procfs_vnops.c revision 1.1.1.1 1 1.1 pk /*
2 1.1.1.1 fvdl * Copyright (c) 1993 Jan-Simon Pendry
3 1.1.1.1 fvdl * Copyright (c) 1993
4 1.1.1.1 fvdl * The Regents of the University of California. All rights reserved.
5 1.1.1.1 fvdl *
6 1.1.1.1 fvdl * This code is derived from software contributed to Berkeley by
7 1.1.1.1 fvdl * Jan-Simon Pendry.
8 1.1.1.1 fvdl *
9 1.1.1.1 fvdl * Redistribution and use in source and binary forms, with or without
10 1.1.1.1 fvdl * modification, are permitted provided that the following conditions
11 1.1.1.1 fvdl * are met:
12 1.1.1.1 fvdl * 1. Redistributions of source code must retain the above copyright
13 1.1.1.1 fvdl * notice, this list of conditions and the following disclaimer.
14 1.1.1.1 fvdl * 2. Redistributions in binary form must reproduce the above copyright
15 1.1.1.1 fvdl * notice, this list of conditions and the following disclaimer in the
16 1.1.1.1 fvdl * documentation and/or other materials provided with the distribution.
17 1.1.1.1 fvdl * 3. All advertising materials mentioning features or use of this software
18 1.1.1.1 fvdl * must display the following acknowledgement:
19 1.1.1.1 fvdl * This product includes software developed by the University of
20 1.1.1.1 fvdl * California, Berkeley and its contributors.
21 1.1.1.1 fvdl * 4. Neither the name of the University nor the names of its contributors
22 1.1.1.1 fvdl * may be used to endorse or promote products derived from this software
23 1.1.1.1 fvdl * without specific prior written permission.
24 1.1.1.1 fvdl *
25 1.1.1.1 fvdl * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 1.1.1.1 fvdl * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 1.1.1.1 fvdl * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 1.1.1.1 fvdl * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 1.1.1.1 fvdl * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 1.1.1.1 fvdl * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 1.1.1.1 fvdl * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 1.1.1.1 fvdl * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 1.1.1.1 fvdl * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 1.1.1.1 fvdl * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 1.1.1.1 fvdl * SUCH DAMAGE.
36 1.1.1.1 fvdl *
37 1.1.1.1 fvdl * @(#)procfs_vnops.c 8.6 (Berkeley) 2/7/94
38 1.1.1.1 fvdl *
39 1.1.1.1 fvdl * From:
40 1.1.1.1 fvdl * $Id: procfs_vnops.c,v 1.1.1.1 1998/03/01 02:10:02 fvdl Exp $
41 1.1 pk */
42 1.1 pk
43 1.1 pk /*
44 1.1.1.1 fvdl * procfs vnode interface
45 1.1 pk */
46 1.1.1.1 fvdl
47 1.1.1.1 fvdl #include <sys/param.h>
48 1.1.1.1 fvdl #include <sys/systm.h>
49 1.1.1.1 fvdl #include <sys/time.h>
50 1.1.1.1 fvdl #include <sys/kernel.h>
51 1.1.1.1 fvdl #include <sys/file.h>
52 1.1.1.1 fvdl #include <sys/proc.h>
53 1.1.1.1 fvdl #include <sys/vnode.h>
54 1.1.1.1 fvdl #include <sys/namei.h>
55 1.1.1.1 fvdl #include <sys/malloc.h>
56 1.1.1.1 fvdl #include <sys/dirent.h>
57 1.1.1.1 fvdl #include <sys/resourcevar.h>
58 1.1.1.1 fvdl #include <miscfs/procfs/procfs.h>
59 1.1.1.1 fvdl #include <vm/vm.h> /* for PAGE_SIZE */
60 1.1 pk
61 1.1 pk /*
62 1.1 pk * Vnode Operations.
63 1.1 pk *
64 1.1 pk */
65 1.1 pk
66 1.1.1.1 fvdl /*
67 1.1.1.1 fvdl * This is a list of the valid names in the
68 1.1.1.1 fvdl * process-specific sub-directories. It is
69 1.1.1.1 fvdl * used in procfs_lookup and procfs_readdir
70 1.1.1.1 fvdl */
71 1.1.1.1 fvdl static struct pfsnames {
72 1.1.1.1 fvdl u_short d_namlen;
73 1.1.1.1 fvdl char d_name[PROCFS_NAMELEN];
74 1.1.1.1 fvdl pfstype d_pfstype;
75 1.1.1.1 fvdl } procent[] = {
76 1.1.1.1 fvdl #define N(s) sizeof(s)-1, s
77 1.1.1.1 fvdl /* namlen, nam, type */
78 1.1.1.1 fvdl { N("file"), Pfile },
79 1.1.1.1 fvdl { N("mem"), Pmem },
80 1.1.1.1 fvdl { N("regs"), Pregs },
81 1.1.1.1 fvdl { N("fpregs"), Pfpregs },
82 1.1.1.1 fvdl { N("ctl"), Pctl },
83 1.1.1.1 fvdl { N("status"), Pstatus },
84 1.1.1.1 fvdl { N("note"), Pnote },
85 1.1.1.1 fvdl { N("notepg"), Pnotepg },
86 1.1.1.1 fvdl #undef N
87 1.1.1.1 fvdl };
88 1.1.1.1 fvdl #define Nprocent (sizeof(procent)/sizeof(procent[0]))
89 1.1 pk
90 1.1.1.1 fvdl static pid_t atopid __P((const char *, u_int));
91 1.1 pk
92 1.1 pk /*
93 1.1.1.1 fvdl * set things up for doing i/o on
94 1.1.1.1 fvdl * the pfsnode (vp). (vp) is locked
95 1.1.1.1 fvdl * on entry, and should be left locked
96 1.1.1.1 fvdl * on exit.
97 1.1.1.1 fvdl *
98 1.1.1.1 fvdl * for procfs we don't need to do anything
99 1.1.1.1 fvdl * in particular for i/o. all that is done
100 1.1.1.1 fvdl * is to support exclusive open on process
101 1.1.1.1 fvdl * memory images.
