]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
e149ed2b | 2 | #include <linux/mount.h> |
059b20d9 | 3 | #include <linux/pseudo_fs.h> |
e149ed2b AV |
4 | #include <linux/file.h> |
5 | #include <linux/fs.h> | |
7bebd69e | 6 | #include <linux/proc_fs.h> |
e149ed2b AV |
7 | #include <linux/proc_ns.h> |
8 | #include <linux/magic.h> | |
9 | #include <linux/ktime.h> | |
75509fd8 | 10 | #include <linux/seq_file.h> |
6786741d AV |
11 | #include <linux/user_namespace.h> |
12 | #include <linux/nsfs.h> | |
d95fa3c7 | 13 | #include <linux/uaccess.h> |
e149ed2b | 14 | |
7bebd69e EB |
15 | #include "internal.h" |
16 | ||
e149ed2b AV |
17 | static struct vfsmount *nsfs_mnt; |
18 | ||
6786741d AV |
19 | static long ns_ioctl(struct file *filp, unsigned int ioctl, |
20 | unsigned long arg); | |
e149ed2b AV |
21 | static const struct file_operations ns_file_operations = { |
22 | .llseek = no_llseek, | |
6786741d | 23 | .unlocked_ioctl = ns_ioctl, |
e149ed2b AV |
24 | }; |
25 | ||
26 | static char *ns_dname(struct dentry *dentry, char *buffer, int buflen) | |
27 | { | |
75c3cfa8 | 28 | struct inode *inode = d_inode(dentry); |
e149ed2b AV |
29 | const struct proc_ns_operations *ns_ops = dentry->d_fsdata; |
30 | ||
31 | return dynamic_dname(dentry, buffer, buflen, "%s:[%lu]", | |
32 | ns_ops->name, inode->i_ino); | |
33 | } | |
34 | ||
35 | static void ns_prune_dentry(struct dentry *dentry) | |
36 | { | |
75c3cfa8 | 37 | struct inode *inode = d_inode(dentry); |
e149ed2b AV |
38 | if (inode) { |
39 | struct ns_common *ns = inode->i_private; | |
40 | atomic_long_set(&ns->stashed, 0); | |
41 | } | |
42 | } | |
43 | ||
44 | const struct dentry_operations ns_dentry_operations = | |
45 | { | |
46 | .d_prune = ns_prune_dentry, | |
47 | .d_delete = always_delete_dentry, | |
48 | .d_dname = ns_dname, | |
49 | }; | |
50 | ||
51 | static void nsfs_evict(struct inode *inode) | |
52 | { | |
53 | struct ns_common *ns = inode->i_private; | |
54 | clear_inode(inode); | |
55 | ns->ops->put(ns); | |
56 | } | |
57 | ||
ce623f89 | 58 | static int __ns_get_path(struct path *path, struct ns_common *ns) |
e149ed2b | 59 | { |
213b067c | 60 | struct vfsmount *mnt = nsfs_mnt; |
e149ed2b AV |
61 | struct dentry *dentry; |
62 | struct inode *inode; | |
e149ed2b AV |
63 | unsigned long d; |
64 | ||
e149ed2b AV |
65 | rcu_read_lock(); |
66 | d = atomic_long_read(&ns->stashed); | |
67 | if (!d) | |
68 | goto slow; | |
69 | dentry = (struct dentry *)d; | |
70 | if (!lockref_get_not_dead(&dentry->d_lockref)) | |
71 | goto slow; | |
72 | rcu_read_unlock(); | |
6786741d | 73 | ns->ops->put(ns); |
e149ed2b | 74 | got_it: |
213b067c | 75 | path->mnt = mntget(mnt); |
e149ed2b | 76 | path->dentry = dentry; |
ce623f89 | 77 | return 0; |
e149ed2b AV |
78 | slow: |
79 | rcu_read_unlock(); | |
80 | inode = new_inode_pseudo(mnt->mnt_sb); | |
81 | if (!inode) { | |
6786741d | 82 | ns->ops->put(ns); |
ce623f89 | 83 | return -ENOMEM; |
e149ed2b AV |
84 | } |
85 | inode->i_ino = ns->inum; | |
078cd827 | 86 | inode->i_mtime = inode->i_atime = inode->i_ctime = current_time(inode); |
e149ed2b AV |
87 | inode->i_flags |= S_IMMUTABLE; |
88 | inode->i_mode = S_IFREG | S_IRUGO; | |
89 | inode->i_fop = &ns_file_operations; | |
90 | inode->i_private = ns; | |
91 | ||
5467a68c | 92 | dentry = d_alloc_anon(mnt->mnt_sb); |
e149ed2b AV |
93 | if (!dentry) { |
94 | iput(inode); | |
ce623f89 | 95 | return -ENOMEM; |
e149ed2b AV |
96 | } |
97 | d_instantiate(dentry, inode); | |
6786741d | 98 | dentry->d_fsdata = (void *)ns->ops; |
e149ed2b AV |
99 | d = atomic_long_cmpxchg(&ns->stashed, 0, (unsigned long)dentry); |
100 | if (d) { | |
101 | d_delete(dentry); /* make sure ->d_prune() does nothing */ | |
102 | dput(dentry); | |
103 | cpu_relax(); | |
ce623f89 | 104 | return -EAGAIN; |
e149ed2b AV |
105 | } |
106 | goto got_it; | |
107 | } | |
108 | ||
ce623f89 | 109 | int ns_get_path_cb(struct path *path, ns_get_path_helper_t *ns_get_cb, |
cdab6ba8 | 110 | void *private_data) |
6786741d | 111 | { |
ce623f89 | 112 | int ret; |
6786741d | 113 | |
357ab5b5 AV |
114 | do { |
115 | struct ns_common *ns = ns_get_cb(private_data); | |
116 | if (!ns) | |
ce623f89 | 117 | return -ENOENT; |
357ab5b5 | 118 | ret = __ns_get_path(path, ns); |
ce623f89 | 119 | } while (ret == -EAGAIN); |
6786741d | 120 | |
6786741d AV |
121 | return ret; |
122 | } | |
123 | ||
cdab6ba8 JK |
124 | struct ns_get_path_task_args { |
125 | const struct proc_ns_operations *ns_ops; | |
126 | struct task_struct *task; | |
127 | }; | |
128 | ||
129 | static struct ns_common *ns_get_path_task(void *private_data) | |
130 | { | |
131 | struct ns_get_path_task_args *args = private_data; | |
132 | ||
133 | return args->ns_ops->get(args->task); | |
134 | } | |
135 | ||
ce623f89 | 136 | int ns_get_path(struct path *path, struct task_struct *task, |
cdab6ba8 JK |
137 | const struct proc_ns_operations *ns_ops) |
138 | { | |
139 | struct ns_get_path_task_args args = { | |
140 | .ns_ops = ns_ops, | |
141 | .task = task, | |
142 | }; | |
143 | ||
144 | return ns_get_path_cb(path, ns_get_path_task, &args); | |
145 | } | |
146 | ||
c62cce2c | 147 | int open_related_ns(struct ns_common *ns, |
6786741d AV |
148 | struct ns_common *(*get_ns)(struct ns_common *ns)) |
149 | { | |
150 | struct path path = {}; | |
151 | struct file *f; | |
ce623f89 | 152 | int err; |
6786741d AV |
153 | int fd; |
154 | ||
155 | fd = get_unused_fd_flags(O_CLOEXEC); | |
156 | if (fd < 0) | |
157 | return fd; | |
158 | ||
357ab5b5 | 159 | do { |
6786741d AV |
160 | struct ns_common *relative; |
161 | ||
162 | relative = get_ns(ns); | |
163 | if (IS_ERR(relative)) { | |
164 | put_unused_fd(fd); | |
165 | return PTR_ERR(relative); | |
166 | } | |
167 | ||
168 | err = __ns_get_path(&path, relative); | |
ce623f89 | 169 | } while (err == -EAGAIN); |
357ab5b5 | 170 | |
ce623f89 | 171 | if (err) { |
6786741d | 172 | put_unused_fd(fd); |
ce623f89 | 173 | return err; |
6786741d AV |
174 | } |
175 | ||
176 | f = dentry_open(&path, O_RDONLY, current_cred()); | |
177 | path_put(&path); | |
178 | if (IS_ERR(f)) { | |
179 | put_unused_fd(fd); | |
180 | fd = PTR_ERR(f); | |
181 | } else | |
182 | fd_install(fd, f); | |
183 | ||
184 | return fd; | |
185 | } | |
24dce080 | 186 | EXPORT_SYMBOL_GPL(open_related_ns); |
6786741d AV |
187 | |
188 | static long ns_ioctl(struct file *filp, unsigned int ioctl, | |
189 | unsigned long arg) | |
190 | { | |
d95fa3c7 | 191 | struct user_namespace *user_ns; |
6786741d | 192 | struct ns_common *ns = get_proc_ns(file_inode(filp)); |
d95fa3c7 MK |
193 | uid_t __user *argp; |
194 | uid_t uid; | |
6786741d AV |
195 | |
196 | switch (ioctl) { | |
197 | case NS_GET_USERNS: | |
198 | return open_related_ns(ns, ns_get_owner); | |
a7306ed8 AV |
199 | case NS_GET_PARENT: |
200 | if (!ns->ops->get_parent) | |
201 | return -EINVAL; | |
202 | return open_related_ns(ns, ns->ops->get_parent); | |
e5ff5ce6 MK |
203 | case NS_GET_NSTYPE: |
204 | return ns->ops->type; | |
d95fa3c7 MK |
205 | case NS_GET_OWNER_UID: |
206 | if (ns->ops->type != CLONE_NEWUSER) | |
207 | return -EINVAL; | |
208 | user_ns = container_of(ns, struct user_namespace, ns); | |
209 | argp = (uid_t __user *) arg; | |
210 | uid = from_kuid_munged(current_user_ns(), user_ns->owner); | |
211 | return put_user(uid, argp); | |
6786741d AV |
212 | default: |
213 | return -ENOTTY; | |
214 | } | |
215 | } | |
216 | ||
e149ed2b AV |
217 | int ns_get_name(char *buf, size_t size, struct task_struct *task, |
218 | const struct proc_ns_operations *ns_ops) | |
219 | { | |
220 | struct ns_common *ns; | |
221 | int res = -ENOENT; | |
25b14e92 | 222 | const char *name; |
e149ed2b AV |
223 | ns = ns_ops->get(task); |
224 | if (ns) { | |
25b14e92 KT |
225 | name = ns_ops->real_ns_name ? : ns_ops->name; |
226 | res = snprintf(buf, size, "%s:[%u]", name, ns->inum); | |
e149ed2b AV |
227 | ns_ops->put(ns); |
228 | } | |
229 | return res; | |
230 | } | |
231 | ||
303cc571 CB |
232 | bool proc_ns_file(const struct file *file) |
233 | { | |
234 | return file->f_op == &ns_file_operations; | |
235 | } | |
236 | ||
e149ed2b AV |
237 | struct file *proc_ns_fget(int fd) |
238 | { | |
239 | struct file *file; | |
240 | ||
241 | file = fget(fd); | |
242 | if (!file) | |
243 | return ERR_PTR(-EBADF); | |
244 | ||
245 | if (file->f_op != &ns_file_operations) | |
246 | goto out_invalid; | |
247 | ||
248 | return file; | |
249 | ||
250 | out_invalid: | |
251 | fput(file); | |
252 | return ERR_PTR(-EINVAL); | |
253 | } | |
254 | ||
1e2328e7 CN |
255 | /** |
256 | * ns_match() - Returns true if current namespace matches dev/ino provided. | |
257 | * @ns_common: current ns | |
258 | * @dev: dev_t from nsfs that will be matched against current nsfs | |
259 | * @ino: ino_t from nsfs that will be matched against current nsfs | |
260 | * | |
261 | * Return: true if dev and ino matches the current nsfs. | |
262 | */ | |
263 | bool ns_match(const struct ns_common *ns, dev_t dev, ino_t ino) | |
264 | { | |
265 | return (ns->inum == ino) && (nsfs_mnt->mnt_sb->s_dev == dev); | |
266 | } | |
267 | ||
268 | ||
75509fd8 EB |
269 | static int nsfs_show_path(struct seq_file *seq, struct dentry *dentry) |
270 | { | |
271 | struct inode *inode = d_inode(dentry); | |
272 | const struct proc_ns_operations *ns_ops = dentry->d_fsdata; | |
273 | ||
6798a8ca JP |
274 | seq_printf(seq, "%s:[%lu]", ns_ops->name, inode->i_ino); |
275 | return 0; | |
75509fd8 EB |
276 | } |
277 | ||
e149ed2b AV |
278 | static const struct super_operations nsfs_ops = { |
279 | .statfs = simple_statfs, | |
280 | .evict_inode = nsfs_evict, | |
75509fd8 | 281 | .show_path = nsfs_show_path, |
e149ed2b | 282 | }; |
059b20d9 DH |
283 | |
284 | static int nsfs_init_fs_context(struct fs_context *fc) | |
e149ed2b | 285 | { |
059b20d9 DH |
286 | struct pseudo_fs_context *ctx = init_pseudo(fc, NSFS_MAGIC); |
287 | if (!ctx) | |
288 | return -ENOMEM; | |
289 | ctx->ops = &nsfs_ops; | |
290 | ctx->dops = &ns_dentry_operations; | |
291 | return 0; | |
e149ed2b | 292 | } |
059b20d9 | 293 | |
e149ed2b AV |
294 | static struct file_system_type nsfs = { |
295 | .name = "nsfs", | |
059b20d9 | 296 | .init_fs_context = nsfs_init_fs_context, |
e149ed2b AV |
297 | .kill_sb = kill_anon_super, |
298 | }; | |
299 | ||
300 | void __init nsfs_init(void) | |
301 | { | |
302 | nsfs_mnt = kern_mount(&nsfs); | |
303 | if (IS_ERR(nsfs_mnt)) | |
304 | panic("can't set nsfs up\n"); | |
1751e8a6 | 305 | nsfs_mnt->mnt_sb->s_flags &= ~SB_NOUSER; |
e149ed2b | 306 | } |