Andrey, please review. -- Best regards,
Konstantin Khorenko, Virtuozzo Linux Kernel Team On 10/06/2015 01:15 PM, Kirill Tkhai wrote:
Since we use user_ns inside a CT, vzctl should have a possibility to enter a VE using it's init_cred->user_ns. setns is allowed for a tasks who are CAP_SYSADMIN in the ns, i.e. a task from a parent user_ns, but vice versa is not true. So this should be safe. Signed-off-by: Kirill Tkhai <ktk...@odin.com> --- fs/proc/namespaces.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/fs/proc/namespaces.c b/fs/proc/namespaces.c index ec7e269..54bdc67 100644 --- a/fs/proc/namespaces.c +++ b/fs/proc/namespaces.c @@ -28,8 +28,7 @@ static const struct proc_ns_operations *ns_entries[] = { #ifdef CONFIG_PID_NS &pidns_operations, #endif -/* Currently disabled in RHEL */ -#if 0 +#ifdef CONFIG_USER_NS &userns_operations, #endif &mntns_operations, _______________________________________________ Devel mailing list Devel@openvz.org https://lists.openvz.org/mailman/listinfo/devel
_______________________________________________ Devel mailing list Devel@openvz.org https://lists.openvz.org/mailman/listinfo/devel