102 1.1 pk */
103 1.1.1.1 fvdl procfs_open(ap)
104 1.1.1.1 fvdl struct vop_open_args *ap;
105 1.1 pk {
106 1.1.1.1 fvdl struct pfsnode *pfs = VTOPFS(ap->a_vp);
107 1.1 pk
108 1.1.1.1 fvdl switch (pfs->pfs_type) {
109 1.1.1.1 fvdl case Pmem:
110 1.1.1.1 fvdl if (PFIND(pfs->pfs_pid) == 0)
111 1.1.1.1 fvdl return (ENOENT); /* was ESRCH, jsp */
112 1.1 pk
113 1.1.1.1 fvdl if ((pfs->pfs_flags & FWRITE) && (ap->a_mode & O_EXCL) ||
114 1.1.1.1 fvdl (pfs->pfs_flags & O_EXCL) && (ap->a_mode & FWRITE))
115 1.1.1.1 fvdl return (EBUSY);
116 1.1 pk
117 1.1 pk
118 1.1.1.1 fvdl if (ap->a_mode & FWRITE)
119 1.1.1.1 fvdl pfs->pfs_flags = ap->a_mode & (FWRITE|O_EXCL);
120 1.1 pk
121 1.1.1.1 fvdl return (0);
122 1.1 pk
123 1.1.1.1 fvdl default:
124 1.1 pk break;
125 1.1.1.1 fvdl }
126 1.1 pk
127 1.1.1.1 fvdl return (0);
128 1.1.1.1 fvdl }
129 1.1 pk
130 1.1.1.1 fvdl /*
131 1.1.1.1 fvdl * close the pfsnode (vp) after doing i/o.
132 1.1.1.1 fvdl * (vp) is not locked on entry or exit.
133 1.1.1.1 fvdl *
134 1.1.1.1 fvdl * nothing to do for procfs other than undo
135 1.1.1.1 fvdl * any exclusive open flag (see _open above).
136 1.1.1.1 fvdl */
137 1.1.1.1 fvdl procfs_close(ap)
138 1.1.1.1 fvdl struct vop_close_args *ap;
139 1.1.1.1 fvdl {
140 1.1.1.1 fvdl struct pfsnode *pfs = VTOPFS(ap->a_vp);
141 1.1 pk
142 1.1.1.1 fvdl switch (pfs->pfs_type) {
143 1.1.1.1 fvdl case Pmem:
144 1.1.1.1 fvdl if ((ap->a_fflag & FWRITE) && (pfs->pfs_flags & O_EXCL))
145 1.1.1.1 fvdl pfs->pfs_flags &= ~(FWRITE|O_EXCL);
146 1.1 pk break;
147 1.1.1.1 fvdl }
148 1.1 pk
149 1.1.1.1 fvdl return (0);
150 1.1.1.1 fvdl }
151 1.1 pk
152 1.1.1.1 fvdl /*
153 1.1.1.1 fvdl * do an ioctl operation on pfsnode (vp).
154 1.1.1.1 fvdl * (vp) is not locked on entry or exit.
155 1.1.1.1 fvdl */
156 1.1.1.1 fvdl procfs_ioctl(ap)
157 1.1.1.1 fvdl struct vop_ioctl_args *ap;
158 1.1.1.1 fvdl {
159 1.1.1.1 fvdl
160 1.1.1.1 fvdl return (ENOTTY);
161 1.1 pk }
162 1.1 pk
163 1.1 pk /*
164 1.1.1.1 fvdl * do block mapping for pfsnode (vp).
165 1.1.1.1 fvdl * since we don't use the buffer cache
166 1.1.1.1 fvdl * for procfs this function should never
167 1.1.1.1 fvdl * be called. in any case, it's not clear
168 1.1.1.1 fvdl * what part of the kernel ever makes use
169 1.1.1.1 fvdl * of this function. for sanity, this is the
170 1.1.1.1 fvdl * usual no-op bmap, although returning
171 1.1.1.1 fvdl * (EIO) would be a reasonable alternative.
172 1.1 pk */
173 1.1.1.1 fvdl procfs_bmap(ap)
174 1.1.1.1 fvdl struct vop_bmap_args *ap;
175 1.1 pk {
176 1.1 pk
177 1.1.1.1 fvdl if (ap->a_vpp != NULL)
178 1.1.1.1 fvdl *ap->a_vpp = ap->a_vp;
179 1.1.1.1 fvdl if (ap->a_bnp != NULL)
180 1.1.1.1 fvdl *ap->a_bnp = ap->a_bn;
181 1.1 pk return (0);
182 1.1 pk }
183 1.1 pk
184 1.1 pk /*
185 1.1.1.1 fvdl * _inactive is called when the pfsnode
186 1.1.1.1 fvdl * is vrele'd and the reference count goes
187 1.1.1.1 fvdl * to zero. (vp) will be on the vnode free
188 1.1.1.1 fvdl * list, so to get it back vget() must be
189 1.1.1.1 fvdl * used.
190 1.1.1.1 fvdl *
191 1.1.1.1 fvdl * for procfs, check if the process is still
192 1.1.1.1 fvdl * alive and if it isn't then just throw away
193 1.1.1.1 fvdl * the vnode by calling vgone(). this may
194 1.1.1.1 fvdl * be overkill and a waste of time since the
195 1.1.1.1 fvdl * chances are that the process will still be
196 1.1.1.1 fvdl * there and PFIND is not free.
197 1.1.1.1 fvdl *
198 1.1.1.1 fvdl * (vp) is not locked on entry or exit.
