xref: /dragonfly/sys/vfs/isofs/cd9660/cd9660_vnops.c (revision e3543cd5)
1 /*-
2  * Copyright (c) 1994
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * This code is derived from software contributed to Berkeley
6  * by Pace Willisson (pace@blitz.com).  The Rock Ridge Extension
7  * Support code is derived from software contributed to Berkeley
8  * by Atsushi Murai (amurai@spec.co.jp).
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the University of
21  *	California, Berkeley and its contributors.
22  * 4. Neither the name of the University nor the names of its contributors
23  *    may be used to endorse or promote products derived from this software
24  *    without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36  * SUCH DAMAGE.
37  *
38  *	@(#)cd9660_vnops.c	8.19 (Berkeley) 5/27/95
39  * $FreeBSD: src/sys/isofs/cd9660/cd9660_vnops.c,v 1.62 1999/12/15 23:01:51 eivind Exp $
40  * $DragonFly: src/sys/vfs/isofs/cd9660/cd9660_vnops.c,v 1.40 2008/06/19 23:27:39 dillon Exp $
41  */
42 
43 #include <sys/param.h>
44 #include <sys/systm.h>
45 #include <sys/proc.h>
46 #include <sys/namei.h>
47 #include <sys/kernel.h>
48 #include <sys/stat.h>
49 #include <sys/buf.h>
50 #include <sys/mount.h>
51 #include <sys/vnode.h>
52 #include <vfs/fifofs/fifo.h>
53 #include <sys/malloc.h>
54 #include <sys/dirent.h>
55 #include <sys/unistd.h>
56 #include <sys/filio.h>
57 #include <sys/lockf.h>
58 #include <sys/objcache.h>
59 
60 #include <vm/vm.h>
61 #include <vm/vnode_pager.h>
62 
63 #include "iso.h"
64 #include "cd9660_node.h"
65 #include "iso_rrip.h"
66 
67 static int cd9660_access (struct vop_access_args *);
68 static int cd9660_advlock (struct vop_advlock_args *);
69 static int cd9660_getattr (struct vop_getattr_args *);
70 static int cd9660_ioctl (struct vop_ioctl_args *);
71 static int cd9660_pathconf (struct vop_pathconf_args *);
72 static int cd9660_open (struct vop_open_args *);
73 static int cd9660_read (struct vop_read_args *);
74 static int cd9660_setattr (struct vop_setattr_args *);
75 struct isoreaddir;
76 static int iso_uiodir (struct isoreaddir *idp, struct dirent *dp,
77 			   off_t off);
78 static int iso_shipdir (struct isoreaddir *idp);
79 static int cd9660_readdir (struct vop_readdir_args *);
80 static int cd9660_readlink (struct vop_readlink_args *ap);
81 static int cd9660_strategy (struct vop_strategy_args *);
82 static int cd9660_print (struct vop_print_args *);
83 
84 /*
85  * Setattr call. Only allowed for block and character special devices.
86  *
87  * cd9660_setattr(struct vnode *a_vp, struct vattr *a_vap,
88  *		  struct ucred *a_cred, struct proc *a_p)
89  */
90 int
91 cd9660_setattr(struct vop_setattr_args *ap)
92 {
93 	struct vnode *vp = ap->a_vp;
94 	struct vattr *vap = ap->a_vap;
95 
96   	if (vap->va_flags != (u_long)VNOVAL || vap->va_uid != (uid_t)VNOVAL ||
97 	    vap->va_gid != (gid_t)VNOVAL || vap->va_atime.tv_sec != VNOVAL ||
98 	    vap->va_mtime.tv_sec != VNOVAL || vap->va_mode != (mode_t)VNOVAL)
99 		return (EROFS);
100 	if (vap->va_size != (u_quad_t)VNOVAL) {
101  		switch (vp->v_type) {
102  		case VDIR:
103  			return (EISDIR);
104 		case VLNK:
105 		case VREG:
106 		case VDATABASE:
107 			return (EROFS);
108  		case VCHR:
109  		case VBLK:
110  		case VSOCK:
111  		case VFIFO:
112 		case VNON:
113 		case VBAD:
114 			return (0);
115 		}
116 	}
117 	return (0);
118 }
119 
120 /*
121  * Check mode permission on inode pointer. Mode is READ, WRITE or EXEC.
