ptyfs_vnops.c revision 1.14 1 1.14 elad /* $NetBSD: ptyfs_vnops.c,v 1.14 2006/05/14 21:31:52 elad Exp $ */
2 1.1 jdolecek
3 1.1 jdolecek /*
4 1.1 jdolecek * Copyright (c) 1993, 1995
5 1.1 jdolecek * The Regents of the University of California. All rights reserved.
6 1.1 jdolecek *
7 1.1 jdolecek * This code is derived from software contributed to Berkeley by
8 1.1 jdolecek * Jan-Simon Pendry.
9 1.1 jdolecek *
10 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.1 jdolecek * modification, are permitted provided that the following conditions
12 1.1 jdolecek * are met:
13 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.1 jdolecek * documentation and/or other materials provided with the distribution.
18 1.1 jdolecek * 3. Neither the name of the University nor the names of its contributors
19 1.1 jdolecek * may be used to endorse or promote products derived from this software
20 1.1 jdolecek * without specific prior written permission.
21 1.1 jdolecek *
22 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 jdolecek * SUCH DAMAGE.
33 1.1 jdolecek *
34 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
35 1.1 jdolecek */
36 1.1 jdolecek
37 1.1 jdolecek /*
38 1.1 jdolecek * Copyright (c) 1993 Jan-Simon Pendry
39 1.1 jdolecek *
40 1.1 jdolecek * This code is derived from software contributed to Berkeley by
41 1.1 jdolecek * Jan-Simon Pendry.
42 1.1 jdolecek *
43 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
44 1.1 jdolecek * modification, are permitted provided that the following conditions
45 1.1 jdolecek * are met:
46 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
47 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
48 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
49 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
50 1.1 jdolecek * documentation and/or other materials provided with the distribution.
51 1.1 jdolecek * 3. All advertising materials mentioning features or use of this software
52 1.1 jdolecek * must display the following acknowledgement:
53 1.1 jdolecek * This product includes software developed by the University of
54 1.1 jdolecek * California, Berkeley and its contributors.
55 1.1 jdolecek * 4. Neither the name of the University nor the names of its contributors
56 1.1 jdolecek * may be used to endorse or promote products derived from this software
57 1.1 jdolecek * without specific prior written permission.
58 1.1 jdolecek *
59 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
60 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
63 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69 1.1 jdolecek * SUCH DAMAGE.
70 1.1 jdolecek *
71 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
72 1.1 jdolecek */
73 1.1 jdolecek
74 1.1 jdolecek /*
75 1.1 jdolecek * ptyfs vnode interface
76 1.1 jdolecek */
77 1.1 jdolecek
78 1.1 jdolecek #include <sys/cdefs.h>
79 1.14 elad __KERNEL_RCSID(0, "$NetBSD: ptyfs_vnops.c,v 1.14 2006/05/14 21:31:52 elad Exp $");
80 1.1 jdolecek
81 1.1 jdolecek #include <sys/param.h>
82 1.1 jdolecek #include <sys/systm.h>
83 1.1 jdolecek #include <sys/time.h>
84 1.1 jdolecek #include <sys/kernel.h>
85 1.1 jdolecek #include <sys/file.h>
86 1.1 jdolecek #include <sys/filedesc.h>
87 1.1 jdolecek #include <sys/proc.h>
88 1.1 jdolecek #include <sys/vnode.h>
89 1.1 jdolecek #include <sys/namei.h>
90 1.1 jdolecek #include <sys/malloc.h>
91 1.1 jdolecek #include <sys/mount.h>
92 1.1 jdolecek #include <sys/select.h>
93 1.1 jdolecek #include <sys/dirent.h>
94 1.1 jdolecek #include <sys/resourcevar.h>
95 1.1 jdolecek #include <sys/stat.h>
96 1.1 jdolecek #include <sys/conf.h>
97 1.1 jdolecek #include <sys/tty.h>
98 1.1 jdolecek #include <sys/pty.h>
99 1.14 elad #include <sys/kauth.h>
100 1.1 jdolecek
101 1.1 jdolecek #include <uvm/uvm_extern.h> /* for PAGE_SIZE */
102 1.1 jdolecek
103 1.1 jdolecek #include <machine/reg.h>
104 1.1 jdolecek
105 1.2 jdolecek #include <fs/ptyfs/ptyfs.h>
106 1.1 jdolecek #include <miscfs/genfs/genfs.h>
107 1.1 jdolecek #include <miscfs/specfs/specdev.h>
108 1.1 jdolecek
109 1.1 jdolecek /*
110 1.1 jdolecek * Vnode Operations.
111 1.1 jdolecek *
112 1.1 jdolecek */
113 1.1 jdolecek
114 1.1 jdolecek int ptyfs_lookup (void *);
115 1.1 jdolecek #define ptyfs_create genfs_eopnotsupp
116 1.1 jdolecek #define ptyfs_mknod genfs_eopnotsupp
117 1.1 jdolecek int ptyfs_open (void *);
118 1.1 jdolecek int ptyfs_close (void *);
119 1.1 jdolecek int ptyfs_access (void *);
120 1.1 jdolecek int ptyfs_getattr (void *);
121 1.1 jdolecek int ptyfs_setattr (void *);
122 1.1 jdolecek int ptyfs_read (void *);
123 1.1 jdolecek int ptyfs_write (void *);
124 1.1 jdolecek #define ptyfs_fcntl genfs_fcntl
125 1.1 jdolecek int ptyfs_ioctl (void *);
126 1.1 jdolecek int ptyfs_poll (void *);
127 1.1 jdolecek int ptyfs_kqfilter (void *);
128 1.1 jdolecek #define ptyfs_revoke genfs_revoke
129 1.1 jdolecek #define ptyfs_mmap genfs_eopnotsupp
130 1.1 jdolecek #define ptyfs_fsync genfs_nullop
131 1.1 jdolecek #define ptyfs_seek genfs_nullop
132 1.1 jdolecek #define ptyfs_remove genfs_eopnotsupp
133 1.1 jdolecek #define ptyfs_link genfs_abortop
134 1.1 jdolecek #define ptyfs_rename genfs_eopnotsupp
135 1.1 jdolecek #define ptyfs_mkdir genfs_eopnotsupp
136 1.1 jdolecek #define ptyfs_rmdir genfs_eopnotsupp
137 1.1 jdolecek #define ptyfs_symlink genfs_abortop
138 1.1 jdolecek int ptyfs_readdir (void *);
139 1.1 jdolecek #define ptyfs_readlink genfs_eopnotsupp
140 1.1 jdolecek #define ptyfs_abortop genfs_abortop
141 1.1 jdolecek int ptyfs_reclaim (void *);
142 1.1 jdolecek #define ptyfs_lock genfs_lock
143 1.1 jdolecek #define ptyfs_unlock genfs_unlock
144 1.1 jdolecek #define ptyfs_bmap genfs_badop
145 1.1 jdolecek #define ptyfs_strategy genfs_badop
146 1.1 jdolecek int ptyfs_print (void *);
147 1.1 jdolecek int ptyfs_pathconf (void *);
148 1.1 jdolecek #define ptyfs_islocked genfs_islocked
149 1.1 jdolecek #define ptyfs_advlock genfs_einval
150 1.1 jdolecek #define ptyfs_bwrite genfs_eopnotsupp
151 1.1 jdolecek #define ptyfs_putpages genfs_null_putpages
152 1.1 jdolecek
153 1.11 yamt static int ptyfs_update(struct vnode *, const struct timespec *,
154 1.11 yamt const struct timespec *, int);
155 1.14 elad static int ptyfs_chown(struct vnode *, uid_t, gid_t, kauth_cred_t,
156 1.1 jdolecek struct proc *);
157 1.14 elad static int ptyfs_chmod(struct vnode *, mode_t, kauth_cred_t, struct proc *);
158 1.1 jdolecek static int atoi(const char *, size_t);
159 1.1 jdolecek
160 1.1 jdolecek extern const struct cdevsw pts_cdevsw, ptc_cdevsw;
161 1.1 jdolecek
162 1.1 jdolecek /*
163 1.1 jdolecek * ptyfs vnode operations.
