Linux Filesystem Development
Thread Index
[
Prev Page
][
Next Page
]
[patch 33/44] gfs2 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 34/44] fs: no AOP_TRUNCATED_PAGE for writes
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 42/44] sysv convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 38/44] jffs2 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 40/44] ufs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 21/44] fs: new cont helpers
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 32/44] ocfs2: convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 35/44] ecryptfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 41/44] udf convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 23/44] adfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 30/44] nfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 25/44] hfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 24/44] affs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 39/44] cifs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 43/44] minix convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 37/44] hostfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 29/44] qnx4 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 26/44] hfsplus convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 28/44] bfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 44/44] jfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 22/44] fat convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 13/44] mm: restore KERNEL_DS optimisations
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 20/44] xfs convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 16/44] rd convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 17/44] ext2 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 19/44] ext4 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 18/44] ext3 convert to new aops
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 10/44] mm: buffered write iterator
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 07/44] mm: buffered write cleanup
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 08/44] mm: write iovec cleanup
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 03/44] Revert 6527c2bdf1f833cc18e8f42bd97973d583e4aa83
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 06/44] mm: trim more holes
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 04/44] mm: clean up buffered write code
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 01/44] mm: revert KERNEL_DS buffered write optimisation
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 02/44] Revert 81b0c8713385ce1b1b9058e916edcf9561ad76d6
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 05/44] mm: debug write deadlocks
From
: Nick Piggin <npiggin@xxxxxxx>
[patch 00/44] Buffered write deadlock fix and new aops for 2.6.21-rc6-mm1
From
: Nick Piggin <npiggin@xxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Amit Gud <gud@xxxxxxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Amit Gud <gud@xxxxxxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Arjan van de Ven <arjan@xxxxxxxxxxxxx>
Re: 2.6.21-rc7 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Theodore Tso <tytso@xxxxxxx>
Re: Testing framework
From
: Ric Wheeler <ric@xxxxxxx>
Re: [RFC][PATCH] ChunkFS: fs fission for faster fsck
From
: Amit Gud <gud@xxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: [RFC][PATCH] ChunkFS: fs fission for faster fsck
From
: Suparna Bhattacharya <suparna@xxxxxxxxxx>
Re: [RFC][PATCH] ChunkFS: fs fission for faster fsck
From
: Suparna Bhattacharya <suparna@xxxxxxxxxx>
Re: Testing framework
From
: Avishay Traeger <atraeger@xxxxxxxxxxxxx>
Re: 2.6.21-rc7 new aops patchset
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[RFC][PATCH] ChunkFS: fs fission for faster fsck
From
: Amit Gud <gud@xxxxxxxxxxx>
Re: Testing framework
From
: "Karuna sagar K" <karunasagark@xxxxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Kalpak Shah <kalpak@xxxxxxxxxxxxxx>
Re: Testing framework
From
: Kalpak Shah <kalpak@xxxxxxxxxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: "Karuna sagar K" <karunasagark@xxxxxxxxx>
reiserfs lockdep warning in 2.6.21-rc5
From
: Andi Kleen <ak@xxxxxxx>
More reiserfs trouble in 2.6.21-rc5
From
: Andi Kleen <ak@xxxxxxx>
Re: ChunkFS - measuring cross-chunk references
From
: Amit Gud <gud@xxxxxxx>
Testing framework
From
: "Karuna sagar K" <karunasagark@xxxxxxxxx>
ChunkFS - measuring cross-chunk references
From
: "Karuna sagar K" <karunasagark@xxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 3/8] account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 3/8] account user mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 1/8] add user mounts to the kernel
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 2/8] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 8/8] allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 5/8] allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 3/8] account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[PATCH] v9fs: don't use primary fid when removing file
From
: "Latchesar Ionkov" <lucho@xxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 7/8] allow unprivileged mounts
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [d_path 0/7] Fixes to d_path: Respin
From
: "Ulrich Drepper" <drepper@xxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 7/8] allow unprivileged mounts
From
: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
Re: [d_path 3/7] Add d_namespace_path() to compute namespace relative pathnames
From
: Andreas Gruenbacher <agruen@xxxxxxx>
2.6.21-rc7 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [patch 8/8] allow unprivileged fuse mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 7/8] allow unprivileged mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 5/8] allow unprivileged bind mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 4/8] propagate error values from clone_mnt
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 3/8] account user mounts
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 2/8] allow unprivileged umount
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [d_path 3/7] Add d_namespace_path() to compute namespace relative pathnames
From
: Tetsuo Handa <penguin-fsdevel@xxxxxxxxxxxxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 2/8] allow unprivileged umount
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 0/8] mount ownership and unprivileged mount syscall (v4)
From
: Majkls <majkls@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 0/8] mount ownership and unprivileged mount syscall (v4)
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 8/8] allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Re: [patch 3/8] account user mounts
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 8/8] allow unprivileged fuse mounts
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 7/8] allow unprivileged mounts
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 1/8] add user mounts to the kernel
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 2/8] allow unprivileged umount
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
BUG: Dentry still in use during umount in 2.6.21-rc5-git6
From
: Andi Kleen <ak@xxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: David Lang <david.lang@xxxxxxxxxxxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: "Ulrich Drepper" <drepper@xxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [patch 0/8] mount ownership and unprivileged mount syscall (v4)
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [d_path 0/7] Fixes to d_path: Respin
From
: "Ulrich Drepper" <drepper@xxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: "Ulrich Drepper" <drepper@xxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: Jakub Jelinek <jakub@xxxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: "Amit K. Arora" <aarora@xxxxxxxxxxxxxxxxxx>
Re: [patch 0/8] mount ownership and unprivileged mount syscall (v4)
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
relayFS question: calling relay_write() from interrupt context does not write to file - why ?
From
: "Rami Rosen" <ramirose@xxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[patch 0/8] mount ownership and unprivileged mount syscall (v4)
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 4/8] propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 7/8] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 3/8] account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 8/8] allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 5/8] allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 6/8] put declaration of put_filesystem() in fs.h
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 1/8] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 2/8] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [d_path 6/7] Filter out disconnected paths from /proc/mounts
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [d_path 1/7] Fix __d_path() for lazy unmounts and make it unambiguous
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [d_path 0/7] Fixes to d_path: Respin
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
[d_path 2/7] Make d_path() consistent across mount operations
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 0/7] Fixes to d_path: Respin
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 4/7] Make getcwd() only return valid paths
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 5/7] Remove duplicate proc code
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 7/7] Distinguish between connected and disconnected paths in d_path()
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 3/7] Add d_namespace_path() to compute namespace relative pathnames
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 1/7] Fix __d_path() for lazy unmounts and make it unambiguous
From
: Andreas Gruenbacher <agruen@xxxxxxx>
[d_path 6/7] Filter out disconnected paths from /proc/mounts
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: AppArmor FAQ
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Timothy Shimmin <tes@xxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: David Chinner <dgc@xxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: VFAT: slow fs corruption? [long]
From
: Benjamin LaHaise <bcrl@xxxxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: What should dcache routines should be called at the end of mkdir?
From
: David Howells <dhowells@xxxxxxxxxx>
Re: AppArmor FAQ
From
: David Lang <david.lang@xxxxxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Crispin Cowan <crispin@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Trond Myklebust <trond.myklebust@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
VFAT: slow fs corruption? [long]
From
: Albrecht Dreß <albrecht.dress@xxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
What should dcache routines should be called at the end of mkdir?
