puffs_vnops.c revision 1.137 1 /* $NetBSD: puffs_vnops.c,v 1.137 2009/11/05 19:22:57 pooka Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.137 2009/11/05 19:22:57 pooka Exp $");
34
35 #include <sys/param.h>
36 #include <sys/buf.h>
37 #include <sys/fstrans.h>
38 #include <sys/malloc.h>
39 #include <sys/mount.h>
40 #include <sys/namei.h>
41 #include <sys/vnode.h>
42 #include <sys/proc.h>
43
44 #include <uvm/uvm.h>
45
46 #include <fs/puffs/puffs_msgif.h>
47 #include <fs/puffs/puffs_sys.h>
48
49 #include <miscfs/fifofs/fifo.h>
50 #include <miscfs/genfs/genfs.h>
51 #include <miscfs/specfs/specdev.h>
52
53 int puffs_vnop_lookup(void *);
54 int puffs_vnop_create(void *);
55 int puffs_vnop_access(void *);
56 int puffs_vnop_mknod(void *);
57 int puffs_vnop_open(void *);
58 int puffs_vnop_close(void *);
59 int puffs_vnop_getattr(void *);
60 int puffs_vnop_setattr(void *);
61 int puffs_vnop_reclaim(void *);
62 int puffs_vnop_readdir(void *);
63 int puffs_vnop_poll(void *);
64 int puffs_vnop_fsync(void *);
65 int puffs_vnop_seek(void *);
66 int puffs_vnop_remove(void *);
67 int puffs_vnop_mkdir(void *);
68 int puffs_vnop_rmdir(void *);
69 int puffs_vnop_link(void *);
70 int puffs_vnop_readlink(void *);
71 int puffs_vnop_symlink(void *);
72 int puffs_vnop_rename(void *);
73 int puffs_vnop_read(void *);
74 int puffs_vnop_write(void *);
75 int puffs_vnop_fcntl(void *);
76 int puffs_vnop_ioctl(void *);
77 int puffs_vnop_inactive(void *);
78 int puffs_vnop_print(void *);
79 int puffs_vnop_pathconf(void *);
80 int puffs_vnop_advlock(void *);
81 int puffs_vnop_strategy(void *);
82 int puffs_vnop_bmap(void *);
83 int puffs_vnop_mmap(void *);
84 int puffs_vnop_getpages(void *);
85 int puffs_vnop_abortop(void *);
86
87 int puffs_vnop_spec_read(void *);
88 int puffs_vnop_spec_write(void *);
89 int puffs_vnop_fifo_read(void *);
90 int puffs_vnop_fifo_write(void *);
91
92 int puffs_vnop_checkop(void *);
93
94
95 #if 0
96 #define puffs_lock genfs_lock
97 #define puffs_unlock genfs_unlock
98 #define puffs_islocked genfs_islocked
99 #else
100 int puffs_vnop_lock(void *);
101 int puffs_vnop_unlock(void *);
102 int puffs_vnop_islocked(void *);
103 #endif
104
105 int (**puffs_vnodeop_p)(void *);
106 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
107 { &vop_default_desc, vn_default_error },
108 { &vop_lookup_desc, puffs_vnop_lookup }, /* REAL lookup */
109 { &vop_create_desc, puffs_vnop_checkop }, /* create */
110 { &vop_mknod_desc, puffs_vnop_checkop }, /* mknod */
111 { &vop_open_desc, puffs_vnop_open }, /* REAL open */
112 { &vop_close_desc, puffs_vnop_checkop }, /* close */
113 { &vop_access_desc, puffs_vnop_access }, /* REAL access */
114 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
115 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
116 { &vop_read_desc, puffs_vnop_checkop }, /* read */
117 { &vop_write_desc, puffs_vnop_checkop }, /* write */
118 { &vop_fsync_desc, puffs_vnop_fsync }, /* REAL fsync */
119 { &vop_seek_desc, puffs_vnop_checkop }, /* seek */
120 { &vop_remove_desc, puffs_vnop_checkop }, /* remove */
121 { &vop_link_desc, puffs_vnop_checkop }, /* link */
122 { &vop_rename_desc, puffs_vnop_checkop }, /* rename */
123 { &vop_mkdir_desc, puffs_vnop_checkop }, /* mkdir */
124 { &vop_rmdir_desc, puffs_vnop_checkop }, /* rmdir */
125 { &vop_symlink_desc, puffs_vnop_checkop }, /* symlink */
126 { &vop_readdir_desc, puffs_vnop_checkop }, /* readdir */
127 { &vop_readlink_desc, puffs_vnop_checkop }, /* readlink */
128 { &vop_getpages_desc, puffs_vnop_checkop }, /* getpages */
129 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
130 { &vop_pathconf_desc, puffs_vnop_checkop }, /* pathconf */
131 { &vop_advlock_desc, puffs_vnop_checkop }, /* advlock */
132 { &vop_strategy_desc, puffs_vnop_strategy }, /* REAL strategy */
133 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
134 { &vop_abortop_desc, puffs_vnop_abortop }, /* REAL abortop */
135 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
136 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
137 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
138 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
139 { &vop_bmap_desc, puffs_vnop_bmap }, /* REAL bmap */
140 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
141 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
142 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
143 { &vop_mmap_desc, puffs_vnop_mmap }, /* REAL mmap */
144 { &vop_poll_desc, puffs_vnop_poll }, /* REAL poll */
145
146 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
147 { NULL, NULL }
148 };
149 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
150 { &puffs_vnodeop_p, puffs_vnodeop_entries };
151
152
153 int (**puffs_specop_p)(void *);
154 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
155 { &vop_default_desc, vn_default_error },
156 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
157 { &vop_create_desc, spec_create }, /* genfs_badop */
158 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
159 { &vop_open_desc, spec_open }, /* spec_open */
160 { &vop_close_desc, spec_close }, /* spec_close */
161 { &vop_access_desc, puffs_vnop_checkop }, /* access */
162 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
163 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
164 { &vop_read_desc, puffs_vnop_spec_read }, /* update, read */
165 { &vop_write_desc, puffs_vnop_spec_write }, /* update, write */
166 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
167 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
168 { &vop_poll_desc, spec_poll }, /* spec_poll */
169 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
170 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
171 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
172 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
173 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
174 { &vop_remove_desc, spec_remove }, /* genfs_badop */
175 { &vop_link_desc, spec_link }, /* genfs_badop */
176 { &vop_rename_desc, spec_rename }, /* genfs_badop */
177 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
178 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
179 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
180 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
181 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
182 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
183 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
184 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
185 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
186 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
187 { &vop_bmap_desc, spec_bmap }, /* dummy */
188 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
189 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
190 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
191 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
192 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
193 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
194 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
195 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
196 #if 0
197 { &vop_openextattr_desc, _openextattr }, /* openextattr */
198 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
199 { &vop_getextattr_desc, _getextattr }, /* getextattr */
200 { &vop_setextattr_desc, _setextattr }, /* setextattr */
201 { &vop_listextattr_desc, _listextattr }, /* listextattr */
202 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
203 #endif
204 { NULL, NULL }
205 };
206 const struct vnodeopv_desc puffs_specop_opv_desc =
207 { &puffs_specop_p, puffs_specop_entries };
208
209
210 int (**puffs_fifoop_p)(void *);
211 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
212 { &vop_default_desc, vn_default_error },
213 { &vop_lookup_desc, fifo_lookup }, /* lookup, ENOTDIR */
214 { &vop_create_desc, fifo_create }, /* genfs_badop */
215 { &vop_mknod_desc, fifo_mknod }, /* genfs_badop */
216 { &vop_open_desc, fifo_open }, /* open */
217 { &vop_close_desc, fifo_close }, /* close */
218 { &vop_access_desc, puffs_vnop_checkop }, /* access */
219 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
220 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
221 { &vop_read_desc, puffs_vnop_fifo_read }, /* read, update */
222 { &vop_write_desc, puffs_vnop_fifo_write }, /* write, update */
223 { &vop_ioctl_desc, fifo_ioctl }, /* ioctl */
224 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
225 { &vop_poll_desc, fifo_poll }, /* poll */
226 { &vop_kqfilter_desc, fifo_kqfilter }, /* kqfilter */
227 { &vop_revoke_desc, fifo_revoke }, /* genfs_revoke */
228 { &vop_mmap_desc, fifo_mmap }, /* genfs_badop */
229 { &vop_fsync_desc, fifo_fsync }, /* genfs_nullop*/
230 { &vop_seek_desc, fifo_seek }, /* genfs_badop */
231 { &vop_remove_desc, fifo_remove }, /* genfs_badop */
232 { &vop_link_desc, fifo_link }, /* genfs_badop */
233 { &vop_rename_desc, fifo_rename }, /* genfs_badop */
234 { &vop_mkdir_desc, fifo_mkdir }, /* genfs_badop */
235 { &vop_rmdir_desc, fifo_rmdir }, /* genfs_badop */
236 { &vop_symlink_desc, fifo_symlink }, /* genfs_badop */
237 { &vop_readdir_desc, fifo_readdir }, /* genfs_badop */
238 { &vop_readlink_desc, fifo_readlink }, /* genfs_badop */
239 { &vop_abortop_desc, fifo_abortop }, /* genfs_badop */
240 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
241 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
242 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
243 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
244 { &vop_bmap_desc, fifo_bmap }, /* dummy */
245 { &vop_strategy_desc, fifo_strategy }, /* genfs_badop */
246 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
247 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
248 { &vop_pathconf_desc, fifo_pathconf }, /* pathconf */
249 { &vop_advlock_desc, fifo_advlock }, /* genfs_einval */
250 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
251 { &vop_putpages_desc, fifo_putpages }, /* genfs_null_putpages*/
252 #if 0
253 { &vop_openextattr_desc, _openextattr }, /* openextattr */
254 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
255 { &vop_getextattr_desc, _getextattr }, /* getextattr */
256 { &vop_setextattr_desc, _setextattr }, /* setextattr */
257 { &vop_listextattr_desc, _listextattr }, /* listextattr */
258 { &vop_deleteextattr_desc, _deleteextattr }, /* deleteextattr */
259 #endif
260 { NULL, NULL }
261 };
262 const struct vnodeopv_desc puffs_fifoop_opv_desc =
263 { &puffs_fifoop_p, puffs_fifoop_entries };
264
265
266 /* "real" vnode operations */
267 int (**puffs_msgop_p)(void *);
268 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
269 { &vop_default_desc, vn_default_error },
270 { &vop_create_desc, puffs_vnop_create }, /* create */
271 { &vop_mknod_desc, puffs_vnop_mknod }, /* mknod */
272 { &vop_open_desc, puffs_vnop_open }, /* open */
273 { &vop_close_desc, puffs_vnop_close }, /* close */
274 { &vop_access_desc, puffs_vnop_access }, /* access */
275 { &vop_getattr_desc, puffs_vnop_getattr }, /* getattr */
276 { &vop_setattr_desc, puffs_vnop_setattr }, /* setattr */
277 { &vop_read_desc, puffs_vnop_read }, /* read */
278 { &vop_write_desc, puffs_vnop_write }, /* write */
279 { &vop_seek_desc, puffs_vnop_seek }, /* seek */
280 { &vop_remove_desc, puffs_vnop_remove }, /* remove */
281 { &vop_link_desc, puffs_vnop_link }, /* link */
282 { &vop_rename_desc, puffs_vnop_rename }, /* rename */
283 { &vop_mkdir_desc, puffs_vnop_mkdir }, /* mkdir */
284 { &vop_rmdir_desc, puffs_vnop_rmdir }, /* rmdir */
285 { &vop_symlink_desc, puffs_vnop_symlink }, /* symlink */
286 { &vop_readdir_desc, puffs_vnop_readdir }, /* readdir */
287 { &vop_readlink_desc, puffs_vnop_readlink }, /* readlink */
288 { &vop_print_desc, puffs_vnop_print }, /* print */
289 { &vop_islocked_desc, puffs_vnop_islocked }, /* islocked */
290 { &vop_pathconf_desc, puffs_vnop_pathconf }, /* pathconf */
291 { &vop_advlock_desc, puffs_vnop_advlock }, /* advlock */
292 { &vop_getpages_desc, puffs_vnop_getpages }, /* getpages */
293 { NULL, NULL }
294 };
295 const struct vnodeopv_desc puffs_msgop_opv_desc =
296 { &puffs_msgop_p, puffs_msgop_entries };
297
298
299 #define ERROUT(err) \
300 do { \
301 error = err; \
302 goto out; \
303 } while (/*CONSTCOND*/0)
304
305 /*
306 * This is a generic vnode operation handler. It checks if the necessary
307 * operations for the called vnode operation are implemented by userspace
308 * and either returns a dummy return value or proceeds to call the real
309 * vnode operation from puffs_msgop_v.
310 *
311 * XXX: this should described elsewhere and autogenerated, the complexity
312 * of the vnode operations vectors and their interrelationships is also
313 * getting a bit out of hand. Another problem is that we need this same
314 * information in the fs server code, so keeping the two in sync manually
315 * is not a viable (long term) plan.
316 */
317
318 /* not supported, handle locking protocol */
319 #define CHECKOP_NOTSUPP(op) \
320 case VOP_##op##_DESCOFFSET: \
321 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
322 return genfs_eopnotsupp(v); \
323 break
324
325 /* always succeed, no locking */
326 #define CHECKOP_SUCCESS(op) \
327 case VOP_##op##_DESCOFFSET: \
328 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
329 return 0; \
330 break
331
332 int
333 puffs_vnop_checkop(void *v)
334 {
335 struct vop_generic_args /* {
336 struct vnodeop_desc *a_desc;
337 spooky mystery contents;
338 } */ *ap = v;
339 struct vnodeop_desc *desc = ap->a_desc;
340 struct puffs_mount *pmp;
341 struct vnode *vp;
342 int offset, rv;
343
344 offset = ap->a_desc->vdesc_vp_offsets[0];
345 #ifdef DIAGNOSTIC
346 if (offset == VDESC_NO_OFFSET)
347 panic("puffs_checkop: no vnode, why did you call me?");
348 #endif
349 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
350 pmp = MPTOPUFFSMP(vp->v_mount);
351
352 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
353 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
354
355 if (!ALLOPS(pmp)) {
356 switch (desc->vdesc_offset) {
357 CHECKOP_NOTSUPP(CREATE);
358 CHECKOP_NOTSUPP(MKNOD);
359 CHECKOP_NOTSUPP(GETATTR);
360 CHECKOP_NOTSUPP(SETATTR);
361 CHECKOP_NOTSUPP(READ);
362 CHECKOP_NOTSUPP(WRITE);
363 CHECKOP_NOTSUPP(FCNTL);
364 CHECKOP_NOTSUPP(IOCTL);
365 CHECKOP_NOTSUPP(REMOVE);
366 CHECKOP_NOTSUPP(LINK);
367 CHECKOP_NOTSUPP(RENAME);
368 CHECKOP_NOTSUPP(MKDIR);
369 CHECKOP_NOTSUPP(RMDIR);
370 CHECKOP_NOTSUPP(SYMLINK);
371 CHECKOP_NOTSUPP(READDIR);
372 CHECKOP_NOTSUPP(READLINK);
373 CHECKOP_NOTSUPP(PRINT);
374 CHECKOP_NOTSUPP(PATHCONF);
375 CHECKOP_NOTSUPP(ADVLOCK);
376
377 CHECKOP_SUCCESS(ACCESS);
378 CHECKOP_SUCCESS(CLOSE);
379 CHECKOP_SUCCESS(SEEK);
380
381 case VOP_GETPAGES_DESCOFFSET:
382 if (!EXISTSOP(pmp, READ))
383 return genfs_eopnotsupp(v);
384 break;
385
386 default:
387 panic("puffs_checkop: unhandled vnop %d",
388 desc->vdesc_offset);
389 }
390 }
391
392 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
393
394 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
395 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
396
397 return rv;
398 }
399
400 static int callremove(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
401 struct componentname *);
402 static int callrmdir(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
403 struct componentname *);
404 static void callinactive(struct puffs_mount *, puffs_cookie_t, int);
405 static void callreclaim(struct puffs_mount *, puffs_cookie_t);
406
407 #define PUFFS_ABORT_LOOKUP 1
408 #define PUFFS_ABORT_CREATE 2
409 #define PUFFS_ABORT_MKNOD 3
410 #define PUFFS_ABORT_MKDIR 4
411 #define PUFFS_ABORT_SYMLINK 5
412
413 /*
414 * Press the pani^Wabort button! Kernel resource allocation failed.
415 */
416 static void
417 puffs_abortbutton(struct puffs_mount *pmp, int what,
418 puffs_cookie_t dck, puffs_cookie_t ck, struct componentname *cnp)
419 {
420
421 switch (what) {
422 case PUFFS_ABORT_CREATE:
423 case PUFFS_ABORT_MKNOD:
424 case PUFFS_ABORT_SYMLINK:
425 callremove(pmp, dck, ck, cnp);
426 break;
427 case PUFFS_ABORT_MKDIR:
428 callrmdir(pmp, dck, ck, cnp);
429 break;
430 }
431
432 callinactive(pmp, ck, 0);
433 callreclaim(pmp, ck);
434 }
435
436 /*
437 * Begin vnode operations.
438 *
439 * A word from the keymaster about locks: generally we don't want
440 * to use the vnode locks at all: it creates an ugly dependency between
441 * the userlandia file server and the kernel. But we'll play along with
442 * the kernel vnode locks for now. However, even currently we attempt
443 * to release locks as early as possible. This is possible for some
444 * operations which a) don't need a locked vnode after the userspace op
445 * and b) return with the vnode unlocked. Theoretically we could
446 * unlock-do op-lock for others and order the graph in userspace, but I
447 * don't want to think of the consequences for the time being.
448 */
449
450 int
451 puffs_vnop_lookup(void *v)
452 {
453 struct vop_lookup_args /* {
454 const struct vnodeop_desc *a_desc;
455 struct vnode *a_dvp;
456 struct vnode **a_vpp;
457 struct componentname *a_cnp;
458 } */ *ap = v;
459 PUFFS_MSG_VARS(vn, lookup);
460 struct puffs_mount *pmp;
461 struct componentname *cnp;
462 struct vnode *vp, *dvp;
463 struct puffs_node *dpn;
464 int isdot;
465 int error;
466
467 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
468 cnp = ap->a_cnp;
469 dvp = ap->a_dvp;
470 *ap->a_vpp = NULL;
471
472 /* r/o fs? we check create later to handle EEXIST */
473 if ((cnp->cn_flags & ISLASTCN)
474 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
475 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
476 return EROFS;
477
478 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
479
480 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
481 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
482
483 /*
484 * Check if someone fed it into the cache
485 */
486 if (PUFFS_USE_NAMECACHE(pmp)) {
487 error = cache_lookup(dvp, ap->a_vpp, cnp);
488
489 if (error >= 0)
490 return error;
491 }
492
493 if (isdot) {
494 vp = ap->a_dvp;
495 vref(vp);
496 *ap->a_vpp = vp;
497 return 0;
498 }
499
500 PUFFS_MSG_ALLOC(vn, lookup);
501 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
502 cnp, PUFFS_USE_FULLPNBUF(pmp));
503
504 if (cnp->cn_flags & ISDOTDOT)
505 VOP_UNLOCK(dvp, 0);
506
507 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
508 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
509 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
510 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
511
512 /*
513 * In case of error, there is no new vnode to play with, so be
514 * happy with the NULL value given to vpp in the beginning.
515 * Also, check if this really was an error or the target was not
516 * present. Either treat it as a non-error for CREATE/RENAME or
517 * enter the component into the negative name cache (if desired).
518 */
519 if (error) {
520 error = checkerr(pmp, error, __func__);
521 if (error == ENOENT) {
522 /* don't allow to create files on r/o fs */
523 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
524 && cnp->cn_nameiop == CREATE) {
525 error = EROFS;
526
527 /* adjust values if we are creating */
528 } else if ((cnp->cn_flags & ISLASTCN)
529 && (cnp->cn_nameiop == CREATE
530 || cnp->cn_nameiop == RENAME)) {
531 cnp->cn_flags |= SAVENAME;
532 error = EJUSTRETURN;
533
534 /* save negative cache entry */
535 } else {
536 if ((cnp->cn_flags & MAKEENTRY)
537 && PUFFS_USE_NAMECACHE(pmp))
538 cache_enter(dvp, NULL, cnp);
539 }
540 }
541 goto out;
542 }
543
544 /*
545 * Check that we don't get our parent node back, that would cause
546 * a pretty obvious deadlock.
547 */
548 dpn = dvp->v_data;
549 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
550 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
551 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
552 error = EPROTO;
553 goto out;
554 }
555
556 error = puffs_cookie2vnode(pmp, lookup_msg->pvnr_newnode, 1, 1, &vp);
557 if (error == PUFFS_NOSUCHCOOKIE) {
558 error = puffs_getvnode(dvp->v_mount,
559 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
560 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
561 if (error) {
562 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
563 lookup_msg->pvnr_newnode, ap->a_cnp);
564 goto out;
565 }
566 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
567 } else if (error) {
568 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP, VPTOPNC(dvp),
569 lookup_msg->pvnr_newnode, ap->a_cnp);
570 goto out;
571 }
572
573 *ap->a_vpp = vp;
574
575 if ((cnp->cn_flags & MAKEENTRY) != 0 && PUFFS_USE_NAMECACHE(pmp))
576 cache_enter(dvp, vp, cnp);
577
578 /* XXX */
579 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
580 cnp->cn_flags &= ~REQUIREDIR;
581 if (lookup_msg->pvnr_cn.pkcn_consume)
582 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
583 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
584
585 /*
586 * We need the name in remove and rmdir (well, rename too, but
587 * SAVESTART takes care of that)
588 */
589 if (cnp->cn_nameiop == DELETE)
590 cnp->cn_flags |= SAVENAME;
591
592 out:
593 if (cnp->cn_flags & ISDOTDOT)
594 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
595
596 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
597 PUFFS_MSG_RELEASE(lookup);
598 return error;
599 }
600
601 #define REFPN_AND_UNLOCKVP(a, b) \
602 do { \
603 mutex_enter(&b->pn_mtx); \
604 puffs_referencenode(b); \
605 mutex_exit(&b->pn_mtx); \
606 VOP_UNLOCK(a, 0); \
607 } while (/*CONSTCOND*/0)
608
609 #define REFPN(b) \
610 do { \
611 mutex_enter(&b->pn_mtx); \
612 puffs_referencenode(b); \
613 mutex_exit(&b->pn_mtx); \
614 } while (/*CONSTCOND*/0)
615
616 #define RELEPN_AND_VP(a, b) \
617 do { \
618 puffs_releasenode(b); \
619 vrele(a); \
620 } while (/*CONSTCOND*/0)
621
622 int
623 puffs_vnop_create(void *v)
624 {
625 struct vop_create_args /* {
626 const struct vnodeop_desc *a_desc;
627 struct vnode *a_dvp;
628 struct vnode **a_vpp;
629 struct componentname *a_cnp;
630 struct vattr *a_vap;
631 } */ *ap = v;
632 PUFFS_MSG_VARS(vn, create);
633 struct vnode *dvp = ap->a_dvp;
634 struct puffs_node *dpn = VPTOPP(dvp);
635 struct componentname *cnp = ap->a_cnp;
636 struct mount *mp = dvp->v_mount;
637 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
638 int error;
639
640 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
641 dvp, ap->a_cnp->cn_nameptr));
642
643 PUFFS_MSG_ALLOC(vn, create);
644 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
645 cnp, PUFFS_USE_FULLPNBUF(pmp));
646 create_msg->pvnr_va = *ap->a_vap;
647 puffs_msg_setinfo(park_create, PUFFSOP_VN,
648 PUFFS_VN_CREATE, VPTOPNC(dvp));
649 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_create, dvp->v_data, NULL, error);
650
651 error = checkerr(pmp, error, __func__);
652 if (error)
653 goto out;
654
655 error = puffs_newnode(mp, dvp, ap->a_vpp,
656 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
657 if (error)
658 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
659 create_msg->pvnr_newnode, cnp);
660
661 out:
662 vput(dvp);
663 if (error || (cnp->cn_flags & SAVESTART) == 0)
664 PNBUF_PUT(cnp->cn_pnbuf);
665
666 DPRINTF(("puffs_create: return %d\n", error));
667 PUFFS_MSG_RELEASE(create);
668 return error;
669 }
670
671 int
672 puffs_vnop_mknod(void *v)
673 {
674 struct vop_mknod_args /* {
675 const struct vnodeop_desc *a_desc;
676 struct vnode *a_dvp;
677 struct vnode **a_vpp;
678 struct componentname *a_cnp;
679 struct vattr *a_vap;
680 } */ *ap = v;
681 PUFFS_MSG_VARS(vn, mknod);
682 struct vnode *dvp = ap->a_dvp;
683 struct puffs_node *dpn = VPTOPP(dvp);
684 struct componentname *cnp = ap->a_cnp;
685 struct mount *mp = dvp->v_mount;
686 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
687 int error;
688
689 PUFFS_MSG_ALLOC(vn, mknod);
690 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
691 cnp, PUFFS_USE_FULLPNBUF(pmp));
692 mknod_msg->pvnr_va = *ap->a_vap;
693 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
694 PUFFS_VN_MKNOD, VPTOPNC(dvp));
695
696 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mknod, dvp->v_data, NULL, error);
697
698 error = checkerr(pmp, error, __func__);
699 if (error)
700 goto out;
701
702 error = puffs_newnode(mp, dvp, ap->a_vpp,
703 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
704 ap->a_vap->va_rdev);
705 if (error)
706 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
707 mknod_msg->pvnr_newnode, cnp);
708
709 out:
710 vput(dvp);
711 PUFFS_MSG_RELEASE(mknod);
712 if (error || (cnp->cn_flags & SAVESTART) == 0)
713 PNBUF_PUT(cnp->cn_pnbuf);
714 return error;
715 }
716
717 int
718 puffs_vnop_open(void *v)
719 {
720 struct vop_open_args /* {
721 const struct vnodeop_desc *a_desc;
722 struct vnode *a_vp;
723 int a_mode;
724 kauth_cred_t a_cred;
725 } */ *ap = v;
726 PUFFS_MSG_VARS(vn, open);
727 struct vnode *vp = ap->a_vp;
728 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
729 int mode = ap->a_mode;
730 int error;
731
732 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
733
734 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
735 ERROUT(EROFS);
736
737 if (!EXISTSOP(pmp, OPEN))
738 ERROUT(0);
739
740 PUFFS_MSG_ALLOC(vn, open);
741 open_msg->pvnr_mode = mode;
742 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
743 puffs_msg_setinfo(park_open, PUFFSOP_VN,
744 PUFFS_VN_OPEN, VPTOPNC(vp));
745
746 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
747 error = checkerr(pmp, error, __func__);
748
749 out:
750 DPRINTF(("puffs_open: returning %d\n", error));
751 PUFFS_MSG_RELEASE(open);
752 return error;
753 }
754
755 int
756 puffs_vnop_close(void *v)
757 {
758 struct vop_close_args /* {
759 const struct vnodeop_desc *a_desc;
760 struct vnode *a_vp;
761 int a_fflag;
762 kauth_cred_t a_cred;
763 } */ *ap = v;
764 PUFFS_MSG_VARS(vn, close);
765 struct vnode *vp = ap->a_vp;
766 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
767
768 PUFFS_MSG_ALLOC(vn, close);
769 puffs_msg_setfaf(park_close);
770 close_msg->pvnr_fflag = ap->a_fflag;
771 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
772 puffs_msg_setinfo(park_close, PUFFSOP_VN,
773 PUFFS_VN_CLOSE, VPTOPNC(vp));
774
775 puffs_msg_enqueue(pmp, park_close);
776 PUFFS_MSG_RELEASE(close);
777 return 0;
778 }
779
780 int
781 puffs_vnop_access(void *v)
782 {
783 struct vop_access_args /* {
784 const struct vnodeop_desc *a_desc;
785 struct vnode *a_vp;
786 int a_mode;
787 kauth_cred_t a_cred;
788 } */ *ap = v;
789 PUFFS_MSG_VARS(vn, access);
790 struct vnode *vp = ap->a_vp;
791 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
792 int mode = ap->a_mode;
793 int error;
794
795 if (mode & VWRITE) {
796 switch (vp->v_type) {
797 case VDIR:
798 case VLNK:
799 case VREG:
800 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
801 || !EXISTSOP(pmp, WRITE))
802 return EROFS;
803 break;
804 default:
805 break;
806 }
807 }
808
809 if (!EXISTSOP(pmp, ACCESS))
810 return 0;
811
812 PUFFS_MSG_ALLOC(vn, access);
813 access_msg->pvnr_mode = ap->a_mode;
814 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
815 puffs_msg_setinfo(park_access, PUFFSOP_VN,
816 PUFFS_VN_ACCESS, VPTOPNC(vp));
817
818 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
819 error = checkerr(pmp, error, __func__);
820 PUFFS_MSG_RELEASE(access);
821
822 return error;
823 }
824
825 int
826 puffs_vnop_getattr(void *v)
827 {
828 struct vop_getattr_args /* {
829 const struct vnodeop_desc *a_desc;
830 struct vnode *a_vp;
831 struct vattr *a_vap;
832 kauth_cred_t a_cred;
833 } */ *ap = v;
834 PUFFS_MSG_VARS(vn, getattr);
835 struct vnode *vp = ap->a_vp;
836 struct mount *mp = vp->v_mount;
837 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
838 struct vattr *vap, *rvap;
839 struct puffs_node *pn;
840 int error = 0;
841
842 vap = ap->a_vap;
843
844 PUFFS_MSG_ALLOC(vn, getattr);
845 vattr_null(&getattr_msg->pvnr_va);
846 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
847 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
848 PUFFS_VN_GETATTR, VPTOPNC(vp));
849
850 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
851 error = checkerr(pmp, error, __func__);
852 if (error)
853 goto out;
854
855 rvap = &getattr_msg->pvnr_va;
856 /*
857 * Don't listen to the file server regarding special device
858 * size info, the file server doesn't know anything about them.
859 */
860 if (vp->v_type == VBLK || vp->v_type == VCHR)
861 rvap->va_size = vp->v_size;
862
863 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
864 if (vp->v_type == VBLK)
865 rvap->va_blocksize = BLKDEV_IOSIZE;
866 else if (vp->v_type == VCHR)
867 rvap->va_blocksize = MAXBSIZE;
868
869 (void) memcpy(vap, rvap, sizeof(struct vattr));
870 vap->va_fsid = mp->mnt_stat.f_fsidx.__fsid_val[0];
871
872 pn = VPTOPP(vp);
873 if (pn->pn_stat & PNODE_METACACHE_ATIME)
874 vap->va_atime = pn->pn_mc_atime;
875 if (pn->pn_stat & PNODE_METACACHE_CTIME)
876 vap->va_ctime = pn->pn_mc_ctime;
877 if (pn->pn_stat & PNODE_METACACHE_MTIME)
878 vap->va_mtime = pn->pn_mc_mtime;
879 if (pn->pn_stat & PNODE_METACACHE_SIZE) {
880 vap->va_size = pn->pn_mc_size;
881 } else {
882 if (rvap->va_size != VNOVAL
883 && vp->v_type != VBLK && vp->v_type != VCHR) {
884 uvm_vnp_setsize(vp, rvap->va_size);
885 pn->pn_serversize = rvap->va_size;
886 }
887 }
888
889 out:
890 PUFFS_MSG_RELEASE(getattr);
891 return error;
892 }
893
894 static int
895 dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred, int chsize)
896 {
897 PUFFS_MSG_VARS(vn, setattr);
898 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
899 struct puffs_node *pn = vp->v_data;
900 int error;
901
902 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
903 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
904 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
905 || vap->va_mode != (mode_t)VNOVAL))
906 return EROFS;
907
908 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
909 && vp->v_type == VREG && vap->va_size != VNOVAL)
910 return EROFS;
911
912 /*
913 * Flush metacache first. If we are called with some explicit
914 * parameters, treat them as information overriding metacache
915 * information.
916 */
917 if (pn->pn_stat & PNODE_METACACHE_MASK) {
918 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
919 && vap->va_atime.tv_sec == VNOVAL)
920 vap->va_atime = pn->pn_mc_atime;
921 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
922 && vap->va_ctime.tv_sec == VNOVAL)
923 vap->va_ctime = pn->pn_mc_ctime;
924 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
925 && vap->va_mtime.tv_sec == VNOVAL)
926 vap->va_mtime = pn->pn_mc_mtime;
927 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
928 && vap->va_size == VNOVAL)
929 vap->va_size = pn->pn_mc_size;
930
931 pn->pn_stat &= ~PNODE_METACACHE_MASK;
932 }
933
934 PUFFS_MSG_ALLOC(vn, setattr);
935 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
936 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
937 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
938 PUFFS_VN_SETATTR, VPTOPNC(vp));
939
940 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setattr, vp->v_data, NULL, error);
941 PUFFS_MSG_RELEASE(setattr);
942 error = checkerr(pmp, error, __func__);
943 if (error)
944 return error;
945
946 if (vap->va_size != VNOVAL) {
947 pn->pn_serversize = vap->va_size;
948 if (chsize)
949 uvm_vnp_setsize(vp, vap->va_size);
950 }
951
952 return 0;
953 }
954
955 int
956 puffs_vnop_setattr(void *v)
957 {
958 struct vop_getattr_args /* {
959 const struct vnodeop_desc *a_desc;
960 struct vnode *a_vp;
961 struct vattr *a_vap;
962 kauth_cred_t a_cred;
963 } */ *ap = v;
964
965 return dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, 1);
966 }
967
968 static __inline int
969 doinact(struct puffs_mount *pmp, int iaflag)
970 {
971
972 if (EXISTSOP(pmp, INACTIVE))
973 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
974 if (iaflag || ALLOPS(pmp))
975 return 1;
976 else
977 return 0;
978 else
979 return 1;
980 else
981 return 0;
982 }
983
984 static void
985 callinactive(struct puffs_mount *pmp, puffs_cookie_t ck, int iaflag)
986 {
987 int error;
988 PUFFS_MSG_VARS(vn, inactive);
989
990 if (doinact(pmp, iaflag)) {
991 PUFFS_MSG_ALLOC(vn, inactive);
992 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
993 PUFFS_VN_INACTIVE, ck);
994
995 PUFFS_MSG_ENQUEUEWAIT(pmp, park_inactive, error);
996 PUFFS_MSG_RELEASE(inactive);
997 }
998 }
999
1000 /* XXX: callinactive can't setback */
1001 int
1002 puffs_vnop_inactive(void *v)
1003 {
1004 struct vop_inactive_args /* {
1005 const struct vnodeop_desc *a_desc;
1006 struct vnode *a_vp;
1007 } */ *ap = v;
1008 PUFFS_MSG_VARS(vn, inactive);
1009 struct vnode *vp = ap->a_vp;
1010 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1011 struct puffs_node *pnode;
1012 int error;
1013
1014 pnode = vp->v_data;
1015
1016 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1017 PUFFS_MSG_ALLOC(vn, inactive);
1018 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1019 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1020
1021 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_inactive, vp->v_data,
1022 NULL, error);
1023 PUFFS_MSG_RELEASE(inactive);
1024 }
1025 pnode->pn_stat &= ~PNODE_DOINACT;
1026
1027 /*
1028 * file server thinks it's gone? then don't be afraid care,
1029 * node's life was already all it would ever be
1030 */
1031 if (pnode->pn_stat & PNODE_NOREFS) {
1032 pnode->pn_stat |= PNODE_DYING;
1033 *ap->a_recycle = true;
1034 }
1035
1036 VOP_UNLOCK(vp, 0);
1037
1038 return 0;
1039 }
1040
1041 static void
1042 callreclaim(struct puffs_mount *pmp, puffs_cookie_t ck)
1043 {
1044 PUFFS_MSG_VARS(vn, reclaim);
1045
1046 if (!EXISTSOP(pmp, RECLAIM))
1047 return;
1048
1049 PUFFS_MSG_ALLOC(vn, reclaim);
1050 puffs_msg_setfaf(park_reclaim);
1051 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, ck);
1052
1053 puffs_msg_enqueue(pmp, park_reclaim);
1054 PUFFS_MSG_RELEASE(reclaim);
1055 }
1056
1057 /*
1058 * always FAF, we don't really care if the server wants to fail to
1059 * reclaim the node or not
1060 */
1061 int
1062 puffs_vnop_reclaim(void *v)
1063 {
1064 struct vop_reclaim_args /* {
1065 const struct vnodeop_desc *a_desc;
1066 struct vnode *a_vp;
1067 } */ *ap = v;
1068 struct vnode *vp = ap->a_vp;
1069 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1070 struct puffs_node *pnode = vp->v_data;
1071 bool notifyserver = true;
1072
1073 /*
1074 * first things first: check if someone is trying to reclaim the
1075 * root vnode. do not allow that to travel to userspace.
1076 * Note that we don't need to take the lock similarly to
1077 * puffs_root(), since there is only one of us.
1078 */
1079 if (vp->v_vflag & VV_ROOT) {
1080 mutex_enter(&pmp->pmp_lock);
1081 KASSERT(pmp->pmp_root != NULL);
1082 pmp->pmp_root = NULL;
1083 mutex_exit(&pmp->pmp_lock);
1084 notifyserver = false;
1085 }
1086
1087 /*
1088 * purge info from kernel before issueing FAF, since we
1089 * don't really know when we'll get around to it after
1090 * that and someone might race us into node creation
1091 */
1092 mutex_enter(&pmp->pmp_lock);
1093 LIST_REMOVE(pnode, pn_hashent);
1094 mutex_exit(&pmp->pmp_lock);
1095 if (PUFFS_USE_NAMECACHE(pmp))
1096 cache_purge(vp);
1097
1098 if (notifyserver)
1099 callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp));
1100
1101 puffs_putvnode(vp);
1102
1103 return 0;
1104 }
1105
1106 #define CSIZE sizeof(**ap->a_cookies)
1107 int
1108 puffs_vnop_readdir(void *v)
1109 {
1110 struct vop_readdir_args /* {
1111 const struct vnodeop_desc *a_desc;
1112 struct vnode *a_vp;
1113 struct uio *a_uio;
1114 kauth_cred_t a_cred;
1115 int *a_eofflag;
1116 off_t **a_cookies;
1117 int *a_ncookies;
1118 } */ *ap = v;
1119 PUFFS_MSG_VARS(vn, readdir);
1120 struct vnode *vp = ap->a_vp;
1121 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1122 size_t argsize, tomove, cookiemem, cookiesmax;
1123 struct uio *uio = ap->a_uio;
1124 size_t howmuch, resid;
1125 int error;
1126
1127 /*
1128 * ok, so we need: resid + cookiemem = maxreq
1129 * => resid + cookiesize * (resid/minsize) = maxreq
1130 * => resid + cookiesize/minsize * resid = maxreq
1131 * => (cookiesize/minsize + 1) * resid = maxreq
1132 * => resid = maxreq / (cookiesize/minsize + 1)
1133 *
1134 * Since cookiesize <= minsize and we're not very big on floats,
1135 * we approximate that to be 1. Therefore:
1136 *
1137 * resid = maxreq / 2;
1138 *
1139 * Well, at least we didn't have to use differential equations
1140 * or the Gram-Schmidt process.
1141 *
1142 * (yes, I'm very afraid of this)
1143 */
1144 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1145
1146 if (ap->a_cookies) {
1147 KASSERT(ap->a_ncookies != NULL);
1148 if (pmp->pmp_args.pa_fhsize == 0)
1149 return EOPNOTSUPP;
1150 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1151 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1152 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1153 } else {
1154 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1155 cookiesmax = 0;
1156 cookiemem = 0;
1157 }
1158
1159 argsize = sizeof(struct puffs_vnmsg_readdir);
1160 tomove = resid + cookiemem;
1161 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1162 (void *)&readdir_msg, 1);
1163
1164 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1165 readdir_msg->pvnr_offset = uio->uio_offset;
1166 readdir_msg->pvnr_resid = resid;
1167 readdir_msg->pvnr_ncookies = cookiesmax;
1168 readdir_msg->pvnr_eofflag = 0;
1169 readdir_msg->pvnr_dentoff = cookiemem;
1170 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1171 PUFFS_VN_READDIR, VPTOPNC(vp));
1172 puffs_msg_setdelta(park_readdir, tomove);
1173
1174 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1175 error = checkerr(pmp, error, __func__);
1176 if (error)
1177 goto out;
1178
1179 /* userspace is cheating? */
1180 if (readdir_msg->pvnr_resid > resid) {
1181 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1182 "resid grew", VPTOPNC(vp));
1183 ERROUT(EPROTO);
1184 }
1185 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1186 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1187 "too many cookies", VPTOPNC(vp));
1188 ERROUT(EPROTO);
1189 }
1190
1191 /* check eof */
1192 if (readdir_msg->pvnr_eofflag)
1193 *ap->a_eofflag = 1;
1194
1195 /* bouncy-wouncy with the directory data */
1196 howmuch = resid - readdir_msg->pvnr_resid;
1197
1198 /* force eof if no data was returned (getcwd() needs this) */
1199 if (howmuch == 0) {
1200 *ap->a_eofflag = 1;
1201 goto out;
1202 }
1203
1204 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1205 if (error)
1206 goto out;
1207
1208 /* provide cookies to caller if so desired */
1209 if (ap->a_cookies) {
1210 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1211 M_TEMP, M_WAITOK);
1212 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1213 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1214 *ap->a_ncookies*CSIZE);
1215 }
1216
1217 /* next readdir starts here */
1218 uio->uio_offset = readdir_msg->pvnr_offset;
1219
1220 out:
1221 puffs_msgmem_release(park_readdir);
1222 return error;
1223 }
1224 #undef CSIZE
1225
1226 /*
1227 * poll works by consuming the bitmask in pn_revents. If there are
1228 * events available, poll returns immediately. If not, it issues a
1229 * poll to userspace, selrecords itself and returns with no available
1230 * events. When the file server returns, it executes puffs_parkdone_poll(),
1231 * where available events are added to the bitmask. selnotify() is
1232 * then also executed by that function causing us to enter here again
1233 * and hopefully find the missing bits (unless someone got them first,
1234 * in which case it starts all over again).
1235 */
1236 int
1237 puffs_vnop_poll(void *v)
1238 {
1239 struct vop_poll_args /* {
1240 const struct vnodeop_desc *a_desc;
1241 struct vnode *a_vp;
1242 int a_events;
1243 } */ *ap = v;
1244 PUFFS_MSG_VARS(vn, poll);
1245 struct vnode *vp = ap->a_vp;
1246 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1247 struct puffs_node *pn = vp->v_data;
1248 int events, error;
1249
1250 if (EXISTSOP(pmp, POLL)) {
1251 mutex_enter(&pn->pn_mtx);
1252 events = pn->pn_revents & ap->a_events;
1253 if (events & ap->a_events) {
1254 pn->pn_revents &= ~ap->a_events;
1255 mutex_exit(&pn->pn_mtx);
1256
1257 return events;
1258 } else {
1259 puffs_referencenode(pn);
1260 mutex_exit(&pn->pn_mtx);
1261
1262 PUFFS_MSG_ALLOC(vn, poll);
1263 poll_msg->pvnr_events = ap->a_events;
1264 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1265 PUFFS_VN_POLL, VPTOPNC(vp));
1266 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1267 selrecord(curlwp, &pn->pn_sel);
1268
1269 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_poll, vp->v_data,
1270 NULL, error);
1271 PUFFS_MSG_RELEASE(poll);
1272
1273 return 0;
1274 }
1275 } else {
1276 return genfs_poll(v);
1277 }
1278 }
1279
1280 int
1281 puffs_vnop_fsync(void *v)
1282 {
1283 struct vop_fsync_args /* {
1284 const struct vnodeop_desc *a_desc;
1285 struct vnode *a_vp;
1286 kauth_cred_t a_cred;
1287 int a_flags;
1288 off_t a_offlo;
1289 off_t a_offhi;
1290 } */ *ap = v;
1291 PUFFS_MSG_VARS(vn, fsync);
1292 struct vnode *vp = ap->a_vp;
1293 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1294 struct puffs_node *pn;
1295 struct vattr va;
1296 int pflags, error, dofaf;
1297
1298 pn = VPTOPP(vp);
1299
1300 /* flush out information from our metacache, see vop_setattr */
1301 if (pn->pn_stat & PNODE_METACACHE_MASK
1302 && (pn->pn_stat & PNODE_DYING) == 0) {
1303 vattr_null(&va);
1304 error = VOP_SETATTR(vp, &va, FSCRED);
1305 if (error)
1306 return error;
1307 }
1308
1309 /*
1310 * flush pages to avoid being overly dirty
1311 */
1312 pflags = PGO_CLEANIT;
1313 if (ap->a_flags & FSYNC_WAIT)
1314 pflags |= PGO_SYNCIO;
1315 mutex_enter(&vp->v_interlock);
1316 error = VOP_PUTPAGES(vp, trunc_page(ap->a_offlo),
1317 round_page(ap->a_offhi), pflags);
1318 if (error)
1319 return error;
1320
1321 /*
1322 * HELLO! We exit already here if the user server does not
1323 * support fsync OR if we should call fsync for a node which
1324 * has references neither in the kernel or the fs server.
1325 * Otherwise we continue to issue fsync() forward.
1326 */
1327 if (!EXISTSOP(pmp, FSYNC) || (pn->pn_stat & PNODE_DYING))
1328 return 0;
1329
1330 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1331 /*
1332 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1333 * only FAFs for those. Otherwise there's a danger of deadlock,
1334 * since the execution context here might be the user server
1335 * doing some operation on another fs, which in turn caused a
1336 * vnode to be reclaimed from the freelist for this fs.
1337 */
1338 if (dofaf == 0) {
1339 mutex_enter(&vp->v_interlock);
1340 if (vp->v_iflag & VI_XLOCK)
1341 dofaf = 1;
1342 mutex_exit(&vp->v_interlock);
1343 }
1344
1345 PUFFS_MSG_ALLOC(vn, fsync);
1346 if (dofaf)
1347 puffs_msg_setfaf(park_fsync);
1348
1349 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1350 fsync_msg->pvnr_flags = ap->a_flags;
1351 fsync_msg->pvnr_offlo = ap->a_offlo;
1352 fsync_msg->pvnr_offhi = ap->a_offhi;
1353 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1354 PUFFS_VN_FSYNC, VPTOPNC(vp));
1355
1356 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1357 PUFFS_MSG_RELEASE(fsync);
1358
1359 error = checkerr(pmp, error, __func__);
1360
1361 return error;
1362 }
1363
1364 int
1365 puffs_vnop_seek(void *v)
1366 {
1367 struct vop_seek_args /* {
1368 const struct vnodeop_desc *a_desc;
1369 struct vnode *a_vp;
1370 off_t a_oldoff;
1371 off_t a_newoff;
1372 kauth_cred_t a_cred;
1373 } */ *ap = v;
1374 PUFFS_MSG_VARS(vn, seek);
1375 struct vnode *vp = ap->a_vp;
1376 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1377 int error;
1378
1379 PUFFS_MSG_ALLOC(vn, seek);
1380 seek_msg->pvnr_oldoff = ap->a_oldoff;
1381 seek_msg->pvnr_newoff = ap->a_newoff;
1382 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1383 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1384 PUFFS_VN_SEEK, VPTOPNC(vp));
1385
1386 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1387 PUFFS_MSG_RELEASE(seek);
1388 return checkerr(pmp, error, __func__);
1389 }
1390
1391 static int
1392 callremove(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1393 struct componentname *cnp)
1394 {
1395 PUFFS_MSG_VARS(vn, remove);
1396 int error;
1397
1398 PUFFS_MSG_ALLOC(vn, remove);
1399 remove_msg->pvnr_cookie_targ = ck;
1400 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1401 cnp, PUFFS_USE_FULLPNBUF(pmp));
1402 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dck);
1403
1404 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1405 PUFFS_MSG_RELEASE(remove);
1406
1407 return checkerr(pmp, error, __func__);
1408 }
1409
1410 /*
1411 * XXX: can't use callremove now because can't catch setbacks with
1412 * it due to lack of a pnode argument.
1413 */
1414 int
1415 puffs_vnop_remove(void *v)
1416 {
1417 struct vop_remove_args /* {
1418 const struct vnodeop_desc *a_desc;
1419 struct vnode *a_dvp;
1420 struct vnode *a_vp;
1421 struct componentname *a_cnp;
1422 } */ *ap = v;
1423 PUFFS_MSG_VARS(vn, remove);
1424 struct vnode *dvp = ap->a_dvp;
1425 struct vnode *vp = ap->a_vp;
1426 struct puffs_node *dpn = VPTOPP(dvp);
1427 struct puffs_node *pn = VPTOPP(vp);
1428 struct componentname *cnp = ap->a_cnp;
1429 struct mount *mp = dvp->v_mount;
1430 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1431 int error;
1432
1433 PUFFS_MSG_ALLOC(vn, remove);
1434 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1435 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1436 cnp, PUFFS_USE_FULLPNBUF(pmp));
1437 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1438 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1439
1440 puffs_msg_enqueue(pmp, park_remove);
1441 REFPN_AND_UNLOCKVP(dvp, dpn);
1442 if (dvp == vp)
1443 REFPN(pn);
1444 else
1445 REFPN_AND_UNLOCKVP(vp, pn);
1446 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1447
1448 PUFFS_MSG_RELEASE(remove);
1449
1450 RELEPN_AND_VP(dvp, dpn);
1451 RELEPN_AND_VP(vp, pn);
1452
1453 error = checkerr(pmp, error, __func__);
1454 if (error || (cnp->cn_flags & SAVESTART) == 0)
1455 PNBUF_PUT(cnp->cn_pnbuf);
1456 return error;
1457 }
1458
1459 int
1460 puffs_vnop_mkdir(void *v)
1461 {
1462 struct vop_mkdir_args /* {
1463 const struct vnodeop_desc *a_desc;
1464 struct vnode *a_dvp;
1465 struct vnode **a_vpp;
1466 struct componentname *a_cnp;
1467 struct vattr *a_vap;
1468 } */ *ap = v;
1469 PUFFS_MSG_VARS(vn, mkdir);
1470 struct vnode *dvp = ap->a_dvp;
1471 struct puffs_node *dpn = VPTOPP(dvp);
1472 struct componentname *cnp = ap->a_cnp;
1473 struct mount *mp = dvp->v_mount;
1474 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1475 int error;
1476
1477 PUFFS_MSG_ALLOC(vn, mkdir);
1478 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1479 cnp, PUFFS_USE_FULLPNBUF(pmp));
1480 mkdir_msg->pvnr_va = *ap->a_vap;
1481 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1482 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1483
1484 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mkdir, dvp->v_data, NULL, error);
1485
1486 error = checkerr(pmp, error, __func__);
1487 if (error)
1488 goto out;
1489
1490 error = puffs_newnode(mp, dvp, ap->a_vpp,
1491 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1492 if (error)
1493 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1494 mkdir_msg->pvnr_newnode, cnp);
1495
1496 out:
1497 vput(dvp);
1498 PUFFS_MSG_RELEASE(mkdir);
1499 if (error || (cnp->cn_flags & SAVESTART) == 0)
1500 PNBUF_PUT(cnp->cn_pnbuf);
1501 return error;
1502 }
1503
1504 static int
1505 callrmdir(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1506 struct componentname *cnp)
1507 {
1508 PUFFS_MSG_VARS(vn, rmdir);
1509 int error;
1510
1511 PUFFS_MSG_ALLOC(vn, rmdir);
1512 rmdir_msg->pvnr_cookie_targ = ck;
1513 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1514 cnp, PUFFS_USE_FULLPNBUF(pmp));
1515 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dck);
1516
1517 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1518 PUFFS_MSG_RELEASE(rmdir);
1519
1520 return checkerr(pmp, error, __func__);
1521 }
1522
1523 int
1524 puffs_vnop_rmdir(void *v)
1525 {
1526 struct vop_rmdir_args /* {
1527 const struct vnodeop_desc *a_desc;
1528 struct vnode *a_dvp;
1529 struct vnode *a_vp;
1530 struct componentname *a_cnp;
1531 } */ *ap = v;
1532 PUFFS_MSG_VARS(vn, rmdir);
1533 struct vnode *dvp = ap->a_dvp;
1534 struct vnode *vp = ap->a_vp;
1535 struct puffs_node *dpn = VPTOPP(dvp);
1536 struct puffs_node *pn = VPTOPP(vp);
1537 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1538 struct componentname *cnp = ap->a_cnp;
1539 int error;
1540
1541 PUFFS_MSG_ALLOC(vn, rmdir);
1542 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1543 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1544 cnp, PUFFS_USE_FULLPNBUF(pmp));
1545 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1546 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1547
1548 puffs_msg_enqueue(pmp, park_rmdir);
1549 REFPN_AND_UNLOCKVP(dvp, dpn);
1550 REFPN_AND_UNLOCKVP(vp, pn);
1551 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1552
1553 PUFFS_MSG_RELEASE(rmdir);
1554
1555 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1556 RELEPN_AND_VP(dvp, dpn);
1557 RELEPN_AND_VP(vp, pn);
1558
1559 if (error || (cnp->cn_flags & SAVESTART) == 0)
1560 PNBUF_PUT(cnp->cn_pnbuf);
1561
1562 return error;
1563 }
1564
1565 int
1566 puffs_vnop_link(void *v)
1567 {
1568 struct vop_link_args /* {
1569 const struct vnodeop_desc *a_desc;
1570 struct vnode *a_dvp;
1571 struct vnode *a_vp;
1572 struct componentname *a_cnp;
1573 } */ *ap = v;
1574 PUFFS_MSG_VARS(vn, link);
1575 struct vnode *dvp = ap->a_dvp;
1576 struct vnode *vp = ap->a_vp;
1577 struct puffs_node *dpn = VPTOPP(dvp);
1578 struct puffs_node *pn = VPTOPP(vp);
1579 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1580 struct componentname *cnp = ap->a_cnp;
1581 int error;
1582
1583 PUFFS_MSG_ALLOC(vn, link);
1584 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
1585 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
1586 cnp, PUFFS_USE_FULLPNBUF(pmp));
1587 puffs_msg_setinfo(park_link, PUFFSOP_VN,
1588 PUFFS_VN_LINK, VPTOPNC(dvp));
1589
1590 puffs_msg_enqueue(pmp, park_link);
1591 REFPN_AND_UNLOCKVP(dvp, dpn);
1592 REFPN(pn);
1593 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
1594
1595 PUFFS_MSG_RELEASE(link);
1596
1597 error = checkerr(pmp, error, __func__);
1598
1599 /*
1600 * XXX: stay in touch with the cache. I don't like this, but
1601 * don't have a better solution either. See also puffs_rename().
1602 */
1603 if (error == 0)
1604 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
1605
1606 PNBUF_PUT(cnp->cn_pnbuf);
1607 RELEPN_AND_VP(dvp, dpn);
1608 puffs_releasenode(pn);
1609
1610 return error;
1611 }
1612
1613 int
1614 puffs_vnop_symlink(void *v)
1615 {
1616 struct vop_symlink_args /* {
1617 const struct vnodeop_desc *a_desc;
1618 struct vnode *a_dvp;
1619 struct vnode **a_vpp;
1620 struct componentname *a_cnp;
1621 struct vattr *a_vap;
1622 char *a_target;
1623 } */ *ap = v;
1624 PUFFS_MSG_VARS(vn, symlink);
1625 struct vnode *dvp = ap->a_dvp;
1626 struct puffs_node *dpn = VPTOPP(dvp);
1627 struct mount *mp = dvp->v_mount;
1628 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1629 struct componentname *cnp = ap->a_cnp;
1630 int error;
1631
1632 *ap->a_vpp = NULL;
1633
1634 PUFFS_MSG_ALLOC(vn, symlink);
1635 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
1636 cnp, PUFFS_USE_FULLPNBUF(pmp));
1637 symlink_msg->pvnr_va = *ap->a_vap;
1638 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
1639 sizeof(symlink_msg->pvnr_link));
1640 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
1641 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
1642
1643 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_symlink, dvp->v_data, NULL, error);
1644
1645 error = checkerr(pmp, error, __func__);
1646 if (error)
1647 goto out;
1648
1649 error = puffs_newnode(mp, dvp, ap->a_vpp,
1650 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
1651 if (error)
1652 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
1653 symlink_msg->pvnr_newnode, cnp);
1654
1655 out:
1656 vput(dvp);
1657 PUFFS_MSG_RELEASE(symlink);
1658 if (error || (cnp->cn_flags & SAVESTART) == 0)
1659 PNBUF_PUT(cnp->cn_pnbuf);
1660
1661 return error;
1662 }
1663
1664 int
1665 puffs_vnop_readlink(void *v)
1666 {
1667 struct vop_readlink_args /* {
1668 const struct vnodeop_desc *a_desc;
1669 struct vnode *a_vp;
1670 struct uio *a_uio;
1671 kauth_cred_t a_cred;
1672 } */ *ap = v;
1673 PUFFS_MSG_VARS(vn, readlink);
1674 struct vnode *vp = ap->a_vp;
1675 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
1676 size_t linklen;
1677 int error;
1678
1679 PUFFS_MSG_ALLOC(vn, readlink);
1680 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
1681 linklen = sizeof(readlink_msg->pvnr_link);
1682 readlink_msg->pvnr_linklen = linklen;
1683 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
1684 PUFFS_VN_READLINK, VPTOPNC(vp));
1685
1686 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
1687 error = checkerr(pmp, error, __func__);
1688 if (error)
1689 goto out;
1690
1691 /* bad bad user file server */
1692 if (readlink_msg->pvnr_linklen > linklen) {
1693 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
1694 "linklen too big", VPTOPNC(ap->a_vp));
1695 error = EPROTO;
1696 goto out;
1697 }
1698
1699 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
1700 ap->a_uio);
1701 out:
1702 PUFFS_MSG_RELEASE(readlink);
1703 return error;
1704 }
1705
1706 int
1707 puffs_vnop_rename(void *v)
1708 {
1709 struct vop_rename_args /* {
1710 const struct vnodeop_desc *a_desc;
1711 struct vnode *a_fdvp;
1712 struct vnode *a_fvp;
1713 struct componentname *a_fcnp;
1714 struct vnode *a_tdvp;
1715 struct vnode *a_tvp;
1716 struct componentname *a_tcnp;
1717 } */ *ap = v;
1718 PUFFS_MSG_VARS(vn, rename);
1719 struct vnode *fdvp = ap->a_fdvp;
1720 struct puffs_node *fpn = ap->a_fvp->v_data;
1721 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
1722 int error;
1723
1724 if (ap->a_fvp->v_mount != ap->a_tdvp->v_mount)
1725 ERROUT(EXDEV);
1726
1727 PUFFS_MSG_ALLOC(vn, rename);
1728 rename_msg->pvnr_cookie_src = VPTOPNC(ap->a_fvp);
1729 rename_msg->pvnr_cookie_targdir = VPTOPNC(ap->a_tdvp);
1730 if (ap->a_tvp)
1731 rename_msg->pvnr_cookie_targ = VPTOPNC(ap->a_tvp);
1732 else
1733 rename_msg->pvnr_cookie_targ = NULL;
1734 puffs_makecn(&rename_msg->pvnr_cn_src, &rename_msg->pvnr_cn_src_cred,
1735 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
1736 puffs_makecn(&rename_msg->pvnr_cn_targ, &rename_msg->pvnr_cn_targ_cred,
1737 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
1738 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
1739 PUFFS_VN_RENAME, VPTOPNC(fdvp));
1740
1741 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
1742 error = checkerr(pmp, error, __func__);
1743
1744 /*
1745 * XXX: stay in touch with the cache. I don't like this, but
1746 * don't have a better solution either. See also puffs_link().
1747 */
1748 if (error == 0)
1749 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
1750
1751 out:
1752 PUFFS_MSG_RELEASE(rename);
1753 if (ap->a_tvp != NULL)
1754 vput(ap->a_tvp);
1755 if (ap->a_tdvp == ap->a_tvp)
1756 vrele(ap->a_tdvp);
1757 else
1758 vput(ap->a_tdvp);
1759
1760 vrele(ap->a_fdvp);
1761 vrele(ap->a_fvp);
1762
1763 return error;
1764 }
1765
1766 #define RWARGS(cont, iofl, move, offset, creds) \
1767 (cont)->pvnr_ioflag = (iofl); \
1768 (cont)->pvnr_resid = (move); \
1769 (cont)->pvnr_offset = (offset); \
1770 puffs_credcvt(&(cont)->pvnr_cred, creds)
1771
1772 int
1773 puffs_vnop_read(void *v)
1774 {
1775 struct vop_read_args /* {
1776 const struct vnodeop_desc *a_desc;
1777 struct vnode *a_vp;
1778 struct uio *a_uio;
1779 int a_ioflag;
1780 kauth_cred_t a_cred;
1781 } */ *ap = v;
1782 PUFFS_MSG_VARS(vn, read);
1783 struct vnode *vp = ap->a_vp;
1784 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1785 struct uio *uio = ap->a_uio;
1786 size_t tomove, argsize;
1787 vsize_t bytelen;
1788 int error;
1789
1790 read_msg = NULL;
1791 error = 0;
1792
1793 /* std sanity */
1794 if (uio->uio_resid == 0)
1795 return 0;
1796 if (uio->uio_offset < 0)
1797 return EINVAL;
1798
1799 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1800 const int advice = IO_ADV_DECODE(ap->a_ioflag);
1801
1802 while (uio->uio_resid > 0) {
1803 bytelen = MIN(uio->uio_resid,
1804 vp->v_size - uio->uio_offset);
1805 if (bytelen == 0)
1806 break;
1807
1808 error = ubc_uiomove(&vp->v_uobj, uio, bytelen, advice,
1809 UBC_READ | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp));
1810 if (error)
1811 break;
1812 }
1813
1814 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
1815 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
1816 } else {
1817 /*
1818 * in case it's not a regular file or we're operating
1819 * uncached, do read in the old-fashioned style,
1820 * i.e. explicit read operations
1821 */
1822
1823 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1824 argsize = sizeof(struct puffs_vnmsg_read);
1825 puffs_msgmem_alloc(argsize + tomove, &park_read,
1826 (void *)&read_msg, 1);
1827
1828 error = 0;
1829 while (uio->uio_resid > 0) {
1830 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1831 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
1832 RWARGS(read_msg, ap->a_ioflag, tomove,
1833 uio->uio_offset, ap->a_cred);
1834 puffs_msg_setinfo(park_read, PUFFSOP_VN,
1835 PUFFS_VN_READ, VPTOPNC(vp));
1836 puffs_msg_setdelta(park_read, tomove);
1837
1838 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
1839 NULL, error);
1840 error = checkerr(pmp, error, __func__);
1841 if (error)
1842 break;
1843
1844 if (read_msg->pvnr_resid > tomove) {
1845 puffs_senderr(pmp, PUFFS_ERR_READ,
1846 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
1847 error = EPROTO;
1848 break;
1849 }
1850
1851 error = uiomove(read_msg->pvnr_data,
1852 tomove - read_msg->pvnr_resid, uio);
1853
1854 /*
1855 * in case the file is out of juice, resid from
1856 * userspace is != 0. and the error-case is
1857 * quite obvious
1858 */
1859 if (error || read_msg->pvnr_resid)
1860 break;
1861 }
1862
1863 puffs_msgmem_release(park_read);
1864 }
1865
1866 return error;
1867 }
1868
1869 /*
1870 * XXX: in case of a failure, this leaves uio in a bad state.
1871 * We could theoretically copy the uio and iovecs and "replay"
1872 * them the right amount after the userspace trip, but don't
1873 * bother for now.
1874 */
1875 int
1876 puffs_vnop_write(void *v)
1877 {
1878 struct vop_write_args /* {
1879 const struct vnodeop_desc *a_desc;
1880 struct vnode *a_vp;
1881 struct uio *a_uio;
1882 int a_ioflag;
1883 kauth_cred_t a_cred;
1884 } */ *ap = v;
1885 PUFFS_MSG_VARS(vn, write);
1886 struct vnode *vp = ap->a_vp;
1887 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1888 struct uio *uio = ap->a_uio;
1889 size_t tomove, argsize;
1890 off_t oldoff, newoff, origoff;
1891 vsize_t bytelen;
1892 int error, uflags;
1893 int ubcflags;
1894
1895 error = uflags = 0;
1896 write_msg = NULL;
1897
1898 if (vp->v_type == VREG && PUFFS_USE_PAGECACHE(pmp)) {
1899 ubcflags = UBC_WRITE | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp);
1900
1901 /*
1902 * userspace *should* be allowed to control this,
1903 * but with UBC it's a bit unclear how to handle it
1904 */
1905 if (ap->a_ioflag & IO_APPEND)
1906 uio->uio_offset = vp->v_size;
1907
1908 origoff = uio->uio_offset;
1909 while (uio->uio_resid > 0) {
1910 uflags |= PUFFS_UPDATECTIME;
1911 uflags |= PUFFS_UPDATEMTIME;
1912 oldoff = uio->uio_offset;
1913 bytelen = uio->uio_resid;
1914
1915 newoff = oldoff + bytelen;
1916 if (vp->v_size < newoff) {
1917 uvm_vnp_setwritesize(vp, newoff);
1918 }
1919 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
1920 UVM_ADV_RANDOM, ubcflags);
1921
1922 /*
1923 * In case of a ubc_uiomove() error,
1924 * opt to not extend the file at all and
1925 * return an error. Otherwise, if we attempt
1926 * to clear the memory we couldn't fault to,
1927 * we might generate a kernel page fault.
1928 */
1929 if (vp->v_size < newoff) {
1930 if (error == 0) {
1931 uflags |= PUFFS_UPDATESIZE;
1932 uvm_vnp_setsize(vp, newoff);
1933 } else {
1934 uvm_vnp_setwritesize(vp, vp->v_size);
1935 }
1936 }
1937 if (error)
1938 break;
1939
1940 /*
1941 * If we're writing large files, flush to file server
1942 * every 64k. Otherwise we can very easily exhaust
1943 * kernel and user memory, as the file server cannot
1944 * really keep up with our writing speed.
1945 *
1946 * Note: this does *NOT* honor MNT_ASYNC, because
1947 * that gives userland too much say in the kernel.
1948 */
1949 if (oldoff >> 16 != uio->uio_offset >> 16) {
1950 mutex_enter(&vp->v_interlock);
1951 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
1952 uio->uio_offset & ~0xffff,
1953 PGO_CLEANIT | PGO_SYNCIO);
1954 if (error)
1955 break;
1956 }
1957 }
1958
1959 /* synchronous I/O? */
1960 if (error == 0 && ap->a_ioflag & IO_SYNC) {
1961 mutex_enter(&vp->v_interlock);
1962 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1963 round_page(uio->uio_offset),
1964 PGO_CLEANIT | PGO_SYNCIO);
1965
1966 /* write through page cache? */
1967 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
1968 mutex_enter(&vp->v_interlock);
1969 error = VOP_PUTPAGES(vp, trunc_page(origoff),
1970 round_page(uio->uio_offset), PGO_CLEANIT);
1971 }
1972
1973 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
1974 } else {
1975 /* tomove is non-increasing */
1976 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1977 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
1978 puffs_msgmem_alloc(argsize, &park_write, (void *)&write_msg,1);
1979
1980 while (uio->uio_resid > 0) {
1981 /* move data to buffer */
1982 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
1983 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
1984 RWARGS(write_msg, ap->a_ioflag, tomove,
1985 uio->uio_offset, ap->a_cred);
1986 error = uiomove(write_msg->pvnr_data, tomove, uio);
1987 if (error)
1988 break;
1989
1990 /* move buffer to userspace */
1991 puffs_msg_setinfo(park_write, PUFFSOP_VN,
1992 PUFFS_VN_WRITE, VPTOPNC(vp));
1993 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
1994 NULL, error);
1995 error = checkerr(pmp, error, __func__);
1996 if (error)
1997 break;
1998
1999 if (write_msg->pvnr_resid > tomove) {
2000 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2001 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2002 error = EPROTO;
2003 break;
2004 }
2005
2006 /* adjust file size */
2007 if (vp->v_size < uio->uio_offset)
2008 uvm_vnp_setsize(vp, uio->uio_offset);
2009
2010 /* didn't move everything? bad userspace. bail */
2011 if (write_msg->pvnr_resid != 0) {
2012 error = EIO;
2013 break;
2014 }
2015 }
2016 puffs_msgmem_release(park_write);
2017 }
2018
2019 return error;
2020 }
2021
2022 int
2023 puffs_vnop_print(void *v)
2024 {
2025 struct vop_print_args /* {
2026 struct vnode *a_vp;
2027 } */ *ap = v;
2028 PUFFS_MSG_VARS(vn, print);
2029 struct vnode *vp = ap->a_vp;
2030 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2031 struct puffs_node *pn = vp->v_data;
2032 int error;
2033
2034 /* kernel portion */
2035 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2036 " userspace cookie: %p\n", vp, pn, pn->pn_cookie);
2037 if (vp->v_type == VFIFO)
2038 fifo_printinfo(vp);
2039
2040 /* userspace portion */
2041 if (EXISTSOP(pmp, PRINT)) {
2042 PUFFS_MSG_ALLOC(vn, print);
2043 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2044 PUFFS_VN_PRINT, VPTOPNC(vp));
2045 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_print, vp->v_data,
2046 NULL, error);
2047 PUFFS_MSG_RELEASE(print);
2048 }
2049
2050 return 0;
2051 }
2052
2053 int
2054 puffs_vnop_pathconf(void *v)
2055 {
2056 struct vop_pathconf_args /* {
2057 const struct vnodeop_desc *a_desc;
2058 struct vnode *a_vp;
2059 int a_name;
2060 register_t *a_retval;
2061 } */ *ap = v;
2062 PUFFS_MSG_VARS(vn, pathconf);
2063 struct vnode *vp = ap->a_vp;
2064 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2065 int error;
2066
2067 PUFFS_MSG_ALLOC(vn, pathconf);
2068 pathconf_msg->pvnr_name = ap->a_name;
2069 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2070 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2071 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2072 error = checkerr(pmp, error, __func__);
2073 if (!error)
2074 *ap->a_retval = pathconf_msg->pvnr_retval;
2075 PUFFS_MSG_RELEASE(pathconf);
2076
2077 return error;
2078 }
2079
2080 int
2081 puffs_vnop_advlock(void *v)
2082 {
2083 struct vop_advlock_args /* {
2084 const struct vnodeop_desc *a_desc;
2085 struct vnode *a_vp;
2086 void *a_id;
2087 int a_op;
2088 struct flock *a_fl;
2089 int a_flags;
2090 } */ *ap = v;
2091 PUFFS_MSG_VARS(vn, advlock);
2092 struct vnode *vp = ap->a_vp;
2093 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2094 int error;
2095
2096 PUFFS_MSG_ALLOC(vn, advlock);
2097 error = copyin(ap->a_fl, &advlock_msg->pvnr_fl, sizeof(struct flock));
2098 if (error)
2099 goto out;
2100 advlock_msg->pvnr_id = ap->a_id;
2101 advlock_msg->pvnr_op = ap->a_op;
2102 advlock_msg->pvnr_flags = ap->a_flags;
2103 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2104 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2105
2106 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2107 error = checkerr(pmp, error, __func__);
2108
2109 out:
2110 PUFFS_MSG_RELEASE(advlock);
2111 return error;
2112 }
2113
2114 int
2115 puffs_vnop_abortop(void *v)
2116 {
2117 struct vop_abortop_args /* {
2118 struct vnode *a_dvp;
2119 struct componentname *a_cnp;
2120 }; */ *ap = v;
2121 PUFFS_MSG_VARS(vn, abortop);
2122 struct vnode *dvp = ap->a_dvp;
2123 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
2124 struct componentname *cnp = ap->a_cnp;
2125 int error;
2126
2127 if (EXISTSOP(pmp, ABORTOP)) {
2128 PUFFS_MSG_ALLOC(vn, abortop);
2129 puffs_makecn(&abortop_msg->pvnr_cn, &abortop_msg->pvnr_cn_cred,
2130 cnp, PUFFS_USE_FULLPNBUF(pmp));
2131 puffs_msg_setinfo(park_abortop, PUFFSOP_VN,
2132 PUFFS_VN_ABORTOP, VPTOPNC(dvp));
2133
2134 PUFFS_MSG_ENQUEUEWAIT(pmp, park_abortop, error);
2135 PUFFS_MSG_RELEASE(abortop);
2136 }
2137
2138 return genfs_abortop(v);
2139 }
2140
2141 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2142
2143 /*
2144 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2145 */
2146 int
2147 puffs_vnop_strategy(void *v)
2148 {
2149 struct vop_strategy_args /* {
2150 const struct vnodeop_desc *a_desc;
2151 struct vnode *a_vp;
2152 struct buf *a_bp;
2153 } */ *ap = v;
2154 PUFFS_MSG_VARS(vn, rw);
2155 struct vnode *vp = ap->a_vp;
2156 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2157 struct puffs_node *pn;
2158 struct buf *bp;
2159 size_t argsize;
2160 size_t tomove, moved;
2161 int error, dofaf, dobiodone;
2162
2163 pmp = MPTOPUFFSMP(vp->v_mount);
2164 bp = ap->a_bp;
2165 error = 0;
2166 dofaf = 0;
2167 pn = VPTOPP(vp);
2168 park_rw = NULL; /* explicit */
2169 dobiodone = 1;
2170
2171 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2172 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2173 ERROUT(EOPNOTSUPP);
2174
2175 /*
2176 * Short-circuit optimization: don't flush buffer in between
2177 * VOP_INACTIVE and VOP_RECLAIM in case the node has no references.
2178 */
2179 if (pn->pn_stat & PNODE_DYING) {
2180 KASSERT(BUF_ISWRITE(bp));
2181 bp->b_resid = 0;
2182 goto out;
2183 }
2184
2185 #ifdef DIAGNOSTIC
2186 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2187 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2188 bp->b_bcount);
2189 #endif
2190
2191 /*
2192 * See explanation for the necessity of a FAF in puffs_fsync.
2193 *
2194 * Also, do FAF in case we're suspending.
2195 * See puffs_vfsops.c:pageflush()
2196 */
2197 if (BUF_ISWRITE(bp)) {
2198 mutex_enter(&vp->v_interlock);
2199 if (vp->v_iflag & VI_XLOCK)
2200 dofaf = 1;
2201 if (pn->pn_stat & PNODE_SUSPEND)
2202 dofaf = 1;
2203 mutex_exit(&vp->v_interlock);
2204 }
2205
2206 #ifdef DIAGNOSTIC
2207 if (curlwp == uvm.pagedaemon_lwp)
2208 KASSERT(dofaf || BIOASYNC(bp));
2209 #endif
2210
2211 /* allocate transport structure */
2212 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2213 argsize = sizeof(struct puffs_vnmsg_rw);
2214 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2215 (void *)&rw_msg, dofaf ? 0 : 1);
2216 if (error)
2217 goto out;
2218 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2219
2220 /* 2x2 cases: read/write, faf/nofaf */
2221 if (BUF_ISREAD(bp)) {
2222 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2223 PUFFS_VN_READ, VPTOPNC(vp));
2224 puffs_msg_setdelta(park_rw, tomove);
2225 if (BIOASYNC(bp)) {
2226 puffs_msg_setcall(park_rw,
2227 puffs_parkdone_asyncbioread, bp);
2228 puffs_msg_enqueue(pmp, park_rw);
2229 dobiodone = 0;
2230 } else {
2231 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2232 NULL, error);
2233 error = checkerr(pmp, error, __func__);
2234 if (error)
2235 goto out;
2236
2237 if (rw_msg->pvnr_resid > tomove) {
2238 puffs_senderr(pmp, PUFFS_ERR_READ,
2239 E2BIG, "resid grew", VPTOPNC(vp));
2240 ERROUT(EPROTO);
2241 }
2242
2243 moved = tomove - rw_msg->pvnr_resid;
2244
2245 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2246 bp->b_resid = bp->b_bcount - moved;
2247 }
2248 } else {
2249 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2250 PUFFS_VN_WRITE, VPTOPNC(vp));
2251 /*
2252 * make pages read-only before we write them if we want
2253 * write caching info
2254 */
2255 if (PUFFS_WCACHEINFO(pmp)) {
2256 struct uvm_object *uobj = &vp->v_uobj;
2257 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2258 struct vm_page *vmp;
2259 int i;
2260
2261 for (i = 0; i < npages; i++) {
2262 vmp= uvm_pageratop((vaddr_t)bp->b_data
2263 + (i << PAGE_SHIFT));
2264 DPRINTF(("puffs_strategy: write-protecting "
2265 "vp %p page %p, offset %" PRId64"\n",
2266 vp, vmp, vmp->offset));
2267 mutex_enter(&uobj->vmobjlock);
2268 vmp->flags |= PG_RDONLY;
2269 pmap_page_protect(vmp, VM_PROT_READ);
2270 mutex_exit(&uobj->vmobjlock);
2271 }
2272 }
2273
2274 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2275 if (dofaf) {
2276 puffs_msg_setfaf(park_rw);
2277 } else if (BIOASYNC(bp)) {
2278 puffs_msg_setcall(park_rw,
2279 puffs_parkdone_asyncbiowrite, bp);
2280 dobiodone = 0;
2281 }
2282
2283 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2284
2285 if (dobiodone == 0)
2286 goto out;
2287
2288 /*
2289 * XXXXXXXX: wrong, but kernel can't survive strategy
2290 * failure currently. Here, have one more X: X.
2291 */
2292 if (error != ENOMEM)
2293 error = 0;
2294
2295 error = checkerr(pmp, error, __func__);
2296 if (error)
2297 goto out;
2298
2299 if (rw_msg->pvnr_resid > tomove) {
2300 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2301 E2BIG, "resid grew", VPTOPNC(vp));
2302 ERROUT(EPROTO);
2303 }
2304
2305 /*
2306 * FAF moved everything. Frankly, we don't
2307 * really have a choice.
2308 */
2309 if (dofaf && error == 0)
2310 moved = tomove;
2311 else
2312 moved = tomove - rw_msg->pvnr_resid;
2313
2314 bp->b_resid = bp->b_bcount - moved;
2315 if (bp->b_resid != 0) {
2316 ERROUT(EIO);
2317 }
2318 }
2319
2320 out:
2321 if (park_rw)
2322 puffs_msgmem_release(park_rw);
2323
2324 if (error)
2325 bp->b_error = error;
2326
2327 if (error || dobiodone)
2328 biodone(bp);
2329
2330 return error;
2331 }
2332
2333 int
2334 puffs_vnop_mmap(void *v)
2335 {
2336 struct vop_mmap_args /* {
2337 const struct vnodeop_desc *a_desc;
2338 struct vnode *a_vp;
2339 vm_prot_t a_prot;
2340 kauth_cred_t a_cred;
2341 } */ *ap = v;
2342 PUFFS_MSG_VARS(vn, mmap);
2343 struct vnode *vp = ap->a_vp;
2344 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2345 int error;
2346
2347 if (!PUFFS_USE_PAGECACHE(pmp))
2348 return genfs_eopnotsupp(v);
2349
2350 if (EXISTSOP(pmp, MMAP)) {
2351 PUFFS_MSG_ALLOC(vn, mmap);
2352 mmap_msg->pvnr_prot = ap->a_prot;
2353 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2354 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2355 PUFFS_VN_MMAP, VPTOPNC(vp));
2356
2357 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2358 error = checkerr(pmp, error, __func__);
2359 PUFFS_MSG_RELEASE(mmap);
2360 } else {
2361 error = genfs_mmap(v);
2362 }
2363
2364 return error;
2365 }
2366
2367
2368 /*
2369 * The rest don't get a free trip to userspace and back, they
2370 * have to stay within the kernel.
2371 */
2372
2373 /*
2374 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2375 * well, maybe somehow, somewhere, some day ....
2376 */
2377 int
2378 puffs_vnop_bmap(void *v)
2379 {
2380 struct vop_bmap_args /* {
2381 const struct vnodeop_desc *a_desc;
2382 struct vnode *a_vp;
2383 daddr_t a_bn;
2384 struct vnode **a_vpp;
2385 daddr_t *a_bnp;
2386 int *a_runp;
2387 } */ *ap = v;
2388 struct puffs_mount *pmp;
2389
2390 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2391
2392 if (ap->a_vpp)
2393 *ap->a_vpp = ap->a_vp;
2394 if (ap->a_bnp)
2395 *ap->a_bnp = ap->a_bn;
2396 if (ap->a_runp)
2397 *ap->a_runp
2398 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2399
2400 return 0;
2401 }
2402
2403 /*
2404 * Handle getpages faults in puffs. We let genfs_getpages() do most
2405 * of the dirty work, but we come in this route to do accounting tasks.
2406 * If the user server has specified functions for cache notifications
2407 * about reads and/or writes, we record which type of operation we got,
2408 * for which page range, and proceed to issue a FAF notification to the
2409 * server about it.
2410 */
2411 int
2412 puffs_vnop_getpages(void *v)
2413 {
2414 struct vop_getpages_args /* {
2415 const struct vnodeop_desc *a_desc;
2416 struct vnode *a_vp;
2417 voff_t a_offset;
2418 struct vm_page **a_m;
2419 int *a_count;
2420 int a_centeridx;
2421 vm_prot_t a_access_type;
2422 int a_advice;
2423 int a_flags;
2424 } */ *ap = v;
2425 struct puffs_mount *pmp;
2426 struct puffs_node *pn;
2427 struct vnode *vp;
2428 struct vm_page **pgs;
2429 struct puffs_cacheinfo *pcinfo = NULL;
2430 struct puffs_cacherun *pcrun;
2431 void *parkmem = NULL;
2432 size_t runsizes;
2433 int i, npages, si, streakon;
2434 int error, locked, write;
2435
2436 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2437 npages = *ap->a_count;
2438 pgs = ap->a_m;
2439 vp = ap->a_vp;
2440 pn = vp->v_data;
2441 locked = (ap->a_flags & PGO_LOCKED) != 0;
2442 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
2443
2444 /* ccg xnaht - gets Wuninitialized wrong */
2445 pcrun = NULL;
2446 runsizes = 0;
2447
2448 /*
2449 * Check that we aren't trying to fault in pages which our file
2450 * server doesn't know about. This happens if we extend a file by
2451 * skipping some pages and later try to fault in pages which
2452 * are between pn_serversize and vp_size. This check optimizes
2453 * away the common case where a file is being extended.
2454 */
2455 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
2456 struct vattr va;
2457
2458 /* try again later when we can block */
2459 if (locked)
2460 ERROUT(EBUSY);
2461
2462 mutex_exit(&vp->v_interlock);
2463 vattr_null(&va);
2464 va.va_size = vp->v_size;
2465 error = dosetattr(vp, &va, FSCRED, 0);
2466 if (error)
2467 ERROUT(error);
2468 mutex_enter(&vp->v_interlock);
2469 }
2470
2471 if (write && PUFFS_WCACHEINFO(pmp)) {
2472 #ifdef notnowjohn
2473 /* allocate worst-case memory */
2474 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
2475 pcinfo = kmem_zalloc(sizeof(struct puffs_cacheinfo) + runsize,
2476 locked ? KM_NOSLEEP : KM_SLEEP);
2477
2478 /*
2479 * can't block if we're locked and can't mess up caching
2480 * information for fs server. so come back later, please
2481 */
2482 if (pcinfo == NULL)
2483 ERROUT(ENOMEM);
2484
2485 parkmem = puffs_park_alloc(locked == 0);
2486 if (parkmem == NULL)
2487 ERROUT(ENOMEM);
2488
2489 pcrun = pcinfo->pcache_runs;
2490 #else
2491 (void)parkmem;
2492 #endif
2493 }
2494
2495 error = genfs_getpages(v);
2496 if (error)
2497 goto out;
2498
2499 if (PUFFS_WCACHEINFO(pmp) == 0)
2500 goto out;
2501
2502 /*
2503 * Let's see whose fault it was and inform the user server of
2504 * possibly read/written pages. Map pages from read faults
2505 * strictly read-only, since otherwise we might miss info on
2506 * when the page is actually write-faulted to.
2507 */
2508 if (!locked)
2509 mutex_enter(&vp->v_uobj.vmobjlock);
2510 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
2511 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
2512 if (streakon && write) {
2513 streakon = 0;
2514 pcrun[si].pcache_runend
2515 = trunc_page(pgs[i]->offset) + PAGE_MASK;
2516 si++;
2517 }
2518 continue;
2519 }
2520 if (streakon == 0 && write) {
2521 streakon = 1;
2522 pcrun[si].pcache_runstart = pgs[i]->offset;
2523 }
2524
2525 if (!write)
2526 pgs[i]->flags |= PG_RDONLY;
2527 }
2528 /* was the last page part of our streak? */
2529 if (streakon) {
2530 pcrun[si].pcache_runend
2531 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
2532 si++;
2533 }
2534 if (!locked)
2535 mutex_exit(&vp->v_uobj.vmobjlock);
2536
2537 KASSERT(si <= (npages / 2) + 1);
2538
2539 #ifdef notnowjohn
2540 /* send results to userspace */
2541 if (write)
2542 puffs_cacheop(pmp, parkmem, pcinfo,
2543 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
2544 #endif
2545
2546 out:
2547 if (error) {
2548 if (pcinfo != NULL)
2549 kmem_free(pcinfo,
2550 sizeof(struct puffs_cacheinfo) + runsizes);
2551 #ifdef notnowjohn
2552 if (parkmem != NULL)
2553 puffs_park_release(parkmem, 1);
2554 #endif
2555 }
2556
2557 return error;
2558 }
2559
2560 int
2561 puffs_vnop_lock(void *v)
2562 {
2563 struct vop_lock_args /* {
2564 struct vnode *a_vp;
2565 int a_flags;
2566 } */ *ap = v;
2567 struct vnode *vp = ap->a_vp;
2568 struct mount *mp = vp->v_mount;
2569 int flags = ap->a_flags;
2570
2571 #if 0
2572 DPRINTF(("puffs_lock: lock %p, args 0x%x\n", vp, ap->a_flags));
2573 #endif
2574
2575 if (flags & LK_INTERLOCK) {
2576 mutex_exit(&vp->v_interlock);
2577 flags &= ~LK_INTERLOCK;
2578 }
2579
2580 /*
2581 * XXX: this avoids deadlocking when we're suspending.
2582 * e.g. some ops holding the vnode lock might be blocked for
2583 * the vfs transaction lock so we'd deadlock.
2584 *
2585 * Now once again this is skating on the thin ice of modern life,
2586 * since we are breaking the consistency guarantee provided
2587 * _to the user server_ by vnode locking. Hopefully this will
2588 * get fixed soon enough by getting rid of the dependency on
2589 * vnode locks alltogether.
2590 */
2591 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2592 return 0;
2593 }
2594
2595 return vlockmgr(&vp->v_lock, flags);
2596 }
2597
2598 int
2599 puffs_vnop_unlock(void *v)
2600 {
2601 struct vop_unlock_args /* {
2602 struct vnode *a_vp;
2603 int a_flags;
2604 } */ *ap = v;
2605 struct vnode *vp = ap->a_vp;
2606 struct mount *mp = vp->v_mount;
2607
2608 #if 0
2609 DPRINTF(("puffs_unlock: lock %p, args 0x%x\n", vp, ap->a_flags));
2610 #endif
2611
2612 /* XXX: see puffs_lock() */
2613 if (fstrans_is_owner(mp) && fstrans_getstate(mp) == FSTRANS_SUSPENDING){
2614 return 0;
2615 }
2616
2617 return vlockmgr(&vp->v_lock, ap->a_flags | LK_RELEASE);
2618 }
2619
2620 int
2621 puffs_vnop_islocked(void *v)
2622 {
2623 struct vop_islocked_args *ap = v;
2624 int rv;
2625
2626 rv = vlockstatus(&ap->a_vp->v_lock);
2627 return rv;
2628 }
2629
2630
2631 /*
2632 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
2633 * FAF update information for the puffs node first.
2634 */
2635 int
2636 puffs_vnop_spec_read(void *v)
2637 {
2638 struct vop_read_args /* {
2639 const struct vnodeop_desc *a_desc;
2640 struct vnode *a_vp;
2641 struct uio *a_uio;
2642 int a_ioflag;
2643 kauth_cred_t a_cred;
2644 } */ *ap = v;
2645
2646 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2647 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
2648 }
2649
2650 int
2651 puffs_vnop_spec_write(void *v)
2652 {
2653 struct vop_write_args /* {
2654 const struct vnodeop_desc *a_desc;
2655 struct vnode *a_vp;
2656 struct uio *a_uio;
2657 int a_ioflag;
2658 kauth_cred_t a_cred;
2659 } */ *ap = v;
2660
2661 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2662 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
2663 }
2664
2665 int
2666 puffs_vnop_fifo_read(void *v)
2667 {
2668 struct vop_read_args /* {
2669 const struct vnodeop_desc *a_desc;
2670 struct vnode *a_vp;
2671 struct uio *a_uio;
2672 int a_ioflag;
2673 kauth_cred_t a_cred;
2674 } */ *ap = v;
2675
2676 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
2677 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
2678 }
2679
2680 int
2681 puffs_vnop_fifo_write(void *v)
2682 {
2683 struct vop_write_args /* {
2684 const struct vnodeop_desc *a_desc;
2685 struct vnode *a_vp;
2686 struct uio *a_uio;
2687 int a_ioflag;
2688 kauth_cred_t a_cred;
2689 } */ *ap = v;
2690
2691 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
2692 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
2693 }
2694