2020-04-28 00:17:09 +03:00
|
|
|
.. SPDX-License-Identifier: GPL-2.0
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
====================
|
2020-09-19 05:03:11 +03:00
|
|
|
Filesystem Mount API
|
2020-04-28 00:17:09 +03:00
|
|
|
====================
|
|
|
|
|
|
|
|
.. CONTENTS
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
(1) Overview.
|
|
|
|
|
|
|
|
(2) The filesystem context.
|
|
|
|
|
|
|
|
(3) The filesystem context operations.
|
|
|
|
|
|
|
|
(4) Filesystem context security.
|
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
(5) VFS filesystem context API.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
(6) Superblock creation helpers.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
(7) Parameter description.
|
|
|
|
|
|
|
|
(8) Parameter helper functions.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
Overview
|
2018-11-02 02:07:26 +03:00
|
|
|
========
|
|
|
|
|
|
|
|
The creation of new mounts is now to be done in a multistep process:
|
|
|
|
|
|
|
|
(1) Create a filesystem context.
|
|
|
|
|
|
|
|
(2) Parse the parameters and attach them to the context. Parameters are
|
|
|
|
expected to be passed individually from userspace, though legacy binary
|
|
|
|
parameters can also be handled.
|
|
|
|
|
|
|
|
(3) Validate and pre-process the context.
|
|
|
|
|
|
|
|
(4) Get or create a superblock and mountable root.
|
|
|
|
|
|
|
|
(5) Perform the mount.
|
|
|
|
|
|
|
|
(6) Return an error message attached to the context.
|
|
|
|
|
|
|
|
(7) Destroy the context.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
To support this, the file_system_type struct gains two new fields::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
int (*init_fs_context)(struct fs_context *fc);
|
2019-03-28 01:53:31 +03:00
|
|
|
const struct fs_parameter_description *parameters;
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
The first is invoked to set up the filesystem-specific parts of a filesystem
|
|
|
|
context, including the additional space, and the second points to the
|
|
|
|
parameter description for validation at registration time and querying by a
|
|
|
|
future system call.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Note that security initialisation is done *after* the filesystem is called so
|
|
|
|
that the namespaces may be adjusted first.
|
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
The Filesystem context
|
2018-11-02 02:07:26 +03:00
|
|
|
======================
|
|
|
|
|
|
|
|
The creation and reconfiguration of a superblock is governed by a filesystem
|
2020-04-28 00:17:09 +03:00
|
|
|
context. This is represented by the fs_context structure::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
struct fs_context {
|
|
|
|
const struct fs_context_operations *ops;
|
|
|
|
struct file_system_type *fs_type;
|
|
|
|
void *fs_private;
|
|
|
|
struct dentry *root;
|
|
|
|
struct user_namespace *user_ns;
|
|
|
|
struct net *net_ns;
|
|
|
|
const struct cred *cred;
|
|
|
|
char *source;
|
|
|
|
char *subtype;
|
|
|
|
void *security;
|
|
|
|
void *s_fs_info;
|
|
|
|
unsigned int sb_flags;
|
|
|
|
unsigned int sb_flags_mask;
|
2019-03-28 01:53:31 +03:00
|
|
|
unsigned int s_iflags;
|
|
|
|
unsigned int lsm_flags;
|
2018-11-02 02:07:26 +03:00
|
|
|
enum fs_context_purpose purpose:8;
|
|
|
|
...
|
|
|
|
};
|
|
|
|
|
|
|
|
The fs_context fields are as follows:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
const struct fs_context_operations *ops
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
These are operations that can be done on a filesystem context (see
|
|
|
|
below). This must be set by the ->init_fs_context() file_system_type
|
|
|
|
operation.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct file_system_type *fs_type
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
A pointer to the file_system_type of the filesystem that is being
|
|
|
|
constructed or reconfigured. This retains a reference on the type owner.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void *fs_private
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
A pointer to the file system's private data. This is where the filesystem
|
|
|
|
will need to store any options it parses.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct dentry *root
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
A pointer to the root of the mountable tree (and indirectly, the
|
|
|
|
superblock thereof). This is filled in by the ->get_tree() op. If this
|
|
|
|
is set, an active reference on root->d_sb must also be held.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct user_namespace *user_ns
|
|
|
|
struct net *net_ns
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
There are a subset of the namespaces in use by the invoking process. They
|
|
|
|
retain references on each namespace. The subscribed namespaces may be
|
|
|
|
replaced by the filesystem to reflect other sources, such as the parent
|
|
|
|
mount superblock on an automount.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
const struct cred *cred
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
The mounter's credentials. This retains a reference on the credentials.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
char *source
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
This specifies the source. It may be a block device (e.g. /dev/sda1) or
|
|
|
|
something more exotic, such as the "host:/path" that NFS desires.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
char *subtype
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
This is a string to be added to the type displayed in /proc/mounts to
|
|
|
|
qualify it (used by FUSE). This is available for the filesystem to set if
|
|
|
|
desired.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void *security
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
A place for the LSMs to hang their security data for the superblock. The
|
|
|
|
relevant security operations are described below.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void *s_fs_info
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
The proposed s_fs_info for a new superblock, set in the superblock by
|
|
|
|
sget_fc(). This can be used to distinguish superblocks.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
unsigned int sb_flags
|
|
|
|
unsigned int sb_flags_mask
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Which bits SB_* flags are to be set/cleared in super_block::s_flags.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
unsigned int s_iflags
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
These will be bitwise-OR'd with s->s_iflags when a superblock is created.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
enum fs_context_purpose
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
This indicates the purpose for which the context is intended. The
|
|
|
|
available values are:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
========================== ======================================
|
|
|
|
FS_CONTEXT_FOR_MOUNT, New superblock for explicit mount
|
|
|
|
FS_CONTEXT_FOR_SUBMOUNT New automatic submount of extant mount
|
|
|
|
FS_CONTEXT_FOR_RECONFIGURE Change an existing mount
|
|
|
|
========================== ======================================
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
The mount context is created by calling vfs_new_fs_context() or
|
|
|
|
vfs_dup_fs_context() and is destroyed with put_fs_context(). Note that the
|
|
|
|
structure is not refcounted.
|
|
|
|
|
|
|
|
VFS, security and filesystem mount options are set individually with
|
|
|
|
vfs_parse_mount_option(). Options provided by the old mount(2) system call as
|
|
|
|
a page of data can be parsed with generic_parse_monolithic().
|
|
|
|
|
|
|
|
When mounting, the filesystem is allowed to take data from any of the pointers
|
|
|
|
and attach it to the superblock (or whatever), provided it clears the pointer
|
|
|
|
in the mount context.
|
|
|
|
|
|
|
|
The filesystem is also allowed to allocate resources and pin them with the
|
|
|
|
mount context. For instance, NFS might pin the appropriate protocol version
|
|
|
|
module.
|
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
The Filesystem Context Operations
|
2018-11-02 02:07:26 +03:00
|
|
|
=================================
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
The filesystem context points to a table of operations::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
struct fs_context_operations {
|
|
|
|
void (*free)(struct fs_context *fc);
|
|
|
|
int (*dup)(struct fs_context *fc, struct fs_context *src_fc);
|
|
|
|
int (*parse_param)(struct fs_context *fc,
|
2020-07-04 00:43:21 +03:00
|
|
|
struct fs_parameter *param);
|
2018-11-02 02:07:26 +03:00
|
|
|
int (*parse_monolithic)(struct fs_context *fc, void *data);
|
|
|
|
int (*get_tree)(struct fs_context *fc);
|
|
|
|
int (*reconfigure)(struct fs_context *fc);
|
|
|
|
};
|
|
|
|
|
|
|
|
These operations are invoked by the various stages of the mount procedure to
|
|
|
|
manage the filesystem context. They are as follows:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void (*free)(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to clean up the filesystem-specific part of the filesystem context
|
|
|
|
when the context is destroyed. It should be aware that parts of the
|
|
|
|
context may have been removed and NULL'd out by ->get_tree().
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int (*dup)(struct fs_context *fc, struct fs_context *src_fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called when a filesystem context has been duplicated to duplicate the
|
|
|
|
filesystem-private data. An error may be returned to indicate failure to
|
|
|
|
do this.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
.. Warning::
|
|
|
|
|
|
|
|
Note that even if this fails, put_fs_context() will be called
|
2018-11-02 02:07:26 +03:00
|
|
|
immediately thereafter, so ->dup() *must* make the
|
|
|
|
filesystem-private data safe for ->free().
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int (*parse_param)(struct fs_context *fc,
|
2020-07-04 00:43:21 +03:00
|
|
|
struct fs_parameter *param);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called when a parameter is being added to the filesystem context. param
|
|
|
|
points to the key name and maybe a value object. VFS-specific options
|
|
|
|
will have been weeded out and fc->sb_flags updated in the context.
|
|
|
|
Security options will also have been weeded out and fc->security updated.
|
|
|
|
|
|
|
|
The parameter can be parsed with fs_parse() and fs_lookup_param(). Note
|
|
|
|
that the source(s) are presented as parameters named "source".
|
|
|
|
|
|
|
|
If successful, 0 should be returned or a negative error code otherwise.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int (*parse_monolithic)(struct fs_context *fc, void *data);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called when the mount(2) system call is invoked to pass the entire data
|
|
|
|
page in one go. If this is expected to be just a list of "key[=val]"
|
|
|
|
items separated by commas, then this may be set to NULL.
|
|
|
|
|
|
|
|
The return value is as for ->parse_param().
|
|
|
|
|
|
|
|
If the filesystem (e.g. NFS) needs to examine the data first and then
|
|
|
|
finds it's the standard key-val list then it may pass it off to
|
|
|
|
generic_parse_monolithic().
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int (*get_tree)(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to get or create the mountable root and superblock, using the
|
|
|
|
information stored in the filesystem context (reconfiguration goes via a
|
|
|
|
different vector). It may detach any resources it desires from the
|
|
|
|
filesystem context and transfer them to the superblock it creates.
|
|
|
|
|
|
|
|
On success it should set fc->root to the mountable root and return 0. In
|
|
|
|
the case of an error, it should return a negative error code.
|
|
|
|
|
|
|
|
The phase on a userspace-driven context will be set to only allow this to
|
|
|
|
be called once on any particular context.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int (*reconfigure)(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to effect reconfiguration of a superblock using information stored
|
|
|
|
in the filesystem context. It may detach any resources it desires from
|
|
|
|
the filesystem context and transfer them to the superblock. The
|
|
|
|
superblock can be found from fc->root->d_sb.
|
|
|
|
|
|
|
|
On success it should return 0. In the case of an error, it should return
|
|
|
|
a negative error code.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
.. Note:: reconfigure is intended as a replacement for remount_fs.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
Filesystem context Security
|
2018-11-02 02:07:26 +03:00
|
|
|
===========================
|
|
|
|
|
|
|
|
The filesystem context contains a security pointer that the LSMs can use for
|
|
|
|
building up a security context for the superblock to be mounted. There are a
|
|
|
|
number of operations used by the new mount code for this purpose:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_fs_context_alloc(struct fs_context *fc,
|
|
|
|
struct dentry *reference);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to initialise fc->security (which is preset to NULL) and allocate
|
|
|
|
any resources needed. It should return 0 on success or a negative error
|
|
|
|
code on failure.
|
|
|
|
|
|
|
|
reference will be non-NULL if the context is being created for superblock
|
|
|
|
reconfiguration (FS_CONTEXT_FOR_RECONFIGURE) in which case it indicates
|
|
|
|
the root dentry of the superblock to be reconfigured. It will also be
|
|
|
|
non-NULL in the case of a submount (FS_CONTEXT_FOR_SUBMOUNT) in which case
|
|
|
|
it indicates the automount point.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_fs_context_dup(struct fs_context *fc,
|
|
|
|
struct fs_context *src_fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to initialise fc->security (which is preset to NULL) and allocate
|
|
|
|
any resources needed. The original filesystem context is pointed to by
|
|
|
|
src_fc and may be used for reference. It should return 0 on success or a
|
|
|
|
negative error code on failure.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void security_fs_context_free(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to clean up anything attached to fc->security. Note that the
|
|
|
|
contents may have been transferred to a superblock and the pointer cleared
|
|
|
|
during get_tree.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_fs_context_parse_param(struct fs_context *fc,
|
|
|
|
struct fs_parameter *param);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called for each mount parameter, including the source. The arguments are
|
|
|
|
as for the ->parse_param() method. It should return 0 to indicate that
|
|
|
|
the parameter should be passed on to the filesystem, 1 to indicate that
|
|
|
|
the parameter should be discarded or an error to indicate that the
|
|
|
|
parameter should be rejected.
|
|
|
|
|
|
|
|
The value pointed to by param may be modified (if a string) or stolen
|
|
|
|
(provided the value pointer is NULL'd out). If it is stolen, 1 must be
|
|
|
|
returned to prevent it being passed to the filesystem.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_fs_context_validate(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called after all the options have been parsed to validate the collection
|
|
|
|
as a whole and to do any necessary allocation so that
|
|
|
|
security_sb_get_tree() and security_sb_reconfigure() are less likely to
|
|
|
|
fail. It should return 0 or a negative error code.
|
|
|
|
|
|
|
|
In the case of reconfiguration, the target superblock will be accessible
|
|
|
|
via fc->root.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_sb_get_tree(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called during the mount procedure to verify that the specified superblock
|
|
|
|
is allowed to be mounted and to transfer the security data there. It
|
|
|
|
should return 0 or a negative error code.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void security_sb_reconfigure(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called to apply any reconfiguration to an LSM's context. It must not
|
|
|
|
fail. Error checking and resource allocation must be done in advance by
|
|
|
|
the parameter parsing and validation hooks.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int security_sb_mountpoint(struct fs_context *fc,
|
|
|
|
struct path *mountpoint,
|
|
|
|
unsigned int mnt_flags);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Called during the mount procedure to verify that the root dentry attached
|
|
|
|
to the context is permitted to be attached to the specified mountpoint.
|
|
|
|
It should return 0 on success or a negative error code on failure.
|
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
VFS Filesystem context API
|
2019-03-28 01:53:31 +03:00
|
|
|
==========================
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
There are four operations for creating a filesystem context and one for
|
|
|
|
destroying a context:
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct fs_context *fs_context_for_mount(struct file_system_type *fs_type,
|
|
|
|
unsigned int sb_flags);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
Allocate a filesystem context for the purpose of setting up a new mount,
|
|
|
|
whether that be with a new superblock or sharing an existing one. This
|
|
|
|
sets the superblock flags, initialises the security and calls
|
|
|
|
fs_type->init_fs_context() to initialise the filesystem private data.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
fs_type specifies the filesystem type that will manage the context and
|
|
|
|
sb_flags presets the superblock flags stored therein.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct fs_context *fs_context_for_reconfigure(
|
2019-03-28 01:53:31 +03:00
|
|
|
struct dentry *dentry,
|
|
|
|
unsigned int sb_flags,
|
|
|
|
unsigned int sb_flags_mask);
|
|
|
|
|
|
|
|
Allocate a filesystem context for the purpose of reconfiguring an
|
|
|
|
existing superblock. dentry provides a reference to the superblock to be
|
|
|
|
configured. sb_flags and sb_flags_mask indicate which superblock flags
|
|
|
|
need changing and to what.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct fs_context *fs_context_for_submount(
|
2019-03-28 01:53:31 +03:00
|
|
|
struct file_system_type *fs_type,
|
|
|
|
struct dentry *reference);
|
|
|
|
|
|
|
|
Allocate a filesystem context for the purpose of creating a new mount for
|
|
|
|
an automount point or other derived superblock. fs_type specifies the
|
|
|
|
filesystem type that will manage the context and the reference dentry
|
|
|
|
supplies the parameters. Namespaces are propagated from the reference
|
|
|
|
dentry's superblock also.
|
|
|
|
|
|
|
|
Note that it's not a requirement that the reference dentry be of the same
|
|
|
|
filesystem type as fs_type.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct fs_context *vfs_dup_fs_context(struct fs_context *src_fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Duplicate a filesystem context, copying any options noted and duplicating
|
|
|
|
or additionally referencing any resources held therein. This is available
|
|
|
|
for use where a filesystem has to get a mount within a mount, such as NFS4
|
|
|
|
does by internally mounting the root of the target server and then doing a
|
|
|
|
private pathwalk to the target directory.
|
|
|
|
|
|
|
|
The purpose in the new context is inherited from the old one.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
void put_fs_context(struct fs_context *fc);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Destroy a filesystem context, releasing any resources it holds. This
|
|
|
|
calls the ->free() operation. This is intended to be called by anyone who
|
|
|
|
created a filesystem context.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
.. Warning::
|
|
|
|
|
|
|
|
filesystem contexts are not refcounted, so this causes unconditional
|
|
|
|
destruction.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
In all the above operations, apart from the put op, the return is a mount
|
|
|
|
context pointer or a negative error code.
|
|
|
|
|
|
|
|
For the remaining operations, if an error occurs, a negative error code will be
|
|
|
|
returned.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int vfs_parse_fs_param(struct fs_context *fc,
|
|
|
|
struct fs_parameter *param);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-09-19 05:03:11 +03:00
|
|
|
Supply a single mount parameter to the filesystem context. This includes
|
2018-11-02 02:07:26 +03:00
|
|
|
the specification of the source/device which is specified as the "source"
|
|
|
|
parameter (which may be specified multiple times if the filesystem
|
|
|
|
supports that).
|
|
|
|
|
|
|
|
param specifies the parameter key name and the value. The parameter is
|
|
|
|
first checked to see if it corresponds to a standard mount flag (in which
|
|
|
|
case it is used to set an SB_xxx flag and consumed) or a security option
|
|
|
|
(in which case the LSM consumes it) before it is passed on to the
|
|
|
|
filesystem.
|
|
|
|
|
|
|
|
The parameter value is typed and can be one of:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
==================== =============================
|
|
|
|
fs_value_is_flag Parameter not given a value
|
|
|
|
fs_value_is_string Value is a string
|
|
|
|
fs_value_is_blob Value is a binary blob
|
|
|
|
fs_value_is_filename Value is a filename* + dirfd
|
|
|
|
fs_value_is_file Value is an open file (file*)
|
|
|
|
==================== =============================
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
If there is a value, that value is stored in a union in the struct in one
|
|
|
|
of param->{string,blob,name,file}. Note that the function may steal and
|
|
|
|
clear the pointer, but then becomes responsible for disposing of the
|
|
|
|
object.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int vfs_parse_fs_string(struct fs_context *fc, const char *key,
|
|
|
|
const char *value, size_t v_size);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
A wrapper around vfs_parse_fs_param() that copies the value string it is
|
|
|
|
passed.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int generic_parse_monolithic(struct fs_context *fc, void *data);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Parse a sys_mount() data page, assuming the form to be a text list
|
|
|
|
consisting of key[=val] options separated by commas. Each item in the
|
|
|
|
list is passed to vfs_mount_option(). This is the default when the
|
2019-03-28 01:53:31 +03:00
|
|
|
->parse_monolithic() method is NULL.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int vfs_get_tree(struct fs_context *fc);
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
Get or create the mountable root and superblock, using the parameters in
|
|
|
|
the filesystem context to select/configure the superblock. This invokes
|
|
|
|
the ->get_tree() method.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct vfsmount *vfs_create_mount(struct fs_context *fc);
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
Create a mount given the parameters in the specified filesystem context.
|
|
|
|
Note that this does not attach the mount to anything.
|
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
Superblock Creation Helpers
|
2019-03-28 01:53:31 +03:00
|
|
|
===========================
|
|
|
|
|
|
|
|
A number of VFS helpers are available for use by filesystems for the creation
|
|
|
|
or looking up of superblocks.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
struct super_block *
|
|
|
|
sget_fc(struct fs_context *fc,
|
|
|
|
int (*test)(struct super_block *sb, struct fs_context *fc),
|
|
|
|
int (*set)(struct super_block *sb, struct fs_context *fc));
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
This is the core routine. If test is non-NULL, it searches for an
|
|
|
|
existing superblock matching the criteria held in the fs_context, using
|
|
|
|
the test function to match them. If no match is found, a new superblock
|
|
|
|
is created and the set function is called to set it up.
|
|
|
|
|
|
|
|
Prior to the set function being called, fc->s_fs_info will be transferred
|
|
|
|
to sb->s_fs_info - and fc->s_fs_info will be cleared if set returns
|
|
|
|
success (ie. 0).
|
|
|
|
|
|
|
|
The following helpers all wrap sget_fc():
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int vfs_get_super(struct fs_context *fc,
|
|
|
|
enum vfs_get_super_keying keying,
|
|
|
|
int (*fill_super)(struct super_block *sb,
|
|
|
|
struct fs_context *fc))
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
This creates/looks up a deviceless superblock. The keying indicates how
|
|
|
|
many superblocks of this type may exist and in what manner they may be
|
|
|
|
shared:
|
|
|
|
|
|
|
|
(1) vfs_get_single_super
|
|
|
|
|
|
|
|
Only one such superblock may exist in the system. Any further
|
|
|
|
attempt to get a new superblock gets this one (and any parameter
|
|
|
|
differences are ignored).
|
|
|
|
|
|
|
|
(2) vfs_get_keyed_super
|
|
|
|
|
|
|
|
Multiple superblocks of this type may exist and they're keyed on
|
|
|
|
their s_fs_info pointer (for example this may refer to a
|
|
|
|
namespace).
|
|
|
|
|
|
|
|
(3) vfs_get_independent_super
|
|
|
|
|
|
|
|
Multiple independent superblocks of this type may exist. This
|
|
|
|
function never matches an existing one and always creates a new
|
|
|
|
one.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
|
2020-09-19 05:03:11 +03:00
|
|
|
Parameter Description
|
2018-11-02 02:07:26 +03:00
|
|
|
=====================
|
|
|
|
|
|
|
|
Parameters are described using structures defined in linux/fs_parser.h.
|
2020-04-28 00:17:09 +03:00
|
|
|
There's a core description struct that links everything together::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
struct fs_parameter_description {
|
|
|
|
const struct fs_parameter_spec *specs;
|
|
|
|
const struct fs_parameter_enum *enums;
|
|
|
|
};
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
For example::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
enum {
|
2018-11-02 02:07:26 +03:00
|
|
|
Opt_autocell,
|
|
|
|
Opt_bar,
|
|
|
|
Opt_dyn,
|
|
|
|
Opt_foo,
|
|
|
|
Opt_source,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct fs_parameter_description afs_fs_parameters = {
|
|
|
|
.specs = afs_param_specs,
|
|
|
|
.enums = afs_param_enums,
|
|
|
|
};
|
|
|
|
|
|
|
|
The members are as follows:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
(1) ::
|
|
|
|
|
|
|
|
const struct fs_parameter_specification *specs;
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
Table of parameter specifications, terminated with a null entry, where the
|
2020-04-28 00:17:09 +03:00
|
|
|
entries are of type::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
struct fs_parameter_spec {
|
|
|
|
const char *name;
|
|
|
|
u8 opt;
|
|
|
|
enum fs_parameter_type type:8;
|
|
|
|
unsigned short flags;
|
2018-11-02 02:07:26 +03:00
|
|
|
};
|
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
The 'name' field is a string to match exactly to the parameter key (no
|
|
|
|
wildcards, patterns and no case-independence) and 'opt' is the value that
|
|
|
|
will be returned by the fs_parser() function in the case of a successful
|
|
|
|
match.
|
|
|
|
|
|
|
|
The 'type' field indicates the desired value type and must be one of:
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ======================= =====================
|
2018-11-02 02:07:26 +03:00
|
|
|
TYPE NAME EXPECTED VALUE RESULT IN
|
|
|
|
======================= ======================= =====================
|
|
|
|
fs_param_is_flag No value n/a
|
|
|
|
fs_param_is_bool Boolean value result->boolean
|
|
|
|
fs_param_is_u32 32-bit unsigned int result->uint_32
|
|
|
|
fs_param_is_u32_octal 32-bit octal int result->uint_32
|
|
|
|
fs_param_is_u32_hex 32-bit hex int result->uint_32
|
|
|
|
fs_param_is_s32 32-bit signed int result->int_32
|
2019-03-28 01:53:31 +03:00
|
|
|
fs_param_is_u64 64-bit unsigned int result->uint_64
|
2018-11-02 02:07:26 +03:00
|
|
|
fs_param_is_enum Enum value name result->uint_32
|
|
|
|
fs_param_is_string Arbitrary string param->string
|
|
|
|
fs_param_is_blob Binary blob param->blob
|
|
|
|
fs_param_is_blockdev Blockdev path * Needs lookup
|
|
|
|
fs_param_is_path Path * Needs lookup
|
2019-03-28 01:53:31 +03:00
|
|
|
fs_param_is_fd File descriptor result->int_32
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ======================= =====================
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Note that if the value is of fs_param_is_bool type, fs_parse() will try
|
|
|
|
to match any string value against "0", "1", "no", "yes", "false", "true".
