Re: unlink() and directories.

2002-11-02 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: [EMAIL PROTECTED] (Thomas Bushnell, BSG) writes: Alfred M. Szmidt [EMAIL PROTECTED] writes: Is it intentional that unlink() on GNU/Hurd does not handle directories? Yes. How will this work for nodes that are both directories and files

Re: unlink() and directories.

2002-11-01 Thread Thomas Bushnell, BSG
Alfred M. Szmidt [EMAIL PROTECTED] writes: Is it intentional that unlink() on GNU/Hurd does not handle directories? Yes. It seems that unlink() (a syscall from the looks) on GNU/Linux does handle directories. But POSIX doesn't say anything if unlink() must handle them. Quite right.

Re: libiohelp

2002-11-01 Thread Thomas Bushnell, BSG
Michael Koch [EMAIL PROTECTED] writes: I tried ti build current hurd pachage with current gcc 3.2.1. I needed the attached patch to make it compile. Please review and apply it. I have no objection to this; it's annoying in the extreme that gcc has broken compatibility here, but so be it.

Re: Are hodes nodes?

2002-11-01 Thread Thomas Bushnell, BSG
James Morrison [EMAIL PROTECTED] writes: Looking at [hurd]/hostmux/hostmux.h I noticed a strange comment. /* The state associated with a host multiplexer translator. */ struct hostmux { /* The host hodes in this mux. */ struct hostmux_name *names; struct rwlock names_lock;

Re: uname -s

2002-10-25 Thread Thomas Bushnell, BSG
Robert Millan [EMAIL PROTECTED] writes: On Thu, Oct 24, 2002 at 11:05:56AM -0700, Thomas Bushnell, BSG wrote: Robert Millan [EMAIL PROTECTED] writes: According to documentation of BSD Unix [1], the uname command appeared in 4.4BSD distribution, and the -s option is suposed to: Oy

Re: uname -s and naming confusion

2002-10-25 Thread Thomas Bushnell, BSG
Tom Hart [EMAIL PROTECTED] writes: Doesn't a lot of this confusion come from: 1. No enforced standardization of terminology. The GNU project uses the term operating system to refer to the complete *usable* system, ie. GNU, GNU/Hurd, GNU/Linux, and kernel to refer to the kernel, ie.

Re: uname -s

2002-10-24 Thread Thomas Bushnell, BSG
Robert Millan [EMAIL PROTECTED] writes: According to documentation of BSD Unix [1], the uname command appeared in 4.4BSD distribution, and the -s option is suposed to: Oy, it gets even more confusing. BSD has always used the term operating system to refer to the kernel. In any case, the

Re: [PATCH] ftpfs

2002-10-23 Thread Thomas Bushnell, BSG
Moritz Schulte [EMAIL PROTECTED] writes: Just curious; was there something wrong with that patch? Nothing that pops out at first, but perhaps nobody has had a chance to look at it in detail. ___ Bug-hurd mailing list [EMAIL PROTECTED]

Re: uname -s

2002-10-23 Thread Thomas Bushnell, BSG
Petri Koistinen [EMAIL PROTECTED] writes: I think uname -s should print: GNUmach. uname -s prints the kernel, but it's the kernel in Unixspeak, that is, the thing that interprets the system calls where the system calls are read/write/open. In other words, the canonical case is a monolithic

Attention Petri Koistinen

2002-10-23 Thread Thomas Bushnell, BSG
Your mailer bounces valid mail for no reason; you need to fix it if you are going to continue to post on bug-hurd. A sample message was returned thus with the message: [EMAIL PROTECTED] SMTP error from remote mailer after RCPT TO:[EMAIL PROTECTED]: host joo.ath.cx [80.222.59.131]: 554

Re: configuration files for Hurd servers?

2002-10-19 Thread Thomas Bushnell, BSG
Moritz Schulte [EMAIL PROTECTED] writes: was there ever a plan to make Hurd servers support configuration files? Right now the only way to configure them is via command line options. I think it could be convenient in the future to have them support configuration files; there could be

Re: implementing bash's magic

2002-10-18 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Now, it seems to be rather easy to me to implement the retry magic for tcp and udp in glibc/hurd/lookup-retry.c as well. Roland, is this worth punting to a volunteer or would that be more trouble than just doing it yourself right quick? For me it's

Re: Clarification about section 3.1 (The Root Filesystem, Purpose)

2002-10-14 Thread Thomas Bushnell, BSG
Thomas Sippel - Dau [EMAIL PROTECTED] writes: o are not formally static libraries (/lib) or shared objects (/lib) The conceptual difference between a directory and a library escapes me, essentially, libraries are more efficient to read than directories, and more

