NetBSD/sys/miscfs/specfs/spec_vnops.c

1149 lines
26 KiB
C
Raw Normal View History

/* $NetBSD: spec_vnops.c,v 1.131 2010/08/21 13:19:40 pgoyette Exp $ */
/*-
* Copyright (c) 2008 The NetBSD Foundation, Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
1993-03-21 12:45:37 +03:00
/*
* Copyright (c) 1989, 1993
* The Regents of the University of California. All rights reserved.
1993-03-21 12:45:37 +03:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
1993-03-21 12:45:37 +03:00
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
1998-03-01 05:20:01 +03:00
* @(#)spec_vnops.c 8.15 (Berkeley) 7/14/95
1993-03-21 12:45:37 +03:00
*/
2001-11-10 16:33:40 +03:00
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.131 2010/08/21 13:19:40 pgoyette Exp $");
2001-11-10 16:33:40 +03:00
1993-12-18 06:59:02 +03:00
#include <sys/param.h>
#include <sys/proc.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/conf.h>
#include <sys/buf.h>
#include <sys/mount.h>
#include <sys/namei.h>
#include <sys/vnode.h>
#include <sys/stat.h>
#include <sys/errno.h>
#include <sys/ioctl.h>
#include <sys/poll.h>
1993-12-18 06:59:02 +03:00
#include <sys/file.h>
#include <sys/disklabel.h>
1997-04-02 21:09:47 +04:00
#include <sys/lockf.h>
#include <sys/tty.h>
2006-05-15 01:31:52 +04:00
#include <sys/kauth.h>
#include <sys/fstrans.h>
#include <sys/module.h>
1996-02-10 01:39:56 +03:00
#include <miscfs/genfs/genfs.h>
#include <miscfs/specfs/specdev.h>
1993-03-21 12:45:37 +03:00
/* symbolic sleep message strings for devices */
const char devopn[] = "devopn";
const char devio[] = "devio";
const char devwait[] = "devwait";
const char devin[] = "devin";
const char devout[] = "devout";
const char devioc[] = "devioc";
const char devcls[] = "devcls";
1993-03-21 12:45:37 +03:00
vnode_t *specfs_hash[SPECHSZ];
2002-05-13 00:42:03 +04:00
/*
* This vnode operations vector is used for special device nodes
* created from whole cloth by the kernel. For the ops vector for
* vnodes built from special devices found in a filesystem, see (e.g)
* ffs_specop_entries[] in ffs_vnops.c or the equivalent for other
* filesystems.
*/
2005-08-31 00:08:01 +04:00
int (**spec_vnodeop_p)(void *);
const struct vnodeopv_entry_desc spec_vnodeop_entries[] = {
{ &vop_default_desc, vn_default_error },
{ &vop_lookup_desc, spec_lookup }, /* lookup */
{ &vop_create_desc, spec_create }, /* create */
{ &vop_mknod_desc, spec_mknod }, /* mknod */
{ &vop_open_desc, spec_open }, /* open */
{ &vop_close_desc, spec_close }, /* close */
{ &vop_access_desc, spec_access }, /* access */
{ &vop_getattr_desc, spec_getattr }, /* getattr */
{ &vop_setattr_desc, spec_setattr }, /* setattr */
{ &vop_read_desc, spec_read }, /* read */
{ &vop_write_desc, spec_write }, /* write */
{ &vop_fcntl_desc, spec_fcntl }, /* fcntl */
{ &vop_ioctl_desc, spec_ioctl }, /* ioctl */
1996-09-07 16:40:22 +04:00
{ &vop_poll_desc, spec_poll }, /* poll */
{ &vop_kqfilter_desc, spec_kqfilter }, /* kqfilter */
1998-03-01 05:20:01 +03:00
{ &vop_revoke_desc, spec_revoke }, /* revoke */
{ &vop_mmap_desc, spec_mmap }, /* mmap */
{ &vop_fsync_desc, spec_fsync }, /* fsync */
{ &vop_seek_desc, spec_seek }, /* seek */
{ &vop_remove_desc, spec_remove }, /* remove */
{ &vop_link_desc, spec_link }, /* link */
{ &vop_rename_desc, spec_rename }, /* rename */
{ &vop_mkdir_desc, spec_mkdir }, /* mkdir */
{ &vop_rmdir_desc, spec_rmdir }, /* rmdir */
{ &vop_symlink_desc, spec_symlink }, /* symlink */
{ &vop_readdir_desc, spec_readdir }, /* readdir */
{ &vop_readlink_desc, spec_readlink }, /* readlink */
{ &vop_abortop_desc, spec_abortop }, /* abortop */
{ &vop_inactive_desc, spec_inactive }, /* inactive */
{ &vop_reclaim_desc, spec_reclaim }, /* reclaim */
{ &vop_lock_desc, spec_lock }, /* lock */
{ &vop_unlock_desc, spec_unlock }, /* unlock */
{ &vop_bmap_desc, spec_bmap }, /* bmap */
{ &vop_strategy_desc, spec_strategy }, /* strategy */
{ &vop_print_desc, spec_print }, /* print */
{ &vop_islocked_desc, spec_islocked }, /* islocked */
{ &vop_pathconf_desc, spec_pathconf }, /* pathconf */
{ &vop_advlock_desc, spec_advlock }, /* advlock */
1996-02-10 01:39:56 +03:00
{ &vop_bwrite_desc, spec_bwrite }, /* bwrite */
{ &vop_getpages_desc, spec_getpages }, /* getpages */
{ &vop_putpages_desc, spec_putpages }, /* putpages */
{ NULL, NULL }
1993-03-21 12:45:37 +03:00
};
const struct vnodeopv_desc spec_vnodeop_opv_desc =
{ &spec_vnodeop_p, spec_vnodeop_entries };
1993-03-21 12:45:37 +03:00
static kauth_listener_t rawio_listener;
/* Returns true if vnode is /dev/mem or /dev/kmem. */
bool
iskmemvp(struct vnode *vp)
{
return ((vp->v_type == VCHR) && iskmemdev(vp->v_rdev));
}
/*
* Returns true if dev is /dev/mem or /dev/kmem.
*/
int
iskmemdev(dev_t dev)
{
/* mem_no is emitted by config(8) to generated devsw.c */
extern const int mem_no;
/* minor 14 is /dev/io on i386 with COMPAT_10 */
return (major(dev) == mem_no && (minor(dev) < 2 || minor(dev) == 14));
}
static int
rawio_listener_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
void *arg0, void *arg1, void *arg2, void *arg3)
{
int result;
result = KAUTH_RESULT_DEFER;
if ((action != KAUTH_DEVICE_RAWIO_SPEC) &&
(action != KAUTH_DEVICE_RAWIO_PASSTHRU))
return result;
/* Access is mandated by permissions. */
result = KAUTH_RESULT_ALLOW;
return result;
}
void
spec_init(void)
{
rawio_listener = kauth_listen_scope(KAUTH_SCOPE_DEVICE,
rawio_listener_cb, NULL);
}
/*
* Initialize a vnode that represents a device.
*/
void
spec_node_init(vnode_t *vp, dev_t rdev)
{
specnode_t *sn;
specdev_t *sd;
vnode_t *vp2;
vnode_t **vpp;
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
KASSERT(vp->v_specnode == NULL);
/*
* Search the hash table for this device. If known, add a
* reference to the device structure. If not known, create
* a new entry to represent the device. In all cases add
* the vnode to the hash table.
*/
sn = kmem_alloc(sizeof(*sn), KM_SLEEP);
if (sn == NULL) {
/* XXX */
panic("spec_node_init: unable to allocate memory");
}
sd = kmem_alloc(sizeof(*sd), KM_SLEEP);
if (sd == NULL) {
/* XXX */
panic("spec_node_init: unable to allocate memory");
}
mutex_enter(&device_lock);
vpp = &specfs_hash[SPECHASH(rdev)];
for (vp2 = *vpp; vp2 != NULL; vp2 = vp2->v_specnext) {
KASSERT(vp2->v_specnode != NULL);
if (rdev == vp2->v_rdev && vp->v_type == vp2->v_type) {
break;
}
}
if (vp2 == NULL) {
/* No existing record, create a new one. */
sd->sd_rdev = rdev;
sd->sd_mountpoint = NULL;
sd->sd_lockf = NULL;
sd->sd_refcnt = 1;
sd->sd_opencnt = 0;
sd->sd_bdevvp = NULL;
sn->sn_dev = sd;
sd = NULL;
} else {
/* Use the existing record. */
sn->sn_dev = vp2->v_specnode->sn_dev;
sn->sn_dev->sd_refcnt++;
}
/* Insert vnode into the hash chain. */
sn->sn_opencnt = 0;
sn->sn_rdev = rdev;
sn->sn_gone = false;
vp->v_specnode = sn;
vp->v_specnext = *vpp;
*vpp = vp;
mutex_exit(&device_lock);
/* Free the record we allocated if unused. */
if (sd != NULL) {
kmem_free(sd, sizeof(*sd));
}
}
/*
* A vnode representing a special device is going away. Close
* the device if the vnode holds it open.
*/
void
spec_node_revoke(vnode_t *vp)
{
specnode_t *sn;
specdev_t *sd;
sn = vp->v_specnode;
sd = sn->sn_dev;
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
KASSERT(vp->v_specnode != NULL);
KASSERT((vp->v_iflag & VI_XLOCK) != 0);
KASSERT(sn->sn_gone == false);
mutex_enter(&device_lock);
KASSERT(sn->sn_opencnt <= sd->sd_opencnt);
if (sn->sn_opencnt != 0) {
sd->sd_opencnt -= (sn->sn_opencnt - 1);
sn->sn_opencnt = 1;
sn->sn_gone = true;
mutex_exit(&device_lock);
VOP_CLOSE(vp, FNONBLOCK, NOCRED);
mutex_enter(&device_lock);
KASSERT(sn->sn_opencnt == 0);
}
mutex_exit(&device_lock);
}
/*
* A vnode representing a special device is being recycled.
* Destroy the specfs component.
*/
void
spec_node_destroy(vnode_t *vp)
{
specnode_t *sn;
specdev_t *sd;
vnode_t **vpp, *vp2;
int refcnt;
sn = vp->v_specnode;
sd = sn->sn_dev;
KASSERT(vp->v_type == VBLK || vp->v_type == VCHR);
KASSERT(vp->v_specnode != NULL);
KASSERT(sn->sn_opencnt == 0);
mutex_enter(&device_lock);
/* Remove from the hash and destroy the node. */
vpp = &specfs_hash[SPECHASH(vp->v_rdev)];
for (vp2 = *vpp;; vp2 = vp2->v_specnext) {
if (vp2 == NULL) {
panic("spec_node_destroy: corrupt hash");
}
if (vp2 == vp) {
KASSERT(vp == *vpp);
*vpp = vp->v_specnext;
break;
}
if (vp2->v_specnext == vp) {
vp2->v_specnext = vp->v_specnext;
break;
}
}
sn = vp->v_specnode;
vp->v_specnode = NULL;
refcnt = sd->sd_refcnt--;
KASSERT(refcnt > 0);
mutex_exit(&device_lock);
/* If the device is no longer in use, destroy our record. */
if (refcnt == 1) {
KASSERT(sd->sd_opencnt == 0);
KASSERT(sd->sd_bdevvp == NULL);
kmem_free(sd, sizeof(*sd));
}
kmem_free(sn, sizeof(*sn));
}
1993-03-21 12:45:37 +03:00
/*
* Trivial lookup routine that always fails.
*/
int
2007-08-03 12:45:36 +04:00
spec_lookup(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_lookup_args /* {
struct vnode *a_dvp;
struct vnode **a_vpp;
struct componentname *a_cnp;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
1993-03-21 12:45:37 +03:00
*ap->a_vpp = NULL;
1993-03-21 12:45:37 +03:00
return (ENOTDIR);
}
/*
* Open a special file.
1993-03-21 12:45:37 +03:00
*/
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_open(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_open_args /* {
struct vnode *a_vp;
int a_mode;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
struct lwp *l;
struct vnode *vp;
dev_t dev;
1993-03-21 12:45:37 +03:00
int error;
struct partinfo pi;
enum kauth_device_req req;
specnode_t *sn;
specdev_t *sd;
u_int gen;
const char *name;
l = curlwp;
vp = ap->a_vp;
dev = vp->v_rdev;
sn = vp->v_specnode;
sd = sn->sn_dev;
name = NULL;
gen = 0;
/*
* Don't allow open if fs is mounted -nodev.
*/
1993-03-21 12:45:37 +03:00
if (vp->v_mount && (vp->v_mount->mnt_flag & MNT_NODEV))
return (ENXIO);
switch (ap->a_mode & (FREAD | FWRITE)) {
case FREAD | FWRITE:
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_RW;
break;
case FWRITE:
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_WRITE;
break;
default:
req = KAUTH_REQ_DEVICE_RAWIO_SPEC_READ;
break;
}
First take at security model abstraction. - Add a few scopes to the kernel: system, network, and machdep. - Add a few more actions/sub-actions (requests), and start using them as opposed to the KAUTH_GENERIC_ISSUSER place-holders. - Introduce a basic set of listeners that implement our "traditional" security model, called "bsd44". This is the default (and only) model we have at the moment. - Update all relevant documentation. - Add some code and docs to help folks who want to actually use this stuff: * There's a sample overlay model, sitting on-top of "bsd44", for fast experimenting with tweaking just a subset of an existing model. This is pretty cool because it's *really* straightforward to do stuff you had to use ugly hacks for until now... * And of course, documentation describing how to do the above for quick reference, including code samples. All of these changes were tested for regressions using a Python-based testsuite that will be (I hope) available soon via pkgsrc. Information about the tests, and how to write new ones, can be found on: http://kauth.linbsd.org/kauthwiki NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the following: - Uses a KAUTH_GENERIC_ISSUSER kauth(9) request, - Checks 'securelevel' directly, - Checks a uid/gid directly. (or if you feel you have to, contact me first) This is still work in progress; It's far from being done, but now it'll be a lot easier. Relevant mailing list threads: http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help stablizing kauth(9). Full credit for the regression tests, making sure these changes didn't break anything, goes to Matt Fleming and Jaime Fournier. Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
1993-03-21 12:45:37 +03:00
switch (vp->v_type) {
case VCHR:
error = kauth_authorize_device_spec(ap->a_cred, req, vp);
if (error != 0)
return (error);
First take at security model abstraction. - Add a few scopes to the kernel: system, network, and machdep. - Add a few more actions/sub-actions (requests), and start using them as opposed to the KAUTH_GENERIC_ISSUSER place-holders. - Introduce a basic set of listeners that implement our "traditional" security model, called "bsd44". This is the default (and only) model we have at the moment. - Update all relevant documentation. - Add some code and docs to help folks who want to actually use this stuff: * There's a sample overlay model, sitting on-top of "bsd44", for fast experimenting with tweaking just a subset of an existing model. This is pretty cool because it's *really* straightforward to do stuff you had to use ugly hacks for until now... * And of course, documentation describing how to do the above for quick reference, including code samples. All of these changes were tested for regressions using a Python-based testsuite that will be (I hope) available soon via pkgsrc. Information about the tests, and how to write new ones, can be found on: http://kauth.linbsd.org/kauthwiki NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the following: - Uses a KAUTH_GENERIC_ISSUSER kauth(9) request, - Checks 'securelevel' directly, - Checks a uid/gid directly. (or if you feel you have to, contact me first) This is still work in progress; It's far from being done, but now it'll be a lot easier. Relevant mailing list threads: http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help stablizing kauth(9). Full credit for the regression tests, making sure these changes didn't break anything, goes to Matt Fleming and Jaime Fournier. Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
/*
* Character devices can accept opens from multiple
* vnodes.
*/
mutex_enter(&device_lock);
if (sn->sn_gone) {
mutex_exit(&device_lock);
return (EBADF);
}
sd->sd_opencnt++;
sn->sn_opencnt++;
mutex_exit(&device_lock);
if (cdev_type(dev) == D_TTY)
vp->v_vflag |= VV_ISTTY;
VOP_UNLOCK(vp);
do {
const struct cdevsw *cdev;
gen = module_gen;
error = cdev_open(dev, ap->a_mode, S_IFCHR, l);
if (error != ENXIO)
break;
/* Check if we already have a valid driver */
mutex_enter(&device_lock);
cdev = cdevsw_lookup(dev);
mutex_exit(&device_lock);
if (cdev != NULL)
break;
/* Get device name from devsw_conv array */
if ((name = cdevsw_getname(major(dev))) == NULL)
break;
/* Try to autoload device module */
(void) module_autoload(name, MODULE_CLASS_DRIVER);
} while (gen != module_gen);
1998-03-01 05:20:01 +03:00
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
break;
1993-03-21 12:45:37 +03:00
case VBLK:
error = kauth_authorize_device_spec(ap->a_cred, req, vp);
if (error != 0)
return (error);
/*
* For block devices, permit only one open. The buffer
* cache cannot remain self-consistent with multiple
* vnodes holding a block device open.
*/
mutex_enter(&device_lock);
if (sn->sn_gone) {
mutex_exit(&device_lock);
return (EBADF);
}
if (sd->sd_opencnt != 0) {
mutex_exit(&device_lock);
return EBUSY;
}
sn->sn_opencnt = 1;
sd->sd_opencnt = 1;
sd->sd_bdevvp = vp;
mutex_exit(&device_lock);
do {
const struct bdevsw *bdev;
gen = module_gen;
error = bdev_open(dev, ap->a_mode, S_IFBLK, l);
if (error != ENXIO)
break;
/* Check if we already have a valid driver */
mutex_enter(&device_lock);
bdev = bdevsw_lookup(dev);
mutex_exit(&device_lock);
if (bdev != NULL)
break;
/* Get device name from devsw_conv array */
if ((name = bdevsw_getname(major(dev))) == NULL)
break;
VOP_UNLOCK(vp);
/* Try to autoload device module */
(void) module_autoload(name, MODULE_CLASS_DRIVER);
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
} while (gen != module_gen);
break;
1996-02-10 01:39:56 +03:00
case VNON:
case VLNK:
case VDIR:
case VREG:
case VBAD:
case VFIFO:
case VSOCK:
default:
return 0;
1993-03-21 12:45:37 +03:00
}
mutex_enter(&device_lock);
if (sn->sn_gone) {
if (error == 0)
error = EBADF;
} else if (error != 0) {
sd->sd_opencnt--;
sn->sn_opencnt--;
if (vp->v_type == VBLK)
sd->sd_bdevvp = NULL;
}
mutex_exit(&device_lock);
First take at security model abstraction. - Add a few scopes to the kernel: system, network, and machdep. - Add a few more actions/sub-actions (requests), and start using them as opposed to the KAUTH_GENERIC_ISSUSER place-holders. - Introduce a basic set of listeners that implement our "traditional" security model, called "bsd44". This is the default (and only) model we have at the moment. - Update all relevant documentation. - Add some code and docs to help folks who want to actually use this stuff: * There's a sample overlay model, sitting on-top of "bsd44", for fast experimenting with tweaking just a subset of an existing model. This is pretty cool because it's *really* straightforward to do stuff you had to use ugly hacks for until now... * And of course, documentation describing how to do the above for quick reference, including code samples. All of these changes were tested for regressions using a Python-based testsuite that will be (I hope) available soon via pkgsrc. Information about the tests, and how to write new ones, can be found on: http://kauth.linbsd.org/kauthwiki NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the following: - Uses a KAUTH_GENERIC_ISSUSER kauth(9) request, - Checks 'securelevel' directly, - Checks a uid/gid directly. (or if you feel you have to, contact me first) This is still work in progress; It's far from being done, but now it'll be a lot easier. Relevant mailing list threads: http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help stablizing kauth(9). Full credit for the regression tests, making sure these changes didn't break anything, goes to Matt Fleming and Jaime Fournier. Happy birthday Randi! :)
2006-09-09 00:58:56 +04:00
if (cdev_type(dev) != D_DISK || error != 0)
return error;
if (vp->v_type == VCHR)
error = cdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp);
else
error = bdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp);
if (error == 0)
uvm_vnp_setsize(vp,
(voff_t)pi.disklab->d_secsize * pi.part->p_size);
return 0;
1993-03-21 12:45:37 +03:00
}
/*
* Vnode op for read
*/
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_read(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_read_args /* {
struct vnode *a_vp;
struct uio *a_uio;
int a_ioflag;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
2000-03-30 16:22:12 +04:00
struct vnode *vp = ap->a_vp;
struct uio *uio = ap->a_uio;
struct lwp *l = curlwp;
struct buf *bp;
a whole bunch of changes to improve performance and robustness under load: - remove special treatment of pager_map mappings in pmaps. this is required now, since I've removed the globals that expose the address range. pager_map now uses pmap_kenter_pa() instead of pmap_enter(), so there's no longer any need to special-case it. - eliminate struct uvm_vnode by moving its fields into struct vnode. - rewrite the pageout path. the pager is now responsible for handling the high-level requests instead of only getting control after a bunch of work has already been done on its behalf. this will allow us to UBCify LFS, which needs tighter control over its pages than other filesystems do. writing a page to disk no longer requires making it read-only, which allows us to write wired pages without causing all kinds of havoc. - use a new PG_PAGEOUT flag to indicate that a page should be freed on behalf of the pagedaemon when it's unlocked. this flag is very similar to PG_RELEASED, but unlike PG_RELEASED, PG_PAGEOUT can be cleared if the pageout fails due to eg. an indirect-block buffer being locked. this allows us to remove the "version" field from struct vm_page, and together with shrinking "loan_count" from 32 bits to 16, struct vm_page is now 4 bytes smaller. - no longer use PG_RELEASED for swap-backed pages. if the page is busy because it's being paged out, we can't release the swap slot to be reallocated until that write is complete, but unlike with vnodes we don't keep a count of in-progress writes so there's no good way to know when the write is done. instead, when we need to free a busy swap-backed page, just sleep until we can get it busy ourselves. - implement a fast-path for extending writes which allows us to avoid zeroing new pages. this substantially reduces cpu usage. - encapsulate the data used by the genfs code in a struct genfs_node, which must be the first element of the filesystem-specific vnode data for filesystems which use genfs_{get,put}pages(). - eliminate many of the UVM pagerops, since they aren't needed anymore now that the pager "put" operation is a higher-level operation. - enhance the genfs code to allow NFS to use the genfs_{get,put}pages instead of a modified copy. - clean up struct vnode by removing all the fields that used to be used by the vfs_cluster.c code (which we don't use anymore with UBC). - remove kmem_object and mb_object since they were useless. instead of allocating pages to these objects, we now just allocate pages with no object. such pages are mapped in the kernel until they are freed, so we can use the mapping to find the page to free it. this allows us to remove splvm() protection in several places. The sum of all these changes improves write throughput on my decstation 5000/200 to within 1% of the rate of NetBSD 1.5 and reduces the elapsed time for "make release" of a NetBSD 1.5 source tree on my 128MB pc to 10% less than a 1.5 kernel took.
2001-09-16 00:36:31 +04:00
daddr_t bn;
int bsize, bscale;
struct partinfo dpart;
int n, on;
1993-03-21 12:45:37 +03:00
int error = 0;
#ifdef DIAGNOSTIC
if (uio->uio_rw != UIO_READ)
panic("spec_read mode");
if (&uio->uio_vmspace->vm_map != kernel_map &&
uio->uio_vmspace != curproc->p_vmspace)
1993-03-21 12:45:37 +03:00
panic("spec_read proc");
#endif
if (uio->uio_resid == 0)
return (0);
switch (vp->v_type) {
case VCHR:
VOP_UNLOCK(vp);
error = cdev_read(vp->v_rdev, uio, ap->a_ioflag);
vn_lock(vp, LK_SHARED | LK_RETRY);
1993-03-21 12:45:37 +03:00
return (error);
case VBLK:
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
if (uio->uio_offset < 0)
return (EINVAL);
bsize = BLKDEV_IOSIZE;
if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) {
if (dpart.part->p_fstype == FS_BSDFFS &&
dpart.part->p_frag != 0 && dpart.part->p_fsize != 0)
bsize = dpart.part->p_frag *
dpart.part->p_fsize;
}
bscale = bsize >> DEV_BSHIFT;
do {
bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1);
on = uio->uio_offset % bsize;
n = min((unsigned)(bsize - on), uio->uio_resid);
error = bread(vp, bn, bsize, NOCRED, 0, &bp);
n = min(n, bsize - bp->b_resid);
if (error) {
brelse(bp, 0);
return (error);
}
error = uiomove((char *)bp->b_data + on, n, uio);
brelse(bp, 0);
} while (error == 0 && uio->uio_resid > 0 && n != 0);
return (error);
default:
panic("spec_read type");
1993-03-21 12:45:37 +03:00
}
/* NOTREACHED */
1993-03-21 12:45:37 +03:00
}
/*
* Vnode op for write
*/
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_write(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_write_args /* {
struct vnode *a_vp;
struct uio *a_uio;
int a_ioflag;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
2000-03-30 16:22:12 +04:00
struct vnode *vp = ap->a_vp;
struct uio *uio = ap->a_uio;
struct lwp *l = curlwp;
struct buf *bp;
daddr_t bn;
int bsize, bscale;
struct partinfo dpart;
int n, on;
1993-03-21 12:45:37 +03:00
int error = 0;
#ifdef DIAGNOSTIC
if (uio->uio_rw != UIO_WRITE)
panic("spec_write mode");
if (&uio->uio_vmspace->vm_map != kernel_map &&
uio->uio_vmspace != curproc->p_vmspace)
1993-03-21 12:45:37 +03:00
panic("spec_write proc");
#endif
switch (vp->v_type) {
case VCHR:
VOP_UNLOCK(vp);
error = cdev_write(vp->v_rdev, uio, ap->a_ioflag);
1998-03-01 05:20:01 +03:00
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
1993-03-21 12:45:37 +03:00
return (error);
case VBLK:
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
if (uio->uio_resid == 0)
return (0);
if (uio->uio_offset < 0)
return (EINVAL);
bsize = BLKDEV_IOSIZE;
if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) {
if (dpart.part->p_fstype == FS_BSDFFS &&
dpart.part->p_frag != 0 && dpart.part->p_fsize != 0)
bsize = dpart.part->p_frag *
dpart.part->p_fsize;
}
bscale = bsize >> DEV_BSHIFT;
do {
bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1);
on = uio->uio_offset % bsize;
n = min((unsigned)(bsize - on), uio->uio_resid);
if (n == bsize)
bp = getblk(vp, bn, bsize, 0, 0);
else
error = bread(vp, bn, bsize, NOCRED,
B_MODIFY, &bp);
if (error) {
brelse(bp, 0);
return (error);
}
n = min(n, bsize - bp->b_resid);
error = uiomove((char *)bp->b_data + on, n, uio);
if (error)
brelse(bp, 0);
else {
if (n + on == bsize)
bawrite(bp);
else
bdwrite(bp);
error = bp->b_error;
}
} while (error == 0 && uio->uio_resid > 0 && n != 0);
return (error);
default:
panic("spec_write type");
}
/* NOTREACHED */
1993-03-21 12:45:37 +03:00
}
/*
* Device ioctl operation.
*/
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_ioctl(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_ioctl_args /* {
struct vnode *a_vp;
u_long a_command;
void *a_data;
int a_fflag;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
struct vnode *vp;
dev_t dev;
1993-03-21 12:45:37 +03:00
/*
* Extract all the info we need from the vnode, taking care to
* avoid a race with VOP_REVOKE().
*/
vp = ap->a_vp;
dev = NODEV;
2008-01-02 14:48:20 +03:00
mutex_enter(&vp->v_interlock);
if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specnode) {
dev = vp->v_rdev;
}
2008-01-02 14:48:20 +03:00
mutex_exit(&vp->v_interlock);
if (dev == NODEV) {
return ENXIO;
}
switch (vp->v_type) {
1993-03-21 12:45:37 +03:00
case VCHR:
return cdev_ioctl(dev, ap->a_command, ap->a_data,
ap->a_fflag, curlwp);
1993-03-21 12:45:37 +03:00
case VBLK:
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
return bdev_ioctl(dev, ap->a_command, ap->a_data,
ap->a_fflag, curlwp);
1993-03-21 12:45:37 +03:00
default:
panic("spec_ioctl");
/* NOTREACHED */
}
}
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_poll(void *v)
1996-02-10 01:39:56 +03:00
{
1996-09-07 16:40:22 +04:00
struct vop_poll_args /* {
struct vnode *a_vp;
1996-09-07 16:40:22 +04:00
int a_events;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
struct vnode *vp;
2000-03-30 16:22:12 +04:00
dev_t dev;
1993-03-21 12:45:37 +03:00
/*
* Extract all the info we need from the vnode, taking care to
* avoid a race with VOP_REVOKE().
*/
vp = ap->a_vp;
dev = NODEV;
2008-01-02 14:48:20 +03:00
mutex_enter(&vp->v_interlock);
if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specnode) {
dev = vp->v_rdev;
}
2008-01-02 14:48:20 +03:00
mutex_exit(&vp->v_interlock);
if (dev == NODEV) {
return POLLERR;
}
switch (vp->v_type) {
1993-03-21 12:45:37 +03:00
case VCHR:
return cdev_poll(dev, ap->a_events, curlwp);
default:
1996-09-07 16:40:22 +04:00
return (genfs_poll(v));
1993-03-21 12:45:37 +03:00
}
}
/* ARGSUSED */
int
2007-08-03 12:45:36 +04:00
spec_kqfilter(void *v)
{
struct vop_kqfilter_args /* {
struct vnode *a_vp;
struct proc *a_kn;
} */ *ap = v;
dev_t dev;
switch (ap->a_vp->v_type) {
case VCHR:
dev = ap->a_vp->v_rdev;
return cdev_kqfilter(dev, ap->a_kn);
default:
/*
* Block devices don't support kqfilter, and refuse it
* for any other files (like those vflush()ed) too.
