summaryrefslogtreecommitdiff
AgeCommit messageAuthorFilesLines
2018-09-09userns: move user access out of the mutexJann Horn1-14/+10
2016-09-23Merge branch 'nsfs-ioctls' into HEADEric W. Biederman15-13/+371
2016-09-23nsfs: add ioctl to get a parent namespaceAndrey Vagin5-0/+27
2016-09-23kernel: add a helper to get an owning user namespace for a namespaceAndrey Vagin9-0/+68
2016-09-22userns: When the per user per user namespace limit is reached return ENOSPCEric W. Biederman7-7/+7
2016-08-08userns: Generalize the user namespace count into ucountEric W. Biederman4-25/+49
2016-08-08userns: Make the count of user namespaces per userEric W. Biederman4-30/+117
2016-08-08userns: Add a limit on the number of user namespacesEric W. Biederman4-11/+81
2016-08-08userns: Add per user namespace sysctls.Eric W. Biederman4-3/+120
2016-08-08userns: Free user namespaces in process contextEric W. Biederman2-5/+14
2016-06-24fs: Limit file caps to the user namespace of the super blockSeth Forshee3-0/+22
2016-01-04kernel/*: switch to memdup_user_nul()Al Viro4-95/+48
2015-09-04capabilities: ambient capabilitiesAndy Lutomirski6-11/+113
2015-08-12userns,pidns: Force thread group sharing, not signal handler sharing.Eric W. Biederman2-6/+6
2014-12-17Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds11-55/+374
2014-12-12userns; Correct the comment in map_writeEric W. Biederman1-1/+1
2014-12-12userns: Allow setting gid_maps without privilege when setgroups is disabledEric W. Biederman1-0/+5
2014-12-12userns: Add a knob to disable setgroups on a per user namespace basisEric W. Biederman4-0/+146
2014-12-09userns: Rename id_map_mutex to userns_state_mutexEric W. Biederman1-8/+6
2014-12-09userns: Only allow the creator of the userns unprivileged mappingsEric W. Biederman1-2/+4
2014-12-09userns: Check euid no fsuid when establishing an unprivileged uid mappingEric W. Biederman1-1/+1
2014-12-09userns: Don't allow unprivileged creation of gid mappingsEric W. Biederman1-4/+0
2014-12-09userns: Don't allow setgroups until a gid mapping has been setablishedEric W. Biederman3-1/+22
2014-12-06userns: Document what the invariant required for safe unprivileged mappings.Eric W. Biederman1-1/+3
2014-12-04copy address of proc_ns_ops into ns_commonAl Viro13-10/+34
2014-12-04new helpers: ns_alloc_inum/ns_free_inumAl Viro7-13/+16
2014-12-04make proc_ns_operations work with struct ns_common * instead of void *Al Viro9-65/+28
2014-12-04switch the rest of proc_ns_operations to working with &...->nsAl Viro4-22/+36
2014-12-04common object embedded into various struct ....nsAl Viro17-29/+43
2014-08-08proc: constify seq_operationsFabian Frederick3-7/+7
2014-06-06kernel/user_namespace.c: kernel-doc/checkpatch fixesFabian Frederick1-13/+20
2014-04-14user namespace: fix incorrect memory barriersMikulas Patocka1-6/+5
2014-04-03kernel: audit/fix non-modular users of module_init in core codePaul Gortmaker6-9/+7
2014-02-20user_namespace.c: Remove duplicated word in commentBrian Campbell1-1/+1
2013-09-24KEYS: Add per-user_namespace registers for persistent per-UID kerberos cachesDavid Howells11-0/+230
2013-09-07Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds27-104/+177
2013-08-27userns: Better restrictions on when proc and sysfs can be mountedEric W. Biederman7-23/+33
2013-08-08userns: limit the maximum depth of user_namespace->parent chainOleg Nesterov2-0/+5
2013-08-06userns: unshare_userns(&cred) should not populate cred on failureOleg Nesterov1-4/+9
2013-05-02Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds385-14539/+7395
2013-05-01proc: Split the namespace stuff out into linux/proc_ns.hDavid Howells15-92/+109
2013-04-15userns: Changing any namespace id mappings should require privilegesAndy Lutomirski1-3/+3
2013-04-15userns: Check uid_map's opener's fsuid, not the current fsuidAndy Lutomirski1-2/+2
2013-04-15userns: Don't let unprivileged users trick privileged users into setting the ...Eric W. Biederman1-4/+8
2013-03-27userns: Restrict when proc and sysfs can be mountedEric W. Biederman6-0/+37
2013-03-27userns: Don't allow creation if the user is chrootedEric W. Biederman3-0/+35
2013-03-13userns: Don't allow CLONE_NEWUSER | CLONE_FSEric W. Biederman2-1/+8
2013-01-27userns: Allow any uid or gid mappings that don't overlap.Eric W. Biederman1-6/+39
2013-01-27userns: Avoid recursion in put_user_nsEric W. Biederman3-16/+15
2012-12-15userns: Fix typo in description of the limitation of userns_installEric W. Biederman1-1/+1
[next]