Home | History | Annotate | Line # | Download | only in kernfs
kernfs_vnops.c revision 1.9
      1  1.1  cgd /*
      2  1.1  cgd  * Copyright (c) 1990, 1992 Jan-Simon Pendry
      3  1.1  cgd  * All rights reserved.
      4  1.1  cgd  *
      5  1.2  cgd  * This code is derived from software contributed to Berkeley by
      6  1.1  cgd  * Jan-Simon Pendry.
      7  1.1  cgd  *
      8  1.2  cgd  * Redistribution and use in source and binary forms, with or without
      9  1.2  cgd  * modification, are permitted provided that the following conditions
     10  1.2  cgd  * are met:
     11  1.2  cgd  * 1. Redistributions of source code must retain the above copyright
     12  1.2  cgd  *    notice, this list of conditions and the following disclaimer.
     13  1.2  cgd  * 2. Redistributions in binary form must reproduce the above copyright
     14  1.2  cgd  *    notice, this list of conditions and the following disclaimer in the
     15  1.2  cgd  *    documentation and/or other materials provided with the distribution.
     16  1.2  cgd  * 3. All advertising materials mentioning features or use of this software
     17  1.2  cgd  *    must display the following acknowledgement:
     18  1.2  cgd  *      This product includes software developed by the University of
     19  1.2  cgd  *      California, Berkeley and its contributors.
     20  1.2  cgd  * 4. Neither the name of the University nor the names of its contributors
     21  1.2  cgd  *    may be used to endorse or promote products derived from this software
     22  1.2  cgd  *    without specific prior written permission.
     23  1.1  cgd  *
     24  1.2  cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     25  1.2  cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     26  1.2  cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     27  1.2  cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     28  1.2  cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     29  1.2  cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     30  1.2  cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     31  1.2  cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     32  1.2  cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     33  1.2  cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     34  1.2  cgd  * SUCH DAMAGE.
     35  1.1  cgd  *
     36  1.9  cgd  *	$Id: kernfs_vnops.c,v 1.9 1993/05/28 16:47:05 cgd Exp $
     37  1.1  cgd  */
     38  1.1  cgd 
     39  1.1  cgd /*
     40  1.1  cgd  * Kernel parameter filesystem
     41  1.1  cgd  */
     42  1.1  cgd 
     43  1.1  cgd #include "param.h"
     44  1.1  cgd #include "systm.h"
     45  1.1  cgd #include "kernel.h"
     46  1.1  cgd #include "types.h"
     47  1.1  cgd #include "time.h"
     48  1.1  cgd #include "proc.h"
     49  1.1  cgd #include "file.h"
     50  1.1  cgd #include "vnode.h"
     51  1.1  cgd #include "stat.h"
     52  1.1  cgd #include "mount.h"
     53  1.1  cgd #include "namei.h"
     54  1.1  cgd #include "buf.h"
     55  1.1  cgd #include "miscfs/kernfs/kernfs.h"
     56  1.1  cgd 
     57  1.1  cgd #include "../ufs/dir.h"		/* For readdir() XXX */
     58  1.1  cgd 
     59  1.9  cgd struct kernfs_target kernfs_targets[] = {
     60  1.1  cgd /* NOTE: The name must be less than UIO_MX-16 chars in length */
     61  1.9  cgd DIR_TARGET(".",		0,		KTT_NULL,	KTM_DIR_PERMS	)
     62  1.9  cgd DIR_TARGET("..",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     63  1.9  cgd REG_TARGET("copyright",	copyright,	KTT_STRING,	KTM_RO_PERMS	)
     64  1.9  cgd REG_TARGET("hostname",	0,		KTT_HOSTNAME,	KTM_RW_PERMS	)
     65  1.9  cgd REG_TARGET("hz",	&hz,		KTT_INT,	KTM_RO_PERMS	)
     66  1.9  cgd REG_TARGET("loadavg",	0,		KTT_AVENRUN,	KTM_RO_PERMS	)
     67  1.9  cgd REG_TARGET("physmem",	&physmem,	KTT_INT,	KTM_RO_PERMS	)
     68  1.9  cgd DIR_TARGET("root",	0,		KTT_NULL,	KTM_DIR_PERMS	)
     69  1.9  cgd BLK_TARGET("rootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     70  1.9  cgd CHR_TARGET("rrootdev",	0,		KTT_NULL,	KTM_RO_PERMS	)
     71  1.9  cgd REG_TARGET("time",	0,		KTT_TIME,	KTM_RO_PERMS	)
     72  1.9  cgd REG_TARGET("version",	version,	KTT_STRING,	KTM_RO_PERMS	)
     73  1.1  cgd };
     74  1.1  cgd 
     75  1.9  cgd static int nkernfs_targets = sizeof(kernfs_targets) / sizeof(kernfs_targets[0]);
     76  1.1  cgd 
     77  1.1  cgd static int
     78  1.1  cgd kernfs_xread(kt, buf, len, lenp)
     79  1.9  cgd 	struct kernfs_target *kt;
     80  1.1  cgd 	char *buf;
     81  1.1  cgd 	int len;
     82  1.1  cgd 	int *lenp;
     83  1.1  cgd {
     84  1.1  cgd 	int xlen;
     85  1.1  cgd 
     86  1.1  cgd 	switch (kt->kt_tag) {
     87  1.1  cgd 	case KTT_TIME: {
     88  1.1  cgd 		struct timeval tv;
     89  1.1  cgd 		microtime(&tv);
     90  1.1  cgd 		sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec);
     91  1.1  cgd 		break;
     92  1.1  cgd 	}
     93  1.1  cgd 
     94  1.1  cgd 	case KTT_INT: {
     95  1.1  cgd 		int *ip = kt->kt_data;
     96  1.1  cgd 		sprintf(buf, "%d\n", *ip);
     97  1.1  cgd 		break;
     98  1.1  cgd 	}
     99  1.1  cgd 
    100  1.1  cgd 	case KTT_STRING: {
    101  1.1  cgd 		char *cp = kt->kt_data;
    102  1.1  cgd 		int xlen = strlen(cp) + 1;
    103  1.1  cgd 
    104  1.1  cgd 		if (xlen >= len)
    105  1.1  cgd 			return (EINVAL);
    106  1.1  cgd 
    107  1.1  cgd 		bcopy(cp, buf, xlen);
    108  1.1  cgd 		break;
    109  1.1  cgd 	}
    110  1.1  cgd 
    111  1.1  cgd 	case KTT_HOSTNAME: {
    112  1.1  cgd 		char *cp = hostname;
    113  1.1  cgd 		int xlen = hostnamelen;
    114  1.1  cgd 
    115  1.6  cgd 		if (xlen + 2 > len)	/* extra space for null and newline */
    116  1.1  cgd 			return (EINVAL);
    117  1.1  cgd 
    118  1.6  cgd 		bcopy(cp, buf, xlen);	/* safer than sprintf */
    119  1.6  cgd 		buf[xlen] = '\n';
    120  1.6  cgd 		buf[xlen+1] = '\0';
    121  1.1  cgd 		break;
    122  1.1  cgd 	}
    123  1.1  cgd 
    124  1.1  cgd 	case KTT_AVENRUN:
    125  1.1  cgd 		sprintf(buf, "%d %d %d %d\n",
    126  1.1  cgd 				averunnable[0],
    127  1.1  cgd 				averunnable[1],
    128  1.1  cgd 				averunnable[2],
    129  1.1  cgd 				FSCALE);
    130  1.1  cgd 		break;
    131  1.1  cgd 
    132  1.1  cgd 	default:
    133  1.1  cgd 		return (EINVAL);
    134  1.1  cgd 	}
    135  1.1  cgd 
    136  1.1  cgd 	*lenp = strlen(buf);
    137  1.1  cgd 	return (0);
    138  1.1  cgd }
    139  1.1  cgd 
    140  1.1  cgd static int
    141  1.1  cgd kernfs_xwrite(kt, buf, len)
    142  1.9  cgd 	struct kernfs_target *kt;
    143  1.1  cgd 	char *buf;
    144  1.1  cgd 	int len;
    145  1.1  cgd {
    146  1.1  cgd 	switch (kt->kt_tag) {
    147  1.1  cgd 	case KTT_HOSTNAME: {
    148  1.1  cgd 		if (buf[len-1] == '\n')
    149  1.1  cgd 			--len;
    150  1.1  cgd 		bcopy(buf, hostname, len);
    151  1.6  cgd 		/* kernfs_write set buf[value_passed_as_len] = \0.
    152  1.6  cgd 		 * therefore, buf len (hostnamelen) = len.
    153  1.6  cgd 		 */
    154  1.6  cgd 		hostnamelen = len;
    155  1.6  cgd 		hostname[hostnamelen] = '\0';	/* null end of string. */
    156  1.1  cgd 		return (0);
    157  1.1  cgd 	}
    158  1.1  cgd 
    159  1.1  cgd 	default:
    160  1.1  cgd 		return (EIO);
    161  1.1  cgd 	}
    162  1.1  cgd }
    163  1.1  cgd 
    164  1.1  cgd /*
    165  1.1  cgd  * vp is the current namei directory
    166  1.1  cgd  * ndp is the name to locate in that directory...
    167  1.1  cgd  */
    168  1.1  cgd kernfs_lookup(dvp, ndp, p)
    169  1.1  cgd 	struct vnode *dvp;
    170  1.1  cgd 	struct nameidata *ndp;
    171  1.1  cgd 	struct proc *p;
    172  1.1  cgd {
    173  1.1  cgd 	char *pname = ndp->ni_ptr;
    174  1.1  cgd 	int error = ENOENT;
    175  1.1  cgd 	int i;
    176  1.1  cgd 	struct vnode *fvp;
    177  1.1  cgd 
    178  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    179  1.1  cgd 	printf("kernfs_lookup(%s)\n", pname);
    180  1.1  cgd #endif
    181  1.1  cgd 	if (ndp->ni_namelen == 1 && *pname == '.') {
    182  1.1  cgd 		ndp->ni_dvp = dvp;
    183  1.1  cgd 		ndp->ni_vp = dvp;
    184  1.1  cgd 		VREF(dvp);
    185  1.1  cgd 		/*VOP_LOCK(dvp);*/
    186  1.1  cgd 		return (0);
    187  1.1  cgd 	}
    188  1.1  cgd 
    189  1.1  cgd 	if (ndp->ni_namelen == 4 && bcmp(pname, "root", 4) == 0) {
    190  1.3  cgd 		ndp->ni_dvp = dvp;
    191  1.1  cgd 		ndp->ni_vp = rootdir;
    192  1.1  cgd 		VREF(rootdir);
    193  1.1  cgd 		VOP_LOCK(rootdir);
    194  1.1  cgd 		return (0);
    195  1.1  cgd 	}
    196  1.1  cgd 
    197  1.1  cgd 	/*
    198  1.1  cgd 	 * /kern/rootdev is the root device
    199  1.1  cgd 	 */
    200  1.1  cgd 	if (ndp->ni_namelen == 7 && bcmp(pname, "rootdev", 7) == 0) {
    201  1.1  cgd 		if (vfinddev(rootdev, VBLK, &fvp))
    202  1.1  cgd 			return (ENXIO);
    203  1.1  cgd 		ndp->ni_dvp = dvp;
    204  1.1  cgd 		ndp->ni_vp = fvp;
    205  1.1  cgd 		VREF(fvp);
    206  1.1  cgd 		VOP_LOCK(fvp);
    207  1.4  cgd 		return (0);
    208  1.4  cgd 	}
    209  1.4  cgd 
    210  1.4  cgd 	/*
    211  1.4  cgd 	 * /kern/rrootdev is the root device
    212  1.4  cgd 	 */
    213  1.4  cgd 	if (ndp->ni_namelen == 8 && bcmp(pname, "rrootdev", 7) == 0) {
    214  1.4  cgd 		ndp->ni_dvp = dvp;
    215  1.4  cgd 		ndp->ni_vp = rrootdevvp;
    216  1.4  cgd 		VREF(rrootdevvp);
    217  1.4  cgd 		VOP_LOCK(rrootdevvp);
    218  1.1  cgd 		return (0);
    219  1.1  cgd 	}
    220  1.1  cgd 
    221  1.9  cgd 	for (i = 0; i < nkernfs_targets; i++) {
    222  1.9  cgd 		struct kernfs_target *kt = &kernfs_targets[i];
    223  1.1  cgd 		if (ndp->ni_namelen == strlen(kt->kt_name) &&
    224  1.1  cgd 		    bcmp(kt->kt_name, pname, ndp->ni_namelen) == 0) {
    225  1.1  cgd 			error = 0;
    226  1.1  cgd 			break;
    227  1.1  cgd 		}
    228  1.1  cgd 	}
    229  1.1  cgd 
    230  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    231  1.1  cgd 	printf("kernfs_lookup: i = %d, error = %d\n", i, error);
    232  1.1  cgd #endif
    233  1.1  cgd 
    234  1.1  cgd 	if (error)
    235  1.1  cgd 		goto bad;
    236  1.1  cgd 
    237  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    238  1.1  cgd 	printf("kernfs_lookup: allocate new vnode\n");
    239  1.1  cgd #endif
    240  1.1  cgd 	error = getnewvnode(VT_UFS, dvp->v_mount, &kernfs_vnodeops, &fvp);
    241  1.1  cgd 	if (error)
    242  1.1  cgd 		goto bad;
    243  1.9  cgd 	VTOKERN(fvp)->kf_kt = &kernfs_targets[i];
    244  1.1  cgd 	fvp->v_type = VTOKERN(fvp)->kf_kt->kt_vtype;
    245  1.1  cgd 	ndp->ni_dvp = dvp;
    246  1.1  cgd 	ndp->ni_vp = fvp;
    247  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    248  1.1  cgd 	printf("kernfs_lookup: newvp = %x\n", fvp);
    249  1.1  cgd #endif
    250  1.1  cgd 	return (0);
    251  1.1  cgd 
    252  1.1  cgd bad:;
    253  1.1  cgd 	ndp->ni_dvp = dvp;
    254  1.1  cgd 	ndp->ni_vp = NULL;
    255  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    256  1.1  cgd 	printf("kernfs_lookup: error = %d\n", error);
    257  1.1  cgd #endif
    258  1.1  cgd 	return (error);
    259  1.1  cgd }
    260  1.1  cgd 
    261  1.1  cgd kernfs_open(vp, mode, cred, p)
    262  1.1  cgd 	struct vnode *vp;
    263  1.1  cgd 	int mode;
    264  1.1  cgd 	struct ucred *cred;
    265  1.1  cgd 	struct proc *p;
    266  1.1  cgd {
    267  1.9  cgd 	/* if access succeeded, this always does, too */
    268  1.1  cgd 
    269  1.1  cgd 	return (0);
    270  1.1  cgd }
    271  1.1  cgd 
    272  1.8  cgd /*
    273  1.8  cgd  * Check mode permission on target pointer. Mode is READ, WRITE or EXEC.
    274  1.8  cgd  * The mode is shifted to select the owner/group/other fields. The
    275  1.8  cgd  * super user is granted all permissions.
    276  1.8  cgd  */
    277  1.8  cgd kernfs_access(vp, mode, cred, p)
    278  1.9  cgd 	struct vnode *vp;
    279  1.9  cgd 	register int mode;
    280  1.9  cgd 	struct ucred *cred;
    281  1.9  cgd 	struct proc *p;
    282  1.9  cgd {
    283  1.9  cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    284  1.9  cgd 	register gid_t *gp;
    285  1.9  cgd 	int i, error;
    286  1.8  cgd 
    287  1.8  cgd #ifdef KERN_DIAGNOSTIC
    288  1.9  cgd 	if (!VOP_ISLOCKED(vp)) {
    289  1.9  cgd 		vprint("kernfs_access: not locked", vp);
    290  1.9  cgd 		panic("kernfs_access: not locked");
    291  1.9  cgd 	}
    292  1.9  cgd #endif
    293  1.9  cgd 	/*
    294  1.9  cgd 	 * If you're the super-user, you always get access.
    295  1.9  cgd 	 */
    296  1.9  cgd 	if (cred->cr_uid == 0)
    297  1.9  cgd 		return (0);
    298  1.9  cgd 	/*
    299  1.9  cgd 	 * Access check is based on only one of owner, group, public.
    300  1.9  cgd 	 * If not owner, then check group. If not a member of the
    301  1.9  cgd 	 * group, then check public access.
    302  1.9  cgd 	 */
    303  1.9  cgd 	if (cred->cr_uid != /* kt->kt_uid XXX */ 0) {
    304  1.9  cgd 		mode >>= 3;
    305  1.9  cgd 		gp = cred->cr_groups;
    306  1.9  cgd 		for (i = 0; i < cred->cr_ngroups; i++, gp++)
    307  1.9  cgd 			if (/* kt->kt_gid XXX */ 0 == *gp)
    308  1.9  cgd 				goto found;
    309  1.9  cgd 		mode >>= 3;
    310  1.8  cgd found:
    311  1.9  cgd 		;
    312  1.9  cgd 	}
    313  1.9  cgd 	if ((kt->kt_perms & mode) == mode)
    314  1.9  cgd 		return (0);
    315  1.9  cgd 	return (EACCES);
    316  1.8  cgd }
    317  1.8  cgd 
    318  1.1  cgd kernfs_getattr(vp, vap, cred, p)
    319  1.1  cgd 	struct vnode *vp;
    320  1.1  cgd 	struct vattr *vap;
    321  1.1  cgd 	struct ucred *cred;
    322  1.1  cgd 	struct proc *p;
    323  1.1  cgd {
    324  1.1  cgd 	int error = 0;
    325  1.1  cgd 	char strbuf[KSTRING];
    326  1.9  cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    327  1.1  cgd 
    328  1.1  cgd 	bzero((caddr_t) vap, sizeof(*vap));
    329  1.1  cgd 	vattr_null(vap);
    330  1.9  cgd 	vap->va_uid = kt->kt_uid;
    331  1.9  cgd 	vap->va_gid = kt->kt_gid;
    332  1.1  cgd 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
    333  1.1  cgd 	/* vap->va_qsize = 0; */
    334  1.1  cgd 	vap->va_blocksize = DEV_BSIZE;
    335  1.1  cgd 	microtime(&vap->va_atime);
    336  1.1  cgd 	vap->va_mtime = vap->va_atime;
    337  1.1  cgd 	vap->va_ctime = vap->va_ctime;
    338  1.1  cgd 	vap->va_gen = 0;
    339  1.1  cgd 	vap->va_flags = 0;
    340  1.1  cgd 	vap->va_rdev = 0;
    341  1.1  cgd 	/* vap->va_qbytes = 0; */
    342  1.1  cgd 	vap->va_bytes = 0;
    343  1.9  cgd 	vap->va_type = kt->kt_vtype;
    344  1.9  cgd 	vap->va_mode = kt->kt_perms;
    345  1.1  cgd 
    346  1.1  cgd 	if (vp->v_flag & VROOT) {
    347  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    348  1.1  cgd 		printf("kernfs_getattr: stat rootdir\n");
    349  1.1  cgd #endif
    350  1.1  cgd 		vap->va_nlink = 2;
    351  1.1  cgd 		vap->va_fileid = 2;
    352  1.1  cgd 		vap->va_size = DEV_BSIZE;
    353  1.1  cgd 	} else {
    354  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    355  1.1  cgd 		printf("kernfs_getattr: stat target %s\n", kt->kt_name);
    356  1.1  cgd #endif
    357  1.1  cgd 		vap->va_nlink = 1;
    358  1.9  cgd 		vap->va_fileid = 3 + (kt - kernfs_targets) / sizeof(*kt);
    359  1.1  cgd 		error = kernfs_xread(kt, strbuf, sizeof(strbuf), &vap->va_size);
    360  1.1  cgd 	}
    361  1.1  cgd 
    362  1.1  cgd 	vp->v_type = vap->va_type;
    363  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    364  1.1  cgd 	printf("kernfs_getattr: return error %d\n", error);
    365  1.1  cgd #endif
    366  1.1  cgd 	return (error);
    367  1.1  cgd }
    368  1.1  cgd 
    369  1.9  cgd 
    370  1.9  cgd /*
    371  1.9  cgd  * Change the mode on a file.
    372  1.9  cgd  */
    373  1.9  cgd kernfs_chmod1(vp, mode, p)
    374  1.9  cgd 	register struct vnode *vp;
    375  1.9  cgd 	register int mode;
    376  1.9  cgd 	struct proc *p;
    377  1.9  cgd {
    378  1.9  cgd 	register struct ucred *cred = p->p_ucred;
    379  1.9  cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    380  1.9  cgd 	int error;
    381  1.9  cgd 
    382  1.9  cgd 	if ((mode & kt->kt_maxperms) != mode)	/* can't set ro var to rw */
    383  1.9  cgd 		return (EPERM);
    384  1.9  cgd 
    385  1.9  cgd 	if (cred->cr_uid != kt->kt_uid &&
    386  1.9  cgd 	    (error = suser(cred, &p->p_acflag)))
    387  1.9  cgd 		return (error);
    388  1.9  cgd 	if (cred->cr_uid) {
    389  1.9  cgd 		if (vp->v_type != VDIR && (mode & S_ISVTX))
    390  1.9  cgd 			return (EFTYPE);
    391  1.9  cgd 		if (!groupmember(kt->kt_gid, cred) && (mode & S_ISGID))
    392  1.9  cgd 			return (EPERM);
    393  1.9  cgd 	}
    394  1.9  cgd 	kt->kt_perms &= ~07777;
    395  1.9  cgd 	kt->kt_perms |= mode & 07777;
    396  1.9  cgd /*	ip->i_flag |= ICHG;*/
    397  1.9  cgd 	return (0);
    398  1.9  cgd }
    399  1.9  cgd 
    400  1.9  cgd /*
    401  1.9  cgd  * Perform chown operation on kernfs_target kt
    402  1.9  cgd  */
    403  1.9  cgd kernfs_chown1(vp, uid, gid, p)
    404  1.9  cgd 	register struct vnode *vp;
    405  1.9  cgd 	uid_t uid;
    406  1.9  cgd 	gid_t gid;
    407  1.9  cgd 	struct proc *p;
    408  1.9  cgd {
    409  1.9  cgd 	register struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    410  1.9  cgd 	register struct ucred *cred = p->p_ucred;
    411  1.9  cgd 	uid_t ouid;
    412  1.9  cgd 	gid_t ogid;
    413  1.9  cgd 	int error = 0;
    414  1.9  cgd 
    415  1.9  cgd 	if (uid == (u_short)VNOVAL)
    416  1.9  cgd 		uid = kt->kt_uid;
    417  1.9  cgd 	if (gid == (u_short)VNOVAL)
    418  1.9  cgd 		gid = kt->kt_gid;
    419  1.9  cgd 	/*
    420  1.9  cgd 	 * If we don't own the file, are trying to change the owner
    421  1.9  cgd 	 * of the file, or are not a member of the target group,
    422  1.9  cgd 	 * the caller must be superuser or the call fails.
    423  1.9  cgd 	 */
    424  1.9  cgd 	if ((cred->cr_uid != kt->kt_uid || uid != kt->kt_uid ||
    425  1.9  cgd 	    !groupmember((gid_t)gid, cred)) &&
    426  1.9  cgd 	    (error = suser(cred, &p->p_acflag)))
    427  1.9  cgd 		return (error);
    428  1.9  cgd 	ouid = kt->kt_uid;
    429  1.9  cgd 	ogid = kt->kt_gid;
    430  1.9  cgd 
    431  1.9  cgd 	kt->kt_uid = uid;
    432  1.9  cgd 	kt->kt_gid = gid;
    433  1.9  cgd 
    434  1.9  cgd /*	if (ouid != uid || ogid != gid)
    435  1.9  cgd 		ip->i_flag |= ICHG;*/
    436  1.9  cgd 	if (ouid != uid && cred->cr_uid != 0)
    437  1.9  cgd 		kt->kt_perms &= ~S_ISUID;
    438  1.9  cgd 	if (ogid != gid && cred->cr_uid != 0)
    439  1.9  cgd 		kt->kt_perms &= ~S_ISGID;
    440  1.9  cgd 	return (0);
    441  1.9  cgd }
    442  1.9  cgd 
    443  1.9  cgd /*
    444  1.9  cgd  * Set attribute vnode op. called from several syscalls
    445  1.9  cgd  */
    446  1.1  cgd kernfs_setattr(vp, vap, cred, p)
    447  1.1  cgd 	struct vnode *vp;
    448  1.1  cgd 	struct vattr *vap;
    449  1.1  cgd 	struct ucred *cred;
    450  1.1  cgd 	struct proc *p;
    451  1.1  cgd {
    452  1.9  cgd 	int error = 0;
    453  1.1  cgd 
    454  1.1  cgd 	/*
    455  1.9  cgd 	 * Check for unsetable attributes.
    456  1.1  cgd 	 */
    457  1.9  cgd 	if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) ||
    458  1.9  cgd 	    (vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) ||
    459  1.9  cgd 	    (vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) ||
    460  1.9  cgd 	    ((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) {
    461  1.9  cgd 		return (EINVAL);
    462  1.9  cgd 	}
    463  1.9  cgd 	/*
    464  1.9  cgd 	 * Go through the fields and update iff not VNOVAL.
    465  1.9  cgd 	 */
    466  1.9  cgd 	if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL)
    467  1.9  cgd 		if (error = kernfs_chown1(vp, vap->va_uid, vap->va_gid, p))
    468  1.9  cgd 			return (error);
    469  1.9  cgd 	if (vap->va_size != VNOVAL) {
    470  1.9  cgd 		if (vp->v_type == VDIR)
    471  1.9  cgd 			return (EISDIR);
    472  1.9  cgd 		/* else just nod and smile... */
    473  1.9  cgd 	}
    474  1.9  cgd 	if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) {
    475  1.9  cgd /*		if (cred->cr_uid != ip->i_uid &&
    476  1.9  cgd 		    (error = suser(cred, &p->p_acflag)))
    477  1.9  cgd 			return (error);
    478  1.9  cgd 		if (vap->va_atime.tv_sec != VNOVAL)
    479  1.9  cgd 			ip->i_flag |= IACC;
    480  1.9  cgd 		if (vap->va_mtime.tv_sec != VNOVAL)
    481  1.9  cgd 			ip->i_flag |= IUPD;
    482  1.9  cgd 		ip->i_flag |= ICHG;
    483  1.9  cgd 		if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1))
    484  1.9  cgd 			return (error);
    485  1.9  cgd */
    486  1.9  cgd 	}
    487  1.9  cgd 	if (vap->va_mode != (u_short)VNOVAL)
    488  1.9  cgd 		error = kernfs_chmod1(vp, (int)vap->va_mode, p);
    489  1.9  cgd 	if (vap->va_flags != VNOVAL) {
    490  1.9  cgd /*		if (cred->cr_uid != ip->i_uid &&
    491  1.9  cgd 		    (error = suser(cred, &p->p_acflag)))
    492  1.9  cgd 			return (error);
    493  1.9  cgd 		if (cred->cr_uid == 0) {
    494  1.9  cgd 			ip->i_flags = vap->va_flags;
    495  1.9  cgd 		} else {
    496  1.9  cgd 			ip->i_flags &= 0xffff0000;
    497  1.9  cgd 			ip->i_flags |= (vap->va_flags & 0xffff);
    498  1.9  cgd 		}
    499  1.9  cgd 		ip->i_flag |= ICHG;
    500  1.9  cgd */
    501  1.9  cgd 	}
    502  1.9  cgd 	return (error);
    503  1.1  cgd }
    504  1.1  cgd 
    505  1.1  cgd static int
    506  1.1  cgd kernfs_read(vp, uio, ioflag, cred)
    507  1.1  cgd 	struct vnode *vp;
    508  1.1  cgd 	struct uio *uio;
    509  1.1  cgd 	int ioflag;
    510  1.1  cgd 	struct ucred *cred;
    511  1.1  cgd {
    512  1.9  cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    513  1.1  cgd 	char strbuf[KSTRING];
    514  1.1  cgd 	int off = uio->uio_offset;
    515  1.1  cgd 	int len = 0;
    516  1.1  cgd 	char *cp = strbuf;
    517  1.1  cgd 	int error;
    518  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    519  1.1  cgd 	printf("kern_read %s\n", kt->kt_name);
    520  1.1  cgd #endif
    521  1.1  cgd 
    522  1.1  cgd 	error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len);
    523  1.1  cgd 	if (error)
    524  1.1  cgd 		return (error);
    525  1.1  cgd 	cp = strbuf + off;
    526  1.1  cgd 	len -= off;
    527  1.1  cgd 	return (uiomove(cp, len, uio));
    528  1.1  cgd }
    529  1.1  cgd 
    530  1.1  cgd static int
    531  1.1  cgd kernfs_write(vp, uio, ioflag, cred)
    532  1.1  cgd 	struct vnode *vp;
    533  1.1  cgd 	struct uio *uio;
    534  1.1  cgd 	int ioflag;
    535  1.1  cgd 	struct ucred *cred;
    536  1.1  cgd {
    537  1.9  cgd 	struct kernfs_target *kt = VTOKERN(vp)->kf_kt;
    538  1.1  cgd 	char strbuf[KSTRING];
    539  1.1  cgd 	int len = uio->uio_resid;
    540  1.1  cgd 	char *cp = strbuf;
    541  1.1  cgd 	int xlen;
    542  1.1  cgd 	int error;
    543  1.1  cgd 
    544  1.1  cgd 	if (uio->uio_offset != 0)
    545  1.1  cgd 		return (EINVAL);
    546  1.1  cgd 
    547  1.1  cgd 	xlen = min(uio->uio_resid, KSTRING-1);
    548  1.1  cgd 	error = uiomove(strbuf, xlen, uio);
    549  1.1  cgd 	if (error)
    550  1.1  cgd 		return (error);
    551  1.1  cgd 
    552  1.1  cgd 	if (uio->uio_resid != 0)
    553  1.1  cgd 		return (EIO);
    554  1.1  cgd 
    555  1.1  cgd 	strbuf[xlen] = '\0';
    556  1.1  cgd 	return (kernfs_xwrite(kt, strbuf, xlen));
    557  1.1  cgd }
    558  1.1  cgd 
    559  1.1  cgd kernfs_readdir(vp, uio, cred, eofflagp)
    560  1.1  cgd 	struct vnode *vp;
    561  1.1  cgd 	struct uio *uio;
    562  1.1  cgd 	struct ucred *cred;
    563  1.1  cgd 	int *eofflagp;
    564  1.1  cgd {
    565  1.1  cgd 	struct filedesc *fdp;
    566  1.1  cgd 	int i;
    567  1.1  cgd 	int error;
    568  1.1  cgd 
    569  1.1  cgd 	i = uio->uio_offset / UIO_MX;
    570  1.1  cgd 	error = 0;
    571  1.1  cgd 	while (uio->uio_resid > 0) {
    572  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    573  1.1  cgd 		printf("kernfs_readdir: i = %d\n", i);
    574  1.1  cgd #endif
    575  1.9  cgd 		if (i >= nkernfs_targets) {
    576  1.1  cgd 			*eofflagp = 1;
    577  1.1  cgd 			break;
    578  1.1  cgd 		}
    579  1.1  cgd 		{
    580  1.1  cgd 			struct direct d;
    581  1.1  cgd 			struct direct *dp = &d;
    582  1.9  cgd 			struct kernfs_target *kt = &kernfs_targets[i];
    583  1.1  cgd 
    584  1.1  cgd 			bzero((caddr_t) dp, UIO_MX);
    585  1.1  cgd 
    586  1.1  cgd 			dp->d_namlen = strlen(kt->kt_name);
    587  1.1  cgd 			bcopy(kt->kt_name, dp->d_name, dp->d_namlen+1);
    588  1.1  cgd 
    589  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    590  1.1  cgd 			printf("kernfs_readdir: name = %s, len = %d\n",
    591  1.1  cgd 					dp->d_name, dp->d_namlen);
    592  1.1  cgd #endif
    593  1.1  cgd 			/*
    594  1.1  cgd 			 * Fill in the remaining fields
    595  1.1  cgd 			 */
    596  1.1  cgd 			dp->d_reclen = UIO_MX;
    597  1.1  cgd 			dp->d_ino = i + 3;
    598  1.1  cgd 			/*
    599  1.1  cgd 			 * And ship to userland
    600  1.1  cgd 			 */
    601  1.1  cgd 			error = uiomove((caddr_t) dp, UIO_MX, uio);
    602  1.1  cgd 			if (error)
    603  1.1  cgd 				break;
    604  1.1  cgd 		}
    605  1.1  cgd 		i++;
    606  1.1  cgd 	}
    607  1.1  cgd 
    608  1.1  cgd 	uio->uio_offset = i * UIO_MX;
    609  1.1  cgd 
    610  1.1  cgd 	return (error);
    611  1.1  cgd }
    612  1.1  cgd 
    613  1.1  cgd kernfs_inactive(vp, p)
    614  1.1  cgd 	struct vnode *vp;
    615  1.1  cgd 	struct proc *p;
    616  1.1  cgd {
    617  1.1  cgd 	/*
    618  1.1  cgd 	 * Clear out the v_type field to avoid
    619  1.1  cgd 	 * nasty things happening in vgone().
    620  1.1  cgd 	 */
    621  1.1  cgd 	vp->v_type = VNON;
    622  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    623  1.1  cgd 	printf("kernfs_inactive(%x)\n", vp);
    624  1.1  cgd #endif
    625  1.1  cgd 	return (0);
    626  1.1  cgd }
    627  1.1  cgd 
    628  1.1  cgd /*
    629  1.1  cgd  * Print out the contents of a kernfs vnode.
    630  1.1  cgd  */
    631  1.1  cgd /* ARGSUSED */
    632  1.1  cgd kernfs_print(vp)
    633  1.1  cgd 	struct vnode *vp;
    634  1.1  cgd {
    635  1.1  cgd 	printf("tag VT_NON, kernfs vnode\n");
    636  1.1  cgd }
    637  1.1  cgd 
    638  1.1  cgd /*
    639  1.1  cgd  * kernfs vnode unsupported operation
    640  1.1  cgd  */
    641  1.1  cgd kernfs_enotsupp()
    642  1.1  cgd {
    643  1.1  cgd 	return (EOPNOTSUPP);
    644  1.1  cgd }
    645  1.1  cgd 
    646  1.1  cgd /*
    647  1.1  cgd  * kernfs "should never get here" operation
    648  1.1  cgd  */
    649  1.1  cgd kernfs_badop()
    650  1.1  cgd {
    651  1.1  cgd 	panic("kernfs: bad op");
    652  1.1  cgd 	/* NOTREACHED */
    653  1.1  cgd }
    654  1.1  cgd 
    655  1.1  cgd /*
    656  1.1  cgd  * kernfs vnode null operation
    657  1.1  cgd  */
    658  1.1  cgd kernfs_nullop()
    659  1.1  cgd {
    660  1.1  cgd 	return (0);
    661  1.1  cgd }
    662  1.1  cgd 
    663  1.1  cgd #define kernfs_create ((int (*) __P(( \
    664  1.1  cgd 		struct nameidata *ndp, \
    665  1.1  cgd 		struct vattr *vap, \
    666  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    667  1.1  cgd #define kernfs_mknod ((int (*) __P(( \
    668  1.1  cgd 		struct nameidata *ndp, \
    669  1.1  cgd 		struct vattr *vap, \
    670  1.1  cgd 		struct ucred *cred, \
    671  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    672  1.1  cgd #define kernfs_close ((int (*) __P(( \
    673  1.1  cgd 		struct vnode *vp, \
    674  1.1  cgd 		int fflag, \
    675  1.1  cgd 		struct ucred *cred, \
    676  1.1  cgd 		struct proc *p))) nullop)
    677  1.1  cgd #define	kernfs_ioctl ((int (*) __P(( \
    678  1.1  cgd 		struct vnode *vp, \
    679  1.1  cgd 		int command, \
    680  1.1  cgd 		caddr_t data, \
    681  1.1  cgd 		int fflag, \
    682  1.1  cgd 		struct ucred *cred, \
    683  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    684  1.1  cgd #define	kernfs_select ((int (*) __P(( \
    685  1.1  cgd 		struct vnode *vp, \
    686  1.1  cgd 		int which, \
    687  1.1  cgd 		int fflags, \
    688  1.1  cgd 		struct ucred *cred, \
    689  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    690  1.1  cgd #define kernfs_mmap ((int (*) __P(( \
    691  1.1  cgd 		struct vnode *vp, \
    692  1.1  cgd 		int fflags, \
    693  1.1  cgd 		struct ucred *cred, \
    694  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    695  1.1  cgd #define kernfs_fsync ((int (*) __P(( \
    696  1.1  cgd 		struct vnode *vp, \
    697  1.1  cgd 		int fflags, \
    698  1.1  cgd 		struct ucred *cred, \
    699  1.1  cgd 		int waitfor, \
    700  1.1  cgd 		struct proc *p))) nullop)
    701  1.1  cgd #define kernfs_seek ((int (*) __P(( \
    702  1.1  cgd 		struct vnode *vp, \
    703  1.1  cgd 		off_t oldoff, \
    704  1.1  cgd 		off_t newoff, \
    705  1.1  cgd 		struct ucred *cred))) nullop)
    706  1.1  cgd #define kernfs_remove ((int (*) __P(( \
    707  1.1  cgd 		struct nameidata *ndp, \
    708  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    709  1.1  cgd #define kernfs_link ((int (*) __P(( \
    710  1.1  cgd 		struct vnode *vp, \
    711  1.1  cgd 		struct nameidata *ndp, \
    712  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    713  1.1  cgd #define kernfs_rename ((int (*) __P(( \
    714  1.1  cgd 		struct nameidata *fndp, \
    715  1.1  cgd 		struct nameidata *tdnp, \
    716  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    717  1.1  cgd #define kernfs_mkdir ((int (*) __P(( \
    718  1.1  cgd 		struct nameidata *ndp, \
    719  1.1  cgd 		struct vattr *vap, \
    720  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    721  1.1  cgd #define kernfs_rmdir ((int (*) __P(( \
    722  1.1  cgd 		struct nameidata *ndp, \
    723  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    724  1.1  cgd #define kernfs_symlink ((int (*) __P(( \
    725  1.1  cgd 		struct nameidata *ndp, \
    726  1.1  cgd 		struct vattr *vap, \
    727  1.1  cgd 		char *target, \
    728  1.1  cgd 		struct proc *p))) kernfs_enotsupp)
    729  1.1  cgd #define kernfs_readlink ((int (*) __P(( \
    730  1.1  cgd 		struct vnode *vp, \
    731  1.1  cgd 		struct uio *uio, \
    732  1.1  cgd 		struct ucred *cred))) kernfs_enotsupp)
    733  1.1  cgd #define kernfs_abortop ((int (*) __P(( \
    734  1.1  cgd 		struct nameidata *ndp))) nullop)
    735  1.1  cgd #ifdef KERNFS_DIAGNOSTIC
    736  1.1  cgd int kernfs_reclaim(vp)
    737  1.1  cgd struct vnode *vp;
    738  1.1  cgd {
    739  1.1  cgd 	printf("kernfs_reclaim(%x)\n", vp);
    740  1.1  cgd 	return (0);
    741  1.1  cgd }
    742  1.1  cgd #else
    743  1.1  cgd #define kernfs_reclaim ((int (*) __P(( \
    744  1.1  cgd 		struct vnode *vp))) nullop)
    745  1.1  cgd #endif
    746  1.1  cgd #define	kernfs_lock ((int (*) __P(( \
    747  1.1  cgd 		struct vnode *vp))) nullop)
    748  1.1  cgd #define kernfs_unlock ((int (*) __P(( \
    749  1.1  cgd 		struct vnode *vp))) nullop)
    750  1.1  cgd #define	kernfs_bmap ((int (*) __P(( \
    751  1.1  cgd 		struct vnode *vp, \
    752  1.1  cgd 		daddr_t bn, \
    753  1.1  cgd 		struct vnode **vpp, \
    754  1.1  cgd 		daddr_t *bnp))) kernfs_badop)
    755  1.1  cgd #define	kernfs_strategy ((int (*) __P(( \
    756  1.1  cgd 		struct buf *bp))) kernfs_badop)
    757  1.1  cgd #define kernfs_islocked ((int (*) __P(( \
    758  1.1  cgd 		struct vnode *vp))) nullop)
    759  1.1  cgd #define kernfs_advlock ((int (*) __P(( \
    760  1.1  cgd 		struct vnode *vp, \
    761  1.1  cgd 		caddr_t id, \
    762  1.1  cgd 		int op, \
    763  1.1  cgd 		struct flock *fl, \
    764  1.1  cgd 		int flags))) kernfs_enotsupp)
    765  1.1  cgd 
    766  1.1  cgd struct vnodeops kernfs_vnodeops = {
    767  1.1  cgd 	kernfs_lookup,	/* lookup */
    768  1.1  cgd 	kernfs_create,	/* create */
    769  1.1  cgd 	kernfs_mknod,	/* mknod */
    770  1.1  cgd 	kernfs_open,	/* open */
    771  1.1  cgd 	kernfs_close,	/* close */
    772  1.1  cgd 	kernfs_access,	/* access */
    773  1.1  cgd 	kernfs_getattr,	/* getattr */
    774  1.1  cgd 	kernfs_setattr,	/* setattr */
    775  1.1  cgd 	kernfs_read,	/* read */
    776  1.1  cgd 	kernfs_write,	/* write */
    777  1.1  cgd 	kernfs_ioctl,	/* ioctl */
    778  1.1  cgd 	kernfs_select,	/* select */
    779  1.1  cgd 	kernfs_mmap,	/* mmap */
    780  1.1  cgd 	kernfs_fsync,	/* fsync */
    781  1.1  cgd 	kernfs_seek,	/* seek */
    782  1.1  cgd 	kernfs_remove,	/* remove */
    783  1.1  cgd 	kernfs_link,	/* link */
    784  1.1  cgd 	kernfs_rename,	/* rename */
    785  1.1  cgd 	kernfs_mkdir,	/* mkdir */
    786  1.1  cgd 	kernfs_rmdir,	/* rmdir */
    787  1.1  cgd 	kernfs_symlink,	/* symlink */
    788  1.1  cgd 	kernfs_readdir,	/* readdir */
    789  1.1  cgd 	kernfs_readlink,	/* readlink */
    790  1.1  cgd 	kernfs_abortop,	/* abortop */
    791  1.1  cgd 	kernfs_inactive,	/* inactive */
    792  1.1  cgd 	kernfs_reclaim,	/* reclaim */
    793  1.1  cgd 	kernfs_lock,	/* lock */
    794  1.1  cgd 	kernfs_unlock,	/* unlock */
    795  1.1  cgd 	kernfs_bmap,	/* bmap */
    796  1.1  cgd 	kernfs_strategy,	/* strategy */
    797  1.1  cgd 	kernfs_print,	/* print */
    798  1.1  cgd 	kernfs_islocked,	/* islocked */
    799  1.1  cgd 	kernfs_advlock,	/* advlock */
    800  1.1  cgd };
    801