[RFC] lsm: namespace hooks
Richard Weinberger
richard.weinberger at gmail.com
Thu Nov 27 14:18:55 UTC 2014
On Thu, Nov 27, 2014 at 3:01 PM, Lukasz Pawelczyk
<l.pawelczyk at samsung.com> wrote:
> extern struct dentry *securityfs_create_file(const char *name, umode_t mode,
> diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h
> index 34f9d73..5ac7fb9 100644
> --- a/include/uapi/linux/sched.h
> +++ b/include/uapi/linux/sched.h
> @@ -21,8 +21,7 @@
> #define CLONE_DETACHED 0x00400000 /* Unused, ignored */
> #define CLONE_UNTRACED 0x00800000 /* set if the tracing process can't force CLONE_PTRACE on this clone */
> #define CLONE_CHILD_SETTID 0x01000000 /* set the TID in the child */
> -/* 0x02000000 was previously the unused CLONE_STOPPED (Start in stopped state)
> - and is now available for re-use. */
> +#define CLONE_NEWLSM 0x02000000 /* New LSM namespace */
FYI, CLONE_NEWCGROUP also claims last flag [1].
As it looks we will get more and more namespaces, more than clone() can handle.
[1] https://lkml.org/lkml/2014/7/17/588
--
Thanks,
//richard
More information about the Containers
mailing list