Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1761122AbYB2RnK (ORCPT ); Fri, 29 Feb 2008 12:43:10 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755436AbYB2Rmx (ORCPT ); Fri, 29 Feb 2008 12:42:53 -0500 Received: from e32.co.us.ibm.com ([32.97.110.150]:57283 "EHLO e32.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753515AbYB2Rmv (ORCPT ); Fri, 29 Feb 2008 12:42:51 -0500 Date: Fri, 29 Feb 2008 11:42:05 -0600 From: "Serge E. Hallyn" To: Pavel Emelyanov Cc: "Serge E. Hallyn" , Ian Kent , Jeff Moyer , Andrew Morton , Kernel Mailing List , autofs mailing list , linux-fsdevel , "Eric W. Biederman" Subject: Re: [PATCH 3/4] autofs4 - track uid and gid of last mount requestor Message-ID: <20080229174205.GB24296@sergelap.ibm.com> References: <1204179747.3501.21.camel@raven.themaw.net> <20080227223734.caab0165.akpm@linux-foundation.org> <1204182500.3501.49.camel@raven.themaw.net> <20080227232339.af6e904a.akpm@linux-foundation.org> <1204185623.3501.84.camel@raven.themaw.net> <20080228195118.GA16634@sergelap.austin.ibm.com> <1204255932.3969.86.camel@raven.themaw.net> <20080229160921.GA24296@sergelap.ibm.com> <47C830B9.20505@openvz.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <47C830B9.20505@openvz.org> User-Agent: Mutt/1.5.16 (2007-06-09) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1660 Lines: 39 Quoting Pavel Emelyanov (xemul@openvz.org): > > The way the user namespaces work right now is similar to say the IPC > > namespace - a task belongs to one user, that user belongs to precisely > > one user namespace. > > > > Even in my additional userns patches, I was changing uid to store the > > (uid, userns) so a struct user still belonged to just one user > > namespace. > > > > In contrast, with pid namespaces a task is associated with a 'struct > > pid' which links it to multiple process ids, one in each pid namespace > > to which it belongs. > > > > Perhaps we should be treating user namespaces like pid namespaces? > > I'm afraid, that I'm just starting a new thread of discussion in a > wrong place, but I can't refrain from asking "what for?" For the reasons I listed there :) > > So if I'm user 500 in what I think is the initial user namespace, I can > > create a container with a new user namespace, the init task of which is > > both uid 0 in the child userns, and uid 500 in the higher level, > > automatically giving the container access to any files I own. > > So do you mean that I can become a root, by calling clone()? You can become root in the new container. Your capabilities are meaningful only to targets (users, files) which exist in the user namespace in which you are root. It becomes more precise than the CAP_NS_OVERRIDE approach in my last patchset. > Thanks, > Pavel -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/