<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/ipc, branch linux-5.19.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-5.19.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-5.19.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2022-10-24T07:58:02Z</updated>
<entry>
<title>ipc: mqueue: fix possible memory leak in init_mqueue_fs()</title>
<updated>2022-10-24T07:58:02Z</updated>
<author>
<name>Hangyu Hua</name>
<email>hbh25y@gmail.com</email>
</author>
<published>2022-07-15T06:23:01Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=a1f321051e0dcf2415fb94f81fdc5044cad4c1d6'/>
<id>urn:sha1:a1f321051e0dcf2415fb94f81fdc5044cad4c1d6</id>
<content type='text'>
[ Upstream commit c579d60f0d0cd87552f64fdebe68b5d941d20309 ]

commit db7cfc380900 ("ipc: Free mq_sysctls if ipc namespace creation
failed")

Here's a similar memory leak to the one fixed by the patch above.
retire_mq_sysctls need to be called when init_mqueue_fs fails after
setup_mq_sysctls.

Fixes: dc55e35f9e81 ("ipc: Store mqueue sysctls in the ipc namespace")
Signed-off-by: Hangyu Hua &lt;hbh25y@gmail.com&gt;
Link: https://lkml.kernel.org/r/20220715062301.19311-1-hbh25y@gmail.com
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>ipc: Free mq_sysctls if ipc namespace creation failed</title>
<updated>2022-06-22T22:47:41Z</updated>
<author>
<name>Alexey Gladkov</name>
<email>legion@kernel.org</email>
</author>
<published>2022-06-22T20:07:29Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=db7cfc380900bc4243b09623fd72fabe0a8ff23b'/>
<id>urn:sha1:db7cfc380900bc4243b09623fd72fabe0a8ff23b</id>
<content type='text'>
The problem that Dmitry Vyukov pointed out is that if setup_ipc_sysctls fails,
mq_sysctls must be freed before return.

executing program
BUG: memory leak
unreferenced object 0xffff888112fc9200 (size 512):
  comm "syz-executor237", pid 3648, jiffies 4294970469 (age 12.270s)
  hex dump (first 32 bytes):
    ef d3 60 85 ff ff ff ff 0c 9b d2 12 81 88 ff ff  ..`.............
    04 00 00 00 a4 01 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814b6eb3&gt;] kmemdup+0x23/0x50 mm/util.c:129
    [&lt;ffffffff82219a9b&gt;] kmemdup include/linux/fortify-string.h:456 [inline]
    [&lt;ffffffff82219a9b&gt;] setup_mq_sysctls+0x4b/0x1c0 ipc/mq_sysctl.c:89
    [&lt;ffffffff822197f2&gt;] create_ipc_ns ipc/namespace.c:63 [inline]
    [&lt;ffffffff822197f2&gt;] copy_ipcs+0x292/0x390 ipc/namespace.c:91
    [&lt;ffffffff8127de7c&gt;] create_new_namespaces+0xdc/0x4f0 kernel/nsproxy.c:90
    [&lt;ffffffff8127e89b&gt;] unshare_nsproxy_namespaces+0x9b/0x120 kernel/nsproxy.c:226
    [&lt;ffffffff8123f92e&gt;] ksys_unshare+0x2fe/0x600 kernel/fork.c:3165
    [&lt;ffffffff8123fc42&gt;] __do_sys_unshare kernel/fork.c:3236 [inline]
    [&lt;ffffffff8123fc42&gt;] __se_sys_unshare kernel/fork.c:3234 [inline]
    [&lt;ffffffff8123fc42&gt;] __x64_sys_unshare+0x12/0x20 kernel/fork.c:3234
    [&lt;ffffffff845aab45&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845aab45&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff8460006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

