Re: [RFC RTNETLINK 00/09]: Netlink link creation API

2007-06-05 Thread Eric W. Biederman
Reading through the patches they look usable to me. Having to patch iproute to create the more interesting network devices sucks, but that problem seems fundamental. We might be able to avoid it if we allowed fields to be reused between different types of devices but that makes the error

Re: [RFC RTNETLINK 00/09]: Netlink link creation API

2007-06-06 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Eric W. Biederman wrote: Reading through the patches they look usable to me. Having to patch iproute to create the more interesting network devices sucks, but that problem seems fundamental. We might be able to avoid it if we allowed fields

Re: [RFC RTNETLINK 00/09]: Netlink link creation API

2007-06-06 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: I still think adding a IFLA_PARTNER or a custom attribute is cleaner in this case. Slight semantic mismatches are the worst design bugs to correct. Indeed, IFLA_PARTNER sounds like a better idea. I just suggested to Pavel to create only a single

Re: [RFC RTNETLINK 04/09]: Link creation API

2007-06-06 Thread Eric W. Biederman
+static int rtnl_newlink(struct sk_buff *skb, struct nlmsghdr *nlh, void *arg) +{ + struct rtnl_link_ops *ops; + struct net_device *dev; + struct ifinfomsg *ifm; + char name[MODULE_NAME_LEN]; + char ifname[IFNAMSIZ]; + struct nlattr *tb[IFLA_MAX+1]; + struct

Re: [RFC RTNETLINK 00/09]: Netlink link creation API

2007-06-06 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Alexey Kuznetsov wrote: I just suggested to Pavel to create only a single device per newlink operation and binding them later, I see some logical inconsistency here. Look, the second end is supposed

Re: [RFC RTNETLINK 04/09]: Link creation API

2007-06-06 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Eric W. Biederman wrote: +if (linkinfo[IFLA_INFO_NAME]) { +nla_strlcpy(name, linkinfo[IFLA_INFO_NAME], sizeof(name)); +ops = rtnl_link_ops_get(name); Ugh. Shouldn't we have the request_module logic here? Otherwise

Re: [RFC RTNETLINK 00/09]: Netlink link creation API

2007-06-07 Thread Eric W. Biederman
Alexey Kuznetsov [EMAIL PROTECTED] writes: Hello! Good point, I didn't think of that. Is there a version of this patch that already uses different namespaces so I can look at it? Pavel does not like the idea. It looks not exactly pretty, like you said. :-) The alternative is to create

Re: [PATCH] fix race in AF_UNIX

2007-06-21 Thread Eric W. Biederman
Miklos Szeredi [EMAIL PROTECTED] writes: [CC'd Al Viro and Alan Cox, restored patch] There are races involving the garbage collector, that can throw away perfectly good packets with AF_UNIX sockets in them. The problems arise when a socket goes from installed to in-flight or vice

Re: [RFC NET 00/02]: Secondary unicast address support

2007-06-21 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: These two patches contain a first short at secondary unicast address support. I'm still working on converting macvlan as an example, but since I'm about to leave for tonight I thougth I'd get them out for some comments now. The patch adds two new

Re: [RFC NET 00/02]: Secondary unicast address support

2007-06-21 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Eric W. Biederman wrote: I'm trying to understand what the point of this patch is. In once sense I find the concept of filtering and listening for multiple mac addresses very interesting, especially if we could break out different streams of traffic

Re: [RFC NET 00/02]: Secondary unicast address support

2007-06-21 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: Patrick McHardy wrote: Eric W. Biederman wrote: For the macvlan code do we need to do anything special if we transmit to a mac we would normally receive? Another unicast mac of the same nic for example. That doesn't happen under normal circumstances

Re: [PATCH] ipv4: Only destroy inet devices when we receive an NETDEV_UNREGISTER event

2007-06-22 Thread Eric W. Biederman
Never mind. I saw this and I thought it was an old obscure bug. But it appears it is a new condition, that has already been fixed. Eric - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at

[RFD] L2 Network namespace infrastructure

2007-06-22 Thread Eric W. Biederman
Currently all of the prerequisite work for implementing a network namespace (i.e. virtualization of the network stack with one kernel) has already been merged or is in the process of being merged. Therefore it is now time for a bit of high level design review of the network namespace work and

[PATCH] net: Basic network namespace infrastructure.

