xref: /freebsd/sys/fs/unionfs/union_vfsops.c (revision eb60ff1ee16a7d22415d6065d808ddf0b5c13d7a)
1d167cf6fSWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4996c772fSJohn Dyson  * Copyright (c) 1994, 1995 The Regents of the University of California.
5996c772fSJohn Dyson  * Copyright (c) 1994, 1995 Jan-Simon Pendry.
6cb5736b7SDaichi GOTO  * Copyright (c) 2005, 2006, 2012 Masanori Ozawa <ozawa@ongs.co.jp>, ONGS Inc.
7cb5736b7SDaichi GOTO  * Copyright (c) 2006, 2012 Daichi Goto <daichi@freebsd.org>
8df8bae1dSRodney W. Grimes  * All rights reserved.
9df8bae1dSRodney W. Grimes  *
10df8bae1dSRodney W. Grimes  * This code is derived from software donated to Berkeley by
11df8bae1dSRodney W. Grimes  * Jan-Simon Pendry.
12df8bae1dSRodney W. Grimes  *
13df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
14df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
15df8bae1dSRodney W. Grimes  * are met:
16df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
17df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
18df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
19df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
20df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
21fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
22df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
23df8bae1dSRodney W. Grimes  *    without specific prior written permission.
24df8bae1dSRodney W. Grimes  *
25df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
36df8bae1dSRodney W. Grimes  */
37df8bae1dSRodney W. Grimes 
38df8bae1dSRodney W. Grimes #include <sys/param.h>
39df8bae1dSRodney W. Grimes #include <sys/systm.h>
40d00947d8SCraig Rodrigues #include <sys/kdb.h>
4157b4252eSKonstantin Belousov #include <sys/fcntl.h>
42c9b1d604SGarrett Wollman #include <sys/kernel.h>
43805d90f7SJohn Baldwin #include <sys/lock.h>
44d00947d8SCraig Rodrigues #include <sys/malloc.h>
45df8bae1dSRodney W. Grimes #include <sys/mount.h>
46df8bae1dSRodney W. Grimes #include <sys/namei.h>
47d00947d8SCraig Rodrigues #include <sys/proc.h>
48d00947d8SCraig Rodrigues #include <sys/vnode.h>
49d00947d8SCraig Rodrigues #include <sys/stat.h>
50d00947d8SCraig Rodrigues 
5199d300a1SRuslan Ermilov #include <fs/unionfs/union.h>
52df8bae1dSRodney W. Grimes 
53d00947d8SCraig Rodrigues static MALLOC_DEFINE(M_UNIONFSMNT, "UNIONFS mount", "UNIONFS mount structure");
54a1c995b6SPoul-Henning Kamp 
55d00947d8SCraig Rodrigues static vfs_fhtovp_t	unionfs_fhtovp;
56d00947d8SCraig Rodrigues static vfs_checkexp_t	unionfs_checkexp;
57d00947d8SCraig Rodrigues static vfs_mount_t	unionfs_domount;
58d00947d8SCraig Rodrigues static vfs_quotactl_t	unionfs_quotactl;
59d00947d8SCraig Rodrigues static vfs_root_t	unionfs_root;
60d00947d8SCraig Rodrigues static vfs_sync_t	unionfs_sync;
61d00947d8SCraig Rodrigues static vfs_statfs_t	unionfs_statfs;
62d00947d8SCraig Rodrigues static vfs_unmount_t	unionfs_unmount;
63d00947d8SCraig Rodrigues static vfs_vget_t	unionfs_vget;
64d00947d8SCraig Rodrigues static vfs_extattrctl_t	unionfs_extattrctl;
65d00947d8SCraig Rodrigues 
66d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops;
67b5e8ce9fSBruce Evans 
68df8bae1dSRodney W. Grimes /*
69d00947d8SCraig Rodrigues  * Mount unionfs layer.
70df8bae1dSRodney W. Grimes  */
7180b301c3SPoul-Henning Kamp static int
unionfs_domount(struct mount * mp)72dfd233edSAttilio Rao unionfs_domount(struct mount *mp)
73df8bae1dSRodney W. Grimes {
74d00947d8SCraig Rodrigues 	struct vnode   *lowerrootvp;
75d00947d8SCraig Rodrigues 	struct vnode   *upperrootvp;
76d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
77d00947d8SCraig Rodrigues 	char           *target;
78d00947d8SCraig Rodrigues 	char           *tmp;
79d00947d8SCraig Rodrigues 	char           *ep;
80312d49efSJason A. Harmening 	struct nameidata nd, *ndp;
81312d49efSJason A. Harmening 	struct vattr	va;
82312d49efSJason A. Harmening 	unionfs_copymode copymode;
83312d49efSJason A. Harmening 	unionfs_whitemode whitemode;
84d00947d8SCraig Rodrigues 	int		below;
85312d49efSJason A. Harmening 	int		error;
86312d49efSJason A. Harmening 	int		len;
87d00947d8SCraig Rodrigues 	uid_t		uid;
88d00947d8SCraig Rodrigues 	gid_t		gid;
89d00947d8SCraig Rodrigues 	u_short		udir;
90d00947d8SCraig Rodrigues 	u_short		ufile;
91df8bae1dSRodney W. Grimes 
92312d49efSJason A. Harmening 	UNIONFSDEBUG("unionfs_mount(mp = %p)\n", mp);
93df8bae1dSRodney W. Grimes 
94d00947d8SCraig Rodrigues 	error = 0;
95d00947d8SCraig Rodrigues 	below = 0;
96d00947d8SCraig Rodrigues 	uid = 0;
97d00947d8SCraig Rodrigues 	gid = 0;
98d00947d8SCraig Rodrigues 	udir = 0;
99d00947d8SCraig Rodrigues 	ufile = 0;
100524f3f28SDaichi GOTO 	copymode = UNIONFS_TRANSPARENT;	/* default */
10120885defSDaichi GOTO 	whitemode = UNIONFS_WHITE_ALWAYS;
102d00947d8SCraig Rodrigues 	ndp = &nd;
10381bca6ddSKATO Takenori 
1041e370dbbSCraig Rodrigues 	if (mp->mnt_flag & MNT_ROOTFS) {
1051e370dbbSCraig Rodrigues 		vfs_mount_error(mp, "Cannot union mount root filesystem");
10664042a76SPoul-Henning Kamp 		return (EOPNOTSUPP);
1071e370dbbSCraig Rodrigues 	}
108d00947d8SCraig Rodrigues 
10981bca6ddSKATO Takenori 	/*
110d00947d8SCraig Rodrigues 	 * Update is a no operation.
111df8bae1dSRodney W. Grimes 	 */
1121e370dbbSCraig Rodrigues 	if (mp->mnt_flag & MNT_UPDATE) {
1131e370dbbSCraig Rodrigues 		vfs_mount_error(mp, "unionfs does not support mount update");
114a9f5c04aSMaxime Henrion 		return (EOPNOTSUPP);
1151e370dbbSCraig Rodrigues 	}
116df8bae1dSRodney W. Grimes 
117df8bae1dSRodney W. Grimes 	/*
118d00947d8SCraig Rodrigues 	 * Get argument
119df8bae1dSRodney W. Grimes 	 */
120d00947d8SCraig Rodrigues 	error = vfs_getopt(mp->mnt_optnew, "target", (void **)&target, &len);
1213a773ad0SPoul-Henning Kamp 	if (error)
122d00947d8SCraig Rodrigues 		error = vfs_getopt(mp->mnt_optnew, "from", (void **)&target,
123d00947d8SCraig Rodrigues 		    &len);
124d00947d8SCraig Rodrigues 	if (error || target[len - 1] != '\0') {
125d00947d8SCraig Rodrigues 		vfs_mount_error(mp, "Invalid target");
126d00947d8SCraig Rodrigues 		return (EINVAL);
127d00947d8SCraig Rodrigues 	}
128d00947d8SCraig Rodrigues 	if (vfs_getopt(mp->mnt_optnew, "below", NULL, NULL) == 0)
129d00947d8SCraig Rodrigues 		below = 1;
130d00947d8SCraig Rodrigues 	if (vfs_getopt(mp->mnt_optnew, "udir", (void **)&tmp, NULL) == 0) {
131d00947d8SCraig Rodrigues 		if (tmp != NULL)
132d00947d8SCraig Rodrigues 			udir = (mode_t)strtol(tmp, &ep, 8);
133d00947d8SCraig Rodrigues 		if (tmp == NULL || *ep) {
134d00947d8SCraig Rodrigues 			vfs_mount_error(mp, "Invalid udir");
135d00947d8SCraig Rodrigues 			return (EINVAL);
136d00947d8SCraig Rodrigues 		}
13716385727SDaichi GOTO 		udir &= S_IRWXU | S_IRWXG | S_IRWXO;
138d00947d8SCraig Rodrigues 	}
139d00947d8SCraig Rodrigues 	if (vfs_getopt(mp->mnt_optnew, "ufile", (void **)&tmp, NULL) == 0) {
140d00947d8SCraig Rodrigues 		if (tmp != NULL)
141d00947d8SCraig Rodrigues 			ufile = (mode_t)strtol(tmp, &ep, 8);
142d00947d8SCraig Rodrigues 		if (tmp == NULL || *ep) {
143d00947d8SCraig Rodrigues 			vfs_mount_error(mp, "Invalid ufile");
144d00947d8SCraig Rodrigues 			return (EINVAL);
145d00947d8SCraig Rodrigues 		}
14616385727SDaichi GOTO 		ufile &= S_IRWXU | S_IRWXG | S_IRWXO;
147d00947d8SCraig Rodrigues 	}
148d00947d8SCraig Rodrigues 	/* check umask, uid and gid */
149d00947d8SCraig Rodrigues 	if (udir == 0 && ufile != 0)
150d00947d8SCraig Rodrigues 		udir = ufile;
151d00947d8SCraig Rodrigues 	if (ufile == 0 && udir != 0)
152d00947d8SCraig Rodrigues 		ufile = udir;
153d00947d8SCraig Rodrigues 
154cb05b60aSAttilio Rao 	vn_lock(mp->mnt_vnodecovered, LK_SHARED | LK_RETRY);
1550359a12eSAttilio Rao 	error = VOP_GETATTR(mp->mnt_vnodecovered, &va, mp->mnt_cred);
156d00947d8SCraig Rodrigues 	if (!error) {
157d00947d8SCraig Rodrigues 		if (udir == 0)
158d00947d8SCraig Rodrigues 			udir = va.va_mode;
159d00947d8SCraig Rodrigues 		if (ufile == 0)
160d00947d8SCraig Rodrigues 			ufile = va.va_mode;
161d00947d8SCraig Rodrigues 		uid = va.va_uid;
162d00947d8SCraig Rodrigues 		gid = va.va_gid;
163d00947d8SCraig Rodrigues 	}
164b249ce48SMateusz Guzik 	VOP_UNLOCK(mp->mnt_vnodecovered);
165d00947d8SCraig Rodrigues 	if (error)
166d00947d8SCraig Rodrigues 		return (error);
167d00947d8SCraig Rodrigues 
168d00947d8SCraig Rodrigues 	if (mp->mnt_cred->cr_ruid == 0) {	/* root only */
169d00947d8SCraig Rodrigues 		if (vfs_getopt(mp->mnt_optnew, "uid", (void **)&tmp,
170d00947d8SCraig Rodrigues 		    NULL) == 0) {
171d00947d8SCraig Rodrigues 			if (tmp != NULL)
172d00947d8SCraig Rodrigues 				uid = (uid_t)strtol(tmp, &ep, 10);
173d00947d8SCraig Rodrigues 			if (tmp == NULL || *ep) {
174d00947d8SCraig Rodrigues 				vfs_mount_error(mp, "Invalid uid");
175d00947d8SCraig Rodrigues 				return (EINVAL);
176d00947d8SCraig Rodrigues 			}
177d00947d8SCraig Rodrigues 		}
178d00947d8SCraig Rodrigues 		if (vfs_getopt(mp->mnt_optnew, "gid", (void **)&tmp,
179d00947d8SCraig Rodrigues 		    NULL) == 0) {
180d00947d8SCraig Rodrigues 			if (tmp != NULL)
181d00947d8SCraig Rodrigues 				gid = (gid_t)strtol(tmp, &ep, 10);
182d00947d8SCraig Rodrigues 			if (tmp == NULL || *ep) {
183d00947d8SCraig Rodrigues 				vfs_mount_error(mp, "Invalid gid");
184d00947d8SCraig Rodrigues 				return (EINVAL);
185d00947d8SCraig Rodrigues 			}
186d00947d8SCraig Rodrigues 		}
187d00947d8SCraig Rodrigues 		if (vfs_getopt(mp->mnt_optnew, "copymode", (void **)&tmp,
188d00947d8SCraig Rodrigues 		    NULL) == 0) {
189d00947d8SCraig Rodrigues 			if (tmp == NULL) {
190d00947d8SCraig Rodrigues 				vfs_mount_error(mp, "Invalid copymode");
191d00947d8SCraig Rodrigues 				return (EINVAL);
192d00947d8SCraig Rodrigues 			} else if (strcasecmp(tmp, "traditional") == 0)
193d00947d8SCraig Rodrigues 				copymode = UNIONFS_TRADITIONAL;
194d00947d8SCraig Rodrigues 			else if (strcasecmp(tmp, "transparent") == 0)
195d00947d8SCraig Rodrigues 				copymode = UNIONFS_TRANSPARENT;
196d00947d8SCraig Rodrigues 			else if (strcasecmp(tmp, "masquerade") == 0)
197d00947d8SCraig Rodrigues 				copymode = UNIONFS_MASQUERADE;
198d00947d8SCraig Rodrigues 			else {
199d00947d8SCraig Rodrigues 				vfs_mount_error(mp, "Invalid copymode");
200d00947d8SCraig Rodrigues 				return (EINVAL);
201d00947d8SCraig Rodrigues 			}
202d00947d8SCraig Rodrigues 		}
20320885defSDaichi GOTO 		if (vfs_getopt(mp->mnt_optnew, "whiteout", (void **)&tmp,
20420885defSDaichi GOTO 		    NULL) == 0) {
20520885defSDaichi GOTO 			if (tmp == NULL) {
20620885defSDaichi GOTO 				vfs_mount_error(mp, "Invalid whiteout mode");
20720885defSDaichi GOTO 				return (EINVAL);
20820885defSDaichi GOTO 			} else if (strcasecmp(tmp, "always") == 0)
20920885defSDaichi GOTO 				whitemode = UNIONFS_WHITE_ALWAYS;
21020885defSDaichi GOTO 			else if (strcasecmp(tmp, "whenneeded") == 0)
21120885defSDaichi GOTO 				whitemode = UNIONFS_WHITE_WHENNEEDED;
21220885defSDaichi GOTO 			else {
21320885defSDaichi GOTO 				vfs_mount_error(mp, "Invalid whiteout mode");
21420885defSDaichi GOTO 				return (EINVAL);
21520885defSDaichi GOTO 			}
21620885defSDaichi GOTO 		}
217d00947d8SCraig Rodrigues 	}
218d00947d8SCraig Rodrigues 	/* If copymode is UNIONFS_TRADITIONAL, uid/gid is mounted user. */
219d00947d8SCraig Rodrigues 	if (copymode == UNIONFS_TRADITIONAL) {
220d00947d8SCraig Rodrigues 		uid = mp->mnt_cred->cr_ruid;
221d00947d8SCraig Rodrigues 		gid = mp->mnt_cred->cr_rgid;
222d00947d8SCraig Rodrigues 	}
223d00947d8SCraig Rodrigues 
224d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_mount: uid=%d, gid=%d\n", uid, gid);
225d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_mount: udir=0%03o, ufile=0%03o\n", udir, ufile);
226d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_mount: copymode=%d\n", copymode);
227d00947d8SCraig Rodrigues 
228d00947d8SCraig Rodrigues 	/*
229d00947d8SCraig Rodrigues 	 * Find upper node
230d00947d8SCraig Rodrigues 	 */
2317e1d3eefSMateusz Guzik 	NDINIT(ndp, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE, target);
232d00947d8SCraig Rodrigues 	if ((error = namei(ndp)))
233d00947d8SCraig Rodrigues 		return (error);
234d00947d8SCraig Rodrigues 
235bb92cd7bSMateusz Guzik 	NDFREE_PNBUF(ndp);
236d00947d8SCraig Rodrigues 
237d00947d8SCraig Rodrigues 	/* get root vnodes */
238d00947d8SCraig Rodrigues 	lowerrootvp = mp->mnt_vnodecovered;
239df8bae1dSRodney W. Grimes 	upperrootvp = ndp->ni_vp;
240a01ca46bSJason A. Harmening 	KASSERT(lowerrootvp != NULL, ("%s: NULL lower root vp", __func__));
241a01ca46bSJason A. Harmening 	KASSERT(upperrootvp != NULL, ("%s: NULL upper root vp", __func__));
242df8bae1dSRodney W. Grimes 
243d00947d8SCraig Rodrigues 	/* create unionfs_mount */
244312d49efSJason A. Harmening 	ump = malloc(sizeof(struct unionfs_mount), M_UNIONFSMNT,
245312d49efSJason A. Harmening 	    M_WAITOK | M_ZERO);
2462a31267eSMatthew Dillon 
247d00947d8SCraig Rodrigues 	/*
248d00947d8SCraig Rodrigues 	 * Save reference
249d00947d8SCraig Rodrigues 	 */
250d00947d8SCraig Rodrigues 	if (below) {
251b249ce48SMateusz Guzik 		VOP_UNLOCK(upperrootvp);
252cb05b60aSAttilio Rao 		vn_lock(lowerrootvp, LK_EXCLUSIVE | LK_RETRY);
253d00947d8SCraig Rodrigues 		ump->um_lowervp = upperrootvp;
254d00947d8SCraig Rodrigues 		ump->um_uppervp = lowerrootvp;
255d00947d8SCraig Rodrigues 	} else {
256d00947d8SCraig Rodrigues 		ump->um_lowervp = lowerrootvp;
257d00947d8SCraig Rodrigues 		ump->um_uppervp = upperrootvp;
258df8bae1dSRodney W. Grimes 	}
259d00947d8SCraig Rodrigues 	ump->um_rootvp = NULLVP;
260d00947d8SCraig Rodrigues 	ump->um_uid = uid;
261d00947d8SCraig Rodrigues 	ump->um_gid = gid;
262d00947d8SCraig Rodrigues 	ump->um_udir = udir;
263d00947d8SCraig Rodrigues 	ump->um_ufile = ufile;
264d00947d8SCraig Rodrigues 	ump->um_copymode = copymode;
26520885defSDaichi GOTO 	ump->um_whitemode = whitemode;
266d00947d8SCraig Rodrigues 
26777465d93SAlfred Perlstein 	mp->mnt_data = ump;
268df8bae1dSRodney W. Grimes 
269996c772fSJohn Dyson 	/*
270d00947d8SCraig Rodrigues 	 * Copy upper layer's RDONLY flag.
271d00947d8SCraig Rodrigues 	 */
272d00947d8SCraig Rodrigues 	mp->mnt_flag |= ump->um_uppervp->v_mount->mnt_flag & MNT_RDONLY;
273d00947d8SCraig Rodrigues 
274d00947d8SCraig Rodrigues 	/*
275d00947d8SCraig Rodrigues 	 * Unlock the node
276df8bae1dSRodney W. Grimes 	 */
277b249ce48SMateusz Guzik 	VOP_UNLOCK(ump->um_uppervp);
278df8bae1dSRodney W. Grimes 
279d00947d8SCraig Rodrigues 	/*
280d00947d8SCraig Rodrigues 	 * Get the unionfs root vnode.
281d00947d8SCraig Rodrigues 	 */
282d00947d8SCraig Rodrigues 	error = unionfs_nodeget(mp, ump->um_uppervp, ump->um_lowervp,
2836d8420d4SJason A. Harmening 	    NULLVP, &(ump->um_rootvp), NULL);
28459409cb9SJason A. Harmening 	if (error != 0) {
2850745d837SJason A. Harmening 		vrele(upperrootvp);
286d00947d8SCraig Rodrigues 		free(ump, M_UNIONFSMNT);
287d00947d8SCraig Rodrigues 		mp->mnt_data = NULL;
288df8bae1dSRodney W. Grimes 		return (error);
289df8bae1dSRodney W. Grimes 	}
290a01ca46bSJason A. Harmening 	KASSERT(ump->um_rootvp != NULL, ("rootvp cannot be NULL"));
291a01ca46bSJason A. Harmening 	KASSERT((ump->um_rootvp->v_vflag & VV_ROOT) != 0,
292a01ca46bSJason A. Harmening 	    ("%s: rootvp without VV_ROOT", __func__));
293df8bae1dSRodney W. Grimes 
2940745d837SJason A. Harmening 	/*
2950745d837SJason A. Harmening 	 * Do not release the namei() reference on upperrootvp until after
2960745d837SJason A. Harmening 	 * we attempt to register the upper mounts.  A concurrent unmount
2970745d837SJason A. Harmening 	 * of the upper or lower FS may have caused unionfs_nodeget() to
2980745d837SJason A. Harmening 	 * create a unionfs node with a NULL upper or lower vp and with
2990745d837SJason A. Harmening 	 * no reference held on upperrootvp or lowerrootvp.
3000745d837SJason A. Harmening 	 * vfs_register_upper() should subsequently fail, which is what
3010745d837SJason A. Harmening 	 * we want, but we must ensure neither underlying vnode can be
3020745d837SJason A. Harmening 	 * reused until that happens.  We assume the caller holds a reference
3030745d837SJason A. Harmening 	 * to lowerrootvp as it is the mount's covered vnode.
3040745d837SJason A. Harmening 	 */
305cc3ec9f7SJason A. Harmening 	ump->um_lowermp = vfs_register_upper_from_vp(ump->um_lowervp, mp,
306c746ed72SJason A. Harmening 	    &ump->um_lower_link);
307cc3ec9f7SJason A. Harmening 	ump->um_uppermp = vfs_register_upper_from_vp(ump->um_uppervp, mp,
308c746ed72SJason A. Harmening 	    &ump->um_upper_link);
30959409cb9SJason A. Harmening 
3100745d837SJason A. Harmening 	vrele(upperrootvp);
3110745d837SJason A. Harmening 
312cc3ec9f7SJason A. Harmening 	if (ump->um_lowermp == NULL || ump->um_uppermp == NULL) {
313cc3ec9f7SJason A. Harmening 		if (ump->um_lowermp != NULL)
314cc3ec9f7SJason A. Harmening 			vfs_unregister_upper(ump->um_lowermp, &ump->um_lower_link);
315cc3ec9f7SJason A. Harmening 		if (ump->um_uppermp != NULL)
316cc3ec9f7SJason A. Harmening 			vfs_unregister_upper(ump->um_uppermp, &ump->um_upper_link);
317356e6980SJason A. Harmening 		vflush(mp, 1, FORCECLOSE, curthread);
31859409cb9SJason A. Harmening 		free(ump, M_UNIONFSMNT);
31959409cb9SJason A. Harmening 		mp->mnt_data = NULL;
32059409cb9SJason A. Harmening 		return (ENOENT);
32159409cb9SJason A. Harmening 	}
32259409cb9SJason A. Harmening 
323080ef8a4SJason A. Harmening 	/*
324080ef8a4SJason A. Harmening 	 * Specify that the covered vnode lock should remain held while
325080ef8a4SJason A. Harmening 	 * lookup() performs the cross-mount walk.  This prevents a lock-order
326080ef8a4SJason A. Harmening 	 * reversal between the covered vnode lock (which is also locked by
327080ef8a4SJason A. Harmening 	 * unionfs_lock()) and the mountpoint's busy count.  Without this,
328080ef8a4SJason A. Harmening 	 * unmount will lock the covered vnode lock (directly through the
329080ef8a4SJason A. Harmening 	 * covered vnode) and wait for the busy count to drain, while a
330*eb60ff1eSJason A. Harmening 	 * concurrent lookup will increment the busy count and then may lock
331080ef8a4SJason A. Harmening 	 * the covered vnode lock (indirectly through unionfs_lock()).
332080ef8a4SJason A. Harmening 	 *
333*eb60ff1eSJason A. Harmening 	 * Note that this is only needed for the 'below' case in which the
334*eb60ff1eSJason A. Harmening 	 * upper vnode is also the covered vnode, because unionfs_lock()
335*eb60ff1eSJason A. Harmening 	 * only locks the upper vnode as long as both lower and upper vnodes
336*eb60ff1eSJason A. Harmening 	 * are present (which they will always be for the unionfs mount root).
337080ef8a4SJason A. Harmening 	 */
338*eb60ff1eSJason A. Harmening 	if (below) {
3395cec725cSJason A. Harmening 		vn_lock(mp->mnt_vnodecovered, LK_EXCLUSIVE | LK_RETRY | LK_CANRECURSE);
340080ef8a4SJason A. Harmening 		mp->mnt_vnodecovered->v_vflag |= VV_CROSSLOCK;
341080ef8a4SJason A. Harmening 		VOP_UNLOCK(mp->mnt_vnodecovered);
342080ef8a4SJason A. Harmening 	}
343080ef8a4SJason A. Harmening 
344a8a07fd6SMateusz Guzik 	MNT_ILOCK(mp);
345cc3ec9f7SJason A. Harmening 	if ((ump->um_lowermp->mnt_flag & MNT_LOCAL) != 0 &&
346cc3ec9f7SJason A. Harmening 	    (ump->um_uppermp->mnt_flag & MNT_LOCAL) != 0)
347d00947d8SCraig Rodrigues 		mp->mnt_flag |= MNT_LOCAL;
3482656fc29SJason A. Harmening 	mp->mnt_kern_flag |= MNTK_NOMSYNC | MNTK_UNIONFS |
3492656fc29SJason A. Harmening 	    (ump->um_uppermp->mnt_kern_flag & MNTK_SHARED_WRITES);
350a8a07fd6SMateusz Guzik 	MNT_IUNLOCK(mp);
351d00947d8SCraig Rodrigues 
352d00947d8SCraig Rodrigues 	/*
353d00947d8SCraig Rodrigues 	 * Get new fsid
354d00947d8SCraig Rodrigues 	 */
355d00947d8SCraig Rodrigues 	vfs_getnewfsid(mp);
356d00947d8SCraig Rodrigues 
357852c303bSConrad Meyer 	snprintf(mp->mnt_stat.f_mntfromname, MNAMELEN, "<%s>:%s",
358852c303bSConrad Meyer 	    below ? "below" : "above", target);
359d00947d8SCraig Rodrigues 
360d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_mount: from %s, on %s\n",
361d00947d8SCraig Rodrigues 	    mp->mnt_stat.f_mntfromname, mp->mnt_stat.f_mntonname);
362d00947d8SCraig Rodrigues 
363d00947d8SCraig Rodrigues 	return (0);
364d00947d8SCraig Rodrigues }
365d00947d8SCraig Rodrigues 
366d00947d8SCraig Rodrigues /*
367d00947d8SCraig Rodrigues  * Free reference to unionfs layer
368df8bae1dSRodney W. Grimes  */
36980b301c3SPoul-Henning Kamp static int
unionfs_unmount(struct mount * mp,int mntflags)370dfd233edSAttilio Rao unionfs_unmount(struct mount *mp, int mntflags)
371df8bae1dSRodney W. Grimes {
372d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
373df8bae1dSRodney W. Grimes 	int		error;
374d00947d8SCraig Rodrigues 	int		num;
375996c772fSJohn Dyson 	int		freeing;
376d00947d8SCraig Rodrigues 	int		flags;
377df8bae1dSRodney W. Grimes 
378312d49efSJason A. Harmening 	UNIONFSDEBUG("unionfs_unmount: mp = %p\n", mp);
379d00947d8SCraig Rodrigues 
380d00947d8SCraig Rodrigues 	ump = MOUNTTOUNIONFSMOUNT(mp);
381d00947d8SCraig Rodrigues 	flags = 0;
382df8bae1dSRodney W. Grimes 
383996c772fSJohn Dyson 	if (mntflags & MNT_FORCE)
384996c772fSJohn Dyson 		flags |= FORCECLOSE;
385996c772fSJohn Dyson 
386d00947d8SCraig Rodrigues 	/* vflush (no need to call vrele) */
387dfd233edSAttilio Rao 	for (freeing = 0; (error = vflush(mp, 1, flags, curthread)) != 0;) {
388d00947d8SCraig Rodrigues 		num = mp->mnt_nvnodelistsize;
389d00947d8SCraig Rodrigues 		if (num == freeing)
390996c772fSJohn Dyson 			break;
391d00947d8SCraig Rodrigues 		freeing = num;
392df8bae1dSRodney W. Grimes 	}
393df8bae1dSRodney W. Grimes 
3940864ef1eSIan Dowse 	if (error)
3950864ef1eSIan Dowse 		return (error);
396df8bae1dSRodney W. Grimes 
3975cec725cSJason A. Harmening 	vn_lock(mp->mnt_vnodecovered, LK_EXCLUSIVE | LK_RETRY | LK_CANRECURSE);
398080ef8a4SJason A. Harmening 	mp->mnt_vnodecovered->v_vflag &= ~VV_CROSSLOCK;
399080ef8a4SJason A. Harmening 	VOP_UNLOCK(mp->mnt_vnodecovered);
400cc3ec9f7SJason A. Harmening 	vfs_unregister_upper(ump->um_lowermp, &ump->um_lower_link);
401cc3ec9f7SJason A. Harmening 	vfs_unregister_upper(ump->um_uppermp, &ump->um_upper_link);
402d00947d8SCraig Rodrigues 	free(ump, M_UNIONFSMNT);
40311753bd0SKevin Lo 	mp->mnt_data = NULL;
404d00947d8SCraig Rodrigues 
405df8bae1dSRodney W. Grimes 	return (0);
406df8bae1dSRodney W. Grimes }
407df8bae1dSRodney W. Grimes 
40880b301c3SPoul-Henning Kamp static int
unionfs_root(struct mount * mp,int flags,struct vnode ** vpp)409dfd233edSAttilio Rao unionfs_root(struct mount *mp, int flags, struct vnode **vpp)
410df8bae1dSRodney W. Grimes {
411d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
412d00947d8SCraig Rodrigues 	struct vnode *vp;
413df8bae1dSRodney W. Grimes 
414d00947d8SCraig Rodrigues 	ump = MOUNTTOUNIONFSMOUNT(mp);
415d00947d8SCraig Rodrigues 	vp = ump->um_rootvp;
4162a31267eSMatthew Dillon 
417d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_root: rootvp=%p locked=%x\n",
41881c794f9SAttilio Rao 	    vp, VOP_ISLOCKED(vp));
419df8bae1dSRodney W. Grimes 
420d00947d8SCraig Rodrigues 	vref(vp);
421d00947d8SCraig Rodrigues 	if (flags & LK_TYPE_MASK)
422cb05b60aSAttilio Rao 		vn_lock(vp, flags);
423df8bae1dSRodney W. Grimes 
424d00947d8SCraig Rodrigues 	*vpp = vp;
425d00947d8SCraig Rodrigues 
426d00947d8SCraig Rodrigues 	return (0);
427df8bae1dSRodney W. Grimes }
428df8bae1dSRodney W. Grimes 
42980b301c3SPoul-Henning Kamp static int
unionfs_quotactl(struct mount * mp,int cmd,uid_t uid,void * arg,bool * mp_busy)430a4b07a27SJason A. Harmening unionfs_quotactl(struct mount *mp, int cmd, uid_t uid, void *arg,
431a4b07a27SJason A. Harmening     bool *mp_busy)
432df8bae1dSRodney W. Grimes {
433a4b07a27SJason A. Harmening 	struct mount *uppermp;
434d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
435a4b07a27SJason A. Harmening 	int error;
436a4b07a27SJason A. Harmening 	bool unbusy;
437df8bae1dSRodney W. Grimes 
438d00947d8SCraig Rodrigues 	ump = MOUNTTOUNIONFSMOUNT(mp);
439cc3ec9f7SJason A. Harmening 	/*
440cc3ec9f7SJason A. Harmening 	 * Issue a volatile load of um_uppermp here, as the mount may be
441cc3ec9f7SJason A. Harmening 	 * torn down after we call vfs_unbusy().
442cc3ec9f7SJason A. Harmening 	 */
443cc3ec9f7SJason A. Harmening 	uppermp = atomic_load_ptr(&ump->um_uppermp);
444a4b07a27SJason A. Harmening 	KASSERT(*mp_busy == true, ("upper mount not busy"));
445a4b07a27SJason A. Harmening 	/*
446a4b07a27SJason A. Harmening 	 * See comment in sys_quotactl() for an explanation of why the
447a4b07a27SJason A. Harmening 	 * lower mount needs to be busied by the caller of VFS_QUOTACTL()
448a4b07a27SJason A. Harmening 	 * but may be unbusied by the implementation.  We must unbusy
449a4b07a27SJason A. Harmening 	 * the upper mount for the same reason; otherwise a namei lookup
450a4b07a27SJason A. Harmening 	 * issued by the VFS_QUOTACTL() implementation could traverse the
451a4b07a27SJason A. Harmening 	 * upper mount and deadlock.
452a4b07a27SJason A. Harmening 	 */
453a4b07a27SJason A. Harmening 	vfs_unbusy(mp);
454a4b07a27SJason A. Harmening 	*mp_busy = false;
455a4b07a27SJason A. Harmening 	unbusy = true;
456a4b07a27SJason A. Harmening 	error = vfs_busy(uppermp, 0);
457d00947d8SCraig Rodrigues 	/*
458d00947d8SCraig Rodrigues 	 * Writing is always performed to upper vnode.
459d00947d8SCraig Rodrigues 	 */
460a4b07a27SJason A. Harmening 	if (error == 0)
461a4b07a27SJason A. Harmening 		error = VFS_QUOTACTL(uppermp, cmd, uid, arg, &unbusy);
462a4b07a27SJason A. Harmening 	if (unbusy)
463a4b07a27SJason A. Harmening 		vfs_unbusy(uppermp);
464a4b07a27SJason A. Harmening 
465a4b07a27SJason A. Harmening 	return (error);
466d00947d8SCraig Rodrigues }
467d00947d8SCraig Rodrigues 
468d00947d8SCraig Rodrigues static int
unionfs_statfs(struct mount * mp,struct statfs * sbp)469dfd233edSAttilio Rao unionfs_statfs(struct mount *mp, struct statfs *sbp)
470d00947d8SCraig Rodrigues {
471d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
4722f304845SKonstantin Belousov 	struct statfs	*mstat;
473d00947d8SCraig Rodrigues 	uint64_t	lbsize;
474312d49efSJason A. Harmening 	int		error;
475d00947d8SCraig Rodrigues 
476d00947d8SCraig Rodrigues 	ump = MOUNTTOUNIONFSMOUNT(mp);
477d00947d8SCraig Rodrigues 
478d00947d8SCraig Rodrigues 	UNIONFSDEBUG("unionfs_statfs(mp = %p, lvp = %p, uvp = %p)\n",
479312d49efSJason A. Harmening 	    mp, ump->um_lowervp, ump->um_uppervp);
480df8bae1dSRodney W. Grimes 
4812f304845SKonstantin Belousov 	mstat = malloc(sizeof(struct statfs), M_STATFS, M_WAITOK | M_ZERO);
482df8bae1dSRodney W. Grimes 
483cc3ec9f7SJason A. Harmening 	error = VFS_STATFS(ump->um_lowermp, mstat);
4842f304845SKonstantin Belousov 	if (error) {
4852f304845SKonstantin Belousov 		free(mstat, M_STATFS);
486df8bae1dSRodney W. Grimes 		return (error);
4872f304845SKonstantin Belousov 	}
488d00947d8SCraig Rodrigues 
489d00947d8SCraig Rodrigues 	/* now copy across the "interesting" information and fake the rest */
4902f304845SKonstantin Belousov 	sbp->f_blocks = mstat->f_blocks;
4912f304845SKonstantin Belousov 	sbp->f_files = mstat->f_files;
492d00947d8SCraig Rodrigues 
4932f304845SKonstantin Belousov 	lbsize = mstat->f_bsize;
494d00947d8SCraig Rodrigues 
495cc3ec9f7SJason A. Harmening 	error = VFS_STATFS(ump->um_uppermp, mstat);
4962f304845SKonstantin Belousov 	if (error) {
4972f304845SKonstantin Belousov 		free(mstat, M_STATFS);
498d00947d8SCraig Rodrigues 		return (error);
4992f304845SKonstantin Belousov 	}
5002f304845SKonstantin Belousov 
5011c4ccf09SDon Lewis 	/*
502d00947d8SCraig Rodrigues 	 * The FS type etc is copy from upper vfs.
503d00947d8SCraig Rodrigues 	 * (write able vfs have priority)
5041c4ccf09SDon Lewis 	 */
5052f304845SKonstantin Belousov 	sbp->f_type = mstat->f_type;
5062f304845SKonstantin Belousov 	sbp->f_flags = mstat->f_flags;
5072f304845SKonstantin Belousov 	sbp->f_bsize = mstat->f_bsize;
5082f304845SKonstantin Belousov 	sbp->f_iosize = mstat->f_iosize;
509df8bae1dSRodney W. Grimes 
5102f304845SKonstantin Belousov 	if (mstat->f_bsize != lbsize)
5112f304845SKonstantin Belousov 		sbp->f_blocks = ((off_t)sbp->f_blocks * lbsize) /
5122f304845SKonstantin Belousov 		    mstat->f_bsize;
513996c772fSJohn Dyson 
5142f304845SKonstantin Belousov 	sbp->f_blocks += mstat->f_blocks;
5152f304845SKonstantin Belousov 	sbp->f_bfree = mstat->f_bfree;
5162f304845SKonstantin Belousov 	sbp->f_bavail = mstat->f_bavail;
5172f304845SKonstantin Belousov 	sbp->f_files += mstat->f_files;
5182f304845SKonstantin Belousov 	sbp->f_ffree = mstat->f_ffree;
5192f304845SKonstantin Belousov 
5202f304845SKonstantin Belousov 	free(mstat, M_STATFS);
521df8bae1dSRodney W. Grimes 	return (0);
522df8bae1dSRodney W. Grimes }
523df8bae1dSRodney W. Grimes 
524d00947d8SCraig Rodrigues static int
unionfs_sync(struct mount * mp,int waitfor)525dfd233edSAttilio Rao unionfs_sync(struct mount *mp, int waitfor)
526d00947d8SCraig Rodrigues {
527d00947d8SCraig Rodrigues 	/* nothing to do */
528d00947d8SCraig Rodrigues 	return (0);
529d00947d8SCraig Rodrigues }
530d00947d8SCraig Rodrigues 
531d00947d8SCraig Rodrigues static int
unionfs_vget(struct mount * mp,ino_t ino,int flags,struct vnode ** vpp)532d00947d8SCraig Rodrigues unionfs_vget(struct mount *mp, ino_t ino, int flags, struct vnode **vpp)
533d00947d8SCraig Rodrigues {
534d00947d8SCraig Rodrigues 	return (EOPNOTSUPP);
535d00947d8SCraig Rodrigues }
536d00947d8SCraig Rodrigues 
537d00947d8SCraig Rodrigues static int
unionfs_fhtovp(struct mount * mp,struct fid * fidp,int flags,struct vnode ** vpp)538694a586aSRick Macklem unionfs_fhtovp(struct mount *mp, struct fid *fidp, int flags,
539694a586aSRick Macklem     struct vnode **vpp)
540d00947d8SCraig Rodrigues {
541d00947d8SCraig Rodrigues 	return (EOPNOTSUPP);
542d00947d8SCraig Rodrigues }
543d00947d8SCraig Rodrigues 
544d00947d8SCraig Rodrigues static int
unionfs_checkexp(struct mount * mp,struct sockaddr * nam,uint64_t * extflagsp,struct ucred ** credanonp,int * numsecflavors,int * secflavors)5451f7104d7SRick Macklem unionfs_checkexp(struct mount *mp, struct sockaddr *nam, uint64_t *extflagsp,
5461f7104d7SRick Macklem     struct ucred **credanonp, int *numsecflavors, int *secflavors)
547d00947d8SCraig Rodrigues {
548d00947d8SCraig Rodrigues 	return (EOPNOTSUPP);
549d00947d8SCraig Rodrigues }
550d00947d8SCraig Rodrigues 
551d00947d8SCraig Rodrigues static int
unionfs_extattrctl(struct mount * mp,int cmd,struct vnode * filename_vp,int namespace,const char * attrname)552d00947d8SCraig Rodrigues unionfs_extattrctl(struct mount *mp, int cmd, struct vnode *filename_vp,
553dfd233edSAttilio Rao     int namespace, const char *attrname)
554d00947d8SCraig Rodrigues {
555d00947d8SCraig Rodrigues 	struct unionfs_mount *ump;
556d00947d8SCraig Rodrigues 	struct unionfs_node *unp;
557d00947d8SCraig Rodrigues 
558d00947d8SCraig Rodrigues 	ump = MOUNTTOUNIONFSMOUNT(mp);
559d00947d8SCraig Rodrigues 	unp = VTOUNIONFS(filename_vp);
560d00947d8SCraig Rodrigues 
561d00947d8SCraig Rodrigues 	if (unp->un_uppervp != NULLVP) {
562cc3ec9f7SJason A. Harmening 		return (VFS_EXTATTRCTL(ump->um_uppermp, cmd,
563dfd233edSAttilio Rao 		    unp->un_uppervp, namespace, attrname));
564d00947d8SCraig Rodrigues 	} else {
565cc3ec9f7SJason A. Harmening 		return (VFS_EXTATTRCTL(ump->um_lowermp, cmd,
566dfd233edSAttilio Rao 		    unp->un_lowervp, namespace, attrname));
567d00947d8SCraig Rodrigues 	}
568d00947d8SCraig Rodrigues }
569d00947d8SCraig Rodrigues 
570d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops = {
571d00947d8SCraig Rodrigues 	.vfs_checkexp =		unionfs_checkexp,
572d00947d8SCraig Rodrigues 	.vfs_extattrctl =	unionfs_extattrctl,
573d00947d8SCraig Rodrigues 	.vfs_fhtovp =		unionfs_fhtovp,
574d00947d8SCraig Rodrigues 	.vfs_init =		unionfs_init,
575d00947d8SCraig Rodrigues 	.vfs_mount =		unionfs_domount,
576d00947d8SCraig Rodrigues 	.vfs_quotactl =		unionfs_quotactl,
577d00947d8SCraig Rodrigues 	.vfs_root =		unionfs_root,
578d00947d8SCraig Rodrigues 	.vfs_statfs =		unionfs_statfs,
579d00947d8SCraig Rodrigues 	.vfs_sync =		unionfs_sync,
580d00947d8SCraig Rodrigues 	.vfs_uninit =		unionfs_uninit,
581d00947d8SCraig Rodrigues 	.vfs_unmount =		unionfs_unmount,
582d00947d8SCraig Rodrigues 	.vfs_vget =		unionfs_vget,
583df8bae1dSRodney W. Grimes };
584c901836cSGarrett Wollman 
585d00947d8SCraig Rodrigues VFS_SET(unionfs_vfsops, unionfs, VFCF_LOOPBACK);
586