[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <87ob8gys0d.fsf@xmission.com>
Date: Thu, 29 Aug 2013 16:52:18 -0700
From: ebiederm@...ssion.com (Eric W. Biederman)
To: Linux Containers <containers@...ts.linux-foundation.org>
Cc: "Serge E. Hallyn" <serge@...lyn.com>,
<linux-kernel@...r.kernel.org>
Subject: [REVIEW][PATCH 0/5] A couple of lingering namespace patches
There are a couple of long overdue namespace patches, simple cleanups
and permision grants that have been sitting in my development tree
for far too long. If anyone objects to these please let me know.
Eric W. Biederman (4):
namespaces: Simplify copy_namespaces so it is clear what is going on.
userns: Allow PR_CAPBSET_DROP in a user namespace.
pidns: Don't have unshare(CLONE_NEWPID) imply CLONE_THREAD
userns: Kill nsown_capable it makes the wrong thing easy
Serge Hallyn (1):
capabilities: allow nice if we are privileged
fs/namespace.c | 4 ++--
fs/open.c | 2 +-
include/linux/capability.h | 1 -
ipc/namespace.c | 2 +-
kernel/capability.c | 12 ------------
kernel/fork.c | 5 -----
kernel/groups.c | 2 +-
kernel/nsproxy.c | 35 +++++++++++------------------------
kernel/pid_namespace.c | 2 +-
kernel/sys.c | 20 ++++++++++----------
kernel/uid16.c | 2 +-
kernel/utsname.c | 2 +-
net/core/net_namespace.c | 2 +-
net/core/scm.c | 4 ++--
security/commoncap.c | 10 +++++-----
15 files changed, 37 insertions(+), 68 deletions(-)
Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists