> I think you need to disallow overmounts on invisible mounts by any user > other than the owner. If not, some other user (including root) can > overmount on your mount and the user will end up with DoS. I'm not following you here. How would an overmount cause DoS? Thanks, Miklos - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- Follow-Ups:
- Re: [PATCH] private mounts
- From: Ram <[email protected]>
- Re: [PATCH] private mounts
- References:
- Re: [PATCH] private mounts
- From: Christoph Hellwig <[email protected]>
- Re: [PATCH] private mounts
- From: Pavel Machek <[email protected]>
- Re: [PATCH] private mounts
- From: Miklos Szeredi <[email protected]>
- Re: [PATCH] private mounts
- From: Pavel Machek <[email protected]>
- Re: [PATCH] private mounts
- From: Miklos Szeredi <[email protected]>
- Re: [PATCH] private mounts
- From: Pavel Machek <[email protected]>
- Re: [PATCH] private mounts
- From: Miklos Szeredi <[email protected]>
- Re: [PATCH] private mounts
- From: Miklos Szeredi <[email protected]>
- Re: [PATCH] private mounts
- From: Martin Mares <[email protected]>
- Re: [PATCH] private mounts
- From: Lars Marowsky-Bree <[email protected]>
- Re: [PATCH] private mounts
- From: Miklos Szeredi <[email protected]>
- Re: [PATCH] private mounts
- From: Ram <[email protected]>
- Re: [PATCH] private mounts
- Prev by Date: Re: any way to find out kernel memory usage?
- Next by Date: Re: [01/07] uml: add nfsd syscall when nfsd is modular
- Previous by thread: Re: [PATCH] private mounts
- Next by thread: Re: [PATCH] private mounts
- Index(es):