Linux Union Filesystem
[Prev Page][Next Page]
- Re: [PATCH v3 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix info leak in ovl_lookup_temp()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: running binaries under doubly stacked overlayfs
- From: Richard Cochran <richardcochran@xxxxxxxxx>
- running binaries under doubly stacked overlayfs
- From: Richard Cochran <richardcochran@xxxxxxxxx>
- Re: [PATCH v3 0/4] ovl: efficient copy up by reflink
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: avoid setting uninitialized creds
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: avoid setting uninitialized creds
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] ovl: Fix info leak in ovl_lookup_temp()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] ovl: Fix info leak in ovl_lookup_temp()
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v3 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 0/4] ovl: efficient copy up by reflink
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 3/4] vfs: allow vfs_copy_file_range() across file systems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 1/4] vfs: allow vfs_clone_file_range() across mount points
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 3/4] vfs: allow vfs_copy_file_range() across file systems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] vfs: allow vfs_copy_file_range() across file systems
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [miklos-vfs:readlink 16/17] ERROR: "vfs_get_link" [fs/overlayfs/overlay.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [miklos-vfs:readlink 17/17] ERROR: "vfs_get_link" [fs/ecryptfs/ecryptfs.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 3/4] vfs: allow vfs_copy_file_range() across file systems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 4/4] ovl: use vfs_copy_file_range() to copy up file data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 2/4] ovl: use vfs_clone_file_range() for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 1/4] vfs: allow vfs_clone_file_range() across mount points
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 0/4] ovl: efficient copy up by reflink
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH v1] ovl: use copy_file_clone for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fix for 4.8-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fix for 4.8-rc5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fix for 4.8-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fix for 4.8-rc5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fix for 4.8-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs fix for 4.8-rc5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] ovl: use copy_file_range for copy up if possible
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH] ovl: use copy_file_range for copy up if possible
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] generic: simple permission check on hard links
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH] generic: simple permission check on hard links
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: During copy up, switch to mounter's creds early
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: Fix for filesystems without POSIX ACL support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: Fix for filesystems without POSIX ACL support
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Richard Weinberger <richard@xxxxxx>
- overlayfs + ubifs: power cut results in "failed to create directory /overlay/work/work (errno: 17); mounting read-only"
- From: Rafał Miłecki <zajec5@xxxxxxxxx>
- Re: overlayfs stopped working in v4.8-rc4-359-g4b30b6d
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Bug#836211: dpkg: Cannot upgrade some packages on overlayfs: Invalid cross-device link
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- overlayfs stopped working in v4.8-rc4-359-g4b30b6d
- From: ziegler@xxxxxxxxxxxxxxx
- Re: Bug#836211: dpkg: Cannot upgrade some packages on overlayfs: Invalid cross-device link
- From: Guillem Jover <guillem@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.8-rc4
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Bug#836211: dpkg: Cannot upgrade some packages on overlayfs: Invalid cross-device link
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2 2/2] overlay: copy-up lowerdir which has opaque xattr set
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 1/2] common/rc: introduce _overlay_mount_dirs helper
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] overlay: sgid inheritance over whiteout
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] overlay: copy-up lowerdir which has opaque xattr set
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] common/rc: introduce _overlay_mount_dirs helper
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlay: sgid inheritance over whiteout
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] ovl: fix sgid inhertance over whiteout
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- Re: [PATCH] ovl: fix sgid inhertance over whiteout
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: fix sgid inhertance over whiteout
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- [PATCH] overlay: sgid inheritance over whiteout
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 3/4] ovl: Switch to generic_removexattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] lustre: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v4 20/20] vfs: Remove {get,set,remove}xattr inode operations
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v4 13/20] vfs: Move xattr_resolve_name to the front of fs/xattr.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 07/20] hfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 16/20] libfs: Use IOP_XATTR flag for empty directory handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 14/20] vfs: Add IOP_XATTR inode operations flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 12/20] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 19/20] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 17/20] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 18/20] vfs: Check for the IOP_XATTR flag in listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 20/20] vfs: Remove {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 08/20] kernfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 09/20] sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 10/20] sockfs: Get rid of getxattr iop
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 11/20] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 15/20] vfs: Use IOP_XATTR flag for bad-inode handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 06/20] jffs2: Remove jffs2_{get,set,remove}xattr macros
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 05/20] xattr: Remove unnecessary NULL attribute name check
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 04/20] ovl: Switch to generic_getxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 03/20] ovl: Switch to generic_removexattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 02/20] ovl: Get rid of ovl_xattr_noacl_handlers array
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 01/20] ovl: Fix OVL_XATTR_PREFIX
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v4 00/20] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 4/4] ovl: Switch to generic_getxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 3/4] ovl: Switch to generic_removexattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 2/4] ovl: Get rid of ovl_xattr_noacl_handlers array
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 1/4] ovl: Fix OVL_XATTR_PREFIX
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH 0/4] ovl: xattr fixes / improvements
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] ovl: fix spelling mistake: "directries" -> "directories"
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Make dir inode always point to the underlay
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Make dir inode always point to the underlay
- Re: [PATCH] overlayfs: Make dir inode always point to the underlay
- Re: [PATCH] overlayfs: Make dir inode always point to the underlay
- From: Vito Caputo <vito.caputo@xxxxxxxxxx>
- Re: Stable inode numbers
- From: Vito Caputo <vito.caputo@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Make dir inode always point to the underlay
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: Make dir inode always point to the underlay
- Re: [PATCH 1/2] common/rc: introduce _overlay_mount_dirs helper
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: retry: [PATCH] ovl: fix inode in utimes_common on overlayfs.
- From: Zhang AiHua <zhangaihua1@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: retry: [PATCH] ovl: fix inode in utimes_common on overlayfs.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH v2 2/2] overlay: copy-up lowerdir which has opaque xattr set
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 1/2] common/rc: introduce _overlay_mount_dirs helper
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] overlay: copy-up lowerdir which has opaque xattr set
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] overlay: copy-up lowerdir which has opaque xattr set
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlay: copy-up lowerdir which has opaque xattr set
- From: Xiong Zhou <xzhou@xxxxxxxxxx>
- retry: [PATCH] ovl: fix inode in utimes_common on overlayfs.
- From: Zhang AiHua <zhangaihua1@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] overlay: copy-up lowerdir which has opaque xattr set
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] ovl: fix copy up opaque directory
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: whiteout of lower dir should't dispaly in merge dir.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: whiteout of lower dir should't dispaly in merge dir.
- From: <zhangaihua1@xxxxxxxxxx>
- [PATCH] ovl: fix copy up opaque directory
- From: Derek McGowan <dmcg@xxxxxxxxx>
- Re: [GIT PULL] fix overlayfs deadlock in file_remove_privs()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] fix overlayfs deadlock in file_remove_privs()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs update for 4.8
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs update for 4.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.8
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: fix inode in utimes_common on overlayfs.
- From: <zhangaihua1@xxxxxxxxxx>
- Re: Stable inode numbers
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Stable inode numbers
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] overlay: truncate running binaries from lower and upper dirs
- From: Xiong Zhou <xzhou@xxxxxxxxxx>
- Re: Stable inode numbers
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: Stable inode numbers
- From: Vito Caputo <vito.caputo@xxxxxxxxxx>
- [PATCH 3/3] overlay: truncate running binaries from lower and upper dirs
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 2/3] overlay: remove stale file from upperdir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 1/3] overlay: dump overlay private xattr
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: Stable inode numbers
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Stable inode numbers
- From: Vito Caputo <vito.caputo@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.7-final
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Stable inode numbers
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Stable inode numbers
- From: Vito Caputo <vito.caputo@xxxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/3] fix overlayfs locks and leases
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] fix overlayfs locks and leases
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [RFC PATCH v2 2/3] vfs: make argument of d_real_inode() const
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [RFC PATCH v2 1/3] locks: fix file locking on overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [RFC PATCH v2 3/3] vfs: do get_write_access() on upper layer of overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH] ovl: support ltp/testcase/bin/inotify04 on overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] ovl: support ltp/testcase/bin/inotify04 on overlayfs
- From: <zhangaihua1@xxxxxxxxxx>
- Re: [RFC PATCH] locks: fix file locking on overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC PATCH] locks: fix file locking on overlayfs
- From: Jeff Layton <jlayton@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] locks: fix file locking on overlayfs
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH] locks: fix file locking on overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [RFC PATCH] locks: fix file locking on overlayfs
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- [RFC PATCH] fsnotify: support overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [RFC PATCH] vfs: update ovl inode before relatime check
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- [RFC PATCH] locks: fix file locking on overlayfs
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: linux-next: Tree for Jul 14 (overlayfs)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] security, overlayfs: provide copy up security hook for unioned files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] security, overlayfs: Provide hook to correctly label newly created files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [no subject]
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/9] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [miklos-vfs:overlayfs-next 19/24] ERROR: "posix_acl_from_xattr" [fs/overlayfs/overlay.ko] undefined!
