[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEiveUf5LWpvA-QMm3eYr9yFgUjwyQdkk-WVptze9m_EfbGMwg@mail.gmail.com>
Date: Sat, 14 Apr 2018 00:41:31 +0200
From: Djalal Harouni <tixxdz@...il.com>
To: "Eric W. Biederman" <ebiederm@...ssion.com>,
Andy Lutomirski <luto@...nel.org>,
Alexey Gladkov <gladkov.alexey@...il.com>
Cc: Alban Crequy <alban.crequy@...il.com>,
Alban Crequy <alban@...volk.io>,
Dongsu Park <dongsu@...volk.io>,
Iago Lopez Galeiras <iago@...volk.io>,
Stephen J Day <stephen.day@...ker.com>,
Michael Crosby <crosbymichael@...il.com>,
Jess Frazelle <acidburn@...rosoft.com>,
Akihiro Suda <suda.akihiro@....ntt.co.jp>,
Aleksa Sarai <asarai@...e.de>,
Daniel J Walsh <dwalsh@...hat.com>,
Alexander Viro <viro@...iv.linux.org.uk>,
linux-kernel <linux-kernel@...r.kernel.org>,
Linux FS Devel <linux-fsdevel@...r.kernel.org>,
Linux Containers <containers@...ts.linux-foundation.org>
Subject: Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc
mounts when not fully visible
On Wed, Apr 4, 2018 at 4:45 PM, Eric W. Biederman <ebiederm@...ssion.com> wrote:
[...]
>
> The only option I have seen proposed that might qualify as something
> general purpose and simple is a new filesystem that is just the process
> directories of proc. As there would in essence be no files that would
> need restrictions it would be safe to allow anyone to mount without
> restriction.
>
Eric, there is a series for this:
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1533642.html
patch on top for pids:
https://github.com/legionus/linux/commit/993a2a5b9af95b0ac901ff41d32124b72ed676e3
it was reviewed, and suggestions were integrated from Andy and Al Viro
feedback, thanks. It works on Debian, Ubuntu and others, not on Fedora
due to bug with dracut+systemd.
I do not have time to work on it now, anyone can just pick them.
Thanks!
--
tixxdz
Powered by blists - more mailing lists