Skip to content

Commit 9020d0d

Browse files
committed
Merge tag 'vfs-6.12.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs
Pull vfs mount updates from Christian Brauner: "Recently, we added the ability to list mounts in other mount namespaces and the ability to retrieve namespace file descriptors without having to go through procfs by deriving them from pidfds. This extends nsfs in two ways: (1) Add the ability to retrieve information about a mount namespace via NS_MNT_GET_INFO. This will return the mount namespace id and the number of mounts currently in the mount namespace. The number of mounts can be used to size the buffer that needs to be used for listmount() and is in general useful without having to actually iterate through all the mounts. The structure is extensible. (2) Add the ability to iterate through all mount namespaces over which the caller holds privilege returning the file descriptor for the next or previous mount namespace. To retrieve a mount namespace the caller must be privileged wrt to it's owning user namespace. This means that PID 1 on the host can list all mounts in all mount namespaces or that a container can list all mounts of its nested containers. Optionally pass a structure for NS_MNT_GET_INFO with NS_MNT_GET_{PREV,NEXT} to retrieve information about the mount namespace in one go. (1) and (2) can be implemented for other namespace types easily. Together with recent api additions this means one can iterate through all mounts in all mount namespaces without ever touching procfs. The commit message in 49224a3 ('Merge patch series "nsfs: iterate through mount namespaces"') contains example code how to do this" * tag 'vfs-6.12.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs: nsfs: iterate through mount namespaces file: add fput() cleanup helper fs: add put_mnt_ns() cleanup helper fs: allow mount namespace fd
2 parents e8fc317 + 49224a3 commit 9020d0d

File tree

6 files changed

+197
-13
lines changed

6 files changed

+197
-13
lines changed

fs/mount.h

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -154,3 +154,16 @@ static inline void move_from_ns(struct mount *mnt, struct list_head *dt_list)
154154
}
155155

156156
bool has_locked_children(struct mount *mnt, struct dentry *dentry);
157+
struct mnt_namespace *__lookup_next_mnt_ns(struct mnt_namespace *mnt_ns, bool previous);
158+
static inline struct mnt_namespace *lookup_next_mnt_ns(struct mnt_namespace *mntns)
159+
{
160+
return __lookup_next_mnt_ns(mntns, false);
161+
}
162+
static inline struct mnt_namespace *lookup_prev_mnt_ns(struct mnt_namespace *mntns)
163+
{
164+
return __lookup_next_mnt_ns(mntns, true);
165+
}
166+
static inline struct mnt_namespace *to_mnt_ns(struct ns_common *ns)
167+
{
168+
return container_of(ns, struct mnt_namespace, ns);
169+
}

fs/namespace.c

Lines changed: 63 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2060,14 +2060,41 @@ static bool is_mnt_ns_file(struct dentry *dentry)
20602060
dentry->d_fsdata == &mntns_operations;
20612061
}
20622062

2063-
static struct mnt_namespace *to_mnt_ns(struct ns_common *ns)
2063+
struct ns_common *from_mnt_ns(struct mnt_namespace *mnt)
20642064
{
2065-
return container_of(ns, struct mnt_namespace, ns);
2065+
return &mnt->ns;
20662066
}
20672067

2068-
struct ns_common *from_mnt_ns(struct mnt_namespace *mnt)
2068+
struct mnt_namespace *__lookup_next_mnt_ns(struct mnt_namespace *mntns, bool previous)
20692069
{
2070-
return &mnt->ns;
2070+
guard(read_lock)(&mnt_ns_tree_lock);
2071+
for (;;) {
2072+
struct rb_node *node;
2073+
2074+
if (previous)
2075+
node = rb_prev(&mntns->mnt_ns_tree_node);
2076+
else
2077+
node = rb_next(&mntns->mnt_ns_tree_node);
2078+
if (!node)
2079+
return ERR_PTR(-ENOENT);
2080+
2081+
mntns = node_to_mnt_ns(node);
2082+
node = &mntns->mnt_ns_tree_node;
2083+
2084+
if (!ns_capable_noaudit(mntns->user_ns, CAP_SYS_ADMIN))
2085+
continue;
2086+
2087+
/*
2088+
* Holding mnt_ns_tree_lock prevents the mount namespace from
2089+
* being freed but it may well be on it's deathbed. We want an
2090+
* active reference, not just a passive one here as we're
2091+
* persisting the mount namespace.
2092+
*/
2093+
if (!refcount_inc_not_zero(&mntns->ns.count))
2094+
continue;
2095+
2096+
return mntns;
2097+
}
20712098
}
20722099

20732100
static bool mnt_ns_loop(struct dentry *dentry)
@@ -5251,12 +5278,37 @@ static int copy_mnt_id_req(const struct mnt_id_req __user *req,
52515278
* that, or if not simply grab a passive reference on our mount namespace and
52525279
* return that.
52535280
*/
5254-
static struct mnt_namespace *grab_requested_mnt_ns(u64 mnt_ns_id)
5281+
static struct mnt_namespace *grab_requested_mnt_ns(const struct mnt_id_req *kreq)
52555282
{
5256-
if (mnt_ns_id)
5257-
return lookup_mnt_ns(mnt_ns_id);
5258-
refcount_inc(&current->nsproxy->mnt_ns->passive);
5259-
return current->nsproxy->mnt_ns;
5283+
struct mnt_namespace *mnt_ns;
5284+
5285+
if (kreq->mnt_ns_id && kreq->spare)
5286+
return ERR_PTR(-EINVAL);
5287+
5288+
if (kreq->mnt_ns_id)
5289+
return lookup_mnt_ns(kreq->mnt_ns_id);
5290+
5291+
if (kreq->spare) {
5292+
struct ns_common *ns;
5293+
5294+
CLASS(fd, f)(kreq->spare);
5295+
if (!f.file)
5296+
return ERR_PTR(-EBADF);
5297+
5298+
if (!proc_ns_file(f.file))
5299+
return ERR_PTR(-EINVAL);
5300+
5301+
ns = get_proc_ns(file_inode(f.file));
5302+
if (ns->ops->type != CLONE_NEWNS)
5303+
return ERR_PTR(-EINVAL);
5304+
5305+
mnt_ns = to_mnt_ns(ns);
5306+
} else {
5307+
mnt_ns = current->nsproxy->mnt_ns;
5308+
}
5309+
5310+
refcount_inc(&mnt_ns->passive);
5311+
return mnt_ns;
52605312
}
52615313

52625314
SYSCALL_DEFINE4(statmount, const struct mnt_id_req __user *, req,
@@ -5277,7 +5329,7 @@ SYSCALL_DEFINE4(statmount, const struct mnt_id_req __user *, req,
52775329
if (ret)
52785330
return ret;
52795331

5280-
ns = grab_requested_mnt_ns(kreq.mnt_ns_id);
5332+
ns = grab_requested_mnt_ns(&kreq);
52815333
if (!ns)
52825334
return -ENOENT;
52835335

@@ -5404,7 +5456,7 @@ SYSCALL_DEFINE4(listmount, const struct mnt_id_req __user *, req,
54045456
if (!kmnt_ids)
54055457
return -ENOMEM;
54065458

5407-
ns = grab_requested_mnt_ns(kreq.mnt_ns_id);
5459+
ns = grab_requested_mnt_ns(&kreq);
54085460
if (!ns)
54095461
return -ENOENT;
54105462

fs/nsfs.c

Lines changed: 100 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
#include <linux/user_namespace.h>
1313
#include <linux/nsfs.h>
1414
#include <linux/uaccess.h>
15+
#include <linux/mnt_namespace.h>
1516

1617
#include "mount.h"
1718
#include "internal.h"
@@ -128,13 +129,39 @@ int open_related_ns(struct ns_common *ns,
128129
}
129130
EXPORT_SYMBOL_GPL(open_related_ns);
130131

132+
static int copy_ns_info_to_user(const struct mnt_namespace *mnt_ns,
133+
struct mnt_ns_info __user *uinfo, size_t usize,
134+
struct mnt_ns_info *kinfo)
135+
{
136+
/*
137+
* If userspace and the kernel have the same struct size it can just
138+
* be copied. If userspace provides an older struct, only the bits that
139+
* userspace knows about will be copied. If userspace provides a new
140+
* struct, only the bits that the kernel knows aobut will be copied and
141+
* the size value will be set to the size the kernel knows about.
142+
*/
143+
kinfo->size = min(usize, sizeof(*kinfo));
144+
kinfo->mnt_ns_id = mnt_ns->seq;
145+
kinfo->nr_mounts = READ_ONCE(mnt_ns->nr_mounts);
146+
/* Subtract the root mount of the mount namespace. */
147+
if (kinfo->nr_mounts)
148+
kinfo->nr_mounts--;
149+
150+
if (copy_to_user(uinfo, kinfo, kinfo->size))
151+
return -EFAULT;
152+
153+
return 0;
154+
}
155+
131156
static long ns_ioctl(struct file *filp, unsigned int ioctl,
132157
unsigned long arg)
133158
{
134159
struct user_namespace *user_ns;
135160
struct pid_namespace *pid_ns;
136161
struct task_struct *tsk;
137162
struct ns_common *ns = get_proc_ns(file_inode(filp));
163+
struct mnt_namespace *mnt_ns;
164+
bool previous = false;
138165
uid_t __user *argp;
139166
uid_t uid;
140167
int ret;
@@ -156,7 +183,6 @@ static long ns_ioctl(struct file *filp, unsigned int ioctl,
156183
uid = from_kuid_munged(current_user_ns(), user_ns->owner);
157184
return put_user(uid, argp);
158185
case NS_GET_MNTNS_ID: {
159-
struct mnt_namespace *mnt_ns;
160186
__u64 __user *idp;
161187
__u64 id;
162188

@@ -211,7 +237,79 @@ static long ns_ioctl(struct file *filp, unsigned int ioctl,
211237

212238
if (!ret)
213239
ret = -ESRCH;
214-
break;
240+
return ret;
241+
}
242+
}
243+
244+
/* extensible ioctls */
245+
switch (_IOC_NR(ioctl)) {
246+
case _IOC_NR(NS_MNT_GET_INFO): {
247+
struct mnt_ns_info kinfo = {};
248+
struct mnt_ns_info __user *uinfo = (struct mnt_ns_info __user *)arg;
249+
size_t usize = _IOC_SIZE(ioctl);
250+
251+
if (ns->ops->type != CLONE_NEWNS)
252+
return -EINVAL;
253+
254+
if (!uinfo)
255+
return -EINVAL;
256+
257+
if (usize < MNT_NS_INFO_SIZE_VER0)
258+
return -EINVAL;
259+
260+
return copy_ns_info_to_user(to_mnt_ns(ns), uinfo, usize, &kinfo);
261+
}
262+
case _IOC_NR(NS_MNT_GET_PREV):
263+
previous = true;
264+
fallthrough;
265+
case _IOC_NR(NS_MNT_GET_NEXT): {
266+
struct mnt_ns_info kinfo = {};
267+
struct mnt_ns_info __user *uinfo = (struct mnt_ns_info __user *)arg;
268+
struct path path __free(path_put) = {};
269+
struct file *f __free(fput) = NULL;
270+
size_t usize = _IOC_SIZE(ioctl);
271+
272+
if (ns->ops->type != CLONE_NEWNS)
273+
return -EINVAL;
274+
275+
if (usize < MNT_NS_INFO_SIZE_VER0)
276+
return -EINVAL;
277+
278+
if (previous)
279+
mnt_ns = lookup_prev_mnt_ns(to_mnt_ns(ns));
280+
else
281+
mnt_ns = lookup_next_mnt_ns(to_mnt_ns(ns));
282+
if (IS_ERR(mnt_ns))
283+
return PTR_ERR(mnt_ns);
284+
285+
ns = to_ns_common(mnt_ns);
286+
/* Transfer ownership of @mnt_ns reference to @path. */
287+
ret = path_from_stashed(&ns->stashed, nsfs_mnt, ns, &path);
288+
if (ret)
289+
return ret;
290+
291+
CLASS(get_unused_fd, fd)(O_CLOEXEC);
292+
if (fd < 0)
293+
return fd;
294+
295+
f = dentry_open(&path, O_RDONLY, current_cred());
296+
if (IS_ERR(f))
297+
return PTR_ERR(f);
298+
299+
if (uinfo) {
300+
/*
301+
* If @uinfo is passed return all information about the
302+
* mount namespace as well.
303+
*/
304+
ret = copy_ns_info_to_user(to_mnt_ns(ns), uinfo, usize, &kinfo);
305+
if (ret)
306+
return ret;
307+
}
308+
309+
/* Transfer reference of @f to caller's fdtable. */
310+
fd_install(fd, no_free_ptr(f));
311+
/* File descriptor is live so hand it off to the caller. */
312+
return take_fd(fd);
215313
}
216314
default:
217315
ret = -ENOTTY;

include/linux/file.h

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111
#include <linux/posix_types.h>
1212
#include <linux/errno.h>
1313
#include <linux/cleanup.h>
14+
#include <linux/err.h>
1415

1516
struct file;
1617

@@ -96,6 +97,7 @@ extern void put_unused_fd(unsigned int fd);
9697

9798
DEFINE_CLASS(get_unused_fd, int, if (_T >= 0) put_unused_fd(_T),
9899
get_unused_fd_flags(flags), unsigned flags)
100+
DEFINE_FREE(fput, struct file *, if (!IS_ERR_OR_NULL(_T)) fput(_T))
99101

100102
/*
101103
* take_fd() will take care to set @fd to -EBADF ensuring that

include/linux/mnt_namespace.h

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,9 @@
33
#define _NAMESPACE_H_
44
#ifdef __KERNEL__
55

6+
#include <linux/cleanup.h>
7+
#include <linux/err.h>
8+
69
struct mnt_namespace;
710
struct fs_struct;
811
struct user_namespace;
@@ -11,6 +14,7 @@ struct ns_common;
1114
extern struct mnt_namespace *copy_mnt_ns(unsigned long, struct mnt_namespace *,
1215
struct user_namespace *, struct fs_struct *);
1316
extern void put_mnt_ns(struct mnt_namespace *ns);
17+
DEFINE_FREE(put_mnt_ns, struct mnt_namespace *, if (!IS_ERR_OR_NULL(_T)) put_mnt_ns(_T))
1418
extern struct ns_common *from_mnt_ns(struct mnt_namespace *);
1519

1620
extern const struct file_operations proc_mounts_operations;

include/uapi/linux/nsfs.h

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,19 @@
2727
/* Return thread-group leader id of pid in the target pid namespace. */
2828
#define NS_GET_TGID_IN_PIDNS _IOR(NSIO, 0x9, int)
2929

30+
struct mnt_ns_info {
31+
__u32 size;
32+
__u32 nr_mounts;
33+
__u64 mnt_ns_id;
34+
};
35+
36+
#define MNT_NS_INFO_SIZE_VER0 16 /* size of first published struct */
37+
38+
/* Get information about namespace. */
39+
#define NS_MNT_GET_INFO _IOR(NSIO, 10, struct mnt_ns_info)
40+
/* Get next namespace. */
41+
#define NS_MNT_GET_NEXT _IOR(NSIO, 11, struct mnt_ns_info)
42+
/* Get previous namespace. */
43+
#define NS_MNT_GET_PREV _IOR(NSIO, 12, struct mnt_ns_info)
44+
3045
#endif /* __LINUX_NSFS_H */

0 commit comments

Comments
 (0)