Re: [PATCH 11/11][v15]: Document sys_eclone

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Albert Cahalan (acahalan@xxxxxxxxx):
> On Mon, Jul 5, 2010 at 12:18 AM, Oren Laadan <orenl@xxxxxxxxxxxxxxx> wrote:
> > Finally, there have been objections before to allow pid-selection
> > by non-privileged process.
> 
> Eh, I dearly hope that privileged processes are generally not
> even addressable (never mind creatable or accessable) from
> inside anything other than the top-level pid namespace.

If a privileged task was created in the top-level pid namespace,
then it is not addressable from inside a descendent pid namespace.

> Well, at least nothing should get more privilege than PID 1.
> This would include having UID values that PID 1 can switch
> to and having capability sets that PID 1 can switch to, and
> any other (SE Linux, AppArmor, etc.) things too.

IIUC the spirit of what you say here is what is intended by
the completion of the user namespaces.  They'll ensure that
things like setuid-root and file capabilities limit privilege
to resources owned by the task which created the namespace.

That's why unprivileged pid ns unsharing won't be considered
until user namespaces are completed.

> Restarting a privileged process with a less privileged PID 1
> should result in privilege loss, and ought to require some sort of
> "--force" option to ensure the person accepts possible breakage.

Interesting point.  Do we allow ptrace of a container init?

-serge
_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linux-foundation.org/mailman/listinfo/containers


[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux