Linux Containers
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
Re: [PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [PATCH 3/3] memcgroup: return negative error code in mem_cgroup_create()
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] memcgroup: fix and update documentation
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
[PATCH 1/3] memcgroup: fix and update documentation
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 3/3] memcgroup: return negative error code in mem_cgroup_create()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 2/3] memcgroup: fix typo in VM_BUG_ON()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 7/7] cgroup: remove dead code in cgroup_get_rootdir()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 4/7] cgroup: fix memory leak in cgroup_get_sb()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 3/7] cgroup: clean up cgroup.h
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 6/7] cgroup: remove duplicate code in find_css_set()
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 1/7] cgroup: fix and update documentation
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 5/7] cgroup: fix subsys bitops
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
[PATCH 2/7] cgroup: fix comments
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [5/5] lazy page_cgroup freeing
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [5/5] lazy page_cgroup freeing
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [5/5] lazy page_cgroup freeing
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [4/5] borrow resource
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [5/5] lazy page_cgroup freeing
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [4/5] borrow resource
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [RFC][PATCH 7/7] CGroup API: Update cpusets to use cgroup structured file API
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [RFC][PATCH 7/7] CGroup API: Update cpusets to use cgroup structured file API
From
: Paul Jackson <pj@xxxxxxx>
Re: [RFC][PATCH 7/7] CGroup API: Update cpusets to use cgroup structured file API
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [RFC][PATCH 7/7] CGroup API: Update cpusets to use cgroup structured file API
From
: Paul Jackson <pj@xxxxxxx>
Re: [RFC][PATCH 1/7] CGroup API: Add cgroup.api control file
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [RFC][PATCH 0/7] CGroup API: More structured API for CGroups control files
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [RFC][PATCH 1/7] CGroup API: Add cgroup.api control file
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [RFC][PATCH 0/7] CGroup API: More structured API for CGroups control files
From
: Li Zefan <lizf@xxxxxxxxxxxxxx>
Re: [PATCH 1/8] Scaling msgmni to the amount of lowmem
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC][PATCH 0/7] CGroup API: More structured API for CGroups control files
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC][PATCH 6/7] CGroup API: Use descriptions for memory controller API files
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 5/7] CGroup API: Use read_uint in memory controller
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 2/7] CGroup API: Add cgroup map data type
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 1/7] CGroup API: Add cgroup.api control file
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 0/7] CGroup API: More structured API for CGroups control files
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 4/7] CGroup API: Add res_counter_read_uint()
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 3/7] CGroup API: Use cgroup map for memcontrol stats file
From
: Paul Menage <menage@xxxxxxxxxx>
[RFC][PATCH 7/7] CGroup API: Update cpusets to use cgroup structured file API
From
: Paul Menage <menage@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: sukadev@xxxxxxxxxx
Network namespace status
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: sukadev@xxxxxxxxxx
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: sukadev@xxxxxxxxxx
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [3/5] throttling
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [3/5] throttling
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [1/5] high-low watermark
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [2/5] background reclaim.
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [1/5] high-low watermark
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: Network namespace and tc?
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [RFC] memory controller : backgorund reclaim and avoid excessive locking [2/5] background reclaim.
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [5/5] lazy page_cgroup freeing
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [3/5] throttling
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [4/5] borrow resource
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [1/5] high-low watermark
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [2/5] background reclaim.
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
[RFC] memory controller : backgorund reclaim and avoid excessive locking [0/5]
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Paul Jackson <pj@xxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Paul Jackson <pj@xxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH 8/8] Re-enable msgmni automatic recomputing msgmni if set to negative
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: sukadev@xxxxxxxxxx
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[PATCH 4/8] Recomputing msgmni on memory add / remove
From
: Nadia.Derbey@xxxxxxxx
Re: [PATCH 8/8] Re-enable msgmni automatic recomputing msgmni if set to negative
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[PATCH 7/8] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia.Derbey@xxxxxxxx
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 1/1] device control: fix trivial typo
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 6/8] Recomputing msgmni on ipc namespace creation/removal
From
: Nadia.Derbey@xxxxxxxx
[PATCH 8/8] Re-enable msgmni automatic recomputing msgmni if set to negative
From
: Nadia.Derbey@xxxxxxxx
[PATCH 0/8] Change default MSGMNI tunable to scale with lowmem (v3)
From
: Nadia.Derbey@xxxxxxxx
[PATCH 1/8] Scaling msgmni to the amount of lowmem
From
: Nadia.Derbey@xxxxxxxx
[PATCH 3/8] Defining the slab_memory_callback priority as a constant
From
: Nadia.Derbey@xxxxxxxx
[PATCH 2/8] Scaling msgmni to the number of ipc namespaces
From
: Nadia.Derbey@xxxxxxxx
[PATCH 5/8] Invoke the ipcns notifier chain as a work item
From
: Nadia.Derbey@xxxxxxxx
Re: [PATCH 0/4] Devices accessibility control group (v3, release candidate)
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] Filesystems visibility control group
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
FAQ Interactive, The Rise In Popularity Of Free Street Fights On Home Video
From
: "william rockt" <williamrockt@xxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] Filesystems visibility control group
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
RE: cgroup: limit network bandwidth
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: Peter Zijlstra <a.p.zijlstra@xxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: Peter Zijlstra <a.p.zijlstra@xxxxxxxxx>
Re: [PATCH] Filesystems visibility control group
From
: Paul Jackson <pj@xxxxxxx>
Re: [patch 0/3] clone64() and unshare64()
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] Filesystems visibility control group
From
: Dave Hansen <haveblue@xxxxxxxxxx>
[PATCH][DOCUMENTATION] Minimal controller code for a quick start
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH] Filesystems visibility control group
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 3/4] The block devices layer changes
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 2/4] The character devices layer changes
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 1/4] Some changes in the kobject mapper
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 0/4] Devices accessibility control group (v3, release candidate)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[patch 2/3] add do_unshare()
From
: Cedric Le Goater <clg@xxxxxxxxxx>
[patch 1/3] change clone_flags type to u64
From
: Cedric Le Goater <clg@xxxxxxxxxx>
[patch 3/3] add the clone64() and unshare64() syscalls
From
: Cedric Le Goater <clg@xxxxxxxxxx>
[patch 0/3] clone64() and unshare64()
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/17] Finish IPv4 infrastructure namespacing
From
: "Denis V. Lunev" <den@xxxxx>
Re: [PATCH 0/17] Finish IPv4 infrastructure namespacing
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH 13/17] [NETNS]: Register /proc/net/rt_cache for each namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 7/17] [NETNS]: Disable multicaststing configuration inside namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 16/17] [NETNS]: Enable IPv4 address manipulations inside namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 15/17] [NETNS]: Enable all routing manipulation via netlink inside namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 11/17] [IPV4]: rt_cache_get_next should take rt_genid into account.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 17/17] [NETNS]: Process inet_select_addr inside a namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 12/17] [NETNS]: Process /proc/net/rt_cache inside a namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 14/17] [NETNS]: Process devinet ioctl in the correct namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 6/17] [NETNS]: Default arp parameters lookup.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 10/17] [NETNS]: Process ip_rt_redirect in the correct namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2/17] [IPV4]: Remove check for ifa->ifa_dev != NULL.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 4/17] [NETNS]: Disable address notifiers in namespaces other than initial.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 9/17] [NETNS]: DST cleanup routines should be called inside namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 5/17] [NETNS]: Register neighbour parameters of the net device in the correct namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 8/17] [NETNS]: Enable inetdev_event notifier.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 3/17] [IPV4]: Consolidate masq_inet_event and masq_device_event.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 1/17] [IPV4]: Remove ifa != NULL check.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 0/17] Finish IPv4 infrastructure namespacing
From
: "Denis V. Lunev" <den@xxxxx>
Re: [Devel] [RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[RFC][PATCH 4/4]: Enable cloning PTY namespaces
From
: sukadev@xxxxxxxxxx
[RFC][PATCH 3/4]: Enable multiple mounts of /dev/pts
From
: sukadev@xxxxxxxxxx
[RFC][PATCH 2/4]: Use interface to access allocated_ptys
From
: sukadev@xxxxxxxxxx
[RFC][PATCH 1/4]: Factor out PTY index allocation
From
: sukadev@xxxxxxxxxx
[RFC][PATCH 0/4] Devpts namespace
From
: sukadev@xxxxxxxxxx
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [RFC][PATCH v2 7/7] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [RFC][PATCH v2 7/7] Do not recompute msgmni anymore if explicitely set by user
From
: Yasunori Goto <y-goto@xxxxxxxxxxxxxx>
[PATCH 2/2] dm-ioband v0.0.3: The I/O bandwidth controller: Document
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
[PATCH 1/2] dm-ioband v0.0.3: The I/O bandwidth controller: Source code patch
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
[PATCH 0/2] dm-ioband v0.0.3: The I/O bandwidth controller: Introduction
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] extend clone_flags using parent_tidptr argument
From
: Cedric Le Goater <legoater@xxxxxxx>
Re: [PATCH 0/4] user namespaces: introduction
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2/2] extend clone_flags using parent_tidptr argument
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] extend clone_flags using parent_tidptr argument
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 00/15] IPC: code rewrite + new functionalities
From
: Pavel Machek <pavel@xxxxxx>
[PATCH 1/2] change clone_flags type to u64
From
: Cedric Le Goater <legoater@xxxxxxx>
[PATCH 2/2] extend clone_flags using parent_tidptr argument
From
: Cedric Le Goater <legoater@xxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 00/15] IPC: code rewrite + new functionalities
From
: Benjamin Thery <benjamin.thery@xxxxxxxx>
Re: [Devel] Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [Devel] Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [Devel] Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 00/15] IPC: code rewrite + new functionalities
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Kirill Korotaev <dev@xxxxx>
Re: [PATCH 2.6.24-rc8-mm1 00/15] IPC: code rewrite + new functionalities
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH] fix spurious EBUSY on memory cgroup removal
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 14/15] (RFC) IPC/semaphores: prepare semundo code to work on another task than current
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Srivatsa Vaddagiri <vatsa@xxxxxxxxxxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Peter Zijlstra <a.p.zijlstra@xxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
[PATCH] fix spurious EBUSY on memory cgroup removal
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [RFC] Default child of a cgroup
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/6] preparations to enable netdevice notifiers inside a namespace (resend)
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Vivek Goyal <vivek.goyal2008@xxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Peter Zijlstra <a.p.zijlstra@xxxxxxxxx>
Re: [RFC] Default child of a cgroup
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 14/15] (RFC) IPC/semaphores: prepare semundo code to work on another task than current
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/6] preparations to enable netdevice notifiers inside a namespace (resend)
From
: Daniel Lezcano <daniel.lezcano@xxxxxxx>
Re: [RFC] Default child of a cgroup
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/6] preparations to enable netdevice notifiers inside a namespace (resend)
From
: "Benjamin Thery" <ben.thery@xxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Cedric Le Goater <clg@xxxxxxxxxx>
OLS Mini-Summit Proposal for Containers
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/6] preparations to enable netdevice notifiers inside a namespace (resend)
From
: Daniel Lezcano <daniel.lezcano@xxxxxxx>
[RFC][PATCH v2 6/7] Recomputing msgmni on ipc namespace creation/removal
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 7/7] Do not recompute msgmni anymore if explicitely set by user
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 4/7] Recomputing msgmni on memory add / remove
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 3/7] Defining the slab_memory_callback priority as a constant
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 5/7] Invoke the ipcns notifier chain as a work item
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 1/7] Scaling msgmni to the amount of lowmem
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 2/7] Scaling msgmni to the number of ipc namespaces
From
: Nadia.Derbey@xxxxxxxx
[RFC][PATCH v2 0/7] Scaling msgmni to the amount of lowmem
From
: Nadia.Derbey@xxxxxxxx
[PATCH 0/6] preparations to enable netdevice notifiers inside a namespace (resend)
From
: "Denis V. Lunev" <den@xxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Kirill Korotaev <dev@xxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 05/15] IPC/semaphores: remove one unused parameter from semctl_down()
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 05/15] IPC/semaphores: remove one unused parameter from semctl_down()
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Kirill Korotaev <dev@xxxxx>
Re: [PATCH 2.6.24-rc8-mm1 12/15] (RFC) IPC/semaphores: make use of RCU to free the sem_undo_list
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 14/15] (RFC) IPC/semaphores: prepare semundo code to work on another task than current
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 05/15] IPC/semaphores: remove one unused parameter from semctl_down()
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
[RFC] Default child of a cgroup
From
: Srivatsa Vaddagiri <vatsa@xxxxxxxxxxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 12/15] (RFC) IPC/semaphores: make use of RCU to free the sem_undo_list
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 14/15] (RFC) IPC/semaphores: prepare semundo code to work on another task than current
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Pierre Peiffer <pierre.peiffer@xxxxxxxx>
Re: [Devel] OLS paper topics
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Kir Kolyshkin <kir@xxxxxxxxxx>
Re: [Xen-devel] dm-band: The I/O bandwidth controller: Performance Report
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [PATCH] reject '\n' in a cgroup name
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: Alexey Dobriyan <adobriyan@xxxxxxxxx>
Re: [Devel] LTP result output for container-init ( failure with 2.6.24 kernel )
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 2.6.24-rc8-mm1 14/15] (RFC) IPC/semaphores: prepare semundo code to work on another task than current
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 15/15] (RFC) IPC/semaphores: add write() operation to semundo file in procfs
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 13/15] (RFC) IPC/semaphores: per <pid> semundo file in procfs
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 09/15] (RFC) IPC: new kernel API to change an ID
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 11/15] (RFC) IPC: new IPC_SETALL command to modify all settings
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 12/15] (RFC) IPC/semaphores: make use of RCU to free the sem_undo_list
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 08/15] IPC: consolidate all xxxctl_down() functions
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 07/15] IPC: introduce ipc_update_perm()
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 06/15] IPC: get rid of the use *_setbuf structure.
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 02/15] IPC/shared memory: introduce shmctl_down
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 05/15] IPC/semaphores: remove one unused parameter from semctl_down()
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 10/15] (RFC) IPC: new IPC_SETID command to modify an ID
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 03/15] IPC/message queues: introduce msgctl_down
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 04/15] IPC/semaphores: move the rwmutex handling inside semctl_down
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 01/15] IPC/semaphores: code factorisation
From
: pierre.peiffer@xxxxxxxx
[PATCH 2.6.24-rc8-mm1 00/15] IPC: code rewrite + new functionalities
From
: pierre.peiffer@xxxxxxxx
Re: [Devel] LTP result output for container-init ( failure with 2.6.24 kernel )
From
: Rishikesh K Rajak <risrajak@xxxxxxxxxx>
Re: [Xen-devel] dm-band: The I/O bandwidth controller: Performance Report
From
: INAKOSHI Hiroya <inakoshi.hiroya@xxxxxxxxxxxxxx>
Re: [PATCH 0/4] user namespaces: introduction
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/4] user namespaces: introduction
From
: "Daniel Hokka Zakrisson" <daniel@xxxxxxxxx>
[PATCH 4/4] user namespaces: handle user namespaces in file sigio
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 3/4] user namespaces: enforce CAP_NS_OVERRIDE for cross-namespace kill
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 2/4] containers: add CAP_NS_OVERRIDE capability
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 1/4] user namespaces: add ns to user_struct
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 0/4] user namespaces: introduction
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] LTP result output for container-init
From
: Rishikesh K Rajak <risrajak@xxxxxxxxxx>
Re: [PATCH] reject '\n' in a cgroup name
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH 1/2] dm-band: The I/O bandwidth controller: Source code patch
From
: Frans Pop <elendil@xxxxxxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: Stephen Hemminger <shemminger@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: "Denis V. Lunev" <den@xxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: "Denis V. Lunev" <den@xxxxx>
Re: [PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: Daniel Lezcano <dlezcano@xxxxxxxxxx>
[PATCH 6/7 net-2.6.25] [NETNS]: Add a namespace mark to fib_info.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 3/7 net-2.6.25] [IPV4]: Prohibit assignment of 0.0.0.0 as interface address.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 4/7 net-2.6.25] [NETNS]: Process interface address manipulation routines in the namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 1/7 net-2.6.25] [IPV4]: Fix memory leak on error path during FIB initialization.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 5/7 net-2.6.25] [IPV4]: fib_sync_down rework.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 7/7 net-2.6.25] [NETNS]: Lookup in FIB semantic hashes taking into account the namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2/7 net-2.6.25] [IPV4]: Small style cleanup of the error path in rtm_to_ifaddr.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
dm-band: The I/O bandwidth controller: Performance Report
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [dm-devel] [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [Devel] OLS paper topics
From
: Kir Kolyshkin <kir@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] OLS paper topics
From
: Kir Kolyshkin <kir@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Pavel Machek <pavel@xxxxxx>
Re: [Devel] LTP result output for container-init
From
: Rishikesh K Rajak <risrajak@xxxxxxxxxx>
Re: [Devel] LTP result output for container-init
From
: Rishikesh K Rajak <risrajak@xxxxxxxxxx>
Re: [Devel] LTP result output for container-init
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 2/2] dm-band: The I/O bandwidth controller: Document
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [dm-devel] [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Hirokazu Takahashi <taka@xxxxxxxxxxxxx>
Re: [Devel] LTP result output for container-init
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Hirokazu Takahashi <taka@xxxxxxxxxxxxx>
[PATCH] reject '\n' in a cgroup name
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [dm-devel] [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: yamamoto@xxxxxxxxxxxxx (YAMAMOTO Takashi)
Re: [PATCH 2/2] dm-band: The I/O bandwidth controller: Document
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
OLS paper topics
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Anthony Liguori <anthony@xxxxxxxxxxxxx>
Re: [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [dm-devel] [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Hirokazu Takahashi <taka@xxxxxxxxxxxxx>
Re: [PATCH 1/2] dm-band: The I/O bandwidth controller: Source code patch
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [dm-devel] [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Alasdair G Kergon <agk@xxxxxxxxxx>
Re: [PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Peter Zijlstra <a.p.zijlstra@xxxxxxxxx>
Re: [PATCH 1/2] dm-band: The I/O bandwidth controller: Source code patch
From
: Frans Pop <elendil@xxxxxxxxx>
[PATCH 2/2] dm-band: The I/O bandwidth controller: Document
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
[PATCH 1/2] dm-band: The I/O bandwidth controller: Source code patch
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
[PATCH 0/2] dm-band: The I/O bandwidth controller: Overview
From
: Ryo Tsuruta <ryov@xxxxxxxxxxxxx>
Re: [PATCH 12/12 net-2.6.25] [NETNS]: Add namespace for ICMP replying code.
From
: YOSHIFUJI Hideaki / 吉藤英明 <yoshfuji@xxxxxxxxxxxxxx>
Re: [PATCH 12/12 net-2.6.25] [NETNS]: Add namespace for ICMP replying code.
From
: Mathieu Lacage <mathieu.lacage@xxxxxxxxxxxxxxx>
Re: [PATCH 11/12 net-2.6.25] [NETNS]: Routing cache virtualization.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 12/12 net-2.6.25] [NETNS]: Add namespace for ICMP replying code.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 10/12 net-2.6.25] [NETNS]: Correct namespace for connect-time routing.
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH 12/12 net-2.6.25] [NETNS]: Add namespace for ICMP replying code.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 10/12 net-2.6.25] [NETNS]: Correct namespace for connect-time routing.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 11/12 net-2.6.25] [NETNS]: Routing cache virtualization.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [PATCH 0/12 net-2.6.25] [NETNS]: Routing namespacing on IP output path.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 5/12 net-2.6.25] [NETNS]: Re-export init_net via EXPORT_SYMBOL.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 5/12 net-2.6.25] [NETNS]: Re-export init_net via EXPORT_SYMBOL.
From
: "Denis V. Lunev" <dlunev@xxxxxxxxx>
Re: [PATCH 5/12 net-2.6.25] [NETNS]: Re-export init_net via EXPORT_SYMBOL.
From
: Patrick McHardy <kaber@xxxxxxxxx>
[PATCH 9/12 net-2.6.25] [NETNS]: Add namespace parameter to ip_route_output_key.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 3/12 net-2.6.25] [NETNS]: Add netns parameter to fib_select_default.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 8/12 net-2.6.25] [NETNS]: Add namespace parameter to ip_route_output_flow.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 1/12 net-2.6.25] [IPV4]: Declarations cleanup in ip_fib.h.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 4/12 net-2.6.25] [NETNS]: Add namespace parameter to ip_dev_find.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2/12 net-2.6.25] [IPV4]: Consolidate fib_select_default.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 7/12 net-2.6.25] [NETNS]: Add namespace parameter to __ip_route_output_key.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 6/12 net-2.6.25] [NETNS]: Add namespace parameter to ip_route_output_slow.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 5/12 net-2.6.25] [NETNS]: Re-export init_net via EXPORT_SYMBOL.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 0/12 net-2.6.25] [NETNS]: Routing namespacing on IP output path.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [PATCH 0/6 net-2.6.25] Provide correct namespace on IPv4 packet input path.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 08/10] unprivileged mounts: make fuse safe
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 09/10] unprivileged mounts: propagation: inherit owner from parent
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH 6/6 net-2.6.25] [NETNS] Pass correct namespace in ip_rt_get_source.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2/6 net-2.6.25] [NETNS] Add netns parameter to inetdev_by_index.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 1/6 net-2.6.25] [NETNS] Add netns parameter to fib_lookup.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 4/6 net-2.6.25] [NETNS] Pass correct namespace in context fib_check_nh.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 5/6 net-2.6.25] [NETNS] Pass correct namespace in ip_route_input_slow.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 3/6 net-2.6.25] [NETNS] Pass correct namespace in fib_validate_source.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 0/6 net-2.6.25] Provide correct namespace on IPv4 packet input path.
From
: "Denis V. Lunev" <den@xxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: A consideration on memory controller.
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: A consideration on memory controller.
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: A consideration on memory controller.
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: A consideration on memory controller.
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
A consideration on memory controller.
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [PATCH 0/3 net-2.6.25] call FIB rule->action in the correct namespace
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [patch] util-linux-ng: unprivileged mounts support
From
: Szabolcs Szakacsits <szaka@xxxxxxxxxxx>
Re: [patch] util-linux-ng: unprivileged mounts support
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch] util-linux-ng: unprivileged mounts support
From
: Szabolcs Szakacsits <szaka@xxxxxxxxxxx>
Re: [PATCH 0/4 net-2.6.25] Proper netlink kernel sockets disposal.
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH] [NETNS 4/4 net-2.6.25] Namespace stop vs 'ip r l' race.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH ] [NETNS 3/4 net-2.6.25] Consolidate kernel netlink socket destruction.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH] [NETNS 2/4 net-2.6.25] Memory leak on network namespace stop.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH] [NETNS 1/4 net-2.6.25] Double free in netlink_release.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 0/4 net-2.6.25] Proper netlink kernel sockets disposal.
From
: "Denis V. Lunev" <den@xxxxx>
Re: Extending syscalls
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Extending syscalls (was: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API)
From
: corbet@xxxxxxx (Jonathan Corbet)
[PATCH 1/3 net-2.6.25] Add netns to fib_rules_ops.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2/3 net-2.6.25] [NETNS] FIB rules API cleanup.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 3/3 net-2.6.25] Process FIB rule action in the context of the namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 0/3 net-2.6.25] call FIB rule->action in the correct namespace
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
LTP Result on 2.6.24-rc6, some highlights on container result
From
: Rishikesh K Rajak <risrajak@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: sukadev@xxxxxxxxxx
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [patch] util-linux-ng: unprivileged mounts support
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: LTP result output for container-init
From
: sukadev@xxxxxxxxxx
Re: LTP result output for container-init
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
Re: LTP result output for container-init
From
: "Rishikesh K. Rajak" <risrajak@xxxxxxxxxxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Kir Kolyshkin <kir@xxxxxxxxxx>
Re: LTP result output for container-init
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
LTP result output for container-init
From
: "Rishikesh K. Rajak" <risrajak@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: corbet@xxxxxxx (Jonathan Corbet)
Re: OLS2008 "namespaces status update" report
From
: "Denis V. Lunev" <den@xxxxx>
[PATCH 2/2] Propagate the long_clone_arg up to the create_new_namespaces
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 1/2] Extend sys_clone and sys_unshare system calls API
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[patch] util-linux-ng: unprivileged mounts support
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 04/10] unprivileged mounts: account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 05/10] unprivileged mounts: allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 09/10] unprivileged mounts: propagation: inherit owner from parent
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 03/10] unprivileged mounts: propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 01/10] unprivileged mounts: add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 00/10] mount ownership and unprivileged mount syscall (v7)
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 10/10] unprivileged mounts: add "no submounts" flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 08/10] unprivileged mounts: make fuse safe
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 06/10] unprivileged mounts: allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 02/10] unprivileged mounts: allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: OLS2008 "namespaces status update" report
From
: Balbir Singh <balbir@xxxxxxxxxxxxxxxxxx>
OLS2008 "namespaces status update" report
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Daniel Hokka Zakrisson" <daniel@xxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Daniel Hokka Zakrisson" <daniel@xxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [RFC PATCH 0/4] [RESEND] Change default MSGMNI tunable to scale with lowmem
From
: Nadia Derbey <Nadia.Derbey@xxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2/4] The character devices layer changes
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: "Daniel Hokka Zakrisson" <daniel@xxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH] An attempt to have an unlimitedly extendable sys_clone
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: "A. C. Censi" <accensi@xxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 4/9] unprivileged mounts: propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 2/4] The character devices layer changes
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [patch 9/9] unprivileged mounts: add "no submounts" flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 6/9] unprivileged mounts: allow unprivileged mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 4/9] unprivileged mounts: propagate error values from clone_mnt
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [PATCH 4/4] The control group itself
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: [patch 3/9] unprivileged mounts: account user mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 2/9] unprivileged mounts: allow unprivileged umount
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/9] unprivileged mounts: add user mounts to the kernel
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: "Paul Menage" <menage@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: sukadev@xxxxxxxxxx
Re: [PATCH 4/4] The control group itself
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 2/4] The character devices layer changes
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: Namespaces exhausted CLONE_XXX bits problem
From
: Cedric Le Goater <clg@xxxxxxxxxx>
Namespaces exhausted CLONE_XXX bits problem
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 0/4] Devices accessibility control group (v2)
From
: sukadev@xxxxxxxxxx
Re: [PATCH 2.6.25] [NEIGH] Make /proc/net/arp opening consistent with seq_net_open semantics
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 2.6.25] [ATM] Simplify /proc/net/atm/arp opening
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 2.6.25] [ATM] Oops reading net/atm/arp
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH netns-2.6.25 0/19] routing virtualization v2
From
: David Miller <davem@xxxxxxxxxxxxx>
[PATCH 2.6.25] [NEIGH] Make /proc/net/arp opening consistent with seq_net_open semantics
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2.6.25] [ATM] Simplify /proc/net/atm/arp opening
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH 2.6.25] [ATM] Oops reading net/atm/arp
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[PATCH net-2.6.25 15/19] [NETNS] Provide correct namespace for fibnl netlink socket.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 14/19] [NETNS] Place fib tables into netns.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 12/19] [NETNS] Show routing information from correct namespace (fib_trie.c)
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 10/19] [NETNS] Add netns to nl_info structure.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 5/19] [IPV4] Check fib4_rules_init failure.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 11/19] [NETNS] Show routing information from correct namespace (fib_hash.c)
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 13/19] [NETNS] Namespacing IPv4 fib rules.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 1/19] [NETNS] Add netns parameter to fib_rules_(un)register.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 9/19] [NETNS] Add netns parameter to inet_(dev_)add_type.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 2/19] [NETNS] Pass fib_rules_ops into default_pref method.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 19/19] [NETNS] Enable routing configuration in non-initial namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 18/19] [NETNS] Replace init_net with the correct context in fib_frontend.c
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 6/19] [NETNS] Refactor fib initialization so it can handle multiple namespaces.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 3/19] [NETNS] Namespacing in the generic fib rules code.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 8/19] [NETNS] Add netns parameter to fib_get_table/fib_new_table.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 16/19] [NETNS] Correctly fill fib_config data.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 7/19] [IPV4] Unify access to the routing tables.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 4/19] [NETNS] Add namespace to API for routing /proc entries creation.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 17/19] [NETNS] Pass namespace through ip_rt_ioctl.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH netns-2.6.25 0/19] routing virtualization v2
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
Re: [patch 6/9] unprivileged mounts: allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 6/9] unprivileged mounts: allow unprivileged mounts
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Nigel Cunningham <nigel@xxxxxxxxxxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Szabolcs Szakacsits <szaka@xxxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Nigel Cunningham <nigel@xxxxxxxxxxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 1/9] unprivileged mounts: add user mounts to the kernel
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 1/9] unprivileged mounts: add user mounts to the kernel
From
: Pavel Machek <pavel@xxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Szabolcs Szakacsits <szaka@xxxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 3/9] unprivileged mounts: account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 1/4] Some changes in the kobject mapper
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 1/4] Some changes in the kobject mapper
From
: Daniel Hokka Zakrisson <daniel@xxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [patch 3/9] unprivileged mounts: account user mounts
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: [patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Dave Hansen <haveblue@xxxxxxxxxx>
Re: util-linux-ng: unprivileged mounts support
From
: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx>
Re: util-linux-ng: unprivileged mounts support
From
: Mike Frysinger <vapier@xxxxxxxxxx>
[patch 8/9] unprivileged mounts: propagation: inherit owner from parent
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 4/9] unprivileged mounts: propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
util-linux-ng: unprivileged mounts support
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 2/9] unprivileged mounts: allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 9/9] unprivileged mounts: add "no submounts" flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 6/9] unprivileged mounts: allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 0/9] mount ownership and unprivileged mount syscall (v6)
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 3/9] unprivileged mounts: account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 7/9] unprivileged mounts: allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 1/9] unprivileged mounts: add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 5/9] unprivileged mounts: allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[PATCH 4/4] The control group itself
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 3/4] The block devices layer changes
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 2/4] The character devices layer changes
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 1/4] Some changes in the kobject mapper
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
[PATCH 0/4] Devices accessibility control group (v2)
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Work hard, play harder.
