2 * Copyright (c) 2000-2019 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
30 * Copyright (c) 1988 University of Utah.
31 * Copyright (c) 1990, 1993
32 * The Regents of the University of California. All rights reserved.
34 * This code is derived from software contributed to Berkeley by
35 * the Systems Programming Group of the University of Utah Computer
38 * Redistribution and use in source and binary forms, with or without
39 * modification, are permitted provided that the following conditions
41 * 1. Redistributions of source code must retain the above copyright
42 * notice, this list of conditions and the following disclaimer.
43 * 2. Redistributions in binary form must reproduce the above copyright
44 * notice, this list of conditions and the following disclaimer in the
45 * documentation and/or other materials provided with the distribution.
46 * 3. All advertising materials mentioning features or use of this software
47 * must display the following acknowledgement:
48 * This product includes software developed by the University of
49 * California, Berkeley and its contributors.
50 * 4. Neither the name of the University nor the names of its contributors
51 * may be used to endorse or promote products derived from this software
52 * without specific prior written permission.
54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
66 * from: Utah Hdr: vn.c 1.13 94/04/02
68 * from: @(#)vn.c 8.6 (Berkeley) 4/1/94
69 * $FreeBSD: src/sys/dev/vn/vn.c,v 1.105.2.4 2001/11/18 07:11:00 dillon Exp $
75 * Block/character interface to a vnode. Allows one to treat a file
76 * as a disk (e.g. build a filesystem in it, mount it, etc.).
78 * NOTE 1: This uses the vnop_blockmap/vnop_strategy interface to the vnode
79 * instead of a simple VOP_RDWR. We do this to avoid distorting the
82 * NOTE 2: There is a security issue involved with this driver.
83 * Once mounted all access to the contents of the "mapped" file via
84 * the special file is controlled by the permissions on the special
85 * file, the protection of the mapped file is ignored (effectively,
86 * by using root credentials in all transactions).
88 * NOTE 3: Doesn't interact with leases, should it?
95 #include <sys/param.h>
96 #include <sys/systm.h>
97 #include <sys/kernel.h>
98 #include <sys/mount.h>
99 #include <sys/namei.h>
100 #include <sys/proc.h>
101 #include <sys/kauth.h>
103 #include <sys/malloc.h>
104 #include <sys/vnode_internal.h>
105 #include <sys/fcntl.h>
106 #include <sys/conf.h>
107 #include <sys/disk.h>
108 #include <sys/stat.h>
109 #include <sys/conf.h>
110 #include <sys/uio_internal.h>
112 #include <sys/vnioctl.h>
116 #include <vm/vm_pager.h>
117 #include <mach/memory_object_types.h>
119 #include <miscfs/devfs/devfs.h>
124 vndevice_do_init(void);
126 static ioctl_fcn_t vnioctl_chr
;
127 static ioctl_fcn_t vnioctl_blk
;
128 static open_close_fcn_t vnopen
;
129 static open_close_fcn_t vnclose
;
130 static psize_fcn_t vnsize
;
131 static strategy_fcn_t vnstrategy
;
132 static read_write_fcn_t vnread
;
133 static read_write_fcn_t vnwrite
;
135 static int vndevice_bdev_major
;
136 static int vndevice_cdev_major
;
140 * D_DISK we want to look like a disk
141 * D_CANFREE We support B_FREEBUF
144 static struct bdevsw vn_bdevsw
= {
147 .d_strategy
= vnstrategy
,
148 .d_ioctl
= vnioctl_blk
,
154 static struct cdevsw vn_cdevsw
= {
159 .d_ioctl
= vnioctl_chr
,
161 .d_reset
= eno_reset
,
163 .d_select
= eno_select
,
165 .d_strategy
= eno_strat
,
166 .d_reserved_1
= eno_getc
,
167 .d_reserved_2
= eno_putc
,
172 u_int64_t sc_fsize
; /* file size in bytes */
173 u_int64_t sc_size
; /* size of vn, sc_secsize scale */
174 int sc_flags
; /* flags */
175 u_int32_t sc_secsize
; /* sector size */
176 struct vnode
*sc_vp
