Commit bd303368 authored by Christian Brauner's avatar Christian Brauner

fs: support mapped mounts of mapped filesystems

In previous patches we added new and modified existing helpers to handle
idmapped mounts of filesystems mounted with an idmapping. In this final
patch we convert all relevant places in the vfs to actually pass the
filesystem's idmapping into these helpers.

With this the vfs is in shape to handle idmapped mounts of filesystems
mounted with an idmapping. Note that this is just the generic
infrastructure. Actually adding support for idmapped mounts to a
filesystem mountable with an idmapping is follow-up work.

In this patch we extend the definition of an idmapped mount from a mount
that that has the initial idmapping attached to it to a mount that has
an idmapping attached to it which is not the same as the idmapping the
filesystem was mounted with.

As before we do not allow the initial idmapping to be attached to a
mount. In addition this patch prevents that the idmapping the filesystem
was mounted with can be attached to a mount created based on this
filesystem.

This has multiple reasons and advantages. First, attaching the initial
idmapping or the filesystem's idmapping doesn't make much sense as in
both cases the values of the i_{g,u}id and other places where k{g,u}ids
are used do not change. Second, a user that really wants to do this for
whatever reason can just create a separate dedicated identical idmapping
to attach to the mount. Third, we can continue to use the initial
idmapping as an indicator that a mount is not idmapped allowing us to
continue to keep passing the initial idmapping into the mapping helpers
to tell them that something isn't an idmapped mount even if the
filesystem is mounted with an idmapping.

Link: https://lore.kernel.org/r/20211123114227.3124056-11-brauner@kernel.org (v1)
Link: https://lore.kernel.org/r/20211130121032.3753852-11-brauner@kernel.org (v2)
Link: https://lore.kernel.org/r/20211203111707.3901969-11-brauner@kernel.org
Cc: Seth Forshee <sforshee@digitalocean.com>
Cc: Amir Goldstein <amir73il@gmail.com>
Cc: Christoph Hellwig <hch@lst.de>
Cc: Al Viro <viro@zeniv.linux.org.uk>
CC: linux-fsdevel@vger.kernel.org
Reviewed-by: default avatarSeth Forshee <sforshee@digitalocean.com>
Signed-off-by: default avatarChristian Brauner <christian.brauner@ubuntu.com>
parent a1ec9040
...@@ -31,6 +31,7 @@ ...@@ -31,6 +31,7 @@
#include <uapi/linux/mount.h> #include <uapi/linux/mount.h>
#include <linux/fs_context.h> #include <linux/fs_context.h>
#include <linux/shmem_fs.h> #include <linux/shmem_fs.h>
#include <linux/mnt_idmapping.h>
#include "pnode.h" #include "pnode.h"
#include "internal.h" #include "internal.h"
...@@ -561,7 +562,7 @@ static void free_vfsmnt(struct mount *mnt) ...@@ -561,7 +562,7 @@ static void free_vfsmnt(struct mount *mnt)
struct user_namespace *mnt_userns; struct user_namespace *mnt_userns;
mnt_userns = mnt_user_ns(&mnt->mnt); mnt_userns = mnt_user_ns(&mnt->mnt);
if (mnt_userns != &init_user_ns) if (!initial_idmapping(mnt_userns))
put_user_ns(mnt_userns); put_user_ns(mnt_userns);
kfree_const(mnt->mnt_devname); kfree_const(mnt->mnt_devname);
#ifdef CONFIG_SMP #ifdef CONFIG_SMP
...@@ -965,6 +966,7 @@ static struct mount *skip_mnt_tree(struct mount *p) ...@@ -965,6 +966,7 @@ static struct mount *skip_mnt_tree(struct mount *p)
struct vfsmount *vfs_create_mount(struct fs_context *fc) struct vfsmount *vfs_create_mount(struct fs_context *fc)
{ {
struct mount *mnt; struct mount *mnt;
struct user_namespace *fs_userns;
if (!fc->root) if (!fc->root)
return ERR_PTR(-EINVAL); return ERR_PTR(-EINVAL);
...@@ -982,6 +984,10 @@ struct vfsmount *vfs_create_mount(struct fs_context *fc) ...@@ -982,6 +984,10 @@ struct vfsmount *vfs_create_mount(struct fs_context *fc)
mnt->mnt_mountpoint = mnt->mnt.mnt_root; mnt->mnt_mountpoint = mnt->mnt.mnt_root;
mnt->mnt_parent = mnt; mnt->mnt_parent = mnt;
fs_userns = mnt->mnt.mnt_sb->s_user_ns;
if (!initial_idmapping(fs_userns))
mnt->mnt.mnt_userns = get_user_ns(fs_userns);
lock_mount_hash(); lock_mount_hash();
list_add_tail(&mnt->mnt_instance, &mnt->mnt.mnt_sb->s_mounts); list_add_tail(&mnt->mnt_instance, &mnt->mnt.mnt_sb->s_mounts);
unlock_mount_hash(); unlock_mount_hash();
...@@ -1072,7 +1078,7 @@ static struct mount *clone_mnt(struct mount *old, struct dentry *root, ...@@ -1072,7 +1078,7 @@ static struct mount *clone_mnt(struct mount *old, struct dentry *root,
atomic_inc(&sb->s_active); atomic_inc(&sb->s_active);
mnt->mnt.mnt_userns = mnt_user_ns(&old->mnt); mnt->mnt.mnt_userns = mnt_user_ns(&old->mnt);
if (mnt->mnt.mnt_userns != &init_user_ns) if (!initial_idmapping(mnt->mnt.mnt_userns))
mnt->mnt.mnt_userns = get_user_ns(mnt->mnt.mnt_userns); mnt->mnt.mnt_userns = get_user_ns(mnt->mnt.mnt_userns);
mnt->mnt.mnt_sb = sb; mnt->mnt.mnt_sb = sb;
mnt->mnt.mnt_root = dget(root); mnt->mnt.mnt_root = dget(root);
...@@ -3927,10 +3933,18 @@ static unsigned int recalc_flags(struct mount_kattr *kattr, struct mount *mnt) ...@@ -3927,10 +3933,18 @@ static unsigned int recalc_flags(struct mount_kattr *kattr, struct mount *mnt)
static int can_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt) static int can_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt)
{ {
struct vfsmount *m = &mnt->mnt; struct vfsmount *m = &mnt->mnt;
struct user_namespace *fs_userns = m->mnt_sb->s_user_ns;
if (!kattr->mnt_userns) if (!kattr->mnt_userns)
return 0; return 0;
/*
* Creating an idmapped mount with the filesystem wide idmapping
* doesn't make sense so block that. We don't allow mushy semantics.
*/
if (kattr->mnt_userns == fs_userns)
return -EINVAL;
/* /*
* Once a mount has been idmapped we don't allow it to change its * Once a mount has been idmapped we don't allow it to change its
* mapping. It makes things simpler and callers can just create * mapping. It makes things simpler and callers can just create
...@@ -3943,12 +3957,8 @@ static int can_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt) ...@@ -3943,12 +3957,8 @@ static int can_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt)
if (!(m->mnt_sb->s_type->fs_flags & FS_ALLOW_IDMAP)) if (!(m->mnt_sb->s_type->fs_flags & FS_ALLOW_IDMAP))
return -EINVAL; return -EINVAL;
/* Don't yet support filesystem mountable in user namespaces. */
if (m->mnt_sb->s_user_ns != &init_user_ns)
return -EINVAL;
/* We're not controlling the superblock. */ /* We're not controlling the superblock. */
if (!capable(CAP_SYS_ADMIN)) if (!ns_capable(fs_userns, CAP_SYS_ADMIN))
return -EPERM; return -EPERM;
/* Mount has already been visible in the filesystem hierarchy. */ /* Mount has already been visible in the filesystem hierarchy. */
...@@ -4002,14 +4012,27 @@ static struct mount *mount_setattr_prepare(struct mount_kattr *kattr, ...@@ -4002,14 +4012,27 @@ static struct mount *mount_setattr_prepare(struct mount_kattr *kattr,
static void do_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt) static void do_idmap_mount(const struct mount_kattr *kattr, struct mount *mnt)
{ {
struct user_namespace *mnt_userns; struct user_namespace *mnt_userns, *old_mnt_userns;
if (!kattr->mnt_userns) if (!kattr->mnt_userns)
return; return;
/*
* We're the only ones able to change the mount's idmapping. So
* mnt->mnt.mnt_userns is stable and we can retrieve it directly.
*/
old_mnt_userns = mnt->mnt.mnt_userns;
mnt_userns = get_user_ns(kattr->mnt_userns); mnt_userns = get_user_ns(kattr->mnt_userns);
/* Pairs with smp_load_acquire() in mnt_user_ns(). */ /* Pairs with smp_load_acquire() in mnt_user_ns(). */
smp_store_release(&mnt->mnt.mnt_userns, mnt_userns); smp_store_release(&mnt->mnt.mnt_userns, mnt_userns);
/*
* If this is an idmapped filesystem drop the reference we've taken
* in vfs_create_mount() before.
*/
if (!initial_idmapping(old_mnt_userns))
put_user_ns(old_mnt_userns);
} }
static void mount_setattr_commit(struct mount_kattr *kattr, static void mount_setattr_commit(struct mount_kattr *kattr,
...@@ -4133,13 +4156,15 @@ static int build_mount_idmapped(const struct mount_attr *attr, size_t usize, ...@@ -4133,13 +4156,15 @@ static int build_mount_idmapped(const struct mount_attr *attr, size_t usize,
} }
/* /*
* The init_user_ns is used to indicate that a vfsmount is not idmapped. * The initial idmapping cannot be used to create an idmapped
* This is simpler than just having to treat NULL as unmapped. Users * mount. We use the initial idmapping as an indicator of a mount
* wanting to idmap a mount to init_user_ns can just use a namespace * that is not idmapped. It can simply be passed into helpers that
* with an identity mapping. * are aware of idmapped mounts as a convenient shortcut. A user
* can just create a dedicated identity mapping to achieve the same
* result.
*/ */
mnt_userns = container_of(ns, struct user_namespace, ns); mnt_userns = container_of(ns, struct user_namespace, ns);
if (mnt_userns == &init_user_ns) { if (initial_idmapping(mnt_userns)) {
err = -EPERM; err = -EPERM;
goto out_fput; goto out_fput;
} }
......
...@@ -641,7 +641,7 @@ SYSCALL_DEFINE2(chmod, const char __user *, filename, umode_t, mode) ...@@ -641,7 +641,7 @@ SYSCALL_DEFINE2(chmod, const char __user *, filename, umode_t, mode)
int chown_common(const struct path *path, uid_t user, gid_t group) int chown_common(const struct path *path, uid_t user, gid_t group)
{ {
struct user_namespace *mnt_userns; struct user_namespace *mnt_userns, *fs_userns;
struct inode *inode = path->dentry->d_inode; struct inode *inode = path->dentry->d_inode;
struct inode *delegated_inode = NULL; struct inode *delegated_inode = NULL;
int error; int error;
...@@ -653,8 +653,9 @@ int chown_common(const struct path *path, uid_t user, gid_t group) ...@@ -653,8 +653,9 @@ int chown_common(const struct path *path, uid_t user, gid_t group)
gid = make_kgid(current_user_ns(), group); gid = make_kgid(current_user_ns(), group);
mnt_userns = mnt_user_ns(path->mnt); mnt_userns = mnt_user_ns(path->mnt);
uid = mapped_kuid_user(mnt_userns, &init_user_ns, uid); fs_userns = i_user_ns(inode);
gid = mapped_kgid_user(mnt_userns, &init_user_ns, gid); uid = mapped_kuid_user(mnt_userns, fs_userns, uid);
gid = mapped_kgid_user(mnt_userns, fs_userns, gid);
retry_deleg: retry_deleg:
newattrs.ia_valid = ATTR_CTIME; newattrs.ia_valid = ATTR_CTIME;
......