BUG: memory leak
unreferenced object 0xffff888112fd5f00 (size 256):
  comm "syz-executor237", pid 3648, jiffies 4294970469 (age 12.270s)
  hex dump (first 32 bytes):
    00 92 fc 12 81 88 ff ff 00 00 00 00 01 00 00 00  ................
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff816fea1b&gt;] kmalloc include/linux/slab.h:605 [inline]
    [&lt;ffffffff816fea1b&gt;] kzalloc include/linux/slab.h:733 [inline]
    [&lt;ffffffff816fea1b&gt;] __register_sysctl_table+0x7b/0x7f0 fs/proc/proc_sysctl.c:1344
    [&lt;ffffffff82219b7a&gt;] setup_mq_sysctls+0x12a/0x1c0 ipc/mq_sysctl.c:112
    [&lt;ffffffff822197f2&gt;] create_ipc_ns ipc/namespace.c:63 [inline]
    [&lt;ffffffff822197f2&gt;] copy_ipcs+0x292/0x390 ipc/namespace.c:91
    [&lt;ffffffff8127de7c&gt;] create_new_namespaces+0xdc/0x4f0 kernel/nsproxy.c:90
    [&lt;ffffffff8127e89b&gt;] unshare_nsproxy_namespaces+0x9b/0x120 kernel/nsproxy.c:226
    [&lt;ffffffff8123f92e&gt;] ksys_unshare+0x2fe/0x600 kernel/fork.c:3165
    [&lt;ffffffff8123fc42&gt;] __do_sys_unshare kernel/fork.c:3236 [inline]
    [&lt;ffffffff8123fc42&gt;] __se_sys_unshare kernel/fork.c:3234 [inline]
    [&lt;ffffffff8123fc42&gt;] __x64_sys_unshare+0x12/0x20 kernel/fork.c:3234
    [&lt;ffffffff845aab45&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845aab45&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff8460006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

BUG: memory leak
unreferenced object 0xffff888112fbba00 (size 256):
  comm "syz-executor237", pid 3648, jiffies 4294970469 (age 12.270s)
  hex dump (first 32 bytes):
    78 ba fb 12 81 88 ff ff 00 00 00 00 01 00 00 00  x...............
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff816fef49&gt;] kmalloc include/linux/slab.h:605 [inline]
    [&lt;ffffffff816fef49&gt;] kzalloc include/linux/slab.h:733 [inline]
    [&lt;ffffffff816fef49&gt;] new_dir fs/proc/proc_sysctl.c:978 [inline]
    [&lt;ffffffff816fef49&gt;] get_subdir fs/proc/proc_sysctl.c:1022 [inline]
    [&lt;ffffffff816fef49&gt;] __register_sysctl_table+0x5a9/0x7f0 fs/proc/proc_sysctl.c:1373
    [&lt;ffffffff82219b7a&gt;] setup_mq_sysctls+0x12a/0x1c0 ipc/mq_sysctl.c:112
    [&lt;ffffffff822197f2&gt;] create_ipc_ns ipc/namespace.c:63 [inline]
    [&lt;ffffffff822197f2&gt;] copy_ipcs+0x292/0x390 ipc/namespace.c:91
    [&lt;ffffffff8127de7c&gt;] create_new_namespaces+0xdc/0x4f0 kernel/nsproxy.c:90
    [&lt;ffffffff8127e89b&gt;] unshare_nsproxy_namespaces+0x9b/0x120 kernel/nsproxy.c:226
    [&lt;ffffffff8123f92e&gt;] ksys_unshare+0x2fe/0x600 kernel/fork.c:3165
    [&lt;ffffffff8123fc42&gt;] __do_sys_unshare kernel/fork.c:3236 [inline]
    [&lt;ffffffff8123fc42&gt;] __se_sys_unshare kernel/fork.c:3234 [inline]
    [&lt;ffffffff8123fc42&gt;] __x64_sys_unshare+0x12/0x20 kernel/fork.c:3234
    [&lt;ffffffff845aab45&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845aab45&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff8460006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

