aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/user_namespace.c
Commit message (Expand)AuthorAge
* Merge branch 'nsfs-ioctls' into HEADEric W. Biederman2016-09-22
|\
| * nsfs: add ioctl to get a parent namespaceAndrey Vagin2016-09-22
| * kernel: add a helper to get an owning user namespace for a namespaceAndrey Vagin2016-09-22
* | userns: When the per user per user namespace limit is reached return ENOSPCEric W. Biederman2016-09-22
* | userns: Generalize the user namespace count into ucountEric W. Biederman2016-08-08
* | userns: Make the count of user namespaces per userEric W. Biederman2016-08-08
* | userns: Add a limit on the number of user namespacesEric W. Biederman2016-08-08
* | userns: Add per user namespace sysctls.Eric W. Biederman2016-08-08
* | userns: Free user namespaces in process contextEric W. Biederman2016-08-08
|/
* fs: Limit file caps to the user namespace of the super blockSeth Forshee2016-06-24
* kernel/*: switch to memdup_user_nul()Al Viro2016-01-04
* capabilities: ambient capabilitiesAndy Lutomirski2015-09-04
* userns,pidns: Force thread group sharing, not signal handler sharing.Eric W. Biederman2015-08-12
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2014-12-17
|\
| * userns; Correct the comment in map_writeEric W. Biederman2014-12-11
| * userns: Allow setting gid_maps without privilege when setgroups is disabledEric W. Biederman2014-12-11
| * userns: Add a knob to disable setgroups on a per user namespace basisEric W. Biederman2014-12-11
| * userns: Rename id_map_mutex to userns_state_mutexEric W. Biederman2014-12-09
| * userns: Only allow the creator of the userns unprivileged mappingsEric W. Biederman2014-12-09
| * userns: Check euid no fsuid when establishing an unprivileged uid mappingEric W. Biederman2014-12-09
| * userns: Don't allow unprivileged creation of gid mappingsEric W. Biederman2014-12-09
| * userns: Don't allow setgroups until a gid mapping has been setablishedEric W. Biederman2014-12-09
| * userns: Document what the invariant required for safe unprivileged mappings.Eric W. Biederman2014-12-05
* | copy address of proc_ns_ops into ns_commonAl Viro2014-12-04
* | new helpers: ns_alloc_inum/ns_free_inumAl Viro2014-12-04
* | make proc_ns_operations work with struct ns_common * instead of void *Al Viro2014-12-04
* | switch the rest of proc_ns_operations to working with &...->nsAl Viro2014-12-04
* | common object embedded into various struct ....nsAl Viro2014-12-04
|/
* proc: constify seq_operationsFabian Frederick2014-08-08
* kernel/user_namespace.c: kernel-doc/checkpatch fixesFabian Frederick2014-06-06
* user namespace: fix incorrect memory barriersMikulas Patocka2014-04-14
* kernel: audit/fix non-modular users of module_init in core codePaul Gortmaker2014-04-03
* user_namespace.c: Remove duplicated word in commentBrian Campbell2014-02-20
* KEYS: Add per-user_namespace registers for persistent per-UID kerberos cachesDavid Howells2013-09-24
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2013-09-07
|\
| * userns: Better restrictions on when proc and sysfs can be mountedEric W. Biederman2013-08-26
* | userns: limit the maximum depth of user_namespace->parent chainOleg Nesterov2013-08-08
* | userns: unshare_userns(&cred) should not populate cred on failureOleg Nesterov2013-08-06
|/
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-05-01
|\
| * proc: Split the namespace stuff out into linux/proc_ns.hDavid Howells2013-05-01
* | userns: Changing any namespace id mappings should require privilegesAndy Lutomirski2013-04-14
* | userns: Check uid_map's opener's fsuid, not the current fsuidAndy Lutomirski2013-04-14
* | userns: Don't let unprivileged users trick privileged users into setting the ...Eric W. Biederman2013-04-14
* | userns: Restrict when proc and sysfs can be mountedEric W. Biederman2013-03-27
* | userns: Don't allow creation if the user is chrootedEric W. Biederman2013-03-27
|/
* userns: Don't allow CLONE_NEWUSER | CLONE_FSEric W. Biederman2013-03-13
* userns: Allow any uid or gid mappings that don't overlap.Eric W. Biederman2013-01-27
* userns: Avoid recursion in put_user_nsEric W. Biederman2013-01-27
* userns: Fix typo in description of the limitation of userns_installEric W. Biederman2012-12-14
* proc: Usable inode numbers for the namespace file descriptors.Eric W. Biederman2012-11-20