)]}'
{
  "commit": "77e40aae766ccbbbb0324cb92ab22e6e998375d7",
  "tree": "fb4e8e840aaeeaac62249d7585249c4634886baa",
  "parents": [
    "96784de59fb35077c2bb33c39328992b836d87d3",
    "344470cac42e887e68cfb5bdfa6171baf27f1eb5"
  ],
  "author": {
    "name": "Linus Torvalds",
    "email": "torvalds@linux-foundation.org",
    "time": "Sat Aug 09 17:10:41 2014 -0700"
  },
  "committer": {
    "name": "Linus Torvalds",
    "email": "torvalds@linux-foundation.org",
    "time": "Sat Aug 09 17:10:41 2014 -0700"
  },
  "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace\n\nPull namespace updates from Eric Biederman:\n \"This is a bunch of small changes built against 3.16-rc6.  The most\n  significant change for users is the first patch which makes setns\n  drmatically faster by removing unneded rcu handling.\n\n  The next chunk of changes are so that \"mount -o remount,..\" will not\n  allow the user namespace root to drop flags on a mount set by the\n  system wide root.  Aks this forces read-only mounts to stay read-only,\n  no-dev mounts to stay no-dev, no-suid mounts to stay no-suid, no-exec\n  mounts to stay no exec and it prevents unprivileged users from messing\n  with a mounts atime settings.  I have included my test case as the\n  last patch in this series so people performing backports can verify\n  this change works correctly.\n\n  The next change fixes a bug in NFS that was discovered while auditing\n  nsproxy users for the first optimization.  Today you can oops the\n  kernel by reading /proc/fs/nfsfs/{servers,volumes} if you are clever\n  with pid namespaces.  I rebased and fixed the build of the\n  !CONFIG_NFS_FS case yesterday when a build bot caught my typo.  Given\n  that no one to my knowledge bases anything on my tree fixing the typo\n  in place seems more responsible that requiring a typo-fix to be\n  backported as well.\n\n  The last change is a small semantic cleanup introducing\n  /proc/thread-self and pointing /proc/mounts and /proc/net at it.  This\n  prevents several kinds of problemantic corner cases.  It is a\n  user-visible change so it has a minute chance of causing regressions\n  so the change to /proc/mounts and /proc/net are individual one line\n  commits that can be trivially reverted.  Unfortunately I lost and\n  could not find the email of the original reporter so he is not\n  credited.  From at least one perspective this change to /proc/net is a\n  refgression fix to allow pthread /proc/net uses that were broken by\n  the introduction of the network namespace\"\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace:\n  proc: Point /proc/mounts at /proc/thread-self/mounts instead of /proc/self/mounts\n  proc: Point /proc/net at /proc/thread-self/net instead of /proc/self/net\n  proc: Implement /proc/thread-self to point at the directory of the current thread\n  proc: Have net show up under /proc/\u003ctgid\u003e/task/\u003ctid\u003e\n  NFS: Fix /proc/fs/nfsfs/servers and /proc/fs/nfsfs/volumes\n  mnt: Add tests for unprivileged remount cases that have found to be faulty\n  mnt: Change the default remount atime from relatime to the existing value\n  mnt: Correct permission checks in do_remount\n  mnt: Move the test for MNT_LOCK_READONLY from change_mount_flags into do_remount\n  mnt: Only change user settable mount flags in remount\n  namespaces: Use task_lock and not rcu to protect nsproxy\n",
  "tree_diff": []
}
