groups.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. /*
  2. * Supplementary group IDs
  3. */
  4. #include <linux/cred.h>
  5. #include <linux/export.h>
  6. #include <linux/slab.h>
  7. #include <linux/security.h>
  8. #include <linux/syscalls.h>
  9. #include <linux/user_namespace.h>
  10. #include <asm/uaccess.h>
  11. struct group_info *groups_alloc(int gidsetsize)
  12. {
  13. struct group_info *group_info;
  14. int nblocks;
  15. int i;
  16. nblocks = (gidsetsize + NGROUPS_PER_BLOCK - 1) / NGROUPS_PER_BLOCK;
  17. /* Make sure we always allocate at least one indirect block pointer */
  18. nblocks = nblocks ? : 1;
  19. group_info = kmalloc(sizeof(*group_info) + nblocks*sizeof(gid_t *), GFP_USER);
  20. if (!group_info)
  21. return NULL;
  22. group_info->ngroups = gidsetsize;
  23. group_info->nblocks = nblocks;
  24. atomic_set(&group_info->usage, 1);
  25. if (gidsetsize <= NGROUPS_SMALL)
  26. group_info->blocks[0] = group_info->small_block;
  27. else {
  28. for (i = 0; i < nblocks; i++) {
  29. kgid_t *b;
  30. b = (void *)__get_free_page(GFP_USER);
  31. if (!b)
  32. goto out_undo_partial_alloc;
  33. group_info->blocks[i] = b;
  34. }
  35. }
  36. return group_info;
  37. out_undo_partial_alloc:
  38. while (--i >= 0) {
  39. free_page((unsigned long)group_info->blocks[i]);
  40. }
  41. kfree(group_info);
  42. return NULL;
  43. }
  44. EXPORT_SYMBOL(groups_alloc);
  45. void groups_free(struct group_info *group_info)
  46. {
  47. if (group_info->blocks[0] != group_info->small_block) {
  48. int i;
  49. for (i = 0; i < group_info->nblocks; i++)
  50. free_page((unsigned long)group_info->blocks[i]);
  51. }
  52. kfree(group_info);
  53. }
  54. EXPORT_SYMBOL(groups_free);
  55. /* export the group_info to a user-space array */
  56. static int groups_to_user(gid_t __user *grouplist,
  57. const struct group_info *group_info)
  58. {
  59. struct user_namespace *user_ns = current_user_ns();
  60. int i;
  61. unsigned int count = group_info->ngroups;
  62. for (i = 0; i < count; i++) {
  63. gid_t gid;
  64. gid = from_kgid_munged(user_ns, GROUP_AT(group_info, i));
  65. if (put_user(gid, grouplist+i))
  66. return -EFAULT;
  67. }
  68. return 0;
  69. }
  70. /* fill a group_info from a user-space array - it must be allocated already */
  71. static int groups_from_user(struct group_info *group_info,
  72. gid_t __user *grouplist)
  73. {
  74. struct user_namespace *user_ns = current_user_ns();
  75. int i;
  76. unsigned int count = group_info->ngroups;
  77. for (i = 0; i < count; i++) {
  78. gid_t gid;
  79. kgid_t kgid;
  80. if (get_user(gid, grouplist+i))
  81. return -EFAULT;
  82. kgid = make_kgid(user_ns, gid);
  83. if (!gid_valid(kgid))
  84. return -EINVAL;
  85. GROUP_AT(group_info, i) = kgid;
  86. }
  87. return 0;
  88. }
  89. /* a simple Shell sort */
  90. void groups_sort(struct group_info *group_info)
  91. {
  92. int base, max, stride;
  93. int gidsetsize = group_info->ngroups;
  94. for (stride = 1; stride < gidsetsize; stride = 3 * stride + 1)
  95. ; /* nothing */
  96. stride /= 3;
  97. while (stride) {
  98. max = gidsetsize - stride;
  99. for (base = 0; base < max; base++) {
  100. int left = base;
  101. int right = left + stride;
  102. kgid_t tmp = GROUP_AT(group_info, right);
  103. while (left >= 0 && gid_gt(GROUP_AT(group_info, left), tmp)) {
  104. GROUP_AT(group_info, right) =
  105. GROUP_AT(group_info, left);
  106. right = left;
  107. left -= stride;
  108. }
  109. GROUP_AT(group_info, right) = tmp;
  110. }
  111. stride /= 3;
  112. }
  113. }
  114. EXPORT_SYMBOL(groups_sort);
  115. /* a simple bsearch */
  116. int groups_search(const struct group_info *group_info, kgid_t grp)
  117. {
  118. unsigned int left, right;
  119. if (!group_info)
  120. return 0;
  121. left = 0;
  122. right = group_info->ngroups;
  123. while (left < right) {
  124. unsigned int mid = (left+right)/2;
  125. if (gid_gt(grp, GROUP_AT(group_info, mid)))
  126. left = mid + 1;
  127. else if (gid_lt(grp, GROUP_AT(group_info, mid)))
  128. right = mid;
  129. else
  130. return 1;
  131. }
  132. return 0;
  133. }
  134. /**
  135. * set_groups - Change a group subscription in a set of credentials
  136. * @new: The newly prepared set of credentials to alter
  137. * @group_info: The group list to install
  138. */
  139. void set_groups(struct cred *new, struct group_info *group_info)
  140. {
  141. put_group_info(new->group_info);
  142. get_group_info(group_info);
  143. new->group_info = group_info;
  144. }
  145. EXPORT_SYMBOL(set_groups);
  146. /**
  147. * set_current_groups - Change current's group subscription
  148. * @group_info: The group list to impose
  149. *
  150. * Validate a group subscription and, if valid, impose it upon current's task
  151. * security record.
  152. */
  153. int set_current_groups(struct group_info *group_info)
  154. {
  155. struct cred *new;
  156. new = prepare_creds();
  157. if (!new)
  158. return -ENOMEM;
  159. set_groups(new, group_info);
  160. return commit_creds(new);
  161. }
  162. EXPORT_SYMBOL(set_current_groups);
  163. SYSCALL_DEFINE2(getgroups, int, gidsetsize, gid_t __user *, grouplist)
  164. {
  165. const struct cred *cred = current_cred();
  166. int i;
  167. if (gidsetsize < 0)
  168. return -EINVAL;
  169. /* no need to grab task_lock here; it cannot change */
  170. i = cred->group_info->ngroups;
  171. if (gidsetsize) {
  172. if (i > gidsetsize) {
  173. i = -EINVAL;
  174. goto out;
  175. }
  176. if (groups_to_user(grouplist, cred->group_info)) {
  177. i = -EFAULT;
  178. goto out;
  179. }
  180. }
  181. out:
  182. return i;
  183. }
  184. bool may_setgroups(void)
  185. {
  186. struct user_namespace *user_ns = current_user_ns();
  187. return ns_capable(user_ns, CAP_SETGID) &&
  188. userns_may_setgroups(user_ns);
  189. }
  190. /*
  191. * SMP: Our groups are copy-on-write. We can set them safely
  192. * without another task interfering.
  193. */
  194. SYSCALL_DEFINE2(setgroups, int, gidsetsize, gid_t __user *, grouplist)
  195. {
  196. struct group_info *group_info;
  197. int retval;
  198. if (!may_setgroups())
  199. return -EPERM;
  200. if ((unsigned)gidsetsize > NGROUPS_MAX)
  201. return -EINVAL;
  202. group_info = groups_alloc(gidsetsize);
  203. if (!group_info)
  204. return -ENOMEM;
  205. retval = groups_from_user(group_info, grouplist);
  206. if (retval) {
  207. put_group_info(group_info);
  208. return retval;
  209. }
  210. groups_sort(group_info);
  211. retval = set_current_groups(group_info);
  212. put_group_info(group_info);
  213. return retval;
  214. }
  215. /*
  216. * Check whether we're fsgid/egid or in the supplemental group..
  217. */
  218. int in_group_p(kgid_t grp)
  219. {
  220. const struct cred *cred = current_cred();
  221. int retval = 1;
  222. if (!gid_eq(grp, cred->fsgid))
  223. retval = groups_search(cred->group_info, grp);
  224. return retval;
  225. }
  226. EXPORT_SYMBOL(in_group_p);
  227. int in_egroup_p(kgid_t grp)
  228. {
  229. const struct cred *cred = current_cred();
  230. int retval = 1;
  231. if (!gid_eq(grp, cred->egid))
  232. retval = groups_search(cred->group_info, grp);
  233. return retval;
  234. }
  235. EXPORT_SYMBOL(in_egroup_p);