summaryrefslogtreecommitdiff
path: root/fs/namespace.c
AgeCommit message (Expand)AuthorFilesLines
2013-11-27vfs: Fix a regression in mounting procEric W. Biederman1-1/+1
2013-11-09RCU'd vfsmountsAl Viro1-48/+87
2013-10-25split __lookup_mnt() in two functionsAl Viro1-19/+23
2013-10-25new helpers: lock_mount_hash/unlock_mount_hashAl Viro1-48/+48
2013-10-25namespace.c: get rid of mnt_ghostsAl Viro1-15/+7
2013-10-25fold dup_mnt_ns() into its only surviving callerAl Viro1-30/+18
2013-10-25mnt_set_expiry() doesn't need vfsmount_lockAl Viro1-2/+0
2013-10-25finish_automount() doesn't need vfsmount_lock for removal from expiry listAl Viro1-2/+0
2013-10-25fs/namespace.c: bury long-dead defineAl Viro1-2/+0
2013-10-25fold mntfree() into mntput_no_expire()Al Viro1-23/+16
2013-10-25do_remount(): pull touch_mnt_namespace() upAl Viro1-5/+1
2013-10-25dup_mnt_ns(): get rid of pointless grabbing of vfsmount_lockAl Viro1-2/+0
2013-10-25fs_is_visible only needs namespace_sem held sharedAl Viro1-2/+2
2013-10-25initialize namespace_sem staticallyAl Viro1-3/+1
2013-10-25put_mnt_ns(): use drop_collected_mounts()Al Viro1-5/+1
2013-09-12initmpfs: move rootfs code from fs/ramfs/ to init/Rob Landley1-1/+1
2013-09-09rename user_path_umountat() to user_path_mountpoint_at()Al Viro1-1/+1
2013-09-08Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds1-6/+5
2013-09-08Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds1-26/+95
2013-09-06vfs: check unlinked ancestors before mountMiklos Szeredi1-6/+5
2013-09-04vfs: allow umount to handle mountpoints without revalidating themJeff Layton1-1/+1
2013-08-31userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman1-2/+2
2013-08-27userns: Better restrictions on when proc and sysfs can be mountedEric W. Biederman1-12/+25
2013-08-27vfs: Don't copy mount bind mounts of /proc/<pid>/ns/mnt between namespacesEric W. Biederman1-12/+34
2013-08-24VFS: collect_mounts() should return an ERR_PTRDan Carpenter1-1/+1
2013-07-24vfs: Lock in place mounts from more privileged usersEric W. Biederman1-0/+34
2013-05-04create_mnt_ns: unidiomatic use of list_add()Al Viro1-1/+1
2013-05-04do_mount(): fix a leak introduced in 3.9 ("mount: consolidate permission chec...Al Viro1-3/+2
2013-05-02Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds1-146/+195
2013-05-02proc: Split the namespace stuff out into linux/proc_ns.hDavid Howells1-3/+3
2013-04-09Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds1-1/+1
2013-04-09fold release_mounts() into namespace_unlock()Al Viro1-23/+30
2013-04-09switch unlock_mount() to namespace_unlock(), convert all umount_tree() callersAl Viro1-19/+14
2013-04-09more conversions to namespace_unlock()Al Viro1-14/+6
2013-04-09get rid of the second argument of shrink_submounts()Al Viro1-4/+4
2013-04-09saner umount_tree()/release_mounts(), part 1Al Viro1-4/+13
2013-04-09get rid of full-hash scan on detaching vfsmountsAl Viro1-92/+137
2013-04-09mnt: release locks on error path in do_loopbackAndrey Vagin1-1/+1
2013-03-27userns: Restrict when proc and sysfs can be mountedEric W. Biederman1-0/+21
2013-03-27vfs: Carefully propogate mounts across user namespacesEric W. Biederman1-1/+5
2013-03-27vfs: Add a mount flag to lock read only bind mountsEric W. Biederman1-0/+3
2013-03-27userns: Don't allow creation if the user is chrootedEric W. Biederman1-0/+24
2013-02-23new helper: file_inode(file)Al Viro1-1/+1
2013-02-23mount: consolidate permission checksAl Viro1-33/+7
2013-02-23get rid of unprotected dereferencing of mnt->mnt_nsAl Viro1-12/+17
2012-12-20vfs, freeze: use ACCESS_ONCE() to guard access to ->mnt_flagsMiao Xie1-1/+1
2012-12-15userns: Require CAP_SYS_ADMIN for most uses of setns.Eric W. Biederman1-1/+2
2012-11-20proc: Usable inode numbers for the namespace file descriptors.Eric W. Biederman1-0/+14
2012-11-19userns: fix return value on mntns_install() failureZhao Hongjiang1-1/+1
2012-11-19vfs: Allow unprivileged manipulation of the mount namespace.Eric W. Biederman1-26/+43