{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":301976571,"defaultBranch":"master","name":"linux","ownerLogin":"mihalicyn","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2020-10-07T08:44:37.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/227844?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1725375685.0","currentOid":""},"activityList":{"items":[{"before":"23ff9c214c43ea8470c3f07d03b7a68a34a73a5f","after":"8a17792871f537cc6836bccc8b6676793f3807fb","ref":"refs/heads/isolated_userns_lpc","pushedAt":"2024-09-17T08:40:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"proc: add isolated GID to /proc//status\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"proc: add isolated GID to /proc/<pid>/status"}},{"before":"32bad93794719fbd4702635f0ffc70e70afde6ba","after":"8a17792871f537cc6836bccc8b6676793f3807fb","ref":"refs/heads/isolated_userns","pushedAt":"2024-09-17T08:39:55.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"proc: add isolated GID to /proc//status\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"proc: add isolated GID to /proc/<pid>/status"}},{"before":"611bc91f9e8701f99719c4280ac416d3bef8392a","after":"29d2f6c390f953ea41a034dac179cfaa542051a8","ref":"refs/heads/isolated-userns-dev","pushedAt":"2024-09-17T08:38:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"[DEBUG ONLY] add isol_debug sysctl\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"[DEBUG ONLY] add isol_debug sysctl"}},{"before":"bc83b4d1f08695e85e85d36f7b803da58010161d","after":"303ba85c60442ecdca77231f227126a83ba39bd3","ref":"refs/heads/master","pushedAt":"2024-09-17T08:38:16.000Z","pushType":"push","commitsCount":3054,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"Merge tag 'spi-v6.12' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi\n\nPull spi updates from Mark Brown:\n \"This is quite a quiet release for SPI. The one new core feature here\n is support for configuring the state of the MOSI pin when the bus is\n idle, there are some devices which are very fragile in this regard\n even when the chip select signal is not asserted. Otherwise we have\n some new driver support, a bunch of small fixes and some general\n cleanup work.\n\n - Support for configuring the state of the MOSI pin when the the bus\n is idle\n\n - Add the Elgin JG0309-01 in spidev\n\n - Support for Marvell xSPI, Mediatek MTK7981, Microchip PIC64GX, NXP\n i.MX8ULP, and Rockchip RK3576 controllers\n\n I also accidentally pulled in an IIO DT bindings update due to a typo\n when applying the MOSI idle state patches\"\n\n* tag 'spi-v6.12' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi: (65 commits)\n spi: geni-qcom: Use devm functions to simplify code\n spi: remove spi_controller_is_slave() and spi_slave_abort()\n platform/olpc: olpc-xo175-ec: switch to use spi_target_abort().\n spi: slave-mt27xx: switch to use target_abort\n spi: spidev: switch to use spi_target_abort()\n spi: slave-system-control: switch to use spi_target_abort()\n spi: slave-time: switch to use spi_target_abort()\n spi: switch to use spi_controller_is_target()\n spi: fspi: add support for imx8ulp\n spi: fspi: involve lut_num for struct nxp_fspi_devtype_data\n dt-bindings: spi: nxp-fspi: add imx8ulp support\n spi: spidev_fdx: Fix the wrong format specifier\n spi: mxs: Switch to RUNTIME/SYSTEM_SLEEP_PM_OPS()\n spi: dt-bindings: Add rockchip,rk3576-spi compatible\n spi: Revert \"spi: Insert the missing pci_dev_put()before return\"\n spi: zynq-qspi: Replace kzalloc with kmalloc for buffer allocation\n spi: ppc4xx: Sort headers\n spi: ppc4xx: Revert \"handle irq_of_parse_and_map() errors\"\n spi: zynqmp-gqspi: Simplify with dev_err_probe()\n spi: zynqmp-gqspi: Use devm_spi_alloc_host()\n ...","shortMessageHtmlLink":"Merge tag 'spi-v6.12' of git://git.kernel.org/pub/scm/linux/kernel/gi…"}},{"before":"47f30a5084d98a0d6d15222576607b0a3b166eff","after":"611bc91f9e8701f99719c4280ac416d3bef8392a","ref":"refs/heads/isolated-userns-dev","pushedAt":"2024-09-11T15:51:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"[DEBUG ONLY] add isol_debug sysctl\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"[DEBUG ONLY] add isol_debug sysctl"}},{"before":"67784a74e258a467225f0e68335df77acd67b7ab","after":"bc83b4d1f08695e85e85d36f7b803da58010161d","ref":"refs/heads/master","pushedAt":"2024-09-09T19:46:30.000Z","pushType":"push","commitsCount":362,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"Merge tag 'bcachefs-2024-09-09' of