1 | /* $NetBSD: p2k.c,v 1.70 2017/04/26 03:02:48 riastradh Exp $ */ |
2 | |
3 | /* |
4 | * Copyright (c) 2007, 2008, 2009 Antti Kantee. All Rights Reserved. |
5 | * |
6 | * Development of this software was supported by the |
7 | * Finnish Cultural Foundation. |
8 | * |
9 | * Redistribution and use in source and binary forms, with or without |
10 | * modification, are permitted provided that the following conditions |
11 | * are met: |
12 | * 1. Redistributions of source code must retain the above copyright |
13 | * notice, this list of conditions and the following disclaimer. |
14 | * 2. Redistributions in binary form must reproduce the above copyright |
15 | * notice, this list of conditions and the following disclaimer in the |
16 | * documentation and/or other materials provided with the distribution. |
17 | * |
18 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS |
19 | * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
20 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
21 | * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
22 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
23 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
24 | * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
25 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
26 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
27 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
28 | * SUCH DAMAGE. |
29 | */ |
30 | |
31 | /* |
32 | * puffs 2k, i.e. puffs 2 kernel. Converts the puffs protocol to |
33 | * the kernel vfs protocol and vice versa. |
34 | * |
35 | * A word about reference counting: puffs in the kernel is the king of |
36 | * reference counting. We must maintain a vnode alive and kicking |
37 | * until the kernel tells us to reclaim it. Therefore we make sure |
38 | * we never accidentally lose a vnode. Before calling operations which |
39 | * decrease the refcount we always bump the refcount up to compensate. |
40 | * Come inactive, if the file system thinks that the vnode should be |
41 | * put out of its misery, it will set the recycle flag. We use this |
42 | * to tell the kernel to reclaim the vnode. Only in reclaim do we |
43 | * really nuke the last reference. |
44 | */ |
45 | |
46 | #include <sys/cdefs.h> |
47 | #include <sys/mount.h> |
48 | #include <sys/param.h> |
49 | #include <sys/lock.h> |
50 | #include <sys/namei.h> |
51 | #include <sys/dirent.h> |
52 | #include <sys/hash.h> |
53 | |
54 | #include <assert.h> |
55 | #include <errno.h> |
56 | #include <puffs.h> |
57 | #include <stdlib.h> |
58 | #include <stdio.h> |
59 | |
60 | #include <rump/rump.h> |
61 | #include <rump/rumpvnode_if.h> |
62 | #include <rump/p2k.h> |
63 | #include <rump/ukfs.h> |
64 | |
65 | #include <uvm/uvm_pager.h> |
66 | |
67 | /* NetBSD-5 compat */ |
68 | #ifndef MOUNT_RUMPFS |
69 | #define MOUNT_RUMPFS "rumpfs" |
70 | #endif |
71 | |
72 | PUFFSOP_PROTOS(p2k) |
73 | |
74 | LIST_HEAD(p2k_vp_hash, p2k_node); |
75 | #define NHASHBUCK (1<<16) |
76 | struct p2k_mount { |
77 | struct vnode *p2m_rvp; |
78 | struct puffs_usermount *p2m_pu; |
79 | struct ukfs *p2m_ukfs; |
80 | struct p2k_vp_hash p2m_vphash[NHASHBUCK]; |
81 | struct mount *p2m_mp; |
82 | int p2m_nvnodes; |
83 | int p2m_imtmpfsman; |
84 | bool p2m_hasdebug; |
85 | }; |
86 | |
87 | struct p2k_node { |
88 | struct puffs_node p2n_pn; |
89 | struct vnode *p2n_vp; |
90 | |
91 | LIST_ENTRY(p2k_node) p2n_entries; |
92 | }; |
93 | |
94 | #define OPC2VP(opc) (((struct p2k_node *)opc)->p2n_vp) |
95 | |
96 | static int haswizard; |
97 | static uid_t wizarduid; |
98 | |
99 | static struct kauth_cred * |
100 | cred_create(const struct puffs_cred *pcr) |
101 | { |
102 | gid_t groups[NGROUPS]; |
103 | uid_t uid; |
104 | gid_t gid; |
105 | short ngroups = __arraycount(groups); |
106 | |
107 | if (haswizard) { |
108 | uid = wizarduid; |
109 | } else { |
110 | if (puffs_cred_getuid(pcr, &uid) == -1) |
111 | uid = 0; |
112 | } |
113 | if (puffs_cred_getgid(pcr, &gid) == -1) |
114 | gid = 0; |
115 | puffs_cred_getgroups(pcr, groups, &ngroups); |
116 | |
117 | /* LINTED: ngroups is ok */ |
118 | return rump_pub_cred_create(uid, gid, ngroups, groups); |
119 | } |
120 | |
121 | static __inline void |
122 | cred_destroy(struct kauth_cred *cred) |
123 | { |
124 | |
125 | rump_pub_cred_put(cred); |
126 | } |
127 | |
128 | static struct componentname * |
129 | makecn(const struct puffs_cn *pcn) |
130 | { |
131 | struct kauth_cred *cred; |
132 | |
133 | cred = cred_create(pcn->pcn_cred); |
134 | /* LINTED: prehistoric types in first two args */ |
135 | return rump_pub_makecn(pcn->pcn_nameiop, pcn->pcn_flags, |
136 | pcn->pcn_name, pcn->pcn_namelen, cred, rump_pub_lwproc_curlwp()); |
137 | } |
138 | |
139 | static __inline void |
140 | freecn(struct componentname *cnp) |
141 | { |
142 | |
143 | rump_pub_freecn(cnp, RUMPCN_FREECRED); |
144 | } |
145 | |
146 | static void |
147 | makelwp(struct puffs_usermount *pu) |
148 | { |
149 | pid_t pid; |
150 | lwpid_t lid; |
151 | |
152 | puffs_cc_getcaller(puffs_cc_getcc(pu), &pid, &lid); |
153 | rump_pub_allbetsareoff_setid(pid, lid); |
154 | } |
155 | |
156 | static volatile sig_atomic_t dodump; |
157 | static void |
158 | dumpmp(struct puffs_usermount *pu) |
159 | { |
160 | struct statvfs svfsb; |
161 | |
162 | if (dodump && p2k_fs_statvfs(pu, &svfsb) == 0) { |
163 | rump_pub_vfs_mount_print(svfsb.f_mntonname, dodump-1); |
164 | } |
165 | |
166 | dodump = 0; |
