Conversation
A shared mount point will create a new mounting peer group. It results in a new detection point, because after unmounting these mount points, gaps will appear in peer group IDs. One can check these gaps by the command ``` cat /proc/self/mountinfo | grep -Eo "master:.." | cut -d':' -f2 | sort | uniq ``` In Holmes V1.5.1, the above detection point is named as Evil Modification (04).
|
if it some modules want use tempfs,it will work proper or not? |
|
Yes, it will work properly. A mount point being shared or private only affects the behavior of its devried mounting namespace created by In Android, the most known call of In root implementations, including APatch, Moreover, you can find in the codebase of APatch that almost all mounting points are set to be private, which is the correct way to avoid detections after unmount. |
|
Won't this cause unmonting /debug_ramdisk in global namespace not propagated to other mountspaces? That is a behaviour change. |
This comment was marked as outdated.
This comment was marked as outdated.
|
There might be an ambiguity in your question, hence I should make it clearer. By
Regarding this problem, please keep in mind that there were not that many unshare calls in APatch or Zygote. |
A shared mount point will create a new mounting peer group. It results in a new detection point, because after unmounting these mount points, gaps will appear in peer group IDs. One can check these gaps by the command
In Holmes V1.5.1, the above detection point is named as Evil Modification (04).