Home | History | Annotate | Line # | Download | only in genfs
genfs_vnops.c revision 1.167.14.2
      1  1.167.14.2       jym /*	$NetBSD: genfs_vnops.c,v 1.167.14.2 2009/07/23 23:32:46 jym Exp $	*/
      2       1.164        ad 
      3       1.164        ad /*-
      4       1.164        ad  * Copyright (c) 2008 The NetBSD Foundation, Inc.
      5       1.164        ad  * All rights reserved.
      6       1.164        ad  *
      7       1.164        ad  * Redistribution and use in source and binary forms, with or without
      8       1.164        ad  * modification, are permitted provided that the following conditions
      9       1.164        ad  * are met:
     10       1.164        ad  * 1. Redistributions of source code must retain the above copyright
     11       1.164        ad  *    notice, this list of conditions and the following disclaimer.
     12       1.164        ad  * 2. Redistributions in binary form must reproduce the above copyright
     13       1.164        ad  *    notice, this list of conditions and the following disclaimer in the
     14       1.164        ad  *    documentation and/or other materials provided with the distribution.
     15       1.164        ad  *
     16       1.164        ad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17       1.164        ad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18       1.164        ad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19       1.164        ad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20       1.164        ad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21       1.164        ad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22       1.164        ad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23       1.164        ad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24       1.164        ad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25       1.164        ad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26       1.164        ad  * POSSIBILITY OF SUCH DAMAGE.
     27       1.164        ad  */
     28         1.6      fvdl 
     29         1.6      fvdl /*
     30         1.6      fvdl  * Copyright (c) 1982, 1986, 1989, 1993
     31         1.6      fvdl  *	The Regents of the University of California.  All rights reserved.
     32         1.6      fvdl  *
     33         1.6      fvdl  * Redistribution and use in source and binary forms, with or without
     34         1.6      fvdl  * modification, are permitted provided that the following conditions
     35         1.6      fvdl  * are met:
     36         1.6      fvdl  * 1. Redistributions of source code must retain the above copyright
     37         1.6      fvdl  *    notice, this list of conditions and the following disclaimer.
     38         1.6      fvdl  * 2. Redistributions in binary form must reproduce the above copyright
     39         1.6      fvdl  *    notice, this list of conditions and the following disclaimer in the
     40         1.6      fvdl  *    documentation and/or other materials provided with the distribution.
     41        1.81       agc  * 3. Neither the name of the University nor the names of its contributors
     42         1.6      fvdl  *    may be used to endorse or promote products derived from this software
     43         1.6      fvdl  *    without specific prior written permission.
     44         1.6      fvdl  *
     45         1.6      fvdl  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     46         1.6      fvdl  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     47         1.6      fvdl  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     48         1.6      fvdl  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     49         1.6      fvdl  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     50         1.6      fvdl  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     51         1.6      fvdl  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     52         1.6      fvdl  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     53         1.6      fvdl  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     54         1.6      fvdl  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     55         1.6      fvdl  * SUCH DAMAGE.
     56         1.6      fvdl  *
     57         1.6      fvdl  */
     58        1.40     lukem 
     59        1.40     lukem #include <sys/cdefs.h>
     60  1.167.14.2       jym __KERNEL_RCSID(0, "$NetBSD: genfs_vnops.c,v 1.167.14.2 2009/07/23 23:32:46 jym Exp $");
     61         1.8   thorpej 
     62         1.1   mycroft #include <sys/param.h>
     63         1.1   mycroft #include <sys/systm.h>
     64         1.6      fvdl #include <sys/proc.h>
     65         1.1   mycroft #include <sys/kernel.h>
     66         1.1   mycroft #include <sys/mount.h>
     67         1.1   mycroft #include <sys/namei.h>
     68         1.1   mycroft #include <sys/vnode.h>
     69        1.13  wrstuden #include <sys/fcntl.h>
     70       1.135      yamt #include <sys/kmem.h>
     71         1.3   mycroft #include <sys/poll.h>
     72        1.37       chs #include <sys/mman.h>
     73        1.66  jdolecek #include <sys/file.h>
     74       1.125      elad #include <sys/kauth.h>
     75  1.167.14.1       jym #include <sys/stat.h>
     76         1.1   mycroft 
     77         1.1   mycroft #include <miscfs/genfs/genfs.h>
     78        1.37       chs #include <miscfs/genfs/genfs_node.h>
     79         1.6      fvdl #include <miscfs/specfs/specdev.h>
     80         1.1   mycroft 
     81        1.21       chs #include <uvm/uvm.h>
     82        1.21       chs #include <uvm/uvm_pager.h>
     83        1.21       chs 
     84        1.70  christos static void filt_genfsdetach(struct knote *);
     85        1.70  christos static int filt_genfsread(struct knote *, long);
     86        1.70  christos static int filt_genfsvnode(struct knote *, long);
     87        1.70  christos 
     88         1.1   mycroft int
     89        1.53     enami genfs_poll(void *v)
     90         1.1   mycroft {
     91         1.3   mycroft 	struct vop_poll_args /* {
     92         1.1   mycroft 		struct vnode *a_vp;
     93         1.3   mycroft 		int a_events;
     94       1.116  christos 		struct lwp *a_l;
     95         1.1   mycroft 	} */ *ap = v;
     96         1.1   mycroft 
     97         1.3   mycroft 	return (ap->a_events & (POLLIN | POLLOUT | POLLRDNORM | POLLWRNORM));
     98         1.1   mycroft }
     99         1.1   mycroft 
    100         1.1   mycroft int
    101        1.53     enami genfs_seek(void *v)
    102         1.4    kleink {
    103         1.4    kleink 	struct vop_seek_args /* {
    104         1.4    kleink 		struct vnode *a_vp;
    105         1.4    kleink 		off_t a_oldoff;
    106         1.4    kleink 		off_t a_newoff;
    107       1.125      elad 		kauth_cred_t cred;
    108         1.4    kleink 	} */ *ap = v;
    109         1.4    kleink 
    110         1.4    kleink 	if (ap->a_newoff < 0)
    111         1.4    kleink 		return (EINVAL);
    112         1.4    kleink 
    113         1.4    kleink 	return (0);
    114         1.4    kleink }
    115         1.4    kleink 
    116         1.4    kleink int
    117        1.53     enami genfs_abortop(void *v)
    118         1.1   mycroft {
    119         1.1   mycroft 	struct vop_abortop_args /* {
    120         1.1   mycroft 		struct vnode *a_dvp;
    121         1.1   mycroft 		struct componentname *a_cnp;
    122         1.1   mycroft 	} */ *ap = v;
    123        1.53     enami 
    124         1.1   mycroft 	if ((ap->a_cnp->cn_flags & (HASBUF | SAVESTART)) == HASBUF)
    125        1.19   thorpej 		PNBUF_PUT(ap->a_cnp->cn_pnbuf);
    126         1.1   mycroft 	return (0);
    127        1.13  wrstuden }
    128        1.13  wrstuden 
    129        1.13  wrstuden int
    130        1.53     enami genfs_fcntl(void *v)
    131        1.13  wrstuden {
    132        1.13  wrstuden 	struct vop_fcntl_args /* {
    133        1.13  wrstuden 		struct vnode *a_vp;
    134        1.13  wrstuden 		u_int a_command;
    135       1.150  christos 		void *a_data;
    136        1.13  wrstuden 		int a_fflag;
    137       1.125      elad 		kauth_cred_t a_cred;
    138       1.116  christos 		struct lwp *a_l;
    139        1.13  wrstuden 	} */ *ap = v;
    140        1.13  wrstuden 
    141        1.13  wrstuden 	if (ap->a_command == F_SETFL)
    142        1.13  wrstuden 		return (0);
    143        1.13  wrstuden 	else
    144        1.13  wrstuden 		return (EOPNOTSUPP);
    145         1.1   mycroft }
    146         1.1   mycroft 
    147         1.1   mycroft /*ARGSUSED*/
    148         1.1   mycroft int
    149       1.138  christos genfs_badop(void *v)
    150         1.1   mycroft {
    151         1.1   mycroft 
    152         1.1   mycroft 	panic("genfs: bad op");
    153         1.1   mycroft }
    154         1.1   mycroft 
    155         1.1   mycroft /*ARGSUSED*/
    156         1.1   mycroft int
    157       1.138  christos genfs_nullop(void *v)
    158         1.1   mycroft {
    159         1.1   mycroft 
    160         1.1   mycroft 	return (0);
    161        1.10    kleink }
    162        1.10    kleink 
    163        1.10    kleink /*ARGSUSED*/
    164        1.10    kleink int
    165       1.138  christos genfs_einval(void *v)
    166        1.10    kleink {
    167        1.10    kleink 
    168        1.10    kleink 	return (EINVAL);
    169         1.1   mycroft }
    170         1.1   mycroft 
    171        1.12  wrstuden /*
    172        1.74  jdolecek  * Called when an fs doesn't support a particular vop.
    173        1.74  jdolecek  * This takes care to vrele, vput, or vunlock passed in vnodes.
    174        1.12  wrstuden  */
    175        1.12  wrstuden int
    176        1.75  jdolecek genfs_eopnotsupp(void *v)
    177        1.12  wrstuden {
    178        1.12  wrstuden 	struct vop_generic_args /*
    179        1.12  wrstuden 		struct vnodeop_desc *a_desc;
    180        1.53     enami 		/ * other random data follows, presumably * /
    181        1.12  wrstuden 	} */ *ap = v;
    182        1.12  wrstuden 	struct vnodeop_desc *desc = ap->a_desc;
    183        1.74  jdolecek 	struct vnode *vp, *vp_last = NULL;
    184        1.12  wrstuden 	int flags, i, j, offset;
    185        1.12  wrstuden 
    186        1.12  wrstuden 	flags = desc->vdesc_flags;
    187        1.12  wrstuden 	for (i = 0; i < VDESC_MAX_VPS; flags >>=1, i++) {
    188        1.12  wrstuden 		if ((offset = desc->vdesc_vp_offsets[i]) == VDESC_NO_OFFSET)
    189        1.12  wrstuden 			break;	/* stop at end of list */
    190        1.12  wrstuden 		if ((j = flags & VDESC_VP0_WILLPUT)) {
    191        1.53     enami 			vp = *VOPARG_OFFSETTO(struct vnode **, offset, ap);
    192        1.74  jdolecek 
    193        1.74  jdolecek 			/* Skip if NULL */
    194        1.74  jdolecek 			if (!vp)
    195        1.74  jdolecek 				continue;
    196        1.74  jdolecek 
    197        1.12  wrstuden 			switch (j) {
    198        1.12  wrstuden 			case VDESC_VP0_WILLPUT:
    199        1.74  jdolecek 				/* Check for dvp == vp cases */
    200        1.74  jdolecek 				if (vp == vp_last)
    201        1.74  jdolecek 					vrele(vp);
    202        1.74  jdolecek 				else {
    203        1.74  jdolecek 					vput(vp);
    204        1.74  jdolecek 					vp_last = vp;
    205        1.74  jdolecek 				}
    206        1.12  wrstuden 				break;
    207        1.12  wrstuden 			case VDESC_VP0_WILLUNLOCK:
    208        1.12  wrstuden 				VOP_UNLOCK(vp, 0);
    209        1.12  wrstuden 				break;
    210        1.12  wrstuden 			case VDESC_VP0_WILLRELE:
    211        1.12  wrstuden 				vrele(vp);
    212        1.12  wrstuden 				break;
    213        1.12  wrstuden 			}
    214        1.12  wrstuden 		}
    215        1.12  wrstuden 	}
    216        1.12  wrstuden 
    217        1.12  wrstuden 	return (EOPNOTSUPP);
    218        1.12  wrstuden }
    219        1.12  wrstuden 
    220         1.1   mycroft /*ARGSUSED*/
    221         1.1   mycroft int
    222       1.138  christos genfs_ebadf(void *v)
    223         1.1   mycroft {
    224         1.1   mycroft 
    225         1.1   mycroft 	return (EBADF);
    226         1.9  matthias }
    227         1.9  matthias 
    228         1.9  matthias /* ARGSUSED */
    229         1.9  matthias int
    230       1.138  christos genfs_enoioctl(void *v)
    231         1.9  matthias {
    232         1.9  matthias 
    233        1.51    atatat 	return (EPASSTHROUGH);
    234         1.6      fvdl }
    235         1.6      fvdl 
    236         1.6      fvdl 
    237         1.6      fvdl /*
    238        1.15      fvdl  * Eliminate all activity associated with the requested vnode
    239         1.6      fvdl  * and with all vnodes aliased to the requested vnode.
    240         1.6      fvdl  */
    241         1.6      fvdl int
    242        1.53     enami genfs_revoke(void *v)
    243         1.6      fvdl {
    244         1.6      fvdl 	struct vop_revoke_args /* {
    245         1.6      fvdl 		struct vnode *a_vp;
    246         1.6      fvdl 		int a_flags;
    247         1.6      fvdl 	} */ *ap = v;
    248         1.6      fvdl 
    249         1.6      fvdl #ifdef DIAGNOSTIC
    250         1.6      fvdl 	if ((ap->a_flags & REVOKEALL) == 0)
    251         1.6      fvdl 		panic("genfs_revoke: not revokeall");
    252         1.6      fvdl #endif
    253       1.161        ad 	vrevoke(ap->a_vp);
    254         1.6      fvdl 	return (0);
    255         1.6      fvdl }
    256         1.6      fvdl 
    257         1.6      fvdl /*
    258        1.12  wrstuden  * Lock the node.
    259         1.6      fvdl  */
    260         1.6      fvdl int
    261        1.53     enami genfs_lock(void *v)
    262         1.6      fvdl {
    263         1.6      fvdl 	struct vop_lock_args /* {
    264         1.6      fvdl 		struct vnode *a_vp;
    265         1.6      fvdl 		int a_flags;
    266         1.6      fvdl 	} */ *ap = v;
    267         1.6      fvdl 	struct vnode *vp = ap->a_vp;
    268       1.163        ad 	int flags = ap->a_flags;
    269         1.6      fvdl 
    270       1.163        ad 	if ((flags & LK_INTERLOCK) != 0) {
    271       1.163        ad 		flags &= ~LK_INTERLOCK;
    272       1.163        ad 		mutex_exit(&vp->v_interlock);
    273       1.163        ad 	}
    274       1.163        ad 
    275       1.163        ad 	return (vlockmgr(vp->v_vnlock, flags));
    276         1.6      fvdl }
    277         1.6      fvdl 
    278         1.6      fvdl /*
    279        1.12  wrstuden  * Unlock the node.
    280         1.6      fvdl  */
    281         1.6      fvdl int
    282        1.53     enami genfs_unlock(void *v)
    283         1.6      fvdl {
    284         1.6      fvdl 	struct vop_unlock_args /* {
    285         1.6      fvdl 		struct vnode *a_vp;
    286         1.6      fvdl 		int a_flags;
    287         1.6      fvdl 	} */ *ap = v;
    288         1.6      fvdl 	struct vnode *vp = ap->a_vp;
    289         1.6      fvdl 
    290       1.163        ad 	KASSERT(ap->a_flags == 0);
    291       1.163        ad 
    292       1.163        ad 	return (vlockmgr(vp->v_vnlock, LK_RELEASE));
    293         1.6      fvdl }
    294         1.6      fvdl 
    295         1.6      fvdl /*
    296        1.12  wrstuden  * Return whether or not the node is locked.
    297         1.6      fvdl  */
    298         1.6      fvdl int
    299        1.53     enami genfs_islocked(void *v)
    300         1.6      fvdl {
    301         1.6      fvdl 	struct vop_islocked_args /* {
    302         1.6      fvdl 		struct vnode *a_vp;
    303         1.6      fvdl 	} */ *ap = v;
    304         1.6      fvdl 	struct vnode *vp = ap->a_vp;
    305         1.6      fvdl 
    306       1.163        ad 	return (vlockstatus(vp->v_vnlock));
    307        1.12  wrstuden }
    308        1.12  wrstuden 
    309        1.12  wrstuden /*
    310        1.12  wrstuden  * Stubs to use when there is no locking to be done on the underlying object.
    311        1.12  wrstuden  */
    312        1.12  wrstuden int
    313        1.53     enami genfs_nolock(void *v)
    314        1.12  wrstuden {
    315        1.12  wrstuden 	struct vop_lock_args /* {
    316        1.12  wrstuden 		struct vnode *a_vp;
    317        1.12  wrstuden 		int a_flags;
    318       1.116  christos 		struct lwp *a_l;
    319        1.12  wrstuden 	} */ *ap = v;
    320        1.12  wrstuden 
    321        1.12  wrstuden 	/*
    322        1.12  wrstuden 	 * Since we are not using the lock manager, we must clear
    323        1.12  wrstuden 	 * the interlock here.
    324        1.12  wrstuden 	 */
    325        1.12  wrstuden 	if (ap->a_flags & LK_INTERLOCK)
    326       1.160        ad 		mutex_exit(&ap->a_vp->v_interlock);
    327        1.12  wrstuden 	return (0);
    328        1.12  wrstuden }
    329        1.12  wrstuden 
    330        1.12  wrstuden int
    331       1.138  christos genfs_nounlock(void *v)
    332        1.12  wrstuden {
    333        1.53     enami 
    334        1.12  wrstuden 	return (0);
    335        1.12  wrstuden }
    336        1.12  wrstuden 
    337        1.12  wrstuden int
    338       1.138  christos genfs_noislocked(void *v)
    339        1.12  wrstuden {
    340        1.53     enami 
    341        1.12  wrstuden 	return (0);
    342         1.8   thorpej }
    343         1.8   thorpej 
    344        1.34       chs int
    345       1.138  christos genfs_mmap(void *v)
    346        1.34       chs {
    347        1.53     enami 
    348        1.53     enami 	return (0);
    349        1.21       chs }
    350        1.21       chs 
    351  1.167.14.1       jym /*
    352  1.167.14.1       jym  * VOP_PUTPAGES() for vnodes which never have pages.
    353  1.167.14.1       jym  */
    354  1.167.14.1       jym 
    355  1.167.14.1       jym int
    356  1.167.14.1       jym genfs_null_putpages(void *v)
    357  1.167.14.1       jym {
    358  1.167.14.1       jym 	struct vop_putpages_args /* {
    359  1.167.14.1       jym 		struct vnode *a_vp;
    360  1.167.14.1       jym 		voff_t a_offlo;
    361  1.167.14.1       jym 		voff_t a_offhi;
    362  1.167.14.1       jym 		int a_flags;
    363  1.167.14.1       jym 	} */ *ap = v;
    364  1.167.14.1       jym 	struct vnode *vp = ap->a_vp;
    365  1.167.14.1       jym 
    366  1.167.14.1       jym 	KASSERT(vp->v_uobj.uo_npages == 0);
    367  1.167.14.1       jym 	mutex_exit(&vp->v_interlock);
    368  1.167.14.1       jym 	return (0);
    369  1.167.14.1       jym }
    370  1.167.14.1       jym 
    371        1.37       chs void
    372        1.98      yamt genfs_node_init(struct vnode *vp, const struct genfs_ops *ops)
    373        1.37       chs {
    374        1.37       chs 	struct genfs_node *gp = VTOG(vp);
    375        1.37       chs 
    376       1.146        ad 	rw_init(&gp->g_glock);
    377        1.37       chs 	gp->g_op = ops;
    378        1.37       chs }
    379        1.37       chs 
    380        1.37       chs void
    381       1.147        ad genfs_node_destroy(struct vnode *vp)
    382       1.147        ad {
    383       1.147        ad 	struct genfs_node *gp = VTOG(vp);
    384       1.147        ad 
    385       1.147        ad 	rw_destroy(&gp->g_glock);
    386       1.147        ad }
    387       1.147        ad 
    388       1.147        ad void
    389       1.138  christos genfs_size(struct vnode *vp, off_t size, off_t *eobp, int flags)
    390        1.21       chs {
    391        1.21       chs 	int bsize;
    392        1.21       chs 
    393        1.37       chs 	bsize = 1 << vp->v_mount->mnt_fs_bshift;
    394        1.37       chs 	*eobp = (size + bsize - 1) & ~(bsize - 1);
    395        1.43       chs }
    396        1.43       chs 
    397        1.66  jdolecek static void
    398        1.66  jdolecek filt_genfsdetach(struct knote *kn)
    399        1.66  jdolecek {
    400        1.66  jdolecek 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    401        1.66  jdolecek 
    402       1.164        ad 	mutex_enter(&vp->v_interlock);
    403        1.66  jdolecek 	SLIST_REMOVE(&vp->v_klist, kn, knote, kn_selnext);
    404       1.164        ad 	mutex_exit(&vp->v_interlock);
    405        1.66  jdolecek }
    406        1.66  jdolecek 
    407        1.66  jdolecek static int
    408        1.66  jdolecek filt_genfsread(struct knote *kn, long hint)
    409        1.66  jdolecek {
    410        1.66  jdolecek 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    411       1.164        ad 	int rv;
    412        1.66  jdolecek 
    413        1.66  jdolecek 	/*
    414        1.66  jdolecek 	 * filesystem is gone, so set the EOF flag and schedule
    415        1.66  jdolecek 	 * the knote for deletion.
