2011-11-15 06:29:51 +08:00
|
|
|
#ifndef _LINUX_UIDGID_H
|
|
|
|
#define _LINUX_UIDGID_H
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A set of types for the internal kernel types representing uids and gids.
|
|
|
|
*
|
|
|
|
* The types defined in this header allow distinguishing which uids and gids in
|
|
|
|
* the kernel are values used by userspace and which uid and gid values are
|
|
|
|
* the internal kernel values. With the addition of user namespaces the values
|
|
|
|
* can be different. Using the type system makes it possible for the compiler
|
|
|
|
* to detect when we overlook these differences.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/highuid.h>
|
|
|
|
|
|
|
|
struct user_namespace;
|
|
|
|
extern struct user_namespace init_user_ns;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
uid_t val;
|
|
|
|
} kuid_t;
|
|
|
|
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
gid_t val;
|
|
|
|
} kgid_t;
|
|
|
|
|
|
|
|
#define KUIDT_INIT(value) (kuid_t){ value }
|
|
|
|
#define KGIDT_INIT(value) (kgid_t){ value }
|
|
|
|
|
kernel: conditionally support non-root users, groups and capabilities
There are a lot of embedded systems that run most or all of their
functionality in init, running as root:root. For these systems,
supporting multiple users is not necessary.
This patch adds a new symbol, CONFIG_MULTIUSER, that makes support for
non-root users, non-root groups, and capabilities optional. It is enabled
under CONFIG_EXPERT menu.
When this symbol is not defined, UID and GID are zero in any possible case
and processes always have all capabilities.
The following syscalls are compiled out: setuid, setregid, setgid,
setreuid, setresuid, getresuid, setresgid, getresgid, setgroups,
getgroups, setfsuid, setfsgid, capget, capset.
Also, groups.c is compiled out completely.
In kernel/capability.c, capable function was moved in order to avoid
adding two ifdef blocks.
This change saves about 25 KB on a defconfig build. The most minimal
kernels have total text sizes in the high hundreds of kB rather than
low MB. (The 25k goes down a bit with allnoconfig, but not that much.
The kernel was booted in Qemu. All the common functionalities work.
Adding users/groups is not possible, failing with -ENOSYS.
Bloat-o-meter output:
add/remove: 7/87 grow/shrink: 19/397 up/down: 1675/-26325 (-24650)
[akpm@linux-foundation.org: coding-style fixes]
Signed-off-by: Iulia Manda <iulia.manda21@gmail.com>
Reviewed-by: Josh Triplett <josh@joshtriplett.org>
Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
Tested-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Reviewed-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-04-16 07:16:41 +08:00
|
|
|
#ifdef CONFIG_MULTIUSER
|
2011-11-15 06:29:51 +08:00
|
|
|
static inline uid_t __kuid_val(kuid_t uid)
|
|
|
|
{
|
|
|
|
return uid.val;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline gid_t __kgid_val(kgid_t gid)
|
|
|
|
{
|
|
|
|
return gid.val;
|
|
|
|
}
|
kernel: conditionally support non-root users, groups and capabilities
There are a lot of embedded systems that run most or all of their
functionality in init, running as root:root. For these systems,
supporting multiple users is not necessary.
This patch adds a new symbol, CONFIG_MULTIUSER, that makes support for
non-root users, non-root groups, and capabilities optional. It is enabled
under CONFIG_EXPERT menu.
When this symbol is not defined, UID and GID are zero in any possible case
and processes always have all capabilities.
The following syscalls are compiled out: setuid, setregid, setgid,
setreuid, setresuid, getresuid, setresgid, getresgid, setgroups,
getgroups, setfsuid, setfsgid, capget, capset.
Also, groups.c is compiled out completely.
In kernel/capability.c, capable function was moved in order to avoid
adding two ifdef blocks.
This change saves about 25 KB on a defconfig build. The most minimal
kernels have total text sizes in the high hundreds of kB rather than
low MB. (The 25k goes down a bit with allnoconfig, but not that much.
The kernel was booted in Qemu. All the common functionalities work.
Adding users/groups is not possible, failing with -ENOSYS.
