1
linux/ipc
Alexey Gladkov dc55e35f9e ipc: Store mqueue sysctls in the ipc namespace
Right now, the mqueue sysctls take ipc namespaces into account in a
rather hacky way. This works in most cases, but does not respect the
user namespace.

Within the user namespace, the user cannot change the /proc/sys/fs/mqueue/*
parametres. This poses a problem in the rootless containers.

To solve this I changed the implementation of the mqueue sysctls just
like some other sysctls.

So far, the changes do not provide additional access to files. This will
be done in a future patch.

v3:
* Don't implemenet set_permissions to keep the current behavior.

v2:
* Fixed compilation problem if CONFIG_POSIX_MQUEUE_SYSCTL is not
  specified.

Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Alexey Gladkov <legion@kernel.org>
Link: https://lkml.kernel.org/r/b0ccbb2489119f1f20c737cf1930c3a9c4e4243a.1644862280.git.legion@kernel.org
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
2022-03-08 13:39:40 -06:00
..
compat.c
ipc_sysctl.c ipc/ipc_sysctl.c: remove fallback for !CONFIG_PROC_SYSCTL 2021-11-09 10:02:53 -08:00
Makefile
mq_sysctl.c ipc: Store mqueue sysctls in the ipc namespace 2022-03-08 13:39:40 -06:00
mqueue.c ipc: Store mqueue sysctls in the ipc namespace 2022-03-08 13:39:40 -06:00
msg.c memcg: enable accounting of ipc resources 2021-09-03 09:58:12 -07:00
msgutil.c
namespace.c ipc: Store mqueue sysctls in the ipc namespace 2022-03-08 13:39:40 -06:00
sem.c ipc/sem: do not sleep with a spin lock held 2022-02-04 09:25:05 -08:00
shm.c shm: extend forced shm destroy to support objects from several IPC nses 2021-11-20 10:35:54 -08:00
syscall.c
util.c proc: remove PDE_DATA() completely 2022-01-22 08:33:37 +02:00
util.h ipc/util.c: use binary search for max_idx 2021-07-01 11:06:07 -07:00