Linux Containers
[Prev Page][Next Page]
- Re: [PATCH v7 0/6] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 0/6] seccomp trap to userspace
- From: "Michael Kerrisk (man-opages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC 01/20] ns: Introduce Time Namespace
- From: Laurent Vivier <lvivier@xxxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 6/6] samples: add an example of seccomp user trap
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 6/6] samples: add an example of seccomp user trap
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 4/6] files: add a replace_fd_files() function
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 5/6] seccomp: add a way to pass FDs via a notification fd
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 3/6] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 1/6] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 2/6] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v7 0/6] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Andrey Vagin <avagin@xxxxxxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC 16/20] selftest: Add Time Namespace test for supported clocks
- From: Shuah Khan <shuah@xxxxxxxxxx>
- Re: [RFC 00/20] ns: Introduce Time Namespace
- From: Andrey Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 02/20] timens: Add timens_offsets
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- [RFC 20/20] timens/selftest: Add timer offsets test
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 19/20] timens/selftest: Add procfs selftest
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 18/20] selftest/timens: Add test for clock_nanosleep
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 17/20] selftest/timens: Add test for timerfd
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 16/20] selftest: Add Time Namespace test for supported clocks
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 15/20] timens: Optimize zero-offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 14/20] timens: Add align for timens_offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 13/20] posix-timers/timens: Take into account clock offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 12/20] x86/vdso: Look for vvar vma to purge timens page
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 11/20] x86/vdso: Purge timens page on setns()/unshare()/clone()
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 10/20] x86/vdso: Use set_normalized_timespec() to avoid 32 bit overflow
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 09/20] x86/vdso/timens: Add offsets page in vvar
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 08/20] x86/vdso: Restrict splitting vvar vma
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 07/20] timens: Shift /proc/uptime
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 06/20] kernel: Take into account timens clock offsets in clock_nanosleep
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 05/20] timerfd/timens: Take into account ns clock offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 04/20] timens: Introduce CLOCK_BOOTTIME offset
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 03/20] timens: Introduce CLOCK_MONOTONIC offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 01/20] ns: Introduce Time Namespace
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 02/20] timens: Add timens_offsets
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 00/20] ns: Introduce Time Namespace
- From: Dmitry Safonov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: first page on google
- From: <rahulrajseoexperts@xxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v6 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [lxc-users] Containers and checkpoint/restart micro-conference at LPC2018
- From: Lucas Oketch via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Containers and checkpoint/restart micro-conference at LPC2018
- From: Steve French <smfrench@xxxxxxxxx>
- Re: Containers and checkpoint/restart micro-conference at LPC2018
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: Overlayfs @ Containers and checkpoint/restart micro-conference at LPC2018
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: Containers and checkpoint/restart micro-conference at LPC2018
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 1/9] rtnetlink: add rtnl_get_net_ns_capable()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 2/9] if_addr: add IFA_TARGET_NETNSID
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 3/9] ipv4: enable IFA_TARGET_NETNSID for RTM_GETADDR
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 5/9] rtnetlink: move type calculation out of loop
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 7/9] rtnetlink: s/IFLA_IF_NETNSID/IFLA_TARGET_NETNSID/g
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 6/9] if_link: add IFLA_TARGET_NETNSID alias
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 9/9] ipv6: add inet6_fill_args
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 8/9] ipv4: add inet_fill_args
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH net-next v2 4/9] ipv6: enable IFA_TARGET_NETNSID for RTM_GETADDR
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH net-next v2 0/9] rtnetlink: add IFA_TARGET_NETNSID for RTM_GETADDR
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH net-next v2 0/9] rtnetlink: add IFA_TARGET_NETNSID for RTM_GETADDR
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 4.4 42/47] getxattr: use correct xattr length
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.18 28/29] getxattr: use correct xattr length
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.18 21/29] userns: move user access out of the mutex
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: Containers and checkpoint/restart micro-conference at LPC2018
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: Containers and checkpoint/restart micro-conference at LPC2018
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH v6 1/5] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 1/5] seccomp: add a return code to trap to userspace
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v6 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] samples: add an example of seccomp user trap
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v6 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v6 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v6 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v6 1/5] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v6 0/5] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v5 1/5] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v5 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v5 1/5] seccomp: add a return code to trap to userspace
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH v5 5/5] samples: add an example of seccomp user trap
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v5 4/5] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v5 3/5] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v5 1/5] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v5 2/5] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v5 0/5] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 03/10] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH ghak90 (was ghak32) V4 02/10] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [GIT PULL] namespace fixes for v4.19-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- namespace fixes for v4.19-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Announcing LXC, LXD and LXCFS 3.0.2 bugfix releases
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Linux Plumbers BPF micro-conference CFP
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] cap_file: use v3 xattr macros
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Containers and checkpoint/restart micro-conference at LPC2018
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH 9/9] capability: add cap_set_nsowner()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 8/9] cap_file: handle run- vs buildtime vfs cap support
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 7/9] cap_file: save rootid in _fcaps_save()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 6/9] capability: add cap_get_nsowner()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 5/9] cap_file: initialize rootid in _fcaps_load()
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 4/9] cap_file: add new rootid argument
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 3/9] cap_file: use struct vfs_ns_cap_data if possible
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 2/9] capability: update to new uapi header
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 1/9] cap_file: use v3 xattr macros
- From: Christian Brauner <christian@xxxxxxxxxx>
- [PATCH 0/9] libcap: add user namespace fscaps support
- From: Christian Brauner <christian@xxxxxxxxxx>
- Fwd: [PATCH v3] cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias()
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Dinesh Subhraveti <subhraveti@xxxxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Every day we dedicate our passion to provide more people with top quality effective drugs!
- From: Canadian-Pharmacy-24h <noreply@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 6/6] libaudit: add support to get the task audit container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 4/6] add ausearch containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 5/6] start normalization containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 3/6] auditctl: add support for AUDIT_CONTID filter
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 2/6] AUDIT_CONTAINER message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 1/6] AUDIT_CONTAINER_OP message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v4 0/6] add support for audit container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 10/10] debug audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 09/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 08/10] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 07/10] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 06/10] audit: add containerid support for tty_audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 05/10] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 04/10] audit: add containerid support for ptrace and signals
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 03/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 02/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 01/10] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 (was ghak32) V4 00/10] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 04/10] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 07/10] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 04/10] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 05/10] audit: add containerid support for tty_audit
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 07/10] audit: add support for containerid to network namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 04/10] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 05/10] audit: add containerid support for tty_audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 07/10] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 09/10] debug audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Laura Garcia <nevola@xxxxxxxxx>
- Re: [PATCH net-next v3 0/8] Make /sys/class/net per net namespace objects belong to container
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 09/10] debug audit: read container ID of a process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 07/10] audit: add support for containerid to network namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 06/10] audit: add containerid filtering
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 05/10] audit: add containerid support for tty_audit
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 04/10] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 03/10] audit: add containerid support for ptrace and signals
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 6/7] net: Create reusable function for getting ownership info of sysfs inodes
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 8/8] bridge: make sure objects belong to container's owner
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 7/8] net: create reusable function for getting ownership info of sysfs inodes
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 6/8] net-sysfs: make sure objects belong to container's owner
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 5/8] net-sysfs: require net admin in the init ns for setting tx_maxrate
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 4/8] driver core: set up ownership of class devices in sysfs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 3/8] kobject: kset_create_and_add() - fetch ownership info from parent
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 2/8] sysfs, kobject: allow creating kobject belonging to arbitrary users
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 1/8] kernfs: allow creating kernfs objects with arbitrary uid/gid
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v3 0/8] Make /sys/class/net per net namespace objects belong to container
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 6/7] net: Create reusable function for getting ownership info of sysfs inodes
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2 net-next 0/7] Make /sys/class/net per net namespace objects belong to container
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 10/10] rfkill: fix spelling mistake contidion to condition
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 net-next 0/7] Make /sys/class/net per net namespace objects belong to container
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 net-next 0/7] Make /sys/class/net per net namespace objects belong to container
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/1] shiftfs: uid/gid shifting filesystem
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 1/7] kernfs: allow creating kernfs objects with arbitrary uid/gid
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 net-next 0/7] Make /sys/class/net per net namespace objects belong to container
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH net-next v2 7/7] bridge: make sure objects belong to container's owner
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 6/7] net: Create reusable function for getting ownership info of sysfs inodes
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 5/7] net-sysfs: make sure objects belong to contrainer's owner
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 4/7] driver core: set up ownership of class devices in sysfs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 3/7] kobject: kset_create_and_add() - fetch ownership info from parent
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 2/7] sysfs, kobject: allow creating kobject belonging to arbitrary users
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH net-next v2 1/7] kernfs: allow creating kernfs objects with arbitrary uid/gid
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- [PATCH v2 net-next 0/7] Make /sys/class/net per net namespace objects belong to container
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Adrian Reber <adrian@xxxxxxxx>
- Sunward-countertops & mosaics
- From: Emma <emmayang@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Year after year our pharmacy expands in order to provide more clients with quality drugs!
- From: Fast-Pills <noreply@xxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH] kconfig: remove EXPERT from CHECKPOINT_RESTORE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ipv4: Return EINVAL when ping_group_range sysctl doesn't map to user ns
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] ipv4: Return EINVAL when ping_group_range sysctl doesn't map to user ns
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] Revert "vfs: Allow userns root to call mknod on owned filesystems."
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] Revert "vfs: Allow userns root to call mknod on owned filesystems."
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH] Revert "vfs: Allow userns root to call mknod on owned filesystems."
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] Revert "vfs: Allow userns root to call mknod on owned filesystems."
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: shiftfs status and future development
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: shiftfs status and future development
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: shiftfs status and future development
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Unprivileged LXC containers don't start on 4.18-rc1
- From: Dmitrii Tcvetkov <demfloro@xxxxxxxxxxx>
- Re: Unprivileged LXC containers don't start on 4.18-rc1
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: Unprivileged LXC containers don't start on 4.18-rc1
- From: Christian Brauner <christian@xxxxxxxxxx>
- Unprivileged LXC containers don't start on 4.18-rc1
- From: Dmitrii Tcvetkov <demfloro@xxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [GIT PULL] userns fixes for 4.17-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] userns fixes for 4.17-rc2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: shiftfs status and future development
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: shiftfs status and future development
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v4 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v4 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v4 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v4 2/4] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v4 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: "Tobin C . Harding" <me@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: "Tobin C . Harding" <me@xxxxxxxx>
- Re: [GIT PULL] userns fixes for 4.17-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] userns fixes for 4.17-rc2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: shiftfs status and future development
- From: Phil Estes <estesp@xxxxxxxxx>
- Re: shiftfs status and future development
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2] proc: Simplify and fix proc by removing the kernel mount
- From: Alistair Strachan via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] proc: Simplify and fix proc by removing the kernel mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH] proc: Simplify and fix proc by removing the kernel mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/1] shiftfs: uid/gid shifting bind mount
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [PATCH v3 0/1] shiftfs: uid/gid shifting filesystem
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: shiftfs status and future development
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: shiftfs status and future development
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Matthew Helsley <matt.helsley@xxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Matthew Helsley <matt.helsley@xxxxxxxxx>
- shiftfs status and future development
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Matthew Helsley <matt.helsley@xxxxxxxxx>
- Re: [PATCH] proc: Fix parsing of mount parameters.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] proc: Fix parsing of mount parameters.
- From: Alistair Strachan via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] proc: Fix parsing of mount parameters.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv5] locks: Filter /proc/locks output on proc pid ns
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [PATCH net-next 2/2 merged] netns: restrict uevents]
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- [PATCH merged] selftests: uevent filtering
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- [PATCH net-next 1/2 merged] uevent: add alloc_uevent_skb() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- [PATCH net-next 0/2 merged] netns: uevent filtering
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 0/4] seccomp trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 6/6] libaudit: add support to get the task audit container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 5/6] start normalization containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 4/6] add ausearch containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 3/6] auditctl: add support for AUDIT_CONTID filter
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 2/6] AUDIT_CONTAINER message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 1/6] AUDIT_CONTAINER_ID message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau51/ghau40 v3 0/6] add support for audit container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 10/10] rfkill: fix spelling mistake contidion to condition
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 09/10] debug audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 08/10] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 07/10] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 06/10] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 05/10] audit: add containerid support for tty_audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 04/10] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 03/10] audit: add containerid support for ptrace and signals
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 02/10] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 01/10] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak90 (was ghak32) V3 00/10] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [GIT PULL] userns vfs bits for v4.18-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [PATCH v3 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Jann Horn via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH v3 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v3 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v3 2/4] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v3 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v3 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] fuse: Allow fully unprivileged mounts
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 00/13] audit: implement container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 00/13] audit: implement container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH] fuse: Allow fully unprivileged mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Y Song <ys114321@xxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 1/6] vfs: Don't allow changing the link count of an inode with an invalid uid or gid
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH v2 3/6] fs: Allow superblock owner to replace invalid owners of inodes
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [REVIEW][PATCH 2/6] vfs: Allow userns root to call mknod on owned filesystems.
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH 4/6] fs: Allow superblock owner to access do_remount_sb()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH 2/6] vfs: Allow userns root to call mknod on owned filesystems.
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/6] vfs: Allow userns root to call mknod on owned filesystems.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 4/6] fs: Allow superblock owner to access do_remount_sb()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 6/6] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH 4/6] fs: Allow superblock owner to access do_remount_sb()
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [REVIEW][PATCH 5/6] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [REVIEW][PATCH 2/6] vfs: Allow userns root to call mknod on owned filesystems.
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 1/6] vfs: Don't allow changing the link count of an inode with an invalid uid or gid
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- [REVIEW][PATCH v2 3/6] fs: Allow superblock owner to replace invalid owners of inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 6/6] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 5/6] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 4/6] fs: Allow superblock owner to access do_remount_sb()
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 3/6] fs: Allow superblock owner to replace invalid owners of inodes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/6] vfs: Allow userns root to call mknod on owned filesystems.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 1/6] vfs: Don't allow changing the link count of an inode with an invalid uid or gid
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 0/6] Wrapping up the vfs support for unprivileged mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Y Song <ys114321@xxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Y Song <ys114321@xxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Y Song <ys114321@xxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH ghak32 V2 03/13] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v2 0/4] seccomp trap to userspace
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 03/13] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 03/13] audit: log container info of syscalls
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH v2 4/4] seccomp: add support for passing fds via USER_NOTIF
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v2 3/4] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v2 2/4] seccomp: make get_nth_filter available outside of CHECKPOINT_RESTORE
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v2 1/4] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [PATCH v2 0/4] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Y Song <ys114321@xxxxxxxxx>
- [PATCH] [RFC] bpf: tracing: new helper bpf_get_current_cgroup_ino
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- [RFC PATCH v4 4/5] ima: extend IMA audit policy rules with attribute to audit namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 5/5] ima: namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 1/5] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 2/5] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 0/5] ima: Namespacing IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [GIT PULL] userns bug fix for 4.17-rc3
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 06/13] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 05/13] audit: add containerid support for ptrace and signals
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 10/13] audit: add containerid support for seccomp and anom_abend records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 06/13] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 05/13] audit: add containerid support for ptrace and signals
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 10/13] audit: add containerid support for seccomp and anom_abend records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 12/13] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 09/13] audit: add containerid support for config/feature/user records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 12/13] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 09/13] audit: add containerid support for config/feature/user records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 07/13] audit: add container aux record to watch/tree/mark
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 04/13] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 12/13] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 10/13] audit: add containerid support for seccomp and anom_abend records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 09/13] audit: add containerid support for config/feature/user records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 07/13] audit: add container aux record to watch/tree/mark
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 06/13] audit: add support for non-syscall auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 05/13] audit: add containerid support for ptrace and signals
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 04/13] audit: add containerid filtering
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 02/13] audit: check children and threading before allowing containerid
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [lxc-users] Announcing LXC, LXD and LXCFS 3.0 LTS
- From: Tomasz Chmielewski <mangoo@xxxxxxxx>
- Announcing LXC, LXD and LXCFS 3.0 LTS
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 4/4 v5 RESEND] selftests: add devpts selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 4/4 v5 RESEND] selftests: add devpts selftests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 4/4 v5 RESEND] selftests: add devpts selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 4/4 v5 RESEND] selftests: add devpts selftests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH] Fix /proc/[pid]/ns permissions
- From: "Banerjee, Debabrata via Containers" <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix /proc/[pid]/ns permissions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH net-next 2/2 MERGED] netns: send uevent messages
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- [PATCH net-next 1/2 MERGED] net: add uevent socket member
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] uts_namespace: Move boot_id in uts namespace
- From: Marian Marinov <kernel@xxxxxxxx>
- Re: [PATCH] uts_namespace: Move boot_id in uts namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] uts_namespace: Move boot_id in uts namespace
- From: Marian Marinov <kernel@xxxxxxxx>
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] uts_namespace: Move boot_id in uts namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] [RFC][WIP] namespace.c: Allow some unprivileged proc mounts when not fully visible
