1 /* 2 * Copyright (c) 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_syscalls.c 8.13 (Berkeley) 4/15/94 39 * $FreeBSD$ 40 */ 41 42 /* For 4.3 integer FS ID compatibility */ 43 #include "opt_compat.h" 44 #include "opt_mac.h" 45 46 #include <sys/param.h> 47 #include <sys/systm.h> 48 #include <sys/bio.h> 49 #include <sys/buf.h> 50 #include <sys/sysent.h> 51 #include <sys/mac.h> 52 #include <sys/malloc.h> 53 #include <sys/mount.h> 54 #include <sys/mutex.h> 55 #include <sys/sysproto.h> 56 #include <sys/namei.h> 57 #include <sys/filedesc.h> 58 #include <sys/kernel.h> 59 #include <sys/fcntl.h> 60 #include <sys/file.h> 61 #include <sys/linker.h> 62 #include <sys/stat.h> 63 #include <sys/sx.h> 64 #include <sys/unistd.h> 65 #include <sys/vnode.h> 66 #include <sys/proc.h> 67 #include <sys/dirent.h> 68 #include <sys/extattr.h> 69 #include <sys/jail.h> 70 #include <sys/sysctl.h> 71 72 #include <machine/limits.h> 73 #include <machine/stdarg.h> 74 75 #include <vm/vm.h> 76 #include <vm/vm_object.h> 77 #include <vm/vm_page.h> 78 #include <vm/uma.h> 79 80 static int change_dir(struct nameidata *ndp, struct thread *td); 81 static int chroot_refuse_vdir_fds(struct filedesc *fdp); 82 static int getutimes(const struct timeval *, struct timespec *); 83 static int setfown(struct thread *td, struct vnode *, uid_t, gid_t); 84 static int setfmode(struct thread *td, struct vnode *, int); 85 static int setfflags(struct thread *td, struct vnode *, int); 86 static int setutimes(struct thread *td, struct vnode *, 87 const struct timespec *, int, int); 88 static int vn_access(struct vnode *vp, int user_flags, struct ucred *cred, 89 struct thread *td); 90 91 int (*union_dircheckp)(struct thread *td, struct vnode **, struct file *); 92 int (*softdep_fsync_hook)(struct vnode *); 93 94 /* 95 * Sync each mounted filesystem. 96 */ 97 #ifndef _SYS_SYSPROTO_H_ 98 struct sync_args { 99 int dummy; 100 }; 101 #endif 102 103 #ifdef DEBUG 104 static int syncprt = 0; 105 SYSCTL_INT(_debug, OID_AUTO, syncprt, CTLFLAG_RW, &syncprt, 0, ""); 106 #endif 107 108 /* ARGSUSED */ 109 int 110 sync(td, uap) 111 struct thread *td; 112 struct sync_args *uap; 113 { 114 struct mount *mp, *nmp; 115 int asyncflag; 116 117 mtx_lock(&mountlist_mtx); 118 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 119 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 120 nmp = TAILQ_NEXT(mp, mnt_list); 121 continue; 122 } 123 if ((mp->mnt_flag & MNT_RDONLY) == 0 && 124 vn_start_write(NULL, &mp, V_NOWAIT) == 0) { 125 asyncflag = mp->mnt_flag & MNT_ASYNC; 126 mp->mnt_flag &= ~MNT_ASYNC; 127 vfs_msync(mp, MNT_NOWAIT); 128 VFS_SYNC(mp, MNT_NOWAIT, 129 ((td != NULL) ? td->td_ucred : NOCRED), td); 130 mp->mnt_flag |= asyncflag; 131 vn_finished_write(mp); 132 } 133 mtx_lock(&mountlist_mtx); 134 nmp = TAILQ_NEXT(mp, mnt_list); 135 vfs_unbusy(mp, td); 136 } 137 mtx_unlock(&mountlist_mtx); 138 #if 0 139 /* 140 * XXX don't call vfs_bufstats() yet because that routine 141 * was not imported in the Lite2 merge. 142 */ 143 #ifdef DIAGNOSTIC 144 if (syncprt) 145 vfs_bufstats(); 146 #endif /* DIAGNOSTIC */ 147 #endif 148 return (0); 149 } 150 151 /* XXX PRISON: could be per prison flag */ 152 static int prison_quotas; 153 #if 0 154 SYSCTL_INT(_kern_prison, OID_AUTO, quotas, CTLFLAG_RW, &prison_quotas, 0, ""); 155 #endif 156 157 /* 158 * Change filesystem quotas. 159 */ 160 #ifndef _SYS_SYSPROTO_H_ 161 struct quotactl_args { 162 char *path; 163 int cmd; 164 int uid; 165 caddr_t arg; 166 }; 167 #endif 168 /* ARGSUSED */ 169 int 170 quotactl(td, uap) 171 struct thread *td; 172 register struct quotactl_args /* { 173 syscallarg(char *) path; 174 syscallarg(int) cmd; 175 syscallarg(int) uid; 176 syscallarg(caddr_t) arg; 177 } */ *uap; 178 { 179 struct mount *mp; 180 int error; 181 struct nameidata nd; 182 183 if (jailed(td->td_ucred) && !prison_quotas) 184 return (EPERM); 185 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 186 if ((error = namei(&nd)) != 0) 187 return (error); 188 NDFREE(&nd, NDF_ONLY_PNBUF); 189 error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH); 190 vrele(nd.ni_vp); 191 if (error) 192 return (error); 193 error = VFS_QUOTACTL(mp, SCARG(uap, cmd), SCARG(uap, uid), 194 SCARG(uap, arg), td); 195 vn_finished_write(mp); 196 return (error); 197 } 198 199 /* 200 * Get filesystem statistics. 201 */ 202 #ifndef _SYS_SYSPROTO_H_ 203 struct statfs_args { 204 char *path; 205 struct statfs *buf; 206 }; 207 #endif 208 /* ARGSUSED */ 209 int 210 statfs(td, uap) 211 struct thread *td; 212 register struct statfs_args /* { 213 syscallarg(char *) path; 214 syscallarg(struct statfs *) buf; 215 } */ *uap; 216 { 217 register struct mount *mp; 218 register struct statfs *sp; 219 int error; 220 struct nameidata nd; 221 struct statfs sb; 222 223 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 224 if ((error = namei(&nd)) != 0) 225 return (error); 226 mp = nd.ni_vp->v_mount; 227 sp = &mp->mnt_stat; 228 NDFREE(&nd, NDF_ONLY_PNBUF); 229 vrele(nd.ni_vp); 230 #ifdef MAC 231 error = mac_check_mount_stat(td->td_ucred, mp); 232 if (error) 233 return (error); 234 #endif 235 error = VFS_STATFS(mp, sp, td); 236 if (error) 237 return (error); 238 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 239 if (suser(td)) { 240 bcopy(sp, &sb, sizeof(sb)); 241 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 242 sp = &sb; 243 } 244 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 245 } 246 247 /* 248 * Get filesystem statistics. 249 */ 250 #ifndef _SYS_SYSPROTO_H_ 251 struct fstatfs_args { 252 int fd; 253 struct statfs *buf; 254 }; 255 #endif 256 /* ARGSUSED */ 257 int 258 fstatfs(td, uap) 259 struct thread *td; 260 register struct fstatfs_args /* { 261 syscallarg(int) fd; 262 syscallarg(struct statfs *) buf; 263 } */ *uap; 264 { 265 struct file *fp; 266 struct mount *mp; 267 register struct statfs *sp; 268 int error; 269 struct statfs sb; 270 271 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 272 return (error); 273 mp = ((struct vnode *)fp->f_data)->v_mount; 274 fdrop(fp, td); 275 if (mp == NULL) 276 return (EBADF); 277 #ifdef MAC 278 error = mac_check_mount_stat(td->td_ucred, mp); 279 if (error) 280 return (error); 281 #endif 282 sp = &mp->mnt_stat; 283 error = VFS_STATFS(mp, sp, td); 284 if (error) 285 return (error); 286 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 287 if (suser(td)) { 288 bcopy(sp, &sb, sizeof(sb)); 289 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 290 sp = &sb; 291 } 292 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 293 } 294 295 /* 296 * Get statistics on all filesystems. 297 */ 298 #ifndef _SYS_SYSPROTO_H_ 299 struct getfsstat_args { 300 struct statfs *buf; 301 long bufsize; 302 int flags; 303 }; 304 #endif 305 int 306 getfsstat(td, uap) 307 struct thread *td; 308 register struct getfsstat_args /* { 309 syscallarg(struct statfs *) buf; 310 syscallarg(long) bufsize; 311 syscallarg(int) flags; 312 } */ *uap; 313 { 314 register struct mount *mp, *nmp; 315 register struct statfs *sp; 316 caddr_t sfsp; 317 long count, maxcount, error; 318 319 maxcount = SCARG(uap, bufsize) / sizeof(struct statfs); 320 sfsp = (caddr_t)SCARG(uap, buf); 321 count = 0; 322 mtx_lock(&mountlist_mtx); 323 for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) { 324 #ifdef MAC 325 if (mac_check_mount_stat(td->td_ucred, mp) != 0) { 326 nmp = TAILQ_NEXT(mp, mnt_list); 327 continue; 328 } 329 #endif 330 if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) { 331 nmp = TAILQ_NEXT(mp, mnt_list); 332 continue; 333 } 334 if (sfsp && count < maxcount) { 335 sp = &mp->mnt_stat; 336 /* 337 * If MNT_NOWAIT or MNT_LAZY is specified, do not 338 * refresh the fsstat cache. MNT_NOWAIT or MNT_LAZY 339 * overrides MNT_WAIT. 340 */ 341 if (((SCARG(uap, flags) & (MNT_LAZY|MNT_NOWAIT)) == 0 || 342 (SCARG(uap, flags) & MNT_WAIT)) && 343 (error = VFS_STATFS(mp, sp, td))) { 344 mtx_lock(&mountlist_mtx); 345 nmp = TAILQ_NEXT(mp, mnt_list); 346 vfs_unbusy(mp, td); 347 continue; 348 } 349 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 350 error = copyout(sp, sfsp, sizeof(*sp)); 351 if (error) { 352 vfs_unbusy(mp, td); 353 return (error); 354 } 355 sfsp += sizeof(*sp); 356 } 357 count++; 358 mtx_lock(&mountlist_mtx); 359 nmp = TAILQ_NEXT(mp, mnt_list); 360 vfs_unbusy(mp, td); 361 } 362 mtx_unlock(&mountlist_mtx); 363 if (sfsp && count > maxcount) 364 td->td_retval[0] = maxcount; 365 else 366 td->td_retval[0] = count; 367 return (0); 368 } 369 370 /* 371 * Change current working directory to a given file descriptor. 372 */ 373 #ifndef _SYS_SYSPROTO_H_ 374 struct fchdir_args { 375 int fd; 376 }; 377 #endif 378 /* ARGSUSED */ 379 int 380 fchdir(td, uap) 381 struct thread *td; 382 struct fchdir_args /* { 383 syscallarg(int) fd; 384 } */ *uap; 385 { 386 register struct filedesc *fdp = td->td_proc->p_fd; 387 struct vnode *vp, *tdp, *vpold; 388 struct mount *mp; 389 struct file *fp; 390 int error; 391 392 if ((error = getvnode(fdp, SCARG(uap, fd), &fp)) != 0) 393 return (error); 394 vp = (struct vnode *)fp->f_data; 395 VREF(vp); 396 fdrop(fp, td); 397 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 398 if (vp->v_type != VDIR) 399 error = ENOTDIR; 400 #ifdef MAC 401 else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) { 402 } 403 #endif 404 else 405 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 406 while (!error && (mp = vp->v_mountedhere) != NULL) { 407 if (vfs_busy(mp, 0, 0, td)) 408 continue; 409 error = VFS_ROOT(mp, &tdp); 410 vfs_unbusy(mp, td); 411 if (error) 412 break; 413 vput(vp); 414 vp = tdp; 415 } 416 if (error) { 417 vput(vp); 418 return (error); 419 } 420 VOP_UNLOCK(vp, 0, td); 421 FILEDESC_LOCK(fdp); 422 vpold = fdp->fd_cdir; 423 fdp->fd_cdir = vp; 424 FILEDESC_UNLOCK(fdp); 425 vrele(vpold); 426 return (0); 427 } 428 429 /* 430 * Change current working directory (``.''). 431 */ 432 #ifndef _SYS_SYSPROTO_H_ 433 struct chdir_args { 434 char *path; 435 }; 436 #endif 437 /* ARGSUSED */ 438 int 439 chdir(td, uap) 440 struct thread *td; 441 struct chdir_args /* { 442 syscallarg(char *) path; 443 } */ *uap; 444 { 445 register struct filedesc *fdp = td->td_proc->p_fd; 446 int error; 447 struct nameidata nd; 448 struct vnode *vp; 449 450 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 451 SCARG(uap, path), td); 452 if ((error = change_dir(&nd, td)) != 0) 453 return (error); 454 NDFREE(&nd, NDF_ONLY_PNBUF); 455 FILEDESC_LOCK(fdp); 456 vp = fdp->fd_cdir; 457 fdp->fd_cdir = nd.ni_vp; 458 FILEDESC_UNLOCK(fdp); 459 vrele(vp); 460 return (0); 461 } 462 463 /* 464 * Helper function for raised chroot(2) security function: Refuse if 465 * any filedescriptors are open directories. 466 */ 467 static int 468 chroot_refuse_vdir_fds(fdp) 469 struct filedesc *fdp; 470 { 471 struct vnode *vp; 472 struct file *fp; 473 int fd; 474 475 FILEDESC_LOCK_ASSERT(fdp, MA_OWNED); 476 for (fd = 0; fd < fdp->fd_nfiles ; fd++) { 477 fp = fget_locked(fdp, fd); 478 if (fp == NULL) 479 continue; 480 if (fp->f_type == DTYPE_VNODE) { 481 vp = (struct vnode *)fp->f_data; 482 if (vp->v_type == VDIR) 483 return (EPERM); 484 } 485 } 486 return (0); 487 } 488 489 /* 490 * This sysctl determines if we will allow a process to chroot(2) if it 491 * has a directory open: 492 * 0: disallowed for all processes. 493 * 1: allowed for processes that were not already chroot(2)'ed. 494 * 2: allowed for all processes. 495 */ 496 497 static int chroot_allow_open_directories = 1; 498 499 SYSCTL_INT(_kern, OID_AUTO, chroot_allow_open_directories, CTLFLAG_RW, 500 &chroot_allow_open_directories, 0, ""); 501 502 /* 503 * Change notion of root (``/'') directory. 504 */ 505 #ifndef _SYS_SYSPROTO_H_ 506 struct chroot_args { 507 char *path; 508 }; 509 #endif 510 /* ARGSUSED */ 511 int 512 chroot(td, uap) 513 struct thread *td; 514 struct chroot_args /* { 515 syscallarg(char *) path; 516 } */ *uap; 517 { 518 register struct filedesc *fdp = td->td_proc->p_fd; 519 int error; 520 struct nameidata nd; 521 struct vnode *vp; 522 523 error = suser_cred(td->td_ucred, PRISON_ROOT); 524 if (error) 525 return (error); 526 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 527 SCARG(uap, path), td); 528 mtx_lock(&Giant); 529 if ((error = change_dir(&nd, td)) != 0) 530 goto error; 531 #ifdef MAC 532 if ((error = mac_check_vnode_chroot(td->td_ucred, nd.ni_vp))) 533 goto error; 534 #endif 535 FILEDESC_LOCK(fdp); 536 if (chroot_allow_open_directories == 0 || 537 (chroot_allow_open_directories == 1 && fdp->fd_rdir != rootvnode)) { 538 error = chroot_refuse_vdir_fds(fdp); 539 if (error) 540 goto error_unlock; 541 } 542 vp = fdp->fd_rdir; 543 fdp->fd_rdir = nd.ni_vp; 544 if (!fdp->fd_jdir) { 545 fdp->fd_jdir = nd.ni_vp; 546 VREF(fdp->fd_jdir); 547 } 548 FILEDESC_UNLOCK(fdp); 549 NDFREE(&nd, NDF_ONLY_PNBUF); 550 vrele(vp); 551 mtx_unlock(&Giant); 552 return (0); 553 error_unlock: 554 FILEDESC_UNLOCK(fdp); 555 error: 556 mtx_unlock(&Giant); 557 NDFREE(&nd, 0); 558 return (error); 559 } 560 561 /* 562 * Common routine for chroot and chdir. 563 */ 564 static int 565 change_dir(ndp, td) 566 register struct nameidata *ndp; 567 struct thread *td; 568 { 569 struct vnode *vp; 570 int error; 571 572 error = namei(ndp); 573 if (error) 574 return (error); 575 vp = ndp->ni_vp; 576 if (vp->v_type != VDIR) 577 error = ENOTDIR; 578 #ifdef MAC 579 else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) { 580 } 581 #endif 582 else 583 error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td); 584 if (error) 585 vput(vp); 586 else 587 VOP_UNLOCK(vp, 0, td); 588 return (error); 589 } 590 591 /* 592 * Check permissions, allocate an open file structure, 593 * and call the device open routine if any. 594 */ 595 #ifndef _SYS_SYSPROTO_H_ 596 struct open_args { 597 char *path; 598 int flags; 599 int mode; 600 }; 601 #endif 602 int 603 open(td, uap) 604 struct thread *td; 605 register struct open_args /* { 606 syscallarg(char *) path; 607 syscallarg(int) flags; 608 syscallarg(int) mode; 609 } */ *uap; 610 { 611 struct proc *p = td->td_proc; 612 struct filedesc *fdp = p->p_fd; 613 struct file *fp; 614 struct vnode *vp; 615 struct vattr vat; 616 struct mount *mp; 617 int cmode, flags, oflags; 618 struct file *nfp; 619 int type, indx, error; 620 struct flock lf; 621 struct nameidata nd; 622 623 oflags = SCARG(uap, flags); 624 if ((oflags & O_ACCMODE) == O_ACCMODE) 625 return (EINVAL); 626 flags = FFLAGS(oflags); 627 error = falloc(td, &nfp, &indx); 628 if (error) 629 return (error); 630 fp = nfp; 631 FILEDESC_LOCK(fdp); 632 cmode = ((SCARG(uap, mode) &~ fdp->fd_cmask) & ALLPERMS) &~ S_ISTXT; 633 FILEDESC_UNLOCK(fdp); 634 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 635 td->td_dupfd = -indx - 1; /* XXX check for fdopen */ 636 /* 637 * Bump the ref count to prevent another process from closing 638 * the descriptor while we are blocked in vn_open() 639 */ 640 fhold(fp); 641 error = vn_open(&nd, &flags, cmode); 642 if (error) { 643 /* 644 * release our own reference 645 */ 646 fdrop(fp, td); 647 648 /* 649 * handle special fdopen() case. bleh. dupfdopen() is 650 * responsible for dropping the old contents of ofiles[indx] 651 * if it succeeds. 652 */ 653 if ((error == ENODEV || error == ENXIO) && 654 td->td_dupfd >= 0 && /* XXX from fdopen */ 655 (error = 656 dupfdopen(td, fdp, indx, td->td_dupfd, flags, error)) == 0) { 657 td->td_retval[0] = indx; 658 return (0); 659 } 660 /* 661 * Clean up the descriptor, but only if another thread hadn't 662 * replaced or closed it. 663 */ 664 FILEDESC_LOCK(fdp); 665 if (fdp->fd_ofiles[indx] == fp) { 666 fdp->fd_ofiles[indx] = NULL; 667 FILEDESC_UNLOCK(fdp); 668 fdrop(fp, td); 669 } else 670 FILEDESC_UNLOCK(fdp); 671 672 if (error == ERESTART) 673 error = EINTR; 674 return (error); 675 } 676 td->td_dupfd = 0; 677 NDFREE(&nd, NDF_ONLY_PNBUF); 678 vp = nd.ni_vp; 679 680 /* 681 * There should be 2 references on the file, one from the descriptor 682 * table, and one for us. 683 * 684 * Handle the case where someone closed the file (via its file 685 * descriptor) while we were blocked. The end result should look 686 * like opening the file succeeded but it was immediately closed. 687 */ 688 FILEDESC_LOCK(fdp); 689 FILE_LOCK(fp); 690 if (fp->f_count == 1) { 691 KASSERT(fdp->fd_ofiles[indx] != fp, 692 ("Open file descriptor lost all refs")); 693 FILEDESC_UNLOCK(fdp); 694 FILE_UNLOCK(fp); 695 VOP_UNLOCK(vp, 0, td); 696 vn_close(vp, flags & FMASK, fp->f_cred, td); 697 fdrop(fp, td); 698 td->td_retval[0] = indx; 699 return 0; 700 } 701 702 /* assert that vn_open created a backing object if one is needed */ 703 KASSERT(!vn_canvmio(vp) || VOP_GETVOBJECT(vp, NULL) == 0, 704 ("open: vmio vnode has no backing object after vn_open")); 705 706 fp->f_data = vp; 707 fp->f_flag = flags & FMASK; 708 fp->f_ops = &vnops; 709 fp->f_type = (vp->v_type == VFIFO ? DTYPE_FIFO : DTYPE_VNODE); 710 FILEDESC_UNLOCK(fdp); 711 FILE_UNLOCK(fp); 712 VOP_UNLOCK(vp, 0, td); 713 if (flags & (O_EXLOCK | O_SHLOCK)) { 714 lf.l_whence = SEEK_SET; 715 lf.l_start = 0; 716 lf.l_len = 0; 717 if (flags & O_EXLOCK) 718 lf.l_type = F_WRLCK; 719 else 720 lf.l_type = F_RDLCK; 721 type = F_FLOCK; 722 if ((flags & FNONBLOCK) == 0) 723 type |= F_WAIT; 724 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 725 type)) != 0) 726 goto bad; 727 fp->f_flag |= FHASLOCK; 728 } 729 if (flags & O_TRUNC) { 730 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 731 goto bad; 732 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 733 VATTR_NULL(&vat); 734 vat.va_size = 0; 735 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 736 #ifdef MAC 737 error = mac_check_vnode_write(td->td_ucred, fp->f_cred, vp); 738 if (error == 0) 739 #endif 740 error = VOP_SETATTR(vp, &vat, td->td_ucred, td); 741 VOP_UNLOCK(vp, 0, td); 742 vn_finished_write(mp); 743 if (error) 744 goto bad; 745 } 746 /* 747 * Release our private reference, leaving the one associated with 748 * the descriptor table intact. 749 */ 750 fdrop(fp, td); 751 td->td_retval[0] = indx; 752 return (0); 753 bad: 754 FILEDESC_LOCK(fdp); 755 if (fdp->fd_ofiles[indx] == fp) { 756 fdp->fd_ofiles[indx] = NULL; 757 FILEDESC_UNLOCK(fdp); 758 fdrop(fp, td); 759 } else 760 FILEDESC_UNLOCK(fdp); 761 return (error); 762 } 763 764 #ifdef COMPAT_43 765 /* 766 * Create a file. 767 */ 768 #ifndef _SYS_SYSPROTO_H_ 769 struct ocreat_args { 770 char *path; 771 int mode; 772 }; 773 #endif 774 int 775 ocreat(td, uap) 776 struct thread *td; 777 register struct ocreat_args /* { 778 syscallarg(char *) path; 779 syscallarg(int) mode; 780 } */ *uap; 781 { 782 struct open_args /* { 783 syscallarg(char *) path; 784 syscallarg(int) flags; 785 syscallarg(int) mode; 786 } */ nuap; 787 788 SCARG(&nuap, path) = SCARG(uap, path); 789 SCARG(&nuap, mode) = SCARG(uap, mode); 790 SCARG(&nuap, flags) = O_WRONLY | O_CREAT | O_TRUNC; 791 return (open(td, &nuap)); 792 } 793 #endif /* COMPAT_43 */ 794 795 /* 796 * Create a special file. 797 */ 798 #ifndef _SYS_SYSPROTO_H_ 799 struct mknod_args { 800 char *path; 801 int mode; 802 int dev; 803 }; 804 #endif 805 /* ARGSUSED */ 806 int 807 mknod(td, uap) 808 struct thread *td; 809 register struct mknod_args /* { 810 syscallarg(char *) path; 811 syscallarg(int) mode; 812 syscallarg(int) dev; 813 } */ *uap; 814 { 815 struct vnode *vp; 816 struct mount *mp; 817 struct vattr vattr; 818 int error; 819 int whiteout = 0; 820 struct nameidata nd; 821 822 switch (SCARG(uap, mode) & S_IFMT) { 823 case S_IFCHR: 824 case S_IFBLK: 825 error = suser(td); 826 break; 827 default: 828 error = suser_cred(td->td_ucred, PRISON_ROOT); 829 break; 830 } 831 if (error) 832 return (error); 833 restart: 834 bwillwrite(); 835 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, UIO_USERSPACE, 836 SCARG(uap, path), td); 837 if ((error = namei(&nd)) != 0) 838 return (error); 839 vp = nd.ni_vp; 840 if (vp != NULL) { 841 vrele(vp); 842 error = EEXIST; 843 } else { 844 VATTR_NULL(&vattr); 845 FILEDESC_LOCK(td->td_proc->p_fd); 846 vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask; 847 FILEDESC_UNLOCK(td->td_proc->p_fd); 848 vattr.va_rdev = SCARG(uap, dev); 849 whiteout = 0; 850 851 switch (SCARG(uap, mode) & S_IFMT) { 852 case S_IFMT: /* used by badsect to flag bad sectors */ 853 vattr.va_type = VBAD; 854 break; 855 case S_IFCHR: 856 vattr.va_type = VCHR; 857 break; 858 case S_IFBLK: 859 vattr.va_type = VBLK; 860 break; 861 case S_IFWHT: 862 whiteout = 1; 863 break; 864 default: 865 error = EINVAL; 866 break; 867 } 868 } 869 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 870 NDFREE(&nd, NDF_ONLY_PNBUF); 871 vput(nd.ni_dvp); 872 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 873 return (error); 874 goto restart; 875 } 876 if (!error) { 877 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 878 if (whiteout) 879 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, CREATE); 880 else { 881 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, 882 &nd.ni_cnd, &vattr); 883 if (error == 0) 884 vput(nd.ni_vp); 885 } 886 } 887 NDFREE(&nd, NDF_ONLY_PNBUF); 888 vput(nd.ni_dvp); 889 vn_finished_write(mp); 890 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mknod"); 891 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mknod"); 892 return (error); 893 } 894 895 /* 896 * Create a named pipe. 897 */ 898 #ifndef _SYS_SYSPROTO_H_ 899 struct mkfifo_args { 900 char *path; 901 int mode; 902 }; 903 #endif 904 /* ARGSUSED */ 905 int 906 mkfifo(td, uap) 907 struct thread *td; 908 register struct mkfifo_args /* { 909 syscallarg(char *) path; 910 syscallarg(int) mode; 911 } */ *uap; 912 { 913 struct mount *mp; 914 struct vattr vattr; 915 int error; 916 struct nameidata nd; 917 918 restart: 919 bwillwrite(); 920 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, UIO_USERSPACE, 921 SCARG(uap, path), td); 922 if ((error = namei(&nd)) != 0) 923 return (error); 924 if (nd.ni_vp != NULL) { 925 NDFREE(&nd, NDF_ONLY_PNBUF); 926 vrele(nd.ni_vp); 927 vput(nd.ni_dvp); 928 return (EEXIST); 929 } 930 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 931 NDFREE(&nd, NDF_ONLY_PNBUF); 932 vput(nd.ni_dvp); 933 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 934 return (error); 935 goto restart; 936 } 937 VATTR_NULL(&vattr); 938 vattr.va_type = VFIFO; 939 FILEDESC_LOCK(td->td_proc->p_fd); 940 vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask; 941 FILEDESC_UNLOCK(td->td_proc->p_fd); 942 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 943 error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 944 if (error == 0) 945 vput(nd.ni_vp); 946 NDFREE(&nd, NDF_ONLY_PNBUF); 947 vput(nd.ni_dvp); 948 vn_finished_write(mp); 949 return (error); 950 } 951 952 /* 953 * Make a hard file link. 954 */ 955 #ifndef _SYS_SYSPROTO_H_ 956 struct link_args { 957 char *path; 958 char *link; 959 }; 960 #endif 961 /* ARGSUSED */ 962 int 963 link(td, uap) 964 struct thread *td; 965 register struct link_args /* { 966 syscallarg(char *) path; 967 syscallarg(char *) link; 968 } */ *uap; 969 { 970 struct vnode *vp; 971 struct mount *mp; 972 struct nameidata nd; 973 int error; 974 975 bwillwrite(); 976 NDINIT(&nd, LOOKUP, FOLLOW|NOOBJ, UIO_USERSPACE, SCARG(uap, path), td); 977 if ((error = namei(&nd)) != 0) 978 return (error); 979 NDFREE(&nd, NDF_ONLY_PNBUF); 980 vp = nd.ni_vp; 981 if (vp->v_type == VDIR) { 982 vrele(vp); 983 return (EPERM); /* POSIX */ 984 } 985 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 986 vrele(vp); 987 return (error); 988 } 989 NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, UIO_USERSPACE, 990 SCARG(uap, link), td); 991 if ((error = namei(&nd)) == 0) { 992 if (nd.ni_vp != NULL) { 993 vrele(nd.ni_vp); 994 error = EEXIST; 995 } else { 996 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 997 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 998 error = VOP_LINK(nd.ni_dvp, vp, &nd.ni_cnd); 999 } 1000 NDFREE(&nd, NDF_ONLY_PNBUF); 1001 vput(nd.ni_dvp); 1002 } 1003 vrele(vp); 1004 vn_finished_write(mp); 1005 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "link"); 1006 ASSERT_VOP_UNLOCKED(nd.ni_vp, "link"); 1007 return (error); 1008 } 1009 1010 /* 1011 * Make a symbolic link. 1012 */ 1013 #ifndef _SYS_SYSPROTO_H_ 1014 struct symlink_args { 1015 char *path; 1016 char *link; 1017 }; 1018 #endif 1019 /* ARGSUSED */ 1020 int 1021 symlink(td, uap) 1022 struct thread *td; 1023 register struct symlink_args /* { 1024 syscallarg(char *) path; 1025 syscallarg(char *) link; 1026 } */ *uap; 1027 { 1028 struct mount *mp; 1029 struct vattr vattr; 1030 char *path; 1031 int error; 1032 struct nameidata nd; 1033 1034 path = uma_zalloc(namei_zone, M_WAITOK); 1035 if ((error = copyinstr(SCARG(uap, path), path, MAXPATHLEN, NULL)) != 0) 1036 goto out; 1037 restart: 1038 bwillwrite(); 1039 NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, UIO_USERSPACE, 1040 SCARG(uap, link), td); 1041 if ((error = namei(&nd)) != 0) 1042 goto out; 1043 if (nd.ni_vp) { 1044 NDFREE(&nd, NDF_ONLY_PNBUF); 1045 vrele(nd.ni_vp); 1046 vput(nd.ni_dvp); 1047 error = EEXIST; 1048 goto out; 1049 } 1050 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1051 NDFREE(&nd, NDF_ONLY_PNBUF); 1052 vput(nd.ni_dvp); 1053 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1054 return (error); 1055 goto restart; 1056 } 1057 VATTR_NULL(&vattr); 1058 FILEDESC_LOCK(td->td_proc->p_fd); 1059 vattr.va_mode = ACCESSPERMS &~ td->td_proc->p_fd->fd_cmask; 1060 FILEDESC_UNLOCK(td->td_proc->p_fd); 1061 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1062 error = VOP_SYMLINK(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr, path); 1063 NDFREE(&nd, NDF_ONLY_PNBUF); 1064 if (error == 0) 1065 vput(nd.ni_vp); 1066 vput(nd.ni_dvp); 1067 vn_finished_write(mp); 1068 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "symlink"); 1069 ASSERT_VOP_UNLOCKED(nd.ni_vp, "symlink"); 1070 out: 1071 uma_zfree(namei_zone, path); 1072 return (error); 1073 } 1074 1075 /* 1076 * Delete a whiteout from the filesystem. 