puffs_vnops.c revision 1.133 1 /* $NetBSD: puffs_vnops.c,v 1.133 2009/09/19 11:44:19 pooka Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.133 2009/09/19 11:44:19 pooka Exp $");
34
35 #include <sys/param.h>
36 #include <sys/buf.h>
37 #include <sys/fstrans.h>
38 #include <sys/malloc.h>
39 #include <sys/mount.h>
40 #include <sys/namei.h>
41 #include <sys/vnode.h>
42 #include <sys/proc.h>
43
44 #include <uvm/uvm.h>
45
46 #include <fs/puffs/puffs_msgif.h>
47 #include <fs/puffs/puffs_sys.h>
48
49 #include <miscfs/fifofs/fifo.h>
50 #include <miscfs/genfs/genfs.h>
51 #include <miscfs/specfs/specdev.h>
52
53 int puffs_vnop_lookup(void *);
54 int puffs_vnop_create(void *);
55 int puffs_vnop_access(void *);
56 int puffs_vnop_mknod(void *);
57 int puffs_vnop_open(void *);
58 int puffs_vnop_close(void *);
59 int puffs_vnop_getattr(void *);
60 int puffs_vnop_setattr(void *);
61 int puffs_vnop_reclaim(void *);
62 int puffs_vnop_readdir(void *);
63 int puffs_vnop_poll(void *);
64 int puffs_vnop_fsync(void *);
65 int puffs_vnop_seek(void *);
66 int puffs_vnop_remove(void *);
67 int puffs_vnop_mkdir(void *);
68 int puffs_vnop_rmdir(void *);
69 int puffs_vnop_link(void *);
70 int puffs_vnop_readlink(void *);
71 int puffs_vnop_symlink(void *);
72 int puffs_vnop_rename(void *);
73 int puffs_vnop_read(void *);
74 int puffs_vnop_write(void *);
75 int puffs_vnop_fcntl(void *);
76 int puffs_vnop_ioctl(void *);
77 int puffs_vnop_inactive(void *);
78 int puffs_vnop_print(void *);
79 int puffs_vnop_pathconf(void *);
80 int puffs_vnop_advlock(void *);
81 int puffs_vnop_strategy(void *);
82 int puffs_vnop_bmap(void *);
83 int puffs_vnop_mmap(void *);
84 int puffs_vnop_getpages(void *);
85
86 int puffs_vnop_spec_read(void *);
87 int puffs_vnop_spec_write(void *);
88 int puffs_vnop_fifo_read(void *);
89 int puffs_vnop_fifo_write(void *);
90
91 int puffs_vnop_checkop(void *);
92
93
94 #if 0
95 #define puffs_lock genfs_lock
96 #define puffs_unlock genfs_unlock
97 #define puffs_islocked genfs_islocked
98 #else
99 int puffs_vnop_lock(void *);
100 int puffs_vnop_unlock(void *);
101 int puffs_vnop_islocked(void *);
102 #endif
103
104 int (**puffs_vnodeop_p)(void *);
105 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
106 { &vop_default_desc, vn_default_error },
107 { &vop_lookup_desc, puffs_vnop_lookup }, /* REAL lookup */
108 { &vop_create_desc, puffs_vnop_checkop }, /* create */
109 { &vop_mknod_desc, puffs_vnop_checkop }, /* mknod */
110 { &vop_open_desc, puffs_vnop_open }, /* REAL open */
111 { &vop_close_desc, puffs_vnop_checkop }, /* close */
112 { &vop_access_desc, puffs_vnop_access }, /* REAL access */
113 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
114 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
115 { &vop_read_desc, puffs_vnop_checkop }, /* read */
116 { &vop_write_desc, puffs_vnop_checkop }, /* write */
117 { &vop_fsync_desc, puffs_vnop_fsync }, /* REAL fsync */
118 { &vop_seek_desc, puffs_vnop_checkop }, /* seek */
119 { &vop_remove_desc, puffs_vnop_checkop }, /* remove */
120 { &vop_link_desc, puffs_vnop_checkop }, /* link */
121 { &vop_rename_desc, puffs_vnop_checkop }, /* rename */
122 { &vop_mkdir_desc, puffs_vnop_checkop }, /* mkdir */
123 { &vop_rmdir_desc, puffs_vnop_checkop }, /* rmdir */
124 { &vop_symlink_desc, puffs_vnop_checkop }, /* symlink */
125 { &vop_readdir_desc, puffs_vnop_checkop }, /* readdir */
126 { &vop_readlink_desc, puffs_vnop_checkop }, /* readlink */
127 { &vop_getpages_desc, puffs_vnop_checkop }, /* getpages */
128 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
129 { &vop_pathconf_desc, puffs_vnop_checkop }, /* pathconf */
130 { &vop_advlock_desc, puffs_vnop_checkop }, /* advlock */
131 { &vop_strategy_desc, puffs_vnop_strategy }, /* REAL strategy */
132 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
133 { &vop_abortop_desc, genfs_abortop }, /* REAL abortop */
134 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
135 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
136 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
137 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
138 { &vop_bmap_desc, puffs_vnop_bmap }, /* REAL bmap */
139 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
140 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
141 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
142 { &vop_mmap_desc, puffs_vnop_mmap }, /* REAL mmap */
143 { &vop_poll_desc, puffs_vnop_poll }, /* REAL poll */
144
145 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
146 { NULL, NULL }
147 };
148 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
149 { &puffs_vnodeop_p, puffs_vnodeop_entries };
150
151
152 int (**puffs_specop_p)(void *);
153 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
154 { &vop_default_desc, vn_default_error },
155 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
156 { &vop_create_desc, spec_create }, /* genfs_badop */
157 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
158 { &vop_open_desc, spec_open }, /* spec_open */
159 { &vop_close_desc, spec_close }, /* spec_close */
160 { &vop_access_desc, puffs_vnop_checkop }, /* access */
161 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
162 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
163 { &vop_read_desc, puffs_vnop_spec_read }, /* update, read */
164 { &vop_write_desc, puffs_vnop_spec_write }, /* update, write */
165 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
166 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
167 { &vop_poll_desc, spec_poll }, /* spec_poll */
168 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
169 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
170 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
171 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
172 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
173 { &vop_remove_desc, spec_remove }, /* genfs_badop */
174 { &vop_link_desc, spec_link }, /* genfs_badop */
175 { &vop_rename_desc, spec_rename }, /* genfs_badop */
176 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
177 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
178 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
179 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
180 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
181 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
182 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
183 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
184 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
185 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
186 { &vop_bmap_desc, spec_bmap }, /* dummy */
187 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
188 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
189 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
190 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
191 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
192 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
193 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
194 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
195 #if 0
196 { &vop_openextattr_desc, _openextattr }, /* openextattr */
197 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
198 { &vop_getextattr_desc, _getextattr }, /* getextattr */
199 { &vop_setextattr_desc, _setextattr }, /* setextattr */
200 { &vop_listextattr_desc, _listextattr }, /* listextattr */
201 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
202 #endif
203 { NULL, NULL }
204 };
205 const struct vnodeopv_desc puffs_specop_opv_desc =
206 { &puffs_specop_p, puffs_specop_entries };
207
208
209 int (**puffs_fifoop_p)(void *);
210 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
211 { &vop_default_desc, vn_default_error },
212 { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
213 { &vop_create_desc, fifo_create }, /* genfs_badop */
214 { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
215 { &vop_open_desc, fifo_open }, /* open */
216 { &vop_close_desc, fifo_close }, /* close */
217 { &vop_access_desc, puffs_vnop_checkop }, /* access */
218 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
219 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
220 { &vop_read_desc, puffs_vnop_fifo_read }, /* read, update */
221 { &vop_write_desc, puffs_vnop_fifo_write }, /* write, update */
222 { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
223 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
224 { &vop_poll_desc, fifo_poll }, /* poll */
225 { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
226 { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
227 { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
228 { &vop_fsync_desc, fifo_fsync }, /* genfs_nullop*/
229 { &vop_seek_desc, fifo_seek }, /* genfs_badop */
230 { &vop_remove_desc, fifo_remove }, /* genfs_badop */
231 { &vop_link_desc, fifo_link }, /* genfs_badop */
232 { &vop_rename_desc, fifo_rename }, /* genfs_badop */
233 { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
234 { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
235 { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
236 { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
237 { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
238 { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
239 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
240 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
241 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
242 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
243 { &vop_bmap_desc, fifo_bmap }, /* dummy */
244 { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
245 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
246 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
247 { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
248 { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
249 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
250 { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
251 #if 0
252 { &vop_openextattr_desc, _openextattr }, /* openextattr */
253 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
254 { &vop_getextattr_desc, _getextattr }, /* getextattr */
255 { &vop_setextattr_desc, _setextattr }, /* setextattr */
256 { &vop_listextattr_desc, _listextattr }, /* listextattr */
257 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
258 #endif
259 { NULL, NULL }
260 };
261 const struct vnodeopv_desc puffs_fifoop_opv_desc =
262 { &puffs_fifoop_p, puffs_fifoop_entries };
263
264
265 /* "real" vnode operations */
266 int (**puffs_msgop_p)(void *);
267 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
268 { &vop_default_desc, vn_default_error },
269 { &vop_create_desc, puffs_vnop_create }, /* create */
270 { &vop_mknod_desc, puffs_vnop_mknod }, /* mknod */
271 { &vop_open_desc, puffs_vnop_open }, /* open */
272 { &vop_close_desc, puffs_vnop_close }, /* close */
273 { &vop_access_desc, puffs_vnop_access }, /* access */
274 { &vop_getattr_desc, puffs_vnop_getattr }, /* getattr */
275 { &vop_setattr_desc, puffs_vnop_setattr }, /* setattr */
276 { &vop_read_desc, puffs_vnop_read }, /* read */
277 { &vop_write_desc, puffs_vnop_write }, /* write */
278 { &vop_seek_desc, puffs_vnop_seek }, /* seek */
279 { &vop_remove_desc, puffs_vnop_remove }, /* remove */
280 { &vop_link_desc, puffs_vnop_link }, /* link */
281 { &vop_rename_desc, puffs_vnop_rename }, /* rename */
282 { &vop_mkdir_desc, puffs_vnop_mkdir }, /* mkdir */
283 { &vop_rmdir_desc, puffs_vnop_rmdir }, /* rmdir */
284 { &vop_symlink_desc, puffs_vnop_symlink }, /* symlink */
285 { &vop_readdir_desc, puffs_vnop_readdir }, /* readdir */
286 { &vop_readlink_desc, puffs_vnop_readlink }, /* readlink */
287 { &vop_print_desc, puffs_vnop_print }, /* print */
288 { &vop_islocked_desc, puffs_vnop_islocked }, /* islocked */
289 { &vop_pathconf_desc, puffs_vnop_pathconf }, /* pathconf */
290 { &vop_advlock_desc, puffs_vnop_advlock }, /* advlock */
291 { &vop_getpages_desc, puffs_vnop_getpages }, /* getpages */
292 { NULL, NULL }
293 };
294 const struct vnodeopv_desc puffs_msgop_opv_desc =
295 { &puffs_msgop_p, puffs_msgop_entries };
296
297
298 #define ERROUT(err) \
299 do { \
300 error = err; \
301 goto out; \
302 } while (/*CONSTCOND*/0)
303
304 /*
305 * This is a generic vnode operation handler. It checks if the necessary
306 * operations for the called vnode operation are implemented by userspace
307 * and either returns a dummy return value or proceeds to call the real
308 * vnode operation from puffs_msgop_v.
