diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2010-03-08 03:17:03 +0100 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-11-19 14:59:14 +0100 |
commit | 57e8391d327609cbf12d843259c968b9e5c1838f (patch) | |
tree | 53a5750360300da641fea08890bb531789ffba91 /fs | |
parent | pidns: Deny strange cases when creating pid namespaces. (diff) | |
download | linux-57e8391d327609cbf12d843259c968b9e5c1838f.tar.xz linux-57e8391d327609cbf12d843259c968b9e5c1838f.zip |
pidns: Add setns support
- Pid namespaces are designed to be inescapable so verify that the
passed in pid namespace is a child of the currently active
pid namespace or the currently active pid namespace itself.
Allowing the currently active pid namespace is important so
the effects of an earlier setns can be cancelled.
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/proc/namespaces.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/fs/proc/namespaces.c b/fs/proc/namespaces.c index b178ed733c36..85ca047e35f1 100644 --- a/fs/proc/namespaces.c +++ b/fs/proc/namespaces.c @@ -24,6 +24,9 @@ static const struct proc_ns_operations *ns_entries[] = { #ifdef CONFIG_IPC_NS &ipcns_operations, #endif +#ifdef CONFIG_PID_NS + &pidns_operations, +#endif }; static const struct file_operations ns_file_operations = { |