1077 */ 1078 /* ARGSUSED */ 1079 int 1080 undelete(td, uap) 1081 struct thread *td; 1082 register struct undelete_args /* { 1083 syscallarg(char *) path; 1084 } */ *uap; 1085 { 1086 int error; 1087 struct mount *mp; 1088 struct nameidata nd; 1089 1090 restart: 1091 bwillwrite(); 1092 NDINIT(&nd, DELETE, LOCKPARENT|DOWHITEOUT, UIO_USERSPACE, 1093 SCARG(uap, path), td); 1094 error = namei(&nd); 1095 if (error) 1096 return (error); 1097 1098 if (nd.ni_vp != NULLVP || !(nd.ni_cnd.cn_flags & ISWHITEOUT)) { 1099 NDFREE(&nd, NDF_ONLY_PNBUF); 1100 if (nd.ni_vp) 1101 vrele(nd.ni_vp); 1102 vput(nd.ni_dvp); 1103 return (EEXIST); 1104 } 1105 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1106 NDFREE(&nd, NDF_ONLY_PNBUF); 1107 vput(nd.ni_dvp); 1108 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 1109 return (error); 1110 goto restart; 1111 } 1112 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1113 error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, DELETE); 1114 NDFREE(&nd, NDF_ONLY_PNBUF); 1115 vput(nd.ni_dvp); 1116 vn_finished_write(mp); 1117 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "undelete"); 1118 ASSERT_VOP_UNLOCKED(nd.ni_vp, "undelete"); 1119 return (error); 1120 } 1121 1122 /* 1123 * Delete a name from the filesystem. 1124 */ 1125 #ifndef _SYS_SYSPROTO_H_ 1126 struct unlink_args { 1127 char *path; 1128 }; 1129 #endif 1130 /* ARGSUSED */ 1131 int 1132 unlink(td, uap) 1133 struct thread *td; 1134 struct unlink_args /* { 1135 syscallarg(char *) path; 1136 } */ *uap; 1137 { 1138 struct mount *mp; 1139 struct vnode *vp; 1140 int error; 1141 struct nameidata nd; 1142 1143 restart: 1144 bwillwrite(); 1145 NDINIT(&nd, DELETE, LOCKPARENT|LOCKLEAF, UIO_USERSPACE, 1146 SCARG(uap, path), td); 1147 if ((error = namei(&nd)) != 0) 1148 return (error); 1149 vp = nd.ni_vp; 1150 if (vp->v_type == VDIR) 1151 error = EPERM; /* POSIX */ 1152 else { 1153 /* 1154 * The root of a mounted filesystem cannot be deleted. 1155 * 1156 * XXX: can this only be a VDIR case? 1157 */ 1158 if (vp->v_vflag & VV_ROOT) 1159 error = EBUSY; 1160 } 1161 if (error == 0) { 1162 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 1163 NDFREE(&nd, NDF_ONLY_PNBUF); 1164 if (vp == nd.ni_dvp) 1165 vrele(vp); 1166 else 1167 vput(vp); 1168 vput(nd.ni_dvp); 1169 if ((error = vn_start_write(NULL, &mp, 1170 V_XSLEEP | PCATCH)) != 0) 1171 return (error); 1172 goto restart; 1173 } 1174 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 1175 error = VOP_REMOVE(nd.ni_dvp, vp, &nd.ni_cnd); 1176 vn_finished_write(mp); 1177 } 1178 NDFREE(&nd, NDF_ONLY_PNBUF); 1179 if (vp == nd.ni_dvp) 1180 vrele(vp); 1181 else 1182 vput(vp); 1183 vput(nd.ni_dvp); 1184 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "unlink"); 1185 ASSERT_VOP_UNLOCKED(nd.ni_vp, "unlink"); 1186 return (error); 1187 } 1188 1189 /* 1190 * Reposition read/write file offset. 1191 */ 1192 #ifndef _SYS_SYSPROTO_H_ 1193 struct lseek_args { 1194 int fd; 1195 int pad; 1196 off_t offset; 1197 int whence; 1198 }; 1199 #endif 1200 int 1201 lseek(td, uap) 1202 struct thread *td; 1203 register struct lseek_args /* { 1204 syscallarg(int) fd; 1205 syscallarg(int) pad; 1206 syscallarg(off_t) offset; 1207 syscallarg(int) whence; 1208 } */ *uap; 1209 { 1210 struct ucred *cred = td->td_ucred; 1211 struct file *fp; 1212 struct vnode *vp; 1213 struct vattr vattr; 1214 off_t offset; 1215 int error, noneg; 1216 1217 if ((error = fget(td, uap->fd, &fp)) != 0) 1218 return (error); 1219 if (fp->f_type != DTYPE_VNODE) { 1220 fdrop(fp, td); 1221 return (ESPIPE); 1222 } 1223 vp = (struct vnode *)fp->f_data; 1224 noneg = (vp->v_type != VCHR); 1225 offset = SCARG(uap, offset); 1226 switch (SCARG(uap, whence)) { 1227 case L_INCR: 1228 if (noneg && 1229 (fp->f_offset < 0 || 1230 (offset > 0 && fp->f_offset > OFF_MAX - offset))) 1231 return (EOVERFLOW); 1232 offset += fp->f_offset; 1233 break; 1234 case L_XTND: 1235 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1236 error = VOP_GETATTR(vp, &vattr, cred, td); 1237 VOP_UNLOCK(vp, 0, td); 1238 if (error) 1239 return (error); 1240 if (noneg && 1241 (vattr.va_size > OFF_MAX || 1242 (offset > 0 && vattr.va_size > OFF_MAX - offset))) 1243 return (EOVERFLOW); 1244 offset += vattr.va_size; 1245 break; 1246 case L_SET: 1247 break; 1248 default: 1249 fdrop(fp, td); 1250 return (EINVAL); 1251 } 1252 if (noneg && offset < 0) 1253 return (EINVAL); 1254 fp->f_offset = offset; 1255 *(off_t *)(td->td_retval) = fp->f_offset; 1256 fdrop(fp, td); 1257 return (0); 1258 } 1259 1260 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1261 /* 1262 * Reposition read/write file offset. 1263 */ 1264 #ifndef _SYS_SYSPROTO_H_ 1265 struct olseek_args { 1266 int fd; 1267 long offset; 1268 int whence; 1269 }; 1270 #endif 1271 int 1272 olseek(td, uap) 1273 struct thread *td; 1274 register struct olseek_args /* { 1275 syscallarg(int) fd; 1276 syscallarg(long) offset; 1277 syscallarg(int) whence; 1278 } */ *uap; 1279 { 1280 struct lseek_args /* { 1281 syscallarg(int) fd; 1282 syscallarg(int) pad; 1283 syscallarg(off_t) offset; 1284 syscallarg(int) whence; 1285 } */ nuap; 1286 int error; 1287 1288 SCARG(&nuap, fd) = SCARG(uap, fd); 1289 SCARG(&nuap, offset) = SCARG(uap, offset); 1290 SCARG(&nuap, whence) = SCARG(uap, whence); 1291 error = lseek(td, &nuap); 1292 return (error); 1293 } 1294 #endif /* COMPAT_43 */ 1295 1296 /* 1297 * Check access permissions using passed credentials. 1298 */ 1299 static int 1300 vn_access(vp, user_flags, cred, td) 1301 struct vnode *vp; 1302 int user_flags; 1303 struct ucred *cred; 1304 struct thread *td; 1305 { 1306 int error, flags; 1307 1308 /* Flags == 0 means only check for existence. */ 1309 error = 0; 1310 if (user_flags) { 1311 flags = 0; 1312 if (user_flags & R_OK) 1313 flags |= VREAD; 1314 if (user_flags & W_OK) 1315 flags |= VWRITE; 1316 if (user_flags & X_OK) 1317 flags |= VEXEC; 1318 #ifdef MAC 1319 error = mac_check_vnode_access(cred, vp, flags); 1320 if (error) 1321 return (error); 1322 #endif 1323 if ((flags & VWRITE) == 0 || (error = vn_writechk(vp)) == 0) 1324 error = VOP_ACCESS(vp, flags, cred, td); 1325 } 1326 return (error); 1327 } 1328 1329 /* 1330 * Check access permissions using "real" credentials. 1331 */ 1332 #ifndef _SYS_SYSPROTO_H_ 1333 struct access_args { 1334 char *path; 1335 int flags; 1336 }; 1337 #endif 1338 int 1339 access(td, uap) 1340 struct thread *td; 1341 register struct access_args /* { 1342 syscallarg(char *) path; 1343 syscallarg(int) flags; 1344 } */ *uap; 1345 { 1346 struct ucred *cred, *tmpcred; 1347 register struct vnode *vp; 1348 int error; 1349 struct nameidata nd; 1350 1351 /* 1352 * Create and modify a temporary credential instead of one that 1353 * is potentially shared. This could also mess up socket 1354 * buffer accounting which can run in an interrupt context. 1355 * 1356 * XXX - Depending on how "threads" are finally implemented, it 1357 * may be better to explicitly pass the credential to namei() 1358 * rather than to modify the potentially shared process structure. 1359 */ 1360 cred = td->td_ucred; 1361 tmpcred = crdup(cred); 1362 tmpcred->cr_uid = cred->cr_ruid; 1363 tmpcred->cr_groups[0] = cred->cr_rgid; 1364 td->td_ucred = tmpcred; 1365 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1366 SCARG(uap, path), td); 1367 if ((error = namei(&nd)) != 0) 1368 goto out1; 1369 vp = nd.ni_vp; 1370 1371 error = vn_access(vp, SCARG(uap, flags), tmpcred, td); 1372 NDFREE(&nd, NDF_ONLY_PNBUF); 1373 vput(vp); 1374 out1: 1375 td->td_ucred = cred; 1376 crfree(tmpcred); 1377 return (error); 1378 } 1379 1380 /* 1381 * Check access permissions using "effective" credentials. 1382 */ 1383 #ifndef _SYS_SYSPROTO_H_ 1384 struct eaccess_args { 1385 char *path; 1386 int flags; 1387 }; 1388 #endif 1389 int 1390 eaccess(td, uap) 1391 struct thread *td; 1392 register struct eaccess_args /* { 1393 syscallarg(char *) path; 1394 syscallarg(int) flags; 1395 } */ *uap; 1396 { 1397 struct nameidata nd; 1398 struct vnode *vp; 1399 int error; 1400 1401 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1402 SCARG(uap, path), td); 1403 if ((error = namei(&nd)) != 0) 1404 return (error); 1405 vp = nd.ni_vp; 1406 1407 error = vn_access(vp, SCARG(uap, flags), td->td_ucred, td); 1408 NDFREE(&nd, NDF_ONLY_PNBUF); 1409 vput(vp); 1410 return (error); 1411 } 1412 1413 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 1414 /* 1415 * Get file status; this version follows links. 1416 */ 1417 #ifndef _SYS_SYSPROTO_H_ 1418 struct ostat_args { 1419 char *path; 1420 struct ostat *ub; 1421 }; 1422 #endif 1423 /* ARGSUSED */ 1424 int 1425 ostat(td, uap) 1426 struct thread *td; 1427 register struct ostat_args /* { 1428 syscallarg(char *) path; 1429 syscallarg(struct ostat *) ub; 1430 } */ *uap; 1431 { 1432 struct stat sb; 1433 struct ostat osb; 1434 int error; 1435 struct nameidata nd; 1436 1437 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1438 SCARG(uap, path), td); 1439 if ((error = namei(&nd)) != 0) 1440 return (error); 1441 NDFREE(&nd, NDF_ONLY_PNBUF); 1442 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1443 vput(nd.ni_vp); 1444 if (error) 1445 return (error); 1446 cvtstat(&sb, &osb); 1447 error = copyout(&osb, SCARG(uap, ub), sizeof (osb)); 1448 return (error); 1449 } 1450 1451 /* 1452 * Get file status; this version does not follow links. 1453 */ 1454 #ifndef _SYS_SYSPROTO_H_ 1455 struct olstat_args { 1456 char *path; 1457 struct ostat *ub; 1458 }; 1459 #endif 1460 /* ARGSUSED */ 1461 int 1462 olstat(td, uap) 1463 struct thread *td; 1464 register struct olstat_args /* { 1465 syscallarg(char *) path; 1466 syscallarg(struct ostat *) ub; 1467 } */ *uap; 1468 { 1469 struct vnode *vp; 1470 struct stat sb; 1471 struct ostat osb; 1472 int error; 1473 struct nameidata nd; 1474 1475 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1476 SCARG(uap, path), td); 1477 if ((error = namei(&nd)) != 0) 1478 return (error); 1479 vp = nd.ni_vp; 1480 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1481 NDFREE(&nd, NDF_ONLY_PNBUF); 1482 vput(vp); 1483 if (error) 1484 return (error); 1485 cvtstat(&sb, &osb); 1486 error = copyout(&osb, SCARG(uap, ub), sizeof (osb)); 1487 return (error); 1488 } 1489 1490 /* 1491 * Convert from an old to a new stat structure. 1492 */ 1493 void 1494 cvtstat(st, ost) 1495 struct stat *st; 1496 struct ostat *ost; 1497 { 1498 1499 ost->st_dev = st->st_dev; 1500 ost->st_ino = st->st_ino; 1501 ost->st_mode = st->st_mode; 1502 ost->st_nlink = st->st_nlink; 1503 ost->st_uid = st->st_uid; 1504 ost->st_gid = st->st_gid; 1505 ost->st_rdev = st->st_rdev; 1506 if (st->st_size < (quad_t)1 << 32) 1507 ost->st_size = st->st_size; 1508 else 1509 ost->st_size = -2; 1510 ost->st_atime = st->st_atime; 1511 ost->st_mtime = st->st_mtime; 1512 ost->st_ctime = st->st_ctime; 1513 ost->st_blksize = st->st_blksize; 1514 ost->st_blocks = st->st_blocks; 1515 ost->st_flags = st->st_flags; 1516 ost->st_gen = st->st_gen; 1517 } 1518 #endif /* COMPAT_43 || COMPAT_SUNOS */ 1519 1520 /* 1521 * Get file status; this version follows links. 1522 */ 1523 #ifndef _SYS_SYSPROTO_H_ 1524 struct stat_args { 1525 char *path; 1526 struct stat *ub; 1527 }; 1528 #endif 1529 /* ARGSUSED */ 1530 int 1531 stat(td, uap) 1532 struct thread *td; 1533 register struct stat_args /* { 1534 syscallarg(char *) path; 1535 syscallarg(struct stat *) ub; 1536 } */ *uap; 1537 { 1538 struct stat sb; 1539 int error; 1540 struct nameidata nd; 1541 1542 #ifdef LOOKUP_SHARED 1543 NDINIT(&nd, LOOKUP, FOLLOW | LOCKSHARED | LOCKLEAF | NOOBJ, 1544 UIO_USERSPACE, SCARG(uap, path), td); 1545 #else 1546 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1547 SCARG(uap, path), td); 1548 #endif 1549 if ((error = namei(&nd)) != 0) 1550 return (error); 1551 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1552 NDFREE(&nd, NDF_ONLY_PNBUF); 1553 vput(nd.ni_vp); 1554 if (error) 1555 return (error); 1556 error = copyout(&sb, SCARG(uap, ub), sizeof (sb)); 1557 return (error); 1558 } 1559 1560 /* 1561 * Get file status; this version does not follow links. 1562 */ 1563 #ifndef _SYS_SYSPROTO_H_ 1564 struct lstat_args { 1565 char *path; 1566 struct stat *ub; 1567 }; 1568 #endif 1569 /* ARGSUSED */ 1570 int 1571 lstat(td, uap) 1572 struct thread *td; 1573 register struct lstat_args /* { 1574 syscallarg(char *) path; 1575 syscallarg(struct stat *) ub; 1576 } */ *uap; 1577 { 1578 int error; 1579 struct vnode *vp; 1580 struct stat sb; 1581 struct nameidata nd; 1582 1583 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1584 SCARG(uap, path), td); 1585 if ((error = namei(&nd)) != 0) 1586 return (error); 1587 vp = nd.ni_vp; 1588 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1589 NDFREE(&nd, NDF_ONLY_PNBUF); 1590 vput(vp); 1591 if (error) 1592 return (error); 1593 error = copyout(&sb, SCARG(uap, ub), sizeof (sb)); 1594 return (error); 1595 } 1596 1597 /* 1598 * Implementation of the NetBSD stat() function. 1599 * XXX This should probably be collapsed with the FreeBSD version, 1600 * as the differences are only due to vn_stat() clearing spares at 1601 * the end of the structures. vn_stat could be split to avoid this, 1602 * and thus collapse the following to close to zero code. 1603 */ 1604 void 1605 cvtnstat(sb, nsb) 1606 struct stat *sb; 1607 struct nstat *nsb; 1608 { 1609 bzero(nsb, sizeof *nsb); 1610 nsb->st_dev = sb->st_dev; 1611 nsb->st_ino = sb->st_ino; 1612 nsb->st_mode = sb->st_mode; 1613 nsb->st_nlink = sb->st_nlink; 1614 nsb->st_uid = sb->st_uid; 1615 nsb->st_gid = sb->st_gid; 1616 nsb->st_rdev = sb->st_rdev; 1617 nsb->st_atimespec = sb->st_atimespec; 1618 nsb->st_mtimespec = sb->st_mtimespec; 1619 nsb->st_ctimespec = sb->st_ctimespec; 1620 nsb->st_size = sb->st_size; 1621 nsb->st_blocks = sb->st_blocks; 1622 nsb->st_blksize = sb->st_blksize; 1623 nsb->st_flags = sb->st_flags; 1624 nsb->st_gen = sb->st_gen; 1625 nsb->st_birthtimespec = sb->st_birthtimespec; 1626 } 1627 1628 #ifndef _SYS_SYSPROTO_H_ 1629 struct nstat_args { 1630 char *path; 1631 struct nstat *ub; 1632 }; 1633 #endif 1634 /* ARGSUSED */ 1635 int 1636 nstat(td, uap) 1637 struct thread *td; 1638 register struct nstat_args /* { 1639 syscallarg(char *) path; 1640 syscallarg(struct nstat *) ub; 1641 } */ *uap; 1642 { 1643 struct stat sb; 1644 struct nstat nsb; 1645 int error; 1646 struct nameidata nd; 1647 1648 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1649 SCARG(uap, path), td); 1650 if ((error = namei(&nd)) != 0) 1651 return (error); 1652 NDFREE(&nd, NDF_ONLY_PNBUF); 1653 error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td); 1654 vput(nd.ni_vp); 1655 if (error) 1656 return (error); 1657 cvtnstat(&sb, &nsb); 1658 error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb)); 1659 return (error); 1660 } 1661 1662 /* 1663 * NetBSD lstat. Get file status; this version does not follow links. 1664 */ 1665 #ifndef _SYS_SYSPROTO_H_ 1666 struct lstat_args { 1667 char *path; 1668 struct stat *ub; 1669 }; 1670 #endif 1671 /* ARGSUSED */ 1672 int 1673 nlstat(td, uap) 1674 struct thread *td; 1675 register struct nlstat_args /* { 1676 syscallarg(char *) path; 1677 syscallarg(struct nstat *) ub; 1678 } */ *uap; 1679 { 1680 int error; 1681 struct vnode *vp; 1682 struct stat sb; 1683 struct nstat nsb; 1684 struct nameidata nd; 1685 1686 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1687 SCARG(uap, path), td); 1688 if ((error = namei(&nd)) != 0) 1689 return (error); 1690 vp = nd.ni_vp; 1691 NDFREE(&nd, NDF_ONLY_PNBUF); 1692 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 1693 vput(vp); 1694 if (error) 1695 return (error); 1696 cvtnstat(&sb, &nsb); 1697 error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb)); 1698 return (error); 1699 } 1700 1701 /* 1702 * Get configurable pathname variables. 1703 */ 1704 #ifndef _SYS_SYSPROTO_H_ 1705 struct pathconf_args { 1706 char *path; 1707 int name; 1708 }; 1709 #endif 1710 /* ARGSUSED */ 1711 int 1712 pathconf(td, uap) 1713 struct thread *td; 1714 register struct pathconf_args /* { 1715 syscallarg(char *) path; 1716 syscallarg(int) name; 1717 } */ *uap; 1718 { 1719 int error; 1720 struct nameidata nd; 1721 1722 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1723 SCARG(uap, path), td); 1724 if ((error = namei(&nd)) != 0) 1725 return (error); 1726 NDFREE(&nd, NDF_ONLY_PNBUF); 1727 error = VOP_PATHCONF(nd.ni_vp, SCARG(uap, name), td->td_retval); 1728 vput(nd.ni_vp); 1729 return (error); 1730 } 1731 1732 /* 1733 * Return target name of a symbolic link. 1734 */ 1735 #ifndef _SYS_SYSPROTO_H_ 1736 struct readlink_args { 1737 char *path; 1738 char *buf; 1739 int count; 1740 }; 1741 #endif 1742 /* ARGSUSED */ 1743 int 1744 readlink(td, uap) 1745 struct thread *td; 1746 register struct readlink_args /* { 1747 syscallarg(char *) path; 1748 syscallarg(char *) buf; 1749 syscallarg(int) count; 1750 } */ *uap; 1751 { 1752 register struct vnode *vp; 1753 struct iovec aiov; 1754 struct uio auio; 1755 int error; 1756 struct nameidata nd; 1757 1758 NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE, 1759 SCARG(uap, path), td); 1760 if ((error = namei(&nd)) != 0) 1761 return (error); 1762 NDFREE(&nd, NDF_ONLY_PNBUF); 1763 vp = nd.ni_vp; 1764 #ifdef MAC 1765 error = mac_check_vnode_readlink(td->td_ucred, vp); 1766 if (error) { 1767 vput(vp); 1768 return (error); 1769 } 1770 #endif 1771 if (vp->v_type != VLNK) 1772 error = EINVAL; 1773 else { 1774 aiov.iov_base = SCARG(uap, buf); 1775 aiov.iov_len = SCARG(uap, count); 1776 auio.uio_iov = &aiov; 1777 auio.uio_iovcnt = 1; 1778 auio.uio_offset = 0; 1779 auio.uio_rw = UIO_READ; 1780 auio.uio_segflg = UIO_USERSPACE; 1781 auio.uio_td = td; 1782 auio.uio_resid = SCARG(uap, count); 1783 error = VOP_READLINK(vp, &auio, td->td_ucred); 1784 } 1785 vput(vp); 1786 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 1787 return (error); 1788 } 1789 1790 /* 1791 * Common implementation code for chflags() and fchflags(). 1792 */ 1793 static int 1794 setfflags(td, vp, flags) 1795 struct thread *td; 1796 struct vnode *vp; 1797 int flags; 1798 { 1799 int error; 1800 struct mount *mp; 1801 struct vattr vattr; 1802 1803 /* 1804 * Prevent non-root users from setting flags on devices. When 1805 * a device is reused, users can retain ownership of the device 1806 * if they are allowed to set flags and programs assume that 1807 * chown can't fail when done as root. 1808 */ 1809 if (vp->v_type == VCHR || vp->v_type == VBLK) { 1810 error = suser_cred(td->td_ucred, PRISON_ROOT); 1811 if (error) 1812 return (error); 1813 } 1814 1815 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1816 return (error); 1817 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1818 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1819 #ifdef MAC 1820 error = mac_check_vnode_setflags(td->td_ucred, vp, vattr.va_flags); 1821 if (error == 0) { 1822 #endif 1823 VATTR_NULL(&vattr); 1824 vattr.va_flags = flags; 1825 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1826 #ifdef MAC 1827 } 1828 #endif 1829 VOP_UNLOCK(vp, 0, td); 1830 vn_finished_write(mp); 1831 return (error); 1832 } 1833 1834 /* 1835 * Change flags of a file given a path name. 1836 */ 1837 #ifndef _SYS_SYSPROTO_H_ 1838 struct chflags_args { 1839 char *path; 1840 int flags; 1841 }; 1842 #endif 1843 /* ARGSUSED */ 1844 int 1845 chflags(td, uap) 1846 struct thread *td; 1847 register struct chflags_args /* { 1848 syscallarg(char *) path; 1849 syscallarg(int) flags; 1850 } */ *uap; 1851 { 1852 int error; 1853 struct nameidata nd; 1854 1855 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1856 if ((error = namei(&nd)) != 0) 1857 return (error); 1858 NDFREE(&nd, NDF_ONLY_PNBUF); 1859 error = setfflags(td, nd.ni_vp, SCARG(uap, flags)); 1860 vrele(nd.ni_vp); 1861 return error; 1862 } 1863 1864 /* 1865 * Same as chflags() but doesn't follow symlinks. 1866 */ 1867 int 1868 lchflags(td, uap) 1869 struct thread *td; 1870 register struct lchflags_args /* { 1871 syscallarg(char *) path; 1872 syscallarg(int) flags; 1873 } */ *uap; 1874 { 1875 int error; 1876 struct nameidata nd; 1877 1878 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1879 if ((error = namei(&nd)) != 0) 1880 return (error); 1881 NDFREE(&nd, NDF_ONLY_PNBUF); 1882 error = setfflags(td, nd.ni_vp, SCARG(uap, flags)); 1883 vrele(nd.ni_vp); 1884 return error; 1885 } 1886 1887 /* 1888 * Change flags of a file given a file descriptor. 1889 */ 1890 #ifndef _SYS_SYSPROTO_H_ 1891 struct fchflags_args { 1892 int fd; 1893 int flags; 1894 }; 1895 #endif 1896 /* ARGSUSED */ 1897 int 1898 fchflags(td, uap) 1899 struct thread *td; 1900 register struct fchflags_args /* { 1901 syscallarg(int) fd; 1902 syscallarg(int) flags; 1903 } */ *uap; 1904 { 1905 struct file *fp; 1906 int error; 1907 1908 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 1909 return (error); 1910 error = setfflags(td, (struct vnode *) fp->f_data, SCARG(uap, flags)); 1911 fdrop(fp, td); 1912 return (error); 1913 } 1914 1915 /* 1916 * Common implementation code for chmod(), lchmod() and fchmod(). 1917 */ 1918 static int 1919 setfmode(td, vp, mode) 1920 struct thread *td; 1921 struct vnode *vp; 1922 int mode; 1923 { 1924 int error; 1925 struct mount *mp; 1926 struct vattr vattr; 1927 1928 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 1929 return (error); 1930 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 1931 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 1932 VATTR_NULL(&vattr); 1933 vattr.va_mode = mode & ALLPERMS; 1934 #ifdef MAC 1935 error = mac_check_vnode_setmode(td->td_ucred, vp, vattr.va_mode); 1936 if (error == 0) 1937 #endif 1938 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 1939 VOP_UNLOCK(vp, 0, td); 1940 vn_finished_write(mp); 1941 return error; 1942 } 1943 1944 /* 1945 * Change mode of a file given path name. 1946 */ 1947 #ifndef _SYS_SYSPROTO_H_ 1948 struct chmod_args { 1949 char *path; 1950 int mode; 1951 }; 1952 #endif 1953 /* ARGSUSED */ 1954 int 1955 chmod(td, uap) 1956 struct thread *td; 1957 register struct chmod_args /* { 1958 syscallarg(char *) path; 1959 syscallarg(int) mode; 1960 } */ *uap; 1961 { 1962 int error; 1963 struct nameidata nd; 1964 1965 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1966 if ((error = namei(&nd)) != 0) 1967 return (error); 1968 NDFREE(&nd, NDF_ONLY_PNBUF); 1969 error = setfmode(td, nd.ni_vp, SCARG(uap, mode)); 1970 vrele(nd.ni_vp); 1971 return error; 1972 } 1973 1974 /* 1975 * Change mode of a file given path name (don't follow links.) 1976 */ 1977 #ifndef _SYS_SYSPROTO_H_ 1978 struct lchmod_args { 1979 char *path; 1980 int mode; 1981 }; 1982 #endif 1983 /* ARGSUSED */ 1984 int 1985 lchmod(td, uap) 1986 struct thread *td; 1987 register struct lchmod_args /* { 1988 syscallarg(char *) path; 1989 syscallarg(int) mode; 1990 } */ *uap; 1991 { 1992 int error; 1993 struct nameidata nd; 1994 1995 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 1996 if ((error = namei(&nd)) != 0) 1997 return (error); 1998 NDFREE(&nd, NDF_ONLY_PNBUF); 1999 error = setfmode(td, nd.ni_vp, SCARG(uap, mode)); 2000 vrele(nd.ni_vp); 2001 return error; 2002 } 2003 2004 /* 2005 * Change mode of a file given a file descriptor. 2006 */ 2007 #ifndef _SYS_SYSPROTO_H_ 2008 struct fchmod_args { 2009 int fd; 2010 int mode; 2011 }; 2012 #endif 2013 /* ARGSUSED */ 2014 int 2015 fchmod(td, uap) 2016 struct thread *td; 2017 register struct fchmod_args /* { 2018 syscallarg(int) fd; 2019 syscallarg(int) mode; 2020 } */ *uap; 2021 { 2022 struct file *fp; 2023 struct vnode *vp; 2024 int error; 2025 2026 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2027 return (error); 2028 vp = (struct vnode *)fp->f_data; 2029 error = setfmode(td, (struct vnode *)fp->f_data, SCARG(uap, mode)); 2030 fdrop(fp, td); 2031 return (error); 2032 } 2033 2034 /* 2035 * Common implementation for chown(), lchown(), and fchown() 2036 */ 2037 static int 2038 setfown(td, vp, uid, gid) 2039 struct thread *td; 2040 struct vnode *vp; 2041 uid_t uid; 2042 gid_t gid; 2043 { 2044 int error; 2045 struct mount *mp; 2046 struct vattr vattr; 2047 2048 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2049 return (error); 2050 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2051 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2052 VATTR_NULL(&vattr); 2053 vattr.va_uid = uid; 2054 vattr.va_gid = gid; 2055 #ifdef MAC 2056 error = mac_check_vnode_setowner(td->td_ucred, vp, vattr.va_uid, 2057 vattr.va_gid); 2058 if (error == 0) 2059 #endif 2060 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2061 VOP_UNLOCK(vp, 0, td); 2062 vn_finished_write(mp); 2063 return error; 2064 } 2065 2066 /* 2067 * Set ownership given a path name. 2068 */ 2069 #ifndef _SYS_SYSPROTO_H_ 2070 struct chown_args { 2071 char *path; 2072 int uid; 2073 int gid; 2074 }; 2075 #endif 2076 /* ARGSUSED */ 2077 int 2078 chown(td, uap) 2079 struct thread *td; 2080 register struct chown_args /* { 2081 syscallarg(char *) path; 2082 syscallarg(int) uid; 2083 syscallarg(int) gid; 2084 } */ *uap; 2085 { 2086 int error; 2087 struct nameidata nd; 2088 2089 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2090 if ((error = namei(&nd)) != 0) 2091 return (error); 2092 NDFREE(&nd, NDF_ONLY_PNBUF); 2093 error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid)); 2094 vrele(nd.ni_vp); 2095 return (error); 2096 } 2097 2098 /* 2099 * Set ownership given a path name, do not cross symlinks. 2100 */ 2101 #ifndef _SYS_SYSPROTO_H_ 2102 struct lchown_args { 2103 char *path; 2104 int uid; 2105 int gid; 2106 }; 2107 #endif 2108 /* ARGSUSED */ 2109 int 2110 lchown(td, uap) 2111 struct thread *td; 2112 register struct lchown_args /* { 2113 syscallarg(char *) path; 2114 syscallarg(int) uid; 2115 syscallarg(int) gid; 2116 } */ *uap; 2117 { 2118 int error; 2119 struct nameidata nd; 2120 2121 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2122 if ((error = namei(&nd)) != 0) 2123 return (error); 2124 NDFREE(&nd, NDF_ONLY_PNBUF); 2125 error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid)); 2126 vrele(nd.ni_vp); 2127 return (error); 2128 } 2129 2130 /* 2131 * Set ownership given a file descriptor. 2132 */ 2133 #ifndef _SYS_SYSPROTO_H_ 2134 struct fchown_args { 2135 int fd; 2136 int uid; 2137 int gid; 2138 }; 2139 #endif 2140 /* ARGSUSED */ 2141 int 2142 fchown(td, uap) 2143 struct thread *td; 2144 register struct fchown_args /* { 2145 syscallarg(int) fd; 2146 syscallarg(int) uid; 2147 syscallarg(int) gid; 2148 } */ *uap; 2149 { 2150 struct file *fp; 2151 struct vnode *vp; 2152 int error; 2153 2154 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2155 return (error); 2156 vp = (struct vnode *)fp->f_data; 2157 error = setfown(td, (struct vnode *)fp->f_data, 2158 SCARG(uap, uid), SCARG(uap, gid)); 2159 fdrop(fp, td); 2160 return (error); 2161 } 2162 2163 /* 2164 * Common implementation code for utimes(), lutimes(), and futimes(). 2165 */ 2166 static int 2167 getutimes(usrtvp, tsp) 2168 const struct timeval *usrtvp; 2169 struct timespec *tsp; 2170 { 2171 struct timeval tv[2]; 2172 int error; 2173 2174 if (usrtvp == NULL) { 2175 microtime(&tv[0]); 2176 TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]); 2177 tsp[1] = tsp[0]; 2178 } else { 2179 if ((error = copyin(usrtvp, tv, sizeof (tv))) != 0) 2180 return (error); 2181 TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]); 2182 TIMEVAL_TO_TIMESPEC(&tv[1], &tsp[1]); 2183 } 2184 return 0; 2185 } 2186 2187 /* 2188 * Common implementation code for utimes(), lutimes(), and futimes(). 2189 */ 2190 static int 2191 setutimes(td, vp, ts, numtimes, nullflag) 2192 struct thread *td; 2193 struct vnode *vp; 2194 const struct timespec *ts; 2195 int numtimes; 2196 int nullflag; 2197 { 2198 int error, setbirthtime; 2199 struct mount *mp; 2200 struct vattr vattr; 2201 2202 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 2203 return (error); 2204 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2205 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2206 setbirthtime = 0; 2207 if (numtimes < 3 && VOP_GETATTR(vp, &vattr, td->td_ucred, td) == 0 && 2208 timespeccmp(&ts[1], &vattr.va_birthtime, < )) 2209 setbirthtime = 1; 2210 VATTR_NULL(&vattr); 2211 vattr.va_atime = ts[0]; 2212 vattr.va_mtime = ts[1]; 2213 if (setbirthtime) 2214 vattr.va_birthtime = ts[1]; 2215 if (numtimes > 2) 2216 vattr.va_birthtime = ts[2]; 2217 if (nullflag) 2218 vattr.va_vaflags |= VA_UTIMES_NULL; 2219 #ifdef MAC 2220 error = mac_check_vnode_setutimes(td->td_ucred, vp, vattr.va_atime, 2221 vattr.va_mtime); 2222 if (error == 0) 2223 #endif 2224 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2225 VOP_UNLOCK(vp, 0, td); 2226 vn_finished_write(mp); 2227 return error; 2228 } 2229 2230 /* 2231 * Set the access and modification times of a file. 2232 */ 2233 #ifndef _SYS_SYSPROTO_H_ 2234 struct utimes_args { 2235 char *path; 2236 struct timeval *tptr; 2237 }; 2238 #endif 2239 /* ARGSUSED */ 2240 int 2241 utimes(td, uap) 2242 struct thread *td; 2243 register struct utimes_args /* { 2244 syscallarg(char *) path; 2245 syscallarg(struct timeval *) tptr; 2246 } */ *uap; 2247 { 2248 struct timespec ts[2]; 2249 struct timeval *usrtvp; 2250 int error; 2251 struct nameidata nd; 2252 2253 usrtvp = SCARG(uap, tptr); 2254 if ((error = getutimes(usrtvp, ts)) != 0) 2255 return (error); 2256 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2257 if ((error = namei(&nd)) != 0) 2258 return (error); 2259 NDFREE(&nd, NDF_ONLY_PNBUF); 2260 error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL); 2261 vrele(nd.ni_vp); 2262 return (error); 2263 } 2264 2265 /* 2266 * Set the access and modification times of a file. 2267 */ 2268 #ifndef _SYS_SYSPROTO_H_ 2269 struct lutimes_args { 2270 char *path; 2271 struct timeval *tptr; 2272 }; 2273 #endif 2274 /* ARGSUSED */ 2275 int 2276 lutimes(td, uap) 2277 struct thread *td; 2278 register struct lutimes_args /* { 2279 syscallarg(char *) path; 2280 syscallarg(struct timeval *) tptr; 2281 } */ *uap; 2282 { 2283 struct timespec ts[2]; 2284 struct timeval *usrtvp; 2285 int error; 2286 struct nameidata nd; 2287 2288 usrtvp = SCARG(uap, tptr); 2289 if ((error = getutimes(usrtvp, ts)) != 0) 2290 return (error); 2291 NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2292 if ((error = namei(&nd)) != 0) 2293 return (error); 2294 NDFREE(&nd, NDF_ONLY_PNBUF); 2295 error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL); 2296 vrele(nd.ni_vp); 2297 return (error); 2298 } 2299 2300 /* 2301 * Set the access and modification times of a file. 2302 */ 2303 #ifndef _SYS_SYSPROTO_H_ 2304 struct futimes_args { 2305 int fd; 2306 struct timeval *tptr; 2307 }; 2308 #endif 2309 /* ARGSUSED */ 2310 int 2311 futimes(td, uap) 2312 struct thread *td; 2313 register struct futimes_args /* { 2314 syscallarg(int ) fd; 2315 syscallarg(struct timeval *) tptr; 2316 } */ *uap; 2317 { 2318 struct timespec ts[2]; 2319 struct file *fp; 2320 struct timeval *usrtvp; 2321 int error; 2322 2323 usrtvp = SCARG(uap, tptr); 2324 if ((error = getutimes(usrtvp, ts)) != 0) 2325 return (error); 2326 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2327 return (error); 2328 error = setutimes(td, (struct vnode *)fp->f_data, ts, 2, usrtvp==NULL); 2329 fdrop(fp, td); 2330 return (error); 2331 } 2332 2333 /* 2334 * Truncate a file given its path name. 2335 */ 2336 #ifndef _SYS_SYSPROTO_H_ 2337 struct truncate_args { 2338 char *path; 2339 int pad; 2340 off_t length; 2341 }; 2342 #endif 2343 /* ARGSUSED */ 2344 int 2345 truncate(td, uap) 2346 struct thread *td; 2347 register struct truncate_args /* { 2348 syscallarg(char *) path; 2349 syscallarg(int) pad; 2350 syscallarg(off_t) length; 2351 } */ *uap; 2352 { 2353 struct mount *mp; 2354 struct vnode *vp; 2355 struct vattr vattr; 2356 int error; 2357 struct nameidata nd; 2358 2359 if (uap->length < 0) 2360 return(EINVAL); 2361 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td); 2362 if ((error = namei(&nd)) != 0) 2363 return (error); 2364 vp = nd.ni_vp; 2365 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2366 vrele(vp); 2367 return (error); 2368 } 2369 NDFREE(&nd, NDF_ONLY_PNBUF); 2370 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2371 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2372 if (vp->v_type == VDIR) 2373 error = EISDIR; 2374 #ifdef MAC 2375 else if ((error = mac_check_vnode_write(td->td_ucred, NOCRED, vp))) { 2376 } 2377 #endif 2378 else if ((error = vn_writechk(vp)) == 0 && 2379 (error = VOP_ACCESS(vp, VWRITE, td->td_ucred, td)) == 0) { 2380 VATTR_NULL(&vattr); 2381 vattr.va_size = SCARG(uap, length); 2382 error = VOP_SETATTR(vp, &vattr, td->td_ucred, td); 2383 } 2384 vput(vp); 2385 vn_finished_write(mp); 2386 return (error); 2387 } 2388 2389 /* 2390 * Truncate a file given a file descriptor. 2391 */ 2392 #ifndef _SYS_SYSPROTO_H_ 2393 struct ftruncate_args { 2394 int fd; 2395 int pad; 2396 off_t length; 2397 }; 2398 #endif 2399 /* ARGSUSED */ 2400 int 2401 ftruncate(td, uap) 2402 struct thread *td; 2403 register struct ftruncate_args /* { 2404 syscallarg(int) fd; 2405 syscallarg(int) pad; 2406 syscallarg(off_t) length; 2407 } */ *uap; 2408 { 2409 struct mount *mp; 2410 struct vattr vattr; 2411 struct vnode *vp; 2412 struct file *fp; 2413 int error; 2414 2415 if (uap->length < 0) 2416 return(EINVAL); 2417 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2418 return (error); 2419 if ((fp->f_flag & FWRITE) == 0) { 2420 fdrop(fp, td); 2421 return (EINVAL); 2422 } 2423 vp = (struct vnode *)fp->f_data; 2424 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2425 fdrop(fp, td); 2426 return (error); 2427 } 2428 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2429 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2430 if (vp->v_type == VDIR) 2431 error = EISDIR; 2432 #ifdef MAC 2433 else if ((error = mac_check_vnode_write(td->td_ucred, fp->f_cred, 2434 vp))) { 2435 } 2436 #endif 2437 else if ((error = vn_writechk(vp)) == 0) { 2438 VATTR_NULL(&vattr); 2439 vattr.va_size = SCARG(uap, length); 2440 error = VOP_SETATTR(vp, &vattr, fp->f_cred, td); 2441 } 2442 VOP_UNLOCK(vp, 0, td); 2443 vn_finished_write(mp); 2444 fdrop(fp, td); 2445 return (error); 2446 } 2447 2448 #if defined(COMPAT_43) || defined(COMPAT_SUNOS) 2449 /* 2450 * Truncate a file given its path name. 2451 */ 2452 #ifndef _SYS_SYSPROTO_H_ 2453 struct otruncate_args { 2454 char *path; 2455 long length; 2456 }; 2457 #endif 2458 /* ARGSUSED */ 2459 int 2460 otruncate(td, uap) 2461 struct thread *td; 2462 register struct otruncate_args /* { 2463 syscallarg(char *) path; 2464 syscallarg(long) length; 2465 } */ *uap; 2466 { 2467 struct truncate_args /* { 2468 syscallarg(char *) path; 2469 syscallarg(int) pad; 2470 syscallarg(off_t) length; 2471 } */ nuap; 2472 2473 SCARG(&nuap, path) = SCARG(uap, path); 2474 SCARG(&nuap, length) = SCARG(uap, length); 2475 return (truncate(td, &nuap)); 2476 } 2477 2478 /* 2479 * Truncate a file given a file descriptor. 2480 */ 2481 #ifndef _SYS_SYSPROTO_H_ 2482 struct oftruncate_args { 2483 int fd; 2484 long length; 2485 }; 2486 #endif 2487 /* ARGSUSED */ 2488 int 2489 oftruncate(td, uap) 2490 struct thread *td; 2491 register struct oftruncate_args /* { 2492 syscallarg(int) fd; 2493 syscallarg(long) length; 2494 } */ *uap; 2495 { 2496 struct ftruncate_args /* { 2497 syscallarg(int) fd; 2498 syscallarg(int) pad; 2499 syscallarg(off_t) length; 2500 } */ nuap; 2501 2502 SCARG(&nuap, fd) = SCARG(uap, fd); 2503 SCARG(&nuap, length) = SCARG(uap, length); 2504 return (ftruncate(td, &nuap)); 2505 } 2506 #endif /* COMPAT_43 || COMPAT_SUNOS */ 2507 2508 /* 2509 * Sync an open file. 2510 */ 2511 #ifndef _SYS_SYSPROTO_H_ 2512 struct fsync_args { 2513 int fd; 2514 }; 2515 #endif 2516 /* ARGSUSED */ 2517 int 2518 fsync(td, uap) 2519 struct thread *td; 2520 struct fsync_args /* { 2521 syscallarg(int) fd; 2522 } */ *uap; 2523 { 2524 struct vnode *vp; 2525 struct mount *mp; 2526 struct file *fp; 2527 vm_object_t obj; 2528 int error; 2529 2530 GIANT_REQUIRED; 2531 2532 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2533 return (error); 2534 vp = (struct vnode *)fp->f_data; 2535 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) { 2536 fdrop(fp, td); 2537 return (error); 2538 } 2539 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2540 if (VOP_GETVOBJECT(vp, &obj) == 0) { 2541 vm_object_page_clean(obj, 0, 0, 0); 2542 } 2543 error = VOP_FSYNC(vp, fp->f_cred, MNT_WAIT, td); 2544 if (error == 0 && vp->v_mount && (vp->v_mount->mnt_flag & MNT_SOFTDEP) 2545 && softdep_fsync_hook != NULL) 2546 error = (*softdep_fsync_hook)(vp); 2547 2548 VOP_UNLOCK(vp, 0, td); 2549 vn_finished_write(mp); 2550 fdrop(fp, td); 2551 return (error); 2552 } 2553 2554 /* 2555 * Rename files. Source and destination must either both be directories, 2556 * or both not be directories. If target is a directory, it must be empty. 