Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756946AbbGTRzE (ORCPT ); Mon, 20 Jul 2015 13:55:04 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:48828 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756421AbbGTRzA (ORCPT ); Mon, 20 Jul 2015 13:55:00 -0400 Message-Id: <1437414899.148452.328428529.097963A9@webmail.messagingengine.com> X-Sasl-Enc: T5rQcNpnWEyJSkMWVo7dVME3u9Zk8L2+RMUtNYJH/KA3 1437414899 From: Colin Walters To: "Eric W. Biederman" , Casey Schaufler Cc: Andy Lutomirski , Seth Forshee , Alexander Viro , Linux FS Devel , LSM List , "SELinux-NSA" , Serge Hallyn , linux-kernel@vger.kernel.org MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain X-Mailer: MessagingEngine.com Webmail Interface - ajax-63a5d8c6 In-Reply-To: <87fv4owvxv.fsf@x220.int.ebiederm.org> References: <1436989569-69582-1-git-send-email-seth.forshee@canonical.com> <55A6C448.5050902@schaufler-ca.com> <87vbdlf7vo.fsf@x220.int.ebiederm.org> <55A6E107.3070200@schaufler-ca.com> <55A71CE3.4050708@schaufler-ca.com> <87fv4owvxv.fsf@x220.int.ebiederm.org> Subject: Re: [PATCH 0/7] Initial support for user namespace owned mounts Date: Mon, 20 Jul 2015 13:54:59 -0400 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1214 Lines: 26 On Thu, Jul 16, 2015, at 12:47 AM, Eric W. Biederman wrote: > With that said desktop environments have for a long time been > automatically mounting whichever filesystem you place in your computer, > so in practice what this is really about is trying to align the kernel > with how people use filesystems. There is a large attack surface difference between mounting a device that someone physically plugged into the computer (and note typically it's required that the active console be unlocked as well[1]) versus allowing any "unprivileged" process at any time to do it. Many server setups use "unprivileged" uids that otherwise wouldn't be able to exploit bugs in filesystem code. [1] https://bugzilla.gnome.org/show_bug.cgi?id=653520 "AutomountManager also keeps track of the current session availability (using the ConsoleKit and gnome-screensaver DBus interfaces) and inhibits mounting if the current session is locked, or another session is in use instead." -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/