199 1.1 pk */
200 1.1.1.1 fvdl procfs_inactive(ap)
201 1.1.1.1 fvdl struct vop_inactive_args *ap;
202 1.1 pk {
203 1.1.1.1 fvdl struct pfsnode *pfs = VTOPFS(ap->a_vp);
204 1.1.1.1 fvdl
205 1.1.1.1 fvdl if (PFIND(pfs->pfs_pid) == 0)
206 1.1.1.1 fvdl vgone(ap->a_vp);
207 1.1 pk
208 1.1 pk return (0);
209 1.1 pk }
210 1.1 pk
211 1.1 pk /*
212 1.1.1.1 fvdl * _reclaim is called when getnewvnode()
213 1.1.1.1 fvdl * wants to make use of an entry on the vnode
214 1.1.1.1 fvdl * free list. at this time the filesystem needs
215 1.1.1.1 fvdl * to free any private data and remove the node
216 1.1.1.1 fvdl * from any private lists.
217 1.1 pk */
218 1.1.1.1 fvdl procfs_reclaim(ap)
219 1.1.1.1 fvdl struct vop_reclaim_args *ap;
220 1.1.1.1 fvdl {
221 1.1.1.1 fvdl int error;
222 1.1.1.1 fvdl
223 1.1.1.1 fvdl error = procfs_freevp(ap->a_vp);
224 1.1.1.1 fvdl return (error);
225 1.1 pk }
226 1.1 pk
227 1.1 pk /*
228 1.1.1.1 fvdl * Return POSIX pathconf information applicable to special devices.
229 1.1 pk */
230 1.1.1.1 fvdl procfs_pathconf(ap)
231 1.1.1.1 fvdl struct vop_pathconf_args /* {
232 1.1.1.1 fvdl struct vnode *a_vp;
233 1.1.1.1 fvdl int a_name;
234 1.1.1.1 fvdl int *a_retval;
235 1.1.1.1 fvdl } */ *ap;
236 1.1 pk {
237 1.1 pk
238 1.1.1.1 fvdl switch (ap->a_name) {
239 1.1.1.1 fvdl case _PC_LINK_MAX:
240 1.1.1.1 fvdl *ap->a_retval = LINK_MAX;
241 1.1.1.1 fvdl return (0);
242 1.1.1.1 fvdl case _PC_MAX_CANON:
243 1.1.1.1 fvdl *ap->a_retval = MAX_CANON;
244 1.1.1.1 fvdl return (0);
245 1.1.1.1 fvdl case _PC_MAX_INPUT:
246 1.1.1.1 fvdl *ap->a_retval = MAX_INPUT;
247 1.1.1.1 fvdl return (0);
248 1.1.1.1 fvdl case _PC_PIPE_BUF:
249 1.1.1.1 fvdl *ap->a_retval = PIPE_BUF;
250 1.1.1.1 fvdl return (0);
251 1.1.1.1 fvdl case _PC_CHOWN_RESTRICTED:
252 1.1.1.1 fvdl *ap->a_retval = 1;
253 1.1.1.1 fvdl return (0);
254 1.1.1.1 fvdl case _PC_VDISABLE:
255 1.1.1.1 fvdl *ap->a_retval = _POSIX_VDISABLE;
256 1.1.1.1 fvdl return (0);
257 1.1.1.1 fvdl default:
258 1.1.1.1 fvdl return (EINVAL);
259 1.1 pk }
260 1.1.1.1 fvdl /* NOTREACHED */
261 1.1 pk }
262 1.1 pk
263 1.1 pk /*
264 1.1.1.1 fvdl * _print is used for debugging.
265 1.1.1.1 fvdl * just print a readable description
266 1.1.1.1 fvdl * of (vp).
267 1.1 pk */
268 1.1.1.1 fvdl procfs_print(ap)
269 1.1.1.1 fvdl struct vop_print_args *ap;
270 1.1 pk {
271 1.1.1.1 fvdl struct pfsnode *pfs = VTOPFS(ap->a_vp);
272 1.1.1.1 fvdl
273 1.1.1.1 fvdl printf("tag VT_PROCFS, pid %d, mode %x, flags %x\n",
274 1.1.1.1 fvdl pfs->pfs_pid,
275 1.1.1.1 fvdl pfs->pfs_mode, pfs->pfs_flags);
276 1.1 pk }
277 1.1 pk
278 1.1 pk /*
279 1.1.1.1 fvdl * _abortop is called when operations such as
280 1.1.1.1 fvdl * rename and create fail. this entry is responsible
281 1.1.1.1 fvdl * for undoing any side-effects caused by the lookup.
282 1.1.1.1 fvdl * this will always include freeing the pathname buffer.
283 1.1 pk */
284 1.1.1.1 fvdl procfs_abortop(ap)
285 1.1.1.1 fvdl struct vop_abortop_args *ap;
286 1.1 pk {
287 1.1.1.1 fvdl
288 1.1.1.1 fvdl if ((ap->a_cnp->cn_flags & (HASBUF | SAVESTART)) == HASBUF)
289 1.1.1.1 fvdl FREE(ap->a_cnp->cn_pnbuf, M_NAMEI);
290 1.1.1.1 fvdl return (0);
291 1.1 pk }
292 1.1 pk
293 1.1 pk /*
294 1.1.1.1 fvdl * generic entry point for unsupported operations
295 1.1 pk */
296 1.1.1.1 fvdl procfs_badop()
297 1.1 pk {
298 1.1 pk
299 1.1.1.1 fvdl return (EIO);
300 1.1.1.1 fvdl }
301 1.1 pk
302 1.1.1.1 fvdl /*
303 1.1.1.1 fvdl * Invent attributes for pfsnode (vp) and store
304 1.1.1.1 fvdl * them in (vap).
305 1.1.1.1 fvdl * Directories lengths are returned as zero since
306 1.1.1.1 fvdl * any real length would require the genuine size
307 1.1.1.1 fvdl * to be computed, and nothing cares anyway.
308 1.1.1.1 fvdl *
309 1.1.1.1 fvdl * this is relatively minimal for procfs.
