Linus Torvalds
|
c7c4591db6
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace
|
11 years ago |
Eric W. Biederman
|
e51db73532
userns: Better restrictions on when proc and sysfs can be mounted
|
12 years ago |
Oleg Nesterov
|
8742f229b6
userns: limit the maximum depth of user_namespace->parent chain
|
12 years ago |
Oleg Nesterov
|
6160968cee
userns: unshare_userns(&cred) should not populate cred on failure
|
12 years ago |
Linus Torvalds
|
20b4fb4852
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
|
12 years ago |
David Howells
|
0bb80f2405
proc: Split the namespace stuff out into linux/proc_ns.h
|
12 years ago |
Andy Lutomirski
|
41c21e351e
userns: Changing any namespace id mappings should require privileges
|
12 years ago |
Andy Lutomirski
|
e3211c120a
userns: Check uid_map's opener's fsuid, not the current fsuid
|
12 years ago |
Eric W. Biederman
|
6708075f10
userns: Don't let unprivileged users trick privileged users into setting the id_map
|
12 years ago |
Eric W. Biederman
|
87a8ebd637
userns: Restrict when proc and sysfs can be mounted
|
12 years ago |
Eric W. Biederman
|
3151527ee0
userns: Don't allow creation if the user is chrooted
|
12 years ago |
Eric W. Biederman
|
e66eded830
userns: Don't allow CLONE_NEWUSER | CLONE_FS
|
12 years ago |
Eric W. Biederman
|
0bd14b4fd7
userns: Allow any uid or gid mappings that don't overlap.
|
12 years ago |
Eric W. Biederman
|
c61a2810a2
userns: Avoid recursion in put_user_ns
|
12 years ago |
Eric W. Biederman
|
5155040ed3
userns: Fix typo in description of the limitation of userns_install
|
12 years ago |
Eric W. Biederman
|
98f842e675
proc: Usable inode numbers for the namespace file descriptors.
|
14 years ago |
Eric W. Biederman
|
c450f371d4
userns: For /proc/self/{uid,gid}_map derive the lower userns from the struct file
|
13 years ago |
Eric W. Biederman
|
b2e0d98705
userns: Implement unshare of the user namespace
|
13 years ago |
Eric W. Biederman
|
cde1975bc2
userns: Implent proc namespace operations
|
13 years ago |
Eric W. Biederman
|
37657da3c5
userns: Allow setting a userns mapping to your current uid.
|
13 years ago |
Eric W. Biederman
|
f76d207a66
userns: Add kprojid_t and associated infrastructure in projid.h
|
13 years ago |
Eric W. Biederman
|
078de5f706
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
|
13 years ago |
Eric W. Biederman
|
22d917d80e
userns: Rework the user_namespace adding uid/gid mapping support
|
13 years ago |
Eric W. Biederman
|
783291e690
userns: Simplify the user_namespace by making userns->creator a kuid.
|
13 years ago |
Eric W. Biederman
|
7b44ab978b
userns: Disassociate user_struct from the user_namespace.
|
13 years ago |
Eric W. Biederman
|
973c591426
userns: Start out with a full set of capabilities.
|
13 years ago |
Eric W. Biederman
|
aeb3ae9da9
userns: Add an explicit reference to the parent user namespace
|
13 years ago |
Eric W. Biederman
|
0093ccb68f
cred: Refcount the user_ns pointed to by the cred.
|
13 years ago |
Eric W. Biederman
|
c4a4d60379
userns: Use cred->user_ns instead of cred->user->user_ns
|
13 years ago |
Paul Gortmaker
|
9984de1a5a
kernel: Map most files to use export.h instead of module.h
|
14 years ago |