git://evilpiepirate.org/bcachefs\n\nPull bcachefs fixes from Kent Overstreet:\n\n - fix ca->io_ref usage; analagous to previous patch doing that for main\n discard path\n\n - cond_resched() in __journal_keys_sort(), cutting down on \"hung task\"\n warnings when journal is big\n\n - rest of basic BCH_SB_MEMBER_INVALID support\n\n - and the critical one: don't delete open files in online fsck, this\n was causing the \"dirent points to inode that doesn't point back\"\n inconsistencies some users were seeing\n\n* tag 'bcachefs-2024-09-09' of git://evilpiepirate.org/bcachefs:\n bcachefs: Don't delete open files in online fsck\n bcachefs: fix btree_key_cache sysfs knob\n bcachefs: More BCH_SB_MEMBER_INVALID support\n bcachefs: Simplify bch2_bkey_drop_ptrs()\n bcachefs: Add a cond_resched() to __journal_keys_sort()\n bcachefs: Fix ca->io_ref usage","shortMessageHtmlLink":"Merge tag 'bcachefs-2024-09-09' of git://evilpiepirate.org/bcachefs"}},{"before":"3b820c43aa7a9ae7b6e3b48deb31bd7f722bb89d","after":"06739709639b93305e07ca448e8cea42fed6ab4d","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T14:49:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"3e9bff3bbe1355805de919f688bef4baefbfd436","after":"67784a74e258a467225f0e68335df77acd67b7ab","ref":"refs/heads/master","pushedAt":"2024-09-03T14:49:00.000Z","pushType":"push","commitsCount":331,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"Merge tag 'ata-6.11-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/libata/linux\n\nPull ata fix from Damien Le Moal:\n\n - Fix a potential memory leak in the ata host initialization code (from\n Zheng)\n\n* tag 'ata-6.11-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/libata/linux:\n ata: libata: Fix memory leak for error path in ata_host_alloc()","shortMessageHtmlLink":"Merge tag 'ata-6.11-rc7' of git://git.kernel.org/pub/scm/linux/kernel…"}},{"before":"bcf8a5bb5ec788f9b84dd15f6ddc61347f5e5665","after":"3b820c43aa7a9ae7b6e3b48deb31bd7f722bb89d","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T14:43:45.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"25dc2cee22aecc0ff071b6820b2f9acbc5458d2c","after":"bcf8a5bb5ec788f9b84dd15f6ddc61347f5e5665","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T12:18:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"9c1fb131fea420cedc0cf47c8d337a0c608a24e7","after":"25dc2cee22aecc0ff071b6820b2f9acbc5458d2c","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T11:45:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"c8c19482ba3ea106e67677f86095d02f3125ba9c","after":"9c1fb131fea420cedc0cf47c8d337a0c608a24e7","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T11:19:44.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"329c27b848bab4cec9fbce2ae42a513a7678343b","after":"c8c19482ba3ea106e67677f86095d02f3125ba9c","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T11:12:35.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"cd58e8949d2a0d6948cb019d8ca366e27b17153d","after":"329c27b848bab4cec9fbce2ae42a513a7678343b","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T11:09:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"fc14f47e1d0e8f63c5a8b0eb610c259ef0304564","after":"cd58e8949d2a0d6948cb019d8ca366e27b17153d","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T11:04:18.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"1529b2cdf326b18169396adaae5629305546a067","after":"fc14f47e1d0e8f63c5a8b0eb610c259ef0304564","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T09:46:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \nReviewed-by: Christian Brauner \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"38a94405c0b819930202b64dafb26cfbfd9b147a","after":"1529b2cdf326b18169396adaae5629305546a067","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T09:34:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"5fbe52d0f5b212d7fc9f752189fc861907cae8cd","after":"38a94405c0b819930202b64dafb26cfbfd9b147a","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-03T09:08:35.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"512aa0f52fcfef18216ed99e123c72f0600f9c1f","after":"5fbe52d0f5b212d7fc9f752189fc861907cae8cd","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-09-02T18:42:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"6b0f8db921abf0520081d779876d3a41069dab95","after":"3e9bff3bbe1355805de919f688bef4baefbfd436","ref":"refs/heads/master","pushedAt":"2024-08-27T12:15:56.000Z","pushType":"push","commitsCount":675,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"Merge tag 'vfs-6.11-rc6.fixes' of gitolite.kernel.org:pub/scm/linux/kernel/git/vfs/vfs\n\nPull vfs fixes from Christian Brauner:\n \"VFS:\n\n - Ensure that backing files uses file->f_ops->splice_write() for\n splice\n\n netfs:\n\n - Revert the removal of PG_private_2 from netfs_release_folio() as\n cephfs still relies on this\n\n - When AS_RELEASE_ALWAYS is set on a mapping the folio needs to\n always be invalidated during truncation\n\n - Fix losing untruncated data in a folio by making letting\n netfs_release_folio() return false if the folio is dirty\n\n - Fix trimming of streaming-write folios in netfs_inval_folio()\n\n - Reset iterator before retrying a short read\n\n - Fix interaction of streaming writes with zero-point tracker\n\n afs:\n\n - During truncation afs currently calls truncate_setsize() which sets\n i_size, expands the pagecache and truncates it. The first two\n operations aren't needed because they will have already been done.\n So call truncate_pagecache() instead and skip the redundant parts\n\n overlayfs:\n\n - Fix checking of the number of allowed lower layers so 500 layers\n can actually be used instead of just 499\n\n - Add missing '\\n' to pr_err() output\n\n - Pass string to ovl_parse_layer() and thus allow it to be used for\n Opt_lowerdir as well\n\n pidfd:\n\n - Revert blocking the creation of pidfds for kthread as apparently\n userspace relies on this. Specifically, it breaks systemd during\n shutdown\n\n romfs:\n\n - Fix romfs_read_folio() to use the correct offset with\n folio_zero_tail()\"\n\n* tag 'vfs-6.11-rc6.fixes' of gitolite.kernel.org:pub/scm/linux/kernel/git/vfs/vfs:\n netfs: Fix interaction of streaming writes with zero-point tracker\n netfs: Fix missing iterator reset on retry of short read\n netfs: Fix trimming of streaming-write folios in netfs_inval_folio()\n netfs: Fix netfs_release_folio() to say no if folio dirty\n afs: Fix post-setattr file edit to do truncation correctly\n mm: Fix missing folio invalidation calls during truncation\n ovl: ovl_parse_param_lowerdir: Add missed '\\n' for pr_err\n ovl: fix wrong lowerdir number check for parameter Opt_lowerdir\n ovl: pass string to ovl_parse_layer()\n backing-file: convert to using fops->splice_write\n Revert \"pidfd: prevent creation of pidfds for kthreads\"\n romfs: fix romfs_read_folio()\n netfs, ceph: Partially revert \"netfs: Replace PG_fscache by setting folio->private and marking dirty\"","shortMessageHtmlLink":"Merge tag 'vfs-6.11-rc6.fixes' of gitolite.kernel.org:pub/scm/linux/k…"}},{"before":"8785dfd0ed2f11e068d8d0293576d4f9df25bef0","after":"47f30a5084d98a0d6d15222576607b0a3b166eff","ref":"refs/heads/isolated-userns-dev","pushedAt":"2024-08-27T12:15:23.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"[DEBUG ONLY] add isol_debug sysctl\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"[DEBUG ONLY] add isol_debug sysctl"}},{"before":"b56beabe0d0efe02bcf2a2ad362d28bed99c2e50","after":"512aa0f52fcfef18216ed99e123c72f0600f9c1f","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-15T09:03:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nAllow idmapped mounts for virtiofs.\nIt's absolutely safe as for virtiofs we have the same\nfeature negotiation mechanism as for classical fuse\nfilesystems. This does not affect any existing\nsetups anyhow.\n\nvirtiofsd support:\nhttps://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Vivek Goyal \nCc: German Maglione \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn \n---\nv3:\n\t- this commit added","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"63f7c602fbf9c04a801b409710889d616303c697","after":"b56beabe0d0efe02bcf2a2ad362d28bed99c2e50","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-15T08:58:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"1abc335e91e014b6b7e582690372855189a37eb3","after":"63f7c602fbf9c04a801b409710889d616303c697","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-15T08:56:55.