v4 -> v5: - fold back Andrew's changes - fold back my update patch: o use fsuid instead of ruid o allow forced unpriv. unmounts for "safe" filesystems o allow mounting over special files, but not over symlinks o set nosuid and nodev based on lack of specific capability - patch header updates - new patch: on propagation inherit owner from parent - new patch: add "no submounts" mount flag The last two patches are up for discussion. The rest I think is in pretty good shape for merging. If somebody feels otherwise, please complain now. -- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- Follow-Ups:
- [patch 05/10] unprivileged mounts: allow unprivileged bind mounts
- From: Miklos Szeredi <[email protected]>
- [patch 08/10] unprivileged mounts: allow unprivileged fuse mounts
- From: Miklos Szeredi <[email protected]>
- [patch 02/10] unprivileged mounts: allow unprivileged umount
- From: Miklos Szeredi <[email protected]>
- [patch 10/10] unprivileged mounts: add "no submounts" flag
- From: Miklos Szeredi <[email protected]>
- [patch 09/10] unprivileged mounts: propagation: inherit owner from parent
- From: Miklos Szeredi <[email protected]>
- [patch 01/10] unprivileged mounts: add user mounts to the kernel
- From: Miklos Szeredi <[email protected]>
- [patch 04/10] unprivileged mounts: propagate error values from clone_mnt
- From: Miklos Szeredi <[email protected]>
- [patch 03/10] unprivileged mounts: account user mounts
- From: Miklos Szeredi <[email protected]>
- [patch 07/10] unprivileged mounts: allow unprivileged mounts
- From: Miklos Szeredi <[email protected]>
- [patch 06/10] unprivileged mounts: put declaration of put_filesystem() in fs.h
- From: Miklos Szeredi <[email protected]>
- [patch 05/10] unprivileged mounts: allow unprivileged bind mounts
- Prev by Date: Re: [00/17] Large Blocksize Support V3
- Next by Date: Re: assembly code in the loadable kernel module
- Previous by thread: [PATCH 0/9] Containers (V9): Generic Process Containers
- Next by thread: [patch 06/10] unprivileged mounts: put declaration of put_filesystem() in fs.h
- Index(es):