BUG: memory leak
unreferenced object 0xffff888112fbb900 (size 256):
  comm "syz-executor237", pid 3648, jiffies 4294970469 (age 12.270s)
  hex dump (first 32 bytes):
    78 b9 fb 12 81 88 ff ff 00 00 00 00 01 00 00 00  x...............
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff816fef49&gt;] kmalloc include/linux/slab.h:605 [inline]
    [&lt;ffffffff816fef49&gt;] kzalloc include/linux/slab.h:733 [inline]
    [&lt;ffffffff816fef49&gt;] new_dir fs/proc/proc_sysctl.c:978 [inline]
    [&lt;ffffffff816fef49&gt;] get_subdir fs/proc/proc_sysctl.c:1022 [inline]
    [&lt;ffffffff816fef49&gt;] __register_sysctl_table+0x5a9/0x7f0 fs/proc/proc_sysctl.c:1373
    [&lt;ffffffff82219b7a&gt;] setup_mq_sysctls+0x12a/0x1c0 ipc/mq_sysctl.c:112
    [&lt;ffffffff822197f2&gt;] create_ipc_ns ipc/namespace.c:63 [inline]
    [&lt;ffffffff822197f2&gt;] copy_ipcs+0x292/0x390 ipc/namespace.c:91
    [&lt;ffffffff8127de7c&gt;] create_new_namespaces+0xdc/0x4f0 kernel/nsproxy.c:90
    [&lt;ffffffff8127e89b&gt;] unshare_nsproxy_namespaces+0x9b/0x120 kernel/nsproxy.c:226
    [&lt;ffffffff8123f92e&gt;] ksys_unshare+0x2fe/0x600 kernel/fork.c:3165
    [&lt;ffffffff8123fc42&gt;] __do_sys_unshare kernel/fork.c:3236 [inline]
    [&lt;ffffffff8123fc42&gt;] __se_sys_unshare kernel/fork.c:3234 [inline]
    [&lt;ffffffff8123fc42&gt;] __x64_sys_unshare+0x12/0x20 kernel/fork.c:3234
    [&lt;ffffffff845aab45&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845aab45&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff8460006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

Reported-by: syzbot+b4b0d1b35442afbf6fd2@syzkaller.appspotmail.com
Signed-off-by: Alexey Gladkov &lt;legion@kernel.org&gt;
Link: https://lkml.kernel.org/r/000000000000f5004705e1db8bad@google.com
Link: https://lkml.kernel.org/r/20220622200729.2639663-1-legion@kernel.org
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>Merge tag 'per-namespace-ipc-sysctls-for-v5.19' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace</title>
<updated>2022-06-03T22:54:57Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2022-06-03T22:54:57Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=1888e9b4bb78c88514b24ecafa9e4e4faf761747'/>
<id>urn:sha1:1888e9b4bb78c88514b24ecafa9e4e4faf761747</id>
<content type='text'>
Pull ipc sysctl namespace updates from Eric Biederman:
 "This updates the ipc sysctls so that they are fundamentally per ipc
  namespace. Previously these sysctls depended upon a hack to simulate
  being per ipc namespace by looking up the ipc namespace in read or
  write. With this set of changes the ipc sysctls are registered per ipc
  namespace and open looks up the ipc namespace.

  Not only does this series of changes ensure the traditional binding at
  open time happens, but it sets a foundation for being able to relax
  the permission checks to allow a user namspace root to change the ipc
  sysctls for an ipc namespace that the user namespace root requires. To
  do this requires the ipc namespace to be known at open time"

* tag 'per-namespace-ipc-sysctls-for-v5.19' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace:
  ipc: Remove extra braces
  ipc: Check permissions for checkpoint_restart sysctls at open time
  ipc: Remove extra1 field abuse to pass ipc namespace
  ipc: Use the same namespace to modify and validate
  ipc: Store ipc sysctls in the ipc namespace
  ipc: Store mqueue sysctls in the ipc namespace
</content>
</entry>
<entry>
<title>ipc/mqueue: use get_tree_nodev() in mqueue_get_tree()</title>
<updated>2022-05-10T01:29:21Z</updated>
<author>
<name>Waiman Long</name>
<email>longman@redhat.com</email>
</author>
<published>2022-05-10T01:29:21Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=d60c4d01a98bc1942dba6e3adc02031f5519f94b'/>
<id>urn:sha1:d60c4d01a98bc1942dba6e3adc02031f5519f94b</id>
<content type='text'>
When running the stress-ng clone benchmark with multiple testing threads,
it was found that there were significant spinlock contention in sget_fc().
The contended spinlock was the sb_lock.  It is under heavy contention
because the following code in the critcal section of sget_fc():

  hlist_for_each_entry(old, &amp;fc-&gt;fs_type-&gt;fs_supers, s_instances) {
      if (test(old, fc))
          goto share_extant_sb;
  }

After testing with added instrumentation code, it was found that the
benchmark could generate thousands of ipc namespaces with the
corresponding number of entries in the mqueue's fs_supers list where the
namespaces are the key for the search.  This leads to excessive time in
scanning the list for a match.

Looking back at the mqueue calling sequence leading to sget_fc():

  mq_init_ns()
  =&gt; mq_create_mount()
  =&gt; fc_mount()
  =&gt; vfs_get_tree()
  =&gt; mqueue_get_tree()
  =&gt; get_tree_keyed()
  =&gt; vfs_get_super()
  =&gt; sget_fc()

Currently, mq_init_ns() is the only mqueue function that will indirectly
call mqueue_get_tree() with a newly allocated ipc namespace as the key for
searching.  As a result, there will never be a match with the exising ipc
namespaces stored in the mqueue's fs_supers list.

So using get_tree_keyed() to do an existing ipc namespace search is just a
waste of time.  Instead, we could use get_tree_nodev() to eliminate the
useless search.  By doing so, we can greatly reduce the sb_lock hold time
and avoid the spinlock contention problem in case a large number of ipc
namespaces are present.

Of course, if the code is modified in the future to allow
mqueue_get_tree() to be called with an existing ipc namespace instead of a
new one, we will have to use get_tree_keyed() in this case.

The following stress-ng clone benchmark command was run on a 2-socket
48-core Intel system:

./stress-ng --clone 32 --verbose --oomable --metrics-brief -t 20

The "bogo ops/s" increased from 5948.45 before patch to 9137.06 after
patch. This is an increase of 54% in performance.

Link: https://lkml.kernel.org/r/20220121172315.19652-1-longman@redhat.com
Fixes: 935c6912b198 ("ipc: Convert mqueue fs to fs_context")
Signed-off-by: Waiman Long &lt;longman@redhat.com&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: David Howells &lt;dhowells@redhat.com&gt;
Cc: Manfred Spraul &lt;manfred@colorfullife.com&gt;
Cc: Davidlohr Bueso &lt;dave@stgolabs.net&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>ipc: update semtimedop() to use hrtimer</title>
<updated>2022-05-10T01:29:20Z</updated>
<author>
<name>Prakash Sangappa</name>
<email>prakash.sangappa@oracle.com</email>
</author>
<published>2022-05-10T01:29:20Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=49c9dd0df65d547a58642d2f717eeb560e1db140'/>
<id>urn:sha1:49c9dd0df65d547a58642d2f717eeb560e1db140</id>
<content type='text'>
semtimedop() should be converted to use hrtimer like it has been done for
most of the system calls with timeouts.  This system call already takes a
struct timespec as an argument and can therefore provide finer granularity
timed wait.

Link: https://lkml.kernel.org/r/1651187881-2858-1-git-send-email-prakash.sangappa@oracle.com
Signed-off-by: Prakash Sangappa &lt;prakash.sangappa@oracle.com&gt;
Reviewed-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Reviewed-by: Davidlohr Bueso &lt;dave@stgolabs.net&gt;
Reviewed-by: Manfred Spraul &lt;manfred@colorfullife.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>ipc/sem: remove redundant assignments</title>
<updated>2022-05-10T01:29:20Z</updated>
<author>
<name>Michal Orzel</name>
<email>michalorzel.eng@gmail.com</email>
</author>
<published>2022-05-10T01:29:20Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=0e900029655327bb5326ced02eff97667a079039'/>
<id>urn:sha1:0e900029655327bb5326ced02eff97667a079039</id>
<content type='text'>
Get rid of redundant assignments which end up in values not being
read either because they are overwritten or the function ends.

Reported by clang-tidy [deadcode.DeadStores]

Link: https://lkml.kernel.org/r/20220409101933.207157-1-michalorzel.eng@gmail.com
Signed-off-by: Michal Orzel &lt;michalorzel.eng@gmail.com&gt;
Reviewed-by: Tom Rix &lt;trix@redhat.com&gt;
Reviewed-by: Nathan Chancellor &lt;nathan@kernel.org&gt;
Cc: Nick Desaulniers &lt;ndesaulniers@google.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>ipc: Remove extra braces</title>
<updated>2022-05-03T22:25:58Z</updated>
<author>
<name>Alexey Gladkov</name>
<email>legion@kernel.org</email>
</author>
<published>2022-05-03T13:39:57Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=38cd5b12b7854941ede1954cf5a2393eb94b5d37'/>
<id>urn:sha1:38cd5b12b7854941ede1954cf5a2393eb94b5d37</id>
<content type='text'>
Fix coding style. In the previous commit, I added braces because,
in addition to changing .data, .extra1 also changed. Now this is not
needed.

