OpenVZ Forum


Home » Mailing lists » Devel » [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property [message #26396 is a reply to message #26339] Tue, 22 January 2008 20:48 Go to previous messageGo to previous message
serue is currently offline  serue
Messages: 750
Registered: February 2006
Senior Member
Quoting Miklos Szeredi (miklos@szeredi.hu):
> > What do you think about doing this only if FS_SAFE is also set,
> > so for instance at first only FUSE would allow itself to be
> > made user-mountable?
> > 
> > A safe thing to do, or overly intrusive?
> 
> It goes somewhat against the "no policy in kernel" policy ;).  I think
> the warning in the documentation should be enough to make sysadmins
> think twice before doing anything foolish:

Warning in which documentation?  A sysadmin considering setting fs_safe
for ext2 or xfs isn't going to be looking at fuse docs, which I think is
what you're talking about.  Are you going to add a file under
Documentation/filesystems?

> > +Care should be taken when enabling this, since most
> > +filesystems haven't been designed with unprivileged mounting
> > +in mind.
> > +
> 
> BTW, filesystems like 'proc' and 'sysfs' should also be safe, although
> the only use for them being marked safe is if the users are allowed to
> umount them from their private namespace (otherwise a 'mount --bind'
> has the same effect as a new mount).
> 
> Thanks,
> Miklos
_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: [PATCH 5/5] netns netfilter: per-netns FILTER, MANGLE, RAW
Next Topic: [PATCH 0/12 net-2.6.25] [NETNS]: Routing namespacing on IP output path.
Goto Forum:
  


Current Time: Wed Jul 17 03:24:49 GMT 2024

Total time taken to generate the page: 0.04100 seconds