Re: [RFC PATCH 2/3] procfs: show hierarchy of pid namespace

2014-09-03 Thread Vasiliy Kulikov
Hi, On Wed, Sep 03, 2014 at 18:29 +0800, Chen Hanxiao wrote: > This patch will show the hierarchy of pid namespace > under /proc/pidns like: > /proc/pidns > ├── hierarchy > │ ├── pidns4026532399 > │ │ ├── pidns -> /proc/2863/ns/pid > │ │ └── pidns4026532515 > │ │ └── pidns -> /pr

Re: Documenting execve() and EAGAIN

2014-05-26 Thread Vasiliy Kulikov
Hi Michael, On Wed, May 21, 2014 at 20:12 +0200, Michael Kerrisk (man-pages) wrote: > Vasily (and Motohiro), > > Sometime ago, Motohiro raised a documentation bug > ( https://bugzilla.kernel.org/show_bug.cgi?id=42704 ) which > relates to your commit 72fa59970f8698023045ab0713d66f3f4f96945c > ("m

Re: proc hidepid=2 and SGID programs

2013-09-19 Thread Vasiliy Kulikov
On Sun, Sep 15, 2013 at 01:58 -0700, Christian Kujau wrote: > Vasiliy Kulikov wrote: > >> But still, I wonder if this is > >> intended behaviour. > > > >Yes. > > > >If you think such side channel attacks are something you don't care, >

Re: proc hidepid=2 and SGID programs

2013-09-14 Thread Vasiliy Kulikov
On Tue, Sep 10, 2013 at 01:30 -0700, Christian Kujau wrote: > On Sun, 8 Sep 2013 at 23:42, Eric W. Biederman wrote: > > I don't have a clue why anyone would want to hide processes, and make > > their own lives more difficult. > > Oh, there are plenty of usescases, I'm sure. And I for one am thankf

Re: [PATCH v2] proc: add "Seccomp" to status

2012-11-03 Thread Vasiliy Kulikov
It will simplify parsing of /proc/pid/status. > +} > + > static inline void task_context_switch_counts(struct seq_file *m, > struct task_struct *p) > { Thanks, -- Vasiliy Kulikov http://www.openwall.com - bringing security into open computing en

Re: [PATCH 07/21] userns: Use kgids for sysctl_ping_group_range

2012-08-20 Thread Vasiliy Kulikov
thing other than the initial user namespace. > > Cc: Vasiliy Kulikov > Signed-off-by: Eric W. Biederman Looks good. Acked-by: Vasiliy Kulikov Thanks, -- Vasiliy Kulikov http://www.openwall.com - bringing security into open computing environments -- To unsubscribe from this list: send