Home
last modified time | relevance | path

Searched hist:"078 de5f706ece36afd73bb4b8283314132d2dfdf" (Results 1 – 9 of 9) sorted by relevance

/openbmc/linux/include/linux/
H A Duser_namespace.hdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
H A Dcred.hdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
/openbmc/linux/kernel/
H A Dcred.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
H A Duser_namespace.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
H A Dsys.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
H A Dsignal.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
/openbmc/linux/security/
H A Dcommoncap.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
/openbmc/linux/arch/x86/mm/
H A Dfault.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
/openbmc/linux/mm/
H A Doom_kill.cdiff 078de5f706ece36afd73bb4b8283314132d2dfdf Wed Feb 08 09:00:08 CST 2012 Eric W. Biederman <ebiederm@xmission.com> userns: Store uid and gid values in struct cred with kuid_t and kgid_t types

cred.h and a few trivial users of struct cred are changed. The rest of the users
of struct cred are left for other patches as there are too many changes to make
in one go and leave the change reviewable. If the user namespace is disabled and
CONFIG_UIDGID_STRICT_TYPE_CHECKS are disabled the code will contiue to compile
and behave correctly.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>