1. 20 7月, 2017 1 次提交
    • E
      userns,pidns: Verify the userns for new pid namespaces · a2b42626
      Eric W. Biederman 提交于
      It is pointless and confusing to allow a pid namespace hierarchy and
      the user namespace hierarchy to get out of sync.  The owner of a child
      pid namespace should be the owner of the parent pid namespace or
      a descendant of the owner of the parent pid namespace.
      
      Otherwise it is possible to construct scenarios where a process has a
      capability over a parent pid namespace but does not have the
      capability over a child pid namespace.  Which confusingly makes
      permission checks non-transitive.
      
      It requires use of setns into a pid namespace (but not into a user
      namespace) to create such a scenario.
      
      Add the function in_userns to help in making this determination.
      
      v2: Optimized in_userns by using level as suggested
          by: Kirill Tkhai <ktkhai@virtuozzo.com>
      
      Ref: 49f4d8b9 ("pidns: Capture the user namespace and filter ns_last_pid")
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      a2b42626
  2. 15 7月, 2017 2 次提交
  3. 13 7月, 2017 17 次提交
  4. 12 7月, 2017 6 次提交
  5. 11 7月, 2017 8 次提交
  6. 09 7月, 2017 1 次提交
  7. 08 7月, 2017 5 次提交