Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5926898ybv; Tue, 18 Feb 2020 06:37:06 -0800 (PST) X-Google-Smtp-Source: APXvYqwUGx8G1Nc4VAnQWqC9E1YEEHeMfZ7zIHOMrUZmbQyrOTFnCnvtF4am9aAQrbL1fV+5vV7C X-Received: by 2002:a9d:22:: with SMTP id 31mr14993994ota.173.1582036626126; Tue, 18 Feb 2020 06:37:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582036626; cv=none; d=google.com; s=arc-20160816; b=YVFQDfnxLJWFU3+FgcT9ln1p0AAfPTi25AX7scQ9d1f80VeSwecekVfCm7U4oTSH33 N9u3VU+XA6R4U9n1Ba2wwITrK1CC1jUS5vEXB8bIj0vGWgiDQHMYKGkw6ivvL7C4Luy2 +EzT4855yz1/lOzwNbz9qk3TRbuLlj1+tA54u8YLhu8boQAXVW9u23FZG16L4MwOsyys mDDpkil9Nn5aJEGfLKzq4jHc+AiLYLTYTvtHC58TEDqlxhBDjjccarLzdbn3FPKGweYK S8jyibodzAFPD8t0zC82r0/5nEiDdUK8gyvPrHl4fv7a4XhGSAnBtOvfmQAGWOrPmeah XZEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=QsruxY5Ii9yDqa2j/jrUiqiJQtiSzXPH3AbtJoSx7U8=; b=pQpKUfKHJmfw00w1Tu6Eo+SPyYLzUVhYA2x0sH56WcvQfyhAYBc1szKKotaHJGeakZ yyxiLYGn4rLeEsh7M726mE6VWNTbgY/oYsiwP4ZurwLcnfyAy3B4XgpCvzPDLb/eGh+p KiFKw1HzMw2TdlQwVSv2aEztlRMZZyyFl+ncdoLRL40fJ1RzgAiZLIhtSvMNGmc37scr 5Ebr+ByMByjzO9XHWJStaHHXa6u81nAi+Q92qlAWgBryaYEi7mAiLPxOAcbzl8muRDJ4 /41VzUA8SsZmaetPGcMimqAurmkxlsVvKSPYGkAT7J6fagdPxMtfVQducDp4BwCeVgrg NknA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x9si7756334oia.238.2020.02.18.06.36.53; Tue, 18 Feb 2020 06:37:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727785AbgBROgX (ORCPT + 99 others); Tue, 18 Feb 2020 09:36:23 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:53031 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726840AbgBROfj (ORCPT ); Tue, 18 Feb 2020 09:35:39 -0500 Received: from ip5f5bf7ec.dynamic.kabel-deutschland.de ([95.91.247.236] helo=wittgenstein.fritz.box) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1j43xt-0000fF-2o; Tue, 18 Feb 2020 14:35:09 +0000 From: Christian Brauner To: =?UTF-8?q?St=C3=A9phane=20Graber?= , "Eric W. Biederman" , Aleksa Sarai , Jann Horn Cc: smbarber@chromium.org, Seth Forshee , Alexander Viro , Alexey Dobriyan , Serge Hallyn , James Morris , Kees Cook , Jonathan Corbet , Phil Estes , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, containers@lists.linux-foundation.org, linux-security-module@vger.kernel.org, linux-api@vger.kernel.org, Christian Brauner Subject: [PATCH v3 05/25] user_namespace: refactor map_write() Date: Tue, 18 Feb 2020 15:33:51 +0100 Message-Id: <20200218143411.2389182-6-christian.brauner@ubuntu.com> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200218143411.2389182-1-christian.brauner@ubuntu.com> References: <20200218143411.2389182-1-christian.brauner@ubuntu.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Refactor map_write() to prepare for adding fsid mappings support. This mainly factors out various open-coded parts into helpers that can be reused in the follow up patch. Cc: Jann Horn Signed-off-by: Christian Brauner --- /* v2 */ patch not present /* v3 */ patch added - Jann Horn : - Split changes to map_write() to implement fsid mappings into three separate patches: basic fsid helpers, preparatory changes to map_write(), actual fsid mapping support in map_write(). --- kernel/user_namespace.c | 117 +++++++++++++++++++++++++--------------- 1 file changed, 74 insertions(+), 43 deletions(-) diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c index 2cfd1e519cc4..e91141262bcc 100644 --- a/kernel/user_namespace.c +++ b/kernel/user_namespace.c @@ -1038,10 +1038,10 @@ static int cmp_extents_reverse(const void *a, const void *b) } /** - * sort_idmaps - Sorts an array of idmap entries. + * sort_map - Sorts an array of idmap entries. * Can only be called if number of mappings exceeds UID_GID_MAP_MAX_BASE_EXTENTS. */ -static int sort_idmaps(struct uid_gid_map *map) +static int sort_map(struct uid_gid_map *map) { if (map->nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) return 0; @@ -1064,6 +1064,71 @@ static int sort_idmaps(struct uid_gid_map *map) return 0; } +static int sort_idmaps(struct uid_gid_map *map) +{ + return sort_map(map); +} + +static int map_from_parent(struct uid_gid_map *new_map, + struct uid_gid_map *parent_map) +{ + unsigned idx; + + /* Map the lower ids from the parent user namespace to the + * kernel global id space. + */ + for (idx = 0; idx < new_map->nr_extents; idx++) { + struct uid_gid_extent *e; + u32 lower_first; + + if (new_map->nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) + e = &new_map->extent[idx]; + else + e = &new_map->forward[idx]; + + lower_first = map_id_range_down(parent_map, e->lower_first, e->count); + + /* Fail if we can not map the specified extent to + * the kernel global id space. + */ + if (lower_first == (u32)-1) + return -EPERM; + + e->lower_first = lower_first; + } + + return 0; +} + +static int map_into_kids(struct uid_gid_map *id_map, + struct uid_gid_map *parent_id_map) +{ + return map_from_parent(id_map, parent_id_map); +} + +static void install_idmaps(struct uid_gid_map *id_map, + struct uid_gid_map *new_id_map) +{ + if (new_id_map->nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) { + memcpy(id_map->extent, new_id_map->extent, + new_id_map->nr_extents * sizeof(new_id_map->extent[0])); + } else { + id_map->forward = new_id_map->forward; + id_map->reverse = new_id_map->reverse; + } +} + +static void free_idmaps(struct uid_gid_map *new_id_map) +{ + if (new_id_map->nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) { + kfree(new_id_map->forward); + kfree(new_id_map->reverse); + new_id_map->forward = NULL; + new_id_map->reverse = NULL; + new_id_map->nr_extents = 0; + } +} + static ssize_t map_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos, int cap_setid, @@ -1073,7 +1138,6 @@ static ssize_t map_write(struct file *file, const char __user *buf, struct seq_file *seq = file->private_data; struct user_namespace *ns = seq->private; struct uid_gid_map new_map; - unsigned idx; struct uid_gid_extent extent; char *kbuf = NULL, *pos, *next_line; ssize_t ret; @@ -1191,61 +1255,28 @@ static ssize_t map_write(struct file *file, const char __user *buf, if (!new_idmap_permitted(file, ns, cap_setid, &new_map)) goto out; - ret = -EPERM; - /* Map the lower ids from the parent user namespace to the - * kernel global id space. - */ - for (idx = 0; idx < new_map.nr_extents; idx++) { - struct uid_gid_extent *e; - u32 lower_first; - - if (new_map.nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) - e = &new_map.extent[idx]; - else - e = &new_map.forward[idx]; - - lower_first = map_id_range_down(parent_map, - e->lower_first, - e->count); - - /* Fail if we can not map the specified extent to - * the kernel global id space. - */ - if (lower_first == (u32) -1) - goto out; - - e->lower_first = lower_first; - } + ret = map_into_kids(&new_map, parent_map); + if (ret) + goto out; /* * If we want to use binary search for lookup, this clones the extent * array and sorts both copies. */ ret = sort_idmaps(&new_map); - if (ret < 0) + if (ret) goto out; /* Install the map */ - if (new_map.nr_extents <= UID_GID_MAP_MAX_BASE_EXTENTS) { - memcpy(map->extent, new_map.extent, - new_map.nr_extents * sizeof(new_map.extent[0])); - } else { - map->forward = new_map.forward; - map->reverse = new_map.reverse; - } + install_idmaps(map, &new_map); smp_wmb(); map->nr_extents = new_map.nr_extents; *ppos = count; ret = count; out: - if (ret < 0 && new_map.nr_extents > UID_GID_MAP_MAX_BASE_EXTENTS) { - kfree(new_map.forward); - kfree(new_map.reverse); - map->forward = NULL; - map->reverse = NULL; - map->nr_extents = 0; - } + if (ret < 0) + free_idmaps(&new_map); mutex_unlock(&userns_state_mutex); kfree(kbuf); -- 2.25.0