Searched hist:"0 c55cfc4" (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/fs/ |
H A D | namespace.c | 0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.
- Add a filesystem flag to mark filesystems that are safe to mount as an unprivileged user.
- Add a filesystem flag to mark filesystems that don't need MNT_NODEV when mounted by an unprivileged user.
- Relax the permission checks to allow unprivileged users that have CAP_SYS_ADMIN permissions in the user namespace referred to by the current mount namespace to be allowed to mount, unmount, and move filesystems.
Acked-by: "Serge E. Hallyn" <serge@hallyn.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> 0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace. - Add a filesystem flag to mark filesystems that are safe to mount as an unprivileged user. - Add a filesystem flag to mark filesystems that don't need MNT_NODEV when mounted by an unprivileged user. - Relax the permission checks to allow unprivileged users that have CAP_SYS_ADMIN permissions in the user namespace referred to by the current mount namespace to be allowed to mount, unmount, and move filesystems. Acked-by: "Serge E. Hallyn" <serge@hallyn.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
|
/openbmc/linux/include/linux/ |
H A D | fs.h | 0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace.
- Add a filesystem flag to mark filesystems that are safe to mount as an unprivileged user.
- Add a filesystem flag to mark filesystems that don't need MNT_NODEV when mounted by an unprivileged user.
- Relax the permission checks to allow unprivileged users that have CAP_SYS_ADMIN permissions in the user namespace referred to by the current mount namespace to be allowed to mount, unmount, and move filesystems.
Acked-by: "Serge E. Hallyn" <serge@hallyn.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> 0c55cfc4 Thu Jul 26 23:42:03 CDT 2012 Eric W. Biederman <ebiederm@xmission.com> vfs: Allow unprivileged manipulation of the mount namespace. - Add a filesystem flag to mark filesystems that are safe to mount as an unprivileged user. - Add a filesystem flag to mark filesystems that don't need MNT_NODEV when mounted by an unprivileged user. - Relax the permission checks to allow unprivileged users that have CAP_SYS_ADMIN permissions in the user namespace referred to by the current mount namespace to be allowed to mount, unmount, and move filesystems. Acked-by: "Serge E. Hallyn" <serge@hallyn.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
|