diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2012-07-26 10:13:20 +0200 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-11-20 13:17:42 +0100 |
commit | 142e1d1d5f088e7a38659daca6e84a730967774a (patch) | |
tree | e2297a9a77f55bb15a566979c9c5658cff4737f8 /ipc/namespace.c | |
parent | userns: Allow unprivileged users to create new namespaces (diff) | |
download | linux-142e1d1d5f088e7a38659daca6e84a730967774a.tar.xz linux-142e1d1d5f088e7a38659daca6e84a730967774a.zip |
userns: Allow unprivileged use of setns.
- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'ipc/namespace.c')
-rw-r--r-- | ipc/namespace.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/ipc/namespace.c b/ipc/namespace.c index f362298c5ce4..6ed33c05cb66 100644 --- a/ipc/namespace.c +++ b/ipc/namespace.c @@ -161,8 +161,12 @@ static void ipcns_put(void *ns) return put_ipc_ns(ns); } -static int ipcns_install(struct nsproxy *nsproxy, void *ns) +static int ipcns_install(struct nsproxy *nsproxy, void *new) { + struct ipc_namespace *ns = new; + if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN)) + return -EPERM; + /* Ditch state from the old ipc namespace */ exit_sem(current); put_ipc_ns(nsproxy->ipc_ns); |