[Devel] Re: IO scheduler based IO Controller V2

2009-05-11 Thread Ryo Tsuruta
Hi Rik, From: Rik van Riel r...@redhat.com Subject: Re: IO scheduler based IO Controller V2 Date: Fri, 08 May 2009 10:24:50 -0400 Ryo Tsuruta wrote: Hi Vivek, Ryo, dm-ioband breaks the notion of classes and priority of CFQ because of FIFO dispatch of buffered bios. Apart from that it

[Devel] Re: IO scheduler based IO Controller V2

2009-05-11 Thread Ryo Tsuruta
Hi Vivek, From: Vivek Goyal vgo...@redhat.com Subject: Re: IO scheduler based IO Controller V2 Date: Wed, 6 May 2009 21:25:59 -0400 On Thu, May 07, 2009 at 09:18:58AM +0900, Ryo Tsuruta wrote: Hi Vivek, Ryo, dm-ioband breaks the notion of classes and priority of CFQ because of FIFO

[Devel] Re: IO scheduler based IO Controller V2

2009-05-11 Thread Vivek Goyal
On Mon, May 11, 2009 at 08:23:09PM +0900, Ryo Tsuruta wrote: Hi Vivek, From: Vivek Goyal vgo...@redhat.com Subject: Re: IO scheduler based IO Controller V2 Date: Wed, 6 May 2009 21:25:59 -0400 On Thu, May 07, 2009 at 09:18:58AM +0900, Ryo Tsuruta wrote: Hi Vivek, Ryo,

[Devel] [PATCH] cr: s390: remove unused variable ret

2009-05-11 Thread Serge E. Hallyn
Trivial cleanup. Signed-off-by: Serge E. Hallyn se...@us.ibm.com --- arch/s390/mm/checkpoint.c |1 - 1 files changed, 0 insertions(+), 1 deletions(-) diff --git a/arch/s390/mm/checkpoint.c b/arch/s390/mm/checkpoint.c index 520d1fb..f97f619 100644 --- a/arch/s390/mm/checkpoint.c +++

[Devel] Re: [PATCH] io-controller: Add io group reference handling for request

2009-05-11 Thread Vivek Goyal
On Mon, May 11, 2009 at 09:33:05AM +0800, Gui Jianfeng wrote: Nauman Rafique wrote: On Fri, May 8, 2009 at 6:57 AM, Vivek Goyal vgo...@redhat.com wrote: On Fri, May 08, 2009 at 05:45:32PM +0800, Gui Jianfeng wrote: Hi Vivek, This patch adds io group reference handling when allocating

[Devel] [PATCH 0/5] cr: attempt at task userid restoration

2009-05-11 Thread Serge E. Hallyn
Here is a broken-out patchset representing a first stab at checkpoint and restoring task userids. As I note somewhere, I have more thinking to do about refcounting and I'm sure there are plenty of bugs. I'm sending this out to see if there are major objections to this general approach. thanks,

[Devel] [PATCH 4/5] cr: checkpoint and restore task credentials

2009-05-11 Thread Serge E. Hallyn
This patch adds the checkpointing and restart of credentials (uids, gids, and capabilities) to Oren's c/r patchset (on top of v14). It goes to great pains to re-use (and define when needed) common helpers, in order to make sure that as security code is modified, the cr code will be updated. Some

[Devel] [PATCH 5/5] cr: restore file-f_cred

2009-05-11 Thread Serge E. Hallyn
Ony seems useful if you're using coda or hppfs, but go ahead and restore a file's f_cred. This is set to the cred of the task doing the open, so often it will be the same as that of the restarted task. Signed-off-by: Serge E. Hallyn se...@us.ibm.com --- checkpoint/files.c | 16

[Devel] [PATCH 3/5] cr: capabilities: define checkpoint and restore fns

2009-05-11 Thread Serge E. Hallyn
An application checkpoint image will store capability sets (and the bounding set) as __u64s. Define checkpoint and restart functions to translate between those and kernel_cap_t's. Define a common function do_capset_tocred() which applies capability set changes to a passed-in struct cred. The

[Devel] [PATCH 1/5] cr: break out new_user_ns()

2009-05-11 Thread Serge E. Hallyn
Break out the core function which checks privilege and (if allowed) creates a new user namespace, with the passed-in creating user_struct. Note that a user_namespace, unlike other namespace pointers, is not stored in the nsproxy. Rather it is purely a property of user_structs. This will let us

[Devel] [PATCH 2/5] cr: split core function out of some set*{u, g}id functions

2009-05-11 Thread Serge E. Hallyn
When restarting tasks, we want to be able to change xuid and xgid in a struct cred, and do so with security checks. Break the core functionality of set{,fs,res}{u,g}id into cred_setX which performs the access checks based on current_cred(), but performs the requested change on a passed-in cred.