Linux Union Filesystem
[Prev Page][Next Page]
- Re: [PATCH v2 10/18] evm: Turn evm_update_evmxattr into void function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Do d_type check only if work dir creation was successful
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2 18/18] vfs: Remove {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 17/18] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 16/18] vfs: Check for the IOP_XATTR flag in listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 15/18] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 10/18] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 14/18] libfs: Use IOP_XATTR flag for empty directory handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 13/18] vfs: Use IOP_XATTR flag for bad-inode handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 12/18] vfs: Add IOP_XATTR inode operations flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 11/18] vfs: Move xattr_resolve_name to the front of fs/xattr.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 09/18] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 08/18] overlayfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 07/18] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 06/18] sockfs: Get rid of getxattr iop
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 05/18] sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 04/18] kernfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 03/18] hfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 02/18] jffs2: Remove jffs2_{get,set,remove}xattr macros
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 01/18] xattr: Remove unnecessary NULL attribute name check
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 00/18] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Deadlock with overlayfs over and IMA/EVM-enabled filesystem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs.
- From: Krisztian Litkey <kli@xxxxxx>
- [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs.
- From: Krisztian Litkey <kli@xxxxxx>
- Don't deadlock when setting IMA extended attributes
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [RFC 8/8] xattr: Remove generic xattr handlers
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 5/8] xattr: Add per-inode xattr handlers as a new inode operation
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Can overlayfs be used for the filesystem root?
- From: Badhri Jagan Sridharan <badhri@xxxxxxxxxx>
- Deadlock with overlayfs over and IMA/EVM-enabled filesystem
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] xattr handlers: fixup generic_listxattr
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL (resend) ] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Dilger <adilger@xxxxxxxxx>
- [RFC 8/8] xattr: Remove generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 7/8] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 6/8] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 5/8] xattr: Add per-inode xattr handlers as a new inode operation
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 3/8] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 2/8] overlayfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 1/8] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Backport a Security Fix for CVE-2015-8660 to v4.1
- From: Yuki Machida <machida.yuki@xxxxxxxxxxxxxx>
- [PATCH v2] fs: overlayfs: override creds with the ones from the superblock mounter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- Re: [PATCH] fs: overlayfs: override creds with the ones from the superblock mounter (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] fs: overlayfs: override creds with the ones from the superblock mounter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- [PATCH] fs: overlayfs: remove debug parameter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Marc Haber <mh+linux-kernel@xxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: William Dauchy <wdauchy@xxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: William Dauchy <wdauchy@xxxxxxxxx>
- [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 2/2] ovl: ignore permissions on underlying lookup
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/2] vfs: export lookup_hash() to modules
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] vfs: rename: check backing inode being equal
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.6
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] vfs: update atime using file->f_inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] fs: overlayfs: fixed coding style warning
- From: Sohom Bhattacharjee <soham.bhattacharjee15@xxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] Set nosuid, noexec, nodev if any lowerdirs have it
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] Set nosuid, noexec, nodev if any lowerdirs have it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: Unmounting lower filesystem while overlayfs uses it
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: Unmounting lower filesystem while overlayfs uses it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Unmounting lower filesystem while overlayfs uses it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] overlayfs: Ensure upper filesystem supports d_type
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Robert Święcki <robert@xxxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 2/2] nfs: use file_dentry()
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfs: add file_dentry()
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- [PATCH 2/2] nfs: use file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/2] vfs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix hardlinks in overlay
- From: Alexander Morozov <alexandr.morozov@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix hardlinks in overlay
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/4] ovl: honor flag MS_SILENT at mount
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.5-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] ovl: fix working on distributed fs as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 2/3] vfs: Add d_select_inode for overlayfs translation
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 1/3] ovl: Add d_select_inode to reval dentry operations
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 0/3] Fix overlayfs with NFS as lowerdir
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Nazarov Sergey <s-nazarov@xxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [BUG] ltp/fcntl33 triggers NULL pointer dereference on overlayfs
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Ensure upper filesystem supports d_type
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- overlayfs: support ecryptfs upperdir
- From: Andin Bren <andin.bren@xxxxxxxxx>
- overlayfs: DAC override capability for ovl_lookup_real(lowerdir)?
- From: Nazarov Sergey <s-nazarov@xxxxxxxxx>
- Re: [PATCH] ovl: fix working on distributed fs as lower layer
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Overlayfs regression: NFS as lowerdir fails to read any file
- From: radioconfusion@xxxxxxxxx
- BUG? Missing dput() in ovl_permissions().
- From: Eric Jones <ejones@xxxxxxxx>
- [PATCH] ovl: Add d_select_inode op to ovl_reval_dentry_operations
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: Problem writing to ovl with CIFS as lower dir
- From: Nikolay Borisov <n.borisov@xxxxxxxxxxxxxx>
- Re: Problem writing to ovl with CIFS as lower dir
- From: David Howells <dhowells@xxxxxxxxxx>
- Problem writing to ovl with CIFS as lower dir
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] overlay: test permission checks within upper layer
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlay: check visible whiteouts in pure-upper directory
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] overlay: test permission checks within upper layer
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] overlay: check visible whiteouts in pure-upper directory
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] overlay: test permission checks within upper layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: detect distributed fs also by looking into default dentry operations
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: fix working on distributed fs as lower layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: copy MS_POSIXACL flag from upper layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] vfs: update atime using file->f_inode
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: Unreliable permission checking with OverlayFS
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Unreliable permission checking with OverlayFS
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Overlayfs with NFS lower layer is still not working
- From: "arnaud.mouiche@xxxxxxxxxxx" <arnaud.mouiche@xxxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Robert Święcki <robert@xxxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v2 3/3] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH v2 2/3] common: export overlay lower/upper/work directories as variables
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH v2 1/3] common: remove all files in $SCRATCH_DEV for overlayfs in _scratch_cleanup_files()
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH] ovl: Do not leave whiteout during unlink/rmdir if parent does not have merge property
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/2] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 1/2] common: remove all files in $SCRATCH_DEV for overlayfs in _scratch_cleanup_files()
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH] New module param allow_userns for allow unprivileged to mount under userns.
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH 1/1] overlayfs: restrict structs visible in current code module
- From: zhuyj <zyjzyj2000@xxxxxxxxx>
- [PATCH 1/1] overlayfs: restrict structs visible in current code module
- From: <zyjzyj2000@xxxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- [PATCH 2/2] ovl: check POSIX ACL support aginst upper layer
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- [PATCH 1/2] ovl: also update attr on ovl level inode in ovl_setattr()
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH] overlayfs: include linux/pagemap.h for PAGE_CACHE_SIZE
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: include linux/pagemap.h for PAGE_CACHE_SIZE
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH 2/2] fs/overlay: use same inodes for hardlinks
- From: Alexander Morozov <alexandr.morozov@xxxxxxxxxx>
- Re: [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: move super block magic number to magic.h
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: use a minimal buffer in ovl_copy_xattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Changes to underlying filesystems in overlayfs
- From: Arseny Sher <sher-ars@xxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- [PATCH] overlayfs: move super block magic number to magic.h
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs bug fixes for 4.3-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: use a minimal buffer in ovl_copy_xattr
- From: vcaputo@xxxxxxxxxxxxxxxxx
- Re: overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Eric Van Hensbergen <ericvh@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: Issue: With an OverlayFS that has Btrfs as the upper layer, removal of directories silently fails
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Pass O_LARGEFILE unconditionally in ovl_copy_up_data()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH RESEND 1/2] ovl: free stack of paths in ovl_fill_super
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Zheng Liu <gnehzuil.liu@xxxxxxxxx>
- overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- Re: [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Roman Lebedev <lebedev.ri@xxxxxxxxx>
- kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Roman Lebedev <lebedev.ri@xxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/5] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/5] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/5] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/5] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/5] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/5] SELinux: Check against union label for file operations
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] overlayfs: Pass O_LARGEFILE unconditionally in ovl_copy_up_data()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: overlayfs + linux user namespace issue
- From: Alexey Naidyonov <alexey.naidyonov@xxxxxxxxx>
- Re: overlayfs + linux user namespace issue
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- overlayfs + linux user namespace issue
- From: Alexey Naidyonov <alexey.naidyonov@xxxxxxxxx>
- Re: Fwd: overlayfs+selinux error: OPNOTSUPP
- From: Matthew Cengia <mattcen@xxxxxxxxxxxx>
- Re: Fwd: overlayfs+selinux error: OPNOTSUPP
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: [PATCH 2/2] overlayfs: Fix dentry reference leak
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Fwd: overlayfs+selinux error: OPNOTSUPP
- From: Matthew Cengia <mattcen@xxxxxxxxxxxx>
- [PATCH 1/2] overlayfs: Conditionally use O_LARGEFILE in ovl_copy_up()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] overlayfs: Fix dentry reference leak
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] ovl: add O_LARGEFILE flag when copyup files
- From: David Howells <dhowells@xxxxxxxxxx>
- [RESEND][PATCH] ovl: add O_LARGEFILE flag when copyup files
- [PATCH] ovl: add O_LARGEFILE flag when copyup files
- Overlay issue when truncating files over 2G
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- [PATCH 2/2] ovl: ovl_rename2 should do d_move by itself
- [PATCH 1/2] fs: export d_exchange for the fs with FS_RENAME_DOSE_D_MOVE
- [PATCH RESEND 1/2] ovl: free stack of paths in ovl_fill_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RESEND 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Issue: With an OverlayFS that has Btrfs as the upper layer, removal of directories silently fails
- From: Neal Gompa <ngompa@xxxxxxxxxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Dominique Martinet <dominique.martinet@xxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: How to specify the mount points for multiple lower layers?
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- Re: How to specify the mount points for multiple lower layers?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- How to specify the mount points for multiple lower layers?
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- Re: [PATCH 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ovl: free stack of paths in ovl_fill_super
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ovl: free stack of paths in ovl_fill_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 2/8] overlayfs: Make f_path always point to the overlay and f_inode to the underlay
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 2/8] overlayfs: Make f_path always point to the overlay and f_inode to the underlay
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- overlayfs: Problems with NFS as lower filesystem
- From: Dominik Paulus <lkml@xxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Saied Kazemi <saied@xxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.2
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/4] ovl: honor flag MS_SILENT at mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 2/4] ovl: honor MS_NOEXEC flag at overlayfs mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 4/4] ovl: forbid overlayfs on top of overlayfs
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 3/4] ovl: honor MS_NOSUID flag at overlayfs mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: sa <sa-dev@xxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: sa <sa-dev@xxxxxxxxxx>
- Re: [PATCH] ovl: keep lockdep silent when nest iterate_dir calling of lowerdir
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: keep lockdep silent when nest iterate_dir calling of lowerdir
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Xu Wang <xuw@xxxxxxxxxx>
- Re: btrfs subvolume clone or fork (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- btrfs subvolume tree (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- btrfs subvolume clone or fork (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Xu Wang <xuw@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] vfs: add file_path() helper
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/2] vfs: add seq_file_path() helper
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] vfs: add file_path() helper
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 2/2] vfs: add seq_file_path() helper
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfs: add file_path() helper
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] vfs: add seq_file_path() helper
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] vfs: add file_path() helper
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/8] Security: Provide unioned file support
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #2]
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] SELinux: Create a common helper to determine an inode label [ver #2]
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] SELinux: Stub in copy-up handling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/8] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/8] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/8] SELinux: Stub in copy-up handling
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/8] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/8] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 7/8] SELinux: Create a common helper to determine an inode label
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 8/8] SELinux: Check against union label for file operations
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/8] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/8] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/8] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/8] overlayfs: Make f_path always point to the overlay and f_inode to the underlay
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/8] overlay: Call ovl_drop_write() earlier in ovl_dentry_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [OpenWrt-Devel] Device tree issues with TL-WDR4900 (mpc85xx) and kernel 4.0.1
- From: Roman Yeryomin <leroi.lists@xxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [OpenWrt-Devel] Device tree issues with TL-WDR4900 (mpc85xx) and kernel 4.0.1
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [OpenWrt-Devel] Device tree issues with TL-WDR4900 (mpc85xx) and kernel 4.0.1
- From: Felix Fietkau <nbd@xxxxxxxxxxx>
- Re: [OpenWrt-Devel] Device tree issues with TL-WDR4900 (mpc85xx) and kernel 4.0.1
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Mount doesn't show subvol option for btrfs
- From: james harvey <jamespharvey20@xxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Overlay filesystem doesn't feed "tail -f"
- From: David Howells <dhowells@xxxxxxxxxx>
- Overlay filesystem doesn't feed "tail -f"
- From: james harvey <jamespharvey20@xxxxxxxxx>
- Re: [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Overlay filesystem bug with parallel reads & writes
- From: james harvey <jamespharvey20@xxxxxxxxx>
- Re: [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ovl: don't traverse automount points
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 2/2] ovl: allow distributed fs as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 0/2] ovl: support NFS as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Can ovl_drop_write() be called earlier in ovl_dentry_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Can ovl_drop_write() be called earlier in ovl_dentry_open()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Can ovl_drop_write() be called earlier in ovl_dentry_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Can ovl_drop_write() be called earlier in ovl_dentry_open()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlay: Call ovl_drop_write() earlier in ovl_dentry_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- Can ovl_drop_write() be called earlier in ovl_dentry_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Saied Kazemi <saied@xxxxxxxxxx>
- [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.1
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: NFS lowerdir support in mainline kernel anytime soon?
- From: sa <sa-dev@xxxxxxxxxx>
- Re: NFS lowerdir support in mainline kernel anytime soon?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Bug in overlay FS
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: linux / overlay / OpenWrt / problems with full working dir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: linux / overlay / OpenWrt / problems with full working dir
- From: Bastian Bittorf <bittorf@xxxxxxxxxxxxxx>
- NFS lowerdir support in mainline kernel anytime soon?
- From: sa <sa-dev@xxxxxxxxxx>
- Re: linux / overlay / OpenWrt / problems with full working dir
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: linux / overlay / OpenWrt / problems with full working dir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] unionmount-testsuite: test rmdir of non-empty opaque dir
- From: Vincent Batts <vbatts@xxxxxxxxx>
- Re: [PATCH] unionmount-testsuite: test rmdir of non-empty opaque dir
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] unionmount-testsuite: test rmdir of non-empty opaque dir
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Overalyfs regression in 4.0
- From: Jordi Pujol Palomer <jordipujolp@xxxxxxxxx>
- Re: [PATCH] unionmount-testsuite: test rmdir of non-empty opaque dir
- From: Vincent Batts <vbatts@xxxxxxxxx>
- [PATCH] unionmount-testsuite: test rmdir of non-empty opaque dir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Overalyfs regression in 4.0
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Overalyfs regression in 4.0
- From: Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- Re: use scenario for overlay FS
- From: "A. Wan" <jm@xxxxxxxxxx>
- Re: use scenario for overlay FS
- From: Iyad Qumei <iyad.qumei@xxxxxxx>
- Re: use scenario for overlay FS
- From: "A. Wan" <jm@xxxxxxxxxx>
- use scenario for overlay FS
- From: Iyad Qumei <iyad.qumei@xxxxxxx>
- Re: [PATCH 3/4] Overlayfs: Wrap accesses to ->d_inode on subordinate filesystems