; /* vnode if not NULL */
179 struct vnode
*sc_shadow_vp
; /* shadow vnode if not NULL */
180 uint32_t sc_shadow_vid
;
181 shadow_map_t
* sc_shadow_map
; /* shadow map if not NULL */
182 kauth_cred_t sc_cred
; /* credentials */
183 u_int32_t sc_options
; /* options */
186 } vn_table
[NVNDEVICE
];
188 #define ROOT_IMAGE_UNIT 0
191 #define VNF_INITED 0x01
192 #define VNF_READONLY 0x02
194 static u_int32_t vn_options
;
196 #define IFOPT(vn, opt) if (((vn)->sc_options|vn_options) & (opt))
197 #define TESTOPT(vn, opt) (((vn)->sc_options|vn_options) & (opt))
199 static int setcred(struct vnode
* vp
, kauth_cred_t cred
);
200 static void vnclear(struct vn_softc
*vn
, vfs_context_t ctx
);
201 static void vn_ioctl_to_64(struct vn_ioctl_32
*from
, struct vn_ioctl_64
*to
);
202 void vndevice_init(void);
203 int vndevice_root_image(char * path
, char devname
[], dev_t
* dev_p
);
206 vniocattach_file(struct vn_softc
*vn
,
207 struct vn_ioctl_64
*vniop
,
212 vniocattach_shadow(struct vn_softc
* vn
,
213 struct vn_ioctl_64
*vniop
,
217 static __inline__
int
224 vnclose(__unused dev_t dev
, __unused
int flags
,
225 __unused
int devtype
, __unused proc_t p
)
231 vnopen(dev_t dev
, int flags
, __unused
int devtype
, __unused proc_t p
)
237 if (vnunit(dev
) >= NVNDEVICE
) {
240 vn
= vn_table
+ unit
;
241 if ((flags
& FWRITE
) && (vn
->sc_flags
& VNF_READONLY
)) {
249 file_io(struct vnode
* vp
, vfs_context_t ctx
,
250 enum uio_rw op
, char * base
, off_t offset
, user_ssize_t count
,
251 user_ssize_t
* resid
)
255 char uio_buf
[UIO_SIZEOF(1)];
257 auio
= uio_createwithbuffer(1, offset
, UIO_SYSSPACE
, op
,
258 &uio_buf
[0], sizeof(uio_buf
));
259 uio_addiov(auio
, CAST_USER_ADDR_T(base
), count
);
260 if (op
== UIO_READ
) {
261 error
= VNOP_READ(vp
, auio
, IO_SYNC
, ctx
);
263 error
= VNOP_WRITE(vp
, auio
, IO_SYNC
, ctx
);
267 *resid
= uio_resid(auio
);
272 static __inline__ off_t
273 block_round(off_t o
, int blocksize
)
275 return (o
+ blocksize
- 1) / blocksize
;
278 static __inline__ off_t
279 block_truncate(off_t o
, int blocksize
)
281 return o
/ blocksize
;
284 static __inline__
int
285 block_remainder(off_t o
, int blocksize
)
287 return o
% blocksize
;
291 vnread_shadow(struct vn_softc
* vn
, struct uio
*uio
, int ioflag
,
294 u_int32_t blocksize
= vn
->sc_secsize
;
299 user_ssize_t orig_resid
;
301 orig_resid
= resid
= uio_resid(uio
);
302 orig_offset
= offset
= uio_offset(uio
);
306 u_int32_t this_block_number
;
307 u_int32_t this_block_count
;
309 user_ssize_t this_resid
;
312 /* figure out which blocks to read */
313 remainder
= block_remainder(offset
, blocksize
);
314 if (shadow_map_read(vn
->sc_shadow_map
,
315 block_truncate(offset
, blocksize
),
316 block_round(resid
+ remainder
, blocksize
),
317 &this_block_number
, &this_block_count
)) {
318 vp
= vn
->sc_shadow_vp
;
323 /* read the blocks (or parts thereof) */
324 this_offset
= (off_t
)this_block_number
* blocksize
+ remainder
;
325 uio_setoffset(uio
, this_offset
);
326 this_resid
= this_block_count
* blocksize
- remainder
;
327 if (this_resid
> resid
) {
330 uio_setresid(uio
, this_resid
);
331 error
= VNOP_READ(vp
, uio
, ioflag
, ctx
);
336 /* figure out how much we actually read */
337 this_resid
-= uio_resid(uio
);
338 if (this_resid
== 0) {
339 printf("vn device: vnread_shadow zero length read\n");
343 offset
+= this_resid
;
345 uio_setresid(uio
, resid
);
346 uio_setoffset(uio
, offset
);
351 vncopy_block_to_shadow(struct vn_softc
* vn
, vfs_context_t ctx
,
352 u_int32_t file_block
, u_int32_t shadow_block
)
357 tmpbuf
= _MALLOC(vn
->sc_secsize
, M_TEMP
, M_WAITOK
);
358 if (tmpbuf
== NULL
) {
361 /* read one block from file at file_block offset */
362 error
= file_io(vn
->sc_vp
, ctx
, UIO_READ
,
363 tmpbuf
, (off_t
)file_block
* vn
->sc_secsize
,
364 vn
->sc_secsize
, NULL
);
368 /* write one block to shadow file at shadow_block offset */
369 error
= file_io(vn
->sc_shadow_vp
, ctx
, UIO_WRITE
,
370 tmpbuf
, (off_t
)shadow_block
* vn
->sc_secsize
,
371 vn
->sc_secsize
, NULL
);
373 FREE(tmpbuf
, M_TEMP
);
378 FLAGS_FIRST_BLOCK_PARTIAL
= 0x1,
379 FLAGS_LAST_BLOCK_PARTIAL
= 0x2
383 vnwrite_shadow(struct vn_softc
* vn
, struct uio
*uio
, int ioflag
,
386 u_int32_t blocksize
= vn
->sc_secsize
;
391 resid
= uio_resid(uio
);
392 offset
= uio_offset(uio
);
396 u_int32_t offset_block_number
;
398 u_int32_t resid_block_count
;
399 u_int32_t shadow_block_count
;
400 u_int32_t shadow_block_number
;
401 user_ssize_t this_resid
;
403 /* figure out which blocks to write */
404 offset_block_number
= block_truncate(offset
, blocksize
);
405 remainder
= block_remainder(offset
, blocksize
);
406 resid_block_count
= block_round(resid
+ remainder
, blocksize
);
407 /* figure out if the first or last blocks are partial writes */
409 && !shadow_map_is_written(vn
->sc_shadow_map
,
410 offset_block_number
)) {
411 /* the first block is a partial write */
412 flags
|= FLAGS_FIRST_BLOCK_PARTIAL
;
414 if (resid_block_count
> 1
415 && !shadow_map_is_written(vn
->sc_shadow_map
,
417 + resid_block_count
- 1)
418 && block_remainder(offset
+ resid
, blocksize
) > 0) {
419 /* the last block is a partial write */
420 flags
|= FLAGS_LAST_BLOCK_PARTIAL
;
422 if (shadow_map_write(vn
->sc_shadow_map
,
423 offset_block_number
, resid_block_count
,
424 &shadow_block_number
,
425 &shadow_block_count
)) {
426 /* shadow file is growing */
428 /* truncate the file to its new length before write */
430 size
= (off_t
)shadow_map_shadow_size(vn
->sc_shadow_map
)
432 vnode_setsize(vn
->sc_shadow_vp
, size
, IO_SYNC
, ctx
);
435 /* write the blocks (or parts thereof) */
436 uio_setoffset(uio
, (off_t
)
437 shadow_block_number
* blocksize
+ remainder
);
438 this_resid
= (off_t
)shadow_block_count
* blocksize
- remainder
;
439 if (this_resid
>= resid
) {
441 if ((flags
& FLAGS_LAST_BLOCK_PARTIAL
) != 0) {
442 /* copy the last block to the shadow */
446 s
= offset_block_number
447 + resid_block_count
- 1;
448 d
= shadow_block_number
449 + shadow_block_count
- 1;
450 error
= vncopy_block_to_shadow(vn
, ctx
, s
, d
);
452 printf("vnwrite_shadow: failed to copy"
453 " block %u to shadow block %u\n",
459 uio_setresid(uio
, this_resid
);
460 if ((flags
& FLAGS_FIRST_BLOCK_PARTIAL
) != 0) {
461 /* copy the first block to the shadow */
462 error
= vncopy_block_to_shadow(vn
, ctx
,
464 shadow_block_number
);
466 printf("vnwrite_shadow: failed to"
467 " copy block %u to shadow block %u\n",
469 shadow_block_number
);
473 error
= VNOP_WRITE(vn
->sc_shadow_vp
, uio
, ioflag
, ctx
);
477 /* figure out how much we actually wrote */
478 this_resid
-= uio_resid(uio
);
479 if (this_resid
== 0) {
480 printf("vn device: vnwrite_shadow zero length write\n");
484 offset
+= this_resid
;
486 uio_setresid(uio
, resid
);
487 uio_setoffset(uio
, offset
);
492 vnread(dev_t dev
, struct uio
*uio
, int ioflag
)
494 struct vfs_context context
;
499 struct vn_softc
* vn
;
503 if (vnunit(dev
) >= NVNDEVICE
) {
507 vn
= vn_table
+ unit
;
508 if ((vn
->sc_flags
& VNF_INITED
) == 0) {
513 context
.vc_thread
= current_thread();
514 context
.vc_ucred
= vn
->sc_cred
;
516 error
= vnode_getwithvid(vn
->sc_vp
, vn
->sc_vid
);
518 /* the vnode is no longer available, abort */
520 vnclear(vn
, &context
);
524 resid
= uio_resid(uio
);
525 offset
= uio_offset(uio
);
528 * If out of bounds return an error. If at the EOF point,
531 if (offset
>= (off_t
)vn
->sc_fsize
) {
532 if (offset
> (off_t
)vn
->sc_fsize
) {
538 * If the request crosses EOF, truncate the request.
540 if ((offset
+ resid
) > (off_t
)vn
->sc_fsize
) {
541 resid
= vn
->sc_fsize
- offset
;
542 uio_setresid(uio
, resid
);
545 if (vn
->sc_shadow_vp
!= NULL
) {
546 error
= vnode_getwithvid(vn
->sc_shadow_vp
,
549 /* the vnode is no longer available, abort */
551 vnode_put(vn
->sc_vp
);
552 vnclear(vn
, &context
);
555 error
= vnread_shadow(vn
, uio
, ioflag
, &context
);
556 vnode_put(vn
->sc_shadow_vp
);
558 error
= VNOP_READ(vn
->sc_vp
, uio
, ioflag
, &context
);
560 vnode_put(vn
->sc_vp
);
566 vnwrite(dev_t dev
, struct uio
*uio
, int ioflag
)
568 struct vfs_context context
;
573 struct vn_softc
* vn
;
577 if (vnunit(dev
) >= NVNDEVICE
) {
581 vn
= vn_table
+ unit
;
582 if ((vn
->sc_flags
& VNF_INITED
) == 0) {
586 if (vn
->sc_flags
& VNF_READONLY
) {
591 context
.vc_thread
= current_thread();
592 context
.vc_ucred
= vn
->sc_cred
;
594 error
= vnode_getwithvid(vn
->sc_vp
, vn
->sc_vid
);
596 /* the vnode is no longer available, abort */
598 vnclear(vn
, &context
);
601 resid
= uio_resid(uio
);
602 offset
= uio_offset(uio
);
605 * If out of bounds return an error. If at the EOF point,
608 if (offset
>= (off_t
)vn
->sc_fsize
) {
609 if (offset
> (off_t
)vn
->sc_fsize
) {
615 * If the request crosses EOF, truncate the request.
617 if ((offset
+ resid
) > (off_t
)vn
->sc_fsize
) {
618 resid
= (off_t
)vn
->sc_fsize
- offset
;
619 uio_setresid(uio
, resid
);
622 if (vn
->sc_shadow_vp
!= NULL
) {
623 error
= vnode_getwithvid(vn
->sc_shadow_vp
,
626 /* the vnode is no longer available, abort */
628 vnode_put(vn
->sc_vp
);
629 vnclear(vn
, &context
);
632 error
= vnwrite_shadow(vn
, uio
, ioflag
, &context
);
633 vnode_put(vn
->sc_shadow_vp
);
635 error
= VNOP_WRITE(vn
->sc_vp
, uio
, ioflag
, &context
);
637 vnode_put(vn
->sc_vp
);
643 shadow_read(struct vn_softc
* vn
, struct buf
* bp
, char * base
,
646 u_int32_t blocksize
= vn
->sc_secsize
;
649 boolean_t read_shadow
;
653 offset
= buf_blkno(bp
);
654 resid
= buf_resid(bp
) / blocksize
;
656 user_ssize_t temp_resid
;
657 u_int32_t this_offset
;
658 u_int32_t this_resid
;
661 read_shadow
= shadow_map_read(vn
->sc_shadow_map
,
663 &this_offset
, &this_resid
);
665 vp
= vn
->sc_shadow_vp
;
669 error
= file_io(vp
, ctx
, UIO_READ
, base
+ start
,
670 (off_t
)this_offset
* blocksize
,
671 (user_ssize_t
)this_resid
* blocksize
,
676 this_resid
-= (temp_resid
/ blocksize
);
677 if (this_resid
== 0) {
678 printf("vn device: shadow_read zero length read\n");
682 offset
+= this_resid
;
683 start
+= this_resid
* blocksize
;
685 buf_setresid(bp
, resid
* blocksize
);
690 shadow_write(struct vn_softc
* vn
, struct buf
* bp
, char * base
,
693 u_int32_t blocksize
= vn
->sc_secsize
;
696 boolean_t shadow_grew
;
700 offset
= buf_blkno(bp
);
701 resid
= buf_resid(bp
) / blocksize
;
703 user_ssize_t temp_resid
;
704 u_int32_t this_offset
;
705 u_int32_t this_resid
;
707 shadow_grew
= shadow_map_write(vn
->sc_shadow_map