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH] ovl: fix link error without POSIX ACL
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] Fix overlayfs inotify interaction
- From: Andrey Melnikov <temnota.am@xxxxxxxxx>
- [PATCH] ovl: fix link error without POSIX ACL
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] Fix overlayfs inotify interaction
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] Fix overlayfs inotify interaction
- From: Andrey Melnikov <temnota.am@xxxxxxxxx>
- Re: [PATCH] Fix overlayfs inotify interaction
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH -next] ovl: remove duplicated include from super.c
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: WARNING: CPU: 2 PID: 989 at fs/overlayfs/super.c:325 ovl_d_real+0x91/0xd0 [overlay]
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 8/9] overlayfs: Dilute permission checks on lower only if not special file
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 9/9] overlayfs: Append MAY_READ when diluting write checks
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/9] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 7/9] selinux: Implement dentry_create_files_as() hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] security, overlayfs: Provide hook to correctly label newly created files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] security, overlayfs: Provide hook to correctly label newly created files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] selinux: Pass security pointer to determine_inode_label()
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 4/9] selinux: Implementation for inode_copy_up_xattr() hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] selinux: Implementation for inode_copy_up() hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] security, overlayfs: provide copy up security hook for unioned files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 4/9] selinux: Implementation for inode_copy_up_xattr() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [RFC PATCH 0/9][V3] Overlayfs SELinux Support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 3/9] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 5/9] selinux: Pass security pointer to determine_inode_label()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 8/9] overlayfs: Dilute permission checks on lower only if not special file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 7/9] selinux: Implement dentry_create_files_as() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/9] selinux: Implementation for inode_copy_up() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 9/9] overlayfs: Append MAY_READ when diluting write checks
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 6/9] security, overlayfs: Provide hook to correctly label newly created files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 1/9] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- WARNING: CPU: 2 PID: 989 at fs/overlayfs/super.c:325 ovl_d_real+0x91/0xd0 [overlay]
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH] Fix overlayfs inotify interaction
- From: Andrey Melnikov <temnota.am@xxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/7] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/7] security, overlayfs: provide copy up security hook for unioned files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [kbuild-all] [PATCH 3/7] security, overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Fengguang Wu <lkp@xxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [miklos-vfs:overlayfs-next 14/15] DockBook: fs/inode.c:1635: warning: No description found for parameter 'rcu'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 7/7] selinux: Implement dentry_create_files_as() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 3/7] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 6/7] security, overlayfs: Provide hook to correctly label newly created files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/7] selinux: Implementation for inode_copy_up() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 4/7] selinux: Implementation for inode_copy_up_xattr() hook
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 1/7] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 5/7] selinux: Pass security pointer to determine_inode_label()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [RFC PATCH 0/7][V2] Overlayfs SELinux Support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] ovl:support fsinotify on overlayfs.
- From: <zhangaihua1@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH -next] ovl: remove duplicated include from super.c
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Paul Moore <pmoore@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 3/5] selinux: Pass security pointer to determine_inode_label()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: Pass security pointer to determine_inode_label()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 3/5] selinux: Pass security pointer to determine_inode_label()
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 5/5] overlayfs: Use vfs_getxattr_noperm() for real inode
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 4/5] overlayfs: Correctly label newly created file over whiteout
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 0/5][RFC] Overlayfs SELinux Support
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 1/5] security, overlayfs: provide copy up security hook for unioned files
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/5] security,overlayfs: Provide security hook for copy up of xattrs for overlay file
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.7-rc5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: Warn instead of error if d_type is not supported
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] locks: use file_inode()
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] locks: use file_inode()
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH] locks: use file_inode()
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: [PATCH 2/2] overlay: remove dir which contains whiteout from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH] Fix overlayfs inotify interaction
- From: "Andrey Jr. Melnikov" <temnota.am@xxxxxxxxx>
- Re: [PATCH 2/2] overlay: remove dir which contains whiteout from lower dir
- From: Xiong Zhou <xzhou@xxxxxxxxxx>
- Re: [GIT PULL for 4.8] consolidate vfs API for overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL for 4.8] consolidate vfs API for overlayfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: NFS/ro: mv: cannot move 'foo' to a subdirectory of itself, 'bar'
- From: André Roth <neolynx@xxxxxxxxx>
- Re: NFS/ro: mv: cannot move 'foo' to a subdirectory of itself, 'bar'
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: retry:[PATCH] fix error: a bin file can truncate itself while running on overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/2] overlay: dentry leak for default_permissions mount option
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 2/2] overlay: remove dir which contains whiteout from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: Problem with two overlayed 9p filesystems
- From: Alessio Igor Bogani <alessioigorbogani@xxxxxxxxx>
- [GIT PULL for 4.8] consolidate vfs API for overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Problem with two overlayed 9p filesystems
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Problem with two overlayed 9p filesystems
- From: Alessio Igor Bogani <alessioigorbogani@xxxxxxxxx>
- retry:[PATCH] fix error: a bin file can truncate itself while running on overlayfs
- From: Zhang AiHua <zhangaihua1@xxxxxxxxxx>
- Re: [PATCH 1/3] overlay: test visible whiteout issue after rename
- From: Xiong Zhou <xzhou@xxxxxxxxxx>
- [PATCH 3/3] overlay: create new file over whiteout
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 1/3] overlay: test visible whiteout issue after rename
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 2/3] overlay: getcwd() after a failed rmdir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH] fix error: a bin file can truncate itself while running on overlayfs
- From: <zhangaihua1@xxxxxxxxxx>
- Re: [PATCH] fix error: a bin file can truncate itself while running at overlayfs.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] fix error: a bin file can truncate itself while running at overlayfs.
- From: <zhangaihua1@xxxxxxxxxx>
- Re: NFS/ro: mv: cannot move 'foo' to a subdirectory of itself, 'bar'
- From: André Roth <neolynx@xxxxxxxxx>
- Re: NFS/ro: mv: cannot move 'foo' to a subdirectory of itself, 'bar'
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.7-rc3
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: fix uid/gid when creating over whiteout
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] ovl: fix uid/gid when creating over whiteout
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: fix uid/gid when creating over whiteout
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] ovl: fix uid/gid when creating over whiteout
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- NFS/ro: mv: cannot move 'foo' to a subdirectory of itself, 'bar'
- From: André Roth <neolynx@xxxxxxxxx>
- WARNING and OOPS using 9p with overlay
- From: Alessio Igor Bogani <alessioigorbogani@xxxxxxxxx>
- Is selinux expected to work on overlayfs ?
