diff for duplicates of <87wqw15wqb.fsf@xmission.com> diff --git a/a/1.txt b/N1/1.txt index a658792..409f01e 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,4 +1,4 @@ -Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes: +Vasily Kulikov <segoon@openwall.com> writes: > Currently there is completely no limiting in number of user namespaces > created by unprivileged users. One can freely create thousands of @@ -75,7 +75,7 @@ you will get softirq action. There is also for whatever it is worth the network memory control group, that should limit networking things. I haven't had a chance to look how sane it is in practice. -> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> +> Signed-off-by: Vasily Kulikov <segoon@openwall.com> > -- > include/linux/sched.h | 3 +++ > kernel/user_namespace.c | 26 ++++++++++++++++++++++++++ diff --git a/a/content_digest b/N1/content_digest index 8ca0ce1..db6af12 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,15 +1,16 @@ "ref\020121228175627.GA7683@cachalot\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" - "Subject\0Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" + "Subject\0[kernel-hardening] Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" "Date\0Fri, 28 Dec 2012 20:05:32 -0800\0" - "To\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0" - "Cc\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0" + "To\0Vasily Kulikov <segoon@openwall.com>\0" + "Cc\0Containers <containers@lists.linux-foundation.org>" + Serge Hallyn <serge.hallyn@canonical.com> + Serge E. Hallyn <serge.hallyn@ubuntu.com> + linux-kernel@vger.kernel.org + " kernel-hardening@lists.openwall.com\0" "\00:1\0" "b\0" - "Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:\n" + "Vasily Kulikov <segoon@openwall.com> writes:\n" "\n" "> Currently there is completely no limiting in number of user namespaces\n" "> created by unprivileged users. One can freely create thousands of\n" @@ -86,7 +87,7 @@ "the network memory control group, that should limit networking things.\n" "I haven't had a chance to look how sane it is in practice.\n" "\n" - "> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n" + "> Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n" "> -- \n" "> include/linux/sched.h | 3 +++\n" "> kernel/user_namespace.c | 26 ++++++++++++++++++++++++++\n" @@ -169,4 +170,4 @@ "> }\n" > EXPORT_SYMBOL(free_user_ns); -48c23879bf3dff197537b43fe809bb296f63c99aa699f3a7b3b6c8912819b1f6 +4beb77de6af226cddf214fd6f8e1df56f6193aafc738a17d1b2554d44c91e7f0
diff --git a/a/1.txt b/N2/1.txt index a658792..409f01e 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -1,4 +1,4 @@ -Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes: +Vasily Kulikov <segoon@openwall.com> writes: > Currently there is completely no limiting in number of user namespaces > created by unprivileged users. One can freely create thousands of @@ -75,7 +75,7 @@ you will get softirq action. There is also for whatever it is worth the network memory control group, that should limit networking things. I haven't had a chance to look how sane it is in practice. -> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> +> Signed-off-by: Vasily Kulikov <segoon@openwall.com> > -- > include/linux/sched.h | 3 +++ > kernel/user_namespace.c | 26 ++++++++++++++++++++++++++ diff --git a/a/content_digest b/N2/content_digest index 8ca0ce1..7fbe01a 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,15 +1,16 @@ "ref\020121228175627.GA7683@cachalot\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" "Subject\0Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" "Date\0Fri, 28 Dec 2012 20:05:32 -0800\0" - "To\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0" - "Cc\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0" + "To\0Vasily Kulikov <segoon@openwall.com>\0" + "Cc\0Containers <containers@lists.linux-foundation.org>" + Serge Hallyn <serge.hallyn@canonical.com> + Serge E. Hallyn <serge.hallyn@ubuntu.com> + linux-kernel@vger.kernel.org + " kernel-hardening@lists.openwall.com\0" "\00:1\0" "b\0" - "Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:\n" + "Vasily Kulikov <segoon@openwall.com> writes:\n" "\n" "> Currently there is completely no limiting in number of user namespaces\n" "> created by unprivileged users. One can freely create thousands of\n" @@ -86,7 +87,7 @@ "the network memory control group, that should limit networking things.\n" "I haven't had a chance to look how sane it is in practice.\n" "\n" - "> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n" + "> Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n" "> -- \n" "> include/linux/sched.h | 3 +++\n" "> kernel/user_namespace.c | 26 ++++++++++++++++++++++++++\n" @@ -169,4 +170,4 @@ "> }\n" > EXPORT_SYMBOL(free_user_ns); -48c23879bf3dff197537b43fe809bb296f63c99aa699f3a7b3b6c8912819b1f6 +caf64347e55d7f0e9f05ba0fe822a82a27db8625bc9568c8badb1fc79125f541
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.