Home | History | Annotate | Line # | Download | only in kernfs
kernfs_vnops.c revision 1.12.2.1
      1       1.1      cgd /*
      2       1.1      cgd  * Copyright (c) 1990, 1992 Jan-Simon Pendry
      3       1.1      cgd  * All rights reserved.
      4       1.1      cgd  *
      5       1.2      cgd  * This code is derived from software contributed to Berkeley by
      6       1.1      cgd  * Jan-Simon Pendry.
      7       1.1      cgd  *
      8       1.2      cgd  * Redistribution and use in source and binary forms, with or without
      9       1.2      cgd  * modification, are permitted provided that the following conditions
     10       1.2      cgd  * are met:
     11       1.2      cgd  * 1. Redistributions of source code must retain the above copyright
     12       1.2      cgd  *    notice, this list of conditions and the following disclaimer.
     13       1.2      cgd  * 2. Redistributions in binary form must reproduce the above copyright
     14       1.2      cgd  *    notice, this list of conditions and the following disclaimer in the
     15       1.2      cgd  *    documentation and/or other materials provided with the distribution.
     16       1.2      cgd  * 3. All advertising materials mentioning features or use of this software
     17       1.2      cgd  *    must display the following acknowledgement:
     18       1.2      cgd  *      This product includes software developed by the University of
     19       1.2      cgd  *      California, Berkeley and its contributors.
     20       1.2      cgd  * 4. Neither the name of the University nor the names of its contributors
     21       1.2      cgd  *    may be used to endorse or promote products derived from this software
     22       1.2      cgd  *    without specific prior written permission.
     23       1.1      cgd  *
     24       1.2      cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25       1.2      cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26       1.2      cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27       1.2      cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28       1.2      cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29       1.2      cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30       1.2      cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31       1.2      cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32       1.2      cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33       1.2      cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34       1.2      cgd  * SUCH DAMAGE.
     35       1.1      cgd  *
     36  1.12.2.1  mycroft  *	$Id: kernfs_vnops.c,v 1.12.2.1 1993/09/24 08:52:49 mycroft Exp $
     37       1.1      cgd  */
     38       1.1      cgd 
     39       1.1      cgd /*
     40       1.1      cgd  * Kernel parameter filesystem
     41       1.1      cgd  */
     42       1.1      cgd 
     43       1.1      cgd #include "param.h"
     44       1.1      cgd #include "systm.h"
     45       1.1      cgd #include "kernel.h"
     46       1.1      cgd #include "types.h"
     47       1.1      cgd #include "time.h"
     48       1.1      cgd #include "proc.h"
     49       1.1      cgd #include "file.h"
     50       1.1      cgd #include "vnode.h"
     51       1.1      cgd #include "stat.h"
     52       1.1      cgd #include "mount.h"
     53       1.1      cgd #include "namei.h"
     54       1.1      cgd #include "buf.h"
     55       1.1      cgd #include "miscfs/kernfs/kernfs.h"
     56       1.1      cgd 
     57       1.1      cgd #include "../ufs/dir.h"		/* For readdir() XXX */
     58       1.1      cgd 
     59       1.9      cgd struct kernfs_target kernfs_targets[] = {
     60       1.1      cgd /* NOTE: The name must be less than UIO_MX-16 chars in length */
     61       1.9      cgd DIR_TARGET(".",		0,		KTT_NULL,	KTM_DIR_PERMS	)
     62       1.9      cgd DIR_TARGET("..",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     63       1.9      cgd REG_TARGET("copyright",	copyright,	KTT_STRING,	KTM_RO_PERMS	)
     64       1.9      cgd REG_TARGET("hostname",	0,		KTT_HOSTNAME,	KTM_RW_PERMS	)
     65       1.9      cgd REG_TARGET("hz",	&hz,		KTT_INT,	KTM_RO_PERMS	)
     66       1.9      cgd REG_TARGET("loadavg",	0,		KTT_AVENRUN,	KTM_RO_PERMS	)
     67       1.9      cgd REG_TARGET("physmem",	&physmem,	KTT_INT,	KTM_RO_PERMS	)
     68       1.9      cgd DIR_TARGET("root",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     69       1.9      cgd BLK_TARGET("rootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     70       1.9      cgd CHR_TARGET("rrootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     71       1.9      cgd REG_TARGET("time",	0,		KTT_TIME,	KTM_RO_PERMS	)
     72       1.9      cgd REG_TARGET("version",	version,	KTT_STRING,	KTM_RO_PERMS	)
     73       1.1      cgd };
     74       1.1      cgd 
     75       1.9      cgd static int nkernfs_targets = sizeof(kernfs_targets) / sizeof(kernfs_targets[0]);
     76       1.1      cgd 
     77       1.1      cgd static int
     78       1.1      cgd kernfs_xread(kt, buf, len, lenp)
     79       1.9      cgd 	struct kernfs_target *kt;
     80       1.1      cgd 	char *buf;
     81       1.1      cgd 	int len;
     82       1.1      cgd 	int *lenp;
     83       1.1      cgd {
     84       1.1      cgd 	int xlen;
     85       1.1      cgd 
     86       1.1      cgd 	switch (kt->kt_tag) {
     87       1.1      cgd 	case KTT_TIME: {
     88       1.1      cgd 		struct timeval tv;
     89       1.1      cgd 		microtime(&tv);
     90       1.1      cgd 		sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec);
     91       1.1      cgd 		break;
     92       1.1      cgd 	}
     93       1.1      cgd 
     94       1.1      cgd 	case KTT_INT: {
     95       1.1      cgd 		int *ip = kt->kt_data;
     96       1.1      cgd 		sprintf(buf, "%d\n", *ip);
     97       1.1      cgd 		break;
     98       1.1      cgd 	}
     99       1.1      cgd 
    100       1.1      cgd 	case KTT_STRING: {
    101       1.1      cgd 		char *cp = kt->kt_data;
    102       1.1      cgd 		int xlen = strlen(cp) + 1;
    103       1.1      cgd 
    104       1.1      cgd 		if (xlen >= len)
    105       1.1      cgd 			return (EINVAL);
    106       1.1      cgd 
    107       1.1      cgd 		bcopy(cp, buf, xlen);
    108       1.1      cgd 		break;
    109       1.1      cgd 	}
    110       1.1      cgd 
    111       1.1      cgd 	case KTT_HOSTNAME: {
    112       1.1      cgd 		char *cp = hostname;
    113       1.1      cgd 		int xlen = hostnamelen;
    114       1.1      cgd 
    115       1.6      cgd 		if (xlen + 2 > len)	/* extra space for null and newline */
    116       1.1      cgd 			return (EINVAL);
    117       1.1      cgd 
    118       1.6      cgd 		bcopy(cp, buf, xlen);	/* safer than sprintf */
    119       1.6      cgd 		buf[xlen] = '\n';
    120       1.6      cgd 		buf[xlen+1] = '\0';
    121       1.1      cgd 		break;
    122       1.1      cgd 	}
    123       1.1      cgd 
    124       1.1      cgd 	case KTT_AVENRUN:
    125       1.1      cgd 		sprintf(buf, "%d %d %d %d\n",
    126  1.12.2.1  mycroft 				averunnable.ldavg[0],
    127  1.12.2.1  mycroft 				averunnable.ldavg[1],
    128  1.12.2.1  mycroft 				averunnable.ldavg[2],
    129       1.1      cgd 				FSCALE);
    130       1.1      cgd 		break;
    131       1.1      cgd 
    132       1.1      cgd 	default:
    133       1.1      cgd 		return (EINVAL);
    134       1.1      cgd 	}
    135       1.1      cgd 
    136       1.1      cgd 	*lenp = strlen(buf);
    137       1.1      cgd 	return (0);
    138       1.1      cgd }
    139       1.1      cgd 
    140       1.1      cgd static int
    141       1.1      cgd kernfs_xwrite(kt, buf, len)
    142       1.9      cgd 	struct kernfs_target *kt;
    143       1.1      cgd 	char *buf;
    144       1.1      cgd 	int len;
    145       1.1      cgd {
    146       1.1      cgd 	switch (kt->kt_tag) {
    147       1.1      cgd 	case KTT_HOSTNAME: {
    148       1.1      cgd 		if (buf[len-1] == '\n')
    149       1.1      cgd 			--len;
    150       1.1      cgd 		bcopy(buf, hostname, len);
    151       1.6      cgd 		/* kernfs_write set buf[value_passed_as_len] = \0.
    152       1.6      cgd 		 * therefore, buf len (hostnamelen) = len.
    153       1.6      cgd 		 */
    154       1.6      cgd 		hostnamelen = len;
    155       1.6      cgd 		hostname[hostnamelen] = '\0';	/* null end of string. */
    156       1.1      cgd 		return (0);
    157       1.1      cgd 	}
    158       1.1      cgd 
    159       1.1      cgd 	default:
    160       1.1      cgd 		return (EIO);
    161       1.1      cgd 	}
    162       1.1      cgd }
    163       1.1      cgd 
    164       1.1      cgd /*
    165       1.1      cgd  * vp is the current namei directory
    166       1.1      cgd  * ndp is the name to locate in that directory...
    167       1.1      cgd  */
    168       1.1      cgd kernfs_lookup(dvp, ndp, p)
    169       1.1      cgd 	struct vnode *dvp;
    170       1.1      cgd 	struct nameidata *ndp;
    171       1.1      cgd 	struct proc *p;
    172       1.1      cgd {
    173       1.1      cgd 	char *pname = ndp->ni_ptr;
    174       1.1      cgd 	int error = ENOENT;
    175       1.1      cgd 	int i;
    176       1.1      cgd 	struct vnode *fvp;
    177       1.1      cgd 
    178       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    179       1.1      cgd 	printf("kernfs_lookup(%s)\n", pname);
    180       1.1      cgd #endif
    181       1.1      cgd 	if (ndp->ni_namelen == 1 && *pname == '.') {
    182       1.1      cgd 		ndp->ni_dvp = dvp;
    183       1.1      cgd 		ndp->ni_vp = dvp;
    184       1.1      cgd 		VREF(dvp);
    185       1.1      cgd 		/*VOP_LOCK(dvp);*/
    186       1.1      cgd 		return (0);
    187       1.1      cgd 	}
    188       1.1      cgd 
    189       1.1      cgd 	if (ndp->ni_namelen == 4 && bcmp(pname, "root", 4) == 0) {
    190       1.3      cgd 		ndp->ni_dvp = dvp;
    191       1.1      cgd 		ndp->ni_vp = rootdir;
    192       1.1      cgd 		VREF(rootdir);
    193       1.1      cgd 		VOP_LOCK(rootdir);
    194       1.1      cgd 		return (0);
    195       1.1      cgd 	}
    196       1.1      cgd 
    197       1.1      cgd 	/*
    198       1.1      cgd 	 * /kern/rootdev is the root device
    199       1.1      cgd 	 */
    200       1.1      cgd 	if (ndp->ni_namelen == 7 && bcmp(pname, "rootdev", 7) == 0) {
    201       1.1      cgd 		if (vfinddev(rootdev, VBLK, &fvp))
    202       1.1      cgd 			return (ENXIO);
    203       1.1      cgd 		ndp->ni_dvp = dvp;
    204       1.1      cgd 		ndp->ni_vp = fvp;
    205       1.1      cgd 		VREF(fvp);
    206       1.1      cgd 		VOP_LOCK(fvp);
    207       1.4      cgd 		return (0);
    208       1.4      cgd 	}
    209       1.4      cgd 
    210       1.4      cgd 	/*
    211       1.4      cgd 	 * /kern/rrootdev is the root device
    212       1.4      cgd 	 */
    213       1.4      cgd 	if (ndp->ni_namelen == 8 && bcmp(pname, "rrootdev", 7) == 0) {
    214       1.4      cgd 		ndp->ni_dvp = dvp;
    215       1.4      cgd 		ndp->ni_vp = rrootdevvp;
    216       1.4      cgd 		VREF(rrootdevvp);
    217       1.4      cgd 		VOP_LOCK(rrootdevvp);
    218       1.1      cgd 		return (0);
    219       1.1      cgd 	}
    220       1.1      cgd 
    221       1.9      cgd 	for (i = 0; i < nkernfs_targets; i++) {
    222       1.9      cgd 		struct kernfs_target *kt = &kernfs_targets[i];
    223       1.1      cgd 		if (ndp->ni_namelen == strlen(kt->kt_name) &&
    224       1.1      cgd 		    bcmp(kt->kt_name, pname, ndp->ni_namelen) == 0) {
    225       1.1      cgd 			error = 0;
    226       1.1      cgd 			break;
    227       1.1      cgd 		}
    228       1.1      cgd 	}
    229       1.1      cgd 
    230       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    231       1.1      cgd 	printf("kernfs_lookup: i = %d, error = %d\n", i, error);
    232       1.1      cgd #endif
    233       1.1      cgd 
    234       1.1      cgd 	if (error)
    235       1.1      cgd 		goto bad;
    236       1.1      cgd 
    237       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    238       1.1      cgd 	printf("kernfs_lookup: allocate new vnode\n");
    239       1.1      cgd #endif
    240      1.10      cgd 	error = getnewvnode(VT_KERNFS, dvp->v_mount, &kernfs_vnodeops, &fvp);
    241       1.1      cgd 	if (error)
    242       1.1      cgd 		goto bad;
    243       1.9      cgd 	VTOKERN(fvp)->kf_kt = &kernfs_targets[i];
    244       1.1      cgd 	fvp->v_type = VTOKERN(fvp)->kf_kt->kt_vtype;
    245       1.1      cgd 	ndp->ni_dvp = dvp;
    246       1.1      cgd 	ndp->ni_vp = fvp;
    247       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    248       1.1      cgd 	printf("kernfs_lookup: newvp = %x\n", fvp);
    249       1.1      cgd #endif
    250       1.1      cgd 	return (0);
    251       1.1      cgd 
    252       1.1      cgd bad:;
    253       1.1      cgd 	ndp->ni_dvp = dvp;
    254       1.1      cgd 	ndp->ni_vp = NULL;
    255       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    256       1.1      cgd 	printf("kernfs_lookup: error = %d\n", error);
    257       1.1      cgd #endif
    258       1.1      cgd 	return (error);
    259       1.1      cgd }
    260       1.1      cgd 
    261       1.1      cgd kernfs_open(vp, mode, cred, p)
    262       1.1      cgd 	struct vnode *vp;
    263       1.1      cgd 	int mode;
    264       1.1      cgd 	struct ucred *cred;
    265       1.1      cgd 	struct proc *p;
    266       1.1      cgd {
    267       1.9      cgd 	/* if access succeeded, this always does, too */
    268       1.1      cgd 
    269       1.1      cgd 	return (0);
    270       1.1      cgd }
    271       1.1      cgd 
    272       1.8      cgd /*
    273       1.8      cgd  * Check mode permission on target pointer. Mode is READ, WRITE or EXEC.
    274       1.8      cgd  * The mode is shifted to select the owner/group/other fields. The
    275       1.8      cgd  * super user is granted all permissions.
    276       1.8      cgd  */
    277       1.8      cgd kernfs_access(vp, mode, cred, p)
    278       1.9      cgd 	struct vnode *vp;
    279       1.9      cgd 	register int mode;
    280       1.9      cgd 	struct ucred *cred;
    281       1.9      cgd 	struct proc *p;
    282       1.9      cgd {
    283       1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    284       1.9      cgd 	register gid_t *gp;
    285       1.9      cgd 	int i, error;
    286       1.8      cgd 
    287       1.8      cgd #ifdef KERN_DIAGNOSTIC
    288       1.9      cgd 	if (!VOP_ISLOCKED(vp)) {
    289       1.9      cgd 		vprint("kernfs_access: not locked", vp);
    290       1.9      cgd 		panic("kernfs_access: not locked");
    291       1.9      cgd 	}
    292       1.9      cgd #endif
    293       1.9      cgd 	/*
    294       1.9      cgd 	 * If you're the super-user, you always get access.
    295       1.9      cgd 	 */
    296       1.9      cgd 	if (cred->cr_uid == 0)
    297       1.9      cgd 		return (0);
    298       1.9      cgd 	/*
    299       1.9      cgd 	 * Access check is based on only one of owner, group, public.
    300       1.9      cgd 	 * If not owner, then check group. If not a member of the
    301       1.9      cgd 	 * group, then check public access.
    302       1.9      cgd 	 */
    303       1.9      cgd 	if (cred->cr_uid != /* kt->kt_uid XXX */ 0) {
    304       1.9      cgd 		mode >>= 3;
    305       1.9      cgd 		gp = cred->cr_groups;
    306       1.9      cgd 		for (i = 0; i < cred->cr_ngroups; i++, gp++)
    307       1.9      cgd 			if (/* kt->kt_gid XXX */ 0 == *gp)
    308       1.9      cgd 				goto found;
    309       1.9      cgd 		mode >>= 3;
    310       1.8      cgd found:
    311       1.9      cgd 		;
    312       1.9      cgd 	}
    313       1.9      cgd 	if ((kt->kt_perms & mode) == mode)
    314       1.9      cgd 		return (0);
    315       1.9      cgd 	return (EACCES);
    316       1.8      cgd }
    317       1.8      cgd 
    318       1.1      cgd kernfs_getattr(vp, vap, cred, p)
    319       1.1      cgd 	struct vnode *vp;
    320       1.1      cgd 	struct vattr *vap;
    321       1.1      cgd 	struct ucred *cred;
    322       1.1      cgd 	struct proc *p;
    323       1.1      cgd {
    324       1.1      cgd 	int error = 0;
    325       1.1      cgd 	char strbuf[KSTRING];
    326       1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    327       1.1      cgd 
    328       1.1      cgd 	bzero((caddr_t) vap, sizeof(*vap));
    329       1.1      cgd 	vattr_null(vap);
    330       1.9      cgd 	vap->va_uid = kt->kt_uid;
    331       1.9      cgd 	vap->va_gid = kt->kt_gid;
    332       1.1      cgd 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
    333       1.1      cgd 	/* vap->va_qsize = 0; */
    334       1.1      cgd 	vap->va_blocksize = DEV_BSIZE;
    335       1.1      cgd 	microtime(&vap->va_atime);
    336       1.1      cgd 	vap->va_mtime = vap->va_atime;
    337       1.1      cgd 	vap->va_ctime = vap->va_ctime;
    338       1.1      cgd 	vap->va_gen = 0;
    339       1.1      cgd 	vap->va_flags = 0;
    340       1.1      cgd 	vap->va_rdev = 0;
    341       1.1      cgd 	/* vap->va_qbytes = 0; */
    342       1.1      cgd 	vap->va_bytes = 0;
    343       1.9      cgd 	vap->va_type = kt->kt_vtype;
    344       1.9      cgd 	vap->va_mode = kt->kt_perms;
    345       1.1      cgd 
    346       1.1      cgd 	if (vp->v_flag & VROOT) {
    347       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    348       1.1      cgd 		printf("kernfs_getattr: stat rootdir\n");
    349       1.1      cgd #endif
    350       1.1      cgd 		vap->va_nlink = 2;
    351       1.1      cgd 		vap->va_fileid = 2;
    352       1.1      cgd 		vap->va_size = DEV_BSIZE;
    353       1.1      cgd 	} else {
    354       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    355       1.1      cgd 		printf("kernfs_getattr: stat target %s\n", kt->kt_name);
    356       1.1      cgd #endif
    357       1.1      cgd 		vap->va_nlink = 1;
    358       1.9      cgd 		vap->va_fileid = 3 + (kt - kernfs_targets) / sizeof(*kt);
    359       1.1      cgd 		error = kernfs_xread(kt, strbuf, sizeof(strbuf), &vap->va_size);
    360       1.1      cgd 	}
    361       1.1      cgd 
    362       1.1      cgd 	vp->v_type = vap->va_type;
    363       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    364       1.1      cgd 	printf("kernfs_getattr: return error %d\n", error);
    365       1.1      cgd #endif
    366       1.1      cgd 	return (error);
    367       1.1      cgd }
    368       1.1      cgd 
    369       1.9      cgd 
    370       1.9      cgd /*
    371       1.9      cgd  * Change the mode on a file.
    372       1.9      cgd  */
    373       1.9      cgd kernfs_chmod1(vp, mode, p)
    374       1.9      cgd 	register struct vnode *vp;
    375       1.9      cgd 	register int mode;
    376       1.9      cgd 	struct proc *p;
    377       1.9      cgd {
    378       1.9      cgd 	register struct ucred *cred = p->p_ucred;
    379       1.9      cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    380       1.9      cgd 	int error;
    381       1.9      cgd 
    382       1.9      cgd 	if ((mode & kt->kt_maxperms) != mode)	/* can't set ro var to rw */
    383       1.9      cgd 		return (EPERM);
    384       1.9      cgd 
    385       1.9      cgd 	if (cred->cr_uid != kt->kt_uid &&
    386       1.9      cgd 	    (error = suser(cred, &p->p_acflag)))
    387       1.9      cgd 		return (error);
    388       1.9      cgd 	if (cred->cr_uid) {
    389       1.9      cgd 		if (vp->v_type != VDIR && (mode & S_ISVTX))
    390       1.9      cgd 			return (EFTYPE);
    391       1.9      cgd 		if (!groupmember(kt->kt_gid, cred) && (mode & S_ISGID))
    392       1.9      cgd 			return (EPERM);
    393       1.9      cgd 	}
    394       1.9      cgd 	kt->kt_perms &= ~07777;
    395       1.9      cgd 	kt->kt_perms |= mode & 07777;
    396       1.9      cgd /*	ip->i_flag |= ICHG;*/
    397       1.9      cgd 	return (0);
    398       1.9      cgd }
    399       1.9      cgd 
    400       1.9      cgd /*
    401       1.9      cgd  * Perform chown operation on kernfs_target kt
    402       1.9      cgd  */
    403       1.9      cgd kernfs_chown1(vp, uid, gid, p)
    404       1.9      cgd 	register struct vnode *vp;
    405       1.9      cgd 	uid_t uid;
    406       1.9      cgd 	gid_t gid;
    407       1.9      cgd 	struct proc *p;
    408       1.9      cgd {
    409       1.9      cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    410       1.9      cgd 	register struct ucred *cred = p->p_ucred;
    411       1.9      cgd 	uid_t ouid;
    412       1.9      cgd 	gid_t ogid;
    413       1.9      cgd 	int error = 0;
    414       1.9      cgd 
    415       1.9      cgd 	if (uid == (u_short)VNOVAL)
    416       1.9      cgd 		uid = kt->kt_uid;
    417       1.9      cgd 	if (gid == (u_short)VNOVAL)
    418       1.9      cgd 		gid = kt->kt_gid;
    419       1.9      cgd 	/*
    420       1.9      cgd 	 * If we don't own the file, are trying to change the owner
    421       1.9      cgd 	 * of the file, or are not a member of the target group,
    422       1.9      cgd 	 * the caller must be superuser or the call fails.
    423       1.9      cgd 	 */
    424       1.9      cgd 	if ((cred->cr_uid != kt->kt_uid || uid != kt->kt_uid ||
    425       1.9      cgd 	    !groupmember((gid_t)gid, cred)) &&
    426       1.9      cgd 	    (error = suser(cred, &p->p_acflag)))
    427       1.9      cgd 		return (error);
    428       1.9      cgd 	ouid = kt->kt_uid;
    429       1.9      cgd 	ogid = kt->kt_gid;
    430       1.9      cgd 
    431       1.9      cgd 	kt->kt_uid = uid;
    432       1.9      cgd 	kt->kt_gid = gid;
    433       1.9      cgd 
    434       1.9      cgd /*	if (ouid != uid || ogid != gid)
    435       1.9      cgd 		ip->i_flag |= ICHG;*/
    436       1.9      cgd 	if (ouid != uid && cred->cr_uid != 0)
    437       1.9      cgd 		kt->kt_perms &= ~S_ISUID;
    438       1.9      cgd 	if (ogid != gid && cred->cr_uid != 0)
    439       1.9      cgd 		kt->kt_perms &= ~S_ISGID;
    440       1.9      cgd 	return (0);
    441       1.9      cgd }
    442       1.9      cgd 
    443       1.9      cgd /*
    444       1.9      cgd  * Set attribute vnode op. called from several syscalls
    445       1.9      cgd  */
    446       1.1      cgd kernfs_setattr(vp, vap, cred, p)
    447       1.1      cgd 	struct vnode *vp;
    448       1.1      cgd 	struct vattr *vap;
    449       1.1      cgd 	struct ucred *cred;
    450       1.1      cgd 	struct proc *p;
    451       1.1      cgd {
    452       1.9      cgd 	int error = 0;
    453       1.1      cgd 
    454       1.1      cgd 	/*
    455       1.9      cgd 	 * Check for unsetable attributes.
    456       1.1      cgd 	 */
    457       1.9      cgd 	if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
    458       1.9      cgd 	    (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
    459       1.9      cgd 	    (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
    460       1.9      cgd 	    ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
    461       1.9      cgd 		return (EINVAL);
    462       1.9      cgd 	}
    463       1.9      cgd 	/*
    464       1.9      cgd 	 * Go through the fields and update iff not VNOVAL.
    465       1.9      cgd 	 */
    466       1.9      cgd 	if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL)
    467       1.9      cgd 		if (error = kernfs_chown1(vp, vap->va_uid, vap->va_gid, p))
    468       1.9      cgd 			return (error);
    469       1.9      cgd 	if (vap->va_size != VNOVAL) {
    470       1.9      cgd 		if (vp->v_type == VDIR)
    471       1.9      cgd 			return (EISDIR);
    472       1.9      cgd 		/* else just nod and smile... */
    473       1.9      cgd 	}
    474       1.9      cgd 	if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
    475       1.9      cgd /*		if (cred->cr_uid != ip->i_uid &&
    476       1.9      cgd 		    (error = suser(cred, &p->p_acflag)))
    477       1.9      cgd 			return (error);
    478       1.9      cgd 		if (vap->va_atime.tv_sec != VNOVAL)
    479       1.9      cgd 			ip->i_flag |= IACC;
    480       1.9      cgd 		if (vap->va_mtime.tv_sec != VNOVAL)
    481       1.9      cgd 			ip->i_flag |= IUPD;
    482       1.9      cgd 		ip->i_flag |= ICHG;
    483       1.9      cgd 		if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1))
    484       1.9      cgd 			return (error);
    485       1.9      cgd */
    486       1.9      cgd 	}
    487       1.9      cgd 	if (vap->va_mode != (u_short)VNOVAL)
    488       1.9      cgd 		error = kernfs_chmod1(vp, (int)vap->va_mode, p);
    489       1.9      cgd 	if (vap->va_flags != VNOVAL) {
    490       1.9      cgd /*		if (cred->cr_uid != ip->i_uid &&
    491       1.9      cgd 		    (error = suser(cred, &p->p_acflag)))
    492       1.9      cgd 			return (error);
    493       1.9      cgd 		if (cred->cr_uid == 0) {
    494       1.9      cgd 			ip->i_flags = vap->va_flags;
    495       1.9      cgd 		} else {
    496       1.9      cgd 			ip->i_flags &= 0xffff0000;
    497       1.9      cgd 			ip->i_flags |= (vap->va_flags & 0xffff);
    498       1.9      cgd 		}
    499       1.9      cgd 		ip->i_flag |= ICHG;
    500       1.9      cgd */
    501       1.9      cgd 	}
    502       1.9      cgd 	return (error);
    503       1.1      cgd }
    504       1.1      cgd 
    505       1.1      cgd static int
    506       1.1      cgd kernfs_read(vp, uio, ioflag, cred)
    507       1.1      cgd 	struct vnode *vp;
    508       1.1      cgd 	struct uio *uio;
    509       1.1      cgd 	int ioflag;
    510       1.1      cgd 	struct ucred *cred;
    511       1.1      cgd {
    512       1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    513       1.1      cgd 	char strbuf[KSTRING];
    514       1.1      cgd 	int off = uio->uio_offset;
    515       1.1      cgd 	int len = 0;
    516       1.1      cgd 	char *cp = strbuf;
    517       1.1      cgd 	int error;
