summaryrefslogtreecommitdiffstats
path: root/fs/overlayfs/util.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* ovl: use inode instead of dentry where possibleMiklos Szeredi2022-12-081-4/+2
* ovl: port to vfs{g,u}id_t and associated helpersChristian Brauner2022-12-081-2/+7
* overlayfs: constify pathAl Viro2022-09-011-5/+5
* ovl: handle idmappings in layer open helpersChristian Brauner2022-04-281-2/+3
* ovl: use ovl_copy_{real,upper}attr() wrappersChristian Brauner2022-04-281-1/+31
* ovl: store lower path in ovl_inodeAmir Goldstein2022-04-281-1/+14
* ovl: use ovl_path_getxattr() wrapperChristian Brauner2022-04-281-15/+14
* ovl: use ovl_lookup_upper() wrapperChristian Brauner2022-04-281-1/+1
* ovl: pass layer mnt to ovl_open_realfile()Amir Goldstein2022-04-281-0/+14
* ovl: pass ofs to creation operationsChristian Brauner2022-04-281-1/+1
* ovl: use wrappers to all vfs_*xattr() callsAmir Goldstein2022-04-281-8/+8
* ovl: consistent behavior for immutable/append-only inodesAmir Goldstein2021-08-171-0/+85
* ovl: pass ovl_fs to ovl_check_setxattr()Amir Goldstein2021-08-171-4/+3
* ovl: invalidate readdir cache on changes to dir with originAmir Goldstein2021-04-121-22/+9
* ovl: fix misspellings using codespell toolXiong Zhenwu2021-04-121-1/+1
* Merge tag 'idmapped-mounts-v5.12' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2021-02-231-2/+2
|\
| * inode: make init and permission helpers idmapped mount awareChristian Brauner2021-01-241-1/+1
| * namei: make permission helpers idmapped mount awareChristian Brauner2021-01-241-1/+1
* | ovl: implement volatile-specific fsync error behaviourSargun Dhillon2021-01-281-0/+27
|/
* ovl: do not get metacopy for userxattrMiklos Szeredi2020-12-141-0/+7
* ovl: user xattrMiklos Szeredi2020-12-141-2/+3
* ovl: check privs before decoding file handleMiklos Szeredi2020-12-141-0/+3
* ovl: propagate ovl_fs to ovl_decode_real_fh and ovl_encode_real_fhPavel Tikhomirov2020-11-121-1/+2
* ovl: enumerate private xattrsMiklos Szeredi2020-09-021-5/+26
* ovl: pass ovl_fs down to functions accessing private xattrsMiklos Szeredi2020-09-021-10/+12
* ovl: drop flags argument from ovl_do_setxattr()Miklos Szeredi2020-09-021-1/+1
* ovl: use ovl_do_getxattr() for private xattrMiklos Szeredi2020-09-021-5/+5
* ovl: fold ovl_getxattr() into ovl_get_redirect_xattr()Miklos Szeredi2020-09-021-36/+17
* duplicate ovl_getxattr()Miklos Szeredi2020-09-021-2/+2
* ovl: add accessor for ofs->upper_mntMiklos Szeredi2020-06-041-3/+3
* ovl: verify permissions in ovl_path_open()Miklos Szeredi2020-06-021-1/+26
* ovl: whiteout inode sharingChengguang Xu2020-05-131-1/+2
* ovl: allow remote upperMiklos Szeredi2020-03-171-0/+2
* ovl: decide if revalidate needed on a per-dentry basisMiklos Szeredi2020-03-171-0/+15
* ovl: separate detection of remote upper layer from stacked overlayMiklos Szeredi2020-03-171-2/+1
* ovl: simplify i_ino initializationAmir Goldstein2020-03-171-18/+0
* ovl: fix out of date comment and unreachable codeAmir Goldstein2020-03-171-2/+0
* ovl: fix lock in ovl_llseek()Amir Goldstein2020-03-121-2/+2
* ovl: layer is constMiklos Szeredi2020-01-241-1/+1
* ovl: simplify ovl_same_sb() helperAmir Goldstein2020-01-241-12/+0
* ovl: use pr_fmt auto generate prefixlijiazi2020-01-221-7/+7
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500Thomas Gleixner2019-06-191-4/+1
* ovl: detect overlapping layersAmir Goldstein2019-05-291-0/+12
* ovl: Do not lose security.capability xattr over metadata file copy-upVivek Goyal2019-02-131-20/+35
* ovl: abstract ovl_inode lock with a helperAmir Goldstein2018-10-261-12/+13
* ovl: remove the 'locked' argument of ovl_nlink_{start,end}Amir Goldstein2018-10-261-16/+12
* ovl: relax requirement for non null uuid of lower fsAmir Goldstein2018-10-261-2/+1
* ovl: fix memory leak on unlink of indexed fileAmir Goldstein2018-09-241-1/+2
* ovl: Check redirect on index as wellVivek Goyal2018-07-201-0/+50
* ovl: Do not set dentry type ORIGIN for broken hardlinksVivek Goyal2018-07-201-1/+2