aboutsummaryrefslogtreecommitdiff
path: root/support
diff options
context:
space:
mode:
authorChristian Brauner <christian.brauner@ubuntu.com>2017-11-18 16:22:01 +0100
committerChristian Brauner <christian.brauner@ubuntu.com>2017-11-18 16:23:01 +0100
commitea69a5c87498ba94eb804ab628000ecfc50d6710 (patch)
treecd01246f639c4b6a25d9f7793319fc2e004a07bc /support
parent8db7f48cb74670829df037b2d037df3f36b71ecd (diff)
downloadglibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.zip
glibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.tar.gz
glibc-ea69a5c87498ba94eb804ab628000ecfc50d6710.tar.bz2
support_become_root: Don't fail when /proc/<pid/setgroups is missing
The requirement to write "deny" to /proc/<pid>/setgroups for a given user namespace before being able to write a gid mapping was introduced in Linux 3.19. Before that this requirement including the file did not exist. So don't fail when errno == ENOENT.
Diffstat (limited to 'support')
-rw-r--r--support/support_become_root.c21
1 files changed, 16 insertions, 5 deletions
diff --git a/support/support_become_root.c b/support/support_become_root.c
index 5086570..e45c939 100644
--- a/support/support_become_root.c
+++ b/support/support_become_root.c
@@ -18,6 +18,7 @@
#include <support/namespace.h>
+#include <errno.h>
#include <fcntl.h>
#include <sched.h>
#include <stdio.h>
@@ -50,11 +51,21 @@ setup_uid_gid_mapping (uid_t original_uid, gid_t original_gid)
xwrite (fd, buf, ret);
xclose (fd);
- /* Disable setgroups before mapping groups, otherwise that would
- fail with EPERM. */
- fd = xopen ("/proc/self/setgroups", O_WRONLY, 0);
- xwrite (fd, "deny\n", strlen ("deny\n"));
- xclose (fd);
+ /* Linux 3.19 introduced the setgroups file. We need write "deny" to this
+ * file otherwise writing to gid_map will fail with EPERM. */
+ fd = open64 ("/proc/self/setgroups", O_WRONLY, 0);
+ if (fd < 0)
+ {
+ if (errno != ENOENT)
+ FAIL_EXIT1 ("open64 (\"/proc/self/setgroups\", 0x%x, 0%o): %m",
+ O_WRONLY, 0);
+ /* This kernel doesn't expose the setgroups file so simply move on. */
+ }
+ else
+ {
+ xwrite (fd, "deny\n", strlen ("deny\n"));
+ xclose (fd);
+ }
/* Now map our own GID, like we did for the user ID. */
fd = xopen ("/proc/self/gid_map", O_WRONLY, 0);