Linux Containers
[Prev Page][Next Page]
- Re: [RFC 0/3] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC][PATCH] ipc: Remove IPCMNI
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC 0/3] seccomp trap to userspace
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC][PATCH] ipc: Remove IPCMNI
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/4 v5 RESEND] devpts: handle bind-mounts correctly
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 0/4 v5 RESEND] devpts: handle bind-mounts correctly
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4 v5 RESEND] devpts: handle bind-mounts correctly
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 4/4 v5 RESEND] selftests: add devpts selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/4 v5 RESEND] devpts: comment devpts_mntget()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 2/4 v5 RESEND] devpts: resolve devpts bind-mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 1/4 v5 RESEND] devpts: hoist out check for DEVPTS_SUPER_MAGIC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 0/4 v5 RESEND] devpts: handle bind-mounts correctly
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 0/4 v5] devpts: handle bind-mounts correctly
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- Re: [PATCH 0/4 v5] devpts: handle bind-mounts correctly
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/4 v5] devpts: resolve devpts bind-mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4 v5] devpts: hoist out check for DEVPTS_SUPER_MAGIC
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 4/4 v5] selftests: add devpts selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/4 v5] devpts: comment devpts_mntget()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 2/4 v5] devpts: resolve devpts bind-mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 1/4 v5] devpts: hoist out check for DEVPTS_SUPER_MAGIC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 0/4 v5] devpts: handle bind-mounts correctly
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v2 2/3] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 3/3] ima: mamespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 1/3] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] ima: namespacing IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/4] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v9 3/4] fuse: Support fuse filesystems outside of init_user_ns
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v9 2/4] fuse: Fail all requests with invalid uids or gids
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v9 1/4] fuse: Remove the buggy retranslation of pids in fuse_dev_do_read
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v9 0/4] fuse: mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Userspace helper design
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Userspace helper design
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [RFC PATCH V1 00/12] audit: implement container id
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v8 1/6] fs/posix_acl: Update the comments and support lightweight cache skipping
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 00/12] audit: implement container id
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/6] fs/posix_acl: Update the comments and support lightweight cache skipping
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH] auditctl: add support for containerid filter
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH V1 00/12] audit: implement container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH V1 00/12] audit: implement container id
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v8 6/6] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 5/6] fuse: Support fuse filesystems outside of init_user_ns
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 4/6] fuse: Fail all requests with invalid uids or gids
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 3/6] fuse: Remove the buggy retranslation of pids in fuse_dev_do_read
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 2/6] fuse: Simplfiy the posix acl handling logic.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 1/6] fs/posix_acl: Update the comments and support lightweight cache skipping
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v8 0/6] fuse: mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 5/7] fuse: Simplfiy the posix acl handling logic.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC][PATCH] fs/posix_acl: Update the comments and support lightweight cache skipping
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [RFC PATCH V1 12/12] debug! audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 11/12] debug audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 10/12] audit: add containerid support for seccomp and anom_abend records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 09/12] audit: add containerid support for config/feature/user records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 08/12] audit: add containerid support for tty_audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 07/12] audit: add container aux record to watch/tree/mark
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 06/12] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 05/12] audit: add containerid support for ptrace and signals
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 04/12] audit: read container ID of a process
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 03/12] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 02/12] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 01/12] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC PATCH V1 00/12] audit: implement container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: chris hyser <chris.hyser@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/7] fuse: Simplfiy the posix acl handling logic.
