diff options
author | Christian Brauner <christian.brauner@ubuntu.com> | 2021-01-21 14:19:42 +0100 |
---|---|---|
committer | Christian Brauner <christian.brauner@ubuntu.com> | 2021-01-24 14:27:19 +0100 |
commit | 1ab29965b30599c797266eb3b970b4e6c8de3672 (patch) | |
tree | 3fcc302263b0b5a129712eef9716e1cf9ef9e2ff /fs/hfsplus/hfsplus_fs.h | |
parent | would_dump: handle idmapped mounts (diff) | |
download | linux-1ab29965b30599c797266eb3b970b4e6c8de3672.tar.xz linux-1ab29965b30599c797266eb3b970b4e6c8de3672.zip |
exec: handle idmapped mounts
When executing a setuid binary the kernel will verify in bprm_fill_uid()
that the inode has a mapping in the caller's user namespace before
setting the callers uid and gid. Let bprm_fill_uid() handle idmapped
mounts. If the inode is accessed through an idmapped mount it is mapped
according to the mount's user namespace. Afterwards the checks are
identical to non-idmapped mounts. If the initial user namespace is
passed nothing changes so non-idmapped mounts will see identical
behavior as before.
Link: https://lore.kernel.org/r/20210121131959.646623-24-christian.brauner@ubuntu.com
Cc: Christoph Hellwig <hch@lst.de>
Cc: David Howells <dhowells@redhat.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: linux-fsdevel@vger.kernel.org
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: James Morris <jamorris@linux.microsoft.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Diffstat (limited to 'fs/hfsplus/hfsplus_fs.h')
0 files changed, 0 insertions, 0 deletions