mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-11-26 09:30:24 +00:00
54b9a4ec1e
Previously we would crash the process immediately when a promise violation was found during a syscall. This is error prone, as we don't unwind the stack. This means that in certain cases we can leak resources, like an OwnPtr / RefPtr tracked on the stack. Or even leak a lock acquired in a ScopeLockLocker. To remedy this situation we move the promise violation handling to the syscall handler, right before we return to user space. This allows the code to follow the normal unwind path, and grantees there is no longer any cleanup that needs to occur. The Process::require_promise() and Process::require_no_promises() functions were modified to return ErrorOr<void> so we enforce that the errors are always propagated by the caller.
132 lines
4.8 KiB
C++
132 lines
4.8 KiB
C++
/*
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <Kernel/FileSystem/Custody.h>
|
|
#include <Kernel/FileSystem/DevPtsFS.h>
|
|
#include <Kernel/FileSystem/DevTmpFS.h>
|
|
#include <Kernel/FileSystem/Ext2FileSystem.h>
|
|
#include <Kernel/FileSystem/ISO9660FileSystem.h>
|
|
#include <Kernel/FileSystem/Plan9FileSystem.h>
|
|
#include <Kernel/FileSystem/ProcFS.h>
|
|
#include <Kernel/FileSystem/SysFS.h>
|
|
#include <Kernel/FileSystem/TmpFS.h>
|
|
#include <Kernel/FileSystem/VirtualFileSystem.h>
|
|
#include <Kernel/Process.h>
|
|
|
|
namespace Kernel {
|
|
|
|
ErrorOr<FlatPtr> Process::sys$mount(Userspace<const Syscall::SC_mount_params*> user_params)
|
|
{
|
|
VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
|
|
TRY(require_no_promises());
|
|
if (!is_superuser())
|
|
return EPERM;
|
|
|
|
auto params = TRY(copy_typed_from_user(user_params));
|
|
|
|
auto source_fd = params.source_fd;
|
|
auto target = TRY(try_copy_kstring_from_user(params.target));
|
|
auto fs_type_string = TRY(try_copy_kstring_from_user(params.fs_type));
|
|
auto fs_type = fs_type_string->view();
|
|
|
|
auto description_or_error = fds().open_file_description(source_fd);
|
|
if (!description_or_error.is_error())
|
|
dbgln("mount {}: source fd {} @ {}", fs_type, source_fd, target);
|
|
else
|
|
dbgln("mount {} @ {}", fs_type, target);
|
|
|
|
auto target_custody = TRY(VirtualFileSystem::the().resolve_path(target->view(), current_directory()));
|
|
|
|
if (params.flags & MS_REMOUNT) {
|
|
// We're not creating a new mount, we're updating an existing one!
|
|
TRY(VirtualFileSystem::the().remount(target_custody, params.flags & ~MS_REMOUNT));
|
|
return 0;
|
|
}
|
|
|
|
if (params.flags & MS_BIND) {
|
|
// We're doing a bind mount.
|
|
if (description_or_error.is_error())
|
|
return description_or_error.release_error();
|
|
auto description = description_or_error.release_value();
|
|
if (!description->custody()) {
|
|
// We only support bind-mounting inodes, not arbitrary files.
|
|
return ENODEV;
|
|
}
|
|
TRY(VirtualFileSystem::the().bind_mount(*description->custody(), target_custody, params.flags));
|
|
return 0;
|
|
}
|
|
|
|
RefPtr<FileSystem> fs;
|
|
|
|
if (fs_type == "ext2"sv || fs_type == "Ext2FS"sv) {
|
|
if (description_or_error.is_error())
|
|
return EBADF;
|
|
auto description = description_or_error.release_value();
|
|
if (!description->file().is_block_device())
|
|
return ENOTBLK;
|
|
if (!description->file().is_seekable()) {
|
|
dbgln("mount: this is not a seekable file");
|
|
return ENODEV;
|
|
}
|
|
|
|
auto source_pseudo_path = TRY(description->pseudo_path());
|
|
dbgln("mount: attempting to mount {} on {}", source_pseudo_path, target);
|
|
|
|
fs = TRY(Ext2FS::try_create(*description));
|
|
} else if (fs_type == "9p"sv || fs_type == "Plan9FS"sv) {
|
|
if (description_or_error.is_error())
|
|
return EBADF;
|
|
auto description = description_or_error.release_value();
|
|
fs = TRY(Plan9FS::try_create(*description));
|
|
} else if (fs_type == "proc"sv || fs_type == "ProcFS"sv) {
|
|
fs = TRY(ProcFS::try_create());
|
|
} else if (fs_type == "devpts"sv || fs_type == "DevPtsFS"sv) {
|
|
fs = TRY(DevPtsFS::try_create());
|
|
} else if (fs_type == "dev"sv || fs_type == "DevTmpFS"sv) {
|
|
fs = TRY(DevTmpFS::try_create());
|
|
} else if (fs_type == "sys"sv || fs_type == "SysFS"sv) {
|
|
fs = TRY(SysFS::try_create());
|
|
} else if (fs_type == "tmp"sv || fs_type == "TmpFS"sv) {
|
|
fs = TRY(TmpFS::try_create());
|
|
} else if (fs_type == "iso9660"sv || fs_type == "ISO9660FS"sv) {
|
|
if (description_or_error.is_error())
|
|
return EBADF;
|
|
auto description = description_or_error.release_value();
|
|
if (!description->file().is_seekable()) {
|
|
dbgln("mount: this is not a seekable file");
|
|
return ENODEV;
|
|
}
|
|
auto source_pseudo_path = TRY(description->pseudo_path());
|
|
dbgln("mount: attempting to mount {} on {}", source_pseudo_path, target);
|
|
fs = TRY(ISO9660FS::try_create(*description));
|
|
} else {
|
|
return ENODEV;
|
|
}
|
|
|
|
if (!fs)
|
|
return ENOMEM;
|
|
|
|
TRY(fs->initialize());
|
|
TRY(VirtualFileSystem::the().mount(fs.release_nonnull(), target_custody, params.flags));
|
|
return 0;
|
|
}
|
|
|
|
ErrorOr<FlatPtr> Process::sys$umount(Userspace<const char*> user_mountpoint, size_t mountpoint_length)
|
|
{
|
|
VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
|
|
if (!is_superuser())
|
|
return EPERM;
|
|
|
|
TRY(require_no_promises());
|
|
|
|
auto mountpoint = TRY(get_syscall_path_argument(user_mountpoint, mountpoint_length));
|
|
auto custody = TRY(VirtualFileSystem::the().resolve_path(mountpoint->view(), current_directory()));
|
|
auto& guest_inode = custody->inode();
|
|
TRY(VirtualFileSystem::the().unmount(guest_inode));
|
|
return 0;
|
|
}
|
|
|
|
}
|