dfd233edd5
the VFS. Now all the VFS_* functions and relating parts don't want the context as long as it always refers to curthread. In some points, in particular when dealing with VOPs and functions living in the same namespace (eg. vflush) which still need to be converted, pass curthread explicitly in order to retain the old behaviour. Such loose ends will be fixed ASAP. While here fix a bug: now, UFS_EXTATTR can be compiled alone without the UFS_EXTATTR_AUTOSTART option. VFS KPI is heavilly changed by this commit so thirdy parts modules needs to be recompiled. Bump __FreeBSD_version in order to signal such situation.
217 lines
5.6 KiB
C
217 lines
5.6 KiB
C
/*-
|
|
* Copyright (c) 2006-2007 Pawel Jakub Dawidek <pjd@FreeBSD.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/cred.h>
|
|
#include <sys/vfs.h>
|
|
#include <sys/priv.h>
|
|
#include <sys/libkern.h>
|
|
|
|
MALLOC_DECLARE(M_MOUNT);
|
|
|
|
void
|
|
vfs_setmntopt(vfs_t *vfsp, const char *name, const char *arg,
|
|
int flags __unused)
|
|
{
|
|
struct vfsopt *opt;
|
|
size_t namesize;
|
|
|
|
if (vfsp->mnt_opt == NULL) {
|
|
vfsp->mnt_opt = malloc(sizeof(*vfsp->mnt_opt), M_MOUNT, M_WAITOK);
|
|
TAILQ_INIT(vfsp->mnt_opt);
|
|
}
|
|
|
|
opt = malloc(sizeof(*opt), M_MOUNT, M_WAITOK);
|
|
|
|
namesize = strlen(name) + 1;
|
|
opt->name = malloc(namesize, M_MOUNT, M_WAITOK);
|
|
strlcpy(opt->name, name, namesize);
|
|
opt->pos = -1;
|
|
opt->seen = 1;
|
|
|
|
if (arg == NULL) {
|
|
opt->value = NULL;
|
|
opt->len = 0;
|
|
} else {
|
|
opt->len = strlen(arg) + 1;
|
|
opt->value = malloc(opt->len, M_MOUNT, M_WAITOK);
|
|
bcopy(arg, opt->value, opt->len);
|
|
}
|
|
/* TODO: Locking. */
|
|
TAILQ_INSERT_TAIL(vfsp->mnt_opt, opt, link);
|
|
}
|
|
|
|
void
|
|
vfs_clearmntopt(vfs_t *vfsp, const char *name)
|
|
{
|
|
|
|
/* TODO: Locking. */
|
|
vfs_deleteopt(vfsp->mnt_opt, name);
|
|
}
|
|
|
|
int
|
|
vfs_optionisset(const vfs_t *vfsp, const char *opt, char **argp)
|
|
{
|
|
struct vfsoptlist *opts = vfsp->mnt_optnew;
|
|
int error;
|
|
|
|
if (opts == NULL)
|
|
return (0);
|
|
error = vfs_getopt(opts, opt, (void **)argp, NULL);
|
|
return (error != 0 ? 0 : 1);
|
|
}
|
|
|
|
int
|
|
domount(kthread_t *td, vnode_t *vp, const char *fstype, char *fspath,
|
|
char *fspec, int fsflags)
|
|
{
|
|
struct mount *mp;
|
|
struct vfsconf *vfsp;
|
|
struct ucred *cr;
|
|
int error;
|
|
|
|
/*
|
|
* Be ultra-paranoid about making sure the type and fspath
|
|
* variables will fit in our mp buffers, including the
|
|
* terminating NUL.
|
|
*/
|
|
if (strlen(fstype) >= MFSNAMELEN || strlen(fspath) >= MNAMELEN)
|
|
return (ENAMETOOLONG);
|
|
|
|
vfsp = vfs_byname_kld(fstype, td, &error);
|
|
if (vfsp == NULL)
|
|
return (ENODEV);
|
|
|
|
if (vp->v_type != VDIR)
|
|
return (ENOTDIR);
|
|
VI_LOCK(vp);
|
|
if ((vp->v_iflag & VI_MOUNT) != 0 ||
|
|
vp->v_mountedhere != NULL) {
|
|
VI_UNLOCK(vp);
|
|
return (EBUSY);
|
|
}
|
|
vp->v_iflag |= VI_MOUNT;
|
|
VI_UNLOCK(vp);
|
|
|
|
/*
|
|
* Allocate and initialize the filesystem.
