Home
last modified time | relevance | path

Searched hist:dbec28460a89aa7c02c3301e9e108d98272549d2 (Results 1 – 4 of 4) sorted by relevance

/openbmc/linux/kernel/
H A Ducount.cdbec28460a89aa7c02c3301e9e108d98272549d2 Sat Jul 30 13:58:49 CDT 2016 Eric W. Biederman <ebiederm@xmission.com> userns: Add per user namespace sysctls.

Limit per userns sysctls to only be opened for write by a holder
of CAP_SYS_RESOURCE.

Add all of the necessary boilerplate for having per user namespace
sysctls.

Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
H A Duser_namespace.cdiff dbec28460a89aa7c02c3301e9e108d98272549d2 Sat Jul 30 13:58:49 CDT 2016 Eric W. Biederman <ebiederm@xmission.com> userns: Add per user namespace sysctls.

Limit per userns sysctls to only be opened for write by a holder
of CAP_SYS_RESOURCE.

Add all of the necessary boilerplate for having per user namespace
sysctls.

Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
H A DMakefilediff dbec28460a89aa7c02c3301e9e108d98272549d2 Sat Jul 30 13:58:49 CDT 2016 Eric W. Biederman <ebiederm@xmission.com> userns: Add per user namespace sysctls.

Limit per userns sysctls to only be opened for write by a holder
of CAP_SYS_RESOURCE.

Add all of the necessary boilerplate for having per user namespace
sysctls.

Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
/openbmc/linux/include/linux/
H A Duser_namespace.hdiff dbec28460a89aa7c02c3301e9e108d98272549d2 Sat Jul 30 13:58:49 CDT 2016 Eric W. Biederman <ebiederm@xmission.com> userns: Add per user namespace sysctls.

Limit per userns sysctls to only be opened for write by a holder
of CAP_SYS_RESOURCE.

Add all of the necessary boilerplate for having per user namespace
sysctls.

Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>