Rename all the functions and structures for the old VOP namespace API
[dragonfly.git] / sys / vfs / isofs / cd9660 / cd9660_vnops.c
... / ...
CommitLineData
1/*-
2 * Copyright (c) 1994
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This code is derived from software contributed to Berkeley
6 * by Pace Willisson (pace@blitz.com). The Rock Ridge Extension
7 * Support code is derived from software contributed to Berkeley
8 * by Atsushi Murai (amurai@spec.co.jp).
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)cd9660_vnops.c 8.19 (Berkeley) 5/27/95
39 * $FreeBSD: src/sys/isofs/cd9660/cd9660_vnops.c,v 1.62 1999/12/15 23:01:51 eivind Exp $
40 * $DragonFly: src/sys/vfs/isofs/cd9660/cd9660_vnops.c,v 1.17 2005/09/14 01:13:37 dillon Exp $
41 */
42
43#include <sys/param.h>
44#include <sys/systm.h>
45#include <sys/proc.h>
46#include <sys/namei.h>
47#include <sys/kernel.h>
48#include <sys/stat.h>
49#include <sys/buf.h>
50#include <sys/mount.h>
51#include <sys/vnode.h>
52#include <vfs/fifofs/fifo.h>
53#include <sys/malloc.h>
54#include <sys/dirent.h>
55#include <sys/unistd.h>
56#include <sys/filio.h>
57#include <sys/lockf.h>
58
59#include <vm/vm.h>
60#include <vm/vm_zone.h>
61#include <vm/vnode_pager.h>
62
63#include "iso.h"
64#include "cd9660_node.h"
65#include "iso_rrip.h"
66
67static int cd9660_access (struct vop_access_args *);
68static int cd9660_advlock (struct vop_advlock_args *);
69static int cd9660_getattr (struct vop_getattr_args *);
70static int cd9660_ioctl (struct vop_ioctl_args *);
71static int cd9660_pathconf (struct vop_pathconf_args *);
72static int cd9660_read (struct vop_read_args *);
73static int cd9660_setattr (struct vop_setattr_args *);
74struct isoreaddir;
75static int iso_uiodir (struct isoreaddir *idp, struct dirent *dp,
76 off_t off);
77static int iso_shipdir (struct isoreaddir *idp);
78static int cd9660_readdir (struct vop_readdir_args *);
79static int cd9660_readlink (struct vop_readlink_args *ap);
80static int cd9660_strategy (struct vop_strategy_args *);
81static int cd9660_print (struct vop_print_args *);
82static int cd9660_getpages (struct vop_getpages_args *);
83static int cd9660_putpages (struct vop_putpages_args *);
84
85/*
86 * Setattr call. Only allowed for block and character special devices.
87 *
88 * cd9660_setattr(struct vnodeop_desc *a_desc, struct vnode *a_vp,
89 * struct vattr *a_vap, struct ucred *a_cred, struct proc *a_p)
90 */
91int
92cd9660_setattr(struct vop_setattr_args *ap)
93{
94 struct vnode *vp = ap->a_vp;
95 struct vattr *vap = ap->a_vap;
96
97 if (vap->va_flags != (u_long)VNOVAL || vap->va_uid != (uid_t)VNOVAL ||
98 vap->va_gid != (gid_t)VNOVAL || vap->va_atime.tv_sec != VNOVAL ||
99 vap->va_mtime.tv_sec != VNOVAL || vap->va_mode != (mode_t)VNOVAL)
100 return (EROFS);
101 if (vap->va_size != (u_quad_t)VNOVAL) {
102 switch (vp->v_type) {
103 case VDIR:
104 return (EISDIR);
105 case VLNK:
106 case VREG:
107 return (EROFS);
108 case VCHR:
109 case VBLK:
110 case VSOCK:
111 case VFIFO:
112 case VNON:
113 case VBAD:
114 return (0);
115 }
116 }
117 return (0);
118}
119
120/*
121 * Check mode permission on inode pointer. Mode is READ, WRITE or EXEC.
122 * The mode is shifted to select the owner/group/other fields. The
123 * super user is granted all permissions.
124 *
125 * cd9660_access(struct vnode *a_vp, int a_mode, struct ucred *a_cred,
126 * struct proc *a_p)
127 */
128/* ARGSUSED */
129static int
130cd9660_access(struct vop_access_args *ap)
131{
132 struct vnode *vp = ap->a_vp;
133 struct iso_node *ip = VTOI(vp);
134 struct ucred *cred = ap->a_cred;
135 mode_t mask, mode = ap->a_mode;
136 gid_t *gp;
137 int i;
138
139 /*
140 * Disallow write attempts unless the file is a socket,
141 * fifo, or a block or character device resident on the
142 * file system.
143 */
144 if (mode & VWRITE) {
145 switch (vp->v_type) {
146 case VDIR:
147 case VLNK:
148 case VREG:
149 return (EROFS);
150 /* NOT REACHED */
151 default:
152 break;
153 }
154 }
155
156 /* User id 0 always gets access. */
157 if (cred->cr_uid == 0)
158 return (0);
159
160 mask = 0;
161
162 /* Otherwise, check the owner. */
163 if (cred->cr_uid == ip->inode.iso_uid) {
164 if (mode & VEXEC)
165 mask |= S_IXUSR;
166 if (mode & VREAD)
167 mask |= S_IRUSR;
168 if (mode & VWRITE)
169 mask |= S_IWUSR;
170 return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
171 }
172
173 /* Otherwise, check the groups. */
174 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
175 if (ip->inode.iso_gid == *gp) {
176 if (mode & VEXEC)
177 mask |= S_IXGRP;
178 if (mode & VREAD)
179 mask |= S_IRGRP;
180 if (mode & VWRITE)
181 mask |= S_IWGRP;
182 return ((ip->inode.iso_mode & mask) == mask ?
183 0 : EACCES);
184 }
185
186 /* Otherwise, check everyone else. */
187 if (mode & VEXEC)
188 mask |= S_IXOTH;
189 if (mode & VREAD)
190 mask |= S_IROTH;
191 if (mode & VWRITE)
192 mask |= S_IWOTH;
193 return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
194}
195
196/*
197 * cd9660_getattr(struct vnode *a_vp, struct vattr *a_vap, struct thread *a_td)
198 */
199static int
200cd9660_getattr(struct vop_getattr_args *ap)
201{
202 struct vnode *vp = ap->a_vp;
203 struct vattr *vap = ap->a_vap;
204 struct iso_node *ip = VTOI(vp);
205
206 vap->va_fsid = dev2udev(ip->i_dev);
207 vap->va_fileid = ip->i_number;
208
209 vap->va_mode = ip->inode.iso_mode;
210 vap->va_nlink = ip->inode.iso_links;
211 vap->va_uid = ip->inode.iso_uid;
212 vap->va_gid = ip->inode.iso_gid;
213 vap->va_atime = ip->inode.iso_atime;
214 vap->va_mtime = ip->inode.iso_mtime;
215 vap->va_ctime = ip->inode.iso_ctime;
216 vap->va_rdev = ip->inode.iso_rdev;
217
218 vap->va_size = (u_quad_t)(unsigned long)ip->i_size;
219 if (ip->i_size == 0 && (vap->va_mode & S_IFMT) == S_IFLNK) {
220 struct vop_readlink_args rdlnk;
221 struct iovec aiov;
222 struct uio auio;
223 char *cp;
224
225 MALLOC(cp, char *, MAXPATHLEN, M_TEMP, M_WAITOK);
226 aiov.iov_base = cp;
227 aiov.iov_len = MAXPATHLEN;
228 auio.uio_iov = &aiov;
229 auio.uio_iovcnt = 1;
230 auio.uio_offset = 0;
231 auio.uio_rw = UIO_READ;
232 auio.uio_segflg = UIO_SYSSPACE;
233 auio.uio_td = ap->a_td;
234 auio.uio_resid = MAXPATHLEN;
235 rdlnk.a_uio = &auio;
236 rdlnk.a_vp = ap->a_vp;
237 rdlnk.a_cred = proc0.p_ucred; /* use root cred */
238 if (cd9660_readlink(&rdlnk) == 0)
239 vap->va_size = MAXPATHLEN - auio.uio_resid;
240 FREE(cp, M_TEMP);
241 }
242 vap->va_flags = 0;
243 vap->va_gen = 1;
244 vap->va_blocksize = ip->i_mnt->logical_block_size;
245 vap->va_bytes = (u_quad_t) ip->i_size;
246 vap->va_type = vp->v_type;
247 vap->va_filerev = 0;
248 return (0);
249}
250
251/*
252 * Vnode op for ioctl.
253 *
254 * cd9660_ioctl(struct vnode *a_vp, int a_command, caddr_t a_data,
255 * int a_fflag, struct ucred *a_cred, struct proc *a_p)
256 */
257static int
258cd9660_ioctl(struct vop_ioctl_args *ap)
259{
260 struct vnode *vp = ap->a_vp;
261 struct iso_node *ip = VTOI(vp);
262
263 switch (ap->a_command) {
264
265 case FIOGETLBA:
266 *(int *)(ap->a_data) = ip->iso_start;
267 return 0;
268 default:
269 return (ENOTTY);
270 }
271}
272
273/*
274 * Vnode op for reading.
275 *
276 * cd9660_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
277 * struct ucred *a_cred)
278 */
279static int
280cd9660_read(struct vop_read_args *ap)
281{
282 struct vnode *vp = ap->a_vp;
283 struct uio *uio = ap->a_uio;
284 struct iso_node *ip = VTOI(vp);
285 struct iso_mnt *imp;
286 struct buf *bp;
287 daddr_t lbn, rablock;
288 off_t diff;
289 int rasize, error = 0;
290 int seqcount;
291 long size, n, on;
292
293 seqcount = ap->a_ioflag >> 16;
294
295 if (uio->uio_resid == 0)
296 return (0);
297 if (uio->uio_offset < 0)
298 return (EINVAL);
299 ip->i_flag |= IN_ACCESS;
300 imp = ip->i_mnt;
301 do {
302 lbn = lblkno(imp, uio->uio_offset);
303 on = blkoff(imp, uio->uio_offset);
304 n = min((u_int)(imp->logical_block_size - on),
305 uio->uio_resid);
306 diff = (off_t)ip->i_size - uio->uio_offset;
307 if (diff <= 0)
308 return (0);
309 if (diff < n)
310 n = diff;
311 size = blksize(imp, ip, lbn);
312 rablock = lbn + 1;
313 if ((vp->v_mount->mnt_flag & MNT_NOCLUSTERR) == 0) {
314 if (lblktosize(imp, rablock) < ip->i_size)
315 error = cluster_read(vp, (off_t)ip->i_size,
316 lbn, size, uio->uio_resid,
317 (ap->a_ioflag >> 16), &bp);
318 else
319 error = bread(vp, lbn, size, &bp);
320 } else {
321 if (seqcount > 1 &&
322 lblktosize(imp, rablock) < ip->i_size) {
323 rasize = blksize(imp, ip, rablock);
324 error = breadn(vp, lbn, size, &rablock,
325 &rasize, 1, &bp);
326 } else
327 error = bread(vp, lbn, size, &bp);
328 }
329 n = min(n, size - bp->b_resid);
330 if (error) {
331 brelse(bp);
332 return (error);
333 }
334
335 error = uiomove(bp->b_data + on, (int)n, uio);
336 brelse(bp);
337 } while (error == 0 && uio->uio_resid > 0 && n != 0);
338 return (error);
339}
340
341/* struct dirent + enough space for the maximum supported size */
342struct iso_dirent {
343 struct dirent de;
344 char de_name[_DIRENT_RECLEN(NAME_MAX) - sizeof(struct dirent)];
345};
346
347/*
348 * Structure for reading directories
349 */
350struct isoreaddir {
351 struct iso_dirent saveent;
352 struct iso_dirent assocent;
353 struct iso_dirent current;
354 off_t saveoff;
355 off_t assocoff;
356 off_t curroff;
357 struct uio *uio;
358 off_t uio_off;
359 int eofflag;
360 u_long *cookies;
361 int ncookies;
362};
363
364int
365iso_uiodir(struct isoreaddir *idp, struct dirent *dp, off_t off)
366{
367 int error;
368
369 dp->d_name[dp->d_namlen] = 0;
370
371 if (idp->uio->uio_resid < _DIRENT_DIRSIZ(dp)) {
372 idp->eofflag = 0;
373 return (-1);
374 }
375
376 if (idp->cookies) {
377 if (idp->ncookies <= 0) {
378 idp->eofflag = 0;
379 return (-1);
380 }
381
382 *idp->cookies++ = off;
383 --idp->ncookies;
384 }
385
386 if ((error = uiomove((caddr_t) dp,_DIRENT_DIRSIZ(dp),idp->uio)) != 0)
387 return (error);
388 idp->uio_off = off;
389 return (0);
390}
391
392int
393iso_shipdir(struct isoreaddir *idp)
394{
395 struct dirent *dp;
396 int cl, sl, assoc;
397 int error;
398 char *cname, *sname;
399
400 cl = idp->current.de.d_namlen;
401 cname = idp->current.de.d_name;
402assoc = (cl > 1) && (*cname == ASSOCCHAR);
403 if (assoc) {
404 cl--;
405 cname++;
406 }
407
408 dp = &idp->saveent.de;
409 sname = dp->d_name;
410 if (!(sl = dp->d_namlen)) {
411 dp = &idp->assocent.de;
412 sname = dp->d_name + 1;
413 sl = dp->d_namlen - 1;
414 }
415 if (sl > 0) {
416 if (sl != cl
417 || bcmp(sname,cname,sl)) {
418 if (idp->assocent.de.d_namlen) {
419 if ((error = iso_uiodir(idp,&idp->assocent.de,idp->assocoff)) != 0)
420 return (error);
421 idp->assocent.de.d_namlen = 0;
422 }
423 if (idp->saveent.de.d_namlen) {
424 if ((error = iso_uiodir(idp,&idp->saveent.de,idp->saveoff)) != 0)
425 return (error);
426 idp->saveent.de.d_namlen = 0;
427 }
428 }
429 }
430 if (assoc) {
431 idp->assocoff = idp->curroff;
432 bcopy(&idp->current,&idp->assocent,_DIRENT_DIRSIZ(&idp->current.de));
433 } else {
434 idp->saveoff = idp->curroff;
435 bcopy(&idp->current,&idp->saveent,_DIRENT_DIRSIZ(&idp->current.de));
436 }
437 return (0);
438}
439
440/*
441 * Vnode op for readdir
442 *
443 * cd9660_readdir(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred,
444 * int *a_eofflag, int *a_ncookies, u_long *a_cookies)
445 */
446static int
447cd9660_readdir(struct vop_readdir_args *ap)
448{
449 struct uio *uio = ap->a_uio;
450 struct isoreaddir *idp;
451 struct vnode *vdp = ap->a_vp;
452 struct iso_node *dp;
453 struct iso_mnt *imp;
454 struct buf *bp = NULL;
455 struct iso_directory_record *ep;
456 int entryoffsetinblock;
457 doff_t endsearch;
458 u_long bmask;
459 int error = 0;
460 int reclen;
461 u_short namelen;
462 int ncookies = 0;
463 u_long *cookies = NULL;
464
465 dp = VTOI(vdp);
466 imp = dp->i_mnt;
467 bmask = imp->im_bmask;
468
469 MALLOC(idp, struct isoreaddir *, sizeof(*idp), M_TEMP, M_WAITOK);
470 idp->saveent.de.d_namlen = idp->assocent.de.d_namlen = 0;
471 /*
472 * XXX
473 * Is it worth trying to figure out the type?
474 */
475 idp->saveent.de.d_type = DT_UNKNOWN;
476 idp->assocent.de.d_type = DT_UNKNOWN;
477 idp->current.de.d_type = DT_UNKNOWN;
478 idp->uio = uio;
479 if (ap->a_ncookies == NULL) {
480 idp->cookies = NULL;
481 } else {
482 /*
483 * Guess the number of cookies needed.