Fixes: 1f5c135ee509 ("ipc: Store ipc sysctls in the ipc namespace")
Signed-off-by: Alexey Gladkov &lt;legion@kernel.org&gt;
Link: https://lkml.kernel.org/r/37687827f630bc150210f5b8abeeb00f1336814e.1651584847.git.legion@kernel.org
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>ipc: Check permissions for checkpoint_restart sysctls at open time</title>
<updated>2022-05-03T22:25:58Z</updated>
<author>
<name>Alexey Gladkov</name>
<email>legion@kernel.org</email>
</author>
<published>2022-05-03T13:39:56Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=0889f44e281034e180daa6daf3e2d57c012452d4'/>
<id>urn:sha1:0889f44e281034e180daa6daf3e2d57c012452d4</id>
<content type='text'>
As Eric Biederman pointed out, it is possible not to use a custom
proc_handler and check permissions for every write, but to use a
.permission handler. That will allow the checkpoint_restart sysctls to
perform all of their permission checks at open time, and not need any
other special code.

Link: https://lore.kernel.org/lkml/87czib9g38.fsf@email.froward.int.ebiederm.org/
Fixes: 1f5c135ee509 ("ipc: Store ipc sysctls in the ipc namespace")
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
Signed-off-by: Alexey Gladkov &lt;legion@kernel.org&gt;
Link: https://lkml.kernel.org/r/65fa8459803830608da4610a39f33c76aa933eb9.1651584847.git.legion@kernel.org
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>ipc: Remove extra1 field abuse to pass ipc namespace</title>
<updated>2022-05-03T22:25:58Z</updated>
<author>
<name>Alexey Gladkov</name>
<email>legion@kernel.org</email>
</author>
<published>2022-05-03T13:39:55Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=dd141a4955d5ebbb3f4c7996796e86a3ac9ed57f'/>
<id>urn:sha1:dd141a4955d5ebbb3f4c7996796e86a3ac9ed57f</id>
<content type='text'>
Eric Biederman pointed out that using .extra1 to pass ipc namespace
looks like an ugly hack and there is a better solution. We can get the
ipc_namespace using the .data field.

Link: https://lore.kernel.org/lkml/87czib9g38.fsf@email.froward.int.ebiederm.org/
Fixes: 1f5c135ee509 ("ipc: Store ipc sysctls in the ipc namespace")
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
Signed-off-by: Alexey Gladkov &lt;legion@kernel.org&gt;
Link: https://lkml.kernel.org/r/93df64a8fe93ba20ebbe1d9f8eda484b2f325426.1651584847.git.legion@kernel.org
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
<entry>
<title>ipc: Use the same namespace to modify and validate</title>
<updated>2022-05-03T22:25:58Z</updated>
<author>
<name>Alexey Gladkov</name>
<email>legion@kernel.org</email>
</author>
<published>2022-05-03T13:39:54Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=def7343ff03bbb36ce7a34dcb19cab599f0da446'/>
<id>urn:sha1:def7343ff03bbb36ce7a34dcb19cab599f0da446</id>
<content type='text'>
In the 1f5c135ee509 ("ipc: Store ipc sysctls in the ipc namespace") I
missed that in addition to the modification of sem_ctls[3], the change
is validated. This validation must occur in the same namespace.

Link: https://lore.kernel.org/lkml/875ymnvryb.fsf@email.froward.int.ebiederm.org/
Fixes: 1f5c135ee509 ("ipc: Store ipc sysctls in the ipc namespace")
Signed-off-by: Alexey Gladkov &lt;legion@kernel.org&gt;
Link: https://lkml.kernel.org/r/b3cb9a25cce6becbef77186bc1216071a08a969b.1651584847.git.legion@kernel.org
Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
</feed>