,
709 &this_offset
, &this_resid
);
713 /* truncate the file to its new length before write */
714 size
= (off_t
)shadow_map_shadow_size(vn
->sc_shadow_map
)
716 vnode_setsize(vn
->sc_shadow_vp
, size
, IO_SYNC
, ctx
);
719 error
= file_io(vn
->sc_shadow_vp
, ctx
, UIO_WRITE
,
721 (off_t
)this_offset
* blocksize
,
722 (user_ssize_t
)this_resid
* blocksize
,
727 this_resid
-= (temp_resid
/ blocksize
);
728 if (this_resid
== 0) {
729 printf("vn device: shadow_write zero length write\n");
733 offset
+= this_resid
;
734 start
+= this_resid
* blocksize
;
736 buf_setresid(bp
, resid
* blocksize
);
741 vn_readwrite_io(struct vn_softc
* vn
, struct buf
* bp
, vfs_context_t ctx
)
747 if (buf_map(bp
, &vaddr
)) {
748 panic("vn device: buf_map failed");
750 iov_base
= (char *)vaddr
;
752 if (vn
->sc_shadow_vp
== NULL
) {
753 user_ssize_t temp_resid
;
755 error
= file_io(vn
->sc_vp
, ctx
,
756 buf_flags(bp
) & B_READ
? UIO_READ
: UIO_WRITE
,
758 (off_t
)buf_blkno(bp
) * vn
->sc_secsize
,
759 buf_resid(bp
), &temp_resid
);
760 buf_setresid(bp
, temp_resid
);
762 if (buf_flags(bp
) & B_READ
) {
763 error
= shadow_read(vn
, bp
, iov_base
, ctx
);
765 error
= shadow_write(vn
, bp
, iov_base
, ctx
);
774 vnstrategy(struct buf
*bp
)
778 long sz
; /* in sc_secsize chunks */
780 struct vnode
* shadow_vp
= NULL
;
781 struct vnode
* vp
= NULL
;
782 struct vfs_context context
;
784 vn
= vn_table
+ vnunit(buf_device(bp
));
785 if ((vn
->sc_flags
& VNF_INITED
) == 0) {
790 context
.vc_thread
= current_thread();
791 context
.vc_ucred
= vn
->sc_cred
;
793 buf_setresid(bp
, buf_count(bp
));
795 * Check for required alignment. Transfers must be a valid
796 * multiple of the sector size.
798 blk_num
= buf_blkno(bp
);
799 if (buf_count(bp
) % vn
->sc_secsize
!= 0) {
803 sz
= howmany(buf_count(bp
), vn
->sc_secsize
);
806 * If out of bounds return an error. If at the EOF point,
807 * simply read or write less.
809 if (blk_num
>= 0 && (u_int64_t
)blk_num
>= vn
->sc_size
) {
810 if (blk_num
> 0 && (u_int64_t
)blk_num
> vn
->sc_size
) {
816 * If the request crosses EOF, truncate the request.
818 if ((blk_num
+ sz
) > 0 && ((u_int64_t
)(blk_num
+ sz
)) > vn
->sc_size
) {
819 buf_setcount(bp
, (vn
->sc_size
- blk_num
) * vn
->sc_secsize
);
820 buf_setresid(bp
, buf_count(bp
));
828 error
= vnode_getwithvid(vp
, vn
->sc_vid
);
830 /* the vnode is no longer available, abort */
832 vnclear(vn
, &context
);
835 shadow_vp
= vn
->sc_shadow_vp
;
836 if (shadow_vp
!= NULL
) {
837 error
= vnode_getwithvid(shadow_vp
,
840 /* the vnode is no longer available, abort */
842 vnode_put(vn
->sc_vp
);
843 vnclear(vn
, &context
);
848 error
= vn_readwrite_io(vn
, bp
, &context
);
850 if (shadow_vp
!= NULL
) {
851 vnode_put(shadow_vp
);
856 buf_seterror(bp
, error
);
864 vnioctl(dev_t dev
, u_long cmd
, caddr_t data
,
865 __unused
int flag
, proc_t p
,
869 struct vn_ioctl_64
*viop
;
874 struct vfsioattr ioattr
;
875 struct vn_ioctl_64 user_vnio
;
876 struct vfs_context context
;
879 if (vnunit(dev
) >= NVNDEVICE
) {
883 vn
= vn_table
+ unit
;
884 error
= proc_suser(p
);
889 context
.vc_thread
= current_thread();
890 context
.vc_ucred
= vn
->sc_cred
;
892 viop
= (struct vn_ioctl_64
*)data
;
893 f
= (u_int32_t
*)data
;
894 o
= (u_int64_t
*)data
;
903 case DKIOCGETBLOCKSIZE
:
904 case DKIOCSETBLOCKSIZE
:
905 case DKIOCGETMAXBLOCKCOUNTREAD
:
906 case DKIOCGETMAXBLOCKCOUNTWRITE
:
907 case DKIOCGETMAXSEGMENTCOUNTREAD
:
908 case DKIOCGETMAXSEGMENTCOUNTWRITE
:
909 case DKIOCGETMAXSEGMENTBYTECOUNTREAD
:
910 case DKIOCGETMAXSEGMENTBYTECOUNTWRITE
:
911 case DKIOCGETBLOCKCOUNT
:
912 if ((vn
->sc_flags
& VNF_INITED
) == 0) {
921 if (vn
->sc_vp
!= NULL
) {
922 vfs_ioattr(vnode_mount(vn
->sc_vp
), &ioattr
);
924 bzero(&ioattr
, sizeof(ioattr
));
931 case DKIOCGETMAXBLOCKCOUNTREAD
:
932 *o
= ioattr
.io_maxreadcnt
/ vn
->sc_secsize
;
934 case DKIOCGETMAXBLOCKCOUNTWRITE
:
935 *o
= ioattr
.io_maxwritecnt
/ vn
->sc_secsize
;
937 case DKIOCGETMAXBYTECOUNTREAD
:
938 *o
= ioattr
.io_maxreadcnt
;
940 case DKIOCGETMAXBYTECOUNTWRITE
:
941 *o
= ioattr
.io_maxwritecnt
;
943 case DKIOCGETMAXSEGMENTCOUNTREAD
:
944 *o
= ioattr
.io_segreadcnt
;
946 case DKIOCGETMAXSEGMENTCOUNTWRITE
:
947 *o
= ioattr
.io_segwritecnt
;
949 case DKIOCGETMAXSEGMENTBYTECOUNTREAD
:
950 *o
= ioattr
.io_maxsegreadsize
;
952 case DKIOCGETMAXSEGMENTBYTECOUNTWRITE
:
953 *o
= ioattr
.io_maxsegwritesize
;
955 case DKIOCGETBLOCKSIZE
:
958 case DKIOCSETBLOCKSIZE
:
960 /* can only set block size on block device */
964 if (*f
< DEV_BSIZE
) {
968 if (vn
->sc_shadow_vp
!= NULL
) {
969 if (*f
== (unsigned)vn
->sc_secsize
) {
972 /* can't change the block size if already shadowing */
977 /* recompute the size in terms of the new blocksize */
978 vn
->sc_size
= vn
->sc_fsize
/ vn
->sc_secsize
;
980 case DKIOCISWRITABLE
:
983 case DKIOCGETBLOCKCOUNT
:
993 if (vn
->sc_shadow_vp
!= NULL
) {
997 if (vn
->sc_vp
== NULL
) {
998 /* much be attached before we can shadow */
1002 if (!proc_is64bit(p
)) {
1003 /* downstream code expects LP64 version of vn_ioctl structure */
1004 vn_ioctl_to_64((struct vn_ioctl_32
*)viop
, &user_vnio
);
1007 if (viop
->vn_file
== USER_ADDR_NULL
) {
1011 error
= vniocattach_shadow(vn
, viop
, dev
, 0, p
);
1022 /* attach only on block device */
1026 if (vn
->sc_flags
& VNF_INITED
) {
1030 if (!proc_is64bit(p
)) {
1031 /* downstream code expects LP64 version of vn_ioctl structure */
1032 vn_ioctl_to_64((struct vn_ioctl_32
*)viop
, &user_vnio
);
1035 if (viop
->vn_file
== USER_ADDR_NULL
) {
1039 error
= vniocattach_file(vn
, viop
, dev
, 0, p
);
1050 /* detach only on block device */
1054 /* Note: spec_open won't open a mounted block device */
1057 * XXX handle i/o in progress. Return EBUSY, or wait, or
1059 * XXX handle multiple opens of the device. Return EBUSY,
1060 * or revoke the fd's.
