Ubuntu-focal-kernel/fs/shiftfs.c

2172 lines
51 KiB
C
Raw Normal View History

UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
#include <linux/btrfs.h>
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#include <linux/capability.h>
#include <linux/cred.h>
#include <linux/mount.h>
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
#include <linux/fdtable.h>
#include <linux/file.h>
#include <linux/fs.h>
#include <linux/namei.h>
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/magic.h>
#include <linux/parser.h>
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#include <linux/security.h>
#include <linux/seq_file.h>
#include <linux/statfs.h>
#include <linux/slab.h>
#include <linux/user_namespace.h>
#include <linux/uidgid.h>
#include <linux/xattr.h>
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#include <linux/posix_acl.h>
#include <linux/posix_acl_xattr.h>
#include <linux/uio.h>
struct shiftfs_super_info {
struct vfsmount *mnt;
struct user_namespace *userns;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
/* creds of process who created the super block */
const struct cred *creator_cred;
bool mark;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
unsigned int passthrough;
unsigned int passthrough_mark;
};
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void shiftfs_fill_inode(struct inode *inode, unsigned long ino,
umode_t mode, dev_t dev, struct dentry *dentry);
#define SHIFTFS_PASSTHROUGH_NONE 0
#define SHIFTFS_PASSTHROUGH_STAT 1
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
#define SHIFTFS_PASSTHROUGH_IOCTL 2
#define SHIFTFS_PASSTHROUGH_ALL \
(SHIFTFS_PASSTHROUGH_STAT | SHIFTFS_PASSTHROUGH_IOCTL)
static inline bool shiftfs_passthrough_ioctls(struct shiftfs_super_info *info)
{
if (!(info->passthrough & SHIFTFS_PASSTHROUGH_IOCTL))
return false;
return true;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static inline bool shiftfs_passthrough_statfs(struct shiftfs_super_info *info)
{
if (!(info->passthrough & SHIFTFS_PASSTHROUGH_STAT))
return false;
return true;
}
enum {
OPT_MARK,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
OPT_PASSTHROUGH,
OPT_LAST,
};
/* global filesystem options */
static const match_table_t tokens = {
{ OPT_MARK, "mark" },
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
{ OPT_PASSTHROUGH, "passthrough=%u" },
{ OPT_LAST, NULL }
};
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static const struct cred *shiftfs_override_creds(const struct super_block *sb)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return override_creds(sbinfo->creator_cred);
}
static inline void shiftfs_revert_object_creds(const struct cred *oldcred,
struct cred *newcred)
{
revert_creds(oldcred);
put_cred(newcred);
}
static kuid_t shift_kuid(struct user_namespace *from, struct user_namespace *to,
kuid_t kuid)
{
uid_t uid = from_kuid(from, kuid);
return make_kuid(to, uid);
}
static kgid_t shift_kgid(struct user_namespace *from, struct user_namespace *to,
kgid_t kgid)
{
gid_t gid = from_kgid(from, kgid);
return make_kgid(to, gid);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_override_object_creds(const struct super_block *sb,
const struct cred **oldcred,
struct cred **newcred,
struct dentry *dentry, umode_t mode,
bool hardlink)
{
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
kuid_t fsuid = current_fsuid();
kgid_t fsgid = current_fsgid();
*oldcred = shiftfs_override_creds(sb);
*newcred = prepare_creds();
if (!*newcred) {
revert_creds(*oldcred);
return -ENOMEM;
}
(*newcred)->fsuid = shift_kuid(sb->s_user_ns, sbinfo->userns, fsuid);
(*newcred)->fsgid = shift_kgid(sb->s_user_ns, sbinfo->userns, fsgid);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!hardlink) {
int err = security_dentry_create_files_as(dentry, mode,
&dentry->d_name,
*oldcred, *newcred);
if (err) {
shiftfs_revert_object_creds(*oldcred, *newcred);
return err;
}
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
put_cred(override_creds(*newcred));
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void shiftfs_copyattr(struct inode *from, struct inode *to)
{
struct user_namespace *from_ns = from->i_sb->s_user_ns;
struct user_namespace *to_ns = to->i_sb->s_user_ns;
to->i_uid = shift_kuid(from_ns, to_ns, from->i_uid);
to->i_gid = shift_kgid(from_ns, to_ns, from->i_gid);
to->i_mode = from->i_mode;
to->i_atime = from->i_atime;
to->i_mtime = from->i_mtime;
to->i_ctime = from->i_ctime;
i_size_write(to, i_size_read(from));
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void shiftfs_copyflags(struct inode *from, struct inode *to)
{
unsigned int mask = S_SYNC | S_IMMUTABLE | S_APPEND | S_NOATIME;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode_set_flags(to, from->i_flags & mask, mask);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void shiftfs_file_accessed(struct file *file)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct inode *upperi, *loweri;
if (file->f_flags & O_NOATIME)
return;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
upperi = file_inode(file);
loweri = upperi->i_private;
if (!loweri)
return;
upperi->i_mtime = loweri->i_mtime;
upperi->i_ctime = loweri->i_ctime;
touch_atime(&file->f_path);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_parse_mount_options(struct shiftfs_super_info *sbinfo,
char *options)
{
char *p;
substring_t args[MAX_OPT_ARGS];
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
sbinfo->mark = false;
sbinfo->passthrough = 0;
while ((p = strsep(&options, ",")) != NULL) {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
int err, intarg, token;
if (!*p)
continue;
token = match_token(p, tokens, args);
switch (token) {
case OPT_MARK:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
sbinfo->mark = true;
break;
case OPT_PASSTHROUGH:
err = match_int(&args[0], &intarg);
if (err)
return err;
if (intarg & ~SHIFTFS_PASSTHROUGH_ALL)
return -EINVAL;
sbinfo->passthrough = intarg;
break;
default:
return -EINVAL;
}
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return 0;
}
static void shiftfs_d_release(struct dentry *dentry)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (lowerd)
dput(lowerd);
}
static struct dentry *shiftfs_d_real(struct dentry *dentry,
const struct inode *inode)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
if (inode && d_inode(dentry) == inode)
return dentry;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
lowerd = d_real(lowerd, inode);
if (lowerd && (!inode || inode == d_inode(lowerd)))
return lowerd;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
WARN(1, "shiftfs_d_real(%pd4, %s:%lu): real dentry not found\n", dentry,
inode ? inode->i_sb->s_id : "NULL", inode ? inode->i_ino : 0);
return dentry;
}
static int shiftfs_d_weak_revalidate(struct dentry *dentry, unsigned int flags)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
int err = 1;
struct dentry *lowerd = dentry->d_fsdata;
if (d_is_negative(lowerd) != d_is_negative(dentry))
return 0;
if ((lowerd->d_flags & DCACHE_OP_WEAK_REVALIDATE))
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = lowerd->d_op->d_weak_revalidate(lowerd, flags);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (d_really_is_positive(dentry)) {
struct inode *inode = d_inode(dentry);
struct inode *loweri = d_inode(lowerd);
shiftfs_copyattr(loweri, inode);
}
return err;
}
static int shiftfs_d_revalidate(struct dentry *dentry, unsigned int flags)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
int err = 1;
struct dentry *lowerd = dentry->d_fsdata;
if (d_unhashed(lowerd) ||
((d_is_negative(lowerd) != d_is_negative(dentry))))
return 0;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (flags & LOOKUP_RCU)
return -ECHILD;
if ((lowerd->d_flags & DCACHE_OP_REVALIDATE))
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = lowerd->d_op->d_revalidate(lowerd, flags);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (d_really_is_positive(dentry)) {
struct inode *inode = d_inode(dentry);
struct inode *loweri = d_inode(lowerd);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_copyattr(loweri, inode);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return err;
}
static const struct dentry_operations shiftfs_dentry_ops = {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
.d_release = shiftfs_d_release,
.d_real = shiftfs_d_real,
.d_revalidate = shiftfs_d_revalidate,
.d_weak_revalidate = shiftfs_d_weak_revalidate,
};
static const char *shiftfs_get_link(struct dentry *dentry, struct inode *inode,
struct delayed_call *done)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const char *p;
const struct cred *oldcred;
struct dentry *lowerd;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
/* RCU lookup not supported */
if (!dentry)
return ERR_PTR(-ECHILD);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
lowerd = dentry->d_fsdata;
oldcred = shiftfs_override_creds(dentry->d_sb);
p = vfs_get_link(lowerd, done);
revert_creds(oldcred);
return p;
}
static int shiftfs_setxattr(struct dentry *dentry, struct inode *inode,
const char *name, const void *value,
size_t size, int flags)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
int err;
const struct cred *oldcred;
oldcred = shiftfs_override_creds(dentry->d_sb);
err = vfs_setxattr(lowerd, name, value, size, flags);
revert_creds(oldcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_copyattr(lowerd->d_inode, inode);
return err;
}
static int shiftfs_xattr_get(const struct xattr_handler *handler,
struct dentry *dentry, struct inode *inode,
const char *name, void *value, size_t size)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(dentry->d_sb);
err = vfs_getxattr(lowerd, name, value, size);
revert_creds(oldcred);
return err;
}
static ssize_t shiftfs_listxattr(struct dentry *dentry, char *list,
size_t size)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(dentry->d_sb);
err = vfs_listxattr(lowerd, list, size);
revert_creds(oldcred);
return err;
}
static int shiftfs_removexattr(struct dentry *dentry, const char *name)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
oldcred = shiftfs_override_creds(dentry->d_sb);
err = vfs_removexattr(lowerd, name);
revert_creds(oldcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
/* update c/mtime */
shiftfs_copyattr(lowerd->d_inode, d_inode(dentry));
return err;
}
static int shiftfs_xattr_set(const struct xattr_handler *handler,
struct dentry *dentry, struct inode *inode,
const char *name, const void *value, size_t size,
int flags)
{
if (!value)
return shiftfs_removexattr(dentry, name);
return shiftfs_setxattr(dentry, inode, name, value, size, flags);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_inode_test(struct inode *inode, void *data)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return inode->i_private == data;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_inode_set(struct inode *inode, void *data)
{
inode->i_private = data;
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_create_object(struct inode *diri, struct dentry *dentry,
umode_t mode, const char *symlink,
struct dentry *hardlink, bool excl)
{
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
struct cred *newcred;
void *loweri_iop_ptr = NULL;
umode_t modei = mode;
struct super_block *dir_sb = diri->i_sb;
struct dentry *lowerd_new = dentry->d_fsdata;
struct inode *inode = NULL, *loweri_dir = diri->i_private;
const struct inode_operations *loweri_dir_iop = loweri_dir->i_op;
struct dentry *lowerd_link = NULL;
inode_lock_nested(loweri_dir, I_MUTEX_PARENT);
if (hardlink) {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
loweri_iop_ptr = loweri_dir_iop->link;
} else {
switch (mode & S_IFMT) {
case S_IFDIR:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
loweri_iop_ptr = loweri_dir_iop->mkdir;
break;
case S_IFREG:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
loweri_iop_ptr = loweri_dir_iop->create;
break;
case S_IFLNK:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
loweri_iop_ptr = loweri_dir_iop->symlink;
break;
case S_IFSOCK:
/* fall through */
case S_IFIFO:
loweri_iop_ptr = loweri_dir_iop->mknod;
break;
}
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!loweri_iop_ptr) {
err = -EINVAL;
goto out_iput;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!hardlink) {
inode = new_inode(dir_sb);
if (!inode) {
err = -ENOMEM;
goto out_iput;
}
/*
* new_inode() will have added the new inode to the super
* block's list of inodes. Further below we will call
* inode_insert5() Which would perform the same operation again
* thereby corrupting the list. To avoid this raise I_CREATING
* in i_state which will cause inode_insert5() to skip this
* step. I_CREATING will be cleared by d_instantiate_new()
* below.
*/
spin_lock(&inode->i_lock);
inode->i_state |= I_CREATING;
spin_unlock(&inode->i_lock);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode_init_owner(inode, diri, mode);
modei = inode->i_mode;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = shiftfs_override_object_creds(dentry->d_sb, &oldcred, &newcred,
dentry, modei, hardlink != NULL);
if (err)
goto out_iput;
if (hardlink) {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
lowerd_link = hardlink->d_fsdata;
err = vfs_link(lowerd_link, loweri_dir, lowerd_new, NULL);
} else {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
switch (modei & S_IFMT) {
case S_IFDIR:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = vfs_mkdir(loweri_dir, lowerd_new, modei);
break;
case S_IFREG:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = vfs_create(loweri_dir, lowerd_new, modei, excl);
break;
case S_IFLNK:
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = vfs_symlink(loweri_dir, lowerd_new, symlink);
break;
case S_IFSOCK:
/* fall through */
case S_IFIFO:
err = vfs_mknod(loweri_dir, lowerd_new, modei, 0);
break;
default:
err = -EINVAL;
break;
}
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_revert_object_creds(oldcred, newcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!err && WARN_ON(!lowerd_new->d_inode))
err = -EIO;
if (err)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
goto out_iput;
if (hardlink) {
inode = d_inode(hardlink);
ihold(inode);
/* copy up times from lower inode */
shiftfs_copyattr(d_inode(lowerd_link), inode);
set_nlink(d_inode(hardlink), d_inode(lowerd_link)->i_nlink);
d_instantiate(dentry, inode);
} else {
struct inode *inode_tmp;
struct inode *loweri_new = d_inode(lowerd_new);
inode_tmp = inode_insert5(inode, (unsigned long)loweri_new,
shiftfs_inode_test, shiftfs_inode_set,
loweri_new);
if (unlikely(inode_tmp != inode)) {
pr_err_ratelimited("shiftfs: newly created inode found in cache\n");
iput(inode_tmp);
err = -EINVAL;
goto out_iput;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
ihold(loweri_new);
shiftfs_fill_inode(inode, loweri_new->i_ino, loweri_new->i_mode,
0, lowerd_new);
d_instantiate_new(dentry, inode);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_copyattr(loweri_dir, diri);
if (loweri_iop_ptr == loweri_dir_iop->mkdir)
set_nlink(diri, loweri_dir->i_nlink);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode = NULL;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
out_iput:
iput(inode);
inode_unlock(loweri_dir);
return err;
}
static int shiftfs_create(struct inode *dir, struct dentry *dentry,
umode_t mode, bool excl)
{
mode |= S_IFREG;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, excl);
}
static int shiftfs_mkdir(struct inode *dir, struct dentry *dentry,
umode_t mode)
{
mode |= S_IFDIR;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, false);
}
static int shiftfs_link(struct dentry *hardlink, struct inode *dir,
struct dentry *dentry)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return shiftfs_create_object(dir, dentry, 0, NULL, hardlink, false);
}
static int shiftfs_mknod(struct inode *dir, struct dentry *dentry, umode_t mode,
dev_t rdev)
{
if (!S_ISFIFO(mode) && !S_ISSOCK(mode))
return -EPERM;
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, false);
}
static int shiftfs_symlink(struct inode *dir, struct dentry *dentry,
const char *symlink)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return shiftfs_create_object(dir, dentry, S_IFLNK, symlink, NULL, false);
}
static int shiftfs_rm(struct inode *dir, struct dentry *dentry, bool rmdir)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
struct inode *loweri = dir->i_private;
struct inode *inode = d_inode(dentry);
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
UBUNTU: SAUCE: shiftfs: prevent lower dentries from going negative during unlink BugLink: https://bugs.launchpad.net/bugs/1860041 All non-special files (For shiftfs this only includes fifos and - for this case - unix sockets - since we don't allow character and block devices to be created.) go through shiftfs_open() and have their dentry pinned through this codepath preventing it from going negative. But fifos don't use the shiftfs fops but rather use the pipefifo_fops which means they do not go through shiftfs_open() and thus don't have their dentry pinned that way. Thus, the lower dentries for such files can go negative on unlink causing segfaults. The following C program can be used to reproduce the crash: #include <stdio.h> #include <fcntl.h> #include <unistd.h> #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <stdlib.h> int main(int argc, char *argv[]) { struct stat stat; unlink("./bbb"); int ret = mknod("./bbb", S_IFIFO|0666, 0); if (ret < 0) exit(1); int fd = open("./bbb", O_RDWR); if (fd < 0) exit(2); if (unlink("./bbb")) exit(4); fstat(fd, &stat); return 0; } Similar to ecryptfs we need to dget() the lower dentry before calling vfs_unlink() on it and dput() it afterwards. Acked-by: Stefan Bader <stefan.bader@canonical.com> Link: https://travis-ci.community/t/arm64-ppc64le-segfaults/6158/3 Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Stefan Bader <stefan.bader@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2020-01-17 15:17:06 +00:00
dget(lowerd);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(dentry->d_sb);
inode_lock_nested(loweri, I_MUTEX_PARENT);
if (rmdir)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = vfs_rmdir(loweri, lowerd);
else
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = vfs_unlink(loweri, lowerd, NULL);
revert_creds(oldcred);
if (!err) {
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
d_drop(dentry);
if (rmdir)
clear_nlink(inode);
else
drop_nlink(inode);
}
inode_unlock(loweri);
shiftfs_copyattr(loweri, dir);
UBUNTU: SAUCE: shiftfs: prevent lower dentries from going negative during unlink BugLink: https://bugs.launchpad.net/bugs/1860041 All non-special files (For shiftfs this only includes fifos and - for this case - unix sockets - since we don't allow character and block devices to be created.) go through shiftfs_open() and have their dentry pinned through this codepath preventing it from going negative. But fifos don't use the shiftfs fops but rather use the pipefifo_fops which means they do not go through shiftfs_open() and thus don't have their dentry pinned that way. Thus, the lower dentries for such files can go negative on unlink causing segfaults. The following C program can be used to reproduce the crash: #include <stdio.h> #include <fcntl.h> #include <unistd.h> #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> #include <stdlib.h> int main(int argc, char *argv[]) { struct stat stat; unlink("./bbb"); int ret = mknod("./bbb", S_IFIFO|0666, 0); if (ret < 0) exit(1); int fd = open("./bbb", O_RDWR); if (fd < 0) exit(2); if (unlink("./bbb")) exit(4); fstat(fd, &stat); return 0; } Similar to ecryptfs we need to dget() the lower dentry before calling vfs_unlink() on it and dput() it afterwards. Acked-by: Stefan Bader <stefan.bader@canonical.com> Link: https://travis-ci.community/t/arm64-ppc64le-segfaults/6158/3 Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Stefan Bader <stefan.bader@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2020-01-17 15:17:06 +00:00
dput(lowerd);
return err;
}
static int shiftfs_unlink(struct inode *dir, struct dentry *dentry)
{
return shiftfs_rm(dir, dentry, false);
}
static int shiftfs_rmdir(struct inode *dir, struct dentry *dentry)
{
return shiftfs_rm(dir, dentry, true);
}
static int shiftfs_rename(struct inode *olddir, struct dentry *old,
struct inode *newdir, struct dentry *new,
unsigned int flags)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd_dir_old = old->d_parent->d_fsdata,
*lowerd_dir_new = new->d_parent->d_fsdata,
*lowerd_old = old->d_fsdata, *lowerd_new = new->d_fsdata,
*trapd;
struct inode *loweri_dir_old = lowerd_dir_old->d_inode,
*loweri_dir_new = lowerd_dir_new->d_inode;
int err = -EINVAL;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
trapd = lock_rename(lowerd_dir_new, lowerd_dir_old);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (trapd == lowerd_old || trapd == lowerd_new)
goto out_unlock;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(old->d_sb);
err = vfs_rename(loweri_dir_old, lowerd_old, loweri_dir_new, lowerd_new,
NULL, flags);
revert_creds(oldcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_copyattr(loweri_dir_old, olddir);
shiftfs_copyattr(loweri_dir_new, newdir);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
out_unlock:
unlock_rename(lowerd_dir_new, lowerd_dir_old);
return err;
}
static struct dentry *shiftfs_lookup(struct inode *dir, struct dentry *dentry,
unsigned int flags)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *new;
struct inode *newi;
const struct cred *oldcred;
struct dentry *lowerd = dentry->d_parent->d_fsdata;
struct inode *inode = NULL, *loweri = lowerd->d_inode;
inode_lock(loweri);
oldcred = shiftfs_override_creds(dentry->d_sb);
new = lookup_one_len(dentry->d_name.name, lowerd, dentry->d_name.len);
revert_creds(oldcred);
inode_unlock(loweri);
if (IS_ERR(new))
return new;
dentry->d_fsdata = new;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
newi = new->d_inode;
if (!newi)
goto out;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode = iget5_locked(dentry->d_sb, (unsigned long)newi,
shiftfs_inode_test, shiftfs_inode_set, newi);
if (!inode) {
dput(new);
return ERR_PTR(-ENOMEM);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (inode->i_state & I_NEW) {
/*
* inode->i_private set by shiftfs_inode_set(), but we still
* need to take a reference
*/
ihold(newi);
shiftfs_fill_inode(inode, newi->i_ino, newi->i_mode, 0, new);
unlock_new_inode(inode);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
out:
return d_splice_alias(inode, dentry);
}
static int shiftfs_permission(struct inode *inode, int mask)
{
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
struct inode *loweri = inode->i_private;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!loweri) {
WARN_ON(!(mask & MAY_NOT_BLOCK));
return -ECHILD;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = generic_permission(inode, mask);
if (err)
return err;
oldcred = shiftfs_override_creds(inode->i_sb);
err = inode_permission(loweri, mask);
revert_creds(oldcred);
return err;
}
static int shiftfs_fiemap(struct inode *inode,
struct fiemap_extent_info *fieinfo, u64 start,
u64 len)
{
int err;
const struct cred *oldcred;
struct inode *loweri = inode->i_private;
if (!loweri->i_op->fiemap)
return -EOPNOTSUPP;
oldcred = shiftfs_override_creds(inode->i_sb);
if (fieinfo->fi_flags & FIEMAP_FLAG_SYNC)
filemap_write_and_wait(loweri->i_mapping);
err = loweri->i_op->fiemap(loweri, fieinfo, start, len);
revert_creds(oldcred);
return err;
}
static int shiftfs_tmpfile(struct inode *dir, struct dentry *dentry,
umode_t mode)
{
int err;
const struct cred *oldcred;
struct dentry *lowerd = dentry->d_fsdata;
struct inode *loweri = dir->i_private;
if (!loweri->i_op->tmpfile)
return -EOPNOTSUPP;
oldcred = shiftfs_override_creds(dir->i_sb);
err = loweri->i_op->tmpfile(loweri, lowerd, mode);
revert_creds(oldcred);
return err;
}
static int shiftfs_setattr(struct dentry *dentry, struct iattr *attr)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = dentry->d_fsdata;
struct inode *loweri = lowerd->d_inode;
struct iattr newattr;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
struct super_block *sb = dentry->d_sb;
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = setattr_prepare(dentry, attr);
if (err)
return err;
newattr = *attr;
newattr.ia_uid = shift_kuid(sb->s_user_ns, sbinfo->userns, attr->ia_uid);
newattr.ia_gid = shift_kgid(sb->s_user_ns, sbinfo->userns, attr->ia_gid);
/*
* mode change is for clearing setuid/setgid bits. Allow lower fs
* to interpret this in its own way.
*/
if (newattr.ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
newattr.ia_valid &= ~ATTR_MODE;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode_lock(loweri);
oldcred = shiftfs_override_creds(dentry->d_sb);
err = notify_change(lowerd, &newattr, NULL);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
revert_creds(oldcred);
inode_unlock(loweri);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_copyattr(loweri, d_inode(dentry));
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return err;
}
static int shiftfs_getattr(const struct path *path, struct kstat *stat,
u32 request_mask, unsigned int query_flags)
{
struct inode *inode = path->dentry->d_inode;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct dentry *lowerd = path->dentry->d_fsdata;
struct inode *loweri = lowerd->d_inode;
struct shiftfs_super_info *info = path->dentry->d_sb->s_fs_info;
struct path newpath = { .mnt = info->mnt, .dentry = lowerd };
struct user_namespace *from_ns = loweri->i_sb->s_user_ns;
struct user_namespace *to_ns = inode->i_sb->s_user_ns;
const struct cred *oldcred;
int err;
oldcred = shiftfs_override_creds(inode->i_sb);
err = vfs_getattr(&newpath, stat, request_mask, query_flags);
revert_creds(oldcred);
if (err)
return err;
/* transform the underlying id */
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
stat->uid = shift_kuid(from_ns, to_ns, stat->uid);
stat->gid = shift_kgid(from_ns, to_ns, stat->gid);
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#ifdef CONFIG_SHIFT_FS_POSIX_ACL
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int
shift_acl_ids(struct user_namespace *from, struct user_namespace *to,
struct posix_acl *acl)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
int i;
for (i = 0; i < acl->a_count; i++) {
struct posix_acl_entry *e = &acl->a_entries[i];
switch(e->e_tag) {
case ACL_USER:
e->e_uid = shift_kuid(from, to, e->e_uid);
if (!uid_valid(e->e_uid))
return -EOVERFLOW;
break;
case ACL_GROUP:
e->e_gid = shift_kgid(from, to, e->e_gid);
if (!gid_valid(e->e_gid))
return -EOVERFLOW;
break;
}
}
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void
shift_acl_xattr_ids(struct user_namespace *from, struct user_namespace *to,
void *value, size_t size)
{
struct posix_acl_xattr_header *header = value;
struct posix_acl_xattr_entry *entry = (void *)(header + 1), *end;
int count;
kuid_t kuid;
kgid_t kgid;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!value)
return;
if (size < sizeof(struct posix_acl_xattr_header))
return;
if (header->a_version != cpu_to_le32(POSIX_ACL_XATTR_VERSION))
return;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
count = posix_acl_xattr_count(size);
if (count < 0)
return;
if (count == 0)
return;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
for (end = entry + count; entry != end; entry++) {
switch(le16_to_cpu(entry->e_tag)) {
case ACL_USER:
kuid = make_kuid(&init_user_ns, le32_to_cpu(entry->e_id));
kuid = shift_kuid(from, to, kuid);
entry->e_id = cpu_to_le32(from_kuid(&init_user_ns, kuid));
break;
case ACL_GROUP:
kgid = make_kgid(&init_user_ns, le32_to_cpu(entry->e_id));
kgid = shift_kgid(from, to, kgid);
entry->e_id = cpu_to_le32(from_kgid(&init_user_ns, kgid));
break;
default:
break;
}
}
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static struct posix_acl *shiftfs_get_acl(struct inode *inode, int type)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct inode *loweri = inode->i_private;
const struct cred *oldcred;
struct posix_acl *lower_acl, *acl = NULL;
struct user_namespace *from_ns = loweri->i_sb->s_user_ns;
struct user_namespace *to_ns = inode->i_sb->s_user_ns;
int size;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!IS_POSIXACL(loweri))
return NULL;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(inode->i_sb);
lower_acl = get_acl(loweri, type);
revert_creds(oldcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (lower_acl && !IS_ERR(lower_acl)) {
/* XXX: export posix_acl_clone? */
size = sizeof(struct posix_acl) +
lower_acl->a_count * sizeof(struct posix_acl_entry);
acl = kmemdup(lower_acl, size, GFP_KERNEL);
posix_acl_release(lower_acl);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!acl)
return ERR_PTR(-ENOMEM);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
refcount_set(&acl->a_refcount, 1);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
err = shift_acl_ids(from_ns, to_ns, acl);
if (err) {
kfree(acl);
return ERR_PTR(err);
}
}
return acl;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int
shiftfs_posix_acl_xattr_get(const struct xattr_handler *handler,
struct dentry *dentry, struct inode *inode,
const char *name, void *buffer, size_t size)
{
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct inode *loweri = inode->i_private;
int ret;
ret = shiftfs_xattr_get(NULL, dentry, inode, handler->name,
buffer, size);
if (ret < 0)
return ret;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
inode_lock(loweri);
shift_acl_xattr_ids(loweri->i_sb->s_user_ns, inode->i_sb->s_user_ns,
buffer, size);
inode_unlock(loweri);
return ret;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int
shiftfs_posix_acl_xattr_set(const struct xattr_handler *handler,
struct dentry *dentry, struct inode *inode,
const char *name, const void *value,
size_t size, int flags)
{
struct inode *loweri = inode->i_private;
int err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!IS_POSIXACL(loweri) || !loweri->i_op->set_acl)
return -EOPNOTSUPP;
if (handler->flags == ACL_TYPE_DEFAULT && !S_ISDIR(inode->i_mode))
return value ? -EACCES : 0;
if (!inode_owner_or_capable(inode))
return -EPERM;
if (value) {
shift_acl_xattr_ids(inode->i_sb->s_user_ns,
loweri->i_sb->s_user_ns,
(void *)value, size);
err = shiftfs_setxattr(dentry, inode, handler->name, value,
size, flags);
} else {
err = shiftfs_removexattr(dentry, handler->name);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!err)
shiftfs_copyattr(loweri, inode);
return err;
}
static const struct xattr_handler
shiftfs_posix_acl_access_xattr_handler = {
.name = XATTR_NAME_POSIX_ACL_ACCESS,
.flags = ACL_TYPE_ACCESS,
.get = shiftfs_posix_acl_xattr_get,
.set = shiftfs_posix_acl_xattr_set,
};
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static const struct xattr_handler
shiftfs_posix_acl_default_xattr_handler = {
.name = XATTR_NAME_POSIX_ACL_DEFAULT,
.flags = ACL_TYPE_DEFAULT,
.get = shiftfs_posix_acl_xattr_get,
.set = shiftfs_posix_acl_xattr_set,
};
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#else /* !CONFIG_SHIFT_FS_POSIX_ACL */
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#define shiftfs_get_acl NULL
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
#endif /* CONFIG_SHIFT_FS_POSIX_ACL */
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static const struct inode_operations shiftfs_dir_inode_operations = {
