Linux Containers
[Prev Page][Next Page]
- Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/17] ima: Namespace audit status flags
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/17] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/17] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/17] ima: Namespace audit status flags
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/17] ima: Add IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/17] ima: Add IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/17] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/17] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ucounts: Move rlimit max values from ucounts max
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 05/17] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 03/17] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 04/17] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 09/17] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 00/17] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 10/17] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 06/17] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 16/17] ima: Move dentry into ima_namespace and others onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 01/17] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 08/17] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 13/17] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 11/17] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 07/17] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/16] ima: Add IMA namespace support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 07/16] ima: Move ima_htable into ima_namespace
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/16] ima: Add IMA namespace support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 01/16] ima: Add IMA namespace support
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- RE: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH v5 01/16] ima: Add IMA namespace support
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 06/16] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 16/16] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 01/16] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 03/16] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 08/16] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 07/16] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 05/16] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 12/16] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 02/16] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/16] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 01/16] ima: Add IMA namespace support
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 01/16] ima: Add IMA namespace support
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 12/16] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 08/16] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 07/16] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 06/16] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 05/16] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 02/16] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 04/16] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 03/16] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 01/16] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH v3 04/16] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 07/16] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 06/16] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 12/16] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 05/16] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 01/16] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 16/16] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 03/16] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 02/16] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 11/16] securityfs: Move vfsmount into user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 08/16] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH v1 2/2] ucounts: Move rlimit max values from ucounts max
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 2/2] ucounts: Move rlimit max values from ucounts max
- From: Alexey Gladkov <legion@xxxxxxxxxxx>
- Re: [PATCH v1 2/2] ucounts: Move rlimit max values from ucounts max
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [PATCH v1 2/2] ucounts: Move rlimit max values from ucounts max
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [RFC v2 18/19] ima/userns: Define early teardown function for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 05/19] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 17/19] userns: Introduce a refcount variable for calling early teardown function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 16/19] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 14/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 08/19] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 13/19] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 10/19] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 12/19] securityfs: Pass static variables as parameters from top level functions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 11/19] securityfs: Prefix global variables with securityfs_
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 09/19] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 07/19] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 03/19] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 06/19] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 04/19] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 01/19] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 02/19] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 00/19] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [RFC v2 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 2/3] ima: show the namespace label in the ima-ns template
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 1/3] userns: add ima_ns_info field containing a settable namespace label
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 0/3] Namespace IMA log entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC 19/20] ima/userns: Define early teardown function for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 06/20] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 05/20] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 04/20] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 11/20] securityfs: Prefix global variables with securityfs_
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 03/20] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 16/20] ima: Use ns_capable() for namespace policy access
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 12/20] securityfs: Pass static variables as parameters from top level functions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 07/20] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 18/20] userns: Introduce a refcount variable for calling early teardown function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 02/20] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 09/20] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 10/20] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 14/20] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 00/20] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 01/20] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v2 1/2] ucounts: Fix rlimit max values check
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- [PATCH v2 2/2] ucounts: Move rlimit max values from ucounts max
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- [PATCH v2 0/2] ucounts: Fix rlimit max values check
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] binfmt_misc: enable sandboxed mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [ucounts] dc7e5f9d41: UBSAN:array-index-out-of-bounds_in_kernel/ucount.c
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 2/3] ima: Namespace IMA
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 2/3] ima: Namespace IMA
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/3] Namespace IMA
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/2] ucounts: Move rlimit max values from ucounts max
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- [PATCH v1 0/2] ucounts: Fix rlimit max values check
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- [PATCH v1 1/2] ucounts: Fix rlimit max values check
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Yordan Karadzhov <y.karadz@xxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Yordan Karadzhov <y.karadz@xxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Yordan Karadzhov <y.karadz@xxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Yordan Karadzhov <y.karadz@xxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Yordan Karadzhov <y.karadz@xxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 0/4] namespacefs: Proof-of-Concept
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 2/2] binfmt_misc: enable sandboxed mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2] binfmt_misc: cleanup on filesystem umount
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH 2/2] binfmt_misc: enable sandboxed mounts
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 1/2] binfmt_misc: cleanup on filesystem umount
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Michal Koutný <mkoutny@xxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 0/5] kernel: Introduce CPU Namespace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC 1/5] ns: Introduce CPU Namespace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC 5/5] proc/cpuns: Make procfs load stats CPU namespace aware
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- [RFC 4/5] cpu/cpuns: Make sysfs CPU namespace aware
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- [RFC 3/5] cpuset/cpuns: Make cgroup CPUset CPU namespace aware
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- [RFC 1/5] ns: Introduce CPU Namespace
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- [RFC 2/5] ns: Add scrambling functionality to CPU namespace
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- [RFC 0/5] kernel: Introduce CPU Namespace
- From: "Pratik R. Sampat" <psampat@xxxxxxxxxxxxx>
- Re: Landlock news #1
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1] ucounts: Increase ucounts reference counter before the security hook
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v1] ucounts: Increase ucounts reference counter before the security hook
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [RFD] Provide virtualized CPU system information for containers
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [RFD] Provide virtualized CPU system information for containers
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFD] Provide virtualized CPU system information for containers
- From: Pratik Sampat <psampat@xxxxxxxxxxxxx>
- Re: [PATCH v2] Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ucounts: Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v2] Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [PATCH] ucounts: Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ucounts: Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [PATCH] ucounts: Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] ucounts: Fix UCOUNT_RLIMIT_SIGPENDING counter leak
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [PATCH] Documentation: seccomp: Fix typo in user notification
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Documentation: seccomp: Fix typo in user notification
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] Documentation: seccomp: Fix typo in user notification
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] ucounts: Count rlimits in each user namespace
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] ucounts: Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: device namespaces
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: device namespaces
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: device namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: device namespaces
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: device namespaces
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: device namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Daniel Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: device namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: device namespaces
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: device namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- Re: device namespaces
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- Re: device namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: device namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: device namespaces
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: device namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: device namespaces
- From: Hannes Reinecke <hare@xxxxxxx>
- Re: device namespaces
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: device namespaces
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- device namespaces
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Chris Down <chris@xxxxxxxxxxxxxx>
- Re: [PATCH v1] proc: Implement /proc/self/meminfo
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH v1] proc: Implement /proc/self/meminfo
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selftests/seccomp: More closely track fds being assigned
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selftests/seccomp: More closely track fds being assigned
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] selftests/seccomp: More closely track fds being assigned
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- [PATCH] selftests/seccomp: More closely track fds being assigned
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Atomic addfd send and reply
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Preemption Signal Management
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: Preemption Signal Management
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: Preemption Signal Management
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Preemption Signal Management
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: Support atomic "addfd + send reply"
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Atomic addfd send and reply
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Tianyin Xu <tyxu@xxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Tianyin Xu <tyxu@xxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Tianyin Xu <tyxu@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Atomic addfd send and reply
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Linux Plumbers 2021: Containers and Checkpoint/Restore micro-conference CFP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 4/4] selftests/seccomp: Add test for atomic addfd+send
