Commit 5dfbfe71 authored by Linus Torvalds's avatar Linus Torvalds
Browse files
Pull fs idmapping updates from Christian Brauner:
 "This contains the work to enable the idmapping infrastructure to
  support idmapped mounts of filesystems mounted with an idmapping.

  In addition this contains various cleanups that avoid repeated
  open-coding of the same functionality and simplify the code in quite a
  few places.

  We also finish the renaming of the mapping helpers we started a few
  kernel releases back and move them to a dedicated header to not
  continue polluting the fs header needlessly with low-level idmapping
  helpers. With this series the fs header only contains idmapping
  helpers that interact with fs objects.

  Currently we only support idmapped mounts for filesystems mounted
  without an idmapping themselves. This was a conscious decision
  mentioned in multiple places (cf. [1]).

  As explained at length in [3] it is perfectly fine to extend support
  for idmapped mounts to filesystem's mounted with an idmapping should
  the need arise. The need has been there for some time now (cf. [2]).

  Before we can port any filesystem that is mountable with an idmapping
  to support idmapped mounts in the coming cycles, we need to first
  extend the mapping helpers to account for the filesystem's idmapping.
  This again, is explained at length in our documentation at [3] and
  also in the individual commit messages so here's an overview.

  Currently, the low-level mapping helpers implement the remapping
  algorithms described in [3] in a simplified manner as we could rely on
  the fact that all filesystems supporting idmapped mounts are mounted
  without an idmapping.

  In contrast, filesystems mounted with an idmapping are very likely to
  not use an identity mapping and will instead use a non-identity
  mapping. So the translation step from or into the filesystem's
  idmapping in the remapping algorithm cannot be skipped for such
  filesystems.

  Non-idmapped filesystems and filesystems not supporting idmapped
  mounts are unaffected by this change as the remapping algorithms can
  take the same shortcut as before. If the low-level helpers detect that
  they are dealing with an idmapped mount but the underlying filesystem
  is mounted without an idmapping we can rely on the previous shortcut
  and can continue to skip the translation step from or into the
  filesystem's idmapping. And of course, if the low-level helpers detect
  that they are not dealing with an idmapped mount they can simply
  return the relevant id unchanged; no remapping needs to be performed
  at all.

  These checks guarantee that only the minimal amount of work is
  performed. As before, if idmapped mounts aren't used the low-level
  helpers are idempotent and no work is performed at all"

Link: 2ca4dcc4 ("fs/mount_setattr: tighten permission checks") [1]
Link: https://github.com/containers/podman/issues/10374 [2]
Link: Documentations/filesystems/idmappings.rst [3]
Link: a65e58e7 ("fs: document and rename fsid helpers") [4]

* tag 'fs.idmapped.v5.17' of git://git.kernel.org/pub/scm/linux/kernel/git/brauner/linux:
  fs: support mapped mounts of mapped filesystems
  fs: add i_user_ns() helper
  fs: port higher-level mapping helpers
  fs: remove unused low-level mapping helpers
  fs: use low-level mapping helpers
  docs: update mapping documentation
  fs: account for filesystem mappings
  fs: tweak fsuidgid_has_mapping()
  fs: move mapping helpers
  fs: add is_idmapped_mnt() helper
parents 84bfcc0b bd303368
Loading
Loading
Loading
Loading
+0 −72
Original line number Original line Diff line number Diff line
@@ -952,75 +952,3 @@ The raw userspace id that is put on disk is ``u1000`` so when the user takes
their home directory back to their home computer where they are assigned
their home directory back to their home computer where they are assigned
``u1000`` using the initial idmapping and mount the filesystem with the initial
``u1000`` using the initial idmapping and mount the filesystem with the initial
idmapping they will see all those files owned by ``u1000``.
idmapping they will see all those files owned by ``u1000``.

Shortcircuting
--------------

Currently, the implementation of idmapped mounts enforces that the filesystem
is mounted with the initial idmapping. The reason is simply that none of the
filesystems that we targeted were mountable with a non-initial idmapping. But
that might change soon enough. As we've seen above, thanks to the properties of
idmappings the translation works for both filesystems mounted with the initial
idmapping and filesystem with non-initial idmappings.

Based on this current restriction to filesystem mounted with the initial
idmapping two noticeable shortcuts have been taken:

1. We always stash a reference to the initial user namespace in ``struct
   vfsmount``. Idmapped mounts are thus mounts that have a non-initial user
   namespace attached to them.

   In order to support idmapped mounts this needs to be changed. Instead of
   stashing the initial user namespace the user namespace the filesystem was
   mounted with must be stashed. An idmapped mount is then any mount that has
   a different user namespace attached then the filesystem was mounted with.
   This has no user-visible consequences.

2. The translation algorithms in ``mapped_fs*id()`` and ``i_*id_into_mnt()``
   are simplified.

   Let's consider ``mapped_fs*id()`` first. This function translates the
   caller's kernel id into a kernel id in the filesystem's idmapping via
   a mount's idmapping. The full algorithm is::

    mapped_fsuid(kid):
      /* Map the kernel id up into a userspace id in the mount's idmapping. */
      from_kuid(mount-idmapping, kid) = uid

      /* Map the userspace id down into a kernel id in the filesystem's idmapping. */
      make_kuid(filesystem-idmapping, uid) = kuid

   We know that the filesystem is always mounted with the initial idmapping as
   we enforce this in ``mount_setattr()``. So this can be shortened to::

    mapped_fsuid(kid):
      /* Map the kernel id up into a userspace id in the mount's idmapping. */
      from_kuid(mount-idmapping, kid) = uid

      /* Map the userspace id down into a kernel id in the filesystem's idmapping. */
      KUIDT_INIT(uid) = kuid

   Similarly, for ``i_*id_into_mnt()`` which translated the filesystem's kernel
   id into a mount's kernel id::

    i_uid_into_mnt(kid):
      /* Map the kernel id up into a userspace id in the filesystem's idmapping. */
      from_kuid(filesystem-idmapping, kid) = uid

      /* Map the userspace id down into a kernel id in the mounts's idmapping. */
      make_kuid(mount-idmapping, uid) = kuid

   Again, we know that the filesystem is always mounted with the initial
   idmapping as we enforce this in ``mount_setattr()``. So this can be
   shortened to::

    i_uid_into_mnt(kid):
      /* Map the kernel id up into a userspace id in the filesystem's idmapping. */
      __kuid_val(kid) = uid

      /* Map the userspace id down into a kernel id in the mounts's idmapping. */
      make_kuid(mount-idmapping, uid) = kuid

Handling filesystems mounted with non-initial idmappings requires that the
translation functions be converted to their full form. They can still be
shortcircuited on non-idmapped mounts. This has no user-visible consequences.
+1 −1
Original line number Original line Diff line number Diff line
@@ -117,7 +117,7 @@ static int cachefiles_daemon_add_cache(struct cachefiles_cache *cache)
	root = path.dentry;
	root = path.dentry;


	ret = -EINVAL;
	ret = -EINVAL;
	if (mnt_user_ns(path.mnt) != &init_user_ns) {
	if (is_idmapped_mnt(path.mnt)) {
		pr_warn("File cache on idmapped mounts not supported");
		pr_warn("File cache on idmapped mounts not supported");
		goto error_unsupported;
		goto error_unsupported;
	}
	}
+1 −1
Original line number Original line Diff line number Diff line
@@ -537,7 +537,7 @@ static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags
		goto out_free;
		goto out_free;
	}
	}


	if (mnt_user_ns(path.mnt) != &init_user_ns) {
	if (is_idmapped_mnt(path.mnt)) {
		rc = -EINVAL;
		rc = -EINVAL;
		printk(KERN_ERR "Mounting on idmapped mounts currently disallowed\n");
		printk(KERN_ERR "Mounting on idmapped mounts currently disallowed\n");
		goto out_free;
		goto out_free;
+3 −16
Original line number Original line Diff line number Diff line
@@ -9,6 +9,7 @@
#include <linux/fs.h>
#include <linux/fs.h>
#include <linux/slab.h>
#include <linux/slab.h>
#include <linux/string.h>
#include <linux/string.h>
#include <linux/mnt_idmapping.h>


#include "smbacl.h"
#include "smbacl.h"
#include "smb_common.h"
#include "smb_common.h"
@@ -274,14 +275,7 @@ static int sid_to_id(struct user_namespace *user_ns,
		uid_t id;
		uid_t id;


		id = le32_to_cpu(psid->sub_auth[psid->num_subauth - 1]);
		id = le32_to_cpu(psid->sub_auth[psid->num_subauth - 1]);
		/*
		uid = mapped_kuid_user(user_ns, &init_user_ns, KUIDT_INIT(id));
		 * Translate raw sid into kuid in the server's user
		 * namespace.
		 */
		uid = make_kuid(&init_user_ns, id);

		/* If this is an idmapped mount, apply the idmapping. */
		uid = kuid_from_mnt(user_ns, uid);
		if (uid_valid(uid)) {
		if (uid_valid(uid)) {
			fattr->cf_uid = uid;
			fattr->cf_uid = uid;
			rc = 0;
			rc = 0;
@@ -291,14 +285,7 @@ static int sid_to_id(struct user_namespace *user_ns,
		gid_t id;
		gid_t id;


		id = le32_to_cpu(psid->sub_auth[psid->num_subauth - 1]);
		id = le32_to_cpu(psid->sub_auth[psid->num_subauth - 1]);
		/*
		gid = mapped_kgid_user(user_ns, &init_user_ns, KGIDT_INIT(id));
		 * Translate raw sid into kgid in the server's user
		 * namespace.
		 */
		gid = make_kgid(&init_user_ns, id);

		/* If this is an idmapped mount, apply the idmapping. */
		gid = kgid_from_mnt(user_ns, gid);
		if (gid_valid(gid)) {
		if (gid_valid(gid)) {
			fattr->cf_gid = gid;
			fattr->cf_gid = gid;
			rc = 0;
			rc = 0;
+3 −2
Original line number Original line Diff line number Diff line
@@ -11,6 +11,7 @@
#include <linux/fs.h>
#include <linux/fs.h>
#include <linux/namei.h>
#include <linux/namei.h>
#include <linux/posix_acl.h>
#include <linux/posix_acl.h>
#include <linux/mnt_idmapping.h>


#include "mgmt/tree_connect.h"
#include "mgmt/tree_connect.h"


@@ -216,7 +217,7 @@ static inline uid_t posix_acl_uid_translate(struct user_namespace *mnt_userns,
	kuid_t kuid;
	kuid_t kuid;


	/* If this is an idmapped mount, apply the idmapping. */
	/* If this is an idmapped mount, apply the idmapping. */
	kuid = kuid_into_mnt(mnt_userns, pace->e_uid);
	kuid = mapped_kuid_fs(mnt_userns, &init_user_ns, pace->e_uid);


	/* Translate the kuid into a userspace id ksmbd would see. */
	/* Translate the kuid into a userspace id ksmbd would see. */
	return from_kuid(&init_user_ns, kuid);
	return from_kuid(&init_user_ns, kuid);
@@ -228,7 +229,7 @@ static inline gid_t posix_acl_gid_translate(struct user_namespace *mnt_userns,
	kgid_t kgid;
	kgid_t kgid;


	/* If this is an idmapped mount, apply the idmapping. */
	/* If this is an idmapped mount, apply the idmapping. */
	kgid = kgid_into_mnt(mnt_userns, pace->e_gid);
	kgid = mapped_kgid_fs(mnt_userns, &init_user_ns, pace->e_gid);


	/* Translate the kgid into a userspace id ksmbd would see. */
	/* Translate the kgid into a userspace id ksmbd would see. */
	return from_kgid(&init_user_ns, kgid);
	return from_kgid(&init_user_ns, kgid);
Loading