2007-06-22 Thread Eric W. Biederman
measured any performance overhead specific to network namespace infrastructure. As code to compile out the network namespace pointers etc is complicated it is best to avoid that code unless that complexity is justified. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/net

Re: [PATCH] fix race in AF_UNIX

2007-06-23 Thread Eric W. Biederman
Miklos Szeredi [EMAIL PROTECTED] writes: Right. But the devil is in the details, and (as you correctly point out later) to implement this, the whole locking scheme needs to be overhauled. Problems: - Using the queue lock to make the dequeue and the fd detach atomic wrt the GC is

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Eric W. Biederman wrote: -- The basic design There will be a network namespace structure that holds the global variables for a network namespace, making those global variables per network namespace. One of those per network namespace global

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: On Sat, 23 Jun 2007 08:20:40 -0700 Ben Greear [EMAIL PROTECTED] wrote: Patrick McHardy wrote: Eric W. Biederman wrote: -- The basic design There will be a network namespace structure that holds the global variables for a network

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: Patrick McHardy wrote: Eric W. Biederman wrote: -- The basic design There will be a network namespace structure that holds the global variables for a network namespace, making those global variables per network namespace. One of those per network

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Patrick McHardy [EMAIL PROTECTED] writes: Depending upon the data structure it will either be modified to hold a per entry network namespace pointer or it there will be a separate copy per network namespace. For large global data structures like the ipv4 routing cache hash table adding an

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Carl-Daniel Hailfinger [EMAIL PROTECTED] writes: Can one namespace DoS other namespaces' access to the routing cache? Two scenarios come to mind: * provoking hash collisions * lock contention (sorry, haven't checked whether/how we do locking) My initial expectation is that the protections we

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Ben Greear [EMAIL PROTECTED] writes: Any chance it could allow one to use a single threaded, single process and do something like int fd1 = socket(, namespace1); int fd2 = socket(, namespace2); Or, maybe a sockopt or similar call to move a socket into a particular namespace? I

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Sat, 23 Jun 2007 11:19:34 -0600 Further and fundamentally all a global achieves is removing the need for the noise patches where you pass the pointer into the various functions. For long term

Re: [RFD] L2 Network namespace infrastructure

2007-06-23 Thread Eric W. Biederman
Jeff Garzik [EMAIL PROTECTED] writes: David Miller wrote: I don't accept that we have to add another function argument to a bunch of core routines just to support this crap, especially since you give no way to turn it off and get that function argument slot back. To be honest I think this

Re: [RFD] L2 Network namespace infrastructure

2007-06-24 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Sat, 23 Jun 2007 16:56:49 -0600 If the only use was strong isolation which Dave complains about I would concur that the namespace approach is inappropriate. However there are a lot other uses

Re: [RFD] L2 Network namespace infrastructure

2007-06-24 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Sat, 23 Jun 2007 15:41:16 -0600 If you want the argument to compile out. That is not a problem at all. I dropped that part from my patch because it makes infrastructure more complicated

Re: [PATCH] fix race in AF_UNIX

2007-06-26 Thread Eric W. Biederman
Miklos Szeredi [EMAIL PROTECTED] writes: And I think incremental GC algorithms are much too complex for this task. What I've realized, is that in fact we don't require a generic garbage collection algorithm, just a much more specialized cycle collection algorithm, since refcounting in struct

Re: [RFD] L2 Network namespace infrastructure

2007-06-26 Thread Eric W. Biederman
David Miller [EMAIL PROTECTED] writes: From: [EMAIL PROTECTED] (Eric W. Biederman) Date: Sun, 24 Jun 2007 06:58:54 -0600 I am convinced I can keep network namespaces something that is so trivial and obvious to get right you won't have to pay attention to them. Ok then, I'll hold you

Re: [RFC] network namespaces

2006-09-05 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: 2. People expressed concerns that complete separation of namespaces may introduce an undesired overhead in certain usage scenarios. The overhead comes from packets traversing input path, then output path, then input path again in the destination

Re: [RFC] network namespaces

2006-09-05 Thread Eric W. Biederman
This family of containers are used too for HPC (high performance computing) and for distributed checkpoint/restart. The cluster runs hundred of jobs, spawning them on different hosts inside an application container. Usually the jobs communicates with broadcast and multicast. Application

Re: [RFC] network namespaces

2006-09-05 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Tue, Sep 05, 2006 at 08:45:39AM -0600, Eric W. Biederman wrote: Daniel Lezcano [EMAIL PROTECTED] writes: For HPC if you are interested in migration you need a separate IP per container. If you can take you IP address with you migration

Re: [RFC] network namespaces

2006-09-06 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Wed, Sep 06, 2006 at 11:10:23AM +0200, Daniel Lezcano wrote: As far as I see, vserver use a layer 3 solution but, when needed, the veth component, made by Nestor Pena, is used to provide a layer 2 virtualization. Right ? well, no, we do not

Re: [RFC] network namespaces

2006-09-06 Thread Eric W. Biederman
Kir Kolyshkin [EMAIL PROTECTED] writes: Herbert Poetzl wrote: my point (until we have an implementation which clearly shows that performance is equal/better to isolation) is simply this: of course, you can 'simulate' or 'construct' all the isolation scenarios with kernel bridging and

Re: [RFC] network namespaces

2006-09-06 Thread Eric W. Biederman
Cedric Le Goater [EMAIL PROTECTED] writes: Eric W. Biederman wrote: hmm ? What about an MPI application ? I would expect each MPI task to be run in its container on different nodes or on the same node. These individual tasks _communicate_ between each other through the MPI layer (not only

Re: [RFC] network namespaces

2006-09-06 Thread Eric W. Biederman
Caitlin Bestler [EMAIL PROTECTED] writes: [EMAIL PROTECTED] wrote: Finally, as I understand both network isolation and network virtualization (both level2 and level3) can happily co-exist. We do have several filesystems in kernel. Let's have several network virtualization approaches,

Re: [RFC] network namespaces

2006-09-06 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: The problem with VNIC's is it won't work for all devices (without lots of work), and for many device's it requires putting the device in promiscuous mode. It also plays havoc with network access control devices. Which is fine. If it works it is a

Re: [RFC] network namespaces

2006-09-07 Thread Eric W. Biederman
Daniel Lezcano [EMAIL PROTECTED] writes: IHMO, I think there is one reason. The unsharing mechanism is not only for containers, its aim other kind of isolation like a bsdjail for example. The unshare syscall is flexible, shall the network unsharing be one-block solution ? For example, we

Re: [Devel] Re: [RFC] network namespaces

2006-09-07 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Thu, Sep 07, 2006 at 08:23:53PM +0400, Kirill Korotaev wrote: well, who said that you need to have things like RAW sockets or other protocols except IP, not to speak of iptable and routing entries ... folks who _want_ full network virtualization

Re: [Devel] Re: [RFC] network namespaces

2006-09-09 Thread Eric W. Biederman
Herbert Poetzl [EMAIL PROTECTED] writes: On Sat, Sep 09, 2006 at 11:57:24AM +0400, Dmitry Mishin wrote: On Friday 08 September 2006 22:11, Herbert Poetzl wrote: actually the light-weight ip isolation runs perfectly fine _without_ CAP_NET_ADMIN, as you do not want the guest to be able to

Re: [RFC] network namespaces

2006-09-10 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Sunday 10 September 2006 07:41, Eric W. Biederman wrote: I certainly agree that we are not at a point where a final decision can be made. A major piece of that is that a layer 2 approach has not shown to be without a performance penalty

Re: [RFC] network namespaces

2006-09-11 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Sunday 10 September 2006 06:47, Herbert Poetzl wrote: well, I think it would be best to have both, as they are complementary to some degree, and IMHO both, the full virtualization _and_ the isolation will require a separate namespace to work,

Re: [RFC] network namespaces

2006-09-11 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Monday 11 September 2006 18:57, Herbert Poetzl wrote: I completely agree here, we need a separate namespace for that, so that we can combine isolation and virtualization as needed, unless the bind restrictions can be completely expressed with an

Re: Network problem with 2.6.18-mm1 ?

2006-09-29 Thread Eric W. Biederman
Jesse Brandeburg [EMAIL PROTECTED] writes: On 9/28/06, Sukadev Bhattiprolu [EMAIL PROTECTED] wrote: $ cat /proc/interrupts CPU0 CPU1 28: 0 0 IO-APIC-fasteoi eth0 NMI: 96 35 LOC: 18251 18524 ERR: 0 you should be

Re: [PATCH 1/12] L2 network namespace (v3): current network namespace operations

2007-01-17 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: Added functions and macros required to operate with network namespaces. They are required in order to switch network namespace for incoming packets and to not extend current network interface by additional network namespace argue. Is exec_net only

Re: [PATCH 0/59] Cleanup sysctl

2007-01-16 Thread Eric W. Biederman
CC list trimmed. H. Peter Anvin [EMAIL PROTECTED] writes: Eric W. Biederman wrote: - Removal of sys_sysctl support where people had used conflicting sysctl numbers. Trying to break glibc or other applications by changing the ABI is not cool. 9 instances of this in the kernel seems

Re: [PATCH 0/59] Cleanup sysctl

2007-01-16 Thread Eric W. Biederman
H. Peter Anvin [EMAIL PROTECTED] writes: Eric W. Biederman wrote: I think it would be fair to say that if they're not in linux/sysctl.h they're not architectural, but that doesn't resolve the counterpositive (are there sysctls in linux/sysctl.h which aren't architectural? From the looks

Re: [PATCH 0/59] Cleanup sysctl

2007-01-16 Thread Eric W. Biederman
H. Peter Anvin [EMAIL PROTECTED] writes: Eric W. Biederman wrote: With architectural I mean guaranteed to be stable (as opposed to incidental). Sorry for the confusion. Ok. Then largely we are in agreement. To implement that the rule is simple. If it isn't CTL_UNNUMBERED and the number

Re: [PATCH 1/12] L2 network namespace (v3): current network namespace operations

2007-01-18 Thread Eric W. Biederman
Dmitry Mishin [EMAIL PROTECTED] writes: On Wednesday 17 January 2007 23:16, Eric W. Biederman wrote: Dmitry Mishin [EMAIL PROTECTED] writes: Added functions and macros required to operate with network namespaces. They are required in order to switch network namespace for incoming packets

Re: [PATCH 8/12] net_device seq_file

2007-01-18 Thread Eric W. Biederman
Stephen Hemminger [EMAIL PROTECTED] writes: On Wed, 17 Jan 2007 19:11:52 +0300 Dmitry Mishin [EMAIL PROTECTED] wrote: Library function to create a seq_file in proc filesystem, showing some information for each netdevice. This code is present in the kernel in about 10 instances, and all of

Re: [PATCH 0/12] L2 network namespace (v3)

2007-01-18 Thread Eric W. Biederman
YOSHIFUJI Hideaki / 吉藤英明 [EMAIL PROTECTED] writes: In article [EMAIL PROTECTED] (at Wed, 17 Jan 2007 18:51:14 +0300), Dmitry Mishin [EMAIL PROTECTED] says: === L2 network namespaces The most straightforward concept of network virtualization is complete

[PATCH 24/59] sysctl: frv remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Since the binary sysctl numbers are unique putting the registered sysctls at the head of the sysctl list where they can override existing sysctls serves no useful purpose. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/frv/kernel

[PATCH 0/59] Cleanup sysctl

2007-01-16 Thread Eric W. Biederman
There has not been much maintenance on sysctl in years, and as a result is there is a lot to do to allow future interesting work to happen, and being ambitious I'm trying to do it all at once :) The patches in this series fall into several general categories. - Removal of useless attempts to

[PATCH 44/59] sysctl: Register the sysctl number used by the arlan driver.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/net/wireless/arlan-proc.c |2 +- include/linux/sysctl.h|1 + 2 files changed, 2 insertions(+), 1 deletions(-) diff --git a/drivers/net/wireless/arlan-proc.c b

[PATCH 33/59] sysctl: s390 move sysctl definitions to sysctl.h

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted We need to have the the definition of all top level sysctl directories registers in sysctl.h so we don't conflict by accident and cause abi problems. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/s390/appldata/appldata.h |3

[PATCH 7/59] sysctl: llc remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctl numbers used are unique so setting the insert_at_head flag serves no semantis purpose, and is just confusing. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/llc/sysctl_net_llc.c |2 +- 1 files changed, 1 insertions

