Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1 | /* |
| 2 | * linux/fs/pnode.c |
| 3 | * |
| 4 | * (C) Copyright IBM Corporation 2005. |
| 5 | * Released under GPL v2. |
| 6 | * Author : Ram Pai (linuxram@us.ibm.com) |
| 7 | * |
| 8 | */ |
Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 9 | #include <linux/mnt_namespace.h> |
Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 10 | #include <linux/mount.h> |
| 11 | #include <linux/fs.h> |
Eric W. Biederman | 132c94e | 2013-03-22 04:08:05 -0700 | [diff] [blame] | 12 | #include <linux/nsproxy.h> |
Al Viro | 6d59e7f | 2008-03-22 15:48:17 -0400 | [diff] [blame] | 13 | #include "internal.h" |
Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 14 | #include "pnode.h" |
| 15 | |
Ram Pai | 03e06e6 | 2005-11-07 17:19:33 -0500 | [diff] [blame] | 16 | /* return the next shared peer mount of @p */ |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 17 | static inline struct mount *next_peer(struct mount *p) |
Ram Pai | 03e06e6 | 2005-11-07 17:19:33 -0500 | [diff] [blame] | 18 | { |
Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 19 | return list_entry(p->mnt_share.next, struct mount, mnt_share); |
Ram Pai | 03e06e6 | 2005-11-07 17:19:33 -0500 | [diff] [blame] | 20 | } |
| 21 | |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 22 | static inline struct mount *first_slave(struct mount *p) |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 23 | { |
Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 24 | return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave); |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 25 | } |
| 26 | |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 27 | static inline struct mount *next_slave(struct mount *p) |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 28 | { |
Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 29 | return list_entry(p->mnt_slave.next, struct mount, mnt_slave); |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 30 | } |
| 31 | |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 32 | static struct mount *get_peer_under_root(struct mount *mnt, |
| 33 | struct mnt_namespace *ns, |
| 34 | const struct path *root) |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 35 | { |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 36 | struct mount *m = mnt; |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 37 | |
| 38 | do { |
| 39 | /* Check the namespace first for optimization */ |
Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 40 | if (m->mnt_ns == ns && is_path_reachable(m, m->mnt.mnt_root, root)) |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 41 | return m; |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 42 | |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 43 | m = next_peer(m); |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 44 | } while (m != mnt); |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 45 | |
| 46 | return NULL; |
| 47 | } |
| 48 | |
| 49 | /* |
| 50 | * Get ID of closest dominating peer group having a representative |
| 51 | * under the given root. |
| 52 | * |
| 53 | * Caller must hold namespace_sem |
| 54 | */ |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 55 | int get_dominating_id(struct mount *mnt, const struct path *root) |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 56 | { |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 57 | struct mount *m; |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 58 | |
Al Viro | 3230192 | 2011-11-25 00:10:28 -0500 | [diff] [blame] | 59 | for (m = mnt->mnt_master; m != NULL; m = m->mnt_master) { |
Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 60 | struct mount *d = get_peer_under_root(m, mnt->mnt_ns, root); |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 61 | if (d) |
Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 62 | return d->mnt_group_id; |
Miklos Szeredi | 97e7e0f | 2008-03-27 13:06:26 +0100 | [diff] [blame] | 63 | } |
| 64 | |
| 65 | return 0; |
| 66 | } |
| 67 | |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 68 | static int do_make_slave(struct mount *mnt) |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 69 | { |
Al Viro | 5235d44 | 2016-11-20 19:33:09 -0500 | [diff] [blame] | 70 | struct mount *master, *slave_mnt; |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 71 | |
Al Viro | 5235d44 | 2016-11-20 19:33:09 -0500 | [diff] [blame] | 72 | if (list_empty(&mnt->mnt_share)) { |
| 73 | if (IS_MNT_SHARED(mnt)) { |
| 74 | mnt_release_group_id(mnt); |
| 75 | CLEAR_MNT_SHARED(mnt); |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 76 | } |
Al Viro | 5235d44 | 2016-11-20 19:33:09 -0500 | [diff] [blame] | 77 | master = mnt->mnt_master; |
| 78 | if (!master) { |
| 79 | struct list_head *p = &mnt->mnt_slave_list; |
| 80 | while (!list_empty(p)) { |
| 81 | slave_mnt = list_first_entry(p, |
| 82 | struct mount, mnt_slave); |
| 83 | list_del_init(&slave_mnt->mnt_slave); |
| 84 | slave_mnt->mnt_master = NULL; |
| 85 | } |
| 86 | return 0; |
| 87 | } |
| 88 | } else { |
| 89 | struct mount *m; |
| 90 | /* |
| 91 | * slave 'mnt' to a peer mount that has the |
| 92 | * same root dentry. If none is available then |
| 93 | * slave it to anything that is available. |
| 94 | */ |
| 95 | for (m = master = next_peer(mnt); m != mnt; m = next_peer(m)) { |
| 96 | if (m->mnt.mnt_root == mnt->mnt.mnt_root) { |
| 97 | master = m; |
| 98 | break; |
| 99 | } |
| 100 | } |
| 101 | list_del_init(&mnt->mnt_share); |
| 102 | mnt->mnt_group_id = 0; |
| 103 | CLEAR_MNT_SHARED(mnt); |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 104 | } |
Al Viro | 5235d44 | 2016-11-20 19:33:09 -0500 | [diff] [blame] | 105 | list_for_each_entry(slave_mnt, &mnt->mnt_slave_list, mnt_slave) |
| 106 | slave_mnt->mnt_master = master; |
| 107 | list_move(&mnt->mnt_slave, &master->mnt_slave_list); |
| 108 | list_splice(&mnt->mnt_slave_list, master->mnt_slave_list.prev); |
| 109 | INIT_LIST_HEAD(&mnt->mnt_slave_list); |
Al Viro | 3230192 | 2011-11-25 00:10:28 -0500 | [diff] [blame] | 110 | mnt->mnt_master = master; |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 111 | return 0; |
| 112 | } |
| 113 | |
Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 114 | /* |
| 115 | * vfsmount lock must be held for write |
| 116 | */ |
Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 117 | void change_mnt_propagation(struct mount *mnt, int type) |
Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 118 | { |
Ram Pai | 03e06e6 | 2005-11-07 17:19:33 -0500 | [diff] [blame] | 119 | if (type == MS_SHARED) { |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 120 | set_mnt_shared(mnt); |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 121 | return; |
| 122 | } |
Al Viro | 6fc7871 | 2011-11-24 23:35:54 -0500 | [diff] [blame] | 123 | do_make_slave(mnt); |
Ram Pai | a58b0eb | 2005-11-07 17:20:48 -0500 | [diff] [blame] | 124 | if (type != MS_SLAVE) { |
Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 125 | list_del_init(&mnt->mnt_slave); |
Al Viro | d10e8de | 2011-11-25 00:07:16 -0500 | [diff] [blame] | 126 | mnt->mnt_master = NULL; |
Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 127 | if (type == MS_UNBINDABLE) |
Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 128 | mnt->mnt.mnt_flags |= MNT_UNBINDABLE; |
Andries E. Brouwer | 0b03cfb | 2008-02-06 01:36:32 -0800 | [diff] [blame] | 129 | else |
Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 130 | mnt->mnt.mnt_flags &= ~MNT_UNBINDABLE; |
Ram Pai | 03e06e6 | 2005-11-07 17:19:33 -0500 | [diff] [blame] | 131 | } |
Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 132 | } |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 133 | |
| 134 | /* |
| 135 | * get the next mount in the propagation tree. |
| 136 | * @m: the mount seen last |
| 137 | * @origin: the original mount from where the tree walk initiated |
Al Viro | 796a6b5 | 2010-01-16 13:28:47 -0500 | [diff] [blame] | 138 | * |
| 139 | * Note that peer groups form contiguous segments of slave lists. |
| 140 | * We rely on that in get_source() to be able to find out if |
| 141 | * vfsmount found while iterating with propagation_next() is |
| 142 | * a peer of one we'd found earlier. |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 143 | */ |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 144 | static struct mount *propagation_next(struct mount *m, |
| 145 | struct mount *origin) |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 146 | { |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 147 | /* are there any slaves of this mount? */ |
Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 148 | if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list)) |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 149 | return first_slave(m); |
| 150 | |
| 151 | while (1) { |
Al Viro | 3230192 | 2011-11-25 00:10:28 -0500 | [diff] [blame] | 152 | struct mount *master = m->mnt_master; |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 153 | |
Al Viro | 3230192 | 2011-11-25 00:10:28 -0500 | [diff] [blame] | 154 | if (master == origin->mnt_master) { |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 155 | struct mount *next = next_peer(m); |
| 156 | return (next == origin) ? NULL : next; |
Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 157 | } else if (m->mnt_slave.next != &master->mnt_slave_list) |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 158 | return next_slave(m); |
| 159 | |
| 160 | /* back at master */ |
| 161 | m = master; |
| 162 | } |
| 163 | } |
| 164 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 165 | static struct mount *next_group(struct mount *m, struct mount *origin) |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 166 | { |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 167 | while (1) { |
| 168 | while (1) { |
| 169 | struct mount *next; |
| 170 | if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list)) |
| 171 | return first_slave(m); |
| 172 | next = next_peer(m); |
| 173 | if (m->mnt_group_id == origin->mnt_group_id) { |
| 174 | if (next == origin) |
| 175 | return NULL; |
| 176 | } else if (m->mnt_slave.next != &next->mnt_slave) |
| 177 | break; |
| 178 | m = next; |
Al Viro | 796a6b5 | 2010-01-16 13:28:47 -0500 | [diff] [blame] | 179 | } |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 180 | /* m is the last peer */ |
| 181 | while (1) { |
| 182 | struct mount *master = m->mnt_master; |
| 183 | if (m->mnt_slave.next != &master->mnt_slave_list) |
| 184 | return next_slave(m); |
| 185 | m = next_peer(master); |
| 186 | if (master->mnt_group_id == origin->mnt_group_id) |
| 187 | break; |
| 188 | if (master->mnt_slave.next == &m->mnt_slave) |
| 189 | break; |
| 190 | m = master; |
| 191 | } |
| 192 | if (m == origin) |
| 193 | return NULL; |
Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 194 | } |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 195 | } |
| 196 | |
| 197 | /* all accesses are serialized by namespace_sem */ |
| 198 | static struct user_namespace *user_ns; |
Eric W. Biederman | 5ec0811 | 2016-05-05 09:29:29 -0500 | [diff] [blame] | 199 | static struct mount *last_dest, *first_source, *last_source, *dest_master; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 200 | static struct mountpoint *mp; |
| 201 | static struct hlist_head *list; |
| 202 | |
Maxim Patlasov | 7ae8fd0 | 2016-02-16 11:45:33 -0800 | [diff] [blame] | 203 | static inline bool peers(struct mount *m1, struct mount *m2) |
| 204 | { |
| 205 | return m1->mnt_group_id == m2->mnt_group_id && m1->mnt_group_id; |
| 206 | } |
| 207 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 208 | static int propagate_one(struct mount *m) |
| 209 | { |
| 210 | struct mount *child; |
| 211 | int type; |
| 212 | /* skip ones added by this propagate_mnt() */ |
| 213 | if (IS_MNT_NEW(m)) |
| 214 | return 0; |
| 215 | /* skip if mountpoint isn't covered by it */ |
| 216 | if (!is_subdir(mp->m_dentry, m->mnt.mnt_root)) |
| 217 | return 0; |
Maxim Patlasov | 7ae8fd0 | 2016-02-16 11:45:33 -0800 | [diff] [blame] | 218 | if (peers(m, last_dest)) { |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 219 | type = CL_MAKE_SHARED; |
| 220 | } else { |
| 221 | struct mount *n, *p; |
Eric W. Biederman | 5ec0811 | 2016-05-05 09:29:29 -0500 | [diff] [blame] | 222 | bool done; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 223 | for (n = m; ; n = p) { |
| 224 | p = n->mnt_master; |
Eric W. Biederman | 5ec0811 | 2016-05-05 09:29:29 -0500 | [diff] [blame] | 225 | if (p == dest_master || IS_MNT_MARKED(p)) |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 226 | break; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 227 | } |
Eric W. Biederman | 5ec0811 | 2016-05-05 09:29:29 -0500 | [diff] [blame] | 228 | do { |
| 229 | struct mount *parent = last_source->mnt_parent; |
| 230 | if (last_source == first_source) |
| 231 | break; |
| 232 | done = parent->mnt_master == p; |
| 233 | if (done && peers(n, parent)) |
| 234 | break; |
| 235 | last_source = last_source->mnt_master; |
| 236 | } while (!done); |
| 237 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 238 | type = CL_SLAVE; |
| 239 | /* beginning of peer group among the slaves? */ |
| 240 | if (IS_MNT_SHARED(m)) |
| 241 | type |= CL_MAKE_SHARED; |
| 242 | } |
| 243 | |
| 244 | /* Notice when we are propagating across user namespaces */ |
