| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  *  This program is free software; you can redistribute it and/or | 
 | 3 |  *  modify it under the terms of the GNU General Public License as | 
 | 4 |  *  published by the Free Software Foundation, version 2 of the | 
 | 5 |  *  License. | 
 | 6 |  */ | 
 | 7 |  | 
 | 8 | #include <linux/module.h> | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 9 | #include <linux/nsproxy.h> | 
| Robert P. J. Day | 1aeb272 | 2008-04-29 00:59:25 -0700 | [diff] [blame] | 10 | #include <linux/slab.h> | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 11 | #include <linux/user_namespace.h> | 
| Eric W. Biederman | 5c1469d | 2010-06-13 03:28:03 +0000 | [diff] [blame] | 12 | #include <linux/highuid.h> | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 13 | #include <linux/cred.h> | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 14 |  | 
| Pavel Emelyanov | 6164281 | 2011-01-12 17:00:46 -0800 | [diff] [blame] | 15 | static struct kmem_cache *user_ns_cachep __read_mostly; | 
 | 16 |  | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 17 | /* | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 18 |  * Create a new user namespace, deriving the creator from the user in the | 
 | 19 |  * passed credentials, and replacing that user with the new root user for the | 
 | 20 |  * new namespace. | 
 | 21 |  * | 
 | 22 |  * This is called by copy_creds(), which will finish setting the target task's | 
 | 23 |  * credentials. | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 24 |  */ | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 25 | int create_user_ns(struct cred *new) | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 26 | { | 
 | 27 | 	struct user_namespace *ns; | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 28 | 	struct user_struct *root_user; | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 29 | 	int n; | 
 | 30 |  | 
| Pavel Emelyanov | 6164281 | 2011-01-12 17:00:46 -0800 | [diff] [blame] | 31 | 	ns = kmem_cache_alloc(user_ns_cachep, GFP_KERNEL); | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 32 | 	if (!ns) | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 33 | 		return -ENOMEM; | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 34 |  | 
 | 35 | 	kref_init(&ns->kref); | 
 | 36 |  | 
 | 37 | 	for (n = 0; n < UIDHASH_SZ; ++n) | 
| Pavel Emelyanov | 735de22 | 2007-09-18 22:46:44 -0700 | [diff] [blame] | 38 | 		INIT_HLIST_HEAD(ns->uidhash_table + n); | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 39 |  | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 40 | 	/* Alloc new root user.  */ | 
 | 41 | 	root_user = alloc_uid(ns, 0); | 
 | 42 | 	if (!root_user) { | 
| Pavel Emelyanov | 6164281 | 2011-01-12 17:00:46 -0800 | [diff] [blame] | 43 | 		kmem_cache_free(user_ns_cachep, ns); | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 44 | 		return -ENOMEM; | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 45 | 	} | 
 | 46 |  | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 47 | 	/* set the new root user in the credentials under preparation */ | 
 | 48 | 	ns->creator = new->user; | 
 | 49 | 	new->user = root_user; | 
 | 50 | 	new->uid = new->euid = new->suid = new->fsuid = 0; | 
 | 51 | 	new->gid = new->egid = new->sgid = new->fsgid = 0; | 
 | 52 | 	put_group_info(new->group_info); | 
 | 53 | 	new->group_info = get_group_info(&init_groups); | 
 | 54 | #ifdef CONFIG_KEYS | 
 | 55 | 	key_put(new->request_key_auth); | 
 | 56 | 	new->request_key_auth = NULL; | 
 | 57 | #endif | 
 | 58 | 	/* tgcred will be cleared in our caller bc CLONE_THREAD won't be set */ | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 59 |  | 
