1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2022 Christian Brauner <brauner@kernel.org> */
3
4 #include <linux/cred.h>
5 #include <linux/fs.h>
6 #include <linux/mnt_idmapping.h>
7 #include <linux/slab.h>
8 #include <linux/user_namespace.h>
9
10 #include "internal.h"
11
12 /*
13 * Outside of this file vfs{g,u}id_t are always created from k{g,u}id_t,
14 * never from raw values. These are just internal helpers.
15 */
16 #define VFSUIDT_INIT_RAW(val) (vfsuid_t){ val }
17 #define VFSGIDT_INIT_RAW(val) (vfsgid_t){ val }
18
19 struct mnt_idmap {
20 struct uid_gid_map uid_map;
21 struct uid_gid_map gid_map;
22 refcount_t count;
23 };
24
25 /*
26 * Carries the initial idmapping of 0:0:4294967295 which is an identity
27 * mapping. This means that {g,u}id 0 is mapped to {g,u}id 0, {g,u}id 1 is
28 * mapped to {g,u}id 1, [...], {g,u}id 1000 to {g,u}id 1000, [...].
29 */
30 struct mnt_idmap nop_mnt_idmap = {
31 .count = REFCOUNT_INIT(1),
32 };
33 EXPORT_SYMBOL_GPL(nop_mnt_idmap);
34
35 /*
36 * Carries the invalid idmapping of a full 0-4294967295 {g,u}id range.
37 * This means that all {g,u}ids are mapped to INVALID_VFS{G,U}ID.
38 */
39 struct mnt_idmap invalid_mnt_idmap = {
40 .count = REFCOUNT_INIT(1),
41 };
42 EXPORT_SYMBOL_GPL(invalid_mnt_idmap);
43
44 /**
45 * initial_idmapping - check whether this is the initial mapping
46 * @ns: idmapping to check
47 *
48 * Check whether this is the initial mapping, mapping 0 to 0, 1 to 1,
49 * [...], 1000 to 1000 [...].
50 *
51 * Return: true if this is the initial mapping, false if not.
52 */
initial_idmapping(const struct user_namespace * ns)53 static inline bool initial_idmapping(const struct user_namespace *ns)
54 {
55 return ns == &init_user_ns;
56 }
57
58 /**
59 * make_vfsuid - map a filesystem kuid according to an idmapping
60 * @idmap: the mount's idmapping
61 * @fs_userns: the filesystem's idmapping
62 * @kuid : kuid to be mapped
63 *
64 * Take a @kuid and remap it from @fs_userns into @idmap. Use this
65 * function when preparing a @kuid to be reported to userspace.
66 *
67 * If initial_idmapping() determines that this is not an idmapped mount
68 * we can simply return @kuid unchanged.
69 * If initial_idmapping() tells us that the filesystem is not mounted with an
70 * idmapping we know the value of @kuid won't change when calling
71 * from_kuid() so we can simply retrieve the value via __kuid_val()
72 * directly.
73 *
74 * Return: @kuid mapped according to @idmap.
75 * If @kuid has no mapping in either @idmap or @fs_userns INVALID_UID is
76 * returned.
77 */
78
make_vfsuid(struct mnt_idmap * idmap,struct user_namespace * fs_userns,kuid_t kuid)79 vfsuid_t make_vfsuid(struct mnt_idmap *idmap,
80 struct user_namespace *fs_userns,
81 kuid_t kuid)
82 {
83 uid_t uid;
84
85 if (idmap == &nop_mnt_idmap)
86 return VFSUIDT_INIT(kuid);
87 if (idmap == &invalid_mnt_idmap)
88 return INVALID_VFSUID;
89 if (initial_idmapping(fs_userns))
90 uid = __kuid_val(kuid);
91 else
92 uid = from_kuid(fs_userns, kuid);
93 if (uid == (uid_t)-1)
94 return INVALID_VFSUID;
95 return VFSUIDT_INIT_RAW(map_id_down(&idmap->uid_map, uid));
96 }
97 EXPORT_SYMBOL_GPL(make_vfsuid);
98
99 /**
100 * make_vfsgid - map a filesystem kgid according to an idmapping
101 * @idmap: the mount's idmapping
102 * @fs_userns: the filesystem's idmapping
103 * @kgid : kgid to be mapped
104 *
105 * Take a @kgid and remap it from @fs_userns into @idmap. Use this
106 * function when preparing a @kgid to be reported to userspace.
107 *
108 * If initial_idmapping() determines that this is not an idmapped mount
109 * we can simply return @kgid unchanged.
110 * If initial_idmapping() tells us that the filesystem is not mounted with an
111 * idmapping we know the value of @kgid won't change when calling
112 * from_kgid() so we can simply retrieve the value via __kgid_val()
113 * directly.
114 *
115 * Return: @kgid mapped according to @idmap.
116 * If @kgid has no mapping in either @idmap or @fs_userns INVALID_GID is
117 * returned.
118 */
make_vfsgid(struct mnt_idmap * idmap,struct user_namespace * fs_userns,kgid_t kgid)119 vfsgid_t make_vfsgid(struct mnt_idmap *idmap,
120 struct user_namespace *fs_userns, kgid_t kgid)
121 {
122 gid_t gid;
123
124 if (idmap == &nop_mnt_idmap)
125 return VFSGIDT_INIT(kgid);
126 if (idmap == &invalid_mnt_idmap)
127 return INVALID_VFSGID;
128 if (initial_idmapping(fs_userns))
129 gid = __kgid_val(kgid);
130 else
131 gid = from_kgid(fs_userns, kgid);
132 if (gid == (gid_t)-1)
133 return INVALID_VFSGID;
134 return VFSGIDT_INIT_RAW(map_id_down(&idmap->gid_map, gid));
135 }
136 EXPORT_SYMBOL_GPL(make_vfsgid);
137
138 /**
139 * from_vfsuid - map a vfsuid into the filesystem idmapping
140 * @idmap: the mount's idmapping
141 * @fs_userns: the filesystem's idmapping
142 * @vfsuid : vfsuid to be mapped
143 *
144 * Map @vfsuid into the filesystem idmapping. This function has to be used in
145 * order to e.g. write @vfsuid to inode->i_uid.
146 *
147 * Return: @vfsuid mapped into the filesystem idmapping
148 */
from_vfsuid(struct mnt_idmap * idmap,struct user_namespace * fs_userns,vfsuid_t vfsuid)149 kuid_t from_vfsuid(struct mnt_idmap *idmap,
150 struct user_namespace *fs_userns, vfsuid_t vfsuid)
151 {
152 uid_t uid;
153
154 if (idmap == &nop_mnt_idmap)
155 return AS_KUIDT(vfsuid);
156 if (idmap == &invalid_mnt_idmap)
157 return INVALID_UID;
158 uid = map_id_up(&idmap->uid_map, __vfsuid_val(vfsuid));
159 if (uid == (uid_t)-1)
160 return INVALID_UID;
161 if (initial_idmapping(fs_userns))
162 return KUIDT_INIT(uid);
163 return make_kuid(fs_userns, uid);
164 }
165 EXPORT_SYMBOL_GPL(from_vfsuid);
166
167 /**
168 * from_vfsgid - map a vfsgid into the filesystem idmapping
169 * @idmap: the mount's idmapping
170 * @fs_userns: the filesystem's idmapping
171 * @vfsgid : vfsgid to be mapped
172 *
173 * Map @vfsgid into the filesystem idmapping. This function has to be used in
174 * order to e.g. write @vfsgid to inode->i_gid.
175 *
176 * Return: @vfsgid mapped into the filesystem idmapping
177 */
from_vfsgid(struct mnt_idmap * idmap,struct user_namespace * fs_userns,vfsgid_t vfsgid)178 kgid_t from_vfsgid(struct mnt_idmap *idmap,
179 struct user_namespace *fs_userns, vfsgid_t vfsgid)
180 {
181 gid_t gid;
182
183 if (idmap == &nop_mnt_idmap)
184 return AS_KGIDT(vfsgid);
185 if (idmap == &invalid_mnt_idmap)
186 return INVALID_GID;
187 gid = map_id_up(&idmap->gid_map, __vfsgid_val(vfsgid));
188 if (gid == (gid_t)-1)
189 return INVALID_GID;
190 if (initial_idmapping(fs_userns))
191 return KGIDT_INIT(gid);
192 return make_kgid(fs_userns, gid);
193 }
194 EXPORT_SYMBOL_GPL(from_vfsgid);
195
196 #ifdef CONFIG_MULTIUSER
197 /**
198 * vfsgid_in_group_p() - check whether a vfsuid matches the caller's groups
199 * @vfsgid: the mnt gid to match
200 *
201 * This function can be used to determine whether @vfsuid matches any of the
202 * caller's groups.
203 *
204 * Return: 1 if vfsuid matches caller's groups, 0 if not.
205 */
vfsgid_in_group_p(vfsgid_t vfsgid)206 int vfsgid_in_group_p(vfsgid_t vfsgid)
207 {
208 return in_group_p(AS_KGIDT(vfsgid));
209 }
210 #else
vfsgid_in_group_p(vfsgid_t vfsgid)211 int vfsgid_in_group_p(vfsgid_t vfsgid)
212 {
213 return 1;
214 }
215 #endif
216 EXPORT_SYMBOL_GPL(vfsgid_in_group_p);
217
copy_mnt_idmap(struct uid_gid_map * map_from,struct uid_gid_map * map_to)218 static int copy_mnt_idmap(struct uid_gid_map *map_from,
219 struct uid_gid_map *map_to)
220 {
221 struct uid_gid_extent *forward, *reverse;
222 u32 nr_extents = READ_ONCE(map_from->nr_extents);
223 /* Pairs with smp_wmb() when writing the idmapping. */
224 smp_rmb();
225
226 /*
227 * Don't blindly copy @map_to into @map_from if nr_extents is
228 * smaller or equal to UID_GID_MAP_MAX_BASE_EXTENTS. Since we
229 * read @nr_extents someone could have written an idmapping and
230 * then we might end up with inconsistent data. So just don't do
231 * anything at all.
232 */
233 if (nr_extents == 0)
234 return -EINVAL;
235
236 /*
237 * Here we know that nr_extents is greater than zero which means
238 * a map has been written. Since idmappings can't be changed
239 * once they have been written we know that we can safely copy
240 * from @map_to into @map_from.
241 */
242
243 if (nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) {
244 *map_to = *map_from;
245 return 0;
246 }
247
248 forward = kmemdup_array(map_from->forward, nr_extents,
249 sizeof(struct uid_gid_extent),
250 GFP_KERNEL_ACCOUNT);
251 if (!forward)
252 return -ENOMEM;
253
254 reverse = kmemdup_array(map_from->reverse, nr_extents,
255 sizeof(struct uid_gid_extent),
256 GFP_KERNEL_ACCOUNT);
257 if (!reverse) {
258 kfree(forward);
259 return -ENOMEM;
260 }
261
262 /*
263 * The idmapping isn't exposed anywhere so we don't need to care
264 * about ordering between extent pointers and @nr_extents
265 * initialization.
266 */
267 map_to->forward = forward;
268 map_to->reverse = reverse;
269 map_to->nr_extents = nr_extents;
270 return 0;
271 }
272
free_mnt_idmap(struct mnt_idmap * idmap)273 static void free_mnt_idmap(struct mnt_idmap *idmap)
274 {
275 if (idmap->uid_map.nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) {
276 kfree(idmap->uid_map.forward);
277 kfree(idmap->uid_map.reverse);
278 }
279 if (idmap->gid_map.nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) {
280 kfree(idmap->gid_map.forward);
281 kfree(idmap->gid_map.reverse);
282 }
283 kfree(idmap);
284 }
285
alloc_mnt_idmap(struct user_namespace * mnt_userns)286 struct mnt_idmap *alloc_mnt_idmap(struct user_namespace *mnt_userns)
287 {
288 struct mnt_idmap *idmap;
289 int ret;
290
291 idmap = kzalloc(sizeof(struct mnt_idmap), GFP_KERNEL_ACCOUNT);
292 if (!idmap)
293 return ERR_PTR(-ENOMEM);
294
295 refcount_set(&idmap->count, 1);
296 ret = copy_mnt_idmap(&mnt_userns->uid_map, &idmap->uid_map);
297 if (!ret)
298 ret = copy_mnt_idmap(&mnt_userns->gid_map, &idmap->gid_map);
299 if (ret) {
300 free_mnt_idmap(idmap);
301 idmap = ERR_PTR(ret);
302 }
303 return idmap;
304 }
305
306 /**
307 * mnt_idmap_get - get a reference to an idmapping
308 * @idmap: the idmap to bump the reference on
309 *
310 * If @idmap is not the @nop_mnt_idmap bump the reference count.
311 *
312 * Return: @idmap with reference count bumped if @not_mnt_idmap isn't passed.
313 */
mnt_idmap_get(struct mnt_idmap * idmap)314 struct mnt_idmap *mnt_idmap_get(struct mnt_idmap *idmap)
315 {
316 if (idmap != &nop_mnt_idmap && idmap != &invalid_mnt_idmap)
317 refcount_inc(&idmap->count);
318
319 return idmap;
320 }
321 EXPORT_SYMBOL_GPL(mnt_idmap_get);
322
323 /**
324 * mnt_idmap_put - put a reference to an idmapping
325 * @idmap: the idmap to put the reference on
326 *
327 * If this is a non-initial idmapping, put the reference count when a mount is
328 * released and free it if we're the last user.
329 */
mnt_idmap_put(struct mnt_idmap * idmap)330 void mnt_idmap_put(struct mnt_idmap *idmap)
331 {
332 if (idmap != &nop_mnt_idmap && idmap != &invalid_mnt_idmap &&
333 refcount_dec_and_test(&idmap->count))
334 free_mnt_idmap(idmap);
335 }
336 EXPORT_SYMBOL_GPL(mnt_idmap_put);
337