diff for duplicates of <87twcbq696.fsf@x220.int.ebiederm.org> diff --git a/a/1.txt b/N1/1.txt index 3cbdb01..45728ad 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -15,9 +15,9 @@ has CAP_SYS_ADMIN in task->mm->user_ns instead of task->cred->user_ns. This ensures that if the task changes it's cred into a subordinate user namespace it does not become ptraceable. -Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org +Cc: stable@vger.kernel.org Fixes: 8409cca70561 ("userns: allow ptrace from non-init user namespaces") -Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> --- It turns out that dumpable needs to be fixed to be user namespace @@ -146,3 +146,9 @@ index a56a851908d2..975e49f00f34 100644 }; -- 2.8.3 + +-- +To unsubscribe, send a message with 'unsubscribe linux-mm' in +the body to majordomo@kvack.org. For more info on Linux MM, +see: http://www.linux-mm.org/ . +Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N1/content_digest index b579d49..3906014 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,12 +1,13 @@ - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" "Subject\0[REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access\0" "Date\0Mon, 17 Oct 2016 11:39:49 -0500\0" - "To\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>\0" - "Cc\0linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - Oleg Nesterov <oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org - " linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" + "To\0Linux Containers <containers@lists.linux-foundation.org>\0" + "Cc\0<linux-mm@kvack.org> " + <linux-fsdevel@vger.kernel.org> + Serge E. Hallyn <serge@hallyn.com> + Oleg Nesterov <oleg@redhat.com> + Andy Lutomirski <luto@amacapital.net> + " <linux-kernel@vger.kernel.org>\0" "\00:1\0" "b\0" "\n" @@ -26,9 +27,9 @@ "This ensures that if the task changes it's cred into a subordinate\n" "user namespace it does not become ptraceable.\n" "\n" - "Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\n" + "Cc: stable@vger.kernel.org\n" "Fixes: 8409cca70561 (\"userns: allow ptrace from non-init user namespaces\")\n" - "Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + "Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" "---\n" "\n" "It turns out that dumpable needs to be fixed to be user namespace\n" @@ -156,6 +157,12 @@ " \tINIT_MM_CONTEXT(init_mm)\n" " };\n" "-- \n" - 2.8.3 + "2.8.3\n" + "\n" + "--\n" + "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" + "the body to majordomo@kvack.org. For more info on Linux MM,\n" + "see: http://www.linux-mm.org/ .\n" + "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" -b13c7b7e8fb92d03aca609c96dc6f1611544620c590cb8ba9917f1ee43d0e5f9 +a70184c54e09a9d7f04efc561ccfcf293b18b02bd2a6343c905db48626838d17
diff --git a/a/1.txt b/N2/1.txt index 3cbdb01..45728ad 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -15,9 +15,9 @@ has CAP_SYS_ADMIN in task->mm->user_ns instead of task->cred->user_ns. This ensures that if the task changes it's cred into a subordinate user namespace it does not become ptraceable. -Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org +Cc: stable@vger.kernel.org Fixes: 8409cca70561 ("userns: allow ptrace from non-init user namespaces") -Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> --- It turns out that dumpable needs to be fixed to be user namespace @@ -146,3 +146,9 @@ index a56a851908d2..975e49f00f34 100644 }; -- 2.8.3 + +-- +To unsubscribe, send a message with 'unsubscribe linux-mm' in +the body to majordomo@kvack.org. For more info on Linux MM, +see: http://www.linux-mm.org/ . +Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N2/content_digest index b579d49..f1fabfa 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,12 +1,13 @@ - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" "Subject\0[REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access\0" "Date\0Mon, 17 Oct 2016 11:39:49 -0500\0" - "To\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>\0" - "Cc\0linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - Oleg Nesterov <oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org - " linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" + "To\0Linux Containers <containers@lists.linux-foundation.org>\0" + "Cc\0linux-mm@kvack.org" + linux-fsdevel@vger.kernel.org + Serge E. Hallyn <serge@hallyn.com> + Oleg Nesterov <oleg@redhat.com> + Andy Lutomirski <luto@amacapital.net> + " linux-kernel@vger.kernel.org\0" "\00:1\0" "b\0" "\n" @@ -26,9 +27,9 @@ "This ensures that if the task changes it's cred into a subordinate\n" "user namespace it does not become ptraceable.\n" "\n" - "Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\n" + "Cc: stable@vger.kernel.org\n" "Fixes: 8409cca70561 (\"userns: allow ptrace from non-init user namespaces\")\n" - "Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + "Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" "---\n" "\n" "It turns out that dumpable needs to be fixed to be user namespace\n" @@ -156,6 +157,12 @@ " \tINIT_MM_CONTEXT(init_mm)\n" " };\n" "-- \n" - 2.8.3 + "2.8.3\n" + "\n" + "--\n" + "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" + "the body to majordomo@kvack.org. For more info on Linux MM,\n" + "see: http://www.linux-mm.org/ .\n" + "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" -b13c7b7e8fb92d03aca609c96dc6f1611544620c590cb8ba9917f1ee43d0e5f9 +124b7ff63d9252bd7050ed91d568b1b6952a7a915bf7782d3443398439299c70
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.