<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in config</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>a4a508df2aa34f8650afde54ea804321c618f45f - Merge tag &apos;v6.18&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#a4a508df2aa34f8650afde54ea804321c618f45f</link>
        <description>Merge tag &apos;v6.18&apos; into nextSync up with the mainline to bring in the latest APIs.

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Sat, 13 Dec 2025 10:18:20 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>cb9f145f638d7afa633632a9290d6ad06caeb8ee - Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclark</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#cb9f145f638d7afa633632a9290d6ad06caeb8ee</link>
        <description>Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclarkBack-merge drm-next to get caught up.Signed-off-by: Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Sat, 01 Nov 2025 13:47:30 +0100</pubDate>
        <dc:creator>Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;</dc:creator>
    </item>
<item>
        <title>82ee50252dc891e3f3b32d923bb4f656d300b772 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#82ee50252dc891e3f3b32d923bb4f656d300b772</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in 6.18-rc1.Signed-off-by: Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Tue, 14 Oct 2025 11:31:49 +0200</pubDate>
        <dc:creator>Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>2acee98fcc61052d63fab4539fcb6ee677555645 - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#2acee98fcc61052d63fab4539fcb6ee677555645</link>
        <description>Merge drm/drm-next into drm-intel-nextSync to v6.18-rc1.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Tue, 14 Oct 2025 09:37:11 +0200</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>9b966ae42235a88eaea714be09ff3d698535bdfe - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#9b966ae42235a88eaea714be09ff3d698535bdfe</link>
        <description>Merge drm/drm-next into drm-misc-nextUpdating drm-misc-next to the state of v6.18-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Mon, 13 Oct 2025 09:19:19 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>2ace52718376fdb56aca863da2eebe70d7e2ddb1 - Merge branch &apos;objtool/core&apos;</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#2ace52718376fdb56aca863da2eebe70d7e2ddb1</link>
        <description>Merge branch &apos;objtool/core&apos;Bring in the UDB and objtool data annotations to avoid conflicts while further extending the bug exceptions.Signed-off-by: Peter Zijlstra &lt;peterz@infradead.org&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Fri, 21 Nov 2025 11:21:20 +0100</pubDate>
        <dc:creator>Peter Zijlstra &lt;peterz@infradead.org&gt;</dc:creator>
    </item>
<item>
        <title>f39b6c468c52745dbca9a842d91c8373fda208ab - Merge tag &apos;v6.18-rc6&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#f39b6c468c52745dbca9a842d91c8373fda208ab</link>
        <description>Merge tag &apos;v6.18-rc6&apos; into for-linusSync up with the mainline to bring in definition ofINPUT_PROP_HAPTIC_TOUCHPAD.

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Tue, 18 Nov 2025 08:16:55 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>4f38da1f027ea2c9f01bb71daa7a299c191b6940 - spi: Merge up v6.18-rc1</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#4f38da1f027ea2c9f01bb71daa7a299c191b6940</link>
        <description>spi: Merge up v6.18-rc1Ensure my CI has a sensible baseline.

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Mon, 13 Oct 2025 14:32:13 +0200</pubDate>
        <dc:creator>Mark Brown &lt;broonie@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>ec2e0fb07d789976c601bec19ecced7a501c3705 - Merge tag &apos;asoc-fix-v6.18-rc1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#ec2e0fb07d789976c601bec19ecced7a501c3705</link>
        <description>Merge tag &apos;asoc-fix-v6.18-rc1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v6.18A moderately large collection of driver specific fixes, plus a few newquirks and device IDs.  The NAU8821 changes are a little large but morein mechanical ways than in ways that are complex.

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Thu, 16 Oct 2025 20:14:24 +0200</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>48a710760e10a4f36e11233a21860796ba204b1e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#48a710760e10a4f36e11233a21860796ba204b1e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesUpdating drm-misc-fixes to the state of v6.18-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Tue, 14 Oct 2025 10:59:58 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>18b19abc3709b109676ffd1f48dcd332c2e477d4 - Merge tag &apos;namespace-6.18-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#18b19abc3709b109676ffd1f48dcd332c2e477d4</link>
        <description>Merge tag &apos;namespace-6.18-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfsPull namespace updates from Christian Brauner: &quot;This contains a larger set of changes around the generic namespace  infrastructure of the kernel.  Each specific namespace type (net, cgroup, mnt, ...) embedds a struct  ns_common which carries the reference count of the namespace and so  on.  We open-coded and cargo-culted so many quirks for each namespace type  that it just wasn&apos;t scalable anymore. So given there&apos;s a bunch of new  changes coming in that area I&apos;ve started cleaning all of this up.  The core change is to make it possible to correctly initialize every  namespace uniformly and derive the correct initialization settings  from the type of the namespace such as namespace operations, namespace  type and so on. This leaves the new ns_common_init() function with a  single parameter which is the specific namespace type which derives  the correct parameters statically. This also means the compiler will  yell as soon as someone does something remotely fishy.  The ns_common_init() addition also allows us to remove ns_alloc_inum()  and drops any special-casing of the initial network namespace in the  network namespace initialization code that Linus complained about.  Another part is reworking the reference counting. The reference  counting was open-coded and copy-pasted for each namespace type even  though they all followed the same rules. This also removes all open  accesses to the reference count and makes it private and only uses a  very small set of dedicated helpers to manipulate them just like we do  for e.g., files.  In addition this generalizes the mount namespace iteration  infrastructure introduced a few cycles ago. As reminder, the vfs makes  it possible to iterate sequentially and bidirectionally through all  mount namespaces on the system or all mount namespaces that the caller  holds privilege over. This allow userspace to iterate over all mounts  in all mount namespaces using the listmount() and statmount() system  call.  Each mount namespace has a unique identifier for the lifetime of the  systems that is exposed to userspace. The network namespace also has a  unique identifier working exactly the same way. This extends the  concept to all other namespace types.  The new nstree type makes it possible to lookup namespaces purely by  their identifier and to walk the namespace list sequentially and  bidirectionally for all namespace types, allowing userspace to iterate  through all namespaces. Looking up namespaces in the namespace tree  works completely locklessly.  This also means we can move the mount namespace onto the generic  infrastructure and remove a bunch of code and members from struct  mnt_namespace itself.  There&apos;s a bunch of stuff coming on top of this in the future but for  now this uses the generic namespace tree to extend a concept  introduced first for pidfs a few cycles ago. For a while now we have  supported pidfs file handles for pidfds. This has proven to be very  useful.  This extends the concept to cover namespaces as well. It is possible  to encode and decode namespace file handles using the common  name_to_handle_at() and open_by_handle_at() apis.  As with pidfs file handles, namespace file handles are exhaustive,  meaning it is not required to actually hold a reference to nsfs in  able to decode aka open_by_handle_at() a namespace file handle.  Instead the FD_NSFS_ROOT constant can be passed which will let the  kernel grab a reference to the root of nsfs internally and thus decode  the file handle.  Namespaces file descriptors can already be derived from pidfds which  means they aren&apos;t subject to overmount protection bugs. IOW, it&apos;s  irrelevant if the caller would not have access to an appropriate  /proc/&lt;pid&gt;/ns/ directory as they could always just derive the  namespace based on a pidfd already.  It has the same advantage as pidfds. It&apos;s possible to reliably and for  the lifetime of the system refer to a namespace without pinning any  resources and to compare them trivially.  Permission checking is kept simple. If the caller is located in the  namespace the file handle refers to they are able to open it otherwise  they must hold privilege over the owning namespace of the relevant  namespace.  The namespace file handle layout is exposed as uapi and has a stable  and extensible format. For now it simply contains the namespace  identifier, the namespace type, and the inode number. The stable  format means that userspace may construct its own namespace file  handles without going through name_to_handle_at() as they are already  allowed for pidfs and cgroup file handles&quot;* tag &apos;namespace-6.18-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs: (65 commits)  ns: drop assert  ns: move ns type into struct ns_common  nstree: make struct ns_tree private  ns: add ns_debug()  ns: simplify ns_common_init() further  cgroup: add missing ns_common include  ns: use inode initializer for initial namespaces  selftests/namespaces: verify initial namespace inode numbers  ns: rename to __ns_ref  nsfs: port to ns_ref_*() helpers  net: port to ns_ref_*() helpers  uts: port to ns_ref_*() helpers  ipv4: use check_net()  net: use check_net()  net-sysfs: use check_net()  user: port to ns_ref_*() helpers  time: port to ns_ref_*() helpers  pid: port to ns_ref_*() helpers  ipc: port to ns_ref_*() helpers  cgroup: port to ns_ref_*() helpers  ...

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Mon, 29 Sep 2025 20:20:29 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>3ab378cfa793c648d4edf02bbfff3af8715aca91 - Merge patch series &quot;ns: support file handles&quot;</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#3ab378cfa793c648d4edf02bbfff3af8715aca91</link>
        <description>Merge patch series &quot;ns: support file handles&quot;Christian Brauner &lt;brauner@kernel.org&gt; says:For a while now we have supported file handles for pidfds. This hasproven to be very useful.Extend the concept to cover namespaces as well. After this patchset itis possible to encode and decode namespace file handles using thecommong name_to_handle_at() and open_by_handle_at() apis.Namespaces file descriptors can already be derived from pidfds whichmeans they aren&apos;t subject to overmount protection bugs. IOW, it&apos;sirrelevant if the caller would not have access to an appropriate/proc/&lt;pid&gt;/ns/ directory as they could always just derive the namespacebased on a pidfd already.It has the same advantage as pidfds. It&apos;s possible to reliably and forthe lifetime of the system refer to a namespace without pinning anyresources and to compare them.Permission checking is kept simple. If the caller is located in thenamespace the file handle refers to they are able to open it otherwisethey must hold privilege over the owning namespace of the relevantnamespace.Both the network namespace and the mount namespace already have anassociated cookie that isn&apos;t recycled and is fully exposed to userspace.Move this into ns_common and use the same id space for all namespaces sothey can trivially and reliably be compared.There&apos;s more coming based on the iterator infrastructure but the seriesis large enough and focuses on file handles.Extensive selftests included.* patches from https://lore.kernel.org/20250912-work-namespace-v2-0-1a247645cef5@kernel.org: (33 commits)  selftests/namespaces: add file handle selftests  selftests/namespaces: add identifier selftests  tools: update nsfs.h uapi header  nsfs: add missing id retrieval support  nsfs: support exhaustive file handles  nsfs: support file handles  nsfs: add current_in_namespace()  ns: add to_&lt;type&gt;_ns() to respective headers  uts: support ns lookup  user: support ns lookup  time: support ns lookup  pid: support ns lookup  net: support ns lookup  ipc: support ns lookup  cgroup: support ns lookup  mnt: support ns lookup  nstree: make iterator generic  ns: remove ns_alloc_inum()  uts: use ns_common_init()  user: use ns_common_init()  ...Signed-off-by: Christian Brauner &lt;brauner@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Mon, 15 Sep 2025 13:45:37 +0200</pubDate>
        <dc:creator>Christian Brauner &lt;brauner@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>14f98438f0ed7b121a847260023de64ae128887e - selftests/namespaces: add identifier selftests</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/namespaces/config#14f98438f0ed7b121a847260023de64ae128887e</link>
        <description>selftests/namespaces: add identifier selftestsAdd a bunch of selftests for the identifier retrieval ioctls.Signed-off-by: Christian Brauner &lt;brauner@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/namespaces/config</description>
        <pubDate>Fri, 12 Sep 2025 13:52:55 +0200</pubDate>
        <dc:creator>Christian Brauner &lt;brauner@kernel.org&gt;</dc:creator>
    </item>
</channel>
</rss>
