[RHEL7,COMMIT] ve/fs/namespace: allow submounts in non-init userns

Submitted by Konstantin Khorenko on July 3, 2018, 3:45 p.m.

Details

Message ID 201807031545.w63FjgAW022341@finist_ce7.work
State New
Series "ve/fs/namespace: allow submounts in non-init userns"
Headers show

Commit Message

Konstantin Khorenko July 3, 2018, 3:45 p.m.
The commit is pushed to "branch-rh7-3.10.0-862.3.2.vz7.61.x-ovz" and will appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-862.3.2.vz7.61.9
------>
commit bc060d46276144f91a139b7d0acf384dcd0a4dde
Author: Konstantin Khorenko <khorenko@virtuozzo.com>
Date:   Tue Jul 3 13:28:43 2018 +0300

    ve/fs/namespace: allow submounts in non-init userns
    
    Simple NFS mount inside a Container brings us to vfs_submount(), so if
    we want to enable NFS inside a Container (read - in non-init userns), we
    have to omit the check for init userns.
    
    SyS_mount
     do_mount
      vfs_kern_mount
       mount_fs
        nfs_fs_mount
         nfs4_try_mount
          nfs_follow_remote_path
           mount_subtree
            vfs_path_lookup
             do_path_lookup
              filename_lookup
               path_lookupat
                lookup_slow
                 follow_managed
                  nfs_d_automount
                   nfs4_submount
                    nfs_do_submount
                     vfs_submount
    
    https://jira.sw.ru/browse/PSBM-86277
    
    Signed-off-by: Konstantin Khorenko <khorenko@virtuozzo.com>
---
 fs/namespace.c | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)

Patch hide | download patch | download mbox

diff --git a/fs/namespace.c b/fs/namespace.c
index 2fa0263ea979..7d6340b9a6b9 100644
--- a/fs/namespace.c
+++ b/fs/namespace.c
@@ -1012,12 +1012,36 @@  struct vfsmount *
 vfs_submount(const struct dentry *mountpoint, struct file_system_type *type,
 	     const char *name, void *data)
 {
+#if 0
 	/* Until it is worked out how to pass the user namespace
 	 * through from the parent mount to the submount don't support
 	 * unprivileged mounts with submounts.
 	 */
+	/* Simple NFS mount inside a Container brings us here, so if we want to
+	 * enable NFS inside a Container (read - in non-init userns), we have
+	 * to omit the check.
+	 *  SyS_mount
+	 *   do_mount
+	 *    vfs_kern_mount
+	 *     mount_fs
+	 *      nfs_fs_mount
+	 *       nfs4_try_mount
+	 *        nfs_follow_remote_path
+	 *         mount_subtree
+	 *	    vfs_path_lookup
+	 *	     do_path_lookup
+	 *	      filename_lookup
+	 *	       path_lookupat
+	 *	        lookup_slow
+	 *	         follow_managed
+	 *	          nfs_d_automount
+	 *	           nfs4_submount
+	 *		    nfs_do_submount
+	 *		     vfs_submount
+	 */
 	if (mountpoint->d_sb->s_user_ns != &init_user_ns)
 		return ERR_PTR(-EPERM);
+#endif
 
 	return vfs_kern_mount(type, MS_SUBMOUNT, name, data);
 }