n-NULL bio->bi_bdev pointer to make sure, that the
device is defined, otherwise there is no sense to call this callback at all.
Signed-of-by: Stanislav Kinsbursky
---
block/bio.c |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/block/bio.c b/block/bio.c
index 0ec61c9..cb45186
is defined, otherwise there is no sense to call this callback at all.
Signed-of-by: Stanislav Kinsbursky stanislav.kinsbur...@profitbricks.com
---
block/bio.c |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/block/bio.c b/block/bio.c
index 0ec61c9..cb45186 100644
.
Reported-by: Weng Meiling
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
fs/nfsd/nfsctl.c |5 +
include/linux/sunrpc/svcsock.h |1 +
net/sunrpc/svcsock.c | 16
3 files changed, 22 insertions(+), 0 deletions(-)
diff --gi
Meiling wengmeiling.w...@huawei.com
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
fs/nfsd/nfsctl.c |5 +
include/linux/sunrpc/svcsock.h |1 +
net/sunrpc/svcsock.c | 16
3 files changed, 22 insertions
21.02.2014 01:31, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 06:57:46PM +0400, Stanislav Kinsbursky wrote:
19.02.2014 18:50, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 02:26:33PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19
21.02.2014 01:31, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 06:57:46PM +0400, Stanislav Kinsbursky wrote:
19.02.2014 18:50, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 02:26:33PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19
19.02.2014 18:50, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 02:26:33PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19:31PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 02:19, J. Bruce Fields пишет:
On Sat, Feb 15, 2014 at 09:51
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19:31PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 02:19, J. Bruce Fields пишет:
On Sat, Feb 15, 2014 at 09:51:20AM +0800, Weng Meiling wrote:
Hi Bruce,
The upstream has merged your git tree for-3.14
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19:31PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 02:19, J. Bruce Fields пишет:
On Sat, Feb 15, 2014 at 09:51:20AM +0800, Weng Meiling wrote:
Hi Bruce,
The upstream has merged your git tree for-3.14
19.02.2014 18:50, J. Bruce Fields пишет:
On Wed, Feb 19, 2014 at 02:26:33PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 19:44, J. Bruce Fields пишет:
On Tue, Feb 18, 2014 at 07:19:31PM +0400, Stanislav Kinsbursky wrote:
18.02.2014 02:19, J. Bruce Fields пишет:
On Sat, Feb 15, 2014 at 09:51
Thanks!
Weng Meiling
On 2014/1/4 6:22, J. Bruce Fields wrote:
On Mon, Dec 30, 2013 at 05:23:59PM +0300, Stanislav Kinsbursky wrote:
There could be a case, when NFSd file system is mounted in network, different
to socket's one, like below:
"ip netns exec" creates new network and mou
On 2014/1/4 6:22, J. Bruce Fields wrote:
On Mon, Dec 30, 2013 at 05:23:59PM +0300, Stanislav Kinsbursky wrote:
There could be a case, when NFSd file system is mounted in network, different
to socket's one, like below:
ip netns exec creates new network and mount namespace, which duplicates NFSd
Hello Michael.
Thanks you for your careful explanation of the problem.
All is true and I like your solution.
Acked-by: Stanislav Kinsbursky
3.01.2014 17:56, Michael Kerrisk (man-pages) пишет:
Hello Stanislav, Pavel,
While documenting the msgrcv() MSG_COPY flag that you (Stanislaw) added
Hello Michael.
Thanks you for your careful explanation of the problem.
All is true and I like your solution.
Acked-by: Stanislav Kinsbursky skinsbur...@parallels.com
3.01.2014 17:56, Michael Kerrisk (man-pages) пишет:
Hello Stanislav, Pavel,
While documenting the msgrcv() MSG_COPY flag
04.01.2014 02:22, J. Bruce Fields пишет:
On Mon, Dec 30, 2013 at 05:23:59PM +0300, Stanislav Kinsbursky wrote:
There could be a case, when NFSd file system is mounted in network, different
to socket's one, like below:
"ip netns exec" creates new network and mount namespace, which
04.01.2014 02:22, J. Bruce Fields пишет:
On Mon, Dec 30, 2013 at 05:23:59PM +0300, Stanislav Kinsbursky wrote:
There could be a case, when NFSd file system is mounted in network, different
to socket's one, like below:
ip netns exec creates new network and mount namespace, which duplicates NFSd
Meiling
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
fs/nfsd/nfsctl.c |5 +
include/linux/sunrpc/svcsock.h |1 +
net/sunrpc/svcsock.c | 11 +++
3 files changed, 17 insertions(+), 0 deletions(-)
diff --git a/fs/nfsd/nfsctl.c b/fs
...@huawei.com
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
fs/nfsd/nfsctl.c |5 +
include/linux/sunrpc/svcsock.h |1 +
net/sunrpc/svcsock.c | 11 +++
3 files changed, 17 insertions(+), 0 deletions(-)
diff --git
15.11.2013 15:03, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
12.11.2013 17:30, Jeff Layton пишет:
On Tue, 12 Nov 2013 17:02:36 +0400
Stanislav Kinsbursky wrote:
12.11.2013 15:12, Jeff Layton пишет:
On Mon, 11 Nov 2013 16:47:03 -0800
Greg KH wrote:
On Mon, Nov 11, 2013 at 07
12.11.2013 17:30, Jeff Layton пишет:
On Tue, 12 Nov 2013 17:02:36 +0400
Stanislav Kinsbursky wrote:
12.11.2013 15:12, Jeff Layton пишет:
On Mon, 11 Nov 2013 16:47:03 -0800
Greg KH wrote:
On Mon, Nov 11, 2013 at 07:18:25AM -0500, Jeff Layton wrote:
We have a bit of a problem wrt
12.11.2013 17:30, Jeff Layton пишет:
On Tue, 12 Nov 2013 17:02:36 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
12.11.2013 15:12, Jeff Layton пишет:
On Mon, 11 Nov 2013 16:47:03 -0800
Greg KH gre...@linuxfoundation.org wrote:
On Mon, Nov 11, 2013 at 07:18:25AM -0500, Jeff
15.11.2013 15:03, Eric W. Biederman пишет:
Stanislav Kinsbursky skinsbur...@parallels.com writes:
12.11.2013 17:30, Jeff Layton пишет:
On Tue, 12 Nov 2013 17:02:36 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
12.11.2013 15:12, Jeff Layton пишет:
On Mon, 11 Nov 2013 16:47:03
nd we don't need any significant changes in kernel.
BTW, Jeff, could you remind me, please, why exactly we need to use UMH to run
the binary?
What are this capabilities, which force us to do so?
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line "unsubscribe
on host.
And we don't need any significant changes in kernel.
BTW, Jeff, could you remind me, please, why exactly we need to use UMH to run
the binary?
What are this capabilities, which force us to do so?
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line
lls RPC_PIPEFS_UMOUNT notification with sn->pipefs_sb_lock being held.
2) Removes SUNRPC client from the list AFTER pipes destroying.
3) Doesn't hold RPC client on notification: if client in the list, then it
can't be destroyed while sn->pipefs_sb_lock in hold by notification caller.
Signed-off-by:
by notification caller.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |5 +
net/sunrpc/rpc_pipe.c |2 +-
2 files changed, 2 insertions(+), 5 deletions(-)
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c
index b827a4b..41f180c
25.06.2013 20:13, Myklebust, Trond пишет:
On Mon, 2013-06-24 at 11:52 +0400, Stanislav Kinsbursky wrote:
CPU#0 CPU#1
- -
rpc_kill_sb
sn->pipefs_sb = NULLrpc_release_cli
25.06.2013 20:13, Myklebust, Trond пишет:
On Mon, 2013-06-24 at 11:52 +0400, Stanislav Kinsbursky wrote:
CPU#0 CPU#1
- -
rpc_kill_sb
sn-pipefs_sb = NULLrpc_release_client
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn->pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2 ++
1 files changed
lls RPC_PIPEFS_UMOUNT notification with sn->pipefs_sb_lock being held.
2) Removes SUNRPC client from the list AFTER pipes destroying.
3) Doesn't hold RPC client on notification: if client in the list, then it
can't be destroyed while sn->pipefs_sb_lock in hold by notification caller.
Signed-off-by:
This helper moves all "registration" code to the new rpc_client_register()
helper.
This helper will be used later in the series to synchronize against PipeFS
MOUNT/UMOUNT events.
Signed-off-by: Stanislav Kinsbursky
---
net/sunrpc/cln
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c | 26 +++--
...
---
Stanislav Kinsbursky (4):
SUNRPC: fix races on PipeFS MOUNT notifications
SUNRPC: fix races on PipeFS UMOUNT notifications
SUNRPC: split client creation routine into setup and registration
SUNRPC: PipeFS MOUNT notification optimization for dying clients
net/sunrpc/clnt.c
...
---
Stanislav Kinsbursky (4):
SUNRPC: fix races on PipeFS MOUNT notifications
SUNRPC: fix races on PipeFS UMOUNT notifications
SUNRPC: split client creation routine into setup and registration
SUNRPC: PipeFS MOUNT notification optimization for dying clients
net/sunrpc/clnt.c
)
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c | 26
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn-pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2
by notification caller.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |5 +
net/sunrpc/rpc_pipe.c |2 +-
2 files changed, 2 insertions(+), 5 deletions(-)
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c
index b827a4b..41f180c
This helper moves all registration code to the new rpc_client_register()
helper.
This helper will be used later in the series to synchronize against PipeFS
MOUNT/UMOUNT events.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
net/sunrpc/clnt.c | 64
17.06.2013 22:20, Myklebust, Trond пишет:
On Tue, 2013-06-11 at 18:39 +0400, Stanislav Kinsbursky wrote:
Below are races, when RPC client can be created without PiepFS dentries
CPU#0 CPU#1
17.06.2013 22:20, Myklebust, Trond пишет:
On Tue, 2013-06-11 at 18:39 +0400, Stanislav Kinsbursky wrote:
Below are races, when RPC client can be created without PiepFS dentries
CPU#0 CPU#1
This series fixes races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
v2: Fixed few silly locking bugs.
The following series implements...
---
Stanislav Kinsbursky (4):
SUNRPC: split client
This helper moves all "registration" code to the new rpc_client_register()
helper.
This helper will be used later in the series to synchronize against PipeFS
MOUNT/UMOUNT events.
Signed-off-by: Stanislav Kinsbursky
---
net/sunrpc/clnt.c | 48 -
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn->pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2 ++
1 files changed
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c | 24 +--
lls RPC_PIPEFS_UMOUNT notification with sn->pipefs_sb_lock being held.
2) Removes SUNRPC client from the list AFTER pipes destroying.
3) Doesn't hold RPC client on notification: if client in the list, then it
can't be destroyed while sn->pipefs_sb_lock in hold by notification caller.
Signed-off-by:
by notification caller.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |5 +
net/sunrpc/rpc_pipe.c |2 +-
2 files changed, 2 insertions(+), 5 deletions(-)
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c
index 4ee..b4f1711
)
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c | 24
This helper moves all registration code to the new rpc_client_register()
helper.
This helper will be used later in the series to synchronize against PipeFS
MOUNT/UMOUNT events.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
net/sunrpc/clnt.c | 48
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn-pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2
This series fixes races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
v2: Fixed few silly locking bugs.
The following series implements...
---
Stanislav Kinsbursky (4):
SUNRPC: split client
lls RPC_PIPEFS_UMOUNT notification with sn->pipefs_sb_lock being held.
2) Removes SUNRPC client from the list AFTER pipes destroying.
3) Doesn't hold RPC client on notification: if client in the list, then it
can't be destroyed while sn->pipefs_sb_lock in hold by notification caller.
Signed-off-by:
This series has flaws. Will fix and resend.
Sorry for noise.
10.06.2013 18:39, Stanislav Kinsbursky пишет:
This series fixed races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
The following
This series fixed races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
The following series implements...
---
Stanislav Kinsbursky (3):
SUNRPC: fix races on PipeFS UMOUNT notifications
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn->pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2 ++
1 files changed
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |7 ++-
net/sunrpc/rpc_
)
To fix this patch:
1) makes PipeFS mount notification call with pipefs_sb_lock being held.
2) releases pipefs_sb_lock on new SUNRPC client creation only after
registration.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |7
Not need to create pipes for dying client. So just skip them.
Note: we can safely dereference the client structure, because notification
caller is holding sn-pipefs_sb_lock.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |2
This series fixed races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
The following series implements...
---
Stanislav Kinsbursky (3):
SUNRPC: fix races on PipeFS UMOUNT notifications
This series has flaws. Will fix and resend.
Sorry for noise.
10.06.2013 18:39, Stanislav Kinsbursky пишет:
This series fixed races between PipeFS mount/umount notification calls and
SUNRPC clients creation and destruction.
https://bugzilla.redhat.com/show_bug.cgi?id=924649
The following
by notification caller.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
Cc: sta...@vger.kernel.org
---
net/sunrpc/clnt.c |5 +
net/sunrpc/rpc_pipe.c |2 +-
2 files changed, 2 insertions(+), 5 deletions(-)
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c
index cf5b226..3c133f2
s the
dust settles I expect user namespaces become the common way to run code
in containers, which should greatly increase the demand for this feature
in user namespaces.
Eric
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel&
as the
dust settles I expect user namespaces become the common way to run code
in containers, which should greatly increase the demand for this feature
in user namespaces.
Eric
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line unsubscribe linux-kernel
blem here is not how to modify the
userspace binary, but how to lookup and execute the right (!) one.
And I don't see, how we can do this (simple enough) without root swap.
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
t
23.05.2013 15:56, Jeff Layton пишет:
On Thu, 23 May 2013 15:38:17 +0400
Stanislav Kinsbursky wrote:
23.05.2013 15:31, Jeff Layton пишет:
On Thu, 23 May 2013 14:35:53 +0400
Stanislav Kinsbursky wrote:
23.05.2013 14:00, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
22.05.2013 21
23.05.2013 15:31, Jeff Layton пишет:
On Thu, 23 May 2013 14:35:53 +0400
Stanislav Kinsbursky wrote:
23.05.2013 14:00, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
Usermode helper executes all binaries
23.05.2013 14:00, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
Usermode helper executes all binaries in global "init" root context. This
doesn't allow to call a binary from other root context (f
be really great.
But regrettably doesn't solve the root swapping problem.
Eric
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky writes:
Usermode helper executes all binaries in global "init" root context. This
doesn't allow to call a binary from other root context (for example in a
container).
Currently, both containerized NFS client and
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky skinsbur...@parallels.com writes:
Usermode helper executes all binaries in global init root context. This
doesn't allow to call a binary from other root context (for example in a
container).
Currently, both containerized NFS
be really great.
But regrettably doesn't solve the root swapping problem.
Eric
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
23.05.2013 14:00, Eric W. Biederman пишет:
Stanislav Kinsbursky skinsbur...@parallels.com writes:
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky skinsbur...@parallels.com writes:
Usermode helper executes all binaries in global init root context. This
doesn't allow to call
23.05.2013 15:31, Jeff Layton пишет:
On Thu, 23 May 2013 14:35:53 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
23.05.2013 14:00, Eric W. Biederman пишет:
Stanislav Kinsbursky skinsbur...@parallels.com writes:
22.05.2013 21:33, Eric W. Biederman пишет:
Stanislav Kinsbursky
23.05.2013 15:56, Jeff Layton пишет:
On Thu, 23 May 2013 15:38:17 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
23.05.2013 15:31, Jeff Layton пишет:
On Thu, 23 May 2013 14:35:53 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
23.05.2013 14:00, Eric W. Biederman
to modify the
userspace binary, but how to lookup and execute the right (!) one.
And I don't see, how we can do this (simple enough) without root swap.
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord
ference must be hold by the caller, since it will be put on UMH
thread exit.
Signed-off-by: Stanislav Kinsbursky
---
fs/fs_struct.c| 28
include/linux/fs_struct.h |4
2 files changed, 32 insertions(+), 0 deletions(-)
diff --git a/fs/fs_struct.c b/
like call_usermodehelper_keys().
Oleg.
Thanks, Oleg. Sounds reasonable.
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
like call_usermodehelper_keys().
Oleg.
Thanks, Oleg. Sounds reasonable.
--
Best regards,
Stanislav Kinsbursky
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo
, since it will be put on UMH
thread exit.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
fs/fs_struct.c| 28
include/linux/fs_struct.h |4
2 files changed, 32 insertions(+), 0 deletions(-)
diff --git a/fs/fs_struct.c b/fs
20.05.2013 17:57, Oleg Nesterov пишет:
On 05/20, Stanislav Kinsbursky wrote:
Usermode helper executes all binaries in global "init" root context. This
doesn't allow to call to call the binary from other root (for example in a
container).
Currently, containerized NFS server requires
20.05.2013 12:42, Jeff Layton пишет:
On Mon, 20 May 2013 11:00:37 +0400
Stanislav Kinsbursky wrote:
Usermode helper executes all binaries in global "init" root context. This
doesn't allow to call to call the binary from other root (for example in a
container).
Currently, contain
e on UMH thread exit.
Signed-off-by: Stanislav Kinsbursky
---
include/linux/kmod.h |9 +
kernel/kmod.c| 41 ++---
2 files changed, 43 insertions(+), 7 deletions(-)
diff --git a/include/linux/kmod.h b/include/linux/kmod.h
index 055
.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
include/linux/kmod.h |9 +
kernel/kmod.c| 41 ++---
2 files changed, 43 insertions(+), 7 deletions(-)
diff --git a/include/linux/kmod.h b/include/linux/kmod.h
index 0555cc6
20.05.2013 12:42, Jeff Layton пишет:
On Mon, 20 May 2013 11:00:37 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
Usermode helper executes all binaries in global init root context. This
doesn't allow to call to call the binary from other root (for example in a
container).
Currently
20.05.2013 17:57, Oleg Nesterov пишет:
On 05/20, Stanislav Kinsbursky wrote:
Usermode helper executes all binaries in global init root context. This
doesn't allow to call to call the binary from other root (for example in a
container).
Currently, containerized NFS server requires an ability
24.04.2013 00:00, J. Bruce Fields пишет:
On Fri, Apr 19, 2013 at 07:01:50AM -0700, Jeff Layton wrote:
On Tue, 16 Apr 2013 15:17:44 +0400
Stanislav Kinsbursky wrote:
This patch adds support for UserModeHelper tracker in a container.
The reason for this is that the only containerised tracker
24.04.2013 00:00, J. Bruce Fields пишет:
On Fri, Apr 19, 2013 at 07:01:50AM -0700, Jeff Layton wrote:
On Tue, 16 Apr 2013 15:17:44 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
This patch adds support for UserModeHelper tracker in a container.
The reason
root for spawned kernel thread.
Note: container's root can be stored on stack, because UMH calls are
synchronous.
Signed-off-by: Stanislav Kinsbursky
---
fs/nfsd/nfs4recover.c | 29 ++---
1 files changed, 22 insertions(+), 7 deletions(-)
diff --git a/fs/nfsd/nfs4recover.c
: container's root can be stored on stack, because UMH calls are
synchronous.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
fs/nfsd/nfs4recover.c | 29 ++---
1 files changed, 22 insertions(+), 7 deletions(-)
diff --git a/fs/nfsd/nfs4recover.c b/fs/nfsd
freed without unlinking from queue
(which leads to memory corruption) plus dummy allocated copy won't be
released.
Signed-off-by: Stanislav Kinsbursky
diff --git a/ipc/msg.c b/ipc/msg.c
index 31cd1bf..fede1d0 100644
--- a/ipc/msg.c
+++ b/ipc/msg.c
@@ -872,6 +872,7 @@ long do_msgrcv(int ms
queue
(which leads to memory corruption) plus dummy allocated copy won't be
released.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
diff --git a/ipc/msg.c b/ipc/msg.c
index 31cd1bf..fede1d0 100644
--- a/ipc/msg.c
+++ b/ipc/msg.c
@@ -872,6 +872,7 @@ long do_msgrcv(int msqid
06.03.2013 09:06, Stanislav Kinsbursky пишет:
06.03.2013 01:20, J. Bruce Fields пишет:
On Thu, Feb 28, 2013 at 03:09:59PM +0300, Stanislav Kinsbursky wrote:
Function nfsd4_client_tracking_init() can return error.
Before, I think that we the nfsd4_client_* functions just became no-ops
06.03.2013 01:20, J. Bruce Fields пишет:
On Thu, Feb 28, 2013 at 03:09:59PM +0300, Stanislav Kinsbursky wrote:
Function nfsd4_client_tracking_init() can return error.
Before, I think that we the nfsd4_client_* functions just became no-ops
in this case. With the result that no client records
06.03.2013 01:20, J. Bruce Fields пишет:
On Thu, Feb 28, 2013 at 03:09:59PM +0300, Stanislav Kinsbursky wrote:
Function nfsd4_client_tracking_init() can return error.
Before, I think that we the nfsd4_client_* functions just became no-ops
in this case. With the result that no client records
06.03.2013 09:06, Stanislav Kinsbursky пишет:
06.03.2013 01:20, J. Bruce Fields пишет:
On Thu, Feb 28, 2013 at 03:09:59PM +0300, Stanislav Kinsbursky wrote:
Function nfsd4_client_tracking_init() can return error.
Before, I think that we the nfsd4_client_* functions just became no-ops
04.03.2013 18:47, Jeff Layton пишет:
On Mon, 4 Mar 2013 10:38:45 +0400
Stanislav Kinsbursky wrote:
01.03.2013 17:09, Jeff Layton пишет:
On Fri, 01 Mar 2013 11:24:23 +0300
Stanislav Kinsbursky wrote:
Currently, UMH and Legacy trackers are disabled in containers.
But existent logic can
04.03.2013 18:47, Jeff Layton пишет:
On Mon, 4 Mar 2013 10:38:45 +0400
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
01.03.2013 17:09, Jeff Layton пишет:
On Fri, 01 Mar 2013 11:24:23 +0300
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
Currently, UMH and Legacy trackers
01.03.2013 17:09, Jeff Layton пишет:
On Fri, 01 Mar 2013 11:24:23 +0300
Stanislav Kinsbursky wrote:
Currently, UMH and Legacy trackers are disabled in containers.
But existent logic can lookup nfs4_recoverydir in a container, and in this
case will try to init Legacy tracker and skip nfsdcld
01.03.2013 17:09, Jeff Layton пишет:
On Fri, 01 Mar 2013 11:24:23 +0300
Stanislav Kinsbursky skinsbur...@parallels.com wrote:
Currently, UMH and Legacy trackers are disabled in containers.
But existent logic can lookup nfs4_recoverydir in a container, and in this
case will try to init Legacy
Legacy tracker init will return -EINVAL for a container.
So, let's change "-EINVAL" on "-ENOTSUPP" for legacy tracker init call in a
container and in case of this error code, try nfsdcld client tracker instead
of returning a error.
Signed-off-by: Stanislav Kinsbursky
---
f
Legacy tracker init will return -EINVAL for a container.
So, let's change -EINVAL on -ENOTSUPP for legacy tracker init call in a
container and in case of this error code, try nfsdcld client tracker instead
of returning a error.
Signed-off-by: Stanislav Kinsbursky skinsbur...@parallels.com
---
fs
1 - 100 of 758 matches
Mail list logo