Quoting Richard Guy Briggs (rgb@xxxxxxxxxx): > Expose ns_entries so subsystems other than proc can use this set of namespace > operations. > > Signed-off-by: Richard Guy Briggs <rgb@xxxxxxxxxx> Acked-by: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> > --- > fs/proc/namespaces.c | 2 +- > include/linux/proc_ns.h | 1 + > 2 files changed, 2 insertions(+), 1 deletions(-) > > diff --git a/fs/proc/namespaces.c b/fs/proc/namespaces.c > index 8902609..310da74 100644 > --- a/fs/proc/namespaces.c > +++ b/fs/proc/namespaces.c > @@ -15,7 +15,7 @@ > #include "internal.h" > > > -static const struct proc_ns_operations *ns_entries[] = { > +const struct proc_ns_operations *ns_entries[] = { > #ifdef CONFIG_NET_NS > &netns_operations, > #endif > diff --git a/include/linux/proc_ns.h b/include/linux/proc_ns.h > index aaafe3e..f4563db 100644 > --- a/include/linux/proc_ns.h > +++ b/include/linux/proc_ns.h > @@ -28,6 +28,7 @@ extern const struct proc_ns_operations ipcns_operations; > extern const struct proc_ns_operations pidns_operations; > extern const struct proc_ns_operations userns_operations; > extern const struct proc_ns_operations mntns_operations; > +extern const struct proc_ns_operations *ns_entries[]; > > /* > * We always define these enumerators > -- > 1.7.1 _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/containers