Linux Containers
[Prev Page][Next Page]
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Enable namespaced file capabilities
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] Enable security.selinux in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] Enable namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] xattr: Enable security.capability in user namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] Enable capabilities of files from shared filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Christian Brauner <christian.brauner@xxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] mnt: umount mounts one by one in umount_tree()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] mnt: umount mounts one by one in umount_tree()
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Fwd: patch "tty: add TIOCGPTPEER ioctl" added to tty-next
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ioctl_tty.2: add TIOCGPTPEER documentation
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [pidns] d814d62496: WARNING:at_kernel/cgroup/cgroup.c:#cgroup_mount
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: Aleksa Sarai <asarai@xxxxxxx>
- [PATCH 00/26] Fixing wait, exit, ptrace, exec, and CLONE_THREAD
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: Colin Walters <walters@xxxxxxxxxx>
- Example daemon program
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH] KEYS: Allow a live daemon in a namespace to service request_key upcalls
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Ian Kent <raven@xxxxxxxxxx>
- [GIT PULL] ptrace fix for v4.12-rc3
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Jessica Frazelle <me@xxxxxxxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [RFC][PATCH 0/9] Make containers kernel objects
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] pid namespace fixes for v4.12-rc2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH v2 RFC] mnt: umount mounts one by one in umount_tree()
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [REVIEW][PATCH] pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH RFC] mnt: umount mounts one by one in umount_tree()
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- LXC 1.0.10, LXC 2.0.8, LXCFS 2.0.7 and LXD 2.0.10 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH] fs: add an ioctl to get an owning userns for a superblock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] fs: add an ioctl to get an owning userns for a superblock
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] fs: add an ioctl to get an owning userns for a superblock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] fs: add an ioctl to get an owning userns for a superblock
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4] Introduce v3 namespaced file capabilities
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v4] Introduce v3 namespaced file capabilities
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: 64fa03de33: BUG:Dentry_still_in_use
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: 64fa03de33: BUG:Dentry_still_in_use
- From: Masami Ichikawa <masami256@xxxxxxxxx>
- Re: 64fa03de33: BUG:Dentry_still_in_use
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- 64fa03de33: BUG:Dentry_still_in_use
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- [GIT PULL] namespace related changes for v4.12-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: Kirill Tkhai <ktkhai@xxxxxxxxxxxxx>
- How to get an owning userns for a superblock
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] userns,pidns: Verify the userns for new pid namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: LXC snapshot using overlayfs fsfreeze
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: LXC snapshot using overlayfs fsfreeze
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: LXC snapshot using overlayfs fsfreeze
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: LXC snapshot using overlayfs fsfreeze
- From: Tycho Andersen via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: LXC snapshot using overlayfs fsfreeze
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Increase temp space /tmp
- From: Saint Michael <venefax@xxxxxxxxx>
- [GIT PULL] namespace related fix for v4.11-rc2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] ucount: Remove the atomicity from ucount->count
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] ucount: Remove the atomicity from ucount->count
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- [REVIEW][PATCH] ucount: Remove the atomicity from ucount->count
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: 쪼르 <zzoru007@xxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Dmitry Vyukov via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ucount: use-after-free read in inc_ucount & dec_ucount
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [PATCH RFC] coredump: virtualize core dump path configuration
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] coredump: virtualize core dump path configuration
- From: Jann Horn <jann@xxxxxxxxx>
- [PATCH RFC] coredump: virtualize core dump path configuration
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespaces related fixes for v4.11-rc1
- From: Aleksa Sarai <asarai@xxxxxxx>
- [GIT PULL] namespaces related fixes for v4.11-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH_v4.1_0_3] Make core_pattern support namespace
- From: Cao Shufeng/曹树烽 <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Mike Frysinger <vapier@xxxxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] groups: don't return unmapped gids in getgroups(2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: `/sys/fs/cgroup/<subsystem>/tasks` file is empty when setns to another cgroup namespace
- From: Yuanhong Peng <pengyuanhong@xxxxxxxxxx>
- Re: `/sys/fs/cgroup/<subsystem>/tasks` file is empty when setns to another cgroup namespace
- From: Aleksa Sarai <asarai@xxxxxxx>
- `/sys/fs/cgroup/<subsystem>/tasks` file is empty when setns to another cgroup namespace
- From: Yuanhong Peng <pengyuanhong@xxxxxxxxxx>
- [PATCH_v4.1_0_3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_3_3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_1_3] Make call_usermodehelper_exec possible to set namespaces
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH_v4.1_2_3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- LXC 2.0.7, LXCFS 2.0.6 and LXD 2.0.9 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Aleksa Sarai <asarai@xxxxxxx>
- [GIT PULL] namespace related fixes for 4.10-rc6
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] procfs: change the owner of non-dumpable and writeable files
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Oleg Drokin <green@xxxxxxxxxxxxxx>
- Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Jeffrey Altman <jaltman@xxxxxxxxxxxx>
- Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Trond Myklebust <trondmy@xxxxxxxxxxxxxxx>
- Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Jeffrey Altman <jaltman@xxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Oleg Drokin <green@xxxxxxxxxxxxxx>
- Re: [Lsf-pc] Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Authentication Contexts for network file systems and Containers was Re: [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Jeffrey Altman <jaltman@xxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Oleg Drokin <green@xxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: Oleg Drokin <green@xxxxxxxxxxxxxx>
- Re: [Lsf-pc] [LSF/MM ATTEND] FS jitter testing, network caching, Lustre, cluster filesystems.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Possible bug: detached mounts difficult to cleanup
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Possible bug: detached mounts difficult to cleanup
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: Possible bug: detached mounts difficult to cleanup
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Possible bug: detached mounts difficult to cleanup
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Possible bug: detached mounts difficult to cleanup
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] namespace related fixes for 4.10-rc4
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace related fixes for 4.10-rc3
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace related fixes for 4.10-rc3
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace related fixes for 4.10-rc3
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] namespace related fixes for 4.10-rc3
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] pid: fix lockdep deadlock warning due to ucount_lock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] pid: fix lockdep deadlock warning due to ucount_lock
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] pid: fix lockdep deadlock warning due to ucount_lock
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- 1f6e761378: RIP:call_usermodehelper_exec_work
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Problem in Cross compiling
- From: Pankaj Charpe <pankaj.charpe@xxxxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: Jeremy Eder <jeder@xxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: Kuniyasu Suzaki <k.suzaki@xxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: Jeremy Eder <jeder@xxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BMC (Bare-Metal Container) is relased
- From: Kuniyasu Suzaki <k.suzaki@xxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: Kuniyasu Suzaki <k.suzaki@xxxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 0/3] perf: add support for analyzing events for containers
- From: Hari Bathini <hbathini@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] perf: add support for analyzing events for containers
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCHv3] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCHv3] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCHv3] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: BMC (Bare-Metal Container) is relased
- From: Kuniyasu Suzaki <k.suzaki@xxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [inotify] fee1df54b6: BUG_kmalloc-#(Not_tainted):Freepointer_corrupt
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [inotify] fee1df54b6: BUG_kmalloc-#(Not_tainted):Freepointer_corrupt
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [inotify] fee1df54b6: BUG_kmalloc-#(Not_tainted):Freepointer_corrupt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [inotify] fee1df54b6: BUG_kmalloc-#(Not_tainted):Freepointer_corrupt
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- [inotify] fee1df54b6: BUG_kmalloc-#(Not_tainted):Freepointer_corrupt
- From: kernel test robot <ying.huang@xxxxxxxxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [GIT PULL] namespace related changes for 4.10-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Documenting the ioctl interfaces to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Documenting the ioctl interfaces to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 3/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH 2/3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH 1/3] Make call_usermodehelper_exec possible to set namespaces
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH 0/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [mnt] 81e3bb1b6f: BUG:sleeping_function_called_from_invalid_context_at_fs/dcache.c
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [mnt] 81e3bb1b6f: BUG:sleeping_function_called_from_invalid_context_at_fs/dcache.c
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH RFC] user-namespaced file capabilities - now with even more magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- LXC 1.0.9, LXC 2.0.6, LXCFS 2.0.5 and LXD 2.0.6 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: Willy Tarreau <w@xxxxxx>
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: Willy Tarreau <w@xxxxxx>
- Re: [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: Willy Tarreau <w@xxxxxx>
- Re: [REVIEW][PATCH 1/3] ptrace: Capture the ptracer's creds not PT_PTRACE_CAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 1/3] ptrace: Capture the ptracer's creds not PT_PTRACE_CAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 1/3] ptrace: Capture the ptracer's creds not PT_PTRACE_CAP
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/3] ptrace: Don't allow accessing an undumpable mm
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 1/3] ptrace: Capture the ptracer's creds not PT_PTRACE_CAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/3] ptrace: Don't allow accessing an undumpable mm
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Willy Tarreau <w@xxxxxx>
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: Willy Tarreau <w@xxxxxx>
- [REVIEW][PATCH 3/3] exec: Ensure mm->user_ns contains the execed files
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 2/3] exec: Don't allow ptracing an exec of an unreadable file
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 1/3] ptrace: Capture the ptracer's creds not PT_PTRACE_CAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 0/3] Fixing ptrace vs exec vs userns interactions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] audit: skip sessionid sentinel value when auto-incrementing
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- BMC (Bare-Metal Container) is relased
- From: 須崎有康 <k.suzaki@xxxxxxxxxx>
- [PATCH] audit: skip sessionid sentinel value when auto-incrementing
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] audit: tame initialization warning len_abuf in audit_log_execve_info
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Make core_pattern support namespace
- From: Cao Shufeng/曹树烽 <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH net-next] net: add an ioctl to get a socket network namespace
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] net: skip genenerating uevents for network namespaces that are exiting
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] Make core_pattern support namespace
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- [REVIEW][PATCH v2] mm: Add a user_ns owner to mm_struct and fix ptrace permission checks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH] rlimit: Account nproc per-usernamespace/per-user
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: José Bollo <jobol@xxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Keyrings, user namespaces and the user_struct
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 3/3] Make core_pattern support namespace
- From: Cao Shufeng/曹树烽 <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 3/3] Make core_pattern support namespace
- From: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Keyrings, user namespaces and the user_struct
- From: Jann Horn <jann@xxxxxxxxx>
- Keyrings, user namespaces and the user_struct
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [ISSUE] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- [PATCH v4 3/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v4 2/3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v4 1/3] Make call_usermodehelper_exec possible to set namespaces
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v4 0/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v2] net: skip genenerating uevents for network namespaces that are exiting
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH net-next] net: add an ioctl to get a socket network namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [ISSUE] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [ISSUE] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [ISSUE] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [ISSUE] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH v2] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH net-next] net: allow to kill a task which waits net_mutex in copy_new_ns
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: David Miller <davem@xxxxxxxxxxxxx>
- [RFC][PATCH v2] mount: In propagate_umount handle overlapping mount propagation trees
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [REVIEW][PATCH] mount: In propagate_umount handle overlapping mount propagation trees
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [PATCH] net: skip genenerating uevents for network namespaces that are exiting
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH net-next] net: allow to kill a task which waits net_mutex in copy_new_ns
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [REVIEW][PATCH] mount: In propagate_umount handle overlapping mount propagation trees
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [RFC v2 2/2] proc connector: add a "get feature" op
- From: Evgeniy Polyakov <zbr@xxxxxxxxxxx>
- Re: [RFC v2 1/2] proc connector: add namespace events
- From: Evgeniy Polyakov <zbr@xxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [REVIEW][PATCH] mount: In propagate_umount handle overlapping mount propagation trees
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH] exec: Don't exec files the userns root can not read.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Jann Horn <jann@xxxxxxxxx>
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH v3.1 1/3] Make call_usermodehelper_exec possible to set pid namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v3.1 2/3] Limit dump_pipe program's permission to init for container
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v3.1 3/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- [PATCH v3.1 0/3] Make core_pattern support namespace
- From: Cao Shufeng <caosf.fnst@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH v2] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: Jann Horn <jann@xxxxxxxxx>
- [REVIEW][PATCH] mm: Add a user_ns owner to mm_struct and fix ptrace_may_access
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC v2 0/2] proc connector: get namespace events
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC v2 2/2] proc connector: add a "get feature" op
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- [RFC v2 1/2] proc connector: add namespace events
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- [RFC v2 0/2] proc connector: get namespace events
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [RFC][PATCH v2] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC][PATCH] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [lkp] [inotify] 464e1236c3: BUG kmalloc-512 (Not tainted): Freepointer corrupt
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [RFC][PATCH] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [RFC][PATCH] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [RFC][PATCH] mount: In mark_umount_candidates and __propogate_umount visit each mount once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] [v3] mount: dont execute propagate_umount() many times for same mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] net: limit a number of namespaces which can be cleaned up concurrently
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH v2] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [PATCH] [v3] mount: dont execute propagate_umount() many times for same mounts
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] mount: dont execute propagate_umount() many times for same mounts
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [lkp] [inotify] 1109954e99: BUG kmalloc-512 (Not tainted): Freepointer corrupt
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH] inotify: Convert to using per-namespace limits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] inotify: Convert to using per-namespace limits
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2] mount: dont execute propagate_umount() many times for same mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] mount: dont execute propagate_umount() many times for same mounts
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v2] mount: dont execute propagate_umount() many times for same mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- [PATCH v2] mount: dont execute propagate_umount() many times for same mounts
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [GIT PULL] namespace related changes for 4.9-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- LXC 2.0.5, LXCFS 2.0.4 and LXD 2.0.5 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH tty-next 0/6] Minor devpts cleanups, fixes and enhancments
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4 v3] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH tty-next 0/6] Minor devpts cleanups, fixes and enhancments
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [lxc-devel] CFP for containers micro-conference at LPC 2016
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: Escape from a bind mount
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Escape from a bind mount
- From: Gandalf Corvotempesta <gandalf.corvotempesta@xxxxxxxxx>
- Re: Escape from a bind mount
- From: Gandalf Corvotempesta <gandalf.corvotempesta@xxxxxxxxx>
- Re: Escape from a bind mount
- From: Jann Horn <jann@xxxxxxxxx>
- Re: Escape from a bind mount
- From: Gandalf Corvotempesta <gandalf.corvotempesta@xxxxxxxxx>
- Re: Escape from a bind mount
- From: Jann Horn <jann@xxxxxxxxx>
- Escape from a bind mount
- From: Gandalf Corvotempesta <gandalf.corvotempesta@xxxxxxxxx>
- Re: [lxc-devel] CFP for containers micro-conference at LPC 2016
- From: Brandon Philips <brandon@xxxxxxxx>
- Re: [lxc-devel] CFP for containers micro-conference at LPC 2016
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- [PATCH tty-next 6/6] devpts: Change the owner of /dev/pts/ptmx to the mounter of /dev/pts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 5/6] devpts: Remove sync_filesystems
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 4/6] devpts: Make devpts_kill_sb safe if fsi is NULL
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 3/6] devpts: Simplify devpts_mount by using mount_nodev
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 2/6] devpts: Move the creation of /dev/pts/ptmx into fill_super
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 1/6] devpts: Move parse_mount_options into fill_super
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH tty-next 0/6] Minor devpts cleanups, fixes and enhancments
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [Announce] CRIU v2.6
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] nsfs: add ioctl to get an owning user namespace for ns file descriptor
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/4] nsfs: add ioctl to get a parent namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCH v3 1/3] Make call_usermodehelper_exec possible to set pid namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] Make call_usermodehelper_exec possible to set pid namespace
- From: Andrei Vagin <avagin@xxxxxxxxx>
- [PATCH 4/4] tools/testing: add a test to check nsfs ioctl-s
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 3/4] nsfs: add ioctl to get a parent namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 2/4] nsfs: add ioctl to get an owning user namespace for ns file descriptor
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 0/4 v3] Add an interface to discover relationships between namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- RE: [PATCH v3 0/3] Make core_pattern support namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- Re: CFP for containers micro-conference at LPC 2016
- From: Stéphane Graber <stgraber@xxxxxxxxxxxx>
- CFP for containers micro-conference at LPC 2016
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH] [userns/for-testing] set ucounts for mount namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 1/3] Make call_usermodehelper_exec possible to set pid namespace
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v3 3/3] Make core_pattern support namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] Make call_usermodehelper_exec possible to set pid namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] Limit dump_pipe program's permission to init for container
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH v3 0/3] Make core_pattern support namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH 4/4] tools/testing: add a test to check nsfs ioctl-s
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 2/4] nsfs: add ioctl to get an owning user namespace for ns file descriptor
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 3/4] nsfs: add ioctl to get a parent namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 1/4] kernel: add a helper to get an owning user namespace for a namespace
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 0/4 v2] Add an interface to discover relationships between namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2] kernel: show current values of user namespace counters
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kernel: show current values of user namespace counters
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2] kernel: show current values of user namespace counters
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- LXC 2.0.4, LXCFS 2.0.3 and LXD 2.0.4 have been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- [PATCH 2/2] Documentation: describe /proc/<pid>/userns_counts
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 1/2] kernel: show current values of user namespace counters
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH 0/2 v2] userns: show current values of user namespace counters
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- RE: [PATCH v2 1/2] Limit dump_pipe program's permission to init for container
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- Re: [PATCH] kernel: show current values of ucounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] kernel: show current values of ucounts
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH] kernel: show current values of ucounts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] kernel: show current values of ucounts
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [PATCH] [userns/for-testing] set ucounts for mount namespaces
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- [lkp] [mntns] 1ef38d2db6: general protection fault: 0000 [#1] SMP
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: Userns tree reopening week of August 29th.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Userns tree reopening week of August 29th.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/2] Limit dump_pipe program's permission to init for container
- From: "'Andrei Vagin'" <avagin@xxxxxxxxx>
- Re: [PATCHv5] locks: Filter /proc/locks output on proc pid ns
- From: "J. Bruce Fields" <bfields@xxxxxxxxxx>
- Re: [PATCHv5] locks: Filter /proc/locks output on proc pid ns
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] Limit dump_pipe program's permission to init for container
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCHv5] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2 1/2] Limit dump_pipe program's permission to init for container
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [RFC PATCH v2 0/3] perf/tracefs: Container-aware tracing support
- From: Aravinda Prasad <aravinda@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] perf/tracefs: Container-aware tracing support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH v2 0/3] perf/tracefs: Container-aware tracing support
- From: Aravinda Prasad <aravinda@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: why this behavior in 3.16 kernel ?
