diff options
Diffstat (limited to 'kernel/nsproxy.c')
| -rw-r--r-- | kernel/nsproxy.c | 72 |
1 files changed, 48 insertions, 24 deletions
diff --git a/kernel/nsproxy.c b/kernel/nsproxy.c index 9e83b589f754..10f0bbba382b 100644 --- a/kernel/nsproxy.c +++ b/kernel/nsproxy.c | |||
| @@ -21,6 +21,8 @@ | |||
| 21 | #include <linux/utsname.h> | 21 | #include <linux/utsname.h> |
| 22 | #include <linux/pid_namespace.h> | 22 | #include <linux/pid_namespace.h> |
| 23 | 23 | ||
| 24 | static struct kmem_cache *nsproxy_cachep; | ||
| 25 | |||
| 24 | struct nsproxy init_nsproxy = INIT_NSPROXY(init_nsproxy); | 26 | struct nsproxy init_nsproxy = INIT_NSPROXY(init_nsproxy); |
| 25 | 27 | ||
| 26 | static inline void get_nsproxy(struct nsproxy *ns) | 28 | static inline void get_nsproxy(struct nsproxy *ns) |
| @@ -43,9 +45,11 @@ static inline struct nsproxy *clone_nsproxy(struct nsproxy *orig) | |||
| 43 | { | 45 | { |
| 44 | struct nsproxy *ns; | 46 | struct nsproxy *ns; |
| 45 | 47 | ||
| 46 | ns = kmemdup(orig, sizeof(struct nsproxy), GFP_KERNEL); | 48 | ns = kmem_cache_alloc(nsproxy_cachep, GFP_KERNEL); |
| 47 | if (ns) | 49 | if (ns) { |
| 50 | memcpy(ns, orig, sizeof(struct nsproxy)); | ||
| 48 | atomic_set(&ns->count, 1); | 51 | atomic_set(&ns->count, 1); |
| 52 | } | ||
| 49 | return ns; | 53 | return ns; |
| 50 | } | 54 | } |
| 51 | 55 | ||
| @@ -54,33 +58,51 @@ static inline struct nsproxy *clone_nsproxy(struct nsproxy *orig) | |||
| 54 | * Return the newly created nsproxy. Do not attach this to the task, | 58 | * Return the newly created nsproxy. Do not attach this to the task, |
| 55 | * leave it to the caller to do proper locking and attach it to task. | 59 | * leave it to the caller to do proper locking and attach it to task. |
| 56 | */ | 60 | */ |
| 57 | static struct nsproxy *create_new_namespaces(int flags, struct task_struct *tsk, | 61 | static struct nsproxy *create_new_namespaces(unsigned long flags, |
| 58 | struct fs_struct *new_fs) | 62 | struct task_struct *tsk, struct fs_struct *new_fs) |
| 59 | { | 63 | { |
| 60 | struct nsproxy *new_nsp; | 64 | struct nsproxy *new_nsp; |
| 65 | int err; | ||
| 61 | 66 | ||
| 62 | new_nsp = clone_nsproxy(tsk->nsproxy); | 67 | new_nsp = clone_nsproxy(tsk->nsproxy); |
| 63 | if (!new_nsp) | 68 | if (!new_nsp) |
| 64 | return ERR_PTR(-ENOMEM); | 69 | return ERR_PTR(-ENOMEM); |
| 65 | 70 | ||
| 66 | new_nsp->mnt_ns = copy_mnt_ns(flags, tsk->nsproxy->mnt_ns, new_fs); | 71 | new_nsp->mnt_ns = copy_mnt_ns(flags, tsk->nsproxy->mnt_ns, new_fs); |
| 67 | if (IS_ERR(new_nsp->mnt_ns)) | 72 | if (IS_ERR(new_nsp->mnt_ns)) { |
| 73 | err = PTR_ERR(new_nsp->mnt_ns); | ||
| 68 | goto out_ns; | 74 | goto out_ns; |
| 75 | } | ||
| 69 | 76 | ||
| 70 | new_nsp->uts_ns = copy_utsname(flags, tsk->nsproxy->uts_ns); | 77 | new_nsp->uts_ns = copy_utsname(flags, tsk->nsproxy->uts_ns); |
| 71 | if (IS_ERR(new_nsp->uts_ns)) | 78 | if (IS_ERR(new_nsp->uts_ns)) { |
| 79 | err = PTR_ERR(new_nsp->uts_ns); | ||
| 72 | goto out_uts; | 80 | goto out_uts; |
| 81 | } | ||
| 73 | 82 | ||
| 74 | new_nsp->ipc_ns = copy_ipcs(flags, tsk->nsproxy->ipc_ns); | 83 | new_nsp->ipc_ns = copy_ipcs(flags, tsk->nsproxy->ipc_ns); |
| 75 | if (IS_ERR(new_nsp->ipc_ns)) | 84 | if (IS_ERR(new_nsp->ipc_ns)) { |
| 85 | err = PTR_ERR(new_nsp->ipc_ns); | ||
| 76 | goto out_ipc; | 86 | goto out_ipc; |
| 87 | } | ||
| 77 | 88 | ||
| 78 | new_nsp->pid_ns = copy_pid_ns(flags, tsk->nsproxy->pid_ns); | 89 | new_nsp->pid_ns = copy_pid_ns(flags, tsk->nsproxy->pid_ns); |
| 79 | if (IS_ERR(new_nsp->pid_ns)) | 90 | if (IS_ERR(new_nsp->pid_ns)) { |
| 91 | err = PTR_ERR(new_nsp->pid_ns); | ||
| 80 | goto out_pid; | 92 | goto out_pid; |
| 93 | } | ||
| 94 | |||
| 95 | new_nsp->user_ns = copy_user_ns(flags, tsk->nsproxy->user_ns); | ||
| 96 | if (IS_ERR(new_nsp->user_ns)) { | ||
| 97 | err = PTR_ERR(new_nsp->user_ns); | ||
| 98 | goto out_user; | ||
| 99 | } | ||
| 81 | 100 | ||
| 82 | return new_nsp; | 101 | return new_nsp; |
| 83 | 102 | ||
| 103 | out_user: | ||
| 104 | if (new_nsp->pid_ns) | ||
| 105 | put_pid_ns(new_nsp->pid_ns); | ||
| 84 | out_pid: | 106 | out_pid: |
| 85 | if (new_nsp->ipc_ns) | 107 | if (new_nsp->ipc_ns) |
| 86 | put_ipc_ns(new_nsp->ipc_ns); | 108 | put_ipc_ns(new_nsp->ipc_ns); |
| @@ -91,15 +113,15 @@ out_uts: | |||
| 91 | if (new_nsp->mnt_ns) | 113 | if (new_nsp->mnt_ns) |
| 92 | put_mnt_ns(new_nsp->mnt_ns); | 114 | put_mnt_ns(new_nsp->mnt_ns); |
| 93 | out_ns: | 115 | out_ns: |
| 94 | kfree(new_nsp); | 116 | kmem_cache_free(nsproxy_cachep, new_nsp); |
| 95 | return ERR_PTR(-ENOMEM); | 117 | return ERR_PTR(err); |
| 96 | } | 118 | } |
| 97 | 119 | ||
| 98 | /* | 120 | /* |
| 99 | * called from clone. This now handles copy for nsproxy and all | 121 | * called from clone. This now handles copy for nsproxy and all |
| 100 | * namespaces therein. | 122 | * namespaces therein. |
| 101 | */ | 123 | */ |
| 102 | int copy_namespaces(int flags, struct task_struct *tsk) | 124 | int copy_namespaces(unsigned long flags, struct task_struct *tsk) |
| 103 | { | 125 | { |
| 104 | struct nsproxy *old_ns = tsk->nsproxy; | 126 | struct nsproxy *old_ns = tsk->nsproxy; |
| 105 | struct nsproxy *new_ns; | 127 | struct nsproxy *new_ns; |
| @@ -110,7 +132,7 @@ int copy_namespaces(int flags, struct task_struct *tsk) | |||
| 110 | 132 | ||
| 111 | get_nsproxy(old_ns); | 133 | get_nsproxy(old_ns); |
| 112 | 134 | ||
| 113 | if (!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC))) | 135 | if (!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | CLONE_NEWUSER))) |
| 114 | return 0; | 136 | return 0; |
| 115 | 137 | ||
| 116 | if (!capable(CAP_SYS_ADMIN)) { | 138 | if (!capable(CAP_SYS_ADMIN)) { |
| @@ -140,7 +162,9 @@ void free_nsproxy(struct nsproxy *ns) | |||
| 140 | put_ipc_ns(ns->ipc_ns); | 162 | put_ipc_ns(ns->ipc_ns); |
| 141 | if (ns->pid_ns) | 163 | if (ns->pid_ns) |
| 142 | put_pid_ns(ns->pid_ns); | 164 | put_pid_ns(ns->pid_ns); |
| 143 | kfree(ns); | 165 | if (ns->user_ns) |
| 166 | put_user_ns(ns->user_ns); | ||
| 167 | kmem_cache_free(nsproxy_cachep, ns); | ||
| 144 | } | 168 | } |
| 145 | 169 | ||
| 146 | /* | 170 | /* |
| @@ -152,19 +176,10 @@ int unshare_nsproxy_namespaces(unsigned long unshare_flags, | |||
| 152 | { | 176 | { |
| 153 | int err = 0; | 177 | int err = 0; |
| 154 | 178 | ||
| 155 | if (!(unshare_flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC))) | 179 | if (!(unshare_flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | |
| 180 | CLONE_NEWUSER))) | ||
| 156 | return 0; | 181 | return 0; |
| 157 | 182 | ||
| 158 | #ifndef CONFIG_IPC_NS | ||
| 159 | if (unshare_flags & CLONE_NEWIPC) | ||
| 160 | return -EINVAL; | ||
| 161 | #endif | ||
| 162 | |||
| 163 | #ifndef CONFIG_UTS_NS | ||
| 164 | if (unshare_flags & CLONE_NEWUTS) | ||
| 165 | return -EINVAL; | ||
| 166 | #endif | ||
| 167 | |||
| 168 | if (!capable(CAP_SYS_ADMIN)) | 183 | if (!capable(CAP_SYS_ADMIN)) |
| 169 | return -EPERM; | 184 | return -EPERM; |
| 170 | 185 | ||
| @@ -174,3 +189,12 @@ int unshare_nsproxy_namespaces(unsigned long unshare_flags, | |||
| 174 | err = PTR_ERR(*new_nsp); | 189 | err = PTR_ERR(*new_nsp); |
| 175 | return err; | 190 | return err; |
| 176 | } | 191 | } |
| 192 | |||
| 193 | static int __init nsproxy_cache_init(void) | ||
| 194 | { | ||
| 195 | nsproxy_cachep = kmem_cache_create("nsproxy", sizeof(struct nsproxy), | ||
| 196 | 0, SLAB_PANIC, NULL, NULL); | ||
| 197 | return 0; | ||
| 198 | } | ||
| 199 | |||
| 200 | module_init(nsproxy_cache_init); | ||