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH v7 7/7] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 6/7] fuse: Support fuse filesystems outside of init_user_ns
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 5/7] fuse: Simplfiy the posix acl handling logic.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 4/7] fuse: Cache a NULL acl when FUSE_GETXATTR returns -ENOSYS
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 3/7] fs/posix_acl: Document that get_acl respects ACL_DONT_CACHE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 2/7] fuse: Fail all requests with invalid uids or gids
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 1/7] fuse: Remove the buggy retranslation of pids in fuse_dev_do_read
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v7 0/7] fuse: mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [net-next v3 0/2] eBPF seccomp filters
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [net-next v3 2/2] bpf: Add eBPF seccomp sample programs
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [net-next v3 0/2] eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 1/5] fuse: Remove the buggy retranslation of pids in fuse_dev_do_read
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 2/5] fuse: Fail all requests with invalid uids or gids
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v6 5/5] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v6 3/5] fuse: Support fuse filesystems outside of init_user_ns
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v6 2/5] fuse: Fail all requests with invalid uids or gids
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v6 1/5] fuse: Remove the buggy retranslation of pids in fuse_dev_do_read
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v6 0/6] fuse: mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 09/11] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 07/11] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v2 2/2] bpf: Add eBPF seccomp sample programs
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [net-next v2 2/2] bpf: Add eBPF seccomp sample programs
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [net-next v2 2/2] bpf: Add eBPF seccomp sample programs
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [net-next v2 0/2] eBPF Seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH net-next 1/3] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [PATCH 10/11] fuse: Allow user namespace mounts
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Lorenzo Colitti via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: [PATCH] p9caps: add Plan9 capability devices
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC 3/3] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 2/3] seccomp: hoist out filter resolving logic
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: [PATCH 10/11] fuse: Allow user namespace mounts
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: [PATCH 07/11] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: plan9 semantics on Linux - mount namespaces
- From: Enrico Weigelt <lkml@xxxxxxxxx>
- Re: [RFC 3/3] seccomp: add a way to get a listener fd from ptrace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC 2/3] seccomp: hoist out filter resolving logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Tom Hromatka <tom.hromatka@xxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next 1/3] bpf, seccomp: Add eBPF filter capabilities
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Tom Hromatka <tom.hromatka@xxxxxxxxxx>
- Re: [PATCH net-next 3/3] bpf: Add eBPF seccomp sample programs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Brian Goff <cpuguy83@xxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Jessie Frazelle <me@xxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH net-next 0/3] eBPF Seccomp filters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH net-next 3/3] bpf: Add eBPF seccomp sample programs
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH net-next 2/3] seccomp, ptrace: Add a mechanism to retrieve attached eBPF seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH net-next 1/3] bpf, seccomp: Add eBPF filter capabilities
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- [PATCH net-next 0/3] eBPF Seccomp filters
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 04/11] fs: Don't remove suid for CAP_FSETID for userns root
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [RFC 1/3] seccomp: add a return code to trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [RFC 3/3] seccomp: add a way to get a listener fd from ptrace
- From: Tycho Andersen <tycho@xxxxxxxx>
- [RFC 2/3] seccomp: hoist out filter resolving logic
- From: Tycho Andersen <tycho@xxxxxxxx>
- [RFC 0/3] seccomp trap to userspace
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- rtnetlink updates in 4.16
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- [GIT PULL] userns fixes for 4.16-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: RFC(V3): Audit Kernel Container IDs
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- RFC(V3): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- [GIT PULL] pid bug fix for v4.15-rc7
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 11/11] evm: Don't update hmacs in user ns mounts
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/11] evm: Don't update hmacs in user ns mounts
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 04/11] fs: Don't remove suid for CAP_FSETID for userns root
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- Re: [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- Re: [PATCH 01/11] block_dev: Support checking inode permissions in lookup_bdev()
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- Re: [PATCH 11/11] evm: Don't update hmacs in user ns mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 10/11] fuse: Allow user namespace mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 09/11] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 07/11] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 05/11] fs: Allow superblock owner to access do_remount_sb()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 04/11] fs: Don't remove suid for CAP_FSETID for userns root
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 01/11] block_dev: Support checking inode permissions in lookup_bdev()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH 01/11] block_dev: Support checking inode permissions in lookup_bdev()
- From: Coly Li <i@xxxxxxx>
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 10/11] fuse: Allow user namespace mounts
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 09/11] fuse: Restrict allow_other to the superblock's namespace or a descendant
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 07/11] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 05/11] fs: Allow superblock owner to access do_remount_sb()
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 04/11] fs: Don't remove suid for CAP_FSETID for userns root
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH 01/11] block_dev: Support checking inode permissions in lookup_bdev()
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- [PATCH v5 00/11] FUSE mounts from non-init user namespaces
- From: Dongsu Park <dongsu@xxxxxxxxxx>
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documentation patch for namespaced file capabilities
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Fwd: libresource for system resource information.
