groups.c 4.92 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2 3 4 5
/*
 * Supplementary group IDs
 */
#include <linux/cred.h>
6
#include <linux/export.h>
7 8
#include <linux/slab.h>
#include <linux/security.h>
9
#include <linux/sort.h>
10
#include <linux/syscalls.h>
11
#include <linux/user_namespace.h>
12
#include <linux/vmalloc.h>
13
#include <linux/uaccess.h>
14 15 16

struct group_info *groups_alloc(int gidsetsize)
{
17 18 19 20 21 22
	struct group_info *gi;
	unsigned int len;

	len = sizeof(struct group_info) + sizeof(kgid_t) * gidsetsize;
	gi = kmalloc(len, GFP_KERNEL_ACCOUNT|__GFP_NOWARN|__GFP_NORETRY);
	if (!gi)
23
		gi = __vmalloc(len, GFP_KERNEL_ACCOUNT, PAGE_KERNEL);
24
	if (!gi)
25 26
		return NULL;

27 28 29
	atomic_set(&gi->usage, 1);
	gi->ngroups = gidsetsize;
	return gi;
30 31 32 33 34 35
}

EXPORT_SYMBOL(groups_alloc);

void groups_free(struct group_info *group_info)
{
36
	kvfree(group_info);
37 38 39 40 41 42 43 44
}

EXPORT_SYMBOL(groups_free);

/* export the group_info to a user-space array */
static int groups_to_user(gid_t __user *grouplist,
			  const struct group_info *group_info)
{
45
	struct user_namespace *user_ns = current_user_ns();
46 47 48
	int i;
	unsigned int count = group_info->ngroups;

49 50
	for (i = 0; i < count; i++) {
		gid_t gid;
51
		gid = from_kgid_munged(user_ns, group_info->gid[i]);
52
		if (put_user(gid, grouplist+i))
53 54 55 56 57 58 59 60 61
			return -EFAULT;
	}
	return 0;
}

/* fill a group_info from a user-space array - it must be allocated already */
static int groups_from_user(struct group_info *group_info,
    gid_t __user *grouplist)
{
62
	struct user_namespace *user_ns = current_user_ns();
63 64 65
	int i;
	unsigned int count = group_info->ngroups;

66 67 68 69
	for (i = 0; i < count; i++) {
		gid_t gid;
		kgid_t kgid;
		if (get_user(gid, grouplist+i))
70 71
			return -EFAULT;

72 73 74 75
		kgid = make_kgid(user_ns, gid);
		if (!gid_valid(kgid))
			return -EINVAL;

76
		group_info->gid[i] = kgid;
77 78 79 80
	}
	return 0;
}

81 82 83 84 85 86 87 88
static int gid_cmp(const void *_a, const void *_b)
{
	kgid_t a = *(kgid_t *)_a;
	kgid_t b = *(kgid_t *)_b;

	return gid_gt(a, b) - gid_lt(a, b);
}

89
void groups_sort(struct group_info *group_info)
90
{
91 92
	sort(group_info->gid, group_info->ngroups, sizeof(*group_info->gid),
	     gid_cmp, NULL);
93
}
94
EXPORT_SYMBOL(groups_sort);
95 96

/* a simple bsearch */
97
int groups_search(const struct group_info *group_info, kgid_t grp)
98 99 100 101 102 103 104 105 106 107
{
	unsigned int left, right;

	if (!group_info)
		return 0;

	left = 0;
	right = group_info->ngroups;
	while (left < right) {
		unsigned int mid = (left+right)/2;
108
		if (gid_gt(grp, group_info->gid[mid]))
109
			left = mid + 1;
110
		else if (gid_lt(grp, group_info->gid[mid]))
111 112 113 114 115 116 117 118 119 120 121 122
			right = mid;
		else
			return 1;
	}
	return 0;
}

/**
 * set_groups - Change a group subscription in a set of credentials
 * @new: The newly prepared set of credentials to alter
 * @group_info: The group list to install
 */
123
void set_groups(struct cred *new, struct group_info *group_info)
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146
{
	put_group_info(new->group_info);
	get_group_info(group_info);
	new->group_info = group_info;
}

EXPORT_SYMBOL(set_groups);

/**
 * set_current_groups - Change current's group subscription
 * @group_info: The group list to impose
 *
 * Validate a group subscription and, if valid, impose it upon current's task
 * security record.
 */
int set_current_groups(struct group_info *group_info)
{
	struct cred *new;

	new = prepare_creds();
	if (!new)
		return -ENOMEM;

147
	set_groups(new, group_info);
148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176
	return commit_creds(new);
}

EXPORT_SYMBOL(set_current_groups);

SYSCALL_DEFINE2(getgroups, int, gidsetsize, gid_t __user *, grouplist)
{
	const struct cred *cred = current_cred();
	int i;

	if (gidsetsize < 0)
		return -EINVAL;

	/* no need to grab task_lock here; it cannot change */
	i = cred->group_info->ngroups;
	if (gidsetsize) {
		if (i > gidsetsize) {
			i = -EINVAL;
			goto out;
		}
		if (groups_to_user(grouplist, cred->group_info)) {
			i = -EFAULT;
			goto out;
		}
	}
out:
	return i;
}

177 178 179 180
bool may_setgroups(void)
{
	struct user_namespace *user_ns = current_user_ns();

181 182
	return ns_capable(user_ns, CAP_SETGID) &&
		userns_may_setgroups(user_ns);
183 184
}

185 186 187 188 189 190 191 192 193 194
/*
 *	SMP: Our groups are copy-on-write. We can set them safely
 *	without another task interfering.
 */

SYSCALL_DEFINE2(setgroups, int, gidsetsize, gid_t __user *, grouplist)
{
	struct group_info *group_info;
	int retval;

195
	if (!may_setgroups())
196 197 198 199 200 201 202 203 204 205 206 207 208
		return -EPERM;
	if ((unsigned)gidsetsize > NGROUPS_MAX)
		return -EINVAL;

	group_info = groups_alloc(gidsetsize);
	if (!group_info)
		return -ENOMEM;
	retval = groups_from_user(group_info, grouplist);
	if (retval) {
		put_group_info(group_info);
		return retval;
	}

209
	groups_sort(group_info);
210 211 212 213 214 215 216 217 218
	retval = set_current_groups(group_info);
	put_group_info(group_info);

	return retval;
}

/*
 * Check whether we're fsgid/egid or in the supplemental group..
 */
219
int in_group_p(kgid_t grp)
220 221 222 223
{
	const struct cred *cred = current_cred();
	int retval = 1;

224 225
	if (!gid_eq(grp, cred->fsgid))
		retval = groups_search(cred->group_info, grp);
226 227 228 229 230
	return retval;
}

EXPORT_SYMBOL(in_group_p);

231
int in_egroup_p(kgid_t grp)
232 233 234 235
{
	const struct cred *cred = current_cred();
	int retval = 1;

236 237
	if (!gid_eq(grp, cred->egid))
		retval = groups_search(cred->group_info, grp);
238 239 240 241
	return retval;
}

EXPORT_SYMBOL(in_egroup_p);