1d167cf6fSWarner Losh /*- 251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 351369649SPedro F. Giffuni * 4996c772fSJohn Dyson * Copyright (c) 1994, 1995 The Regents of the University of California. 5996c772fSJohn Dyson * Copyright (c) 1994, 1995 Jan-Simon Pendry. 6cb5736b7SDaichi GOTO * Copyright (c) 2005, 2006, 2012 Masanori Ozawa <ozawa@ongs.co.jp>, ONGS Inc. 7cb5736b7SDaichi GOTO * Copyright (c) 2006, 2012 Daichi Goto <daichi@freebsd.org> 8df8bae1dSRodney W. Grimes * All rights reserved. 9df8bae1dSRodney W. Grimes * 10df8bae1dSRodney W. Grimes * This code is derived from software donated to Berkeley by 11df8bae1dSRodney W. Grimes * Jan-Simon Pendry. 12df8bae1dSRodney W. Grimes * 13df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 14df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 15df8bae1dSRodney W. Grimes * are met: 16df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 18df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 19df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 20df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 21fbbd9655SWarner Losh * 3. Neither the name of the University nor the names of its contributors 22df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 23df8bae1dSRodney W. Grimes * without specific prior written permission. 24df8bae1dSRodney W. Grimes * 25df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 26df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 29df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35df8bae1dSRodney W. Grimes * SUCH DAMAGE. 36df8bae1dSRodney W. Grimes * 37996c772fSJohn Dyson * @(#)union_vfsops.c 8.20 (Berkeley) 5/20/95 38c3aac50fSPeter Wemm * $FreeBSD$ 39df8bae1dSRodney W. Grimes */ 40df8bae1dSRodney W. Grimes 41df8bae1dSRodney W. Grimes #include <sys/param.h> 42df8bae1dSRodney W. Grimes #include <sys/systm.h> 43d00947d8SCraig Rodrigues #include <sys/kdb.h> 4457b4252eSKonstantin Belousov #include <sys/fcntl.h> 45c9b1d604SGarrett Wollman #include <sys/kernel.h> 46805d90f7SJohn Baldwin #include <sys/lock.h> 47d00947d8SCraig Rodrigues #include <sys/malloc.h> 48df8bae1dSRodney W. Grimes #include <sys/mount.h> 49df8bae1dSRodney W. Grimes #include <sys/namei.h> 50d00947d8SCraig Rodrigues #include <sys/proc.h> 51d00947d8SCraig Rodrigues #include <sys/vnode.h> 52d00947d8SCraig Rodrigues #include <sys/stat.h> 53d00947d8SCraig Rodrigues 5499d300a1SRuslan Ermilov #include <fs/unionfs/union.h> 55df8bae1dSRodney W. Grimes 56d00947d8SCraig Rodrigues static MALLOC_DEFINE(M_UNIONFSMNT, "UNIONFS mount", "UNIONFS mount structure"); 57a1c995b6SPoul-Henning Kamp 58d00947d8SCraig Rodrigues static vfs_fhtovp_t unionfs_fhtovp; 59d00947d8SCraig Rodrigues static vfs_checkexp_t unionfs_checkexp; 60d00947d8SCraig Rodrigues static vfs_mount_t unionfs_domount; 61d00947d8SCraig Rodrigues static vfs_quotactl_t unionfs_quotactl; 62d00947d8SCraig Rodrigues static vfs_root_t unionfs_root; 63d00947d8SCraig Rodrigues static vfs_sync_t unionfs_sync; 64d00947d8SCraig Rodrigues static vfs_statfs_t unionfs_statfs; 65d00947d8SCraig Rodrigues static vfs_unmount_t unionfs_unmount; 66d00947d8SCraig Rodrigues static vfs_vget_t unionfs_vget; 67d00947d8SCraig Rodrigues static vfs_extattrctl_t unionfs_extattrctl; 68d00947d8SCraig Rodrigues 69d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops; 70b5e8ce9fSBruce Evans 71df8bae1dSRodney W. Grimes /* 72d00947d8SCraig Rodrigues * Mount unionfs layer. 73df8bae1dSRodney W. Grimes */ 7480b301c3SPoul-Henning Kamp static int 75dfd233edSAttilio Rao unionfs_domount(struct mount *mp) 76df8bae1dSRodney W. Grimes { 7759409cb9SJason A. Harmening struct mount *lowermp, *uppermp; 78d00947d8SCraig Rodrigues struct vnode *lowerrootvp; 79d00947d8SCraig Rodrigues struct vnode *upperrootvp; 80d00947d8SCraig Rodrigues struct unionfs_mount *ump; 81d00947d8SCraig Rodrigues char *target; 82d00947d8SCraig Rodrigues char *tmp; 83d00947d8SCraig Rodrigues char *ep; 84312d49efSJason A. Harmening struct nameidata nd, *ndp; 85312d49efSJason A. Harmening struct vattr va; 86312d49efSJason A. Harmening unionfs_copymode copymode; 87312d49efSJason A. Harmening unionfs_whitemode whitemode; 88d00947d8SCraig Rodrigues int below; 89312d49efSJason A. Harmening int error; 90312d49efSJason A. Harmening int len; 91d00947d8SCraig Rodrigues uid_t uid; 92d00947d8SCraig Rodrigues gid_t gid; 93d00947d8SCraig Rodrigues u_short udir; 94d00947d8SCraig Rodrigues u_short ufile; 95df8bae1dSRodney W. Grimes 96312d49efSJason A. Harmening UNIONFSDEBUG("unionfs_mount(mp = %p)\n", mp); 97df8bae1dSRodney W. Grimes 98d00947d8SCraig Rodrigues error = 0; 99d00947d8SCraig Rodrigues below = 0; 100d00947d8SCraig Rodrigues uid = 0; 101d00947d8SCraig Rodrigues gid = 0; 102d00947d8SCraig Rodrigues udir = 0; 103d00947d8SCraig Rodrigues ufile = 0; 104524f3f28SDaichi GOTO copymode = UNIONFS_TRANSPARENT; /* default */ 10520885defSDaichi GOTO whitemode = UNIONFS_WHITE_ALWAYS; 106d00947d8SCraig Rodrigues ndp = &nd; 10781bca6ddSKATO Takenori 1081e370dbbSCraig Rodrigues if (mp->mnt_flag & MNT_ROOTFS) { 1091e370dbbSCraig Rodrigues vfs_mount_error(mp, "Cannot union mount root filesystem"); 11064042a76SPoul-Henning Kamp return (EOPNOTSUPP); 1111e370dbbSCraig Rodrigues } 112d00947d8SCraig Rodrigues 11381bca6ddSKATO Takenori /* 114d00947d8SCraig Rodrigues * Update is a no operation. 115df8bae1dSRodney W. Grimes */ 1161e370dbbSCraig Rodrigues if (mp->mnt_flag & MNT_UPDATE) { 1171e370dbbSCraig Rodrigues vfs_mount_error(mp, "unionfs does not support mount update"); 118a9f5c04aSMaxime Henrion return (EOPNOTSUPP); 1191e370dbbSCraig Rodrigues } 120df8bae1dSRodney W. Grimes 121df8bae1dSRodney W. Grimes /* 122d00947d8SCraig Rodrigues * Get argument 123df8bae1dSRodney W. Grimes */ 124d00947d8SCraig Rodrigues error = vfs_getopt(mp->mnt_optnew, "target", (void **)&target, &len); 1253a773ad0SPoul-Henning Kamp if (error) 126d00947d8SCraig Rodrigues error = vfs_getopt(mp->mnt_optnew, "from", (void **)&target, 127d00947d8SCraig Rodrigues &len); 128d00947d8SCraig Rodrigues if (error || target[len - 1] != '\0') { 129d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid target"); 130d00947d8SCraig Rodrigues return (EINVAL); 131d00947d8SCraig Rodrigues } 132d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "below", NULL, NULL) == 0) 133d00947d8SCraig Rodrigues below = 1; 134d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "udir", (void **)&tmp, NULL) == 0) { 135d00947d8SCraig Rodrigues if (tmp != NULL) 136d00947d8SCraig Rodrigues udir = (mode_t)strtol(tmp, &ep, 8); 137d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 138d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid udir"); 139d00947d8SCraig Rodrigues return (EINVAL); 140d00947d8SCraig Rodrigues } 14116385727SDaichi GOTO udir &= S_IRWXU | S_IRWXG | S_IRWXO; 142d00947d8SCraig Rodrigues } 143d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "ufile", (void **)&tmp, NULL) == 0) { 144d00947d8SCraig Rodrigues if (tmp != NULL) 145d00947d8SCraig Rodrigues ufile = (mode_t)strtol(tmp, &ep, 8); 146d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 147d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid ufile"); 148d00947d8SCraig Rodrigues return (EINVAL); 149d00947d8SCraig Rodrigues } 15016385727SDaichi GOTO ufile &= S_IRWXU | S_IRWXG | S_IRWXO; 151d00947d8SCraig Rodrigues } 152d00947d8SCraig Rodrigues /* check umask, uid and gid */ 153d00947d8SCraig Rodrigues if (udir == 0 && ufile != 0) 154d00947d8SCraig Rodrigues udir = ufile; 155d00947d8SCraig Rodrigues if (ufile == 0 && udir != 0) 156d00947d8SCraig Rodrigues ufile = udir; 157d00947d8SCraig Rodrigues 158cb05b60aSAttilio Rao vn_lock(mp->mnt_vnodecovered, LK_SHARED | LK_RETRY); 1590359a12eSAttilio Rao error = VOP_GETATTR(mp->mnt_vnodecovered, &va, mp->mnt_cred); 160d00947d8SCraig Rodrigues if (!error) { 161d00947d8SCraig Rodrigues if (udir == 0) 162d00947d8SCraig Rodrigues udir = va.va_mode; 163d00947d8SCraig Rodrigues if (ufile == 0) 164d00947d8SCraig Rodrigues ufile = va.va_mode; 165d00947d8SCraig Rodrigues uid = va.va_uid; 166d00947d8SCraig Rodrigues gid = va.va_gid; 167d00947d8SCraig Rodrigues } 168b249ce48SMateusz Guzik VOP_UNLOCK(mp->mnt_vnodecovered); 169d00947d8SCraig Rodrigues if (error) 170d00947d8SCraig Rodrigues return (error); 171d00947d8SCraig Rodrigues 172d00947d8SCraig Rodrigues if (mp->mnt_cred->cr_ruid == 0) { /* root only */ 173d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "uid", (void **)&tmp, 174d00947d8SCraig Rodrigues NULL) == 0) { 175d00947d8SCraig Rodrigues if (tmp != NULL) 176d00947d8SCraig Rodrigues uid = (uid_t)strtol(tmp, &ep, 10); 177d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 178d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid uid"); 179d00947d8SCraig Rodrigues return (EINVAL); 180d00947d8SCraig Rodrigues } 181d00947d8SCraig Rodrigues } 182d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "gid", (void **)&tmp, 183d00947d8SCraig Rodrigues NULL) == 0) { 184d00947d8SCraig Rodrigues if (tmp != NULL) 185d00947d8SCraig Rodrigues gid = (gid_t)strtol(tmp, &ep, 10); 186d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 187d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid gid"); 188d00947d8SCraig Rodrigues return (EINVAL); 189d00947d8SCraig Rodrigues } 190d00947d8SCraig Rodrigues } 191d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "copymode", (void **)&tmp, 192d00947d8SCraig Rodrigues NULL) == 0) { 193d00947d8SCraig Rodrigues if (tmp == NULL) { 194d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid copymode"); 195d00947d8SCraig Rodrigues return (EINVAL); 196d00947d8SCraig Rodrigues } else if (strcasecmp(tmp, "traditional") == 0) 197d00947d8SCraig Rodrigues copymode = UNIONFS_TRADITIONAL; 198d00947d8SCraig Rodrigues else if (strcasecmp(tmp, "transparent") == 0) 199d00947d8SCraig Rodrigues copymode = UNIONFS_TRANSPARENT; 200d00947d8SCraig Rodrigues else if (strcasecmp(tmp, "masquerade") == 0) 201d00947d8SCraig Rodrigues copymode = UNIONFS_MASQUERADE; 202d00947d8SCraig Rodrigues else { 203d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid copymode"); 204d00947d8SCraig Rodrigues return (EINVAL); 205d00947d8SCraig Rodrigues } 206d00947d8SCraig Rodrigues } 20720885defSDaichi GOTO if (vfs_getopt(mp->mnt_optnew, "whiteout", (void **)&tmp, 20820885defSDaichi GOTO NULL) == 0) { 20920885defSDaichi GOTO if (tmp == NULL) { 21020885defSDaichi GOTO vfs_mount_error(mp, "Invalid whiteout mode"); 21120885defSDaichi GOTO return (EINVAL); 21220885defSDaichi GOTO } else if (strcasecmp(tmp, "always") == 0) 21320885defSDaichi GOTO whitemode = UNIONFS_WHITE_ALWAYS; 21420885defSDaichi GOTO else if (strcasecmp(tmp, "whenneeded") == 0) 21520885defSDaichi GOTO whitemode = UNIONFS_WHITE_WHENNEEDED; 21620885defSDaichi GOTO else { 21720885defSDaichi GOTO vfs_mount_error(mp, "Invalid whiteout mode"); 21820885defSDaichi GOTO return (EINVAL); 21920885defSDaichi GOTO } 22020885defSDaichi GOTO } 221d00947d8SCraig Rodrigues } 222d00947d8SCraig Rodrigues /* If copymode is UNIONFS_TRADITIONAL, uid/gid is mounted user. */ 223d00947d8SCraig Rodrigues if (copymode == UNIONFS_TRADITIONAL) { 224d00947d8SCraig Rodrigues uid = mp->mnt_cred->cr_ruid; 225d00947d8SCraig Rodrigues gid = mp->mnt_cred->cr_rgid; 226d00947d8SCraig Rodrigues } 227d00947d8SCraig Rodrigues 228d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: uid=%d, gid=%d\n", uid, gid); 229d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: udir=0%03o, ufile=0%03o\n", udir, ufile); 230d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: copymode=%d\n", copymode); 231d00947d8SCraig Rodrigues 232d00947d8SCraig Rodrigues /* 233d00947d8SCraig Rodrigues * Find upper node 234d00947d8SCraig Rodrigues */ 2357e1d3eefSMateusz Guzik NDINIT(ndp, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE, target); 236d00947d8SCraig Rodrigues if ((error = namei(ndp))) 237d00947d8SCraig Rodrigues return (error); 238d00947d8SCraig Rodrigues 239bb92cd7bSMateusz Guzik NDFREE_PNBUF(ndp); 240d00947d8SCraig Rodrigues 241d00947d8SCraig Rodrigues /* get root vnodes */ 242d00947d8SCraig Rodrigues lowerrootvp = mp->mnt_vnodecovered; 243df8bae1dSRodney W. Grimes upperrootvp = ndp->ni_vp; 244a01ca46bSJason A. Harmening KASSERT(lowerrootvp != NULL, ("%s: NULL lower root vp", __func__)); 245a01ca46bSJason A. Harmening KASSERT(upperrootvp != NULL, ("%s: NULL upper root vp", __func__)); 246df8bae1dSRodney W. Grimes 247d00947d8SCraig Rodrigues /* create unionfs_mount */ 248312d49efSJason A. Harmening ump = malloc(sizeof(struct unionfs_mount), M_UNIONFSMNT, 249312d49efSJason A. Harmening M_WAITOK | M_ZERO); 2502a31267eSMatthew Dillon 251d00947d8SCraig Rodrigues /* 252d00947d8SCraig Rodrigues * Save reference 253d00947d8SCraig Rodrigues */ 254d00947d8SCraig Rodrigues if (below) { 255b249ce48SMateusz Guzik VOP_UNLOCK(upperrootvp); 256cb05b60aSAttilio Rao vn_lock(lowerrootvp, LK_EXCLUSIVE | LK_RETRY); 257d00947d8SCraig Rodrigues ump->um_lowervp = upperrootvp; 258d00947d8SCraig Rodrigues ump->um_uppervp = lowerrootvp; 259d00947d8SCraig Rodrigues } else { 260d00947d8SCraig Rodrigues ump->um_lowervp = lowerrootvp; 261d00947d8SCraig Rodrigues ump->um_uppervp = upperrootvp; 262df8bae1dSRodney W. Grimes } 263d00947d8SCraig Rodrigues ump->um_rootvp = NULLVP; 264d00947d8SCraig Rodrigues ump->um_uid = uid; 265d00947d8SCraig Rodrigues ump->um_gid = gid; 266d00947d8SCraig Rodrigues ump->um_udir = udir; 267d00947d8SCraig Rodrigues ump->um_ufile = ufile; 268d00947d8SCraig Rodrigues ump->um_copymode = copymode; 26920885defSDaichi GOTO ump->um_whitemode = whitemode; 270d00947d8SCraig Rodrigues 27177465d93SAlfred Perlstein mp->mnt_data = ump; 272df8bae1dSRodney W. Grimes 273996c772fSJohn Dyson /* 274d00947d8SCraig Rodrigues * Copy upper layer's RDONLY flag. 275d00947d8SCraig Rodrigues */ 276d00947d8SCraig Rodrigues mp->mnt_flag |= ump->um_uppervp->v_mount->mnt_flag & MNT_RDONLY; 277d00947d8SCraig Rodrigues 278d00947d8SCraig Rodrigues /* 279d00947d8SCraig Rodrigues * Unlock the node 280df8bae1dSRodney W. Grimes */ 281b249ce48SMateusz Guzik VOP_UNLOCK(ump->um_uppervp); 282df8bae1dSRodney W. Grimes 283d00947d8SCraig Rodrigues /* 284d00947d8SCraig Rodrigues * Get the unionfs root vnode. 285d00947d8SCraig Rodrigues */ 286d00947d8SCraig Rodrigues error = unionfs_nodeget(mp, ump->um_uppervp, ump->um_lowervp, 2876d8420d4SJason A. Harmening NULLVP, &(ump->um_rootvp), NULL); 28859409cb9SJason A. Harmening if (error != 0) { 289*0745d837SJason A. Harmening vrele(upperrootvp); 290d00947d8SCraig Rodrigues free(ump, M_UNIONFSMNT); 291d00947d8SCraig Rodrigues mp->mnt_data = NULL; 292df8bae1dSRodney W. Grimes return (error); 293df8bae1dSRodney W. Grimes } 294a01ca46bSJason A. Harmening KASSERT(ump->um_rootvp != NULL, ("rootvp cannot be NULL")); 295a01ca46bSJason A. Harmening KASSERT((ump->um_rootvp->v_vflag & VV_ROOT) != 0, 296a01ca46bSJason A. Harmening ("%s: rootvp without VV_ROOT", __func__)); 297df8bae1dSRodney W. Grimes 298*0745d837SJason A. Harmening /* 299*0745d837SJason A. Harmening * Do not release the namei() reference on upperrootvp until after 300*0745d837SJason A. Harmening * we attempt to register the upper mounts. A concurrent unmount 301*0745d837SJason A. Harmening * of the upper or lower FS may have caused unionfs_nodeget() to 302*0745d837SJason A. Harmening * create a unionfs node with a NULL upper or lower vp and with 303*0745d837SJason A. Harmening * no reference held on upperrootvp or lowerrootvp. 304*0745d837SJason A. Harmening * vfs_register_upper() should subsequently fail, which is what 305*0745d837SJason A. Harmening * we want, but we must ensure neither underlying vnode can be 306*0745d837SJason A. Harmening * reused until that happens. We assume the caller holds a reference 307*0745d837SJason A. Harmening * to lowerrootvp as it is the mount's covered vnode. 308*0745d837SJason A. Harmening */ 309c746ed72SJason A. Harmening lowermp = vfs_register_upper_from_vp(ump->um_lowervp, mp, 310c746ed72SJason A. Harmening &ump->um_lower_link); 311c746ed72SJason A. Harmening uppermp = vfs_register_upper_from_vp(ump->um_uppervp, mp, 312c746ed72SJason A. Harmening &ump->um_upper_link); 31359409cb9SJason A. Harmening 314*0745d837SJason A. Harmening vrele(upperrootvp); 315*0745d837SJason A. Harmening 31659409cb9SJason A. Harmening if (lowermp == NULL || uppermp == NULL) { 31759409cb9SJason A. Harmening if (lowermp != NULL) 318c746ed72SJason A. Harmening vfs_unregister_upper(lowermp, &ump->um_lower_link); 31959409cb9SJason A. Harmening if (uppermp != NULL) 320c746ed72SJason A. Harmening vfs_unregister_upper(uppermp, &ump->um_upper_link); 32159409cb9SJason A. Harmening free(ump, M_UNIONFSMNT); 32259409cb9SJason A. Harmening mp->mnt_data = NULL; 32359409cb9SJason A. Harmening return (ENOENT); 32459409cb9SJason A. Harmening } 32559409cb9SJason A. Harmening 326080ef8a4SJason A. Harmening /* 327080ef8a4SJason A. Harmening * Specify that the covered vnode lock should remain held while 328080ef8a4SJason A. Harmening * lookup() performs the cross-mount walk. This prevents a lock-order 329080ef8a4SJason A. Harmening * reversal between the covered vnode lock (which is also locked by 330080ef8a4SJason A. Harmening * unionfs_lock()) and the mountpoint's busy count. Without this, 331080ef8a4SJason A. Harmening * unmount will lock the covered vnode lock (directly through the 332080ef8a4SJason A. Harmening * covered vnode) and wait for the busy count to drain, while a 333080ef8a4SJason A. Harmening * concurrent lookup will increment the busy count and then lock 334080ef8a4SJason A. Harmening * the covered vnode lock (indirectly through unionfs_lock()). 335080ef8a4SJason A. Harmening * 336080ef8a4SJason A. Harmening * Note that we can't yet use this facility for the 'below' case 337080ef8a4SJason A. Harmening * in which the upper vnode is the covered vnode, because that would 338080ef8a4SJason A. Harmening * introduce a different LOR in which the cross-mount lookup would 339080ef8a4SJason A. Harmening * effectively hold the upper vnode lock before acquiring the lower 340080ef8a4SJason A. Harmening * vnode lock, while an unrelated lock operation would still acquire 341080ef8a4SJason A. Harmening * the lower vnode lock before the upper vnode lock, which is the 342080ef8a4SJason A. Harmening * order unionfs currently requires. 343080ef8a4SJason A. Harmening */ 344080ef8a4SJason A. Harmening if (!below) { 3455cec725cSJason A. Harmening vn_lock(mp->mnt_vnodecovered, LK_EXCLUSIVE | LK_RETRY | LK_CANRECURSE); 346080ef8a4SJason A. Harmening mp->mnt_vnodecovered->v_vflag |= VV_CROSSLOCK; 347080ef8a4SJason A. Harmening VOP_UNLOCK(mp->mnt_vnodecovered); 348080ef8a4SJason A. Harmening } 349080ef8a4SJason A. Harmening 350a8a07fd6SMateusz Guzik MNT_ILOCK(mp); 35159409cb9SJason A. Harmening if ((lowermp->mnt_flag & MNT_LOCAL) != 0 && 35259409cb9SJason A. Harmening (uppermp->mnt_flag & MNT_LOCAL) != 0) 353d00947d8SCraig Rodrigues mp->mnt_flag |= MNT_LOCAL; 354d3cc5354SMateusz Guzik mp->mnt_kern_flag |= MNTK_NOMSYNC | MNTK_UNIONFS; 355a8a07fd6SMateusz Guzik MNT_IUNLOCK(mp); 356d00947d8SCraig Rodrigues 357d00947d8SCraig Rodrigues /* 358d00947d8SCraig Rodrigues * Get new fsid 359d00947d8SCraig Rodrigues */ 360d00947d8SCraig Rodrigues vfs_getnewfsid(mp); 361d00947d8SCraig Rodrigues 362852c303bSConrad Meyer snprintf(mp->mnt_stat.f_mntfromname, MNAMELEN, "<%s>:%s", 363852c303bSConrad Meyer below ? "below" : "above", target); 364d00947d8SCraig Rodrigues 365d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: from %s, on %s\n", 366d00947d8SCraig Rodrigues mp->mnt_stat.f_mntfromname, mp->mnt_stat.f_mntonname); 367d00947d8SCraig Rodrigues 368d00947d8SCraig Rodrigues return (0); 369d00947d8SCraig Rodrigues } 370d00947d8SCraig Rodrigues 371d00947d8SCraig Rodrigues /* 372d00947d8SCraig Rodrigues * Free reference to unionfs layer 373df8bae1dSRodney W. Grimes */ 37480b301c3SPoul-Henning Kamp static int 375dfd233edSAttilio Rao unionfs_unmount(struct mount *mp, int mntflags) 376df8bae1dSRodney W. Grimes { 377d00947d8SCraig Rodrigues struct unionfs_mount *ump; 378df8bae1dSRodney W. Grimes int error; 379d00947d8SCraig Rodrigues int num; 380996c772fSJohn Dyson int freeing; 381d00947d8SCraig Rodrigues int flags; 382df8bae1dSRodney W. Grimes 383312d49efSJason A. Harmening UNIONFSDEBUG("unionfs_unmount: mp = %p\n", mp); 384d00947d8SCraig Rodrigues 385d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 386d00947d8SCraig Rodrigues flags = 0; 387df8bae1dSRodney W. Grimes 388996c772fSJohn Dyson if (mntflags & MNT_FORCE) 389996c772fSJohn Dyson flags |= FORCECLOSE; 390996c772fSJohn Dyson 391d00947d8SCraig Rodrigues /* vflush (no need to call vrele) */ 392dfd233edSAttilio Rao for (freeing = 0; (error = vflush(mp, 1, flags, curthread)) != 0;) { 393d00947d8SCraig Rodrigues num = mp->mnt_nvnodelistsize; 394d00947d8SCraig Rodrigues if (num == freeing) 395996c772fSJohn Dyson break; 396d00947d8SCraig Rodrigues freeing = num; 397df8bae1dSRodney W. Grimes } 398df8bae1dSRodney W. Grimes 3990864ef1eSIan Dowse if (error) 4000864ef1eSIan Dowse return (error); 401df8bae1dSRodney W. Grimes 4025cec725cSJason A. Harmening vn_lock(mp->mnt_vnodecovered, LK_EXCLUSIVE | LK_RETRY | LK_CANRECURSE); 403080ef8a4SJason A. Harmening mp->mnt_vnodecovered->v_vflag &= ~VV_CROSSLOCK; 404080ef8a4SJason A. Harmening VOP_UNLOCK(mp->mnt_vnodecovered); 405c746ed72SJason A. Harmening vfs_unregister_upper(ump->um_lowervp->v_mount, &ump->um_lower_link); 406c746ed72SJason A. Harmening vfs_unregister_upper(ump->um_uppervp->v_mount, &ump->um_upper_link); 407d00947d8SCraig Rodrigues free(ump, M_UNIONFSMNT); 40811753bd0SKevin Lo mp->mnt_data = NULL; 409d00947d8SCraig Rodrigues 410df8bae1dSRodney W. Grimes return (0); 411df8bae1dSRodney W. Grimes } 412df8bae1dSRodney W. Grimes 41380b301c3SPoul-Henning Kamp static int 414dfd233edSAttilio Rao unionfs_root(struct mount *mp, int flags, struct vnode **vpp) 415df8bae1dSRodney W. Grimes { 416d00947d8SCraig Rodrigues struct unionfs_mount *ump; 417d00947d8SCraig Rodrigues struct vnode *vp; 418df8bae1dSRodney W. Grimes 419d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 420d00947d8SCraig Rodrigues vp = ump->um_rootvp; 4212a31267eSMatthew Dillon 422d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_root: rootvp=%p locked=%x\n", 42381c794f9SAttilio Rao vp, VOP_ISLOCKED(vp)); 424df8bae1dSRodney W. Grimes 425d00947d8SCraig Rodrigues vref(vp); 426d00947d8SCraig Rodrigues if (flags & LK_TYPE_MASK) 427cb05b60aSAttilio Rao vn_lock(vp, flags); 428df8bae1dSRodney W. Grimes 429d00947d8SCraig Rodrigues *vpp = vp; 430d00947d8SCraig Rodrigues 431d00947d8SCraig Rodrigues return (0); 432df8bae1dSRodney W. Grimes } 433df8bae1dSRodney W. Grimes 43480b301c3SPoul-Henning Kamp static int 435a4b07a27SJason A. Harmening unionfs_quotactl(struct mount *mp, int cmd, uid_t uid, void *arg, 436a4b07a27SJason A. Harmening bool *mp_busy) 437df8bae1dSRodney W. Grimes { 438a4b07a27SJason A. Harmening struct mount *uppermp; 439d00947d8SCraig Rodrigues struct unionfs_mount *ump; 440a4b07a27SJason A. Harmening int error; 441a4b07a27SJason A. Harmening bool unbusy; 442df8bae1dSRodney W. Grimes 443d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 444a4b07a27SJason A. Harmening uppermp = atomic_load_ptr(&ump->um_uppervp->v_mount); 445a4b07a27SJason A. Harmening KASSERT(*mp_busy == true, ("upper mount not busy")); 446a4b07a27SJason A. Harmening /* 447a4b07a27SJason A. Harmening * See comment in sys_quotactl() for an explanation of why the 448a4b07a27SJason A. Harmening * lower mount needs to be busied by the caller of VFS_QUOTACTL() 449a4b07a27SJason A. Harmening * but may be unbusied by the implementation. We must unbusy 450a4b07a27SJason A. Harmening * the upper mount for the same reason; otherwise a namei lookup 451a4b07a27SJason A. Harmening * issued by the VFS_QUOTACTL() implementation could traverse the 452a4b07a27SJason A. Harmening * upper mount and deadlock. 453a4b07a27SJason A. Harmening */ 454a4b07a27SJason A. Harmening vfs_unbusy(mp); 455a4b07a27SJason A. Harmening *mp_busy = false; 456a4b07a27SJason A. Harmening unbusy = true; 457a4b07a27SJason A. Harmening error = vfs_busy(uppermp, 0); 458d00947d8SCraig Rodrigues /* 459d00947d8SCraig Rodrigues * Writing is always performed to upper vnode. 460d00947d8SCraig Rodrigues */ 461a4b07a27SJason A. Harmening if (error == 0) 462a4b07a27SJason A. Harmening error = VFS_QUOTACTL(uppermp, cmd, uid, arg, &unbusy); 463a4b07a27SJason A. Harmening if (unbusy) 464a4b07a27SJason A. Harmening vfs_unbusy(uppermp); 465a4b07a27SJason A. Harmening 466a4b07a27SJason A. Harmening return (error); 467d00947d8SCraig Rodrigues } 468d00947d8SCraig Rodrigues 469d00947d8SCraig Rodrigues static int 470dfd233edSAttilio Rao unionfs_statfs(struct mount *mp, struct statfs *sbp) 471d00947d8SCraig Rodrigues { 472d00947d8SCraig Rodrigues struct unionfs_mount *ump; 4732f304845SKonstantin Belousov struct statfs *mstat; 474d00947d8SCraig Rodrigues uint64_t lbsize; 475312d49efSJason A. Harmening int error; 476d00947d8SCraig Rodrigues 477d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 478d00947d8SCraig Rodrigues 479d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_statfs(mp = %p, lvp = %p, uvp = %p)\n", 480312d49efSJason A. Harmening mp, ump->um_lowervp, ump->um_uppervp); 481df8bae1dSRodney W. Grimes 4822f304845SKonstantin Belousov mstat = malloc(sizeof(struct statfs), M_STATFS, M_WAITOK | M_ZERO); 483df8bae1dSRodney W. Grimes 4842f304845SKonstantin Belousov error = VFS_STATFS(ump->um_lowervp->v_mount, mstat); 4852f304845SKonstantin Belousov if (error) { 4862f304845SKonstantin Belousov free(mstat, M_STATFS); 487df8bae1dSRodney W. Grimes return (error); 4882f304845SKonstantin Belousov } 489d00947d8SCraig Rodrigues 490d00947d8SCraig Rodrigues /* now copy across the "interesting" information and fake the rest */ 4912f304845SKonstantin Belousov sbp->f_blocks = mstat->f_blocks; 4922f304845SKonstantin Belousov sbp->f_files = mstat->f_files; 493d00947d8SCraig Rodrigues 4942f304845SKonstantin Belousov lbsize = mstat->f_bsize; 495d00947d8SCraig Rodrigues 4962f304845SKonstantin Belousov error = VFS_STATFS(ump->um_uppervp->v_mount, mstat); 4972f304845SKonstantin Belousov if (error) { 4982f304845SKonstantin Belousov free(mstat, M_STATFS); 499d00947d8SCraig Rodrigues return (error); 5002f304845SKonstantin Belousov } 5012f304845SKonstantin Belousov 5021c4ccf09SDon Lewis /* 503d00947d8SCraig Rodrigues * The FS type etc is copy from upper vfs. 504d00947d8SCraig Rodrigues * (write able vfs have priority) 5051c4ccf09SDon Lewis */ 5062f304845SKonstantin Belousov sbp->f_type = mstat->f_type; 5072f304845SKonstantin Belousov sbp->f_flags = mstat->f_flags; 5082f304845SKonstantin Belousov sbp->f_bsize = mstat->f_bsize; 5092f304845SKonstantin Belousov sbp->f_iosize = mstat->f_iosize; 510df8bae1dSRodney W. Grimes 5112f304845SKonstantin Belousov