]>
Commit | Line | Data |
---|---|---|
07b20889 RP |
1 | /* |
2 | * linux/fs/pnode.c | |
3 | * | |
4 | * (C) Copyright IBM Corporation 2005. | |
5 | * Released under GPL v2. | |
6 | * Author : Ram Pai (linuxram@us.ibm.com) | |
7 | * | |
8 | */ | |
6b3286ed | 9 | #include <linux/mnt_namespace.h> |
07b20889 RP |
10 | #include <linux/mount.h> |
11 | #include <linux/fs.h> | |
132c94e3 | 12 | #include <linux/nsproxy.h> |
6d59e7f5 | 13 | #include "internal.h" |
07b20889 RP |
14 | #include "pnode.h" |
15 | ||
03e06e68 | 16 | /* return the next shared peer mount of @p */ |
c937135d | 17 | static inline struct mount *next_peer(struct mount *p) |
03e06e68 | 18 | { |
6776db3d | 19 | return list_entry(p->mnt_share.next, struct mount, mnt_share); |
03e06e68 RP |
20 | } |
21 | ||
c937135d | 22 | static inline struct mount *first_slave(struct mount *p) |
5afe0022 | 23 | { |
6776db3d | 24 | return list_entry(p->mnt_slave_list.next, struct mount, mnt_slave); |
5afe0022 RP |
25 | } |
26 | ||
c937135d | 27 | static inline struct mount *next_slave(struct mount *p) |
5afe0022 | 28 | { |
6776db3d | 29 | return list_entry(p->mnt_slave.next, struct mount, mnt_slave); |
5afe0022 RP |
30 | } |
31 | ||
6fc7871f AV |
32 | static struct mount *get_peer_under_root(struct mount *mnt, |
33 | struct mnt_namespace *ns, | |
34 | const struct path *root) | |
97e7e0f7 | 35 | { |
6fc7871f | 36 | struct mount *m = mnt; |
97e7e0f7 MS |
37 | |
38 | do { | |
39 | /* Check the namespace first for optimization */ | |
143c8c91 | 40 | if (m->mnt_ns == ns && is_path_reachable(m, m->mnt.mnt_root, root)) |
6fc7871f | 41 | return m; |
97e7e0f7 | 42 | |
c937135d | 43 | m = next_peer(m); |
6fc7871f | 44 | } while (m != mnt); |
97e7e0f7 MS |
45 | |
46 | return NULL; | |
47 | } | |
48 | ||
49 | /* | |
50 | * Get ID of closest dominating peer group having a representative | |
51 | * under the given root. | |
52 | * | |
53 | * Caller must hold namespace_sem | |
54 | */ | |
6fc7871f | 55 | int get_dominating_id(struct mount *mnt, const struct path *root) |
97e7e0f7 | 56 | { |
6fc7871f | 57 | struct mount *m; |
97e7e0f7 | 58 | |
32301920 | 59 | for (m = mnt->mnt_master; m != NULL; m = m->mnt_master) { |
143c8c91 | 60 | struct mount *d = get_peer_under_root(m, mnt->mnt_ns, root); |
97e7e0f7 | 61 | if (d) |
15169fe7 | 62 | return d->mnt_group_id; |
97e7e0f7 MS |
63 | } |
64 | ||
65 | return 0; | |
66 | } | |
67 | ||
6fc7871f | 68 | static int do_make_slave(struct mount *mnt) |
a58b0eb8 | 69 | { |
5235d448 | 70 | struct mount *master, *slave_mnt; |
a58b0eb8 | 71 | |
5235d448 AV |
72 | if (list_empty(&mnt->mnt_share)) { |
73 | if (IS_MNT_SHARED(mnt)) { | |
74 | mnt_release_group_id(mnt); | |
75 | CLEAR_MNT_SHARED(mnt); | |
76 | } | |
77 | master = mnt->mnt_master; | |
78 | if (!master) { | |
79 | struct list_head *p = &mnt->mnt_slave_list; | |
80 | while (!list_empty(p)) { | |
81 | slave_mnt = list_first_entry(p, | |
82 | struct mount, mnt_slave); | |
83 | list_del_init(&slave_mnt->mnt_slave); | |
84 | slave_mnt->mnt_master = NULL; | |
85 | } | |
86 | return 0; | |
87 | } | |
a58b0eb8 | 88 | } else { |
5235d448 AV |
89 | struct mount *m; |
90 | /* | |
91 | * slave 'mnt' to a peer mount that has the | |
92 | * same root dentry. If none is available then | |
93 | * slave it to anything that is available. | |
94 | */ | |
95 | for (m = master = next_peer(mnt); m != mnt; m = next_peer(m)) { | |
96 | if (m->mnt.mnt_root == mnt->mnt.mnt_root) { | |
97 | master = m; | |
98 | break; | |
99 | } | |
a58b0eb8 | 100 | } |
5235d448 AV |
101 | list_del_init(&mnt->mnt_share); |
102 | mnt->mnt_group_id = 0; | |
103 | CLEAR_MNT_SHARED(mnt); | |
a58b0eb8 | 104 | } |
5235d448 AV |
105 | list_for_each_entry(slave_mnt, &mnt->mnt_slave_list, mnt_slave) |
106 | slave_mnt->mnt_master = master; | |
107 | list_move(&mnt->mnt_slave, &master->mnt_slave_list); | |
108 | list_splice(&mnt->mnt_slave_list, master->mnt_slave_list.prev); | |
109 | INIT_LIST_HEAD(&mnt->mnt_slave_list); | |
32301920 | 110 | mnt->mnt_master = master; |
a58b0eb8 RP |
111 | return 0; |
112 | } | |
113 | ||
99b7db7b NP |
114 | /* |
115 | * vfsmount lock must be held for write | |
116 | */ | |
0f0afb1d | 117 | void change_mnt_propagation(struct mount *mnt, int type) |
07b20889 | 118 | { |
03e06e68 | 119 | if (type == MS_SHARED) { |
b90fa9ae | 120 | set_mnt_shared(mnt); |
a58b0eb8 RP |
121 | return; |
122 | } | |
6fc7871f | 123 | do_make_slave(mnt); |
a58b0eb8 | 124 | if (type != MS_SLAVE) { |
6776db3d | 125 | list_del_init(&mnt->mnt_slave); |
d10e8def | 126 | mnt->mnt_master = NULL; |
9676f0c6 | 127 | if (type == MS_UNBINDABLE) |
0f0afb1d | 128 | mnt->mnt.mnt_flags |= MNT_UNBINDABLE; |
0b03cfb2 | 129 | else |
0f0afb1d | 130 | mnt->mnt.mnt_flags &= ~MNT_UNBINDABLE; |
03e06e68 | 131 | } |
07b20889 | 132 | } |
b90fa9ae RP |
133 | |
134 | /* | |
135 | * get the next mount in the propagation tree. | |
136 | * @m: the mount seen last | |
137 | * @origin: the original mount from where the tree walk initiated | |
796a6b52 AV |
138 | * |
139 | * Note that peer groups form contiguous segments of slave lists. | |
140 | * We rely on that in get_source() to be able to find out if | |
141 | * vfsmount found while iterating with propagation_next() is | |
142 | * a peer of one we'd found earlier. | |
b90fa9ae | 143 | */ |
c937135d AV |
144 | static struct mount *propagation_next(struct mount *m, |
145 | struct mount *origin) | |
b90fa9ae | 146 | { |
5afe0022 | 147 | /* are there any slaves of this mount? */ |
143c8c91 | 148 | if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list)) |
5afe0022 RP |
149 | return first_slave(m); |
150 | ||
151 | while (1) { | |
32301920 | 152 | struct mount *master = m->mnt_master; |
5afe0022 | 153 | |
32301920 | 154 | if (master == origin->mnt_master) { |
c937135d AV |
155 | struct mount *next = next_peer(m); |
156 | return (next == origin) ? NULL : next; | |
6776db3d | 157 | } else if (m->mnt_slave.next != &master->mnt_slave_list) |
5afe0022 RP |
158 | return next_slave(m); |
159 | ||
160 | /* back at master */ | |
161 | m = master; | |
162 | } | |
163 | } | |
164 | ||
f2ebb3a9 | 165 | static struct mount *next_group(struct mount *m, struct mount *origin) |
