1 /* 2 * Copyright (c) 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_syscalls.c 8.13 (Berkeley) 4/15/94 39 * $FreeBSD$ 40 */ 41 42 /* For 4.3 integer FS ID compatibility */ 43 #include "opt_compat.h" 44 45 #include <sys/param.h> 46 #include <sys/systm.h> 47 #include <sys/bio.h> 48 #include <sys/buf.h> 49 #include <sys/sysent.h> 50 #include <sys/malloc.h> 51 #include <sys/mount.h> 52 #include <sys/mutex.h> 53 #include <sys/sysproto.h> 54 #include <sys/namei.h> 55 #include <sys/filedesc.h> 56 #include <sys/kernel.h> 57 #include <sys/fcntl.h> 58 #include <sys/file.h> 59 #include <sys/linker.h> 60 #include <sys/stat.h> 61 #include <sys/sx.h> 62 #include <sys/unistd.h> 63 #include <sys/vnode.h> 64 #include <sys/proc.h> 65 #include <sys/dirent.h> 66 #include <sys/extattr.h> 67 #include <sys/jail.h> 68 #include <sys/sysctl.h> 69 70 #include <machine/limits.h> 71 #include <machine/stdarg.h> 72 73 #include <vm/vm.h> 74 #include <vm/vm_object.h> 75 #include <vm/vm_page.h> 76 #include <vm/uma.h> 77 78 static int change_dir(struct nameidata *ndp, struct thread *td); 79 static int chroot_refuse_vdir_fds(struct filedesc *fdp); 80 static int getutimes(const struct timeval *, struct timespec *); 81 static int setfown(struct thread *td, struct vnode *, uid_t, gid_t); 82 static int setfmode(struct thread *td, struct vnode *, int); 83 static int setfflags(struct thread *td, struct vnode *, int); 84 static int setutimes(struct thread *td, struct vnode *, 85 const struct timespec *, int, int); 86 static int vn_access(struct vnode *vp, int user_flags, struct ucred *cred, 87 struct thread *td); 88 89 int (*union_dircheckp)(struct thread *td, struct vnode **, struct file *); 90 int (*softdep_fsync_hook)(struct vnode *); 91 92 /* 93 * Sync each mounted filesystem. 94 */ 95 #ifndef _SYS_SYSPROTO_H_ 96 struct sync_args { 97 int dummy; 98 }; 99 #endif 100 101 #ifdef DEBUG 102 static int syncprt = 0; 103 SYSCTL_INT(_debug, OID_AUTO, syncprt, CTLFLAG_RW, &syncprt, 0, ""); 104 #endif 105 106 /* ARGSUSED */ 107 int 108 sync(td, uap) 109 struct thread *td; 110 struct sync_args *uap; 111 { 112 struct mount *mp, *nmp; 113 int asyncflag; 114 115 mtx_lock(&mountlist_mtx); 116 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 117 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 118 nmp = TAILQ_NEXT(mp, mnt_list); 119 continue; 120 } 121 if ((mp->mnt_flag & MNT_RDONLY) == 0 && 122 vn_start_write(NULL, &mp, V_NOWAIT) == 0) { 123 asyncflag = mp->mnt_flag & MNT_ASYNC; 124 mp->mnt_flag &= ~MNT_ASYNC; 125 vfs_msync(mp, MNT_NOWAIT); 126 VFS_SYNC(mp, MNT_NOWAIT, 127 ((td != NULL) ? td->td_ucred : NOCRED), td); 128 mp->mnt_flag |= asyncflag; 129 vn_finished_write(mp); 130 } 131 mtx_lock(&mountlist_mtx); 132 nmp = TAILQ_NEXT(mp, mnt_list); 133 vfs_unbusy(mp, td); 134 } 135 mtx_unlock(&mountlist_mtx); 136 #if 0 137 /* 138 * XXX don't call vfs_bufstats() yet because that routine 139 * was not imported in the Lite2 merge. 140 */ 141 #ifdef DIAGNOSTIC 142 if (syncprt) 143 vfs_bufstats(); 144 #endif /* DIAGNOSTIC */ 145 #endif 146 return (0); 147 } 148 149 /* XXX PRISON: could be per prison flag */ 150 static int prison_quotas; 151 #if 0 152 SYSCTL_INT(_kern_prison, OID_AUTO, quotas, CTLFLAG_RW, &prison_quotas, 0, ""); 153 #endif 154 155 /* 156 * Change filesystem quotas. 157 */ 158 #ifndef _SYS_SYSPROTO_H_ 159 struct quotactl_args { 160 char *path; 161 int cmd; 162 int uid; 163 caddr_t arg; 164 }; 165 #endif 166 /* ARGSUSED */ 167 int 168 quotactl(td, uap) 169 struct thread *td; 170 register struct quotactl_args /* { 171 syscallarg(char *) path; 172 syscallarg(int) cmd; 173 syscallarg(int) uid; 174 syscallarg(caddr_t) arg; 175 } */ *uap; 176 { 177 struct mount *mp; 178 int error; 179 struct nameidata nd; 180 181 if (jailed(td->td_ucred) && !prison_quotas) 182 return (EPERM); 183 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 184 if ((error = namei(&nd)) != 0) 185 return (error); 186 NDFREE(&nd, NDF_ONLY_PNBUF); 187 error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH); 188 vrele(nd.ni_vp); 189 if (error) 190 return (error); 191 error = VFS_QUOTACTL(mp, SCARG(uap, cmd), SCARG(uap, uid), 192 SCARG(uap, arg), td); 193 vn_finished_write(mp); 194 return (error); 195 } 196 197 /* 198 * Get filesystem statistics. 199 */ 200 #ifndef _SYS_SYSPROTO_H_ 201 struct statfs_args { 202 char *path; 203 struct statfs *buf; 204 }; 205 #endif 206 /* ARGSUSED */ 207 int 208 statfs(td, uap) 209 struct thread *td; 210 register struct statfs_args /* { 211 syscallarg(char *) path; 212 syscallarg(struct statfs *) buf; 213 } */ *uap; 214 { 215 register struct mount *mp; 216 register struct statfs *sp; 217 int error; 218 struct nameidata nd; 219 struct statfs sb; 220 221 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 222 if ((error = namei(&nd)) != 0) 223 return (error); 224 mp = nd.ni_vp->v_mount; 225 sp = &mp->mnt_stat; 226 NDFREE(&nd, NDF_ONLY_PNBUF); 227 vrele(nd.ni_vp); 228 error = VFS_STATFS(mp, sp, td); 229 if (error) 230 return (error); 231 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 232 if (suser(td)) { 233 bcopy(sp, &sb, sizeof(sb)); 234 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 235 sp = &sb; 236 } 237 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 238 } 239 240 /* 241 * Get filesystem statistics. 242 */ 243 #ifndef _SYS_SYSPROTO_H_ 244 struct fstatfs_args { 245 int fd; 246 struct statfs *buf; 247 }; 248 #endif 249 /* ARGSUSED */ 250 int 251 fstatfs(td, uap) 252 struct thread *td; 253 register struct fstatfs_args /* { 254 syscallarg(int) fd; 255 syscallarg(struct statfs *) buf; 256 } */ *uap; 257 { 258 struct file *fp; 259 struct mount *mp; 260 register struct statfs *sp; 261 int error; 262 struct statfs sb; 263 264 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 265 return (error); 266 mp = ((struct vnode *)fp->f_data)->v_mount; 267 fdrop(fp, td); 268 if (mp == NULL) 269 return (EBADF); 270 sp = &mp->mnt_stat; 271 error = VFS_STATFS(mp, sp, td); 272 if (error) 273 return (error); 274 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 275 if (suser(td)) { 276 bcopy(sp, &sb, sizeof(sb)); 277 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 278 sp = &sb; 279 } 280 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 281 } 282 283 /* 284 * Get statistics on all filesystems. 285 */ 286 #ifndef _SYS_SYSPROTO_H_ 287 struct getfsstat_args { 288 struct statfs *buf; 289 long bufsize; 290 int flags; 291 }; 292 #endif 293 int 294 getfsstat(td, uap) 295 struct thread *td; 296 register struct getfsstat_args /* { 297 syscallarg(struct statfs *) buf; 298 syscallarg(long) bufsize; 299 syscallarg(int) flags; 300 } */ *uap; 301 { 302 register struct mount *mp, *nmp; 303 register struct statfs *sp; 304 caddr_t sfsp; 305 long count, maxcount, error; 306 307 maxcount = SCARG(uap, bufsize) / sizeof(struct statfs); 308 sfsp = (caddr_t)SCARG(uap, buf); 309 count = 0; 310 mtx_lock(&mountlist_mtx); 311 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 312 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 313 nmp = TAILQ_NEXT(mp, mnt_list); 314 continue; 315 } 316 if (sfsp && count < maxcount) { 317 sp = &mp->mnt_stat; 318 /* 319 * If MNT_NOWAIT or MNT_LAZY is specified, do not 320 * refresh the fsstat cache. MNT_NOWAIT or MNT_LAZY 321 * overrides MNT_WAIT. 322 */ 323 if (((SCARG(uap, flags) & (MNT_LAZY|MNT_NOWAIT)) == 0 || 324 (SCARG(uap, flags) & MNT_WAIT)) && 325 (error = VFS_STATFS(mp, sp, td))) { 326 mtx_lock(&mountlist_mtx); 327 nmp = TAILQ_NEXT(mp, mnt_list); 328 vfs_unbusy(mp, td); 329 continue; 330 } 331 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 332 error = copyout(sp, sfsp, sizeof(*sp)); 333 if (error) { 334 vfs_unbusy(mp, td); 335 return (error); 336 } 337 sfsp += sizeof(*sp); 338 } 339 count++; 340 mtx_lock(&mountlist_mtx); 341 nmp = TAILQ_NEXT(mp, mnt_list); 342 vfs_unbusy(mp, td); 343 } 344 mtx_unlock(&mountlist_mtx); 345 if (sfsp && count > maxcount) 346 td->td_retval[0] = maxcount; 347 else 348 td->td_retval[0] = count; 349 return (0); 350 } 351 352 /* 353 * Change current working directory to a given file descriptor. 354 */ 355 #ifndef _SYS_SYSPROTO_H_ 356 struct fchdir_args { 357 int fd; 358 }; 359 #endif 360 /* ARGSUSED */ 361 int 362 fchdir(td, uap) 363 struct thread *td; 364 struct fchdir_args /* { 365 syscallarg(int) fd; 366 } */ *uap; 367 { 368 register struct filedesc *fdp = td->td_proc->p_fd; 369 struct vnode *vp, *tdp, *vpold; 370 struct mount *mp; 371 struct file *fp; 372 int error; 373 374 if ((error = getvnode(fdp, SCARG(uap, fd), &fp)) != 0) 375 return (error); 376 vp = (struct vnode *)fp->f_data; 377 VREF(vp); 378 fdrop(fp, td); 379 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 380 if (vp->v_type != VDIR) 381 error = ENOTDIR; 382 else 383 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 384 while (!error && (mp = vp->v_mountedhere) != NULL) { 385 if (vfs_busy(mp, 0, 0, td)) 386 continue; 387 error = VFS_ROOT(mp, &tdp); 388 vfs_unbusy(mp, td); 389 if (error) 390 break; 391 vput(vp); 392 vp = tdp; 393 } 394 if (error) { 395 vput(vp); 396 return (error); 397 } 398 VOP_UNLOCK(vp, 0, td); 399 FILEDESC_LOCK(fdp); 400 vpold = fdp->fd_cdir; 401 fdp->fd_cdir = vp; 402 FILEDESC_UNLOCK(fdp); 403 vrele(vpold); 404 return (0); 405 } 406 407 /* 408 * Change current working directory (``.''). 409 */ 410 #ifndef _SYS_SYSPROTO_H_ 411 struct chdir_args { 412 char *path; 413 }; 414 #endif 415 /* ARGSUSED */ 416 int 417 chdir(td, uap) 418 struct thread *td; 419 struct chdir_args /* { 420 syscallarg(char *) path; 421 } */ *uap; 422 { 423 register struct filedesc *fdp = td->td_proc->p_fd; 424 int error; 425 struct nameidata nd; 426 struct vnode *vp; 427 428 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 429 SCARG(uap, path), td); 430 if ((error = change_dir(&nd, td)) != 0) 431 return (error); 432 NDFREE(&nd, NDF_ONLY_PNBUF); 433 FILEDESC_LOCK(fdp); 434 vp = fdp->fd_cdir; 435 fdp->fd_cdir = nd.ni_vp; 436 FILEDESC_UNLOCK(fdp); 437 vrele(vp); 438 return (0); 439 } 440 441 /* 442 * Helper function for raised chroot(2) security function: Refuse if 443 * any filedescriptors are open directories. 444 */ 445 static int 446 chroot_refuse_vdir_fds(fdp) 447 struct filedesc *fdp; 448 { 449 struct vnode *vp; 450 struct file *fp; 451 int fd; 452 453 FILEDESC_LOCK_ASSERT(fdp, MA_OWNED); 454 for (fd = 0; fd < fdp->fd_nfiles ; fd++) { 455 fp = fget_locked(fdp, fd); 456 if (fp == NULL) 457 continue; 458 if (fp->f_type == DTYPE_VNODE) { 459 vp = (struct vnode *)fp->f_data; 460 if (vp->v_type == VDIR) 461 return (EPERM); 462 } 463 } 464 return (0); 465 } 466 467 /* 468 * This sysctl determines if we will allow a process to chroot(2) if it 469 * has a directory open: 470 * 0: disallowed for all processes. 471 * 1: allowed for processes that were not already chroot(2)'ed. 472 * 2: allowed for all processes. 473 */ 474 475 static int chroot_allow_open_directories = 1; 476 477 SYSCTL_INT(_kern, OID_AUTO, chroot_allow_open_directories, CTLFLAG_RW, 478 &chroot_allow_open_directories, 0, ""); 479 480 /* 481 * Change notion of root (``/'') directory. 482 */ 483 #ifndef _SYS_SYSPROTO_H_ 484 struct chroot_args { 485 char *path; 486 }; 487 #endif 488 /* ARGSUSED */ 489 int 490 chroot(td, uap) 491 struct thread *td; 492 struct chroot_args /* { 493 syscallarg(char *) path; 494 } */ *uap; 495 { 496 register struct filedesc *fdp = td->td_proc->p_fd; 497 int error; 498 struct nameidata nd; 499 struct vnode *vp; 500 501 error = suser_cred(td->td_ucred, PRISON_ROOT); 502 if (error) 503 return (error); 504 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 505 SCARG(uap, path), td); 506 mtx_lock(&Giant); 507 if ((error = change_dir(&nd, td)) != 0) 508 goto error; 509 FILEDESC_LOCK(fdp); 510 if (chroot_allow_open_directories == 0 || 511 (chroot_allow_open_directories == 1 && fdp->fd_rdir != rootvnode)) { 512 error = chroot_refuse_vdir_fds(fdp); 513 if (error) 514 goto error_unlock; 515 } 516 vp = fdp->fd_rdir; 517 fdp->fd_rdir = nd.ni_vp; 518 if (!fdp->fd_jdir) { 519 fdp->fd_jdir = nd.ni_vp; 520 VREF(fdp->fd_jdir); 521 } 522 FILEDESC_UNLOCK(fdp); 523 NDFREE(&nd, NDF_ONLY_PNBUF); 524 vrele(vp); 525 mtx_unlock(&Giant); 526 return (0); 527 error_unlock: 528 FILEDESC_UNLOCK(fdp); 529 error: 530 mtx_unlock(&Giant); 531 NDFREE(&nd, 0); 532 return (error); 533 } 534 535 /* 536 * Common routine for chroot and chdir. 