From mboxrd@z Thu Jan 1 00:00:00 1970 From: ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman) Subject: Re: [REVIEW][PATCH 1/2] userns: Better restrictions on when proc and sysfs can be mounted Date: Tue, 27 Aug 2013 14:57:05 -0700 Message-ID: <87a9k2g5la.fsf@xmission.com> References: <878uzmhkqg.fsf@xmission.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: Linux FS Devel , Linux Containers , "linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" To: Andy Lutomirski Return-path: In-Reply-To: (Andy Lutomirski's message of "Tue, 27 Aug 2013 14:47:07 -0700") List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: containers-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org List-Id: linux-fsdevel.vger.kernel.org Andy Lutomirski writes: > On Tue, Aug 27, 2013 at 2:44 PM, Eric W. Biederman > wrote: >> >> Rely on the fact that another flavor of the filesystem is already >> mounted and do not rely on state in the user namespace. > > Possibly dumb question: does this check whether the pre-existing mount > has hidepid set? Not currently. It may be worth doing something with respect to hidepid. I forget what hidepid tries to do, and I need to dash. But feel free to cook up a follow on patch. My goal is simply to reduce the hack level and increase the readability and maintainability of the code. Eric