5afe0022 | 166 | { |
f2ebb3a9 AV |
167 | while (1) { |
168 | while (1) { | |
169 | struct mount *next; | |
170 | if (!IS_MNT_NEW(m) && !list_empty(&m->mnt_slave_list)) | |
171 | return first_slave(m); | |
172 | next = next_peer(m); | |
173 | if (m->mnt_group_id == origin->mnt_group_id) { | |
174 | if (next == origin) | |
175 | return NULL; | |
176 | } else if (m->mnt_slave.next != &next->mnt_slave) | |
177 | break; | |
178 | m = next; | |
179 | } | |
180 | /* m is the last peer */ | |
181 | while (1) { | |
182 | struct mount *master = m->mnt_master; | |
183 | if (m->mnt_slave.next != &master->mnt_slave_list) | |
184 | return next_slave(m); | |
185 | m = next_peer(master); | |
186 | if (master->mnt_group_id == origin->mnt_group_id) | |
187 | break; | |
188 | if (master->mnt_slave.next == &m->mnt_slave) | |
189 | break; | |
190 | m = master; | |
191 | } | |
192 | if (m == origin) | |
193 | return NULL; | |
5afe0022 | 194 | } |
f2ebb3a9 | 195 | } |
5afe0022 | 196 | |
f2ebb3a9 AV |
197 | /* all accesses are serialized by namespace_sem */ |
198 | static struct user_namespace *user_ns; | |
5ec0811d | 199 | static struct mount *last_dest, *first_source, *last_source, *dest_master; |
f2ebb3a9 AV |
200 | static struct mountpoint *mp; |
201 | static struct hlist_head *list; | |
202 | ||
7ae8fd03 MP |
203 | static inline bool peers(struct mount *m1, struct mount *m2) |
204 | { | |
205 | return m1->mnt_group_id == m2->mnt_group_id && m1->mnt_group_id; | |
206 | } | |
207 | ||
f2ebb3a9 AV |
208 | static int propagate_one(struct mount *m) |
209 | { | |
210 | struct mount *child; | |
211 | int type; | |
212 | /* skip ones added by this propagate_mnt() */ | |
213 | if (IS_MNT_NEW(m)) | |
214 | return 0; | |
215 | /* skip if mountpoint isn't covered by it */ | |
216 | if (!is_subdir(mp->m_dentry, m->mnt.mnt_root)) | |
217 | return 0; | |
7ae8fd03 | 218 | if (peers(m, last_dest)) { |
f2ebb3a9 AV |
219 | type = CL_MAKE_SHARED; |
220 | } else { | |
221 | struct mount *n, *p; | |
5ec0811d | 222 | bool done; |
f2ebb3a9 AV |
223 | for (n = m; ; n = p) { |
224 | p = n->mnt_master; | |
5ec0811d | 225 | if (p == dest_master || IS_MNT_MARKED(p)) |
f2ebb3a9 | 226 | break; |
796a6b52 | 227 | } |
5ec0811d EB |
228 | do { |
229 | struct mount *parent = last_source->mnt_parent; | |
230 | if (last_source == first_source) | |
231 | break; | |
232 | done = parent->mnt_master == p; | |
233 | if (done && peers(n, parent)) | |
234 | break; | |
235 | last_source = last_source->mnt_master; | |
236 | } while (!done); | |
237 | ||
f2ebb3a9 AV |
238 | type = CL_SLAVE; |
239 | /* beginning of peer group among the slaves? */ | |
240 | if (IS_MNT_SHARED(m)) | |
241 | type |= CL_MAKE_SHARED; | |
5afe0022 | 242 | } |
f2ebb3a9 AV |
243 | |
244 | /* Notice when we are propagating across user namespaces */ | |
245 | if (m->mnt_ns->user_ns != user_ns) | |
246 | type |= CL_UNPRIVILEGED; | |
247 | child = copy_tree(last_source, last_source->mnt.mnt_root, type); | |
248 | if (IS_ERR(child)) | |
249 | return PTR_ERR(child); | |
