All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 0/7] Initial support for user namespace owned mounts
@ 2015-07-15 19:46 ` Seth Forshee
  0 siblings, 0 replies; 232+ messages in thread
From: Seth Forshee @ 2015-07-15 19:46 UTC (permalink / raw)
  To: Eric W. Biederman, Alexander Viro, linux-fsdevel,
	linux-security-module, selinux
  Cc: Serge Hallyn, Andy Lutomirski, Seth Forshee, linux-kernel

These are the first in a larger set of patches that I've been working on
(with help from Eric Biederman) to support mounting ext4 and fuse
filesystems from within user namespaces. I've pushed the full series to:

  git://kernel.ubuntu.com/sforshee/linux.git userns-mounts

Taking the series as a whole, the strategy is to handle as much of the
heavy lifting as possible in the vfs so the filesystems don't have to
handle weird edge cases. If you look at the full series you'll find that
the changes in ext4 to support user namespace mounts turn out to be
fairly minimal (fuse is a bit more complicated though as it must deal
with translating ids for a userspace process which is running in pid and
user namespaces).

The patches I'm sending today lay some of the groundwork in the vfs and
related code. They fall into two broad groups:

 1. Patches 1-2 add s_user_ns and simplify MNT_NODEV handling. These are
    pretty straightforward, and Eric has expressed interest in merging
    these patches soon. Note that patch 2 won't apply cleanly without
    Eric's noexec patches for proc and sys [1].

 2. Patches 2-7 tighten down security for mounts with s_user_ns !=
    &init_user_ns. This includes updates to how file caps and suid are
    handled and LSM updates to ignore security labels on superblocks
    from non-init namespaces.

    The LSM changes in particular may not be optimal, as I don't have a
    lot of familiarity with this code, so I'd be especially appreciative
    of review of these changes and suggestions on how to improve them.

Subsequent patches will update the vfs for id translation, handling
various corner cases, giving privileges to the user namsepace which owns
a superblock, and finally supporting user namespace mounts for ext4 and
fuse.

Thanks,
Seth

[1] http://lkml.kernel.org/r/87mvz4yomp.fsf_-_@x220.int.ebiederm.org


Andy Lutomirski (1):
  fs: Treat foreign mounts as nosuid

Eric W. Biederman (1):
  userns: Simpilify MNT_NODEV handling.

Seth Forshee (5):
  fs: Add user namesapace member to struct super_block
  fs: Ignore file caps in mounts from other user namespaces
  security: Restrict security attribute updates for userns mounts
  selinux: Ignore security labels on user namespace mounts
  smack: Don't use security labels for user namespace mounts

 fs/block_dev.c                 |  2 +-
 fs/exec.c                      |  2 +-
 fs/namei.c                     |  9 ++++++++-
 fs/namespace.c                 | 34 ++++++++++++++++++++--------------
 fs/proc/root.c                 |  3 ++-
 fs/super.c                     | 38 +++++++++++++++++++++++++++++++++-----
 include/linux/fs.h             |  9 +++++++++
 include/linux/mount.h          |  1 +
 include/linux/user_namespace.h |  8 ++++++++
 kernel/user_namespace.c        | 14 ++++++++++++++
 security/commoncap.c           |  4 +++-
 security/security.c            | 10 +++++++++-
 security/selinux/hooks.c       | 16 +++++++++++++++-
 security/smack/smack_lsm.c     | 12 ++++++++++--
 14 files changed, 134 insertions(+), 28 deletions(-)


^ permalink raw reply	[flat|nested] 232+ messages in thread
* Re: [PATCH 0/7] Initial support for user namespace owned mounts
@ 2015-07-30  4:24 ` Amir Goldstein
  0 siblings, 0 replies; 232+ messages in thread
From: Amir Goldstein @ 2015-07-30  4:24 UTC (permalink / raw)
  To: Seth Forshee
  Cc: Casey Schaufler, Stephen Smalley, Andy Lutomirski,
	Eric W. Biederman, Alexander Viro, Linux FS Devel, LSM List,
	SELinux-NSA, Serge Hallyn, linux-kernel

On Tue, Jul 28, 2015 at 11:40 PM, Seth Forshee
<seth.forshee@canonical.com> wrote:
>
> On Wed, Jul 22, 2015 at 05:05:17PM -0700, Casey Schaufler wrote:
> > > This is what I currently think you want for user ns mounts:
> > >
> > >  1. smk_root and smk_default are assigned the label of the backing
> > >     device.

Seth,

There were 2 main concerns discussed in this thread:
1. trusting LSM labels outside the namespace
2. trusting the content of the image file/loopdev

While your approach addresses the first concern, I suspect it may be placing
an obstacle in a way for resolving the second concern.

A viable security policy to mitigate the second concern could be:
- Allow only trusted programs (e.g. mkfs, fsck) to write to 'Loopback' images
- Allow mount only of 'Loopback' images

This should allow the system as a whole to trust unprivileged mounts based on
the trust of the entities that had raw access the the fs layout.

Alas, if you choose to propagate the backing dev label to contained files,
they would all share the designated 'Loopback' label and render the policy above
useless.

Any thoughts on how to reconcile this conflict?

Amir.


> > >  2. s_root is assigned the transmute property.
> > >  3. For existing files:
> > >     a. Files with the same label as the backing device are accessible.
> > >     b. Files with any other label are not accessible.
> >
> > That's right. Accept correct data, reject anything that's not right.
> >
> > > If this is right, there are a couple lingering questions in my mind.
> > >
> > > First, what happens with files created in directories with the same
> > > label as the backing device but without the transmute property set? The
> > > inode for the new file will initially be labeled with smk_of_current(),
> > > but then during d_instantiate it will get smk_default and thus end up
> > > with the label we want. So that seems okay.
> >
> > Yes.
> >
> > > The second is whether files with the SMACK64EXEC attribute is still a
> > > problem. It seems it is, for files with the same label as the backing
> > > store at least. I think we can simply skip the code that reads out this
> > > xattr and sets smk_task for user ns mounts, or else skip assigning the
> > > label to the new task in bprm_set_creds. The latter seems more
> > > consistent with the approach you've suggested for dealing with labels
> > > from disk.
> >
> > Yes, I think that skipping the smk_fetch(XATTR_NAME_SMACKEXEC, ...) in
> > smack_d_instantiate for unprivileged mounts would do the trick.
> >
> > > So I guess all of that seems okay, though perhaps a bit restrictive
> > > given that the user who mounted the filesystem already has full access
> > > to the backing store.
> >
> > In truth, there is no reason to expect that the "user" who did the
> > mount will ever have a Smack label that differs from the label of
> > the backing store. If what we've got here seems restrictive, it's
> > because you've got access from someone other than the "user".
> >
> > > Please let me know whether or not this matches up with what you are
> > > thinking, then I can procede with the implementation.
> >
> > My current mindset is that, if you're going to allow unprivileged
> > mounts of user defined backing stores, this is as safe as we can
> > make it.
>
> All right, I've got a patch which I think does this, and I've managed to
> do some testing to confirm that it behaves like I expect. How does this
> look?
>
> What's missing is getting the label from the block device inode; as
> Stephen discovered the inode that I thought we could get the label from
> turned out to be the wrong one. Afaict we would need a new hook in order
> to do that, so for now I'm using the label of the proccess calling
> mount.
>
> ---
>
> diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
> index a143328f75eb..8e631a66b03c 100644
> --- a/security/smack/smack_lsm.c
> +++ b/security/smack/smack_lsm.c
> @@ -662,6 +662,8 @@ static int smack_sb_kern_mount(struct super_block *sb, int flags, void *data)
>                 skp = smk_of_current();
>                 sp->smk_root = skp;
>                 sp->smk_default = skp;
> +               if (sb_in_userns(sb))
> +                       transmute = 1;
>         }
>         /*
>          * Initialize the root inode.
> @@ -1023,6 +1025,12 @@ static int smack_inode_permission(struct inode *inode, int mask)
>         if (mask == 0)
>                 return 0;
>
> +       if (sb_in_userns(inode->i_sb)) {
> +               struct superblock_smack *sbsp = inode->i_sb->s_security;
> +               if (smk_of_inode(inode) != sbsp->smk_root)
> +                       return -EACCES;
> +       }
> +
>         /* May be droppable after audit */
>         if (no_block)
>                 return -ECHILD;
> @@ -3220,14 +3228,16 @@ static void smack_d_instantiate(struct dentry *opt_dentry, struct inode *inode)
>                         if (rc >= 0)
>                                 transflag = SMK_INODE_TRANSMUTE;
>                 }
> -               /*
> -                * Don't let the exec or mmap label be "*" or "@".
> -                */
> -               skp = smk_fetch(XATTR_NAME_SMACKEXEC, inode, dp);
> -               if (IS_ERR(skp) || skp == &smack_known_star ||
> -                   skp == &smack_known_web)
> -                       skp = NULL;
> -               isp->smk_task = skp;
> +               if (!sb_in_userns(inode->i_sb)) {
> +                       /*
> +                        * Don't let the exec or mmap label be "*" or "@".
> +                        */
> +                       skp = smk_fetch(XATTR_NAME_SMACKEXEC, inode, dp);
> +                       if (IS_ERR(skp) || skp == &smack_known_star ||
> +                           skp == &smack_known_web)
> +                               skp = NULL;
> +                       isp->smk_task = skp;
> +               }
>
>                 skp = smk_fetch(XATTR_NAME_SMACKMMAP, inode, dp);
>                 if (IS_ERR(skp) || skp == &smack_known_star ||
> --
> To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 232+ messages in thread
* Re: [PATCH 0/7] Initial support for user namespace owned mounts
@ 2015-07-31  8:11 ` Amir Goldstein
  0 siblings, 0 replies; 232+ messages in thread
From: Amir Goldstein @ 2015-07-31  8:11 UTC (permalink / raw)
  To: Casey Schaufler
  Cc: Seth Forshee, Theodore Ts'o, Stephen Smalley,
	Andy Lutomirski, Eric W. Biederman, Alexander Viro,
	Linux FS Devel, LSM List, SELinux-NSA, Serge Hallyn,
	linux-kernel

On Thu, Jul 30, 2015 at 6:33 PM, Casey Schaufler <casey@schaufler-ca.com> wrote:
> On 7/30/2015 7:47 AM, Amir Goldstein wrote:
>> On Thu, Jul 30, 2015 at 4:55 PM, Seth Forshee
>> <seth.forshee@canonical.com> wrote:
>>> On Thu, Jul 30, 2015 at 07:24:11AM +0300, Amir Goldstein wrote:
>>>> On Tue, Jul 28, 2015 at 11:40 PM, Seth Forshee
>>>> <seth.forshee@canonical.com> wrote:
>>>>> On Wed, Jul 22, 2015 at 05:05:17PM -0700, Casey Schaufler wrote:
>>>>>>> This is what I currently think you want for user ns mounts:
>>>>>>>
>>>>>>>  1. smk_root and smk_default are assigned the label of the backing
>>>>>>>     device.
>>>> Seth,
>>>>
>>>> There were 2 main concerns discussed in this thread:
>>>> 1. trusting LSM labels outside the namespace
>>>> 2. trusting the content of the image file/loopdev
>>>>
>>>> While your approach addresses the first concern, I suspect it may be placing
>>>> an obstacle in a way for resolving the second concern.
>>>>
>>>> A viable security policy to mitigate the second concern could be:
>>>> - Allow only trusted programs (e.g. mkfs, fsck) to write to 'Loopback' images
>>>> - Allow mount only of 'Loopback' images
>>>>
>>>> This should allow the system as a whole to trust unprivileged mounts based on
>>>> the trust of the entities that had raw access the the fs layout.
>>> You don't really say what you mean by "trusted" programs. In a container
>>> context I'd have to assume that you mean suid-root or similar programs
>>> shared into the container by the host. In that case is any new kernel
>>> functionality even required?
>> Sorry I was not clear. I will try to explain better.
>> I meant that the programs are "trusted" by the LSM security policy.
>> I envisioned a system where unprivileged user is allowed to spawn
>> a container which contains "trusted" programs (e.g. mkfs) that are labeled
>> as 'FileSystemTools' by the admin of the host.
>> FileSystemTools are allowed to write into Loopback labeled files.
>
> You could do this on a Smack based system. It would require
> CAP_MAC_ADMIN and CAP_MAC_OVERRIDE to set up. You would need
> to set some SMACK64EXEC labels on your FileSystemTools, and
> they would have to be written as carefully as the would if they
> had "more" privilege. You'd need to designate a repository for
> your loopback files. On the whole, it would be unattractive.
> I will pass on providing the details for fear someone will like
> it well enough to implement.
>
>>> That also doesn't work for some of our use cases, where we'd like to be
>>> able to do something like "mount -o loop foo.img /mnt/foo" in an
>>> unprivileged container where foo.img is not created on the local machine
>>> and not fully under control of the host environment.
>> That use case will not be addressed by the policy I suggested,
>> but the more common case of:
>> - create a loopback file
>> - mkfs
>> - mount
>> will be addressed.
>>
>> So if the (host) admin of the system trusts that unprivileged user cannot create
>> a malicious fs layout using mkfs and fsck alone, then the system is
>> relatively safe
>> mounting (non fuse) file systems from loopback files.
>> IMHO, this statement is going to be easier for Ted to sign.
>
> But that sort of defeats the purpose of unprivileged mounts.
> Or rather, you're trying to place restrictions on what an
> unprivileged user can do without calling the ability to
> violate those restrictions "privilege".

