884 lines
19 KiB
C
884 lines
19 KiB
C
/* $NetBSD: p2k.c,v 1.16 2009/08/04 13:39:18 pooka Exp $ */
|
|
|
|
/*
|
|
* Copyright (c) 2007 Antti Kantee. All Rights Reserved.
|
|
*
|
|
* Development of this software was supported by Google Summer of Code.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
|
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* puffs 2k, i.e. puffs 2 kernel. Converts the puffs protocol to
|
|
* the kernel vfs protocol and vice versa.
|
|
*
|
|
* A word about reference counting: puffs in the kernel is the king of
|
|
* reference counting. We must maintain a vnode alive and kicking
|
|
* until the kernel tells us to reclaim it. Therefore we make sure
|
|
* we never accidentally lose a vnode. Before calling operations which
|
|
* decrease the refcount we always bump the refcount up to compensate.
|
|
* Come inactive, if the file system thinks that the vnode should be
|
|
* put out of its misery, it will set the recycle flag. We use this
|
|
* to tell the kernel to reclaim the vnode. Only in reclaim do we
|
|
* really nuke the last reference.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/param.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/lock.h>
|
|
#include <sys/namei.h>
|
|
#include <sys/dirent.h>
|
|
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#include <puffs.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
|
|
#include <rump/rump.h>
|
|
#include <rump/p2k.h>
|
|
#include <rump/ukfs.h>
|
|
|
|
PUFFSOP_PROTOS(p2k)
|
|
|
|
static kauth_cred_t
|
|
cred_create(const struct puffs_cred *pcr)
|
|
{
|
|
gid_t groups[NGROUPS];
|
|
uid_t uid;
|
|
gid_t gid;
|
|
short ngroups = 0;
|
|
|
|
if (puffs_cred_getuid(pcr, &uid) == -1)
|
|
uid = 0;
|
|
if (puffs_cred_getgid(pcr, &gid) == -1)
|
|
gid = 0;
|
|
puffs_cred_getgroups(pcr, groups, &ngroups);
|
|
|
|
/* LINTED: ngroups is ok */
|
|
return rump_cred_create(uid, gid, ngroups, groups);
|
|
}
|
|
|
|
static __inline void
|
|
cred_destroy(kauth_cred_t cred)
|
|
{
|
|
|
|
rump_cred_put(cred);
|
|
}
|
|
|
|
static struct componentname *
|
|
makecn(const struct puffs_cn *pcn)
|
|
{
|
|
kauth_cred_t cred;
|
|
|
|
cred = cred_create(pcn->pcn_cred);
|
|
/* LINTED: prehistoric types in first two args */
|
|
return rump_makecn(pcn->pcn_nameiop, pcn->pcn_flags, pcn->pcn_name,
|
|
pcn->pcn_namelen, cred, curlwp);
|
|
}
|
|
|
|
static __inline void
|
|
freecn(struct componentname *cnp, int flags)
|
|
{
|
|
|
|
rump_freecn(cnp, flags | RUMPCN_FREECRED);
|
|
}
|
|
|
|
static void
|
|
makelwp(struct puffs_usermount *pu)
|
|
{
|
|
pid_t pid;
|
|
lwpid_t lid;
|
|
|
|
puffs_cc_getcaller(puffs_cc_getcc(pu), &pid, &lid);
|
|
rump_setup_curlwp(pid, lid, 1);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
static void
|
|
clearlwp(struct puffs_usermount *pu)
|
|
{
|
|
|
|
/*
|
|
* XXX: For unmount we release this already in the operation.
|
|
*/
|
|
if (__predict_false(puffs_getstate(pu) != PUFFS_STATE_UNMOUNTED))
|
|
rump_clear_curlwp();
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
static void
|
|
p2k_errcatcher(struct puffs_usermount *pu, uint8_t type, int error,
|
|
const char *str, puffs_cookie_t cook)
|
|
{
|
|
|
|
fprintf(stderr, "type %d, error %d, cookie %p (%s)\n",
|
|
type, error, cook, str);
|
|
|
|
/*
|
|
* Trap all EINVAL responses to lookup. It most likely means
|
|
* that we supplied VNON/VBAD as the type. The real kernel
|
|
* doesn't panic from this either, but just handles it.
|
|
*/
|
|
if (type != PUFFS_VN_LOOKUP && error == EINVAL)
|
|
abort();
|
|
}
|
|
|
|
int
|
|
p2k_run_fs(const char *vfsname, const char *devpath, const char *mountpath,
|
|
int mntflags, void *arg, size_t alen, uint32_t puffs_flags)
|
|
{
|
|
char typebuf[PUFFS_TYPELEN];
|
|
struct puffs_ops *pops;
|
|
struct puffs_usermount *pu = NULL;
|
|
struct puffs_node *pn_root;
|
|
struct vnode *rvp;
|
|
struct ukfs *ukfs = NULL;
|
|
extern int puffs_fakecc;
|
|
int rv = -1, sverrno;
|
|
bool dodaemon;
|
|
|
|
PUFFSOP_INIT(pops);
|
|
|
|
PUFFSOP_SET(pops, p2k, fs, statvfs);
|
|
PUFFSOP_SET(pops, p2k, fs, unmount);
|
|
PUFFSOP_SET(pops, p2k, fs, sync);
|
|
PUFFSOP_SET(pops, p2k, fs, fhtonode);
|
|
PUFFSOP_SET(pops, p2k, fs, nodetofh);
|
|
|
|
PUFFSOP_SET(pops, p2k, node, lookup);
|
|
PUFFSOP_SET(pops, p2k, node, create);
|
|
PUFFSOP_SET(pops, p2k, node, mknod);
|
|
PUFFSOP_SET(pops, p2k, node, open);
|
|
PUFFSOP_SET(pops, p2k, node, close);
|
|
PUFFSOP_SET(pops, p2k, node, access);
|
|
PUFFSOP_SET(pops, p2k, node, getattr);
|
|
PUFFSOP_SET(pops, p2k, node, setattr);
|
|
#if 0
|
|
PUFFSOP_SET(pops, p2k, node, poll);
|
|
#endif
|
|
PUFFSOP_SET(pops, p2k, node, mmap);
|
|
PUFFSOP_SET(pops, p2k, node, fsync);
|
|
PUFFSOP_SET(pops, p2k, node, seek);
|
|
PUFFSOP_SET(pops, p2k, node, remove);
|
|
PUFFSOP_SET(pops, p2k, node, link);
|
|
PUFFSOP_SET(pops, p2k, node, rename);
|
|
PUFFSOP_SET(pops, p2k, node, mkdir);
|
|
PUFFSOP_SET(pops, p2k, node, rmdir);
|
|
PUFFSOP_SET(pops, p2k, node, symlink);
|
|
PUFFSOP_SET(pops, p2k, node, readdir);
|
|
PUFFSOP_SET(pops, p2k, node, readlink);
|
|
PUFFSOP_SET(pops, p2k, node, read);
|
|
PUFFSOP_SET(pops, p2k, node, write);
|
|
|
|
PUFFSOP_SET(pops, p2k, node, inactive);
|
|
PUFFSOP_SET(pops, p2k, node, reclaim);
|
|
|
|
dodaemon = true;
|
|
if (getenv("P2K_DEBUG") != NULL) {
|
|
puffs_flags |= PUFFS_FLAG_OPDUMP;
|
|
dodaemon = false;
|
|
}
|
|
if (getenv("P2K_NODETACH") != NULL) {
|
|
dodaemon = false;
|
|
}
|
|
if (getenv("P2K_NOCACHE_PAGE") != NULL) {
|
|
puffs_flags |= PUFFS_KFLAG_NOCACHE_PAGE;
|
|
}
|
|
if (getenv("P2K_NOCACHE_NAME") != NULL) {
|
|
puffs_flags |= PUFFS_KFLAG_NOCACHE_NAME;
|
|
}
|
|
if (getenv("P2K_NOCACHE") != NULL) {
|
|
puffs_flags |= PUFFS_KFLAG_NOCACHE;
|
|
}
|
|
|
|
strcpy(typebuf, "p2k|");
|
|
if (strcmp(vfsname, "puffs") == 0) { /* XXX */
|
|
struct puffs_kargs *args = arg;
|
|
strlcat(typebuf, args->pa_typename, sizeof(typebuf));
|
|
dodaemon = false;
|
|
} else {
|
|
strlcat(typebuf, vfsname, sizeof(typebuf));
|
|
}
|
|
|
|
pu = puffs_init(pops, devpath, typebuf, NULL, puffs_flags);
|
|
if (pu == NULL)
|
|
goto out;
|
|
|
|
if (dodaemon)
|
|
puffs_daemon(pu, 1, 1);
|
|
|
|
if (ukfs_init() == -1)
|
|
return -1;
|
|
ukfs = ukfs_mount(vfsname, devpath, mountpath, mntflags, arg, alen);
|
|
if (ukfs == NULL)
|
|
goto out;
|
|
|
|
rvp = ukfs_getrvp(ukfs);
|
|
pn_root = puffs_pn_new(pu, rvp);
|
|
puffs_setroot(pu, pn_root);
|
|
puffs_setfhsize(pu, 0, PUFFS_FHFLAG_PASSTHROUGH);
|
|
puffs_setstacksize(pu, PUFFS_STACKSIZE_MIN);
|
|
puffs_fakecc = 1;
|
|
|
|
puffs_set_prepost(pu, makelwp, clearlwp);
|
|
puffs_set_errnotify(pu, p2k_errcatcher);
|
|
|
|
puffs_setspecific(pu, ukfs);
|
|
if ((rv = puffs_mount(pu, mountpath, mntflags, rvp))== -1)
|
|
goto out;
|
|
rv = puffs_mainloop(pu);
|
|
puffs_exit(pu, 1);
|
|
pu = NULL;
|
|
ukfs = NULL;
|
|
|
|
out:
|
|
sverrno = errno;
|
|
if (ukfs)
|
|
ukfs_release(ukfs, UKFS_RELFLAG_FORCE);
|
|
if (pu)
|
|
puffs_cancel(pu, sverrno);
|
|
if (rv) {
|
|
errno = sverrno;
|
|
rv = -1;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
/* XXX: vn_lock() */
|
|
#define VLE(a) RUMP_VOP_LOCK(a, LK_EXCLUSIVE)
|
|
#define VLS(a) RUMP_VOP_LOCK(a, LK_SHARED)
|
|
#define VUL(a) RUMP_VOP_UNLOCK(a, 0);
|
|
#define AUL(a) assert(RUMP_VOP_ISLOCKED(a) == 0)
|
|
|
|
int
|
|
p2k_fs_statvfs(struct puffs_usermount *pu, struct statvfs *sbp)
|
|
{
|
|
struct mount *mp = ukfs_getmp(puffs_getspecific(pu));
|
|
|
|
return rump_vfs_statvfs(mp, sbp);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_fs_unmount(struct puffs_usermount *pu, int flags)
|
|
{
|
|
struct ukfs *fs = puffs_getspecific(pu);
|
|
|
|
rump_clear_curlwp(); /* XXX: ukfs uses curlwp */
|
|
ukfs_release(fs, UKFS_RELFLAG_FORCE);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
p2k_fs_sync(struct puffs_usermount *pu, int waitfor,
|
|
const struct puffs_cred *pcr)
|
|
{
|
|
struct mount *mp = ukfs_getmp(puffs_getspecific(pu));
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
rv = rump_vfs_sync(mp, waitfor, (kauth_cred_t)cred);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_fs_fhtonode(struct puffs_usermount *pu, void *fid, size_t fidsize,
|
|
struct puffs_newinfo *pni)
|
|
{
|
|
struct mount *mp = ukfs_getmp(puffs_getspecific(pu));
|
|
struct vnode *vp;
|
|
enum vtype vtype;
|
|
voff_t vsize;
|
|
uint64_t rdev; /* XXX: uint64_t because of stack overwrite in compat */
|
|
int rv;
|
|
|
|
rv = rump_vfs_fhtovp(mp, fid, &vp);
|
|
if (rv)
|
|
return rv;
|
|
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
rump_getvninfo(vp, &vtype, &vsize, (void *)&rdev);
|
|
puffs_newinfo_setvtype(pni, vtype);
|
|
puffs_newinfo_setsize(pni, vsize);
|
|
puffs_newinfo_setrdev(pni, rdev);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_fs_nodetofh(struct puffs_usermount *pu, puffs_cookie_t cookie, void *fid,
|
|
size_t *fidsize)
|
|
{
|
|
struct vnode *vp = cookie;
|
|
|
|
return rump_vfs_vptofh(vp, fid, fidsize);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_lookup(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct puffs_newinfo *pni, const struct puffs_cn *pcn)
|
|
{
|
|
struct componentname *cn;
|
|
struct vnode *vp;
|
|
enum vtype vtype;
|
|
voff_t vsize;
|
|
uint64_t rdev; /* XXX: uint64_t because of stack overwrite in compat */
|
|
int rv;
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_LOOKUP(opc, &vp, cn);
|
|
VUL(opc);
|
|
freecn(cn, RUMPCN_ISLOOKUP);
|
|
if (rv) {
|
|
if (rv == EJUSTRETURN)
|
|
rv = ENOENT;
|
|
return rv;
|
|
}
|
|
VUL(vp);
|
|
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
rump_getvninfo(vp, &vtype, &vsize, (void *)&rdev);
|
|
puffs_newinfo_setvtype(pni, vtype);
|
|
puffs_newinfo_setsize(pni, vsize);
|
|
puffs_newinfo_setrdev(pni, rdev);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#define VERS_TIMECHANGE 599000700
|
|
static int
|
|
needcompat(void)
|
|
{
|
|
|
|
/*LINTED*/
|
|
return __NetBSD_Version__ < VERS_TIMECHANGE
|
|
&& rump_getversion() >= VERS_TIMECHANGE;
|
|
}
|
|
|
|
#define DOCOMPAT(va, va_compat) \
|
|
do { \
|
|
if (needcompat()) { \
|
|
va_compat = rump_vattr_init(); \
|
|
rump_vattr50_to_vattr(va, va_compat); \
|
|
} else { \
|
|
va_compat = __UNCONST(va); \
|
|
} \
|
|
} while (/*CONSTCOND*/0)
|
|
|
|
#define UNDOCOMPAT(va_compat) \
|
|
do { \
|
|
if (needcompat()) \
|
|
rump_vattr_free(va_compat); \
|
|
} while (/*CONSTCOND*/0)
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_create(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct puffs_newinfo *pni, const struct puffs_cn *pcn,
|
|
const struct vattr *vap)
|
|
{
|
|
struct componentname *cn;
|
|
struct vattr *va_x;
|
|
struct vnode *vp;
|
|
int rv;
|
|
|
|
DOCOMPAT(vap, va_x);
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
rv = RUMP_VOP_CREATE(opc, &vp, cn, va_x);
|
|
AUL(opc);
|
|
freecn(cn, 0);
|
|
if (rv == 0) {
|
|
VUL(vp);
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
}
|
|
|
|
UNDOCOMPAT(va_x);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_mknod(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct puffs_newinfo *pni, const struct puffs_cn *pcn,
|
|
const struct vattr *vap)
|
|
{
|
|
struct componentname *cn;
|
|
struct vattr *va_x;
|
|
struct vnode *vp;
|
|
int rv;
|
|
|
|
DOCOMPAT(vap, va_x);
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
rv = RUMP_VOP_MKNOD(opc, &vp, cn, va_x);
|
|
AUL(opc);
|
|
freecn(cn, 0);
|
|
if (rv == 0) {
|
|
VUL(vp);
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
}
|
|
|
|
UNDOCOMPAT(va_x);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_open(struct puffs_usermount *pu, puffs_cookie_t opc, int mode,
|
|
const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_OPEN(opc, mode, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_close(struct puffs_usermount *pu, puffs_cookie_t opc, int flags,
|
|
const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
RUMP_VOP_CLOSE(opc, flags, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_access(struct puffs_usermount *pu, puffs_cookie_t opc, int mode,
|
|
const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_ACCESS(opc, mode, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_getattr(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct vattr *vap, const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct vattr *va_x;
|
|
int rv;
|
|
|
|
if (needcompat()) {
|
|
va_x = rump_vattr_init();
|
|
} else {
|
|
va_x = vap;
|
|
}
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_GETATTR(opc, va_x, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
if (needcompat()) {
|
|
rump_vattr_to_vattr50(va_x, vap);
|
|
rump_vattr_free(va_x);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_setattr(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
const struct vattr *vap, const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct vattr *va_x;
|
|
int rv;
|
|
|
|
DOCOMPAT(vap, va_x);
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_SETATTR(opc, va_x, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
UNDOCOMPAT(va_x);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_fsync(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
const struct puffs_cred *pcr, int flags, off_t offlo, off_t offhi)
|
|
{
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_FSYNC(opc, cred, flags, offlo, offhi);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_mmap(struct puffs_usermount *pu, puffs_cookie_t opc, vm_prot_t flags,
|
|
const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
rv = RUMP_VOP_MMAP(opc, flags, cred);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_seek(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
off_t oldoff, off_t newoff, const struct puffs_cred *pcr)
|
|
{
|
|
kauth_cred_t cred;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_SEEK(opc, oldoff, newoff, cred);
|
|
VUL(opc);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_remove(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
puffs_cookie_t targ, const struct puffs_cn *pcn)
|
|
{
|
|
struct componentname *cn;
|
|
int rv;
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
VLE(targ);
|
|
rump_vp_incref(targ);
|
|
rv = RUMP_VOP_REMOVE(opc, targ, cn);
|
|
AUL(opc);
|
|
AUL(targ);
|
|
freecn(cn, 0);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_link(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
puffs_cookie_t targ, const struct puffs_cn *pcn)
|
|
{
|
|
struct componentname *cn;
|
|
int rv;
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
rv = RUMP_VOP_LINK(opc, targ, cn);
|
|
freecn(cn, 0);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_rename(struct puffs_usermount *pu,
|
|
puffs_cookie_t src_dir, puffs_cookie_t src,
|
|
const struct puffs_cn *pcn_src,
|
|
puffs_cookie_t targ_dir, puffs_cookie_t targ,
|
|
const struct puffs_cn *pcn_targ)
|
|
{
|
|
struct componentname *cn_src, *cn_targ;
|
|
int rv;
|
|
|
|
cn_src = makecn(pcn_src);
|
|
cn_targ = makecn(pcn_targ);
|
|
rump_vp_incref(src_dir);
|
|
rump_vp_incref(src);
|
|
VLE(targ_dir);
|
|
rump_vp_incref(targ_dir);
|
|
if (targ) {
|
|
VLE(targ);
|
|
rump_vp_incref(targ);
|
|
}
|
|
rv = RUMP_VOP_RENAME(src_dir, src, cn_src, targ_dir, targ, cn_targ);
|
|
AUL(targ_dir);
|
|
if (targ)
|
|
AUL(targ);
|
|
freecn(cn_src, 0);
|
|
freecn(cn_targ, 0);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_mkdir(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct puffs_newinfo *pni, const struct puffs_cn *pcn,
|
|
const struct vattr *vap)
|
|
{
|
|
struct componentname *cn;
|
|
struct vattr *va_x;
|
|
struct vnode *vp;
|
|
int rv;
|
|
|
|
DOCOMPAT(vap, va_x);
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
rv = RUMP_VOP_MKDIR(opc, &vp, cn, va_x);
|
|
AUL(opc);
|
|
freecn(cn, 0);
|
|
if (rv == 0) {
|
|
VUL(vp);
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
}
|
|
|
|
UNDOCOMPAT(va_x);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_rmdir(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
puffs_cookie_t targ, const struct puffs_cn *pcn)
|
|
{
|
|
struct componentname *cn;
|
|
int rv;
|
|
|
|
cn = makecn(pcn);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
VLE(targ);
|
|
rump_vp_incref(targ);
|
|
rv = RUMP_VOP_RMDIR(opc, targ, cn);
|
|
AUL(targ);
|
|
AUL(opc);
|
|
freecn(cn, 0);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_symlink(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct puffs_newinfo *pni, const struct puffs_cn *pcn_src,
|
|
const struct vattr *vap, const char *link_target)
|
|
{
|
|
struct componentname *cn;
|
|
struct vattr *va_x;
|
|
struct vnode *vp;
|
|
int rv;
|
|
|
|
DOCOMPAT(vap, va_x);
|
|
|
|
cn = makecn(pcn_src);
|
|
VLE(opc);
|
|
rump_vp_incref(opc);
|
|
rv = RUMP_VOP_SYMLINK(opc, &vp, cn, va_x, __UNCONST(link_target));
|
|
AUL(opc);
|
|
freecn(cn, 0);
|
|
if (rv == 0) {
|
|
VUL(vp);
|
|
puffs_newinfo_setcookie(pni, vp);
|
|
}
|
|
|
|
UNDOCOMPAT(va_x);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_readdir(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
struct dirent *dent, off_t *readoff, size_t *reslen,
|
|
const struct puffs_cred *pcr, int *eofflag,
|
|
off_t *cookies, size_t *ncookies)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct uio *uio;
|
|
off_t *vop_cookies;
|
|
int vop_ncookies;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
uio = rump_uio_setup(dent, *reslen, *readoff, RUMPUIO_READ);
|
|
VLS(opc);
|
|
if (cookies) {
|
|
rv = RUMP_VOP_READDIR(opc, uio, cred, eofflag,
|
|
&vop_cookies, &vop_ncookies);
|
|
memcpy(cookies, vop_cookies, vop_ncookies * sizeof(*cookies));
|
|
*ncookies = vop_ncookies;
|
|
free(vop_cookies);
|
|
} else {
|
|
rv = RUMP_VOP_READDIR(opc, uio, cred, eofflag, NULL, NULL);
|
|
}
|
|
VUL(opc);
|
|
if (rv == 0) {
|
|
*reslen = rump_uio_getresid(uio);
|
|
*readoff = rump_uio_getoff(uio);
|
|
}
|
|
rump_uio_free(uio);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_readlink(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
const struct puffs_cred *pcr, char *linkname, size_t *linklen)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct uio *uio;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
uio = rump_uio_setup(linkname, *linklen, 0, RUMPUIO_READ);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_READLINK(opc, uio, cred);
|
|
VUL(opc);
|
|
*linklen -= rump_uio_free(uio);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_read(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
uint8_t *buf, off_t offset, size_t *resid,
|
|
const struct puffs_cred *pcr, int ioflag)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct uio *uio;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
uio = rump_uio_setup(buf, *resid, offset, RUMPUIO_READ);
|
|
VLS(opc);
|
|
rv = RUMP_VOP_READ(opc, uio, ioflag, cred);
|
|
VUL(opc);
|
|
*resid = rump_uio_free(uio);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_write(struct puffs_usermount *pu, puffs_cookie_t opc,
|
|
uint8_t *buf, off_t offset, size_t *resid,
|
|
const struct puffs_cred *pcr, int ioflag)
|
|
{
|
|
kauth_cred_t cred;
|
|
struct uio *uio;
|
|
int rv;
|
|
|
|
cred = cred_create(pcr);
|
|
uio = rump_uio_setup(buf, *resid, offset, RUMPUIO_WRITE);
|
|
VLE(opc);
|
|
rv = RUMP_VOP_WRITE(opc, uio, ioflag, cred);
|
|
VUL(opc);
|
|
*resid = rump_uio_free(uio);
|
|
cred_destroy(cred);
|
|
|
|
return rv;
|
|
}
|
|
|
|
int
|
|
p2k_node_inactive(struct puffs_usermount *pu, puffs_cookie_t opc)
|
|
{
|
|
struct vnode *vp = opc;
|
|
bool recycle;
|
|
int rv;
|
|
|
|
rump_vp_interlock(vp);
|
|
(void) RUMP_VOP_PUTPAGES(vp, 0, 0, PGO_ALLPAGES|PGO_CLEANIT|PGO_FREE);
|
|
VLE(vp);
|
|
rv = RUMP_VOP_INACTIVE(vp, &recycle);
|
|
if (recycle)
|
|
puffs_setback(puffs_cc_getcc(pu), PUFFS_SETBACK_NOREF_N1);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
p2k_node_reclaim(struct puffs_usermount *pu, puffs_croissant_t opc)
|
|
{
|
|
|
|
rump_vp_recycle_nokidding(opc);
|
|
return 0;
|
|
}
|