Bloat-o-meter output:
add/remove: 7/87 grow/shrink: 19/397 up/down: 1675/-26325 (-24650)
[akpm@linux-foundation.org: coding-style fixes]
Signed-off-by: Iulia Manda <iulia.manda21@gmail.com>
Reviewed-by: Josh Triplett <josh@joshtriplett.org>
Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
Tested-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Reviewed-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-04-16 07:16:41 +08:00
|
|
|
#else
|
|
|
|
static inline uid_t __kuid_val(kuid_t uid)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline gid_t __kgid_val(kgid_t gid)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
2011-11-15 06:29:51 +08:00
|
|
|
|
|
|
|
#define GLOBAL_ROOT_UID KUIDT_INIT(0)
|
|
|
|
#define GLOBAL_ROOT_GID KGIDT_INIT(0)
|
|
|
|
|
|
|
|
#define INVALID_UID KUIDT_INIT(-1)
|
|
|
|
#define INVALID_GID KGIDT_INIT(-1)
|
|
|
|
|
|
|
|
static inline bool uid_eq(kuid_t left, kuid_t right)
|
|
|
|
{
|
|
|
|
return __kuid_val(left) == __kuid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_eq(kgid_t left, kgid_t right)
|
|
|
|
{
|
|
|
|
return __kgid_val(left) == __kgid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool uid_gt(kuid_t left, kuid_t right)
|
|
|
|
{
|
|
|
|
return __kuid_val(left) > __kuid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_gt(kgid_t left, kgid_t right)
|
|
|
|
{
|
|
|
|
return __kgid_val(left) > __kgid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool uid_gte(kuid_t left, kuid_t right)
|
|
|
|
{
|
|
|
|
return __kuid_val(left) >= __kuid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_gte(kgid_t left, kgid_t right)
|
|
|
|
{
|
|
|
|
return __kgid_val(left) >= __kgid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool uid_lt(kuid_t left, kuid_t right)
|
|
|
|
{
|
|
|
|
return __kuid_val(left) < __kuid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_lt(kgid_t left, kgid_t right)
|
|
|
|
{
|
|
|
|
return __kgid_val(left) < __kgid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool uid_lte(kuid_t left, kuid_t right)
|
|
|
|
{
|
|
|
|
return __kuid_val(left) <= __kuid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_lte(kgid_t left, kgid_t right)
|
|
|
|
{
|
|
|
|
return __kgid_val(left) <= __kgid_val(right);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool uid_valid(kuid_t uid)
|
|
|
|
{
|
|
|
|
return !uid_eq(uid, INVALID_UID);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool gid_valid(kgid_t gid)
|
|
|
|
{
|
|
|
|
return !gid_eq(gid, INVALID_GID);
|
|
|
|
}
|
|
|
|
|
2011-11-17 16:11:58 +08:00
|
|
|
#ifdef CONFIG_USER_NS
|
|
|
|
|
|
|
|
extern kuid_t make_kuid(struct user_namespace *from, uid_t uid);
|
|
|
|
extern kgid_t make_kgid(struct user_namespace *from, gid_t gid);
|
|
|
|
|
|
|
|
extern uid_t from_kuid(struct user_namespace *to, kuid_t uid);
|
|
|
|
extern gid_t from_kgid(struct user_namespace *to, kgid_t gid);
|
|
|
|
extern uid_t from_kuid_munged(struct user_namespace *to, kuid_t uid);
|
|
|
|
extern gid_t from_kgid_munged(struct user_namespace *to, kgid_t gid);
|
|
|
|
|
|
|
|
static inline bool kuid_has_mapping(struct user_namespace *ns, kuid_t uid)
|
|
|
|
{
|
|
|
|
return from_kuid(ns, uid) != (uid_t) -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool kgid_has_mapping(struct user_namespace *ns, kgid_t gid)
|
|
|
|
{
|
|
|
|
return from_kgid(ns, gid) != (gid_t) -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
2011-11-15 06:29:51 +08:00
|
|
|
static inline kuid_t make_kuid(struct user_namespace *from, uid_t uid)
|
|
|
|
{
|
|
|
|
return KUIDT_INIT(uid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline kgid_t make_kgid(struct user_namespace *from, gid_t gid)
|
|
|
|
{
|
|
|
|
return KGIDT_INIT(gid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uid_t from_kuid(struct user_namespace *to, kuid_t kuid)
|
|
|
|
{
|
|
|
|
return __kuid_val(kuid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline gid_t from_kgid(struct user_namespace *to, kgid_t kgid)
|
|
|
|
{
|
|
|
|
return __kgid_val(kgid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uid_t from_kuid_munged(struct user_namespace *to, kuid_t kuid)
|
|
|
|
{
|
|
|
|
uid_t uid = from_kuid(to, kuid);
|
|
|
|
if (uid == (uid_t)-1)
|
|
|
|
uid = overflowuid;
|
|
|
|
return uid;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline gid_t from_kgid_munged(struct user_namespace *to, kgid_t kgid)
|
|
|
|
{
|
|
|
|
gid_t gid = from_kgid(to, kgid);
|
|
|
|
if (gid == (gid_t)-1)
|
|
|
|
gid = overflowgid;
|
|
|
|
return gid;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool kuid_has_mapping(struct user_namespace *ns, kuid_t uid)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool kgid_has_mapping(struct user_namespace *ns, kgid_t gid)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-11-17 16:11:58 +08:00
|
|
|
#endif /* CONFIG_USER_NS */
|
|
|
|
|
2011-11-15 06:29:51 +08:00
|
|
|
#endif /* _LINUX_UIDGID_H */
|