lxccontainer: only attach netns on netdev detach

Detaching network namespaces as an unprivileged user is currently not possible and attaching to the user namespace will mean we are not allowed to move the network device into an ancestor network namespace. Signed-off-by: 's avatarChristian Brauner <christian.brauner@ubuntu.com>
parent a477a368
...@@ -4320,10 +4320,12 @@ static bool do_lxcapi_detach_interface(struct lxc_container *c, const char *ifna ...@@ -4320,10 +4320,12 @@ static bool do_lxcapi_detach_interface(struct lxc_container *c, const char *ifna
} }
if (pid == 0) { /* child */ if (pid == 0) { /* child */
int ret = 0; pid_t init_pid;
if (!enter_net_ns(c)) {
ERROR("failed to enter namespace"); init_pid = do_lxcapi_init_pid(c);
exit(-1); if (!switch_to_ns(init_pid, "net")) {
ERROR("Failed to enter network namespace");
exit(EXIT_FAILURE);
} }
ret = lxc_netdev_isup(ifname); ret = lxc_netdev_isup(ifname);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment