_
> From: sf...@users.sourceforge.net [sf...@users.sourceforge.net]
> Sent: Wednesday, July 17, 2013 9:57 AM
> To: Bhushan Jain; aufs-users@lists.sourceforge.net
> Subject: Re: Aufs support for Linux User namespace
>
> sf...@users.sourceforge.net:
>> Bhushan Jain:
I am wrong.
Thanks,
Bhushan
From: sf...@users.sourceforge.net [sf...@users.sourceforge.net]
Sent: Wednesday, July 17, 2013 9:57 AM
To: Bhushan Jain; aufs-users@lists.sourceforge.net
Subject: Re: Aufs support for Linux User namespace
sf...@users.sourceforge.net:
sf...@users.sourceforge.net:
> Bhushan Jain:
> > Attached is a sample code that creates a user namespace and maps the un-pri=
> > vileged user to root within the namespace.=0A=
> > The user namespace can be used for sandboxing. Having aufs support within t=
> > he user namespace can help create a
Bhushan Jain:
> Attached is a sample code that creates a user namespace and maps the un-pri=
> vileged user to root within the namespace.=0A=
> The user namespace can be used for sandboxing. Having aufs support within t=
> he user namespace can help create a chroot environment where multiple direc
Hi J. R. Okajima,
> If you can, please provide me
- sample usage of user-namespace
- sample case where user-namespace and aufs is beneficial
Attached is a sample code that creates a user namespace and maps the
un-privileged user to root within the namespace.
The user namespace can be used for sa
Hello Bhushan,
Bhushan Jain:
> Linux kernel 3.8 has added support for user namespace which allows
> unprivileged users to create different namespaces for sandboxing within the
> user namespace. The filesystem developers need to explicitly allow mounting
> their filesystem types within a user n
Dear Aufs maintainers,
Linux kernel 3.8 has added support for user namespace which allows
unprivileged users to create different namespaces for sandboxing within the
user namespace. The filesystem developers need to explicitly allow mounting
their filesystem types within a user