July 2013 Archives by author
Starting: Mon Jul 1 06:06:18 UTC 2013
Ending: Wed Jul 31 22:09:16 UTC 2013
Messages: 167
- Interaction user namespace, /proc/1 ownership & cap_set
Daniel P. Berrange
- Interaction user namespace, /proc/1 ownership & cap_set
Daniel P. Berrange
- Interaction user namespace, /proc/1 ownership & cap_set
Daniel P. Berrange
- Interaction user namespace, /proc/1 ownership & cap_set
Daniel P. Berrange
- [OFFLIST] status of devcg
Daniel P. Berrange
- Interaction user namespace, /proc/1 ownership & cap_set
Daniel P. Berrange
- Interaction user namespace, /proc/1 ownership & cap_set
Eric W. Biederman
- Interaction user namespace, /proc/1 ownership & cap_set
Eric W. Biederman
- Interaction user namespace, /proc/1 ownership & cap_set
Eric W. Biederman
- Interaction user namespace, /proc/1 ownership & cap_set
Eric W. Biederman
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Eric W. Biederman
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Eric W. Biederman
- [RFC PATCH 2/2] capabilities: allow nice if we are privileged
Eric W. Biederman
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Eric W. Biederman
- [Pkg-shadow-devel] [PATCH 00/11] pkg-shadow support subordinate ids with user namespaces
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.2-rc2
Eric W. Biederman
- [PATCH 0/9] Add namespace support for syslog v2
Eric W. Biederman
- memcg creates an unkillable task in 3.11-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.11-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.11-rc2
Eric W. Biederman
- memcg creates an unkillable task in 3.11-rc2
Eric W. Biederman
- cgroup: status-quo and userland efforts
James Bottomley
- [PATCH review 05/16] xfs: Update xfs_ioctl_setattr to handle projids in any user namespace
Dave Chinner
- [PATCH review 05/16] xfs: Update xfs_ioctl_setattr to handle projids in any user namespace
Dave Chinner
- prima delle vacanze passa a Wind regalati un Top smartphone
U Decision
- Con Wind Unlimited servizi illimitati e fatture sicure!
U Decision
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Peter Dolding
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Peter Dolding
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Peter Dolding
- [Announce] Checkpoint-restore tool v0.6
Pavel Emelyanov
- cgroup: status-quo and userland efforts
Thomas Gleixner
- cgroup: status-quo and userland efforts
Thomas Gleixner
- [Workman-devel] cgroup: status-quo and userland efforts
Vivek Goyal
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Serge Hallyn
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Serge Hallyn
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Serge Hallyn
- [OFFLIST] status of devcg
Serge Hallyn
- [OFFLIST] status of devcg
Serge Hallyn
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Serge Hallyn
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Serge Hallyn
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Serge Hallyn
- [RFC PATCH 2/2] capabilities: allow nice if we are privileged
Serge Hallyn
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Serge Hallyn
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Serge Hallyn
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Serge Hallyn
- [Pkg-shadow-devel] [PATCH 00/11] pkg-shadow support subordinate ids with user namespaces
Serge Hallyn
- [OFFLIST] status of devcg
Serge E. Hallyn
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Serge E. Hallyn
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Serge E. Hallyn
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Serge E. Hallyn
- [GIT PULL] cgroup changes for v3.11-rc1
Tejun Heo
- [GIT PULL] cpuset changes for v3.11-rc1
Tejun Heo
- [PATCH v3 23/25] cgroup: Change how dentry's d_lock field is accessed
Tejun Heo
- [OFFLIST] status of devcg
Tejun Heo
- [PATCH 5/9] cgroup: update error handling in cgroup_populate_dir()
Tejun Heo
- [OFFLIST] status of devcg
Tejun Heo
- [OFFLIST] status of devcg
Tejun Heo
- [PATCH v2 5/9] cgroup: update error handling in cgroup_populate_dir()
Tejun Heo
- [PATCH 5.5/9] cgroup: use for_each_subsys() instead of for_each_root_subsys() in cgroup_populate/clear_dir()
Tejun Heo
- [PATCH v3 6/9] cgroup: make rebind_subsystems() handle file additions and removals with proper error handling
Tejun Heo
- [OFFLIST] status of devcg
Tejun Heo
- [PATCH cgroup/for-3.12] cgroup: replace task_cgroup_path_from_hierarchy() with task_cgroup_path()
Tejun Heo
- [PATCHSET] cgroup: fix and clean up cgroup file creations and removals
Tejun Heo
- [PATCH v4 6/9] cgroup: make rebind_subsystems() handle file additions and removals with proper error handling
Tejun Heo
- [PATCH cgroup/for-3.12] cgroup: replace task_cgroup_path_from_hierarchy() with task_cgroup_path()
Tejun Heo
- [PATCH cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Tejun Heo
- [PATCH v2 cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Tejun Heo
- [PATCH v2 cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Tejun Heo
- [GIT PULL] cgroup changes for 3.11-rc2
Tejun Heo
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Tejun Heo
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Tejun Heo
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Tejun Heo
- [RFC PATCH 1/2] devices cgroup: allow can_attach() if ns_capable
Tejun Heo
- memcg creates an unkillable task in 3.2-rc2
Tejun Heo
- memcg creates an unkillable task in 3.2-rc2
Tejun Heo
- cgroup: status-quo and userland efforts
Tim Hockin
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Michal Hocko
- [Workman-devel] cgroup: status-quo and userland efforts
Michal Hocko
- memcg creates an unkillable task in 3.2-rc2
Michal Hocko
- memcg creates an unkillable task in 3.2-rc2
Michal Hocko
- memcg creates an unkillable task in 3.2-rc2
Michal Hocko
- memcg creates an unkillable task in 3.11-rc2
Michal Hocko
- memcg creates an unkillable task in 3.11-rc2
Michal Hocko
- Invitation: Bank Manager. @ Tue 30 Jul 2013 10:00 - 11:00 (kaboremichel4 at gmail.com)
Michel Kabore
- cgroup: status-quo and userland efforts
Jiri Kosina
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Rob Landley
- [PATCH v3 23/25] cgroup: Change how dentry's d_lock field is accessed
Waiman Long
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Andy Lutomirski
- [REVIEW][PATCH] vfs: Lock in place mounts from more privileged users
Andy Lutomirski
- [PATCH 09/10] idr: Remove unneeded idr locking, idr_preload() usage
Kent Overstreet
- [Pkg-shadow-devel] [PATCH 00/11] pkg-shadow support subordinate ids with user namespaces
Christian PERRIER
- cgroup: status-quo and userland efforts
Borislav Petkov
- [PATCH 0/9] Add namespace support for syslog v2
Bruno Prémont
- [OFFLIST] status of devcg
Aristeu Rozanski
- Single process controlling all cgroups sounds like looking in right direction but wrong solution.
Konstantin Ryabitsev
- cgroup: status-quo and userland efforts
Kay Sievers
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Aaron Staley
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Aaron Staley
- Undelivered Mail Returned to Sender
Mail Delivery System
- Din Fil Verified By Visa : (FF-FR-TR-08-G1)
Service at Urgent.dk
- Interaction user namespace, /proc/1 ownership & cap_set
Richard Weinberger
- Interaction user namespace, /proc/1 ownership & cap_set
Richard Weinberger
- Interaction user namespace, /proc/1 ownership & cap_set
Richard Weinberger
- Interaction user namespace, /proc/1 ownership & cap_set
Richard Weinberger
- Interaction user namespace, /proc/1 ownership & cap_set
Richard Weinberger
- PROBLEM: Processes writing large files in memory-limited LXC container are killed by OOM
Johannes Weiner
- memcg creates an unkillable task in 3.2-rc2
Johannes Weiner
- memcg creates an unkillable task in 3.11-rc2
Johannes Weiner
- [PATCH 0/9] Add namespace support for syslog v2
Rui Xiang
- [PATCH 1/9] syslog_ns: add syslog_namespace and put/get_syslog_ns
Rui Xiang
- [PATCH 2/9] syslog_ns: add syslog_ns into user_namespace
Rui Xiang
- [PATCH 3/9] syslog_ns: add init syslog_ns for global syslog
Rui Xiang
- [PATCH 4/9] syslog_ns: make syslog handling per namespace
