]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/namespace.c
[PATCH] handling of slave mounts
[net-next-2.6.git] / fs / namespace.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/namespace.c
3 *
4 * (C) Copyright Al Viro 2000, 2001
5 * Released under GPL v2.
6 *
7 * Based on code from fs/super.c, copyright Linus Torvalds and others.
8 * Heavily rewritten.
9 */
10
11#include <linux/config.h>
12#include <linux/syscalls.h>
13#include <linux/slab.h>
14#include <linux/sched.h>
15#include <linux/smp_lock.h>
16#include <linux/init.h>
17#include <linux/quotaops.h>
18#include <linux/acct.h>
19#include <linux/module.h>
20#include <linux/seq_file.h>
21#include <linux/namespace.h>
22#include <linux/namei.h>
23#include <linux/security.h>
24#include <linux/mount.h>
25#include <asm/uaccess.h>
26#include <asm/unistd.h>
07b20889 27#include "pnode.h"
1da177e4
LT
28
29extern int __init init_rootfs(void);
30
31#ifdef CONFIG_SYSFS
32extern int __init sysfs_init(void);
33#else
34static inline int sysfs_init(void)
35{
36 return 0;
37}
38#endif
39
40/* spinlock for vfsmount related operations, inplace of dcache_lock */
5addc5dd
AV
41__cacheline_aligned_in_smp DEFINE_SPINLOCK(vfsmount_lock);
42
43static int event;
1da177e4
LT
44
45static struct list_head *mount_hashtable;
6c231b7b 46static int hash_mask __read_mostly, hash_bits __read_mostly;
b58fed8b 47static kmem_cache_t *mnt_cache;
390c6843 48static struct rw_semaphore namespace_sem;
1da177e4
LT
49
50static inline unsigned long hash(struct vfsmount *mnt, struct dentry *dentry)
51{
b58fed8b
RP
52 unsigned long tmp = ((unsigned long)mnt / L1_CACHE_BYTES);
53 tmp += ((unsigned long)dentry / L1_CACHE_BYTES);
1da177e4
LT
54 tmp = tmp + (tmp >> hash_bits);
55 return tmp & hash_mask;
56}
57
58struct vfsmount *alloc_vfsmnt(const char *name)
59{
b58fed8b 60 struct vfsmount *mnt = kmem_cache_alloc(mnt_cache, GFP_KERNEL);
1da177e4
LT
61 if (mnt) {
62 memset(mnt, 0, sizeof(struct vfsmount));
b58fed8b 63 atomic_set(&mnt->mnt_count, 1);
1da177e4
LT
64 INIT_LIST_HEAD(&mnt->mnt_hash);
65 INIT_LIST_HEAD(&mnt->mnt_child);
66 INIT_LIST_HEAD(&mnt->mnt_mounts);
67 INIT_LIST_HEAD(&mnt->mnt_list);
55e700b9 68 INIT_LIST_HEAD(&mnt->mnt_expire);
03e06e68 69 INIT_LIST_HEAD(&mnt->mnt_share);
a58b0eb8
RP
70 INIT_LIST_HEAD(&mnt->mnt_slave_list);
71 INIT_LIST_HEAD(&mnt->mnt_slave);
1da177e4 72 if (name) {
b58fed8b 73 int size = strlen(name) + 1;
1da177e4
LT
74 char *newname = kmalloc(size, GFP_KERNEL);
75 if (newname) {
76 memcpy(newname, name, size);
77 mnt->mnt_devname = newname;
78 }
79 }
80 }
81 return mnt;
82}
83
84void free_vfsmnt(struct vfsmount *mnt)
85{
86 kfree(mnt->mnt_devname);
87 kmem_cache_free(mnt_cache, mnt);
88}
89
90/*
a05964f3
RP
91 * find the first or last mount at @dentry on vfsmount @mnt depending on
92 * @dir. If @dir is set return the first mount else return the last mount.
1da177e4 93 */
a05964f3
RP
94struct vfsmount *__lookup_mnt(struct vfsmount *mnt, struct dentry *dentry,
95 int dir)
1da177e4 96{
b58fed8b
RP
97 struct list_head *head = mount_hashtable + hash(mnt, dentry);
98 struct list_head *tmp = head;
1da177e4
LT
99 struct vfsmount *p, *found = NULL;
100
1da177e4 101 for (;;) {
a05964f3 102 tmp = dir ? tmp->next : tmp->prev;
1da177e4
LT
103 p = NULL;
104 if (tmp == head)
105 break;
106 p = list_entry(tmp, struct vfsmount, mnt_hash);
107 if (p->mnt_parent == mnt && p->mnt_mountpoint == dentry) {
a05964f3 108 found = p;
1da177e4
LT
109 break;
110 }
111 }
1da177e4
LT
112 return found;
113}
114
a05964f3
RP
115/*
116 * lookup_mnt increments the ref count before returning
117 * the vfsmount struct.
118 */
119struct vfsmount *lookup_mnt(struct vfsmount *mnt, struct dentry *dentry)
120{
121 struct vfsmount *child_mnt;
122 spin_lock(&vfsmount_lock);
123 if ((child_mnt = __lookup_mnt(mnt, dentry, 1)))
124 mntget(child_mnt);
125 spin_unlock(&vfsmount_lock);
126 return child_mnt;
127}
128
1da177e4
LT
129static inline int check_mnt(struct vfsmount *mnt)
130{
131 return mnt->mnt_namespace == current->namespace;
132}
133
5addc5dd
AV
134static void touch_namespace(struct namespace *ns)
135{
136 if (ns) {
137 ns->event = ++event;
138 wake_up_interruptible(&ns->poll);
139 }
140}
141
142static void __touch_namespace(struct namespace *ns)
143{
144 if (ns && ns->event != event) {
145 ns->event = event;
146 wake_up_interruptible(&ns->poll);
147 }
148}
149
1da177e4
LT
150static void detach_mnt(struct vfsmount *mnt, struct nameidata *old_nd)
151{
152 old_nd->dentry = mnt->mnt_mountpoint;
153 old_nd->mnt = mnt->mnt_parent;
154 mnt->mnt_parent = mnt;
155 mnt->mnt_mountpoint = mnt->mnt_root;
156 list_del_init(&mnt->mnt_child);
157 list_del_init(&mnt->mnt_hash);
158 old_nd->dentry->d_mounted--;
159}
160
b90fa9ae
RP
161void mnt_set_mountpoint(struct vfsmount *mnt, struct dentry *dentry,
162 struct vfsmount *child_mnt)
163{
164 child_mnt->mnt_parent = mntget(mnt);
165 child_mnt->mnt_mountpoint = dget(dentry);
166 dentry->d_mounted++;
167}
168
1da177e4
LT
169static void attach_mnt(struct vfsmount *mnt, struct nameidata *nd)
170{
b90fa9ae
RP
171 mnt_set_mountpoint(nd->mnt, nd->dentry, mnt);
172 list_add_tail(&mnt->mnt_hash, mount_hashtable +
173 hash(nd->mnt, nd->dentry));
1da177e4 174 list_add_tail(&mnt->mnt_child, &nd->mnt->mnt_mounts);
b90fa9ae
RP
175}
176
177/*
178 * the caller must hold vfsmount_lock
179 */
180static void commit_tree(struct vfsmount *mnt)
181{
182 struct vfsmount *parent = mnt->mnt_parent;
183 struct vfsmount *m;
184 LIST_HEAD(head);
185 struct namespace *n = parent->mnt_namespace;
186
187 BUG_ON(parent == mnt);
188
189 list_add_tail(&head, &mnt->mnt_list);
190 list_for_each_entry(m, &head, mnt_list)
191 m->mnt_namespace = n;
192 list_splice(&head, n->list.prev);
193
194 list_add_tail(&mnt->mnt_hash, mount_hashtable +
195 hash(parent, mnt->mnt_mountpoint));
196 list_add_tail(&mnt->mnt_child, &parent->mnt_mounts);
197 touch_namespace(n);
1da177e4
LT
198}
199
200static struct vfsmount *next_mnt(struct vfsmount *p, struct vfsmount *root)
201{
202 struct list_head *next = p->mnt_mounts.next;
203 if (next == &p->mnt_mounts) {
204 while (1) {
205 if (p == root)
206 return NULL;
207 next = p->mnt_child.next;
208 if (next != &p->mnt_parent->mnt_mounts)
209 break;
210 p = p->mnt_parent;
211 }
212 }
213 return list_entry(next, struct vfsmount, mnt_child);
214}
215
36341f64
RP
216static struct vfsmount *clone_mnt(struct vfsmount *old, struct dentry *root,
217 int flag)
1da177e4
LT
218{
219 struct super_block *sb = old->mnt_sb;
220 struct vfsmount *mnt = alloc_vfsmnt(old->mnt_devname);
221
222 if (mnt) {
223 mnt->mnt_flags = old->mnt_flags;
224 atomic_inc(&sb->s_active);
225 mnt->mnt_sb = sb;
226 mnt->mnt_root = dget(root);
227 mnt->mnt_mountpoint = mnt->mnt_root;
228 mnt->mnt_parent = mnt;
b90fa9ae 229
5afe0022
RP
230 if (flag & CL_SLAVE) {
231 list_add(&mnt->mnt_slave, &old->mnt_slave_list);
232 mnt->mnt_master = old;
233 CLEAR_MNT_SHARED(mnt);
234 } else {
235 if ((flag & CL_PROPAGATION) || IS_MNT_SHARED(old))
236 list_add(&mnt->mnt_share, &old->mnt_share);
237 if (IS_MNT_SLAVE(old))
238 list_add(&mnt->mnt_slave, &old->mnt_slave);
239 mnt->mnt_master = old->mnt_master;
240 }
b90fa9ae
RP
241 if (flag & CL_MAKE_SHARED)
242 set_mnt_shared(mnt);
1da177e4
LT
243
244 /* stick the duplicate mount on the same expiry list
245 * as the original if that was on one */
36341f64
RP
246 if (flag & CL_EXPIRE) {
247 spin_lock(&vfsmount_lock);
248 if (!list_empty(&old->mnt_expire))
249 list_add(&mnt->mnt_expire, &old->mnt_expire);
250 spin_unlock(&vfsmount_lock);
251 }
1da177e4
LT
252 }
253 return mnt;
254}
255
7b7b1ace 256static inline void __mntput(struct vfsmount *mnt)
1da177e4
LT
257{
258 struct super_block *sb = mnt->mnt_sb;
259 dput(mnt->mnt_root);
260 free_vfsmnt(mnt);
261 deactivate_super(sb);
262}
263
7b7b1ace
AV
264void mntput_no_expire(struct vfsmount *mnt)
265{
266repeat:
267 if (atomic_dec_and_lock(&mnt->mnt_count, &vfsmount_lock)) {
268 if (likely(!mnt->mnt_pinned)) {
269 spin_unlock(&vfsmount_lock);
270 __mntput(mnt);
271 return;
272 }
273 atomic_add(mnt->mnt_pinned + 1, &mnt->mnt_count);
274 mnt->mnt_pinned = 0;
275 spin_unlock(&vfsmount_lock);
276 acct_auto_close_mnt(mnt);
277 security_sb_umount_close(mnt);
278 goto repeat;
279 }
280}
281
282EXPORT_SYMBOL(mntput_no_expire);
283
284void mnt_pin(struct vfsmount *mnt)
285{
286 spin_lock(&vfsmount_lock);
287 mnt->mnt_pinned++;
288 spin_unlock(&vfsmount_lock);
289}
290
291EXPORT_SYMBOL(mnt_pin);
292
293void mnt_unpin(struct vfsmount *mnt)
294{
295 spin_lock(&vfsmount_lock);
296 if (mnt->mnt_pinned) {
297 atomic_inc(&mnt->mnt_count);
298 mnt->mnt_pinned--;
299 }
300 spin_unlock(&vfsmount_lock);
301}
302
303EXPORT_SYMBOL(mnt_unpin);
1da177e4
LT
304
305/* iterator */
306static void *m_start(struct seq_file *m, loff_t *pos)
307{
308 struct namespace *n = m->private;
309 struct list_head *p;
310 loff_t l = *pos;
311
390c6843 312 down_read(&namespace_sem);
1da177e4
LT
313 list_for_each(p, &n->list)
314 if (!l--)
315 return list_entry(p, struct vfsmount, mnt_list);
316 return NULL;
317}
318
319static void *m_next(struct seq_file *m, void *v, loff_t *pos)
320{
321 struct namespace *n = m->private;
322 struct list_head *p = ((struct vfsmount *)v)->mnt_list.next;
323 (*pos)++;
b58fed8b 324 return p == &n->list ? NULL : list_entry(p, struct vfsmount, mnt_list);
1da177e4
LT
325}
326
327static void m_stop(struct seq_file *m, void *v)
328{
390c6843 329 up_read(&namespace_sem);
1da177e4
LT
330}
331
332static inline void mangle(struct seq_file *m, const char *s)
333{
334 seq_escape(m, s, " \t\n\\");
335}
336
337static int show_vfsmnt(struct seq_file *m, void *v)
338{
339 struct vfsmount *mnt = v;
340 int err = 0;
341 static struct proc_fs_info {
342 int flag;
343 char *str;
344 } fs_info[] = {
345 { MS_SYNCHRONOUS, ",sync" },
346 { MS_DIRSYNC, ",dirsync" },
347 { MS_MANDLOCK, ",mand" },
348 { MS_NOATIME, ",noatime" },
349 { MS_NODIRATIME, ",nodiratime" },
350 { 0, NULL }
351 };
352 static struct proc_fs_info mnt_info[] = {
353 { MNT_NOSUID, ",nosuid" },
354 { MNT_NODEV, ",nodev" },
355 { MNT_NOEXEC, ",noexec" },
356 { 0, NULL }
357 };
358 struct proc_fs_info *fs_infop;
359
360 mangle(m, mnt->mnt_devname ? mnt->mnt_devname : "none");
361 seq_putc(m, ' ');
362 seq_path(m, mnt, mnt->mnt_root, " \t\n\\");
363 seq_putc(m, ' ');
364 mangle(m, mnt->mnt_sb->s_type->name);
365 seq_puts(m, mnt->mnt_sb->s_flags & MS_RDONLY ? " ro" : " rw");
366 for (fs_infop = fs_info; fs_infop->flag; fs_infop++) {
367 if (mnt->mnt_sb->s_flags & fs_infop->flag)
368 seq_puts(m, fs_infop->str);
369 }
370 for (fs_infop = mnt_info; fs_infop->flag; fs_infop++) {
371 if (mnt->mnt_flags & fs_infop->flag)
372 seq_puts(m, fs_infop->str);
373 }
374 if (mnt->mnt_sb->s_op->show_options)
375 err = mnt->mnt_sb->s_op->show_options(m, mnt);
376 seq_puts(m, " 0 0\n");
377 return err;
378}
379
380struct seq_operations mounts_op = {
381 .start = m_start,
382 .next = m_next,
383 .stop = m_stop,
384 .show = show_vfsmnt
385};
386
387/**
388 * may_umount_tree - check if a mount tree is busy
389 * @mnt: root of mount tree
390 *
391 * This is called to check if a tree of mounts has any
392 * open files, pwds, chroots or sub mounts that are
393 * busy.
394 */
395int may_umount_tree(struct vfsmount *mnt)
396{
36341f64
RP
397 int actual_refs = 0;
398 int minimum_refs = 0;
399 struct vfsmount *p;
1da177e4
LT
400
401 spin_lock(&vfsmount_lock);
36341f64 402 for (p = mnt; p; p = next_mnt(p, mnt)) {
1da177e4
LT
403 actual_refs += atomic_read(&p->mnt_count);
404 minimum_refs += 2;
1da177e4
LT
405 }
406 spin_unlock(&vfsmount_lock);
407
408 if (actual_refs > minimum_refs)
409 return -EBUSY;
410
411 return 0;
412}
413
414EXPORT_SYMBOL(may_umount_tree);
415
416/**
417 * may_umount - check if a mount point is busy
418 * @mnt: root of mount
419 *
420 * This is called to check if a mount point has any
421 * open files, pwds, chroots or sub mounts. If the
422 * mount has sub mounts this will return busy
423 * regardless of whether the sub mounts are busy.
424 *
425 * Doesn't take quota and stuff into account. IOW, in some cases it will
426 * give false negatives. The main reason why it's here is that we need
427 * a non-destructive way to look for easily umountable filesystems.
428 */
429int may_umount(struct vfsmount *mnt)
430{
a05964f3
RP
431 int ret = 0;
432 spin_lock(&vfsmount_lock);
433 if (propagate_mount_busy(mnt, 2))
434 ret = -EBUSY;
435 spin_unlock(&vfsmount_lock);
436 return ret;
1da177e4
LT
437}
438
439EXPORT_SYMBOL(may_umount);
440
b90fa9ae 441void release_mounts(struct list_head *head)
70fbcdf4
RP
442{
443 struct vfsmount *mnt;
444 while(!list_empty(head)) {
445 mnt = list_entry(head->next, struct vfsmount, mnt_hash);
446 list_del_init(&mnt->mnt_hash);
447 if (mnt->mnt_parent != mnt) {
448 struct dentry *dentry;
449 struct vfsmount *m;
450 spin_lock(&vfsmount_lock);
451 dentry = mnt->mnt_mountpoint;
452 m = mnt->mnt_parent;
453 mnt->mnt_mountpoint = mnt->mnt_root;
454 mnt->mnt_parent = mnt;
455 spin_unlock(&vfsmount_lock);
456 dput(dentry);
457 mntput(m);
458 }
459 mntput(mnt);
460 }
461}
462
a05964f3 463void umount_tree(struct vfsmount *mnt, int propagate, struct list_head *kill)
1da177e4
LT
464{
465 struct vfsmount *p;
1da177e4
LT
466
467 for (p = mnt; p; p = next_mnt(p, mnt)) {
70fbcdf4
RP
468 list_del(&p->mnt_hash);
469 list_add(&p->mnt_hash, kill);
1da177e4
LT
470 }
471
a05964f3
RP
472 if (propagate)
473 propagate_umount(kill);
474
70fbcdf4
RP
475 list_for_each_entry(p, kill, mnt_hash) {
476 list_del_init(&p->mnt_expire);
477 list_del_init(&p->mnt_list);
478 __touch_namespace(p->mnt_namespace);
479 p->mnt_namespace = NULL;
480 list_del_init(&p->mnt_child);
481 if (p->mnt_parent != p)
482 mnt->mnt_mountpoint->d_mounted--;
a05964f3 483 change_mnt_propagation(p, MS_PRIVATE);
1da177e4
LT
484 }
485}
486
487static int do_umount(struct vfsmount *mnt, int flags)
488{
b58fed8b 489 struct super_block *sb = mnt->mnt_sb;
1da177e4 490 int retval;
70fbcdf4 491 LIST_HEAD(umount_list);
1da177e4
LT
492
493 retval = security_sb_umount(mnt, flags);
494 if (retval)
495 return retval;
496
497 /*
498 * Allow userspace to request a mountpoint be expired rather than
499 * unmounting unconditionally. Unmount only happens if:
500 * (1) the mark is already set (the mark is cleared by mntput())
501 * (2) the usage count == 1 [parent vfsmount] + 1 [sys_umount]
502 */
503 if (flags & MNT_EXPIRE) {
504 if (mnt == current->fs->rootmnt ||
505 flags & (MNT_FORCE | MNT_DETACH))
506 return -EINVAL;
507
508 if (atomic_read(&mnt->mnt_count) != 2)
509 return -EBUSY;
510
511 if (!xchg(&mnt->mnt_expiry_mark, 1))
512 return -EAGAIN;
513 }
514
515 /*
516 * If we may have to abort operations to get out of this
517 * mount, and they will themselves hold resources we must
518 * allow the fs to do things. In the Unix tradition of
519 * 'Gee thats tricky lets do it in userspace' the umount_begin
520 * might fail to complete on the first run through as other tasks
521 * must return, and the like. Thats for the mount program to worry
522 * about for the moment.
523 */
524
525 lock_kernel();
b58fed8b 526 if ((flags & MNT_FORCE) && sb->s_op->umount_begin)
1da177e4
LT
527 sb->s_op->umount_begin(sb);
528 unlock_kernel();
529
530 /*
531 * No sense to grab the lock for this test, but test itself looks
532 * somewhat bogus. Suggestions for better replacement?
533 * Ho-hum... In principle, we might treat that as umount + switch
534 * to rootfs. GC would eventually take care of the old vfsmount.
535 * Actually it makes sense, especially if rootfs would contain a
536 * /reboot - static binary that would close all descriptors and
537 * call reboot(9). Then init(8) could umount root and exec /reboot.
538 */
539 if (mnt == current->fs->rootmnt && !(flags & MNT_DETACH)) {
540 /*
541 * Special case for "unmounting" root ...
542 * we just try to remount it readonly.
543 */
544 down_write(&sb->s_umount);
545 if (!(sb->s_flags & MS_RDONLY)) {
546 lock_kernel();
547 DQUOT_OFF(sb);
548 retval = do_remount_sb(sb, MS_RDONLY, NULL, 0);
549 unlock_kernel();
550 }
551 up_write(&sb->s_umount);
552 return retval;
553 }
554
390c6843 555 down_write(&namespace_sem);
1da177e4 556 spin_lock(&vfsmount_lock);
5addc5dd 557 event++;
1da177e4 558
1da177e4 559 retval = -EBUSY;
a05964f3 560 if (flags & MNT_DETACH || !propagate_mount_busy(mnt, 2)) {
1da177e4 561 if (!list_empty(&mnt->mnt_list))
a05964f3 562 umount_tree(mnt, 1, &umount_list);
1da177e4
LT
563 retval = 0;
564 }
565 spin_unlock(&vfsmount_lock);
566 if (retval)
567 security_sb_umount_busy(mnt);
390c6843 568 up_write(&namespace_sem);
70fbcdf4 569 release_mounts(&umount_list);
1da177e4
LT
570 return retval;
571}
572
573/*
574 * Now umount can handle mount points as well as block devices.
575 * This is important for filesystems which use unnamed block devices.
576 *
577 * We now support a flag for forced unmount like the other 'big iron'
578 * unixes. Our API is identical to OSF/1 to avoid making a mess of AMD
579 */
580
581asmlinkage long sys_umount(char __user * name, int flags)
582{
583 struct nameidata nd;
584 int retval;
585
586 retval = __user_walk(name, LOOKUP_FOLLOW, &nd);
587 if (retval)
588 goto out;
589 retval = -EINVAL;
590 if (nd.dentry != nd.mnt->mnt_root)
591 goto dput_and_out;
592 if (!check_mnt(nd.mnt))
593 goto dput_and_out;
594
595 retval = -EPERM;
596 if (!capable(CAP_SYS_ADMIN))
597 goto dput_and_out;
598
599 retval = do_umount(nd.mnt, flags);
600dput_and_out:
601 path_release_on_umount(&nd);
602out:
603 return retval;
604}
605
606#ifdef __ARCH_WANT_SYS_OLDUMOUNT
607
608/*
b58fed8b 609 * The 2.0 compatible umount. No flags.
1da177e4 610 */
1da177e4
LT
611asmlinkage long sys_oldumount(char __user * name)
612{
b58fed8b 613 return sys_umount(name, 0);
1da177e4
LT
614}
615
616#endif
617
618static int mount_is_safe(struct nameidata *nd)
619{
620 if (capable(CAP_SYS_ADMIN))
621 return 0;
622 return -EPERM;
623#ifdef notyet
624 if (S_ISLNK(nd->dentry->d_inode->i_mode))
625 return -EPERM;
626 if (nd->dentry->d_inode->i_mode & S_ISVTX) {
627 if (current->uid != nd->dentry->d_inode->i_uid)
628 return -EPERM;
629 }
630 if (permission(nd->dentry->d_inode, MAY_WRITE, nd))
631 return -EPERM;
632 return 0;
633#endif
634}
635
b58fed8b 636static int lives_below_in_same_fs(struct dentry *d, struct dentry *dentry)
1da177e4
LT
637{
638 while (1) {
639 if (d == dentry)
640 return 1;
641 if (d == NULL || d == d->d_parent)
642 return 0;
643 d = d->d_parent;
644 }
645}
646
b90fa9ae 647struct vfsmount *copy_tree(struct vfsmount *mnt, struct dentry *dentry,
36341f64 648 int flag)
1da177e4
LT
649{
650 struct vfsmount *res, *p, *q, *r, *s;
1da177e4
LT
651 struct nameidata nd;
652
36341f64 653 res = q = clone_mnt(mnt, dentry, flag);
1da177e4
LT
654 if (!q)
655 goto Enomem;
656 q->mnt_mountpoint = mnt->mnt_mountpoint;
657
658 p = mnt;
fdadd65f 659 list_for_each_entry(r, &mnt->mnt_mounts, mnt_child) {
1da177e4
LT
660 if (!lives_below_in_same_fs(r->mnt_mountpoint, dentry))
661 continue;
662
663 for (s = r; s; s = next_mnt(s, r)) {
664 while (p != s->mnt_parent) {
665 p = p->mnt_parent;
666 q = q->mnt_parent;
667 }
668 p = s;
669 nd.mnt = q;
670 nd.dentry = p->mnt_mountpoint;
36341f64 671 q = clone_mnt(p, p->mnt_root, flag);
1da177e4
LT
672 if (!q)
673 goto Enomem;
674 spin_lock(&vfsmount_lock);
675 list_add_tail(&q->mnt_list, &res->mnt_list);
676 attach_mnt(q, &nd);
677 spin_unlock(&vfsmount_lock);
678 }
679 }
680 return res;
b58fed8b 681Enomem:
1da177e4 682 if (res) {
70fbcdf4 683 LIST_HEAD(umount_list);
1da177e4 684 spin_lock(&vfsmount_lock);
a05964f3 685 umount_tree(res, 0, &umount_list);
1da177e4 686 spin_unlock(&vfsmount_lock);
70fbcdf4 687 release_mounts(&umount_list);
1da177e4
LT
688 }
689 return NULL;
690}
691
b90fa9ae
RP
692/*
693 * @source_mnt : mount tree to be attached
21444403
RP
694 * @nd : place the mount tree @source_mnt is attached
695 * @parent_nd : if non-null, detach the source_mnt from its parent and
696 * store the parent mount and mountpoint dentry.
