The patch titled check privileges before setting mount propagation has been removed from the -mm tree. Its filename was check-privileges-before-setting-mount-propagation.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ Subject: check privileges before setting mount propagation From: Miklos Szeredi <mszeredi@xxxxxxx> There's a missing check for CAP_SYS_ADMIN in do_change_type(). Signed-off-by: Miklos Szeredi <mszeredi@xxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Cc: Christoph Hellwig <hch@xxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- fs/namespace.c | 3 +++ 1 file changed, 3 insertions(+) diff -puN fs/namespace.c~check-privileges-before-setting-mount-propagation fs/namespace.c --- a/fs/namespace.c~check-privileges-before-setting-mount-propagation +++ a/fs/namespace.c @@ -886,6 +886,9 @@ static int do_change_type(struct nameida int recurse = flag & MS_REC; int type = flag & ~MS_REC; + if (!capable(CAP_SYS_ADMIN)) + return -EPERM; + if (nd->dentry != nd->mnt->mnt_root) return -EINVAL; _ Patches currently in -mm which might be from mszeredi@xxxxxxx are origin.patch split-mmap.patch only-allow-nonlinear-vmas-for-ram-backed-filesystems.patch uml-turn-build-warnings-into-comments.patch consolidate-generic_writepages-and-mpage_writepages.patch unprivileged-mounts-add-user-mounts-to-the-kernel.patch unprivileged-mounts-allow-unprivileged-umount.patch unprivileged-mounts-account-user-mounts.patch unprivileged-mounts-propagate-error-values-from-clone_mnt.patch unprivileged-mounts-allow-unprivileged-bind-mounts.patch unprivileged-mounts-put-declaration-of-put_filesystem-in-fsh.patch unprivileged-mounts-allow-unprivileged-mounts.patch unprivileged-mounts-allow-unprivileged-fuse-mounts.patch unprivileged-mounts-propagation-inherit-owner-from-parent.patch unprivileged-mounts-add-no-submounts-flag.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html