aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/user_namespace.c (follow)
AgeCommit message (Expand)AuthorFilesLines
2020-05-09nsproxy: add struct nssetChristian Brauner1-4/+4
2019-07-08Merge tag 'keys-namespace-20190627' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fsLinus Torvalds1-5/+4
2019-06-26keys: Move the user and user-session keyrings to the user_namespaceDavid Howells1-3/+1
2019-06-26keys: Namespace keyring namesDavid Howells1-3/+4
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 441Thomas Gleixner1-6/+1
2018-11-07userns: also map extents in the reverse map to kernel IDsJann Horn1-4/+8
2018-08-11userns: move user access out of the mutexJann Horn1-14/+10
2018-06-12treewide: kmalloc() -> kmalloc_array()Kees Cook1-2/+3
2018-03-20fuse: Restrict allow_other to the superblock's namespace or a descendantSeth Forshee1-0/+1
2017-11-16Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespaceLinus Torvalds1-58/+291
2017-10-31userns: Simplify insert_extentEric W. Biederman1-11/+8
2017-10-31userns: Make map_id_down a wrapper for map_id_range_downEric W. Biederman1-37/+1
2017-10-31userns: Don't read extents twice in m_startEric W. Biederman1-2/+4
2017-10-31userns: Simplify the user and group mapping functionsEric W. Biederman1-74/+58
2017-10-31userns: Don't special case a count of 0Eric W. Biederman1-7/+3
2017-10-31userns: bump idmap limits to 340Christian Brauner1-30/+320
2017-10-25locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE()Mark Rutland1-1/+1
2017-07-20userns,pidns: Verify the userns for new pid namespacesEric W. Biederman1-8/+12
2017-03-02sched/headers: Prepare for new header dependencies before moving code to <linux/sched/signal.h>Ingo Molnar1-0/+1
2016-09-22Merge branch 'nsfs-ioctls' into HEADEric W. Biederman1-0/+25
2016-09-22nsfs: add ioctl to get a parent namespaceAndrey Vagin1-0/+1
2016-09-22kernel: add a helper to get an owning user namespace for a namespaceAndrey Vagin1-0/+24
2016-09-22userns: When the per user per user namespace limit is reached return ENOSPCEric W. Biederman1-1/+1
2016-08-08userns: Generalize the user namespace count into ucountEric W. Biederman1-2/+14
2016-08-08userns: Make the count of user namespaces per userEric W. Biederman1-4/+7
2016-08-08userns: Add a limit on the number of user namespacesEric W. Biederman1-11/+20
2016-08-08userns: Add per user namespace sysctls.Eric W. Biederman1-2/+16
2016-08-08userns: Free user namespaces in process contextEric W. Biederman1-3/+11
2016-06-24fs: Limit file caps to the user namespace of the super blockSeth Forshee1-0/+14
2016-01-04kernel/*: switch to memdup_user_nul()Al Viro1-14/+7
2015-09-04capabilities: ambient capabilitiesAndy Lutomirski1-0/+1
2015-08-12userns,pidns: Force thread group sharing, not signal handler sharing.Eric W. Biederman1-2/+2
2014-12-17Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespaceLinus Torvalds1-11/+113
2014-12-11userns; Correct the comment in map_writeEric W. Biederman1-1/+1
2014-12-11userns: Allow setting gid_maps without privilege when setgroups is disabledEric W. Biederman1-0/+5
2014-12-11userns: Add a knob to disable setgroups on a per user namespace basisEric W. Biederman1-0/+85
2014-12-09userns: Rename id_map_mutex to userns_state_mutexEric W. Biederman1-8/+6
2014-12-09userns: Only allow the creator of the userns unprivileged mappingsEric W. Biederman1-2/+4
2014-12-09userns: Check euid no fsuid when establishing an unprivileged uid mappingEric W. Biederman1-1/+1
2014-12-09userns: Don't allow unprivileged creation of gid mappingsEric W. Biederman1-4/+0
2014-12-09userns: Don't allow setgroups until a gid mapping has been setablishedEric W. Biederman1-0/+14
2014-12-05userns: Document what the invariant required for safe unprivileged mappings.Eric W. Biederman1-1/+3
2014-12-04copy address of proc_ns_ops into ns_commonAl Viro1-0/+1
2014-12-04new helpers: ns_alloc_inum/ns_free_inumAl Viro1-2/+2
2014-12-04make proc_ns_operations work with struct ns_common * instead of void *Al Viro1-9/+3
2014-12-04switch the rest of proc_ns_operations to working with &...->nsAl Viro1-5/+9
2014-12-04common object embedded into various struct ....nsAl Viro1-3/+3
2014-08-08proc: constify seq_operationsFabian Frederick1-3/+3
2014-06-06kernel/user_namespace.c: kernel-doc/checkpatch fixesFabian Frederick1-13/+20
2014-04-14user namespace: fix incorrect memory barriersMikulas Patocka1-6/+5