- From: Rahul Yadav <rahul.x.yadav@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/2] userns: automount cleanups
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH 0/2] userns: automount cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- libresource for system resource information.
- From: Rahul Yadav <rahul.x.yadav@xxxxxxxxxx>
- Re: [PATCH 0/2] userns: automount cleanups
- From: Ian Kent <raven@xxxxxxxxxx>
- [PATCH 2/2] autofs4: Modify autofs_wait to use current_uid() and current_gid()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/2] userns: Don't fail follow_automount based on s_user_ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/2] userns: automount cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documentation patch for namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Say no to low quality ineffective drugs! Our pharmacy is the place where best drugs are sold!
- From: Canadian-Pharmacy <noreply@xxxxxxxxxx>
- unregister_netdevice: waiting for lo to become free. Usage count = 1
- From: Cengiz Can <cengizc@xxxxxxxxx>
- [PATCH_v4.1 3/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1 2/3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1 1/3] Make call_usermodehelper_exec possible to set namespaces
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1 0/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH_v4.1_3/3] Make core_pattern support namespace
- From: 曹树烽 <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: Chris Leech <cleech@xxxxxxxxxx>
- Re: [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documentation patch for namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Documentation patch for namespaced file capabilities
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Even if you have a lot of money, wasting them on fake medications is not a good idea!
- From: Fast-Pills <noreply@xxxxxxxxxxxxxxxx>
- Re: [PATCH] user_namespaces.7: Record new 340 line idmap limit
- From: Christian Brauner <christian.brauner@xxxxxxxxxxxxx>
- Re: [PATCH] user_namespaces.7: Record new 340 line idmap limit
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] user_namespaces.7: Record new 340 line idmap limit
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [GIT PULL] user namespace updates for v4.15-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: Chris Leech <cleech@xxxxxxxxxx>
- Re: [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: David Laight <David.Laight@xxxxxxxxxx>
- Containers devroom at FOSDEM 2018: Call for papers
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- [PATCH 8/9] iscsi: rename iscsi_bus_flash_* to iscsi_flash_*
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 9/9] iscsi: filter flashnode sysfs by net namespace
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 6/9] iscsi: check net namespace for all iscsi lookups
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 7/9] iscsi: convert flashnode devices from bus to class
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 5/9] iscsi: set netns for iscsi_tcp hosts
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 4/9] iscsi: make all iSCSI netlink multicast namespace aware
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 3/9] iscsi: sysfs filtering by network namespace
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 2/9] iscsi: associate endpoints with a host
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 1/9] iscsi: create per-net iscsi netlink kernel sockets
- From: Chris Leech <cleech@xxxxxxxxxx>
- [PATCH 0/9] use network namespace for iSCSI control interfaces
- From: Chris Leech <cleech@xxxxxxxxxx>
- Re: [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <asarai@xxxxxxx>
- [PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH v2] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v2] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] scsi: require CAP_SYS_ADMIN to write to procfs interface
- From: Aleksa Sarai <asarai@xxxxxxx>
- [PATCH 5/5] userns: Simplify insert_extent
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 4/5] userns: Make map_id_down a wrapper for map_id_range_down
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 3/5] userns: Don't read extents twice in m_start
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 2/5] userns: Simplify the user and group mapping functions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/5] userns: Don't special case a count of 0
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/5] userns: bump idmap limits, fixes & tweaks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- LXC 1.0.11, LXC 2.0.9, LXC 2.1.1, LXCFS 2.0.8 and LXD 2.0.11 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RFC(v2): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RFC(v2): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Simo Sorce <simo@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: making cn_proc work in {pid,user} namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: RFC: making cn_proc work in {pid,user} namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RFC: making cn_proc work in {pid,user} namespaces
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: Dimitri John Ledkov <xnox@xxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Alan Cox <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RFC(v2): Audit Kernel Container IDs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC(v2): Audit Kernel Container IDs
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- RFC(v2): Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS
- From: Dimitri John Ledkov <xnox@xxxxxxxxxx>
- Re: [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] selinux: Perform both commoncap and selinux xattr checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RFC: Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RFC: Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: Audit Kernel Container IDs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: RFC: Audit Kernel Container IDs
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- RFC: Audit Kernel Container IDs
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [GIT PULL] namespace updates for 4.14-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- LXC 2.1 has been released
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: Linux Plumbers containers micro-conference CFP
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/9] Implement containers as kernel objects
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: Ralf Baechle <ralf@xxxxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxx>
- Names badges With your Company Logo R38 Each
- From: "Graham" <orders.namebadges@xxxxxxxxx>
- Re: [RFC PATCH 3/5] ima: mamespace audit status flags
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH_v4.1_3/3] Make core_pattern support namespace
- From: Aleksa Sarai <asarai@xxxxxxx>
- [PATCH 0/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_1/3] Make call_usermodehelper_exec possible to set namespaces
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_2/3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_3/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] ima: mamespace audit status flags
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/5] ima: mamespace audit status flags
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [ANNOUNCE] Checkpoint/Restore micro-conference at Linux Plumbers
- From: Mike Rapoprt <rppt@xxxxxxxxxxxxxxxxxx>
- Hello
- From: Stanislaw Drozd <drozdziak1@xxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- RE: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: Linux Plumbers containers micro-conference CFP
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- RE: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Simplfying copy_siginfo_to_user
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH 5/5] ima: Add ns_mnt, dev, ino fields to IMA audit measurement msgs
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 4/5] ima: differentiate auditing policy rules from "audit" actions
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/5] ima: mamespace audit status flags
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/5] ima: Add ns_status for storing namespaced iint data
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/5] ima: extend clone() with IMA namespace support
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/5] ima: namespacing IMA audit messages
- From: Mehmet Kayaalp <mkayaalp@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [lkp-robot] [xattr] 3f3bf5920d: ltp.userns06.fail
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [CRIU] [Announce] CRIU v3.3 (Crystal Pelican)
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [CRIU] [Announce] CRIU v3.3 (Crystal Pelican)
- From: Michael Holzheu <holzheu@xxxxxxxxxxxxxxxxxx>
- Re: [CRIU] [Announce] CRIU v3.3 (Crystal Pelican)
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [CRIU] [Announce] CRIU v3.3 (Crystal Pelican)
- From: Michael Holzheu <holzheu@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [Announce] CRIU v3.3 (Crystal Pelican)
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: Richard Henderson <rth@xxxxxxxxxxx>
- Re: [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 5/7] signal/testing: Don't look for __SI_FAULT in userspace
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 3/7] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 2/7] signal/ia64: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 1/7] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v2 0/7] signal: Fix sending signals with siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] sysctl fixes for v4.13-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] sysctl fixes for v4.13-rc1
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [GIT PULL] sysctl fixes for v4.13-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 8/8] signal: Remove kernel interal si_code magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 8/8] signal: Remove kernel interal si_code magic
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v2] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <"Stefan Bergerstefanb"@linux.vnet.ibm.com>
- [PATCH v2] Enable namespaced file capabilities
- From: Stefan Berger <"Stefan Bergerstefanb"@linux.vnet.ibm.com>
- [signal] bb78acf9d7: kernel_BUG_at_fs/fcntl.c
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [CRIU] BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [CRIU] BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CRIU] BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Linux Plumbers containers micro-conference CFP
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- [GIT PULL] mnt namespace updates for v4.13-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CRIU] BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: Helge Deller <deller@xxxxxx>
- Re: [CRIU] BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 8/8] signal: Remove kernel interal si_code magic
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 7/8] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 6/8] signal/x86: Fix SIGSYS handling in copy_siginfo_to_user32
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 5/8] signal/testing: Don't look for __SI_FAULT in userspace
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 4/8] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 2/8] signal/ia64: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 0/8] signal: Fix sending signals with siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BUG: Dentry ffff9f795a08fe60{i=af565f,n=lo} still in use (1) [unmount of proc proc]
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc]
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] xattr: fix kstrdup.cocci warnings
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/3] xattr: Enable security.capability in user namespaces
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Enable security.selinux in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: unregister_netdevice: waiting for lo to become free. Usage count = 1
- From: Andrei Vagin <avagin@xxxxxxxxx>
- unregister_netdevice: waiting for lo to become free. Usage count = 1
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Enable security.selinux in user namespaces
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]