summaryrefslogtreecommitdiffstats
path: root/kernel/user_namespace.c
Commit message (Expand)AuthorAgeFilesLines
...
* | userns: limit the maximum depth of user_namespace->parent chainOleg Nesterov2013-08-081-0/+4
* | userns: unshare_userns(&cred) should not populate cred on failureOleg Nesterov2013-08-061-4/+9
|/
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-05-011-1/+1
|\
| * proc: Split the namespace stuff out into linux/proc_ns.hDavid Howells2013-05-011-1/+1
* | userns: Changing any namespace id mappings should require privilegesAndy Lutomirski2013-04-141-3/+3
* | userns: Check uid_map's opener's fsuid, not the current fsuidAndy Lutomirski2013-04-141-2/+2
* | userns: Don't let unprivileged users trick privileged users into setting the ...Eric W. Biederman2013-04-141-4/+8
* | userns: Restrict when proc and sysfs can be mountedEric W. Biederman2013-03-271-0/+2
* | userns: Don't allow creation if the user is chrootedEric W. Biederman2013-03-271-0/+9
|/
* userns: Don't allow CLONE_NEWUSER | CLONE_FSEric W. Biederman2013-03-131-0/+4
* userns: Allow any uid or gid mappings that don't overlap.Eric W. Biederman2013-01-261-6/+39
* userns: Avoid recursion in put_user_nsEric W. Biederman2013-01-261-8/+9
* userns: Fix typo in description of the limitation of userns_installEric W. Biederman2012-12-141-1/+1
* proc: Usable inode numbers for the namespace file descriptors.Eric W. Biederman2012-11-201-0/+15
* userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct ...Eric W. Biederman2012-11-201-2/+10
* userns: Implement unshare of the user namespaceEric W. Biederman2012-11-201-0/+15
* userns: Implent proc namespace operationsEric W. Biederman2012-11-201-17/+73
* userns: Allow setting a userns mapping to your current uid.Eric W. Biederman2012-11-201-0/+15
* userns: Add kprojid_t and associated infrastructure in projid.hEric W. Biederman2012-09-181-1/+127
* userns: Store uid and gid values in struct cred with kuid_t and kgid_t typesEric W. Biederman2012-05-031-2/+2
* userns: Rework the user_namespace adding uid/gid mapping supportEric W. Biederman2012-04-261-41/+504
* userns: Simplify the user_namespace by making userns->creator a kuid.Eric W. Biederman2012-04-261-22/+20
* userns: Disassociate user_struct from the user_namespace.Eric W. Biederman2012-04-071-5/+1
* userns: Start out with a full set of capabilities.Eric W. Biederman2012-04-071-0/+9
* userns: Add an explicit reference to the parent user namespaceEric W. Biederman2012-04-071-7/+6
* cred: Refcount the user_ns pointed to by the cred.Eric W. Biederman2012-04-071-3/+5
* userns: Use cred->user_ns instead of cred->user->user_nsEric W. Biederman2012-04-071-2/+2
* kernel: Map most files to use export.h instead of module.hPaul Gortmaker2011-10-311-1/+1
* user_ns: improve the user_ns on-the-slab packagingPavel Emelyanov2011-01-131-3/+12
* user_ns: Introduce user_nsmap_uid and user_ns_map_gid.Eric W. Biederman2010-06-161-0/+44
* kref: remove kref_setNeilBrown2010-05-211-2/+2
* Fix recursive lock in free_uid()/free_user_ns()David Howells2009-02-271-4/+17
* User namespaces: set of cleanups (v2)Serge Hallyn2008-11-241-45/+30
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-1/+11
* CRED: Wrap task credential accesses in the core kernelDavid Howells2008-11-141-1/+1
* removed unused #include <linux/version.h>'sAdrian Bunk2008-08-231-1/+0
* eCryptfs: make key module subsystem respect namespacesMichael Halcrow2008-04-291-0/+1
* kernel: explicitly include required header files under kernel/Robert P. J. Day2008-04-291-0/+1
* namespaces: cleanup the code managed with the USER_NS optionPavel Emelyanov2008-02-081-13/+0
* Fix user namespace exiting OOPsPavel Emelyanov2007-09-191-1/+1
* Convert uid hash to hlistPavel Emelyanov2007-09-191-1/+1
* userns: don't leak root userAlexey Dobriyan2007-08-311-0/+1
* fix create_new_namespaces() return valueCedric Le Goater2007-07-161-3/+3
* user namespace: add unshareSerge E. Hallyn2007-07-161-1/+45
* user namespace: add the frameworkCedric Le Goater2007-07-161-0/+43