122  * The mode is shifted to select the owner/group/other fields. The
123  * super user is granted all permissions.
124  *
125  * cd9660_access(struct vnode *a_vp, int a_mode, struct ucred *a_cred,
126  *		 struct proc *a_p)
127  */
128 /* ARGSUSED */
129 static int
130 cd9660_access(struct vop_access_args *ap)
131 {
132 	struct vnode *vp = ap->a_vp;
133 	struct iso_node *ip = VTOI(vp);
134 	struct ucred *cred = ap->a_cred;
135 	mode_t mask, mode = ap->a_mode;
136 	gid_t *gp;
137 	int i;
138 
139 	/*
140 	 * Disallow write attempts unless the file is a socket,
141 	 * fifo, or a block or character device resident on the
142 	 * file system.
143 	 */
144 	if (mode & VWRITE) {
145 		switch (vp->v_type) {
146 		case VDIR:
147 		case VLNK:
148 		case VREG:
149 			return (EROFS);
150 			/* NOT REACHED */
151 		default:
152 			break;
153 		}
154 	}
155 
156 	/* User id 0 always gets access. */
157 	if (cred->cr_uid == 0)
158 		return (0);
159 
160 	mask = 0;
161 
162 	/* Otherwise, check the owner. */
163 	if (cred->cr_uid == ip->inode.iso_uid) {
164 		if (mode & VEXEC)
165 			mask |= S_IXUSR;
166 		if (mode & VREAD)
167 			mask |= S_IRUSR;
168 		if (mode & VWRITE)
169 			mask |= S_IWUSR;
170 		return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
171 	}
172 
173 	/* Otherwise, check the groups. */
174 	for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
175 		if (ip->inode.iso_gid == *gp) {
176 			if (mode & VEXEC)
177 				mask |= S_IXGRP;
178 			if (mode & VREAD)
179 				mask |= S_IRGRP;
180 			if (mode & VWRITE)
181 				mask |= S_IWGRP;
182 			return ((ip->inode.iso_mode & mask) == mask ?
183 			    0 : EACCES);
184 		}
185 
186 	/* Otherwise, check everyone else. */
187 	if (mode & VEXEC)
188 		mask |= S_IXOTH;
189 	if (mode & VREAD)
190 		mask |= S_IROTH;
191 	if (mode & VWRITE)
192 		mask |= S_IWOTH;
193 	return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
194 }
195 
196 /*
197  * cd9660_getattr(struct vnode *a_vp, struct vattr *a_vap)
198  */
199 static int
200 cd9660_getattr(struct vop_getattr_args *ap)
201 {
202 	struct vnode *vp = ap->a_vp;
203 	struct vattr *vap = ap->a_vap;
204 	struct iso_node *ip = VTOI(vp);
205 
206 	vap->va_fsid	= dev2udev(ip->i_dev);
207 	vap->va_fileid	= ip->i_number;
208 
209 	vap->va_mode	= ip->inode.iso_mode;
210 	vap->va_nlink	= ip->inode.iso_links;
211 	vap->va_uid	= ip->inode.iso_uid;
212 	vap->va_gid	= ip->inode.iso_gid;
213 	vap->va_atime	= ip->inode.iso_atime;
214 	vap->va_mtime	= ip->inode.iso_mtime;
215 	vap->va_ctime	= ip->inode.iso_ctime;
216 	vap->va_rmajor	= umajor(ip->inode.iso_rdev);
217 	vap->va_rminor	= uminor(ip->inode.iso_rdev);
218 
219 	vap->va_size	= (u_quad_t)(unsigned long)ip->i_size;
220 	if (ip->i_size == 0 && (vap->va_mode & S_IFMT) == S_IFLNK) {
221 		struct vop_readlink_args rdlnk;
222 		struct iovec aiov;
223 		struct uio auio;
224 		char *cp;
225 
226 		MALLOC(cp, char *, MAXPATHLEN, M_TEMP, M_WAITOK);
227 		aiov.iov_base = cp;
228 		aiov.iov_len = MAXPATHLEN;
229 		auio.uio_iov = &aiov;
230 		auio.uio_iovcnt = 1;
231 		auio.uio_offset = 0;
232 		auio.uio_rw = UIO_READ;
233 		auio.uio_segflg = UIO_SYSSPACE;
234 		auio.uio_td = curthread;
235 		auio.uio_resid = MAXPATHLEN;
236 		rdlnk.a_uio = &auio;
237 		rdlnk.a_vp = ap->a_vp;
238 		rdlnk.a_cred = proc0.p_ucred; /* use root cred */
239 		if (cd9660_readlink(&rdlnk) == 0)
240 			vap->va_size = MAXPATHLEN - auio.uio_resid;
241 		FREE(cp, M_TEMP);
242 	}
243 	vap->va_flags	= 0;
244 	vap->va_gen = 1;
245 	vap->va_blocksize = ip->i_mnt->logical_block_size;
246 	vap->va_bytes	= (u_quad_t) ip->i_size;
247 	vap->va_type	= vp->v_type;
248 	vap->va_filerev	= 0;
249 	return (0);
250 }
251 
252 /*
253  * Vnode op for ioctl.
