Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4772561ybl; Mon, 13 Jan 2020 20:40:47 -0800 (PST) X-Google-Smtp-Source: APXvYqxnxc0ZpuZ9qWZ7wSnOuvXXyw1iIFHnoYX8nVYrfYxrEdKeOdpY7fmRU3kxxYcvNwJmbfEt X-Received: by 2002:a05:6830:2361:: with SMTP id r1mr14762238oth.88.1578976846844; Mon, 13 Jan 2020 20:40:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578976846; cv=none; d=google.com; s=arc-20160816; b=jfDMq1uvHmOlLh/QIlW1IZr7h5f5g8ImIAFALdcPNMLbzuSluiJumBjsUF/G89AYVi 4t+YfJQnHfd2RfTHNlVjvtQFMYJrdINBOIGzodDVzePLLNe/2xODU3BHxmcd8Sck4rP4 OVu6IzxU6tObWHALeNPydcIyHDbj6V8cIOWOiMo3zfD2fx+HBESrp0vfRcffohvYSopj VTLqr/qpZ0FZva5+UV3cRfOhgSF7+NoNPtm6cRZfkSd5/JYTdFS1pzbWGM8Xqac+hq3i +ouZ7eZg6+X0TRy4yQC2VNzAV9Vt0521TwZZyo+90s+0giLbzi4NT3SM9HHZU+xqiLsG QJMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=6YF5jHzibgteCStIMSIH478yM46gWuPvTmIbPkeS2jY=; b=wowjmJsx+lR6eFslXQnwNb3VgSHp0IyXjG87XXaUGBh8VzBJXRdfGviOjbo6IjJKzr 3zSDCWpKELSMhac7sK5F93lqsNaD16PrSp2+60380cHosrNXPa+Bp7W2w/CwQEKUsdtr +KE07XKhVTdVyRSJAlyUS9JXM2S7SXzWSbRR5h8cR2SVS0lupcAgwnRqVHSeEgcH54Jx sj7EaWAuUmF81l2YfQm/06KAIcjIIFwp2pKr5h9QrhBzJ2hmHvPldo7AU5AE2LZUkfzU bY2bzyPY7PCamyjaybwXVBJrIhKgpB0VQ+JO13M4N9/pDKoEfOj3BklRjaCGKquCfWsB aonw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t12si8264054otq.53.2020.01.13.20.40.34; Mon, 13 Jan 2020 20:40:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728670AbgANEji (ORCPT + 99 others); Mon, 13 Jan 2020 23:39:38 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:33226 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726121AbgANEji (ORCPT ); Mon, 13 Jan 2020 23:39:38 -0500 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1irDzA-007liS-Hx; Tue, 14 Jan 2020 04:39:24 +0000 Date: Tue, 14 Jan 2020 04:39:24 +0000 From: Al Viro To: Ian Kent Cc: Linus Torvalds , Aleksa Sarai , David Howells , Eric Biederman , stable , Christian Brauner , Serge Hallyn , dev@opencontainers.org, Linux Containers , Linux API , linux-fsdevel , Linux Kernel Mailing List Subject: Re: [PATCH RFC 0/1] mount: universally disallow mounting over symlinks Message-ID: <20200114043924.GV8904@ZenIV.linux.org.uk> References: <20200103014901.GC8904@ZenIV.linux.org.uk> <20200108031314.GE8904@ZenIV.linux.org.uk> <20200108213444.GF8904@ZenIV.linux.org.uk> <20200110041523.GK8904@ZenIV.linux.org.uk> <979cf680b0fbdce515293a3449d564690cde6a3f.camel@themaw.net> <20200112213352.GP8904@ZenIV.linux.org.uk> <800d36a0dccd43f1b61cab6332a6252ab9aab73c.camel@themaw.net> <19fa114ef619057c0d14dc1a587d0ae9ad67dc6d.camel@themaw.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <19fa114ef619057c0d14dc1a587d0ae9ad67dc6d.camel@themaw.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 14, 2020 at 08:25:19AM +0800, Ian Kent wrote: > This isn't right. > > There's actually nothing stopping a user from using a direct map > entry that's a multi-mount without an actual mount at its root. > So there could be directories created under these, it's just not > usually done. > > I'm pretty sure I don't check and disallow this. IDGI... How the hell will that work in v5? Who will set _any_ traps outside the one in root in that scenario? autofs_lookup() won't (there it's conditional upon indirect mount). Neither will autofs_dir_mkdir() (conditional upon version being less than 5). Who will, then? Confused...