On Thu, Jul 14, 2016 at 11:20:16AM -0700, Andrey Vagin wrote: > +struct ns_common *ns_get_owner(struct ns_common *ns) > +{ > + const struct cred *cred = current_cred(); > + struct user_namespace *user_ns, *p; > + > + user_ns = p = ns->user_ns; > + if (user_ns == NULL) { /* ns is init_user_ns */ > + /* Unprivileged user should not know that it's init_user_ns. */ > + if (capable(CAP_SYS_ADMIN)) > + return ERR_PTR(-ENOENT); > + return ERR_PTR(-EPERM); > + } > + > + for (;;) { > + if (p == cred->user_ns) > + break; > + if (p == &init_user_ns) > + return ERR_PTR(-EPERM); > + p = p->parent; > + } > + > + return &get_user_ns(user_ns)->ns; > +} I'm still not sure we need the CAP_SYS_ADMIN check [1]. Maybe “you have an open file descriptor for the namespace” means you've already been authorized to access the parent information (e.g. via POSIX permissions on /proc//ns/… or the bind-mounted namespace). Whether you can get the parent information probably depends whether you can use setns to join the parent namespace (I haven't looked up the backing code for that). But whichever way we go there, I think we do want to be consistent between init_user_ns and other namespaces. So we should have a CAP_SYS_ADMIN check for init_user_ns if and only if we also have a CAP_SYS_ADMIN check for the returned parent in the non-init_user_ns case as well: user_ns = p = ns->user_ns; if (user_ns == NULL) { /* ns is init_user_ns */ /* Unprivileged user should not know that it's init_user_ns. */ if (capable(CAP_SYS_ADMIN)) return ERR_PTR(-ENOENT); return ERR_PTR(-EPERM); } else if (! capable_in(user_ns, CAP_SYS_ADMIN)) { /* Unprivileged user should not know about the owning user ns. */ return ERR_PTR(-ENOENT); } Although I'm not sure what the real name for capable_in is, or even if it exists. Cheers, Trevor [1]: https://github.com/avagin/linux-task-diag/commit/2663bc803d324785e328261f3c07a0fef37d2088#commitcomment-18223327 -- This email may be signed or encrypted with GnuPG (http://www.gnupg.org). For more information, see http://en.wikipedia.org/wiki/Pretty_Good_Privacy