[PATCH][xenial SRU] UBUNTU: SAUCE: (namespace) Bypass sget() capability check for nfs
Andy Whitcroft
apw at canonical.com
Fri Jul 22 16:13:19 UTC 2016
On Fri, Jul 22, 2016 at 09:44:05AM -0500, Seth Forshee wrote:
> BugLink: http://bugs.launchpad.net/bugs/1603719
>
> 302cabb "UBUNTU: SAUCE: (namespace) Sync with upstream s_user_ns
> patches" added a capability check to sget() which causes a
> regression for automatic submounts, which may happen in the
> context of an unprivileged user. The capability check is not
> necessary in this case.
>
> The check can be bypassed by using sget_userns() instead.
> init_user_namespace should be used for the user ns since nfs does
> not support unprivileged mounting. This change makes the nfs
> mount behavior in xenial functionally identical to upstream.
>
> Signed-off-by: Seth Forshee <seth.forshee at canonical.com>
> ---
> fs/nfs/super.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/fs/nfs/super.c b/fs/nfs/super.c
> index f126828..8a57020 100644
> --- a/fs/nfs/super.c
> +++ b/fs/nfs/super.c
> @@ -2559,7 +2559,8 @@ struct dentry *nfs_fs_mount_common(struct nfs_server *server,
> sb_mntdata.mntflags |= MS_SYNCHRONOUS;
>
> /* Get a superblock - note that we may end up sharing one that already exists */
> - s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
> + s = sget_userns(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags,
> + &init_user_ns, &sb_mntdata);
> if (IS_ERR(s)) {
> mntroot = ERR_CAST(s);
> goto out_err_nosb;
Sounds reasonable, good testing.
-apw
More information about the kernel-team
mailing list