On Tue, Sep 02, 2014 at 10:44:53AM -0500, Seth Forshee wrote: > Here's an updated set of patches for allowing fuse mounts from pid and > user namespaces. I discussed some of the issues we debated with the last > patch set (and a few others) with Eric at LinuxCon, and the updates here > mainly reflect the outcome of those discussions. > > The stickiest issue in the v1 patches was the question of where to get > the user and pid namespaces from that are used for translating ids for > communication with userspace. Eric told me that for user namespaces at > least we need to grab a namespace at open or mount time and use only > that namespace to prevent certain types of attacks. That rules out the > suggestion of using the user ns of current in the read/write paths, and > I think it makes sense to handle pid and user namespaces similarly. So > in these patches I'm still grabbing the namespaces of current during > mount, but I've added an additional check to fail the mount if the > f_cred's userns for the fd to userspace doesn't match. > > Another issue mentioned by Eric was what to use for i_[ug]id if the ids > from userspace don't map into the user namespace, which is going to be a > problem for any other filesystems which become mountable from user > namespaces as well. We discussed a few options for addressing this, the > most promising of which seems to be either using INVALID_[UG]ID for > these inodes or creating vfs-wide "nobody" ids for this purpose. After > thinking about it for a while I'm favoring using the invalid ids, but > I'm hoping to solicit some more feedback. > > For now these patches are using invalid ids if the user doesn't map into > the namespace. I went through the vfs code and found one place where > this could be handled better (addressed in patch 1 of the series). The > only other issue I found was that currently no one, not even root, can > change onwership of such inodes, but I suspect we can find a way around > this. > > The only other change since v1 is that I now fail changing file > ownership if the new uid or gid does not map into the namespace used for > userspace communication. I forgot that I did change one other thing. In v1 I didn't allow fuseblk mounts from user namespaces since I hadn't gotten around to testing or looking at the differences between it and normal fuse mounts yet. I've found time to do so since then and everything seems to be in good order, so I've enabled mounting fuseblk in user namespaces as well in the v2 patches. Thanks, Seth -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html