.lookup = shiftfs_lookup,
.mkdir = shiftfs_mkdir,
.symlink = shiftfs_symlink,
.unlink = shiftfs_unlink,
.rmdir = shiftfs_rmdir,
.rename = shiftfs_rename,
.link = shiftfs_link,
.setattr = shiftfs_setattr,
.create = shiftfs_create,
.mknod = shiftfs_mknod,
.permission = shiftfs_permission,
.getattr = shiftfs_getattr,
.listxattr = shiftfs_listxattr,
.get_acl = shiftfs_get_acl,
};
static const struct inode_operations shiftfs_file_inode_operations = {
.fiemap = shiftfs_fiemap,
.getattr = shiftfs_getattr,
.get_acl = shiftfs_get_acl,
.listxattr = shiftfs_listxattr,
.permission = shiftfs_permission,
.setattr = shiftfs_setattr,
.tmpfile = shiftfs_tmpfile,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
};
static const struct inode_operations shiftfs_special_inode_operations = {
.getattr = shiftfs_getattr,
.get_acl = shiftfs_get_acl,
.listxattr = shiftfs_listxattr,
.permission = shiftfs_permission,
.setattr = shiftfs_setattr,
};
static const struct inode_operations shiftfs_symlink_inode_operations = {
.getattr = shiftfs_getattr,
.get_link = shiftfs_get_link,
.listxattr = shiftfs_listxattr,
.setattr = shiftfs_setattr,
};
static struct file *shiftfs_open_realfile(const struct file *file,
struct inode *realinode)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
{
struct file *realfile;
const struct cred *old_cred;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct inode *inode = file_inode(file);
struct dentry *lowerd = file->f_path.dentry->d_fsdata;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct shiftfs_super_info *info = inode->i_sb->s_fs_info;
struct path realpath = { .mnt = info->mnt, .dentry = lowerd };
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
old_cred = shiftfs_override_creds(inode->i_sb);
realfile = open_with_fake_path(&realpath, file->f_flags, realinode,
info->creator_cred);
revert_creds(old_cred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return realfile;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
#define SHIFTFS_SETFL_MASK (O_APPEND | O_NONBLOCK | O_NDELAY | O_DIRECT)
static int shiftfs_change_flags(struct file *file, unsigned int flags)
{
struct inode *inode = file_inode(file);
int err;
/* if some flag changed that cannot be changed then something's amiss */
if (WARN_ON((file->f_flags ^ flags) & ~SHIFTFS_SETFL_MASK))
return -EIO;
flags &= SHIFTFS_SETFL_MASK;
if (((flags ^ file->f_flags) & O_APPEND) && IS_APPEND(inode))
return -EPERM;
if (flags & O_DIRECT) {
if (!file->f_mapping->a_ops ||
!file->f_mapping->a_ops->direct_IO)
return -EINVAL;
}
if (file->f_op->check_flags) {
err = file->f_op->check_flags(flags);
if (err)
return err;
}
spin_lock(&file->f_lock);
file->f_flags = (file->f_flags & ~SHIFTFS_SETFL_MASK) | flags;
spin_unlock(&file->f_lock);
return 0;
}
static int shiftfs_open(struct inode *inode, struct file *file)
{
struct file *realfile;
realfile = shiftfs_open_realfile(file, inode->i_private);
if (IS_ERR(realfile))
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return PTR_ERR(realfile);
file->private_data = realfile;
/* For O_DIRECT dentry_open() checks f_mapping->a_ops->direct_IO. */
file->f_mapping = realfile->f_mapping;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return 0;
}
static int shiftfs_dir_open(struct inode *inode, struct file *file)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
{
struct file *realfile;
const struct cred *oldcred;
struct dentry *lowerd = file->f_path.dentry->d_fsdata;
struct shiftfs_super_info *info = inode->i_sb->s_fs_info;
struct path realpath = { .mnt = info->mnt, .dentry = lowerd };
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
realfile = dentry_open(&realpath, file->f_flags | O_NOATIME,
info->creator_cred);
revert_creds(oldcred);
if (IS_ERR(realfile))
return PTR_ERR(realfile);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
file->private_data = realfile;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return 0;
}
static int shiftfs_release(struct inode *inode, struct file *file)
{
struct file *realfile = file->private_data;
if (realfile)
fput(realfile);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return 0;
}
static int shiftfs_dir_release(struct inode *inode, struct file *file)
{
return shiftfs_release(inode, file);
}
static loff_t shiftfs_dir_llseek(struct file *file, loff_t offset, int whence)
{
struct file *realfile = file->private_data;
return vfs_llseek(realfile, offset, whence);
}
static loff_t shiftfs_file_llseek(struct file *file, loff_t offset, int whence)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
{
struct inode *realinode = file_inode(file)->i_private;
return generic_file_llseek_size(file, offset, whence,
realinode->i_sb->s_maxbytes,
i_size_read(realinode));
}
/* XXX: Need to figure out what to to about atime updates, maybe other
* timestamps too ... ref. ovl_file_accessed() */
static rwf_t shiftfs_iocb_to_rwf(struct kiocb *iocb)
{
int ifl = iocb->ki_flags;
rwf_t flags = 0;
if (ifl & IOCB_NOWAIT)
flags |= RWF_NOWAIT;
if (ifl & IOCB_HIPRI)
flags |= RWF_HIPRI;
if (ifl & IOCB_DSYNC)
flags |= RWF_DSYNC;
if (ifl & IOCB_SYNC)
flags |= RWF_SYNC;
return flags;
}
UBUNTU: SAUCE: shiftfs: prevent type confusion BugLink: https://bugs.launchpad.net/bugs/1850867 Verify filesystem type in shiftfs_real_fdget(). Quoting Jann Horn: #################### Bug 2: Type confusion #################### shiftfs_btrfs_ioctl_fd_replace() calls fdget(oldfd), then without further checks passes the resulting file* into shiftfs_real_fdget(), which does this: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } file->private_data is a void* that points to a filesystem-dependent type; and some filesystems even use it to store a type-cast number instead of a pointer. The implicit cast to a "struct shiftfs_file_info *" can therefore be a bad cast. As a PoC, here I'm causing a type confusion between struct shiftfs_file_info (with ->realfile at offset 0x10) and struct mm_struct (with vmacache_seqnum at offset 0x10), and I use that to cause a memory dereference somewhere around 0x4242: ======================================= user@ubuntu1910vm:~/shiftfs_confuse$ cat run.sh #!/bin/sh sync unshare -mUr ./run2.sh user@ubuntu1910vm:~/shiftfs_confuse$ cat run2.sh #!/bin/sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs_confuse$ cat ioctl.c #include <sys/ioctl.h> #include <fcntl.h> #include <err.h> #include <unistd.h> #include <linux/btrfs.h> #include <sys/mman.h> int main(void) { // make our vmacache sequence number something like 0x4242 for (int i=0; i<0x4242; i++) { void *x = mmap((void*)0x100000000UL, 0x1000, PROT_READ, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); if (x == MAP_FAILED) err(1, "mmap vmacache seqnum"); munmap(x, 0x1000); } int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = open("/proc/self/environ", O_RDONLY); if (foofd == -1) err(1, "open foofd"); // trigger the confusion struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); } user@ubuntu1910vm:~/shiftfs_confuse$ ./run.sh none on /home/user/shiftfs_confuse/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs_confuse/mnt/tmpfs on /home/user/shiftfs_confuse/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 348.103005] BUG: unable to handle page fault for address: 0000000000004289 [ 348.105060] #PF: supervisor read access in kernel mode [ 348.106573] #PF: error_code(0x0000) - not-present page [ 348.108102] PGD 0 P4D 0 [ 348.108871] Oops: 0000 [#1] SMP PTI [ 348.109912] CPU: 6 PID: 2192 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 348.112109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 348.114460] RIP: 0010:shiftfs_real_ioctl+0x22e/0x410 [shiftfs] [ 348.116166] Code: 38 44 89 ff e8 43 91 01 d3 49 89 c0 49 83 e0 fc 0f 84 ce 01 00 00 49 8b 90 c8 00 00 00 41 8b 70 40 48 8b 4a 10 89 c2 83 e2 01 <8b> 79 40 48 89 4d b8 89 f8 f7 d0 85 f0 0f 85 e8 00 00 00 85 d2 75 [ 348.121578] RSP: 0018:ffffb1e7806ebdc8 EFLAGS: 00010246 [ 348.123097] RAX: ffff9ce6302ebcc0 RBX: ffff9ce6302e90c0 RCX: 0000000000004249 [ 348.125174] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000004 [ 348.127222] RBP: ffffb1e7806ebe30 R08: ffff9ce6302ebcc0 R09: 0000000000001150 [ 348.129288] R10: ffff9ce63680e840 R11: 0000000080010d00 R12: 0000000050009401 [ 348.131358] R13: 00007ffd87558310 R14: ffff9ce60cffca88 R15: 0000000000000004 [ 348.133421] FS: 00007f77fa842540(0000) GS:ffff9ce637b80000(0000) knlGS:0000000000000000 [ 348.135753] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 348.137413] CR2: 0000000000004289 CR3: 000000026ff94001 CR4: 0000000000360ee0 [ 348.139451] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 348.141516] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 348.143545] Call Trace: [ 348.144272] shiftfs_ioctl+0x65/0x76 [shiftfs] [ 348.145562] do_vfs_ioctl+0x407/0x670 [ 348.146620] ? putname+0x4a/0x50 [ 348.147556] ksys_ioctl+0x67/0x90 [ 348.148514] __x64_sys_ioctl+0x1a/0x20 [ 348.149593] do_syscall_64+0x5a/0x130 [ 348.150658] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 348.152108] RIP: 0033:0x7f77fa76767b [ 348.153140] Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e5 27 0d 00 f7 d8 64 89 01 48 [ 348.158466] RSP: 002b:00007ffd875582e8 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 348.160610] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f77fa76767b [ 348.162644] RDX: 00007ffd87558310 RSI: 0000000050009401 RDI: 0000000000000003 [ 348.164680] RBP: 00007ffd87559320 R08: 00000000ffffffff R09: 0000000000000000 [ 348.167456] R10: 0000000000000000 R11: 0000000000000217 R12: 0000561c135ee100 [ 348.169530] R13: 00007ffd87559400 R14: 0000000000000000 R15: 0000000000000000 [ 348.171573] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm snd_hda_codec_generic irqbypass ledtrig_audio crct10dif_pclmul crc32_pclmul snd_hda_intel snd_hda_codec ghash_clmulni_intel snd_hda_core snd_hwdep aesni_intel aes_x86_64 snd_pcm crypto_simd cryptd glue_helper snd_seq_midi joydev snd_seq_midi_event snd_rawmidi snd_seq input_leds snd_seq_device snd_timer serio_raw qxl snd ttm drm_kms_helper mac_hid soundcore drm fb_sys_fops syscopyarea sysfillrect qemu_fw_cfg sysimgblt sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid psmouse i2c_i801 ahci virtio_net lpc_ich libahci net_failover failover virtio_blk [ 348.188617] CR2: 0000000000004289 [ 348.189586] ---[ end trace dad859a1db86d660 ]--- [ 348.190916] RIP: 0010:shiftfs_real_ioctl+0x22e/0x410 [shiftfs] [ 348.193401] Code: 38 44 89 ff e8 43 91 01 d3 49 89 c0 49 83 e0 fc 0f 84 ce 01 00 00 49 8b 90 c8 00 00 00 41 8b 70 40 48 8b 4a 10 89 c2 83 e2 01 <8b> 79 40 48 89 4d b8 89 f8 f7 d0 85 f0 0f 85 e8 00 00 00 85 d2 75 [ 348.198713] RSP: 0018:ffffb1e7806ebdc8 EFLAGS: 00010246 [ 348.200226] RAX: ffff9ce6302ebcc0 RBX: ffff9ce6302e90c0 RCX: 0000000000004249 [ 348.202257] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000004 [ 348.204294] RBP: ffffb1e7806ebe30 R08: ffff9ce6302ebcc0 R09: 0000000000001150 [ 348.206324] R10: ffff9ce63680e840 R11: 0000000080010d00 R12: 0000000050009401 [ 348.208362] R13: 00007ffd87558310 R14: ffff9ce60cffca88 R15: 0000000000000004 [ 348.210395] FS: 00007f77fa842540(0000) GS:ffff9ce637b80000(0000) knlGS:0000000000000000 [ 348.212710] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 348.214365] CR2: 0000000000004289 CR3: 000000026ff94001 CR4: 0000000000360ee0 [ 348.216409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 348.218349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Killed user@ubuntu1910vm:~/shiftfs_confuse$ Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> [ saf: use f_op->open instead as special inodes in shiftfs sbs will not use shiftfs open f_ops ] Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15792 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 13:19:16 +00:00
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct file *realfile;
if (file->f_op->open != shiftfs_open &&
file->f_op->open != shiftfs_dir_open)
return -EINVAL;
realfile = file->private_data;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static ssize_t shiftfs_read_iter(struct kiocb *iocb, struct iov_iter *iter)
{
struct file *file = iocb->ki_filp;
struct fd lowerfd;
const struct cred *oldcred;
ssize_t ret;
if (!iov_iter_count(iter))
return 0;
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
return ret;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
ret = vfs_iter_read(lowerfd.file, iter, &iocb->ki_pos,
shiftfs_iocb_to_rwf(iocb));
revert_creds(oldcred);
shiftfs_file_accessed(file);
fdput(lowerfd);
return ret;
}
static ssize_t shiftfs_write_iter(struct kiocb *iocb, struct iov_iter *iter)
{
struct file *file = iocb->ki_filp;
struct inode *inode = file_inode(file);
struct fd lowerfd;
const struct cred *oldcred;
ssize_t ret;
if (!iov_iter_count(iter))
return 0;
inode_lock(inode);
/* Update mode */
shiftfs_copyattr(inode->i_private, inode);
ret = file_remove_privs(file);
if (ret)
goto out_unlock;
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
goto out_unlock;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
file_start_write(lowerfd.file);
ret = vfs_iter_write(lowerfd.file, iter, &iocb->ki_pos,
shiftfs_iocb_to_rwf(iocb));
file_end_write(lowerfd.file);
revert_creds(oldcred);
/* Update size */
shiftfs_copyattr(inode->i_private, inode);
fdput(lowerfd);
out_unlock:
inode_unlock(inode);
return ret;
}
static int shiftfs_fsync(struct file *file, loff_t start, loff_t end,
int datasync)
{
struct fd lowerfd;
const struct cred *oldcred;
int ret;
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
return ret;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
ret = vfs_fsync_range(lowerfd.file, start, end, datasync);
revert_creds(oldcred);
fdput(lowerfd);
return ret;
}
static int shiftfs_mmap(struct file *file, struct vm_area_struct *vma)
{
struct file *realfile = file->private_data;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred *oldcred;
int ret;
if (!realfile->f_op->mmap)
return -ENODEV;
if (WARN_ON(file != vma->vm_file))
return -EIO;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
vma->vm_file = get_file(realfile);
ret = call_mmap(vma->vm_file, vma);
revert_creds(oldcred);
shiftfs_file_accessed(file);
if (ret) {
/*
* Drop refcount from new vm_file value and restore original
* vm_file value
*/
vma->vm_file = file;
fput(realfile);
} else {
/* Drop refcount from previous vm_file value */
fput(file);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return ret;
}
static long shiftfs_fallocate(struct file *file, int mode, loff_t offset,
loff_t len)
{
struct inode *inode = file_inode(file);
struct inode *loweri = inode->i_private;
struct fd lowerfd;
const struct cred *oldcred;
int ret;
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
return ret;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
ret = vfs_fallocate(lowerfd.file, mode, offset, len);
revert_creds(oldcred);
/* Update size */
shiftfs_copyattr(loweri, inode);
fdput(lowerfd);
return ret;
}
static int shiftfs_fadvise(struct file *file, loff_t offset, loff_t len,
int advice)
{
struct fd lowerfd;
const struct cred *oldcred;
int ret;
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
return ret;
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
ret = vfs_fadvise(lowerfd.file, offset, len, advice);
revert_creds(oldcred);
fdput(lowerfd);
return ret;
}
static int shiftfs_override_ioctl_creds(int cmd, const struct super_block *sb,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
const struct cred **oldcred,
struct cred **newcred)
{
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
kuid_t fsuid = current_fsuid();
kgid_t fsgid = current_fsgid();
*oldcred = shiftfs_override_creds(sb);
*newcred = prepare_creds();
if (!*newcred) {
revert_creds(*oldcred);
return -ENOMEM;
}
(*newcred)->fsuid = shift_kuid(sb->s_user_ns, sbinfo->userns, fsuid);
(*newcred)->fsgid = shift_kgid(sb->s_user_ns, sbinfo->userns, fsgid);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
/* clear all caps to prevent bypassing capable() checks */
cap_clear((*newcred)->cap_bset);
cap_clear((*newcred)->cap_effective);
cap_clear((*newcred)->cap_inheritable);
cap_clear((*newcred)->cap_permitted);
if (cmd == BTRFS_IOC_SNAP_DESTROY) {
kuid_t kuid_root = make_kuid(sb->s_user_ns, 0);
/*
* Allow the root user in the container to remove subvolumes
* from other users.
*/
if (uid_valid(kuid_root) && uid_eq(fsuid, kuid_root))
cap_raise((*newcred)->cap_effective, CAP_DAC_OVERRIDE);
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
put_cred(override_creds(*newcred));
return 0;
}
static inline void shiftfs_revert_ioctl_creds(const struct cred *oldcred,
struct cred *newcred)
{
return shiftfs_revert_object_creds(oldcred, newcred);
}
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
static inline bool is_btrfs_snap_ioctl(int cmd)
{
if ((cmd == BTRFS_IOC_SNAP_CREATE) || (cmd == BTRFS_IOC_SNAP_CREATE_V2))
return true;
return false;
}
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
static int shiftfs_btrfs_ioctl_fd_restore(int cmd, int fd, void __user *arg,
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
struct btrfs_ioctl_vol_args *v1,
struct btrfs_ioctl_vol_args_v2 *v2)
{
int ret;
if (!is_btrfs_snap_ioctl(cmd))
return 0;
if (cmd == BTRFS_IOC_SNAP_CREATE)
ret = copy_to_user(arg, v1, sizeof(*v1));
else
ret = copy_to_user(arg, v2, sizeof(*v2));
__close_fd(current->files, fd);
kfree(v1);
kfree(v2);
return ret ? -EFAULT: 0;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
}
static int shiftfs_btrfs_ioctl_fd_replace(int cmd, void __user *arg,
struct btrfs_ioctl_vol_args **b1,
struct btrfs_ioctl_vol_args_v2 **b2,
int *newfd)
{
int oldfd, ret;
struct fd src;
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
struct fd lfd = {};
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
struct btrfs_ioctl_vol_args *v1 = NULL;
struct btrfs_ioctl_vol_args_v2 *v2 = NULL;
*b1 = NULL;
*b2 = NULL;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
if (!is_btrfs_snap_ioctl(cmd))
return 0;
if (cmd == BTRFS_IOC_SNAP_CREATE) {
v1 = memdup_user(arg, sizeof(*v1));
if (IS_ERR(v1))
return PTR_ERR(v1);
oldfd = v1->fd;
} else {
v2 = memdup_user(arg, sizeof(*v2));
if (IS_ERR(v2))
return PTR_ERR(v2);
oldfd = v2->fd;
}
src = fdget(oldfd);
if (!src.file) {
ret = -EINVAL;
goto err_free;
}
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
ret = shiftfs_real_fdget(src.file, &lfd);
if (ret) {
fdput(src);
goto err_free;
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
}
/*
* shiftfs_real_fdget() does not take a reference to lfd.file, so
* take a reference here to offset the one which will be put by
* __close_fd(), and make sure that reference is put on fdput(lfd).
*/
get_file(lfd.file);
lfd.flags |= FDPUT_FPUT;
fdput(src);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
*newfd = get_unused_fd_flags(lfd.file->f_flags);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
if (*newfd < 0) {
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
fdput(lfd);
ret = *newfd;
goto err_free;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
}
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
fd_install(*newfd, lfd.file);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
if (cmd == BTRFS_IOC_SNAP_CREATE) {
v1->fd = *newfd;
ret = copy_to_user(arg, v1, sizeof(*v1));
v1->fd = oldfd;
} else {
v2->fd = *newfd;
ret = copy_to_user(arg, v2, sizeof(*v2));
v2->fd = oldfd;
}
if (!ret) {
*b1 = v1;
*b2 = v2;
} else {
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
shiftfs_btrfs_ioctl_fd_restore(cmd, *newfd, arg, v1, v2);
ret = -EFAULT;
}
return ret;
err_free:
kfree(v1);
kfree(v2);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
return ret;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static long shiftfs_real_ioctl(struct file *file, unsigned int cmd,
unsigned long arg)
{
struct fd lowerfd;
struct cred *newcred;
const struct cred *oldcred;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
int newfd = -EBADF;
long err = 0, ret = 0;
void __user *argp = (void __user *)arg;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct super_block *sb = file->f_path.dentry->d_sb;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
struct btrfs_ioctl_vol_args *btrfs_v1 = NULL;
struct btrfs_ioctl_vol_args_v2 *btrfs_v2 = NULL;
ret = shiftfs_btrfs_ioctl_fd_replace(cmd, argp, &btrfs_v1, &btrfs_v2,
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
&newfd);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
if (ret < 0)
return ret;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
ret = shiftfs_real_fdget(file, &lowerfd);
if (ret)
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
goto out_restore;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
ret = shiftfs_override_ioctl_creds(cmd, sb, &oldcred, &newcred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (ret)
goto out_fdput;
ret = vfs_ioctl(lowerfd.file, cmd, arg);
shiftfs_revert_ioctl_creds(oldcred, newcred);
shiftfs_copyattr(file_inode(lowerfd.file), file_inode(file));
shiftfs_copyflags(file_inode(lowerfd.file), file_inode(file));
out_fdput:
fdput(lowerfd);
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
out_restore:
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling BugLink: https://bugs.launchpad.net/bugs/1850867 shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow. Original bug report and test case from Jann Horn is below. Fix this, and at the sametime simplify the management of the fd to the lower file for the ioctl. In shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to the lower file and set FDPUT_FPUT so that this reference will get dropped on fdput() in error paths. Do not maintain the struct fd in the caller, as it the fd installed in the fd table is sufficient to properly clean up. Finally, remove the fdput() in shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the __close_fd() call. Original report from Jann Horn: In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me): src = fdget(oldfd); if (!src.file) return -EINVAL; // src holds one reference (assuming multithreaded execution) ret = shiftfs_real_fdget(src.file, lfd); // lfd->file is a file* now, but shiftfs_real_fdget didn't take any // extra references fdput(src); // this drops the only reference we were holding on src, and src was // the only thing holding a reference to lfd->file. lfd->file may be // dangling at this point. if (ret) return ret; *newfd = get_unused_fd_flags(lfd->file->f_flags); if (*newfd < 0) { // always a no-op fdput(*lfd); return *newfd; } fd_install(*newfd, lfd->file); // fd_install() consumes a counted reference, but we don't hold any // counted references. so at this point, if lfd->file hasn't been freed // yet, its refcount is one lower than it ought to be. [...] // the following code is refcount-neutral, so the refcount stays one too // low. if (ret) shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2); shiftfs_real_fdget() is implemented as follows: static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd) { struct shiftfs_file_info *file_info = file->private_data; struct file *realfile = file_info->realfile; lowerfd->flags = 0; lowerfd->file = realfile; /* Did the flags change since open? */ if (unlikely(file->f_flags & ~lowerfd->file->f_flags)) return shiftfs_change_flags(lowerfd->file, file->f_flags); return 0; } Therefore, the following PoC will cause reference count overdecrements; I ran it with SLUB debugging enabled and got the following splat: ======================================= user@ubuntu1910vm:~/shiftfs$ cat run.sh sync unshare -mUr ./run2.sh t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh set -e mkdir -p mnt/tmpfs mkdir -p mnt/shiftfs mount -t tmpfs none mnt/tmpfs mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs mount|grep shift touch mnt/tmpfs/foo gcc -o ioctl ioctl.c -Wall ./ioctl user@ubuntu1910vm:~/shiftfs$ cat ioctl.c int main(void) { int root = open("mnt/shiftfs", O_RDONLY); if (root == -1) err(1, "open shiftfs root"); int foofd = openat(root, "foo", O_RDONLY); if (foofd == -1) err(1, "open foofd"); struct btrfs_ioctl_vol_args iocarg = { .fd = foofd }; ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg); sleep(1); void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0); if (map != MAP_FAILED) munmap(map, 0x1000); } user@ubuntu1910vm:~/shiftfs$ ./run.sh none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000) /home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2) [ 183.463452] general protection fault: 0000 [#1] SMP PTI [ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu [ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014 [ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 183.510580] Call Trace: [ 183.511396] mmap_region+0x417/0x670 [ 183.512592] do_mmap+0x3a8/0x580 [ 183.513655] vm_mmap_pgoff+0xcb/0x120 [ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0 [ 183.516155] __x64_sys_mmap+0x33/0x40 [ 183.517352] do_syscall_64+0x5a/0x130 [ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.520196] RIP: 0033:0x7f1d01bfaaf6 [ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61 [ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6 [ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000 [ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000 [ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140 [ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000 [ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover [ 183.560350] ---[ end trace 4a860910803657c2 ]--- [ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs] [ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00 [ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206 [ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000 [ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400 [ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000 [ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0 [ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40 [ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000 [ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0 [ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ======================================= Disassembly of surrounding code: 55 push rbp 4889E5 mov rbp,rsp 4157 push r15 4156 push r14 4155 push r13 4154 push r12 488B87C8000000 mov rax,[rdi+0xc8] 4C8B6810 mov r13,[rax+0x10] 498B4528 mov rax,[r13+0x28] 4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE 0F8497000000 jz near 0xcc 4989FC mov r12,rdi 4989F6 mov r14,rsi This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I think this corresponds to the load of "realfile->f_op->mmap" in the source code. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> CVE-2019-15791 Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
err = shiftfs_btrfs_ioctl_fd_restore(cmd, newfd, argp,
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
btrfs_v1, btrfs_v2);
if (!ret)
ret = err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return ret;
}
static bool in_ioctl_whitelist(int flag, unsigned long arg)
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
{
void __user *argp = (void __user *)arg;
u64 flags = 0;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
switch (flag) {
case BTRFS_IOC_FS_INFO:
return true;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
case BTRFS_IOC_SNAP_CREATE:
return true;
case BTRFS_IOC_SNAP_CREATE_V2:
return true;
case BTRFS_IOC_SUBVOL_CREATE:
return true;
case BTRFS_IOC_SUBVOL_CREATE_V2:
return true;
case BTRFS_IOC_SUBVOL_GETFLAGS:
return true;
case BTRFS_IOC_SUBVOL_SETFLAGS:
if (copy_from_user(&flags, argp, sizeof(flags)))
return false;
if (flags & ~BTRFS_SUBVOL_RDONLY)
return false;
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
return true;
case BTRFS_IOC_SNAP_DESTROY:
return true;
}
return false;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static long shiftfs_ioctl(struct file *file, unsigned int cmd,
unsigned long arg)
{
switch (cmd) {
case FS_IOC_GETVERSION:
/* fall through */
case FS_IOC_GETFLAGS:
/* fall through */
case FS_IOC_SETFLAGS:
break;
default:
if (!in_ioctl_whitelist(cmd, arg) ||
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
!shiftfs_passthrough_ioctls(file->f_path.dentry->d_sb->s_fs_info))
return -ENOTTY;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
return shiftfs_real_ioctl(file, cmd, arg);
}
static long shiftfs_compat_ioctl(struct file *file, unsigned int cmd,
unsigned long arg)
{
switch (cmd) {
case FS_IOC32_GETVERSION:
/* fall through */
case FS_IOC32_GETFLAGS:
/* fall through */
case FS_IOC32_SETFLAGS:
break;
default:
if (!in_ioctl_whitelist(cmd, arg) ||
UBUNTU: SAUCE: shiftfs: support some btrfs ioctls BugLink: https://bugs.launchpad.net/bugs/1823186 Shiftfs currently only passes through a few ioctl()s to the underlay. These are ioctl()s that are generally considered safe. Doing it for random ioctl()s would be a security issue. Permissions for ioctl()s are not checked before the filesystem gets involved so if we were to override credentials we e.g. could do a btrfs tree search in the underlay which we normally wouldn't be allowed to do. However, the btrfs filesystem allows unprivileged users to perform various operations through its ioctl() interface. With shiftfs these ioctl() are currently not working. To not regress users that expect btrfs ioctl()s to work in unprivileged containers we can create a whitelist of ioctl()s that we allow to go through to the underlay and for which we also switch credentials. The main problem is how we switch credentials. Since permissions checks for ioctl()s are done by the actual file system and not by the vfs this would mean that any additional capable(<cap>)-based checks done by the filesystem would unconditonally pass after we switch credentials. So to make credential switching safe we drop *all* capabilities when switching credentials. This means that only inode-based permission checks will pass. Btrfs also allows unprivileged users to delete snapshots when the filesystem is mounted with user_subvol_rm_allowed mount option or if the the callers is capable(CAP_SYS_ADMIN). The latter should never be the case with unprivileged users. To make sure we only allow removal of snapshots in the former case we drop all capabilities (see above) when switching credentials. Additonally, btrfs allows the creation of snapshots. To make this work we need to be (too) clever. When doing snapshots btrfs requires that an fd to the directory the snapshot is supposed to be created in be passed along. This fd obviously references a shiftfs file and as such a shiftfs dentry and inode. This will cause btrfs to yell EXDEV. To circumnavigate this problem we need to silently temporarily replace the passed in fd with an fd that refers to a file that references a btrfs dentry and inode. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:13 +00:00
!shiftfs_passthrough_ioctls(file->f_path.dentry->d_sb->s_fs_info))
return -ENOIOCTLCMD;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
return shiftfs_real_ioctl(file, cmd, arg);
}
enum shiftfs_copyop {
SHIFTFS_COPY,
SHIFTFS_CLONE,
SHIFTFS_DEDUPE,
};
static ssize_t shiftfs_copyfile(struct file *file_in, loff_t pos_in,
struct file *file_out, loff_t pos_out, u64 len,
unsigned int flags, enum shiftfs_copyop op)
{
ssize_t ret;
struct fd real_in, real_out;
const struct cred *oldcred;
struct inode *inode_out = file_inode(file_out);
struct inode *loweri = inode_out->i_private;
ret = shiftfs_real_fdget(file_out, &real_out);
if (ret)
return ret;
ret = shiftfs_real_fdget(file_in, &real_in);
if (ret) {
fdput(real_out);
return ret;
}
oldcred = shiftfs_override_creds(inode_out->i_sb);
switch (op) {
case SHIFTFS_COPY:
ret = vfs_copy_file_range(real_in.file, pos_in, real_out.file,
pos_out, len, flags);
break;
case SHIFTFS_CLONE:
ret = vfs_clone_file_range(real_in.file, pos_in, real_out.file,
pos_out, len, flags);
break;
case SHIFTFS_DEDUPE:
ret = vfs_dedupe_file_range_one(real_in.file, pos_in,
real_out.file, pos_out, len,
flags);
break;
}
revert_creds(oldcred);
/* Update size */
shiftfs_copyattr(loweri, inode_out);
fdput(real_in);
fdput(real_out);
return ret;
}
static ssize_t shiftfs_copy_file_range(struct file *file_in, loff_t pos_in,
struct file *file_out, loff_t pos_out,
size_t len, unsigned int flags)
{
return shiftfs_copyfile(file_in, pos_in, file_out, pos_out, len, flags,
SHIFTFS_COPY);
}
static loff_t shiftfs_remap_file_range(struct file *file_in, loff_t pos_in,
struct file *file_out, loff_t pos_out,
loff_t len, unsigned int remap_flags)
{
enum shiftfs_copyop op;
if (remap_flags & ~(REMAP_FILE_DEDUP | REMAP_FILE_ADVISORY))
return -EINVAL;
if (remap_flags & REMAP_FILE_DEDUP)
op = SHIFTFS_DEDUPE;
else
op = SHIFTFS_CLONE;
return shiftfs_copyfile(file_in, pos_in, file_out, pos_out, len,
remap_flags, op);
}
static int shiftfs_iterate_shared(struct file *file, struct dir_context *ctx)
{
const struct cred *oldcred;
int err = -ENOTDIR;
struct file *realfile = file->private_data;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
err = iterate_dir(realfile, ctx);
revert_creds(oldcred);
return err;
}
const struct file_operations shiftfs_file_operations = {
.open = shiftfs_open,
.release = shiftfs_release,
.llseek = shiftfs_file_llseek,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
.read_iter = shiftfs_read_iter,
.write_iter = shiftfs_write_iter,
.fsync = shiftfs_fsync,
.mmap = shiftfs_mmap,
.fallocate = shiftfs_fallocate,
.fadvise = shiftfs_fadvise,
.unlocked_ioctl = shiftfs_ioctl,
.compat_ioctl = shiftfs_compat_ioctl,
.copy_file_range = shiftfs_copy_file_range,
.remap_file_range = shiftfs_remap_file_range,
};
const struct file_operations shiftfs_dir_operations = {
.open = shiftfs_dir_open,
.release = shiftfs_dir_release,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
.compat_ioctl = shiftfs_compat_ioctl,
.fsync = shiftfs_fsync,
.iterate_shared = shiftfs_iterate_shared,
.llseek = shiftfs_dir_llseek,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
.read = generic_read_dir,
.unlocked_ioctl = shiftfs_ioctl,
};
static const struct address_space_operations shiftfs_aops = {
/* For O_DIRECT dentry_open() checks f_mapping->a_ops->direct_IO */
.direct_IO = noop_direct_IO,
};
static void shiftfs_fill_inode(struct inode *inode, unsigned long ino,
umode_t mode, dev_t dev, struct dentry *dentry)
{
struct inode *loweri;
inode->i_ino = ino;
inode->i_flags |= S_NOCMTIME;
mode &= S_IFMT;
inode->i_mode = mode;
switch (mode & S_IFMT) {
case S_IFDIR:
inode->i_op = &shiftfs_dir_inode_operations;
inode->i_fop = &shiftfs_dir_operations;
break;
case S_IFLNK:
inode->i_op = &shiftfs_symlink_inode_operations;
break;
case S_IFREG:
inode->i_op = &shiftfs_file_inode_operations;
inode->i_fop = &shiftfs_file_operations;
inode->i_mapping->a_ops = &shiftfs_aops;
break;
default:
inode->i_op = &shiftfs_special_inode_operations;
init_special_inode(inode, mode, dev);
break;
}
if (!dentry)
return;
loweri = dentry->d_inode;
if (!loweri->i_op->get_link)
inode->i_opflags |= IOP_NOFOLLOW;
shiftfs_copyattr(loweri, inode);
shiftfs_copyflags(loweri, inode);
set_nlink(inode, loweri->i_nlink);
}
static int shiftfs_show_options(struct seq_file *m, struct dentry *dentry)
{
struct super_block *sb = dentry->d_sb;
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
if (sbinfo->mark)
seq_show_option(m, "mark", NULL);
if (sbinfo->passthrough)
seq_printf(m, ",passthrough=%u", sbinfo->passthrough);
return 0;
}
static int shiftfs_statfs(struct dentry *dentry, struct kstatfs *buf)
{
struct super_block *sb = dentry->d_sb;
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
struct dentry *root = sb->s_root;
struct dentry *realroot = root->d_fsdata;
struct path realpath = { .mnt = sbinfo->mnt, .dentry = realroot };
int err;
err = vfs_statfs(&realpath, buf);
if (err)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (!shiftfs_passthrough_statfs(sbinfo))
buf->f_type = sb->s_magic;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static void shiftfs_evict_inode(struct inode *inode)
{
struct inode *loweri = inode->i_private;
clear_inode(inode);
if (loweri)
iput(loweri);
}
static void shiftfs_put_super(struct super_block *sb)
{
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
if (sbinfo) {
mntput(sbinfo->mnt);
put_cred(sbinfo->creator_cred);
kfree(sbinfo);
}
}
static const struct xattr_handler shiftfs_xattr_handler = {
.prefix = "",
.get = shiftfs_xattr_get,
.set = shiftfs_xattr_set,
};
const struct xattr_handler *shiftfs_xattr_handlers[] = {
#ifdef CONFIG_SHIFT_FS_POSIX_ACL
&shiftfs_posix_acl_access_xattr_handler,
&shiftfs_posix_acl_default_xattr_handler,
#endif
&shiftfs_xattr_handler,
NULL
};
static inline bool passthrough_is_subset(int old_flags, int new_flags)
{
if ((new_flags & old_flags) != new_flags)
return false;
return true;
}
static int shiftfs_super_check_flags(unsigned long old_flags,
unsigned long new_flags)
{
if ((old_flags & SB_RDONLY) && !(new_flags & SB_RDONLY))
return -EPERM;
if ((old_flags & SB_NOSUID) && !(new_flags & SB_NOSUID))
return -EPERM;
if ((old_flags & SB_NODEV) && !(new_flags & SB_NODEV))
return -EPERM;
if ((old_flags & SB_NOEXEC) && !(new_flags & SB_NOEXEC))
return -EPERM;
if ((old_flags & SB_NOATIME) && !(new_flags & SB_NOATIME))
return -EPERM;
if ((old_flags & SB_NODIRATIME) && !(new_flags & SB_NODIRATIME))
return -EPERM;
if (!(old_flags & SB_POSIXACL) && (new_flags & SB_POSIXACL))
return -EPERM;
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_remount(struct super_block *sb, int *flags, char *data)
{
int err;
struct shiftfs_super_info new = {};
struct shiftfs_super_info *info = sb->s_fs_info;
err = shiftfs_parse_mount_options(&new, data);
if (err)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
return err;
err = shiftfs_super_check_flags(sb->s_flags, *flags);
if (err)
return err;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
/* Mark mount option cannot be changed. */
if (info->mark || (info->mark != new.mark))
return -EPERM;
if (info->passthrough != new.passthrough) {
/* Don't allow exceeding passthrough options of mark mount. */
if (!passthrough_is_subset(info->passthrough_mark,
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
info->passthrough))
return -EPERM;
info->passthrough = new.passthrough;
}
return 0;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static const struct super_operations shiftfs_super_ops = {
.put_super = shiftfs_put_super,
.show_options = shiftfs_show_options,
.statfs = shiftfs_statfs,
.remount_fs = shiftfs_remount,
.evict_inode = shiftfs_evict_inode,
};
struct shiftfs_data {
void *data;
const char *path;
};
static void shiftfs_super_force_flags(struct super_block *sb,
unsigned long lower_flags)
{
sb->s_flags |= lower_flags & (SB_RDONLY | SB_NOSUID | SB_NODEV |
SB_NOEXEC | SB_NOATIME | SB_NODIRATIME);
if (!(lower_flags & SB_POSIXACL))
sb->s_flags &= ~SB_POSIXACL;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
static int shiftfs_fill_super(struct super_block *sb, void *raw_data,
int silent)
{
int err;
struct path path = {};
struct shiftfs_super_info *sbinfo_mp;
char *name = NULL;
struct inode *inode = NULL;
struct dentry *dentry = NULL;
struct shiftfs_data *data = raw_data;
struct shiftfs_super_info *sbinfo = NULL;
if (!data->path)
return -EINVAL;
sb->s_fs_info = kzalloc(sizeof(*sbinfo), GFP_KERNEL);
if (!sb->s_fs_info)
return -ENOMEM;
sbinfo = sb->s_fs_info;
err = shiftfs_parse_mount_options(sbinfo, data->data);
if (err)
return err;
/* to mount a mark, must be userns admin */
if (!sbinfo->mark && !ns_capable(current_user_ns(), CAP_SYS_ADMIN))
return -EPERM;
name = kstrdup(data->path, GFP_KERNEL);
if (!name)
return -ENOMEM;
err = kern_path(name, LOOKUP_FOLLOW, &path);
if (err)
goto out_free_name;
if (!S_ISDIR(path.dentry->d_inode->i_mode)) {
err = -ENOTDIR;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
goto out_put_path;
}
sb->s_flags |= SB_POSIXACL;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (sbinfo->mark) {
struct cred *cred_tmp;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
struct super_block *lower_sb = path.mnt->mnt_sb;
/* to mark a mount point, must root wrt lower s_user_ns */
if (!ns_capable(lower_sb->s_user_ns, CAP_SYS_ADMIN)) {
err = -EPERM;
goto out_put_path;
}
/*
* this part is visible unshifted, so make sure no
* executables that could be used to give suid
* privileges
*/
sb->s_iflags = SB_I_NOEXEC;
shiftfs_super_force_flags(sb, lower_sb->s_flags);
/*
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
* Handle nesting of shiftfs mounts by referring this mark
* mount back to the original mark mount. This is more
* efficient and alleviates concerns about stack depth.
*/
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
if (lower_sb->s_magic == SHIFTFS_MAGIC) {
sbinfo_mp = lower_sb->s_fs_info;
/* Doesn't make sense to mark a mark mount */
if (sbinfo_mp->mark) {
err = -EINVAL;
goto out_put_path;
}
if (!passthrough_is_subset(sbinfo_mp->passthrough,
sbinfo->passthrough)) {
err = -EPERM;
goto out_put_path;
}
sbinfo->mnt = mntget(sbinfo_mp->mnt);
dentry = dget(path.dentry->d_fsdata);
/*
* Copy up the passthrough mount options from the
* parent mark mountpoint.
*/
sbinfo->passthrough_mark = sbinfo_mp->passthrough_mark;
sbinfo->creator_cred = get_cred(sbinfo_mp->creator_cred);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
} else {
sbinfo->mnt = mntget(path.mnt);
dentry = dget(path.dentry);
/*
* For a new mark passthrough_mark and passthrough
* are identical.
*/
sbinfo->passthrough_mark = sbinfo->passthrough;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
cred_tmp = prepare_creds();
if (!cred_tmp) {
err = -ENOMEM;
goto out_put_path;
}
/* Don't override disk quota limits or use reserved space. */
cap_lower(cred_tmp->cap_effective, CAP_SYS_RESOURCE);
sbinfo->creator_cred = cred_tmp;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
} else {
/*
* This leg executes if we're admin capable in the namespace,
* so be very careful.
*/
err = -EPERM;
if (path.dentry->d_sb->s_magic != SHIFTFS_MAGIC)
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
goto out_put_path;
sbinfo_mp = path.dentry->d_sb->s_fs_info;
if (!sbinfo_mp->mark)
goto out_put_path;
if (!passthrough_is_subset(sbinfo_mp->passthrough,
sbinfo->passthrough))
goto out_put_path;
sbinfo->mnt = mntget(sbinfo_mp->mnt);
sbinfo->creator_cred = get_cred(sbinfo_mp->creator_cred);
dentry = dget(path.dentry->d_fsdata);
/*
* Copy up passthrough settings from mark mountpoint so we can
* verify when the overlay wants to remount with different
* passthrough settings.
*/
sbinfo->passthrough_mark = sbinfo_mp->passthrough;
shiftfs_super_force_flags(sb, path.mnt->mnt_sb->s_flags);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
}
sb->s_stack_depth = dentry->d_sb->s_stack_depth + 1;
if (sb->s_stack_depth > FILESYSTEM_MAX_STACK_DEPTH) {
printk(KERN_ERR "shiftfs: maximum stacking depth exceeded\n");
err = -EINVAL;
goto out_put_path;
}
inode = new_inode(sb);
if (!inode) {
err = -ENOMEM;
goto out_put_path;
}
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
shiftfs_fill_inode(inode, dentry->d_inode->i_ino, S_IFDIR, 0, dentry);
ihold(dentry->d_inode);
inode->i_private = dentry->d_inode;
sb->s_magic = SHIFTFS_MAGIC;
sb->s_maxbytes = MAX_LFS_FILESIZE;
sb->s_op = &shiftfs_super_ops;
sb->s_xattr = shiftfs_xattr_handlers;
sb->s_d_op = &shiftfs_dentry_ops;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
sb->s_root = d_make_root(inode);
if (!sb->s_root) {
err = -ENOMEM;
goto out_put_path;
}
sb->s_root->d_fsdata = dentry;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
sbinfo->userns = get_user_ns(dentry->d_sb->s_user_ns);
shiftfs_copyattr(dentry->d_inode, sb->s_root->d_inode);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
dentry = NULL;
err = 0;
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
out_put_path:
path_put(&path);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
out_free_name:
kfree(name);
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
dput(dentry);
return err;
}
static struct dentry *shiftfs_mount(struct file_system_type *fs_type,
int flags, const char *dev_name, void *data)
{
struct shiftfs_data d = { data, dev_name };
return mount_nodev(fs_type, flags, &d, shiftfs_fill_super);
}
static struct file_system_type shiftfs_type = {
.owner = THIS_MODULE,
.name = "shiftfs",
.mount = shiftfs_mount,
.kill_sb = kill_anon_super,
.fs_flags = FS_USERNS_MOUNT,
};
static int __init shiftfs_init(void)
{
return register_filesystem(&shiftfs_type);
}
static void __exit shiftfs_exit(void)
{
unregister_filesystem(&shiftfs_type);
}
MODULE_ALIAS_FS("shiftfs");
MODULE_AUTHOR("James Bottomley");
UBUNTU: SAUCE: shiftfs: rework and extend BugLink: https://bugs.launchpad.net/bugs/1823186 /* Introduction */ The shiftfs filesystem is implemented as a stacking filesystem. Since it is a stacking filesystem it shares concepts with overlayfs and ecryptfs. Usually, shiftfs will be stacked upon another filesystem. The filesystem on top - shiftfs - is referred to as "upper filesystem" or "overlay" and the filesystem it is stacked upon is referred to as "lower filesystem" or "underlay". /* Marked and Unmarked shiftfs mounts */ To use shiftfs it is necessary that a given mount is marked as shiftable via the "mark" mount option. Any mount of shiftfs without the "mark" mount option not on top of a shiftfs mount with the "mark" mount option will be refused with EPERM. After a marked shiftfs mount has been performed other shiftfs mounts referencing the marked shiftfs mount can be created. These secondary shiftfs mounts are usually what are of interest. The marked shiftfs mount will take a reference to the underlying mountpoint of the directory it is marking as shiftable. Any unmarked shiftfts mounts referencing this marked shifts mount will take a second reference to this directory as well. This ensures that the underlying marked shiftfs mount can be unmounted thereby dropping the reference to the underlying directory without invalidating the mountpoint of said directory since the non-marked shiftfs mount still holds another reference to it. /* Stacking Depth */ Shiftfs tries to keep the stack as flat as possible to avoid hitting the kernel enforced filesystem stacking limit. /* Permission Model */ When the mark shiftfs mount is created shiftfs will record the credentials of the creator of the super block and stash it in the super block. When other non-mark shiftfs mounts are created that reference the mark shiftfs mount they will stash another reference to the creators credentials. Before calling into the underlying filesystem shiftfs will switch to the creators credentials and revert to the original credentials after the underlying filesystem operation returns. /* Mount Options */ - mark When set the mark mount option indicates that the mount in question is allowed to be shifted. Since shiftfs it mountable in by user namespace root non-initial user namespace this mount options ensures that the system administrator has decided that the marked mount is safe to be shifted. To mark a mount as shiftable CAP_SYS_ADMIN in the user namespace is required. - passthrough={0,1,2,3} This mount options functions as a bitmask. When set to a non-zero value shiftfs will try to act as an invisible shim sitting on top of the underlying filesystem. - 1: Shifts will report the filesystem type of the underlay for stat-like system calls. - 2: Shiftfs will passthrough whitelisted ioctl() to the underlay. - 3: Shiftfs will both use 1 and 2. Note that mount options on a marked mount cannot be changed. /* Extended Attributes */ Shiftfs will make sure to translate extended attributes. /* Inodes Numbers */ Shiftfs inodes numbers are copied up from the underlying filesystem, i.e. shiftfs inode numbers will be identical to the corresponding underlying filesystem's inode numbers. This has the advantage that inotify and friends should work out of the box. (In essence, shiftfs is nothing but a 1:1 mirror of the underlying filesystem's dentries and inodes.) /* Device Support */ Shiftfs only supports the creation of pipe and socket devices. Character and block devices cannot be created through shiftfs. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com> Acked-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
2019-04-04 13:39:12 +00:00
MODULE_AUTHOR("Seth Forshee <seth.forshee@canonical.com>");
MODULE_AUTHOR("Christian Brauner <christian.brauner@ubuntu.com>");
MODULE_DESCRIPTION("id shifting filesystem");
MODULE_LICENSE("GPL v2");
module_init(shiftfs_init)
module_exit(shiftfs_exit)