1061 * How are these problems handled for removable and failing
1062 * hardware devices? (Hint: They are not)
1064 vnclear(vn
, &context
);
1073 vn_options
&= ~(*f
);
1078 vn
->sc_options
|= *f
;
1079 *f
= vn
->sc_options
;
1083 vn
->sc_options
&= ~(*f
);
1084 *f
= vn
->sc_options
;
1096 vnioctl_chr(dev_t dev
, u_long cmd
, caddr_t data
, int flag
, proc_t p
)
1098 return vnioctl(dev
, cmd
, data
, flag
, p
, TRUE
);
1102 vnioctl_blk(dev_t dev
, u_long cmd
, caddr_t data
, int flag
, proc_t p
)
1104 return vnioctl(dev
, cmd
, data
, flag
, p
, FALSE
);
1110 * Attach a file to a VN partition. Return the size in the vn_size
1115 vniocattach_file(struct vn_softc
*vn
,
1116 struct vn_ioctl_64
*vniop
,
1122 vfs_context_t ctx
= vfs_context_current();
1124 struct nameidata nd
;
1128 flags
= FREAD
| FWRITE
;
1130 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
, UIO_SYSSPACE
, vniop
->vn_file
, ctx
);
1132 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
,
1133 (IS_64BIT_PROCESS(p
) ? UIO_USERSPACE64
: UIO_USERSPACE32
),
1134 vniop
->vn_file
, ctx
);
1136 /* vn_open gives both long- and short-term references */
1137 error
= vn_open(&nd
, flags
, 0);
1139 if (error
!= EACCES
&& error
!= EPERM
&& error
!= EROFS
) {
1144 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
, UIO_SYSSPACE
,
1145 vniop
->vn_file
, ctx
);
1147 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
,
1148 (IS_64BIT_PROCESS(p
) ? UIO_USERSPACE64
: UIO_USERSPACE32
),
1149 vniop
->vn_file
, ctx
);
1151 error
= vn_open(&nd
, flags
, 0);
1156 if (nd
.ni_vp
->v_type
!= VREG
) {
1159 error
= vnode_size(nd
.ni_vp
, &file_size
, ctx
);
1162 (void) vn_close(nd
.ni_vp
, flags
, ctx
);
1163 vnode_put(nd
.ni_vp
);
1166 cred
= kauth_cred_proc_ref(p
);
1167 nd
.ni_vp
->v_flag
|= VNOCACHE_DATA
;
1168 error
= setcred(nd
.ni_vp
, cred
);
1170 (void)vn_close(nd
.ni_vp
, flags
, ctx
);
1171 vnode_put(nd
.ni_vp
);
1172 kauth_cred_unref(&cred
);
1175 vn
->sc_secsize
= DEV_BSIZE
;
1176 vn
->sc_fsize
= file_size
;
1177 vn
->sc_size
= file_size
/ vn
->sc_secsize
;
1178 vn
->sc_vp
= nd
.ni_vp
;
1179 vn
->sc_vid
= vnode_vid(nd
.ni_vp
);
1180 vn
->sc_open_flags
= flags
;
1182 cdev
= makedev(vndevice_cdev_major
, minor(dev
));
1183 vn
->sc_cdev
= devfs_make_node(cdev
, DEVFS_CHAR
,
1184 UID_ROOT
, GID_OPERATOR
,
1187 vn
->sc_flags
|= VNF_INITED
;
1188 if (flags
== FREAD
) {
1189 vn
->sc_flags
|= VNF_READONLY
;
1191 /* lose the short-term reference */
1192 vnode_put(nd
.ni_vp
);
1197 vniocattach_shadow(struct vn_softc
*vn
, struct vn_ioctl_64
*vniop
,
1198 __unused dev_t dev
, int in_kernel
, proc_t p
)
1200 vfs_context_t ctx
= vfs_context_current();
1201 struct nameidata nd
;
1206 flags
= FREAD
| FWRITE
;
1208 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
, UIO_SYSSPACE
, vniop
->vn_file
, ctx
);
1210 NDINIT(&nd
, LOOKUP
, OP_OPEN
, FOLLOW
,
1211 (IS_64BIT_PROCESS(p
) ? UIO_USERSPACE64
: UIO_USERSPACE32
),
1212 vniop
->vn_file
, ctx
);
1214 /* vn_open gives both long- and short-term references */
1215 error
= vn_open(&nd
, flags
, 0);
1217 /* shadow MUST be writable! */
1220 if (nd
.ni_vp
->v_type
!= VREG
1221 || (error
= vnode_size(nd
.ni_vp
, &file_size
, ctx
))) {
1222 (void)vn_close(nd
.ni_vp
, flags
, ctx
);
1223 vnode_put(nd
.ni_vp
);
1224 return error
? error
: EINVAL
;
1226 map
= shadow_map_create(vn
->sc_fsize
, file_size
,
1229 (void)vn_close(nd
.ni_vp
, flags
, ctx
);
1230 vnode_put(nd
.ni_vp
);
1231 vn
->sc_shadow_vp
= NULL
;
1234 vn
->sc_shadow_vp
= nd
.ni_vp
;
1235 vn
->sc_shadow_vid
= vnode_vid(nd
.ni_vp
);
1236 vn
->sc_shadow_vp
->v_flag
|= VNOCACHE_DATA
;
1237 vn
->sc_shadow_map
= map
;
1238 vn
->sc_flags
&= ~VNF_READONLY
; /* we're now read/write */
1240 /* lose the short-term reference */
1241 vnode_put(nd
.ni_vp
);
1246 vndevice_root_image(char * path
, char devname
[], dev_t
* dev_p
)
1249 struct vn_softc
* vn
;
1250 struct vn_ioctl_64 vnio
;
1252 vnio
.vn_file
= CAST_USER_ADDR_T(path
);
1255 vn
= vn_table
+ ROOT_IMAGE_UNIT
;
1256 *dev_p
= makedev(vndevice_bdev_major
,
1258 snprintf(devname
, 16, "vn%d", ROOT_IMAGE_UNIT
);
1259 error
= vniocattach_file(vn
, &vnio
, *dev_p
, 1, current_proc());
1264 * Duplicate the current processes' credentials. Since we are called only
1265 * as the result of a SET ioctl and only root can do that, any future access
1266 * to this "disk" is essentially as root. Note that credentials may change
1267 * if some other uid can write directly to the mapped file (NFS).
1270 setcred(struct vnode
* vp
, kauth_cred_t cred
)
1274 struct vfs_context context
;
1277 * Horrible kludge to establish credentials for NFS XXX.
1279 context
.vc_thread
= current_thread();
1280 context
.vc_ucred
= cred
;
1281 tmpbuf
= _MALLOC(DEV_BSIZE
, M_TEMP
, M_WAITOK
);
1282 error
= file_io(vp
, &context
, UIO_READ
, tmpbuf
, 0, DEV_BSIZE
, NULL
);
1283 FREE(tmpbuf
, M_TEMP
);
1288 vnclear(struct vn_softc
*vn
, vfs_context_t ctx
)
1290 if (vn
->sc_vp
!= NULL
) {
1291 /* release long-term reference */
1292 (void)vn_close(vn
->sc_vp
, vn
->sc_open_flags
, ctx
);
1295 if (vn
->sc_shadow_vp
!= NULL
) {
1296 /* release long-term reference */
1297 (void)vn_close(vn
->sc_shadow_vp
, FREAD
| FWRITE
, ctx
);
1298 vn
->sc_shadow_vp
= NULL
;
1300 if (vn
->sc_shadow_map
!= NULL
) {
1301 shadow_map_free(vn
->sc_shadow_map
);
1302 vn
->sc_shadow_map
= NULL
;
1304 vn
->sc_flags
&= ~(VNF_INITED
| VNF_READONLY
);
1306 kauth_cred_unref(&vn
->sc_cred
);
1311 devfs_remove(vn
->sc_cdev
);
1320 struct vn_softc
*vn
;
1324 if (vnunit(dev
) >= NVNDEVICE
) {
1328 vn
= vn_table
+ unit
;
1329 if ((vn
->sc_flags
& VNF_INITED
) == 0) {
1332 secsize
= vn
->sc_secsize
;
1338 #define CDEV_MAJOR -1
1339 #define BDEV_MAJOR -1
1340 static int vndevice_inited
= 0;
1345 if (vndevice_inited
) {
1353 vndevice_do_init( void )
1357 vndevice_bdev_major
= bdevsw_add(BDEV_MAJOR
, &vn_bdevsw
);
1359 if (vndevice_bdev_major
< 0) {
1360 printf("vndevice_init: bdevsw_add() returned %d\n",
1361 vndevice_bdev_major
);
1364 vndevice_cdev_major
= cdevsw_add_with_bdev(CDEV_MAJOR
, &vn_cdevsw
,
1365 vndevice_bdev_major
);
1366 if (vndevice_cdev_major
< 0) {
1367 printf("vndevice_init: cdevsw_add() returned %d\n",
1368 vndevice_cdev_major
);
1371 for (i
= 0; i
< NVNDEVICE
; i
++) {
1372 dev_t dev
= makedev(vndevice_bdev_major
, i
);
1373 vn_table
[i
].sc_bdev
= devfs_make_node(dev
, DEVFS_BLOCK
,
1374 UID_ROOT
, GID_OPERATOR
,
1377 if (vn_table
[i
].sc_bdev
== NULL
) {
1378 printf("vninit: devfs_make_node failed!\n");
1384 vn_ioctl_to_64(struct vn_ioctl_32
*from
, struct vn_ioctl_64
*to
)
1386 to
->vn_file
= CAST_USER_ADDR_T(from
->vn_file
);
1387 to
->vn_size
= from
->vn_size
;
1388 to
->vn_control
= from
->vn_control
;
1391 #endif /* NVNDEVICE */