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"a57b36a728d9847144a387ee61e74ba3085a2916","after":"1abc335e91e014b6b7e582690372855189a37eb3","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-15T08:55:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"6fffcb8e4f3ac4e9fd0eb792e82d5e235299c602","after":"a57b36a728d9847144a387ee61e74ba3085a2916","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-14T12:54:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"5909284cba2c9cd1f0ad3eee02647292cc669cac","after":"6fffcb8e4f3ac4e9fd0eb792e82d5e235299c602","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-14T12:43:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse/virtio_fs: allow idmapped mounts\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse/virtio_fs: allow idmapped mounts"}},{"before":"1c04d83dd3d4cba5b90430733f85d001a6ccc33e","after":"5909284cba2c9cd1f0ad3eee02647292cc669cac","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-14T11:25:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fs/fuse: allow idmapped mounts\n\nNow we have everything in place and we can allow idmapped mounts\nby setting the FS_ALLOW_IDMAP flag. Notice that real availability\nof idmapped mounts will depend on the fuse daemon. Fuse daemon\nhave to set FUSE_ALLOW_IDMAP flag in the FUSE_INIT reply.\n\nTo discuss:\n- we enable idmapped mounts support only if \"default_permissions\" mode is enabled,\nbecause otherwise we would need to deal with UID/GID mappings in the userspace side OR\nprovide the userspace with idmapped req->in.h.uid/req->in.h.gid values which is not\nsomething that we probably want to. Idmapped mounts phylosophy is not about faking\ncaller uid/gid.\n\n- We have a small offlist discussion with Christian around adding fs_type->allow_idmap\nhook. Christian pointed that it would be nice to have a superblock flag instead like\nSB_I_NOIDMAP and we can set this flag during mount time if we see that filesystem does not\nsupport idmappings. But, unfortunately I didn't succeed here because the kernel will\nknow if the filesystem supports idmapping or not after FUSE_INIT request, but FUSE_INIT request\nis being sent at the end of mounting process, so mount and superblock will exist and\nvisible by the userspace in that time. It seems like setting SB_I_NOIDMAP flag in this\ncase is too late as user may do the trick with creating a idmapped mount while it wasn't\nrestricted by SB_I_NOIDMAP. Alternatively, we can introduce a \"positive\" version SB_I_ALLOWIDMAP\nand \"weak\" version of FS_ALLOW_IDMAP like FS_MAY_ALLOW_IDMAP. So if FS_MAY_ALLOW_IDMAP is set,\nthen SB_I_ALLOWIDMAP has to be set on the superblock to allow creation of an idmapped mount.\nBut that's a matter of our discussion.\n\nSome extra links and examples:\n\n- libfuse support\nhttps://github.com/mihalicyn/libfuse/commits/idmap_support\n\n- fuse-overlayfs support:\nhttps://github.com/mihalicyn/fuse-overlayfs/commits/idmap_support\n\n- cephfs-fuse conversion example\nhttps://github.com/mihalicyn/ceph/commits/fuse_idmap\n\n- glusterfs conversion example\nhttps://github.com/mihalicyn/glusterfs/commits/fuse_idmap\n\nCc: Christian Brauner \nCc: Seth Forshee \nCc: Miklos Szeredi \nCc: Amir Goldstein \nCc: Bernd Schubert \nCc: \nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fs/fuse: allow idmapped mounts"}},{"before":"54d68f40932244fd9f1c324948035eb39329895b","after":"1c04d83dd3d4cba5b90430733f85d001a6ccc33e","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-14T11:14:43.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fuse: use GFP_KERNEL_ACCOUNT for allocations in fuse_dev_alloc\n\nfuse_dev_alloc() is called from the process context and it makes\nsense to properly account allocated memory to the kmemcg as these\nallocations are for long living objects.\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fuse: use GFP_KERNEL_ACCOUNT for allocations in fuse_dev_alloc"}},{"before":"c0e2a51a0352906ed4d04a017dbe38e7c65a3b1f","after":"54d68f40932244fd9f1c324948035eb39329895b","ref":"refs/heads/fuse_idmapped_mounts","pushedAt":"2024-08-14T09:23:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"mihalicyn","name":"Alexander Mikhalitsyn","path":"/mihalicyn","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/227844?s=80&v=4"},"commit":{"message":"fuse: use GFP_KERNEL_ACCOUNT for allocations in fuse_dev_alloc\n\nfuse_dev_alloc() is called from the process context and it makes\nsense to properly account allocated memory to the kmemcg as these\nallocations are for long living objects.\n\nSigned-off-by: Alexander Mikhalitsyn ","shortMessageHtmlLink":"fuse: use GFP_KERNEL_ACCOUNT for allocations in fuse_dev_alloc"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xN1QwODo0MDoxNi4wMDAwMDBazwAAAAS4SFA5","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xN1QwODo0MDoxNi4wMDAwMDBazwAAAAS4SFA5","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0xNFQwOToyMzoyNy4wMDAwMDBazwAAAASaDnyf"}},"title":"Activity · mihalicyn/linux"}