diff options
author | Christian Brauner <christian.brauner@ubuntu.com> | 2017-11-18 16:22:01 +0100 |
---|---|---|
committer | Christian Brauner <christian.brauner@ubuntu.com> | 2017-11-18 16:23:01 +0100 |
commit | ea69a5c87498ba94eb804ab628000ecfc50d6710 (patch) | |
tree | cd01246f639c4b6a25d9f7793319fc2e004a07bc /support | |
parent | tst-ttyname: Fix namespace setup for Fedora (diff) | |
download | glibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.tar.gz glibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.tar.bz2 glibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.zip |
support_become_root: Don't fail when /proc/<pid/setgroups is missing
The requirement to write "deny" to /proc/<pid>/setgroups for a given user
namespace before being able to write a gid mapping was introduced in Linux
3.19. Before that this requirement including the file did not exist.
So don't fail when errno == ENOENT.
Diffstat (limited to 'support')
-rw-r--r-- | support/support_become_root.c | 21 |
1 files changed, 16 insertions, 5 deletions
diff --git a/support/support_become_root.c b/support/support_become_root.c index 5086570251..e45c939421 100644 --- a/support/support_become_root.c +++ b/support/support_become_root.c @@ -18,6 +18,7 @@ #include <support/namespace.h> +#include <errno.h> #include <fcntl.h> #include <sched.h> #include <stdio.h> @@ -50,11 +51,21 @@ setup_uid_gid_mapping (uid_t original_uid, gid_t original_gid) xwrite (fd, buf, ret); xclose (fd); - /* Disable setgroups before mapping groups, otherwise that would - fail with EPERM. */ - fd = xopen ("/proc/self/setgroups", O_WRONLY, 0); - xwrite (fd, "deny\n", strlen ("deny\n")); - xclose (fd); + /* Linux 3.19 introduced the setgroups file. We need write "deny" to this + * file otherwise writing to gid_map will fail with EPERM. */ + fd = open64 ("/proc/self/setgroups", O_WRONLY, 0); + if (fd < 0) + { + if (errno != ENOENT) + FAIL_EXIT1 ("open64 (\"/proc/self/setgroups\", 0x%x, 0%o): %m", + O_WRONLY, 0); + /* This kernel doesn't expose the setgroups file so simply move on. */ + } + else + { + xwrite (fd, "deny\n", strlen ("deny\n")); + xclose (fd); + } /* Now map our own GID, like we did for the user ID. */ fd = xopen ("/proc/self/gid_map", O_WRONLY, 0); |