Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2952707imm; Thu, 24 May 2018 19:47:08 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoiH6tOSbDUjB1lBh5r/qVdA8e/O6/sbpn914fxlG/SSFN/FtSlgmURa4xu5msiTJTbFxQh X-Received: by 2002:a63:9d8e:: with SMTP id i136-v6mr478795pgd.288.1527216428923; Thu, 24 May 2018 19:47:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527216428; cv=none; d=google.com; s=arc-20160816; b=cN/Vy38pqxkEyJXqceLMDLiFItbued3Mvn5V1WGq9KbyZgv4kogOWY0ftbZW7XH0mc bHPSPIyrZkGoitYzdDWeep/D+m42krbnu4BTe+Xd4BICNtoarzzUmDl4fZVrabOgB0KO KaZ2/iFov4iAW+6EsULAZlM4VyZzYOv4bs1YUlIF4RTKCTsxVkWz4ZaNxSdgrZJVQ1P8 nIeOTtkGU4zN0aXuo3cXVRTCrWeRg2twYUW69TxWv7oLTBsNg0ic9nFhSocKN2gJh0rt itMqHsXpm7IOoHODKhbfN/eTl/3Q4IbJOKic5cslsVCNW1UlAu9D80PQ1MGwjMwaPRFI qnXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=XoSldGDKIhwnfaoTjnqIqc+wRnIMU1M+bil0D6KmDL0=; b=q/KKql64mjuBgQtRmke1m4WjXtMz/W6pNpUxPuCtU4rVnV/TiuyQ5his6WpLwtjNbK eV9JM65luRxrtYINO0jvkYc31ePSUtfLFEj0AS7hDBIhYcsbkSj5Rd82Jld+Xt1QNEYs GQkVQ6PzjHNmwcItBOOtUFqZuPVxwR9i6Ry8NKnyMnvR60ZNAVop0PFkP7nkGV12nzuM lJ86mfG9ihrSEo3/t9OC8B6/tyW9zjKs5q0wDK5+Bzkqyc2wZeugANJtlZpPLEQFBf+E LPZ1uttunulSbgKLHrV1eCCz0FtN1/QkP4oGuAaUGybBa/2vdXcLQg1iNgyWL3TiR6p6 iwNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a17-v6si17918798pgf.15.2018.05.24.19.46.54; Thu, 24 May 2018 19:47:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034779AbeEXWaq (ORCPT + 99 others); Thu, 24 May 2018 18:30:46 -0400 Received: from mx1.mailbox.org ([80.241.60.212]:40418 "EHLO mx1.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966192AbeEXWap (ORCPT ); Thu, 24 May 2018 18:30:45 -0400 Received: from smtp2.mailbox.org (smtp2.mailbox.org [80.241.60.241]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.mailbox.org (Postfix) with ESMTPS id 0223148CFD; Fri, 25 May 2018 00:30:43 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by hefe.heinlein-support.de (hefe.heinlein-support.de [91.198.250.172]) (amavisd-new, port 10030) with ESMTP id ooKwYkK72mYn; Fri, 25 May 2018 00:30:42 +0200 (CEST) Date: Fri, 25 May 2018 00:30:41 +0200 From: Christian Brauner To: Seth Forshee Cc: "Eric W. Biederman" , Linux Containers , linux-fsdevel@vger.kernel.org, "Serge E. Hallyn" , linux-kernel@vger.kernel.org Subject: Re: [REVIEW][PATCH 1/6] vfs: Don't allow changing the link count of an inode with an invalid uid or gid Message-ID: <20180524223040.GB17493@mailbox.org> References: <87o9h6554f.fsf@xmission.com> <20180523232538.4880-1-ebiederm@xmission.com> <20180524125832.GP3401@ubuntu-xps13> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180524125832.GP3401@ubuntu-xps13> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 24, 2018 at 07:58:32AM -0500, Seth Forshee wrote: > On Wed, May 23, 2018 at 06:25:33PM -0500, Eric W. Biederman wrote: > > Changing the link count of an inode via unlink or link will cause a > > write back of that inode. If the uids or gids are invalid (aka not known > > to the kernel) writing the inode back may change the uid or gid in the > > filesystem. To prevent possible filesystem and to avoid the need for > > filesystem maintainers to worry about it don't allow operations on > > inodes with an invalid uid or gid. > > > > Signed-off-by: "Eric W. Biederman" > > Acked-by: Seth Forshee Acked-by: Christian Brauner