From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-yb1-f195.google.com ([209.85.219.195]:36516 "EHLO mail-yb1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726386AbeLCMw7 (ORCPT ); Mon, 3 Dec 2018 07:52:59 -0500 MIME-Version: 1.0 References: <20181203083416.28978-1-david@fromorbit.com> <20181203083416.28978-7-david@fromorbit.com> In-Reply-To: <20181203083416.28978-7-david@fromorbit.com> From: Amir Goldstein Date: Mon, 3 Dec 2018 14:51:52 +0200 Message-ID: Subject: Re: [PATCH 06/11] vfs: copy_file_range needs to strip setuid bits Content-Type: text/plain; charset="UTF-8" Sender: linux-unionfs-owner@vger.kernel.org To: Dave Chinner Cc: linux-fsdevel , linux-xfs , Olga Kornievskaia , Linux NFS Mailing List , overlayfs , ceph-devel@vger.kernel.org, linux-cifs@vger.kernel.org List-ID: On Mon, Dec 3, 2018 at 10:34 AM Dave Chinner wrote: > > From: Dave Chinner > > The file we are copying data into needs to have its setuid bit > stripped before we start the data copy so that unprivileged users > can't copy data into executables that are run with root privs. > > Signed-off-by: Dave Chinner > --- Looks good. Reviewed-by: Amir Goldstein Thanks, Amir.