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/4] Overlayfs: Convert S_ISDIR(dentry->d_inode) to d_is_dir()/d_can_lookup()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/4] Overlayfs: Wrap RCU-mode accesses to ->d_inode on subordinate filesystems
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/4] Overlayfs: Wrap accesses to ->d_inode on subordinate filesystems
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/4] Overlayfs: Convert own ->d_inode to d_inode() or d_really_is_positive/negative()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/4] Overlayfs: Convert S_ISDIR(dentry->d_inode) to d_is_dir()/d_can_lookup()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/4] Overlayfs: Wrap ->d_inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/4] Overlayfs: Convert S_ISDIR(dentry->d_inode) to d_is_dir()/d_can_lookup()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- procfs reports unexpected mnt_id and path for overlayfs files
- From: Andrew Vagin <avagin@xxxxxxxx>
- Re: [PATCH 12/15] VFS: Add owner-filesystem positive/negative dentry checks
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 12/15] VFS: Add owner-filesystem positive/negative dentry checks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 12/15] VFS: Add owner-filesystem positive/negative dentry checks
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 02/15] VFS: Fix up missed bits of apparmor to use d_inode()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/15] VFS: Fix up missed bits of lustre to use d_inode()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/15] VFS: AF_UNIX sockets should call mknod on the top layer only
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/15] VFS: Cachefiles should perform fs modifications on the top layer only
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/15] VFS: Fix up debugfs to use d_is_dir() in place of S_ISDIR()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/15] VFS: Impose ordering on accesses of d_inode and d_flags
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/15] VFS: Make pathwalk use d_is_reg() rather than S_ISREG()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/15] VFS: Combine inode checks with d_is_negative() and d_is_positive() in pathwalk
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/15] VFS: Add owner-filesystem positive/negative dentry checks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/15] NFS: Don't use d_inode as a variable name
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/15] VFS: Fix up some ->d_inode accesses in the chelsio driver
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/15] VFS: Fix up missed bits of reiserfs to use d_inode()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/15] configfs: Fix inconsistent use of file_inode() vs file->f_path.dentry->d_inode
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/15] VFS: Fix up missed bits of ecryptfs to use d_inode()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/15] VFS: Fix up audit to use d_backing_inode()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 00/15] VFS: File pinning: pre-script-run fixups
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: d_path() and overlay fs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: d_path() and overlay fs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: d_path() and overlay fs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: d_path() and overlay fs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] ovl: upper fs should not be R/O
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Small code issue
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [overlay] what's the purpose for setting RENAME_EXCHANGE when dest is WHITEOUT dev
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Atom2 <ariel.atom2@xxxxxxxxxx>
- Re: [PATCH] ovl: free file dentry immediately
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Atom2 <ariel.atom2@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Atom2 <ariel.atom2@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: Xu Wang <xuw@xxxxxxxxxx>
- Re: stat inconsistency with overlayfs
- From: hujianyang <hujianyang@xxxxxxxxxx>
- stat inconsistency with overlayfs
- From: Atom2 <ariel.atom2@xxxxxxxxxx>
- Re: [GIT PULL] multi-layer support for overlay filesystem
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] multi-layer support for overlay filesystem
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Support for filesystems with d_revalidate (NFS)
- From: "Caldwell, Blake A." <blakec@xxxxxxxx>
- Re: Support for filesystems with d_revalidate (NFS)
- From: David Howells <dhowells@xxxxxxxxxx>
- [GIT PULL] multi-layer support for overlay filesystem
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Support for filesystems with d_revalidate (NFS)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Support for filesystems with d_revalidate (NFS)
- From: "Caldwell, Blake A." <blakec@xxxxxxxx>
- Re: Support for filesystems with d_revalidate (NFS)
- From: Eric Jones <ejones@xxxxxxxx>
- Support for filesystems with d_revalidate (NFS)
- From: "Caldwell, Blake A." <blakec@xxxxxxxx>
- [PATCH] ovl: free file dentry immediately
- From: 王旭 <xuw2015@xxxxxxxxx>
- multiple lower layers with overlayfs: timeline/ETA?
- From: intrigeri <intrigeri@xxxxxxxx>
- [overlay] what's the purpose for setting RENAME_EXCHANGE when dest is WHITEOUT dev
- From: 王旭 <xuw2015@xxxxxxxxx>
- Small code issue
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: overlayfs lazy unmounts?
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: overlayfs lazy unmounts?
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: overlayfs lazy unmounts?
- From: Eric Jones <ejones@xxxxxxxx>
- Re: Overlayfs, *notify() and file locking...
- From: Jeff Layton <jeff.layton@xxxxxxxxxxxxxxx>
- Overlayfs, *notify() and file locking...
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/3] ovl: upper fs should not be R/O
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH 3/3] ovl: upper fs should not be R/O
- From: "A. Wan" <jm@xxxxxxxxxx>
- Re: [PATCH 3/3] ovl: upper fs should not be R/O
- From: Seunghun Lee <waydi1@xxxxxxxxx>
- Re: [PATCH 1/3] ovl: print error message for invalid mount options
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH 3/3] ovl: upper fs should not be R/O
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH 2/3] ovl: check lowerdir amount for non-upper mount
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH 1/3] ovl: print error message for invalid mount options
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Allow non-workdir mount in overlayfs?
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Allow non-workdir mount in overlayfs?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Allow non-workdir mount in overlayfs?
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: PROBLEM: Mounting multiple lowerdirs with "lowerdir=/tmp/a0,/tmp/a" returns 32
- From: Fabian Sturm <fabian.sturm@xxxxxxx>
- Re: PROBLEM: Mounting multiple lowerdirs with "lowerdir=/tmp/a0,/tmp/a" returns 32
- From: hujianyang <hujianyang@xxxxxxxxxx>
- PROBLEM: Mounting multiple lowerdirs with "lowerdir=/tmp/a0,/tmp/a" returns 32
- From: Fabian Sturm <fabian.sturm@xxxxxxx>
- Re: [PATCH RFC resend] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix condition check for workdir
- From: Seunghun Lee <waydi1@xxxxxxxxx>
- Re: [PATCH RFC resend] ovl: discard independent cursor in readdir()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix condition check for workdir
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH RFC resend] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Multiple lower layers - presedence?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix opaque regression in ovl_lookup
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix kernel panic while mounting overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Prevent rw remount when it should be ro mount
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: Fix condition check for workdir
- From: Seunghun Lee <waydi1@xxxxxxxxx>
- Re: [PATCH] ovl: Prevent rw remount when it should be ro mount
- From: Seunghun Lee <waydi1@xxxxxxxxx>
- Re: [PATCH] ovl: Prevent rw remount when it should be ro mount
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Multiple lower layers - presedence?
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Multiple lower layers - presedence?
- From: intrigeri <intrigeri@xxxxxxxx>
- Re: [PATCH] ovl: Prevent rw remount when it should be ro mount
- From: Seunghun Lee <waydi1@xxxxxxxxx>
- [PATCH] ovl: Fix opaque regression in ovl_lookup
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH] ovl: Fix kernel panic while mounting overlayfs
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Multiple lower layers - presedence?
- From: Fabian Sturm <fabian.sturm@xxxxxxx>
- Re: [PATCH] ovl: Prevent rw remount when it should be ro mount
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [GIT PULL] multi-layer support for overlay filesystem
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] multi-layer support for overlay filesystem
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH RFC resend] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH RFC] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH RFC] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Problem with overlayfs and switch_root
- From: Weng Xuetian <wengxt@xxxxxxxxx>
- [PATCH RFC] ovl: discard independent cursor in readdir()
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH resend] ovl: cleanup redundant blank lines
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: aufs as root vor openvz CT
- From: Sergey Korshunoff <seyko2@xxxxxxxxx>
- [GIT PULL] multi-layer support for overlay filesystem
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: overlayfs /proc paths
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Cursor in readdir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Cursor in readdir
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Cursor in readdir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Cursor in readdir
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] ovl: Cleanup redundant blank lines
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Cleanup redundant blank lines
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH] ovl: Cleanup redundant blank lines
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: Xattr issues with overlayfs
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH] testsuite: overlayfs -> overlay
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Xattr issues with overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: Enable opauqe setting an removing in userspace
- From: hujianyang <hujianyang@xxxxxxxxxx>
- [PATCH] ovl: Use macros to present ovl_xattr
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Xattr issues with overlayfs
- From: hujianyang <hujianyang@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Hans-Peter Jansen <hpj@xxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Hans-Peter Jansen <hpj@xxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem fixes for 3.18
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [RFC/RFT] multi-layer support for overlay filesystem
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlay filesystem fixes for 3.18
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: How to cope with two incompatible overlayfs formats out in the wild
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: How to cope with two incompatible overlayfs formats out in the wild
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: How to cope with two incompatible overlayfs formats out in the wild
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: How to cope with two incompatible overlayfs formats out in the wild
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- How to cope with two incompatible overlayfs formats out in the wild
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Jordi Pujol Palomer <jordipujolp@xxxxxxxxx>
- Re: unionfs-next branch
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: unionfs-next branch
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: unionfs-next branch
- From: David Howells <dhowells@xxxxxxxxxx>
- unionfs-next branch
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Erez Zadok <ezk@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Jordi Pujol Palomer <jordipujolp@xxxxxxxxx>
- Re: [RFC PATCH] overlayfs: support more than one read-only layer
- From: Patrick Frisch <patrick@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/7] SELinux: Stub in copy-up handling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC PATCH] overlayfs: support more than one read-only layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Security: Provide unioned file support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/7] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/7] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/7] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/7] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/7] Security: Pass the union-layer file path into security_file_open()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/7] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 6/7] SELinux: The copy-up operation must have read permission on the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 7/7] SELinux: Check against union and lower labels for file ops on lower files
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: overlayfs 3.18-rc3 General protection fault
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: overlayfs 3.18-rc3 General protection fault
- From: Jordi Pujol Palomer <jordipujolp@xxxxxxxxx>
- Re: overlayfs 3.18-rc3 General protection fault
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- overlayfs 3.18-rc3 General protection fault
- From: Jordi Pujol Palomer <jordipujolp@xxxxxxxxx>
- Re: read-only upperdir since overlayfs.v22 or later
- From: "A. Wan" <jm@xxxxxxxxxx>
- Re: [PATCH] ovl: initialize ->is_cursor
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] ovl: initialize ->is_cursor
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH fixed] vfs: make first argument of dir_context.actor typed
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Overlayfs: ovl_fill_merge() should use container_of() rather than direct cast
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH fixed] vfs: make first argument of dir_context.actor typed
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] Overlayfs: ovl_fill_merge() should use container_of() rather than direct cast
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] Overlayfs: ovl_fill_merge() should use container_of() rather than direct cast
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] Overlayfs: ovl_fill_merge() should use container_of() rather than direct cast
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] Overlayfs: ovl_fill_merge() should use container_of() rather than direct cast
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: Locking problem in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Locking problem in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Locking problem in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Locking problem in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Locking problem in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] ovl: fix check for cursor
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: fix check for cursor
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlay filesystem v25
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlay filesystem v25
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PULL for 3.18] overlay filesystem v24
- From: Woody Suwalski <terraluna977@xxxxxxxxx>
- [PULL for 3.18] overlay filesystem v24
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: aufs as root vor openvz CT
- From: Sergey Korshunoff <seyko2@xxxxxxxxx>
- Re: Race in ovl_copy_up()?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Race in ovl_copy_up()?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: VFS tree for 3.17?
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: VFS tree for 3.17?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Proto-tool to produce graphical schematic of path-taking syscall errors
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: overlayfs v22 on kernel 3.15.5
- From: "Klaus Kreil" <klaus.kreil@xxxxxxxxxxxx>
- Re: overlayfs v22 on kernel 3.15.5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
[Index of Archives]
[Linux Filesystems Devel]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Linux Audio Users]
[Yosemite News]
[Linux Kernel]
[Linux SCSI]