Sync with FreeBSD.
[dragonfly.git] / sys / vfs / fdesc / fdesc_vnops.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This code is derived from software donated to Berkeley by
6 * Jan-Simon Pendry.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. All advertising materials mentioning features or use of this software
17 * must display the following acknowledgement:
18 * This product includes software developed by the University of
19 * California, Berkeley and its contributors.
20 * 4. Neither the name of the University nor the names of its contributors
21 * may be used to endorse or promote products derived from this software
22 * without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
35 *
36 * @(#)fdesc_vnops.c 8.9 (Berkeley) 1/21/94
37 *
38 * $FreeBSD: src/sys/miscfs/fdesc/fdesc_vnops.c,v 1.47.2.1 2001/10/22 22:49:26 chris Exp $
0e9b9130 39 * $DragonFly: src/sys/vfs/fdesc/fdesc_vnops.c,v 1.37 2007/05/09 00:53:35 dillon Exp $
984263bc
MD
40 */
41
42/*
43 * /dev/fd Filesystem
44 */
45
46#include <sys/param.h>
47#include <sys/systm.h>
48#include <sys/conf.h>
49#include <sys/dirent.h>
50#include <sys/filedesc.h>
51#include <sys/kernel.h> /* boottime */
52#include <sys/lock.h>
53#include <sys/malloc.h>
54#include <sys/file.h> /* Must come after sys/malloc.h */
55#include <sys/mount.h>
984263bc 56#include <sys/proc.h>
dadab5e9 57#include <sys/namei.h>
984263bc
MD
58#include <sys/socket.h>
59#include <sys/stat.h>
60#include <sys/vnode.h>
dadab5e9 61#include <sys/file2.h>
984263bc 62
709f67da
JS
63#include <machine/limits.h>
64
1f2de5d4 65#include "fdesc.h"
984263bc
MD
66
67#define FDL_WANT 0x01
68#define FDL_LOCKED 0x02
69static int fdcache_lock;
70
984263bc
MD
71#define NFDCACHE 4
72#define FD_NHASH(ix) \
73 (&fdhashtbl[(ix) & fdhash])
74static LIST_HEAD(fdhashhead, fdescnode) *fdhashtbl;
75static u_long fdhash;
76
a6ee311a
RG
77static int fdesc_getattr (struct vop_getattr_args *ap);
78static int fdesc_inactive (struct vop_inactive_args *ap);
e62afb5f 79static int fdesc_lookup (struct vop_old_lookup_args *ap);
a6ee311a
RG
80static int fdesc_open (struct vop_open_args *ap);
81static int fdesc_print (struct vop_print_args *ap);
82static int fdesc_readdir (struct vop_readdir_args *ap);
83static int fdesc_reclaim (struct vop_reclaim_args *ap);
84static int fdesc_poll (struct vop_poll_args *ap);
85static int fdesc_setattr (struct vop_setattr_args *ap);
984263bc
MD
86
87/*
88 * Initialise cache headers
89 */
90int
130da09f 91fdesc_init(struct vfsconf *vfsp)
984263bc
MD
92{
93
94 fdhashtbl = hashinit(NFDCACHE, M_CACHE, &fdhash);
95 return (0);
96}
97
43c45e8f
HP
98int
99fdesc_uninit(struct vfsconf *vfsp)
100{
101 if (fdhashtbl)
efda3bd0 102 kfree(fdhashtbl, M_CACHE);
43c45e8f
HP
103 return (0);
104}
984263bc 105int
acde96db 106fdesc_allocvp(fdntype ftype, int ix, struct mount *mp, struct vnode **vpp)
984263bc
MD
107{
108 struct fdhashhead *fc;
109 struct fdescnode *fd;
110 int error = 0;
111
112 fc = FD_NHASH(ix);
113loop:
114 LIST_FOREACH(fd, fc, fd_hash) {
115 if (fd->fd_ix == ix && fd->fd_vnode->v_mount == mp) {
87de5057 116 if (vget(fd->fd_vnode, LK_EXCLUSIVE|LK_SLEEPFAIL))
984263bc
MD
117 goto loop;
118 *vpp = fd->fd_vnode;
119 return (error);
120 }
121 }
122
123 /*
124 * otherwise lock the array while we call getnewvnode
125 * since that can block.
126 */
127 if (fdcache_lock & FDL_LOCKED) {
128 fdcache_lock |= FDL_WANT;
b1ce5639 129 tsleep((caddr_t) &fdcache_lock, 0, "fdalvp", 0);
984263bc
MD
130 goto loop;
131 }
132 fdcache_lock |= FDL_LOCKED;
133
134 /*
135 * Do the MALLOC before the getnewvnode since doing so afterward
136 * might cause a bogus v_data pointer to get dereferenced
137 * elsewhere if MALLOC should block.
138 */
139 MALLOC(fd, struct fdescnode *, sizeof(struct fdescnode), M_TEMP, M_WAITOK);
140
6ddb7618 141 error = getnewvnode(VT_FDESC, mp, vpp, 0, 0);
984263bc
MD
142 if (error) {
143 FREE(fd, M_TEMP);
144 goto out;
145 }
146 (*vpp)->v_data = fd;
147 fd->fd_vnode = *vpp;
148 fd->fd_type = ftype;
149 fd->fd_fd = -1;
150 fd->fd_ix = ix;
151 LIST_INSERT_HEAD(fc, fd, fd_hash);
5fd012e0 152 vx_unlock(*vpp);
984263bc
MD
153
154out:
155 fdcache_lock &= ~FDL_LOCKED;
156
157 if (fdcache_lock & FDL_WANT) {
158 fdcache_lock &= ~FDL_WANT;
159 wakeup((caddr_t) &fdcache_lock);
160 }
161
162 return (error);
163}
164
165/*
166 * vp is the current namei directory
167 * ndp is the name to locate in that directory...
130da09f
CP
168 *
169 * fdesc_lookup(struct vnode *a_dvp, struct vnode **a_vpp,
170 * struct componentname *a_cnp)
984263bc
MD
171 */
172static int
e62afb5f 173fdesc_lookup(struct vop_old_lookup_args *ap)
984263bc 174{
dadab5e9
MD
175 struct componentname *cnp = ap->a_cnp;
176 struct thread *td = cnp->cn_td;
177 struct proc *p = td->td_proc;
984263bc
MD
178 struct vnode **vpp = ap->a_vpp;
179 struct vnode *dvp = ap->a_dvp;
984263bc 180 char *pname = cnp->cn_nameptr;
984263bc 181 int nlen = cnp->cn_namelen;
dadab5e9 182 int nfiles;
984263bc
MD
183 u_int fd;
184 int error;
185 struct vnode *fvp;
186
dadab5e9
MD
187 KKASSERT(p);
188 nfiles = p->p_fd->fd_nfiles;
2b69e610 189 if (cnp->cn_nameiop == NAMEI_DELETE || cnp->cn_nameiop == NAMEI_RENAME) {
984263bc
MD
190 error = EROFS;
191 goto bad;
192 }
193
a11aaa81 194 vn_unlock(dvp);
984263bc
MD
195 if (cnp->cn_namelen == 1 && *pname == '.') {
196 *vpp = dvp;
597aea93 197 vref(dvp);
ca466bae 198 vn_lock(dvp, LK_SHARED | LK_RETRY);
984263bc
MD
199 return (0);
200 }
201
202 if (VTOFDESC(dvp)->fd_type != Froot) {
203 error = ENOTDIR;
204 goto bad;
205 }
206
207 fd = 0;
208 /* the only time a leading 0 is acceptable is if it's "0" */
209 if (*pname == '0' && nlen != 1) {
210 error = ENOENT;
211 goto bad;
212 }
213 while (nlen--) {
214 if (*pname < '0' || *pname > '9') {
215 error = ENOENT;
216 goto bad;
217 }
218 fd = 10 * fd + *pname++ - '0';
219 }
220
0679adc4 221 if (fd >= nfiles || p->p_fd->fd_files[fd].fp == NULL) {
984263bc
MD
222 error = EBADF;
223 goto bad;
224 }
225
acde96db 226 error = fdesc_allocvp(Fdesc, FD_DESC+fd, dvp->v_mount, &fvp);
984263bc
MD
227 if (error)
228 goto bad;
229 VTOFDESC(fvp)->fd_fd = fd;
ca466bae 230 vn_lock(fvp, LK_SHARED | LK_RETRY);
984263bc
MD
231 *vpp = fvp;
232 return (0);
233
234bad:
ca466bae 235 vn_lock(dvp, LK_SHARED | LK_RETRY);
984263bc
MD
236 *vpp = NULL;
237 return (error);
238}
239
130da09f 240/*
87de5057 241 * fdesc_open(struct vnode *a_vp, int a_mode, struct ucred *a_cred)
130da09f 242 */
984263bc 243static int
130da09f 244fdesc_open(struct vop_open_args *ap)
984263bc
MD
245{
246 struct vnode *vp = ap->a_vp;
87de5057 247 struct lwp *lp = curthread->td_lwp;
dadab5e9 248
fbfe4e7d 249 KKASSERT(lp);
984263bc
MD
250
251 if (VTOFDESC(vp)->fd_type == Froot)
8ddc6004 252 return (vop_stdopen(ap));
984263bc
MD
253
254 /*
fbfe4e7d 255 * XXX Kludge: set lp->lwp_dupfd to contain the value of the the file
984263bc
MD
256 * descriptor being sought for duplication. The error return ensures
257 * that the vnode for this device will be released by vn_open. Open
258 * will detect this special error and take the actions in dupfdopen.
259 * Other callers of vn_open or VOP_OPEN will simply report the
260 * error.
261 */
fbfe4e7d 262 lp->lwp_dupfd = VTOFDESC(vp)->fd_fd; /* XXX */
984263bc
MD
263 return (ENODEV);
264}
265
130da09f 266/*
87de5057 267 * fdesc_getattr(struct vnode *a_vp, struct vattr *a_vap, struct ucred *a_cred)
130da09f 268 */
984263bc 269static int
130da09f 270fdesc_getattr(struct vop_getattr_args *ap)
984263bc 271{
87de5057 272 struct proc *p = curproc;
984263bc
MD
273 struct vnode *vp = ap->a_vp;
274 struct vattr *vap = ap->a_vap;
984263bc
MD
275 struct file *fp;
276 struct stat stb;
277 u_int fd;
278 int error = 0;
279
dadab5e9 280 KKASSERT(p);
228b401d 281
984263bc
MD
282 switch (VTOFDESC(vp)->fd_type) {
283 case Froot:
284 VATTR_NULL(vap);
285
286 vap->va_mode = S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH;
287 vap->va_type = VDIR;
288 vap->va_nlink = 2;
289 vap->va_size = DEV_BSIZE;
290 vap->va_fileid = VTOFDESC(vp)->fd_ix;
291 vap->va_uid = 0;
292 vap->va_gid = 0;
293 vap->va_blocksize = DEV_BSIZE;
294 vap->va_atime.tv_sec = boottime.tv_sec;
295 vap->va_atime.tv_nsec = 0;
296 vap->va_mtime = vap->va_atime;
297 vap->va_ctime = vap->va_mtime;
298 vap->va_gen = 0;
299 vap->va_flags = 0;
0e9b9130
MD
300 vap->va_rmajor = VNOVAL;
301 vap->va_rminor = VNOVAL;
984263bc
MD
302 vap->va_bytes = 0;
303 break;
304
305 case Fdesc:
306 fd = VTOFDESC(vp)->fd_fd;
307
228b401d
MD
308 fp = holdfp(p->p_fd, fd, -1);
309 if (fp == NULL)
984263bc
MD
310 return (EBADF);
311
312 bzero(&stb, sizeof(stb));
87de5057 313 error = fo_stat(fp, &stb, curproc->p_ucred);
228b401d
MD
314 fdrop(fp);
315
984263bc
MD
316 if (error == 0) {
317 VATTR_NULL(vap);
318 vap->va_type = IFTOVT(stb.st_mode);
319 vap->va_mode = stb.st_mode;
320#define FDRX (VREAD|VEXEC)
321 if (vap->va_type == VDIR)
322 vap->va_mode &= ~((FDRX)|(FDRX>>3)|(FDRX>>6));
323#undef FDRX
324 vap->va_nlink = 1;
325 vap->va_flags = 0;
326 vap->va_bytes = stb.st_blocks * stb.st_blksize;
327 vap->va_fileid = VTOFDESC(vp)->fd_ix;
328 vap->va_size = stb.st_size;
329 vap->va_blocksize = stb.st_blksize;
0e9b9130
MD
330 vap->va_rmajor = umajor(stb.st_rdev);
331 vap->va_rminor = uminor(stb.st_rdev);
984263bc
MD
332
333 /*
334 * If no time data is provided, use the current time.
335 */
336 if (stb.st_atimespec.tv_sec == 0 &&
337 stb.st_atimespec.tv_nsec == 0)
338 nanotime(&stb.st_atimespec);
339
340 if (stb.st_ctimespec.tv_sec == 0 &&
341 stb.st_ctimespec.tv_nsec == 0)
342 nanotime(&stb.st_ctimespec);
343
344 if (stb.st_mtimespec.tv_sec == 0 &&
345 stb.st_mtimespec.tv_nsec == 0)
346 nanotime(&stb.st_mtimespec);
347
348 vap->va_atime = stb.st_atimespec;
349 vap->va_mtime = stb.st_mtimespec;
350 vap->va_ctime = stb.st_ctimespec;
351 vap->va_uid = stb.st_uid;
352 vap->va_gid = stb.st_gid;
353 }
354 break;
355
356 default:
357 panic("fdesc_getattr");
358 break;
359 }
360
361 if (error == 0)
362 vp->v_type = vap->va_type;
363 return (error);
364}
365
130da09f
CP
366/*
367 * fdesc_setattr(struct vnode *a_vp, struct vattr *a_vap,
368 * struct ucred *a_cred, struct thread *a_td)
369 */
984263bc 370static int
130da09f 371fdesc_setattr(struct vop_setattr_args *ap)
984263bc 372{
87de5057 373 struct proc *p = curproc;
984263bc
MD
374 struct vattr *vap = ap->a_vap;
375 struct file *fp;
376 unsigned fd;
377 int error;
378
379 /*
380 * Can't mess with the root vnode
381 */
382 if (VTOFDESC(ap->a_vp)->fd_type == Froot)
383 return (EACCES);
384
385 fd = VTOFDESC(ap->a_vp)->fd_fd;
dadab5e9 386 KKASSERT(p);
984263bc
MD
387
388 /*
389 * Allow setattr where there is an underlying vnode.
390 */
5b287bba 391 error = holdvnode(p->p_fd, fd, &fp);
984263bc
MD
392 if (error) {
393 /*
5b287bba 394 * holdvnode() returns EINVAL if the file descriptor is not
984263bc
MD
395 * backed by a vnode. Silently drop all changes except
396 * chflags(2) in this case.
397 */
398 if (error == EINVAL) {
399 if (vap->va_flags != VNOVAL)
400 error = EOPNOTSUPP;
401 else
402 error = 0;
403 }
5b287bba
MD
404 } else {
405 fdrop(fp);
984263bc
MD
406 }
407 return (error);
408}
409
410#define UIO_MX 16
411
130da09f
CP
412/*
413 * fdesc_readdir(struct vnode *a_vp, struct uio *a_uio, struct ucred *a_cred,
414 * int *a_eofflag, u_long *a_cookies, int a_ncookies)
415 */
984263bc 416static int
130da09f 417fdesc_readdir(struct vop_readdir_args *ap)
984263bc
MD
418{
419 struct uio *uio = ap->a_uio;
420 struct filedesc *fdp;
709f67da
JS
421 int error, i, fcnt;
422 size_t namelen;
423 char name[20]; /* enough for %d */
984263bc
MD
424
425 /*
426 * We don't allow exporting fdesc mounts, and currently local
427 * requests do not need cookies.
428 */
429 if (ap->a_ncookies)
430 panic("fdesc_readdir: not hungry");
431
432 if (VTOFDESC(ap->a_vp)->fd_type != Froot)
433 panic("fdesc_readdir: not dir");
434
709f67da
JS
435 if (uio->uio_offset < 0 || uio->uio_offset > INT_MAX ||
436 uio->uio_resid < 0)
437 return(EINVAL);
438 i = uio->uio_offset;
dadab5e9
MD
439 KKASSERT(uio->uio_td->td_proc);
440 fdp = uio->uio_td->td_proc->p_fd;
984263bc
MD
441 error = 0;
442
443 fcnt = i - 2; /* The first two nodes are `.' and `..' */
444
709f67da 445 while (fcnt < fdp->fd_nfiles && uio->uio_resid > 0 && !error) {
984263bc
MD
446 switch (i) {
447 case 0: /* `.' */
709f67da
JS
448 if (vop_write_dirent(&error, uio, FD_ROOT + i, DT_DIR,
449 1, "."))
450 goto done;
451 if (error)
452 return (error);
453 break;
984263bc 454 case 1: /* `..' */
709f67da
JS
455 if (vop_write_dirent(&error, uio, FD_ROOT + i, DT_DIR,
456 2, ".."))
457 goto done;
458 if (error)
459 return (error);
984263bc
MD
460 break;
461 default:
709f67da
JS
462 if (fdp->fd_files[fcnt].fp == NULL) {
463 fcnt++;
464 continue;
465 }
466
f8c7a42d 467 namelen = ksnprintf(name, sizeof(name), "%d", fcnt);
709f67da
JS
468 if (vop_write_dirent(&error, uio, FD_ROOT + i,
469 DT_UNKNOWN, namelen, name))
984263bc 470 goto done;
709f67da
JS
471 if (error)
472 return (error);
984263bc
MD
473 break;
474 }
984263bc
MD
475 i++;
476 fcnt++;
477 }
478
479done:
709f67da
JS
480 if (i >= 2)
481 uio->uio_offset = fcnt + 2;
482 else
483 uio->uio_offset = i;
984263bc
MD
484 return (error);
485}
486
130da09f
CP
487/*
488 * fdesc_poll(struct vnode *a_vp, int a_events, struct ucred *a_cred,
489 * struct thread *a_td)
490 */
984263bc 491static int
130da09f 492fdesc_poll(struct vop_poll_args *ap)
984263bc 493{
fef8985e 494 return seltrue(0, ap->a_events);
984263bc
MD
495}
496
130da09f
CP
497/*
498 * fdesc_inactive(struct vnode *a_vp, struct thread *a_td)
499 */
984263bc 500static int
130da09f 501fdesc_inactive(struct vop_inactive_args *ap)
984263bc
MD
502{
503 struct vnode *vp = ap->a_vp;
504
505 /*
506 * Clear out the v_type field to avoid
507 * nasty things happening in vgone().
508 */
984263bc
MD
509 vp->v_type = VNON;
510 return (0);
511}
512
130da09f
CP
513/*
514 * fdesc_reclaim(struct vnode *a_vp)
515 */
984263bc 516static int
130da09f 517fdesc_reclaim(struct vop_reclaim_args *ap)
984263bc
MD
518{
519 struct vnode *vp = ap->a_vp;
520 struct fdescnode *fd = VTOFDESC(vp);
521
522 LIST_REMOVE(fd, fd_hash);
523 FREE(vp->v_data, M_TEMP);
524 vp->v_data = 0;
525
526 return (0);
527}
528
529/*
530 * Print out the contents of a /dev/fd vnode.
130da09f
CP
531 *
532 * fdesc_print(struct vnode *a_vp)
984263bc
MD
533 */
534/* ARGSUSED */
535static int
130da09f 536fdesc_print(struct vop_print_args *ap)
984263bc 537{
086c1d7e 538 kprintf("tag VT_NON, fdesc vnode\n");
984263bc
MD
539 return (0);
540}
541
66a1ddf5
MD
542struct vop_ops fdesc_vnode_vops = {
543 .vop_default = vop_defaultop,
544 .vop_access = (void *)vop_null,
545 .vop_getattr = fdesc_getattr,
546 .vop_inactive = fdesc_inactive,
547 .vop_old_lookup = fdesc_lookup,
548 .vop_open = fdesc_open,
549 .vop_pathconf = vop_stdpathconf,
550 .vop_poll = fdesc_poll,
551 .vop_print = fdesc_print,
552 .vop_readdir = fdesc_readdir,
553 .vop_reclaim = fdesc_reclaim,
554 .vop_setattr = fdesc_setattr
984263bc 555};
984263bc 556