    518       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    519       1.1      cgd 	printf("kern_read %s\n", kt->kt_name);
    520       1.1      cgd #endif
    521       1.1      cgd 
    522       1.1      cgd 	error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len);
    523       1.1      cgd 	if (error)
    524       1.1      cgd 		return (error);
    525       1.1      cgd 	cp = strbuf + off;
    526       1.1      cgd 	len -= off;
    527       1.1      cgd 	return (uiomove(cp, len, uio));
    528       1.1      cgd }
    529       1.1      cgd 
    530       1.1      cgd static int
    531       1.1      cgd kernfs_write(vp, uio, ioflag, cred)
    532       1.1      cgd 	struct vnode *vp;
    533       1.1      cgd 	struct uio *uio;
    534       1.1      cgd 	int ioflag;
    535       1.1      cgd 	struct ucred *cred;
    536       1.1      cgd {
    537       1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    538       1.1      cgd 	char strbuf[KSTRING];
    539       1.1      cgd 	int len = uio->uio_resid;
    540       1.1      cgd 	char *cp = strbuf;
    541       1.1      cgd 	int xlen;
    542       1.1      cgd 	int error;
    543       1.1      cgd 
    544       1.1      cgd 	if (uio->uio_offset != 0)
    545       1.1      cgd 		return (EINVAL);
    546       1.1      cgd 
    547       1.1      cgd 	xlen = min(uio->uio_resid, KSTRING-1);
    548       1.1      cgd 	error = uiomove(strbuf, xlen, uio);
    549       1.1      cgd 	if (error)
    550       1.1      cgd 		return (error);
    551       1.1      cgd 
    552       1.1      cgd 	if (uio->uio_resid != 0)
    553       1.1      cgd 		return (EIO);
    554       1.1      cgd 
    555       1.1      cgd 	strbuf[xlen] = '\0';
    556       1.1      cgd 	return (kernfs_xwrite(kt, strbuf, xlen));
    557       1.1      cgd }
    558       1.1      cgd 
    559      1.12       ws kernfs_readdir(vp, uio, cred, eofflagp, cookies, ncookies)
    560       1.1      cgd 	struct vnode *vp;
    561       1.1      cgd 	struct uio *uio;
    562       1.1      cgd 	struct ucred *cred;
    563       1.1      cgd 	int *eofflagp;
    564      1.12       ws 	u_int *cookies;
    565      1.12       ws 	int ncookies;
    566       1.1      cgd {
    567       1.1      cgd 	struct filedesc *fdp;
    568       1.1      cgd 	int i;
    569       1.1      cgd 	int error;
    570       1.1      cgd 
    571       1.1      cgd 	i = uio->uio_offset / UIO_MX;
    572       1.1      cgd 	error = 0;
    573      1.12       ws 	while (uio->uio_resid > 0 && (!cookies || ncookies > 0)) {
    574       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    575       1.1      cgd 		printf("kernfs_readdir: i = %d\n", i);
    576       1.1      cgd #endif
    577       1.9      cgd 		if (i >= nkernfs_targets) {
    578       1.1      cgd 			*eofflagp = 1;
    579       1.1      cgd 			break;
    580       1.1      cgd 		}
    581       1.1      cgd 		{
    582       1.1      cgd 			struct direct d;
    583       1.1      cgd 			struct direct *dp = &d;
    584       1.9      cgd 			struct kernfs_target *kt = &kernfs_targets[i];
    585       1.1      cgd 
    586       1.1      cgd 			bzero((caddr_t) dp, UIO_MX);
    587       1.1      cgd 
    588       1.1      cgd 			dp->d_namlen = strlen(kt->kt_name);
    589       1.1      cgd 			bcopy(kt->kt_name, dp->d_name, dp->d_namlen+1);
    590       1.1      cgd 
    591       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    592       1.1      cgd 			printf("kernfs_readdir: name = %s, len = %d\n",
    593       1.1      cgd 					dp->d_name, dp->d_namlen);
    594       1.1      cgd #endif
    595       1.1      cgd 			/*
    596       1.1      cgd 			 * Fill in the remaining fields
    597       1.1      cgd 			 */
    598       1.1      cgd 			dp->d_reclen = UIO_MX;
    599       1.1      cgd 			dp->d_ino = i + 3;
    600       1.1      cgd 			/*
    601       1.1      cgd 			 * And ship to userland
    602       1.1      cgd 			 */
    603       1.1      cgd 			error = uiomove((caddr_t) dp, UIO_MX, uio);
    604       1.1      cgd 			if (error)
    605       1.1      cgd 				break;
    606      1.12       ws 			if (cookies) {
    607      1.12       ws 				*cookies = (i + 1) * UIO_MX;
    608      1.12       ws 				ncookies--;
    609      1.12       ws 			}
    610       1.1      cgd 		}
    611       1.1      cgd 		i++;
    612       1.1      cgd 	}
    613       1.1      cgd 
    614       1.1      cgd 	uio->uio_offset = i * UIO_MX;
    615       1.1      cgd 
    616       1.1      cgd 	return (error);
    617       1.1      cgd }
    618       1.1      cgd 
    619       1.1      cgd kernfs_inactive(vp, p)
    620       1.1      cgd 	struct vnode *vp;
    621       1.1      cgd 	struct proc *p;
    622       1.1      cgd {
    623       1.1      cgd 	/*
    624       1.1      cgd 	 * Clear out the v_type field to avoid
    625       1.1      cgd 	 * nasty things happening in vgone().