[PATCH 15/59] sysctl: scsi remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/scsi/scsi_sysctl.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/drivers/scsi/scsi_sysctl.c b/drivers/scsi/scsi_sysctl.c index 04d06c2..b16b775 100644

[PATCH 57/59] sysctl: allow sysctl_perm to be called from outside of sysctl.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/sysctl.h |2 ++ kernel/sysctl.c| 10 +- 2 files changed, 7 insertions(+), 5 deletions(-) diff --git a/include/linux/sysctl.h b/include/linux/sysctl.h

[PATCH 6/59] sysctl: netrom remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctl numbers used are unique so setting the insert_at_head flag serves no semantic purpose, so it is just confusing. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/netrom/sysctl_net_netrom.c |2 +- 1 files changed, 1

[PATCH 51/59] sysctl: Move SYSV IPC sysctls to their own file

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This is just a simple cleanup to keep kernel/sysctl.c from getting to crowded with special cases, and by keeping all of the ipc logic to together it makes the code a little more readable. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED

[PATCH 45/59] sysctl: C99 convert ctl_tables in drivers/parport/procfs.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/parport/procfs.c | 264 +- 1 files changed, 189 insertions(+), 75 deletions(-) diff --git a/drivers/parport/procfs.c b/drivers/parport

[PATCH 50/59] sysctl: Move utsname sysctls to their own file

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This is just a simple cleanup to keep kernel/sysctl.c from getting to crowded with special cases, and by keeping all of the utsname logic to together it makes the code a little more readable. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED

[PATCH 47/59] sysctl: C99 convert ctl_tables in NTFS and remove sys_sysctl support

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Putting ntfs-debug under FS_NRINODE was not a kosher thing to do so don't give it any binary number. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- fs/ntfs/sysctl.c | 24 1 files changed, 16 insertions(+), 8

[PATCH 41/59] sysctl: C99 convert ctl_tables in arch/x86_64/mm/init.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/x86_64/mm/init.c | 22 -- 1 files changed, 16 insertions(+), 6 deletions(-) diff --git a/arch/x86_64/mm/init.c b/arch/x86_64/mm/init.c index 65aa66c..a04535d

[PATCH 54/59] sysctl: Remove support for directory strategy routines.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted parse_table has support for calling a strategy routine when descending into a directory. To date no one has used this functionality and the /proc/sys interface has no analog to it. So no one is using this functionality kill it and make

[PATCH 48/59] sysctl: Register the ocfs2 sysctl numbers

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted ocfs2 was did not have the binary number it uses under CTL_FS registered in sysctl.h. Register it to avoid future conflicts, and change the name of the definition to be in line with the rest of the sysctl numbers. Signed-off-by: Eric W

[PATCH 13/59] sysctl: xfs remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- fs/xfs/linux-2.6/xfs_sysctl.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/fs/xfs/linux-2.6/xfs_sysctl.c b/fs/xfs/linux-2.6/xfs_sysctl.c index af24653..af777e9

[PATCH 10/59] sysctl: dccp remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/dccp/sysctl.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/dccp/sysctl.c b/net/dccp/sysctl.c index fdcfca3..3391631 100644 --- a/net/dccp/sysctl.c

[PATCH 11/59] sysctl: ax25 remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ax25/sysctl_net_ax25.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/ax25/sysctl_net_ax25.c b/net/ax25/sysctl_net_ax25.c index d23a27f..afdba04 100644

[PATCH 12/59] sysctl: atalk remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/appletalk/sysctl_net_atalk.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/appletalk/sysctl_net_atalk.c b/net/appletalk/sysctl_net_atalk.c index 40b0af7

[PATCH 22/59] sysctl: frv pm remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted With unique binary numbers setting insert_at_head to insert yourself at the head of sysctl list and thus override existing sysctl entries serves no point. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/frv/kernel/pm.c |2

[PATCH 17/59] sysctl: mac_hid remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted With unique sysctl binary numbers setting insert_at_head is pointless. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/macintosh/mac_hid.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/drivers

[PATCH 16/59] sysctl: md Remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctls used by the md driver are have unique binary numbers so remove the insert_at_head flag as it serves no useful purpose. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/md/md.c |2 +- 1 files changed, 1 insertions

[PATCH 5/59] sysctl: rose remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctl numbers used are unique so setting the insert_at_head flag serves no semantic purpose. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/rose/sysctl_net_rose.c |2 +- 1 files changed, 1 insertions(+), 1 deletions

[PATCH 8/59] sysctl: ipx remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctl numbers used are unique so setting the insert_at_head flag servers no semantic purpose and is just confusing. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/ipx/sysctl_net_ipx.c |2 +- 1 files changed, 1 insertions

[PATCH 1/59] sysctl x25: Remove unnecessary insert_at_head from register_sysctl_table.