8486a788 | 250 | child->mnt.mnt_flags &= ~MNT_LOCKED; |
f2ebb3a9 AV |
251 | mnt_set_mountpoint(m, mp, child); |
252 | last_dest = m; | |
253 | last_source = child; | |
254 | if (m->mnt_master != dest_master) { | |
255 | read_seqlock_excl(&mount_lock); | |
256 | SET_MNT_MARK(m->mnt_master); | |
257 | read_sequnlock_excl(&mount_lock); | |
258 | } | |
259 | hlist_add_head(&child->mnt_hash, list); | |
d2921684 | 260 | return count_mounts(m->mnt_ns, child); |
b90fa9ae RP |
261 | } |
262 | ||
263 | /* | |
264 | * mount 'source_mnt' under the destination 'dest_mnt' at | |
265 | * dentry 'dest_dentry'. And propagate that mount to | |
266 | * all the peer and slave mounts of 'dest_mnt'. | |
267 | * Link all the new mounts into a propagation tree headed at | |
268 | * source_mnt. Also link all the new mounts using ->mnt_list | |
269 | * headed at source_mnt's ->mnt_list | |
270 | * | |
271 | * @dest_mnt: destination mount. | |
272 | * @dest_dentry: destination dentry. | |
273 | * @source_mnt: source mount. | |
274 | * @tree_list : list of heads of trees to be attached. | |
275 | */ | |
84d17192 | 276 | int propagate_mnt(struct mount *dest_mnt, struct mountpoint *dest_mp, |
38129a13 | 277 | struct mount *source_mnt, struct hlist_head *tree_list) |
b90fa9ae | 278 | { |
f2ebb3a9 | 279 | struct mount *m, *n; |
b90fa9ae | 280 | int ret = 0; |
132c94e3 | 281 | |
f2ebb3a9 AV |
282 | /* |
283 | * we don't want to bother passing tons of arguments to | |
284 | * propagate_one(); everything is serialized by namespace_sem, | |
285 | * so globals will do just fine. | |
286 | */ | |
287 | user_ns = current->nsproxy->mnt_ns->user_ns; | |
288 | last_dest = dest_mnt; | |
5ec0811d | 289 | first_source = source_mnt; |
f2ebb3a9 AV |
290 | last_source = source_mnt; |
291 | mp = dest_mp; | |
292 | list = tree_list; | |
293 | dest_master = dest_mnt->mnt_master; | |
294 | ||
295 | /* all peers of dest_mnt, except dest_mnt itself */ | |
296 | for (n = next_peer(dest_mnt); n != dest_mnt; n = next_peer(n)) { | |
297 | ret = propagate_one(n); | |
298 | if (ret) | |
b90fa9ae | 299 | goto out; |
f2ebb3a9 | 300 | } |
b90fa9ae | 301 | |
f2ebb3a9 AV |
302 | /* all slave groups */ |
303 | for (m = next_group(dest_mnt, dest_mnt); m; | |
304 | m = next_group(m, dest_mnt)) { | |
305 | /* everything in that slave group */ | |
306 | n = m; | |
307 | do { | |
308 | ret = propagate_one(n); | |
309 | if (ret) | |
310 | goto out; | |
311 | n = next_peer(n); | |
312 | } while (n != m); | |
b90fa9ae RP |
313 | } |
314 | out: | |
f2ebb3a9 AV |
315 | read_seqlock_excl(&mount_lock); |
316 | hlist_for_each_entry(n, tree_list, mnt_hash) { | |
317 | m = n->mnt_parent; | |
318 | if (m->mnt_master != dest_mnt->mnt_master) | |
319 | CLEAR_MNT_MARK(m->mnt_master); | |
b90fa9ae | 320 | } |
f2ebb3a9 | 321 | read_sequnlock_excl(&mount_lock); |
b90fa9ae RP |
322 | return ret; |
323 | } | |
a05964f3 | 324 | |
1064f874 EB |
325 | static struct mount *find_topper(struct mount *mnt) |
326 | { | |
327 | /* If there is exactly one mount covering mnt completely return it. */ | |
328 | struct mount *child; | |