| NeilBrown | db1afff | 2010-03-16 15:14:51 +1100 | [diff] [blame] | 60 | 	/* root_user holds a reference to ns, our reference can be dropped */ | 
 | 61 | 	put_user_ns(ns); | 
| Serge E. Hallyn | 77ec739 | 2007-07-15 23:41:01 -0700 | [diff] [blame] | 62 |  | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 63 | 	return 0; | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 64 | } | 
 | 65 |  | 
| David Howells | 5170836 | 2009-02-27 14:03:03 -0800 | [diff] [blame] | 66 | /* | 
 | 67 |  * Deferred destructor for a user namespace.  This is required because | 
 | 68 |  * free_user_ns() may be called with uidhash_lock held, but we need to call | 
 | 69 |  * back to free_uid() which will want to take the lock again. | 
 | 70 |  */ | 
 | 71 | static void free_user_ns_work(struct work_struct *work) | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 72 | { | 
| David Howells | 5170836 | 2009-02-27 14:03:03 -0800 | [diff] [blame] | 73 | 	struct user_namespace *ns = | 
 | 74 | 		container_of(work, struct user_namespace, destroyer); | 
| Serge Hallyn | 18b6e04 | 2008-10-15 16:38:45 -0500 | [diff] [blame] | 75 | 	free_uid(ns->creator); | 
| Pavel Emelyanov | 6164281 | 2011-01-12 17:00:46 -0800 | [diff] [blame] | 76 | 	kmem_cache_free(user_ns_cachep, ns); | 
| Cedric Le Goater | acce292 | 2007-07-15 23:40:59 -0700 | [diff] [blame] | 77 | } | 
| David Howells | 5170836 | 2009-02-27 14:03:03 -0800 | [diff] [blame] | 78 |  | 
 | 79 | void free_user_ns(struct kref *kref) | 
 | 80 | { | 
 | 81 | 	struct user_namespace *ns = | 
 | 82 | 		container_of(kref, struct user_namespace, kref); | 
 | 83 |  | 
 | 84 | 	INIT_WORK(&ns->destroyer, free_user_ns_work); | 
 | 85 | 	schedule_work(&ns->destroyer); | 
 | 86 | } | 
| Michael Halcrow | 6a3fd92 | 2008-04-29 00:59:52 -0700 | [diff] [blame] | 87 | EXPORT_SYMBOL(free_user_ns); | 
| Eric W. Biederman | 5c1469d | 2010-06-13 03:28:03 +0000 | [diff] [blame] | 88 |  | 
 | 89 | uid_t user_ns_map_uid(struct user_namespace *to, const struct cred *cred, uid_t uid) | 
 | 90 | { | 
 | 91 | 	struct user_namespace *tmp; | 
 | 92 |  | 
 | 93 | 	if (likely(to == cred->user->user_ns)) | 
 | 94 | 		return uid; | 
 | 95 |  | 
 | 96 |  | 
 | 97 | 	/* Is cred->user the creator of the target user_ns | 
 | 98 | 	 * or the creator of one of it's parents? | 
 | 99 | 	 */ | 
 | 100 | 	for ( tmp = to; tmp != &init_user_ns; | 
 | 101 | 	      tmp = tmp->creator->user_ns ) { | 
 | 102 | 		if (cred->user == tmp->creator) { | 
 | 103 | 			return (uid_t)0; | 
 | 104 | 		} | 
 | 105 | 	} | 
 | 106 |  | 
 | 107 | 	/* No useful relationship so no mapping */ | 
 | 108 | 	return overflowuid; | 
 | 109 | } | 
 | 110 |  | 
 | 111 | gid_t user_ns_map_gid(struct user_namespace *to, const struct cred *cred, gid_t gid) | 
 | 112 | { | 
 | 113 | 	struct user_namespace *tmp; | 
 | 114 |  | 
 | 115 | 	if (likely(to == cred->user->user_ns)) | 
 | 116 | 		return gid; | 
 | 117 |  | 
 | 118 | 	/* Is cred->user the creator of the target user_ns | 
 | 119 | 	 * or the creator of one of it's parents? | 
 | 120 | 	 */ | 
 | 121 | 	for ( tmp = to; tmp != &init_user_ns; | 
 | 122 | 	      tmp = tmp->creator->user_ns ) { | 
 | 123 | 		if (cred->user == tmp->creator) { | 
 | 124 | 			return (gid_t)0; | 
 | 125 | 		} | 
 | 126 | 	} | 
 | 127 |  | 
 | 128 | 	/* No useful relationship so no mapping */ | 
 | 129 | 	return overflowgid; | 
 | 130 | } | 
| Pavel Emelyanov | 6164281 | 2011-01-12 17:00:46 -0800 | [diff] [blame] | 131 |  | 
 | 132 | static __init int user_namespaces_init(void) | 
 | 133 | { | 
 | 134 | 	user_ns_cachep = KMEM_CACHE(user_namespace, SLAB_PANIC); | 
 | 135 | 	return 0; | 
 | 136 | } | 
 | 137 | module_init(user_namespaces_init); |