254  *
255  * cd9660_ioctl(struct vnode *a_vp, int a_command, caddr_t a_data,
256  *		int a_fflag, struct ucred *a_cred, struct proc *a_p)
257  */
258 static int
259 cd9660_ioctl(struct vop_ioctl_args *ap)
260 {
261 	struct vnode *vp = ap->a_vp;
262 	struct iso_node *ip = VTOI(vp);
263 
264         switch (ap->a_command) {
265 
266         case FIOGETLBA:
267 		*(int *)(ap->a_data) = ip->iso_start;
268 		return 0;
269         default:
270                 return (ENOTTY);
271         }
272 }
273 
274 /*
275  * open is called when the kernel intends to read or memory map a vnode.
276  */
277 static int
278 cd9660_open(struct vop_open_args *ap)
279 {
280 	return(vop_stdopen(ap));
281 }
282 
283 /*
284  * Vnode op for reading.
285  *
286  * cd9660_read(struct vnode *a_vp, struct uio *a_uio, int a_ioflag,
287  *		struct ucred *a_cred)
288  */
289 static int
290 cd9660_read(struct vop_read_args *ap)
291 {
292 	struct vnode *vp = ap->a_vp;
293 	struct uio *uio = ap->a_uio;
294 	struct iso_node *ip = VTOI(vp);
295 	struct iso_mnt *imp;
296 	struct buf *bp;
297 	daddr_t lbn, rablock;
298 	off_t raoffset;
299 	off_t loffset;
300 	off_t diff;
301 	int rasize, error = 0;
302 	int seqcount;
303 	long size, n, on;
304 
305 	seqcount = ap->a_ioflag >> 16;
306 
307 	if (uio->uio_resid == 0)
308 		return (0);
309 	if (uio->uio_offset < 0)
310 		return (EINVAL);
311 	ip->i_flag |= IN_ACCESS;
312 	imp = ip->i_mnt;
313 	do {
314 		lbn = lblkno(imp, uio->uio_offset);
315 		loffset = lblktooff(imp, lbn);
316 		on = blkoff(imp, uio->uio_offset);
317 		n = szmin((u_int)(imp->logical_block_size - on),
318 			  uio->uio_resid);
319 		diff = (off_t)ip->i_size - uio->uio_offset;
320 		if (diff <= 0)
321 			return (0);
322 		if (diff < n)
323 			n = diff;
324 		size = blksize(imp, ip, lbn);
325 		rablock = lbn + 1;
326 		raoffset = lblktooff(imp, rablock);
327 		if ((vp->v_mount->mnt_flag & MNT_NOCLUSTERR) == 0) {
328 			if (raoffset < ip->i_size) {
329 				error = cluster_read(vp, (off_t)ip->i_size,
330 						     loffset, size,
331 						     uio->uio_resid,
332 						     (ap->a_ioflag >> 16),
333 						     &bp);
334 			} else {
335 				error = bread(vp, loffset, size, &bp);
336 			}
337 		} else {
338 			if (seqcount > 1 &&
339 			    lblktosize(imp, rablock) < ip->i_size) {
340 				rasize = blksize(imp, ip, rablock);
341 				error = breadn(vp, loffset, size, &raoffset,
342 					       &rasize, 1, &bp);
343 			} else
344 				error = bread(vp, loffset, size, &bp);
345 		}
346 		n = imin(n, size - bp->b_resid);
347 		if (error) {
348 			brelse(bp);
349 			return (error);
350 		}
351 
352 		error = uiomove(bp->b_data + on, (int)n, uio);
353 		brelse(bp);
354 	} while (error == 0 && uio->uio_resid > 0 && n != 0);
355 	return (error);
356 }
357 
358 /* struct dirent + enough space for the maximum supported size */
359 struct iso_dirent {
360 	struct dirent de;
361 	char de_name[_DIRENT_RECLEN(NAME_MAX) - sizeof(struct dirent)];
362 };
363 
364 /*
365  * Structure for reading directories
366  */
367 struct isoreaddir {
368 	struct iso_dirent saveent;
369 	struct iso_dirent assocent;
370 	struct iso_dirent current;
371 	off_t saveoff;
372 	off_t assocoff;
373 	off_t curroff;
374 	struct uio *uio;
375 	off_t uio_off;
376 	int eofflag;
377 	off_t *cookies;
378 	int ncookies;
379 };
380 
381 int
382 iso_uiodir(struct isoreaddir *idp, struct dirent *dp, off_t off)
383 {
384 	int error;
385 
386 	dp->d_name[dp->d_namlen] = 0;
387 
388 	if (idp->uio->uio_resid < _DIRENT_DIRSIZ(dp)) {
389 		idp->eofflag = 0;
390 		return (-1);
391 	}
392 
393 	if (idp->cookies) {
394 		if (idp->ncookies <= 0) {
395 			idp->eofflag = 0;
396 			return (-1);
397 		}
398 
399 		*idp->cookies++ = off;
400 		--idp->ncookies;
401 	}
402 
403 	if ((error = uiomove((caddr_t) dp,_DIRENT_DIRSIZ(dp),idp->uio)) != 0)
404 		return (error);
405 	idp->uio_off = off;
406 	return (0);
407 }
408 
409 int
410 iso_shipdir(struct isoreaddir *idp)
411 {
412 	struct dirent *dp;
413 	int cl, sl, assoc;
414 	int error;
415 	char *cname, *sname;
416 
417 	cl = idp->current.de.d_namlen;
418 	cname = idp->current.de.d_name;
419 assoc = (cl > 1) && (*cname == ASSOCCHAR);
420 	if (assoc) {
421 		cl--;
422 		cname++;
423 	}
424 
425 	dp = &idp->saveent.de;
426 	sname = dp->d_name;
427 	if (!(sl = dp->d_namlen)) {
428 		dp = &idp->assocent.de;
429 		sname = dp->d_name + 1;
430 		sl = dp->d_namlen - 1;
431 	}
432 	if (sl > 0) {
433 		if (sl != cl
434 		    || bcmp(sname,cname,sl)) {
435 			if (idp->assocent.de.d_namlen) {
436 				if ((error = iso_uiodir(idp,&idp->assocent.de,idp->assocoff)) != 0)
437 					return (error);
438 				idp->assocent.de.d_namlen = 0;
439 			}
440 			if (idp->saveent.de.d_namlen) {
441 				if ((error = iso_uiodir(idp,&idp->saveent.de,idp->saveoff)) != 0)
442 					return (error);
443 				idp->saveent.de.d_namlen = 0;
444 			}
445 		}
446 	}
447 	if (assoc) {
448 		idp->assocoff = idp->curroff;
449 		bcopy(&idp->current,&idp->assocent,_DIRENT_DIRSIZ(&idp->current.de));
450 	} else {
451 		idp->saveoff = idp->curroff;
452 		bcopy(&idp->current,&idp->saveent,_DIRENT_DIRSIZ(&idp->current.de));
453 	}
454 	return (0);
455 }
456 
457 /*
458  * Vnode op for readdir
459  *
460  * cd9660_readdir(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred,
461  *		  int *a_eofflag, int *a_ncookies, off_t *a_cookies)
462  */
463 static int
464 cd9660_readdir(struct vop_readdir_args *ap)
465 {
466 	struct uio *uio = ap->a_uio;
467 	struct isoreaddir *idp;
468 	struct vnode *vdp = ap->a_vp;
469 	struct iso_node *dp;
470 	struct iso_mnt *imp;
471 	struct buf *bp = NULL;
472 	struct iso_directory_record *ep;
473 	int entryoffsetinblock;
474 	doff_t endsearch;
475 	u_long bmask;
476 	int error = 0;
477 	int reclen;
478 	u_short namelen;
479 	int ncookies = 0;
480 	off_t *cookies = NULL;
481 
482 	dp = VTOI(vdp);
483 	imp = dp->i_mnt;
484 	bmask = imp->im_bmask;
485 
486 	if ((error = vn_lock(vdp, LK_EXCLUSIVE|LK_RETRY)) != 0)
487 		return (error);
488 
489 	MALLOC(idp, struct isoreaddir *, sizeof(*idp), M_TEMP, M_WAITOK);
490 	idp->saveent.de.d_namlen = idp->assocent.de.d_namlen = 0;
491 	/*
492 	 * XXX
493 	 * Is it worth trying to figure out the type?
494 	 */
495 	idp->saveent.de.d_type = DT_UNKNOWN;
496 	idp->assocent.de.d_type = DT_UNKNOWN;
497 	idp->current.de.d_type = DT_UNKNOWN;
498 	idp->uio = uio;
499 	if (ap->a_ncookies == NULL) {
500 		idp->cookies = NULL;
501 	} else {
502 		/*
503 		 * Guess the number of cookies needed.  Guess at least
504 		 * 1 to avoid a degenerate case in malloc, and cap at
505 		 * a reasonable limit.
506 		 */
507 		ncookies = uio->uio_resid / 16 + 1;
508 		if (ncookies > 1024)
509 			ncookies = 1024;
510 		MALLOC(cookies, off_t *, ncookies * sizeof(off_t),
511 		       M_TEMP, M_WAITOK);
512 		idp->cookies = cookies;
513 		idp->ncookies = ncookies;
514 	}
515 	idp->eofflag = 1;
516 	idp->curroff = uio->uio_offset;
517 
518 	if ((entryoffsetinblock = idp->curroff & bmask) &&
519 	    (error = cd9660_devblkatoff(vdp, (off_t)idp->curroff, NULL, &bp))) {
520 		FREE(idp, M_TEMP);
521 		goto done;
522 	}
523 	endsearch = dp->i_size;
524 
525 	while (idp->curroff < endsearch) {
526 		/*
527 		 * If offset is on a block boundary,
528 		 * read the next directory block.
529 		 * Release previous if it exists.
530 		 */
531 		if ((idp->curroff & bmask) == 0) {
532 			if (bp != NULL)
533 				brelse(bp);
534 			if ((error =
535 			    cd9660_devblkatoff(vdp, (off_t)idp->curroff, NULL, &bp)) != 0)
536 				break;
537 			entryoffsetinblock = 0;
538 		}
539 		/*
540 		 * Get pointer to next entry.
