On Mon, 2009-10-26 at 18:46 +0100, Jan Kara wrote: > That's what I'd think as well but it does not as I've just learned and > tested :) proc_pid_follow_link actually directly gives a dentry of the > target file without checking permissions on the way. > > Honza I seem to remember that is deliberate, the point being that a symlink in /proc/*/fd/ may contain a path that refers to a private namespace. Cheers Trond -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html