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- [PATCHv4] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: why this behavior in 3.16 kernel ?
- From: cool linux <linux.cool.hot@xxxxxxxxx>
- Re: why this behavior in 3.16 kernel ?
- From: Andrew Vagin <avagin@xxxxxxxxx>
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v2 0/3] perf/tracefs: Container-aware tracing support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: why this behavior in 3.16 kernel ?
- From: Andrew Vagin <avagin@xxxxxxxxx>
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: why this behavior in 3.16 kernel ?
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [PATCHv3] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- why this behavior in 3.16 kernel ?
- From: cool linux <linux.cool.hot@xxxxxxxxx>
- [PATCH v2] locks: Filter /proc/locks output on proc pid ns
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [RFC PATCH] locks: Show only file_locks created in the same pidns as current process
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Mobile Application Development: Swift, Android, ionic, PhoneGap
- From: "Alex Rubens" <mixmand@xxxxxxxx>
- [PATCH v2 1/2] Limit dump_pipe program's permission to init for container
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] Make core_pattern support namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- [PATCH v2 0/2] Make core_pattern support namespace
- From: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: sysctl variables are not available to newly created namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: sysctl variables are not available to newly created namespace
- From: Madhukrishna G <Madhukrishna.G@xxxxxxxxxxx>
- Re: sysctl variables are not available to newly created namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] binfmt_misc updates for 4.7+ merge window
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- sysctl variables are not available to newly created namespace
- From: Madhukrishna G <Madhukrishna.G@xxxxxxxxxxx>
- sysctl variables are not available to newly created namespace
- From: "G, Madhukrishna" <madhukrishna.g@xxxxxxx>
- Re: [GIT PULL] userns related vfs enhancements for v4.8
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] userns related vfs enhancements for v4.8
- From: Michał Zegan <webczat_200@xxxxxxxxxxxxxx>
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: Dave Jones <davej@xxxxxxxxxxxxxxxxx>
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: Dave Jones <davej@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] userns related vfs enhancements for v4.8
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [LKP] More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: Fengguang Wu <fengguang.wu@xxxxxxxxx>
- Re: [Ksummit-discuss] [TECH TOPIC] Containerisation, namespaces and keyrings
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Ksummit-discuss] [TECH TOPIC] Containerisation, namespaces and keyrings
- From: Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
- Re: [Ksummit-discuss] [TECH TOPIC] Containerisation, namespaces and keyrings
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH v2 02/10] userns: Add per user namespace sysctls.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 02/10] userns: Add per user namespace sysctls.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] userns: Add per user namespace sysctls.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 02/10] userns: Add per user namespace sysctls.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] userns: Add per user namespace sysctls.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 10/10] mntns: Add a limit on the number of mount namespaces.
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 08/10] cgroupns: Add a limit on the number of cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 07/10] ipcns: Add a limit on the number of ipc namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 06/10] utsns: Add a limit on the number of uts namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 05/10] pidns: Add a limit on the number of pid namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 04/10] userns: Generalize the user namespace count into ucount
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 03/10] userns: Add a limit on the number of user namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- More information please. Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] namespaces: move user_ns into ns_common
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 4/5] nsfs: add ioctl to get a parent namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/5] namespaces: move user_ns into ns_common
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/5] namespaces: move user_ns into ns_common
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [fs] 54cc07a761: BUG: kernel test crashed
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [fs] 54cc07a761: BUG: kernel test crashed
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "W. Trevor King" <wking@xxxxxxxxxx>
- Re: [fs] bdd20132c6: BUG: sleeping function called from invalid context at fs/proc/proc_sysctl.c:1569
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [fs] bdd20132c6: BUG: sleeping function called from invalid context at fs/proc/proc_sysctl.c:1569
- From: kernel test robot <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrey Vagin <avagin@xxxxxxxxxx>
- Re: [Ksummit-discuss] [TECH TOPIC] Containerisation, namespaces and keyrings
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] userns: sysctl limits for namespaces
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
- From: Andrew Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH 0/10] userns: sysctl limits for namespaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/10] userns: sysctl limits for namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 10/10] mntns: Add a limit on the number of mount namespaces.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v2 09/10] netns: Add a limit on the number of net namespaces
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]