2023-05-15 03:54:51 +00:00
|
|
|
/* $OpenBSD: vnd.c,v 1.181 2023/05/14 18:34:02 krw Exp $ */
|
2023-04-30 01:15:27 +00:00
|
|
|
/* $NetBSD: vnd.c,v 1.26 1996/03/30 23:06:11 christos Exp $ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1988 University of Utah.
|
|
|
|
* Copyright (c) 1990, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* the Systems Programming Group of the University of Utah Computer
|
|
|
|
* Science Department.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* There is a security issue involved with this driver.
|
|
|
|
*
|
|
|
|
* Once mounted all access to the contents of the "mapped" file via
|
|
|
|
* the special file is controlled by the permissions on the special
|
|
|
|
* file, the protection of the mapped file is ignored (effectively,
|
|
|
|
* by using root credentials in all transactions).
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/namei.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/limits.h>
|
|
|
|
#include <sys/buf.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/disklabel.h>
|
|
|
|
#include <sys/device.h>
|
|
|
|
#include <sys/disk.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/vnode.h>
|
|
|
|
#include <sys/fcntl.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <sys/conf.h>
|
|
|
|
#include <sys/dkio.h>
|
|
|
|
#include <sys/specdev.h>
|
|
|
|
|
|
|
|
#include <crypto/blf.h>
|
|
|
|
|
|
|
|
#include <dev/vndioctl.h>
|
|
|
|
|
|
|
|
#ifdef VNDDEBUG
|
|
|
|
int vnddebug = 0x00;
|
|
|
|
#define VDB_FOLLOW 0x01
|
|
|
|
#define VDB_INIT 0x02
|
|
|
|
#define VDB_IO 0x04
|
|
|
|
#define DNPRINTF(f, p...) do { if ((f) & vnddebug) printf(p); } while (0)
|
|
|
|
#else
|
|
|
|
#define DNPRINTF(f, p...) /* nothing */
|
|
|
|
#endif /* VNDDEBUG */
|
|
|
|
|
|
|
|
struct vnd_softc {
|
|
|
|
struct device sc_dev;
|
|
|
|
struct disk sc_dk;
|
|
|
|
|
|
|
|
char sc_file[VNDNLEN]; /* file we're covering */
|
|
|
|
int sc_flags; /* flags */
|
2023-05-15 03:54:51 +00:00
|
|
|
uint16_t sc_type; /* d_type we are emulating */
|
2023-04-30 01:15:27 +00:00
|
|
|
size_t sc_size; /* size of vnd in sectors */
|
|
|
|
size_t sc_secsize; /* sector size in bytes */
|
|
|
|
size_t sc_nsectors; /* # of sectors per track */
|
|
|
|
size_t sc_ntracks; /* # of tracks per cylinder */
|
|
|
|
struct vnode *sc_vp; /* vnode */
|
|
|
|
struct ucred *sc_cred; /* credentials */
|
|
|
|
blf_ctx *sc_keyctx; /* key context */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* sc_flags */
|
|
|
|
#define VNF_INITED 0x0001
|
|
|
|
#define VNF_HAVELABEL 0x0002
|
|
|
|
#define VNF_READONLY 0x0004
|
|
|
|
|
|
|
|
#define VNDRW(v) ((v)->sc_flags & VNF_READONLY ? FREAD : FREAD|FWRITE)
|
|
|
|
|
|
|
|
struct vnd_softc *vnd_softc;
|
|
|
|
int numvnd = 0;
|
|
|
|
|
|
|
|
/* called by main() at boot time */
|
|
|
|
void vndattach(int);
|
|
|
|
|
|
|
|
void vndclear(struct vnd_softc *);
|
|
|
|
int vndsetcred(struct proc *p, struct vnode *, struct vnd_ioctl *,
|
|
|
|
struct ucred **);
|
|
|
|
int vndgetdisklabel(dev_t, struct vnd_softc *, struct disklabel *, int);
|
|
|
|
void vndencrypt(struct vnd_softc *, caddr_t, size_t, daddr_t, int);
|
|
|
|
void vndencryptbuf(struct vnd_softc *, struct buf *, int);
|
|
|
|
size_t vndbdevsize(struct vnode *, struct proc *);
|
|
|
|
|
|
|
|
void
|
|
|
|
vndencrypt(struct vnd_softc *sc, caddr_t addr, size_t size, daddr_t off,
|
|
|
|
int encrypt)
|
|
|
|
{
|
|
|
|
int i, bsize;
|
|
|
|
u_char iv[8];
|
|
|
|
|
|
|
|
bsize = dbtob(1);
|
|
|
|
for (i = 0; i < size/bsize; i++) {
|
|
|
|
memset(iv, 0, sizeof(iv));
|
|
|
|
memcpy(iv, &off, sizeof(off));
|
|
|
|
blf_ecb_encrypt(sc->sc_keyctx, iv, sizeof(iv));
|
|
|
|
if (encrypt)
|
|
|
|
blf_cbc_encrypt(sc->sc_keyctx, iv, addr, bsize);
|
|
|
|
else
|
|
|
|
blf_cbc_decrypt(sc->sc_keyctx, iv, addr, bsize);
|
|
|
|
|
|
|
|
addr += bsize;
|
|
|
|
off++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vndencryptbuf(struct vnd_softc *sc, struct buf *bp, int encrypt)
|
|
|
|
{
|
|
|
|
vndencrypt(sc, bp->b_data, bp->b_bcount, bp->b_blkno, encrypt);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vndattach(int num)
|
|
|
|
{
|
|
|
|
char *mem;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (num <= 0)
|
|
|
|
return;
|
|
|
|
mem = mallocarray(num, sizeof(struct vnd_softc), M_DEVBUF,
|
|
|
|
M_NOWAIT | M_ZERO);
|
|
|
|
if (mem == NULL) {
|
|
|
|
printf("WARNING: no memory for vnode disks\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
vnd_softc = (struct vnd_softc *)mem;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
struct vnd_softc *sc = &vnd_softc[i];
|
|
|
|
|
|
|
|
sc->sc_dev.dv_unit = i;
|
|
|
|
snprintf(sc->sc_dev.dv_xname, sizeof(sc->sc_dev.dv_xname),
|
|
|
|
"vnd%d", i);
|
|
|
|
disk_construct(&sc->sc_dk);
|
|
|
|
device_ref(&sc->sc_dev);
|
|
|
|
}
|
|
|
|
numvnd = num;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vndopen(dev_t dev, int flags, int mode, struct proc *p)
|
|
|
|
{
|
|
|
|
int unit = DISKUNIT(dev);
|
|
|
|
struct vnd_softc *sc;
|
|
|
|
int error = 0, part;
|
|
|
|
|
|
|
|
DNPRINTF(VDB_FOLLOW, "vndopen(%x, %x, %x, %p)\n", dev, flags, mode, p);
|
|
|
|
|
|
|
|
if (unit >= numvnd)
|
|
|
|
return (ENXIO);
|
|
|
|
sc = &vnd_softc[unit];
|
|
|
|
|
|
|
|
if ((error = disk_lock(&sc->sc_dk)) != 0)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if ((flags & FWRITE) && (sc->sc_flags & VNF_READONLY)) {
|
|
|
|
error = EROFS;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((sc->sc_flags & VNF_INITED) &&
|
|
|
|
(sc->sc_flags & VNF_HAVELABEL) == 0 &&
|
|
|
|
sc->sc_dk.dk_openmask == 0) {
|
|
|
|
sc->sc_flags |= VNF_HAVELABEL;
|
|
|
|
vndgetdisklabel(dev, sc, sc->sc_dk.dk_label, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
part = DISKPART(dev);
|
|
|
|
error = disk_openpart(&sc->sc_dk, part, mode,
|
|
|
|
(sc->sc_flags & VNF_HAVELABEL) != 0);
|
|
|
|
|
|
|
|
bad:
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Load the label information on the named device
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
vndgetdisklabel(dev_t dev, struct vnd_softc *sc, struct disklabel *lp,
|
|
|
|
int spoofonly)
|
|
|
|
{
|
|
|
|
memset(lp, 0, sizeof(struct disklabel));
|
|
|
|
|
|
|
|
lp->d_secsize = sc->sc_secsize;
|
|
|
|
lp->d_nsectors = sc->sc_nsectors;
|
|
|
|
lp->d_ntracks = sc->sc_ntracks;
|
|
|
|
lp->d_secpercyl = lp->d_ntracks * lp->d_nsectors;
|
|
|
|
if (lp->d_secpercyl)
|
|
|
|
lp->d_ncylinders = sc->sc_size / lp->d_secpercyl;
|
|
|
|
|
|
|
|
strncpy(lp->d_typename, "vnd device", sizeof(lp->d_typename));
|
2023-05-15 03:54:51 +00:00
|
|
|
lp->d_type = sc->sc_type;
|
2023-04-30 01:15:27 +00:00
|
|
|
strncpy(lp->d_packname, "fictitious", sizeof(lp->d_packname));
|
|
|
|
DL_SETDSIZE(lp, sc->sc_size);