From
: "Joaquin Cooper" <dwsavognom@xxxxxxxxxx>
Re: [RFC] [PATCH -mm] oom_kill: remove uid==0 checks
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 0/10] sysfs network namespace support
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [linux-pm] [PATCH][RFC] freezer : add the TIF_FREEZE flag to all archs
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH 0/10] sysfs network namespace support
From
: Greg KH <greg@xxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [RFC] [PATCH -mm] oom_kill: remove uid==0 checks
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 1/19] [NETNS] Add netns parameter to fib_rules_(un)register.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
[PATCH net-2.6.25 16/19] [NETNS] Correctly fill fib_config data.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 14/19] [NETNS] Place fib tables into netns.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 3/19] [NETNS] Namespacing in the generic fib rules code.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 10/19] [NETNS] Add netns to nl_info structure.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 4/19] [NETNS] Add namespace to API for routing /proc entries creation.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 18/19] [NETNS] Replace init_net with the correct context in fib_frontend.c
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 19/19] [NETNS] Enable routing configuration in non-initial namespace.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 12/19] [NETNS] Show routing information from correct namespace (fib_trie.c)
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 5/19] [IPV4] Check fib4_rules_init failure.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 13/19] [NETNS] Namespacing IPv4 fib rules.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 6/19] [NETNS] Refactor fib initialization so it can handle multiple namespaces.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 9/19] [NETNS] Add netns parameter to inet_(dev_)add_type.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 1/19] [NETNS] Add netns parameter to fib_rules_(un)register.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 11/19] [NETNS] Show routing information from correct namespace (fib_hash.c)
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 2/19] [NETNS] Pass fib_rules_ops into default_pref method.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 8/19] [NETNS] Add netns parameter to fib_get_table/fib_new_table.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 7/19] [IPV4] Unify access to the routing tables.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 17/19] [NETNS] Pass namespace through ip_rt_ioctl.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH net-2.6.25 15/19] [NETNS] Provide correct namespace for fibnl netlink socket.
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
[PATCH netns-2.6.25 0/19] routing virtualization
From
: "Denis V. Lunev" <den@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Pavel Emelyanov <xemul@xxxxxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH 9/9] signal: Ignore signals sent to the pid namespace init
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: serge@xxxxxxxxxx
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Oren Laadan <orenl@xxxxxxxxxxxxxxx>
Re: [PATCH 0/9] Core pid namespace enhancements
From
: sukadev@xxxxxxxxxx
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Ingo Molnar <mingo@xxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: [PATCH net-2.6.25 7/7] Switch users of ipv4_devconf(_all) to use the pernet one
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 6/7] Switch users of ipv4_devconf_dflt to use the pernet one
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 5/7] Move the devinet pointers on the struct net
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 4/7] Store the net pointer on devinet's ctl tables
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 3/7] Pass the net pointer to the arp_req_set_proxy()
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 2/7] Make __devinet_sysctl_register return an error
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH net-2.6.25 1/7] Add the netns_ipv4 struct
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dmitry Adamushko <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Ingo Molnar <mingo@xxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: [PATCH 3/9] pid: Implement ns_of_pid.
From
: sukadev@xxxxxxxxxx
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Steven Rostedt <rostedt@xxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: kamezawa.hiroyu@xxxxxxxxxxxxxx
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: kamezawa.hiroyu@xxxxxxxxxxxxxx
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: "Dmitry Adamushko" <dmitry.adamushko@xxxxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Dhaval Giani <dhaval@xxxxxxxxxxxxxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Ingo Molnar <mingo@xxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: Ingo Molnar <mingo@xxxxxxx>
Re: Hang with fair cgroup scheduler (reproducer is attached.)
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Hang with fair cgroup scheduler (reproducer is attached.)
From
: KAMEZAWA Hiroyuki <kamezawa.hiroyu@xxxxxxxxxxxxxx>
Re: [PATCH] Mark timer_stats as incompatible with multiple pid namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] Mark timer_stats as incompatible with multiple pid namespaces
From
: Ingo Molnar <mingo@xxxxxxx>
Re: [PATCH] Mark timer_stats as incompatible with multiple pid namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] Mark timer_stats as incompatible with multiple pid namespaces
From
: Ingo Molnar <mingo@xxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 9/9] signal: Ignore signals sent to the pid namespace init
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 9/9] signal: Ignore signals sent to the pid namespace init
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH 8/9] signal: Drop signals before sending them to init.
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 2.6.25] [IPV4] Thresholds in fib_trie.c are used as consts, so make them const.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH 2.6.25] [IPV6] Always pass a valid nl_info to inet6_rt_notify.
From
: David Miller <davem@xxxxxxxxxxxxx>
Re: [PATCH] Mark timer_stats as incompatible with multiple pid namespaces
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 4/9] pid: Generalize task_active_pid_ns
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [RFC][PATCH] Pid namespaces vs locks interaction
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 9/9] signal: Ignore signals sent to the pid namespace init
From
: Oleg Nesterov <oleg@xxxxxxxxxx>
Re: [PATCH 4/9] pid: Generalize task_active_pid_ns
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
[Index of Archives]
[Kernel]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]