xref: /openbmc/linux/fs/namespace.c (revision b5e61818)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *  linux/fs/namespace.c
31da177e4SLinus Torvalds  *
41da177e4SLinus Torvalds  * (C) Copyright Al Viro 2000, 2001
51da177e4SLinus Torvalds  *	Released under GPL v2.
61da177e4SLinus Torvalds  *
71da177e4SLinus Torvalds  * Based on code from fs/super.c, copyright Linus Torvalds and others.
81da177e4SLinus Torvalds  * Heavily rewritten.
91da177e4SLinus Torvalds  */
101da177e4SLinus Torvalds 
111da177e4SLinus Torvalds #include <linux/syscalls.h>
121da177e4SLinus Torvalds #include <linux/slab.h>
131da177e4SLinus Torvalds #include <linux/sched.h>
141da177e4SLinus Torvalds #include <linux/smp_lock.h>
151da177e4SLinus Torvalds #include <linux/init.h>
1615a67dd8SRandy Dunlap #include <linux/kernel.h>
171da177e4SLinus Torvalds #include <linux/quotaops.h>
181da177e4SLinus Torvalds #include <linux/acct.h>
1916f7e0feSRandy Dunlap #include <linux/capability.h>
201da177e4SLinus Torvalds #include <linux/module.h>
21f20a9eadSAndrew Morton #include <linux/sysfs.h>
221da177e4SLinus Torvalds #include <linux/seq_file.h>
236b3286edSKirill Korotaev #include <linux/mnt_namespace.h>
241da177e4SLinus Torvalds #include <linux/namei.h>
251da177e4SLinus Torvalds #include <linux/security.h>
261da177e4SLinus Torvalds #include <linux/mount.h>
2707f3f05cSDavid Howells #include <linux/ramfs.h>
281da177e4SLinus Torvalds #include <asm/uaccess.h>
291da177e4SLinus Torvalds #include <asm/unistd.h>
3007b20889SRam Pai #include "pnode.h"
311da177e4SLinus Torvalds 
321da177e4SLinus Torvalds /* spinlock for vfsmount related operations, inplace of dcache_lock */
331da177e4SLinus Torvalds __cacheline_aligned_in_smp DEFINE_SPINLOCK(vfsmount_lock);
341da177e4SLinus Torvalds 
355addc5ddSAl Viro static int event;
365addc5ddSAl Viro 
37fa3536ccSEric Dumazet static struct list_head *mount_hashtable __read_mostly;
386c231b7bSRavikiran G Thirumalai static int hash_mask __read_mostly, hash_bits __read_mostly;
39e18b890bSChristoph Lameter static struct kmem_cache *mnt_cache __read_mostly;
40390c6843SRam Pai static struct rw_semaphore namespace_sem;
411da177e4SLinus Torvalds 
42f87fd4c2SMiklos Szeredi /* /sys/fs */
43f87fd4c2SMiklos Szeredi decl_subsys(fs, NULL, NULL);
44f87fd4c2SMiklos Szeredi EXPORT_SYMBOL_GPL(fs_subsys);
45f87fd4c2SMiklos Szeredi 
461da177e4SLinus Torvalds static inline unsigned long hash(struct vfsmount *mnt, struct dentry *dentry)
471da177e4SLinus Torvalds {
481da177e4SLinus Torvalds 	unsigned long tmp = ((unsigned long)mnt / L1_CACHE_BYTES);
491da177e4SLinus Torvalds 	tmp += ((unsigned long)dentry / L1_CACHE_BYTES);
501da177e4SLinus Torvalds 	tmp = tmp + (tmp >> hash_bits);
511da177e4SLinus Torvalds 	return tmp & hash_mask;
521da177e4SLinus Torvalds }
531da177e4SLinus Torvalds 
541da177e4SLinus Torvalds struct vfsmount *alloc_vfsmnt(const char *name)
551da177e4SLinus Torvalds {
56c3762229SRobert P. J. Day 	struct vfsmount *mnt = kmem_cache_zalloc(mnt_cache, GFP_KERNEL);
571da177e4SLinus Torvalds 	if (mnt) {
581da177e4SLinus Torvalds 		atomic_set(&mnt->mnt_count, 1);
591da177e4SLinus Torvalds 		INIT_LIST_HEAD(&mnt->mnt_hash);
601da177e4SLinus Torvalds 		INIT_LIST_HEAD(&mnt->mnt_child);
611da177e4SLinus Torvalds 		INIT_LIST_HEAD(&mnt->mnt_mounts);
621da177e4SLinus Torvalds 		INIT_LIST_HEAD(&mnt->mnt_list);
6355e700b9SMiklos Szeredi 		INIT_LIST_HEAD(&mnt->mnt_expire);
6403e06e68SRam Pai 		INIT_LIST_HEAD(&mnt->mnt_share);
65a58b0eb8SRam Pai 		INIT_LIST_HEAD(&mnt->mnt_slave_list);
66a58b0eb8SRam Pai 		INIT_LIST_HEAD(&mnt->mnt_slave);
671da177e4SLinus Torvalds 		if (name) {
681da177e4SLinus Torvalds 			int size = strlen(name) + 1;
691da177e4SLinus Torvalds 			char *newname = kmalloc(size, GFP_KERNEL);
701da177e4SLinus Torvalds 			if (newname) {
711da177e4SLinus Torvalds 				memcpy(newname, name, size);
721da177e4SLinus Torvalds 				mnt->mnt_devname = newname;
731da177e4SLinus Torvalds 			}
741da177e4SLinus Torvalds 		}
751da177e4SLinus Torvalds 	}
761da177e4SLinus Torvalds 	return mnt;
771da177e4SLinus Torvalds }
781da177e4SLinus Torvalds 
79454e2398SDavid Howells int simple_set_mnt(struct vfsmount *mnt, struct super_block *sb)
80454e2398SDavid Howells {
81454e2398SDavid Howells 	mnt->mnt_sb = sb;
82454e2398SDavid Howells 	mnt->mnt_root = dget(sb->s_root);
83454e2398SDavid Howells 	return 0;
84454e2398SDavid Howells }
85454e2398SDavid Howells 
86454e2398SDavid Howells EXPORT_SYMBOL(simple_set_mnt);
87454e2398SDavid Howells 
881da177e4SLinus Torvalds void free_vfsmnt(struct vfsmount *mnt)
891da177e4SLinus Torvalds {
901da177e4SLinus Torvalds 	kfree(mnt->mnt_devname);
911da177e4SLinus Torvalds 	kmem_cache_free(mnt_cache, mnt);
921da177e4SLinus Torvalds }
931da177e4SLinus Torvalds 
941da177e4SLinus Torvalds /*
95a05964f3SRam Pai  * find the first or last mount at @dentry on vfsmount @mnt depending on
96a05964f3SRam Pai  * @dir. If @dir is set return the first mount else return the last mount.
971da177e4SLinus Torvalds  */
98a05964f3SRam Pai struct vfsmount *__lookup_mnt(struct vfsmount *mnt, struct dentry *dentry,
99a05964f3SRam Pai 			      int dir)
1001da177e4SLinus Torvalds {
1011da177e4SLinus Torvalds 	struct list_head *head = mount_hashtable + hash(mnt, dentry);
1021da177e4SLinus Torvalds 	struct list_head *tmp = head;
1031da177e4SLinus Torvalds 	struct vfsmount *p, *found = NULL;
1041da177e4SLinus Torvalds 
1051da177e4SLinus Torvalds 	for (;;) {
106a05964f3SRam Pai 		tmp = dir ? tmp->next : tmp->prev;
1071da177e4SLinus Torvalds 		p = NULL;
1081da177e4SLinus Torvalds 		if (tmp == head)
1091da177e4SLinus Torvalds 			break;
1101da177e4SLinus Torvalds 		p = list_entry(tmp, struct vfsmount, mnt_hash);
1111da177e4SLinus Torvalds 		if (p->mnt_parent == mnt && p->mnt_mountpoint == dentry) {
112a05964f3SRam Pai 			found = p;
1131da177e4SLinus Torvalds 			break;
1141da177e4SLinus Torvalds 		}
1151da177e4SLinus Torvalds 	}
1161da177e4SLinus Torvalds 	return found;
1171da177e4SLinus Torvalds }
1181da177e4SLinus Torvalds 
119a05964f3SRam Pai /*
120a05964f3SRam Pai  * lookup_mnt increments the ref count before returning
121a05964f3SRam Pai  * the vfsmount struct.
122a05964f3SRam Pai  */
123a05964f3SRam Pai struct vfsmount *lookup_mnt(struct vfsmount *mnt, struct dentry *dentry)
124a05964f3SRam Pai {
125a05964f3SRam Pai 	struct vfsmount *child_mnt;
126a05964f3SRam Pai 	spin_lock(&vfsmount_lock);
127a05964f3SRam Pai 	if ((child_mnt = __lookup_mnt(mnt, dentry, 1)))
128a05964f3SRam Pai 		mntget(child_mnt);
129a05964f3SRam Pai 	spin_unlock(&vfsmount_lock);
130a05964f3SRam Pai 	return child_mnt;
131a05964f3SRam Pai }
132a05964f3SRam Pai 
1331da177e4SLinus Torvalds static inline int check_mnt(struct vfsmount *mnt)
1341da177e4SLinus Torvalds {
1356b3286edSKirill Korotaev 	return mnt->mnt_ns == current->nsproxy->mnt_ns;
1361da177e4SLinus Torvalds }
1371da177e4SLinus Torvalds 
1386b3286edSKirill Korotaev static void touch_mnt_namespace(struct mnt_namespace *ns)
1395addc5ddSAl Viro {
1405addc5ddSAl Viro 	if (ns) {
1415addc5ddSAl Viro 		ns->event = ++event;
1425addc5ddSAl Viro 		wake_up_interruptible(&ns->poll);
1435addc5ddSAl Viro 	}
1445addc5ddSAl Viro }
1455addc5ddSAl Viro 
1466b3286edSKirill Korotaev static void __touch_mnt_namespace(struct mnt_namespace *ns)
1475addc5ddSAl Viro {
1485addc5ddSAl Viro 	if (ns && ns->event != event) {
1495addc5ddSAl Viro 		ns->event = event;
1505addc5ddSAl Viro 		wake_up_interruptible(&ns->poll);
1515addc5ddSAl Viro 	}
1525addc5ddSAl Viro }
1535addc5ddSAl Viro 
1541da177e4SLinus Torvalds static void detach_mnt(struct vfsmount *mnt, struct nameidata *old_nd)
1551da177e4SLinus Torvalds {
1561da177e4SLinus Torvalds 	old_nd->dentry = mnt->mnt_mountpoint;
1571da177e4SLinus Torvalds 	old_nd->mnt = mnt->mnt_parent;
1581da177e4SLinus Torvalds 	mnt->mnt_parent = mnt;
1591da177e4SLinus Torvalds 	mnt->mnt_mountpoint = mnt->mnt_root;
1601da177e4SLinus Torvalds 	list_del_init(&mnt->mnt_child);
1611da177e4SLinus Torvalds 	list_del_init(&mnt->mnt_hash);
1621da177e4SLinus Torvalds 	old_nd->dentry->d_mounted--;
1631da177e4SLinus Torvalds }
1641da177e4SLinus Torvalds 
165b90fa9aeSRam Pai void mnt_set_mountpoint(struct vfsmount *mnt, struct dentry *dentry,
166b90fa9aeSRam Pai 			struct vfsmount *child_mnt)
167b90fa9aeSRam Pai {
168b90fa9aeSRam Pai 	child_mnt->mnt_parent = mntget(mnt);
169b90fa9aeSRam Pai 	child_mnt->mnt_mountpoint = dget(dentry);
170b90fa9aeSRam Pai 	dentry->d_mounted++;
171b90fa9aeSRam Pai }
172b90fa9aeSRam Pai 
1731da177e4SLinus Torvalds static void attach_mnt(struct vfsmount *mnt, struct nameidata *nd)
1741da177e4SLinus Torvalds {
175b90fa9aeSRam Pai 	mnt_set_mountpoint(nd->mnt, nd->dentry, mnt);
176b90fa9aeSRam Pai 	list_add_tail(&mnt->mnt_hash, mount_hashtable +
177b90fa9aeSRam Pai 			hash(nd->mnt, nd->dentry));
1781da177e4SLinus Torvalds 	list_add_tail(&mnt->mnt_child, &nd->mnt->mnt_mounts);
179b90fa9aeSRam Pai }
180b90fa9aeSRam Pai 
181b90fa9aeSRam Pai /*
182b90fa9aeSRam Pai  * the caller must hold vfsmount_lock
183b90fa9aeSRam Pai  */
184b90fa9aeSRam Pai static void commit_tree(struct vfsmount *mnt)
185b90fa9aeSRam Pai {
186b90fa9aeSRam Pai 	struct vfsmount *parent = mnt->mnt_parent;
187b90fa9aeSRam Pai 	struct vfsmount *m;
188b90fa9aeSRam Pai 	LIST_HEAD(head);
1896b3286edSKirill Korotaev 	struct mnt_namespace *n = parent->mnt_ns;
190b90fa9aeSRam Pai 
191b90fa9aeSRam Pai 	BUG_ON(parent == mnt);
192b90fa9aeSRam Pai 
193b90fa9aeSRam Pai 	list_add_tail(&head, &mnt->mnt_list);
194b90fa9aeSRam Pai 	list_for_each_entry(m, &head, mnt_list)
1956b3286edSKirill Korotaev 		m->mnt_ns = n;
196b90fa9aeSRam Pai 	list_splice(&head, n->list.prev);
197b90fa9aeSRam Pai 
198b90fa9aeSRam Pai 	list_add_tail(&mnt->mnt_hash, mount_hashtable +
199b90fa9aeSRam Pai 				hash(parent, mnt->mnt_mountpoint));
200b90fa9aeSRam Pai 	list_add_tail(&mnt->mnt_child, &parent->mnt_mounts);
2016b3286edSKirill Korotaev 	touch_mnt_namespace(n);
2021da177e4SLinus Torvalds }
2031da177e4SLinus Torvalds 
2041da177e4SLinus Torvalds static struct vfsmount *next_mnt(struct vfsmount *p, struct vfsmount *root)
2051da177e4SLinus Torvalds {
2061da177e4SLinus Torvalds 	struct list_head *next = p->mnt_mounts.next;
2071da177e4SLinus Torvalds 	if (next == &p->mnt_mounts) {
2081da177e4SLinus Torvalds 		while (1) {
2091da177e4SLinus Torvalds 			if (p == root)
2101da177e4SLinus Torvalds 				return NULL;
2111da177e4SLinus Torvalds 			next = p->mnt_child.next;
2121da177e4SLinus Torvalds 			if (next != &p->mnt_parent->mnt_mounts)
2131da177e4SLinus Torvalds 				break;
2141da177e4SLinus Torvalds 			p = p->mnt_parent;
2151da177e4SLinus Torvalds 		}
2161da177e4SLinus Torvalds 	}
2171da177e4SLinus Torvalds 	return list_entry(next, struct vfsmount, mnt_child);
2181da177e4SLinus Torvalds }
2191da177e4SLinus Torvalds 
2209676f0c6SRam Pai static struct vfsmount *skip_mnt_tree(struct vfsmount *p)
2219676f0c6SRam Pai {
2229676f0c6SRam Pai 	struct list_head *prev = p->mnt_mounts.prev;
2239676f0c6SRam Pai 	while (prev != &p->mnt_mounts) {
2249676f0c6SRam Pai 		p = list_entry(prev, struct vfsmount, mnt_child);
2259676f0c6SRam Pai 		prev = p->mnt_mounts.prev;
2269676f0c6SRam Pai 	}
2279676f0c6SRam Pai 	return p;
2289676f0c6SRam Pai }
2299676f0c6SRam Pai 
23036341f64SRam Pai static struct vfsmount *clone_mnt(struct vfsmount *old, struct dentry *root,
23136341f64SRam Pai 					int flag)
2321da177e4SLinus Torvalds {
2331da177e4SLinus Torvalds 	struct super_block *sb = old->mnt_sb;
2341da177e4SLinus Torvalds 	struct vfsmount *mnt = alloc_vfsmnt(old->mnt_devname);
2351da177e4SLinus Torvalds 
2361da177e4SLinus Torvalds 	if (mnt) {