| 245 | if (m->mnt_ns->user_ns != user_ns) |
| 246 | type |= CL_UNPRIVILEGED; |
| 247 | child = copy_tree(last_source, last_source->mnt.mnt_root, type); |
| 248 | if (IS_ERR(child)) |
| 249 | return PTR_ERR(child); |
Eric W. Biederman | 8486a78 | 2014-10-07 16:22:52 -0700 | [diff] [blame] | 250 | child->mnt.mnt_flags &= ~MNT_LOCKED; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 251 | mnt_set_mountpoint(m, mp, child); |
| 252 | last_dest = m; |
| 253 | last_source = child; |
| 254 | if (m->mnt_master != dest_master) { |
| 255 | read_seqlock_excl(&mount_lock); |
| 256 | SET_MNT_MARK(m->mnt_master); |
| 257 | read_sequnlock_excl(&mount_lock); |
| 258 | } |
| 259 | hlist_add_head(&child->mnt_hash, list); |
Eric W. Biederman | d292168 | 2016-09-28 00:27:17 -0500 | [diff] [blame] | 260 | return count_mounts(m->mnt_ns, child); |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 261 | } |
| 262 | |
| 263 | /* |
| 264 | * mount 'source_mnt' under the destination 'dest_mnt' at |
| 265 | * dentry 'dest_dentry'. And propagate that mount to |
| 266 | * all the peer and slave mounts of 'dest_mnt'. |
| 267 | * Link all the new mounts into a propagation tree headed at |
| 268 | * source_mnt. Also link all the new mounts using ->mnt_list |
| 269 | * headed at source_mnt's ->mnt_list |
| 270 | * |
| 271 | * @dest_mnt: destination mount. |
| 272 | * @dest_dentry: destination dentry. |
| 273 | * @source_mnt: source mount. |
| 274 | * @tree_list : list of heads of trees to be attached. |
| 275 | */ |
Al Viro | 84d1719 | 2013-03-15 10:53:28 -0400 | [diff] [blame] | 276 | int propagate_mnt(struct mount *dest_mnt, struct mountpoint *dest_mp, |
Al Viro | 38129a1 | 2014-03-20 21:10:51 -0400 | [diff] [blame] | 277 | struct mount *source_mnt, struct hlist_head *tree_list) |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 278 | { |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 279 | struct mount *m, *n; |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 280 | int ret = 0; |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 281 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 282 | /* |
| 283 | * we don't want to bother passing tons of arguments to |
| 284 | * propagate_one(); everything is serialized by namespace_sem, |
| 285 | * so globals will do just fine. |
| 286 | */ |
| 287 | user_ns = current->nsproxy->mnt_ns->user_ns; |
| 288 | last_dest = dest_mnt; |
Eric W. Biederman | 5ec0811 | 2016-05-05 09:29:29 -0500 | [diff] [blame] | 289 | first_source = source_mnt; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 290 | last_source = source_mnt; |
| 291 | mp = dest_mp; |
| 292 | list = tree_list; |
| 293 | dest_master = dest_mnt->mnt_master; |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 294 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 295 | /* all peers of dest_mnt, except dest_mnt itself */ |
| 296 | for (n = next_peer(dest_mnt); n != dest_mnt; n = next_peer(n)) { |
| 297 | ret = propagate_one(n); |
| 298 | if (ret) |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 299 | goto out; |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 300 | } |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 301 | |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 302 | /* all slave groups */ |
| 303 | for (m = next_group(dest_mnt, dest_mnt); m; |
| 304 | m = next_group(m, dest_mnt)) { |
| 305 | /* everything in that slave group */ |
| 306 | n = m; |
| 307 | do { |
| 308 | ret = propagate_one(n); |
| 309 | if (ret) |
| 310 | goto out; |
| 311 | n = next_peer(n); |
| 312 | } while (n != m); |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 313 | } |
| 314 | out: |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 315 | read_seqlock_excl(&mount_lock); |
| 316 | hlist_for_each_entry(n, tree_list, mnt_hash) { |
| 317 | m = n->mnt_parent; |
| 318 | if (m->mnt_master != dest_mnt->mnt_master) |
| 319 | CLEAR_MNT_MARK(m->mnt_master); |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 320 | } |
Al Viro | f2ebb3a | 2014-02-27 09:35:45 -0500 | [diff] [blame] | 321 | read_sequnlock_excl(&mount_lock); |
Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 322 | return ret; |
| 323 | } |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 324 | |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 325 | static struct mount *find_topper(struct mount *mnt) |
| 326 | { |
| 327 | /* If there is exactly one mount covering mnt completely return it. */ |
