Linux Containers
[Prev Page][Next Page]
- Re: [PATCH] audit: add containerid support for IMA-audit, (continued)
- [RFC PATCH] auditctl: add support for containerid filter, Richard Guy Briggs
- [RFC PATCH V1 00/12] audit: implement container id,
Richard Guy Briggs
- [RFC PATCH V1 01/12] audit: add container id, Richard Guy Briggs
- [RFC PATCH V1 02/12] audit: log container info of syscalls, Richard Guy Briggs
- [RFC PATCH V1 03/12] audit: add containerid filtering, Richard Guy Briggs
- [RFC PATCH V1 04/12] audit: read container ID of a process, Richard Guy Briggs
- [RFC PATCH V1 05/12] audit: add containerid support for ptrace and signals, Richard Guy Briggs
- [RFC PATCH V1 06/12] audit: add support for non-syscall auxiliary records, Richard Guy Briggs
- [RFC PATCH V1 07/12] audit: add container aux record to watch/tree/mark, Richard Guy Briggs
- [RFC PATCH V1 08/12] audit: add containerid support for tty_audit, Richard Guy Briggs
- [RFC PATCH V1 09/12] audit: add containerid support for config/feature/user records, Richard Guy Briggs
- [RFC PATCH V1 10/12] audit: add containerid support for seccomp and anom_abend records, Richard Guy Briggs
- [RFC PATCH V1 11/12] debug audit: add container id, Richard Guy Briggs
- [RFC PATCH V1 12/12] debug! audit: add container id, Richard Guy Briggs
- Re: [RFC PATCH V1 00/12] audit: implement container id, Mimi Zohar
- Re: [RFC PATCH V1 00/12] audit: implement container id, Serge E. Hallyn
- [net-next v3 2/2] bpf: Add eBPF seccomp sample programs, Sargun Dhillon
- [net-next v3 1/2] bpf, seccomp: Add eBPF filter capabilities,
Sargun Dhillon
- [net-next v3 0/2] eBPF seccomp filters,
Sargun Dhillon
- [net-next v2 2/2] bpf: Add eBPF seccomp sample programs,
Sargun Dhillon
- [net-next v2 1/2] bpf, seccomp: Add eBPF filter capabilities,
Sargun Dhillon
- [net-next v2 0/2] eBPF Seccomp filters, Sargun Dhillon
- Re: [PATCH] p9caps: add Plan9 capability devices, Enrico Weigelt
- Re: plan9 semantics on Linux - mount namespaces,
Enrico Weigelt
- [PATCH net-next 3/3] bpf: Add eBPF seccomp sample programs,
Sargun Dhillon
- [PATCH net-next 2/3] seccomp, ptrace: Add a mechanism to retrieve attached eBPF seccomp filters, Sargun Dhillon
- [PATCH net-next 1/3] bpf, seccomp: Add eBPF filter capabilities,
Sargun Dhillon
- [PATCH net-next 0/3] eBPF Seccomp filters,
Sargun Dhillon
- [RFC 0/3] seccomp trap to userspace,
Tycho Andersen
- rtnetlink updates in 4.16, Christian Brauner
- [GIT PULL] userns fixes for 4.16-rc1, Eric W. Biederman
- RFC(V3): Audit Kernel Container IDs,
Richard Guy Briggs
- [GIT PULL] pid bug fix for v4.15-rc7, Eric W. Biederman
- [PATCH v5 00/11] FUSE mounts from non-init user namespaces,
Dongsu Park
- [PATCH 01/11] block_dev: Support checking inode permissions in lookup_bdev(), Dongsu Park
- [PATCH 02/11] mtd: Check permissions towards mtd block device inode when mounting, Dongsu Park
- [PATCH 03/11] fs: Allow superblock owner to change ownership of inodes, Dongsu Park
- [PATCH 04/11] fs: Don't remove suid for CAP_FSETID for userns root, Dongsu Park
- [PATCH 05/11] fs: Allow superblock owner to access do_remount_sb(), Dongsu Park
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs, Dongsu Park
- [PATCH 07/11] fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems, Dongsu Park
- [PATCH 08/11] fuse: Support fuse filesystems outside of init_user_ns, Dongsu Park
- [PATCH 09/11] fuse: Restrict allow_other to the superblock's namespace or a descendant, Dongsu Park
- [PATCH 10/11] fuse: Allow user namespace mounts, Dongsu Park
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts, Dongsu Park
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces, Eric W. Biederman
- Re: [PATCH v5 00/11] FUSE mounts from non-init user namespaces, Miklos Szeredi
- [PATCH v6 0/6] fuse: mounts from non-init user namespaces, Eric W. Biederman
- [PATCH v6 2/5] fuse: Fail all requests with invalid uids or gids, Eric W. Biederman
- [PATCH v6 3/5] fuse: Support fuse filesystems outside of init_user_ns, Eric W. Biederman
- [PATCH v6 4/5] fuse: Ensure posix acls are translated outside of init_user_ns, Eric W. Biederman
[PATCH v6 5/5] fuse: Restrict allow_other to the superblock's namespace or a descendant, Eric W. Biederman
[PATCH v7 0/7] fuse: mounts from non-init user namespaces, Eric W. Biederman
Re: [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch,
Eric W. Biederman
libresource for system resource information.,
Rahul Yadav
[PATCH 0/2] userns: automount cleanups,
Eric W. Biederman
Say no to low quality ineffective drugs! Our pharmacy is the place where best drugs are sold!, Canadian-Pharmacy
Documentation patch for namespaced file capabilities,
Michael Kerrisk (man-pages)
Even if you have a lot of money, wasting them on fake medications is not a good idea!, Fast-Pills
[PATCH] user_namespaces.7: Record new 340 line idmap limit,
Christian Brauner
[GIT PULL] user namespace updates for v4.15-rc1, Eric W. Biederman
Containers devroom at FOSDEM 2018: Call for papers, Stéphane Graber
