puffs_vnops.c revision 1.209 1 /* $NetBSD: puffs_vnops.c,v 1.209 2017/04/11 14:24:59 riastradh Exp $ */
2
3 /*
4 * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
5 *
6 * Development of this software was supported by the
7 * Google Summer of Code program and the Ulla Tuominen Foundation.
8 * The Google SoC project was mentored by Bill Studenmund.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
20 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
25 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: puffs_vnops.c,v 1.209 2017/04/11 14:24:59 riastradh Exp $");
34
35 #include <sys/param.h>
36 #include <sys/buf.h>
37 #include <sys/lockf.h>
38 #include <sys/malloc.h>
39 #include <sys/mount.h>
40 #include <sys/namei.h>
41 #include <sys/vnode.h>
42 #include <sys/proc.h>
43 #include <sys/kernel.h> /* For hz, hardclock_ticks */
44
45 #include <uvm/uvm.h>
46
47 #include <fs/puffs/puffs_msgif.h>
48 #include <fs/puffs/puffs_sys.h>
49
50 #include <miscfs/fifofs/fifo.h>
51 #include <miscfs/genfs/genfs.h>
52 #include <miscfs/specfs/specdev.h>
53
54 int puffs_vnop_lookup(void *);
55 int puffs_vnop_create(void *);
56 int puffs_vnop_access(void *);
57 int puffs_vnop_mknod(void *);
58 int puffs_vnop_open(void *);
59 int puffs_vnop_close(void *);
60 int puffs_vnop_getattr(void *);
61 int puffs_vnop_setattr(void *);
62 int puffs_vnop_reclaim(void *);
63 int puffs_vnop_readdir(void *);
64 int puffs_vnop_poll(void *);
65 int puffs_vnop_fsync(void *);
66 int puffs_vnop_seek(void *);
67 int puffs_vnop_remove(void *);
68 int puffs_vnop_mkdir(void *);
69 int puffs_vnop_rmdir(void *);
70 int puffs_vnop_link(void *);
71 int puffs_vnop_readlink(void *);
72 int puffs_vnop_symlink(void *);
73 int puffs_vnop_rename(void *);
74 int puffs_vnop_read(void *);
75 int puffs_vnop_write(void *);
76 int puffs_vnop_fallocate(void *);
77 int puffs_vnop_fdiscard(void *);
78 int puffs_vnop_fcntl(void *);
79 int puffs_vnop_ioctl(void *);
80 int puffs_vnop_inactive(void *);
81 int puffs_vnop_print(void *);
82 int puffs_vnop_pathconf(void *);
83 int puffs_vnop_advlock(void *);
84 int puffs_vnop_strategy(void *);
85 int puffs_vnop_bmap(void *);
86 int puffs_vnop_mmap(void *);
87 int puffs_vnop_getpages(void *);
88 int puffs_vnop_abortop(void *);
89 int puffs_vnop_getextattr(void *);
90 int puffs_vnop_setextattr(void *);
91 int puffs_vnop_listextattr(void *);
92 int puffs_vnop_deleteextattr(void *);
93
94 int puffs_vnop_spec_read(void *);
95 int puffs_vnop_spec_write(void *);
96 int puffs_vnop_fifo_read(void *);
97 int puffs_vnop_fifo_write(void *);
98
99 int puffs_vnop_checkop(void *);
100
101 #define puffs_vnop_lock genfs_lock
102 #define puffs_vnop_unlock genfs_unlock
103 #define puffs_vnop_islocked genfs_islocked
104
105 int (**puffs_vnodeop_p)(void *);
106 const struct vnodeopv_entry_desc puffs_vnodeop_entries[] = {
107 { &vop_default_desc, vn_default_error },
108 { &vop_lookup_desc, puffs_vnop_lookup }, /* REAL lookup */
109 { &vop_create_desc, puffs_vnop_checkop }, /* create */
110 { &vop_mknod_desc, puffs_vnop_checkop }, /* mknod */
111 { &vop_open_desc, puffs_vnop_open }, /* REAL open */
112 { &vop_close_desc, puffs_vnop_checkop }, /* close */
113 { &vop_access_desc, puffs_vnop_access }, /* REAL access */
114 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
115 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
116 { &vop_read_desc, puffs_vnop_checkop }, /* read */
117 { &vop_write_desc, puffs_vnop_checkop }, /* write */
118 { &vop_fallocate_desc, puffs_vnop_fallocate }, /* fallocate */
119 { &vop_fdiscard_desc, puffs_vnop_fdiscard }, /* fdiscard */
120 { &vop_fsync_desc, puffs_vnop_fsync }, /* REAL fsync */
121 { &vop_seek_desc, puffs_vnop_checkop }, /* seek */
122 { &vop_remove_desc, puffs_vnop_checkop }, /* remove */
123 { &vop_link_desc, puffs_vnop_checkop }, /* link */
124 { &vop_rename_desc, puffs_vnop_checkop }, /* rename */
125 { &vop_mkdir_desc, puffs_vnop_checkop }, /* mkdir */
126 { &vop_rmdir_desc, puffs_vnop_checkop }, /* rmdir */
127 { &vop_symlink_desc, puffs_vnop_checkop }, /* symlink */
128 { &vop_readdir_desc, puffs_vnop_checkop }, /* readdir */
129 { &vop_readlink_desc, puffs_vnop_checkop }, /* readlink */
130 { &vop_getpages_desc, puffs_vnop_checkop }, /* getpages */
131 { &vop_putpages_desc, genfs_putpages }, /* REAL putpages */
132 { &vop_pathconf_desc, puffs_vnop_checkop }, /* pathconf */
133 { &vop_advlock_desc, puffs_vnop_advlock }, /* advlock */
134 { &vop_strategy_desc, puffs_vnop_strategy }, /* REAL strategy */
135 { &vop_revoke_desc, genfs_revoke }, /* REAL revoke */
136 { &vop_abortop_desc, puffs_vnop_abortop }, /* REAL abortop */
137 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
138 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
139 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
140 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
141 { &vop_bmap_desc, puffs_vnop_bmap }, /* REAL bmap */
142 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
143 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
144 { &vop_bwrite_desc, genfs_nullop }, /* REAL bwrite */
145 { &vop_mmap_desc, puffs_vnop_mmap }, /* REAL mmap */
146 { &vop_poll_desc, puffs_vnop_poll }, /* REAL poll */
147 { &vop_getextattr_desc, puffs_vnop_getextattr }, /* getextattr */
148 { &vop_setextattr_desc, puffs_vnop_setextattr }, /* setextattr */
149 { &vop_listextattr_desc, puffs_vnop_listextattr }, /* listextattr */
150 { &vop_deleteextattr_desc, puffs_vnop_deleteextattr },/* deleteextattr */
151 #if 0
152 { &vop_openextattr_desc, puffs_vnop_checkop }, /* openextattr */
153 { &vop_closeextattr_desc, puffs_vnop_checkop }, /* closeextattr */
154 #endif
155 { &vop_kqfilter_desc, genfs_eopnotsupp }, /* kqfilter XXX */
156 { NULL, NULL }
157 };
158 const struct vnodeopv_desc puffs_vnodeop_opv_desc =
159 { &puffs_vnodeop_p, puffs_vnodeop_entries };
160
161
162 int (**puffs_specop_p)(void *);
163 const struct vnodeopv_entry_desc puffs_specop_entries[] = {
164 { &vop_default_desc, vn_default_error },
165 { &vop_lookup_desc, spec_lookup }, /* lookup, ENOTDIR */
166 { &vop_create_desc, spec_create }, /* genfs_badop */
167 { &vop_mknod_desc, spec_mknod }, /* genfs_badop */
168 { &vop_open_desc, spec_open }, /* spec_open */
169 { &vop_close_desc, spec_close }, /* spec_close */
170 { &vop_access_desc, puffs_vnop_checkop }, /* access */
171 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
172 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
173 { &vop_read_desc, puffs_vnop_spec_read }, /* update, read */
174 { &vop_write_desc, puffs_vnop_spec_write }, /* update, write */
175 { &vop_fallocate_desc, spec_fallocate }, /* fallocate */
176 { &vop_fdiscard_desc, spec_fdiscard }, /* fdiscard */
177 { &vop_ioctl_desc, spec_ioctl }, /* spec_ioctl */
178 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
179 { &vop_poll_desc, spec_poll }, /* spec_poll */
180 { &vop_kqfilter_desc, spec_kqfilter }, /* spec_kqfilter */
181 { &vop_revoke_desc, spec_revoke }, /* genfs_revoke */
182 { &vop_mmap_desc, spec_mmap }, /* spec_mmap */
183 { &vop_fsync_desc, spec_fsync }, /* vflushbuf */
184 { &vop_seek_desc, spec_seek }, /* genfs_nullop */
185 { &vop_remove_desc, spec_remove }, /* genfs_badop */
186 { &vop_link_desc, spec_link }, /* genfs_badop */
187 { &vop_rename_desc, spec_rename }, /* genfs_badop */
188 { &vop_mkdir_desc, spec_mkdir }, /* genfs_badop */
189 { &vop_rmdir_desc, spec_rmdir }, /* genfs_badop */
190 { &vop_symlink_desc, spec_symlink }, /* genfs_badop */
191 { &vop_readdir_desc, spec_readdir }, /* genfs_badop */
192 { &vop_readlink_desc, spec_readlink }, /* genfs_badop */
193 { &vop_abortop_desc, spec_abortop }, /* genfs_badop */
194 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
195 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
196 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
197 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
198 { &vop_bmap_desc, spec_bmap }, /* dummy */
199 { &vop_strategy_desc, spec_strategy }, /* dev strategy */
200 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
201 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
202 { &vop_pathconf_desc, spec_pathconf }, /* pathconf */
203 { &vop_advlock_desc, spec_advlock }, /* lf_advlock */
204 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
205 { &vop_getpages_desc, spec_getpages }, /* genfs_getpages */
206 { &vop_putpages_desc, spec_putpages }, /* genfs_putpages */
207 { &vop_getextattr_desc, puffs_vnop_checkop }, /* getextattr */
208 { &vop_setextattr_desc, puffs_vnop_checkop }, /* setextattr */
209 { &vop_listextattr_desc, puffs_vnop_checkop }, /* listextattr */
210 { &vop_deleteextattr_desc, puffs_vnop_checkop },/* deleteextattr */
211 #if 0
212 { &vop_openextattr_desc, _openextattr }, /* openextattr */
213 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
214 #endif
215 { NULL, NULL }
216 };
217 const struct vnodeopv_desc puffs_specop_opv_desc =
218 { &puffs_specop_p, puffs_specop_entries };
219
220
221 int (**puffs_fifoop_p)(void *);
222 const struct vnodeopv_entry_desc puffs_fifoop_entries[] = {
223 { &vop_default_desc, vn_default_error },
224 { &vop_lookup_desc, vn_fifo_bypass }, /* lookup, ENOTDIR */
225 { &vop_create_desc, vn_fifo_bypass }, /* genfs_badop */
226 { &vop_mknod_desc, vn_fifo_bypass }, /* genfs_badop */
227 { &vop_open_desc, vn_fifo_bypass }, /* open */
228 { &vop_close_desc, vn_fifo_bypass }, /* close */
229 { &vop_access_desc, puffs_vnop_checkop }, /* access */
230 { &vop_getattr_desc, puffs_vnop_checkop }, /* getattr */
231 { &vop_setattr_desc, puffs_vnop_checkop }, /* setattr */
232 { &vop_read_desc, puffs_vnop_fifo_read }, /* read, update */
233 { &vop_write_desc, puffs_vnop_fifo_write }, /* write, update */
234 { &vop_fallocate_desc, vn_fifo_bypass }, /* fallocate */
235 { &vop_fdiscard_desc, vn_fifo_bypass }, /* fdiscard */
236 { &vop_ioctl_desc, vn_fifo_bypass }, /* ioctl */
237 { &vop_fcntl_desc, genfs_fcntl }, /* dummy */
238 { &vop_poll_desc, vn_fifo_bypass }, /* poll */
239 { &vop_kqfilter_desc, vn_fifo_bypass }, /* kqfilter */
240 { &vop_revoke_desc, vn_fifo_bypass }, /* genfs_revoke */
241 { &vop_mmap_desc, vn_fifo_bypass }, /* genfs_badop */
242 { &vop_fsync_desc, vn_fifo_bypass }, /* genfs_nullop*/
243 { &vop_seek_desc, vn_fifo_bypass }, /* genfs_badop */
244 { &vop_remove_desc, vn_fifo_bypass }, /* genfs_badop */
245 { &vop_link_desc, vn_fifo_bypass }, /* genfs_badop */
246 { &vop_rename_desc, vn_fifo_bypass }, /* genfs_badop */
247 { &vop_mkdir_desc, vn_fifo_bypass }, /* genfs_badop */
248 { &vop_rmdir_desc, vn_fifo_bypass }, /* genfs_badop */
249 { &vop_symlink_desc, vn_fifo_bypass }, /* genfs_badop */
250 { &vop_readdir_desc, vn_fifo_bypass }, /* genfs_badop */
251 { &vop_readlink_desc, vn_fifo_bypass }, /* genfs_badop */
252 { &vop_abortop_desc, vn_fifo_bypass }, /* genfs_badop */
253 { &vop_inactive_desc, puffs_vnop_inactive }, /* REAL inactive */
254 { &vop_reclaim_desc, puffs_vnop_reclaim }, /* REAL reclaim */
255 { &vop_lock_desc, puffs_vnop_lock }, /* REAL lock */
256 { &vop_unlock_desc, puffs_vnop_unlock }, /* REAL unlock */
257 { &vop_bmap_desc, vn_fifo_bypass }, /* dummy */
258 { &vop_strategy_desc, vn_fifo_bypass }, /* genfs_badop */
259 { &vop_print_desc, puffs_vnop_print }, /* REAL print */
260 { &vop_islocked_desc, puffs_vnop_islocked }, /* REAL islocked */
261 { &vop_pathconf_desc, vn_fifo_bypass }, /* pathconf */
262 { &vop_advlock_desc, vn_fifo_bypass }, /* genfs_einval */
263 { &vop_bwrite_desc, vn_bwrite }, /* bwrite */
264 { &vop_putpages_desc, vn_fifo_bypass }, /* genfs_null_putpages*/
265 #if 0
266 { &vop_openextattr_desc, _openextattr }, /* openextattr */
267 { &vop_closeextattr_desc, _closeextattr }, /* closeextattr */
268 #endif
269 { &vop_getextattr_desc, puffs_vnop_checkop }, /* getextattr */
270 { &vop_setextattr_desc, puffs_vnop_checkop }, /* setextattr */
271 { &vop_listextattr_desc, puffs_vnop_checkop }, /* listextattr */
272 { &vop_deleteextattr_desc, puffs_vnop_checkop }, /* deleteextattr */
273 { NULL, NULL }
274 };
275 const struct vnodeopv_desc puffs_fifoop_opv_desc =
276 { &puffs_fifoop_p, puffs_fifoop_entries };
277
278
279 /* "real" vnode operations */
280 int (**puffs_msgop_p)(void *);
281 const struct vnodeopv_entry_desc puffs_msgop_entries[] = {
282 { &vop_default_desc, vn_default_error },
283 { &vop_create_desc, puffs_vnop_create }, /* create */
284 { &vop_mknod_desc, puffs_vnop_mknod }, /* mknod */
285 { &vop_open_desc, puffs_vnop_open }, /* open */
286 { &vop_close_desc, puffs_vnop_close }, /* close */
287 { &vop_access_desc, puffs_vnop_access }, /* access */
288 { &vop_getattr_desc, puffs_vnop_getattr }, /* getattr */
289 { &vop_setattr_desc, puffs_vnop_setattr }, /* setattr */
290 { &vop_read_desc, puffs_vnop_read }, /* read */
291 { &vop_write_desc, puffs_vnop_write }, /* write */
292 { &vop_seek_desc, puffs_vnop_seek }, /* seek */
293 { &vop_remove_desc, puffs_vnop_remove }, /* remove */
294 { &vop_link_desc, puffs_vnop_link }, /* link */
295 { &vop_rename_desc, puffs_vnop_rename }, /* rename */
296 { &vop_mkdir_desc, puffs_vnop_mkdir }, /* mkdir */
297 { &vop_rmdir_desc, puffs_vnop_rmdir }, /* rmdir */
298 { &vop_symlink_desc, puffs_vnop_symlink }, /* symlink */
299 { &vop_readdir_desc, puffs_vnop_readdir }, /* readdir */
300 { &vop_readlink_desc, puffs_vnop_readlink }, /* readlink */
301 { &vop_print_desc, puffs_vnop_print }, /* print */
302 { &vop_islocked_desc, puffs_vnop_islocked }, /* islocked */
303 { &vop_pathconf_desc, puffs_vnop_pathconf }, /* pathconf */
304 { &vop_getpages_desc, puffs_vnop_getpages }, /* getpages */
305 { NULL, NULL }
306 };
307 const struct vnodeopv_desc puffs_msgop_opv_desc =
308 { &puffs_msgop_p, puffs_msgop_entries };
309
310 /*
311 * for dosetattr / update_va
312 */
313 #define SETATTR_CHSIZE 0x01
314 #define SETATTR_ASYNC 0x02
315
316 #define ERROUT(err) \
317 do { \
318 error = err; \
319 goto out; \
320 } while (/*CONSTCOND*/0)
321
322 /*
323 * This is a generic vnode operation handler. It checks if the necessary
324 * operations for the called vnode operation are implemented by userspace
325 * and either returns a dummy return value or proceeds to call the real
326 * vnode operation from puffs_msgop_v.
