diff options
author | 2021-07-27 12:48:56 +0200 | |
---|---|---|
committer | 2021-08-23 13:19:14 +0200 | |
commit | 39e1674ff0351f6a47d3105e51bb1f9c72b3f20e (patch) | |
tree | 6ddd788e7a4ab63400825b13eb27e983a89ffcb7 | |
parent | btrfs: allow idmapped SET_RECEIVED_SUBVOL ioctls (diff) | |
download | wireguard-linux-39e1674ff0351f6a47d3105e51bb1f9c72b3f20e.tar.xz wireguard-linux-39e1674ff0351f6a47d3105e51bb1f9c72b3f20e.zip |
btrfs: allow idmapped SUBVOL_SETFLAGS ioctl
Setting flags on subvolumes or snapshots are core features of btrfs. The
SUBVOL_SETFLAGS ioctl is especially important as it allows to make
subvolumes and snapshots read-only or read-write. Allow setting flags on
btrfs subvolumes and snapshots on idmapped mounts. This is a fairly
straightforward operation since all the permission checking helpers are
already capable of handling idmapped mounts. So we just need to pass
down the mount's userns.
Reviewed-by: Josef Bacik <josef@toxicpanda.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
Diffstat (limited to '')
-rw-r--r-- | fs/btrfs/ioctl.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/btrfs/ioctl.c b/fs/btrfs/ioctl.c index aa60a9578747..9d54149bad6e 100644 --- a/fs/btrfs/ioctl.c +++ b/fs/btrfs/ioctl.c @@ -1988,7 +1988,7 @@ static noinline int btrfs_ioctl_subvol_setflags(struct file *file, u64 flags; int ret = 0; - if (!inode_owner_or_capable(&init_user_ns, inode)) + if (!inode_owner_or_capable(file_mnt_user_ns(file), inode)) return -EPERM; ret = mnt_want_write_file(file); |