diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2013-03-22 11:10:15 +0100 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2013-03-27 15:50:04 +0100 |
commit | 90563b198e4c6674c63672fae1923da467215f45 (patch) | |
tree | aa8528c1c23dccbeca409059ec5f5d21ca1318bf /fs | |
parent | userns: Don't allow creation if the user is chrooted (diff) | |
download | linux-90563b198e4c6674c63672fae1923da467215f45.tar.xz linux-90563b198e4c6674c63672fae1923da467215f45.zip |
vfs: Add a mount flag to lock read only bind mounts
When a read-only bind mount is copied from mount namespace in a higher
privileged user namespace to a mount namespace in a lesser privileged
user namespace, it should not be possible to remove the the read-only
restriction.
Add a MNT_LOCK_READONLY mount flag to indicate that a mount must
remain read-only.
CC: stable@vger.kernel.org
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/namespace.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/fs/namespace.c b/fs/namespace.c index a3035223d421..8505b5ece5de 100644 --- a/fs/namespace.c +++ b/fs/namespace.c @@ -1713,6 +1713,9 @@ static int change_mount_flags(struct vfsmount *mnt, int ms_flags) if (readonly_request == __mnt_is_readonly(mnt)) return 0; + if (mnt->mnt_flags & MNT_LOCK_READONLY) + return -EPERM; + if (readonly_request) error = mnt_make_readonly(real_mount(mnt)); else |