[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87zhxtg02z.fsf@xmission.com>
Date: Fri, 10 Aug 2018 20:32:04 -0500
From: ebiederm@...ssion.com (Eric W. Biederman)
To: "Darrick J. Wong" <darrick.wong@...cle.com>
Cc: "Theodore Y. Ts'o" <tytso@....edu>,
Andy Lutomirski <luto@...nel.org>,
David Howells <dhowells@...hat.com>,
Al Viro <viro@...iv.linux.org.uk>,
John Johansen <john.johansen@...onical.com>,
Tejun Heo <tj@...nel.org>, SELinux-NSA <selinux@...ho.nsa.gov>,
Paul Moore <paul@...l-moore.com>,
Li Zefan <lizefan@...wei.com>,
Linux API <linux-api@...r.kernel.org>,
apparmor@...ts.ubuntu.com,
Casey Schaufler <casey@...aufler-ca.com>,
Fenghua Yu <fenghua.yu@...el.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Eric Biggers <ebiggers@...gle.com>,
LSM List <linux-security-module@...r.kernel.org>,
Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>,
Johannes Weiner <hannes@...xchg.org>,
Stephen Smalley <sds@...ho.nsa.gov>,
tomoyo-dev-en@...ts.sourceforge.jp,
"open list\:CONTROL GROUP \(CGROUP\)" <cgroups@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Linux FS Devel <linux-fsdevel@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
Miklos Szeredi <miklos@...redi.hu>
Subject: Re: BUG: Mount ignores mount options
"Darrick J. Wong" <darrick.wong@...cle.com> writes:
> On Fri, Aug 10, 2018 at 07:54:47PM -0400, Theodore Y. Ts'o wrote:
>> The reason why I bring this up here is that in container land, there
>> are those who believe that "container root" should be able to mount
>> file systems, and if the "container root" isn't trusted, the fact that
>> the "container root" can crash the host kernel, or worse, corrupt the
>> host kernel and break out of the container as a result, that would be
>> sad.
>>
>> I was pretty sure most file system developers are on the same page
>> that allowing untrusted "container roots" the ability to mount
>> arbitrary block device file systems is insanity.
>
> Agreed.
For me I am happy with fuse. That is sufficient to cover any container
use cases people have. If anyone comes bugging you for more I will be
happy to push back.
The only thing that containers have to do with this is I wind up
touching a lot of the kernel/user boundary so I get to see a lot of it
and sometimes see weird things.
Eric
Powered by blists - more mailing lists