Searched hist:"57 e8391d327609cbf12d843259c968b9e5c1838f" (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/fs/proc/ |
H A D | namespaces.c | diff 57e8391d327609cbf12d843259c968b9e5c1838f Sun Mar 07 20:17:03 CST 2010 Eric W. Biederman <ebiederm@xmission.com> pidns: Add setns support
- Pid namespaces are designed to be inescapable so verify that the passed in pid namespace is a child of the currently active pid namespace or the currently active pid namespace itself.
Allowing the currently active pid namespace is important so the effects of an earlier setns can be cancelled.
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
|
/openbmc/linux/kernel/ |
H A D | pid_namespace.c | diff 57e8391d327609cbf12d843259c968b9e5c1838f Sun Mar 07 20:17:03 CST 2010 Eric W. Biederman <ebiederm@xmission.com> pidns: Add setns support
- Pid namespaces are designed to be inescapable so verify that the passed in pid namespace is a child of the currently active pid namespace or the currently active pid namespace itself.
Allowing the currently active pid namespace is important so the effects of an earlier setns can be cancelled.
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
|
/openbmc/linux/include/linux/ |
H A D | proc_fs.h | diff 57e8391d327609cbf12d843259c968b9e5c1838f Sun Mar 07 20:17:03 CST 2010 Eric W. Biederman <ebiederm@xmission.com> pidns: Add setns support
- Pid namespaces are designed to be inescapable so verify that the passed in pid namespace is a child of the currently active pid namespace or the currently active pid namespace itself.
Allowing the currently active pid namespace is important so the effects of an earlier setns can be cancelled.
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
|