I don't understand your concern.
I am saying that LSM can come to the rescue, in a use case that
many have been considering as unsolvable (i.e. the loopback tampering).

Yes, I am trying to place restrictions on what an unprivileged user can do.
As it stands right now, user is about to gain the ability to mount FUSE.
With some extra care on crafting the policy and without any extra code,
user can gain the ability to mount "trusted loopback files".
It does not solve all use cases, but it does solve a handful.

Anyway, the concern I was raising was about the fact that if files inside
the loopback mount inherit the label of the loopback file, this policy is
going to be impossible to write.
But Stephan has already proposed an alternative to this implicit inherit rule
on [PATCH 6/7] thread, so I withdraw my concern.


>
>>
>>> Agreed though that the "attack from below" problem for untrusted
>>> filesystems is still an open question. At minimum we have fuse, which
>>> has been designed to protect against this threat. Others have mentioned
>>> on this thread that Ted had said something at kernel summit last year
>>> about being willing to support ext4 mounts from unprivileged user
>>> namespaces as well. I've added Ted to the Cc in case he wants to confirm
>>> or deny this rumor.
>>>
>>>> Alas, if you choose to propagate the backing dev label to contained files,
>>>> they would all share the designated 'Loopback' label and render the policy above
>>>> useless.
>>>>
>>>> Any thoughts on how to reconcile this conflict?
>>> I'm not seeing what the conflict is here - nothing you proposed says
>>> anything about security labels in the filesystem, and nothing would
>>> prevent a "trusted" program with CAP_MAC_ADMIN from setting whatever
>>> label was desired on the backing device. Care to elaborate?
>>>
>>> Seth
>

^ permalink raw reply	[flat|nested] 232+ messages in thread

end of thread, other threads:[~2015-08-07 18:57 UTC | newest]

Thread overview: 232+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-07-15 19:46 [PATCH 0/7] Initial support for user namespace owned mounts Seth Forshee
2015-07-15 19:46 ` Seth Forshee
2015-07-15 19:46 ` [PATCH 1/7] fs: Add user namesapace member to struct super_block Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-16  2:47   ` Eric W. Biederman
2015-07-16  2:47     ` Eric W. Biederman
2015-08-05 21:03     ` Seth Forshee
2015-08-05 21:03       ` Seth Forshee
2015-08-05 21:19       ` Eric W. Biederman
2015-08-05 21:19         ` Eric W. Biederman
2015-08-06 14:20         ` Seth Forshee
2015-08-06 14:20           ` Seth Forshee
2015-08-06 14:51           ` Stephen Smalley
2015-08-06 14:51             ` Stephen Smalley
2015-08-06 15:44             ` Seth Forshee
2015-08-06 15:44               ` Seth Forshee
2015-08-06 16:11               ` Stephen Smalley
2015-08-06 16:11                 ` Stephen Smalley
2015-08-07 14:16                 ` Seth Forshee
2015-08-07 14:16                   ` Seth Forshee
2015-08-07 14:32           ` Seth Forshee
2015-08-07 14:32             ` Seth Forshee
2015-08-07 18:35             ` Casey Schaufler
2015-08-07 18:35               ` Casey Schaufler
2015-08-07 18:57               ` Seth Forshee
2015-08-07 18:57                 ` Seth Forshee
2015-07-15 19:46 ` [PATCH 2/7] userns: Simpilify MNT_NODEV handling Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-15 19:46 ` [PATCH 3/7] fs: Ignore file caps in mounts from other user namespaces Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-15 21:48   ` Serge E. Hallyn
2015-07-15 21:48     ` Serge E. Hallyn
2015-07-15 21:50     ` Andy Lutomirski
2015-07-15 21:50       ` Andy Lutomirski
2015-07-15 22:35       ` Eric W. Biederman
2015-07-15 22:35         ` Eric W. Biederman
2015-07-16  1:14         ` Seth Forshee
2015-07-16  1:14           ` Seth Forshee
2015-07-16  1:23           ` Andy Lutomirski
2015-07-16  1:23             ` Andy Lutomirski
2015-07-16 13:06             ` Seth Forshee
2015-07-16 13:06               ` Seth Forshee
2015-07-16  1:19         ` Andy Lutomirski
2015-07-16  1:19           ` Andy Lutomirski
2015-07-16  4:23           ` Eric W. Biederman
2015-07-16  4:23             ` Eric W. Biederman
2015-07-16  4:49             ` Andy Lutomirski
2015-07-16  4:49               ` Andy Lutomirski
2015-07-16  5:04               ` Eric W. Biederman
2015-07-16  5:04                 ` Eric W. Biederman
2015-07-16  5:15                 ` Andy Lutomirski
2015-07-16  5:15                   ` Andy Lutomirski
2015-07-16  5:44                   ` Eric W. Biederman
2015-07-16  5:44                     ` Eric W. Biederman
2015-07-16 13:13                     ` Seth Forshee
2015-07-16 13:13                       ` Seth Forshee
2015-07-17  0:43                       ` Eric W. Biederman
2015-07-17  0:43                         ` Eric W. Biederman
2015-07-29 16:04                 ` Serge E. Hallyn
2015-07-29 16:04                   ` Serge E. Hallyn
2015-07-29 16:18                   ` Serge E. Hallyn
2015-07-29 16:18                     ` Serge E. Hallyn
2015-07-15 19:46 ` [PATCH 4/7] fs: Treat foreign mounts as nosuid Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-17  6:46   ` Nikolay Borisov
2015-07-17  6:46     ` Nikolay Borisov
2015-07-15 19:46 ` [PATCH 5/7] security: Restrict security attribute updates for userns mounts Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-15 19:46 ` [PATCH 6/7] selinux: Ignore security labels on user namespace mounts Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-16 13:23   ` Stephen Smalley
2015-07-22 16:02     ` Stephen Smalley
2015-07-22 16:14       ` Seth Forshee
2015-07-22 16:14         ` Seth Forshee
2015-07-22 20:25         ` Stephen Smalley
2015-07-22 20:25           ` Stephen Smalley
2015-07-22 20:40           ` Stephen Smalley
2015-07-22 20:40             ` Stephen Smalley
2015-07-23 13:57             ` Stephen Smalley
2015-07-23 13:57               ` Stephen Smalley
2015-07-23 14:39               ` Seth Forshee
2015-07-23 14:39                 ` Seth Forshee
2015-07-23 15:36                 ` Stephen Smalley
2015-07-23 15:36                   ` Stephen Smalley
2015-07-23 16:23                   ` Seth Forshee
2015-07-23 16:23                     ` Seth Forshee
2015-07-24 15:11                     ` Seth Forshee
2015-07-24 15:11                       ` Seth Forshee
2015-07-30 15:57                       ` Stephen Smalley
2015-07-30 15:57                         ` Stephen Smalley
2015-07-30 16:24                         ` Seth Forshee
2015-07-30 16:24                           ` Seth Forshee
2015-07-15 19:46 ` [PATCH 7/7] smack: Don't use security labels for " Seth Forshee
2015-07-15 19:46   ` Seth Forshee
2015-07-15 20:43   ` Casey Schaufler
2015-07-15 20:43     ` Casey Schaufler
2015-07-15 20:36 ` [PATCH 0/7] Initial support for user namespace owned mounts Casey Schaufler
2015-07-15 20:36   ` Casey Schaufler
2015-07-15 21:06   ` Eric W. Biederman
2015-07-15 21:06     ` Eric W. Biederman
2015-07-15 21:48     ` Seth Forshee
2015-07-15 21:48       ` Seth Forshee
2015-07-15 22:28       ` Eric W. Biederman
2015-07-15 22:28         ` Eric W. Biederman
2015-07-16  1:05         ` Andy Lutomirski
2015-07-16  1:05           ` Andy Lutomirski
2015-07-16  2:20           ` Eric W. Biederman
2015-07-16  2:20             ` Eric W. Biederman
2015-07-16 13:12           ` Stephen Smalley
2015-07-16 13:12             ` Stephen Smalley
2015-07-15 23:04       ` Casey Schaufler
2015-07-15 23:04         ` Casey Schaufler
2015-07-15 22:39     ` Casey Schaufler
2015-07-15 22:39       ` Casey Schaufler
2015-07-16  1:08       ` Andy Lutomirski
2015-07-16  1:08         ` Andy Lutomirski
2015-07-16  2:54         ` Casey Schaufler
2015-07-16  2:54           ` Casey Schaufler
2015-07-16  4:47           ` Eric W. Biederman
2015-07-16  4:47             ` Eric W. Biederman
2015-07-17  0:09             ` Dave Chinner
2015-07-17  0:09               ` Dave Chinner
2015-07-17  0:42               ` Eric W. Biederman
2015-07-17  0:42                 ` Eric W. Biederman
2015-07-17  2:47                 ` Dave Chinner
2015-07-17  2:47                   ` Dave Chinner
2015-07-21 17:37                   ` J. Bruce Fields
2015-07-21 17:37                     ` J. Bruce Fields
2015-07-22  7:56                     ` Dave Chinner
2015-07-22  7:56                       ` Dave Chinner
2015-07-22 14:09                       ` J. Bruce Fields
2015-07-22 14:09                         ` J. Bruce Fields
2015-07-22 16:52                         ` Austin S Hemmelgarn
2015-07-22 16:52                           ` Austin S Hemmelgarn
2015-07-22 17:41                           ` J. Bruce Fields
2015-07-22 17:41                             ` J. Bruce Fields
2015-07-23  1:51                             ` Dave Chinner
2015-07-23  1:51                               ` Dave Chinner
2015-07-23 13:19                               ` J. Bruce Fields
2015-07-23 13:19                                 ` J. Bruce Fields
2015-07-23 23:48                                 ` Dave Chinner
2015-07-23 23:48                                   ` Dave Chinner
2015-07-18  0:07                 ` Serge E. Hallyn
2015-07-18  0:07                   ` Serge E. Hallyn
2015-07-20 17:54             ` Colin Walters
2015-07-20 17:54               ` Colin Walters
2015-07-16 11:16     ` Lukasz Pawelczyk
2015-07-16 11:16       ` Lukasz Pawelczyk
2015-07-17  0:10       ` Eric W. Biederman
2015-07-17  0:10         ` Eric W. Biederman
2015-07-17 10:13         ` Lukasz Pawelczyk
2015-07-17 10:13           ` Lukasz Pawelczyk
2015-07-16  3:15 ` Eric W. Biederman
2015-07-16  3:15   ` Eric W. Biederman
2015-07-16 13:59   ` Seth Forshee
2015-07-16 13:59     ` Seth Forshee
2015-07-16 15:09     ` Casey Schaufler