...@@ -376,7 +376,7 @@ posix_acl_permission(struct user_namespace *mnt_userns, struct inode *inode, ...@@ -376,7 +376,7 @@ posix_acl_permission(struct user_namespace *mnt_userns, struct inode *inode,
break; break;
case ACL_USER: case ACL_USER:
uid = mapped_kuid_fs(mnt_userns, uid = mapped_kuid_fs(mnt_userns,
&init_user_ns, i_user_ns(inode),
pa->e_uid); pa->e_uid);
if (uid_eq(uid, current_fsuid())) if (uid_eq(uid, current_fsuid()))
goto mask; goto mask;
...@@ -391,7 +391,7 @@ posix_acl_permission(struct user_namespace *mnt_userns, struct inode *inode, ...@@ -391,7 +391,7 @@ posix_acl_permission(struct user_namespace *mnt_userns, struct inode *inode,
break; break;
case ACL_GROUP: case ACL_GROUP:
gid = mapped_kgid_fs(mnt_userns, gid = mapped_kgid_fs(mnt_userns,
&init_user_ns, i_user_ns(inode),
pa->e_gid); pa->e_gid);
if (in_group_p(gid)) { if (in_group_p(gid)) {
found = 1; found = 1;
......
...@@ -1641,7 +1641,7 @@ static inline void i_gid_write(struct inode *inode, gid_t gid) ...@@ -1641,7 +1641,7 @@ static inline void i_gid_write(struct inode *inode, gid_t gid)
static inline kuid_t i_uid_into_mnt(struct user_namespace *mnt_userns, static inline kuid_t i_uid_into_mnt(struct user_namespace *mnt_userns,
const struct inode *inode) const struct inode *inode)
{ {
return mapped_kuid_fs(mnt_userns, &init_user_ns, inode->i_uid); return mapped_kuid_fs(mnt_userns, i_user_ns(inode), inode->i_uid);
} }
/** /**
...@@ -1655,7 +1655,7 @@ static inline kuid_t i_uid_into_mnt(struct user_namespace *mnt_userns, ...@@ -1655,7 +1655,7 @@ static inline kuid_t i_uid_into_mnt(struct user_namespace *mnt_userns,
static inline kgid_t i_gid_into_mnt(struct user_namespace *mnt_userns, static inline kgid_t i_gid_into_mnt(struct user_namespace *mnt_userns,
const struct inode *inode) const struct inode *inode)
{ {
return mapped_kgid_fs(mnt_userns, &init_user_ns, inode->i_gid); return mapped_kgid_fs(mnt_userns, i_user_ns(inode), inode->i_gid);
} }
/** /**
...@@ -1669,7 +1669,7 @@ static inline kgid_t i_gid_into_mnt(struct user_namespace *mnt_userns, ...@@ -1669,7 +1669,7 @@ static inline kgid_t i_gid_into_mnt(struct user_namespace *mnt_userns,
static inline void inode_fsuid_set(struct inode *inode, static inline void inode_fsuid_set(struct inode *inode,
struct user_namespace *mnt_userns) struct user_namespace *mnt_userns)
{ {
inode->i_uid = mapped_fsuid(mnt_userns, &init_user_ns); inode->i_uid = mapped_fsuid(mnt_userns, i_user_ns(inode));
} }
/** /**
...@@ -1683,7 +1683,7 @@ static inline void inode_fsuid_set(struct inode *inode, ...@@ -1683,7 +1683,7 @@ static inline void inode_fsuid_set(struct inode *inode,
static inline void inode_fsgid_set(struct inode *inode, static inline void inode_fsgid_set(struct inode *inode,
struct user_namespace *mnt_userns) struct user_namespace *mnt_userns)
{ {
inode->i_gid = mapped_fsgid(mnt_userns, &init_user_ns); inode->i_gid = mapped_fsgid(mnt_userns, i_user_ns(inode));
} }
/** /**
...@@ -1704,10 +1704,10 @@ static inline bool fsuidgid_has_mapping(struct super_block *sb, ...@@ -1704,10 +1704,10 @@ static inline bool fsuidgid_has_mapping(struct super_block *sb,
kuid_t kuid; kuid_t kuid;
kgid_t kgid; kgid_t kgid;
kuid = mapped_fsuid(mnt_userns, &init_user_ns); kuid = mapped_fsuid(mnt_userns, fs_userns);
if (!uid_valid(kuid)) if (!uid_valid(kuid))
return false; return false;
kgid = mapped_fsgid(mnt_userns, &init_user_ns); kgid = mapped_fsgid(mnt_userns, fs_userns);
if (!gid_valid(kgid)) if (!gid_valid(kgid))
return false; return false;
return kuid_has_mapping(fs_userns, kuid) && return kuid_has_mapping(fs_userns, kuid) &&
...@@ -2653,13 +2653,14 @@ static inline struct user_namespace *file_mnt_user_ns(struct file *file) ...@@ -2653,13 +2653,14 @@ static inline struct user_namespace *file_mnt_user_ns(struct file *file)
* is_idmapped_mnt - check whether a mount is mapped * is_idmapped_mnt - check whether a mount is mapped
* @mnt: the mount to check * @mnt: the mount to check
* *
* If @mnt has an idmapping attached to it @mnt is mapped. * If @mnt has an idmapping attached different from the
* filesystem's idmapping then @mnt is mapped.
* *
* Return: true if mount is mapped, false if not. * Return: true if mount is mapped, false if not.
*/ */
static inline bool is_idmapped_mnt(const struct vfsmount *mnt) static inline bool is_idmapped_mnt(const struct vfsmount *mnt)
{ {
return mnt_user_ns(mnt) != &init_user_ns; return mnt_user_ns(mnt) != mnt->mnt_sb->s_user_ns;
} }
extern long vfs_truncate(const struct path *, loff_t); extern long vfs_truncate(const struct path *, loff_t);
......
...@@ -419,7 +419,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, ...@@ -419,7 +419,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns,
kroot = make_kuid(fs_ns, root); kroot = make_kuid(fs_ns, root);
/* If this is an idmapped mount shift the kuid. */ /* If this is an idmapped mount shift the kuid. */
kroot = mapped_kuid_fs(mnt_userns, &init_user_ns, kroot); kroot = mapped_kuid_fs(mnt_userns, fs_ns, kroot);
/* If the root kuid maps to a valid uid in current ns, then return /* If the root kuid maps to a valid uid in current ns, then return
* this as a nscap. */ * this as a nscap. */
...@@ -556,13 +556,12 @@ int cap_convert_nscap(struct user_namespace *mnt_userns, struct dentry *dentry, ...@@ -556,13 +556,12 @@ int cap_convert_nscap(struct user_namespace *mnt_userns, struct dentry *dentry,
return -EINVAL; return -EINVAL;
if (!capable_wrt_inode_uidgid(mnt_userns, inode, CAP_SETFCAP)) if (!capable_wrt_inode_uidgid(mnt_userns, inode, CAP_SETFCAP))
return -EPERM; return -EPERM;
if (size == XATTR_CAPS_SZ_2 && (mnt_userns == &init_user_ns)) if (size == XATTR_CAPS_SZ_2 && (mnt_userns == fs_ns))
if (ns_capable(inode->i_sb->s_user_ns, CAP_SETFCAP)) if (ns_capable(inode->i_sb->s_user_ns, CAP_SETFCAP))
/* user is privileged, just write the v2 */ /* user is privileged, just write the v2 */
return size; return size;
rootid = rootid_from_xattr(*ivalue, size, task_ns, mnt_userns, rootid = rootid_from_xattr(*ivalue, size, task_ns, mnt_userns, fs_ns);
&init_user_ns);
if (!uid_valid(rootid)) if (!uid_valid(rootid))
return -EINVAL; return -EINVAL;
...@@ -703,7 +702,7 @@ int get_vfs_caps_from_disk(struct user_namespace *mnt_userns, ...@@ -703,7 +702,7 @@ int get_vfs_caps_from_disk(struct user_namespace *mnt_userns,
/* Limit the caps to the mounter of the filesystem /* Limit the caps to the mounter of the filesystem
* or the more limited uid specified in the xattr. * or the more limited uid specified in the xattr.
*/ */
rootkuid = mapped_kuid_fs(mnt_userns, &init_user_ns, rootkuid); rootkuid = mapped_kuid_fs(mnt_userns, fs_ns, rootkuid);
if (!rootid_owns_currentns(rootkuid)) if (!rootid_owns_currentns(rootkuid))
return -ENODATA; return -ENODATA;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment