diff options
author | Christian Brauner <christian.brauner@ubuntu.com> | 2021-01-21 14:19:41 +0100 |
---|---|---|
committer | Christian Brauner <christian.brauner@ubuntu.com> | 2021-01-24 14:27:19 +0100 |
commit | 435ac6214e00eab191296cd6cfdc316aa07e7794 (patch) | |
tree | 0ea0d6cd7fd15a870e9b12478316c2b1090da7a2 /fs/libfs.c | |
parent | ioctl: handle idmapped mounts (diff) | |
download | linux-435ac6214e00eab191296cd6cfdc316aa07e7794.tar.xz linux-435ac6214e00eab191296cd6cfdc316aa07e7794.zip |
would_dump: handle idmapped mounts
When determining whether or not to create a coredump the vfs will verify
that the caller is privileged over the inode. Make the would_dump()
helper handle idmapped mounts by passing down the mount's user namespace
of the exec file. If the initial user namespace is passed nothing
changes so non-idmapped mounts will see identical behavior as before.
Link: https://lore.kernel.org/r/20210121131959.646623-23-christian.brauner@ubuntu.com
Cc: Christoph Hellwig <hch@lst.de>
Cc: David Howells <dhowells@redhat.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: linux-fsdevel@vger.kernel.org
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Diffstat (limited to 'fs/libfs.c')
0 files changed, 0 insertions, 0 deletions