537 */ 538 static int 539 change_dir(ndp, td) 540 register struct nameidata *ndp; 541 struct thread *td; 542 { 543 struct vnode *vp; 544 int error; 545 546 error = namei(ndp); 547 if (error) 548 return (error); 549 vp = ndp->ni_vp; 550 if (vp->v_type != VDIR) 551 error = ENOTDIR; 552 else 553 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 554 if (error) 555 vput(vp); 556 else 557 VOP_UNLOCK(vp, 0, td); 558 return (error); 559 } 560 561 /* 562 * Check permissions, allocate an open file structure, 563 * and call the device open routine if any. 564 */ 565 #ifndef _SYS_SYSPROTO_H_ 566 struct open_args { 567 char *path; 568 int flags; 569 int mode; 570 }; 571 #endif 572 int 573 open(td, uap) 574 struct thread *td; 575 register struct open_args /* { 576 syscallarg(char *) path; 577 syscallarg(int) flags; 578 syscallarg(int) mode; 579 } */ *uap; 580 { 581 struct proc *p = td->td_proc; 582 struct filedesc *fdp = p->p_fd; 583 struct file *fp; 584 struct vnode *vp; 585 struct vattr vat; 586 struct mount *mp; 587 int cmode, flags, oflags; 588 struct file *nfp; 589 int type, indx, error; 590 struct flock lf; 591 struct nameidata nd; 592 593 oflags = SCARG(uap, flags); 594 if ((oflags & O_ACCMODE) == O_ACCMODE) 595 return (EINVAL); 596 flags = FFLAGS(oflags); 597 error = falloc(td, &nfp, &indx); 598 if (error) 599 return (error); 600 fp = nfp; 601 FILEDESC_LOCK(fdp); 602 cmode = ((SCARG(uap, mode) &~ fdp->fd_cmask) & ALLPERMS) &~ S_ISTXT; 603 FILEDESC_UNLOCK(fdp); 604 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 605 td->td_dupfd = -indx - 1; /* XXX check for fdopen */ 606 /* 607 * Bump the ref count to prevent another process from closing 608 * the descriptor while we are blocked in vn_open() 609 */ 610 fhold(fp); 611 error = vn_open(&nd, &flags, cmode); 612 if (error) { 613 /* 614 * release our own reference 615 */ 616 fdrop(fp, td); 617 618 /* 619 * handle special fdopen() case. bleh. dupfdopen() is 620 * responsible for dropping the old contents of ofiles[indx] 621 * if it succeeds. 622 */ 623 if ((error == ENODEV || error == ENXIO) && 624 td->td_dupfd >= 0 && /* XXX from fdopen */ 625 (error = 626 dupfdopen(td, fdp, indx, td->td_dupfd, flags, error)) == 0) { 627 td->td_retval[0] = indx; 628 return (0); 629 } 630 /* 631 * Clean up the descriptor, but only if another thread hadn't 632 * replaced or closed it. 633 */ 634 FILEDESC_LOCK(fdp); 635 if (fdp->fd_ofiles[indx] == fp) { 636 fdp->fd_ofiles[indx] = NULL; 637 FILEDESC_UNLOCK(fdp); 638 fdrop(fp, td); 639 } else 640 FILEDESC_UNLOCK(fdp); 641 642 if (error == ERESTART) 643 error = EINTR; 644 return (error); 645 } 646 td->td_dupfd = 0; 647 NDFREE(&nd, NDF_ONLY_PNBUF); 648 vp = nd.ni_vp; 649 650 /* 651 * There should be 2 references on the file, one from the descriptor 652 * table, and one for us. 653 * 654 * Handle the case where someone closed the file (via its file 655 * descriptor) while we were blocked. The end result should look 656 * like opening the file succeeded but it was immediately closed. 657 */ 658 FILEDESC_LOCK(fdp); 659 FILE_LOCK(fp); 660 if (fp->f_count == 1) { 661 KASSERT(fdp->fd_ofiles[indx] != fp, 662 ("Open file descriptor lost all refs")); 663 FILEDESC_UNLOCK(fdp); 664 FILE_UNLOCK(fp); 665 VOP_UNLOCK(vp, 0, td); 666 vn_close(vp, flags & FMASK, fp->f_cred, td); 667 fdrop(fp, td); 668 td->td_retval[0] = indx; 669 return 0; 670 } 671 672 /* assert that vn_open created a backing object if one is needed */ 673 KASSERT(!vn_canvmio(vp) || VOP_GETVOBJECT(vp, NULL) == 0, 674 ("open: vmio vnode has no backing object after vn_open")); 675 676 fp->f_data = vp; 677 fp->f_flag = flags & FMASK; 678 fp->f_ops = &vnops; 679 fp->f_type = (vp->v_type == VFIFO ? DTYPE_FIFO : DTYPE_VNODE); 680 FILEDESC_UNLOCK(fdp); 681 FILE_UNLOCK(fp); 682 VOP_UNLOCK(vp, 0, td); 683 if (flags & (O_EXLOCK | O_SHLOCK)) { 684 lf.l_whence = SEEK_SET; 685 lf.l_start = 0; 686 lf.l_len = 0; 687 if (flags & O_EXLOCK) 688 lf.l_type = F_WRLCK; 689 else 690 lf.l_type = F_RDLCK; 691 type = F_FLOCK; 692 if ((flags & FNONBLOCK) == 0) 693 type |= F_WAIT; 694 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 695 type)) != 0) 696 goto bad; 697 fp->f_flag |= FHASLOCK; 698 } 699 if (flags & O_TRUNC) { 700 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 701 goto bad; 702 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 703 VATTR_NULL(&vat); 704 vat.va_size = 0; 705 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 706 error = VOP_SETATTR(vp, &vat, td->td_ucred, td); 707 VOP_UNLOCK(vp, 0, td); 708 vn_finished_write(mp); 709 if (error) 710 goto bad; 711 } 712 /* 713 * Release our private reference, leaving the one associated with 714 * the descriptor table intact. 715 */ 716 fdrop(fp, td); 717 td->td_retval[0] = indx; 718 return (0); 719 bad: 720 FILEDESC_LOCK(fdp); 721 if (fdp->fd_ofiles[indx] == fp) { 722 fdp->fd_ofiles[indx] = NULL; 723 FILEDESC_UNLOCK(fdp); 724 fdrop(fp, td); 725 } else 726 FILEDESC_UNLOCK(fdp); 727 return (error); 728 } 729 730 #ifdef COMPAT_43 731 /* 732 * Create a file. 733 */ 734 #ifndef _SYS_SYSPROTO_H_ 735 struct ocreat_args { 736 char *path; 737 int mode; 738 }; 739 #endif 740 int 741 ocreat(td, uap) 742 struct thread *td; 743 register struct ocreat_args /* { 744 syscallarg(char *) path; 745 syscallarg(int) mode; 746 } */ *uap; 747 { 748 struct open_args /* { 749 syscallarg(char *) path; 750 syscallarg(int) flags; 751 syscallarg(int) mode; 752 } */ nuap; 753 754 SCARG(&nuap, path) = SCARG(uap, path); 755 SCARG(&nuap, mode) = SCARG(uap, mode); 756 SCARG(&nuap, flags) = O_WRONLY | O_CREAT | O_TRUNC; 757 return (open(td, &nuap)); 758 } 759 #endif /* COMPAT_43 */ 760 761 /* 762 * Create a special file. 763 */ 764 #ifndef _SYS_SYSPROTO_H_ 765 struct mknod_args { 766 char *path; 767 int mode; 768 int dev; 769 }; 770 #endif 771 /* ARGSUSED */ 772 int 773 mknod(td, uap) 774 struct thread *td; 775 register struct mknod_args /* { 776 syscallarg(char *) path; 777 syscallarg(int) mode; 778 syscallarg(int) dev; 779 } */ *uap; 780 { 781 struct vnode *vp; 782 struct mount *mp; 783 struct vattr vattr; 784 int error; 785 int whiteout = 0; 786 struct nameidata nd; 787 788 switch (SCARG(uap, mode) & S_IFMT) { 789 case S_IFCHR: 790 case S_IFBLK: 791 error = suser(td); 792 break; 793 default: 794 error = suser_cred(td->td_ucred, PRISON_ROOT); 795 break; 796 } 797 if (error) 798 return (error); 799 restart: 800 bwillwrite(); 801 NDINIT(&nd, CREATE, LOCKPARENT, UIO_USERSPACE, SCARG(uap, path), td); 802 if ((error = namei(&nd)) != 0) 803 return (error); 804 vp = nd.ni_vp; 805 if (vp != NULL) { 806 vrele(vp); 807 error = EEXIST; 808 } else { 809 VATTR_NULL(&vattr); 810 FILEDESC_LOCK(td->td_proc->p_fd); 811 vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask; 812 FILEDESC_UNLOCK(td->td_proc->p_fd); 813 vattr.va_rdev = SCARG(uap, dev); 814 whiteout = 0; 815 816 switch (SCARG(uap, mode) & S_IFMT) { 817 case S_IFMT: /* used by badsect to flag bad sectors */ 818 vattr.va_type = VBAD; 819 break; 820 case S_IFCHR: 821 vattr.va_type = VCHR; 822 break; 823 case S_IFBLK: 824 vattr.va_type = VBLK; 825 break; 826 case S_IFWHT: 827 whiteout = 1; 828 break; 829 default: 830 error = EINVAL; 831 break; 832 } 833 } 834 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 835 NDFREE(&nd, NDF_ONLY_PNBUF); 836 vput(nd.ni_dvp); 837 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 838 return (error); 839 goto restart; 840 } 841 if (!error) { 842 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 843 if (whiteout) 844 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, CREATE); 845 else { 846 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, 847 &nd.ni_cnd, &vattr); 848 if (error == 0) 849 vput(nd.ni_vp); 850 } 851 } 852 NDFREE(&nd, NDF_ONLY_PNBUF); 853 vput(nd.ni_dvp); 854 vn_finished_write(mp); 855 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mknod"); 856 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mknod"); 857 return (error); 858 } 859 860 /* 861 * Create a named pipe. 862 */ 863 #ifndef _SYS_SYSPROTO_H_ 864 struct mkfifo_args { 865 char *path; 866 int mode; 867 }; 868 #endif 869 /* ARGSUSED */ 870 int 871 mkfifo(td, uap) 872 struct thread *td; 873 register struct mkfifo_args /* { 874 syscallarg(char *) path; 875 syscallarg(int) mode; 876 } */ *uap; 877 { 878 struct mount *mp; 879 struct vattr vattr; 880 int error; 881 struct nameidata nd; 882 883 restart: 884 bwillwrite(); 885 NDINIT(&nd, CREATE, LOCKPARENT, UIO_USERSPACE, SCARG(uap, path), td); 886 if ((error = namei(&nd)) != 0) 887 return (error); 888 if (nd.ni_vp != NULL) { 889 NDFREE(&nd, NDF_ONLY_PNBUF); 890 vrele(nd.ni_vp); 891 vput(nd.ni_dvp); 892 return (EEXIST); 893 } 894 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 895 NDFREE(&nd, NDF_ONLY_PNBUF); 896 vput(nd.ni_dvp); 897 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 898 return (error); 899 goto restart; 900 } 901 VATTR_NULL(&vattr); 902 vattr.va_type = VFIFO; 903 FILEDESC_LOCK(td->td_proc->p_fd); 904 vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask; 905 FILEDESC_UNLOCK(td->td_proc->p_fd); 906 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 907 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 908 if (error == 0) 909 vput(nd.ni_vp); 910 NDFREE(&nd, NDF_ONLY_PNBUF); 911 vput(nd.ni_dvp); 912 vn_finished_write(mp); 913 return (error); 914 } 915 916 /* 917 * Make a hard file link. 918 */ 919 #ifndef _SYS_SYSPROTO_H_ 920 struct link_args { 921 char *path; 922 char *link; 923 }; 924 #endif 925 /* ARGSUSED */ 926 int 927 link(td, uap) 928 struct thread *td; 929 register struct link_args /* { 930 syscallarg(char *) path; 931 syscallarg(char *) link; 932 } */ *uap; 933 { 934 struct vnode *vp; 935 struct mount *mp; 936 struct nameidata nd; 937 int error; 938 939 bwillwrite(); 940 NDINIT(&nd, LOOKUP, FOLLOW|NOOBJ, UIO_USERSPACE, SCARG(uap, path), td); 941 if ((error = namei(&nd)) != 0) 942 return (error); 943 NDFREE(&nd, NDF_ONLY_PNBUF); 944 vp = nd.ni_vp; 945 if (vp->v_type == VDIR) { 946 vrele(vp); 947 return (EPERM); /* POSIX */ 948 } 949 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 950 vrele(vp); 951 return (error); 952 } 953 NDINIT(&nd, CREATE, LOCKPARENT|NOOBJ, UIO_USERSPACE, SCARG(uap, link), td); 954 if ((error = namei(&nd)) == 0) { 955 if (nd.ni_vp != NULL) { 956 vrele(nd.ni_vp); 957 error = EEXIST; 958 } else { 959 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 960 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 961 error = VOP_LINK(nd.ni_dvp, vp, &nd.ni_cnd); 962 } 963 NDFREE(&nd, NDF_ONLY_PNBUF); 964 vput(nd.ni_dvp); 965 } 966 vrele(vp); 967 vn_finished_write(mp); 968 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "link"); 969 ASSERT_VOP_UNLOCKED(nd.ni_vp, "link"); 970 return (error); 971 } 972 973 /* 974 * Make a symbolic link. 975 */ 976 #ifndef _SYS_SYSPROTO_H_ 977 struct symlink_args { 978 char *path; 979 char *link; 980 }; 981 #endif 982 /* ARGSUSED */ 983 int 984 symlink(td, uap) 985 struct thread *td; 986 register struct symlink_args /* { 987 syscallarg(char *) path; 988 syscallarg(char *) link; 989 } */ *uap; 990 { 991 struct mount *mp; 992 struct vattr vattr; 993 char *path; 994 int error; 995 struct nameidata nd; 996 997 path = uma_zalloc(namei_zone, M_WAITOK); 998 if ((error = copyinstr(SCARG(uap, path), path, MAXPATHLEN, NULL)) != 0) 999 goto out; 1000 restart: 1001 bwillwrite(); 1002 NDINIT(&nd, CREATE, LOCKPARENT|NOOBJ, UIO_USERSPACE, SCARG(uap, link), td); 1003 if ((error = namei(&nd)) != 0) 1004 goto out; 1005 if (nd.ni_vp) { 1006 NDFREE(&nd, NDF_ONLY_PNBUF); 1007 vrele(nd.ni_vp); 1008 vput(nd.ni_dvp); 1009 error = EEXIST; 1010 goto out; 1011 } 1012 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1013 NDFREE(&nd, NDF_ONLY_PNBUF); 1014 vput(nd.ni_dvp); 1015 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1016 return (error); 1017 goto restart; 1018 } 1019 VATTR_NULL(&vattr); 1020 FILEDESC_LOCK(td->td_proc->p_fd); 1021 vattr.va_mode = ACCESSPERMS &~ td->td_proc->p_fd->fd_cmask; 1022 FILEDESC_UNLOCK(td->td_proc->p_fd); 1023 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1024 error = VOP_SYMLINK(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr, path); 1025 NDFREE(&nd, NDF_ONLY_PNBUF); 1026 if (error == 0) 1027 vput(nd.ni_vp); 1028 vput(nd.ni_dvp); 1029 vn_finished_write(mp); 1030 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "symlink"); 1031 ASSERT_VOP_UNLOCKED(nd.ni_vp, "symlink"); 1032 out: 1033 uma_zfree(namei_zone, path); 1034 return (error); 1035 } 1036 1037 /* 1038 * Delete a whiteout from the filesystem. 1039 */ 1040 /* ARGSUSED */ 1041 int 1042 undelete(td, uap) 1043 struct thread *td; 1044 register struct undelete_args /* { 1045 syscallarg(char *) path; 1046 } */ *uap; 1047 { 1048 int error; 1049 struct mount *mp; 1050 struct nameidata nd; 1051 1052 restart: 1053 bwillwrite(); 1054 NDINIT(&nd, DELETE, LOCKPARENT|DOWHITEOUT, UIO_USERSPACE, 1055 SCARG(uap, path), td); 1056 error = namei(&nd); 1057 if (error) 1058 return (error); 1059 1060 if (nd.ni_vp != NULLVP || !(nd.ni_cnd.cn_flags & ISWHITEOUT)) { 1061 NDFREE(&nd, NDF_ONLY_PNBUF); 1062 if (nd.ni_vp) 1063 vrele(nd.ni_vp); 1064 vput(nd.ni_dvp); 1065 return (EEXIST); 1066 } 1067 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1068 NDFREE(&nd, NDF_ONLY_PNBUF); 1069 vput(nd.ni_dvp); 1070 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1071 return (error); 1072 goto restart; 1073 } 1074 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1075 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, DELETE); 1076 NDFREE(&nd, NDF_ONLY_PNBUF); 1077 vput(nd.ni_dvp); 1078 vn_finished_write(mp); 1079 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "undelete"); 1080 ASSERT_VOP_UNLOCKED(nd.ni_vp, "undelete"); 1081 return (error); 1082 } 1083 1084 /* 1085 * Delete a name from the filesystem. 1086 */ 1087 #ifndef _SYS_SYSPROTO_H_ 1088 struct unlink_args { 1089 char *path; 1090 }; 1091 #endif 1092 /* ARGSUSED */ 1093 int 1094 unlink(td, uap) 1095 struct thread *td; 1096 struct unlink_args /* { 1097 syscallarg(char *) path; 1098 } */ *uap; 1099 { 1100 struct mount *mp; 1101 struct vnode *vp; 1102 int error; 1103 struct nameidata nd; 1104 1105 restart: 1106 bwillwrite(); 1107 NDINIT(&nd, DELETE, LOCKPARENT, UIO_USERSPACE, SCARG(uap, path), td); 1108 if ((error = namei(&nd)) != 0) 1109 return (error); 1110 vp = nd.ni_vp; 1111 if (vp->v_type == VDIR) 1112 error = EPERM; /* POSIX */ 1113 else { 1114 /* 1115 * The root of a mounted filesystem cannot be deleted. 1116 * 1117 * XXX: can this only be a VDIR case? 1118 */ 1119 if (vp->v_flag & VROOT) 1120 error = EBUSY; 1121 } 1122 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1123 NDFREE(&nd, NDF_ONLY_PNBUF); 1124 vrele(vp); 1125 vput(nd.ni_dvp); 1126 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1127 return (error); 1128 goto restart; 1129 } 1130 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1131 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1132 if (!error) { 1133 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1134 error = VOP_REMOVE(nd.ni_dvp, vp, &nd.ni_cnd); 1135 } 1136 NDFREE(&nd, NDF_ONLY_PNBUF); 1137 vput(nd.ni_dvp); 1138 vput(vp); 1139 vn_finished_write(mp); 1140 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "unlink"); 1141 ASSERT_VOP_UNLOCKED(nd.ni_vp, "unlink"); 1142 return (error); 1143 } 1144 1145 /* 1146 * Reposition read/write file offset. 1147 */ 1148 #ifndef _SYS_SYSPROTO_H_ 1149 struct lseek_args { 1150 int fd; 1151 int pad; 1152 off_t offset; 1153 int whence; 1154 }; 1155 #endif 1156 int 1157 lseek(td, uap) 1158 struct thread *td; 1159 register struct lseek_args /* { 1160 syscallarg(int) fd; 1161 syscallarg(int) pad; 1162 syscallarg(off_t) offset; 1163 syscallarg(int) whence; 1164 } */ *uap; 1165 { 1166 struct ucred *cred = td->td_ucred; 1167 struct file *fp; 1168 struct vnode *vp; 1169 struct vattr vattr; 1170 off_t offset; 1171 int error, noneg; 1172 1173 if ((error = fget(td, uap->fd, &fp)) != 0) 1174 return (error); 1175 if (fp->f_type != DTYPE_VNODE) { 1176 fdrop(fp, td); 1177 return (ESPIPE); 1178 } 1179 vp = (struct vnode *)fp->f_data; 1180 noneg = (vp->v_type != VCHR); 1181 offset = SCARG(uap, offset); 1182 switch (SCARG(uap, whence)) { 1183 case L_INCR: 1184 if (noneg && 1185 (fp->f_offset < 0 || 1186 (offset > 0 && fp->f_offset > OFF_MAX - offset))) 1187 return (EOVERFLOW); 1188 offset += fp->f_offset; 1189 break; 1190 case L_XTND: 1191 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1192 error = VOP_GETATTR(vp, &vattr, cred, td); 1193 VOP_UNLOCK(vp, 0, td); 1194 if (error) 1195 return (error); 1196 if (noneg && 1197 (vattr.va_size > OFF_MAX || 1198 (offset > 0 && vattr.va_size > OFF_MAX - offset))) 1199 return (EOVERFLOW); 1200 offset += vattr.va_size; 1201 break; 1202 case L_SET: 1203 break; 1204 default: 1205 fdrop(fp, td); 1206 return (EINVAL); 1207 } 1208 if (noneg && offset < 0) 1209 return (EINVAL); 1210 fp->f_offset = offset; 1211 *(off_t *)(td->td_retval) = fp->f_offset; 1212 fdrop(fp, td); 1213 return (0); 1214 } 1215 1216 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1217 /* 1218 * Reposition read/write file offset. 1219 */ 1220 #ifndef _SYS_SYSPROTO_H_ 1221 struct olseek_args { 1222 int fd; 1223 long offset; 1224 int whence; 1225 }; 1226 #endif 1227 int 1228 olseek(td, uap) 1229 struct thread *td; 1230 register struct olseek_args /* { 1231 syscallarg(int) fd; 1232 syscallarg(long) offset; 1233 syscallarg(int) whence; 1234 } */ *uap; 1235 { 1236 struct lseek_args /* { 1237 syscallarg(int) fd; 1238 syscallarg(int) pad; 1239 syscallarg(off_t) offset; 1240 syscallarg(int) whence; 1241 } */ nuap; 1242 int error; 1243 1244 SCARG(&nuap, fd) = SCARG(uap, fd); 1245 SCARG(&nuap, offset) = SCARG(uap, offset); 1246 SCARG(&nuap, whence) = SCARG(uap, whence); 1247 error = lseek(td, &nuap); 1248 return (error); 1249 } 1250 #endif /* COMPAT_43 */ 1251 1252 /* 1253 * Check access permissions using passed credentials. 1254 */ 1255 static int 1256 vn_access(vp, user_flags, cred, td) 1257 struct vnode *vp; 1258 int user_flags; 1259 struct ucred *cred; 1260 struct thread *td; 1261 { 1262 int error, flags; 1263 1264 /* Flags == 0 means only check for existence. */ 1265 error = 0; 1266 if (user_flags) { 1267 flags = 0; 1268 if (user_flags & R_OK) 1269 flags |= VREAD; 1270 if (user_flags & W_OK) 1271 flags |= VWRITE; 1272 if (user_flags & X_OK) 1273 flags |= VEXEC; 1274 if ((flags & VWRITE) == 0 || (error = vn_writechk(vp)) == 0) 1275 error = VOP_ACCESS(vp, flags, cred, td); 1276 } 1277 return (error); 1278 } 1279 1280 /* 1281 * Check access permissions using "real" credentials. 1282 */ 1283 #ifndef _SYS_SYSPROTO_H_ 1284 struct access_args { 1285 char *path; 1286 int flags; 1287 }; 1288 #endif 1289 int 1290 access(td, uap) 1291 struct thread *td; 1292 register struct access_args /* { 1293 syscallarg(char *) path; 1294 syscallarg(int) flags; 1295 } */ *uap; 1296 { 1297 struct ucred *cred, *tmpcred; 1298 register struct vnode *vp; 1299 int error; 1300 struct nameidata nd; 1301 1302 /* 1303 * Create and modify a temporary credential instead of one that 1304 * is potentially shared. This could also mess up socket 1305 * buffer accounting which can run in an interrupt context. 1306 * 1307 * XXX - Depending on how "threads" are finally implemented, it 1308 * may be better to explicitly pass the credential to namei() 1309 * rather than to modify the potentially shared process structure. 1310 */ 1311 cred = td->td_ucred; 1312 tmpcred = crdup(cred); 1313 tmpcred->cr_uid = cred->cr_ruid; 1314 tmpcred->cr_groups[0] = cred->cr_rgid; 1315 td->td_ucred = tmpcred; 1316 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1317 SCARG(uap, path), td); 1318 if ((error = namei(&nd)) != 0) 1319 goto out1; 1320 vp = nd.ni_vp; 1321 1322 error = vn_access(vp, SCARG(uap, flags), tmpcred, td); 1323 NDFREE(&nd, NDF_ONLY_PNBUF); 1324 vput(vp); 1325 out1: 1326 td->td_ucred = cred; 1327 crfree(tmpcred); 1328 return (error); 1329 } 1330 1331 /* 1332 * Check access permissions using "effective" credentials. 1333 */ 1334 #ifndef _SYS_SYSPROTO_H_ 1335 struct eaccess_args { 1336 char *path; 1337 int flags; 1338 }; 1339 #endif 1340 int 1341 eaccess(td, uap) 1342 struct thread *td; 1343 register struct eaccess_args /* { 1344 syscallarg(char *) path; 1345 syscallarg(int) flags; 1346 } */ *uap; 1347 { 1348 struct nameidata nd; 1349 struct vnode *vp; 1350 int error; 1351 1352 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1353 SCARG(uap, path), td); 1354 if ((error = namei(&nd)) != 0) 1355 return (error); 1356 vp = nd.ni_vp; 1357 1358 error = vn_access(vp, SCARG(uap, flags), td->td_ucred, td); 1359 NDFREE(&nd, NDF_ONLY_PNBUF); 1360 vput(vp); 1361 return (error); 1362 } 1363 1364 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1365 /* 1366 * Get file status; this version follows links. 1367 */ 1368 #ifndef _SYS_SYSPROTO_H_ 1369 struct ostat_args { 1370 char *path; 1371 struct ostat *ub; 1372 }; 1373 #endif 1374 /* ARGSUSED */ 1375 int 1376 ostat(td, uap) 1377 struct thread *td; 1378 register struct ostat_args /* { 1379 syscallarg(char *) path; 1380 syscallarg(struct ostat *) ub; 1381 } */ *uap; 1382 { 1383 struct stat sb; 1384 struct ostat osb; 1385 int error; 1386 struct nameidata nd; 1387 1388 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1389 SCARG(uap, path), td); 1390 if ((error = namei(&nd)) != 0) 1391 return (error); 1392 NDFREE(&nd, NDF_ONLY_PNBUF); 1393 error = vn_stat(nd.ni_vp, &sb, td); 1394 vput(nd.ni_vp); 1395 if (error) 1396 return (error); 1397 cvtstat(&sb, &osb); 1398 error = copyout(&osb, SCARG(uap, ub), sizeof (osb)); 1399 return (error); 1400 } 1401 1402 /* 1403 * Get file status; this version does not follow links. 1404 */ 1405 #ifndef _SYS_SYSPROTO_H_ 1406 struct olstat_args { 1407 char *path; 1408 struct ostat *ub; 1409 }; 1410 #endif 1411 /* ARGSUSED */ 1412 int 1413 olstat(td, uap) 1414 struct thread *td; 1415 register struct olstat_args /* { 1416 syscallarg(char *) path; 1417 syscallarg(struct ostat *) ub; 1418 } */ *uap; 1419 { 1420 struct vnode *vp; 1421 struct stat sb; 1422 struct ostat osb; 1423 int error; 1424 struct nameidata nd; 1425 1426 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1427 SCARG(uap, path), td); 1428 if ((error = namei(&nd)) != 0) 1429 return (error); 1430 vp = nd.ni_vp; 1431 error = vn_stat(vp, &sb, td); 1432 NDFREE(&nd, NDF_ONLY_PNBUF); 1433 vput(vp); 1434 if (error) 1435 return (error); 1436 cvtstat(&sb, &osb); 1437 error = copyout(&osb, SCARG(uap, ub), sizeof (osb)); 1438 return (error); 1439 } 1440 1441 /* 1442 * Convert from an old to a new stat structure. 1443 */ 1444 void 1445 cvtstat(st, ost) 1446 struct stat *st; 1447 struct ostat *ost; 1448 { 1449 1450 ost->st_dev = st->st_dev; 1451 ost->st_ino = st->st_ino; 1452 ost->st_mode = st->st_mode; 1453 ost->st_nlink = st->st_nlink; 1454 ost->st_uid = st->st_uid; 1455 ost->st_gid = st->st_gid; 1456 ost->st_rdev = st->st_rdev; 1457 if (st->st_size < (quad_t)1 << 32) 1458 ost->st_size = st->st_size; 1459 else 1460 ost->st_size = -2; 1461 ost->st_atime = st->st_atime; 1462 ost->st_mtime = st->st_mtime; 1463 ost->st_ctime = st->st_ctime; 1464 ost->st_blksize = st->st_blksize; 1465 ost->st_blocks = st->st_blocks; 1466 ost->st_flags = st->st_flags; 1467 ost->st_gen = st->st_gen; 1468 } 1469 #endif /* COMPAT_43 || COMPAT_SUNOS */ 1470 1471 /* 1472 * Get file status; this version follows links. 1473 */ 1474 #ifndef _SYS_SYSPROTO_H_ 1475 struct stat_args { 1476 char *path; 1477 struct stat *ub; 1478 }; 1479 #endif 1480 /* ARGSUSED */ 1481 int 1482 stat(td, uap) 1483 struct thread *td; 1484 register struct stat_args /* { 1485 syscallarg(char *) path; 1486 syscallarg(struct stat *) ub; 1487 } */ *uap; 1488 { 1489 struct stat sb; 1490 int error; 1491 struct nameidata nd; 1492 1493 #ifdef LOOKUP_SHARED 1494 NDINIT(&nd, LOOKUP, FOLLOW | LOCKSHARED | LOCKLEAF | NOOBJ, 1495 UIO_USERSPACE, SCARG(uap, path), td); 1496 #else 1497 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1498 SCARG(uap, path), td); 1499 #endif 1500 if ((error = namei(&nd)) != 0) 1501 return (error); 1502 error = vn_stat(nd.ni_vp, &sb, td); 1503 NDFREE(&nd, NDF_ONLY_PNBUF); 1504 vput(nd.ni_vp); 1505 if (error) 1506 return (error); 1507 error = copyout(&sb, SCARG(uap, ub), sizeof (sb)); 1508 return (error); 1509 } 1510 1511 /* 1512 * Get file status; this version does not follow links. 1513 */ 1514 #ifndef _SYS_SYSPROTO_H_ 1515 struct lstat_args { 1516 char *path; 1517 struct stat *ub; 1518 }; 1519 #endif 1520 /* ARGSUSED */ 1521 int 1522 lstat(td, uap) 1523 struct thread *td; 1524 register struct lstat_args /* { 1525 syscallarg(char *) path; 1526 syscallarg(struct stat *) ub; 1527 } */ *uap; 1528 { 1529 int error; 1530 struct vnode *vp; 1531 struct stat sb; 1532 struct nameidata nd; 1533 1534 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1535 SCARG(uap, path), td); 1536 if ((error = namei(&nd)) != 0) 1537 return (error); 1538 vp = nd.ni_vp; 1539 error = vn_stat(vp, &sb, td); 1540 NDFREE(&nd, NDF_ONLY_PNBUF); 1541 vput(vp); 1542 if (error) 1543 return (error); 1544 error = copyout(&sb, SCARG(uap, ub), sizeof (sb)); 1545 return (error); 1546 } 1547 1548 /* 1549 * Implementation of the NetBSD stat() function. 1550 * XXX This should probably be collapsed with the FreeBSD version, 1551 * as the differences are only due to vn_stat() clearing spares at 1552 * the end of the structures. vn_stat could be split to avoid this, 1553 * and thus collapse the following to close to zero code. 1554 */ 1555 void 1556 cvtnstat(sb, nsb) 1557 struct stat *sb; 1558 struct nstat *nsb; 1559 { 1560 bzero(nsb, sizeof *nsb); 1561 nsb->st_dev = sb->st_dev; 1562 nsb->st_ino = sb->st_ino; 1563 nsb->st_mode = sb->st_mode; 1564 nsb->st_nlink = sb->st_nlink; 1565 nsb->st_uid = sb->st_uid; 1566 nsb->st_gid = sb->st_gid; 1567 nsb->st_rdev = sb->st_rdev; 1568 nsb->st_atimespec = sb->st_atimespec; 1569 nsb->st_mtimespec = sb->st_mtimespec; 1570 nsb->st_ctimespec = sb->st_ctimespec; 1571 nsb->st_size = sb->st_size; 1572 nsb->st_blocks = sb->st_blocks; 1573 nsb->st_blksize = sb->st_blksize; 1574 nsb->st_flags = sb->st_flags; 1575 nsb->st_gen = sb->st_gen; 1576 nsb->st_birthtimespec = sb->st_birthtimespec; 1577 } 1578 1579 #ifndef _SYS_SYSPROTO_H_ 1580 struct nstat_args { 1581 char *path; 1582 struct nstat *ub; 1583 }; 1584 #endif 1585 /* ARGSUSED */ 1586 int 1587 nstat(td, uap) 1588 struct thread *td; 1589 register struct nstat_args /* { 1590 syscallarg(char *) path; 1591 syscallarg(struct nstat *) ub; 1592 } */ *uap; 1593 { 1594 struct stat sb; 1595 struct nstat nsb; 1596 int error; 1597 struct nameidata nd; 1598 1599 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1600 SCARG(uap, path), td); 1601 if ((error = namei(&nd)) != 0) 1602 return (error); 1603 NDFREE(&nd, NDF_ONLY_PNBUF); 1604 error = vn_stat(nd.ni_vp, &sb, td); 1605 vput(nd.ni_vp); 1606 if (error) 1607 return (error); 1608 cvtnstat(&sb, &nsb); 1609 error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb)); 1610 return (error); 1611 } 1612 1613 /* 1614 * NetBSD lstat. Get file status; this version does not follow links. 1615 */ 1616 #ifndef _SYS_SYSPROTO_H_ 1617 struct lstat_args { 1618 char *path; 1619 struct stat *ub; 1620 }; 1621 #endif 1622 /* ARGSUSED */ 1623 int 1624 nlstat(td, uap) 1625 struct thread *td; 1626 register struct nlstat_args /* { 1627 syscallarg(char *) path; 1628 syscallarg(struct nstat *) ub; 1629 } */ *uap; 1630 { 1631 int error; 1632 struct vnode *vp; 1633 struct stat sb; 1634 struct nstat nsb; 1635 struct nameidata nd; 1636 1637 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1638 SCARG(uap, path), td); 1639 if ((error = namei(&nd)) != 0) 1640 return (error); 1641 vp = nd.ni_vp; 1642 NDFREE(&nd, NDF_ONLY_PNBUF); 1643 error = vn_stat(vp, &sb, td); 1644 vput(vp); 1645 if (error) 1646 return (error); 1647 cvtnstat(&sb, &nsb); 1648 error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb)); 1649 return (error); 1650 } 1651 1652 /* 1653 * Get configurable pathname variables. 1654 */ 1655 #ifndef _SYS_SYSPROTO_H_ 1656 struct pathconf_args { 1657 char *path; 1658 int name; 1659 }; 1660 #endif 1661 /* ARGSUSED */ 1662 int 1663 pathconf(td, uap) 1664 struct thread *td; 1665 register struct pathconf_args /* { 1666 syscallarg(char *) path; 1667 syscallarg(int) name; 1668 } */ *uap; 1669 { 1670 int error; 1671 struct nameidata nd; 1672 1673 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1674 SCARG(uap, path), td); 1675 if ((error = namei(&nd)) != 0) 1676 return (error); 1677 NDFREE(&nd, NDF_ONLY_PNBUF); 1678 error = VOP_PATHCONF(nd.ni_vp, SCARG(uap, name), td->td_retval); 1679 vput(nd.ni_vp); 1680 return (error); 1681 } 1682 1683 /* 1684 * Return target name of a symbolic link. 1685 */ 1686 #ifndef _SYS_SYSPROTO_H_ 1687 struct readlink_args { 1688 char *path; 1689 char *buf; 1690 int count; 1691 }; 1692 #endif 1693 /* ARGSUSED */ 1694 int 1695 readlink(td, uap) 1696 struct thread *td; 1697 register struct readlink_args /* { 1698 syscallarg(char *) path; 1699 syscallarg(char *) buf; 1700 syscallarg(int) count; 1701 } */ *uap; 1702 { 1703 register struct vnode *vp; 1704 struct iovec aiov; 1705 struct uio auio; 1706 int error; 1707 struct nameidata nd; 1708 1709 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1710 SCARG(uap, path), td); 1711 if ((error = namei(&nd)) != 0) 1712 return (error); 1713 NDFREE(&nd, NDF_ONLY_PNBUF); 1714 vp = nd.ni_vp; 1715 if (vp->v_type != VLNK) 1716 error = EINVAL; 1717 else { 1718 aiov.iov_base = SCARG(uap, buf); 1719 aiov.iov_len = SCARG(uap, count); 1720 auio.uio_iov = &aiov; 1721 auio.uio_iovcnt = 1; 1722 auio.uio_offset = 0; 1723 auio.uio_rw = UIO_READ; 1724 auio.uio_segflg = UIO_USERSPACE; 1725 auio.uio_td = td; 1726 auio.uio_resid = SCARG(uap, count); 1727 error = VOP_READLINK(vp, &auio, td->td_ucred); 1728 } 1729 vput(vp); 1730 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 1731 return (error); 1732 } 1733 1734 /* 1735 * Common implementation code for chflags() and fchflags(). 1736 */ 1737 static int 1738 setfflags(td, vp, flags) 1739 struct thread *td; 1740 struct vnode *vp; 1741 int flags; 1742 { 1743 int error; 1744 struct mount *mp; 1745 struct vattr vattr; 1746 1747 /* 1748 * Prevent non-root users from setting flags on devices. When 1749 * a device is reused, users can retain ownership of the device 1750 * if they are allowed to set flags and programs assume that 1751 * chown can't fail when done as root. 1752 */ 1753 if (vp->v_type == VCHR || vp->v_type == VBLK) { 1754 error = suser_cred(td->td_ucred, PRISON_ROOT); 1755 if (error) 1756 return (error); 1757 } 1758 1759 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1760 return (error); 1761 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1762 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1763 VATTR_NULL(&vattr); 1764 vattr.va_flags = flags; 1765 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1766 VOP_UNLOCK(vp, 0, td); 1767 vn_finished_write(mp); 1768 return (error); 1769 } 1770 1771 /* 1772 * Change flags of a file given a path name. 1773 */ 1774 #ifndef _SYS_SYSPROTO_H_ 1775 struct chflags_args { 1776 char *path; 1777 int flags; 1778 }; 1779 #endif 1780 /* ARGSUSED */ 1781 int 1782 chflags(td, uap) 1783 struct thread *td; 1784 register struct chflags_args /* { 1785 syscallarg(char *) path; 1786 syscallarg(int) flags; 1787 } */ *uap; 1788 { 1789 int error; 1790 struct nameidata nd; 1791 1792 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1793 if ((error = namei(&nd)) != 0) 1794 return (error); 1795 NDFREE(&nd, NDF_ONLY_PNBUF); 1796 error = setfflags(td, nd.ni_vp, SCARG(uap, flags)); 1797 vrele(nd.ni_vp); 1798 return error; 1799 } 1800 1801 /* 1802 * Same as chflags() but doesn't follow symlinks. 1803 */ 1804 int 1805 lchflags(td, uap) 1806 struct thread *td; 1807 register struct lchflags_args /* { 1808 syscallarg(char *) path; 1809 syscallarg(int) flags; 1810 } */ *uap; 1811 { 1812 int error; 1813 struct nameidata nd; 1814 1815 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1816 if ((error = namei(&nd)) != 0) 1817 return (error); 1818 NDFREE(&nd, NDF_ONLY_PNBUF); 1819 error = setfflags(td, nd.ni_vp, SCARG(uap, flags)); 1820 vrele(nd.ni_vp); 1821 return error; 1822 } 1823 1824 /* 1825 * Change flags of a file given a file descriptor. 1826 */ 1827 #ifndef _SYS_SYSPROTO_H_ 1828 struct fchflags_args { 1829 int fd; 1830 int flags; 1831 }; 1832 #endif 1833 /* ARGSUSED */ 1834 int 1835 fchflags(td, uap) 1836 struct thread *td; 1837 register struct fchflags_args /* { 1838 syscallarg(int) fd; 1839 syscallarg(int) flags; 1840 } */ *uap; 1841 { 1842 struct file *fp; 1843 int error; 1844 1845 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 1846 return (error); 1847 error = setfflags(td, (struct vnode *) fp->f_data, SCARG(uap, flags)); 1848 fdrop(fp, td); 1849 return (error); 1850 } 1851 1852 /* 1853 * Common implementation code for chmod(), lchmod() and fchmod(). 1854 */ 1855 static int 1856 setfmode(td, vp, mode) 1857 struct thread *td; 1858 struct vnode *vp; 1859 int mode; 1860 { 1861 int error; 1862 struct mount *mp; 1863 struct vattr vattr; 1864 1865 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1866 return (error); 1867 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1868 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1869 VATTR_NULL(&vattr); 1870 vattr.va_mode = mode & ALLPERMS; 1871 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1872 VOP_UNLOCK(vp, 0, td); 1873 vn_finished_write(mp); 1874 return error; 1875 } 1876 1877 /* 1878 * Change mode of a file given path name. 1879 */ 1880 #ifndef _SYS_SYSPROTO_H_ 1881 struct chmod_args { 1882 char *path; 1883 int mode; 1884 }; 1885 #endif 1886 /* ARGSUSED */ 1887 int 1888 chmod(td, uap) 1889 struct thread *td; 1890 register struct chmod_args /* { 1891 syscallarg(char *) path; 1892 syscallarg(int) mode; 1893 } */ *uap; 1894 { 1895 int error; 1896 struct nameidata nd; 1897 1898 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1899 if ((error = namei(&nd)) != 0) 1900 return (error); 1901 NDFREE(&nd, NDF_ONLY_PNBUF); 1902 error = setfmode(td, nd.ni_vp, SCARG(uap, mode)); 1903 vrele(nd.ni_vp); 1904 return error; 1905 } 1906 1907 /* 1908 * Change mode of a file given path name (don't follow links.) 1909 */ 1910 #ifndef _SYS_SYSPROTO_H_ 1911 struct lchmod_args { 1912 char *path; 1913 int mode; 1914 }; 1915 #endif 1916 /* ARGSUSED */ 1917 int 1918 lchmod(td, uap) 1919 struct thread *td; 1920 register struct lchmod_args /* { 1921 syscallarg(char *) path; 1922 syscallarg(int) mode; 1923 } */ *uap; 1924 { 1925 int error; 1926 struct nameidata nd; 1927 1928 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1929 if ((error = namei(&nd)) != 0) 1930 return (error); 1931 NDFREE(&nd, NDF_ONLY_PNBUF); 1932 error = setfmode(td, nd.ni_vp, SCARG(uap, mode)); 1933 vrele(nd.ni_vp); 1934 return error; 1935 } 1936 1937 /* 1938 * Change mode of a file given a file descriptor. 1939 */ 1940 #ifndef _SYS_SYSPROTO_H_ 1941 struct fchmod_args { 1942 int fd; 1943 int mode; 1944 }; 1945 #endif 1946 /* ARGSUSED */ 1947 int 1948 fchmod(td, uap) 1949 struct thread *td; 1950 register struct fchmod_args /* { 1951 syscallarg(int) fd; 1952 syscallarg(int) mode; 1953 } */ *uap; 1954 { 1955 struct file *fp; 1956 struct vnode *vp; 1957 int error; 1958 1959 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 1960 return (error); 1961 vp = (struct vnode *)fp->f_data; 1962 error = setfmode(td, (struct vnode *)fp->f_data, SCARG(uap, mode)); 1963 fdrop(fp, td); 1964 return (error); 1965 } 1966 1967 /* 1968 * Common implementation for chown(), lchown(), and fchown() 1969 */ 1970 static int 1971 setfown(td, vp, uid, gid) 1972 struct thread *td; 1973 struct vnode *vp; 1974 uid_t uid; 1975 gid_t gid; 1976 { 1977 int error; 1978 struct mount *mp; 1979 struct vattr vattr; 1980 1981 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1982 return (error); 1983 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1984 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1985 VATTR_NULL(&vattr); 1986 vattr.va_uid = uid; 1987 vattr.va_gid = gid; 1988 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1989 VOP_UNLOCK(vp, 0, td); 1990 vn_finished_write(mp); 1991 return error; 1992 } 1993 1994 /* 1995 * Set ownership given a path name. 1996 */ 1997 #ifndef _SYS_SYSPROTO_H_ 1998 struct chown_args { 1999 char *path; 2000 int uid; 2001 int gid; 2002 }; 2003 #endif 2004 /* ARGSUSED */ 2005 int 2006 chown(td, uap) 2007 struct thread *td; 2008 register struct chown_args /* { 2009 syscallarg(char *) path; 2010 syscallarg(int) uid; 2011 syscallarg(int) gid; 2012 } */ *uap; 2013 { 2014 int error; 2015 struct nameidata nd; 2016 2017 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2018 if ((error = namei(&nd)) != 0) 2019 return (error); 2020 NDFREE(&nd, NDF_ONLY_PNBUF); 2021 error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid)); 2022 vrele(nd.ni_vp); 2023 return (error); 2024 } 2025 2026 /* 2027 * Set ownership given a path name, do not cross symlinks. 2028 */ 2029 #ifndef _SYS_SYSPROTO_H_ 2030 struct lchown_args { 2031 char *path; 2032 int uid; 2033 int gid; 2034 }; 2035 #endif 2036 /* ARGSUSED */ 2037 int 2038 lchown(td, uap) 2039 struct thread *td; 2040 register struct lchown_args /* { 2041 syscallarg(char *) path; 2042 syscallarg(int) uid; 2043 syscallarg(int) gid; 2044 } */ *uap; 2045 { 2046 int error; 2047 struct nameidata nd; 2048 2049 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2050 if ((error = namei(&nd)) != 0) 2051 return (error); 2052 NDFREE(&nd, NDF_ONLY_PNBUF); 2053 error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid)); 2054 vrele(nd.ni_vp); 2055 return (error); 2056 } 2057 2058 /* 2059 * Set ownership given a file descriptor. 2060 */ 2061 #ifndef _SYS_SYSPROTO_H_ 2062 struct fchown_args { 2063 int fd; 2064 int uid; 2065 int gid; 2066 }; 2067 #endif 2068 /* ARGSUSED */ 2069 int 2070 fchown(td, uap) 2071 struct thread *td; 2072 register struct fchown_args /* { 2073 syscallarg(int) fd; 2074 syscallarg(int) uid; 2075 syscallarg(int) gid; 2076 } */ *uap; 2077 { 2078 struct file *fp; 2079 struct vnode *vp; 2080 int error; 2081 2082 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2083 return (error); 2084 vp = (struct vnode *)fp->f_data; 2085 error = setfown(td, (struct vnode *)fp->f_data, 2086 SCARG(uap, uid), SCARG(uap, gid)); 2087 fdrop(fp, td); 2088 return (error); 2089 } 2090 2091 /* 2092 * Common implementation code for utimes(), lutimes(), and futimes(). 2093 */ 2094 static int 2095 getutimes(usrtvp, tsp) 2096 const struct timeval *usrtvp; 2097 struct timespec *tsp; 2098 { 2099 struct timeval tv[2]; 2100 int error; 2101 2102 if (usrtvp == NULL) { 2103 microtime(&tv[0]); 2104 TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]); 2105 tsp[1] = tsp[0]; 2106 } else { 2107 if ((error = copyin(usrtvp, tv, sizeof (tv))) != 0) 2108 return (error); 2109 TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]); 2110 TIMEVAL_TO_TIMESPEC(&tv[1], &tsp[1]); 2111 } 2112 return 0; 2113 } 2114 2115 /* 2116 * Common implementation code for utimes(), lutimes(), and futimes(). 2117 */ 2118 static int 2119 setutimes(td, vp, ts, numtimes, nullflag) 2120 struct thread *td; 2121 struct vnode *vp; 2122 const struct timespec *ts; 2123 int numtimes; 2124 int nullflag; 2125 { 2126 int error, setbirthtime; 2127 struct mount *mp; 2128 struct vattr vattr; 2129 2130 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2131 return (error); 2132 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2133 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2134 setbirthtime = 0; 2135 if (numtimes < 3 && VOP_GETATTR(vp, &vattr, td->td_ucred, td) == 0 && 2136 timespeccmp(&ts[1], &vattr.va_birthtime, < )) 2137 setbirthtime = 1; 2138 VATTR_NULL(&vattr); 2139 vattr.va_atime = ts[0]; 2140 vattr.va_mtime = ts[1]; 2141 if (setbirthtime) 2142 vattr.va_birthtime = ts[1]; 2143 if (numtimes > 2) 2144 vattr.va_birthtime = ts[2]; 2145 if (nullflag) 2146 vattr.va_vaflags |= VA_UTIMES_NULL; 2147 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2148 VOP_UNLOCK(vp, 0, td); 2149 vn_finished_write(mp); 2150 return error; 2151 } 2152 2153 /* 2154 * Set the access and modification times of a file. 2155 */ 2156 #ifndef _SYS_SYSPROTO_H_ 2157 struct utimes_args { 2158 char *path; 2159 struct timeval *tptr; 2160 }; 2161 #endif 2162 /* ARGSUSED */ 2163 int 2164 utimes(td, uap) 2165 struct thread *td; 2166 register struct utimes_args /* { 2167 syscallarg(char *) path; 2168 syscallarg(struct timeval *) tptr; 2169 } */ *uap; 2170 { 2171 struct timespec ts[2]; 2172 struct timeval *usrtvp; 2173 int error; 2174 struct nameidata nd; 2175 2176 usrtvp = SCARG(uap, tptr); 2177 if ((error = getutimes(usrtvp, ts)) != 0) 2178 return (error); 2179 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2180 if ((error = namei(&nd)) != 0) 2181 return (error); 2182 NDFREE(&nd, NDF_ONLY_PNBUF); 2183 error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL); 2184 vrele(nd.ni_vp); 2185 return (error); 2186 } 2187 2188 /* 2189 * Set the access and modification times of a file. 2190 */ 2191 #ifndef _SYS_SYSPROTO_H_ 2192 struct lutimes_args { 2193 char *path; 2194 struct timeval *tptr; 2195 }; 2196 #endif 2197 /* ARGSUSED */ 2198 int 2199 lutimes(td, uap) 2200 struct thread *td; 2201 register struct lutimes_args /* { 2202 syscallarg(char *) path; 2203 syscallarg(struct timeval *) tptr; 2204 } */ *uap; 2205 { 2206 struct timespec ts[2]; 2207 struct timeval *usrtvp; 2208 int error; 2209 struct nameidata nd; 2210 2211 usrtvp = SCARG(uap, tptr); 2212 if ((error = getutimes(usrtvp, ts)) != 0) 2213 return (error); 2214 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2215 if ((error = namei(&nd)) != 0) 2216 return (error); 2217 NDFREE(&nd, NDF_ONLY_PNBUF); 2218 error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL); 2219 vrele(nd.ni_vp); 2220 return (error); 2221 } 2222 2223 /* 2224 * Set the access and modification times of a file. 2225 */ 2226 #ifndef _SYS_SYSPROTO_H_ 2227 struct futimes_args { 2228 int fd; 2229 struct timeval *tptr; 2230 }; 2231 #endif 2232 /* ARGSUSED */ 2233 int 2234 futimes(td, uap) 2235 struct thread *td; 2236 register struct futimes_args /* { 2237 syscallarg(int ) fd; 2238 syscallarg(struct timeval *) tptr; 2239 } */ *uap; 2240 { 2241 struct timespec ts[2]; 2242 struct file *fp; 2243 struct timeval *usrtvp; 2244 int error; 2245 2246 usrtvp = SCARG(uap, tptr); 2247 if ((error = getutimes(usrtvp, ts)) != 0) 2248 return (error); 2249 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2250 return (error); 2251 error = setutimes(td, (struct vnode *)fp->f_data, ts, 2, usrtvp==NULL); 2252 fdrop(fp, td); 2253 return (error); 2254 } 2255 2256 /* 2257 * Truncate a file given its path name. 2258 */ 2259 #ifndef _SYS_SYSPROTO_H_ 2260 struct truncate_args { 2261 char *path; 2262 int pad; 2263 off_t length; 2264 }; 2265 #endif 2266 /* ARGSUSED */ 2267 int 2268 truncate(td, uap) 2269 struct thread *td; 2270 register struct truncate_args /* { 2271 syscallarg(char *) path; 2272 syscallarg(int) pad; 2273 syscallarg(off_t) length; 2274 } */ *uap; 2275 { 2276 struct mount *mp; 2277 struct vnode *vp; 2278 struct vattr vattr; 2279 int error; 2280 struct nameidata nd; 2281 2282 if (uap->length < 0) 2283 return(EINVAL); 2284 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2285 if ((error = namei(&nd)) != 0) 2286 return (error); 2287 vp = nd.ni_vp; 2288 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2289 vrele(vp); 2290 return (error); 2291 } 2292 NDFREE(&nd, NDF_ONLY_PNBUF); 2293 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2294 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2295 if (vp->v_type == VDIR) 2296 error = EISDIR; 2297 else if ((error = vn_writechk(vp)) == 0 && 2298 (error = VOP_ACCESS(vp, VWRITE, td->td_ucred, td)) == 0) { 2299 VATTR_NULL(&vattr); 2300 vattr.va_size = SCARG(uap, length); 2301 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2302 } 2303 vput(vp); 2304 vn_finished_write(mp); 2305 return (error); 2306 } 2307 2308 /* 2309 * Truncate a file given a file descriptor. 2310 */ 2311 #ifndef _SYS_SYSPROTO_H_ 2312 struct ftruncate_args { 2313 int fd; 2314 int pad; 2315 off_t length; 2316 }; 2317 #endif 2318 /* ARGSUSED */ 2319 int 2320 ftruncate(td, uap) 2321 struct thread *td; 2322 register struct ftruncate_args /* { 2323 syscallarg(int) fd; 2324 syscallarg(int) pad; 2325 syscallarg(off_t) length; 2326 } */ *uap; 2327 { 2328 struct mount *mp; 2329 struct vattr vattr; 2330 struct vnode *vp; 2331 struct file *fp; 2332 int error; 2333 2334 if (uap->length < 0) 2335 return(EINVAL); 2336 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2337 return (error); 2338 if ((fp->f_flag & FWRITE) == 0) { 2339 fdrop(fp, td); 2340 return (EINVAL); 2341 } 2342 vp = (struct vnode *)fp->f_data; 2343 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2344 fdrop(fp, td); 2345 return (error); 2346 } 2347 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2348 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2349 if (vp->v_type == VDIR) 2350 error = EISDIR; 2351 else if ((error = vn_writechk(vp)) == 0) { 2352 VATTR_NULL(&vattr); 2353 vattr.va_size = SCARG(uap, length); 2354 error = VOP_SETATTR(vp, &vattr, fp->f_cred, td); 2355 } 2356 VOP_UNLOCK(vp, 0, td); 2357 vn_finished_write(mp); 2358 fdrop(fp, td); 2359 return (error); 2360 } 2361 2362 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 2363 /* 2364 * Truncate a file given its path name. 2365 */ 2366 #ifndef _SYS_SYSPROTO_H_ 2367 struct otruncate_args { 2368 char *path; 2369 long length; 2370 }; 2371 #endif 2372 /* ARGSUSED */ 2373 int 2374 otruncate(td, uap) 2375 struct thread *td; 2376 register struct otruncate_args /* { 2377 syscallarg(char *) path; 2378 syscallarg(long) length; 2379 } */ *uap; 2380 { 2381 struct truncate_args /* { 2382 syscallarg(char *) path; 2383 syscallarg(int) pad; 2384 syscallarg(off_t) length; 2385 } */ nuap; 2386 2387 SCARG(&nuap, path) = SCARG(uap, path); 2388 SCARG(&nuap, length) = SCARG(uap, length); 2389 return (truncate(td, &nuap)); 2390 } 2391 2392 /* 2393 * Truncate a file given a file descriptor. 2394 */ 2395 #ifndef _SYS_SYSPROTO_H_ 2396 struct oftruncate_args { 2397 int fd; 2398 long length; 2399 }; 2400 #endif 2401 /* ARGSUSED */ 2402 int 2403 oftruncate(td, uap) 2404 struct thread *td; 2405 register struct oftruncate_args /* { 2406 syscallarg(int) fd; 2407 syscallarg(long) length; 2408 } */ *uap; 2409 { 2410 struct ftruncate_args /* { 2411 syscallarg(int) fd; 2412 syscallarg(int) pad; 2413 syscallarg(off_t) length; 2414 } */ nuap; 2415 2416 SCARG(&nuap, fd) = SCARG(uap, fd); 2417 SCARG(&nuap, length) = SCARG(uap, length); 2418 return (ftruncate(td, &nuap)); 2419 } 2420 #endif /* COMPAT_43 || COMPAT_SUNOS */ 2421 2422 /* 2423 * Sync an open file. 2424 */ 2425 #ifndef _SYS_SYSPROTO_H_ 2426 struct fsync_args { 2427 int fd; 2428 }; 2429 #endif 2430 /* ARGSUSED */ 2431 int 2432 fsync(td, uap) 2433 struct thread *td; 2434 struct fsync_args /* { 2435 syscallarg(int) fd; 2436 } */ *uap; 2437 { 2438 struct vnode *vp; 2439 struct mount *mp; 2440 struct file *fp; 2441 vm_object_t obj; 2442 int error; 2443 2444 GIANT_REQUIRED; 2445 2446 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2447 return (error); 2448 vp = (struct vnode *)fp->f_data; 2449 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2450 fdrop(fp, td); 2451 return (error); 2452 } 2453 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2454 if (VOP_GETVOBJECT(vp, &obj) == 0) { 2455 vm_object_page_clean(obj, 0, 0, 0); 2456 } 2457 error = VOP_FSYNC(vp, fp->f_cred, MNT_WAIT, td); 2458 if (error == 0 && vp->v_mount && (vp->v_mount->mnt_flag & MNT_SOFTDEP) 2459 && softdep_fsync_hook != NULL) 2460 error = (*softdep_fsync_hook)(vp); 2461 2462 VOP_UNLOCK(vp, 0, td); 2463 vn_finished_write(mp); 2464 fdrop(fp, td); 2465 return (error); 2466 } 2467 2468 /* 2469 * Rename files. Source and destination must either both be directories, 2470 * or both not be directories. If target is a directory, it must be empty. 2471 */ 2472 #ifndef _SYS_SYSPROTO_H_ 2473 struct rename_args { 2474 char *from; 2475 char *to; 2476 }; 2477 #endif 2478 /* ARGSUSED */ 2479 int 2480 rename(td, uap) 2481 struct thread *td; 2482 register struct rename_args /* { 2483 syscallarg(char *) from; 2484 syscallarg(char *) to; 2485 } */ *uap; 2486 { 2487 struct mount *mp; 2488 struct vnode *tvp, *fvp, *tdvp; 2489 struct nameidata fromnd, tond; 2490 int error; 2491 2492 bwillwrite(); 2493 NDINIT(&fromnd, DELETE, WANTPARENT | SAVESTART, UIO_USERSPACE, 2494 SCARG(uap, from), td); 2495 if ((error = namei(&fromnd)) != 0) 2496 return (error); 2497 fvp = fromnd.ni_vp; 2498 if ((error = vn_start_write(fvp, &mp, V_WAIT | PCATCH)) != 0) { 2499 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2500 vrele(fromnd.ni_dvp); 2501 vrele(fvp); 2502 goto out1; 2503 } 2504 NDINIT(&tond, RENAME, LOCKPARENT | LOCKLEAF | NOCACHE | SAVESTART | NOOBJ, 2505 UIO_USERSPACE, SCARG(uap, to), td); 2506 if (fromnd.ni_vp->v_type == VDIR) 2507 tond.ni_cnd.cn_flags |= WILLBEDIR; 2508 if ((error = namei(&tond)) != 0) { 2509 /* Translate error code for rename("dir1", "dir2/."). */ 2510 if (error == EISDIR && fvp->v_type == VDIR) 2511 error = EINVAL; 2512 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2513 vrele(fromnd.ni_dvp); 2514 vrele(fvp); 2515 goto out1; 2516 } 2517 tdvp = tond.ni_dvp; 2518 tvp = tond.ni_vp; 2519 if (tvp != NULL) { 2520 if (fvp->v_type == VDIR && tvp->v_type != VDIR) { 2521 error = ENOTDIR; 2522 goto out; 2523 } else if (fvp->v_type != VDIR && tvp->v_type == VDIR) { 2524 error = EISDIR; 2525 goto out; 2526 } 2527 } 2528 if (fvp == tdvp) 2529 error = EINVAL; 2530 /* 2531 * If source is the same as the destination (that is the 2532 * same inode number with the same name in the same directory), 2533 * then there is nothing to do. 2534 */ 2535 if (fvp == tvp && fromnd.ni_dvp == tdvp && 2536 fromnd.ni_cnd.cn_namelen == tond.ni_cnd.cn_namelen && 2537 !bcmp(fromnd.ni_cnd.cn_nameptr, tond.ni_cnd.cn_nameptr, 2538 fromnd.ni_cnd.cn_namelen)) 2539 error = -1; 2540 out: 2541 if (!error) { 2542 VOP_LEASE(tdvp, td, td->td_ucred, LEASE_WRITE); 2543 if (fromnd.ni_dvp != tdvp) { 2544 VOP_LEASE(fromnd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2545 } 2546 if (tvp) { 2547 VOP_LEASE(tvp, td, td->td_ucred, LEASE_WRITE); 2548 } 2549 error = VOP_RENAME(fromnd.ni_dvp, fromnd.ni_vp, &fromnd.ni_cnd, 2550 tond.ni_dvp, tond.ni_vp, &tond.ni_cnd); 2551 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2552 NDFREE(&tond, NDF_ONLY_PNBUF); 2553 } else { 2554 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2555 NDFREE(&tond, NDF_ONLY_PNBUF); 2556 if (tdvp == tvp) 2557 vrele(tdvp); 2558 else 2559 vput(tdvp); 2560 if (tvp) 2561 vput(tvp); 2562 vrele(fromnd.ni_dvp); 2563 vrele(fvp); 2564 } 2565 vrele(tond.ni_startdir); 2566 vn_finished_write(mp); 2567 ASSERT_VOP_UNLOCKED(fromnd.ni_dvp, "rename"); 2568 ASSERT_VOP_UNLOCKED(fromnd.ni_vp, "rename"); 2569 ASSERT_VOP_UNLOCKED(tond.ni_dvp, "rename"); 2570 ASSERT_VOP_UNLOCKED(tond.ni_vp, "rename"); 2571 out1: 2572 if (fromnd.ni_startdir) 2573 vrele(fromnd.ni_startdir); 2574 if (error == -1) 2575 return (0); 2576 return (error); 2577 } 2578 2579 /* 2580 * Make a directory file. 2581 */ 2582 #ifndef _SYS_SYSPROTO_H_ 2583 struct mkdir_args { 2584 char *path; 2585 int mode; 2586 }; 2587 #endif 2588 /* ARGSUSED */ 2589 int 2590 mkdir(td, uap) 2591 struct thread *td; 2592 register struct mkdir_args /* { 2593 syscallarg(char *) path; 2594 syscallarg(int) mode; 2595 } */ *uap; 2596 { 2597 2598 return vn_mkdir(uap->path, uap->mode, UIO_USERSPACE, td); 2599 } 2600 2601 int 2602 vn_mkdir(path, mode, segflg, td) 2603 char *path; 2604 int mode; 2605 enum uio_seg segflg; 2606 struct thread *td; 2607 { 2608 struct mount *mp; 2609 struct vnode *vp; 2610 struct vattr vattr; 2611 int error; 2612 struct nameidata nd; 2613 2614 restart: 2615 bwillwrite(); 2616 NDINIT(&nd, CREATE, LOCKPARENT, segflg, path, td); 2617 nd.ni_cnd.cn_flags |= WILLBEDIR; 2618 if ((error = namei(&nd)) != 0) 2619 return (error); 2620 vp = nd.ni_vp; 2621 if (vp != NULL) { 2622 NDFREE(&nd, NDF_ONLY_PNBUF); 2623 vrele(vp); 2624 /* 2625 * XXX namei called with LOCKPARENT but not LOCKLEAF has 2626 * the strange behaviour of leaving the vnode unlocked 2627 * if the target is the same vnode as the parent. 2628 */ 2629 if (vp == nd.ni_dvp) 2630 vrele(nd.ni_dvp); 2631 else 2632 vput(nd.ni_dvp); 2633 return (EEXIST); 2634 } 2635 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 2636 NDFREE(&nd, NDF_ONLY_PNBUF); 2637 vput(nd.ni_dvp); 2638 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 2639 return (error); 2640 goto restart; 2641 } 2642 VATTR_NULL(&vattr); 2643 vattr.va_type = VDIR; 2644 FILEDESC_LOCK(td->td_proc->p_fd); 2645 vattr.va_mode = (mode & ACCESSPERMS) &~ td->td_proc->p_fd->fd_cmask; 2646 FILEDESC_UNLOCK(td->td_proc->p_fd); 2647 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2648 error = VOP_MKDIR(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 2649 NDFREE(&nd, NDF_ONLY_PNBUF); 2650 vput(nd.ni_dvp); 2651 if (!error) 2652 vput(nd.ni_vp); 2653 vn_finished_write(mp); 2654 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mkdir"); 2655 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mkdir"); 2656 return (error); 2657 } 2658 2659 /* 2660 * Remove a directory file. 2661 */ 2662 #ifndef _SYS_SYSPROTO_H_ 2663 struct rmdir_args { 2664 char *path; 2665 }; 2666 #endif 2667 /* ARGSUSED */ 2668 int 2669 rmdir(td, uap) 2670 struct thread *td; 2671 struct rmdir_args /* { 2672 syscallarg(char *) path; 2673 } */ *uap; 2674 { 2675 struct mount *mp; 2676 struct vnode *vp; 2677 int error; 2678 struct nameidata nd; 2679 2680 restart: 2681 bwillwrite(); 2682 NDINIT(&nd, DELETE, LOCKPARENT | LOCKLEAF, UIO_USERSPACE, 2683 SCARG(uap, path), td); 2684 if ((error = namei(&nd)) != 0) 2685 return (error); 2686 vp = nd.ni_vp; 2687 if (vp->v_type != VDIR) { 2688 error = ENOTDIR; 2689 goto out; 2690 } 2691 /* 2692 * No rmdir "." please. 2693 */ 2694 if (nd.ni_dvp == vp) { 2695 error = EINVAL; 2696 goto out; 2697 } 2698 /* 2699 * The root of a mounted filesystem cannot be deleted. 2700 */ 2701 if (vp->v_flag & VROOT) { 2702 error = EBUSY; 2703 goto out; 2704 } 2705 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 2706 NDFREE(&nd, NDF_ONLY_PNBUF); 2707 if (nd.ni_dvp == vp) 2708 vrele(nd.ni_dvp); 2709 else 2710 vput(nd.ni_dvp); 2711 vput(vp); 2712 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 2713 return (error); 2714 goto restart; 2715 } 2716 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2717 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2718 error = VOP_RMDIR(nd.ni_dvp, nd.ni_vp, &nd.ni_cnd); 2719 vn_finished_write(mp); 2720 out: 2721 NDFREE(&nd, NDF_ONLY_PNBUF); 2722 if (nd.ni_dvp == vp) 2723 vrele(nd.ni_dvp); 2724 else 2725 vput(nd.ni_dvp); 2726 vput(vp); 2727 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "rmdir"); 2728 ASSERT_VOP_UNLOCKED(nd.ni_vp, "rmdir"); 2729 return (error); 2730 } 2731 2732 #ifdef COMPAT_43 2733 /* 2734 * Read a block of directory entries in a filesystem independent format. 2735 */ 2736 #ifndef _SYS_SYSPROTO_H_ 2737 struct ogetdirentries_args { 2738 int fd; 2739 char *buf; 2740 u_int count; 2741 long *basep; 2742 }; 2743 #endif 2744 int 2745 ogetdirentries(td, uap) 2746 struct thread *td; 2747 register struct ogetdirentries_args /* { 2748 syscallarg(int) fd; 2749 syscallarg(char *) buf; 2750 syscallarg(u_int) count; 2751 syscallarg(long *) basep; 2752 } */ *uap; 2753 { 2754 struct vnode *vp; 2755 struct file *fp; 2756 struct uio auio, kuio; 2757 struct iovec aiov, kiov; 2758 struct dirent *dp, *edp; 2759 caddr_t dirbuf; 2760 int error, eofflag, readcnt; 2761 long loff; 2762 2763 /* XXX arbitrary sanity limit on `count'. */ 2764 if (SCARG(uap, count) > 64 * 1024) 2765 return (EINVAL); 2766 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2767 return (error); 2768 if ((fp->f_flag & FREAD) == 0) { 2769 fdrop(fp, td); 2770 return (EBADF); 2771 } 2772 vp = (struct vnode *)fp->f_data; 2773 unionread: 2774 if (vp->v_type != VDIR) { 2775 fdrop(fp, td); 2776 return (EINVAL); 2777 } 2778 aiov.iov_base = SCARG(uap, buf); 2779 aiov.iov_len = SCARG(uap, count); 2780 auio.uio_iov = &aiov; 2781 auio.uio_iovcnt = 1; 2782 auio.uio_rw = UIO_READ; 2783 auio.uio_segflg = UIO_USERSPACE; 2784 auio.uio_td = td; 2785 auio.uio_resid = SCARG(uap, count); 2786 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2787 loff = auio.uio_offset = fp->f_offset; 2788 # if (BYTE_ORDER != LITTLE_ENDIAN) 2789 if (vp->v_mount->mnt_maxsymlinklen <= 0) { 2790 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, 2791 NULL, NULL); 2792 fp->f_offset = auio.uio_offset; 2793 } else 2794 # endif 2795 { 2796 kuio = auio; 2797 kuio.uio_iov = &kiov; 2798 kuio.uio_segflg = UIO_SYSSPACE; 2799 kiov.iov_len = SCARG(uap, count); 2800 MALLOC(dirbuf, caddr_t, SCARG(uap, count), M_TEMP, M_WAITOK); 2801 kiov.iov_base = dirbuf; 2802 error = VOP_READDIR(vp, &kuio, fp->f_cred, &eofflag, 2803 NULL, NULL); 2804 fp->f_offset = kuio.uio_offset; 2805 if (error == 0) { 2806 readcnt = SCARG(uap, count) - kuio.uio_resid; 2807 edp = (struct dirent *)&dirbuf[readcnt]; 2808 for (dp = (struct dirent *)dirbuf; dp < edp; ) { 2809 # if (BYTE_ORDER == LITTLE_ENDIAN) 2810 /* 2811 * The expected low byte of 2812 * dp->d_namlen is our dp->d_type. 2813 * The high MBZ byte of dp->d_namlen 2814 * is our dp->d_namlen. 2815 */ 2816 dp->d_type = dp->d_namlen; 2817 dp->d_namlen = 0; 2818 # else 2819 /* 2820 * The dp->d_type is the high byte 2821 * of the expected dp->d_namlen, 2822 * so must be zero'ed. 2823 */ 2824 dp->d_type = 0; 2825 # endif 2826 if (dp->d_reclen > 0) { 2827 dp = (struct dirent *) 2828 ((char *)dp + dp->d_reclen); 2829 } else { 2830 error = EIO; 2831 break; 2832 } 2833 } 2834 if (dp >= edp) 2835 error = uiomove(dirbuf, readcnt, &auio); 2836 } 2837 FREE(dirbuf, M_TEMP); 2838 } 2839 VOP_UNLOCK(vp, 0, td); 2840 if (error) { 2841 fdrop(fp, td); 2842 return (error); 2843 } 2844 if (SCARG(uap, count) == auio.uio_resid) { 2845 if (union_dircheckp) { 2846 error = union_dircheckp(td, &vp, fp); 2847 if (error == -1) 2848 goto unionread; 2849 if (error) { 2850 fdrop(fp, td); 2851 return (error); 2852 } 2853 } 2854 if ((vp->v_flag & VROOT) && 2855 (vp->v_mount->mnt_flag & MNT_UNION)) { 2856 struct vnode *tvp = vp; 2857 vp = vp->v_mount->mnt_vnodecovered; 2858 VREF(vp); 2859 fp->f_data = vp; 2860 fp->f_offset = 0; 2861 vrele(tvp); 2862 goto unionread; 2863 } 2864 } 2865 error = copyout(&loff, SCARG(uap, basep), sizeof(long)); 2866 fdrop(fp, td); 2867 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 2868 return (error); 2869 } 2870 #endif /* COMPAT_43 */ 2871 2872 /* 2873 * Read a block of directory entries in a filesystem independent format. 2874 */ 2875 #ifndef _SYS_SYSPROTO_H_ 2876 struct getdirentries_args { 2877 int fd; 2878 char *buf; 2879 u_int count; 2880 long *basep; 2881 }; 2882 #endif 2883 int 2884 getdirentries(td, uap) 2885 struct thread *td; 2886 register struct getdirentries_args /* { 2887 syscallarg(int) fd; 2888 syscallarg(char *) buf; 2889 syscallarg(u_int) count; 2890 syscallarg(long *) basep; 2891 } */ *uap; 2892 { 2893 struct vnode *vp; 2894 struct file *fp; 2895 struct uio auio; 2896 struct iovec aiov; 2897 long loff; 2898 int error, eofflag; 2899 2900 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2901 return (error); 2902 if ((fp->f_flag & FREAD) == 0) { 2903 fdrop(fp, td); 2904 return (EBADF); 2905 } 2906 vp = (struct vnode *)fp->f_data; 2907 unionread: 2908 if (vp->v_type != VDIR) { 2909 fdrop(fp, td); 2910 return (EINVAL); 2911 } 2912 aiov.iov_base = SCARG(uap, buf); 2913 aiov.iov_len = SCARG(uap, count); 2914 auio.uio_iov = &aiov; 2915 auio.uio_iovcnt = 1; 2916 auio.uio_rw = UIO_READ; 2917 auio.uio_segflg = UIO_USERSPACE; 2918 auio.uio_td = td; 2919 auio.uio_resid = SCARG(uap, count); 2920 /* vn_lock(vp, LK_SHARED | LK_RETRY, td); */ 2921 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2922 loff = auio.uio_offset = fp->f_offset; 2923 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, NULL, NULL); 2924 fp->f_offset = auio.uio_offset; 2925 VOP_UNLOCK(vp, 0, td); 2926 if (error) { 2927 fdrop(fp, td); 2928 return (error); 2929 } 2930 if (SCARG(uap, count) == auio.uio_resid) { 2931 if (union_dircheckp) { 2932 error = union_dircheckp(td, &vp, fp); 2933 if (error == -1) 2934 goto unionread; 2935 if (error) { 2936 fdrop(fp, td); 2937 return (error); 2938 } 2939 } 2940 if ((vp->v_flag & VROOT) && 2941 (vp->v_mount->mnt_flag & MNT_UNION)) { 2942 struct vnode *tvp = vp; 2943 vp = vp->v_mount->mnt_vnodecovered; 2944 VREF(vp); 2945 fp->f_data = vp; 2946 fp->f_offset = 0; 2947 vrele(tvp); 2948 goto unionread; 2949 } 2950 } 2951 if (SCARG(uap, basep) != NULL) { 2952 error = copyout(&loff, SCARG(uap, basep), sizeof(long)); 2953 } 2954 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 2955 fdrop(fp, td); 2956 return (error); 2957 } 2958 #ifndef _SYS_SYSPROTO_H_ 2959 struct getdents_args { 2960 int fd; 2961 char *buf; 2962 size_t count; 2963 }; 2964 #endif 2965 int 2966 getdents(td, uap) 2967 struct thread *td; 2968 register struct getdents_args /* { 2969 syscallarg(int) fd; 2970 syscallarg(char *) buf; 2971 syscallarg(u_int) count; 2972 } */ *uap; 2973 { 2974 struct getdirentries_args ap; 2975 ap.fd = uap->fd; 2976 ap.buf = uap->buf; 2977 ap.count = uap->count; 2978 ap.basep = NULL; 2979 return getdirentries(td, &ap); 2980 } 2981 2982 /* 2983 * Set the mode mask for creation of filesystem nodes. 2984 * 2985 * MP SAFE 2986 */ 2987 #ifndef _SYS_SYSPROTO_H_ 2988 struct umask_args { 2989 int newmask; 2990 }; 2991 #endif 2992 int 2993 umask(td, uap) 2994 struct thread *td; 2995 struct umask_args /* { 2996 syscallarg(int) newmask; 2997 } */ *uap; 2998 { 2999 register struct filedesc *fdp; 3000 3001 FILEDESC_LOCK(td->td_proc->p_fd); 3002 fdp = td->td_proc->p_fd; 3003 td->td_retval[0] = fdp->fd_cmask; 3004 fdp->fd_cmask = SCARG(uap, newmask) & ALLPERMS; 3005 FILEDESC_UNLOCK(td->td_proc->p_fd); 3006 return (0); 3007 } 3008 3009 /* 3010 * Void all references to file by ripping underlying filesystem 3011 * away from vnode. 3012 */ 3013 #ifndef _SYS_SYSPROTO_H_ 3014 struct revoke_args { 3015 char *path; 3016 }; 3017 #endif 3018 /* ARGSUSED */ 3019 int 3020 revoke(td, uap) 3021 struct thread *td; 3022 register struct revoke_args /* { 3023 syscallarg(char *) path; 3024 } */ *uap; 3025 { 3026 struct mount *mp; 3027 struct vnode *vp; 3028 struct vattr vattr; 3029 int error; 3030 struct nameidata nd; 3031 3032 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, SCARG(uap, path), 3033 td); 3034 if ((error = namei(&nd)) != 0) 3035 return (error); 3036 vp = nd.ni_vp; 3037 NDFREE(&nd, NDF_ONLY_PNBUF); 3038 if (vp->v_type != VCHR) { 3039 vput(vp); 3040 return (EINVAL); 3041 } 3042 error = VOP_GETATTR(vp, &vattr, td->td_ucred, td); 3043 if (error) { 3044 vput(vp); 3045 return (error); 3046 } 3047 VOP_UNLOCK(vp, 0, td); 3048 if (td->td_ucred->cr_uid != vattr.va_uid) { 3049 error = suser_cred(td->td_ucred, PRISON_ROOT); 3050 if (error) 3051 goto out; 3052 } 3053 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3054 goto out; 3055 if (vcount(vp) > 1) 3056 VOP_REVOKE(vp, REVOKEALL); 3057 vn_finished_write(mp); 3058 out: 3059 vrele(vp); 3060 return (error); 3061 } 3062 3063 /* 3064 * Convert a user file descriptor to a kernel file entry. 3065 * The file entry is locked upon returning. 3066 */ 3067 int 3068 getvnode(fdp, fd, fpp) 3069 struct filedesc *fdp; 3070 int fd; 3071 struct file **fpp; 3072 { 3073 int error; 3074 struct file *fp; 3075 3076 fp = NULL; 3077 if (fdp == NULL) 3078 error = EBADF; 3079 else { 3080 FILEDESC_LOCK(fdp); 3081 if ((u_int)fd >= fdp->fd_nfiles || 3082 (fp = fdp->fd_ofiles[fd]) == NULL) 3083 error = EBADF; 3084 else if (fp->f_type != DTYPE_VNODE && fp->f_type != DTYPE_FIFO) { 3085 fp = NULL; 3086 error = EINVAL; 3087 } else { 3088 fhold(fp); 3089 error = 0; 3090 } 3091 FILEDESC_UNLOCK(fdp); 3092 } 3093 *fpp = fp; 3094 return (error); 3095 } 3096 /* 3097 * Get (NFS) file handle 3098 */ 3099 #ifndef _SYS_SYSPROTO_H_ 3100 struct getfh_args { 3101 char *fname; 3102 fhandle_t *fhp; 3103 }; 3104 #endif 3105 int 3106 getfh(td, uap) 3107 struct thread *td; 3108 register struct getfh_args *uap; 3109 { 3110 struct nameidata nd; 3111 fhandle_t fh; 3112 register struct vnode *vp; 3113 int error; 3114 3115 /* 3116 * Must be super user 3117 */ 3118 error = suser(td); 3119 if (error) 3120 return (error); 3121 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->fname, td); 3122 error = namei(&nd); 3123 if (error) 3124 return (error); 3125 NDFREE(&nd, NDF_ONLY_PNBUF); 3126 vp = nd.ni_vp; 3127 bzero(&fh, sizeof(fh)); 3128 fh.fh_fsid = vp->v_mount->mnt_stat.f_fsid; 3129 error = VFS_VPTOFH(vp, &fh.fh_fid); 3130 vput(vp); 3131 if (error) 3132 return (error); 3133 error = copyout(&fh, uap->fhp, sizeof (fh)); 3134 return (error); 3135 } 3136 3137 /* 3138 * syscall for the rpc.lockd to use to translate a NFS file handle into 3139 * an open descriptor. 3140 * 3141 * warning: do not remove the suser() call or this becomes one giant 3142 * security hole. 3143 */ 3144 #ifndef _SYS_SYSPROTO_H_ 3145 struct fhopen_args { 3146 const struct fhandle *u_fhp; 3147 int flags; 3148 }; 3149 #endif 3150 int 3151 fhopen(td, uap) 3152 struct thread *td; 3153 struct fhopen_args /* { 3154 syscallarg(const struct fhandle *) u_fhp; 3155 syscallarg(int) flags; 3156 } */ *uap; 3157 { 3158 struct proc *p = td->td_proc; 3159 struct mount *mp; 3160 struct vnode *vp; 3161 struct fhandle fhp; 3162 struct vattr vat; 3163 struct vattr *vap = &vat; 3164 struct flock lf; 3165 struct file *fp; 3166 register struct filedesc *fdp = p->p_fd; 3167 int fmode, mode, error, type; 3168 struct file *nfp; 3169 int indx; 3170 3171 /* 3172 * Must be super user 3173 */ 3174 error = suser(td); 3175 if (error) 3176 return (error); 3177 3178 fmode = FFLAGS(SCARG(uap, flags)); 3179 /* why not allow a non-read/write open for our lockd? */ 3180 if (((fmode & (FREAD | FWRITE)) == 0) || (fmode & O_CREAT)) 3181 return (EINVAL); 3182 error = copyin(SCARG(uap,u_fhp), &fhp, sizeof(fhp)); 3183 if (error) 3184 return(error); 3185 /* find the mount point */ 3186 mp = vfs_getvfs(&fhp.fh_fsid); 3187 if (mp == NULL) 3188 return (ESTALE); 3189 /* now give me my vnode, it gets returned to me locked */ 3190 error = VFS_FHTOVP(mp, &fhp.fh_fid, &vp); 3191 if (error) 3192 return (error); 3193 /* 3194 * from now on we have to make sure not 3195 * to forget about the vnode 3196 * any error that causes an abort must vput(vp) 3197 * just set error = err and 'goto bad;'. 3198 */ 3199 3200 /* 3201 * from vn_open 3202 */ 3203 if (vp->v_type == VLNK) { 3204 error = EMLINK; 3205 goto bad; 3206 } 3207 if (vp->v_type == VSOCK) { 3208 error = EOPNOTSUPP; 3209 goto bad; 3210 } 3211 mode = 0; 3212 if (fmode & (FWRITE | O_TRUNC)) { 3213 if (vp->v_type == VDIR) { 3214 error = EISDIR; 3215 goto bad; 3216 } 3217 error = vn_writechk(vp); 3218 if (error) 3219 goto bad; 3220 mode |= VWRITE; 3221 } 3222 if (fmode & FREAD) 3223 mode |= VREAD; 3224 if (fmode & O_APPEND) 3225 mode |= VAPPEND; 3226 if (mode) { 3227 error = VOP_ACCESS(vp, mode, td->td_ucred, td); 3228 if (error) 3229 goto bad; 3230 } 3231 if (fmode & O_TRUNC) { 3232 VOP_UNLOCK(vp, 0, td); /* XXX */ 3233 if ((error = vn_start_write(NULL, &mp, V_WAIT | PCATCH)) != 0) { 3234 vrele(vp); 3235 return (error); 3236 } 3237 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3238 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); /* XXX */ 3239 VATTR_NULL(vap); 3240 vap->va_size = 0; 3241 error = VOP_SETATTR(vp, vap, td->td_ucred, td); 3242 vn_finished_write(mp); 3243 if (error) 3244 goto bad; 3245 } 3246 error = VOP_OPEN(vp, fmode, td->td_ucred, td); 3247 if (error) 3248 goto bad; 3249 /* 3250 * Make sure that a VM object is created for VMIO support. 3251 */ 3252 if (vn_canvmio(vp) == TRUE) { 3253 if ((error = vfs_object_create(vp, td, td->td_ucred)) != 0) 3254 goto bad; 3255 } 3256 if (fmode & FWRITE) 3257 vp->v_writecount++; 3258 3259 /* 3260 * end of vn_open code 3261 */ 3262 3263 if ((error = falloc(td, &nfp, &indx)) != 0) { 3264 if (fmode & FWRITE) 3265 vp->v_writecount--; 3266 goto bad; 3267 } 3268 fp = nfp; 3269 3270 /* 3271 * Hold an extra reference to avoid having fp ripped out 3272 * from under us while we block in the lock op 3273 */ 3274 fhold(fp); 3275 nfp->f_data = vp; 3276 nfp->f_flag = fmode & FMASK; 3277 nfp->f_ops = &vnops; 3278 nfp->f_type = DTYPE_VNODE; 3279 if (fmode & (O_EXLOCK | O_SHLOCK)) { 3280 lf.l_whence = SEEK_SET; 3281 lf.l_start = 0; 3282 lf.l_len = 0; 3283 if (fmode & O_EXLOCK) 3284 lf.l_type = F_WRLCK; 3285 else 3286 lf.l_type = F_RDLCK; 3287 type = F_FLOCK; 3288 if ((fmode & FNONBLOCK) == 0) 3289 type |= F_WAIT; 3290 VOP_UNLOCK(vp, 0, td); 3291 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 3292 type)) != 0) { 3293 /* 3294 * The lock request failed. Normally close the 3295 * descriptor but handle the case where someone might 3296 * have dup()d or close()d it when we weren't looking. 3297 */ 3298 FILEDESC_LOCK(fdp); 3299 if (fdp->fd_ofiles[indx] == fp) { 3300 fdp->fd_ofiles[indx] = NULL; 3301 FILEDESC_UNLOCK(fdp); 3302 fdrop(fp, td); 3303 } else 3304 FILEDESC_UNLOCK(fdp); 3305 /* 3306 * release our private reference 3307 */ 3308 fdrop(fp, td); 3309 return(error); 3310 } 3311 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3312 fp->f_flag |= FHASLOCK; 3313 } 3314 if ((vp->v_type == VREG) && (VOP_GETVOBJECT(vp, NULL) != 0)) 3315 vfs_object_create(vp, td, td->td_ucred); 3316 3317 VOP_UNLOCK(vp, 0, td); 3318 fdrop(fp, td); 3319 td->td_retval[0] = indx; 3320 return (0); 3321 3322 bad: 3323 vput(vp); 3324 return (error); 3325 } 3326 3327 /* 3328 * Stat an (NFS) file handle. 3329 */ 3330 #ifndef _SYS_SYSPROTO_H_ 3331 struct fhstat_args { 3332 struct fhandle *u_fhp; 3333 struct stat *sb; 3334 }; 3335 #endif 3336 int 3337 fhstat(td, uap) 3338 struct thread *td; 3339 register struct fhstat_args /* { 3340 syscallarg(struct fhandle *) u_fhp; 3341 syscallarg(struct stat *) sb; 3342 } */ *uap; 3343 { 3344 struct stat sb; 3345 fhandle_t fh; 3346 struct mount *mp; 3347 struct vnode *vp; 3348 int error; 3349 3350 /* 3351 * Must be super user 3352 */ 3353 error = suser(td); 3354 if (error) 3355 return (error); 3356 3357 error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t)); 3358 if (error) 3359 return (error); 3360 3361 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3362 return (ESTALE); 3363 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3364 return (error); 3365 error = vn_stat(vp, &sb, td); 3366 vput(vp); 3367 if (error) 3368 return (error); 3369 error = copyout(&sb, SCARG(uap, sb), sizeof(sb)); 3370 return (error); 3371 } 3372 3373 /* 3374 * Implement fstatfs() for (NFS) file handles. 3375 */ 3376 #ifndef _SYS_SYSPROTO_H_ 3377 struct fhstatfs_args { 3378 struct fhandle *u_fhp; 3379 struct statfs *buf; 3380 }; 3381 #endif 3382 int 3383 fhstatfs(td, uap) 3384 struct thread *td; 3385 struct fhstatfs_args /* { 3386 syscallarg(struct fhandle) *u_fhp; 3387 syscallarg(struct statfs) *buf; 3388 } */ *uap; 3389 { 3390 struct statfs *sp; 3391 struct mount *mp; 3392 struct vnode *vp; 3393 struct statfs sb; 3394 fhandle_t fh; 3395 int error; 3396 3397 /* 3398 * Must be super user 3399 */ 3400 error = suser(td); 3401 if (error) 3402 return (error); 3403 3404 if ((error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t))) != 0) 3405 return (error); 3406 3407 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3408 return (ESTALE); 3409 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3410 return (error); 3411 mp = vp->v_mount; 3412 sp = &mp->mnt_stat; 3413 vput(vp); 3414 if ((error = VFS_STATFS(mp, sp, td)) != 0) 3415 return (error); 3416 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 3417 if (suser(td)) { 3418 bcopy(sp, &sb, sizeof(sb)); 3419 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 3420 sp = &sb; 3421 } 3422 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 3423 } 3424 3425 /* 3426 * Syscall to push extended attribute configuration information into the 3427 * VFS. Accepts a path, which it converts to a mountpoint, as well as 3428 * a command (int cmd), and attribute name and misc data. For now, the 3429 * attribute name is left in userspace for consumption by the VFS_op. 3430 * It will probably be changed to be copied into sysspace by the 3431 * syscall in the future, once issues with various consumers of the 3432 * attribute code have raised their hands. 3433 * 3434 * Currently this is used only by UFS Extended Attributes. 3435 */ 3436 int 3437 extattrctl(td, uap) 3438 struct thread *td; 3439 struct extattrctl_args /* { 3440 syscallarg(const char *) path; 3441 syscallarg(int) cmd; 3442 syscallarg(const char *) filename; 3443 syscallarg(int) attrnamespace; 3444 syscallarg(const char *) attrname; 3445 } */ *uap; 3446 { 3447 struct vnode *filename_vp; 3448 struct nameidata nd; 3449 struct mount *mp, *mp_writable; 3450 char attrname[EXTATTR_MAXNAMELEN]; 3451 int error; 3452 3453 /* 3454 * uap->attrname is not always defined. We check again later when we 3455 * invoke the VFS call so as to pass in NULL there if needed. 3456 */ 3457 if (uap->attrname != NULL) { 3458 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, 3459 NULL); 3460 if (error) 3461 return (error); 3462 } 3463 3464 /* 3465 * uap->filename is not always defined. If it is, grab a vnode lock, 3466 * which VFS_EXTATTRCTL() will later release. 3467 */ 3468 filename_vp = NULL; 3469 if (uap->filename != NULL) { 3470 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 3471 uap->filename, td); 3472 if ((error = namei(&nd)) != 0) 3473 return (error); 3474 filename_vp = nd.ni_vp; 3475 NDFREE(&nd, NDF_NO_VP_RELE | NDF_NO_VP_UNLOCK); 3476 } 3477 3478 /* uap->path is always defined. */ 3479 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3480 if ((error = namei(&nd)) != 0) { 3481 if (filename_vp != NULL) 3482 vput(filename_vp); 3483 return (error); 3484 } 3485 mp = nd.ni_vp->v_mount; 3486 error = vn_start_write(nd.ni_vp, &mp_writable, V_WAIT | PCATCH); 3487 NDFREE(&nd, 0); 3488 if (error) { 3489 if (filename_vp != NULL) 3490 vput(filename_vp); 3491 return (error); 3492 } 3493 3494 if (uap->attrname != NULL) { 3495 error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, 3496 uap->attrnamespace, attrname, td); 3497 } else { 3498 error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, 3499 uap->attrnamespace, NULL, td); 3500 } 3501 3502 vn_finished_write(mp_writable); 3503 /* 3504 * VFS_EXTATTRCTL will have unlocked, but not de-ref'd, 3505 * filename_vp, so vrele it if it is defined. 3506 */ 3507 if (filename_vp != NULL) 3508 vrele(filename_vp); 3509 3510 return (error); 3511 } 3512 3513 /*- 3514 * Set a named extended attribute on a file or directory 3515 * 3516 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3517 * kernelspace string pointer "attrname", userspace buffer 3518 * pointer "data", buffer length "nbytes", thread "td". 3519 * Returns: 0 on success, an error number otherwise 3520 * Locks: none 3521 * References: vp must be a valid reference for the duration of the call 3522 */ 3523 static int 3524 extattr_set_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3525 void *data, size_t nbytes, struct thread *td) 3526 { 3527 struct mount *mp; 3528 struct uio auio; 3529 struct iovec aiov; 3530 ssize_t cnt; 3531 int error; 3532 3533 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3534 return (error); 3535 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3536 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3537 3538 aiov.iov_base = data; 3539 aiov.iov_len = nbytes; 3540 auio.uio_iov = &aiov; 3541 auio.uio_iovcnt = 1; 3542 auio.uio_offset = 0; 3543 if (nbytes > INT_MAX) { 3544 error = EINVAL; 3545 goto done; 3546 } 3547 auio.uio_resid = nbytes; 3548 auio.uio_rw = UIO_WRITE; 3549 auio.uio_segflg = UIO_USERSPACE; 3550 auio.uio_td = td; 3551 cnt = nbytes; 3552 3553 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio, 3554 td->td_ucred, td); 3555 cnt -= auio.uio_resid; 3556 td->td_retval[0] = cnt; 3557 3558 done: 3559 VOP_UNLOCK(vp, 0, td); 3560 vn_finished_write(mp); 3561 return (error); 3562 } 3563 3564 int 3565 extattr_set_file(td, uap) 3566 struct thread *td; 3567 struct extattr_set_file_args /* { 3568 syscallarg(const char *) path; 3569 syscallarg(int) attrnamespace; 3570 syscallarg(const char *) attrname; 3571 syscallarg(void *) data; 3572 syscallarg(size_t) nbytes; 3573 } */ *uap; 3574 { 3575 struct nameidata nd; 3576 char attrname[EXTATTR_MAXNAMELEN]; 3577 int error; 3578 3579 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3580 if (error) 3581 return (error); 3582 3583 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3584 if ((error = namei(&nd)) != 0) 3585 return (error); 3586 NDFREE(&nd, NDF_ONLY_PNBUF); 3587 3588 error = extattr_set_vp(nd.ni_vp, uap->attrnamespace, attrname, 3589 uap->data, uap->nbytes, td); 3590 3591 vrele(nd.ni_vp); 3592 return (error); 3593 } 3594 3595 int 3596 extattr_set_fd(td, uap) 3597 struct thread *td; 3598 struct extattr_set_fd_args /* { 3599 syscallarg(int) fd; 3600 syscallarg(int) attrnamespace; 3601 syscallarg(const char *) attrname; 3602 syscallarg(void *) data; 3603 syscallarg(size_t) nbytes; 3604 } */ *uap; 3605 { 3606 struct file *fp; 3607 char attrname[EXTATTR_MAXNAMELEN]; 3608 int error; 3609 3610 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3611 if (error) 3612 return (error); 3613 3614 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3615 return (error); 3616 3617 error = extattr_set_vp((struct vnode *)fp->f_data, uap->attrnamespace, 3618 attrname, uap->data, uap->nbytes, td); 3619 fdrop(fp, td); 3620 3621 return (error); 3622 } 3623 3624 /*- 3625 * Get a named extended attribute on a file or directory 3626 * 3627 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3628 * kernelspace string pointer "attrname", userspace buffer 3629 * pointer "data", buffer length "nbytes", thread "td". 3630 * Returns: 0 on success, an error number otherwise 3631 * Locks: none 3632 * References: vp must be a valid reference for the duration of the call 3633 */ 3634 static int 3635 extattr_get_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3636 void *data, size_t nbytes, struct thread *td) 3637 { 3638 struct uio auio, *auiop; 3639 struct iovec aiov; 3640 ssize_t cnt; 3641 size_t size, *sizep; 3642 int error; 3643 3644 VOP_LEASE(vp, td, td->td_ucred, LEASE_READ); 3645 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3646 3647 /* 3648 * Slightly unusual semantics: if the user provides a NULL data 3649 * pointer, they don't want to receive the data, just the 3650 * maximum read length. 3651 */ 3652 auiop = NULL; 3653 sizep = NULL; 3654 cnt = 0; 3655 if (data != NULL) { 3656 aiov.iov_base = data; 3657 aiov.iov_len = nbytes; 3658 auio.uio_iov = &aiov; 3659 auio.uio_offset = 0; 3660 if (nbytes > INT_MAX) { 3661 error = EINVAL; 3662 goto done; 3663 } 3664 auio.uio_resid = nbytes; 3665 auio.uio_rw = UIO_READ; 3666 auio.uio_segflg = UIO_USERSPACE; 3667 auio.uio_td = td; 3668 auiop = &auio; 3669 cnt = nbytes; 3670 } else 3671 sizep = &size; 3672 3673 error = VOP_GETEXTATTR(vp, attrnamespace, attrname, auiop, sizep, 3674 td->td_ucred, td); 3675 3676 if (auiop != NULL) { 3677 cnt -= auio.uio_resid; 3678 td->td_retval[0] = cnt; 3679 } else 3680 td->td_retval[0] = size; 3681 3682 done: 3683 VOP_UNLOCK(vp, 0, td); 3684 return (error); 3685 } 3686 3687 int 3688 extattr_get_file(td, uap) 3689 struct thread *td; 3690 struct extattr_get_file_args /* { 3691 syscallarg(const char *) path; 3692 syscallarg(int) attrnamespace; 3693 syscallarg(const char *) attrname; 3694 syscallarg(void *) data; 3695 syscallarg(size_t) nbytes; 3696 } */ *uap; 3697 { 3698 struct nameidata nd; 3699 char attrname[EXTATTR_MAXNAMELEN]; 3700 int error; 3701 3702 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3703 if (error) 3704 return (error); 3705 3706 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3707 if ((error = namei(&nd)) != 0) 3708 return (error); 3709 NDFREE(&nd, NDF_ONLY_PNBUF); 3710 3711 error = extattr_get_vp(nd.ni_vp, uap->attrnamespace, attrname, 3712 uap->data, uap->nbytes, td); 3713 3714 vrele(nd.ni_vp); 3715 return (error); 3716 } 3717 3718 int 3719 extattr_get_fd(td, uap) 3720 struct thread *td; 3721 struct extattr_get_fd_args /* { 3722 syscallarg(int) fd; 3723 syscallarg(int) attrnamespace; 3724 syscallarg(const char *) attrname; 3725 syscallarg(void *) data; 3726 syscallarg(size_t) nbytes; 3727 } */ *uap; 3728 { 3729 struct file *fp; 3730 char attrname[EXTATTR_MAXNAMELEN]; 3731 int error; 3732 3733 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3734 if (error) 3735 return (error); 3736 3737 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 3738 return (error); 3739 3740 error = extattr_get_vp((struct vnode *)fp->f_data, uap->attrnamespace, 3741 attrname, uap->data, uap->nbytes, td); 3742 3743 fdrop(fp, td); 3744 return (error); 3745 } 3746 3747 /* 3748 * extattr_delete_vp(): Delete a named extended attribute on a file or 3749 * directory 3750 * 3751 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3752 * kernelspace string pointer "attrname", proc "p" 3753 * Returns: 0 on success, an error number otherwise 3754 * Locks: none 3755 * References: vp must be a valid reference for the duration of the call 3756 */ 3757 static int 3758 extattr_delete_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3759 struct thread *td) 3760 { 3761 struct mount *mp; 3762 int error; 3763 3764 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3765 return (error); 3766 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3767 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3768 3769 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, td->td_ucred, 3770 td); 3771 3772 VOP_UNLOCK(vp, 0, td); 3773 vn_finished_write(mp); 3774 return (error); 3775 } 3776 3777 int 3778 extattr_delete_file(td, uap) 3779 struct thread *td; 3780 struct extattr_delete_file_args /* { 3781 syscallarg(const char *) path; 3782 syscallarg(int) attrnamespace; 3783 syscallarg(const char *) attrname; 3784 } */ *uap; 3785 { 3786 struct nameidata nd; 3787 char attrname[EXTATTR_MAXNAMELEN]; 3788 int error; 3789 3790 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3791 if (error) 3792 return(error); 3793 3794 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3795 if ((error = namei(&nd)) != 0) 3796 return(error); 3797 NDFREE(&nd, NDF_ONLY_PNBUF); 3798 3799 error = extattr_delete_vp(nd.ni_vp, uap->attrnamespace, attrname, td); 3800 3801 vrele(nd.ni_vp); 3802 return(error); 3803 } 3804 3805 int 3806 extattr_delete_fd(td, uap) 3807 struct thread *td; 3808 struct extattr_delete_fd_args /* { 3809 syscallarg(int) fd; 3810 syscallarg(int) attrnamespace; 3811 syscallarg(const char *) attrname; 3812 } */ *uap; 3813 { 3814 struct file *fp; 3815 struct vnode *vp; 3816 char attrname[EXTATTR_MAXNAMELEN]; 3817 int error; 3818 3819 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3820 if (error) 3821 return (error); 3822 3823 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3824 return (error); 3825 vp = (struct vnode *)fp->f_data; 3826 3827 error = extattr_delete_vp((struct vnode *)fp->f_data, 3828 uap->attrnamespace, attrname, td); 3829 3830 fdrop(fp, td); 3831 return (error); 3832 } 3833