2007-01-16 Thread Eric W. Biederman
Since x25 uses unique binary numbers inserting yourself at the head of the search list for sysctls so you can override already registered sysctls is pointless. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/x25/sysctl_net_x25.c |2 +- 1 files changed, 1 insertions(+), 1 deletions

[PATCH 19/59] sysctl: cdrom remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted With unique binary sysctl numbers setting insert_at_head to override other sysctl entries is pointless. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/cdrom/cdrom.c |2 +- 1 files changed, 1 insertions(+), 1 deletions

[PATCH 36/59] sysctl: C99 convert ctl_tables entries in arch/ppc/kernel/ppc_htab.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted And make the mode of the kernel directory 0555 no one is allowed to write to sysctl directories. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/ppc/kernel/ppc_htab.c | 11 --- 1 files changed, 8 insertions(+), 3

[PATCH 9/59] sysctl: decnet remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The sysctl numbers used are unique so setting the insert_at_head flag does not succeed in overriding any sysctls, and is just confusing because it doesn't. Clear the flag. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/decnet

[PATCH 35/59] sysctl: C99 convert ctl_tables in arch/powerpc/kernel/idle.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This was partially done already and there was no ABI breakage what a relief. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/powerpc/kernel/idle.c | 11 --- 1 files changed, 8 insertions(+), 3 deletions(-) diff --git

[PATCH 18/59] sysctl: ipmi remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted With unique sysctl binary numbers setting insert_at_head is pointless. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/char/ipmi/ipmi_poweroff.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/drivers

[PATCH 42/59] sysctl: Remove sys_sysctl support from the hpet timer driver.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted In the binary sysctl interface the hpet driver was claiming to be the cdrom driver. This is a no-no so remove support for the binary interface. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- drivers/char/hpet.c |4 ++-- 1 files

[PATCH 40/59] sysctl: C99 convert ctl_tables in arch/x86_64/kernel/vsyscall.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Basically everything was done but I removed all element initializers from the trailing entries to make it clear the entire last entry should be zero filled. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/x86_64/kernel/vsyscall.c

[PATCH 21/59] sysctl: Move CTL_PM into sysctl.h where it belongs.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/frv/kernel/pm.c |1 - include/linux/sysctl.h |1 + 2 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/frv/kernel/pm.c b/arch/frv/kernel/pm.c index ee677ce

[PATCH 49/59] sysctl: Move init_irq_proc into init/main where it belongs

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- init/main.c |3 +++ kernel/sysctl.c |3 --- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/init/main.c b/init/main.c index 8b4a7d7..8af5c6e 100644 --- a/init

[PATCH 23/59] sysctl: Move CTL_FRV into sysctl.h where it belongs

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/frv/kernel/sysctl.c |1 - include/linux/sysctl.h |1 + 2 files changed, 1 insertions(+), 1 deletions(-) diff --git a/arch/frv/kernel/sysctl.c b/arch/frv/kernel/sysctl.c

[PATCH 2/59] sysctl: Move CTL_SUNRPC to sysctl.h where it belongs

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- include/linux/sunrpc/debug.h |1 - include/linux/sysctl.h |3 ++- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/include/linux/sunrpc/debug.h b/include/linux

[PATCH 38/59] sysctl: x86_64 Remove unnecessary use of insert_at_head

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The only sysctl x86_64 provides are not provided elsewhere, so insert_at_head is unnecessary. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/x86_64/ia32/ia32_binfmt.c |2 +- arch/x86_64/mm/init.c |2 +- 2 files

[PATCH 39/59] sysctl: C99 convert ctl_tables in arch/x86_64/ia32/ia32_binfmt.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/x86_64/ia32/ia32_binfmt.c | 30 -- 1 files changed, 20 insertions(+), 10 deletions(-) diff --git a/arch/x86_64/ia32/ia32_binfmt.c b/arch/x86_64/ia32

[PATCH 53/59] sysctl: Remove support for CTL_ANY

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted There are currently no users in the kernel for CTL_ANY and it only has effect on the binary interface which is practically unused. So this complicates sysctl lookups for no good reason so just remove it. Signed-off-by: Eric W. Biederman

[PATCH 20/59] sysctl: cdrom Don't set de-owner

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted There is no need for open files in /proc/sys/XXX to hold a reference count on the module that provides the file to prevent module unload races. While there is code active in the module p-used in the sysctl_table_header is incremented

[PATCH 43/59] sysctl: Remove sys_sysctl support from drivers/char/rtc.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The real time clock driver was using the binary number reserved for cdroms in the sysctl binary number interface, which is a no-no. So since the sysctl binary interface is wrong remove it. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED

[PATCH 26/59] sysctl: C99 convert arch/frv/kernel/sysctl.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/frv/kernel/sysctl.c | 29 - 1 files changed, 24 insertions(+), 5 deletions(-) diff --git a/arch/frv/kernel/sysctl.c b/arch/frv/kernel/sysctl.c index

[PATCH 3/59] sysctl: sunrpc Remove unnecessary insert_at_head flag

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Because the sunrpc sysctls don't conflict with any other sysctls the setting the insert at head flag to register_sysctl has no semantic meaning. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/sunrpc/sysctl.c |2 +- net

[PATCH 4/59] sysctl: sunrpc Don't unnecessarily set ctl_table-de

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted We don't need this to prevent module unload races so remove the unnecessary code. Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- net/sunrpc/sysctl.c |8 +--- net/sunrpc/xprtsock.c |7 +-- 2 files changed, 2

[PATCH 31/59] sysctl: C99 convert the ctl_tables in arch/mips/au1000/common/power.c

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Signed-off-by: Eric W. Biederman [EMAIL PROTECTED] --- arch/mips/au1000/common/power.c | 38 -- 1 files changed, 32 insertions(+), 6 deletions(-) diff --git a/arch/mips/au1000/common/power.c b/arch/mips

[PATCH 30/59] sysctl: mips/au1000 Remove sys_sysctl support

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted The assignment of binary numbers for sys_sysctl use was in shambles and despite requiring methods. Nothing was implemented on the sys_sysctl side. So this patch gives a mercy killing to the sys_sysctl support for powermanagment on mips/au1000

[PATCH 52/59] sysctl: Create sys/fs/binfmt_misc as an ordinary sysctl entry

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted binfmt_misc has a mount point in the middle of the sysctl and that mount point is created as a proc_generic directory. Doing it that way gets in the way of cleaning up the sysctl proc support as it continues the existence of a horrible hack

[PATCH 27/59] sysctl: sn Remove sysctl ABI BREAKAGE

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted By not using the enumeration in sysctl.h (or even understanding it) the SN platform placed their arch specific xpc directory on top of CTL_KERN and only because they didn't have 4 entries in their xpc directory got lucky and didn't break glibc

[PATCH 37/59] sysctl: C99 convert arch/sh64/kernel/traps.c and remove ABI breakage.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted While doing the C99 conversion I notices that the top level sh64 directory was using the binary number for CTL_KERN. That is a no-no so I removed the support for the sysctl binary interface only leaving sysctl /proc support. At least

[PATCH 29/59] sysctl: C99 convert arch/ia64/kernel/perfmon and remove ABI breakage

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted This convers the sysctl ctl_tables to use C99 initializers. While I was looking at it I discovered it was using a portion of the sysctl binary addresses space under CTL_KERN KERN_OSTYPE which was completely inappropriate. So I completely

[PATCH 46/59] sysctl: C99 convert coda ctl_tables and remove binary sysctls.

2007-01-16 Thread Eric W. Biederman
From: Eric W. Biederman [EMAIL PROTECTED] - unquoted Will converting the coda sysctl initializers I discovered that it is yet another user of sysctl that was stomping CTL_KERN. So off with it's sys_sysctl support since it wasn't done in a supportable way. Signed-off-by: Eric W. Biederman [EMAIL

  1   2   3   4   5   6   7   8   9   10   >