167 | } |
168 | |
169 | static void |
170 | sighand(int sig) |
171 | { |
172 | |
173 | if (sig == SIGINFO) |
174 | dodump = 1; |
175 | else if (sig == SIGUSR1) |
176 | dodump = 2; |
177 | } |
178 | |
179 | static __inline struct p2k_vp_hash * |
180 | gethash(struct p2k_mount *p2m, struct vnode *vp) |
181 | { |
182 | uint32_t hash; |
183 | |
184 | hash = hash32_buf(&vp, sizeof(vp), HASH32_BUF_INIT); |
185 | return &p2m->p2m_vphash[hash % NHASHBUCK]; |
186 | } |
187 | |
188 | /* |
189 | * Find node based on hash of vnode pointer. If vnode is found, |
190 | * releases one reference to vnode based on the fact that we just |
191 | * performed a lookup for it. |
192 | * |
193 | * If the optinal p2n_storage parameter is passed, it is used instead |
194 | * of allocating more memory. This allows for easier error recovery. |
195 | */ |
196 | static struct p2k_node * |
197 | getp2n(struct p2k_mount *p2m, struct vnode *vp, bool initial, |
198 | struct p2k_node *p2n_storage) |
199 | { |
200 | struct p2k_vp_hash *hl; |
201 | struct p2k_node *p2n = NULL; |
202 | |
203 | /* p2n_storage => initial */ |
204 | assert(!p2n_storage || initial); |
205 | |
206 | hl = gethash(p2m, vp); |
207 | if (!initial) |
208 | LIST_FOREACH(p2n, hl, p2n_entries) |
209 | if (p2n->p2n_vp == vp) |
210 | break; |
211 | |
212 | hl = gethash(p2m, vp); |
213 | if (p2n) { |
214 | rump_pub_vp_rele(vp); |
215 | } else { |
216 | if (p2n_storage) |
217 | p2n = p2n_storage; |
218 | else |
219 | p2n = malloc(sizeof(*p2n)); |
220 | if (!p2n) { |
221 | rump_pub_vp_rele(vp); |
222 | return NULL; |
223 | } |
224 | memset(p2n, 0, sizeof(*p2n)); |
225 | LIST_INSERT_HEAD(hl, p2n, p2n_entries); |
226 | p2n->p2n_vp = vp; |
227 | } |
228 | return p2n; |
229 | } |
230 | |
231 | static void |
232 | freep2n(struct p2k_node *p2n) |
233 | { |
234 | |
235 | assert(p2n->p2n_vp == NULL); |
236 | LIST_REMOVE(p2n, p2n_entries); |
237 | free(p2n); |
238 | } |
239 | |
240 | /*ARGSUSED*/ |
241 | static void |
242 | p2k_errcatcher(struct puffs_usermount *pu, uint8_t type, int error, |
243 | const char *str, puffs_cookie_t cook) |
244 | { |
245 | |
246 | fprintf(stderr, "type %d, error %d, cookie %p (%s)\n" , |
247 | type, error, cook, str); |
248 | |
249 | /* |
250 | * Trap all EINVAL responses to lookup. It most likely means |
251 | * that we supplied VNON/VBAD as the type. The real kernel |
252 | * doesn't panic from this either, but just handles it. |
253 | */ |
254 | if (type != PUFFS_VN_LOOKUP && error == EINVAL) |
255 | abort(); |
256 | } |
257 | |
258 | /* just to avoid annoying loop when singlestepping */ |
259 | static struct p2k_mount * |
260 | allocp2m(void) |
261 | { |
262 | struct p2k_mount *p2m; |
263 | int i; |
264 | |
265 | p2m = malloc(sizeof(*p2m)); |
266 | if (p2m == NULL) |
267 | return NULL; |
268 | memset(p2m, 0, sizeof(*p2m)); |
269 | |
270 | for (i = 0; i < NHASHBUCK; i++) |
271 | LIST_INIT(&p2m->p2m_vphash[i]); |
272 | |
273 | return p2m; |
274 | } |
275 | |
276 | struct p2k_mount * |
277 | p2k_init(uint32_t puffs_flags) |
278 | { |
279 | struct puffs_ops *pops; |
280 | struct p2k_mount *p2m; |
281 | char *envbuf; |
282 | bool dodaemon; |
283 | bool hasdebug; |
284 | |
285 | PUFFSOP_INIT(pops); |
286 | |
287 | PUFFSOP_SET(pops, p2k, fs, statvfs); |
288 | PUFFSOP_SET(pops, p2k, fs, unmount); |
289 | PUFFSOP_SET(pops, p2k, fs, sync); |
290 | PUFFSOP_SET(pops, p2k, fs, fhtonode); |
291 | PUFFSOP_SET(pops, p2k, fs, nodetofh); |
292 | PUFFSOP_SET(pops, p2k, fs, extattrctl); |
293 | |
294 | PUFFSOP_SET(pops, p2k, node, lookup); |
295 | PUFFSOP_SET(pops, p2k, node, create); |
296 | PUFFSOP_SET(pops, p2k, node, mknod); |
297 | PUFFSOP_SET(pops, p2k, node, open); |
298 | PUFFSOP_SET(pops, p2k, node, close); |
299 | PUFFSOP_SET(pops, p2k, node, access); |
300 | PUFFSOP_SET(pops, p2k, node, getattr); |
301 | PUFFSOP_SET(pops, p2k, node, setattr); |
302 | #if 0 |
303 | PUFFSOP_SET(pops, p2k, node, poll); |
304 | #endif |
305 | PUFFSOP_SET(pops, p2k, node, mmap); |
306 | PUFFSOP_SET(pops, p2k, node, fsync); |
307 | PUFFSOP_SET(pops, p2k, node, seek); |
308 | PUFFSOP_SET(pops, p2k, node, remove); |
309 | PUFFSOP_SET(pops, p2k, node, link); |
310 | PUFFSOP_SET(pops, p2k, node, rename); |
311 | PUFFSOP_SET(pops, p2k, node, mkdir); |
312 | PUFFSOP_SET(pops, p2k, node, rmdir); |
313 | PUFFSOP_SET(pops, p2k, node, symlink); |
314 | PUFFSOP_SET(pops, p2k, node, readdir); |
315 | PUFFSOP_SET(pops, p2k, node, readlink); |
316 | PUFFSOP_SET(pops, p2k, node, read); |
317 | PUFFSOP_SET(pops, p2k, node, write); |
318 | |
319 | PUFFSOP_SET(pops, p2k, node, pathconf); |
320 | |
321 | PUFFSOP_SET(pops, p2k, node, inactive); |
322 | PUFFSOP_SET(pops, p2k, node, reclaim); |
323 | |
324 | PUFFSOP_SET(pops, p2k, node, getextattr); |
325 | PUFFSOP_SET(pops, p2k, node, setextattr); |
326 | PUFFSOP_SET(pops, p2k, node, listextattr); |
327 | PUFFSOP_SET(pops, p2k, node, deleteextattr); |
328 | |
329 | dodaemon = true; |
330 | hasdebug = false; |
331 | |
332 | if (getenv("P2K_DEBUG" ) != NULL) { |
333 | puffs_flags |= PUFFS_FLAG_OPDUMP; |
334 | dodaemon = false; |
335 | hasdebug = true; |
336 | } |
337 | if (getenv("P2K_NODETACH" ) != NULL) { |
338 | dodaemon = false; |
339 | } |
340 | if (getenv("P2K_NOCACHE_PAGE" ) != NULL) { |
341 | puffs_flags |= PUFFS_KFLAG_NOCACHE_PAGE; |
342 | } |
343 | if (getenv("P2K_NOCACHE_NAME" ) != NULL) { |
344 | puffs_flags |= PUFFS_KFLAG_NOCACHE_NAME; |
345 | } |
346 | if (getenv("P2K_NOCACHE" ) != NULL) { |
347 | puffs_flags |= PUFFS_KFLAG_NOCACHE; |
348 | } |
349 | if ((envbuf = getenv("P2K_WIZARDUID" )) != NULL) { |
350 | char *ep; |
351 | |
352 | wizarduid = strtoul(envbuf, &ep, 10); |
353 | if (envbuf[0] == '\0' || *ep != '\0') { |
354 | printf("P2K_WIZARDUID: invalid uid %s\n" , envbuf); |
355 | } else if (wizarduid > UID_MAX) { |
356 | printf("P2K_WIZARDUID: uid %s out-of-range\n" , envbuf); |
357 | } else { |
358 | haswizard = 1; |
359 | printf("P2K WIZARD MODE: using uid %d\n" , wizarduid); |
360 | } |
361 | } |
362 | |
363 | /* |
364 | * Explicitely tell that our cookies can be treated as |
365 | * puffs_node, since we never let libpuffs know by |
366 | * calling call puffs_pn_new() |
367 | */ |
368 | puffs_flags |= PUFFS_FLAG_PNCOOKIE; |
369 | |
370 | p2m = allocp2m(); |
371 | if (p2m == NULL) |
372 | return NULL; |
373 | p2m->p2m_pu = puffs_init(pops, PUFFS_DEFER, PUFFS_DEFER, |
374 | PUFFS_DEFER, puffs_flags); |
375 | if (p2m->p2m_pu == NULL) { |
376 | int sverrno = errno; |
377 | free(p2m); |
378 | errno = sverrno; |
379 | return NULL; |
380 | } |
381 | p2m->p2m_hasdebug = hasdebug; |
382 | |
383 | if (dodaemon) { |
384 | if (puffs_daemon(p2m->p2m_pu, 1, 1) == -1) { |
385 | int sverrno = errno; |
386 | p2k_cancel(p2m, sverrno); |
387 | errno = sverrno; |
388 | p2m = NULL; |
389 | } |
390 | } |
391 | if (p2m) |
392 | rump_init(); |
393 | |
394 | rump_pub_lwproc_rfork(RUMP_RFCFDG); |
395 | |
396 | return p2m; |
397 | } |
398 | |
399 | void |
400 | p2k_cancel(struct p2k_mount *p2m, int error) |
401 | { |
402 | |
403 | puffs_cancel(p2m->p2m_pu, error); |
404 | free(p2m); |
405 | } |
406 | |
407 | static int |
408 | setupfs(struct p2k_mount *p2m, const char *vfsname, const char *devpath, |
409 | struct ukfs_part *part, const char *mountpath, int mntflags, |
410 | void *arg, size_t alen) |
411 | { |
412 | char partpath[UKFS_DEVICE_MAXPATHLEN]; |
413 | char partbuf[UKFS_DEVICE_MAXSTR]; |
414 | char typebuf[PUFFS_TYPELEN]; |
415 | struct puffs_usermount *pu = p2m->p2m_pu; |
416 | struct p2k_node *p2n_root; |
417 | struct ukfs *ukfs = NULL; |
418 | extern int puffs_fakecc; |
419 | int rv = -1, sverrno; |
420 | |
421 | strcpy(typebuf, "p2k|" ); |
422 | if (strcmp(vfsname, "puffs" ) == 0) { /* XXX */ |
423 | struct puffs_kargs *args = arg; |
424 | strlcat(typebuf, args->pa_typename, sizeof(typebuf)); |
425 | } else { |
426 | strlcat(typebuf, vfsname, sizeof(typebuf)); |
427 | } |
428 | |
429 | strlcpy(partpath, devpath, sizeof(partpath)); |
430 | if (ukfs_part_tostring(part, partbuf, sizeof(partbuf))) { |
431 | strlcat(partpath, partbuf, sizeof(partpath)); |
432 | } |
433 | puffs_setmntinfo(pu, partpath, typebuf); |
434 | |
435 | if (ukfs_init() == -1) |
436 | goto out; |
437 | |
438 | /* |
439 | * If we're mounting rumpfs, actually do no mount and redirect |
440 | * requests to rump fs namespace root. Strictly speaking, this |
441 | * is not correct, but I don't think anyone will notice. |
442 | * After all, we're mostly interested in things which reside |
443 | * specifically on the rootfs, namely the contents of /dev |
444 | */ |
445 | if (strcmp(vfsname, MOUNT_RUMPFS) == 0) { |
446 | if ((rv = rump_pub_vfs_getmp("/" , &p2m->p2m_mp)) != 0) { |
447 | errno = rv; |
448 | rv = -1; |
449 | goto out; |
450 | } |
451 | } else { |
452 | if (part != ukfs_part_na) |
453 | ukfs = ukfs_mount_disk(vfsname, devpath, part, |
454 | mountpath, mntflags, arg, alen); |
455 | else |
456 | ukfs = ukfs_mount(vfsname, devpath, mountpath, mntflags, |
457 | arg, alen); |
458 | if (ukfs == NULL) |
459 | goto out; |
460 | ukfs_setspecific(ukfs, p2m); |
461 | p2m->p2m_ukfs = ukfs; |
462 | p2m->p2m_mp = ukfs_getmp(ukfs); |
463 | } |
464 | if ((rv = rump_pub_vfs_root(p2m->p2m_mp, &p2m->p2m_rvp, 0)) != 0) { |
465 | errno = rv; |
466 | rv = -1; |
467 | goto out; |
468 | } |
469 | |
470 | p2m->p2m_pu = pu; |
471 | |
472 | /* |
473 | * Detect tmpfs. XXX: this is a kludge. See inactive(). |
474 | * |
475 | * In reality we'd want "does file system use anon objects |
476 | * for storage?". But since tmpfs hides the anon object from |
477 | * the public interface, we can't actually detect it sanely. |
478 | * Therefore, use this kludge. |
479 | */ |
480 | p2m->p2m_imtmpfsman = strcmp(vfsname, MOUNT_TMPFS) == 0; |
481 | |
482 | p2n_root = getp2n(p2m, p2m->p2m_rvp, true, NULL); |
483 | puffs_setfhsize(pu, 0, PUFFS_FHFLAG_PASSTHROUGH); |
484 | puffs_setstacksize(pu, PUFFS_STACKSIZE_MIN); |
485 | puffs_fakecc = 1; |
486 | puffs_set_prepost(pu, makelwp, NULL); |
487 | |
488 | if (p2m->p2m_hasdebug) { |
489 | struct timespec ts; |
490 | |
491 | signal(SIGINFO, sighand); |
492 | signal(SIGUSR1, sighand); |
493 | |
494 | ts.tv_sec = 0; |
495 | ts.tv_nsec = 1000*1000*10; /* 10ms */ |
496 | puffs_ml_setloopfn(pu, dumpmp); |
497 | puffs_ml_settimeout(pu, &ts); |
498 | } |
499 | puffs_set_errnotify(pu, p2k_errcatcher); |
500 | |
501 | puffs_setspecific(pu, p2m); |
502 | rv = puffs_mount(pu, mountpath, mntflags, p2n_root); |
503 | |
504 | out: |
505 | if (rv == -1) { |
506 | sverrno = errno; |
507 | puffs_cancel(pu, sverrno); |
508 | if (ukfs) |
509 | ukfs_release(p2m->p2m_ukfs, UKFS_RELFLAG_FORCE); |
510 | free(p2m); |
511 | errno = sverrno; |
512 | } |
513 | |
514 | return rv; |
515 | } |
516 | |
517 | int |
518 | p2k_mainloop(struct p2k_mount *p2m) |
519 | { |
520 | int rv, sverrno; |
521 | |
522 | rv = puffs_mainloop(p2m->p2m_pu); |
523 | sverrno = errno; |
524 | puffs_exit(p2m->p2m_pu, 1); |
525 | if (p2m->p2m_ukfs) |
526 | ukfs_release(p2m->p2m_ukfs, UKFS_RELFLAG_FORCE); |
527 | free(p2m); |
528 | |
529 | if (rv == -1) |
530 | errno = sverrno; |
531 | return rv; |
532 | } |
533 | |
534 | int |
535 | p2k_run_fs(const char *vfsname, const char *devpath, const char *mountpath, |
536 | int mntflags, void *arg, size_t alen, uint32_t puffs_flags) |
537 | { |
538 | struct p2k_mount *p2m; |
539 | int rv; |
540 | |
541 | p2m = p2k_init(puffs_flags); |
542 | if (p2m == NULL) |
543 | return -1; |
544 | rv = setupfs(p2m, vfsname, devpath, ukfs_part_na, mountpath, |
545 | mntflags, arg, alen); |
546 | if (rv == -1) |
547 | return rv; |
548 | return p2k_mainloop(p2m); |
549 | } |
550 | |
551 | int |
552 | p2k_run_diskfs(const char *vfsname, const char *devpath, struct ukfs_part *part, |
553 | const char *mountpath, int mntflags, void *arg, size_t alen, |
554 | uint32_t puffs_flags) |
555 | { |
556 | struct p2k_mount *p2m; |
557 | int rv; |
558 | |
559 | p2m = p2k_init(puffs_flags); |
560 | if (p2m == NULL) |
561 | return -1; |
562 | rv = setupfs(p2m, vfsname, devpath, part, mountpath, mntflags, |
563 | arg, alen); |
564 | if (rv == -1) |
565 | return rv; |
566 | return p2k_mainloop(p2m); |
567 | } |
568 | |
569 | int |
570 | p2k_setup_fs(struct p2k_mount *p2m, const char *vfsname, const char *devpath, |
571 | const char *mountpath, int mntflags, void *arg, size_t alen) |
572 | { |
573 | |
574 | return setupfs(p2m, vfsname, devpath, ukfs_part_na, mountpath, |
575 | mntflags, arg, alen); |
576 | } |
577 | |
578 | int |
579 | p2k_setup_diskfs(struct p2k_mount *p2m, const char *vfsname, |
580 | const char *devpath, struct ukfs_part *part, const char *mountpath, |
581 | int mntflags, void *arg, size_t alen) |
582 | { |
583 | |
584 | return setupfs(p2m, vfsname, devpath, part, mountpath, mntflags, |
585 | arg, alen); |
586 | } |
587 | |
588 | int |
589 | p2k_fs_statvfs(struct puffs_usermount *pu, struct statvfs *sbp) |
590 | { |
591 | struct p2k_mount *p2m = puffs_getspecific(pu); |
592 | struct mount *mp = p2m->p2m_mp; |
593 | |
594 | return rump_pub_vfs_statvfs(mp, sbp); |
595 | } |
596 | |
597 | /*ARGSUSED*/ |
598 | int |
599 | p2k_fs_unmount(struct puffs_usermount *pu, int flags) |
600 | { |
601 | struct p2k_mount *p2m = puffs_getspecific(pu); |
602 | struct ukfs *fs = p2m->p2m_ukfs; |
603 | int error = 0; |
604 | |
605 | rump_pub_vp_rele(p2m->p2m_rvp); |
606 | |
607 | if (fs) { |
608 | if (ukfs_release(fs, 0) != 0) { |
609 | struct statvfs svfsb; |
610 | |
611 | if (p2m->p2m_hasdebug |
612 | && p2k_fs_statvfs(pu, &svfsb) == 0) { |
613 | printf("\nSOFT UNMOUNT FAILED, MP INFO DUMP\n" ); |
614 | rump_pub_vfs_mount_print(svfsb.f_mntonname, 1); |
615 | } |
616 | ukfs_release(fs, UKFS_RELFLAG_FORCE); |
617 | error = 0; |
618 | } |
619 | } |
620 | p2m->p2m_ukfs = NULL; |
621 | |
622 | if (p2m->p2m_hasdebug) { |
623 | printf("-- rump kernel event counters --\n" ); |
624 | rump_printevcnts(); |
625 | printf("-- end of event counters --\n" ); |
626 | } |
627 | |
628 | return error; |
629 | } |
630 | |
631 | int |
632 | p2k_fs_sync(struct puffs_usermount *pu, int waitfor, |
633 | const struct puffs_cred *pcr) |
634 | { |
635 | struct p2k_mount *p2m = puffs_getspecific(pu); |
636 | struct mount *mp = p2m->p2m_mp; |
637 | struct kauth_cred *cred; |
638 | int rv; |
639 | |
640 | cred = cred_create(pcr); |
641 | rv = rump_pub_vfs_sync(mp, waitfor, cred); |
642 | cred_destroy(cred); |
643 | |
644 | return rv; |
645 | } |
646 | |
647 | /*ARGSUSED*/ |
648 | int |
649 | p2k_fs_fhtonode(struct puffs_usermount *pu, void *fid, size_t fidsize, |
650 | struct puffs_newinfo *pni) |
651 | { |
652 | struct p2k_mount *p2m = puffs_getspecific(pu); |
653 | struct mount *mp = p2m->p2m_mp; |
654 | struct p2k_node *p2n; |
655 | struct vnode *vp; |
656 | enum rump_vtype vtype; |
657 | voff_t vsize; |
658 | uint64_t rdev; /* XXX: allows running this on NetBSD 5.0 */ |
659 | int rv; |
660 | |
661 | rv = rump_pub_vfs_fhtovp(mp, fid, &vp); |
662 | if (rv) |
663 | return rv; |
664 | RUMP_VOP_UNLOCK(vp); |
665 | |
666 | p2n = getp2n(p2m, vp, false, NULL); |
667 | if (p2n == NULL) |
668 | return ENOMEM; |
669 | |
670 | puffs_newinfo_setcookie(pni, p2n); |
671 | rump_pub_getvninfo(vp, &vtype, &vsize, (void *)&rdev); |
672 | puffs_newinfo_setvtype(pni, (enum vtype)vtype); |
673 | puffs_newinfo_setsize(pni, vsize); |
674 | /* LINTED: yea, it'll lose accuracy, but that's life */ |
675 | puffs_newinfo_setrdev(pni, rdev); |
676 | |
677 | return 0; |
678 | } |
679 | |
680 | /*ARGSUSED*/ |
681 | int |
682 | p2k_fs_nodetofh(struct puffs_usermount *pu, puffs_cookie_t cookie, void *fid, |
683 | size_t *fidsize) |
684 | { |
685 | struct vnode *vp = OPC2VP(cookie); |
686 | |
687 | return rump_pub_vfs_vptofh(vp, fid, fidsize); |
688 | } |
689 | |
690 | int |
691 | p2k_fs_extattrctl(struct puffs_usermount *pu, int cmd, |
692 | puffs_cookie_t cookie, int flags, |
693 | int attrnamespace, const char *attrname) |
694 | { |
695 | struct p2k_mount *p2m = puffs_getspecific(pu); |
696 | struct mount *mp = p2m->p2m_mp; |
697 | struct vnode *vp; |
698 | |
699 | if (flags & PUFFS_EXTATTRCTL_HASNODE) { |
700 | vp = OPC2VP(cookie); |
701 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE | LK_RETRY); |
702 | } else { |
703 | vp = NULL; |
704 | } |
705 | |
706 | /* vfsop unlocks (but doesn't release) vnode, so we're done here */ |
707 | return rump_pub_vfs_extattrctl(mp, cmd, vp, attrnamespace, attrname); |
708 | } |
709 | |
710 | /*ARGSUSED*/ |
711 | int |
712 | p2k_node_lookup(struct puffs_usermount *pu, puffs_cookie_t opc, |
713 | struct puffs_newinfo *pni, const struct puffs_cn *pcn) |
714 | { |
715 | struct p2k_mount *p2m = puffs_getspecific(pu); |
716 | struct p2k_node *p2n_dir = opc, *p2n; |
717 | struct componentname *cn; |
718 | struct vnode *dvp = p2n_dir->p2n_vp, *vp; |
719 | enum rump_vtype vtype; |
720 | voff_t vsize; |
721 | uint64_t rdev; /* XXX: uint64_t because of stack overwrite in compat */ |
722 | int rv; |
723 | |
724 | cn = makecn(pcn); |
725 | RUMP_VOP_LOCK(dvp, LK_EXCLUSIVE); |
726 | rv = RUMP_VOP_LOOKUP(dvp, &vp, cn); |
727 | RUMP_VOP_UNLOCK(dvp); |
728 | freecn(cn); |
729 | |
730 | if (rv) { |
731 | if (rv == RUMP_EJUSTRETURN) { |
732 | rv = ENOENT; |
733 | } |
734 | return rv; |
735 | } |
736 | |
737 | p2n = getp2n(p2m, vp, false, NULL); |
738 | if (p2n == NULL) { |
739 | return ENOMEM; |
740 | } |
741 | |
742 | puffs_newinfo_setcookie(pni, p2n); |
743 | rump_pub_getvninfo(vp, &vtype, &vsize, (void *)&rdev); |
744 | puffs_newinfo_setvtype(pni, (enum vtype)vtype); |
745 | puffs_newinfo_setsize(pni, vsize); |
746 | /* LINTED: yea, it'll lose accuracy, but that's life */ |
747 | puffs_newinfo_setrdev(pni, rdev); |
748 | |
749 | return 0; |
750 | } |
751 | |
752 | #define VERS_TIMECHANGE 599000700 |
753 | static int |
754 | needcompat(void) |
755 | { |
756 | |
757 | /*LINTED*/ |
758 | return __NetBSD_Version__ < VERS_TIMECHANGE |
759 | && rump_getversion() >= VERS_TIMECHANGE; |
760 | } |
761 | |
762 | #define DOCOMPAT(va, va_compat) \ |
763 | do { \ |
764 | if (needcompat()) { \ |
765 | va_compat = rump_pub_vattr_init(); \ |
766 | rump_pub_vattr50_to_vattr(va, va_compat); \ |
767 | } else { \ |
768 | va_compat = __UNCONST(va); \ |
769 | } \ |
770 | } while (/*CONSTCOND*/0) |
771 | |
772 | #define UNDOCOMPAT(va_compat) \ |
773 | do { \ |
774 | if (needcompat()) \ |
775 | rump_pub_vattr_free(va_compat); \ |
776 | } while (/*CONSTCOND*/0) |
777 | |
778 | static int |
779 | do_makenode(struct puffs_usermount *pu, struct p2k_node *p2n_dir, |
780 | struct puffs_newinfo *pni, const struct puffs_cn *pcn, |
781 | const struct vattr *vap, char *link_target, |
782 | int (*makefn)(struct vnode *, struct vnode **, struct componentname *, |
783 | struct vattr *), |
784 | int (*symfn)(struct vnode *, struct vnode **, struct componentname *, |
785 | struct vattr *, char *)) |
786 | { |
787 | struct p2k_mount *p2m = puffs_getspecific(pu); |
788 | struct vnode *dvp = p2n_dir->p2n_vp; |
789 | struct p2k_node *p2n; |
790 | struct componentname *cn; |
791 | struct vattr *va_x; |
792 | struct vnode *vp; |
793 | int rv; |
794 | |
795 | p2n = malloc(sizeof(*p2n)); |
796 | if (p2n == NULL) |
797 | return ENOMEM; |
798 | DOCOMPAT(vap, va_x); |
799 | |
800 | cn = makecn(pcn); |
801 | RUMP_VOP_LOCK(dvp, LK_EXCLUSIVE); |
802 | rump_pub_vp_incref(dvp); |
803 | if (makefn) { |
804 | rv = makefn(dvp, &vp, cn, va_x); |
805 | } else { |
806 | rv = symfn(dvp, &vp, cn, va_x, link_target); |
807 | } |
808 | rump_pub_vp_rele(dvp); |
809 | RUMP_VOP_UNLOCK(dvp); |
810 | freecn(cn); |
811 | |
812 | if (rv == 0) { |
813 | p2n = getp2n(p2m, vp, true, p2n); |
814 | puffs_newinfo_setcookie(pni, p2n); |
815 | } else { |
816 | free(p2n); |
817 | } |
818 | |
819 | UNDOCOMPAT(va_x); |
820 | |
821 | return rv; |
822 | |
823 | } |
824 | |
825 | /*ARGSUSED*/ |
826 | int |
827 | p2k_node_create(struct puffs_usermount *pu, puffs_cookie_t opc, |
828 | struct puffs_newinfo *pni, const struct puffs_cn *pcn, |
829 | const struct vattr *vap) |
830 | { |
831 | |
832 | return do_makenode(pu, opc, pni, pcn, vap, NULL, RUMP_VOP_CREATE, NULL); |
833 | } |
834 | |
835 | /*ARGSUSED*/ |
836 | int |
837 | p2k_node_mknod(struct puffs_usermount *pu, puffs_cookie_t opc, |
838 | struct puffs_newinfo *pni, const struct puffs_cn *pcn, |
839 | const struct vattr *vap) |
840 | { |
841 | |
842 | return do_makenode(pu, opc, pni, pcn, vap, NULL, RUMP_VOP_MKNOD, NULL); |
843 | } |
844 | |
845 | /*ARGSUSED*/ |
846 | int |
847 | p2k_node_open(struct puffs_usermount *pu, puffs_cookie_t opc, int mode, |
848 | const struct puffs_cred *pcr) |
849 | { |
850 | struct vnode *vp = OPC2VP(opc); |
851 | struct kauth_cred *cred; |
852 | int rv; |
853 | |
854 | cred = cred_create(pcr); |
855 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
856 | rv = RUMP_VOP_OPEN(vp, mode, cred); |
857 | RUMP_VOP_UNLOCK(vp); |
858 | cred_destroy(cred); |
859 | |
860 | return rv; |
861 | } |
862 | |
863 | /*ARGSUSED*/ |
864 | int |
865 | p2k_node_close(struct puffs_usermount *pu, puffs_cookie_t opc, int flags, |
866 | const struct puffs_cred *pcr) |
867 | { |
868 | struct vnode *vp = OPC2VP(opc); |
869 | struct kauth_cred *cred; |
870 | |
871 | cred = cred_create(pcr); |
872 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
873 | RUMP_VOP_CLOSE(vp, flags, cred); |
874 | RUMP_VOP_UNLOCK(vp); |
875 | cred_destroy(cred); |
876 | |
877 | return 0; |
878 | } |
879 | |
880 | /*ARGSUSED*/ |
881 | int |
882 | p2k_node_access(struct puffs_usermount *pu, puffs_cookie_t opc, int mode, |
883 | const struct puffs_cred *pcr) |
884 | { |
885 | struct vnode *vp = OPC2VP(opc); |
886 | struct kauth_cred *cred; |
887 | int rv; |
888 | |
889 | cred = cred_create(pcr); |
890 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
891 | rv = RUMP_VOP_ACCESS(vp, mode, cred); |
892 | RUMP_VOP_UNLOCK(vp); |
893 | cred_destroy(cred); |
894 | |
895 | return rv; |
896 | } |
897 | |
898 | /*ARGSUSED*/ |
899 | int |
900 | p2k_node_getattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
901 | struct vattr *vap, const struct puffs_cred *pcr) |
902 | { |
903 | struct vnode *vp = OPC2VP(opc); |
904 | struct kauth_cred *cred; |
905 | struct vattr *va_x; |
906 | int rv; |
907 | |
908 | /* "deadfs" */ |
909 | if (!vp) |
910 | return 0; |
911 | |
912 | if (needcompat()) { |
913 | va_x = rump_pub_vattr_init(); |
914 | } else { |
915 | va_x = vap; |
916 | } |
917 | |
918 | cred = cred_create(pcr); |
919 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
920 | rv = RUMP_VOP_GETATTR(vp, va_x, cred); |
921 | RUMP_VOP_UNLOCK(vp); |
922 | cred_destroy(cred); |
923 | |
924 | if (needcompat()) { |
925 | rump_pub_vattr_to_vattr50(va_x, vap); |
926 | rump_pub_vattr_free(va_x); |
927 | } |
928 | |
929 | return rv; |
930 | } |
931 | |
932 | /*ARGSUSED*/ |
933 | int |
934 | p2k_node_setattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
935 | const struct vattr *vap, const struct puffs_cred *pcr) |
936 | { |
937 | struct vnode *vp = OPC2VP(opc); |
938 | struct kauth_cred *cred; |
939 | struct vattr *va_x; |
940 | int rv; |
941 | |
942 | /* "deadfs" */ |
943 | if (!vp) |
944 | return 0; |
945 | |
946 | DOCOMPAT(vap, va_x); |
947 | |
948 | cred = cred_create(pcr); |
949 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
950 | rv = RUMP_VOP_SETATTR(vp, va_x, cred); |
951 | RUMP_VOP_UNLOCK(vp); |
952 | cred_destroy(cred); |
953 | |
954 | UNDOCOMPAT(va_x); |
955 | |
956 | return rv; |
957 | } |
958 | |
959 | /*ARGSUSED*/ |
960 | int |
961 | p2k_node_fsync(struct puffs_usermount *pu, puffs_cookie_t opc, |
962 | const struct puffs_cred *pcr, int flags, off_t offlo, off_t offhi) |
963 | { |
964 | struct vnode *vp = OPC2VP(opc); |
965 | struct kauth_cred *cred; |
966 | int rv; |
967 | |
968 | /* "deadfs" */ |
969 | if (!vp) |
970 | return 0; |
971 | |
972 | cred = cred_create(pcr); |
973 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
974 | rv = RUMP_VOP_FSYNC(vp, cred, flags, offlo, offhi); |
975 | RUMP_VOP_UNLOCK(vp); |
976 | cred_destroy(cred); |
977 | |
978 | return rv; |
979 | } |
980 | |
981 | /*ARGSUSED*/ |
982 | int |
983 | p2k_node_mmap(struct puffs_usermount *pu, puffs_cookie_t opc, vm_prot_t flags, |
984 | const struct puffs_cred *pcr) |
985 | { |
986 | struct kauth_cred *cred; |
987 | int rv; |
988 | |
989 | cred = cred_create(pcr); |
990 | rv = RUMP_VOP_MMAP(OPC2VP(opc), flags, cred); |
991 | cred_destroy(cred); |
992 | |
993 | return rv; |
994 | } |
995 | |
996 | /*ARGSUSED*/ |
997 | int |
998 | p2k_node_seek(struct puffs_usermount *pu, puffs_cookie_t opc, |
999 | off_t oldoff, off_t newoff, const struct puffs_cred *pcr) |
1000 | { |
1001 | struct vnode *vp = OPC2VP(opc); |
1002 | struct kauth_cred *cred; |
1003 | int rv; |
1004 | |
1005 | cred = cred_create(pcr); |
1006 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1007 | rv = RUMP_VOP_SEEK(vp, oldoff, newoff, cred); |
1008 | RUMP_VOP_UNLOCK(vp); |
1009 | cred_destroy(cred); |
1010 | |
1011 | return rv; |
1012 | } |
1013 | |
1014 | static int |
1015 | do_nukenode(struct p2k_node *p2n_dir, struct p2k_node *p2n, |
1016 | const struct puffs_cn *pcn, |
1017 | int (*nukefn)(struct vnode *, struct vnode *, struct componentname *)) |
1018 | { |
1019 | struct vnode *dvp = p2n_dir->p2n_vp, *vp = p2n->p2n_vp; |
1020 | struct componentname *cn; |
1021 | int rv; |
1022 | |
1023 | cn = makecn(pcn); |
1024 | RUMP_VOP_LOCK(dvp, LK_EXCLUSIVE); |
1025 | rump_pub_vp_incref(dvp); |
1026 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1027 | rump_pub_vp_incref(vp); |
1028 | rv = nukefn(dvp, vp, cn); |
1029 | assert(dvp != vp); |
1030 | assert(RUMP_VOP_ISLOCKED(dvp) == LK_EXCLUSIVE); |
1031 | assert(RUMP_VOP_ISLOCKED(vp) == 0); |
1032 | rump_pub_vp_rele(dvp); |
1033 | RUMP_VOP_UNLOCK(dvp); |
1034 | freecn(cn); |
1035 | |
1036 | return rv; |
1037 | |
1038 | } |
1039 | |
1040 | /*ARGSUSED*/ |
1041 | int |
1042 | p2k_node_remove(struct puffs_usermount *pu, puffs_cookie_t opc, |
1043 | puffs_cookie_t targ, const struct puffs_cn *pcn) |
1044 | { |
1045 | |
1046 | return do_nukenode(opc, targ, pcn, RUMP_VOP_REMOVE); |
1047 | } |
1048 | |
1049 | /*ARGSUSED*/ |
1050 | int |
1051 | p2k_node_link(struct puffs_usermount *pu, puffs_cookie_t opc, |
1052 | puffs_cookie_t targ, const struct puffs_cn *pcn) |
1053 | { |
1054 | struct vnode *dvp = OPC2VP(opc); |
1055 | struct componentname *cn; |
1056 | int rv; |
1057 | |
1058 | cn = makecn(pcn); |
1059 | RUMP_VOP_LOCK(dvp, LK_EXCLUSIVE); |
1060 | rump_pub_vp_incref(dvp); |
1061 | rv = RUMP_VOP_LINK(dvp, OPC2VP(targ), cn); |
1062 | rump_pub_vp_rele(dvp); |
1063 | RUMP_VOP_UNLOCK(dvp); |
1064 | freecn(cn); |
1065 | |
1066 | return rv; |
1067 | } |
1068 | |
1069 | /*ARGSUSED*/ |
1070 | int |
1071 | p2k_node_rename(struct puffs_usermount *pu, |
1072 | puffs_cookie_t src_dir, puffs_cookie_t src, |
1073 | const struct puffs_cn *pcn_src, |
1074 | puffs_cookie_t targ_dir, puffs_cookie_t targ, |
1075 | const struct puffs_cn *pcn_targ) |
1076 | { |
1077 | struct vnode *dvp, *vp, *tdvp, *tvp = NULL; |
1078 | struct componentname *cn_src, *cn_targ; |
1079 | int rv; |
1080 | |
1081 | cn_src = makecn(pcn_src); |
1082 | cn_targ = makecn(pcn_targ); |
1083 | |
1084 | dvp = OPC2VP(src_dir); |
1085 | vp = OPC2VP(src); |
1086 | tdvp = OPC2VP(targ_dir); |
1087 | if (targ) { |
1088 | tvp = OPC2VP(targ); |
1089 | } |
1090 | |
1091 | rump_pub_vp_incref(dvp); |
1092 | rump_pub_vp_incref(vp); |
1093 | RUMP_VOP_LOCK(tdvp, LK_EXCLUSIVE); |
1094 | rump_pub_vp_incref(tdvp); |
1095 | if (tvp) { |
1096 | RUMP_VOP_LOCK(tvp, LK_EXCLUSIVE); |
1097 | rump_pub_vp_incref(tvp); |
1098 | } |
1099 | rv = RUMP_VOP_RENAME(dvp, vp, cn_src, tdvp, tvp, cn_targ); |
1100 | assert(RUMP_VOP_ISLOCKED(tdvp) == 0); |
1101 | if (tvp) { |
1102 | assert(RUMP_VOP_ISLOCKED(tvp) == 0); |
1103 | } |
1104 | freecn(cn_src); |
1105 | freecn(cn_targ); |
1106 | |
1107 | return rv; |
1108 | } |
1109 | |
1110 | /*ARGSUSED*/ |
1111 | int |
1112 | p2k_node_mkdir(struct puffs_usermount *pu, puffs_cookie_t opc, |
1113 | struct puffs_newinfo *pni, const struct puffs_cn *pcn, |
1114 | const struct vattr *vap) |
1115 | { |
1116 | |
1117 | return do_makenode(pu, opc, pni, pcn, vap, NULL, RUMP_VOP_MKDIR, NULL); |
1118 | } |
1119 | |
1120 | /*ARGSUSED*/ |
1121 | int |
1122 | p2k_node_rmdir(struct puffs_usermount *pu, puffs_cookie_t opc, |
1123 | puffs_cookie_t targ, const struct puffs_cn *pcn) |
1124 | { |
1125 | |
1126 | return do_nukenode(opc, targ, pcn, RUMP_VOP_RMDIR); |
1127 | } |
1128 | |
1129 | /*ARGSUSED*/ |
1130 | int |
1131 | p2k_node_symlink(struct puffs_usermount *pu, puffs_cookie_t opc, |
1132 | struct puffs_newinfo *pni, const struct puffs_cn *pcn, |
1133 | const struct vattr *vap, const char *link_target) |
1134 | { |
1135 | |
1136 | return do_makenode(pu, opc, pni, pcn, vap, |
1137 | __UNCONST(link_target), NULL, RUMP_VOP_SYMLINK); |
1138 | } |
1139 | |
1140 | /*ARGSUSED*/ |
1141 | int |
1142 | p2k_node_readdir(struct puffs_usermount *pu, puffs_cookie_t opc, |
1143 | struct dirent *dent, off_t *readoff, size_t *reslen, |
1144 | const struct puffs_cred *pcr, int *eofflag, |
1145 | off_t *cookies, size_t *ncookies) |
1146 | { |
1147 | struct vnode *vp = OPC2VP(opc); |
1148 | struct kauth_cred *cred; |
1149 | struct uio *uio; |
1150 | off_t *vop_cookies; |
1151 | int vop_ncookies; |
1152 | int rv; |
1153 | |
1154 | cred = cred_create(pcr); |
1155 | uio = rump_pub_uio_setup(dent, *reslen, *readoff, RUMPUIO_READ); |
1156 | RUMP_VOP_LOCK(vp, LK_SHARED); |
1157 | if (cookies) { |
1158 | rv = RUMP_VOP_READDIR(vp, uio, cred, eofflag, |
1159 | &vop_cookies, &vop_ncookies); |
1160 | memcpy(cookies, vop_cookies, vop_ncookies * sizeof(*cookies)); |
1161 | *ncookies = vop_ncookies; |
1162 | free(vop_cookies); |
1163 | } else { |
1164 | rv = RUMP_VOP_READDIR(vp, uio, cred, eofflag, NULL, NULL); |
1165 | } |
1166 | RUMP_VOP_UNLOCK(vp); |
1167 | if (rv == 0) { |
1168 | *reslen = rump_pub_uio_getresid(uio); |
1169 | *readoff = rump_pub_uio_getoff(uio); |
1170 | } |
1171 | rump_pub_uio_free(uio); |
1172 | cred_destroy(cred); |
1173 | |
1174 | return rv; |
1175 | } |
1176 | |
1177 | /*ARGSUSED*/ |
1178 | int |
1179 | p2k_node_readlink(struct puffs_usermount *pu, puffs_cookie_t opc, |
1180 | const struct puffs_cred *pcr, char *linkname, size_t *linklen) |
1181 | { |
1182 | struct vnode *vp = OPC2VP(opc); |
1183 | struct kauth_cred *cred; |
1184 | struct uio *uio; |
1185 | int rv; |
1186 | |
1187 | cred = cred_create(pcr); |
1188 | uio = rump_pub_uio_setup(linkname, *linklen, 0, RUMPUIO_READ); |
1189 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1190 | rv = RUMP_VOP_READLINK(vp, uio, cred); |
1191 | RUMP_VOP_UNLOCK(vp); |
1192 | *linklen -= rump_pub_uio_free(uio); |
1193 | cred_destroy(cred); |
1194 | |
1195 | return rv; |
1196 | } |
1197 | |
1198 | /*ARGSUSED*/ |
1199 | int |
1200 | p2k_node_read(struct puffs_usermount *pu, puffs_cookie_t opc, |
1201 | uint8_t *buf, off_t offset, size_t *resid, |
1202 | const struct puffs_cred *pcr, int ioflag) |
1203 | { |
1204 | struct vnode *vp = OPC2VP(opc); |
1205 | struct kauth_cred *cred; |
1206 | struct uio *uio; |
1207 | int rv; |
1208 | |
1209 | cred = cred_create(pcr); |
1210 | uio = rump_pub_uio_setup(buf, *resid, offset, RUMPUIO_READ); |
1211 | RUMP_VOP_LOCK(vp, LK_SHARED); |
1212 | rv = RUMP_VOP_READ(vp, uio, ioflag, cred); |
1213 | RUMP_VOP_UNLOCK(vp); |
1214 | *resid = rump_pub_uio_free(uio); |
1215 | cred_destroy(cred); |
1216 | |
1217 | return rv; |
1218 | } |
1219 | |
1220 | /*ARGSUSED*/ |
1221 | int |
1222 | p2k_node_write(struct puffs_usermount *pu, puffs_cookie_t opc, |
1223 | uint8_t *buf, off_t offset, size_t *resid, |
1224 | const struct puffs_cred *pcr, int ioflag) |
1225 | { |
1226 | struct vnode *vp = OPC2VP(opc); |
1227 | struct kauth_cred *cred; |
1228 | struct uio *uio; |
1229 | int rv; |
1230 | |
1231 | /* "deadfs" */ |
1232 | if (!vp) |
1233 | return 0; |
1234 | |
1235 | cred = cred_create(pcr); |
1236 | uio = rump_pub_uio_setup(buf, *resid, offset, RUMPUIO_WRITE); |
1237 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1238 | rv = RUMP_VOP_WRITE(vp, uio, ioflag, cred); |
1239 | RUMP_VOP_UNLOCK(vp); |
1240 | *resid = rump_pub_uio_free(uio); |
1241 | cred_destroy(cred); |
1242 | |
1243 | return rv; |
1244 | } |
1245 | |
1246 | /*ARGSUSED*/ |
1247 | int |
1248 | p2k_node_pathconf(struct puffs_usermount *pu, puffs_cookie_t opc, |
1249 | int name, register_t *retval) |
1250 | { |
1251 | struct vnode *vp = OPC2VP(opc); |
1252 | int rv; |
1253 | |
1254 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1255 | rv = RUMP_VOP_PATHCONF(vp, name, retval); |
1256 | RUMP_VOP_UNLOCK(vp); |
1257 | |
1258 | return rv; |
1259 | } |
1260 | |
1261 | /*ARGSUSED*/ |
