Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1403467pxf; Fri, 12 Mar 2021 08:44:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJwg1umKZc+bTmdgVvzho9IpI3u7f5ctVjSHpksPV2B8HXdiX8GwGqm3uX21/ghojFoclYqZ X-Received: by 2002:aa7:d492:: with SMTP id b18mr15096763edr.381.1615567464645; Fri, 12 Mar 2021 08:44:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615567464; cv=none; d=google.com; s=arc-20160816; b=KR8u/ZT3dMZX9jzObk8uh3WohZWAYmoRM/3BXnoEI/A5ku+ELtbaFjhS9btIjPppzg 2c2Z3b7aR6cR2iLttSIpToeWt4D43GSvcFMWkSQbXC0j+oU8XmY/qvsYozvvgSJAD3Xl ouIPsbQK69PCuK30ue301kbdfx492TkBUwCQ3udMwuyM2psZe+bWU+FVu4APn861vvy5 SlglsJOg0alHmWUYybSg/nNlNQLAoR9g3EI5n05RRXgkHhyTU85ZUbBaDypL3ppH/fWa feV3JnVbi1lBXkK2PdQg9goTEAlfcEHdaGfNjf3piWloGATe3/yYFPDOMXM/Ya/bhi0R BG3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=0hQhJLD0BGyP+GzbmdPHOTbKO++MLAdpN0tXfzQNSLY=; b=iLT+gyVXT2+BsBwYU/EaaQlClsuklWwUPk6PQb4Zjv2oOogiyKgVRpH4xt3DTbGicV 3lUmQMZptCpteYciVJKyjJu5bWWdAp/QWTNTCAcPFJc5FVzne882/S23iXf3F4zUv5V7 /2tQvw68FOfUUCglV2M0b0yUxDnxifASLyJXx++lTT64ptZxUzDF+Zz0d+0+78mz13y/ 2NYTNdWc+L90O1/MX9CPd6yyQmky6XnTWki+xAdzUpDXsGPBLy8A2YVzhA5LtfzOcQUK Y/A3b46PdZftV/FEHAZJofv1cyi+9/L1w6MQDUqX7riL6eqj5tu252+/hqHvpXxYRNJ6 MH1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m2si4637263ejb.357.2021.03.12.08.44.02; Fri, 12 Mar 2021 08:44:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233072AbhCLQmr (ORCPT + 99 others); Fri, 12 Mar 2021 11:42:47 -0500 Received: from raptor.unsafe.ru ([5.9.43.93]:49778 "EHLO raptor.unsafe.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232942AbhCLQmE (ORCPT ); Fri, 12 Mar 2021 11:42:04 -0500 Received: from comp-core-i7-2640m-0182e6.redhat.com (ip-94-113-225-162.net.upcbroadband.cz [94.113.225.162]) by raptor.unsafe.ru (Postfix) with ESMTPSA id D512740C9A; Fri, 12 Mar 2021 16:42:01 +0000 (UTC) From: Alexey Gladkov To: LKML , "Eric W . Biederman" Cc: Alexey Gladkov , Alexander Viro , Kees Cook , Linux Containers , Linux FS Devel Subject: [PATCH v6 1/5] docs: proc: add documentation about mount restrictions Date: Fri, 12 Mar 2021 17:41:44 +0100 Message-Id: X-Mailer: git-send-email 2.29.3 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.4 (raptor.unsafe.ru [0.0.0.0]); Fri, 12 Mar 2021 16:42:02 +0000 (UTC) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Signed-off-by: Alexey Gladkov --- Documentation/filesystems/proc.rst | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/Documentation/filesystems/proc.rst b/Documentation/filesystems/proc.rst index 2fa69f710e2a..5a1bb0e081fd 100644 --- a/Documentation/filesystems/proc.rst +++ b/Documentation/filesystems/proc.rst @@ -50,6 +50,7 @@ fixes/update part 1.1 Stefani Seibold June 9 2009 4 Configuring procfs 4.1 Mount options + 4.2 Mount restrictions 5 Filesystem behavior @@ -2175,6 +2176,19 @@ information about processes information, just add identd to this group. subset=pid hides all top level files and directories in the procfs that are not related to tasks. +4.2 Mount restrictions +-------------------------- + +If user namespaces are in use, the kernel additionally checks the instances of +procfs available to the mounter and will not allow procfs to be mounted if: + + 1. This mount is not fully visible. + + a. It's root directory is not the root directory of the filesystem. + b. If any file or non-empty procfs directory is hidden by another mount. + + 2. A new mount overrides the readonly option or any option from atime familty. + Chapter 5: Filesystem behavior ============================== -- 2.29.3