summaryrefslogtreecommitdiffstats
path: root/fs/namespace.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'driver-core-3.14-rc1' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2014-01-211-0/+2
|\
| * sysfs, kernfs: prepare mount path for kernfsTejun Heo2013-11-301-0/+2
* | vfs: Fix a regression in mounting procEric W. Biederman2013-11-271-1/+1
|/
* RCU'd vfsmountsAl Viro2013-11-091-48/+87
* split __lookup_mnt() in two functionsAl Viro2013-10-251-19/+23
* new helpers: lock_mount_hash/unlock_mount_hashAl Viro2013-10-251-48/+48
* namespace.c: get rid of mnt_ghostsAl Viro2013-10-251-15/+7
* fold dup_mnt_ns() into its only surviving callerAl Viro2013-10-251-30/+18
* mnt_set_expiry() doesn't need vfsmount_lockAl Viro2013-10-251-2/+0
* finish_automount() doesn't need vfsmount_lock for removal from expiry listAl Viro2013-10-251-2/+0
* fs/namespace.c: bury long-dead defineAl Viro2013-10-251-2/+0
* fold mntfree() into mntput_no_expire()Al Viro2013-10-251-23/+16
* do_remount(): pull touch_mnt_namespace() upAl Viro2013-10-251-5/+1
* dup_mnt_ns(): get rid of pointless grabbing of vfsmount_lockAl Viro2013-10-251-2/+0
* fs_is_visible only needs namespace_sem held sharedAl Viro2013-10-251-2/+2
* initialize namespace_sem staticallyAl Viro2013-10-251-3/+1
* put_mnt_ns(): use drop_collected_mounts()Al Viro2013-10-251-5/+1
* initmpfs: move rootfs code from fs/ramfs/ to init/Rob Landley2013-09-121-1/+1
* rename user_path_umountat() to user_path_mountpoint_at()Al Viro2013-09-091-1/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-09-071-6/+5
|\
| * vfs: check unlinked ancestors before mountMiklos Szeredi2013-09-051-6/+5
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2013-09-071-26/+95
|\ \ | |/ |/|
| * userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-311-2/+2
| * userns: Better restrictions on when proc and sysfs can be mountedEric W. Biederman2013-08-271-12/+25
| * vfs: Don't copy mount bind mounts of /proc/<pid>/ns/mnt between namespacesEric W. Biederman2013-08-271-12/+34
| * vfs: Lock in place mounts from more privileged usersEric W. Biederman2013-07-241-0/+34
* | vfs: allow umount to handle mountpoints without revalidating themJeff Layton2013-09-041-1/+1
* | VFS: collect_mounts() should return an ERR_PTRDan Carpenter2013-08-241-1/+1
|/
* create_mnt_ns: unidiomatic use of list_add()Al Viro2013-05-041-1/+1
* do_mount(): fix a leak introduced in 3.9 ("mount: consolidate permission chec...Al Viro2013-05-041-3/+2
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-05-021-146/+195
|\
| * proc: Split the namespace stuff out into linux/proc_ns.hDavid Howells2013-05-011-3/+3
| * fold release_mounts() into namespace_unlock()Al Viro2013-04-091-23/+30
| * switch unlock_mount() to namespace_unlock(), convert all umount_tree() callersAl Viro2013-04-091-19/+14
| * more conversions to namespace_unlock()Al Viro2013-04-091-14/+6
| * get rid of the second argument of shrink_submounts()Al Viro2013-04-091-4/+4
| * saner umount_tree()/release_mounts(), part 1Al Viro2013-04-091-4/+13
| * get rid of full-hash scan on detaching vfsmountsAl Viro2013-04-091-92/+137
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-04-091-1/+1
|\|
| * mnt: release locks on error path in do_loopbackAndrey Vagin2013-04-091-1/+1
* | userns: Restrict when proc and sysfs can be mountedEric W. Biederman2013-03-271-0/+21
* | vfs: Carefully propogate mounts across user namespacesEric W. Biederman2013-03-271-1/+5
* | vfs: Add a mount flag to lock read only bind mountsEric W. Biederman2013-03-271-0/+3
* | userns: Don't allow creation if the user is chrootedEric W. Biederman2013-03-271-0/+24
|/
* new helper: file_inode(file)Al Viro2013-02-231-1/+1
* mount: consolidate permission checksAl Viro2013-02-231-33/+7
* get rid of unprotected dereferencing of mnt->mnt_nsAl Viro2013-02-231-12/+17
* vfs, freeze: use ACCESS_ONCE() to guard access to ->mnt_flagsMiao Xie2012-12-201-1/+1
* userns: Require CAP_SYS_ADMIN for most uses of setns.Eric W. Biederman2012-12-151-1/+2
* proc: Usable inode numbers for the namespace file descriptors.Eric W. Biederman2012-11-201-0/+14