Linux-Fsdevel Archive on lore.kernel.org
help / color / mirror / Atom feed
From: ebiederm@xmission.com (Eric W. Biederman)
To: David Howells <dhowells@redhat.com>
Cc: mszeredi@redhat.com, viro@ZenIV.linux.org.uk, jlayton@redhat.com,
	ebiederm@redhat.com, linux-fsdevel@vger.kernel.org
Subject: Re: User-visible context-mount API
Date: Mon, 15 Jan 2018 11:32:29 -0600	[thread overview]
Message-ID: <87y3kzni36.fsf@xmission.com> (raw)
In-Reply-To: <28167.1516032442@warthog.procyon.org.uk> (David Howells's message of "Mon, 15 Jan 2018 16:07:22 +0000")

David Howells <dhowells@redhat.com> writes:

> I've been looking at the context-mount API visible to userspace as I need to
> adjust the security ops to handle it.  I'm thinking I probably need something
> like the following system calls.  Note that:

Is there supposed to be a question in this?
Are you asking for review of your basic design?

Eric

>  topology_flags are MS_PRIVATE, MS_SLAVE, MS_SHARED, MS_UNBINDABLE.
>
>  mount_flags are things like MS_NOSUID, MS_NODEV, MS_NOEXEC that get
>  translated to MNT_* flags in the kernel.
>
>  (1) Open a filesystem and create a blank context from it:
>
> 	fd = fsopen(const char *fs_name, unsigned int flags, ...);
>
>      where flags includes FSOPEN_CLOEXEC, FSOPEN_CREATE_ONLY (don't reuse
>      superblock).
>
>  (2) Access and change the context:
>
> 	write(fd, "<command>", ...);
> 	read(fd, ...);
> 	ioctl(fd, ...);
>
>  (3) Create and set up a context for an existing mountpoint:
>
> 	fd = fspick(int dfd, const char *path, unsigned int flags);
>
>      where flags includes FSPICK_CLOEXEC.
>
>  (4) Create a mountpoint on a path, using a context to supply the superblock
>      details:
>
> 	mount_create(int fd, int dfd, const char *path,
> 		     unsigned int topology_flags,
> 		     unsigned int mount_flags);
>
>  (5) Move a mount:
>
> 	mount_move(int from_dfd, const char *frompath,
> 		   int to_dfd, const char *topath);
>
>      This might want to take new topology flags algo.
>
>  (6) Adjust a mountpoint's topology flags:
>
> 	mount_set_topology(int dfd, const char *path,
> 			   unsigned int topology_flags);
>
>  (7) Reconfigure a mountpoint:
>
> 	mount_reconfigure(int dfd, const char *path,
> 			  unsigned int mount_flags);
>
>  (8) Change R/O protection on a mountpoint:
>
> 	mount_protect(int dfd, const char *path,
> 		      bool read_only);
>
>      This involves changing the R/O protection on the superblock also, but
>      might be mergeable with mount_reconfigure().
>
> Note that two things are missing from the list:
>
>  (1) Bind mount.  This is done by:
>
> 	fd = fspick("/mnt/a");
> 	mount_create(fd, ..., "/mnt/b", ...);
> 	mount_create(fd, ..., "/mnt/c", ...);
> 	mount_create(fd, ..., "/mnt/d", ...);
>
>  (2) Remount.  Superblock reconfiguration is done by something like:
>
> 	fd = fspick("/mnt/a");
> 	write(fd, "? fs");
> 	read(fd, filesystem_type);
> 	write(fd, "o user_xattr"); // Indicate changes to be made
> 	write(fd, "x reconfigure"); // Perform the reconfiguration
>
> Thinking further on this, maybe I should make a mountpoint-context also, so
> that it can be loaded up with target namespace information and other goodies.
> This would vastly expand the parameter space for a mountpoint beyond the few
> syscall args available.  Creating a new mount might then look like:
>
> 	sbfd = fsopen("ext4");
> 	write(sbfd, "d /dev/sda1");
> 	write(sbfd, "o user_xattr");
> 	write(sbfd, "x commit");
>
> 	mfd = mount_new();
> 	write(mfd, "ns mnt 123"); // where fd 123 refers to a mount namesapce
> 	write(mfd, "o bind=1"); // Set MS_BIND
> 	write(mfd, "o nosuid=1"); // Set MS_NOSUID
>
> 	mount_create(mfd, AT_FDCWD, "/mnt/a", sbfd);
>
> David

  parent reply	other threads:[~2018-01-15 17:33 UTC|newest]

Thread overview: 17+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-15 16:07 David Howells
2018-01-15 17:31 ` Eric W. Biederman
2018-01-15 17:32 ` Eric W. Biederman [this message]
2018-01-16  9:01 ` Miklos Szeredi
2018-01-16 10:10 ` David Howells
2018-01-16 10:35   ` Miklos Szeredi
2018-01-16 14:18   ` David Howells
2018-01-17 10:43   ` Karel Zak
2018-01-16 14:55 ` David Howells
2018-01-16 15:40 ` David Howells
2018-01-16 16:41   ` Miklos Szeredi
2018-01-17  4:17     ` Al Viro
2018-01-17  9:53       ` Miklos Szeredi
2018-01-17 11:06         ` Karel Zak
2018-01-18  9:48           ` Miklos Szeredi
2018-01-19  2:27           ` Al Viro
2018-01-19  6:32         ` Al Viro

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87y3kzni36.fsf@xmission.com \
    --to=ebiederm@xmission.com \
    --cc=dhowells@redhat.com \
    --cc=ebiederm@redhat.com \
    --cc=jlayton@redhat.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=mszeredi@redhat.com \
    --cc=viro@ZenIV.linux.org.uk \
    --subject='Re: User-visible context-mount API' \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).