484 */
485 ncookies = uio->uio_resid / 16;
486 MALLOC(cookies, u_long *, ncookies * sizeof(u_int), M_TEMP,
487 M_WAITOK);
488 idp->cookies = cookies;
489 idp->ncookies = ncookies;
490 }
491 idp->eofflag = 1;
492 idp->curroff = uio->uio_offset;
493
494 if ((entryoffsetinblock = idp->curroff & bmask) &&
495 (error = cd9660_blkatoff(vdp, (off_t)idp->curroff, NULL, &bp))) {
496 FREE(idp, M_TEMP);
497 return (error);
498 }
499 endsearch = dp->i_size;
500
501 while (idp->curroff < endsearch) {
502 /*
503 * If offset is on a block boundary,
504 * read the next directory block.
505 * Release previous if it exists.
506 */
507 if ((idp->curroff & bmask) == 0) {
508 if (bp != NULL)
509 brelse(bp);
510 if ((error =
511 cd9660_blkatoff(vdp, (off_t)idp->curroff, NULL, &bp)) != 0)
512 break;
513 entryoffsetinblock = 0;
514 }
515 /*
516 * Get pointer to next entry.
517 */
518 ep = (struct iso_directory_record *)
519 ((char *)bp->b_data + entryoffsetinblock);
520
521 reclen = isonum_711(ep->length);
522 if (reclen == 0) {
523 /* skip to next block, if any */
524 idp->curroff =
525 (idp->curroff & ~bmask) + imp->logical_block_size;
526 continue;
527 }
528
529 if (reclen < ISO_DIRECTORY_RECORD_SIZE) {
530 error = EINVAL;
531 /* illegal entry, stop */
532 break;
533 }
534
535 if (entryoffsetinblock + reclen > imp->logical_block_size) {
536 error = EINVAL;
537 /* illegal directory, so stop looking */
538 break;
539 }
540
541 idp->current.de.d_namlen = isonum_711(ep->name_len);
542
543 if (reclen < ISO_DIRECTORY_RECORD_SIZE + idp->current.de.d_namlen) {
544 error = EINVAL;
545 /* illegal entry, stop */
546 break;
547 }
548
549 if (isonum_711(ep->flags)&2)
550 idp->current.de.d_ino = isodirino(ep, imp);
551 else
552 idp->current.de.d_ino = dbtob(bp->b_blkno) +
553 entryoffsetinblock;
554
555 idp->curroff += reclen;
556
557 switch (imp->iso_ftype) {
558 case ISO_FTYPE_RRIP:
559 {
560 ino_t cur_fileno = idp->current.de.d_ino;
561 cd9660_rrip_getname(ep,idp->current.de.d_name, &namelen,
562 &cur_fileno,imp);
563 idp->current.de.d_ino = cur_fileno;
564 idp->current.de.d_namlen = namelen;
565 if (idp->current.de.d_namlen)
566 error = iso_uiodir(idp,&idp->current.de,idp->curroff);
567 break;
568 }
569 default: /* ISO_FTYPE_DEFAULT || ISO_FTYPE_9660 || ISO_FTYPE_HIGH_SIERRA*/
570 strcpy(idp->current.de.d_name,"..");
571 if (idp->current.de.d_namlen == 1 && ep->name[0] == 0) {
572 idp->current.de.d_namlen = 1;
573 error = iso_uiodir(idp,&idp->current.de,idp->curroff);
574 } else if (idp->current.de.d_namlen == 1 && ep->name[0] == 1) {
575 idp->current.de.d_namlen = 2;
576 error = iso_uiodir(idp,&idp->current.de,idp->curroff);
577 } else {
578 isofntrans(ep->name,idp->current.de.d_namlen,
579 idp->current.de.d_name, &namelen,
580 imp->iso_ftype == ISO_FTYPE_9660,
581 isonum_711(ep->flags)&4,
582 imp->joliet_level);
583 idp->current.de.d_namlen = namelen;
584 if (imp->iso_ftype == ISO_FTYPE_DEFAULT)
585 error = iso_shipdir(idp);
586 else
587 error = iso_uiodir(idp,&idp->current.de,idp->curroff);
588 }
589 }
590 if (error)
591 break;
592
593 entryoffsetinblock += reclen;
594 }
595
596 if (!error && imp->iso_ftype == ISO_FTYPE_DEFAULT) {
597 idp->current.de.d_namlen = 0;
598 error = iso_shipdir(idp);
599 }
600 if (error < 0)
601 error = 0;
602
603 if (ap->a_ncookies != NULL) {
604 if (error)
605 free(cookies, M_TEMP);
606 else {
607 /*
608 * Work out the number of cookies actually used.
609 */
610 *ap->a_ncookies = ncookies - idp->ncookies;
611 *ap->a_cookies = cookies;
612 }
613 }
614
615 if (bp)
616 brelse (bp);
617
618 uio->uio_offset = idp->uio_off;
619 *ap->a_eofflag = idp->eofflag;
620
621 FREE(idp, M_TEMP);
622
623 return (error);
624}
625
626/*
627 * Return target name of a symbolic link
628 * Shouldn't we get the parent vnode and read the data from there?
629 * This could eventually result in deadlocks in cd9660_lookup.
630 * But otherwise the block read here is in the block buffer two times.
631 */
632typedef struct iso_directory_record ISODIR;
633typedef struct iso_node ISONODE;
634typedef struct iso_mnt ISOMNT;
635/*
636 * cd9660_readlink(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred)
637 */
638static int
639cd9660_readlink(struct vop_readlink_args *ap)
640{
641 ISONODE *ip;
642 ISODIR *dirp;
643 ISOMNT *imp;
644 struct buf *bp;
645 struct uio *uio;
646 u_short symlen;
647 int error;
648 char *symname;
649
650 ip = VTOI(ap->a_vp);
651 imp = ip->i_mnt;
652 uio = ap->a_uio;
653
654 if (imp->iso_ftype != ISO_FTYPE_RRIP)
655 return (EINVAL);
656
657 /*
658 * Get parents directory record block that this inode included.
659 */
660 error = bread(imp->im_devvp,
661 (ip->i_number >> imp->im_bshift) <<
662 (imp->im_bshift - DEV_BSHIFT),
663 imp->logical_block_size, &bp);
664 if (error) {
665 brelse(bp);
666 return (EINVAL);
667 }
668
669 /*
670 * Setup the directory pointer for this inode
671 */
672 dirp = (ISODIR *)(bp->b_data + (ip->i_number & imp->im_bmask));
673
674 /*
675 * Just make sure, we have a right one....
676 * 1: Check not cross boundary on block
677 */
678 if ((ip->i_number & imp->im_bmask) + isonum_711(dirp->length)
679 > (unsigned)imp->logical_block_size) {
680 brelse(bp);
681 return (EINVAL);
682 }
683
684 /*
685 * Now get a buffer
686 * Abuse a namei buffer for now.
687 */
688 if (uio->uio_segflg == UIO_SYSSPACE)
689 symname = uio->uio_iov->iov_base;
690 else
691 symname = zalloc(namei_zone);
692
693 /*
694 * Ok, we just gathering a symbolic name in SL record.
695 */
696 if (cd9660_rrip_getsymname(dirp, symname, &symlen, imp) == 0) {
697 if (uio->uio_segflg != UIO_SYSSPACE)
698 zfree(namei_zone, symname);
699 brelse(bp);
700 return (EINVAL);
701 }
702 /*
703 * Don't forget before you leave from home ;-)
704 */
705 brelse(bp);
706
707 /*
708 * return with the symbolic name to caller's.
709 */
710 if (uio->uio_segflg != UIO_SYSSPACE) {
711 error = uiomove(symname, symlen, uio);
712 zfree(namei_zone, symname);
713 return (error);
714 }
715 uio->uio_resid -= symlen;
716 uio->uio_iov->iov_base += symlen;
717 uio->uio_iov->iov_len -= symlen;
718 return (0);
719}
720
721/*
722 * Calculate the logical to physical mapping if not done already,
723 * then call the device strategy routine.
724 *
725 * cd9660_strategy(struct buf *a_vp, struct buf *a_bp)
726 */
727static int
728cd9660_strategy(struct vop_strategy_args *ap)
729{
730 struct buf *bp = ap->a_bp;
731 struct vnode *vp = bp->b_vp;
732 struct iso_node *ip;
733 int error;
734
735 ip = VTOI(vp);
736 if (vp->v_type == VBLK || vp->v_type == VCHR)
737 panic("cd9660_strategy: spec");
738 if (bp->b_blkno == bp->b_lblkno) {
739 if ((error =
740 VOP_BMAP(vp, bp->b_lblkno, NULL, &bp->b_blkno, NULL, NULL))) {
741 bp->b_error = error;
742 bp->b_flags |= B_ERROR;
743 biodone(bp);
744 return (error);
745 }
746 if ((long)bp->b_blkno == -1)
747 clrbuf(bp);
748 }
749 if ((long)bp->b_blkno == -1) {
750 biodone(bp);
751 return (0);
752 }
753 vp = ip->i_devvp;
754 bp->b_dev = vp->v_rdev;
755 VOP_STRATEGY(vp, bp);
756 return (0);
757}
758
759/*
760 * Print out the contents of an inode.
761 *
762 * cd9660_print(struct vnode *a_vp)
763 */
764static int
765cd9660_print(struct vop_print_args *ap)
766{
767 printf("tag VT_ISOFS, isofs vnode\n");
768 return (0);
769}
770
771/*
772 * Return POSIX pathconf information applicable to cd9660 filesystems.
773 *
774 * cd9660_pathconf(struct vnode *a_vp, int a_name, register_t *a_retval)
775 */
776static int
777cd9660_pathconf(struct vop_pathconf_args *ap)
778{
779 switch (ap->a_name) {
780 case _PC_LINK_MAX:
781 *ap->a_retval = 1;
782 return (0);
783 case _PC_NAME_MAX:
784 if (VTOI(ap->a_vp)->i_mnt->iso_ftype == ISO_FTYPE_RRIP)
785 *ap->a_retval = NAME_MAX;
786 else
787 *ap->a_retval = 37;
788 return (0);
789 case _PC_PATH_MAX:
790 *ap->a_retval = PATH_MAX;
791 return (0);
792 case _PC_PIPE_BUF:
793 *ap->a_retval = PIPE_BUF;
794 return (0);
795 case _PC_CHOWN_RESTRICTED:
796 *ap->a_retval = 1;
797 return (0);
798 case _PC_NO_TRUNC:
799 *ap->a_retval = 1;
800 return (0);
801 default:
802 return (EINVAL);
803 }
804 /* NOTREACHED */
805}
806
807/*
808 * get page routine
809 *
810 * XXX By default, wimp out... note that a_offset is ignored (and always
811 * XXX has been).
812 */
813int
814cd9660_getpages(struct vop_getpages_args *ap)
815{
816 return vnode_pager_generic_getpages(ap->a_vp, ap->a_m, ap->a_count,
817 ap->a_reqpage);
818}
819
820/*
821 * put page routine
822 *
823 * XXX By default, wimp out... note that a_offset is ignored (and always
824 * XXX has been).
825 */
826int
827cd9660_putpages(struct vop_putpages_args *ap)
828{
829 return vnode_pager_generic_putpages(ap->a_vp, ap->a_m, ap->a_count,
830 ap->a_sync, ap->a_rtvals);
831}
832
833/*
834 * Advisory lock support
835 */
836static int
837cd9660_advlock(ap)
838 struct vop_advlock_args /* {
839 struct vnode *a_vp;
840 caddr_t a_id;
841 int a_op;
842 struct flock *a_fl;
843 int a_flags;
844 } */ *ap;
845{
846 struct iso_node *ip = VTOI(ap->a_vp);
847 return (lf_advlock(ap, &(ip->i_lockf), ip->i_size));
848}
849
850
851/*
852 * Global vfs data structures for cd9660
853 */
854struct vnodeopv_entry_desc cd9660_vnodeop_entries[] = {
855 { &vop_default_desc, (vnodeopv_entry_t) vop_defaultop },
856 { &vop_access_desc, (vnodeopv_entry_t) cd9660_access },
857 { &vop_advlock_desc, (vnodeopv_entry_t) cd9660_advlock },
858 { &vop_bmap_desc, (vnodeopv_entry_t) cd9660_bmap },
859 { &vop_old_lookup_desc, (vnodeopv_entry_t) cd9660_lookup },
860 { &vop_getattr_desc, (vnodeopv_entry_t) cd9660_getattr },
861 { &vop_inactive_desc, (vnodeopv_entry_t) cd9660_inactive },
862 { &vop_ioctl_desc, (vnodeopv_entry_t) cd9660_ioctl },
863 { &vop_islocked_desc, (vnodeopv_entry_t) vop_stdislocked },
864 { &vop_lock_desc, (vnodeopv_entry_t) vop_stdlock },
865 { &vop_pathconf_desc, (vnodeopv_entry_t) cd9660_pathconf },
866 { &vop_print_desc, (vnodeopv_entry_t) cd9660_print },
867 { &vop_read_desc, (vnodeopv_entry_t) cd9660_read },
868 { &vop_readdir_desc, (vnodeopv_entry_t) cd9660_readdir },
869 { &vop_readlink_desc, (vnodeopv_entry_t) cd9660_readlink },
870 { &vop_reclaim_desc, (vnodeopv_entry_t) cd9660_reclaim },
871 { &vop_setattr_desc, (vnodeopv_entry_t) cd9660_setattr },
872 { &vop_strategy_desc, (vnodeopv_entry_t) cd9660_strategy },
873 { &vop_unlock_desc, (vnodeopv_entry_t) vop_stdunlock },
874 { &vop_getpages_desc, (vnodeopv_entry_t) cd9660_getpages },
875 { &vop_putpages_desc, (vnodeopv_entry_t) cd9660_putpages },
876 { NULL, NULL }
877};
878
879/*
880 * Special device vnode ops
881 */
882struct vnodeopv_entry_desc cd9660_specop_entries[] = {
883 { &vop_default_desc, (vnodeopv_entry_t) spec_vnoperate },
884 { &vop_access_desc, (vnodeopv_entry_t) cd9660_access },
885 { &vop_getattr_desc, (vnodeopv_entry_t) cd9660_getattr },
886 { &vop_inactive_desc, (vnodeopv_entry_t) cd9660_inactive },
887 { &vop_islocked_desc, (vnodeopv_entry_t) vop_stdislocked },
888 { &vop_lock_desc, (vnodeopv_entry_t) vop_stdlock },
889 { &vop_print_desc, (vnodeopv_entry_t) cd9660_print },
890 { &vop_reclaim_desc, (vnodeopv_entry_t) cd9660_reclaim },
891 { &vop_setattr_desc, (vnodeopv_entry_t) cd9660_setattr },
892 { &vop_unlock_desc, (vnodeopv_entry_t) vop_stdunlock },
893 { NULL, NULL }
894};
895
896struct vnodeopv_entry_desc cd9660_fifoop_entries[] = {
897 { &vop_default_desc, (vnodeopv_entry_t) fifo_vnoperate },
898 { &vop_access_desc, (vnodeopv_entry_t) cd9660_access },
899 { &vop_getattr_desc, (vnodeopv_entry_t) cd9660_getattr },
900 { &vop_inactive_desc, (vnodeopv_entry_t) cd9660_inactive },
901 { &vop_islocked_desc, (vnodeopv_entry_t) vop_stdislocked },
902 { &vop_lock_desc, (vnodeopv_entry_t) vop_stdlock },
903 { &vop_print_desc, (vnodeopv_entry_t) cd9660_print },
904 { &vop_reclaim_desc, (vnodeopv_entry_t) cd9660_reclaim },
905 { &vop_setattr_desc, (vnodeopv_entry_t) cd9660_setattr },
906 { &vop_unlock_desc, (vnodeopv_entry_t) vop_stdunlock },
907 { NULL, NULL }
908};
909