linux-rdma.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found] ` <alpine.DEB.2.20.1605131020320.13832-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
@ 2016-05-13 15:52   ` Christoph Lameter
       [not found]     ` <alpine.DEB.2.20.1605131051170.27372-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Christoph Lameter @ 2016-05-13 15:52 UTC (permalink / raw)
  To: Doug Ledford
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

Sorry slight mistake in the original patch. V2 follows



Subject: [PATCH] IB/core: Do not require CAP_NET_ADMIN for sniffing V2

Having to enable CAP_NET_ADMIN for every app that uses sniffer mode is kind
of risky. We do not want people to have the ability to mess around with the
network configuration and routing. We just want the app to direct streams and
deal with inbound data streams in various ways.

So lets drop the requirement for CAP_NET_ADMIN and keep just CAP_NET_RAW.

V1->V2
- Check for CAP_NET_ADMIN was conditional on IB_FLOW_ATTR_SNIFFER. We need
	to remove this in the correct way.
- Update description


Signed-off-by: Christoph Lameter <cl-vYTEC60ixJUAvxtiuMwx3w@public.gmane.org>

Index: linux/drivers/infiniband/core/uverbs_cmd.c
===================================================================
--- linux.orig/drivers/infiniband/core/uverbs_cmd.c	2016-03-24 09:16:27.782778586 -0500
+++ linux/drivers/infiniband/core/uverbs_cmd.c	2016-05-13 10:49:28.953000945 -0500
@@ -3088,8 +3088,7 @@ int ib_uverbs_ex_create_flow(struct ib_u
 	if (cmd.comp_mask)
 		return -EINVAL;

-	if ((cmd.flow_attr.type == IB_FLOW_ATTR_SNIFFER &&
-	     !capable(CAP_NET_ADMIN)) || !capable(CAP_NET_RAW))
+	if (!capable(CAP_NET_RAW))
 		return -EPERM;

 	if (cmd.flow_attr.flags >= IB_FLOW_ATTR_FLAGS_RESERVED)
--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]     ` <alpine.DEB.2.20.1605131051170.27372-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
@ 2016-05-13 20:53       ` Doug Ledford
       [not found]         ` <cf61efc8-e426-dd7c-7065-e46bbfb323b0-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Doug Ledford @ 2016-05-13 20:53 UTC (permalink / raw)
  To: Christoph Lameter
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

[-- Attachment #1: Type: text/plain, Size: 1905 bytes --]

On 05/13/2016 11:52 AM, Christoph Lameter wrote:
> Sorry slight mistake in the original patch. V2 follows
> 
> 
> 
> Subject: [PATCH] IB/core: Do not require CAP_NET_ADMIN for sniffing V2
> 
> Having to enable CAP_NET_ADMIN for every app that uses sniffer mode is kind
> of risky. We do not want people to have the ability to mess around with the
> network configuration and routing. We just want the app to direct streams and
> deal with inbound data streams in various ways.
> 
> So lets drop the requirement for CAP_NET_ADMIN and keep just CAP_NET_RAW.
> 
> V1->V2
> - Check for CAP_NET_ADMIN was conditional on IB_FLOW_ATTR_SNIFFER. We need
> 	to remove this in the correct way.
> - Update description
> 
> 
> Signed-off-by: Christoph Lameter <cl-vYTEC60ixJUAvxtiuMwx3w@public.gmane.org>
> 
> Index: linux/drivers/infiniband/core/uverbs_cmd.c
> ===================================================================
> --- linux.orig/drivers/infiniband/core/uverbs_cmd.c	2016-03-24 09:16:27.782778586 -0500
> +++ linux/drivers/infiniband/core/uverbs_cmd.c	2016-05-13 10:49:28.953000945 -0500
> @@ -3088,8 +3088,7 @@ int ib_uverbs_ex_create_flow(struct ib_u
>  	if (cmd.comp_mask)
>  		return -EINVAL;
> 
> -	if ((cmd.flow_attr.type == IB_FLOW_ATTR_SNIFFER &&
> -	     !capable(CAP_NET_ADMIN)) || !capable(CAP_NET_RAW))
> +	if (!capable(CAP_NET_RAW))
>  		return -EPERM;
> 
>  	if (cmd.flow_attr.flags >= IB_FLOW_ATTR_FLAGS_RESERVED)
> 

I'm not at all convinced this is the right thing to do.  Sniffing of
packets is definitely a privileged operation.  Tcpdump needs to be run
as root to do this on regular devices.  If not CAP_NET_ADMIN, then a
root check seems appropriate.  CAP_NET_RAW does not seem sufficient for
sniffing other people's packets.

