messages from 2015-11-13 13:05:14 to 2016-01-04 18:03:57 UTC [more...]
[PATCH RESEND v2 00/19] Support fuse mounts in user namespaces
2016-01-04 18:03 UTC (19+ messages)
` [PATCH RESEND v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH RESEND v2 02/18] block_dev: Check permissions towards block device inode when mounting
` [PATCH RESEND v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH RESEND v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH RESEND v2 05/18] userns: Replace in_userns with current_in_userns
` [PATCH RESEND v2 06/18] Smack: Handle labels consistently in untrusted mounts
` [PATCH RESEND v2 07/18] fs: Check for invalid i_uid in may_follow_link()
` [PATCH RESEND v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH RESEND v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH RESEND v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH RESEND v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH RESEND v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH RESEND v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
` [PATCH RESEND v2 15/18] fuse: Add support for pid namespaces
` [PATCH RESEND v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH RESEND v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH RESEND v2 18/18] fuse: Allow user namespace mounts
` [PATCH RESEND v2 10/18] fs: Update posix_acl support to handle "
Charity Donation
2016-01-03 11:21 UTC
BCACHE stability patches
2016-01-03 0:12 UTC (13+ messages)
` [PULL] Re: bcache "
Assalam o Alaikum
2015-12-29 2:02 UTC
Charity Donation
2015-12-28 21:48 UTC
Klientskie bazi dannix Mnogo! Bistro! Nedorogo! tel/viber/whatsapp: +79139393506 Skype: prodawez389 Email: mamontova260@gmail.com Yznaite podrobnee!!! Zwonite!!
2015-12-19 23:40 UTC
dynamically resizing bcache devices
2015-12-23 13:15 UTC (4+ messages)
[PATCH 1/2] md: bcache: Replace get_seconds with ktime_get_seconds
2015-12-22 13:26 UTC (2+ messages)
JUST REPLY YES ONLY
2015-12-20 9:51 UTC
Review & Reply
2015-12-18 10:18 UTC
[PATCH] bcache: backing device set to clean after finishing detach
2015-12-18 4:56 UTC (2+ messages)
Review & Reply
2015-12-17 0:55 UTC
SSD failed - can I recover data from HDDs
2015-12-11 14:05 UTC (2+ messages)
Update
2015-12-09 2:43 UTC
[PATCH v2 00/19] Support fuse mounts in user namespaces
2015-12-07 21:21 UTC (19+ messages)
` [PATCH v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
` [PATCH v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH v2 02/18] block_dev: Check permissions towards block device inode when mounting
` [PATCH v2 05/18] userns: Replace in_userns with current_in_userns
` [PATCH v2 06/18] Smack: Handle labels consistently in untrusted mounts
` [PATCH v2 07/18] fs: Check for invalid i_uid in may_follow_link()
` [PATCH v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH v2 10/18] fs: Update posix_acl support to handle user namespace mounts
` [PATCH v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH v2 15/18] fuse: Add support for pid namespaces
` [PATCH v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH v2 18/18] fuse: Allow user namespace mounts
bcache_gc: BUG: soft lockup
2015-12-07 10:35 UTC (13+ messages)
Bug in bch_hprint
2015-12-06 22:13 UTC (2+ messages)
` Bug in bch_hprint related to SHOW(__bch_cached_dev)
[PATCH 00/19] Support fuse mounts in user namespaces
2015-12-05 6:15 UTC (51+ messages)
` [PATCH 02/19] block_dev: Check permissions towards block device inode when mounting
` [PATCH 03/19] fs: Treat foreign mounts as nosuid
` [PATCH 04/19] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH 05/19] userns: Replace in_userns with current_in_userns
` [PATCH 01/19] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH 06/19] Smack: Handle labels consistently in untrusted mounts
` [PATCH 07/19] fs: Check for invalid i_uid in may_follow_link()
` [PATCH 09/19] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH 10/19] fs: Update posix_acl support to handle user namespace mounts
` [PATCH 11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH 13/19] fs: Allow superblock owner to access do_remount_sb()
` [PATCH 14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns
` [PATCH 17/19] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH 18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH 08/19] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH 12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH 15/19] capabilities: Allow privileged user in s_user_ns to set file caps
` [PATCH 16/19] fuse: Add support for pid namespaces
` [PATCH 19/19] fuse: Allow user namespace mounts
[PULL REQUEST]: bcache stability patches
2015-12-02 12:18 UTC (2+ messages)
bcache performance: is all IO serialized by check_should_bypass()?
2015-11-30 0:08 UTC
Btrfs on bcache device: mount options?
2015-11-24 7:30 UTC (4+ messages)
writeback deadlocks
2015-11-22 16:44 UTC
write deadlocks
2015-11-22 16:04 UTC
[PATCH v3 0/7] User namespace mount updates
2015-11-20 17:33 UTC (61+ messages)
` [PATCH v3 1/7] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH v3 2/7] block_dev: Check permissions towards block device inode when mounting
` [PATCH v3 3/7] mtd: Check permissions towards mtd "
` [PATCH v3 4/7] fs: Treat foreign mounts as nosuid
` [PATCH v3 5/7] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH v3 6/7] userns: Replace in_userns with current_in_userns
` [PATCH v3 7/7] Smack: Handle labels consistently in untrusted mounts
dkms module
2015-11-19 20:01 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).