From patchwork Wed Aug 1 15:23:56 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: David Howells X-Patchwork-Id: 10552711 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 335F715E2 for ; Wed, 1 Aug 2018 16:41:47 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1E54A28746 for ; Wed, 1 Aug 2018 16:41:47 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 0FFD52B944; Wed, 1 Aug 2018 16:41:47 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from UCOL19PA10.eemsg.mail.mil (ucol19pa10.eemsg.mail.mil [214.24.24.83]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 5F2AF28746 for ; Wed, 1 Aug 2018 16:41:45 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.51,432,1526342400"; d="scan'208";a="566774450" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by UCOL19PA10.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 01 Aug 2018 16:41:20 +0000 X-IronPort-AV: E=Sophos;i="5.51,432,1526342400"; d="scan'208";a="16483018" IronPort-PHdr: 9a23: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 X-IPAS-Result: A2BqAwB54WFb/wHyM5BbHAEBAQQBAQoBAYMgBCdmI1wog36IBl+NSYEblGIUgVsWGAsJhDsDAhmDTTQYAQIBAQEBAQECAWwcDEIOAYFkJAGCZAIgBA0aIAYFAwMJAiQCIgQCAgIBAS0VAR4LBRgEgjRMgX8DDLExezOKWYELiBSBQT+BEjOBYUmDN4FJARIBBAMCQoJVgjUgAogchFSNLgmGGYprRYYXNIU5himBaoJFh2qBQThhcTMaCBsVO4JpCYIcF4NFhRSFP24BfBSFXIY4AQ0XB4IcAQE Received: from tarius.tycho.ncsc.mil (HELO tarius.infosec.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 01 Aug 2018 16:41:19 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus.infosec.tycho.ncsc.mil [192.168.25.40]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w71Ge5LF030884; Wed, 1 Aug 2018 12:40:32 -0400 Received: from tarius.infosec.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id w71FRfVF025572 for ; Wed, 1 Aug 2018 11:27:41 -0400 Received: from goalie.tycho.ncsc.mil (goalie.infosec.tycho.ncsc.mil [144.51.242.250]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w71FReDk018257; Wed, 1 Aug 2018 11:27:40 -0400 IronPort-PHdr: 9a23:nGqRTRc2c5ccUr8wPHQHLh+ulGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwWRBdfmwNVg0MHumvi8H2EN5I2O9nULcZgKUh4B2o0anA0lVciCD0CzbPvndDczE8kKUlh5t2q6Pk5YFIe2Z1DbrnCoqz9HHBL5OFk9Pfz7T6jVicn/zOWu49vLeQwdiDq6fr52KA6etwjdtsAKx4BlL/V50QPH90NBYP8e3mZ0PRSWlhf46N23+ctv8yNPtvYl7OZaXKn6drh+RrtdX3w9K25g3MTwrlHYSBeXoHsRVmJDih1THw3M9w33RL/0onK8rOdx2CCGe8bxSL0= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1DBAACKz2Fbly0VGNZbHAEBAQQBAQoBAYMgBCdmfyiDfogGX4tggWiBG5RiFIFmCyMJhECDRSE0GAECAQEBAQEBAhQBAQEBAQYYBkxODgGFDwRNBTUCJgJJgn5LAYF/Awywe3sziliBC4d9F4FBP4ESM4FhSYM3gWEDAkKCVYI1IAKIHIRUjS4JhhmKa0WGFzSFOYYpgWqCRYdqgUGCCjMaCBsVO4JpCYIcDgmDRYUUhT9uAYEQhVyGOAEkB4IcAQE X-IPAS-Result: A1DBAACKz2Fbly0VGNZbHAEBAQQBAQoBAYMgBCdmfyiDfogGX4tggWiBG5RiFIFmCyMJhECDRSE0GAECAQEBAQEBAhQBAQEBAQYYBkxODgGFDwRNBTUCJgJJgn5LAYF/Awywe3sziliBC4d9F4FBP4ESM4FhSYM3gWEDAkKCVYI1IAKIHIRUjS4JhhmKa0WGFzSFOYYpgWqCRYdqgUGCCjMaCBsVO4JpCYIcDgmDRYUUhT9uAYEQhVyGOAEkB4IcAQE X-IronPort-AV: E=Sophos;i="5.51,432,1526356800"; d="scan'208";a="337096" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 01 Aug 2018 11:27:39 -0400 IronPort-PHdr: 9a23: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 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CYAAD9z2Fbly0VGNZbHAEBAQQBAQoBAYMgBCdmfyiDfogGX4tggWiBG5RiFIFmCyMJhECDRSE0GAECAQEBAQEBAgETAQEBAQEGGAZMDEIOAYFkJAGDBgRNBTUCJgJJgn5LAYF/AwyxBHsziliBC4d9F4FBP4ESM4FhSYM3gWEDAkKCVYI1IAKIHIRUjS4JhhmKa0WGFzSFOYYpgWqCRYdqgUGCCjMaCBsVO4JpCYIcDgmDRYUUhT9uAYEQhVyGOAEkB4IcAQE X-IPAS-Result: A0CYAAD9z2Fbly0VGNZbHAEBAQQBAQoBAYMgBCdmfyiDfogGX4tggWiBG5RiFIFmCyMJhECDRSE0GAECAQEBAQEBAgETAQEBAQEGGAZMDEIOAYFkJAGDBgRNBTUCJgJJgn5LAYF/AwyxBHsziliBC4d9F4FBP4ESM4FhSYM3gWEDAkKCVYI1IAKIHIRUjS4JhhmKa0WGFzSFOYYpgWqCRYdqgUGCCjMaCBsVO4JpCYIcDgmDRYUUhT9uAYEQhVyGOAEkB4IcAQE X-IronPort-AV: E=Sophos;i="5.51,432,1526342400"; d="scan'208";a="16473133" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from uhil3cpa06.eemsg.mail.mil ([214.24.21.45]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 01 Aug 2018 15:27:37 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;93610249-91e0-4967-840a-da26ed0b9b2e Authentication-Results: UCOL3CPA04.eemsg.mail.mil; dkim=none (message not signed) header.i=none; spf=None smtp.pra=dhowells@redhat.com; spf=Pass smtp.mailfrom=dhowells@redhat.com; spf=Pass smtp.helo=postmaster@mx1.redhat.com X-EEMSG-check-008: 298141842|UCOL3CPA04_EEMSG_MP19.csd.disa.mil X-EEMSG-check-001: false X-EEMSG-SBRS: 3.5 X-EEMSG-ORIG-IP: 66.187.233.73 X-EEMSG-check-002: true IronPort-PHdr: 9a23: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 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CFAQBQz2Fbh0npu0JbHgEGDIMgBIENfyiDfohljUiBG5RiFIFmCxMQCAGEPAICg18GAQQwGAECAQEBAQEBAQEBEwEBAQoLCQgpIwxCAQEDCQKBYyQBgwYECwFBBTUCJgJJgn5LAYF/D7B6ezOKWIELiBSBQT+BEjOBYUmDN4FhAwJCglWCNSACiByEVI0uCYYZimtFhhc0hTmGKYFqgkWHaoFBggozGggbFTuCaQmCHA4Jg0WFFIU/PjABgQ4BAYVcCYYvASQHghwBAQ X-IPAS-Result: A0CFAQBQz2Fbh0npu0JbHgEGDIMgBIENfyiDfohljUiBG5RiFIFmCxMQCAGEPAICg18GAQQwGAECAQEBAQEBAQEBEwEBAQoLCQgpIwxCAQEDCQKBYyQBgwYECwFBBTUCJgJJgn5LAYF/D7B6ezOKWIELiBSBQT+BEjOBYUmDN4FhAwJCglWCNSACiByEVI0uCYYZimtFhhc0hTmGKYFqgkWHaoFBggozGggbFTuCaQmCHA4Jg0WFFIU/PjABgQ4BAYVcCYYvASQHghwBAQ Received: from mx3-rdu2.redhat.com (HELO mx1.redhat.com) ([66.187.233.73]) by UCOL3CPA04.eemsg.mail.mil with ESMTP/TLS/DHE-RSA-AES256-SHA256; 01 Aug 2018 15:24:10 +0000 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7FA928198B0B; Wed, 1 Aug 2018 15:24:06 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-116.rdu2.redhat.com [10.10.120.116]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8EAAA200AC23; Wed, 1 Aug 2018 15:24:01 +0000 (UTC) X-EEMSG-check-009: 444-444 From: David Howells To: viro@zeniv.linux.org.uk Date: Wed, 01 Aug 2018 16:23:56 +0100 Message-ID: <153313703562.13253.5766498657900728120.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 01 Aug 2018 15:24:06 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 01 Aug 2018 15:24:06 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dhowells@redhat.com' RCPT:'' X-MIME-Autoconverted: from quoted-printable to 8bit by prometheus.infosec.tycho.ncsc.mil id w71FRfVF025572 X-Mailman-Approved-At: Wed, 01 Aug 2018 12:40:05 -0400 Subject: [PATCH 00/33] VFS: Introduce filesystem context [ver #11] X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Eric Biggers , Tetsuo Handa , dhowells@redhat.com, selinux@tycho.nsa.gov, tomoyo-dev-en@lists.sourceforge.jp, Stephen Smalley , fenghua.yu@intel.com, apparmor@lists.ubuntu.com, Greg Kroah-Hartman , cgroups@vger.kernel.org, John Johansen , linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, "Eric W. Biederman" , linux-security-module@vger.kernel.org, Li Zefan , Johannes Weiner , linux-fsdevel@vger.kernel.org, Tejun Heo , torvalds@linux-foundation.org Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Hi Al, Here are a set of patches to create a filesystem context prior to setting up a new mount, populating it with the parsed options/binary data, creating the superblock and then effecting the mount. This is also used for remount since much of the parsing stuff is common in many filesystems. This allows namespaces and other information to be conveyed through the mount procedure. This also allows Miklós Szeredi's idea of doing: fd = fsopen("nfs"); fsconfig(fd, FSCONFIG_SET_STRING, "option", "val", 0); fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0); mfd = fsmount(fd, MS_NODEV); move_mount(mfd, "", AT_FDCWD, "/mnt", MOVE_MOUNT_F_EMPTY_PATH); that he presented at LSF-2017 to be implemented (see the relevant patches in the series). I didn't use netlink as that would make the core kernel depend on CONFIG_NET and CONFIG_NETLINK and would introduce network namespacing issues. I've implemented filesystem context handling for procfs, nfs, mqueue, cpuset, kernfs, sysfs, cgroup and afs filesystems. Unconverted filesystems are handled by a legacy filesystem wrapper. ==================== WHY DO WE WANT THIS? ==================== Firstly, there's a bunch of problems with the mount(2) syscall: (1) It's actually six or seven different interfaces rolled into one and weird combinations of flags make it do different things beyond the original specification of the syscall. (2) It produces a particularly large and diverse set of errors, which have to be mapped back to a small error code. Yes, there's dmesg - if you have it configured - but you can't necessarily see that if you're doing a mount inside of a container. (3) It copies a PAGE_SIZE block of data for each of the type, device name and options. (4) The size of the buffers is PAGE_SIZE - and this is arch dependent. (5) You can't mount into another mount namespace. I could, for example, build a container without having to be in that container's namespace if I can do it from outside. (6) It's not really geared for the specification of multiple sources, but some filesystems really want that - overlayfs, for example. and some problems in the internal kernel api: (1) There's no defined way to supply namespace configuration for the superblock - so, for instance, I can't say that I want to create a superblock in a particular network namespace (on automount, say). NFS hacks around this by creating multiple shadow file_system_types with different ->mount() ops. (2) When calling mount internally, unless you have NFS-like hacks, you have to generate or otherwise provide text config data which then gets parsed, when some of the time you could bypass the parsing stage entirely. (3) The amount of data in the data buffer is not known, but the data buffer might be on a kernel stack somewhere, leading to the possibility of tripping the stack underrun guard. and other issues too: (1) Superblock remount in some filesystems applies options on an as-parsed basis, so if there's a parse failure, a partial alteration with no rollback is effected. (2) Under some circumstances, the mount data may get copied multiple times so that it can have multiple parsers applied to it or because it has to be parsed multiple times - for instance, once to get the preliminary info required to access the on-disk superblock and then again to update the superblock record in the kernel. I want to be able to add support for a bunch of things: (1) UID, GID and Project ID mapping/translation. I want to be able to install a translation table of some sort on the superblock to translate source identifiers (which may be foreign numeric UIDs/GIDs, text names, GUIDs) into system identifiers. This needs to be done before the superblock is published[*]. Note that this may, for example, involve using the context and the superblock held therein to issue an RPC to a server to look up translations. [*] By "published" I mean made available through mount so that other userspace processes can access it by path. Maybe specifying a translation range element with something like: fsconfig(fd, fsconfig_translate_uid, " ", 0, 0); The translation information also needs to propagate over an automount in some circumstances. (2) Namespace configuration. I want to be able to tell the superblock creation process what namespaces should be applied when it created (in particular the userns and netns) for containerisation purposes, e.g.: fsconfig(fd, FSCONFIG_SET_NAMESPACE, "user", 0, userns_fd); fsconfig(fd, FSCONFIG_SET_NAMESPACE, "net", 0, netns_fd); (3) Namespace propagation. I want to have a properly defined mechanism for propagating namespace configuration over automounts within the kernel. This will be particularly useful for network filesystems. (4) Pre-mount attribute query. A chunk of the changes is actually the fsinfo() syscall to query attributes of the filesystem beyond what's available in statx() and statfs(). This will allow a created superblock to be queried before it is published. (5) Upcall for configuration. I would like to be able to query configuration that's stored in userspace when an automount is made. For instance, to look up network parameters for NFS or to find a cache selector for fscache. The internal fs_context could be passed to the upcall process or the kernel could read a config file directly if named appropriately for the superblock, perhaps: [/etc/fscontext.d/afs/example.com/cell.cfg] realm = EXAMPLE.COM translation = uid,3000,4000,100 fscache = tag=fred (6) Event notifications. I want to be able to install a watch on a superblock before it is published to catch things like quota events and EIO. (7) Large and binary parameters. There might be at some point a need to pass large/binary objects like Microsoft PACs around. If I understand PACs correctly, you can obtain these from the Kerberos server and then pass them to the file server when you connect. Having it possible to pass large or binary objects as individual fsconfig calls make parsing these trivial. OTOH, some or all of this can potentially be handled with the use of the keyrings interface - as the afs filesystem does for passing kerberos tokens around; it's just that that seems overkill for a parameter you may only need once. =================== SIGNIFICANT CHANGES =================== ver #11: (*) Fixed AppArmor. (*) Capitalised all the UAPI constants. (*) Explicitly numbered the FSCONFIG_* UAPI constants. (*) Removed all the places ANON_INODES is selected. (*) Fixed a bug whereby the context gets freed twice (which broke mounts of procfs). (*) Split fsinfo() off into its own patch series. ver #10: (*) Renamed "option" to "parameter" in a number of places. (*) Replaced the use of write() to drive the configuration with an fsconfig() syscall. This also allows at-style paths and fds to be presented as typed object. (*) Routed the key=value parameter concept all the way through from the fsconfig() system call to the LSM and filesystem. (*) Added a parameter-description concept and helper functions to help interpret a parameter and possibly convert the value. (*) Made it possible to query the parameter description using the fsinfo() syscall. Added a test-fs-query sample to dump the parameters used by a filesystem. ver #9: (*) Dropped the fd cookie stuff and the FMODE_*/O_* split stuff. (*) Al added an open_tree() system call to allow a mount tree to be picked referenced or cloned into an O_PATH-style fd. This can then be used with sys_move_mount(). Dropped the O_CLONE_MOUNT and O_NON_RECURSIVE open() flags. (*) Brought error logging back in, though only in the fs_context and not in the task_struct. (*) Separated MS_REMOUNT|MS_BIND handling from MS_REMOUNT handling. (*) Used anon_inodes for the fd returned by fsopen() and fspick(). This requires making it unconditional. (*) Fixed lots of bugs. Especial thanks to Al and Eric Biggers for finding them and providing patches. (*) Wrote manual pages, which I'll post separately. ver #8: (*) Changed the way fsmount() mounts into the namespace according to some of Al's ideas. (*) Put better typing on the fd cookie obtained from __fdget() & co.. (*) Stored the fd cookie in struct nameidata rather than the dfd number. (*) Changed sys_fsmount() to return an O_PATH-style fd rather than actually mounting into the mount namespace. (*) Separated internal FMODE_* handling from O_* handling to free up certain O_* flag numbers. (*) Added two new open flags (O_CLONE_MOUNT and O_NON_RECURSIVE) for use with open(O_PATH) to copy a mount or mount-subtree to an O_PATH fd. (*) Added a new syscall, sys_move_mount(), to move a mount from an dfd+path source to a dfd+path destination. (*) Added a file->f_mode flag (FMODE_NEED_UNMOUNT) that indicates that the vfsmount attached to file->f_path needs 'unmounting' if set. (*) Made sys_move_mount() clear FMODE_NEED_UNMOUNT if successful. [!] This doesn't work quite right. (*) Added a new syscall, fsinfo(), to query information about a filesystem. The idea being that this will, in future, work with the fd from fsopen() too and permit querying of the parameters and metadata before fsmount() is called. ver #7: (*) Undo an incorrect MS_* -> SB_* conversion. (*) Pass the mount data buffer size to all the mount-related functions that take the data pointer. This fixes a problem where someone (say SELinux) tries to copy the mount data, assuming it to be a page in size, and overruns the buffer - thereby incurring an oops by hitting a guard page. (*) Made the AFS filesystem use them as an example. This is a much easier to deal with than with NFS or Ext4 as there are very few mount options. ver #6: (*) Dropped the supplementary error string facility for the moment. (*) Dropped the NFS patches for the moment. (*) Dropped the reserved file descriptor argument from fsopen() and replaced it with three reserved pointers that must be NULL. ver #5: (*) Renamed sb_config -> fs_context and adjusted variable names. (*) Differentiated the flags in sb->s_flags (now named SB_*) from those passed to mount(2) (named MS_*). (*) Renamed __vfs_new_fs_context() to vfs_new_fs_context() and made the caller always provide a struct file_system_type pointer and the parameters required. (*) Got rid of vfs_submount_fc() in favour of passing FS_CONTEXT_FOR_SUBMOUNT to vfs_new_fs_context(). The purpose is now used more. (*) Call ->validate() on the remount path. (*) Got rid of the inode locking in sys_fsmount(). (*) Call security_sb_mountpoint() in the mount(2) path. ver #4: (*) Split the sb_config patch up somewhat. (*) Made the supplementary error string facility something attached to the task_struct rather than the sb_config so that error messages can be obtained from NFS doing a mount-root-and-pathwalk inside the nfs_get_tree() operation. Further, made this managed and read by prctl rather than through the mount fd so that it's more generally available. ver #3: (*) Rebased on 4.12-rc1. (*) Split the NFS patch up somewhat. ver #2: (*) Removed the ->fill_super() from sb_config_operations and passed it in directly to functions that want to call it. NFS now calls nfs_fill_super() directly rather than jumping through a pointer to it since there's only the one option at the moment. (*) Removed ->mnt_ns and ->sb from sb_config and moved ->pid_ns into proc_sb_config. (*) Renamed create_super -> get_tree. (*) Renamed struct mount_context to struct sb_config and amended various variable names. (*) sys_fsmount() acquired AT_* flags and MS_* flags (for MNT_* flags) arguments. ver #1: (*) Split the sb_config stuff out into its own header. (*) Support non-context aware filesystems through a special set of sb_config operations. (*) Stored the created superblock and root dentry into the sb_config after creation rather than directly into a vfsmount. This allows some arguments to be removed to various NFS functions. (*) Added an explicit superblock-creation step. This allows a created superblock to then be mounted multiple times. (*) Added a flag to say that the sb_config is degraded and cannot have another go at having a superblock creation whilst getting rid of the one that says it's already mounted. Possible further developments: (*) Implement sb reconfiguration (for now it returns ENOANO). (*) Implement mount context support in more filesystems, ext4 being next on my list. (*) Move the walk-from-root stuff that nfs has to generic code so that you can do something akin to: mount /dev/sda1:/foo/bar /mnt See nfs_follow_remote_path() and mount_subtree(). This is slightly tricky in NFS as we have to prevent referral loops. (*) Work out how to get at the error message incurred by submounts encountered during nfs_follow_remote_path(). Should the error message be moved to task_struct and made more general, perhaps retrieved with a prctl() function? (*) Clean up/consolidate the security functions. Possibly add a validation hook to be called at the same time as the mount context validate op. The patches can be found here also: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git tagged as: mount-api-20180801 on branch: mount-api David --- Al Viro (2): vfs: syscall: Add open_tree(2) to reference or clone a mount teach move_mount(2) to work with OPEN_TREE_CLONE David Howells (31): vfs: syscall: Add move_mount(2) to move mounts around vfs: Suppress MS_* flag defs within the kernel unless explicitly enabled vfs: Introduce the basic header for the new mount API's filesystem context vfs: Introduce logging functions vfs: Add configuration parser helpers vfs: Add LSM hooks for the new mount API selinux: Implement the new mount API LSM hooks smack: Implement filesystem context security hooks apparmor: Implement security hooks for the new mount API tomoyo: Implement security hooks for the new mount API vfs: Separate changing mount flags full remount vfs: Implement a filesystem superblock creation/configuration context vfs: Remove unused code after filesystem context changes procfs: Move proc_fill_super() to fs/proc/root.c proc: Add fs_context support to procfs ipc: Convert mqueue fs to fs_context cpuset: Use fs_context kernfs, sysfs, cgroup, intel_rdt: Support fs_context hugetlbfs: Convert to fs_context vfs: Remove kern_mount_data() vfs: Provide documentation for new mount API Make anon_inodes unconditional vfs: syscall: Add fsopen() to prepare for superblock creation vfs: Implement logging through fs_context vfs: Add some logging to the core users of the fs_context log vfs: syscall: Add fsconfig() for configuring and managing a context vfs: syscall: Add fsmount() to create a mount for a superblock vfs: syscall: Add fspick() to select a superblock for reconfiguration afs: Add fs_context support afs: Use fs_context to pass parameters over automount vfs: Add a sample program for the new mount API Documentation/filesystems/mount_api.txt | 706 ++++++++++++++++++++++++ arch/arc/kernel/setup.c | 1 arch/arm/kernel/atags_parse.c | 1 arch/arm/kvm/Kconfig | 1 arch/arm64/kvm/Kconfig | 1 arch/mips/kvm/Kconfig | 1 arch/powerpc/kvm/Kconfig | 1 arch/s390/kvm/Kconfig | 1 arch/sh/kernel/setup.c | 1 arch/sparc/kernel/setup_32.c | 1 arch/sparc/kernel/setup_64.c | 1 arch/x86/Kconfig | 1 arch/x86/entry/syscalls/syscall_32.tbl | 6 arch/x86/entry/syscalls/syscall_64.tbl | 6 arch/x86/kernel/cpu/intel_rdt.h | 15 + arch/x86/kernel/cpu/intel_rdt_rdtgroup.c | 184 ++++-- arch/x86/kernel/setup.c | 1 arch/x86/kvm/Kconfig | 1 drivers/base/Kconfig | 1 drivers/base/devtmpfs.c | 1 drivers/char/tpm/Kconfig | 1 drivers/dma-buf/Kconfig | 1 drivers/gpio/Kconfig | 1 drivers/iio/Kconfig | 1 drivers/infiniband/Kconfig | 1 drivers/vfio/Kconfig | 1 fs/Kconfig | 7 fs/Makefile | 5 fs/afs/internal.h | 9 fs/afs/mntpt.c | 148 +++-- fs/afs/super.c | 470 +++++++++------- fs/afs/volume.c | 4 fs/f2fs/super.c | 2 fs/file_table.c | 9 fs/filesystems.c | 4 fs/fs_context.c | 779 +++++++++++++++++++++++++++ fs/fs_parser.c | 476 ++++++++++++++++ fs/fsopen.c | 491 +++++++++++++++++ fs/hugetlbfs/inode.c | 392 ++++++++------ fs/internal.h | 13 fs/kernfs/mount.c | 87 +-- fs/libfs.c | 19 + fs/namei.c | 4 fs/namespace.c | 867 +++++++++++++++++++++++------- fs/notify/fanotify/Kconfig | 1 fs/notify/inotify/Kconfig | 1 fs/pnode.c | 1 fs/proc/inode.c | 51 -- fs/proc/internal.h | 6 fs/proc/root.c | 245 ++++++-- fs/super.c | 368 ++++++++++--- fs/sysfs/mount.c | 67 ++ include/linux/cgroup.h | 3 include/linux/fs.h | 21 + include/linux/fs_context.h | 208 +++++++ include/linux/fs_parser.h | 116 ++++ include/linux/kernfs.h | 39 + include/linux/lsm_hooks.h | 70 ++ include/linux/module.h | 6 include/linux/mount.h | 5 include/linux/security.h | 61 ++ include/linux/syscalls.h | 9 include/uapi/linux/fcntl.h | 2 include/uapi/linux/fs.h | 82 +-- include/uapi/linux/mount.h | 75 +++ init/Kconfig | 10 init/do_mounts.c | 1 init/do_mounts_initrd.c | 1 ipc/mqueue.c | 121 +++- kernel/cgroup/cgroup-internal.h | 50 +- kernel/cgroup/cgroup-v1.c | 347 +++++++----- kernel/cgroup/cgroup.c | 256 ++++++--- kernel/cgroup/cpuset.c | 68 ++ samples/Kconfig | 6 samples/Makefile | 2 samples/mount_api/Makefile | 7 samples/mount_api/test-fsmount.c | 118 ++++ security/apparmor/include/mount.h | 11 security/apparmor/lsm.c | 108 ++++ security/apparmor/mount.c | 47 ++ security/security.c | 51 ++ security/selinux/hooks.c | 311 ++++++++++- security/smack/smack.h | 11 security/smack/smack_lsm.c | 370 ++++++++++++- security/tomoyo/common.h | 3 security/tomoyo/mount.c | 46 ++ security/tomoyo/tomoyo.c | 15 + 87 files changed, 6637 insertions(+), 1484 deletions(-) create mode 100644 Documentation/filesystems/mount_api.txt create mode 100644 fs/fs_context.c create mode 100644 fs/fs_parser.c create mode 100644 fs/fsopen.c create mode 100644 include/linux/fs_context.h create mode 100644 include/linux/fs_parser.h create mode 100644 include/uapi/linux/mount.h create mode 100644 samples/mount_api/Makefile create mode 100644 samples/mount_api/test-fsmount.c