Show patches with: Submitter = Seth Forshee       |   168 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC,6/6] shiftfs: support nested shiftfs mounts shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
[RFC,5/6] shiftfs: add support for posix acls shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
[RFC,4/6] shiftfs: translate uids using s_user_ns from lower fs shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
[RFC,3/6] shiftfs: copy inode attrs up from underlying fs shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
[RFC,2/6] shiftfs: map inodes to lower fs inodes instead of dentries shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
[RFC,1/6] shiftfs: uid/gid shifting bind mount shiftfs fixes and enhancements - - - --- 2018-11-01 Seth Forshee New
shiftfs status and future development - - - --- 2018-06-15 Seth Forshee New
[RESEND] xenbus: Use proc_create_mount_point() to create /proc/xen 1 - - --- 2016-08-30 Seth Forshee New
[2/2] fuse: Add posix ACL support - - - --- 2016-08-29 Seth Forshee New
[1/2] fuse: Use generic xattr ops - - - --- 2016-08-29 Seth Forshee New
[RFC,v3,2/2] fuse: Add posix acl support - - - --- 2016-08-01 Seth Forshee New
[RFC,v3,1/2] fuse: Use generic xattr ops - - - --- 2016-08-01 Seth Forshee New
Hang due to nfs letting tasks freeze with locked inodes - - - --- 2016-07-08 Seth Forshee New
[RFC] fuse: Support posix ACLs - - - --- 2016-06-29 Seth Forshee New
[v4,21/21] fuse: Allow user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - --- 2016-04-26 Seth Forshee New
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-26 Seth Forshee New
[v4,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 2 - - --- 2016-04-26 Seth Forshee New
[v4,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-26 Seth Forshee New
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-26 Seth Forshee New
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2016-04-26 Seth Forshee New
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-26 Seth Forshee New
[v4,10/21] fs: Check for invalid i_uid in may_follow_link() 1 1 - --- 2016-04-26 Seth Forshee New
[v4,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2016-04-26 Seth Forshee New
[v4,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-26 Seth Forshee New
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2016-04-26 Seth Forshee New
[v4,06/21] fs: Treat foreign mounts as nosuid 2 - - --- 2016-04-26 Seth Forshee New
[v4,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2016-04-26 Seth Forshee New
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-26 Seth Forshee New
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - --- 2016-04-26 Seth Forshee New
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-26 Seth Forshee New
[v4,01/21] fs: fix a posible leak of allocated superblock 1 - - --- 2016-04-26 Seth Forshee New
[v3,21/21] fuse: Allow user namespace mounts 1 - - --- 2016-04-22 Seth Forshee New
[v3,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - --- 2016-04-22 Seth Forshee New
[v3,19/21] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-04-22 Seth Forshee New
[v3,18/21] fuse: Add support for pid namespaces 1 - - --- 2016-04-22 Seth Forshee New
[v3,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 1 - - --- 2016-04-22 Seth Forshee New
[v3,16/21] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-04-22 Seth Forshee New
[v3,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2016-04-22 Seth Forshee New
[v3,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids 1 - - --- 2016-04-22 Seth Forshee New
[v3,13/21] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-04-22 Seth Forshee New
[v3,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2016-04-22 Seth Forshee New
[v3,11/21] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-04-22 Seth Forshee New
[v3,10/21] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2016-04-22 Seth Forshee New
[v3,09/21] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2016-04-22 Seth Forshee New
[v3,08/21] userns: Replace in_userns with current_in_userns 2 - - --- 2016-04-22 Seth Forshee New
[v3,07/21] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2016-04-22 Seth Forshee New
[v3,06/21] fs: Treat foreign mounts as nosuid 2 - - --- 2016-04-22 Seth Forshee New
[v3,05/21] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2016-04-22 Seth Forshee New
[v3,04/21] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-04-22 Seth Forshee New
[v3,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces 1 - - --- 2016-04-22 Seth Forshee New
[v3,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible() - - - --- 2016-04-22 Seth Forshee New
[v3,01/21] fs: fix a posible leak of allocated superblock 1 - - --- 2016-04-22 Seth Forshee New
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2016-03-28 Seth Forshee New
[2/2] debugfs: Make automount point inodes permanently empty 1 - - --- 2016-03-09 Seth Forshee New
[1/2] fs: Allow bind mounts with locked children on permaenetly empty directories 1 - - --- 2016-03-09 Seth Forshee New
[RESEND,v2,18/18] fuse: Allow user namespace mounts 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant 2 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,15/18] fuse: Add support for pid namespaces 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns 2 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid 2 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2016-01-04 Seth Forshee New
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2016-01-04 Seth Forshee New
[v2,18/18] fuse: Allow user namespace mounts - - - --- 2015-12-07 Seth Forshee New
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant 1 - - --- 2015-12-07 Seth Forshee New
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-07 Seth Forshee New
[v2,15/18] fuse: Add support for pid namespaces - - - --- 2015-12-07 Seth Forshee New
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs 1 - - --- 2015-12-07 Seth Forshee New
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() 2 - - --- 2015-12-07 Seth Forshee New
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns 1 - - --- 2015-12-07 Seth Forshee New
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes 1 - - --- 2015-12-07 Seth Forshee New
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts 1 - - --- 2015-12-07 Seth Forshee New
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns 1 - - --- 2015-12-07 Seth Forshee New
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() 1 - - --- 2015-12-07 Seth Forshee New
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() 1 - - --- 2015-12-07 Seth Forshee New
[v2,06/18] Smack: Handle labels consistently in untrusted mounts 1 - - --- 2015-12-07 Seth Forshee New
[v2,05/18] userns: Replace in_userns with current_in_userns 2 - - --- 2015-12-07 Seth Forshee New
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces 2 - - --- 2015-12-07 Seth Forshee New
[v2,03/18] fs: Treat foreign mounts as nosuid 2 - - --- 2015-12-07 Seth Forshee New
[v2,02/18] block_dev: Check permissions towards block device inode when mounting 1 - - --- 2015-12-07 Seth Forshee New
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() 1 - - --- 2015-12-07 Seth Forshee New
fs: Drop CAP_SYS_RAWIO requirement for FIBMAP 1 - - --- 2015-12-05 Seth Forshee New
[19/19] fuse: Allow user namespace mounts - - - --- 2015-12-02 Seth Forshee New
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant 1 - - --- 2015-12-02 Seth Forshee New
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-02 Seth Forshee New
[16/19] fuse: Add support for pid namespaces - - - --- 2015-12-02 Seth Forshee New
« 1 2 »