Re: [RCF] [PATCH] unprivileged mount/umount

From: Miklos Szeredi
Date: Wed May 11 2005 - 15:33:36 EST


> What if proc filesystem is removed from the kernel?
>
> Ability to access some other namespace through the proc filesystem does
> not look clean. I think it should be cleanly supported through VFS.
>
> Also cd'ing into a new namespace just allows you to browse through
> the other namespace. But it does not effectively change the process's
> namespace. Things like mount in the other namespace will be failed
> by check_mount() anyway.
>
> I think, we need sys calls like sys_cdnamespace() which switches to a
> new namespace.

Jamie's proposal was to make chroot() swich namespace.

> Effectively the process's current->namespace has to be modified,
> for the process to be effectively work in the new namespace.

current->namespace could be dropped altogether, and
current->current->fs->rootmnt->mnt_namespace could be used instead.

It's a nice logical extension of chroot(), without needing new
syscalls.

Miklos
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/