-- 
Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
              GPG KeyID: 0E572FDD



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 884 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]         ` <cf61efc8-e426-dd7c-7065-e46bbfb323b0-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2016-05-16 13:53           ` Christoph Lameter
       [not found]             ` <alpine.DEB.2.20.1605160853050.23895-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Christoph Lameter @ 2016-05-16 13:53 UTC (permalink / raw)
  To: Doug Ledford
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

On Fri, 13 May 2016, Doug Ledford wrote:

> >  	if (cmd.flow_attr.flags >= IB_FLOW_ATTR_FLAGS_RESERVED)
> >
>
> I'm not at all convinced this is the right thing to do.  Sniffing of
> packets is definitely a privileged operation.  Tcpdump needs to be run
> as root to do this on regular devices.  If not CAP_NET_ADMIN, then a
> root check seems appropriate.  CAP_NET_RAW does not seem sufficient for
> sniffing other people's packets.

CAP_NET_RAW is sufficient for tcpdump and this is not more than that.

--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]             ` <alpine.DEB.2.20.1605160853050.23895-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
@ 2016-05-16 16:19               ` Doug Ledford
       [not found]                 ` <2994c976-8ed1-75f9-7534-2d0e5f5303b8-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Doug Ledford @ 2016-05-16 16:19 UTC (permalink / raw)
  To: Christoph Lameter
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

[-- Attachment #1: Type: text/plain, Size: 1051 bytes --]

On 05/16/2016 09:53 AM, Christoph Lameter wrote:
> On Fri, 13 May 2016, Doug Ledford wrote:
> 
>>>  	if (cmd.flow_attr.flags >= IB_FLOW_ATTR_FLAGS_RESERVED)
>>>
>>
>> I'm not at all convinced this is the right thing to do.  Sniffing of
>> packets is definitely a privileged operation.  Tcpdump needs to be run
>> as root to do this on regular devices.  If not CAP_NET_ADMIN, then a
>> root check seems appropriate.  CAP_NET_RAW does not seem sufficient for
>> sniffing other people's packets.
> 
> CAP_NET_RAW is sufficient for tcpdump and this is not more than that.


That's not true.  In order to set promisc on an interface, tcpdump calls
ioctl with SIOCSIFFLAGS as the ioctl and IFF_PROMISC set in the flags,
and in net/core/dev_ioctl.c we see this check for SIOCSIFFLAGS:


               if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
                        return -EPERM;
                /* fall through */


-- 
Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
              GPG KeyID: 0E572FDD



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 884 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                 ` <2994c976-8ed1-75f9-7534-2d0e5f5303b8-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2016-05-16 16:28                   ` Christoph Lameter
       [not found]                     ` <alpine.DEB.2.20.1605161123170.26453-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Christoph Lameter @ 2016-05-16 16:28 UTC (permalink / raw)
  To: Doug Ledford
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

On Mon, 16 May 2016, Doug Ledford wrote:

> > CAP_NET_RAW is sufficient for tcpdump and this is not more than that.
>
>
> That's not true.  In order to set promisc on an interface, tcpdump calls
> ioctl with SIOCSIFFLAGS as the ioctl and IFF_PROMISC set in the flags,
> and in net/core/dev_ioctl.c we see this check for SIOCSIFFLAGS:

Tcpdump works fine without promiscuous mode. DONT_TRAP does not
mean that the interface is switched into promiscuous mode. It just means
that all traffic accepted by the hardware is also going to the QP
specified.

One can switch the interface into promiscuous mode in addition if one
wants that. Then you need CAP_NET_ADMIN.




--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                     ` <alpine.DEB.2.20.1605161123170.26453-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
@ 2016-05-16 17:44                       ` Doug Ledford
  2016-05-18 14:42                       ` Doug Ledford
  1 sibling, 0 replies; 10+ messages in thread
From: Doug Ledford @ 2016-05-16 17:44 UTC (permalink / raw)
  To: Christoph Lameter
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

[-- Attachment #1: Type: text/plain, Size: 968 bytes --]

On 05/16/2016 12:28 PM, Christoph Lameter wrote:
> On Mon, 16 May 2016, Doug Ledford wrote:
> 
>>> CAP_NET_RAW is sufficient for tcpdump and this is not more than that.
>>
>>
>> That's not true.  In order to set promisc on an interface, tcpdump calls
>> ioctl with SIOCSIFFLAGS as the ioctl and IFF_PROMISC set in the flags,
>> and in net/core/dev_ioctl.c we see this check for SIOCSIFFLAGS:
> 
> Tcpdump works fine without promiscuous mode. DONT_TRAP does not
> mean that the interface is switched into promiscuous mode. It just means
> that all traffic accepted by the hardware is also going to the QP
> specified.

You're right, I was thinking about snooping as being more than just what
it is here.

> One can switch the interface into promiscuous mode in addition if one
> wants that. Then you need CAP_NET_ADMIN.
> 
> 
> 
> 


-- 
Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
              GPG KeyID: 0E572FDD



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 884 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                     ` <alpine.DEB.2.20.1605161123170.26453-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
  2016-05-16 17:44                       ` Doug Ledford
@ 2016-05-18 14:42                       ` Doug Ledford
       [not found]                         ` <9fa74108-e2f8-6a42-6d71-bf50b754734d-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  1 sibling, 1 reply; 10+ messages in thread
From: Doug Ledford @ 2016-05-18 14:42 UTC (permalink / raw)
  To: Christoph Lameter
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

[-- Attachment #1: Type: text/plain, Size: 1023 bytes --]

On 05/16/2016 12:28 PM, Christoph Lameter wrote:
> On Mon, 16 May 2016, Doug Ledford wrote:
> 
>>> CAP_NET_RAW is sufficient for tcpdump and this is not more than that.
>>
>>
>> That's not true.  In order to set promisc on an interface, tcpdump calls
>> ioctl with SIOCSIFFLAGS as the ioctl and IFF_PROMISC set in the flags,
>> and in net/core/dev_ioctl.c we see this check for SIOCSIFFLAGS:
> 
> Tcpdump works fine without promiscuous mode. DONT_TRAP does not
> mean that the interface is switched into promiscuous mode. It just means
> that all traffic accepted by the hardware is also going to the QP
> specified.
> 
> One can switch the interface into promiscuous mode in addition if one
> wants that. Then you need CAP_NET_ADMIN.

I've applied your patch.  I completely reworded the commit message,
you'll want to check that it meets your satisfaction before I issue my
pull request.


-- 
Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
              GPG KeyID: 0E572FDD



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 884 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                         ` <9fa74108-e2f8-6a42-6d71-bf50b754734d-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2016-05-18 18:12                           ` Christoph Lameter
       [not found]                             ` <alpine.DEB.2.20.1605181311460.14296-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Christoph Lameter @ 2016-05-18 18:12 UTC (permalink / raw)
  To: Doug Ledford
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

On Wed, 18 May 2016, Doug Ledford wrote:

> > One can switch the interface into promiscuous mode in addition if one
> > wants that. Then you need CAP_NET_ADMIN.
>
> I've applied your patch.  I completely reworded the commit message,
> you'll want to check that it meets your satisfaction before I issue my
> pull request.

I wish I knew how to view the patch. Its not in the kernel.org git repo.
Could you post the patches you edit or provide a link to them. See how
Andrew Morton does it.

