On Thu, Aug 25, 2011 at 10:42:44AM +0400, Pavel Emelyanov wrote: > On 08/24/2011 09:36 PM, Andi Kleen wrote: > > Pavel Emelyanov <xemul@xxxxxxxxxxxxx> writes: > >> > >> No and this is the trick - when you readlink it - it give you trash, but > >> when you open one - you get exactly the same file as the map points to. > > > > Isn't that a minor security hole? > > > > For example if I pass a file descriptor into a chroot process for > > reading, and with this interface you can open it for writing too. > > I could see this causing problems. > > How does it differ from the /proc/pid/fd links? Those cannot be opened I thought. -Andi -- ak@xxxxxxxxxxxxxxx -- Speaking for myself only. -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html