aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKirill Tkhai <ktkhai@virtuozzo.com>2017-05-12 10:33:36 -0400
committerEric W. Biederman <ebiederm@xmission.com>2017-07-20 08:46:07 -0400
commit4d28df6152aa3ffd0ad0389bb1d31f5b1c1c2b1f (patch)
tree4f756fb4aadf88d6760420ed2b30bd01ea5ac076
parent64db4c7f4c1dde23d47b60f887000e28f82b268f (diff)
prctl: Allow local CAP_SYS_ADMIN changing exe_file
During checkpointing and restore of userspace tasks we bumped into the situation, that it's not possible to restore the tasks, which user namespace does not have uid 0 or gid 0 mapped. People create user namespace mappings like they want, and there is no a limitation on obligatory uid and gid "must be mapped". So, if there is no uid 0 or gid 0 in the mapping, it's impossible to restore mm->exe_file of the processes belonging to this user namespace. Also, there is no a workaround. It's impossible to create a temporary uid/gid mapping, because only one write to /proc/[pid]/uid_map and gid_map is allowed during a namespace lifetime. If there is an entry, then no more mapings can't be written. If there isn't an entry, we can't write there too, otherwise user task won't be able to do that in the future. The patch changes the check, and looks for CAP_SYS_ADMIN instead of zero uid and gid. This allows to restore a task independently of its user namespace mappings. Signed-off-by: Kirill Tkhai <ktkhai@virtuozzo.com> CC: Andrew Morton <akpm@linux-foundation.org> CC: Serge Hallyn <serge@hallyn.com> CC: "Eric W. Biederman" <ebiederm@xmission.com> CC: Oleg Nesterov <oleg@redhat.com> CC: Michal Hocko <mhocko@suse.com> CC: Andrei Vagin <avagin@openvz.org> CC: Cyrill Gorcunov <gorcunov@openvz.org> CC: Stanislav Kinsburskiy <skinsbursky@virtuozzo.com> CC: Pavel Tikhomirov <ptikhomirov@virtuozzo.com> Reviewed-by: Cyrill Gorcunov <gorcunov@openvz.org> Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
-rw-r--r--kernel/sys.c8
1 files changed, 2 insertions, 6 deletions
diff --git a/kernel/sys.c b/kernel/sys.c
index 2855ee73acd0..9aebc2935013 100644
--- a/kernel/sys.c
+++ b/kernel/sys.c
@@ -1896,15 +1896,11 @@ static int validate_prctl_map(struct prctl_mm_map *prctl_map)
1896 1896
1897 /* 1897 /*
1898 * Finally, make sure the caller has the rights to 1898 * Finally, make sure the caller has the rights to
1899 * change /proc/pid/exe link: only local root should 1899 * change /proc/pid/exe link: only local sys admin should
1900 * be allowed to. 1900 * be allowed to.
1901 */ 1901 */
1902 if (prctl_map->exe_fd != (u32)-1) { 1902 if (prctl_map->exe_fd != (u32)-1) {
1903 struct user_namespace *ns = current_user_ns(); 1903 if (!ns_capable(current_user_ns(), CAP_SYS_ADMIN))
1904 const struct cred *cred = current_cred();
1905
1906 if (!uid_eq(cred->uid, make_kuid(ns, 0)) ||
1907 !gid_eq(cred->gid, make_kgid(ns, 0)))
1908 goto out; 1904 goto out;
1909 } 1905 }
1910 1906