[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1311706717-7398-1-git-send-email-serge@hallyn.com>
Date: Tue, 26 Jul 2011 18:58:23 +0000
From: Serge Hallyn <serge@...lyn.com>
To: linux-kernel@...r.kernel.org
Cc: dhowells@...hat.com, ebiederm@...ssion.com,
containers@...ts.linux-foundation.org, netdev@...r.kernel.org,
akpm@...l.org
Subject: [PATCH 0/14] user namespaces v2: continue targetting capabilities
Hi,
here is a set of patches to continue targetting capabilities
where appropriate. This set goes about as far as is possible
without making the VFS user namespace aware, meaning that the
VFS can provide a namespaced view of userids, i.e init_user_ns
sees file owner 500, while child user ns sees file owner 0 or
1000. (There are a few other things, like siginfos, which can
be addressed before we address the VFS).
With this set applied, you can create and configure veth netdevs
if your user namespace owns your network namespace (and you are
privileged), but not otherwise.
Some simple testcases can be found at
https://code.launchpad.net/~serge-hallyn/+junk/usernstests with
packages at https://launchpad.net/~serge-hallyn/+archive/userns-natty
Feedback very much appreciated.
Changes since v1:
documentation: incorporate feedback on user_namespaces.txt
netlink_capable: use sock_net() instead of ifdefs
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists