index
:
blackbird-obmc-linux
dev-5.0-raptor-04-16-2019
dev-5.0-raptor-04-16-2019-dev
Blackbird™ Linux sources for OpenBMC
Raptor Computing Systems
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
kernel
/
user_namespace.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
kernel/*: switch to memdup_user_nul()
Al Viro
2016-01-04
1
-14
/
+7
*
capabilities: ambient capabilities
Andy Lutomirski
2015-09-04
1
-0
/
+1
*
userns,pidns: Force thread group sharing, not signal handler sharing.
Eric W. Biederman
2015-08-12
1
-2
/
+2
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
2014-12-17
1
-11
/
+113
|
\
|
*
userns; Correct the comment in map_write
Eric W. Biederman
2014-12-11
1
-1
/
+1
|
*
userns: Allow setting gid_maps without privilege when setgroups is disabled
Eric W. Biederman
2014-12-11
1
-0
/
+5
|
*
userns: Add a knob to disable setgroups on a per user namespace basis
Eric W. Biederman
2014-12-11
1
-0
/
+85
|
*
userns: Rename id_map_mutex to userns_state_mutex
Eric W. Biederman
2014-12-09
1
-8
/
+6
|
*
userns: Only allow the creator of the userns unprivileged mappings
Eric W. Biederman
2014-12-09
1
-2
/
+4
|
*
userns: Check euid no fsuid when establishing an unprivileged uid mapping
Eric W. Biederman
2014-12-09
1
-1
/
+1
|
*
userns: Don't allow unprivileged creation of gid mappings
Eric W. Biederman
2014-12-09
1
-4
/
+0
|
*
userns: Don't allow setgroups until a gid mapping has been setablished
Eric W. Biederman
2014-12-09
1
-0
/
+14
|
*
userns: Document what the invariant required for safe unprivileged mappings.
Eric W. Biederman
2014-12-05
1
-1
/
+3
*
|
copy address of proc_ns_ops into ns_common
Al Viro
2014-12-04
1
-0
/
+1
*
|
new helpers: ns_alloc_inum/ns_free_inum
Al Viro
2014-12-04
1
-2
/
+2
*
|
make proc_ns_operations work with struct ns_common * instead of void *
Al Viro
2014-12-04
1
-9
/
+3
*
|
switch the rest of proc_ns_operations to working with &...->ns
Al Viro
2014-12-04
1
-5
/
+9
*
|
common object embedded into various struct ....ns
Al Viro
2014-12-04
1
-3
/
+3
|
/
*
proc: constify seq_operations
Fabian Frederick
2014-08-08
1
-3
/
+3
*
kernel/user_namespace.c: kernel-doc/checkpatch fixes
Fabian Frederick
2014-06-06
1
-13
/
+20
*
user namespace: fix incorrect memory barriers
Mikulas Patocka
2014-04-14
1
-6
/
+5
*
kernel: audit/fix non-modular users of module_init in core code
Paul Gortmaker
2014-04-03
1
-1
/
+1
*
user_namespace.c: Remove duplicated word in comment
Brian Campbell
2014-02-20
1
-1
/
+1
*
KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches
David Howells
2013-09-24
1
-0
/
+6
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
2013-09-07
1
-2
/
+0
|
\
|
*
userns: Better restrictions on when proc and sysfs can be mounted
Eric W. Biederman
2013-08-26
1
-2
/
+0
*
|
userns: limit the maximum depth of user_namespace->parent chain
Oleg Nesterov
2013-08-08
1
-0
/
+4
*
|
userns: unshare_userns(&cred) should not populate cred on failure
Oleg Nesterov
2013-08-06
1
-4
/
+9
|
/
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...
Linus Torvalds
2013-05-01
1
-1
/
+1
|
\
|
*
proc: Split the namespace stuff out into linux/proc_ns.h
David Howells
2013-05-01
1
-1
/
+1
*
|
userns: Changing any namespace id mappings should require privileges
Andy Lutomirski
2013-04-14
1
-3
/
+3
*
|
userns: Check uid_map's opener's fsuid, not the current fsuid
Andy Lutomirski
2013-04-14
1
-2
/
+2
*
|
userns: Don't let unprivileged users trick privileged users into setting the ...
Eric W. Biederman
2013-04-14
1
-4
/
+8
*
|
userns: Restrict when proc and sysfs can be mounted
Eric W. Biederman
2013-03-27
1
-0
/
+2
*
|
userns: Don't allow creation if the user is chrooted
Eric W. Biederman
2013-03-27
1
-0
/
+9
|
/
*
userns: Don't allow CLONE_NEWUSER | CLONE_FS
Eric W. Biederman
2013-03-13
1
-0
/
+4
*
userns: Allow any uid or gid mappings that don't overlap.
Eric W. Biederman
2013-01-26
1
-6
/
+39
*
userns: Avoid recursion in put_user_ns
Eric W. Biederman
2013-01-26
1
-8
/
+9
*
userns: Fix typo in description of the limitation of userns_install
Eric W. Biederman
2012-12-14
1
-1
/
+1
*
proc: Usable inode numbers for the namespace file descriptors.
Eric W. Biederman
2012-11-20
1
-0
/
+15
*
userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct ...
Eric W. Biederman
2012-11-20
1
-2
/
+10
*
userns: Implement unshare of the user namespace
Eric W. Biederman
2012-11-20
1
-0
/
+15
*
userns: Implent proc namespace operations
Eric W. Biederman
2012-11-20
1
-17
/
+73
*
userns: Allow setting a userns mapping to your current uid.
Eric W. Biederman
2012-11-20
1
-0
/
+15
*
userns: Add kprojid_t and associated infrastructure in projid.h
Eric W. Biederman
2012-09-18
1
-1
/
+127
*
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
Eric W. Biederman
2012-05-03
1
-2
/
+2
*
userns: Rework the user_namespace adding uid/gid mapping support
Eric W. Biederman
2012-04-26
1
-41
/
+504
*
userns: Simplify the user_namespace by making userns->creator a kuid.
Eric W. Biederman
2012-04-26
1
-22
/
+20
*
userns: Disassociate user_struct from the user_namespace.
Eric W. Biederman
2012-04-07
1
-5
/
+1
*
userns: Start out with a full set of capabilities.
Eric W. Biederman
2012-04-07
1
-0
/
+9
[next]