Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2942131imm; Thu, 24 May 2018 19:33:21 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrxtcA13LyGKFlsFTBJOeBGRj32wj/A5BfH1ARHJcsgVTdS982ZGgy+DYk2v8TNrc2HsvCp X-Received: by 2002:a63:2485:: with SMTP id k127-v6mr449932pgk.434.1527215601620; Thu, 24 May 2018 19:33:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527215601; cv=none; d=google.com; s=arc-20160816; b=PeLsp4OrXEPyXyPWla57TTLU6UB9foZt/dhhx2wbsjtKhvODs3RtUqMGwGZUGNva++ 36Hv6XHHQK0tFjRy3cvqGx/pwtQwSh6KEnG+Doh+5RB1blhov6eOt38qRfve02TvSdrR jpVKd3ETAs4Gvg1xlcMtpj5D7LlRdBcHaVlfij+q2ZhONndkpmpFjexO5rv5913d1LZD dOv6Hc1gJPHKCKxocqlgwJfHbG85r8qkoBG0+JodbUOYyLaIBsh/QWd3V4Vekb1V1qfP TZJ87WzC8Npq1do+7oArac15JVFKe9wpgSLaDamdgyYlBIIAz1gyQRXjWXGLjvdK74UJ FDrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=iEQgTkU/DnrdH0ct+wScn3VuRBv/T2YTxq0aU/kJBXQ=; b=GcJe5gMgWXwA209wxlKZyBKPtwZ+Iy75DMLMM1PL4xTo2EawPD2fvh5VCuSLMJlT3p KhZhZxR8T/OKrNBPy0reSzLEJ0TvBE3jMeeszhRGzxTnljSgqfsNQDX7Gp1RLbNCDGEo dU+4QJnFvM8KkRmwBDnb0N2k3CQbYf9hwWih7rnKFRC/aHnIV4iWsYl4MRn1adHSkQPz FtVed2Cu9hQ4o6R+mlJBzXfmwlLrn6NyoVqbbzTIrhYzSGvtpy77fMEdJD9L/6LVp2od x2aQ/jj8WPEmF/FkZMm7gAmRTiRKj7OcQ/peGzIgT0SWKOxjNqAH0fpLyCV/fxXTD6h7 RB+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k10-v6si17230408pgc.299.2018.05.24.19.33.06; Thu, 24 May 2018 19:33:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S968419AbeEXR2h (ORCPT + 99 others); Thu, 24 May 2018 13:28:37 -0400 Received: from mx2.mailbox.org ([80.241.60.215]:38824 "EHLO mx2.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965999AbeEXR2e (ORCPT ); Thu, 24 May 2018 13:28:34 -0400 Received: from smtp2.mailbox.org (smtp2.mailbox.org [80.241.60.241]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx2.mailbox.org (Postfix) with ESMTPS id A0B3A425A7; Thu, 24 May 2018 19:28:32 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by spamfilter02.heinlein-hosting.de (spamfilter02.heinlein-hosting.de [80.241.56.116]) (amavisd-new, port 10030) with ESMTP id WaR1Vg0zq7wb; Thu, 24 May 2018 19:28:23 +0200 (CEST) Date: Thu, 24 May 2018 19:28:21 +0200 From: Christian Brauner To: "Eric W. Biederman" Cc: Linux Containers , linux-kernel@vger.kernel.org, Seth Forshee , linux-fsdevel@vger.kernel.org Subject: Re: [REVIEW][PATCH 4/6] fs: Allow superblock owner to access do_remount_sb() Message-ID: <20180524172821.GA27641@mailbox.org> References: <87o9h6554f.fsf@xmission.com> <20180523232538.4880-4-ebiederm@xmission.com> <20180524155803.GB19932@mailbox.org> <87603d3svh.fsf@xmission.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <87603d3svh.fsf@xmission.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 24, 2018 at 11:45:06AM -0500, Eric W. Biederman wrote: > Christian Brauner writes: > > > On Wed, May 23, 2018 at 06:25:36PM -0500, Eric W. Biederman wrote: > >> Superblock level remounts are currently restricted to global > >> CAP_SYS_ADMIN, as is the path for changing the root mount to > >> read only on umount. Loosen both of these permission checks to > >> also allow CAP_SYS_ADMIN in any namespace which is privileged > >> towards the userns which originally mounted the filesystem. > > > > Acked-by: Christian Brauner > > > >> > >> Signed-off-by: Seth Forshee > >> Acked-by: "Eric W. Biederman" > >> Acked-by: Serge Hallyn > > > > Note, I just talked to Serge. This should be Acked-by: Serge Hallyn > > Now you know how long these patches have been sitting waiting to get > merged. Indeed. :) Christian