Toggle navigation
Patchwork
Linux MTD development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Seth Forshee
| Archived =
No
| 138 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Needs Review / ACK
Handled Elsewhere
Search
Archived
No
Yes
Both
Delegate
------
Nobody
jgarzik
arnd
ymano
smfrench
jlayton
tseliot
ogasawara
amitk
awhitcroft
mst
dayangkun
jwboyer
jwboyer
colinking
colinking
azummo
dwmw2
rtg
sconklin
smb
aliguori
bradf
galak
galak
demarchi
ms
bhundven
chbs
kengyu
kadlec
pdp
regit
jabk
laforge
laforge
tonyb
sfr
alai
zecke
zecke
__damien__
luka
luka
prafulla@marvell.com
cyrus
PeterHuewe
kiho
jow
jow
ypwong
nico
dedeckeh
dedeckeh
yousong
yousong
tomcwarren
mb
mrchuck
vineetg76
computersforpeace
Noltari
Noltari
patrick_delaunay
ee07b291
ldir
ldir
stefanct
zhouhan
carldani
blp
ffainelli
ffainelli
regXboi
bbrezillon
pravin
mkp
jpettit
mkresin
mkresin
thess
thess
fbarrat
fbarrat
phil
linville
jesse
tjaalton
esben
abrodkin
abrodkin
diproiettod
tbot
stephenfin
vriera
darball1
sammj
ajd
jogo
jogo
bhelgaas
blogic
blogic
tagr
tagr
tagr
oohal
russellb
ptomsich
agraf
joestringer
davem
davem
davem
mwalle
naveen
pchotard
pepe2k
pepe2k
arj
arj
andmur01
amitay
matttbe
pabeni
istokes
aparcar
Ansuel
goliath
martineau
tytso
danielschwierzeck
hs
mariosix
dcaratti
ovsrobot
ovsrobot
aserdean
XiaoYang
khem
tpetazzoni
mkorpershoek
marex
liwang
mmichelson
apritzel
danielhb
groug
npiggin
pareddja
robimarko
atishp
netdrv
mkubecek
stintel
stintel
jkicinski
cpitchen
maximeh
dsa
jstancek
pm215
bpf
jonhunter
shettyg
lorpie01
acelan
wigyori
wigyori
apopple
dja
alexhung
lynxis
lynxis
brgl
brgl
peda
akodanev
narmstrong
981213
0andriy
chunkeey
snowpatch_ozlabs
snowpatch_ozlabs
snowpatch_ozlabs
aivanov
atishp04
shemminger
blocktrron
monstr
vigneshr
mraynal
stewart
stewart
freenix
kabel
rfried
jagan
horms
akumar
jacmet
xypron
wsa
Jaehoon
rsalvaterra
adrianschmutzler
hegdevasant
hegdevasant
prom
bmeng
ukleinek
ukleinek
ag
ehristev
metan
rmilecki
rmilecki
ivanhu
arbab
sjg
kevery
abelloni
Hauke
Hauke
trini
apconole
svanheule
chleroy
pablo
pablo
legoater
legoater
legoater
rw
rw
wbx
bjonglez
ynezz
pevik
aik
sbabic
sbabic
xback
xback
richiejp
dangole
dangole
forty
next_ghost
anuppatel
anuppatel
echaudron
acer
benh
rgrimm
segher
passgat
pratyush
jms
jms
jms
festevam
mans0n
Andes
ruscur
jmberg
linusw
linusw
ymorin
ymorin
numans
jk
jk
jk
jk
xuyang
matthias_bgg
tambarus
kubu
apalos
pbrobinson
imaximets
dceara
strlen
strlen
spectrum
cazzacarna
neocturne
aldot
TIENFONG
mpe
ktraynor
arnout
calebccff
anguy11
nbd
nbd
robh
paulus
stroese
jm
Apply
«
1
2
»
Patch
Series
A/F/R/T
S/W/F
Date
Submitter
Delegate
State
[v4,21/21] fuse: Allow user namespace mounts
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,19/21] fuse: Support fuse filesystems outside of init_user_ns
- - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,18/21] fuse: Add support for pid namespaces
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,16/21] fs: Allow superblock owner to access do_remount_sb()
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,13/21] fs: Update posix_acl support to handle user namespace mounts
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,11/21] cred: Reject inodes with invalid ids in set_create_file_as()
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,10/21] fs: Check for invalid i_uid in may_follow_link()
1 - 1 -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,09/21] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,08/21] userns: Replace in_userns with current_in_userns
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,07/21] selinux: Add support for unprivileged mounts from user namespaces
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,06/21] fs: Treat foreign mounts as nosuid
2 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,05/21] block_dev: Check permissions towards block device inode when mounting
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,04/21] block_dev: Support checking inode permissions in lookup_bdev()
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v4,01/21] fs: fix a posible leak of allocated superblock
1 - - -
-
-
-
2016-04-26
Seth Forshee
Not Applicable
[v3,21/21] fuse: Allow user namespace mounts
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,20/21] fuse: Restrict allow_other to the superblock's namespace or a descendant
2 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,19/21] fuse: Support fuse filesystems outside of init_user_ns
- - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,18/21] fuse: Add support for pid namespaces
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,17/21] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,16/21] fs: Allow superblock owner to access do_remount_sb()
2 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,15/21] fs: Don't remove suid for CAP_FSETID in s_user_ns
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,14/21] fs: Allow superblock owner to change ownership of inodes with unmappable ids
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,13/21] fs: Update posix_acl support to handle user namespace mounts
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,12/21] fs: Refuse uid/gid changes which don't map into s_user_ns
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,11/21] cred: Reject inodes with invalid ids in set_create_file_as()
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,10/21] fs: Check for invalid i_uid in may_follow_link()
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,09/21] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,08/21] userns: Replace in_userns with current_in_userns
2 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,07/21] selinux: Add support for unprivileged mounts from user namespaces
2 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,06/21] fs: Treat foreign mounts as nosuid
2 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,05/21] block_dev: Check permissions towards block device inode when mounting
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,04/21] block_dev: Support checking inode permissions in lookup_bdev()
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,03/21] fs: Allow sysfs and cgroupfs to share super blocks between user namespaces
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,02/21] fs: Remove check of s_user_ns for existing mounts in fs_fully_visible()
- - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[v3,01/21] fs: fix a posible leak of allocated superblock
1 - - -
-
-
-
2016-04-22
Seth Forshee
Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
- - - -
-
-
-
2016-03-28
Seth Forshee
Not Applicable
[RESEND,v2,18/18] fuse: Allow user namespace mounts
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
2 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,16/18] fuse: Support fuse filesystems outside of init_user_ns
- - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,15/18] fuse: Add support for pid namespaces
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb()
2 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as()
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link()
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns
2 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces
2 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid
2 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev()
1 - - -
-
-
-
2016-01-04
Seth Forshee
Not Applicable
[v2,18/18] fuse: Allow user namespace mounts
- - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns
- - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,15/18] fuse: Add support for pid namespaces
- - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb()
2 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as()
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link()
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns
2 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces
2 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid
2 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev()
1 - - -
-
-
-
2015-12-07
Seth Forshee
Superseded
[19/19] fuse: Allow user namespace mounts
- - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[17/19] fuse: Support fuse filesystems outside of init_user_ns
- - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[16/19] fuse: Add support for pid namespaces
- - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[13/19] fs: Allow superblock owner to access do_remount_sb()
2 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[10/19] fs: Update posix_acl support to handle user namespace mounts
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[08/19] cred: Reject inodes with invalid ids in set_create_file_as()
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[07/19] fs: Check for invalid i_uid in may_follow_link()
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[06/19] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[05/19] userns: Replace in_userns with current_in_userns
2 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[04/19] selinux: Add support for unprivileged mounts from user namespaces
2 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[03/19] fs: Treat foreign mounts as nosuid
2 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[02/19] block_dev: Check permissions towards block device inode when mounting
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[01/19] block_dev: Support checking inode permissions in lookup_bdev()
1 - - -
-
-
-
2015-12-02
Seth Forshee
Not Applicable
[v3,7/7] Smack: Handle labels consistently in untrusted mounts
1 - - -
-
-
-
2015-11-17
Seth Forshee
Not Applicable
[v3,6/7] userns: Replace in_userns with current_in_userns
1 - - -
-
-
-
2015-11-17
Seth Forshee
Not Applicable
«
1
2
»