• S
    Don't use CLONE_NEWUSER for now · 28209ca0
    Serge E. Hallyn 提交于
    Until now, user namespaces have not done much, but (for that
    reason) have been innocuous to glob in with other CLONE_
    flags.  Upcoming userns development, however, will make tasks
    cloned with CLONE_NEWUSER far more restricted.  In particular,
    for some time they will be unable to access files with anything
    other than the world access perms.
    
    This patch assumes that noone really needs the user namespaces
    to be enabled.  If that is wrong, then we can try a more
    baroque patch where we create a file owned by a test userid with
    700 perms and, if we can't access it after setuid'ing to that
    userid, then return 0.  Otherwise, assume we are using an
    older, 'harmless' user namespace implementation.
    
    Comments appreciated.  Is it ok to do this?
    Signed-off-by: NSerge Hallyn <serge.hallyn@canonical.com>
    28209ca0
lxc_container.c 24.5 KB