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Trond Myklebust <trond.myklebust@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: "Rob Meijer" <capibara@xxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Trond Myklebust <trond.myklebust@xxxxxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: AppArmor FAQ
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Joshua Brindle <jbrindle@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: AppArmor FAQ
From
: David Lang <david.lang@xxxxxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: "Rob Meijer" <capibara@xxxxxxxxx>
Re: [RFC][PATCH 0/15] VFS based Union Mount
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [RFC][PATCH 5/15] Introduce union stack
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Crispin Cowan <crispin@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Crispin Cowan <crispin@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: [RFC][PATCH 5/15] Introduce union stack
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: nfs locking for cluster filesystems
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Badari Pulavarty <pbadari@xxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: nfs locking for cluster filesystems
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: nfs locking for cluster filesystems
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: [RFC][PATCH 0/15] VFS based Union Mount
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: [patch 05/10] Add "permit user submounts" flag to vfsmount
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [RFC][PATCH 0/15] VFS based Union Mount
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
Re: [patch 05/10] Add "permit user submounts" flag to vfsmount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: AppArmor FAQ
From
: Karl MacMillan <kmacmill@xxxxxxxxxx>
Re: AppArmor FAQ
From
: David Safford <safford@xxxxxxxxxxxxxx>
Re: [PATCH 17/17] gfs2: nfs lock support for gfs2
From
: Steven Whitehouse <steve@xxxxxxxxxxx>
Re: [RFC][PATCH 0/15] VFS based Union Mount
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: [patch 05/10] Add "permit user submounts" flag to vfsmount
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
[RFC][PATCH 15/15] Union-mount changes for NFS
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 14/15] tmpfs whiteout support
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 13/15] ext3 whiteout support
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 12/15] ext2 whiteout support
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 11/15] VFS whiteout handling
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 10/15] In-kernel file copy between union mounted filesystems
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 9/15] Simple union-mount readdir
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 8/15] Union-mount lookup
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 7/15] Union-mount mounting
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 6/15] Union-mount dentry reference counting
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 5/15] Introduce union stack
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 4/15] Add config options for union mount
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 3/15] Add the whiteout file type
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 2/15] Add a new mount flag (MNT_UNION) for union mount
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 1/15] Add union mount documentation
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
[RFC][PATCH 0/15] VFS based Union Mount
From
: Bharata B Rao <bharata@xxxxxxxxxxxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: "Amit K. Arora" <aarora@xxxxxxxxxxxxxxxxxx>
Re: [nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 05/10] Add "permit user submounts" flag to vfsmount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: How to query mount propagation state?
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: How to query mount propagation state?
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: "Rob Meijer" <capibara@xxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: AppArmor FAQ
From
: James Morris <jmorris@xxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Mark Fasheh <mark.fasheh@xxxxxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: John Johansen <jjohansen@xxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 38/41] AppArmor: Module and LSM hooks
From
: John Johansen <jjohansen@xxxxxxx>
AppArmor FAQ
From
: John Johansen <jjohansen@xxxxxxx>
Re: How to query mount propagation state?
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: John Johansen <jjohansen@xxxxxxx>
Re: [patch 02/10] allow unprivileged umount
From
: Greg KH <greg@xxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 02/10] allow unprivileged umount
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 05/10] Add "permit user submounts" flag to vfsmount
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: How to query mount propagation state?
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: How to query mount propagation state?
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [nameidata 2/2] Pass no useless nameidata to the create, lookup, and permission IOPs
From
: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
Re: [nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [nameidata 2/2] Pass no useless nameidata to the create, lookup, and permission IOPs
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [nameidata 2/2] Pass no useless nameidata to the create, lookup, and permission IOPs
From
: Randy Dunlap <randy.dunlap@xxxxxxxxxx>
Re: [nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [nameidata 2/2] Pass no useless nameidata to the create, lookup, and permission IOPs
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[nameidata 2/2] Pass no useless nameidata to the create, lookup, and permission IOPs
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Matthew Wilcox <matthew@xxxxxx>
Re: [nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[nameidata 1/2] Don't pass NULL nameidata to vfs_create
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 0/8] unprivileged mount syscall
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: d_revalidate not being called enough on mountpoints?
From
: David Howells <dhowells@xxxxxxxxxx>
Re: d_revalidate not being called enough on mountpoints?
From
: Trond Myklebust <trond.myklebust@xxxxxxxxxx>
d_revalidate not being called enough on mountpoints?
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: David Chinner <dgc@xxxxxxx>
[patch 09/10] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 05/10] Add "permit user submounts" flag to vfsmount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 03/10] account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 00/10] mount ownership and unprivileged mount syscall (v3)
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 06/10] propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 08/10] put declaration of put_filesystem() in fs.h
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 07/10] allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 10/10] allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 04/10] allow per-mount flags to be set/cleared individually
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 02/10] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 01/10] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
How to query mount propagation state?
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [Devel] Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Timothy Shimmin <tes@xxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Pavel Machek <pavel@xxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[PATCH]: ufs proper handling of zero link case
From
: Evgeniy Dushistov <dushistov@xxxxxxx>
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [PATCH 7/17] jffs2: convert jffs2_gc_fetch_page to read_cache_page
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [PATCH] make iunique use a do/while loop rather than its obscure goto loop
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] make iunique use a do/while loop rather than its obscure goto loop
From
: Jeff Layton <jlayton@xxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Nicholas Miell <nmiell@xxxxxxxxxxx>
Re: [PATCH] make iunique use a do/while loop rather than its obscure goto loop
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Badari Pulavarty <pbadari@xxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Jeff Mahoney <jeffm@xxxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Anton Altaparmakov <aia21@xxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [AppArmor 37/41] AppArmor: Main Part
From
: Nick Piggin <nickpiggin@xxxxxxxxxxxx>
Re: [AppArmor 37/41] AppArmor: Main Part
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [AppArmor 37/41] AppArmor: Main Part
From
: Andreas Gruenbacher <agruen@xxxxxxx>
Re: [AppArmor 00/41] AppArmor security module overview
From
: "Rob Meijer" <capibara@xxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Anton Altaparmakov <aia21@xxxxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Herbert Poetzl <herbert@xxxxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Nicholas Miell <nmiell@xxxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
Re: [patch 05/10] add "permit user mounts in new namespace" clone flag
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
extending VFS leases for NFSv4
From
: "david m. richter" <richterd@xxxxxxxxxxxxxx>
Re: [AppArmor 00/41] AppArmor security module overview
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH 7/17] jffs2: convert jffs2_gc_fetch_page to read_cache_page
From
: Phillip Lougher <phillip@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/17] cramfs: use read_mapping_page
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [PATCH 7/17] jffs2: convert jffs2_gc_fetch_page to read_cache_page
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Mark Fasheh <mark.fasheh@xxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 05/10] add "permit user mounts in new namespace" clone flag
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 02/10] allow unprivileged umount
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 09/10] allow unprivileged mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 03/10] account user mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 06/10] propagate error values from clone_mnt
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 10/10] allow unprivileged fuse mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 07/10] allow unprivileged bind mounts