    626       1.1      cgd 	 */
    627       1.1      cgd 	vp->v_type = VNON;
    628       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    629       1.1      cgd 	printf("kernfs_inactive(%x)\n", vp);
    630       1.1      cgd #endif
    631       1.1      cgd 	return (0);
    632       1.1      cgd }
    633       1.1      cgd 
    634       1.1      cgd /*
    635       1.1      cgd  * Print out the contents of a kernfs vnode.
    636       1.1      cgd  */
    637       1.1      cgd /* ARGSUSED */
    638      1.11  mycroft void
    639       1.1      cgd kernfs_print(vp)
    640       1.1      cgd 	struct vnode *vp;
    641       1.1      cgd {
    642      1.10      cgd 	printf("tag VT_KERNFS, kernfs vnode\n");
    643       1.1      cgd }
    644       1.1      cgd 
    645       1.1      cgd /*
    646       1.1      cgd  * kernfs vnode unsupported operation
    647       1.1      cgd  */
    648       1.1      cgd kernfs_enotsupp()
    649       1.1      cgd {
    650       1.1      cgd 	return (EOPNOTSUPP);
    651       1.1      cgd }
    652       1.1      cgd 
    653       1.1      cgd /*
    654       1.1      cgd  * kernfs "should never get here" operation
    655       1.1      cgd  */
    656       1.1      cgd kernfs_badop()
    657       1.1      cgd {
    658       1.1      cgd 	panic("kernfs: bad op");
    659       1.1      cgd 	/* NOTREACHED */
    660       1.1      cgd }
    661       1.1      cgd 
    662       1.1      cgd /*
    663       1.1      cgd  * kernfs vnode null operation
    664       1.1      cgd  */
    665       1.1      cgd kernfs_nullop()
    666       1.1      cgd {
    667       1.1      cgd 	return (0);
    668       1.1      cgd }
    669       1.1      cgd 
    670       1.1      cgd #define kernfs_create ((int (*) __P(( \
    671       1.1      cgd 		struct nameidata *ndp, \
    672       1.1      cgd 		struct vattr *vap, \
    673       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    674       1.1      cgd #define kernfs_mknod ((int (*) __P(( \
    675       1.1      cgd 		struct nameidata *ndp, \
    676       1.1      cgd 		struct vattr *vap, \
    677       1.1      cgd 		struct ucred *cred, \
    678       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    679       1.1      cgd #define kernfs_close ((int (*) __P(( \
    680       1.1      cgd 		struct vnode *vp, \
    681       1.1      cgd 		int fflag, \
    682       1.1      cgd 		struct ucred *cred, \
    683       1.1      cgd 		struct proc *p))) nullop)
    684       1.1      cgd #define	kernfs_ioctl ((int (*) __P(( \
    685       1.1      cgd 		struct vnode *vp, \
    686       1.1      cgd 		int command, \
    687       1.1      cgd 		caddr_t data, \
    688       1.1      cgd 		int fflag, \
    689       1.1      cgd 		struct ucred *cred, \
    690       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    691       1.1      cgd #define	kernfs_select ((int (*) __P(( \
    692       1.1      cgd 		struct vnode *vp, \
    693       1.1      cgd 		int which, \
    694       1.1      cgd 		int fflags, \
    695       1.1      cgd 		struct ucred *cred, \
    696       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    697       1.1      cgd #define kernfs_mmap ((int (*) __P(( \
    698       1.1      cgd 		struct vnode *vp, \
    699       1.1      cgd 		int fflags, \
    700       1.1      cgd 		struct ucred *cred, \
    701       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    702       1.1      cgd #define kernfs_fsync ((int (*) __P(( \
    703       1.1      cgd 		struct vnode *vp, \
    704       1.1      cgd 		int fflags, \
    705       1.1      cgd 		struct ucred *cred, \
    706       1.1      cgd 		int waitfor, \
    707       1.1      cgd 		struct proc *p))) nullop)
    708       1.1      cgd #define kernfs_seek ((int (*) __P(( \
    709       1.1      cgd 		struct vnode *vp, \
    710       1.1      cgd 		off_t oldoff, \
    711       1.1      cgd 		off_t newoff, \
    712       1.1      cgd 		struct ucred *cred))) nullop)
    713       1.1      cgd #define kernfs_remove ((int (*) __P(( \
    714       1.1      cgd 		struct nameidata *ndp, \
    715       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    716       1.1      cgd #define kernfs_link ((int (*) __P(( \
    717       1.1      cgd 		struct vnode *vp, \
    718       1.1      cgd 		struct nameidata *ndp, \
    719       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    720       1.1      cgd #define kernfs_rename ((int (*) __P(( \
    721       1.1      cgd 		struct nameidata *fndp, \
    722       1.1      cgd 		struct nameidata *tdnp, \
    723       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    724       1.1      cgd #define kernfs_mkdir ((int (*) __P(( \
    725       1.1      cgd 		struct nameidata *ndp, \
    726       1.1      cgd 		struct vattr *vap, \
    727       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    728       1.1      cgd #define kernfs_rmdir ((int (*) __P(( \
    729       1.1      cgd 		struct nameidata *ndp, \
    730       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    731       1.1      cgd #define kernfs_symlink ((int (*) __P(( \
    732       1.1      cgd 		struct nameidata *ndp, \
    733       1.1      cgd 		struct vattr *vap, \
    734       1.1      cgd 		char *target, \
    735       1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    736       1.1      cgd #define kernfs_readlink ((int (*) __P(( \
    737       1.1      cgd 		struct vnode *vp, \
    738       1.1      cgd 		struct uio *uio, \
    739       1.1      cgd 		struct ucred *cred))) kernfs_enotsupp)
    740       1.1      cgd #define kernfs_abortop ((int (*) __P(( \
    741       1.1      cgd 		struct nameidata *ndp))) nullop)
    742       1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    743       1.1      cgd int kernfs_reclaim(vp)
    744       1.1      cgd struct vnode *vp;
    745       1.1      cgd {
    746       1.1      cgd 	printf("kernfs_reclaim(%x)\n", vp);
    747       1.1      cgd 	return (0);
    748       1.1      cgd }
    749       1.1      cgd #else
    750       1.1      cgd #define kernfs_reclaim ((int (*) __P(( \
    751       1.1      cgd 		struct vnode *vp))) nullop)
    752       1.1      cgd #endif
    753       1.1      cgd #define	kernfs_lock ((int (*) __P(( \
    754       1.1      cgd 		struct vnode *vp))) nullop)
    755       1.1      cgd #define kernfs_unlock ((int (*) __P(( \
    756       1.1      cgd 		struct vnode *vp))) nullop)
    757       1.1      cgd #define	kernfs_bmap ((int (*) __P(( \
    758       1.1      cgd 		struct vnode *vp, \
    759       1.1      cgd 		daddr_t bn, \
    760       1.1      cgd 		struct vnode **vpp, \
    761       1.1      cgd 		daddr_t *bnp))) kernfs_badop)
    762       1.1      cgd #define	kernfs_strategy ((int (*) __P(( \
    763       1.1      cgd 		struct buf *bp))) kernfs_badop)
    764       1.1      cgd #define kernfs_islocked ((int (*) __P(( \
    765       1.1      cgd 		struct vnode *vp))) nullop)
    766       1.1      cgd #define kernfs_advlock ((int (*) __P(( \
    767       1.1      cgd 		struct vnode *vp, \
    768       1.1      cgd 		caddr_t id, \
    769       1.1      cgd 		int op, \
    770       1.1      cgd 		struct flock *fl, \
    771       1.1      cgd 		int flags))) kernfs_enotsupp)
    772       1.1      cgd 
    773       1.1      cgd struct vnodeops kernfs_vnodeops = {
    774       1.1      cgd 	kernfs_lookup,	/* lookup */
    775       1.1      cgd 	kernfs_create,	/* create */
    776       1.1      cgd 	kernfs_mknod,	/* mknod */
    777       1.1      cgd 	kernfs_open,	/* open */
    778       1.1      cgd 	kernfs_close,	/* close */
    779       1.1      cgd 	kernfs_access,	/* access */
    780       1.1      cgd 	kernfs_getattr,	/* getattr */
    781       1.1      cgd 	kernfs_setattr,	/* setattr */
    782       1.1      cgd 	kernfs_read,	/* read */
    783       1.1      cgd 	kernfs_write,	/* write */
    784       1.1      cgd 	kernfs_ioctl,	/* ioctl */
    785       1.1      cgd 	kernfs_select,	/* select */
    786       1.1      cgd 	kernfs_mmap,	/* mmap */
    787       1.1      cgd 	kernfs_fsync,	/* fsync */
    788       1.1      cgd 	kernfs_seek,	/* seek */
    789       1.1      cgd 	kernfs_remove,	/* remove */
    790       1.1      cgd 	kernfs_link,	/* link */
    791       1.1      cgd 	kernfs_rename,	/* rename */
    792       1.1      cgd 	kernfs_mkdir,	/* mkdir */
    793       1.1      cgd 	kernfs_rmdir,	/* rmdir */
    794       1.1      cgd 	kernfs_symlink,	/* symlink */
    795       1.1      cgd 	kernfs_readdir,	/* readdir */
    796       1.1      cgd 	kernfs_readlink,	/* readlink */
    797       1.1      cgd 	kernfs_abortop,	/* abortop */
    798       1.1      cgd 	kernfs_inactive,	/* inactive */
    799       1.1      cgd 	kernfs_reclaim,	/* reclaim */
    800       1.1      cgd 	kernfs_lock,	/* lock */
    801       1.1      cgd 	kernfs_unlock,	/* unlock */
    802       1.1      cgd 	kernfs_bmap,	/* bmap */
    803       1.1      cgd 	kernfs_strategy,	/* strategy */
    804       1.1      cgd 	kernfs_print,	/* print */
    805       1.1      cgd 	kernfs_islocked,	/* islocked */
    806       1.1      cgd 	kernfs_advlock,	/* advlock */
    807       1.1      cgd };
    808