messages from 2015-12-04 17:27:41 to 2016-01-25 20:01:22 UTC [more...]
[PATCH RESEND v2 00/19] Support fuse mounts in user namespaces
2016-01-25 20:01 UTC (21+ messages)
` [PATCH RESEND v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH RESEND v2 02/18] block_dev: Check permissions towards block device inode when mounting
` [PATCH RESEND v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH RESEND v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH RESEND v2 05/18] userns: Replace in_userns with current_in_userns
` [PATCH RESEND v2 06/18] Smack: Handle labels consistently in untrusted mounts
` [PATCH RESEND v2 07/18] fs: Check for invalid i_uid in may_follow_link()
` [PATCH RESEND v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH RESEND v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH RESEND v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH RESEND v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH RESEND v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH RESEND v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
` [PATCH RESEND v2 15/18] fuse: Add support for pid namespaces
` [PATCH RESEND v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH RESEND v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH RESEND v2 18/18] fuse: Allow user namespace mounts
` [PATCH RESEND v2 10/18] fs: Update posix_acl support to handle "
[PATCH 00/35 v3] eparate operations from flags in the bio/request structs
2016-01-18 18:15 UTC (37+ messages)
` [PATCH 01/35] block/fs/drivers: remove rw argument from submit_bio
` [PATCH 02/35] block: add REQ_OP definitions and bi_op/op fields
` [PATCH 03/35] block, fs, mm, drivers: set bi_op to REQ_OP
` [PATCH 04/35] fs: have submit_bh users pass in op and flags separately
` [PATCH 05/35] fs: have ll_rw_block "
` [PATCH 06/35] direct-io: set bi_op to REQ_OP
` [PATCH 07/35] btrfs: have submit_one_bio users setup bio bi_op
` [PATCH 08/35] btrfs: set bi_op tp REQ_OP
` [PATCH 09/35] btrfs: update __btrfs_map_block for bi_op transition
` [PATCH 10/35] btrfs: don't pass rq_flag_bits if there is a bio
` [PATCH 11/35] f2fs: set bi_op to REQ_OP
` [PATCH 12/35] gfs2: "
` [PATCH 13/35] xfs: "
` [PATCH 14/35] hfsplus: "
` [PATCH 15/35] mpage: "
` [PATCH 16/35] nilfs: "
` [PATCH 17/35] ocfs2: "
` [PATCH 18/35] pm: "
` [PATCH 19/35] dm: "
` [PATCH 20/35] dm: pass dm stats data dir instead of bi_rw
` [PATCH 21/35] bcache: set bi_op to REQ_OP
` [PATCH 22/35] drbd: "
` [PATCH 23/35] md/raid: "
` [PATCH 24/35] xen: "
` [PATCH 25/35] target: "
` [PATCH 26/35] block: set op "
` [PATCH 27/35] drivers: set request "
` [PATCH 28/35] blktrace: get op from req->op/bio->bi_op
` [PATCH 29/35] ide cd: do not set REQ_WRITE on requests
` [PATCH 30/35] block, fs, drivers: do not test bi_rw for REQ_OPs
` [PATCH 31/35] block, fs: remove old REQ definitions
` [PATCH 32/35] block: shrink bi_rw and bi_op
` [PATCH 33/35] block, drivers: add REQ_OP_FLUSH operation
` [PATCH 34/35] block: add QUEUE_FLAGs for flush and fua
` [PATCH 35/35] block, drivers, fs: rename REQ_FLUSH to REQ_PREFLUSH
writeback: Stability issue (BUG) on 4.4 with writeback_percent
2016-01-15 3:19 UTC (3+ messages)
[PATCH v6 03/11] bcache: remove driver private bio splitting code
2016-01-13 23:03 UTC (5+ messages)
` "
[PATCH 00/35 v2] separate operations from flags in the bio/request structs
2016-01-10 7:15 UTC (57+ messages)
` [PATCH 01/35] block/fs/drivers: remove rw argument from submit_bio
` [dm-devel] "
` [PATCH 02/35] block: add REQ_OP definitions and bi_op/op fields
` [dm-devel] "
` [PATCH 03/35] block, fs, mm, drivers: set bi_op to REQ_OP
` [PATCH 04/35] fs: have submit_bh users pass in op and flags separately
` [PATCH 05/35] fs: have ll_rw_block "
` [PATCH 06/35] direct-io: set bi_op to REQ_OP
` [PATCH 07/35] btrfs: have submit_one_bio users setup bio bi_op
` [PATCH 08/35] btrfs: set bi_op tp REQ_OP
` [PATCH 09/35] btrfs: update __btrfs_map_block for bi_op transition
` [PATCH 10/35] btrfs: don't pass rq_flag_bits if there is a bio
` [PATCH 11/35] f2fs: set bi_op to REQ_OP
` [PATCH 12/35] gfs2: "
` [PATCH 13/35] xfs: "
` [PATCH 14/35] hfsplus: "
` [PATCH 15/35] mpage: "
` [PATCH 16/35] nilfs: "
` [PATCH 17/35] ocfs2: "
` [PATCH 18/35] pm: "
` [PATCH 19/35] dm: "
` [PATCH 20/35] dm: pass dm stats data dir instead of bi_rw
` [PATCH 21/35] bcache: set bi_op to REQ_OP
` [PATCH 22/35] drbd: "
` [PATCH 23/35] md/raid: "
` [PATCH 24/35] xen: "
` [PATCH 25/35] target: "
` [PATCH 26/35] block: set op "
` [PATCH 27/35] drivers: set request "
` [PATCH 28/35] blktrace: get op from req->op/bio->bi_op
` [PATCH 29/35] ide cd: do not set REQ_WRITE on requests
` [PATCH 30/35] block, fs, drivers: do not test bi_rw for REQ_OPs
` [PATCH 31/35] block, fs: remove old REQ definitions
` [PATCH 32/35] block: shrink bi_rw and bi_op
` [PATCH 33/35] block, drivers: add REQ_OP_FLUSH operation
` [PATCH 34/35] block: add QUEUE_FLAGs for flush and fua
` [PATCH 35/35] block, drivers, fs: rename REQ_FLUSH to REQ_PREFLUSH
BCACHE stability patches
2016-01-08 2:02 UTC (14+ messages)
` [PULL] Re: bcache "
[patch -next] bcache: cleanup indenting in bch_btree_insert_check_key()
2016-01-05 9:55 UTC
Charity Donation
2016-01-03 11:21 UTC
Assalam o Alaikum
2015-12-29 2:02 UTC
Charity Donation
2015-12-28 21:48 UTC
Klientskie bazi dannix Mnogo! Bistro! Nedorogo! tel/viber/whatsapp: +79139393506 Skype: prodawez389 Email: mamontova260@gmail.com Yznaite podrobnee!!! Zwonite!!
2015-12-19 23:40 UTC
dynamically resizing bcache devices
2015-12-23 13:15 UTC (4+ messages)
[PATCH 1/2] md: bcache: Replace get_seconds with ktime_get_seconds
2015-12-22 13:26 UTC (2+ messages)
JUST REPLY YES ONLY
2015-12-20 9:51 UTC
Review & Reply
2015-12-18 10:18 UTC
[PATCH] bcache: backing device set to clean after finishing detach
2015-12-18 4:56 UTC (2+ messages)
Review & Reply
2015-12-17 0:55 UTC
SSD failed - can I recover data from HDDs
2015-12-11 14:05 UTC (2+ messages)
Update
2015-12-09 2:43 UTC
[PATCH v2 00/19] Support fuse mounts in user namespaces
2015-12-07 21:21 UTC (19+ messages)
` [PATCH v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
` [PATCH v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
` [PATCH v2 02/18] block_dev: Check permissions towards block device inode when mounting
` [PATCH v2 05/18] userns: Replace in_userns with current_in_userns
` [PATCH v2 06/18] Smack: Handle labels consistently in untrusted mounts
` [PATCH v2 07/18] fs: Check for invalid i_uid in may_follow_link()
` [PATCH v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
` [PATCH v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH v2 10/18] fs: Update posix_acl support to handle user namespace mounts
` [PATCH v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH v2 15/18] fuse: Add support for pid namespaces
` [PATCH v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
` [PATCH v2 18/18] fuse: Allow user namespace mounts
` [PATCH v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
bcache_gc: BUG: soft lockup
2015-12-07 10:35 UTC (11+ messages)
Bug in bch_hprint
2015-12-06 22:13 UTC (2+ messages)
` Bug in bch_hprint related to SHOW(__bch_cached_dev)
[PATCH 00/19] Support fuse mounts in user namespaces
2015-12-05 6:15 UTC (34+ messages)
` [PATCH 09/19] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH 10/19] fs: Update posix_acl support to handle user namespace mounts
` [PATCH 11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH 12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH 13/19] fs: Allow superblock owner to access do_remount_sb()
` [PATCH 14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns
` [PATCH 15/19] capabilities: Allow privileged user in s_user_ns to set file caps
` [PATCH 17/19] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH 18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).