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- [GIT PULL] namespace changes for 4.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: "Dr. Greg Wettstein" <greg@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 12/11] ipc: Directly call the security hook in ipc_ops.associate
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 00/11] ipc: Fixing the pid namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: "Dr. Greg Wettstein" <greg@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 00/11] ipc: Fixing the pid namespace support
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 13/11] ipc/smack: Tidy up from the change in type of the ipc security hooks
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 12/11] ipc: Directly call the security hook in ipc_ops.associate
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 13/11] ipc/smack: Tidy up from the change in type of the ipc security hooks
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 01/11] sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks
- From: Davidlohr Bueso <dave@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: Nagarathnam Muthusamy <nagarathnam.muthusamy@xxxxxxxxxx>
- Re: [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: "Dr. Greg Wettstein" <greg@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH v3 2/3] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v3 3/3] ima: mamespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v3 0/3] ima: namespacing IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] Revert "mqueue: switch to on-demand creation of internal mount"
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 13/11] ipc/smack: Tidy up from the change in type of the ipc security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs: Extend mount_ns with support for a fast namespace to vfsmount function
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs: Extend mount_ns with support for a fast namespace to vfsmount function
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 13/11] ipc/smack: Tidy up from the change in type of the ipc security hooks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 12/11] ipc: Directly call the security hook in ipc_ops.associate
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/2] fs: Extend mount_ns with support for a fast namespace to vfsmount function
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 01/11] sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 02/11] shm/security: Pass kern_ipc_perm not shmid_kernel into the shm security hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] mqueuefs: Fix the permissions and permission checks when mounting mqueuefs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/2] fs: Extend mount_ns with support for a fast namespace to vfsmount function
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: NAGARATHNAM MUTHUSAMY <nagarathnam.muthusamy@xxxxxxxxxx>
- Re: [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 10/11] ipc/msg: Fix msgctl(..., IPC_STAT, ...) between pid namespaces
- From: NAGARATHNAM MUTHUSAMY <nagarathnam.muthusamy@xxxxxxxxxx>
- Re: [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: NAGARATHNAM MUTHUSAMY <nagarathnam.muthusamy@xxxxxxxxxx>
- [REVIEW][PATCH 11/11] ipc/sem: Fix semctl(..., GETPID, ...) between pid namespaces
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 10/11] ipc/msg: Fix msgctl(..., IPC_STAT, ...) between pid namespaces
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 09/11] ipc/shm: Fix shmctl(..., IPC_STAT, ...) between pid namespaces.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 08/11] ipc/util: Helpers for making the sysvipc operations pid namespace aware
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 07/11] ipc: Move IPCMNI from include/ipc.h into ipc/util.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 06/11] msg: Move struct msg_queue into ipc/msg.c
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 05/11] shm: Move struct shmid_kernel into ipc/shm.c
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 04/11] sem: Move struct sem and struct sem_array into ipc/sem.c
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 02/11] shm/security: Pass kern_ipc_perm not shmid_kernel into the shm security hooks
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 01/11] sem/security: Pass kern_ipc_perm not sem_array into the sem security hooks
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 00/11] ipc: Fixing the pid namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REGRESSION v4.16-rc6] [PATCH] mqueue: forbid unprivileged user access to internal mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REGRESSION v4.16-rc6] [PATCH] mqueue: forbid unprivileged user access to internal mount
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] fuse: mounts from non-init user namespaces
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH v9 0/4] fuse: mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 0/4] fuse: mounts from non-init user namespaces
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- [PATCH ghau40 v2 5/5] start normalization containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau40 v2 4/5] add ausearch containerid support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau40 v2 3/5] auditctl: add support for containerid filter
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau40 v2 2/5] AUDIT_CONTAINER_INFO message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau40 v2 1/5] AUDIT_CONTAINER message type basic support
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghau40 v2 0/5] add support for audit container ID
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 13/13] debug audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 12/13] audit: NETFILTER_PKT: record each container ID associated with a netNS
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 11/13] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 10/13] audit: add containerid support for seccomp and anom_abend records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 09/13] audit: add containerid support for config/feature/user records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 08/13] audit: add containerid support for tty_audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 07/13] audit: add container aux record to watch/tree/mark
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 06/13] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 05/13] audit: add containerid support for ptrace and signals
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 04/13] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 03/13] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 02/13] audit: check children and threading before allowing containerid
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 01/13] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH ghak32 V2 00/13] audit: implement container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]