> > I see no other reason for wanting to prevent binds from detached
> > mounts or other namespaces. It has been discussed that it would be a
> > good _controlled_ way to send/receive mounts from other namespace
> > without adding any complexity.
>
> AFAICT, the ability to bind across namespaces defeats the private-ness
> property of per-process-namespaces.
No. The privateness is guaranteed by proc_check_root(), which is
similar, but not the same as check_mnt(), and wich restrict _access_
to other namespaces.
check_mnt() restricts operations on other namespaces if you _already_
have access to said namespace. For example via a file descriptor sent
between two processes in different namespaces.
Also with ptrace() you can still access other process's namespace, so
proc_check_root() is also too strict (or ptrace() too lax).
Miklos
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]