310 1.1.1.1 fvdl */
311 1.1.1.1 fvdl procfs_getattr(ap)
312 1.1.1.1 fvdl struct vop_getattr_args *ap;
313 1.1.1.1 fvdl {
314 1.1.1.1 fvdl struct pfsnode *pfs = VTOPFS(ap->a_vp);
315 1.1.1.1 fvdl struct vattr *vap = ap->a_vap;
316 1.1.1.1 fvdl struct proc *procp;
317 1.1.1.1 fvdl int error;
318 1.1 pk
319 1.1.1.1 fvdl /* first check the process still exists */
320 1.1.1.1 fvdl switch (pfs->pfs_type) {
321 1.1.1.1 fvdl case Proot:
322 1.1.1.1 fvdl procp = 0;
323 1.1.1.1 fvdl break;
324 1.1 pk
325 1.1.1.1 fvdl default:
326 1.1.1.1 fvdl procp = PFIND(pfs->pfs_pid);
327 1.1.1.1 fvdl if (procp == 0)
328 1.1.1.1 fvdl return (ENOENT);
329 1.1.1.1 fvdl }
330 1.1 pk
331 1.1.1.1 fvdl error = 0;
332 1.1 pk
333 1.1.1.1 fvdl /* start by zeroing out the attributes */
334 1.1.1.1 fvdl VATTR_NULL(vap);
335 1.1 pk
336 1.1.1.1 fvdl /* next do all the common fields */
337 1.1.1.1 fvdl vap->va_type = ap->a_vp->v_type;
338 1.1.1.1 fvdl vap->va_mode = pfs->pfs_mode;
339 1.1.1.1 fvdl vap->va_fileid = pfs->pfs_fileno;
340 1.1.1.1 fvdl vap->va_flags = 0;
341 1.1.1.1 fvdl vap->va_blocksize = PAGE_SIZE;
342 1.1.1.1 fvdl vap->va_bytes = vap->va_size = 0;
343 1.1 pk
344 1.1.1.1 fvdl /*
345 1.1.1.1 fvdl * If the process has exercised some setuid or setgid
346 1.1.1.1 fvdl * privilege, then rip away read/write permission so
347 1.1.1.1 fvdl * that only root can gain access.
348 1.1.1.1 fvdl */
349 1.1.1.1 fvdl switch (pfs->pfs_type) {
350 1.1.1.1 fvdl case Pregs:
351 1.1.1.1 fvdl case Pfpregs:
352 1.1.1.1 fvdl case Pmem:
353 1.1.1.1 fvdl if (procp->p_flag & P_SUGID)
354 1.1.1.1 fvdl vap->va_mode &= ~((VREAD|VWRITE)|
355 1.1.1.1 fvdl ((VREAD|VWRITE)>>3)|
356 1.1.1.1 fvdl ((VREAD|VWRITE)>>6));
357 1.1.1.1 fvdl break;
358 1.1.1.1 fvdl }
359 1.1 pk
360 1.1.1.1 fvdl /*
361 1.1.1.1 fvdl * Make all times be current TOD.
362 1.1.1.1 fvdl * It would be possible to get the process start
363 1.1.1.1 fvdl * time from the p_stat structure, but there's
364 1.1.1.1 fvdl * no "file creation" time stamp anyway, and the
365 1.1.1.1 fvdl * p_stat structure is not addressible if u. gets
366 1.1.1.1 fvdl * swapped out for that process.
367 1.1.1.1 fvdl */
368 1.1.1.1 fvdl microtime(&vap->va_ctime);
369 1.1.1.1 fvdl vap->va_atime = vap->va_mtime = vap->va_ctime;
370 1.1 pk
371 1.1.1.1 fvdl /*
372 1.1.1.1 fvdl * now do the object specific fields
373 1.1.1.1 fvdl *
374 1.1.1.1 fvdl * The size could be set from struct reg, but it's hardly
375 1.1.1.1 fvdl * worth the trouble, and it puts some (potentially) machine
376 1.1.1.1 fvdl * dependent data into this machine-independent code. If it
377 1.1.1.1 fvdl * becomes important then this function should break out into
378 1.1.1.1 fvdl * a per-file stat function in the corresponding .c file.
379 1.1.1.1 fvdl */
380 1.1 pk
381 1.1.1.1 fvdl switch (pfs->pfs_type) {
382 1.1.1.1 fvdl case Proot:
383 1.1 pk vap->va_nlink = 2;
384 1.1 pk vap->va_uid = 0;
385 1.1 pk vap->va_gid = 0;
386 1.1.1.1 fvdl break;
387 1.1.1.1 fvdl
388 1.1.1.1 fvdl case Pproc:
389 1.1.1.1 fvdl vap->va_nlink = 2;
390 1.1.1.1 fvdl vap->va_uid = procp->p_ucred->cr_uid;
391 1.1.1.1 fvdl vap->va_gid = procp->p_ucred->cr_gid;
392 1.1.1.1 fvdl break;
393 1.1.1.1 fvdl
394 1.1.1.1 fvdl case Pfile:
395 1.1.1.1 fvdl error = EOPNOTSUPP;
396 1.1.1.1 fvdl break;
397 1.1.1.1 fvdl
398 1.1.1.1 fvdl case Pmem:
399 1.1.1.1 fvdl vap->va_nlink = 1;
400 1.1.1.1 fvdl vap->va_bytes = vap->va_size =
401 1.1.1.1 fvdl ctob(procp->p_vmspace->vm_tsize +
402 1.1.1.1 fvdl procp->p_vmspace->vm_dsize +
403 1.1.1.1 fvdl procp->p_vmspace->vm_ssize);
404 1.1.1.1 fvdl vap->va_uid = procp->p_ucred->cr_uid;
405 1.1.1.1 fvdl vap->va_gid = procp->p_ucred->cr_gid;
406 1.1.1.1 fvdl break;
407 1.1.1.1 fvdl
408 1.1.1.1 fvdl case Pregs:
409 1.1.1.1 fvdl case Pfpregs:
410 1.1.1.1 fvdl case Pctl:
411 1.1.1.1 fvdl case Pstatus:
412 1.1.1.1 fvdl case Pnote:
413 1.1.1.1 fvdl case Pnotepg:
414 1.1.1.1 fvdl vap->va_nlink = 1;
415 1.1.1.1 fvdl vap->va_uid = procp->p_ucred->cr_uid;
416 1.1.1.1 fvdl vap->va_gid = procp->p_ucred->cr_gid;
417 1.1.1.1 fvdl break;
418 1.1.1.1 fvdl
419 1.1.1.1 fvdl default:
420 1.1.1.1 fvdl panic("procfs_getattr");
421 1.1 pk }
422 1.1 pk
423 1.1.1.1 fvdl return (error);
424 1.1.1.1 fvdl }
425 1.1.1.1 fvdl
426 1.1.1.1 fvdl procfs_setattr(ap)
427 1.1.1.1 fvdl struct vop_setattr_args *ap;
428 1.1.1.1 fvdl {
429 1.1.1.1 fvdl /*
430 1.1.1.1 fvdl * just fake out attribute setting
431 1.1.1.1 fvdl * it's not good to generate an error
432 1.1.1.1 fvdl * return, otherwise things like creat()
433 1.1.1.1 fvdl * will fail when they try to set the
434 1.1.1.1 fvdl * file length to 0. worse, this means
435 1.1.1.1 fvdl * that echo $note > /proc/$pid/note will fail.
436 1.1.1.1 fvdl */
437 1.1.1.1 fvdl
438 1.1.1.1 fvdl return (0);
439 1.1.1.1 fvdl }
440 1.1.1.1 fvdl
441 1.1.1.1 fvdl /*
442 1.1.1.1 fvdl * implement access checking.
443 1.1.1.1 fvdl *
444 1.1.1.1 fvdl * something very similar to this code is duplicated
445 1.1.1.1 fvdl * throughout the 4bsd kernel and should be moved
446 1.1.1.1 fvdl * into kern/vfs_subr.c sometime.
447 1.1.1.1 fvdl *
448 1.1.1.1 fvdl * actually, the check for super-user is slightly
449 1.1.1.1 fvdl * broken since it will allow read access to write-only
450 1.1.1.1 fvdl * objects. this doesn't cause any particular trouble
451 1.1.1.1 fvdl * but does mean that the i/o entry points need to check
452 1.1.1.1 fvdl * that the operation really does make sense.
453 1.1.1.1 fvdl */
454 1.1.1.1 fvdl procfs_access(ap)
455 1.1.1.1 fvdl struct vop_access_args *ap;
456 1.1 pk {
457 1.1.1.1 fvdl struct vattr *vap;
458 1.1 pk struct vattr vattr;
459 1.1 pk int error;
460 1.1 pk
461 1.1 pk /*
462 1.1 pk * If you're the super-user,
463 1.1 pk * you always get access.
464 1.1 pk */
465 1.1.1.1 fvdl if (ap->a_cred->cr_uid == (uid_t) 0)
466 1.1 pk return (0);
467 1.1 pk vap = &vattr;
468 1.1.1.1 fvdl if (error = VOP_GETATTR(ap->a_vp, vap, ap->a_cred, ap->a_p))
469 1.1 pk return (error);
470 1.1.1.1 fvdl
471 1.1 pk /*
472 1.1 pk * Access check is based on only one of owner, group, public.
473 1.1 pk * If not owner, then check group. If not a member of the
474 1.1 pk * group, then check public access.
475 1.1 pk */
476 1.1.1.1 fvdl if (ap->a_cred->cr_uid != vap->va_uid) {
477 1.1.1.1 fvdl gid_t *gp;
478 1.1.1.1 fvdl int i;
479 1.1.1.1 fvdl
480 1.1.1.1 fvdl (ap->a_mode) >>= 3;
481 1.1.1.1 fvdl gp = ap->a_cred->cr_groups;
482 1.1.1.1 fvdl for (i = 0; i < ap->a_cred->cr_ngroups; i++, gp++)
483 1.1 pk if (vap->va_gid == *gp)
484 1.1 pk goto found;
485 1.1.1.1 fvdl ap->a_mode >>= 3;
486 1.1 pk found:
487 1.1 pk ;
488 1.1 pk }
489 1.1.1.1 fvdl
490 1.1.1.1 fvdl if ((vap->va_mode & ap->a_mode) == ap->a_mode)
491 1.1 pk return (0);
492 1.1.1.1 fvdl
493 1.1 pk return (EACCES);
494 1.1 pk }
495 1.1 pk
496 1.1 pk /*
497 1.1.1.1 fvdl * lookup. this is incredibly complicated in the
498 1.1.1.1 fvdl * general case, however for most pseudo-filesystems
499 1.1.1.1 fvdl * very little needs to be done.
500 1.1.1.1 fvdl *
501 1.1.1.1 fvdl * unless you want to get a migraine, just make sure your
502 1.1.1.1 fvdl * filesystem doesn't do any locking of its own. otherwise
503 1.1.1.1 fvdl * read and inwardly digest ufs_lookup().
504 1.1.1.1 fvdl */
505 1.1.1.1 fvdl procfs_lookup(ap)
506 1.1.1.1 fvdl struct vop_lookup_args *ap;
507 1.1.1.1 fvdl {
508 1.1.1.1 fvdl struct componentname *cnp = ap->a_cnp;
509 1.1.1.1 fvdl struct vnode **vpp = ap->a_vpp;
510 1.1.1.1 fvdl struct vnode *dvp = ap->a_dvp;
511 1.1.1.1 fvdl char *pname = cnp->cn_nameptr;
512 1.1.1.1 fvdl int error = 0;
513 1.1 pk pid_t pid;
514 1.1 pk struct vnode *nvp;
515 1.1.1.1 fvdl struct pfsnode *pfs;
516 1.1 pk struct proc *procp;
517 1.1.1.1 fvdl pfstype pfs_type;
518 1.1.1.1 fvdl int i;
519 1.1 pk
520 1.1.1.1 fvdl if (cnp->cn_namelen == 1 && *pname == '.') {
521 1.1.1.1 fvdl *vpp = dvp;
522 1.1.1.1 fvdl VREF(dvp);
523 1.1.1.1 fvdl /*VOP_LOCK(dvp);*/
524 1.1.1.1 fvdl return (0);
525 1.1.1.1 fvdl }
526 1.1 pk
527 1.1.1.1 fvdl *vpp = NULL;
528 1.1.1.1 fvdl
529 1.1.1.1 fvdl pfs = VTOPFS(dvp);
530 1.1.1.1 fvdl switch (pfs->pfs_type) {
531 1.1.1.1 fvdl case Proot:
532 1.1.1.1 fvdl if (cnp->cn_flags & ISDOTDOT)
533 1.1.1.1 fvdl return (EIO);
534 1.1.1.1 fvdl
535 1.1.1.1 fvdl if (CNEQ(cnp, "curproc", 7))
536 1.1.1.1 fvdl pid = cnp->cn_proc->p_pid;
537 1.1.1.1 fvdl else
538 1.1.1.1 fvdl pid = atopid(pname, cnp->cn_namelen);
539 1.1.1.1 fvdl if (pid == NO_PID)
540 1.1.1.1 fvdl return (ENOENT);
541 1.1.1.1 fvdl
542 1.1.1.1 fvdl procp = PFIND(pid);
543 1.1.1.1 fvdl if (procp == 0)
544 1.1.1.1 fvdl return (ENOENT);
545 1.1 pk
546 1.1.1.1 fvdl error = procfs_allocvp(dvp->v_mount, &nvp, pid, Pproc);
547 1.1 pk if (error)
548 1.1.1.1 fvdl return (error);
549 1.1 pk
550 1.1.1.1 fvdl nvp->v_type = VDIR;
551 1.1.1.1 fvdl pfs = VTOPFS(nvp);
552 1.1 pk
553 1.1.1.1 fvdl *vpp = nvp;
554 1.1.1.1 fvdl return (0);
555 1.1 pk
556 1.1.1.1 fvdl case Pproc:
557 1.1.1.1 fvdl if (cnp->cn_flags & ISDOTDOT) {
558 1.1.1.1 fvdl error = procfs_root(dvp->v_mount, vpp);
559 1.1.1.1 fvdl return (error);
560 1.1.1.1 fvdl }
561 1.1.1.1 fvdl
562 1.1.1.1 fvdl procp = PFIND(pfs->pfs_pid);
563 1.1.1.1 fvdl if (procp == 0)
564 1.1.1.1 fvdl return (ENOENT);
565 1.1.1.1 fvdl
566 1.1.1.1 fvdl for (i = 0; i < Nprocent; i++) {
567 1.1.1.1 fvdl struct pfsnames *dp = &procent[i];
568 1.1.1.1 fvdl
569 1.1.1.1 fvdl if (cnp->cn_namelen == dp->d_namlen &&
570 1.1.1.1 fvdl bcmp(pname, dp->d_name, dp->d_namlen) == 0) {
571 1.1.1.1 fvdl pfs_type = dp->d_pfstype;
572 1.1.1.1 fvdl goto found;
573 1.1.1.1 fvdl }
574 1.1.1.1 fvdl }
575 1.1.1.1 fvdl return (ENOENT);
576 1.1.1.1 fvdl
577 1.1.1.1 fvdl found:
578 1.1.1.1 fvdl if (pfs_type == Pfile) {
579 1.1.1.1 fvdl nvp = procfs_findtextvp(procp);
580 1.1.1.1 fvdl if (nvp) {
581 1.1.1.1 fvdl VREF(nvp);
582 1.1.1.1 fvdl VOP_LOCK(nvp);
583 1.1.1.1 fvdl } else {
584 1.1.1.1 fvdl error = ENXIO;
585 1.1.1.1 fvdl }
586 1.1.1.1 fvdl } else {
587 1.1.1.1 fvdl error = procfs_allocvp(dvp->v_mount, &nvp,
588 1.1.1.1 fvdl pfs->pfs_pid, pfs_type);
589 1.1.1.1 fvdl if (error)
590 1.1.1.1 fvdl return (error);
591 1.1.1.1 fvdl
592 1.1.1.1 fvdl nvp->v_type = VREG;
593 1.1.1.1 fvdl pfs = VTOPFS(nvp);
594 1.1.1.1 fvdl }
595 1.1.1.1 fvdl *vpp = nvp;
596 1.1.1.1 fvdl return (error);
597 1.1.1.1 fvdl
598 1.1.1.1 fvdl default:
599 1.1.1.1 fvdl return (ENOTDIR);
600 1.1.1.1 fvdl }
601 1.1 pk }
602 1.1 pk
603 1.1.1.1 fvdl /*
604 1.1.1.1 fvdl * readdir returns directory entries from pfsnode (vp).
605 1.1.1.1 fvdl *
606 1.1.1.1 fvdl * the strategy here with procfs is to generate a single
607 1.1.1.1 fvdl * directory entry at a time (struct pfsdent) and then
608 1.1.1.1 fvdl * copy that out to userland using uiomove. a more efficent
609 1.1.1.1 fvdl * though more complex implementation, would try to minimize
610 1.1.1.1 fvdl * the number of calls to uiomove(). for procfs, this is
611 1.1.1.1 fvdl * hardly worth the added code complexity.
612 1.1.1.1 fvdl *
613 1.1.1.1 fvdl * this should just be done through read()
614 1.1.1.1 fvdl */
615 1.1.1.1 fvdl procfs_readdir(ap)
616 1.1.1.1 fvdl struct vop_readdir_args *ap;
617 1.1.1.1 fvdl {
618 1.1.1.1 fvdl struct uio *uio = ap->a_uio;
619 1.1.1.1 fvdl struct pfsdent d;
620 1.1.1.1 fvdl struct pfsdent *dp = &d;
621 1.1.1.1 fvdl struct pfsnode *pfs;
622 1.1.1.1 fvdl int error;
623 1.1.1.1 fvdl int count;
624 1.1.1.1 fvdl int i;
625 1.1.1.1 fvdl
626 1.1.1.1 fvdl pfs = VTOPFS(ap->a_vp);
627 1.1.1.1 fvdl
628 1.1.1.1 fvdl if (uio->uio_resid < UIO_MX)
629 1.1.1.1 fvdl return (EINVAL);
630 1.1.1.1 fvdl if (uio->uio_offset & (UIO_MX-1))
631 1.1.1.1 fvdl return (EINVAL);
632 1.1.1.1 fvdl if (uio->uio_offset < 0)
633 1.1 pk return (EINVAL);
634 1.1 pk
635 1.1.1.1 fvdl error = 0;
636 1.1 pk count = 0;
637 1.1.1.1 fvdl i = uio->uio_offset / UIO_MX;
638 1.1 pk
639 1.1.1.1 fvdl switch (pfs->pfs_type) {
640 1.1.1.1 fvdl /*
641 1.1.1.1 fvdl * this is for the process-specific sub-directories.