309 *
310 * XXX: this should described elsewhere and autogenerated, the complexity
311 * of the vnode operations vectors and their interrelationships is also
312 * getting a bit out of hand. Another problem is that we need this same
313 * information in the fs server code, so keeping the two in sync manually
314 * is not a viable (long term) plan.
315 */
316
317 /* not supported, handle locking protocol */
318 #define CHECKOP_NOTSUPP(op) \
319 case VOP_##op##_DESCOFFSET: \
320 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
321 return genfs_eopnotsupp(v); \
322 break
323
324 /* always succeed, no locking */
325 #define CHECKOP_SUCCESS(op) \
326 case VOP_##op##_DESCOFFSET: \
327 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
328 return 0; \
329 break
330
331 int
332 puffs_vnop_checkop(void *v)
333 {
334 struct vop_generic_args /* {
335 struct vnodeop_desc *a_desc;
336 spooky mystery contents;
337 } */ *ap = v;
338 struct vnodeop_desc *desc = ap->a_desc;
339 struct puffs_mount *pmp;
340 struct vnode *vp;
341 int offset, rv;
342
343 offset = ap->a_desc->vdesc_vp_offsets[0];
344 #ifdef DIAGNOSTIC
345 if (offset == VDESC_NO_OFFSET)
346 panic("puffs_checkop: no vnode, why did you call me?");
347 #endif
348 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
349 pmp = MPTOPUFFSMP(vp->v_mount);
350
351 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
352 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
353
354 if (!ALLOPS(pmp)) {
355 switch (desc->vdesc_offset) {
356 CHECKOP_NOTSUPP(CREATE);
357 CHECKOP_NOTSUPP(MKNOD);
358 CHECKOP_NOTSUPP(GETATTR);
359 CHECKOP_NOTSUPP(SETATTR);
360 CHECKOP_NOTSUPP(READ);
361 CHECKOP_NOTSUPP(WRITE);
362 CHECKOP_NOTSUPP(FCNTL);
363 CHECKOP_NOTSUPP(IOCTL);
364 CHECKOP_NOTSUPP(REMOVE);
365 CHECKOP_NOTSUPP(LINK);
366 CHECKOP_NOTSUPP(RENAME);
367 CHECKOP_NOTSUPP(MKDIR);
368 CHECKOP_NOTSUPP(RMDIR);
369 CHECKOP_NOTSUPP(SYMLINK);
370 CHECKOP_NOTSUPP(READDIR);
371 CHECKOP_NOTSUPP(READLINK);
372 CHECKOP_NOTSUPP(PRINT);
373 CHECKOP_NOTSUPP(PATHCONF);
374 CHECKOP_NOTSUPP(ADVLOCK);
375
376 CHECKOP_SUCCESS(ACCESS);
377 CHECKOP_SUCCESS(CLOSE);
378 CHECKOP_SUCCESS(SEEK);
379
380 case VOP_GETPAGES_DESCOFFSET:
381 if (!EXISTSOP(pmp, READ))
382 return genfs_eopnotsupp(v);
383 break;
384
385 default:
386 panic("puffs_checkop: unhandled vnop %d",
387 desc->vdesc_offset);
388 }
389 }
390
391 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
392
393 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
394 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
395
396 return rv;
397 }
398
399 static int callremove(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
400 struct componentname *);
401 static int callrmdir(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
402 struct componentname *);
403 static void callinactive(struct puffs_mount *, puffs_cookie_t, int);
404 static void callreclaim(struct puffs_mount *, puffs_cookie_t);
405
406 #define PUFFS_ABORT_LOOKUP 1
407 #define PUFFS_ABORT_CREATE 2
408 #define PUFFS_ABORT_MKNOD 3
409 #define PUFFS_ABORT_MKDIR 4
410 #define PUFFS_ABORT_SYMLINK 5
411
412 /*
413 * Press the pani^Wabort button! Kernel resource allocation failed.
414 */
415 static void
416 puffs_abortbutton(struct puffs_mount *pmp, int what,
417 puffs_cookie_t dck, puffs_cookie_t ck, struct componentname *cnp)
418 {
419
420 switch (what) {
421 case PUFFS_ABORT_CREATE:
422 case PUFFS_ABORT_MKNOD:
423 case PUFFS_ABORT_SYMLINK:
424 callremove(pmp, dck, ck, cnp);
425 break;
426 case PUFFS_ABORT_MKDIR:
427 callrmdir(pmp, dck, ck, cnp);
428 break;
429 }
430
431 callinactive(pmp, ck, 0);
432 callreclaim(pmp, ck);
433 }
434
435 /*
436 * Begin vnode operations.
437 *
438 * A word from the keymaster about locks: generally we don't want
439 * to use the vnode locks at all: it creates an ugly dependency between
440 * the userlandia file server and the kernel. But we'll play along with
441 * the kernel vnode locks for now. However, even currently we attempt
442 * to release locks as early as possible. This is possible for some
443 * operations which a) don't need a locked vnode after the userspace op
444 * and b) return with the vnode unlocked. Theoretically we could
445 * unlock-do op-lock for others and order the graph in userspace, but I
446 * don't want to think of the consequences for the time being.
447 */
448
449 int
450 puffs_vnop_lookup(void *v)
451 {
452 struct vop_lookup_args /* {
453 const struct vnodeop_desc *a_desc;
454 struct vnode *a_dvp;
455 struct vnode **a_vpp;
456 struct componentname *a_cnp;
457 } */ *ap = v;
458 PUFFS_MSG_VARS(vn, lookup);
459 struct puffs_mount *pmp;
460 struct componentname *cnp;
461 struct vnode *vp, *dvp;
462 struct puffs_node *dpn;
463 int isdot;
464 int error;
465
466 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
467 cnp = ap->a_cnp;
468 dvp = ap->a_dvp;
469 *ap->a_vpp = NULL;
470
471 /* r/o fs? we check create later to handle EEXIST */
472 if ((cnp->cn_flags & ISLASTCN)
473 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
474 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
475 return EROFS;
476
477 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
478
479 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
480 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
481
482 /*
483 * Check if someone fed it into the cache
484 */
485 if (PUFFS_USE_NAMECACHE(pmp)) {
486 error = cache_lookup(dvp, ap->a_vpp, cnp);
487
488 if (error >= 0)
489 return error;
490 }
491
492 if (isdot) {
493 vp = ap->a_dvp;
494 vref(vp);
495 *ap->a_vpp = vp;
496 return 0;
497 }
498
499 PUFFS_MSG_ALLOC(vn, lookup);
500 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
501 cnp, PUFFS_USE_FULLPNBUF(pmp));
502
503 if (cnp->cn_flags & ISDOTDOT)
504 VOP_UNLOCK(dvp, 0);
505
506 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
507 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
508 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
509 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
510
511 /*
512 * In case of error, there is no new vnode to play with, so be
513 * happy with the NULL value given to vpp in the beginning.
514 * Also, check if this really was an error or the target was not
515 * present. Either treat it as a non-error for CREATE/RENAME or
516 * enter the component into the negative name cache (if desired).
517 */
518 if (error) {
519 error = checkerr(pmp, error, __func__);
520 if (error == ENOENT) {
521 /* don't allow to create files on r/o fs */
522 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
523 && cnp->cn_nameiop == CREATE) {
524 error = EROFS;
525
526 /* adjust values if we are creating */
527 } else if ((cnp->cn_flags & ISLASTCN)
528 && (cnp->cn_nameiop == CREATE
529 || cnp->cn_nameiop == RENAME)) {
530 cnp->cn_flags |= SAVENAME;
531 error = EJUSTRETURN;
532
533 /* save negative cache entry */
534 } else {
535 if ((cnp->cn_flags & MAKEENTRY)
536 && PUFFS_USE_NAMECACHE(pmp))
537 cache_enter(dvp, NULL, cnp);
538 }
539 }
540 goto out;
541 }
542
543 /*
544 * Check that we don't get our parent node back, that would cause
545 * a pretty obvious deadlock.
546 */
547 dpn = dvp->v_data;
548 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
549 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
550 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
551 error = EPROTO;
552 goto out;
553 }
554
555 error = puffs_cookie2vnode(pmp, lookup_msg->pvnr_newnode, 1, 1, &vp);
556 if (error == PUFFS_NOSUCHCOOKIE) {
557 error = puffs_getvnode(dvp->v_mount,
558 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
559 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
560 if (error) {
561 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
562 lookup_msg->pvnr_newnode, ap->a_cnp);
563 goto out;
564 }
565 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
566 } else if (error) {
567 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
568 lookup_msg->pvnr_newnode, ap->a_cnp);
569 goto out;
570 }
571
572 *ap->a_vpp = vp;
573
574 if ((cnp->cn_flags & MAKEENTRY) != 0 && PUFFS_USE_NAMECACHE(pmp))
575 cache_enter(dvp, vp, cnp);
576
577 /* XXX */
578 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
579 cnp->cn_flags &= ~REQUIREDIR;
580 if (lookup_msg->pvnr_cn.pkcn_consume)
581 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
582 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
583
584 /*
585 * We need the name in remove and rmdir (well, rename too, but
586 * SAVESTART takes care of that)
587 */
588 if (cnp->cn_nameiop == DELETE)
589 cnp->cn_flags |= SAVENAME;
590
591 out:
592 if (cnp->cn_flags & ISDOTDOT)
593 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
594
595 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
596 PUFFS_MSG_RELEASE(lookup);
597 return error;
598 }
599
600 #define REFPN_AND_UNLOCKVP(a, b) \
601 do { \
602 mutex_enter(&b->pn_mtx); \
603 puffs_referencenode(b); \
604 mutex_exit(&b->pn_mtx); \
605 VOP_UNLOCK(a, 0); \
606 } while (/*CONSTCOND*/0)
607
608 #define REFPN(b) \
609 do { \
610 mutex_enter(&b->pn_mtx); \
611 puffs_referencenode(b); \
612 mutex_exit(&b->pn_mtx); \
613 } while (/*CONSTCOND*/0)
614
615 #define RELEPN_AND_VP(a, b) \
616 do { \
617 puffs_releasenode(b); \
618 vrele(a); \
619 } while (/*CONSTCOND*/0)
620
621 int
622 puffs_vnop_create(void *v)
623 {
624 struct vop_create_args /* {
625 const struct vnodeop_desc *a_desc;
626 struct vnode *a_dvp;
627 struct vnode **a_vpp;
628 struct componentname *a_cnp;
629 struct vattr *a_vap;
630 } */ *ap = v;
631 PUFFS_MSG_VARS(vn, create);
632 struct vnode *dvp = ap->a_dvp;
633 struct puffs_node *dpn = VPTOPP(dvp);
634 struct componentname *cnp = ap->a_cnp;
635 struct mount *mp = dvp->v_mount;
636 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
637 int error;
638
639 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
640 dvp, ap->a_cnp->cn_nameptr));
641
642 PUFFS_MSG_ALLOC(vn, create);
643 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
644 cnp, PUFFS_USE_FULLPNBUF(pmp));
645 create_msg->pvnr_va = *ap->a_vap;
646 puffs_msg_setinfo(park_create, PUFFSOP_VN,
647 PUFFS_VN_CREATE, VPTOPNC(dvp));
648
649 /*
650 * Do the dance:
651 * + insert into queue ("interlock")
652 * + unlock vnode
653 * + wait for response
654 */
655 puffs_msg_enqueue(pmp, park_create);
656 REFPN_AND_UNLOCKVP(dvp, dpn);
657 error = puffs_msg_wait2(pmp, park_create, dpn, NULL);
658
659 error = checkerr(pmp, error, __func__);
660 if (error)
661 goto out;
662
663 error = puffs_newnode(mp, dvp, ap->a_vpp,
664 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
665 if (error)
666 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
667 create_msg->pvnr_newnode, cnp);
668
669 out:
670 if (error || (cnp->cn_flags & SAVESTART) == 0)
671 PNBUF_PUT(cnp->cn_pnbuf);
672
673 RELEPN_AND_VP(dvp, dpn);
674 DPRINTF(("puffs_create: return %d\n", error));
675 PUFFS_MSG_RELEASE(create);
676 return error;
677 }
678
679 int
680 puffs_vnop_mknod(void *v)
681 {
682 struct vop_mknod_args /* {
683 const struct vnodeop_desc *a_desc;
684 struct vnode *a_dvp;
685 struct vnode **a_vpp;
686 struct componentname *a_cnp;
687 struct vattr *a_vap;
688 } */ *ap = v;
689 PUFFS_MSG_VARS(vn, mknod);
690 struct vnode *dvp = ap->a_dvp;
691 struct puffs_node *dpn = VPTOPP(dvp);
692 struct componentname *cnp = ap->a_cnp;
693 struct mount *mp = dvp->v_mount;
694 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
695 int error;
696
697 PUFFS_MSG_ALLOC(vn, mknod);
698 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
699 cnp, PUFFS_USE_FULLPNBUF(pmp));
700 mknod_msg->pvnr_va = *ap->a_vap;
701 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
702 PUFFS_VN_MKNOD, VPTOPNC(dvp));
703
704 puffs_msg_enqueue(pmp, park_mknod);
705 REFPN_AND_UNLOCKVP(dvp, dpn);
706 error = puffs_msg_wait2(pmp, park_mknod, dpn, NULL);
707
708 error = checkerr(pmp, error, __func__);
709 if (error)
710 goto out;
711
712 error = puffs_newnode(mp, dvp, ap->a_vpp,
713 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
714 ap->a_vap->va_rdev);
715 if (error)
716 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
717 mknod_msg->pvnr_newnode, cnp);
718
719 out:
720 PUFFS_MSG_RELEASE(mknod);
721 if (error || (cnp->cn_flags & SAVESTART) == 0)
722 PNBUF_PUT(cnp->cn_pnbuf);
723 RELEPN_AND_VP(dvp, dpn);
724 return error;
725 }
726
727 int
728 puffs_vnop_open(void *v)
729 {
730 struct vop_open_args /* {
731 const struct vnodeop_desc *a_desc;
732 struct vnode *a_vp;
733 int a_mode;
734 kauth_cred_t a_cred;
735 } */ *ap = v;
736 PUFFS_MSG_VARS(vn, open);
737 struct vnode *vp = ap->a_vp;
738 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
739 int mode = ap->a_mode;
740 int error;
741
742 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
743
744 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
745 ERROUT(EROFS);
746
747 if (!EXISTSOP(pmp, OPEN))
748 ERROUT(0);
749
750 PUFFS_MSG_ALLOC(vn, open);
751 open_msg->pvnr_mode = mode;
752 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
753 puffs_msg_setinfo(park_open, PUFFSOP_VN,
754 PUFFS_VN_OPEN, VPTOPNC(vp));
755
756 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
757 error = checkerr(pmp, error, __func__);
758
759 out:
760 DPRINTF(("puffs_open: returning %d\n", error));
761 PUFFS_MSG_RELEASE(open);
762 return error;
763 }
764
765 int
766 puffs_vnop_close(void *v)
767 {
768 struct vop_close_args /* {
769 const struct vnodeop_desc *a_desc;
770 struct vnode *a_vp;
771 int a_fflag;
772 kauth_cred_t a_cred;
773 } */ *ap = v;
774 PUFFS_MSG_VARS(vn, close);
775 struct vnode *vp = ap->a_vp;
776 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
777
778 PUFFS_MSG_ALLOC(vn, close);
779 puffs_msg_setfaf(park_close);
780 close_msg->pvnr_fflag = ap->a_fflag;
781 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
782 puffs_msg_setinfo(park_close, PUFFSOP_VN,
783 PUFFS_VN_CLOSE, VPTOPNC(vp));
784
785 puffs_msg_enqueue(pmp, park_close);
786 PUFFS_MSG_RELEASE(close);
787 return 0;
788 }
789
790 int
791 puffs_vnop_access(void *v)
792 {
793 struct vop_access_args /* {
794 const struct vnodeop_desc *a_desc;
795 struct vnode *a_vp;
796 int a_mode;
797 kauth_cred_t a_cred;
798 } */ *ap = v;
799 PUFFS_MSG_VARS(vn, access);
800 struct vnode *vp = ap->a_vp;
801 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
802 int mode = ap->a_mode;
803 int error;
804
805 if (mode & VWRITE) {
806 switch (vp->v_type) {
807 case VDIR:
808 case VLNK:
809 case VREG:
810 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
811 || !EXISTSOP(pmp, WRITE))
812 return EROFS;
813 break;
814 default:
815 break;
816 }
817 }
818
819 if (!EXISTSOP(pmp, ACCESS))
820 return 0;
821
822 PUFFS_MSG_ALLOC(vn, access);
823 access_msg->pvnr_mode = ap->a_mode;
824 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
825 puffs_msg_setinfo(park_access, PUFFSOP_VN,
826 PUFFS_VN_ACCESS, VPTOPNC(vp));
827
828 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
829 error = checkerr(pmp, error, __func__);
830 PUFFS_MSG_RELEASE(access);
831
832 return error;
833 }
834
835 int
836 puffs_vnop_getattr(void *v)
837 {
838 struct vop_getattr_args /* {
839 const struct vnodeop_desc *a_desc;
840 struct vnode *a_vp;
841 struct vattr *a_vap;
842 kauth_cred_t a_cred;
843 } */ *ap = v;
844 PUFFS_MSG_VARS(vn, getattr);
845 struct vnode *vp = ap->a_vp;
846 struct mount *mp = vp->v_mount;
847 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
848 struct vattr *vap, *rvap;
849 struct puffs_node *pn;
850 int error = 0;
851
852 vap = ap->a_vap;
853
854 PUFFS_MSG_ALLOC(vn, getattr);
855 vattr_null(&getattr_msg->pvnr_va);
856 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
857 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
858 PUFFS_VN_GETATTR, VPTOPNC(vp));
859
860 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
861 error = checkerr(pmp, error, __func__);
862 if (error)
863 goto out;
864
865 rvap = &getattr_msg->pvnr_va;
866 /*
867 * Don't listen to the file server regarding special device
868 * size info, the file server doesn't know anything about them.
869 */
870 if (vp->v_type == VBLK || vp->v_type == VCHR)
871 rvap->va_size = vp->v_size;
872
873 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
874 if (vp->v_type == VBLK)
875 rvap->va_blocksize = BLKDEV_IOSIZE;
876 else if (vp->v_type == VCHR)
877 rvap->va_blocksize = MAXBSIZE;
878
879 (void) memcpy(vap, rvap, sizeof(struct vattr));
880 vap->va_fsid = mp->mnt_stat.f_fsidx.__fsid_val[0];
881
882 pn = VPTOPP(vp);
883 if (pn->pn_stat & PNODE_METACACHE_ATIME)
884 vap->va_atime = pn->pn_mc_atime;
885 if (pn->pn_stat & PNODE_METACACHE_CTIME)
886 vap->va_ctime = pn->pn_mc_ctime;
887 if (pn->pn_stat & PNODE_METACACHE_MTIME)
888 vap->va_mtime = pn->pn_mc_mtime;
889 if (pn->pn_stat & PNODE_METACACHE_SIZE) {
890 vap->va_size = pn->pn_mc_size;
891 } else {
892 if (rvap->va_size != VNOVAL
893 && vp->v_type != VBLK && vp->v_type != VCHR) {
894 uvm_vnp_setsize(vp, rvap->va_size);
895 pn->pn_serversize = rvap->va_size;
896 }
897 }
898
899 out:
900 PUFFS_MSG_RELEASE(getattr);
901 return error;
902 }
903
904 static int
905 dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred, int chsize)
906 {
907 PUFFS_MSG_VARS(vn, setattr);
908 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
909 struct puffs_node *pn = vp->v_data;
910 int error;
911
912 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
913 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
914 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
915 || vap->va_mode != (mode_t)VNOVAL))
916 return EROFS;
917
918 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
919 && vp->v_type == VREG && vap->va_size != VNOVAL)
920 return EROFS;
921
922 /*
923 * Flush metacache first. If we are called with some explicit
924 * parameters, treat them as information overriding metacache
925 * information.
926 */
927 if (pn->pn_stat & PNODE_METACACHE_MASK) {
928 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
929 && vap->va_atime.tv_sec == VNOVAL)
930 vap->va_atime = pn->pn_mc_atime;
931 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
932 && vap->va_ctime.tv_sec == VNOVAL)
933 vap->va_ctime = pn->pn_mc_ctime;
934 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
935 && vap->va_mtime.tv_sec == VNOVAL)
936 vap->va_mtime = pn->pn_mc_mtime;
937 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
938 && vap->va_size == VNOVAL)
939 vap->va_size = pn->pn_mc_size;
940
941 pn->pn_stat &= ~PNODE_METACACHE_MASK;
942 }
943
944 PUFFS_MSG_ALLOC(vn, setattr);
945 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
946 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
947 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
948 PUFFS_VN_SETATTR, VPTOPNC(vp));
949
950 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setattr, vp->v_data, NULL, error);
951 PUFFS_MSG_RELEASE(setattr);
952 error = checkerr(pmp, error, __func__);
953 if (error)
954 return error;
955
956 if (vap->va_size != VNOVAL) {
957 pn->pn_serversize = vap->va_size;
958 if (chsize)
959 uvm_vnp_setsize(vp, vap->va_size);
960 }
961
962 return 0;
963 }
964
965 int
966 puffs_vnop_setattr(void *v)
967 {
968 struct vop_getattr_args /* {
969 const struct vnodeop_desc *a_desc;
970 struct vnode *a_vp;
971 struct vattr *a_vap;
972 kauth_cred_t a_cred;
973 } */ *ap = v;
974
975 return dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, 1);
976 }
977
978 static __inline int
979 doinact(struct puffs_mount *pmp, int iaflag)
980 {
981
982 if (EXISTSOP(pmp, INACTIVE))
983 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
984 if (iaflag || ALLOPS(pmp))
985 return 1;
986 else
987 return 0;
988 else
989 return 1;
990 else
991 return 0;
992 }
993
994 static void
995 callinactive(struct puffs_mount *pmp, puffs_cookie_t ck, int iaflag)
996 {
997 int error;
998 PUFFS_MSG_VARS(vn, inactive);
999
1000 if (doinact(pmp, iaflag)) {
1001 PUFFS_MSG_ALLOC(vn, inactive);
1002 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1003 PUFFS_VN_INACTIVE, ck);
1004
1005 PUFFS_MSG_ENQUEUEWAIT(pmp, park_inactive, error);
1006 PUFFS_MSG_RELEASE(inactive);
1007 }
1008 }
1009
1010 /* XXX: callinactive can't setback */
1011 int
1012 puffs_vnop_inactive(void *v)
1013 {
1014 struct vop_inactive_args /* {
1015 const struct vnodeop_desc *a_desc;
1016 struct vnode *a_vp;
1017 } */ *ap = v;
1018 PUFFS_MSG_VARS(vn, inactive);
1019 struct vnode *vp = ap->a_vp;
1020 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1021 struct puffs_node *pnode;
1022 int error;
1023
1024 pnode = vp->v_data;
1025
1026 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1027 PUFFS_MSG_ALLOC(vn, inactive);
1028 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1029 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1030
1031 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_inactive, vp->v_data,
1032 NULL, error);
1033 PUFFS_MSG_RELEASE(inactive);
1034 }
1035 pnode->pn_stat &= ~PNODE_DOINACT;
1036
1037 /*
1038 * file server thinks it's gone? then don't be afraid care,
1039 * node's life was already all it would ever be
1040 */
1041 *ap->a_recycle = ((pnode->pn_stat & PNODE_NOREFS) != 0);
1042
1043 VOP_UNLOCK(vp, 0);
1044
1045 return 0;
1046 }
1047
1048 static void
1049 callreclaim(struct puffs_mount *pmp, puffs_cookie_t ck)
1050 {
1051 PUFFS_MSG_VARS(vn, reclaim);
1052
1053 if (!EXISTSOP(pmp, RECLAIM))
1054 return;
1055
1056 PUFFS_MSG_ALLOC(vn, reclaim);
1057 puffs_msg_setfaf(park_reclaim);
1058 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, ck);
1059
1060 puffs_msg_enqueue(pmp, park_reclaim);
1061 PUFFS_MSG_RELEASE(reclaim);
1062 }
1063
1064 /*
1065 * always FAF, we don't really care if the server wants to fail to
1066 * reclaim the node or not
1067 */
1068 int
1069 puffs_vnop_reclaim(void *v)
1070 {
1071 struct vop_reclaim_args /* {
1072 const struct vnodeop_desc *a_desc;
1073 struct vnode *a_vp;
1074 } */ *ap = v;
1075 struct vnode *vp = ap->a_vp;
1076 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1077
1078 /*
1079 * first things first: check if someone is trying to reclaim the
1080 * root vnode. do not allow that to travel to userspace.
1081 * Note that we don't need to take the lock similarly to
1082 * puffs_root(), since there is only one of us.
1083 */
1084 if (vp->v_vflag & VV_ROOT) {
1085 mutex_enter(&pmp->pmp_lock);
1086 KASSERT(pmp->pmp_root != NULL);
1087 pmp->pmp_root = NULL;
1088 mutex_exit(&pmp->pmp_lock);
1089 goto out;
1090 }
1091
1092 callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp));
1093
1094 out:
1095 if (PUFFS_USE_NAMECACHE(pmp))
1096 cache_purge(vp);
1097 puffs_putvnode(vp);
1098
1099 return 0;
1100 }
1101
1102 #define CSIZE sizeof(**ap->a_cookies)
1103 int
1104 puffs_vnop_readdir(void *v)
1105 {
1106 struct vop_readdir_args /* {
1107 const struct vnodeop_desc *a_desc;
1108 struct vnode *a_vp;
1109 struct uio *a_uio;
1110 kauth_cred_t a_cred;
1111 int *a_eofflag;
1112 off_t **a_cookies;
1113 int *a_ncookies;
1114 } */ *ap = v;
1115 PUFFS_MSG_VARS(vn, readdir);
1116 struct vnode *vp = ap->a_vp;
1117 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1118 size_t argsize, tomove, cookiemem, cookiesmax;
1119 struct uio *uio = ap->a_uio;
1120 size_t howmuch, resid;
1121 int error;
1122
1123 /*
1124 * ok, so we need: resid + cookiemem = maxreq
1125 * => resid + cookiesize * (resid/minsize) = maxreq
1126 * => resid + cookiesize/minsize * resid = maxreq
1127 * => (cookiesize/minsize + 1) * resid = maxreq
1128 * => resid = maxreq / (cookiesize/minsize + 1)
1129 *
1130 * Since cookiesize <= minsize and we're not very big on floats,
1131 * we approximate that to be 1. Therefore:
1132 *
1133 * resid = maxreq / 2;
1134 *
1135 * Well, at least we didn't have to use differential equations
1136 * or the Gram-Schmidt process.
1137 *
1138 * (yes, I'm very afraid of this)
1139 */
1140 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1141
1142 if (ap->a_cookies) {
1143 KASSERT(ap->a_ncookies != NULL);
1144 if (pmp->pmp_args.pa_fhsize == 0)
1145 return EOPNOTSUPP;
1146 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1147 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1148 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1149 } else {
1150 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1151 cookiesmax = 0;
1152 cookiemem = 0;
1153 }
1154
1155 argsize = sizeof(struct puffs_vnmsg_readdir);
1156 tomove = resid + cookiemem;
1157 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1158 (void *)&readdir_msg, 1);
1159
1160 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1161 readdir_msg->pvnr_offset = uio->uio_offset;
1162 readdir_msg->pvnr_resid = resid;
1163 readdir_msg->pvnr_ncookies = cookiesmax;
1164 readdir_msg->pvnr_eofflag = 0;
1165 readdir_msg->pvnr_dentoff = cookiemem;
1166 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1167 PUFFS_VN_READDIR, VPTOPNC(vp));
1168 puffs_msg_setdelta(park_readdir, tomove);
1169
1170 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1171 error = checkerr(pmp, error, __func__);
1172 if (error)
1173 goto out;
1174
1175 /* userspace is cheating? */
1176 if (readdir_msg->pvnr_resid > resid) {
1177 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1178 "resid grew", VPTOPNC(vp));
1179 ERROUT(EPROTO);
1180 }
1181 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1182 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1183 "too many cookies", VPTOPNC(vp));
1184 ERROUT(EPROTO);
1185 }
1186
1187 /* check eof */
1188 if (readdir_msg->pvnr_eofflag)
1189 *ap->a_eofflag = 1;
1190
1191 /* bouncy-wouncy with the directory data */
1192 howmuch = resid - readdir_msg->pvnr_resid;
1193
1194 /* force eof if no data was returned (getcwd() needs this) */
1195 if (howmuch == 0) {
1196 *ap->a_eofflag = 1;
1197 goto out;
1198 }
1199
1200 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1201 if (error)
1202 goto out;
1203
1204 /* provide cookies to caller if so desired */
1205 if (ap->a_cookies) {
1206 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1207 M_TEMP, M_WAITOK);
1208 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1209 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1210 *ap->a_ncookies*CSIZE);
1211 }
1212
1213 /* next readdir starts here */
1214 uio->uio_offset = readdir_msg->pvnr_offset;
1215
1216 out:
1217 puffs_msgmem_release(park_readdir);
1218 return error;
1219 }
1220 #undef CSIZE
1221
1222 /*
1223 * poll works by consuming the bitmask in pn_revents. If there are
1224 * events available, poll returns immediately. If not, it issues a
1225 * poll to userspace, selrecords itself and returns with no available
1226 * events. When the file server returns, it executes puffs_parkdone_poll(),
1227 * where available events are added to the bitmask. selnotify() is
1228 * then also executed by that function causing us to enter here again
1229 * and hopefully find the missing bits (unless someone got them first,
1230 * in which case it starts all over again).
1231 */
1232 int
1233 puffs_vnop_poll(void *v)
1234 {
1235 struct vop_poll_args /* {
1236 const struct vnodeop_desc *a_desc;
1237 struct vnode *a_vp;
1238 int a_events;
1239 } */ *ap = v;
1240 PUFFS_MSG_VARS(vn, poll);
1241 struct vnode *vp = ap->a_vp;
1242 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1243 struct puffs_node *pn = vp->v_data;
1244 int events, error;
1245
1246 if (EXISTSOP(pmp, POLL)) {
1247 mutex_enter(&pn->pn_mtx);
1248 events = pn->pn_revents & ap->a_events;
1249 if (events & ap->a_events) {
1250 pn->pn_revents &= ~ap->a_events;
1251 mutex_exit(&pn->pn_mtx);
1252
1253 return events;
1254 } else {
1255 puffs_referencenode(pn);
1256 mutex_exit(&pn->pn_mtx);
1257
1258 PUFFS_MSG_ALLOC(vn, poll);
1259 poll_msg->pvnr_events = ap->a_events;
1260 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1261 PUFFS_VN_POLL, VPTOPNC(vp));
1262 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1263 selrecord(curlwp, &pn->pn_sel);
1264
1265 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_poll, vp->v_data,
1266 NULL, error);
1267 PUFFS_MSG_RELEASE(poll);
1268
1269 return 0;
1270 }
1271 } else {
1272 return genfs_poll(v);
1273 }
1274 }
1275
1276 int
1277 puffs_vnop_fsync(void *v)
1278 {
1279 struct vop_fsync_args /* {
1280 const struct vnodeop_desc *a_desc;
1281 struct vnode *a_vp;
1282 kauth_cred_t a_cred;
1283 int a_flags;
1284 off_t a_offlo;
1285 off_t a_offhi;
1286 } */ *ap = v;
1287 PUFFS_MSG_VARS(vn, fsync);
1288 struct vnode *vp = ap->a_vp;
1289 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1290 struct puffs_node *pn;
1291 struct vattr va;
1292 int pflags, error, dofaf;
1293
1294 pn = VPTOPP(vp);
1295
1296 /* flush out information from our metacache, see vop_setattr */
1297 if (pn->pn_stat & PNODE_METACACHE_MASK) {
1298 vattr_null(&va);
1299 error = VOP_SETATTR(vp, &va, FSCRED);
1300 if (error)
1301 return error;
1302 }
1303
1304 /*
1305 * flush pages to avoid being overly dirty
1306 */
1307 pflags = PGO_CLEANIT;
1308 if (ap->a_flags & FSYNC_WAIT)
1309 pflags |= PGO_SYNCIO;
1310 mutex_enter(&vp->v_interlock);
1311 error = VOP_PUTPAGES(vp, trunc_page(ap->a_offlo),
1312 round_page(ap->a_offhi), pflags);
1313 if (error)
1314 return error;
1315
1316 /*
1317 * HELLO! We exit already here if the user server does not
1318 * support fsync OR if we should call fsync for a node which
1319 * has references neither in the kernel or the fs server.
