Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3826976ybv; Mon, 10 Feb 2020 07:07:52 -0800 (PST) X-Google-Smtp-Source: APXvYqzrbe4OXrT3Zq6/SzqvDWwgiKkaFspnyU+N8GijrSz5Qt5IH0Y/HpFTeW+UX6KpyCh/fg+9 X-Received: by 2002:aca:48d0:: with SMTP id v199mr1079252oia.10.1581347272057; Mon, 10 Feb 2020 07:07:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581347272; cv=none; d=google.com; s=arc-20160816; b=tFLgxS9VGbXJI5k+imTJtWY1MGmuZHpILFbHQJCXgxMLqS4uLeVnkeUR5V/+vIZ2xX 1tqmIaBExi/b4S+fU4btdrye6QpnyN4xr6eBrBPeS2uI9qyO86NLMliQs5AsWdtOm3VI TLqAJZ2IQ/1gqMgpbJ4hVW1bDGL9fum9SBvKUtaWkcnaL0m4zUGkG2ebgfeGJhxEOThR ZkkAgVZrtIL9oXcKe6eDvMd38ExDvNouAfpV+koKkfloVJ+ej+mvAtryHYALdEV3QpoL GdhPIvzGTU4Ye+HDJdUmomfNSpMD5B3KSC7Q7a6o52QWIHo2u8i+aLsWImeMURuve41E xmzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=3zvAYdgZlXhDX9lpKhYBumfJDtH0TES6TplZnWqhNjA=; b=tEa34lRkSN69IEodurNFA1KoBMlr06F8wB+EzysT8AEy0BXA0isCbMYEeGPBtQRC3t m+67rgB1gxihRQkGu5HNTgQzrYqsg6Hld/cGekmtmhNUzAhGSDC1ueYtIeT0uA/Sfdkj cu1AwrnKjAerF0WO6L0TNAWw7ErS/2Wwr0PGFmX59ZwW0uW6silz3NkpImt5UjC9ZBqA eVFIq9wkImnEUVVX3ZVHF8o9zSb/pn9LPjY7PLmE5aVlTAIQDbV9sIW3CIdt6GB20i05 iBz/ccKrMoxMBhiwpwWT+1DFEls+0YWpw+931n2vDwLvLnv9gW4SdTnaWflAxyfyxLcv 6Afg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j65si288317otc.308.2020.02.10.07.07.39; Mon, 10 Feb 2020 07:07:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729154AbgBJPGI (ORCPT + 99 others); Mon, 10 Feb 2020 10:06:08 -0500 Received: from monster.unsafe.ru ([5.9.28.80]:53774 "EHLO mail.unsafe.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729081AbgBJPGH (ORCPT ); Mon, 10 Feb 2020 10:06:07 -0500 Received: from comp-core-i7-2640m-0182e6.redhat.com (nat-pool-brq-t.redhat.com [213.175.37.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.unsafe.ru (Postfix) with ESMTPSA id 107D5C61B1A; Mon, 10 Feb 2020 15:06:04 +0000 (UTC) From: Alexey Gladkov To: LKML , Kernel Hardening , Linux API , Linux FS Devel , Linux Security Module Cc: Akinobu Mita , Alexander Viro , Alexey Dobriyan , Alexey Gladkov , Andrew Morton , Andy Lutomirski , Daniel Micay , Djalal Harouni , "Dmitry V . Levin" , "Eric W . Biederman" , Greg Kroah-Hartman , Ingo Molnar , "J . Bruce Fields" , Jeff Layton , Jonathan Corbet , Kees Cook , Linus Torvalds , Oleg Nesterov , Solar Designer Subject: [PATCH v8 02/11] proc: add proc_fs_info struct to store proc information Date: Mon, 10 Feb 2020 16:05:10 +0100 Message-Id: <20200210150519.538333-3-gladkov.alexey@gmail.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200210150519.538333-1-gladkov.alexey@gmail.com> References: <20200210150519.538333-1-gladkov.alexey@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is a preparation patch that adds proc_fs_info to be able to store different procfs options and informations. Right now some mount options are stored inside the pid namespace which makes it hard to change or modernize procfs without affecting pid namespaces. Plus we do want to treat proc as more of a real mount point and filesystem. procfs is part of Linux API where it offers some features using filesystem syscalls and in order to support some features where we are able to have multiple instances of procfs, each one with its mount options inside the same pid namespace, we have to separate these procfs instances. This is the same feature that was also added to other Linux interfaces like devpts in order to support containers, sandboxes, and to have multiple instances of devpts filesystem [1]. [1] https://elixir.bootlin.com/linux/v3.4/source/Documentation/filesystems/devpts.txt