ptyfs_vnops.c revision 1.23 1 1.23 ad /* $NetBSD: ptyfs_vnops.c,v 1.23 2007/07/09 21:10:48 ad Exp $ */
2 1.1 jdolecek
3 1.1 jdolecek /*
4 1.1 jdolecek * Copyright (c) 1993, 1995
5 1.1 jdolecek * The Regents of the University of California. All rights reserved.
6 1.1 jdolecek *
7 1.1 jdolecek * This code is derived from software contributed to Berkeley by
8 1.1 jdolecek * Jan-Simon Pendry.
9 1.1 jdolecek *
10 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
11 1.1 jdolecek * modification, are permitted provided that the following conditions
12 1.1 jdolecek * are met:
13 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
14 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
15 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
17 1.1 jdolecek * documentation and/or other materials provided with the distribution.
18 1.1 jdolecek * 3. Neither the name of the University nor the names of its contributors
19 1.1 jdolecek * may be used to endorse or promote products derived from this software
20 1.1 jdolecek * without specific prior written permission.
21 1.1 jdolecek *
22 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 jdolecek * SUCH DAMAGE.
33 1.1 jdolecek *
34 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
35 1.1 jdolecek */
36 1.1 jdolecek
37 1.1 jdolecek /*
38 1.1 jdolecek * Copyright (c) 1993 Jan-Simon Pendry
39 1.1 jdolecek *
40 1.1 jdolecek * This code is derived from software contributed to Berkeley by
41 1.1 jdolecek * Jan-Simon Pendry.
42 1.1 jdolecek *
43 1.1 jdolecek * Redistribution and use in source and binary forms, with or without
44 1.1 jdolecek * modification, are permitted provided that the following conditions
45 1.1 jdolecek * are met:
46 1.1 jdolecek * 1. Redistributions of source code must retain the above copyright
47 1.1 jdolecek * notice, this list of conditions and the following disclaimer.
48 1.1 jdolecek * 2. Redistributions in binary form must reproduce the above copyright
49 1.1 jdolecek * notice, this list of conditions and the following disclaimer in the
50 1.1 jdolecek * documentation and/or other materials provided with the distribution.
51 1.1 jdolecek * 3. All advertising materials mentioning features or use of this software
52 1.1 jdolecek * must display the following acknowledgement:
53 1.1 jdolecek * This product includes software developed by the University of
54 1.1 jdolecek * California, Berkeley and its contributors.
55 1.1 jdolecek * 4. Neither the name of the University nor the names of its contributors
56 1.1 jdolecek * may be used to endorse or promote products derived from this software
57 1.1 jdolecek * without specific prior written permission.
58 1.1 jdolecek *
59 1.1 jdolecek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
60 1.1 jdolecek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 1.1 jdolecek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 1.1 jdolecek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
63 1.1 jdolecek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 1.1 jdolecek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 1.1 jdolecek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 1.1 jdolecek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 1.1 jdolecek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 1.1 jdolecek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69 1.1 jdolecek * SUCH DAMAGE.
70 1.1 jdolecek *
71 1.1 jdolecek * @(#)procfs_vnops.c 8.18 (Berkeley) 5/21/95
72 1.1 jdolecek */
73 1.1 jdolecek
74 1.1 jdolecek /*
75 1.1 jdolecek * ptyfs vnode interface
76 1.1 jdolecek */
77 1.1 jdolecek
78 1.1 jdolecek #include <sys/cdefs.h>
79 1.23 ad __KERNEL_RCSID(0, "$NetBSD: ptyfs_vnops.c,v 1.23 2007/07/09 21:10:48 ad Exp $");
80 1.1 jdolecek
81 1.1 jdolecek #include <sys/param.h>
82 1.1 jdolecek #include <sys/systm.h>
83 1.1 jdolecek #include <sys/time.h>
84 1.1 jdolecek #include <sys/kernel.h>
85 1.1 jdolecek #include <sys/file.h>
86 1.1 jdolecek #include <sys/filedesc.h>
87 1.1 jdolecek #include <sys/proc.h>
88 1.1 jdolecek #include <sys/vnode.h>
89 1.1 jdolecek #include <sys/namei.h>
90 1.1 jdolecek #include <sys/malloc.h>
91 1.1 jdolecek #include <sys/mount.h>
92 1.1 jdolecek #include <sys/select.h>
93 1.1 jdolecek #include <sys/dirent.h>
94 1.1 jdolecek #include <sys/resourcevar.h>
95 1.1 jdolecek #include <sys/stat.h>
96 1.1 jdolecek #include <sys/conf.h>
97 1.1 jdolecek #include <sys/tty.h>
98 1.1 jdolecek #include <sys/pty.h>
99 1.14 elad #include <sys/kauth.h>
100 1.1 jdolecek
101 1.1 jdolecek #include <uvm/uvm_extern.h> /* for PAGE_SIZE */
102 1.1 jdolecek
103 1.1 jdolecek #include <machine/reg.h>
104 1.1 jdolecek
105 1.2 jdolecek #include <fs/ptyfs/ptyfs.h>
106 1.1 jdolecek #include <miscfs/genfs/genfs.h>
107 1.1 jdolecek #include <miscfs/specfs/specdev.h>
108 1.1 jdolecek
109 1.1 jdolecek /*
110 1.1 jdolecek * Vnode Operations.
