[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070416110308.739051445@szeredi.hu>
Date: Mon, 16 Apr 2007 13:03:08 +0200
From: Miklos Szeredi <miklos@...redi.hu>
To: akpm@...ux-foundation.org, serue@...ibm.com, viro@....linux.org.uk,
linuxram@...ibm.com, ebiederm@...ssion.com
Cc: linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
containers@...ts.osdl.org
Subject: [patch 00/10] mount ownership and unprivileged mount syscall (v3)
This patchset adds support for keeping mount ownership information in
the kernel, and allow unprivileged mount(2) and umount(2) in certain
cases.
This can be useful for the following reasons:
- mount(8) can store ownership ("user=XY" option) in the kernel
instead, or in addition to storing it in /etc/mtab. For example if
private namespaces are used with mount propagations /etc/mtab
becomes unworkable, but using /proc/mounts works fine
- fuse won't need a special suid-root mount/umount utility. Plain
umount(8) can easily be made to work with unprivileged fuse mounts
- users can use bind mounts without having to pre-configure them in
/etc/fstab
The following security measures are taken for unprivileged mounts:
- only allow submounting under mounts which have a special mount flag set
- only allow mounting on files/directories writable by the user
- limit the number of user mounts
- force "nosuid,nodev" mount options
Changes from the previous submissions:
- add mount flags to set/clear mnt_flags individually
- add "usermnt" mount flag. If it is set, then allow unprivileged
submounts under this mount
- make max number of user mounts default to 1024, since now the
usermnt flag will prevent user mounts by default
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists