1*32cded6cSdholland /* $NetBSD: puffs_node.c,v 1.38 2018/02/08 09:05:20 dholland Exp $ */
228636f63Spooka
328636f63Spooka /*
428636f63Spooka * Copyright (c) 2005, 2006, 2007 Antti Kantee. All Rights Reserved.
528636f63Spooka *
628636f63Spooka * Development of this software was supported by the
728636f63Spooka * Google Summer of Code program, the Ulla Tuominen Foundation
828636f63Spooka * and the Finnish Cultural Foundation.
928636f63Spooka *
1028636f63Spooka * Redistribution and use in source and binary forms, with or without
1128636f63Spooka * modification, are permitted provided that the following conditions
1228636f63Spooka * are met:
1328636f63Spooka * 1. Redistributions of source code must retain the above copyright
1428636f63Spooka * notice, this list of conditions and the following disclaimer.
1528636f63Spooka * 2. Redistributions in binary form must reproduce the above copyright
1628636f63Spooka * notice, this list of conditions and the following disclaimer in the
1728636f63Spooka * documentation and/or other materials provided with the distribution.
1828636f63Spooka *
1928636f63Spooka * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
2028636f63Spooka * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
2128636f63Spooka * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
2228636f63Spooka * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
2328636f63Spooka * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2428636f63Spooka * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
2528636f63Spooka * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2628636f63Spooka * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2728636f63Spooka * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2828636f63Spooka * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2928636f63Spooka * SUCH DAMAGE.
3028636f63Spooka */
3128636f63Spooka
3228636f63Spooka #include <sys/cdefs.h>
33*32cded6cSdholland __KERNEL_RCSID(0, "$NetBSD: puffs_node.c,v 1.38 2018/02/08 09:05:20 dholland Exp $");
3428636f63Spooka
3528636f63Spooka #include <sys/param.h>
3628636f63Spooka #include <sys/hash.h>
3728636f63Spooka #include <sys/kmem.h>
3828636f63Spooka #include <sys/mount.h>
3928636f63Spooka #include <sys/namei.h>
4028636f63Spooka #include <sys/vnode.h>
4128636f63Spooka
42bd77be0cSmanu #include <uvm/uvm.h>
43bd77be0cSmanu
4428636f63Spooka #include <fs/puffs/puffs_msgif.h>
4528636f63Spooka #include <fs/puffs/puffs_sys.h>
4628636f63Spooka
4728636f63Spooka #include <miscfs/genfs/genfs_node.h>
4828636f63Spooka #include <miscfs/specfs/specdev.h>
4928636f63Spooka
5028636f63Spooka struct pool puffs_pnpool;
516e9ef395Smanu struct pool puffs_vapool;
5228636f63Spooka
5328636f63Spooka /*
54*32cded6cSdholland * Grab a vnode, initialize all the puffs-dependent stuff.
5528636f63Spooka */
56accb62aeShannken static int
puffs_getvnode1(struct mount * mp,puffs_cookie_t ck,enum vtype type,voff_t vsize,dev_t rdev,bool may_exist,struct vnode ** vpp)57accb62aeShannken puffs_getvnode1(struct mount *mp, puffs_cookie_t ck, enum vtype type,
58accb62aeShannken voff_t vsize, dev_t rdev, bool may_exist, struct vnode **vpp)
5928636f63Spooka {
6028636f63Spooka struct puffs_mount *pmp;
61703069c0Sad struct vnode *vp;
6228636f63Spooka struct puffs_node *pnode;
6328636f63Spooka int error;
6428636f63Spooka
6528636f63Spooka pmp = MPTOPUFFSMP(mp);
6628636f63Spooka
6747cf5226Spooka if (type <= VNON || type >= VBAD) {
68622412c6Spooka puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EINVAL,
69feea4545Spooka "bad node type", ck);
70accb62aeShannken return EPROTO;
7147cf5226Spooka }
7247cf5226Spooka if (vsize == VSIZENOTSET) {
73622412c6Spooka puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EINVAL,
74feea4545Spooka "VSIZENOTSET is not a valid size", ck);
75accb62aeShannken return EPROTO;
7628636f63Spooka }
7728636f63Spooka
78accb62aeShannken for (;;) {
79accb62aeShannken error = vcache_get(mp, &ck, sizeof(ck), &vp);
80accb62aeShannken if (error)
81accb62aeShannken return error;
82accb62aeShannken mutex_enter(vp->v_interlock);
83accb62aeShannken pnode = VPTOPP(vp);
84accb62aeShannken if (pnode != NULL)
85accb62aeShannken break;
86accb62aeShannken mutex_exit(vp->v_interlock);
87accb62aeShannken vrele(vp);
88e225b7bdSrmind }
89accb62aeShannken mutex_enter(&pnode->pn_mtx);
90accb62aeShannken mutex_exit(vp->v_interlock);
91accb62aeShannken
92accb62aeShannken /*
93accb62aeShannken * Release and error out if caller wants a fresh vnode.
94accb62aeShannken */
95accb62aeShannken if (vp->v_type != VNON && ! may_exist) {
96accb62aeShannken mutex_exit(&pnode->pn_mtx);
97accb62aeShannken vrele(vp);
98accb62aeShannken return EEXIST;
99accb62aeShannken }
100accb62aeShannken
101accb62aeShannken *vpp = vp;
102accb62aeShannken
103accb62aeShannken /*
104accb62aeShannken * If fully initialized were done.
105accb62aeShannken */
106accb62aeShannken if (vp->v_type != VNON) {
107accb62aeShannken mutex_exit(&pnode->pn_mtx);
108accb62aeShannken return 0;
109accb62aeShannken }
110accb62aeShannken
111accb62aeShannken /*
112accb62aeShannken * Set type and finalize the initialisation.
113accb62aeShannken */
11428636f63Spooka vp->v_type = type;
115accb62aeShannken if (type == VCHR || type == VBLK) {
11628636f63Spooka vp->v_op = puffs_specop_p;
117703069c0Sad spec_node_init(vp, rdev);
118accb62aeShannken } else if (type == VFIFO) {
11928636f63Spooka vp->v_op = puffs_fifoop_p;
120accb62aeShannken } else if (vp->v_type == VREG) {
12128636f63Spooka uvm_vnp_setsize(vp, vsize);
12228636f63Spooka }
12328636f63Spooka
12428636f63Spooka pnode->pn_serversize = vsize;
12528636f63Spooka
12628636f63Spooka DPRINTF(("new vnode at %p, pnode %p, cookie %p\n", vp,
12728636f63Spooka pnode, pnode->pn_cookie));
12828636f63Spooka
129accb62aeShannken mutex_exit(&pnode->pn_mtx);
130accb62aeShannken
13128636f63Spooka return 0;
13228636f63Spooka }
13328636f63Spooka
134accb62aeShannken int
puffs_getvnode(struct mount * mp,puffs_cookie_t ck,enum vtype type,voff_t vsize,dev_t rdev,struct vnode ** vpp)135accb62aeShannken puffs_getvnode(struct mount *mp, puffs_cookie_t ck, enum vtype type,
136accb62aeShannken voff_t vsize, dev_t rdev, struct vnode **vpp)
137accb62aeShannken {
138accb62aeShannken
139accb62aeShannken return puffs_getvnode1(mp, ck, type, vsize, rdev, true, vpp);
14028636f63Spooka }
14128636f63Spooka
14228636f63Spooka /* new node creating for creative vop ops (create, symlink, mkdir, mknod) */
14328636f63Spooka int
puffs_newnode(struct mount * mp,struct vnode * dvp,struct vnode ** vpp,puffs_cookie_t ck,struct componentname * cnp,enum vtype type,dev_t rdev)14428636f63Spooka puffs_newnode(struct mount *mp, struct vnode *dvp, struct vnode **vpp,
145feea4545Spooka puffs_cookie_t ck, struct componentname *cnp,
146feea4545Spooka enum vtype type, dev_t rdev)
14728636f63Spooka {
14828636f63Spooka struct puffs_mount *pmp = MPTOPUFFSMP(mp);
14928636f63Spooka int error;
15028636f63Spooka
15128636f63Spooka /* userspace probably has this as a NULL op */
152accb62aeShannken if (ck == NULL)
153accb62aeShannken return EOPNOTSUPP;
15428636f63Spooka
15528636f63Spooka /*
15628636f63Spooka * Check for previous node with the same designation.
15728636f63Spooka * Explicitly check the root node cookie, since it might be
15828636f63Spooka * reclaimed from the kernel when this check is made.
15928636f63Spooka */
160accb62aeShannken if (ck == pmp->pmp_root_cookie) {
161622412c6Spooka puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EEXIST,
162feea4545Spooka "cookie exists", ck);
16328636f63Spooka return EPROTO;
16428636f63Spooka }
16528636f63Spooka
166bd77be0cSmanu KASSERT(curlwp != uvm.pagedaemon_lwp);
16728636f63Spooka
168accb62aeShannken error = puffs_getvnode1(dvp->v_mount, ck, type, 0, rdev, false, vpp);
169accb62aeShannken if (error) {
170accb62aeShannken if (error == EEXIST) {
171accb62aeShannken puffs_senderr(pmp, PUFFS_ERR_MAKENODE, EEXIST,
172accb62aeShannken "cookie exists", ck);
173accb62aeShannken error = EPROTO;
174accb62aeShannken }
17528636f63Spooka return error;
176accb62aeShannken }
17728636f63Spooka
1783d50d379Smanu if (PUFFS_USE_NAMECACHE(pmp))
179accb62aeShannken cache_enter(dvp, *vpp, cnp->cn_nameptr, cnp->cn_namelen,
18035ed6905Sdholland cnp->cn_flags);
18128636f63Spooka
18208a33828Smanu puffs_updatenode(VPTOPP(dvp), PUFFS_UPDATECTIME|PUFFS_UPDATEMTIME, 0);
18308a33828Smanu
18428636f63Spooka return 0;
18528636f63Spooka }
18628636f63Spooka
18728636f63Spooka void
puffs_putvnode(struct vnode * vp)18828636f63Spooka puffs_putvnode(struct vnode *vp)
18928636f63Spooka {
19028636f63Spooka struct puffs_node *pnode;
19128636f63Spooka
19228636f63Spooka pnode = VPTOPP(vp);
19328636f63Spooka
194accb62aeShannken KASSERT(vp->v_tag == VT_PUFFS);
19528636f63Spooka
19628636f63Spooka genfs_node_destroy(vp);
19728636f63Spooka
19828636f63Spooka /*
199accb62aeShannken * To interlock with puffs_getvnode1().
20028636f63Spooka */
201accb62aeShannken mutex_enter(vp->v_interlock);
202accb62aeShannken vp->v_data = NULL;
203accb62aeShannken mutex_exit(vp->v_interlock);
204accb62aeShannken puffs_releasenode(pnode);
20528636f63Spooka }
20628636f63Spooka
20728636f63Spooka /*
20828636f63Spooka * Make sure root vnode exists and reference it. Does NOT lock.
20928636f63Spooka */
21028636f63Spooka static int
puffs_makeroot(struct puffs_mount * pmp)21128636f63Spooka puffs_makeroot(struct puffs_mount *pmp)
21228636f63Spooka {
21328636f63Spooka struct vnode *vp;
21428636f63Spooka int rv;
21528636f63Spooka
21628636f63Spooka /*
21728636f63Spooka * pmp_lock must be held if vref()'ing or vrele()'ing the
21828636f63Spooka * root vnode. the latter is controlled by puffs_inactive().
21928636f63Spooka *
22028636f63Spooka * pmp_root is set here and cleared in puffs_reclaim().
22128636f63Spooka */
22228636f63Spooka
223accb62aeShannken rv = puffs_getvnode(pmp->pmp_mp, pmp->pmp_root_cookie,
224accb62aeShannken pmp->pmp_root_vtype, pmp->pmp_root_vsize, pmp->pmp_root_rdev, &vp);
225accb62aeShannken if (rv != 0)
22628636f63Spooka return rv;
22728636f63Spooka
22828636f63Spooka mutex_enter(&pmp->pmp_lock);
229accb62aeShannken if (pmp->pmp_root == NULL)
23028636f63Spooka pmp->pmp_root = vp;
23128636f63Spooka mutex_exit(&pmp->pmp_lock);
23228636f63Spooka
23328636f63Spooka return 0;
23428636f63Spooka }
23528636f63Spooka
23628636f63Spooka /*
23728636f63Spooka * Locate the in-kernel vnode based on the cookie received given
238ca4fff9cSyamt * from userspace.
239ca4fff9cSyamt *
240ca4fff9cSyamt * returns 0 on success. otherwise returns an errno or PUFFS_NOSUCHCOOKIE.
241ca4fff9cSyamt *
242ca4fff9cSyamt * returns PUFFS_NOSUCHCOOKIE if no vnode for the cookie is found.
24328636f63Spooka */
24428636f63Spooka int
puffs_cookie2vnode(struct puffs_mount * pmp,puffs_cookie_t ck,struct vnode ** vpp)245accb62aeShannken puffs_cookie2vnode(struct puffs_mount *pmp, puffs_cookie_t ck,
246accb62aeShannken struct vnode **vpp)
24728636f63Spooka {
248accb62aeShannken int rv;
24928636f63Spooka
25028636f63Spooka /*
25128636f63Spooka * Handle root in a special manner, since we want to make sure
25228636f63Spooka * pmp_root is properly set.
25328636f63Spooka */
254feea4545Spooka if (ck == pmp->pmp_root_cookie) {
25528636f63Spooka if ((rv = puffs_makeroot(pmp)))
25628636f63Spooka return rv;
25728636f63Spooka *vpp = pmp->pmp_root;
25828636f63Spooka return 0;
25928636f63Spooka }
26028636f63Spooka
261f401fa49Shannken rv = vcache_get(PMPTOMP(pmp), &ck, sizeof(ck), vpp);
262accb62aeShannken if (rv != 0)
263accb62aeShannken return rv;
264accb62aeShannken mutex_enter((*vpp)->v_interlock);
265accb62aeShannken if ((*vpp)->v_type == VNON) {
266accb62aeShannken mutex_exit((*vpp)->v_interlock);
26717036f29Smanu /* XXX vrele() calls VOP_INACTIVE() with VNON node */
268accb62aeShannken vrele(*vpp);
269accb62aeShannken *vpp = NULL;
27028636f63Spooka return PUFFS_NOSUCHCOOKIE;
27128636f63Spooka }
272f401fa49Shannken mutex_exit((*vpp)->v_interlock);
27328636f63Spooka
27428636f63Spooka return 0;
27528636f63Spooka }
27628636f63Spooka
27728636f63Spooka void
puffs_updatenode(struct puffs_node * pn,int flags,voff_t size)27861b1e9a6Spooka puffs_updatenode(struct puffs_node *pn, int flags, voff_t size)
27928636f63Spooka {
28028636f63Spooka struct timespec ts;
28128636f63Spooka
28228636f63Spooka if (flags == 0)
28328636f63Spooka return;
28428636f63Spooka
28528636f63Spooka nanotime(&ts);
28628636f63Spooka
28728636f63Spooka if (flags & PUFFS_UPDATEATIME) {
28828636f63Spooka pn->pn_mc_atime = ts;
28928636f63Spooka pn->pn_stat |= PNODE_METACACHE_ATIME;
29028636f63Spooka }
29128636f63Spooka if (flags & PUFFS_UPDATECTIME) {
29228636f63Spooka pn->pn_mc_ctime = ts;
29328636f63Spooka pn->pn_stat |= PNODE_METACACHE_CTIME;
29428636f63Spooka }
29528636f63Spooka if (flags & PUFFS_UPDATEMTIME) {
29628636f63Spooka pn->pn_mc_mtime = ts;
29728636f63Spooka pn->pn_stat |= PNODE_METACACHE_MTIME;
29828636f63Spooka }
29928636f63Spooka if (flags & PUFFS_UPDATESIZE) {
30061b1e9a6Spooka pn->pn_mc_size = size;
30128636f63Spooka pn->pn_stat |= PNODE_METACACHE_SIZE;
30228636f63Spooka }
30328636f63Spooka }
30428636f63Spooka
30528636f63Spooka /*
30628636f63Spooka * Add reference to node.
30728636f63Spooka * mutex held on entry and return
30828636f63Spooka */
30928636f63Spooka void
puffs_referencenode(struct puffs_node * pn)31028636f63Spooka puffs_referencenode(struct puffs_node *pn)
31128636f63Spooka {
31228636f63Spooka
31328636f63Spooka KASSERT(mutex_owned(&pn->pn_mtx));
31428636f63Spooka pn->pn_refcount++;
31528636f63Spooka }
31628636f63Spooka
31728636f63Spooka /*
31828636f63Spooka * Release pnode structure which dealing with references to the
31928636f63Spooka * puffs_node instead of the vnode. Can't use vref()/vrele() on
32028636f63Spooka * the vnode there, since that causes the lovely VOP_INACTIVE(),
32128636f63Spooka * which in turn causes the lovely deadlock when called by the one
32228636f63Spooka * who is supposed to handle it.
32328636f63Spooka */
32428636f63Spooka void
puffs_releasenode(struct puffs_node * pn)32528636f63Spooka puffs_releasenode(struct puffs_node *pn)
32628636f63Spooka {
32728636f63Spooka
32828636f63Spooka mutex_enter(&pn->pn_mtx);
32928636f63Spooka if (--pn->pn_refcount == 0) {
33028636f63Spooka mutex_exit(&pn->pn_mtx);
33128636f63Spooka mutex_destroy(&pn->pn_mtx);
33296c935e3Smanu mutex_destroy(&pn->pn_sizemtx);
333c6186facSrmind seldestroy(&pn->pn_sel);
3346e9ef395Smanu if (pn->pn_va_cache != NULL)
3356e9ef395Smanu pool_put(&puffs_vapool, pn->pn_va_cache);
33628636f63Spooka pool_put(&puffs_pnpool, pn);
33728636f63Spooka } else {
33828636f63Spooka mutex_exit(&pn->pn_mtx);
33928636f63Spooka }
34028636f63Spooka }
341