Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754847Ab3GXQtn (ORCPT ); Wed, 24 Jul 2013 12:49:43 -0400 Received: from static.92.5.9.176.clients.your-server.de ([176.9.5.92]:48184 "EHLO hallynmail2" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753679Ab3GXQtm (ORCPT ); Wed, 24 Jul 2013 12:49:42 -0400 Date: Wed, 24 Jul 2013 16:49:41 +0000 From: "Serge E. Hallyn" To: "Eric W. Biederman" Cc: "Serge E. Hallyn" , Andy Lutomirski , Linux Containers , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users Message-ID: <20130724164941.GA18687@mail.hallyn.com> References: <877gghruwq.fsf@xmission.com> <87li4wpi2b.fsf@xmission.com> <20130724124933.GA16517@mail.hallyn.com> <20130724153018.GA17960@mail.hallyn.com> <87ehaolz8v.fsf@xmission.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87ehaolz8v.fsf@xmission.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1700 Lines: 45 Quoting Eric W. Biederman (ebiederm@xmission.com): > "Serge E. Hallyn" writes: > > > Quoting Serge E. Hallyn (serge@hallyn.com): > >> Quoting Eric W. Biederman (ebiederm@xmission.com): > >> > > >> > Serge does this patch break lxc? I think all should be well but I want > >> > to make certain there is not some hidden case where this fundamentaly > >> > breaks some functionality. > >> > >> I haven't yet tried. I'll build and test a kernel today. I'm pretty > >> sure all the child's mounts are done after clone, so I *think* the worst > >> case will be that the unmounting of put_old after pivot_root() will > >> be noisy. Will let you know. > >> > >> -serge > > > > Just tested it - works fine. Warns about all of the failed umounts. > > Just to confirm. Can you do a lazy umount of put_old and get rid of > them? Yes, it does that and it works. > > Acked-by: Serge Hallyn > > > > ( Mind you I'm not approving of the idea of hiding mounts as a security > > mechanisms, but I know that neither are you :) > > As a security mechanism, not really. This is more about closing a > theoretical hole in case someone was sloppy, and doing it before user > namespaces are too widely deployed so we avoid massive user space > breakage. It let's me sleep more soundly at night if I know you can't > more access more with user namespaces that you can without user > namespaces. Yup. thanks, -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/