111 1.1 jdolecek *
112 1.1 jdolecek */
113 1.1 jdolecek
114 1.1 jdolecek int ptyfs_lookup (void *);
115 1.1 jdolecek #define ptyfs_create genfs_eopnotsupp
116 1.1 jdolecek #define ptyfs_mknod genfs_eopnotsupp
117 1.1 jdolecek int ptyfs_open (void *);
118 1.1 jdolecek int ptyfs_close (void *);
119 1.1 jdolecek int ptyfs_access (void *);
120 1.1 jdolecek int ptyfs_getattr (void *);
121 1.1 jdolecek int ptyfs_setattr (void *);
122 1.1 jdolecek int ptyfs_read (void *);
123 1.1 jdolecek int ptyfs_write (void *);
124 1.1 jdolecek #define ptyfs_fcntl genfs_fcntl
125 1.1 jdolecek int ptyfs_ioctl (void *);
126 1.1 jdolecek int ptyfs_poll (void *);
127 1.1 jdolecek int ptyfs_kqfilter (void *);
128 1.1 jdolecek #define ptyfs_revoke genfs_revoke
129 1.1 jdolecek #define ptyfs_mmap genfs_eopnotsupp
130 1.1 jdolecek #define ptyfs_fsync genfs_nullop
131 1.1 jdolecek #define ptyfs_seek genfs_nullop
132 1.1 jdolecek #define ptyfs_remove genfs_eopnotsupp
133 1.1 jdolecek #define ptyfs_link genfs_abortop
134 1.1 jdolecek #define ptyfs_rename genfs_eopnotsupp
135 1.1 jdolecek #define ptyfs_mkdir genfs_eopnotsupp
136 1.1 jdolecek #define ptyfs_rmdir genfs_eopnotsupp
137 1.1 jdolecek #define ptyfs_symlink genfs_abortop
138 1.1 jdolecek int ptyfs_readdir (void *);
139 1.1 jdolecek #define ptyfs_readlink genfs_eopnotsupp
140 1.1 jdolecek #define ptyfs_abortop genfs_abortop
141 1.1 jdolecek int ptyfs_reclaim (void *);
142 1.1 jdolecek #define ptyfs_lock genfs_lock
143 1.1 jdolecek #define ptyfs_unlock genfs_unlock
144 1.1 jdolecek #define ptyfs_bmap genfs_badop
145 1.1 jdolecek #define ptyfs_strategy genfs_badop
146 1.1 jdolecek int ptyfs_print (void *);
147 1.1 jdolecek int ptyfs_pathconf (void *);
148 1.1 jdolecek #define ptyfs_islocked genfs_islocked
149 1.1 jdolecek #define ptyfs_advlock genfs_einval
150 1.1 jdolecek #define ptyfs_bwrite genfs_eopnotsupp
151 1.1 jdolecek #define ptyfs_putpages genfs_null_putpages
152 1.1 jdolecek
153 1.11 yamt static int ptyfs_update(struct vnode *, const struct timespec *,
154 1.11 yamt const struct timespec *, int);
155 1.14 elad static int ptyfs_chown(struct vnode *, uid_t, gid_t, kauth_cred_t,
156 1.16 ad struct lwp *);
157 1.16 ad static int ptyfs_chmod(struct vnode *, mode_t, kauth_cred_t, struct lwp *);
158 1.1 jdolecek static int atoi(const char *, size_t);
159 1.1 jdolecek
160 1.1 jdolecek /*
161 1.1 jdolecek * ptyfs vnode operations.
162 1.1 jdolecek */
163 1.1 jdolecek int (**ptyfs_vnodeop_p)(void *);
164 1.1 jdolecek const struct vnodeopv_entry_desc ptyfs_vnodeop_entries[] = {
165 1.1 jdolecek { &vop_default_desc, vn_default_error },
166 1.1 jdolecek { &vop_lookup_desc, ptyfs_lookup }, /* lookup */
167 1.1 jdolecek { &vop_create_desc, ptyfs_create }, /* create */
168 1.1 jdolecek { &vop_mknod_desc, ptyfs_mknod }, /* mknod */
169 1.1 jdolecek { &vop_open_desc, ptyfs_open }, /* open */
170 1.1 jdolecek { &vop_close_desc, ptyfs_close }, /* close */
171 1.1 jdolecek { &vop_access_desc, ptyfs_access }, /* access */
172 1.1 jdolecek { &vop_getattr_desc, ptyfs_getattr }, /* getattr */
173 1.1 jdolecek { &vop_setattr_desc, ptyfs_setattr }, /* setattr */
174 1.1 jdolecek { &vop_read_desc, ptyfs_read }, /* read */
175 1.1 jdolecek { &vop_write_desc, ptyfs_write }, /* write */
176 1.1 jdolecek { &vop_ioctl_desc, ptyfs_ioctl }, /* ioctl */
177 1.1 jdolecek { &vop_fcntl_desc, ptyfs_fcntl }, /* fcntl */
178 1.1 jdolecek { &vop_poll_desc, ptyfs_poll }, /* poll */
179 1.1 jdolecek { &vop_kqfilter_desc, ptyfs_kqfilter }, /* kqfilter */
180 1.1 jdolecek { &vop_revoke_desc, ptyfs_revoke }, /* revoke */
181 1.1 jdolecek { &vop_mmap_desc, ptyfs_mmap }, /* mmap */
182 1.1 jdolecek { &vop_fsync_desc, ptyfs_fsync }, /* fsync */
183 1.1 jdolecek { &vop_seek_desc, ptyfs_seek }, /* seek */
184 1.1 jdolecek { &vop_remove_desc, ptyfs_remove }, /* remove */
185 1.1 jdolecek { &vop_link_desc, ptyfs_link }, /* link */
186 1.1 jdolecek { &vop_rename_desc, ptyfs_rename }, /* rename */
187 1.1 jdolecek { &vop_mkdir_desc, ptyfs_mkdir }, /* mkdir */
188 1.1 jdolecek { &vop_rmdir_desc, ptyfs_rmdir }, /* rmdir */
189 1.1 jdolecek { &vop_symlink_desc, ptyfs_symlink }, /* symlink */
190 1.1 jdolecek { &vop_readdir_desc, ptyfs_readdir }, /* readdir */
191 1.1 jdolecek { &vop_readlink_desc, ptyfs_readlink }, /* readlink */
192 1.1 jdolecek { &vop_abortop_desc, ptyfs_abortop }, /* abortop */
193 1.6 christos { &vop_inactive_desc, spec_inactive }, /* inactive */
194 1.1 jdolecek { &vop_reclaim_desc, ptyfs_reclaim }, /* reclaim */
195 1.1 jdolecek { &vop_lock_desc, ptyfs_lock }, /* lock */
196 1.1 jdolecek { &vop_unlock_desc, ptyfs_unlock }, /* unlock */
197 1.1 jdolecek { &vop_bmap_desc, ptyfs_bmap }, /* bmap */
198 1.1 jdolecek { &vop_strategy_desc, ptyfs_strategy }, /* strategy */
199 1.1 jdolecek { &vop_print_desc, ptyfs_print }, /* print */
200 1.1 jdolecek { &vop_islocked_desc, ptyfs_islocked }, /* islocked */
201 1.1 jdolecek { &vop_pathconf_desc, ptyfs_pathconf }, /* pathconf */
202 1.1 jdolecek { &vop_advlock_desc, ptyfs_advlock }, /* advlock */
203 1.1 jdolecek { &vop_bwrite_desc, ptyfs_bwrite }, /* bwrite */
204 1.1 jdolecek { &vop_putpages_desc, ptyfs_putpages }, /* putpages */
205 1.1 jdolecek { NULL, NULL }
206 1.1 jdolecek };
207 1.1 jdolecek const struct vnodeopv_desc ptyfs_vnodeop_opv_desc =
208 1.1 jdolecek { &ptyfs_vnodeop_p, ptyfs_vnodeop_entries };
209 1.1 jdolecek
210 1.1 jdolecek /*
211 1.1 jdolecek * _reclaim is called when getnewvnode()
212 1.1 jdolecek * wants to make use of an entry on the vnode
213 1.1 jdolecek * free list. at this time the filesystem needs
214 1.1 jdolecek * to free any private data and remove the node
215 1.1 jdolecek * from any private lists.
216 1.1 jdolecek */
217 1.1 jdolecek int
218 1.1 jdolecek ptyfs_reclaim(void *v)
219 1.1 jdolecek {
220 1.1 jdolecek struct vop_reclaim_args /* {
221 1.1 jdolecek struct vnode *a_vp;
222 1.1 jdolecek } */ *ap = v;
223 1.1 jdolecek return ptyfs_freevp(ap->a_vp);
224 1.1 jdolecek }
225 1.1 jdolecek
226 1.1 jdolecek /*
227 1.1 jdolecek * Return POSIX pathconf information applicable to special devices.
228 1.1 jdolecek */
229 1.1 jdolecek int
230 1.1 jdolecek ptyfs_pathconf(void *v)
231 1.1 jdolecek {
232 1.1 jdolecek struct vop_pathconf_args /* {
233 1.1 jdolecek struct vnode *a_vp;
234 1.1 jdolecek int a_name;
235 1.1 jdolecek register_t *a_retval;
236 1.1 jdolecek } */ *ap = v;
237 1.1 jdolecek
238 1.1 jdolecek switch (ap->a_name) {
239 1.1 jdolecek case _PC_LINK_MAX:
240 1.1 jdolecek *ap->a_retval = LINK_MAX;
241 1.1 jdolecek return 0;
242 1.1 jdolecek case _PC_MAX_CANON:
243 1.1 jdolecek *ap->a_retval = MAX_CANON;
244 1.1 jdolecek return 0;
245 1.1 jdolecek case _PC_MAX_INPUT:
246 1.1 jdolecek *ap->a_retval = MAX_INPUT;
247 1.1 jdolecek return 0;
248 1.1 jdolecek case _PC_PIPE_BUF:
249 1.1 jdolecek *ap->a_retval = PIPE_BUF;
250 1.1 jdolecek return 0;
251 1.1 jdolecek case _PC_CHOWN_RESTRICTED:
252 1.1 jdolecek *ap->a_retval = 1;
253 1.1 jdolecek return 0;
254 1.1 jdolecek case _PC_VDISABLE:
255 1.1 jdolecek *ap->a_retval = _POSIX_VDISABLE;
256 1.1 jdolecek return 0;
257 1.1 jdolecek case _PC_SYNC_IO:
258 1.1 jdolecek *ap->a_retval = 1;
259 1.1 jdolecek return 0;
260 1.1 jdolecek default:
261 1.1 jdolecek return EINVAL;
262 1.1 jdolecek }
263 1.1 jdolecek }
264 1.1 jdolecek
265 1.1 jdolecek /*
266 1.1 jdolecek * _print is used for debugging.
267 1.1 jdolecek * just print a readable description
268 1.1 jdolecek * of (vp).
269 1.1 jdolecek */
270 1.1 jdolecek int
271 1.1 jdolecek ptyfs_print(void *v)
272 1.1 jdolecek {
273 1.1 jdolecek struct vop_print_args /* {
274 1.1 jdolecek struct vnode *a_vp;
275 1.1 jdolecek } */ *ap = v;
276 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
277 1.1 jdolecek
278 1.1 jdolecek printf("tag VT_PTYFS, type %d, pty %d\n",
279 1.1 jdolecek ptyfs->ptyfs_type, ptyfs->ptyfs_pty);
280 1.1 jdolecek return 0;
281 1.1 jdolecek }
282 1.1 jdolecek
283 1.1 jdolecek /*
284 1.1 jdolecek * Invent attributes for ptyfsnode (vp) and store
285 1.1 jdolecek * them in (vap).
286 1.1 jdolecek * Directories lengths are returned as zero since
287 1.1 jdolecek * any real length would require the genuine size
288 1.1 jdolecek * to be computed, and nothing cares anyway.
289 1.1 jdolecek *
290 1.1 jdolecek * this is relatively minimal for ptyfs.
291 1.1 jdolecek */
292 1.1 jdolecek int
293 1.1 jdolecek ptyfs_getattr(void *v)
294 1.1 jdolecek {
295 1.1 jdolecek struct vop_getattr_args /* {
296 1.1 jdolecek struct vnode *a_vp;
297 1.1 jdolecek struct vattr *a_vap;
298 1.14 elad kauth_cred_t a_cred;
299 1.12 christos struct lwp *a_l;
300 1.1 jdolecek } */ *ap = v;
301 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(ap->a_vp);
302 1.1 jdolecek struct vattr *vap = ap->a_vap;
303 1.1 jdolecek
304 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
305 1.1 jdolecek
306 1.1 jdolecek /* start by zeroing out the attributes */
307 1.1 jdolecek VATTR_NULL(vap);
308 1.1 jdolecek
309 1.1 jdolecek /* next do all the common fields */
310 1.1 jdolecek vap->va_type = ap->a_vp->v_type;
311 1.4 atatat vap->va_fsid = ap->a_vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
312 1.1 jdolecek vap->va_fileid = ptyfs->ptyfs_fileno;
313 1.1 jdolecek vap->va_gen = 0;
314 1.1 jdolecek vap->va_flags = 0;
315 1.1 jdolecek vap->va_nlink = 1;
316 1.1 jdolecek vap->va_blocksize = PAGE_SIZE;
317 1.1 jdolecek
318 1.1 jdolecek vap->va_atime = ptyfs->ptyfs_atime;
319 1.1 jdolecek vap->va_mtime = ptyfs->ptyfs_mtime;
320 1.1 jdolecek vap->va_ctime = ptyfs->ptyfs_ctime;
321 1.1 jdolecek vap->va_birthtime = ptyfs->ptyfs_birthtime;
322 1.1 jdolecek vap->va_mode = ptyfs->ptyfs_mode;
323 1.1 jdolecek vap->va_flags = ptyfs->ptyfs_flags;
324 1.1 jdolecek vap->va_uid = ptyfs->ptyfs_uid;
325 1.1 jdolecek vap->va_gid = ptyfs->ptyfs_gid;
326 1.1 jdolecek
327 1.1 jdolecek switch (ptyfs->ptyfs_type) {
328 1.1 jdolecek case PTYFSpts:
329 1.1 jdolecek case PTYFSptc:
330 1.1 jdolecek if (pty_isfree(ptyfs->ptyfs_pty, 1))
331 1.1 jdolecek return ENOENT;
332 1.5 atatat vap->va_bytes = vap->va_size = 0;
333 1.7 perry vap->va_rdev = ap->a_vp->v_rdev;
334 1.1 jdolecek break;
335 1.1 jdolecek case PTYFSroot:
336 1.1 jdolecek vap->va_rdev = 0;
337 1.1 jdolecek vap->va_bytes = vap->va_size = DEV_BSIZE;
338 1.1 jdolecek break;
339 1.1 jdolecek
340 1.1 jdolecek default:
341 1.1 jdolecek return EOPNOTSUPP;
342 1.1 jdolecek }
343 1.1 jdolecek
344 1.1 jdolecek return 0;
345 1.1 jdolecek }
346 1.1 jdolecek
347 1.1 jdolecek /*ARGSUSED*/
348 1.1 jdolecek int
349 1.1 jdolecek ptyfs_setattr(void *v)
350 1.1 jdolecek {
351 1.1 jdolecek struct vop_setattr_args /* {
352 1.1 jdolecek struct vnodeop_desc *a_desc;
353 1.1 jdolecek struct vnode *a_vp;
354 1.1 jdolecek struct vattr *a_vap;
355 1.14 elad kauth_cred_t a_cred;
356 1.12 christos struct lwp *a_l;
357 1.1 jdolecek } */ *ap = v;
358 1.1 jdolecek struct vnode *vp = ap->a_vp;
359 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
360 1.1 jdolecek struct vattr *vap = ap->a_vap;
361 1.14 elad kauth_cred_t cred = ap->a_cred;
362 1.12 christos struct lwp *l = ap->a_l;
363 1.1 jdolecek int error;
364 1.1 jdolecek
365 1.1 jdolecek if (vap->va_size != VNOVAL) {
366 1.1 jdolecek switch (ptyfs->ptyfs_type) {
367 1.1 jdolecek case PTYFSroot:
368 1.1 jdolecek return EISDIR;
369 1.1 jdolecek case PTYFSpts:
370 1.1 jdolecek case PTYFSptc:
371 1.1 jdolecek break;
372 1.1 jdolecek default:
373 1.1 jdolecek return EINVAL;
374 1.1 jdolecek }
375 1.1 jdolecek }
376 1.1 jdolecek
377 1.1 jdolecek if (vap->va_flags != VNOVAL) {
378 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
379 1.1 jdolecek return EROFS;
380 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
381 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
382 1.21 elad NULL)) != 0)
383 1.1 jdolecek return error;
384 1.20 elad /* Immutable and append-only flags are not supported on ptyfs. */
385 1.20 elad if (vap->va_flags & (IMMUTABLE | APPEND))
386 1.20 elad return EINVAL;
387 1.14 elad if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) == 0) {
388 1.1 jdolecek /* Snapshot flag cannot be set or cleared */
389 1.7 perry if ((vap->va_flags & SF_SNAPSHOT) !=
390 1.1 jdolecek (ptyfs->ptyfs_flags & SF_SNAPSHOT))
391 1.1 jdolecek return EPERM;
392 1.1 jdolecek ptyfs->ptyfs_flags = vap->va_flags;
393 1.1 jdolecek } else {
394 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SETTABLE) !=
395 1.1 jdolecek (vap->va_flags & SF_SETTABLE))
396 1.1 jdolecek return EPERM;
397 1.1 jdolecek ptyfs->ptyfs_flags &= SF_SETTABLE;
398 1.1 jdolecek ptyfs->ptyfs_flags |= (vap->va_flags & UF_SETTABLE);
399 1.1 jdolecek }
400 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
401 1.1 jdolecek }
402 1.20 elad
403 1.1 jdolecek /*
404 1.1 jdolecek * Go through the fields and update iff not VNOVAL.
405 1.1 jdolecek */
406 1.1 jdolecek if (vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL) {
407 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
408 1.1 jdolecek return EROFS;
409 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
410 1.1 jdolecek return EPERM;
411 1.16 ad error = ptyfs_chown(vp, vap->va_uid, vap->va_gid, cred, l);
412 1.1 jdolecek if (error)
413 1.1 jdolecek return error;
414 1.1 jdolecek }
415 1.1 jdolecek
416 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
417 1.1 jdolecek vap->va_birthtime.tv_sec != VNOVAL) {
418 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
419 1.1 jdolecek return EROFS;
420 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0)
421 1.1 jdolecek return EPERM;
422 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
423 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
424 1.21 elad NULL)) &&
425 1.7 perry ((vap->va_vaflags & VA_UTIMES_NULL) == 0 ||
426 1.12 christos (error = VOP_ACCESS(vp, VWRITE, cred, l)) != 0))
427 1.1 jdolecek return (error);
428 1.1 jdolecek if (vap->va_atime.tv_sec != VNOVAL)
429 1.1 jdolecek if (!(vp->v_mount->mnt_flag & MNT_NOATIME))
430 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
431 1.1 jdolecek if (vap->va_mtime.tv_sec != VNOVAL)
432 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE | PTYFS_MODIFY;
433 1.1 jdolecek if (vap->va_birthtime.tv_sec != VNOVAL)
434 1.1 jdolecek ptyfs->ptyfs_birthtime = vap->va_birthtime;
435 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE;
436 1.11 yamt error = ptyfs_update(vp, &vap->va_atime, &vap->va_mtime, 0);
437 1.1 jdolecek if (error)
438 1.1 jdolecek return error;
439 1.1 jdolecek }
440 1.1 jdolecek if (vap->va_mode != (mode_t)VNOVAL) {
441 1.1 jdolecek if (vp->v_mount->mnt_flag & MNT_RDONLY)
442 1.1 jdolecek return EROFS;
443 1.1 jdolecek if (ptyfs->ptyfs_type == PTYFSroot)
444 1.1 jdolecek return EPERM;
445 1.1 jdolecek if ((ptyfs->ptyfs_flags & SF_SNAPSHOT) != 0 &&
446 1.1 jdolecek (vap->va_mode &
447 1.1 jdolecek (S_IXUSR|S_IWUSR|S_IXGRP|S_IWGRP|S_IXOTH|S_IWOTH)))
448 1.1 jdolecek return EPERM;
449 1.16 ad error = ptyfs_chmod(vp, vap->va_mode, cred, l);
450 1.1 jdolecek if (error)
451 1.1 jdolecek return error;
452 1.1 jdolecek }
453 1.1 jdolecek VN_KNOTE(vp, NOTE_ATTRIB);
454 1.1 jdolecek return 0;
455 1.1 jdolecek }
456 1.1 jdolecek
457 1.1 jdolecek /*
458 1.1 jdolecek * Change the mode on a file.
459 1.1 jdolecek * Inode must be locked before calling.
460 1.1 jdolecek */
461 1.1 jdolecek static int
462 1.16 ad ptyfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct lwp *l)
463 1.1 jdolecek {
464 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
465 1.1 jdolecek int error;
466 1.1 jdolecek
467 1.14 elad if (kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid &&
468 1.14 elad (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
469 1.21 elad NULL)) != 0)
470 1.1 jdolecek return error;
471 1.1 jdolecek ptyfs->ptyfs_mode &= ~ALLPERMS;
472 1.1 jdolecek ptyfs->ptyfs_mode |= (mode & ALLPERMS);
473 1.1 jdolecek return 0;
474 1.1 jdolecek }
475 1.1 jdolecek
476 1.1 jdolecek /*
477 1.1 jdolecek * Perform chown operation on inode ip;
478 1.1 jdolecek * inode must be locked prior to call.
479 1.1 jdolecek */
480 1.1 jdolecek static int
481 1.14 elad ptyfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred,
482 1.16 ad struct lwp *l)
483 1.1 jdolecek {
484 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
485 1.14 elad int error, ismember = 0;
486 1.1 jdolecek
487 1.1 jdolecek if (uid == (uid_t)VNOVAL)
488 1.1 jdolecek uid = ptyfs->ptyfs_uid;
489 1.1 jdolecek if (gid == (gid_t)VNOVAL)
490 1.1 jdolecek gid = ptyfs->ptyfs_gid;
491 1.1 jdolecek /*
492 1.1 jdolecek * If we don't own the file, are trying to change the owner
493 1.1 jdolecek * of the file, or are not a member of the target group,
494 1.1 jdolecek * the caller's credentials must imply super-user privilege
495 1.1 jdolecek * or the call fails.
496 1.1 jdolecek */
497 1.14 elad if ((kauth_cred_geteuid(cred) != ptyfs->ptyfs_uid || uid != ptyfs->ptyfs_uid ||
498 1.1 jdolecek (gid != ptyfs->ptyfs_gid &&
499 1.16 ad !(kauth_cred_getegid(cred) == gid ||
500 1.16 ad (kauth_cred_ismember_gid(cred, gid, &ismember) == 0 && ismember)))) &&
501 1.14 elad ((error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
502 1.21 elad NULL)) != 0))
503 1.1 jdolecek return error;
504 1.1 jdolecek
505 1.1 jdolecek ptyfs->ptyfs_gid = gid;
506 1.1 jdolecek ptyfs->ptyfs_uid = uid;
507 1.1 jdolecek return 0;
508 1.1 jdolecek }
509 1.1 jdolecek
510 1.1 jdolecek /*
511 1.1 jdolecek * implement access checking.
512 1.1 jdolecek *
513 1.1 jdolecek * actually, the check for super-user is slightly
514 1.1 jdolecek * broken since it will allow read access to write-only
515 1.1 jdolecek * objects. this doesn't cause any particular trouble
516 1.1 jdolecek * but does mean that the i/o entry points need to check
517 1.1 jdolecek * that the operation really does make sense.
518 1.1 jdolecek */
519 1.1 jdolecek int
520 1.1 jdolecek ptyfs_access(void *v)
521 1.1 jdolecek {
522 1.1 jdolecek struct vop_access_args /* {
523 1.1 jdolecek struct vnode *a_vp;
524 1.1 jdolecek int a_mode;
525 1.14 elad kauth_cred_t a_cred;
526 1.12 christos struct lwp *a_l;
527 1.1 jdolecek } */ *ap = v;
528 1.1 jdolecek struct vattr va;
529 1.1 jdolecek int error;
530 1.1 jdolecek
531 1.12 christos if ((error = VOP_GETATTR(ap->a_vp, &va, ap->a_cred, ap->a_l)) != 0)
532 1.1 jdolecek return error;
533 1.1 jdolecek
534 1.1 jdolecek return vaccess(va.va_type, va.va_mode,
535 1.1 jdolecek va.va_uid, va.va_gid, ap->a_mode, ap->a_cred);
536 1.1 jdolecek }
537 1.1 jdolecek
538 1.1 jdolecek /*
539 1.1 jdolecek * lookup. this is incredibly complicated in the
540 1.1 jdolecek * general case, however for most pseudo-filesystems
541 1.1 jdolecek * very little needs to be done.
542 1.1 jdolecek *
543 1.1 jdolecek * Locking isn't hard here, just poorly documented.
544 1.1 jdolecek *
545 1.7 perry * If we're looking up ".", just vref the parent & return it.
546 1.1 jdolecek *
547 1.1 jdolecek * If we're looking up "..", unlock the parent, and lock "..". If everything
548 1.19 chs * went ok, try to re-lock the parent. We do this to prevent lock races.
549 1.19 chs *
550 1.19 chs * For anything else, get the needed node.
551 1.1 jdolecek *
552 1.1 jdolecek * We try to exit with the parent locked in error cases.
553 1.1 jdolecek */
554 1.1 jdolecek int
555 1.1 jdolecek ptyfs_lookup(void *v)
556 1.1 jdolecek {
557 1.1 jdolecek struct vop_lookup_args /* {
558 1.1 jdolecek struct vnode * a_dvp;
559 1.1 jdolecek struct vnode ** a_vpp;
560 1.1 jdolecek struct componentname * a_cnp;
561 1.1 jdolecek } */ *ap = v;
562 1.1 jdolecek struct componentname *cnp = ap->a_cnp;
563 1.1 jdolecek struct vnode **vpp = ap->a_vpp;
564 1.1 jdolecek struct vnode *dvp = ap->a_dvp;
565 1.1 jdolecek const char *pname = cnp->cn_nameptr;
566 1.1 jdolecek struct ptyfsnode *ptyfs;
567 1.19 chs int pty, error;
568 1.1 jdolecek
569 1.1 jdolecek *vpp = NULL;
570 1.1 jdolecek
571 1.1 jdolecek if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)
572 1.1 jdolecek return EROFS;
573 1.1 jdolecek
574 1.1 jdolecek if (cnp->cn_namelen == 1 && *pname == '.') {
575 1.1 jdolecek *vpp = dvp;
576 1.1 jdolecek VREF(dvp);
577 1.1 jdolecek return 0;
578 1.1 jdolecek }
579 1.1 jdolecek
580 1.1 jdolecek ptyfs = VTOPTYFS(dvp);
581 1.1 jdolecek switch (ptyfs->ptyfs_type) {
582 1.1 jdolecek case PTYFSroot:
583 1.1 jdolecek /*
584 1.1 jdolecek * Shouldn't get here with .. in the root node.