2015-07-16 15:09       ` Casey Schaufler
2015-07-16 18:57       ` Seth Forshee
2015-07-16 18:57         ` Seth Forshee
2015-07-16 21:42         ` Casey Schaufler
2015-07-16 21:42           ` Casey Schaufler
2015-07-16 22:27           ` Andy Lutomirski
2015-07-16 22:27             ` Andy Lutomirski
2015-07-16 23:08             ` Casey Schaufler
2015-07-16 23:08               ` Casey Schaufler
2015-07-16 23:29               ` Andy Lutomirski
2015-07-16 23:29                 ` Andy Lutomirski
2015-07-17  0:45                 ` Casey Schaufler
2015-07-17  0:45                   ` Casey Schaufler
2015-07-17  0:59                   ` Andy Lutomirski
2015-07-17  0:59                     ` Andy Lutomirski
2015-07-17 14:28                     ` Serge E. Hallyn
2015-07-17 14:28                       ` Serge E. Hallyn
2015-07-17 14:56                       ` Seth Forshee
2015-07-17 14:56                         ` Seth Forshee
2015-07-21 20:35                     ` Seth Forshee
2015-07-21 20:35                       ` Seth Forshee
2015-07-22  1:52                       ` Casey Schaufler
2015-07-22  1:52                         ` Casey Schaufler
2015-07-22 15:56                         ` Seth Forshee
2015-07-22 15:56                           ` Seth Forshee
2015-07-22 18:10                           ` Casey Schaufler
2015-07-22 18:10                             ` Casey Schaufler
2015-07-22 19:32                             ` Seth Forshee
2015-07-22 19:32                               ` Seth Forshee
2015-07-23  0:05                               ` Casey Schaufler
2015-07-23  0:05                                 ` Casey Schaufler
2015-07-23  0:15                                 ` Eric W. Biederman
2015-07-23  0:15                                   ` Eric W. Biederman
2015-07-23  5:15                                   ` Seth Forshee
2015-07-23  5:15                                     ` Seth Forshee
2015-07-23 21:48                                   ` Casey Schaufler
2015-07-23 21:48                                     ` Casey Schaufler
2015-07-28 20:40                                 ` Seth Forshee
2015-07-28 20:40                                   ` Seth Forshee
2015-07-30 16:18                                   ` Casey Schaufler
2015-07-30 16:18                                     ` Casey Schaufler
2015-07-30 17:05                                     ` Eric W. Biederman
2015-07-30 17:05                                       ` Eric W. Biederman
2015-07-30 17:25                                       ` Seth Forshee
2015-07-30 17:25                                         ` Seth Forshee
2015-07-30 17:33                                         ` Eric W. Biederman
2015-07-30 17:33                                           ` Eric W. Biederman
2015-07-17 13:21           ` Seth Forshee
2015-07-17 13:21             ` Seth Forshee
2015-07-17 17:14             ` Casey Schaufler
2015-07-17 17:14               ` Casey Schaufler
2015-07-16 15:59     ` Seth Forshee
2015-07-16 15:59       ` Seth Forshee
2015-07-30  4:24 Amir Goldstein
2015-07-30  4:24 ` Amir Goldstein
2015-07-30 13:55 ` Seth Forshee
2015-07-30 13:55   ` Seth Forshee
2015-07-30 14:47   ` Amir Goldstein
2015-07-30 14:47     ` Amir Goldstein
2015-07-30 15:33     ` Casey Schaufler
2015-07-30 15:33       ` Casey Schaufler
2015-07-30 15:52       ` Colin Walters
2015-07-30 15:52         ` Colin Walters
2015-07-30 16:15         ` Eric W. Biederman
2015-07-30 16:15           ` Eric W. Biederman
2015-07-30 13:57 ` Serge Hallyn
2015-07-30 13:57   ` Serge Hallyn
2015-07-30 15:09   ` Amir Goldstein
2015-07-30 15:09     ` Amir Goldstein
2015-07-31  8:11 Amir Goldstein
2015-07-31  8:11 ` Amir Goldstein
2015-07-31 19:56 ` Casey Schaufler
2015-07-31 19:56   ` Casey Schaufler
2015-08-01 17:01   ` Amir Goldstein
2015-08-01 17:01     ` Amir Goldstein

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.