Commit 0093ccb6 authored by Eric W. Biederman's avatar Eric W. Biederman

cred: Refcount the user_ns pointed to by the cred.

struct user_struct will shortly loose it's user_ns reference
so make the cred user_ns reference a proper reference complete
with reference counting.
Acked-by: default avatarSerge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: default avatarEric W. Biederman <ebiederm@xmission.com>
parent c4a4d603
...@@ -146,7 +146,7 @@ struct cred { ...@@ -146,7 +146,7 @@ struct cred {
void *security; /* subjective LSM security */ void *security; /* subjective LSM security */
#endif #endif
struct user_struct *user; /* real user ID subscription */ struct user_struct *user; /* real user ID subscription */
struct user_namespace *user_ns; /* cached user->user_ns */ struct user_namespace *user_ns; /* user_ns the caps and keyrings are relative to. */
struct group_info *group_info; /* supplementary groups for euid/fsgid */ struct group_info *group_info; /* supplementary groups for euid/fsgid */
struct rcu_head rcu; /* RCU deletion hook */ struct rcu_head rcu; /* RCU deletion hook */
}; };
......
...@@ -148,6 +148,7 @@ static void put_cred_rcu(struct rcu_head *rcu) ...@@ -148,6 +148,7 @@ static void put_cred_rcu(struct rcu_head *rcu)
if (cred->group_info) if (cred->group_info)
put_group_info(cred->group_info); put_group_info(cred->group_info);
free_uid(cred->user); free_uid(cred->user);
put_user_ns(cred->user_ns);
kmem_cache_free(cred_jar, cred); kmem_cache_free(cred_jar, cred);
} }
...@@ -303,6 +304,7 @@ struct cred *prepare_creds(void) ...@@ -303,6 +304,7 @@ struct cred *prepare_creds(void)
set_cred_subscribers(new, 0); set_cred_subscribers(new, 0);
get_group_info(new->group_info); get_group_info(new->group_info);
get_uid(new->user); get_uid(new->user);
get_user_ns(new->user_ns);
#ifdef CONFIG_KEYS #ifdef CONFIG_KEYS
key_get(new->thread_keyring); key_get(new->thread_keyring);
...@@ -412,11 +414,6 @@ int copy_creds(struct task_struct *p, unsigned long clone_flags) ...@@ -412,11 +414,6 @@ int copy_creds(struct task_struct *p, unsigned long clone_flags)
goto error_put; goto error_put;
} }
/* cache user_ns in cred. Doesn't need a refcount because it will
* stay pinned by cred->user
*/
new->user_ns = new->user->user_ns;
#ifdef CONFIG_KEYS #ifdef CONFIG_KEYS
/* new threads get their own thread keyrings if their parent already /* new threads get their own thread keyrings if their parent already
* had one */ * had one */
...@@ -676,6 +673,7 @@ struct cred *prepare_kernel_cred(struct task_struct *daemon) ...@@ -676,6 +673,7 @@ struct cred *prepare_kernel_cred(struct task_struct *daemon)
atomic_set(&new->usage, 1); atomic_set(&new->usage, 1);
set_cred_subscribers(new, 0); set_cred_subscribers(new, 0);
get_uid(new->user); get_uid(new->user);
get_user_ns(new->user_ns);
get_group_info(new->group_info); get_group_info(new->group_info);
#ifdef CONFIG_KEYS #ifdef CONFIG_KEYS
......
...@@ -24,7 +24,7 @@ static struct kmem_cache *user_ns_cachep __read_mostly; ...@@ -24,7 +24,7 @@ static struct kmem_cache *user_ns_cachep __read_mostly;
*/ */
int create_user_ns(struct cred *new) int create_user_ns(struct cred *new)
{ {
struct user_namespace *ns; struct user_namespace *ns, *parent_ns = new->user_ns;
struct user_struct *root_user; struct user_struct *root_user;
int n; int n;
...@@ -57,8 +57,10 @@ int create_user_ns(struct cred *new) ...@@ -57,8 +57,10 @@ int create_user_ns(struct cred *new)
#endif #endif
/* tgcred will be cleared in our caller bc CLONE_THREAD won't be set */ /* tgcred will be cleared in our caller bc CLONE_THREAD won't be set */
/* root_user holds a reference to ns, our reference can be dropped */ /* Leave the reference to our user_ns with the new cred */
put_user_ns(ns); new->user_ns = ns;
put_user_ns(parent_ns);
return 0; return 0;
} }
......
...@@ -858,7 +858,7 @@ void key_replace_session_keyring(void) ...@@ -858,7 +858,7 @@ void key_replace_session_keyring(void)
new-> sgid = old-> sgid; new-> sgid = old-> sgid;
new->fsgid = old->fsgid; new->fsgid = old->fsgid;
new->user = get_uid(old->user); new->user = get_uid(old->user);
new->user_ns = new->user_ns; new->user_ns = get_user_ns(new->user_ns);
new->group_info = get_group_info(old->group_info); new->group_info = get_group_info(old->group_info);
new->securebits = old->securebits; new->securebits = old->securebits;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment