| Commit message (Expand) | Author | Age | Files | Lines |
* | userns,pidns: Verify the userns for new pid namespaces | Eric W. Biederman | 2017-07-20 | 1 | -8/+12 |
* | sched/headers: Prepare for new header dependencies before moving code to <lin... | Ingo Molnar | 2017-03-02 | 1 | -0/+1 |
* | Merge branch 'nsfs-ioctls' into HEAD | Eric W. Biederman | 2016-09-23 | 1 | -0/+25 |
|\ |
|
| * | nsfs: add ioctl to get a parent namespace | Andrey Vagin | 2016-09-23 | 1 | -0/+1 |
| * | kernel: add a helper to get an owning user namespace for a namespace | Andrey Vagin | 2016-09-23 | 1 | -0/+24 |
* | | userns: When the per user per user namespace limit is reached return ENOSPC | Eric W. Biederman | 2016-09-22 | 1 | -1/+1 |
* | | userns: Generalize the user namespace count into ucount | Eric W. Biederman | 2016-08-08 | 1 | -2/+14 |
* | | userns: Make the count of user namespaces per user | Eric W. Biederman | 2016-08-08 | 1 | -4/+7 |
* | | userns: Add a limit on the number of user namespaces | Eric W. Biederman | 2016-08-08 | 1 | -11/+20 |
* | | userns: Add per user namespace sysctls. | Eric W. Biederman | 2016-08-08 | 1 | -2/+16 |
* | | userns: Free user namespaces in process context | Eric W. Biederman | 2016-08-08 | 1 | -3/+11 |
|/ |
|
* | fs: Limit file caps to the user namespace of the super block | Seth Forshee | 2016-06-24 | 1 | -0/+14 |
* | kernel/*: switch to memdup_user_nul() | Al Viro | 2016-01-04 | 1 | -14/+7 |
* | capabilities: ambient capabilities | Andy Lutomirski | 2015-09-05 | 1 | -0/+1 |
* | userns,pidns: Force thread group sharing, not signal handler sharing. | Eric W. Biederman | 2015-08-12 | 1 | -2/+2 |
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi... | Linus Torvalds | 2014-12-17 | 1 | -11/+113 |
|\ |
|
| * | userns; Correct the comment in map_write | Eric W. Biederman | 2014-12-12 | 1 | -1/+1 |
| * | userns: Allow setting gid_maps without privilege when setgroups is disabled | Eric W. Biederman | 2014-12-12 | 1 | -0/+5 |
| * | userns: Add a knob to disable setgroups on a per user namespace basis | Eric W. Biederman | 2014-12-12 | 1 | -0/+85 |
| * | userns: Rename id_map_mutex to userns_state_mutex | Eric W. Biederman | 2014-12-10 | 1 | -8/+6 |
| * | userns: Only allow the creator of the userns unprivileged mappings | Eric W. Biederman | 2014-12-10 | 1 | -2/+4 |
| * | userns: Check euid no fsuid when establishing an unprivileged uid mapping | Eric W. Biederman | 2014-12-10 | 1 | -1/+1 |
| * | userns: Don't allow unprivileged creation of gid mappings | Eric W. Biederman | 2014-12-10 | 1 | -4/+0 |
| * | userns: Don't allow setgroups until a gid mapping has been setablished | Eric W. Biederman | 2014-12-09 | 1 | -0/+14 |
| * | userns: Document what the invariant required for safe unprivileged mappings. | Eric W. Biederman | 2014-12-06 | 1 | -1/+3 |
* | | copy address of proc_ns_ops into ns_common | Al Viro | 2014-12-04 | 1 | -0/+1 |
* | | new helpers: ns_alloc_inum/ns_free_inum | Al Viro | 2014-12-04 | 1 | -2/+2 |
* | | make proc_ns_operations work with struct ns_common * instead of void * | Al Viro | 2014-12-04 | 1 | -9/+3 |
* | | switch the rest of proc_ns_operations to working with &...->ns | Al Viro | 2014-12-04 | 1 | -5/+9 |
* | | common object embedded into various struct ....ns | Al Viro | 2014-12-04 | 1 | -3/+3 |
|/ |
|
* | proc: constify seq_operations | Fabian Frederick | 2014-08-09 | 1 | -3/+3 |
* | kernel/user_namespace.c: kernel-doc/checkpatch fixes | Fabian Frederick | 2014-06-07 | 1 | -13/+20 |
* | user namespace: fix incorrect memory barriers | Mikulas Patocka | 2014-04-15 | 1 | -6/+5 |
* | kernel: audit/fix non-modular users of module_init in core code | Paul Gortmaker | 2014-04-04 | 1 | -1/+1 |
* | user_namespace.c: Remove duplicated word in comment | Brian Campbell | 2014-02-20 | 1 | -1/+1 |
* | KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches | David Howells | 2013-09-24 | 1 | -0/+6 |
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi... | Linus Torvalds | 2013-09-07 | 1 | -2/+0 |
|\ |
|
| * | userns: Better restrictions on when proc and sysfs can be mounted | Eric W. Biederman | 2013-08-27 | 1 | -2/+0 |
* | | userns: limit the maximum depth of user_namespace->parent chain | Oleg Nesterov | 2013-08-08 | 1 | -0/+4 |
* | | userns: unshare_userns(&cred) should not populate cred on failure | Oleg Nesterov | 2013-08-06 | 1 | -4/+9 |
|/ |
|
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir... | Linus Torvalds | 2013-05-02 | 1 | -1/+1 |
|\ |
|
| * | proc: Split the namespace stuff out into linux/proc_ns.h | David Howells | 2013-05-01 | 1 | -1/+1 |
* | | userns: Changing any namespace id mappings should require privileges | Andy Lutomirski | 2013-04-15 | 1 | -3/+3 |
* | | userns: Check uid_map's opener's fsuid, not the current fsuid | Andy Lutomirski | 2013-04-15 | 1 | -2/+2 |
* | | userns: Don't let unprivileged users trick privileged users into setting the ... | Eric W. Biederman | 2013-04-15 | 1 | -4/+8 |
* | | userns: Restrict when proc and sysfs can be mounted | Eric W. Biederman | 2013-03-27 | 1 | -0/+2 |
* | | userns: Don't allow creation if the user is chrooted | Eric W. Biederman | 2013-03-27 | 1 | -0/+9 |
|/ |
|
* | userns: Don't allow CLONE_NEWUSER | CLONE_FS | Eric W. Biederman | 2013-03-13 | 1 | -0/+4 |
* | userns: Allow any uid or gid mappings that don't overlap. | Eric W. Biederman | 2013-01-27 | 1 | -6/+39 |
* | userns: Avoid recursion in put_user_ns | Eric W. Biederman | 2013-01-27 | 1 | -8/+9 |