Home | History | Annotate | Line # | Download | only in kernfs
kernfs_vnops.c revision 1.14
      1   1.1      cgd /*
      2   1.1      cgd  * Copyright (c) 1990, 1992 Jan-Simon Pendry
      3   1.1      cgd  * All rights reserved.
      4   1.1      cgd  *
      5   1.2      cgd  * This code is derived from software contributed to Berkeley by
      6   1.1      cgd  * Jan-Simon Pendry.
      7   1.1      cgd  *
      8   1.2      cgd  * Redistribution and use in source and binary forms, with or without
      9   1.2      cgd  * modification, are permitted provided that the following conditions
     10   1.2      cgd  * are met:
     11   1.2      cgd  * 1. Redistributions of source code must retain the above copyright
     12   1.2      cgd  *    notice, this list of conditions and the following disclaimer.
     13   1.2      cgd  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.2      cgd  *    notice, this list of conditions and the following disclaimer in the
     15   1.2      cgd  *    documentation and/or other materials provided with the distribution.
     16   1.2      cgd  * 3. All advertising materials mentioning features or use of this software
     17   1.2      cgd  *    must display the following acknowledgement:
     18   1.2      cgd  *      This product includes software developed by the University of
     19   1.2      cgd  *      California, Berkeley and its contributors.
     20   1.2      cgd  * 4. Neither the name of the University nor the names of its contributors
     21   1.2      cgd  *    may be used to endorse or promote products derived from this software
     22   1.2      cgd  *    without specific prior written permission.
     23   1.1      cgd  *
     24   1.2      cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25   1.2      cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26   1.2      cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27   1.2      cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28   1.2      cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29   1.2      cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30   1.2      cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31   1.2      cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32   1.2      cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33   1.2      cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34   1.2      cgd  * SUCH DAMAGE.
     35   1.1      cgd  *
     36  1.14  mycroft  *	$Id: kernfs_vnops.c,v 1.14 1993/12/18 03:56:12 mycroft Exp $
     37   1.1      cgd  */
     38   1.1      cgd 
     39   1.1      cgd /*
     40   1.1      cgd  * Kernel parameter filesystem
     41   1.1      cgd  */
     42   1.1      cgd 
     43  1.14  mycroft #include <sys/param.h>
     44  1.14  mycroft #include <sys/systm.h>
     45  1.14  mycroft #include <sys/kernel.h>
     46  1.14  mycroft #include <sys/types.h>
     47  1.14  mycroft #include <sys/time.h>
     48  1.14  mycroft #include <sys/proc.h>
     49  1.14  mycroft #include <sys/file.h>
     50  1.14  mycroft #include <sys/vnode.h>
     51  1.14  mycroft #include <sys/stat.h>
     52  1.14  mycroft #include <sys/mount.h>
     53  1.14  mycroft #include <sys/namei.h>
     54  1.14  mycroft #include <sys/buf.h>
     55   1.1      cgd 
     56  1.14  mycroft #include <ufs/dir.h>		/* For readdir() XXX */
     57  1.14  mycroft 
     58  1.14  mycroft #include <miscfs/kernfs/kernfs.h>
     59   1.1      cgd 
     60   1.9      cgd struct kernfs_target kernfs_targets[] = {
     61   1.1      cgd /* NOTE: The name must be less than UIO_MX-16 chars in length */
     62   1.9      cgd DIR_TARGET(".",		0,		KTT_NULL,	KTM_DIR_PERMS	)
     63   1.9      cgd DIR_TARGET("..",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     64   1.9      cgd REG_TARGET("copyright",	copyright,	KTT_STRING,	KTM_RO_PERMS	)
     65   1.9      cgd REG_TARGET("hostname",	0,		KTT_HOSTNAME,	KTM_RW_PERMS	)
     66   1.9      cgd REG_TARGET("hz",	&hz,		KTT_INT,	KTM_RO_PERMS	)
     67   1.9      cgd REG_TARGET("loadavg",	0,		KTT_AVENRUN,	KTM_RO_PERMS	)
     68   1.9      cgd REG_TARGET("physmem",	&physmem,	KTT_INT,	KTM_RO_PERMS	)
     69  1.13      cgd #ifdef KERNFS_HAVE_ROOTDIR
     70   1.9      cgd DIR_TARGET("root",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     71  1.13      cgd #endif
     72   1.9      cgd BLK_TARGET("rootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     73   1.9      cgd CHR_TARGET("rrootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     74   1.9      cgd REG_TARGET("time",	0,		KTT_TIME,	KTM_RO_PERMS	)
     75   1.9      cgd REG_TARGET("version",	version,	KTT_STRING,	KTM_RO_PERMS	)
     76   1.1      cgd };
     77   1.1      cgd 
     78   1.9      cgd static int nkernfs_targets = sizeof(kernfs_targets) / sizeof(kernfs_targets[0]);
     79   1.1      cgd 
     80   1.1      cgd static int
     81   1.1      cgd kernfs_xread(kt, buf, len, lenp)
     82   1.9      cgd 	struct kernfs_target *kt;
     83   1.1      cgd 	char *buf;
     84   1.1      cgd 	int len;
     85   1.1      cgd 	int *lenp;
     86   1.1      cgd {
     87   1.1      cgd 	int xlen;
     88   1.1      cgd 
     89   1.1      cgd 	switch (kt->kt_tag) {
     90   1.1      cgd 	case KTT_TIME: {
     91   1.1      cgd 		struct timeval tv;
     92   1.1      cgd 		microtime(&tv);
     93   1.1      cgd 		sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec);
     94   1.1      cgd 		break;
     95   1.1      cgd 	}
     96   1.1      cgd 
     97   1.1      cgd 	case KTT_INT: {
     98   1.1      cgd 		int *ip = kt->kt_data;
     99   1.1      cgd 		sprintf(buf, "%d\n", *ip);
    100   1.1      cgd 		break;
    101   1.1      cgd 	}
    102   1.1      cgd 
    103   1.1      cgd 	case KTT_STRING: {
    104   1.1      cgd 		char *cp = kt->kt_data;
    105   1.1      cgd 		int xlen = strlen(cp) + 1;
    106   1.1      cgd 
    107   1.1      cgd 		if (xlen >= len)
    108   1.1      cgd 			return (EINVAL);
    109   1.1      cgd 
    110   1.1      cgd 		bcopy(cp, buf, xlen);
    111   1.1      cgd 		break;
    112   1.1      cgd 	}
    113   1.1      cgd 
    114   1.1      cgd 	case KTT_HOSTNAME: {
    115   1.1      cgd 		char *cp = hostname;
    116   1.1      cgd 		int xlen = hostnamelen;
    117   1.1      cgd 
    118   1.6      cgd 		if (xlen + 2 > len)	/* extra space for null and newline */
    119   1.1      cgd 			return (EINVAL);
    120   1.1      cgd 
    121   1.6      cgd 		bcopy(cp, buf, xlen);	/* safer than sprintf */
    122   1.6      cgd 		buf[xlen] = '\n';
    123   1.6      cgd 		buf[xlen+1] = '\0';
    124   1.1      cgd 		break;
    125   1.1      cgd 	}
    126   1.1      cgd 
    127   1.1      cgd 	case KTT_AVENRUN:
    128   1.1      cgd 		sprintf(buf, "%d %d %d %d\n",
    129   1.1      cgd 				averunnable[0],
    130   1.1      cgd 				averunnable[1],
    131   1.1      cgd 				averunnable[2],
    132   1.1      cgd 				FSCALE);
    133   1.1      cgd 		break;
    134   1.1      cgd 
    135   1.1      cgd 	default:
    136   1.1      cgd 		return (EINVAL);
    137   1.1      cgd 	}
    138   1.1      cgd 
    139   1.1      cgd 	*lenp = strlen(buf);
    140   1.1      cgd 	return (0);
    141   1.1      cgd }
    142   1.1      cgd 
    143   1.1      cgd static int
    144   1.1      cgd kernfs_xwrite(kt, buf, len)
    145   1.9      cgd 	struct kernfs_target *kt;
    146   1.1      cgd 	char *buf;
    147   1.1      cgd 	int len;
    148   1.1      cgd {
    149   1.1      cgd 	switch (kt->kt_tag) {
    150   1.1      cgd 	case KTT_HOSTNAME: {
    151   1.1      cgd 		if (buf[len-1] == '\n')
    152   1.1      cgd 			--len;
    153   1.1      cgd 		bcopy(buf, hostname, len);
    154   1.6      cgd 		/* kernfs_write set buf[value_passed_as_len] = \0.
    155   1.6      cgd 		 * therefore, buf len (hostnamelen) = len.
    156   1.6      cgd 		 */
    157   1.6      cgd 		hostnamelen = len;
    158   1.6      cgd 		hostname[hostnamelen] = '\0';	/* null end of string. */
    159   1.1      cgd 		return (0);
    160   1.1      cgd 	}
    161   1.1      cgd 
    162   1.1      cgd 	default:
    163   1.1      cgd 		return (EIO);
    164   1.1      cgd 	}
    165   1.1      cgd }
    166   1.1      cgd 
    167   1.1      cgd /*
    168   1.1      cgd  * vp is the current namei directory
    169   1.1      cgd  * ndp is the name to locate in that directory...
    170   1.1      cgd  */
    171   1.1      cgd kernfs_lookup(dvp, ndp, p)
    172   1.1      cgd 	struct vnode *dvp;
    173   1.1      cgd 	struct nameidata *ndp;
    174   1.1      cgd 	struct proc *p;
    175   1.1      cgd {
    176   1.1      cgd 	char *pname = ndp->ni_ptr;
    177   1.1      cgd 	int error = ENOENT;
    178   1.1      cgd 	int i;
    179   1.1      cgd 	struct vnode *fvp;
    180   1.1      cgd 
    181   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    182   1.1      cgd 	printf("kernfs_lookup(%s)\n", pname);
    183   1.1      cgd #endif
    184   1.1      cgd 	if (ndp->ni_namelen == 1 && *pname == '.') {
    185   1.1      cgd 		ndp->ni_dvp = dvp;
    186   1.1      cgd 		ndp->ni_vp = dvp;
    187   1.1      cgd 		VREF(dvp);
    188   1.1      cgd 		/*VOP_LOCK(dvp);*/
    189   1.1      cgd 		return (0);
    190   1.1      cgd 	}
    191  1.13      cgd 
    192  1.13      cgd #ifdef KERNFS_HAVE_ROOTDIR
    193   1.1      cgd 	if (ndp->ni_namelen == 4 && bcmp(pname, "root", 4) == 0) {
    194   1.3      cgd 		ndp->ni_dvp = dvp;
    195   1.1      cgd 		ndp->ni_vp = rootdir;
    196   1.1      cgd 		VREF(rootdir);
    197   1.1      cgd 		VOP_LOCK(rootdir);
    198   1.1      cgd 		return (0);
    199   1.1      cgd 	}
    200  1.13      cgd #endif
    201  1.13      cgd 
    202   1.1      cgd 	/*
    203   1.1      cgd 	 * /kern/rootdev is the root device
    204   1.1      cgd 	 */
    205   1.1      cgd 	if (ndp->ni_namelen == 7 && bcmp(pname, "rootdev", 7) == 0) {
    206   1.1      cgd 		if (vfinddev(rootdev, VBLK, &fvp))
    207   1.1      cgd 			return (ENXIO);
    208   1.1      cgd 		ndp->ni_dvp = dvp;
    209   1.1      cgd 		ndp->ni_vp = fvp;
    210   1.1      cgd 		VREF(fvp);
    211   1.1      cgd 		VOP_LOCK(fvp);
    212   1.4      cgd 		return (0);
    213   1.4      cgd 	}
    214   1.4      cgd 
    215   1.4      cgd 	/*
    216   1.4      cgd 	 * /kern/rrootdev is the root device
    217   1.4      cgd 	 */
    218   1.4      cgd 	if (ndp->ni_namelen == 8 && bcmp(pname, "rrootdev", 7) == 0) {
    219   1.4      cgd 		ndp->ni_dvp = dvp;
    220   1.4      cgd 		ndp->ni_vp = rrootdevvp;
    221   1.4      cgd 		VREF(rrootdevvp);
    222   1.4      cgd 		VOP_LOCK(rrootdevvp);
    223   1.1      cgd 		return (0);
    224   1.1      cgd 	}
    225   1.1      cgd 
    226   1.9      cgd 	for (i = 0; i < nkernfs_targets; i++) {
    227   1.9      cgd 		struct kernfs_target *kt = &kernfs_targets[i];
    228   1.1      cgd 		if (ndp->ni_namelen == strlen(kt->kt_name) &&
    229   1.1      cgd 		    bcmp(kt->kt_name, pname, ndp->ni_namelen) == 0) {
    230   1.1      cgd 			error = 0;
    231   1.1      cgd 			break;
    232   1.1      cgd 		}
    233   1.1      cgd 	}
    234   1.1      cgd 
    235   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    236   1.1      cgd 	printf("kernfs_lookup: i = %d, error = %d\n", i, error);
    237   1.1      cgd #endif
    238   1.1      cgd 
    239   1.1      cgd 	if (error)
    240   1.1      cgd 		goto bad;
    241   1.1      cgd 
    242   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    243   1.1      cgd 	printf("kernfs_lookup: allocate new vnode\n");
    244   1.1      cgd #endif
    245  1.10      cgd 	error = getnewvnode(VT_KERNFS, dvp->v_mount, &kernfs_vnodeops, &fvp);
    246   1.1      cgd 	if (error)
    247   1.1      cgd 		goto bad;
    248   1.9      cgd 	VTOKERN(fvp)->kf_kt = &kernfs_targets[i];
    249   1.1      cgd 	fvp->v_type = VTOKERN(fvp)->kf_kt->kt_vtype;
    250   1.1      cgd 	ndp->ni_dvp = dvp;
    251   1.1      cgd 	ndp->ni_vp = fvp;
    252   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    253   1.1      cgd 	printf("kernfs_lookup: newvp = %x\n", fvp);
    254   1.1      cgd #endif
    255   1.1      cgd 	return (0);
    256   1.1      cgd 
    257   1.1      cgd bad:;
    258   1.1      cgd 	ndp->ni_dvp = dvp;
    259   1.1      cgd 	ndp->ni_vp = NULL;
    260   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    261   1.1      cgd 	printf("kernfs_lookup: error = %d\n", error);
    262   1.1      cgd #endif
    263   1.1      cgd 	return (error);
    264   1.1      cgd }
    265   1.1      cgd 
    266   1.1      cgd kernfs_open(vp, mode, cred, p)
    267   1.1      cgd 	struct vnode *vp;
    268   1.1      cgd 	int mode;
    269   1.1      cgd 	struct ucred *cred;
    270   1.1      cgd 	struct proc *p;
    271   1.1      cgd {
    272   1.9      cgd 	/* if access succeeded, this always does, too */
    273   1.1      cgd 
    274   1.1      cgd 	return (0);
    275   1.1      cgd }
    276   1.1      cgd 
    277   1.8      cgd /*
    278   1.8      cgd  * Check mode permission on target pointer. Mode is READ, WRITE or EXEC.
    279   1.8      cgd  * The mode is shifted to select the owner/group/other fields. The
    280   1.8      cgd  * super user is granted all permissions.
    281   1.8      cgd  */
    282   1.8      cgd kernfs_access(vp, mode, cred, p)
    283   1.9      cgd 	struct vnode *vp;
    284   1.9      cgd 	register int mode;
    285   1.9      cgd 	struct ucred *cred;
    286   1.9      cgd 	struct proc *p;
    287   1.9      cgd {
    288   1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    289   1.9      cgd 	register gid_t *gp;
    290   1.9      cgd 	int i, error;
    291   1.8      cgd 
    292   1.8      cgd #ifdef KERN_DIAGNOSTIC
    293   1.9      cgd 	if (!VOP_ISLOCKED(vp)) {
    294   1.9      cgd 		vprint("kernfs_access: not locked", vp);
    295   1.9      cgd 		panic("kernfs_access: not locked");
    296   1.9      cgd 	}
    297   1.9      cgd #endif
    298   1.9      cgd 	/*
    299   1.9      cgd 	 * If you're the super-user, you always get access.
    300   1.9      cgd 	 */
    301   1.9      cgd 	if (cred->cr_uid == 0)
    302   1.9      cgd 		return (0);
    303   1.9      cgd 	/*
    304   1.9      cgd 	 * Access check is based on only one of owner, group, public.
    305   1.9      cgd 	 * If not owner, then check group. If not a member of the
    306   1.9      cgd 	 * group, then check public access.
    307   1.9      cgd 	 */
    308   1.9      cgd 	if (cred->cr_uid != /* kt->kt_uid XXX */ 0) {
    309   1.9      cgd 		mode >>= 3;
    310   1.9      cgd 		gp = cred->cr_groups;
    311   1.9      cgd 		for (i = 0; i < cred->cr_ngroups; i++, gp++)
    312   1.9      cgd 			if (/* kt->kt_gid XXX */ 0 == *gp)
    313   1.9      cgd 				goto found;
    314   1.9      cgd 		mode >>= 3;
    315   1.8      cgd found:
    316   1.9      cgd 		;
    317   1.9      cgd 	}
    318   1.9      cgd 	if ((kt->kt_perms & mode) == mode)
    319   1.9      cgd 		return (0);
    320   1.9      cgd 	return (EACCES);
    321   1.8      cgd }
    322   1.8      cgd 
    323   1.1      cgd kernfs_getattr(vp, vap, cred, p)
    324   1.1      cgd 	struct vnode *vp;
    325   1.1      cgd 	struct vattr *vap;
    326   1.1      cgd 	struct ucred *cred;
    327   1.1      cgd 	struct proc *p;
    328   1.1      cgd {
    329   1.1      cgd 	int error = 0;
    330   1.1      cgd 	char strbuf[KSTRING];
    331   1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    332   1.1      cgd 
    333   1.1      cgd 	bzero((caddr_t) vap, sizeof(*vap));
    334   1.1      cgd 	vattr_null(vap);
    335   1.9      cgd 	vap->va_uid = kt->kt_uid;
    336   1.9      cgd 	vap->va_gid = kt->kt_gid;
    337   1.1      cgd 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
    338   1.1      cgd 	/* vap->va_qsize = 0; */
    339   1.1      cgd 	vap->va_blocksize = DEV_BSIZE;
    340   1.1      cgd 	microtime(&vap->va_atime);
    341   1.1      cgd 	vap->va_mtime = vap->va_atime;
    342   1.1      cgd 	vap->va_ctime = vap->va_ctime;
    343   1.1      cgd 	vap->va_gen = 0;
    344   1.1      cgd 	vap->va_flags = 0;
    345   1.1      cgd 	vap->va_rdev = 0;
    346   1.1      cgd 	/* vap->va_qbytes = 0; */
    347   1.1      cgd 	vap->va_bytes = 0;
    348   1.9      cgd 	vap->va_type = kt->kt_vtype;
    349   1.9      cgd 	vap->va_mode = kt->kt_perms;
    350   1.1      cgd 
    351   1.1      cgd 	if (vp->v_flag & VROOT) {
    352   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    353   1.1      cgd 		printf("kernfs_getattr: stat rootdir\n");
    354   1.1      cgd #endif
    355   1.1      cgd 		vap->va_nlink = 2;
    356   1.1      cgd 		vap->va_fileid = 2;
    357   1.1      cgd 		vap->va_size = DEV_BSIZE;
    358   1.1      cgd 	} else {
    359   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    360   1.1      cgd 		printf("kernfs_getattr: stat target %s\n", kt->kt_name);
    361   1.1      cgd #endif
    362   1.1      cgd 		vap->va_nlink = 1;
    363   1.9      cgd 		vap->va_fileid = 3 + (kt - kernfs_targets) / sizeof(*kt);
    364   1.1      cgd 		error = kernfs_xread(kt, strbuf, sizeof(strbuf), &vap->va_size);
    365   1.1      cgd 	}
    366   1.1      cgd 
    367   1.1      cgd 	vp->v_type = vap->va_type;
    368   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    369   1.1      cgd 	printf("kernfs_getattr: return error %d\n", error);
    370   1.1      cgd #endif
    371   1.1      cgd 	return (error);
    372   1.1      cgd }
    373   1.1      cgd 
    374   1.9      cgd 
    375   1.9      cgd /*
    376   1.9      cgd  * Change the mode on a file.
    377   1.9      cgd  */
    378   1.9      cgd kernfs_chmod1(vp, mode, p)
    379   1.9      cgd 	register struct vnode *vp;
    380   1.9      cgd 	register int mode;
    381   1.9      cgd 	struct proc *p;
    382   1.9      cgd {
    383   1.9      cgd 	register struct ucred *cred = p->p_ucred;
    384   1.9      cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    385   1.9      cgd 	int error;
    386   1.9      cgd 
    387   1.9      cgd 	if ((mode & kt->kt_maxperms) != mode)	/* can't set ro var to rw */
    388   1.9      cgd 		return (EPERM);
    389   1.9      cgd 
    390   1.9      cgd 	if (cred->cr_uid != kt->kt_uid &&
    391   1.9      cgd 	    (error = suser(cred, &p->p_acflag)))
    392   1.9      cgd 		return (error);
    393   1.9      cgd 	if (cred->cr_uid) {
    394   1.9      cgd 		if (vp->v_type != VDIR && (mode & S_ISVTX))
    395   1.9      cgd 			return (EFTYPE);
    396   1.9      cgd 		if (!groupmember(kt->kt_gid, cred) && (mode & S_ISGID))
    397   1.9      cgd 			return (EPERM);
    398   1.9      cgd 	}
    399   1.9      cgd 	kt->kt_perms &= ~07777;
    400   1.9      cgd 	kt->kt_perms |= mode & 07777;
    401   1.9      cgd /*	ip->i_flag |= ICHG;*/
    402   1.9      cgd 	return (0);
    403   1.9      cgd }
    404   1.9      cgd 
    405   1.9      cgd /*
    406   1.9      cgd  * Perform chown operation on kernfs_target kt
    407   1.9      cgd  */
    408   1.9      cgd kernfs_chown1(vp, uid, gid, p)
    409   1.9      cgd 	register struct vnode *vp;
    410   1.9      cgd 	uid_t uid;
    411   1.9      cgd 	gid_t gid;
    412   1.9      cgd 	struct proc *p;
    413   1.9      cgd {
    414   1.9      cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    415   1.9      cgd 	register struct ucred *cred = p->p_ucred;
    416   1.9      cgd 	uid_t ouid;
    417   1.9      cgd 	gid_t ogid;
    418   1.9      cgd 	int error = 0;
    419   1.9      cgd 
    420   1.9      cgd 	if (uid == (u_short)VNOVAL)
    421   1.9      cgd 		uid = kt->kt_uid;
    422   1.9      cgd 	if (gid == (u_short)VNOVAL)
    423   1.9      cgd 		gid = kt->kt_gid;
    424   1.9      cgd 	/*
    425   1.9      cgd 	 * If we don't own the file, are trying to change the owner
    426   1.9      cgd 	 * of the file, or are not a member of the target group,
    427   1.9      cgd 	 * the caller must be superuser or the call fails.
    428   1.9      cgd 	 */
    429   1.9      cgd 	if ((cred->cr_uid != kt->kt_uid || uid != kt->kt_uid ||
    430   1.9      cgd 	    !groupmember((gid_t)gid, cred)) &&
    431   1.9      cgd 	    (error = suser(cred, &p->p_acflag)))
    432   1.9      cgd 		return (error);
    433   1.9      cgd 	ouid = kt->kt_uid;
    434   1.9      cgd 	ogid = kt->kt_gid;
    435   1.9      cgd 
    436   1.9      cgd 	kt->kt_uid = uid;
    437   1.9      cgd 	kt->kt_gid = gid;
    438   1.9      cgd 
    439   1.9      cgd /*	if (ouid != uid || ogid != gid)
    440   1.9      cgd 		ip->i_flag |= ICHG;*/
    441   1.9      cgd 	if (ouid != uid && cred->cr_uid != 0)
    442   1.9      cgd 		kt->kt_perms &= ~S_ISUID;
    443   1.9      cgd 	if (ogid != gid && cred->cr_uid != 0)
    444   1.9      cgd 		kt->kt_perms &= ~S_ISGID;
    445   1.9      cgd 	return (0);
    446   1.9      cgd }
    447   1.9      cgd 
    448   1.9      cgd /*
    449   1.9      cgd  * Set attribute vnode op. called from several syscalls
    450   1.9      cgd  */
    451   1.1      cgd kernfs_setattr(vp, vap, cred, p)
    452   1.1      cgd 	struct vnode *vp;
    453   1.1      cgd 	struct vattr *vap;
    454   1.1      cgd 	struct ucred *cred;
    455   1.1      cgd 	struct proc *p;
    456   1.1      cgd {
    457   1.9      cgd 	int error = 0;
    458   1.1      cgd 
    459   1.1      cgd 	/*
    460   1.9      cgd 	 * Check for unsetable attributes.
    461   1.1      cgd 	 */
    462   1.9      cgd 	if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
    463   1.9      cgd 	    (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
    464   1.9      cgd 	    (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
    465   1.9      cgd 	    ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
    466   1.9      cgd 		return (EINVAL);
    467   1.9      cgd 	}
    468   1.9      cgd 	/*
    469   1.9      cgd 	 * Go through the fields and update iff not VNOVAL.
    470   1.9      cgd 	 */
    471   1.9      cgd 	if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL)
    472   1.9      cgd 		if (error = kernfs_chown1(vp, vap->va_uid, vap->va_gid, p))
    473   1.9      cgd 			return (error);
    474   1.9      cgd 	if (vap->va_size != VNOVAL) {
    475   1.9      cgd 		if (vp->v_type == VDIR)
    476   1.9      cgd 			return (EISDIR);
    477   1.9      cgd 		/* else just nod and smile... */
    478   1.9      cgd 	}
    479   1.9      cgd 	if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
    480   1.9      cgd /*		if (cred->cr_uid != ip->i_uid &&
    481   1.9      cgd 		    (error = suser(cred, &p->p_acflag)))
    482   1.9      cgd 			return (error);
    483   1.9      cgd 		if (vap->va_atime.tv_sec != VNOVAL)
    484   1.9      cgd 			ip->i_flag |= IACC;
    485   1.9      cgd 		if (vap->va_mtime.tv_sec != VNOVAL)
    486   1.9      cgd 			ip->i_flag |= IUPD;
    487   1.9      cgd 		ip->i_flag |= ICHG;
    488   1.9      cgd 		if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1))
    489   1.9      cgd 			return (error);
    490   1.9      cgd */
    491   1.9      cgd 	}
    492   1.9      cgd 	if (vap->va_mode != (u_short)VNOVAL)
    493   1.9      cgd 		error = kernfs_chmod1(vp, (int)vap->va_mode, p);
    494   1.9      cgd 	if (vap->va_flags != VNOVAL) {
    495   1.9      cgd /*		if (cred->cr_uid != ip->i_uid &&
    496   1.9      cgd 		    (error = suser(cred, &p->p_acflag)))
    497   1.9      cgd 			return (error);
    498   1.9      cgd 		if (cred->cr_uid == 0) {
    499   1.9      cgd 			ip->i_flags = vap->va_flags;
    500   1.9      cgd 		} else {
    501   1.9      cgd 			ip->i_flags &= 0xffff0000;
    502   1.9      cgd 			ip->i_flags |= (vap->va_flags & 0xffff);
    503   1.9      cgd 		}
    504   1.9      cgd 		ip->i_flag |= ICHG;
    505   1.9      cgd */
    506   1.9      cgd 	}
    507   1.9      cgd 	return (error);
    508   1.1      cgd }
    509   1.1      cgd 
    510   1.1      cgd static int
    511   1.1      cgd kernfs_read(vp, uio, ioflag, cred)
    512   1.1      cgd 	struct vnode *vp;
    513   1.1      cgd 	struct uio *uio;
    514   1.1      cgd 	int ioflag;
    515   1.1      cgd 	struct ucred *cred;
    516   1.1      cgd {
    517   1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    518   1.1      cgd 	char strbuf[KSTRING];
    519   1.1      cgd 	int off = uio->uio_offset;
    520   1.1      cgd 	int len = 0;
    521   1.1      cgd 	char *cp = strbuf;
    522   1.1      cgd 	int error;
    523   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    524   1.1      cgd 	printf("kern_read %s\n", kt->kt_name);
    525   1.1      cgd #endif
    526   1.1      cgd 
    527   1.1      cgd 	error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len);
    528   1.1      cgd 	if (error)
    529   1.1      cgd 		return (error);
    530   1.1      cgd 	cp = strbuf + off;
    531   1.1      cgd 	len -= off;
    532   1.1      cgd 	return (uiomove(cp, len, uio));
    533   1.1      cgd }
    534   1.1      cgd 
    535   1.1      cgd static int
    536   1.1      cgd kernfs_write(vp, uio, ioflag, cred)
    537   1.1      cgd 	struct vnode *vp;
    538   1.1      cgd 	struct uio *uio;
    539   1.1      cgd 	int ioflag;
    540   1.1      cgd 	struct ucred *cred;
    541   1.1      cgd {
    542   1.9      cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    543   1.1      cgd 	char strbuf[KSTRING];
    544   1.1      cgd 	int len = uio->uio_resid;
    545   1.1      cgd 	char *cp = strbuf;
    546   1.1      cgd 	int xlen;
    547   1.1      cgd 	int error;
    548   1.1      cgd 
    549   1.1      cgd 	if (uio->uio_offset != 0)
    550   1.1      cgd 		return (EINVAL);
    551   1.1      cgd 
    552   1.1      cgd 	xlen = min(uio->uio_resid, KSTRING-1);
    553   1.1      cgd 	error = uiomove(strbuf, xlen, uio);
    554   1.1      cgd 	if (error)
    555   1.1      cgd 		return (error);
    556   1.1      cgd 
    557   1.1      cgd 	if (uio->uio_resid != 0)
    558   1.1      cgd 		return (EIO);
    559   1.1      cgd 
    560   1.1      cgd 	strbuf[xlen] = '\0';
    561   1.1      cgd 	return (kernfs_xwrite(kt, strbuf, xlen));
    562   1.1      cgd }
    563   1.1      cgd 
    564  1.12       ws kernfs_readdir(vp, uio, cred, eofflagp, cookies, ncookies)
    565   1.1      cgd 	struct vnode *vp;
    566   1.1      cgd 	struct uio *uio;
    567   1.1      cgd 	struct ucred *cred;
    568   1.1      cgd 	int *eofflagp;
    569  1.12       ws 	u_int *cookies;
    570  1.12       ws 	int ncookies;
    571   1.1      cgd {
    572   1.1      cgd 	struct filedesc *fdp;
    573   1.1      cgd 	int i;
    574   1.1      cgd 	int error;
    575   1.1      cgd 
    576   1.1      cgd 	i = uio->uio_offset / UIO_MX;
    577   1.1      cgd 	error = 0;
    578  1.12       ws 	while (uio->uio_resid > 0 && (!cookies || ncookies > 0)) {
    579   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    580   1.1      cgd 		printf("kernfs_readdir: i = %d\n", i);
    581   1.1      cgd #endif
    582   1.9      cgd 		if (i >= nkernfs_targets) {
    583   1.1      cgd 			*eofflagp = 1;
    584   1.1      cgd 			break;
    585   1.1      cgd 		}
    586   1.1      cgd 		{
    587   1.1      cgd 			struct direct d;
    588   1.1      cgd 			struct direct *dp = &d;
    589   1.9      cgd 			struct kernfs_target *kt = &kernfs_targets[i];
    590   1.1      cgd 
    591   1.1      cgd 			bzero((caddr_t) dp, UIO_MX);
    592   1.1      cgd 
    593   1.1      cgd 			dp->d_namlen = strlen(kt->kt_name);
    594   1.1      cgd 			bcopy(kt->kt_name, dp->d_name, dp->d_namlen+1);
    595   1.1      cgd 
    596   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    597   1.1      cgd 			printf("kernfs_readdir: name = %s, len = %d\n",
    598   1.1      cgd 					dp->d_name, dp->d_namlen);
    599   1.1      cgd #endif
    600   1.1      cgd 			/*
    601   1.1      cgd 			 * Fill in the remaining fields
    602   1.1      cgd 			 */
    603   1.1      cgd 			dp->d_reclen = UIO_MX;
    604   1.1      cgd 			dp->d_ino = i + 3;
    605   1.1      cgd 			/*
    606   1.1      cgd 			 * And ship to userland
    607   1.1      cgd 			 */
    608   1.1      cgd 			error = uiomove((caddr_t) dp, UIO_MX, uio);
    609   1.1      cgd 			if (error)
    610   1.1      cgd 				break;
    611  1.12       ws 			if (cookies) {
    612  1.12       ws 				*cookies = (i + 1) * UIO_MX;
    613  1.12       ws 				ncookies--;
    614  1.12       ws 			}
    615   1.1      cgd 		}
    616   1.1      cgd 		i++;
    617   1.1      cgd 	}
    618   1.1      cgd 
    619   1.1      cgd 	uio->uio_offset = i * UIO_MX;
    620   1.1      cgd 
    621   1.1      cgd 	return (error);
    622   1.1      cgd }
    623   1.1      cgd 
    624   1.1      cgd kernfs_inactive(vp, p)
    625   1.1      cgd 	struct vnode *vp;
    626   1.1      cgd 	struct proc *p;
    627   1.1      cgd {
    628   1.1      cgd 	/*
    629   1.1      cgd 	 * Clear out the v_type field to avoid
    630   1.1      cgd 	 * nasty things happening in vgone().
    631   1.1      cgd 	 */
    632   1.1      cgd 	vp->v_type = VNON;
    633   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    634   1.1      cgd 	printf("kernfs_inactive(%x)\n", vp);
    635   1.1      cgd #endif
    636   1.1      cgd 	return (0);
    637   1.1      cgd }
    638   1.1      cgd 
    639   1.1      cgd /*
    640   1.1      cgd  * Print out the contents of a kernfs vnode.
    641   1.1      cgd  */
    642   1.1      cgd /* ARGSUSED */
    643  1.11  mycroft void
    644   1.1      cgd kernfs_print(vp)
    645   1.1      cgd 	struct vnode *vp;
    646   1.1      cgd {
    647  1.10      cgd 	printf("tag VT_KERNFS, kernfs vnode\n");
    648   1.1      cgd }
    649   1.1      cgd 
    650   1.1      cgd /*
    651   1.1      cgd  * kernfs vnode unsupported operation
    652   1.1      cgd  */
    653   1.1      cgd kernfs_enotsupp()
    654   1.1      cgd {
    655   1.1      cgd 	return (EOPNOTSUPP);
    656   1.1      cgd }
    657   1.1      cgd 
    658   1.1      cgd /*
    659   1.1      cgd  * kernfs "should never get here" operation
    660   1.1      cgd  */
    661   1.1      cgd kernfs_badop()
    662   1.1      cgd {
    663   1.1      cgd 	panic("kernfs: bad op");
    664   1.1      cgd 	/* NOTREACHED */
    665   1.1      cgd }
    666   1.1      cgd 
    667   1.1      cgd /*
    668   1.1      cgd  * kernfs vnode null operation
    669   1.1      cgd  */
    670   1.1      cgd kernfs_nullop()
    671   1.1      cgd {
    672   1.1      cgd 	return (0);
    673   1.1      cgd }
    674   1.1      cgd 
    675   1.1      cgd #define kernfs_create ((int (*) __P(( \
    676   1.1      cgd 		struct nameidata *ndp, \
    677   1.1      cgd 		struct vattr *vap, \
    678   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    679   1.1      cgd #define kernfs_mknod ((int (*) __P(( \
    680   1.1      cgd 		struct nameidata *ndp, \
    681   1.1      cgd 		struct vattr *vap, \
    682   1.1      cgd 		struct ucred *cred, \
    683   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    684   1.1      cgd #define kernfs_close ((int (*) __P(( \
    685   1.1      cgd 		struct vnode *vp, \
    686   1.1      cgd 		int fflag, \
    687   1.1      cgd 		struct ucred *cred, \
    688   1.1      cgd 		struct proc *p))) nullop)
    689   1.1      cgd #define	kernfs_ioctl ((int (*) __P(( \
    690   1.1      cgd 		struct vnode *vp, \
    691   1.1      cgd 		int command, \
    692   1.1      cgd 		caddr_t data, \
    693   1.1      cgd 		int fflag, \
    694   1.1      cgd 		struct ucred *cred, \
    695   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    696   1.1      cgd #define	kernfs_select ((int (*) __P(( \
    697   1.1      cgd 		struct vnode *vp, \
    698   1.1      cgd 		int which, \
    699   1.1      cgd 		int fflags, \
    700   1.1      cgd 		struct ucred *cred, \
    701   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    702   1.1      cgd #define kernfs_mmap ((int (*) __P(( \
    703   1.1      cgd 		struct vnode *vp, \
    704   1.1      cgd 		int fflags, \
    705   1.1      cgd 		struct ucred *cred, \
    706   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    707   1.1      cgd #define kernfs_fsync ((int (*) __P(( \
    708   1.1      cgd 		struct vnode *vp, \
    709   1.1      cgd 		int fflags, \
    710   1.1      cgd 		struct ucred *cred, \
    711   1.1      cgd 		int waitfor, \
    712   1.1      cgd 		struct proc *p))) nullop)
    713   1.1      cgd #define kernfs_seek ((int (*) __P(( \
    714   1.1      cgd 		struct vnode *vp, \
    715   1.1      cgd 		off_t oldoff, \
    716   1.1      cgd 		off_t newoff, \
    717   1.1      cgd 		struct ucred *cred))) nullop)
    718   1.1      cgd #define kernfs_remove ((int (*) __P(( \
    719   1.1      cgd 		struct nameidata *ndp, \
    720   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    721   1.1      cgd #define kernfs_link ((int (*) __P(( \
    722   1.1      cgd 		struct vnode *vp, \
    723   1.1      cgd 		struct nameidata *ndp, \
    724   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    725   1.1      cgd #define kernfs_rename ((int (*) __P(( \
    726   1.1      cgd 		struct nameidata *fndp, \
    727   1.1      cgd 		struct nameidata *tdnp, \
    728   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    729   1.1      cgd #define kernfs_mkdir ((int (*) __P(( \
    730   1.1      cgd 		struct nameidata *ndp, \
    731   1.1      cgd 		struct vattr *vap, \
    732   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    733   1.1      cgd #define kernfs_rmdir ((int (*) __P(( \
    734   1.1      cgd 		struct nameidata *ndp, \
    735   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    736   1.1      cgd #define kernfs_symlink ((int (*) __P(( \
    737   1.1      cgd 		struct nameidata *ndp, \
    738   1.1      cgd 		struct vattr *vap, \
    739   1.1      cgd 		char *target, \
    740   1.1      cgd 		struct proc *p))) kernfs_enotsupp)
    741   1.1      cgd #define kernfs_readlink ((int (*) __P(( \
    742   1.1      cgd 		struct vnode *vp, \
    743   1.1      cgd 		struct uio *uio, \
    744   1.1      cgd 		struct ucred *cred))) kernfs_enotsupp)
    745   1.1      cgd #define kernfs_abortop ((int (*) __P(( \
    746   1.1      cgd 		struct nameidata *ndp))) nullop)
    747   1.1      cgd #ifdef KERNFS_DIAGNOSTIC
    748   1.1      cgd int kernfs_reclaim(vp)
    749   1.1      cgd struct vnode *vp;
    750   1.1      cgd {
    751   1.1      cgd 	printf("kernfs_reclaim(%x)\n", vp);
    752   1.1      cgd 	return (0);
    753   1.1      cgd }
    754   1.1      cgd #else
    755   1.1      cgd #define kernfs_reclaim ((int (*) __P(( \
    756   1.1      cgd 		struct vnode *vp))) nullop)
    757   1.1      cgd #endif
    758   1.1      cgd #define	kernfs_lock ((int (*) __P(( \
    759   1.1      cgd 		struct vnode *vp))) nullop)
    760   1.1      cgd #define kernfs_unlock ((int (*) __P(( \
    761   1.1      cgd 		struct vnode *vp))) nullop)
    762   1.1      cgd #define	kernfs_bmap ((int (*) __P(( \
    763   1.1      cgd 		struct vnode *vp, \
    764   1.1      cgd 		daddr_t bn, \
    765   1.1      cgd 		struct vnode **vpp, \
    766   1.1      cgd 		daddr_t *bnp))) kernfs_badop)
    767   1.1      cgd #define	kernfs_strategy ((int (*) __P(( \
    768   1.1      cgd 		struct buf *bp))) kernfs_badop)
    769   1.1      cgd #define kernfs_islocked ((int (*) __P(( \
    770   1.1      cgd 		struct vnode *vp))) nullop)
    771   1.1      cgd #define kernfs_advlock ((int (*) __P(( \
    772   1.1      cgd 		struct vnode *vp, \
    773   1.1      cgd 		caddr_t id, \
    774   1.1      cgd 		int op, \
    775   1.1      cgd 		struct flock *fl, \
    776   1.1      cgd 		int flags))) kernfs_enotsupp)
    777   1.1      cgd 
    778   1.1      cgd struct vnodeops kernfs_vnodeops = {
    779   1.1      cgd 	kernfs_lookup,	/* lookup */
    780   1.1      cgd 	kernfs_create,	/* create */
    781   1.1      cgd 	kernfs_mknod,	/* mknod */
    782   1.1      cgd 	kernfs_open,	/* open */
    783   1.1      cgd 	kernfs_close,	/* close */
    784   1.1      cgd 	kernfs_access,	/* access */
    785   1.1      cgd 	kernfs_getattr,	/* getattr */
    786   1.1      cgd 	kernfs_setattr,	/* setattr */
    787   1.1      cgd 	kernfs_read,	/* read */
    788   1.1      cgd 	kernfs_write,	/* write */
    789   1.1      cgd 	kernfs_ioctl,	/* ioctl */
    790   1.1      cgd 	kernfs_select,	/* select */
    791   1.1      cgd 	kernfs_mmap,	/* mmap */
    792   1.1      cgd 	kernfs_fsync,	/* fsync */
    793   1.1      cgd 	kernfs_seek,	/* seek */
    794   1.1      cgd 	kernfs_remove,	/* remove */
    795   1.1      cgd 	kernfs_link,	/* link */
    796   1.1      cgd 	kernfs_rename,	/* rename */
    797   1.1      cgd 	kernfs_mkdir,	/* mkdir */
    798   1.1      cgd 	kernfs_rmdir,	/* rmdir */
    799   1.1      cgd 	kernfs_symlink,	/* symlink */
    800   1.1      cgd 	kernfs_readdir,	/* readdir */
    801   1.1      cgd 	kernfs_readlink,	/* readlink */
    802   1.1      cgd 	kernfs_abortop,	/* abortop */
    803   1.1      cgd 	kernfs_inactive,	/* inactive */
    804   1.1      cgd 	kernfs_reclaim,	/* reclaim */
    805   1.1      cgd 	kernfs_lock,	/* lock */
    806   1.1      cgd 	kernfs_unlock,	/* unlock */
    807   1.1      cgd 	kernfs_bmap,	/* bmap */
    808   1.1      cgd 	kernfs_strategy,	/* strategy */
    809   1.1      cgd 	kernfs_print,	/* print */
    810   1.1      cgd 	kernfs_islocked,	/* islocked */
    811   1.1      cgd 	kernfs_advlock,	/* advlock */
    812   1.1      cgd };
    813