From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from out01.mta.xmission.com ([166.70.13.231]:54066 "EHLO out01.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751470AbeFDDpI (ORCPT ); Sun, 3 Jun 2018 23:45:08 -0400 From: ebiederm@xmission.com (Eric W. Biederman) To: Linus Torvalds Cc: Linux Containers , , , Seth Forshee , Miklos Szeredi , Miklos Szeredi Date: Sun, 03 Jun 2018 22:45:01 -0500 Message-ID: <878t7vp64i.fsf@xmission.com> MIME-Version: 1.0 Content-Type: text/plain Subject: [GIT PULL] userns Sender: linux-fsdevel-owner@vger.kernel.org List-ID: Linus, Please pull the userns-linus branch from the git tree: git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace.git userns-linus HEAD: f3f1a18330ac1b717cd7a32adff38d965f365aa2 fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems This is the last couple of vfs bits to enable root in a user namespace to mount and manipulate a filesystem with backing store (AKA not a virtual filesystem like proc, but a filesystem where the unprivileged user controls the content). The target filesystem for this work is fuse, and Miklos should be sending you the pull request for the fuse bits this merge window. The two key patches are " evm: Don't update hmacs in user ns mounts" and "vfs: Don't allow changing the link count of an inode with an invalid uid or gid". Those close small gaps in the vfs that would be a problem if an unprivileged fuse filesystem is mounted. The rest of the changes are things that are now safe to allow a root user in a user namespace to do with a filesystem they have mounted. The most interesting development is that remount is now safe. Eric W. Biederman (5): vfs: Don't allow changing the link count of an inode with an invalid uid or gid vfs: Allow userns root to call mknod on owned filesystems. fs: Allow superblock owner to replace invalid owners of inodes fs: Allow superblock owner to access do_remount_sb() capabilities: Allow privileged user in s_user_ns to set security.* xattrs Seth Forshee (2): evm: Don't update hmacs in user ns mounts fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems Eric