Re: [RFC] Parallelize IO for e2fsck

2008-01-22 Thread David Chinner
On Tue, Jan 22, 2008 at 12:05:11AM -0700, Andreas Dilger wrote: > On Jan 22, 2008 14:38 +1100, David Chinner wrote: > > On Mon, Jan 21, 2008 at 04:00:41PM -0700, Andreas Dilger wrote: > > > I discussed this with Ted at one point also. This is a generic problem, > > > not just for readahead, becau

Re: konqueror deadlocks on 2.6.22

2008-01-22 Thread Ingo Molnar
* Oliver Pinter (Pintér Olivér) <[EMAIL PROTECTED]> wrote: > and then please update to CFS-v24.1 > http://people.redhat.com/~mingo/cfs-scheduler/sched-cfs-v2.6.22.15-v24.1.patch > > Yes with CFSv20.4, as in the log. > > > > It also hangs on 2.6.23.13 my feeling is that this is some sort of timi

Re: [RFC] Parallelize IO for e2fsck

2008-01-22 Thread Alan Cox
> I'd tried to advocate SIGDANGER some years ago as well, but none of > the kernel maintainers were interested. It definitely makes sense > to have some sort of mechanism like this. At the time I first brought > it up it was in conjunction with Netscape using too much cache on some > system, but

Re: konqueror deadlocks on 2.6.22

2008-01-22 Thread Al Boldi
Ingo Molnar wrote: > * Oliver Pinter (Pintér Olivér) <[EMAIL PROTECTED]> wrote: > > and then please update to CFS-v24.1 > > http://people.redhat.com/~mingo/cfs-scheduler/sched-cfs-v2.6.22.15-v24.1 > >.patch > > > > > Yes with CFSv20.4, as in the log. > > > > > > It also hangs on 2.6.23.13 > > my fe

Re: konqueror deadlocks on 2.6.22

2008-01-22 Thread Chris Mason
On Tuesday 22 January 2008, Al Boldi wrote: > Ingo Molnar wrote: > > * Oliver Pinter (Pintér Olivér) <[EMAIL PROTECTED]> wrote: > > > and then please update to CFS-v24.1 > > > http://people.redhat.com/~mingo/cfs-scheduler/sched-cfs-v2.6.22.15-v24. > > >1 .patch > > > > > > > Yes with CFSv20.4, as i

Re: [RFC] Parallelize IO for e2fsck

2008-01-22 Thread Theodore Tso
On Tue, Jan 22, 2008 at 12:00:50AM -0700, Andreas Dilger wrote: > > AIX had SIGDANGER some 15 years ago. Admittedly, that was sent when > > the system was about to hit OOM, not when it was about to start swapping. > > I'd tried to advocate SIGDANGER some years ago as well, but none of > the kerne

Re: [RFC] Parallelize IO for e2fsck

2008-01-22 Thread Arnaldo Carvalho de Melo
Em Tue, Jan 22, 2008 at 09:40:52AM -0500, Theodore Tso escreveu: > On Tue, Jan 22, 2008 at 12:00:50AM -0700, Andreas Dilger wrote: > > > AIX had SIGDANGER some 15 years ago. Admittedly, that was sent when > > > the system was about to hit OOM, not when it was about to start swapping. > > > > I'd

Re: [RFC] Parallelize IO for e2fsck

2008-01-22 Thread Bryan Henderson
>I think there is a clear need for applications to be able to >register a callback from the kernel to indicate that the machine as >a whole is running out of memory and that the application should >trim it's caches to reduce memory utilisation. > >Perhaps instead of swapping immediately, a SIGLOWME

Re: konqueror deadlocks on 2.6.22

2008-01-22 Thread Al Boldi
Chris Mason wrote: > Running fsync in data=ordered means that all of the dirty blocks on the FS > will get written before fsync returns. Hm, that's strange, I expected this kind of behaviour from data=journal. data=writeback should return immediatly, which seems it does, but data=ordered should

Re: konqueror deadlocks on 2.6.22

2008-01-22 Thread Chris Mason
On Tuesday 22 January 2008, Al Boldi wrote: > Chris Mason wrote: > > Running fsync in data=ordered means that all of the dirty blocks on the > > FS will get written before fsync returns. > > Hm, that's strange, I expected this kind of behaviour from data=journal. > > data=writeback should return im

[0/4] DST: Distributed storage: Succumbed to live ant.

2008-01-22 Thread Evgeniy Polyakov
Distributed storage: Succumbed to live ant. I'm pleased to announce the 14'th release of the distributed storage subsystem (DST). DST allows to form a storage on top of local and remote nodes and combine them into linear or mirroring setup, which in turn can be exported to remote nodes. This is

[1/4] DST: Distributed storage documentation.

2008-01-22 Thread Evgeniy Polyakov
Distributed storage documentation. Algorithms used in the system, userspace interfaces (sysfs dirs and files), design and implementation details are described here. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git a/Documentation/dst/algorithms.txt b/Documentation/dst/algorithms.

[4/4] DST: Algorithms used in distributed storage.

2008-01-22 Thread Evgeniy Polyakov
Algorithms used in distributed storage. Mirror and linear mapping code. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git a/drivers/block/dst/alg_linear.c b/drivers/block/dst/alg_linear.c new file mode 100644 index 000..2f9ed65 --- /dev/null +++ b/drivers/block/dst/alg_linear.c

[3/4] DST: Network state machine.

2008-01-22 Thread Evgeniy Polyakov
Network state machine. Includes network async processing state machine and related tasks. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git a/drivers/block/dst/kst.c b/drivers/block/dst/kst.c new file mode 100644 index 000..4ff14ce --- /dev/null +++ b/drivers/block/dst/kst.c @

[2/4] DST: Core distributed storage files.

2008-01-22 Thread Evgeniy Polyakov
Core distributed storage files. Include userspace interfaces, initialization, block layer bindings and other core functionality. Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]> diff --git a/drivers/block/Kconfig b/drivers/block/Kconfig index b4c8319..ca6592d 100644 --- a/drivers/block/Kconf

[PATCH] procfs: constify function pointer tables

2008-01-22 Thread Jan Engelhardt
Hi, This touches so many different places that I did not feel like creating a miniscule patch for each architecture. I hope that is ok. ===Patch begins=== [PATCH] procfs: constify function pointer tables Signed-off-by: Jan Engelhardt <[EMAIL PROTECTED]> --- arch/alpha/kernel/setup.c |

Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property

2008-01-22 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > What do you think about doing this only if FS_SAFE is also set, > > so for instance at first only FUSE would allow itself to be > > made user-mountable? > > > > A safe thing to do, or overly intrusive? > > It goes somewhat against the "no policy in

Re: [RFC][PATCH] VFS: create /proc//mountinfo

2008-01-22 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > On Mon, 2008-01-21 at 22:25 +0100, Miklos Szeredi wrote: > > > > You have removed the code that checked if the peer or > > > > master mount was in the same namespace before reporting their > > > > corresponding mount-ids. One d

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread Geert Uytterhoeven
On Tue, 22 Jan 2008, Jan Engelhardt wrote: > This touches so many different places that I did not feel like creating > a miniscule patch for each architecture. I hope that is ok. > > ===Patch begins=== > [PATCH] procfs: constify function pointer tables > > Signed-off-by: Jan Engelhardt <[EMAIL P

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread Mike Frysinger
On Jan 22, 2008 3:00 PM, Jan Engelhardt <[EMAIL PROTECTED]> wrote: > This touches so many different places that I did not feel like creating > a miniscule patch for each architecture. I hope that is ok. there is a linux-arch alias so you dont have to look up every maintainer yourself ;) > arch/b

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread David Howells
FRV looks okay. Acked-By: David Howells <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property

2008-01-22 Thread Miklos Szeredi
> > > What do you think about doing this only if FS_SAFE is also set, > > > so for instance at first only FUSE would allow itself to be > > > made user-mountable? > > > > > > A safe thing to do, or overly intrusive? > > > > It goes somewhat against the "no policy in kernel" policy ;). I think >

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread Stephen Rothwell
Hi Jan, On Tue, 22 Jan 2008 21:00:46 +0100 (CET) Jan Engelhardt <[EMAIL PROTECTED]> wrote: > > -extern struct seq_operations mounts_op; > +extern const struct seq_operations mounts_op; [ and many others ... ] I don't suppose you feel like finding appropriate header files to put these declaratio

Re: [patch 07/10] unprivileged mounts: add sysctl tunable for "safe" property

2008-01-22 Thread Serge E. Hallyn
Quoting Miklos Szeredi ([EMAIL PROTECTED]): > > > > What do you think about doing this only if FS_SAFE is also set, > > > > so for instance at first only FUSE would allow itself to be > > > > made user-mountable? > > > > > > > > A safe thing to do, or overly intrusive? > > > > > > It goes somewha

[PATCH 00/27] Permit filesystem local caching

2008-01-22 Thread David Howells
These patches add local caching for network filesystems such as NFS. The patches can roughly be broken down into a number of sets: (*) 01-keys-inc-payload.diff (*) 02-keys-search-keyring.diff (*) 03-keys-callout-blob.diff Three patches to the keyring code made to help the CIFS peop

[PATCH 01/27] KEYS: Increase the payload size when instantiating a key

2008-01-22 Thread David Howells
Increase the size of a payload that can be used to instantiate a key in add_key() and keyctl_instantiate_key(). This permits huge CIFS SPNEGO blobs to be passed around. The limit is raised to 1MB. If kmalloc() can't allocate a buffer of sufficient size, vmalloc() will be tried instead. Signed-o

[PATCH 02/27] KEYS: Check starting keyring as part of search

2008-01-22 Thread David Howells
Check the starting keyring as part of the search to (a) see if that is what we're searching for, and (b) to check it is still valid for searching. The scenario: User in process A does things that cause things to be created in its process session keyring. The user then does an su to another user

[PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string

2008-01-22 Thread David Howells
Allow the callout data to be passed as a blob rather than a string for internal kernel services that call any request_key_*() interface other than request_key(). request_key() itself still takes a NUL-terminated string. The functions that change are: request_key_with_auxdata() re

[PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id()

2008-01-22 Thread David Howells
Change current->fs[ug]id to current_fs[ug]id() so that fsgid and fsuid can be separated from the task_struct. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- arch/ia64/kernel/perfmon.c|4 ++-- arch/powerpc/platforms/cell/spufs/inode.c |4 ++-- drivers/isdn/capi/capif

[PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing

2008-01-22 Thread David Howells
secid_to_secctx() LSM hook. This patch also includes the SELinux implementation for this hook. Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: Stephen Smalley <[EMAIL PROTECTED]> --- include/linux/security.h | 13 + security/dummy.c |6 ++ security/security

[PATCH 04/27] KEYS: Add keyctl function to get a security label

2008-01-22 Thread David Howells
Add a keyctl() function to get the security label of a key. The following is added to Documentation/keys.txt: (*) Get the LSM security context attached to a key. long keyctl(KEYCTL_GET_SECURITY, key_serial_t key, char *buffer, size_t buflen) This function retur

[PATCH 09/27] Security: Pre-add additional non-caching classes

2008-01-22 Thread David Howells
Pre-add additional non-caching classes that are in the SELinux upstream repository, but not in the upstream kernel so they don't get in the fscache class patch. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h |5 + security/selinux/includ

[PATCH 10/27] Security: Add a kernel_service object class to SELinux

2008-01-22 Thread David Howells
Add a 'kernel_service' object class to SELinux and give this object class two access vectors: 'use_as_override' and 'create_files_as'. The first vector is used to grant a process the right to nominate an alternate process security ID for the kernel to use as an override for the SELinux subjective

[PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions

2008-01-22 Thread David Howells
Allow kernel services to override LSM settings appropriate to the actions performed by a task by duplicating a security record, modifying it and then using task_struct::act_as to point to it when performing operations on behalf of a task. This is used, for example, by CacheFiles which has to trans

[PATCH 12/27] Security: Make NFSD work with detached security

2008-01-22 Thread David Howells
Make NFSD work with detached security, using the patches that excise the security information from task_struct to struct task_security as a base. Each time NFSD wants a new security descriptor (to do NFS4 recovery or just to do NFS operations), a task_security record is derived from NFSD's *object

[PATCH 13/27] FS-Cache: Release page->private after failed readahead

2008-01-22 Thread David Howells
The attached patch causes read_cache_pages() to release page-private data on a page for which add_to_page_cache() fails or the filler function fails. This permits pages with caching references associated with them to be cleaned up. The invalidatepage() address space op is called (indirectly) to do

[PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management

2008-01-22 Thread David Howells
Recruit a couple of page flags to aid in cache management. The following extra flags are defined: (1) PG_fscache (PG_private_2) The marked page is backed by a local cache and is pinning resources in the cache driver. (2) PG_fscache_write (PG_owner_priv_2) The marked page is be

[PATCH 15/27] FS-Cache: Provide an add_wait_queue_tail() function

2008-01-22 Thread David Howells
Provide an add_wait_queue_tail() function to add a waiter to the back of a wait queue instead of the front. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- include/linux/wait.h |2 ++ kernel/wait.c| 18 ++ 2 files changed, 20 insertions(+), 0 deletions(-) dif

[PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3

2008-01-22 Thread David Howells
Change all the usages of file->f_mapping in ext3_*write_end() functions to use the mapping argument directly. This has two consequences: (*) Consistency. Without this patch sometimes one is used and sometimes the other is. (*) A NULL file pointer can be passed. This feature is then made

[PATCH 17/27] CacheFiles: Add missing copy_page export for ia64

2008-01-22 Thread David Howells
This one-line patch fixes the missing export of copy_page introduced by the cachefile patches. This patch is not yet upstream, but is required for cachefile on ia64. It will be pushed upstream when cachefile goes upstream. Signed-off-by: Prarit Bhargava <[EMAIL PROTECTED]> Signed-off-by: David H

[PATCH 20/27] CacheFiles: Permit the page lock state to be monitored

2008-01-22 Thread David Howells
Add a function to install a monitor on the page lock waitqueue for a particular page, thus allowing the page being unlocked to be detected. This is used by CacheFiles to detect read completion on a page in the backing filesystem so that it can then copy the data to the waiting netfs page. Signed-

[PATCH 21/27] CacheFiles: Export things for CacheFiles

2008-01-22 Thread David Howells
Export a number of functions for CacheFiles's use. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/super.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/fs/super.c b/fs/super.c index ceaf2e3..cd199ae 100644 --- a/fs/super.c +++ b/fs/super.c @@ -266,6 +266,7 @@

[PATCH 19/27] CacheFiles: Add a hook to write a single page of data to an inode

2008-01-22 Thread David Howells
Add an address space operation to write one single page of data to an inode at a page-aligned location (thus permitting the implementation to be highly optimised). The data source is a single page. This is used by CacheFiles to store the contents of netfs pages into their backing file pages. Sup

[PATCH 23/27] NFS: Fix memory leak

2008-01-22 Thread David Howells
Fix a memory leak whereby multiple clientaddr=xxx mount options just overwrite the duplicated client_address option pointer, without freeing the old memory. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/super.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git

[PATCH 24/27] NFS: Use local caching

2008-01-22 Thread David Howells
The attached patch makes it possible for the NFS filesystem to make use of the network filesystem local caching service (FS-Cache). To be able to use this, an updated mount program is required. This can be obtained from: http://people.redhat.com/steved/fscache/util-linux/ To mount an NF

[PATCH 25/27] NFS: Configuration and mount option changes to enable local caching on NFS

2008-01-22 Thread David Howells
Changes to the kernel configuration defintions and to the NFS mount options to allow the local caching support added by the previous patch to be enabled. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/Kconfig|8 fs/nfs/client.c |2 ++ fs/nfs/internal.h |1

[PATCH 26/27] NFS: Display local caching state

2008-01-22 Thread David Howells
Display the local caching state in /proc/fs/nfsfs/volumes. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/client.c |7 --- fs/nfs/fscache.h | 15 +++ 2 files changed, 19 insertions(+), 3 deletions(-) diff --git a/fs/nfs/client.c b/fs/nfs/client.c index 92f9b

[PATCH 27/27] NFS: Separate caching by superblock, explicitly if necessary

2008-01-22 Thread David Howells
Separate caching by superblock, explicitly if necessary. This means mounts of the same remote data with different parameters do not share cache objects for common files. The administrator may also provide a uniquifier to further enhance the uniqueness. Where it is otherwise impossible to disting

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread Bryan Wu
On Jan 23, 2008 4:00 AM, Jan Engelhardt <[EMAIL PROTECTED]> wrote: > Hi, > > > This touches so many different places that I did not feel like creating > a miniscule patch for each architecture. I hope that is ok. > > ===Patch begins=== > [PATCH] procfs: constify function pointer tables > > Signed-o