Cc: Kees Cook Suggested-by: Andy Lutomirski Signed-off-by: Djalal Harouni Signed-off-by: Alexey Gladkov --- fs/locks.c | 6 +++-- fs/proc/base.c | 8 +++++-- fs/proc/inode.c | 4 ++-- fs/proc/root.c | 49 +++++++++++++++++++++++++++-------------- include/linux/proc_fs.h | 11 ++++++++- 5 files changed, 54 insertions(+), 24 deletions(-) diff --git a/fs/locks.c b/fs/locks.c index 6970f55daf54..21200e3005e4 100644 --- a/fs/locks.c +++ b/fs/locks.c @@ -2795,7 +2795,8 @@ static void lock_get_status(struct seq_file *f, struct file_lock *fl, { struct inode *inode = NULL; unsigned int fl_pid; - struct pid_namespace *proc_pidns = file_inode(f->file)->i_sb->s_fs_info; + struct proc_fs_info *fs_info = proc_sb_info(file_inode(f->file)->i_sb); + struct pid_namespace *proc_pidns = fs_info->pid_ns; fl_pid = locks_translate_pid(fl, proc_pidns); /* @@ -2873,7 +2874,8 @@ static int locks_show(struct seq_file *f, void *v) { struct locks_iterator *iter = f->private; struct file_lock *fl, *bfl; - struct pid_namespace *proc_pidns = file_inode(f->file)->i_sb->s_fs_info; + struct proc_fs_info *fs_info = proc_sb_info(file_inode(f->file)->i_sb); + struct pid_namespace *proc_pidns = fs_info->pid_ns; fl = hlist_entry(v, struct file_lock, fl_link); diff --git a/fs/proc/base.c b/fs/proc/base.c index ebea9501afb8..672e71c52dbd 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -3243,6 +3243,7 @@ struct dentry *proc_pid_lookup(struct dentry *dentry, unsigned int flags) { struct task_struct *task; unsigned tgid; + struct proc_fs_info *fs_info; struct pid_namespace *ns; struct dentry *result = ERR_PTR(-ENOENT); @@ -3250,7 +3251,8 @@ struct dentry *proc_pid_lookup(struct dentry *dentry, unsigned int flags) if (tgid == ~0U) goto out; - ns = dentry->d_sb->s_fs_info; + fs_info = proc_sb_info(dentry->d_sb); + ns = fs_info->pid_ns; rcu_read_lock(); task = find_task_by_pid_ns(tgid, ns); if (task) @@ -3538,6 +3540,7 @@ static struct dentry *proc_task_lookup(struct inode *dir, struct dentry * dentry struct task_struct *task; struct task_struct *leader = get_proc_task(dir); unsigned tid; + struct proc_fs_info *fs_info; struct pid_namespace *ns; struct dentry *result = ERR_PTR(-ENOENT); @@ -3548,7 +3551,8 @@ static struct dentry *proc_task_lookup(struct inode *dir, struct dentry * dentry if (tid == ~0U) goto out; - ns = dentry->d_sb->s_fs_info; + fs_info = proc_sb_info(dentry->d_sb); + ns = fs_info->pid_ns; rcu_read_lock(); task = find_task_by_pid_ns(tid, ns); if (task) diff --git a/fs/proc/inode.c b/fs/proc/inode.c index dbe43a50caf2..b631608dfbcc 100644 --- a/fs/proc/inode.c +++ b/fs/proc/inode.c @@ -104,8 +104,8 @@ void __init proc_init_kmemcache(void) static int proc_show_options(struct seq_file *seq, struct dentry *root) { - struct super_block *sb = root->d_sb; - struct pid_namespace *pid = sb->s_fs_info; + struct proc_fs_info *fs_info = proc_sb_info(root->d_sb); + struct pid_namespace *pid = fs_info->pid_ns; if (!gid_eq(pid->pid_gid, GLOBAL_ROOT_GID)) seq_printf(seq, ",gid=%u", from_kgid_munged(&init_user_ns, pid->pid_gid)); diff --git a/fs/proc/root.c b/fs/proc/root.c index 0b7c8dffc9ae..d449f095f0f7 100644 --- a/fs/proc/root.c +++ b/fs/proc/root.c @@ -30,7 +30,7 @@ #include "internal.h" struct proc_fs_context { - struct pid_namespace *pid_ns; + struct proc_fs_info *fs_info; unsigned int mask; int hidepid; int gid; @@ -97,7 +97,8 @@ static void proc_apply_options(struct super_block *s, static int proc_fill_super(struct super_block *s, struct fs_context *fc) { - struct pid_namespace *pid_ns = get_pid_ns(s->s_fs_info); + struct proc_fs_context *ctx = fc->fs_private; + struct pid_namespace *pid_ns = get_pid_ns(ctx->fs_info->pid_ns); struct inode *root_inode; int ret; @@ -145,7 +146,8 @@ static int proc_fill_super(struct super_block *s, struct fs_context *fc) static int proc_reconfigure(struct fs_context *fc) { struct super_block *sb = fc->root->d_sb; - struct pid_namespace *pid = sb->s_fs_info; + struct proc_fs_info *fs_info = proc_sb_info(sb); + struct pid_namespace *pid = fs_info->pid_ns; sync_filesystem(sb); @@ -157,14 +159,14 @@ static int proc_get_tree(struct fs_context *fc) { struct proc_fs_context *ctx = fc->fs_private; - return get_tree_keyed(fc, proc_fill_super, ctx->pid_ns); + return get_tree_keyed(fc, proc_fill_super, ctx->fs_info); } static void proc_fs_context_free(struct fs_context *fc) { struct proc_fs_context *ctx = fc->fs_private; - put_pid_ns(ctx->pid_ns); + put_pid_ns(ctx->fs_info->pid_ns); kfree(ctx); } @@ -178,14 +180,27 @@ static const struct fs_context_operations proc_fs_context_ops = { static int proc_init_fs_context(struct fs_context *fc) { struct proc_fs_context *ctx; + struct pid_namespace *pid_ns; ctx = kzalloc(sizeof(struct proc_fs_context), GFP_KERNEL); if (!ctx) return -ENOMEM; - ctx->pid_ns = get_pid_ns(task_active_pid_ns(current)); + pid_ns = get_pid_ns(task_active_pid_ns(current)); + + if (!pid_ns->proc_mnt) { + ctx->fs_info = kzalloc(sizeof(struct proc_fs_info), GFP_KERNEL); + if (!ctx->fs_info) { + kfree(ctx); + return -ENOMEM; + } + ctx->fs_info->pid_ns = pid_ns; + } else { + ctx->fs_info = proc_sb_info(pid_ns->proc_mnt->mnt_sb); + } + put_user_ns(fc->user_ns); - fc->user_ns = get_user_ns(ctx->pid_ns->user_ns); + fc->user_ns = get_user_ns(ctx->fs_info->pid_ns->user_ns); fc->fs_private = ctx; fc->ops = &proc_fs_context_ops; return 0; @@ -193,15 +208,15 @@ static int proc_init_fs_context(struct fs_context *fc) static void proc_kill_sb(struct super_block *sb) { - struct pid_namespace *ns; + struct proc_fs_info *fs_info = proc_sb_info(sb); - ns = (struct pid_namespace *)sb->s_fs_info; - if (ns->proc_self) - dput(ns->proc_self); - if (ns->proc_thread_self) - dput(ns->proc_thread_self); + if (fs_info->pid_ns->proc_self) + dput(fs_info->pid_ns->proc_self); + if (fs_info->pid_ns->proc_thread_self) + dput(fs_info->pid_ns->proc_thread_self); kill_anon_super(sb); - put_pid_ns(ns); + put_pid_ns(fs_info->pid_ns); + kfree(fs_info); } static struct file_system_type proc_fs_type = { @@ -314,10 +329,10 @@ int pid_ns_prepare_proc(struct pid_namespace *ns) } ctx = fc->fs_private; - if (ctx->pid_ns != ns) { - put_pid_ns(ctx->pid_ns); + if (ctx->fs_info->pid_ns != ns) { + put_pid_ns(ctx->fs_info->pid_ns); get_pid_ns(ns); - ctx->pid_ns = ns; + ctx->fs_info->pid_ns = ns; } mnt = fc_mount(fc); diff --git a/include/linux/proc_fs.h b/include/linux/proc_fs.h index a705aa2d03f9..2d79489e55aa 100644 --- a/include/linux/proc_fs.h +++ b/include/linux/proc_fs.h @@ -12,6 +12,15 @@ struct proc_dir_entry; struct seq_file; struct seq_operations; +struct proc_fs_info { + struct pid_namespace *pid_ns; +}; + +static inline struct proc_fs_info *proc_sb_info(struct super_block *sb) +{ + return sb->s_fs_info; +} + #ifdef CONFIG_PROC_FS typedef int (*proc_write_t)(struct file *, char *, size_t); @@ -146,7 +155,7 @@ int open_related_ns(struct ns_common *ns, /* get the associated pid namespace for a file in procfs */ static inline struct pid_namespace *proc_pid_ns(const struct inode *inode) { - return inode->i_sb->s_fs_info; + return proc_sb_info(inode->i_sb)->pid_ns; } #endif /* _LINUX_PROC_FS_H */ -- 2.24.1