From mboxrd@z Thu Jan 1 00:00:00 1970 From: Richard Weinberger Subject: Re: [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting Date: Sat, 23 Dec 2017 13:56:51 +0100 Message-ID: <65834980.AClogkzgvk__49763.2456747398$1514034115$gmane$org@blindfold> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: Dongsu Park Cc: Miklos Szeredi , Linux Containers , LKML , Seth Forshee , Alban Crequy , "Eric W . Biederman" , Sargun Dhillon , "linux-mtd-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org" List-Id: containers.vger.kernel.org Dongsu, Am Samstag, 23. Dezember 2017, 13:18:30 CET schrieb Dongsu Park: > Hi, > > On Fri, Dec 22, 2017 at 10:06 PM, Richard Weinberger > > wrote: > > Dongsu, > > > > On Fri, Dec 22, 2017 at 3:32 PM, Dongsu Park wrote: > >> From: Seth Forshee > >> > >> Unprivileged users should not be able to mount mtd block devices > >> when they lack sufficient privileges towards the block device > >> inode. Update mount_mtd() to validate that the user has the > >> required access to the inode at the specified path. The check > >> will be skipped for CAP_SYS_ADMIN, so privileged mounts will > >> continue working as before. > > > > What is the big picture of this? > > Can in future an unprivileged user just mount UBIFS? > > I'm not sure I'm aware of all use cases w.r.t mtd & ubifs. > To my understanding, in these days many container runtimes allow > unprivileged users to run containers. (docker, lxc, runc, bubblewrap, etc) > That's why the kernel should deal with additional permission checks > that might have not been necessary in the past. > This MTD patch is one of those special cases. My fear is that a corner case is forgotten and all of a sudden someone can do funky things with MTD in a container... Thanks, //richard