Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261863AbVD0RtA (ORCPT ); Wed, 27 Apr 2005 13:49:00 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261841AbVD0Rs4 (ORCPT ); Wed, 27 Apr 2005 13:48:56 -0400 Received: from rev.193.226.232.93.euroweb.hu ([193.226.232.93]:28837 "EHLO dorka.pomaz.szeredi.hu") by vger.kernel.org with ESMTP id S261857AbVD0Rr5 (ORCPT ); Wed, 27 Apr 2005 13:47:57 -0400 To: linuxram@us.ibm.com CC: lmb@suse.de, mj@ucw.cz, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org In-reply-to: <1114623598.4480.181.camel@localhost> (message from Ram on Wed, 27 Apr 2005 10:39:59 -0700) Subject: Re: [PATCH] private mounts References: <20050426094727.GA30379@infradead.org> <20050426131943.GC2226@openzaurus.ucw.cz> <20050426201411.GA20109@elf.ucw.cz> <20050427092450.GB1819@elf.ucw.cz> <20050427143126.GB1957@mail.shareable.org> <20050427153320.GA19065@atrey.karlin.mff.cuni.cz> <20050427155022.GR4431@marowsky-bree.de> <1114623598.4480.181.camel@localhost> Message-Id: From: Miklos Szeredi Date: Wed, 27 Apr 2005 19:47:46 +0200 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 528 Lines: 13 > I think you need to disallow overmounts on invisible mounts by any user > other than the owner. If not, some other user (including root) can > overmount on your mount and the user will end up with DoS. I'm not following you here. How would an overmount cause DoS? Thanks, Miklos - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/