1d167cf6fSWarner Losh /*- 251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 351369649SPedro F. Giffuni * 4996c772fSJohn Dyson * Copyright (c) 1994, 1995 The Regents of the University of California. 5996c772fSJohn Dyson * Copyright (c) 1994, 1995 Jan-Simon Pendry. 6cb5736b7SDaichi GOTO * Copyright (c) 2005, 2006, 2012 Masanori Ozawa <ozawa@ongs.co.jp>, ONGS Inc. 7cb5736b7SDaichi GOTO * Copyright (c) 2006, 2012 Daichi Goto <daichi@freebsd.org> 8df8bae1dSRodney W. Grimes * All rights reserved. 9df8bae1dSRodney W. Grimes * 10df8bae1dSRodney W. Grimes * This code is derived from software donated to Berkeley by 11df8bae1dSRodney W. Grimes * Jan-Simon Pendry. 12df8bae1dSRodney W. Grimes * 13df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 14df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 15df8bae1dSRodney W. Grimes * are met: 16df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 17df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 18df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 19df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 20df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 21fbbd9655SWarner Losh * 3. Neither the name of the University nor the names of its contributors 22df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 23df8bae1dSRodney W. Grimes * without specific prior written permission. 24df8bae1dSRodney W. Grimes * 25df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 26df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 29df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35df8bae1dSRodney W. Grimes * SUCH DAMAGE. 36df8bae1dSRodney W. Grimes * 37996c772fSJohn Dyson * @(#)union_vfsops.c 8.20 (Berkeley) 5/20/95 38c3aac50fSPeter Wemm * $FreeBSD$ 39df8bae1dSRodney W. Grimes */ 40df8bae1dSRodney W. Grimes 41df8bae1dSRodney W. Grimes #include <sys/param.h> 42df8bae1dSRodney W. Grimes #include <sys/systm.h> 43d00947d8SCraig Rodrigues #include <sys/kdb.h> 4457b4252eSKonstantin Belousov #include <sys/fcntl.h> 45c9b1d604SGarrett Wollman #include <sys/kernel.h> 46805d90f7SJohn Baldwin #include <sys/lock.h> 47d00947d8SCraig Rodrigues #include <sys/malloc.h> 48df8bae1dSRodney W. Grimes #include <sys/mount.h> 49df8bae1dSRodney W. Grimes #include <sys/namei.h> 50d00947d8SCraig Rodrigues #include <sys/proc.h> 51d00947d8SCraig Rodrigues #include <sys/vnode.h> 52d00947d8SCraig Rodrigues #include <sys/stat.h> 53d00947d8SCraig Rodrigues 5499d300a1SRuslan Ermilov #include <fs/unionfs/union.h> 55df8bae1dSRodney W. Grimes 56d00947d8SCraig Rodrigues static MALLOC_DEFINE(M_UNIONFSMNT, "UNIONFS mount", "UNIONFS mount structure"); 57a1c995b6SPoul-Henning Kamp 58d00947d8SCraig Rodrigues static vfs_fhtovp_t unionfs_fhtovp; 59d00947d8SCraig Rodrigues static vfs_checkexp_t unionfs_checkexp; 60d00947d8SCraig Rodrigues static vfs_mount_t unionfs_domount; 61d00947d8SCraig Rodrigues static vfs_quotactl_t unionfs_quotactl; 62d00947d8SCraig Rodrigues static vfs_root_t unionfs_root; 63d00947d8SCraig Rodrigues static vfs_sync_t unionfs_sync; 64d00947d8SCraig Rodrigues static vfs_statfs_t unionfs_statfs; 65d00947d8SCraig Rodrigues static vfs_unmount_t unionfs_unmount; 66d00947d8SCraig Rodrigues static vfs_vget_t unionfs_vget; 67d00947d8SCraig Rodrigues static vfs_extattrctl_t unionfs_extattrctl; 68d00947d8SCraig Rodrigues 69d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops; 70b5e8ce9fSBruce Evans 71df8bae1dSRodney W. Grimes /* 72d00947d8SCraig Rodrigues * Mount unionfs layer. 73df8bae1dSRodney W. Grimes */ 7480b301c3SPoul-Henning Kamp static int 75dfd233edSAttilio Rao unionfs_domount(struct mount *mp) 76df8bae1dSRodney W. Grimes { 7759409cb9SJason A. Harmening struct mount *lowermp, *uppermp; 78d00947d8SCraig Rodrigues struct vnode *lowerrootvp; 79d00947d8SCraig Rodrigues struct vnode *upperrootvp; 80d00947d8SCraig Rodrigues struct unionfs_mount *ump; 81d00947d8SCraig Rodrigues char *target; 82d00947d8SCraig Rodrigues char *tmp; 83d00947d8SCraig Rodrigues char *ep; 84312d49efSJason A. Harmening struct nameidata nd, *ndp; 85312d49efSJason A. Harmening struct vattr va; 86312d49efSJason A. Harmening unionfs_copymode copymode; 87312d49efSJason A. Harmening unionfs_whitemode whitemode; 88d00947d8SCraig Rodrigues int below; 89312d49efSJason A. Harmening int error; 90312d49efSJason A. Harmening int len; 91d00947d8SCraig Rodrigues uid_t uid; 92d00947d8SCraig Rodrigues gid_t gid; 93d00947d8SCraig Rodrigues u_short udir; 94d00947d8SCraig Rodrigues u_short ufile; 95df8bae1dSRodney W. Grimes 96312d49efSJason A. Harmening UNIONFSDEBUG("unionfs_mount(mp = %p)\n", mp); 97df8bae1dSRodney W. Grimes 98d00947d8SCraig Rodrigues error = 0; 99d00947d8SCraig Rodrigues below = 0; 100d00947d8SCraig Rodrigues uid = 0; 101d00947d8SCraig Rodrigues gid = 0; 102d00947d8SCraig Rodrigues udir = 0; 103d00947d8SCraig Rodrigues ufile = 0; 104524f3f28SDaichi GOTO copymode = UNIONFS_TRANSPARENT; /* default */ 10520885defSDaichi GOTO whitemode = UNIONFS_WHITE_ALWAYS; 106d00947d8SCraig Rodrigues ndp = &nd; 10781bca6ddSKATO Takenori 1081e370dbbSCraig Rodrigues if (mp->mnt_flag & MNT_ROOTFS) { 1091e370dbbSCraig Rodrigues vfs_mount_error(mp, "Cannot union mount root filesystem"); 11064042a76SPoul-Henning Kamp return (EOPNOTSUPP); 1111e370dbbSCraig Rodrigues } 112d00947d8SCraig Rodrigues 11381bca6ddSKATO Takenori /* 114d00947d8SCraig Rodrigues * Update is a no operation. 115df8bae1dSRodney W. Grimes */ 1161e370dbbSCraig Rodrigues if (mp->mnt_flag & MNT_UPDATE) { 1171e370dbbSCraig Rodrigues vfs_mount_error(mp, "unionfs does not support mount update"); 118a9f5c04aSMaxime Henrion return (EOPNOTSUPP); 1191e370dbbSCraig Rodrigues } 120df8bae1dSRodney W. Grimes 121df8bae1dSRodney W. Grimes /* 122d00947d8SCraig Rodrigues * Get argument 123df8bae1dSRodney W. Grimes */ 124d00947d8SCraig Rodrigues error = vfs_getopt(mp->mnt_optnew, "target", (void **)&target, &len); 1253a773ad0SPoul-Henning Kamp if (error) 126d00947d8SCraig Rodrigues error = vfs_getopt(mp->mnt_optnew, "from", (void **)&target, 127d00947d8SCraig Rodrigues &len); 128d00947d8SCraig Rodrigues if (error || target[len - 1] != '\0') { 129d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid target"); 130d00947d8SCraig Rodrigues return (EINVAL); 131d00947d8SCraig Rodrigues } 132d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "below", NULL, NULL) == 0) 133d00947d8SCraig Rodrigues below = 1; 134d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "udir", (void **)&tmp, NULL) == 0) { 135d00947d8SCraig Rodrigues if (tmp != NULL) 136d00947d8SCraig Rodrigues udir = (mode_t)strtol(tmp, &ep, 8); 137d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 138d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid udir"); 139d00947d8SCraig Rodrigues return (EINVAL); 140d00947d8SCraig Rodrigues } 14116385727SDaichi GOTO udir &= S_IRWXU | S_IRWXG | S_IRWXO; 142d00947d8SCraig Rodrigues } 143d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "ufile", (void **)&tmp, NULL) == 0) { 144d00947d8SCraig Rodrigues if (tmp != NULL) 145d00947d8SCraig Rodrigues ufile = (mode_t)strtol(tmp, &ep, 8); 146d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 147d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid ufile"); 148d00947d8SCraig Rodrigues return (EINVAL); 149d00947d8SCraig Rodrigues } 15016385727SDaichi GOTO ufile &= S_IRWXU | S_IRWXG | S_IRWXO; 151d00947d8SCraig Rodrigues } 152d00947d8SCraig Rodrigues /* check umask, uid and gid */ 153d00947d8SCraig Rodrigues if (udir == 0 && ufile != 0) 154d00947d8SCraig Rodrigues udir = ufile; 155d00947d8SCraig Rodrigues if (ufile == 0 && udir != 0) 156d00947d8SCraig Rodrigues ufile = udir; 157d00947d8SCraig Rodrigues 158cb05b60aSAttilio Rao vn_lock(mp->mnt_vnodecovered, LK_SHARED | LK_RETRY); 1590359a12eSAttilio Rao error = VOP_GETATTR(mp->mnt_vnodecovered, &va, mp->mnt_cred); 160d00947d8SCraig Rodrigues if (!error) { 161d00947d8SCraig Rodrigues if (udir == 0) 162d00947d8SCraig Rodrigues udir = va.va_mode; 163d00947d8SCraig Rodrigues if (ufile == 0) 164d00947d8SCraig Rodrigues ufile = va.va_mode; 165d00947d8SCraig Rodrigues uid = va.va_uid; 166d00947d8SCraig Rodrigues gid = va.va_gid; 167d00947d8SCraig Rodrigues } 168b249ce48SMateusz Guzik VOP_UNLOCK(mp->mnt_vnodecovered); 169d00947d8SCraig Rodrigues if (error) 170d00947d8SCraig Rodrigues return (error); 171d00947d8SCraig Rodrigues 172d00947d8SCraig Rodrigues if (mp->mnt_cred->cr_ruid == 0) { /* root only */ 173d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "uid", (void **)&tmp, 174d00947d8SCraig Rodrigues NULL) == 0) { 175d00947d8SCraig Rodrigues if (tmp != NULL) 176d00947d8SCraig Rodrigues uid = (uid_t)strtol(tmp, &ep, 10); 177d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 178d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid uid"); 179d00947d8SCraig Rodrigues return (EINVAL); 180d00947d8SCraig Rodrigues } 181d00947d8SCraig Rodrigues } 182d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "gid", (void **)&tmp, 183d00947d8SCraig Rodrigues NULL) == 0) { 184d00947d8SCraig Rodrigues if (tmp != NULL) 185d00947d8SCraig Rodrigues gid = (gid_t)strtol(tmp, &ep, 10); 186d00947d8SCraig Rodrigues if (tmp == NULL || *ep) { 187d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid gid"); 188d00947d8SCraig Rodrigues return (EINVAL); 189d00947d8SCraig Rodrigues } 190d00947d8SCraig Rodrigues } 191d00947d8SCraig Rodrigues if (vfs_getopt(mp->mnt_optnew, "copymode", (void **)&tmp, 192d00947d8SCraig Rodrigues NULL) == 0) { 193d00947d8SCraig Rodrigues if (tmp == NULL) { 194d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid copymode"); 195d00947d8SCraig Rodrigues return (EINVAL); 196d00947d8SCraig Rodrigues } else if (strcasecmp(tmp, "traditional") == 0) 197d00947d8SCraig Rodrigues copymode = UNIONFS_TRADITIONAL; 198d00947d8SCraig Rodrigues else if (strcasecmp(tmp, "transparent") == 0) 199d00947d8SCraig Rodrigues copymode = UNIONFS_TRANSPARENT; 200d00947d8SCraig Rodrigues else if (strcasecmp(tmp, "masquerade") == 0) 201d00947d8SCraig Rodrigues copymode = UNIONFS_MASQUERADE; 202d00947d8SCraig Rodrigues else { 203d00947d8SCraig Rodrigues vfs_mount_error(mp, "Invalid copymode"); 204d00947d8SCraig Rodrigues return (EINVAL); 205d00947d8SCraig Rodrigues } 206d00947d8SCraig Rodrigues } 20720885defSDaichi GOTO if (vfs_getopt(mp->mnt_optnew, "whiteout", (void **)&tmp, 20820885defSDaichi