1320 * Otherwise we continue to issue fsync() forward.
1321 */
1322 if (!EXISTSOP(pmp, FSYNC))
1323 return 0;
1324
1325 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1326 /*
1327 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1328 * only FAFs for those. Otherwise there's a danger of deadlock,
1329 * since the execution context here might be the user server
1330 * doing some operation on another fs, which in turn caused a
1331 * vnode to be reclaimed from the freelist for this fs.
1332 */
1333 if (dofaf == 0) {
1334 mutex_enter(&vp->v_interlock);
1335 if (vp->v_iflag & VI_XLOCK)
1336 dofaf = 1;
1337 mutex_exit(&vp->v_interlock);
1338 }
1339
1340 PUFFS_MSG_ALLOC(vn, fsync);
1341 if (dofaf)
1342 puffs_msg_setfaf(park_fsync);
1343
1344 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1345 fsync_msg->pvnr_flags = ap->a_flags;
1346 fsync_msg->pvnr_offlo = ap->a_offlo;
1347 fsync_msg->pvnr_offhi = ap->a_offhi;
1348 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1349 PUFFS_VN_FSYNC, VPTOPNC(vp));
1350
1351 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1352 PUFFS_MSG_RELEASE(fsync);
1353
1354 error = checkerr(pmp, error, __func__);
1355
1356 return error;
1357 }
1358
1359 int
1360 puffs_vnop_seek(void *v)
1361 {
1362 struct vop_seek_args /* {
1363 const struct vnodeop_desc *a_desc;
1364 struct vnode *a_vp;
1365 off_t a_oldoff;
1366 off_t a_newoff;
1367 kauth_cred_t a_cred;
1368 } */ *ap = v;
1369 PUFFS_MSG_VARS(vn, seek);
1370 struct vnode *vp = ap->a_vp;
1371 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1372 int error;
1373
1374 PUFFS_MSG_ALLOC(vn, seek);
1375 seek_msg->pvnr_oldoff = ap->a_oldoff;
1376 seek_msg->pvnr_newoff = ap->a_newoff;
1377 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1378 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1379 PUFFS_VN_SEEK, VPTOPNC(vp));
1380
1381 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1382 PUFFS_MSG_RELEASE(seek);
1383 return checkerr(pmp, error, __func__);
1384 }
1385
1386 static int
1387 callremove(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1388 struct componentname *cnp)
1389 {
1390 PUFFS_MSG_VARS(vn, remove);
1391 int error;
1392
1393 PUFFS_MSG_ALLOC(vn, remove);
1394 remove_msg->pvnr_cookie_targ = ck;
1395 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1396 cnp, PUFFS_USE_FULLPNBUF(pmp));
1397 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dck);
1398
1399 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1400 PUFFS_MSG_RELEASE(remove);
1401
1402 return checkerr(pmp, error, __func__);
1403 }
1404
1405 /*
1406 * XXX: can't use callremove now because can't catch setbacks with
1407 * it due to lack of a pnode argument.
1408 */
1409 int
1410 puffs_vnop_remove(void *v)
1411 {
1412 struct vop_remove_args /* {
1413 const struct vnodeop_desc *a_desc;
1414 struct vnode *a_dvp;
1415 struct vnode *a_vp;
1416 struct componentname *a_cnp;
1417 } */ *ap = v;
1418 PUFFS_MSG_VARS(vn, remove);
1419 struct vnode *dvp = ap->a_dvp;
1420 struct vnode *vp = ap->a_vp;
1421 struct puffs_node *dpn = VPTOPP(dvp);
1422 struct puffs_node *pn = VPTOPP(vp);
1423 struct componentname *cnp = ap->a_cnp;
1424 struct mount *mp = dvp->v_mount;
1425 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1426 int error;
1427
1428 PUFFS_MSG_ALLOC(vn, remove);
1429 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1430 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1431 cnp, PUFFS_USE_FULLPNBUF(pmp));
1432 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1433 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1434
1435 puffs_msg_enqueue(pmp, park_remove);
1436 REFPN_AND_UNLOCKVP(dvp, dpn);
1437 if (dvp == vp)
1438 REFPN(pn);
1439 else
1440 REFPN_AND_UNLOCKVP(vp, pn);
1441 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1442
1443 PUFFS_MSG_RELEASE(remove);
1444
1445 RELEPN_AND_VP(dvp, dpn);
1446 RELEPN_AND_VP(vp, pn);
1447
1448 error = checkerr(pmp, error, __func__);
1449 if (error || (cnp->cn_flags & SAVESTART) == 0)
1450 PNBUF_PUT(cnp->cn_pnbuf);
1451 return error;
1452 }
1453
1454 int
1455 puffs_vnop_mkdir(void *v)
1456 {
1457 struct vop_mkdir_args /* {
1458 const struct vnodeop_desc *a_desc;
1459 struct vnode *a_dvp;
1460 struct vnode **a_vpp;
1461 struct componentname *a_cnp;
1462 struct vattr *a_vap;
1463 } */ *ap = v;
1464 PUFFS_MSG_VARS(vn, mkdir);
1465 struct vnode *dvp = ap->a_dvp;
1466 struct puffs_node *dpn = VPTOPP(dvp);
1467 struct componentname *cnp = ap->a_cnp;
1468 struct mount *mp = dvp->v_mount;
1469 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1470 int error;
1471
1472 PUFFS_MSG_ALLOC(vn, mkdir);
1473 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1474 cnp, PUFFS_USE_FULLPNBUF(pmp));
1475 mkdir_msg->pvnr_va = *ap->a_vap;
1476 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1477 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1478
1479 puffs_msg_enqueue(pmp, park_mkdir);
1480 REFPN_AND_UNLOCKVP(dvp, dpn);
1481 error = puffs_msg_wait2(pmp, park_mkdir, dpn, NULL);
1482
1483 error = checkerr(pmp, error, __func__);
1484 if (error)
1485 goto out;
1486
1487 error = puffs_newnode(mp, dvp, ap->a_vpp,
1488 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1489 if (error)
1490 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1491 mkdir_msg->pvnr_newnode, cnp);
1492
1493 out:
1494 PUFFS_MSG_RELEASE(mkdir);
1495 if (error || (cnp->cn_flags & SAVESTART) == 0)
1496 PNBUF_PUT(cnp->cn_pnbuf);
1497 RELEPN_AND_VP(dvp, dpn);
1498 return error;
1499 }
1500
1501 static int
1502 callrmdir(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1503 struct componentname *cnp)
1504 {
1505 PUFFS_MSG_VARS(vn, rmdir);
1506 int error;
1507
1508 PUFFS_MSG_ALLOC(vn, rmdir);
1509 rmdir_msg->pvnr_cookie_targ = ck;
1510 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1511 cnp, PUFFS_USE_FULLPNBUF(pmp));
1512 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dck);
1513
1514 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1515 PUFFS_MSG_RELEASE(rmdir);
1516
1517 return checkerr(pmp, error, __func__);
1518 }
1519
1520 int
1521 puffs_vnop_rmdir(void *v)
1522 {
1523 struct vop_rmdir_args /* {
1524 const struct vnodeop_desc *a_desc;
1525 struct vnode *a_dvp;
1526 struct vnode *a_vp;
1527 struct componentname *a_cnp;
1528 } */ *ap = v;
1529 PUFFS_MSG_VARS(vn, rmdir);
1530 struct vnode *dvp = ap->a_dvp;
1531 struct vnode *vp = ap->a_vp;
1532 struct puffs_node *dpn = VPTOPP(dvp);
1533 struct puffs_node *pn = VPTOPP(vp);
1534 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1535 struct componentname *cnp = ap->a_cnp;
1536 int error;
1537
1538 PUFFS_MSG_ALLOC(vn, rmdir);
1539 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1540 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1541 cnp, PUFFS_USE_FULLPNBUF(pmp));
1542 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1543 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1544
1545 puffs_msg_enqueue(pmp, park_rmdir);
1546 REFPN_AND_UNLOCKVP(dvp, dpn);
1547 REFPN_AND_UNLOCKVP(vp, pn);
1548 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1549
1550 PUFFS_MSG_RELEASE(rmdir);
1551
1552 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1553 RELEPN_AND_VP(dvp, dpn);
1554 RELEPN_AND_VP(vp, pn);
1555
1556 if (error || (cnp->cn_flags & SAVESTART) == 0)
1557 PNBUF_PUT(cnp->cn_pnbuf);
1558
1559 return error;
1560 }
1561
1562 int
1563 puffs_vnop_link(void *v)
1564 {
1565 struct vop_link_args /* {
1566 const struct vnodeop_desc *a_desc;
1567 struct vnode *a_dvp;
1568 struct vnode *a_vp;
1569 struct componentname *a_cnp;
1570 } */ *ap = v;
1571 PUFFS_MSG_VARS(vn, link);
1572 struct vnode *dvp = ap->a_dvp;
1573 struct vnode *vp = ap->a_vp;
1574 struct puffs_node *dpn = VPTOPP(dvp);
1575 struct puffs_node *pn = VPTOPP(vp);
1576 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1577 struct componentname *cnp = ap->a_cnp;
1578 int error;
1579
1580 PUFFS_MSG_ALLOC(vn, link);
1581 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
1582 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
1583 cnp, PUFFS_USE_FULLPNBUF(pmp));
1584 puffs_msg_setinfo(park_link, PUFFSOP_VN,
1585 PUFFS_VN_LINK, VPTOPNC(dvp));
1586
1587 puffs_msg_enqueue(pmp, park_link);
1588 REFPN_AND_UNLOCKVP(dvp, dpn);
1589 REFPN(pn);
1590 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
1591
1592 PUFFS_MSG_RELEASE(link);
1593
1594 error = checkerr(pmp, error, __func__);
1595
1596 /*
1597 * XXX: stay in touch with the cache. I don't like this, but
1598 * don't have a better solution either. See also puffs_rename().
1599 */
1600 if (error == 0)
1601 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
1602
1603 PNBUF_PUT(cnp->cn_pnbuf);
1604 RELEPN_AND_VP(dvp, dpn);
1605 puffs_releasenode(pn);
1606
1607 return error;
1608 }
1609
1610 int
1611 puffs_vnop_symlink(void *v)
1612 {
1613 struct vop_symlink_args /* {
1614 const struct vnodeop_desc *a_desc;
1615 struct vnode *a_dvp;
1616 struct vnode **a_vpp;
1617 struct componentname *a_cnp;
1618 struct vattr *a_vap;
1619 char *a_target;
1620 } */ *ap = v;
1621 PUFFS_MSG_VARS(vn, symlink);
1622 struct vnode *dvp = ap->a_dvp;
1623 struct puffs_node *dpn = VPTOPP(dvp);
1624 struct mount *mp = dvp->v_mount;
1625 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1626 struct componentname *cnp = ap->a_cnp;
1627 int error;
1628
1629 *ap->a_vpp = NULL;
1630
1631 PUFFS_MSG_ALLOC(vn, symlink);
1632 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
1633 cnp, PUFFS_USE_FULLPNBUF(pmp));
1634 symlink_msg->pvnr_va = *ap->a_vap;
1635 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
1636 sizeof(symlink_msg->pvnr_link));
1637 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
1638 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
1639
1640 puffs_msg_enqueue(pmp, park_symlink);
1641 REFPN_AND_UNLOCKVP(dvp, dpn);
1642 error = puffs_msg_wait2(pmp, park_symlink, dpn, NULL);
1643
1644 error = checkerr(pmp, error, __func__);
1645 if (error)
1646 goto out;
1647
1648 error = puffs_newnode(mp, dvp, ap->a_vpp,
1649 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
1650 if (error)
1651 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
1652 symlink_msg->pvnr_newnode, cnp);
1653
1654 out:
1655 PUFFS_MSG_RELEASE(symlink);
1656 if (error || (cnp->cn_flags & SAVESTART) == 0)
1657 PNBUF_PUT(cnp->cn_pnbuf);
1658 RELEPN_AND_VP(dvp, dpn);
1659
1660 return error;
1661 }
1662
1663 int
1664 puffs_vnop_readlink(void *v)
1665 {
1666 struct vop_readlink_args /* {
1667 const struct vnodeop_desc *a_desc;
1668 struct vnode *a_vp;
1669 struct uio *a_uio;
1670 kauth_cred_t a_cred;
1671 } */ *ap = v;
1672 PUFFS_MSG_VARS(vn, readlink);
1673 struct vnode *vp = ap->a_vp;
1674 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1675 size_t linklen;
1676 int error;
1677
1678 PUFFS_MSG_ALLOC(vn, readlink);
1679 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
1680 linklen = sizeof(readlink_msg->pvnr_link);
1681 readlink_msg->pvnr_linklen = linklen;
1682 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
1683 PUFFS_VN_READLINK, VPTOPNC(vp));
1684
1685 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
1686 error = checkerr(pmp, error, __func__);
1687 if (error)
1688 goto out;
1689
1690 /* bad bad user file server */
1691 if (readlink_msg->pvnr_linklen > linklen) {
1692 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
1693 "linklen too big", VPTOPNC(ap->a_vp));
1694 error = EPROTO;
1695 goto out;
1696 }
1697
1698 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
1699 ap->a_uio);
1700 out:
1701 PUFFS_MSG_RELEASE(readlink);
1702 return error;
1703 }
1704
1705 int
1706 puffs_vnop_rename(void *v)
1707 {
1708 struct vop_rename_args /* {
1709 const struct vnodeop_desc *a_desc;
1710 struct vnode *a_fdvp;
1711 struct vnode *a_fvp;
1712 struct componentname *a_fcnp;
1713 struct vnode *a_tdvp;
1714 struct vnode *a_tvp;
1715 struct componentname *a_tcnp;
1716 } */ *ap = v;
1717 PUFFS_MSG_VARS(vn, rename);
1718 struct vnode *fdvp = ap->a_fdvp;
1719 struct puffs_node *fpn = ap->a_fvp->v_data;
1720 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
1721 int error;
1722
1723 if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount)
1724 ERROUT(EXDEV);
1725
1726 PUFFS_MSG_ALLOC(vn, rename);
1727 rename_msg->pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1728 rename_msg->pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1729 if (ap->a_tvp)
1730 rename_msg->pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1731 else
1732 rename_msg->pvnr_cookie_targ = NULL;
1733 puffs_makecn(&rename_msg->pvnr_cn_src, &rename_msg->pvnr_cn_src_cred,
1734 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
1735 puffs_makecn(&rename_msg->pvnr_cn_targ, &rename_msg->pvnr_cn_targ_cred,
1736 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
1737 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
1738 PUFFS_VN_RENAME, VPTOPNC(fdvp));
1739
1740 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
1741 error = checkerr(pmp, error, __func__);
1742
1743 /*
1744 * XXX: stay in touch with the cache. I don't like this, but
1745 * don't have a better solution either. See also puffs_link().
1746 */
1747 if (error == 0)
1748 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
1749
1750 out:
1751 PUFFS_MSG_RELEASE(rename);
1752 if (ap->a_tvp != NULL)
1753 vput(ap->a_tvp);
1754 if (ap->a_tdvp == ap->a_tvp)
1755 vrele(ap->a_tdvp);
1756 else
1757 vput(ap->a_tdvp);
1758
1759 vrele(ap->a_fdvp);
1760 vrele(ap->a_fvp);
1761
1762 return error;
1763 }
1764
1765 #define RWARGS(cont, iofl, move, offset, creds) \
1766 (cont)->pvnr_ioflag = (iofl); \
1767 (cont)->pvnr_resid = (move); \
1768 (cont)->pvnr_offset = (offset); \
1769 puffs_credcvt(&(cont)->pvnr_cred, creds)
1770
1771 int
1772 puffs_vnop_read(void *v)
1773 {
1774 struct vop_read_args /* {
1775 const struct vnodeop_desc *a_desc;
1776 struct vnode *a_vp;
1777 struct uio *a_uio;
1778 int a_ioflag;
1779 kauth_cred_t a_cred;
1780 } */ *ap = v;
1781 PUFFS_MSG_VARS(vn, read);
1782 struct vnode *vp = ap->a_vp;
1783 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1784 struct uio *uio = ap->a_uio;
1785 size_t tomove, argsize;
1786 vsize_t bytelen;
1787 int error;
1788
1789 read_msg = NULL;
1790 error = 0;
1791
1792 /* std sanity */
1793 if (uio->uio_resid == 0)
1794 return 0;
1795 if (uio->uio_offset < 0)
1796 return EINVAL;
1797
1798 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1799 const int advice = IO_ADV_DECODE(ap->a_ioflag);
1800
1801 while (uio->uio_resid > 0) {
1802 bytelen = MIN(uio->uio_resid,
1803 vp->v_size - uio->uio_offset);
1804 if (bytelen == 0)
1805 break;
1806
1807 error = ubc_uiomove(&vp->v_uobj, uio, bytelen, advice,
1808 UBC_READ | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp));
1809 if (error)
1810 break;
1811 }
1812
1813 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
1814 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
1815 } else {
1816 /*
1817 * in case it's not a regular file or we're operating
1818 * uncached, do read in the old-fashioned style,
1819 * i.e. explicit read operations
1820 */
1821
1822 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1823 argsize = sizeof(struct puffs_vnmsg_read);
1824 puffs_msgmem_alloc(argsize + tomove, &park_read,
1825 (void *)&read_msg, 1);
1826
1827 error = 0;
1828 while (uio->uio_resid > 0) {
1829 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1830 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
1831 RWARGS(read_msg, ap->a_ioflag, tomove,
1832 uio->uio_offset, ap->a_cred);
1833 puffs_msg_setinfo(park_read, PUFFSOP_VN,
1834 PUFFS_VN_READ, VPTOPNC(vp));
1835 puffs_msg_setdelta(park_read, tomove);
1836
1837 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
1838 NULL, error);
1839 error = checkerr(pmp, error, __func__);
1840 if (error)
1841 break;
1842
1843 if (read_msg->pvnr_resid > tomove) {
1844 puffs_senderr(pmp, PUFFS_ERR_READ,
1845 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1846 error = EPROTO;
1847 break;
1848 }
1849
1850 error = uiomove(read_msg->pvnr_data,
1851 tomove - read_msg->pvnr_resid, uio);
1852
1853 /*
1854 * in case the file is out of juice, resid from
1855 * userspace is != 0. and the error-case is
1856 * quite obvious
1857 */
1858 if (error || read_msg->pvnr_resid)
1859 break;
1860 }
1861
1862 puffs_msgmem_release(park_read);
1863 }
1864
1865 return error;
1866 }
1867
1868 /*
1869 * XXX: in case of a failure, this leaves uio in a bad state.
1870 * We could theoretically copy the uio and iovecs and "replay"
1871 * them the right amount after the userspace trip, but don't
1872 * bother for now.
1873 */
1874 int
1875 puffs_vnop_write(void *v)
1876 {
1877 struct vop_write_args /* {
1878 const struct vnodeop_desc *a_desc;
1879 struct vnode *a_vp;
1880 struct uio *a_uio;
1881 int a_ioflag;
1882 kauth_cred_t a_cred;
1883 } */ *ap = v;
1884 PUFFS_MSG_VARS(vn, write);
1885 struct vnode *vp = ap->a_vp;
1886 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1887 struct uio *uio = ap->a_uio;
1888 size_t tomove, argsize;
1889 off_t oldoff, newoff, origoff;
1890 vsize_t bytelen;
1891 int error, uflags;
1892 int ubcflags;
1893
1894 error = uflags = 0;
1895 write_msg = NULL;
1896
1897 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1898 ubcflags = UBC_WRITE | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp);
1899
1900 /*
1901 * userspace *should* be allowed to control this,
1902 * but with UBC it's a bit unclear how to handle it
1903 */
1904 if (ap->a_ioflag & IO_APPEND)
1905 uio->uio_offset = vp->v_size;
1906
1907 origoff = uio->uio_offset;
1908 while (uio->uio_resid > 0) {
1909 uflags |= PUFFS_UPDATECTIME;
1910 uflags |= PUFFS_UPDATEMTIME;
1911 oldoff = uio->uio_offset;
1912 bytelen = uio->uio_resid;
1913
1914 newoff = oldoff + bytelen;
1915 if (vp->v_size < newoff) {
1916 uvm_vnp_setwritesize(vp, newoff);
1917 }
1918 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
1919 UVM_ADV_RANDOM, ubcflags);
1920
1921 /*
1922 * In case of a ubc_uiomove() error,
1923 * opt to not extend the file at all and
1924 * return an error. Otherwise, if we attempt
1925 * to clear the memory we couldn't fault to,
1926 * we might generate a kernel page fault.
1927 */
1928 if (vp->v_size < newoff) {
1929 if (error == 0) {
1930 uflags |= PUFFS_UPDATESIZE;
1931 uvm_vnp_setsize(vp, newoff);
1932 } else {
1933 uvm_vnp_setwritesize(vp, vp->v_size);
1934 }
1935 }
1936 if (error)
1937 break;
1938
1939 /*
1940 * If we're writing large files, flush to file server
1941 * every 64k. Otherwise we can very easily exhaust
1942 * kernel and user memory, as the file server cannot
1943 * really keep up with our writing speed.
1944 *
1945 * Note: this does *NOT* honor MNT_ASYNC, because
1946 * that gives userland too much say in the kernel.
1947 */
1948 if (oldoff >> 16 != uio->uio_offset >> 16) {
1949 mutex_enter(&vp->v_interlock);
1950 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
1951 uio->uio_offset & ~0xffff,
1952 PGO_CLEANIT | PGO_SYNCIO);
1953 if (error)
1954 break;
1955 }
1956 }
1957
1958 /* synchronous I/O? */
1959 if (error == 0 && ap->a_ioflag & IO_SYNC) {
1960 mutex_enter(&vp->v_interlock);
1961 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1962 round_page(uio->uio_offset),
1963 PGO_CLEANIT | PGO_SYNCIO);
1964
1965 /* write through page cache? */
1966 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
1967 mutex_enter(&vp->v_interlock);
1968 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1969 round_page(uio->uio_offset), PGO_CLEANIT);
1970 }
1971
1972 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
1973 } else {
1974 /* tomove is non-increasing */
1975 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1976 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
1977 puffs_msgmem_alloc(argsize, &park_write, (void *)&write_msg,1);
1978
1979 while (uio->uio_resid > 0) {
1980 /* move data to buffer */
1981 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1982 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
1983 RWARGS(write_msg, ap->a_ioflag, tomove,
1984 uio->uio_offset, ap->a_cred);
1985 error = uiomove(write_msg->pvnr_data, tomove, uio);
1986 if (error)
1987 break;
1988
1989 /* move buffer to userspace */
1990 puffs_msg_setinfo(park_write, PUFFSOP_VN,
1991 PUFFS_VN_WRITE, VPTOPNC(vp));
1992 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
1993 NULL, error);
1994 error = checkerr(pmp, error, __func__);
1995 if (error)
1996 break;
1997
1998 if (write_msg->pvnr_resid > tomove) {
1999 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2000 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2001 error = EPROTO;
2002 break;
2003 }
2004
2005 /* adjust file size */
2006 if (vp->v_size < uio->uio_offset)
2007 uvm_vnp_setsize(vp, uio->uio_offset);
2008
2009 /* didn't move everything? bad userspace. bail */
2010 if (write_msg->pvnr_resid != 0) {
2011 error = EIO;
2012 break;
2013 }
2014 }
2015 puffs_msgmem_release(park_write);
2016 }
2017
2018 return error;
2019 }
2020
2021 int
2022 puffs_vnop_print(void *v)
2023 {
2024 struct vop_print_args /* {
2025 struct vnode *a_vp;
2026 } */ *ap = v;
2027 PUFFS_MSG_VARS(vn, print);
2028 struct vnode *vp = ap->a_vp;
2029 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2030 struct puffs_node *pn = vp->v_data;
2031 int error;
2032
2033 /* kernel portion */
2034 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2035 " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
2036 if (vp->v_type == VFIFO)
2037 fifo_printinfo(vp);
2038
2039 /* userspace portion */
2040 if (EXISTSOP(pmp, PRINT)) {
2041 PUFFS_MSG_ALLOC(vn, print);
2042 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2043 PUFFS_VN_PRINT, VPTOPNC(vp));
2044 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_print, vp->v_data,
2045 NULL, error);
2046 PUFFS_MSG_RELEASE(print);
2047 }
2048
2049 return 0;
2050 }
2051
2052 int
2053 puffs_vnop_pathconf(void *v)
2054 {
2055 struct vop_pathconf_args /* {
2056 const struct vnodeop_desc *a_desc;
2057 struct vnode *a_vp;
2058 int a_name;
2059 register_t *a_retval;
2060 } */ *ap = v;
2061 PUFFS_MSG_VARS(vn, pathconf);
2062 struct vnode *vp = ap->a_vp;
2063 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2064 int error;
2065
2066 PUFFS_MSG_ALLOC(vn, pathconf);
2067 pathconf_msg->pvnr_name = ap->a_name;
2068 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2069 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2070 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2071 error = checkerr(pmp, error, __func__);
2072 if (!error)
2073 *ap->a_retval = pathconf_msg->pvnr_retval;
2074 PUFFS_MSG_RELEASE(pathconf);
2075
2076 return error;
2077 }
2078
2079 int
2080 puffs_vnop_advlock(void *v)
2081 {
2082 struct vop_advlock_args /* {
2083 const struct vnodeop_desc *a_desc;
2084 struct vnode *a_vp;
2085 void *a_id;
2086 int a_op;
2087 struct flock *a_fl;
2088 int a_flags;
2089 } */ *ap = v;
2090 PUFFS_MSG_VARS(vn, advlock);
2091 struct vnode *vp = ap->a_vp;
2092 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2093 int error;
2094
2095 PUFFS_MSG_ALLOC(vn, advlock);
2096 error = copyin(ap->a_fl, &advlock_msg->pvnr_fl, sizeof(struct flock));
2097 if (error)
2098 goto out;
2099 advlock_msg->pvnr_id = ap->a_id;
2100 advlock_msg->pvnr_op = ap->a_op;
2101 advlock_msg->pvnr_flags = ap->a_flags;
2102 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2103 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2104
2105 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2106 error = checkerr(pmp, error, __func__);
2107
2108 out:
2109 PUFFS_MSG_RELEASE(advlock);
2110 return error;
2111 }
2112
2113 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2114
2115 /*
2116 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2117 */
2118 int
2119 puffs_vnop_strategy(void *v)
2120 {
2121 struct vop_strategy_args /* {
2122 const struct vnodeop_desc *a_desc;
2123 struct vnode *a_vp;
2124 struct buf *a_bp;
2125 } */ *ap = v;
2126 PUFFS_MSG_VARS(vn, rw);
2127 struct vnode *vp = ap->a_vp;
2128 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2129 struct puffs_node *pn;
2130 struct buf *bp;
2131 size_t argsize;
2132 size_t tomove, moved;
2133 int error, dofaf, dobiodone;
2134
2135 pmp = MPTOPUFFSMP(vp->v_mount);
2136 bp = ap->a_bp;
2137 error = 0;
2138 dofaf = 0;
2139 pn = VPTOPP(vp);
2140 park_rw = NULL; /* explicit */
2141 dobiodone = 1;
2142
2143 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2144 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2145 ERROUT(EOPNOTSUPP);
2146
2147 #ifdef DIAGNOSTIC
2148 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2149 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2150 bp->b_bcount);
2151 #endif
2152
2153 /*
2154 * See explanation for the necessity of a FAF in puffs_fsync.
2155 *
2156 * Also, do FAF in case we're suspending.
2157 * See puffs_vfsops.c:pageflush()
2158 */
2159 if (BUF_ISWRITE(bp)) {
2160 mutex_enter(&vp->v_interlock);
2161 if (vp->v_iflag & VI_XLOCK)
2162 dofaf = 1;
2163 if (pn->pn_stat & PNODE_SUSPEND)
2164 dofaf = 1;
2165 mutex_exit(&vp->v_interlock);
2166 }
2167
2168 #ifdef DIAGNOSTIC
2169 if (curlwp == uvm.pagedaemon_lwp)
2170 KASSERT(dofaf || BIOASYNC(bp));
2171 #endif
2172
2173 /* allocate transport structure */
2174 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2175 argsize = sizeof(struct puffs_vnmsg_rw);
2176 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2177 (void *)&rw_msg, dofaf ? 0 : 1);
2178 if (error)
2179 goto out;
2180 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2181
2182 /* 2x2 cases: read/write, faf/nofaf */
2183 if (BUF_ISREAD(bp)) {
2184 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2185 PUFFS_VN_READ, VPTOPNC(vp));
2186 puffs_msg_setdelta(park_rw, tomove);
2187 if (BIOASYNC(bp)) {
2188 puffs_msg_setcall(park_rw,
2189 puffs_parkdone_asyncbioread, bp);
2190 puffs_msg_enqueue(pmp, park_rw);
2191 dobiodone = 0;
2192 } else {
2193 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2194 NULL, error);
2195 error = checkerr(pmp, error, __func__);
2196 if (error)
2197 goto out;
2198
2199 if (rw_msg->pvnr_resid > tomove) {
2200 puffs_senderr(pmp, PUFFS_ERR_READ,
2201 E2BIG, "resid grew", VPTOPNC(vp));
2202 ERROUT(EPROTO);
2203 }
2204
2205 moved = tomove - rw_msg->pvnr_resid;
2206
2207 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2208 bp->b_resid = bp->b_bcount - moved;
2209 }
2210 } else {
2211 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2212 PUFFS_VN_WRITE, VPTOPNC(vp));
2213 /*
2214 * make pages read-only before we write them if we want
2215 * write caching info
2216 */
2217 if (PUFFS_WCACHEINFO(pmp)) {
2218 struct uvm_object *uobj = &vp->v_uobj;
2219 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2220 struct vm_page *vmp;
2221 int i;
2222
2223 for (i = 0; i < npages; i++) {
2224 vmp= uvm_pageratop((vaddr_t)bp->b_data
2225 + (i << PAGE_SHIFT));
2226 DPRINTF(("puffs_strategy: write-protecting "
2227 "vp %p page %p, offset %" PRId64"\n",
2228 vp, vmp, vmp->offset));
2229 mutex_enter(&uobj->vmobjlock);
2230 vmp->flags |= PG_RDONLY;
2231 pmap_page_protect(vmp, VM_PROT_READ);
2232 mutex_exit(&uobj->vmobjlock);
2233 }
2234 }
2235
2236 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2237 if (dofaf) {
2238 puffs_msg_setfaf(park_rw);
2239 } else if (BIOASYNC(bp)) {
2240 puffs_msg_setcall(park_rw,
2241 puffs_parkdone_asyncbiowrite, bp);
2242 dobiodone = 0;
2243 }
2244
2245 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2246
2247 if (dobiodone == 0)
2248 goto out;
2249
2250 /*
2251 * XXXXXXXX: wrong, but kernel can't survive strategy
2252 * failure currently. Here, have one more X: X.
2253 */
2254 if (error != ENOMEM)
2255 error = 0;
2256
2257 error = checkerr(pmp, error, __func__);
2258 if (error)
2259 goto out;
2260
2261 if (rw_msg->pvnr_resid > tomove) {
2262 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2263 E2BIG, "resid grew", VPTOPNC(vp));
2264 ERROUT(EPROTO);
2265 }
2266
2267 /*
2268 * FAF moved everything. Frankly, we don't
2269 * really have a choice.
