<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/kernel/ucount.c, branch v4.9</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v4.9</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v4.9'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2016-08-31T12:28:35Z</updated>
<entry>
<title>mntns: Add a limit on the number of mount namespaces.</title>
<updated>2016-08-31T12:28:35Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:37:37Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=537f7ccb396804c6d0057b93ba8eb104ba44f851'/>
<id>urn:sha1:537f7ccb396804c6d0057b93ba8eb104ba44f851</id>
<content type='text'>
v2: Fixed the very obvious lack of setting ucounts
    on struct mnt_ns reported by Andrei Vagin, and the kbuild
    test report.

Reported-by: Andrei Vagin &lt;avagin@openvz.org&gt;
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>netns: Add a limit on the number of net namespaces</title>
<updated>2016-08-08T19:42:04Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:33:23Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=703286608a220d53584cca5986aad5305eec75ed'/>
<id>urn:sha1:703286608a220d53584cca5986aad5305eec75ed</id>
<content type='text'>
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>cgroupns: Add a limit on the number of cgroup namespaces</title>
<updated>2016-08-08T19:42:03Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:25:30Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=d08311dd6fd8444e39710dd2fb97562895aed8fa'/>
<id>urn:sha1:d08311dd6fd8444e39710dd2fb97562895aed8fa</id>
<content type='text'>
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>ipcns: Add a  limit on the number of ipc namespaces</title>
<updated>2016-08-08T19:42:03Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:20:23Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=aba356616386e6e573a34c6d64ed12443686e5c8'/>
<id>urn:sha1:aba356616386e6e573a34c6d64ed12443686e5c8</id>
<content type='text'>
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>utsns: Add a limit on the number of uts namespaces</title>
<updated>2016-08-08T19:42:02Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:11:25Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f7af3d1c03136275b876f58644599b120cf4ffdd'/>
<id>urn:sha1:f7af3d1c03136275b876f58644599b120cf4ffdd</id>
<content type='text'>
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>pidns: Add a limit on the number of pid namespaces</title>
<updated>2016-08-08T19:42:01Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:08:36Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f333c700c6100b53050980986be922bb21466e29'/>
<id>urn:sha1:f333c700c6100b53050980986be922bb21466e29</id>
<content type='text'>
Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>userns: Generalize the user namespace count into ucount</title>
<updated>2016-08-08T19:41:52Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T19:41:52Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=25f9c0817c535a728c1088542230fa327c577c9e'/>
<id>urn:sha1:25f9c0817c535a728c1088542230fa327c577c9e</id>
<content type='text'>
The same kind of recursive sane default limit and policy
countrol that has been implemented for the user namespace
is desirable for the other namespaces, so generalize
the user namespace refernce count into a ucount.

Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>userns: Make the count of user namespaces per user</title>
<updated>2016-08-08T19:40:30Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T18:54:50Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f6b2db1a3e8d141dd144df58900fb0444d5d7c53'/>
<id>urn:sha1:f6b2db1a3e8d141dd144df58900fb0444d5d7c53</id>
<content type='text'>
Add a structure that is per user and per user ns and use it to hold
the count of user namespaces.  This makes prevents one user from
creating denying service to another user by creating the maximum
number of user namespaces.

Rename the sysctl export of the maximum count from
/proc/sys/userns/max_user_namespaces to /proc/sys/user/max_user_namespaces
to reflect that the count is now per user.

Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>userns: Add a limit on the number of user namespaces</title>
<updated>2016-08-08T18:41:24Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-08-08T18:41:24Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b376c3e1b6770ddcb4f0782be16358095fcea0b6'/>
<id>urn:sha1:b376c3e1b6770ddcb4f0782be16358095fcea0b6</id>
<content type='text'>
Export the export the maximum number of user namespaces as
/proc/sys/userns/max_user_namespaces.

Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>userns: Add per user namespace sysctls.</title>
<updated>2016-08-08T18:18:58Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2016-07-30T18:58:49Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=dbec28460a89aa7c02c3301e9e108d98272549d2'/>
<id>urn:sha1:dbec28460a89aa7c02c3301e9e108d98272549d2</id>
<content type='text'>
Limit per userns sysctls to only be opened for write by a holder
of CAP_SYS_RESOURCE.

Add all of the necessary boilerplate for having per user namespace
sysctls.

Acked-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
</content>
</entry>
</feed>
