On Fri, Aug 28, 2015 at 05:20:01PM +0400, Andrew Vagin wrote:

> +bool ve_capable(int cap)
> +{
> +     return ns_capable(get_exec_env()->init_cred->user_ns, cap);
> +}

init_cred is set in ve_grab_context, which means that if a task
occasionally uses ve_capable() before writing START to ve.state, the
kernel will panic. Please add a sanity check, which will make
ve_capable() fall back on capable() if init_cred is not available.
_______________________________________________
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel

Reply via email to