2371da177e4SLinus Torvalds 		mnt->mnt_flags = old->mnt_flags;
2381da177e4SLinus Torvalds 		atomic_inc(&sb->s_active);
2391da177e4SLinus Torvalds 		mnt->mnt_sb = sb;
2401da177e4SLinus Torvalds 		mnt->mnt_root = dget(root);
2411da177e4SLinus Torvalds 		mnt->mnt_mountpoint = mnt->mnt_root;
2421da177e4SLinus Torvalds 		mnt->mnt_parent = mnt;
243b90fa9aeSRam Pai 
2445afe0022SRam Pai 		if (flag & CL_SLAVE) {
2455afe0022SRam Pai 			list_add(&mnt->mnt_slave, &old->mnt_slave_list);
2465afe0022SRam Pai 			mnt->mnt_master = old;
2475afe0022SRam Pai 			CLEAR_MNT_SHARED(mnt);
2485afe0022SRam Pai 		} else {
249b90fa9aeSRam Pai 			if ((flag & CL_PROPAGATION) || IS_MNT_SHARED(old))
250b90fa9aeSRam Pai 				list_add(&mnt->mnt_share, &old->mnt_share);
2515afe0022SRam Pai 			if (IS_MNT_SLAVE(old))
2525afe0022SRam Pai 				list_add(&mnt->mnt_slave, &old->mnt_slave);
2535afe0022SRam Pai 			mnt->mnt_master = old->mnt_master;
2545afe0022SRam Pai 		}
255b90fa9aeSRam Pai 		if (flag & CL_MAKE_SHARED)
256b90fa9aeSRam Pai 			set_mnt_shared(mnt);
2571da177e4SLinus Torvalds 
2581da177e4SLinus Torvalds 		/* stick the duplicate mount on the same expiry list
2591da177e4SLinus Torvalds 		 * as the original if that was on one */
26036341f64SRam Pai 		if (flag & CL_EXPIRE) {
2611da177e4SLinus Torvalds 			spin_lock(&vfsmount_lock);
26255e700b9SMiklos Szeredi 			if (!list_empty(&old->mnt_expire))
26355e700b9SMiklos Szeredi 				list_add(&mnt->mnt_expire, &old->mnt_expire);
2641da177e4SLinus Torvalds 			spin_unlock(&vfsmount_lock);
2651da177e4SLinus Torvalds 		}
26636341f64SRam Pai 	}
2671da177e4SLinus Torvalds 	return mnt;
2681da177e4SLinus Torvalds }
2691da177e4SLinus Torvalds 
2707b7b1aceSAl Viro static inline void __mntput(struct vfsmount *mnt)
2711da177e4SLinus Torvalds {
2721da177e4SLinus Torvalds 	struct super_block *sb = mnt->mnt_sb;
2731da177e4SLinus Torvalds 	dput(mnt->mnt_root);
2741da177e4SLinus Torvalds 	free_vfsmnt(mnt);
2751da177e4SLinus Torvalds 	deactivate_super(sb);
2761da177e4SLinus Torvalds }
2771da177e4SLinus Torvalds 
2787b7b1aceSAl Viro void mntput_no_expire(struct vfsmount *mnt)
2797b7b1aceSAl Viro {
2807b7b1aceSAl Viro repeat:
2817b7b1aceSAl Viro 	if (atomic_dec_and_lock(&mnt->mnt_count, &vfsmount_lock)) {
2827b7b1aceSAl Viro 		if (likely(!mnt->mnt_pinned)) {
2837b7b1aceSAl Viro 			spin_unlock(&vfsmount_lock);
2847b7b1aceSAl Viro 			__mntput(mnt);
2857b7b1aceSAl Viro 			return;
2867b7b1aceSAl Viro 		}
2877b7b1aceSAl Viro 		atomic_add(mnt->mnt_pinned + 1, &mnt->mnt_count);
2887b7b1aceSAl Viro 		mnt->mnt_pinned = 0;
2897b7b1aceSAl Viro 		spin_unlock(&vfsmount_lock);
2907b7b1aceSAl Viro 		acct_auto_close_mnt(mnt);
2917b7b1aceSAl Viro 		security_sb_umount_close(mnt);
2927b7b1aceSAl Viro 		goto repeat;
2937b7b1aceSAl Viro 	}
2947b7b1aceSAl Viro }
2957b7b1aceSAl Viro 
2967b7b1aceSAl Viro EXPORT_SYMBOL(mntput_no_expire);
2977b7b1aceSAl Viro 
2987b7b1aceSAl Viro void mnt_pin(struct vfsmount *mnt)
2997b7b1aceSAl Viro {
3007b7b1aceSAl Viro 	spin_lock(&vfsmount_lock);
3017b7b1aceSAl Viro 	mnt->mnt_pinned++;
3027b7b1aceSAl Viro 	spin_unlock(&vfsmount_lock);
3037b7b1aceSAl Viro }
3047b7b1aceSAl Viro 
3057b7b1aceSAl Viro EXPORT_SYMBOL(mnt_pin);
3067b7b1aceSAl Viro 
3077b7b1aceSAl Viro void mnt_unpin(struct vfsmount *mnt)
3087b7b1aceSAl Viro {
3097b7b1aceSAl Viro 	spin_lock(&vfsmount_lock);
3107b7b1aceSAl Viro 	if (mnt->mnt_pinned) {
3117b7b1aceSAl Viro 		atomic_inc(&mnt->mnt_count);
3127b7b1aceSAl Viro 		mnt->mnt_pinned--;
3137b7b1aceSAl Viro 	}
3147b7b1aceSAl Viro 	spin_unlock(&vfsmount_lock);
3157b7b1aceSAl Viro }
3167b7b1aceSAl Viro 
3177b7b1aceSAl Viro EXPORT_SYMBOL(mnt_unpin);
3181da177e4SLinus Torvalds 
3191da177e4SLinus Torvalds /* iterator */
3201da177e4SLinus Torvalds static void *m_start(struct seq_file *m, loff_t *pos)
3211da177e4SLinus Torvalds {
3226b3286edSKirill Korotaev 	struct mnt_namespace *n = m->private;
3231da177e4SLinus Torvalds 	struct list_head *p;
3241da177e4SLinus Torvalds 	loff_t l = *pos;
3251da177e4SLinus Torvalds 
326390c6843SRam Pai 	down_read(&namespace_sem);
3271da177e4SLinus Torvalds 	list_for_each(p, &n->list)
3281da177e4SLinus Torvalds 		if (!l--)
3291da177e4SLinus Torvalds 			return list_entry(p, struct vfsmount, mnt_list);
3301da177e4SLinus Torvalds 	return NULL;
3311da177e4SLinus Torvalds }
3321da177e4SLinus Torvalds 
3331da177e4SLinus Torvalds static void *m_next(struct seq_file *m, void *v, loff_t *pos)
3341da177e4SLinus Torvalds {
3356b3286edSKirill Korotaev 	struct mnt_namespace *n = m->private;
3361da177e4SLinus Torvalds 	struct list_head *p = ((struct vfsmount *)v)->mnt_list.next;
3371da177e4SLinus Torvalds 	(*pos)++;
3381da177e4SLinus Torvalds 	return p == &n->list ? NULL : list_entry(p, struct vfsmount, mnt_list);
3391da177e4SLinus Torvalds }
3401da177e4SLinus Torvalds 
3411da177e4SLinus Torvalds static void m_stop(struct seq_file *m, void *v)
3421da177e4SLinus Torvalds {
343390c6843SRam Pai 	up_read(&namespace_sem);
3441da177e4SLinus Torvalds }
3451da177e4SLinus Torvalds 
3461da177e4SLinus Torvalds static inline void mangle(struct seq_file *m, const char *s)
3471da177e4SLinus Torvalds {
3481da177e4SLinus Torvalds 	seq_escape(m, s, " \t\n\\");
3491da177e4SLinus Torvalds }
3501da177e4SLinus Torvalds 
3511da177e4SLinus Torvalds static int show_vfsmnt(struct seq_file *m, void *v)
3521da177e4SLinus Torvalds {
3531da177e4SLinus Torvalds 	struct vfsmount *mnt = v;
3541da177e4SLinus Torvalds 	int err = 0;
3551da177e4SLinus Torvalds 	static struct proc_fs_info {
3561da177e4SLinus Torvalds 		int flag;
3571da177e4SLinus Torvalds 		char *str;
3581da177e4SLinus Torvalds 	} fs_info[] = {
3591da177e4SLinus Torvalds 		{ MS_SYNCHRONOUS, ",sync" },
3601da177e4SLinus Torvalds 		{ MS_DIRSYNC, ",dirsync" },
3611da177e4SLinus Torvalds 		{ MS_MANDLOCK, ",mand" },
3621da177e4SLinus Torvalds 		{ 0, NULL }
3631da177e4SLinus Torvalds 	};
3641da177e4SLinus Torvalds 	static struct proc_fs_info mnt_info[] = {
3651da177e4SLinus Torvalds 		{ MNT_NOSUID, ",nosuid" },
3661da177e4SLinus Torvalds 		{ MNT_NODEV, ",nodev" },
3671da177e4SLinus Torvalds 		{ MNT_NOEXEC, ",noexec" },
368fc33a7bbSChristoph Hellwig 		{ MNT_NOATIME, ",noatime" },
369fc33a7bbSChristoph Hellwig 		{ MNT_NODIRATIME, ",nodiratime" },
37047ae32d6SValerie Henson 		{ MNT_RELATIME, ",relatime" },
3711da177e4SLinus Torvalds 		{ 0, NULL }
3721da177e4SLinus Torvalds 	};
3731da177e4SLinus Torvalds 	struct proc_fs_info *fs_infop;
3741da177e4SLinus Torvalds 
3751da177e4SLinus Torvalds 	mangle(m, mnt->mnt_devname ? mnt->mnt_devname : "none");
3761da177e4SLinus Torvalds 	seq_putc(m, ' ');
3771da177e4SLinus Torvalds 	seq_path(m, mnt, mnt->mnt_root, " \t\n\\");
3781da177e4SLinus Torvalds 	seq_putc(m, ' ');
3791da177e4SLinus Torvalds 	mangle(m, mnt->mnt_sb->s_type->name);
38079c0b2dfSMiklos Szeredi 	if (mnt->mnt_sb->s_subtype && mnt->mnt_sb->s_subtype[0]) {
38179c0b2dfSMiklos Szeredi 		seq_putc(m, '.');
38279c0b2dfSMiklos Szeredi 		mangle(m, mnt->mnt_sb->s_subtype);
38379c0b2dfSMiklos Szeredi 	}
3841da177e4SLinus Torvalds 	seq_puts(m, mnt->mnt_sb->s_flags & MS_RDONLY ? " ro" : " rw");
3851da177e4SLinus Torvalds 	for (fs_infop = fs_info; fs_infop->flag; fs_infop++) {
3861da177e4SLinus Torvalds 		if (mnt->mnt_sb->s_flags & fs_infop->flag)
3871da177e4SLinus Torvalds 			seq_puts(m, fs_infop->str);
3881da177e4SLinus Torvalds 	}
3891da177e4SLinus Torvalds 	for (fs_infop = mnt_info; fs_infop->flag; fs_infop++) {
3901da177e4SLinus Torvalds 		if (mnt->mnt_flags & fs_infop->flag)
3911da177e4SLinus Torvalds 			seq_puts(m, fs_infop->str);
3921da177e4SLinus Torvalds 	}
3931da177e4SLinus Torvalds 	if (mnt->mnt_sb->s_op->show_options)
3941da177e4SLinus Torvalds 		err = mnt->mnt_sb->s_op->show_options(m, mnt);
3951da177e4SLinus Torvalds 	seq_puts(m, " 0 0\n");
3961da177e4SLinus Torvalds 	return err;
3971da177e4SLinus Torvalds }
3981da177e4SLinus Torvalds 
3991da177e4SLinus Torvalds struct seq_operations mounts_op = {
4001da177e4SLinus Torvalds 	.start	= m_start,
4011da177e4SLinus Torvalds 	.next	= m_next,
4021da177e4SLinus Torvalds 	.stop	= m_stop,
4031da177e4SLinus Torvalds 	.show	= show_vfsmnt
4041da177e4SLinus Torvalds };
4051da177e4SLinus Torvalds 
406b4629fe2SChuck Lever static int show_vfsstat(struct seq_file *m, void *v)
407b4629fe2SChuck Lever {
408b4629fe2SChuck Lever 	struct vfsmount *mnt = v;
409b4629fe2SChuck Lever 	int err = 0;
410b4629fe2SChuck Lever 
411b4629fe2SChuck Lever 	/* device */
412b4629fe2SChuck Lever 	if (mnt->mnt_devname) {
413b4629fe2SChuck Lever 		seq_puts(m, "device ");
414b4629fe2SChuck Lever 		mangle(m, mnt->mnt_devname);
415b4629fe2SChuck Lever 	} else
416b4629fe2SChuck Lever 		seq_puts(m, "no device");
417b4629fe2SChuck Lever 
418b4629fe2SChuck Lever 	/* mount point */
419b4629fe2SChuck Lever 	seq_puts(m, " mounted on ");
420b4629fe2SChuck Lever 	seq_path(m, mnt, mnt->mnt_root, " \t\n\\");
421b4629fe2SChuck Lever 	seq_putc(m, ' ');
422b4629fe2SChuck Lever 
423b4629fe2SChuck Lever 	/* file system type */
424b4629fe2SChuck Lever 	seq_puts(m, "with fstype ");
425b4629fe2SChuck Lever 	mangle(m, mnt->mnt_sb->s_type->name);
426b4629fe2SChuck Lever 
427b4629fe2SChuck Lever 	/* optional statistics */
428b4629fe2SChuck Lever 	if (mnt->mnt_sb->s_op->show_stats) {
429b4629fe2SChuck Lever 		seq_putc(m, ' ');
430b4629fe2SChuck Lever 		err = mnt->mnt_sb->s_op->show_stats(m, mnt);
431b4629fe2SChuck Lever 	}
432b4629fe2SChuck Lever 
433b4629fe2SChuck Lever 	seq_putc(m, '\n');
434b4629fe2SChuck Lever 	return err;
435b4629fe2SChuck Lever }
436b4629fe2SChuck Lever 
437b4629fe2SChuck Lever struct seq_operations mountstats_op = {
438b4629fe2SChuck Lever 	.start	= m_start,
439b4629fe2SChuck Lever 	.next	= m_next,
440b4629fe2SChuck Lever 	.stop	= m_stop,
441b4629fe2SChuck Lever 	.show	= show_vfsstat,
442b4629fe2SChuck Lever };
443b4629fe2SChuck Lever 
4441da177e4SLinus Torvalds /**
4451da177e4SLinus Torvalds  * may_umount_tree - check if a mount tree is busy
4461da177e4SLinus Torvalds  * @mnt: root of mount tree
4471da177e4SLinus Torvalds  *
4481da177e4SLinus Torvalds  * This is called to check if a tree of mounts has any
4491da177e4SLinus Torvalds  * open files, pwds, chroots or sub mounts that are
4501da177e4SLinus Torvalds  * busy.
4511da177e4SLinus Torvalds  */
4521da177e4SLinus Torvalds int may_umount_tree(struct vfsmount *mnt)
4531da177e4SLinus Torvalds {
45436341f64SRam Pai 	int actual_refs = 0;
45536341f64SRam Pai 	int minimum_refs = 0;
45636341f64SRam Pai 	struct vfsmount *p;
4571da177e4SLinus Torvalds 
4581da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
45936341f64SRam Pai 	for (p = mnt; p; p = next_mnt(p, mnt)) {
4601da177e4SLinus Torvalds 		actual_refs += atomic_read(&p->mnt_count);
4611da177e4SLinus Torvalds 		minimum_refs += 2;
4621da177e4SLinus Torvalds 	}
4631da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
4641da177e4SLinus Torvalds 
4651da177e4SLinus Torvalds 	if (actual_refs > minimum_refs)
4661da177e4SLinus Torvalds 		return 0;
467e3474a8eSIan Kent 
468e3474a8eSIan Kent 	return 1;
4691da177e4SLinus Torvalds }
4701da177e4SLinus Torvalds 
4711da177e4SLinus Torvalds EXPORT_SYMBOL(may_umount_tree);
4721da177e4SLinus Torvalds 
4731da177e4SLinus Torvalds /**
4741da177e4SLinus Torvalds  * may_umount - check if a mount point is busy
4751da177e4SLinus Torvalds  * @mnt: root of mount
4761da177e4SLinus Torvalds  *
4771da177e4SLinus Torvalds  * This is called to check if a mount point has any
4781da177e4SLinus Torvalds  * open files, pwds, chroots or sub mounts. If the
4791da177e4SLinus Torvalds  * mount has sub mounts this will return busy
4801da177e4SLinus Torvalds  * regardless of whether the sub mounts are busy.
4811da177e4SLinus Torvalds  *
4821da177e4SLinus Torvalds  * Doesn't take quota and stuff into account. IOW, in some cases it will
4831da177e4SLinus Torvalds  * give false negatives. The main reason why it's here is that we need
4841da177e4SLinus Torvalds  * a non-destructive way to look for easily umountable filesystems.
4851da177e4SLinus Torvalds  */
4861da177e4SLinus Torvalds int may_umount(struct vfsmount *mnt)
4871da177e4SLinus Torvalds {
488e3474a8eSIan Kent 	int ret = 1;
489a05964f3SRam Pai 	spin_lock(&vfsmount_lock);
490a05964f3SRam Pai 	if (propagate_mount_busy(mnt, 2))
491e3474a8eSIan Kent 		ret = 0;
492a05964f3SRam Pai 	spin_unlock(&vfsmount_lock);
493a05964f3SRam Pai 	return ret;
4941da177e4SLinus Torvalds }
4951da177e4SLinus Torvalds 
4961da177e4SLinus Torvalds EXPORT_SYMBOL(may_umount);
4971da177e4SLinus Torvalds 
498b90fa9aeSRam Pai void release_mounts(struct list_head *head)
4991da177e4SLinus Torvalds {
50070fbcdf4SRam Pai 	struct vfsmount *mnt;
50170fbcdf4SRam Pai 	while (!list_empty(head)) {
502b5e61818SPavel Emelianov 		mnt = list_first_entry(head, struct vfsmount, mnt_hash);
50370fbcdf4SRam Pai 		list_del_init(&mnt->mnt_hash);
50470fbcdf4SRam Pai 		if (mnt->mnt_parent != mnt) {
50570fbcdf4SRam Pai 			struct dentry *dentry;
50670fbcdf4SRam Pai 			struct vfsmount *m;
50770fbcdf4SRam Pai 			spin_lock(&vfsmount_lock);
50870fbcdf4SRam Pai 			dentry = mnt->mnt_mountpoint;
50970fbcdf4SRam Pai 			m = mnt->mnt_parent;
51070fbcdf4SRam Pai 			mnt->mnt_mountpoint = mnt->mnt_root;
51170fbcdf4SRam Pai 			mnt->mnt_parent = mnt;
5121da177e4SLinus Torvalds 			spin_unlock(&vfsmount_lock);
51370fbcdf4SRam Pai 			dput(dentry);
51470fbcdf4SRam Pai 			mntput(m);
5151da177e4SLinus Torvalds 		}
5161da177e4SLinus Torvalds 		mntput(mnt);
51770fbcdf4SRam Pai 	}
51870fbcdf4SRam Pai }
51970fbcdf4SRam Pai 
520a05964f3SRam Pai void umount_tree(struct vfsmount *mnt, int propagate, struct list_head *kill)
52170fbcdf4SRam Pai {
52270fbcdf4SRam Pai 	struct vfsmount *p;
52370fbcdf4SRam Pai 
5241bfba4e8SAkinobu Mita 	for (p = mnt; p; p = next_mnt(p, mnt))
5251bfba4e8SAkinobu Mita 		list_move(&p->mnt_hash, kill);
52670fbcdf4SRam Pai 
527a05964f3SRam Pai 	if (propagate)
528a05964f3SRam Pai 		propagate_umount(kill);
529a05964f3SRam Pai 
53070fbcdf4SRam Pai 	list_for_each_entry(p, kill, mnt_hash) {
53170fbcdf4SRam Pai 		list_del_init(&p->mnt_expire);
53270fbcdf4SRam Pai 		list_del_init(&p->mnt_list);
5336b3286edSKirill Korotaev 		__touch_mnt_namespace(p->mnt_ns);
5346b3286edSKirill Korotaev 		p->mnt_ns = NULL;
53570fbcdf4SRam Pai 		list_del_init(&p->mnt_child);
53670fbcdf4SRam Pai 		if (p->mnt_parent != p)
537f30ac319SAl Viro 			p->mnt_mountpoint->d_mounted--;
538a05964f3SRam Pai 		change_mnt_propagation(p, MS_PRIVATE);
5391da177e4SLinus Torvalds 	}
5401da177e4SLinus Torvalds }
5411da177e4SLinus Torvalds 
5421da177e4SLinus Torvalds static int do_umount(struct vfsmount *mnt, int flags)
5431da177e4SLinus Torvalds {
5441da177e4SLinus Torvalds 	struct super_block *sb = mnt->mnt_sb;
5451da177e4SLinus Torvalds 	int retval;
54670fbcdf4SRam Pai 	LIST_HEAD(umount_list);
5471da177e4SLinus Torvalds 
5481da177e4SLinus Torvalds 	retval = security_sb_umount(mnt, flags);
5491da177e4SLinus Torvalds 	if (retval)
5501da177e4SLinus Torvalds 		return retval;
5511da177e4SLinus Torvalds 
5521da177e4SLinus Torvalds 	/*
5531da177e4SLinus Torvalds 	 * Allow userspace to request a mountpoint be expired rather than
5541da177e4SLinus Torvalds 	 * unmounting unconditionally. Unmount only happens if:
5551da177e4SLinus Torvalds 	 *  (1) the mark is already set (the mark is cleared by mntput())
5561da177e4SLinus Torvalds 	 *  (2) the usage count == 1 [parent vfsmount] + 1 [sys_umount]
5571da177e4SLinus Torvalds 	 */
5581da177e4SLinus Torvalds 	if (flags & MNT_EXPIRE) {
5591da177e4SLinus Torvalds 		if (mnt == current->fs->rootmnt ||
5601da177e4SLinus Torvalds 		    flags & (MNT_FORCE | MNT_DETACH))
5611da177e4SLinus Torvalds 			return -EINVAL;
5621da177e4SLinus Torvalds 
5631da177e4SLinus Torvalds 		if (atomic_read(&mnt->mnt_count) != 2)
5641da177e4SLinus Torvalds 			return -EBUSY;
5651da177e4SLinus Torvalds 
5661da177e4SLinus Torvalds 		if (!xchg(&mnt->mnt_expiry_mark, 1))
5671da177e4SLinus Torvalds 			return -EAGAIN;
5681da177e4SLinus Torvalds 	}
5691da177e4SLinus Torvalds 
5701da177e4SLinus Torvalds 	/*
5711da177e4SLinus Torvalds 	 * If we may have to abort operations to get out of this
5721da177e4SLinus Torvalds 	 * mount, and they will themselves hold resources we must
5731da177e4SLinus Torvalds 	 * allow the fs to do things. In the Unix tradition of
5741da177e4SLinus Torvalds 	 * 'Gee thats tricky lets do it in userspace' the umount_begin
5751da177e4SLinus Torvalds 	 * might fail to complete on the first run through as other tasks
5761da177e4SLinus Torvalds 	 * must return, and the like. Thats for the mount program to worry
5771da177e4SLinus Torvalds 	 * about for the moment.
5781da177e4SLinus Torvalds 	 */
5791da177e4SLinus Torvalds 
5801da177e4SLinus Torvalds 	lock_kernel();
5818b512d9aSTrond Myklebust 	if (sb->s_op->umount_begin)
5828b512d9aSTrond Myklebust 		sb->s_op->umount_begin(mnt, flags);
5831da177e4SLinus Torvalds 	unlock_kernel();
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds 	/*
5861da177e4SLinus Torvalds 	 * No sense to grab the lock for this test, but test itself looks
5871da177e4SLinus Torvalds 	 * somewhat bogus. Suggestions for better replacement?
5881da177e4SLinus Torvalds 	 * Ho-hum... In principle, we might treat that as umount + switch
5891da177e4SLinus Torvalds 	 * to rootfs. GC would eventually take care of the old vfsmount.
5901da177e4SLinus Torvalds 	 * Actually it makes sense, especially if rootfs would contain a
5911da177e4SLinus Torvalds 	 * /reboot - static binary that would close all descriptors and
5921da177e4SLinus Torvalds 	 * call reboot(9). Then init(8) could umount root and exec /reboot.
5931da177e4SLinus Torvalds 	 */
5941da177e4SLinus Torvalds 	if (mnt == current->fs->rootmnt && !(flags & MNT_DETACH)) {
5951da177e4SLinus Torvalds 		/*
5961da177e4SLinus Torvalds 		 * Special case for "unmounting" root ...
5971da177e4SLinus Torvalds 		 * we just try to remount it readonly.
5981da177e4SLinus Torvalds 		 */
5991da177e4SLinus Torvalds 		down_write(&sb->s_umount);
6001da177e4SLinus Torvalds 		if (!(sb->s_flags & MS_RDONLY)) {
6011da177e4SLinus Torvalds 			lock_kernel();
6021da177e4SLinus Torvalds 			DQUOT_OFF(sb);
6031da177e4SLinus Torvalds 			retval = do_remount_sb(sb, MS_RDONLY, NULL, 0);
6041da177e4SLinus Torvalds 			unlock_kernel();
6051da177e4SLinus Torvalds 		}
6061da177e4SLinus Torvalds 		up_write(&sb->s_umount);
6071da177e4SLinus Torvalds 		return retval;
6081da177e4SLinus Torvalds 	}
6091da177e4SLinus Torvalds 
610390c6843SRam Pai 	down_write(&namespace_sem);
6111da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
6125addc5ddSAl Viro 	event++;
6131da177e4SLinus Torvalds 
6141da177e4SLinus Torvalds 	retval = -EBUSY;
615a05964f3SRam Pai 	if (flags & MNT_DETACH || !propagate_mount_busy(mnt, 2)) {
6161da177e4SLinus Torvalds 		if (!list_empty(&mnt->mnt_list))
617a05964f3SRam Pai 			umount_tree(mnt, 1, &umount_list);
6181da177e4SLinus Torvalds 		retval = 0;
6191da177e4SLinus Torvalds 	}
6201da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
6211da177e4SLinus Torvalds 	if (retval)
6221da177e4SLinus Torvalds 		security_sb_umount_busy(mnt);
623390c6843SRam Pai 	up_write(&namespace_sem);
62470fbcdf4SRam Pai 	release_mounts(&umount_list);
6251da177e4SLinus Torvalds 	return retval;
6261da177e4SLinus Torvalds }
6271da177e4SLinus Torvalds 
6281da177e4SLinus Torvalds /*
6291da177e4SLinus Torvalds  * Now umount can handle mount points as well as block devices.
6301da177e4SLinus Torvalds  * This is important for filesystems which use unnamed block devices.
6311da177e4SLinus Torvalds  *
6321da177e4SLinus Torvalds  * We now support a flag for forced unmount like the other 'big iron'
6331da177e4SLinus Torvalds  * unixes. Our API is identical to OSF/1 to avoid making a mess of AMD
6341da177e4SLinus Torvalds  */
6351da177e4SLinus Torvalds 
6361da177e4SLinus Torvalds asmlinkage long sys_umount(char __user * name, int flags)
6371da177e4SLinus Torvalds {
6381da177e4SLinus Torvalds 	struct nameidata nd;
6391da177e4SLinus Torvalds 	int retval;
6401da177e4SLinus Torvalds 
6411da177e4SLinus Torvalds 	retval = __user_walk(name, LOOKUP_FOLLOW, &nd);
6421da177e4SLinus Torvalds 	if (retval)
6431da177e4SLinus Torvalds 		goto out;
6441da177e4SLinus Torvalds 	retval = -EINVAL;
6451da177e4SLinus Torvalds 	if (nd.dentry != nd.mnt->mnt_root)
6461da177e4SLinus Torvalds 		goto dput_and_out;
6471da177e4SLinus Torvalds 	if (!check_mnt(nd.mnt))
6481da177e4SLinus Torvalds 		goto dput_and_out;
6491da177e4SLinus Torvalds 
6501da177e4SLinus Torvalds 	retval = -EPERM;
6511da177e4SLinus Torvalds 	if (!capable(CAP_SYS_ADMIN))
6521da177e4SLinus Torvalds 		goto dput_and_out;
6531da177e4SLinus Torvalds 
6541da177e4SLinus Torvalds 	retval = do_umount(nd.mnt, flags);
6551da177e4SLinus Torvalds dput_and_out:
6561da177e4SLinus Torvalds 	path_release_on_umount(&nd);
6571da177e4SLinus Torvalds out:
6581da177e4SLinus Torvalds 	return retval;
6591da177e4SLinus Torvalds }
6601da177e4SLinus Torvalds 
6611da177e4SLinus Torvalds #ifdef __ARCH_WANT_SYS_OLDUMOUNT
6621da177e4SLinus Torvalds 
6631da177e4SLinus Torvalds /*
6641da177e4SLinus Torvalds  *	The 2.0 compatible umount. No flags.
6651da177e4SLinus Torvalds  */
6661da177e4SLinus Torvalds asmlinkage long sys_oldumount(char __user * name)
6671da177e4SLinus Torvalds {
6681da177e4SLinus Torvalds 	return sys_umount(name, 0);
6691da177e4SLinus Torvalds }
6701da177e4SLinus Torvalds 
6711da177e4SLinus Torvalds #endif
6721da177e4SLinus Torvalds 
6731da177e4SLinus Torvalds static int mount_is_safe(struct nameidata *nd)
6741da177e4SLinus Torvalds {
6751da177e4SLinus Torvalds 	if (capable(CAP_SYS_ADMIN))
6761da177e4SLinus Torvalds 		return 0;
6771da177e4SLinus Torvalds 	return -EPERM;
6781da177e4SLinus Torvalds #ifdef notyet
6791da177e4SLinus Torvalds 	if (S_ISLNK(nd->dentry->d_inode->i_mode))
6801da177e4SLinus Torvalds 		return -EPERM;
6811da177e4SLinus Torvalds 	if (nd->dentry->d_inode->i_mode & S_ISVTX) {
6821da177e4SLinus Torvalds 		if (current->uid != nd->dentry->d_inode->i_uid)
6831da177e4SLinus Torvalds 			return -EPERM;
6841da177e4SLinus Torvalds 	}
685e4543eddSChristoph Hellwig 	if (vfs_permission(nd, MAY_WRITE))
6861da177e4SLinus Torvalds 		return -EPERM;
6871da177e4SLinus Torvalds 	return 0;
6881da177e4SLinus Torvalds #endif
6891da177e4SLinus Torvalds }
6901da177e4SLinus Torvalds 
691b58fed8bSRam Pai static int lives_below_in_same_fs(struct dentry *d, struct dentry *dentry)
6921da177e4SLinus Torvalds {
6931da177e4SLinus Torvalds 	while (1) {
6941da177e4SLinus Torvalds 		if (d == dentry)
6951da177e4SLinus Torvalds 			return 1;
6961da177e4SLinus Torvalds 		if (d == NULL || d == d->d_parent)
6971da177e4SLinus Torvalds 			return 0;
6981da177e4SLinus Torvalds 		d = d->d_parent;
6991da177e4SLinus Torvalds 	}
7001da177e4SLinus Torvalds }
7011da177e4SLinus Torvalds 
702b90fa9aeSRam Pai struct vfsmount *copy_tree(struct vfsmount *mnt, struct dentry *dentry,
70336341f64SRam Pai 					int flag)
7041da177e4SLinus Torvalds {
7051da177e4SLinus Torvalds 	struct vfsmount *res, *p, *q, *r, *s;
7061da177e4SLinus Torvalds 	struct nameidata nd;
7071da177e4SLinus Torvalds 
7089676f0c6SRam Pai 	if (!(flag & CL_COPY_ALL) && IS_MNT_UNBINDABLE(mnt))
7099676f0c6SRam Pai 		return NULL;
7109676f0c6SRam Pai 
71136341f64SRam Pai 	res = q = clone_mnt(mnt, dentry, flag);
7121da177e4SLinus Torvalds 	if (!q)
7131da177e4SLinus Torvalds 		goto Enomem;
7141da177e4SLinus Torvalds 	q->mnt_mountpoint = mnt->mnt_mountpoint;
7151da177e4SLinus Torvalds 
7161da177e4SLinus Torvalds 	p = mnt;
717fdadd65fSDomen Puncer 	list_for_each_entry(r, &mnt->mnt_mounts, mnt_child) {
7181da177e4SLinus Torvalds 		if (!lives_below_in_same_fs(r->mnt_mountpoint, dentry))
7191da177e4SLinus Torvalds 			continue;
7201da177e4SLinus Torvalds 
7211da177e4SLinus Torvalds 		for (s = r; s; s = next_mnt(s, r)) {
7229676f0c6SRam Pai 			if (!(flag & CL_COPY_ALL) && IS_MNT_UNBINDABLE(s)) {
7239676f0c6SRam Pai 				s = skip_mnt_tree(s);
7249676f0c6SRam Pai 				continue;
7259676f0c6SRam Pai 			}
7261da177e4SLinus Torvalds 			while (p != s->mnt_parent) {
7271da177e4SLinus Torvalds 				p = p->mnt_parent;
7281da177e4SLinus Torvalds 				q = q->mnt_parent;
7291da177e4SLinus Torvalds 			}
7301da177e4SLinus Torvalds 			p = s;
7311da177e4SLinus Torvalds 			nd.mnt = q;
7321da177e4SLinus Torvalds 			nd.dentry = p->mnt_mountpoint;
73336341f64SRam Pai 			q = clone_mnt(p, p->mnt_root, flag);
7341da177e4SLinus Torvalds 			if (!q)
7351da177e4SLinus Torvalds 				goto Enomem;
7361da177e4SLinus Torvalds 			spin_lock(&vfsmount_lock);
7371da177e4SLinus Torvalds 			list_add_tail(&q->mnt_list, &res->mnt_list);
7381da177e4SLinus Torvalds 			attach_mnt(q, &nd);
7391da177e4SLinus Torvalds 			spin_unlock(&vfsmount_lock);
7401da177e4SLinus Torvalds 		}
7411da177e4SLinus Torvalds 	}
7421da177e4SLinus Torvalds 	return res;
7431da177e4SLinus Torvalds Enomem:
7441da177e4SLinus Torvalds 	if (res) {
74570fbcdf4SRam Pai 		LIST_HEAD(umount_list);
7461da177e4SLinus Torvalds 		spin_lock(&vfsmount_lock);
747a05964f3SRam Pai 		umount_tree(res, 0, &umount_list);
7481da177e4SLinus Torvalds 		spin_unlock(&vfsmount_lock);
74970fbcdf4SRam Pai 		release_mounts(&umount_list);
7501da177e4SLinus Torvalds 	}
7511da177e4SLinus Torvalds 	return NULL;
7521da177e4SLinus Torvalds }
7531da177e4SLinus Torvalds 
754b90fa9aeSRam Pai /*
755b90fa9aeSRam Pai  *  @source_mnt : mount tree to be attached
756b90fa9aeSRam Pai  *  @nd         : place the mount tree @source_mnt is attached
75721444403SRam Pai  *  @parent_nd  : if non-null, detach the source_mnt from its parent and
75821444403SRam Pai  *  		   store the parent mount and mountpoint dentry.
75921444403SRam Pai  *  		   (done when source_mnt is moved)
760b90fa9aeSRam Pai  *
761b90fa9aeSRam Pai  *  NOTE: in the table below explains the semantics when a source mount
762b90fa9aeSRam Pai  *  of a given type is attached to a destination mount of a given type.
7639676f0c6SRam Pai  * ---------------------------------------------------------------------------
764b90fa9aeSRam Pai  * |         BIND MOUNT OPERATION                                            |
7659676f0c6SRam Pai  * |**************************************************************************
7669676f0c6SRam Pai  * | source-->| shared        |       private  |       slave    | unbindable |
7679676f0c6SRam Pai  * | dest     |               |                |                |            |
7689676f0c6SRam Pai  * |   |      |               |                |                |            |
7699676f0c6SRam Pai  * |   v      |               |                |                |            |
7709676f0c6SRam Pai  * |**************************************************************************
7719676f0c6SRam Pai  * |  shared  | shared (++)   |     shared (+) |     shared(+++)|  invalid   |
7725afe0022SRam Pai  * |          |               |                |                |            |
7739676f0c6SRam Pai  * |non-shared| shared (+)    |      private   |      slave (*) |  invalid   |
7749676f0c6SRam Pai  * ***************************************************************************
775b90fa9aeSRam Pai  * A bind operation clones the source mount and mounts the clone on the
776b90fa9aeSRam Pai  * destination mount.
777b90fa9aeSRam Pai  *
778b90fa9aeSRam Pai  * (++)  the cloned mount is propagated to all the mounts in the propagation
779b90fa9aeSRam Pai  * 	 tree of the destination mount and the cloned mount is added to
780b90fa9aeSRam Pai  * 	 the peer group of the source mount.
781b90fa9aeSRam Pai  * (+)   the cloned mount is created under the destination mount and is marked
782b90fa9aeSRam Pai  *       as shared. The cloned mount is added to the peer group of the source
783b90fa9aeSRam Pai  *       mount.
7845afe0022SRam Pai  * (+++) the mount is propagated to all the mounts in the propagation tree
7855afe0022SRam Pai  *       of the destination mount and the cloned mount is made slave
7865afe0022SRam Pai  *       of the same master as that of the source mount. The cloned mount
7875afe0022SRam Pai  *       is marked as 'shared and slave'.
7885afe0022SRam Pai  * (*)   the cloned mount is made a slave of the same master as that of the
7895afe0022SRam Pai  * 	 source mount.
7905afe0022SRam Pai  *
7919676f0c6SRam Pai  * ---------------------------------------------------------------------------
79221444403SRam Pai  * |         		MOVE MOUNT OPERATION                                 |
7939676f0c6SRam Pai  * |**************************************************************************
7949676f0c6SRam Pai  * | source-->| shared        |       private  |       slave    | unbindable |
7959676f0c6SRam Pai  * | dest     |               |                |                |            |
7969676f0c6SRam Pai  * |   |      |               |                |                |            |
7979676f0c6SRam Pai  * |   v      |               |                |                |            |
7989676f0c6SRam Pai  * |**************************************************************************
7999676f0c6SRam Pai  * |  shared  | shared (+)    |     shared (+) |    shared(+++) |  invalid   |
8005afe0022SRam Pai  * |          |               |                |                |            |
8019676f0c6SRam Pai  * |non-shared| shared (+*)   |      private   |    slave (*)   | unbindable |
8029676f0c6SRam Pai  * ***************************************************************************
8035afe0022SRam Pai  *
8045afe0022SRam Pai  * (+)  the mount is moved to the destination. And is then propagated to
8055afe0022SRam Pai  * 	all the mounts in the propagation tree of the destination mount.
80621444403SRam Pai  * (+*)  the mount is moved to the destination.
8075afe0022SRam Pai  * (+++)  the mount is moved to the destination and is then propagated to
8085afe0022SRam Pai  * 	all the mounts belonging to the destination mount's propagation tree.
8095afe0022SRam Pai  * 	the mount is marked as 'shared and slave'.
8105afe0022SRam Pai  * (*)	the mount continues to be a slave at the new location.
811b90fa9aeSRam Pai  *
812b90fa9aeSRam Pai  * if the source mount is a tree, the operations explained above is
813b90fa9aeSRam Pai  * applied to each mount in the tree.
814b90fa9aeSRam Pai  * Must be called without spinlocks held, since this function can sleep
815b90fa9aeSRam Pai  * in allocations.
816b90fa9aeSRam Pai  */
817b90fa9aeSRam Pai static int attach_recursive_mnt(struct vfsmount *source_mnt,
81821444403SRam Pai 			struct nameidata *nd, struct nameidata *parent_nd)
819b90fa9aeSRam Pai {
820b90fa9aeSRam Pai 	LIST_HEAD(tree_list);
821b90fa9aeSRam Pai 	struct vfsmount *dest_mnt = nd->mnt;
822b90fa9aeSRam Pai 	struct dentry *dest_dentry = nd->dentry;
823b90fa9aeSRam Pai 	struct vfsmount *child, *p;
824b90fa9aeSRam Pai 
825b90fa9aeSRam Pai 	if (propagate_mnt(dest_mnt, dest_dentry, source_mnt, &tree_list))
826b90fa9aeSRam Pai 		return -EINVAL;
827b90fa9aeSRam Pai 
828b90fa9aeSRam Pai 	if (IS_MNT_SHARED(dest_mnt)) {
829b90fa9aeSRam Pai 		for (p = source_mnt; p; p = next_mnt(p, source_mnt))
830b90fa9aeSRam Pai 			set_mnt_shared(p);
831b90fa9aeSRam Pai 	}
832b90fa9aeSRam Pai 
833b90fa9aeSRam Pai 	spin_lock(&vfsmount_lock);
83421444403SRam Pai 	if (parent_nd) {
83521444403SRam Pai 		detach_mnt(source_mnt, parent_nd);
83621444403SRam Pai 		attach_mnt(source_mnt, nd);
8376b3286edSKirill Korotaev 		touch_mnt_namespace(current->nsproxy->mnt_ns);
83821444403SRam Pai 	} else {
839b90fa9aeSRam Pai 		mnt_set_mountpoint(dest_mnt, dest_dentry, source_mnt);
840b90fa9aeSRam Pai 		commit_tree(source_mnt);
84121444403SRam Pai 	}
842b90fa9aeSRam Pai 
843b90fa9aeSRam Pai 	list_for_each_entry_safe(child, p, &tree_list, mnt_hash) {
844b90fa9aeSRam Pai 		list_del_init(&child->mnt_hash);
845b90fa9aeSRam Pai 		commit_tree(child);
846b90fa9aeSRam Pai 	}
847b90fa9aeSRam Pai 	spin_unlock(&vfsmount_lock);
848b90fa9aeSRam Pai 	return 0;
849b90fa9aeSRam Pai }
850b90fa9aeSRam Pai 
8511da177e4SLinus Torvalds static int graft_tree(struct vfsmount *mnt, struct nameidata *nd)
8521da177e4SLinus Torvalds {
8531da177e4SLinus Torvalds 	int err;
8541da177e4SLinus Torvalds 	if (mnt->mnt_sb->s_flags & MS_NOUSER)
8551da177e4SLinus Torvalds 		return -EINVAL;
8561da177e4SLinus Torvalds 
8571da177e4SLinus Torvalds 	if (S_ISDIR(nd->dentry->d_inode->i_mode) !=
8581da177e4SLinus Torvalds 	      S_ISDIR(mnt->mnt_root->d_inode->i_mode))
8591da177e4SLinus Torvalds 		return -ENOTDIR;
8601da177e4SLinus Torvalds 
8611da177e4SLinus Torvalds 	err = -ENOENT;
8621b1dcc1bSJes Sorensen 	mutex_lock(&nd->dentry->d_inode->i_mutex);
8631da177e4SLinus Torvalds 	if (IS_DEADDIR(nd->dentry->d_inode))
8641da177e4SLinus Torvalds 		goto out_unlock;
8651da177e4SLinus Torvalds 
8661da177e4SLinus Torvalds 	err = security_sb_check_sb(mnt, nd);
8671da177e4SLinus Torvalds 	if (err)
8681da177e4SLinus Torvalds 		goto out_unlock;
8691da177e4SLinus Torvalds 
8701da177e4SLinus Torvalds 	err = -ENOENT;
871b90fa9aeSRam Pai 	if (IS_ROOT(nd->dentry) || !d_unhashed(nd->dentry))
87221444403SRam Pai 		err = attach_recursive_mnt(mnt, nd, NULL);
8731da177e4SLinus Torvalds out_unlock:
8741b1dcc1bSJes Sorensen 	mutex_unlock(&nd->dentry->d_inode->i_mutex);
8751da177e4SLinus Torvalds 	if (!err)
8761da177e4SLinus Torvalds 		security_sb_post_addmount(mnt, nd);
8771da177e4SLinus Torvalds 	return err;
8781da177e4SLinus Torvalds }
8791da177e4SLinus Torvalds 
8801da177e4SLinus Torvalds /*
88107b20889SRam Pai  * recursively change the type of the mountpoint.
88207b20889SRam Pai  */
88307b20889SRam Pai static int do_change_type(struct nameidata *nd, int flag)
88407b20889SRam Pai {
88507b20889SRam Pai 	struct vfsmount *m, *mnt = nd->mnt;
88607b20889SRam Pai 	int recurse = flag & MS_REC;
88707b20889SRam Pai 	int type = flag & ~MS_REC;
88807b20889SRam Pai 
88907b20889SRam Pai 	if (nd->dentry != nd->mnt->mnt_root)
89007b20889SRam Pai 		return -EINVAL;
89107b20889SRam Pai 
89207b20889SRam Pai 	down_write(&namespace_sem);
89307b20889SRam Pai 	spin_lock(&vfsmount_lock);
89407b20889SRam Pai 	for (m = mnt; m; m = (recurse ? next_mnt(m, mnt) : NULL))
89507b20889SRam Pai 		change_mnt_propagation(m, type);
89607b20889SRam Pai 	spin_unlock(&vfsmount_lock);
89707b20889SRam Pai 	up_write(&namespace_sem);
89807b20889SRam Pai 	return 0;
89907b20889SRam Pai }
90007b20889SRam Pai 
90107b20889SRam Pai /*
9021da177e4SLinus Torvalds  * do loopback mount.
9031da177e4SLinus Torvalds  */
904eee391a6SAndrew Morton static int do_loopback(struct nameidata *nd, char *old_name, int recurse)
9051da177e4SLinus Torvalds {
9061da177e4SLinus Torvalds 	struct nameidata old_nd;
9071da177e4SLinus Torvalds 	struct vfsmount *mnt = NULL;
9081da177e4SLinus Torvalds 	int err = mount_is_safe(nd);
9091da177e4SLinus Torvalds 	if (err)
9101da177e4SLinus Torvalds 		return err;
9111da177e4SLinus Torvalds 	if (!old_name || !*old_name)
9121da177e4SLinus Torvalds 		return -EINVAL;
9131da177e4SLinus Torvalds 	err = path_lookup(old_name, LOOKUP_FOLLOW, &old_nd);
9141da177e4SLinus Torvalds 	if (err)
9151da177e4SLinus Torvalds 		return err;
9161da177e4SLinus Torvalds 
917390c6843SRam Pai 	down_write(&namespace_sem);
9181da177e4SLinus Torvalds 	err = -EINVAL;
9199676f0c6SRam Pai 	if (IS_MNT_UNBINDABLE(old_nd.mnt))
9209676f0c6SRam Pai  		goto out;
9219676f0c6SRam Pai 
922ccd48bc7SAl Viro 	if (!check_mnt(nd->mnt) || !check_mnt(old_nd.mnt))
923ccd48bc7SAl Viro 		goto out;
924ccd48bc7SAl Viro 
9251da177e4SLinus Torvalds 	err = -ENOMEM;
9261da177e4SLinus Torvalds 	if (recurse)
92736341f64SRam Pai 		mnt = copy_tree(old_nd.mnt, old_nd.dentry, 0);
9281da177e4SLinus Torvalds 	else
92936341f64SRam Pai 		mnt = clone_mnt(old_nd.mnt, old_nd.dentry, 0);
9301da177e4SLinus Torvalds 
931ccd48bc7SAl Viro 	if (!mnt)
932ccd48bc7SAl Viro 		goto out;
933ccd48bc7SAl Viro 
9341da177e4SLinus Torvalds 	err = graft_tree(mnt, nd);
9351da177e4SLinus Torvalds 	if (err) {
93670fbcdf4SRam Pai 		LIST_HEAD(umount_list);
9371da177e4SLinus Torvalds 		spin_lock(&vfsmount_lock);
938a05964f3SRam Pai 		umount_tree(mnt, 0, &umount_list);
9391da177e4SLinus Torvalds 		spin_unlock(&vfsmount_lock);
94070fbcdf4SRam Pai 		release_mounts(&umount_list);
9415b83d2c5SRam Pai 	}
9421da177e4SLinus Torvalds 
943ccd48bc7SAl Viro out:
944390c6843SRam Pai 	up_write(&namespace_sem);
9451da177e4SLinus Torvalds 	path_release(&old_nd);
9461da177e4SLinus Torvalds 	return err;
9471da177e4SLinus Torvalds }
9481da177e4SLinus Torvalds 
9491da177e4SLinus Torvalds /*
9501da177e4SLinus Torvalds  * change filesystem flags. dir should be a physical root of filesystem.
9511da177e4SLinus Torvalds  * If you've mounted a non-root directory somewhere and want to do remount
9521da177e4SLinus Torvalds  * on it - tough luck.
9531da177e4SLinus Torvalds  */
9541da177e4SLinus Torvalds static int do_remount(struct nameidata *nd, int flags, int mnt_flags,
9551da177e4SLinus Torvalds 		      void *data)
9561da177e4SLinus Torvalds {
9571da177e4SLinus Torvalds 	int err;
9581da177e4SLinus Torvalds 	struct super_block *sb = nd->mnt->mnt_sb;
9591da177e4SLinus Torvalds 
9601da177e4SLinus Torvalds 	if (!capable(CAP_SYS_ADMIN))
9611da177e4SLinus Torvalds 		return -EPERM;
9621da177e4SLinus Torvalds 
9631da177e4SLinus Torvalds 	if (!check_mnt(nd->mnt))
9641da177e4SLinus Torvalds 		return -EINVAL;
9651da177e4SLinus Torvalds 
9661da177e4SLinus Torvalds 	if (nd->dentry != nd->mnt->mnt_root)
9671da177e4SLinus Torvalds 		return -EINVAL;
9681da177e4SLinus Torvalds 
9691da177e4SLinus Torvalds 	down_write(&sb->s_umount);
9701da177e4SLinus Torvalds 	err = do_remount_sb(sb, flags, data, 0);
9711da177e4SLinus Torvalds 	if (!err)
9721da177e4SLinus Torvalds 		nd->mnt->mnt_flags = mnt_flags;
9731da177e4SLinus Torvalds 	up_write(&sb->s_umount);
9741da177e4SLinus Torvalds 	if (!err)
9751da177e4SLinus Torvalds 		security_sb_post_remount(nd->mnt, flags, data);
9761da177e4SLinus Torvalds 	return err;
9771da177e4SLinus Torvalds }
9781da177e4SLinus Torvalds 
9799676f0c6SRam Pai static inline int tree_contains_unbindable(struct vfsmount *mnt)
9809676f0c6SRam Pai {
9819676f0c6SRam Pai 	struct vfsmount *p;
9829676f0c6SRam Pai 	for (p = mnt; p; p = next_mnt(p, mnt)) {
9839676f0c6SRam Pai 		if (IS_MNT_UNBINDABLE(p))
9849676f0c6SRam Pai 			return 1;
9859676f0c6SRam Pai 	}
9869676f0c6SRam Pai 	return 0;
9879676f0c6SRam Pai }
9889676f0c6SRam Pai 
9891da177e4SLinus Torvalds static int do_move_mount(struct nameidata *nd, char *old_name)
9901da177e4SLinus Torvalds {
9911da177e4SLinus Torvalds 	struct nameidata old_nd, parent_nd;
9921da177e4SLinus Torvalds 	struct vfsmount *p;
9931da177e4SLinus Torvalds 	int err = 0;
9941da177e4SLinus Torvalds 	if (!capable(CAP_SYS_ADMIN))
9951da177e4SLinus Torvalds 		return -EPERM;
9961da177e4SLinus Torvalds 	if (!old_name || !*old_name)
9971da177e4SLinus Torvalds 		return -EINVAL;
9981da177e4SLinus Torvalds 	err = path_lookup(old_name, LOOKUP_FOLLOW, &old_nd);
9991da177e4SLinus Torvalds 	if (err)
10001da177e4SLinus Torvalds 		return err;
10011da177e4SLinus Torvalds 
1002390c6843SRam Pai 	down_write(&namespace_sem);
10031da177e4SLinus Torvalds 	while (d_mountpoint(nd->dentry) && follow_down(&nd->mnt, &nd->dentry))
10041da177e4SLinus Torvalds 		;
10051da177e4SLinus Torvalds 	err = -EINVAL;
10061da177e4SLinus Torvalds 	if (!check_mnt(nd->mnt) || !check_mnt(old_nd.mnt))
10071da177e4SLinus Torvalds 		goto out;
10081da177e4SLinus Torvalds 
10091da177e4SLinus Torvalds 	err = -ENOENT;
10101b1dcc1bSJes Sorensen 	mutex_lock(&nd->dentry->d_inode->i_mutex);
10111da177e4SLinus Torvalds 	if (IS_DEADDIR(nd->dentry->d_inode))
10121da177e4SLinus Torvalds 		goto out1;
10131da177e4SLinus Torvalds 
10141da177e4SLinus Torvalds 	if (!IS_ROOT(nd->dentry) && d_unhashed(nd->dentry))
101521444403SRam Pai 		goto out1;
10161da177e4SLinus Torvalds 
10171da177e4SLinus Torvalds 	err = -EINVAL;
10181da177e4SLinus Torvalds 	if (old_nd.dentry != old_nd.mnt->mnt_root)
101921444403SRam Pai 		goto out1;
10201da177e4SLinus Torvalds 
10211da177e4SLinus Torvalds 	if (old_nd.mnt == old_nd.mnt->mnt_parent)
102221444403SRam Pai 		goto out1;
10231da177e4SLinus Torvalds 
10241da177e4SLinus Torvalds 	if (S_ISDIR(nd->dentry->d_inode->i_mode) !=
10251da177e4SLinus Torvalds 	      S_ISDIR(old_nd.dentry->d_inode->i_mode))
102621444403SRam Pai 		goto out1;
102721444403SRam Pai 	/*
102821444403SRam Pai 	 * Don't move a mount residing in a shared parent.
102921444403SRam Pai 	 */
103021444403SRam Pai 	if (old_nd.mnt->mnt_parent && IS_MNT_SHARED(old_nd.mnt->mnt_parent))
103121444403SRam Pai 		goto out1;
10329676f0c6SRam Pai 	/*
10339676f0c6SRam Pai 	 * Don't move a mount tree containing unbindable mounts to a destination
10349676f0c6SRam Pai 	 * mount which is shared.
10359676f0c6SRam Pai 	 */
10369676f0c6SRam Pai 	if (IS_MNT_SHARED(nd->mnt) && tree_contains_unbindable(old_nd.mnt))
10379676f0c6SRam Pai 		goto out1;
10381da177e4SLinus Torvalds 	err = -ELOOP;
10391da177e4SLinus Torvalds 	for (p = nd->mnt; p->mnt_parent != p; p = p->mnt_parent)
10401da177e4SLinus Torvalds 		if (p == old_nd.mnt)
104121444403SRam Pai 			goto out1;
10421da177e4SLinus Torvalds 
104321444403SRam Pai 	if ((err = attach_recursive_mnt(old_nd.mnt, nd, &parent_nd)))
104421444403SRam Pai 		goto out1;
10451da177e4SLinus Torvalds 
104621444403SRam Pai 	spin_lock(&vfsmount_lock);
10471da177e4SLinus Torvalds 	/* if the mount is moved, it should no longer be expire
10481da177e4SLinus Torvalds 	 * automatically */
104955e700b9SMiklos Szeredi 	list_del_init(&old_nd.mnt->mnt_expire);
10501da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
10511da177e4SLinus Torvalds out1:
10521b1dcc1bSJes Sorensen 	mutex_unlock(&nd->dentry->d_inode->i_mutex);
10531da177e4SLinus Torvalds out:
1054390c6843SRam Pai 	up_write(&namespace_sem);
10551da177e4SLinus Torvalds 	if (!err)
10561da177e4SLinus Torvalds 		path_release(&parent_nd);
10571da177e4SLinus Torvalds 	path_release(&old_nd);
10581da177e4SLinus Torvalds 	return err;
10591da177e4SLinus Torvalds }
10601da177e4SLinus Torvalds 
10611da177e4SLinus Torvalds /*
10621da177e4SLinus Torvalds  * create a new mount for userspace and request it to be added into the
10631da177e4SLinus Torvalds  * namespace's tree
10641da177e4SLinus Torvalds  */
10651da177e4SLinus Torvalds static int do_new_mount(struct nameidata *nd, char *type, int flags,
10661da177e4SLinus Torvalds 			int mnt_flags, char *name, void *data)
10671da177e4SLinus Torvalds {
10681da177e4SLinus Torvalds 	struct vfsmount *mnt;
10691da177e4SLinus Torvalds 
10701da177e4SLinus Torvalds 	if (!type || !memchr(type, 0, PAGE_SIZE))
10711da177e4SLinus Torvalds 		return -EINVAL;
10721da177e4SLinus Torvalds 
10731da177e4SLinus Torvalds 	/* we need capabilities... */
10741da177e4SLinus Torvalds 	if (!capable(CAP_SYS_ADMIN))
10751da177e4SLinus Torvalds 		return -EPERM;
10761da177e4SLinus Torvalds 
10771da177e4SLinus Torvalds 	mnt = do_kern_mount(type, flags, name, data);
10781da177e4SLinus Torvalds 	if (IS_ERR(mnt))
10791da177e4SLinus Torvalds 		return PTR_ERR(mnt);
10801da177e4SLinus Torvalds 
10811da177e4SLinus Torvalds 	return do_add_mount(mnt, nd, mnt_flags, NULL);
10821da177e4SLinus Torvalds }
10831da177e4SLinus Torvalds 
10841da177e4SLinus Torvalds /*
10851da177e4SLinus Torvalds  * add a mount into a namespace's mount tree
10861da177e4SLinus Torvalds  * - provide the option of adding the new mount to an expiration list
10871da177e4SLinus Torvalds  */
10881da177e4SLinus Torvalds int do_add_mount(struct vfsmount *newmnt, struct nameidata *nd,
10891da177e4SLinus Torvalds 		 int mnt_flags, struct list_head *fslist)
10901da177e4SLinus Torvalds {
10911da177e4SLinus Torvalds 	int err;
10921da177e4SLinus Torvalds 
1093390c6843SRam Pai 	down_write(&namespace_sem);
10941da177e4SLinus Torvalds 	/* Something was mounted here while we slept */
10951da177e4SLinus Torvalds 	while (d_mountpoint(nd->dentry) && follow_down(&nd->mnt, &nd->dentry))
10961da177e4SLinus Torvalds 		;
10971da177e4SLinus Torvalds 	err = -EINVAL;
10981da177e4SLinus Torvalds 	if (!check_mnt(nd->mnt))
10991da177e4SLinus Torvalds 		goto unlock;
11001da177e4SLinus Torvalds 
11011da177e4SLinus Torvalds 	/* Refuse the same filesystem on the same mount point */
11021da177e4SLinus Torvalds 	err = -EBUSY;
11031da177e4SLinus Torvalds 	if (nd->mnt->mnt_sb == newmnt->mnt_sb &&
11041da177e4SLinus Torvalds 	    nd->mnt->mnt_root == nd->dentry)
11051da177e4SLinus Torvalds 		goto unlock;
11061da177e4SLinus Torvalds 
11071da177e4SLinus Torvalds 	err = -EINVAL;
11081da177e4SLinus Torvalds 	if (S_ISLNK(newmnt->mnt_root->d_inode->i_mode))
11091da177e4SLinus Torvalds 		goto unlock;
11101da177e4SLinus Torvalds 
11111da177e4SLinus Torvalds 	newmnt->mnt_flags = mnt_flags;
11125b83d2c5SRam Pai 	if ((err = graft_tree(newmnt, nd)))
11135b83d2c5SRam Pai 		goto unlock;
11141da177e4SLinus Torvalds 
11155b83d2c5SRam Pai 	if (fslist) {
11161da177e4SLinus Torvalds 		/* add to the specified expiration list */
11171da177e4SLinus Torvalds 		spin_lock(&vfsmount_lock);
111855e700b9SMiklos Szeredi 		list_add_tail(&newmnt->mnt_expire, fslist);
11191da177e4SLinus Torvalds 		spin_unlock(&vfsmount_lock);
11201da177e4SLinus Torvalds 	}
1121390c6843SRam Pai 	up_write(&namespace_sem);
11225b83d2c5SRam Pai 	return 0;
11231da177e4SLinus Torvalds 
11241da177e4SLinus Torvalds unlock:
1125390c6843SRam Pai 	up_write(&namespace_sem);
11261da177e4SLinus Torvalds 	mntput(newmnt);
11271da177e4SLinus Torvalds 	return err;
11281da177e4SLinus Torvalds }
11291da177e4SLinus Torvalds 
11301da177e4SLinus Torvalds EXPORT_SYMBOL_GPL(do_add_mount);
11311da177e4SLinus Torvalds 
113270fbcdf4SRam Pai static void expire_mount(struct vfsmount *mnt, struct list_head *mounts,
113370fbcdf4SRam Pai 				struct list_head *umounts)
113424ca2af1SMiklos Szeredi {
113524ca2af1SMiklos Szeredi 	spin_lock(&vfsmount_lock);
113624ca2af1SMiklos Szeredi 
113724ca2af1SMiklos Szeredi 	/*
1138ed42c879SMiklos Szeredi 	 * Check if mount is still attached, if not, let whoever holds it deal
1139ed42c879SMiklos Szeredi 	 * with the sucker
1140ed42c879SMiklos Szeredi 	 */
1141ed42c879SMiklos Szeredi 	if (mnt->mnt_parent == mnt) {
1142ed42c879SMiklos Szeredi 		spin_unlock(&vfsmount_lock);
1143ed42c879SMiklos Szeredi 		return;
1144ed42c879SMiklos Szeredi 	}
1145ed42c879SMiklos Szeredi 
1146ed42c879SMiklos Szeredi 	/*
114724ca2af1SMiklos Szeredi 	 * Check that it is still dead: the count should now be 2 - as
114824ca2af1SMiklos Szeredi 	 * contributed by the vfsmount parent and the mntget above
114924ca2af1SMiklos Szeredi 	 */
1150a05964f3SRam Pai 	if (!propagate_mount_busy(mnt, 2)) {
115124ca2af1SMiklos Szeredi 		/* delete from the namespace */
11526b3286edSKirill Korotaev 		touch_mnt_namespace(mnt->mnt_ns);
115324ca2af1SMiklos Szeredi 		list_del_init(&mnt->mnt_list);
11546b3286edSKirill Korotaev 		mnt->mnt_ns = NULL;
1155a05964f3SRam Pai 		umount_tree(mnt, 1, umounts);
115624ca2af1SMiklos Szeredi 		spin_unlock(&vfsmount_lock);
115724ca2af1SMiklos Szeredi 	} else {
115824ca2af1SMiklos Szeredi 		/*
115924ca2af1SMiklos Szeredi 		 * Someone brought it back to life whilst we didn't have any
116024ca2af1SMiklos Szeredi 		 * locks held so return it to the expiration list
116124ca2af1SMiklos Szeredi 		 */
116255e700b9SMiklos Szeredi 		list_add_tail(&mnt->mnt_expire, mounts);
116324ca2af1SMiklos Szeredi 		spin_unlock(&vfsmount_lock);
116424ca2af1SMiklos Szeredi 	}
116524ca2af1SMiklos Szeredi }
116624ca2af1SMiklos Szeredi 
11671da177e4SLinus Torvalds /*
11685528f911STrond Myklebust  * go through the vfsmounts we've just consigned to the graveyard to
11695528f911STrond Myklebust  * - check that they're still dead
11705528f911STrond Myklebust  * - delete the vfsmount from the appropriate namespace under lock
11715528f911STrond Myklebust  * - dispose of the corpse
11725528f911STrond Myklebust  */
11735528f911STrond Myklebust static void expire_mount_list(struct list_head *graveyard, struct list_head *mounts)
11745528f911STrond Myklebust {
11756b3286edSKirill Korotaev 	struct mnt_namespace *ns;
11765528f911STrond Myklebust 	struct vfsmount *mnt;
11775528f911STrond Myklebust 
11785528f911STrond Myklebust 	while (!list_empty(graveyard)) {
11795528f911STrond Myklebust 		LIST_HEAD(umounts);
1180b5e61818SPavel Emelianov 		mnt = list_first_entry(graveyard, struct vfsmount, mnt_expire);
11815528f911STrond Myklebust 		list_del_init(&mnt->mnt_expire);
11825528f911STrond Myklebust 
11835528f911STrond Myklebust 		/* don't do anything if the namespace is dead - all the
11845528f911STrond Myklebust 		 * vfsmounts from it are going away anyway */
11856b3286edSKirill Korotaev 		ns = mnt->mnt_ns;
11866b3286edSKirill Korotaev 		if (!ns || !ns->root)
11875528f911STrond Myklebust 			continue;
11886b3286edSKirill Korotaev 		get_mnt_ns(ns);
11895528f911STrond Myklebust 
11905528f911STrond Myklebust 		spin_unlock(&vfsmount_lock);
11915528f911STrond Myklebust 		down_write(&namespace_sem);
11925528f911STrond Myklebust 		expire_mount(mnt, mounts, &umounts);
11935528f911STrond Myklebust 		up_write(&namespace_sem);
11945528f911STrond Myklebust 		release_mounts(&umounts);
11955528f911STrond Myklebust 		mntput(mnt);
11966b3286edSKirill Korotaev 		put_mnt_ns(ns);
11975528f911STrond Myklebust 		spin_lock(&vfsmount_lock);
11985528f911STrond Myklebust 	}
11995528f911STrond Myklebust }
12005528f911STrond Myklebust 
12015528f911STrond Myklebust /*
12021da177e4SLinus Torvalds  * process a list of expirable mountpoints with the intent of discarding any
12031da177e4SLinus Torvalds  * mountpoints that aren't in use and haven't been touched since last we came
12041da177e4SLinus Torvalds  * here
12051da177e4SLinus Torvalds  */
12061da177e4SLinus Torvalds void mark_mounts_for_expiry(struct list_head *mounts)
12071da177e4SLinus Torvalds {
12081da177e4SLinus Torvalds 	struct vfsmount *mnt, *next;
12091da177e4SLinus Torvalds 	LIST_HEAD(graveyard);
12101da177e4SLinus Torvalds 
12111da177e4SLinus Torvalds 	if (list_empty(mounts))
12121da177e4SLinus Torvalds 		return;
12131da177e4SLinus Torvalds 
12141da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
12151da177e4SLinus Torvalds 
12161da177e4SLinus Torvalds 	/* extract from the expiration list every vfsmount that matches the
12171da177e4SLinus Torvalds 	 * following criteria:
12181da177e4SLinus Torvalds 	 * - only referenced by its parent vfsmount
12191da177e4SLinus Torvalds 	 * - still marked for expiry (marked on the last call here; marks are
12201da177e4SLinus Torvalds 	 *   cleared by mntput())
12211da177e4SLinus Torvalds 	 */
122255e700b9SMiklos Szeredi 	list_for_each_entry_safe(mnt, next, mounts, mnt_expire) {
12231da177e4SLinus Torvalds 		if (!xchg(&mnt->mnt_expiry_mark, 1) ||
12241da177e4SLinus Torvalds 		    atomic_read(&mnt->mnt_count) != 1)
12251da177e4SLinus Torvalds 			continue;
12261da177e4SLinus Torvalds 
12271da177e4SLinus Torvalds 		mntget(mnt);
122855e700b9SMiklos Szeredi 		list_move(&mnt->mnt_expire, &graveyard);
12291da177e4SLinus Torvalds 	}
12301da177e4SLinus Torvalds 
12315528f911STrond Myklebust 	expire_mount_list(&graveyard, mounts);
12321da177e4SLinus Torvalds 
12331da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
12341da177e4SLinus Torvalds }
12351da177e4SLinus Torvalds 
12361da177e4SLinus Torvalds EXPORT_SYMBOL_GPL(mark_mounts_for_expiry);
12371da177e4SLinus Torvalds 
12381da177e4SLinus Torvalds /*
12395528f911STrond Myklebust  * Ripoff of 'select_parent()'
12405528f911STrond Myklebust  *
12415528f911STrond Myklebust  * search the list of submounts for a given mountpoint, and move any
12425528f911STrond Myklebust  * shrinkable submounts to the 'graveyard' list.
12435528f911STrond Myklebust  */
12445528f911STrond Myklebust static int select_submounts(struct vfsmount *parent, struct list_head *graveyard)
12455528f911STrond Myklebust {
12465528f911STrond Myklebust 	struct vfsmount *this_parent = parent;
12475528f911STrond Myklebust 	struct list_head *next;
12485528f911STrond Myklebust 	int found = 0;
12495528f911STrond Myklebust 
12505528f911STrond Myklebust repeat:
12515528f911STrond Myklebust 	next = this_parent->mnt_mounts.next;
12525528f911STrond Myklebust resume:
12535528f911STrond Myklebust 	while (next != &this_parent->mnt_mounts) {
12545528f911STrond Myklebust 		struct list_head *tmp = next;
12555528f911STrond Myklebust 		struct vfsmount *mnt = list_entry(tmp, struct vfsmount, mnt_child);
12565528f911STrond Myklebust 
12575528f911STrond Myklebust 		next = tmp->next;
12585528f911STrond Myklebust 		if (!(mnt->mnt_flags & MNT_SHRINKABLE))
12595528f911STrond Myklebust 			continue;
12605528f911STrond Myklebust 		/*
12615528f911STrond Myklebust 		 * Descend a level if the d_mounts list is non-empty.
12625528f911STrond Myklebust 		 */
12635528f911STrond Myklebust 		if (!list_empty(&mnt->mnt_mounts)) {
12645528f911STrond Myklebust 			this_parent = mnt;
12655528f911STrond Myklebust 			goto repeat;
12665528f911STrond Myklebust 		}
12675528f911STrond Myklebust 
12685528f911STrond Myklebust 		if (!propagate_mount_busy(mnt, 1)) {
12695528f911STrond Myklebust 			mntget(mnt);
12705528f911STrond Myklebust 			list_move_tail(&mnt->mnt_expire, graveyard);
12715528f911STrond Myklebust 			found++;
12725528f911STrond Myklebust 		}
12735528f911STrond Myklebust 	}
12745528f911STrond Myklebust 	/*
12755528f911STrond Myklebust 	 * All done at this level ... ascend and resume the search
12765528f911STrond Myklebust 	 */
12775528f911STrond Myklebust 	if (this_parent != parent) {
12785528f911STrond Myklebust 		next = this_parent->mnt_child.next;
12795528f911STrond Myklebust 		this_parent = this_parent->mnt_parent;
12805528f911STrond Myklebust 		goto resume;
12815528f911STrond Myklebust 	}
12825528f911STrond Myklebust 	return found;
12835528f911STrond Myklebust }
12845528f911STrond Myklebust 
12855528f911STrond Myklebust /*
12865528f911STrond Myklebust  * process a list of expirable mountpoints with the intent of discarding any
12875528f911STrond Myklebust  * submounts of a specific parent mountpoint
12885528f911STrond Myklebust  */
12895528f911STrond Myklebust void shrink_submounts(struct vfsmount *mountpoint, struct list_head *mounts)
12905528f911STrond Myklebust {
12915528f911STrond Myklebust 	LIST_HEAD(graveyard);
12925528f911STrond Myklebust 	int found;
12935528f911STrond Myklebust 
12945528f911STrond Myklebust 	spin_lock(&vfsmount_lock);
12955528f911STrond Myklebust 
12965528f911STrond Myklebust 	/* extract submounts of 'mountpoint' from the expiration list */
12975528f911STrond Myklebust 	while ((found = select_submounts(mountpoint, &graveyard)) != 0)
12985528f911STrond Myklebust 		expire_mount_list(&graveyard, mounts);
12995528f911STrond Myklebust 
13005528f911STrond Myklebust 	spin_unlock(&vfsmount_lock);
13015528f911STrond Myklebust }
13025528f911STrond Myklebust 
13035528f911STrond Myklebust EXPORT_SYMBOL_GPL(shrink_submounts);
13045528f911STrond Myklebust 
13055528f911STrond Myklebust /*
13061da177e4SLinus Torvalds  * Some copy_from_user() implementations do not return the exact number of
13071da177e4SLinus Torvalds  * bytes remaining to copy on a fault.  But copy_mount_options() requires that.
13081da177e4SLinus Torvalds  * Note that this function differs from copy_from_user() in that it will oops
13091da177e4SLinus Torvalds  * on bad values of `to', rather than returning a short copy.
13101da177e4SLinus Torvalds  */
1311b58fed8bSRam Pai static long exact_copy_from_user(void *to, const void __user * from,
1312b58fed8bSRam Pai 				 unsigned long n)
13131da177e4SLinus Torvalds {
13141da177e4SLinus Torvalds 	char *t = to;
13151da177e4SLinus Torvalds 	const char __user *f = from;
13161da177e4SLinus Torvalds 	char c;
13171da177e4SLinus Torvalds 
13181da177e4SLinus Torvalds 	if (!access_ok(VERIFY_READ, from, n))
13191da177e4SLinus Torvalds 		return n;
13201da177e4SLinus Torvalds 
13211da177e4SLinus Torvalds 	while (n) {
13221da177e4SLinus Torvalds 		if (__get_user(c, f)) {
13231da177e4SLinus Torvalds 			memset(t, 0, n);
13241da177e4SLinus Torvalds 			break;
13251da177e4SLinus Torvalds 		}
13261da177e4SLinus Torvalds 		*t++ = c;
13271da177e4SLinus Torvalds 		f++;
13281da177e4SLinus Torvalds 		n--;
13291da177e4SLinus Torvalds 	}
13301da177e4SLinus Torvalds 	return n;
13311da177e4SLinus Torvalds }
13321da177e4SLinus Torvalds 
13331da177e4SLinus Torvalds int copy_mount_options(const void __user * data, unsigned long *where)
13341da177e4SLinus Torvalds {
13351da177e4SLinus Torvalds 	int i;
13361da177e4SLinus Torvalds 	unsigned long page;
13371da177e4SLinus Torvalds 	unsigned long size;
13381da177e4SLinus Torvalds 
13391da177e4SLinus Torvalds 	*where = 0;
13401da177e4SLinus Torvalds 	if (!data)
13411da177e4SLinus Torvalds 		return 0;
13421da177e4SLinus Torvalds 
13431da177e4SLinus Torvalds 	if (!(page = __get_free_page(GFP_KERNEL)))
13441da177e4SLinus Torvalds 		return -ENOMEM;
13451da177e4SLinus Torvalds 
13461da177e4SLinus Torvalds 	/* We only care that *some* data at the address the user
13471da177e4SLinus Torvalds 	 * gave us is valid.  Just in case, we'll zero
13481da177e4SLinus Torvalds 	 * the remainder of the page.
13491da177e4SLinus Torvalds 	 */
13501da177e4SLinus Torvalds 	/* copy_from_user cannot cross TASK_SIZE ! */
13511da177e4SLinus Torvalds 	size = TASK_SIZE - (unsigned long)data;
13521da177e4SLinus Torvalds 	if (size > PAGE_SIZE)
13531da177e4SLinus Torvalds 		size = PAGE_SIZE;
13541da177e4SLinus Torvalds 
13551da177e4SLinus Torvalds 	i = size - exact_copy_from_user((void *)page, data, size);
13561da177e4SLinus Torvalds 	if (!i) {
13571da177e4SLinus Torvalds 		free_page(page);
13581da177e4SLinus Torvalds 		return -EFAULT;
13591da177e4SLinus Torvalds 	}
13601da177e4SLinus Torvalds 	if (i != PAGE_SIZE)
13611da177e4SLinus Torvalds 		memset((char *)page + i, 0, PAGE_SIZE - i);
13621da177e4SLinus Torvalds 	*where = page;
13631da177e4SLinus Torvalds 	return 0;
13641da177e4SLinus Torvalds }
13651da177e4SLinus Torvalds 
13661da177e4SLinus Torvalds /*
13671da177e4SLinus Torvalds  * Flags is a 32-bit value that allows up to 31 non-fs dependent flags to
13681da177e4SLinus Torvalds  * be given to the mount() call (ie: read-only, no-dev, no-suid etc).
13691da177e4SLinus Torvalds  *
13701da177e4SLinus Torvalds  * data is a (void *) that can point to any structure up to
13711da177e4SLinus Torvalds  * PAGE_SIZE-1 bytes, which can contain arbitrary fs-dependent
13721da177e4SLinus Torvalds  * information (or be NULL).
13731da177e4SLinus Torvalds  *
13741da177e4SLinus Torvalds  * Pre-0.97 versions of mount() didn't have a flags word.
13751da177e4SLinus Torvalds  * When the flags word was introduced its top half was required
13761da177e4SLinus Torvalds  * to have the magic value 0xC0ED, and this remained so until 2.4.0-test9.
13771da177e4SLinus Torvalds  * Therefore, if this magic number is present, it carries no information
13781da177e4SLinus Torvalds  * and must be discarded.
13791da177e4SLinus Torvalds  */
13801da177e4SLinus Torvalds long do_mount(char *dev_name, char *dir_name, char *type_page,
13811da177e4SLinus Torvalds 		  unsigned long flags, void *data_page)
13821da177e4SLinus Torvalds {
13831da177e4SLinus Torvalds 	struct nameidata nd;
13841da177e4SLinus Torvalds 	int retval = 0;
13851da177e4SLinus Torvalds 	int mnt_flags = 0;
13861da177e4SLinus Torvalds 
13871da177e4SLinus Torvalds 	/* Discard magic */
13881da177e4SLinus Torvalds 	if ((flags & MS_MGC_MSK) == MS_MGC_VAL)
13891da177e4SLinus Torvalds 		flags &= ~MS_MGC_MSK;
13901da177e4SLinus Torvalds 
13911da177e4SLinus Torvalds 	/* Basic sanity checks */
13921da177e4SLinus Torvalds 
13931da177e4SLinus Torvalds 	if (!dir_name || !*dir_name || !memchr(dir_name, 0, PAGE_SIZE))
13941da177e4SLinus Torvalds 		return -EINVAL;
13951da177e4SLinus Torvalds 	if (dev_name && !memchr(dev_name, 0, PAGE_SIZE))
13961da177e4SLinus Torvalds 		return -EINVAL;
13971da177e4SLinus Torvalds 
13981da177e4SLinus Torvalds 	if (data_page)
13991da177e4SLinus Torvalds 		((char *)data_page)[PAGE_SIZE - 1] = 0;
14001da177e4SLinus Torvalds 
14011da177e4SLinus Torvalds 	/* Separate the per-mountpoint flags */
14021da177e4SLinus Torvalds 	if (flags & MS_NOSUID)
14031da177e4SLinus Torvalds 		mnt_flags |= MNT_NOSUID;
14041da177e4SLinus Torvalds 	if (flags & MS_NODEV)
14051da177e4SLinus Torvalds 		mnt_flags |= MNT_NODEV;
14061da177e4SLinus Torvalds 	if (flags & MS_NOEXEC)
14071da177e4SLinus Torvalds 		mnt_flags |= MNT_NOEXEC;
1408fc33a7bbSChristoph Hellwig 	if (flags & MS_NOATIME)
1409fc33a7bbSChristoph Hellwig 		mnt_flags |= MNT_NOATIME;
1410fc33a7bbSChristoph Hellwig 	if (flags & MS_NODIRATIME)
1411fc33a7bbSChristoph Hellwig 		mnt_flags |= MNT_NODIRATIME;
141247ae32d6SValerie Henson 	if (flags & MS_RELATIME)
141347ae32d6SValerie Henson 		mnt_flags |= MNT_RELATIME;
1414fc33a7bbSChristoph Hellwig 
1415fc33a7bbSChristoph Hellwig 	flags &= ~(MS_NOSUID | MS_NOEXEC | MS_NODEV | MS_ACTIVE |
141647ae32d6SValerie Henson 		   MS_NOATIME | MS_NODIRATIME | MS_RELATIME);
14171da177e4SLinus Torvalds 
14181da177e4SLinus Torvalds 	/* ... and get the mountpoint */
14191da177e4SLinus Torvalds 	retval = path_lookup(dir_name, LOOKUP_FOLLOW, &nd);
14201da177e4SLinus Torvalds 	if (retval)
14211da177e4SLinus Torvalds 		return retval;
14221da177e4SLinus Torvalds 
14231da177e4SLinus Torvalds 	retval = security_sb_mount(dev_name, &nd, type_page, flags, data_page);
14241da177e4SLinus Torvalds 	if (retval)
14251da177e4SLinus Torvalds 		goto dput_out;
14261da177e4SLinus Torvalds 
14271da177e4SLinus Torvalds 	if (flags & MS_REMOUNT)
14281da177e4SLinus Torvalds 		retval = do_remount(&nd, flags & ~MS_REMOUNT, mnt_flags,
14291da177e4SLinus Torvalds 				    data_page);
14301da177e4SLinus Torvalds 	else if (flags & MS_BIND)
1431eee391a6SAndrew Morton 		retval = do_loopback(&nd, dev_name, flags & MS_REC);
14329676f0c6SRam Pai 	else if (flags & (MS_SHARED | MS_PRIVATE | MS_SLAVE | MS_UNBINDABLE))
143307b20889SRam Pai 		retval = do_change_type(&nd, flags);
14341da177e4SLinus Torvalds 	else if (flags & MS_MOVE)
14351da177e4SLinus Torvalds 		retval = do_move_mount(&nd, dev_name);
14361da177e4SLinus Torvalds 	else
14371da177e4SLinus Torvalds 		retval = do_new_mount(&nd, type_page, flags, mnt_flags,
14381da177e4SLinus Torvalds 				      dev_name, data_page);
14391da177e4SLinus Torvalds dput_out:
14401da177e4SLinus Torvalds 	path_release(&nd);
14411da177e4SLinus Torvalds 	return retval;
14421da177e4SLinus Torvalds }
14431da177e4SLinus Torvalds 
1444741a2951SJANAK DESAI /*
1445741a2951SJANAK DESAI  * Allocate a new namespace structure and populate it with contents
1446741a2951SJANAK DESAI  * copied from the namespace of the passed in task structure.
1447741a2951SJANAK DESAI  */
1448e3222c4eSBadari Pulavarty static struct mnt_namespace *dup_mnt_ns(struct mnt_namespace *mnt_ns,
14496b3286edSKirill Korotaev 		struct fs_struct *fs)
14501da177e4SLinus Torvalds {
14516b3286edSKirill Korotaev 	struct mnt_namespace *new_ns;
14521da177e4SLinus Torvalds 	struct vfsmount *rootmnt = NULL, *pwdmnt = NULL, *altrootmnt = NULL;
14531da177e4SLinus Torvalds 	struct vfsmount *p, *q;
14541da177e4SLinus Torvalds 
14556b3286edSKirill Korotaev 	new_ns = kmalloc(sizeof(struct mnt_namespace), GFP_KERNEL);
14561da177e4SLinus Torvalds 	if (!new_ns)
1457f13b8358SAdrian Bunk 		return NULL;
14581da177e4SLinus Torvalds 
14591da177e4SLinus Torvalds 	atomic_set(&new_ns->count, 1);
14601da177e4SLinus Torvalds 	INIT_LIST_HEAD(&new_ns->list);
14615addc5ddSAl Viro 	init_waitqueue_head(&new_ns->poll);
14625addc5ddSAl Viro 	new_ns->event = 0;
14631da177e4SLinus Torvalds 
1464390c6843SRam Pai 	down_write(&namespace_sem);
14651da177e4SLinus Torvalds 	/* First pass: copy the tree topology */
14666b3286edSKirill Korotaev 	new_ns->root = copy_tree(mnt_ns->root, mnt_ns->root->mnt_root,
14679676f0c6SRam Pai 					CL_COPY_ALL | CL_EXPIRE);
14681da177e4SLinus Torvalds 	if (!new_ns->root) {
1469390c6843SRam Pai 		up_write(&namespace_sem);
14701da177e4SLinus Torvalds 		kfree(new_ns);
1471f13b8358SAdrian Bunk 		return NULL;
14721da177e4SLinus Torvalds 	}
14731da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
14741da177e4SLinus Torvalds 	list_add_tail(&new_ns->list, &new_ns->root->mnt_list);
14751da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
14761da177e4SLinus Torvalds 
14771da177e4SLinus Torvalds 	/*
14781da177e4SLinus Torvalds 	 * Second pass: switch the tsk->fs->* elements and mark new vfsmounts
14791da177e4SLinus Torvalds 	 * as belonging to new namespace.  We have already acquired a private
14801da177e4SLinus Torvalds 	 * fs_struct, so tsk->fs->lock is not needed.
14811da177e4SLinus Torvalds 	 */
14826b3286edSKirill Korotaev 	p = mnt_ns->root;
14831da177e4SLinus Torvalds 	q = new_ns->root;
14841da177e4SLinus Torvalds 	while (p) {
14856b3286edSKirill Korotaev 		q->mnt_ns = new_ns;
14861da177e4SLinus Torvalds 		if (fs) {
14871da177e4SLinus Torvalds 			if (p == fs->rootmnt) {
14881da177e4SLinus Torvalds 				rootmnt = p;
14891da177e4SLinus Torvalds 				fs->rootmnt = mntget(q);
14901da177e4SLinus Torvalds 			}
14911da177e4SLinus Torvalds 			if (p == fs->pwdmnt) {
14921da177e4SLinus Torvalds 				pwdmnt = p;
14931da177e4SLinus Torvalds 				fs->pwdmnt = mntget(q);
14941da177e4SLinus Torvalds 			}
14951da177e4SLinus Torvalds 			if (p == fs->altrootmnt) {
14961da177e4SLinus Torvalds 				altrootmnt = p;
14971da177e4SLinus Torvalds 				fs->altrootmnt = mntget(q);
14981da177e4SLinus Torvalds 			}
14991da177e4SLinus Torvalds 		}
15006b3286edSKirill Korotaev 		p = next_mnt(p, mnt_ns->root);
15011da177e4SLinus Torvalds 		q = next_mnt(q, new_ns->root);
15021da177e4SLinus Torvalds 	}
1503390c6843SRam Pai 	up_write(&namespace_sem);
15041da177e4SLinus Torvalds 
15051da177e4SLinus Torvalds 	if (rootmnt)
15061da177e4SLinus Torvalds 		mntput(rootmnt);
15071da177e4SLinus Torvalds 	if (pwdmnt)
15081da177e4SLinus Torvalds 		mntput(pwdmnt);
15091da177e4SLinus Torvalds 	if (altrootmnt)
15101da177e4SLinus Torvalds 		mntput(altrootmnt);
15111da177e4SLinus Torvalds 
1512741a2951SJANAK DESAI 	return new_ns;
1513741a2951SJANAK DESAI }
1514741a2951SJANAK DESAI 
1515e3222c4eSBadari Pulavarty struct mnt_namespace *copy_mnt_ns(int flags, struct mnt_namespace *ns,
1516e3222c4eSBadari Pulavarty 		struct fs_struct *new_fs)
1517741a2951SJANAK DESAI {
15186b3286edSKirill Korotaev 	struct mnt_namespace *new_ns;
1519741a2951SJANAK DESAI 
1520e3222c4eSBadari Pulavarty 	BUG_ON(!ns);
15216b3286edSKirill Korotaev 	get_mnt_ns(ns);
1522741a2951SJANAK DESAI 
1523741a2951SJANAK DESAI 	if (!(flags & CLONE_NEWNS))
1524e3222c4eSBadari Pulavarty 		return ns;
1525741a2951SJANAK DESAI 
1526e3222c4eSBadari Pulavarty 	new_ns = dup_mnt_ns(ns, new_fs);
1527741a2951SJANAK DESAI 
15286b3286edSKirill Korotaev 	put_mnt_ns(ns);
1529e3222c4eSBadari Pulavarty 	return new_ns;
15301da177e4SLinus Torvalds }
15311da177e4SLinus Torvalds 
15321da177e4SLinus Torvalds asmlinkage long sys_mount(char __user * dev_name, char __user * dir_name,
15331da177e4SLinus Torvalds 			  char __user * type, unsigned long flags,
15341da177e4SLinus Torvalds 			  void __user * data)
15351da177e4SLinus Torvalds {
15361da177e4SLinus Torvalds 	int retval;
15371da177e4SLinus Torvalds 	unsigned long data_page;
15381da177e4SLinus Torvalds 	unsigned long type_page;
15391da177e4SLinus Torvalds 	unsigned long dev_page;
15401da177e4SLinus Torvalds 	char *dir_page;
15411da177e4SLinus Torvalds 
15421da177e4SLinus Torvalds 	retval = copy_mount_options(type, &type_page);
15431da177e4SLinus Torvalds 	if (retval < 0)
15441da177e4SLinus Torvalds 		return retval;
15451da177e4SLinus Torvalds 
15461da177e4SLinus Torvalds 	dir_page = getname(dir_name);
15471da177e4SLinus Torvalds 	retval = PTR_ERR(dir_page);
15481da177e4SLinus Torvalds 	if (IS_ERR(dir_page))
15491da177e4SLinus Torvalds 		goto out1;
15501da177e4SLinus Torvalds 
15511da177e4SLinus Torvalds 	retval = copy_mount_options(dev_name, &dev_page);
15521da177e4SLinus Torvalds 	if (retval < 0)
15531da177e4SLinus Torvalds 		goto out2;
15541da177e4SLinus Torvalds 
15551da177e4SLinus Torvalds 	retval = copy_mount_options(data, &data_page);
15561da177e4SLinus Torvalds 	if (retval < 0)
15571da177e4SLinus Torvalds 		goto out3;
15581da177e4SLinus Torvalds 
15591da177e4SLinus Torvalds 	lock_kernel();
15601da177e4SLinus Torvalds 	retval = do_mount((char *)dev_page, dir_page, (char *)type_page,
15611da177e4SLinus Torvalds 			  flags, (void *)data_page);
15621da177e4SLinus Torvalds 	unlock_kernel();
15631da177e4SLinus Torvalds 	free_page(data_page);
15641da177e4SLinus Torvalds 
15651da177e4SLinus Torvalds out3:
15661da177e4SLinus Torvalds 	free_page(dev_page);
15671da177e4SLinus Torvalds out2:
15681da177e4SLinus Torvalds 	putname(dir_page);
15691da177e4SLinus Torvalds out1:
15701da177e4SLinus Torvalds 	free_page(type_page);
15711da177e4SLinus Torvalds 	return retval;
15721da177e4SLinus Torvalds }
15731da177e4SLinus Torvalds 
15741da177e4SLinus Torvalds /*
15751da177e4SLinus Torvalds  * Replace the fs->{rootmnt,root} with {mnt,dentry}. Put the old values.
15761da177e4SLinus Torvalds  * It can block. Requires the big lock held.
15771da177e4SLinus Torvalds  */
15781da177e4SLinus Torvalds void set_fs_root(struct fs_struct *fs, struct vfsmount *mnt,
15791da177e4SLinus Torvalds 		 struct dentry *dentry)
15801da177e4SLinus Torvalds {
15811da177e4SLinus Torvalds 	struct dentry *old_root;
15821da177e4SLinus Torvalds 	struct vfsmount *old_rootmnt;
15831da177e4SLinus Torvalds 	write_lock(&fs->lock);
15841da177e4SLinus Torvalds 	old_root = fs->root;
15851da177e4SLinus Torvalds 	old_rootmnt = fs->rootmnt;
15861da177e4SLinus Torvalds 	fs->rootmnt = mntget(mnt);
15871da177e4SLinus Torvalds 	fs->root = dget(dentry);
15881da177e4SLinus Torvalds 	write_unlock(&fs->lock);
15891da177e4SLinus Torvalds 	if (old_root) {
15901da177e4SLinus Torvalds 		dput(old_root);
15911da177e4SLinus Torvalds 		mntput(old_rootmnt);
15921da177e4SLinus Torvalds 	}
15931da177e4SLinus Torvalds }
15941da177e4SLinus Torvalds 
15951da177e4SLinus Torvalds /*
15961da177e4SLinus Torvalds  * Replace the fs->{pwdmnt,pwd} with {mnt,dentry}. Put the old values.
15971da177e4SLinus Torvalds  * It can block. Requires the big lock held.
15981da177e4SLinus Torvalds  */
15991da177e4SLinus Torvalds void set_fs_pwd(struct fs_struct *fs, struct vfsmount *mnt,
16001da177e4SLinus Torvalds 		struct dentry *dentry)
16011da177e4SLinus Torvalds {
16021da177e4SLinus Torvalds 	struct dentry *old_pwd;
16031da177e4SLinus Torvalds 	struct vfsmount *old_pwdmnt;
16041da177e4SLinus Torvalds 
16051da177e4SLinus Torvalds 	write_lock(&fs->lock);
16061da177e4SLinus Torvalds 	old_pwd = fs->pwd;
16071da177e4SLinus Torvalds 	old_pwdmnt = fs->pwdmnt;
16081da177e4SLinus Torvalds 	fs->pwdmnt = mntget(mnt);
16091da177e4SLinus Torvalds 	fs->pwd = dget(dentry);
16101da177e4SLinus Torvalds 	write_unlock(&fs->lock);
16111da177e4SLinus Torvalds 
16121da177e4SLinus Torvalds 	if (old_pwd) {
16131da177e4SLinus Torvalds 		dput(old_pwd);
16141da177e4SLinus Torvalds 		mntput(old_pwdmnt);
16151da177e4SLinus Torvalds 	}
16161da177e4SLinus Torvalds }
16171da177e4SLinus Torvalds 
16181da177e4SLinus Torvalds static void chroot_fs_refs(struct nameidata *old_nd, struct nameidata *new_nd)
16191da177e4SLinus Torvalds {
16201da177e4SLinus Torvalds 	struct task_struct *g, *p;
16211da177e4SLinus Torvalds 	struct fs_struct *fs;
16221da177e4SLinus Torvalds 
16231da177e4SLinus Torvalds 	read_lock(&tasklist_lock);
16241da177e4SLinus Torvalds 	do_each_thread(g, p) {
16251da177e4SLinus Torvalds 		task_lock(p);
16261da177e4SLinus Torvalds 		fs = p->fs;
16271da177e4SLinus Torvalds 		if (fs) {
16281da177e4SLinus Torvalds 			atomic_inc(&fs->count);
16291da177e4SLinus Torvalds 			task_unlock(p);
1630b58fed8bSRam Pai 			if (fs->root == old_nd->dentry
1631b58fed8bSRam Pai 			    && fs->rootmnt == old_nd->mnt)
16321da177e4SLinus Torvalds 				set_fs_root(fs, new_nd->mnt, new_nd->dentry);
1633b58fed8bSRam Pai 			if (fs->pwd == old_nd->dentry
1634b58fed8bSRam Pai 			    && fs->pwdmnt == old_nd->mnt)
16351da177e4SLinus Torvalds 				set_fs_pwd(fs, new_nd->mnt, new_nd->dentry);
16361da177e4SLinus Torvalds 			put_fs_struct(fs);
16371da177e4SLinus Torvalds 		} else
16381da177e4SLinus Torvalds 			task_unlock(p);
16391da177e4SLinus Torvalds 	} while_each_thread(g, p);
16401da177e4SLinus Torvalds 	read_unlock(&tasklist_lock);
16411da177e4SLinus Torvalds }
16421da177e4SLinus Torvalds 
16431da177e4SLinus Torvalds /*
16441da177e4SLinus Torvalds  * pivot_root Semantics:
16451da177e4SLinus Torvalds  * Moves the root file system of the current process to the directory put_old,
16461da177e4SLinus Torvalds  * makes new_root as the new root file system of the current process, and sets
16471da177e4SLinus Torvalds  * root/cwd of all processes which had them on the current root to new_root.
16481da177e4SLinus Torvalds  *
16491da177e4SLinus Torvalds  * Restrictions:
16501da177e4SLinus Torvalds  * The new_root and put_old must be directories, and  must not be on the
16511da177e4SLinus Torvalds  * same file  system as the current process root. The put_old  must  be
16521da177e4SLinus Torvalds  * underneath new_root,  i.e. adding a non-zero number of /.. to the string
16531da177e4SLinus Torvalds  * pointed to by put_old must yield the same directory as new_root. No other
16541da177e4SLinus Torvalds  * file system may be mounted on put_old. After all, new_root is a mountpoint.
16551da177e4SLinus Torvalds  *
16564a0d11faSNeil Brown  * Also, the current root cannot be on the 'rootfs' (initial ramfs) filesystem.
16574a0d11faSNeil Brown  * See Documentation/filesystems/ramfs-rootfs-initramfs.txt for alternatives
16584a0d11faSNeil Brown  * in this situation.
16594a0d11faSNeil Brown  *
16601da177e4SLinus Torvalds  * Notes:
16611da177e4SLinus Torvalds  *  - we don't move root/cwd if they are not at the root (reason: if something
16621da177e4SLinus Torvalds  *    cared enough to change them, it's probably wrong to force them elsewhere)
16631da177e4SLinus Torvalds  *  - it's okay to pick a root that isn't the root of a file system, e.g.
16641da177e4SLinus Torvalds  *    /nfs/my_root where /nfs is the mount point. It must be a mountpoint,
16651da177e4SLinus Torvalds  *    though, so you may need to say mount --bind /nfs/my_root /nfs/my_root
16661da177e4SLinus Torvalds  *    first.
16671da177e4SLinus Torvalds  */
1668b58fed8bSRam Pai asmlinkage long sys_pivot_root(const char __user * new_root,
1669b58fed8bSRam Pai 			       const char __user * put_old)
16701da177e4SLinus Torvalds {
16711da177e4SLinus Torvalds 	struct vfsmount *tmp;
16721da177e4SLinus Torvalds 	struct nameidata new_nd, old_nd, parent_nd, root_parent, user_nd;
16731da177e4SLinus Torvalds 	int error;
16741da177e4SLinus Torvalds 
16751da177e4SLinus Torvalds 	if (!capable(CAP_SYS_ADMIN))
16761da177e4SLinus Torvalds 		return -EPERM;
16771da177e4SLinus Torvalds 
16781da177e4SLinus Torvalds 	lock_kernel();
16791da177e4SLinus Torvalds 
1680b58fed8bSRam Pai 	error = __user_walk(new_root, LOOKUP_FOLLOW | LOOKUP_DIRECTORY,
1681b58fed8bSRam Pai 			    &new_nd);
16821da177e4SLinus Torvalds 	if (error)
16831da177e4SLinus Torvalds 		goto out0;
16841da177e4SLinus Torvalds 	error = -EINVAL;
16851da177e4SLinus Torvalds 	if (!check_mnt(new_nd.mnt))
16861da177e4SLinus Torvalds 		goto out1;
16871da177e4SLinus Torvalds 
16881da177e4SLinus Torvalds 	error = __user_walk(put_old, LOOKUP_FOLLOW | LOOKUP_DIRECTORY, &old_nd);
16891da177e4SLinus Torvalds 	if (error)
16901da177e4SLinus Torvalds 		goto out1;
16911da177e4SLinus Torvalds 
16921da177e4SLinus Torvalds 	error = security_sb_pivotroot(&old_nd, &new_nd);
16931da177e4SLinus Torvalds 	if (error) {
16941da177e4SLinus Torvalds 		path_release(&old_nd);
16951da177e4SLinus Torvalds 		goto out1;
16961da177e4SLinus Torvalds 	}
16971da177e4SLinus Torvalds 
16981da177e4SLinus Torvalds 	read_lock(&current->fs->lock);
16991da177e4SLinus Torvalds 	user_nd.mnt = mntget(current->fs->rootmnt);
17001da177e4SLinus Torvalds 	user_nd.dentry = dget(current->fs->root);
17011da177e4SLinus Torvalds 	read_unlock(&current->fs->lock);
1702390c6843SRam Pai 	down_write(&namespace_sem);
17031b1dcc1bSJes Sorensen 	mutex_lock(&old_nd.dentry->d_inode->i_mutex);
17041da177e4SLinus Torvalds 	error = -EINVAL;
170521444403SRam Pai 	if (IS_MNT_SHARED(old_nd.mnt) ||
170621444403SRam Pai 		IS_MNT_SHARED(new_nd.mnt->mnt_parent) ||
170721444403SRam Pai 		IS_MNT_SHARED(user_nd.mnt->mnt_parent))
170821444403SRam Pai 		goto out2;
17091da177e4SLinus Torvalds 	if (!check_mnt(user_nd.mnt))
17101da177e4SLinus Torvalds 		goto out2;
17111da177e4SLinus Torvalds 	error = -ENOENT;
17121da177e4SLinus Torvalds 	if (IS_DEADDIR(new_nd.dentry->d_inode))
17131da177e4SLinus Torvalds 		goto out2;
17141da177e4SLinus Torvalds 	if (d_unhashed(new_nd.dentry) && !IS_ROOT(new_nd.dentry))
17151da177e4SLinus Torvalds 		goto out2;
17161da177e4SLinus Torvalds 	if (d_unhashed(old_nd.dentry) && !IS_ROOT(old_nd.dentry))
17171da177e4SLinus Torvalds 		goto out2;
17181da177e4SLinus Torvalds 	error = -EBUSY;
17191da177e4SLinus Torvalds 	if (new_nd.mnt == user_nd.mnt || old_nd.mnt == user_nd.mnt)
17201da177e4SLinus Torvalds 		goto out2; /* loop, on the same file system  */
17211da177e4SLinus Torvalds 	error = -EINVAL;
17221da177e4SLinus Torvalds 	if (user_nd.mnt->mnt_root != user_nd.dentry)
17231da177e4SLinus Torvalds 		goto out2; /* not a mountpoint */
17240bb6fcc1SMiklos Szeredi 	if (user_nd.mnt->mnt_parent == user_nd.mnt)
17250bb6fcc1SMiklos Szeredi 		goto out2; /* not attached */
17261da177e4SLinus Torvalds 	if (new_nd.mnt->mnt_root != new_nd.dentry)
17271da177e4SLinus Torvalds 		goto out2; /* not a mountpoint */
17280bb6fcc1SMiklos Szeredi 	if (new_nd.mnt->mnt_parent == new_nd.mnt)
17290bb6fcc1SMiklos Szeredi 		goto out2; /* not attached */
17301da177e4SLinus Torvalds 	tmp = old_nd.mnt; /* make sure we can reach put_old from new_root */
17311da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
17321da177e4SLinus Torvalds 	if (tmp != new_nd.mnt) {
17331da177e4SLinus Torvalds 		for (;;) {
17341da177e4SLinus Torvalds 			if (tmp->mnt_parent == tmp)
17351da177e4SLinus Torvalds 				goto out3; /* already mounted on put_old */
17361da177e4SLinus Torvalds 			if (tmp->mnt_parent == new_nd.mnt)
17371da177e4SLinus Torvalds 				break;
17381da177e4SLinus Torvalds 			tmp = tmp->mnt_parent;
17391da177e4SLinus Torvalds 		}
17401da177e4SLinus Torvalds 		if (!is_subdir(tmp->mnt_mountpoint, new_nd.dentry))
17411da177e4SLinus Torvalds 			goto out3;
17421da177e4SLinus Torvalds 	} else if (!is_subdir(old_nd.dentry, new_nd.dentry))
17431da177e4SLinus Torvalds 		goto out3;
17441da177e4SLinus Torvalds 	detach_mnt(new_nd.mnt, &parent_nd);
17451da177e4SLinus Torvalds 	detach_mnt(user_nd.mnt, &root_parent);
17461da177e4SLinus Torvalds 	attach_mnt(user_nd.mnt, &old_nd);     /* mount old root on put_old */
17471da177e4SLinus Torvalds 	attach_mnt(new_nd.mnt, &root_parent); /* mount new_root on / */
17486b3286edSKirill Korotaev 	touch_mnt_namespace(current->nsproxy->mnt_ns);
17491da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
17501da177e4SLinus Torvalds 	chroot_fs_refs(&user_nd, &new_nd);
17511da177e4SLinus Torvalds 	security_sb_post_pivotroot(&user_nd, &new_nd);
17521da177e4SLinus Torvalds 	error = 0;
17531da177e4SLinus Torvalds 	path_release(&root_parent);
17541da177e4SLinus Torvalds 	path_release(&parent_nd);
17551da177e4SLinus Torvalds out2:
17561b1dcc1bSJes Sorensen 	mutex_unlock(&old_nd.dentry->d_inode->i_mutex);
1757390c6843SRam Pai 	up_write(&namespace_sem);
17581da177e4SLinus Torvalds 	path_release(&user_nd);
17591da177e4SLinus Torvalds 	path_release(&old_nd);
17601da177e4SLinus Torvalds out1:
17611da177e4SLinus Torvalds 	path_release(&new_nd);
17621da177e4SLinus Torvalds out0:
17631da177e4SLinus Torvalds 	unlock_kernel();
17641da177e4SLinus Torvalds 	return error;
17651da177e4SLinus Torvalds out3:
17661da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
17671da177e4SLinus Torvalds 	goto out2;
17681da177e4SLinus Torvalds }
17691da177e4SLinus Torvalds 
17701da177e4SLinus Torvalds static void __init init_mount_tree(void)
17711da177e4SLinus Torvalds {
17721da177e4SLinus Torvalds 	struct vfsmount *mnt;
17736b3286edSKirill Korotaev 	struct mnt_namespace *ns;
17741da177e4SLinus Torvalds 
17751da177e4SLinus Torvalds 	mnt = do_kern_mount("rootfs", 0, "rootfs", NULL);
17761da177e4SLinus Torvalds 	if (IS_ERR(mnt))
17771da177e4SLinus Torvalds 		panic("Can't create rootfs");
17786b3286edSKirill Korotaev 	ns = kmalloc(sizeof(*ns), GFP_KERNEL);
17796b3286edSKirill Korotaev 	if (!ns)
17801da177e4SLinus Torvalds 		panic("Can't allocate initial namespace");
17816b3286edSKirill Korotaev 	atomic_set(&ns->count, 1);
17826b3286edSKirill Korotaev 	INIT_LIST_HEAD(&ns->list);
17836b3286edSKirill Korotaev 	init_waitqueue_head(&ns->poll);
17846b3286edSKirill Korotaev 	ns->event = 0;
17856b3286edSKirill Korotaev 	list_add(&mnt->mnt_list, &ns->list);
17866b3286edSKirill Korotaev 	ns->root = mnt;
17876b3286edSKirill Korotaev 	mnt->mnt_ns = ns;
17881da177e4SLinus Torvalds 
17896b3286edSKirill Korotaev 	init_task.nsproxy->mnt_ns = ns;
17906b3286edSKirill Korotaev 	get_mnt_ns(ns);
17911da177e4SLinus Torvalds 
17926b3286edSKirill Korotaev 	set_fs_pwd(current->fs, ns->root, ns->root->mnt_root);
17936b3286edSKirill Korotaev 	set_fs_root(current->fs, ns->root, ns->root->mnt_root);
17941da177e4SLinus Torvalds }
17951da177e4SLinus Torvalds 
17961da177e4SLinus Torvalds void __init mnt_init(unsigned long mempages)
17971da177e4SLinus Torvalds {
17981da177e4SLinus Torvalds 	struct list_head *d;
17991da177e4SLinus Torvalds 	unsigned int nr_hash;
18001da177e4SLinus Torvalds 	int i;
180115a67dd8SRandy Dunlap 	int err;
18021da177e4SLinus Torvalds 
1803390c6843SRam Pai 	init_rwsem(&namespace_sem);
1804390c6843SRam Pai 
18051da177e4SLinus Torvalds 	mnt_cache = kmem_cache_create("mnt_cache", sizeof(struct vfsmount),
18061da177e4SLinus Torvalds 			0, SLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL, NULL);
18071da177e4SLinus Torvalds 
1808b58fed8bSRam Pai 	mount_hashtable = (struct list_head *)__get_free_page(GFP_ATOMIC);
18091da177e4SLinus Torvalds 
18101da177e4SLinus Torvalds 	if (!mount_hashtable)
18111da177e4SLinus Torvalds 		panic("Failed to allocate mount hash table\n");
18121da177e4SLinus Torvalds 
18131da177e4SLinus Torvalds 	/*
18141da177e4SLinus Torvalds 	 * Find the power-of-two list-heads that can fit into the allocation..
18151da177e4SLinus Torvalds 	 * We don't guarantee that "sizeof(struct list_head)" is necessarily
18161da177e4SLinus Torvalds 	 * a power-of-two.
18171da177e4SLinus Torvalds 	 */
18181da177e4SLinus Torvalds 	nr_hash = PAGE_SIZE / sizeof(struct list_head);
18191da177e4SLinus Torvalds 	hash_bits = 0;
18201da177e4SLinus Torvalds 	do {
18211da177e4SLinus Torvalds 		hash_bits++;
18221da177e4SLinus Torvalds 	} while ((nr_hash >> hash_bits) != 0);
18231da177e4SLinus Torvalds 	hash_bits--;
18241da177e4SLinus Torvalds 
18251da177e4SLinus Torvalds 	/*
18261da177e4SLinus Torvalds 	 * Re-calculate the actual number of entries and the mask
18271da177e4SLinus Torvalds 	 * from the number of bits we can fit.
18281da177e4SLinus Torvalds 	 */
18291da177e4SLinus Torvalds 	nr_hash = 1UL << hash_bits;
18301da177e4SLinus Torvalds 	hash_mask = nr_hash - 1;
18311da177e4SLinus Torvalds 
18321da177e4SLinus Torvalds 	printk("Mount-cache hash table entries: %d\n", nr_hash);
18331da177e4SLinus Torvalds 
18341da177e4SLinus Torvalds 	/* And initialize the newly allocated array */
18351da177e4SLinus Torvalds 	d = mount_hashtable;
18361da177e4SLinus Torvalds 	i = nr_hash;
18371da177e4SLinus Torvalds 	do {
18381da177e4SLinus Torvalds 		INIT_LIST_HEAD(d);
18391da177e4SLinus Torvalds 		d++;
18401da177e4SLinus Torvalds 		i--;
18411da177e4SLinus Torvalds 	} while (i);
184215a67dd8SRandy Dunlap 	err = sysfs_init();
184315a67dd8SRandy Dunlap 	if (err)
184415a67dd8SRandy Dunlap 		printk(KERN_WARNING "%s: sysfs_init error: %d\n",
184515a67dd8SRandy Dunlap 			__FUNCTION__, err);
184615a67dd8SRandy Dunlap 	err = subsystem_register(&fs_subsys);
184715a67dd8SRandy Dunlap 	if (err)
184815a67dd8SRandy Dunlap 		printk(KERN_WARNING "%s: subsystem_register error: %d\n",
184915a67dd8SRandy Dunlap 			__FUNCTION__, err);
18501da177e4SLinus Torvalds 	init_rootfs();
18511da177e4SLinus Torvalds 	init_mount_tree();
18521da177e4SLinus Torvalds }
18531da177e4SLinus Torvalds 
18546b3286edSKirill Korotaev void __put_mnt_ns(struct mnt_namespace *ns)
18551da177e4SLinus Torvalds {
18566b3286edSKirill Korotaev 	struct vfsmount *root = ns->root;
185770fbcdf4SRam Pai 	LIST_HEAD(umount_list);
18586b3286edSKirill Korotaev 	ns->root = NULL;
18591ce88cf4SMiklos Szeredi 	spin_unlock(&vfsmount_lock);
1860390c6843SRam Pai 	down_write(&namespace_sem);
18611da177e4SLinus Torvalds 	spin_lock(&vfsmount_lock);
1862a05964f3SRam Pai 	umount_tree(root, 0, &umount_list);
18631da177e4SLinus Torvalds 	spin_unlock(&vfsmount_lock);
1864390c6843SRam Pai 	up_write(&namespace_sem);
186570fbcdf4SRam Pai 	release_mounts(&umount_list);
18666b3286edSKirill Korotaev 	kfree(ns);
18671da177e4SLinus Torvalds }
1868