bcd9d4aa7e755678d33f3fe6f4
> +This bit is not set by the kernel.
> +It is reserved for the userspace perf utility to indicate that
> +.I /proc/xxx/maps
> +parsing was taking too long and stopped and thus the mmap
> +records may be truncated.
> .RE
> .TP
> .I type
>
--
> +This bit is not set by the kernel.
> +It is reserved for the userspace perf utility to indicate that
> +.I /proc/xxx/maps
> +parsing was taking too long and stopped and thus the mmap
> +records may be truncated.
> .RE
> .TP
> .I type
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
of samples may have been lost.
> +
> +.in +4n
> +.nf
> +struct {
> +struct perf_event_header header;
> +u64 lost;
> +struct sample_id sample_id;
> +};
> +.fi
> +.RS
> +.TP
> +.I lost
> +the number of potentially lost samples.
> +.RE
> .RE
&g
> +
> +.in +4n
> +.nf
> +struct {
> +struct perf_event_header header;
> +u64 lost;
> +struct sample_id sample_id;
> +};
> +.fi
> +.RS
> +.TP
> +.I lost
> +the number of potentially lost samples.
> +.RE
> .RE
> .SS Overflow handling
> Events c
> +.\" commit c9fdfa14c3792c0160849c484e83aa57afd80ccc
> +Indirect jumps.
> +.TP
> .BR PERF_SAMPLE_BRANCH_COND " (since Linux 3.16)"
> .\" commit bac52139f0b7ab31330e98fd87fc5a2664951050
> Conditional branches.
>
--
Michael Kerrisk
Linux man-pages main
3792c0160849c484e83aa57afd80ccc
> +Indirect jumps.
> +.TP
> .BR PERF_SAMPLE_BRANCH_COND " (since Linux 3.16)"
> .\" commit bac52139f0b7ab31330e98fd87fc5a2664951050
> Conditional branches.
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
LLCHAIN
> +is requested and
> +.I sample_max_stack
> +is larger than the maximum specified in
> +.IR /proc/sys/kernel/perf_event_max_stack .
> +.TP
> .B EPERM
> Returned on many (but not all) architectures when an unsupported
> .IR exclude_hv ", " exclude_idle ", " exclude_user ", or " exclude_kernel
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
requested and
> +.I sample_max_stack
> +is larger than the maximum specified in
> +.IR /proc/sys/kernel/perf_event_max_stack .
> +.TP
> .B EPERM
> Returned on many (but not all) architectures when an unsupported
> .IR exclude_hv ", " exclude_idle ", " exclude_user ", or " exclude_kernel
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
Hi Christoph,
On 13 October 2016 at 20:16, Christoph Lameter <c...@linux.com> wrote:
> On Thu, 13 Oct 2016, Michael Kerrisk (man-pages) wrote:
>
>> @@ -100,7 +100,10 @@ If, however, the shared memory region was created with
>> the
>> .B SHM_HUGETLB
>> flag,
Hi Christoph,
On 13 October 2016 at 20:16, Christoph Lameter wrote:
> On Thu, 13 Oct 2016, Michael Kerrisk (man-pages) wrote:
>
>> @@ -100,7 +100,10 @@ If, however, the shared memory region was created with
>> the
>> .B SHM_HUGETLB
>> flag,
>> the hu
reverts to system default policy
+the thread's memory policy reverts to the system default policy
or local allocation.
When
.B MPOL_DEFAULT
is specified for a range of memory using
.BR mbind (),
any pages subsequently allocated for that range will use
-the process's policy, as set by
+th
reverts to system default policy
+the thread's memory policy reverts to the system default policy
or local allocation.
When
.B MPOL_DEFAULT
is specified for a range of memory using
.BR mbind (),
any pages subsequently allocated for that range will use
-the process's policy, as set by
+th
On 10/12/2016 09:55 PM, Christoph Lameter wrote:
> On Wed, 12 Oct 2016, Piotr Kwapulinski wrote:
>
>> That's right. This could be "local allocation" or any other memory policy.
>
> Correct.
>
Thanks, Piotr and Christoph.
Cheers,
Michael
--
Michael Kerrisk
L
On 10/12/2016 09:55 PM, Christoph Lameter wrote:
> On Wed, 12 Oct 2016, Piotr Kwapulinski wrote:
>
>> That's right. This could be "local allocation" or any other memory policy.
>
> Correct.
>
Thanks, Piotr and Christoph.
Cheers,
Michael
--
Michael Kerrisk
L
Hi Christoph,
On 12 October 2016 at 16:08, Christoph Lameter <c...@linux.com> wrote:
> On Wed, 12 Oct 2016, Michael Kerrisk (man-pages) wrote:
>
>> > +arguments must specify the empty set. If the "local node" is low
>> > +on free memory the kerne
Hi Christoph,
On 12 October 2016 at 16:08, Christoph Lameter wrote:
> On Wed, 12 Oct 2016, Michael Kerrisk (man-pages) wrote:
>
>> > +arguments must specify the empty set. If the "local node" is low
>> > +on free memory the kernel will try to allocate memory
try to allocate memory from other
> +nodes. The kernel will allocate memory from the "local node"
> +whenever memory for this node is available. If the "local node"
> +is not allowed by the process's current cpuset context the kernel
> +will try to allocate memory from other nodes. The kernel will
> +allocate memory from the "local node" whenever it becomes allowed
> +by the process's current cpuset context.
> +
> The thread memory policy is preserved across an
> .BR execve (2),
> and is inherited by child threads created using
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
kernel will allocate memory from the "local node"
> +whenever memory for this node is available. If the "local node"
> +is not allowed by the process's current cpuset context the kernel
> +will try to allocate memory from other nodes. The kernel will
> +allocate memory from the "local node" whenever it becomes allowed
> +by the process's current cpuset context.
> +
> The thread memory policy is preserved across an
> .BR execve (2),
> and is inherited by child threads created using
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
-10-08, Munich
New and rewritten pages
---
quotactl.2
Eugene Syromyatnikov [Michael Kerrisk]
Updated information regarding disk quota flags
Added information regarding DQF_SYS_FILE flag; updated definition
of V1_DQF_RSQUASH, which has been
-10-08, Munich
New and rewritten pages
---
quotactl.2
Eugene Syromyatnikov [Michael Kerrisk]
Updated information regarding disk quota flags
Added information regarding DQF_SYS_FILE flag; updated definition
of V1_DQF_RSQUASH, which has been
.
> +
> The memory lock on an address range is automatically removed
> if the address range is unmapped via
> .BR munmap (2).
>
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
rocess. Therefore it is crucial not to
> +invoke
> +.BR fork (2)
> +after the
> +.BR mlockall ()
> +or
> +.BR mlock ()
> +operation not even from thread which runs at a low priority within a process
> +which also has a thread running at elevated priority.
> +
> The memory lo
t;penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 3 +++
1 file changed, 3 insertions(+)
diff --gi
gt;
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 36 ++--
1 file changed, 18 insertions(+), 18 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 41a580a..7415
Cc: socketp...@gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa.
use of atomic_long_read() to get the
value user->pipe_bufs.
Cc: Willy Tarreau
Cc: Vegard Nossum
Cc: socketp...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.
Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 45 +++--
1 file changed, 23 insertions(+), 22 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index f45a173..256fc5a 100644
nux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/fs/pipe.c b/fs/pipe.c
index 741560b..10c5ad5 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -631,6 +631,9 @@ struct pipe_inode_info *alloc_pipe_info(void)
if (pipe == N
gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 20
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 20 +---
1 file changed, 13 insertions(+), 7 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 256fc5a..41a580a 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -632,24
.eu>
Cc: Vegard Nossum <vegard.nos...@oracle.com>
Cc: socketp...@gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-
returned 8388608
8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by
nda <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 10 +-
1 file changed, 5
Nossum
Cc: socketp...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 41 ++---
1 file changed, 18 insertions(+), 23 deletions(-)
diff --git
returned 8388608
8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by
-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 4b98fd0..37b7f5e 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -604,10 +604,10 @@ pipe_fasync(int fd
<penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 24
Nossum <vegard.nos...@oracle.com>
Cc: socketp...@gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael K
-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 4ebe6b2..7d7c21e 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -1011,6 +1011,18 @@ const
...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
Michael Kerrisk (8):
pipe: relocate round_pipe_size() above pipe_set_size()
pipe: move limit checking logic into pipe_set_size()
pipe
Hi Willy,
On 08/22/2016 09:35 AM, Willy Tarreau wrote:
> Hi Michael,
>
> On Mon, Aug 22, 2016 at 09:15:35AM +1200, Michael Kerrisk (man-pages) wrote:
>> Hi Willy,
>>
>> Might you have a chance to further review of this patch series?
>> It would be great if yo
Hi Willy,
On 08/22/2016 09:35 AM, Willy Tarreau wrote:
> Hi Michael,
>
> On Mon, Aug 22, 2016 at 09:15:35AM +1200, Michael Kerrisk (man-pages) wrote:
>> Hi Willy,
>>
>> Might you have a chance to further review of this patch series?
>> It would be great if yo
On 08/21/2016 10:33 PM, Vegard Nossum wrote:
> On 08/20/2016 01:17 AM, Michael Kerrisk (man-pages) wrote:
>> On 08/20/2016 08:56 AM, Michael Kerrisk (man-pages) wrote:
>>> On 08/19/2016 08:30 PM, Vegard Nossum wrote:
>>>> Is there any reason why we couldn't do th
On 08/21/2016 10:33 PM, Vegard Nossum wrote:
> On 08/20/2016 01:17 AM, Michael Kerrisk (man-pages) wrote:
>> On 08/20/2016 08:56 AM, Michael Kerrisk (man-pages) wrote:
>>> On 08/19/2016 08:30 PM, Vegard Nossum wrote:
>>>> Is there any reason why we couldn't do th
bly worth swapping the size
> check and capable() below to save a function call in the normal path :
>
> On Fri, Aug 19, 2016 at 05:25:35PM +1200, Michael Kerrisk (man-pages) wrote:
>> +if (nr_pages > pipe->buffers) {
>> +if (!capable(CAP_S
bly worth swapping the size
> check and capable() below to save a function call in the normal path :
>
> On Fri, Aug 19, 2016 at 05:25:35PM +1200, Michael Kerrisk (man-pages) wrote:
>> +if (nr_pages > pipe->buffers) {
>> +if (!capable(CAP_S
On 08/20/2016 08:56 AM, Michael Kerrisk (man-pages) wrote:
> Hi Vegard,
>
> On 08/19/2016 08:30 PM, Vegard Nossum wrote:
>> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>>> The limit checking in pipe_set_size() (used by fcntl(F_SETPIPE_SZ))
>&g
On 08/20/2016 08:56 AM, Michael Kerrisk (man-pages) wrote:
> Hi Vegard,
>
> On 08/19/2016 08:30 PM, Vegard Nossum wrote:
>> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>>> The limit checking in pipe_set_size() (used by fcntl(F_SETPIPE_SZ))
>&g
Hi Vegard,
On 08/19/2016 08:30 PM, Vegard Nossum wrote:
> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>> The limit checking in pipe_set_size() (used by fcntl(F_SETPIPE_SZ))
>> has the following problems:
> [...]
>> @@ -1030,6 +1030,7 @@ static l
Hi Vegard,
On 08/19/2016 08:30 PM, Vegard Nossum wrote:
> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>> The limit checking in pipe_set_size() (used by fcntl(F_SETPIPE_SZ))
>> has the following problems:
> [...]
>> @@ -1030,6 +1030,7 @@ static l
On 08/19/2016 09:36 PM, Vegard Nossum wrote:
> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>> This is an optional patch, to provide a small performance improvement.
>> Alter account_pipe_buffers() so that it returns the new value in
>> user->pipe_bufs
On 08/19/2016 05:48 PM, Willy Tarreau wrote:
> Hi Michael,
>
> Since you're changing this code, it's probably worth swapping the size
> check and capable() below to save a function call in the normal path :
>
> On Fri, Aug 19, 2016 at 05:25:35PM +1200, Michael Kerrisk
On 08/19/2016 09:36 PM, Vegard Nossum wrote:
> On 08/19/2016 07:25 AM, Michael Kerrisk (man-pages) wrote:
>> This is an optional patch, to provide a small performance improvement.
>> Alter account_pipe_buffers() so that it returns the new value in
>> user->pipe_bufs
On 08/19/2016 05:48 PM, Willy Tarreau wrote:
> Hi Michael,
>
> Since you're changing this code, it's probably worth swapping the size
> check and capable() below to save a function call in the normal path :
>
> On Fri, Aug 19, 2016 at 05:25:35PM +1200, Michael Kerrisk
<penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 24
-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 4ebe6b2..7d7c21e 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -1011,6 +1011,18 @@ const
Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
Michael Kerrisk (8):
pipe: relocate r
-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
Michael Kerrisk (8):
pipe: relocate round_pipe_size() above pipe_set_size()
pipe: move limit checking logic into pipe_set_size()
pipe: refactor argument for account_pipe_buffers()
pipe: fix limit checking
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/fs/pipe.
-by: Michael Kerrisk
---
fs/pipe.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 4b98fd0..37b7f5e 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -604,10 +604,10 @@ pipe_fasync(int fd, struct file *filp, int on)
return retval
returned 8388608
8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by
returned 8388608
8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by
e.com>
Cc: socketp...@gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa..
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 41 ++---
1 file changed, 18 insertions(+), 23 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 7d7c21e..4b98fd0
er.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 613c6b9..705d79f 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -632,
lly Tarreau <w...@1wt.eu>
Cc: Vegard Nossum <vegard.nos...@oracle.com>
Cc: socketp...@gmail.com
Cc: Tetsuo Handa <penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.
<penguin-ker...@i-love.sakura.ne.jp>
Cc: Jens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 45 +++--
the operation to fail.
Cc: Willy Tarreau
Cc: Vegard Nossum
Cc: socketp...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 20
1 file changed, 12 insertions(+), 8
lly Tarreau
Cc: Vegard Nossum
Cc: socketp...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/fs/pipe.c b/fs/pipe.c
in
-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 45 +++--
1 file changed, 23 insertions(+), 22 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index a7470a9..613c6b9 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -625,33
gt;
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 34 +-
1 file changed, 17 insertions(+), 17 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index 705d79f..ada1777 100644
use of
atomic_long_read() to get the value user->pipe_bufs.
Cc: Willy Tarreau
Cc: Vegard Nossum
Cc: socketp...@gmail.com
Cc: Tetsuo Handa
Cc: Jens Axboe
Cc: Al Viro
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.
Andrew,
Thanks for picking up this patch series in -mm. Please drop it.
After discussions with Vegard, I have something better now.
Cheers,
Michael
On 08/16/2016 11:14 PM, Michael Kerrisk (man-pages) wrote:
> As currently implemented, when creating a new pipe or increasing
> a pipe's ca
Andrew,
thanks for picking up this patch series in -mm. Please drop it.
After discussions with Vegard, I have something better now.
Cheers,
Michael
On 08/16/2016 11:10 PM, Michael Kerrisk (man-pages) wrote:
> When changing a pipe's capacity with fcntl(F_SETPIPE_SZ), various
> limits d
Andrew,
Thanks for picking up this patch series in -mm. Please drop it.
After discussions with Vegard, I have something better now.
Cheers,
Michael
On 08/16/2016 11:14 PM, Michael Kerrisk (man-pages) wrote:
> As currently implemented, when creating a new pipe or increasing
> a pipe's ca
Andrew,
thanks for picking up this patch series in -mm. Please drop it.
After discussions with Vegard, I have something better now.
Cheers,
Michael
On 08/16/2016 11:10 PM, Michael Kerrisk (man-pages) wrote:
> When changing a pipe's capacity with fcntl(F_SETPIPE_SZ), various
> limits d
Hello Vegard,
On 08/18/2016 07:34 AM, Vegard Nossum wrote:
> On 08/17/2016 10:02 AM, Michael Kerrisk (man-pages) wrote:
>> On 08/17/2016 10:00 AM, Vegard Nossum wrote:
>>>>> Isn't there also a race where two or more concurrent pipe()/fnctl()
>>>>> calls can
Hello Vegard,
On 08/18/2016 07:34 AM, Vegard Nossum wrote:
> On 08/17/2016 10:02 AM, Michael Kerrisk (man-pages) wrote:
>> On 08/17/2016 10:00 AM, Vegard Nossum wrote:
>>>>> Isn't there also a race where two or more concurrent pipe()/fnctl()
>>>>> calls can
Hi Vegard,
On 08/17/2016 10:00 AM, Vegard Nossum wrote:
> On 08/16/2016 10:21 PM, Michael Kerrisk (man-pages) wrote:
>>>> @@ -1132,8 +1136,8 @@ long pipe_fcntl(struct file *file, unsigned int cmd,
>>>> unsigned long arg)
>>>>
Hi Vegard,
On 08/17/2016 10:00 AM, Vegard Nossum wrote:
> On 08/16/2016 10:21 PM, Michael Kerrisk (man-pages) wrote:
>>>> @@ -1132,8 +1136,8 @@ long pipe_fcntl(struct file *file, unsigned int cmd,
>>>> unsigned long arg)
>>>>
Hello Vegard,
On 08/17/2016 12:07 AM, Vegard Nossum wrote:
> On 08/16/2016 01:14 PM, Michael Kerrisk (man-pages) wrote:
>> As currently implemented, when creating a new pipe or increasing
>> a pipe's capacity with fcntl(F_SETPIPE_SZ), the checks against
>> the limits in /
Hello Vegard,
On 08/17/2016 12:07 AM, Vegard Nossum wrote:
> On 08/16/2016 01:14 PM, Michael Kerrisk (man-pages) wrote:
>> As currently implemented, when creating a new pipe or increasing
>> a pipe's capacity with fcntl(F_SETPIPE_SZ), the checks against
>> the limits in /
ens Axboe <ax...@fb.com>
Cc: Al Viro <v...@zeniv.linux.org.uk>
Cc: sta...@vger.kernel.org
Cc: linux-...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpa...@gmail.com>
---
fs/pipe.c | 24 ++--
1 file changed, 14 inser
g
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk
---
fs/pipe.c | 24 ++--
1 file changed, 14 insertions(+), 10 deletions(-)
diff --git a/fs/pipe.c b/fs/pipe.c
index a98ebca..397d8d9 100644
--- a/fs/pipe.c
+++ b/fs/pipe.c
@@ -610,16 +610,20 @@ static void account_p
8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by /proc/sys/fs/pipe-* files.
*/
int
main(int argc, char *argv[])
{
int (*pfd)[
8x---8x---8x---8x---8x---8x---8x---
/* test_F_SETPIPE_SZ.c
(C) 2016, Michael Kerrisk; licensed under GNU GPL version 2 or later
Test operation of fcntl(F_SETPIPE_SZ) for setting pipe capacity
and interactions with limits defined by /proc/sys/fs/pipe-* files.
*/
int
main(int argc, char *argv[])
{
int (*pfd)[
Hi Eric,
On 07/29/2016 08:05 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" <mtk.manpa...@gmail.com> writes:
Hi Eric,
On 07/28/2016 02:56 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" <mtk.manpa...@gmail.com> writes:
On 07/26/2
Hi Eric,
On 07/29/2016 08:05 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" writes:
Hi Eric,
On 07/28/2016 02:56 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" writes:
On 07/26/2016 10:39 PM, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 09:17
Hi Eric,
On 07/28/2016 02:56 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" <mtk.manpa...@gmail.com> writes:
On 07/26/2016 10:39 PM, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 09:17:31PM +0200, Michael Kerrisk (man-pages) wrote:
If we want to compare two
Hi Eric,
On 07/28/2016 02:56 PM, Eric W. Biederman wrote:
"Michael Kerrisk (man-pages)" writes:
On 07/26/2016 10:39 PM, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 09:17:31PM +0200, Michael Kerrisk (man-pages) wrote:
If we want to compare two file descriptors of the curre
On 07/26/2016 10:39 PM, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 09:17:31PM +0200, Michael Kerrisk (man-pages) wrote:
Hello Andrew,
On 26 July 2016 at 20:25, Andrew Vagin <ava...@virtuozzo.com> wrote:
On Tue, Jul 26, 2016 at 10:03:25AM +0200, Michael Kerrisk (man-pages) wrote:
On
On 07/26/2016 10:39 PM, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 09:17:31PM +0200, Michael Kerrisk (man-pages) wrote:
Hello Andrew,
On 26 July 2016 at 20:25, Andrew Vagin wrote:
On Tue, Jul 26, 2016 at 10:03:25AM +0200, Michael Kerrisk (man-pages) wrote:
On 07/26/2016 04:54 AM, Andrew
Hello Andrew,
On 26 July 2016 at 20:25, Andrew Vagin <ava...@virtuozzo.com> wrote:
> On Tue, Jul 26, 2016 at 10:03:25AM +0200, Michael Kerrisk (man-pages) wrote:
>> On 07/26/2016 04:54 AM, Andrew Vagin wrote:
>> > On Mon, Jul 25, 2016 at 09:59:43AM -0500, Eric W. Biederma
Hello Andrew,
On 26 July 2016 at 20:25, Andrew Vagin wrote:
> On Tue, Jul 26, 2016 at 10:03:25AM +0200, Michael Kerrisk (man-pages) wrote:
>> On 07/26/2016 04:54 AM, Andrew Vagin wrote:
>> > On Mon, Jul 25, 2016 at 09:59:43AM -0500, Eric W. Biederman wrote:
>> > &g
On 26 July 2016 at 18:52, Kees Cook <keesc...@chromium.org> wrote:
> On Tue, Jul 26, 2016 at 8:06 AM, Eric W. Biederman
> <ebied...@xmission.com> wrote:
>> "Michael Kerrisk (man-pages)" <mtk.manpa...@gmail.com> writes:
>>
>>> Hello Eric,
On 26 July 2016 at 18:52, Kees Cook wrote:
> On Tue, Jul 26, 2016 at 8:06 AM, Eric W. Biederman
> wrote:
>> "Michael Kerrisk (man-pages)" writes:
>>
>>> Hello Eric,
>>>
>>> I realized I had a question after the last mail.
Hello Eric,
I realized I had a question after the last mail.
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
Can
Hello Eric,
I realized I had a question after the last mail.
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
Can
Hello Eric,
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
The maximum sane case I can imagine is if every process
Hello Eric,
On 07/21/2016 06:39 PM, Eric W. Biederman wrote:
This patchset addresses two use cases:
- Implement a sane upper bound on the number of namespaces.
- Provide a way for sandboxes to limit the attack surface from
namespaces.
The maximum sane case I can imagine is if every process
801 - 900 of 2778 matches
Mail list logo