--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                             ` <alpine.DEB.2.20.1605181311460.14296-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
@ 2016-05-18 18:40                               ` Doug Ledford
       [not found]                                 ` <2cba91dc-3489-0376-fe74-a3fa1c5d63a7-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  0 siblings, 1 reply; 10+ messages in thread
From: Doug Ledford @ 2016-05-18 18:40 UTC (permalink / raw)
  To: Christoph Lameter
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

[-- Attachment #1: Type: text/plain, Size: 760 bytes --]

On 05/18/2016 02:12 PM, Christoph Lameter wrote:
> On Wed, 18 May 2016, Doug Ledford wrote:
> 
>>> One can switch the interface into promiscuous mode in addition if one
>>> wants that. Then you need CAP_NET_ADMIN.
>>
>> I've applied your patch.  I completely reworded the commit message,
>> you'll want to check that it meets your satisfaction before I issue my
>> pull request.
> 
> I wish I knew how to view the patch. Its not in the kernel.org git repo.
> Could you post the patches you edit or provide a link to them. See how
> Andrew Morton does it.
> 

It's in *my* kernel.org repo.  Where you trying to see it in Linus' repo?

-- 
Doug Ledford <dledford-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
              GPG KeyID: 0E572FDD



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 884 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering
       [not found]                                 ` <2cba91dc-3489-0376-fe74-a3fa1c5d63a7-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2016-05-18 19:07                                   ` Christoph Lameter
  0 siblings, 0 replies; 10+ messages in thread
From: Christoph Lameter @ 2016-05-18 19:07 UTC (permalink / raw)
  To: Doug Ledford
  Cc: linux-rdma-u79uwXL29TY76Z2rM5mHXA, matanb-VPRAkNaXOzVWk0Htik3J/w,
	marinav-VPRAkNaXOzVWk0Htik3J/w, hadarh-VPRAkNaXOzVWk0Htik3J/w,
	leonro-VPRAkNaXOzVWk0Htik3J/w

On Wed, 18 May 2016, Doug Ledford wrote:

> On 05/18/2016 02:12 PM, Christoph Lameter wrote:
> > On Wed, 18 May 2016, Doug Ledford wrote:
> >
> >>> One can switch the interface into promiscuous mode in addition if one
> >>> wants that. Then you need CAP_NET_ADMIN.
> >>
> >> I've applied your patch.  I completely reworded the commit message,
> >> you'll want to check that it meets your satisfaction before I issue my
> >> pull request.
> >
> > I wish I knew how to view the patch. Its not in the kernel.org git repo.
> > Could you post the patches you edit or provide a link to them. See how
> > Andrew Morton does it.
> >
>
> It's in *my* kernel.org repo.  Where you trying to see it in Linus' repo?

Why would I be looking at Linus'ses tree?

Ahh.. just an update issue I guess.

Changelog is ok. Just a note that there are no levels of capabilities.
CAP_NET_ADMIN covers different things from CAP_NET_RAW. It is not a higher
level.


--
To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2016-05-18 19:07 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <alpine.DEB.2.20.1605131020320.13832@east.gentwo.org>
     [not found] ` <alpine.DEB.2.20.1605131020320.13832-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
2016-05-13 15:52   ` [PATCH] IB/core: Do not require CAP_NET_ADMIN for flow steering Christoph Lameter
     [not found]     ` <alpine.DEB.2.20.1605131051170.27372-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
2016-05-13 20:53       ` Doug Ledford
     [not found]         ` <cf61efc8-e426-dd7c-7065-e46bbfb323b0-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2016-05-16 13:53           ` Christoph Lameter
     [not found]             ` <alpine.DEB.2.20.1605160853050.23895-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
2016-05-16 16:19               ` Doug Ledford
     [not found]                 ` <2994c976-8ed1-75f9-7534-2d0e5f5303b8-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2016-05-16 16:28                   ` Christoph Lameter
     [not found]                     ` <alpine.DEB.2.20.1605161123170.26453-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
2016-05-16 17:44                       ` Doug Ledford
2016-05-18 14:42                       ` Doug Ledford
     [not found]                         ` <9fa74108-e2f8-6a42-6d71-bf50b754734d-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2016-05-18 18:12                           ` Christoph Lameter
     [not found]                             ` <alpine.DEB.2.20.1605181311460.14296-wcBtFHqTun5QOdAKl3ChDw@public.gmane.org>
2016-05-18 18:40                               ` Doug Ledford
     [not found]                                 ` <2cba91dc-3489-0376-fe74-a3fa1c5d63a7-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2016-05-18 19:07                                   ` Christoph Lameter

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).