Followup to: <83fdx$Z1w-B@khms.westfalen.de>
By author: kaih@khms.westfalen.de (Kai Henningsen)
In newsgroup: linux.dev.kernel
>
> jc@lysator.liu.se (Jorgen Cederlof) wrote on 27.06.01 in <20010627014534.B2654@ondska>:
>
> > If we only allow user chroots for processes that have never been
> > chrooted before, and if the suid/sgid bits won't have any effect under
> > the new root, it should be perfectly safe to allow any user to chroot.
>
> Hmm. Dos this work with initrd and root pivoting?
>
At the moment, yes. Once Viro gets his root-changes in, this breaks,
since ALL processes will be chrooted.
-hpa
-- <hpa@transmeta.com> at work, <hpa@zytor.com> in private! "Unix gives you enough rope to shoot yourself in the foot." http://www.zytor.com/~hpa/puzzle.txt - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Jun 30 2001 - 21:00:17 EST