On Sun, Mar 11, 2018 at 10:30:58PM +0100, Pavel Machek wrote:
> On Sat 2018-03-10 03:12:23, Alexey Dobriyan wrote:
> > Various subsystems can create files and directories in /proc
> > with names directly controlled by userspace.
> > Which means "/", "." and ".." are no-no.
> > "/" split is already taken care of, do the other 2 prohibited names.
> Hmm, patch is probably good idea, but now it means that userspace can
> trigger WARN()s, and can hide objects from root by naming them '.' and
> '..'... which is not good.
Patch rejects creation of such entries.
And they should be harmless as VFS lookup won't find them, only readdir
would. It not clear how they could be useful.