[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110110215937.GB21351@wavehammer.waldi.eu.org>
Date: Mon, 10 Jan 2011 22:59:37 +0100
From: Bastian Blank <bastian@...di.eu.org>
To: "Serge E. Hallyn" <serge@...lyn.com>
Cc: containers@...ts.linux-foundation.org,
kernel list <linux-kernel@...r.kernel.org>,
LSM <linux-security-module@...r.kernel.org>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
Kees Cook <kees.cook@...onical.com>,
Alexey Dobriyan <adobriyan@...il.com>,
Michael Kerrisk <mtk.manpages@...il.com>
Subject: Re: [PATCH 6/7] user namespaces: convert all capable checks in
kernel/sys.c
On Mon, Jan 10, 2011 at 09:14:07PM +0000, Serge E. Hallyn wrote:
> - if (pcred->uid != cred->euid &&
> - pcred->euid != cred->euid && !capable(CAP_SYS_NICE)) {
> + if (pcred->user->user_ns != cred->user->user_ns &&
> + pcred->uid != cred->euid &&
> + pcred->euid != cred->euid &&
> + !ns_capable(pcred->user->user_ns, CAP_SYS_NICE)) {
I don't think this is correct. This would not error out if the both
userns are the same. Because the same patern (check uid if same userns,
otherwise only capability) shows up in several parts of the code, maybe
this should be factored out.
> @@ -496,7 +498,7 @@ SYSCALL_DEFINE2(setregid, gid_t, rgid, gid_t, egid)
> if (rgid != (gid_t) -1) {
> if (old->gid == rgid ||
> old->egid == rgid ||
> - capable(CAP_SETGID))
> + ns_capable(current_user_ns(), CAP_SETGID))
Would it not possible to add another function (nsown_capable?) that
checks against the own userns?
Bastian
--
Change is the essential process of all existence.
-- Spock, "Let That Be Your Last Battlefield", stardate 5730.2
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists