| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  *  linux/fs/namespace.c | 
 | 3 |  * | 
 | 4 |  * (C) Copyright Al Viro 2000, 2001 | 
 | 5 |  *	Released under GPL v2. | 
 | 6 |  * | 
 | 7 |  * Based on code from fs/super.c, copyright Linus Torvalds and others. | 
 | 8 |  * Heavily rewritten. | 
 | 9 |  */ | 
 | 10 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 11 | #include <linux/syscalls.h> | 
| Al Viro | d10577a | 2011-12-07 13:06:11 -0500 | [diff] [blame] | 12 | #include <linux/export.h> | 
| Randy Dunlap | 16f7e0f | 2006-01-11 12:17:46 -0800 | [diff] [blame] | 13 | #include <linux/capability.h> | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 14 | #include <linux/mnt_namespace.h> | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 15 | #include <linux/user_namespace.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 16 | #include <linux/namei.h> | 
 | 17 | #include <linux/security.h> | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 18 | #include <linux/idr.h> | 
| Al Viro | d10577a | 2011-12-07 13:06:11 -0500 | [diff] [blame] | 19 | #include <linux/acct.h>		/* acct_auto_close_mnt */ | 
 | 20 | #include <linux/ramfs.h>	/* init_rootfs */ | 
 | 21 | #include <linux/fs_struct.h>	/* get_fs_root et.al. */ | 
 | 22 | #include <linux/fsnotify.h>	/* fsnotify_vfsmount_delete */ | 
 | 23 | #include <linux/uaccess.h> | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 24 | #include <linux/proc_fs.h> | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 25 | #include "pnode.h" | 
| Adrian Bunk | 948730b | 2007-07-15 23:41:25 -0700 | [diff] [blame] | 26 | #include "internal.h" | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 27 |  | 
| Eric Dumazet | 13f14b4 | 2008-02-06 01:37:57 -0800 | [diff] [blame] | 28 | #define HASH_SHIFT ilog2(PAGE_SIZE / sizeof(struct list_head)) | 
 | 29 | #define HASH_SIZE (1UL << HASH_SHIFT) | 
 | 30 |  | 
| Al Viro | 5addc5d | 2005-11-07 17:15:49 -0500 | [diff] [blame] | 31 | static int event; | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 32 | static DEFINE_IDA(mnt_id_ida); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 33 | static DEFINE_IDA(mnt_group_ida); | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 34 | static DEFINE_SPINLOCK(mnt_id_lock); | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 35 | static int mnt_id_start = 0; | 
 | 36 | static int mnt_group_start = 1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 37 |  | 
| Eric Dumazet | fa3536c | 2006-03-26 01:37:24 -0800 | [diff] [blame] | 38 | static struct list_head *mount_hashtable __read_mostly; | 
| Christoph Lameter | e18b890 | 2006-12-06 20:33:20 -0800 | [diff] [blame] | 39 | static struct kmem_cache *mnt_cache __read_mostly; | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 40 | static struct rw_semaphore namespace_sem; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 41 |  | 
| Miklos Szeredi | f87fd4c | 2006-01-16 22:14:23 -0800 | [diff] [blame] | 42 | /* /sys/fs */ | 
| Greg Kroah-Hartman | 00d2666 | 2007-10-29 14:17:23 -0600 | [diff] [blame] | 43 | struct kobject *fs_kobj; | 
 | 44 | EXPORT_SYMBOL_GPL(fs_kobj); | 
| Miklos Szeredi | f87fd4c | 2006-01-16 22:14:23 -0800 | [diff] [blame] | 45 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 46 | /* | 
 | 47 |  * vfsmount lock may be taken for read to prevent changes to the | 
 | 48 |  * vfsmount hash, ie. during mountpoint lookups or walking back | 
 | 49 |  * up the tree. | 
 | 50 |  * | 
 | 51 |  * It should be taken for write in all cases where the vfsmount | 
 | 52 |  * tree or hash is modified or when a vfsmount structure is modified. | 
 | 53 |  */ | 
 | 54 | DEFINE_BRLOCK(vfsmount_lock); | 
 | 55 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 56 | static inline unsigned long hash(struct vfsmount *mnt, struct dentry *dentry) | 
 | 57 | { | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 58 | 	unsigned long tmp = ((unsigned long)mnt / L1_CACHE_BYTES); | 
 | 59 | 	tmp += ((unsigned long)dentry / L1_CACHE_BYTES); | 
| Eric Dumazet | 13f14b4 | 2008-02-06 01:37:57 -0800 | [diff] [blame] | 60 | 	tmp = tmp + (tmp >> HASH_SHIFT); | 
 | 61 | 	return tmp & (HASH_SIZE - 1); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 62 | } | 
 | 63 |  | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 64 | #define MNT_WRITER_UNDERFLOW_LIMIT -(1<<16) | 
 | 65 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 66 | /* | 
 | 67 |  * allocation is serialized by namespace_sem, but we need the spinlock to | 
 | 68 |  * serialize with freeing. | 
 | 69 |  */ | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 70 | static int mnt_alloc_id(struct mount *mnt) | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 71 | { | 
 | 72 | 	int res; | 
 | 73 |  | 
 | 74 | retry: | 
 | 75 | 	ida_pre_get(&mnt_id_ida, GFP_KERNEL); | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 76 | 	spin_lock(&mnt_id_lock); | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 77 | 	res = ida_get_new_above(&mnt_id_ida, mnt_id_start, &mnt->mnt_id); | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 78 | 	if (!res) | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 79 | 		mnt_id_start = mnt->mnt_id + 1; | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 80 | 	spin_unlock(&mnt_id_lock); | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 81 | 	if (res == -EAGAIN) | 
 | 82 | 		goto retry; | 
 | 83 |  | 
 | 84 | 	return res; | 
 | 85 | } | 
 | 86 |  | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 87 | static void mnt_free_id(struct mount *mnt) | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 88 | { | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 89 | 	int id = mnt->mnt_id; | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 90 | 	spin_lock(&mnt_id_lock); | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 91 | 	ida_remove(&mnt_id_ida, id); | 
 | 92 | 	if (mnt_id_start > id) | 
 | 93 | 		mnt_id_start = id; | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 94 | 	spin_unlock(&mnt_id_lock); | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 95 | } | 
 | 96 |  | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 97 | /* | 
 | 98 |  * Allocate a new peer group ID | 
 | 99 |  * | 
 | 100 |  * mnt_group_ida is protected by namespace_sem | 
 | 101 |  */ | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 102 | static int mnt_alloc_group_id(struct mount *mnt) | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 103 | { | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 104 | 	int res; | 
 | 105 |  | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 106 | 	if (!ida_pre_get(&mnt_group_ida, GFP_KERNEL)) | 
 | 107 | 		return -ENOMEM; | 
 | 108 |  | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 109 | 	res = ida_get_new_above(&mnt_group_ida, | 
 | 110 | 				mnt_group_start, | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 111 | 				&mnt->mnt_group_id); | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 112 | 	if (!res) | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 113 | 		mnt_group_start = mnt->mnt_group_id + 1; | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 114 |  | 
 | 115 | 	return res; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 116 | } | 
 | 117 |  | 
 | 118 | /* | 
 | 119 |  * Release a peer group ID | 
 | 120 |  */ | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 121 | void mnt_release_group_id(struct mount *mnt) | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 122 | { | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 123 | 	int id = mnt->mnt_group_id; | 
| Al Viro | f21f622 | 2009-06-24 03:12:00 -0400 | [diff] [blame] | 124 | 	ida_remove(&mnt_group_ida, id); | 
 | 125 | 	if (mnt_group_start > id) | 
 | 126 | 		mnt_group_start = id; | 
| Al Viro | 15169fe | 2011-11-25 00:50:41 -0500 | [diff] [blame] | 127 | 	mnt->mnt_group_id = 0; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 128 | } | 
 | 129 |  | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 130 | /* | 
 | 131 |  * vfsmount lock must be held for read | 
 | 132 |  */ | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 133 | static inline void mnt_add_count(struct mount *mnt, int n) | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 134 | { | 
 | 135 | #ifdef CONFIG_SMP | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 136 | 	this_cpu_add(mnt->mnt_pcp->mnt_count, n); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 137 | #else | 
 | 138 | 	preempt_disable(); | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 139 | 	mnt->mnt_count += n; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 140 | 	preempt_enable(); | 
 | 141 | #endif | 
 | 142 | } | 
 | 143 |  | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 144 | /* | 
 | 145 |  * vfsmount lock must be held for write | 
 | 146 |  */ | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 147 | unsigned int mnt_get_count(struct mount *mnt) | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 148 | { | 
 | 149 | #ifdef CONFIG_SMP | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 150 | 	unsigned int count = 0; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 151 | 	int cpu; | 
 | 152 |  | 
 | 153 | 	for_each_possible_cpu(cpu) { | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 154 | 		count += per_cpu_ptr(mnt->mnt_pcp, cpu)->mnt_count; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 155 | 	} | 
 | 156 |  | 
 | 157 | 	return count; | 
 | 158 | #else | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 159 | 	return mnt->mnt_count; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 160 | #endif | 
 | 161 | } | 
 | 162 |  | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 163 | static struct mount *alloc_vfsmnt(const char *name) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 164 | { | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 165 | 	struct mount *mnt = kmem_cache_zalloc(mnt_cache, GFP_KERNEL); | 
 | 166 | 	if (mnt) { | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 167 | 		int err; | 
 | 168 |  | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 169 | 		err = mnt_alloc_id(mnt); | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 170 | 		if (err) | 
 | 171 | 			goto out_free_cache; | 
 | 172 |  | 
 | 173 | 		if (name) { | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 174 | 			mnt->mnt_devname = kstrdup(name, GFP_KERNEL); | 
 | 175 | 			if (!mnt->mnt_devname) | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 176 | 				goto out_free_id; | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 177 | 		} | 
 | 178 |  | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 179 | #ifdef CONFIG_SMP | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 180 | 		mnt->mnt_pcp = alloc_percpu(struct mnt_pcp); | 
 | 181 | 		if (!mnt->mnt_pcp) | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 182 | 			goto out_free_devname; | 
 | 183 |  | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 184 | 		this_cpu_add(mnt->mnt_pcp->mnt_count, 1); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 185 | #else | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 186 | 		mnt->mnt_count = 1; | 
 | 187 | 		mnt->mnt_writers = 0; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 188 | #endif | 
 | 189 |  | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 190 | 		INIT_LIST_HEAD(&mnt->mnt_hash); | 
 | 191 | 		INIT_LIST_HEAD(&mnt->mnt_child); | 
 | 192 | 		INIT_LIST_HEAD(&mnt->mnt_mounts); | 
 | 193 | 		INIT_LIST_HEAD(&mnt->mnt_list); | 
 | 194 | 		INIT_LIST_HEAD(&mnt->mnt_expire); | 
 | 195 | 		INIT_LIST_HEAD(&mnt->mnt_share); | 
 | 196 | 		INIT_LIST_HEAD(&mnt->mnt_slave_list); | 
 | 197 | 		INIT_LIST_HEAD(&mnt->mnt_slave); | 
| Andreas Gruenbacher | 2504c5d | 2009-12-17 21:24:27 -0500 | [diff] [blame] | 198 | #ifdef CONFIG_FSNOTIFY | 
 | 199 | 		INIT_HLIST_HEAD(&mnt->mnt_fsnotify_marks); | 
 | 200 | #endif | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 201 | 	} | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 202 | 	return mnt; | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 203 |  | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 204 | #ifdef CONFIG_SMP | 
 | 205 | out_free_devname: | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 206 | 	kfree(mnt->mnt_devname); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 207 | #endif | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 208 | out_free_id: | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 209 | 	mnt_free_id(mnt); | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 210 | out_free_cache: | 
| Al Viro | c63181e | 2011-11-25 02:35:16 -0500 | [diff] [blame] | 211 | 	kmem_cache_free(mnt_cache, mnt); | 
| Li Zefan | 88b3878 | 2008-07-21 18:06:36 +0800 | [diff] [blame] | 212 | 	return NULL; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 213 | } | 
 | 214 |  | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 215 | /* | 
 | 216 |  * Most r/o checks on a fs are for operations that take | 
 | 217 |  * discrete amounts of time, like a write() or unlink(). | 
 | 218 |  * We must keep track of when those operations start | 
 | 219 |  * (for permission checks) and when they end, so that | 
 | 220 |  * we can determine when writes are able to occur to | 
 | 221 |  * a filesystem. | 
 | 222 |  */ | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 223 | /* | 
 | 224 |  * __mnt_is_readonly: check whether a mount is read-only | 
 | 225 |  * @mnt: the mount to check for its write status | 
 | 226 |  * | 
 | 227 |  * This shouldn't be used directly ouside of the VFS. | 
 | 228 |  * It does not guarantee that the filesystem will stay | 
 | 229 |  * r/w, just that it is right *now*.  This can not and | 
 | 230 |  * should not be used in place of IS_RDONLY(inode). | 
 | 231 |  * mnt_want/drop_write() will _keep_ the filesystem | 
 | 232 |  * r/w. | 
 | 233 |  */ | 
 | 234 | int __mnt_is_readonly(struct vfsmount *mnt) | 
 | 235 | { | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 236 | 	if (mnt->mnt_flags & MNT_READONLY) | 
 | 237 | 		return 1; | 
 | 238 | 	if (mnt->mnt_sb->s_flags & MS_RDONLY) | 
 | 239 | 		return 1; | 
 | 240 | 	return 0; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 241 | } | 
 | 242 | EXPORT_SYMBOL_GPL(__mnt_is_readonly); | 
 | 243 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 244 | static inline void mnt_inc_writers(struct mount *mnt) | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 245 | { | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 246 | #ifdef CONFIG_SMP | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 247 | 	this_cpu_inc(mnt->mnt_pcp->mnt_writers); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 248 | #else | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 249 | 	mnt->mnt_writers++; | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 250 | #endif | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 251 | } | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 252 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 253 | static inline void mnt_dec_writers(struct mount *mnt) | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 254 | { | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 255 | #ifdef CONFIG_SMP | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 256 | 	this_cpu_dec(mnt->mnt_pcp->mnt_writers); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 257 | #else | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 258 | 	mnt->mnt_writers--; | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 259 | #endif | 
 | 260 | } | 
 | 261 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 262 | static unsigned int mnt_get_writers(struct mount *mnt) | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 263 | { | 
 | 264 | #ifdef CONFIG_SMP | 
 | 265 | 	unsigned int count = 0; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 266 | 	int cpu; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 267 |  | 
 | 268 | 	for_each_possible_cpu(cpu) { | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 269 | 		count += per_cpu_ptr(mnt->mnt_pcp, cpu)->mnt_writers; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 270 | 	} | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 271 |  | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 272 | 	return count; | 
 | 273 | #else | 
 | 274 | 	return mnt->mnt_writers; | 
 | 275 | #endif | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 276 | } | 
 | 277 |  | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 278 | static int mnt_is_readonly(struct vfsmount *mnt) | 
 | 279 | { | 
 | 280 | 	if (mnt->mnt_sb->s_readonly_remount) | 
 | 281 | 		return 1; | 
 | 282 | 	/* Order wrt setting s_flags/s_readonly_remount in do_remount() */ | 
 | 283 | 	smp_rmb(); | 
 | 284 | 	return __mnt_is_readonly(mnt); | 
 | 285 | } | 
 | 286 |  | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 287 | /* | 
 | 288 |  * Most r/o checks on a fs are for operations that take | 
 | 289 |  * discrete amounts of time, like a write() or unlink(). | 
 | 290 |  * We must keep track of when those operations start | 
 | 291 |  * (for permission checks) and when they end, so that | 
 | 292 |  * we can determine when writes are able to occur to | 
 | 293 |  * a filesystem. | 
 | 294 |  */ | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 295 | /** | 
 | 296 |  * mnt_want_write - get write access to a mount | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 297 |  * @m: the mount on which to take a write | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 298 |  * | 
 | 299 |  * This tells the low-level filesystem that a write is | 
 | 300 |  * about to be performed to it, and makes sure that | 
 | 301 |  * writes are allowed before returning success.  When | 
 | 302 |  * the write operation is finished, mnt_drop_write() | 
 | 303 |  * must be called.  This is effectively a refcount. | 
 | 304 |  */ | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 305 | int mnt_want_write(struct vfsmount *m) | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 306 | { | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 307 | 	struct mount *mnt = real_mount(m); | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 308 | 	int ret = 0; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 309 |  | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 310 | 	preempt_disable(); | 
| Nick Piggin | c6653a8 | 2011-01-07 17:50:10 +1100 | [diff] [blame] | 311 | 	mnt_inc_writers(mnt); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 312 | 	/* | 
| Nick Piggin | c6653a8 | 2011-01-07 17:50:10 +1100 | [diff] [blame] | 313 | 	 * The store to mnt_inc_writers must be visible before we pass | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 314 | 	 * MNT_WRITE_HOLD loop below, so that the slowpath can see our | 
 | 315 | 	 * incremented count after it has set MNT_WRITE_HOLD. | 
 | 316 | 	 */ | 
 | 317 | 	smp_mb(); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 318 | 	while (mnt->mnt.mnt_flags & MNT_WRITE_HOLD) | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 319 | 		cpu_relax(); | 
 | 320 | 	/* | 
 | 321 | 	 * After the slowpath clears MNT_WRITE_HOLD, mnt_is_readonly will | 
 | 322 | 	 * be set to match its requirements. So we must not load that until | 
 | 323 | 	 * MNT_WRITE_HOLD is cleared. | 
 | 324 | 	 */ | 
 | 325 | 	smp_rmb(); | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 326 | 	if (mnt_is_readonly(m)) { | 
| Nick Piggin | c6653a8 | 2011-01-07 17:50:10 +1100 | [diff] [blame] | 327 | 		mnt_dec_writers(mnt); | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 328 | 		ret = -EROFS; | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 329 | 	} | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 330 | 	preempt_enable(); | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 331 | 	return ret; | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 332 | } | 
 | 333 | EXPORT_SYMBOL_GPL(mnt_want_write); | 
 | 334 |  | 
 | 335 | /** | 
| npiggin@suse.de | 96029c4 | 2009-04-26 20:25:55 +1000 | [diff] [blame] | 336 |  * mnt_clone_write - get write access to a mount | 
 | 337 |  * @mnt: the mount on which to take a write | 
 | 338 |  * | 
 | 339 |  * This is effectively like mnt_want_write, except | 
 | 340 |  * it must only be used to take an extra write reference | 
 | 341 |  * on a mountpoint that we already know has a write reference | 
 | 342 |  * on it. This allows some optimisation. | 
 | 343 |  * | 
 | 344 |  * After finished, mnt_drop_write must be called as usual to | 
 | 345 |  * drop the reference. | 
 | 346 |  */ | 
 | 347 | int mnt_clone_write(struct vfsmount *mnt) | 
 | 348 | { | 
 | 349 | 	/* superblock may be r/o */ | 
 | 350 | 	if (__mnt_is_readonly(mnt)) | 
 | 351 | 		return -EROFS; | 
 | 352 | 	preempt_disable(); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 353 | 	mnt_inc_writers(real_mount(mnt)); | 
| npiggin@suse.de | 96029c4 | 2009-04-26 20:25:55 +1000 | [diff] [blame] | 354 | 	preempt_enable(); | 
 | 355 | 	return 0; | 
 | 356 | } | 
 | 357 | EXPORT_SYMBOL_GPL(mnt_clone_write); | 
 | 358 |  | 
 | 359 | /** | 
 | 360 |  * mnt_want_write_file - get write access to a file's mount | 
 | 361 |  * @file: the file who's mount on which to take a write | 
 | 362 |  * | 
 | 363 |  * This is like mnt_want_write, but it takes a file and can | 
 | 364 |  * do some optimisations if the file is open for write already | 
 | 365 |  */ | 
 | 366 | int mnt_want_write_file(struct file *file) | 
 | 367 | { | 
| OGAWA Hirofumi | 2d8dd38 | 2009-08-06 15:07:39 -0700 | [diff] [blame] | 368 | 	struct inode *inode = file->f_dentry->d_inode; | 
 | 369 | 	if (!(file->f_mode & FMODE_WRITE) || special_file(inode->i_mode)) | 
| npiggin@suse.de | 96029c4 | 2009-04-26 20:25:55 +1000 | [diff] [blame] | 370 | 		return mnt_want_write(file->f_path.mnt); | 
 | 371 | 	else | 
 | 372 | 		return mnt_clone_write(file->f_path.mnt); | 
 | 373 | } | 
 | 374 | EXPORT_SYMBOL_GPL(mnt_want_write_file); | 
 | 375 |  | 
 | 376 | /** | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 377 |  * mnt_drop_write - give up write access to a mount | 
 | 378 |  * @mnt: the mount on which to give up write access | 
 | 379 |  * | 
 | 380 |  * Tells the low-level filesystem that we are done | 
 | 381 |  * performing writes to it.  Must be matched with | 
 | 382 |  * mnt_want_write() call above. | 
 | 383 |  */ | 
 | 384 | void mnt_drop_write(struct vfsmount *mnt) | 
 | 385 | { | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 386 | 	preempt_disable(); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 387 | 	mnt_dec_writers(real_mount(mnt)); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 388 | 	preempt_enable(); | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 389 | } | 
 | 390 | EXPORT_SYMBOL_GPL(mnt_drop_write); | 
 | 391 |  | 
| Al Viro | 2a79f17 | 2011-12-09 08:06:57 -0500 | [diff] [blame] | 392 | void mnt_drop_write_file(struct file *file) | 
 | 393 | { | 
 | 394 | 	mnt_drop_write(file->f_path.mnt); | 
 | 395 | } | 
 | 396 | EXPORT_SYMBOL(mnt_drop_write_file); | 
 | 397 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 398 | static int mnt_make_readonly(struct mount *mnt) | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 399 | { | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 400 | 	int ret = 0; | 
 | 401 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 402 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 403 | 	mnt->mnt.mnt_flags |= MNT_WRITE_HOLD; | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 404 | 	/* | 
 | 405 | 	 * After storing MNT_WRITE_HOLD, we'll read the counters. This store | 
 | 406 | 	 * should be visible before we do. | 
 | 407 | 	 */ | 
 | 408 | 	smp_mb(); | 
 | 409 |  | 
 | 410 | 	/* | 
 | 411 | 	 * With writers on hold, if this value is zero, then there are | 
 | 412 | 	 * definitely no active writers (although held writers may subsequently | 
 | 413 | 	 * increment the count, they'll have to wait, and decrement it after | 
 | 414 | 	 * seeing MNT_READONLY). | 
 | 415 | 	 * | 
 | 416 | 	 * It is OK to have counter incremented on one CPU and decremented on | 
 | 417 | 	 * another: the sum will add up correctly. The danger would be when we | 
 | 418 | 	 * sum up each counter, if we read a counter before it is incremented, | 
 | 419 | 	 * but then read another CPU's count which it has been subsequently | 
 | 420 | 	 * decremented from -- we would see more decrements than we should. | 
 | 421 | 	 * MNT_WRITE_HOLD protects against this scenario, because | 
 | 422 | 	 * mnt_want_write first increments count, then smp_mb, then spins on | 
 | 423 | 	 * MNT_WRITE_HOLD, so it can't be decremented by another CPU while | 
 | 424 | 	 * we're counting up here. | 
 | 425 | 	 */ | 
| Nick Piggin | c6653a8 | 2011-01-07 17:50:10 +1100 | [diff] [blame] | 426 | 	if (mnt_get_writers(mnt) > 0) | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 427 | 		ret = -EBUSY; | 
 | 428 | 	else | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 429 | 		mnt->mnt.mnt_flags |= MNT_READONLY; | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 430 | 	/* | 
 | 431 | 	 * MNT_READONLY must become visible before ~MNT_WRITE_HOLD, so writers | 
 | 432 | 	 * that become unheld will see MNT_READONLY. | 
 | 433 | 	 */ | 
 | 434 | 	smp_wmb(); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 435 | 	mnt->mnt.mnt_flags &= ~MNT_WRITE_HOLD; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 436 | 	br_write_unlock(&vfsmount_lock); | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 437 | 	return ret; | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 438 | } | 
| Dave Hansen | 8366025 | 2008-02-15 14:37:30 -0800 | [diff] [blame] | 439 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 440 | static void __mnt_unmake_readonly(struct mount *mnt) | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 441 | { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 442 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 443 | 	mnt->mnt.mnt_flags &= ~MNT_READONLY; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 444 | 	br_write_unlock(&vfsmount_lock); | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 445 | } | 
 | 446 |  | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 447 | int sb_prepare_remount_readonly(struct super_block *sb) | 
 | 448 | { | 
 | 449 | 	struct mount *mnt; | 
 | 450 | 	int err = 0; | 
 | 451 |  | 
| Miklos Szeredi | 8e8b879 | 2011-11-21 12:11:33 +0100 | [diff] [blame] | 452 | 	/* Racy optimization.  Recheck the counter under MNT_WRITE_HOLD */ | 
 | 453 | 	if (atomic_long_read(&sb->s_remove_count)) | 
 | 454 | 		return -EBUSY; | 
 | 455 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 456 | 	br_write_lock(&vfsmount_lock); | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 457 | 	list_for_each_entry(mnt, &sb->s_mounts, mnt_instance) { | 
 | 458 | 		if (!(mnt->mnt.mnt_flags & MNT_READONLY)) { | 
 | 459 | 			mnt->mnt.mnt_flags |= MNT_WRITE_HOLD; | 
 | 460 | 			smp_mb(); | 
 | 461 | 			if (mnt_get_writers(mnt) > 0) { | 
 | 462 | 				err = -EBUSY; | 
 | 463 | 				break; | 
 | 464 | 			} | 
 | 465 | 		} | 
 | 466 | 	} | 
| Miklos Szeredi | 8e8b879 | 2011-11-21 12:11:33 +0100 | [diff] [blame] | 467 | 	if (!err && atomic_long_read(&sb->s_remove_count)) | 
 | 468 | 		err = -EBUSY; | 
 | 469 |  | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 470 | 	if (!err) { | 
 | 471 | 		sb->s_readonly_remount = 1; | 
 | 472 | 		smp_wmb(); | 
 | 473 | 	} | 
 | 474 | 	list_for_each_entry(mnt, &sb->s_mounts, mnt_instance) { | 
 | 475 | 		if (mnt->mnt.mnt_flags & MNT_WRITE_HOLD) | 
 | 476 | 			mnt->mnt.mnt_flags &= ~MNT_WRITE_HOLD; | 
 | 477 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 478 | 	br_write_unlock(&vfsmount_lock); | 
| Miklos Szeredi | 4ed5e82 | 2011-11-21 12:11:31 +0100 | [diff] [blame] | 479 |  | 
 | 480 | 	return err; | 
 | 481 | } | 
 | 482 |  | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 483 | static void free_vfsmnt(struct mount *mnt) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 484 | { | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 485 | 	kfree(mnt->mnt.data); | 
| Al Viro | 52ba162 | 2011-11-25 02:25:17 -0500 | [diff] [blame] | 486 | 	kfree(mnt->mnt_devname); | 
| Miklos Szeredi | 73cd49e | 2008-03-26 22:11:34 +0100 | [diff] [blame] | 487 | 	mnt_free_id(mnt); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 488 | #ifdef CONFIG_SMP | 
| Al Viro | 68e8a9f | 2011-11-24 22:53:09 -0500 | [diff] [blame] | 489 | 	free_percpu(mnt->mnt_pcp); | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 490 | #endif | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 491 | 	kmem_cache_free(mnt_cache, mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 492 | } | 
 | 493 |  | 
 | 494 | /* | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 495 |  * find the first or last mount at @dentry on vfsmount @mnt depending on | 
 | 496 |  * @dir. If @dir is set return the first mount else return the last mount. | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 497 |  * vfsmount_lock must be held for read or write. | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 498 |  */ | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 499 | struct mount *__lookup_mnt(struct vfsmount *mnt, struct dentry *dentry, | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 500 | 			      int dir) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 501 | { | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 502 | 	struct list_head *head = mount_hashtable + hash(mnt, dentry); | 
 | 503 | 	struct list_head *tmp = head; | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 504 | 	struct mount *p, *found = NULL; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 505 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 506 | 	for (;;) { | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 507 | 		tmp = dir ? tmp->next : tmp->prev; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 508 | 		p = NULL; | 
 | 509 | 		if (tmp == head) | 
 | 510 | 			break; | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 511 | 		p = list_entry(tmp, struct mount, mnt_hash); | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 512 | 		if (&p->mnt_parent->mnt == mnt && p->mnt_mountpoint == dentry) { | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 513 | 			found = p; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 514 | 			break; | 
 | 515 | 		} | 
 | 516 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 517 | 	return found; | 
 | 518 | } | 
 | 519 |  | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 520 | /* | 
| David Howells | 105a0cd | 2012-06-25 12:55:28 +0100 | [diff] [blame] | 521 |  * lookup_mnt - Return the first child mount mounted at path | 
 | 522 |  * | 
 | 523 |  * "First" means first mounted chronologically.  If you create the | 
 | 524 |  * following mounts: | 
 | 525 |  * | 
 | 526 |  * mount /dev/sda1 /mnt | 
 | 527 |  * mount /dev/sda2 /mnt | 
 | 528 |  * mount /dev/sda3 /mnt | 
 | 529 |  * | 
 | 530 |  * Then lookup_mnt() on the base /mnt dentry in the root mount will | 
 | 531 |  * return successively the root dentry and vfsmount of /dev/sda1, then | 
 | 532 |  * /dev/sda2, then /dev/sda3, then NULL. | 
 | 533 |  * | 
 | 534 |  * lookup_mnt takes a reference to the found vfsmount. | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 535 |  */ | 
| Al Viro | 1c755af | 2009-04-18 14:06:57 -0400 | [diff] [blame] | 536 | struct vfsmount *lookup_mnt(struct path *path) | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 537 | { | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 538 | 	struct mount *child_mnt; | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 539 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 540 | 	br_read_lock(&vfsmount_lock); | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 541 | 	child_mnt = __lookup_mnt(path->mnt, path->dentry, 1); | 
 | 542 | 	if (child_mnt) { | 
 | 543 | 		mnt_add_count(child_mnt, 1); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 544 | 		br_read_unlock(&vfsmount_lock); | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 545 | 		return &child_mnt->mnt; | 
 | 546 | 	} else { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 547 | 		br_read_unlock(&vfsmount_lock); | 
| Al Viro | c710536 | 2011-11-24 18:22:03 -0500 | [diff] [blame] | 548 | 		return NULL; | 
 | 549 | 	} | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 550 | } | 
 | 551 |  | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 552 | static inline int check_mnt(struct mount *mnt) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 553 | { | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 554 | 	return mnt->mnt_ns == current->nsproxy->mnt_ns; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 555 | } | 
 | 556 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 557 | /* | 
 | 558 |  * vfsmount lock must be held for write | 
 | 559 |  */ | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 560 | static void touch_mnt_namespace(struct mnt_namespace *ns) | 
| Al Viro | 5addc5d | 2005-11-07 17:15:49 -0500 | [diff] [blame] | 561 | { | 
 | 562 | 	if (ns) { | 
 | 563 | 		ns->event = ++event; | 
 | 564 | 		wake_up_interruptible(&ns->poll); | 
 | 565 | 	} | 
 | 566 | } | 
 | 567 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 568 | /* | 
 | 569 |  * vfsmount lock must be held for write | 
 | 570 |  */ | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 571 | static void __touch_mnt_namespace(struct mnt_namespace *ns) | 
| Al Viro | 5addc5d | 2005-11-07 17:15:49 -0500 | [diff] [blame] | 572 | { | 
 | 573 | 	if (ns && ns->event != event) { | 
 | 574 | 		ns->event = event; | 
 | 575 | 		wake_up_interruptible(&ns->poll); | 
 | 576 | 	} | 
 | 577 | } | 
 | 578 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 579 | /* | 
| Nick Piggin | 5f57cbc | 2011-01-07 17:49:54 +1100 | [diff] [blame] | 580 |  * Clear dentry's mounted state if it has no remaining mounts. | 
 | 581 |  * vfsmount_lock must be held for write. | 
 | 582 |  */ | 
| Al Viro | aa0a4cf | 2011-11-24 19:31:36 -0500 | [diff] [blame] | 583 | static void dentry_reset_mounted(struct dentry *dentry) | 
| Nick Piggin | 5f57cbc | 2011-01-07 17:49:54 +1100 | [diff] [blame] | 584 | { | 
 | 585 | 	unsigned u; | 
 | 586 |  | 
 | 587 | 	for (u = 0; u < HASH_SIZE; u++) { | 
| Al Viro | d5e50f7 | 2011-11-24 20:58:57 -0500 | [diff] [blame] | 588 | 		struct mount *p; | 
| Nick Piggin | 5f57cbc | 2011-01-07 17:49:54 +1100 | [diff] [blame] | 589 |  | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 590 | 		list_for_each_entry(p, &mount_hashtable[u], mnt_hash) { | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 591 | 			if (p->mnt_mountpoint == dentry) | 
| Nick Piggin | 5f57cbc | 2011-01-07 17:49:54 +1100 | [diff] [blame] | 592 | 				return; | 
 | 593 | 		} | 
 | 594 | 	} | 
 | 595 | 	spin_lock(&dentry->d_lock); | 
 | 596 | 	dentry->d_flags &= ~DCACHE_MOUNTED; | 
 | 597 | 	spin_unlock(&dentry->d_lock); | 
 | 598 | } | 
 | 599 |  | 
 | 600 | /* | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 601 |  * vfsmount lock must be held for write | 
 | 602 |  */ | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 603 | static void detach_mnt(struct mount *mnt, struct path *old_path) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 604 | { | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 605 | 	old_path->dentry = mnt->mnt_mountpoint; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 606 | 	old_path->mnt = &mnt->mnt_parent->mnt; | 
 | 607 | 	mnt->mnt_parent = mnt; | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 608 | 	mnt->mnt_mountpoint = mnt->mnt.mnt_root; | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 609 | 	list_del_init(&mnt->mnt_child); | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 610 | 	list_del_init(&mnt->mnt_hash); | 
| Al Viro | aa0a4cf | 2011-11-24 19:31:36 -0500 | [diff] [blame] | 611 | 	dentry_reset_mounted(old_path->dentry); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 612 | } | 
 | 613 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 614 | /* | 
 | 615 |  * vfsmount lock must be held for write | 
 | 616 |  */ | 
| Al Viro | 14cf1fa | 2011-11-25 00:01:17 -0500 | [diff] [blame] | 617 | void mnt_set_mountpoint(struct mount *mnt, struct dentry *dentry, | 
| Al Viro | 44d964d6 | 2011-11-24 21:28:22 -0500 | [diff] [blame] | 618 | 			struct mount *child_mnt) | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 619 | { | 
| Al Viro | 3a2393d | 2011-11-25 03:19:09 -0500 | [diff] [blame] | 620 | 	mnt_add_count(mnt, 1);	/* essentially, that's mntget */ | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 621 | 	child_mnt->mnt_mountpoint = dget(dentry); | 
| Al Viro | 3a2393d | 2011-11-25 03:19:09 -0500 | [diff] [blame] | 622 | 	child_mnt->mnt_parent = mnt; | 
| Nick Piggin | 5f57cbc | 2011-01-07 17:49:54 +1100 | [diff] [blame] | 623 | 	spin_lock(&dentry->d_lock); | 
 | 624 | 	dentry->d_flags |= DCACHE_MOUNTED; | 
 | 625 | 	spin_unlock(&dentry->d_lock); | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 626 | } | 
 | 627 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 628 | /* | 
 | 629 |  * vfsmount lock must be held for write | 
 | 630 |  */ | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 631 | static void attach_mnt(struct mount *mnt, struct path *path) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 632 | { | 
| Al Viro | 14cf1fa | 2011-11-25 00:01:17 -0500 | [diff] [blame] | 633 | 	mnt_set_mountpoint(real_mount(path->mnt), path->dentry, mnt); | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 634 | 	list_add_tail(&mnt->mnt_hash, mount_hashtable + | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 635 | 			hash(path->mnt, path->dentry)); | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 636 | 	list_add_tail(&mnt->mnt_child, &real_mount(path->mnt)->mnt_mounts); | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 637 | } | 
 | 638 |  | 
 | 639 | /* | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 640 |  * vfsmount lock must be held for write | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 641 |  */ | 
| Al Viro | 4b2619a | 2011-11-24 19:47:15 -0500 | [diff] [blame] | 642 | static void commit_tree(struct mount *mnt) | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 643 | { | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 644 | 	struct mount *parent = mnt->mnt_parent; | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 645 | 	struct mount *m; | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 646 | 	LIST_HEAD(head); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 647 | 	struct mnt_namespace *n = parent->mnt_ns; | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 648 |  | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 649 | 	BUG_ON(parent == mnt); | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 650 |  | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 651 | 	list_add_tail(&head, &mnt->mnt_list); | 
| Al Viro | d9eb504 | 2012-06-09 00:59:08 -0400 | [diff] [blame] | 652 | 	list_for_each_entry(m, &head, mnt_list) | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 653 | 		m->mnt_ns = n; | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 654 |  | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 655 | 	list_splice(&head, n->list.prev); | 
 | 656 |  | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 657 | 	list_add_tail(&mnt->mnt_hash, mount_hashtable + | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 658 | 				hash(&parent->mnt, mnt->mnt_mountpoint)); | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 659 | 	list_add_tail(&mnt->mnt_child, &parent->mnt_mounts); | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 660 | 	touch_mnt_namespace(n); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 661 | } | 
 | 662 |  | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 663 | static struct mount *next_mnt(struct mount *p, struct mount *root) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 664 | { | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 665 | 	struct list_head *next = p->mnt_mounts.next; | 
 | 666 | 	if (next == &p->mnt_mounts) { | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 667 | 		while (1) { | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 668 | 			if (p == root) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 669 | 				return NULL; | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 670 | 			next = p->mnt_child.next; | 
 | 671 | 			if (next != &p->mnt_parent->mnt_mounts) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 672 | 				break; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 673 | 			p = p->mnt_parent; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 674 | 		} | 
 | 675 | 	} | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 676 | 	return list_entry(next, struct mount, mnt_child); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 677 | } | 
 | 678 |  | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 679 | static struct mount *skip_mnt_tree(struct mount *p) | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 680 | { | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 681 | 	struct list_head *prev = p->mnt_mounts.prev; | 
 | 682 | 	while (prev != &p->mnt_mounts) { | 
 | 683 | 		p = list_entry(prev, struct mount, mnt_child); | 
 | 684 | 		prev = p->mnt_mounts.prev; | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 685 | 	} | 
 | 686 | 	return p; | 
 | 687 | } | 
 | 688 |  | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 689 | struct vfsmount * | 
 | 690 | vfs_kern_mount(struct file_system_type *type, int flags, const char *name, void *data) | 
 | 691 | { | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 692 | 	struct mount *mnt; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 693 | 	struct dentry *root; | 
 | 694 |  | 
 | 695 | 	if (!type) | 
 | 696 | 		return ERR_PTR(-ENODEV); | 
 | 697 |  | 
 | 698 | 	mnt = alloc_vfsmnt(name); | 
 | 699 | 	if (!mnt) | 
 | 700 | 		return ERR_PTR(-ENOMEM); | 
 | 701 |  | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 702 | 	mnt->mnt.data = NULL; | 
 | 703 | 	if (type->alloc_mnt_data) { | 
 | 704 | 		mnt->mnt.data = type->alloc_mnt_data(); | 
 | 705 | 		if (!mnt->mnt.data) { | 
 | 706 | 			mnt_free_id(mnt); | 
 | 707 | 			free_vfsmnt(mnt); | 
 | 708 | 			return ERR_PTR(-ENOMEM); | 
 | 709 | 		} | 
 | 710 | 	} | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 711 | 	if (flags & MS_KERNMOUNT) | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 712 | 		mnt->mnt.mnt_flags = MNT_INTERNAL; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 713 |  | 
 | 714 | 	root = mount_fs(type, flags, name, data); | 
 | 715 | 	if (IS_ERR(root)) { | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 716 | 		kfree(mnt->mnt.data); | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 717 | 		free_vfsmnt(mnt); | 
 | 718 | 		return ERR_CAST(root); | 
 | 719 | 	} | 
 | 720 |  | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 721 | 	mnt->mnt.mnt_root = root; | 
 | 722 | 	mnt->mnt.mnt_sb = root->d_sb; | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 723 | 	mnt->mnt_mountpoint = mnt->mnt.mnt_root; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 724 | 	mnt->mnt_parent = mnt; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 725 | 	br_write_lock(&vfsmount_lock); | 
| Miklos Szeredi | 39f7c4d | 2011-11-21 12:11:30 +0100 | [diff] [blame] | 726 | 	list_add_tail(&mnt->mnt_instance, &root->d_sb->s_mounts); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 727 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | b105e27 | 2011-11-24 20:38:33 -0500 | [diff] [blame] | 728 | 	return &mnt->mnt; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 729 | } | 
 | 730 | EXPORT_SYMBOL_GPL(vfs_kern_mount); | 
 | 731 |  | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 732 | static struct mount *clone_mnt(struct mount *old, struct dentry *root, | 
| Ram Pai | 36341f6 | 2005-11-07 17:17:22 -0500 | [diff] [blame] | 733 | 					int flag) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 734 | { | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 735 | 	struct super_block *sb = old->mnt.mnt_sb; | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 736 | 	struct mount *mnt; | 
 | 737 | 	int err; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 738 |  | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 739 | 	mnt = alloc_vfsmnt(old->mnt_devname); | 
 | 740 | 	if (!mnt) | 
 | 741 | 		return ERR_PTR(-ENOMEM); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 742 |  | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 743 | 	if (sb->s_op->clone_mnt_data) { | 
 | 744 | 		mnt->mnt.data = sb->s_op->clone_mnt_data(old->mnt.data); | 
 | 745 | 		if (!mnt->mnt.data) { | 
 | 746 | 			goto out_free; | 
 | 747 | 		} | 
 | 748 | 	} | 
 | 749 |  | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 750 | 	if (flag & (CL_SLAVE | CL_PRIVATE)) | 
 | 751 | 		mnt->mnt_group_id = 0; /* not a peer of original */ | 
 | 752 | 	else | 
 | 753 | 		mnt->mnt_group_id = old->mnt_group_id; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 754 |  | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 755 | 	if ((flag & CL_MAKE_SHARED) && !mnt->mnt_group_id) { | 
 | 756 | 		err = mnt_alloc_group_id(mnt); | 
 | 757 | 		if (err) | 
 | 758 | 			goto out_free; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 759 | 	} | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 760 |  | 
 | 761 | 	mnt->mnt.mnt_flags = old->mnt.mnt_flags & ~MNT_WRITE_HOLD; | 
 | 762 | 	atomic_inc(&sb->s_active); | 
 | 763 | 	mnt->mnt.mnt_sb = sb; | 
 | 764 | 	mnt->mnt.mnt_root = dget(root); | 
 | 765 | 	mnt->mnt_mountpoint = mnt->mnt.mnt_root; | 
 | 766 | 	mnt->mnt_parent = mnt; | 
 | 767 | 	br_write_lock(&vfsmount_lock); | 
 | 768 | 	list_add_tail(&mnt->mnt_instance, &sb->s_mounts); | 
 | 769 | 	br_write_unlock(&vfsmount_lock); | 
 | 770 |  | 
 | 771 | 	if (flag & CL_SLAVE) { | 
 | 772 | 		list_add(&mnt->mnt_slave, &old->mnt_slave_list); | 
 | 773 | 		mnt->mnt_master = old; | 
 | 774 | 		CLEAR_MNT_SHARED(mnt); | 
 | 775 | 	} else if (!(flag & CL_PRIVATE)) { | 
 | 776 | 		if ((flag & CL_MAKE_SHARED) || IS_MNT_SHARED(old)) | 
 | 777 | 			list_add(&mnt->mnt_share, &old->mnt_share); | 
 | 778 | 		if (IS_MNT_SLAVE(old)) | 
 | 779 | 			list_add(&mnt->mnt_slave, &old->mnt_slave); | 
 | 780 | 		mnt->mnt_master = old->mnt_master; | 
 | 781 | 	} | 
 | 782 | 	if (flag & CL_MAKE_SHARED) | 
 | 783 | 		set_mnt_shared(mnt); | 
 | 784 |  | 
 | 785 | 	/* stick the duplicate mount on the same expiry list | 
 | 786 | 	 * as the original if that was on one */ | 
 | 787 | 	if (flag & CL_EXPIRE) { | 
 | 788 | 		if (!list_empty(&old->mnt_expire)) | 
 | 789 | 			list_add(&mnt->mnt_expire, &old->mnt_expire); | 
 | 790 | 	} | 
 | 791 |  | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 792 | 	return mnt; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 793 |  | 
 | 794 |  out_free: | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 795 | 	kfree(mnt->mnt.data); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 796 | 	free_vfsmnt(mnt); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 797 | 	return ERR_PTR(err); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 798 | } | 
 | 799 |  | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 800 | static inline void mntfree(struct mount *mnt) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 801 | { | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 802 | 	struct vfsmount *m = &mnt->mnt; | 
 | 803 | 	struct super_block *sb = m->mnt_sb; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 804 |  | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 805 | 	/* | 
| Dave Hansen | 3d73363 | 2008-02-15 14:37:59 -0800 | [diff] [blame] | 806 | 	 * This probably indicates that somebody messed | 
 | 807 | 	 * up a mnt_want/drop_write() pair.  If this | 
 | 808 | 	 * happens, the filesystem was probably unable | 
 | 809 | 	 * to make r/w->r/o transitions. | 
 | 810 | 	 */ | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 811 | 	/* | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 812 | 	 * The locking used to deal with mnt_count decrement provides barriers, | 
 | 813 | 	 * so mnt_get_writers() below is safe. | 
| npiggin@suse.de | d3ef3d7 | 2009-04-26 20:25:54 +1000 | [diff] [blame] | 814 | 	 */ | 
| Nick Piggin | c6653a8 | 2011-01-07 17:50:10 +1100 | [diff] [blame] | 815 | 	WARN_ON(mnt_get_writers(mnt)); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 816 | 	fsnotify_vfsmount_delete(m); | 
 | 817 | 	dput(m->mnt_root); | 
 | 818 | 	free_vfsmnt(mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 819 | 	deactivate_super(sb); | 
 | 820 | } | 
 | 821 |  | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 822 | static void mntput_no_expire(struct mount *mnt) | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 823 | { | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 824 | put_again: | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 825 | #ifdef CONFIG_SMP | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 826 | 	br_read_lock(&vfsmount_lock); | 
| Al Viro | d9eb504 | 2012-06-09 00:59:08 -0400 | [diff] [blame] | 827 | 	if (likely(mnt->mnt_ns)) { | 
 | 828 | 		/* shouldn't be the last one */ | 
| Al Viro | aa9c0e0 | 2011-11-23 19:04:52 -0500 | [diff] [blame] | 829 | 		mnt_add_count(mnt, -1); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 830 | 		br_read_unlock(&vfsmount_lock); | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 831 | 		return; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 832 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 833 | 	br_read_unlock(&vfsmount_lock); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 834 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 835 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | aa9c0e0 | 2011-11-23 19:04:52 -0500 | [diff] [blame] | 836 | 	mnt_add_count(mnt, -1); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 837 | 	if (mnt_get_count(mnt)) { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 838 | 		br_write_unlock(&vfsmount_lock); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 839 | 		return; | 
 | 840 | 	} | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 841 | #else | 
| Al Viro | aa9c0e0 | 2011-11-23 19:04:52 -0500 | [diff] [blame] | 842 | 	mnt_add_count(mnt, -1); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 843 | 	if (likely(mnt_get_count(mnt))) | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 844 | 		return; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 845 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 846 | #endif | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 847 | 	if (unlikely(mnt->mnt_pinned)) { | 
 | 848 | 		mnt_add_count(mnt, mnt->mnt_pinned + 1); | 
 | 849 | 		mnt->mnt_pinned = 0; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 850 | 		br_write_unlock(&vfsmount_lock); | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 851 | 		acct_auto_close_mnt(&mnt->mnt); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 852 | 		goto put_again; | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 853 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 854 |  | 
| Miklos Szeredi | 39f7c4d | 2011-11-21 12:11:30 +0100 | [diff] [blame] | 855 | 	list_del(&mnt->mnt_instance); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 856 | 	br_write_unlock(&vfsmount_lock); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 857 | 	mntfree(mnt); | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 858 | } | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 859 |  | 
 | 860 | void mntput(struct vfsmount *mnt) | 
 | 861 | { | 
 | 862 | 	if (mnt) { | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 863 | 		struct mount *m = real_mount(mnt); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 864 | 		/* avoid cacheline pingpong, hope gcc doesn't get "smart" */ | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 865 | 		if (unlikely(m->mnt_expiry_mark)) | 
 | 866 | 			m->mnt_expiry_mark = 0; | 
 | 867 | 		mntput_no_expire(m); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 868 | 	} | 
 | 869 | } | 
 | 870 | EXPORT_SYMBOL(mntput); | 
 | 871 |  | 
 | 872 | struct vfsmount *mntget(struct vfsmount *mnt) | 
 | 873 | { | 
 | 874 | 	if (mnt) | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 875 | 		mnt_add_count(real_mount(mnt), 1); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 876 | 	return mnt; | 
 | 877 | } | 
 | 878 | EXPORT_SYMBOL(mntget); | 
 | 879 |  | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 880 | void mnt_pin(struct vfsmount *mnt) | 
 | 881 | { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 882 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 883 | 	real_mount(mnt)->mnt_pinned++; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 884 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 885 | } | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 886 | EXPORT_SYMBOL(mnt_pin); | 
 | 887 |  | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 888 | void mnt_unpin(struct vfsmount *m) | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 889 | { | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 890 | 	struct mount *mnt = real_mount(m); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 891 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 892 | 	if (mnt->mnt_pinned) { | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 893 | 		mnt_add_count(mnt, 1); | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 894 | 		mnt->mnt_pinned--; | 
 | 895 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 896 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 897 | } | 
| Al Viro | 7b7b1ac | 2005-11-07 17:13:39 -0500 | [diff] [blame] | 898 | EXPORT_SYMBOL(mnt_unpin); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 899 |  | 
| Miklos Szeredi | b3b304a | 2008-02-08 04:21:35 -0800 | [diff] [blame] | 900 | static inline void mangle(struct seq_file *m, const char *s) | 
 | 901 | { | 
 | 902 | 	seq_escape(m, s, " \t\n\\"); | 
 | 903 | } | 
 | 904 |  | 
 | 905 | /* | 
 | 906 |  * Simple .show_options callback for filesystems which don't want to | 
 | 907 |  * implement more complex mount option showing. | 
 | 908 |  * | 
 | 909 |  * See also save_mount_options(). | 
 | 910 |  */ | 
| Al Viro | 34c80b1 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 911 | int generic_show_options(struct seq_file *m, struct dentry *root) | 
| Miklos Szeredi | b3b304a | 2008-02-08 04:21:35 -0800 | [diff] [blame] | 912 | { | 
| Al Viro | 2a32ceb | 2009-05-08 16:05:57 -0400 | [diff] [blame] | 913 | 	const char *options; | 
 | 914 |  | 
 | 915 | 	rcu_read_lock(); | 
| Al Viro | 34c80b1 | 2011-12-08 21:32:45 -0500 | [diff] [blame] | 916 | 	options = rcu_dereference(root->d_sb->s_options); | 
| Miklos Szeredi | b3b304a | 2008-02-08 04:21:35 -0800 | [diff] [blame] | 917 |  | 
 | 918 | 	if (options != NULL && options[0]) { | 
 | 919 | 		seq_putc(m, ','); | 
 | 920 | 		mangle(m, options); | 
 | 921 | 	} | 
| Al Viro | 2a32ceb | 2009-05-08 16:05:57 -0400 | [diff] [blame] | 922 | 	rcu_read_unlock(); | 
| Miklos Szeredi | b3b304a | 2008-02-08 04:21:35 -0800 | [diff] [blame] | 923 |  | 
 | 924 | 	return 0; | 
 | 925 | } | 
 | 926 | EXPORT_SYMBOL(generic_show_options); | 
 | 927 |  | 
 | 928 | /* | 
 | 929 |  * If filesystem uses generic_show_options(), this function should be | 
 | 930 |  * called from the fill_super() callback. | 
 | 931 |  * | 
 | 932 |  * The .remount_fs callback usually needs to be handled in a special | 
 | 933 |  * way, to make sure, that previous options are not overwritten if the | 
 | 934 |  * remount fails. | 
 | 935 |  * | 
 | 936 |  * Also note, that if the filesystem's .remount_fs function doesn't | 
 | 937 |  * reset all options to their default value, but changes only newly | 
 | 938 |  * given options, then the displayed options will not reflect reality | 
 | 939 |  * any more. | 
 | 940 |  */ | 
 | 941 | void save_mount_options(struct super_block *sb, char *options) | 
 | 942 | { | 
| Al Viro | 2a32ceb | 2009-05-08 16:05:57 -0400 | [diff] [blame] | 943 | 	BUG_ON(sb->s_options); | 
 | 944 | 	rcu_assign_pointer(sb->s_options, kstrdup(options, GFP_KERNEL)); | 
| Miklos Szeredi | b3b304a | 2008-02-08 04:21:35 -0800 | [diff] [blame] | 945 | } | 
 | 946 | EXPORT_SYMBOL(save_mount_options); | 
 | 947 |  | 
| Al Viro | 2a32ceb | 2009-05-08 16:05:57 -0400 | [diff] [blame] | 948 | void replace_mount_options(struct super_block *sb, char *options) | 
 | 949 | { | 
 | 950 | 	char *old = sb->s_options; | 
 | 951 | 	rcu_assign_pointer(sb->s_options, options); | 
 | 952 | 	if (old) { | 
 | 953 | 		synchronize_rcu(); | 
 | 954 | 		kfree(old); | 
 | 955 | 	} | 
 | 956 | } | 
 | 957 | EXPORT_SYMBOL(replace_mount_options); | 
 | 958 |  | 
| Miklos Szeredi | a1a2c40 | 2008-03-27 13:06:24 +0100 | [diff] [blame] | 959 | #ifdef CONFIG_PROC_FS | 
| Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 960 | /* iterator; we want it to have access to namespace_sem, thus here... */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 961 | static void *m_start(struct seq_file *m, loff_t *pos) | 
 | 962 | { | 
| Al Viro | 50a876b | 2012-06-09 01:16:59 -0400 | [diff] [blame] | 963 | 	struct proc_mounts *p = proc_mounts(m); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 964 |  | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 965 | 	down_read(&namespace_sem); | 
| Miklos Szeredi | a1a2c40 | 2008-03-27 13:06:24 +0100 | [diff] [blame] | 966 | 	return seq_list_start(&p->ns->list, *pos); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 967 | } | 
 | 968 |  | 
 | 969 | static void *m_next(struct seq_file *m, void *v, loff_t *pos) | 
 | 970 | { | 
| Al Viro | 50a876b | 2012-06-09 01:16:59 -0400 | [diff] [blame] | 971 | 	struct proc_mounts *p = proc_mounts(m); | 
| Pavel Emelianov | b0765fb | 2007-07-15 23:39:55 -0700 | [diff] [blame] | 972 |  | 
| Miklos Szeredi | a1a2c40 | 2008-03-27 13:06:24 +0100 | [diff] [blame] | 973 | 	return seq_list_next(v, &p->ns->list, pos); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 974 | } | 
 | 975 |  | 
 | 976 | static void m_stop(struct seq_file *m, void *v) | 
 | 977 | { | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 978 | 	up_read(&namespace_sem); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 979 | } | 
 | 980 |  | 
| Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 981 | static int m_show(struct seq_file *m, void *v) | 
| Al Viro | 9f5596a | 2010-02-05 00:40:25 -0500 | [diff] [blame] | 982 | { | 
| Al Viro | 50a876b | 2012-06-09 01:16:59 -0400 | [diff] [blame] | 983 | 	struct proc_mounts *p = proc_mounts(m); | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 984 | 	struct mount *r = list_entry(v, struct mount, mnt_list); | 
| Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 985 | 	return p->show(m, &r->mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 986 | } | 
 | 987 |  | 
| Miklos Szeredi | a1a2c40 | 2008-03-27 13:06:24 +0100 | [diff] [blame] | 988 | const struct seq_operations mounts_op = { | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 989 | 	.start	= m_start, | 
 | 990 | 	.next	= m_next, | 
 | 991 | 	.stop	= m_stop, | 
| Al Viro | 0226f49 | 2011-12-06 12:21:54 -0500 | [diff] [blame] | 992 | 	.show	= m_show, | 
| Chuck Lever | b4629fe | 2006-03-20 13:44:12 -0500 | [diff] [blame] | 993 | }; | 
| Miklos Szeredi | a1a2c40 | 2008-03-27 13:06:24 +0100 | [diff] [blame] | 994 | #endif  /* CONFIG_PROC_FS */ | 
| Chuck Lever | b4629fe | 2006-03-20 13:44:12 -0500 | [diff] [blame] | 995 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 996 | /** | 
 | 997 |  * may_umount_tree - check if a mount tree is busy | 
 | 998 |  * @mnt: root of mount tree | 
 | 999 |  * | 
 | 1000 |  * This is called to check if a tree of mounts has any | 
 | 1001 |  * open files, pwds, chroots or sub mounts that are | 
 | 1002 |  * busy. | 
 | 1003 |  */ | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1004 | int may_umount_tree(struct vfsmount *m) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1005 | { | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1006 | 	struct mount *mnt = real_mount(m); | 
| Ram Pai | 36341f6 | 2005-11-07 17:17:22 -0500 | [diff] [blame] | 1007 | 	int actual_refs = 0; | 
 | 1008 | 	int minimum_refs = 0; | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1009 | 	struct mount *p; | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1010 | 	BUG_ON(!m); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1011 |  | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 1012 | 	/* write lock needed for mnt_get_count */ | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1013 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1014 | 	for (p = mnt; p; p = next_mnt(p, mnt)) { | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 1015 | 		actual_refs += mnt_get_count(p); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1016 | 		minimum_refs += 2; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1017 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1018 | 	br_write_unlock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1019 |  | 
 | 1020 | 	if (actual_refs > minimum_refs) | 
| Ian Kent | e3474a8 | 2006-03-27 01:14:51 -0800 | [diff] [blame] | 1021 | 		return 0; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1022 |  | 
| Ian Kent | e3474a8 | 2006-03-27 01:14:51 -0800 | [diff] [blame] | 1023 | 	return 1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1024 | } | 
 | 1025 |  | 
 | 1026 | EXPORT_SYMBOL(may_umount_tree); | 
 | 1027 |  | 
 | 1028 | /** | 
 | 1029 |  * may_umount - check if a mount point is busy | 
 | 1030 |  * @mnt: root of mount | 
 | 1031 |  * | 
 | 1032 |  * This is called to check if a mount point has any | 
 | 1033 |  * open files, pwds, chroots or sub mounts. If the | 
 | 1034 |  * mount has sub mounts this will return busy | 
 | 1035 |  * regardless of whether the sub mounts are busy. | 
 | 1036 |  * | 
 | 1037 |  * Doesn't take quota and stuff into account. IOW, in some cases it will | 
 | 1038 |  * give false negatives. The main reason why it's here is that we need | 
 | 1039 |  * a non-destructive way to look for easily umountable filesystems. | 
 | 1040 |  */ | 
 | 1041 | int may_umount(struct vfsmount *mnt) | 
 | 1042 | { | 
| Ian Kent | e3474a8 | 2006-03-27 01:14:51 -0800 | [diff] [blame] | 1043 | 	int ret = 1; | 
| Al Viro | 8ad08d8 | 2010-01-16 12:56:08 -0500 | [diff] [blame] | 1044 | 	down_read(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1045 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1046 | 	if (propagate_mount_busy(real_mount(mnt), 2)) | 
| Ian Kent | e3474a8 | 2006-03-27 01:14:51 -0800 | [diff] [blame] | 1047 | 		ret = 0; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1048 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | 8ad08d8 | 2010-01-16 12:56:08 -0500 | [diff] [blame] | 1049 | 	up_read(&namespace_sem); | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 1050 | 	return ret; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1051 | } | 
 | 1052 |  | 
 | 1053 | EXPORT_SYMBOL(may_umount); | 
 | 1054 |  | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1055 | void release_mounts(struct list_head *head) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1056 | { | 
| Al Viro | d5e50f7 | 2011-11-24 20:58:57 -0500 | [diff] [blame] | 1057 | 	struct mount *mnt; | 
| Miklos Szeredi | bf066c7 | 2006-01-08 01:03:19 -0800 | [diff] [blame] | 1058 | 	while (!list_empty(head)) { | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 1059 | 		mnt = list_first_entry(head, struct mount, mnt_hash); | 
 | 1060 | 		list_del_init(&mnt->mnt_hash); | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 1061 | 		if (mnt_has_parent(mnt)) { | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1062 | 			struct dentry *dentry; | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 1063 | 			struct mount *m; | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 1064 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1065 | 			br_write_lock(&vfsmount_lock); | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1066 | 			dentry = mnt->mnt_mountpoint; | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 1067 | 			m = mnt->mnt_parent; | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1068 | 			mnt->mnt_mountpoint = mnt->mnt.mnt_root; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 1069 | 			mnt->mnt_parent = mnt; | 
| Al Viro | 7c4b93d | 2008-03-21 23:59:49 -0400 | [diff] [blame] | 1070 | 			m->mnt_ghosts--; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1071 | 			br_write_unlock(&vfsmount_lock); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1072 | 			dput(dentry); | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 1073 | 			mntput(&m->mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1074 | 		} | 
| Al Viro | d5e50f7 | 2011-11-24 20:58:57 -0500 | [diff] [blame] | 1075 | 		mntput(&mnt->mnt); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1076 | 	} | 
 | 1077 | } | 
 | 1078 |  | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 1079 | /* | 
 | 1080 |  * vfsmount lock must be held for write | 
 | 1081 |  * namespace_sem must be held for write | 
 | 1082 |  */ | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 1083 | void umount_tree(struct mount *mnt, int propagate, struct list_head *kill) | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1084 | { | 
| Al Viro | 7b8a53f | 2011-01-15 20:08:44 -0500 | [diff] [blame] | 1085 | 	LIST_HEAD(tmp_list); | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1086 | 	struct mount *p; | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1087 |  | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1088 | 	for (p = mnt; p; p = next_mnt(p, mnt)) | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 1089 | 		list_move(&p->mnt_hash, &tmp_list); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1090 |  | 
| Al Viro | 6722908 | 2014-08-18 15:09:26 -0400 | [diff] [blame] | 1091 | 	list_for_each_entry(p, &tmp_list, mnt_hash) | 
 | 1092 | 		list_del_init(&p->mnt_child); | 
 | 1093 |  | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 1094 | 	if (propagate) | 
| Al Viro | 7b8a53f | 2011-01-15 20:08:44 -0500 | [diff] [blame] | 1095 | 		propagate_umount(&tmp_list); | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 1096 |  | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 1097 | 	list_for_each_entry(p, &tmp_list, mnt_hash) { | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1098 | 		list_del_init(&p->mnt_expire); | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 1099 | 		list_del_init(&p->mnt_list); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1100 | 		__touch_mnt_namespace(p->mnt_ns); | 
 | 1101 | 		p->mnt_ns = NULL; | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 1102 | 		if (mnt_has_parent(p)) { | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 1103 | 			p->mnt_parent->mnt_ghosts++; | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1104 | 			dentry_reset_mounted(p->mnt_mountpoint); | 
| Al Viro | 7c4b93d | 2008-03-21 23:59:49 -0400 | [diff] [blame] | 1105 | 		} | 
| Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 1106 | 		change_mnt_propagation(p, MS_PRIVATE); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1107 | 	} | 
| Al Viro | 7b8a53f | 2011-01-15 20:08:44 -0500 | [diff] [blame] | 1108 | 	list_splice(&tmp_list, kill); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1109 | } | 
 | 1110 |  | 
| Al Viro | 692afc3 | 2011-11-24 21:15:14 -0500 | [diff] [blame] | 1111 | static void shrink_submounts(struct mount *mnt, struct list_head *umounts); | 
| Al Viro | c35038b | 2008-03-22 00:46:23 -0400 | [diff] [blame] | 1112 |  | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1113 | static int do_umount(struct mount *mnt, int flags) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1114 | { | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1115 | 	struct super_block *sb = mnt->mnt.mnt_sb; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1116 | 	int retval; | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1117 | 	LIST_HEAD(umount_list); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1118 |  | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1119 | 	retval = security_sb_umount(&mnt->mnt, flags); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1120 | 	if (retval) | 
 | 1121 | 		return retval; | 
 | 1122 |  | 
 | 1123 | 	/* | 
 | 1124 | 	 * Allow userspace to request a mountpoint be expired rather than | 
 | 1125 | 	 * unmounting unconditionally. Unmount only happens if: | 
 | 1126 | 	 *  (1) the mark is already set (the mark is cleared by mntput()) | 
 | 1127 | 	 *  (2) the usage count == 1 [parent vfsmount] + 1 [sys_umount] | 
 | 1128 | 	 */ | 
 | 1129 | 	if (flags & MNT_EXPIRE) { | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1130 | 		if (&mnt->mnt == current->fs->root.mnt || | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1131 | 		    flags & (MNT_FORCE | MNT_DETACH)) | 
 | 1132 | 			return -EINVAL; | 
 | 1133 |  | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 1134 | 		/* | 
 | 1135 | 		 * probably don't strictly need the lock here if we examined | 
 | 1136 | 		 * all race cases, but it's a slowpath. | 
 | 1137 | 		 */ | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1138 | 		br_write_lock(&vfsmount_lock); | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 1139 | 		if (mnt_get_count(mnt) != 2) { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1140 | 			br_write_unlock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1141 | 			return -EBUSY; | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 1142 | 		} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1143 | 		br_write_unlock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1144 |  | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 1145 | 		if (!xchg(&mnt->mnt_expiry_mark, 1)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1146 | 			return -EAGAIN; | 
 | 1147 | 	} | 
 | 1148 |  | 
 | 1149 | 	/* | 
 | 1150 | 	 * If we may have to abort operations to get out of this | 
 | 1151 | 	 * mount, and they will themselves hold resources we must | 
 | 1152 | 	 * allow the fs to do things. In the Unix tradition of | 
 | 1153 | 	 * 'Gee thats tricky lets do it in userspace' the umount_begin | 
 | 1154 | 	 * might fail to complete on the first run through as other tasks | 
 | 1155 | 	 * must return, and the like. Thats for the mount program to worry | 
 | 1156 | 	 * about for the moment. | 
 | 1157 | 	 */ | 
 | 1158 |  | 
| Al Viro | 42faad9 | 2008-04-24 07:21:56 -0400 | [diff] [blame] | 1159 | 	if (flags & MNT_FORCE && sb->s_op->umount_begin) { | 
| Al Viro | 42faad9 | 2008-04-24 07:21:56 -0400 | [diff] [blame] | 1160 | 		sb->s_op->umount_begin(sb); | 
| Al Viro | 42faad9 | 2008-04-24 07:21:56 -0400 | [diff] [blame] | 1161 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1162 |  | 
 | 1163 | 	/* | 
 | 1164 | 	 * No sense to grab the lock for this test, but test itself looks | 
 | 1165 | 	 * somewhat bogus. Suggestions for better replacement? | 
 | 1166 | 	 * Ho-hum... In principle, we might treat that as umount + switch | 
 | 1167 | 	 * to rootfs. GC would eventually take care of the old vfsmount. | 
 | 1168 | 	 * Actually it makes sense, especially if rootfs would contain a | 
 | 1169 | 	 * /reboot - static binary that would close all descriptors and | 
 | 1170 | 	 * call reboot(9). Then init(8) could umount root and exec /reboot. | 
 | 1171 | 	 */ | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1172 | 	if (&mnt->mnt == current->fs->root.mnt && !(flags & MNT_DETACH)) { | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1173 | 		/* | 
 | 1174 | 		 * Special case for "unmounting" root ... | 
 | 1175 | 		 * we just try to remount it readonly. | 
 | 1176 | 		 */ | 
 | 1177 | 		down_write(&sb->s_umount); | 
| Al Viro | 4aa98cf | 2009-05-08 13:36:58 -0400 | [diff] [blame] | 1178 | 		if (!(sb->s_flags & MS_RDONLY)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1179 | 			retval = do_remount_sb(sb, MS_RDONLY, NULL, 0); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1180 | 		up_write(&sb->s_umount); | 
 | 1181 | 		return retval; | 
 | 1182 | 	} | 
 | 1183 |  | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 1184 | 	down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1185 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 5addc5d | 2005-11-07 17:15:49 -0500 | [diff] [blame] | 1186 | 	event++; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1187 |  | 
| Al Viro | c35038b | 2008-03-22 00:46:23 -0400 | [diff] [blame] | 1188 | 	if (!(flags & MNT_DETACH)) | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1189 | 		shrink_submounts(mnt, &umount_list); | 
| Al Viro | c35038b | 2008-03-22 00:46:23 -0400 | [diff] [blame] | 1190 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1191 | 	retval = -EBUSY; | 
| Ram Pai | a05964f | 2005-11-07 17:20:17 -0500 | [diff] [blame] | 1192 | 	if (flags & MNT_DETACH || !propagate_mount_busy(mnt, 2)) { | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 1193 | 		if (!list_empty(&mnt->mnt_list)) | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 1194 | 			umount_tree(mnt, 1, &umount_list); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1195 | 		retval = 0; | 
 | 1196 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1197 | 	br_write_unlock(&vfsmount_lock); | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 1198 | 	up_write(&namespace_sem); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1199 | 	release_mounts(&umount_list); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1200 | 	return retval; | 
 | 1201 | } | 
 | 1202 |  | 
 | 1203 | /* | 
 | 1204 |  * Now umount can handle mount points as well as block devices. | 
 | 1205 |  * This is important for filesystems which use unnamed block devices. | 
 | 1206 |  * | 
 | 1207 |  * We now support a flag for forced unmount like the other 'big iron' | 
 | 1208 |  * unixes. Our API is identical to OSF/1 to avoid making a mess of AMD | 
 | 1209 |  */ | 
 | 1210 |  | 
| Heiko Carstens | bdc480e | 2009-01-14 14:14:12 +0100 | [diff] [blame] | 1211 | SYSCALL_DEFINE2(umount, char __user *, name, int, flags) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1212 | { | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 1213 | 	struct path path; | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 1214 | 	struct mount *mnt; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1215 | 	int retval; | 
| Miklos Szeredi | db1f05b | 2010-02-10 12:15:53 +0100 | [diff] [blame] | 1216 | 	int lookup_flags = 0; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1217 |  | 
| Miklos Szeredi | db1f05b | 2010-02-10 12:15:53 +0100 | [diff] [blame] | 1218 | 	if (flags & ~(MNT_FORCE | MNT_DETACH | MNT_EXPIRE | UMOUNT_NOFOLLOW)) | 
 | 1219 | 		return -EINVAL; | 
 | 1220 |  | 
 | 1221 | 	if (!(flags & UMOUNT_NOFOLLOW)) | 
 | 1222 | 		lookup_flags |= LOOKUP_FOLLOW; | 
 | 1223 |  | 
 | 1224 | 	retval = user_path_at(AT_FDCWD, name, lookup_flags, &path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1225 | 	if (retval) | 
 | 1226 | 		goto out; | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 1227 | 	mnt = real_mount(path.mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1228 | 	retval = -EINVAL; | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 1229 | 	if (path.dentry != path.mnt->mnt_root) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1230 | 		goto dput_and_out; | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1231 | 	if (!check_mnt(mnt)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1232 | 		goto dput_and_out; | 
 | 1233 |  | 
 | 1234 | 	retval = -EPERM; | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1235 | 	if (!ns_capable(mnt->mnt_ns->user_ns, CAP_SYS_ADMIN)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1236 | 		goto dput_and_out; | 
 | 1237 |  | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 1238 | 	retval = do_umount(mnt, flags); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1239 | dput_and_out: | 
| Jan Blunck | 429731b | 2008-02-14 19:34:31 -0800 | [diff] [blame] | 1240 | 	/* we mustn't call path_put() as that would clear mnt_expiry_mark */ | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 1241 | 	dput(path.dentry); | 
| Al Viro | 900148d | 2011-11-25 00:33:11 -0500 | [diff] [blame] | 1242 | 	mntput_no_expire(mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1243 | out: | 
 | 1244 | 	return retval; | 
 | 1245 | } | 
 | 1246 |  | 
 | 1247 | #ifdef __ARCH_WANT_SYS_OLDUMOUNT | 
 | 1248 |  | 
 | 1249 | /* | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 1250 |  *	The 2.0 compatible umount. No flags. | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1251 |  */ | 
| Heiko Carstens | bdc480e | 2009-01-14 14:14:12 +0100 | [diff] [blame] | 1252 | SYSCALL_DEFINE1(oldumount, char __user *, name) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1253 | { | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 1254 | 	return sys_umount(name, 0); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1255 | } | 
 | 1256 |  | 
 | 1257 | #endif | 
 | 1258 |  | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1259 | static int mount_is_safe(struct path *path) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1260 | { | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1261 | 	if (ns_capable(real_mount(path->mnt)->mnt_ns->user_ns, CAP_SYS_ADMIN)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1262 | 		return 0; | 
 | 1263 | 	return -EPERM; | 
 | 1264 | #ifdef notyet | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1265 | 	if (S_ISLNK(path->dentry->d_inode->i_mode)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1266 | 		return -EPERM; | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1267 | 	if (path->dentry->d_inode->i_mode & S_ISVTX) { | 
| David Howells | da9592e | 2008-11-14 10:39:05 +1100 | [diff] [blame] | 1268 | 		if (current_uid() != path->dentry->d_inode->i_uid) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1269 | 			return -EPERM; | 
 | 1270 | 	} | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1271 | 	if (inode_permission(path->dentry->d_inode, MAY_WRITE)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1272 | 		return -EPERM; | 
 | 1273 | 	return 0; | 
 | 1274 | #endif | 
 | 1275 | } | 
 | 1276 |  | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 1277 | static bool mnt_ns_loop(struct path *path) | 
 | 1278 | { | 
 | 1279 | 	/* Could bind mounting the mount namespace inode cause a | 
 | 1280 | 	 * mount namespace loop? | 
 | 1281 | 	 */ | 
 | 1282 | 	struct inode *inode = path->dentry->d_inode; | 
 | 1283 | 	struct proc_inode *ei; | 
 | 1284 | 	struct mnt_namespace *mnt_ns; | 
 | 1285 |  | 
 | 1286 | 	if (!proc_ns_inode(inode)) | 
 | 1287 | 		return false; | 
 | 1288 |  | 
 | 1289 | 	ei = PROC_I(inode); | 
 | 1290 | 	if (ei->ns_ops != &mntns_operations) | 
 | 1291 | 		return false; | 
 | 1292 |  | 
 | 1293 | 	mnt_ns = ei->ns; | 
 | 1294 | 	return current->nsproxy->mnt_ns->seq >= mnt_ns->seq; | 
 | 1295 | } | 
 | 1296 |  | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1297 | struct mount *copy_tree(struct mount *mnt, struct dentry *dentry, | 
| Ram Pai | 36341f6 | 2005-11-07 17:17:22 -0500 | [diff] [blame] | 1298 | 					int flag) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1299 | { | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1300 | 	struct mount *res, *p, *q, *r; | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 1301 | 	struct path path; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1302 |  | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1303 | 	if (!(flag & CL_COPY_ALL) && IS_MNT_UNBINDABLE(mnt)) | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1304 | 		return ERR_PTR(-EINVAL); | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1305 |  | 
| Ram Pai | 36341f6 | 2005-11-07 17:17:22 -0500 | [diff] [blame] | 1306 | 	res = q = clone_mnt(mnt, dentry, flag); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1307 | 	if (IS_ERR(q)) | 
 | 1308 | 		return q; | 
 | 1309 |  | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1310 | 	q->mnt_mountpoint = mnt->mnt_mountpoint; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1311 |  | 
 | 1312 | 	p = mnt; | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 1313 | 	list_for_each_entry(r, &mnt->mnt_mounts, mnt_child) { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1314 | 		struct mount *s; | 
| Jan Blunck | 7ec02ef | 2008-04-29 00:59:40 -0700 | [diff] [blame] | 1315 | 		if (!is_subdir(r->mnt_mountpoint, dentry)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1316 | 			continue; | 
 | 1317 |  | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1318 | 		for (s = r; s; s = next_mnt(s, r)) { | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1319 | 			if (!(flag & CL_COPY_ALL) && IS_MNT_UNBINDABLE(s)) { | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1320 | 				s = skip_mnt_tree(s); | 
 | 1321 | 				continue; | 
 | 1322 | 			} | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 1323 | 			while (p != s->mnt_parent) { | 
 | 1324 | 				p = p->mnt_parent; | 
 | 1325 | 				q = q->mnt_parent; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1326 | 			} | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1327 | 			p = s; | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 1328 | 			path.mnt = &q->mnt; | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 1329 | 			path.dentry = p->mnt_mountpoint; | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1330 | 			q = clone_mnt(p, p->mnt.mnt_root, flag); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1331 | 			if (IS_ERR(q)) | 
 | 1332 | 				goto out; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1333 | 			br_write_lock(&vfsmount_lock); | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 1334 | 			list_add_tail(&q->mnt_list, &res->mnt_list); | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 1335 | 			attach_mnt(q, &path); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1336 | 			br_write_unlock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1337 | 		} | 
 | 1338 | 	} | 
 | 1339 | 	return res; | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1340 | out: | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1341 | 	if (res) { | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1342 | 		LIST_HEAD(umount_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1343 | 		br_write_lock(&vfsmount_lock); | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 1344 | 		umount_tree(res, 0, &umount_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1345 | 		br_write_unlock(&vfsmount_lock); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 1346 | 		release_mounts(&umount_list); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1347 | 	} | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1348 | 	return q; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1349 | } | 
 | 1350 |  | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1351 | /* Caller should check returned pointer for errors */ | 
 | 1352 |  | 
| Al Viro | 589ff87 | 2009-04-18 03:28:19 -0400 | [diff] [blame] | 1353 | struct vfsmount *collect_mounts(struct path *path) | 
| Al Viro | 8aec080 | 2007-06-07 12:20:32 -0400 | [diff] [blame] | 1354 | { | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 1355 | 	struct mount *tree; | 
| Al Viro | 1a60a28 | 2008-03-22 16:19:49 -0400 | [diff] [blame] | 1356 | 	down_write(&namespace_sem); | 
| Eric W. Biederman | 85d13c3 | 2015-01-07 14:28:26 -0600 | [diff] [blame] | 1357 | 	if (!check_mnt(real_mount(path->mnt))) | 
 | 1358 | 		tree = ERR_PTR(-EINVAL); | 
 | 1359 | 	else | 
 | 1360 | 		tree = copy_tree(real_mount(path->mnt), path->dentry, | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1361 | 				CL_COPY_ALL | CL_PRIVATE); | 
| Al Viro | 1a60a28 | 2008-03-22 16:19:49 -0400 | [diff] [blame] | 1362 | 	up_write(&namespace_sem); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1363 | 	if (IS_ERR(tree)) | 
 | 1364 | 		return NULL; | 
 | 1365 | 	return &tree->mnt; | 
| Al Viro | 8aec080 | 2007-06-07 12:20:32 -0400 | [diff] [blame] | 1366 | } | 
 | 1367 |  | 
 | 1368 | void drop_collected_mounts(struct vfsmount *mnt) | 
 | 1369 | { | 
 | 1370 | 	LIST_HEAD(umount_list); | 
| Al Viro | 1a60a28 | 2008-03-22 16:19:49 -0400 | [diff] [blame] | 1371 | 	down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1372 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 1373 | 	umount_tree(real_mount(mnt), 0, &umount_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1374 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | 1a60a28 | 2008-03-22 16:19:49 -0400 | [diff] [blame] | 1375 | 	up_write(&namespace_sem); | 
| Al Viro | 8aec080 | 2007-06-07 12:20:32 -0400 | [diff] [blame] | 1376 | 	release_mounts(&umount_list); | 
 | 1377 | } | 
 | 1378 |  | 
| Al Viro | 1f70713 | 2010-01-30 22:51:25 -0500 | [diff] [blame] | 1379 | int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg, | 
 | 1380 | 		   struct vfsmount *root) | 
 | 1381 | { | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 1382 | 	struct mount *mnt; | 
| Al Viro | 1f70713 | 2010-01-30 22:51:25 -0500 | [diff] [blame] | 1383 | 	int res = f(root, arg); | 
 | 1384 | 	if (res) | 
 | 1385 | 		return res; | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 1386 | 	list_for_each_entry(mnt, &real_mount(root)->mnt_list, mnt_list) { | 
 | 1387 | 		res = f(&mnt->mnt, arg); | 
| Al Viro | 1f70713 | 2010-01-30 22:51:25 -0500 | [diff] [blame] | 1388 | 		if (res) | 
 | 1389 | 			return res; | 
 | 1390 | 	} | 
 | 1391 | 	return 0; | 
 | 1392 | } | 
 | 1393 |  | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1394 | static void cleanup_group_ids(struct mount *mnt, struct mount *end) | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1395 | { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1396 | 	struct mount *p; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1397 |  | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1398 | 	for (p = mnt; p != end; p = next_mnt(p, mnt)) { | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1399 | 		if (p->mnt_group_id && !IS_MNT_SHARED(p)) | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1400 | 			mnt_release_group_id(p); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1401 | 	} | 
 | 1402 | } | 
 | 1403 |  | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1404 | static int invent_group_ids(struct mount *mnt, bool recurse) | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1405 | { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1406 | 	struct mount *p; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1407 |  | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1408 | 	for (p = mnt; p; p = recurse ? next_mnt(p, mnt) : NULL) { | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1409 | 		if (!p->mnt_group_id && !IS_MNT_SHARED(p)) { | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1410 | 			int err = mnt_alloc_group_id(p); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1411 | 			if (err) { | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1412 | 				cleanup_group_ids(mnt, p); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1413 | 				return err; | 
 | 1414 | 			} | 
 | 1415 | 		} | 
 | 1416 | 	} | 
 | 1417 |  | 
 | 1418 | 	return 0; | 
 | 1419 | } | 
 | 1420 |  | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1421 | /* | 
 | 1422 |  *  @source_mnt : mount tree to be attached | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1423 |  *  @nd         : place the mount tree @source_mnt is attached | 
 | 1424 |  *  @parent_nd  : if non-null, detach the source_mnt from its parent and | 
 | 1425 |  *  		   store the parent mount and mountpoint dentry. | 
 | 1426 |  *  		   (done when source_mnt is moved) | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1427 |  * | 
 | 1428 |  *  NOTE: in the table below explains the semantics when a source mount | 
 | 1429 |  *  of a given type is attached to a destination mount of a given type. | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1430 |  * --------------------------------------------------------------------------- | 
 | 1431 |  * |         BIND MOUNT OPERATION                                            | | 
 | 1432 |  * |************************************************************************** | 
 | 1433 |  * | source-->| shared        |       private  |       slave    | unbindable | | 
 | 1434 |  * | dest     |               |                |                |            | | 
 | 1435 |  * |   |      |               |                |                |            | | 
 | 1436 |  * |   v      |               |                |                |            | | 
 | 1437 |  * |************************************************************************** | 
 | 1438 |  * |  shared  | shared (++)   |     shared (+) |     shared(+++)|  invalid   | | 
 | 1439 |  * |          |               |                |                |            | | 
 | 1440 |  * |non-shared| shared (+)    |      private   |      slave (*) |  invalid   | | 
 | 1441 |  * *************************************************************************** | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1442 |  * A bind operation clones the source mount and mounts the clone on the | 
 | 1443 |  * destination mount. | 
 | 1444 |  * | 
 | 1445 |  * (++)  the cloned mount is propagated to all the mounts in the propagation | 
 | 1446 |  * 	 tree of the destination mount and the cloned mount is added to | 
 | 1447 |  * 	 the peer group of the source mount. | 
 | 1448 |  * (+)   the cloned mount is created under the destination mount and is marked | 
 | 1449 |  *       as shared. The cloned mount is added to the peer group of the source | 
 | 1450 |  *       mount. | 
| Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 1451 |  * (+++) the mount is propagated to all the mounts in the propagation tree | 
 | 1452 |  *       of the destination mount and the cloned mount is made slave | 
 | 1453 |  *       of the same master as that of the source mount. The cloned mount | 
 | 1454 |  *       is marked as 'shared and slave'. | 
 | 1455 |  * (*)   the cloned mount is made a slave of the same master as that of the | 
 | 1456 |  * 	 source mount. | 
 | 1457 |  * | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1458 |  * --------------------------------------------------------------------------- | 
 | 1459 |  * |         		MOVE MOUNT OPERATION                                 | | 
 | 1460 |  * |************************************************************************** | 
 | 1461 |  * | source-->| shared        |       private  |       slave    | unbindable | | 
 | 1462 |  * | dest     |               |                |                |            | | 
 | 1463 |  * |   |      |               |                |                |            | | 
 | 1464 |  * |   v      |               |                |                |            | | 
 | 1465 |  * |************************************************************************** | 
 | 1466 |  * |  shared  | shared (+)    |     shared (+) |    shared(+++) |  invalid   | | 
 | 1467 |  * |          |               |                |                |            | | 
 | 1468 |  * |non-shared| shared (+*)   |      private   |    slave (*)   | unbindable | | 
 | 1469 |  * *************************************************************************** | 
| Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 1470 |  * | 
 | 1471 |  * (+)  the mount is moved to the destination. And is then propagated to | 
 | 1472 |  * 	all the mounts in the propagation tree of the destination mount. | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1473 |  * (+*)  the mount is moved to the destination. | 
| Ram Pai | 5afe002 | 2005-11-07 17:21:01 -0500 | [diff] [blame] | 1474 |  * (+++)  the mount is moved to the destination and is then propagated to | 
 | 1475 |  * 	all the mounts belonging to the destination mount's propagation tree. | 
 | 1476 |  * 	the mount is marked as 'shared and slave'. | 
 | 1477 |  * (*)	the mount continues to be a slave at the new location. | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1478 |  * | 
 | 1479 |  * if the source mount is a tree, the operations explained above is | 
 | 1480 |  * applied to each mount in the tree. | 
 | 1481 |  * Must be called without spinlocks held, since this function can sleep | 
 | 1482 |  * in allocations. | 
 | 1483 |  */ | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1484 | static int attach_recursive_mnt(struct mount *source_mnt, | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 1485 | 			struct path *path, struct path *parent_path) | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1486 | { | 
 | 1487 | 	LIST_HEAD(tree_list); | 
| Al Viro | a8d56d8 | 2011-11-24 23:59:29 -0500 | [diff] [blame] | 1488 | 	struct mount *dest_mnt = real_mount(path->mnt); | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 1489 | 	struct dentry *dest_dentry = path->dentry; | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1490 | 	struct mount *child, *p; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1491 | 	int err; | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1492 |  | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1493 | 	if (IS_MNT_SHARED(dest_mnt)) { | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1494 | 		err = invent_group_ids(source_mnt, true); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1495 | 		if (err) | 
 | 1496 | 			goto out; | 
 | 1497 | 	} | 
| Al Viro | a8d56d8 | 2011-11-24 23:59:29 -0500 | [diff] [blame] | 1498 | 	err = propagate_mnt(dest_mnt, dest_dentry, source_mnt, &tree_list); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1499 | 	if (err) | 
 | 1500 | 		goto out_cleanup_ids; | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1501 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1502 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | df1a1ad | 2010-01-16 12:57:40 -0500 | [diff] [blame] | 1503 |  | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1504 | 	if (IS_MNT_SHARED(dest_mnt)) { | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1505 | 		for (p = source_mnt; p; p = next_mnt(p, source_mnt)) | 
| Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 1506 | 			set_mnt_shared(p); | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1507 | 	} | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 1508 | 	if (parent_path) { | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1509 | 		detach_mnt(source_mnt, parent_path); | 
 | 1510 | 		attach_mnt(source_mnt, path); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1511 | 		touch_mnt_namespace(source_mnt->mnt_ns); | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1512 | 	} else { | 
| Al Viro | 14cf1fa | 2011-11-25 00:01:17 -0500 | [diff] [blame] | 1513 | 		mnt_set_mountpoint(dest_mnt, dest_dentry, source_mnt); | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1514 | 		commit_tree(source_mnt); | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1515 | 	} | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1516 |  | 
| Al Viro | 1b8e556 | 2011-11-24 21:01:32 -0500 | [diff] [blame] | 1517 | 	list_for_each_entry_safe(child, p, &tree_list, mnt_hash) { | 
 | 1518 | 		list_del_init(&child->mnt_hash); | 
| Al Viro | 4b2619a | 2011-11-24 19:47:15 -0500 | [diff] [blame] | 1519 | 		commit_tree(child); | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1520 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1521 | 	br_write_unlock(&vfsmount_lock); | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 1522 |  | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1523 | 	return 0; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1524 |  | 
 | 1525 |  out_cleanup_ids: | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1526 | 	if (IS_MNT_SHARED(dest_mnt)) | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1527 | 		cleanup_group_ids(source_mnt, NULL); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1528 |  out: | 
 | 1529 | 	return err; | 
| Ram Pai | b90fa9a | 2005-11-07 17:19:50 -0500 | [diff] [blame] | 1530 | } | 
 | 1531 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1532 | static int lock_mount(struct path *path) | 
 | 1533 | { | 
 | 1534 | 	struct vfsmount *mnt; | 
 | 1535 | retry: | 
 | 1536 | 	mutex_lock(&path->dentry->d_inode->i_mutex); | 
 | 1537 | 	if (unlikely(cant_mount(path->dentry))) { | 
 | 1538 | 		mutex_unlock(&path->dentry->d_inode->i_mutex); | 
 | 1539 | 		return -ENOENT; | 
 | 1540 | 	} | 
 | 1541 | 	down_write(&namespace_sem); | 
 | 1542 | 	mnt = lookup_mnt(path); | 
 | 1543 | 	if (likely(!mnt)) | 
 | 1544 | 		return 0; | 
 | 1545 | 	up_write(&namespace_sem); | 
 | 1546 | 	mutex_unlock(&path->dentry->d_inode->i_mutex); | 
 | 1547 | 	path_put(path); | 
 | 1548 | 	path->mnt = mnt; | 
 | 1549 | 	path->dentry = dget(mnt->mnt_root); | 
 | 1550 | 	goto retry; | 
 | 1551 | } | 
 | 1552 |  | 
 | 1553 | static void unlock_mount(struct path *path) | 
 | 1554 | { | 
 | 1555 | 	up_write(&namespace_sem); | 
 | 1556 | 	mutex_unlock(&path->dentry->d_inode->i_mutex); | 
 | 1557 | } | 
 | 1558 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1559 | static int graft_tree(struct mount *mnt, struct path *path) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1560 | { | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1561 | 	if (mnt->mnt.mnt_sb->s_flags & MS_NOUSER) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1562 | 		return -EINVAL; | 
 | 1563 |  | 
| Al Viro | 8c3ee42 | 2008-03-22 18:00:39 -0400 | [diff] [blame] | 1564 | 	if (S_ISDIR(path->dentry->d_inode->i_mode) != | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1565 | 	      S_ISDIR(mnt->mnt.mnt_root->d_inode->i_mode)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1566 | 		return -ENOTDIR; | 
 | 1567 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1568 | 	if (d_unlinked(path->dentry)) | 
 | 1569 | 		return -ENOENT; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1570 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1571 | 	return attach_recursive_mnt(mnt, path, NULL); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1572 | } | 
 | 1573 |  | 
 | 1574 | /* | 
| Valerie Aurora | 7a2e8a8 | 2010-08-26 11:07:22 -0700 | [diff] [blame] | 1575 |  * Sanity check the flags to change_mnt_propagation. | 
 | 1576 |  */ | 
 | 1577 |  | 
 | 1578 | static int flags_to_propagation_type(int flags) | 
 | 1579 | { | 
| Roman Borisov | 7c6e984 | 2011-05-25 16:26:48 -0700 | [diff] [blame] | 1580 | 	int type = flags & ~(MS_REC | MS_SILENT); | 
| Valerie Aurora | 7a2e8a8 | 2010-08-26 11:07:22 -0700 | [diff] [blame] | 1581 |  | 
 | 1582 | 	/* Fail if any non-propagation flags are set */ | 
 | 1583 | 	if (type & ~(MS_SHARED | MS_PRIVATE | MS_SLAVE | MS_UNBINDABLE)) | 
 | 1584 | 		return 0; | 
 | 1585 | 	/* Only one propagation flag should be set */ | 
 | 1586 | 	if (!is_power_of_2(type)) | 
 | 1587 | 		return 0; | 
 | 1588 | 	return type; | 
 | 1589 | } | 
 | 1590 |  | 
 | 1591 | /* | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1592 |  * recursively change the type of the mountpoint. | 
 | 1593 |  */ | 
| Al Viro | 0a0d8a4 | 2008-08-02 00:55:27 -0400 | [diff] [blame] | 1594 | static int do_change_type(struct path *path, int flag) | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1595 | { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1596 | 	struct mount *m; | 
| Al Viro | 4b8b21f | 2011-11-24 19:54:23 -0500 | [diff] [blame] | 1597 | 	struct mount *mnt = real_mount(path->mnt); | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1598 | 	int recurse = flag & MS_REC; | 
| Valerie Aurora | 7a2e8a8 | 2010-08-26 11:07:22 -0700 | [diff] [blame] | 1599 | 	int type; | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1600 | 	int err = 0; | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1601 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1602 | 	if (!ns_capable(mnt->mnt_ns->user_ns, CAP_SYS_ADMIN)) | 
| Miklos Szeredi | ee6f958 | 2007-05-08 00:30:40 -0700 | [diff] [blame] | 1603 | 		return -EPERM; | 
 | 1604 |  | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1605 | 	if (path->dentry != path->mnt->mnt_root) | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1606 | 		return -EINVAL; | 
 | 1607 |  | 
| Valerie Aurora | 7a2e8a8 | 2010-08-26 11:07:22 -0700 | [diff] [blame] | 1608 | 	type = flags_to_propagation_type(flag); | 
 | 1609 | 	if (!type) | 
 | 1610 | 		return -EINVAL; | 
 | 1611 |  | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1612 | 	down_write(&namespace_sem); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1613 | 	if (type == MS_SHARED) { | 
 | 1614 | 		err = invent_group_ids(mnt, recurse); | 
 | 1615 | 		if (err) | 
 | 1616 | 			goto out_unlock; | 
 | 1617 | 	} | 
 | 1618 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1619 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1620 | 	for (m = mnt; m; m = (recurse ? next_mnt(m, mnt) : NULL)) | 
| Al Viro | 0f0afb1 | 2011-11-24 20:43:10 -0500 | [diff] [blame] | 1621 | 		change_mnt_propagation(m, type); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1622 | 	br_write_unlock(&vfsmount_lock); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1623 |  | 
 | 1624 |  out_unlock: | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1625 | 	up_write(&namespace_sem); | 
| Miklos Szeredi | 719f5d7 | 2008-03-27 13:06:23 +0100 | [diff] [blame] | 1626 | 	return err; | 
| Ram Pai | 07b2088 | 2005-11-07 17:19:07 -0500 | [diff] [blame] | 1627 | } | 
 | 1628 |  | 
 | 1629 | /* | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1630 |  * do loopback mount. | 
 | 1631 |  */ | 
| Al Viro | ddaa16d | 2012-10-11 11:42:01 -0400 | [diff] [blame] | 1632 | static int do_loopback(struct path *path, const char *old_name, | 
| Eric Sandeen | 2dafe1c | 2008-02-08 04:22:12 -0800 | [diff] [blame] | 1633 | 				int recurse) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1634 | { | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1635 | 	LIST_HEAD(umount_list); | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1636 | 	struct path old_path; | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1637 | 	struct mount *mnt = NULL, *old; | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1638 | 	int err = mount_is_safe(path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1639 | 	if (err) | 
 | 1640 | 		return err; | 
 | 1641 | 	if (!old_name || !*old_name) | 
 | 1642 | 		return -EINVAL; | 
| Trond Myklebust | 815d405 | 2011-09-26 20:36:09 -0400 | [diff] [blame] | 1643 | 	err = kern_path(old_name, LOOKUP_FOLLOW|LOOKUP_AUTOMOUNT, &old_path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1644 | 	if (err) | 
 | 1645 | 		return err; | 
 | 1646 |  | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 1647 | 	err = -EINVAL; | 
 | 1648 | 	if (mnt_ns_loop(&old_path)) | 
 | 1649 | 		goto out;  | 
 | 1650 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1651 | 	err = lock_mount(path); | 
 | 1652 | 	if (err) | 
| Jan Blunck | 4ac9137 | 2008-02-14 19:34:32 -0800 | [diff] [blame] | 1653 | 		goto out; | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1654 |  | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1655 | 	old = real_mount(old_path.mnt); | 
 | 1656 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1657 | 	err = -EINVAL; | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1658 | 	if (IS_MNT_UNBINDABLE(old)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1659 | 		goto out2; | 
 | 1660 |  | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1661 | 	if (!check_mnt(real_mount(path->mnt)) || !check_mnt(old)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1662 | 		goto out2; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1663 |  | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1664 | 	if (recurse) | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1665 | 		mnt = copy_tree(old, old_path.dentry, 0); | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1666 | 	else | 
| Al Viro | 87129cc | 2011-11-24 21:24:27 -0500 | [diff] [blame] | 1667 | 		mnt = clone_mnt(old, old_path.dentry, 0); | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1668 |  | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 1669 | 	if (IS_ERR(mnt)) { | 
 | 1670 | 		err = PTR_ERR(mnt); | 
 | 1671 | 		goto out; | 
 | 1672 | 	} | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1673 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1674 | 	err = graft_tree(mnt, path); | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1675 | 	if (err) { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1676 | 		br_write_lock(&vfsmount_lock); | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 1677 | 		umount_tree(mnt, 0, &umount_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1678 | 		br_write_unlock(&vfsmount_lock); | 
| Ram Pai | 5b83d2c | 2005-11-07 17:16:29 -0500 | [diff] [blame] | 1679 | 	} | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1680 | out2: | 
 | 1681 | 	unlock_mount(path); | 
 | 1682 | 	release_mounts(&umount_list); | 
| Al Viro | ccd48bc | 2005-11-07 17:15:04 -0500 | [diff] [blame] | 1683 | out: | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1684 | 	path_put(&old_path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1685 | 	return err; | 
 | 1686 | } | 
 | 1687 |  | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 1688 | static int change_mount_flags(struct vfsmount *mnt, int ms_flags) | 
 | 1689 | { | 
 | 1690 | 	int error = 0; | 
 | 1691 | 	int readonly_request = 0; | 
 | 1692 |  | 
 | 1693 | 	if (ms_flags & MS_RDONLY) | 
 | 1694 | 		readonly_request = 1; | 
 | 1695 | 	if (readonly_request == __mnt_is_readonly(mnt)) | 
 | 1696 | 		return 0; | 
 | 1697 |  | 
 | 1698 | 	if (readonly_request) | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 1699 | 		error = mnt_make_readonly(real_mount(mnt)); | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 1700 | 	else | 
| Al Viro | 83adc75 | 2011-11-24 22:37:54 -0500 | [diff] [blame] | 1701 | 		__mnt_unmake_readonly(real_mount(mnt)); | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 1702 | 	return error; | 
 | 1703 | } | 
 | 1704 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1705 | /* | 
 | 1706 |  * change filesystem flags. dir should be a physical root of filesystem. | 
 | 1707 |  * If you've mounted a non-root directory somewhere and want to do remount | 
 | 1708 |  * on it - tough luck. | 
 | 1709 |  */ | 
| Al Viro | 0a0d8a4 | 2008-08-02 00:55:27 -0400 | [diff] [blame] | 1710 | static int do_remount(struct path *path, int flags, int mnt_flags, | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1711 | 		      void *data) | 
 | 1712 | { | 
 | 1713 | 	int err; | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1714 | 	struct super_block *sb = path->mnt->mnt_sb; | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1715 | 	struct mount *mnt = real_mount(path->mnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1716 |  | 
 | 1717 | 	if (!capable(CAP_SYS_ADMIN)) | 
 | 1718 | 		return -EPERM; | 
 | 1719 |  | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1720 | 	if (!check_mnt(mnt)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1721 | 		return -EINVAL; | 
 | 1722 |  | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1723 | 	if (path->dentry != path->mnt->mnt_root) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1724 | 		return -EINVAL; | 
 | 1725 |  | 
| Eric Paris | ff36fe2 | 2011-03-03 16:09:14 -0500 | [diff] [blame] | 1726 | 	err = security_sb_remount(sb, data); | 
 | 1727 | 	if (err) | 
 | 1728 | 		return err; | 
 | 1729 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1730 | 	down_write(&sb->s_umount); | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 1731 | 	if (flags & MS_BIND) | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1732 | 		err = change_mount_flags(path->mnt, flags); | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 1733 | 	else { | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 1734 | 		err = do_remount_sb(sb, flags, data, 0); | 
| Daniel Rosenberg | 89bf8ae | 2016-10-26 15:29:51 -0700 | [diff] [blame^] | 1735 | 		br_write_lock(&vfsmount_lock); | 
 | 1736 | 		propagate_remount(mnt); | 
 | 1737 | 		br_write_unlock(&vfsmount_lock); | 
 | 1738 | 	} | 
| Al Viro | 7b43a79 | 2010-01-16 13:01:26 -0500 | [diff] [blame] | 1739 | 	if (!err) { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1740 | 		br_write_lock(&vfsmount_lock); | 
| Eric W. Biederman | 555172d | 2014-07-28 16:26:53 -0700 | [diff] [blame] | 1741 | 		mnt_flags |= mnt->mnt.mnt_flags & ~MNT_USER_SETTABLE_MASK; | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1742 | 		mnt->mnt.mnt_flags = mnt_flags; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1743 | 		br_write_unlock(&vfsmount_lock); | 
| Al Viro | 7b43a79 | 2010-01-16 13:01:26 -0500 | [diff] [blame] | 1744 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1745 | 	up_write(&sb->s_umount); | 
| Dan Williams | 0e55a7c | 2008-09-26 19:01:20 -0700 | [diff] [blame] | 1746 | 	if (!err) { | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1747 | 		br_write_lock(&vfsmount_lock); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1748 | 		touch_mnt_namespace(mnt->mnt_ns); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1749 | 		br_write_unlock(&vfsmount_lock); | 
| Dan Williams | 0e55a7c | 2008-09-26 19:01:20 -0700 | [diff] [blame] | 1750 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1751 | 	return err; | 
 | 1752 | } | 
 | 1753 |  | 
| Al Viro | cbbe362 | 2011-11-24 20:01:19 -0500 | [diff] [blame] | 1754 | static inline int tree_contains_unbindable(struct mount *mnt) | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1755 | { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 1756 | 	struct mount *p; | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 1757 | 	for (p = mnt; p; p = next_mnt(p, mnt)) { | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1758 | 		if (IS_MNT_UNBINDABLE(p)) | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1759 | 			return 1; | 
 | 1760 | 	} | 
 | 1761 | 	return 0; | 
 | 1762 | } | 
 | 1763 |  | 
| Al Viro | ddaa16d | 2012-10-11 11:42:01 -0400 | [diff] [blame] | 1764 | static int do_move_mount(struct path *path, const char *old_name) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1765 | { | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1766 | 	struct path old_path, parent_path; | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 1767 | 	struct mount *p; | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1768 | 	struct mount *old; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1769 | 	int err = 0; | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1770 | 	if (!ns_capable(real_mount(path->mnt)->mnt_ns->user_ns, CAP_SYS_ADMIN)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1771 | 		return -EPERM; | 
 | 1772 | 	if (!old_name || !*old_name) | 
 | 1773 | 		return -EINVAL; | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1774 | 	err = kern_path(old_name, LOOKUP_FOLLOW, &old_path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1775 | 	if (err) | 
 | 1776 | 		return err; | 
 | 1777 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1778 | 	err = lock_mount(path); | 
| David Howells | cc53ce5 | 2011-01-14 18:45:26 +0000 | [diff] [blame] | 1779 | 	if (err < 0) | 
 | 1780 | 		goto out; | 
 | 1781 |  | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1782 | 	old = real_mount(old_path.mnt); | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1783 | 	p = real_mount(path->mnt); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 1784 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1785 | 	err = -EINVAL; | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1786 | 	if (!check_mnt(p) || !check_mnt(old)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1787 | 		goto out1; | 
 | 1788 |  | 
| Alexey Dobriyan | f3da392 | 2009-05-04 03:32:03 +0400 | [diff] [blame] | 1789 | 	if (d_unlinked(path->dentry)) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1790 | 		goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1791 |  | 
 | 1792 | 	err = -EINVAL; | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1793 | 	if (old_path.dentry != old_path.mnt->mnt_root) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1794 | 		goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1795 |  | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 1796 | 	if (!mnt_has_parent(old)) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1797 | 		goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1798 |  | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1799 | 	if (S_ISDIR(path->dentry->d_inode->i_mode) != | 
 | 1800 | 	      S_ISDIR(old_path.dentry->d_inode->i_mode)) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1801 | 		goto out1; | 
 | 1802 | 	/* | 
 | 1803 | 	 * Don't move a mount residing in a shared parent. | 
 | 1804 | 	 */ | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1805 | 	if (IS_MNT_SHARED(old->mnt_parent)) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1806 | 		goto out1; | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1807 | 	/* | 
 | 1808 | 	 * Don't move a mount tree containing unbindable mounts to a destination | 
 | 1809 | 	 * mount which is shared. | 
 | 1810 | 	 */ | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1811 | 	if (IS_MNT_SHARED(p) && tree_contains_unbindable(old)) | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 1812 | 		goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1813 | 	err = -ELOOP; | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 1814 | 	for (; mnt_has_parent(p); p = p->mnt_parent) | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 1815 | 		if (p == old) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1816 | 			goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1817 |  | 
| Al Viro | 0fb54e5 | 2011-11-24 19:59:16 -0500 | [diff] [blame] | 1818 | 	err = attach_recursive_mnt(old, path, &parent_path); | 
| Jan Blunck | 4ac9137 | 2008-02-14 19:34:32 -0800 | [diff] [blame] | 1819 | 	if (err) | 
| Ram Pai | 2144440 | 2005-11-07 17:20:03 -0500 | [diff] [blame] | 1820 | 		goto out1; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1821 |  | 
 | 1822 | 	/* if the mount is moved, it should no longer be expire | 
 | 1823 | 	 * automatically */ | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1824 | 	list_del_init(&old->mnt_expire); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1825 | out1: | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1826 | 	unlock_mount(path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1827 | out: | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1828 | 	if (!err) | 
| Al Viro | 1a39068 | 2008-03-21 20:48:19 -0400 | [diff] [blame] | 1829 | 		path_put(&parent_path); | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 1830 | 	path_put(&old_path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1831 | 	return err; | 
 | 1832 | } | 
 | 1833 |  | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1834 | static struct vfsmount *fs_set_subtype(struct vfsmount *mnt, const char *fstype) | 
 | 1835 | { | 
 | 1836 | 	int err; | 
 | 1837 | 	const char *subtype = strchr(fstype, '.'); | 
 | 1838 | 	if (subtype) { | 
 | 1839 | 		subtype++; | 
 | 1840 | 		err = -EINVAL; | 
 | 1841 | 		if (!subtype[0]) | 
 | 1842 | 			goto err; | 
 | 1843 | 	} else | 
 | 1844 | 		subtype = ""; | 
 | 1845 |  | 
 | 1846 | 	mnt->mnt_sb->s_subtype = kstrdup(subtype, GFP_KERNEL); | 
 | 1847 | 	err = -ENOMEM; | 
 | 1848 | 	if (!mnt->mnt_sb->s_subtype) | 
 | 1849 | 		goto err; | 
 | 1850 | 	return mnt; | 
 | 1851 |  | 
 | 1852 |  err: | 
 | 1853 | 	mntput(mnt); | 
 | 1854 | 	return ERR_PTR(err); | 
 | 1855 | } | 
 | 1856 |  | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1857 | /* | 
 | 1858 |  * add a mount into a namespace's mount tree | 
 | 1859 |  */ | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1860 | static int do_add_mount(struct mount *newmnt, struct path *path, int mnt_flags) | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1861 | { | 
 | 1862 | 	int err; | 
 | 1863 |  | 
 | 1864 | 	mnt_flags &= ~(MNT_SHARED | MNT_WRITE_HOLD | MNT_INTERNAL); | 
 | 1865 |  | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1866 | 	err = lock_mount(path); | 
 | 1867 | 	if (err) | 
 | 1868 | 		return err; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1869 |  | 
 | 1870 | 	err = -EINVAL; | 
| Al Viro | 561d387 | 2012-09-21 08:19:02 -0400 | [diff] [blame] | 1871 | 	if (unlikely(!check_mnt(real_mount(path->mnt)))) { | 
 | 1872 | 		/* that's acceptable only for automounts done in private ns */ | 
 | 1873 | 		if (!(mnt_flags & MNT_SHRINKABLE)) | 
 | 1874 | 			goto unlock; | 
 | 1875 | 		/* ... and for those we'd better have mountpoint still alive */ | 
 | 1876 | 		if (!real_mount(path->mnt)->mnt_ns) | 
 | 1877 | 			goto unlock; | 
 | 1878 | 	} | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1879 |  | 
 | 1880 | 	/* Refuse the same filesystem on the same mount point */ | 
 | 1881 | 	err = -EBUSY; | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1882 | 	if (path->mnt->mnt_sb == newmnt->mnt.mnt_sb && | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1883 | 	    path->mnt->mnt_root == path->dentry) | 
 | 1884 | 		goto unlock; | 
 | 1885 |  | 
 | 1886 | 	err = -EINVAL; | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1887 | 	if (S_ISLNK(newmnt->mnt.mnt_root->d_inode->i_mode)) | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1888 | 		goto unlock; | 
 | 1889 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1890 | 	newmnt->mnt.mnt_flags = mnt_flags; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1891 | 	err = graft_tree(newmnt, path); | 
 | 1892 |  | 
 | 1893 | unlock: | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 1894 | 	unlock_mount(path); | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 1895 | 	return err; | 
 | 1896 | } | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1897 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1898 | /* | 
 | 1899 |  * create a new mount for userspace and request it to be added into the | 
 | 1900 |  * namespace's tree | 
 | 1901 |  */ | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1902 | static int do_new_mount(struct path *path, const char *fstype, int flags, | 
| Al Viro | ddaa16d | 2012-10-11 11:42:01 -0400 | [diff] [blame] | 1903 | 			int mnt_flags, const char *name, void *data) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1904 | { | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1905 | 	struct file_system_type *type; | 
 | 1906 | 	struct user_namespace *user_ns; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1907 | 	struct vfsmount *mnt; | 
| Al Viro | 15f9a3f | 2011-01-17 01:41:58 -0500 | [diff] [blame] | 1908 | 	int err; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1909 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1910 | 	if (!fstype) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1911 | 		return -EINVAL; | 
 | 1912 |  | 
 | 1913 | 	/* we need capabilities... */ | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1914 | 	user_ns = real_mount(path->mnt)->mnt_ns->user_ns; | 
 | 1915 | 	if (!ns_capable(user_ns, CAP_SYS_ADMIN)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1916 | 		return -EPERM; | 
 | 1917 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 1918 | 	type = get_fs_type(fstype); | 
 | 1919 | 	if (!type) | 
 | 1920 | 		return -ENODEV; | 
 | 1921 |  | 
 | 1922 | 	if (user_ns != &init_user_ns) { | 
 | 1923 | 		if (!(type->fs_flags & FS_USERNS_MOUNT)) { | 
 | 1924 | 			put_filesystem(type); | 
 | 1925 | 			return -EPERM; | 
 | 1926 | 		} | 
 | 1927 | 		/* Only in special cases allow devices from mounts | 
 | 1928 | 		 * created outside the initial user namespace. | 
 | 1929 | 		 */ | 
 | 1930 | 		if (!(type->fs_flags & FS_USERNS_DEV_MOUNT)) { | 
 | 1931 | 			flags |= MS_NODEV; | 
 | 1932 | 			mnt_flags |= MNT_NODEV; | 
 | 1933 | 		} | 
 | 1934 | 	} | 
 | 1935 |  | 
 | 1936 | 	mnt = vfs_kern_mount(type, flags, name, data); | 
 | 1937 | 	if (!IS_ERR(mnt) && (type->fs_flags & FS_HAS_SUBTYPE) && | 
 | 1938 | 	    !mnt->mnt_sb->s_subtype) | 
 | 1939 | 		mnt = fs_set_subtype(mnt, fstype); | 
 | 1940 |  | 
 | 1941 | 	put_filesystem(type); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1942 | 	if (IS_ERR(mnt)) | 
 | 1943 | 		return PTR_ERR(mnt); | 
 | 1944 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1945 | 	err = do_add_mount(real_mount(mnt), path, mnt_flags); | 
| Al Viro | 15f9a3f | 2011-01-17 01:41:58 -0500 | [diff] [blame] | 1946 | 	if (err) | 
 | 1947 | 		mntput(mnt); | 
 | 1948 | 	return err; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1949 | } | 
 | 1950 |  | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1951 | int finish_automount(struct vfsmount *m, struct path *path) | 
 | 1952 | { | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1953 | 	struct mount *mnt = real_mount(m); | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1954 | 	int err; | 
 | 1955 | 	/* The new mount record should have at least 2 refs to prevent it being | 
 | 1956 | 	 * expired before we get a chance to add it | 
 | 1957 | 	 */ | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1958 | 	BUG_ON(mnt_get_count(mnt) < 2); | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1959 |  | 
 | 1960 | 	if (m->mnt_sb == path->mnt->mnt_sb && | 
 | 1961 | 	    m->mnt_root == path->dentry) { | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1962 | 		err = -ELOOP; | 
 | 1963 | 		goto fail; | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1964 | 	} | 
 | 1965 |  | 
| Al Viro | 95bc5f2 | 2011-11-25 00:30:56 -0500 | [diff] [blame] | 1966 | 	err = do_add_mount(mnt, path, path->mnt->mnt_flags | MNT_SHRINKABLE); | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1967 | 	if (!err) | 
 | 1968 | 		return 0; | 
 | 1969 | fail: | 
 | 1970 | 	/* remove m from any expiration list it may be on */ | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1971 | 	if (!list_empty(&mnt->mnt_expire)) { | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1972 | 		down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1973 | 		br_write_lock(&vfsmount_lock); | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1974 | 		list_del_init(&mnt->mnt_expire); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1975 | 		br_write_unlock(&vfsmount_lock); | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1976 | 		up_write(&namespace_sem); | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1977 | 	} | 
| Al Viro | b1e75df | 2011-01-17 01:47:59 -0500 | [diff] [blame] | 1978 | 	mntput(m); | 
 | 1979 | 	mntput(m); | 
| Al Viro | 19a167a | 2011-01-17 01:35:23 -0500 | [diff] [blame] | 1980 | 	return err; | 
 | 1981 | } | 
 | 1982 |  | 
| David Howells | ea5b778 | 2011-01-14 19:10:03 +0000 | [diff] [blame] | 1983 | /** | 
 | 1984 |  * mnt_set_expiry - Put a mount on an expiration list | 
 | 1985 |  * @mnt: The mount to list. | 
 | 1986 |  * @expiry_list: The list to add the mount to. | 
 | 1987 |  */ | 
 | 1988 | void mnt_set_expiry(struct vfsmount *mnt, struct list_head *expiry_list) | 
 | 1989 | { | 
 | 1990 | 	down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1991 | 	br_write_lock(&vfsmount_lock); | 
| David Howells | ea5b778 | 2011-01-14 19:10:03 +0000 | [diff] [blame] | 1992 |  | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 1993 | 	list_add_tail(&real_mount(mnt)->mnt_expire, expiry_list); | 
| David Howells | ea5b778 | 2011-01-14 19:10:03 +0000 | [diff] [blame] | 1994 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 1995 | 	br_write_unlock(&vfsmount_lock); | 
| David Howells | ea5b778 | 2011-01-14 19:10:03 +0000 | [diff] [blame] | 1996 | 	up_write(&namespace_sem); | 
 | 1997 | } | 
 | 1998 | EXPORT_SYMBOL(mnt_set_expiry); | 
 | 1999 |  | 
 | 2000 | /* | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2001 |  * process a list of expirable mountpoints with the intent of discarding any | 
 | 2002 |  * mountpoints that aren't in use and haven't been touched since last we came | 
 | 2003 |  * here | 
 | 2004 |  */ | 
 | 2005 | void mark_mounts_for_expiry(struct list_head *mounts) | 
 | 2006 | { | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 2007 | 	struct mount *mnt, *next; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2008 | 	LIST_HEAD(graveyard); | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2009 | 	LIST_HEAD(umounts); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2010 |  | 
 | 2011 | 	if (list_empty(mounts)) | 
 | 2012 | 		return; | 
 | 2013 |  | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2014 | 	down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2015 | 	br_write_lock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2016 |  | 
 | 2017 | 	/* extract from the expiration list every vfsmount that matches the | 
 | 2018 | 	 * following criteria: | 
 | 2019 | 	 * - only referenced by its parent vfsmount | 
 | 2020 | 	 * - still marked for expiry (marked on the last call here; marks are | 
 | 2021 | 	 *   cleared by mntput()) | 
 | 2022 | 	 */ | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 2023 | 	list_for_each_entry_safe(mnt, next, mounts, mnt_expire) { | 
| Al Viro | 863d684 | 2011-11-25 00:57:42 -0500 | [diff] [blame] | 2024 | 		if (!xchg(&mnt->mnt_expiry_mark, 1) || | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 2025 | 			propagate_mount_busy(mnt, 1)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2026 | 			continue; | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 2027 | 		list_move(&mnt->mnt_expire, &graveyard); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2028 | 	} | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2029 | 	while (!list_empty(&graveyard)) { | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 2030 | 		mnt = list_first_entry(&graveyard, struct mount, mnt_expire); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 2031 | 		touch_mnt_namespace(mnt->mnt_ns); | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2032 | 		umount_tree(mnt, 1, &umounts); | 
 | 2033 | 	} | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2034 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2035 | 	up_write(&namespace_sem); | 
 | 2036 |  | 
 | 2037 | 	release_mounts(&umounts); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2038 | } | 
 | 2039 |  | 
 | 2040 | EXPORT_SYMBOL_GPL(mark_mounts_for_expiry); | 
 | 2041 |  | 
 | 2042 | /* | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2043 |  * Ripoff of 'select_parent()' | 
 | 2044 |  * | 
 | 2045 |  * search the list of submounts for a given mountpoint, and move any | 
 | 2046 |  * shrinkable submounts to the 'graveyard' list. | 
 | 2047 |  */ | 
| Al Viro | 692afc3 | 2011-11-24 21:15:14 -0500 | [diff] [blame] | 2048 | static int select_submounts(struct mount *parent, struct list_head *graveyard) | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2049 | { | 
| Al Viro | 692afc3 | 2011-11-24 21:15:14 -0500 | [diff] [blame] | 2050 | 	struct mount *this_parent = parent; | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2051 | 	struct list_head *next; | 
 | 2052 | 	int found = 0; | 
 | 2053 |  | 
 | 2054 | repeat: | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 2055 | 	next = this_parent->mnt_mounts.next; | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2056 | resume: | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 2057 | 	while (next != &this_parent->mnt_mounts) { | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2058 | 		struct list_head *tmp = next; | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 2059 | 		struct mount *mnt = list_entry(tmp, struct mount, mnt_child); | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2060 |  | 
 | 2061 | 		next = tmp->next; | 
| Al Viro | 692afc3 | 2011-11-24 21:15:14 -0500 | [diff] [blame] | 2062 | 		if (!(mnt->mnt.mnt_flags & MNT_SHRINKABLE)) | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2063 | 			continue; | 
 | 2064 | 		/* | 
 | 2065 | 		 * Descend a level if the d_mounts list is non-empty. | 
 | 2066 | 		 */ | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 2067 | 		if (!list_empty(&mnt->mnt_mounts)) { | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2068 | 			this_parent = mnt; | 
 | 2069 | 			goto repeat; | 
 | 2070 | 		} | 
 | 2071 |  | 
| Al Viro | 1ab5973 | 2011-11-24 21:35:16 -0500 | [diff] [blame] | 2072 | 		if (!propagate_mount_busy(mnt, 1)) { | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 2073 | 			list_move_tail(&mnt->mnt_expire, graveyard); | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2074 | 			found++; | 
 | 2075 | 		} | 
 | 2076 | 	} | 
 | 2077 | 	/* | 
 | 2078 | 	 * All done at this level ... ascend and resume the search | 
 | 2079 | 	 */ | 
 | 2080 | 	if (this_parent != parent) { | 
| Al Viro | 6b41d53 | 2011-11-24 23:24:33 -0500 | [diff] [blame] | 2081 | 		next = this_parent->mnt_child.next; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 2082 | 		this_parent = this_parent->mnt_parent; | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2083 | 		goto resume; | 
 | 2084 | 	} | 
 | 2085 | 	return found; | 
 | 2086 | } | 
 | 2087 |  | 
 | 2088 | /* | 
 | 2089 |  * process a list of expirable mountpoints with the intent of discarding any | 
 | 2090 |  * submounts of a specific parent mountpoint | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 2091 |  * | 
 | 2092 |  * vfsmount_lock must be held for write | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2093 |  */ | 
| Al Viro | 692afc3 | 2011-11-24 21:15:14 -0500 | [diff] [blame] | 2094 | static void shrink_submounts(struct mount *mnt, struct list_head *umounts) | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2095 | { | 
 | 2096 | 	LIST_HEAD(graveyard); | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 2097 | 	struct mount *m; | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2098 |  | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2099 | 	/* extract submounts of 'mountpoint' from the expiration list */ | 
| Al Viro | c35038b | 2008-03-22 00:46:23 -0400 | [diff] [blame] | 2100 | 	while (select_submounts(mnt, &graveyard)) { | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2101 | 		while (!list_empty(&graveyard)) { | 
| Al Viro | 761d5c3 | 2011-11-24 21:07:43 -0500 | [diff] [blame] | 2102 | 			m = list_first_entry(&graveyard, struct mount, | 
| Al Viro | 6776db3d | 2011-11-25 00:22:05 -0500 | [diff] [blame] | 2103 | 						mnt_expire); | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 2104 | 			touch_mnt_namespace(m->mnt_ns); | 
| Eric W. Biederman | afef80b | 2008-11-12 13:26:54 -0800 | [diff] [blame] | 2105 | 			umount_tree(m, 1, umounts); | 
| Al Viro | bcc5c7d | 2008-03-22 00:21:53 -0400 | [diff] [blame] | 2106 | 		} | 
 | 2107 | 	} | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2108 | } | 
 | 2109 |  | 
| Trond Myklebust | 5528f911 | 2006-06-09 09:34:17 -0400 | [diff] [blame] | 2110 | /* | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2111 |  * Some copy_from_user() implementations do not return the exact number of | 
 | 2112 |  * bytes remaining to copy on a fault.  But copy_mount_options() requires that. | 
 | 2113 |  * Note that this function differs from copy_from_user() in that it will oops | 
 | 2114 |  * on bad values of `to', rather than returning a short copy. | 
 | 2115 |  */ | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 2116 | static long exact_copy_from_user(void *to, const void __user * from, | 
 | 2117 | 				 unsigned long n) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2118 | { | 
 | 2119 | 	char *t = to; | 
 | 2120 | 	const char __user *f = from; | 
 | 2121 | 	char c; | 
 | 2122 |  | 
 | 2123 | 	if (!access_ok(VERIFY_READ, from, n)) | 
 | 2124 | 		return n; | 
 | 2125 |  | 
 | 2126 | 	while (n) { | 
 | 2127 | 		if (__get_user(c, f)) { | 
 | 2128 | 			memset(t, 0, n); | 
 | 2129 | 			break; | 
 | 2130 | 		} | 
 | 2131 | 		*t++ = c; | 
 | 2132 | 		f++; | 
 | 2133 | 		n--; | 
 | 2134 | 	} | 
 | 2135 | 	return n; | 
 | 2136 | } | 
 | 2137 |  | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 2138 | int copy_mount_options(const void __user * data, unsigned long *where) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2139 | { | 
 | 2140 | 	int i; | 
 | 2141 | 	unsigned long page; | 
 | 2142 | 	unsigned long size; | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 2143 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2144 | 	*where = 0; | 
 | 2145 | 	if (!data) | 
 | 2146 | 		return 0; | 
 | 2147 |  | 
 | 2148 | 	if (!(page = __get_free_page(GFP_KERNEL))) | 
 | 2149 | 		return -ENOMEM; | 
 | 2150 |  | 
 | 2151 | 	/* We only care that *some* data at the address the user | 
 | 2152 | 	 * gave us is valid.  Just in case, we'll zero | 
 | 2153 | 	 * the remainder of the page. | 
 | 2154 | 	 */ | 
 | 2155 | 	/* copy_from_user cannot cross TASK_SIZE ! */ | 
 | 2156 | 	size = TASK_SIZE - (unsigned long)data; | 
 | 2157 | 	if (size > PAGE_SIZE) | 
 | 2158 | 		size = PAGE_SIZE; | 
 | 2159 |  | 
 | 2160 | 	i = size - exact_copy_from_user((void *)page, data, size); | 
 | 2161 | 	if (!i) { | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 2162 | 		free_page(page); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2163 | 		return -EFAULT; | 
 | 2164 | 	} | 
 | 2165 | 	if (i != PAGE_SIZE) | 
 | 2166 | 		memset((char *)page + i, 0, PAGE_SIZE - i); | 
 | 2167 | 	*where = page; | 
 | 2168 | 	return 0; | 
 | 2169 | } | 
 | 2170 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2171 | int copy_mount_string(const void __user *data, char **where) | 
 | 2172 | { | 
 | 2173 | 	char *tmp; | 
 | 2174 |  | 
 | 2175 | 	if (!data) { | 
 | 2176 | 		*where = NULL; | 
 | 2177 | 		return 0; | 
 | 2178 | 	} | 
 | 2179 |  | 
 | 2180 | 	tmp = strndup_user(data, PAGE_SIZE); | 
 | 2181 | 	if (IS_ERR(tmp)) | 
 | 2182 | 		return PTR_ERR(tmp); | 
 | 2183 |  | 
 | 2184 | 	*where = tmp; | 
 | 2185 | 	return 0; | 
 | 2186 | } | 
 | 2187 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2188 | /* | 
 | 2189 |  * Flags is a 32-bit value that allows up to 31 non-fs dependent flags to | 
 | 2190 |  * be given to the mount() call (ie: read-only, no-dev, no-suid etc). | 
 | 2191 |  * | 
 | 2192 |  * data is a (void *) that can point to any structure up to | 
 | 2193 |  * PAGE_SIZE-1 bytes, which can contain arbitrary fs-dependent | 
 | 2194 |  * information (or be NULL). | 
 | 2195 |  * | 
 | 2196 |  * Pre-0.97 versions of mount() didn't have a flags word. | 
 | 2197 |  * When the flags word was introduced its top half was required | 
 | 2198 |  * to have the magic value 0xC0ED, and this remained so until 2.4.0-test9. | 
 | 2199 |  * Therefore, if this magic number is present, it carries no information | 
 | 2200 |  * and must be discarded. | 
 | 2201 |  */ | 
| Al Viro | ddaa16d | 2012-10-11 11:42:01 -0400 | [diff] [blame] | 2202 | long do_mount(const char *dev_name, const char *dir_name, | 
 | 2203 | 		const char *type_page, unsigned long flags, void *data_page) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2204 | { | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2205 | 	struct path path; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2206 | 	int retval = 0; | 
 | 2207 | 	int mnt_flags = 0; | 
 | 2208 |  | 
 | 2209 | 	/* Discard magic */ | 
 | 2210 | 	if ((flags & MS_MGC_MSK) == MS_MGC_VAL) | 
 | 2211 | 		flags &= ~MS_MGC_MSK; | 
 | 2212 |  | 
 | 2213 | 	/* Basic sanity checks */ | 
 | 2214 |  | 
 | 2215 | 	if (!dir_name || !*dir_name || !memchr(dir_name, 0, PAGE_SIZE)) | 
 | 2216 | 		return -EINVAL; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2217 |  | 
 | 2218 | 	if (data_page) | 
 | 2219 | 		((char *)data_page)[PAGE_SIZE - 1] = 0; | 
 | 2220 |  | 
| Tetsuo Handa | a27ab9f | 2009-10-04 21:49:49 +0900 | [diff] [blame] | 2221 | 	/* ... and get the mountpoint */ | 
 | 2222 | 	retval = kern_path(dir_name, LOOKUP_FOLLOW, &path); | 
 | 2223 | 	if (retval) | 
 | 2224 | 		return retval; | 
 | 2225 |  | 
 | 2226 | 	retval = security_sb_mount(dev_name, &path, | 
 | 2227 | 				   type_page, flags, data_page); | 
 | 2228 | 	if (retval) | 
 | 2229 | 		goto dput_out; | 
 | 2230 |  | 
| Andi Kleen | 613cbe3 | 2009-04-19 18:40:43 +0200 | [diff] [blame] | 2231 | 	/* Default to relatime unless overriden */ | 
 | 2232 | 	if (!(flags & MS_NOATIME)) | 
 | 2233 | 		mnt_flags |= MNT_RELATIME; | 
| Matthew Garrett | 0a1c01c | 2009-03-26 17:53:14 +0000 | [diff] [blame] | 2234 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2235 | 	/* Separate the per-mountpoint flags */ | 
 | 2236 | 	if (flags & MS_NOSUID) | 
 | 2237 | 		mnt_flags |= MNT_NOSUID; | 
 | 2238 | 	if (flags & MS_NODEV) | 
 | 2239 | 		mnt_flags |= MNT_NODEV; | 
 | 2240 | 	if (flags & MS_NOEXEC) | 
 | 2241 | 		mnt_flags |= MNT_NOEXEC; | 
| Christoph Hellwig | fc33a7b | 2006-01-09 20:52:17 -0800 | [diff] [blame] | 2242 | 	if (flags & MS_NOATIME) | 
 | 2243 | 		mnt_flags |= MNT_NOATIME; | 
 | 2244 | 	if (flags & MS_NODIRATIME) | 
 | 2245 | 		mnt_flags |= MNT_NODIRATIME; | 
| Matthew Garrett | d0adde5 | 2009-03-26 17:49:56 +0000 | [diff] [blame] | 2246 | 	if (flags & MS_STRICTATIME) | 
 | 2247 | 		mnt_flags &= ~(MNT_RELATIME | MNT_NOATIME); | 
| Dave Hansen | 2e4b7fc | 2008-02-15 14:38:00 -0800 | [diff] [blame] | 2248 | 	if (flags & MS_RDONLY) | 
 | 2249 | 		mnt_flags |= MNT_READONLY; | 
| Christoph Hellwig | fc33a7b | 2006-01-09 20:52:17 -0800 | [diff] [blame] | 2250 |  | 
| Al Viro | 7a4dec5 | 2010-08-09 12:05:43 -0400 | [diff] [blame] | 2251 | 	flags &= ~(MS_NOSUID | MS_NOEXEC | MS_NODEV | MS_ACTIVE | MS_BORN | | 
| Matthew Garrett | d0adde5 | 2009-03-26 17:49:56 +0000 | [diff] [blame] | 2252 | 		   MS_NOATIME | MS_NODIRATIME | MS_RELATIME| MS_KERNMOUNT | | 
 | 2253 | 		   MS_STRICTATIME); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2254 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2255 | 	if (flags & MS_REMOUNT) | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2256 | 		retval = do_remount(&path, flags & ~MS_REMOUNT, mnt_flags, | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2257 | 				    data_page); | 
 | 2258 | 	else if (flags & MS_BIND) | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2259 | 		retval = do_loopback(&path, dev_name, flags & MS_REC); | 
| Ram Pai | 9676f0c | 2005-11-07 17:21:20 -0500 | [diff] [blame] | 2260 | 	else if (flags & (MS_SHARED | MS_PRIVATE | MS_SLAVE | MS_UNBINDABLE)) | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2261 | 		retval = do_change_type(&path, flags); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2262 | 	else if (flags & MS_MOVE) | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2263 | 		retval = do_move_mount(&path, dev_name); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2264 | 	else | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2265 | 		retval = do_new_mount(&path, type_page, flags, mnt_flags, | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2266 | 				      dev_name, data_page); | 
 | 2267 | dput_out: | 
| Al Viro | 2d92ab3 | 2008-08-02 00:51:11 -0400 | [diff] [blame] | 2268 | 	path_put(&path); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2269 | 	return retval; | 
 | 2270 | } | 
 | 2271 |  | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2272 |  | 
 | 2273 | static void free_mnt_ns(struct mnt_namespace *ns) | 
 | 2274 | { | 
| Eric W. Biederman | 80f4b77 | 2015-09-02 16:12:17 +0530 | [diff] [blame] | 2275 | 	proc_free_inum(ns->proc_inum); | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2276 | 	put_user_ns(ns->user_ns); | 
 | 2277 | 	kfree(ns); | 
 | 2278 | } | 
 | 2279 |  | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2280 | /* | 
 | 2281 |  * Assign a sequence number so we can detect when we attempt to bind | 
 | 2282 |  * mount a reference to an older mount namespace into the current | 
 | 2283 |  * mount namespace, preventing reference counting loops.  A 64bit | 
 | 2284 |  * number incrementing at 10Ghz will take 12,427 years to wrap which | 
 | 2285 |  * is effectively never, so we can ignore the possibility. | 
 | 2286 |  */ | 
 | 2287 | static atomic64_t mnt_ns_seq = ATOMIC64_INIT(1); | 
 | 2288 |  | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2289 | static struct mnt_namespace *alloc_mnt_ns(struct user_namespace *user_ns) | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2290 | { | 
 | 2291 | 	struct mnt_namespace *new_ns; | 
| Eric W. Biederman | 80f4b77 | 2015-09-02 16:12:17 +0530 | [diff] [blame] | 2292 | 	int ret; | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2293 |  | 
 | 2294 | 	new_ns = kmalloc(sizeof(struct mnt_namespace), GFP_KERNEL); | 
 | 2295 | 	if (!new_ns) | 
 | 2296 | 		return ERR_PTR(-ENOMEM); | 
| Eric W. Biederman | 80f4b77 | 2015-09-02 16:12:17 +0530 | [diff] [blame] | 2297 | 	ret = proc_alloc_inum(&new_ns->proc_inum); | 
 | 2298 | 	if (ret) { | 
 | 2299 | 		kfree(new_ns); | 
 | 2300 | 		return ERR_PTR(ret); | 
 | 2301 | 	} | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2302 | 	new_ns->seq = atomic64_add_return(1, &mnt_ns_seq); | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2303 | 	atomic_set(&new_ns->count, 1); | 
 | 2304 | 	new_ns->root = NULL; | 
 | 2305 | 	INIT_LIST_HEAD(&new_ns->list); | 
 | 2306 | 	init_waitqueue_head(&new_ns->poll); | 
 | 2307 | 	new_ns->event = 0; | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2308 | 	new_ns->user_ns = get_user_ns(user_ns); | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2309 | 	return new_ns; | 
 | 2310 | } | 
 | 2311 |  | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2312 | /* | 
 | 2313 |  * Allocate a new namespace structure and populate it with contents | 
 | 2314 |  * copied from the namespace of the passed in task structure. | 
 | 2315 |  */ | 
| Badari Pulavarty | e3222c4 | 2007-05-08 00:25:21 -0700 | [diff] [blame] | 2316 | static struct mnt_namespace *dup_mnt_ns(struct mnt_namespace *mnt_ns, | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2317 | 		struct user_namespace *user_ns, struct fs_struct *fs) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2318 | { | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2319 | 	struct mnt_namespace *new_ns; | 
| Al Viro | 7f2da1e | 2008-05-10 20:44:54 -0400 | [diff] [blame] | 2320 | 	struct vfsmount *rootmnt = NULL, *pwdmnt = NULL; | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 2321 | 	struct mount *p, *q; | 
| Al Viro | be08d6d | 2011-12-06 13:32:36 -0500 | [diff] [blame] | 2322 | 	struct mount *old = mnt_ns->root; | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 2323 | 	struct mount *new; | 
| Eric W. Biederman | 4e8a01a | 2015-09-02 15:09:11 +0530 | [diff] [blame] | 2324 | 	int copy_flags; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2325 |  | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2326 | 	new_ns = alloc_mnt_ns(user_ns); | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2327 | 	if (IS_ERR(new_ns)) | 
 | 2328 | 		return new_ns; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2329 |  | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2330 | 	down_write(&namespace_sem); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2331 | 	/* First pass: copy the tree topology */ | 
| Eric W. Biederman | 4e8a01a | 2015-09-02 15:09:11 +0530 | [diff] [blame] | 2332 | 	copy_flags = CL_COPY_ALL | CL_EXPIRE; | 
 | 2333 | 	if (user_ns != mnt_ns->user_ns) | 
 | 2334 | 		copy_flags |= CL_SHARED_TO_SLAVE; | 
 | 2335 | 	new = copy_tree(old, old->mnt.mnt_root, copy_flags); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 2336 | 	if (IS_ERR(new)) { | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2337 | 		up_write(&namespace_sem); | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2338 | 		free_mnt_ns(new_ns); | 
| David Howells | be4a300 | 2012-06-25 12:55:18 +0100 | [diff] [blame] | 2339 | 		return ERR_CAST(new); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2340 | 	} | 
| Al Viro | be08d6d | 2011-12-06 13:32:36 -0500 | [diff] [blame] | 2341 | 	new_ns->root = new; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2342 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 2343 | 	list_add_tail(&new_ns->list, &new->mnt_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2344 | 	br_write_unlock(&vfsmount_lock); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2345 |  | 
 | 2346 | 	/* | 
 | 2347 | 	 * Second pass: switch the tsk->fs->* elements and mark new vfsmounts | 
 | 2348 | 	 * as belonging to new namespace.  We have already acquired a private | 
 | 2349 | 	 * fs_struct, so tsk->fs->lock is not needed. | 
 | 2350 | 	 */ | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 2351 | 	p = old; | 
| Al Viro | cb338d0 | 2011-11-24 20:55:08 -0500 | [diff] [blame] | 2352 | 	q = new; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2353 | 	while (p) { | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 2354 | 		q->mnt_ns = new_ns; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2355 | 		if (fs) { | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 2356 | 			if (&p->mnt == fs->root.mnt) { | 
 | 2357 | 				fs->root.mnt = mntget(&q->mnt); | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 2358 | 				rootmnt = &p->mnt; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2359 | 			} | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 2360 | 			if (&p->mnt == fs->pwd.mnt) { | 
 | 2361 | 				fs->pwd.mnt = mntget(&q->mnt); | 
| Al Viro | 315fc83 | 2011-11-24 18:57:30 -0500 | [diff] [blame] | 2362 | 				pwdmnt = &p->mnt; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2363 | 			} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2364 | 		} | 
| Al Viro | 909b0a8 | 2011-11-25 03:06:56 -0500 | [diff] [blame] | 2365 | 		p = next_mnt(p, old); | 
 | 2366 | 		q = next_mnt(q, new); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2367 | 	} | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2368 | 	up_write(&namespace_sem); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2369 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2370 | 	if (rootmnt) | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 2371 | 		mntput(rootmnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2372 | 	if (pwdmnt) | 
| Al Viro | f03c659 | 2011-01-14 22:30:21 -0500 | [diff] [blame] | 2373 | 		mntput(pwdmnt); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2374 |  | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2375 | 	return new_ns; | 
 | 2376 | } | 
 | 2377 |  | 
| Eric W. Biederman | 213dd26 | 2007-07-15 23:41:15 -0700 | [diff] [blame] | 2378 | struct mnt_namespace *copy_mnt_ns(unsigned long flags, struct mnt_namespace *ns, | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2379 | 		 struct user_namespace *user_ns, struct fs_struct *new_fs) | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2380 | { | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2381 | 	struct mnt_namespace *new_ns; | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2382 |  | 
| Badari Pulavarty | e3222c4 | 2007-05-08 00:25:21 -0700 | [diff] [blame] | 2383 | 	BUG_ON(!ns); | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2384 | 	get_mnt_ns(ns); | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2385 |  | 
 | 2386 | 	if (!(flags & CLONE_NEWNS)) | 
| Badari Pulavarty | e3222c4 | 2007-05-08 00:25:21 -0700 | [diff] [blame] | 2387 | 		return ns; | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2388 |  | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2389 | 	new_ns = dup_mnt_ns(ns, user_ns, new_fs); | 
| JANAK DESAI | 741a295 | 2006-02-07 12:59:00 -0800 | [diff] [blame] | 2390 |  | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2391 | 	put_mnt_ns(ns); | 
| Badari Pulavarty | e3222c4 | 2007-05-08 00:25:21 -0700 | [diff] [blame] | 2392 | 	return new_ns; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2393 | } | 
 | 2394 |  | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2395 | /** | 
 | 2396 |  * create_mnt_ns - creates a private namespace and adds a root filesystem | 
 | 2397 |  * @mnt: pointer to the new root filesystem mountpoint | 
 | 2398 |  */ | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 2399 | static struct mnt_namespace *create_mnt_ns(struct vfsmount *m) | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2400 | { | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2401 | 	struct mnt_namespace *new_ns = alloc_mnt_ns(&init_user_ns); | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2402 | 	if (!IS_ERR(new_ns)) { | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 2403 | 		struct mount *mnt = real_mount(m); | 
 | 2404 | 		mnt->mnt_ns = new_ns; | 
| Al Viro | be08d6d | 2011-12-06 13:32:36 -0500 | [diff] [blame] | 2405 | 		new_ns->root = mnt; | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 2406 | 		list_add(&new_ns->list, &mnt->mnt_list); | 
| Al Viro | c133449 | 2011-11-16 16:12:14 -0500 | [diff] [blame] | 2407 | 	} else { | 
| Al Viro | 1a4eeaf | 2011-11-25 02:19:55 -0500 | [diff] [blame] | 2408 | 		mntput(m); | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2409 | 	} | 
 | 2410 | 	return new_ns; | 
 | 2411 | } | 
| Trond Myklebust | cf8d2c1 | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2412 |  | 
| Al Viro | ea441d1 | 2011-11-16 21:43:59 -0500 | [diff] [blame] | 2413 | struct dentry *mount_subtree(struct vfsmount *mnt, const char *name) | 
 | 2414 | { | 
 | 2415 | 	struct mnt_namespace *ns; | 
| Al Viro | d31da0f | 2011-11-22 12:31:21 -0500 | [diff] [blame] | 2416 | 	struct super_block *s; | 
| Al Viro | ea441d1 | 2011-11-16 21:43:59 -0500 | [diff] [blame] | 2417 | 	struct path path; | 
 | 2418 | 	int err; | 
 | 2419 |  | 
 | 2420 | 	ns = create_mnt_ns(mnt); | 
 | 2421 | 	if (IS_ERR(ns)) | 
 | 2422 | 		return ERR_CAST(ns); | 
 | 2423 |  | 
 | 2424 | 	err = vfs_path_lookup(mnt->mnt_root, mnt, | 
 | 2425 | 			name, LOOKUP_FOLLOW|LOOKUP_AUTOMOUNT, &path); | 
 | 2426 |  | 
 | 2427 | 	put_mnt_ns(ns); | 
 | 2428 |  | 
 | 2429 | 	if (err) | 
 | 2430 | 		return ERR_PTR(err); | 
 | 2431 |  | 
 | 2432 | 	/* trade a vfsmount reference for active sb one */ | 
| Al Viro | d31da0f | 2011-11-22 12:31:21 -0500 | [diff] [blame] | 2433 | 	s = path.mnt->mnt_sb; | 
 | 2434 | 	atomic_inc(&s->s_active); | 
| Al Viro | ea441d1 | 2011-11-16 21:43:59 -0500 | [diff] [blame] | 2435 | 	mntput(path.mnt); | 
 | 2436 | 	/* lock the sucker */ | 
| Al Viro | d31da0f | 2011-11-22 12:31:21 -0500 | [diff] [blame] | 2437 | 	down_write(&s->s_umount); | 
| Al Viro | ea441d1 | 2011-11-16 21:43:59 -0500 | [diff] [blame] | 2438 | 	/* ... and return the root of (sub)tree on it */ | 
 | 2439 | 	return path.dentry; | 
 | 2440 | } | 
 | 2441 | EXPORT_SYMBOL(mount_subtree); | 
 | 2442 |  | 
| Heiko Carstens | bdc480e | 2009-01-14 14:14:12 +0100 | [diff] [blame] | 2443 | SYSCALL_DEFINE5(mount, char __user *, dev_name, char __user *, dir_name, | 
 | 2444 | 		char __user *, type, unsigned long, flags, void __user *, data) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2445 | { | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2446 | 	int ret; | 
 | 2447 | 	char *kernel_type; | 
 | 2448 | 	char *kernel_dir; | 
 | 2449 | 	char *kernel_dev; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2450 | 	unsigned long data_page; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2451 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2452 | 	ret = copy_mount_string(type, &kernel_type); | 