    416        1.66  jdolecek 	 */
    417       1.164        ad 	switch (hint) {
    418       1.164        ad 	case NOTE_REVOKE:
    419       1.164        ad 		KASSERT(mutex_owned(&vp->v_interlock));
    420        1.66  jdolecek 		kn->kn_flags |= (EV_EOF | EV_ONESHOT);
    421        1.66  jdolecek 		return (1);
    422       1.164        ad 	case 0:
    423       1.164        ad 		mutex_enter(&vp->v_interlock);
    424       1.165        ad 		kn->kn_data = vp->v_size - ((file_t *)kn->kn_obj)->f_offset;
    425       1.164        ad 		rv = (kn->kn_data != 0);
    426       1.164        ad 		mutex_exit(&vp->v_interlock);
    427       1.164        ad 		return rv;
    428       1.164        ad 	default:
    429       1.164        ad 		KASSERT(mutex_owned(&vp->v_interlock));
    430       1.165        ad 		kn->kn_data = vp->v_size - ((file_t *)kn->kn_obj)->f_offset;
    431       1.164        ad 		return (kn->kn_data != 0);
    432        1.66  jdolecek 	}
    433        1.66  jdolecek }
    434        1.66  jdolecek 
    435        1.66  jdolecek static int
    436        1.66  jdolecek filt_genfsvnode(struct knote *kn, long hint)
    437        1.66  jdolecek {
    438       1.164        ad 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    439       1.164        ad 	int fflags;
    440        1.66  jdolecek 
    441       1.164        ad 	switch (hint) {
    442       1.164        ad 	case NOTE_REVOKE:
    443       1.164        ad 		KASSERT(mutex_owned(&vp->v_interlock));
    444        1.66  jdolecek 		kn->kn_flags |= EV_EOF;
    445       1.164        ad 		if ((kn->kn_sfflags & hint) != 0)
    446       1.164        ad 			kn->kn_fflags |= hint;
    447        1.66  jdolecek 		return (1);
    448       1.164        ad 	case 0:
    449       1.164        ad 		mutex_enter(&vp->v_interlock);
    450       1.164        ad 		fflags = kn->kn_fflags;
    451       1.164        ad 		mutex_exit(&vp->v_interlock);
    452       1.164        ad 		break;
    453       1.164        ad 	default:
    454       1.164        ad 		KASSERT(mutex_owned(&vp->v_interlock));
    455       1.164        ad 		if ((kn->kn_sfflags & hint) != 0)
    456       1.164        ad 			kn->kn_fflags |= hint;
    457       1.164        ad 		fflags = kn->kn_fflags;
    458       1.164        ad 		break;
    459        1.66  jdolecek 	}
    460       1.164        ad 
    461       1.165        ad 	return (fflags != 0);
    462        1.66  jdolecek }
    463        1.66  jdolecek 
    464        1.96     perry static const struct filterops genfsread_filtops =
    465        1.66  jdolecek 	{ 1, NULL, filt_genfsdetach, filt_genfsread };
    466        1.96     perry static const struct filterops genfsvnode_filtops =
    467        1.66  jdolecek 	{ 1, NULL, filt_genfsdetach, filt_genfsvnode };
    468        1.66  jdolecek 
    469        1.66  jdolecek int
    470        1.66  jdolecek genfs_kqfilter(void *v)
    471        1.66  jdolecek {
    472        1.66  jdolecek 	struct vop_kqfilter_args /* {
    473        1.66  jdolecek 		struct vnode	*a_vp;
    474        1.66  jdolecek 		struct knote	*a_kn;
    475        1.66  jdolecek 	} */ *ap = v;
    476        1.66  jdolecek 	struct vnode *vp;
    477        1.66  jdolecek 	struct knote *kn;
    478        1.66  jdolecek 
    479        1.66  jdolecek 	vp = ap->a_vp;
    480        1.66  jdolecek 	kn = ap->a_kn;
    481        1.66  jdolecek 	switch (kn->kn_filter) {
    482        1.66  jdolecek 	case EVFILT_READ:
    483        1.66  jdolecek 		kn->kn_fop = &genfsread_filtops;
    484        1.66  jdolecek 		break;
    485        1.66  jdolecek 	case EVFILT_VNODE:
    486        1.66  jdolecek 		kn->kn_fop = &genfsvnode_filtops;
    487        1.66  jdolecek 		break;
    488        1.66  jdolecek 	default:
    489       1.159     pooka 		return (EINVAL);
    490        1.66  jdolecek 	}
    491        1.66  jdolecek 
    492        1.66  jdolecek 	kn->kn_hook = vp;
    493        1.66  jdolecek 
    494       1.164        ad 	mutex_enter(&vp->v_interlock);
    495        1.66  jdolecek 	SLIST_INSERT_HEAD(&vp->v_klist, kn, kn_selnext);
    496       1.164        ad 	mutex_exit(&vp->v_interlock);
    497        1.66  jdolecek 
    498        1.66  jdolecek 	return (0);
    499         1.1   mycroft }
    500       1.136      yamt 
    501       1.136      yamt void
    502       1.136      yamt genfs_node_wrlock(struct vnode *vp)
    503       1.136      yamt {
    504       1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    505       1.136      yamt 
    506       1.146        ad 	rw_enter(&gp->g_glock, RW_WRITER);
    507       1.136      yamt }
    508       1.136      yamt 
    509       1.136      yamt void
    510       1.136      yamt genfs_node_rdlock(struct vnode *vp)
    511       1.136      yamt {
    512       1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    513       1.136      yamt 
    514       1.146        ad 	rw_enter(&gp->g_glock, RW_READER);
    515       1.136      yamt }
    516       1.136      yamt 
    517       1.136      yamt void
    518       1.136      yamt genfs_node_unlock(struct vnode *vp)
    519       1.136      yamt {
    520       1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    521       1.136      yamt 
    522       1.146        ad 	rw_exit(&gp->g_glock);
    523       1.136      yamt }
    524  1.167.14.1       jym 
    525  1.167.14.1       jym /*
    526  1.167.14.2       jym  * Do the usual access checking.
    527  1.167.14.2       jym  * file_mode, uid and gid are from the vnode in question,
    528  1.167.14.2       jym  * while acc_mode and cred are from the VOP_ACCESS parameter list
    529  1.167.14.2       jym  */
    530  1.167.14.2       jym int
    531  1.167.14.2       jym genfs_can_access(enum vtype type, mode_t file_mode, uid_t uid, gid_t gid,
    532  1.167.14.2       jym     mode_t acc_mode, kauth_cred_t cred)
    533  1.167.14.2       jym {
    534  1.167.14.2       jym 	mode_t mask;
    535  1.167.14.2       jym 	int error, ismember;
    536  1.167.14.2       jym 
    537  1.167.14.2       jym 	/*
    538  1.167.14.2       jym 	 * Super-user always gets read/write access, but execute access depends
    539  1.167.14.2       jym 	 * on at least one execute bit being set.
    540  1.167.14.2       jym 	 */
    541  1.167.14.2       jym 	if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) == 0) {
    542  1.167.14.2       jym 		if ((acc_mode & VEXEC) && type != VDIR &&
    543  1.167.14.2       jym 		    (file_mode & (S_IXUSR|S_IXGRP|S_IXOTH)) == 0)
    544  1.167.14.2       jym 			return (EACCES);
    545  1.167.14.2       jym 		return (0);
    546  1.167.14.2       jym 	}
    547  1.167.14.2       jym 
    548  1.167.14.2       jym 	mask = 0;
    549  1.167.14.2       jym 
    550  1.167.14.2       jym 	/* Otherwise, check the owner. */
    551  1.167.14.2       jym 	if (kauth_cred_geteuid(cred) == uid) {
    552  1.167.14.2       jym 		if (acc_mode & VEXEC)
    553  1.167.14.2       jym 			mask |= S_IXUSR;
    554  1.167.14.2       jym 		if (acc_mode & VREAD)
    555  1.167.14.2       jym 			mask |= S_IRUSR;
    556  1.167.14.2       jym 		if (acc_mode & VWRITE)
    557  1.167.14.2       jym 			mask |= S_IWUSR;
    558  1.167.14.2       jym 		return ((file_mode & mask) == mask ? 0 : EACCES);
    559  1.167.14.2       jym 	}
    560  1.167.14.2       jym 
    561  1.167.14.2       jym 	/* Otherwise, check the groups. */
    562  1.167.14.2       jym 	error = kauth_cred_ismember_gid(cred, gid, &ismember);
    563  1.167.14.2       jym 	if (error)
    564  1.167.14.2       jym 		return (error);
    565  1.167.14.2       jym 	if (kauth_cred_getegid(cred) == gid || ismember) {
    566  1.167.14.2       jym 		if (acc_mode & VEXEC)
    567  1.167.14.2       jym 			mask |= S_IXGRP;
    568  1.167.14.2       jym 		if (acc_mode & VREAD)
    569  1.167.14.2       jym 			mask |= S_IRGRP;
    570  1.167.14.2       jym 		if (acc_mode & VWRITE)
    571  1.167.14.2       jym 			mask |= S_IWGRP;
    572  1.167.14.2       jym 		return ((file_mode & mask) == mask ? 0 : EACCES);
    573  1.167.14.2       jym 	}
    574  1.167.14.2       jym 
    575  1.167.14.2       jym 	/* Otherwise, check everyone else. */
    576  1.167.14.2       jym 	if (acc_mode & VEXEC)
    577  1.167.14.2       jym 		mask |= S_IXOTH;
    578  1.167.14.2       jym 	if (acc_mode & VREAD)
    579  1.167.14.2       jym 		mask |= S_IROTH;
    580  1.167.14.2       jym 	if (acc_mode & VWRITE)
    581  1.167.14.2       jym 		mask |= S_IWOTH;
    582  1.167.14.2       jym 	return ((file_mode & mask) == mask ? 0 : EACCES);
    583  1.167.14.2       jym }
    584  1.167.14.2       jym 
    585  1.167.14.2       jym /*
    586  1.167.14.1       jym  * Common routine to check if chmod() is allowed.
    587  1.167.14.1       jym  *
    588  1.167.14.1       jym  * Policy:
    589  1.167.14.1       jym  *   - You must be root, or
    590  1.167.14.1       jym  *   - You must own the file, and
    591  1.167.14.1       jym  *     - You must not set the "sticky" bit (meaningless, see chmod(2))
    592  1.167.14.1       jym  *     - You must be a member of the group if you're trying to set the
    593  1.167.14.1       jym  *       SGIDf bit
    594  1.167.14.1       jym  *
    595  1.167.14.1       jym  * cred - credentials of the invoker
    596  1.167.14.1       jym  * vp - vnode of the file-system object
    597  1.167.14.1       jym  * cur_uid, cur_gid - current uid/gid of the file-system object
    598  1.167.14.1       jym  * new_mode - new mode for the file-system object
    599  1.167.14.1       jym  *
    600  1.167.14.1       jym  * Returns 0 if the change is allowed, or an error value otherwise.
    601  1.167.14.1       jym  */
    602  1.167.14.1       jym int
    603  1.167.14.1       jym genfs_can_chmod(vnode_t *vp, kauth_cred_t cred, uid_t cur_uid,
    604  1.167.14.1       jym     gid_t cur_gid, mode_t new_mode)
    605  1.167.14.1       jym {
    606  1.167.14.1       jym 	int error;
    607  1.167.14.1       jym 
    608  1.167.14.1       jym 	/* Superuser can always change mode. */
    609  1.167.14.1       jym 	error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
    610  1.167.14.1       jym 	    NULL);
    611  1.167.14.1       jym 	if (!error)
    612  1.167.14.1       jym 		return (0);
    613  1.167.14.1       jym 
    614  1.167.14.1       jym 	/* Otherwise, user must own the file. */
    615  1.167.14.1       jym 	if (kauth_cred_geteuid(cred) != cur_uid)
    616  1.167.14.1       jym 		return (EPERM);
    617  1.167.14.1       jym 
    618  1.167.14.1       jym 	/*
    619  1.167.14.1       jym 	 * Non-root users can't set the sticky bit on files.
    620  1.167.14.1       jym 	 */
    621  1.167.14.1       jym 	if ((vp->v_type != VDIR) && (new_mode & S_ISTXT))
    622  1.167.14.1       jym 		return (EFTYPE);
    623  1.167.14.1       jym 
    624  1.167.14.1       jym 	/*
    625  1.167.14.1       jym 	 * If the invoker is trying to set the SGID bit on the file,
    626  1.167.14.1       jym 	 * check group membership.
    627  1.167.14.1       jym 	 */
    628  1.167.14.1       jym 	if (new_mode & S_ISGID) {
    629  1.167.14.1       jym 		int ismember;
    630  1.167.14.1       jym 
    631  1.167.14.1       jym 		error = kauth_cred_ismember_gid(cred, cur_gid,
    632  1.167.14.1       jym 		    &ismember);
    633  1.167.14.1       jym 		if (error || !ismember)
    634  1.167.14.1       jym 			return (EPERM);
    635  1.167.14.1       jym 	}
    636  1.167.14.1       jym 
    637  1.167.14.1       jym 	return (0);
    638  1.167.14.1       jym }
    639  1.167.14.1       jym 
    640  1.167.14.1       jym /*
    641  1.167.14.1       jym  * Common routine to check if chown() is allowed.
    642  1.167.14.1       jym  *
    643  1.167.14.1       jym  * Policy:
    644  1.167.14.1       jym  *   - You must be root, or
    645  1.167.14.1       jym  *   - You must own the file, and
    646  1.167.14.1       jym  *     - You must not try to change ownership, and
    647  1.167.14.1       jym  *     - You must be member of the new group
    648  1.167.14.1       jym  *
    649  1.167.14.1       jym  * cred - credentials of the invoker
    650  1.167.14.1       jym  * cur_uid, cur_gid - current uid/gid of the file-system object
    651  1.167.14.1       jym  * new_uid, new_gid - target uid/gid of the file-system object
    652  1.167.14.1       jym  *
    653  1.167.14.1       jym  * Returns 0 if the change is allowed, or an error value otherwise.
    654  1.167.14.1       jym  */
    655  1.167.14.1       jym int
    656  1.167.14.1       jym genfs_can_chown(vnode_t *vp, kauth_cred_t cred, uid_t cur_uid,
    657  1.167.14.1       jym     gid_t cur_gid, uid_t new_uid, gid_t new_gid)
    658  1.167.14.1       jym {
    659  1.167.14.1       jym 	int error, ismember;
    660  1.167.14.1       jym 
    661  1.167.14.1       jym 	/*
    662  1.167.14.1       jym 	 * You can only change ownership of a file if:
    663  1.167.14.1       jym 	 * You are the superuser, or...
    664  1.167.14.1       jym 	 */
    665  1.167.14.1       jym 	error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
    666  1.167.14.1       jym 	    NULL);
    667  1.167.14.1       jym 	if (!error)
    668  1.167.14.1       jym 		return (0);
    669  1.167.14.1       jym 
    670  1.167.14.1       jym 	/*
    671  1.167.14.1       jym 	 * You own the file and...
    672  1.167.14.1       jym 	 */
    673  1.167.14.1       jym 	if (kauth_cred_geteuid(cred) == cur_uid) {
    674  1.167.14.1       jym 		/*
    675  1.167.14.1       jym 		 * You don't try to change ownership, and...
    676  1.167.14.1       jym 		 */
    677  1.167.14.1       jym 		if (new_uid != cur_uid)
    678  1.167.14.1       jym 			return (EPERM);
    679  1.167.14.1       jym 
    680  1.167.14.1       jym 		/*
    681  1.167.14.1       jym 		 * You don't try to change group (no-op), or...
    682  1.167.14.1       jym 		 */
    683  1.167.14.1       jym 		if (new_gid == cur_gid)
    684  1.167.14.1       jym 			return (0);
    685  1.167.14.1       jym 
    686  1.167.14.1       jym 		/*
    687  1.167.14.1       jym 		 * Your effective gid is the new gid, or...
    688  1.167.14.1       jym 		 */
    689  1.167.14.1       jym 		if (kauth_cred_getegid(cred) == new_gid)
    690  1.167.14.1       jym 			return (0);
    691  1.167.14.1       jym 
    692  1.167.14.1       jym 		/*
    693  1.167.14.1       jym 		 * The new gid is one you're a member of.
    694  1.167.14.1       jym 		 */
    695  1.167.14.1       jym 		ismember = 0;
    696  1.167.14.1       jym 		error = kauth_cred_ismember_gid(cred, new_gid,
    697  1.167.14.1       jym 		    &ismember);
    698  1.167.14.1       jym 		if (error || !ismember)
    699  1.167.14.1       jym 			return (EPERM);
    700  1.167.14.1       jym 	}
    701  1.167.14.1       jym 
    702  1.167.14.1       jym 	return (0);
    703  1.167.14.1       jym }
    704  1.167.14.1       jym 
    705  1.167.14.1       jym /*
    706  1.167.14.1       jym  * Common routine to check if the device can be mounted.
    707  1.167.14.1       jym  *
    708  1.167.14.1       jym  * devvp - the locked vnode of the device
    709  1.167.14.1       jym  * cred - credentials of the invoker
    710  1.167.14.1       jym  * accessmode - the accessmode (VREAD, VWRITE)
    711  1.167.14.1       jym  *
    712  1.167.14.1       jym  * Returns 0 if the mount is allowed, or an error value otherwise.
    713  1.167.14.1       jym  */
    714  1.167.14.1       jym int
    715  1.167.14.1       jym genfs_can_mount(vnode_t *devvp, mode_t accessmode, kauth_cred_t cred)
    716  1.167.14.1       jym {
    717  1.167.14.1       jym 	int error;
    718  1.167.14.1       jym 
    719  1.167.14.1       jym 	/* Always allow for root. */
    720  1.167.14.1       jym 	error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL);
    721  1.167.14.1       jym 	if (!error)
    722  1.167.14.1       jym 		return (0);
    723  1.167.14.1       jym 
    724  1.167.14.1       jym 	error = VOP_ACCESS(devvp, accessmode, cred);
    725  1.167.14.1       jym 
    726  1.167.14.1       jym 	return (error);
    727  1.167.14.1       jym }
    728  1.167.14.1       jym 
    729  1.167.14.1       jym int
    730  1.167.14.1       jym genfs_can_chtimes(vnode_t *vp, u_int vaflags, uid_t owner_uid,
    731  1.167.14.1       jym     kauth_cred_t cred)
    732  1.167.14.1       jym {
    733  1.167.14.1       jym 	int error;
    734  1.167.14.1       jym 
    735  1.167.14.1       jym 	/* Must be root, or... */
    736  1.167.14.1       jym 	error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL);
    737  1.167.14.1       jym 	if (!error)
    738  1.167.14.1       jym 		return (0);
    739  1.167.14.1       jym 
    740  1.167.14.1       jym 	/* must be owner, or... */
    741  1.167.14.1       jym 	if (kauth_cred_geteuid(cred) == owner_uid)
    742  1.167.14.1       jym 		return (0);
    743  1.167.14.1       jym 
    744  1.167.14.1       jym 	/* set the times to the current time, and... */
    745  1.167.14.1       jym 	if ((vaflags & VA_UTIMES_NULL) == 0)
    746  1.167.14.1       jym 		return (EPERM);
    747  1.167.14.1       jym 
    748  1.167.14.1       jym 	/* have write access. */
    749  1.167.14.1       jym 	error = VOP_ACCESS(vp, VWRITE, cred);
    750  1.167.14.1       jym 	if (error)
    751  1.167.14.1       jym 		return (error);
    752  1.167.14.1       jym 
    753  1.167.14.1       jym 	return (0);
    754  1.167.14.1       jym }
    755  1.167.14.1       jym 
    756