Message ID | 20220923133820.993725-1-michael.weiss@aisec.fraunhofer.de (mailing list archive) |
---|---|
Headers | show |
Series | net: openvswitch: metering and conntrack in userns | expand |
Hello: This series was applied to netdev/net-next.git (master) by Paolo Abeni <pabeni@redhat.com>: On Fri, 23 Sep 2022 15:38:18 +0200 you wrote: > Currently using openvswitch in a non-initial user namespace, e.g., an > unprivileged container, is possible but without metering and conntrack > support. This is due to the restriction of the corresponding Netlink > interfaces to the global CAP_NET_ADMIN. > > This simple patches switch from GENL_ADMIN_PERM to GENL_UNS_ADMIN_PERM > in several cases to allow this also for the unprivileged container > use case. > > [...] Here is the summary with links: - [v3,net-next,1/2] net: openvswitch: allow metering in non-initial user namespace https://git.kernel.org/netdev/net-next/c/803937184717 - [v3,net-next,2/2] net: openvswitch: allow conntrack in non-initial user namespace https://git.kernel.org/netdev/net-next/c/59cd7377660a You are awesome, thank you!