index
:
~glisse/linux
amdgpu-debug
bbb-3.8
bxm-3.2
dal
generic-write-protection-rfc
gup
gup-bio-v2
gup-bio-v3
gup-fs-block
gup-scatterlist-v1
hmm
hmm-4.17
hmm-4.19
hmm-4.20
hmm-4.21
hmm-5.1-v2
hmm-5.2-v3
hmm-5.3
hmm-cdm
hmm-cdm-next
hmm-cdm-v2
hmm-cdm-v3
hmm-cdm-v4
hmm-for-4.17
hmm-for-5.1
hmm-intel-v00
hmm-next
hmm-nouveau
hmm-nouveau-5.1
hmm-nouveau-v01
hmm-nouveau-v03
hmm-odp-v2
hmm-p2p
hmm-radeon-v00
hmm-stable
hmm-v10
hmm-v11
hmm-v12
hmm-v13
hmm-v14
hmm-v15
hmm-v16
hmm-v17
hmm-v18
hmm-v19
hmm-v20
hmm-v21
hmm-v22
hmm-v23
hmm-v24
hmm-v25
hmm-v25-4.9
hmm-v25-next
hmm-v9
hmm-y15may21
hms-hbind-v01
kill-page-mapping
kvm-restore-change_pte
master
mmu-notifier
mmu-notifier-context
mmu-notifier-rfc
mmu-notifier-rfc-kvm
mmu-notifier-v05
mmu-notifier-v06
nookhd
nouveau-hmm
nouveau-hmm-v00
nouveau-hmm-v01
odp-5.2
odp-hmm
rdma-5.2
rdma-odp-hmm-v4
scratch
wip-hmm-p2p
wip-kvm-mmu-notifier-opti
wip-p2p-showcase
Linux kernel with some radeon work.
glisse
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
kernel
/
user_namespace.c
Age
Commit message (
Expand
)
Author
Files
Lines
2014-12-17
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-11
/
+113
2014-12-11
userns; Correct the comment in map_write
Eric W. Biederman
1
-1
/
+1
2014-12-11
userns: Allow setting gid_maps without privilege when setgroups is disabled
Eric W. Biederman
1
-0
/
+5
2014-12-11
userns: Add a knob to disable setgroups on a per user namespace basis
Eric W. Biederman
1
-0
/
+85
2014-12-09
userns: Rename id_map_mutex to userns_state_mutex
Eric W. Biederman
1
-8
/
+6
2014-12-09
userns: Only allow the creator of the userns unprivileged mappings
Eric W. Biederman
1
-2
/
+4
2014-12-09
userns: Check euid no fsuid when establishing an unprivileged uid mapping
Eric W. Biederman
1
-1
/
+1
2014-12-09
userns: Don't allow unprivileged creation of gid mappings
Eric W. Biederman
1
-4
/
+0
2014-12-09
userns: Don't allow setgroups until a gid mapping has been setablished
Eric W. Biederman
1
-0
/
+14
2014-12-05
userns: Document what the invariant required for safe unprivileged mappings.
Eric W. Biederman
1
-1
/
+3
2014-12-04
copy address of proc_ns_ops into ns_common
Al Viro
1
-0
/
+1
2014-12-04
new helpers: ns_alloc_inum/ns_free_inum
Al Viro
1
-2
/
+2
2014-12-04
make proc_ns_operations work with struct ns_common * instead of void *
Al Viro
1
-9
/
+3
2014-12-04
switch the rest of proc_ns_operations to working with &...->ns
Al Viro
1
-5
/
+9
2014-12-04
common object embedded into various struct ....ns
Al Viro
1
-3
/
+3
2014-08-08
proc: constify seq_operations
Fabian Frederick
1
-3
/
+3
2014-06-06
kernel/user_namespace.c: kernel-doc/checkpatch fixes
Fabian Frederick
1
-13
/
+20
2014-04-14
user namespace: fix incorrect memory barriers
Mikulas Patocka
1
-6
/
+5
2014-04-03
kernel: audit/fix non-modular users of module_init in core code
Paul Gortmaker
1
-1
/
+1
2014-02-20
user_namespace.c: Remove duplicated word in comment
Brian Campbell
1
-1
/
+1
2013-09-24
KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches
David Howells
1
-0
/
+6
2013-09-07
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-2
/
+0
2013-08-26
userns: Better restrictions on when proc and sysfs can be mounted
Eric W. Biederman
1
-2
/
+0
2013-08-08
userns: limit the maximum depth of user_namespace->parent chain
Oleg Nesterov
1
-0
/
+4
2013-08-06
userns: unshare_userns(&cred) should not populate cred on failure
Oleg Nesterov
1
-4
/
+9
2013-05-01
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...
Linus Torvalds
1
-1
/
+1
2013-05-01
proc: Split the namespace stuff out into linux/proc_ns.h
David Howells
1
-1
/
+1
2013-04-14
userns: Changing any namespace id mappings should require privileges
Andy Lutomirski
1
-3
/
+3
2013-04-14
userns: Check uid_map's opener's fsuid, not the current fsuid
Andy Lutomirski
1
-2
/
+2
2013-04-14
userns: Don't let unprivileged users trick privileged users into setting the ...
Eric W. Biederman
1
-4
/
+8
2013-03-27
userns: Restrict when proc and sysfs can be mounted
Eric W. Biederman
1
-0
/
+2
2013-03-27
userns: Don't allow creation if the user is chrooted
Eric W. Biederman
1
-0
/
+9
2013-03-13
userns: Don't allow CLONE_NEWUSER | CLONE_FS
Eric W. Biederman
1
-0
/
+4
2013-01-26
userns: Allow any uid or gid mappings that don't overlap.
Eric W. Biederman
1
-6
/
+39
2013-01-26
userns: Avoid recursion in put_user_ns
Eric W. Biederman
1
-8
/
+9
2012-12-14
userns: Fix typo in description of the limitation of userns_install
Eric W. Biederman
1
-1
/
+1
2012-11-20
proc: Usable inode numbers for the namespace file descriptors.
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct ...
Eric W. Biederman
1
-2
/
+10
2012-11-20
userns: Implement unshare of the user namespace
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: Implent proc namespace operations
Eric W. Biederman
1
-17
/
+73
2012-11-20
userns: Allow setting a userns mapping to your current uid.
Eric W. Biederman
1
-0
/
+15
2012-09-18
userns: Add kprojid_t and associated infrastructure in projid.h
Eric W. Biederman
1
-1
/
+127
2012-05-03
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
Eric W. Biederman
1
-2
/
+2
2012-04-26
userns: Rework the user_namespace adding uid/gid mapping support
Eric W. Biederman
1
-41
/
+504
2012-04-26
userns: Simplify the user_namespace by making userns->creator a kuid.
Eric W. Biederman
1
-22
/
+20
2012-04-07
userns: Disassociate user_struct from the user_namespace.
Eric W. Biederman
1
-5
/
+1
2012-04-07
userns: Start out with a full set of capabilities.
Eric W. Biederman
1
-0
/
+9
2012-04-07
userns: Add an explicit reference to the parent user namespace
Eric W. Biederman
1
-7
/
+6
2012-04-07
cred: Refcount the user_ns pointed to by the cred.
Eric W. Biederman
1
-3
/
+5
2012-04-07
userns: Use cred->user_ns instead of cred->user->user_ns
Eric W. Biederman
1
-2
/
+2
[next]