Assumption never checked, should fail if the mounter creds are not sufficient.
Signed-off-by: Mark Salyzyn <[email protected]> Cc: Miklos Szeredi <[email protected]> Cc: Jonathan Corbet <[email protected]> Cc: Vivek Goyal <[email protected]> Cc: Eric W. Biederman <[email protected]> Cc: Amir Goldstein <[email protected]> Cc: Randy Dunlap <[email protected]> Cc: Stephen Smalley <[email protected]> Cc: [email protected] Cc: [email protected] Cc: [email protected] v5 - dependency of "overlayfs: override_creds=off option bypass creator_cred" --- fs/overlayfs/overlayfs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h index 7538b9b56237..bf3a80157d42 100644 --- a/fs/overlayfs/overlayfs.h +++ b/fs/overlayfs/overlayfs.h @@ -176,7 +176,7 @@ static inline int ovl_do_rename(struct inode *olddir, struct dentry *olddentry, static inline int ovl_do_whiteout(struct inode *dir, struct dentry *dentry) { - int err = vfs_whiteout(dir, dentry); + int err = capable(CAP_MKNOD) ? vfs_whiteout(dir, dentry) : -EPERM; pr_debug("whiteout(%pd2) = %i\n", dentry, err); return err; } -- 2.19.0.rc0.228.g281dcd1b4d0-goog