[PATCH 0/9] use network namespace for iSCSI control interfaces,
Chris Leech
- [PATCH 1/9] iscsi: create per-net iscsi netlink kernel sockets, Chris Leech
- [PATCH 2/9] iscsi: associate endpoints with a host, Chris Leech
- [PATCH 3/9] iscsi: sysfs filtering by network namespace, Chris Leech
- [PATCH 4/9] iscsi: make all iSCSI netlink multicast namespace aware, Chris Leech
- [PATCH 5/9] iscsi: set netns for iscsi_tcp hosts, Chris Leech
- [PATCH 7/9] iscsi: convert flashnode devices from bus to class, Chris Leech
- [PATCH 6/9] iscsi: check net namespace for all iscsi lookups, Chris Leech
- [PATCH 9/9] iscsi: filter flashnode sysfs by net namespace, Chris Leech
- [PATCH 8/9] iscsi: rename iscsi_bus_flash_* to iscsi_flash_*, Chris Leech
- RE: [PATCH 0/9] use network namespace for iSCSI control interfaces, David Laight
[PATCH v3] scsi: require CAP_SYS_ADMIN to write to procfs interface,
Aleksa Sarai
[PATCH v2] scsi: require CAP_SYS_ADMIN to write to procfs interface,
Aleksa Sarai
[PATCH] scsi: require CAP_SYS_ADMIN to write to procfs interface,
Aleksa Sarai
[PATCH 0/5] userns: bump idmap limits, fixes & tweaks,
Eric W. Biederman
LXC 1.0.11, LXC 2.0.9, LXC 2.1.1, LXCFS 2.0.8 and LXD 2.0.11 have been released!, Stéphane Graber
RFC: making cn_proc work in {pid,user} namespaces,
Aleksa Sarai
RFC(v2): Audit Kernel Container IDs,
Richard Guy Briggs
[PATCH] KEYS: allow changing key ownership with CAP_SYS_ADMIN in a NS,
Dimitri John Ledkov
[RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave,
Eric W. Biederman
Re: [RFC][PATCH] security: Make the selinux setxattr and removexattr hooks behave, Stephen Smalley
RFC: Audit Kernel Container IDs,
Richard Guy Briggs
[GIT PULL] namespace updates for 4.14-rc1, Eric W. Biederman
LXC 2.1 has been released, Stéphane Graber
Re: [PATCH 2/9] Implement containers as kernel objects,
Richard Guy Briggs
Re: [Linux-ima-devel] [RFC PATCH 1/5] ima: extend clone() with IMA,
Magalhaes, Guilherme (Brazil R&D-CL)
Names badges With your Company Logo R38 Each, Graham
[ANNOUNCE] Checkpoint/Restore micro-conference at Linux Plumbers, Mike Rapoprt
Hello, Stanislaw Drozd
[RFC PATCH 0/5] ima: namespacing IMA audit messages,
Mehmet Kayaalp
[Announce] CRIU v3.3 (Crystal Pelican),
Pavel Emelyanov
[GIT PULL] sysctl fixes for v4.13-rc1,
Eric W. Biederman
[PATCH v2] Enable namespaced file capabilities,
Stefan Berger
- [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, James Morris
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, James Morris
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Theodore Ts'o
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Theodore Ts'o
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Stefan Berger
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, James Bottomley
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, James Bottomley
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Theodore Ts'o
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Theodore Ts'o
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Message not available
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Message not available
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Mimi Zohar
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
- Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Serge E. Hallyn
Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Vivek Goyal
Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Eric W. Biederman
Re: [PATCH v2] xattr: Enable security.capability in user namespaces, Vivek Goyal
[lkp-robot] [xattr] 3f3bf5920d: ltp.userns06.fail, kernel test robot
[signal] bb78acf9d7: kernel_BUG_at_fs/fcntl.c, kernel test robot
Linux Plumbers containers micro-conference CFP,
Stéphane Graber
[GIT PULL] mnt namespace updates for v4.13-rc1, Eric W. Biederman
[PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE,
Eric W. Biederman
[PATCH 8/8] signal: Remove kernel interal si_code magic,
Eric W. Biederman
[PATCH 7/8] fcntl: Don't use ambiguous SIG_POLL si_codes, Eric W. Biederman
[PATCH 6/8] signal/x86: Fix SIGSYS handling in copy_siginfo_to_user32, Eric W. Biederman
[PATCH 5/8] signal/testing: Don't look for __SI_FAULT in userspace, Eric W. Biederman
[PATCH 4/8] signal/mips: Document a conflict with SI_USER with SIGFPE, Eric W. Biederman
[PATCH 2/8] signal/ia64: Document a conflict with SI_USER with SIGFPE, Eric W. Biederman
[PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP,
Eric W. Biederman
[PATCH 0/8] signal: Fix sending signals with siginfo,
Eric W. Biederman
BUG: Dentry ffff9f795a08fe60{i=af565f, n=lo} still in use (1) [unmount of proc proc],
Andrei Vagin
unregister_netdevice: waiting for lo to become free. Usage count = 1,
Andrei Vagin
[PATCH 0/3] Enable namespaced file capabilities,
Stefan Berger
Fwd: patch "tty: add TIOCGPTPEER ioctl" added to tty-next, Aleksa Sarai
[PATCH] ioctl_tty.2: add TIOCGPTPEER documentation,
Aleksa Sarai
[Index of Archives]
[Cgroups]
[Kernel]
[Kernel Announce]
[Kernel Newbies]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]