2557 */ 2558 #ifndef _SYS_SYSPROTO_H_ 2559 struct rename_args { 2560 char *from; 2561 char *to; 2562 }; 2563 #endif 2564 /* ARGSUSED */ 2565 int 2566 rename(td, uap) 2567 struct thread *td; 2568 register struct rename_args /* { 2569 syscallarg(char *) from; 2570 syscallarg(char *) to; 2571 } */ *uap; 2572 { 2573 struct mount *mp; 2574 struct vnode *tvp, *fvp, *tdvp; 2575 struct nameidata fromnd, tond; 2576 int error; 2577 2578 bwillwrite(); 2579 NDINIT(&fromnd, DELETE, WANTPARENT | SAVESTART, UIO_USERSPACE, 2580 SCARG(uap, from), td); 2581 if ((error = namei(&fromnd)) != 0) 2582 return (error); 2583 fvp = fromnd.ni_vp; 2584 if ((error = vn_start_write(fvp, &mp, V_WAIT | PCATCH)) != 0) { 2585 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2586 vrele(fromnd.ni_dvp); 2587 vrele(fvp); 2588 goto out1; 2589 } 2590 NDINIT(&tond, RENAME, LOCKPARENT | LOCKLEAF | NOCACHE | SAVESTART | NOOBJ, 2591 UIO_USERSPACE, SCARG(uap, to), td); 2592 if (fromnd.ni_vp->v_type == VDIR) 2593 tond.ni_cnd.cn_flags |= WILLBEDIR; 2594 if ((error = namei(&tond)) != 0) { 2595 /* Translate error code for rename("dir1", "dir2/."). */ 2596 if (error == EISDIR && fvp->v_type == VDIR) 2597 error = EINVAL; 2598 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2599 vrele(fromnd.ni_dvp); 2600 vrele(fvp); 2601 goto out1; 2602 } 2603 tdvp = tond.ni_dvp; 2604 tvp = tond.ni_vp; 2605 if (tvp != NULL) { 2606 if (fvp->v_type == VDIR && tvp->v_type != VDIR) { 2607 error = ENOTDIR; 2608 goto out; 2609 } else if (fvp->v_type != VDIR && tvp->v_type == VDIR) { 2610 error = EISDIR; 2611 goto out; 2612 } 2613 } 2614 if (fvp == tdvp) 2615 error = EINVAL; 2616 /* 2617 * If source is the same as the destination (that is the 2618 * same inode number with the same name in the same directory), 2619 * then there is nothing to do. 2620 */ 2621 if (fvp == tvp && fromnd.ni_dvp == tdvp && 2622 fromnd.ni_cnd.cn_namelen == tond.ni_cnd.cn_namelen && 2623 !bcmp(fromnd.ni_cnd.cn_nameptr, tond.ni_cnd.cn_nameptr, 2624 fromnd.ni_cnd.cn_namelen)) 2625 error = -1; 2626 out: 2627 if (!error) { 2628 VOP_LEASE(tdvp, td, td->td_ucred, LEASE_WRITE); 2629 if (fromnd.ni_dvp != tdvp) { 2630 VOP_LEASE(fromnd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2631 } 2632 if (tvp) { 2633 VOP_LEASE(tvp, td, td->td_ucred, LEASE_WRITE); 2634 } 2635 error = VOP_RENAME(fromnd.ni_dvp, fromnd.ni_vp, &fromnd.ni_cnd, 2636 tond.ni_dvp, tond.ni_vp, &tond.ni_cnd); 2637 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2638 NDFREE(&tond, NDF_ONLY_PNBUF); 2639 } else { 2640 NDFREE(&fromnd, NDF_ONLY_PNBUF); 2641 NDFREE(&tond, NDF_ONLY_PNBUF); 2642 if (tdvp == tvp) 2643 vrele(tdvp); 2644 else 2645 vput(tdvp); 2646 if (tvp) 2647 vput(tvp); 2648 vrele(fromnd.ni_dvp); 2649 vrele(fvp); 2650 } 2651 vrele(tond.ni_startdir); 2652 vn_finished_write(mp); 2653 ASSERT_VOP_UNLOCKED(fromnd.ni_dvp, "rename"); 2654 ASSERT_VOP_UNLOCKED(fromnd.ni_vp, "rename"); 2655 ASSERT_VOP_UNLOCKED(tond.ni_dvp, "rename"); 2656 ASSERT_VOP_UNLOCKED(tond.ni_vp, "rename"); 2657 out1: 2658 if (fromnd.ni_startdir) 2659 vrele(fromnd.ni_startdir); 2660 if (error == -1) 2661 return (0); 2662 return (error); 2663 } 2664 2665 /* 2666 * Make a directory file. 2667 */ 2668 #ifndef _SYS_SYSPROTO_H_ 2669 struct mkdir_args { 2670 char *path; 2671 int mode; 2672 }; 2673 #endif 2674 /* ARGSUSED */ 2675 int 2676 mkdir(td, uap) 2677 struct thread *td; 2678 register struct mkdir_args /* { 2679 syscallarg(char *) path; 2680 syscallarg(int) mode; 2681 } */ *uap; 2682 { 2683 2684 return vn_mkdir(uap->path, uap->mode, UIO_USERSPACE, td); 2685 } 2686 2687 int 2688 vn_mkdir(path, mode, segflg, td) 2689 char *path; 2690 int mode; 2691 enum uio_seg segflg; 2692 struct thread *td; 2693 { 2694 struct mount *mp; 2695 struct vnode *vp; 2696 struct vattr vattr; 2697 int error; 2698 struct nameidata nd; 2699 2700 restart: 2701 bwillwrite(); 2702 NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, segflg, path, td); 2703 nd.ni_cnd.cn_flags |= WILLBEDIR; 2704 if ((error = namei(&nd)) != 0) 2705 return (error); 2706 vp = nd.ni_vp; 2707 if (vp != NULL) { 2708 NDFREE(&nd, NDF_ONLY_PNBUF); 2709 vrele(vp); 2710 /* 2711 * XXX namei called with LOCKPARENT but not LOCKLEAF has 2712 * the strange behaviour of leaving the vnode unlocked 2713 * if the target is the same vnode as the parent. 2714 */ 2715 if (vp == nd.ni_dvp) 2716 vrele(nd.ni_dvp); 2717 else 2718 vput(nd.ni_dvp); 2719 return (EEXIST); 2720 } 2721 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 2722 NDFREE(&nd, NDF_ONLY_PNBUF); 2723 vput(nd.ni_dvp); 2724 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 2725 return (error); 2726 goto restart; 2727 } 2728 VATTR_NULL(&vattr); 2729 vattr.va_type = VDIR; 2730 FILEDESC_LOCK(td->td_proc->p_fd); 2731 vattr.va_mode = (mode & ACCESSPERMS) &~ td->td_proc->p_fd->fd_cmask; 2732 FILEDESC_UNLOCK(td->td_proc->p_fd); 2733 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2734 error = VOP_MKDIR(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr); 2735 NDFREE(&nd, NDF_ONLY_PNBUF); 2736 vput(nd.ni_dvp); 2737 if (!error) 2738 vput(nd.ni_vp); 2739 vn_finished_write(mp); 2740 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mkdir"); 2741 ASSERT_VOP_UNLOCKED(nd.ni_vp, "mkdir"); 2742 return (error); 2743 } 2744 2745 /* 2746 * Remove a directory file. 2747 */ 2748 #ifndef _SYS_SYSPROTO_H_ 2749 struct rmdir_args { 2750 char *path; 2751 }; 2752 #endif 2753 /* ARGSUSED */ 2754 int 2755 rmdir(td, uap) 2756 struct thread *td; 2757 struct rmdir_args /* { 2758 syscallarg(char *) path; 2759 } */ *uap; 2760 { 2761 struct mount *mp; 2762 struct vnode *vp; 2763 int error; 2764 struct nameidata nd; 2765 2766 restart: 2767 bwillwrite(); 2768 NDINIT(&nd, DELETE, LOCKPARENT | LOCKLEAF, UIO_USERSPACE, 2769 SCARG(uap, path), td); 2770 if ((error = namei(&nd)) != 0) 2771 return (error); 2772 vp = nd.ni_vp; 2773 if (vp->v_type != VDIR) { 2774 error = ENOTDIR; 2775 goto out; 2776 } 2777 /* 2778 * No rmdir "." please. 2779 */ 2780 if (nd.ni_dvp == vp) { 2781 error = EINVAL; 2782 goto out; 2783 } 2784 /* 2785 * The root of a mounted filesystem cannot be deleted. 2786 */ 2787 if (vp->v_vflag & VV_ROOT) { 2788 error = EBUSY; 2789 goto out; 2790 } 2791 if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) { 2792 NDFREE(&nd, NDF_ONLY_PNBUF); 2793 if (nd.ni_dvp == vp) 2794 vrele(nd.ni_dvp); 2795 else 2796 vput(nd.ni_dvp); 2797 vput(vp); 2798 if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0) 2799 return (error); 2800 goto restart; 2801 } 2802 VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE); 2803 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 2804 error = VOP_RMDIR(nd.ni_dvp, nd.ni_vp, &nd.ni_cnd); 2805 vn_finished_write(mp); 2806 out: 2807 NDFREE(&nd, NDF_ONLY_PNBUF); 2808 if (nd.ni_dvp == vp) 2809 vrele(nd.ni_dvp); 2810 else 2811 vput(nd.ni_dvp); 2812 vput(vp); 2813 ASSERT_VOP_UNLOCKED(nd.ni_dvp, "rmdir"); 2814 ASSERT_VOP_UNLOCKED(nd.ni_vp, "rmdir"); 2815 return (error); 2816 } 2817 2818 #ifdef COMPAT_43 2819 /* 2820 * Read a block of directory entries in a filesystem independent format. 2821 */ 2822 #ifndef _SYS_SYSPROTO_H_ 2823 struct ogetdirentries_args { 2824 int fd; 2825 char *buf; 2826 u_int count; 2827 long *basep; 2828 }; 2829 #endif 2830 int 2831 ogetdirentries(td, uap) 2832 struct thread *td; 2833 register struct ogetdirentries_args /* { 2834 syscallarg(int) fd; 2835 syscallarg(char *) buf; 2836 syscallarg(u_int) count; 2837 syscallarg(long *) basep; 2838 } */ *uap; 2839 { 2840 struct vnode *vp; 2841 struct file *fp; 2842 struct uio auio, kuio; 2843 struct iovec aiov, kiov; 2844 struct dirent *dp, *edp; 2845 caddr_t dirbuf; 2846 int error, eofflag, readcnt; 2847 long loff; 2848 2849 /* XXX arbitrary sanity limit on `count'. */ 2850 if (SCARG(uap, count) > 64 * 1024) 2851 return (EINVAL); 2852 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2853 return (error); 2854 if ((fp->f_flag & FREAD) == 0) { 2855 fdrop(fp, td); 2856 return (EBADF); 2857 } 2858 vp = (struct vnode *)fp->f_data; 2859 unionread: 2860 if (vp->v_type != VDIR) { 2861 fdrop(fp, td); 2862 return (EINVAL); 2863 } 2864 aiov.iov_base = SCARG(uap, buf); 2865 aiov.iov_len = SCARG(uap, count); 2866 auio.uio_iov = &aiov; 2867 auio.uio_iovcnt = 1; 2868 auio.uio_rw = UIO_READ; 2869 auio.uio_segflg = UIO_USERSPACE; 2870 auio.uio_td = td; 2871 auio.uio_resid = SCARG(uap, count); 2872 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 2873 loff = auio.uio_offset = fp->f_offset; 2874 #ifdef MAC 2875 error = mac_check_vnode_readdir(td->td_ucred, vp); 2876 if (error) { 2877 VOP_UNLOCK(vp, 0, td); 2878 fdrop(fp, td); 2879 return (error); 2880 } 2881 #endif 2882 # if (BYTE_ORDER != LITTLE_ENDIAN) 2883 if (vp->v_mount->mnt_maxsymlinklen <= 0) { 2884 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, 2885 NULL, NULL); 2886 fp->f_offset = auio.uio_offset; 2887 } else 2888 # endif 2889 { 2890 kuio = auio; 2891 kuio.uio_iov = &kiov; 2892 kuio.uio_segflg = UIO_SYSSPACE; 2893 kiov.iov_len = SCARG(uap, count); 2894 MALLOC(dirbuf, caddr_t, SCARG(uap, count), M_TEMP, M_WAITOK); 2895 kiov.iov_base = dirbuf; 2896 error = VOP_READDIR(vp, &kuio, fp->f_cred, &eofflag, 2897 NULL, NULL); 2898 fp->f_offset = kuio.uio_offset; 2899 if (error == 0) { 2900 readcnt = SCARG(uap, count) - kuio.uio_resid; 2901 edp = (struct dirent *)&dirbuf[readcnt]; 2902 for (dp = (struct dirent *)dirbuf; dp < edp; ) { 2903 # if (BYTE_ORDER == LITTLE_ENDIAN) 2904 /* 2905 * The expected low byte of 2906 * dp->d_namlen is our dp->d_type. 2907 * The high MBZ byte of dp->d_namlen 2908 * is our dp->d_namlen. 2909 */ 2910 dp->d_type = dp->d_namlen; 2911 dp->d_namlen = 0; 2912 # else 2913 /* 2914 * The dp->d_type is the high byte 2915 * of the expected dp->d_namlen, 2916 * so must be zero'ed. 2917 */ 2918 dp->d_type = 0; 2919 # endif 2920 if (dp->d_reclen > 0) { 2921 dp = (struct dirent *) 2922 ((char *)dp + dp->d_reclen); 2923 } else { 2924 error = EIO; 2925 break; 2926 } 2927 } 2928 if (dp >= edp) 2929 error = uiomove(dirbuf, readcnt, &auio); 2930 } 2931 FREE(dirbuf, M_TEMP); 2932 } 2933 VOP_UNLOCK(vp, 0, td); 2934 if (error) { 2935 fdrop(fp, td); 2936 return (error); 2937 } 2938 if (SCARG(uap, count) == auio.uio_resid) { 2939 if (union_dircheckp) { 2940 error = union_dircheckp(td, &vp, fp); 2941 if (error == -1) 2942 goto unionread; 2943 if (error) { 2944 fdrop(fp, td); 2945 return (error); 2946 } 2947 } 2948 mp_fixme("Accessing vflags w/o vn lock."); 2949 if ((vp->v_vflag & VV_ROOT) && 2950 (vp->v_mount->mnt_flag & MNT_UNION)) { 2951 struct vnode *tvp = vp; 2952 vp = vp->v_mount->mnt_vnodecovered; 2953 VREF(vp); 2954 fp->f_data = vp; 2955 fp->f_offset = 0; 2956 vrele(tvp); 2957 goto unionread; 2958 } 2959 } 2960 error = copyout(&loff, SCARG(uap, basep), sizeof(long)); 2961 fdrop(fp, td); 2962 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 2963 return (error); 2964 } 2965 #endif /* COMPAT_43 */ 2966 2967 /* 2968 * Read a block of directory entries in a filesystem independent format. 2969 */ 2970 #ifndef _SYS_SYSPROTO_H_ 2971 struct getdirentries_args { 2972 int fd; 2973 char *buf; 2974 u_int count; 2975 long *basep; 2976 }; 2977 #endif 2978 int 2979 getdirentries(td, uap) 2980 struct thread *td; 2981 register struct getdirentries_args /* { 2982 syscallarg(int) fd; 2983 syscallarg(char *) buf; 2984 syscallarg(u_int) count; 2985 syscallarg(long *) basep; 2986 } */ *uap; 2987 { 2988 struct vnode *vp; 2989 struct file *fp; 2990 struct uio auio; 2991 struct iovec aiov; 2992 long loff; 2993 int error, eofflag; 2994 2995 if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0) 2996 return (error); 2997 if ((fp->f_flag & FREAD) == 0) { 2998 fdrop(fp, td); 2999 return (EBADF); 3000 } 3001 vp = (struct vnode *)fp->f_data; 3002 unionread: 3003 if (vp->v_type != VDIR) { 3004 fdrop(fp, td); 3005 return (EINVAL); 3006 } 3007 aiov.iov_base = SCARG(uap, buf); 3008 aiov.iov_len = SCARG(uap, count); 3009 auio.uio_iov = &aiov; 3010 auio.uio_iovcnt = 1; 3011 auio.uio_rw = UIO_READ; 3012 auio.uio_segflg = UIO_USERSPACE; 3013 auio.uio_td = td; 3014 auio.uio_resid = SCARG(uap, count); 3015 /* vn_lock(vp, LK_SHARED | LK_RETRY, td); */ 3016 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3017 loff = auio.uio_offset = fp->f_offset; 3018 #ifdef MAC 3019 error = mac_check_vnode_readdir(td->td_ucred, vp); 3020 if (error == 0) 3021 #endif 3022 error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, NULL, 3023 NULL); 3024 fp->f_offset = auio.uio_offset; 3025 VOP_UNLOCK(vp, 0, td); 3026 if (error) { 3027 fdrop(fp, td); 3028 return (error); 3029 } 3030 if (SCARG(uap, count) == auio.uio_resid) { 3031 if (union_dircheckp) { 3032 error = union_dircheckp(td, &vp, fp); 3033 if (error == -1) 3034 goto unionread; 3035 if (error) { 3036 fdrop(fp, td); 3037 return (error); 3038 } 3039 } 3040 mp_fixme("Accessing vflag without vn lock."); 3041 if ((vp->v_vflag & VV_ROOT) && 3042 (vp->v_mount->mnt_flag & MNT_UNION)) { 3043 struct vnode *tvp = vp; 3044 vp = vp->v_mount->mnt_vnodecovered; 3045 VREF(vp); 3046 fp->f_data = vp; 3047 fp->f_offset = 0; 3048 vrele(tvp); 3049 goto unionread; 3050 } 3051 } 3052 if (SCARG(uap, basep) != NULL) { 3053 error = copyout(&loff, SCARG(uap, basep), sizeof(long)); 3054 } 3055 td->td_retval[0] = SCARG(uap, count) - auio.uio_resid; 3056 fdrop(fp, td); 3057 return (error); 3058 } 3059 #ifndef _SYS_SYSPROTO_H_ 3060 struct getdents_args { 3061 int fd; 3062 char *buf; 3063 size_t count; 3064 }; 3065 #endif 3066 int 3067 getdents(td, uap) 3068 struct thread *td; 3069 register struct getdents_args /* { 3070 syscallarg(int) fd; 3071 syscallarg(char *) buf; 3072 syscallarg(u_int) count; 3073 } */ *uap; 3074 { 3075 struct getdirentries_args ap; 3076 ap.fd = uap->fd; 3077 ap.buf = uap->buf; 3078 ap.count = uap->count; 3079 ap.basep = NULL; 3080 return getdirentries(td, &ap); 3081 } 3082 3083 /* 3084 * Set the mode mask for creation of filesystem nodes. 3085 * 3086 * MP SAFE 3087 */ 3088 #ifndef _SYS_SYSPROTO_H_ 3089 struct umask_args { 3090 int newmask; 3091 }; 3092 #endif 3093 int 3094 umask(td, uap) 3095 struct thread *td; 3096 struct umask_args /* { 3097 syscallarg(int) newmask; 3098 } */ *uap; 3099 { 3100 register struct filedesc *fdp; 3101 3102 FILEDESC_LOCK(td->td_proc->p_fd); 3103 fdp = td->td_proc->p_fd; 3104 td->td_retval[0] = fdp->fd_cmask; 3105 fdp->fd_cmask = SCARG(uap, newmask) & ALLPERMS; 3106 FILEDESC_UNLOCK(td->td_proc->p_fd); 3107 return (0); 3108 } 3109 3110 /* 3111 * Void all references to file by ripping underlying filesystem 3112 * away from vnode. 3113 */ 3114 #ifndef _SYS_SYSPROTO_H_ 3115 struct revoke_args { 3116 char *path; 3117 }; 3118 #endif 3119 /* ARGSUSED */ 3120 int 3121 revoke(td, uap) 3122 struct thread *td; 3123 register struct revoke_args /* { 3124 syscallarg(char *) path; 3125 } */ *uap; 3126 { 3127 struct mount *mp; 3128 struct vnode *vp; 3129 struct vattr vattr; 3130 int error; 3131 struct nameidata nd; 3132 3133 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, SCARG(uap, path), 3134 td); 3135 if ((error = namei(&nd)) != 0) 3136 return (error); 3137 vp = nd.ni_vp; 3138 NDFREE(&nd, NDF_ONLY_PNBUF); 3139 if (vp->v_type != VCHR) { 3140 vput(vp); 3141 return (EINVAL); 3142 } 3143 #ifdef MAC 3144 error = mac_check_vnode_revoke(td->td_ucred, vp); 3145 if (error) { 3146 vput(vp); 3147 return (error); 3148 } 3149 #endif 3150 error = VOP_GETATTR(vp, &vattr, td->td_ucred, td); 3151 if (error) { 3152 vput(vp); 3153 return (error); 3154 } 3155 VOP_UNLOCK(vp, 0, td); 3156 if (td->td_ucred->cr_uid != vattr.va_uid) { 3157 error = suser_cred(td->td_ucred, PRISON_ROOT); 3158 if (error) 3159 goto out; 3160 } 3161 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3162 goto out; 3163 if (vcount(vp) > 1) 3164 VOP_REVOKE(vp, REVOKEALL); 3165 vn_finished_write(mp); 3166 out: 3167 vrele(vp); 3168 return (error); 3169 } 3170 3171 /* 3172 * Convert a user file descriptor to a kernel file entry. 3173 * The file entry is locked upon returning. 3174 */ 3175 int 3176 getvnode(fdp, fd, fpp) 3177 struct filedesc *fdp; 3178 int fd; 3179 struct file **fpp; 3180 { 3181 int error; 3182 struct file *fp; 3183 3184 fp = NULL; 3185 if (fdp == NULL) 3186 error = EBADF; 3187 else { 3188 FILEDESC_LOCK(fdp); 3189 if ((u_int)fd >= fdp->fd_nfiles || 3190 (fp = fdp->fd_ofiles[fd]) == NULL) 3191 error = EBADF; 3192 else if (fp->f_type != DTYPE_VNODE && fp->f_type != DTYPE_FIFO) { 3193 fp = NULL; 3194 error = EINVAL; 3195 } else { 3196 fhold(fp); 3197 error = 0; 3198 } 3199 FILEDESC_UNLOCK(fdp); 3200 } 3201 *fpp = fp; 3202 return (error); 3203 } 3204 /* 3205 * Get (NFS) file handle 3206 */ 3207 #ifndef _SYS_SYSPROTO_H_ 3208 struct getfh_args { 3209 char *fname; 3210 fhandle_t *fhp; 3211 }; 3212 #endif 3213 int 3214 getfh(td, uap) 3215 struct thread *td; 3216 register struct getfh_args *uap; 3217 { 3218 struct nameidata nd; 3219 fhandle_t fh; 3220 register struct vnode *vp; 3221 int error; 3222 3223 /* 3224 * Must be super user 3225 */ 3226 error = suser(td); 3227 if (error) 3228 return (error); 3229 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->fname, td); 3230 error = namei(&nd); 3231 if (error) 3232 return (error); 3233 NDFREE(&nd, NDF_ONLY_PNBUF); 3234 vp = nd.ni_vp; 3235 bzero(&fh, sizeof(fh)); 3236 fh.fh_fsid = vp->v_mount->mnt_stat.f_fsid; 3237 error = VFS_VPTOFH(vp, &fh.fh_fid); 3238 vput(vp); 3239 if (error) 3240 return (error); 3241 error = copyout(&fh, uap->fhp, sizeof (fh)); 3242 return (error); 3243 } 3244 3245 /* 3246 * syscall for the rpc.lockd to use to translate a NFS file handle into 3247 * an open descriptor. 3248 * 3249 * warning: do not remove the suser() call or this becomes one giant 3250 * security hole. 3251 */ 3252 #ifndef _SYS_SYSPROTO_H_ 3253 struct fhopen_args { 3254 const struct fhandle *u_fhp; 3255 int flags; 3256 }; 3257 #endif 3258 int 3259 fhopen(td, uap) 3260 struct thread *td; 3261 struct fhopen_args /* { 3262 syscallarg(const struct fhandle *) u_fhp; 3263 syscallarg(int) flags; 3264 } */ *uap; 3265 { 3266 struct proc *p = td->td_proc; 3267 struct mount *mp; 3268 struct vnode *vp; 3269 struct fhandle fhp; 3270 struct vattr vat; 3271 struct vattr *vap = &vat; 3272 struct flock lf; 3273 struct file *fp; 3274 register struct filedesc *fdp = p->p_fd; 3275 int fmode, mode, error, type; 3276 struct file *nfp; 3277 int indx; 3278 3279 /* 3280 * Must be super user 3281 */ 3282 error = suser(td); 3283 if (error) 3284 return (error); 3285 3286 fmode = FFLAGS(SCARG(uap, flags)); 3287 /* why not allow a non-read/write open for our lockd? */ 3288 if (((fmode & (FREAD | FWRITE)) == 0) || (fmode & O_CREAT)) 3289 return (EINVAL); 3290 error = copyin(SCARG(uap,u_fhp), &fhp, sizeof(fhp)); 3291 if (error) 3292 return(error); 3293 /* find the mount point */ 3294 mp = vfs_getvfs(&fhp.fh_fsid); 3295 if (mp == NULL) 3296 return (ESTALE); 3297 /* now give me my vnode, it gets returned to me locked */ 3298 error = VFS_FHTOVP(mp, &fhp.fh_fid, &vp); 3299 if (error) 3300 return (error); 3301 /* 3302 * from now on we have to make sure not 3303 * to forget about the vnode 3304 * any error that causes an abort must vput(vp) 3305 * just set error = err and 'goto bad;'. 3306 */ 3307 3308 /* 3309 * from vn_open 3310 */ 3311 if (vp->v_type == VLNK) { 3312 error = EMLINK; 3313 goto bad; 3314 } 3315 if (vp->v_type == VSOCK) { 3316 error = EOPNOTSUPP; 3317 goto bad; 3318 } 3319 mode = 0; 3320 if (fmode & (FWRITE | O_TRUNC)) { 3321 if (vp->v_type == VDIR) { 3322 error = EISDIR; 3323 goto bad; 3324 } 3325 error = vn_writechk(vp); 3326 if (error) 3327 goto bad; 3328 mode |= VWRITE; 3329 } 3330 if (fmode & FREAD) 3331 mode |= VREAD; 3332 if (fmode & O_APPEND) 3333 mode |= VAPPEND; 3334 #ifdef MAC 3335 error = mac_check_vnode_open(td->td_ucred, vp, mode); 3336 if (error) 3337 goto bad; 3338 #endif 3339 if (mode) { 3340 error = VOP_ACCESS(vp, mode, td->td_ucred, td); 3341 if (error) 3342 goto bad; 3343 } 3344 if (fmode & O_TRUNC) { 3345 VOP_UNLOCK(vp, 0, td); /* XXX */ 3346 if ((error = vn_start_write(NULL, &mp, V_WAIT | PCATCH)) != 0) { 3347 vrele(vp); 3348 return (error); 3349 } 3350 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3351 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); /* XXX */ 3352 #ifdef MAC 3353 /* 3354 * We don't yet have fp->f_cred, so use td->td_ucred, which 3355 * should be right. 3356 */ 3357 error = mac_check_vnode_write(td->td_ucred, td->td_ucred, vp); 3358 if (error == 0) { 3359 #endif 3360 VATTR_NULL(vap); 3361 vap->va_size = 0; 3362 error = VOP_SETATTR(vp, vap, td->td_ucred, td); 3363 #ifdef MAC 3364 } 3365 #endif 3366 vn_finished_write(mp); 3367 if (error) 3368 goto bad; 3369 } 3370 error = VOP_OPEN(vp, fmode, td->td_ucred, td); 3371 if (error) 3372 goto bad; 3373 /* 3374 * Make sure that a VM object is created for VMIO support. 3375 */ 3376 if (vn_canvmio(vp) == TRUE) { 3377 if ((error = vfs_object_create(vp, td, td->td_ucred)) != 0) 3378 goto bad; 3379 } 3380 if (fmode & FWRITE) 3381 vp->v_writecount++; 3382 3383 /* 3384 * end of vn_open code 3385 */ 3386 3387 if ((error = falloc(td, &nfp, &indx)) != 0) { 3388 if (fmode & FWRITE) 3389 vp->v_writecount--; 3390 goto bad; 3391 } 3392 fp = nfp; 3393 3394 /* 3395 * Hold an extra reference to avoid having fp ripped out 3396 * from under us while we block in the lock op 3397 */ 3398 fhold(fp); 3399 nfp->f_data = vp; 3400 nfp->f_flag = fmode & FMASK; 3401 nfp->f_ops = &vnops; 3402 nfp->f_type = DTYPE_VNODE; 3403 if (fmode & (O_EXLOCK | O_SHLOCK)) { 3404 lf.l_whence = SEEK_SET; 3405 lf.l_start = 0; 3406 lf.l_len = 0; 3407 if (fmode & O_EXLOCK) 3408 lf.l_type = F_WRLCK; 3409 else 3410 lf.l_type = F_RDLCK; 3411 type = F_FLOCK; 3412 if ((fmode & FNONBLOCK) == 0) 3413 type |= F_WAIT; 3414 VOP_UNLOCK(vp, 0, td); 3415 if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf, 3416 type)) != 0) { 3417 /* 3418 * The lock request failed. Normally close the 3419 * descriptor but handle the case where someone might 3420 * have dup()d or close()d it when we weren't looking. 3421 */ 3422 FILEDESC_LOCK(fdp); 3423 if (fdp->fd_ofiles[indx] == fp) { 3424 fdp->fd_ofiles[indx] = NULL; 3425 FILEDESC_UNLOCK(fdp); 3426 fdrop(fp, td); 3427 } else 3428 FILEDESC_UNLOCK(fdp); 3429 /* 3430 * release our private reference 3431 */ 3432 fdrop(fp, td); 3433 return(error); 3434 } 3435 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3436 fp->f_flag |= FHASLOCK; 3437 } 3438 if ((vp->v_type == VREG) && (VOP_GETVOBJECT(vp, NULL) != 0)) 3439 vfs_object_create(vp, td, td->td_ucred); 3440 3441 VOP_UNLOCK(vp, 0, td); 3442 fdrop(fp, td); 3443 td->td_retval[0] = indx; 3444 return (0); 3445 3446 bad: 3447 vput(vp); 3448 return (error); 3449 } 3450 3451 /* 3452 * Stat an (NFS) file handle. 3453 */ 3454 #ifndef _SYS_SYSPROTO_H_ 3455 struct fhstat_args { 3456 struct fhandle *u_fhp; 3457 struct stat *sb; 3458 }; 3459 #endif 3460 int 3461 fhstat(td, uap) 3462 struct thread *td; 3463 register struct fhstat_args /* { 3464 syscallarg(struct fhandle *) u_fhp; 3465 syscallarg(struct stat *) sb; 3466 } */ *uap; 3467 { 3468 struct stat sb; 3469 fhandle_t fh; 3470 struct mount *mp; 3471 struct vnode *vp; 3472 int error; 3473 3474 /* 3475 * Must be super user 3476 */ 3477 error = suser(td); 3478 if (error) 3479 return (error); 3480 3481 error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t)); 3482 if (error) 3483 return (error); 3484 3485 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3486 return (ESTALE); 3487 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3488 return (error); 3489 error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td); 3490 vput(vp); 3491 if (error) 3492 return (error); 3493 error = copyout(&sb, SCARG(uap, sb), sizeof(sb)); 3494 return (error); 3495 } 3496 3497 /* 3498 * Implement fstatfs() for (NFS) file handles. 3499 */ 3500 #ifndef _SYS_SYSPROTO_H_ 3501 struct fhstatfs_args { 3502 struct fhandle *u_fhp; 3503 struct statfs *buf; 3504 }; 3505 #endif 3506 int 3507 fhstatfs(td, uap) 3508 struct thread *td; 3509 struct fhstatfs_args /* { 3510 syscallarg(struct fhandle) *u_fhp; 3511 syscallarg(struct statfs) *buf; 3512 } */ *uap; 3513 { 3514 struct statfs *sp; 3515 struct mount *mp; 3516 struct vnode *vp; 3517 struct statfs sb; 3518 fhandle_t fh; 3519 int error; 3520 3521 /* 3522 * Must be super user 3523 */ 3524 error = suser(td); 3525 if (error) 3526 return (error); 3527 3528 if ((error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t))) != 0) 3529 return (error); 3530 3531 if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL) 3532 return (ESTALE); 3533 if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp))) 3534 return (error); 3535 mp = vp->v_mount; 3536 sp = &mp->mnt_stat; 3537 vput(vp); 3538 #ifdef MAC 3539 error = mac_check_mount_stat(td->td_ucred, mp); 3540 if (error) 3541 return (error); 3542 #endif 3543 if ((error = VFS_STATFS(mp, sp, td)) != 0) 3544 return (error); 3545 sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK; 3546 if (suser(td)) { 3547 bcopy(sp, &sb, sizeof(sb)); 3548 sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0; 3549 sp = &sb; 3550 } 3551 return (copyout(sp, SCARG(uap, buf), sizeof(*sp))); 3552 } 3553 3554 /* 3555 * Syscall to push extended attribute configuration information into the 3556 * VFS. Accepts a path, which it converts to a mountpoint, as well as 3557 * a command (int cmd), and attribute name and misc data. For now, the 3558 * attribute name is left in userspace for consumption by the VFS_op. 3559 * It will probably be changed to be copied into sysspace by the 3560 * syscall in the future, once issues with various consumers of the 3561 * attribute code have raised their hands. 3562 * 3563 * Currently this is used only by UFS Extended Attributes. 3564 */ 3565 int 3566 extattrctl(td, uap) 3567 struct thread *td; 3568 struct extattrctl_args /* { 3569 syscallarg(const char *) path; 3570 syscallarg(int) cmd; 3571 syscallarg(const char *) filename; 3572 syscallarg(int) attrnamespace; 3573 syscallarg(const char *) attrname; 3574 } */ *uap; 3575 { 3576 struct vnode *filename_vp; 3577 struct nameidata nd; 3578 struct mount *mp, *mp_writable; 3579 char attrname[EXTATTR_MAXNAMELEN]; 3580 int error; 3581 3582 /* 3583 * uap->attrname is not always defined. We check again later when we 3584 * invoke the VFS call so as to pass in NULL there if needed. 3585 */ 3586 if (uap->attrname != NULL) { 3587 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, 3588 NULL); 3589 if (error) 3590 return (error); 3591 } 3592 3593 /* 3594 * uap->filename is not always defined. If it is, grab a vnode lock, 3595 * which VFS_EXTATTRCTL() will later release. 3596 */ 3597 filename_vp = NULL; 3598 if (uap->filename != NULL) { 3599 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, 3600 uap->filename, td); 3601 if ((error = namei(&nd)) != 0) 3602 return (error); 3603 filename_vp = nd.ni_vp; 3604 NDFREE(&nd, NDF_NO_VP_RELE | NDF_NO_VP_UNLOCK); 3605 } 3606 3607 /* uap->path is always defined. */ 3608 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3609 if ((error = namei(&nd)) != 0) { 3610 if (filename_vp != NULL) 3611 vput(filename_vp); 3612 return (error); 3613 } 3614 mp = nd.ni_vp->v_mount; 3615 error = vn_start_write(nd.ni_vp, &mp_writable, V_WAIT | PCATCH); 3616 NDFREE(&nd, 0); 3617 if (error) { 3618 if (filename_vp != NULL) 3619 vput(filename_vp); 3620 return (error); 3621 } 3622 3623 error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, uap->attrnamespace, 3624 uap->attrname != NULL ? attrname : NULL, td); 3625 3626 vn_finished_write(mp_writable); 3627 /* 3628 * VFS_EXTATTRCTL will have unlocked, but not de-ref'd, 3629 * filename_vp, so vrele it if it is defined. 3630 */ 3631 if (filename_vp != NULL) 3632 vrele(filename_vp); 3633 3634 return (error); 3635 } 3636 3637 /*- 3638 * Set a named extended attribute on a file or directory 3639 * 3640 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3641 * kernelspace string pointer "attrname", userspace buffer 3642 * pointer "data", buffer length "nbytes", thread "td". 3643 * Returns: 0 on success, an error number otherwise 3644 * Locks: none 3645 * References: vp must be a valid reference for the duration of the call 3646 */ 3647 static int 3648 extattr_set_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3649 void *data, size_t nbytes, struct thread *td) 3650 { 3651 struct mount *mp; 3652 struct uio auio; 3653 struct iovec aiov; 3654 ssize_t cnt; 3655 int error; 3656 3657 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3658 return (error); 3659 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3660 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3661 3662 aiov.iov_base = data; 3663 aiov.iov_len = nbytes; 3664 auio.uio_iov = &aiov; 3665 auio.uio_iovcnt = 1; 3666 auio.uio_offset = 0; 3667 if (nbytes > INT_MAX) { 3668 error = EINVAL; 3669 goto done; 3670 } 3671 auio.uio_resid = nbytes; 3672 auio.uio_rw = UIO_WRITE; 3673 auio.uio_segflg = UIO_USERSPACE; 3674 auio.uio_td = td; 3675 cnt = nbytes; 3676 3677 #ifdef MAC 3678 error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace, 3679 attrname, &auio); 3680 if (error) 3681 goto done; 3682 #endif 3683 3684 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio, 3685 td->td_ucred, td); 3686 cnt -= auio.uio_resid; 3687 td->td_retval[0] = cnt; 3688 3689 done: 3690 VOP_UNLOCK(vp, 0, td); 3691 vn_finished_write(mp); 3692 return (error); 3693 } 3694 3695 int 3696 extattr_set_file(td, uap) 3697 struct thread *td; 3698 struct extattr_set_file_args /* { 3699 syscallarg(const char *) path; 3700 syscallarg(int) attrnamespace; 3701 syscallarg(const char *) attrname; 3702 syscallarg(void *) data; 3703 syscallarg(size_t) nbytes; 3704 } */ *uap; 3705 { 3706 struct nameidata nd; 3707 char attrname[EXTATTR_MAXNAMELEN]; 3708 int error; 3709 3710 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3711 if (error) 3712 return (error); 3713 3714 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3715 if ((error = namei(&nd)) != 0) 3716 return (error); 3717 NDFREE(&nd, NDF_ONLY_PNBUF); 3718 3719 error = extattr_set_vp(nd.ni_vp, uap->attrnamespace, attrname, 3720 uap->data, uap->nbytes, td); 3721 3722 vrele(nd.ni_vp); 3723 return (error); 3724 } 3725 3726 int 3727 extattr_set_fd(td, uap) 3728 struct thread *td; 3729 struct extattr_set_fd_args /* { 3730 syscallarg(int) fd; 3731 syscallarg(int) attrnamespace; 3732 syscallarg(const char *) attrname; 3733 syscallarg(void *) data; 3734 syscallarg(size_t) nbytes; 3735 } */ *uap; 3736 { 3737 struct file *fp; 3738 char attrname[EXTATTR_MAXNAMELEN]; 3739 int error; 3740 3741 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3742 if (error) 3743 return (error); 3744 3745 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3746 return (error); 3747 3748 error = extattr_set_vp((struct vnode *)fp->f_data, uap->attrnamespace, 3749 attrname, uap->data, uap->nbytes, td); 3750 fdrop(fp, td); 3751 3752 return (error); 3753 } 3754 3755 /*- 3756 * Get a named extended attribute on a file or directory 3757 * 3758 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3759 * kernelspace string pointer "attrname", userspace buffer 3760 * pointer "data", buffer length "nbytes", thread "td". 3761 * Returns: 0 on success, an error number otherwise 3762 * Locks: none 3763 * References: vp must be a valid reference for the duration of the call 3764 */ 3765 static int 3766 extattr_get_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3767 void *data, size_t nbytes, struct thread *td) 3768 { 3769 struct uio auio, *auiop; 3770 struct iovec aiov; 3771 ssize_t cnt; 3772 size_t size, *sizep; 3773 int error; 3774 3775 VOP_LEASE(vp, td, td->td_ucred, LEASE_READ); 3776 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3777 3778 /* 3779 * Slightly unusual semantics: if the user provides a NULL data 3780 * pointer, they don't want to receive the data, just the 3781 * maximum read length. 3782 */ 3783 auiop = NULL; 3784 sizep = NULL; 3785 cnt = 0; 3786 if (data != NULL) { 3787 aiov.iov_base = data; 3788 aiov.iov_len = nbytes; 3789 auio.uio_iov = &aiov; 3790 auio.uio_offset = 0; 3791 if (nbytes > INT_MAX) { 3792 error = EINVAL; 3793 goto done; 3794 } 3795 auio.uio_resid = nbytes; 3796 auio.uio_rw = UIO_READ; 3797 auio.uio_segflg = UIO_USERSPACE; 3798 auio.uio_td = td; 3799 auiop = &auio; 3800 cnt = nbytes; 3801 } else 3802 sizep = &size; 3803 3804 #ifdef MAC 3805 error = mac_check_vnode_getextattr(td->td_ucred, vp, attrnamespace, 3806 attrname, &auio); 3807 if (error) 3808 goto done; 3809 #endif 3810 3811 error = VOP_GETEXTATTR(vp, attrnamespace, attrname, auiop, sizep, 3812 td->td_ucred, td); 3813 3814 if (auiop != NULL) { 3815 cnt -= auio.uio_resid; 3816 td->td_retval[0] = cnt; 3817 } else 3818 td->td_retval[0] = size; 3819 3820 done: 3821 VOP_UNLOCK(vp, 0, td); 3822 return (error); 3823 } 3824 3825 int 3826 extattr_get_file(td, uap) 3827 struct thread *td; 3828 struct extattr_get_file_args /* { 3829 syscallarg(const char *) path; 3830 syscallarg(int) attrnamespace; 3831 syscallarg(const char *) attrname; 3832 syscallarg(void *) data; 3833 syscallarg(size_t) nbytes; 3834 } */ *uap; 3835 { 3836 struct nameidata nd; 3837 char attrname[EXTATTR_MAXNAMELEN]; 3838 int error; 3839 3840 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3841 if (error) 3842 return (error); 3843 3844 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3845 if ((error = namei(&nd)) != 0) 3846 return (error); 3847 NDFREE(&nd, NDF_ONLY_PNBUF); 3848 3849 error = extattr_get_vp(nd.ni_vp, uap->attrnamespace, attrname, 3850 uap->data, uap->nbytes, td); 3851 3852 vrele(nd.ni_vp); 3853 return (error); 3854 } 3855 3856 int 3857 extattr_get_fd(td, uap) 3858 struct thread *td; 3859 struct extattr_get_fd_args /* { 3860 syscallarg(int) fd; 3861 syscallarg(int) attrnamespace; 3862 syscallarg(const char *) attrname; 3863 syscallarg(void *) data; 3864 syscallarg(size_t) nbytes; 3865 } */ *uap; 3866 { 3867 struct file *fp; 3868 char attrname[EXTATTR_MAXNAMELEN]; 3869 int error; 3870 3871 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3872 if (error) 3873 return (error); 3874 3875 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3876 return (error); 3877 3878 error = extattr_get_vp((struct vnode *)fp->f_data, uap->attrnamespace, 3879 attrname, uap->data, uap->nbytes, td); 3880 3881 fdrop(fp, td); 3882 return (error); 3883 } 3884 3885 /* 3886 * extattr_delete_vp(): Delete a named extended attribute on a file or 3887 * directory 3888 * 3889 * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace", 3890 * kernelspace string pointer "attrname", proc "p" 3891 * Returns: 0 on success, an error number otherwise 3892 * Locks: none 3893 * References: vp must be a valid reference for the duration of the call 3894 */ 3895 static int 3896 extattr_delete_vp(struct vnode *vp, int attrnamespace, const char *attrname, 3897 struct thread *td) 3898 { 3899 struct mount *mp; 3900 int error; 3901 3902 if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) 3903 return (error); 3904 VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE); 3905 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td); 3906 3907 #ifdef MAC 3908 error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace, 3909 attrname, NULL); 3910 #endif 3911 3912 error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, td->td_ucred, 3913 td); 3914 3915 VOP_UNLOCK(vp, 0, td); 3916 vn_finished_write(mp); 3917 return (error); 3918 } 3919 3920 int 3921 extattr_delete_file(td, uap) 3922 struct thread *td; 3923 struct extattr_delete_file_args /* { 3924 syscallarg(const char *) path; 3925 syscallarg(int) attrnamespace; 3926 syscallarg(const char *) attrname; 3927 } */ *uap; 3928 { 3929 struct nameidata nd; 3930 char attrname[EXTATTR_MAXNAMELEN]; 3931 int error; 3932 3933 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3934 if (error) 3935 return(error); 3936 3937 NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td); 3938 if ((error = namei(&nd)) != 0) 3939 return(error); 3940 NDFREE(&nd, NDF_ONLY_PNBUF); 3941 3942 error = extattr_delete_vp(nd.ni_vp, uap->attrnamespace, attrname, td); 3943 3944 vrele(nd.ni_vp); 3945 return(error); 3946 } 3947 3948 int 3949 extattr_delete_fd(td, uap) 3950 struct thread *td; 3951 struct extattr_delete_fd_args /* { 3952 syscallarg(int) fd; 3953 syscallarg(int) attrnamespace; 3954 syscallarg(const char *) attrname; 3955 } */ *uap; 3956 { 3957 struct file *fp; 3958 struct vnode *vp; 3959 char attrname[EXTATTR_MAXNAMELEN]; 3960 int error; 3961 3962 error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL); 3963 if (error) 3964 return (error); 3965 3966 if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0) 3967 return (error); 3968 vp = (struct vnode *)fp->f_data; 3969 3970 error = extattr_delete_vp(vp, uap->attrnamespace, attrname, td); 3971 3972 fdrop(fp, td); 3973 return (error); 3974 } 3975