68d0d67
Bugzilla: 917708
68d0d67
Upstream-status: Fedora mustard
68d0d67
e3f67fd
From e3da68be55914bfeedb8866f191cc0958579611d Mon Sep 17 00:00:00 2001
e3f67fd
From: Josh Boyer <jwboyer@fedoraproject.org>
e3f67fd
Date: Wed, 13 Nov 2013 10:21:18 -0500
e3f67fd
Subject: [PATCH] Revert "userns: Allow unprivileged users to create user
e3f67fd
 namespaces."
e3f67fd
e3f67fd
This reverts commit 5eaf563e53294d6696e651466697eb9d491f3946.
e3f67fd
e3f67fd
Conflicts:
e3f67fd
	kernel/fork.c
e3f67fd
---
e3f67fd
 kernel/fork.c | 13 +++++++++++++
e3f67fd
 1 file changed, 13 insertions(+)
e3f67fd
e3f67fd
diff --git a/kernel/fork.c b/kernel/fork.c
e3f67fd
index f6d11fc..e04c9a7 100644
e3f67fd
--- a/kernel/fork.c
e3f67fd
+++ b/kernel/fork.c
e3f67fd
@@ -1573,6 +1573,19 @@ long do_fork(unsigned long clone_flags,
e3f67fd
 	long nr;
e3f67fd
 
e3f67fd
 	/*
e3f67fd
+	 * Do some preliminary argument and permissions checking before we
e3f67fd
+	 * actually start allocating stuff
e3f67fd
+	 */
e3f67fd
+	if (clone_flags & CLONE_NEWUSER) {
e3f67fd
+		/* hopefully this check will go away when userns support is
e3f67fd
+		 * complete
e3f67fd
+		 */
e3f67fd
+		if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SETUID) ||
e3f67fd
+				!capable(CAP_SETGID))
e3f67fd
+			return -EPERM;
e3f67fd
+	}
e3f67fd
+
e3f67fd
+	/*
e3f67fd
 	 * Determine whether and which event to report to ptracer.  When
e3f67fd
 	 * called from kernel_thread or CLONE_UNTRACED is explicitly
e3f67fd
 	 * requested, no event is reported; otherwise, report if the event
e3f67fd
-- 
e3f67fd
1.8.3.1
e3f67fd