Linux Containers
[Prev Page][Next Page]
- LXC 1.1.5 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH v4 00/11] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v4 04/11] lsm: inode_pre_setxattr hook
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: piping core dump to a program escapes container
- From: Shayan Pooya <shayan@xxxxxxxxxx>
- [GIT PULL] userns: Allow hardlinks for 4.4
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: piping core dump to a program escapes container
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v4 11/11] smack: documentation for the Smack namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 10/11] smack: namespace implementation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/11] smack: namespace groundwork
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/11] smack: misc cleanups in preparation for a namespace patch
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/11] smack: abstraction layer for 2 common Smack operations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/11] smack: don't use implicit star to display smackfs/syslog
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/11] smack: extend capability functions and fix 2 checks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/11] lsm: inode_pre_setxattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/11] lsm: /proc/$PID/attr/label_map file and getprocattr_seq hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/11] user_ns: 3 new LSM hooks for user namespace operations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] userns/capability: Add user namespace capability
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] userns/capability: Add user namespace capability
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] userns/capability: Add user namespace capability
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] TTY, devpts: document pty count limiting
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] TTY, devpts: document pty count limiting
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] TTY, devpts: document pty count limiting
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] TTY, devpts: document pty count limiting
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 2/2] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH v4 11/11] smack: documentation for the Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 10/11] smack: namespace implementation
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 09/11] smack: namespace groundwork
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 08/11] smack: misc cleanups in preparation for a namespace patch
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 07/11] smack: abstraction layer for 2 common Smack operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 06/11] smack: don't use implicit star to display smackfs/syslog
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 05/11] smack: extend capability functions and fix 2 checks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 04/11] lsm: inode_pre_setxattr hook
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 02/11] lsm: /proc/$PID/attr/label_map file and getprocattr_seq hook
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 03/11] lsm: add file opener's cred to a setprocattr arguments
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 01/11] user_ns: 3 new LSM hooks for user namespace operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v4 00/11] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Oren Laadan <orenl@xxxxxxxxxxx>
- Re: pidns: Make pid accounting and pid_max per namespace
- From: Zhang Haoyu <yuzhou@xxxxxxxxxxx>
- Re: pidns: Make pid accounting and pid_max per namespace
- From: Zhang Haoyu <yuzhou@xxxxxxxxxxx>
- Re: pidns: Make pid accounting and pid_max per namespace
- From: Zefan Li <lizefan@xxxxxxxxxx>
- pidns: Make pid accounting and pid_max per namespace
- From: Zhang Haoyu <yuzhou@xxxxxxxxxxx>
- LXC 1.1.4 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Oren Laadan <orenl@xxxxxxxxxxx>
- Re: [PATCH 1/3] lib/kobject_uevent.c: disable broadcast of uevents to other namespaces
- From: Oren Laadan <orenl@xxxxxxxxxxx>
- Re: [RFC 0/4] reduce pid_namespace footprint when not configured
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/4] reduce pid_namespace footprint when not configured
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: Chen Fan <chen.fan.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: handling of supplemental groups with userns
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- Re: [PATCH] pidns: fix set/getpriority and ioprio_set/get in PRIO_USER mode
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 2/2] pidns: introduce syscall getvpid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC v3 2/2] pidns: introduce syscall getvpid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 2/2] pidns: introduce syscall getvpid
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 1/1] ns: introduce proc_get_ns_by_fd()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH 0/1] ns: introduce proc_get_ns_by_fd()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH RFC v3 2/2] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC v3 1/2] nsfs: replace proc_ns_fget() with proc_ns_fdget()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2] pidns: introduce syscall getvpid
- From: Chen Fan <chen.fan.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH] pidns: fix set/getpriority and ioprio_set/get in PRIO_USER mode
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC v2] pidns: introduce syscall getvpid
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH RFC v2] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH RFC v2] pidns: introduce syscall getvpid
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH RFC v2] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: handling of supplemental groups with userns
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: handling of supplemental groups with userns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- handling of supplemental groups with userns
- From: Mike Frysinger <vapier@xxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH] pidns: fix set/getpriority and ioprio_set/get in PRIO_USER mode
- From: bsegall--- via Containers <containers@xxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] pidns: fix set/getpriority and ioprio_set/get in PRIO_USER mode
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Chen Fan <chen.fan.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: User namespace feature freeze lifted
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: User namespace feature freeze lifted
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: User namespace feature freeze lifted
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: User namespace feature freeze lifted
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- User namespace feature freeze lifted
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC] pidns: introduce syscall getvpid
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH RFC] pidns: introduce syscall getvpid
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: nspawn and rocket.
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: nspawn and rocket.
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Amir Goldstein <amir@xxxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: Michael J Coss <michael.coss@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] net/udevns: Netlink module to forward uevent to containers
- From: "Michael J. Coss" <michael.coss@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] lib/kobject_uevent.c: add uevent forwarding function
- From: "Michael J. Coss" <michael.coss@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] lib/kobject_uevent.c: disable broadcast of uevents to other namespaces
- From: "Michael J. Coss" <michael.coss@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] kobject: support namespace aware udev
- From: "Michael J. Coss" <michael.coss@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] Containerise nproc count
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH 2/2] userns/nproc: Add hooks for userns nproc management
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [RFC PATCH 1/2] userns: Implement per-userns nproc infrastructure
- From: Nikolay Borisov <kernel@xxxxxxxx>
- [RFC PATCH 0/2] Containerise nproc count
- From: Nikolay Borisov <kernel@xxxxxxxx>
- nspawn and rocket.
- From: Rob Landley <rob@xxxxxxxxxxx>
- [Announce] Checkpoint-restore tool v1.7
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- [GIT PULL] User namespace related changes for v4.3
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- ALARM: Best Job Ever - Die Panda Tagesklinik (18 Bilder)
- From: Huach Zua <newsletter@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: NeilBrown <neilb@xxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/7] Bind mount escape fixes
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH review 7/7] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 6/7] mnt: Track when a directory escapes a bind mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 5/7] dcache: Only read d_flags once in d_is_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 4/7] dcache: Implement d_common_ancestor
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 3/7] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 2/7] dcache: Reduce the scope of i_lock in d_splice_alias
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 1/7] dcache: Handle escaped paths in prepend_path
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 0/7] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 3/8] dcache: Clearly separate the two directory rename cases in d_splice_alias
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 3/8] dcache: Clearly separate the two directory rename cases in d_splice_alias
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH review 8/8] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 7/8] mnt: Track when a directory escapes a bind mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 6/8] dcache: Only read d_flags once is d_is_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 5/8] dcache: Implement d_common_ancestor
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 4/8] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 3/8] dcache: Clearly separate the two directory rename cases in d_splice_alias
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 2/8] dcache: Reduce the scope of i_lock in d_splice_alias
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 1/8] dcache: Handle escaped paths in prepend_path
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 0/8] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 4/6] mnt: Track when a directory escapes a bind mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] fs: Set the size of empty dirs to 0.
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH] fs: Set the size of empty dirs to 0.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH review 5/6] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 4/6] mnt: Track when a directory escapes a bind mount
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 5/6] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 4/6] mnt: Track when a directory escapes a bind mount
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 1/6] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 1/6] mnt: Track which mounts use a dentry as root.
