Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
acce292c CLG |
2 | #ifndef _LINUX_USER_NAMESPACE_H |
3 | #define _LINUX_USER_NAMESPACE_H | |
4 | ||
5 | #include <linux/kref.h> | |
6 | #include <linux/nsproxy.h> | |
435d5f4b | 7 | #include <linux/ns_common.h> |
acce292c | 8 | #include <linux/sched.h> |
b2d5bfea | 9 | #include <linux/workqueue.h> |
cd9c513b | 10 | #include <linux/rwsem.h> |
cc5efc23 | 11 | #include <linux/sysctl.h> |
77ec739d | 12 | #include <linux/err.h> |
acce292c | 13 | |
6397fac4 CB |
14 | #define UID_GID_MAP_MAX_BASE_EXTENTS 5 |
15 | #define UID_GID_MAP_MAX_EXTENTS 340 | |
22d917d8 | 16 | |
aa4bf44d CB |
17 | struct uid_gid_extent { |
18 | u32 first; | |
19 | u32 lower_first; | |
20 | u32 count; | |
21 | }; | |
22 | ||
6397fac4 | 23 | struct uid_gid_map { /* 64 bytes -- 1 cache line */ |
22d917d8 | 24 | u32 nr_extents; |
aa4bf44d | 25 | union { |
6397fac4 | 26 | struct uid_gid_extent extent[UID_GID_MAP_MAX_BASE_EXTENTS]; |
aa4bf44d CB |
27 | struct { |
28 | struct uid_gid_extent *forward; | |
29 | struct uid_gid_extent *reverse; | |
30 | }; | |
31 | }; | |
22d917d8 EB |
32 | }; |
33 | ||
9cc46516 EB |
34 | #define USERNS_SETGROUPS_ALLOWED 1UL |
35 | ||
36 | #define USERNS_INIT_FLAGS USERNS_SETGROUPS_ALLOWED | |
37 | ||
f6b2db1a | 38 | struct ucounts; |
25f9c081 EB |
39 | |
40 | enum ucount_type { | |
41 | UCOUNT_USER_NAMESPACES, | |
f333c700 | 42 | UCOUNT_PID_NAMESPACES, |
f7af3d1c | 43 | UCOUNT_UTS_NAMESPACES, |
aba35661 | 44 | UCOUNT_IPC_NAMESPACES, |
70328660 | 45 | UCOUNT_NET_NAMESPACES, |
537f7ccb | 46 | UCOUNT_MNT_NAMESPACES, |
d08311dd | 47 | UCOUNT_CGROUP_NAMESPACES, |
1cce1eea NB |
48 | #ifdef CONFIG_INOTIFY_USER |
49 | UCOUNT_INOTIFY_INSTANCES, | |
50 | UCOUNT_INOTIFY_WATCHES, | |
51 | #endif | |
25f9c081 EB |
52 | UCOUNT_COUNTS, |
53 | }; | |
54 | ||
acce292c | 55 | struct user_namespace { |
22d917d8 EB |
56 | struct uid_gid_map uid_map; |
57 | struct uid_gid_map gid_map; | |
f76d207a | 58 | struct uid_gid_map projid_map; |
c61a2810 | 59 | atomic_t count; |
aeb3ae9d | 60 | struct user_namespace *parent; |
8742f229 | 61 | int level; |
783291e6 EB |
62 | kuid_t owner; |
63 | kgid_t group; | |
435d5f4b | 64 | struct ns_common ns; |
9cc46516 | 65 | unsigned long flags; |
f36f8c75 | 66 | |
b206f281 | 67 | #ifdef CONFIG_KEYS |
0f44e4d9 DH |
68 | /* List of joinable keyrings in this namespace. Modification access of |
69 | * these pointers is controlled by keyring_sem. Once | |
70 | * user_keyring_register is set, it won't be changed, so it can be | |
71 | * accessed directly with READ_ONCE(). | |
72 | */ | |
b206f281 | 73 | struct list_head keyring_name_list; |
0f44e4d9 DH |
74 | struct key *user_keyring_register; |
75 | struct rw_semaphore keyring_sem; | |
b206f281 DH |
76 | #endif |
77 | ||
f36f8c75 DH |
78 | /* Register of per-UID persistent keyrings for this namespace */ |
79 | #ifdef CONFIG_PERSISTENT_KEYRINGS | |
80 | struct key *persistent_keyring_register; | |
f36f8c75 | 81 | #endif |
b032132c | 82 | struct work_struct work; |
dbec2846 EB |
83 | #ifdef CONFIG_SYSCTL |
84 | struct ctl_table_set set; | |
85 | struct ctl_table_header *sysctls; | |
86 | #endif | |
f6b2db1a | 87 | struct ucounts *ucounts; |
25f9c081 | 88 | int ucount_max[UCOUNT_COUNTS]; |
3859a271 | 89 | } __randomize_layout; |
f6b2db1a EB |
90 | |
91 | struct ucounts { | |
92 | struct hlist_node node; | |
93 | struct user_namespace *ns; | |
94 | kuid_t uid; | |
040757f7 | 95 | int count; |
25f9c081 | 96 | atomic_t ucount[UCOUNT_COUNTS]; |
acce292c CLG |
97 | }; |
98 | ||
99 | extern struct user_namespace init_user_ns; | |
f6b2db1a EB |
100 | |
101 | bool setup_userns_sysctls(struct user_namespace *ns); | |
102 | void retire_userns_sysctls(struct user_namespace *ns); | |
25f9c081 EB |
103 | struct ucounts *inc_ucount(struct user_namespace *ns, kuid_t uid, enum ucount_type type); |
104 | void dec_ucount(struct ucounts *ucounts, enum ucount_type type); | |
acce292c CLG |
105 | |
106 | #ifdef CONFIG_USER_NS | |
107 | ||
108 | static inline struct user_namespace *get_user_ns(struct user_namespace *ns) | |
109 | { | |
110 | if (ns) | |
c61a2810 | 111 | atomic_inc(&ns->count); |
acce292c CLG |
112 | return ns; |
113 | } | |
114 | ||
18b6e041 | 115 | extern int create_user_ns(struct cred *new); |
b2e0d987 | 116 | extern int unshare_userns(unsigned long unshare_flags, struct cred **new_cred); |
b032132c | 117 | extern void __put_user_ns(struct user_namespace *ns); |
acce292c CLG |
118 | |
119 | static inline void put_user_ns(struct user_namespace *ns) | |
120 | { | |
c61a2810 | 121 | if (ns && atomic_dec_and_test(&ns->count)) |
b032132c | 122 | __put_user_ns(ns); |
acce292c CLG |
123 | } |
124 | ||
22d917d8 | 125 | struct seq_operations; |
ccf94f1b FF |
126 | extern const struct seq_operations proc_uid_seq_operations; |
127 | extern const struct seq_operations proc_gid_seq_operations; | |
128 | extern const struct seq_operations proc_projid_seq_operations; | |
22d917d8 EB |
129 | extern ssize_t proc_uid_map_write(struct file *, const char __user *, size_t, loff_t *); |
130 | extern ssize_t proc_gid_map_write(struct file *, const char __user *, size_t, loff_t *); | |
f76d207a | 131 | extern ssize_t proc_projid_map_write(struct file *, const char __user *, size_t, loff_t *); |
9cc46516 EB |
132 | extern ssize_t proc_setgroups_write(struct file *, const char __user *, size_t, loff_t *); |
133 | extern int proc_setgroups_show(struct seq_file *m, void *v); | |
273d2c67 | 134 | extern bool userns_may_setgroups(const struct user_namespace *ns); |
a2b42626 EB |
135 | extern bool in_userns(const struct user_namespace *ancestor, |
136 | const struct user_namespace *child); | |
d07b846f | 137 | extern bool current_in_userns(const struct user_namespace *target_ns); |
bcac25a5 | 138 | struct ns_common *ns_get_owner(struct ns_common *ns); |
acce292c CLG |
139 | #else |
140 | ||
141 | static inline struct user_namespace *get_user_ns(struct user_namespace *ns) | |
142 | { | |
143 | return &init_user_ns; | |
144 | } | |
145 | ||
18b6e041 | 146 | static inline int create_user_ns(struct cred *new) |
acce292c | 147 | { |
18b6e041 | 148 | return -EINVAL; |
acce292c CLG |
149 | } |
150 | ||
b2e0d987 EB |
151 | static inline int unshare_userns(unsigned long unshare_flags, |
152 | struct cred **new_cred) | |
153 | { | |
154 | if (unshare_flags & CLONE_NEWUSER) | |
155 | return -EINVAL; | |
156 | return 0; | |
157 | } | |
158 | ||
acce292c CLG |
159 | static inline void put_user_ns(struct user_namespace *ns) |
160 | { | |
161 | } | |
162 | ||
273d2c67 EB |
163 | static inline bool userns_may_setgroups(const struct user_namespace *ns) |
164 | { | |
165 | return true; | |
166 | } | |
d07b846f | 167 | |
a2b42626 EB |
168 | static inline bool in_userns(const struct user_namespace *ancestor, |
169 | const struct user_namespace *child) | |
170 | { | |
171 | return true; | |
172 | } | |
173 | ||
d07b846f SF |
174 | static inline bool current_in_userns(const struct user_namespace *target_ns) |
175 | { | |
176 | return true; | |
177 | } | |
bcac25a5 AV |
178 | |
179 | static inline struct ns_common *ns_get_owner(struct ns_common *ns) | |
180 | { | |
181 | return ERR_PTR(-EPERM); | |
182 | } | |
22d917d8 EB |
183 | #endif |
184 | ||
acce292c | 185 | #endif /* _LINUX_USER_H */ |