Searched +hist:142 +hist:e1d1d (Results 1 - 4 of 4) sorted by last modified time

/linux-master/net/core/
H A Dnet_namespace.cdiff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
/linux-master/kernel/
H A Dnsproxy.cdiff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
H A Dutsname.cdiff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
/linux-master/ipc/
H A Dnamespace.cdiff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
diff 142e1d1d Thu Jul 26 02:13:20 MDT 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Allow unprivileged use of setns.

- Push the permission check from the core setns syscall into
the setns install methods where the user namespace of the
target namespace can be determined, and used in a ns_capable
call.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>

Completed in 259 milliseconds