After this patch, audit netlink sockets can communicate with each other when they belong to the same user namespace. Signed-off-by: Gao feng <gaofeng@xxxxxxxxxxxxxx> --- kernel/audit.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/kernel/audit.c b/kernel/audit.c index 766dcbf..3ae8793 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -937,6 +937,11 @@ static void audit_receive(struct sk_buff *skb) mutex_unlock(&audit_cmd_mutex); } +static bool audit_compare(struct net *net, struct sock *sk) +{ + return (sock_net(sk)->user_ns == net->user_ns); +} + static int __net_init audit_net_init(struct net *net) { struct user_namespace *ns = net->user_ns; @@ -949,6 +954,7 @@ static int __net_init audit_net_init(struct net *net) */ struct netlink_kernel_cfg cfg = { .input = audit_receive, + .compare = audit_compare, }; sk = netlink_kernel_create(net, NETLINK_AUDIT, &cfg); -- 1.8.1.4 _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers