Searched hist:"132 c94e31b8bca8ea921f9f96a57d684fa4ae0a9" (Results 1 – 3 of 3) sorted by relevance
| /linux/fs/ |
| H A D | pnode.h | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 Fri Mar 22 11:08:05 UTC 2013 Eric W. Biederman <ebiederm@xmission.com> vfs: Carefully propogate mounts across user namespaces
As a matter of policy MNT_READONLY should not be changable if the original mounter had more privileges than creator of the mount namespace.
Add the flag CL_UNPRIVILEGED to note when we are copying a mount from a mount namespace that requires more privileges to a mount namespace that requires fewer privileges.
When the CL_UNPRIVILEGED flag is set cause clone_mnt to set MNT_NO_REMOUNT if any of the mnt flags that should never be changed are set.
This protects both mount propagation and the initial creation of a less privileged mount namespace.
Cc: stable@vger.kernel.org Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Reported-by: Andy Lutomirski <luto@amacapital.net> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
|
| H A D | pnode.c | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 Fri Mar 22 11:08:05 UTC 2013 Eric W. Biederman <ebiederm@xmission.com> vfs: Carefully propogate mounts across user namespaces
As a matter of policy MNT_READONLY should not be changable if the original mounter had more privileges than creator of the mount namespace.
Add the flag CL_UNPRIVILEGED to note when we are copying a mount from a mount namespace that requires more privileges to a mount namespace that requires fewer privileges.
When the CL_UNPRIVILEGED flag is set cause clone_mnt to set MNT_NO_REMOUNT if any of the mnt flags that should never be changed are set.
This protects both mount propagation and the initial creation of a less privileged mount namespace.
Cc: stable@vger.kernel.org Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Reported-by: Andy Lutomirski <luto@amacapital.net> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
|
| H A D | namespace.c | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 Fri Mar 22 11:08:05 UTC 2013 Eric W. Biederman <ebiederm@xmission.com> vfs: Carefully propogate mounts across user namespaces
As a matter of policy MNT_READONLY should not be changable if the original mounter had more privileges than creator of the mount namespace.
Add the flag CL_UNPRIVILEGED to note when we are copying a mount from a mount namespace that requires more privileges to a mount namespace that requires fewer privileges.
When the CL_UNPRIVILEGED flag is set cause clone_mnt to set MNT_NO_REMOUNT if any of the mnt flags that should never be changed are set.
This protects both mount propagation and the initial creation of a less privileged mount namespace.
Cc: stable@vger.kernel.org Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Reported-by: Andy Lutomirski <luto@amacapital.net> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
|