1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
23 */
24
25 /*
26 * vnode ops for the /dev/vt directory
27 */
28
29 #include <sys/types.h>
30 #include <sys/param.h>
31 #include <sys/sysmacros.h>
32 #include <sys/sunndi.h>
33 #include <fs/fs_subr.h>
34 #include <sys/fs/dv_node.h>
35 #include <sys/fs/sdev_impl.h>
36 #include <sys/policy.h>
37 #include <sys/stat.h>
38 #include <sys/vfs_opreg.h>
39 #include <sys/tty.h>
40 #include <sys/vt_impl.h>
41 #include <sys/note.h>
42
43 /* warlock in this file only cares about variables shared by vt and devfs */
44 _NOTE(SCHEME_PROTECTS_DATA("Do not care", sdev_node vattr vnode))
45
46 #define DEVVT_UID_DEFAULT SDEV_UID_DEFAULT
47 #define DEVVT_GID_DEFAULT (0)
48 #define DEVVT_DEVMODE_DEFAULT (0600)
49 #define DEVVT_ACTIVE_NAME "active"
50 #define DEVVT_CONSUSER_NAME "console_user"
51
52 #define isdigit(ch) ((ch) >= '0' && (ch) <= '9')
53
54 /* attributes for VT nodes */
55 static vattr_t devvt_vattr = {
56 AT_TYPE|AT_MODE|AT_UID|AT_GID, /* va_mask */
57 VCHR, /* va_type */
58 S_IFCHR | DEVVT_DEVMODE_DEFAULT, /* va_mode */
59 DEVVT_UID_DEFAULT, /* va_uid */
60 DEVVT_GID_DEFAULT, /* va_gid */
61 0 /* 0 hereafter */
62 };
63
64 struct vnodeops *devvt_vnodeops;
65
66 struct vnodeops *
devvt_getvnodeops(void)67 devvt_getvnodeops(void)
68 {
69 return (devvt_vnodeops);
70 }
71
72 static int
devvt_str2minor(const char * nm,minor_t * mp)73 devvt_str2minor(const char *nm, minor_t *mp)
74 {
75 long uminor = 0;
76 char *endptr = NULL;
77
78 if (nm == NULL || !isdigit(*nm))
79 return (EINVAL);
80
81 *mp = 0;
82 if (ddi_strtol(nm, &endptr, 10, &uminor) != 0 ||
83 *endptr != '\0' || uminor < 0) {
84 return (EINVAL);
85 }
86
87 *mp = (minor_t)uminor;
88 return (0);
89 }
90
91 /*
92 * Validate that a node is up-to-date and correct.
93 * A validator may not update the node state or
94 * contents as a read lock permits entry by
95 * multiple threads.
96 */
97 int
devvt_validate(struct sdev_node * dv)98 devvt_validate(struct sdev_node *dv)
99 {
100 minor_t min;
101 char *nm = dv->sdev_name;
102 int rval;
103
104 ASSERT(dv->sdev_state == SDEV_READY);
105 ASSERT(RW_LOCK_HELD(&(dv->sdev_dotdot)->sdev_contents));
106
107 /* validate only READY nodes */
108 if (dv->sdev_state != SDEV_READY) {
109 sdcmn_err(("dev fs: skipping: node not ready %s(%p)",
110 nm, (void *)dv));
111 return (SDEV_VTOR_SKIP);
112 }
113
114 if (vt_wc_attached() == (major_t)-1)
115 return (SDEV_VTOR_INVALID);
116
117 if (strcmp(nm, DEVVT_ACTIVE_NAME) == 0) {
118 char *link = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
119 (void) vt_getactive(link, MAXPATHLEN);
120 rval = (strcmp(link, dv->sdev_symlink) == 0) ?
121 SDEV_VTOR_VALID : SDEV_VTOR_STALE;
122 kmem_free(link, MAXPATHLEN);
123 return (rval);
124 }
125
126 if (strcmp(nm, DEVVT_CONSUSER_NAME) == 0) {
127 char *link = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
128 (void) vt_getconsuser(link, MAXPATHLEN);
129 rval = (strcmp(link, dv->sdev_symlink) == 0) ?
130 SDEV_VTOR_VALID : SDEV_VTOR_STALE;
131 kmem_free(link, MAXPATHLEN);
132 return (rval);
133 }
134
135 if (devvt_str2minor(nm, &min) != 0) {
136 return (SDEV_VTOR_INVALID);
137 }
138
139 if (vt_minor_valid(min) == B_FALSE)
140 return (SDEV_VTOR_INVALID);
141
142 return (SDEV_VTOR_VALID);
143 }
144
145 /*
146 * This callback is invoked from devname_lookup_func() to create
147 * a entry when the node is not found in the cache.
148 */
149 /*ARGSUSED*/
150 static int
devvt_create_rvp(struct sdev_node * ddv,char * nm,void ** arg,cred_t * cred,void * whatever,char * whichever)151 devvt_create_rvp(struct sdev_node *ddv, char *nm,
152 void **arg, cred_t *cred, void *whatever, char *whichever)
153 {
154 minor_t min;
155 major_t maj;
156 struct vattr *vap = (struct vattr *)arg;
157
158 if ((maj = vt_wc_attached()) == (major_t)-1)
159 return (SDEV_VTOR_INVALID);
160
161 if (strcmp(nm, DEVVT_ACTIVE_NAME) == 0) {
162 (void) vt_getactive((char *)*arg, MAXPATHLEN);
163 return (0);
164 }
165
166 if (strcmp(nm, DEVVT_CONSUSER_NAME) == 0) {
167 (void) vt_getconsuser((char *)*arg, MAXPATHLEN);
168 return (0);
169 }
170 if (devvt_str2minor(nm, &min) != 0)
171 return (-1);
172
173 if (vt_minor_valid(min) == B_FALSE)
174 return (-1);
175
176 *vap = devvt_vattr;
177 vap->va_rdev = makedevice(maj, min);
178
179 return (0);
180 }
181
182 /*ARGSUSED3*/
183 static int
devvt_lookup(struct vnode * dvp,char * nm,struct vnode ** vpp,struct pathname * pnp,int flags,struct vnode * rdir,struct cred * cred,caller_context_t * ct,int * direntflags,pathname_t * realpnp)184 devvt_lookup(struct vnode *dvp, char *nm, struct vnode **vpp,
185 struct pathname *pnp, int flags, struct vnode *rdir, struct cred *cred,
186 caller_context_t *ct, int *direntflags, pathname_t *realpnp)
187 {
188 struct sdev_node *sdvp = VTOSDEV(dvp);
189 struct sdev_node *dv;
190 struct vnode *rvp = NULL;
191 int type, error;
192
193 if ((strcmp(nm, DEVVT_ACTIVE_NAME) == 0) ||
194 (strcmp(nm, DEVVT_CONSUSER_NAME) == 0)) {
195 type = SDEV_VLINK;
196 } else {
197 type = SDEV_VATTR;
198 }
199
200 /* Give warlock a more clear call graph */
201 #ifndef __lock_lint
202 error = devname_lookup_func(sdvp, nm, vpp, cred,
203 devvt_create_rvp, type);
204 #else
205 devvt_create_rvp(0, 0, 0, 0, 0, 0);
206 #endif
207
208 if (error == 0) {
209 switch ((*vpp)->v_type) {
210 case VCHR:
211 dv = VTOSDEV(VTOS(*vpp)->s_realvp);
212 ASSERT(VOP_REALVP(SDEVTOV(dv), &rvp, NULL) == ENOSYS);
213 break;
214 case VDIR:
215 case VLNK:
216 dv = VTOSDEV(*vpp);
217 break;
218 default:
219 cmn_err(CE_PANIC, "devvt_lookup: Unsupported node "
220 "type: %p: %d", (void *)(*vpp), (*vpp)->v_type);
221 break;
222 }
223 ASSERT(SDEV_HELD(dv));
224 }
225
226 return (error);
227 }
228
229 static void
devvt_create_snode(struct sdev_node * ddv,char * nm,struct cred * cred,int type)230 devvt_create_snode(struct sdev_node *ddv, char *nm, struct cred *cred, int type)
231 {
232 int error;
233 struct sdev_node *sdv = NULL;
234 struct vattr vattr;
235 struct vattr *vap = &vattr;
236 major_t maj;
237 minor_t min;
238
239 ASSERT(RW_WRITE_HELD(&ddv->sdev_contents));
240
241 if ((maj = vt_wc_attached()) == (major_t)-1)
242 return;
243
244 if (strcmp(nm, DEVVT_ACTIVE_NAME) != 0 &&
245 strcmp(nm, DEVVT_CONSUSER_NAME) != 0 &&
246 devvt_str2minor(nm, &min) != 0)
247 return;
248
249 error = sdev_mknode(ddv, nm, &sdv, NULL, NULL, NULL, cred, SDEV_INIT);
250 if (error || !sdv) {
251 return;
252 }
253
254 mutex_enter(&sdv->sdev_lookup_lock);
255 SDEV_BLOCK_OTHERS(sdv, SDEV_LOOKUP);
256 mutex_exit(&sdv->sdev_lookup_lock);
257
258 if (type & SDEV_VATTR) {
259 *vap = devvt_vattr;
260 vap->va_rdev = makedevice(maj, min);
261 error = sdev_mknode(ddv, nm, &sdv, vap, NULL,
262 NULL, cred, SDEV_READY);
263 } else if (type & SDEV_VLINK) {
264 char *link = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
265
266 (void) vt_getactive(link, MAXPATHLEN);
267 *vap = sdev_vattr_lnk;
268 vap->va_size = strlen(link);
269 error = sdev_mknode(ddv, nm, &sdv, vap, NULL,
270 (void *)link, cred, SDEV_READY);
271
272 kmem_free(link, MAXPATHLEN);
273 }
274
275 if (error != 0) {
276 SDEV_RELE(sdv);
277 return;
278 }
279
280 mutex_enter(&sdv->sdev_lookup_lock);
281 SDEV_UNBLOCK_OTHERS(sdv, SDEV_LOOKUP);
282 mutex_exit(&sdv->sdev_lookup_lock);
283
284 }
285
286 static void
devvt_rebuild_stale_link(struct sdev_node * ddv,struct sdev_node * dv)287 devvt_rebuild_stale_link(struct sdev_node *ddv, struct sdev_node *dv)
288 {
289 char *link;
290
291 ASSERT(RW_WRITE_HELD(&ddv->sdev_contents));
292
293 ASSERT((strcmp(dv->sdev_name, DEVVT_ACTIVE_NAME) == 0) ||
294 (strcmp(dv->sdev_name, DEVVT_CONSUSER_NAME) == 0));
295
296 link = kmem_zalloc(MAXPATHLEN, KM_SLEEP);
297 if (strcmp(dv->sdev_name, DEVVT_ACTIVE_NAME) == 0) {
298 (void) vt_getactive(link, MAXPATHLEN);
299 } else if (strcmp(dv->sdev_name, DEVVT_CONSUSER_NAME) == 0) {
300 (void) vt_getconsuser(link, MAXPATHLEN);
301 }
302
303 if (strcmp(link, dv->sdev_symlink) != 0) {
304 strfree(dv->sdev_symlink);
305 dv->sdev_symlink = strdup(link);
306 dv->sdev_attr->va_size = strlen(link);
307 }
308 kmem_free(link, MAXPATHLEN);
309 }
310
311 /*
312 * First step in refreshing directory contents.
313 * Remove each invalid entry and rebuild the link
314 * reference for each stale entry.
315 */
316 static void
devvt_prunedir(struct sdev_node * ddv)317 devvt_prunedir(struct sdev_node *ddv)
318 {
319 struct vnode *vp;
320 struct sdev_node *dv, *next = NULL;
321 int (*vtor)(struct sdev_node *) = NULL;
322
323 ASSERT(ddv->sdev_flags & SDEV_VTOR);
324
325 vtor = (int (*)(struct sdev_node *))sdev_get_vtor(ddv);
326 ASSERT(vtor);
327
328 for (dv = SDEV_FIRST_ENTRY(ddv); dv; dv = next) {
329 next = SDEV_NEXT_ENTRY(ddv, dv);
330
331 switch (vtor(dv)) {
332 case SDEV_VTOR_VALID:
333 break;
334 case SDEV_VTOR_SKIP:
335 break;
336 case SDEV_VTOR_INVALID:
337 vp = SDEVTOV(dv);
338 if (vp->v_count != 0)
339 break;
340 /* remove the cached node */
341 SDEV_HOLD(dv);
342 (void) sdev_cache_update(ddv, &dv,
343 dv->sdev_name, SDEV_CACHE_DELETE);
344 SDEV_RELE(dv);
345 break;
346 case SDEV_VTOR_STALE:
347 devvt_rebuild_stale_link(ddv, dv);
348 break;
349 }
350 }
351 }
352
353 static void
devvt_cleandir(struct vnode * dvp,struct cred * cred)354 devvt_cleandir(struct vnode *dvp, struct cred *cred)
355 {
356 struct sdev_node *sdvp = VTOSDEV(dvp);
357 struct sdev_node *dv, *next = NULL;
358 int min, cnt;
359 char found = 0;
360
361 mutex_enter(&vc_lock);
362 cnt = VC_INSTANCES_COUNT;
363 mutex_exit(&vc_lock);
364
365 /* We have to fool warlock this way, otherwise it will complain */
366 #ifndef __lock_lint
367 if (rw_tryupgrade(&sdvp->sdev_contents) == NULL) {
368 rw_exit(&sdvp->sdev_contents);
369 rw_enter(&sdvp->sdev_contents, RW_WRITER);
370 }
371 #else
372 rw_enter(&sdvp->sdev_contents, RW_WRITER);
373 #endif
374
375 /* 1. prune invalid nodes and rebuild stale symlinks */
376 devvt_prunedir(sdvp);
377
378 /* 2. create missing nodes */
379 for (min = 0; min < cnt; min++) {
380 char nm[16];
381
382 if (vt_minor_valid(min) == B_FALSE)
383 continue;
384
385 (void) snprintf(nm, sizeof (nm), "%d", min);
386 found = 0;
387 for (dv = SDEV_FIRST_ENTRY(sdvp); dv; dv = next) {
388 next = SDEV_NEXT_ENTRY(sdvp, dv);
389
390 /* validate only ready nodes */
391 if (dv->sdev_state != SDEV_READY)
392 continue;
393 if (strcmp(nm, dv->sdev_name) == 0) {
394 found = 1;
395 break;
396 }
397 }
398 if (!found) {
399 devvt_create_snode(sdvp, nm, cred, SDEV_VATTR);
400 }
401 }
402
403 /* 3. create active link node and console user link node */
404 found = 0;
405 for (dv = SDEV_FIRST_ENTRY(sdvp); dv; dv = next) {
406 next = SDEV_NEXT_ENTRY(sdvp, dv);
407
408 /* validate only ready nodes */
409 if (dv->sdev_state != SDEV_READY)
410 continue;
411 if ((strcmp(dv->sdev_name, DEVVT_ACTIVE_NAME) == NULL))
412 found |= 0x01;
413 if ((strcmp(dv->sdev_name, DEVVT_CONSUSER_NAME) == NULL))
414 found |= 0x02;
415
416 if ((found & 0x01) && (found & 0x02))
417 break;
418 }
419 if (!(found & 0x01))
420 devvt_create_snode(sdvp, DEVVT_ACTIVE_NAME, cred, SDEV_VLINK);
421 if (!(found & 0x02))
422 devvt_create_snode(sdvp, DEVVT_CONSUSER_NAME, cred, SDEV_VLINK);
423
424 #ifndef __lock_lint
425 rw_downgrade(&sdvp->sdev_contents);
426 #else
427 rw_exit(&sdvp->sdev_contents);
428 #endif
429 }
430
431 /*ARGSUSED4*/
432 static int
devvt_readdir(struct vnode * dvp,struct uio * uiop,struct cred * cred,int * eofp,caller_context_t * ct,int flags)433 devvt_readdir(struct vnode *dvp, struct uio *uiop, struct cred *cred,
434 int *eofp, caller_context_t *ct, int flags)
435 {
436 if (uiop->uio_offset == 0) {
437 devvt_cleandir(dvp, cred);
438 }
439
440 return (devname_readdir_func(dvp, uiop, cred, eofp, 0));
441 }
442
443 /*
444 * We allow create to find existing nodes
445 * - if the node doesn't exist - EROFS
446 * - creating an existing dir read-only succeeds, otherwise EISDIR
447 * - exclusive creates fail - EEXIST
448 */
449 /*ARGSUSED2*/
450 static int
devvt_create(struct vnode * dvp,char * nm,struct vattr * vap,vcexcl_t excl,int mode,struct vnode ** vpp,struct cred * cred,int flag,caller_context_t * ct,vsecattr_t * vsecp)451 devvt_create(struct vnode *dvp, char *nm, struct vattr *vap, vcexcl_t excl,
452 int mode, struct vnode **vpp, struct cred *cred, int flag,
453 caller_context_t *ct, vsecattr_t *vsecp)
454 {
455 int error;
456 struct vnode *vp;
457
458 *vpp = NULL;
459
460 if ((error = devvt_lookup(dvp, nm, &vp, NULL, 0, NULL, cred, ct, NULL,
461 NULL)) != 0) {
462 if (error == ENOENT)
463 error = EROFS;
464 return (error);
465 }
466
467 if (excl == EXCL)
468 error = EEXIST;
469 else if (vp->v_type == VDIR && (mode & VWRITE))
470 error = EISDIR;
471 else
472 error = VOP_ACCESS(vp, mode, 0, cred, ct);
473
474 if (error) {
475 VN_RELE(vp);
476 } else
477 *vpp = vp;
478
479 return (error);
480 }
481
482 const fs_operation_def_t devvt_vnodeops_tbl[] = {
483 VOPNAME_READDIR, { .vop_readdir = devvt_readdir },
484 VOPNAME_LOOKUP, { .vop_lookup = devvt_lookup },
485 VOPNAME_CREATE, { .vop_create = devvt_create },
486 VOPNAME_REMOVE, { .error = fs_nosys },
487 VOPNAME_MKDIR, { .error = fs_nosys },
488 VOPNAME_RMDIR, { .error = fs_nosys },
489 VOPNAME_SYMLINK, { .error = fs_nosys },
490 VOPNAME_SETSECATTR, { .error = fs_nosys },
491 NULL, NULL
492 };
493