[Devel] Re: [PATCH 4/8] af_unix: Allow SO_PEERCRED to work across namespaces.
On 06/13/2010 05:30 PM, Eric W. Biederman wrote: Use struct pid and struct cred to store the peer credentials on struct sock. This gives enough information to convert the peer credential information to a value relative to whatever namespace the socket is in at the time. This removes nasty surprises when using SO_PEERCRED on socket connetions where the processes on either side are in different pid and user namespaces. Signed-off-by: Eric W. Biederman ebied...@xmission.com Acked-by: Pavel Emelyanov xe...@openvz.org ___ Containers mailing list contain...@lists.linux-foundation.org https://lists.linux-foundation.org/mailman/listinfo/containers ___ Devel mailing list Devel@openvz.org https://openvz.org/mailman/listinfo/devel
[Devel] Re: [PATCH 4/8] af_unix: Allow SO_PEERCRED to work across namespaces.
On 06/13/2010 03:30 PM, Eric W. Biederman wrote: Use struct pid and struct cred to store the peer credentials on struct sock. This gives enough information to convert the peer credential information to a value relative to whatever namespace the socket is in at the time. This removes nasty surprises when using SO_PEERCRED on socket connetions where the processes on either side are in different pid and user namespaces. Signed-off-by: Eric W. Biedermanebied...@xmission.com Acked-by: Daniel Lezcano daniel.lezc...@free.fr ___ Containers mailing list contain...@lists.linux-foundation.org https://lists.linux-foundation.org/mailman/listinfo/containers ___ Devel mailing list Devel@openvz.org https://openvz.org/mailman/listinfo/devel