> +char *d_namespace_path(struct dentry *dentry, struct vfsmount *vfsmnt,
> +                    char *buf, int buflen)
> +{
> +     char *res;
> +     struct vfsmount *rootmnt, *nsrootmnt;
> +     struct dentry *root;
> +
> +     read_lock(&current->fs->lock);
> +     rootmnt = mntget(current->fs->rootmnt);
> +     read_unlock(&current->fs->lock);
> +     spin_lock(&vfsmount_lock);
> +     nsrootmnt = mntget(rootmnt->mnt_ns->root);

... and when somebody does umount -l on your chroot jail, you get
NULL ->mnt_ns.  Oops...
-
To unsubscribe from this list: send the line "unsubscribe 
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to