diff options
author | Rahat Mahmood <rahat@google.com> | 2018-11-08 11:08:41 -0800 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-11-08 11:09:46 -0800 |
commit | 5a0be6fa203273d1e4ab06a206eaffeca5724533 (patch) | |
tree | f73a10689d42ca3b3676cd438dfd569ec1e7b745 /pkg/sentry/syscalls/linux/sys_file.go | |
parent | 90e81b2e5c665b9fc149f97dcf15142c190260c6 (diff) |
Create stubs for syscalls upto Linux 4.4.
Create syscall stubs for missing syscalls upto Linux 4.4 and advertise
a kernel version of 4.4.
PiperOrigin-RevId: 220667680
Change-Id: Idbdccde538faabf16debc22f492dd053a8af0ba7
Diffstat (limited to 'pkg/sentry/syscalls/linux/sys_file.go')
-rw-r--r-- | pkg/sentry/syscalls/linux/sys_file.go | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/pkg/sentry/syscalls/linux/sys_file.go b/pkg/sentry/syscalls/linux/sys_file.go index a70f35be0..89d21dd98 100644 --- a/pkg/sentry/syscalls/linux/sys_file.go +++ b/pkg/sentry/syscalls/linux/sys_file.go @@ -1140,9 +1140,6 @@ func mayLinkAt(t *kernel.Task, target *fs.Inode) error { // always enabled, and thus imposes the following restrictions on hard // links. - // Technically Linux is more restrictive in 3.11.10 (requires CAP_FOWNER in - // root user namespace); this is from the later f2ca379642d7 "namei: permit - // linking with CAP_FOWNER in userns". if target.CheckOwnership(t) { // fs/namei.c:may_linkat: "Source inode owner (or CAP_FOWNER) // can hardlink all they like." |