[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAOQ4uxjyNB2zE+GE8Wmwjq__C7e4mrWMrS8RDVOOQFLtezjTkg@mail.gmail.com>
Date: Fri, 30 Oct 2020 11:57:24 +0200
From: Amir Goldstein <amir73il@...il.com>
To: Christian Brauner <christian.brauner@...ntu.com>
Cc: Alexander Viro <viro@...iv.linux.org.uk>,
Christoph Hellwig <hch@...radead.org>,
linux-fsdevel <linux-fsdevel@...r.kernel.org>,
John Johansen <john.johansen@...onical.com>,
James Morris <jmorris@...ei.org>,
Mimi Zohar <zohar@...ux.ibm.com>,
Dmitry Kasatkin <dmitry.kasatkin@...il.com>,
Stephen Smalley <stephen.smalley.work@...il.com>,
Casey Schaufler <casey@...aufler-ca.com>,
Arnd Bergmann <arnd@...db.de>,
Andreas Dilger <adilger.kernel@...ger.ca>,
OGAWA Hirofumi <hirofumi@...l.parknet.co.jp>,
Geoffrey Thomas <geofft@...reload.com>,
Mrunal Patel <mpatel@...hat.com>,
Josh Triplett <josh@...htriplett.org>,
Andy Lutomirski <luto@...nel.org>,
Miklos Szeredi <miklos@...redi.hu>,
Theodore Tso <tytso@....edu>, Alban Crequy <alban@...volk.io>,
Tycho Andersen <tycho@...ho.ws>,
David Howells <dhowells@...hat.com>,
James Bottomley <James.Bottomley@...senpartnership.com>,
Jann Horn <jannh@...gle.com>,
Seth Forshee <seth.forshee@...onical.com>,
Stéphane Graber <stgraber@...ntu.com>,
Aleksa Sarai <cyphar@...har.com>,
Lennart Poettering <lennart@...ttering.net>,
"Eric W. Biederman" <ebiederm@...ssion.com>, smbarber@...omium.org,
Phil Estes <estesp@...il.com>, Serge Hallyn <serge@...lyn.com>,
Kees Cook <keescook@...omium.org>,
Todd Kjos <tkjos@...gle.com>, Jonathan Corbet <corbet@....net>,
Linux Containers <containers@...ts.linux-foundation.org>,
LSM List <linux-security-module@...r.kernel.org>,
Linux API <linux-api@...r.kernel.org>,
Ext4 <linux-ext4@...r.kernel.org>,
overlayfs <linux-unionfs@...r.kernel.org>,
Linux Audit <linux-audit@...hat.com>,
linux-integrity <linux-integrity@...r.kernel.org>,
selinux@...r.kernel.org
Subject: Re: [PATCH 33/34] overlayfs: handle idmapped merged mounts
> -int ovl_permission(struct inode *inode, int mask)
> +int ovl_permission_mapped(struct user_namespace *user_ns,
> + struct inode *inode, int mask)
> {
> struct inode *upperinode = ovl_inode_upper(inode);
> struct inode *realinode = upperinode ?: ovl_inode_lower(inode);
> - struct user_namespace *user_ns;
> + struct user_namespace *real_user_ns;
> const struct cred *old_cred;
> int err;
>
> @@ -302,15 +313,15 @@ int ovl_permission(struct inode *inode, int mask)
> }
>
> if (upperinode)
> - user_ns = ovl_upper_mnt_user_ns(OVL_FS(inode->i_sb));
> + real_user_ns = ovl_upper_mnt_user_ns(OVL_FS(inode->i_sb));
> else
> - user_ns = OVL_I(inode)->lower_user_ns;
> + real_user_ns = OVL_I(inode)->lower_user_ns;
These changes look strange in this patch. Better use real_user_ns in previous
patch.
Thanks,
Amir.
Powered by blists - more mailing lists