2010-08-21 17:19:39 +04:00
|
|
|
/* $NetBSD: spec_vnops.c,v 1.131 2010/08/21 13:19:40 pgoyette Exp $ */
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
/*-
|
|
|
|
* Copyright (c) 2008 The NetBSD Foundation, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-06-08 15:33:09 +04:00
|
|
|
* Copyright (c) 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1993-03-21 12:45:37 +03:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1998-03-01 05:20:01 +03:00
|
|
|
* @(#)spec_vnops.c 8.15 (Berkeley) 7/14/95
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
2001-11-10 16:33:40 +03:00
|
|
|
#include <sys/cdefs.h>
|
2010-08-21 17:19:39 +04:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.131 2010/08/21 13:19:40 pgoyette Exp $");
|
2001-11-10 16:33:40 +03:00
|
|
|
|
1993-12-18 06:59:02 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/conf.h>
|
|
|
|
#include <sys/buf.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/namei.h>
|
|
|
|
#include <sys/vnode.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/ioctl.h>
|
2005-06-21 18:01:11 +04:00
|
|
|
#include <sys/poll.h>
|
1993-12-18 06:59:02 +03:00
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/disklabel.h>
|
1997-04-02 21:09:47 +04:00
|
|
|
#include <sys/lockf.h>
|
2003-11-06 11:58:04 +03:00
|
|
|
#include <sys/tty.h>
|
2006-05-15 01:31:52 +04:00
|
|
|
#include <sys/kauth.h>
|
2007-10-07 17:38:53 +04:00
|
|
|
#include <sys/fstrans.h>
|
2009-02-02 17:00:27 +03:00
|
|
|
#include <sys/module.h>
|
1996-02-10 01:39:56 +03:00
|
|
|
|
1996-09-02 03:47:48 +04:00
|
|
|
#include <miscfs/genfs/genfs.h>
|
1994-06-08 15:33:09 +04:00
|
|
|
#include <miscfs/specfs/specdev.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/* symbolic sleep message strings for devices */
|
1997-10-09 16:59:50 +04:00
|
|
|
const char devopn[] = "devopn";
|
|
|
|
const char devio[] = "devio";
|
|
|
|
const char devwait[] = "devwait";
|
|
|
|
const char devin[] = "devin";
|
|
|
|
const char devout[] = "devout";
|
|
|
|
const char devioc[] = "devioc";
|
|
|
|
const char devcls[] = "devcls";
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
vnode_t *specfs_hash[SPECHSZ];
|
2002-05-13 00:42:03 +04:00
|
|
|
|
1999-12-08 21:57:07 +03:00
|
|
|
/*
|
2008-01-24 20:32:52 +03:00
|
|
|
* This vnode operations vector is used for special device nodes
|
|
|
|
* created from whole cloth by the kernel. For the ops vector for
|
|
|
|
* vnodes built from special devices found in a filesystem, see (e.g)
|
|
|
|
* ffs_specop_entries[] in ffs_vnops.c or the equivalent for other
|
|
|
|
* filesystems.
|
1999-12-08 21:57:07 +03:00
|
|
|
*/
|
|
|
|
|
2005-08-31 00:08:01 +04:00
|
|
|
int (**spec_vnodeop_p)(void *);
|
2001-01-22 15:17:35 +03:00
|
|
|
const struct vnodeopv_entry_desc spec_vnodeop_entries[] = {
|
1994-06-08 15:33:09 +04:00
|
|
|
{ &vop_default_desc, vn_default_error },
|
|
|
|
{ &vop_lookup_desc, spec_lookup }, /* lookup */
|
|
|
|
{ &vop_create_desc, spec_create }, /* create */
|
|
|
|
{ &vop_mknod_desc, spec_mknod }, /* mknod */
|
|
|
|
{ &vop_open_desc, spec_open }, /* open */
|
|
|
|
{ &vop_close_desc, spec_close }, /* close */
|
|
|
|
{ &vop_access_desc, spec_access }, /* access */
|
|
|
|
{ &vop_getattr_desc, spec_getattr }, /* getattr */
|
|
|
|
{ &vop_setattr_desc, spec_setattr }, /* setattr */
|
|
|
|
{ &vop_read_desc, spec_read }, /* read */
|
|
|
|
{ &vop_write_desc, spec_write }, /* write */
|
1999-12-08 22:16:51 +03:00
|
|
|
{ &vop_fcntl_desc, spec_fcntl }, /* fcntl */
|
1994-06-08 15:33:09 +04:00
|
|
|
{ &vop_ioctl_desc, spec_ioctl }, /* ioctl */
|
1996-09-07 16:40:22 +04:00
|
|
|
{ &vop_poll_desc, spec_poll }, /* poll */
|
2002-10-23 13:10:23 +04:00
|
|
|
{ &vop_kqfilter_desc, spec_kqfilter }, /* kqfilter */
|
1998-03-01 05:20:01 +03:00
|
|
|
{ &vop_revoke_desc, spec_revoke }, /* revoke */
|
1994-06-08 15:33:09 +04:00
|
|
|
{ &vop_mmap_desc, spec_mmap }, /* mmap */
|
|
|
|
{ &vop_fsync_desc, spec_fsync }, /* fsync */
|
|
|
|
{ &vop_seek_desc, spec_seek }, /* seek */
|
|
|
|
{ &vop_remove_desc, spec_remove }, /* remove */
|
|
|
|
{ &vop_link_desc, spec_link }, /* link */
|
|
|
|
{ &vop_rename_desc, spec_rename }, /* rename */
|
|
|
|
{ &vop_mkdir_desc, spec_mkdir }, /* mkdir */
|
|
|
|
{ &vop_rmdir_desc, spec_rmdir }, /* rmdir */
|
|
|
|
{ &vop_symlink_desc, spec_symlink }, /* symlink */
|
|
|
|
{ &vop_readdir_desc, spec_readdir }, /* readdir */
|
|
|
|
{ &vop_readlink_desc, spec_readlink }, /* readlink */
|
|
|
|
{ &vop_abortop_desc, spec_abortop }, /* abortop */
|
|
|
|
{ &vop_inactive_desc, spec_inactive }, /* inactive */
|
|
|
|
{ &vop_reclaim_desc, spec_reclaim }, /* reclaim */
|
|
|
|
{ &vop_lock_desc, spec_lock }, /* lock */
|
|
|
|
{ &vop_unlock_desc, spec_unlock }, /* unlock */
|
|
|
|
{ &vop_bmap_desc, spec_bmap }, /* bmap */
|
|
|
|
{ &vop_strategy_desc, spec_strategy }, /* strategy */
|
|
|
|
{ &vop_print_desc, spec_print }, /* print */
|
|
|
|
{ &vop_islocked_desc, spec_islocked }, /* islocked */
|
|
|
|
{ &vop_pathconf_desc, spec_pathconf }, /* pathconf */
|
|
|
|
{ &vop_advlock_desc, spec_advlock }, /* advlock */
|
1996-02-10 01:39:56 +03:00
|
|
|
{ &vop_bwrite_desc, spec_bwrite }, /* bwrite */
|
2001-08-17 09:51:53 +04:00
|
|
|
{ &vop_getpages_desc, spec_getpages }, /* getpages */
|
|
|
|
{ &vop_putpages_desc, spec_putpages }, /* putpages */
|
|
|
|
{ NULL, NULL }
|
1993-03-21 12:45:37 +03:00
|
|
|
};
|
2001-01-22 15:17:35 +03:00
|
|
|
const struct vnodeopv_desc spec_vnodeop_opv_desc =
|
1994-06-08 15:33:09 +04:00
|
|
|
{ &spec_vnodeop_p, spec_vnodeop_entries };
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2009-11-14 21:36:56 +03:00
|
|
|
static kauth_listener_t rawio_listener;
|
|
|
|
|
2009-10-06 08:28:10 +04:00
|
|
|
/* Returns true if vnode is /dev/mem or /dev/kmem. */
|
|
|
|
bool
|
|
|
|
iskmemvp(struct vnode *vp)
|
|
|
|
{
|
|
|
|
return ((vp->v_type == VCHR) && iskmemdev(vp->v_rdev));
|
|
|
|
}
|
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
/*
|
|
|
|
* Returns true if dev is /dev/mem or /dev/kmem.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
iskmemdev(dev_t dev)
|
|
|
|
{
|
|
|
|
/* mem_no is emitted by config(8) to generated devsw.c */
|
|
|
|
extern const int mem_no;
|
|
|
|
|
|
|
|
/* minor 14 is /dev/io on i386 with COMPAT_10 */
|
|
|
|
return (major(dev) == mem_no && (minor(dev) < 2 || minor(dev) == 14));
|
|
|
|
}
|
|
|
|
|
2009-11-14 21:36:56 +03:00
|
|
|
static int
|
|
|
|
rawio_listener_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
|
|
|
|
void *arg0, void *arg1, void *arg2, void *arg3)
|
|
|
|
{
|
|
|
|
int result;
|
|
|
|
|
|
|
|
result = KAUTH_RESULT_DEFER;
|
|
|
|
|
|
|
|
if ((action != KAUTH_DEVICE_RAWIO_SPEC) &&
|
|
|
|
(action != KAUTH_DEVICE_RAWIO_PASSTHRU))
|
|
|
|
return result;
|
|
|
|
|
|
|
|
/* Access is mandated by permissions. */
|
|
|
|
result = KAUTH_RESULT_ALLOW;
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
spec_init(void)
|
|
|
|
{
|
|
|
|
|
|
|
|
rawio_listener = kauth_listen_scope(KAUTH_SCOPE_DEVICE,
|
|
|
|
rawio_listener_cb, NULL);
|
|
|
|
}
|
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
/*
|
|
|
|
* Initialize a vnode that represents a device.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
spec_node_init(vnode_t *vp, dev_t rdev)
|
|
|
|
{
|
|
|
|
specnode_t *sn;
|
|
|
|
specdev_t *sd;
|
|
|
|
vnode_t *vp2;
|
|
|
|
vnode_t **vpp;
|
|
|
|
|
|
|
|
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
|
|
|
|
KASSERT(vp->v_specnode == NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Search the hash table for this device. If known, add a
|
|
|
|
* reference to the device structure. If not known, create
|
|
|
|
* a new entry to represent the device. In all cases add
|
|
|
|
* the vnode to the hash table.
|
|
|
|
*/
|
|
|
|
sn = kmem_alloc(sizeof(*sn), KM_SLEEP);
|
|
|
|
if (sn == NULL) {
|
|
|
|
/* XXX */
|
|
|
|
panic("spec_node_init: unable to allocate memory");
|
|
|
|
}
|
|
|
|
sd = kmem_alloc(sizeof(*sd), KM_SLEEP);
|
|
|
|
if (sd == NULL) {
|
|
|
|
/* XXX */
|
|
|
|
panic("spec_node_init: unable to allocate memory");
|
|
|
|
}
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
vpp = &specfs_hash[SPECHASH(rdev)];
|
|
|
|
for (vp2 = *vpp; vp2 != NULL; vp2 = vp2->v_specnext) {
|
|
|
|
KASSERT(vp2->v_specnode != NULL);
|
|
|
|
if (rdev == vp2->v_rdev && vp->v_type == vp2->v_type) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (vp2 == NULL) {
|
|
|
|
/* No existing record, create a new one. */
|
|
|
|
sd->sd_rdev = rdev;
|
|
|
|
sd->sd_mountpoint = NULL;
|
|
|
|
sd->sd_lockf = NULL;
|
|
|
|
sd->sd_refcnt = 1;
|
|
|
|
sd->sd_opencnt = 0;
|
|
|
|
sd->sd_bdevvp = NULL;
|
|
|
|
sn->sn_dev = sd;
|
|
|
|
sd = NULL;
|
|
|
|
} else {
|
|
|
|
/* Use the existing record. */
|
|
|
|
sn->sn_dev = vp2->v_specnode->sn_dev;
|
|
|
|
sn->sn_dev->sd_refcnt++;
|
|
|
|
}
|
|
|
|
/* Insert vnode into the hash chain. */
|
|
|
|
sn->sn_opencnt = 0;
|
|
|
|
sn->sn_rdev = rdev;
|
|
|
|
sn->sn_gone = false;
|
|
|
|
vp->v_specnode = sn;
|
|
|
|
vp->v_specnext = *vpp;
|
|
|
|
*vpp = vp;
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
/* Free the record we allocated if unused. */
|
|
|
|
if (sd != NULL) {
|
|
|
|
kmem_free(sd, sizeof(*sd));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A vnode representing a special device is going away. Close
|
|
|
|
* the device if the vnode holds it open.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
spec_node_revoke(vnode_t *vp)
|
|
|
|
{
|
|
|
|
specnode_t *sn;
|
|
|
|
specdev_t *sd;
|
|
|
|
|
|
|
|
sn = vp->v_specnode;
|
|
|
|
sd = sn->sn_dev;
|
|
|
|
|
|
|
|
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
|
|
|
|
KASSERT(vp->v_specnode != NULL);
|
|
|
|
KASSERT((vp->v_iflag & VI_XLOCK) != 0);
|
|
|
|
KASSERT(sn->sn_gone == false);
|
|
|
|
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(sn->sn_opencnt <= sd->sd_opencnt);
|
|
|
|
if (sn->sn_opencnt != 0) {
|
|
|
|
sd->sd_opencnt -= (sn->sn_opencnt - 1);
|
|
|
|
sn->sn_opencnt = 1;
|
|
|
|
sn->sn_gone = true;
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
VOP_CLOSE(vp, FNONBLOCK, NOCRED);
|
|
|
|
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(sn->sn_opencnt == 0);
|
|
|
|
}
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A vnode representing a special device is being recycled.
|
|
|
|
* Destroy the specfs component.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
spec_node_destroy(vnode_t *vp)
|
|
|
|
{
|
|
|
|
specnode_t *sn;
|
|
|
|
specdev_t *sd;
|
|
|
|
vnode_t **vpp, *vp2;
|
|
|
|
int refcnt;
|
|
|
|
|
|
|
|
sn = vp->v_specnode;
|
|
|
|
sd = sn->sn_dev;
|
|
|
|
|
|
|
|
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
|
|
|
|
KASSERT(vp->v_specnode != NULL);
|
|
|
|
KASSERT(sn->sn_opencnt == 0);
|
|
|
|
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
/* Remove from the hash and destroy the node. */
|
|
|
|
vpp = &specfs_hash[SPECHASH(vp->v_rdev)];
|
|
|
|
for (vp2 = *vpp;; vp2 = vp2->v_specnext) {
|
|
|
|
if (vp2 == NULL) {
|
|
|
|
panic("spec_node_destroy: corrupt hash");
|
|
|
|
}
|
|
|
|
if (vp2 == vp) {
|
|
|
|
KASSERT(vp == *vpp);
|
|
|
|
*vpp = vp->v_specnext;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (vp2->v_specnext == vp) {
|
|
|
|
vp2->v_specnext = vp->v_specnext;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sn = vp->v_specnode;
|
|
|
|
vp->v_specnode = NULL;
|
|
|
|
refcnt = sd->sd_refcnt--;
|
|
|
|
KASSERT(refcnt > 0);
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
/* If the device is no longer in use, destroy our record. */
|
|
|
|
if (refcnt == 1) {
|
|
|
|
KASSERT(sd->sd_opencnt == 0);
|
|
|
|
KASSERT(sd->sd_bdevvp == NULL);
|
|
|
|
kmem_free(sd, sizeof(*sd));
|
|
|
|
}
|
|
|
|
kmem_free(sn, sizeof(*sn));
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Trivial lookup routine that always fails.
|
|
|
|
*/
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_lookup(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_lookup_args /* {
|
|
|
|
struct vnode *a_dvp;
|
|
|
|
struct vnode **a_vpp;
|
|
|
|
struct componentname *a_cnp;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1994-06-08 15:33:09 +04:00
|
|
|
*ap->a_vpp = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (ENOTDIR);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1994-06-08 15:33:09 +04:00
|
|
|
* Open a special file.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_open(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_open_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
int a_mode;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2008-01-24 20:32:52 +03:00
|
|
|
struct lwp *l;
|
|
|
|
struct vnode *vp;
|
|
|
|
dev_t dev;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error;
|
2001-08-17 09:51:53 +04:00
|
|
|
struct partinfo pi;
|
2006-11-04 12:30:00 +03:00
|
|
|
enum kauth_device_req req;
|
2008-01-24 20:32:52 +03:00
|
|
|
specnode_t *sn;
|
|
|
|
specdev_t *sd;
|
|
|
|
|
2009-02-02 17:00:27 +03:00
|
|
|
u_int gen;
|
|
|
|
const char *name;
|
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
l = curlwp;
|
|
|
|
vp = ap->a_vp;
|
|
|
|
dev = vp->v_rdev;
|
|
|
|
sn = vp->v_specnode;
|
|
|
|
sd = sn->sn_dev;
|
2009-02-02 17:00:27 +03:00
|
|
|
name = NULL;
|
|
|
|
gen = 0;
|
|
|
|
|
1994-06-08 15:33:09 +04:00
|
|
|
/*
|
|
|
|
* Don't allow open if fs is mounted -nodev.
|
|
|
|
*/
|
1993-03-21 12:45:37 +03:00
|
|
|
if (vp->v_mount && (vp->v_mount->mnt_flag & MNT_NODEV))
|
|
|
|
return (ENXIO);
|
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
switch (ap->a_mode & (FREAD | FWRITE)) {
|
|
|
|
case FREAD | FWRITE:
|
|
|
|
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_RW;
|
|
|
|
break;
|
|
|
|
case FWRITE:
|
|
|
|
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_WRITE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_READ;
|
|
|
|
break;
|
|
|
|
}
|
First take at security model abstraction.
- Add a few scopes to the kernel: system, network, and machdep.
- Add a few more actions/sub-actions (requests), and start using them as
opposed to the KAUTH_GENERIC_ISSUSER place-holders.
- Introduce a basic set of listeners that implement our "traditional"
security model, called "bsd44". This is the default (and only) model we
have at the moment.
- Update all relevant documentation.
- Add some code and docs to help folks who want to actually use this stuff:
* There's a sample overlay model, sitting on-top of "bsd44", for
fast experimenting with tweaking just a subset of an existing model.
This is pretty cool because it's *really* straightforward to do stuff
you had to use ugly hacks for until now...
* And of course, documentation describing how to do the above for quick
reference, including code samples.
All of these changes were tested for regressions using a Python-based
testsuite that will be (I hope) available soon via pkgsrc. Information
about the tests, and how to write new ones, can be found on:
http://kauth.linbsd.org/kauthwiki
NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the
following:
- Uses a KAUTH_GENERIC_ISSUSER kauth(9) request,
- Checks 'securelevel' directly,
- Checks a uid/gid directly.
(or if you feel you have to, contact me first)
This is still work in progress; It's far from being done, but now it'll
be a lot easier.
Relevant mailing list threads:
http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html
http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html
http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html
http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html
Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help
stablizing kauth(9).
Full credit for the regression tests, making sure these changes didn't break
anything, goes to Matt Fleming and Jaime Fournier.
Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (vp->v_type) {
|
|
|
|
case VCHR:
|
2006-11-04 12:30:00 +03:00
|
|
|
error = kauth_authorize_device_spec(ap->a_cred, req, vp);
|
2008-01-24 20:32:52 +03:00
|
|
|
if (error != 0)
|
2006-11-04 12:30:00 +03:00
|
|
|
return (error);
|
First take at security model abstraction.
- Add a few scopes to the kernel: system, network, and machdep.
- Add a few more actions/sub-actions (requests), and start using them as
opposed to the KAUTH_GENERIC_ISSUSER place-holders.
- Introduce a basic set of listeners that implement our "traditional"
security model, called "bsd44". This is the default (and only) model we
have at the moment.
- Update all relevant documentation.
- Add some code and docs to help folks who want to actually use this stuff:
* There's a sample overlay model, sitting on-top of "bsd44", for
fast experimenting with tweaking just a subset of an existing model.
This is pretty cool because it's *really* straightforward to do stuff
you had to use ugly hacks for until now...
* And of course, documentation describing how to do the above for quick
reference, including code samples.
All of these changes were tested for regressions using a Python-based
testsuite that will be (I hope) available soon via pkgsrc. Information
about the tests, and how to write new ones, can be found on:
http://kauth.linbsd.org/kauthwiki
NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the
following:
- Uses a KAUTH_GENERIC_ISSUSER kauth(9) request,
- Checks 'securelevel' directly,
- Checks a uid/gid directly.
(or if you feel you have to, contact me first)
This is still work in progress; It's far from being done, but now it'll
be a lot easier.
Relevant mailing list threads:
http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html
http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html
http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html
http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html
Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help
stablizing kauth(9).
Full credit for the regression tests, making sure these changes didn't break
anything, goes to Matt Fleming and Jaime Fournier.
Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
/*
|
|
|
|
* Character devices can accept opens from multiple
|
|
|
|
* vnodes.
|
|
|
|
*/
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
if (sn->sn_gone) {
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
return (EBADF);
|
|
|
|
}
|
|
|
|
sd->sd_opencnt++;
|
|
|
|
sn->sn_opencnt++;
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2007-07-10 00:51:58 +04:00
|
|
|
if (cdev_type(dev) == D_TTY)
|
2007-10-11 00:42:20 +04:00
|
|
|
vp->v_vflag |= VV_ISTTY;
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2009-02-02 17:00:27 +03:00
|
|
|
do {
|
2009-10-04 10:23:58 +04:00
|
|
|
const struct cdevsw *cdev;
|
|
|
|
|
2009-02-02 17:00:27 +03:00
|
|
|
gen = module_gen;
|
|
|
|
error = cdev_open(dev, ap->a_mode, S_IFCHR, l);
|
|
|
|
if (error != ENXIO)
|
|
|
|
break;
|
|
|
|
|
2009-10-04 10:23:58 +04:00
|
|
|
/* Check if we already have a valid driver */
|
|
|
|
mutex_enter(&device_lock);
|
|
|
|
cdev = cdevsw_lookup(dev);
|
|
|
|
mutex_exit(&device_lock);
|
|
|
|
if (cdev != NULL)
|
|
|
|
break;
|
|
|
|
|
2009-02-02 17:00:27 +03:00
|
|
|
/* Get device name from devsw_conv array */
|
|
|
|
if ((name = cdevsw_getname(major(dev))) == NULL)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Try to autoload device module */
|
2010-04-13 15:54:43 +04:00
|
|
|
(void) module_autoload(name, MODULE_CLASS_DRIVER);
|
2009-02-02 17:00:27 +03:00
|
|
|
} while (gen != module_gen);
|
|
|
|
|
1998-03-01 05:20:01 +03:00
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
2003-10-15 12:41:26 +04:00
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case VBLK:
|
2006-11-04 12:30:00 +03:00
|
|
|
error = kauth_authorize_device_spec(ap->a_cred, req, vp);
|
2008-01-24 20:32:52 +03:00
|
|
|
if (error != 0)
|
2006-11-04 12:30:00 +03:00
|
|
|
return (error);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* For block devices, permit only one open. The buffer
|
|
|
|
* cache cannot remain self-consistent with multiple
|
|
|
|
* vnodes holding a block device open.
|
|
|
|
*/
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
if (sn->sn_gone) {
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
return (EBADF);
|
|
|
|
}
|
|
|
|
if (sd->sd_opencnt != 0) {
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
return EBUSY;
|
|
|
|
}
|
|
|
|
sn->sn_opencnt = 1;
|
|
|
|
sd->sd_opencnt = 1;
|
|
|
|
sd->sd_bdevvp = vp;
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2009-02-02 17:00:27 +03:00
|
|
|
do {
|
2009-10-04 10:23:58 +04:00
|
|
|
const struct bdevsw *bdev;
|
|
|
|
|
2009-02-02 17:00:27 +03:00
|
|
|
gen = module_gen;
|
|
|
|
error = bdev_open(dev, ap->a_mode, S_IFBLK, l);
|
|
|
|
if (error != ENXIO)
|
|
|
|
break;
|
|
|
|
|
2009-10-04 10:23:58 +04:00
|
|
|
/* Check if we already have a valid driver */
|
|
|
|
mutex_enter(&device_lock);
|
|
|
|
bdev = bdevsw_lookup(dev);
|
|
|
|
mutex_exit(&device_lock);
|
|
|
|
if (bdev != NULL)
|
|
|
|
break;
|
|
|
|
|
2009-02-02 17:00:27 +03:00
|
|
|
/* Get device name from devsw_conv array */
|
|
|
|
if ((name = bdevsw_getname(major(dev))) == NULL)
|
|
|
|
break;
|
|
|
|
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2009-02-02 17:00:27 +03:00
|
|
|
|
|
|
|
/* Try to autoload device module */
|
|
|
|
(void) module_autoload(name, MODULE_CLASS_DRIVER);
|
|
|
|
|
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
|
|
} while (gen != module_gen);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
2003-10-15 12:41:26 +04:00
|
|
|
break;
|
2001-08-17 09:51:53 +04:00
|
|
|
|
1996-02-10 01:39:56 +03:00
|
|
|
case VNON:
|
|
|
|
case VLNK:
|
|
|
|
case VDIR:
|
|
|
|
case VREG:
|
|
|
|
case VBAD:
|
|
|
|
case VFIFO:
|
|
|
|
case VSOCK:
|
2003-10-15 12:41:26 +04:00
|
|
|
default:
|
|
|
|
return 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2003-10-15 12:41:26 +04:00
|
|
|
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
if (sn->sn_gone) {
|
|
|
|
if (error == 0)
|
|
|
|
error = EBADF;
|
|
|
|
} else if (error != 0) {
|
|
|
|
sd->sd_opencnt--;
|
|
|
|
sn->sn_opencnt--;
|
2008-01-25 19:21:04 +03:00
|
|
|
if (vp->v_type == VBLK)
|
|
|
|
sd->sd_bdevvp = NULL;
|
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
}
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
First take at security model abstraction.
- Add a few scopes to the kernel: system, network, and machdep.
- Add a few more actions/sub-actions (requests), and start using them as
opposed to the KAUTH_GENERIC_ISSUSER place-holders.
- Introduce a basic set of listeners that implement our "traditional"
security model, called "bsd44". This is the default (and only) model we
have at the moment.
- Update all relevant documentation.
- Add some code and docs to help folks who want to actually use this stuff:
* There's a sample overlay model, sitting on-top of "bsd44", for
fast experimenting with tweaking just a subset of an existing model.
This is pretty cool because it's *really* straightforward to do stuff
you had to use ugly hacks for until now...
* And of course, documentation describing how to do the above for quick
reference, including code samples.
All of these changes were tested for regressions using a Python-based
testsuite that will be (I hope) available soon via pkgsrc. Information
about the tests, and how to write new ones, can be found on:
http://kauth.linbsd.org/kauthwiki
NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the
following:
- Uses a KAUTH_GENERIC_ISSUSER kauth(9) request,
- Checks 'securelevel' directly,
- Checks a uid/gid directly.
(or if you feel you have to, contact me first)
This is still work in progress; It's far from being done, but now it'll
be a lot easier.
Relevant mailing list threads:
http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html
http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html
http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html
http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html
Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help
stablizing kauth(9).
Full credit for the regression tests, making sure these changes didn't break
anything, goes to Matt Fleming and Jaime Fournier.
Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
if (cdev_type(dev) != D_DISK || error != 0)
|
2003-10-15 12:41:26 +04:00
|
|
|
return error;
|
2008-01-24 20:32:52 +03:00
|
|
|
|
2007-07-10 00:51:58 +04:00
|
|
|
if (vp->v_type == VCHR)
|
|
|
|
error = cdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp);
|
|
|
|
else
|
|
|
|
error = bdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp);
|
|
|
|
if (error == 0)
|
2007-06-05 16:31:30 +04:00
|
|
|
uvm_vnp_setsize(vp,
|
|
|
|
(voff_t)pi.disklab->d_secsize * pi.part->p_size);
|
2003-10-15 12:41:26 +04:00
|
|
|
return 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Vnode op for read
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_read(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_read_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
struct uio *a_uio;
|
|
|
|
int a_ioflag;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2000-03-30 16:22:12 +04:00
|
|
|
struct vnode *vp = ap->a_vp;
|
|
|
|
struct uio *uio = ap->a_uio;
|
2006-03-01 15:38:10 +03:00
|
|
|
struct lwp *l = curlwp;
|
2001-08-18 09:34:46 +04:00
|
|
|
struct buf *bp;
|
a whole bunch of changes to improve performance and robustness under load:
- remove special treatment of pager_map mappings in pmaps. this is
required now, since I've removed the globals that expose the address range.
pager_map now uses pmap_kenter_pa() instead of pmap_enter(), so there's
no longer any need to special-case it.
- eliminate struct uvm_vnode by moving its fields into struct vnode.
- rewrite the pageout path. the pager is now responsible for handling the
high-level requests instead of only getting control after a bunch of work
has already been done on its behalf. this will allow us to UBCify LFS,
which needs tighter control over its pages than other filesystems do.
writing a page to disk no longer requires making it read-only, which
allows us to write wired pages without causing all kinds of havoc.
- use a new PG_PAGEOUT flag to indicate that a page should be freed
on behalf of the pagedaemon when it's unlocked. this flag is very similar
to PG_RELEASED, but unlike PG_RELEASED, PG_PAGEOUT can be cleared if the
pageout fails due to eg. an indirect-block buffer being locked.
this allows us to remove the "version" field from struct vm_page,
and together with shrinking "loan_count" from 32 bits to 16,
struct vm_page is now 4 bytes smaller.
- no longer use PG_RELEASED for swap-backed pages. if the page is busy
because it's being paged out, we can't release the swap slot to be
reallocated until that write is complete, but unlike with vnodes we
don't keep a count of in-progress writes so there's no good way to
know when the write is done. instead, when we need to free a busy
swap-backed page, just sleep until we can get it busy ourselves.
- implement a fast-path for extending writes which allows us to avoid
zeroing new pages. this substantially reduces cpu usage.
- encapsulate the data used by the genfs code in a struct genfs_node,
which must be the first element of the filesystem-specific vnode data
for filesystems which use genfs_{get,put}pages().
- eliminate many of the UVM pagerops, since they aren't needed anymore
now that the pager "put" operation is a higher-level operation.
- enhance the genfs code to allow NFS to use the genfs_{get,put}pages
instead of a modified copy.
- clean up struct vnode by removing all the fields that used to be used by
the vfs_cluster.c code (which we don't use anymore with UBC).
- remove kmem_object and mb_object since they were useless.
instead of allocating pages to these objects, we now just allocate
pages with no object. such pages are mapped in the kernel until they
are freed, so we can use the mapping to find the page to free it.
this allows us to remove splvm() protection in several places.
The sum of all these changes improves write throughput on my
decstation 5000/200 to within 1% of the rate of NetBSD 1.5
and reduces the elapsed time for "make release" of a NetBSD 1.5
source tree on my 128MB pc to 10% less than a 1.5 kernel took.
2001-09-16 00:36:31 +04:00
|
|
|
daddr_t bn;
|
2001-09-23 08:39:25 +04:00
|
|
|
int bsize, bscale;
|
2001-08-18 09:34:46 +04:00
|
|
|
struct partinfo dpart;
|
2002-09-06 17:18:43 +04:00
|
|
|
int n, on;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (uio->uio_rw != UIO_READ)
|
|
|
|
panic("spec_read mode");
|
2006-03-01 15:38:10 +03:00
|
|
|
if (&uio->uio_vmspace->vm_map != kernel_map &&
|
|
|
|
uio->uio_vmspace != curproc->p_vmspace)
|
1993-03-21 12:45:37 +03:00
|
|
|
panic("spec_read proc");
|
|
|
|
#endif
|
|
|
|
if (uio->uio_resid == 0)
|
|
|
|
return (0);
|
|
|
|
|
2001-08-18 09:34:46 +04:00
|
|
|
switch (vp->v_type) {
|
|
|
|
|
|
|
|
case VCHR:
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2007-07-10 00:51:58 +04:00
|
|
|
error = cdev_read(vp->v_rdev, uio, ap->a_ioflag);
|
2001-09-21 12:02:55 +04:00
|
|
|
vn_lock(vp, LK_SHARED | LK_RETRY);
|
1993-03-21 12:45:37 +03:00
|
|
|
return (error);
|
|
|
|
|
2001-08-18 09:34:46 +04:00
|
|
|
case VBLK:
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
|
2001-08-18 09:34:46 +04:00
|
|
|
if (uio->uio_offset < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
bsize = BLKDEV_IOSIZE;
|
2007-07-10 00:51:58 +04:00
|
|
|
if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) {
|
2001-08-18 09:34:46 +04:00
|
|
|
if (dpart.part->p_fstype == FS_BSDFFS &&
|
|
|
|
dpart.part->p_frag != 0 && dpart.part->p_fsize != 0)
|
|
|
|
bsize = dpart.part->p_frag *
|
|
|
|
dpart.part->p_fsize;
|
|
|
|
}
|
2001-09-23 08:39:25 +04:00
|
|
|
bscale = bsize >> DEV_BSHIFT;
|
2001-08-18 09:34:46 +04:00
|
|
|
do {
|
2001-09-23 08:39:25 +04:00
|
|
|
bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1);
|
2001-08-18 09:34:46 +04:00
|
|
|
on = uio->uio_offset % bsize;
|
|
|
|
n = min((unsigned)(bsize - on), uio->uio_resid);
|
2008-05-16 13:21:59 +04:00
|
|
|
error = bread(vp, bn, bsize, NOCRED, 0, &bp);
|
2001-08-18 09:34:46 +04:00
|
|
|
n = min(n, bsize - bp->b_resid);
|
|
|
|
if (error) {
|
2007-10-08 22:02:53 +04:00
|
|
|
brelse(bp, 0);
|
2001-08-18 09:34:46 +04:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
error = uiomove((char *)bp->b_data + on, n, uio);
|
2007-10-08 22:02:53 +04:00
|
|
|
brelse(bp, 0);
|
2001-08-18 09:34:46 +04:00
|
|
|
} while (error == 0 && uio->uio_resid > 0 && n != 0);
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("spec_read type");
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2001-08-18 09:34:46 +04:00
|
|
|
/* NOTREACHED */
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Vnode op for write
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_write(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_write_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
struct uio *a_uio;
|
|
|
|
int a_ioflag;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2000-03-30 16:22:12 +04:00
|
|
|
struct vnode *vp = ap->a_vp;
|
|
|
|
struct uio *uio = ap->a_uio;
|
2006-03-01 15:38:10 +03:00
|
|
|
struct lwp *l = curlwp;
|
2001-08-18 09:34:46 +04:00
|
|
|
struct buf *bp;
|
|
|
|
daddr_t bn;
|
2001-09-23 08:39:25 +04:00
|
|
|
int bsize, bscale;
|
2001-08-18 09:34:46 +04:00
|
|
|
struct partinfo dpart;
|
2002-09-06 17:18:43 +04:00
|
|
|
int n, on;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (uio->uio_rw != UIO_WRITE)
|
|
|
|
panic("spec_write mode");
|
2006-03-01 15:38:10 +03:00
|
|
|
if (&uio->uio_vmspace->vm_map != kernel_map &&
|
|
|
|
uio->uio_vmspace != curproc->p_vmspace)
|
1993-03-21 12:45:37 +03:00
|
|
|
panic("spec_write proc");
|
|
|
|
#endif
|
|
|
|
|
2001-08-18 09:34:46 +04:00
|
|
|
switch (vp->v_type) {
|
|
|
|
|
|
|
|
case VCHR:
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
2007-07-10 00:51:58 +04:00
|
|
|
error = cdev_write(vp->v_rdev, uio, ap->a_ioflag);
|
1998-03-01 05:20:01 +03:00
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
1993-03-21 12:45:37 +03:00
|
|
|
return (error);
|
2001-08-17 09:51:53 +04:00
|
|
|
|
2001-08-18 09:34:46 +04:00
|
|
|
case VBLK:
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
|
2001-08-18 09:34:46 +04:00
|
|
|
if (uio->uio_resid == 0)
|
|
|
|
return (0);
|
|
|
|
if (uio->uio_offset < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
bsize = BLKDEV_IOSIZE;
|
2007-07-10 00:51:58 +04:00
|
|
|
if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) {
|
2001-08-18 09:34:46 +04:00
|
|
|
if (dpart.part->p_fstype == FS_BSDFFS &&
|
|
|
|
dpart.part->p_frag != 0 && dpart.part->p_fsize != 0)
|
|
|
|
bsize = dpart.part->p_frag *
|
|
|
|
dpart.part->p_fsize;
|
|
|
|
}
|
2001-09-23 08:39:25 +04:00
|
|
|
bscale = bsize >> DEV_BSHIFT;
|
2001-08-18 09:34:46 +04:00
|
|
|
do {
|
2001-09-23 08:39:25 +04:00
|
|
|
bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1);
|
2001-08-18 09:34:46 +04:00
|
|
|
on = uio->uio_offset % bsize;
|
|
|
|
n = min((unsigned)(bsize - on), uio->uio_resid);
|
|
|
|
if (n == bsize)
|
|
|
|
bp = getblk(vp, bn, bsize, 0, 0);
|
|
|
|
else
|
2008-05-16 13:21:59 +04:00
|
|
|
error = bread(vp, bn, bsize, NOCRED,
|
|
|
|
B_MODIFY, &bp);
|
2001-08-18 09:34:46 +04:00
|
|
|
if (error) {
|
2007-10-08 22:02:53 +04:00
|
|
|
brelse(bp, 0);
|
2001-08-18 09:34:46 +04:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
n = min(n, bsize - bp->b_resid);
|
|
|
|
error = uiomove((char *)bp->b_data + on, n, uio);
|
|
|
|
if (error)
|
2007-10-08 22:02:53 +04:00
|
|
|
brelse(bp, 0);
|
2001-08-18 09:34:46 +04:00
|
|
|
else {
|
|
|
|
if (n + on == bsize)
|
|
|
|
bawrite(bp);
|
|
|
|
else
|
|
|
|
bdwrite(bp);
|
2007-10-08 22:02:53 +04:00
|
|
|
error = bp->b_error;
|
2001-08-18 09:34:46 +04:00
|
|
|
}
|
|
|
|
} while (error == 0 && uio->uio_resid > 0 && n != 0);
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("spec_write type");
|
|
|
|
}
|
|
|
|
/* NOTREACHED */
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Device ioctl operation.
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_ioctl(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_ioctl_args /* {
|
|
|
|
struct vnode *a_vp;
|
1994-10-29 10:58:24 +03:00
|
|
|
u_long a_command;
|
2004-05-12 06:07:37 +04:00
|
|
|
void *a_data;
|
1994-06-08 15:33:09 +04:00
|
|
|
int a_fflag;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2005-09-11 18:18:54 +04:00
|
|
|
struct vnode *vp;
|
|
|
|
dev_t dev;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2005-09-11 18:18:54 +04:00
|
|
|
/*
|
|
|
|
* Extract all the info we need from the vnode, taking care to
|
|
|
|
* avoid a race with VOP_REVOKE().
|
|
|
|
*/
|
|
|
|
|
|
|
|
vp = ap->a_vp;
|
|
|
|
dev = NODEV;
|
2008-01-02 14:48:20 +03:00
|
|
|
mutex_enter(&vp->v_interlock);
|
2008-01-24 20:32:52 +03:00
|
|
|
if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specnode) {
|
2005-09-11 18:18:54 +04:00
|
|
|
dev = vp->v_rdev;
|
|
|
|
}
|
2008-01-02 14:48:20 +03:00
|
|
|
mutex_exit(&vp->v_interlock);
|
2005-09-11 18:18:54 +04:00
|
|
|
if (dev == NODEV) {
|
|
|
|
return ENXIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (vp->v_type) {
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case VCHR:
|
2007-07-10 00:51:58 +04:00
|
|
|
return cdev_ioctl(dev, ap->a_command, ap->a_data,
|
2007-11-26 22:01:26 +03:00
|
|
|
ap->a_fflag, curlwp);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case VBLK:
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
|
2007-07-10 00:51:58 +04:00
|
|
|
return bdev_ioctl(dev, ap->a_command, ap->a_data,
|
2007-11-26 22:01:26 +03:00
|
|
|
ap->a_fflag, curlwp);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
default:
|
|
|
|
panic("spec_ioctl");
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_poll(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1996-09-07 16:40:22 +04:00
|
|
|
struct vop_poll_args /* {
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vnode *a_vp;
|
1996-09-07 16:40:22 +04:00
|
|
|
int a_events;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2006-09-21 13:28:37 +04:00
|
|
|
struct vnode *vp;
|
2000-03-30 16:22:12 +04:00
|
|
|
dev_t dev;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2006-09-21 13:28:37 +04:00
|
|
|
/*
|
|
|
|
* Extract all the info we need from the vnode, taking care to
|
|
|
|
* avoid a race with VOP_REVOKE().
|
|
|
|
*/
|
|
|
|
|
|
|
|
vp = ap->a_vp;
|
|
|
|
dev = NODEV;
|
2008-01-02 14:48:20 +03:00
|
|
|
mutex_enter(&vp->v_interlock);
|
2008-01-24 20:32:52 +03:00
|
|
|
if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specnode) {
|
2006-09-21 13:28:37 +04:00
|
|
|
dev = vp->v_rdev;
|
|
|
|
}
|
2008-01-02 14:48:20 +03:00
|
|
|
mutex_exit(&vp->v_interlock);
|
2006-09-21 13:28:37 +04:00
|
|
|
if (dev == NODEV) {
|
2006-10-01 01:00:13 +04:00
|
|
|
return POLLERR;
|
2006-09-21 13:28:37 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (vp->v_type) {
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case VCHR:
|
2007-11-26 22:01:26 +03:00
|
|
|
return cdev_poll(dev, ap->a_events, curlwp);
|
1996-09-02 03:47:48 +04:00
|
|
|
|
|
|
|
default:
|
1996-09-07 16:40:22 +04:00
|
|
|
return (genfs_poll(v));
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
2002-10-23 13:10:23 +04:00
|
|
|
|
|
|
|
/* ARGSUSED */
|
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_kqfilter(void *v)
|
2002-10-23 13:10:23 +04:00
|
|
|
{
|
|
|
|
struct vop_kqfilter_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
struct proc *a_kn;
|
|
|
|
} */ *ap = v;
|
|
|
|
dev_t dev;
|
|
|
|
|
|
|
|
switch (ap->a_vp->v_type) {
|
|
|
|
|
|
|
|
case VCHR:
|
|
|
|
dev = ap->a_vp->v_rdev;
|
2007-07-10 00:51:58 +04:00
|
|
|
return cdev_kqfilter(dev, ap->a_kn);
|
2002-10-23 13:10:23 +04:00
|
|
|
default:
|
|
|
|
/*
|
|
|
|
* Block devices don't support kqfilter, and refuse it
|
|
|
|
* for any other files (like those vflush()ed) too.
|
|
|
|
*/
|
|
|
|
return (EOPNOTSUPP);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-07-22 23:16:04 +04:00
|
|
|
/*
|
|
|
|
* Allow mapping of only D_DISK. This is called only for VBLK.
|
|
|
|
*/
|
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_mmap(void *v)
|
2007-07-22 23:16:04 +04:00
|
|
|
{
|
|
|
|
struct vop_mmap_args /* {
|
|
|
|
struct vnode *a_vp;
|
2007-07-27 12:32:44 +04:00
|
|
|
vm_prot_t a_prot;
|
2007-07-22 23:16:04 +04:00
|
|
|
kauth_cred_t a_cred;
|
|
|
|
} */ *ap = v;
|
|
|
|
struct vnode *vp = ap->a_vp;
|
|
|
|
|
|
|
|
KASSERT(vp->v_type == VBLK);
|
|
|
|
if (bdev_type(vp->v_rdev) != D_DISK)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-06-08 15:33:09 +04:00
|
|
|
* Synch buffers associated with a block device
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
1994-06-08 15:33:09 +04:00
|
|
|
/* ARGSUSED */
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_fsync(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_fsync_args /* {
|
|
|
|
struct vnode *a_vp;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1998-06-05 23:53:00 +04:00
|
|
|
int a_flags;
|
2000-09-20 02:01:59 +04:00
|
|
|
off_t offlo;
|
|
|
|
off_t offhi;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2000-03-30 16:22:12 +04:00
|
|
|
struct vnode *vp = ap->a_vp;
|
2008-04-29 22:18:08 +04:00
|
|
|
struct mount *mp;
|
|
|
|
int error;
|
1994-06-08 15:33:09 +04:00
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
if (vp->v_type == VBLK) {
|
2008-04-29 22:18:08 +04:00
|
|
|
if ((mp = vp->v_specmountpoint) != NULL) {
|
|
|
|
error = VFS_FSYNC(mp, vp, ap->a_flags | FSYNC_VFS);
|
|
|
|
if (error != EOPNOTSUPP)
|
|
|
|
return error;
|
|
|
|
}
|
1998-06-05 23:53:00 +04:00
|
|
|
vflushbuf(vp, (ap->a_flags & FSYNC_WAIT) != 0);
|
2008-01-24 20:32:52 +03:00
|
|
|
}
|
1994-06-08 15:33:09 +04:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Just call the device strategy routine
|
|
|
|
*/
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_strategy(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_strategy_args /* {
|
2004-01-25 21:06:48 +03:00
|
|
|
struct vnode *a_vp;
|
1994-06-08 15:33:09 +04:00
|
|
|
struct buf *a_bp;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2004-01-25 21:06:48 +03:00
|
|
|
struct vnode *vp = ap->a_vp;
|
|
|
|
struct buf *bp = ap->a_bp;
|
2007-10-07 17:38:53 +04:00
|
|
|
int error;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
|
|
|
|
|
2004-05-25 18:54:55 +04:00
|
|
|
error = 0;
|
2004-01-25 21:06:48 +03:00
|
|
|
bp->b_dev = vp->v_rdev;
|
2004-02-14 03:00:56 +03:00
|
|
|
|
2007-10-07 17:38:53 +04:00
|
|
|
if (!(bp->b_flags & B_READ))
|
2007-12-02 16:56:15 +03:00
|
|
|
error = fscow_run(bp, false);
|
2004-02-14 03:00:56 +03:00
|
|
|
|
2004-05-25 18:54:55 +04:00
|
|
|
if (error) {
|
|
|
|
bp->b_error = error;
|
|
|
|
biodone(bp);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2007-07-10 00:51:58 +04:00
|
|
|
bdev_strategy(bp);
|
2004-01-25 21:06:48 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1998-03-01 05:20:01 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_inactive(void *v)
|
1998-03-01 05:20:01 +03:00
|
|
|
{
|
|
|
|
struct vop_inactive_args /* {
|
|
|
|
struct vnode *a_vp;
|
2005-12-11 15:16:03 +03:00
|
|
|
struct proc *a_l;
|
1998-03-01 05:20:01 +03:00
|
|
|
} */ *ap = v;
|
|
|
|
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(ap->a_vp);
|
1998-03-01 05:20:01 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* This is a noop, simply returning what one has been given.
|
|
|
|
*/
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_bmap(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_bmap_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
daddr_t a_bn;
|
|
|
|
struct vnode **a_vpp;
|
|
|
|
daddr_t *a_bnp;
|
1998-03-01 05:20:01 +03:00
|
|
|
int *a_runp;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1994-06-08 15:33:09 +04:00
|
|
|
if (ap->a_vpp != NULL)
|
|
|
|
*ap->a_vpp = ap->a_vp;
|
|
|
|
if (ap->a_bnp != NULL)
|
|
|
|
*ap->a_bnp = ap->a_bn;
|
1998-03-01 05:20:01 +03:00
|
|
|
if (ap->a_runp != NULL)
|
2001-08-17 09:51:53 +04:00
|
|
|
*ap->a_runp = (MAXBSIZE >> DEV_BSHIFT) - 1;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Device close routine
|
|
|
|
*/
|
|
|
|
/* ARGSUSED */
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_close(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_close_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
int a_fflag;
|
2006-05-15 01:31:52 +04:00
|
|
|
kauth_cred_t a_cred;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
2000-03-30 16:22:12 +04:00
|
|
|
struct vnode *vp = ap->a_vp;
|
2003-11-06 11:58:04 +03:00
|
|
|
struct session *sess;
|
1993-03-21 12:45:37 +03:00
|
|
|
dev_t dev = vp->v_rdev;
|
2008-01-24 20:32:52 +03:00
|
|
|
int mode, error, flags, flags1, count;
|
|
|
|
specnode_t *sn;
|
|
|
|
specdev_t *sd;
|
1999-10-17 03:53:26 +04:00
|
|
|
|
2007-10-11 00:42:20 +04:00
|
|
|
flags = vp->v_iflag;
|
2008-01-24 20:32:52 +03:00
|
|
|
sn = vp->v_specnode;
|
|
|
|
sd = sn->sn_dev;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
switch (vp->v_type) {
|
|
|
|
|
|
|
|
case VCHR:
|
1994-01-27 06:16:40 +03:00
|
|
|
/*
|
|
|
|
* Hack: a tty device that is a controlling terminal
|
2008-01-24 20:32:52 +03:00
|
|
|
* has a reference from the session structure. We
|
|
|
|
* cannot easily tell that a character device is a
|
|
|
|
* controlling terminal, unless it is the closing
|
|
|
|
* process' controlling terminal. In that case, if the
|
|
|
|
* open count is 1 release the reference from the
|
|
|
|
* session. Also, remove the link from the tty back to
|
|
|
|
* the session and pgrp.
|
|
|
|
*
|
|
|
|
* XXX V. fishy.
|
1994-01-27 06:16:40 +03:00
|
|
|
*/
|
2008-04-24 19:35:27 +04:00
|
|
|
mutex_enter(proc_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
sess = curlwp->l_proc->p_session;
|
|
|
|
if (sn->sn_opencnt == 1 && vp == sess->s_ttyvp) {
|
|
|
|
mutex_spin_enter(&tty_lock);
|
2003-11-06 11:58:04 +03:00
|
|
|
sess->s_ttyvp = NULL;
|
2003-11-24 17:59:38 +03:00
|
|
|
if (sess->s_ttyp->t_session != NULL) {
|
|
|
|
sess->s_ttyp->t_pgrp = NULL;
|
|
|
|
sess->s_ttyp->t_session = NULL;
|
2008-01-24 20:32:52 +03:00
|
|
|
mutex_spin_exit(&tty_lock);
|
2009-04-25 19:06:31 +04:00
|
|
|
/* Releases proc_lock. */
|
|
|
|
proc_sessrele(sess);
|
2007-07-10 00:51:58 +04:00
|
|
|
} else {
|
2008-01-24 20:32:52 +03:00
|
|
|
mutex_spin_exit(&tty_lock);
|
2007-07-10 00:51:58 +04:00
|
|
|
if (sess->s_ttyp->t_pgrp != NULL)
|
|
|
|
panic("spec_close: spurious pgrp ref");
|
2008-04-24 19:35:27 +04:00
|
|
|
mutex_exit(proc_lock);
|
2007-07-10 00:51:58 +04:00
|
|
|
}
|
1994-01-27 06:16:40 +03:00
|
|
|
vrele(vp);
|
2007-07-10 00:51:58 +04:00
|
|
|
} else
|
2008-04-24 19:35:27 +04:00
|
|
|
mutex_exit(proc_lock);
|
2007-07-10 00:51:58 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* If the vnode is locked, then we are in the midst
|
|
|
|
* of forcably closing the device, otherwise we only
|
|
|
|
* close on last reference.
|
|
|
|
*/
|
|
|
|
mode = S_IFCHR;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case VBLK:
|
2008-01-24 20:32:52 +03:00
|
|
|
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* On last close of a block device (that isn't mounted)
|
|
|
|
* we must invalidate any in core blocks, so that
|
|
|
|
* we can, for instance, change floppy disks.
|
|
|
|
*/
|
2007-11-26 22:01:26 +03:00
|
|
|
error = vinvalbuf(vp, V_SAVE, ap->a_cred, curlwp, 0, 0);
|
1996-02-10 01:39:56 +03:00
|
|
|
if (error)
|
1994-06-08 15:33:09 +04:00
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* We do not want to really close the device if it
|
|
|
|
* is still in use unless we are trying to close it
|
|
|
|
* forcibly. Since every use (buffer, vnode, swap, cmap)
|
|
|
|
* holds a reference to the vnode, and because we mark
|
|
|
|
* any other vnodes that alias this device, when the
|
|
|
|
* sum of the reference counts on all the aliased
|
|
|
|
* vnodes descends to one, we are on last close.
|
|
|
|
*/
|
|
|
|
mode = S_IFBLK;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("spec_close: not special");
|
|
|
|
}
|
|
|
|
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_enter(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
sn->sn_opencnt--;
|
|
|
|
count = --sd->sd_opencnt;
|
|
|
|
if (vp->v_type == VBLK)
|
|
|
|
sd->sd_bdevvp = NULL;
|
2008-12-29 20:41:18 +03:00
|
|
|
mutex_exit(&device_lock);
|
2008-01-24 20:32:52 +03:00
|
|
|
|
|
|
|
if (count != 0)
|
|
|
|
return 0;
|
|
|
|
|
1999-10-17 03:53:26 +04:00
|
|
|
flags1 = ap->a_fflag;
|
|
|
|
|
|
|
|
/*
|
2007-10-11 00:42:20 +04:00
|
|
|
* if VI_XLOCK is set, then we're going away soon, so make this
|
1999-10-17 03:53:26 +04:00
|
|
|
* non-blocking. Also ensures that we won't wedge in vn_lock below.
|
|
|
|
*/
|
2007-10-11 00:42:20 +04:00
|
|
|
if (flags & VI_XLOCK)
|
1999-10-17 03:53:26 +04:00
|
|
|
flags1 |= FNONBLOCK;
|
|
|
|
|
|
|
|
/*
|
2002-07-11 03:16:32 +04:00
|
|
|
* If we're able to block, release the vnode lock & reacquire. We
|
2003-11-24 17:59:38 +03:00
|
|
|
* might end up sleeping for someone else who wants our queues. They
|
2007-10-11 00:42:20 +04:00
|
|
|
* won't get them if we hold the vnode locked. Also, if VI_XLOCK is
|
2007-07-10 00:51:58 +04:00
|
|
|
* set, don't release the lock as we won't be able to regain it.
|
1999-10-17 03:53:26 +04:00
|
|
|
*/
|
|
|
|
if (!(flags1 & FNONBLOCK))
|
2010-06-24 16:58:48 +04:00
|
|
|
VOP_UNLOCK(vp);
|
1999-10-17 03:53:26 +04:00
|
|
|
|
2007-07-10 00:51:58 +04:00
|
|
|
if (vp->v_type == VBLK)
|
2007-11-26 22:01:26 +03:00
|
|
|
error = bdev_close(dev, flags1, mode, curlwp);
|
2002-09-06 17:18:43 +04:00
|
|
|
else
|
2007-11-26 22:01:26 +03:00
|
|
|
error = cdev_close(dev, flags1, mode, curlwp);
|
1999-10-17 03:53:26 +04:00
|
|
|
|
|
|
|
if (!(flags1 & FNONBLOCK))
|
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
|
|
|
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Print out the contents of a special device vnode.
|
|
|
|
*/
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_print(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_print_args /* {
|
|
|
|
struct vnode *a_vp;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2009-01-11 05:45:45 +03:00
|
|
|
printf("dev %llu, %llu\n", (unsigned long long)major(ap->a_vp->v_rdev),
|
|
|
|
(unsigned long long)minor(ap->a_vp->v_rdev));
|
1996-02-10 01:39:56 +03:00
|
|
|
return 0;
|
1994-06-08 15:33:09 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return POSIX pathconf information applicable to special devices.
|
|
|
|
*/
|
1996-02-10 01:39:56 +03:00
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_pathconf(void *v)
|
1996-02-10 01:39:56 +03:00
|
|
|
{
|
1994-06-08 15:33:09 +04:00
|
|
|
struct vop_pathconf_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
int a_name;
|
1994-10-20 07:22:35 +03:00
|
|
|
register_t *a_retval;
|
1996-02-10 01:39:56 +03:00
|
|
|
} */ *ap = v;
|
1994-06-08 15:33:09 +04:00
|
|
|
|
|
|
|
switch (ap->a_name) {
|
|
|
|
case _PC_LINK_MAX:
|
|
|
|
*ap->a_retval = LINK_MAX;
|
|
|
|
return (0);
|
|
|
|
case _PC_MAX_CANON:
|
|
|
|
*ap->a_retval = MAX_CANON;
|
|
|
|
return (0);
|
|
|
|
case _PC_MAX_INPUT:
|
|
|
|
*ap->a_retval = MAX_INPUT;
|
|
|
|
return (0);
|
|
|
|
case _PC_PIPE_BUF:
|
|
|
|
*ap->a_retval = PIPE_BUF;
|
|
|
|
return (0);
|
|
|
|
case _PC_CHOWN_RESTRICTED:
|
|
|
|
*ap->a_retval = 1;
|
|
|
|
return (0);
|
|
|
|
case _PC_VDISABLE:
|
|
|
|
*ap->a_retval = _POSIX_VDISABLE;
|
|
|
|
return (0);
|
1998-08-03 18:19:57 +04:00
|
|
|
case _PC_SYNC_IO:
|
|
|
|
*ap->a_retval = 1;
|
|
|
|
return (0);
|
1994-06-08 15:33:09 +04:00
|
|
|
default:
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
/* NOTREACHED */
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1997-04-02 21:09:47 +04:00
|
|
|
|
2005-02-27 01:58:54 +03:00
|
|
|
/*
|
1997-04-02 21:09:47 +04:00
|
|
|
* Advisory record locking support.
|
|
|
|
*/
|
|
|
|
int
|
2007-08-03 12:45:36 +04:00
|
|
|
spec_advlock(void *v)
|
1997-04-02 21:09:47 +04:00
|
|
|
{
|
|
|
|
struct vop_advlock_args /* {
|
|
|
|
struct vnode *a_vp;
|
2004-05-12 06:07:37 +04:00
|
|
|
void *a_id;
|
1997-04-02 21:09:47 +04:00
|
|
|
int a_op;
|
|
|
|
struct flock *a_fl;
|
|
|
|
int a_flags;
|
|
|
|
} */ *ap = v;
|
2000-03-30 16:22:12 +04:00
|
|
|
struct vnode *vp = ap->a_vp;
|
1997-04-02 21:09:47 +04:00
|
|
|
|
2000-07-22 19:26:11 +04:00
|
|
|
return lf_advlock(ap, &vp->v_speclockf, (off_t)0);
|
1997-04-02 21:09:47 +04:00
|
|
|
}
|