329 | ||
330 | if (!list_is_singular(&mnt->mnt_mounts)) | |
331 | return NULL; | |
332 | ||
333 | child = list_first_entry(&mnt->mnt_mounts, struct mount, mnt_child); | |
334 | if (child->mnt_mountpoint != mnt->mnt.mnt_root) | |
335 | return NULL; | |
336 | ||
337 | return child; | |
338 | } | |
339 | ||
a05964f3 RP |
340 | /* |
341 | * return true if the refcount is greater than count | |
342 | */ | |
1ab59738 | 343 | static inline int do_refcount_check(struct mount *mnt, int count) |
a05964f3 | 344 | { |
aba809cf | 345 | return mnt_get_count(mnt) > count; |
a05964f3 RP |
346 | } |
347 | ||
348 | /* | |
349 | * check if the mount 'mnt' can be unmounted successfully. | |
350 | * @mnt: the mount to be checked for unmount | |
351 | * NOTE: unmounting 'mnt' would naturally propagate to all | |
352 | * other mounts its parent propagates to. | |
353 | * Check if any of these mounts that **do not have submounts** | |
354 | * have more references than 'refcnt'. If so return busy. | |
99b7db7b | 355 | * |
b3e19d92 | 356 | * vfsmount lock must be held for write |
a05964f3 | 357 | */ |
1ab59738 | 358 | int propagate_mount_busy(struct mount *mnt, int refcnt) |
a05964f3 | 359 | { |
1064f874 | 360 | struct mount *m, *child, *topper; |
0714a533 | 361 | struct mount *parent = mnt->mnt_parent; |
a05964f3 | 362 | |
0714a533 | 363 | if (mnt == parent) |
a05964f3 RP |
364 | return do_refcount_check(mnt, refcnt); |
365 | ||
366 | /* | |
367 | * quickly check if the current mount can be unmounted. | |
368 | * If not, we don't have to go checking for all other | |
369 | * mounts | |
370 | */ | |
6b41d536 | 371 | if (!list_empty(&mnt->mnt_mounts) || do_refcount_check(mnt, refcnt)) |
a05964f3 RP |
372 | return 1; |
373 | ||
c937135d AV |
374 | for (m = propagation_next(parent, parent); m; |
375 | m = propagation_next(m, parent)) { | |
1064f874 EB |
376 | int count = 1; |
377 | child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint); | |
378 | if (!child) | |
379 | continue; | |
380 | ||
381 | /* Is there exactly one mount on the child that covers | |
382 | * it completely whose reference should be ignored? | |
383 | */ | |
384 | topper = find_topper(child); | |
385 | if (topper) | |
386 | count += 1; | |
387 | else if (!list_empty(&child->mnt_mounts)) | |
388 | continue; | |
389 | ||
390 | if (do_refcount_check(child, count)) | |
391 | return 1; | |
a05964f3 | 392 | } |
1064f874 | 393 | return 0; |
a05964f3 RP |
394 | } |
395 | ||
5d88457e EB |
396 | /* |
397 | * Clear MNT_LOCKED when it can be shown to be safe. | |
398 | * | |
399 | * mount_lock lock must be held for write | |
400 | */ | |
401 | void propagate_mount_unlock(struct mount *mnt) | |
402 | { | |
403 | struct mount *parent = mnt->mnt_parent; | |
404 | struct mount *m, *child; | |
405 | ||
406 | BUG_ON(parent == mnt); | |
407 | ||
408 | for (m = propagation_next(parent, parent); m; | |
409 | m = propagation_next(m, parent)) { | |
1064f874 | 410 | child = __lookup_mnt(&m->mnt, mnt->mnt_mountpoint); |
5d88457e EB |
411 | if (child) |
412 | child->mnt.mnt_flags &= ~MNT_LOCKED; | |
413 | } | |
414 | } | |
415 | ||
0c56fe31 EB |
416 | /* |
417 | * Mark all mounts that the MNT_LOCKED logic will allow to be unmounted. | |
418 | */ | |
419 | static void mark_umount_candidates(struct mount *mnt) | |
420 | { | |
421 | struct mount *parent = mnt->mnt_parent; | |
422 | struct mount *m; | |
423 | ||
424 | BUG_ON(parent == mnt); | |
425 | ||
426 | for (m = propagation_next(parent, parent); m; | |
427 | m = propagation_next(m, parent)) { | |
1064f874 | 428 | struct mount *child = __lookup_mnt(&m->mnt, |
0c56fe31 | 429 | mnt->mnt_mountpoint); |
1064f874 EB |
430 | if (!child || (child->mnt.mnt_flags & MNT_UMOUNT)) |
431 | continue; | |
432 | if (!IS_MNT_LOCKED(child) || IS_MNT_MARKED(m)) { | |
0c56fe31 EB |
433 | SET_MNT_MARK(child); |
434 | } | |
435 | } | |
436 | } | |
437 | ||
a05964f3 RP |
438 | /* |
439 | * NOTE: unmounting 'mnt' naturally propagates to all other mounts its | |
440 | * parent propagates to. | |
441 | */ | |
61ef47b1 | 442 | static void __propagate_umount(struct mount *mnt) |
a05964f3 | 443 | { |
0714a533 | 444 | struct mount *parent = mnt->mnt_parent; |
c937135d | 445 | struct mount *m; |
a05964f3 | 446 | |
0714a533 | 447 | BUG_ON(parent == mnt); |
a05964f3 | 448 | |
c937135d AV |
449 | for (m = propagation_next(parent, parent); m; |
450 | m = propagation_next(m, parent)) { | |
1064f874 EB |
451 | struct mount *topper; |
452 | struct mount *child = __lookup_mnt(&m->mnt, | |
474279dc | 453 | mnt->mnt_mountpoint); |
a05964f3 | 454 | /* |
0c56fe31 EB |
455 | * umount the child only if the child has no children |
456 | * and the child is marked safe to unmount. | |
a05964f3 | 457 | */ |
0c56fe31 EB |
458 | if (!child || !IS_MNT_MARKED(child)) |
459 | continue; | |
460 | CLEAR_MNT_MARK(child); | |
1064f874 EB |
461 | |
462 | /* If there is exactly one mount covering all of child | |
463 | * replace child with that mount. | |
464 | */ | |
465 | topper = find_topper(child); | |
466 | if (topper) | |
467 | mnt_change_mountpoint(child->mnt_parent, child->mnt_mp, | |
468 | topper); | |
469 | ||
0c56fe31 | 470 | if (list_empty(&child->mnt_mounts)) { |
88b368f2 | 471 | list_del_init(&child->mnt_child); |
590ce4bc | 472 | child->mnt.mnt_flags |= MNT_UMOUNT; |
c003b26f | 473 | list_move_tail(&child->mnt_list, &mnt->mnt_list); |
38129a13 | 474 | } |
a05964f3 RP |
475 | } |
476 | } | |
477 | ||
478 | /* | |
479 | * collect all mounts that receive propagation from the mount in @list, | |
480 | * and return these additional mounts in the same list. | |
481 | * @list: the list of mounts to be unmounted. | |
99b7db7b NP |
482 | * |
483 | * vfsmount lock must be held for write | |
a05964f3 | 484 | */ |
c003b26f | 485 | int propagate_umount(struct list_head *list) |
a05964f3 | 486 | { |
61ef47b1 | 487 | struct mount *mnt; |
a05964f3 | 488 | |
0c56fe31 EB |
489 | list_for_each_entry_reverse(mnt, list, mnt_list) |
490 | mark_umount_candidates(mnt); | |
491 | ||
c003b26f | 492 | list_for_each_entry(mnt, list, mnt_list) |
a05964f3 RP |
493 | __propagate_umount(mnt); |
494 | return 0; | |
495 | } |