697 * (done when source_mnt is moved)
b90fa9ae
RP
698 *
699 * NOTE: in the table below explains the semantics when a source mount
700 * of a given type is attached to a destination mount of a given type.
5afe0022
RP
701 * -------------------------------------------------------------
702 * | BIND MOUNT OPERATION |
703 * |*************************************************************
704 * | source-->| shared | private | slave |
705 * | dest | | | |
706 * | | | | | |
707 * | v | | | |
708 * |*************************************************************
709 * | shared | shared (++) | shared (+) | shared(+++)|
710 * | | | | |
711 * |non-shared| shared (+) | private | slave (*) |
712 * **************************************************************
b90fa9ae
RP
713 * A bind operation clones the source mount and mounts the clone on the
714 * destination mount.
715 *
716 * (++) the cloned mount is propagated to all the mounts in the propagation
717 * tree of the destination mount and the cloned mount is added to
718 * the peer group of the source mount.
719 * (+) the cloned mount is created under the destination mount and is marked
720 * as shared. The cloned mount is added to the peer group of the source
721 * mount.
5afe0022
RP
722 * (+++) the mount is propagated to all the mounts in the propagation tree
723 * of the destination mount and the cloned mount is made slave
724 * of the same master as that of the source mount. The cloned mount
725 * is marked as 'shared and slave'.
726 * (*) the cloned mount is made a slave of the same master as that of the
727 * source mount.
728 *
729 * --------------------------------------------------------------
730 * | MOVE MOUNT OPERATION |
731 * |*************************************************************
732 * | source-->| shared | private | slave |
733 * | dest | | | |
734 * | | | | | |
735 * | v | | | |
736 * |*************************************************************
737 * | shared | shared (+) | shared (+) | shared(+++) |
738 * | | | | |
739 * |non-shared| shared (+*) | private | slave (*) |
740 * **************************************************************
741 *
742 * (+) the mount is moved to the destination. And is then propagated to
743 * all the mounts in the propagation tree of the destination mount.
21444403 744 * (+*) the mount is moved to the destination.
5afe0022
RP
745 * (+++) the mount is moved to the destination and is then propagated to
746 * all the mounts belonging to the destination mount's propagation tree.
747 * the mount is marked as 'shared and slave'.
748 * (*) the mount continues to be a slave at the new location.
b90fa9ae
RP
749 *
750 * if the source mount is a tree, the operations explained above is
751 * applied to each mount in the tree.
752 * Must be called without spinlocks held, since this function can sleep
753 * in allocations.
754 */
755static int attach_recursive_mnt(struct vfsmount *source_mnt,
21444403 756 struct nameidata *nd, struct nameidata *parent_nd)
b90fa9ae
RP
757{
758 LIST_HEAD(tree_list);
759 struct vfsmount *dest_mnt = nd->mnt;
760 struct dentry *dest_dentry = nd->dentry;
761 struct vfsmount *child, *p;
762
763 if (propagate_mnt(dest_mnt, dest_dentry, source_mnt, &tree_list))
764 return -EINVAL;
765
766 if (IS_MNT_SHARED(dest_mnt)) {
767 for (p = source_mnt; p; p = next_mnt(p, source_mnt))
768 set_mnt_shared(p);
769 }
770
771 spin_lock(&vfsmount_lock);
21444403
RP
772 if (parent_nd) {
773 detach_mnt(source_mnt, parent_nd);
774 attach_mnt(source_mnt, nd);
775 touch_namespace(current->namespace);
776 } else {
777 mnt_set_mountpoint(dest_mnt, dest_dentry, source_mnt);
778 commit_tree(source_mnt);
779 }
b90fa9ae
RP
780
781 list_for_each_entry_safe(child, p, &tree_list, mnt_hash) {
782 list_del_init(&child->mnt_hash);
783 commit_tree(child);
784 }
785 spin_unlock(&vfsmount_lock);
786 return 0;
787}
788
1da177e4
LT
789static int graft_tree(struct vfsmount *mnt, struct nameidata *nd)
790{
791 int err;
792 if (mnt->mnt_sb->s_flags & MS_NOUSER)
793 return -EINVAL;
794
795 if (S_ISDIR(nd->dentry->d_inode->i_mode) !=
796 S_ISDIR(mnt->mnt_root->d_inode->i_mode))
797 return -ENOTDIR;
798
799 err = -ENOENT;
800 down(&nd->dentry->d_inode->i_sem);
801 if (IS_DEADDIR(nd->dentry->d_inode))
802 goto out_unlock;
803
804 err = security_sb_check_sb(mnt, nd);
805 if (err)
806 goto out_unlock;
807
808 err = -ENOENT;
b90fa9ae 809 if (IS_ROOT(nd->dentry) || !d_unhashed(nd->dentry))
21444403 810 err = attach_recursive_mnt(mnt, nd, NULL);
1da177e4
LT
811out_unlock:
812 up(&nd->dentry->d_inode->i_sem);
813 if (!err)
814 security_sb_post_addmount(mnt, nd);
815 return err;
816}
817
07b20889
RP
818/*
819 * recursively change the type of the mountpoint.
820 */
821static int do_change_type(struct nameidata *nd, int flag)
822{
823 struct vfsmount *m, *mnt = nd->mnt;
824 int recurse = flag & MS_REC;
825 int type = flag & ~MS_REC;
826
827 if (nd->dentry != nd->mnt->mnt_root)
828 return -EINVAL;
829
830 down_write(&namespace_sem);
831 spin_lock(&vfsmount_lock);
832 for (m = mnt; m; m = (recurse ? next_mnt(m, mnt) : NULL))
833 change_mnt_propagation(m, type);
834 spin_unlock(&vfsmount_lock);
835 up_write(&namespace_sem);
836 return 0;
837}
838
1da177e4
LT
839/*
840 * do loopback mount.
841 */
842static int do_loopback(struct nameidata *nd, char *old_name, int recurse)
843{
844 struct nameidata old_nd;
845 struct vfsmount *mnt = NULL;
846 int err = mount_is_safe(nd);
847 if (err)
848 return err;
849 if (!old_name || !*old_name)
850 return -EINVAL;
851 err = path_lookup(old_name, LOOKUP_FOLLOW, &old_nd);
852 if (err)
853 return err;
854
390c6843 855 down_write(&namespace_sem);
1da177e4 856 err = -EINVAL;
ccd48bc7
AV
857 if (!check_mnt(nd->mnt) || !check_mnt(old_nd.mnt))
858 goto out;
1da177e4 859
ccd48bc7
AV
860 err = -ENOMEM;
861 if (recurse)
36341f64 862 mnt = copy_tree(old_nd.mnt, old_nd.dentry, 0);
ccd48bc7 863 else
36341f64 864 mnt = clone_mnt(old_nd.mnt, old_nd.dentry, 0);
ccd48bc7
AV
865
866 if (!mnt)
867 goto out;
868
ccd48bc7
AV
869 err = graft_tree(mnt, nd);
870 if (err) {
70fbcdf4 871 LIST_HEAD(umount_list);
1da177e4 872 spin_lock(&vfsmount_lock);
a05964f3 873 umount_tree(mnt, 0, &umount_list);
1da177e4 874 spin_unlock(&vfsmount_lock);
70fbcdf4 875 release_mounts(&umount_list);
5b83d2c5 876 }
1da177e4 877
ccd48bc7 878out:
390c6843 879 up_write(&namespace_sem);
1da177e4
LT
880 path_release(&old_nd);
881 return err;
882}
883
884/*
885 * change filesystem flags. dir should be a physical root of filesystem.
886 * If you've mounted a non-root directory somewhere and want to do remount
887 * on it - tough luck.
888 */
1da177e4
LT
889static int do_remount(struct nameidata *nd, int flags, int mnt_flags,
890 void *data)
891{
892 int err;
b58fed8b 893 struct super_block *sb = nd->mnt->mnt_sb;
1da177e4
LT
894
895 if (!capable(CAP_SYS_ADMIN))
896 return -EPERM;
897
898 if (!check_mnt(nd->mnt))
899 return -EINVAL;
900
901 if (nd->dentry != nd->mnt->mnt_root)
902 return -EINVAL;
903
904 down_write(&sb->s_umount);
905 err = do_remount_sb(sb, flags, data, 0);
906 if (!err)
b58fed8b 907 nd->mnt->mnt_flags = mnt_flags;
1da177e4
LT
908 up_write(&sb->s_umount);
909 if (!err)
910 security_sb_post_remount(nd->mnt, flags, data);
911 return err;
912}
913
914static int do_move_mount(struct nameidata *nd, char *old_name)
915{
916 struct nameidata old_nd, parent_nd;
917 struct vfsmount *p;
918 int err = 0;
919 if (!capable(CAP_SYS_ADMIN))
920 return -EPERM;
921 if (!old_name || !*old_name)
922 return -EINVAL;
923 err = path_lookup(old_name, LOOKUP_FOLLOW, &old_nd);
924 if (err)
925 return err;
926
390c6843 927 down_write(&namespace_sem);
b58fed8b 928 while (d_mountpoint(nd->dentry) && follow_down(&nd->mnt, &nd->dentry))
1da177e4
LT
929 ;
930 err = -EINVAL;
931 if (!check_mnt(nd->mnt) || !check_mnt(old_nd.mnt))
932 goto out;
933
934 err = -ENOENT;
935 down(&nd->dentry->d_inode->i_sem);
936 if (IS_DEADDIR(nd->dentry->d_inode))
937 goto out1;
938
1da177e4 939 if (!IS_ROOT(nd->dentry) && d_unhashed(nd->dentry))
21444403 940 goto out1;
1da177e4
LT
941
942 err = -EINVAL;
943 if (old_nd.dentry != old_nd.mnt->mnt_root)
21444403 944 goto out1;
1da177e4
LT
945
946 if (old_nd.mnt == old_nd.mnt->mnt_parent)
21444403 947 goto out1;
1da177e4
LT
948
949 if (S_ISDIR(nd->dentry->d_inode->i_mode) !=
950 S_ISDIR(old_nd.dentry->d_inode->i_mode))
21444403
RP
951 goto out1;
952 /*
953 * Don't move a mount residing in a shared parent.
954 */
955 if (old_nd.mnt->mnt_parent && IS_MNT_SHARED(old_nd.mnt->mnt_parent))
956 goto out1;
1da177e4 957 err = -ELOOP;
b58fed8b 958 for (p = nd->mnt; p->mnt_parent != p; p = p->mnt_parent)
1da177e4 959 if (p == old_nd.mnt)
21444403 960 goto out1;
1da177e4 961
21444403
RP
962 if ((err = attach_recursive_mnt(old_nd.mnt, nd, &parent_nd)))
963 goto out1;
1da177e4 964
21444403 965 spin_lock(&vfsmount_lock);
1da177e4
LT
966 /* if the mount is moved, it should no longer be expire
967 * automatically */
55e700b9 968 list_del_init(&old_nd.mnt->mnt_expire);
1da177e4
LT
969 spin_unlock(&vfsmount_lock);
970out1:
971 up(&nd->dentry->d_inode->i_sem);
972out:
390c6843 973 up_write(&namespace_sem);
1da177e4
LT
974 if (!err)
975 path_release(&parent_nd);
976 path_release(&old_nd);
977 return err;
978}
979
980/*
981 * create a new mount for userspace and request it to be added into the
982 * namespace's tree
983 */
984static int do_new_mount(struct nameidata *nd, char *type, int flags,
985 int mnt_flags, char *name, void *data)
986{
987 struct vfsmount *mnt;
988
989 if (!type || !memchr(type, 0, PAGE_SIZE))
990 return -EINVAL;
991
992 /* we need capabilities... */
993 if (!capable(CAP_SYS_ADMIN))
994 return -EPERM;
995
996 mnt = do_kern_mount(type, flags, name, data);
997 if (IS_ERR(mnt))
998 return PTR_ERR(mnt);
999
1000 return do_add_mount(mnt, nd, mnt_flags, NULL);
1001}
1002
1003/*
1004 * add a mount into a namespace's mount tree
1005 * - provide the option of adding the new mount to an expiration list
1006 */
1007int do_add_mount(struct vfsmount *newmnt, struct nameidata *nd,
1008 int mnt_flags, struct list_head *fslist)
1009{
1010 int err;
1011
390c6843 1012 down_write(&namespace_sem);
1da177e4 1013 /* Something was mounted here while we slept */
b58fed8b 1014 while (d_mountpoint(nd->dentry) && follow_down(&nd->mnt, &nd->dentry))
1da177e4
LT
1015 ;
1016 err = -EINVAL;
1017 if (!check_mnt(nd->mnt))
1018 goto unlock;
1019
1020 /* Refuse the same filesystem on the same mount point */
1021 err = -EBUSY;
1022 if (nd->mnt->mnt_sb == newmnt->mnt_sb &&
1023 nd->mnt->mnt_root == nd->dentry)
1024 goto unlock;
1025
1026 err = -EINVAL;
1027 if (S_ISLNK(newmnt->mnt_root->d_inode->i_mode))
1028 goto unlock;
1029
1030 newmnt->mnt_flags = mnt_flags;
5b83d2c5
RP
1031 if ((err = graft_tree(newmnt, nd)))
1032 goto unlock;
1da177e4 1033
5b83d2c5 1034 if (fslist) {
1da177e4
LT
1035 /* add to the specified expiration list */
1036 spin_lock(&vfsmount_lock);
55e700b9 1037 list_add_tail(&newmnt->mnt_expire, fslist);
1da177e4
LT
1038 spin_unlock(&vfsmount_lock);
1039 }
390c6843 1040 up_write(&namespace_sem);
5b83d2c5 1041 return 0;
1da177e4
LT
1042
1043unlock:
390c6843 1044 up_write(&namespace_sem);
1da177e4
LT
1045 mntput(newmnt);
1046 return err;
1047}
1048
1049EXPORT_SYMBOL_GPL(do_add_mount);
1050
70fbcdf4
RP
1051static void expire_mount(struct vfsmount *mnt, struct list_head *mounts,
1052 struct list_head *umounts)
24ca2af1
MS
1053{
1054 spin_lock(&vfsmount_lock);
1055
ed42c879
MS
1056 /*
1057 * Check if mount is still attached, if not, let whoever holds it deal
1058 * with the sucker
1059 */
1060 if (mnt->mnt_parent == mnt) {
1061 spin_unlock(&vfsmount_lock);
1062 return;
1063 }
1064
24ca2af1
MS
1065 /*
1066 * Check that it is still dead: the count should now be 2 - as
1067 * contributed by the vfsmount parent and the mntget above
1068 */
a05964f3 1069 if (!propagate_mount_busy(mnt, 2)) {
24ca2af1 1070 /* delete from the namespace */
5addc5dd 1071 touch_namespace(mnt->mnt_namespace);
24ca2af1 1072 list_del_init(&mnt->mnt_list);
ac081153 1073 mnt->mnt_namespace = NULL;
a05964f3 1074 umount_tree(mnt, 1, umounts);
24ca2af1 1075 spin_unlock(&vfsmount_lock);
24ca2af1
MS
1076 } else {
1077 /*
1078 * Someone brought it back to life whilst we didn't have any
1079 * locks held so return it to the expiration list
1080 */
55e700b9 1081 list_add_tail(&mnt->mnt_expire, mounts);
24ca2af1
MS
1082 spin_unlock(&vfsmount_lock);
1083 }
1084}
1085
1da177e4
LT
1086/*
1087 * process a list of expirable mountpoints with the intent of discarding any
1088 * mountpoints that aren't in use and haven't been touched since last we came
1089 * here
1090 */
1091void mark_mounts_for_expiry(struct list_head *mounts)
1092{
1093 struct namespace *namespace;
1094 struct vfsmount *mnt, *next;
1095 LIST_HEAD(graveyard);
1096
1097 if (list_empty(mounts))
1098 return;
1099
1100 spin_lock(&vfsmount_lock);
1101
1102 /* extract from the expiration list every vfsmount that matches the
1103 * following criteria:
1104 * - only referenced by its parent vfsmount
1105 * - still marked for expiry (marked on the last call here; marks are
1106 * cleared by mntput())
1107 */
55e700b9 1108 list_for_each_entry_safe(mnt, next, mounts, mnt_expire) {
1da177e4
LT
1109 if (!xchg(&mnt->mnt_expiry_mark, 1) ||