|
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
Each parameter can also be qualified with 'flags':
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ================================================
|
2019-03-28 01:53:31 +03:00
|
|
|
fs_param_v_optional The value is optional
|
|
|
|
fs_param_neg_with_no result->negated set if key is prefixed with "no"
|
|
|
|
fs_param_neg_with_empty result->negated set if value is ""
|
|
|
|
fs_param_deprecated The parameter is deprecated.
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ================================================
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
These are wrapped with a number of convenience wrappers:
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ===============================================
|
2019-03-28 01:53:31 +03:00
|
|
|
MACRO SPECIFIES
|
|
|
|
======================= ===============================================
|
|
|
|
fsparam_flag() fs_param_is_flag
|
|
|
|
fsparam_flag_no() fs_param_is_flag, fs_param_neg_with_no
|
|
|
|
fsparam_bool() fs_param_is_bool
|
|
|
|
fsparam_u32() fs_param_is_u32
|
|
|
|
fsparam_u32oct() fs_param_is_u32_octal
|
|
|
|
fsparam_u32hex() fs_param_is_u32_hex
|
|
|
|
fsparam_s32() fs_param_is_s32
|
|
|
|
fsparam_u64() fs_param_is_u64
|
|
|
|
fsparam_enum() fs_param_is_enum
|
|
|
|
fsparam_string() fs_param_is_string
|
|
|
|
fsparam_blob() fs_param_is_blob
|
|
|
|
fsparam_bdev() fs_param_is_blockdev
|
|
|
|
fsparam_path() fs_param_is_path
|
|
|
|
fsparam_fd() fs_param_is_fd
|
2020-04-28 00:17:09 +03:00
|
|
|
======================= ===============================================
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
all of which take two arguments, name string and option number - for
|
2020-04-28 00:17:09 +03:00
|
|
|
example::
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
static const struct fs_parameter_spec afs_param_specs[] = {
|
|
|
|
fsparam_flag ("autocell", Opt_autocell),
|
|
|
|
fsparam_flag ("dyn", Opt_dyn),
|
|
|
|
fsparam_string ("source", Opt_source),
|
|
|
|
fsparam_flag_no ("foo", Opt_foo),
|
|
|
|
{}
|
2018-11-02 02:07:26 +03:00
|
|
|
};
|
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
An addition macro, __fsparam() is provided that takes an additional pair
|
|
|
|
of arguments to specify the type and the flags for anything that doesn't
|
|
|
|
match one of the above macros.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
(2) ::
|
|
|
|
|
|
|
|
const struct fs_parameter_enum *enums;
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
Table of enum value names to integer mappings, terminated with a null
|
2020-04-28 00:17:09 +03:00
|
|
|
entry. This is of type::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
struct fs_parameter_enum {
|
2019-03-28 01:53:31 +03:00
|
|
|
u8 opt;
|
2018-11-02 02:07:26 +03:00
|
|
|
char name[14];
|
|
|
|
u8 value;
|
|
|
|
};
|
|
|
|
|
|
|
|
Where the array is an unsorted list of { parameter ID, name }-keyed
|
2020-04-28 00:17:09 +03:00
|
|
|
elements that indicate the value to map to, e.g.::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
static const struct fs_parameter_enum afs_param_enums[] = {
|
|
|
|
{ Opt_bar, "x", 1},
|
|
|
|
{ Opt_bar, "y", 23},
|
|
|
|
{ Opt_bar, "z", 42},
|
|
|
|
};
|
|
|
|
|
|
|
|
If a parameter of type fs_param_is_enum is encountered, fs_parse() will
|
|
|
|
try to look the value up in the enum table and the result will be stored
|
|
|
|
in the parse result.
|
|
|
|
|
|
|
|
The parser should be pointed to by the parser pointer in the file_system_type
|
|
|
|
struct as this will provide validation on registration (if
|
|
|
|
CONFIG_VALIDATE_FS_PARSER=y) and will allow the description to be queried from
|
|
|
|
userspace using the fsinfo() syscall.
|
|
|
|
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
Parameter Helper Functions
|
2018-11-02 02:07:26 +03:00
|
|
|
==========================
|
|
|
|
|
|
|
|
A number of helper functions are provided to help a filesystem or an LSM
|
|
|
|
process the parameters it is given.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int lookup_constant(const struct constant_table tbl[],
|
|
|
|
const char *name, int not_found);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Look up a constant by name in a table of name -> integer mappings. The
|
2020-04-28 00:17:09 +03:00
|
|
|
table is an array of elements of the following type::
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
struct constant_table {
|
|
|
|
const char *name;
|
|
|
|
int value;
|
|
|
|
};
|
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
If a match is found, the corresponding value is returned. If a match
|
|
|
|
isn't found, the not_found value is returned instead.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
bool validate_constant_table(const struct constant_table *tbl,
|
|
|
|
size_t tbl_size,
|
|
|
|
int low, int high, int special);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
Validate a constant table. Checks that all the elements are appropriately
|
|
|
|
ordered, that there are no duplicates and that the values are between low
|
|
|
|
and high inclusive, though provision is made for one allowable special
|
|
|
|
value outside of that range. If no special value is required, special
|
|
|
|
should just be set to lie inside the low-to-high range.
|
|
|
|
|
|
|
|
If all is good, true is returned. If the table is invalid, errors are
|
2019-03-28 01:53:31 +03:00
|
|
|
logged to dmesg and false is returned.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
bool fs_validate_description(const struct fs_parameter_description *desc);
|
2019-03-28 01:53:31 +03:00
|
|
|
|
|
|
|
This performs some validation checks on a parameter description. It
|
|
|
|
returns true if the description is good and false if it is not. It will
|
|
|
|
log errors to dmesg if validation fails.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int fs_parse(struct fs_context *fc,
|
|
|
|
const struct fs_parameter_description *desc,
|
|
|
|
struct fs_parameter *param,
|
|
|
|
struct fs_parse_result *result);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
This is the main interpreter of parameters. It uses the parameter
|
2019-03-28 01:53:31 +03:00
|
|
|
description to look up a parameter by key name and to convert that to an
|
|
|
|
option number (which it returns).
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
If successful, and if the parameter type indicates the result is a
|
|
|
|
boolean, integer or enum type, the value is converted by this function and
|
2019-03-28 01:53:31 +03:00
|
|
|
the result stored in result->{boolean,int_32,uint_32,uint_64}.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
If a match isn't initially made, the key is prefixed with "no" and no
|
|
|
|
value is present then an attempt will be made to look up the key with the
|
|
|
|
prefix removed. If this matches a parameter for which the type has flag
|
2019-03-28 01:53:31 +03:00
|
|
|
fs_param_neg_with_no set, then a match will be made and result->negated
|
|
|
|
will be set to true.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2019-03-28 01:53:31 +03:00
|
|
|
If the parameter isn't matched, -ENOPARAM will be returned; if the
|
|
|
|
parameter is matched, but the value is erroneous, -EINVAL will be
|
|
|
|
returned; otherwise the parameter's option number will be returned.
|
2018-11-02 02:07:26 +03:00
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
* ::
|
|
|
|
|
|
|
|
int fs_lookup_param(struct fs_context *fc,
|
|
|
|
struct fs_parameter *value,
|
|
|
|
bool want_bdev,
|
|
|
|
struct path *_path);
|
2018-11-02 02:07:26 +03:00
|
|
|
|
|
|
|
This takes a parameter that carries a string or filename type and attempts
|
|
|
|
to do a path lookup on it. If the parameter expects a blockdev, a check
|
|
|
|
is made that the inode actually represents one.
|
|
|
|
|
2020-04-28 00:17:09 +03:00
|
|
|
Returns 0 if successful and ``*_path`` will be set; returns a negative
|
|
|
|
error code if not.
|