Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1761880AbYBEViS (ORCPT ); Tue, 5 Feb 2008 16:38:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1761497AbYBEVhi (ORCPT ); Tue, 5 Feb 2008 16:37:38 -0500 Received: from fxip-0047f.externet.hu ([88.209.222.127]:38764 "EHLO pomaz-ex.szeredi.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1761443AbYBEVhg (ORCPT ); Tue, 5 Feb 2008 16:37:36 -0500 Message-Id: <20080205213657.480430286@szeredi.hu> References: <20080205213616.343721693@szeredi.hu> User-Agent: quilt/0.45-1 Date: Tue, 05 Feb 2008 22:36:18 +0100 From: Miklos Szeredi To: akpm@linux-foundation.org, hch@infradead.org, serue@us.ibm.com Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [patch 02/10] unprivileged mounts: allow unprivileged umount Content-Disposition: inline; filename=unprivileged-mounts-allow-unprivileged-umount.patch Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1768 Lines: 60 From: Miklos Szeredi The owner doesn't need sysadmin capabilities to call umount(). Similar behavior as umount(8) on mounts having "user=UID" option in /etc/mtab. The difference is that umount also checks /etc/fstab, presumably to exclude another mount on the same mountpoint. Signed-off-by: Miklos Szeredi Acked-by: Serge Hallyn --- Index: linux/fs/namespace.c =================================================================== --- linux.orig/fs/namespace.c 2008-02-04 23:47:50.000000000 +0100 +++ linux/fs/namespace.c 2008-02-04 23:47:53.000000000 +0100 @@ -1033,6 +1033,27 @@ static int do_umount(struct vfsmount *mn return retval; } +static bool is_mount_owner(struct vfsmount *mnt, uid_t uid) +{ + return (mnt->mnt_flags & MNT_USER) && mnt->mnt_uid == uid; +} + +/* + * umount is permitted for + * - sysadmin + * - mount owner, if not forced umount + */ +static bool permit_umount(struct vfsmount *mnt, int flags) +{ + if (capable(CAP_SYS_ADMIN)) + return true; + + if (flags & MNT_FORCE) + return false; + + return is_mount_owner(mnt, current->fsuid); +} + /* * Now umount can handle mount points as well as block devices. * This is important for filesystems which use unnamed block devices. @@ -1056,7 +1077,7 @@ asmlinkage long sys_umount(char __user * goto dput_and_out; retval = -EPERM; - if (!capable(CAP_SYS_ADMIN)) + if (!permit_umount(nd.path.mnt, flags)) goto dput_and_out; retval = do_umount(nd.path.mnt, flags); -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/