ptyfs_vnops.c revision 1.12.10.2 1 1.12.10.2 elad /* $NetBSD: ptyfs_vnops.c,v 1.12.10.2 2006/03/10 14:23:39 elad Exp $ */
2 1.1 jdolecek
3 1.1 jdolecek /*
4 1.1 jdolecek * Copyright (c) 1993, 1995
5 1.1 jdolecek * The Regents of the University of California. All rights reserved.
6 1.1 jdolecek *
7 1.1 jdolecek * This code is derived from software contributed to Berkeley by
8 1.1 jdolecek * Jan-Simon Pendry.
9 1.1 jdolecek *
10 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.1 jdolecek * modification, are permitted provided that the following conditions
12 1.1 jdolecek * are met:
13 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.1 jdolecek * documentation and/or other materials provided with the distribution.
18 1.1 jdolecek * 3. Neither the name of the University nor the names of its contributors
19 1.1 jdolecek * may be used to endorse or promote products derived from this software
20 1.1 jdolecek * without specific prior written permission.
21 1.1 jdolecek *
22 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 jdolecek * SUCH DAMAGE.
33 1.1 jdolecek *
34 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
35 1.1 jdolecek */
36 1.1 jdolecek
37 1.1 jdolecek /*
38 1.1 jdolecek * Copyright (c) 1993 Jan-Simon Pendry
39 1.1 jdolecek *
40 1.1 jdolecek * This code is derived from software contributed to Berkeley by
41 1.1 jdolecek * Jan-Simon Pendry.
42 1.1 jdolecek *
43 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
44 1.1 jdolecek * modification, are permitted provided that the following conditions
45 1.1 jdolecek * are met:
46 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
47 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
48 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
49 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
50 1.1 jdolecek * documentation and/or other materials provided with the distribution.
51 1.1 jdolecek * 3. All advertising materials mentioning features or use of this software
52 1.1 jdolecek * must display the following acknowledgement:
53 1.1 jdolecek * This product includes software developed by the University of
54 1.1 jdolecek * California, Berkeley and its contributors.
55 1.1 jdolecek * 4. Neither the name of the University nor the names of its contributors
56 1.1 jdolecek * may be used to endorse or promote products derived from this software
57 1.1 jdolecek * without specific prior written permission.
58 1.1 jdolecek *
59 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
60 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
63 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69 1.1 jdolecek * SUCH DAMAGE.
70 1.1 jdolecek *
71 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
72 1.1 jdolecek */
73 1.1 jdolecek
74 1.1 jdolecek /*
75 1.1 jdolecek * ptyfs vnode interface
76 1.1 jdolecek */
77 1.1 jdolecek
78 1.1 jdolecek #include <sys/cdefs.h>
79 1.12.10.2 elad __KERNEL_RCSID(0, "$NetBSD: ptyfs_vnops.c,v 1.12.10.2 2006/03/10 14:23:39 elad Exp $");
80 1.1 jdolecek
81 1.1 jdolecek #include <sys/param.h>
82 1.1 jdolecek #include <sys/systm.h>
83 1.1 jdolecek #include <sys/time.h>
84 1.1 jdolecek #include <sys/kernel.h>
85 1.1 jdolecek #include <sys/file.h>
86 1.1 jdolecek #include <sys/filedesc.h>
87 1.1 jdolecek #include <sys/proc.h>
88 1.1 jdolecek #include <sys/vnode.h>
89 1.1 jdolecek #include <sys/namei.h>
90 1.1 jdolecek #include <sys/malloc.h>
91 1.1 jdolecek #include <sys/mount.h>
92 1.1 jdolecek #include <sys/select.h>
93 1.1 jdolecek #include <sys/dirent.h>
94 1.1 jdolecek #include <sys/resourcevar.h>
95 1.1 jdolecek #include <sys/stat.h>
96 1.1 jdolecek #include <sys/conf.h>
97 1.1 jdolecek #include <sys/tty.h>
98 1.1 jdolecek #include <sys/pty.h>
99 1.1 jdolecek
100 1.1 jdolecek #include <uvm/uvm_extern.h> /* for PAGE_SIZE */
101 1.1 jdolecek
102 1.1 jdolecek #include <machine/reg.h>
103 1.1 jdolecek
104 1.2 jdolecek #include <fs/ptyfs/ptyfs.h>
105 1.1 jdolecek #include <miscfs/genfs/genfs.h>
106 1.1 jdolecek #include <miscfs/specfs/specdev.h>
107 1.1 jdolecek
108 1.1 jdolecek /*
109 1.1 jdolecek * Vnode Operations.
110 1.1 jdolecek *
111 1.1 jdolecek */
112 1.1 jdolecek
113 1.1 jdolecek int ptyfs_lookup (void *);
114 1.1 jdolecek #define ptyfs_create genfs_eopnotsupp
115 1.1 jdolecek #define ptyfs_mknod genfs_eopnotsupp
116 1.1 jdolecek int ptyfs_open (void *);
117 1.1 jdolecek int ptyfs_close (void *);
118 1.1 jdolecek int ptyfs_access (void *);
119 1.1 jdolecek int ptyfs_getattr (void *);
120 1.1 jdolecek int ptyfs_setattr (void *);
121 1.1 jdolecek int ptyfs_read (void *);
122 1.1 jdolecek int ptyfs_write (void *);
123 1.1 jdolecek #define ptyfs_fcntl genfs_fcntl
124 1.1 jdolecek int ptyfs_ioctl (void *);
125 1.1 jdolecek int ptyfs_poll (void *);
126 1.1 jdolecek int ptyfs_kqfilter (void *);
127 1.1 jdolecek #define ptyfs_revoke genfs_revoke
128 1.1 jdolecek #define ptyfs_mmap genfs_eopnotsupp
129 1.1 jdolecek #define ptyfs_fsync genfs_nullop
130 1.1 jdolecek #define ptyfs_seek genfs_nullop
131 1.1 jdolecek #define ptyfs_remove genfs_eopnotsupp
132 1.1 jdolecek #define ptyfs_link genfs_abortop
133 1.1 jdolecek #define ptyfs_rename genfs_eopnotsupp
134 1.1 jdolecek #define ptyfs_mkdir genfs_eopnotsupp
135 1.1 jdolecek #define ptyfs_rmdir genfs_eopnotsupp
136 1.1 jdolecek #define ptyfs_symlink genfs_abortop
137 1.1 jdolecek int ptyfs_readdir (void *);
138 1.1 jdolecek #define ptyfs_readlink genfs_eopnotsupp
139 1.1 jdolecek #define ptyfs_abortop genfs_abortop
140 1.1 jdolecek int ptyfs_reclaim (void *);
141 1.1 jdolecek #define ptyfs_lock genfs_lock
142 1.1 jdolecek #define ptyfs_unlock genfs_unlock
143 1.1 jdolecek #define ptyfs_bmap genfs_badop
144 1.1 jdolecek #define ptyfs_strategy genfs_badop
145 1.1 jdolecek int ptyfs_print (void *);
146 1.1 jdolecek int ptyfs_pathconf (void *);
147 1.1 jdolecek #define ptyfs_islocked genfs_islocked
148 1.1 jdolecek #define ptyfs_advlock genfs_einval
149 1.1 jdolecek #define ptyfs_bwrite genfs_eopnotsupp
150 1.1 jdolecek #define ptyfs_putpages genfs_null_putpages
151 1.1 jdolecek
152 1.11 yamt static int ptyfs_update(struct vnode *, const struct timespec *,
153 1.11 yamt const struct timespec *, int);
154 1.12.10.1 elad static int ptyfs_chown(struct vnode *, uid_t, gid_t, kauth_cred_t,
155 1.1 jdolecek struct proc *);
156 1.12.10.1 elad static int ptyfs_chmod(struct vnode *, mode_t, kauth_cred_t, struct proc *);
157 1.1 jdolecek static int atoi(const char *, size_t);
158 1.1 jdolecek
159 1.1 jdolecek extern const struct cdevsw pts_cdevsw, ptc_cdevsw;
160 1.1 jdolecek
161 1.1 jdolecek /*
162 1.1 jdolecek * ptyfs vnode operations.
163 1.1 jdolecek */
164 1.1 jdolecek int (**ptyfs_vnodeop_p)(void *);
165 1.1 jdolecek const struct vnodeopv_entry_desc ptyfs_vnodeop_entries[] = {
166 1.1 jdolecek { &vop_default_desc, vn_default_error },
167 1.1 jdolecek { &vop_lookup_desc, ptyfs_lookup }, /* lookup */
168 1.1 jdolecek { &vop_create_desc, ptyfs_create }, /* create */
169 1.1 jdolecek { &vop_mknod_desc, ptyfs_mknod }, /* mknod */
170 1.1 jdolecek { &vop_open_desc, ptyfs_open }, /* open */
171 1.1 jdolecek { &vop_close_desc, ptyfs_close }, /* close */
172 1.1 jdolecek { &vop_access_desc, ptyfs_access }, /* access */
173 1.1 jdolecek { &vop_getattr_desc, ptyfs_getattr }, /* getattr */
174 1.1 jdolecek { &vop_setattr_desc, ptyfs_setattr }, /* setattr */
175 1.1 jdolecek { &vop_read_desc, ptyfs_read }, /* read */
176 1.1 jdolecek { &vop_write_desc, ptyfs_write }, /* write */
177 1.1 jdolecek { &vop_ioctl_desc, ptyfs_ioctl }, /* ioctl */
178 1.1 jdolecek { &vop_fcntl_desc, ptyfs_fcntl }, /* fcntl */
179 1.1 jdolecek { &vop_poll_desc, ptyfs_poll }, /* poll */
180 1.1 jdolecek { &vop_kqfilter_desc, ptyfs_kqfilter }, /* kqfilter */
181 1.1 jdolecek { &vop_revoke_desc, ptyfs_revoke }, /* revoke */
182 1.1 jdolecek { &vop_mmap_desc, ptyfs_mmap }, /* mmap */
183 1.1 jdolecek { &vop_fsync_desc, ptyfs_fsync }, /* fsync */
184 1.1 jdolecek { &vop_seek_desc, ptyfs_seek }, /* seek */
185 1.1 jdolecek { &vop_remove_desc, ptyfs_remove }, /* remove */
186 1.1 jdolecek { &vop_link_desc, ptyfs_link }, /* link */
187 1.1 jdolecek { &vop_rename_desc, ptyfs_rename }, /* rename */
188 1.1 jdolecek { &vop_mkdir_desc, ptyfs_mkdir }, /* mkdir */
189 1.1 jdolecek { &vop_rmdir_desc, ptyfs_rmdir }, /* rmdir */
190 1.1 jdolecek { &vop_symlink_desc, ptyfs_symlink }, /* symlink */
191 1.1 jdolecek { &vop_readdir_desc, ptyfs_readdir }, /* readdir */
192 1.1 jdolecek { &vop_readlink_desc, ptyfs_readlink }, /* readlink */
193 1.1 jdolecek { &vop_abortop_desc, ptyfs_abortop }, /* abortop */
194 1.6 christos { &vop_inactive_desc, spec_inactive }, /* inactive */
195 1.1 jdolecek { &vop_reclaim_desc, ptyfs_reclaim }, /* reclaim */
196 1.1 jdolecek { &vop_lock_desc, ptyfs_lock }, /* lock */
197 1.1 jdolecek { &vop_unlock_desc, ptyfs_unlock }, /* unlock */
198 1.1 jdolecek { &vop_bmap_desc, ptyfs_bmap }, /* bmap */
199 1.1 jdolecek { &vop_strategy_desc, ptyfs_strategy }, /* strategy */
200 1.1 jdolecek { &vop_print_desc, ptyfs_print }, /* print */
201 1.1 jdolecek { &vop_islocked_desc, ptyfs_islocked }, /* islocked */
202 1.1 jdolecek { &vop_pathconf_desc, ptyfs_pathconf }, /* pathconf */
203 1.1 jdolecek { &vop_advlock_desc, ptyfs_advlock }, /* advlock */
204 1.1 jdolecek { &vop_bwrite_desc, ptyfs_bwrite }, /* bwrite */
205 1.1 jdolecek { &vop_putpages_desc, ptyfs_putpages }, /* putpages */
206 1.1 jdolecek { NULL, NULL }
207 1.1 jdolecek };
208 1.1 jdolecek const struct vnodeopv_desc ptyfs_vnodeop_opv_desc =
209 1.1 jdolecek { &ptyfs_vnodeop_p, ptyfs_vnodeop_entries };
210 1.1 jdolecek
211 1.1 jdolecek /*
212 1.1 jdolecek * _reclaim is called when getnewvnode()
213 1.1 jdolecek * wants to make use of an entry on the vnode
214 1.1 jdolecek * free list. at this time the filesystem needs
215 1.1 jdolecek * to free any private data and remove the node
216 1.1 jdolecek * from any private lists.
217 1.1 jdolecek */
218 1.1 jdolecek int
219 1.1 jdolecek ptyfs_reclaim(void *v)
220 1.1 jdolecek {
221 1.1 jdolecek struct vop_reclaim_args /* {
222 1.1 jdolecek struct vnode *a_vp;
223 1.1 jdolecek } */ *ap = v;
224 1.1 jdolecek return ptyfs_freevp(ap->a_vp);
225 1.1 jdolecek }
226 1.1 jdolecek
227 1.1 jdolecek /*
228 1.1 jdolecek * Return POSIX pathconf information applicable to special devices.
229 1.1 jdolecek */
230 1.1 jdolecek int
231 1.1 jdolecek ptyfs_pathconf(void *v)
232 1.1 jdolecek {
233 1.1 jdolecek struct vop_pathconf_args /* {
234 1.1 jdolecek struct vnode *a_vp;
235 1.1 jdolecek int a_name;
236 1.1 jdolecek register_t *a_retval;
237 1.1 jdolecek } */ *ap = v;
238 1.1 jdolecek
239 1.1 jdolecek switch (ap->a_name) {
240 1.1 jdolecek case _PC_LINK_MAX:
241 1.1 jdolecek *ap->a_retval = LINK_MAX;
242 1.1 jdolecek return 0;
243 1.1 jdolecek case _PC_MAX_CANON:
244 1.1 jdolecek *ap->a_retval = MAX_CANON;
245 1.1 jdolecek return 0;
246 1.1 jdolecek case _PC_MAX_INPUT:
247 1.1 jdolecek *ap->a_retval = MAX_INPUT;
248 1.1 jdolecek return 0;
249 1.1 jdolecek case _PC_PIPE_BUF:
250 1.1 jdolecek *ap->a_retval = PIPE_BUF;
251 1.1 jdolecek return 0;
252 1.1 jdolecek case _PC_CHOWN_RESTRICTED:
253 1.1 jdolecek *ap->a_retval = 1;
254 1.1 jdolecek return 0;
255 1.1 jdolecek case _PC_VDISABLE:
256 1.1 jdolecek *ap->a_retval = _POSIX_VDISABLE;
257 1.1 jdolecek return 0;
258 1.1 jdolecek case _PC_SYNC_IO:
259 1.1 jdolecek *ap->a_retval = 1;
260 1.1 jdolecek return 0;
261 1.1 jdolecek default:
262 1.1 jdolecek return EINVAL;
263 1.1 jdolecek }
264 1.1 jdolecek }
265 1.1 jdolecek
266 1.1 jdolecek /*
267 1.1 jdolecek * _print is used for debugging.
268 1.1 jdolecek * just print a readable description
269 1.1 jdolecek * of (vp).
270 1.1 jdolecek */
271 1.1 jdolecek int
272 1.1 jdolecek ptyfs_print(void *v)
273 1.1 jdolecek {
274 1.1 jdolecek struct vop_print_args /* {
275 1.1 jdolecek struct vnode *a_vp;
276 1.1 jdolecek } */ *ap = v;
277 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
278 1.1 jdolecek
279 1.1 jdolecek printf("tag VT_PTYFS, type %d, pty %d\n",
280 1.1 jdolecek ptyfs->ptyfs_type, ptyfs->ptyfs_pty);
281 1.1 jdolecek return 0;
282 1.1 jdolecek }
283 1.1 jdolecek
284 1.1 jdolecek /*
285 1.1 jdolecek * Invent attributes for ptyfsnode (vp) and store
286 1.1 jdolecek * them in (vap).
287 1.1 jdolecek * Directories lengths are returned as zero since
288 1.1 jdolecek * any real length would require the genuine size
289 1.1 jdolecek * to be computed, and nothing cares anyway.
290 1.1 jdolecek *
291 1.1 jdolecek * this is relatively minimal for ptyfs.
292 1.1 jdolecek */
293 1.1 jdolecek int
294 1.1 jdolecek ptyfs_getattr(void *v)
295 1.1 jdolecek {
296 1.1 jdolecek struct vop_getattr_args /* {
297 1.1 jdolecek struct vnode *a_vp;
298 1.1 jdolecek struct vattr *a_vap;
299 1.12.10.1 elad kauth_cred_t a_cred;
300 1.12 christos struct lwp *a_l;
301 1.1 jdolecek } */ *ap = v;
302 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
303 1.1 jdolecek struct vattr *vap = ap->a_vap;
304 1.1 jdolecek
305 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
306 1.1 jdolecek
307 1.1 jdolecek /* start by zeroing out the attributes */
308 1.1 jdolecek VATTR_NULL(vap);
309 1.1 jdolecek
310 1.1 jdolecek /* next do all the common fields */
311 1.1 jdolecek vap->va_type = ap->a_vp->v_type;
312 1.4 atatat vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
313 1.1 jdolecek vap->va_fileid = ptyfs->ptyfs_fileno;
314 1.1 jdolecek vap->va_gen = 0;
315 1.1 jdolecek vap->va_flags = 0;
316 1.1 jdolecek vap->va_nlink = 1;
317 1.1 jdolecek vap->va_blocksize = PAGE_SIZE;
318 1.1 jdolecek
319 1.1 jdolecek vap->va_atime = ptyfs->ptyfs_atime;
320 1.1 jdolecek vap->va_mtime = ptyfs->ptyfs_mtime;
321 1.1 jdolecek vap->va_ctime = ptyfs->ptyfs_ctime;
322 1.1 jdolecek vap->va_birthtime = ptyfs->ptyfs_birthtime;
323 1.1 jdolecek vap->va_mode = ptyfs->ptyfs_mode;
324 1.1 jdolecek vap->va_flags = ptyfs->ptyfs_flags;
325 1.1 jdolecek vap->va_uid = ptyfs->ptyfs_uid;
326 1.1 jdolecek vap->va_gid = ptyfs->ptyfs_gid;
327 1.1 jdolecek
328 1.1 jdolecek switch (ptyfs->ptyfs_type) {
329 1.1 jdolecek case PTYFSpts:
330 1.1 jdolecek case PTYFSptc:
331 1.1 jdolecek if (pty_isfree(ptyfs->ptyfs_pty, 1))
332 1.1 jdolecek return ENOENT;
333 1.5 atatat vap->va_bytes = vap->va_size = 0;
334 1.7 perry vap->va_rdev = ap->a_vp->v_rdev;
335 1.1 jdolecek break;
336 1.1 jdolecek case PTYFSroot:
337 1.1 jdolecek vap->va_rdev = 0;
338 1.1 jdolecek vap->va_bytes = vap->va_size = DEV_BSIZE;
339 1.1 jdolecek break;
340 1.1 jdolecek
341 1.1 jdolecek default:
342 1.1 jdolecek return EOPNOTSUPP;
343 1.1 jdolecek }
344 1.1 jdolecek
345 1.1 jdolecek return 0;
346 1.1 jdolecek }
347 1.1 jdolecek
348 1.1 jdolecek /*ARGSUSED*/
349 1.1 jdolecek int
350 1.1 jdolecek ptyfs_setattr(void *v)
351 1.1 jdolecek {
352 1.1 jdolecek struct vop_setattr_args /* {
353 1.1 jdolecek struct vnodeop_desc *a_desc;
354 1.1 jdolecek struct vnode *a_vp;
355 1.1 jdolecek struct vattr *a_vap;
356 1.12.10.1 elad kauth_cred_t a_cred;
357 1.12 christos struct lwp *a_l;
358 1.1 jdolecek } */ *ap = v;
359 1.1 jdolecek struct vnode *vp = ap->a_vp;
360 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
361 1.1 jdolecek struct vattr *vap = ap->a_vap;
362 1.12.10.1 elad kauth_cred_t cred = ap->a_cred;
363 1.12 christos struct lwp *l = ap->a_l;
364 1.12 christos struct proc *p = l->l_proc;
365 1.1 jdolecek int error;
366 1.1 jdolecek
367 1.1 jdolecek if (vap->va_size != VNOVAL) {
368 1.1 jdolecek switch (ptyfs->ptyfs_type) {
369 1.1 jdolecek case PTYFSroot:
370 1.1 jdolecek return EISDIR;
371 1.1 jdolecek case PTYFSpts:
372 1.1 jdolecek case PTYFSptc:
373 1.1 jdolecek break;
374 1.1 jdolecek default:
375 1.1 jdolecek return EINVAL;
376 1.1 jdolecek }
377 1.1 jdolecek }
378 1.1 jdolecek
379 1.1 jdolecek if (vap->va_flags != VNOVAL) {
380 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
381 1.1 jdolecek return EROFS;
382 1.12.10.1 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
383 1.12.10.2 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
384 1.12.10.1 elad &p->p_acflag)) != 0)
385 1.1 jdolecek return error;
386 1.12.10.2 elad if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) == 0) {
387 1.1 jdolecek if ((ptyfs->ptyfs_flags & (SF_IMMUTABLE | SF_APPEND)) &&
388 1.1 jdolecek securelevel > 0)
389 1.1 jdolecek return EPERM;
390 1.1 jdolecek /* Snapshot flag cannot be set or cleared */
391 1.7 perry if ((vap->va_flags & SF_SNAPSHOT) !=
392 1.1 jdolecek (ptyfs->ptyfs_flags & SF_SNAPSHOT))
393 1.1 jdolecek return EPERM;
394 1.1 jdolecek ptyfs->ptyfs_flags = vap->va_flags;
395 1.1 jdolecek } else {
396 1.1 jdolecek if ((ptyfs->ptyfs_flags & (SF_IMMUTABLE | SF_APPEND)) ||
397 1.1 jdolecek (vap->va_flags & UF_SETTABLE) != vap->va_flags)
398 1.1 jdolecek return EPERM;
399 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SETTABLE) !=
400 1.1 jdolecek (vap->va_flags & SF_SETTABLE))
401 1.1 jdolecek return EPERM;
402 1.1 jdolecek ptyfs->ptyfs_flags &= SF_SETTABLE;
403 1.1 jdolecek ptyfs->ptyfs_flags |= (vap->va_flags & UF_SETTABLE);
404 1.1 jdolecek }
405 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
406 1.1 jdolecek if (vap->va_flags & (IMMUTABLE | APPEND))
407 1.1 jdolecek return 0;
408 1.1 jdolecek }
409 1.1 jdolecek if (ptyfs->ptyfs_flags & (IMMUTABLE | APPEND))
410 1.1 jdolecek return EPERM;
411 1.1 jdolecek /*
412 1.1 jdolecek * Go through the fields and update iff not VNOVAL.
413 1.1 jdolecek */
414 1.1 jdolecek if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
415 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
416 1.1 jdolecek return EROFS;
417 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
418 1.1 jdolecek return EPERM;
419 1.1 jdolecek error = ptyfs_chown(vp, vap->va_uid, vap->va_gid, cred, p);
420 1.1 jdolecek if (error)
421 1.1 jdolecek return error;
422 1.1 jdolecek }
423 1.1 jdolecek
424 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
425 1.1 jdolecek vap->va_birthtime.tv_sec != VNOVAL) {
426 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
427 1.1 jdolecek return EROFS;
428 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0)
429 1.1 jdolecek return EPERM;
430 1.12.10.1 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
431 1.12.10.2 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
432 1.12.10.1 elad &p->p_acflag)) &&
433 1.7 perry ((vap->va_vaflags & VA_UTIMES_NULL) == 0 ||
434 1.12 christos (error = VOP_ACCESS(vp, VWRITE, cred, l)) != 0))
435 1.1 jdolecek return (error);
436 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL)
437 1.1 jdolecek if (!(vp->v_mount->mnt_flag & MNT_NOATIME))
438 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
439 1.1 jdolecek if (vap->va_mtime.tv_sec != VNOVAL)
440 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE | PTYFS_MODIFY;
441 1.1 jdolecek if (vap->va_birthtime.tv_sec != VNOVAL)
442 1.1 jdolecek ptyfs->ptyfs_birthtime = vap->va_birthtime;
443 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
444 1.11 yamt error = ptyfs_update(vp, &vap->va_atime, &vap->va_mtime, 0);
445 1.1 jdolecek if (error)
446 1.1 jdolecek return error;
447 1.1 jdolecek }
448 1.1 jdolecek if (vap->va_mode != (mode_t)VNOVAL) {
449 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
450 1.1 jdolecek return EROFS;
451 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
452 1.1 jdolecek return EPERM;
453 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0 &&
454 1.1 jdolecek (vap->va_mode &
455 1.1 jdolecek (S_IXUSR|S_IWUSR|S_IXGRP|S_IWGRP|S_IXOTH|S_IWOTH)))
456 1.1 jdolecek return EPERM;
457 1.1 jdolecek error = ptyfs_chmod(vp, vap->va_mode, cred, p);
458 1.1 jdolecek if (error)
459 1.1 jdolecek return error;
460 1.1 jdolecek }
461 1.1 jdolecek VN_KNOTE(vp, NOTE_ATTRIB);
462 1.1 jdolecek return 0;
463 1.1 jdolecek }
464 1.1 jdolecek
465 1.1 jdolecek /*
466 1.1 jdolecek * Change the mode on a file.
467 1.1 jdolecek * Inode must be locked before calling.
468 1.1 jdolecek */
469 1.1 jdolecek static int
470 1.12.10.1 elad ptyfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct proc *p)
471 1.1 jdolecek {
472 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
473 1.1 jdolecek int error;
474 1.1 jdolecek
475 1.12.10.1 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
476 1.12.10.2 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
477 1.12.10.1 elad &p->p_acflag)) != 0)
478 1.1 jdolecek return error;
479 1.1 jdolecek ptyfs->ptyfs_mode &= ~ALLPERMS;
480 1.1 jdolecek ptyfs->ptyfs_mode |= (mode & ALLPERMS);
481 1.1 jdolecek return 0;
482 1.1 jdolecek }
483 1.1 jdolecek
484 1.1 jdolecek /*
485 1.1 jdolecek * Perform chown operation on inode ip;
486 1.1 jdolecek * inode must be locked prior to call.
487 1.1 jdolecek */
488 1.1 jdolecek static int
489 1.12.10.1 elad ptyfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred,
490 1.1 jdolecek struct proc *p)
491 1.1 jdolecek {
492 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
493 1.1 jdolecek int error;
494 1.1 jdolecek
495 1.1 jdolecek if (uid == (uid_t)VNOVAL)
496 1.1 jdolecek uid = ptyfs->ptyfs_uid;
497 1.1 jdolecek if (gid == (gid_t)VNOVAL)
498 1.1 jdolecek gid = ptyfs->ptyfs_gid;
499 1.1 jdolecek /*
500 1.1 jdolecek * If we don't own the file, are trying to change the owner
501 1.1 jdolecek * of the file, or are not a member of the target group,
502 1.1 jdolecek * the caller's credentials must imply super-user privilege
503 1.1 jdolecek * or the call fails.
504 1.1 jdolecek */
505 1.12.10.1 elad if ((kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid || uid != ptyfs->ptyfs_uid ||
506 1.1 jdolecek (gid != ptyfs->ptyfs_gid &&
507 1.12.10.1 elad !(kauth_cred_getegid(cred) == gid || kauth_cred_groupmember(cred, (gid_t)gid)))) &&
508 1.12.10.2 elad ((error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
509 1.12.10.1 elad &p->p_acflag)) != 0))
510 1.1 jdolecek return error;
511 1.1 jdolecek
512 1.1 jdolecek ptyfs->ptyfs_gid = gid;
513 1.1 jdolecek ptyfs->ptyfs_uid = uid;
514 1.1 jdolecek return 0;
515 1.1 jdolecek }
516 1.1 jdolecek
517 1.1 jdolecek /*
518 1.1 jdolecek * implement access checking.
519 1.1 jdolecek *
520 1.1 jdolecek * actually, the check for super-user is slightly
521 1.1 jdolecek * broken since it will allow read access to write-only
522 1.1 jdolecek * objects. this doesn't cause any particular trouble
523 1.1 jdolecek * but does mean that the i/o entry points need to check
524 1.1 jdolecek * that the operation really does make sense.
525 1.1 jdolecek */
526 1.1 jdolecek int
527 1.1 jdolecek ptyfs_access(void *v)
528 1.1 jdolecek {
529 1.1 jdolecek struct vop_access_args /* {
530 1.1 jdolecek struct vnode *a_vp;
531 1.1 jdolecek int a_mode;
532 1.12.10.1 elad kauth_cred_t a_cred;
533 1.12 christos struct lwp *a_l;
534 1.1 jdolecek } */ *ap = v;
535 1.1 jdolecek struct vattr va;
536 1.1 jdolecek int error;
537 1.1 jdolecek
538 1.12 christos if ((error = VOP_GETATTR(ap->a_vp, &va, ap->a_cred, ap->a_l)) != 0)
539 1.1 jdolecek return error;
540 1.1 jdolecek
541 1.1 jdolecek return vaccess(va.va_type, va.va_mode,
542 1.1 jdolecek va.va_uid, va.va_gid, ap->a_mode, ap->a_cred);
543 1.1 jdolecek }
544 1.1 jdolecek
545 1.1 jdolecek /*
546 1.1 jdolecek * lookup. this is incredibly complicated in the
547 1.1 jdolecek * general case, however for most pseudo-filesystems
548 1.1 jdolecek * very little needs to be done.
549 1.1 jdolecek *
550 1.1 jdolecek * Locking isn't hard here, just poorly documented.
551 1.1 jdolecek *
552 1.7 perry * If we're looking up ".", just vref the parent & return it.
553 1.1 jdolecek *
554 1.1 jdolecek * If we're looking up "..", unlock the parent, and lock "..". If everything
555 1.1 jdolecek * went ok, and we're on the last component and the caller requested the
556 1.1 jdolecek * parent locked, try to re-lock the parent. We do this to prevent lock
557 1.1 jdolecek * races.
558 1.1 jdolecek *
559 1.1 jdolecek * For anything else, get the needed node. Then unlock the parent if not
560 1.1 jdolecek * the last component or not LOCKPARENT (i.e. if we wouldn't re-lock the
561 1.1 jdolecek * parent in the .. case).
562 1.1 jdolecek *
563 1.1 jdolecek * We try to exit with the parent locked in error cases.
564 1.1 jdolecek */
565 1.1 jdolecek int
566 1.1 jdolecek ptyfs_lookup(void *v)
567 1.1 jdolecek {
568 1.1 jdolecek struct vop_lookup_args /* {
569 1.1 jdolecek struct vnode * a_dvp;
570 1.1 jdolecek struct vnode ** a_vpp;
571 1.1 jdolecek struct componentname * a_cnp;
572 1.1 jdolecek } */ *ap = v;
573 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
574 1.1 jdolecek struct vnode **vpp = ap->a_vpp;
575 1.1 jdolecek struct vnode *dvp = ap->a_dvp;
576 1.1 jdolecek const char *pname = cnp->cn_nameptr;
577 1.1 jdolecek struct ptyfsnode *ptyfs;
578 1.1 jdolecek int pty, error, wantpunlock;
579 1.1 jdolecek
580 1.1 jdolecek *vpp = NULL;
581 1.1 jdolecek cnp->cn_flags &= ~PDIRUNLOCK;
582 1.1 jdolecek
583 1.1 jdolecek if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)
584 1.1 jdolecek return EROFS;
585 1.1 jdolecek
586 1.1 jdolecek if (cnp->cn_namelen == 1 && *pname == '.') {
587 1.1 jdolecek *vpp = dvp;
588 1.1 jdolecek VREF(dvp);
589 1.1 jdolecek return 0;
590 1.1 jdolecek }
591 1.1 jdolecek
592 1.1 jdolecek wantpunlock = ~cnp->cn_flags & (LOCKPARENT | ISLASTCN);
593 1.1 jdolecek ptyfs = VTOPTYFS(dvp);
594 1.1 jdolecek switch (ptyfs->ptyfs_type) {
595 1.1 jdolecek case PTYFSroot:
596 1.1 jdolecek /*
597 1.1 jdolecek * Shouldn't get here with .. in the root node.
598 1.1 jdolecek */
599 1.7 perry if (cnp->cn_flags & ISDOTDOT)
600 1.1 jdolecek return EIO;
601 1.1 jdolecek
602 1.1 jdolecek pty = atoi(pname, cnp->cn_namelen);
603 1.1 jdolecek
604 1.1 jdolecek if (pty < 0 || pty >= npty || pty_isfree(pty, 1))
605 1.1 jdolecek break;
606 1.1 jdolecek
607 1.1 jdolecek error = ptyfs_allocvp(dvp->v_mount, vpp, PTYFSpts, pty,
608 1.12 christos curlwp);
609 1.1 jdolecek if (error == 0 && wantpunlock) {
610 1.1 jdolecek VOP_UNLOCK(dvp, 0);
611 1.1 jdolecek cnp->cn_flags |= PDIRUNLOCK;
612 1.1 jdolecek }
613 1.1 jdolecek return error;
614 1.1 jdolecek
615 1.1 jdolecek default:
616 1.1 jdolecek return ENOTDIR;
617 1.1 jdolecek }
618 1.1 jdolecek
619 1.1 jdolecek return cnp->cn_nameiop == LOOKUP ? ENOENT : EROFS;
620 1.1 jdolecek }
621 1.1 jdolecek
622 1.1 jdolecek /*
623 1.1 jdolecek * readdir returns directory entries from ptyfsnode (vp).
624 1.1 jdolecek *
625 1.1 jdolecek * the strategy here with ptyfs is to generate a single
626 1.1 jdolecek * directory entry at a time (struct dirent) and then
627 1.1 jdolecek * copy that out to userland using uiomove. a more efficent
628 1.1 jdolecek * though more complex implementation, would try to minimize
629 1.1 jdolecek * the number of calls to uiomove(). for ptyfs, this is
630 1.1 jdolecek * hardly worth the added code complexity.
631 1.1 jdolecek *
632 1.1 jdolecek * this should just be done through read()
633 1.1 jdolecek */
634 1.1 jdolecek int
635 1.1 jdolecek ptyfs_readdir(void *v)
636 1.1 jdolecek {
637 1.1 jdolecek struct vop_readdir_args /* {
638 1.1 jdolecek struct vnode *a_vp;
639 1.1 jdolecek struct uio *a_uio;
640 1.12.10.1 elad kauth_cred_t a_cred;
641 1.1 jdolecek int *a_eofflag;
642 1.1 jdolecek off_t **a_cookies;
643 1.1 jdolecek int *a_ncookies;
644 1.1 jdolecek } */ *ap = v;
645 1.1 jdolecek struct uio *uio = ap->a_uio;
646 1.1 jdolecek struct dirent d;
647 1.1 jdolecek struct ptyfsnode *ptyfs;
648 1.1 jdolecek off_t i;
649 1.1 jdolecek int error;
650 1.1 jdolecek off_t *cookies = NULL;
651 1.1 jdolecek int ncookies;
652 1.1 jdolecek struct vnode *vp;
653 1.1 jdolecek int nc = 0;
654 1.1 jdolecek
655 1.1 jdolecek vp = ap->a_vp;
656 1.1 jdolecek ptyfs = VTOPTYFS(vp);
657 1.1 jdolecek
658 1.1 jdolecek if (uio->uio_resid < UIO_MX)
659 1.1 jdolecek return EINVAL;
660 1.1 jdolecek if (uio->uio_offset < 0)
661 1.1 jdolecek return EINVAL;
662 1.1 jdolecek
663 1.1 jdolecek error = 0;
664 1.1 jdolecek i = uio->uio_offset;
665 1.1 jdolecek (void)memset(&d, 0, sizeof(d));
666 1.1 jdolecek d.d_reclen = UIO_MX;
667 1.1 jdolecek ncookies = uio->uio_resid / UIO_MX;
668 1.1 jdolecek
669 1.1 jdolecek switch (ptyfs->ptyfs_type) {
670 1.1 jdolecek case PTYFSroot: /* root */
671 1.1 jdolecek
672 1.1 jdolecek if (i >= npty)
673 1.1 jdolecek return 0;
674 1.1 jdolecek
675 1.1 jdolecek if (ap->a_ncookies) {
676 1.1 jdolecek ncookies = min(ncookies, (npty + 2 - i));
677 1.1 jdolecek cookies = malloc(ncookies * sizeof (off_t),
678 1.1 jdolecek M_TEMP, M_WAITOK);
679 1.1 jdolecek *ap->a_cookies = cookies;
680 1.1 jdolecek }
681 1.1 jdolecek
682 1.1 jdolecek for (; i < 2; i++) {
683 1.1 jdolecek switch (i) {
684 1.1 jdolecek case 0: /* `.' */
685 1.1 jdolecek case 1: /* `..' */
686 1.1 jdolecek d.d_fileno = PTYFS_FILENO(0, PTYFSroot);
687 1.1 jdolecek d.d_namlen = i + 1;
688 1.1 jdolecek (void)memcpy(d.d_name, "..", d.d_namlen);
689 1.1 jdolecek d.d_name[i + 1] = '\0';
690 1.1 jdolecek d.d_type = DT_DIR;
691 1.1 jdolecek break;
692 1.1 jdolecek }
693 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
694 1.1 jdolecek break;
695 1.1 jdolecek if (cookies)
696 1.1 jdolecek *cookies++ = i + 1;
697 1.1 jdolecek nc++;
698 1.1 jdolecek }
699 1.1 jdolecek if (error) {
700 1.1 jdolecek ncookies = nc;
701 1.1 jdolecek break;
702 1.1 jdolecek }
703 1.1 jdolecek for (; uio->uio_resid >= UIO_MX && i < npty; i++) {
704 1.1 jdolecek /* check for used ptys */
705 1.1 jdolecek if (pty_isfree(i - 2, 1))
706 1.1 jdolecek continue;
707 1.1 jdolecek
708 1.1 jdolecek d.d_fileno = PTYFS_FILENO(i - 2, PTYFSpts);
709 1.1 jdolecek d.d_namlen = snprintf(d.d_name, sizeof(d.d_name),
710 1.1 jdolecek "%lld", (long long)(i - 2));
711 1.1 jdolecek d.d_type = DT_CHR;
712 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
713 1.1 jdolecek break;
714 1.1 jdolecek if (cookies)
715 1.1 jdolecek *cookies++ = i + 1;
716 1.1 jdolecek nc++;
717 1.1 jdolecek }
718 1.1 jdolecek ncookies = nc;
719 1.1 jdolecek break;
720 1.1 jdolecek
721 1.1 jdolecek default:
722 1.1 jdolecek error = ENOTDIR;
723 1.1 jdolecek break;
724 1.1 jdolecek }
725 1.1 jdolecek
726 1.1 jdolecek if (ap->a_ncookies) {
727 1.1 jdolecek if (error) {
728 1.1 jdolecek if (cookies)
729 1.1 jdolecek free(*ap->a_cookies, M_TEMP);
730 1.1 jdolecek *ap->a_ncookies = 0;
731 1.1 jdolecek *ap->a_cookies = NULL;
732 1.1 jdolecek } else
733 1.1 jdolecek *ap->a_ncookies = ncookies;
734 1.1 jdolecek }
735 1.1 jdolecek uio->uio_offset = i;
736 1.1 jdolecek return error;
737 1.1 jdolecek }
738 1.1 jdolecek
739 1.1 jdolecek int
740 1.1 jdolecek ptyfs_open(void *v)
741 1.1 jdolecek {
742 1.1 jdolecek struct vop_open_args /* {
743 1.1 jdolecek struct vnode *a_vp;
744 1.1 jdolecek int a_mode;
745 1.12.10.1 elad kauth_cred_t a_cred;
746 1.12 christos struct lwp *a_l;
747 1.1 jdolecek } */ *ap = v;
748 1.1 jdolecek struct vnode *vp = ap->a_vp;
749 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
750 1.1 jdolecek
751 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE|PTYFS_ACCESS;
752 1.1 jdolecek switch (ptyfs->ptyfs_type) {
753 1.1 jdolecek case PTYFSpts:
754 1.1 jdolecek case PTYFSptc:
755 1.1 jdolecek return spec_open(v);
756 1.1 jdolecek case PTYFSroot:
757 1.1 jdolecek return 0;
758 1.1 jdolecek default:
759 1.1 jdolecek return EINVAL;
760 1.1 jdolecek }
761 1.1 jdolecek }
762 1.1 jdolecek
763 1.1 jdolecek int
764 1.1 jdolecek ptyfs_close(void *v)
765 1.1 jdolecek {
766 1.1 jdolecek struct vop_close_args /* {
767 1.1 jdolecek struct vnode *a_vp;
768 1.1 jdolecek int a_fflag;
769 1.12.10.1 elad kauth_cred_t a_cred;
770 1.12 christos struct lwp *a_l;
771 1.1 jdolecek } */ *ap = v;
772 1.1 jdolecek struct vnode *vp = ap->a_vp;
773 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
774 1.7 perry
775 1.1 jdolecek simple_lock(&vp->v_interlock);
776 1.8 christos if (vp->v_usecount > 1)
777 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
778 1.1 jdolecek simple_unlock(&vp->v_interlock);
779 1.1 jdolecek
780 1.1 jdolecek switch (ptyfs->ptyfs_type) {
781 1.1 jdolecek case PTYFSpts:
782 1.1 jdolecek case PTYFSptc:
783 1.1 jdolecek return spec_close(v);
784 1.1 jdolecek case PTYFSroot:
785 1.1 jdolecek return 0;
786 1.1 jdolecek default:
787 1.1 jdolecek return EINVAL;
788 1.1 jdolecek }
789 1.1 jdolecek }
790 1.1 jdolecek
791 1.1 jdolecek int
792 1.1 jdolecek ptyfs_read(void *v)
793 1.1 jdolecek {
794 1.1 jdolecek struct vop_read_args /* {
795 1.1 jdolecek struct vnode *a_vp;
796 1.1 jdolecek struct uio *a_uio;
797 1.1 jdolecek int a_ioflag;
798 1.12.10.1 elad kauth_cred_t a_cred;
799 1.1 jdolecek } */ *ap = v;
800 1.10 simonb struct timespec ts;
801 1.1 jdolecek struct vnode *vp = ap->a_vp;
802 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
803 1.1 jdolecek int error;
804 1.1 jdolecek
805 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
806 1.10 simonb /* hardclock() resolution is good enough for ptyfs */
807 1.10 simonb TIMEVAL_TO_TIMESPEC(&time, &ts);
808 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
809 1.10 simonb
810 1.1 jdolecek switch (ptyfs->ptyfs_type) {
811 1.1 jdolecek case PTYFSpts:
812 1.1 jdolecek VOP_UNLOCK(vp, 0);
813 1.1 jdolecek error = (*pts_cdevsw.d_read)(vp->v_rdev, ap->a_uio,
814 1.1 jdolecek ap->a_ioflag);
815 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
816 1.1 jdolecek return error;
817 1.1 jdolecek case PTYFSptc:
818 1.1 jdolecek VOP_UNLOCK(vp, 0);
819 1.1 jdolecek error = (*ptc_cdevsw.d_read)(vp->v_rdev, ap->a_uio,
820 1.1 jdolecek ap->a_ioflag);
821 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
822 1.1 jdolecek return error;
823 1.1 jdolecek default:
824 1.1 jdolecek return EOPNOTSUPP;
825 1.1 jdolecek }
826 1.1 jdolecek }
827 1.1 jdolecek
828 1.1 jdolecek int
829 1.1 jdolecek ptyfs_write(void *v)
830 1.1 jdolecek {
831 1.1 jdolecek struct vop_write_args /* {
832 1.1 jdolecek struct vnode *a_vp;
833 1.1 jdolecek struct uio *a_uio;
834 1.1 jdolecek int a_ioflag;
835 1.12.10.1 elad kauth_cred_t a_cred;
836 1.1 jdolecek } */ *ap = v;
837 1.10 simonb struct timespec ts;
838 1.1 jdolecek struct vnode *vp = ap->a_vp;
839 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
840 1.10 simonb int error;
841 1.1 jdolecek
842 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_MODIFY;
843 1.10 simonb /* hardclock() resolution is good enough for ptyfs */
844 1.10 simonb TIMEVAL_TO_TIMESPEC(&time, &ts);
845 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
846 1.10 simonb
847 1.1 jdolecek switch (ptyfs->ptyfs_type) {
848 1.1 jdolecek case PTYFSpts:
849 1.1 jdolecek VOP_UNLOCK(vp, 0);
850 1.1 jdolecek error = (*pts_cdevsw.d_write)(vp->v_rdev, ap->a_uio,
851 1.1 jdolecek ap->a_ioflag);
852 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
853 1.1 jdolecek return error;
854 1.1 jdolecek case PTYFSptc:
855 1.1 jdolecek VOP_UNLOCK(vp, 0);
856 1.1 jdolecek error = (*ptc_cdevsw.d_write)(vp->v_rdev, ap->a_uio,
857 1.1 jdolecek ap->a_ioflag);
858 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
