From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andi Kleen Subject: Re: [RFC] fs, proc: Introduce the /proc//map_files/ directory v2 Date: Wed, 24 Aug 2011 10:36:58 -0700 Message-ID: References: <20110824085329.GL29452@sun> <4E551331.1010709@acm.org> <4E551693.5030400@parallels.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Zan Lynx , Cyrill Gorcunov , Nathan Lynch , Oren Laadan , Daniel Lezcano , Tejun Heo , Andrew Morton , Glauber Costa , "containers\@lists.osdl.org" , "linux-kernel\@vger.kernel.org" , Serge Hallyn , LINUXFS-ML , James Bottomley To: Pavel Emelyanov Return-path: In-Reply-To: <4E551693.5030400@parallels.com> (Pavel Emelyanov's message of "Wed, 24 Aug 2011 19:19:47 +0400") Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org Pavel Emelyanov writes: > > No and this is the trick - when you readlink it - it give you trash, but > when you open one - you get exactly the same file as the map points to. Isn't that a minor security hole? For example if I pass a file descriptor into a chroot process for reading, and with this interface you can open it for writing too. I could see this causing problems. -Andi -- ak@linux.intel.com -- Speaking for myself only