From mboxrd@z Thu Jan 1 00:00:00 1970 From: ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman) Subject: Re: [REVIEW][PATCH 3/3] vfs: Fix a regression in mounting proc Date: Wed, 27 Nov 2013 12:07:08 -0800 Message-ID: <87wqjtlic3.fsf@xmission.com> References: <20131118031932.GA17621@mail.hallyn.com> <52899D09.5080202@cn.fujitsu.com> <20131118140830.GA22075@mail.hallyn.com> <20131118180134.GA24156@mail.hallyn.com> <87k3g5gnuv.fsf@xmission.com> <20131126181043.GA25492@mail.hallyn.com> <87siui1z1g.fsf_-_@xmission.com> <87pppmzoin.fsf_-_@xmission.com> <20131127161300.GA24773@redhat.com> <871u21oeyr.fsf@xmission.com> <20131127194722.GA32673@redhat.com> <87iovdmxl7.fsf@xmission.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <87iovdmxl7.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> (Eric W. Biederman's message of "Wed, 27 Nov 2013 11:52:20 -0800") List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: Oleg Nesterov Cc: Aditya Kali , Containers , Andy Lutomirski , linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org List-Id: containers.vger.kernel.org ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman) writes: > Oleg Nesterov writes: > >> Just to avoid the possible confusion, let me repeat that the fix itsef >> looks "obviously fine" to me, "i_nlink != 2" looks obviously wrong. >> >> I am not arguing with this patch, I am just trying to understand this >> logic. >> >> On 11/27, Eric W. Biederman wrote: >>> >>> [... snip ...] >> >> Thanks a lot. >> >>> For the real concern about jail environments where proc and sysfs are >>> not mounted at all a fs_visible check is all that is really required, >> >> this is what I can't understand... >> >> Lets ignore the implementation details. Suppose that proc was never >> mounted. Then "mount -t proc" should fail after CLONE_NEWUSER | NEWNS? > > Yes. Well strictly speaking it should fail after CLONE_NEWUSER | NEWNS | NEWPID. If proc was never mounted. Fresh mounts of proc are not allowed unless you have also created the pid namespace. With just CLONE_NEWUSER | NEWNS you are limited to bind mounts. Has this cleared up the confusion? Eric