Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id E1AB5C433EF for ; Sat, 20 Nov 2021 00:07:50 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236424AbhKTAKw (ORCPT ); Fri, 19 Nov 2021 19:10:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:39672 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236230AbhKTAKu (ORCPT ); Fri, 19 Nov 2021 19:10:50 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 24A0E61ACE; Sat, 20 Nov 2021 00:07:47 +0000 (UTC) Date: Fri, 19 Nov 2021 19:07:45 -0500 From: Steven Rostedt To: James Bottomley Cc: Yordan Karadzhov , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, viro@zeniv.linux.org.uk, mingo@redhat.com, hagen@jauu.net, rppt@kernel.org, akpm@linux-foundation.org, vvs@virtuozzo.com, shakeelb@google.com, christian.brauner@ubuntu.com, mkoutny@suse.com, Linux Containers , "Eric W. Biederman" Subject: Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept Message-ID: <20211119190745.3b706c4b@gandalf.local.home> In-Reply-To: References: <20211118181210.281359-1-y.karadz@gmail.com> <87a6i1xpis.fsf@email.froward.int.ebiederm.org> <20211118142440.31da20b3@gandalf.local.home> <1349346e1d5daca991724603d1495ec311cac058.camel@HansenPartnership.com> <20211119092758.1012073e@gandalf.local.home> <47bf8da26b5ec71f98b9bc736dbca2d8277417f2.camel@HansenPartnership.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 19 Nov 2021 18:22:55 -0500 James Bottomley wrote: > But I could write a script or a tool to gather all the information > without this filesystem. The namespace tree can be reconstructed by > anything that can view the process tree and the /proc//ns > directory. So basically you're stating that we could build the same thing that the namespacefs would give us from inside a privileged container that had access to the system procfs? -- Steve