linux/fs/overlayfs
Miklos Szeredi 459c7c565a ovl: unprivieged mounts
Enable unprivileged user namespace mounts of overlayfs.  Overlayfs's
permission model (*) ensures that the mounter itself cannot gain additional
privileges by the act of creating an overlayfs mount.

This feature request is coming from the "rootless" container crowd.

(*) Documentation/filesystems/overlayfs.txt#Permission model

Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
2020-12-14 15:26:14 +01:00
..
copy_up.c ovl: do not fail when setting origin xattr 2020-12-14 15:26:14 +01:00
dir.c ovl: pass ovl_fs down to functions accessing private xattrs 2020-09-02 10:58:49 +02:00
export.c ovl: propagate ovl_fs to ovl_decode_real_fh and ovl_encode_real_fh 2020-11-12 11:31:55 +01:00
file.c ovl: do not fail because of O_NOATIME 2020-12-14 15:26:14 +01:00
inode.c ovl: user xattr 2020-12-14 15:26:14 +01:00
Kconfig docs: fix broken references to text files 2020-04-20 15:35:59 -06:00
Makefile treewide: Add SPDX license identifier - Makefile/Kconfig 2019-05-21 10:50:46 +02:00
namei.c ovl: check privs before decoding file handle 2020-12-14 15:26:14 +01:00
overlayfs.h ovl: user xattr 2020-12-14 15:26:14 +01:00
ovl_entry.h ovl: user xattr 2020-12-14 15:26:14 +01:00
readdir.c ovl: support [S|G]ETFLAGS and FS[S|G]ETXATTR ioctls for directories 2020-10-06 15:38:14 +02:00
super.c ovl: unprivieged mounts 2020-12-14 15:26:14 +01:00
util.c ovl: do not get metacopy for userxattr 2020-12-14 15:26:14 +01:00