1110 atomic_read(&mnt->mnt_count) != 1)
1111 continue;
1112
1113 mntget(mnt);
55e700b9 1114 list_move(&mnt->mnt_expire, &graveyard);
1da177e4
LT
1115 }
1116
1117 /*
1118 * go through the vfsmounts we've just consigned to the graveyard to
1119 * - check that they're still dead
1120 * - delete the vfsmount from the appropriate namespace under lock
1121 * - dispose of the corpse
1122 */
1123 while (!list_empty(&graveyard)) {
70fbcdf4 1124 LIST_HEAD(umounts);
55e700b9
MS
1125 mnt = list_entry(graveyard.next, struct vfsmount, mnt_expire);
1126 list_del_init(&mnt->mnt_expire);
1da177e4
LT
1127
1128 /* don't do anything if the namespace is dead - all the
1129 * vfsmounts from it are going away anyway */
1130 namespace = mnt->mnt_namespace;
1ce88cf4 1131 if (!namespace || !namespace->root)
1da177e4
LT
1132 continue;
1133 get_namespace(namespace);
1134
1135 spin_unlock(&vfsmount_lock);
390c6843 1136 down_write(&namespace_sem);
70fbcdf4 1137 expire_mount(mnt, mounts, &umounts);
390c6843 1138 up_write(&namespace_sem);
70fbcdf4 1139 release_mounts(&umounts);
1da177e4
LT
1140 mntput(mnt);
1141 put_namespace(namespace);
1da177e4
LT
1142 spin_lock(&vfsmount_lock);
1143 }
1144
1145 spin_unlock(&vfsmount_lock);
1146}
1147
1148EXPORT_SYMBOL_GPL(mark_mounts_for_expiry);
1149
1150/*
1151 * Some copy_from_user() implementations do not return the exact number of
1152 * bytes remaining to copy on a fault. But copy_mount_options() requires that.
1153 * Note that this function differs from copy_from_user() in that it will oops
1154 * on bad values of `to', rather than returning a short copy.
1155 */
b58fed8b
RP
1156static long exact_copy_from_user(void *to, const void __user * from,
1157 unsigned long n)
1da177e4
LT
1158{
1159 char *t = to;
1160 const char __user *f = from;
1161 char c;
1162
1163 if (!access_ok(VERIFY_READ, from, n))
1164 return n;
1165
1166 while (n) {
1167 if (__get_user(c, f)) {
1168 memset(t, 0, n);
1169 break;
1170 }
1171 *t++ = c;
1172 f++;
1173 n--;
1174 }
1175 return n;
1176}
1177
b58fed8b 1178int copy_mount_options(const void __user * data, unsigned long *where)
1da177e4
LT
1179{
1180 int i;
1181 unsigned long page;
1182 unsigned long size;
b58fed8b 1183
1da177e4
LT
1184 *where = 0;
1185 if (!data)
1186 return 0;
1187
1188 if (!(page = __get_free_page(GFP_KERNEL)))
1189 return -ENOMEM;
1190
1191 /* We only care that *some* data at the address the user
1192 * gave us is valid. Just in case, we'll zero
1193 * the remainder of the page.
1194 */
1195 /* copy_from_user cannot cross TASK_SIZE ! */
1196 size = TASK_SIZE - (unsigned long)data;
1197 if (size > PAGE_SIZE)
1198 size = PAGE_SIZE;
1199
1200 i = size - exact_copy_from_user((void *)page, data, size);
1201 if (!i) {
b58fed8b 1202 free_page(page);
1da177e4
LT
1203 return -EFAULT;
1204 }
1205 if (i != PAGE_SIZE)
1206 memset((char *)page + i, 0, PAGE_SIZE - i);
1207 *where = page;
1208 return 0;
1209}
1210
1211/*
1212 * Flags is a 32-bit value that allows up to 31 non-fs dependent flags to
1213 * be given to the mount() call (ie: read-only, no-dev, no-suid etc).
1214 *
1215 * data is a (void *) that can point to any structure up to
1216 * PAGE_SIZE-1 bytes, which can contain arbitrary fs-dependent
1217 * information (or be NULL).
1218 *
1219 * Pre-0.97 versions of mount() didn't have a flags word.
1220 * When the flags word was introduced its top half was required
1221 * to have the magic value 0xC0ED, and this remained so until 2.4.0-test9.
1222 * Therefore, if this magic number is present, it carries no information
1223 * and must be discarded.
1224 */
b58fed8b 1225long do_mount(char *dev_name, char *dir_name, char *type_page,
1da177e4
LT
1226 unsigned long flags, void *data_page)
1227{
1228 struct nameidata nd;
1229 int retval = 0;
1230 int mnt_flags = 0;
1231
1232 /* Discard magic */
1233 if ((flags & MS_MGC_MSK) == MS_MGC_VAL)
1234 flags &= ~MS_MGC_MSK;
1235
1236 /* Basic sanity checks */
1237
1238 if (!dir_name || !*dir_name || !memchr(dir_name, 0, PAGE_SIZE))
1239 return -EINVAL;
1240 if (dev_name && !memchr(dev_name, 0, PAGE_SIZE))
1241 return -EINVAL;
1242
1243 if (data_page)
1244 ((char *)data_page)[PAGE_SIZE - 1] = 0;
1245
1246 /* Separate the per-mountpoint flags */
1247 if (flags & MS_NOSUID)
1248 mnt_flags |= MNT_NOSUID;
1249 if (flags & MS_NODEV)
1250 mnt_flags |= MNT_NODEV;
1251 if (flags & MS_NOEXEC)
1252 mnt_flags |= MNT_NOEXEC;
b58fed8b 1253 flags &= ~(MS_NOSUID | MS_NOEXEC | MS_NODEV | MS_ACTIVE);
1da177e4
LT
1254
1255 /* ... and get the mountpoint */
1256 retval = path_lookup(dir_name, LOOKUP_FOLLOW, &nd);
1257 if (retval)
1258 return retval;
1259
1260 retval = security_sb_mount(dev_name, &nd, type_page, flags, data_page);
1261 if (retval)
1262 goto dput_out;
1263
1264 if (flags & MS_REMOUNT)
1265 retval = do_remount(&nd, flags & ~MS_REMOUNT, mnt_flags,
1266 data_page);
1267 else if (flags & MS_BIND)
1268 retval = do_loopback(&nd, dev_name, flags & MS_REC);
a58b0eb8 1269 else if (flags & (MS_SHARED | MS_PRIVATE | MS_SLAVE))
07b20889 1270 retval = do_change_type(&nd, flags);
1da177e4
LT
1271 else if (flags & MS_MOVE)
1272 retval = do_move_mount(&nd, dev_name);
1273 else
1274 retval = do_new_mount(&nd, type_page, flags, mnt_flags,
1275 dev_name, data_page);
1276dput_out:
1277 path_release(&nd);
1278 return retval;
1279}
1280
1281int copy_namespace(int flags, struct task_struct *tsk)
1282{
1283 struct namespace *namespace = tsk->namespace;
1284 struct namespace *new_ns;
1285 struct vfsmount *rootmnt = NULL, *pwdmnt = NULL, *altrootmnt = NULL;
1286 struct fs_struct *fs = tsk->fs;
1287 struct vfsmount *p, *q;
1288
1289 if (!namespace)
1290 return 0;
1291
1292 get_namespace(namespace);
1293
1294 if (!(flags & CLONE_NEWNS))
1295 return 0;
1296
1297 if (!capable(CAP_SYS_ADMIN)) {
1298 put_namespace(namespace);
1299 return -EPERM;
1300 }
1301
1302 new_ns = kmalloc(sizeof(struct namespace), GFP_KERNEL);
1303 if (!new_ns)
1304 goto out;
1305
1306 atomic_set(&new_ns->count, 1);
1da177e4 1307 INIT_LIST_HEAD(&new_ns->list);
5addc5dd
AV
1308 init_waitqueue_head(&new_ns->poll);
1309 new_ns->event = 0;
1da177e4 1310
390c6843 1311 down_write(&namespace_sem);
1da177e4 1312 /* First pass: copy the tree topology */
36341f64
RP
1313 new_ns->root = copy_tree(namespace->root, namespace->root->mnt_root,
1314 CL_EXPIRE);
1da177e4 1315 if (!new_ns->root) {
390c6843 1316 up_write(&namespace_sem);
1da177e4
LT
1317 kfree(new_ns);
1318 goto out;
1319 }
1320 spin_lock(&vfsmount_lock);
1321 list_add_tail(&new_ns->list, &new_ns->root->mnt_list);
1322 spin_unlock(&vfsmount_lock);
1323
1324 /*
1325 * Second pass: switch the tsk->fs->* elements and mark new vfsmounts
1326 * as belonging to new namespace. We have already acquired a private
1327 * fs_struct, so tsk->fs->lock is not needed.
1328 */
1329 p = namespace->root;
1330 q = new_ns->root;
1331 while (p) {
1332 q->mnt_namespace = new_ns;
1333 if (fs) {
1334 if (p == fs->rootmnt) {
1335 rootmnt = p;
1336 fs->rootmnt = mntget(q);
1337 }
1338 if (p == fs->pwdmnt) {
1339 pwdmnt = p;
1340 fs->pwdmnt = mntget(q);
1341 }
1342 if (p == fs->altrootmnt) {
1343 altrootmnt = p;
1344 fs->altrootmnt = mntget(q);
1345 }
1346 }
1347 p = next_mnt(p, namespace->root);
1348 q = next_mnt(q, new_ns->root);
1349 }
390c6843 1350 up_write(&namespace_sem);
1da177e4
LT
1351
1352 tsk->namespace = new_ns;
1353
1354 if (rootmnt)
1355 mntput(rootmnt);
1356 if (pwdmnt)
1357 mntput(pwdmnt);
1358 if (altrootmnt)
1359 mntput(altrootmnt);
1360
1361 put_namespace(namespace);
1362 return 0;
1363
1364out:
1365 put_namespace(namespace);
1366 return -ENOMEM;
1367}
1368
1369asmlinkage long sys_mount(char __user * dev_name, char __user * dir_name,
1370 char __user * type, unsigned long flags,
1371 void __user * data)
1372{
1373 int retval;
1374 unsigned long data_page;
1375 unsigned long type_page;
1376 unsigned long dev_page;
1377 char *dir_page;
1378
b58fed8b 1379 retval = copy_mount_options(type, &type_page);
1da177e4
LT
1380 if (retval < 0)
1381 return retval;
1382
1383 dir_page = getname(dir_name);
1384 retval = PTR_ERR(dir_page);
1385 if (IS_ERR(dir_page))
1386 goto out1;
1387
b58fed8b 1388 retval = copy_mount_options(dev_name, &dev_page);
1da177e4
LT
1389 if (retval < 0)
1390 goto out2;
1391
b58fed8b 1392 retval = copy_mount_options(data, &data_page);
1da177e4
LT
1393 if (retval < 0)
1394 goto out3;
1395
1396 lock_kernel();
b58fed8b
RP
1397 retval = do_mount((char *)dev_page, dir_page, (char *)type_page,
1398 flags, (void *)data_page);
1da177e4
LT
1399 unlock_kernel();
1400 free_page(data_page);
1401
1402out3:
1403 free_page(dev_page);
1404out2:
1405 putname(dir_page);
1406out1:
1407 free_page(type_page);
1408 return retval;
1409}
1410
1411/*
1412 * Replace the fs->{rootmnt,root} with {mnt,dentry}. Put the old values.
1413 * It can block. Requires the big lock held.
1414 */
1415void set_fs_root(struct fs_struct *fs, struct vfsmount *mnt,
1416 struct dentry *dentry)
1417{
1418 struct dentry *old_root;
1419 struct vfsmount *old_rootmnt;
1420 write_lock(&fs->lock);
1421 old_root = fs->root;
1422 old_rootmnt = fs->rootmnt;
1423 fs->rootmnt = mntget(mnt);
1424 fs->root = dget(dentry);
1425 write_unlock(&fs->lock);
1426 if (old_root) {
1427 dput(old_root);
1428 mntput(old_rootmnt);
1429 }
1430}
1431
1432/*
1433 * Replace the fs->{pwdmnt,pwd} with {mnt,dentry}. Put the old values.
1434 * It can block. Requires the big lock held.
1435 */
1436void set_fs_pwd(struct fs_struct *fs, struct vfsmount *mnt,
1437 struct dentry *dentry)
1438{
1439 struct dentry *old_pwd;
1440 struct vfsmount *old_pwdmnt;
1441
1442 write_lock(&fs->lock);
1443 old_pwd = fs->pwd;
1444 old_pwdmnt = fs->pwdmnt;
1445 fs->pwdmnt = mntget(mnt);
1446 fs->pwd = dget(dentry);
1447 write_unlock(&fs->lock);
1448
1449 if (old_pwd) {
1450 dput(old_pwd);
1451 mntput(old_pwdmnt);
1452 }
1453}
1454
1455static void chroot_fs_refs(struct nameidata *old_nd, struct nameidata *new_nd)
1456{
1457 struct task_struct *g, *p;
1458 struct fs_struct *fs;
1459
1460 read_lock(&tasklist_lock);
1461 do_each_thread(g, p) {
1462 task_lock(p);
1463 fs = p->fs;
1464 if (fs) {
1465 atomic_inc(&fs->count);
1466 task_unlock(p);
b58fed8b
RP
1467 if (fs->root == old_nd->dentry
1468 && fs->rootmnt == old_nd->mnt)
1da177e4 1469 set_fs_root(fs, new_nd->mnt, new_nd->dentry);
b58fed8b
RP
1470 if (fs->pwd == old_nd->dentry
1471 && fs->pwdmnt == old_nd->mnt)
1da177e4
LT
1472 set_fs_pwd(fs, new_nd->mnt, new_nd->dentry);
1473 put_fs_struct(fs);
1474 } else
1475 task_unlock(p);
1476 } while_each_thread(g, p);
1477 read_unlock(&tasklist_lock);
1478}
1479
1480/*
1481 * pivot_root Semantics:
1482 * Moves the root file system of the current process to the directory put_old,
1483 * makes new_root as the new root file system of the current process, and sets
1484 * root/cwd of all processes which had them on the current root to new_root.
1485 *
1486 * Restrictions:
1487 * The new_root and put_old must be directories, and must not be on the
1488 * same file system as the current process root. The put_old must be
1489 * underneath new_root, i.e. adding a non-zero number of /.. to the string
1490 * pointed to by put_old must yield the same directory as new_root. No other
1491 * file system may be mounted on put_old. After all, new_root is a mountpoint.
1492 *
1493 * Notes:
1494 * - we don't move root/cwd if they are not at the root (reason: if something
1495 * cared enough to change them, it's probably wrong to force them elsewhere)
1496 * - it's okay to pick a root that isn't the root of a file system, e.g.
1497 * /nfs/my_root where /nfs is the mount point. It must be a mountpoint,
1498 * though, so you may need to say mount --bind /nfs/my_root /nfs/my_root
1499 * first.
