Searched +hist:142 +hist:e1d1d (Results 1 - 4 of 4) sorted by relevance
/linux-master/kernel/ | ||
H A D | utsname.c | diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> |
H A D | nsproxy.c | diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> |
/linux-master/ipc/ | ||
H A D | namespace.c | diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> |
/linux-master/net/core/ | ||
H A D | net_namespace.c | diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns. - Push the permission check from the core setns syscall into the setns install methods where the user namespace of the target namespace can be determined, and used in a ns_capable call. Acked-by: Serge Hallyn <serge.hallyn@canonical.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> |
Completed in 192 milliseconds