Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755426AbaJGVmx (ORCPT ); Tue, 7 Oct 2014 17:42:53 -0400 Received: from out02.mta.xmission.com ([166.70.13.232]:42721 "EHLO out02.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752139AbaJGVmu (ORCPT ); Tue, 7 Oct 2014 17:42:50 -0400 From: ebiederm@xmission.com (Eric W. Biederman) To: Serge Hallyn Cc: Al Viro , Andrey Vagin , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, Andrey Vagin , Andrew Morton , Cyrill Gorcunov , Pavel Emelyanov , Serge Hallyn , Rob Landley References: <1412683977-29543-1-git-send-email-avagin@openvz.org> <20141007133039.GG7996@ZenIV.linux.org.uk> <20141007133339.GH7996@ZenIV.linux.org.uk> <87r3yjy64e.fsf@x220.int.ebiederm.org> <20141007204627.GI28519@ubuntumail> <87wq8bvbzg.fsf@x220.int.ebiederm.org> <20141007213257.GJ28519@ubuntumail> Date: Tue, 07 Oct 2014 14:42:18 -0700 In-Reply-To: <20141007213257.GJ28519@ubuntumail> (Serge Hallyn's message of "Tue, 7 Oct 2014 21:32:57 +0000") Message-ID: <87zjd7r1z9.fsf@x220.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-AID: U2FsdGVkX19K2LFjMNkNJPRUqt49FxUNOAvhPyCr1PE= X-SA-Exim-Connect-IP: 98.234.51.111 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.7 XMSubLong Long Subject * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 BAYES_20 BODY: Bayes spam probability is 5 to 20% * [score: 0.1388] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa04 1397; Body=1 Fuz1=1 Fuz2=1] X-Spam-DCC: XMission; sa04 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Serge Hallyn X-Spam-Relay-Country: X-Spam-Timing: total 202 ms - load_scoreonly_sql: 0.03 (0.0%), signal_user_changed: 2.6 (1.3%), b_tie_ro: 1.92 (1.0%), parse: 0.61 (0.3%), extract_message_metadata: 12 (5.9%), get_uri_detail_list: 1.19 (0.6%), tests_pri_-1000: 7 (3.2%), tests_pri_-950: 1.03 (0.5%), tests_pri_-900: 0.85 (0.4%), tests_pri_-400: 18 (9.1%), check_bayes: 17 (8.6%), b_tokenize: 4.7 (2.3%), b_tok_get_all: 7 (3.3%), b_comp_prob: 1.71 (0.8%), b_tok_touch_all: 2.0 (1.0%), b_finish: 0.60 (0.3%), tests_pri_0: 154 (76.5%), tests_pri_500: 3.5 (1.7%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH] [RFC] mnt: add ability to clone mntns starting with the current root X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Wed, 24 Sep 2014 11:00:52 -0600) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Serge Hallyn writes: > Quoting Eric W. Biederman (ebiederm@xmission.com): >> What I meant is that it isn't about containers. It is about something >> root can do. So this is not a "container" problem. > > Oh, ok. > > Sorry, I'm getting the two thread confused anyway. I'm going to bow out > here until I can pay proper attention. I think there is half a point here that may be legit, when you are using mount namespaces to jail applications, there may be a problem with umounting / and making it to the underlying rootfs filesystem. I am squinting and looking this way and that but while I can imagine someone more clever than I can think up some unique property of rootfs that makes it a little more exploitable than just mounting a ramfs, but since you have to be root to exploit those properties I think the game is pretty much lost. >> >> So it is only root (and not root in a container) who can get to the >> >> exposed rootfs. >> >> >> >> I have a vague memory someone actually had a real use in miminal systems >> >> for being able to get back to the rootfs and being able to use rootfs as >> >> the rootfs. There was even a patch at that time that Andrew Morton was >> >> carrying for a time to allow unmounting root and get at rootfs, and to >> >> prevent the oops on rootfs unmount in some way. >> >> >> >> So not only do I not think it is a bug to get back too rootfs, I think >> >> it is a feature that some people have expressed at least half-way sane >> >> uses for. >> > >> > They can still do that if they want, using chroot :) >> >> It would take fchdir or fchroot and a directory file descriptor open on >> rootfs. Frequently there is no appropriate directory file descriptor. > > ? you can always escape if you're simply chrooted. waterbuffalo :) filesystem type rootfs. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/