- From: Badhri Jagan Sridharan <badhri@xxxxxxxxxx>
- ext4 with encryption, error "overlayfs: filesystem on [...] not supported as upperdir"
- From: Andrea <ass3mbler@xxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/17] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v3 00/17] Xattr inode operation removal
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v3 00/17] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 00/17] Xattr inode operation removal
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v3 00/17] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 17/17] vfs: Remove {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 16/17] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 13/17] libfs: Use IOP_XATTR flag for empty directory handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 15/17] vfs: Check for the IOP_XATTR flag in listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 14/17] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 12/17] vfs: Use IOP_XATTR flag for bad-inode handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 11/17] vfs: Add IOP_XATTR inode operations flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 10/17] vfs: Move xattr_resolve_name to the front of fs/xattr.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 09/17] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 08/17] overlayfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 07/17] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 06/17] sockfs: Get rid of getxattr iop
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 01/17] xattr: Remove unnecessary NULL attribute name check
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 05/17] sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 04/17] kernfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 03/17] hfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 02/17] jffs2: Remove jffs2_{get,set,remove}xattr macros
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 00/17] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [GIT PULL resend] vfs update for 4.7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [miklos-vfs:overlayfs-next 6/6] fs/overlayfs/inode.c:145:4: error: label 'out_dput' used but not defined
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- Re: [PATCH v2 10/18] evm: Turn evm_update_evmxattr into void function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/18] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 10/18] evm: Turn evm_update_evmxattr into void function
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Do d_type check only if work dir creation was successful
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH v2 18/18] vfs: Remove {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 17/18] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 16/18] vfs: Check for the IOP_XATTR flag in listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 15/18] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 10/18] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 14/18] libfs: Use IOP_XATTR flag for empty directory handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 13/18] vfs: Use IOP_XATTR flag for bad-inode handling
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 12/18] vfs: Add IOP_XATTR inode operations flag
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 11/18] vfs: Move xattr_resolve_name to the front of fs/xattr.c
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 09/18] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 08/18] overlayfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 07/18] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 06/18] sockfs: Get rid of getxattr iop
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 05/18] sockfs: getxattr: Fail with -EOPNOTSUPP for invalid attribute names
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 04/18] kernfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 03/18] hfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 02/18] jffs2: Remove jffs2_{get,set,remove}xattr macros
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 01/18] xattr: Remove unnecessary NULL attribute name check
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v2 00/18] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH v3 1/1] ovl: setxattr: don't deadlock when called from ima_fix_xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Miklos Szeredi <mszeredi@xxxxxxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- 45aebeaf4f67 "ovl: Ensure upper filesystem supports d_type" breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 1/1] ovl: setxattr: avoid deadlock when setting IMA xattr.
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Deadlock with overlayfs over and IMA/EVM-enabled filesystem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs.
- From: Krisztian Litkey <kli@xxxxxx>
- [PATCH 1/1] ovl: setxattr: avoid deadlock when writing IMA xattrs.
- From: Krisztian Litkey <kli@xxxxxx>
- Don't deadlock when setting IMA extended attributes
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [RFC 8/8] xattr: Remove generic xattr handlers
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 5/8] xattr: Add per-inode xattr handlers as a new inode operation
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Can overlayfs be used for the filesystem root?
- From: Badhri Jagan Sridharan <badhri@xxxxxxxxxx>
- Deadlock with overlayfs over and IMA/EVM-enabled filesystem
- From: Krisztian Litkey <kli@xxxxxx>
- Re: [PATCH] xattr handlers: fixup generic_listxattr
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [PATCH] xattr handlers: fixup generic_listxattr
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL (resend) ] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: James Simmons <jsimmons@xxxxxxxxxxxxx>
- Re: [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: James Morris <jmorris@xxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.6-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/8] Xattr inode operation removal
- From: Andreas Dilger <adilger@xxxxxxxxx>
- [RFC 8/8] xattr: Remove generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 7/8] xattr: Stop calling {get,set,remove}xattr inode operations
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 6/8] xattr: Add __vfs_{get,set,remove}xattr helpers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 5/8] xattr: Add per-inode xattr handlers as a new inode operation
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 4/8] evm: Turn evm_update_evmxattr into void function
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 3/8] fuse: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 2/8] overlayfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 1/8] ecryptfs: Switch to generic xattr handlers
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- [RFC 0/8] Xattr inode operation removal
- From: Andreas Gruenbacher <agruenba@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Sasha Levin <sasha.levin@xxxxxxxxxx>
- Backport a Security Fix for CVE-2015-8660 to v4.1
- From: Yuki Machida <machida.yuki@xxxxxxxxxxxxxx>
- [PATCH v2] fs: overlayfs: override creds with the ones from the superblock mounter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- Re: [PATCH] fs: overlayfs: override creds with the ones from the superblock mounter (fwd)
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH] fs: overlayfs: override creds with the ones from the superblock mounter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- [PATCH] fs: overlayfs: remove debug parameter
- From: Antonio Murdaca <amurdaca@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Marc Haber <mh+linux-kernel@xxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: William Dauchy <wdauchy@xxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2] fs: add file_dentry()
- From: William Dauchy <wdauchy@xxxxxxxxx>
- [PATCH v2] fs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 2/2] ovl: ignore permissions on underlying lookup
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/2] vfs: export lookup_hash() to modules
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] vfs: rename: check backing inode being equal
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.6
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] vfs: update atime using file->f_inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] fs: overlayfs: fixed coding style warning
- From: Sohom Bhattacharjee <soham.bhattacharjee15@xxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] Set nosuid, noexec, nodev if any lowerdirs have it
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] Set nosuid, noexec, nodev if any lowerdirs have it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- ext4_file_open: Inconsistent encryption contexts (commit ff978b09f973) breaking Docker
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: Unmounting lower filesystem while overlayfs uses it
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: Unmounting lower filesystem while overlayfs uses it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Unmounting lower filesystem while overlayfs uses it
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] overlayfs: Ensure upper filesystem supports d_type
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Robert Święcki <robert@xxxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 2/2] nfs: use file_dentry()
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfs: add file_dentry()
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- [PATCH 2/2] nfs: use file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/2] vfs: add file_dentry()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix hardlinks in overlay
- From: Alexander Morozov <alexandr.morozov@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix hardlinks in overlay
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/4] ovl: honor flag MS_SILENT at mount
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [GIT PULL] overlayfs fixes for 4.5-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] ovl: fix working on distributed fs as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Trond Myklebust <trond.myklebust@xxxxxxxxxxxxxxx>
- [PATCH 3/3] nfs: Store and use inode in nfs_open_context
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 2/3] vfs: Add d_select_inode for overlayfs translation
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 1/3] ovl: Add d_select_inode to reval dentry operations
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH 0/3] Fix overlayfs with NFS as lowerdir
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Nazarov Sergey <s-nazarov@xxxxxxxxx>
- Re: [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [BUG] ltp/fcntl33 triggers NULL pointer dereference on overlayfs
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- [PATCH v2 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Ensure upper filesystem supports d_type
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- overlayfs: support ecryptfs upperdir
- From: Andin Bren <andin.bren@xxxxxxxxx>
- overlayfs: DAC override capability for ovl_lookup_real(lowerdir)?
- From: Nazarov Sergey <s-nazarov@xxxxxxxxx>
- Re: [PATCH] ovl: fix working on distributed fs as lower layer
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Overlayfs regression: NFS as lowerdir fails to read any file
- From: radioconfusion@xxxxxxxxx
- BUG? Missing dput() in ovl_permissions().
- From: Eric Jones <ejones@xxxxxxxx>
- [PATCH] ovl: Add d_select_inode op to ovl_reval_dentry_operations
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: Problem writing to ovl with CIFS as lower dir
- From: Nikolay Borisov <n.borisov@xxxxxxxxxxxxxx>
- Re: Problem writing to ovl with CIFS as lower dir
- From: David Howells <dhowells@xxxxxxxxxx>
- Problem writing to ovl with CIFS as lower dir
- From: Nikolay Borisov <kernel@xxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH] overlay: test permission checks within upper layer
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlay: check visible whiteouts in pure-upper directory
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] overlay: test permission checks within upper layer
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] overlay: check visible whiteouts in pure-upper directory
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] overlay: test permission checks within upper layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: detect distributed fs also by looking into default dentry operations
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: fix working on distributed fs as lower layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: copy MS_POSIXACL flag from upper layer
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: copy new uid/gid into overlayfs runtime inode
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] vfs: update atime using file->f_inode
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: ignore lower entries when checking purity of non-directory entries
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH 1/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] OverlayFS: Fix checking permissions during lookup.
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] overlay: Clear stale ->numlower state over rename operation
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: Unreliable permission checking with OverlayFS
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- Unreliable permission checking with OverlayFS
- From: Ignacy Gawędzki <ignacy.gawedzki@xxxxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.5
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Overlayfs with NFS lower layer is still not working
- From: "arnaud.mouiche@xxxxxxxxxxx" <arnaud.mouiche@xxxxxxxxxxx>
- Re: GPF in overlay with ovl_rename2
- From: Robert Święcki <robert@xxxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v2 3/3] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH v2 2/3] common: export overlay lower/upper/work directories as variables
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH v2 1/3] common: remove all files in $SCRATCH_DEV for overlayfs in _scratch_cleanup_files()
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- Re: [PATCH 2/2] overlay: test copy up files from lower dir
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH] ovl: Do not leave whiteout during unlink/rmdir if parent does not have merge property
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 2/2] overlay: test copy up files from lower dir
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH 1/2] common: remove all files in $SCRATCH_DEV for overlayfs in _scratch_cleanup_files()
- From: Eryu Guan <eguan@xxxxxxxxxx>
- [PATCH] ovl: fix getcwd() failure after unsuccessful rmdir
- From: Rui Wang <rui.y.wang@xxxxxxxxx>
- [PATCH] New module param allow_userns for allow unprivileged to mount under userns.
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH 1/1] overlayfs: restrict structs visible in current code module
- From: zhuyj <zyjzyj2000@xxxxxxxxx>
- [PATCH 1/1] overlayfs: restrict structs visible in current code module
- From: <zyjzyj2000@xxxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- [PATCH 2/2] ovl: check POSIX ACL support aginst upper layer
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- [PATCH 1/2] ovl: also update attr on ovl level inode in ovl_setattr()
- From: Eryu Guan <guaneryu@xxxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH] overlayfs: include linux/pagemap.h for PAGE_CACHE_SIZE
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: include linux/pagemap.h for PAGE_CACHE_SIZE
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Question about overlayfs over fs not support dirent::ftype
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Question about overlayfs over fs not support dirent::ftype
- From: Linzhe Lee <slayercat.subscription@xxxxxxxxx>
- Re: [PATCH 2/2] fs/overlay: use same inodes for hardlinks
- From: Alexander Morozov <alexandr.morozov@xxxxxxxxxx>
- Re: [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH] ovl: check dentry positiveness in ovl_cleanup_whiteouts()
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: move super block magic number to magic.h
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: use a minimal buffer in ovl_copy_xattr
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Changes to underlying filesystems in overlayfs
- From: Arseny Sher <sher-ars@xxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Jeff Mahoney <jeffm@xxxxxxxx>
- [PATCH] overlayfs: move super block magic number to magic.h
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] overlayfs bug fixes for 4.3-rc7
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH] overlayfs: use a minimal buffer in ovl_copy_xattr
- From: vcaputo@xxxxxxxxxxxxxxxxx
- Re: overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Eric Van Hensbergen <ericvh@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: what inodes/dentries are safe to use?
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [V9fs-developer] [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: Issue: With an OverlayFS that has Btrfs as the upper layer, removal of directories silently fails
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Pass O_LARGEFILE unconditionally in ovl_copy_up_data()
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH RESEND 1/2] ovl: free stack of paths in ovl_fill_super
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [RFC][PATCH] ovl: count subdirs to get the correct link count
- From: Zheng Liu <gnehzuil.liu@xxxxxxxxx>
- overlayfs: regression bug from 4bacc9c9 (Make f_path always point to the overlay and f_inode to the underlay)
- From: Alban Crequy <alban.crequy@xxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Dominique Martinet <asmadeus@xxxxxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- Re: [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [RFC PATCH] fstests: generic: Test that fsync works on file in overlayfs merged directory
- From: Roman Lebedev <lebedev.ri@xxxxxxxxx>
- kernel BUG when fsync'ing file in a overlayfs merged dir, located on btrfs
- From: Roman Lebedev <lebedev.ri@xxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Security: Provide unioned file support
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH 0/5] Security: Provide unioned file support
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/5] Security: Provide copy-up security hooks for unioned files
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/5] Overlayfs: Use copy-up security hooks
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/5] SELinux: Stub in copy-up handling
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/5] SELinux: Handle opening of a unioned file
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/5] SELinux: Check against union label for file operations
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] overlayfs: Pass O_LARGEFILE unconditionally in ovl_copy_up_data()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: overlayfs + linux user namespace issue
- From: Alexey Naidyonov <alexey.naidyonov@xxxxxxxxx>
- Re: overlayfs + linux user namespace issue
- From: Andy Whitcroft <apw@xxxxxxxxxxxxx>
- overlayfs + linux user namespace issue
- From: Alexey Naidyonov <alexey.naidyonov@xxxxxxxxx>
- Re: Fwd: overlayfs+selinux error: OPNOTSUPP
- From: Matthew Cengia <mattcen@xxxxxxxxxxxx>
- Re: Fwd: overlayfs+selinux error: OPNOTSUPP
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: [PATCH 2/2] overlayfs: Fix dentry reference leak
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Fwd: overlayfs+selinux error: OPNOTSUPP
- From: Matthew Cengia <mattcen@xxxxxxxxxxxx>
- [PATCH 1/2] overlayfs: Conditionally use O_LARGEFILE in ovl_copy_up()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] overlayfs: Fix dentry reference leak
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] ovl: add O_LARGEFILE flag when copyup files
- From: David Howells <dhowells@xxxxxxxxxx>
- [RESEND][PATCH] ovl: add O_LARGEFILE flag when copyup files
- [PATCH] ovl: add O_LARGEFILE flag when copyup files
- Overlay issue when truncating files over 2G
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- [PATCH 2/2] ovl: ovl_rename2 should do d_move by itself
- [PATCH 1/2] fs: export d_exchange for the fs with FS_RENAME_DOSE_D_MOVE
- [PATCH RESEND 1/2] ovl: free stack of paths in ovl_fill_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH RESEND 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Issue: With an OverlayFS that has Btrfs as the upper layer, removal of directories silently fails
- From: Neal Gompa <ngompa@xxxxxxxxxxxxxxxxx>
- Re: [V9fs-developer] 9p/overlayfs: read error when reading an empty file
- From: Dominique Martinet <dominique.martinet@xxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- 9p/overlayfs: read error when reading an empty file
- From: Vincent Bernat <bernat@xxxxxxxx>
- Re: How to specify the mount points for multiple lower layers?
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- Re: How to specify the mount points for multiple lower layers?
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- How to specify the mount points for multiple lower layers?
- From: Alkis Georgopoulos <alkisg@xxxxxxxxx>
- Re: [PATCH 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ovl: free stack of paths in ovl_fill_super
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ovl: free stack of paths in ovl_fill_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 2/2] ovl: free lower_mnt array in ovl_put_super
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 2/8] overlayfs: Make f_path always point to the overlay and f_inode to the underlay
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 2/8] overlayfs: Make f_path always point to the overlay and f_inode to the underlay
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- overlayfs: Problems with NFS as lower filesystem
- From: Dominik Paulus <lkml@xxxxxxxxxxxxxxxxx>
- [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: procfs reports unexpected mnt_id and path for overlayfs files
- From: Saied Kazemi <saied@xxxxxxxxxx>
- [GIT PULL] overlayfs update for 4.2
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 1/4] ovl: honor flag MS_SILENT at mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 2/4] ovl: honor MS_NOEXEC flag at overlayfs mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 4/4] ovl: forbid overlayfs on top of overlayfs
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- [PATCH 3/4] ovl: honor MS_NOSUID flag at overlayfs mount
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: sa <sa-dev@xxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 0/2] ovl: support NFS as lower layer
- From: sa <sa-dev@xxxxxxxxxx>
- Re: [PATCH] ovl: keep lockdep silent when nest iterate_dir calling of lowerdir
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- [PATCH] ovl: keep lockdep silent when nest iterate_dir calling of lowerdir
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Xu Wang <xuw@xxxxxxxxxx>
- Re: btrfs subvolume clone or fork (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- btrfs subvolume tree (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- btrfs subvolume clone or fork (btrfs-progs feature request)
- From: james harvey <jamespharvey20@xxxxxxxxx>
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Konstantin Khlebnikov <koct9i@xxxxxxxxx>
- Re: [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Xu Wang <xuw@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- [overlayfs] lockdep splat after mounting overlayfs over overlayfs
- From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] SELinux: Create a common helper to determine an inode label [ver #3]
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: [PATCH] overlayfs: Warn on copy up if a process has a R/O fd open to the lower file
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Jan Olszak <j.olszak@xxxxxxxxxxx>
- Re: Optional switching off cow in overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
[Index of Archives]
[Linux Filesystems Devel]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Linux Audio Users]
[Yosemite News]
[Linux Kernel]
[Linux SCSI]