 | 2453 | 	if (ret < 0) | 
 | 2454 | 		goto out_type; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2455 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2456 | 	kernel_dir = getname(dir_name); | 
 | 2457 | 	if (IS_ERR(kernel_dir)) { | 
 | 2458 | 		ret = PTR_ERR(kernel_dir); | 
 | 2459 | 		goto out_dir; | 
 | 2460 | 	} | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2461 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2462 | 	ret = copy_mount_string(dev_name, &kernel_dev); | 
 | 2463 | 	if (ret < 0) | 
 | 2464 | 		goto out_dev; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2465 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2466 | 	ret = copy_mount_options(data, &data_page); | 
 | 2467 | 	if (ret < 0) | 
 | 2468 | 		goto out_data; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2469 |  | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2470 | 	ret = do_mount(kernel_dev, kernel_dir, kernel_type, flags, | 
 | 2471 | 		(void *) data_page); | 
 | 2472 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2473 | 	free_page(data_page); | 
| Vegard Nossum | eca6f53 | 2009-09-18 13:05:45 -0700 | [diff] [blame] | 2474 | out_data: | 
 | 2475 | 	kfree(kernel_dev); | 
 | 2476 | out_dev: | 
 | 2477 | 	putname(kernel_dir); | 
 | 2478 | out_dir: | 
 | 2479 | 	kfree(kernel_type); | 
 | 2480 | out_type: | 
 | 2481 | 	return ret; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2482 | } | 
 | 2483 |  | 
 | 2484 | /* | 
| Al Viro | afac7cb | 2011-11-23 19:34:49 -0500 | [diff] [blame] | 2485 |  * Return true if path is reachable from root | 
 | 2486 |  * | 
 | 2487 |  * namespace_sem or vfsmount_lock is held | 
 | 2488 |  */ | 
| Al Viro | 643822b | 2011-11-24 22:00:28 -0500 | [diff] [blame] | 2489 | bool is_path_reachable(struct mount *mnt, struct dentry *dentry, | 
| Al Viro | afac7cb | 2011-11-23 19:34:49 -0500 | [diff] [blame] | 2490 | 			 const struct path *root) | 
 | 2491 | { | 
| Al Viro | 643822b | 2011-11-24 22:00:28 -0500 | [diff] [blame] | 2492 | 	while (&mnt->mnt != root->mnt && mnt_has_parent(mnt)) { | 
| Al Viro | a73324d | 2011-11-24 22:25:07 -0500 | [diff] [blame] | 2493 | 		dentry = mnt->mnt_mountpoint; | 
| Al Viro | 0714a53 | 2011-11-24 22:19:58 -0500 | [diff] [blame] | 2494 | 		mnt = mnt->mnt_parent; | 
| Al Viro | afac7cb | 2011-11-23 19:34:49 -0500 | [diff] [blame] | 2495 | 	} | 
| Al Viro | 643822b | 2011-11-24 22:00:28 -0500 | [diff] [blame] | 2496 | 	return &mnt->mnt == root->mnt && is_subdir(dentry, root->dentry); | 
| Al Viro | afac7cb | 2011-11-23 19:34:49 -0500 | [diff] [blame] | 2497 | } | 
 | 2498 |  | 
 | 2499 | int path_is_under(struct path *path1, struct path *path2) | 
 | 2500 | { | 
 | 2501 | 	int res; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2502 | 	br_read_lock(&vfsmount_lock); | 
| Al Viro | 643822b | 2011-11-24 22:00:28 -0500 | [diff] [blame] | 2503 | 	res = is_path_reachable(real_mount(path1->mnt), path1->dentry, path2); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2504 | 	br_read_unlock(&vfsmount_lock); | 
| Al Viro | afac7cb | 2011-11-23 19:34:49 -0500 | [diff] [blame] | 2505 | 	return res; | 
 | 2506 | } | 
 | 2507 | EXPORT_SYMBOL(path_is_under); | 
 | 2508 |  | 
 | 2509 | /* | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2510 |  * pivot_root Semantics: | 
 | 2511 |  * Moves the root file system of the current process to the directory put_old, | 
 | 2512 |  * makes new_root as the new root file system of the current process, and sets | 
 | 2513 |  * root/cwd of all processes which had them on the current root to new_root. | 
 | 2514 |  * | 
 | 2515 |  * Restrictions: | 
 | 2516 |  * The new_root and put_old must be directories, and  must not be on the | 
 | 2517 |  * same file  system as the current process root. The put_old  must  be | 
 | 2518 |  * underneath new_root,  i.e. adding a non-zero number of /.. to the string | 
 | 2519 |  * pointed to by put_old must yield the same directory as new_root. No other | 
 | 2520 |  * file system may be mounted on put_old. After all, new_root is a mountpoint. | 
 | 2521 |  * | 
| Neil Brown | 4a0d11f | 2006-01-08 01:03:18 -0800 | [diff] [blame] | 2522 |  * Also, the current root cannot be on the 'rootfs' (initial ramfs) filesystem. | 
 | 2523 |  * See Documentation/filesystems/ramfs-rootfs-initramfs.txt for alternatives | 
 | 2524 |  * in this situation. | 
 | 2525 |  * | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2526 |  * Notes: | 
 | 2527 |  *  - we don't move root/cwd if they are not at the root (reason: if something | 
 | 2528 |  *    cared enough to change them, it's probably wrong to force them elsewhere) | 
 | 2529 |  *  - it's okay to pick a root that isn't the root of a file system, e.g. | 
 | 2530 |  *    /nfs/my_root where /nfs is the mount point. It must be a mountpoint, | 
 | 2531 |  *    though, so you may need to say mount --bind /nfs/my_root /nfs/my_root | 
 | 2532 |  *    first. | 
 | 2533 |  */ | 
| Heiko Carstens | 3480b25 | 2009-01-14 14:14:16 +0100 | [diff] [blame] | 2534 | SYSCALL_DEFINE2(pivot_root, const char __user *, new_root, | 
 | 2535 | 		const char __user *, put_old) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2536 | { | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2537 | 	struct path new, old, parent_path, root_parent, root; | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 2538 | 	struct mount *new_mnt, *root_mnt; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2539 | 	int error; | 
 | 2540 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 2541 | 	if (!ns_capable(current->nsproxy->mnt_ns->user_ns, CAP_SYS_ADMIN)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2542 | 		return -EPERM; | 
 | 2543 |  | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2544 | 	error = user_path_dir(new_root, &new); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2545 | 	if (error) | 
 | 2546 | 		goto out0; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2547 |  | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2548 | 	error = user_path_dir(put_old, &old); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2549 | 	if (error) | 
 | 2550 | 		goto out1; | 
 | 2551 |  | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2552 | 	error = security_sb_pivotroot(&old, &new); | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2553 | 	if (error) | 
 | 2554 | 		goto out2; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2555 |  | 
| Miklos Szeredi | f7ad3c6 | 2010-08-10 11:41:36 +0200 | [diff] [blame] | 2556 | 	get_fs_root(current->fs, &root); | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2557 | 	error = lock_mount(&old); | 
 | 2558 | 	if (error) | 
 | 2559 | 		goto out3; | 
 | 2560 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2561 | 	error = -EINVAL; | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 2562 | 	new_mnt = real_mount(new.mnt); | 
 | 2563 | 	root_mnt = real_mount(root.mnt); | 
| Al Viro | fc7be13 | 2011-11-25 01:05:37 -0500 | [diff] [blame] | 2564 | 	if (IS_MNT_SHARED(real_mount(old.mnt)) || | 
 | 2565 | 		IS_MNT_SHARED(new_mnt->mnt_parent) || | 
 | 2566 | 		IS_MNT_SHARED(root_mnt->mnt_parent)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2567 | 		goto out4; | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 2568 | 	if (!check_mnt(root_mnt) || !check_mnt(new_mnt)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2569 | 		goto out4; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2570 | 	error = -ENOENT; | 
| Alexey Dobriyan | f3da392 | 2009-05-04 03:32:03 +0400 | [diff] [blame] | 2571 | 	if (d_unlinked(new.dentry)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2572 | 		goto out4; | 
| Alexey Dobriyan | f3da392 | 2009-05-04 03:32:03 +0400 | [diff] [blame] | 2573 | 	if (d_unlinked(old.dentry)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2574 | 		goto out4; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2575 | 	error = -EBUSY; | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2576 | 	if (new.mnt == root.mnt || | 
 | 2577 | 	    old.mnt == root.mnt) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2578 | 		goto out4; /* loop, on the same file system  */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2579 | 	error = -EINVAL; | 
| Al Viro | 8c3ee42 | 2008-03-22 18:00:39 -0400 | [diff] [blame] | 2580 | 	if (root.mnt->mnt_root != root.dentry) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2581 | 		goto out4; /* not a mountpoint */ | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 2582 | 	if (!mnt_has_parent(root_mnt)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2583 | 		goto out4; /* not attached */ | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2584 | 	if (new.mnt->mnt_root != new.dentry) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2585 | 		goto out4; /* not a mountpoint */ | 
| Al Viro | 676da58 | 2011-11-24 21:47:05 -0500 | [diff] [blame] | 2586 | 	if (!mnt_has_parent(new_mnt)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2587 | 		goto out4; /* not attached */ | 
| Jan Blunck | 4ac9137 | 2008-02-14 19:34:32 -0800 | [diff] [blame] | 2588 | 	/* make sure we can reach put_old from new_root */ | 
| Al Viro | 643822b | 2011-11-24 22:00:28 -0500 | [diff] [blame] | 2589 | 	if (!is_path_reachable(real_mount(old.mnt), old.dentry, &new)) | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2590 | 		goto out4; | 
| Eric W. Biederman | 00ae804 | 2014-10-08 10:42:27 -0700 | [diff] [blame] | 2591 | 	/* make certain new is below the root */ | 
 | 2592 | 	if (!is_path_reachable(new_mnt, new.dentry, &root)) | 
 | 2593 | 		goto out4; | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2594 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 2595 | 	detach_mnt(new_mnt, &parent_path); | 
 | 2596 | 	detach_mnt(root_mnt, &root_parent); | 
| Jan Blunck | 4ac9137 | 2008-02-14 19:34:32 -0800 | [diff] [blame] | 2597 | 	/* mount old root on put_old */ | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 2598 | 	attach_mnt(root_mnt, &old); | 
| Jan Blunck | 4ac9137 | 2008-02-14 19:34:32 -0800 | [diff] [blame] | 2599 | 	/* mount new_root on / */ | 
| Al Viro | 419148d | 2011-11-24 19:41:16 -0500 | [diff] [blame] | 2600 | 	attach_mnt(new_mnt, &root_parent); | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2601 | 	touch_mnt_namespace(current->nsproxy->mnt_ns); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2602 | 	br_write_unlock(&vfsmount_lock); | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2603 | 	chroot_fs_refs(&root, &new); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2604 | 	error = 0; | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2605 | out4: | 
 | 2606 | 	unlock_mount(&old); | 
 | 2607 | 	if (!error) { | 
 | 2608 | 		path_put(&root_parent); | 
 | 2609 | 		path_put(&parent_path); | 
 | 2610 | 	} | 
 | 2611 | out3: | 
| Al Viro | 8c3ee42 | 2008-03-22 18:00:39 -0400 | [diff] [blame] | 2612 | 	path_put(&root); | 
| Al Viro | b12cea9 | 2011-03-18 08:55:38 -0400 | [diff] [blame] | 2613 | out2: | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2614 | 	path_put(&old); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2615 | out1: | 
| Al Viro | 2d8f303 | 2008-07-22 09:59:21 -0400 | [diff] [blame] | 2616 | 	path_put(&new); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2617 | out0: | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2618 | 	return error; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2619 | } | 
 | 2620 |  | 
 | 2621 | static void __init init_mount_tree(void) | 
 | 2622 | { | 
 | 2623 | 	struct vfsmount *mnt; | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2624 | 	struct mnt_namespace *ns; | 
| Jan Blunck | ac748a0 | 2008-02-14 19:34:39 -0800 | [diff] [blame] | 2625 | 	struct path root; | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 2626 | 	struct file_system_type *type; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2627 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 2628 | 	type = get_fs_type("rootfs"); | 
 | 2629 | 	if (!type) | 
 | 2630 | 		panic("Can't find rootfs type"); | 
 | 2631 | 	mnt = vfs_kern_mount(type, 0, "rootfs", NULL); | 
 | 2632 | 	put_filesystem(type); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2633 | 	if (IS_ERR(mnt)) | 
 | 2634 | 		panic("Can't create rootfs"); | 
| Nick Piggin | b3e19d9 | 2011-01-07 17:50:11 +1100 | [diff] [blame] | 2635 |  | 
| Trond Myklebust | 3b22edc | 2009-06-23 17:29:49 -0400 | [diff] [blame] | 2636 | 	ns = create_mnt_ns(mnt); | 
 | 2637 | 	if (IS_ERR(ns)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2638 | 		panic("Can't allocate initial namespace"); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2639 |  | 
| Kirill Korotaev | 6b3286e | 2006-12-08 02:37:56 -0800 | [diff] [blame] | 2640 | 	init_task.nsproxy->mnt_ns = ns; | 
 | 2641 | 	get_mnt_ns(ns); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2642 |  | 
| Al Viro | be08d6d | 2011-12-06 13:32:36 -0500 | [diff] [blame] | 2643 | 	root.mnt = mnt; | 
 | 2644 | 	root.dentry = mnt->mnt_root; | 
| Jan Blunck | ac748a0 | 2008-02-14 19:34:39 -0800 | [diff] [blame] | 2645 |  | 
 | 2646 | 	set_fs_pwd(current->fs, &root); | 
 | 2647 | 	set_fs_root(current->fs, &root); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2648 | } | 
 | 2649 |  | 
| Denis Cheng | 74bf17c | 2007-10-16 23:26:30 -0700 | [diff] [blame] | 2650 | void __init mnt_init(void) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2651 | { | 
| Eric Dumazet | 13f14b4 | 2008-02-06 01:37:57 -0800 | [diff] [blame] | 2652 | 	unsigned u; | 
| Randy Dunlap | 15a67dd | 2006-09-29 01:58:57 -0700 | [diff] [blame] | 2653 | 	int err; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2654 |  | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2655 | 	init_rwsem(&namespace_sem); | 
 | 2656 |  | 
| Al Viro | 7d6fec4 | 2011-11-23 12:14:10 -0500 | [diff] [blame] | 2657 | 	mnt_cache = kmem_cache_create("mnt_cache", sizeof(struct mount), | 
| Paul Mundt | 20c2df8 | 2007-07-20 10:11:58 +0900 | [diff] [blame] | 2658 | 			0, SLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2659 |  | 
| Ram Pai | b58fed8 | 2005-11-07 17:16:09 -0500 | [diff] [blame] | 2660 | 	mount_hashtable = (struct list_head *)__get_free_page(GFP_ATOMIC); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2661 |  | 
 | 2662 | 	if (!mount_hashtable) | 
 | 2663 | 		panic("Failed to allocate mount hash table\n"); | 
 | 2664 |  | 
| Mandeep Singh Baines | 80cdc6d | 2011-03-22 16:33:54 -0700 | [diff] [blame] | 2665 | 	printk(KERN_INFO "Mount-cache hash table entries: %lu\n", HASH_SIZE); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2666 |  | 
| Eric Dumazet | 13f14b4 | 2008-02-06 01:37:57 -0800 | [diff] [blame] | 2667 | 	for (u = 0; u < HASH_SIZE; u++) | 
 | 2668 | 		INIT_LIST_HEAD(&mount_hashtable[u]); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2669 |  | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2670 | 	br_lock_init(&vfsmount_lock); | 
| Nick Piggin | 99b7db7 | 2010-08-18 04:37:39 +1000 | [diff] [blame] | 2671 |  | 
| Randy Dunlap | 15a67dd | 2006-09-29 01:58:57 -0700 | [diff] [blame] | 2672 | 	err = sysfs_init(); | 
 | 2673 | 	if (err) | 
 | 2674 | 		printk(KERN_WARNING "%s: sysfs_init error: %d\n", | 
| Harvey Harrison | 8e24eea | 2008-04-30 00:55:09 -0700 | [diff] [blame] | 2675 | 			__func__, err); | 
| Greg Kroah-Hartman | 00d2666 | 2007-10-29 14:17:23 -0600 | [diff] [blame] | 2676 | 	fs_kobj = kobject_create_and_add("fs", NULL); | 
 | 2677 | 	if (!fs_kobj) | 
| Harvey Harrison | 8e24eea | 2008-04-30 00:55:09 -0700 | [diff] [blame] | 2678 | 		printk(KERN_WARNING "%s: kobj create error\n", __func__); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2679 | 	init_rootfs(); | 
 | 2680 | 	init_mount_tree(); | 
 | 2681 | } | 
 | 2682 |  | 
| Trond Myklebust | 616511d | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2683 | void put_mnt_ns(struct mnt_namespace *ns) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2684 | { | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 2685 | 	LIST_HEAD(umount_list); | 
| Trond Myklebust | 616511d | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2686 |  | 
| Al Viro | d498b25 | 2010-02-05 02:21:06 -0500 | [diff] [blame] | 2687 | 	if (!atomic_dec_and_test(&ns->count)) | 
| Trond Myklebust | 616511d | 2009-06-22 15:09:13 -0400 | [diff] [blame] | 2688 | 		return; | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2689 | 	down_write(&namespace_sem); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2690 | 	br_write_lock(&vfsmount_lock); | 
| Al Viro | be08d6d | 2011-12-06 13:32:36 -0500 | [diff] [blame] | 2691 | 	umount_tree(ns->root, 0, &umount_list); | 
| Andi Kleen | f076950 | 2012-05-08 13:32:02 +0930 | [diff] [blame] | 2692 | 	br_write_unlock(&vfsmount_lock); | 
| Ram Pai | 390c684 | 2005-11-07 17:17:51 -0500 | [diff] [blame] | 2693 | 	up_write(&namespace_sem); | 
| Ram Pai | 70fbcdf | 2005-11-07 17:17:04 -0500 | [diff] [blame] | 2694 | 	release_mounts(&umount_list); | 
| Eric W. Biederman | 9bfaf4f | 2015-09-02 14:51:14 +0530 | [diff] [blame] | 2695 | 	free_mnt_ns(ns); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2696 | } | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 2697 |  | 
 | 2698 | struct vfsmount *kern_mount_data(struct file_system_type *type, void *data) | 
 | 2699 | { | 
| Tim Chen | 423e0ab | 2011-07-19 09:32:38 -0700 | [diff] [blame] | 2700 | 	struct vfsmount *mnt; | 
 | 2701 | 	mnt = vfs_kern_mount(type, MS_KERNMOUNT, type->name, data); | 
 | 2702 | 	if (!IS_ERR(mnt)) { | 
 | 2703 | 		/* | 
 | 2704 | 		 * it is a longterm mount, don't release mnt until | 
 | 2705 | 		 * we unmount before file sys is unregistered | 
 | 2706 | 		*/ | 
| Al Viro | d9eb504 | 2012-06-09 00:59:08 -0400 | [diff] [blame] | 2707 | 		real_mount(mnt)->mnt_ns = MNT_NS_INTERNAL; | 
| Tim Chen | 423e0ab | 2011-07-19 09:32:38 -0700 | [diff] [blame] | 2708 | 	} | 
 | 2709 | 	return mnt; | 
| Al Viro | 9d412a4 | 2011-03-17 22:08:28 -0400 | [diff] [blame] | 2710 | } | 
 | 2711 | EXPORT_SYMBOL_GPL(kern_mount_data); | 
| Tim Chen | 423e0ab | 2011-07-19 09:32:38 -0700 | [diff] [blame] | 2712 |  | 
 | 2713 | void kern_unmount(struct vfsmount *mnt) | 
 | 2714 | { | 
 | 2715 | 	/* release long term mount so mount point can be released */ | 
 | 2716 | 	if (!IS_ERR_OR_NULL(mnt)) { | 
| Al Viro | d9eb504 | 2012-06-09 00:59:08 -0400 | [diff] [blame] | 2717 | 		br_write_lock(&vfsmount_lock); | 
 | 2718 | 		real_mount(mnt)->mnt_ns = NULL; | 
 | 2719 | 		br_write_unlock(&vfsmount_lock); | 
| Tim Chen | 423e0ab | 2011-07-19 09:32:38 -0700 | [diff] [blame] | 2720 | 		mntput(mnt); | 
 | 2721 | 	} | 
 | 2722 | } | 
 | 2723 | EXPORT_SYMBOL(kern_unmount); | 
| Al Viro | 02125a8 | 2011-12-05 08:43:34 -0500 | [diff] [blame] | 2724 |  | 
 | 2725 | bool our_mnt(struct vfsmount *mnt) | 
 | 2726 | { | 
| Al Viro | 143c8c9 | 2011-11-25 00:46:35 -0500 | [diff] [blame] | 2727 | 	return check_mnt(real_mount(mnt)); | 
| Al Viro | 02125a8 | 2011-12-05 08:43:34 -0500 | [diff] [blame] | 2728 | } | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2729 |  | 
 | 2730 | static void *mntns_get(struct task_struct *task) | 
 | 2731 | { | 
 | 2732 | 	struct mnt_namespace *ns = NULL; | 
 | 2733 | 	struct nsproxy *nsproxy; | 
 | 2734 |  | 
 | 2735 | 	rcu_read_lock(); | 
 | 2736 | 	nsproxy = task_nsproxy(task); | 
 | 2737 | 	if (nsproxy) { | 
 | 2738 | 		ns = nsproxy->mnt_ns; | 
 | 2739 | 		get_mnt_ns(ns); | 
 | 2740 | 	} | 
 | 2741 | 	rcu_read_unlock(); | 
 | 2742 |  | 
 | 2743 | 	return ns; | 
 | 2744 | } | 
 | 2745 |  | 
 | 2746 | static void mntns_put(void *ns) | 
 | 2747 | { | 
 | 2748 | 	put_mnt_ns(ns); | 
 | 2749 | } | 
 | 2750 |  | 
 | 2751 | static int mntns_install(struct nsproxy *nsproxy, void *ns) | 
 | 2752 | { | 
 | 2753 | 	struct fs_struct *fs = current->fs; | 
 | 2754 | 	struct mnt_namespace *mnt_ns = ns; | 
 | 2755 | 	struct path root; | 
 | 2756 |  | 
| Eric W. Biederman | 80efab3 | 2015-09-02 15:57:46 +0530 | [diff] [blame] | 2757 | 	if (!ns_capable(mnt_ns->user_ns, CAP_SYS_ADMIN) || | 
 | 2758 | 		!nsown_capable(CAP_SYS_CHROOT)) | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2759 | 		return -EINVAL; | 
 | 2760 |  | 
 | 2761 | 	if (fs->users != 1) | 
 | 2762 | 		return -EINVAL; | 
 | 2763 |  | 
 | 2764 | 	get_mnt_ns(mnt_ns); | 
 | 2765 | 	put_mnt_ns(nsproxy->mnt_ns); | 
 | 2766 | 	nsproxy->mnt_ns = mnt_ns; | 
 | 2767 |  | 
 | 2768 | 	/* Find the root */ | 
 | 2769 | 	root.mnt    = &mnt_ns->root->mnt; | 
 | 2770 | 	root.dentry = mnt_ns->root->mnt.mnt_root; | 
 | 2771 | 	path_get(&root); | 
 | 2772 | 	while(d_mountpoint(root.dentry) && follow_down_one(&root)) | 
 | 2773 | 		; | 
 | 2774 |  | 
 | 2775 | 	/* Update the pwd and root */ | 
 | 2776 | 	set_fs_pwd(fs, &root); | 
 | 2777 | 	set_fs_root(fs, &root); | 
 | 2778 |  | 
 | 2779 | 	path_put(&root); | 
 | 2780 | 	return 0; | 
 | 2781 | } | 
 | 2782 |  | 
| Eric W. Biederman | 80f4b77 | 2015-09-02 16:12:17 +0530 | [diff] [blame] | 2783 | static unsigned int mntns_inum(void *ns) | 
 | 2784 | { | 
 | 2785 | 	struct mnt_namespace *mnt_ns = ns; | 
 | 2786 | 	return mnt_ns->proc_inum; | 
 | 2787 | } | 
 | 2788 |  | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2789 | const struct proc_ns_operations mntns_operations = { | 
 | 2790 | 	.name		= "mnt", | 
 | 2791 | 	.type		= CLONE_NEWNS, | 
 | 2792 | 	.get		= mntns_get, | 
 | 2793 | 	.put		= mntns_put, | 
 | 2794 | 	.install	= mntns_install, | 
| Eric W. Biederman | 80f4b77 | 2015-09-02 16:12:17 +0530 | [diff] [blame] | 2795 | 	.inum		= mntns_inum, | 
| Eric W. Biederman | 474fc3e | 2015-09-02 13:42:53 +0530 | [diff] [blame] | 2796 | }; |