linux-bcache.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2015-12-04 17:27:41 to 2016-01-25 20:01:22 UTC [more...]

[PATCH RESEND v2 00/19] Support fuse mounts in user namespaces
 2016-01-25 20:01 UTC  (21+ messages)
` [PATCH RESEND v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
  ` [PATCH RESEND v2 02/18] block_dev: Check permissions towards block device inode when mounting
  ` [PATCH RESEND v2 03/18] fs: Treat foreign mounts as nosuid
  ` [PATCH RESEND v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
  ` [PATCH RESEND v2 05/18] userns: Replace in_userns with current_in_userns
  ` [PATCH RESEND v2 06/18] Smack: Handle labels consistently in untrusted mounts
  ` [PATCH RESEND v2 07/18] fs: Check for invalid i_uid in may_follow_link()
  ` [PATCH RESEND v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
  ` [PATCH RESEND v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH RESEND v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
  ` [PATCH RESEND v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
  ` [PATCH RESEND v2 13/18] fs: Allow superblock owner to access do_remount_sb()
  ` [PATCH RESEND v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
  ` [PATCH RESEND v2 15/18] fuse: Add support for pid namespaces
  ` [PATCH RESEND v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
  ` [PATCH RESEND v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
  ` [PATCH RESEND v2 18/18] fuse: Allow user namespace mounts
` [PATCH RESEND v2 10/18] fs: Update posix_acl support to handle "

[PATCH 00/35 v3] eparate operations from flags in the bio/request structs
 2016-01-18 18:15 UTC  (37+ messages)
` [PATCH 01/35] block/fs/drivers: remove rw argument from submit_bio
` [PATCH 02/35] block: add REQ_OP definitions and bi_op/op fields
` [PATCH 03/35] block, fs, mm, drivers: set bi_op to REQ_OP
` [PATCH 04/35] fs: have submit_bh users pass in op and flags separately
` [PATCH 05/35] fs: have ll_rw_block "
` [PATCH 06/35] direct-io: set bi_op to REQ_OP
` [PATCH 07/35] btrfs: have submit_one_bio users setup bio bi_op
` [PATCH 08/35] btrfs: set bi_op tp REQ_OP
` [PATCH 09/35] btrfs: update __btrfs_map_block for bi_op transition
` [PATCH 10/35] btrfs: don't pass rq_flag_bits if there is a bio
` [PATCH 11/35] f2fs: set bi_op to REQ_OP
` [PATCH 12/35] gfs2: "
` [PATCH 13/35] xfs: "
` [PATCH 14/35] hfsplus: "
` [PATCH 15/35] mpage: "
` [PATCH 16/35] nilfs: "
` [PATCH 17/35] ocfs2: "
` [PATCH 18/35] pm: "
` [PATCH 19/35] dm: "
` [PATCH 20/35] dm: pass dm stats data dir instead of bi_rw
` [PATCH 21/35] bcache: set bi_op to REQ_OP
` [PATCH 22/35] drbd: "
` [PATCH 23/35] md/raid: "
` [PATCH 24/35] xen: "
` [PATCH 25/35] target: "
` [PATCH 26/35] block: set op "
` [PATCH 27/35] drivers: set request "
` [PATCH 28/35] blktrace: get op from req->op/bio->bi_op
` [PATCH 29/35] ide cd: do not set REQ_WRITE on requests
` [PATCH 30/35] block, fs, drivers: do not test bi_rw for REQ_OPs
` [PATCH 31/35] block, fs: remove old REQ definitions
` [PATCH 32/35] block: shrink bi_rw and bi_op
` [PATCH 33/35] block, drivers: add REQ_OP_FLUSH operation
` [PATCH 34/35] block: add QUEUE_FLAGs for flush and fua
` [PATCH 35/35] block, drivers, fs: rename REQ_FLUSH to REQ_PREFLUSH

writeback: Stability issue (BUG) on 4.4 with writeback_percent
 2016-01-15  3:19 UTC  (3+ messages)

[PATCH v6 03/11] bcache: remove driver private bio splitting code
 2016-01-13 23:03 UTC  (5+ messages)
  `  "

[PATCH 00/35 v2] separate operations from flags in the bio/request structs
 2016-01-10  7:15 UTC  (57+ messages)
` [PATCH 01/35] block/fs/drivers: remove rw argument from submit_bio
  ` [dm-devel] "
` [PATCH 02/35] block: add REQ_OP definitions and bi_op/op fields
    ` [dm-devel] "
` [PATCH 03/35] block, fs, mm, drivers: set bi_op to REQ_OP
` [PATCH 04/35] fs: have submit_bh users pass in op and flags separately
` [PATCH 05/35] fs: have ll_rw_block "
` [PATCH 06/35] direct-io: set bi_op to REQ_OP
` [PATCH 07/35] btrfs: have submit_one_bio users setup bio bi_op
` [PATCH 08/35] btrfs: set bi_op tp REQ_OP
` [PATCH 09/35] btrfs: update __btrfs_map_block for bi_op transition
` [PATCH 10/35] btrfs: don't pass rq_flag_bits if there is a bio
` [PATCH 11/35] f2fs: set bi_op to REQ_OP
` [PATCH 12/35] gfs2: "
` [PATCH 13/35] xfs: "
` [PATCH 14/35] hfsplus: "
` [PATCH 15/35] mpage: "
` [PATCH 16/35] nilfs: "
` [PATCH 17/35] ocfs2: "
` [PATCH 18/35] pm: "
` [PATCH 19/35] dm: "
` [PATCH 20/35] dm: pass dm stats data dir instead of bi_rw
` [PATCH 21/35] bcache: set bi_op to REQ_OP
` [PATCH 22/35] drbd: "
` [PATCH 23/35] md/raid: "
` [PATCH 24/35] xen: "
` [PATCH 25/35] target: "
` [PATCH 26/35] block: set op "
` [PATCH 27/35] drivers: set request "
` [PATCH 28/35] blktrace: get op from req->op/bio->bi_op
` [PATCH 29/35] ide cd: do not set REQ_WRITE on requests
` [PATCH 30/35] block, fs, drivers: do not test bi_rw for REQ_OPs
` [PATCH 31/35] block, fs: remove old REQ definitions
` [PATCH 32/35] block: shrink bi_rw and bi_op
` [PATCH 33/35] block, drivers: add REQ_OP_FLUSH operation
` [PATCH 34/35] block: add QUEUE_FLAGs for flush and fua
` [PATCH 35/35] block, drivers, fs: rename REQ_FLUSH to REQ_PREFLUSH

BCACHE stability patches
 2016-01-08  2:02 UTC  (14+ messages)
` [PULL] Re: bcache "

[patch -next] bcache: cleanup indenting in bch_btree_insert_check_key()
 2016-01-05  9:55 UTC 

Charity Donation
 2016-01-03 11:21 UTC 

Assalam o Alaikum
 2015-12-29  2:02 UTC 

Charity Donation
 2015-12-28 21:48 UTC 

Klientskie bazi dannix Mnogo! Bistro! Nedorogo! tel/viber/whatsapp: +79139393506 Skype: prodawez389 Email: mamontova260@gmail.com Yznaite podrobnee!!! Zwonite!!
 2015-12-19 23:40 UTC 

dynamically resizing bcache devices
 2015-12-23 13:15 UTC  (4+ messages)

[PATCH 1/2] md: bcache: Replace get_seconds with ktime_get_seconds
 2015-12-22 13:26 UTC  (2+ messages)

JUST REPLY YES ONLY
 2015-12-20  9:51 UTC 

Review & Reply
 2015-12-18 10:18 UTC 

[PATCH] bcache: backing device set to clean after finishing detach
 2015-12-18  4:56 UTC  (2+ messages)

Review & Reply
 2015-12-17  0:55 UTC 

SSD failed - can I recover data from HDDs
 2015-12-11 14:05 UTC  (2+ messages)

Update
 2015-12-09  2:43 UTC 

[PATCH v2 00/19] Support fuse mounts in user namespaces
 2015-12-07 21:21 UTC  (19+ messages)
` [PATCH v2 03/18] fs: Treat foreign mounts as nosuid
` [PATCH v2 04/18] selinux: Add support for unprivileged mounts from user namespaces
  ` [PATCH v2 01/18] block_dev: Support checking inode permissions in lookup_bdev()
  ` [PATCH v2 02/18] block_dev: Check permissions towards block device inode when mounting
  ` [PATCH v2 05/18] userns: Replace in_userns with current_in_userns
  ` [PATCH v2 06/18] Smack: Handle labels consistently in untrusted mounts
  ` [PATCH v2 07/18] fs: Check for invalid i_uid in may_follow_link()
  ` [PATCH v2 08/18] cred: Reject inodes with invalid ids in set_create_file_as()
  ` [PATCH v2 09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
  ` [PATCH v2 10/18] fs: Update posix_acl support to handle user namespace mounts
  ` [PATCH v2 11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
  ` [PATCH v2 12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
  ` [PATCH v2 15/18] fuse: Add support for pid namespaces
  ` [PATCH v2 16/18] fuse: Support fuse filesystems outside of init_user_ns
  ` [PATCH v2 17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
  ` [PATCH v2 18/18] fuse: Allow user namespace mounts
` [PATCH v2 13/18] fs: Allow superblock owner to access do_remount_sb()
` [PATCH v2 14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs

bcache_gc: BUG: soft lockup
 2015-12-07 10:35 UTC  (11+ messages)

Bug in bch_hprint
 2015-12-06 22:13 UTC  (2+ messages)
` Bug in bch_hprint related to SHOW(__bch_cached_dev)

[PATCH 00/19] Support fuse mounts in user namespaces
 2015-12-05  6:15 UTC  (34+ messages)
` [PATCH 09/19] fs: Refuse uid/gid changes which don't map into s_user_ns
` [PATCH 10/19] fs: Update posix_acl support to handle user namespace mounts
` [PATCH 11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes
` [PATCH 12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns
` [PATCH 13/19] fs: Allow superblock owner to access do_remount_sb()
` [PATCH 14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns
` [PATCH 15/19] capabilities: Allow privileged user in s_user_ns to set file caps
` [PATCH 17/19] fuse: Support fuse filesystems outside of init_user_ns
` [PATCH 18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).