summaryrefslogtreecommitdiffstats
path: root/kernel/user_namespace.c
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2021-06-281-1/+8
|\
| * ucounts: Set ucount_max to the largest positive value the type can holdAlexey Gladkov2021-04-301-4/+4
| * Reimplement RLIMIT_MEMLOCK on top of ucountsAlexey Gladkov2021-04-301-0/+1
| * Reimplement RLIMIT_SIGPENDING on top of ucountsAlexey Gladkov2021-04-301-0/+1
| * Reimplement RLIMIT_MSGQUEUE on top of ucountsAlexey Gladkov2021-04-301-0/+1
| * Reimplement RLIMIT_NPROC on top of ucountsAlexey Gladkov2021-04-301-1/+2
| * Add a reference to ucounts for each credAlexey Gladkov2021-04-301-0/+3
* | kernel/user_namespace.c: fix typosXiaofeng Cao2021-05-071-3/+3
|/
* capabilities: require CAP_SETFCAP to map uid 0Serge E. Hallyn2021-04-201-3/+62
* Merge tag 'fixes-v5.11' of git://git.kernel.org/pub/scm/linux/kernel/git/brau...Linus Torvalds2020-12-141-2/+2
|\
| * user: Use generic ns_common::countKirill Tkhai2020-08-191-2/+2
* | kernel/: fix repeated words in commentsRandy Dunlap2020-10-161-1/+1
|/
* nsproxy: add struct nssetChristian Brauner2020-05-091-4/+4
* Merge tag 'keys-namespace-20190627' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2019-07-081-5/+4
|\
| * keys: Move the user and user-session keyrings to the user_namespaceDavid Howells2019-06-261-3/+1
| * keys: Namespace keyring namesDavid Howells2019-06-261-3/+4
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner2019-06-051-6/+1
|/
* userns: also map extents in the reverse map to kernel IDsJann Horn2018-11-071-4/+8
* userns: move user access out of the mutexJann Horn2018-08-111-14/+10
* treewide: kmalloc() -> kmalloc_array()Kees Cook2018-06-121-2/+3
* fuse: Restrict allow_other to the superblock's namespace or a descendantSeth Forshee2018-03-201-0/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2017-11-161-58/+291
|\
| * userns: Simplify insert_extentEric W. Biederman2017-10-311-11/+8
| * userns: Make map_id_down a wrapper for map_id_range_downEric W. Biederman2017-10-311-37/+1
| * userns: Don't read extents twice in m_startEric W. Biederman2017-10-311-2/+4
| * userns: Simplify the user and group mapping functionsEric W. Biederman2017-10-311-74/+58
| * userns: Don't special case a count of 0Eric W. Biederman2017-10-311-7/+3
| * userns: bump idmap limits to 340Christian Brauner2017-10-311-30/+320
* | locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns ...Mark Rutland2017-10-251-1/+1
|/
* userns,pidns: Verify the userns for new pid namespacesEric W. Biederman2017-07-201-8/+12
* sched/headers: Prepare for new header dependencies before moving code to <lin...Ingo Molnar2017-03-021-0/+1
* Merge branch 'nsfs-ioctls' into HEADEric W. Biederman2016-09-221-0/+25
|\
| * nsfs: add ioctl to get a parent namespaceAndrey Vagin2016-09-221-0/+1
| * kernel: add a helper to get an owning user namespace for a namespaceAndrey Vagin2016-09-221-0/+24
* | userns: When the per user per user namespace limit is reached return ENOSPCEric W. Biederman2016-09-221-1/+1
* | userns: Generalize the user namespace count into ucountEric W. Biederman2016-08-081-2/+14
* | userns: Make the count of user namespaces per userEric W. Biederman2016-08-081-4/+7
* | userns: Add a limit on the number of user namespacesEric W. Biederman2016-08-081-11/+20
* | userns: Add per user namespace sysctls.Eric W. Biederman2016-08-081-2/+16
* | userns: Free user namespaces in process contextEric W. Biederman2016-08-081-3/+11
|/
* fs: Limit file caps to the user namespace of the super blockSeth Forshee2016-06-241-0/+14
* kernel/*: switch to memdup_user_nul()Al Viro2016-01-041-14/+7
* capabilities: ambient capabilitiesAndy Lutomirski2015-09-041-0/+1
* userns,pidns: Force thread group sharing, not signal handler sharing.Eric W. Biederman2015-08-121-2/+2
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2014-12-171-11/+113
|\
| * userns; Correct the comment in map_writeEric W. Biederman2014-12-111-1/+1
| * userns: Allow setting gid_maps without privilege when setgroups is disabledEric W. Biederman2014-12-111-0/+5
| * userns: Add a knob to disable setgroups on a per user namespace basisEric W. Biederman2014-12-111-0/+85
| * userns: Rename id_map_mutex to userns_state_mutexEric W. Biederman2014-12-091-8/+6
| * userns: Only allow the creator of the userns unprivileged mappingsEric W. Biederman2014-12-091-2/+4