585 1.1 jdolecek */
586 1.7 perry if (cnp->cn_flags & ISDOTDOT)
587 1.1 jdolecek return EIO;
588 1.1 jdolecek
589 1.1 jdolecek pty = atoi(pname, cnp->cn_namelen);
590 1.1 jdolecek
591 1.1 jdolecek if (pty < 0 || pty >= npty || pty_isfree(pty, 1))
592 1.1 jdolecek break;
593 1.1 jdolecek
594 1.1 jdolecek error = ptyfs_allocvp(dvp->v_mount, vpp, PTYFSpts, pty,
595 1.12 christos curlwp);
596 1.1 jdolecek return error;
597 1.1 jdolecek
598 1.1 jdolecek default:
599 1.1 jdolecek return ENOTDIR;
600 1.1 jdolecek }
601 1.1 jdolecek
602 1.1 jdolecek return cnp->cn_nameiop == LOOKUP ? ENOENT : EROFS;
603 1.1 jdolecek }
604 1.1 jdolecek
605 1.1 jdolecek /*
606 1.1 jdolecek * readdir returns directory entries from ptyfsnode (vp).
607 1.1 jdolecek *
608 1.1 jdolecek * the strategy here with ptyfs is to generate a single
609 1.1 jdolecek * directory entry at a time (struct dirent) and then
610 1.1 jdolecek * copy that out to userland using uiomove. a more efficent
611 1.1 jdolecek * though more complex implementation, would try to minimize
612 1.1 jdolecek * the number of calls to uiomove(). for ptyfs, this is
613 1.1 jdolecek * hardly worth the added code complexity.
614 1.1 jdolecek *
615 1.1 jdolecek * this should just be done through read()
616 1.1 jdolecek */
617 1.1 jdolecek int
618 1.1 jdolecek ptyfs_readdir(void *v)
619 1.1 jdolecek {
620 1.1 jdolecek struct vop_readdir_args /* {
621 1.1 jdolecek struct vnode *a_vp;
622 1.1 jdolecek struct uio *a_uio;
623 1.14 elad kauth_cred_t a_cred;
624 1.1 jdolecek int *a_eofflag;
625 1.1 jdolecek off_t **a_cookies;
626 1.1 jdolecek int *a_ncookies;
627 1.1 jdolecek } */ *ap = v;
628 1.1 jdolecek struct uio *uio = ap->a_uio;
629 1.1 jdolecek struct dirent d;
630 1.1 jdolecek struct ptyfsnode *ptyfs;
631 1.1 jdolecek off_t i;
632 1.1 jdolecek int error;
633 1.1 jdolecek off_t *cookies = NULL;
634 1.1 jdolecek int ncookies;
635 1.1 jdolecek struct vnode *vp;
636 1.1 jdolecek int nc = 0;
637 1.1 jdolecek
638 1.1 jdolecek vp = ap->a_vp;
639 1.1 jdolecek ptyfs = VTOPTYFS(vp);
640 1.1 jdolecek
641 1.1 jdolecek if (uio->uio_resid < UIO_MX)
642 1.1 jdolecek return EINVAL;
643 1.1 jdolecek if (uio->uio_offset < 0)
644 1.1 jdolecek return EINVAL;
645 1.1 jdolecek
646 1.1 jdolecek error = 0;
647 1.1 jdolecek i = uio->uio_offset;
648 1.1 jdolecek (void)memset(&d, 0, sizeof(d));
649 1.1 jdolecek d.d_reclen = UIO_MX;
650 1.1 jdolecek ncookies = uio->uio_resid / UIO_MX;
651 1.1 jdolecek
652 1.1 jdolecek switch (ptyfs->ptyfs_type) {
653 1.1 jdolecek case PTYFSroot: /* root */
654 1.1 jdolecek
655 1.1 jdolecek if (i >= npty)
656 1.1 jdolecek return 0;
657 1.1 jdolecek
658 1.1 jdolecek if (ap->a_ncookies) {
659 1.1 jdolecek ncookies = min(ncookies, (npty + 2 - i));
660 1.1 jdolecek cookies = malloc(ncookies * sizeof (off_t),
661 1.1 jdolecek M_TEMP, M_WAITOK);
662 1.1 jdolecek *ap->a_cookies = cookies;
663 1.1 jdolecek }
664 1.1 jdolecek
665 1.1 jdolecek for (; i < 2; i++) {
666 1.1 jdolecek switch (i) {
667 1.1 jdolecek case 0: /* `.' */
668 1.1 jdolecek case 1: /* `..' */
669 1.1 jdolecek d.d_fileno = PTYFS_FILENO(0, PTYFSroot);
670 1.1 jdolecek d.d_namlen = i + 1;
671 1.1 jdolecek (void)memcpy(d.d_name, "..", d.d_namlen);
672 1.1 jdolecek d.d_name[i + 1] = '\0';
673 1.1 jdolecek d.d_type = DT_DIR;
674 1.1 jdolecek break;
675 1.1 jdolecek }
676 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
677 1.1 jdolecek break;
678 1.1 jdolecek if (cookies)
679 1.1 jdolecek *cookies++ = i + 1;
680 1.1 jdolecek nc++;
681 1.1 jdolecek }
682 1.1 jdolecek if (error) {
683 1.1 jdolecek ncookies = nc;
684 1.1 jdolecek break;
685 1.1 jdolecek }
686 1.1 jdolecek for (; uio->uio_resid >= UIO_MX && i < npty; i++) {
687 1.1 jdolecek /* check for used ptys */
688 1.1 jdolecek if (pty_isfree(i - 2, 1))
689 1.1 jdolecek continue;
690 1.1 jdolecek
691 1.1 jdolecek d.d_fileno = PTYFS_FILENO(i - 2, PTYFSpts);
692 1.1 jdolecek d.d_namlen = snprintf(d.d_name, sizeof(d.d_name),
693 1.1 jdolecek "%lld", (long long)(i - 2));
694 1.1 jdolecek d.d_type = DT_CHR;
695 1.1 jdolecek if ((error = uiomove(&d, UIO_MX, uio)) != 0)
696 1.1 jdolecek break;
697 1.1 jdolecek if (cookies)
698 1.1 jdolecek *cookies++ = i + 1;
699 1.1 jdolecek nc++;
700 1.1 jdolecek }
701 1.1 jdolecek ncookies = nc;
702 1.1 jdolecek break;
703 1.1 jdolecek
704 1.1 jdolecek default:
705 1.1 jdolecek error = ENOTDIR;
706 1.1 jdolecek break;
707 1.1 jdolecek }
708 1.1 jdolecek
709 1.1 jdolecek if (ap->a_ncookies) {
710 1.1 jdolecek if (error) {
711 1.1 jdolecek if (cookies)
712 1.1 jdolecek free(*ap->a_cookies, M_TEMP);
713 1.1 jdolecek *ap->a_ncookies = 0;
714 1.1 jdolecek *ap->a_cookies = NULL;
715 1.1 jdolecek } else
716 1.1 jdolecek *ap->a_ncookies = ncookies;
717 1.1 jdolecek }
718 1.1 jdolecek uio->uio_offset = i;
719 1.1 jdolecek return error;
720 1.1 jdolecek }
721 1.1 jdolecek
722 1.1 jdolecek int
723 1.1 jdolecek ptyfs_open(void *v)
724 1.1 jdolecek {
725 1.1 jdolecek struct vop_open_args /* {
726 1.1 jdolecek struct vnode *a_vp;
727 1.1 jdolecek int a_mode;
728 1.14 elad kauth_cred_t a_cred;
729 1.12 christos struct lwp *a_l;
730 1.1 jdolecek } */ *ap = v;
731 1.1 jdolecek struct vnode *vp = ap->a_vp;
732 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
733 1.1 jdolecek
734 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_CHANGE|PTYFS_ACCESS;
735 1.1 jdolecek switch (ptyfs->ptyfs_type) {
736 1.1 jdolecek case PTYFSpts:
737 1.1 jdolecek case PTYFSptc:
738 1.1 jdolecek return spec_open(v);
739 1.1 jdolecek case PTYFSroot:
740 1.1 jdolecek return 0;
741 1.1 jdolecek default:
742 1.1 jdolecek return EINVAL;
743 1.1 jdolecek }
744 1.1 jdolecek }
745 1.1 jdolecek
746 1.1 jdolecek int
747 1.1 jdolecek ptyfs_close(void *v)
748 1.1 jdolecek {
749 1.1 jdolecek struct vop_close_args /* {
750 1.1 jdolecek struct vnode *a_vp;
751 1.1 jdolecek int a_fflag;
752 1.14 elad kauth_cred_t a_cred;
753 1.12 christos struct lwp *a_l;
754 1.1 jdolecek } */ *ap = v;
755 1.1 jdolecek struct vnode *vp = ap->a_vp;
756 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
757 1.7 perry
758 1.15 kardel simple_lock(&vp->v_interlock);
759 1.15 kardel if (vp->v_usecount > 1)
760 1.9 christos PTYFS_ITIMES(ptyfs, NULL, NULL, NULL);
761 1.15 kardel simple_unlock(&vp->v_interlock);
762 1.1 jdolecek
763 1.1 jdolecek switch (ptyfs->ptyfs_type) {
764 1.1 jdolecek case PTYFSpts:
765 1.1 jdolecek case PTYFSptc:
766 1.1 jdolecek return spec_close(v);
767 1.1 jdolecek case PTYFSroot:
768 1.1 jdolecek return 0;
769 1.1 jdolecek default:
770 1.1 jdolecek return EINVAL;
771 1.1 jdolecek }
772 1.1 jdolecek }
773 1.1 jdolecek
774 1.1 jdolecek int
775 1.1 jdolecek ptyfs_read(void *v)
776 1.1 jdolecek {
777 1.1 jdolecek struct vop_read_args /* {
778 1.1 jdolecek struct vnode *a_vp;
779 1.1 jdolecek struct uio *a_uio;
780 1.1 jdolecek int a_ioflag;
781 1.14 elad kauth_cred_t a_cred;
782 1.1 jdolecek } */ *ap = v;
783 1.10 simonb struct timespec ts;
784 1.1 jdolecek struct vnode *vp = ap->a_vp;
785 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
786 1.1 jdolecek int error;
787 1.1 jdolecek
788 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_ACCESS;
789 1.10 simonb /* hardclock() resolution is good enough for ptyfs */
790 1.15 kardel getnanotime(&ts);
791 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
792 1.10 simonb
793 1.1 jdolecek switch (ptyfs->ptyfs_type) {
794 1.1 jdolecek case PTYFSpts:
795 1.1 jdolecek case PTYFSptc:
796 1.1 jdolecek VOP_UNLOCK(vp, 0);
797 1.23 ad error = cdev_read(vp->v_rdev, ap->a_uio, ap->a_ioflag);
798 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
799 1.1 jdolecek return error;
800 1.1 jdolecek default:
801 1.1 jdolecek return EOPNOTSUPP;
802 1.1 jdolecek }
803 1.1 jdolecek }
804 1.1 jdolecek
805 1.1 jdolecek int
806 1.1 jdolecek ptyfs_write(void *v)
807 1.1 jdolecek {
808 1.1 jdolecek struct vop_write_args /* {
809 1.1 jdolecek struct vnode *a_vp;
810 1.1 jdolecek struct uio *a_uio;
811 1.1 jdolecek int a_ioflag;
812 1.14 elad kauth_cred_t a_cred;
813 1.1 jdolecek } */ *ap = v;
814 1.10 simonb struct timespec ts;
815 1.1 jdolecek struct vnode *vp = ap->a_vp;
816 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
817 1.10 simonb int error;
818 1.1 jdolecek
819 1.1 jdolecek ptyfs->ptyfs_flag |= PTYFS_MODIFY;
820 1.15 kardel getnanotime(&ts);
821 1.11 yamt (void)ptyfs_update(vp, &ts, &ts, 0);
822 1.10 simonb
823 1.1 jdolecek switch (ptyfs->ptyfs_type) {
824 1.1 jdolecek case PTYFSpts:
825 1.1 jdolecek case PTYFSptc:
826 1.1 jdolecek VOP_UNLOCK(vp, 0);
827 1.23 ad error = cdev_write(vp->v_rdev, ap->a_uio, ap->a_ioflag);
828 1.1 jdolecek vn_lock(vp, LK_RETRY|LK_EXCLUSIVE);
