Hi,
On Wed, Sep 03, 2014 at 18:29 +0800, Chen Hanxiao wrote:
> This patch will show the hierarchy of pid namespace
> under /proc/pidns like:
> /proc/pidns
> ├── hierarchy
> │ ├── pidns4026532399
> │ │ ├── pidns -> /proc/2863/ns/pid
> │ │ └── pidns4026532515
> │ │ └── pidns -> /pr
Hi Michael,
On Wed, May 21, 2014 at 20:12 +0200, Michael Kerrisk (man-pages) wrote:
> Vasily (and Motohiro),
>
> Sometime ago, Motohiro raised a documentation bug
> ( https://bugzilla.kernel.org/show_bug.cgi?id=42704 ) which
> relates to your commit 72fa59970f8698023045ab0713d66f3f4f96945c
> ("m
On Sun, Sep 15, 2013 at 01:58 -0700, Christian Kujau wrote:
> Vasiliy Kulikov wrote:
> >> But still, I wonder if this is
> >> intended behaviour.
> >
> >Yes.
> >
> >If you think such side channel attacks are something you don't care,
>
On Tue, Sep 10, 2013 at 01:30 -0700, Christian Kujau wrote:
> On Sun, 8 Sep 2013 at 23:42, Eric W. Biederman wrote:
> > I don't have a clue why anyone would want to hide processes, and make
> > their own lives more difficult.
>
> Oh, there are plenty of usescases, I'm sure. And I for one am thankf
It will simplify
parsing of /proc/pid/status.
> +}
> +
> static inline void task_context_switch_counts(struct seq_file *m,
> struct task_struct *p)
> {
Thanks,
--
Vasiliy Kulikov
http://www.openwall.com - bringing security into open computing en
thing other than the initial user namespace.
>
> Cc: Vasiliy Kulikov
> Signed-off-by: Eric W. Biederman
Looks good.
Acked-by: Vasiliy Kulikov
Thanks,
--
Vasiliy Kulikov
http://www.openwall.com - bringing security into open computing environments
--
To unsubscribe from this list: send
6 matches
Mail list logo