642 1.1.1.1 fvdl * all that is needed to is copy out all the entries
643 1.1.1.1 fvdl * from the procent[] table (top of this file).
644 1.1.1.1 fvdl */
645 1.1.1.1 fvdl case Pproc: {
646 1.1.1.1 fvdl while (uio->uio_resid >= UIO_MX) {
647 1.1.1.1 fvdl struct pfsnames *dt;
648 1.1.1.1 fvdl
649 1.1.1.1 fvdl if (i >= Nprocent)
650 1.1.1.1 fvdl break;
651 1.1.1.1 fvdl
652 1.1.1.1 fvdl dt = &procent[i];
653 1.1.1.1 fvdl
654 1.1.1.1 fvdl dp->d_reclen = UIO_MX;
655 1.1.1.1 fvdl dp->d_fileno = PROCFS_FILENO(pfs->pfs_pid, dt->d_pfstype);
656 1.1.1.1 fvdl dp->d_type = DT_REG;
657 1.1.1.1 fvdl dp->d_namlen = dt->d_namlen;
658 1.1.1.1 fvdl bcopy(dt->d_name, dp->d_name, sizeof(dt->d_name)-1);
659 1.1.1.1 fvdl error = uiomove((caddr_t) dp, UIO_MX, uio);
660 1.1.1.1 fvdl if (error)
661 1.1.1.1 fvdl break;
662 1.1.1.1 fvdl count += UIO_MX;
663 1.1.1.1 fvdl i++;
664 1.1.1.1 fvdl }
665 1.1.1.1 fvdl
666 1.1.1.1 fvdl break;
667 1.1.1.1 fvdl
668 1.1.1.1 fvdl }
669 1.1.1.1 fvdl
670 1.1.1.1 fvdl /*
671 1.1.1.1 fvdl * this is for the root of the procfs filesystem
672 1.1.1.1 fvdl * what is needed is a special entry for "curproc"
673 1.1.1.1 fvdl * followed by an entry for each process on allproc
674 1.1.1.1 fvdl #ifdef PROCFS_ZOMBIE
675 1.1.1.1 fvdl * and zombproc.
676 1.1 pk #endif
677 1.1.1.1 fvdl */
678 1.1 pk
679 1.1.1.1 fvdl case Proot: {
680 1.1.1.1 fvdl int pcnt;
681 1.1.1.1 fvdl #ifdef PROCFS_ZOMBIE
682 1.1.1.1 fvdl int doingzomb = 0;
683 1.1.1.1 fvdl #endif
684 1.1.1.1 fvdl volatile struct proc *p;
685 1.1.1.1 fvdl
686 1.1.1.1 fvdl p = allproc;
687 1.1.1.1 fvdl
688 1.1.1.1 fvdl #define PROCFS_XFILES 1 /* number of other entries, like "curproc" */
689 1.1.1.1 fvdl pcnt = PROCFS_XFILES;
690 1.1.1.1 fvdl
691 1.1.1.1 fvdl while (p && uio->uio_resid >= UIO_MX) {
692 1.1.1.1 fvdl bzero((char *) dp, UIO_MX);
693 1.1.1.1 fvdl dp->d_type = DT_DIR;
694 1.1.1.1 fvdl dp->d_reclen = UIO_MX;
695 1.1.1.1 fvdl
696 1.1.1.1 fvdl switch (i) {
697 1.1.1.1 fvdl case 0:
698 1.1.1.1 fvdl /* ship out entry for "curproc" */
699 1.1.1.1 fvdl dp->d_fileno = PROCFS_FILENO(PID_MAX+1, Pproc);
700 1.1.1.1 fvdl dp->d_namlen = sprintf(dp->d_name, "curproc");
701 1.1.1.1 fvdl break;
702 1.1.1.1 fvdl
703 1.1.1.1 fvdl default:
704 1.1.1.1 fvdl if (pcnt >= i) {
705 1.1.1.1 fvdl dp->d_fileno = PROCFS_FILENO(p->p_pid, Pproc);
706 1.1.1.1 fvdl dp->d_namlen = sprintf(dp->d_name, "%ld", (long) p->p_pid);
707 1.1.1.1 fvdl }
708 1.1.1.1 fvdl
709 1.1.1.1 fvdl p = p->p_next;
710 1.1.1.1 fvdl
711 1.1.1.1 fvdl #ifdef PROCFS_ZOMBIE
712 1.1.1.1 fvdl if (p == 0 && doingzomb == 0) {
713 1.1.1.1 fvdl doingzomb = 1;
714 1.1.1.1 fvdl p = zombproc;
715 1.1.1.1 fvdl }
716 1.1.1.1 fvdl #endif
717 1.1.1.1 fvdl
718 1.1.1.1 fvdl if (pcnt++ < i)
719 1.1.1.1 fvdl continue;
720 1.1.1.1 fvdl
721 1.1.1.1 fvdl break;
722 1.1 pk }
723 1.1.1.1 fvdl error = uiomove((caddr_t) dp, UIO_MX, uio);
724 1.1.1.1 fvdl if (error)
725 1.1.1.1 fvdl break;
726 1.1.1.1 fvdl count += UIO_MX;
727 1.1.1.1 fvdl i++;
728 1.1 pk }
729 1.1 pk
730 1.1.1.1 fvdl break;
731 1.1.1.1 fvdl
732 1.1.1.1 fvdl }
733 1.1.1.1 fvdl
734 1.1.1.1 fvdl default:
735 1.1.1.1 fvdl error = ENOTDIR;
736 1.1.1.1 fvdl break;
737 1.1 pk }
738 1.1 pk
739 1.1.1.1 fvdl uio->uio_offset = i * UIO_MX;
740 1.1 pk
741 1.1.1.1 fvdl return (error);
742 1.1 pk }
743 1.1 pk
744 1.1 pk /*
745 1.1.1.1 fvdl * convert decimal ascii to pid_t
746 1.1 pk */
747 1.1.1.1 fvdl static pid_t
748 1.1.1.1 fvdl atopid(b, len)
749 1.1.1.1 fvdl const char *b;
750 1.1.1.1 fvdl u_int len;
751 1.1 pk {
752 1.1.1.1 fvdl pid_t p = 0;
753 1.1 pk
754 1.1 pk while (len--) {
755 1.1.1.1 fvdl char c = *b++;
756 1.1 pk if (c < '0' || c > '9')
757 1.1.1.1 fvdl return (NO_PID);
758 1.1.1.1 fvdl p = 10 * p + (c - '0');
759 1.1.1.1 fvdl if (p > PID_MAX)
760 1.1.1.1 fvdl return (NO_PID);
761 1.1 pk }
762 1.1.1.1 fvdl
763 1.1.1.1 fvdl return (p);
764 1.1 pk }
765 1.1.1.1 fvdl
766 1.1.1.1 fvdl /*
767 1.1.1.1 fvdl * procfs vnode operations.
768 1.1.1.1 fvdl */
769 1.1.1.1 fvdl int (**procfs_vnodeop_p)();
770 1.1.1.1 fvdl struct vnodeopv_entry_desc procfs_vnodeop_entries[] = {
771 1.1.1.1 fvdl { &vop_default_desc, vn_default_error },
772 1.1.1.1 fvdl { &vop_lookup_desc, procfs_lookup }, /* lookup */
773 1.1.1.1 fvdl { &vop_create_desc, procfs_create }, /* create */
774 1.1.1.1 fvdl { &vop_mknod_desc, procfs_mknod }, /* mknod */
775 1.1.1.1 fvdl { &vop_open_desc, procfs_open }, /* open */
776 1.1.1.1 fvdl { &vop_close_desc, procfs_close }, /* close */
777 1.1.1.1 fvdl { &vop_access_desc, procfs_access }, /* access */
778 1.1.1.1 fvdl { &vop_getattr_desc, procfs_getattr }, /* getattr */
779 1.1.1.1 fvdl { &vop_setattr_desc, procfs_setattr }, /* setattr */
780 1.1.1.1 fvdl { &vop_read_desc, procfs_read }, /* read */
781 1.1.1.1 fvdl { &vop_write_desc, procfs_write }, /* write */
782 1.1.1.1 fvdl { &vop_ioctl_desc, procfs_ioctl }, /* ioctl */
783 1.1.1.1 fvdl { &vop_select_desc, procfs_select }, /* select */
784 1.1.1.1 fvdl { &vop_mmap_desc, procfs_mmap }, /* mmap */
785 1.1.1.1 fvdl { &vop_fsync_desc, procfs_fsync }, /* fsync */
786 1.1.1.1 fvdl { &vop_seek_desc, procfs_seek }, /* seek */
787 1.1.1.1 fvdl { &vop_remove_desc, procfs_remove }, /* remove */
788 1.1.1.1 fvdl { &vop_link_desc, procfs_link }, /* link */
789 1.1.1.1 fvdl { &vop_rename_desc, procfs_rename }, /* rename */
790 1.1.1.1 fvdl { &vop_mkdir_desc, procfs_mkdir }, /* mkdir */
791 1.1.1.1 fvdl { &vop_rmdir_desc, procfs_rmdir }, /* rmdir */
792 1.1.1.1 fvdl { &vop_symlink_desc, procfs_symlink }, /* symlink */
793 1.1.1.1 fvdl { &vop_readdir_desc, procfs_readdir }, /* readdir */
794 1.1.1.1 fvdl { &vop_readlink_desc, procfs_readlink }, /* readlink */
795 1.1.1.1 fvdl { &vop_abortop_desc, procfs_abortop }, /* abortop */
796 1.1.1.1 fvdl { &vop_inactive_desc, procfs_inactive }, /* inactive */
797 1.1.1.1 fvdl { &vop_reclaim_desc, procfs_reclaim }, /* reclaim */
798 1.1.1.1 fvdl { &vop_lock_desc, procfs_lock }, /* lock */
799 1.1.1.1 fvdl { &vop_unlock_desc, procfs_unlock }, /* unlock */
800 1.1.1.1 fvdl { &vop_bmap_desc, procfs_bmap }, /* bmap */
801 1.1.1.1 fvdl { &vop_strategy_desc, procfs_strategy }, /* strategy */
802 1.1.1.1 fvdl { &vop_print_desc, procfs_print }, /* print */
803 1.1.1.1 fvdl { &vop_islocked_desc, procfs_islocked }, /* islocked */
804 1.1.1.1 fvdl { &vop_pathconf_desc, procfs_pathconf }, /* pathconf */
805 1.1.1.1 fvdl { &vop_advlock_desc, procfs_advlock }, /* advlock */
806 1.1.1.1 fvdl { &vop_blkatoff_desc, procfs_blkatoff }, /* blkatoff */
807 1.1.1.1 fvdl { &vop_valloc_desc, procfs_valloc }, /* valloc */
808 1.1.1.1 fvdl { &vop_vfree_desc, procfs_vfree }, /* vfree */
809 1.1.1.1 fvdl { &vop_truncate_desc, procfs_truncate }, /* truncate */
810 1.1.1.1 fvdl { &vop_update_desc, procfs_update }, /* update */
811 1.1.1.1 fvdl { (struct vnodeop_desc*)NULL, (int(*)())NULL }
812 1.1.1.1 fvdl };
813 1.1.1.1 fvdl struct vnodeopv_desc procfs_vnodeop_opv_desc =
814 1.1.1.1 fvdl { &procfs_vnodeop_p, procfs_vnodeop_entries };
815