Linux Containers
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v2 08/10] cgroupns: Add a limit on the number of cgroup namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 07/10] ipcns: Add a limit on the number of ipc namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 06/10] utsns: Add a limit on the number of uts namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 04/10] userns: Generalize the user namespace count into ucount
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 05/10] pidns: Add a limit on the number of pid namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 03/10] userns: Add a limit on the number of user namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 02/10] userns: Add per user namespace sysctls.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH v2 00/10] userns: sysctl limits for namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 03/10] userns: Add a limit on the number of user namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 0/10] userns: sysctl limits for namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
[PATCH 3/3] selftests: check O_ATROOT and AT_FDROOT flags
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 2/3 v2] fs: allow to use dirfd as root for openat and other *at syscalls
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 0/3 v3] fs: allow to use dirfd as root for openat and other *at syscalls
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 1/3 v2] namei: add LOOKUP_DFD_ROOT to use dfd as root
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 03/10] userns: Add a limit on the number of user namespaces
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [PATCH 02/10] userns: Add per user namespace sysctls.
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 0/10] userns: sysctl limits for namespaces
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH 10/10] mntns: Add a limit on the number of mount namespaces.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 09/10] netns: Add a limit on the number of net namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 08/10] cgroupns: Add a limit on the number of cgroup namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 07/10] ipcns: Add a limit on the number of ipc namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 06/10] utsns: Add a limit on the number of uts namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 05/10] pidns: Add a limit on the number of pid namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 04/10] userns: Generalize the user namespace count into ucount
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 03/10] userns: Add a limit on the number of user namespaces
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 02/10] userns: Add per user namespace sysctls.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 01/10] sysctl: Stop implicitly passing current into sysctl_table_root.lookup
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH 0/10] userns: sysctl limits for namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH 0/4 v3] Inotify limits per usernamespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/5] namespaces: move user_ns into ns_common
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/5] namespaces: move user_ns into ns_common
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH 1/5] namespaces: move user_ns into ns_common
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 5/5] tools/testing: add a test to check nsfs ioctl-s
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 4/5] nsfs: add ioctl to get a parent namespace
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 3/5] nsfs: add ioctl to get an owning user namespace for ns file descriptor
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: [PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: [PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [PATCH 3/5] nsfs: add ioctl to get an owning user namespace for ns file descriptor
From
: "W. Trevor King" <wking@xxxxxxxxxx>
[PATCH 1/5] namespaces: move user_ns into ns_common
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 5/5] tools/testing: add a test to check nsfs ioctl-s
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 4/5] nsfs: add ioctl to get a parent namespace
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 3/5] nsfs: add ioctl to get an owning user namespace for ns file descriptor
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 2/5] kernel: add a helper to get an owning user namespace for a namespace
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 0/5 RFC] Add an interface to discover relationships between namespaces
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH 4/4] inotify: Convert to using new userns infrastructure
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 2/4] misc: Rename the HASH_SIZE macro
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 1/4] hashtable: Add __HASHTABLE_INITIALIZER
From
: Nikolay Borisov <kernel@xxxxxxxx>
[RFC PATCH 0/4 v3] Inotify limits per usernamespace
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: Jann Horn <jann@xxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] namespaces: add transparent user namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 2/2] namespaces: add transparent user namespaces
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
RE: [PATCH] [RFC] Limit dump_pipe program's permission to init for container
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH review 10/12] dquot: For now explicitly don't support filesystems outside of init_user_ns
From
: Jan Kara <jack@xxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [PATCH] [RFC] Limit dump_pipe program's permission to init for container
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
Re: [PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
[PATCH] [RFC] Limit dump_pipe program's permission to init for container
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrei Vagin <avagin@xxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrei Vagin <avagin@xxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: [CRIU] Introspecting userns relationships to other namespaces?
From
: Andrew Vagin <avagin@xxxxxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
Re: [PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: Introspecting userns relationships to other namespaces?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
[PATCH review 12/12] fs: Update i_[ug]id_(read|write) to translate relative to s_user_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 11/12] evm: Translate user/group ids relative to s_user_ns when computing HMAC
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 10/12] dquot: For now explicitly don't support filesystems outside of init_user_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 09/12] quota: Handle quota data stored in s_user_ns in quota_setxquota
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 08/12] quota: Ensure qids map to the filesystem
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 07/12] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 06/12] vfs: Don't modify inodes with a uid or gid unknown to the vfs
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 05/12] cred: Reject inodes with invalid ids in set_create_file_as()
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 04/12] fs: Check for invalid i_uid in may_follow_link()
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 03/12] vfs: Verify acls are valid within superblock's s_user_ns.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 02/12] userns: Handle -1 in k[ug]id_has_mapping when !CONFIG_USER_NS
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 01/12] fs: Refuse uid/gid changes which don't map into s_user_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 0/12] General unprivileged mount support v2
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH 0/4 v2] Inotify limits per usernamespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: Introspecting userns relationships to other namespaces?
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 0/11] General unprivileged mount support
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 0/11] General unprivileged mount support
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Jan Kara <jack@xxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Jan Kara <jack@xxxxxxx>
Re: Introspecting userns relationships to other namespaces?
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/3] namei: add LOOKUP_DFD_ROOT to use dfd as root
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 1/3 v2] namei: add LOOKUP_DFD_ROOT to use dfd as root
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH review 0/11] General unprivileged mount support
From
: Jan Kara <jack@xxxxxxx>
Re: [PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: Jan Kara <jack@xxxxxxx>
[PATCH v2 review 09/11] quota: Handle quota data stored in s_user_ns.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH review 11/11] fs: Update i_[ug]id_(read|write) to translate relative to s_user_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 10/11] evm: Translate user/group ids relative to s_user_ns when computing HMAC
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 09/11] quota: Handle quota data stored in s_user_ns.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 08/11] quota: Ensure qids map to the filesystem
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 07/11] vfs: Don't create inodes with a uid or gid unknown to the vfs
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 06/11] vfs: Don't modify inodes with a uid or gid unknown to the vfs
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 05/11] cred: Reject inodes with invalid ids in set_create_file_as()
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 04/11] fs: Check for invalid i_uid in may_follow_link()
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 01/11] fs: Refuse uid/gid changes which don't map into s_user_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 03/11] vfs: Verify acls are valid within superblock's s_user_ns.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 02/11] userns: Handle -1 in k[ug]id_has_mapping when !CONFIG_USER_NS
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 0/11] General unprivileged mount support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/3] namei: add LOOKUP_DFD_ROOT to use dfd as root
From
: Omar Sandoval <osandov@xxxxxxxxxxx>
[PATCH 4/4] inotify: Convert to using new userns infrastructure
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 3/4] userns/inotify: Initial implementation of inotify per-userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 2/4] misc: Rename the HASH_SIZE macro
From
: Nikolay Borisov <kernel@xxxxxxxx>
[PATCH 1/4] hashtable: Add __HASHTABLE_INITIALIZER
From
: Nikolay Borisov <kernel@xxxxxxxx>
[RFC PATCH 0/4 v2] Inotify limits per usernamespace
From
: Nikolay Borisov <kernel@xxxxxxxx>
LXC 2.0.2 & 2.0.3, LXCFS 2.0.2 and LXD 2.0.3 have been released!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
[PATCH 3/3] selftests: check O_ATROOT and AT_FDROOT flags
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 2/3] fs: allow to use dirfd as root for openat and other *at syscalls
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 0/3 v2] fs: allow to use dirfd as root for openat and other *at syscalls
From
: Andrey Vagin <avagin@xxxxxxxxxx>
[PATCH 1/3] namei: add LOOKUP_DFD_ROOT to use dfd as root
From
: Andrey Vagin <avagin@xxxxxxxxxx>
Re: Can you add the binfmt_misc tree to linux-next?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Can you add the binfmt_misc tree to linux-next?