GOTO NULL) == 0) { 20920885defSDaichi GOTO if (tmp == NULL) { 21020885defSDaichi GOTO vfs_mount_error(mp, "Invalid whiteout mode"); 21120885defSDaichi GOTO return (EINVAL); 21220885defSDaichi GOTO } else if (strcasecmp(tmp, "always") == 0) 21320885defSDaichi GOTO whitemode = UNIONFS_WHITE_ALWAYS; 21420885defSDaichi GOTO else if (strcasecmp(tmp, "whenneeded") == 0) 21520885defSDaichi GOTO whitemode = UNIONFS_WHITE_WHENNEEDED; 21620885defSDaichi GOTO else { 21720885defSDaichi GOTO vfs_mount_error(mp, "Invalid whiteout mode"); 21820885defSDaichi GOTO return (EINVAL); 21920885defSDaichi GOTO } 22020885defSDaichi GOTO } 221d00947d8SCraig Rodrigues } 222d00947d8SCraig Rodrigues /* If copymode is UNIONFS_TRADITIONAL, uid/gid is mounted user. */ 223d00947d8SCraig Rodrigues if (copymode == UNIONFS_TRADITIONAL) { 224d00947d8SCraig Rodrigues uid = mp->mnt_cred->cr_ruid; 225d00947d8SCraig Rodrigues gid = mp->mnt_cred->cr_rgid; 226d00947d8SCraig Rodrigues } 227d00947d8SCraig Rodrigues 228d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: uid=%d, gid=%d\n", uid, gid); 229d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: udir=0%03o, ufile=0%03o\n", udir, ufile); 230d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: copymode=%d\n", copymode); 231d00947d8SCraig Rodrigues 232d00947d8SCraig Rodrigues /* 233d00947d8SCraig Rodrigues * Find upper node 234d00947d8SCraig Rodrigues */ 2357e1d3eefSMateusz Guzik NDINIT(ndp, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE, target); 236d00947d8SCraig Rodrigues if ((error = namei(ndp))) 237d00947d8SCraig Rodrigues return (error); 238d00947d8SCraig Rodrigues 239*bb92cd7bSMateusz Guzik NDFREE_PNBUF(ndp); 240d00947d8SCraig Rodrigues 241d00947d8SCraig Rodrigues /* get root vnodes */ 242d00947d8SCraig Rodrigues lowerrootvp = mp->mnt_vnodecovered; 243df8bae1dSRodney W. Grimes upperrootvp = ndp->ni_vp; 244a01ca46bSJason A. Harmening KASSERT(lowerrootvp != NULL, ("%s: NULL lower root vp", __func__)); 245a01ca46bSJason A. Harmening KASSERT(upperrootvp != NULL, ("%s: NULL upper root vp", __func__)); 246df8bae1dSRodney W. Grimes 247d00947d8SCraig Rodrigues /* create unionfs_mount */ 248312d49efSJason A. Harmening ump = malloc(sizeof(struct unionfs_mount), M_UNIONFSMNT, 249312d49efSJason A. Harmening M_WAITOK | M_ZERO); 2502a31267eSMatthew Dillon 251d00947d8SCraig Rodrigues /* 252d00947d8SCraig Rodrigues * Save reference 253d00947d8SCraig Rodrigues */ 254d00947d8SCraig Rodrigues if (below) { 255b249ce48SMateusz Guzik VOP_UNLOCK(upperrootvp); 256cb05b60aSAttilio Rao vn_lock(lowerrootvp, LK_EXCLUSIVE | LK_RETRY); 257d00947d8SCraig Rodrigues ump->um_lowervp = upperrootvp; 258d00947d8SCraig Rodrigues ump->um_uppervp = lowerrootvp; 259d00947d8SCraig Rodrigues } else { 260d00947d8SCraig Rodrigues ump->um_lowervp = lowerrootvp; 261d00947d8SCraig Rodrigues ump->um_uppervp = upperrootvp; 262df8bae1dSRodney W. Grimes } 263d00947d8SCraig Rodrigues ump->um_rootvp = NULLVP; 264d00947d8SCraig Rodrigues ump->um_uid = uid; 265d00947d8SCraig Rodrigues ump->um_gid = gid; 266d00947d8SCraig Rodrigues ump->um_udir = udir; 267d00947d8SCraig Rodrigues ump->um_ufile = ufile; 268d00947d8SCraig Rodrigues ump->um_copymode = copymode; 26920885defSDaichi GOTO ump->um_whitemode = whitemode; 270d00947d8SCraig Rodrigues 27177465d93SAlfred Perlstein mp->mnt_data = ump; 272df8bae1dSRodney W. Grimes 273996c772fSJohn Dyson /* 274d00947d8SCraig Rodrigues * Copy upper layer's RDONLY flag. 275d00947d8SCraig Rodrigues */ 276d00947d8SCraig Rodrigues mp->mnt_flag |= ump->um_uppervp->v_mount->mnt_flag & MNT_RDONLY; 277d00947d8SCraig Rodrigues 278d00947d8SCraig Rodrigues /* 279d00947d8SCraig Rodrigues * Unlock the node 280df8bae1dSRodney W. Grimes */ 281b249ce48SMateusz Guzik VOP_UNLOCK(ump->um_uppervp); 282df8bae1dSRodney W. Grimes 283d00947d8SCraig Rodrigues /* 284d00947d8SCraig Rodrigues * Get the unionfs root vnode. 285d00947d8SCraig Rodrigues */ 286d00947d8SCraig Rodrigues error = unionfs_nodeget(mp, ump->um_uppervp, ump->um_lowervp, 2876d8420d4SJason A. Harmening NULLVP, &(ump->um_rootvp), NULL); 288d00947d8SCraig Rodrigues vrele(upperrootvp); 28959409cb9SJason A. Harmening if (error != 0) { 290d00947d8SCraig Rodrigues free(ump, M_UNIONFSMNT); 291d00947d8SCraig Rodrigues mp->mnt_data = NULL; 292df8bae1dSRodney W. Grimes return (error); 293df8bae1dSRodney W. Grimes } 294a01ca46bSJason A. Harmening KASSERT(ump->um_rootvp != NULL, ("rootvp cannot be NULL")); 295a01ca46bSJason A. Harmening KASSERT((ump->um_rootvp->v_vflag & VV_ROOT) != 0, 296a01ca46bSJason A. Harmening ("%s: rootvp without VV_ROOT", __func__)); 297df8bae1dSRodney W. Grimes 298c746ed72SJason A. Harmening lowermp = vfs_register_upper_from_vp(ump->um_lowervp, mp, 299c746ed72SJason A. Harmening &ump->um_lower_link); 300c746ed72SJason A. Harmening uppermp = vfs_register_upper_from_vp(ump->um_uppervp, mp, 301c746ed72SJason A. Harmening &ump->um_upper_link); 30259409cb9SJason A. Harmening 30359409cb9SJason A. Harmening if (lowermp == NULL || uppermp == NULL) { 30459409cb9SJason A. Harmening if (lowermp != NULL) 305c746ed72SJason A. Harmening vfs_unregister_upper(lowermp, &ump->um_lower_link); 30659409cb9SJason A. Harmening if (uppermp != NULL) 307c746ed72SJason A. Harmening vfs_unregister_upper(uppermp, &ump->um_upper_link); 30859409cb9SJason A. Harmening free(ump, M_UNIONFSMNT); 30959409cb9SJason A. Harmening mp->mnt_data = NULL; 31059409cb9SJason A. Harmening return (ENOENT); 31159409cb9SJason A. Harmening } 31259409cb9SJason A. Harmening 313a8a07fd6SMateusz Guzik MNT_ILOCK(mp); 31459409cb9SJason A. Harmening if ((lowermp->mnt_flag & MNT_LOCAL) != 0 && 31559409cb9SJason A. Harmening (uppermp->mnt_flag & MNT_LOCAL) != 0) 316d00947d8SCraig Rodrigues mp->mnt_flag |= MNT_LOCAL; 317d3cc5354SMateusz Guzik mp->mnt_kern_flag |= MNTK_NOMSYNC | MNTK_UNIONFS; 318a8a07fd6SMateusz Guzik MNT_IUNLOCK(mp); 319d00947d8SCraig Rodrigues 320d00947d8SCraig Rodrigues /* 321d00947d8SCraig Rodrigues * Get new fsid 322d00947d8SCraig Rodrigues */ 323d00947d8SCraig Rodrigues vfs_getnewfsid(mp); 324d00947d8SCraig Rodrigues 325852c303bSConrad Meyer snprintf(mp->mnt_stat.f_mntfromname, MNAMELEN, "<%s>:%s", 326852c303bSConrad Meyer below ? "below" : "above", target); 327d00947d8SCraig Rodrigues 328d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_mount: from %s, on %s\n", 329d00947d8SCraig Rodrigues mp->mnt_stat.f_mntfromname, mp->mnt_stat.f_mntonname); 330d00947d8SCraig Rodrigues 331d00947d8SCraig Rodrigues return (0); 332d00947d8SCraig Rodrigues } 333d00947d8SCraig Rodrigues 334d00947d8SCraig Rodrigues /* 335d00947d8SCraig Rodrigues * Free reference to unionfs layer 336df8bae1dSRodney W. Grimes */ 33780b301c3SPoul-Henning Kamp static int 338dfd233edSAttilio Rao unionfs_unmount(struct mount *mp, int mntflags) 339df8bae1dSRodney W. Grimes { 340d00947d8SCraig Rodrigues struct unionfs_mount *ump; 341df8bae1dSRodney W. Grimes int error; 342d00947d8SCraig Rodrigues int num; 343996c772fSJohn Dyson int freeing; 344d00947d8SCraig Rodrigues int flags; 345df8bae1dSRodney W. Grimes 346312d49efSJason A. Harmening UNIONFSDEBUG("unionfs_unmount: mp = %p\n", mp); 347d00947d8SCraig Rodrigues 348d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 349d00947d8SCraig Rodrigues flags = 0; 350df8bae1dSRodney W. Grimes 351996c772fSJohn Dyson if (mntflags & MNT_FORCE) 352996c772fSJohn Dyson flags |= FORCECLOSE; 353996c772fSJohn Dyson 354d00947d8SCraig Rodrigues /* vflush (no need to call vrele) */ 355dfd233edSAttilio Rao for (freeing = 0; (error = vflush(mp, 1, flags, curthread)) != 0;) { 356d00947d8SCraig Rodrigues num = mp->mnt_nvnodelistsize; 357d00947d8SCraig Rodrigues if (num == freeing) 358996c772fSJohn Dyson break; 359d00947d8SCraig Rodrigues freeing = num; 360df8bae1dSRodney W. Grimes } 361df8bae1dSRodney W. Grimes 3620864ef1eSIan Dowse if (error) 3630864ef1eSIan Dowse return (error); 364df8bae1dSRodney W. Grimes 365c746ed72SJason A. Harmening vfs_unregister_upper(ump->um_lowervp->v_mount, &ump->um_lower_link); 366c746ed72SJason A. Harmening vfs_unregister_upper(ump->um_uppervp->v_mount, &ump->um_upper_link); 367d00947d8SCraig Rodrigues free(ump, M_UNIONFSMNT); 36811753bd0SKevin Lo mp->mnt_data = NULL; 369d00947d8SCraig Rodrigues 370df8bae1dSRodney W. Grimes return (0); 371df8bae1dSRodney W. Grimes } 372df8bae1dSRodney W. Grimes 37380b301c3SPoul-Henning Kamp static int 374dfd233edSAttilio Rao unionfs_root(struct mount *mp, int flags, struct vnode **vpp) 375df8bae1dSRodney W. Grimes { 376d00947d8SCraig Rodrigues struct unionfs_mount *ump; 377d00947d8SCraig Rodrigues struct vnode *vp; 378df8bae1dSRodney W. Grimes 379d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 380d00947d8SCraig Rodrigues vp = ump->um_rootvp; 3812a31267eSMatthew Dillon 382d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_root: rootvp=%p locked=%x\n", 38381c794f9SAttilio Rao vp, VOP_ISLOCKED(vp)); 384df8bae1dSRodney W. Grimes 385d00947d8SCraig Rodrigues vref(vp); 386d00947d8SCraig Rodrigues if (flags & LK_TYPE_MASK) 387cb05b60aSAttilio Rao vn_lock(vp, flags); 388df8bae1dSRodney W. Grimes 389d00947d8SCraig Rodrigues *vpp = vp; 390d00947d8SCraig Rodrigues 391d00947d8SCraig Rodrigues return (0); 392df8bae1dSRodney W. Grimes } 393df8bae1dSRodney W. Grimes 39480b301c3SPoul-Henning Kamp static int 395a4b07a27SJason A. Harmening unionfs_quotactl(struct mount *mp, int cmd, uid_t uid, void *arg, 396a4b07a27SJason A. Harmening bool *mp_busy) 397df8bae1dSRodney W. Grimes { 398a4b07a27SJason A. Harmening struct mount *uppermp; 399d00947d8SCraig Rodrigues struct unionfs_mount *ump; 400a4b07a27SJason A. Harmening int error; 401a4b07a27SJason A. Harmening bool unbusy; 402df8bae1dSRodney W. Grimes 403d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 404a4b07a27SJason A. Harmening uppermp = atomic_load_ptr(&ump->um_uppervp->v_mount); 405a4b07a27SJason A. Harmening KASSERT(*mp_busy == true, ("upper mount not busy")); 406a4b07a27SJason A. Harmening /* 407a4b07a27SJason A. Harmening * See comment in sys_quotactl() for an explanation of why the 408a4b07a27SJason A. Harmening * lower mount needs to be busied by the caller of VFS_QUOTACTL() 409a4b07a27SJason A. Harmening * but may be unbusied by the implementation. We must unbusy 410a4b07a27SJason A. Harmening * the upper mount for the same reason; otherwise a namei lookup 411a4b07a27SJason A. Harmening * issued by the VFS_QUOTACTL() implementation could traverse the 412a4b07a27SJason A. Harmening * upper mount and deadlock. 413a4b07a27SJason A. Harmening */ 414a4b07a27SJason A. Harmening vfs_unbusy(mp); 415a4b07a27SJason A. Harmening *mp_busy = false; 416a4b07a27SJason A. Harmening unbusy = true; 417a4b07a27SJason A. Harmening error = vfs_busy(uppermp, 0); 418d00947d8SCraig Rodrigues /* 419d00947d8SCraig Rodrigues * Writing is always performed to upper vnode. 420d00947d8SCraig Rodrigues */ 421a4b07a27SJason A. Harmening if (error == 0) 422a4b07a27SJason A. Harmening error = VFS_QUOTACTL(uppermp, cmd, uid, arg, &unbusy); 423a4b07a27SJason A. Harmening if (unbusy) 424a4b07a27SJason A. Harmening vfs_unbusy(uppermp); 425a4b07a27SJason A. Harmening 426a4b07a27SJason A. Harmening return (error); 427d00947d8SCraig Rodrigues } 428d00947d8SCraig Rodrigues 429d00947d8SCraig Rodrigues static int 430dfd233edSAttilio Rao unionfs_statfs(struct mount *mp, struct statfs *sbp) 431d00947d8SCraig Rodrigues { 432d00947d8SCraig Rodrigues struct unionfs_mount *ump; 4332f304845SKonstantin Belousov struct statfs *mstat; 434d00947d8SCraig Rodrigues uint64_t lbsize; 435312d49efSJason A. Harmening int error; 436d00947d8SCraig Rodrigues 437d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 438d00947d8SCraig Rodrigues 439d00947d8SCraig Rodrigues UNIONFSDEBUG("unionfs_statfs(mp = %p, lvp = %p, uvp = %p)\n", 440312d49efSJason A. Harmening mp, ump->um_lowervp, ump->um_uppervp); 441df8bae1dSRodney W. Grimes 4422f304845SKonstantin Belousov mstat = malloc(sizeof(struct statfs), M_STATFS, M_WAITOK | M_ZERO); 443df8bae1dSRodney W. Grimes 4442f304845SKonstantin Belousov error = VFS_STATFS(ump->um_lowervp->v_mount, mstat); 4452f304845SKonstantin Belousov if (error) { 4462f304845SKonstantin Belousov free(mstat, M_STATFS); 447df8bae1dSRodney W. Grimes return (error); 4482f304845SKonstantin Belousov } 449d00947d8SCraig Rodrigues 450d00947d8SCraig Rodrigues /* now copy across the "interesting" information and fake the rest */ 4512f304845SKonstantin Belousov sbp->f_blocks = mstat->f_blocks; 4522f304845SKonstantin Belousov sbp->f_files = mstat->f_files; 453d00947d8SCraig Rodrigues 4542f304845SKonstantin Belousov lbsize = mstat->f_bsize; 455d00947d8SCraig Rodrigues 4562f304845SKonstantin Belousov error = VFS_STATFS(ump->um_uppervp->v_mount, mstat); 4572f304845SKonstantin Belousov if (error) { 4582f304845SKonstantin Belousov free(mstat, M_STATFS); 459d00947d8SCraig Rodrigues return (error); 4602f304845SKonstantin Belousov } 4612f304845SKonstantin Belousov 4621c4ccf09SDon Lewis /* 463d00947d8SCraig Rodrigues * The FS type etc is copy from upper vfs. 464d00947d8SCraig Rodrigues * (write able vfs have priority) 4651c4ccf09SDon Lewis */ 4662f304845SKonstantin Belousov sbp->f_type = mstat->f_type; 4672f304845SKonstantin Belousov sbp->f_flags = mstat->f_flags; 4682f304845SKonstantin Belousov sbp->f_bsize = mstat->f_bsize; 4692f304845SKonstantin Belousov sbp->f_iosize = mstat->f_iosize; 470df8bae1dSRodney W. Grimes 4712f304845SKonstantin Belousov if (mstat->f_bsize != lbsize) 4722f304845SKonstantin Belousov sbp->f_blocks = ((off_t)sbp->f_blocks * lbsize) / 4732f304845SKonstantin Belousov mstat->f_bsize; 474996c772fSJohn Dyson 4752f304845SKonstantin Belousov sbp->f_blocks += mstat->f_blocks; 4762f304845SKonstantin Belousov sbp->f_bfree = mstat->f_bfree; 4772f304845SKonstantin Belousov sbp->f_bavail = mstat->f_bavail; 