On 2019-10-12, Aleksa Sarai wrote:
> On 2019-10-10, Linus Torvalds wrote:
> > On Wed, Oct 9, 2019 at 10:42 PM Aleksa Sarai wrote:
> > >
> > > --- a/fs/namei.c
> > > +++ b/fs/namei.c
> > > @@ -2277,6 +2277,11 @@ static const char *path_init(struct nameidata *nd,
> > > unsigned flags)
> > >
> >
On 2019-10-10, Linus Torvalds wrote:
> On Wed, Oct 9, 2019 at 10:42 PM Aleksa Sarai wrote:
> >
> > --- a/fs/namei.c
> > +++ b/fs/namei.c
> > @@ -2277,6 +2277,11 @@ static const char *path_init(struct nameidata *nd,
> > unsigned flags)
> >
> > nd->m_seq = read_seqbegin(_lock);
> >
> > +
On Wed, Oct 9, 2019 at 10:42 PM Aleksa Sarai wrote:
>
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -2277,6 +2277,11 @@ static const char *path_init(struct nameidata *nd,
> unsigned flags)
>
> nd->m_seq = read_seqbegin(_lock);
>
> + /* LOOKUP_IN_ROOT treats absolute paths as being
/* Background. */
Container runtimes or other administrative management processes will
often interact with root filesystems while in the host mount namespace,
because the cost of doing a chroot(2) on every operation is too
prohibitive (especially in Go, which cannot safely use vfork). However,
a