327 *
328 * XXX: this should described elsewhere and autogenerated, the complexity
329 * of the vnode operations vectors and their interrelationships is also
330 * getting a bit out of hand. Another problem is that we need this same
331 * information in the fs server code, so keeping the two in sync manually
332 * is not a viable (long term) plan.
333 */
334
335 /* not supported, handle locking protocol */
336 #define CHECKOP_NOTSUPP(op) \
337 case VOP_##op##_DESCOFFSET: \
338 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
339 return genfs_eopnotsupp(v); \
340 break
341
342 /* always succeed, no locking */
343 #define CHECKOP_SUCCESS(op) \
344 case VOP_##op##_DESCOFFSET: \
345 if (pmp->pmp_vnopmask[PUFFS_VN_##op] == 0) \
346 return 0; \
347 break
348
349 int
350 puffs_vnop_checkop(void *v)
351 {
352 struct vop_generic_args /* {
353 struct vnodeop_desc *a_desc;
354 spooky mystery contents;
355 } */ *ap = v;
356 struct vnodeop_desc *desc = ap->a_desc;
357 struct puffs_mount *pmp;
358 struct vnode *vp;
359 int offset, rv;
360
361 offset = ap->a_desc->vdesc_vp_offsets[0];
362 #ifdef DIAGNOSTIC
363 if (offset == VDESC_NO_OFFSET)
364 panic("puffs_checkop: no vnode, why did you call me?");
365 #endif
366 vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
367 pmp = MPTOPUFFSMP(vp->v_mount);
368
369 DPRINTF_VERBOSE(("checkop call %s (%d), vp %p\n",
370 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp));
371
372 if (!ALLOPS(pmp)) {
373 switch (desc->vdesc_offset) {
374 CHECKOP_NOTSUPP(CREATE);
375 CHECKOP_NOTSUPP(MKNOD);
376 CHECKOP_NOTSUPP(GETATTR);
377 CHECKOP_NOTSUPP(SETATTR);
378 CHECKOP_NOTSUPP(READ);
379 CHECKOP_NOTSUPP(WRITE);
380 CHECKOP_NOTSUPP(FCNTL);
381 CHECKOP_NOTSUPP(IOCTL);
382 CHECKOP_NOTSUPP(REMOVE);
383 CHECKOP_NOTSUPP(LINK);
384 CHECKOP_NOTSUPP(RENAME);
385 CHECKOP_NOTSUPP(MKDIR);
386 CHECKOP_NOTSUPP(RMDIR);
387 CHECKOP_NOTSUPP(SYMLINK);
388 CHECKOP_NOTSUPP(READDIR);
389 CHECKOP_NOTSUPP(READLINK);
390 CHECKOP_NOTSUPP(PRINT);
391 CHECKOP_NOTSUPP(PATHCONF);
392 CHECKOP_NOTSUPP(GETEXTATTR);
393 CHECKOP_NOTSUPP(SETEXTATTR);
394 CHECKOP_NOTSUPP(LISTEXTATTR);
395 CHECKOP_NOTSUPP(DELETEEXTATTR);
396
397 CHECKOP_SUCCESS(ACCESS);
398 CHECKOP_SUCCESS(CLOSE);
399 CHECKOP_SUCCESS(SEEK);
400
401 case VOP_GETPAGES_DESCOFFSET:
402 if (!EXISTSOP(pmp, READ))
403 return genfs_eopnotsupp(v);
404 break;
405
406 default:
407 panic("puffs_checkop: unhandled vnop %d",
408 desc->vdesc_offset);
409 }
410 }
411
412 rv = VOCALL(puffs_msgop_p, ap->a_desc->vdesc_offset, v);
413
414 DPRINTF_VERBOSE(("checkop return %s (%d), vp %p: %d\n",
415 ap->a_desc->vdesc_name, ap->a_desc->vdesc_offset, vp, rv));
416
417 return rv;
418 }
419
420 static int callremove(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
421 struct componentname *);
422 static int callrmdir(struct puffs_mount *, puffs_cookie_t, puffs_cookie_t,
423 struct componentname *);
424 static void callinactive(struct puffs_mount *, puffs_cookie_t, int);
425 static void callreclaim(struct puffs_mount *, puffs_cookie_t, int);
426 static int flushvncache(struct vnode *, off_t, off_t, bool);
427 static void update_va(struct vnode *, struct vattr *, struct vattr *,
428 struct timespec *, struct timespec *, int);
429 static void update_parent(struct vnode *, struct vnode *);
430
431
432 #define PUFFS_ABORT_LOOKUP 1
433 #define PUFFS_ABORT_CREATE 2
434 #define PUFFS_ABORT_MKNOD 3
435 #define PUFFS_ABORT_MKDIR 4
436 #define PUFFS_ABORT_SYMLINK 5
437
438 /*
439 * Press the pani^Wabort button! Kernel resource allocation failed.
440 */
441 static void
442 puffs_abortbutton(struct puffs_mount *pmp, int what,
443 puffs_cookie_t dck, puffs_cookie_t ck, struct componentname *cnp)
444 {
445
446 switch (what) {
447 case PUFFS_ABORT_CREATE:
448 case PUFFS_ABORT_MKNOD:
449 case PUFFS_ABORT_SYMLINK:
450 callremove(pmp, dck, ck, cnp);
451 break;
452 case PUFFS_ABORT_MKDIR:
453 callrmdir(pmp, dck, ck, cnp);
454 break;
455 }
456
457 callinactive(pmp, ck, 0);
458 callreclaim(pmp, ck, 1);
459 }
460
461 /*
462 * Begin vnode operations.
463 *
464 * A word from the keymaster about locks: generally we don't want
465 * to use the vnode locks at all: it creates an ugly dependency between
466 * the userlandia file server and the kernel. But we'll play along with
467 * the kernel vnode locks for now. However, even currently we attempt
468 * to release locks as early as possible. This is possible for some
469 * operations which a) don't need a locked vnode after the userspace op
470 * and b) return with the vnode unlocked. Theoretically we could
471 * unlock-do op-lock for others and order the graph in userspace, but I
472 * don't want to think of the consequences for the time being.
473 */
474
475 #define TTL_TO_TIMEOUT(ts) \
476 (hardclock_ticks + (ts->tv_sec * hz) + (ts->tv_nsec * hz / 1000000000))
477 #define TTL_VALID(ts) \
478 ((ts != NULL) && !((ts->tv_sec == 0) && (ts->tv_nsec == 0)))
479 #define TIMED_OUT(expire) \
480 ((int)((unsigned int)hardclock_ticks - (unsigned int)expire) > 0)
481 int
482 puffs_vnop_lookup(void *v)
483 {
484 struct vop_lookup_v2_args /* {
485 const struct vnodeop_desc *a_desc;
486 struct vnode *a_dvp;
487 struct vnode **a_vpp;
488 struct componentname *a_cnp;
489 } */ *ap = v;
490 PUFFS_MSG_VARS(vn, lookup);
491 struct puffs_mount *pmp;
492 struct componentname *cnp;
493 struct vnode *vp, *dvp, *cvp;
494 struct puffs_node *dpn, *cpn;
495 int isdot;
496 int error;
497
498 pmp = MPTOPUFFSMP(ap->a_dvp->v_mount);
499 cnp = ap->a_cnp;
500 dvp = ap->a_dvp;
501 cvp = NULL;
502 cpn = NULL;
503 *ap->a_vpp = NULL;
504
505 /* r/o fs? we check create later to handle EEXIST */
506 if ((cnp->cn_flags & ISLASTCN)
507 && (dvp->v_mount->mnt_flag & MNT_RDONLY)
508 && (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
509 return EROFS;
510
511 isdot = cnp->cn_namelen == 1 && *cnp->cn_nameptr == '.';
512
513 DPRINTF(("puffs_lookup: \"%s\", parent vnode %p, op: %x\n",
514 cnp->cn_nameptr, dvp, cnp->cn_nameiop));
515
516 /*
517 * If dotdot cache is enabled, add reference to .. and return.
518 */
519 if (PUFFS_USE_DOTDOTCACHE(pmp) && (cnp->cn_flags & ISDOTDOT)) {
520 vp = VPTOPP(ap->a_dvp)->pn_parent;
521 vref(vp);
522
523 *ap->a_vpp = vp;
524 return 0;
525 }
526
527 /*
528 * Check if someone fed it into the cache
529 */
530 if (!isdot && PUFFS_USE_NAMECACHE(pmp)) {
531 int found, iswhiteout;
532
533 found = cache_lookup(dvp, cnp->cn_nameptr, cnp->cn_namelen,
534 cnp->cn_nameiop, cnp->cn_flags,
535 &iswhiteout, ap->a_vpp);
536 if (iswhiteout) {
537 cnp->cn_flags |= ISWHITEOUT;
538 }
539
540 if (found && *ap->a_vpp != NULLVP && PUFFS_USE_FS_TTL(pmp)) {
541 cvp = *ap->a_vpp;
542 cpn = VPTOPP(cvp);
543
544 if (TIMED_OUT(cpn->pn_cn_timeout)) {
545 cache_purge(cvp);
546 /*
547 * cached vnode (cvp) is still referenced
548 * so that we can reuse it upon a new
549 * successful lookup.
550 */
551 *ap->a_vpp = NULL;
552 found = 0;
553 }
554 }
555
556 /*
557 * Do not use negative caching, since the filesystem
558 * provides no TTL for it.
559 */
560 if (found && *ap->a_vpp == NULLVP && PUFFS_USE_FS_TTL(pmp))
561 found = 0;
562
563 if (found) {
564 return *ap->a_vpp == NULLVP ? ENOENT : 0;
565 }
566
567 /*
568 * This is what would have been left in ERROR before
569 * the rearrangement of cache_lookup(). What with all
570 * the macros, I am not sure if this is a dead value
571 * below or not.
572 */
573 error = -1;
574 }
575
576 if (isdot) {
577 /* deal with rename lookup semantics */
578 if (cnp->cn_nameiop == RENAME && (cnp->cn_flags & ISLASTCN))
579 return EISDIR;
580
581 vp = ap->a_dvp;
582 vref(vp);
583 *ap->a_vpp = vp;
584 return 0;
585 }
586
587 if (cvp != NULL) {
588 if (vn_lock(cvp, LK_EXCLUSIVE) != 0) {
589 vrele(cvp);
590 cvp = NULL;
591 } else
592 mutex_enter(&cpn->pn_sizemtx);
593 }
594
595 PUFFS_MSG_ALLOC(vn, lookup);
596 puffs_makecn(&lookup_msg->pvnr_cn, &lookup_msg->pvnr_cn_cred,
597 cnp, PUFFS_USE_FULLPNBUF(pmp));
598
599 if (cnp->cn_flags & ISDOTDOT)
600 VOP_UNLOCK(dvp);
601
602 puffs_msg_setinfo(park_lookup, PUFFSOP_VN,
603 PUFFS_VN_LOOKUP, VPTOPNC(dvp));
604 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_lookup, dvp->v_data, NULL, error);
605 DPRINTF(("puffs_lookup: return of the userspace, part %d\n", error));
606
607 /*
608 * In case of error, there is no new vnode to play with, so be
609 * happy with the NULL value given to vpp in the beginning.
610 * Also, check if this really was an error or the target was not
611 * present. Either treat it as a non-error for CREATE/RENAME or
612 * enter the component into the negative name cache (if desired).
613 */
614 if (error) {
615 error = checkerr(pmp, error, __func__);
616 if (error == ENOENT) {
617 /* don't allow to create files on r/o fs */
618 if ((dvp->v_mount->mnt_flag & MNT_RDONLY)
619 && cnp->cn_nameiop == CREATE) {
620 error = EROFS;
621
622 /* adjust values if we are creating */
623 } else if ((cnp->cn_flags & ISLASTCN)
624 && (cnp->cn_nameiop == CREATE
625 || cnp->cn_nameiop == RENAME)) {
626 error = EJUSTRETURN;
627
628 /* save negative cache entry */
629 } else {
630 if (PUFFS_USE_NAMECACHE(pmp) &&
631 !PUFFS_USE_FS_TTL(pmp))
632 cache_enter(dvp, NULL, cnp->cn_nameptr,
633 cnp->cn_namelen, cnp->cn_flags);
634 }
635 }
636 goto out;
637 }
638
639 /*
640 * Check that we don't get our parent node back, that would cause
641 * a pretty obvious deadlock.
642 */
643 dpn = dvp->v_data;
644 if (lookup_msg->pvnr_newnode == dpn->pn_cookie) {
645 puffs_senderr(pmp, PUFFS_ERR_LOOKUP, EINVAL,
646 "lookup produced parent cookie", lookup_msg->pvnr_newnode);
647 error = EPROTO;
648 goto out;
649 }
650
651 /*
652 * Check if we looked up the cached vnode
653 */
654 vp = NULL;
655 if (cvp && (VPTOPP(cvp)->pn_cookie == lookup_msg->pvnr_newnode)) {
656 int grace;
657
658 /*
659 * Bump grace time of this node so that it does not get
660 * reclaimed too fast. We try to increase a bit more the
661 * lifetime of busiest * nodes - with some limits.
662 */
663 grace = 10 * puffs_sopreq_expire_timeout;
664 cpn->pn_cn_grace = hardclock_ticks + grace;
665 vp = cvp;
666 }
667
668 /*
669 * No cached vnode available, or the cached vnode does not
670 * match the userland cookie anymore: is the node known?
671 */
672 if (vp == NULL) {
673 error = puffs_getvnode(dvp->v_mount,
674 lookup_msg->pvnr_newnode, lookup_msg->pvnr_vtype,
675 lookup_msg->pvnr_size, lookup_msg->pvnr_rdev, &vp);
676 if (error) {
677 puffs_abortbutton(pmp, PUFFS_ABORT_LOOKUP,
678 VPTOPNC(dvp), lookup_msg->pvnr_newnode,
679 ap->a_cnp);
680 goto out;
681 }
682
683 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
684 }
685
686 /*
687 * Update cache and TTL
688 */
689 if (PUFFS_USE_FS_TTL(pmp)) {
690 struct timespec *va_ttl = &lookup_msg->pvnr_va_ttl;
691 struct timespec *cn_ttl = &lookup_msg->pvnr_cn_ttl;
692 update_va(vp, NULL, &lookup_msg->pvnr_va,
693 va_ttl, cn_ttl, SETATTR_CHSIZE);
694 }
695
696 KASSERT(lookup_msg->pvnr_newnode == VPTOPP(vp)->pn_cookie);
697 *ap->a_vpp = vp;
698
699 if (PUFFS_USE_NAMECACHE(pmp))
700 cache_enter(dvp, vp, cnp->cn_nameptr, cnp->cn_namelen,
701 cnp->cn_flags);
702
703 /* XXX */
704 if ((lookup_msg->pvnr_cn.pkcn_flags & REQUIREDIR) == 0)
705 cnp->cn_flags &= ~REQUIREDIR;
706 if (lookup_msg->pvnr_cn.pkcn_consume)
707 cnp->cn_consume = MIN(lookup_msg->pvnr_cn.pkcn_consume,
708 strlen(cnp->cn_nameptr) - cnp->cn_namelen);
709
710 VPTOPP(vp)->pn_nlookup++;
711
712 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
713 (VPTOPP(vp)->pn_parent != dvp))
714 update_parent(vp, dvp);
715
716 out:
717 if (cvp != NULL) {
718 mutex_exit(&cpn->pn_sizemtx);
719
720 if (error || (cvp != vp))
721 vput(cvp);
722 }
723 if (error == 0)
724 VOP_UNLOCK(*ap->a_vpp);
725
726 if (cnp->cn_flags & ISDOTDOT)
727 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
728
729 DPRINTF(("puffs_lookup: returning %d %p\n", error, *ap->a_vpp));
730 PUFFS_MSG_RELEASE(lookup);
731 return error;
732 }
733
734 #define REFPN_AND_UNLOCKVP(a, b) \
735 do { \
736 mutex_enter(&b->pn_mtx); \
737 puffs_referencenode(b); \
738 mutex_exit(&b->pn_mtx); \
739 VOP_UNLOCK(a); \
740 } while (/*CONSTCOND*/0)
741
742 #define REFPN(b) \
743 do { \
744 mutex_enter(&b->pn_mtx); \
745 puffs_referencenode(b); \
746 mutex_exit(&b->pn_mtx); \
747 } while (/*CONSTCOND*/0)
748
749 #define RELEPN_AND_VP(a, b) \
750 do { \
751 puffs_releasenode(b); \
752 vrele(a); \
753 } while (/*CONSTCOND*/0)
754
755 int
756 puffs_vnop_create(void *v)
757 {
758 struct vop_create_v3_args /* {
759 const struct vnodeop_desc *a_desc;
760 struct vnode *a_dvp;
761 struct vnode **a_vpp;
762 struct componentname *a_cnp;
763 struct vattr *a_vap;
764 } */ *ap = v;
765 PUFFS_MSG_VARS(vn, create);
766 struct vnode *dvp = ap->a_dvp;
767 struct puffs_node *dpn = VPTOPP(dvp);
768 struct componentname *cnp = ap->a_cnp;
769 struct mount *mp = dvp->v_mount;
770 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
771 int error;
772
773 DPRINTF(("puffs_create: dvp %p, cnp: %s\n",
774 dvp, ap->a_cnp->cn_nameptr));
775
776 PUFFS_MSG_ALLOC(vn, create);
777 puffs_makecn(&create_msg->pvnr_cn, &create_msg->pvnr_cn_cred,
778 cnp, PUFFS_USE_FULLPNBUF(pmp));
779 create_msg->pvnr_va = *ap->a_vap;
780 puffs_msg_setinfo(park_create, PUFFSOP_VN,
781 PUFFS_VN_CREATE, VPTOPNC(dvp));
782 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_create, dvp->v_data, NULL, error);
783
784 error = checkerr(pmp, error, __func__);
785 if (error)
786 goto out;
787
788 error = puffs_newnode(mp, dvp, ap->a_vpp,
789 create_msg->pvnr_newnode, cnp, ap->a_vap->va_type, 0);
790 if (error) {
791 puffs_abortbutton(pmp, PUFFS_ABORT_CREATE, dpn->pn_cookie,
792 create_msg->pvnr_newnode, cnp);
793 goto out;
794 }
795
796 if (PUFFS_USE_FS_TTL(pmp)) {
797 struct timespec *va_ttl = &create_msg->pvnr_va_ttl;
798 struct timespec *cn_ttl = &create_msg->pvnr_cn_ttl;
799 struct vattr *rvap = &create_msg->pvnr_va;
800
801 update_va(*ap->a_vpp, NULL, rvap,
802 va_ttl, cn_ttl, SETATTR_CHSIZE);
803 }
804
805 VPTOPP(*ap->a_vpp)->pn_nlookup++;
806
807 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
808 (VPTOPP(*ap->a_vpp)->pn_parent != dvp))
809 update_parent(*ap->a_vpp, dvp);
810
811 out:
812 DPRINTF(("puffs_create: return %d\n", error));
813 PUFFS_MSG_RELEASE(create);
814 return error;
815 }
816
817 int
818 puffs_vnop_mknod(void *v)
819 {
820 struct vop_mknod_v3_args /* {
821 const struct vnodeop_desc *a_desc;
822 struct vnode *a_dvp;
823 struct vnode **a_vpp;
824 struct componentname *a_cnp;
825 struct vattr *a_vap;
826 } */ *ap = v;
827 PUFFS_MSG_VARS(vn, mknod);
828 struct vnode *dvp = ap->a_dvp;
829 struct puffs_node *dpn = VPTOPP(dvp);
830 struct componentname *cnp = ap->a_cnp;
831 struct mount *mp = dvp->v_mount;
832 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
833 int error;
834
835 PUFFS_MSG_ALLOC(vn, mknod);
836 puffs_makecn(&mknod_msg->pvnr_cn, &mknod_msg->pvnr_cn_cred,
837 cnp, PUFFS_USE_FULLPNBUF(pmp));
838 mknod_msg->pvnr_va = *ap->a_vap;
839 puffs_msg_setinfo(park_mknod, PUFFSOP_VN,
840 PUFFS_VN_MKNOD, VPTOPNC(dvp));
841
842 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mknod, dvp->v_data, NULL, error);
843
844 error = checkerr(pmp, error, __func__);
845 if (error)
846 goto out;
847
848 error = puffs_newnode(mp, dvp, ap->a_vpp,
849 mknod_msg->pvnr_newnode, cnp, ap->a_vap->va_type,
850 ap->a_vap->va_rdev);
851 if (error) {
852 puffs_abortbutton(pmp, PUFFS_ABORT_MKNOD, dpn->pn_cookie,
853 mknod_msg->pvnr_newnode, cnp);
854 goto out;
855 }
856
857 if (PUFFS_USE_FS_TTL(pmp)) {
858 struct timespec *va_ttl = &mknod_msg->pvnr_va_ttl;
859 struct timespec *cn_ttl = &mknod_msg->pvnr_cn_ttl;
860 struct vattr *rvap = &mknod_msg->pvnr_va;
861
862 update_va(*ap->a_vpp, NULL, rvap,
863 va_ttl, cn_ttl, SETATTR_CHSIZE);
864 }
865
866 VPTOPP(*ap->a_vpp)->pn_nlookup++;
867
868 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
869 (VPTOPP(*ap->a_vpp)->pn_parent != dvp))
870 update_parent(*ap->a_vpp, dvp);
871
872 out:
873 PUFFS_MSG_RELEASE(mknod);
874 return error;
875 }
876
877 int
878 puffs_vnop_open(void *v)
879 {
880 struct vop_open_args /* {
881 const struct vnodeop_desc *a_desc;
882 struct vnode *a_vp;
883 int a_mode;
884 kauth_cred_t a_cred;
885 } */ *ap = v;
886 PUFFS_MSG_VARS(vn, open);
887 struct vnode *vp = ap->a_vp;
888 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
889 struct puffs_node *pn = VPTOPP(vp);
890 int mode = ap->a_mode;
891 int error;
892
893 DPRINTF(("puffs_open: vp %p, mode 0x%x\n", vp, mode));
894
895 if (vp->v_type == VREG && mode & FWRITE && !EXISTSOP(pmp, WRITE))
896 ERROUT(EROFS);
897
898 if (!EXISTSOP(pmp, OPEN))
899 ERROUT(0);
900
901 PUFFS_MSG_ALLOC(vn, open);
902 open_msg->pvnr_mode = mode;
903 puffs_credcvt(&open_msg->pvnr_cred, ap->a_cred);
904 puffs_msg_setinfo(park_open, PUFFSOP_VN,
905 PUFFS_VN_OPEN, VPTOPNC(vp));
906
907 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_open, vp->v_data, NULL, error);
908 error = checkerr(pmp, error, __func__);
909
910 if (open_msg->pvnr_oflags & PUFFS_OPEN_IO_DIRECT) {
911 /*
912 * Flush cache:
913 * - we do not want to discard cached write by direct write
914 * - read cache is now useless and should be freed
915 */
916 flushvncache(vp, 0, 0, true);
917 if (mode & FREAD)
918 pn->pn_stat |= PNODE_RDIRECT;
919 if (mode & FWRITE)
920 pn->pn_stat |= PNODE_WDIRECT;
921 }
922 out:
923 DPRINTF(("puffs_open: returning %d\n", error));
924 PUFFS_MSG_RELEASE(open);
925 return error;
926 }
927
928 int
929 puffs_vnop_close(void *v)
930 {
931 struct vop_close_args /* {
932 const struct vnodeop_desc *a_desc;
933 struct vnode *a_vp;
934 int a_fflag;
935 kauth_cred_t a_cred;
936 } */ *ap = v;
937 PUFFS_MSG_VARS(vn, close);
938 struct vnode *vp = ap->a_vp;
939 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
940
941 PUFFS_MSG_ALLOC(vn, close);
942 puffs_msg_setfaf(park_close);
943 close_msg->pvnr_fflag = ap->a_fflag;
944 puffs_credcvt(&close_msg->pvnr_cred, ap->a_cred);
945 puffs_msg_setinfo(park_close, PUFFSOP_VN,
946 PUFFS_VN_CLOSE, VPTOPNC(vp));
947
948 puffs_msg_enqueue(pmp, park_close);
949 PUFFS_MSG_RELEASE(close);
950 return 0;
951 }
952
953 int
954 puffs_vnop_access(void *v)
955 {
956 struct vop_access_args /* {
957 const struct vnodeop_desc *a_desc;
958 struct vnode *a_vp;
959 int a_mode;
960 kauth_cred_t a_cred;
961 } */ *ap = v;
962 PUFFS_MSG_VARS(vn, access);
963 struct vnode *vp = ap->a_vp;
964 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
965 int mode = ap->a_mode;
966 int error;
967
968 if (mode & VWRITE) {
969 switch (vp->v_type) {
970 case VDIR:
971 case VLNK:
972 case VREG:
973 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
974 || !EXISTSOP(pmp, WRITE))
975 return EROFS;
976 break;
977 default:
978 break;
979 }
980 }
981
982 if (!EXISTSOP(pmp, ACCESS))
983 return 0;
984
985 PUFFS_MSG_ALLOC(vn, access);
986 access_msg->pvnr_mode = ap->a_mode;
987 puffs_credcvt(&access_msg->pvnr_cred, ap->a_cred);
988 puffs_msg_setinfo(park_access, PUFFSOP_VN,
989 PUFFS_VN_ACCESS, VPTOPNC(vp));
990
991 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_access, vp->v_data, NULL, error);
992 error = checkerr(pmp, error, __func__);
993 PUFFS_MSG_RELEASE(access);
994
995 return error;
996 }
997
998 static void
999 update_va(struct vnode *vp, struct vattr *vap, struct vattr *rvap,
1000 struct timespec *va_ttl, struct timespec *cn_ttl, int flags)
1001 {
1002 struct puffs_node *pn = VPTOPP(vp);
1003 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1004 int use_metacache;
1005
1006 if (TTL_VALID(cn_ttl)) {
1007 pn->pn_cn_timeout = TTL_TO_TIMEOUT(cn_ttl);
1008 pn->pn_cn_grace = MAX(pn->pn_cn_timeout, pn->pn_cn_grace);
1009 }
1010
1011 /*
1012 * Don't listen to the file server regarding special device
1013 * size info, the file server doesn't know anything about them.
1014 */
1015 if (vp->v_type == VBLK || vp->v_type == VCHR)
1016 rvap->va_size = vp->v_size;
1017
1018 /* Ditto for blocksize (ufs comment: this doesn't belong here) */
1019 if (vp->v_type == VBLK)
1020 rvap->va_blocksize = BLKDEV_IOSIZE;
1021 else if (vp->v_type == VCHR)
1022 rvap->va_blocksize = MAXBSIZE;
1023
1024 if (vap != NULL) {
1025 (void) memcpy(vap, rvap, sizeof(struct vattr));
1026 vap->va_fsid = vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
1027
1028 if (PUFFS_USE_METAFLUSH(pmp)) {
1029 if (pn->pn_stat & PNODE_METACACHE_ATIME)
1030 vap->va_atime = pn->pn_mc_atime;
1031 if (pn->pn_stat & PNODE_METACACHE_CTIME)
1032 vap->va_ctime = pn->pn_mc_ctime;
1033 if (pn->pn_stat & PNODE_METACACHE_MTIME)
1034 vap->va_mtime = pn->pn_mc_mtime;
1035 if (pn->pn_stat & PNODE_METACACHE_SIZE)
1036 vap->va_size = pn->pn_mc_size;
1037 }
1038 }
1039
1040 use_metacache = PUFFS_USE_METAFLUSH(pmp) &&
1041 (pn->pn_stat & PNODE_METACACHE_SIZE);
1042 if (!use_metacache && (flags & SETATTR_CHSIZE)) {
1043 if (rvap->va_size != VNOVAL
1044 && vp->v_type != VBLK && vp->v_type != VCHR) {
1045 uvm_vnp_setsize(vp, rvap->va_size);
1046 pn->pn_serversize = rvap->va_size;
1047 }
1048 }
1049
1050 if ((va_ttl != NULL) && TTL_VALID(va_ttl)) {
1051 if (pn->pn_va_cache == NULL)
1052 pn->pn_va_cache = pool_get(&puffs_vapool, PR_WAITOK);
1053
1054 (void)memcpy(pn->pn_va_cache, rvap, sizeof(*rvap));
1055
1056 pn->pn_va_timeout = TTL_TO_TIMEOUT(va_ttl);
1057 }
1058 }
1059
1060 static void
1061 update_parent(struct vnode *vp, struct vnode *dvp)
1062 {
1063 struct puffs_node *pn = VPTOPP(vp);
1064
1065 if (pn->pn_parent != NULL) {
1066 KASSERT(pn->pn_parent != dvp);
1067 vrele(pn->pn_parent);
1068 }
1069
1070 vref(dvp);
1071 pn->pn_parent = dvp;
1072 }
1073
1074 int
1075 puffs_vnop_getattr(void *v)
1076 {
1077 struct vop_getattr_args /* {
1078 const struct vnodeop_desc *a_desc;
1079 struct vnode *a_vp;
1080 struct vattr *a_vap;
1081 kauth_cred_t a_cred;
1082 } */ *ap = v;
1083 PUFFS_MSG_VARS(vn, getattr);
1084 struct vnode *vp = ap->a_vp;
1085 struct mount *mp = vp->v_mount;
1086 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1087 struct vattr *vap, *rvap;
1088 struct puffs_node *pn = VPTOPP(vp);
1089 struct timespec *va_ttl = NULL;
1090 int error = 0;
1091
1092 /*
1093 * A lock is required so that we do not race with
1094 * setattr, write and fsync when changing vp->v_size.
1095 * This is critical, since setting a stall smaler value
1096 * triggers a file truncate in uvm_vnp_setsize(), which
1097 * most of the time means data corruption (a chunk of
1098 * data is replaced by zeroes). This can be removed if
1099 * we decide one day that VOP_GETATTR must operate on
1100 * a locked vnode.
1101 *
1102 * XXX Should be useless now that VOP_GETATTR has been
1103 * fixed to always require a shared lock at least.
1104 */
1105 mutex_enter(&pn->pn_sizemtx);
1106
1107 REFPN(pn);
1108 vap = ap->a_vap;
1109
1110 if (PUFFS_USE_FS_TTL(pmp)) {
1111 if (!TIMED_OUT(pn->pn_va_timeout)) {
1112 update_va(vp, vap, pn->pn_va_cache,
1113 NULL, NULL, SETATTR_CHSIZE);
1114 goto out2;
1115 }
1116 }
1117
1118 PUFFS_MSG_ALLOC(vn, getattr);
1119 vattr_null(&getattr_msg->pvnr_va);
1120 puffs_credcvt(&getattr_msg->pvnr_cred, ap->a_cred);
1121 puffs_msg_setinfo(park_getattr, PUFFSOP_VN,
1122 PUFFS_VN_GETATTR, VPTOPNC(vp));
1123
1124 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getattr, vp->v_data, NULL, error);
1125 error = checkerr(pmp, error, __func__);
1126 if (error)
1127 goto out;
1128
1129 rvap = &getattr_msg->pvnr_va;
1130
1131 if (PUFFS_USE_FS_TTL(pmp))
1132 va_ttl = &getattr_msg->pvnr_va_ttl;
1133
1134 update_va(vp, vap, rvap, va_ttl, NULL, SETATTR_CHSIZE);
1135
1136 out:
1137 PUFFS_MSG_RELEASE(getattr);
1138
1139 out2:
1140 puffs_releasenode(pn);
1141
1142 mutex_exit(&pn->pn_sizemtx);
1143
1144 return error;
1145 }
1146
1147 static void
1148 zerofill_lastpage(struct vnode *vp, voff_t off)
1149 {
1150
1151 if (trunc_page(off) == off)
1152 return;
1153
1154 if (vp->v_writecount == 0)
1155 return;
1156
1157 vsize_t len = round_page(off) - off;
1158 ubc_zerorange(&vp->v_uobj, off, len, UBC_WRITE|UBC_UNMAP_FLAG(vp));
1159 }
1160
1161 static int
1162 dosetattr(struct vnode *vp, struct vattr *vap, kauth_cred_t cred, int flags)
1163 {
1164 PUFFS_MSG_VARS(vn, setattr);
1165 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1166 struct puffs_node *pn = vp->v_data;
1167 vsize_t oldsize = vp->v_size;
1168 int error = 0;
1169
1170 KASSERT(!(flags & SETATTR_CHSIZE) || mutex_owned(&pn->pn_sizemtx));
1171
1172 if ((vp->v_mount->mnt_flag & MNT_RDONLY) &&
1173 (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL
1174 || vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL
1175 || vap->va_mode != (mode_t)VNOVAL))
1176 return EROFS;
1177
1178 if ((vp->v_mount->mnt_flag & MNT_RDONLY)
1179 && vp->v_type == VREG && vap->va_size != VNOVAL)
1180 return EROFS;
1181
1182 /*
1183 * Flush metacache first. If we are called with some explicit
1184 * parameters, treat them as information overriding metacache
1185 * information.
1186 */
1187 if (PUFFS_USE_METAFLUSH(pmp) && pn->pn_stat & PNODE_METACACHE_MASK) {
1188 if ((pn->pn_stat & PNODE_METACACHE_ATIME)
1189 && vap->va_atime.tv_sec == VNOVAL)
1190 vap->va_atime = pn->pn_mc_atime;
1191 if ((pn->pn_stat & PNODE_METACACHE_CTIME)
1192 && vap->va_ctime.tv_sec == VNOVAL)
1193 vap->va_ctime = pn->pn_mc_ctime;
1194 if ((pn->pn_stat & PNODE_METACACHE_MTIME)
1195 && vap->va_mtime.tv_sec == VNOVAL)
1196 vap->va_mtime = pn->pn_mc_mtime;
1197 if ((pn->pn_stat & PNODE_METACACHE_SIZE)
1198 && vap->va_size == VNOVAL)
1199 vap->va_size = pn->pn_mc_size;
1200
1201 pn->pn_stat &= ~PNODE_METACACHE_MASK;
1202 }
1203
1204 /*
1205 * Flush attribute cache so that another thread do
1206 * not get a stale value during the operation.
1207 */
1208 if (PUFFS_USE_FS_TTL(pmp))
1209 pn->pn_va_timeout = 0;
1210
1211 PUFFS_MSG_ALLOC(vn, setattr);
1212 (void)memcpy(&setattr_msg->pvnr_va, vap, sizeof(struct vattr));
1213 puffs_credcvt(&setattr_msg->pvnr_cred, cred);
1214 puffs_msg_setinfo(park_setattr, PUFFSOP_VN,
1215 PUFFS_VN_SETATTR, VPTOPNC(vp));
1216 if (flags & SETATTR_ASYNC)
1217 puffs_msg_setfaf(park_setattr);
1218
1219 puffs_msg_enqueue(pmp, park_setattr);
1220 if ((flags & SETATTR_ASYNC) == 0) {
1221 error = puffs_msg_wait2(pmp, park_setattr, vp->v_data, NULL);
1222
1223 if ((error == 0) && PUFFS_USE_FS_TTL(pmp)) {
1224 struct timespec *va_ttl = &setattr_msg->pvnr_va_ttl;
1225 struct vattr *rvap = &setattr_msg->pvnr_va;
1226
1227 update_va(vp, NULL, rvap, va_ttl, NULL, flags);
1228 }
1229 }
1230
1231 PUFFS_MSG_RELEASE(setattr);
1232 if ((flags & SETATTR_ASYNC) == 0) {
1233 error = checkerr(pmp, error, __func__);
1234 if (error)
1235 return error;
1236 } else {
1237 error = 0;
1238 }
1239
1240 if (vap->va_size != VNOVAL) {
1241 /*
1242 * If we truncated the file, make sure the data beyond
1243 * EOF in last page does not remain in cache, otherwise
1244 * if the file is later truncated to a larger size (creating
1245 * a hole), that area will not return zeroes as it
1246 * should.
1247 */
1248 if ((flags & SETATTR_CHSIZE) && PUFFS_USE_PAGECACHE(pmp) &&
1249 (vap->va_size < oldsize))
1250 zerofill_lastpage(vp, vap->va_size);
1251
1252 pn->pn_serversize = vap->va_size;
1253 if (flags & SETATTR_CHSIZE)
1254 uvm_vnp_setsize(vp, vap->va_size);
1255 puffs_updatenode(pn, PUFFS_UPDATECTIME | PUFFS_UPDATEMTIME, 0);
1256 }
1257
1258 return 0;
1259 }
1260
1261 int
1262 puffs_vnop_setattr(void *v)
1263 {
1264 struct vop_getattr_args /* {
1265 const struct vnodeop_desc *a_desc;
1266 struct vnode *a_vp;
1267 struct vattr *a_vap;
1268 kauth_cred_t a_cred;
1269 } */ *ap = v;
1270 struct puffs_node *pn = ap->a_vp->v_data;
1271 int error;
1272
1273 mutex_enter(&pn->pn_sizemtx);
1274 error = dosetattr(ap->a_vp, ap->a_vap, ap->a_cred, SETATTR_CHSIZE);
1275 mutex_exit(&pn->pn_sizemtx);
1276
1277 return error;
1278 }
1279
1280 static __inline int
1281 doinact(struct puffs_mount *pmp, int iaflag)
1282 {
1283
1284 if (EXISTSOP(pmp, INACTIVE))
1285 if (pmp->pmp_flags & PUFFS_KFLAG_IAONDEMAND)
1286 if (iaflag || ALLOPS(pmp))
1287 return 1;
1288 else
1289 return 0;
1290 else
1291 return 1;
1292 else
1293 return 0;
1294 }
1295
1296 static void
1297 callinactive(struct puffs_mount *pmp, puffs_cookie_t ck, int iaflag)
1298 {
1299 PUFFS_MSG_VARS(vn, inactive);
1300
1301 if (doinact(pmp, iaflag)) {
1302 PUFFS_MSG_ALLOC(vn, inactive);
1303 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1304 PUFFS_VN_INACTIVE, ck);
1305 PUFFS_MSG_ENQUEUEWAIT_NOERROR(pmp, park_inactive);
1306 PUFFS_MSG_RELEASE(inactive);
1307 }
1308 }
1309
1310 /* XXX: callinactive can't setback */
1311 int
1312 puffs_vnop_inactive(void *v)
1313 {
1314 struct vop_inactive_v2_args /* {
1315 const struct vnodeop_desc *a_desc;
1316 struct vnode *a_vp;
1317 } */ *ap = v;
1318 PUFFS_MSG_VARS(vn, inactive);
1319 struct vnode *vp = ap->a_vp;
1320 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1321 struct puffs_node *pnode;
1322 bool recycle = false;
1323
1324 /*
1325 * When puffs_cookie2vnode() misses an entry, vcache_get()
1326 * creates a new node (puffs_vfsop_loadvnode being called to
1327 * initialize the PUFFS part), then it discovers it is VNON,
1328 * and tries to vrele() it. This leads us there, while the
1329 * cookie was stall and the node likely already reclaimed.
1330 */
1331 if (vp->v_type == VNON) {
1332 return 0;
1333 }
1334
1335 pnode = vp->v_data;
1336 mutex_enter(&pnode->pn_sizemtx);
1337
1338 if (doinact(pmp, pnode->pn_stat & PNODE_DOINACT)) {
1339 flushvncache(vp, 0, 0, false);
1340 PUFFS_MSG_ALLOC(vn, inactive);
1341 puffs_msg_setinfo(park_inactive, PUFFSOP_VN,
1342 PUFFS_VN_INACTIVE, VPTOPNC(vp));
1343 PUFFS_MSG_ENQUEUEWAIT2_NOERROR(pmp, park_inactive, vp->v_data,
1344 NULL);
1345 PUFFS_MSG_RELEASE(inactive);
1346 }
1347 pnode->pn_stat &= ~PNODE_DOINACT;
1348
1349 /*
1350 * file server thinks it's gone? then don't be afraid care,
1351 * node's life was already all it would ever be
1352 */
1353 if (pnode->pn_stat & PNODE_NOREFS) {
1354 pnode->pn_stat |= PNODE_DYING;
1355 recycle = true;
1356 }
1357
1358 /*
1359 * Handle node TTL.
1360 * If grace has already timed out, make it reclaimed.
1361 * Otherwise, we queue its expiration by sop thread, so
1362 * that it does not remain for ages in the freelist,
1363 * holding memory in userspace, while we will have
1364 * to look it up again anyway.
1365 */
1366 if (PUFFS_USE_FS_TTL(pmp) && !(vp->v_vflag & VV_ROOT) && !recycle) {
1367 bool incache = !TIMED_OUT(pnode->pn_cn_timeout);
1368 bool ingrace = !TIMED_OUT(pnode->pn_cn_grace);
1369 bool reclaimqueued = pnode->pn_stat & PNODE_SOPEXP;
1370
1371 if (!incache && !ingrace && !reclaimqueued) {
1372 pnode->pn_stat |= PNODE_DYING;
1373 recycle = true;
1374 }
1375
1376 if (!recycle && !reclaimqueued) {
1377 struct puffs_sopreq *psopr;
1378 int at = MAX(pnode->pn_cn_grace, pnode->pn_cn_timeout);
1379
1380 KASSERT(curlwp != uvm.pagedaemon_lwp);
1381 psopr = kmem_alloc(sizeof(*psopr), KM_SLEEP);
1382 psopr->psopr_ck = VPTOPNC(pnode->pn_vp);
1383 psopr->psopr_sopreq = PUFFS_SOPREQ_EXPIRE;
1384 psopr->psopr_at = at;
1385
1386 mutex_enter(&pmp->pmp_sopmtx);
1387
1388 /*
1389 * If thread has disapeared, just give up. The
1390 * fs is being unmounted and the node will be
1391 * be reclaimed anyway.
1392 *
1393 * Otherwise, we queue the request but do not
1394 * immediatly signal the thread, as the node
1395 * has not been expired yet.
1396 */
1397 if (pmp->pmp_sopthrcount == 0) {
1398 kmem_free(psopr, sizeof(*psopr));
1399 } else {
1400 TAILQ_INSERT_TAIL(&pmp->pmp_sopnodereqs,
1401 psopr, psopr_entries);
1402 pnode->pn_stat |= PNODE_SOPEXP;
1403 }
1404
1405 mutex_exit(&pmp->pmp_sopmtx);
1406 }
1407 }
1408
1409 /*
1410 * Wipe direct I/O flags
1411 */
1412 pnode->pn_stat &= ~(PNODE_RDIRECT|PNODE_WDIRECT);
1413
1414 *ap->a_recycle = recycle;
1415
1416 mutex_exit(&pnode->pn_sizemtx);
1417
1418 return 0;
1419 }
1420
1421 static void
1422 callreclaim(struct puffs_mount *pmp, puffs_cookie_t ck, int nlookup)
1423 {
1424 PUFFS_MSG_VARS(vn, reclaim);
1425
1426 if (!EXISTSOP(pmp, RECLAIM))
1427 return;
1428
1429 PUFFS_MSG_ALLOC(vn, reclaim);
1430 reclaim_msg->pvnr_nlookup = nlookup;
1431 puffs_msg_setfaf(park_reclaim);
1432 puffs_msg_setinfo(park_reclaim, PUFFSOP_VN, PUFFS_VN_RECLAIM, ck);
1433
1434 puffs_msg_enqueue(pmp, park_reclaim);
1435 PUFFS_MSG_RELEASE(reclaim);
1436 return;
1437 }
1438
1439 /*
1440 * always FAF, we don't really care if the server wants to fail to
1441 * reclaim the node or not
1442 */
1443 int
1444 puffs_vnop_reclaim(void *v)
1445 {
1446 struct vop_reclaim_args /* {
1447 const struct vnodeop_desc *a_desc;
1448 struct vnode *a_vp;
1449 } */ *ap = v;
1450 struct vnode *vp = ap->a_vp;
1451 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1452 bool notifyserver = true;
1453
1454 /*
1455 * first things first: check if someone is trying to reclaim the
1456 * root vnode. do not allow that to travel to userspace.
1457 * Note that we don't need to take the lock similarly to
1458 * puffs_root(), since there is only one of us.
1459 */
1460 if (vp->v_vflag & VV_ROOT) {
1461 mutex_enter(&pmp->pmp_lock);
1462 KASSERT(pmp->pmp_root != NULL);
1463 pmp->pmp_root = NULL;
1464 mutex_exit(&pmp->pmp_lock);
1465 notifyserver = false;
1466 }
1467
1468 /*
1469 * purge info from kernel before issueing FAF, since we
1470 * don't really know when we'll get around to it after
1471 * that and someone might race us into node creation
1472 */
1473 mutex_enter(&pmp->pmp_lock);
1474 if (PUFFS_USE_NAMECACHE(pmp))
1475 cache_purge(vp);
1476 mutex_exit(&pmp->pmp_lock);
1477
1478 if (notifyserver) {
1479 int nlookup = VPTOPP(vp)->pn_nlookup;
1480
1481 callreclaim(MPTOPUFFSMP(vp->v_mount), VPTOPNC(vp), nlookup);
1482 }
1483
1484 if (PUFFS_USE_DOTDOTCACHE(pmp)) {
1485 if (__predict_true(VPTOPP(vp)->pn_parent != NULL))
1486 vrele(VPTOPP(vp)->pn_parent);
1487 else
1488 KASSERT(vp->v_type == VNON || (vp->v_vflag & VV_ROOT));
1489 }
1490
1491 puffs_putvnode(vp);
1492
1493 return 0;
1494 }
1495
1496 #define CSIZE sizeof(**ap->a_cookies)
1497 int
1498 puffs_vnop_readdir(void *v)
1499 {
1500 struct vop_readdir_args /* {
1501 const struct vnodeop_desc *a_desc;
1502 struct vnode *a_vp;
1503 struct uio *a_uio;
1504 kauth_cred_t a_cred;
1505 int *a_eofflag;
1506 off_t **a_cookies;
1507 int *a_ncookies;
1508 } */ *ap = v;
1509 PUFFS_MSG_VARS(vn, readdir);
1510 struct vnode *vp = ap->a_vp;
1511 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1512 size_t argsize, tomove, cookiemem, cookiesmax;
1513 struct uio *uio = ap->a_uio;
1514 size_t howmuch, resid;
1515 int error;
1516
1517 /*
1518 * ok, so we need: resid + cookiemem = maxreq
1519 * => resid + cookiesize * (resid/minsize) = maxreq
1520 * => resid + cookiesize/minsize * resid = maxreq
1521 * => (cookiesize/minsize + 1) * resid = maxreq
1522 * => resid = maxreq / (cookiesize/minsize + 1)
1523 *
1524 * Since cookiesize <= minsize and we're not very big on floats,
1525 * we approximate that to be 1. Therefore:
1526 *
1527 * resid = maxreq / 2;
1528 *
1529 * Well, at least we didn't have to use differential equations
1530 * or the Gram-Schmidt process.
1531 *
1532 * (yes, I'm very afraid of this)
1533 */
1534 KASSERT(CSIZE <= _DIRENT_MINSIZE((struct dirent *)0));
1535
1536 if (ap->a_cookies) {
1537 KASSERT(ap->a_ncookies != NULL);
1538 if (pmp->pmp_args.pa_fhsize == 0)
1539 return EOPNOTSUPP;
1540 resid = PUFFS_TOMOVE(uio->uio_resid, pmp) / 2;
1541 cookiesmax = resid/_DIRENT_MINSIZE((struct dirent *)0);
1542 cookiemem = ALIGN(cookiesmax*CSIZE); /* play safe */
1543 } else {
1544 resid = PUFFS_TOMOVE(uio->uio_resid, pmp);
1545 cookiesmax = 0;
1546 cookiemem = 0;
1547 }
1548
1549 argsize = sizeof(struct puffs_vnmsg_readdir);
1550 tomove = resid + cookiemem;
1551 puffs_msgmem_alloc(argsize + tomove, &park_readdir,
1552 (void *)&readdir_msg, 1);
1553
1554 puffs_credcvt(&readdir_msg->pvnr_cred, ap->a_cred);
1555 readdir_msg->pvnr_offset = uio->uio_offset;
1556 readdir_msg->pvnr_resid = resid;
1557 readdir_msg->pvnr_ncookies = cookiesmax;
1558 readdir_msg->pvnr_eofflag = 0;
1559 readdir_msg->pvnr_dentoff = cookiemem;
1560 puffs_msg_setinfo(park_readdir, PUFFSOP_VN,
1561 PUFFS_VN_READDIR, VPTOPNC(vp));
1562 puffs_msg_setdelta(park_readdir, tomove);
1563
1564 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readdir, vp->v_data, NULL, error);
1565 error = checkerr(pmp, error, __func__);
1566 if (error)
1567 goto out;
1568
1569 /* userspace is cheating? */
1570 if (readdir_msg->pvnr_resid > resid) {
1571 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1572 "resid grew", VPTOPNC(vp));
1573 ERROUT(EPROTO);
1574 }
1575 if (readdir_msg->pvnr_ncookies > cookiesmax) {
1576 puffs_senderr(pmp, PUFFS_ERR_READDIR, E2BIG,
1577 "too many cookies", VPTOPNC(vp));
1578 ERROUT(EPROTO);
1579 }
1580
1581 /* check eof */
1582 if (readdir_msg->pvnr_eofflag)
1583 *ap->a_eofflag = 1;
1584
1585 /* bouncy-wouncy with the directory data */
1586 howmuch = resid - readdir_msg->pvnr_resid;
1587
1588 /* force eof if no data was returned (getcwd() needs this) */
1589 if (howmuch == 0) {
1590 *ap->a_eofflag = 1;
1591 goto out;
1592 }
1593
1594 error = uiomove(readdir_msg->pvnr_data + cookiemem, howmuch, uio);
1595 if (error)
1596 goto out;
1597
1598 /* provide cookies to caller if so desired */
1599 if (ap->a_cookies) {
1600 KASSERT(curlwp != uvm.pagedaemon_lwp);
1601 *ap->a_cookies = malloc(readdir_msg->pvnr_ncookies*CSIZE,
1602 M_TEMP, M_WAITOK);
1603 *ap->a_ncookies = readdir_msg->pvnr_ncookies;
1604 memcpy(*ap->a_cookies, readdir_msg->pvnr_data,
1605 *ap->a_ncookies*CSIZE);
1606 }
1607
1608 /* next readdir starts here */
1609 uio->uio_offset = readdir_msg->pvnr_offset;
1610
1611 out:
1612 puffs_msgmem_release(park_readdir);
1613 return error;
1614 }
1615 #undef CSIZE
1616
1617 /*
1618 * poll works by consuming the bitmask in pn_revents. If there are
1619 * events available, poll returns immediately. If not, it issues a
1620 * poll to userspace, selrecords itself and returns with no available
1621 * events. When the file server returns, it executes puffs_parkdone_poll(),
1622 * where available events are added to the bitmask. selnotify() is
1623 * then also executed by that function causing us to enter here again
1624 * and hopefully find the missing bits (unless someone got them first,
1625 * in which case it starts all over again).
1626 */
1627 int
1628 puffs_vnop_poll(void *v)
1629 {
1630 struct vop_poll_args /* {
1631 const struct vnodeop_desc *a_desc;
1632 struct vnode *a_vp;
1633 int a_events;
1634 } */ *ap = v;
1635 PUFFS_MSG_VARS(vn, poll);
1636 struct vnode *vp = ap->a_vp;
1637 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1638 struct puffs_node *pn = vp->v_data;
1639 int events;
1640
1641 if (EXISTSOP(pmp, POLL)) {
1642 mutex_enter(&pn->pn_mtx);
1643 events = pn->pn_revents & ap->a_events;
1644 if (events & ap->a_events) {
1645 pn->pn_revents &= ~ap->a_events;
1646 mutex_exit(&pn->pn_mtx);
1647
1648 return events;
1649 } else {
1650 puffs_referencenode(pn);
1651 mutex_exit(&pn->pn_mtx);
1652
1653 PUFFS_MSG_ALLOC(vn, poll);
1654 poll_msg->pvnr_events = ap->a_events;
1655 puffs_msg_setinfo(park_poll, PUFFSOP_VN,
1656 PUFFS_VN_POLL, VPTOPNC(vp));
1657 puffs_msg_setcall(park_poll, puffs_parkdone_poll, pn);
1658 selrecord(curlwp, &pn->pn_sel);
1659
1660 PUFFS_MSG_ENQUEUEWAIT2_NOERROR(pmp, park_poll,
1661 vp->v_data, NULL);
1662 PUFFS_MSG_RELEASE(poll);
1663
1664 return 0;
1665 }
1666 } else {
1667 return genfs_poll(v);
1668 }
1669 }
1670
1671 static int
1672 flushvncache(struct vnode *vp, off_t offlo, off_t offhi, bool wait)
1673 {
1674 struct puffs_node *pn = VPTOPP(vp);
1675 struct vattr va;
1676 int pflags, error;
1677
1678 /* flush out information from our metacache, see vop_setattr */
1679 if (pn->pn_stat & PNODE_METACACHE_MASK
1680 && (pn->pn_stat & PNODE_DYING) == 0) {
1681 vattr_null(&va);
1682 error = dosetattr(vp, &va, FSCRED,
1683 SETATTR_CHSIZE | (wait ? 0 : SETATTR_ASYNC));
1684 if (error)
1685 return error;
1686 }
1687
1688 /*
1689 * flush pages to avoid being overly dirty
1690 */
1691 pflags = PGO_CLEANIT;
1692 if (wait)
1693 pflags |= PGO_SYNCIO;
1694
1695 mutex_enter(vp->v_interlock);
1696 return VOP_PUTPAGES(vp, trunc_page(offlo), round_page(offhi), pflags);
1697 }
1698
1699 int
1700 puffs_vnop_fsync(void *v)
1701 {
1702 struct vop_fsync_args /* {
1703 const struct vnodeop_desc *a_desc;
1704 struct vnode *a_vp;
1705 kauth_cred_t a_cred;
1706 int a_flags;
1707 off_t a_offlo;
1708 off_t a_offhi;
1709 } */ *ap = v;
1710 PUFFS_MSG_VARS(vn, fsync);
1711 struct vnode *vp;
1712 struct puffs_node *pn;
1713 struct puffs_mount *pmp;
1714 int error, dofaf;
1715
1716 vp = ap->a_vp;
1717 KASSERT(vp != NULL);
1718 pn = VPTOPP(vp);
1719 KASSERT(pn != NULL);
1720 pmp = MPTOPUFFSMP(vp->v_mount);
1721 if (ap->a_flags & FSYNC_WAIT) {
1722 mutex_enter(&pn->pn_sizemtx);
1723 } else {
1724 if (mutex_tryenter(&pn->pn_sizemtx) == 0)
1725 return EDEADLK;
1726 }
1727
1728 error = flushvncache(vp, ap->a_offlo, ap->a_offhi,
1729 (ap->a_flags & FSYNC_WAIT) == FSYNC_WAIT);
1730 if (error)
1731 goto out;
1732
1733 /*
1734 * HELLO! We exit already here if the user server does not
1735 * support fsync OR if we should call fsync for a node which
1736 * has references neither in the kernel or the fs server.
1737 * Otherwise we continue to issue fsync() forward.
1738 */
1739 error = 0;
1740 if (!EXISTSOP(pmp, FSYNC) || (pn->pn_stat & PNODE_DYING))
1741 goto out;
1742
1743 dofaf = (ap->a_flags & FSYNC_WAIT) == 0 || ap->a_flags == FSYNC_LAZY;
1744 /*
1745 * We abuse VXLOCK to mean "vnode is going to die", so we issue
1746 * only FAFs for those. Otherwise there's a danger of deadlock,
1747 * since the execution context here might be the user server
1748 * doing some operation on another fs, which in turn caused a
1749 * vnode to be reclaimed from the freelist for this fs.
1750 */
1751 if (dofaf == 0) {
1752 mutex_enter(vp->v_interlock);
1753 if (vdead_check(vp, VDEAD_NOWAIT) != 0)
1754 dofaf = 1;
1755 mutex_exit(vp->v_interlock);
1756 }
1757
1758 PUFFS_MSG_ALLOC(vn, fsync);
1759 if (dofaf)
1760 puffs_msg_setfaf(park_fsync);
1761
1762 puffs_credcvt(&fsync_msg->pvnr_cred, ap->a_cred);
1763 fsync_msg->pvnr_flags = ap->a_flags;
1764 fsync_msg->pvnr_offlo = ap->a_offlo;
1765 fsync_msg->pvnr_offhi = ap->a_offhi;
1766 puffs_msg_setinfo(park_fsync, PUFFSOP_VN,
1767 PUFFS_VN_FSYNC, VPTOPNC(vp));
1768
1769 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fsync, vp->v_data, NULL, error);
1770 PUFFS_MSG_RELEASE(fsync);
1771
1772 error = checkerr(pmp, error, __func__);
1773
1774 out:
1775 mutex_exit(&pn->pn_sizemtx);
1776 return error;
1777 }
1778
1779 int
1780 puffs_vnop_seek(void *v)
1781 {
1782 struct vop_seek_args /* {
1783 const struct vnodeop_desc *a_desc;
1784 struct vnode *a_vp;
1785 off_t a_oldoff;
1786 off_t a_newoff;
1787 kauth_cred_t a_cred;
1788 } */ *ap = v;
1789 PUFFS_MSG_VARS(vn, seek);
1790 struct vnode *vp = ap->a_vp;
1791 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
1792 int error;
1793
1794 PUFFS_MSG_ALLOC(vn, seek);
1795 seek_msg->pvnr_oldoff = ap->a_oldoff;
1796 seek_msg->pvnr_newoff = ap->a_newoff;
1797 puffs_credcvt(&seek_msg->pvnr_cred, ap->a_cred);
1798 puffs_msg_setinfo(park_seek, PUFFSOP_VN,
1799 PUFFS_VN_SEEK, VPTOPNC(vp));
1800
1801 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_seek, vp->v_data, NULL, error);
1802 PUFFS_MSG_RELEASE(seek);
1803 return checkerr(pmp, error, __func__);
1804 }
1805
1806 static int
1807 callremove(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1808 struct componentname *cnp)
1809 {
1810 PUFFS_MSG_VARS(vn, remove);
1811 int error;
1812
1813 PUFFS_MSG_ALLOC(vn, remove);
1814 remove_msg->pvnr_cookie_targ = ck;
1815 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1816 cnp, PUFFS_USE_FULLPNBUF(pmp));
1817 puffs_msg_setinfo(park_remove, PUFFSOP_VN, PUFFS_VN_REMOVE, dck);
1818
1819 PUFFS_MSG_ENQUEUEWAIT(pmp, park_remove, error);
1820 PUFFS_MSG_RELEASE(remove);
1821
1822 return checkerr(pmp, error, __func__);
1823 }
1824
1825 /*
1826 * XXX: can't use callremove now because can't catch setbacks with
1827 * it due to lack of a pnode argument.
1828 */
1829 int
1830 puffs_vnop_remove(void *v)
1831 {
1832 struct vop_remove_args /* {
1833 const struct vnodeop_desc *a_desc;
1834 struct vnode *a_dvp;
1835 struct vnode *a_vp;
1836 struct componentname *a_cnp;
1837 } */ *ap = v;
1838 PUFFS_MSG_VARS(vn, remove);
1839 struct vnode *dvp = ap->a_dvp;
1840 struct vnode *vp = ap->a_vp;
1841 struct puffs_node *dpn = VPTOPP(dvp);
1842 struct puffs_node *pn = VPTOPP(vp);
1843 struct componentname *cnp = ap->a_cnp;
1844 struct mount *mp = dvp->v_mount;
1845 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1846 int error;
1847
1848 PUFFS_MSG_ALLOC(vn, remove);
1849 remove_msg->pvnr_cookie_targ = VPTOPNC(vp);
1850 puffs_makecn(&remove_msg->pvnr_cn, &remove_msg->pvnr_cn_cred,
1851 cnp, PUFFS_USE_FULLPNBUF(pmp));
1852 puffs_msg_setinfo(park_remove, PUFFSOP_VN,
1853 PUFFS_VN_REMOVE, VPTOPNC(dvp));
1854
1855 puffs_msg_enqueue(pmp, park_remove);
1856 REFPN_AND_UNLOCKVP(dvp, dpn);
1857 if (dvp == vp)
1858 REFPN(pn);
1859 else
1860 REFPN_AND_UNLOCKVP(vp, pn);
1861 error = puffs_msg_wait2(pmp, park_remove, dpn, pn);
1862
1863 PUFFS_MSG_RELEASE(remove);
1864
1865 puffs_updatenode(VPTOPP(dvp), PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME, 0);
1866
1867 RELEPN_AND_VP(dvp, dpn);
1868 RELEPN_AND_VP(vp, pn);
1869
1870 error = checkerr(pmp, error, __func__);
1871 return error;
1872 }
1873
1874 int
1875 puffs_vnop_mkdir(void *v)
1876 {
1877 struct vop_mkdir_v3_args /* {
1878 const struct vnodeop_desc *a_desc;
1879 struct vnode *a_dvp;
1880 struct vnode **a_vpp;
1881 struct componentname *a_cnp;
1882 struct vattr *a_vap;
1883 } */ *ap = v;
1884 PUFFS_MSG_VARS(vn, mkdir);
1885 struct vnode *dvp = ap->a_dvp;
1886 struct puffs_node *dpn = VPTOPP(dvp);
1887 struct componentname *cnp = ap->a_cnp;
1888 struct mount *mp = dvp->v_mount;
1889 struct puffs_mount *pmp = MPTOPUFFSMP(mp);
1890 int error;
1891
1892 PUFFS_MSG_ALLOC(vn, mkdir);
1893 puffs_makecn(&mkdir_msg->pvnr_cn, &mkdir_msg->pvnr_cn_cred,
1894 cnp, PUFFS_USE_FULLPNBUF(pmp));
1895 mkdir_msg->pvnr_va = *ap->a_vap;
1896 puffs_msg_setinfo(park_mkdir, PUFFSOP_VN,
1897 PUFFS_VN_MKDIR, VPTOPNC(dvp));
1898
1899 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mkdir, dvp->v_data, NULL, error);
1900
1901 error = checkerr(pmp, error, __func__);
1902 if (error)
1903 goto out;
1904
1905 error = puffs_newnode(mp, dvp, ap->a_vpp,
1906 mkdir_msg->pvnr_newnode, cnp, VDIR, 0);
1907 if (error) {
1908 puffs_abortbutton(pmp, PUFFS_ABORT_MKDIR, dpn->pn_cookie,
1909 mkdir_msg->pvnr_newnode, cnp);
1910 goto out;
1911 }
1912
1913 if (PUFFS_USE_FS_TTL(pmp)) {
1914 struct timespec *va_ttl = &mkdir_msg->pvnr_va_ttl;
1915 struct timespec *cn_ttl = &mkdir_msg->pvnr_cn_ttl;
1916 struct vattr *rvap = &mkdir_msg->pvnr_va;
1917
1918 update_va(*ap->a_vpp, NULL, rvap,
1919 va_ttl, cn_ttl, SETATTR_CHSIZE);
1920 }
1921
1922 VPTOPP(*ap->a_vpp)->pn_nlookup++;
1923
1924 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
1925 (VPTOPP(*ap->a_vpp)->pn_parent != dvp))
1926 update_parent(*ap->a_vpp, dvp);
1927
1928 out:
1929 PUFFS_MSG_RELEASE(mkdir);
1930 return error;
1931 }
1932
1933 static int
1934 callrmdir(struct puffs_mount *pmp, puffs_cookie_t dck, puffs_cookie_t ck,
1935 struct componentname *cnp)
1936 {
1937 PUFFS_MSG_VARS(vn, rmdir);
1938 int error;
1939
1940 PUFFS_MSG_ALLOC(vn, rmdir);
1941 rmdir_msg->pvnr_cookie_targ = ck;
1942 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1943 cnp, PUFFS_USE_FULLPNBUF(pmp));
1944 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN, PUFFS_VN_RMDIR, dck);
1945
1946 PUFFS_MSG_ENQUEUEWAIT(pmp, park_rmdir, error);
1947 PUFFS_MSG_RELEASE(rmdir);
1948
1949 return checkerr(pmp, error, __func__);
1950 }
1951
1952 int
1953 puffs_vnop_rmdir(void *v)
1954 {
1955 struct vop_rmdir_args /* {
1956 const struct vnodeop_desc *a_desc;
1957 struct vnode *a_dvp;
1958 struct vnode *a_vp;
1959 struct componentname *a_cnp;
1960 } */ *ap = v;
1961 PUFFS_MSG_VARS(vn, rmdir);
1962 struct vnode *dvp = ap->a_dvp;
1963 struct vnode *vp = ap->a_vp;
1964 struct puffs_node *dpn = VPTOPP(dvp);
1965 struct puffs_node *pn = VPTOPP(vp);
1966 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
1967 struct componentname *cnp = ap->a_cnp;
1968 int error;
1969
1970 PUFFS_MSG_ALLOC(vn, rmdir);
1971 rmdir_msg->pvnr_cookie_targ = VPTOPNC(vp);
1972 puffs_makecn(&rmdir_msg->pvnr_cn, &rmdir_msg->pvnr_cn_cred,
1973 cnp, PUFFS_USE_FULLPNBUF(pmp));
1974 puffs_msg_setinfo(park_rmdir, PUFFSOP_VN,
1975 PUFFS_VN_RMDIR, VPTOPNC(dvp));
1976
1977 puffs_msg_enqueue(pmp, park_rmdir);
1978 REFPN_AND_UNLOCKVP(dvp, dpn);
1979 REFPN_AND_UNLOCKVP(vp, pn);
1980 error = puffs_msg_wait2(pmp, park_rmdir, dpn, pn);
1981
1982 PUFFS_MSG_RELEASE(rmdir);
1983
1984 puffs_updatenode(VPTOPP(dvp), PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME, 0);
1985
1986 /* XXX: some call cache_purge() *for both vnodes* here, investigate */
1987 RELEPN_AND_VP(dvp, dpn);
1988 RELEPN_AND_VP(vp, pn);
1989
1990 return error;
1991 }
1992
1993 int
1994 puffs_vnop_link(void *v)
1995 {
1996 struct vop_link_v2_args /* {
1997 const struct vnodeop_desc *a_desc;
1998 struct vnode *a_dvp;
1999 struct vnode *a_vp;
2000 struct componentname *a_cnp;
2001 } */ *ap = v;
2002 PUFFS_MSG_VARS(vn, link);
2003 struct vnode *dvp = ap->a_dvp;
2004 struct vnode *vp = ap->a_vp;
2005 struct puffs_node *dpn = VPTOPP(dvp);
2006 struct puffs_node *pn = VPTOPP(vp);
2007 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
2008 struct componentname *cnp = ap->a_cnp;
2009 int error;
2010
2011 PUFFS_MSG_ALLOC(vn, link);
2012 link_msg->pvnr_cookie_targ = VPTOPNC(vp);
2013 puffs_makecn(&link_msg->pvnr_cn, &link_msg->pvnr_cn_cred,
2014 cnp, PUFFS_USE_FULLPNBUF(pmp));
2015 puffs_msg_setinfo(park_link, PUFFSOP_VN,
2016 PUFFS_VN_LINK, VPTOPNC(dvp));
2017
2018 puffs_msg_enqueue(pmp, park_link);
2019 error = puffs_msg_wait2(pmp, park_link, dpn, pn);
2020
2021 PUFFS_MSG_RELEASE(link);
2022
2023 error = checkerr(pmp, error, __func__);
2024
2025 /*
2026 * XXX: stay in touch with the cache. I don't like this, but
2027 * don't have a better solution either. See also puffs_rename().
2028 */
2029 if (error == 0) {
2030 puffs_updatenode(pn, PUFFS_UPDATECTIME, 0);
2031 puffs_updatenode(VPTOPP(dvp),
2032 PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME, 0);
2033 }
2034
2035 return error;
2036 }
2037
2038 int
2039 puffs_vnop_symlink(void *v)
2040 {
2041 struct vop_symlink_v3_args /* {
2042 const struct vnodeop_desc *a_desc;
2043 struct vnode *a_dvp;
2044 struct vnode **a_vpp;
2045 struct componentname *a_cnp;
2046 struct vattr *a_vap;
2047 char *a_target;
2048 } */ *ap = v;
2049 PUFFS_MSG_VARS(vn, symlink);
2050 struct vnode *dvp = ap->a_dvp;
2051 struct puffs_node *dpn = VPTOPP(dvp);
2052 struct mount *mp = dvp->v_mount;
2053 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
2054 struct componentname *cnp = ap->a_cnp;
2055 int error;
2056
2057 *ap->a_vpp = NULL;
2058
2059 PUFFS_MSG_ALLOC(vn, symlink);
2060 puffs_makecn(&symlink_msg->pvnr_cn, &symlink_msg->pvnr_cn_cred,
2061 cnp, PUFFS_USE_FULLPNBUF(pmp));
2062 symlink_msg->pvnr_va = *ap->a_vap;
2063 (void)strlcpy(symlink_msg->pvnr_link, ap->a_target,
2064 sizeof(symlink_msg->pvnr_link));
2065 puffs_msg_setinfo(park_symlink, PUFFSOP_VN,
2066 PUFFS_VN_SYMLINK, VPTOPNC(dvp));
2067
2068 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_symlink, dvp->v_data, NULL, error);
2069
2070 error = checkerr(pmp, error, __func__);
2071 if (error)
2072 goto out;
2073
2074 error = puffs_newnode(mp, dvp, ap->a_vpp,
2075 symlink_msg->pvnr_newnode, cnp, VLNK, 0);
2076 if (error) {
2077 puffs_abortbutton(pmp, PUFFS_ABORT_SYMLINK, dpn->pn_cookie,
2078 symlink_msg->pvnr_newnode, cnp);
2079 goto out;
2080 }
2081
2082 if (PUFFS_USE_FS_TTL(pmp)) {
2083 struct timespec *va_ttl = &symlink_msg->pvnr_va_ttl;
2084 struct timespec *cn_ttl = &symlink_msg->pvnr_cn_ttl;
2085 struct vattr *rvap = &symlink_msg->pvnr_va;
2086
2087 update_va(*ap->a_vpp, NULL, rvap,
2088 va_ttl, cn_ttl, SETATTR_CHSIZE);
2089 }
2090
2091 VPTOPP(*ap->a_vpp)->pn_nlookup++;
2092
2093 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
2094 (VPTOPP(*ap->a_vpp)->pn_parent != dvp))
2095 update_parent(*ap->a_vpp, dvp);
2096
2097 out:
2098 PUFFS_MSG_RELEASE(symlink);
2099
2100 return error;
2101 }
2102
2103 int
2104 puffs_vnop_readlink(void *v)
2105 {
2106 struct vop_readlink_args /* {
2107 const struct vnodeop_desc *a_desc;
2108 struct vnode *a_vp;
2109 struct uio *a_uio;
2110 kauth_cred_t a_cred;
2111 } */ *ap = v;
2112 PUFFS_MSG_VARS(vn, readlink);
2113 struct vnode *vp = ap->a_vp;
2114 struct puffs_mount *pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2115 size_t linklen;
2116 int error;
2117
2118 PUFFS_MSG_ALLOC(vn, readlink);
2119 puffs_credcvt(&readlink_msg->pvnr_cred, ap->a_cred);
2120 linklen = sizeof(readlink_msg->pvnr_link);
2121 readlink_msg->pvnr_linklen = linklen;
2122 puffs_msg_setinfo(park_readlink, PUFFSOP_VN,
2123 PUFFS_VN_READLINK, VPTOPNC(vp));
2124
2125 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_readlink, vp->v_data, NULL, error);
2126 error = checkerr(pmp, error, __func__);
2127 if (error)
2128 goto out;
2129
2130 /* bad bad user file server */
2131 if (readlink_msg->pvnr_linklen > linklen) {
2132 puffs_senderr(pmp, PUFFS_ERR_READLINK, E2BIG,
2133 "linklen too big", VPTOPNC(ap->a_vp));
2134 error = EPROTO;
2135 goto out;
2136 }
2137
2138 error = uiomove(&readlink_msg->pvnr_link, readlink_msg->pvnr_linklen,
2139 ap->a_uio);
2140 out:
2141 PUFFS_MSG_RELEASE(readlink);
2142 return error;
2143 }
2144
2145 int
2146 puffs_vnop_rename(void *v)
2147 {
2148 struct vop_rename_args /* {
2149 const struct vnodeop_desc *a_desc;
2150 struct vnode *a_fdvp;
2151 struct vnode *a_fvp;
2152 struct componentname *a_fcnp;
2153 struct vnode *a_tdvp;
2154 struct vnode *a_tvp;
2155 struct componentname *a_tcnp;
2156 } */ *ap = v;
2157 PUFFS_MSG_VARS(vn, rename);
2158 struct vnode *fdvp = ap->a_fdvp, *fvp = ap->a_fvp;
2159 struct vnode *tdvp = ap->a_tdvp, *tvp = ap->a_tvp;
2160 struct puffs_node *fpn = ap->a_fvp->v_data;
2161 struct puffs_mount *pmp = MPTOPUFFSMP(fdvp->v_mount);
2162 int error;
2163 bool doabort = true;
2164
2165 if ((fvp->v_mount != tdvp->v_mount) ||
2166 (tvp && (fvp->v_mount != tvp->v_mount))) {
2167 ERROUT(EXDEV);
2168 }
2169
2170 PUFFS_MSG_ALLOC(vn, rename);
2171 rename_msg->pvnr_cookie_src = VPTOPNC(fvp);
2172 rename_msg->pvnr_cookie_targdir = VPTOPNC(tdvp);
2173 if (tvp)
2174 rename_msg->pvnr_cookie_targ = VPTOPNC(tvp);
2175 else
2176 rename_msg->pvnr_cookie_targ = NULL;
2177 puffs_makecn(&rename_msg->pvnr_cn_src, &rename_msg->pvnr_cn_src_cred,
2178 ap->a_fcnp, PUFFS_USE_FULLPNBUF(pmp));
2179 puffs_makecn(&rename_msg->pvnr_cn_targ, &rename_msg->pvnr_cn_targ_cred,
2180 ap->a_tcnp, PUFFS_USE_FULLPNBUF(pmp));
2181 puffs_msg_setinfo(park_rename, PUFFSOP_VN,
2182 PUFFS_VN_RENAME, VPTOPNC(fdvp));
2183
2184 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rename, fdvp->v_data, NULL, error);
2185 doabort = false;
2186 PUFFS_MSG_RELEASE(rename);
2187 error = checkerr(pmp, error, __func__);
2188
2189 /*
2190 * XXX: stay in touch with the cache. I don't like this, but
2191 * don't have a better solution either. See also puffs_link().
2192 */
2193 if (error == 0) {
2194 puffs_updatenode(fpn, PUFFS_UPDATECTIME, 0);
2195 puffs_updatenode(VPTOPP(fdvp),
2196 PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME, 0);
2197 if (fdvp != tdvp)
2198 puffs_updatenode(VPTOPP(tdvp),
2199 PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME,
2200 0);
2201
2202 if (PUFFS_USE_DOTDOTCACHE(pmp) &&
2203 (VPTOPP(fvp)->pn_parent != tdvp))
2204 update_parent(fvp, tdvp);
2205 }
2206
2207
2208 out:
2209 if (doabort)
2210 VOP_ABORTOP(tdvp, ap->a_tcnp);
2211 if (tvp != NULL)
2212 vput(tvp);
2213 if (tdvp == tvp)
2214 vrele(tdvp);
2215 else
2216 vput(tdvp);
2217
2218 if (doabort)
2219 VOP_ABORTOP(fdvp, ap->a_fcnp);
2220 vrele(fdvp);
2221 vrele(fvp);
2222
2223 return error;
2224 }
2225
2226 #define RWARGS(cont, iofl, move, offset, creds) \
2227 (cont)->pvnr_ioflag = (iofl); \
2228 (cont)->pvnr_resid = (move); \
2229 (cont)->pvnr_offset = (offset); \
2230 puffs_credcvt(&(cont)->pvnr_cred, creds)
2231
2232 int
2233 puffs_vnop_read(void *v)
2234 {
2235 struct vop_read_args /* {
2236 const struct vnodeop_desc *a_desc;
2237 struct vnode *a_vp;
2238 struct uio *a_uio;
2239 int a_ioflag;
2240 kauth_cred_t a_cred;
2241 } */ *ap = v;
2242 PUFFS_MSG_VARS(vn, read);
2243 struct vnode *vp = ap->a_vp;
2244 struct puffs_node *pn = VPTOPP(vp);
2245 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2246 struct uio *uio = ap->a_uio;
2247 size_t tomove, argsize;
2248 vsize_t bytelen;
2249 int error;
2250
2251 read_msg = NULL;
2252 error = 0;
2253
2254 /* std sanity */
2255 if (uio->uio_resid == 0)
2256 return 0;
2257 if (uio->uio_offset < 0)
2258 return EFBIG;
2259
2260 /*
2261 * On the case of reading empty files and (vp->v_size != 0) below:
2262 * some filesystems (hint: FUSE and distributed filesystems) still
2263 * expect to get the READ in order to update atime. Reading through
2264 * the case filters empty files, therefore we prefer to bypass the
2265 * cache here.
2266 */
2267 if (vp->v_type == VREG &&
2268 PUFFS_USE_PAGECACHE(pmp) &&
2269 !(pn->pn_stat & PNODE_RDIRECT) &&
2270 (vp->v_size != 0)) {
2271 const int advice = IO_ADV_DECODE(ap->a_ioflag);
2272
2273 while (uio->uio_resid > 0) {
2274 if (vp->v_size <= uio->uio_offset) {
2275 break;
2276 }
2277 bytelen = MIN(uio->uio_resid,
2278 vp->v_size - uio->uio_offset);
2279 if (bytelen == 0)
2280 break;
2281
2282 error = ubc_uiomove(&vp->v_uobj, uio, bytelen, advice,
2283 UBC_READ | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp));
2284 if (error)
2285 break;
2286 }
2287
2288 if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
2289 puffs_updatenode(VPTOPP(vp), PUFFS_UPDATEATIME, 0);
2290 } else {
2291 /*
2292 * in case it's not a regular file or we're operating
2293 * uncached, do read in the old-fashioned style,
2294 * i.e. explicit read operations
2295 */
2296
2297 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
2298 argsize = sizeof(struct puffs_vnmsg_read);
2299 puffs_msgmem_alloc(argsize + tomove, &park_read,
2300 (void *)&read_msg, 1);
2301
2302 error = 0;
2303 while (uio->uio_resid > 0) {
2304 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
2305 memset(read_msg, 0, argsize); /* XXX: touser KASSERT */
2306 RWARGS(read_msg, ap->a_ioflag, tomove,
2307 uio->uio_offset, ap->a_cred);
2308 puffs_msg_setinfo(park_read, PUFFSOP_VN,
2309 PUFFS_VN_READ, VPTOPNC(vp));
2310 puffs_msg_setdelta(park_read, tomove);
2311
2312 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_read, vp->v_data,
2313 NULL, error);
2314 error = checkerr(pmp, error, __func__);
2315 if (error)
2316 break;
2317
2318 if (read_msg->pvnr_resid > tomove) {
2319 puffs_senderr(pmp, PUFFS_ERR_READ,
2320 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2321 error = EPROTO;
2322 break;
2323 }
2324
2325 error = uiomove(read_msg->pvnr_data,
2326 tomove - read_msg->pvnr_resid, uio);
2327
2328 /*
2329 * in case the file is out of juice, resid from
2330 * userspace is != 0. and the error-case is
2331 * quite obvious
2332 */
2333 if (error || read_msg->pvnr_resid)
2334 break;
2335 }
2336
2337 puffs_msgmem_release(park_read);
2338 }
2339
2340 return error;
2341 }
2342
2343 /*
2344 * XXX: in case of a failure, this leaves uio in a bad state.
2345 * We could theoretically copy the uio and iovecs and "replay"
2346 * them the right amount after the userspace trip, but don't
2347 * bother for now.
2348 */
2349 int
2350 puffs_vnop_write(void *v)
2351 {
2352 struct vop_write_args /* {
2353 const struct vnodeop_desc *a_desc;
2354 struct vnode *a_vp;
2355 struct uio *a_uio;
2356 int a_ioflag;
2357 kauth_cred_t a_cred;
2358 } */ *ap = v;
2359 PUFFS_MSG_VARS(vn, write);
2360 struct vnode *vp = ap->a_vp;
2361 struct puffs_node *pn = VPTOPP(vp);
2362 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2363 struct uio *uio = ap->a_uio;
2364 size_t tomove, argsize;
2365 off_t oldoff, newoff, origoff;
2366 vsize_t bytelen;
2367 int error, uflags;
2368 int ubcflags;
2369
2370 error = uflags = 0;
2371 write_msg = NULL;
2372
2373 /* std sanity */
2374 if (uio->uio_resid == 0)
2375 return 0;
2376 if (uio->uio_offset < 0)
2377 return EFBIG;
2378
2379 mutex_enter(&pn->pn_sizemtx);
2380
2381 /*
2382 * userspace *should* be allowed to control this,
2383 * but with UBC it's a bit unclear how to handle it
2384 */
2385 if (ap->a_ioflag & IO_APPEND)
2386 uio->uio_offset = vp->v_size;
2387
2388 origoff = uio->uio_offset;
2389
2390 if (vp->v_type == VREG &&
2391 PUFFS_USE_PAGECACHE(pmp) &&
2392 !(pn->pn_stat & PNODE_WDIRECT)) {
2393 ubcflags = UBC_WRITE | UBC_PARTIALOK | UBC_UNMAP_FLAG(vp);
2394
2395 while (uio->uio_resid > 0) {
2396 oldoff = uio->uio_offset;
2397 bytelen = uio->uio_resid;
2398
2399 newoff = oldoff + bytelen;
2400 if (vp->v_size < newoff) {
2401 uvm_vnp_setwritesize(vp, newoff);
2402 }
2403 error = ubc_uiomove(&vp->v_uobj, uio, bytelen,
2404 UVM_ADV_RANDOM, ubcflags);
2405
2406 /*
2407 * In case of a ubc_uiomove() error,
2408 * opt to not extend the file at all and
2409 * return an error. Otherwise, if we attempt
2410 * to clear the memory we couldn't fault to,
2411 * we might generate a kernel page fault.
2412 */
2413 if (vp->v_size < newoff) {
2414 if (error == 0) {
2415 uflags |= PUFFS_UPDATESIZE;
2416 uvm_vnp_setsize(vp, newoff);
2417 } else {
2418 uvm_vnp_setwritesize(vp, vp->v_size);
2419 }
2420 }
2421 if (error)
2422 break;
2423
2424 /*
2425 * If we're writing large files, flush to file server
2426 * every 64k. Otherwise we can very easily exhaust
2427 * kernel and user memory, as the file server cannot
2428 * really keep up with our writing speed.
2429 *
2430 * Note: this does *NOT* honor MNT_ASYNC, because
2431 * that gives userland too much say in the kernel.
2432 */
2433 if (oldoff >> 16 != uio->uio_offset >> 16) {
2434 mutex_enter(vp->v_interlock);
2435 error = VOP_PUTPAGES(vp, oldoff & ~0xffff,
2436 uio->uio_offset & ~0xffff,
2437 PGO_CLEANIT | PGO_SYNCIO);
2438 if (error)
2439 break;
2440 }
2441 }
2442
2443 /* synchronous I/O? */
2444 if (error == 0 && ap->a_ioflag & IO_SYNC) {
2445 mutex_enter(vp->v_interlock);
2446 error = VOP_PUTPAGES(vp, trunc_page(origoff),
2447 round_page(uio->uio_offset),
2448 PGO_CLEANIT | PGO_SYNCIO);
2449
2450 /* write through page cache? */
2451 } else if (error == 0 && pmp->pmp_flags & PUFFS_KFLAG_WTCACHE) {
2452 mutex_enter(vp->v_interlock);
2453 error = VOP_PUTPAGES(vp, trunc_page(origoff),
2454 round_page(uio->uio_offset), PGO_CLEANIT);
2455 }
2456 } else {
2457 /* tomove is non-increasing */
2458 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
2459 argsize = sizeof(struct puffs_vnmsg_write) + tomove;
2460 puffs_msgmem_alloc(argsize, &park_write, (void *)&write_msg,1);
2461
2462 while (uio->uio_resid > 0) {
2463 /* move data to buffer */
2464 tomove = PUFFS_TOMOVE(uio->uio_resid, pmp);
2465 memset(write_msg, 0, argsize); /* XXX: touser KASSERT */
2466 RWARGS(write_msg, ap->a_ioflag, tomove,
2467 uio->uio_offset, ap->a_cred);
2468 error = uiomove(write_msg->pvnr_data, tomove, uio);
2469 if (error)
2470 break;
2471
2472 /* move buffer to userspace */
2473 puffs_msg_setinfo(park_write, PUFFSOP_VN,
2474 PUFFS_VN_WRITE, VPTOPNC(vp));
2475 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_write, vp->v_data,
2476 NULL, error);
2477 error = checkerr(pmp, error, __func__);
2478 if (error)
2479 break;
2480
2481 if (write_msg->pvnr_resid > tomove) {
2482 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2483 E2BIG, "resid grew", VPTOPNC(ap->a_vp));
2484 error = EPROTO;
2485 break;
2486 }
2487
2488 /* adjust file size */
2489 if (vp->v_size < uio->uio_offset) {
2490 uflags |= PUFFS_UPDATESIZE;
2491 uvm_vnp_setsize(vp, uio->uio_offset);
2492 }
2493
2494 /* didn't move everything? bad userspace. bail */
2495 if (write_msg->pvnr_resid != 0) {
2496 error = EIO;
2497 break;
2498 }
2499 }
2500 puffs_msgmem_release(park_write);
2501
2502 /*
2503 * Direct I/O on write but not on read: we must
2504 * invlidate the written pages so that we read
2505 * the written data and not the stalled cache.
