index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
kernel
/
user_namespace.c
Age
Commit message (
Expand
)
Author
Files
Lines
2015-09-05
capabilities: ambient capabilities
Andy Lutomirski
1
-0
/
+1
2015-08-12
userns,pidns: Force thread group sharing, not signal handler sharing.
Eric W. Biederman
1
-2
/
+2
2014-12-17
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-11
/
+113
2014-12-12
userns; Correct the comment in map_write
Eric W. Biederman
1
-1
/
+1
2014-12-12
userns: Allow setting gid_maps without privilege when setgroups is disabled
Eric W. Biederman
1
-0
/
+5
2014-12-12
userns: Add a knob to disable setgroups on a per user namespace basis
Eric W. Biederman
1
-0
/
+85
2014-12-10
userns: Rename id_map_mutex to userns_state_mutex
Eric W. Biederman
1
-8
/
+6
2014-12-10
userns: Only allow the creator of the userns unprivileged mappings
Eric W. Biederman
1
-2
/
+4
2014-12-10
userns: Check euid no fsuid when establishing an unprivileged uid mapping
Eric W. Biederman
1
-1
/
+1
2014-12-10
userns: Don't allow unprivileged creation of gid mappings
Eric W. Biederman
1
-4
/
+0
2014-12-10
userns: Don't allow setgroups until a gid mapping has been setablished
Eric W. Biederman
1
-0
/
+14
2014-12-06
userns: Document what the invariant required for safe unprivileged mappings.
Eric W. Biederman
1
-1
/
+3
2014-12-04
copy address of proc_ns_ops into ns_common
Al Viro
1
-0
/
+1
2014-12-04
new helpers: ns_alloc_inum/ns_free_inum
Al Viro
1
-2
/
+2
2014-12-04
make proc_ns_operations work with struct ns_common * instead of void *
Al Viro
1
-9
/
+3
2014-12-04
switch the rest of proc_ns_operations to working with &...->ns
Al Viro
1
-5
/
+9
2014-12-04
common object embedded into various struct ....ns
Al Viro
1
-3
/
+3
2014-08-09
proc: constify seq_operations
Fabian Frederick
1
-3
/
+3
2014-06-07
kernel/user_namespace.c: kernel-doc/checkpatch fixes
Fabian Frederick
1
-13
/
+20
2014-04-15
user namespace: fix incorrect memory barriers
Mikulas Patocka
1
-6
/
+5
2014-04-04
kernel: audit/fix non-modular users of module_init in core code
Paul Gortmaker
1
-1
/
+1
2014-02-20
user_namespace.c: Remove duplicated word in comment
Brian Campbell
1
-1
/
+1
2013-09-24
KEYS: Add per-user_namespace registers for persistent per-UID kerberos caches
David Howells
1
-0
/
+6
2013-09-08
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-2
/
+0
2013-08-27
userns: Better restrictions on when proc and sysfs can be mounted
Eric W. Biederman
1
-2
/
+0
2013-08-09
userns: limit the maximum depth of user_namespace->parent chain
Oleg Nesterov
1
-0
/
+4
2013-08-07
userns: unshare_userns(&cred) should not populate cred on failure
Oleg Nesterov
1
-4
/
+9
2013-05-02
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...
Linus Torvalds
1
-1
/
+1
2013-05-02
proc: Split the namespace stuff out into linux/proc_ns.h
David Howells
1
-1
/
+1
2013-04-15
userns: Changing any namespace id mappings should require privileges
Andy Lutomirski
1
-3
/
+3
2013-04-15
userns: Check uid_map's opener's fsuid, not the current fsuid
Andy Lutomirski
1
-2
/
+2
2013-04-15
userns: Don't let unprivileged users trick privileged users into setting the ...
Eric W. Biederman
1
-4
/
+8
2013-03-27
userns: Restrict when proc and sysfs can be mounted
Eric W. Biederman
1
-0
/
+2
2013-03-27
userns: Don't allow creation if the user is chrooted
Eric W. Biederman
1
-0
/
+9
2013-03-14
userns: Don't allow CLONE_NEWUSER | CLONE_FS
Eric W. Biederman
1
-0
/
+4
2013-01-27
userns: Allow any uid or gid mappings that don't overlap.
Eric W. Biederman
1
-6
/
+39
2013-01-27
userns: Avoid recursion in put_user_ns
Eric W. Biederman
1
-8
/
+9
2012-12-15
userns: Fix typo in description of the limitation of userns_install
Eric W. Biederman
1
-1
/
+1
2012-11-20
proc: Usable inode numbers for the namespace file descriptors.
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct ...
Eric W. Biederman
1
-2
/
+10
2012-11-20
userns: Implement unshare of the user namespace
Eric W. Biederman
1
-0
/
+15
2012-11-20
userns: Implent proc namespace operations
Eric W. Biederman
1
-17
/
+73
2012-11-20
userns: Allow setting a userns mapping to your current uid.
Eric W. Biederman
1
-0
/
+15
2012-09-18
userns: Add kprojid_t and associated infrastructure in projid.h
Eric W. Biederman
1
-1
/
+127
2012-05-03
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
Eric W. Biederman
1
-2
/
+2
2012-04-26
userns: Rework the user_namespace adding uid/gid mapping support
Eric W. Biederman
1
-41
/
+504
2012-04-26
userns: Simplify the user_namespace by making userns->creator a kuid.
Eric W. Biederman
1
-22
/
+20
2012-04-08
userns: Disassociate user_struct from the user_namespace.
Eric W. Biederman
1
-5
/
+1
2012-04-08
userns: Start out with a full set of capabilities.
Eric W. Biederman
1
-0
/
+9
2012-04-08
userns: Add an explicit reference to the parent user namespace
Eric W. Biederman
1
-7
/
+6
[next]