|
|
*/
|
|
vn_lock(vp, LK_SHARED | LK_RETRY);
|
|
mp = vfs_mount_alloc(vp, vfsp, fspath, td->td_ucred);
|
|
VOP_UNLOCK(vp, 0);
|
|
|
|
mp->mnt_optnew = NULL;
|
|
vfs_setmntopt(mp, "from", fspec, 0);
|
|
mp->mnt_optnew = mp->mnt_opt;
|
|
mp->mnt_opt = NULL;
|
|
|
|
/*
|
|
* Set the mount level flags.
|
|
*/
|
|
if (fsflags & MNT_RDONLY)
|
|
mp->mnt_flag |= MNT_RDONLY;
|
|
mp->mnt_flag &=~ MNT_UPDATEMASK;
|
|
mp->mnt_flag |= fsflags & (MNT_UPDATEMASK | MNT_FORCE | MNT_ROOTFS);
|
|
/*
|
|
* Unprivileged user can trigger mounting a snapshot, but we don't want
|
|
* him to unmount it, so we switch to privileged of original mount.
|
|
*/
|
|
crfree(mp->mnt_cred);
|
|
mp->mnt_cred = crdup(vp->v_mount->mnt_cred);
|
|
mp->mnt_stat.f_owner = mp->mnt_cred->cr_uid;
|
|
/*
|
|
* Mount the filesystem.
|
|
* XXX The final recipients of VFS_MOUNT just overwrite the ndp they
|
|
* get. No freeing of cn_pnbuf.
|
|
*/
|
|
/*
|
|
* XXX: This is evil, but we can't mount a snapshot as a regular user.
|
|
* XXX: Is is safe when snapshot is mounted from within a jail?
|
|
*/
|
|
cr = td->td_ucred;
|
|
td->td_ucred = kcred;
|
|
error = VFS_MOUNT(mp);
|
|
td->td_ucred = cr;
|
|
|
|
if (!error) {
|
|
if (mp->mnt_opt != NULL)
|
|
vfs_freeopts(mp->mnt_opt);
|
|
mp->mnt_opt = mp->mnt_optnew;
|
|
(void)VFS_STATFS(mp, &mp->mnt_stat);
|
|
}
|
|
/*
|
|
* Prevent external consumers of mount options from reading
|
|
* mnt_optnew.
|
|
*/
|
|
mp->mnt_optnew = NULL;
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
/*
|
|
* Put the new filesystem on the mount list after root.
|
|
*/
|
|
#ifdef FREEBSD_NAMECACHE
|
|
cache_purge(vp);
|
|
#endif
|
|
if (!error) {
|
|
vnode_t *mvp;
|
|
|
|
VI_LOCK(vp);
|
|
vp->v_iflag &= ~VI_MOUNT;
|
|
VI_UNLOCK(vp);
|
|
vp->v_mountedhere = mp;
|
|
mtx_lock(&mountlist_mtx);
|
|
TAILQ_INSERT_TAIL(&mountlist, mp, mnt_list);
|
|
mtx_unlock(&mountlist_mtx);
|
|
vfs_event_signal(NULL, VQ_MOUNT, 0);
|
|
if (VFS_ROOT(mp, LK_EXCLUSIVE, &mvp))
|
|
panic("mount: lost mount");
|
|
mountcheckdirs(vp, mvp);
|
|
vput(mvp);
|
|
VOP_UNLOCK(vp, 0);
|
|
if ((mp->mnt_flag & MNT_RDONLY) == 0)
|
|
error = vfs_allocate_syncvnode(mp);
|
|
vfs_unbusy(mp);
|
|
if (error)
|
|
vrele(vp);
|
|
else
|
|
vfs_mountedfrom(mp, fspec);
|
|
} else {
|
|
VI_LOCK(vp);
|
|
vp->v_iflag &= ~VI_MOUNT;
|
|
VI_UNLOCK(vp);
|
|
VOP_UNLOCK(vp, 0);
|
|
vfs_unbusy(mp);
|
|
vfs_mount_destroy(mp);
|
|
}
|
|
return (error);
|
|
}
|