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 08/10] put declaration of put_filesystem() in fs.h
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 01/10] add user mounts to the kernel
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 00/10] (resend) mount ownership and unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
[patch 04/10] add "permit user mounts" flag to namespaces
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: 2.6.21-rc6 new aops patchset
From
: Badari Pulavarty <pbadari@xxxxxxxxx>
Re: [PATCH 7/17] jffs2: convert jffs2_gc_fetch_page to read_cache_page
From
: Phillip Lougher <phillip@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Andi Kleen <andi@xxxxxxxxxxxxxx>
Re: [PATCH 1/17] cramfs: use read_mapping_page
From
: Roman Zippel <zippel@xxxxxxxxxxxxxx>
Re: [AppArmor 40/41] AppArmor: all the rest
From
: Al Viro <viro@xxxxxxxxxxxxxxxx>
Re: [RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Anton Altaparmakov <aia21@xxxxxxxxx>
[RFC] add FIEMAP ioctl to efficiently map file allocation
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: [PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [AppArmor 33/41] Add d_namespace_path() to obtain namespace relative pathnames
From
: Al Viro <viro@xxxxxxxxxxxxxxxx>
Re: [AppArmor 37/41] AppArmor: Main Part
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 00/41] AppArmor security module overview
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Re: [AppArmor 40/41] AppArmor: all the rest
From
: Al Viro <viro@xxxxxxxxxxxxxxxx>
Re: [AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 38/41] AppArmor: Module and LSM hooks
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook
From
: Al Viro <viro@xxxxxxxxxxxxxxxx>
Re: [AppArmor 03/41] Remove redundant check from proc_sys_setattr()
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
Re: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[AppArmor 27/41] Add a struct vfsmount parameter to vfs_listxattr()
From
: jjohansen@xxxxxxx
[AppArmor 26/41] Pass struct vfsmount to the inode_getxattr LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 18/41] call lsm hook before unhashing dentry in vfs_rmdir()
From
: jjohansen@xxxxxxx
[AppArmor 21/41] Add struct vfsmount parameters to vfs_rename()
From
: jjohansen@xxxxxxx
[AppArmor 33/41] Add d_namespace_path() to obtain namespace relative pathnames
From
: jjohansen@xxxxxxx
Re: [AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
[AppArmor 00/41] AppArmor security module overview
From
: jjohansen@xxxxxxx
[AppArmor 17/41] Pass struct vfsmount to the inode_rmdir LSM hook
From
: jjohansen@xxxxxxx
Re: [PATCH 1/17] cramfs: use read_mapping_page
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[AppArmor 37/41] AppArmor: Main Part
From
: jjohansen@xxxxxxx
[AppArmor 19/41] Add a struct vfsmount parameter to vfs_unlink()
From
: jjohansen@xxxxxxx
[AppArmor 24/41] Pass struct vfsmount to the inode_setxattr LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 22/41] Pass struct vfsmount to the inode_rename LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 20/41] Pass struct vfsmount to the inode_unlink LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 13/41] Pass struct vfsmount to the inode_readlink LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 15/41] Pass the struct vfsmounts to the inode_link LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 41/41] Add AppArmor LSM to security/Makefile
From
: jjohansen@xxxxxxx
[AppArmor 28/41] Pass struct vfsmount to the inode_listxattr LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 29/41] Add a struct vfsmount parameter to vfs_removexattr()
From
: jjohansen@xxxxxxx
[AppArmor 05/41] Add a vfsmount parameter to notify_change()
From
: jjohansen@xxxxxxx
[AppArmor 08/41] Pass struct vfsmount to the inode_mkdir LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 07/41] Add struct vfsmount parameter to vfs_mkdir()
From
: jjohansen@xxxxxxx
[AppArmor 14/41] Add struct vfsmount parameters to vfs_link()
From
: jjohansen@xxxxxxx
[AppArmor 11/41] Add a struct vfsmount parameter to vfs_symlink()
From
: jjohansen@xxxxxxx
[AppArmor 34/41] Enable LSM hooks to distinguish operations on file descriptors from operations on pathnames.
From
: jjohansen@xxxxxxx
[AppArmor 39/41] AppArmor: Profile loading and manipulation, pathname matching
From
: jjohansen@xxxxxxx
[AppArmor 04/41] Pass struct file down to remove_suid and children
From
: jjohansen@xxxxxxx
[AppArmor 36/41] Export audit subsystem for use by modules
From
: jjohansen@xxxxxxx
[AppArmor 10/41] Pass struct vfsmount to the inode_mknod LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 30/41] Pass struct vfsmount to the inode_removexattr LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 32/41] Make d_path() consistent across mount operations
From
: jjohansen@xxxxxxx
[AppArmor 09/41] Add a struct vfsmount parameter to vfs_mknod()
From
: jjohansen@xxxxxxx
[AppArmor 38/41] AppArmor: Module and LSM hooks
From
: jjohansen@xxxxxxx
[AppArmor 06/41] Pass struct vfsmount to the inode_setattr LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 23/41] Add a struct vfsmount parameter to vfs_setxattr()
From
: jjohansen@xxxxxxx
[AppArmor 35/41] Pass struct file down the inode_*xattr security LSM hooks
From
: jjohansen@xxxxxxx
[AppArmor 40/41] AppArmor: all the rest
From
: jjohansen@xxxxxxx
[AppArmor 12/41] Pass struct vfsmount to the inode_symlink LSM hook
From
: jjohansen@xxxxxxx
[AppArmor 31/41] Fix __d_path() for lazy unmounts and make it unambiguous; exclude unreachable mount points from /proc/mounts
From
: jjohansen@xxxxxxx
[AppArmor 16/41] Add a struct vfsmount parameter to vfs_rmdir()
From
: jjohansen@xxxxxxx
[AppArmor 25/41] Add a struct vfsmount parameter to vfs_getxattr()
From
: jjohansen@xxxxxxx
[AppArmor 02/41] Remove redundant check from proc_setattr()
From
: jjohansen@xxxxxxx
[AppArmor 03/41] Remove redundant check from proc_sys_setattr()
From
: jjohansen@xxxxxxx
2.6.21-rc6 new aops patchset
From
: Nick Piggin <npiggin@xxxxxxx>
[PATCH 6/17] hfs: remove redundant read_mapping_page error check
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 14/17] reiserfs: convert reiserfs_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 11/17] ntfs: convert ntfs_map_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 16/17] ufs: convert ufs_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 17/17] vxfs: convert vxfs_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 15/17] sysv: convert dir_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 12/17] partition: remove redundant read_mapping_page error checks
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 13/17] reiser4: remove redundant read_mapping_page error checks
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 10/17] mtd: convert page_read to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 9/17] minix: convert dir_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 7/17] jffs2: convert jffs2_gc_fetch_page to read_cache_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 8/17] jfs: use locking read_mapping_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 5/17] hfsplus: remove redundant read_mapping_page error check
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 4/17] ext2: convert ext2_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 3/17] afs: convert afs_dir_get_page to read_kmap_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 2/17] fs: introduce new read_cache_page interface
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 1/17] cramfs: use read_mapping_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 0/17] fs: cleanup single page synchronous read interface
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH] make iunique use a do/while loop rather than its obscure goto loop
From
: Jeffrey Layton <jlayton@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 8/8] AFS: Add security support
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH 8/8] AFS: Add security support
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 8/8] AFS: Add security support
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
[PATCH 4/8] AFS: Correctly alter relocation state after update and show state in /proc
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 3/8] AFS: Fix callback aggregator work item deadlock
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 2/8] AF_RXRPC: Lower dead call timeout and fix available call counting on connections
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 1/8] AF_RXRPC: Use own workqueues
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 8/8] AFS: Add security support
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 7/8] AFS: Permit key to be cached in nameidata
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 5/8] AFS: Handle multiple mounts of an AFS superblock correctly
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 6/8] AFS: AF_RXRPC key changes
From
: David Howells <dhowells@xxxxxxxxxx>
[PATCH 0/8] AFS: Add security support and fix bugs
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [PATCH 1/13] fs: convert core functions to zero_user_page
From
: Jörn Engel <joern@xxxxxxxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ian Kent <raven@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ian Kent <raven@xxxxxxxxxx>
calling write() from interrupt context
From
: "Ian Brown" <ianbrn@xxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 1/13] fs: convert core functions to zero_user_page
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [PATCH 13/13] fs: deprecate memclear_highpage_flush
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/13] fs: convert core functions to zero_user_page
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 5/13] ext4: use zero_user_page
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
Re: ext3, BKL, journal replay, multiple non-bind mounts of same device
From
: Andreas Dilger <adilger@xxxxxxxxxxxxx>
[PATCH 8/13] ntfs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 9/13] ocfs2: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 12/13] xfs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 13/13] fs: deprecate memclear_highpage_flush
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 10/13] reiser4: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 11/13] reiserfs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 7/13] nfs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 6/13] gfs2: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 5/13] ext4: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 4/13] ext3: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 3/13] ecryptfs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 2/13] affs: use zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 1/13] fs: convert core functions to zero_user_page
From
: Nate Diller <nate.diller@xxxxxxxxx>
ext3, BKL, journal replay, multiple non-bind mounts of same device
From
: "John Anthony Kazos Jr." <jakj@xxxxxxxxxxx>
Re: [PATCH 12/17] lockd: handle fl_notify callbacks
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH 9/17] locks: add lock cancel command
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH 8/17] locks: add fl_notify arguments for asynchronous lock return
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH 1/2] fs: use memclear_highpage_flush to zero page data
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [GIT PULL -mm] Unionfs branch management code
From
: Josef Sipek <jsipek@xxxxxxxxxxxxxxxxx>
Re: [GIT PULL -mm] Unionfs branch management code
From
: Shaya Potter <spotter@xxxxxxxxxxxxxxx>
Linux 2007 File System & IO Workshop notes & talks
From
: Ric Wheeler <ric@xxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Karel Zak <kzak@xxxxxxxxxx>
Re: [PATCH 1/2] fs: use memclear_highpage_flush to zero page data
From
: Anton Altaparmakov <aia21@xxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ian Kent <raven@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: [PATCH 1/2] fs: use memclear_highpage_flush to zero page data
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[PATCH 2/2] fs: use simple_prepare_write to zero page data
From
: Nate Diller <nate.diller@xxxxxxxxx>
[PATCH 1/2] fs: use memclear_highpage_flush to zero page data
From
: Nate Diller <nate.diller@xxxxxxxxx>
Re: [GIT PULL -mm] Unionfs branch management code
From
: Josef Sipek <jsipek@xxxxxxxxxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [GIT PULL -mm] Unionfs branch management code
From
: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
Re: REISER4 FOR INCLUSION IN THE LINUX KERNEL.
From
: Bill Davidsen <davidsen@xxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: [PATCH 12/17] lockd: handle fl_notify callbacks
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH 9/17] locks: add lock cancel command
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH 8/17] locks: add fl_notify arguments for asynchronous lock return
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
mount options atime/diratime on cifs
From
: "Shirish Pargaonkar" <shirishpargaonkar@xxxxxxxxx>
Re: Reiser4. BEST FILESYSTEM EVER.
From
: "Nate Diller" <nate.diller@xxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Re: [GIT PULL -mm] Unionfs branch management code
From
: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Ram Pai <linuxram@xxxxxxxxxx>
Re: Troll Of The Year
From
: Valdis.Kletnieks@xxxxxx
Re: [patch 0/8] unprivileged mount syscall
From
: "Serge E. Hallyn" <serue@xxxxxxxxxx>
Re: Troll Of The Year
From
: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: Jörn Engel <joern@xxxxxxxxxxxxxxx>
Re: [patch 0/8] unprivileged mount syscall
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: Reiser4. BEST FILESYSTEM EVER - Christer Weinigel
From
: Richard Knutsson <ricknu-0@xxxxxxxxxxxxxx>
Re: Troll Of The Year (Was: REISER4 FOR INCLUSION IN THE LINUX KERNEL.)
From
: Phillip Susi <psusi@xxxxxxxxxx>
Re: Interface for the new fallocate() system call
From
: Paul Mackerras <paulus@xxxxxxxxx>
[PATCH 01/21] fs: Introduce path{get,put}
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 14/21] Unionfs: Document unionfs_d_release locking
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 13/21] Unionfs: Remove the older incgen ioctl
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 03/21] Unionfs: Documentation updates for branch-management
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 08/21] Unionfs: Introduce branch-id code
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 05/21] Unionfs: Rename unionfs_data sbcount field to more appropriate open_files
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 04/21] Unionfs: Proper comment on rwsem field
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[PATCH 19/21] Unionfs: Properly handle stale inodes passed to unionfs_permission
From
: "Josef 'Jeff' Sipek" <jsipek@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Ext4 Filesystem]
[Union Filesystem]
[Linux XFS]
[Kernel Announce]
[IETF Annouce]
[Security]
[Netfilter]
[Bugtraq]