ebiederm@xxxxxxxxxxxx (Eric W. Biederman) writes: > Oleg Nesterov <oleg@xxxxxxxxxx> writes: > >> Just to avoid the possible confusion, let me repeat that the fix itsef >> looks "obviously fine" to me, "i_nlink != 2" looks obviously wrong. >> >> I am not arguing with this patch, I am just trying to understand this >> logic. >> >> On 11/27, Eric W. Biederman wrote: >>> >>> [... snip ...] >> >> Thanks a lot. >> >>> For the real concern about jail environments where proc and sysfs are >>> not mounted at all a fs_visible check is all that is really required, >> >> this is what I can't understand... >> >> Lets ignore the implementation details. Suppose that proc was never >> mounted. Then "mount -t proc" should fail after CLONE_NEWUSER | NEWNS? > > Yes. Well strictly speaking it should fail after CLONE_NEWUSER | NEWNS | NEWPID. If proc was never mounted. Fresh mounts of proc are not allowed unless you have also created the pid namespace. With just CLONE_NEWUSER | NEWNS you are limited to bind mounts. Has this cleared up the confusion? Eric _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers