Linux Containers
[Prev Page][Next Page]
- Re: [CFT] Can I get some Tested-By's on this series?
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [CFT] Can I get some Tested-By's on this series?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT] Can I get some Tested-By's on this series?
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: "Eric W.Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [CFT][PATCH 3/8] userns: Don't allow unprivileged creation of gid mappings
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 6/8] userns: Rename id_map_mutex to userns_state_mutex
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/8] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH 8/8] userns: Allow setting gid_maps without privilege when setgroups is disabled
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 7/8] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 6/8] userns: Rename id_map_mutex to userns_state_mutex
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 5/8] userns: Only allow the creator of the userns unprivileged mappings
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 4/8] userns: Check euid no fsuid when establishing an unprivileged uid mapping
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 3/8] userns: Don't allow unprivileged creation of gid mappings
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 2/8] userns: Don't allow setgroups until a gid mapping has been setablished
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 1/8] userns: Document what the invariant required for safe unprivileged mappings.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] lsm: namespace hooks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH 7/7] userns: Allow setting gid_maps without privilege when setgroups is disabled
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Richard Weinberger <richard@xxxxxx>
- [CFT][PATCH 7/7] userns: Allow setting gid_maps without privilege when setgroups is disabled
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 5/7] userns: Only allow the creator of the userns unprivileged mappings
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH 6/7] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 4/7] userns: Check euid no fsuid when establishing an unprivileged uid mapping
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH 5/7] userns: Only allow the creator of the userns unprivileged mappings
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH 4/7] userns: Check euid no fsuid when establishing an unprivileged uid mapping
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 3/7] userns: Don't allow unprivileged creation of gid mappings
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 1/7] userns: Document what the invariant required for safe unprivileged mappings.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- LXC 1.0.7 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCHv3 0/8] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 7/8] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 8/8] cgroup: Add documentation for cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 6/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 5/8] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 4/8] cgroup: export cgroup_get() and cgroup_put()
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 3/8] cgroup: add function to get task's cgroup on default hierarchy
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 1/8] kernfs: Add API to generate relative kernfs path
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv3 0/8] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- RE: [PATCH v9 1/3] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH 3/3] userns: Unbreak the unprivileged remount tests
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 2/3] userns: Add a knob to disable setgroups on a per user namespace basis
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [CFT][PATCH 1/3] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] userns: Disallow setgroups unless the gid_map writer is privileged
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2] userns: Disallow setgroups unless the gid_map writer is privileged
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv2 0/7] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH v2] userns: Disallow setgroups unless the gid_map writer is privileged
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: joeyli <jlee@xxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [PATCH v2] userns: Disallow setgroups unless the gid_map writer is privileged
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Richard Weinberger <richard@xxxxxx>
- [Announce] Checkpoint-restore tool v1.4
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- [PATCH v9 2/3] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v9 1/3] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v9 3/3] Documentation: add docs for /proc/pidns_hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v9 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: What's the status of 87b47932 patch - mnt: Implicitly add MNT_NODEV on remount as we do on mount
- From: joeyli <jlee@xxxxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Lennart Poettering <mzerqung@xxxxxxxxxxx>
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Lennart Poettering <mzerqung@xxxxxxxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Richard Weinberger <richard@xxxxxx>
- Re: [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [CFT][PATCH] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: What's the status of 87b47932 patch - mnt: Implicitly add MNT_NODEV on remount as we do on mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2] userns: Disallow setgroups unless the gid_map writer is privileged
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC PATCH] userns: Disallow setgroups unless the gid_map writer is privileged
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] userns: Disallow setgroups unless the gid_map writer is privileged
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] userns: Disallow setgroups unless the gid_map writer is privileged
- [RFC PATCH] userns: Disallow setgroups unless the gid_map writer is privileged
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [CFT][PATCH] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Richard Weinberger <richard@xxxxxx>
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Martin Pitt <mpitt@xxxxxxxxxx>
- [CFT][PATCH v2] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [CFT][PATCH] userns: Avoid problems with negative groups
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Cameron Norman <camerontnorman@xxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [CFT][PATCH] userns: Avoid problems with negative groups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] lsm: namespace hooks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [systemd-devel] systemd-cgroups-agent not working in containers
- From: Umut Tezduyar Lindskog <umut@xxxxxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Richard Weinberger <richard@xxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: [RFC] lsm: namespace hooks
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- [RFC] lsm: namespace hooks
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- [RFC] LSM/Smack namespace work in progress
- From: Lukasz Pawelczyk <l.pawelczyk@xxxxxxxxxxx>
- Re: systemd-cgroups-agent not working in containers
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCHv2 0/7] CGroup Namespaces
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- systemd-cgroups-agent not working in containers
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- RE: [PATCH v8 1/2] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] procfs: show hierarchy of pid namespace
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- RE: [PATCH v8 1/2] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: serve new & original IC parts with ex-factory price
- From: "MIT electronics" <Bella-sales@xxxxxxxxxxxxxxx>
- [PATCH v8 1/2] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v8 2/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v8 0/2] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH v7 1/2] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH v7 1/2] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v7 2/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v7 1/2] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v7 0/2] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv2 0/7] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- RE: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- RE: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: Mateusz Guzik <mguzik@xxxxxxxxxx>
- [PATCH 2/2v6] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH 1/2v6] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH 0/2v6] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [Patch net-next] net: make neigh tables per netns
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv2 0/7] CGroup Namespaces
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] sched: updated comments of CLONE_NEWUTS and CLONE_NEWIPC
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- [PATCH] sched: updated comments of CLONE_NEWUTS and CLONE_NEWIPC
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCHv5] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCHv2 7/7] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 6/7] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 5/7] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 4/7] cgroup: export cgroup_get() and cgroup_put()
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 3/7] cgroup: add function to get task's cgroup on default hierarchy
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 2/7] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 1/7] kernfs: Add API to generate relative kernfs path
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv2 0/7] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv5] procfs: show hierarchy of pid namespace
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH net-next v4 1/4] netns: add genl cmd to add and get peer netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH net-next v4 1/4] netns: add genl cmd to add and get peer netns ids
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH net-next v4 1/4] netns: add genl cmd to add and get peer netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v4 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v4 3/4] iptunnels: advertise link netns via netlink
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v4 2/4] rtnl: add link netns id to interface messages
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [PATCH net-next v4 4/4] rtnl: allow to create device with IFLA_LINK_NETNSID set
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH 00/12] Add kdbus implementation
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/12] Add kdbus implementation
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/12] Add kdbus implementation
- From: Tom Gundersen <teg@xxxxxxx>
- Re: [PATCH 00/12] Add kdbus implementation
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: RT Scheduler and Network Namespaces - possible issue
- From: "Florin Medrea (Gmail)" <florinmedrea@xxxxxxxxx>
- Re: RT Scheduler and Network Namespaces - possible issue
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RT Scheduler and Network Namespaces - possible issue
- From: "Florin Medrea (Gmail)" <florinmedrea@xxxxxxxxx>
- RE: [RESEND][PATCH 0/2v5] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv1 5/8] cgroup: introduce cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [RESEND][PATCH 2/2v5] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RESEND][PATCH 1/2v5] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RESEND][PATCH 0/2v5] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv1 5/8] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCHv1 6/8] cgroup: restrict cgroup operations within task's cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- RE: [PATCHv5] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Richard Weinberger <richard@xxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: "Eric W.Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv1 6/8] cgroup: restrict cgroup operations within task's cgroupns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv1 0/8] CGroup Namespaces
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: How to use cgroups within containers?
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [systemd-devel] How to use cgroups within containers?
- From: Cameron Norman <camerontnorman@xxxxxxxxx>
- Re: How to use cgroups within containers?
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- How to use cgroups within containers?
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCHv1 8/8] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 6/8] cgroup: restrict cgroup operations within task's cgroupns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 5/8] cgroup: introduce cgroup namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 4/8] cgroup: export cgroup_get() and cgroup_put()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 3/8] cgroup: add function to get task's cgroup on default hierarchy
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv1 1/8] kernfs: Add API to generate relative kernfs path
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCHv5] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCHv1 0/8] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCHv1 0/8] CGroup Namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv4] procfs: show hierarchy of pid namespace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCHv1 8/8] cgroup: mount cgroupns-root when inside non-init cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 7/8] cgroup: cgroup namespace setns support
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 6/8] cgroup: restrict cgroup operations within task's cgroupns
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 5/8] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 4/8] cgroup: export cgroup_get() and cgroup_put()
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 3/8] cgroup: add function to get task's cgroup on default hierarchy
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 2/8] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 1/8] kernfs: Add API to generate relative kernfs path
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCHv1 0/8] CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 12/13] namespaces: expose ns instance serial numbers in proc
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 11/13] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 10/13] audit: log on switching namespace (setns)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 08/13] sched: add a macro to ref all CLONE_NEW* flags
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 09/13] fork: audit on creation of new namespace(s)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 05/13] audit: initialize at subsystem time rather than device time
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 07/13] audit: dump namespace IDs for pid on receipt of AUDIT_NS_INFO
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 06/13] audit: log creation and deletion of namespace instances
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 03/13] namespaces: expose ns_entries
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 02/13] namespaces: expose namespace instance serial number in proc_ns_operations
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V5 01/13] namespaces: assign each namespace instance a serial number
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCHv4] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [lxc-users] [lxc-devel] Schedule for the Containers mini-summit at LPC 2014 (next week in Düsseldorf)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [lxc-users] [lxc-devel] Schedule for the Containers mini-summit at LPC 2014 (next week in Düsseldorf)
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [lxc-devel] Schedule for the Containers mini-summit at LPC 2014 (next week in Düsseldorf)
- From: "Michael H. Warfield" <mhw@xxxxxxxxxxxx>
- Schedule for the Containers mini-summit at LPC 2014 (next week in Düsseldorf)
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCHv4] procfs: show hierarchy of pid namespace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- RE: [PATCHv4] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCHv4] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv4] procfs: show hierarchy of pid namespace
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCHv4] procfs: show hierarchy of pid namespace
- From: Richard Weinberger <richard@xxxxxx>
- [PATCHv4] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH RFC] setns: return 0 directly if try to reassociate with current namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCHv2] sched: updated comments of CLONE_NEWNS
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH] sched: updated comments of CLONE_NEWNS
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH] sched: updated comments of CLONE_NEWNS
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH V5 08/13] sched: add a macro to ref all CLONE_NEW* flags
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V5 01/13] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH] sched: updated comments of CLONE_NEWNS
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH V5 08/13] sched: add a macro to ref all CLONE_NEW* flags
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH V5 01/13] namespaces: assign each namespace instance a serial number
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 12/13] namespaces: expose ns instance serial numbers in proc
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 11/13] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 10/13] audit: log on switching namespace (setns)
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 09/13] fork: audit on creation of new namespace(s)
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 08/13] sched: add a macro to ref all CLONE_NEW* flags
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 07/13] audit: dump namespace IDs for pid on receipt of AUDIT_NS_INFO
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 06/13] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 05/13] audit: initialize at subsystem time rather than device time
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 04/13] audit: log namespace serial numbers
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 03/13] namespaces: expose ns_entries
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 02/13] namespaces: expose namespace instance serial number in proc_ns_operations
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 01/13] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 00/13] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [RFC PATCH net-next v3 1/4] netns: add genl cmd to add and get peer netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v3 1/4] netns: add genl cmd to add and get peer netns ids
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH net-next v3 1/4] netns: add genl cmd to add and get peer netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v3 2/4] rtnl: add link netns id to interface messages
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v3 3/4] iptunnels: advertise link netns via netlink
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v3 4/4] rtnl: allow to create device with IFLA_LINK_NETNSID set
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v3 0/4] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: David Ahern <lxhacker68@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: David Ahern <lxhacker68@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: David Ahern <lxhacker68@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- RE: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- RE: [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCHv3 1/2] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- LXC 1.0.6 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCHv3 1/2] procfs: show hierarchy of pid namespace
- From: Mateusz Guzik <mguzik@xxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- [PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCHv3 1/2] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCHv3 0/2] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- RE: [RESEND][PATCHv2 1/2] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Cong Wang <cwang@xxxxxxxxxxxxxxxx>
- [RFC PATCH net-next v2 4/5] iptunnels: advertise link netns via netlink
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v2 2/5] netns: add genl cmd to get the id of a netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v2 3/5] rtnl: add link netns id to interface messages
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v2 1/5] netns: allocate netns ids
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v2 0/5] netns: allow to identify peer netns
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- [RFC PATCH net-next v2 5/5] rtnl: allow to create device with IFLA_LINK_NETNSID set
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [RESEND][PATCHv2 1/2] procfs: show hierarchy of pid namespace
- From: Mateusz Guzik <mguzik@xxxxxxxxxx>
- [RESEND][PATCHv3 2/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RESEND][PATCHv2 1/2] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RESEND][PATCH v2 0/2] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RESEND][PATCH 2/2] /proc/PID/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCHv2 1/2] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH v2 0/2] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC PATCH 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [RESEND][PATCH] userns: use marco instead of magic number for max userns level
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] userns: use marco instead of magic number for max userns level
- From: Aristeu Rozanski <aris@xxxxxxxxxx>
- Re: [RESEND][PATCH] userns: use marco instead of magic number for max userns level
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [RESEND][PATCH] userns: use marco instead of magic number for max userns level
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [RFC PATCH 2/3] procfs: show hierarchy of pid namespace
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] procfs: show hierarchy of pid namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] procfs: check uniq proc_dir_entry subdir name
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- RE: [RFC PATCH 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: "Chen, Hanxiao" <chenhanxiao@xxxxxxxxxxxxxx>
- [PATCH] userns: use marco instead of magic number for max userns level
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [RFC PATCH 2/3] procfs: show hierarchy of pid namespace
- From: Vasiliy Kulikov <segooon@xxxxxxxxx>
- [PATCH 3/3] /proc/pid/status: show all sets of pid according to ns
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] procfs: show hierarchy of pid namespace
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RFC PATCH 1/3] procfs: check uniq proc_dir_entry subdir name
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- [RFC PATCH 0/3] ns, procfs: pid conversion between ns and showing pidns hierarchy
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: For review: namespaces(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [Announce] Checkpoint-restore tool v1.3
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: For review: user_namespace(7) man page
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: For review: namespaces(7) man page
- From: Vitaly Rybnikov <frodox@xxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC]Pid conversion between pid namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Linux Plumbers 2014: talk proposals
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: For review: user_namespace(7) man page
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 0/8] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V4 0/8] namespaces: log namespaces per task
- From: Aristeu Rozanski <arozansk@xxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard@xxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH V4 8/8] audit: initialize at subsystem time rather than device time
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 7/8] audit: log creation and deletion of namespace instances
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 6/8] audit: log namespace serial numbers
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 5/8] namespaces: expose ns_entries
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 4/8] Documentation: add a section for /proc/<pid>/ns/
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 2/8] namespaces: expose namespace instance serial number in proc_ns_operations
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 3/8] namespaces: expose ns instance serial numbers in proc
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 1/8] namespaces: assign each namespace instance a serial number
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V4 0/8] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- For review: setns(2) man page [RESEND]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- For review: unshare(2) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- For review: setns(2) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- For review: pid_namespaces(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- For review: namespaces(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- For review: user_namespace(7) man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH V3 0/6] namespaces: log namespaces per task
- From: Nicolas Dichtel <nicolas.dichtel@xxxxxxxxx>
- Re: [PATCH V3 0/6] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH V3 0/6] namespaces: log namespaces per task
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V3 0/6] namespaces: log namespaces per task
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: Rafael Aquini <aquini@xxxxxxxxxx>
- [PATCH] fs: Remove implicit nodev for new mounts in non-root userns
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Kenton Varda <kenton@xxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH] namespaces: Use task_lock and not rcu to protect nsproxy
- From: Rafael David Tinoco <rafael.tinoco@xxxxxxxxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 2/4] proc: Implement /proc/thread-self to point at the directory of the current thread
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 2/4] proc: Implement /proc/thread-self to point at the directory of the current thread
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 2/4] proc: Implement /proc/thread-self to point at the directory of the current thread
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [GIT PULL] namespace updates for v3.17-rc1
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: Make Dynamic ELF binary loader settable.
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Make Dynamic ELF binary loader settable.
- From: Peter Dolding <oiaohm@xxxxxxxxx>
- [GIT PULL] namespace updates for v3.17-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/5] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: Bert Wesarg <bert.wesarg@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 0/4] /proc/thread-self
- From: Davidlohr Bueso <davidlohr@xxxxxx>
- [REVIEW][PATCH 4/4] proc: Point /proc/mounts at /proc/thread-self/mounts instead of /proc/self/mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 3/4] proc: Point /proc/net at /proc/thread-self/net instead of /proc/self/net
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 2/4] proc: Implement /proc/thread-self to point at the directory of the current thread
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 1/4] proc: Have net show up under /proc/<tgid>/task/<tid>
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 0/4] /proc/thread-self
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 1/5] mnt: Only change user settable mount flags in remount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 5/5] mnt: Add tests for unprivileged remount cases that have found to be faulty
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 1/5] mnt: Only change user settable mount flags in remount
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 2/5] mnt: Move the test for MNT_LOCK_READONLY from change_mount_flags into do_remount
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 3/5] mnt: Correct permission checks in do_remount
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 4/5] mnt: Change the default remount atime from relatime to the existing value
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [REVIEW][PATCH 5/5] mnt: Add tests for unprivileged remount cases that have found to be faulty
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 5/5] mnt: Add tests for unprivileged remount cases that have found to be faulty
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- [REVIEW][PATCH] NFS: Fix /proc/fs/nfsfs/servers and /proc/fs/nfsfs/volumes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/5] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [REVIEW][PATCH 5/5] mnt: Add tests for unprivileged remount cases that have found to be faulty
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 4/5] mnt: Change the default remount atime from relatime to the existing value
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 3/5] mnt: Correct permission checks in do_remount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 2/5] mnt: Move the test for MNT_LOCK_READONLY from change_mount_flags into do_remount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 1/5] mnt: Only change user settable mount flags in remount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][0/5] Fixing unprivileged mount -o remount,ro
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][0/5] Fixing unprivileged mount -o remount,ro
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH] namespaces: Use task_lock and not rcu to protect nsproxy
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Hu Tao <hutao@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] cgroup: export cgroup_get() and cgroup_put()
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 2/5] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 3/5] cgroup: add function to get task's cgroup on default hierarchy
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 1/5] kernfs: Add API to get generate relative kernfs path
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] RFC: CGroup Namespaces
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH 3/5] cgroup: add function to get task's cgroup on default hierarchy
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH 2/5] sched: new clone flag CLONE_NEWCGROUP for cgroup namespace
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH 1/5] kernfs: Add API to get generate relative kernfs path
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH 0/5] RFC: CGroup Namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH 5/5] cgroup: introduce cgroup namespaces
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- [PATCH 4/5] cgroup: export cgroup_get() and cgroup_put()
- From: Aditya Kali <adityakali@xxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: Could not mount sysfs when enable userns but disable netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- LXC 1.0.5 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- RE: Could not mount sysfs when enable userns but disable netns
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: Could not mount sysfs when enable userns but disable netns
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Could not mount sysfs when enable userns but disable netns
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Could not mount sysfs when enable userns but disable netns
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- RE: [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC]Pid conversion between pid namespace
- From: Yasunori Goto <y-goto@xxxxxxxxxxxxxx>
- [RFC]Pid conversion between pid namespace
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH v2] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ns: introduce getnspid syscall
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- RE: [PATCH] cgroup: fix a typo in Documentation/cgroups/cgroups.txt
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH v2] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: question about default values for per-namespace settings
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] cgroup: fix a typo in Documentation/cgroups/cgroups.txt
- From: Li Zefan <lizefan@xxxxxxxxxx>
- [PATCH] cgroup: fix a typo in Documentation/cgroups/cgroups.txt
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: question about default values for per-namespace settings
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [PATCH v2] ns: introduce getnspid syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCH v2] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] cgroup:cgroup_mount: Fix uninitialized warning
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH v2] ns: introduce getnspid syscall
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v2] ns: introduce getnspid syscall
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 11/12] block, bfq: boost the throughput on NCQ-capable flash-based devices
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH] ns: introduce getnspid syscall
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [PATCH] ns: introduce getnspid syscall
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] ns: introduce getnspid syscall
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- RE: [PATCH] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- [Announce] Checkpoint-restore tool v1.3-rc2
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- RE: [PATCH] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- RE: [PATCH] ns: introduce getnspid syscall
- From: "chenhanxiao@xxxxxxxxxxxxxx" <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH] ns: introduce getnspid syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ns: introduce getnspid syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] ns: introduce getnspid syscall
- From: Michael Kerrisk <mtk.manpages@xxxxxxxxx>
- Support for user namespaces for /proc/net/ip_tables_names
- From: Alin Dobre <alin.dobre@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [PATCH] ns: introduce getnspid syscall
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- [PATCH] ns: introduce getnspid syscall
- From: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 10/12] block, bfq: add Early Queue Merge (EQM)
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 11/12] block, bfq: boost the throughput on NCQ-capable flash-based devices
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [lxc-users] LXC 1.0.4 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [lxc-users] LXC 1.0.4 has been released!
- From: CDR <venefax@xxxxxxxxx>
- Re: LXC 1.0.4 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- LXC 1.0.3 has been released!
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Takashi Iwai <tiwai@xxxxxxx>
- libcontainer for linux
- From: James Bottomley <jbottomley@xxxxxxxxxxxxx>
- Re: User namespace over 9p
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: Protection against container fork bombs [WAS: Re: memcg with kmem limit doesn't recover after disk i/o causes limit to be hit]
- From: Marian Marinov <mm@xxxxxxxx>
- Re: User namespace over 9p
- From: Alin Dobre <alin.dobre@xxxxxxxxxxxxxxxx>
- Re: Protection against container fork bombs [WAS: Re: memcg with kmem limit doesn't recover after disk i/o causes limit to be hit]
- From: Alin Dobre <alin.dobre@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] net: Allow xt_owner in any user namespace
- From: Alin Dobre <alin.dobre@xxxxxxxxxxxxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Per-user namespace process accounting
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/3] ipc namespace: copy settings from parent namespace
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 11/12] block, bfq: boost the throughput on NCQ-capable flash-based devices
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 10/12] block, bfq: add Early Queue Merge (EQM)
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 10/12] block, bfq: add Early Queue Merge (EQM)
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- BFQ speed tests [was Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler]
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH RFC - TAKE TWO - 11/12] block, bfq: boost the throughput on NCQ-capable flash-based devices
- From: Paolo Valente <paolo.valente@xxxxxxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: Marian Marinov <mm@xxxxxx>
- Re: [PATCH RFC - TAKE TWO - 00/12] New version of the BFQ I/O Scheduler
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Per-user namespace process accounting
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] Per-user namespace process accounting
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: Pavel Emelyanov <xemul@xxxxxxxxxxxxx>
- Re: [RFC] Per-user namespace process accounting
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
- Re: [PATCH RFC - TAKE TWO - 11/12] block, bfq: boost the throughput on NCQ-capable flash-based devices
- From: Tejun Heo <tj@xxxxxxxxxx>
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]