541 		 */
542 		ep = (struct iso_directory_record *)
543 			((char *)bp->b_data + entryoffsetinblock);
544 
545 		reclen = isonum_711(ep->length);
546 		if (reclen == 0) {
547 			/* skip to next block, if any */
548 			idp->curroff =
549 			    (idp->curroff & ~bmask) + imp->logical_block_size;
550 			continue;
551 		}
552 
553 		if (reclen < ISO_DIRECTORY_RECORD_SIZE) {
554 			error = EINVAL;
555 			/* illegal entry, stop */
556 			break;
557 		}
558 
559 		if (entryoffsetinblock + reclen > imp->logical_block_size) {
560 			error = EINVAL;
561 			/* illegal directory, so stop looking */
562 			break;
563 		}
564 
565 		idp->current.de.d_namlen = isonum_711(ep->name_len);
566 
567 		if (reclen < ISO_DIRECTORY_RECORD_SIZE + idp->current.de.d_namlen) {
568 			error = EINVAL;
569 			/* illegal entry, stop */
570 			break;
571 		}
572 
573 		if (isonum_711(ep->flags)&2)
574 			idp->current.de.d_ino = isodirino(ep, imp);
575 		else
576 			idp->current.de.d_ino = bp->b_bio1.bio_offset +
577 						entryoffsetinblock;
578 
579 		idp->curroff += reclen;
580 
581 		switch (imp->iso_ftype) {
582 		case ISO_FTYPE_RRIP:
583 		{
584 			ino_t cur_fileno = idp->current.de.d_ino;
585 			cd9660_rrip_getname(ep,idp->current.de.d_name, &namelen,
586 					   &cur_fileno,imp);
587 			idp->current.de.d_ino = cur_fileno;
588 			idp->current.de.d_namlen = namelen;
589 			if (idp->current.de.d_namlen)
590 				error = iso_uiodir(idp,&idp->current.de,idp->curroff);
591 			break;
592 		}
593 		default: /* ISO_FTYPE_DEFAULT || ISO_FTYPE_9660 || ISO_FTYPE_HIGH_SIERRA*/
594 			strcpy(idp->current.de.d_name,"..");
595 			if (idp->current.de.d_namlen == 1 && ep->name[0] == 0) {
596 				idp->current.de.d_namlen = 1;
597 				error = iso_uiodir(idp,&idp->current.de,idp->curroff);
598 			} else if (idp->current.de.d_namlen == 1 && ep->name[0] == 1) {
599 				idp->current.de.d_namlen = 2;
600 				error = iso_uiodir(idp,&idp->current.de,idp->curroff);
601 			} else {
602 				isofntrans(ep->name,idp->current.de.d_namlen,
603 					   idp->current.de.d_name, &namelen,
604 					   imp->iso_ftype == ISO_FTYPE_9660,
605 					   isonum_711(ep->flags)&4,
606 					   imp->joliet_level);
607 				idp->current.de.d_namlen = namelen;
608 				if (imp->iso_ftype == ISO_FTYPE_DEFAULT)
609 					error = iso_shipdir(idp);
610 				else
611 					error = iso_uiodir(idp,&idp->current.de,idp->curroff);
612 			}
613 		}
614 		if (error)
615 			break;
616 
617 		entryoffsetinblock += reclen;
618 	}
619 
620 	if (!error && imp->iso_ftype == ISO_FTYPE_DEFAULT) {
621 		idp->current.de.d_namlen = 0;
622 		error = iso_shipdir(idp);
623 	}
624 	if (error < 0)
625 		error = 0;
626 
627 	if (ap->a_ncookies != NULL) {
628 		if (error)
629 			kfree(cookies, M_TEMP);
630 		else {
631 			/*
632 			 * Work out the number of cookies actually used.
633 			 */
634 			*ap->a_ncookies = ncookies - idp->ncookies;
635 			*ap->a_cookies = cookies;
636 		}
637 	}
638 
639 	if (bp)
640 		brelse (bp);
641 
642 	uio->uio_offset = idp->uio_off;
643 	*ap->a_eofflag = idp->eofflag;
644 
645 	FREE(idp, M_TEMP);
646 
647 done:
648 	vn_unlock(vdp);
649 	return (error);
650 }
651 
652 /*
653  * Return target name of a symbolic link
654  * Shouldn't we get the parent vnode and read the data from there?
655  * This could eventually result in deadlocks in cd9660_lookup.
656  * But otherwise the block read here is in the block buffer two times.
657  */
658 typedef struct iso_directory_record ISODIR;
659 typedef struct iso_node		    ISONODE;
660 typedef struct iso_mnt		    ISOMNT;
661 /*
662  * cd9660_readlink(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred)
663  */
664 static int
665 cd9660_readlink(struct vop_readlink_args *ap)
666 {
667 	ISONODE	*ip;
668 	ISODIR	*dirp;
669 	ISOMNT	*imp;
670 	struct	buf *bp;
671 	struct	uio *uio;
672 	u_short	symlen;
673 	int	error;
674 	char	*symname;
675 
676 	ip  = VTOI(ap->a_vp);
677 	imp = ip->i_mnt;
678 	uio = ap->a_uio;
679 
680 	if (imp->iso_ftype != ISO_FTYPE_RRIP)
681 		return (EINVAL);
682 
683 	/*
684 	 * Get parents directory record block that this inode included.
