> +char *d_namespace_path(struct dentry *dentry, struct vfsmount *vfsmnt, > + char *buf, int buflen) > +{ > + char *res; > + struct vfsmount *rootmnt, *nsrootmnt; > + struct dentry *root; > + > + read_lock(¤t->fs->lock); > + rootmnt = mntget(current->fs->rootmnt); > + read_unlock(¤t->fs->lock); > + spin_lock(&vfsmount_lock); > + nsrootmnt = mntget(rootmnt->mnt_ns->root);
... and when somebody does umount -l on your chroot jail, you get NULL ->mnt_ns. Oops... - To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html