Re: [PATCH v6 09/40] xattr: handle idmapped mounts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 21 Jan 2021, Christian Brauner wrote:

> From: Tycho Andersen <tycho@tycho.pizza>
> 
> When interacting with extended attributes the vfs verifies that the
> caller is privileged over the inode with which the extended attribute is
> associated. For posix access and posix default extended attributes a uid
> or gid can be stored on-disk. Let the functions handle posix extended
> attributes on idmapped mounts. If the inode is accessed through an
> idmapped mount we need to map it according to the mount's user
> namespace. Afterwards the checks are identical to non-idmapped mounts.
> This has no effect for e.g. security xattrs since they don't store uids
> or gids and don't perform permission checks on them like posix acls do.
> 
> Link: https://lore.kernel.org/r/20210112220124.837960-17-christian.brauner@xxxxxxxxxx
> Cc: Christoph Hellwig <hch@xxxxxx>
> Cc: David Howells <dhowells@xxxxxxxxxx>
> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
> Cc: linux-fsdevel@xxxxxxxxxxxxxxx
> Reviewed-by: Christoph Hellwig <hch@xxxxxx>
> Signed-off-by: Tycho Andersen <tycho@tycho.pizza>
> Signed-off-by: Christian Brauner <christian.brauner@xxxxxxxxxx>


Reviewed-by: James Morris <jamorris@xxxxxxxxxxxxxxxxxxx>


-- 
James Morris
<jmorris@xxxxxxxxx>




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux