]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - include/linux/nsproxy.h
Merge tag 'wireless-drivers-for-davem-2016-04-13' of git://git.kernel.org/pub/scm...
[mirror_ubuntu-zesty-kernel.git] / include / linux / nsproxy.h
CommitLineData
ab516013
SH
1#ifndef _LINUX_NSPROXY_H
2#define _LINUX_NSPROXY_H
3
4#include <linux/spinlock.h>
5#include <linux/sched.h>
6
6b3286ed 7struct mnt_namespace;
4865ecf1 8struct uts_namespace;
25b21cb2 9struct ipc_namespace;
9a575a92 10struct pid_namespace;
a79a908f 11struct cgroup_namespace;
5ad4e53b 12struct fs_struct;
1651e14e 13
ab516013
SH
14/*
15 * A structure to contain pointers to all per-process
16 * namespaces - fs (mount), uts, network, sysvipc, etc.
17 *
c2b1df2e
AL
18 * The pid namespace is an exception -- it's accessed using
19 * task_active_pid_ns. The pid namespace here is the
20 * namespace that children will use.
21 *
ab516013
SH
22 * 'count' is the number of tasks holding a reference.
23 * The count for each namespace, then, will be the number
24 * of nsproxies pointing to it, not the number of tasks.
25 *
26 * The nsproxy is shared by tasks which share all namespaces.
27 * As soon as a single namespace is cloned or unshared, the
28 * nsproxy is copied.
29 */
30struct nsproxy {
31 atomic_t count;
4865ecf1 32 struct uts_namespace *uts_ns;
25b21cb2 33 struct ipc_namespace *ipc_ns;
6b3286ed 34 struct mnt_namespace *mnt_ns;
c2b1df2e 35 struct pid_namespace *pid_ns_for_children;
772698f6 36 struct net *net_ns;
a79a908f 37 struct cgroup_namespace *cgroup_ns;
ab516013
SH
38};
39extern struct nsproxy init_nsproxy;
40
cf7b708c
PE
41/*
42 * the namespaces access rules are:
43 *
44 * 1. only current task is allowed to change tsk->nsproxy pointer or
728dba3a
EB
45 * any pointer on the nsproxy itself. Current must hold the task_lock
46 * when changing tsk->nsproxy.
cf7b708c
PE
47 *
48 * 2. when accessing (i.e. reading) current task's namespaces - no
49 * precautions should be taken - just dereference the pointers
50 *
51 * 3. the access to other task namespaces is performed like this
728dba3a
EB
52 * task_lock(task);
53 * nsproxy = task->nsproxy;
cf7b708c
PE
54 * if (nsproxy != NULL) {
55 * / *
56 * * work with the namespaces here
57 * * e.g. get the reference on one of them
58 * * /
59 * } / *
728dba3a 60 * * NULL task->nsproxy means that this task is
cf7b708c
PE
61 * * almost dead (zombie)
62 * * /
728dba3a 63 * task_unlock(task);
cf7b708c
PE
64 *
65 */
66
213dd266 67int copy_namespaces(unsigned long flags, struct task_struct *tsk);
cf7b708c
PE
68void exit_task_namespaces(struct task_struct *tsk);
69void switch_task_namespaces(struct task_struct *tsk, struct nsproxy *new);
ab516013 70void free_nsproxy(struct nsproxy *ns);
e3222c4e 71int unshare_nsproxy_namespaces(unsigned long, struct nsproxy **,
b2e0d987 72 struct cred *, struct fs_struct *);
66577193 73int __init nsproxy_cache_init(void);
ab516013 74
444f378b 75static inline void put_nsproxy(struct nsproxy *ns)
ab516013 76{
444f378b 77 if (atomic_dec_and_test(&ns->count)) {
ab516013 78 free_nsproxy(ns);
444f378b 79 }
ab516013
SH
80}
81
cf7b708c 82static inline void get_nsproxy(struct nsproxy *ns)
ab516013 83{
cf7b708c 84 atomic_inc(&ns->count);
ab516013 85}
858d72ea 86
ab516013 87#endif