diff options
Diffstat (limited to 'kernel/fork.c')
| -rw-r--r-- | kernel/fork.c | 34 | 
1 files changed, 24 insertions, 10 deletions
diff --git a/kernel/fork.c b/kernel/fork.c index a31b823b3c2d..1766d324d5e3 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -413,7 +413,7 @@ static int dup_mmap(struct mm_struct *mm, struct mm_struct *oldmm)  		tmp->vm_next = tmp->vm_prev = NULL;  		file = tmp->vm_file;  		if (file) { -			struct inode *inode = file->f_path.dentry->d_inode; +			struct inode *inode = file_inode(file);  			struct address_space *mapping = file->f_mapping;  			get_file(file); @@ -1141,6 +1141,9 @@ static struct task_struct *copy_process(unsigned long clone_flags,  	if ((clone_flags & (CLONE_NEWNS|CLONE_FS)) == (CLONE_NEWNS|CLONE_FS))  		return ERR_PTR(-EINVAL); +	if ((clone_flags & (CLONE_NEWUSER|CLONE_FS)) == (CLONE_NEWUSER|CLONE_FS)) +		return ERR_PTR(-EINVAL); +  	/*  	 * Thread groups must share signals as well, and detached threads  	 * can only be started up within the thread group. @@ -1166,6 +1169,14 @@ static struct task_struct *copy_process(unsigned long clone_flags,  				current->signal->flags & SIGNAL_UNKILLABLE)  		return ERR_PTR(-EINVAL); +	/* +	 * If the new process will be in a different pid namespace +	 * don't allow the creation of threads. +	 */ +	if ((clone_flags & (CLONE_VM|CLONE_NEWPID)) && +	    (task_active_pid_ns(current) != current->nsproxy->pid_ns)) +		return ERR_PTR(-EINVAL); +  	retval = security_task_create(clone_flags);  	if (retval)  		goto fork_out; @@ -1225,6 +1236,12 @@ static struct task_struct *copy_process(unsigned long clone_flags,  #ifndef CONFIG_VIRT_CPU_ACCOUNTING  	p->prev_cputime.utime = p->prev_cputime.stime = 0;  #endif +#ifdef CONFIG_VIRT_CPU_ACCOUNTING_GEN +	seqlock_init(&p->vtime_seqlock); +	p->vtime_snap = 0; +	p->vtime_snap_whence = VTIME_SLEEPING; +#endif +  #if defined(SPLIT_RSS_COUNTING)  	memset(&p->rss_stat, 0, sizeof(p->rss_stat));  #endif @@ -1660,8 +1677,10 @@ SYSCALL_DEFINE5(clone, unsigned long, clone_flags, unsigned long, newsp,  		 int, tls_val)  #endif  { -	return do_fork(clone_flags, newsp, 0, -		parent_tidptr, child_tidptr); +	long ret = do_fork(clone_flags, newsp, 0, parent_tidptr, child_tidptr); +	asmlinkage_protect(5, ret, clone_flags, newsp, +			parent_tidptr, child_tidptr, tls_val); +	return ret;  }  #endif @@ -1791,7 +1810,7 @@ SYSCALL_DEFINE1(unshare, unsigned long, unshare_flags)  	 * If unsharing a user namespace must also unshare the thread.  	 */  	if (unshare_flags & CLONE_NEWUSER) -		unshare_flags |= CLONE_THREAD; +		unshare_flags |= CLONE_THREAD | CLONE_FS;  	/*  	 * If unsharing a pid namespace must also unshare the thread.  	 */ @@ -1845,10 +1864,8 @@ SYSCALL_DEFINE1(unshare, unsigned long, unshare_flags)  			exit_sem(current);  		} -		if (new_nsproxy) { +		if (new_nsproxy)  			switch_task_namespaces(current, new_nsproxy); -			new_nsproxy = NULL; -		}  		task_lock(current); @@ -1878,9 +1895,6 @@ SYSCALL_DEFINE1(unshare, unsigned long, unshare_flags)  		}  	} -	if (new_nsproxy) -		put_nsproxy(new_nsproxy); -  bad_unshare_cleanup_cred:  	if (new_cred)  		put_cred(new_cred);  |