Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754703AbbKQTWc (ORCPT ); Tue, 17 Nov 2015 14:22:32 -0500 Received: from mail-io0-f175.google.com ([209.85.223.175]:35972 "EHLO mail-io0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753679AbbKQTW3 (ORCPT ); Tue, 17 Nov 2015 14:22:29 -0500 Date: Tue, 17 Nov 2015 13:21:41 -0600 From: Seth Forshee To: Richard Weinberger Cc: Al Viro , "Eric W. Biederman" , linux-bcache@vger.kernel.org, device-mapper development , "linux-raid@vger.kernel.org" , "linux-mtd@lists.infradead.org" , linux-fsdevel , LSM , selinux@tycho.nsa.gov, Serge Hallyn , Andy Lutomirski , LKML , "Theodore Ts'o" , Octavian Purdila Subject: Re: [PATCH v3 0/7] User namespace mount updates Message-ID: <20151117192141.GD108807@ubuntu-hedt> References: <1447778351-118699-1-git-send-email-seth.forshee@canonical.com> <20151117170556.GV22011@ZenIV.linux.org.uk> <20151117172551.GA108807@ubuntu-hedt> <20151117175506.GW22011@ZenIV.linux.org.uk> <20151117183444.GB108807@ubuntu-hedt> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1572 Lines: 35 On Tue, Nov 17, 2015 at 08:12:31PM +0100, Richard Weinberger wrote: > On Tue, Nov 17, 2015 at 7:34 PM, Seth Forshee > wrote: > > On Tue, Nov 17, 2015 at 05:55:06PM +0000, Al Viro wrote: > >> On Tue, Nov 17, 2015 at 11:25:51AM -0600, Seth Forshee wrote: > >> > >> > Shortly after that I plan to follow with support for ext4. I've been > >> > fuzzing ext4 for a while now and it has held up well, and I'm currently > >> > working on hand-crafted attacks. Ted has commented privately (to others, > >> > not to me personally) that he will fix bugs for such attacks, though I > >> > haven't seen any public comments to that effect. > >> > >> _Static_ attacks, or change-image-under-mounted-fs attacks? > > > > Right now only static attacks, change-image-under-mounted-fs attacks > > will be next. > > Do we *really* need to enable unprivileged mounting of kernel filesystems? > What about just enabling fuse and implement ext4 and friends as fuse > filesystems? > Using the approaching Linux Kernel Libary[1] this is easy. I haven't looked at this project, but I'm guessing that programs must be written specifically to make use of it? I.e. you can't just use the mount syscall, and thus all existing software still doesn't work? > [1] https://lkml.org/lkml/2015/11/3/706 > -- > Thanks, > //richard -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/