1500 */
b58fed8b
RP
1501asmlinkage long sys_pivot_root(const char __user * new_root,
1502 const char __user * put_old)
1da177e4
LT
1503{
1504 struct vfsmount *tmp;
1505 struct nameidata new_nd, old_nd, parent_nd, root_parent, user_nd;
1506 int error;
1507
1508 if (!capable(CAP_SYS_ADMIN))
1509 return -EPERM;
1510
1511 lock_kernel();
1512
b58fed8b
RP
1513 error = __user_walk(new_root, LOOKUP_FOLLOW | LOOKUP_DIRECTORY,
1514 &new_nd);
1da177e4
LT
1515 if (error)
1516 goto out0;
1517 error = -EINVAL;
1518 if (!check_mnt(new_nd.mnt))
1519 goto out1;
1520
b58fed8b 1521 error = __user_walk(put_old, LOOKUP_FOLLOW | LOOKUP_DIRECTORY, &old_nd);
1da177e4
LT
1522 if (error)
1523 goto out1;
1524
1525 error = security_sb_pivotroot(&old_nd, &new_nd);
1526 if (error) {
1527 path_release(&old_nd);
1528 goto out1;
1529 }
1530
1531 read_lock(&current->fs->lock);
1532 user_nd.mnt = mntget(current->fs->rootmnt);
1533 user_nd.dentry = dget(current->fs->root);
1534 read_unlock(&current->fs->lock);
390c6843 1535 down_write(&namespace_sem);
1da177e4
LT
1536 down(&old_nd.dentry->d_inode->i_sem);
1537 error = -EINVAL;
21444403
RP
1538 if (IS_MNT_SHARED(old_nd.mnt) ||
1539 IS_MNT_SHARED(new_nd.mnt->mnt_parent) ||
1540 IS_MNT_SHARED(user_nd.mnt->mnt_parent))
1541 goto out2;
1da177e4
LT
1542 if (!check_mnt(user_nd.mnt))
1543 goto out2;
1544 error = -ENOENT;
1545 if (IS_DEADDIR(new_nd.dentry->d_inode))
1546 goto out2;
1547 if (d_unhashed(new_nd.dentry) && !IS_ROOT(new_nd.dentry))
1548 goto out2;
1549 if (d_unhashed(old_nd.dentry) && !IS_ROOT(old_nd.dentry))
1550 goto out2;
1551 error = -EBUSY;
1552 if (new_nd.mnt == user_nd.mnt || old_nd.mnt == user_nd.mnt)
1553 goto out2; /* loop, on the same file system */
1554 error = -EINVAL;
1555 if (user_nd.mnt->mnt_root != user_nd.dentry)
1556 goto out2; /* not a mountpoint */
0bb6fcc1
MS
1557 if (user_nd.mnt->mnt_parent == user_nd.mnt)
1558 goto out2; /* not attached */
1da177e4
LT
1559 if (new_nd.mnt->mnt_root != new_nd.dentry)
1560 goto out2; /* not a mountpoint */
0bb6fcc1
MS
1561 if (new_nd.mnt->mnt_parent == new_nd.mnt)
1562 goto out2; /* not attached */
1da177e4
LT
1563 tmp = old_nd.mnt; /* make sure we can reach put_old from new_root */
1564 spin_lock(&vfsmount_lock);
1565 if (tmp != new_nd.mnt) {
1566 for (;;) {
1567 if (tmp->mnt_parent == tmp)
1568 goto out3; /* already mounted on put_old */
1569 if (tmp->mnt_parent == new_nd.mnt)
1570 break;
1571 tmp = tmp->mnt_parent;
1572 }
1573 if (!is_subdir(tmp->mnt_mountpoint, new_nd.dentry))
1574 goto out3;
1575 } else if (!is_subdir(old_nd.dentry, new_nd.dentry))
1576 goto out3;
1577 detach_mnt(new_nd.mnt, &parent_nd);
1578 detach_mnt(user_nd.mnt, &root_parent);
1579 attach_mnt(user_nd.mnt, &old_nd); /* mount old root on put_old */
1580 attach_mnt(new_nd.mnt, &root_parent); /* mount new_root on / */
5addc5dd 1581 touch_namespace(current->namespace);
1da177e4
LT
1582 spin_unlock(&vfsmount_lock);
1583 chroot_fs_refs(&user_nd, &new_nd);
1584 security_sb_post_pivotroot(&user_nd, &new_nd);
1585 error = 0;
1586 path_release(&root_parent);
1587 path_release(&parent_nd);
1588out2:
1589 up(&old_nd.dentry->d_inode->i_sem);
390c6843 1590 up_write(&namespace_sem);
1da177e4
LT
1591 path_release(&user_nd);
1592 path_release(&old_nd);
1593out1:
1594 path_release(&new_nd);
1595out0:
1596 unlock_kernel();
1597 return error;
1598out3:
1599 spin_unlock(&vfsmount_lock);
1600 goto out2;
1601}
1602
1603static void __init init_mount_tree(void)
1604{
1605 struct vfsmount *mnt;
1606 struct namespace *namespace;
1607 struct task_struct *g, *p;
1608
1609 mnt = do_kern_mount("rootfs", 0, "rootfs", NULL);
1610 if (IS_ERR(mnt))
1611 panic("Can't create rootfs");
1612 namespace = kmalloc(sizeof(*namespace), GFP_KERNEL);
1613 if (!namespace)
1614 panic("Can't allocate initial namespace");
1615 atomic_set(&namespace->count, 1);
1616 INIT_LIST_HEAD(&namespace->list);
5addc5dd
AV
1617 init_waitqueue_head(&namespace->poll);
1618 namespace->event = 0;
1da177e4
LT
1619 list_add(&mnt->mnt_list, &namespace->list);
1620 namespace->root = mnt;
1621 mnt->mnt_namespace = namespace;
1622
1623 init_task.namespace = namespace;
1624 read_lock(&tasklist_lock);
1625 do_each_thread(g, p) {
1626 get_namespace(namespace);
1627 p->namespace = namespace;
1628 } while_each_thread(g, p);
1629 read_unlock(&tasklist_lock);
1630
1631 set_fs_pwd(current->fs, namespace->root, namespace->root->mnt_root);
1632 set_fs_root(current->fs, namespace->root, namespace->root->mnt_root);
1633}
1634
1635void __init mnt_init(unsigned long mempages)
1636{
1637 struct list_head *d;
1638 unsigned int nr_hash;
1639 int i;
1640
390c6843
RP
1641 init_rwsem(&namespace_sem);
1642
1da177e4 1643 mnt_cache = kmem_cache_create("mnt_cache", sizeof(struct vfsmount),
b58fed8b 1644 0, SLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL, NULL);
1da177e4 1645
b58fed8b 1646 mount_hashtable = (struct list_head *)__get_free_page(GFP_ATOMIC);
1da177e4
LT
1647
1648 if (!mount_hashtable)
1649 panic("Failed to allocate mount hash table\n");
1650
1651 /*
1652 * Find the power-of-two list-heads that can fit into the allocation..
1653 * We don't guarantee that "sizeof(struct list_head)" is necessarily
1654 * a power-of-two.
1655 */
1656 nr_hash = PAGE_SIZE / sizeof(struct list_head);
1657 hash_bits = 0;
1658 do {
1659 hash_bits++;
1660 } while ((nr_hash >> hash_bits) != 0);
1661 hash_bits--;
1662
1663 /*
1664 * Re-calculate the actual number of entries and the mask
1665 * from the number of bits we can fit.
1666 */
1667 nr_hash = 1UL << hash_bits;
b58fed8b 1668 hash_mask = nr_hash - 1;
1da177e4
LT
1669
1670 printk("Mount-cache hash table entries: %d\n", nr_hash);
1671
1672 /* And initialize the newly allocated array */
1673 d = mount_hashtable;
1674 i = nr_hash;
1675 do {
1676 INIT_LIST_HEAD(d);
1677 d++;
1678 i--;
1679 } while (i);
1680 sysfs_init();
1681 init_rootfs();
1682 init_mount_tree();
1683}
1684
1685void __put_namespace(struct namespace *namespace)
1686{
1ce88cf4 1687 struct vfsmount *root = namespace->root;
70fbcdf4 1688 LIST_HEAD(umount_list);
1ce88cf4
MS
1689 namespace->root = NULL;
1690 spin_unlock(&vfsmount_lock);
390c6843 1691 down_write(&namespace_sem);
1da177e4 1692 spin_lock(&vfsmount_lock);
a05964f3 1693 umount_tree(root, 0, &umount_list);
1da177e4 1694 spin_unlock(&vfsmount_lock);
390c6843 1695 up_write(&namespace_sem);
70fbcdf4 1696 release_mounts(&umount_list);
1da177e4
LT
1697 kfree(namespace);
1698}