NetBSD/sys/miscfs/kernfs/kernfs_subr.c

414 lines
11 KiB
C

/* $NetBSD: kernfs_subr.c,v 1.12 2007/03/11 22:07:32 ad Exp $ */
/*
* Copyright (c) 1993
* The Regents of the University of California. All rights reserved.
*
* This code is derived from software contributed to Berkeley by
* Jan-Simon Pendry.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)kernfs_subr.c 8.6 (Berkeley) 5/14/95
*/
/*
* Copyright (c) 1994 Christopher G. Demetriou. All rights reserved.
* Copyright (c) 1993 Jan-Simon Pendry
*
* This code is derived from software contributed to Berkeley by
* Jan-Simon Pendry.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)kernfs_subr.c 8.6 (Berkeley) 5/14/95
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: kernfs_subr.c,v 1.12 2007/03/11 22:07:32 ad Exp $");
#ifdef _KERNEL_OPT
#include "opt_ipsec.h"
#endif
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/time.h>
#include <sys/kernel.h>
#include <sys/proc.h>
#include <sys/vnode.h>
#include <sys/malloc.h>
#include <sys/stat.h>
#include <sys/file.h>
#include <sys/filedesc.h>
#include <sys/mount.h>
#include <miscfs/kernfs/kernfs.h>
#ifdef IPSEC
#include <sys/mbuf.h>
#include <net/route.h>
#include <netinet/in.h>
#include <netinet6/ipsec.h>
#include <netkey/keydb.h>
#include <netkey/key.h>
#endif
void kernfs_hashins(struct kernfs_node *);
void kernfs_hashrem(struct kernfs_node *);
struct vnode *kernfs_hashget(kfstype, struct mount *,
const struct kern_target *, u_int32_t);
static LIST_HEAD(kfs_hashhead, kernfs_node) *kfs_hashtbl;
static u_long kfs_ihash; /* size of hash table - 1 */
#define KFSVALUEHASH(v) ((v) & kfs_ihash)
static kmutex_t kfs_hashlock;
static kmutex_t kfs_ihash_lock;
#define ISSET(t, f) ((t) & (f))
/*
* allocate a kfsnode/vnode pair. the vnode is
* referenced, and locked.
*
* the kfs_type, kfs_value and mount point uniquely
* identify a kfsnode. the mount point is needed
* because someone might mount this filesystem
* twice.
*
* all kfsnodes are maintained on a singly-linked
* list. new nodes are only allocated when they cannot
* be found on this list. entries on the list are
* removed when the vfs reclaim entry is called.
*
* a single lock is kept for the entire list. this is
* needed because the getnewvnode() function can block
* waiting for a vnode to become free, in which case there
* may be more than one process trying to get the same
* vnode. this lock is only taken if we are going to
* call getnewvnode, since the kernel itself is single-threaded.
*
* if an entry is found on the list, then call vget() to
* take a reference. this is done because there may be
* zero references to it and so it needs to removed from
* the vnode free list.
*/
int
kernfs_allocvp(mp, vpp, kfs_type, kt, value)
struct mount *mp;
struct vnode **vpp;
kfstype kfs_type;
const struct kern_target *kt;
u_int32_t value;
{
struct kernfs_node *kfs = NULL, *kfsp;
struct vnode *vp = NULL;
int error;
long *cookie;
if ((*vpp = kernfs_hashget(kfs_type, mp, kt, value)) != NULL)
return (0);
mutex_enter(&kfs_hashlock);
if ((*vpp = kernfs_hashget(kfs_type, mp, kt, value)) != NULL) {
mutex_exit(&kfs_hashlock);
return (0);
}
if (kfs_type == KFSdevice) {
/* /kern/rootdev = look for device and obey */
/* /kern/rrootdev = look for device and obey */
dev_t *dp;
struct vnode *fvp;
#ifdef DIAGNOSTIC
if (!kt)
panic("kernfs: kt == NULL for KFSdevice");
#endif
dp = kt->kt_data;
loop:
if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) {
mutex_exit(&kfs_hashlock);
return (ENOENT);
}
vp = fvp;
if (vget(fvp, LK_EXCLUSIVE))
goto loop;
*vpp = vp;
mutex_exit(&kfs_hashlock);
return (0);
}
if ((error = getnewvnode(VT_KERNFS, mp, kernfs_vnodeop_p, &vp)) != 0) {
*vpp = NULL;
mutex_exit(&kfs_hashlock);
return (error);
}
MALLOC(kfs, void *, sizeof(struct kernfs_node), M_TEMP, M_WAITOK);
memset(kfs, 0, sizeof(*kfs));
vp->v_data = kfs;
cookie = &(VFSTOKERNFS(mp)->fileno_cookie);
again:
TAILQ_FOREACH(kfsp, &VFSTOKERNFS(mp)->nodelist, kfs_list) {
if (kfsp->kfs_cookie == *cookie) {
(*cookie) ++;
goto again;
}
if (TAILQ_NEXT(kfsp, kfs_list)) {
if (kfsp->kfs_cookie < *cookie &&
*cookie < TAILQ_NEXT(kfsp, kfs_list)->kfs_cookie)
break;
if (kfsp->kfs_cookie + 1 <
TAILQ_NEXT(kfsp, kfs_list)->kfs_cookie) {
*cookie = kfsp->kfs_cookie + 1;
break;
}
}
}
kfs->kfs_cookie = *cookie;
if (kfsp)
TAILQ_INSERT_AFTER(&VFSTOKERNFS(mp)->nodelist, kfsp, kfs,
kfs_list);
else
TAILQ_INSERT_TAIL(&VFSTOKERNFS(mp)->nodelist, kfs, kfs_list);
kfs->kfs_type = kfs_type;
kfs->kfs_vnode = vp;
kfs->kfs_fileno = KERNFS_FILENO(kt, kfs_type, kfs->kfs_cookie);
kfs->kfs_value = value;
kfs->kfs_kt = kt;
kfs->kfs_mode = kt->kt_mode;
vp->v_type = kt->kt_vtype;
if (kfs_type == KFSkern)
vp->v_flag = VROOT;
kernfs_hashins(kfs);
uvm_vnp_setsize(vp, 0);
mutex_exit(&kfs_hashlock);
*vpp = vp;
return (0);
}
int
kernfs_freevp(vp)
struct vnode *vp;
{
struct kernfs_node *kfs = VTOKERN(vp);
kernfs_hashrem(kfs);
TAILQ_REMOVE(&VFSTOKERNFS(vp->v_mount)->nodelist, kfs, kfs_list);
FREE(vp->v_data, M_TEMP);
vp->v_data = 0;
return (0);
}
/*
* Initialize kfsnode hash table.
*/
void
kernfs_hashinit()
{
mutex_init(&kfs_hashlock, MUTEX_DEFAULT, IPL_NONE);
mutex_init(&kfs_ihash_lock, MUTEX_DEFAULT, IPL_NONE);
kfs_hashtbl = hashinit(desiredvnodes / 4, HASH_LIST, M_UFSMNT,
M_WAITOK, &kfs_ihash);
}
void
kernfs_hashreinit()
{
struct kernfs_node *pp;
struct kfs_hashhead *oldhash, *hash;
u_long i, oldmask, mask, val;
hash = hashinit(desiredvnodes / 4, HASH_LIST, M_UFSMNT, M_WAITOK,
&mask);
mutex_enter(&kfs_ihash_lock);
oldhash = kfs_hashtbl;
oldmask = kfs_ihash;
kfs_hashtbl = hash;
kfs_ihash = mask;
for (i = 0; i <= oldmask; i++) {
while ((pp = LIST_FIRST(&oldhash[i])) != NULL) {
LIST_REMOVE(pp, kfs_hash);
val = KFSVALUEHASH(pp->kfs_value);
LIST_INSERT_HEAD(&hash[val], pp, kfs_hash);
}
}
mutex_exit(&kfs_ihash_lock);
hashdone(oldhash, M_UFSMNT);
}
/*
* Free kfsnode hash table.
*/
void
kernfs_hashdone()
{
hashdone(kfs_hashtbl, M_UFSMNT);
mutex_destroy(&kfs_hashlock);
mutex_destroy(&kfs_ihash_lock);
}
struct vnode *
kernfs_hashget(type, mp, kt, value)
kfstype type;
struct mount *mp;
const struct kern_target *kt;
u_int32_t value;
{
struct kfs_hashhead *ppp;
struct kernfs_node *pp;
struct vnode *vp;
loop:
mutex_enter(&kfs_ihash_lock);
ppp = &kfs_hashtbl[KFSVALUEHASH(value)];
LIST_FOREACH(pp, ppp, kfs_hash) {
vp = KERNFSTOV(pp);
if (pp->kfs_type == type && vp->v_mount == mp &&
pp->kfs_kt == kt && pp->kfs_value == value) {
simple_lock(&vp->v_interlock);
mutex_exit(&kfs_ihash_lock);
if (vget(vp, LK_EXCLUSIVE | LK_INTERLOCK))
goto loop;
return (vp);
}
}
mutex_exit(&kfs_ihash_lock);
return (NULL);
}
/*
* Insert the kfsnode into the hash table and lock it.
*/
void
kernfs_hashins(pp)
struct kernfs_node *pp;
{
struct kfs_hashhead *ppp;
/* lock the kfsnode, then put it on the appropriate hash list */
lockmgr(&pp->kfs_vnode->v_lock, LK_EXCLUSIVE, NULL);
mutex_enter(&kfs_ihash_lock);
ppp = &kfs_hashtbl[KFSVALUEHASH(pp->kfs_value)];
LIST_INSERT_HEAD(ppp, pp, kfs_hash);
mutex_exit(&kfs_ihash_lock);
}
/*
* Remove the kfsnode from the hash table.
*/
void
kernfs_hashrem(pp)
struct kernfs_node *pp;
{
mutex_enter(&kfs_ihash_lock);
LIST_REMOVE(pp, kfs_hash);
mutex_exit(&kfs_ihash_lock);
}
#ifdef IPSEC
void
kernfs_revoke_sa(sav)
struct secasvar *sav;
{
struct kernfs_node *kfs, *pnext;
struct vnode *vp;
struct kfs_hashhead *ppp;
struct mbuf *m;
ppp = &kfs_hashtbl[KFSVALUEHASH(ntohl(sav->spi))];
for (kfs = LIST_FIRST(ppp); kfs; kfs = pnext) {
vp = KERNFSTOV(kfs);
pnext = LIST_NEXT(kfs, kfs_hash);
if (vp->v_usecount > 0 && kfs->kfs_type == KFSipsecsa &&
kfs->kfs_value == ntohl(sav->spi)) {
m = key_setdumpsa_spi(sav->spi);
if (!m)
VOP_REVOKE(vp, REVOKEALL);
else
m_freem(m);
break;
}
}
}
void
kernfs_revoke_sp(sp)
struct secpolicy *sp;
{
struct kernfs_node *kfs, *pnext;
struct vnode *vp;
struct kfs_hashhead *ppp;
ppp = &kfs_hashtbl[KFSVALUEHASH(sp->id)];
for (kfs = LIST_FIRST(ppp); kfs; kfs = pnext) {
vp = KERNFSTOV(kfs);
pnext = LIST_NEXT(kfs, kfs_hash);
if (vp->v_usecount > 0 && kfs->kfs_type == KFSipsecsa &&
kfs->kfs_value == sp->id)
VOP_REVOKE(vp, REVOKEALL);
}
}
#endif