lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 1 Dec 2020 11:18:06 +0100 From: Christian Brauner <christian.brauner@...ntu.com> To: "Serge E. Hallyn" <serge@...lyn.com> Cc: Alexander Viro <viro@...iv.linux.org.uk>, Christoph Hellwig <hch@...radead.org>, linux-fsdevel@...r.kernel.org, John Johansen <john.johansen@...onical.com>, James Morris <jmorris@...ei.org>, Mimi Zohar <zohar@...ux.ibm.com>, Dmitry Kasatkin <dmitry.kasatkin@...il.com>, Stephen Smalley <stephen.smalley.work@...il.com>, Casey Schaufler <casey@...aufler-ca.com>, Arnd Bergmann <arnd@...db.de>, Andreas Dilger <adilger.kernel@...ger.ca>, OGAWA Hirofumi <hirofumi@...l.parknet.co.jp>, Geoffrey Thomas <geofft@...reload.com>, Mrunal Patel <mpatel@...hat.com>, Josh Triplett <josh@...htriplett.org>, Andy Lutomirski <luto@...nel.org>, Theodore Tso <tytso@....edu>, Alban Crequy <alban@...volk.io>, Tycho Andersen <tycho@...ho.ws>, David Howells <dhowells@...hat.com>, James Bottomley <James.Bottomley@...senpartnership.com>, Seth Forshee <seth.forshee@...onical.com>, Stéphane Graber <stgraber@...ntu.com>, Aleksa Sarai <cyphar@...har.com>, Lennart Poettering <lennart@...ttering.net>, "Eric W. Biederman" <ebiederm@...ssion.com>, smbarber@...omium.org, Phil Estes <estesp@...il.com>, Kees Cook <keescook@...omium.org>, Todd Kjos <tkjos@...gle.com>, Paul Moore <paul@...l-moore.com>, Jonathan Corbet <corbet@....net>, containers@...ts.linux-foundation.org, fstests@...r.kernel.org, linux-security-module@...r.kernel.org, linux-api@...r.kernel.org, linux-ext4@...r.kernel.org, linux-integrity@...r.kernel.org, selinux@...r.kernel.org Subject: Re: [PATCH v3 00/38] idmapped mounts On Sat, Nov 28, 2020 at 04:54:50PM -0600, Serge Hallyn wrote: > On Sat, Nov 28, 2020 at 10:34:49PM +0100, Christian Brauner wrote: > > Hey everyone, > > Hey Christian, > > a general request. Argue with me if it seems misguided. > > When looking at a patch or a small hunk of code, these days, if a variable > called 'ns' or 'user_ns' is seen passed to a function, it can be easy to > assume which user_ns it is based on what you think would make sense, but if > your assumption is wrong, your patch review will be wrong. > > Can we stick to a convention where we have maybe > > subj_userns - the userns of the task seeking some action > obj_userns - the userns of the thing being acted on - task, superblock,... > mnt_userns - the userns of a mountpoint through which an object is seen > > You're replacing a lot of such callers and callsites in this patchset, so > this would be a great time to start doing that. Hey Serge, this makes a lot of sense. I'll convert all accesses to the vfsmount's userns we're introducing in this series to to mnt_userns at least. Christian
Powered by blists - more mailing lists