2506 */
2507 if ((error == 0) &&
2508 (vp->v_type == VREG) && PUFFS_USE_PAGECACHE(pmp) &&
2509 (pn->pn_stat & PNODE_WDIRECT) &&
2510 !(pn->pn_stat & PNODE_RDIRECT)) {
2511 voff_t off_lo = trunc_page(origoff);
2512 voff_t off_hi = round_page(uio->uio_offset);
2513
2514 mutex_enter(vp->v_uobj.vmobjlock);
2515 error = VOP_PUTPAGES(vp, off_lo, off_hi, PGO_FREE);
2516 }
2517 }
2518
2519 if (vp->v_mount->mnt_flag & MNT_RELATIME)
2520 uflags |= PUFFS_UPDATEATIME;
2521 uflags |= PUFFS_UPDATECTIME;
2522 uflags |= PUFFS_UPDATEMTIME;
2523 puffs_updatenode(VPTOPP(vp), uflags, vp->v_size);
2524
2525 /*
2526 * If we do not use meta flush, we need to update the
2527 * filesystem now, otherwise we will get a stale value
2528 * on the next GETATTR
2529 */
2530 if (!PUFFS_USE_METAFLUSH(pmp) && (uflags & PUFFS_UPDATESIZE)) {
2531 struct vattr va;
2532 int ret;
2533
2534 vattr_null(&va);
2535 va.va_size = vp->v_size;
2536 ret = dosetattr(vp, &va, FSCRED, 0);
2537 if (ret) {
2538 DPRINTF(("dosetattr set size to %jd failed: %d\n",
2539 (intmax_t)vp->v_size, ret));
2540 }
2541 }
2542 mutex_exit(&pn->pn_sizemtx);
2543 return error;
2544 }
2545
2546 int
2547 puffs_vnop_fallocate(void *v)
2548 {
2549 struct vop_fallocate_args /* {
2550 const struct vnodeop_desc *a_desc;
2551 struct vnode *a_vp;
2552 off_t a_pos;
2553 off_t a_len;
2554 } */ *ap = v;
2555 struct vnode *vp = ap->a_vp;
2556 struct puffs_node *pn = VPTOPP(vp);
2557 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2558 PUFFS_MSG_VARS(vn, fallocate);
2559 int error;
2560
2561 mutex_enter(&pn->pn_sizemtx);
2562
2563 PUFFS_MSG_ALLOC(vn, fallocate);
2564 fallocate_msg->pvnr_off = ap->a_pos;
2565 fallocate_msg->pvnr_len = ap->a_len;
2566 puffs_msg_setinfo(park_fallocate, PUFFSOP_VN,
2567 PUFFS_VN_FALLOCATE, VPTOPNC(vp));
2568
2569 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fallocate, vp->v_data, NULL, error);
2570 error = checkerr(pmp, error, __func__);
2571 PUFFS_MSG_RELEASE(fallocate);
2572
2573 switch (error) {
2574 case 0:
2575 break;
2576 case EAGAIN:
2577 error = EIO;
2578 /* FALLTHROUGH */
2579 default:
2580 goto out;
2581 }
2582
2583 if (ap->a_pos + ap->a_len > vp->v_size) {
2584 uvm_vnp_setsize(vp, ap->a_pos + ap->a_len);
2585 puffs_updatenode(pn, PUFFS_UPDATESIZE, vp->v_size);
2586 }
2587 out:
2588 mutex_exit(&pn->pn_sizemtx);
2589
2590 return error;
2591 }
2592
2593 int
2594 puffs_vnop_fdiscard(void *v)
2595 {
2596 struct vop_fdiscard_args /* {
2597 const struct vnodeop_desc *a_desc;
2598 struct vnode *a_vp;
2599 off_t a_pos;
2600 off_t a_len;
2601 } */ *ap = v;
2602 struct vnode *vp = ap->a_vp;
2603 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2604 PUFFS_MSG_VARS(vn, fdiscard);
2605 int error;
2606
2607 PUFFS_MSG_ALLOC(vn, fdiscard);
2608 fdiscard_msg->pvnr_off = ap->a_pos;
2609 fdiscard_msg->pvnr_len = ap->a_len;
2610 puffs_msg_setinfo(park_fdiscard, PUFFSOP_VN,
2611 PUFFS_VN_FALLOCATE, VPTOPNC(vp));
2612
2613 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_fdiscard, vp->v_data, NULL, error);
2614 error = checkerr(pmp, error, __func__);
2615 PUFFS_MSG_RELEASE(fdiscard);
2616
2617 return error;
2618 }
2619
2620 int
2621 puffs_vnop_print(void *v)
2622 {
2623 struct vop_print_args /* {
2624 struct vnode *a_vp;
2625 } */ *ap = v;
2626 PUFFS_MSG_VARS(vn, print);
2627 struct vnode *vp = ap->a_vp;
2628 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2629 struct puffs_node *pn = vp->v_data;
2630
2631 /* kernel portion */
2632 printf("tag VT_PUFFS, vnode %p, puffs node: %p,\n"
2633 "\tuserspace cookie: %p", vp, pn, pn->pn_cookie);
2634 if (vp->v_type == VFIFO)
2635 VOCALL(fifo_vnodeop_p, VOFFSET(vop_print), v);
2636 printf("\n");
2637
2638 /* userspace portion */
2639 if (EXISTSOP(pmp, PRINT)) {
2640 PUFFS_MSG_ALLOC(vn, print);
2641 puffs_msg_setinfo(park_print, PUFFSOP_VN,
2642 PUFFS_VN_PRINT, VPTOPNC(vp));
2643 PUFFS_MSG_ENQUEUEWAIT2_NOERROR(pmp, park_print, vp->v_data,
2644 NULL);
2645 PUFFS_MSG_RELEASE(print);
2646 }
2647
2648 return 0;
2649 }
2650
2651 int
2652 puffs_vnop_pathconf(void *v)
2653 {
2654 struct vop_pathconf_args /* {
2655 const struct vnodeop_desc *a_desc;
2656 struct vnode *a_vp;
2657 int a_name;
2658 register_t *a_retval;
2659 } */ *ap = v;
2660 PUFFS_MSG_VARS(vn, pathconf);
2661 struct vnode *vp = ap->a_vp;
2662 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2663 int error;
2664
2665 PUFFS_MSG_ALLOC(vn, pathconf);
2666 pathconf_msg->pvnr_name = ap->a_name;
2667 puffs_msg_setinfo(park_pathconf, PUFFSOP_VN,
2668 PUFFS_VN_PATHCONF, VPTOPNC(vp));
2669 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_pathconf, vp->v_data, NULL, error);
2670 error = checkerr(pmp, error, __func__);
2671 if (!error)
2672 *ap->a_retval = pathconf_msg->pvnr_retval;
2673 PUFFS_MSG_RELEASE(pathconf);
2674
2675 return error;
2676 }
2677
2678 int
2679 puffs_vnop_advlock(void *v)
2680 {
2681 struct vop_advlock_args /* {
2682 const struct vnodeop_desc *a_desc;
2683 struct vnode *a_vp;
2684 void *a_id;
2685 int a_op;
2686 struct flock *a_fl;
2687 int a_flags;
2688 } */ *ap = v;
2689 PUFFS_MSG_VARS(vn, advlock);
2690 struct vnode *vp = ap->a_vp;
2691 struct puffs_node *pn = VPTOPP(vp);
2692 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2693 int error;
2694
2695 if (!EXISTSOP(pmp, ADVLOCK))
2696 return lf_advlock(ap, &pn->pn_lockf, vp->v_size);
2697
2698 PUFFS_MSG_ALLOC(vn, advlock);
2699 (void)memcpy(&advlock_msg->pvnr_fl, ap->a_fl,
2700 sizeof(advlock_msg->pvnr_fl));
2701 advlock_msg->pvnr_id = ap->a_id;
2702 advlock_msg->pvnr_op = ap->a_op;
2703 advlock_msg->pvnr_flags = ap->a_flags;
2704 puffs_msg_setinfo(park_advlock, PUFFSOP_VN,
2705 PUFFS_VN_ADVLOCK, VPTOPNC(vp));
2706 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_advlock, vp->v_data, NULL, error);
2707 error = checkerr(pmp, error, __func__);
2708 PUFFS_MSG_RELEASE(advlock);
2709
2710 return error;
2711 }
2712
2713 int
2714 puffs_vnop_abortop(void *v)
2715 {
2716 struct vop_abortop_args /* {
2717 struct vnode *a_dvp;
2718 struct componentname *a_cnp;
2719 }; */ *ap = v;
2720 PUFFS_MSG_VARS(vn, abortop);
2721 struct vnode *dvp = ap->a_dvp;
2722 struct puffs_mount *pmp = MPTOPUFFSMP(dvp->v_mount);
2723 struct componentname *cnp = ap->a_cnp;
2724
2725 if (EXISTSOP(pmp, ABORTOP)) {
2726 PUFFS_MSG_ALLOC(vn, abortop);
2727 puffs_makecn(&abortop_msg->pvnr_cn, &abortop_msg->pvnr_cn_cred,
2728 cnp, PUFFS_USE_FULLPNBUF(pmp));
2729 puffs_msg_setfaf(park_abortop);
2730 puffs_msg_setinfo(park_abortop, PUFFSOP_VN,
2731 PUFFS_VN_ABORTOP, VPTOPNC(dvp));
2732
2733 puffs_msg_enqueue(pmp, park_abortop);
2734 PUFFS_MSG_RELEASE(abortop);
2735 }
2736
2737 return genfs_abortop(v);
2738 }
2739
2740 #define BIOASYNC(bp) (bp->b_flags & B_ASYNC)
2741
2742 /*
2743 * This maps itself to PUFFS_VN_READ/WRITE for data transfer.
2744 */
2745 int
2746 puffs_vnop_strategy(void *v)
2747 {
2748 struct vop_strategy_args /* {
2749 const struct vnodeop_desc *a_desc;
2750 struct vnode *a_vp;
2751 struct buf *a_bp;
2752 } */ *ap = v;
2753 PUFFS_MSG_VARS(vn, rw);
2754 struct vnode *vp = ap->a_vp;
2755 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2756 struct puffs_node *pn;
2757 struct buf *bp;
2758 size_t argsize;
2759 size_t tomove, moved;
2760 int error, dofaf, cansleep, dobiodone;
2761
2762 pmp = MPTOPUFFSMP(vp->v_mount);
2763 bp = ap->a_bp;
2764 error = 0;
2765 dofaf = 0;
2766 cansleep = 0;
2767 pn = VPTOPP(vp);
2768 park_rw = NULL; /* explicit */
2769 dobiodone = 1;
2770
2771 if ((BUF_ISREAD(bp) && !EXISTSOP(pmp, READ))
2772 || (BUF_ISWRITE(bp) && !EXISTSOP(pmp, WRITE)))
2773 ERROUT(EOPNOTSUPP);
2774
2775 /*
2776 * Short-circuit optimization: don't flush buffer in between
2777 * VOP_INACTIVE and VOP_RECLAIM in case the node has no references.
2778 */
2779 if (pn->pn_stat & PNODE_DYING) {
2780 KASSERT(BUF_ISWRITE(bp));
2781 bp->b_resid = 0;
2782 goto out;
2783 }
2784
2785 #ifdef DIAGNOSTIC
2786 if (bp->b_bcount > pmp->pmp_msg_maxsize - PUFFS_MSGSTRUCT_MAX)
2787 panic("puffs_strategy: wildly inappropriate buf bcount %d",
2788 bp->b_bcount);
2789 #endif
2790
2791 /*
2792 * See explanation for the necessity of a FAF in puffs_fsync.
2793 *
2794 * Also, do FAF in case we're suspending.
2795 * See puffs_vfsops.c:pageflush()
2796 */
2797 if (BUF_ISWRITE(bp)) {
2798 mutex_enter(vp->v_interlock);
2799 if (vdead_check(vp, VDEAD_NOWAIT) != 0)
2800 dofaf = 1;
2801 if (pn->pn_stat & PNODE_FAF)
2802 dofaf = 1;
2803 mutex_exit(vp->v_interlock);
2804 }
2805
2806 cansleep = (curlwp == uvm.pagedaemon_lwp || dofaf) ? 0 : 1;
2807
2808 KASSERT(curlwp != uvm.pagedaemon_lwp || dofaf || BIOASYNC(bp));
2809
2810 /* allocate transport structure */
2811 tomove = PUFFS_TOMOVE(bp->b_bcount, pmp);
2812 argsize = sizeof(struct puffs_vnmsg_rw);
2813 error = puffs_msgmem_alloc(argsize + tomove, &park_rw,
2814 (void *)&rw_msg, cansleep);
2815 if (error)
2816 goto out;
2817 RWARGS(rw_msg, 0, tomove, bp->b_blkno << DEV_BSHIFT, FSCRED);
2818
2819 /* 2x2 cases: read/write, faf/nofaf */
2820 if (BUF_ISREAD(bp)) {
2821 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2822 PUFFS_VN_READ, VPTOPNC(vp));
2823 puffs_msg_setdelta(park_rw, tomove);
2824 if (BIOASYNC(bp)) {
2825 puffs_msg_setcall(park_rw,
2826 puffs_parkdone_asyncbioread, bp);
2827 puffs_msg_enqueue(pmp, park_rw);
2828 dobiodone = 0;
2829 } else {
2830 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data,
2831 NULL, error);
2832 error = checkerr(pmp, error, __func__);
2833 if (error)
2834 goto out;
2835
2836 if (rw_msg->pvnr_resid > tomove) {
2837 puffs_senderr(pmp, PUFFS_ERR_READ,
2838 E2BIG, "resid grew", VPTOPNC(vp));
2839 ERROUT(EPROTO);
2840 }
2841
2842 moved = tomove - rw_msg->pvnr_resid;
2843
2844 (void)memcpy(bp->b_data, rw_msg->pvnr_data, moved);
2845 bp->b_resid = bp->b_bcount - moved;
2846 }
2847 } else {
2848 puffs_msg_setinfo(park_rw, PUFFSOP_VN,
2849 PUFFS_VN_WRITE, VPTOPNC(vp));
2850 /*
2851 * make pages read-only before we write them if we want
2852 * write caching info
2853 */
2854 if (PUFFS_WCACHEINFO(pmp)) {
2855 struct uvm_object *uobj = &vp->v_uobj;
2856 int npages = (bp->b_bcount + PAGE_SIZE-1) >> PAGE_SHIFT;
2857 struct vm_page *vmp;
2858 int i;
2859
2860 for (i = 0; i < npages; i++) {
2861 vmp= uvm_pageratop((vaddr_t)bp->b_data
2862 + (i << PAGE_SHIFT));
2863 DPRINTF(("puffs_strategy: write-protecting "
2864 "vp %p page %p, offset %" PRId64"\n",
2865 vp, vmp, vmp->offset));
2866 mutex_enter(uobj->vmobjlock);
2867 vmp->flags |= PG_RDONLY;
2868 pmap_page_protect(vmp, VM_PROT_READ);
2869 mutex_exit(uobj->vmobjlock);
2870 }
2871 }
2872
2873 (void)memcpy(&rw_msg->pvnr_data, bp->b_data, tomove);
2874 if (dofaf) {
2875 puffs_msg_setfaf(park_rw);
2876 } else if (BIOASYNC(bp)) {
2877 puffs_msg_setcall(park_rw,
2878 puffs_parkdone_asyncbiowrite, bp);
2879 dobiodone = 0;
2880 }
2881
2882 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_rw, vp->v_data, NULL, error);
2883
2884 if (dobiodone == 0)
2885 goto out;
2886
2887 error = checkerr(pmp, error, __func__);
2888 if (error)
2889 goto out;
2890
2891 if (rw_msg->pvnr_resid > tomove) {
2892 puffs_senderr(pmp, PUFFS_ERR_WRITE,
2893 E2BIG, "resid grew", VPTOPNC(vp));
2894 ERROUT(EPROTO);
2895 }
2896
2897 /*
2898 * FAF moved everything. Frankly, we don't
2899 * really have a choice.
2900 */
2901 if (dofaf && error == 0)
2902 moved = tomove;
2903 else
2904 moved = tomove - rw_msg->pvnr_resid;
2905
2906 bp->b_resid = bp->b_bcount - moved;
2907 if (bp->b_resid != 0) {
2908 ERROUT(EIO);
2909 }
2910 }
2911
2912 out:
2913 if (park_rw)
2914 puffs_msgmem_release(park_rw);
2915
2916 if (error)
2917 bp->b_error = error;
2918
2919 if (error || dobiodone)
2920 biodone(bp);
2921
2922 return error;
2923 }
2924
2925 int
2926 puffs_vnop_mmap(void *v)
2927 {
2928 struct vop_mmap_args /* {
2929 const struct vnodeop_desc *a_desc;
2930 struct vnode *a_vp;
2931 vm_prot_t a_prot;
2932 kauth_cred_t a_cred;
2933 } */ *ap = v;
2934 PUFFS_MSG_VARS(vn, mmap);
2935 struct vnode *vp = ap->a_vp;
2936 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
2937 int error;
2938
2939 if (!PUFFS_USE_PAGECACHE(pmp))
2940 return genfs_eopnotsupp(v);
2941
2942 if (EXISTSOP(pmp, MMAP)) {
2943 PUFFS_MSG_ALLOC(vn, mmap);
2944 mmap_msg->pvnr_prot = ap->a_prot;
2945 puffs_credcvt(&mmap_msg->pvnr_cred, ap->a_cred);
2946 puffs_msg_setinfo(park_mmap, PUFFSOP_VN,
2947 PUFFS_VN_MMAP, VPTOPNC(vp));
2948
2949 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_mmap, vp->v_data, NULL, error);
2950 error = checkerr(pmp, error, __func__);
2951 PUFFS_MSG_RELEASE(mmap);
2952 } else {
2953 error = genfs_mmap(v);
2954 }
2955
2956 return error;
2957 }
2958
2959
2960 /*
2961 * The rest don't get a free trip to userspace and back, they
2962 * have to stay within the kernel.
2963 */
2964
2965 /*
2966 * bmap doesn't really make any sense for puffs, so just 1:1 map it.
2967 * well, maybe somehow, somewhere, some day ....
2968 */
2969 int
2970 puffs_vnop_bmap(void *v)
2971 {
2972 struct vop_bmap_args /* {
2973 const struct vnodeop_desc *a_desc;
2974 struct vnode *a_vp;
2975 daddr_t a_bn;
2976 struct vnode **a_vpp;
2977 daddr_t *a_bnp;
2978 int *a_runp;
2979 } */ *ap = v;
2980 struct puffs_mount *pmp;
2981
2982 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
2983
2984 if (ap->a_vpp)
2985 *ap->a_vpp = ap->a_vp;
2986 if (ap->a_bnp)
2987 *ap->a_bnp = ap->a_bn;
2988 if (ap->a_runp)
2989 *ap->a_runp
2990 = (PUFFS_TOMOVE(pmp->pmp_msg_maxsize, pmp)>>DEV_BSHIFT) - 1;
2991
2992 return 0;
2993 }
2994
2995 /*
2996 * Handle getpages faults in puffs. We let genfs_getpages() do most
2997 * of the dirty work, but we come in this route to do accounting tasks.
2998 * If the user server has specified functions for cache notifications
2999 * about reads and/or writes, we record which type of operation we got,
3000 * for which page range, and proceed to issue a FAF notification to the
3001 * server about it.
3002 */
3003 int
3004 puffs_vnop_getpages(void *v)
3005 {
3006 struct vop_getpages_args /* {
3007 const struct vnodeop_desc *a_desc;
3008 struct vnode *a_vp;
3009 voff_t a_offset;
3010 struct vm_page **a_m;
3011 int *a_count;
3012 int a_centeridx;
3013 vm_prot_t a_access_type;
3014 int a_advice;
3015 int a_flags;
3016 } */ *ap = v;
3017 struct puffs_mount *pmp;
3018 struct puffs_node *pn;
3019 struct vnode *vp;
3020 struct vm_page **pgs;
3021 struct puffs_cacheinfo *pcinfo = NULL;
3022 struct puffs_cacherun *pcrun;
3023 void *parkmem = NULL;
3024 size_t runsizes;
3025 int i, npages, si, streakon;
3026 int error, locked, write;
3027
3028 pmp = MPTOPUFFSMP(ap->a_vp->v_mount);
3029 npages = *ap->a_count;
3030 pgs = ap->a_m;
3031 vp = ap->a_vp;
3032 pn = vp->v_data;
3033 locked = (ap->a_flags & PGO_LOCKED) != 0;
3034 write = (ap->a_access_type & VM_PROT_WRITE) != 0;
3035
3036 /* ccg xnaht - gets Wuninitialized wrong */
3037 pcrun = NULL;
3038 runsizes = 0;
3039
3040 /*
3041 * Check that we aren't trying to fault in pages which our file
3042 * server doesn't know about. This happens if we extend a file by
3043 * skipping some pages and later try to fault in pages which
3044 * are between pn_serversize and vp_size. This check optimizes
3045 * away the common case where a file is being extended.
3046 */
3047 if (ap->a_offset >= pn->pn_serversize && ap->a_offset < vp->v_size) {
3048 struct vattr va;
3049
3050 /* try again later when we can block */
3051 if (locked)
3052 ERROUT(EBUSY);
3053
3054 mutex_exit(vp->v_interlock);
3055 vattr_null(&va);
3056 va.va_size = vp->v_size;
3057 error = dosetattr(vp, &va, FSCRED, 0);
3058 if (error)
3059 ERROUT(error);
3060 mutex_enter(vp->v_interlock);
3061 }
3062
3063 if (write && PUFFS_WCACHEINFO(pmp)) {
3064 #ifdef notnowjohn
3065 /* allocate worst-case memory */
3066 runsizes = ((npages / 2) + 1) * sizeof(struct puffs_cacherun);
3067 KASSERT(curlwp != uvm.pagedaemon_lwp || locked);
3068 pcinfo = kmem_zalloc(sizeof(struct puffs_cacheinfo) + runsize,
3069 locked ? KM_NOSLEEP : KM_SLEEP);
3070
3071 /*
3072 * can't block if we're locked and can't mess up caching
3073 * information for fs server. so come back later, please
3074 */
3075 if (pcinfo == NULL)
3076 ERROUT(ENOMEM);
3077
3078 parkmem = puffs_park_alloc(locked == 0);
3079 if (parkmem == NULL)
3080 ERROUT(ENOMEM);
3081
3082 pcrun = pcinfo->pcache_runs;
3083 #else
3084 (void)parkmem;
3085 #endif
3086 }
3087
3088 error = genfs_getpages(v);
3089 if (error)
3090 goto out;
3091
3092 if (PUFFS_WCACHEINFO(pmp) == 0)
3093 goto out;
3094
3095 /*
3096 * Let's see whose fault it was and inform the user server of
3097 * possibly read/written pages. Map pages from read faults
3098 * strictly read-only, since otherwise we might miss info on
3099 * when the page is actually write-faulted to.
3100 */
3101 if (!locked)
3102 mutex_enter(vp->v_uobj.vmobjlock);
3103 for (i = 0, si = 0, streakon = 0; i < npages; i++) {
3104 if (pgs[i] == NULL || pgs[i] == PGO_DONTCARE) {
3105 if (streakon && write) {
3106 streakon = 0;
3107 pcrun[si].pcache_runend
3108 = trunc_page(pgs[i]->offset) + PAGE_MASK;
3109 si++;
3110 }
3111 continue;
3112 }
3113 if (streakon == 0 && write) {
3114 streakon = 1;
3115 pcrun[si].pcache_runstart = pgs[i]->offset;
3116 }
3117
3118 if (!write)
3119 pgs[i]->flags |= PG_RDONLY;
3120 }
3121 /* was the last page part of our streak? */
3122 if (streakon) {
3123 pcrun[si].pcache_runend
3124 = trunc_page(pgs[i-1]->offset) + PAGE_MASK;
3125 si++;
3126 }
3127 if (!locked)
3128 mutex_exit(vp->v_uobj.vmobjlock);
3129
3130 KASSERT(si <= (npages / 2) + 1);
3131
3132 #ifdef notnowjohn
3133 /* send results to userspace */
3134 if (write)
3135 puffs_cacheop(pmp, parkmem, pcinfo,
3136 sizeof(struct puffs_cacheinfo) + runsizes, VPTOPNC(vp));
3137 #endif
3138
3139 out:
3140 if (error) {
3141 if (pcinfo != NULL)
3142 kmem_free(pcinfo,
3143 sizeof(struct puffs_cacheinfo) + runsizes);
3144 #ifdef notnowjohn
3145 if (parkmem != NULL)
3146 puffs_park_release(parkmem, 1);
3147 #endif
3148 }
3149
3150 return error;
3151 }
3152
3153 /*
3154 * Extended attribute support.
3155 */
3156
3157 int
3158 puffs_vnop_getextattr(void *v)
3159 {
3160 struct vop_getextattr_args /*
3161 struct vnode *a_vp;
3162 int a_attrnamespace;
3163 const char *a_name;
3164 struct uio *a_uio;
3165 size_t *a_size;
3166 kauth_cred_t a_cred;
3167 }; */ *ap = v;
3168 PUFFS_MSG_VARS(vn, getextattr);
3169 struct vnode *vp = ap->a_vp;
3170 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
3171 int attrnamespace = ap->a_attrnamespace;
3172 const char *name = ap->a_name;
3173 struct uio *uio = ap->a_uio;
3174 size_t *sizep = ap->a_size;
3175 size_t tomove, resid;
3176 int error;
3177
3178 if (uio)
3179 resid = uio->uio_resid;
3180 else
3181 resid = 0;
3182
3183 tomove = PUFFS_TOMOVE(resid, pmp);
3184 if (tomove != resid) {
3185 error = E2BIG;
3186 goto out;
3187 }
3188
3189 puffs_msgmem_alloc(sizeof(struct puffs_vnmsg_getextattr) + tomove,
3190 &park_getextattr, (void *)&getextattr_msg, 1);
3191
3192 getextattr_msg->pvnr_attrnamespace = attrnamespace;
3193 strlcpy(getextattr_msg->pvnr_attrname, name,
3194 sizeof(getextattr_msg->pvnr_attrname));
3195 puffs_credcvt(&getextattr_msg->pvnr_cred, ap->a_cred);
3196 if (sizep)
3197 getextattr_msg->pvnr_datasize = 1;
3198 getextattr_msg->pvnr_resid = tomove;
3199
3200 puffs_msg_setinfo(park_getextattr,
3201 PUFFSOP_VN, PUFFS_VN_GETEXTATTR, VPTOPNC(vp));
3202 puffs_msg_setdelta(park_getextattr, tomove);
3203 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_getextattr, vp->v_data, NULL, error);
3204
3205 error = checkerr(pmp, error, __func__);
3206 if (error)
3207 goto out;
3208
3209 resid = getextattr_msg->pvnr_resid;
3210 if (resid > tomove) {
3211 puffs_senderr(pmp, PUFFS_ERR_GETEXTATTR, E2BIG,
3212 "resid grew", VPTOPNC(vp));
3213 error = EPROTO;
3214 goto out;
3215 }
3216
3217 if (sizep)
3218 *sizep = getextattr_msg->pvnr_datasize;
3219 if (uio)
3220 error = uiomove(getextattr_msg->pvnr_data, tomove - resid, uio);
3221
3222 out:
3223 PUFFS_MSG_RELEASE(getextattr);
3224 return error;
3225 }
3226
3227 int
3228 puffs_vnop_setextattr(void *v)
3229 {
3230 struct vop_setextattr_args /* {
3231 struct vnode *a_vp;
3232 int a_attrnamespace;
3233 const char *a_name;
3234 struct uio *a_uio;
3235 kauth_cred_t a_cred;
3236 }; */ *ap = v;
3237 PUFFS_MSG_VARS(vn, setextattr);
3238 struct vnode *vp = ap->a_vp;
3239 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
3240 int attrnamespace = ap->a_attrnamespace;
3241 const char *name = ap->a_name;
3242 struct uio *uio = ap->a_uio;
3243 size_t tomove, resid;
3244 int error;
3245
3246 if (uio)
3247 resid = uio->uio_resid;
3248 else
3249 resid = 0;
3250
3251 tomove = PUFFS_TOMOVE(resid, pmp);
3252 if (tomove != resid) {
3253 error = E2BIG;
3254 goto out;
3255 }
3256
3257 puffs_msgmem_alloc(sizeof(struct puffs_vnmsg_setextattr) + tomove,
3258 &park_setextattr, (void *)&setextattr_msg, 1);
3259
3260 setextattr_msg->pvnr_attrnamespace = attrnamespace;
3261 strlcpy(setextattr_msg->pvnr_attrname, name,
3262 sizeof(setextattr_msg->pvnr_attrname));
3263 puffs_credcvt(&setextattr_msg->pvnr_cred, ap->a_cred);
3264 setextattr_msg->pvnr_resid = tomove;
3265
3266 if (uio) {
3267 error = uiomove(setextattr_msg->pvnr_data, tomove, uio);
3268 if (error)
3269 goto out;
3270 }
3271
3272 puffs_msg_setinfo(park_setextattr,
3273 PUFFSOP_VN, PUFFS_VN_SETEXTATTR, VPTOPNC(vp));
3274 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_setextattr, vp->v_data, NULL, error);
3275
3276 error = checkerr(pmp, error, __func__);
3277 if (error)
3278 goto out;
3279
3280 if (setextattr_msg->pvnr_resid != 0)
3281 error = EIO;
3282
3283 out:
3284 PUFFS_MSG_RELEASE(setextattr);
3285
3286 return error;
3287 }
3288
3289 int
3290 puffs_vnop_listextattr(void *v)
3291 {
3292 struct vop_listextattr_args /* {
3293 struct vnode *a_vp;
3294 int a_attrnamespace;
3295 struct uio *a_uio;
3296 size_t *a_size;
3297 int a_flag,
3298 kauth_cred_t a_cred;
3299 }; */ *ap = v;
3300 PUFFS_MSG_VARS(vn, listextattr);
3301 struct vnode *vp = ap->a_vp;
3302 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
3303 int attrnamespace = ap->a_attrnamespace;
3304 struct uio *uio = ap->a_uio;
3305 size_t *sizep = ap->a_size;
3306 int flag = ap->a_flag;
3307 size_t tomove, resid;
3308 int error;
3309
3310 if (uio)
3311 resid = uio->uio_resid;
3312 else
3313 resid = 0;
3314
3315 tomove = PUFFS_TOMOVE(resid, pmp);
3316 if (tomove != resid) {
3317 error = E2BIG;
3318 goto out;
3319 }
3320
3321 puffs_msgmem_alloc(sizeof(struct puffs_vnmsg_listextattr) + tomove,
3322 &park_listextattr, (void *)&listextattr_msg, 1);
3323
3324 listextattr_msg->pvnr_attrnamespace = attrnamespace;
3325 listextattr_msg->pvnr_flag = flag;
3326 puffs_credcvt(&listextattr_msg->pvnr_cred, ap->a_cred);
3327 listextattr_msg->pvnr_resid = tomove;
3328 if (sizep)
3329 listextattr_msg->pvnr_datasize = 1;
3330
3331 puffs_msg_setinfo(park_listextattr,
3332 PUFFSOP_VN, PUFFS_VN_LISTEXTATTR, VPTOPNC(vp));
3333 puffs_msg_setdelta(park_listextattr, tomove);
3334 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_listextattr, vp->v_data, NULL, error);
3335
3336 error = checkerr(pmp, error, __func__);
3337 if (error)
3338 goto out;
3339
3340 resid = listextattr_msg->pvnr_resid;
3341 if (resid > tomove) {
3342 puffs_senderr(pmp, PUFFS_ERR_LISTEXTATTR, E2BIG,
3343 "resid grew", VPTOPNC(vp));
3344 error = EPROTO;
3345 goto out;
3346 }
3347
3348 if (sizep)
3349 *sizep = listextattr_msg->pvnr_datasize;
3350 if (uio)
3351 error = uiomove(listextattr_msg->pvnr_data, tomove-resid, uio);
3352
3353 out:
3354 PUFFS_MSG_RELEASE(listextattr);
3355 return error;
3356 }
3357
3358 int
3359 puffs_vnop_deleteextattr(void *v)
3360 {
3361 struct vop_deleteextattr_args /* {
3362 struct vnode *a_vp;
3363 int a_attrnamespace;
3364 const char *a_name;
3365 kauth_cred_t a_cred;
3366 }; */ *ap = v;
3367 PUFFS_MSG_VARS(vn, deleteextattr);
3368 struct vnode *vp = ap->a_vp;
3369 struct puffs_mount *pmp = MPTOPUFFSMP(vp->v_mount);
3370 int attrnamespace = ap->a_attrnamespace;
3371 const char *name = ap->a_name;
3372 int error;
3373
3374 PUFFS_MSG_ALLOC(vn, deleteextattr);
3375 deleteextattr_msg->pvnr_attrnamespace = attrnamespace;
3376 strlcpy(deleteextattr_msg->pvnr_attrname, name,
3377 sizeof(deleteextattr_msg->pvnr_attrname));
3378 puffs_credcvt(&deleteextattr_msg->pvnr_cred, ap->a_cred);
3379
3380 puffs_msg_setinfo(park_deleteextattr,
3381 PUFFSOP_VN, PUFFS_VN_DELETEEXTATTR, VPTOPNC(vp));
3382 PUFFS_MSG_ENQUEUEWAIT2(pmp, park_deleteextattr,
3383 vp->v_data, NULL, error);
3384
3385 error = checkerr(pmp, error, __func__);
3386
3387 PUFFS_MSG_RELEASE(deleteextattr);
3388 return error;
3389 }
3390
3391 /*
3392 * spec & fifo. These call the miscfs spec and fifo vectors, but issue
3393 * FAF update information for the puffs node first.
3394 */
3395 int
3396 puffs_vnop_spec_read(void *v)
3397 {
3398 struct vop_read_args /* {
3399 const struct vnodeop_desc *a_desc;
3400 struct vnode *a_vp;
3401 struct uio *a_uio;
3402 int a_ioflag;
3403 kauth_cred_t a_cred;
3404 } */ *ap = v;
3405
3406 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
3407 return VOCALL(spec_vnodeop_p, VOFFSET(vop_read), v);
3408 }
3409
3410 int
3411 puffs_vnop_spec_write(void *v)
3412 {
3413 struct vop_write_args /* {
3414 const struct vnodeop_desc *a_desc;
3415 struct vnode *a_vp;
3416 struct uio *a_uio;
3417 int a_ioflag;
3418 kauth_cred_t a_cred;
3419 } */ *ap = v;
3420
3421 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
3422 return VOCALL(spec_vnodeop_p, VOFFSET(vop_write), v);
3423 }
3424
3425 int
3426 puffs_vnop_fifo_read(void *v)
3427 {
3428 struct vop_read_args /* {
3429 const struct vnodeop_desc *a_desc;
3430 struct vnode *a_vp;
3431 struct uio *a_uio;
3432 int a_ioflag;
3433 kauth_cred_t a_cred;
3434 } */ *ap = v;
3435
3436 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEATIME, 0);
3437 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_read), v);
3438 }
3439
3440 int
3441 puffs_vnop_fifo_write(void *v)
3442 {
3443 struct vop_write_args /* {
3444 const struct vnodeop_desc *a_desc;
3445 struct vnode *a_vp;
3446 struct uio *a_uio;
3447 int a_ioflag;
3448 kauth_cred_t a_cred;
3449 } */ *ap = v;
3450
3451 puffs_updatenode(VPTOPP(ap->a_vp), PUFFS_UPDATEMTIME, 0);
3452 return VOCALL(fifo_vnodeop_p, VOFFSET(vop_write), v);
3453 }
3454