diff options
| -rw-r--r-- | arch/s390/kernel/compat_linux.c | 2 | ||||
| -rw-r--r-- | include/linux/cred.h | 1 | ||||
| -rw-r--r-- | kernel/groups.c | 9 | ||||
| -rw-r--r-- | kernel/uid16.c | 2 |
4 files changed, 11 insertions, 3 deletions
diff --git a/arch/s390/kernel/compat_linux.c b/arch/s390/kernel/compat_linux.c index ca38139423ae..437e61159279 100644 --- a/arch/s390/kernel/compat_linux.c +++ b/arch/s390/kernel/compat_linux.c | |||
| @@ -249,7 +249,7 @@ COMPAT_SYSCALL_DEFINE2(s390_setgroups16, int, gidsetsize, u16 __user *, grouplis | |||
| 249 | struct group_info *group_info; | 249 | struct group_info *group_info; |
| 250 | int retval; | 250 | int retval; |
| 251 | 251 | ||
| 252 | if (!capable(CAP_SETGID)) | 252 | if (!may_setgroups()) |
| 253 | return -EPERM; | 253 | return -EPERM; |
| 254 | if ((unsigned)gidsetsize > NGROUPS_MAX) | 254 | if ((unsigned)gidsetsize > NGROUPS_MAX) |
| 255 | return -EINVAL; | 255 | return -EINVAL; |
diff --git a/include/linux/cred.h b/include/linux/cred.h index b2d0820837c4..2fb2ca2127ed 100644 --- a/include/linux/cred.h +++ b/include/linux/cred.h | |||
| @@ -68,6 +68,7 @@ extern void groups_free(struct group_info *); | |||
| 68 | extern int set_current_groups(struct group_info *); | 68 | extern int set_current_groups(struct group_info *); |
| 69 | extern void set_groups(struct cred *, struct group_info *); | 69 | extern void set_groups(struct cred *, struct group_info *); |
| 70 | extern int groups_search(const struct group_info *, kgid_t); | 70 | extern int groups_search(const struct group_info *, kgid_t); |
| 71 | extern bool may_setgroups(void); | ||
| 71 | 72 | ||
| 72 | /* access the groups "array" with this macro */ | 73 | /* access the groups "array" with this macro */ |
| 73 | #define GROUP_AT(gi, i) \ | 74 | #define GROUP_AT(gi, i) \ |
diff --git a/kernel/groups.c b/kernel/groups.c index 451698f86cfa..02d8a251c476 100644 --- a/kernel/groups.c +++ b/kernel/groups.c | |||
| @@ -213,6 +213,13 @@ out: | |||
| 213 | return i; | 213 | return i; |
| 214 | } | 214 | } |
| 215 | 215 | ||
| 216 | bool may_setgroups(void) | ||
| 217 | { | ||
| 218 | struct user_namespace *user_ns = current_user_ns(); | ||
| 219 | |||
| 220 | return ns_capable(user_ns, CAP_SETGID); | ||
| 221 | } | ||
| 222 | |||
| 216 | /* | 223 | /* |
| 217 | * SMP: Our groups are copy-on-write. We can set them safely | 224 | * SMP: Our groups are copy-on-write. We can set them safely |
| 218 | * without another task interfering. | 225 | * without another task interfering. |
| @@ -223,7 +230,7 @@ SYSCALL_DEFINE2(setgroups, int, gidsetsize, gid_t __user *, grouplist) | |||
| 223 | struct group_info *group_info; | 230 | struct group_info *group_info; |
| 224 | int retval; | 231 | int retval; |
| 225 | 232 | ||
| 226 | if (!ns_capable(current_user_ns(), CAP_SETGID)) | 233 | if (!may_setgroups()) |
| 227 | return -EPERM; | 234 | return -EPERM; |
| 228 | if ((unsigned)gidsetsize > NGROUPS_MAX) | 235 | if ((unsigned)gidsetsize > NGROUPS_MAX) |
| 229 | return -EINVAL; | 236 | return -EINVAL; |
diff --git a/kernel/uid16.c b/kernel/uid16.c index 602e5bbbceff..d58cc4d8f0d1 100644 --- a/kernel/uid16.c +++ b/kernel/uid16.c | |||
| @@ -176,7 +176,7 @@ SYSCALL_DEFINE2(setgroups16, int, gidsetsize, old_gid_t __user *, grouplist) | |||
| 176 | struct group_info *group_info; | 176 | struct group_info *group_info; |
| 177 | int retval; | 177 | int retval; |
| 178 | 178 | ||
| 179 | if (!ns_capable(current_user_ns(), CAP_SETGID)) | 179 | if (!may_setgroups()) |
| 180 | return -EPERM; | 180 | return -EPERM; |
| 181 | if ((unsigned)gidsetsize > NGROUPS_MAX) | 181 | if ((unsigned)gidsetsize > NGROUPS_MAX) |
| 182 | return -EINVAL; | 182 | return -EINVAL; |
