mnt_idmapping.c 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Copyright (c) 2022 Christian Brauner <brauner@kernel.org> */
  3. #include <linux/cred.h>
  4. #include <linux/fs.h>
  5. #include <linux/mnt_idmapping.h>
  6. #include <linux/slab.h>
  7. #include <linux/user_namespace.h>
  8. #include "internal.h"
  9. /*
  10. * Outside of this file vfs{g,u}id_t are always created from k{g,u}id_t,
  11. * never from raw values. These are just internal helpers.
  12. */
  13. #define VFSUIDT_INIT_RAW(val) (vfsuid_t){ val }
  14. #define VFSGIDT_INIT_RAW(val) (vfsgid_t){ val }
  15. struct mnt_idmap {
  16. struct uid_gid_map uid_map;
  17. struct uid_gid_map gid_map;
  18. refcount_t count;
  19. };
  20. /*
  21. * Carries the initial idmapping of 0:0:4294967295 which is an identity
  22. * mapping. This means that {g,u}id 0 is mapped to {g,u}id 0, {g,u}id 1 is
  23. * mapped to {g,u}id 1, [...], {g,u}id 1000 to {g,u}id 1000, [...].
  24. */
  25. struct mnt_idmap nop_mnt_idmap = {
  26. .count = REFCOUNT_INIT(1),
  27. };
  28. EXPORT_SYMBOL_GPL(nop_mnt_idmap);
  29. /*
  30. * Carries the invalid idmapping of a full 0-4294967295 {g,u}id range.
  31. * This means that all {g,u}ids are mapped to INVALID_VFS{G,U}ID.
  32. */
  33. struct mnt_idmap invalid_mnt_idmap = {
  34. .count = REFCOUNT_INIT(1),
  35. };
  36. EXPORT_SYMBOL_GPL(invalid_mnt_idmap);
  37. /**
  38. * initial_idmapping - check whether this is the initial mapping
  39. * @ns: idmapping to check
  40. *
  41. * Check whether this is the initial mapping, mapping 0 to 0, 1 to 1,
  42. * [...], 1000 to 1000 [...].
  43. *
  44. * Return: true if this is the initial mapping, false if not.
  45. */
  46. static inline bool initial_idmapping(const struct user_namespace *ns)
  47. {
  48. return ns == &init_user_ns;
  49. }
  50. /**
  51. * make_vfsuid - map a filesystem kuid according to an idmapping
  52. * @idmap: the mount's idmapping
  53. * @fs_userns: the filesystem's idmapping
  54. * @kuid : kuid to be mapped
  55. *
  56. * Take a @kuid and remap it from @fs_userns into @idmap. Use this
  57. * function when preparing a @kuid to be reported to userspace.
  58. *
  59. * If initial_idmapping() determines that this is not an idmapped mount
  60. * we can simply return @kuid unchanged.
  61. * If initial_idmapping() tells us that the filesystem is not mounted with an
  62. * idmapping we know the value of @kuid won't change when calling
  63. * from_kuid() so we can simply retrieve the value via __kuid_val()
  64. * directly.
  65. *
  66. * Return: @kuid mapped according to @idmap.
  67. * If @kuid has no mapping in either @idmap or @fs_userns INVALID_UID is
  68. * returned.
  69. */
  70. vfsuid_t make_vfsuid(struct mnt_idmap *idmap,
  71. struct user_namespace *fs_userns,
  72. kuid_t kuid)
  73. {
  74. uid_t uid;
  75. if (idmap == &nop_mnt_idmap)
  76. return VFSUIDT_INIT(kuid);
  77. if (idmap == &invalid_mnt_idmap)
  78. return INVALID_VFSUID;
  79. if (initial_idmapping(fs_userns))
  80. uid = __kuid_val(kuid);
  81. else
  82. uid = from_kuid(fs_userns, kuid);
  83. if (uid == (uid_t)-1)
  84. return INVALID_VFSUID;
  85. return VFSUIDT_INIT_RAW(map_id_down(&idmap->uid_map, uid));
  86. }
  87. EXPORT_SYMBOL_GPL(make_vfsuid);
  88. /**
  89. * make_vfsgid - map a filesystem kgid according to an idmapping
  90. * @idmap: the mount's idmapping
  91. * @fs_userns: the filesystem's idmapping
  92. * @kgid : kgid to be mapped
  93. *
  94. * Take a @kgid and remap it from @fs_userns into @idmap. Use this
  95. * function when preparing a @kgid to be reported to userspace.
  96. *
  97. * If initial_idmapping() determines that this is not an idmapped mount
  98. * we can simply return @kgid unchanged.
  99. * If initial_idmapping() tells us that the filesystem is not mounted with an
  100. * idmapping we know the value of @kgid won't change when calling
  101. * from_kgid() so we can simply retrieve the value via __kgid_val()
  102. * directly.
  103. *
  104. * Return: @kgid mapped according to @idmap.
  105. * If @kgid has no mapping in either @idmap or @fs_userns INVALID_GID is
  106. * returned.
  107. */
  108. vfsgid_t make_vfsgid(struct mnt_idmap *idmap,
  109. struct user_namespace *fs_userns, kgid_t kgid)
  110. {
  111. gid_t gid;
  112. if (idmap == &nop_mnt_idmap)
  113. return VFSGIDT_INIT(kgid);
  114. if (idmap == &invalid_mnt_idmap)
  115. return INVALID_VFSGID;
  116. if (initial_idmapping(fs_userns))
  117. gid = __kgid_val(kgid);
  118. else
  119. gid = from_kgid(fs_userns, kgid);
  120. if (gid == (gid_t)-1)
  121. return INVALID_VFSGID;
  122. return VFSGIDT_INIT_RAW(map_id_down(&idmap->gid_map, gid));
  123. }
  124. EXPORT_SYMBOL_GPL(make_vfsgid);
  125. /**
  126. * from_vfsuid - map a vfsuid into the filesystem idmapping
  127. * @idmap: the mount's idmapping
  128. * @fs_userns: the filesystem's idmapping
  129. * @vfsuid : vfsuid to be mapped
  130. *
  131. * Map @vfsuid into the filesystem idmapping. This function has to be used in
  132. * order to e.g. write @vfsuid to inode->i_uid.
  133. *
  134. * Return: @vfsuid mapped into the filesystem idmapping
  135. */
  136. kuid_t from_vfsuid(struct mnt_idmap *idmap,
  137. struct user_namespace *fs_userns, vfsuid_t vfsuid)
  138. {
  139. uid_t uid;
  140. if (idmap == &nop_mnt_idmap)
  141. return AS_KUIDT(vfsuid);
  142. if (idmap == &invalid_mnt_idmap)
  143. return INVALID_UID;
  144. uid = map_id_up(&idmap->uid_map, __vfsuid_val(vfsuid));
  145. if (uid == (uid_t)-1)
  146. return INVALID_UID;
  147. if (initial_idmapping(fs_userns))
  148. return KUIDT_INIT(uid);
  149. return make_kuid(fs_userns, uid);
  150. }
  151. EXPORT_SYMBOL_GPL(from_vfsuid);
  152. /**
  153. * from_vfsgid - map a vfsgid into the filesystem idmapping
  154. * @idmap: the mount's idmapping
  155. * @fs_userns: the filesystem's idmapping
  156. * @vfsgid : vfsgid to be mapped
  157. *
  158. * Map @vfsgid into the filesystem idmapping. This function has to be used in
  159. * order to e.g. write @vfsgid to inode->i_gid.
  160. *
  161. * Return: @vfsgid mapped into the filesystem idmapping
  162. */
  163. kgid_t from_vfsgid(struct mnt_idmap *idmap,
  164. struct user_namespace *fs_userns, vfsgid_t vfsgid)
  165. {
  166. gid_t gid;
  167. if (idmap == &nop_mnt_idmap)
  168. return AS_KGIDT(vfsgid);
  169. if (idmap == &invalid_mnt_idmap)
  170. return INVALID_GID;
  171. gid = map_id_up(&idmap->gid_map, __vfsgid_val(vfsgid));
  172. if (gid == (gid_t)-1)
  173. return INVALID_GID;
  174. if (initial_idmapping(fs_userns))
  175. return KGIDT_INIT(gid);
  176. return make_kgid(fs_userns, gid);
  177. }
  178. EXPORT_SYMBOL_GPL(from_vfsgid);
  179. #ifdef CONFIG_MULTIUSER
  180. /**
  181. * vfsgid_in_group_p() - check whether a vfsuid matches the caller's groups
  182. * @vfsgid: the mnt gid to match
  183. *
  184. * This function can be used to determine whether @vfsuid matches any of the
  185. * caller's groups.
  186. *
  187. * Return: 1 if vfsuid matches caller's groups, 0 if not.
  188. */
  189. int vfsgid_in_group_p(vfsgid_t vfsgid)
  190. {
  191. return in_group_p(AS_KGIDT(vfsgid));
  192. }
  193. #else
  194. int vfsgid_in_group_p(vfsgid_t vfsgid)
  195. {
  196. return 1;
  197. }
  198. #endif
  199. EXPORT_SYMBOL_GPL(vfsgid_in_group_p);
  200. static int copy_mnt_idmap(struct uid_gid_map *map_from,
  201. struct uid_gid_map *map_to)
  202. {
  203. struct uid_gid_extent *forward, *reverse;
  204. u32 nr_extents = READ_ONCE(map_from->nr_extents);
  205. /* Pairs with smp_wmb() when writing the idmapping. */
  206. smp_rmb();
  207. /*
  208. * Don't blindly copy @map_to into @map_from if nr_extents is
  209. * smaller or equal to UID_GID_MAP_MAX_BASE_EXTENTS. Since we
  210. * read @nr_extents someone could have written an idmapping and
  211. * then we might end up with inconsistent data. So just don't do
  212. * anything at all.
  213. */
  214. if (nr_extents == 0)
  215. return -EINVAL;
  216. /*
  217. * Here we know that nr_extents is greater than zero which means
  218. * a map has been written. Since idmappings can't be changed
  219. * once they have been written we know that we can safely copy
  220. * from @map_to into @map_from.
  221. */
  222. if (nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) {
  223. *map_to = *map_from;
  224. return 0;
  225. }
  226. forward = kmemdup_array(map_from->forward, nr_extents,
  227. sizeof(struct uid_gid_extent),
  228. GFP_KERNEL_ACCOUNT);
  229. if (!forward)
  230. return -ENOMEM;
  231. reverse = kmemdup_array(map_from->reverse, nr_extents,
  232. sizeof(struct uid_gid_extent),
  233. GFP_KERNEL_ACCOUNT);
  234. if (!reverse) {
  235. kfree(forward);
  236. return -ENOMEM;
  237. }
  238. /*
  239. * The idmapping isn't exposed anywhere so we don't need to care
  240. * about ordering between extent pointers and @nr_extents
  241. * initialization.
  242. */
  243. map_to->forward = forward;
  244. map_to->reverse = reverse;
  245. map_to->nr_extents = nr_extents;
  246. return 0;
  247. }
  248. static void free_mnt_idmap(struct mnt_idmap *idmap)
  249. {
  250. if (idmap->uid_map.nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) {
  251. kfree(idmap->uid_map.forward);
  252. kfree(idmap->uid_map.reverse);
  253. }
  254. if (idmap->gid_map.nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) {
  255. kfree(idmap->gid_map.forward);
  256. kfree(idmap->gid_map.reverse);
  257. }
  258. kfree(idmap);
  259. }
  260. struct mnt_idmap *alloc_mnt_idmap(struct user_namespace *mnt_userns)
  261. {
  262. struct mnt_idmap *idmap;
  263. int ret;
  264. idmap = kzalloc(sizeof(struct mnt_idmap), GFP_KERNEL_ACCOUNT);
  265. if (!idmap)
  266. return ERR_PTR(-ENOMEM);
  267. refcount_set(&idmap->count, 1);
  268. ret = copy_mnt_idmap(&mnt_userns->uid_map, &idmap->uid_map);
  269. if (!ret)
  270. ret = copy_mnt_idmap(&mnt_userns->gid_map, &idmap->gid_map);
  271. if (ret) {
  272. free_mnt_idmap(idmap);
  273. idmap = ERR_PTR(ret);
  274. }
  275. return idmap;
  276. }
  277. /**
  278. * mnt_idmap_get - get a reference to an idmapping
  279. * @idmap: the idmap to bump the reference on
  280. *
  281. * If @idmap is not the @nop_mnt_idmap bump the reference count.
  282. *
  283. * Return: @idmap with reference count bumped if @not_mnt_idmap isn't passed.
  284. */
  285. struct mnt_idmap *mnt_idmap_get(struct mnt_idmap *idmap)
  286. {
  287. if (idmap != &nop_mnt_idmap && idmap != &invalid_mnt_idmap)
  288. refcount_inc(&idmap->count);
  289. return idmap;
  290. }
  291. EXPORT_SYMBOL_GPL(mnt_idmap_get);
  292. /**
  293. * mnt_idmap_put - put a reference to an idmapping
  294. * @idmap: the idmap to put the reference on
  295. *
  296. * If this is a non-initial idmapping, put the reference count when a mount is
  297. * released and free it if we're the last user.
  298. */
  299. void mnt_idmap_put(struct mnt_idmap *idmap)
  300. {
  301. if (idmap != &nop_mnt_idmap && idmap != &invalid_mnt_idmap &&
  302. refcount_dec_and_test(&idmap->count))
  303. free_mnt_idmap(idmap);
  304. }
  305. EXPORT_SYMBOL_GPL(mnt_idmap_put);