1 // SPDX-License-Identifier: GPL-2.0
3 * fs/proc_namespace.c - handling of /proc/<pid>/{mounts,mountinfo,mountstats}
5 * In fact, that's a piece of procfs; it's *almost* isolated from
6 * the rest of fs/proc, but has rather close relationships with
7 * fs/namespace.c, thus here instead of fs/proc
10 #include <linux/mnt_namespace.h>
11 #include <linux/nsproxy.h>
12 #include <linux/security.h>
13 #include <linux/fs_struct.h>
14 #include <linux/sched/task.h>
16 #include "proc/internal.h" /* only for get_proc_task() in ->open() */
21 static __poll_t
mounts_poll(struct file
*file
, poll_table
*wait
)
23 struct seq_file
*m
= file
->private_data
;
24 struct proc_mounts
*p
= m
->private;
25 struct mnt_namespace
*ns
= p
->ns
;
26 __poll_t res
= EPOLLIN
| EPOLLRDNORM
;
29 poll_wait(file
, &p
->ns
->poll
, wait
);
31 event
= READ_ONCE(ns
->event
);
32 if (m
->poll_event
!= event
) {
33 m
->poll_event
= event
;
34 res
|= EPOLLERR
| EPOLLPRI
;
45 static int show_sb_opts(struct seq_file
*m
, struct super_block
*sb
)
47 static const struct proc_fs_opts fs_opts
[] = {
48 { SB_SYNCHRONOUS
, ",sync" },
49 { SB_DIRSYNC
, ",dirsync" },
50 { SB_MANDLOCK
, ",mand" },
51 { SB_LAZYTIME
, ",lazytime" },
54 const struct proc_fs_opts
*fs_infop
;
56 for (fs_infop
= fs_opts
; fs_infop
->flag
; fs_infop
++) {
57 if (sb
->s_flags
& fs_infop
->flag
)
58 seq_puts(m
, fs_infop
->str
);
61 return security_sb_show_options(m
, sb
);
64 static void show_vfsmnt_opts(struct seq_file
*m
, struct vfsmount
*mnt
)
66 static const struct proc_fs_opts mnt_opts
[] = {
67 { MNT_NOSUID
, ",nosuid" },
68 { MNT_NODEV
, ",nodev" },
69 { MNT_NOEXEC
, ",noexec" },
70 { MNT_NOATIME
, ",noatime" },
71 { MNT_NODIRATIME
, ",nodiratime" },
72 { MNT_RELATIME
, ",relatime" },
73 { MNT_NOSYMFOLLOW
, ",nosymfollow" },
76 const struct proc_fs_opts
*fs_infop
;
78 for (fs_infop
= mnt_opts
; fs_infop
->flag
; fs_infop
++) {
79 if (mnt
->mnt_flags
& fs_infop
->flag
)
80 seq_puts(m
, fs_infop
->str
);
83 if (is_idmapped_mnt(mnt
))
84 seq_puts(m
, ",idmapped");
87 static inline void mangle(struct seq_file
*m
, const char *s
)
89 seq_escape(m
, s
, " \t\n\\#");
92 static void show_type(struct seq_file
*m
, struct super_block
*sb
)
94 mangle(m
, sb
->s_type
->name
);
97 mangle(m
, sb
->s_subtype
);
101 static int show_vfsmnt(struct seq_file
*m
, struct vfsmount
*mnt
)
103 struct proc_mounts
*p
= m
->private;
104 struct mount
*r
= real_mount(mnt
);
105 struct path mnt_path
= { .dentry
= mnt
->mnt_root
, .mnt
= mnt
};
106 struct super_block
*sb
= mnt_path
.dentry
->d_sb
;
109 if (sb
->s_op
->show_devname
) {
110 err
= sb
->s_op
->show_devname(m
, mnt_path
.dentry
);
114 mangle(m
, r
->mnt_devname
? r
->mnt_devname
: "none");
117 /* mountpoints outside of chroot jail will give SEQ_SKIP on this */
118 err
= seq_path_root(m
, &mnt_path
, &p
->root
, " \t\n\\");
123 seq_puts(m
, __mnt_is_readonly(mnt
) ? " ro" : " rw");
124 err
= show_sb_opts(m
, sb
);
127 show_vfsmnt_opts(m
, mnt
);
128 if (sb
->s_op
->show_options
)
129 err
= sb
->s_op
->show_options(m
, mnt_path
.dentry
);
130 seq_puts(m
, " 0 0\n");
135 static int show_mountinfo(struct seq_file
*m
, struct vfsmount
*mnt
)
137 struct proc_mounts
*p
= m
->private;
138 struct mount
*r
= real_mount(mnt
);
139 struct super_block
*sb
= mnt
->mnt_sb
;
140 struct path mnt_path
= { .dentry
= mnt
->mnt_root
, .mnt
= mnt
};
143 seq_printf(m
, "%i %i %u:%u ", r
->mnt_id
, r
->mnt_parent
->mnt_id
,
144 MAJOR(sb
->s_dev
), MINOR(sb
->s_dev
));
145 err
= show_path(m
, mnt
->mnt_root
);
150 /* mountpoints outside of chroot jail will give SEQ_SKIP on this */