Rui Xiang
- [PATCH 5/9] syslog_ns: make permisiion check per user namespace
Rui Xiang
- [PATCH 6/9] syslog_ns: use init syslog_ns for console action
Rui Xiang
- [PATCH 7/9] syslog_ns: implement function for creating syslog ns
Rui Xiang
- [PATCH 8/9] syslog_ns: implement ns_printk for specific syslog_ns
Rui Xiang
- [PATCH 9/9] netfilter: use ns_printk in iptable context
Rui Xiang
- [PATCH 1/9] syslog_ns: add syslog_namespace and put/get_syslog_ns
Rui Xiang
- [PATCH 8/9] syslog_ns: implement ns_printk for specific syslog_ns
Rui Xiang
- [PATCH 9/9] netfilter: use ns_printk in iptable context
Rui Xiang
- [PATCH 0/9] Add namespace support for syslog v2
Rui Xiang
- [PATCH 7/9] syslog_ns: implement function for creating syslog ns
Rui Xiang
- [PATCH 1/9] cgroup: minor updates around cgroup_clear_directory()
Li Zefan
- [PATCH 2/9] cgroup: fix error path of cgroup_addrm_files()
Li Zefan
- [PATCH 3/9] cgroup: fix cgroup_add_cftypes() error handling
Li Zefan
- [PATCH 4/9] cgroup: separate out cgroup_base_files[] handling out of cgroup_populate/clear_dir()
Li Zefan
- [PATCH 5/9] cgroup: update error handling in cgroup_populate_dir()
Li Zefan
- [PATCH 6/9] cgroup: make rebind_subsystems() handle file additions and removals with proper error handling
Li Zefan
- [PATCH 7/9] cgroup: cosmetic follow-up cleanups
Li Zefan
- [PATCH 8/9] cgroup: move number_of_cgroups test out of rebind_subsystems() into cgroup_remount()
Li Zefan
- [PATCH v2 5/9] cgroup: update error handling in cgroup_populate_dir()
Li Zefan
- [PATCH 5.5/9] cgroup: use for_each_subsys() instead of for_each_root_subsys() in cgroup_populate/clear_dir()
Li Zefan
- [PATCH v3 6/9] cgroup: make rebind_subsystems() handle file additions and removals with proper error handling
Li Zefan
- [PATCH 5/9] cgroup: update error handling in cgroup_populate_dir()
Li Zefan
- [PATCH cgroup/for-3.12] cgroup: replace task_cgroup_path_from_hierarchy() with task_cgroup_path()
Li Zefan
- [PATCH cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Li Zefan
- [PATCH cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Li Zefan
- [PATCH v2 cgroup 1/2] cgroup: move module ref handling into rebind_subsystems()
Li Zefan
- [PATCH 2/2] cgroup: remove gratuituous BUG_ON()s from rebind_subsystems()
Li Zefan
- memcg creates an unkillable task in 3.2-rc2
Li Zefan
- I need the list member, thanks.
Zhang, Jiasheng
- [PATCH 0/9] Add namespace support for syslog v2
Gu Zheng
- [PATCH 1/9] syslog_ns: add syslog_namespace and put/get_syslog_ns
Gu Zheng
- [PATCH 2/9] syslog_ns: add syslog_ns into user_namespace
Gu Zheng
- [PATCH 4/9] syslog_ns: make syslog handling per namespace
Gu Zheng
- [PATCH 2/9] syslog_ns: add syslog_ns into user_namespace
Gu Zheng
- [PATCH 7/9] syslog_ns: implement function for creating syslog ns
Gu Zheng
- [PATCH 8/9] syslog_ns: implement ns_printk for specific syslog_ns
Gu Zheng
- [PATCH 1/9] syslog_ns: add syslog_namespace and put/get_syslog_ns
Gu Zheng
- [PATCH 7/9] syslog_ns: implement function for creating syslog ns
Gu Zheng
- Passa a Vodafone con Relax summer è Superconveniente
U decision
- GPS tracker with multi discret shared an album with you.
GPS tracker with multi discret
- Interaction user namespace, /proc/1 ownership & cap_set
Gao feng
- Interaction user namespace, /proc/1 ownership & cap_set
Gao feng
- [Part1 PATCH 00/22] Add namespace support for audit
Gao feng
- [PATCH review 05/16] xfs: Update xfs_ioctl_setattr to handle projids in any user namespace
Gao feng
- [PATCH 9/9] netfilter: use ns_printk in iptable context
Gao feng
- [PATCH 2/9] syslog_ns: add syslog_ns into user_namespace
Gao feng
- [PATCH 7/9] syslog_ns: implement function for creating syslog ns
Gao feng
- [PATCH review 05/16] xfs: Update xfs_ioctl_setattr to handle projids in any user namespace
Gao feng
- [PATCH review 05/16] xfs: Update xfs_ioctl_setattr to handle projids in any user namespace
Gao feng
Last message date:
Wed Jul 31 22:09:16 UTC 2013
Archived on: Wed Jul 31 22:09:34 UTC 2013
This archive was generated by
Pipermail 0.09 (Mailman edition).