| 328 | struct mount *child; |
| 329 | |
| 330 | if (!list_is_singular(&mnt->mnt_mounts)) |
| 331 | return NULL; |
| 332 | |
| 333 | child = list_first_entry(&mnt->mnt_mounts, struct mount, mnt_child); |
| 334 | if (child->mnt_mountpoint != mnt->mnt.mnt_root) |
| 335 | return NULL; |
| 336 | |
| 337 | return child; |
| 338 | } |
| 339 | |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 340 | /* |
| 341 | * return true if the refcount is greater than count |
| 342 | */ |
Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 343 | static inline int do_refcount_check(struct mount *mnt, int count) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 344 | { |
Al Viro | aba809cf | 2013-09-28 23:10:55 -0400 | [diff] [blame] | 345 | return mnt_get_count(mnt) > count; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 346 | } |
| 347 | |
| 348 | /* |
| 349 | * check if the mount 'mnt' can be unmounted successfully. |
| 350 | * @mnt: the mount to be checked for unmount |
| 351 | * NOTE: unmounting 'mnt' would naturally propagate to all |
| 352 | * other mounts its parent propagates to. |
| 353 | * Check if any of these mounts that **do not have submounts** |
| 354 | * have more references than 'refcnt'. If so return busy. |
Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 355 | * |
Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 356 | * vfsmount lock must be held for write |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 357 | */ |
Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 358 | int propagate_mount_busy(struct mount *mnt, int refcnt) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 359 | { |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 360 | struct mount *m, *child, *topper; |
Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 361 | struct mount *parent = mnt->mnt_parent; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 362 | |
Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 363 | if (mnt == parent) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 364 | return do_refcount_check(mnt, refcnt); |
| 365 | |
| 366 | /* |
| 367 | * quickly check if the current mount can be unmounted. |
| 368 | * If not, we don't have to go checking for all other |
| 369 | * mounts |
| 370 | */ |
Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 371 | if (!list_empty(&mnt->mnt_mounts) || do_refcount_check(mnt, refcnt)) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 372 | return 1; |
| 373 | |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 374 | for (m = propagation_next(parent, parent); m; |
| 375 | m = propagation_next(m, parent)) { |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 376 | int count = 1; |
| 377 | child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint); |
| 378 | if (!child) |
| 379 | continue; |
| 380 | |
| 381 | /* Is there exactly one mount on the child that covers |
| 382 | * it completely whose reference should be ignored? |
| 383 | */ |
| 384 | topper = find_topper(child); |
| 385 | if (topper) |
| 386 | count += 1; |
| 387 | else if (!list_empty(&child->mnt_mounts)) |
| 388 | continue; |
| 389 | |
| 390 | if (do_refcount_check(child, count)) |
| 391 | return 1; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 392 | } |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 393 | return 0; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 394 | } |
| 395 | |
| 396 | /* |
Eric W. Biederman | 5d88457 | 2015-01-03 05:39:35 -0600 | [diff] [blame] | 397 | * Clear MNT_LOCKED when it can be shown to be safe. |
| 398 | * |
| 399 | * mount_lock lock must be held for write |
| 400 | */ |
| 401 | void propagate_mount_unlock(struct mount *mnt) |
| 402 | { |
| 403 | struct mount *parent = mnt->mnt_parent; |
| 404 | struct mount *m, *child; |
| 405 | |
| 406 | BUG_ON(parent == mnt); |
| 407 | |
| 408 | for (m = propagation_next(parent, parent); m; |
| 409 | m = propagation_next(m, parent)) { |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 410 | child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint); |
Eric W. Biederman | 5d88457 | 2015-01-03 05:39:35 -0600 | [diff] [blame] | 411 | if (child) |
| 412 | child->mnt.mnt_flags &= ~MNT_LOCKED; |
| 413 | } |
| 414 | } |
| 415 | |
| 416 | /* |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 417 | * Mark all mounts that the MNT_LOCKED logic will allow to be unmounted. |
| 418 | */ |
| 419 | static void mark_umount_candidates(struct mount *mnt) |
| 420 | { |
| 421 | struct mount *parent = mnt->mnt_parent; |
| 422 | struct mount *m; |
| 423 | |
| 424 | BUG_ON(parent == mnt); |
| 425 | |
| 426 | for (m = propagation_next(parent, parent); m; |
| 427 | m = propagation_next(m, parent)) { |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 428 | struct mount *child = __lookup_mnt(&m->mnt, |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 429 | mnt->mnt_mountpoint); |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 430 | if (!child || (child->mnt.mnt_flags & MNT_UMOUNT)) |
| 431 | continue; |
| 432 | if (!IS_MNT_LOCKED(child) || IS_MNT_MARKED(m)) { |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 433 | SET_MNT_MARK(child); |
| 434 | } |
| 435 | } |
| 436 | } |
| 437 | |
| 438 | /* |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 439 | * NOTE: unmounting 'mnt' naturally propagates to all other mounts its |
| 440 | * parent propagates to. |
| 441 | */ |
Al Viro | 61ef47b | 2011-11-24 18:25:28 -0500 | [diff] [blame] | 442 | static void __propagate_umount(struct mount *mnt) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 443 | { |
Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 444 | struct mount *parent = mnt->mnt_parent; |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 445 | struct mount *m; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 446 | |
Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 447 | BUG_ON(parent == mnt); |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 448 | |
Al Viro | c937135 | 2011-11-24 23:56:26 -0500 | [diff] [blame] | 449 | for (m = propagation_next(parent, parent); m; |
| 450 | m = propagation_next(m, parent)) { |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 451 | struct mount *topper; |
| 452 | struct mount *child = __lookup_mnt(&m->mnt, |
Al Viro | 474279d | 2013-10-01 16:11:26 -0400 | [diff] [blame] | 453 | mnt->mnt_mountpoint); |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 454 | /* |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 455 | * umount the child only if the child has no children |
| 456 | * and the child is marked safe to unmount. |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 457 | */ |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 458 | if (!child || !IS_MNT_MARKED(child)) |
| 459 | continue; |
| 460 | CLEAR_MNT_MARK(child); |
Eric W. Biederman | 1064f87 | 2017-01-20 18:28:35 +1300 | [diff] [blame] | 461 | |
| 462 | /* If there is exactly one mount covering all of child |
| 463 | * replace child with that mount. |
| 464 | */ |
| 465 | topper = find_topper(child); |
| 466 | if (topper) |
| 467 | mnt_change_mountpoint(child->mnt_parent, child->mnt_mp, |
| 468 | topper); |
| 469 | |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 470 | if (list_empty(&child->mnt_mounts)) { |
Al Viro | 88b368f | 2014-08-18 15:09:26 -0400 | [diff] [blame] | 471 | list_del_init(&child->mnt_child); |
Eric W. Biederman | 590ce4b | 2014-12-22 18:30:08 -0600 | [diff] [blame] | 472 | child->mnt.mnt_flags |= MNT_UMOUNT; |
Eric W. Biederman | c003b26 | 2014-12-18 13:10:48 -0600 | [diff] [blame] | 473 | list_move_tail(&child->mnt_list, &mnt->mnt_list); |
Al Viro | 38129a1 | 2014-03-20 21:10:51 -0400 | [diff] [blame] | 474 | } |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 475 | } |
| 476 | } |
| 477 | |
| 478 | /* |
| 479 | * collect all mounts that receive propagation from the mount in @list, |
| 480 | * and return these additional mounts in the same list. |
| 481 | * @list: the list of mounts to be unmounted. |
Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 482 | * |
| 483 | * vfsmount lock must be held for write |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 484 | */ |
Eric W. Biederman | c003b26 | 2014-12-18 13:10:48 -0600 | [diff] [blame] | 485 | int propagate_umount(struct list_head *list) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 486 | { |
Al Viro | 61ef47b | 2011-11-24 18:25:28 -0500 | [diff] [blame] | 487 | struct mount *mnt; |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 488 | |
Eric W. Biederman | 0c56fe3 | 2015-01-05 13:38:04 -0600 | [diff] [blame] | 489 | list_for_each_entry_reverse(mnt, list, mnt_list) |
| 490 | mark_umount_candidates(mnt); |
| 491 | |
Eric W. Biederman | c003b26 | 2014-12-18 13:10:48 -0600 | [diff] [blame] | 492 | list_for_each_entry(mnt, list, mnt_list) |
Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 493 | __propagate_umount(mnt); |
| 494 | return 0; |
| 495 | } |