index
:
~sima/drm
alloc-review
avoid_bo_reuse_stalls
backlight-confusion
backport-3.6
bdw-for-bwidawsk
better-gpu_cpufreq
cea-double-clocked
colder-fusion
cpu_edp-abomination
cpu_transcoder
cs-prefetch
ctx-cleanup
direct-gtt
dma_buf-cpu-access
document-abi
dp-ilk-gm45
dp-integ
dp_mode_fixup
dpms-rework
dragon-slaughter
drm-cleanups
drm-core-cleanups
drm-coverity-fixes
drm-docs
drm-fb-helper
drm-init-cleanup
drm-intel-next-queued
drm-kms-locking
drm_agp_cleanup
drm_dp-refactoring
drm_for_each
dvo-meh
edid-latency
embed-gtt-space
exynos-base
exynos-base2
fb-size-check
fbcon-fixup
fbcon-rework
fbdev-less
fdi-dither
fence-debugfs
fix-relaxed-tiling
fixes-stuff
for-QA
for-agd5f
for-airlied
for-angela
for-anholt
for-antti
for-ben
for-bernard
for-bonbons
for-bwidawsk
for-chainsaw
for-damien
for-dominik
for-dvdhrm
for-eugeniy
for-fixes
for-fritsch
for-ickle
for-imre
for-j4ni
for-jani
for-jbarnes
for-jirierab
for-manday
for-me
for-mika
for-mlankhorst
for-nashpa
for-next
for-nkalkhof
for-ohsix
for-pinchartl
for-poland
for-pzanoni
for-robclark
for-seanpaul
for-sedat-dilek
for-thomas
for-tsa
for-ville
forcewake
full-gtt
gem_stress-fallout
gm45-reset-fixes
gmbus
gmbus-irq
gpu-freq-tracing
gpu-hanger
gtt-cleanup
gtt-wrestling
guard-page-fix
hangcheck-robustify
hangman
hole_stack-trick
hpd-mess
hpd-relaunch
hw_context
hw_context-ben
i810-fixup
i810-gtt-cleanup
i855-cache-coherency-checker
i915-docs
i915-fixes
ilk-hw-context
ilk-module-unload
ilk-wa-pile
init-fixes
intel_gtt_rework
intel_gtt_rework-part2
interlaced
irq-review
irq_handler_cleanup
ivb-edp-fixpile
jbarnes-owes-me-beers
kbz-59841
kill-old-drm-crap
kill-with-fire
kms_lease
local/cracy-mch-hack
local/dev_priv-rework
local/gtt-rework
lvds-fixed
map-and-fence
meh
mmu_notifier-checks
modeset-rework
modeset-rework-base
modeset-rework-fix-load-detect
modeset-rework-pipea-fix
modeset_s-r
my-next
no-more-cookies-for-me
no-more-enc-mode_set
no-more-ums
odds-and-ends
pageflip-ts-mess
pch-irq-fun
pfit-fixes
pipelined_fencing
pll-limits-mess
ppgtt
ppgtt-fix
ppgtt-stuff
prime-fixes
prime-locking-fixes
prts
psr-stuff
pts
pwrite-pread
radeon-kick-offb
refcount-meh
reset-fail
reset-irq-fun
reset-rework
review-for-jbarnes
reworked-dp-sequence
rinbuffer-cleanup
ring-cleanups
ringbuffer-cruft
robustify-reset-transitions
rps-locking
runtime-pm-for-dpms
semaphore-fun
set_caching
shit
shmem_slowpath
simple-patch-queue
snb-workarounds
story-for-ickle
stuff
stuff-fixes
stuff-for-39
stuff-for-poland
swizzled-pread
swizzling
tile-layout
topic/fix
topic/gpu-reloc-fight
topic/hmm-annotations
unbound-splitup
vgacon-crap
danvet's drm/ playground
danvet
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
kernel
/
user_namespace.c
Age
Commit message (
Expand
)
Author
Files
Lines
2016-06-24
fs: Limit file caps to the user namespace of the super block
Seth Forshee
1
-0
/
+14
2016-01-04
kernel/*: switch to memdup_user_nul()
Al Viro
1
-14
/
+7
2015-09-04
capabilities: ambient capabilities
Andy Lutomirski
1
-0
/
+1
2015-08-12
userns,pidns: Force thread group sharing, not signal handler sharing.
Eric W. Biederman
1
-2
/
+2
2014-12-17
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-11
/
+113
2014-12-11
userns; Correct the comment in map_write
Eric W. Biederman
1
-1
/
+1
2014-12-11
userns: Allow setting gid_maps without privilege when setgroups is disabled
Eric W. Biederman
1
-0
/
+5
2014-12-11
userns: Add a knob to disable setgroups on a per user namespace basis
Eric W. Biederman
1
-0
/
+85
2014-12-09
userns: Rename id_map_mutex to userns_state_mutex
Eric W. Biederman
1
-8
/
+6
2014-12-09
userns: Only allow the creator of the userns unprivileged mappings
Eric W. Biederman
1
-2
/
+4
2014-12-09
userns: Check euid no fsuid when establishing an unprivileged uid mapping
Eric W. Biederman
1
-1
/
+1
2014-12-09
userns: Don't allow unprivileged creation of gid mappings
Eric W. Biederman
1
-4
/
+0
2014-12-09
userns: Don't allow setgroups until a gid mapping has been setablished
Eric W. Biederman
1
-0
/
+14
2014-12-05
userns: Document what the invariant required for safe unprivileged mappings.
Eric W. Biederman
1
-1
/
+3
2014-12-04
copy address of proc_ns_ops into ns_common
Al Viro
1
-0
/
+1
2014-12-04
new helpers: ns_alloc_inum/ns_free_inum
Al Viro
1
-2
/
+2
2014-12-04
make proc_ns_operations work with struct ns_common * instead of void *
Al Viro
1
-9
/
+3
2014-12-04
switch the rest of proc_ns_operations to working with &...->ns
Al Viro
1
-5
/
+9
2014-12-04
common object embedded into various struct ....ns
Al Viro
1
-3
/
+3
2014-08-08
proc: constify seq_operations
Fabian Frederick
1
-3
/
+3
2014-06-06
kernel/user_namespace.c: kernel-doc/checkpatch fixes
Fabian Frederick
1
-13
/
+20
2014-04-14
user namespace: fix incorrect memory barriers
Mikulas Patocka
1
-6
/
+5
2014-04-03
kernel: audit/fix non-modular users of module_init in core code
Paul Gortmaker
1
-1
/
+1
2014-02-20
user_namespace.c: Remove duplicated word in comment
Brian Campbell
1
-1
/
+1
2013-09-24
KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches
David Howells
1
-0
/
+6
2013-09-07
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-2
/
+0
2013-08-26
userns: Better restrictions on when proc and sysfs can be mounted
Eric W. Biederman
1
-2
/
+0
2013-08-08
userns: limit the maximum depth of user_namespace->parent chain
Oleg Nesterov
1
-0
/
+4
2013-08-06
userns: unshare_userns(&cred) should not populate cred on failure
Oleg Nesterov
1
-4
/
+9
2013-05-01
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...
Linus Torvalds
1
-1
/
+1
2013-05-01
proc: Split the namespace stuff out into linux/proc_ns.h
David Howells
1
-1
/
+1
2013-04-14
userns: Changing any namespace id mappings should require privileges
Andy Lutomirski
1
-3
/
+3
2013-04-14
userns: Check uid_map's opener's fsuid, not the current fsuid
Andy Lutomirski
1
-2
/
+2
2013-04-14
userns: Don't let unprivileged users trick privileged users into setting the ...
Eric W. Biederman
1
-4
/
+8
2013-03-27
userns: Restrict when proc and sysfs can be mounted
Eric W. Biederman
1
-0
/
+2
2013-03-27
userns: Don't allow creation if the user is chrooted
Eric W. Biederman
1
-0
/
+9
2013-03-13
userns: Don't allow CLONE_NEWUSER | CLONE_FS
Eric W. Biederman
1
-0
/
+4
2013-01-26
userns: Allow any uid or gid mappings that don't overlap.
Eric W. Biederman
1
-6
/
+39
2013-01-26
userns: Avoid recursion in put_user_ns
Eric W. Biederman
1
-8
/
+9
2012-12-14
userns: Fix typo in description of the limitation of userns_install
Eric W. Biederman
1
-1
/
+1
2012-11-20
proc: Usable inode numbers for the namespace file descriptors.
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct ...
Eric W. Biederman
1
-2
/
+10
2012-11-20
userns: Implement unshare of the user namespace
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: Implent proc namespace operations
Eric W. Biederman
1
-17
/
+73
2012-11-20
userns: Allow setting a userns mapping to your current uid.
Eric W. Biederman
1
-0
/
+15
2012-09-18
userns: Add kprojid_t and associated infrastructure in projid.h
Eric W. Biederman
1
-1
/
+127
2012-05-03
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
Eric W. Biederman
1
-2
/
+2
2012-04-26
userns: Rework the user_namespace adding uid/gid mapping support
Eric W. Biederman
1
-41
/
+504
2012-04-26
userns: Simplify the user_namespace by making userns->creator a kuid.
Eric W. Biederman
1
-22
/
+20
2012-04-07
userns: Disassociate user_struct from the user_namespace.
Eric W. Biederman
1
-5
/
+1
[next]