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 3/4] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 1/4] Documentation: seccomp: Fix user notification documentation
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 0/4] Atomic addfd send and reply
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 3/4] seccomp: Support atomic "addfd + send reply"
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH 3/4] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Tianyin Xu <tyxu@xxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH 3/4] seccomp: Support atomic "addfd + send reply"
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v3 5/5] tests/cgroup: test cgroup.kill
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH bpf-next seccomp 12/12] seccomp-ebpf: support task storage from BPF-LSM, defaulting to group leader
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 11/12] bpf/verifier: support NULL-able ptr to BTF ID as helper argument
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 10/12] seccomp-ebpf: Add ability to read user memory
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 09/12] yama: (concept) restrict seccomp-eBPF with ptrace_scope
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 08/12] seccomp-ebpf: restrict filter to almost cBPF if LSM request such
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 07/12] bpf/verifier: allow restricting direct map access
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 06/12] lsm: New hook seccomp_extended
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 05/12] samples/bpf: Add eBPF seccomp sample programs
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 04/12] libbpf: recognize section "seccomp"
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 03/12] seccomp, ptrace: Add a mechanism to retrieve attached eBPF seccomp filters
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 02/12] bpf, seccomp: Add eBPF filter capabilities
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 01/12] seccomp: Move no_new_privs check to after prepare_filter
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- [RFC PATCH bpf-next seccomp 00/12] eBPF seccomp filters
- From: YiFei Zhu <zhuyifei1999@xxxxxxxxx>
- Re: [PATCH v3 1/5] cgroup: introduce cgroup.kill
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v3 1/5] cgroup: introduce cgroup.kill
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v3 1/5] cgroup: introduce cgroup.kill
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/5] cgroup: introduce cgroup.kill
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- [PATCH v3 5/5] tests/cgroup: test cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 4/5] tests/cgroup: move cg_wait_for(), cg_prepare_for_wait()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 3/5] tests/cgroup: use cgroup.kill in cg_killall()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 1/5] cgroup: introduce cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 2/5] docs/cgroup: add entry for cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v2 5/5] tests/cgroup: test cgroup.kill
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 5/5] tests/cgroup: test cgroup.kill
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v2 4/5] tests/cgroup: move cg_wait_for(), cg_prepare_for_wait()
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tests/cgroup: use cgroup.kill in cg_killall()
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v2 2/5] docs/cgroup: add entry for cgroup.kill
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH] kernel: automatically split user namespace extent
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] kernel: automatically split user namespace extent
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- [PATCH v2 5/5] tests/cgroup: test cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 4/5] tests/cgroup: move cg_wait_for(), cg_prepare_for_wait()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 3/5] tests/cgroup: use cgroup.kill in cg_killall()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 2/5] docs/cgroup: add entry for cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 1/5] cgroup: introduce cgroup.kill
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 4/4] selftests/seccomp: Add test for atomic addfd+send
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 3/4] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 2/4] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 0/4] Atomic addfd send and reply
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 1/4] Documentation: seccomp: Fix user notification documentation
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- The containers list has moved!
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v2 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 5/5] selftests/seccomp: Add test for atomic addfd+send
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 3/5] selftests/seccomp: Add test for wait killable notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 4/5] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 1/5] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v2 0/5] Handle seccomp notification preemption
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH] ucounts: Silence warning in dec_rlimit_ucounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v11 4/9] Reimplement RLIMIT_NPROC on top of ucounts
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: Containers Development List Migration
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Oliver Sang <oliver.sang@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH RESEND 3/5] selftests/seccomp: Add test for wait killable notifier
- From: Tycho Andersen <tycho@tycho.pizza>
- [PATCH RESEND 5/5] selftests/seccomp: Add test for atomic addfd+send
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH RESEND 4/5] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH RESEND 3/5] selftests/seccomp: Add test for wait killable notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH RESEND 1/5] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH RESEND 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH RESEND 0/5] Handle seccomp notification preemption
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
- From: Franklin “Snaipe” Mathieu via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Alexey Gladkov <legion@xxxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Oliver Sang <oliver.sang@xxxxxxxxx>
- [PATCH v11 9/9] ucounts: Set ucount_max to the largest positive value the type can hold
- [PATCH v11 8/9] kselftests: Add test to check for rlimit changes in different user namespaces
- [PATCH v11 7/9] Reimplement RLIMIT_MEMLOCK on top of ucounts
- [PATCH v11 6/9] Reimplement RLIMIT_SIGPENDING on top of ucounts
- [PATCH v11 5/9] Reimplement RLIMIT_MSGQUEUE on top of ucounts
- [PATCH v11 4/9] Reimplement RLIMIT_NPROC on top of ucounts
- [PATCH v11 3/9] Use atomic_t for ucounts reference counting
- [PATCH v11 2/9] Add a reference to ucounts for each cred
- [PATCH v11 1/9] Increase size of ucounts to atomic_long_t
- [PATCH v11 0/9] Count rlimits in each user namespace
- Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: LPC 2020 Hackroom Session: summary and next steps for isolated user namespaces
- From: Snaipe via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Containers Development List Migration
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- : Containers Digest, Vol 165, Issue 20
- From: Esther Faride Chau Durazo <takpkyra666@xxxxxxxxx>
- Containers Digest, Vol 177, Issue 20
- From: Esther Faride Chau Durazo <takpkyra666@xxxxxxxxx>
- Re: [PATCH 1/1] seccomp: Always "goto wait" if the list is empty
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH 1/1] seccomp: Always "goto wait" if the list is empty
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/5] seccomp: Refactor notification handler to prepare for new semantics
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- [PATCH 1/1] seccomp: Always "goto wait" if the list is empty
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- [PATCH 0/1] seccomp: Erroneous return on interrupted addfd ioctl()
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
- From: Anton Altaparmakov <anton@xxxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- 08ed4efad6: stress-ng.sigsegv.ops_per_sec -41.9% regression
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v10 7/9] Reimplement RLIMIT_MEMLOCK on top of ucounts
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v10 9/9] ucounts: Set ucount_max to the largest positive value the type can hold
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 8/9] kselftests: Add test to check for rlimit changes in different user namespaces
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 7/9] Reimplement RLIMIT_MEMLOCK on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 5/9] Reimplement RLIMIT_MSGQUEUE on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 6/9] Reimplement RLIMIT_SIGPENDING on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 4/9] Reimplement RLIMIT_NPROC on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 2/9] Add a reference to ucounts for each cred
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 1/9] Increase size of ucounts to atomic_long_t
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 3/9] Use atomic_t for ucounts reference counting
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 0/9] Count rlimits in each user namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v9 4/8] Reimplement RLIMIT_NPROC on top of ucounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 4/8] Reimplement RLIMIT_NPROC on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v9 0/8] Count rlimits in each user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 3/8] Use atomic_t for ucounts reference counting
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 6/8] Reimplement RLIMIT_SIGPENDING on top of ucounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 4/8] Reimplement RLIMIT_NPROC on top of ucounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Broken link on lists.linuxfoundation.org
- From: Adam Carter <acarter@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel: automatically split user namespace extent
- From: Giuseppe Scrivano <gscrivan@xxxxxxxxxx>
- Re: [PATCH] kernel: automatically split user namespace extent
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v9 8/8] kselftests: Add test to check for rlimit changes in different user namespaces
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 6/8] Reimplement RLIMIT_SIGPENDING on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 7/8] Reimplement RLIMIT_MEMLOCK on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 2/8] Add a reference to ucounts for each cred
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 4/8] Reimplement RLIMIT_NPROC on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 5/8] Reimplement RLIMIT_MSGQUEUE on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 3/8] Use atomic_t for ucounts reference counting
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 0/8] Count rlimits in each user namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 1/8] Increase size of ucounts to atomic_long_t
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH 0/5] Handle seccomp notification preemption
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: [PATCH] seccomp: fix the cond to report loaded filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] seccomp: fix the cond to report loaded filters
- From: <Kenta.Tada@xxxxxxxx>
- Re: seccomp: Delay filter activation
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: seccomp: Delay filter activation
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: seccomp: Delay filter activation
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 5/5] selftests/seccomp: Add test for atomic addfd+send
- From: Rodrigo Campos <rodrigo@xxxxxxxxxx>
- Re: seccomp: Delay filter activation
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 5/5] selftests/seccomp: Add test for atomic addfd+send
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 4/5] seccomp: Support atomic "addfd + send reply"
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 3/5] selftests/seccomp: Add test for wait killable notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 2/5] seccomp: Add wait_killable semantic to seccomp user notifier
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 1/5] seccomp: Refactor notification handler to prepare for new semantics
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 0/5] Handle seccomp notification preemption
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH 0/5] Handle seccomp notification preemption
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 02/40] fs: add id translation helpers
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v6 3/5] proc: Disable cancellation of subset=pid option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 5/5] docs: proc: add documentation about relaxing visibility restrictions
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 2/5] proc: subset=pid: Show /proc/self/net only for CAP_NET_ADMIN
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 4/5] proc: Relax check of mount visibility
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 0/5] proc: subset=pid: Relax check of mount visibility
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 1/5] docs: proc: add documentation about mount restrictions
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 3/8] Use atomic_t for ucounts reference counting
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] proc: Relax check of mount visibility
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v5 4/5] proc: Relax check of mount visibility
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 4/5] proc: Relax check of mount visibility
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v5 2/5] proc: Show /proc/self/net only for CAP_NET_ADMIN
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v5 5/5] docs: proc: add documentation about relaxing visibility restrictions
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v5 1/5] docs: proc: add documentation about mount restrictions
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v5 3/5] proc: Disable cancellation of subset=pid option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v5 0/5] proc: Relax check of mount visibility
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 7/8] Reimplement RLIMIT_MEMLOCK on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 6/8] Reimplement RLIMIT_SIGPENDING on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 8/8] kselftests: Add test to check for rlimit changes in different user namespaces
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 5/8] Reimplement RLIMIT_MSGQUEUE on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 4/8] Reimplement RLIMIT_NPROC on top of ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]