OpenVZ Forum


Home » Mailing lists » Devel » Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #12038] Mon, 16 April 2007 09:56 Go to next message
Miklos Szeredi is currently offline  Miklos Szeredi
Messages: 161
Registered: April 2007
Senior Member
> > > Also for bind-mount and remount operations the flag has to be propagated
> > > down its propagation tree. Otherwise a unpriviledged mount in a shared
> > > mount wont get reflected in its peers and slaves, leading to unidentical
> > > shared-subtrees.
> >
> > That's an interesting question. Do we want shared mounts to be
> > totally identical, including mnt_flags? It doesn't look as if
> > do_remount() guarantees that currently.
>
> Depends on the semantics of each of the flags. Some flags like of the
> read/write flag, would not interfere with the propagation semantics
> AFAICT. But this one certainly seems to interfere.

That depends. Current patches check the "unprivileged submounts
allowed under this mount" flag only on the requested mount and not on
the propagated mounts. Do you see a problem with this?

Miklos
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #12063 is a reply to message #12038] Mon, 16 April 2007 17:14 Go to previous messageGo to next message
Ram Pai is currently offline  Ram Pai
Messages: 15
Registered: April 2007
Junior Member
On Mon, 2007-04-16 at 11:56 +0200, Miklos Szeredi wrote:
> > > > Also for bind-mount and remount operations the flag has to be propagated
> > > > down its propagation tree. Otherwise a unpriviledged mount in a shared
> > > > mount wont get reflected in its peers and slaves, leading to unidentical
> > > > shared-subtrees.
> > >
> > > That's an interesting question. Do we want shared mounts to be
> > > totally identical, including mnt_flags? It doesn't look as if
> > > do_remount() guarantees that currently.
> >
> > Depends on the semantics of each of the flags. Some flags like of the
> > read/write flag, would not interfere with the propagation semantics
> > AFAICT. But this one certainly seems to interfere.
>
> That depends. Current patches check the "unprivileged submounts
> allowed under this mount" flag only on the requested mount and not on
> the propagated mounts. Do you see a problem with this?

Don't see a problem if the flag is propagated to all peers and slave
mounts.

If not, I see a problem. What if the propagated mount has its flag set
to not do un-priviledged mounts, whereas the requested mount has it
allowed?

RP



>
> Miklos
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #12064 is a reply to message #12063] Mon, 16 April 2007 17:50 Go to previous messageGo to next message
Miklos Szeredi is currently offline  Miklos Szeredi
Messages: 161
Registered: April 2007
Senior Member
> > > > > Also for bind-mount and remount operations the flag has to be propagated
> > > > > down its propagation tree. Otherwise a unpriviledged mount in a shared
> > > > > mount wont get reflected in its peers and slaves, leading to unidentical
> > > > > shared-subtrees.
> > > >
> > > > That's an interesting question. Do we want shared mounts to be
> > > > totally identical, including mnt_flags? It doesn't look as if
> > > > do_remount() guarantees that currently.
> > >
> > > Depends on the semantics of each of the flags. Some flags like of the
> > > read/write flag, would not interfere with the propagation semantics
> > > AFAICT. But this one certainly seems to interfere.
> >
> > That depends. Current patches check the "unprivileged submounts
> > allowed under this mount" flag only on the requested mount and not on
> > the propagated mounts. Do you see a problem with this?
>
> Don't see a problem if the flag is propagated to all peers and slave
> mounts.
>
> If not, I see a problem. What if the propagated mount has its flag set
> to not do un-priviledged mounts, whereas the requested mount has it
> allowed?

Then the mount is allowed.

It is up to the sysadmin/distro to design set up the propagations in a
way that this is not a problem.

I think it would be much less clear conceptually, if unprivileged
mounting would have to check propagations as well.

Miklos
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #12099 is a reply to message #12064] Tue, 17 April 2007 17:07 Go to previous message
serue is currently offline  serue
Messages: 750
Registered: February 2006
Senior Member
Quoting Miklos Szeredi (miklos@szeredi.hu):
> > > > > > Also for bind-mount and remount operations the flag has to be propagated
> > > > > > down its propagation tree. Otherwise a unpriviledged mount in a shared
> > > > > > mount wont get reflected in its peers and slaves, leading to unidentical
> > > > > > shared-subtrees.
> > > > >
> > > > > That's an interesting question. Do we want shared mounts to be
> > > > > totally identical, including mnt_flags? It doesn't look as if
> > > > > do_remount() guarantees that currently.
> > > >
> > > > Depends on the semantics of each of the flags. Some flags like of the
> > > > read/write flag, would not interfere with the propagation semantics
> > > > AFAICT. But this one certainly seems to interfere.
> > >
> > > That depends. Current patches check the "unprivileged submounts
> > > allowed under this mount" flag only on the requested mount and not on
> > > the propagated mounts. Do you see a problem with this?
> >
> > Don't see a problem if the flag is propagated to all peers and slave
> > mounts.
> >
> > If not, I see a problem. What if the propagated mount has its flag set
> > to not do un-priviledged mounts, whereas the requested mount has it
> > allowed?
>
> Then the mount is allowed.
>
> It is up to the sysadmin/distro to design set up the propagations in a
> way that this is not a problem.
>
> I think it would be much less clear conceptually, if unprivileged
> mounting would have to check propagations as well.
>
> Miklos

I'm a bit lost about what is currently done and who advocates for what.

It seems to me the MNT_ALLOWUSERMNT (or whatever :) flag should be
propagated. In the /share rbind+chroot example, I assume the admin
would start by doing

mount --bind /share /share
mount --make-slave /share
mount --bind -o allow_user_mounts /share (or whatever)
mount --make-shared /share

then on login, pam does

chroot /share/$USER

or some sort of

mount --bind /share /home/$USER/root
chroot /home/$USER/root

or whatever. In any case, the user cannot make user mounts except under
/share, and any cloned namespaces will still allow user mounts.

Or are you guys talking about something else?

-serge
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #18233 is a reply to message #12038] Mon, 16 April 2007 15:43 Go to previous message
ebiederm is currently offline  ebiederm
Messages: 1354
Registered: February 2006
Senior Member
Miklos Szeredi <miklos@szeredi.hu> writes:

> That depends.  Current patches check the "unprivileged submounts
> allowed under this mount" flag only on the requested mount and not on
> the propagated mounts.  Do you see a problem with this?

I think privileges of this sort should propagate.  If I read what you
just said correctly if I have a private mount namespace I won't be able
to mount anything unless when it was setup the unprivileged submount
command was explicitly set.

Eric
_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
Re: Re: [patch 05/10] add "permit user mounts in new namespace" clone flag [message #18255 is a reply to message #18233] Mon, 16 April 2007 15:58 Go to previous message
Miklos Szeredi is currently offline  Miklos Szeredi
Messages: 161
Registered: April 2007
Senior Member
> > That depends.  Current patches check the "unprivileged submounts
> > allowed under this mount" flag only on the requested mount and not on
> > the propagated mounts.  Do you see a problem with this?
> 
> I think privileges of this sort should propagate.  If I read what you
> just said correctly if I have a private mount namespace I won't be able
> to mount anything unless when it was setup the unprivileged submount
> command was explicitly set.

By design yes.  Why is that a problem?

Miklos
_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
Previous Topic: [patch 00/10] mount ownership and unprivileged mount syscall (v3)
Next Topic: [PATCH] Introduce a handy list_first_entry macro (v2)
Goto Forum:
  


Current Time: Wed Jul 02 02:39:47 GMT 2025

Total time taken to generate the page: 0.04543 seconds