685 	 */
686 	error = bread(imp->im_devvp,
687 			(off_t)ip->i_number & ~((1 << imp->im_bshift) - 1),
688 		      imp->logical_block_size, &bp);
689 	if (error) {
690 		brelse(bp);
691 		return (EINVAL);
692 	}
693 
694 	/*
695 	 * Setup the directory pointer for this inode
696 	 */
697 	dirp = (ISODIR *)(bp->b_data + (ip->i_number & imp->im_bmask));
698 
699 	/*
700 	 * Just make sure, we have a right one....
701 	 *   1: Check not cross boundary on block
702 	 */
703 	if ((ip->i_number & imp->im_bmask) + isonum_711(dirp->length)
704 	    > (unsigned)imp->logical_block_size) {
705 		brelse(bp);
706 		return (EINVAL);
707 	}
708 
709 	/*
710 	 * Now get a buffer
711 	 * Abuse a namei buffer for now.
712 	 */
713 	if (uio->uio_segflg == UIO_SYSSPACE)
714 		symname = uio->uio_iov->iov_base;
715 	else
716 		symname = objcache_get(namei_oc, M_WAITOK);
717 
718 	/*
719 	 * Ok, we just gathering a symbolic name in SL record.
720 	 */
721 	if (cd9660_rrip_getsymname(dirp, symname, &symlen, imp) == 0) {
722 		if (uio->uio_segflg != UIO_SYSSPACE)
723 			objcache_put(namei_oc, symname);
724 		brelse(bp);
725 		return (EINVAL);
726 	}
727 	/*
728 	 * Don't forget before you leave from home ;-)
729 	 */
730 	brelse(bp);
731 
732 	/*
733 	 * return with the symbolic name to caller's.
734 	 */
735 	if (uio->uio_segflg != UIO_SYSSPACE) {
736 		error = uiomove(symname, symlen, uio);
737 		objcache_put(namei_oc, symname);
738 		return (error);
739 	}
740 	uio->uio_resid -= symlen;
741 	uio->uio_iov->iov_base = (char *)uio->uio_iov->iov_base + symlen;
742 	uio->uio_iov->iov_len -= symlen;
743 	return (0);
744 }
745 
746 /*
747  * Calculate the logical to physical mapping if not done already,
748  * then call the device strategy routine.
749  *
750  * cd9660_strategy(struct buf *a_vp, struct buf *a_bio)
751  */
752 static int
753 cd9660_strategy(struct vop_strategy_args *ap)
754 {
755 	struct bio *bio = ap->a_bio;
756 	struct bio *nbio;
757 	struct buf *bp = bio->bio_buf;
758 	struct vnode *vp = ap->a_vp;
759 	struct iso_node *ip;
760 	int error;
761 
762 	ip = VTOI(vp);
763 	if (vp->v_type == VBLK || vp->v_type == VCHR)
764 		panic("cd9660_strategy: spec");
765 	nbio = push_bio(bio);
766 	if (nbio->bio_offset == NOOFFSET) {
767 		error = VOP_BMAP(vp, bio->bio_offset,
768 				 &nbio->bio_offset, NULL, NULL, bp->b_cmd);
769 		if (error) {
770 			bp->b_error = error;
771 			bp->b_flags |= B_ERROR;
772 			/* I/O was never started on nbio, must biodone(bio) */
773 			biodone(bio);
774 			return (error);
775 		}
776 		if (nbio->bio_offset == NOOFFSET)
777 			clrbuf(bp);
778 	}
779 	if (nbio->bio_offset == NOOFFSET) {
780 		/* I/O was never started on nbio, must biodone(bio) */
781 		biodone(bio);
782 		return (0);
783 	}
784 	vp = ip->i_devvp;
785 	vn_strategy(vp, nbio);
786 	return (0);
787 }
788 
789 /*
790  * Print out the contents of an inode.
791  *
792  * cd9660_print(struct vnode *a_vp)
793  */
794 static int
795 cd9660_print(struct vop_print_args *ap)
796 {
797 	kprintf("tag VT_ISOFS, isofs vnode\n");
798 	return (0);
799 }
800 
801 /*
802  * Return POSIX pathconf information applicable to cd9660 filesystems.
803  *
804  * cd9660_pathconf(struct vnode *a_vp, int a_name, register_t *a_retval)
805  */
806 static int
807 cd9660_pathconf(struct vop_pathconf_args *ap)
808 {
809 	switch (ap->a_name) {
810 	case _PC_LINK_MAX:
811 		*ap->a_retval = 1;
812 		return (0);
813 	case _PC_NAME_MAX:
814 		if (VTOI(ap->a_vp)->i_mnt->iso_ftype == ISO_FTYPE_RRIP)
815 			*ap->a_retval = NAME_MAX;
816 		else
817 			*ap->a_retval = 37;
818 		return (0);
819 	case _PC_PATH_MAX:
820 		*ap->a_retval = PATH_MAX;
821 		return (0);
822 	case _PC_PIPE_BUF:
823 		*ap->a_retval = PIPE_BUF;
824 		return (0);
825 	case _PC_CHOWN_RESTRICTED:
826 		*ap->a_retval = 1;
827 		return (0);
828 	case _PC_NO_TRUNC:
829 		*ap->a_retval = 1;
830 		return (0);
831 	default:
832 		return (EINVAL);
833 	}
834 	/* NOTREACHED */
835 }
836 
837 /*
838  * Advisory lock support
839  */
840 static int
841 cd9660_advlock(struct vop_advlock_args *ap)
842 {
843 	struct iso_node *ip = VTOI(ap->a_vp);
844 	return (lf_advlock(ap, &(ip->i_lockf), ip->i_size));
845 }
846 
847 
848 /*
849  * Global vfs data structures for cd9660
850  */
851 struct vop_ops cd9660_vnode_vops = {
852 	.vop_default =		vop_defaultop,
853 	.vop_open =		cd9660_open,
854 	.vop_access =		cd9660_access,
855 	.vop_advlock =		cd9660_advlock,
856 	.vop_bmap =		cd9660_bmap,
857 	.vop_old_lookup =	cd9660_lookup,
858 	.vop_getattr =		cd9660_getattr,
859 	.vop_inactive =		cd9660_inactive,
860 	.vop_ioctl =		cd9660_ioctl,
861 	.vop_pathconf =		cd9660_pathconf,
862 	.vop_print =		cd9660_print,
863 	.vop_read =		cd9660_read,
864 	.vop_readdir =		cd9660_readdir,
865 	.vop_readlink =		cd9660_readlink,
866 	.vop_reclaim =		cd9660_reclaim,
867 	.vop_setattr =		cd9660_setattr,
868 	.vop_strategy =		cd9660_strategy,
869 	.vop_getpages =		vop_stdgetpages,
870 	.vop_putpages =		vop_stdputpages
871 };
872 
873 /*
874  * Special device vnode ops
875  */
876 struct vop_ops cd9660_spec_vops = {
877 	.vop_default =		vop_defaultop,
878 	.vop_read =		vop_stdnoread,
879 	.vop_access =		cd9660_access,
880 	.vop_getattr =		cd9660_getattr,
881 	.vop_inactive =		cd9660_inactive,
882 	.vop_print =		cd9660_print,
883 	.vop_reclaim =		cd9660_reclaim,
884 	.vop_setattr =		cd9660_setattr,
885 };
886 
887 struct vop_ops cd9660_fifo_vops = {
888 	.vop_default =		fifo_vnoperate,
889 	.vop_access =		cd9660_access,
890 	.vop_getattr =		cd9660_getattr,
891 	.vop_inactive =		cd9660_inactive,
892 	.vop_print =		cd9660_print,
893 	.vop_reclaim =		cd9660_reclaim,
894 	.vop_setattr =		cd9660_setattr,
895 };
896 
897