public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* overlayfs mounts in user namespaces
@ 2014-02-10 19:51 Serge E. Hallyn
  2014-02-10 21:39 ` Eric W. Biederman
  0 siblings, 1 reply; 2+ messages in thread
From: Serge E. Hallyn @ 2014-02-10 19:51 UTC (permalink / raw)
  To: Eric W. Biederman, lkml, stgraber, apw

Hi Eric,

most filesystems cannot be mounted in a non-init user namespace because we
don't trust the superblock parsers to DTRT when handed garbage.  I was
wondering if you had any ideas on ways that allowing root in a non-init userns
to mount an overlayfs fs would be dangerous?  There's no superblock parsing in
that case at all;  writes end up being allowed if and only if the userid owning
the 'upper' (writeable) layer is mapped into the userns.  Near as I can tell
it should be quite safe.  But my imagination isn't the most active.

I assume there would be concerns about memory usage if the system is not
configured to place all logged-in users into configured cgroups?  Is there
anything else you can think of that could be abused?

(I realize overlayfs isn't upstream yet so the question may not be all that
interesting to most people...)

thanks,
-serge

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2014-02-10 21:39 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-02-10 19:51 overlayfs mounts in user namespaces Serge E. Hallyn
2014-02-10 21:39 ` Eric W. Biederman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox