
2554 } */ *ap = v;
2555 struct vnode *vp = ap->a_vp;
2556 struct mount *mp = vp->v_mount;
2557
2558 #if 0
2559 DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
2560 #endif
2561
2562 /* XXX: see puffs_lock() */
2563 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2564 return 0;
2565 }
2566
2567 return vlockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE);
2568 }
2569
2570 int
2571 puffs_vnop_islocked(void *v)
2572 {
2573 struct vop_islocked_args *ap = v;
2574 int rv;
2575
2576 rv = vlockstatus(&ap->a_vp->v_lock);
2577 return rv;
2578 }
2579
2580
2581 /*
2582 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
2583 * FAF update information for the puffs node first.
2584 */
2585 int
2586 puffs_vnop_spec_read(void *v)
2587 {
2588 struct vop_read_args /* {
2589 const struct vnodeop_desc *a_desc;
2590 struct vnode *a_vp;
2591 struct uio *a_uio;
2592 int a_ioflag;
2593 kauth_cred_t a_cred;
2594 } */ *ap = v;
2595
2596 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2597 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
2598 }
2599
2600 int
2601 puffs_vnop_spec_write(void *v)
2602 {
2603 struct vop_write_args /* {
2604 const struct vnodeop_desc *a_desc;
2605 struct vnode *a_vp;
2606 struct uio *a_uio;
2607 int a_ioflag;
2608 kauth_cred_t a_cred;
2609 } */ *ap = v;
2610
2611 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2612 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
2613 }
2614
2615 int
2616 puffs_vnop_fifo_read(void *v)
2617 {
2618 struct vop_read_args /* {
2619 const struct vnodeop_desc *a_desc;
2620 struct vnode *a_vp;
2621 struct uio *a_uio;
2622 int a_ioflag;
2623 kauth_cred_t a_cred;
2624 } */ *ap = v;
2625
2626 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2627 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
2628 }
2629
2630 int
2631 puffs_vnop_fifo_write(void *v)
2632 {
2633 struct vop_write_args /* {
2634 const struct vnodeop_desc *a_desc;
2635 struct vnode *a_vp;
2636 struct uio *a_uio;
2637 int a_ioflag;
2638 kauth_cred_t a_cred;
2639 } */ *ap = v;
2640
2641 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2642 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
2643 }
2644