From
: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
Can you add the binfmt_misc tree to linux-next?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] namespaces: add transparent user namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 03/13] ipc: Initialize ipc_namespace->user_ns early.
From
: Djalal Harouni <tixxdz@xxxxxxxxx>
Re: [PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: Djalal Harouni <tixxdz@xxxxxxxxx>
Re: [PATCH review 05/13] proc: Convert proc_mount to use mount_ns.
From
: Djalal Harouni <tixxdz@xxxxxxxxx>
Re: [PATCH review 13/13] userns: Remove the now unnecessary FS_USERNS_DEV_MOUNT flag
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 12/13] userns: Remove implicit MNT_NODEV fragility.
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 11/13] mnt: Simplify mount_too_revealing
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 07/13] mnt: Move the FS_USERNS_MOUNT check into sget_userns
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
[GIT PULL] userns related changes for 4.7-rc5
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 10/13] vfs: Generalize filesystem nodev handling.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH review 12/13] userns: Remove implicit MNT_NODEV fragility.
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH review 10/13] vfs: Generalize filesystem nodev handling.
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
[PATCH review 11/13] mnt: Simplify mount_too_revealing
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 12/13] userns: Remove implicit MNT_NODEV fragility.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 13/13] userns: Remove the now unnecessary FS_USERNS_DEV_MOUNT flag
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 10/13] vfs: Generalize filesystem nodev handling.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 09/13] ipc/mqueue: The mqueue filesystem should never contain executables
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 08/13] kernfs: The cgroup filesystem also benefits from SB_I_NOEXEC
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 06/13] fs: Add user namespace member to struct super_block
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 07/13] mnt: Move the FS_USERNS_MOUNT check into sget_userns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 05/13] proc: Convert proc_mount to use mount_ns.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 04/13] vfs: Pass data, ns, and ns->userns to mount_ns
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 03/13] ipc: Initialize ipc_namespace->user_ns early.
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 02/13] mnt: Refactor fs_fully_visible into mount_too_revealing
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 01/13] mnt: Account for MS_RDONLY in fs_fully_visible
From
: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
[PATCH review 0/13] Adding a userns owner to struct super_block
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: New namespace design and clone(2) flags exhaustion
From
: Albert Lee <trisk@xxxxxxxxxx>
Re: New namespace design and clone(2) flags exhaustion
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: New namespace design and clone(2) flags exhaustion
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: New namespace design and clone(2) flags exhaustion
From
: Albert Lee <trisk@xxxxxxxxxx>
Re: New namespace design and clone(2) flags exhaustion
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 3/3] Write dump into container's filesystem for pipe_type core_pattern
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 3/3] Write dump into container's filesystem for pipe_type core_pattern
From
: Mateusz Guzik <mguzik@xxxxxxxxxx>
Re: Deploy specific iptables ruleset for each container...
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[GIT PULL] userns related fixes for v4.7-rc3
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH v2 2/3] Make dump_pipe thread possilbe to select the rootfs
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 1/3] Save dump_root into pid_namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 3/3] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 0/3] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Deploy specific iptables ruleset for each container...
From
: Sebastián Maruca via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/3] Save dump_root into pid_namespace
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
[PATCH 2/3] Make dump_pipe thread possilbe to select the rootfs
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 3/3] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 1/3] Save dump_root into pid_namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 0/3] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: Jan Kara <jack@xxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: [RFC PATCH 0/4] Make inotify instance/watches be accounted per userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
LXD 2.0.2 has been released (security update)!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
Re: [PATCH] user-namespaced file capabilities - now with even more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] user-namespaced file capabilities - now with even more magic
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] user-namespaced file capabilities - now with even more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] user-namespaced file capabilities - now with even more magic
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH] user-namespaced file capabilities - now with even more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] userns: Allow init_user_ns to be used from non-gpl modules
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] userns: Allow init_user_ns to be used from non-gpl modules
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
[PATCH] userns: Allow init_user_ns to be used from non-gpl modules
From
: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH RFC] user-namespaced file capabilities - now with more magic
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH RFC] user-namespaced file capabilities - now with more magic
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
LXC, LXCFS and LXD 2.0.1 have been released!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH RFC 0/3] sched/fair: cpu time reserves for cgroups
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] sched/fair: cpu time reserves for cgroups
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
Re: [PATCH RFC 0/3] sched/fair: cpu time reserves for cgroups
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
[PATCH RFC 1/3] sched/fair: call __refill_cfs_bandwidth_runtime only for finite quota
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
[PATCH RFC 2/3] sched/fair: copy taskgroup shares to each cfs_rq
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
[PATCH RFC 0/3] sched/fair: cpu time reserves for cgroups
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
[PATCH RFC 3/3] sched/fair: pulse-weight modulation controller for cpu cgroup
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
[PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: Jann Horn <jann@xxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
[PATCH] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: bind mounting namespace inodes for unprivileged users
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: bind mounting namespace inodes for unprivileged users
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: bind mounting namespace inodes for unprivileged users
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: Phil Estes <estesp@xxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: bind mounting namespace inodes for unprivileged users
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: bind mounting namespace inodes for unprivileged users
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: bind mounting namespace inodes for unprivileged users
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: bind mounting namespace inodes for unprivileged users
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: bind mounting namespace inodes for unprivileged users
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
bind mounting namespace inodes for unprivileged users
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/2] cgroup_show_path: use a new helper to get current cgns css_set
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Andrew G. Morgan" <morgan@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
Re: [PATCH 1/2] kernfs_path_from_node_locked: don't overwrite nlen
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/2] cgroup_show_path: use a new helper to get current cgns css_set
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/2] kernfs_path_from_node_locked: don't overwrite nlen
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: Serge Hallyn <serge@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 3/2] cgroup_show_path: use a new helper to get current cgns css_set
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Re: [PATCH v2] devpts: Make ptmx be owned by the userns owner as a fallback
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Unprivileged containers and co-ordinating user namespaces
From
: "W. Trevor King" <wking@xxxxxxxxxx>
Unprivileged containers and co-ordinating user namespaces
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: Jann Horn <jann@xxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
RE: [PATCH 0/3] [RFC] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 1/1] simplified security.nscapability xattr
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH 1/1] simplified security.nscapability xattr
From
: serge.hallyn@xxxxxxxxxx
namespaced file capabilities
From
: serge.hallyn@xxxxxxxxxx
Re: [PATCH 1/2] kernfs_path_from_node_locked: don't overwrite nlen
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [Patch resend v3 3/3] binfmt_misc: add F option description to documentation
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [Patch resend v3 3/3] binfmt_misc: add F option description to documentation
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
[Patch resend v3 3/3] binfmt_misc: add F option description to documentation
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch resend v3 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch resend v3 1/3] fs: add filp_clone_open API
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch resend v3 0/3] allow the creation of architecture emulation containers where the emulator binary is outside the container
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH 3/2] cgroup_show_path: use a new helper to get current cgns css_set
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
[PATCH 2/2] mountinfo: implement show_path for kernfs and cgroup
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/2] kernfs_path_from_node_locked: don't overwrite nlen
From
: serge.hallyn@xxxxxxxxxx
Show virtualized dentry root in mountinfo for cgroupfs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/3] [RFC] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 2/3] [RFC] Make dump_pipe thread possilbe to select the rootfs
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 1/3] [RFC] Save dump_root into pid_namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 0/3] [RFC] Write dump into container's filesystem for pipe_type core_pattern
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [Patch v3 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: johnny frazier <johnnybegone2@xxxxxxxxx>
Re: [Patch v3 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: Matthew Helsley <matt.helsley@xxxxxxxxx>
LXD 2.0 has been released!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
LXC 2.0 has been released!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
[Patch v3 3/3] binfmt_misc: add F option description to documentation
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v3 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v3 1/3] fs: add filp_clone_open API
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v3 0/3] allow the creation of architecture emulation containers where the emulator binary is outside the container
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
RE: [PATCH v2 3/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
RE: [PATCH v2 3/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
RE: [PATCH v2 3/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
RE: [PATCH v2 3/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH v2 3/3] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH v2 2/3] Run dump pipe in container's namespace
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH v2 1/3] Make _do_fork support return to caller's code
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 0/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 2/3] Run dump pipe in container's namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH v2 3/3] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
RE: [PATCH 0/2] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH 0/2] Make core_pattern support namespace
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] Run dump pipe in container's namespace
From
: kbuild test robot <lkp@xxxxxxxxx>
[PATCH 1/2] Run dump pipe in container's namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 2/2] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
[PATCH 0/2] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: [PATCH v2] devpts: Make ptmx be owned by the userns owner as a fallback
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH v2] devpts: Make ptmx be owned by the userns owner as a fallback
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCH] devpts: Make ptmx be owned by the userns owner instead of userns-local 0
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH] devpts: Make ptmx be owned by the userns owner instead of userns-local 0
From
: Alexander Larsson <alexl@xxxxxxxxxx>
Re: [PATCH] devpts: Make ptmx be owned by the userns owner instead of userns-local 0
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
[PATCH] devpts: Make ptmx be owned by the userns owner instead of userns-local 0
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: "Austin S. Hemmelgarn" <ahferroin7@xxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Colin Walters <walters@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Patch v2 1/3] fs: add filp_clone_open API
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: Alexander Larsson <alexl@xxxxxxxxxx>
Re: [Patch v2 1/3] fs: add filp_clone_open API
From
: Mateusz Guzik <mguzik@xxxxxxxxxx>
Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
From
: Alexander Larsson <alexl@xxxxxxxxxx>
Re: [Patch v2 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [Patch v2 1/3] fs: add filp_clone_open API
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: Thoughts on tightening up user namespace creation
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Thoughts on tightening up user namespace creation
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [CRIU] [Announce] CRIU 2.0 release
From
: Marcos Lilljedahl <marcosnils@xxxxxxxxx>
Re: [Announce] CRIU 2.0 release
From
: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
[Announce] CRIU 2.0 release
From
: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
Re: [Patch v2 3/3] binfmt_misc: add F option description to documentation
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [RFC PATCH] namespaces: Avoid task_lock when setting tsk->nsproxy
From
: Davidlohr Bueso <dave@xxxxxxxxxxxx>
Re: [RFC PATCH] namespaces: Avoid task_lock when setting tsk->nsproxy
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Alban Crequy <alban.crequy@xxxxxxxxx>
[Patch v2 3/3] binfmt_misc: add F option description to documentation
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v2 2/3] binfmt_misc: add persistent opened binary handler for containers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v2 1/3] fs: add filp_clone_open API
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch v2 0/3] allow the creation of architecture emulation containers where the emulator binary is outside the container
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
Re: [PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: Vasily Averin <vvs@xxxxxxxxxxxxx>
[PATCH] ipv4: in new netns initialize sysctls in net.ipv4.conf.* with defaults
From
: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
RE: [PATCH] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
RE: [PATCH] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
RE: [PATCH] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Ian Kent <raven@xxxxxxxxxx>
Re: call_usermodehelper in containers
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: call_usermodehelper in containers
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: call_usermodehelper in containers
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[Patch 2/2] binfmt_misc: add persistently opened binary handler for containers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch 1/2] fs: add filp_clone_open API
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[Patch 0/2] allow the creation of architecture emulation containers where the emulator binary is outside the container
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Make core_pattern support namespace
From
: Mateusz Guzik <mguzik@xxxxxxxxxx>
Re: [PATCH] Make core_pattern support namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 8/8] Add FS_USERNS_FLAG to cgroup fs
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH] Make core_pattern support namespace
From
: Mateusz Guzik <mguzik@xxxxxxxxxx>
[PATCH] Make core_pattern support namespace
From
: Zhao Lei <zhaolei@xxxxxxxxxxxxxx>
Re: IPv4/IPv6 sysctl defaults in new namespace
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Philipp Wendler <ml@xxxxxxxxxxxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Philipp Wendler <ml@xxxxxxxxxxxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Nikolay Borisov <kernel@xxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Philipp Wendler <ml@xxxxxxxxxxxxxxxxx>
Re: Using overlayfs in (unprivileged) namespace
From
: Nikolay Borisov <kernel@xxxxxxxx>
Using overlayfs in (unprivileged) namespace
From
: Philipp Wendler <ml@xxxxxxxxxxxxxxxxx>
IPv4/IPv6 sysctl defaults in new namespace
From
: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
Re: [lxc-devel] CGroup Namespaces (v10)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [lxc-devel] CGroup Namespaces (v10)
From
: Alban Crequy <alban.crequy@xxxxxxxxx>
Re: [PATCH v3] openvswitch: allow management from inside user namespaces
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH v3] openvswitch: allow management from inside user namespaces
From
: pravin shelar <pshelar@xxxxxxx>
Re: [PATCH] selftests/cgroupns: new test for cgroup namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH v3] openvswitch: allow management from inside user namespaces
From
: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
Re: [PATCH v2] openvswitch: allow management from inside user namespaces
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
[PATCH v2] openvswitch: allow management from inside user namespaces
From
: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
Re: [PATCH] openvswitch: allow management from inside user namespaces
From
: pravin shelar <pshelar@xxxxxxx>
[PATCH] selftests/cgroupns: new test for cgroup namespaces
From
: Alban Crequy <alban.crequy@xxxxxxxxx>
Re: [PATCH] openvswitch: allow management from inside user namespaces
From
: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
Re: [PATCH] openvswitch: allow management from inside user namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[PATCH] openvswitch: allow management from inside user namespaces
From
: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
[PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 8/8] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 5/8] kernfs: define kernfs_node_dentry
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/8] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v10)
From
: serge.hallyn@xxxxxxxxxx
[PATCH 4/8] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
[PATCH 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/8 v3] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v9)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
[PATCH 3/8 v2] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v9)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 3/8] cgroup: introduce cgroup namespaces
From
: Johannes Weiner <hannes@xxxxxxxxxxx>
Re: [PATCH 3/8] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
[PATCH 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
[PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 5/8] kernfs: define kernfs_node_dentry
From
: serge.hallyn@xxxxxxxxxx
[PATCH 8/8] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/8] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v9)
From
: serge.hallyn@xxxxxxxxxx
[PATCH 4/8] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
Re: CGroup Namespaces (v8)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: Dan Williams <dan.j.williams@xxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: Dan Williams <dan.j.williams@xxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: Dan Williams <dan.j.williams@xxxxxxxxx>
Re: [PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Sergey Senozhatsky <sergey.senozhatsky@xxxxxxxxx>
Re: [PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Sergey Senozhatsky <sergey.senozhatsky@xxxxxxxxx>
[PATCH] cgroup: Add documentation for cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: Serge Hallyn <serge@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: CGroup Namespaces (v8)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/8 v8.2] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8 v8.2] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5/8] kernfs: define kernfs_node_dentry
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 5/8] kernfs: define kernfs_node_dentry
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/8] cgroup: introduce cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
[PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
[PATCH 8/8] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 5/8] kernfs: define kernfs_node_dentry
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v8)
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/8] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 4/8] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [PATCH] [RFC] selftests/cgroupns: new test for cgroup namespaces
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [PATCH] [RFC] selftests/cgroupns: new test for cgroup namespaces
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Kamezawa Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
[PATCH] [RFC] selftests/cgroupns: new test for cgroup namespaces
From
: Alban Crequy <alban.crequy@xxxxxxxxx>
[Propose] Isolate core_pattern in mnt namespace.
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
[PATCH 4/8] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
[PATCH 7/8] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 8/8] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 5/8] kernfs: define kernfs_node_dentry
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/8] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v7)
From
: serge.hallyn@xxxxxxxxxx
[PATCH 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
Re: [PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: Bruno Prémont <bonbons@xxxxxxxxxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: piping core dump to a program escapes container
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: piping core dump to a program escapes container
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: piping core dump to a program escapes container
From
: Dongsheng Yang <yangds.fnst@xxxxxxxxxxxxxx>
Re: [PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 3/7] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 3/7] cgroup: introduce cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/7] cgroup: introduce cgroup namespaces
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 6/7] cgroup: Add documentation for cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/7] cgroup: introduce cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: CGroup Namespaces (v6)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v6)
From
: Alban Crequy <alban.crequy@xxxxxxxxx>
[PATCH 7/7] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/7] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/7] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
[PATCH 4/7] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v6)
From
: serge.hallyn@xxxxxxxxxx
[PATCH 2/7] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
[Announce] Checkpoint-restore tool v1.8
From
: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
[PATCH 5/7] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge.hallyn@xxxxxxxxxx
[PATCH 6/7] cgroup: Add documentation for cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 7/7] Add FS_USERNS_FLAG to cgroup fs
From
: serge.hallyn@xxxxxxxxxx
[PATCH 1/7] kernfs: Add API to generate relative kernfs path
From
: serge.hallyn@xxxxxxxxxx
[PATCH 3/7] cgroup: introduce cgroup namespaces
From
: serge.hallyn@xxxxxxxxxx
[PATCH 4/7] cgroup: cgroup namespace setns support
From
: serge.hallyn@xxxxxxxxxx
[PATCH 2/7] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge.hallyn@xxxxxxxxxx
CGroup Namespaces (v5)
From
: serge.hallyn@xxxxxxxxxx
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 4/8] cgroup: export cgroup_get() and cgroup_put()
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: [PATCH 8/8] cgroup: Add documentation for cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/8] cgroup: add function to get task's cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 6/8] cgroup: cgroup namespace setns support
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 5/8] cgroup: introduce cgroup namespaces
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 4/8] cgroup: export cgroup_get() and cgroup_put()
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 3/8] cgroup: add function to get task's cgroup
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: [PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge.hallyn@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: Tejun Heo <tj@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: CGroup Namespaces (v4)
From
: Richard Weinberger <richard@xxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: CGroup Namespaces (v4)
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
[PATCH 5/8] cgroup: introduce cgroup namespaces
From
: serge@xxxxxxxxxx
[PATCH 8/8] cgroup: Add documentation for cgroup namespaces
From
: serge@xxxxxxxxxx
[PATCH 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
From
: serge@xxxxxxxxxx
[PATCH 6/8] cgroup: cgroup namespace setns support
From
: serge@xxxxxxxxxx
[PATCH 4/8] cgroup: export cgroup_get() and cgroup_put()
From
: serge@xxxxxxxxxx
[PATCH 1/8] kernfs: Add API to generate relative kernfs path
From
: serge@xxxxxxxxxx
CGroup Namespaces (v4)
From
: serge@xxxxxxxxxx
[PATCH 3/8] cgroup: add function to get task's cgroup
From
: serge@xxxxxxxxxx
[PATCH 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
From
: serge@xxxxxxxxxx
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: Jeff Layton <jeff.layton@xxxxxxxxxxxxxxx>
Re: Fuse in userns
From
: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: Jeff Layton <jeff.layton@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: Jeremy Allison via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: Jeff Layton <jeff.layton@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
[RFC][PATCH] locks: Allow disabling mandatory locking at compile time
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: Fuse in userns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Fuse in userns
From
: Nikolay Borisov <n.borisov@xxxxxxxxxxxxxx>
Re: [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments
From
: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
Re: [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
LXC 1.0.8 has been released!
From
: Stéphane Graber <stgraber@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]