Bug 2116442
Summary: | kernel: Backport vfork support for time namespaces | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Florian Weimer <fweimer> | |
Component: | kernel | Assignee: | Oleg Nesterov <onestero> | |
kernel sub component: | Process management | QA Contact: | Chunyu Hu <chuhu> | |
Status: | CLOSED ERRATA | Docs Contact: | ||
Severity: | unspecified | |||
Priority: | unspecified | CC: | cye, onestero | |
Version: | 9.2 | Keywords: | Triaged | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | kernel-5.14.0-242.el9 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2116444 (view as bug list) | Environment: | ||
Last Closed: | 2023-05-09 07:59:50 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2116444 |
Description
Florian Weimer
2022-08-08 14:13:17 UTC
Just in case, let me quote my comment https://bugzilla.redhat.com/show_bug.cgi?id=2116444#c2 (In reply to Florian Weimer from comment #0) > > commit 133e2d3e81de5d9706cab2dd1d52d231c27382e5 > Author: Andrei Vagin <avagin> > Date: Sun Jun 12 23:07:22 2022 -0700 > > fs/exec: allow to unshare a time namespace on vfork+exec It turns out, we need to put this bz on hold. Firstly, it is not that trivial to backport this patch as I thought, but this is solvable. The main problem is that this patch was reverted upstream, see the commit 33a2d6bc3480f9f ("Revert "fs/exec: allow to unshare a time namespace on vfork+exec""). People are working on another version, I think we need to wait until the new patch is merged upstream. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2458 |