*/
return (EOPNOTSUPP);
}
}
/*
* Allow mapping of only D_DISK. This is called only for VBLK.
*/
int
2007-08-03 12:45:36 +04:00
spec_mmap(void *v)
{
struct vop_mmap_args /* {
struct vnode *a_vp;
2007-07-27 12:32:44 +04:00
vm_prot_t a_prot;
kauth_cred_t a_cred;
} */ *ap = v;
struct vnode *vp = ap->a_vp;
KASSERT(vp->v_type == VBLK);
if (bdev_type(vp->v_rdev) != D_DISK)
return EINVAL;
return 0;
}
1993-03-21 12:45:37 +03:00
/*
* Synch buffers associated with a block device
1993-03-21 12:45:37 +03:00
*/
/* ARGSUSED */
int
2007-08-03 12:45:36 +04:00
spec_fsync(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_fsync_args /* {
struct vnode *a_vp;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
int a_flags;
2000-09-20 02:01:59 +04:00
off_t offlo;
off_t offhi;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
2000-03-30 16:22:12 +04:00
struct vnode *vp = ap->a_vp;
struct mount *mp;
int error;
if (vp->v_type == VBLK) {
if ((mp = vp->v_specmountpoint) != NULL) {
error = VFS_FSYNC(mp, vp, ap->a_flags | FSYNC_VFS);
if (error != EOPNOTSUPP)
return error;
}
vflushbuf(vp, (ap->a_flags & FSYNC_WAIT) != 0);
}
return (0);
}
/*
* Just call the device strategy routine
*/
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_strategy(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_strategy_args /* {
struct vnode *a_vp;
struct buf *a_bp;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
struct vnode *vp = ap->a_vp;
struct buf *bp = ap->a_bp;
int error;
1993-03-21 12:45:37 +03:00
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
error = 0;
bp->b_dev = vp->v_rdev;
if (!(bp->b_flags & B_READ))
error = fscow_run(bp, false);
if (error) {
bp->b_error = error;
biodone(bp);
return (error);
}
bdev_strategy(bp);
1993-03-21 12:45:37 +03:00
return (0);
}
1998-03-01 05:20:01 +03:00
int
2007-08-03 12:45:36 +04:00
spec_inactive(void *v)
1998-03-01 05:20:01 +03:00
{
struct vop_inactive_args /* {
struct vnode *a_vp;
2005-12-11 15:16:03 +03:00
struct proc *a_l;
1998-03-01 05:20:01 +03:00
} */ *ap = v;
VOP_UNLOCK(ap->a_vp);
1998-03-01 05:20:01 +03:00
return (0);
}
1993-03-21 12:45:37 +03:00
/*
* This is a noop, simply returning what one has been given.
*/
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_bmap(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_bmap_args /* {
struct vnode *a_vp;
daddr_t a_bn;
struct vnode **a_vpp;
daddr_t *a_bnp;
1998-03-01 05:20:01 +03:00
int *a_runp;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
1993-03-21 12:45:37 +03:00
if (ap->a_vpp != NULL)
*ap->a_vpp = ap->a_vp;
if (ap->a_bnp != NULL)
*ap->a_bnp = ap->a_bn;
1998-03-01 05:20:01 +03:00
if (ap->a_runp != NULL)
*ap->a_runp = (MAXBSIZE >> DEV_BSHIFT) - 1;
1993-03-21 12:45:37 +03:00
return (0);
}
/*
* Device close routine
*/
/* ARGSUSED */
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_close(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_close_args /* {
struct vnode *a_vp;
int a_fflag;
2006-05-15 01:31:52 +04:00
kauth_cred_t a_cred;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
2000-03-30 16:22:12 +04:00
struct vnode *vp = ap->a_vp;
struct session *sess;
1993-03-21 12:45:37 +03:00
dev_t dev = vp->v_rdev;
int mode, error, flags, flags1, count;
specnode_t *sn;
specdev_t *sd;
flags = vp->v_iflag;
sn = vp->v_specnode;
sd = sn->sn_dev;
1993-03-21 12:45:37 +03:00
switch (vp->v_type) {
case VCHR:
/*
* Hack: a tty device that is a controlling terminal
* has a reference from the session structure. We
* cannot easily tell that a character device is a
* controlling terminal, unless it is the closing
* process' controlling terminal. In that case, if the
* open count is 1 release the reference from the
* session. Also, remove the link from the tty back to
* the session and pgrp.
*
* XXX V. fishy.
*/
mutex_enter(proc_lock);
sess = curlwp->l_proc->p_session;
if (sn->sn_opencnt == 1 && vp == sess->s_ttyvp) {
mutex_spin_enter(&tty_lock);
sess->s_ttyvp = NULL;
if (sess->s_ttyp->t_session != NULL) {
sess->s_ttyp->t_pgrp = NULL;
sess->s_ttyp->t_session = NULL;
mutex_spin_exit(&tty_lock);
/* Releases proc_lock. */
proc_sessrele(sess);
} else {
mutex_spin_exit(&tty_lock);
if (sess->s_ttyp->t_pgrp != NULL)
panic("spec_close: spurious pgrp ref");
mutex_exit(proc_lock);
}
vrele(vp);
} else
mutex_exit(proc_lock);
1993-03-21 12:45:37 +03:00
/*
* If the vnode is locked, then we are in the midst
* of forcably closing the device, otherwise we only
* close on last reference.
*/
mode = S_IFCHR;
break;
case VBLK:
KASSERT(vp == vp->v_specnode->sn_dev->sd_bdevvp);
1993-03-21 12:45:37 +03:00
/*
* On last close of a block device (that isn't mounted)
* we must invalidate any in core blocks, so that
* we can, for instance, change floppy disks.
*/
error = vinvalbuf(vp, V_SAVE, ap->a_cred, curlwp, 0, 0);
1996-02-10 01:39:56 +03:00
if (error)
return (error);
1993-03-21 12:45:37 +03:00
/*
* We do not want to really close the device if it
* is still in use unless we are trying to close it
* forcibly. Since every use (buffer, vnode, swap, cmap)
* holds a reference to the vnode, and because we mark
* any other vnodes that alias this device, when the
* sum of the reference counts on all the aliased
* vnodes descends to one, we are on last close.
*/
mode = S_IFBLK;
break;
default:
panic("spec_close: not special");
}
mutex_enter(&device_lock);
sn->sn_opencnt--;
count = --sd->sd_opencnt;
if (vp->v_type == VBLK)
sd->sd_bdevvp = NULL;
mutex_exit(&device_lock);
if (count != 0)
return 0;
flags1 = ap->a_fflag;
/*
* if VI_XLOCK is set, then we're going away soon, so make this
* non-blocking. Also ensures that we won't wedge in vn_lock below.
*/
if (flags & VI_XLOCK)
flags1 |= FNONBLOCK;
/*
2002-07-11 03:16:32 +04:00
* If we're able to block, release the vnode lock & reacquire. We
* might end up sleeping for someone else who wants our queues. They
* won't get them if we hold the vnode locked. Also, if VI_XLOCK is
* set, don't release the lock as we won't be able to regain it.
*/
if (!(flags1 & FNONBLOCK))
VOP_UNLOCK(vp);
if (vp->v_type == VBLK)
error = bdev_close(dev, flags1, mode, curlwp);
else
error = cdev_close(dev, flags1, mode, curlwp);
if (!(flags1 & FNONBLOCK))
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
return (error);
1993-03-21 12:45:37 +03:00
}
/*
* Print out the contents of a special device vnode.
*/
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_print(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_print_args /* {
struct vnode *a_vp;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
1993-03-21 12:45:37 +03:00
2009-01-11 05:45:45 +03:00
printf("dev %llu, %llu\n", (unsigned long long)major(ap->a_vp->v_rdev),
(unsigned long long)minor(ap->a_vp->v_rdev));
1996-02-10 01:39:56 +03:00
return 0;
}
/*
* Return POSIX pathconf information applicable to special devices.
*/
1996-02-10 01:39:56 +03:00
int
2007-08-03 12:45:36 +04:00
spec_pathconf(void *v)
1996-02-10 01:39:56 +03:00
{
struct vop_pathconf_args /* {
struct vnode *a_vp;
int a_name;
register_t *a_retval;
1996-02-10 01:39:56 +03:00
} */ *ap = v;
switch (ap->a_name) {
case _PC_LINK_MAX:
*ap->a_retval = LINK_MAX;
return (0);
case _PC_MAX_CANON:
*ap->a_retval = MAX_CANON;
return (0);
case _PC_MAX_INPUT:
*ap->a_retval = MAX_INPUT;
return (0);
case _PC_PIPE_BUF:
*ap->a_retval = PIPE_BUF;
return (0);
case _PC_CHOWN_RESTRICTED:
*ap->a_retval = 1;
return (0);
case _PC_VDISABLE:
*ap->a_retval = _POSIX_VDISABLE;
return (0);
1998-08-03 18:19:57 +04:00
case _PC_SYNC_IO:
*ap->a_retval = 1;
return (0);
default:
return (EINVAL);
}
/* NOTREACHED */
1993-03-21 12:45:37 +03:00
}
1997-04-02 21:09:47 +04:00
2005-02-27 01:58:54 +03:00
/*
1997-04-02 21:09:47 +04:00
* Advisory record locking support.
*/
int
2007-08-03 12:45:36 +04:00
spec_advlock(void *v)
1997-04-02 21:09:47 +04:00
{
struct vop_advlock_args /* {
struct vnode *a_vp;
void *a_id;
1997-04-02 21:09:47 +04:00
int a_op;
struct flock *a_fl;
int a_flags;
} */ *ap = v;
2000-03-30 16:22:12 +04:00
struct vnode *vp = ap->a_vp;
1997-04-02 21:09:47 +04:00
return lf_advlock(ap, &vp->v_speclockf, (off_t)0);
1997-04-02 21:09:47 +04:00
}