4782f304845SKonstantin Belousov sbp->f_files += mstat->f_files; 4792f304845SKonstantin Belousov sbp->f_ffree = mstat->f_ffree; 4802f304845SKonstantin Belousov 4812f304845SKonstantin Belousov free(mstat, M_STATFS); 482df8bae1dSRodney W. Grimes return (0); 483df8bae1dSRodney W. Grimes } 484df8bae1dSRodney W. Grimes 485d00947d8SCraig Rodrigues static int 486dfd233edSAttilio Rao unionfs_sync(struct mount *mp, int waitfor) 487d00947d8SCraig Rodrigues { 488d00947d8SCraig Rodrigues /* nothing to do */ 489d00947d8SCraig Rodrigues return (0); 490d00947d8SCraig Rodrigues } 491d00947d8SCraig Rodrigues 492d00947d8SCraig Rodrigues static int 493d00947d8SCraig Rodrigues unionfs_vget(struct mount *mp, ino_t ino, int flags, struct vnode **vpp) 494d00947d8SCraig Rodrigues { 495d00947d8SCraig Rodrigues return (EOPNOTSUPP); 496d00947d8SCraig Rodrigues } 497d00947d8SCraig Rodrigues 498d00947d8SCraig Rodrigues static int 499694a586aSRick Macklem unionfs_fhtovp(struct mount *mp, struct fid *fidp, int flags, 500694a586aSRick Macklem struct vnode **vpp) 501d00947d8SCraig Rodrigues { 502d00947d8SCraig Rodrigues return (EOPNOTSUPP); 503d00947d8SCraig Rodrigues } 504d00947d8SCraig Rodrigues 505d00947d8SCraig Rodrigues static int 5061f7104d7SRick Macklem unionfs_checkexp(struct mount *mp, struct sockaddr *nam, uint64_t *extflagsp, 5071f7104d7SRick Macklem struct ucred **credanonp, int *numsecflavors, int *secflavors) 508d00947d8SCraig Rodrigues { 509d00947d8SCraig Rodrigues return (EOPNOTSUPP); 510d00947d8SCraig Rodrigues } 511d00947d8SCraig Rodrigues 512d00947d8SCraig Rodrigues static int 513d00947d8SCraig Rodrigues unionfs_extattrctl(struct mount *mp, int cmd, struct vnode *filename_vp, 514dfd233edSAttilio Rao int namespace, const char *attrname) 515d00947d8SCraig Rodrigues { 516d00947d8SCraig Rodrigues struct unionfs_mount *ump; 517d00947d8SCraig Rodrigues struct unionfs_node *unp; 518d00947d8SCraig Rodrigues 519d00947d8SCraig Rodrigues ump = MOUNTTOUNIONFSMOUNT(mp); 520d00947d8SCraig Rodrigues unp = VTOUNIONFS(filename_vp); 521d00947d8SCraig Rodrigues 522d00947d8SCraig Rodrigues if (unp->un_uppervp != NULLVP) { 523d00947d8SCraig Rodrigues return (VFS_EXTATTRCTL(ump->um_uppervp->v_mount, cmd, 524dfd233edSAttilio Rao unp->un_uppervp, namespace, attrname)); 525d00947d8SCraig Rodrigues } else { 526d00947d8SCraig Rodrigues return (VFS_EXTATTRCTL(ump->um_lowervp->v_mount, cmd, 527dfd233edSAttilio Rao unp->un_lowervp, namespace, attrname)); 528d00947d8SCraig Rodrigues } 529d00947d8SCraig Rodrigues } 530d00947d8SCraig Rodrigues 531d00947d8SCraig Rodrigues static struct vfsops unionfs_vfsops = { 532d00947d8SCraig Rodrigues .vfs_checkexp = unionfs_checkexp, 533d00947d8SCraig Rodrigues .vfs_extattrctl = unionfs_extattrctl, 534d00947d8SCraig Rodrigues .vfs_fhtovp = unionfs_fhtovp, 535d00947d8SCraig Rodrigues .vfs_init = unionfs_init, 536d00947d8SCraig Rodrigues .vfs_mount = unionfs_domount, 537d00947d8SCraig Rodrigues .vfs_quotactl = unionfs_quotactl, 538d00947d8SCraig Rodrigues .vfs_root = unionfs_root, 539d00947d8SCraig Rodrigues .vfs_statfs = unionfs_statfs, 540d00947d8SCraig Rodrigues .vfs_sync = unionfs_sync, 541d00947d8SCraig Rodrigues .vfs_uninit = unionfs_uninit, 542d00947d8SCraig Rodrigues .vfs_unmount = unionfs_unmount, 543d00947d8SCraig Rodrigues .vfs_vget = unionfs_vget, 544df8bae1dSRodney W. Grimes }; 545c901836cSGarrett Wollman 546d00947d8SCraig Rodrigues VFS_SET(unionfs_vfsops, unionfs, VFCF_LOOPBACK); 547