jehanne/sys
Giacomo Tesio 320e6e6f35 kern: clone $pid's namespace writing #p/$pid/ns
Any process X can get a new copy of the namespace of a target
process Y by writing the string "clone" to the ns file of Y.

The same user must own both processes.
The process writing the ns file must be allowed to mount.

The Pgrp of the calling process is then replaced with a new copy of
the Pgrp of the target process.

After the operation, any change done by X to its own namespace does
not affect Y. Also, if mount was forbidden for Y, it will also be
forbidden for X after the clone.
2017-10-24 23:28:14 +02:00
..
include rc: use some uppercase variables (PATH, USER...) 2017-10-22 13:22:37 +02:00
lib/plumb first usable version of kernel and commands 2016-11-26 03:49:29 +01:00
log first usable version of kernel and commands 2016-11-26 03:49:29 +01:00
posix fs: no "default" posix library 2017-04-21 23:59:27 +02:00
src kern: clone $pid's namespace writing #p/$pid/ns 2017-10-24 23:28:14 +02:00