151 err
= seq_path_root(m
, &mnt_path
, &p
->root
, " \t\n\\");
155 seq_puts(m
, mnt
->mnt_flags
& MNT_READONLY
? " ro" : " rw");
156 show_vfsmnt_opts(m
, mnt
);
158 /* Tagged fields ("foo:X" or "bar") */
159 if (IS_MNT_SHARED(r
))
160 seq_printf(m
, " shared:%i", r
->mnt_group_id
);
161 if (IS_MNT_SLAVE(r
)) {
162 int master
= r
->mnt_master
->mnt_group_id
;
163 int dom
= get_dominating_id(r
, &p
->root
);
164 seq_printf(m
, " master:%i", master
);
165 if (dom
&& dom
!= master
)
166 seq_printf(m
, " propagate_from:%i", dom
);
168 if (IS_MNT_UNBINDABLE(r
))
169 seq_puts(m
, " unbindable");
171 /* Filesystem specific data */
175 if (sb
->s_op
->show_devname
) {
176 err
= sb
->s_op
->show_devname(m
, mnt
->mnt_root
);
180 mangle(m
, r
->mnt_devname
? r
->mnt_devname
: "none");
182 seq_puts(m
, sb_rdonly(sb
) ? " ro" : " rw");
183 err
= show_sb_opts(m
, sb
);
186 if (sb
->s_op
->show_options
)
187 err
= sb
->s_op
->show_options(m
, mnt
->mnt_root
);
193 static int show_vfsstat(struct seq_file
*m
, struct vfsmount
*mnt
)
195 struct proc_mounts
*p
= m
->private;
196 struct mount
*r
= real_mount(mnt
);
197 struct path mnt_path
= { .dentry
= mnt
->mnt_root
, .mnt
= mnt
};
198 struct super_block
*sb
= mnt_path
.dentry
->d_sb
;
202 if (sb
->s_op
->show_devname
) {
203 seq_puts(m
, "device ");
204 err
= sb
->s_op
->show_devname(m
, mnt_path
.dentry
);
208 if (r
->mnt_devname
) {
209 seq_puts(m
, "device ");
210 mangle(m
, r
->mnt_devname
);
212 seq_puts(m
, "no device");
216 seq_puts(m
, " mounted on ");
217 /* mountpoints outside of chroot jail will give SEQ_SKIP on this */
218 err
= seq_path_root(m
, &mnt_path
, &p
->root
, " \t\n\\");
223 /* file system type */
224 seq_puts(m
, "with fstype ");
227 /* optional statistics */
228 if (sb
->s_op
->show_stats
) {
230 err
= sb
->s_op
->show_stats(m
, mnt_path
.dentry
);
238 static int mounts_open_common(struct inode
*inode
, struct file
*file
,
239 int (*show
)(struct seq_file
*, struct vfsmount
*))
241 struct task_struct
*task
= get_proc_task(inode
);
243 struct mnt_namespace
*ns
= NULL
;
245 struct proc_mounts
*p
;
254 if (!nsp
|| !nsp
->mnt_ns
) {
256 put_task_struct(task
);
263 put_task_struct(task
);
267 get_fs_root(task
->fs
, &root
);
269 put_task_struct(task
);
271 ret
= seq_open_private(file
, &mounts_op
, sizeof(struct proc_mounts
));
275 m
= file
->private_data
;
276 m
->poll_event
= ns
->event
;
293 static int mounts_release(struct inode
*inode
, struct file
*file
)
295 struct seq_file
*m
= file
->private_data
;
296 struct proc_mounts
*p
= m
->private;
299 return seq_release_private(inode
, file
);
302 static int mounts_open(struct inode
*inode
, struct file
*file
)
304 return mounts_open_common(inode
, file
, show_vfsmnt
);
307 static int mountinfo_open(struct inode
*inode
, struct file
*file
)
309 return mounts_open_common(inode
, file
, show_mountinfo
);
312 static int mountstats_open(struct inode
*inode
, struct file
*file
)
314 return mounts_open_common(inode
, file
, show_vfsstat
);
317 const struct file_operations proc_mounts_operations
= {
319 .read_iter
= seq_read_iter
,
320 .splice_read
= copy_splice_read
,
322 .release
= mounts_release
,
326 const struct file_operations proc_mountinfo_operations
= {
327 .open
= mountinfo_open
,
328 .read_iter
= seq_read_iter
,
329 .splice_read
= copy_splice_read
,
331 .release
= mounts_release
,
335 const struct file_operations proc_mountstats_operations
= {
336 .open
= mountstats_open
,
337 .read_iter
= seq_read_iter
,
338 .splice_read
= copy_splice_read
,
340 .release
= mounts_release
,