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- [PATCH review 7/6] vfs: Make mnt_escape_count 64bit
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 6/6] vfs: Cache the results of path_connected
- From: Andrew Vagin <avagin@xxxxxxxxx>
- [PATCH review 6/6] vfs: Cache the results of path_connected
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 5/6] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 4/6] mnt: Track when a directory escapes a bind mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 3/6] dcache: Implement d_common_ancestor
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 2/6] dcache: Handle escaped paths in prepend_path
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 1/6] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 0/6] Bind mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/4] Loopback mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] namespace: Infinite loop bugfixes for 4.2-rc4
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv1 0/8] CGroup Namespaces
- From: Vincent Batts <vbatts@xxxxxxxxx>
- [REVIEW][PATCH] nsfs: Add a show_path method to fix mountinfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 1/2] vfs: Commit to never having exectuables on proc and sysfs.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 1/2] vfs: Commit to never having exectuables on proc and sysfs.
- From: Richard Weinberger <richard@xxxxxx>
- Re: [REVIEW][PATCH 1/2] vfs: Commit to never having exectuables on proc and sysfs.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 1/2] vfs: Commit to never having exectuables on proc and sysfs.
- From: Richard Weinberger <richard@xxxxxx>
- [REVIEW][PATCH 2/2] mnt: fs_fully_visible enforce noexec and nosuid if !SB_I_NOEXEC
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 1/2] vfs: Commit to never having exectuables on proc and sysfs.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 0/2] noexec on proc and sysfs
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] User namespace related fixes for v4.2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] User namespace related fixes for v4.2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] User namespace related fixes for v4.2
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [ANNOUNCE] xdg-app - desktop app sandboxing system
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: How we use cgroups in rkt
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: How we use cgroups in rkt
- From: Alban Crequy <alban@xxxxxxxxxxxx>
- Re: How we use cgroups in rkt
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- How we use cgroups in rkt
- From: Iago López Galeiras <iago@xxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Re: [CFT][PATCH 11/10] mnt: Avoid unnecessary regressions in fs_fully_visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 11/10] mnt: Avoid unnecessary regressions in fs_fully_visible
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Container mini-summit at Linux Plumbers 2015
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 11/10] mnt: Avoid unnecessary regressions in fs_fully_visible (take 2)
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [CFT][PATCH 11/10] mnt: Avoid unnecessary regressions in fs_fully_visible (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 11/10] mnt: Avoid unnecessary regressions in fs_fully_visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [Announce] Checkpoint-restore tool v1.6
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: netlink and user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- netlink and user namespaces
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: Kernel panic with user namespaces
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: Kernel panic with user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 0/7] Smack namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Kernel panic with user namespaces
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 0/7] Smack namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: Kernel panic with user namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 0/7] Smack namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v2 0/7] Smack namespace
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Kernel panic with user namespaces
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- [PATCH v2 7/7] smack: documentation for the Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 6/7] smack: namespace implementation
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 5/7] smack: namespace groundwork
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 4/7] smack: misc cleanups in preparation for a namespace patch
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 3/7] smack: abstraction layer for 2 common Smack operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 2/7] smack: extend capability functions and fix 2 checks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 1/7] user_ns: 3 new hooks for user namespace operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH v2 0/7] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 7/8] smack: namespace implementation
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 8/8] smack: documentation for the Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 6/8] smack: namespace groundwork
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 5/8] smack: misc cleanups in preparation for a namespace patch
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 4/8] smack: abstraction layer for 2 common Smack operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 2/8] user_ns: 3 new hooks for LSM namespace operations
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 3/8] smack: extend capability functions and fix 2 checks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 1/8] kernel/exit.c: make sure current's nsproxy != NULL while checking caps
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [PATCH 0/8] Smack namespace
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Kernel panic with user namespaces
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_mount_point
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [CFT][PATCH 08/10] sysfs: Add support for permanently empty directories to serve as mount points.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [CFT][PATCH 10/10] mnt: Update fs_fully_visible to test for permanently empty directories
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_mount_point
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 08/10] sysfs: Add support for permanently empty directories to serve as mount points.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 07/10] kernfs: Add support for always empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 06/10] proc: Allow creating permanently empty directories that serve as mount points
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 05/10] sysctl: Allow creating permanently empty directories that serve as mountpoints.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 04/10] fs: Add helper functions for permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 03/10] vfs: Ignore unlocked mounts in fs_fully_visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 02/10] mnt: Modify fs_fully_visible to deal with mount attributes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 01/10] mnt: Refactor the logic for mounting sysfs and proc in a user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 00/10] Making new mounts of proc and sysfs as safe as bind mounts (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH v2 2/2] coredump: add __printf attribute to cn_*printf functions
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/2] coredump: use from_kuid/kgid when formatting corename
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [CFT][PATCH 0/10] Making new mounts of proc and sysfs as safe as bind mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 0/10] Making new mounts of proc and sysfs as safe as bind mounts
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] coredump: use from_kuid/kgid when formatting corename
- From: Nicolas Iooss <nicolas.iooss_linux@xxxxxxx>
- [PATCH v2 2/2] coredump: add __printf attribute to cn_*printf functions
- From: Nicolas Iooss <nicolas.iooss_linux@xxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Oren Laadan <orenl@xxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [CFT][PATCH 08/10] sysfs: Add support for permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 0/10] Making new mounts of proc and sysfs as safe as bind mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 08/10] sysfs: Add support for permanently empty directories.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [CFT][PATCH 0/10] Making new mounts of proc and sysfs as safe as bind mounts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Paul Moore <pmoore@xxxxxxxxxx>
- [CFT][PATCH 10/10] mnt: Update fs_fully_visible to test for permanently empty directories
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 09/10] sysfs: Create mountpoints with sysfs_create_empty_dir
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 08/10] sysfs: Add support for permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 07/10] kernfs: Add support for always empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 06/10] proc: Allow creating permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 05/10] sysctl: Allow creating permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 04/10] fs: Add helper functions for permanently empty directories.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 03/10] vfs: Ignore unlocked mounts in fs_fully_visible
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 02/10] mnt: Modify fs_fully_visible to deal with mount attributes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 01/10] mnt: Refactor the logic for mounting sysfs and proc in a user namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 0/10] Making new mounts of proc and sysfs as safe as bind mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH V7 10/10] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 09/10] audit: log on switching namespace (setns)
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 06/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 08/10] fork: audit on creation of new namespace(s) with clone and unshare
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 03/10] nsfs: add nsfs device ID to ns_common
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 05/10] audit: initialize at subsystem time rather than device time
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 07/10] audit: dump namespace IDs for pid on receipt of AUDIT_NS_INFO
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 01/10] namespaces: expose ns_entries
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 04/10] audit: log namespace ID numbers
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 02/10] nsfs: switch to dedicated inode pool
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V7 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [stable] Locked mount and loopback mount fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [stable] Locked mount and loopback mount fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 12/19] fs_pin: Allow for the possibility that m_list or s_list go unused.
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [stable] Locked mount and loopback mount fixes
- From: Luis Henriques <luis.henriques@xxxxxxxxxxxxx>
- Re: [stable] Locked mount and loopback mount fixes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [stable] Locked mount and loopback mount fixes
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [GIT PULL] userns: proc and sysfs mount fix
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 1/2] coredump: use from_kuid/kgid_munged when formatting corename
- From: Nicolas Iooss <nicolas.iooss_linux@xxxxxxx>
- Re: [PATCH 1/2] coredump: use from_kuid/kgid_munged when formatting corename
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Aristeu Rozanski <arozansk@xxxxxxxxxx>
- Re: [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 00/10] namespaces: log namespaces per task
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V6 07/10] sched: add a macro to ref all CLONE_NEW* flags
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 07/10] sched: add a macro to ref all CLONE_NEW* flags
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V6 07/10] sched: add a macro to ref all CLONE_NEW* flags
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V6 07/10] sched: add a macro to ref all CLONE_NEW* flags
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH V6 02/10] proc_ns: define PROC_*_INIT_INO in terms of PROC_DYNAMIC_FIRST
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 01/10] namespaces: expose ns_entries
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 10/10] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 09/10] audit: log on switching namespace (setns)
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 06/10] audit: dump namespace IDs for pid on receipt of AUDIT_NS_INFO
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 05/10] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 08/10] fork: audit on creation of new namespace(s)
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 07/10] sched: add a macro to ref all CLONE_NEW* flags
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 04/10] audit: initialize at subsystem time rather than device time
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 03/10] audit: log namespace ID numbers
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V6 00/10] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [GIT PULL] Usernamespace related locked mount fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] Usernamespace related locked mount fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [v12 0/5] ext4: add project quota support
- From: Alban Crequy <alban@xxxxxxxxxxxx>
- Re: [v12 0/5] ext4: add project quota support
- From: Jan Kara <jack@xxxxxxx>
- Re: [PATCH review 0/4] Loopback mount escape fixes
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [v12 0/5] ext4: add project quota support
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 2/4] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 2/4] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/4] Loopback mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 0/4] Loopback mount escape fixes
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 0/4] Loopback mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 09/19] mnt: Fail collect_mounts when applied to unmounted mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: Jann Horn <jann@xxxxxxxxx>
- [PATCH review 4/4] vfs: Do not allow escaping from bind mounts.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 3/4] vfs: Handle mounts whose parents are unreachable from their mountpoint
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 2/4] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 1/4] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 0/4] Loopback mount escape fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 16/19] mnt: Track which mounts use a dentry as root.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 16/19] mnt: Track which mounts use a dentry as root.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH review 19/19] vfs: Do not allow escaping from bind mounts.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH review 09/19] mnt: Fail collect_mounts when applied to unmounted mounts
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH review 19/19] vfs: Do not allow escaping from bind mounts.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 16/19] mnt: Track which mounts use a dentry as root.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH review 11/19] mnt: Factor umount_mnt from umount_tree
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 16/19] mnt: Track which mounts use a dentry as root.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 13/19] mnt: Honor MNT_LOCKED when detaching mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 19/19] vfs: Do not allow escaping from bind mounts.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 12/19] fs_pin: Allow for the possibility that m_list or s_list go unused.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 14/19] mnt: Fix the error check in __detach_mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 15/19] mnt: Update detach_mounts to leave mounts connected
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 17/19] vfs: Test for and handle paths that are unreachable from their mnt_root
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 18/19] vfs: Handle mounts whose parents are unreachable from their mountpoint
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 10/19] mnt: Factor out unhash_mnt from detach_mnt and umount_tree
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 09/19] mnt: Fail collect_mounts when applied to unmounted mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 08/19] mnt: Don't propagate unmounts to locked mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 07/19] mnt: On an unmount propagate clearing of MNT_LOCKED
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 06/19] mnt: Delay removal from the mount hash.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 05/19] mnt: Add MNT_UMOUNT flag
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 04/19] mnt: In umount_tree reuse mnt_list instead of mnt_hash
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 03/19] mnt: Don't propagate umounts in __detach_mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 02/19] mnt: Improve the umount_tree flags
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 01/19] mnt: Use hlist_move_list in namespace_unlock
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 0/19] Locked mount and loopback mount fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: Get statistics from all network interfaces on a system, including those inside network namespaces
- From: Jeremias Blendin <jeremias@xxxxxxxxxxx>
- Re: Get statistics from all network interfaces on a system, including those inside network namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Get statistics from all network interfaces on a system, including those inside network namespaces
- From: Jeremias Blendin <jeremias@xxxxxxxxxxx>
- Re: Get statistics from all network interfaces on a system, including those inside network namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Get statistics from all network interfaces on a system, including those inside network namespaces
- From: Jeremias Blendin <jeremias@xxxxxxxxxxx>
- LXC 1.1.1 has been released! (Was: LXC 1.0.7 has been released!)
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- LXC 1.0.7 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [Announce] Checkpoint-restore tool v1.5
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- RE: [PATCH v10 2/2] docs: add missing and new /proc/PID/status file entries, fix typos
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH v10 1/2] /proc/PID/status: show all sets of pid according to ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v10 2/2] docs: add missing and new /proc/PID/status file entries, fix typos
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/2] /proc/PID/status: show all sets of pid according to ns
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [resend][PATCH v10 1/2] /proc/PID/status: show all sets of pid according to ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v10 2/2] docs: add missing and new /proc/PID/status file entries, fix typos
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [resend][PATCH v10 1/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [resend][PATCH v10 0/2] ns, procfs: pid conversion between ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] devpts: Add ptmx_uid and ptmx_gid options
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] ns, procfs: pid conversion between ns
- From: "Gui, Jianfeng/归 剑峰" <guijianfeng@xxxxxxxxxxxxxx>
- =?UTF-8?Q?Do you have my number??=
- From: Danik <Brian@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- RE: [PATCH v10 0/2] ns, procfs: pid conversion between ns
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH RFC 2/6] quota: adds generic code for enforcing project quota limits
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC 4/6] ext4: add project id support
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC 6/6] tools/quota/project_quota: sample tool for early adopters
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC 3/6] quota: mangle statfs result according to project quota usage and limits
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC 5/6] ext4: adds project quota support
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RFC 1/6] fs: new interface and behavior for file project id
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH v10 0/2] ns, procfs: pid conversion between ns
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: Detecting the use of a mount in another namespace
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- [PATCH v10 2/2] docs: add missing and new /proc/PID/status file entries, fix typos
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v10 1/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v10 0/2] ns, procfs: pid conversion between ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [resend][PATCH v9 2/3] /proc/PID/status: show all sets of pid according to ns
- From: Nathan Scott <nathans@xxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Saied Kazemi <saied@xxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Christopher Covington <cov@xxxxxxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Saied Kazemi <saied@xxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Tycho Andersen <tycho.andersen@xxxxxxxxxxxxx>
- Re: [CRIU] CRIU @Plumbers
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- CRIU @Plumbers
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- LXC 1.1 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH net-next v5 0/4] netns: allow to identify peer netns
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Detecting the use of a mount in another namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Detecting the use of a mount in another namespace
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- [PATCH net-next v5 1/4] netns: add rtnl cmd to add and get peer netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v5 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v5 4/4] rtnl: allow to create device with IFLA_LINK_NETNSID set
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v5 3/4] tunnels: advertise link netns via netlink
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v5 2/4] rtnl: add link netns id to interface messages
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: Detecting the use of a mount in another namespace
- From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
- Detecting the use of a mount in another namespace
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH review 11/11] mnt: Honor MNT_LOCKED when detaching mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 10/11] mnt: Don't propagate unmounts to locked mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 09/11] mnt: On an unmount propagate clearing of MNT_LOCKED
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 08/11] mnt: Remove redundant NULL tests in namespace_unlock
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 07/11] mnt: Simplify umount_tree
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 06/11] mnt: Factor out __detach_mnt from detach_mnt
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 05/11] mnt: Delay removal from the mount hash.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 04/11] mnt: Add MNT_UMOUNT flag
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 03/11] mnt: In umount_tree reuse mnt_list instead of mnt_hash
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 02/11] mnt: Don't propagate umounts in __detach_mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 01/11] mnt: Improve the umount_tree flags
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 0/11 Call for testing and review of mount detach fixes (take 2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 9/9] mnt: Honor MNT_LOCKED when detaching mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH review 9/9] mnt: Honor MNT_LOCKED when detaching mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 8/9] mnt: Remove redundant NULL tests in namespace_unlock
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 7/9] mnt: Simplify umount_tree
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 6/9] mnt: Factor out __detach_mnt from detach_mnt
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 5/9] mnt: Delay removal from the mount hash.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 4/9] mnt: Add MNT_UMOUNT flag
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 3/9] mnt: In umount_tree reuse mnt_list instead of mnt_hash
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 2/9] mnt: Don't propagate umounts in __detach_mounts
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 1/9] mnt: Improve the umount_tree flags
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 0/9] Call for testing and review of mount detach fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: How to start contributing to namespaces in the kernel.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [resend][PATCH v9 1/3] procfs: show hierarchy of pid namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [resend][PATCH v9 2/3] /proc/PID/status: show all sets of pid according to ns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: How to start contributing to namespaces in the kernel.
- From: Amir Goldstein <amir@xxxxxxxxxxx>
- RE: [resend][PATCH v9 1/3] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: How to start contributing to namespaces in the kernel.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: How to start contributing to namespaces in the kernel.
- From: Vincent Batts <vbatts@xxxxxxxxx>
- Re: How to start contributing to namespaces in the kernel.
- From: Timothy Chen <tnachen@xxxxxxxxx>
- How to start contributing to namespaces in the kernel.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [resend][PATCH v9 1/3] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v9 3/3] Documentation: add docs for /proc/pidns_hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [resend][PATCH v9 2/3] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [resend][PATCH v9 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [GIT PULL] User namespace related fixes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH review 00/18] userns: review of bug fixes for 3.19-rcX
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH review 00/18] userns: review of bug fixes for 3.19-rcX
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- Re: [PATCH review 03/18] umount: Disallow unprivileged mount force
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH review 03/18] umount: Disallow unprivileged mount force
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH review 03/18] umount: Disallow unprivileged mount force
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH review 16/18] userns: Allow setting gid_maps without privilege when setgroups is disabled
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 15/18] userns: Add a knob to disable setgroups on a per user namespace basis
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 17/18] userns; Correct the comment in map_write
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 12/18] userns: Check euid no fsuid when establishing an unprivileged uid mapping
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 14/18] userns: Rename id_map_mutex to userns_state_mutex
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 18/18] userns: Unbreak the unprivileged remount tests
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 13/18] userns: Only allow the creator of the userns unprivileged mappings
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 11/18] userns: Don't allow unprivileged creation of gid mappings
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 10/18] userns: Don't allow setgroups until a gid mapping has been setablished
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 09/18] userns: Document what the invariant required for safe unprivileged mappings.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 08/18] groups: Consolidate the setgroups permission checks
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 07/18] mnt: Clear mnt_expire during pivot_root
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 06/18] mnt: Carefully set CL_UNPRIVILEGED in clone_mnt
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 05/18] mnt: Move the clear of MNT_LOCKED from copy_tree to it's callers.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 04/18] umount: Do not allow unmounting rootfs.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 03/18] umount: Disallow unprivileged mount force
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 02/18] mnt: Update unprivileged remount test
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 01/18] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH review 00/18] userns: review of bug fixes for 3.19-rcX
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 2/2] user_namespaces.7: Update the documention to reflect the fixes for negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/2] proc.5: Document /proc/[pid]/setgroups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/2] Documenting user namespace changes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RESEND][PATCH] userns: use macro instead of magic number for max userns level
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv3 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Zefan Li <lizefan@xxxxxxxxxx>
- Re: [PATCHv3 5/8] cgroup: introduce cgroup namespaces
- From: Zefan Li <lizefan@xxxxxxxxxx>
- Re: [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Zefan Li <lizefan@xxxxxxxxxx>
- RE: [CFT] Can I get some Tested-By's on this series?
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: Limiting access to abstract unix domain sockets
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- [CFT][PATCH v6] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Limiting access to abstract unix domain sockets
- From: Alexander Larsson <alexl@xxxxxxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Richard Weinberger <richard@xxxxxx>
- Re: Limiting access to abstract unix domain sockets
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Limiting access to abstract unix domain sockets
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Limiting access to abstract unix domain sockets
- From: Alexander Larsson <alexl@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]