829 1.1 jdolecek return error;
830 1.1 jdolecek default:
831 1.1 jdolecek return EOPNOTSUPP;
832 1.1 jdolecek }
833 1.1 jdolecek }
834 1.1 jdolecek
835 1.1 jdolecek int
836 1.1 jdolecek ptyfs_ioctl(void *v)
837 1.1 jdolecek {
838 1.1 jdolecek struct vop_ioctl_args /* {
839 1.1 jdolecek struct vnode *a_vp;
840 1.1 jdolecek u_long a_command;
841 1.1 jdolecek void *a_data;
842 1.1 jdolecek int a_fflag;
843 1.14 elad kauth_cred_t a_cred;
844 1.12 christos struct lwp *a_l;
845 1.1 jdolecek } */ *ap = v;
846 1.1 jdolecek struct vnode *vp = ap->a_vp;
847 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
848 1.1 jdolecek
849 1.1 jdolecek switch (ptyfs->ptyfs_type) {
850 1.1 jdolecek case PTYFSpts:
851 1.1 jdolecek case PTYFSptc:
852 1.23 ad return cdev_ioctl(vp->v_rdev, ap->a_command,
853 1.12 christos ap->a_data, ap->a_fflag, ap->a_l);
854 1.1 jdolecek default:
855 1.1 jdolecek return EOPNOTSUPP;
856 1.1 jdolecek }
857 1.1 jdolecek }
858 1.1 jdolecek
859 1.1 jdolecek int
860 1.1 jdolecek ptyfs_poll(void *v)
861 1.1 jdolecek {
862 1.1 jdolecek struct vop_poll_args /* {
863 1.1 jdolecek struct vnode *a_vp;
864 1.1 jdolecek int a_events;
865 1.12 christos struct lwp *a_l;
866 1.1 jdolecek } */ *ap = v;
867 1.1 jdolecek struct vnode *vp = ap->a_vp;
868 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
869 1.1 jdolecek
870 1.1 jdolecek switch (ptyfs->ptyfs_type) {
871 1.1 jdolecek case PTYFSpts:
872 1.1 jdolecek case PTYFSptc:
873 1.23 ad return cdev_poll(vp->v_rdev, ap->a_events, ap->a_l);
874 1.1 jdolecek default:
875 1.1 jdolecek return genfs_poll(v);
876 1.1 jdolecek }
877 1.1 jdolecek }
878 1.1 jdolecek
879 1.1 jdolecek int
880 1.1 jdolecek ptyfs_kqfilter(void *v)
881 1.1 jdolecek {
882 1.1 jdolecek struct vop_kqfilter_args /* {
883 1.1 jdolecek struct vnode *a_vp;
884 1.1 jdolecek struct knote *a_kn;
885 1.1 jdolecek } */ *ap = v;
886 1.1 jdolecek struct vnode *vp = ap->a_vp;
887 1.1 jdolecek struct ptyfsnode *ptyfs = VTOPTYFS(vp);
888 1.1 jdolecek
889 1.1 jdolecek switch (ptyfs->ptyfs_type) {
890 1.1 jdolecek case PTYFSpts:
891 1.1 jdolecek case PTYFSptc:
892 1.23 ad return cdev_kqfilter(vp->v_rdev, ap->a_kn);
893 1.1 jdolecek default:
894 1.1 jdolecek return genfs_kqfilter(v);
895 1.1 jdolecek }
896 1.1 jdolecek }
897 1.1 jdolecek
898 1.11 yamt static int
899 1.11 yamt ptyfs_update(struct vnode *vp, const struct timespec *acc,
900 1.18 christos const struct timespec *mod, int flags)
901 1.1 jdolecek {
902 1.11 yamt struct ptyfsnode *ptyfs = VTOPTYFS(vp);
903 1.1 jdolecek
904 1.11 yamt if (vp->v_mount->mnt_flag & MNT_RDONLY)
905 1.1 jdolecek return 0;
906 1.1 jdolecek
907 1.11 yamt PTYFS_ITIMES(ptyfs, acc, mod, NULL);
908 1.1 jdolecek return 0;
909 1.1 jdolecek }
910 1.1 jdolecek
911 1.8 christos void
912 1.8 christos ptyfs_itimes(struct ptyfsnode *ptyfs, const struct timespec *acc,
913 1.8 christos const struct timespec *mod, const struct timespec *cre)
914 1.8 christos {
915 1.15 kardel struct timespec now;
916 1.15 kardel
917 1.15 kardel KASSERT(ptyfs->ptyfs_flag & (PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY));
918 1.8 christos
919 1.15 kardel getnanotime(&now);
920 1.22 christos if (ptyfs->ptyfs_flag & PTYFS_ACCESS) {
921 1.8 christos if (acc == NULL)
922 1.15 kardel acc = &now;
923 1.8 christos ptyfs->ptyfs_atime = *acc;
924 1.8 christos }
925 1.1 jdolecek if (ptyfs->ptyfs_flag & PTYFS_MODIFY) {
926 1.8 christos if (mod == NULL)
927 1.15 kardel mod = &now;
928 1.8 christos ptyfs->ptyfs_mtime = *mod;
929 1.8 christos }
930 1.8 christos if (ptyfs->ptyfs_flag & PTYFS_CHANGE) {
931 1.8 christos if (cre == NULL)
932 1.15 kardel cre = &now;
933 1.9 christos ptyfs->ptyfs_ctime = *cre;
934 1.8 christos }
935 1.9 christos ptyfs->ptyfs_flag &= ~(PTYFS_ACCESS|PTYFS_CHANGE|PTYFS_MODIFY);
936 1.1 jdolecek }
937 1.7 perry
938 1.1 jdolecek /*
939 1.1 jdolecek * convert decimal ascii to int
940 1.1 jdolecek */
941 1.1 jdolecek static int
942 1.1 jdolecek atoi(const char *b, size_t len)
943 1.1 jdolecek {
944 1.1 jdolecek int p = 0;
945 1.1 jdolecek
946 1.1 jdolecek while (len--) {
947 1.1 jdolecek char c = *b++;
948 1.1 jdolecek if (c < '0' || c > '9')
949 1.1 jdolecek return -1;
950 1.1 jdolecek p = 10 * p + (c - '0');
951 1.1 jdolecek }
952 1.1 jdolecek
953 1.1 jdolecek return p;
954 1.1 jdolecek }
955