vfs: Allow unprivileged manipulation of the mount namespace.
authorEric W. Biederman <ebiederm@xmission.com>
Fri, 27 Jul 2012 04:42:03 +0000 (21:42 -0700)
committerEric W. Biederman <ebiederm@xmission.com>
Mon, 19 Nov 2012 13:59:21 +0000 (05:59 -0800)
commit0c55cfc4166d9a0f38de779bd4d75a90afbe7734
treed7ac108d615869ea615eec8693993c2700b24351
parent7a472ef4be8387bc05a42e16309b02c8ca943a40
vfs: Allow unprivileged manipulation of the mount namespace.

- Add a filesystem flag to mark filesystems that are safe to mount as
  an unprivileged user.

- Add a filesystem flag to mark filesystems that don't need MNT_NODEV
  when mounted by an unprivileged user.

- Relax the permission checks to allow unprivileged users that have
  CAP_SYS_ADMIN permissions in the user namespace referred to by the
  current mount namespace to be allowed to mount, unmount, and move
  filesystems.

Acked-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
fs/namespace.c
include/linux/fs.h