if (mstat->f_bsize != lbsize) 5122f304845SKonstantin Belousov sbp->f_blocks = ((off_t)sbp->f_blocks * lbsize) / 5132f304845SKonstantin Belousov mstat->f_bsize; 514996c772fSJohn Dyson 5152f304845SKonstantin Belousov sbp->f_blocks += mstat->f_blocks; 5162f304845SKonstantin Belousov sbp->f_bfree = mstat->f_bfree; 5172f304845SKonstantin Belousov sbp->f_bavail = mstat->f_bavail; 5182f304845SKonstantin Belousov sbp->f_files += mstat->f_files; 5192f304845SKonstantin Belousov sbp->f_ffree = mstat->f_ffree; 5202f304845SKonstantin Belousov 5212f304845SKonstantin Belousov free(mstat, M_STATFS); 522df8bae1dSRodney W. Grimes return (0); 523df8bae1dSRodney W. Grimes } 524df8bae1dSRodney W. Grimes 525d00947d8SCraig Rodrigues static int 526dfd233edSAttilio Rao unionfs_sync(struct mount *mp, int waitfor) 527d00947d8SCraig Rodrigues { 528d00947d8SCraig Rodrigues /* nothing to do */ 529d00947d8SCraig Rodrigues return (0); 530d00947d8SCraig Rodrigues } 531d00947d8SCraig Rodrigues 532d00947d8SCraig Rodrigues static int 533d00947d8SCraig Rodrigues unionfs_vget(struct mount *mp, ino_t ino, int flags, struct vnode **vpp) 534d00947d8SCraig Rodrigues { 535d00947d8SCraig Rodrigues return (EOPNOTSUPP); 536d00947d8SCraig Rodrigues } 537d00947d8SCraig Rodrigues 538d00947d8SCraig Rodrigues static int 539694a586aSRick Macklem unionfs_fhtovp(struct mount *mp, struct fid *fidp, int flags, 540694a586aSRick Macklem struct vnode **vpp) 541d00947d8SCraig Rodrigues { 542d00947d8SCraig Rodrigues return (EOPNOTSUPP); 543d00947d8SCraig Rodrigues } 544d00947d8SCraig Rodrigues 545d00947d8SCraig Rodrigues static int 5461f7104d7SRick Macklem unionfs_checkexp(struct mount *mp, struct sockaddr *nam, uint64_t *extflagsp, 5471f7104d7SRick Macklem struct ucred **credanonp, int *numsecflavors, int *secflavors) 548d00947d8SCraig Rodrigues { 549d00947d8SCraig Rodrigues return (EOPNOTSUPP); 550d00947d8SCraig Rodrigues } 551d00947d8SCraig Rodrigues 552d00947d8SCraig Rodrigues static int 553d00947d8SCraig Rodrigues unionfs_extattrctl(struct mount *mp, int cmd, struct vnode *filename_vp, 554dfd233edSAttilio Rao int namespace, const char *attrname) 555d00947d8SCraig Rodrigues { 556d00947d8SCraig Rodrigues struct unionfs_mount *ump; 557d00947d8SCraig Rodrigues struct unionfs_node *unp; 558d00947d8SCraig Rodrigues 559d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 560d00947d8SCraig Rodrigues unp = VTOUNIONFS(filename_vp); 561d00947d8SCraig Rodrigues 562d00947d8SCraig Rodrigues if (unp->un_uppervp != NULLVP) { 563d00947d8SCraig Rodrigues return (VFS_EXTATTRCTL(ump->um_uppervp->v_mount, cmd, 564dfd233edSAttilio Rao unp->un_uppervp, namespace, attrname)); 565d00947d8SCraig Rodrigues } else { 566d00947d8SCraig Rodrigues return (VFS_EXTATTRCTL(ump->um_lowervp->v_mount, cmd, 567dfd233edSAttilio Rao unp->un_lowervp, namespace, attrname)); 568d00947d8SCraig Rodrigues } 569d00947d8SCraig Rodrigues } 570d00947d8SCraig Rodrigues 571d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops = { 572d00947d8SCraig Rodrigues .vfs_checkexp = unionfs_checkexp, 573d00947d8SCraig Rodrigues .vfs_extattrctl = unionfs_extattrctl, 574d00947d8SCraig Rodrigues .vfs_fhtovp = unionfs_fhtovp, 575d00947d8SCraig Rodrigues .vfs_init = unionfs_init, 576d00947d8SCraig Rodrigues .vfs_mount = unionfs_domount, 577d00947d8SCraig Rodrigues .vfs_quotactl = unionfs_quotactl, 578d00947d8SCraig Rodrigues .vfs_root = unionfs_root, 579d00947d8SCraig Rodrigues .vfs_statfs = unionfs_statfs, 580d00947d8SCraig Rodrigues .vfs_sync = unionfs_sync, 581d00947d8SCraig Rodrigues .vfs_uninit = unionfs_uninit, 582d00947d8SCraig Rodrigues .vfs_unmount = unionfs_unmount, 583d00947d8SCraig Rodrigues .vfs_vget = unionfs_vget, 584df8bae1dSRodney W. Grimes }; 585c901836cSGarrett Wollman 586d00947d8SCraig Rodrigues VFS_SET(unionfs_vfsops, unionfs, VFCF_LOOPBACK); 587