1262 | int |
1263 | p2k_node_getextattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
1264 | int attrnamespace, const char *attrname, size_t *attrsize, |
1265 | uint8_t *attr, size_t *resid, const struct puffs_cred *pcr) |
1266 | { |
1267 | struct vnode *vp = OPC2VP(opc); |
1268 | struct kauth_cred *cred; |
1269 | struct uio *uio; |
1270 | int rv; |
1271 | |
1272 | if (attr) |
1273 | uio = rump_pub_uio_setup(attr, *resid, 0, RUMPUIO_READ); |
1274 | else |
1275 | uio = NULL; |
1276 | |
1277 | cred = cred_create(pcr); |
1278 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1279 | rv = RUMP_VOP_GETEXTATTR(vp, attrnamespace, attrname, uio, |
1280 | attrsize, cred); |
1281 | RUMP_VOP_UNLOCK(vp); |
1282 | cred_destroy(cred); |
1283 | |
1284 | if (uio) |
1285 | *resid = rump_pub_uio_free(uio); |
1286 | |
1287 | return rv; |
1288 | } |
1289 | |
1290 | /*ARGSUSED*/ |
1291 | int |
1292 | p2k_node_setextattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
1293 | int attrnamespace, const char *attrname, |
1294 | uint8_t *attr, size_t *resid, const struct puffs_cred *pcr) |
1295 | { |
1296 | struct vnode *vp = OPC2VP(opc); |
1297 | struct kauth_cred *cred; |
1298 | struct uio *uio; |
1299 | int rv; |
1300 | |
1301 | if (attr) |
1302 | uio = rump_pub_uio_setup(attr, *resid, 0, RUMPUIO_READ); |
1303 | else |
1304 | uio = NULL; |
1305 | |
1306 | cred = cred_create(pcr); |
1307 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1308 | rv = RUMP_VOP_SETEXTATTR(vp, attrnamespace, attrname, uio, cred); |
1309 | RUMP_VOP_UNLOCK(vp); |
1310 | cred_destroy(cred); |
1311 | |
1312 | if (uio) |
1313 | *resid = rump_pub_uio_free(uio); |
1314 | |
1315 | return rv; |
1316 | } |
1317 | |
1318 | /*ARGSUSED*/ |
1319 | int |
1320 | p2k_node_listextattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
1321 | int attrnamespace, size_t *attrsize, uint8_t *attrs, |
1322 | size_t *resid, int flags, const struct puffs_cred *pcr) |
1323 | { |
1324 | struct vnode *vp = OPC2VP(opc); |
1325 | struct kauth_cred *cred; |
1326 | struct uio *uio; |
1327 | int rv; |
1328 | |
1329 | if (attrs) |
1330 | uio = rump_pub_uio_setup(attrs, *resid, 0, RUMPUIO_READ); |
1331 | else |
1332 | uio = NULL; |
1333 | |
1334 | cred = cred_create(pcr); |
1335 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1336 | rv = RUMP_VOP_LISTEXTATTR(vp, attrnamespace, uio, attrsize, |
1337 | flags, cred); |
1338 | RUMP_VOP_UNLOCK(vp); |
1339 | cred_destroy(cred); |
1340 | |
1341 | if (uio) |
1342 | *resid = rump_pub_uio_free(uio); |
1343 | |
1344 | return rv; |
1345 | } |
1346 | |
1347 | /*ARGSUSED*/ |
1348 | int |
1349 | p2k_node_deleteextattr(struct puffs_usermount *pu, puffs_cookie_t opc, |
1350 | int attrnamespace, const char *attrname, const struct puffs_cred *pcr) |
1351 | { |
1352 | struct vnode *vp = OPC2VP(opc); |
1353 | struct kauth_cred *cred; |
1354 | int rv; |
1355 | |
1356 | cred = cred_create(pcr); |
1357 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1358 | rv = RUMP_VOP_DELETEEXTATTR(vp, attrnamespace, attrname, cred); |
1359 | RUMP_VOP_UNLOCK(vp); |
1360 | cred_destroy(cred); |
1361 | |
1362 | return rv; |
1363 | } |
1364 | |
1365 | /* the kernel releases its last reference here */ |
1366 | int |
1367 | p2k_node_inactive(struct puffs_usermount *pu, puffs_cookie_t opc) |
1368 | { |
1369 | struct p2k_mount *p2m = puffs_getspecific(pu); |
1370 | struct p2k_node *p2n = opc; |
1371 | struct vnode *vp = OPC2VP(opc); |
1372 | bool recycle = false; |
1373 | int rv; |
1374 | |
1375 | /* deadfs */ |
1376 | if (!vp) |
1377 | return 0; |
1378 | |
1379 | /* |
1380 | * Flush all cached vnode pages from the rump kernel -- they |
1381 | * are kept in puffs for all things that matter. However, |
1382 | * don't do this for tmpfs (vnodes are backed by an aobj), since that |
1383 | * would cause us to clear the backing storage leaving us without |
1384 | * a way to regain the data from "stable storage". |
1385 | */ |
1386 | if (!p2m->p2m_imtmpfsman) { |
1387 | rump_pub_vp_interlock(vp); |
1388 | RUMP_VOP_PUTPAGES(vp, 0, 0, |
1389 | PGO_ALLPAGES|PGO_CLEANIT|PGO_FREE); |
1390 | } |
1391 | |
1392 | /* |
1393 | * Ok, this is where we get nasty. We pretend the vnode is |
1394 | * inactive and already tell the file system that. However, |
1395 | * we are allowed to pretend it also grows a reference immediately |
1396 | * after per vget(), so this does not do harm. Cheap trick, but ... |
1397 | * |
1398 | * If the file system thinks the inode is done for, we release |
1399 | * our reference and clear all knowledge of the vnode. If, |
1400 | * however, the inode is still active, we retain our reference |
1401 | * until reclaim, since puffs might be flushing out some data |
1402 | * later. |
1403 | */ |
1404 | RUMP_VOP_LOCK(vp, LK_EXCLUSIVE); |
1405 | rv = RUMP_VOP_INACTIVE(vp, &recycle); |
1406 | RUMP_VOP_UNLOCK(vp); |
1407 | if (recycle) { |
1408 | puffs_setback(puffs_cc_getcc(pu), PUFFS_SETBACK_NOREF_N1); |
1409 | rump_pub_vp_rele(p2n->p2n_vp); |
1410 | p2n->p2n_vp = NULL; |
1411 | } |
1412 | |
1413 | return rv; |
1414 | } |
1415 | |
1416 | /*ARGSUSED*/ |
1417 | int |
1418 | p2k_node_reclaim(struct puffs_usermount *pu, puffs_croissant_t opc) |
1419 | { |
1420 | struct p2k_node *p2n = opc; |
1421 | |
1422 | if (p2n->p2n_vp) { |
1423 | rump_pub_vp_rele(p2n->p2n_vp); |
1424 | p2n->p2n_vp = NULL; |
1425 | } |
1426 | |
1427 | freep2n(p2n); |
1428 | return 0; |
1429 | } |
1430 | |