https://jira.sw.ru/browse/PSBM-46199

Allowing the privileged processes in the containers to set leases on
arbitrary files seems to make no harm. Let us make CAP_LEASE work there.

Signed-off-by: Evgenii Shatokhin <eshatok...@virtuozzo.com>
---
 fs/locks.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fs/locks.c b/fs/locks.c
index 93c097b..82e9bc3 100644
--- a/fs/locks.c
+++ b/fs/locks.c
@@ -1693,7 +1693,7 @@ int generic_setlease(struct file *filp, long arg, struct 
file_lock **flp,
        struct inode *inode = dentry->d_inode;
        int error;
 
-       if ((!uid_eq(current_fsuid(), inode->i_uid)) && !capable(CAP_LEASE))
+       if ((!uid_eq(current_fsuid(), inode->i_uid)) && !ve_capable(CAP_LEASE))
                return -EACCES;
        if (!S_ISREG(inode->i_mode))
                return -EINVAL;
-- 
2.6.3

_______________________________________________
Devel mailing list
Devel@openvz.org
https://lists.openvz.org/mailman/listinfo/devel

Reply via email to