|
|
|
|
lp->d_version = 1;
|
|
|
|
|
|
|
|
lp->d_magic = DISKMAGIC;
|
|
|
|
lp->d_magic2 = DISKMAGIC;
|
|
|
|
lp->d_checksum = dkcksum(lp);
|
|
|
|
|
|
|
|
/* Call the generic disklabel extraction routine */
|
|
|
|
return readdisklabel(DISKLABELDEV(dev), vndstrategy, lp, spoofonly);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vndclose(dev_t dev, int flags, int mode, struct proc *p)
|
|
|
|
{
|
|
|
|
int unit = DISKUNIT(dev);
|
|
|
|
struct vnd_softc *sc;
|
|
|
|
int part;
|
|
|
|
|
|
|
|
DNPRINTF(VDB_FOLLOW, "vndclose(%x, %x, %x, %p)\n", dev, flags, mode, p);
|
|
|
|
|
|
|
|
if (unit >= numvnd)
|
|
|
|
return (ENXIO);
|
|
|
|
sc = &vnd_softc[unit];
|
|
|
|
|
|
|
|
disk_lock_nointr(&sc->sc_dk);
|
|
|
|
|
|
|
|
part = DISKPART(dev);
|
|
|
|
|
|
|
|
disk_closepart(&sc->sc_dk, part, mode);
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
if (sc->sc_dk.dk_openmask == 0)
|
|
|
|
sc->sc_flags &= ~VNF_HAVELABEL;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vndstrategy(struct buf *bp)
|
|
|
|
{
|
|
|
|
int unit = DISKUNIT(bp->b_dev);
|
|
|
|
struct vnd_softc *sc;
|
|
|
|
struct partition *p;
|
|
|
|
off_t off;
|
|
|
|
long origbcount;
|
|
|
|
int s;
|
|
|
|
|
|
|
|
DNPRINTF(VDB_FOLLOW, "vndstrategy(%p): unit %d\n", bp, unit);
|
|
|
|
|
|
|
|
if (unit >= numvnd) {
|
|
|
|
bp->b_error = ENXIO;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
sc = &vnd_softc[unit];
|
|
|
|
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0) {
|
|
|
|
bp->b_error = ENXIO;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Many of the distrib scripts assume they can issue arbitrary
|
|
|
|
* sized requests to raw vnd devices irrespective of the
|
|
|
|
* emulated disk geometry.
|
|
|
|
*
|
|
|
|
* To continue supporting this, round the block count up to a
|
|
|
|
* multiple of d_secsize for bounds_check_with_label(), and
|
|
|
|
* then restore afterwards.
|
|
|
|
*
|
|
|
|
* We only do this for non-encrypted vnd, because encryption
|
|
|
|
* requires operating on blocks at a time.
|
|
|
|
*/
|
|
|
|
origbcount = bp->b_bcount;
|
|
|
|
if (sc->sc_keyctx == NULL) {
|
|
|
|
u_int32_t secsize = sc->sc_dk.dk_label->d_secsize;
|
|
|
|
bp->b_bcount = ((origbcount + secsize - 1) & ~(secsize - 1));
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (bp->b_bcount != origbcount) {
|
|
|
|
struct process *curpr = curproc->p_p;
|
|
|
|
printf("%s: sloppy %s from proc %d (%s): "
|
|
|
|
"blkno %lld bcount %ld\n", sc->sc_dev.dv_xname,
|
|
|
|
(bp->b_flags & B_READ) ? "read" : "write",
|
|
|
|
curpr->ps_pid, curpr->ps_comm,
|
|
|
|
(long long)bp->b_blkno, origbcount);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bounds_check_with_label(bp, sc->sc_dk.dk_label) == -1) {
|
|
|
|
bp->b_resid = bp->b_bcount = origbcount;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (origbcount < bp->b_bcount)
|
|
|
|
bp->b_bcount = origbcount;
|
|
|
|
|
|
|
|
p = &sc->sc_dk.dk_label->d_partitions[DISKPART(bp->b_dev)];
|
|
|
|
off = DL_GETPOFFSET(p) * sc->sc_dk.dk_label->d_secsize +
|
|
|
|
(u_int64_t)bp->b_blkno * DEV_BSIZE;
|
|
|
|
|
|
|
|
if (sc->sc_keyctx && !(bp->b_flags & B_READ))
|
|
|
|
vndencryptbuf(sc, bp, 1);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use IO_NOLIMIT because upper layer has already checked I/O
|
|
|
|
* for limits, so there is no need to do it again.
|
|
|
|
*
|
|
|
|
* We use IO_NOCACHE because this data should be cached at the
|
|
|
|
* upper layer, so there is no need to cache it again.
|
|
|
|
*/
|
|
|
|
bp->b_error = vn_rdwr((bp->b_flags & B_READ) ? UIO_READ : UIO_WRITE,
|
|
|
|
sc->sc_vp, bp->b_data, bp->b_bcount, off, UIO_SYSSPACE,
|
|
|
|
IO_NOCACHE | IO_SYNC | IO_NOLIMIT, sc->sc_cred, &bp->b_resid, curproc);
|
|
|
|
if (bp->b_error)
|
|
|
|
bp->b_flags |= B_ERROR;
|
|
|
|
|
|
|
|
/* Data in buffer cache needs to be in clear */
|
|
|
|
if (sc->sc_keyctx)
|
|
|
|
vndencryptbuf(sc, bp, 0);
|
|
|
|
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
bad:
|
|
|
|
bp->b_flags |= B_ERROR;
|
|
|
|
bp->b_resid = bp->b_bcount;
|
|
|
|
done:
|
|
|
|
s = splbio();
|
|
|
|
biodone(bp);
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vndread(dev_t dev, struct uio *uio, int flags)
|
|
|
|
{
|
|
|
|
return (physio(vndstrategy, dev, B_READ, minphys, uio));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vndwrite(dev_t dev, struct uio *uio, int flags)
|
|
|
|
{
|
|
|
|
return (physio(vndstrategy, dev, B_WRITE, minphys, uio));
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t
|
|
|
|
vndbdevsize(struct vnode *vp, struct proc *p)
|
|
|
|
{
|
|
|
|
struct partinfo pi;
|
|
|
|
struct bdevsw *bsw;
|
|
|
|
dev_t dev;
|
|
|
|
|
|
|
|
dev = vp->v_rdev;
|
|
|
|
bsw = bdevsw_lookup(dev);
|
|
|
|
if (bsw->d_ioctl == NULL)
|
|
|
|
return (0);
|
|
|
|
if (bsw->d_ioctl(dev, DIOCGPART, (caddr_t)&pi, FREAD, p))
|
|
|
|
return (0);
|
|
|
|
DNPRINTF(VDB_INIT, "vndbdevsize: size %llu secsize %u\n",
|
|
|
|
DL_GETPSIZE(pi.part), pi.disklab->d_secsize);
|
|
|
|
return (DL_GETPSIZE(pi.part));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vndioctl(dev_t dev, u_long cmd, caddr_t addr, int flag, struct proc *p)
|
|
|
|
{
|
|
|
|
int unit = DISKUNIT(dev);
|
|
|
|
struct disklabel *lp;
|
|
|
|
struct vnd_softc *sc;
|
|
|
|
struct vnd_ioctl *vio;
|
|
|
|
struct vnd_user *vnu;
|
|
|
|
struct vattr vattr;
|
|
|
|
int error, part, pmask;
|
|
|
|
|
|
|
|
DNPRINTF(VDB_FOLLOW, "vndioctl(%x, %lx, %p, %x, %p): unit %d\n",
|
|
|
|
dev, cmd, addr, flag, p, unit);
|
|
|
|
|
|
|
|
error = suser(p);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
if (unit >= numvnd)
|
|
|
|
return (ENXIO);
|
|
|
|
|
|
|
|
sc = &vnd_softc[unit];
|
|
|
|
vio = (struct vnd_ioctl *)addr;
|
|
|
|
switch (cmd) {
|
|
|
|
|
|
|
|
case VNDIOCSET:
|
|
|
|
{
|
|
|
|
char name[VNDNLEN], key[BLF_MAXUTILIZED];
|
|
|
|
struct nameidata nd;
|
|
|
|
struct ucred *cred = NULL;
|
|
|
|
size_t size;
|
|
|
|
int vplocked;
|
|
|
|
int rw;
|
|
|
|
|
|
|
|
if (sc->sc_flags & VNF_INITED)
|
|
|
|
return (EBUSY);
|
|
|
|
|
|
|
|
/* Geometry eventually has to fit into label fields */
|
|
|
|
if (vio->vnd_secsize > UINT_MAX ||
|
|
|
|
vio->vnd_secsize == 0 ||
|
|
|
|
vio->vnd_ntracks > UINT_MAX ||
|
|
|
|
vio->vnd_nsectors > UINT_MAX)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
if ((error = copyinstr(vio->vnd_file, name,
|
|
|
|
sizeof(name), NULL)))
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (vio->vnd_keylen > 0) {
|
|
|
|
if (vio->vnd_keylen > sizeof(key))
|
|
|
|
vio->vnd_keylen = sizeof(key);
|
|
|
|
|
|
|
|
if ((error = copyin(vio->vnd_key, key,
|
|
|
|
vio->vnd_keylen)) != 0)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Open for read and write first. This lets vn_open() weed out
|
|
|
|
* directories, sockets, etc. so we don't have to worry about
|
|
|
|
* them.
|
|
|
|
*/
|
|
|
|
NDINIT(&nd, 0, 0, UIO_SYSSPACE, name, p);
|
|
|
|
nd.ni_unveil = UNVEIL_READ | UNVEIL_WRITE;
|
|
|
|
rw = FREAD|FWRITE;
|
|
|
|
error = vn_open(&nd, FREAD|FWRITE, 0);
|
|
|
|
if (error == EROFS) {
|
|
|
|
NDINIT(&nd, 0, 0, UIO_SYSSPACE, name, p);
|
|
|
|
nd.ni_unveil = UNVEIL_READ | UNVEIL_WRITE;
|
|
|
|
rw = FREAD;
|
|
|
|
error = vn_open(&nd, FREAD, 0);
|
|
|
|
}
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
vplocked = 1;
|
|
|
|
|
|
|
|
error = VOP_GETATTR(nd.ni_vp, &vattr, p->p_ucred, p);
|
|
|
|
if (error) {
|
|
|
|
fail:
|
|
|
|
if (vplocked)
|
|
|
|
VOP_UNLOCK(nd.ni_vp);
|
|
|
|
vn_close(nd.ni_vp, rw, p->p_ucred, p);
|
|
|
|
if (cred != NULL)
|
|
|
|
crfree(cred);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Cannot put a vnd on top of a vnd */
|
|
|
|
if (major(vattr.va_fsid) == major(dev)) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((error = vndsetcred(p, nd.ni_vp, vio, &cred)) != 0)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
VOP_UNLOCK(nd.ni_vp);
|
|
|
|
vplocked = 0;
|
|
|
|
|
|
|
|
if (nd.ni_vp->v_type == VBLK) {
|
|
|
|
size = vndbdevsize(nd.ni_vp, p);
|
|
|
|
/* XXX is size 0 ok? */
|
|
|
|
} else
|
|
|
|
size = vattr.va_size / vio->vnd_secsize;
|
|
|
|
|
|
|
|
if ((error = disk_lock(&sc->sc_dk)) != 0)
|
|
|
|
goto fail;
|
|
|
|
if (sc->sc_flags & VNF_INITED) {
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
error = EBUSY;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set geometry for device. */
|
2023-05-15 03:54:51 +00:00
|
|
|
sc->sc_type = vio->vnd_type;
|
2023-04-30 01:15:27 +00:00
|
|
|
sc->sc_secsize = vio->vnd_secsize;
|
|
|
|
sc->sc_ntracks = vio->vnd_ntracks;
|
|
|
|
sc->sc_nsectors = vio->vnd_nsectors;
|
|
|
|
sc->sc_size = size;
|
|
|
|
|
|
|
|
if (rw == FREAD)
|
|
|
|
sc->sc_flags |= VNF_READONLY;
|
|
|
|
else
|
|
|
|
sc->sc_flags &= ~VNF_READONLY;
|
|
|
|
|
|
|
|
memcpy(sc->sc_file, name, sizeof(sc->sc_file));
|
|
|
|
|
|
|
|
if (vio->vnd_keylen > 0) {
|
|
|
|
sc->sc_keyctx = malloc(sizeof(*sc->sc_keyctx), M_DEVBUF,
|
|
|
|
M_WAITOK);
|
|
|
|
blf_key(sc->sc_keyctx, key, vio->vnd_keylen);
|
|
|
|
explicit_bzero(key, vio->vnd_keylen);
|
|
|
|
} else
|
|
|
|
sc->sc_keyctx = NULL;
|
|
|
|
|
|
|
|
sc->sc_vp = nd.ni_vp;
|
|
|
|
sc->sc_cred = cred;
|
|
|
|
vio->vnd_size = sc->sc_size * sc->sc_secsize;
|
|
|
|
sc->sc_flags |= VNF_INITED;
|
|
|
|
|
|
|
|
DNPRINTF(VDB_INIT, "vndioctl: SET vp %p size %llx\n",
|
|
|
|
sc->sc_vp, (unsigned long long)sc->sc_size);
|
|
|
|
|
|
|
|
/* Attach the disk. */
|
|
|
|
sc->sc_dk.dk_name = sc->sc_dev.dv_xname;
|
|
|
|
disk_attach(&sc->sc_dev, &sc->sc_dk);
|
|
|
|
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case VNDIOCCLR:
|
|
|
|
if ((error = disk_lock(&sc->sc_dk)) != 0)
|
|
|
|
return (error);
|
|
|
|
if ((sc->sc_flags & VNF_INITED) == 0) {
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
return (ENXIO);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't unconfigure if any other partitions are open
|
|
|
|
* or if both the character and block flavors of this
|
|
|
|
* partition are open.
|
|
|
|
*/
|
|
|
|
part = DISKPART(dev);
|
|
|
|
pmask = (1 << part);
|
|
|
|
if ((sc->sc_dk.dk_openmask & ~pmask) ||
|
|
|
|
((sc->sc_dk.dk_bopenmask & pmask) &&
|
|
|
|
(sc->sc_dk.dk_copenmask & pmask))) {
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
return (EBUSY);
|
|
|
|
}
|
|
|
|
|
|
|
|
vndclear(sc);
|
|
|
|
DNPRINTF(VDB_INIT, "vndioctl: CLRed\n");
|
|
|
|
|
|
|
|
/* Free crypto key */
|
|
|
|
if (sc->sc_keyctx) {
|
|
|
|
explicit_bzero(sc->sc_keyctx, sizeof(*sc->sc_keyctx));
|
|
|
|
free(sc->sc_keyctx, M_DEVBUF, sizeof(*sc->sc_keyctx));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Detach the disk. */
|
|
|
|
disk_detach(&sc->sc_dk);
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case VNDIOCGET:
|
|
|
|
vnu = (struct vnd_user *)addr;
|
|
|
|
|
|
|
|
if (vnu->vnu_unit == -1)
|
|
|
|
vnu->vnu_unit = unit;
|
|
|
|
if (vnu->vnu_unit >= numvnd)
|
|
|
|
return (ENXIO);
|
|
|
|
if (vnu->vnu_unit < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
sc = &vnd_softc[vnu->vnu_unit];
|
|
|
|
|
|
|
|
if (sc->sc_flags & VNF_INITED) {
|
|
|
|
error = VOP_GETATTR(sc->sc_vp, &vattr, p->p_ucred, p);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
strlcpy(vnu->vnu_file, sc->sc_file,
|
|
|
|
sizeof(vnu->vnu_file));
|
|
|
|
vnu->vnu_dev = vattr.va_fsid;
|
|
|
|
vnu->vnu_ino = vattr.va_fileid;
|
|
|
|
} else {
|
|
|
|
vnu->vnu_dev = 0;
|
|
|
|
vnu->vnu_ino = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DIOCRLDINFO:
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0)
|
|
|
|
return (ENOTTY);
|
|
|
|
lp = malloc(sizeof(*lp), M_TEMP, M_WAITOK);
|
|
|
|
vndgetdisklabel(dev, sc, lp, 0);
|
|
|
|
*(sc->sc_dk.dk_label) = *lp;
|
|
|
|
free(lp, M_TEMP, sizeof(*lp));
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case DIOCGPDINFO:
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0)
|
|
|
|
return (ENOTTY);
|
|
|
|
vndgetdisklabel(dev, sc, (struct disklabel *)addr, 1);
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case DIOCGDINFO:
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0)
|
|
|
|
return (ENOTTY);
|
|
|
|
*(struct disklabel *)addr = *(sc->sc_dk.dk_label);
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case DIOCGPART:
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0)
|
|
|
|
return (ENOTTY);
|
|
|
|
((struct partinfo *)addr)->disklab = sc->sc_dk.dk_label;
|
|
|
|
((struct partinfo *)addr)->part =
|
|
|
|
&sc->sc_dk.dk_label->d_partitions[DISKPART(dev)];
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case DIOCWDINFO:
|
|
|
|
case DIOCSDINFO:
|
|
|
|
if ((sc->sc_flags & VNF_HAVELABEL) == 0)
|
|
|
|
return (ENOTTY);
|
|
|
|
if ((flag & FWRITE) == 0)
|
|
|
|
return (EBADF);
|
|
|
|
|
|
|
|
if ((error = disk_lock(&sc->sc_dk)) != 0)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
error = setdisklabel(sc->sc_dk.dk_label,
|
|
|
|
(struct disklabel *)addr, /* sc->sc_dk.dk_openmask */ 0);
|
|
|
|
if (error == 0) {
|
|
|
|
if (cmd == DIOCWDINFO)
|
|
|
|
error = writedisklabel(DISKLABELDEV(dev),
|
|
|
|
vndstrategy, sc->sc_dk.dk_label);
|
|
|
|
}
|
|
|
|
|
|
|
|
disk_unlock(&sc->sc_dk);
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
default:
|
|
|
|
return (ENOTTY);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Duplicate the current processes' credentials. Since we are called only
|
|
|
|
* as the result of a SET ioctl and only root can do that, any future access
|
|
|
|
* to this "disk" is essentially as root. Note that credentials may change
|
|
|
|
* if some other uid can write directly to the mapped file (NFS).
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
vndsetcred(struct proc *p, struct vnode *vp, struct vnd_ioctl *vio,
|
|
|
|
struct ucred **newcredp)
|
|
|
|
{
|
|
|
|
void *buf;
|
|
|
|
size_t size;
|
|
|
|
struct ucred *new;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
new = crdup(p->p_ucred);
|
|
|
|
buf = malloc(DEV_BSIZE, M_TEMP, M_WAITOK);
|
|
|
|
size = DEV_BSIZE;
|
|
|
|
|
|
|
|
/* XXX: Horrible kludge to establish credentials for NFS */
|
|
|
|
error = vn_rdwr(UIO_READ, vp, buf, size, 0, UIO_SYSSPACE, 0,
|
|
|
|
new, NULL, curproc);
|
|
|
|
|
|
|
|
free(buf, M_TEMP, DEV_BSIZE);
|
|
|
|
if (error == 0)
|
|
|
|
*newcredp = new;
|
|
|
|
else
|
|
|
|
crfree(new);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vndclear(struct vnd_softc *sc)
|
|
|
|
{
|
|
|
|
struct vnode *vp = sc->sc_vp;
|
|
|
|
struct proc *p = curproc; /* XXX */
|
|
|
|
|
|
|
|
DNPRINTF(VDB_FOLLOW, "vndclear(%p): vp %p\n", sc, vp);
|
|
|
|
|
|
|
|
if (vp == NULL)
|
|
|
|
panic("vndioctl: null vp");
|
|
|
|
(void) vn_close(vp, VNDRW(sc), sc->sc_cred, p);
|
|
|
|
crfree(sc->sc_cred);
|
|
|
|
sc->sc_flags = 0;
|
|
|
|
sc->sc_vp = NULL;
|
|
|
|
sc->sc_cred = NULL;
|
|
|
|
sc->sc_size = 0;
|
|
|
|
memset(sc->sc_file, 0, sizeof(sc->sc_file));
|
|
|
|
}
|
|
|
|
|
|
|
|
daddr_t
|
|
|
|
vndsize(dev_t dev)
|
|
|
|
{
|
|
|
|
/* We don't support swapping to vnd anymore. */
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vnddump(dev_t dev, daddr_t blkno, caddr_t va, size_t size)
|
|
|
|
{
|
|
|
|
/* Not implemented. */
|
|
|
|
return (ENXIO);
|
|
|
|
}
|