859 1.1 jdolecek return error;
860 1.1 jdolecek default:
861 1.1 jdolecek return EOPNOTSUPP;
862 1.1 jdolecek }
863 1.1 jdolecek }
864 1.1 jdolecek
865 1.1 jdolecek int
866 1.1 jdolecek ptyfs_ioctl(void *v)
867 1.1 jdolecek {
868 1.1 jdolecek struct vop_ioctl_args /* {
869 1.1 jdolecek struct vnode *a_vp;
870 1.1 jdolecek u_long a_command;
871 1.1 jdolecek void *a_data;
872 1.1 jdolecek int a_fflag;
873 1.12.10.1 elad kauth_cred_t a_cred;
874 1.12 christos struct lwp *a_l;
875 1.1 jdolecek } */ *ap = v;
876 1.1 jdolecek struct vnode *vp = ap->a_vp;
877 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
878 1.1 jdolecek
879 1.1 jdolecek switch (ptyfs->ptyfs_type) {
880 1.1 jdolecek case PTYFSpts:
881 1.1 jdolecek return (*pts_cdevsw.d_ioctl)(vp->v_rdev, ap->a_command,
882 1.12 christos ap->a_data, ap->a_fflag, ap->a_l);
883 1.1 jdolecek case PTYFSptc:
884 1.1 jdolecek return (*ptc_cdevsw.d_ioctl)(vp->v_rdev, ap->a_command,
885 1.12 christos ap->a_data, ap->a_fflag, ap->a_l);
886 1.1 jdolecek default:
887 1.1 jdolecek return EOPNOTSUPP;
888 1.1 jdolecek }
889 1.1 jdolecek }
890 1.1 jdolecek
891 1.1 jdolecek int
892 1.1 jdolecek ptyfs_poll(void *v)
893 1.1 jdolecek {
894 1.1 jdolecek struct vop_poll_args /* {
895 1.1 jdolecek struct vnode *a_vp;
896 1.1 jdolecek int a_events;
897 1.12 christos struct lwp *a_l;
898 1.1 jdolecek } */ *ap = v;
899 1.1 jdolecek struct vnode *vp = ap->a_vp;
900 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
901 1.1 jdolecek
902 1.1 jdolecek switch (ptyfs->ptyfs_type) {
903 1.1 jdolecek case PTYFSpts:
904 1.12 christos return (*pts_cdevsw.d_poll)(vp->v_rdev, ap->a_events, ap->a_l);
905 1.1 jdolecek case PTYFSptc:
906 1.12 christos return (*ptc_cdevsw.d_poll)(vp->v_rdev, ap->a_events, ap->a_l);
907 1.1 jdolecek default:
908 1.1 jdolecek return genfs_poll(v);
909 1.1 jdolecek }
910 1.1 jdolecek }
911 1.1 jdolecek
912 1.1 jdolecek int
913 1.1 jdolecek ptyfs_kqfilter(void *v)
914 1.1 jdolecek {
915 1.1 jdolecek struct vop_kqfilter_args /* {
916 1.1 jdolecek struct vnode *a_vp;
917 1.1 jdolecek struct knote *a_kn;
918 1.1 jdolecek } */ *ap = v;
919 1.1 jdolecek struct vnode *vp = ap->a_vp;
920 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
921 1.1 jdolecek
922 1.1 jdolecek switch (ptyfs->ptyfs_type) {
923 1.1 jdolecek case PTYFSpts:
924 1.1 jdolecek return (*pts_cdevsw.d_kqfilter)(vp->v_rdev, ap->a_kn);
925 1.1 jdolecek case PTYFSptc:
926 1.1 jdolecek return (*ptc_cdevsw.d_kqfilter)(vp->v_rdev, ap->a_kn);
927 1.1 jdolecek default:
928 1.1 jdolecek return genfs_kqfilter(v);
929 1.1 jdolecek }
930 1.1 jdolecek }
931 1.1 jdolecek
932 1.11 yamt static int
933 1.11 yamt ptyfs_update(struct vnode *vp, const struct timespec *acc,
934 1.11 yamt const struct timespec *mod, int flags)
935 1.1 jdolecek {
936 1.11 yamt struct ptyfsnode *ptyfs = VTOPTYFS(vp);
937 1.1 jdolecek
938 1.11 yamt if (vp->v_mount->mnt_flag & MNT_RDONLY)
939 1.1 jdolecek return 0;
940 1.1 jdolecek
941 1.11 yamt PTYFS_ITIMES(ptyfs, acc, mod, NULL);
942 1.1 jdolecek return 0;
943 1.1 jdolecek }
944 1.1 jdolecek
945 1.8 christos void
946 1.8 christos ptyfs_itimes(struct ptyfsnode *ptyfs, const struct timespec *acc,
947 1.8 christos const struct timespec *mod, const struct timespec *cre)
948 1.8 christos {
949 1.8 christos struct timespec *ts = NULL, tsb;
950 1.8 christos
951 1.9 christos KASSERT(ptyfs->ptyfs_flag & (PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY));
952 1.8 christos if (ptyfs->ptyfs_flag & (PTYFS_ACCESS|PTYFS_MODIFY)) {
953 1.8 christos if (acc == NULL)
954 1.8 christos acc = ts == NULL ? (ts = nanotime(&tsb)) : ts;
955 1.8 christos ptyfs->ptyfs_atime = *acc;
956 1.8 christos }
957 1.1 jdolecek if (ptyfs->ptyfs_flag & PTYFS_MODIFY) {
958 1.8 christos if (mod == NULL)
959 1.8 christos mod = ts == NULL ? (ts = nanotime(&tsb)) : ts;
960 1.8 christos ptyfs->ptyfs_mtime = *mod;
961 1.8 christos }
962 1.8 christos if (ptyfs->ptyfs_flag & PTYFS_CHANGE) {
963 1.8 christos if (cre == NULL)
964 1.8 christos cre = ts == NULL ? (ts = nanotime(&tsb)) : ts;
965 1.9 christos ptyfs->ptyfs_ctime = *cre;
966 1.8 christos }
967 1.9 christos ptyfs->ptyfs_flag &= ~(PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY);
968 1.1 jdolecek }
969 1.7 perry
970 1.1 jdolecek /*
971 1.1 jdolecek * convert decimal ascii to int
972 1.1 jdolecek */
973 1.1 jdolecek static int
974 1.1 jdolecek atoi(const char *b, size_t len)
975 1.1 jdolecek {
976 1.1 jdolecek int p = 0;
977 1.1 jdolecek
978 1.1 jdolecek while (len--) {
979 1.1 jdolecek char c = *b++;
980 1.1 jdolecek if (c < '0' || c > '9')
981 1.1 jdolecek return -1;
982 1.1 jdolecek p = 10 * p + (c - '0');
983 1.1 jdolecek }
984 1.1 jdolecek
985 1.1 jdolecek return p;
986 1.1 jdolecek }
987