linux-bcache.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2015-11-13 13:05:14 to 2016-01-04 18:03:57 UTC [more...]

[PATCH RESEND v2 00/19] Support fuse mounts in user namespaces
 2016-01-04 18:03 UTC  (19+ messages)
` [PATCH RESEND v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
  ` [PATCH RESEND v2 02/18] block_dev: Check permissions towards block device inode when mounting
  ` [PATCH RESEND v2 03/18] fs: Treat foreign mounts as nosuid
  ` [PATCH RESEND v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
  ` [PATCH RESEND v2 05/18] userns: Replace in_userns with current_in_userns
  ` [PATCH RESEND v2 06/18] Smack: Handle labels consistently in untrusted mounts
  ` [PATCH RESEND v2 07/18] fs: Check for invalid i_uid in may_follow_link()
  ` [PATCH RESEND v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
  ` [PATCH RESEND v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH RESEND v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
  ` [PATCH RESEND v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
  ` [PATCH RESEND v2 13/18] fs: Allow superblock owner to access do_remount_sb()
  ` [PATCH RESEND v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
  ` [PATCH RESEND v2 15/18] fuse: Add support for pid namespaces
  ` [PATCH RESEND v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
  ` [PATCH RESEND v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
  ` [PATCH RESEND v2 18/18] fuse: Allow user namespace mounts
` [PATCH RESEND v2 10/18] fs: Update posix_acl support to handle "

Charity Donation
 2016-01-03 11:21 UTC 

BCACHE stability patches
 2016-01-03  0:12 UTC  (13+ messages)
` [PULL] Re: bcache "

Assalam o Alaikum
 2015-12-29  2:02 UTC 

Charity Donation
 2015-12-28 21:48 UTC 

Klientskie bazi dannix Mnogo! Bistro! Nedorogo! tel/viber/whatsapp: +79139393506 Skype: prodawez389 Email: mamontova260@gmail.com Yznaite podrobnee!!! Zwonite!!
 2015-12-19 23:40 UTC 

dynamically resizing bcache devices
 2015-12-23 13:15 UTC  (4+ messages)

[PATCH 1/2] md: bcache: Replace get_seconds with ktime_get_seconds
 2015-12-22 13:26 UTC  (2+ messages)

JUST REPLY YES ONLY
 2015-12-20  9:51 UTC 

Review & Reply
 2015-12-18 10:18 UTC 

[PATCH] bcache: backing device set to clean after finishing detach
 2015-12-18  4:56 UTC  (2+ messages)

Review & Reply
 2015-12-17  0:55 UTC 

SSD failed - can I recover data from HDDs
 2015-12-11 14:05 UTC  (2+ messages)

Update
 2015-12-09  2:43 UTC 

[PATCH v2 00/19] Support fuse mounts in user namespaces
 2015-12-07 21:21 UTC  (19+ messages)
` [PATCH v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
  ` [PATCH v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
  ` [PATCH v2 02/18] block_dev: Check permissions towards block device inode when mounting
  ` [PATCH v2 05/18] userns: Replace in_userns with current_in_userns
  ` [PATCH v2 06/18] Smack: Handle labels consistently in untrusted mounts
  ` [PATCH v2 07/18] fs: Check for invalid i_uid in may_follow_link()
  ` [PATCH v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
  ` [PATCH v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH v2 10/18] fs: Update posix_acl support to handle user namespace mounts
  ` [PATCH v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
  ` [PATCH v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
  ` [PATCH v2 15/18] fuse: Add support for pid namespaces
  ` [PATCH v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
  ` [PATCH v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
  ` [PATCH v2 18/18] fuse: Allow user namespace mounts

bcache_gc: BUG: soft lockup
 2015-12-07 10:35 UTC  (13+ messages)

Bug in bch_hprint
 2015-12-06 22:13 UTC  (2+ messages)
` Bug in bch_hprint related to SHOW(__bch_cached_dev)

[PATCH 00/19] Support fuse mounts in user namespaces
 2015-12-05  6:15 UTC  (51+ messages)
` [PATCH 02/19] block_dev: Check permissions towards block device inode when mounting
` [PATCH 03/19] fs: Treat foreign mounts as nosuid
` [PATCH 04/19] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH 05/19] userns: Replace in_userns with current_in_userns
  ` [PATCH 01/19] block_dev: Support checking inode permissions in lookup_bdev()
  ` [PATCH 06/19] Smack: Handle labels consistently in untrusted mounts
  ` [PATCH 07/19] fs: Check for invalid i_uid in may_follow_link()
  ` [PATCH 09/19] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH 10/19] fs: Update posix_acl support to handle user namespace mounts
  ` [PATCH 11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes
  ` [PATCH 13/19] fs: Allow superblock owner to access do_remount_sb()
  ` [PATCH 14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns
  ` [PATCH 17/19] fuse: Support fuse filesystems outside of init_user_ns
  ` [PATCH 18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH 08/19] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH 12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH 15/19] capabilities: Allow privileged user in s_user_ns to set file caps
` [PATCH 16/19] fuse: Add support for pid namespaces
` [PATCH 19/19] fuse: Allow user namespace mounts

[PULL REQUEST]: bcache stability patches
 2015-12-02 12:18 UTC  (2+ messages)

bcache performance: is all IO serialized by check_should_bypass()?
 2015-11-30  0:08 UTC 

Btrfs on bcache device: mount options?
 2015-11-24  7:30 UTC  (4+ messages)

writeback deadlocks
 2015-11-22 16:44 UTC 

write deadlocks
 2015-11-22 16:04 UTC 

[PATCH v3 0/7] User namespace mount updates
 2015-11-20 17:33 UTC  (61+ messages)
` [PATCH v3 1/7] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH v3 2/7] block_dev: Check permissions towards block device inode when mounting
` [PATCH v3 3/7] mtd: Check permissions towards mtd "
` [PATCH v3 4/7] fs: Treat foreign mounts as nosuid
` [PATCH v3 5/7] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH v3 6/7] userns: Replace in_userns with current_in_userns
` [PATCH v3 7/7] Smack: Handle labels consistently in untrusted mounts

dkms module
 2015-11-19 20:01 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).