Hi Rik,
From: Rik van Riel r...@redhat.com
Subject: Re: IO scheduler based IO Controller V2
Date: Fri, 08 May 2009 10:24:50 -0400
Ryo Tsuruta wrote:
Hi Vivek,
Ryo, dm-ioband breaks the notion of classes and priority of CFQ because
of FIFO dispatch of buffered bios. Apart from that it
Hi Vivek,
From: Vivek Goyal vgo...@redhat.com
Subject: Re: IO scheduler based IO Controller V2
Date: Wed, 6 May 2009 21:25:59 -0400
On Thu, May 07, 2009 at 09:18:58AM +0900, Ryo Tsuruta wrote:
Hi Vivek,
Ryo, dm-ioband breaks the notion of classes and priority of CFQ because
of FIFO
On Mon, May 11, 2009 at 08:23:09PM +0900, Ryo Tsuruta wrote:
Hi Vivek,
From: Vivek Goyal vgo...@redhat.com
Subject: Re: IO scheduler based IO Controller V2
Date: Wed, 6 May 2009 21:25:59 -0400
On Thu, May 07, 2009 at 09:18:58AM +0900, Ryo Tsuruta wrote:
Hi Vivek,
Ryo,
Trivial cleanup.
Signed-off-by: Serge E. Hallyn se...@us.ibm.com
---
arch/s390/mm/checkpoint.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/arch/s390/mm/checkpoint.c b/arch/s390/mm/checkpoint.c
index 520d1fb..f97f619 100644
--- a/arch/s390/mm/checkpoint.c
+++
On Mon, May 11, 2009 at 09:33:05AM +0800, Gui Jianfeng wrote:
Nauman Rafique wrote:
On Fri, May 8, 2009 at 6:57 AM, Vivek Goyal vgo...@redhat.com wrote:
On Fri, May 08, 2009 at 05:45:32PM +0800, Gui Jianfeng wrote:
Hi Vivek,
This patch adds io group reference handling when allocating
Here is a broken-out patchset representing a first stab at
checkpoint and restoring task userids. As I note somewhere,
I have more thinking to do about refcounting and I'm sure
there are plenty of bugs. I'm sending this out to see
if there are major objections to this general approach.
thanks,
This patch adds the checkpointing and restart of credentials
(uids, gids, and capabilities) to Oren's c/r patchset (on top
of v14). It goes to great pains to re-use (and define when
needed) common helpers, in order to make sure that as security
code is modified, the cr code will be updated. Some
Ony seems useful if you're using coda or hppfs, but go ahead and
restore a file's f_cred. This is set to the cred of the task doing
the open, so often it will be the same as that of the restarted task.
Signed-off-by: Serge E. Hallyn se...@us.ibm.com
---
checkpoint/files.c | 16
An application checkpoint image will store capability sets
(and the bounding set) as __u64s. Define checkpoint and
restart functions to translate between those and kernel_cap_t's.
Define a common function do_capset_tocred() which applies capability
set changes to a passed-in struct cred.
The
Break out the core function which checks privilege and (if
allowed) creates a new user namespace, with the passed-in
creating user_struct. Note that a user_namespace, unlike
other namespace pointers, is not stored in the nsproxy.
Rather it is purely a property of user_structs.
This will let us
When restarting tasks, we want to be able to change xuid and
xgid in a struct cred, and do so with security checks. Break
the core functionality of set{,fs,res}{u,g}id into cred_setX
which performs the access checks based on current_cred(),
but performs the requested change on a passed-in cred.
11 matches
Mail list logo