1 /* 2 * Copyright (c) 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_syscalls.c 8.13 (Berkeley) 4/15/94 39 * $FreeBSD$ 40 */ 41 42 /* For 4.3 integer FS ID compatibility */ 43 #include "opt_compat.h" 44 #include "opt_mac.h" 45 46 #include <sys/param.h> 47 #include <sys/systm.h> 48 #include <sys/bio.h> 49 #include <sys/buf.h> 50 #include <sys/sysent.h> 51 #include <sys/mac.h> 52 #include <sys/malloc.h> 53 #include <sys/mount.h> 54 #include <sys/mutex.h> 55 #include <sys/sysproto.h> 56 #include <sys/namei.h> 57 #include <sys/filedesc.h> 58 #include <sys/kernel.h> 59 #include <sys/fcntl.h> 60 #include <sys/file.h> 61 #include <sys/linker.h> 62 #include <sys/stat.h> 63 #include <sys/sx.h> 64 #include <sys/unistd.h> 65 #include <sys/vnode.h> 66 #include <sys/proc.h> 67 #include <sys/dirent.h> 68 #include <sys/extattr.h> 69 #include <sys/jail.h> 70 #include <sys/syscallsubr.h> 71 #include <sys/sysctl.h> 72 73 #include <machine/limits.h> 74 #include <machine/stdarg.h> 75 76 #include <vm/vm.h> 77 #include <vm/vm_object.h> 78 #include <vm/vm_page.h> 79 #include <vm/uma.h> 80 81 static int change_dir(struct nameidata *ndp, struct thread *td); 82 static int chroot_refuse_vdir_fds(struct filedesc *fdp); 83 static int getutimes(const struct timeval *, enum uio_seg, struct timespec *); 84 static int setfown(struct thread *td, struct vnode *, uid_t, gid_t); 85 static int setfmode(struct thread *td, struct vnode *, int); 86 static int setfflags(struct thread *td, struct vnode *, int); 87 static int setutimes(struct thread *td, struct vnode *, 88 const struct timespec *, int, int); 89 static int vn_access(struct vnode *vp, int user_flags, struct ucred *cred, 90 struct thread *td); 91 92 int (*union_dircheckp)(struct thread *td, struct vnode **, struct file *); 93 int (*softdep_fsync_hook)(struct vnode *); 94 95 /* 96 * The module initialization routine for POSIX asynchronous I/O will 97 * set this to the version of AIO that it implements. (Zero means 98 * that it is not implemented.) This value is used here by pathconf() 99 * and in kern_descrip.c by fpathconf(). 100 */ 101 int async_io_version; 102 103 /* 104 * Sync each mounted filesystem. 105 */ 106 #ifndef _SYS_SYSPROTO_H_ 107 struct sync_args { 108 int dummy; 109 }; 110 #endif 111 112 #ifdef DEBUG 113 static int syncprt = 0; 114 SYSCTL_INT(_debug, OID_AUTO, syncprt, CTLFLAG_RW, &syncprt, 0, ""); 115 #endif 116 117 /* ARGSUSED */ 118 int 119 sync(td, uap) 120 struct thread *td; 121 struct sync_args *uap; 122 { 123 struct mount *mp, *nmp; 124 int asyncflag; 125 126 mtx_lock(&mountlist_mtx); 127 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 128 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 129 nmp = TAILQ_NEXT(mp, mnt_list); 130 continue; 131 } 132 if ((mp->mnt_flag & MNT_RDONLY) == 0 && 133 vn_start_write(NULL, &mp, V_NOWAIT) == 0) { 134 asyncflag = mp->mnt_flag & MNT_ASYNC; 135 mp->mnt_flag &= ~MNT_ASYNC; 136 vfs_msync(mp, MNT_NOWAIT); 137 VFS_SYNC(mp, MNT_NOWAIT, 138 ((td != NULL) ? td->td_ucred : NOCRED), td); 139 mp->mnt_flag |= asyncflag; 140 vn_finished_write(mp); 141 } 142 mtx_lock(&mountlist_mtx); 143 nmp = TAILQ_NEXT(mp, mnt_list); 144 vfs_unbusy(mp, td); 145 } 146 mtx_unlock(&mountlist_mtx); 147 #if 0 148 /* 149 * XXX don't call vfs_bufstats() yet because that routine 150 * was not imported in the Lite2 merge. 151 */ 152 #ifdef DIAGNOSTIC 153 if (syncprt) 154 vfs_bufstats(); 155 #endif /* DIAGNOSTIC */ 156 #endif 157 return (0); 158 } 159 160 /* XXX PRISON: could be per prison flag */ 161 static int prison_quotas; 162 #if 0 163 SYSCTL_INT(_kern_prison, OID_AUTO, quotas, CTLFLAG_RW, &prison_quotas, 0, ""); 164 #endif 165 166 /* 167 * Change filesystem quotas. 168 */ 169 #ifndef _SYS_SYSPROTO_H_ 170 struct quotactl_args { 171 char *path; 172 int cmd; 173 int uid; 174 caddr_t arg; 175 }; 176 #endif 177 /* ARGSUSED */ 178 int 179 quotactl(td, uap) 180 struct thread *td; 181 register struct quotactl_args /* { 182 char *path; 183 int cmd; 184 int uid; 185 caddr_t arg; 186 } */ *uap; 187 { 188 struct mount *mp; 189 int error; 190 struct nameidata nd; 191 192 if (jailed(td->td_ucred) && !prison_quotas) 193 return (EPERM); 194 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 195 if ((error = namei(&nd)) != 0) 196 return (error); 197 NDFREE(&nd, NDF_ONLY_PNBUF); 198 error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH); 199 vrele(nd.ni_vp); 200 if (error) 201 return (error); 202 error = VFS_QUOTACTL(mp, uap->cmd, uap->uid, uap->arg, td); 203 vn_finished_write(mp); 204 return (error); 205 } 206 207 /* 208 * Get filesystem statistics. 209 */ 210 #ifndef _SYS_SYSPROTO_H_ 211 struct statfs_args { 212 char *path; 213 struct statfs *buf; 214 }; 215 #endif 216 /* ARGSUSED */ 217 int 218 statfs(td, uap) 219 struct thread *td; 220 register struct statfs_args /* { 221 char *path; 222 struct statfs *buf; 223 } */ *uap; 224 { 225 register struct mount *mp; 226 register struct statfs *sp; 227 int error; 228 struct nameidata nd; 229 struct statfs sb; 230 231 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 232 if ((error = namei(&nd)) != 0) 233 return (error); 234 mp = nd.ni_vp->v_mount; 235 sp = &mp->mnt_stat; 236 NDFREE(&nd, NDF_ONLY_PNBUF); 237 vrele(nd.ni_vp); 238 #ifdef MAC 239 error = mac_check_mount_stat(td->td_ucred, mp); 240 if (error) 241 return (error); 242 #endif 243 error = VFS_STATFS(mp, sp, td); 244 if (error) 245 return (error); 246 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 247 if (suser(td)) { 248 bcopy(sp, &sb, sizeof(sb)); 249 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 250 sp = &sb; 251 } 252 return (copyout(sp, uap->buf, sizeof(*sp))); 253 } 254 255 /* 256 * Get filesystem statistics. 257 */ 258 #ifndef _SYS_SYSPROTO_H_ 259 struct fstatfs_args { 260 int fd; 261 struct statfs *buf; 262 }; 263 #endif 264 /* ARGSUSED */ 265 int 266 fstatfs(td, uap) 267 struct thread *td; 268 register struct fstatfs_args /* { 269 int fd; 270 struct statfs *buf; 271 } */ *uap; 272 { 273 struct file *fp; 274 struct mount *mp; 275 register struct statfs *sp; 276 int error; 277 struct statfs sb; 278 279 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 280 return (error); 281 mp = ((struct vnode *)fp->f_data)->v_mount; 282 fdrop(fp, td); 283 if (mp == NULL) 284 return (EBADF); 285 #ifdef MAC 286 error = mac_check_mount_stat(td->td_ucred, mp); 287 if (error) 288 return (error); 289 #endif 290 sp = &mp->mnt_stat; 291 error = VFS_STATFS(mp, sp, td); 292 if (error) 293 return (error); 294 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 295 if (suser(td)) { 296 bcopy(sp, &sb, sizeof(sb)); 297 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 298 sp = &sb; 299 } 300 return (copyout(sp, uap->buf, sizeof(*sp))); 301 } 302 303 /* 304 * Get statistics on all filesystems. 305 */ 306 #ifndef _SYS_SYSPROTO_H_ 307 struct getfsstat_args { 308 struct statfs *buf; 309 long bufsize; 310 int flags; 311 }; 312 #endif 313 int 314 getfsstat(td, uap) 315 struct thread *td; 316 register struct getfsstat_args /* { 317 struct statfs *buf; 318 long bufsize; 319 int flags; 320 } */ *uap; 321 { 322 register struct mount *mp, *nmp; 323 register struct statfs *sp; 324 caddr_t sfsp; 325 long count, maxcount, error; 326 327 maxcount = uap->bufsize / sizeof(struct statfs); 328 sfsp = (caddr_t)uap->buf; 329 count = 0; 330 mtx_lock(&mountlist_mtx); 331 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 332 #ifdef MAC 333 if (mac_check_mount_stat(td->td_ucred, mp) != 0) { 334 nmp = TAILQ_NEXT(mp, mnt_list); 335 continue; 336 } 337 #endif 338 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 339 nmp = TAILQ_NEXT(mp, mnt_list); 340 continue; 341 } 342 if (sfsp && count < maxcount) { 343 sp = &mp->mnt_stat; 344 /* 345 * If MNT_NOWAIT or MNT_LAZY is specified, do not 346 * refresh the fsstat cache. MNT_NOWAIT or MNT_LAZY 347 * overrides MNT_WAIT. 348 */ 349 if (((uap->flags & (MNT_LAZY|MNT_NOWAIT)) == 0 || 350 (uap->flags & MNT_WAIT)) && 351 (error = VFS_STATFS(mp, sp, td))) { 352 mtx_lock(&mountlist_mtx); 353 nmp = TAILQ_NEXT(mp, mnt_list); 354 vfs_unbusy(mp, td); 355 continue; 356 } 357 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 358 error = copyout(sp, sfsp, sizeof(*sp)); 359 if (error) { 360 vfs_unbusy(mp, td); 361 return (error); 362 } 363 sfsp += sizeof(*sp); 364 } 365 count++; 366 mtx_lock(&mountlist_mtx); 367 nmp = TAILQ_NEXT(mp, mnt_list); 368 vfs_unbusy(mp, td); 369 } 370 mtx_unlock(&mountlist_mtx); 371 if (sfsp && count > maxcount) 372 td->td_retval[0] = maxcount; 373 else 374 td->td_retval[0] = count; 375 return (0); 376 } 377 378 /* 379 * Change current working directory to a given file descriptor. 380 */ 381 #ifndef _SYS_SYSPROTO_H_ 382 struct fchdir_args { 383 int fd; 384 }; 385 #endif 386 /* ARGSUSED */ 387 int 388 fchdir(td, uap) 389 struct thread *td; 390 struct fchdir_args /* { 391 int fd; 392 } */ *uap; 393 { 394 register struct filedesc *fdp = td->td_proc->p_fd; 395 struct vnode *vp, *tdp, *vpold; 396 struct mount *mp; 397 struct file *fp; 398 int error; 399 400 if ((error = getvnode(fdp, uap->fd, &fp)) != 0) 401 return (error); 402 vp = fp->f_data; 403 VREF(vp); 404 fdrop(fp, td); 405 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 406 if (vp->v_type != VDIR) 407 error = ENOTDIR; 408 #ifdef MAC 409 else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) { 410 } 411 #endif 412 else 413 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 414 while (!error && (mp = vp->v_mountedhere) != NULL) { 415 if (vfs_busy(mp, 0, 0, td)) 416 continue; 417 error = VFS_ROOT(mp, &tdp); 418 vfs_unbusy(mp, td); 419 if (error) 420 break; 421 vput(vp); 422 vp = tdp; 423 } 424 if (error) { 425 vput(vp); 426 return (error); 427 } 428 VOP_UNLOCK(vp, 0, td); 429 FILEDESC_LOCK(fdp); 430 vpold = fdp->fd_cdir; 431 fdp->fd_cdir = vp; 432 FILEDESC_UNLOCK(fdp); 433 vrele(vpold); 434 return (0); 435 } 436 437 /* 438 * Change current working directory (``.''). 439 */ 440 #ifndef _SYS_SYSPROTO_H_ 441 struct chdir_args { 442 char *path; 443 }; 444 #endif 445 /* ARGSUSED */ 446 int 447 chdir(td, uap) 448 struct thread *td; 449 struct chdir_args /* { 450 char *path; 451 } */ *uap; 452 { 453 454 return (kern_chdir(td, uap->path, UIO_USERSPACE)); 455 } 456 457 int 458 kern_chdir(struct thread *td, char *path, enum uio_seg pathseg) 459 { 460 register struct filedesc *fdp = td->td_proc->p_fd; 461 int error; 462 struct nameidata nd; 463 struct vnode *vp; 464 465 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, pathseg, path, td); 466 if ((error = change_dir(&nd, td)) != 0) 467 return (error); 468 NDFREE(&nd, NDF_ONLY_PNBUF); 469 FILEDESC_LOCK(fdp); 470 vp = fdp->fd_cdir; 471 fdp->fd_cdir = nd.ni_vp; 472 FILEDESC_UNLOCK(fdp); 473 vrele(vp); 474 return (0); 475 } 476 477 /* 478 * Helper function for raised chroot(2) security function: Refuse if 479 * any filedescriptors are open directories. 480 */ 481 static int 482 chroot_refuse_vdir_fds(fdp) 483 struct filedesc *fdp; 484 { 485 struct vnode *vp; 486 struct file *fp; 487 int fd; 488 489 FILEDESC_LOCK_ASSERT(fdp, MA_OWNED); 490 for (fd = 0; fd < fdp->fd_nfiles ; fd++) { 491 fp = fget_locked(fdp, fd); 492 if (fp == NULL) 493 continue; 494 if (fp->f_type == DTYPE_VNODE) { 495 vp = fp->f_data; 496 if (vp->v_type == VDIR) 497 return (EPERM); 498 } 499 } 500 return (0); 501 } 502 503 /* 504 * This sysctl determines if we will allow a process to chroot(2) if it 505 * has a directory open: 506 * 0: disallowed for all processes. 507 * 1: allowed for processes that were not already chroot(2)'ed. 508 * 2: allowed for all processes. 509 */ 510 511 static int chroot_allow_open_directories = 1; 512 513 SYSCTL_INT(_kern, OID_AUTO, chroot_allow_open_directories, CTLFLAG_RW, 514 &chroot_allow_open_directories, 0, ""); 515 516 /* 517 * Change notion of root (``/'') directory. 518 */ 519 #ifndef _SYS_SYSPROTO_H_ 520 struct chroot_args { 521 char *path; 522 }; 523 #endif 524 /* ARGSUSED */ 525 int 526 chroot(td, uap) 527 struct thread *td; 528 struct chroot_args /* { 529 char *path; 530 } */ *uap; 531 { 532 register struct filedesc *fdp = td->td_proc->p_fd; 533 int error; 534 struct nameidata nd; 535 struct vnode *vp; 536 537 error = suser_cred(td->td_ucred, PRISON_ROOT); 538 if (error) 539 return (error); 540 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->path, td); 541 mtx_lock(&Giant); 542 if ((error = change_dir(&nd, td)) != 0) 543 goto error; 544 #ifdef MAC 545 if ((error = mac_check_vnode_chroot(td->td_ucred, nd.ni_vp))) 546 goto error; 547 #endif 548 FILEDESC_LOCK(fdp); 549 if (chroot_allow_open_directories == 0 || 550 (chroot_allow_open_directories == 1 && fdp->fd_rdir != rootvnode)) { 551 error = chroot_refuse_vdir_fds(fdp); 552 if (error) 553 goto error_unlock; 554 } 555 vp = fdp->fd_rdir; 556 fdp->fd_rdir = nd.ni_vp; 557 if (!fdp->fd_jdir) { 558 fdp->fd_jdir = nd.ni_vp; 559 VREF(fdp->fd_jdir); 560 } 561 FILEDESC_UNLOCK(fdp); 562 NDFREE(&nd, NDF_ONLY_PNBUF); 563 vrele(vp); 564 mtx_unlock(&Giant); 565 return (0); 566 error_unlock: 567 FILEDESC_UNLOCK(fdp); 568 error: 569 mtx_unlock(&Giant); 570 NDFREE(&nd, 0); 571 return (error); 572 } 573 574 /* 575 * Common routine for chroot and chdir. 576 */ 577 static int 578 change_dir(ndp, td) 579 register struct nameidata *ndp; 580 struct thread *td; 581 { 582 struct vnode *vp; 583 int error; 584 585 error = namei(ndp); 586 if (error) 587 return (error); 588 vp = ndp->ni_vp; 589 if (vp->v_type != VDIR) 590 error = ENOTDIR; 591 #ifdef MAC 592 else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) { 593 } 594 #endif 595 else 596 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 597 if (error) 598 vput(vp); 599 else 600 VOP_UNLOCK(vp, 0, td); 601 return (error); 602 } 603 604 /* 605 * Check permissions, allocate an open file structure, 606 * and call the device open routine if any. 607 */ 608 #ifndef _SYS_SYSPROTO_H_ 609 struct open_args { 610 char *path; 611 int flags; 612 int mode; 613 }; 614 #endif 615 int 616 open(td, uap) 617 struct thread *td; 618 register struct open_args /* { 619 char *path; 620 int flags; 621 int mode; 622 } */ *uap; 623 { 624 625 return (kern_open(td, uap->path, UIO_USERSPACE, uap->flags, uap->mode)); 626 } 627 628 int 629 kern_open(struct thread *td, char *path, enum uio_seg pathseg, int flags, 630 int mode) 631 { 632 struct proc *p = td->td_proc; 633 struct filedesc *fdp = p->p_fd; 634 struct file *fp; 635 struct vnode *vp; 636 struct vattr vat; 637 struct mount *mp; 638 int cmode, oflags; 639 struct file *nfp; 640 int type, indx, error; 641 struct flock lf; 642 struct nameidata nd; 643 644 if ((flags & O_ACCMODE) == O_ACCMODE) 645 return (EINVAL); 646 oflags = flags; 647 flags = FFLAGS(flags); 648 error = falloc(td, &nfp, &indx); 649 if (error) 650 return (error); 651 fp = nfp; 652 FILEDESC_LOCK(fdp); 653 cmode = ((mode &~ fdp->fd_cmask) & ALLPERMS) &~ S_ISTXT; 654 FILEDESC_UNLOCK(fdp); 655 NDINIT(&nd, LOOKUP, FOLLOW, pathseg, path, td); 656 td->td_dupfd = -indx - 1; /* XXX check for fdopen */ 657 /* 658 * Bump the ref count to prevent another process from closing 659 * the descriptor while we are blocked in vn_open() 660 */ 661 fhold(fp); 662 error = vn_open(&nd, &flags, cmode); 663 if (error) { 664 /* 665 * release our own reference 666 */ 667 fdrop(fp, td); 668 669 /* 670 * handle special fdopen() case. bleh. dupfdopen() is 671 * responsible for dropping the old contents of ofiles[indx] 672 * if it succeeds. 673 */ 674 if ((error == ENODEV || error == ENXIO) && 675 td->td_dupfd >= 0 && /* XXX from fdopen */ 676 (error = 677 dupfdopen(td, fdp, indx, td->td_dupfd, flags, error)) == 0) { 678 td->td_retval[0] = indx; 679 return (0); 680 } 681 /* 682 * Clean up the descriptor, but only if another thread hadn't 683 * replaced or closed it. 684 */ 685 FILEDESC_LOCK(fdp); 686 if (fdp->fd_ofiles[indx] == fp) { 687 fdp->fd_ofiles[indx] = NULL; 688 FILEDESC_UNLOCK(fdp); 689 fdrop(fp, td); 690 } else 691 FILEDESC_UNLOCK(fdp); 692 693 if (error == ERESTART) 694 error = EINTR; 695 return (error); 696 } 697 td->td_dupfd = 0; 698 NDFREE(&nd, NDF_ONLY_PNBUF); 699 vp = nd.ni_vp; 700 701 /* 702 * There should be 2 references on the file, one from the descriptor 703 * table, and one for us. 704 * 705 * Handle the case where someone closed the file (via its file 706 * descriptor) while we were blocked. The end result should look 707 * like opening the file succeeded but it was immediately closed. 708 */ 709 FILEDESC_LOCK(fdp); 710 FILE_LOCK(fp); 711 if (fp->f_count == 1) { 712 KASSERT(fdp->fd_ofiles[indx] != fp, 713 ("Open file descriptor lost all refs")); 714 FILEDESC_UNLOCK(fdp); 715 FILE_UNLOCK(fp); 716 VOP_UNLOCK(vp, 0, td); 717 vn_close(vp, flags & FMASK, fp->f_cred, td); 718 fdrop(fp, td); 719 td->td_retval[0] = indx; 720 return 0; 721 } 722 723 /* assert that vn_open created a backing object if one is needed */ 724 KASSERT(!vn_canvmio(vp) || VOP_GETVOBJECT(vp, NULL) == 0, 725 ("open: vmio vnode has no backing object after vn_open")); 726 727 fp->f_data = vp; 728 fp->f_flag = flags & FMASK; 729 fp->f_ops = &vnops; 730 fp->f_type = (vp->v_type == VFIFO ? DTYPE_FIFO : DTYPE_VNODE); 731 FILEDESC_UNLOCK(fdp); 732 FILE_UNLOCK(fp); 733 VOP_UNLOCK(vp, 0, td); 734 if (flags & (O_EXLOCK | O_SHLOCK)) { 735 lf.l_whence = SEEK_SET; 736 lf.l_start = 0; 737 lf.l_len = 0; 738 if (flags & O_EXLOCK) 739 lf.l_type = F_WRLCK; 740 else 741 lf.l_type = F_RDLCK; 742 type = F_FLOCK; 743 if ((flags & FNONBLOCK) == 0) 744 type |= F_WAIT; 745 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 746 type)) != 0) 747 goto bad; 748 fp->f_flag |= FHASLOCK; 749 } 750 if (flags & O_TRUNC) { 751 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 752 goto bad; 753 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 754 VATTR_NULL(&vat); 755 vat.va_size = 0; 756 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 757 #ifdef MAC 758 error = mac_check_vnode_write(td->td_ucred, fp->f_cred, vp); 759 if (error == 0) 760 #endif 761 error = VOP_SETATTR(vp, &vat, td->td_ucred, td); 762 VOP_UNLOCK(vp, 0, td); 763 vn_finished_write(mp); 764 if (error) 765 goto bad; 766 } 767 /* 768 * Release our private reference, leaving the one associated with 769 * the descriptor table intact. 770 */ 771 fdrop(fp, td); 772 td->td_retval[0] = indx; 773 return (0); 774 bad: 775 FILEDESC_LOCK(fdp); 776 if (fdp->fd_ofiles[indx] == fp) { 777 fdp->fd_ofiles[indx] = NULL; 778 FILEDESC_UNLOCK(fdp); 779 fdrop(fp, td); 780 } else 781 FILEDESC_UNLOCK(fdp); 782 fdrop(fp, td); 783 return (error); 784 } 785 786 #ifdef COMPAT_43 787 /* 788 * Create a file. 789 */ 790 #ifndef _SYS_SYSPROTO_H_ 791 struct ocreat_args { 792 char *path; 793 int mode; 794 }; 795 #endif 796 int 797 ocreat(td, uap) 798 struct thread *td; 799 register struct ocreat_args /* { 800 char *path; 801 int mode; 802 } */ *uap; 803 { 804 struct open_args /* { 805 char *path; 806 int flags; 807 int mode; 808 } */ nuap; 809 810 nuap.path = uap->path; 811 nuap.mode = uap->mode; 812 nuap.flags = O_WRONLY | O_CREAT | O_TRUNC; 813 return (open(td, &nuap)); 814 } 815 #endif /* COMPAT_43 */ 816 817 /* 818 * Create a special file. 819 */ 820 #ifndef _SYS_SYSPROTO_H_ 821 struct mknod_args { 822 char *path; 823 int mode; 824 int dev; 825 }; 826 #endif 827 /* ARGSUSED */ 828 int 829 mknod(td, uap) 830 struct thread *td; 831 register struct mknod_args /* { 832 char *path; 833 int mode; 834 int dev; 835 } */ *uap; 836 { 837 838 return (kern_mknod(td, uap->path, UIO_USERSPACE, uap->mode, uap->dev)); 839 } 840 841 int 842 kern_mknod(struct thread *td, char *path, enum uio_seg pathseg, int mode, 843 int dev) 844 { 845 struct vnode *vp; 846 struct mount *mp; 847 struct vattr vattr; 848 int error; 849 int whiteout = 0; 850 struct nameidata nd; 851 852 switch (mode & S_IFMT) { 853 case S_IFCHR: 854 case S_IFBLK: 855 error = suser(td); 856 break; 857 default: 858 error = suser_cred(td->td_ucred, PRISON_ROOT); 859 break; 860 } 861 if (error) 862 return (error); 863 restart: 864 bwillwrite(); 865 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, pathseg, path, td); 866 if ((error = namei(&nd)) != 0) 867 return (error); 868 vp = nd.ni_vp; 869 if (vp != NULL) { 870 vrele(vp); 871 error = EEXIST; 872 } else { 873 VATTR_NULL(&vattr); 874 FILEDESC_LOCK(td->td_proc->p_fd); 875 vattr.va_mode = (mode & ALLPERMS) & 876 ~td->td_proc->p_fd->fd_cmask; 877 FILEDESC_UNLOCK(td->td_proc->p_fd); 878 vattr.va_rdev = dev; 879 whiteout = 0; 880 881 switch (mode & S_IFMT) { 882 case S_IFMT: /* used by badsect to flag bad sectors */ 883 vattr.va_type = VBAD; 884 break; 885 case S_IFCHR: 886 vattr.va_type = VCHR; 887 break; 888 case S_IFBLK: 889 vattr.va_type = VBLK; 890 break; 891 case S_IFWHT: 892 whiteout = 1; 893 break; 894 default: 895 error = EINVAL; 896 break; 897 } 898 } 899 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 900 NDFREE(&nd, NDF_ONLY_PNBUF); 901 vput(nd.ni_dvp); 902 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 903 return (error); 904 goto restart; 905 } 906 #ifdef MAC 907 if (error == 0 && !whiteout) 908 error = mac_check_vnode_create(td->td_ucred, nd.ni_dvp, 909 &nd.ni_cnd, &vattr); 910 #endif 911 if (!error) { 912 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 913 if (whiteout) 914 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, CREATE); 915 else { 916 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, 917 &nd.ni_cnd, &vattr); 918 if (error == 0) 919 vput(nd.ni_vp); 920 } 921 } 922 NDFREE(&nd, NDF_ONLY_PNBUF); 923 vput(nd.ni_dvp); 924 vn_finished_write(mp); 925 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mknod"); 926 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mknod"); 927 return (error); 928 } 929 930 /* 931 * Create a named pipe. 932 */ 933 #ifndef _SYS_SYSPROTO_H_ 934 struct mkfifo_args { 935 char *path; 936 int mode; 937 }; 938 #endif 939 /* ARGSUSED */ 940 int 941 mkfifo(td, uap) 942 struct thread *td; 943 register struct mkfifo_args /* { 944 char *path; 945 int mode; 946 } */ *uap; 947 { 948 949 return (kern_mkfifo(td, uap->path, UIO_USERSPACE, uap->mode)); 950 } 951 952 int 953 kern_mkfifo(struct thread *td, char *path, enum uio_seg pathseg, int mode) 954 { 955 struct mount *mp; 956 struct vattr vattr; 957 int error; 958 struct nameidata nd; 959 960 restart: 961 bwillwrite(); 962 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, pathseg, path, td); 963 if ((error = namei(&nd)) != 0) 964 return (error); 965 if (nd.ni_vp != NULL) { 966 NDFREE(&nd, NDF_ONLY_PNBUF); 967 vrele(nd.ni_vp); 968 vput(nd.ni_dvp); 969 return (EEXIST); 970 } 971 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 972 NDFREE(&nd, NDF_ONLY_PNBUF); 973 vput(nd.ni_dvp); 974 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 975 return (error); 976 goto restart; 977 } 978 VATTR_NULL(&vattr); 979 vattr.va_type = VFIFO; 980 FILEDESC_LOCK(td->td_proc->p_fd); 981 vattr.va_mode = (mode & ALLPERMS) & ~td->td_proc->p_fd->fd_cmask; 982 FILEDESC_UNLOCK(td->td_proc->p_fd); 983 #ifdef MAC 984 error = mac_check_vnode_create(td->td_ucred, nd.ni_dvp, &nd.ni_cnd, 985 &vattr); 986 if (error) 987 goto out; 988 #endif 989 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 990 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 991 if (error == 0) 992 vput(nd.ni_vp); 993 #ifdef MAC 994 out: 995 #endif 996 NDFREE(&nd, NDF_ONLY_PNBUF); 997 vput(nd.ni_dvp); 998 vn_finished_write(mp); 999 return (error); 1000 } 1001 1002 /* 1003 * Make a hard file link. 1004 */ 1005 #ifndef _SYS_SYSPROTO_H_ 1006 struct link_args { 1007 char *path; 1008 char *link; 1009 }; 1010 #endif 1011 /* ARGSUSED */ 1012 int 1013 link(td, uap) 1014 struct thread *td; 1015 register struct link_args /* { 1016 char *path; 1017 char *link; 1018 } */ *uap; 1019 { 1020 1021 return (kern_link(td, uap->path, uap->link, UIO_USERSPACE)); 1022 } 1023 1024 int 1025 kern_link(struct thread *td, char *path, char *link, enum uio_seg segflg) 1026 { 1027 struct vnode *vp; 1028 struct mount *mp; 1029 struct nameidata nd; 1030 int error; 1031 1032 bwillwrite(); 1033 NDINIT(&nd, LOOKUP, FOLLOW|NOOBJ, segflg, path, td); 1034 if ((error = namei(&nd)) != 0) 1035 return (error); 1036 NDFREE(&nd, NDF_ONLY_PNBUF); 1037 vp = nd.ni_vp; 1038 if (vp->v_type == VDIR) { 1039 vrele(vp); 1040 return (EPERM); /* POSIX */ 1041 } 1042 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 1043 vrele(vp); 1044 return (error); 1045 } 1046 NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, segflg, link, td); 1047 if ((error = namei(&nd)) == 0) { 1048 if (nd.ni_vp != NULL) { 1049 vrele(nd.ni_vp); 1050 error = EEXIST; 1051 } else if ((error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td)) 1052 == 0) { 1053 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1054 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1055 #ifdef MAC 1056 error = mac_check_vnode_link(td->td_ucred, nd.ni_dvp, 1057 vp, &nd.ni_cnd); 1058 if (error == 0) 1059 #endif 1060 error = VOP_LINK(nd.ni_dvp, vp, &nd.ni_cnd); 1061 VOP_UNLOCK(vp, 0, td); 1062 } 1063 NDFREE(&nd, NDF_ONLY_PNBUF); 1064 vput(nd.ni_dvp); 1065 } 1066 vrele(vp); 1067 vn_finished_write(mp); 1068 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "link"); 1069 ASSERT_VOP_UNLOCKED(nd.ni_vp, "link"); 1070 return (error); 1071 } 1072 1073 /* 1074 * Make a symbolic link. 1075 */ 1076 #ifndef _SYS_SYSPROTO_H_ 1077 struct symlink_args { 1078 char *path; 1079 char *link; 1080 }; 1081 #endif 1082 /* ARGSUSED */ 1083 int 1084 symlink(td, uap) 1085 struct thread *td; 1086 register struct symlink_args /* { 1087 char *path; 1088 char *link; 1089 } */ *uap; 1090 { 1091 1092 return (kern_symlink(td, uap->path, uap->link, UIO_USERSPACE)); 1093 } 1094 1095 int 1096 kern_symlink(struct thread *td, char *path, char *link, enum uio_seg segflg) 1097 { 1098 struct mount *mp; 1099 struct vattr vattr; 1100 char *syspath; 1101 int error; 1102 struct nameidata nd; 1103 1104 if (segflg == UIO_SYSSPACE) { 1105 syspath = path; 1106 } else { 1107 syspath = uma_zalloc(namei_zone, 0); 1108 if ((error = copyinstr(path, syspath, MAXPATHLEN, NULL)) != 0) 1109 goto out; 1110 } 1111 restart: 1112 bwillwrite(); 1113 NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, segflg, link, td); 1114 if ((error = namei(&nd)) != 0) 1115 goto out; 1116 if (nd.ni_vp) { 1117 NDFREE(&nd, NDF_ONLY_PNBUF); 1118 vrele(nd.ni_vp); 1119 vput(nd.ni_dvp); 1120 error = EEXIST; 1121 goto out; 1122 } 1123 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1124 NDFREE(&nd, NDF_ONLY_PNBUF); 1125 vput(nd.ni_dvp); 1126 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1127 return (error); 1128 goto restart; 1129 } 1130 VATTR_NULL(&vattr); 1131 FILEDESC_LOCK(td->td_proc->p_fd); 1132 vattr.va_mode = ACCESSPERMS &~ td->td_proc->p_fd->fd_cmask; 1133 FILEDESC_UNLOCK(td->td_proc->p_fd); 1134 #ifdef MAC 1135 vattr.va_type = VLNK; 1136 error = mac_check_vnode_create(td->td_ucred, nd.ni_dvp, &nd.ni_cnd, 1137 &vattr); 1138 if (error) 1139 goto out2; 1140 #endif 1141 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1142 error = VOP_SYMLINK(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr, syspath); 1143 if (error == 0) 1144 vput(nd.ni_vp); 1145 #ifdef MAC 1146 out2: 1147 #endif 1148 NDFREE(&nd, NDF_ONLY_PNBUF); 1149 vput(nd.ni_dvp); 1150 vn_finished_write(mp); 1151 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "symlink"); 1152 ASSERT_VOP_UNLOCKED(nd.ni_vp, "symlink"); 1153 out: 1154 if (segflg != UIO_SYSSPACE) 1155 uma_zfree(namei_zone, syspath); 1156 return (error); 1157 } 1158 1159 /* 1160 * Delete a whiteout from the filesystem. 1161 */ 1162 /* ARGSUSED */ 1163 int 1164 undelete(td, uap) 1165 struct thread *td; 1166 register struct undelete_args /* { 1167 char *path; 1168 } */ *uap; 1169 { 1170 int error; 1171 struct mount *mp; 1172 struct nameidata nd; 1173 1174 restart: 1175 bwillwrite(); 1176 NDINIT(&nd, DELETE, LOCKPARENT|DOWHITEOUT, UIO_USERSPACE, 1177 uap->path, td); 1178 error = namei(&nd); 1179 if (error) 1180 return (error); 1181 1182 if (nd.ni_vp != NULLVP || !(nd.ni_cnd.cn_flags & ISWHITEOUT)) { 1183 NDFREE(&nd, NDF_ONLY_PNBUF); 1184 if (nd.ni_vp) 1185 vrele(nd.ni_vp); 1186 vput(nd.ni_dvp); 1187 return (EEXIST); 1188 } 1189 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1190 NDFREE(&nd, NDF_ONLY_PNBUF); 1191 vput(nd.ni_dvp); 1192 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1193 return (error); 1194 goto restart; 1195 } 1196 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1197 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, DELETE); 1198 NDFREE(&nd, NDF_ONLY_PNBUF); 1199 vput(nd.ni_dvp); 1200 vn_finished_write(mp); 1201 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "undelete"); 1202 ASSERT_VOP_UNLOCKED(nd.ni_vp, "undelete"); 1203 return (error); 1204 } 1205 1206 /* 1207 * Delete a name from the filesystem. 1208 */ 1209 #ifndef _SYS_SYSPROTO_H_ 1210 struct unlink_args { 1211 char *path; 1212 }; 1213 #endif 1214 /* ARGSUSED */ 1215 int 1216 unlink(td, uap) 1217 struct thread *td; 1218 struct unlink_args /* { 1219 char *path; 1220 } */ *uap; 1221 { 1222 1223 return (kern_unlink(td, uap->path, UIO_USERSPACE)); 1224 } 1225 1226 int 1227 kern_unlink(struct thread *td, char *path, enum uio_seg pathseg) 1228 { 1229 struct mount *mp; 1230 struct vnode *vp; 1231 int error; 1232 struct nameidata nd; 1233 1234 restart: 1235 bwillwrite(); 1236 NDINIT(&nd, DELETE, LOCKPARENT|LOCKLEAF, pathseg, path, td); 1237 if ((error = namei(&nd)) != 0) 1238 return (error); 1239 vp = nd.ni_vp; 1240 if (vp->v_type == VDIR) 1241 error = EPERM; /* POSIX */ 1242 else { 1243 /* 1244 * The root of a mounted filesystem cannot be deleted. 1245 * 1246 * XXX: can this only be a VDIR case? 1247 */ 1248 if (vp->v_vflag & VV_ROOT) 1249 error = EBUSY; 1250 } 1251 if (error == 0) { 1252 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1253 NDFREE(&nd, NDF_ONLY_PNBUF); 1254 if (vp == nd.ni_dvp) 1255 vrele(vp); 1256 else 1257 vput(vp); 1258 vput(nd.ni_dvp); 1259 if ((error = vn_start_write(NULL, &mp, 1260 V_XSLEEP | PCATCH)) != 0) 1261 return (error); 1262 goto restart; 1263 } 1264 #ifdef MAC 1265 error = mac_check_vnode_delete(td->td_ucred, nd.ni_dvp, vp, 1266 &nd.ni_cnd); 1267 if (error) 1268 goto out; 1269 #endif 1270 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1271 error = VOP_REMOVE(nd.ni_dvp, vp, &nd.ni_cnd); 1272 #ifdef MAC 1273 out: 1274 #endif 1275 vn_finished_write(mp); 1276 } 1277 NDFREE(&nd, NDF_ONLY_PNBUF); 1278 if (vp == nd.ni_dvp) 1279 vrele(vp); 1280 else 1281 vput(vp); 1282 vput(nd.ni_dvp); 1283 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "unlink"); 1284 ASSERT_VOP_UNLOCKED(nd.ni_vp, "unlink"); 1285 return (error); 1286 } 1287 1288 /* 1289 * Reposition read/write file offset. 1290 */ 1291 #ifndef _SYS_SYSPROTO_H_ 1292 struct lseek_args { 1293 int fd; 1294 int pad; 1295 off_t offset; 1296 int whence; 1297 }; 1298 #endif 1299 int 1300 lseek(td, uap) 1301 struct thread *td; 1302 register struct lseek_args /* { 1303 int fd; 1304 int pad; 1305 off_t offset; 1306 int whence; 1307 } */ *uap; 1308 { 1309 struct ucred *cred = td->td_ucred; 1310 struct file *fp; 1311 struct vnode *vp; 1312 struct vattr vattr; 1313 off_t offset; 1314 int error, noneg; 1315 1316 if ((error = fget(td, uap->fd, &fp)) != 0) 1317 return (error); 1318 if (fp->f_type != DTYPE_VNODE) { 1319 fdrop(fp, td); 1320 return (ESPIPE); 1321 } 1322 vp = fp->f_data; 1323 noneg = (vp->v_type != VCHR); 1324 offset = uap->offset; 1325 switch (uap->whence) { 1326 case L_INCR: 1327 if (noneg && 1328 (fp->f_offset < 0 || 1329 (offset > 0 && fp->f_offset > OFF_MAX - offset))) { 1330 error = EOVERFLOW; 1331 break; 1332 } 1333 offset += fp->f_offset; 1334 break; 1335 case L_XTND: 1336 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1337 error = VOP_GETATTR(vp, &vattr, cred, td); 1338 VOP_UNLOCK(vp, 0, td); 1339 if (error) 1340 break; 1341 if (noneg && 1342 (vattr.va_size > OFF_MAX || 1343 (offset > 0 && vattr.va_size > OFF_MAX - offset))) { 1344 error = EOVERFLOW; 1345 break; 1346 } 1347 offset += vattr.va_size; 1348 break; 1349 case L_SET: 1350 break; 1351 default: 1352 error = EINVAL; 1353 } 1354 if (error == 0 && noneg && offset < 0) 1355 error = EINVAL; 1356 if (error != 0) { 1357 fdrop(fp, td); 1358 return (error); 1359 } 1360 fp->f_offset = offset; 1361 *(off_t *)(td->td_retval) = fp->f_offset; 1362 fdrop(fp, td); 1363 return (0); 1364 } 1365 1366 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1367 /* 1368 * Reposition read/write file offset. 1369 */ 1370 #ifndef _SYS_SYSPROTO_H_ 1371 struct olseek_args { 1372 int fd; 1373 long offset; 1374 int whence; 1375 }; 1376 #endif 1377 int 1378 olseek(td, uap) 1379 struct thread *td; 1380 register struct olseek_args /* { 1381 int fd; 1382 long offset; 1383 int whence; 1384 } */ *uap; 1385 { 1386 struct lseek_args /* { 1387 int fd; 1388 int pad; 1389 off_t offset; 1390 int whence; 1391 } */ nuap; 1392 int error; 1393 1394 nuap.fd = uap->fd; 1395 nuap.offset = uap->offset; 1396 nuap.whence = uap->whence; 1397 error = lseek(td, &nuap); 1398 return (error); 1399 } 1400 #endif /* COMPAT_43 */ 1401 1402 /* 1403 * Check access permissions using passed credentials. 1404 */ 1405 static int 1406 vn_access(vp, user_flags, cred, td) 1407 struct vnode *vp; 1408 int user_flags; 1409 struct ucred *cred; 1410 struct thread *td; 1411 { 1412 int error, flags; 1413 1414 /* Flags == 0 means only check for existence. */ 1415 error = 0; 1416 if (user_flags) { 1417 flags = 0; 1418 if (user_flags & R_OK) 1419 flags |= VREAD; 1420 if (user_flags & W_OK) 1421 flags |= VWRITE; 1422 if (user_flags & X_OK) 1423 flags |= VEXEC; 1424 #ifdef MAC 1425 error = mac_check_vnode_access(cred, vp, flags); 1426 if (error) 1427 return (error); 1428 #endif 1429 if ((flags & VWRITE) == 0 || (error = vn_writechk(vp)) == 0) 1430 error = VOP_ACCESS(vp, flags, cred, td); 1431 } 1432 return (error); 1433 } 1434 1435 /* 1436 * Check access permissions using "real" credentials. 1437 */ 1438 #ifndef _SYS_SYSPROTO_H_ 1439 struct access_args { 1440 char *path; 1441 int flags; 1442 }; 1443 #endif 1444 int 1445 access(td, uap) 1446 struct thread *td; 1447 register struct access_args /* { 1448 char *path; 1449 int flags; 1450 } */ *uap; 1451 { 1452 1453 return (kern_access(td, uap->path, UIO_USERSPACE, uap->flags)); 1454 } 1455 1456 int 1457 kern_access(struct thread *td, char *path, enum uio_seg pathseg, int flags) 1458 { 1459 struct ucred *cred, *tmpcred; 1460 register struct vnode *vp; 1461 int error; 1462 struct nameidata nd; 1463 1464 /* 1465 * Create and modify a temporary credential instead of one that 1466 * is potentially shared. This could also mess up socket 1467 * buffer accounting which can run in an interrupt context. 1468 * 1469 * XXX - Depending on how "threads" are finally implemented, it 1470 * may be better to explicitly pass the credential to namei() 1471 * rather than to modify the potentially shared process structure. 1472 */ 1473 cred = td->td_ucred; 1474 tmpcred = crdup(cred); 1475 tmpcred->cr_uid = cred->cr_ruid; 1476 tmpcred->cr_groups[0] = cred->cr_rgid; 1477 td->td_ucred = tmpcred; 1478 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, pathseg, path, td); 1479 if ((error = namei(&nd)) != 0) 1480 goto out1; 1481 vp = nd.ni_vp; 1482 1483 error = vn_access(vp, flags, tmpcred, td); 1484 NDFREE(&nd, NDF_ONLY_PNBUF); 1485 vput(vp); 1486 out1: 1487 td->td_ucred = cred; 1488 crfree(tmpcred); 1489 return (error); 1490 } 1491 1492 /* 1493 * Check access permissions using "effective" credentials. 1494 */ 1495 #ifndef _SYS_SYSPROTO_H_ 1496 struct eaccess_args { 1497 char *path; 1498 int flags; 1499 }; 1500 #endif 1501 int 1502 eaccess(td, uap) 1503 struct thread *td; 1504 register struct eaccess_args /* { 1505 char *path; 1506 int flags; 1507 } */ *uap; 1508 { 1509 struct nameidata nd; 1510 struct vnode *vp; 1511 int error; 1512 1513 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1514 uap->path, td); 1515 if ((error = namei(&nd)) != 0) 1516 return (error); 1517 vp = nd.ni_vp; 1518 1519 error = vn_access(vp, uap->flags, td->td_ucred, td); 1520 NDFREE(&nd, NDF_ONLY_PNBUF); 1521 vput(vp); 1522 return (error); 1523 } 1524 1525 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1526 /* 1527 * Get file status; this version follows links. 1528 */ 1529 #ifndef _SYS_SYSPROTO_H_ 1530 struct ostat_args { 1531 char *path; 1532 struct ostat *ub; 1533 }; 1534 #endif 1535 /* ARGSUSED */ 1536 int 1537 ostat(td, uap) 1538 struct thread *td; 1539 register struct ostat_args /* { 1540 char *path; 1541 struct ostat *ub; 1542 } */ *uap; 1543 { 1544 struct stat sb; 1545 struct ostat osb; 1546 int error; 1547 struct nameidata nd; 1548 1549 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1550 uap->path, td); 1551 if ((error = namei(&nd)) != 0) 1552 return (error); 1553 NDFREE(&nd, NDF_ONLY_PNBUF); 1554 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1555 vput(nd.ni_vp); 1556 if (error) 1557 return (error); 1558 cvtstat(&sb, &osb); 1559 error = copyout(&osb, uap->ub, sizeof (osb)); 1560 return (error); 1561 } 1562 1563 /* 1564 * Get file status; this version does not follow links. 1565 */ 1566 #ifndef _SYS_SYSPROTO_H_ 1567 struct olstat_args { 1568 char *path; 1569 struct ostat *ub; 1570 }; 1571 #endif 1572 /* ARGSUSED */ 1573 int 1574 olstat(td, uap) 1575 struct thread *td; 1576 register struct olstat_args /* { 1577 char *path; 1578 struct ostat *ub; 1579 } */ *uap; 1580 { 1581 struct vnode *vp; 1582 struct stat sb; 1583 struct ostat osb; 1584 int error; 1585 struct nameidata nd; 1586 1587 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1588 uap->path, td); 1589 if ((error = namei(&nd)) != 0) 1590 return (error); 1591 vp = nd.ni_vp; 1592 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1593 NDFREE(&nd, NDF_ONLY_PNBUF); 1594 vput(vp); 1595 if (error) 1596 return (error); 1597 cvtstat(&sb, &osb); 1598 error = copyout(&osb, uap->ub, sizeof (osb)); 1599 return (error); 1600 } 1601 1602 /* 1603 * Convert from an old to a new stat structure. 1604 */ 1605 void 1606 cvtstat(st, ost) 1607 struct stat *st; 1608 struct ostat *ost; 1609 { 1610 1611 ost->st_dev = st->st_dev; 1612 ost->st_ino = st->st_ino; 1613 ost->st_mode = st->st_mode; 1614 ost->st_nlink = st->st_nlink; 1615 ost->st_uid = st->st_uid; 1616 ost->st_gid = st->st_gid; 1617 ost->st_rdev = st->st_rdev; 1618 if (st->st_size < (quad_t)1 << 32) 1619 ost->st_size = st->st_size; 1620 else 1621 ost->st_size = -2; 1622 ost->st_atime = st->st_atime; 1623 ost->st_mtime = st->st_mtime; 1624 ost->st_ctime = st->st_ctime; 1625 ost->st_blksize = st->st_blksize; 1626 ost->st_blocks = st->st_blocks; 1627 ost->st_flags = st->st_flags; 1628 ost->st_gen = st->st_gen; 1629 } 1630 #endif /* COMPAT_43 || COMPAT_SUNOS */ 1631 1632 /* 1633 * Get file status; this version follows links. 1634 */ 1635 #ifndef _SYS_SYSPROTO_H_ 1636 struct stat_args { 1637 char *path; 1638 struct stat *ub; 1639 }; 1640 #endif 1641 /* ARGSUSED */ 1642 int 1643 stat(td, uap) 1644 struct thread *td; 1645 register struct stat_args /* { 1646 char *path; 1647 struct stat *ub; 1648 } */ *uap; 1649 { 1650 struct stat sb; 1651 int error; 1652 struct nameidata nd; 1653 1654 #ifdef LOOKUP_SHARED 1655 NDINIT(&nd, LOOKUP, FOLLOW | LOCKSHARED | LOCKLEAF | NOOBJ, 1656 UIO_USERSPACE, uap->path, td); 1657 #else 1658 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1659 uap->path, td); 1660 #endif 1661 if ((error = namei(&nd)) != 0) 1662 return (error); 1663 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1664 NDFREE(&nd, NDF_ONLY_PNBUF); 1665 vput(nd.ni_vp); 1666 if (error) 1667 return (error); 1668 error = copyout(&sb, uap->ub, sizeof (sb)); 1669 return (error); 1670 } 1671 1672 /* 1673 * Get file status; this version does not follow links. 1674 */ 1675 #ifndef _SYS_SYSPROTO_H_ 1676 struct lstat_args { 1677 char *path; 1678 struct stat *ub; 1679 }; 1680 #endif 1681 /* ARGSUSED */ 1682 int 1683 lstat(td, uap) 1684 struct thread *td; 1685 register struct lstat_args /* { 1686 char *path; 1687 struct stat *ub; 1688 } */ *uap; 1689 { 1690 int error; 1691 struct vnode *vp; 1692 struct stat sb; 1693 struct nameidata nd; 1694 1695 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1696 uap->path, td); 1697 if ((error = namei(&nd)) != 0) 1698 return (error); 1699 vp = nd.ni_vp; 1700 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1701 NDFREE(&nd, NDF_ONLY_PNBUF); 1702 vput(vp); 1703 if (error) 1704 return (error); 1705 error = copyout(&sb, uap->ub, sizeof (sb)); 1706 return (error); 1707 } 1708 1709 /* 1710 * Implementation of the NetBSD stat() function. 1711 * XXX This should probably be collapsed with the FreeBSD version, 1712 * as the differences are only due to vn_stat() clearing spares at 1713 * the end of the structures. vn_stat could be split to avoid this, 1714 * and thus collapse the following to close to zero code. 1715 */ 1716 void 1717 cvtnstat(sb, nsb) 1718 struct stat *sb; 1719 struct nstat *nsb; 1720 { 1721 bzero(nsb, sizeof *nsb); 1722 nsb->st_dev = sb->st_dev; 1723 nsb->st_ino = sb->st_ino; 1724 nsb->st_mode = sb->st_mode; 1725 nsb->st_nlink = sb->st_nlink; 1726 nsb->st_uid = sb->st_uid; 1727 nsb->st_gid = sb->st_gid; 1728 nsb->st_rdev = sb->st_rdev; 1729 nsb->st_atimespec = sb->st_atimespec; 1730 nsb->st_mtimespec = sb->st_mtimespec; 1731 nsb->st_ctimespec = sb->st_ctimespec; 1732 nsb->st_size = sb->st_size; 1733 nsb->st_blocks = sb->st_blocks; 1734 nsb->st_blksize = sb->st_blksize; 1735 nsb->st_flags = sb->st_flags; 1736 nsb->st_gen = sb->st_gen; 1737 nsb->st_birthtimespec = sb->st_birthtimespec; 1738 } 1739 1740 #ifndef _SYS_SYSPROTO_H_ 1741 struct nstat_args { 1742 char *path; 1743 struct nstat *ub; 1744 }; 1745 #endif 1746 /* ARGSUSED */ 1747 int 1748 nstat(td, uap) 1749 struct thread *td; 1750 register struct nstat_args /* { 1751 char *path; 1752 struct nstat *ub; 1753 } */ *uap; 1754 { 1755 struct stat sb; 1756 struct nstat nsb; 1757 int error; 1758 struct nameidata nd; 1759 1760 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1761 uap->path, td); 1762 if ((error = namei(&nd)) != 0) 1763 return (error); 1764 NDFREE(&nd, NDF_ONLY_PNBUF); 1765 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1766 vput(nd.ni_vp); 1767 if (error) 1768 return (error); 1769 cvtnstat(&sb, &nsb); 1770 error = copyout(&nsb, uap->ub, sizeof (nsb)); 1771 return (error); 1772 } 1773 1774 /* 1775 * NetBSD lstat. Get file status; this version does not follow links. 1776 */ 1777 #ifndef _SYS_SYSPROTO_H_ 1778 struct lstat_args { 1779 char *path; 1780 struct stat *ub; 1781 }; 1782 #endif 1783 /* ARGSUSED */ 1784 int 1785 nlstat(td, uap) 1786 struct thread *td; 1787 register struct nlstat_args /* { 1788 char *path; 1789 struct nstat *ub; 1790 } */ *uap; 1791 { 1792 int error; 1793 struct vnode *vp; 1794 struct stat sb; 1795 struct nstat nsb; 1796 struct nameidata nd; 1797 1798 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1799 uap->path, td); 1800 if ((error = namei(&nd)) != 0) 1801 return (error); 1802 vp = nd.ni_vp; 1803 NDFREE(&nd, NDF_ONLY_PNBUF); 1804 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1805 vput(vp); 1806 if (error) 1807 return (error); 1808 cvtnstat(&sb, &nsb); 1809 error = copyout(&nsb, uap->ub, sizeof (nsb)); 1810 return (error); 1811 } 1812 1813 /* 1814 * Get configurable pathname variables. 1815 */ 1816 #ifndef _SYS_SYSPROTO_H_ 1817 struct pathconf_args { 1818 char *path; 1819 int name; 1820 }; 1821 #endif 1822 /* ARGSUSED */ 1823 int 1824 pathconf(td, uap) 1825 struct thread *td; 1826 register struct pathconf_args /* { 1827 char *path; 1828 int name; 1829 } */ *uap; 1830 { 1831 int error; 1832 struct nameidata nd; 1833 1834 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1835 uap->path, td); 1836 if ((error = namei(&nd)) != 0) 1837 return (error); 1838 NDFREE(&nd, NDF_ONLY_PNBUF); 1839 1840 /* If asynchronous I/O is available, it works for all files. */ 1841 if (uap->name == _PC_ASYNC_IO) 1842 td->td_retval[0] = async_io_version; 1843 else 1844 error = VOP_PATHCONF(nd.ni_vp, uap->name, td->td_retval); 1845 vput(nd.ni_vp); 1846 return (error); 1847 } 1848 1849 /* 1850 * Return target name of a symbolic link. 1851 */ 1852 #ifndef _SYS_SYSPROTO_H_ 1853 struct readlink_args { 1854 char *path; 1855 char *buf; 1856 int count; 1857 }; 1858 #endif 1859 /* ARGSUSED */ 1860 int 1861 readlink(td, uap) 1862 struct thread *td; 1863 register struct readlink_args /* { 1864 char *path; 1865 char *buf; 1866 int count; 1867 } */ *uap; 1868 { 1869 1870 return (kern_readlink(td, uap->path, UIO_USERSPACE, uap->buf, 1871 UIO_USERSPACE, uap->count)); 1872 } 1873 1874 int 1875 kern_readlink(struct thread *td, char *path, enum uio_seg pathseg, char *buf, 1876 enum uio_seg bufseg, int count) 1877 { 1878 register struct vnode *vp; 1879 struct iovec aiov; 1880 struct uio auio; 1881 int error; 1882 struct nameidata nd; 1883 1884 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, pathseg, path, td); 1885 if ((error = namei(&nd)) != 0) 1886 return (error); 1887 NDFREE(&nd, NDF_ONLY_PNBUF); 1888 vp = nd.ni_vp; 1889 #ifdef MAC 1890 error = mac_check_vnode_readlink(td->td_ucred, vp); 1891 if (error) { 1892 vput(vp); 1893 return (error); 1894 } 1895 #endif 1896 if (vp->v_type != VLNK) 1897 error = EINVAL; 1898 else { 1899 aiov.iov_base = buf; 1900 aiov.iov_len = count; 1901 auio.uio_iov = &aiov; 1902 auio.uio_iovcnt = 1; 1903 auio.uio_offset = 0; 1904 auio.uio_rw = UIO_READ; 1905 auio.uio_segflg = bufseg; 1906 auio.uio_td = td; 1907 auio.uio_resid = count; 1908 error = VOP_READLINK(vp, &auio, td->td_ucred); 1909 } 1910 vput(vp); 1911 td->td_retval[0] = count - auio.uio_resid; 1912 return (error); 1913 } 1914 1915 /* 1916 * Common implementation code for chflags() and fchflags(). 1917 */ 1918 static int 1919 setfflags(td, vp, flags) 1920 struct thread *td; 1921 struct vnode *vp; 1922 int flags; 1923 { 1924 int error; 1925 struct mount *mp; 1926 struct vattr vattr; 1927 1928 /* 1929 * Prevent non-root users from setting flags on devices. When 1930 * a device is reused, users can retain ownership of the device 1931 * if they are allowed to set flags and programs assume that 1932 * chown can't fail when done as root. 1933 */ 1934 if (vp->v_type == VCHR || vp->v_type == VBLK) { 1935 error = suser_cred(td->td_ucred, PRISON_ROOT); 1936 if (error) 1937 return (error); 1938 } 1939 1940 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1941 return (error); 1942 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1943 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1944 #ifdef MAC 1945 error = mac_check_vnode_setflags(td->td_ucred, vp, vattr.va_flags); 1946 if (error == 0) { 1947 #endif 1948 VATTR_NULL(&vattr); 1949 vattr.va_flags = flags; 1950 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1951 #ifdef MAC 1952 } 1953 #endif 1954 VOP_UNLOCK(vp, 0, td); 1955 vn_finished_write(mp); 1956 return (error); 1957 } 1958 1959 /* 1960 * Change flags of a file given a path name. 1961 */ 1962 #ifndef _SYS_SYSPROTO_H_ 1963 struct chflags_args { 1964 char *path; 1965 int flags; 1966 }; 1967 #endif 1968 /* ARGSUSED */ 1969 int 1970 chflags(td, uap) 1971 struct thread *td; 1972 register struct chflags_args /* { 1973 char *path; 1974 int flags; 1975 } */ *uap; 1976 { 1977 int error; 1978 struct nameidata nd; 1979 1980 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 1981 if ((error = namei(&nd)) != 0) 1982 return (error); 1983 NDFREE(&nd, NDF_ONLY_PNBUF); 1984 error = setfflags(td, nd.ni_vp, uap->flags); 1985 vrele(nd.ni_vp); 1986 return error; 1987 } 1988 1989 /* 1990 * Same as chflags() but doesn't follow symlinks. 1991 */ 1992 int 1993 lchflags(td, uap) 1994 struct thread *td; 1995 register struct lchflags_args /* { 1996 char *path; 1997 int flags; 1998 } */ *uap; 1999 { 2000 int error; 2001 struct nameidata nd; 2002 2003 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, uap->path, td); 2004 if ((error = namei(&nd)) != 0) 2005 return (error); 2006 NDFREE(&nd, NDF_ONLY_PNBUF); 2007 error = setfflags(td, nd.ni_vp, uap->flags); 2008 vrele(nd.ni_vp); 2009 return error; 2010 } 2011 2012 /* 2013 * Change flags of a file given a file descriptor. 2014 */ 2015 #ifndef _SYS_SYSPROTO_H_ 2016 struct fchflags_args { 2017 int fd; 2018 int flags; 2019 }; 2020 #endif 2021 /* ARGSUSED */ 2022 int 2023 fchflags(td, uap) 2024 struct thread *td; 2025 register struct fchflags_args /* { 2026 int fd; 2027 int flags; 2028 } */ *uap; 2029 { 2030 struct file *fp; 2031 int error; 2032 2033 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 2034 return (error); 2035 error = setfflags(td, fp->f_data, uap->flags); 2036 fdrop(fp, td); 2037 return (error); 2038 } 2039 2040 /* 2041 * Common implementation code for chmod(), lchmod() and fchmod(). 2042 */ 2043 static int 2044 setfmode(td, vp, mode) 2045 struct thread *td; 2046 struct vnode *vp; 2047 int mode; 2048 { 2049 int error; 2050 struct mount *mp; 2051 struct vattr vattr; 2052 2053 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2054 return (error); 2055 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2056 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2057 VATTR_NULL(&vattr); 2058 vattr.va_mode = mode & ALLPERMS; 2059 #ifdef MAC 2060 error = mac_check_vnode_setmode(td->td_ucred, vp, vattr.va_mode); 2061 if (error == 0) 2062 #endif 2063 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2064 VOP_UNLOCK(vp, 0, td); 2065 vn_finished_write(mp); 2066 return error; 2067 } 2068 2069 /* 2070 * Change mode of a file given path name. 2071 */ 2072 #ifndef _SYS_SYSPROTO_H_ 2073 struct chmod_args { 2074 char *path; 2075 int mode; 2076 }; 2077 #endif 2078 /* ARGSUSED */ 2079 int 2080 chmod(td, uap) 2081 struct thread *td; 2082 register struct chmod_args /* { 2083 char *path; 2084 int mode; 2085 } */ *uap; 2086 { 2087 2088 return (kern_chmod(td, uap->path, UIO_USERSPACE, uap->mode)); 2089 } 2090 2091 int 2092 kern_chmod(struct thread *td, char *path, enum uio_seg pathseg, int mode) 2093 { 2094 int error; 2095 struct nameidata nd; 2096 2097 NDINIT(&nd, LOOKUP, FOLLOW, pathseg, path, td); 2098 if ((error = namei(&nd)) != 0) 2099 return (error); 2100 NDFREE(&nd, NDF_ONLY_PNBUF); 2101 error = setfmode(td, nd.ni_vp, mode); 2102 vrele(nd.ni_vp); 2103 return error; 2104 } 2105 2106 /* 2107 * Change mode of a file given path name (don't follow links.) 2108 */ 2109 #ifndef _SYS_SYSPROTO_H_ 2110 struct lchmod_args { 2111 char *path; 2112 int mode; 2113 }; 2114 #endif 2115 /* ARGSUSED */ 2116 int 2117 lchmod(td, uap) 2118 struct thread *td; 2119 register struct lchmod_args /* { 2120 char *path; 2121 int mode; 2122 } */ *uap; 2123 { 2124 int error; 2125 struct nameidata nd; 2126 2127 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, uap->path, td); 2128 if ((error = namei(&nd)) != 0) 2129 return (error); 2130 NDFREE(&nd, NDF_ONLY_PNBUF); 2131 error = setfmode(td, nd.ni_vp, uap->mode); 2132 vrele(nd.ni_vp); 2133 return error; 2134 } 2135 2136 /* 2137 * Change mode of a file given a file descriptor. 2138 */ 2139 #ifndef _SYS_SYSPROTO_H_ 2140 struct fchmod_args { 2141 int fd; 2142 int mode; 2143 }; 2144 #endif 2145 /* ARGSUSED */ 2146 int 2147 fchmod(td, uap) 2148 struct thread *td; 2149 register struct fchmod_args /* { 2150 int fd; 2151 int mode; 2152 } */ *uap; 2153 { 2154 struct file *fp; 2155 struct vnode *vp; 2156 int error; 2157 2158 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 2159 return (error); 2160 vp = fp->f_data; 2161 error = setfmode(td, fp->f_data, uap->mode); 2162 fdrop(fp, td); 2163 return (error); 2164 } 2165 2166 /* 2167 * Common implementation for chown(), lchown(), and fchown() 2168 */ 2169 static int 2170 setfown(td, vp, uid, gid) 2171 struct thread *td; 2172 struct vnode *vp; 2173 uid_t uid; 2174 gid_t gid; 2175 { 2176 int error; 2177 struct mount *mp; 2178 struct vattr vattr; 2179 2180 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2181 return (error); 2182 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2183 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2184 VATTR_NULL(&vattr); 2185 vattr.va_uid = uid; 2186 vattr.va_gid = gid; 2187 #ifdef MAC 2188 error = mac_check_vnode_setowner(td->td_ucred, vp, vattr.va_uid, 2189 vattr.va_gid); 2190 if (error == 0) 2191 #endif 2192 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2193 VOP_UNLOCK(vp, 0, td); 2194 vn_finished_write(mp); 2195 return error; 2196 } 2197 2198 /* 2199 * Set ownership given a path name. 2200 */ 2201 #ifndef _SYS_SYSPROTO_H_ 2202 struct chown_args { 2203 char *path; 2204 int uid; 2205 int gid; 2206 }; 2207 #endif 2208 /* ARGSUSED */ 2209 int 2210 chown(td, uap) 2211 struct thread *td; 2212 register struct chown_args /* { 2213 char *path; 2214 int uid; 2215 int gid; 2216 } */ *uap; 2217 { 2218 2219 return (kern_chown(td, uap->path, UIO_USERSPACE, uap->uid, uap->gid)); 2220 } 2221 2222 int 2223 kern_chown(struct thread *td, char *path, enum uio_seg pathseg, int uid, 2224 int gid) 2225 { 2226 int error; 2227 struct nameidata nd; 2228 2229 NDINIT(&nd, LOOKUP, FOLLOW, pathseg, path, td); 2230 if ((error = namei(&nd)) != 0) 2231 return (error); 2232 NDFREE(&nd, NDF_ONLY_PNBUF); 2233 error = setfown(td, nd.ni_vp, uid, gid); 2234 vrele(nd.ni_vp); 2235 return (error); 2236 } 2237 2238 /* 2239 * Set ownership given a path name, do not cross symlinks. 2240 */ 2241 #ifndef _SYS_SYSPROTO_H_ 2242 struct lchown_args { 2243 char *path; 2244 int uid; 2245 int gid; 2246 }; 2247 #endif 2248 /* ARGSUSED */ 2249 int 2250 lchown(td, uap) 2251 struct thread *td; 2252 register struct lchown_args /* { 2253 char *path; 2254 int uid; 2255 int gid; 2256 } */ *uap; 2257 { 2258 2259 return (kern_lchown(td, uap->path, UIO_USERSPACE, uap->uid, uap->gid)); 2260 } 2261 2262 int 2263 kern_lchown(struct thread *td, char *path, enum uio_seg pathseg, int uid, 2264 int gid) 2265 { 2266 int error; 2267 struct nameidata nd; 2268 2269 NDINIT(&nd, LOOKUP, NOFOLLOW, pathseg, path, td); 2270 if ((error = namei(&nd)) != 0) 2271 return (error); 2272 NDFREE(&nd, NDF_ONLY_PNBUF); 2273 error = setfown(td, nd.ni_vp, uid, gid); 2274 vrele(nd.ni_vp); 2275 return (error); 2276 } 2277 2278 /* 2279 * Set ownership given a file descriptor. 2280 */ 2281 #ifndef _SYS_SYSPROTO_H_ 2282 struct fchown_args { 2283 int fd; 2284 int uid; 2285 int gid; 2286 }; 2287 #endif 2288 /* ARGSUSED */ 2289 int 2290 fchown(td, uap) 2291 struct thread *td; 2292 register struct fchown_args /* { 2293 int fd; 2294 int uid; 2295 int gid; 2296 } */ *uap; 2297 { 2298 struct file *fp; 2299 struct vnode *vp; 2300 int error; 2301 2302 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 2303 return (error); 2304 vp = fp->f_data; 2305 error = setfown(td, fp->f_data, uap->uid, uap->gid); 2306 fdrop(fp, td); 2307 return (error); 2308 } 2309 2310 /* 2311 * Common implementation code for utimes(), lutimes(), and futimes(). 2312 */ 2313 static int 2314 getutimes(usrtvp, tvpseg, tsp) 2315 const struct timeval *usrtvp; 2316 enum uio_seg tvpseg; 2317 struct timespec *tsp; 2318 { 2319 struct timeval tv[2]; 2320 const struct timeval *tvp; 2321 int error; 2322 2323 if (usrtvp == NULL) { 2324 microtime(&tv[0]); 2325 TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]); 2326 tsp[1] = tsp[0]; 2327 } else { 2328 if (tvpseg == UIO_SYSSPACE) { 2329 tvp = usrtvp; 2330 } else { 2331 if ((error = copyin(usrtvp, tv, sizeof(tv))) != 0) 2332 return (error); 2333 tvp = tv; 2334 } 2335 2336 TIMEVAL_TO_TIMESPEC(&tvp[0], &tsp[0]); 2337 TIMEVAL_TO_TIMESPEC(&tvp[1], &tsp[1]); 2338 } 2339 return 0; 2340 } 2341 2342 /* 2343 * Common implementation code for utimes(), lutimes(), and futimes(). 2344 */ 2345 static int 2346 setutimes(td, vp, ts, numtimes, nullflag) 2347 struct thread *td; 2348 struct vnode *vp; 2349 const struct timespec *ts; 2350 int numtimes; 2351 int nullflag; 2352 { 2353 int error, setbirthtime; 2354 struct mount *mp; 2355 struct vattr vattr; 2356 2357 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2358 return (error); 2359 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2360 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2361 setbirthtime = 0; 2362 if (numtimes < 3 && VOP_GETATTR(vp, &vattr, td->td_ucred, td) == 0 && 2363 timespeccmp(&ts[1], &vattr.va_birthtime, < )) 2364 setbirthtime = 1; 2365 VATTR_NULL(&vattr); 2366 vattr.va_atime = ts[0]; 2367 vattr.va_mtime = ts[1]; 2368 if (setbirthtime) 2369 vattr.va_birthtime = ts[1]; 2370 if (numtimes > 2) 2371 vattr.va_birthtime = ts[2]; 2372 if (nullflag) 2373 vattr.va_vaflags |= VA_UTIMES_NULL; 2374 #ifdef MAC 2375 error = mac_check_vnode_setutimes(td->td_ucred, vp, vattr.va_atime, 2376 vattr.va_mtime); 2377 #endif 2378 if (error == 0) 2379 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2380 VOP_UNLOCK(vp, 0, td); 2381 vn_finished_write(mp); 2382 return error; 2383 } 2384 2385 /* 2386 * Set the access and modification times of a file. 2387 */ 2388 #ifndef _SYS_SYSPROTO_H_ 2389 struct utimes_args { 2390 char *path; 2391 struct timeval *tptr; 2392 }; 2393 #endif 2394 /* ARGSUSED */ 2395 int 2396 utimes(td, uap) 2397 struct thread *td; 2398 register struct utimes_args /* { 2399 char *path; 2400 struct timeval *tptr; 2401 } */ *uap; 2402 { 2403 2404 return (kern_utimes(td, uap->path, UIO_USERSPACE, uap->tptr, 2405 UIO_USERSPACE)); 2406 } 2407 2408 int 2409 kern_utimes(struct thread *td, char *path, enum uio_seg pathseg, 2410 struct timeval *tptr, enum uio_seg tptrseg) 2411 { 2412 struct timespec ts[2]; 2413 int error; 2414 struct nameidata nd; 2415 2416 if ((error = getutimes(tptr, tptrseg, ts)) != 0) 2417 return (error); 2418 NDINIT(&nd, LOOKUP, FOLLOW, pathseg, path, td); 2419 if ((error = namei(&nd)) != 0) 2420 return (error); 2421 NDFREE(&nd, NDF_ONLY_PNBUF); 2422 error = setutimes(td, nd.ni_vp, ts, 2, tptr == NULL); 2423 vrele(nd.ni_vp); 2424 return (error); 2425 } 2426 2427 /* 2428 * Set the access and modification times of a file. 2429 */ 2430 #ifndef _SYS_SYSPROTO_H_ 2431 struct lutimes_args { 2432 char *path; 2433 struct timeval *tptr; 2434 }; 2435 #endif 2436 /* ARGSUSED */ 2437 int 2438 lutimes(td, uap) 2439 struct thread *td; 2440 register struct lutimes_args /* { 2441 char *path; 2442 struct timeval *tptr; 2443 } */ *uap; 2444 { 2445 2446 return (kern_lutimes(td, uap->path, UIO_USERSPACE, uap->tptr, 2447 UIO_USERSPACE)); 2448 } 2449 2450 int 2451 kern_lutimes(struct thread *td, char *path, enum uio_seg pathseg, 2452 struct timeval *tptr, enum uio_seg tptrseg) 2453 { 2454 struct timespec ts[2]; 2455 int error; 2456 struct nameidata nd; 2457 2458 if ((error = getutimes(tptr, tptrseg, ts)) != 0) 2459 return (error); 2460 NDINIT(&nd, LOOKUP, NOFOLLOW, pathseg, path, td); 2461 if ((error = namei(&nd)) != 0) 2462 return (error); 2463 NDFREE(&nd, NDF_ONLY_PNBUF); 2464 error = setutimes(td, nd.ni_vp, ts, 2, tptr == NULL); 2465 vrele(nd.ni_vp); 2466 return (error); 2467 } 2468 2469 /* 2470 * Set the access and modification times of a file. 2471 */ 2472 #ifndef _SYS_SYSPROTO_H_ 2473 struct futimes_args { 2474 int fd; 2475 struct timeval *tptr; 2476 }; 2477 #endif 2478 /* ARGSUSED */ 2479 int 2480 futimes(td, uap) 2481 struct thread *td; 2482 register struct futimes_args /* { 2483 int fd; 2484 struct timeval *tptr; 2485 } */ *uap; 2486 { 2487 2488 return (kern_futimes(td, uap->fd, uap->tptr, UIO_USERSPACE)); 2489 } 2490 2491 int 2492 kern_futimes(struct thread *td, int fd, struct timeval *tptr, 2493 enum uio_seg tptrseg) 2494 { 2495 struct timespec ts[2]; 2496 struct file *fp; 2497 int error; 2498 2499 if ((error = getutimes(tptr, tptrseg, ts)) != 0) 2500 return (error); 2501 if ((error = getvnode(td->td_proc->p_fd, fd, &fp)) != 0) 2502 return (error); 2503 error = setutimes(td, fp->f_data, ts, 2, tptr == NULL); 2504 fdrop(fp, td); 2505 return (error); 2506 } 2507 2508 /* 2509 * Truncate a file given its path name. 2510 */ 2511 #ifndef _SYS_SYSPROTO_H_ 2512 struct truncate_args { 2513 char *path; 2514 int pad; 2515 off_t length; 2516 }; 2517 #endif 2518 /* ARGSUSED */ 2519 int 2520 truncate(td, uap) 2521 struct thread *td; 2522 register struct truncate_args /* { 2523 char *path; 2524 int pad; 2525 off_t length; 2526 } */ *uap; 2527 { 2528 2529 return (kern_truncate(td, uap->path, UIO_USERSPACE, uap->length)); 2530 } 2531 2532 int 2533 kern_truncate(struct thread *td, char *path, enum uio_seg pathseg, off_t length) 2534 { 2535 struct mount *mp; 2536 struct vnode *vp; 2537 struct vattr vattr; 2538 int error; 2539 struct nameidata nd; 2540 2541 if (length < 0) 2542 return(EINVAL); 2543 NDINIT(&nd, LOOKUP, FOLLOW, pathseg, path, td); 2544 if ((error = namei(&nd)) != 0) 2545 return (error); 2546 vp = nd.ni_vp; 2547 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2548 vrele(vp); 2549 return (error); 2550 } 2551 NDFREE(&nd, NDF_ONLY_PNBUF); 2552 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2553 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2554 if (vp->v_type == VDIR) 2555 error = EISDIR; 2556 #ifdef MAC 2557 else if ((error = mac_check_vnode_write(td->td_ucred, NOCRED, vp))) { 2558 } 2559 #endif 2560 else if ((error = vn_writechk(vp)) == 0 && 2561 (error = VOP_ACCESS(vp, VWRITE, td->td_ucred, td)) == 0) { 2562 VATTR_NULL(&vattr); 2563 vattr.va_size = length; 2564 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2565 } 2566 vput(vp); 2567 vn_finished_write(mp); 2568 return (error); 2569 } 2570 2571 /* 2572 * Truncate a file given a file descriptor. 2573 */ 2574 #ifndef _SYS_SYSPROTO_H_ 2575 struct ftruncate_args { 2576 int fd; 2577 int pad; 2578 off_t length; 2579 }; 2580 #endif 2581 /* ARGSUSED */ 2582 int 2583 ftruncate(td, uap) 2584 struct thread *td; 2585 register struct ftruncate_args /* { 2586 int fd; 2587 int pad; 2588 off_t length; 2589 } */ *uap; 2590 { 2591 struct mount *mp; 2592 struct vattr vattr; 2593 struct vnode *vp; 2594 struct file *fp; 2595 int error; 2596 2597 if (uap->length < 0) 2598 return(EINVAL); 2599 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 2600 return (error); 2601 if ((fp->f_flag & FWRITE) == 0) { 2602 fdrop(fp, td); 2603 return (EINVAL); 2604 } 2605 vp = fp->f_data; 2606 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2607 fdrop(fp, td); 2608 return (error); 2609 } 2610 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2611 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2612 if (vp->v_type == VDIR) 2613 error = EISDIR; 2614 #ifdef MAC 2615 else if ((error = mac_check_vnode_write(td->td_ucred, fp->f_cred, 2616 vp))) { 2617 } 2618 #endif 2619 else if ((error = vn_writechk(vp)) == 0) { 2620 VATTR_NULL(&vattr); 2621 vattr.va_size = uap->length; 2622 error = VOP_SETATTR(vp, &vattr, fp->f_cred, td); 2623 } 2624 VOP_UNLOCK(vp, 0, td); 2625 vn_finished_write(mp); 2626 fdrop(fp, td); 2627 return (error); 2628 } 2629 2630 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 2631 /* 2632 * Truncate a file given its path name. 2633 */ 2634 #ifndef _SYS_SYSPROTO_H_ 2635 struct otruncate_args { 2636 char *path; 2637 long length; 2638 }; 2639 #endif 2640 /* ARGSUSED */ 2641 int 2642 otruncate(td, uap) 2643 struct thread *td; 2644 register struct otruncate_args /* { 2645 char *path; 2646 long length; 2647 } */ *uap; 2648 { 2649 struct truncate_args /* { 2650 char *path; 2651 int pad; 2652 off_t length; 2653 } */ nuap; 2654 2655 nuap.path = uap->path; 2656 nuap.length = uap->length; 2657 return (truncate(td, &nuap)); 2658 } 2659 2660 /* 2661 * Truncate a file given a file descriptor. 2662 */ 2663 #ifndef _SYS_SYSPROTO_H_ 2664 struct oftruncate_args { 2665 int fd; 2666 long length; 2667 }; 2668 #endif 2669 /* ARGSUSED */ 2670 int 2671 oftruncate(td, uap) 2672 struct thread *td; 2673 register struct oftruncate_args /* { 2674 int fd; 2675 long length; 2676 } */ *uap; 2677 { 2678 struct ftruncate_args /* { 2679 int fd; 2680 int pad; 2681 off_t length; 2682 } */ nuap; 2683 2684 nuap.fd = uap->fd; 2685 nuap.length = uap->length; 2686 return (ftruncate(td, &nuap)); 2687 } 2688 #endif /* COMPAT_43 || COMPAT_SUNOS */ 2689 2690 /* 2691 * Sync an open file. 2692 */ 2693 #ifndef _SYS_SYSPROTO_H_ 2694 struct fsync_args { 2695 int fd; 2696 }; 2697 #endif 2698 /* ARGSUSED */ 2699 int 2700 fsync(td, uap) 2701 struct thread *td; 2702 struct fsync_args /* { 2703 int fd; 2704 } */ *uap; 2705 { 2706 struct vnode *vp; 2707 struct mount *mp; 2708 struct file *fp; 2709 vm_object_t obj; 2710 int error; 2711 2712 GIANT_REQUIRED; 2713 2714 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 2715 return (error); 2716 vp = fp->f_data; 2717 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2718 fdrop(fp, td); 2719 return (error); 2720 } 2721 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2722 if (VOP_GETVOBJECT(vp, &obj) == 0) { 2723 vm_object_page_clean(obj, 0, 0, 0); 2724 } 2725 error = VOP_FSYNC(vp, fp->f_cred, MNT_WAIT, td); 2726 if (error == 0 && vp->v_mount && (vp->v_mount->mnt_flag & MNT_SOFTDEP) 2727 && softdep_fsync_hook != NULL) 2728 error = (*softdep_fsync_hook)(vp); 2729 2730 VOP_UNLOCK(vp, 0, td); 2731 vn_finished_write(mp); 2732 fdrop(fp, td); 2733 return (error); 2734 } 2735 2736 /* 2737 * Rename files. Source and destination must either both be directories, 2738 * or both not be directories. If target is a directory, it must be empty. 2739 */ 2740 #ifndef _SYS_SYSPROTO_H_ 2741 struct rename_args { 2742 char *from; 2743 char *to; 2744 }; 2745 #endif 2746 /* ARGSUSED */ 2747 int 2748 rename(td, uap) 2749 struct thread *td; 2750 register struct rename_args /* { 2751 char *from; 2752 char *to; 2753 } */ *uap; 2754 { 2755 2756 return (kern_rename(td, uap->from, uap->to, UIO_USERSPACE)); 2757 } 2758 2759 int 2760 kern_rename(struct thread *td, char *from, char *to, enum uio_seg pathseg) 2761 { 2762 struct mount *mp = NULL; 2763 struct vnode *tvp, *fvp, *tdvp; 2764 struct nameidata fromnd, tond; 2765 int error; 2766 2767 bwillwrite(); 2768 #ifdef MAC 2769 NDINIT(&fromnd, DELETE, LOCKPARENT | LOCKLEAF | SAVESTART, pathseg, 2770 from, td); 2771 #else 2772 NDINIT(&fromnd, DELETE, WANTPARENT | SAVESTART, pathseg, from, td); 2773 #endif 2774 if ((error = namei(&fromnd)) != 0) 2775 return (error); 2776 #ifdef MAC 2777 error = mac_check_vnode_rename_from(td->td_ucred, fromnd.ni_dvp, 2778 fromnd.ni_vp, &fromnd.ni_cnd); 2779 VOP_UNLOCK(fromnd.ni_dvp, 0, td); 2780 VOP_UNLOCK(fromnd.ni_vp, 0, td); 2781 #endif 2782 fvp = fromnd.ni_vp; 2783 if (error == 0) 2784 error = vn_start_write(fvp, &mp, V_WAIT | PCATCH); 2785 if (error != 0) { 2786 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2787 vrele(fromnd.ni_dvp); 2788 vrele(fvp); 2789 goto out1; 2790 } 2791 NDINIT(&tond, RENAME, LOCKPARENT | LOCKLEAF | NOCACHE | SAVESTART | 2792 NOOBJ, pathseg, to, td); 2793 if (fromnd.ni_vp->v_type == VDIR) 2794 tond.ni_cnd.cn_flags |= WILLBEDIR; 2795 if ((error = namei(&tond)) != 0) { 2796 /* Translate error code for rename("dir1", "dir2/."). */ 2797 if (error == EISDIR && fvp->v_type == VDIR) 2798 error = EINVAL; 2799 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2800 vrele(fromnd.ni_dvp); 2801 vrele(fvp); 2802 goto out1; 2803 } 2804 tdvp = tond.ni_dvp; 2805 tvp = tond.ni_vp; 2806 if (tvp != NULL) { 2807 if (fvp->v_type == VDIR && tvp->v_type != VDIR) { 2808 error = ENOTDIR; 2809 goto out; 2810 } else if (fvp->v_type != VDIR && tvp->v_type == VDIR) { 2811 error = EISDIR; 2812 goto out; 2813 } 2814 } 2815 if (fvp == tdvp) 2816 error = EINVAL; 2817 /* 2818 * If the source is the same as the destination (that is, if they 2819 * are links to the same vnode), then there is nothing to do. 2820 */ 2821 if (fvp == tvp) 2822 error = -1; 2823 #ifdef MAC 2824 else 2825 error = mac_check_vnode_rename_to(td->td_ucred, tdvp, 2826 tond.ni_vp, fromnd.ni_dvp == tdvp, &tond.ni_cnd); 2827 #endif 2828 out: 2829 if (!error) { 2830 VOP_LEASE(tdvp, td, td->td_ucred, LEASE_WRITE); 2831 if (fromnd.ni_dvp != tdvp) { 2832 VOP_LEASE(fromnd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2833 } 2834 if (tvp) { 2835 VOP_LEASE(tvp, td, td->td_ucred, LEASE_WRITE); 2836 } 2837 error = VOP_RENAME(fromnd.ni_dvp, fromnd.ni_vp, &fromnd.ni_cnd, 2838 tond.ni_dvp, tond.ni_vp, &tond.ni_cnd); 2839 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2840 NDFREE(&tond, NDF_ONLY_PNBUF); 2841 } else { 2842 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2843 NDFREE(&tond, NDF_ONLY_PNBUF); 2844 if (tdvp == tvp) 2845 vrele(tdvp); 2846 else 2847 vput(tdvp); 2848 if (tvp) 2849 vput(tvp); 2850 vrele(fromnd.ni_dvp); 2851 vrele(fvp); 2852 } 2853 vrele(tond.ni_startdir); 2854 ASSERT_VOP_UNLOCKED(fromnd.ni_dvp, "rename"); 2855 ASSERT_VOP_UNLOCKED(fromnd.ni_vp, "rename"); 2856 ASSERT_VOP_UNLOCKED(tond.ni_dvp, "rename"); 2857 ASSERT_VOP_UNLOCKED(tond.ni_vp, "rename"); 2858 out1: 2859 vn_finished_write(mp); 2860 if (fromnd.ni_startdir) 2861 vrele(fromnd.ni_startdir); 2862 if (error == -1) 2863 return (0); 2864 return (error); 2865 } 2866 2867 /* 2868 * Make a directory file. 2869 */ 2870 #ifndef _SYS_SYSPROTO_H_ 2871 struct mkdir_args { 2872 char *path; 2873 int mode; 2874 }; 2875 #endif 2876 /* ARGSUSED */ 2877 int 2878 mkdir(td, uap) 2879 struct thread *td; 2880 register struct mkdir_args /* { 2881 char *path; 2882 int mode; 2883 } */ *uap; 2884 { 2885 2886 return (kern_mkdir(td, uap->path, UIO_USERSPACE, uap->mode)); 2887 } 2888 2889 int 2890 kern_mkdir(struct thread *td, char *path, enum uio_seg segflg, int mode) 2891 { 2892 struct mount *mp; 2893 struct vnode *vp; 2894 struct vattr vattr; 2895 int error; 2896 struct nameidata nd; 2897 2898 restart: 2899 bwillwrite(); 2900 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, segflg, path, td); 2901 nd.ni_cnd.cn_flags |= WILLBEDIR; 2902 if ((error = namei(&nd)) != 0) 2903 return (error); 2904 vp = nd.ni_vp; 2905 if (vp != NULL) { 2906 NDFREE(&nd, NDF_ONLY_PNBUF); 2907 vrele(vp); 2908 /* 2909 * XXX namei called with LOCKPARENT but not LOCKLEAF has 2910 * the strange behaviour of leaving the vnode unlocked 2911 * if the target is the same vnode as the parent. 2912 */ 2913 if (vp == nd.ni_dvp) 2914 vrele(nd.ni_dvp); 2915 else 2916 vput(nd.ni_dvp); 2917 return (EEXIST); 2918 } 2919 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 2920 NDFREE(&nd, NDF_ONLY_PNBUF); 2921 vput(nd.ni_dvp); 2922 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 2923 return (error); 2924 goto restart; 2925 } 2926 VATTR_NULL(&vattr); 2927 vattr.va_type = VDIR; 2928 FILEDESC_LOCK(td->td_proc->p_fd); 2929 vattr.va_mode = (mode & ACCESSPERMS) &~ td->td_proc->p_fd->fd_cmask; 2930 FILEDESC_UNLOCK(td->td_proc->p_fd); 2931 #ifdef MAC 2932 error = mac_check_vnode_create(td->td_ucred, nd.ni_dvp, &nd.ni_cnd, 2933 &vattr); 2934 if (error) 2935 goto out; 2936 #endif 2937 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2938 error = VOP_MKDIR(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 2939 #ifdef MAC 2940 out: 2941 #endif 2942 NDFREE(&nd, NDF_ONLY_PNBUF); 2943 vput(nd.ni_dvp); 2944 if (!error) 2945 vput(nd.ni_vp); 2946 vn_finished_write(mp); 2947 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mkdir"); 2948 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mkdir"); 2949 return (error); 2950 } 2951 2952 /* 2953 * Remove a directory file. 2954 */ 2955 #ifndef _SYS_SYSPROTO_H_ 2956 struct rmdir_args { 2957 char *path; 2958 }; 2959 #endif 2960 /* ARGSUSED */ 2961 int 2962 rmdir(td, uap) 2963 struct thread *td; 2964 struct rmdir_args /* { 2965 char *path; 2966 } */ *uap; 2967 { 2968 2969 return (kern_rmdir(td, uap->path, UIO_USERSPACE)); 2970 } 2971 2972 int 2973 kern_rmdir(struct thread *td, char *path, enum uio_seg pathseg) 2974 { 2975 struct mount *mp; 2976 struct vnode *vp; 2977 int error; 2978 struct nameidata nd; 2979 2980 restart: 2981 bwillwrite(); 2982 NDINIT(&nd, DELETE, LOCKPARENT | LOCKLEAF, pathseg, path, td); 2983 if ((error = namei(&nd)) != 0) 2984 return (error); 2985 vp = nd.ni_vp; 2986 if (vp->v_type != VDIR) { 2987 error = ENOTDIR; 2988 goto out; 2989 } 2990 /* 2991 * No rmdir "." please. 2992 */ 2993 if (nd.ni_dvp == vp) { 2994 error = EINVAL; 2995 goto out; 2996 } 2997 /* 2998 * The root of a mounted filesystem cannot be deleted. 2999 */ 3000 if (vp->v_vflag & VV_ROOT) { 3001 error = EBUSY; 3002 goto out; 3003 } 3004 #ifdef MAC 3005 error = mac_check_vnode_delete(td->td_ucred, nd.ni_dvp, vp, 3006 &nd.ni_cnd); 3007 if (error) 3008 goto out; 3009 #endif 3010 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 3011 NDFREE(&nd, NDF_ONLY_PNBUF); 3012 if (nd.ni_dvp == vp) 3013 vrele(nd.ni_dvp); 3014 else 3015 vput(nd.ni_dvp); 3016 vput(vp); 3017 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 3018 return (error); 3019 goto restart; 3020 } 3021 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 3022 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3023 error = VOP_RMDIR(nd.ni_dvp, nd.ni_vp, &nd.ni_cnd); 3024 vn_finished_write(mp); 3025 out: 3026 NDFREE(&nd, NDF_ONLY_PNBUF); 3027 if (nd.ni_dvp == vp) 3028 vrele(nd.ni_dvp); 3029 else 3030 vput(nd.ni_dvp); 3031 vput(vp); 3032 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "rmdir"); 3033 ASSERT_VOP_UNLOCKED(nd.ni_vp, "rmdir"); 3034 return (error); 3035 } 3036 3037 #ifdef COMPAT_43 3038 /* 3039 * Read a block of directory entries in a filesystem independent format. 3040 */ 3041 #ifndef _SYS_SYSPROTO_H_ 3042 struct ogetdirentries_args { 3043 int fd; 3044 char *buf; 3045 u_int count; 3046 long *basep; 3047 }; 3048 #endif 3049 int 3050 ogetdirentries(td, uap) 3051 struct thread *td; 3052 register struct ogetdirentries_args /* { 3053 int fd; 3054 char *buf; 3055 u_int count; 3056 long *basep; 3057 } */ *uap; 3058 { 3059 struct vnode *vp; 3060 struct file *fp; 3061 struct uio auio, kuio; 3062 struct iovec aiov, kiov; 3063 struct dirent *dp, *edp; 3064 caddr_t dirbuf; 3065 int error, eofflag, readcnt; 3066 long loff; 3067 3068 /* XXX arbitrary sanity limit on `count'. */ 3069 if (uap->count > 64 * 1024) 3070 return (EINVAL); 3071 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3072 return (error); 3073 if ((fp->f_flag & FREAD) == 0) { 3074 fdrop(fp, td); 3075 return (EBADF); 3076 } 3077 vp = fp->f_data; 3078 unionread: 3079 if (vp->v_type != VDIR) { 3080 fdrop(fp, td); 3081 return (EINVAL); 3082 } 3083 aiov.iov_base = uap->buf; 3084 aiov.iov_len = uap->count; 3085 auio.uio_iov = &aiov; 3086 auio.uio_iovcnt = 1; 3087 auio.uio_rw = UIO_READ; 3088 auio.uio_segflg = UIO_USERSPACE; 3089 auio.uio_td = td; 3090 auio.uio_resid = uap->count; 3091 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3092 loff = auio.uio_offset = fp->f_offset; 3093 #ifdef MAC 3094 error = mac_check_vnode_readdir(td->td_ucred, vp); 3095 if (error) { 3096 VOP_UNLOCK(vp, 0, td); 3097 fdrop(fp, td); 3098 return (error); 3099 } 3100 #endif 3101 # if (BYTE_ORDER != LITTLE_ENDIAN) 3102 if (vp->v_mount->mnt_maxsymlinklen <= 0) { 3103 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, 3104 NULL, NULL); 3105 fp->f_offset = auio.uio_offset; 3106 } else 3107 # endif 3108 { 3109 kuio = auio; 3110 kuio.uio_iov = &kiov; 3111 kuio.uio_segflg = UIO_SYSSPACE; 3112 kiov.iov_len = uap->count; 3113 MALLOC(dirbuf, caddr_t, uap->count, M_TEMP, 0); 3114 kiov.iov_base = dirbuf; 3115 error = VOP_READDIR(vp, &kuio, fp->f_cred, &eofflag, 3116 NULL, NULL); 3117 fp->f_offset = kuio.uio_offset; 3118 if (error == 0) { 3119 readcnt = uap->count - kuio.uio_resid; 3120 edp = (struct dirent *)&dirbuf[readcnt]; 3121 for (dp = (struct dirent *)dirbuf; dp < edp; ) { 3122 # if (BYTE_ORDER == LITTLE_ENDIAN) 3123 /* 3124 * The expected low byte of 3125 * dp->d_namlen is our dp->d_type. 3126 * The high MBZ byte of dp->d_namlen 3127 * is our dp->d_namlen. 3128 */ 3129 dp->d_type = dp->d_namlen; 3130 dp->d_namlen = 0; 3131 # else 3132 /* 3133 * The dp->d_type is the high byte 3134 * of the expected dp->d_namlen, 3135 * so must be zero'ed. 3136 */ 3137 dp->d_type = 0; 3138 # endif 3139 if (dp->d_reclen > 0) { 3140 dp = (struct dirent *) 3141 ((char *)dp + dp->d_reclen); 3142 } else { 3143 error = EIO; 3144 break; 3145 } 3146 } 3147 if (dp >= edp) 3148 error = uiomove(dirbuf, readcnt, &auio); 3149 } 3150 FREE(dirbuf, M_TEMP); 3151 } 3152 VOP_UNLOCK(vp, 0, td); 3153 if (error) { 3154 fdrop(fp, td); 3155 return (error); 3156 } 3157 if (uap->count == auio.uio_resid) { 3158 if (union_dircheckp) { 3159 error = union_dircheckp(td, &vp, fp); 3160 if (error == -1) 3161 goto unionread; 3162 if (error) { 3163 fdrop(fp, td); 3164 return (error); 3165 } 3166 } 3167 /* 3168 * XXX We could delay dropping the lock above but 3169 * union_dircheckp complicates things. 3170 */ 3171 vn_lock(vp, LK_EXCLUSIVE|LK_RETRY, td); 3172 if ((vp->v_vflag & VV_ROOT) && 3173 (vp->v_mount->mnt_flag & MNT_UNION)) { 3174 struct vnode *tvp = vp; 3175 vp = vp->v_mount->mnt_vnodecovered; 3176 VREF(vp); 3177 fp->f_data = vp; 3178 fp->f_offset = 0; 3179 vput(tvp); 3180 goto unionread; 3181 } 3182 VOP_UNLOCK(vp, 0, td); 3183 } 3184 error = copyout(&loff, uap->basep, sizeof(long)); 3185 fdrop(fp, td); 3186 td->td_retval[0] = uap->count - auio.uio_resid; 3187 return (error); 3188 } 3189 #endif /* COMPAT_43 */ 3190 3191 /* 3192 * Read a block of directory entries in a filesystem independent format. 3193 */ 3194 #ifndef _SYS_SYSPROTO_H_ 3195 struct getdirentries_args { 3196 int fd; 3197 char *buf; 3198 u_int count; 3199 long *basep; 3200 }; 3201 #endif 3202 int 3203 getdirentries(td, uap) 3204 struct thread *td; 3205 register struct getdirentries_args /* { 3206 int fd; 3207 char *buf; 3208 u_int count; 3209 long *basep; 3210 } */ *uap; 3211 { 3212 struct vnode *vp; 3213 struct file *fp; 3214 struct uio auio; 3215 struct iovec aiov; 3216 long loff; 3217 int error, eofflag; 3218 3219 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3220 return (error); 3221 if ((fp->f_flag & FREAD) == 0) { 3222 fdrop(fp, td); 3223 return (EBADF); 3224 } 3225 vp = fp->f_data; 3226 unionread: 3227 if (vp->v_type != VDIR) { 3228 fdrop(fp, td); 3229 return (EINVAL); 3230 } 3231 aiov.iov_base = uap->buf; 3232 aiov.iov_len = uap->count; 3233 auio.uio_iov = &aiov; 3234 auio.uio_iovcnt = 1; 3235 auio.uio_rw = UIO_READ; 3236 auio.uio_segflg = UIO_USERSPACE; 3237 auio.uio_td = td; 3238 auio.uio_resid = uap->count; 3239 /* vn_lock(vp, LK_SHARED | LK_RETRY, td); */ 3240 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3241 loff = auio.uio_offset = fp->f_offset; 3242 #ifdef MAC 3243 error = mac_check_vnode_readdir(td->td_ucred, vp); 3244 if (error == 0) 3245 #endif 3246 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, NULL, 3247 NULL); 3248 fp->f_offset = auio.uio_offset; 3249 VOP_UNLOCK(vp, 0, td); 3250 if (error) { 3251 fdrop(fp, td); 3252 return (error); 3253 } 3254 if (uap->count == auio.uio_resid) { 3255 if (union_dircheckp) { 3256 error = union_dircheckp(td, &vp, fp); 3257 if (error == -1) 3258 goto unionread; 3259 if (error) { 3260 fdrop(fp, td); 3261 return (error); 3262 } 3263 } 3264 /* 3265 * XXX We could delay dropping the lock above but 3266 * union_dircheckp complicates things. 3267 */ 3268 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3269 if ((vp->v_vflag & VV_ROOT) && 3270 (vp->v_mount->mnt_flag & MNT_UNION)) { 3271 struct vnode *tvp = vp; 3272 vp = vp->v_mount->mnt_vnodecovered; 3273 VREF(vp); 3274 fp->f_data = vp; 3275 fp->f_offset = 0; 3276 vput(tvp); 3277 goto unionread; 3278 } 3279 VOP_UNLOCK(vp, 0, td); 3280 } 3281 if (uap->basep != NULL) { 3282 error = copyout(&loff, uap->basep, sizeof(long)); 3283 } 3284 td->td_retval[0] = uap->count - auio.uio_resid; 3285 fdrop(fp, td); 3286 return (error); 3287 } 3288 #ifndef _SYS_SYSPROTO_H_ 3289 struct getdents_args { 3290 int fd; 3291 char *buf; 3292 size_t count; 3293 }; 3294 #endif 3295 int 3296 getdents(td, uap) 3297 struct thread *td; 3298 register struct getdents_args /* { 3299 int fd; 3300 char *buf; 3301 u_int count; 3302 } */ *uap; 3303 { 3304 struct getdirentries_args ap; 3305 ap.fd = uap->fd; 3306 ap.buf = uap->buf; 3307 ap.count = uap->count; 3308 ap.basep = NULL; 3309 return getdirentries(td, &ap); 3310 } 3311 3312 /* 3313 * Set the mode mask for creation of filesystem nodes. 3314 * 3315 * MP SAFE 3316 */ 3317 #ifndef _SYS_SYSPROTO_H_ 3318 struct umask_args { 3319 int newmask; 3320 }; 3321 #endif 3322 int 3323 umask(td, uap) 3324 struct thread *td; 3325 struct umask_args /* { 3326 int newmask; 3327 } */ *uap; 3328 { 3329 register struct filedesc *fdp; 3330 3331 FILEDESC_LOCK(td->td_proc->p_fd); 3332 fdp = td->td_proc->p_fd; 3333 td->td_retval[0] = fdp->fd_cmask; 3334 fdp->fd_cmask = uap->newmask & ALLPERMS; 3335 FILEDESC_UNLOCK(td->td_proc->p_fd); 3336 return (0); 3337 } 3338 3339 /* 3340 * Void all references to file by ripping underlying filesystem 3341 * away from vnode. 3342 */ 3343 #ifndef _SYS_SYSPROTO_H_ 3344 struct revoke_args { 3345 char *path; 3346 }; 3347 #endif 3348 /* ARGSUSED */ 3349 int 3350 revoke(td, uap) 3351 struct thread *td; 3352 register struct revoke_args /* { 3353 char *path; 3354 } */ *uap; 3355 { 3356 struct mount *mp; 3357 struct vnode *vp; 3358 struct vattr vattr; 3359 int error; 3360 struct nameidata nd; 3361 3362 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->path, td); 3363 if ((error = namei(&nd)) != 0) 3364 return (error); 3365 vp = nd.ni_vp; 3366 NDFREE(&nd, NDF_ONLY_PNBUF); 3367 if (vp->v_type != VCHR) { 3368 vput(vp); 3369 return (EINVAL); 3370 } 3371 #ifdef MAC 3372 error = mac_check_vnode_revoke(td->td_ucred, vp); 3373 if (error) { 3374 vput(vp); 3375 return (error); 3376 } 3377 #endif 3378 error = VOP_GETATTR(vp, &vattr, td->td_ucred, td); 3379 if (error) { 3380 vput(vp); 3381 return (error); 3382 } 3383 VOP_UNLOCK(vp, 0, td); 3384 if (td->td_ucred->cr_uid != vattr.va_uid) { 3385 error = suser_cred(td->td_ucred, PRISON_ROOT); 3386 if (error) 3387 goto out; 3388 } 3389 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3390 goto out; 3391 if (vcount(vp) > 1) 3392 VOP_REVOKE(vp, REVOKEALL); 3393 vn_finished_write(mp); 3394 out: 3395 vrele(vp); 3396 return (error); 3397 } 3398 3399 /* 3400 * Convert a user file descriptor to a kernel file entry. 3401 * The file entry is locked upon returning. 3402 */ 3403 int 3404 getvnode(fdp, fd, fpp) 3405 struct filedesc *fdp; 3406 int fd; 3407 struct file **fpp; 3408 { 3409 int error; 3410 struct file *fp; 3411 3412 fp = NULL; 3413 if (fdp == NULL) 3414 error = EBADF; 3415 else { 3416 FILEDESC_LOCK(fdp); 3417 if ((u_int)fd >= fdp->fd_nfiles || 3418 (fp = fdp->fd_ofiles[fd]) == NULL) 3419 error = EBADF; 3420 else if (fp->f_type != DTYPE_VNODE && fp->f_type != DTYPE_FIFO) { 3421 fp = NULL; 3422 error = EINVAL; 3423 } else { 3424 fhold(fp); 3425 error = 0; 3426 } 3427 FILEDESC_UNLOCK(fdp); 3428 } 3429 *fpp = fp; 3430 return (error); 3431 } 3432 /* 3433 * Get (NFS) file handle 3434 */ 3435 #ifndef _SYS_SYSPROTO_H_ 3436 struct getfh_args { 3437 char *fname; 3438 fhandle_t *fhp; 3439 }; 3440 #endif 3441 int 3442 getfh(td, uap) 3443 struct thread *td; 3444 register struct getfh_args *uap; 3445 { 3446 struct nameidata nd; 3447 fhandle_t fh; 3448 register struct vnode *vp; 3449 int error; 3450 3451 /* 3452 * Must be super user 3453 */ 3454 error = suser(td); 3455 if (error) 3456 return (error); 3457 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->fname, td); 3458 error = namei(&nd); 3459 if (error) 3460 return (error); 3461 NDFREE(&nd, NDF_ONLY_PNBUF); 3462 vp = nd.ni_vp; 3463 bzero(&fh, sizeof(fh)); 3464 fh.fh_fsid = vp->v_mount->mnt_stat.f_fsid; 3465 error = VFS_VPTOFH(vp, &fh.fh_fid); 3466 vput(vp); 3467 if (error) 3468 return (error); 3469 error = copyout(&fh, uap->fhp, sizeof (fh)); 3470 return (error); 3471 } 3472 3473 /* 3474 * syscall for the rpc.lockd to use to translate a NFS file handle into 3475 * an open descriptor. 3476 * 3477 * warning: do not remove the suser() call or this becomes one giant 3478 * security hole. 3479 */ 3480 #ifndef _SYS_SYSPROTO_H_ 3481 struct fhopen_args { 3482 const struct fhandle *u_fhp; 3483 int flags; 3484 }; 3485 #endif 3486 int 3487 fhopen(td, uap) 3488 struct thread *td; 3489 struct fhopen_args /* { 3490 const struct fhandle *u_fhp; 3491 int flags; 3492 } */ *uap; 3493 { 3494 struct proc *p = td->td_proc; 3495 struct mount *mp; 3496 struct vnode *vp; 3497 struct fhandle fhp; 3498 struct vattr vat; 3499 struct vattr *vap = &vat; 3500 struct flock lf; 3501 struct file *fp; 3502 register struct filedesc *fdp = p->p_fd; 3503 int fmode, mode, error, type; 3504 struct file *nfp; 3505 int indx; 3506 3507 /* 3508 * Must be super user 3509 */ 3510 error = suser(td); 3511 if (error) 3512 return (error); 3513 3514 fmode = FFLAGS(uap->flags); 3515 /* why not allow a non-read/write open for our lockd? */ 3516 if (((fmode & (FREAD | FWRITE)) == 0) || (fmode & O_CREAT)) 3517 return (EINVAL); 3518 error = copyin(uap->u_fhp, &fhp, sizeof(fhp)); 3519 if (error) 3520 return(error); 3521 /* find the mount point */ 3522 mp = vfs_getvfs(&fhp.fh_fsid); 3523 if (mp == NULL) 3524 return (ESTALE); 3525 /* now give me my vnode, it gets returned to me locked */ 3526 error = VFS_FHTOVP(mp, &fhp.fh_fid, &vp); 3527 if (error) 3528 return (error); 3529 /* 3530 * from now on we have to make sure not 3531 * to forget about the vnode 3532 * any error that causes an abort must vput(vp) 3533 * just set error = err and 'goto bad;'. 3534 */ 3535 3536 /* 3537 * from vn_open 3538 */ 3539 if (vp->v_type == VLNK) { 3540 error = EMLINK; 3541 goto bad; 3542 } 3543 if (vp->v_type == VSOCK) { 3544 error = EOPNOTSUPP; 3545 goto bad; 3546 } 3547 mode = 0; 3548 if (fmode & (FWRITE | O_TRUNC)) { 3549 if (vp->v_type == VDIR) { 3550 error = EISDIR; 3551 goto bad; 3552 } 3553 error = vn_writechk(vp); 3554 if (error) 3555 goto bad; 3556 mode |= VWRITE; 3557 } 3558 if (fmode & FREAD) 3559 mode |= VREAD; 3560 if (fmode & O_APPEND) 3561 mode |= VAPPEND; 3562 #ifdef MAC 3563 error = mac_check_vnode_open(td->td_ucred, vp, mode); 3564 if (error) 3565 goto bad; 3566 #endif 3567 if (mode) { 3568 error = VOP_ACCESS(vp, mode, td->td_ucred, td); 3569 if (error) 3570 goto bad; 3571 } 3572 if (fmode & O_TRUNC) { 3573 VOP_UNLOCK(vp, 0, td); /* XXX */ 3574 if ((error = vn_start_write(NULL, &mp, V_WAIT | PCATCH)) != 0) { 3575 vrele(vp); 3576 return (error); 3577 } 3578 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3579 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); /* XXX */ 3580 #ifdef MAC 3581 /* 3582 * We don't yet have fp->f_cred, so use td->td_ucred, which 3583 * should be right. 3584 */ 3585 error = mac_check_vnode_write(td->td_ucred, td->td_ucred, vp); 3586 if (error == 0) { 3587 #endif 3588 VATTR_NULL(vap); 3589 vap->va_size = 0; 3590 error = VOP_SETATTR(vp, vap, td->td_ucred, td); 3591 #ifdef MAC 3592 } 3593 #endif 3594 vn_finished_write(mp); 3595 if (error) 3596 goto bad; 3597 } 3598 error = VOP_OPEN(vp, fmode, td->td_ucred, td); 3599 if (error) 3600 goto bad; 3601 /* 3602 * Make sure that a VM object is created for VMIO support. 3603 */ 3604 if (vn_canvmio(vp) == TRUE) { 3605 if ((error = vfs_object_create(vp, td, td->td_ucred)) != 0) 3606 goto bad; 3607 } 3608 if (fmode & FWRITE) 3609 vp->v_writecount++; 3610 3611 /* 3612 * end of vn_open code 3613 */ 3614 3615 if ((error = falloc(td, &nfp, &indx)) != 0) { 3616 if (fmode & FWRITE) 3617 vp->v_writecount--; 3618 goto bad; 3619 } 3620 fp = nfp; 3621 3622 /* 3623 * Hold an extra reference to avoid having fp ripped out 3624 * from under us while we block in the lock op 3625 */ 3626 fhold(fp); 3627 nfp->f_data = vp; 3628 nfp->f_flag = fmode & FMASK; 3629 nfp->f_ops = &vnops; 3630 nfp->f_type = DTYPE_VNODE; 3631 if (fmode & (O_EXLOCK | O_SHLOCK)) { 3632 lf.l_whence = SEEK_SET; 3633 lf.l_start = 0; 3634 lf.l_len = 0; 3635 if (fmode & O_EXLOCK) 3636 lf.l_type = F_WRLCK; 3637 else 3638 lf.l_type = F_RDLCK; 3639 type = F_FLOCK; 3640 if ((fmode & FNONBLOCK) == 0) 3641 type |= F_WAIT; 3642 VOP_UNLOCK(vp, 0, td); 3643 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 3644 type)) != 0) { 3645 /* 3646 * The lock request failed. Normally close the 3647 * descriptor but handle the case where someone might 3648 * have dup()d or close()d it when we weren't looking. 3649 */ 3650 FILEDESC_LOCK(fdp); 3651 if (fdp->fd_ofiles[indx] == fp) { 3652 fdp->fd_ofiles[indx] = NULL; 3653 FILEDESC_UNLOCK(fdp); 3654 fdrop(fp, td); 3655 } else 3656 FILEDESC_UNLOCK(fdp); 3657 /* 3658 * release our private reference 3659 */ 3660 fdrop(fp, td); 3661 return(error); 3662 } 3663 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3664 fp->f_flag |= FHASLOCK; 3665 } 3666 if ((vp->v_type == VREG) && (VOP_GETVOBJECT(vp, NULL) != 0)) 3667 vfs_object_create(vp, td, td->td_ucred); 3668 3669 VOP_UNLOCK(vp, 0, td); 3670 fdrop(fp, td); 3671 td->td_retval[0] = indx; 3672 return (0); 3673 3674 bad: 3675 vput(vp); 3676 return (error); 3677 } 3678 3679 /* 3680 * Stat an (NFS) file handle. 3681 */ 3682 #ifndef _SYS_SYSPROTO_H_ 3683 struct fhstat_args { 3684 struct fhandle *u_fhp; 3685 struct stat *sb; 3686 }; 3687 #endif 3688 int 3689 fhstat(td, uap) 3690 struct thread *td; 3691 register struct fhstat_args /* { 3692 struct fhandle *u_fhp; 3693 struct stat *sb; 3694 } */ *uap; 3695 { 3696 struct stat sb; 3697 fhandle_t fh; 3698 struct mount *mp; 3699 struct vnode *vp; 3700 int error; 3701 3702 /* 3703 * Must be super user 3704 */ 3705 error = suser(td); 3706 if (error) 3707 return (error); 3708 3709 error = copyin(uap->u_fhp, &fh, sizeof(fhandle_t)); 3710 if (error) 3711 return (error); 3712 3713 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3714 return (ESTALE); 3715 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3716 return (error); 3717 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 3718 vput(vp); 3719 if (error) 3720 return (error); 3721 error = copyout(&sb, uap->sb, sizeof(sb)); 3722 return (error); 3723 } 3724 3725 /* 3726 * Implement fstatfs() for (NFS) file handles. 3727 */ 3728 #ifndef _SYS_SYSPROTO_H_ 3729 struct fhstatfs_args { 3730 struct fhandle *u_fhp; 3731 struct statfs *buf; 3732 }; 3733 #endif 3734 int 3735 fhstatfs(td, uap) 3736 struct thread *td; 3737 struct fhstatfs_args /* { 3738 struct fhandle *u_fhp; 3739 struct statfs *buf; 3740 } */ *uap; 3741 { 3742 struct statfs *sp; 3743 struct mount *mp; 3744 struct vnode *vp; 3745 struct statfs sb; 3746 fhandle_t fh; 3747 int error; 3748 3749 /* 3750 * Must be super user 3751 */ 3752 error = suser(td); 3753 if (error) 3754 return (error); 3755 3756 if ((error = copyin(uap->u_fhp, &fh, sizeof(fhandle_t))) != 0) 3757 return (error); 3758 3759 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3760 return (ESTALE); 3761 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3762 return (error); 3763 mp = vp->v_mount; 3764 sp = &mp->mnt_stat; 3765 vput(vp); 3766 #ifdef MAC 3767 error = mac_check_mount_stat(td->td_ucred, mp); 3768 if (error) 3769 return (error); 3770 #endif 3771 if ((error = VFS_STATFS(mp, sp, td)) != 0) 3772 return (error); 3773 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 3774 if (suser(td)) { 3775 bcopy(sp, &sb, sizeof(sb)); 3776 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 3777 sp = &sb; 3778 } 3779 return (copyout(sp, uap->buf, sizeof(*sp))); 3780 } 3781 3782 /* 3783 * Syscall to push extended attribute configuration information into the 3784 * VFS. Accepts a path, which it converts to a mountpoint, as well as 3785 * a command (int cmd), and attribute name and misc data. For now, the 3786 * attribute name is left in userspace for consumption by the VFS_op. 3787 * It will probably be changed to be copied into sysspace by the 3788 * syscall in the future, once issues with various consumers of the 3789 * attribute code have raised their hands. 3790 * 3791 * Currently this is used only by UFS Extended Attributes. 3792 */ 3793 int 3794 extattrctl(td, uap) 3795 struct thread *td; 3796 struct extattrctl_args /* { 3797 const char *path; 3798 int cmd; 3799 const char *filename; 3800 int attrnamespace; 3801 const char *attrname; 3802 } */ *uap; 3803 { 3804 struct vnode *filename_vp; 3805 struct nameidata nd; 3806 struct mount *mp, *mp_writable; 3807 char attrname[EXTATTR_MAXNAMELEN]; 3808 int error; 3809 3810 /* 3811 * uap->attrname is not always defined. We check again later when we 3812 * invoke the VFS call so as to pass in NULL there if needed. 3813 */ 3814 if (uap->attrname != NULL) { 3815 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, 3816 NULL); 3817 if (error) 3818 return (error); 3819 } 3820 3821 /* 3822 * uap->filename is not always defined. If it is, grab a vnode lock, 3823 * which VFS_EXTATTRCTL() will later release. 3824 */ 3825 filename_vp = NULL; 3826 if (uap->filename != NULL) { 3827 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 3828 uap->filename, td); 3829 error = namei(&nd); 3830 if (error) 3831 return (error); 3832 filename_vp = nd.ni_vp; 3833 NDFREE(&nd, NDF_NO_VP_RELE | NDF_NO_VP_UNLOCK); 3834 } 3835 3836 /* uap->path is always defined. */ 3837 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3838 error = namei(&nd); 3839 if (error) { 3840 if (filename_vp != NULL) 3841 vput(filename_vp); 3842 return (error); 3843 } 3844 mp = nd.ni_vp->v_mount; 3845 error = vn_start_write(nd.ni_vp, &mp_writable, V_WAIT | PCATCH); 3846 NDFREE(&nd, 0); 3847 if (error) { 3848 if (filename_vp != NULL) 3849 vput(filename_vp); 3850 return (error); 3851 } 3852 3853 error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, uap->attrnamespace, 3854 uap->attrname != NULL ? attrname : NULL, td); 3855 3856 vn_finished_write(mp_writable); 3857 /* 3858 * VFS_EXTATTRCTL will have unlocked, but not de-ref'd, 3859 * filename_vp, so vrele it if it is defined. 3860 */ 3861 if (filename_vp != NULL) 3862 vrele(filename_vp); 3863 return (error); 3864 } 3865 3866 /*- 3867 * Set a named extended attribute on a file or directory 3868 * 3869 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3870 * kernelspace string pointer "attrname", userspace buffer 3871 * pointer "data", buffer length "nbytes", thread "td". 3872 * Returns: 0 on success, an error number otherwise 3873 * Locks: none 3874 * References: vp must be a valid reference for the duration of the call 3875 */ 3876 static int 3877 extattr_set_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3878 void *data, size_t nbytes, struct thread *td) 3879 { 3880 struct mount *mp; 3881 struct uio auio; 3882 struct iovec aiov; 3883 ssize_t cnt; 3884 int error; 3885 3886 error = vn_start_write(vp, &mp, V_WAIT | PCATCH); 3887 if (error) 3888 return (error); 3889 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3890 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3891 3892 aiov.iov_base = data; 3893 aiov.iov_len = nbytes; 3894 auio.uio_iov = &aiov; 3895 auio.uio_iovcnt = 1; 3896 auio.uio_offset = 0; 3897 if (nbytes > INT_MAX) { 3898 error = EINVAL; 3899 goto done; 3900 } 3901 auio.uio_resid = nbytes; 3902 auio.uio_rw = UIO_WRITE; 3903 auio.uio_segflg = UIO_USERSPACE; 3904 auio.uio_td = td; 3905 cnt = nbytes; 3906 3907 #ifdef MAC 3908 error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace, 3909 attrname, &auio); 3910 if (error) 3911 goto done; 3912 #endif 3913 3914 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio, 3915 td->td_ucred, td); 3916 cnt -= auio.uio_resid; 3917 td->td_retval[0] = cnt; 3918 3919 done: 3920 VOP_UNLOCK(vp, 0, td); 3921 vn_finished_write(mp); 3922 return (error); 3923 } 3924 3925 int 3926 extattr_set_fd(td, uap) 3927 struct thread *td; 3928 struct extattr_set_fd_args /* { 3929 int fd; 3930 int attrnamespace; 3931 const char *attrname; 3932 void *data; 3933 size_t nbytes; 3934 } */ *uap; 3935 { 3936 struct file *fp; 3937 char attrname[EXTATTR_MAXNAMELEN]; 3938 int error; 3939 3940 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3941 if (error) 3942 return (error); 3943 3944 error = getvnode(td->td_proc->p_fd, uap->fd, &fp); 3945 if (error) 3946 return (error); 3947 3948 error = extattr_set_vp(fp->f_data, uap->attrnamespace, 3949 attrname, uap->data, uap->nbytes, td); 3950 fdrop(fp, td); 3951 3952 return (error); 3953 } 3954 3955 int 3956 extattr_set_file(td, uap) 3957 struct thread *td; 3958 struct extattr_set_file_args /* { 3959 const char *path; 3960 int attrnamespace; 3961 const char *attrname; 3962 void *data; 3963 size_t nbytes; 3964 } */ *uap; 3965 { 3966 struct nameidata nd; 3967 char attrname[EXTATTR_MAXNAMELEN]; 3968 int error; 3969 3970 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3971 if (error) 3972 return (error); 3973 3974 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3975 error = namei(&nd); 3976 if (error) 3977 return (error); 3978 NDFREE(&nd, NDF_ONLY_PNBUF); 3979 3980 error = extattr_set_vp(nd.ni_vp, uap->attrnamespace, attrname, 3981 uap->data, uap->nbytes, td); 3982 3983 vrele(nd.ni_vp); 3984 return (error); 3985 } 3986 3987 int 3988 extattr_set_link(td, uap) 3989 struct thread *td; 3990 struct extattr_set_link_args /* { 3991 const char *path; 3992 int attrnamespace; 3993 const char *attrname; 3994 void *data; 3995 size_t nbytes; 3996 } */ *uap; 3997 { 3998 struct nameidata nd; 3999 char attrname[EXTATTR_MAXNAMELEN]; 4000 int error; 4001 4002 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4003 if (error) 4004 return (error); 4005 4006 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, uap->path, td); 4007 error = namei(&nd); 4008 if (error) 4009 return (error); 4010 NDFREE(&nd, NDF_ONLY_PNBUF); 4011 4012 error = extattr_set_vp(nd.ni_vp, uap->attrnamespace, attrname, 4013 uap->data, uap->nbytes, td); 4014 4015 vrele(nd.ni_vp); 4016 return (error); 4017 } 4018 4019 /*- 4020 * Get a named extended attribute on a file or directory 4021 * 4022 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 4023 * kernelspace string pointer "attrname", userspace buffer 4024 * pointer "data", buffer length "nbytes", thread "td". 4025 * Returns: 0 on success, an error number otherwise 4026 * Locks: none 4027 * References: vp must be a valid reference for the duration of the call 4028 */ 4029 static int 4030 extattr_get_vp(struct vnode *vp, int attrnamespace, const char *attrname, 4031 void *data, size_t nbytes, struct thread *td) 4032 { 4033 struct uio auio, *auiop; 4034 struct iovec aiov; 4035 ssize_t cnt; 4036 size_t size, *sizep; 4037 int error; 4038 4039 VOP_LEASE(vp, td, td->td_ucred, LEASE_READ); 4040 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 4041 4042 /* 4043 * Slightly unusual semantics: if the user provides a NULL data 4044 * pointer, they don't want to receive the data, just the 4045 * maximum read length. 4046 */ 4047 auiop = NULL; 4048 sizep = NULL; 4049 cnt = 0; 4050 if (data != NULL) { 4051 aiov.iov_base = data; 4052 aiov.iov_len = nbytes; 4053 auio.uio_iov = &aiov; 4054 auio.uio_offset = 0; 4055 if (nbytes > INT_MAX) { 4056 error = EINVAL; 4057 goto done; 4058 } 4059 auio.uio_resid = nbytes; 4060 auio.uio_rw = UIO_READ; 4061 auio.uio_segflg = UIO_USERSPACE; 4062 auio.uio_td = td; 4063 auiop = &auio; 4064 cnt = nbytes; 4065 } else 4066 sizep = &size; 4067 4068 #ifdef MAC 4069 error = mac_check_vnode_getextattr(td->td_ucred, vp, attrnamespace, 4070 attrname, &auio); 4071 if (error) 4072 goto done; 4073 #endif 4074 4075 error = VOP_GETEXTATTR(vp, attrnamespace, attrname, auiop, sizep, 4076 td->td_ucred, td); 4077 4078 if (auiop != NULL) { 4079 cnt -= auio.uio_resid; 4080 td->td_retval[0] = cnt; 4081 } else 4082 td->td_retval[0] = size; 4083 4084 done: 4085 VOP_UNLOCK(vp, 0, td); 4086 return (error); 4087 } 4088 4089 int 4090 extattr_get_fd(td, uap) 4091 struct thread *td; 4092 struct extattr_get_fd_args /* { 4093 int fd; 4094 int attrnamespace; 4095 const char *attrname; 4096 void *data; 4097 size_t nbytes; 4098 } */ *uap; 4099 { 4100 struct file *fp; 4101 char attrname[EXTATTR_MAXNAMELEN]; 4102 int error; 4103 4104 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4105 if (error) 4106 return (error); 4107 4108 error = getvnode(td->td_proc->p_fd, uap->fd, &fp); 4109 if (error) 4110 return (error); 4111 4112 error = extattr_get_vp(fp->f_data, uap->attrnamespace, 4113 attrname, uap->data, uap->nbytes, td); 4114 4115 fdrop(fp, td); 4116 return (error); 4117 } 4118 4119 int 4120 extattr_get_file(td, uap) 4121 struct thread *td; 4122 struct extattr_get_file_args /* { 4123 const char *path; 4124 int attrnamespace; 4125 const char *attrname; 4126 void *data; 4127 size_t nbytes; 4128 } */ *uap; 4129 { 4130 struct nameidata nd; 4131 char attrname[EXTATTR_MAXNAMELEN]; 4132 int error; 4133 4134 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4135 if (error) 4136 return (error); 4137 4138 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 4139 error = namei(&nd); 4140 if (error) 4141 return (error); 4142 NDFREE(&nd, NDF_ONLY_PNBUF); 4143 4144 error = extattr_get_vp(nd.ni_vp, uap->attrnamespace, attrname, 4145 uap->data, uap->nbytes, td); 4146 4147 vrele(nd.ni_vp); 4148 return (error); 4149 } 4150 4151 int 4152 extattr_get_link(td, uap) 4153 struct thread *td; 4154 struct extattr_get_link_args /* { 4155 const char *path; 4156 int attrnamespace; 4157 const char *attrname; 4158 void *data; 4159 size_t nbytes; 4160 } */ *uap; 4161 { 4162 struct nameidata nd; 4163 char attrname[EXTATTR_MAXNAMELEN]; 4164 int error; 4165 4166 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4167 if (error) 4168 return (error); 4169 4170 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, uap->path, td); 4171 error = namei(&nd); 4172 if (error) 4173 return (error); 4174 NDFREE(&nd, NDF_ONLY_PNBUF); 4175 4176 error = extattr_get_vp(nd.ni_vp, uap->attrnamespace, attrname, 4177 uap->data, uap->nbytes, td); 4178 4179 vrele(nd.ni_vp); 4180 return (error); 4181 } 4182 4183 /* 4184 * extattr_delete_vp(): Delete a named extended attribute on a file or 4185 * directory 4186 * 4187 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 4188 * kernelspace string pointer "attrname", proc "p" 4189 * Returns: 0 on success, an error number otherwise 4190 * Locks: none 4191 * References: vp must be a valid reference for the duration of the call 4192 */ 4193 static int 4194 extattr_delete_vp(struct vnode *vp, int attrnamespace, const char *attrname, 4195 struct thread *td) 4196 { 4197 struct mount *mp; 4198 int error; 4199 4200 error = vn_start_write(vp, &mp, V_WAIT | PCATCH); 4201 if (error) 4202 return (error); 4203 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 4204 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 4205 4206 #ifdef MAC 4207 error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace, 4208 attrname, NULL); 4209 if (error) 4210 goto done; 4211 #endif 4212 4213 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, td->td_ucred, 4214 td); 4215 #ifdef MAC 4216 done: 4217 #endif 4218 VOP_UNLOCK(vp, 0, td); 4219 vn_finished_write(mp); 4220 return (error); 4221 } 4222 4223 int 4224 extattr_delete_fd(td, uap) 4225 struct thread *td; 4226 struct extattr_delete_fd_args /* { 4227 int fd; 4228 int attrnamespace; 4229 const char *attrname; 4230 } */ *uap; 4231 { 4232 struct file *fp; 4233 struct vnode *vp; 4234 char attrname[EXTATTR_MAXNAMELEN]; 4235 int error; 4236 4237 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4238 if (error) 4239 return (error); 4240 4241 error = getvnode(td->td_proc->p_fd, uap->fd, &fp); 4242 if (error) 4243 return (error); 4244 vp = fp->f_data; 4245 4246 error = extattr_delete_vp(vp, uap->attrnamespace, attrname, td); 4247 fdrop(fp, td); 4248 return (error); 4249 } 4250 4251 int 4252 extattr_delete_file(td, uap) 4253 struct thread *td; 4254 struct extattr_delete_file_args /* { 4255 const char *path; 4256 int attrnamespace; 4257 const char *attrname; 4258 } */ *uap; 4259 { 4260 struct nameidata nd; 4261 char attrname[EXTATTR_MAXNAMELEN]; 4262 int error; 4263 4264 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4265 if (error) 4266 return(error); 4267 4268 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 4269 error = namei(&nd); 4270 if (error) 4271 return(error); 4272 NDFREE(&nd, NDF_ONLY_PNBUF); 4273 4274 error = extattr_delete_vp(nd.ni_vp, uap->attrnamespace, attrname, td); 4275 vrele(nd.ni_vp); 4276 return(error); 4277 } 4278 4279 int 4280 extattr_delete_link(td, uap) 4281 struct thread *td; 4282 struct extattr_delete_link_args /* { 4283 const char *path; 4284 int attrnamespace; 4285 const char *attrname; 4286 } */ *uap; 4287 { 4288 struct nameidata nd; 4289 char attrname[EXTATTR_MAXNAMELEN]; 4290 int error; 4291 4292 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 4293 if (error) 4294 return(error); 4295 4296 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, uap->path, td); 4297 error = namei(&nd); 4298 if (error) 4299 return(error); 4300 NDFREE(&nd, NDF_ONLY_PNBUF); 4301 4302 error = extattr_delete_vp(nd.ni_vp, uap->attrnamespace, attrname, td); 4303 vrele(nd.ni_vp); 4304 return(error); 4305 } 4306