Home
last modified time | relevance | path

Searched hist:"0 c55cfc4" (Results 1 – 2 of 2) sorted by relevance

/openbmc/linux/fs/
H A Dnamespace.c0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.

- Add a filesystem flag to mark filesystems that are safe to mount as
an unprivileged user.

- Add a filesystem flag to mark filesystems that don't need MNT_NODEV
when mounted by an unprivileged user.

- Relax the permission checks to allow unprivileged users that have
CAP_SYS_ADMIN permissions in the user namespace referred to by the
current mount namespace to be allowed to mount, unmount, and move
filesystems.

Acked-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.

- Add a filesystem flag to mark filesystems that are safe to mount as
an unprivileged user.

- Add a filesystem flag to mark filesystems that don't need MNT_NODEV
when mounted by an unprivileged user.

- Relax the permission checks to allow unprivileged users that have
CAP_SYS_ADMIN permissions in the user namespace referred to by the
current mount namespace to be allowed to mount, unmount, and move
filesystems.

Acked-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
/openbmc/linux/include/linux/
H A Dfs.h0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.

- Add a filesystem flag to mark filesystems that are safe to mount as
an unprivileged user.

- Add a filesystem flag to mark filesystems that don't need MNT_NODEV
when mounted by an unprivileged user.

- Relax the permission checks to allow unprivileged users that have
CAP_SYS_ADMIN permissions in the user namespace referred to by the
current mount namespace to be allowed to mount, unmount, and move
filesystems.

Acked-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.

- Add a filesystem flag to mark filesystems that are safe to mount as
an unprivileged user.

- Add a filesystem flag to mark filesystems that don't need MNT_NODEV
when mounted by an unprivileged user.

- Relax the permission checks to allow unprivileged users that have
CAP_SYS_ADMIN permissions in the user namespace referred to by the
current mount namespace to be allowed to mount, unmount, and move
filesystems.

Acked-by: "Serge E. Hallyn" <serge@hallyn.com>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>