Received: by 10.192.165.156 with SMTP id m28csp1217172imm; Fri, 13 Apr 2018 15:43:01 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+EGlz2VU2ut4mF4c6NDrvpjzm6zlX7oRm78hcGQxVV+xjpcM+YokNmKFt78RA8DHuMog/U X-Received: by 10.98.163.68 with SMTP id s65mr13008266pfe.13.1523659380967; Fri, 13 Apr 2018 15:43:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523659380; cv=none; d=google.com; s=arc-20160816; b=dxZhw1cMLy+DdWIXXqnX/QnmZXwAXp01auRcXv48CggRQCWVmVYBz4Y9FMIbboDQWQ YQ7ovLgSYueLX40q7jFhT7qc41uwbqpy0g4lVifHBd+8yz1WyWTj7C2EoNNhaKY5YbmE L0+Af1cGULZyPsUjjD0c4oHLioQZJ42REkLg7qgOMzprfNmCsiVcPMh9McAoHCuMpwtY lPuGTRzk55BPtjMUakFRVYWRiqSXVJIuzV8Vyd8trGyTKbt6fKbEbk+zLb8MIYpM2cIZ IPKEI8qvTwZEasZY3tmR+QZYZvKBJX6g8XSYHXnJ9S2oOh+r0yBP9BwulwBF64wSMKgZ yQsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=xAggzjj5pJOAvXrYmHJRVoSUQzzgrqM9/VVv5W2Lh7w=; b=MUpx/1x46lo6f1Y/wZ1H3Hu4DwxeVGY7WGpX9Gx1MSXmV5aw0WL+WjzEoRWnTOPW+S dFo0i5MF/jOZ7/XqLvytHgWafSKreEK0IG/tUJ48jSFiQsPqdUBydg9lEq8tjGCKwSiN oCOj8y6uhsI1PVsHZG6Y9vLQNF0BqrVvZL8TgW8ixL2N3Y0XIX6/3LYdjqpSepoITm9b DJNNNEfmezzTvajBaol23kCkFgANXxpdGl5tZEUDl7Bf2lmm5DVNS+y98nza46z/XgL1 x5tCKloQulAgG95UjZAu8rn5TQCyr7c4S7pvoYpRTudTIwhos6qe1BTMu5MRszCDTAPH S7rA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cGZw+Ih4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5-v6si6546117pls.571.2018.04.13.15.42.46; Fri, 13 Apr 2018 15:43:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cGZw+Ih4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752594AbeDMWlf (ORCPT + 99 others); Fri, 13 Apr 2018 18:41:35 -0400 Received: from mail-oi0-f66.google.com ([209.85.218.66]:43379 "EHLO mail-oi0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752137AbeDMWld (ORCPT ); Fri, 13 Apr 2018 18:41:33 -0400 Received: by mail-oi0-f66.google.com with SMTP id u84-v6so9744448oie.10; Fri, 13 Apr 2018 15:41:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=xAggzjj5pJOAvXrYmHJRVoSUQzzgrqM9/VVv5W2Lh7w=; b=cGZw+Ih4ShYdkmrh08+YS4FEuK/p/EHVac4YLiz6Rl4wp+L791GxUk1hbGBuDxG3a2 moa4YK+Z5suNr2IUUAJX5f4XLywsj1lTRQ6aVVMm/hYATI/4OlVowg7EiMbA5h9NdeNC 3eGh+rrYENyDx3iO+S9gzsDKxc2tkM6RFcAZHJn1poLL3TX+qty16fh7k8pYiYJ06e4v K+vdmj/MzElnDR1SayPScHJAGTJ2mmJ0HC7nuoqCwY6/oGIsrD3If8GGoZZVAm457yCF lld/MoPhN5zbterIVs8p/D9h3aaqqV89Cf0ExLwIu9nX/VImXvy646wE2ickocvmbMdQ f6mQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=xAggzjj5pJOAvXrYmHJRVoSUQzzgrqM9/VVv5W2Lh7w=; b=s2cmjPVQfJ6PCLQXYsDE4gEFAc9UTQz6xcwPU3PlmE0H+GRugOVUB3lPfCiDdz6x40 AGdOYzgM+bV+5faRhwtSxl+cM+pNl5dAXr5KFL79kxbXF8c0edN5uPVHlD8DM44wrNyc r4+DXRCX66H6W8TRXrr40OMQzZLQ96BeRYpCQkEvBqBulX/B0+O24GTRtHgu4uHR0+v7 U0zG1xynC2wGpFYNWN7+KW7lVQw6meMW7mU7crL+IbCJq8gNlLG2XKYZdYhuAfrehw9o bCL2NicEGzVf4WfCVZGxl4UPFf5J8PvhRpBUYM6J5Hck46i5W/ur0qfhDGe1M87d8icw 9HgQ== X-Gm-Message-State: ALQs6tDFnYvGn385LHL11ZoZP4WC0Oo9NTsLSqK0rNyj4fKhqeWrEoj2 h2dIgBbxxSgjLqtziePwpoemhojkdCNQ+gEuP34= X-Received: by 2002:aca:b5c2:: with SMTP id e185-v6mr9058073oif.166.1523659292508; Fri, 13 Apr 2018 15:41:32 -0700 (PDT) MIME-Version: 1.0 Received: by 10.201.113.9 with HTTP; Fri, 13 Apr 2018 15:41:31 -0700 (PDT) In-Reply-To: <87tvsrjai0.fsf@xmission.com> References: <20180404115311.725-1-alban@kinvolk.io> <87tvsrjai0.fsf@xmission.com> From: Djalal Harouni Date: Sat, 14 Apr 2018 00:41:31 +0200 Message-ID: Subject: Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible To: "Eric W. Biederman" , Andy Lutomirski , Alexey Gladkov Cc: Alban Crequy , Alban Crequy , Dongsu Park , Iago Lopez Galeiras , Stephen J Day , Michael Crosby , Jess Frazelle , Akihiro Suda , Aleksa Sarai , Daniel J Walsh , Alexander Viro , linux-kernel , Linux FS Devel , Linux Containers Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 4, 2018 at 4:45 PM, Eric W. Biederman wrote: [...] > > The only option I have seen proposed that might qualify as something > general purpose and simple is a new filesystem that is just the process > directories of proc. As there would in essence be no files that would > need restrictions it would be safe to allow anyone to mount without > restriction. > Eric, there is a series for this: https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1533642.html patch on top for pids: https://github.com/legionus/linux/commit/993a2a5b9af95b0ac901ff41d32124b72ed676e3 it was reviewed, and suggestions were integrated from Andy and Al Viro feedback, thanks. It works on Debian, Ubuntu and others, not on Fedora due to bug with dracut+systemd. I do not have time to work on it now, anyone can just pick them. Thanks! -- tixxdz