/* $NetBSD: spec_vnops.c,v 1.109 2007/11/26 19:02:17 pooka Exp $ */ /* * Copyright (c) 1989, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * @(#)spec_vnops.c 8.15 (Berkeley) 7/14/95 */ #include __KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.109 2007/11/26 19:02:17 pooka Exp $"); #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* symbolic sleep message strings for devices */ const char devopn[] = "devopn"; const char devio[] = "devio"; const char devwait[] = "devwait"; const char devin[] = "devin"; const char devout[] = "devout"; const char devioc[] = "devioc"; const char devcls[] = "devcls"; struct vnode *speclisth[SPECHSZ]; /* * This vnode operations vector is used for two things only: * - special device nodes created from whole cloth by the kernel. * - as a temporary vnodeops replacement for vnodes which were found to * be aliased by callers of checkalias(). * For the ops vector for vnodes built from special devices found in a * filesystem, see (e.g) ffs_specop_entries[] in ffs_vnops.c or the * equivalent for other filesystems. */ int (**spec_vnodeop_p)(void *); const struct vnodeopv_entry_desc spec_vnodeop_entries[] = { { &vop_default_desc, vn_default_error }, { &vop_lookup_desc, spec_lookup }, /* lookup */ { &vop_create_desc, spec_create }, /* create */ { &vop_mknod_desc, spec_mknod }, /* mknod */ { &vop_open_desc, spec_open }, /* open */ { &vop_close_desc, spec_close }, /* close */ { &vop_access_desc, spec_access }, /* access */ { &vop_getattr_desc, spec_getattr }, /* getattr */ { &vop_setattr_desc, spec_setattr }, /* setattr */ { &vop_read_desc, spec_read }, /* read */ { &vop_write_desc, spec_write }, /* write */ { &vop_lease_desc, spec_lease_check }, /* lease */ { &vop_fcntl_desc, spec_fcntl }, /* fcntl */ { &vop_ioctl_desc, spec_ioctl }, /* ioctl */ { &vop_poll_desc, spec_poll }, /* poll */ { &vop_kqfilter_desc, spec_kqfilter }, /* kqfilter */ { &vop_revoke_desc, spec_revoke }, /* revoke */ { &vop_mmap_desc, spec_mmap }, /* mmap */ { &vop_fsync_desc, spec_fsync }, /* fsync */ { &vop_seek_desc, spec_seek }, /* seek */ { &vop_remove_desc, spec_remove }, /* remove */ { &vop_link_desc, spec_link }, /* link */ { &vop_rename_desc, spec_rename }, /* rename */ { &vop_mkdir_desc, spec_mkdir }, /* mkdir */ { &vop_rmdir_desc, spec_rmdir }, /* rmdir */ { &vop_symlink_desc, spec_symlink }, /* symlink */ { &vop_readdir_desc, spec_readdir }, /* readdir */ { &vop_readlink_desc, spec_readlink }, /* readlink */ { &vop_abortop_desc, spec_abortop }, /* abortop */ { &vop_inactive_desc, spec_inactive }, /* inactive */ { &vop_reclaim_desc, spec_reclaim }, /* reclaim */ { &vop_lock_desc, spec_lock }, /* lock */ { &vop_unlock_desc, spec_unlock }, /* unlock */ { &vop_bmap_desc, spec_bmap }, /* bmap */ { &vop_strategy_desc, spec_strategy }, /* strategy */ { &vop_print_desc, spec_print }, /* print */ { &vop_islocked_desc, spec_islocked }, /* islocked */ { &vop_pathconf_desc, spec_pathconf }, /* pathconf */ { &vop_advlock_desc, spec_advlock }, /* advlock */ { &vop_bwrite_desc, spec_bwrite }, /* bwrite */ { &vop_getpages_desc, spec_getpages }, /* getpages */ { &vop_putpages_desc, spec_putpages }, /* putpages */ { NULL, NULL } }; const struct vnodeopv_desc spec_vnodeop_opv_desc = { &spec_vnodeop_p, spec_vnodeop_entries }; /* * Trivial lookup routine that always fails. */ int spec_lookup(void *v) { struct vop_lookup_args /* { struct vnode *a_dvp; struct vnode **a_vpp; struct componentname *a_cnp; } */ *ap = v; *ap->a_vpp = NULL; return (ENOTDIR); } /* * Returns true if dev is /dev/mem or /dev/kmem. */ int iskmemdev(dev_t dev) { /* mem_no is emitted by config(8) to generated devsw.c */ extern const int mem_no; /* minor 14 is /dev/io on i386 with COMPAT_10 */ return (major(dev) == mem_no && (minor(dev) < 2 || minor(dev) == 14)); } /* * Open a special file. */ /* ARGSUSED */ int spec_open(void *v) { struct vop_open_args /* { struct vnode *a_vp; int a_mode; kauth_cred_t a_cred; } */ *ap = v; struct lwp *l = curlwp; struct vnode *vp = ap->a_vp; dev_t dev = (dev_t)vp->v_rdev; int error; struct partinfo pi; enum kauth_device_req req; /* * Don't allow open if fs is mounted -nodev. */ if (vp->v_mount && (vp->v_mount->mnt_flag & MNT_NODEV)) return (ENXIO); #define M2K(m) (((m) & FREAD) && ((m) & FWRITE) ? \ KAUTH_REQ_DEVICE_RAWIO_SPEC_RW : \ (m) & FWRITE ? KAUTH_REQ_DEVICE_RAWIO_SPEC_WRITE : \ KAUTH_REQ_DEVICE_RAWIO_SPEC_READ) switch (vp->v_type) { case VCHR: req = M2K(ap->a_mode); error = kauth_authorize_device_spec(ap->a_cred, req, vp); if (error) return (error); if (cdev_type(dev) == D_TTY) vp->v_vflag |= VV_ISTTY; VOP_UNLOCK(vp, 0); error = cdev_open(dev, ap->a_mode, S_IFCHR, l); vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); if (cdev_type(dev) != D_DISK) return error; break; case VBLK: req = M2K(ap->a_mode); error = kauth_authorize_device_spec(ap->a_cred, req, vp); if (error) return (error); error = bdev_open(dev, ap->a_mode, S_IFBLK, l); break; case VNON: case VLNK: case VDIR: case VREG: case VBAD: case VFIFO: case VSOCK: default: return 0; } #undef M2K if (error) return error; if (vp->v_type == VCHR) error = cdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp); else error = bdev_ioctl(vp->v_rdev, DIOCGPART, &pi, FREAD, curlwp); if (error == 0) uvm_vnp_setsize(vp, (voff_t)pi.disklab->d_secsize * pi.part->p_size); return 0; } /* * Vnode op for read */ /* ARGSUSED */ int spec_read(void *v) { struct vop_read_args /* { struct vnode *a_vp; struct uio *a_uio; int a_ioflag; kauth_cred_t a_cred; } */ *ap = v; struct vnode *vp = ap->a_vp; struct uio *uio = ap->a_uio; struct lwp *l = curlwp; struct buf *bp; daddr_t bn; int bsize, bscale; struct partinfo dpart; int n, on; int error = 0; #ifdef DIAGNOSTIC if (uio->uio_rw != UIO_READ) panic("spec_read mode"); if (&uio->uio_vmspace->vm_map != kernel_map && uio->uio_vmspace != curproc->p_vmspace) panic("spec_read proc"); #endif if (uio->uio_resid == 0) return (0); switch (vp->v_type) { case VCHR: VOP_UNLOCK(vp, 0); error = cdev_read(vp->v_rdev, uio, ap->a_ioflag); vn_lock(vp, LK_SHARED | LK_RETRY); return (error); case VBLK: if (uio->uio_offset < 0) return (EINVAL); bsize = BLKDEV_IOSIZE; if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) { if (dpart.part->p_fstype == FS_BSDFFS && dpart.part->p_frag != 0 && dpart.part->p_fsize != 0) bsize = dpart.part->p_frag * dpart.part->p_fsize; } bscale = bsize >> DEV_BSHIFT; do { bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1); on = uio->uio_offset % bsize; n = min((unsigned)(bsize - on), uio->uio_resid); error = bread(vp, bn, bsize, NOCRED, &bp); n = min(n, bsize - bp->b_resid); if (error) { brelse(bp, 0); return (error); } error = uiomove((char *)bp->b_data + on, n, uio); brelse(bp, 0); } while (error == 0 && uio->uio_resid > 0 && n != 0); return (error); default: panic("spec_read type"); } /* NOTREACHED */ } /* * Vnode op for write */ /* ARGSUSED */ int spec_write(void *v) { struct vop_write_args /* { struct vnode *a_vp; struct uio *a_uio; int a_ioflag; kauth_cred_t a_cred; } */ *ap = v; struct vnode *vp = ap->a_vp; struct uio *uio = ap->a_uio; struct lwp *l = curlwp; struct buf *bp; daddr_t bn; int bsize, bscale; struct partinfo dpart; int n, on; int error = 0; #ifdef DIAGNOSTIC if (uio->uio_rw != UIO_WRITE) panic("spec_write mode"); if (&uio->uio_vmspace->vm_map != kernel_map && uio->uio_vmspace != curproc->p_vmspace) panic("spec_write proc"); #endif switch (vp->v_type) { case VCHR: VOP_UNLOCK(vp, 0); error = cdev_write(vp->v_rdev, uio, ap->a_ioflag); vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); return (error); case VBLK: if (uio->uio_resid == 0) return (0); if (uio->uio_offset < 0) return (EINVAL); bsize = BLKDEV_IOSIZE; if (bdev_ioctl(vp->v_rdev, DIOCGPART, &dpart, FREAD, l) == 0) { if (dpart.part->p_fstype == FS_BSDFFS && dpart.part->p_frag != 0 && dpart.part->p_fsize != 0) bsize = dpart.part->p_frag * dpart.part->p_fsize; } bscale = bsize >> DEV_BSHIFT; do { bn = (uio->uio_offset >> DEV_BSHIFT) &~ (bscale - 1); on = uio->uio_offset % bsize; n = min((unsigned)(bsize - on), uio->uio_resid); if (n == bsize) bp = getblk(vp, bn, bsize, 0, 0); else error = bread(vp, bn, bsize, NOCRED, &bp); if (error) { brelse(bp, 0); return (error); } n = min(n, bsize - bp->b_resid); error = uiomove((char *)bp->b_data + on, n, uio); if (error) brelse(bp, 0); else { if (n + on == bsize) bawrite(bp); else bdwrite(bp); error = bp->b_error; } } while (error == 0 && uio->uio_resid > 0 && n != 0); return (error); default: panic("spec_write type"); } /* NOTREACHED */ } /* * Device ioctl operation. */ /* ARGSUSED */ int spec_ioctl(void *v) { struct vop_ioctl_args /* { struct vnode *a_vp; u_long a_command; void *a_data; int a_fflag; kauth_cred_t a_cred; } */ *ap = v; struct vnode *vp; dev_t dev; /* * Extract all the info we need from the vnode, taking care to * avoid a race with VOP_REVOKE(). */ vp = ap->a_vp; dev = NODEV; simple_lock(&vp->v_interlock); if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specinfo) { dev = vp->v_rdev; } simple_unlock(&vp->v_interlock); if (dev == NODEV) { return ENXIO; } switch (vp->v_type) { case VCHR: return cdev_ioctl(dev, ap->a_command, ap->a_data, ap->a_fflag, curlwp); case VBLK: return bdev_ioctl(dev, ap->a_command, ap->a_data, ap->a_fflag, curlwp); default: panic("spec_ioctl"); /* NOTREACHED */ } } /* ARGSUSED */ int spec_poll(void *v) { struct vop_poll_args /* { struct vnode *a_vp; int a_events; } */ *ap = v; struct vnode *vp; dev_t dev; /* * Extract all the info we need from the vnode, taking care to * avoid a race with VOP_REVOKE(). */ vp = ap->a_vp; dev = NODEV; simple_lock(&vp->v_interlock); if ((vp->v_iflag & VI_XLOCK) == 0 && vp->v_specinfo) { dev = vp->v_rdev; } simple_unlock(&vp->v_interlock); if (dev == NODEV) { return POLLERR; } switch (vp->v_type) { case VCHR: return cdev_poll(dev, ap->a_events, curlwp); default: return (genfs_poll(v)); } } /* ARGSUSED */ int spec_kqfilter(void *v) { struct vop_kqfilter_args /* { struct vnode *a_vp; struct proc *a_kn; } */ *ap = v; dev_t dev; switch (ap->a_vp->v_type) { case VCHR: dev = ap->a_vp->v_rdev; return cdev_kqfilter(dev, ap->a_kn); default: /* * Block devices don't support kqfilter, and refuse it * for any other files (like those vflush()ed) too. */ return (EOPNOTSUPP); } } /* * Allow mapping of only D_DISK. This is called only for VBLK. */ int spec_mmap(void *v) { struct vop_mmap_args /* { struct vnode *a_vp; vm_prot_t a_prot; kauth_cred_t a_cred; } */ *ap = v; struct vnode *vp = ap->a_vp; KASSERT(vp->v_type == VBLK); if (bdev_type(vp->v_rdev) != D_DISK) return EINVAL; return 0; } /* * Synch buffers associated with a block device */ /* ARGSUSED */ int spec_fsync(void *v) { struct vop_fsync_args /* { struct vnode *a_vp; kauth_cred_t a_cred; int a_flags; off_t offlo; off_t offhi; } */ *ap = v; struct vnode *vp = ap->a_vp; if (vp->v_type == VBLK) vflushbuf(vp, (ap->a_flags & FSYNC_WAIT) != 0); return (0); } /* * Just call the device strategy routine */ int spec_strategy(void *v) { struct vop_strategy_args /* { struct vnode *a_vp; struct buf *a_bp; } */ *ap = v; struct vnode *vp = ap->a_vp; struct buf *bp = ap->a_bp; int error; error = 0; bp->b_dev = vp->v_rdev; if (!(bp->b_flags & B_READ) && (LIST_FIRST(&bp->b_dep)) != NULL && bioopsp) bioopsp->io_start(bp); if (!(bp->b_flags & B_READ)) error = fscow_run(bp); if (error) { bp->b_error = error; biodone(bp); return (error); } bdev_strategy(bp); return (0); } int spec_inactive(void *v) { struct vop_inactive_args /* { struct vnode *a_vp; struct proc *a_l; } */ *ap = v; VOP_UNLOCK(ap->a_vp, 0); return (0); } /* * This is a noop, simply returning what one has been given. */ int spec_bmap(void *v) { struct vop_bmap_args /* { struct vnode *a_vp; daddr_t a_bn; struct vnode **a_vpp; daddr_t *a_bnp; int *a_runp; } */ *ap = v; if (ap->a_vpp != NULL) *ap->a_vpp = ap->a_vp; if (ap->a_bnp != NULL) *ap->a_bnp = ap->a_bn; if (ap->a_runp != NULL) *ap->a_runp = (MAXBSIZE >> DEV_BSHIFT) - 1; return (0); } /* * Device close routine */ /* ARGSUSED */ int spec_close(void *v) { struct vop_close_args /* { struct vnode *a_vp; int a_fflag; kauth_cred_t a_cred; } */ *ap = v; struct vnode *vp = ap->a_vp; struct session *sess; dev_t dev = vp->v_rdev; int mode, error, count, flags, flags1; count = vcount(vp); flags = vp->v_iflag; switch (vp->v_type) { case VCHR: /* * Hack: a tty device that is a controlling terminal * has a reference from the session structure. * We cannot easily tell that a character device is * a controlling terminal, unless it is the closing * process' controlling terminal. In that case, * if the reference count is 2 (this last descriptor * plus the session), release the reference from the session. * Also remove the link from the tty back to the session * and pgrp - due to the way consoles are handled we cannot * guarantee that the vrele() will do the final close on the * actual tty device. */ mutex_enter(&proclist_lock); if (count == 2 && vp == (sess = curlwp->l_proc->p_session)->s_ttyvp) { sess->s_ttyvp = NULL; if (sess->s_ttyp->t_session != NULL) { sess->s_ttyp->t_pgrp = NULL; sess->s_ttyp->t_session = NULL; mutex_exit(&proclist_lock); SESSRELE(sess); } else { if (sess->s_ttyp->t_pgrp != NULL) panic("spec_close: spurious pgrp ref"); mutex_exit(&proclist_lock); } vrele(vp); count--; } else mutex_exit(&proclist_lock); /* * If the vnode is locked, then we are in the midst * of forcably closing the device, otherwise we only * close on last reference. */ if (count > 1 && (flags & VI_XLOCK) == 0) return (0); mode = S_IFCHR; break; case VBLK: /* * On last close of a block device (that isn't mounted) * we must invalidate any in core blocks, so that * we can, for instance, change floppy disks. */ error = vinvalbuf(vp, V_SAVE, ap->a_cred, curlwp, 0, 0); if (error) return (error); /* * We do not want to really close the device if it * is still in use unless we are trying to close it * forcibly. Since every use (buffer, vnode, swap, cmap) * holds a reference to the vnode, and because we mark * any other vnodes that alias this device, when the * sum of the reference counts on all the aliased * vnodes descends to one, we are on last close. */ if (count > 1 && (flags & VI_XLOCK) == 0) return (0); mode = S_IFBLK; break; default: panic("spec_close: not special"); } flags1 = ap->a_fflag; /* * if VI_XLOCK is set, then we're going away soon, so make this * non-blocking. Also ensures that we won't wedge in vn_lock below. */ if (flags & VI_XLOCK) flags1 |= FNONBLOCK; /* * If we're able to block, release the vnode lock & reacquire. We * might end up sleeping for someone else who wants our queues. They * won't get them if we hold the vnode locked. Also, if VI_XLOCK is * set, don't release the lock as we won't be able to regain it. */ if (!(flags1 & FNONBLOCK)) VOP_UNLOCK(vp, 0); if (vp->v_type == VBLK) error = bdev_close(dev, flags1, mode, curlwp); else error = cdev_close(dev, flags1, mode, curlwp); if (!(flags1 & FNONBLOCK)) vn_lock(vp, LK_EXCLUSIVE | LK_RETRY); return (error); } /* * Print out the contents of a special device vnode. */ int spec_print(void *v) { struct vop_print_args /* { struct vnode *a_vp; } */ *ap = v; printf("tag VT_NON, dev %d, %d\n", major(ap->a_vp->v_rdev), minor(ap->a_vp->v_rdev)); return 0; } /* * Return POSIX pathconf information applicable to special devices. */ int spec_pathconf(void *v) { struct vop_pathconf_args /* { struct vnode *a_vp; int a_name; register_t *a_retval; } */ *ap = v; switch (ap->a_name) { case _PC_LINK_MAX: *ap->a_retval = LINK_MAX; return (0); case _PC_MAX_CANON: *ap->a_retval = MAX_CANON; return (0); case _PC_MAX_INPUT: *ap->a_retval = MAX_INPUT; return (0); case _PC_PIPE_BUF: *ap->a_retval = PIPE_BUF; return (0); case _PC_CHOWN_RESTRICTED: *ap->a_retval = 1; return (0); case _PC_VDISABLE: *ap->a_retval = _POSIX_VDISABLE; return (0); case _PC_SYNC_IO: *ap->a_retval = 1; return (0); default: return (EINVAL); } /* NOTREACHED */ } /* * Advisory record locking support. */ int spec_advlock(void *v) { struct vop_advlock_args /* { struct vnode *a_vp; void *a_id; int a_op; struct flock *a_fl; int a_flags; } */ *ap = v; struct vnode *vp = ap->a_vp; return lf_advlock(ap, &vp->v_speclockf, (off_t)0); }