2270 */
2271 if (dofaf && error == 0)
2272 moved = tomove;
2273 else
2274 moved = tomove - rw_msg->pvnr_resid;
2275
2276 bp->b_resid = bp->b_bcount - moved;
2277 if (bp->b_resid != 0) {
2278 ERROUT(EIO);
2279 }
2280 }
2281
2282 out:
2283 if (park_rw)
2284 puffs_msgmem_release(park_rw);
2285
2286 if (error)
2287 bp->b_error = error;
2288
2289 if (error || dobiodone)
2290 biodone(bp);
2291
2292 return error;
2293 }
2294
2295 int
2296 puffs_vnop_mmap(void *v)
2297 {
2298 struct vop_mmap_args /* {
2299 const struct vnodeop_desc *a_desc;
2300 struct vnode *a_vp;
2301 vm_prot_t a_prot;
2302 kauth_cred_t a_cred;
2303 } */ *ap = v;
2304 PUFFS_MSG_VARS(vn, mmap);
2305 struct vnode *vp = ap->a_vp;
2306 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2307 int error;
2308
2309 if (!PUFFS_USE_PAGECACHE(pmp))
2310 return genfs_eopnotsupp(v);
2311
2312 if (EXISTSOP(pmp, MMAP)) {
2313 PUFFS_MSG_ALLOC(vn, mmap);
2314 mmap_msg->pvnr_prot = ap->a_prot;
2315 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2316 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2317 PUFFS_VN_MMAP, VPTOPNC(vp));
2318
2319 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2320 error = checkerr(pmp, error, __func__);
2321 PUFFS_MSG_RELEASE(mmap);
2322 } else {
2323 error = genfs_mmap(v);
2324 }
2325
2326 return error;
2327 }
2328
2329
2330 /*
2331 * The rest don't get a free trip to userspace and back, they
2332 * have to stay within the kernel.
2333 */
2334
2335 /*
2336 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2337 * well, maybe somehow, somewhere, some day ....
2338 */
2339 int
2340 puffs_vnop_bmap(void *v)
2341 {
2342 struct vop_bmap_args /* {
2343 const struct vnodeop_desc *a_desc;
2344 struct vnode *a_vp;
2345 daddr_t a_bn;
2346 struct vnode **a_vpp;
2347 daddr_t *a_bnp;
2348 int *a_runp;
2349 } */ *ap = v;
2350 struct puffs_mount *pmp;
2351
2352 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2353
2354 if (ap->a_vpp)
2355 *ap->a_vpp = ap->a_vp;
2356 if (ap->a_bnp)
2357 *ap->a_bnp = ap->a_bn;
2358 if (ap->a_runp)
2359 *ap->a_runp
2360 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2361
2362 return 0;
2363 }
2364
2365 /*
2366 * Handle getpages faults in puffs. We let genfs_getpages() do most
2367 * of the dirty work, but we come in this route to do accounting tasks.
2368 * If the user server has specified functions for cache notifications
2369 * about reads and/or writes, we record which type of operation we got,
2370 * for which page range, and proceed to issue a FAF notification to the
2371 * server about it.
2372 */
2373 int
2374 puffs_vnop_getpages(void *v)
2375 {
2376 struct vop_getpages_args /* {
2377 const struct vnodeop_desc *a_desc;
2378 struct vnode *a_vp;
2379 voff_t a_offset;
2380 struct vm_page **a_m;
2381 int *a_count;
2382 int a_centeridx;
2383 vm_prot_t a_access_type;
2384 int a_advice;
2385 int a_flags;
2386 } */ *ap = v;
2387 struct puffs_mount *pmp;
2388 struct puffs_node *pn;
2389 struct vnode *vp;
2390 struct vm_page **pgs;
2391 struct puffs_cacheinfo *pcinfo = NULL;
2392 struct puffs_cacherun *pcrun;
2393 void *parkmem = NULL;
2394 size_t runsizes;
2395 int i, npages, si, streakon;
2396 int error, locked, write;
2397
2398 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2399 npages = *ap->a_count;
2400 pgs = ap->a_m;
2401 vp = ap->a_vp;
2402 pn = vp->v_data;
2403 locked = (ap->a_flags & PGO_LOCKED) != 0;
2404 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
2405
2406 /* ccg xnaht - gets Wuninitialized wrong */
2407 pcrun = NULL;
2408 runsizes = 0;
2409
2410 /*
2411 * Check that we aren't trying to fault in pages which our file
2412 * server doesn't know about. This happens if we extend a file by
2413 * skipping some pages and later try to fault in pages which
2414 * are between pn_serversize and vp_size. This check optimizes
2415 * away the common case where a file is being extended.
2416 */
2417 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
2418 struct vattr va;
2419
2420 /* try again later when we can block */
2421 if (locked)
2422 ERROUT(EBUSY);
2423
2424 mutex_exit(&vp->v_interlock);
2425 vattr_null(&va);
2426 va.va_size = vp->v_size;
2427 error = dosetattr(vp, &va, FSCRED, 0);
2428 if (error)
2429 ERROUT(error);
2430 mutex_enter(&vp->v_interlock);
2431 }
2432
2433 if (write && PUFFS_WCACHEINFO(pmp)) {
2434 #ifdef notnowjohn
2435 /* allocate worst-case memory */
2436 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
2437 pcinfo = kmem_zalloc(sizeof(struct puffs_cacheinfo) + runsize,
2438 locked ? KM_NOSLEEP : KM_SLEEP);
2439
2440 /*
2441 * can't block if we're locked and can't mess up caching
2442 * information for fs server. so come back later, please
2443 */
2444 if (pcinfo == NULL)
2445 ERROUT(ENOMEM);
2446
2447 parkmem = puffs_park_alloc(locked == 0);
2448 if (parkmem == NULL)
2449 ERROUT(ENOMEM);
2450
2451 pcrun = pcinfo->pcache_runs;
2452 #else
2453 (void)parkmem;
2454 #endif
2455 }
2456
2457 error = genfs_getpages(v);
2458 if (error)
2459 goto out;
2460
2461 if (PUFFS_WCACHEINFO(pmp) == 0)
2462 goto out;
2463
2464 /*
2465 * Let's see whose fault it was and inform the user server of
2466 * possibly read/written pages. Map pages from read faults
2467 * strictly read-only, since otherwise we might miss info on
2468 * when the page is actually write-faulted to.
2469 */
2470 if (!locked)
2471 mutex_enter(&vp->v_uobj.vmobjlock);
2472 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
2473 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
2474 if (streakon && write) {
2475 streakon = 0;
2476 pcrun[si].pcache_runend
2477 = trunc_page(pgs[i]->offset) + PAGE_MASK;
2478 si++;
2479 }
2480 continue;
2481 }
2482 if (streakon == 0 && write) {
2483 streakon = 1;
2484 pcrun[si].pcache_runstart = pgs[i]->offset;
2485 }
2486
2487 if (!write)
2488 pgs[i]->flags |= PG_RDONLY;
2489 }
2490 /* was the last page part of our streak? */
2491 if (streakon) {
2492 pcrun[si].pcache_runend
2493 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
2494 si++;
2495 }
2496 if (!locked)
2497 mutex_exit(&vp->v_uobj.vmobjlock);
2498
2499 KASSERT(si <= (npages / 2) + 1);
2500
2501 #ifdef notnowjohn
2502 /* send results to userspace */
2503 if (write)
2504 puffs_cacheop(pmp, parkmem, pcinfo,
2505 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
2506 #endif
2507
2508 out:
2509 if (error) {
2510 if (pcinfo != NULL)
2511 kmem_free(pcinfo,
2512 sizeof(struct puffs_cacheinfo) + runsizes);
2513 #ifdef notnowjohn
2514 if (parkmem != NULL)
2515 puffs_park_release(parkmem, 1);
2516 #endif
2517 }
2518
2519 return error;
2520 }
2521
2522 int
2523 puffs_vnop_lock(void *v)
2524 {
2525 struct vop_lock_args /* {
2526 struct vnode *a_vp;
2527 int a_flags;
2528 } */ *ap = v;
2529 struct vnode *vp = ap->a_vp;
2530 struct mount *mp = vp->v_mount;
2531 int flags = ap->a_flags;
2532
2533 #if 0
2534 DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
2535 #endif
2536
2537 if (flags & LK_INTERLOCK) {
2538 mutex_exit(&vp->v_interlock);
2539 flags &= ~LK_INTERLOCK;
2540 }
2541
2542 /*
2543 * XXX: this avoids deadlocking when we're suspending.
2544 * e.g. some ops holding the vnode lock might be blocked for
2545 * the vfs transaction lock so we'd deadlock.
2546 *
2547 * Now once again this is skating on the thin ice of modern life,
2548 * since we are breaking the consistency guarantee provided
2549 * _to the user server_ by vnode locking. Hopefully this will
2550 * get fixed soon enough by getting rid of the dependency on
2551 * vnode locks alltogether.
2552 */
2553 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2554 return 0;
2555 }
2556
2557 return vlockmgr(&vp->v_lock, flags);
2558 }
2559
2560 int
2561 puffs_vnop_unlock(void *v)
2562 {
2563 struct vop_unlock_args /* {
2564 struct vnode *a_vp;
2565 int a_flags;
2566 } */ *ap = v;
2567 struct vnode *vp = ap->a_vp;
2568 struct mount *mp = vp->v_mount;
2569
2570 #if 0
2571 DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
2572 #endif
2573
2574 /* XXX: see puffs_lock() */
2575 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2576 return 0;
2577 }
2578
2579 return vlockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE);
2580 }
2581
2582 int
2583 puffs_vnop_islocked(void *v)
2584 {
2585 struct vop_islocked_args *ap = v;
2586 int rv;
2587
2588 rv = vlockstatus(&ap->a_vp->v_lock);
2589 return rv;
2590 }
2591
2592
2593 /*
2594 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
2595 * FAF update information for the puffs node first.
2596 */
2597 int
2598 puffs_vnop_spec_read(void *v)
2599 {
2600 struct vop_read_args /* {
2601 const struct vnodeop_desc *a_desc;
2602 struct vnode *a_vp;
2603 struct uio *a_uio;
2604 int a_ioflag;
2605 kauth_cred_t a_cred;
2606 } */ *ap = v;
2607
2608 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2609 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
2610 }
2611
2612 int
2613 puffs_vnop_spec_write(void *v)
2614 {
2615 struct vop_write_args /* {
2616 const struct vnodeop_desc *a_desc;
2617 struct vnode *a_vp;
2618 struct uio *a_uio;
2619 int a_ioflag;
2620 kauth_cred_t a_cred;
2621 } */ *ap = v;
2622
2623 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2624 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
2625 }
2626
2627 int
2628 puffs_vnop_fifo_read(void *v)
2629 {
2630 struct vop_read_args /* {
2631 const struct vnodeop_desc *a_desc;
2632 struct vnode *a_vp;
2633 struct uio *a_uio;
2634 int a_ioflag;
2635 kauth_cred_t a_cred;
2636 } */ *ap = v;
2637
2638 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2639 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
2640 }
2641
2642 int
2643 puffs_vnop_fifo_write(void *v)
2644 {
2645 struct vop_write_args /* {
2646 const struct vnodeop_desc *a_desc;
2647 struct vnode *a_vp;
2648 struct uio *a_uio;
2649 int a_ioflag;
2650 kauth_cred_t a_cred;
2651 } */ *ap = v;
2652
2653 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2654 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
2655 }
2656