164 1.1 jdolecek */
165 1.1 jdolecek int (**ptyfs_vnodeop_p)(void *);
166 1.1 jdolecek const struct vnodeopv_entry_desc ptyfs_vnodeop_entries[] = {
167 1.1 jdolecek { &vop_default_desc, vn_default_error },
168 1.1 jdolecek { &vop_lookup_desc, ptyfs_lookup }, /* lookup */
169 1.1 jdolecek { &vop_create_desc, ptyfs_create }, /* create */
170 1.1 jdolecek { &vop_mknod_desc, ptyfs_mknod }, /* mknod */
171 1.1 jdolecek { &vop_open_desc, ptyfs_open }, /* open */
172 1.1 jdolecek { &vop_close_desc, ptyfs_close }, /* close */
173 1.1 jdolecek { &vop_access_desc, ptyfs_access }, /* access */
174 1.1 jdolecek { &vop_getattr_desc, ptyfs_getattr }, /* getattr */
175 1.1 jdolecek { &vop_setattr_desc, ptyfs_setattr }, /* setattr */
176 1.1 jdolecek { &vop_read_desc, ptyfs_read }, /* read */
177 1.1 jdolecek { &vop_write_desc, ptyfs_write }, /* write */
178 1.1 jdolecek { &vop_ioctl_desc, ptyfs_ioctl }, /* ioctl */
179 1.1 jdolecek { &vop_fcntl_desc, ptyfs_fcntl }, /* fcntl */
180 1.1 jdolecek { &vop_poll_desc, ptyfs_poll }, /* poll */
181 1.1 jdolecek { &vop_kqfilter_desc, ptyfs_kqfilter }, /* kqfilter */
182 1.1 jdolecek { &vop_revoke_desc, ptyfs_revoke }, /* revoke */
183 1.1 jdolecek { &vop_mmap_desc, ptyfs_mmap }, /* mmap */
184 1.1 jdolecek { &vop_fsync_desc, ptyfs_fsync }, /* fsync */
185 1.1 jdolecek { &vop_seek_desc, ptyfs_seek }, /* seek */
186 1.1 jdolecek { &vop_remove_desc, ptyfs_remove }, /* remove */
187 1.1 jdolecek { &vop_link_desc, ptyfs_link }, /* link */
188 1.1 jdolecek { &vop_rename_desc, ptyfs_rename }, /* rename */
189 1.1 jdolecek { &vop_mkdir_desc, ptyfs_mkdir }, /* mkdir */
190 1.1 jdolecek { &vop_rmdir_desc, ptyfs_rmdir }, /* rmdir */
191 1.1 jdolecek { &vop_symlink_desc, ptyfs_symlink }, /* symlink */
192 1.1 jdolecek { &vop_readdir_desc, ptyfs_readdir }, /* readdir */
193 1.1 jdolecek { &vop_readlink_desc, ptyfs_readlink }, /* readlink */
194 1.1 jdolecek { &vop_abortop_desc, ptyfs_abortop }, /* abortop */
195 1.6 christos { &vop_inactive_desc, spec_inactive }, /* inactive */
196 1.1 jdolecek { &vop_reclaim_desc, ptyfs_reclaim }, /* reclaim */
197 1.1 jdolecek { &vop_lock_desc, ptyfs_lock }, /* lock */
198 1.1 jdolecek { &vop_unlock_desc, ptyfs_unlock }, /* unlock */
199 1.1 jdolecek { &vop_bmap_desc, ptyfs_bmap }, /* bmap */
200 1.1 jdolecek { &vop_strategy_desc, ptyfs_strategy }, /* strategy */
201 1.1 jdolecek { &vop_print_desc, ptyfs_print }, /* print */
202 1.1 jdolecek { &vop_islocked_desc, ptyfs_islocked }, /* islocked */
203 1.1 jdolecek { &vop_pathconf_desc, ptyfs_pathconf }, /* pathconf */
204 1.1 jdolecek { &vop_advlock_desc, ptyfs_advlock }, /* advlock */
205 1.1 jdolecek { &vop_bwrite_desc, ptyfs_bwrite }, /* bwrite */
206 1.1 jdolecek { &vop_putpages_desc, ptyfs_putpages }, /* putpages */
207 1.1 jdolecek { NULL, NULL }
208 1.1 jdolecek };
209 1.1 jdolecek const struct vnodeopv_desc ptyfs_vnodeop_opv_desc =
210 1.1 jdolecek { &ptyfs_vnodeop_p, ptyfs_vnodeop_entries };
211 1.1 jdolecek
212 1.1 jdolecek /*
213 1.1 jdolecek * _reclaim is called when getnewvnode()
214 1.1 jdolecek * wants to make use of an entry on the vnode
215 1.1 jdolecek * free list. at this time the filesystem needs
216 1.1 jdolecek * to free any private data and remove the node
217 1.1 jdolecek * from any private lists.
218 1.1 jdolecek */
219 1.1 jdolecek int
220 1.1 jdolecek ptyfs_reclaim(void *v)
221 1.1 jdolecek {
222 1.1 jdolecek struct vop_reclaim_args /* {
223 1.1 jdolecek struct vnode *a_vp;
224 1.1 jdolecek } */ *ap = v;
225 1.1 jdolecek return ptyfs_freevp(ap->a_vp);
226 1.1 jdolecek }
227 1.1 jdolecek
228 1.1 jdolecek /*
229 1.1 jdolecek * Return POSIX pathconf information applicable to special devices.
230 1.1 jdolecek */
231 1.1 jdolecek int
232 1.1 jdolecek ptyfs_pathconf(void *v)
233 1.1 jdolecek {
234 1.1 jdolecek struct vop_pathconf_args /* {
235 1.1 jdolecek struct vnode *a_vp;
236 1.1 jdolecek int a_name;
237 1.1 jdolecek register_t *a_retval;
238 1.1 jdolecek } */ *ap = v;
239 1.1 jdolecek
240 1.1 jdolecek switch (ap->a_name) {
241 1.1 jdolecek case _PC_LINK_MAX:
242 1.1 jdolecek *ap->a_retval = LINK_MAX;
243 1.1 jdolecek return 0;
244 1.1 jdolecek case _PC_MAX_CANON:
245 1.1 jdolecek *ap->a_retval = MAX_CANON;
246 1.1 jdolecek return 0;
247 1.1 jdolecek case _PC_MAX_INPUT:
248 1.1 jdolecek *ap->a_retval = MAX_INPUT;
249 1.1 jdolecek return 0;
250 1.1 jdolecek case _PC_PIPE_BUF:
251 1.1 jdolecek *ap->a_retval = PIPE_BUF;
252 1.1 jdolecek return 0;
253 1.1 jdolecek case _PC_CHOWN_RESTRICTED:
254 1.1 jdolecek *ap->a_retval = 1;
255 1.1 jdolecek return 0;
256 1.1 jdolecek case _PC_VDISABLE:
257 1.1 jdolecek *ap->a_retval = _POSIX_VDISABLE;
258 1.1 jdolecek return 0;
259 1.1 jdolecek case _PC_SYNC_IO:
260 1.1 jdolecek *ap->a_retval = 1;
261 1.1 jdolecek return 0;
262 1.1 jdolecek default:
263 1.1 jdolecek return EINVAL;
264 1.1 jdolecek }
265 1.1 jdolecek }
266 1.1 jdolecek
267 1.1 jdolecek /*
268 1.1 jdolecek * _print is used for debugging.
269 1.1 jdolecek * just print a readable description
270 1.1 jdolecek * of (vp).
271 1.1 jdolecek */
272 1.1 jdolecek int
273 1.1 jdolecek ptyfs_print(void *v)
274 1.1 jdolecek {
275 1.1 jdolecek struct vop_print_args /* {
276 1.1 jdolecek struct vnode *a_vp;
277 1.1 jdolecek } */ *ap = v;
278 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
279 1.1 jdolecek
280 1.1 jdolecek printf("tag VT_PTYFS, type %d, pty %d\n",
281 1.1 jdolecek ptyfs->ptyfs_type, ptyfs->ptyfs_pty);
282 1.1 jdolecek return 0;
283 1.1 jdolecek }
284 1.1 jdolecek
285 1.1 jdolecek /*
286 1.1 jdolecek * Invent attributes for ptyfsnode (vp) and store
287 1.1 jdolecek * them in (vap).
288 1.1 jdolecek * Directories lengths are returned as zero since
289 1.1 jdolecek * any real length would require the genuine size
290 1.1 jdolecek * to be computed, and nothing cares anyway.
291 1.1 jdolecek *
292 1.1 jdolecek * this is relatively minimal for ptyfs.
293 1.1 jdolecek */
294 1.1 jdolecek int
295 1.1 jdolecek ptyfs_getattr(void *v)
296 1.1 jdolecek {
297 1.1 jdolecek struct vop_getattr_args /* {
298 1.1 jdolecek struct vnode *a_vp;
299 1.1 jdolecek struct vattr *a_vap;
300 1.14 elad kauth_cred_t a_cred;
301 1.12 christos struct lwp *a_l;
302 1.1 jdolecek } */ *ap = v;
303 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
304 1.1 jdolecek struct vattr *vap = ap->a_vap;
305 1.1 jdolecek
306 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
307 1.1 jdolecek
308 1.1 jdolecek /* start by zeroing out the attributes */
309 1.1 jdolecek VATTR_NULL(vap);
310 1.1 jdolecek
311 1.1 jdolecek /* next do all the common fields */
312 1.1 jdolecek vap->va_type = ap->a_vp->v_type;
313 1.4 atatat vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
314 1.1 jdolecek vap->va_fileid = ptyfs->ptyfs_fileno;
315 1.1 jdolecek vap->va_gen = 0;
316 1.1 jdolecek vap->va_flags = 0;
317 1.1 jdolecek vap->va_nlink = 1;
318 1.1 jdolecek vap->va_blocksize = PAGE_SIZE;
319 1.1 jdolecek
320 1.1 jdolecek vap->va_atime = ptyfs->ptyfs_atime;
321 1.1 jdolecek vap->va_mtime = ptyfs->ptyfs_mtime;
322 1.1 jdolecek vap->va_ctime = ptyfs->ptyfs_ctime;
323 1.1 jdolecek vap->va_birthtime = ptyfs->ptyfs_birthtime;
324 1.1 jdolecek vap->va_mode = ptyfs->ptyfs_mode;
325 1.1 jdolecek vap->va_flags = ptyfs->ptyfs_flags;
326 1.1 jdolecek vap->va_uid = ptyfs->ptyfs_uid;
327 1.1 jdolecek vap->va_gid = ptyfs->ptyfs_gid;
328 1.1 jdolecek
329 1.1 jdolecek switch (ptyfs->ptyfs_type) {
330 1.1 jdolecek case PTYFSpts:
331 1.1 jdolecek case PTYFSptc:
332 1.1 jdolecek if (pty_isfree(ptyfs->ptyfs_pty, 1))
333 1.1 jdolecek return ENOENT;
334 1.5 atatat vap->va_bytes = vap->va_size = 0;
335 1.7 perry vap->va_rdev = ap->a_vp->v_rdev;
336 1.1 jdolecek break;
337 1.1 jdolecek case PTYFSroot:
338 1.1 jdolecek vap->va_rdev = 0;
339 1.1 jdolecek vap->va_bytes = vap->va_size = DEV_BSIZE;
340 1.1 jdolecek break;
341 1.1 jdolecek
342 1.1 jdolecek default:
343 1.1 jdolecek return EOPNOTSUPP;
344 1.1 jdolecek }
345 1.1 jdolecek
346 1.1 jdolecek return 0;
347 1.1 jdolecek }
348 1.1 jdolecek
349 1.1 jdolecek /*ARGSUSED*/
350 1.1 jdolecek int
351 1.1 jdolecek ptyfs_setattr(void *v)
352 1.1 jdolecek {
353 1.1 jdolecek struct vop_setattr_args /* {
354 1.1 jdolecek struct vnodeop_desc *a_desc;
355 1.1 jdolecek struct vnode *a_vp;
356 1.1 jdolecek struct vattr *a_vap;
357 1.14 elad kauth_cred_t a_cred;
358 1.12 christos struct lwp *a_l;
359 1.1 jdolecek } */ *ap = v;
360 1.1 jdolecek struct vnode *vp = ap->a_vp;
361 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
362 1.1 jdolecek struct vattr *vap = ap->a_vap;
363 1.14 elad kauth_cred_t cred = ap->a_cred;
364 1.12 christos struct lwp *l = ap->a_l;
365 1.12 christos struct proc *p = l->l_proc;
366 1.1 jdolecek int error;
367 1.1 jdolecek
368 1.1 jdolecek if (vap->va_size != VNOVAL) {
369 1.1 jdolecek switch (ptyfs->ptyfs_type) {
370 1.1 jdolecek case PTYFSroot:
371 1.1 jdolecek return EISDIR;
372 1.1 jdolecek case PTYFSpts:
373 1.1 jdolecek case PTYFSptc:
374 1.1 jdolecek break;
375 1.1 jdolecek default:
376 1.1 jdolecek return EINVAL;
377 1.1 jdolecek }
378 1.1 jdolecek }
379 1.1 jdolecek
380 1.1 jdolecek if (vap->va_flags != VNOVAL) {
381 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
382 1.1 jdolecek return EROFS;
383 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
384 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
385 1.14 elad &p->p_acflag)) != 0)
386 1.1 jdolecek return error;
387 1.14 elad if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) == 0) {
388 1.1 jdolecek if ((ptyfs->ptyfs_flags & (SF_IMMUTABLE | SF_APPEND)) &&
389 1.1 jdolecek securelevel > 0)
390 1.1 jdolecek return EPERM;
391 1.1 jdolecek /* Snapshot flag cannot be set or cleared */
392 1.7 perry if ((vap->va_flags & SF_SNAPSHOT) !=
393 1.1 jdolecek (ptyfs->ptyfs_flags & SF_SNAPSHOT))
394 1.1 jdolecek return EPERM;
395 1.1 jdolecek ptyfs->ptyfs_flags = vap->va_flags;
396 1.1 jdolecek } else {
397 1.1 jdolecek if ((ptyfs->ptyfs_flags & (SF_IMMUTABLE | SF_APPEND)) ||
398 1.1 jdolecek (vap->va_flags & UF_SETTABLE) != vap->va_flags)
399 1.1 jdolecek return EPERM;
400 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SETTABLE) !=
401 1.1 jdolecek (vap->va_flags & SF_SETTABLE))
402 1.1 jdolecek return EPERM;
403 1.1 jdolecek ptyfs->ptyfs_flags &= SF_SETTABLE;
404 1.1 jdolecek ptyfs->ptyfs_flags |= (vap->va_flags & UF_SETTABLE);
405 1.1 jdolecek }
406 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
407 1.1 jdolecek if (vap->va_flags & (IMMUTABLE | APPEND))
408 1.1 jdolecek return 0;
409 1.1 jdolecek }
410 1.1 jdolecek if (ptyfs->ptyfs_flags & (IMMUTABLE | APPEND))
411 1.1 jdolecek return EPERM;
412 1.1 jdolecek /*
413 1.1 jdolecek * Go through the fields and update iff not VNOVAL.
414 1.1 jdolecek */
415 1.1 jdolecek if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
416 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
417 1.1 jdolecek return EROFS;
418 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
419 1.1 jdolecek return EPERM;
420 1.1 jdolecek error = ptyfs_chown(vp, vap->va_uid, vap->va_gid, cred, p);
421 1.1 jdolecek if (error)
422 1.1 jdolecek return error;
423 1.1 jdolecek }
424 1.1 jdolecek
425 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
426 1.1 jdolecek vap->va_birthtime.tv_sec != VNOVAL) {
427 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
428 1.1 jdolecek return EROFS;
429 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0)
430 1.1 jdolecek return EPERM;
431 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
432 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
433 1.14 elad &p->p_acflag)) &&
434 1.7 perry ((vap->va_vaflags & VA_UTIMES_NULL) == 0 ||
435 1.12 christos (error = VOP_ACCESS(vp, VWRITE, cred, l)) != 0))
436 1.1 jdolecek return (error);
437 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL)
438 1.1 jdolecek if (!(vp->v_mount->mnt_flag & MNT_NOATIME))
439 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
440 1.1 jdolecek if (vap->va_mtime.tv_sec != VNOVAL)
441 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE | PTYFS_MODIFY;
442 1.1 jdolecek if (vap->va_birthtime.tv_sec != VNOVAL)
443 1.1 jdolecek ptyfs->ptyfs_birthtime = vap->va_birthtime;
444 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
445 1.11 yamt error = ptyfs_update(vp, &vap->va_atime, &vap->va_mtime, 0);
446 1.1 jdolecek if (error)
447 1.1 jdolecek return error;
448 1.1 jdolecek }
449 1.1 jdolecek if (vap->va_mode != (mode_t)VNOVAL) {
450 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
451 1.1 jdolecek return EROFS;
452 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
453 1.1 jdolecek return EPERM;
454 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0 &&
455 1.1 jdolecek (vap->va_mode &
456 1.1 jdolecek (S_IXUSR|S_IWUSR|S_IXGRP|S_IWGRP|S_IXOTH|S_IWOTH)))
457 1.1 jdolecek return EPERM;
458 1.1 jdolecek error = ptyfs_chmod(vp, vap->va_mode, cred, p);
459 1.1 jdolecek if (error)
460 1.1 jdolecek return error;
461 1.1 jdolecek }
462 1.1 jdolecek VN_KNOTE(vp, NOTE_ATTRIB);
463 1.1 jdolecek return 0;
464 1.1 jdolecek }
465 1.1 jdolecek
466 1.1 jdolecek /*
467 1.1 jdolecek * Change the mode on a file.
468 1.1 jdolecek * Inode must be locked before calling.
469 1.1 jdolecek */
470 1.1 jdolecek static int
471 1.14 elad ptyfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct proc *p)
472 1.1 jdolecek {
473 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
474 1.1 jdolecek int error;
475 1.1 jdolecek
476 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
477 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
478 1.14 elad &p->p_acflag)) != 0)
479 1.1 jdolecek return error;
480 1.1 jdolecek ptyfs->ptyfs_mode &= ~ALLPERMS;
481 1.1 jdolecek ptyfs->ptyfs_mode |= (mode & ALLPERMS);
482 1.1 jdolecek return 0;
483 1.1 jdolecek }
484 1.1 jdolecek
485 1.1 jdolecek /*
486 1.1 jdolecek * Perform chown operation on inode ip;
487 1.1 jdolecek * inode must be locked prior to call.
488 1.1 jdolecek */
489 1.1 jdolecek static int
490 1.14 elad ptyfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred,
491 1.1 jdolecek struct proc *p)
492 1.1 jdolecek {
493 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
494 1.14 elad int error, ismember = 0;
495 1.1 jdolecek
496 1.1 jdolecek if (uid == (uid_t)VNOVAL)
497 1.1 jdolecek uid = ptyfs->ptyfs_uid;
498 1.1 jdolecek if (gid == (gid_t)VNOVAL)
499 1.1 jdolecek gid = ptyfs->ptyfs_gid;
500 1.1 jdolecek /*
501 1.1 jdolecek * If we don't own the file, are trying to change the owner
502 1.1 jdolecek * of the file, or are not a member of the target group,
503 1.1 jdolecek * the caller's credentials must imply super-user privilege
504 1.1 jdolecek * or the call fails.
505 1.1 jdolecek */
506 1.14 elad if ((kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid || uid != ptyfs->ptyfs_uid ||
507 1.1 jdolecek (gid != ptyfs->ptyfs_gid &&
508 1.14 elad !(kauth_cred_getegid(cred) == gid ||
509 1.14 elad (kauth_cred_ismember_gid(cred, gid, &ismember) == 0 && ismember)))) &&
510 1.14 elad ((error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
511 1.14 elad &p->p_acflag)) != 0))
512 1.1 jdolecek return error;
513 1.1 jdolecek
514 1.1 jdolecek ptyfs->ptyfs_gid = gid;
515 1.1 jdolecek ptyfs->ptyfs_uid = uid;
516 1.1 jdolecek return 0;
517 1.1 jdolecek }
518 1.1 jdolecek
519 1.1 jdolecek /*
520 1.1 jdolecek * implement access checking.
521 1.1 jdolecek *
522 1.1 jdolecek * actually, the check for super-user is slightly
523 1.1 jdolecek * broken since it will allow read access to write-only
524 1.1 jdolecek * objects. this doesn't cause any particular trouble
525 1.1 jdolecek * but does mean that the i/o entry points need to check
526 1.1 jdolecek * that the operation really does make sense.
527 1.1 jdolecek */
528 1.1 jdolecek int
529 1.1 jdolecek ptyfs_access(void *v)
530 1.1 jdolecek {
531 1.1 jdolecek struct vop_access_args /* {
532 1.1 jdolecek struct vnode *a_vp;
533 1.1 jdolecek int a_mode;
534 1.14 elad kauth_cred_t a_cred;
535 1.12 christos struct lwp *a_l;
536 1.1 jdolecek } */ *ap = v;
537 1.1 jdolecek struct vattr va;
538 1.1 jdolecek int error;
539 1.1 jdolecek
540 1.12 christos if ((error = VOP_GETATTR(ap->a_vp, &va, ap->a_cred, ap->a_l)) != 0)
541 1.1 jdolecek return error;
542 1.1 jdolecek
543 1.1 jdolecek return vaccess(va.va_type, va.va_mode,
544 1.1 jdolecek va.va_uid, va.va_gid, ap->a_mode, ap->a_cred);
545 1.1 jdolecek }
546 1.1 jdolecek
547 1.1 jdolecek /*
548 1.1 jdolecek * lookup. this is incredibly complicated in the
549 1.1 jdolecek * general case, however for most pseudo-filesystems
550 1.1 jdolecek * very little needs to be done.
551 1.1 jdolecek *
552 1.1 jdolecek * Locking isn't hard here, just poorly documented.
553 1.1 jdolecek *
554 1.7 perry * If we're looking up ".", just vref the parent & return it.
555 1.1 jdolecek *
556 1.1 jdolecek * If we're looking up "..", unlock the parent, and lock "..". If everything
557 1.1 jdolecek * went ok, and we're on the last component and the caller requested the
558 1.1 jdolecek * parent locked, try to re-lock the parent. We do this to prevent lock
559 1.1 jdolecek * races.
560 1.1 jdolecek *
561 1.1 jdolecek * For anything else, get the needed node. Then unlock the parent if not
562 1.1 jdolecek * the last component or not LOCKPARENT (i.e. if we wouldn't re-lock the
563 1.1 jdolecek * parent in the .. case).
564 1.1 jdolecek *
565 1.1 jdolecek * We try to exit with the parent locked in error cases.
566 1.1 jdolecek */
567 1.1 jdolecek int
568 1.1 jdolecek ptyfs_lookup(void *v)
569 1.1 jdolecek {
570 1.1 jdolecek struct vop_lookup_args /* {
571 1.1 jdolecek struct vnode * a_dvp;
572 1.1 jdolecek struct vnode ** a_vpp;
573 1.1 jdolecek struct componentname * a_cnp;
574 1.1 jdolecek } */ *ap = v;
575 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
576 1.1 jdolecek struct vnode **vpp = ap->a_vpp;
577 1.1 jdolecek struct vnode *dvp = ap->a_dvp;
578 1.1 jdolecek const char *pname = cnp->cn_nameptr;
579 1.1 jdolecek struct ptyfsnode *ptyfs;
580 1.1 jdolecek int pty, error, wantpunlock;
581 1.1 jdolecek
582 1.1 jdolecek *vpp = NULL;
583 1.1 jdolecek cnp->cn_flags &= ~PDIRUNLOCK;
584 1.1 jdolecek
585 1.1 jdolecek if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)
586 1.1 jdolecek return EROFS;
587 1.1 jdolecek
588 1.1 jdolecek if (cnp->cn_namelen == 1 && *pname == '.') {
589 1.1 jdolecek *vpp = dvp;
590 1.1 jdolecek VREF(dvp);
591 1.1 jdolecek return 0;
592 1.1 jdolecek }
593 1.1 jdolecek
594 1.1 jdolecek wantpunlock = ~cnp->cn_flags & (LOCKPARENT | ISLASTCN);
595 1.1 jdolecek ptyfs = VTOPTYFS(dvp);
596 1.1 jdolecek switch (ptyfs->ptyfs_type) {
597 1.1 jdolecek case PTYFSroot:
598 1.1 jdolecek /*
599 1.1 jdolecek * Shouldn't get here with .. in the root node.
600 1.1 jdolecek */
601 1.7 perry if (cnp->cn_flags & ISDOTDOT)
602 1.1 jdolecek return EIO;
603 1.1 jdolecek
604 1.1 jdolecek pty = atoi(pname, cnp->cn_namelen);
605 1.1 jdolecek
606 1.1 jdolecek if (pty < 0 || pty >= npty || pty_isfree(pty, 1))
607 1.1 jdolecek break;
608 1.1 jdolecek
609 1.1 jdolecek error = ptyfs_allocvp(dvp->v_mount, vpp, PTYFSpts, pty,
610 1.12 christos curlwp);
611 1.1 jdolecek if (error == 0 && wantpunlock) {
612 1.1 jdolecek VOP_UNLOCK(dvp, 0);
613 1.1 jdolecek cnp->cn_flags |= PDIRUNLOCK;
614 1.1 jdolecek }
615 1.1 jdolecek return error;
616 1.1 jdolecek
617 1.1 jdolecek default:
618 1.1 jdolecek return ENOTDIR;
619 1.1 jdolecek }
620 1.1 jdolecek
621 1.1 jdolecek return cnp->cn_nameiop == LOOKUP ? ENOENT : EROFS;
622 1.1 jdolecek }
623 1.1 jdolecek
624 1.1 jdolecek /*
625 1.1 jdolecek * readdir returns directory entries from ptyfsnode (vp).
626 1.1 jdolecek *
627 1.1 jdolecek * the strategy here with ptyfs is to generate a single
628 1.1 jdolecek * directory entry at a time (struct dirent) and then
629 1.1 jdolecek * copy that out to userland using uiomove. a more efficent
630 1.1 jdolecek * though more complex implementation, would try to minimize
631 1.1 jdolecek * the number of calls to uiomove(). for ptyfs, this is
632 1.1 jdolecek * hardly worth the added code complexity.
633 1.1 jdolecek *
634 1.1 jdolecek * this should just be done through read()
635 1.1 jdolecek */
636 1.1 jdolecek int
637 1.1 jdolecek ptyfs_readdir(void *v)
638 1.1 jdolecek {
639 1.1 jdolecek struct vop_readdir_args /* {
640 1.1 jdolecek struct vnode *a_vp;
641 1.1 jdolecek struct uio *a_uio;
642 1.14 elad kauth_cred_t a_cred;
643 1.1 jdolecek int *a_eofflag;
644 1.1 jdolecek off_t **a_cookies;
645 1.1 jdolecek int *a_ncookies;
646 1.1 jdolecek } */ *ap = v;
647 1.1 jdolecek struct uio *uio = ap->a_uio;
648 1.1 jdolecek struct dirent d;
649 1.1 jdolecek struct ptyfsnode *ptyfs;
650 1.1 jdolecek off_t i;
651 1.1 jdolecek int error;
652 1.1 jdolecek off_t *cookies = NULL;
653 1.1 jdolecek int ncookies;
654 1.1 jdolecek struct vnode *vp;
655 1.1 jdolecek int nc = 0;
656 1.1 jdolecek
657 1.1 jdolecek vp = ap->a_vp;
658 1.1 jdolecek ptyfs = VTOPTYFS(vp);
659 1.1 jdolecek
660 1.1 jdolecek if (uio->uio_resid < UIO_MX)
661 1.1 jdolecek return EINVAL;
662 1.1 jdolecek if (uio->uio_offset < 0)
663 1.1 jdolecek return EINVAL;
664 1.1 jdolecek
665 1.1 jdolecek error = 0;
666 1.1 jdolecek i = uio->uio_offset;
667 1.1 jdolecek (void)memset(&d, 0, sizeof(d));
668 1.1 jdolecek d.d_reclen = UIO_MX;
669 1.1 jdolecek ncookies = uio->uio_resid / UIO_MX;
670 1.1 jdolecek
671 1.1 jdolecek switch (ptyfs->ptyfs_type) {
672 1.1 jdolecek case PTYFSroot: /* root */
673 1.1 jdolecek
674 1.1 jdolecek if (i >= npty)
675 1.1 jdolecek return 0;
676 1.1 jdolecek
677 1.1 jdolecek if (ap->a_ncookies) {
678 1.1 jdolecek ncookies = min(ncookies, (npty + 2 - i));
679 1.1 jdolecek cookies = malloc(ncookies * sizeof (off_t),
680 1.1 jdolecek M_TEMP, M_WAITOK);
681 1.1 jdolecek *ap->a_cookies = cookies;
682 1.1 jdolecek }
683 1.1 jdolecek
684 1.1 jdolecek for (; i < 2; i++) {
685 1.1 jdolecek switch (i) {
686 1.1 jdolecek case 0: /* `.' */
687 1.1 jdolecek case 1: /* `..' */
688 1.1 jdolecek d.d_fileno = PTYFS_FILENO(0, PTYFSroot);
689 1.1 jdolecek d.d_namlen = i + 1;
690 1.1 jdolecek (void)memcpy(d.d_name, "..", d.d_namlen);
691 1.1 jdolecek d.d_name[i + 1] = '\0';
692 1.1 jdolecek d.d_type = DT_DIR;
693 1.1 jdolecek break;
694 1.1 jdolecek }
695 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
696 1.1 jdolecek break;
697 1.1 jdolecek if (cookies)
698 1.1 jdolecek *cookies++ = i + 1;
699 1.1 jdolecek nc++;
700 1.1 jdolecek }
701 1.1 jdolecek if (error) {
702 1.1 jdolecek ncookies = nc;
703 1.1 jdolecek break;
704 1.1 jdolecek }
705 1.1 jdolecek for (; uio->uio_resid >= UIO_MX && i < npty; i++) {
706 1.1 jdolecek /* check for used ptys */
707 1.1 jdolecek if (pty_isfree(i - 2, 1))
708 1.1 jdolecek continue;
709 1.1 jdolecek
710 1.1 jdolecek d.d_fileno = PTYFS_FILENO(i - 2, PTYFSpts);
711 1.1 jdolecek d.d_namlen = snprintf(d.d_name, sizeof(d.d_name),
712 1.1 jdolecek "%lld", (long long)(i - 2));
713 1.1 jdolecek d.d_type = DT_CHR;
714 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
715 1.1 jdolecek break;
716 1.1 jdolecek if (cookies)
717 1.1 jdolecek *cookies++ = i + 1;
718 1.1 jdolecek nc++;
719 1.1 jdolecek }
720 1.1 jdolecek ncookies = nc;
721 1.1 jdolecek break;
722 1.1 jdolecek
723 1.1 jdolecek default:
724 1.1 jdolecek error = ENOTDIR;
725 1.1 jdolecek break;
726 1.1 jdolecek }
727 1.1 jdolecek
728 1.1 jdolecek if (ap->a_ncookies) {
729 1.1 jdolecek if (error) {
730 1.1 jdolecek if (cookies)
731 1.1 jdolecek free(*ap->a_cookies, M_TEMP);
732 1.1 jdolecek *ap->a_ncookies = 0;
733 1.1 jdolecek *ap->a_cookies = NULL;
734 1.1 jdolecek } else
735 1.1 jdolecek *ap->a_ncookies = ncookies;
736 1.1 jdolecek }
737 1.1 jdolecek uio->uio_offset = i;
738 1.1 jdolecek return error;
739 1.1 jdolecek }
740 1.1 jdolecek
741 1.1 jdolecek int
742 1.1 jdolecek ptyfs_open(void *v)
743 1.1 jdolecek {
744 1.1 jdolecek struct vop_open_args /* {
745 1.1 jdolecek struct vnode *a_vp;
746 1.1 jdolecek int a_mode;
747 1.14 elad kauth_cred_t a_cred;
748 1.12 christos struct lwp *a_l;
749 1.1 jdolecek } */ *ap = v;
750 1.1 jdolecek struct vnode *vp = ap->a_vp;
751 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
752 1.1 jdolecek
753 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE|PTYFS_ACCESS;
754 1.1 jdolecek switch (ptyfs->ptyfs_type) {
755 1.1 jdolecek case PTYFSpts:
756 1.1 jdolecek case PTYFSptc:
757 1.1 jdolecek return spec_open(v);
758 1.1 jdolecek case PTYFSroot:
759 1.1 jdolecek return 0;
760 1.1 jdolecek default:
761 1.1 jdolecek return EINVAL;
762 1.1 jdolecek }
763 1.1 jdolecek }
764 1.1 jdolecek
765 1.1 jdolecek int
766 1.1 jdolecek ptyfs_close(void *v)
767 1.1 jdolecek {
768 1.1 jdolecek struct vop_close_args /* {
769 1.1 jdolecek struct vnode *a_vp;
770 1.1 jdolecek int a_fflag;
771 1.14 elad kauth_cred_t a_cred;
772 1.12 christos struct lwp *a_l;
773 1.1 jdolecek } */ *ap = v;
774 1.1 jdolecek struct vnode *vp = ap->a_vp;
775 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
776 1.7 perry
777 1.1 jdolecek simple_lock(&vp->v_interlock);
778 1.8 christos if (vp->v_usecount > 1)
779 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
780 1.1 jdolecek simple_unlock(&vp->v_interlock);
781 1.1 jdolecek
782 1.1 jdolecek switch (ptyfs->ptyfs_type) {
783 1.1 jdolecek case PTYFSpts:
784 1.1 jdolecek case PTYFSptc:
785 1.1 jdolecek return spec_close(v);
786 1.1 jdolecek case PTYFSroot:
787 1.1 jdolecek return 0;
788 1.1 jdolecek default:
789 1.1 jdolecek return EINVAL;
790 1.1 jdolecek }
791 1.1 jdolecek }
792 1.1 jdolecek
793 1.1 jdolecek int
794 1.1 jdolecek ptyfs_read(void *v)
795 1.1 jdolecek {
796 1.1 jdolecek struct vop_read_args /* {
797 1.1 jdolecek struct vnode *a_vp;
798 1.1 jdolecek struct uio *a_uio;
799 1.1 jdolecek int a_ioflag;
800 1.14 elad kauth_cred_t a_cred;
801 1.1 jdolecek } */ *ap = v;
802 1.10 simonb struct timespec ts;
803 1.1 jdolecek struct vnode *vp = ap->a_vp;
804 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
805 1.1 jdolecek int error;
806 1.1 jdolecek
807 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
808 1.10 simonb /* hardclock() resolution is good enough for ptyfs */
809 1.10 simonb TIMEVAL_TO_TIMESPEC(&time, &ts);
810 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
811 1.10 simonb
812 1.1 jdolecek switch (ptyfs->ptyfs_type) {
813 1.1 jdolecek case PTYFSpts:
814 1.1 jdolecek VOP_UNLOCK(vp, 0);
815 1.1 jdolecek error = (*pts_cdevsw.d_read)(vp->v_rdev, ap->a_uio,
816 1.1 jdolecek ap->a_ioflag);
817 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
818 1.1 jdolecek return error;
819 1.1 jdolecek case PTYFSptc:
820 1.1 jdolecek VOP_UNLOCK(vp, 0);
821 1.1 jdolecek error = (*ptc_cdevsw.d_read)(vp->v_rdev, ap->a_uio,
822 1.1 jdolecek ap->a_ioflag);
823 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
824 1.1 jdolecek return error;
825 1.1 jdolecek default:
826 1.1 jdolecek return EOPNOTSUPP;
827 1.1 jdolecek }
828 1.1 jdolecek }
829 1.1 jdolecek
830 1.1 jdolecek int
831 1.1 jdolecek ptyfs_write(void *v)
832 1.1 jdolecek {
833 1.1 jdolecek struct vop_write_args /* {
834 1.1 jdolecek struct vnode *a_vp;
835 1.1 jdolecek struct uio *a_uio;
836 1.1 jdolecek int a_ioflag;
837 1.14 elad kauth_cred_t a_cred;
838 1.1 jdolecek } */ *ap = v;
839 1.10 simonb struct timespec ts;
840 1.1 jdolecek struct vnode *vp = ap->a_vp;
841 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
842 1.10 simonb int error;
843 1.1 jdolecek
844 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_MODIFY;
845 1.10 simonb /* hardclock() resolution is good enough for ptyfs */
846 1.10 simonb TIMEVAL_TO_TIMESPEC(&time, &ts);
847 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
848 1.10 simonb
849 1.1 jdolecek switch (ptyfs->ptyfs_type) {
850 1.1 jdolecek case PTYFSpts:
851 1.1 jdolecek VOP_UNLOCK(vp, 0);
852 1.1 jdolecek error = (*pts_cdevsw.d_write)(vp->v_rdev, ap->a_uio,
853 1.1 jdolecek ap->a_ioflag);
854 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
855 1.1 jdolecek return error;
856 1.1 jdolecek case PTYFSptc:
857 1.1 jdolecek VOP_UNLOCK(vp, 0);
858 1.1 jdolecek error = (*ptc_cdevsw.d_write)(vp->v_rdev, ap->a_uio,
859 1.1 jdolecek ap->a_ioflag);
860 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
861 1.1 jdolecek return error;
862 1.1 jdolecek default:
863 1.1 jdolecek return EOPNOTSUPP;
864 1.1 jdolecek }
865 1.1 jdolecek }
866 1.1 jdolecek
867 1.1 jdolecek int
868 1.1 jdolecek ptyfs_ioctl(void *v)
869 1.1 jdolecek {
870 1.1 jdolecek struct vop_ioctl_args /* {
871 1.1 jdolecek struct vnode *a_vp;
872 1.1 jdolecek u_long a_command;
873 1.1 jdolecek void *a_data;
874 1.1 jdolecek int a_fflag;
875 1.14 elad kauth_cred_t a_cred;
876 1.12 christos struct lwp *a_l;
877 1.1 jdolecek } */ *ap = v;
878 1.1 jdolecek struct vnode *vp = ap->a_vp;
879 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
880 1.1 jdolecek
881 1.1 jdolecek switch (ptyfs->ptyfs_type) {
882 1.1 jdolecek case PTYFSpts:
883 1.1 jdolecek return (*pts_cdevsw.d_ioctl)(vp->v_rdev, ap->a_command,
884 1.12 christos ap->a_data, ap->a_fflag, ap->a_l);
885 1.1 jdolecek case PTYFSptc:
886 1.1 jdolecek return (*ptc_cdevsw.d_ioctl)(vp->v_rdev, ap->a_command,
887 1.12 christos ap->a_data, ap->a_fflag, ap->a_l);
888 1.1 jdolecek default:
889 1.1 jdolecek return EOPNOTSUPP;
890 1.1 jdolecek }
891 1.1 jdolecek }
892 1.1 jdolecek
893 1.1 jdolecek int
894 1.1 jdolecek ptyfs_poll(void *v)
895 1.1 jdolecek {
896 1.1 jdolecek struct vop_poll_args /* {
897 1.1 jdolecek struct vnode *a_vp;
898 1.1 jdolecek int a_events;
899 1.12 christos struct lwp *a_l;
900 1.1 jdolecek } */ *ap = v;
901 1.1 jdolecek struct vnode *vp = ap->a_vp;
902 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
903 1.1 jdolecek
904 1.1 jdolecek switch (ptyfs->ptyfs_type) {
905 1.1 jdolecek case PTYFSpts:
906 1.12 christos return (*pts_cdevsw.d_poll)(vp->v_rdev, ap->a_events, ap->a_l);
907 1.1 jdolecek case PTYFSptc:
908 1.12 christos return (*ptc_cdevsw.d_poll)(vp->v_rdev, ap->a_events, ap->a_l);
909 1.1 jdolecek default:
910 1.1 jdolecek return genfs_poll(v);
911 1.1 jdolecek }
912 1.1 jdolecek }
913 1.1 jdolecek
914 1.1 jdolecek int
915 1.1 jdolecek ptyfs_kqfilter(void *v)
916 1.1 jdolecek {
917 1.1 jdolecek struct vop_kqfilter_args /* {
918 1.1 jdolecek struct vnode *a_vp;
919 1.1 jdolecek struct knote *a_kn;
920 1.1 jdolecek } */ *ap = v;
921 1.1 jdolecek struct vnode *vp = ap->a_vp;
922 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
923 1.1 jdolecek
924 1.1 jdolecek switch (ptyfs->ptyfs_type) {
925 1.1 jdolecek case PTYFSpts:
926 1.1 jdolecek return (*pts_cdevsw.d_kqfilter)(vp->v_rdev, ap->a_kn);
927 1.1 jdolecek case PTYFSptc:
928 1.1 jdolecek return (*ptc_cdevsw.d_kqfilter)(vp->v_rdev, ap->a_kn);
929 1.1 jdolecek default:
930 1.1 jdolecek return genfs_kqfilter(v);
931 1.1 jdolecek }
932 1.1 jdolecek }
933 1.1 jdolecek
934 1.11 yamt static int
935 1.11 yamt ptyfs_update(struct vnode *vp, const struct timespec *acc,
936 1.11 yamt const struct timespec *mod, int flags)
937 1.1 jdolecek {
938 1.11 yamt struct ptyfsnode *ptyfs = VTOPTYFS(vp);
939 1.1 jdolecek
940 1.11 yamt if (vp->v_mount->mnt_flag & MNT_RDONLY)
941 1.1 jdolecek return 0;
942 1.1 jdolecek
943 1.11 yamt PTYFS_ITIMES(ptyfs, acc, mod, NULL);
944 1.1 jdolecek return 0;
945 1.1 jdolecek }
946 1.1 jdolecek
947 1.8 christos void
948 1.8 christos ptyfs_itimes(struct ptyfsnode *ptyfs, const struct timespec *acc,
949 1.8 christos const struct timespec *mod, const struct timespec *cre)
950 1.8 christos {
951 1.8 christos struct timespec *ts = NULL, tsb;
952 1.8 christos
953 1.9 christos KASSERT(ptyfs->ptyfs_flag & (PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY));
954 1.8 christos if (ptyfs->ptyfs_flag & (PTYFS_ACCESS|PTYFS_MODIFY)) {
955 1.8 christos if (acc == NULL)
956 1.13 christos acc = ts = nanotime(&tsb);
957 1.8 christos ptyfs->ptyfs_atime = *acc;
958 1.8 christos }
959 1.1 jdolecek if (ptyfs->ptyfs_flag & PTYFS_MODIFY) {
960 1.8 christos if (mod == NULL)
961 1.8 christos mod = ts == NULL ? (ts = nanotime(&tsb)) : ts;
962 1.8 christos ptyfs->ptyfs_mtime = *mod;
963 1.8 christos }
964 1.8 christos if (ptyfs->ptyfs_flag & PTYFS_CHANGE) {
965 1.8 christos if (cre == NULL)
966 1.8 christos cre = ts == NULL ? (ts = nanotime(&tsb)) : ts;
967 1.9 christos ptyfs->ptyfs_ctime = *cre;
968 1.8 christos }
969 1.9 christos ptyfs->ptyfs_flag &= ~(PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY);
970 1.1 jdolecek }
971 1.7 perry
972 1.1 jdolecek /*
973 1.1 jdolecek * convert decimal ascii to int
974 1.1 jdolecek */
975 1.1 jdolecek static int
976 1.1 jdolecek atoi(const char *b, size_t len)
977 1.1 jdolecek {
978 1.1 jdolecek int p = 0;
979 1.1 jdolecek
980 1.1 jdolecek while (len--) {
981 1.1 jdolecek char c = *b++;
982 1.1 jdolecek if (c < '0' || c > '9')
983 1.1 jdolecek return -1;
984 1.1 jdolecek p = 10 * p + (c - '0');
985 1.1 jdolecek }
986 1.1 jdolecek
987 1.1 jdolecek return p;
988 1.1 jdolecek }
989