Re: Clarification about section 3.1 (The Root Filesystem, Purpose)

2002-10-14 Thread Thomas Bushnell, BSG
Thomas Sippel - Dau [EMAIL PROTECTED] writes: o are not formally static libraries (/lib) or shared objects (/lib) The conceptual difference between a directory and a library escapes me, essentially, libraries are more efficient to read than directories, and more

Re: Hurd bug in libdiskfs (patch included)

2002-10-11 Thread Thomas Bushnell, BSG
lilachaze [EMAIL PROTECTED] writes: Hi. libdiskfs has a nasty bug moving directories in a special case: If the source dir's parent is not writable by you, but the dir itself is, and you try to move it, the ext2fs server crashes leaving your fs corrupted. The cause is that it doesn't

Re: [Hurd-devel-readers] Re: pthread roadmap

2002-10-07 Thread Thomas Bushnell, BSG
Wolfgang Jaehrling [EMAIL PROTECTED] writes: On Mon, Oct 07, 2002 at 04:34:07PM -0500, Graham Wilson wrote: what is this cancellation stuff? is there documentation about it somewhere? And more importantly, is this also the case when writing new servers with pthreads? (Ignoring that we

Re: undeletion at filesystem level or in extra filesystem?

2002-10-04 Thread Thomas Bushnell, BSG
Bryan Wagstaff [EMAIL PROTECTED] writes: But basically, yeah, if someone opens for O_WRONLY, writes, and closes, it would be nice if the old contents were cleanly saved as a version. That could get really nasty when it comes to large files that are opened/closed frequently. It also

Re: undeletion at filesystem level or in extra filesystem?

2002-10-04 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: My main concern is that the file update pattern open, write, close, should be atomic when seen by other processes. I.e if some other process opens the file for reading in the middle of the update, it should see the previous version, independently of

Re: undeletion at filesystem level or in extra filesystem?

2002-10-02 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: I hope you mean putting it into glibc, so that the rm program won't be special? I have no particular preference here. It's a user-interface feature, as I see it. I can see two reasons to put the versioning features in the filesystem rather than in

Re: undeletion at filesystem level or in extra filesystem?

2002-10-01 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: Could be. I think it would make sense to start by outlining the filesystem interface (rpc:s for listing old versions/deleted files, opening or recovering an older version (probably, linking it to a new name should be an optional part of the process?),

Re: undeletion at filesystem level or in extra filesystem?

2002-09-30 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: I wonder, should undeletion (aka the Windows trash can) better be done at a per-filesystem level (like, in diskfs), or with an extra-filesystem that is stacked (like shadowfs)? Undeletion, without exact semantics, is a mistake, wherever it is

Re: scrolling optimization + asynchronous updates impossible

2002-06-16 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: I think that might just have been an oversight, and it seems entirely reasonable for filesystems to refuse to do anything synchronous (let the message queuing do it). If Thomas agrees, I will change it to simpleroutines, because I agree. This

Re: providing memory objects to users

2002-06-12 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: BTW, Thomas, while we are chatting about pagers. I remember Roland told me the thread explosion in the server is a known problem with the Mach virtual memory management. Can you briefly wrap up an example for a typical behaviour that can cause it?

Re: providing memory objects to users

2002-06-12 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: On Wed, Jun 12, 2002 at 10:32:21AM -0700, Thomas Bushnell, BSG wrote: Map a big region, start modifying pages. Eventually you will trigger pageout. The kernel will now proceed to start paging things out: all at once. Ok, I see. How about

Re: providing memory objects to users

2002-06-12 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Ok ;) I do this in my current version, and it seems to work fine. I will check in the code right now, but I have one more question. When using libpager, I must provide my own backing store, right? At any time, it can happen that pager_write_page

Re: semantics of file changes notification

2002-06-12 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: the way I read the diskfs code, requesting file notifications doesn't add a reference to the node. So when you request notifications as a user, you have to keep the port around to receive notifications. Is this how it is intended to be? Seems

Re: providing memory objects to users

2002-06-12 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: I am confused as to why using default_pager_object_create is not working. That's what tmpfs does. Me too; I think it should work... ___ Bug-hurd mailing list [EMAIL PROTECTED]

Re: providing memory objects to users

2002-06-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: First I tried to use libpager. This worked out ok, but what I did was probably wrong. I allocated anonymous pages in pager_read_page, and filled those with the display information. The information could then be read by the client, allright. But

Re: lock up in ext2fs?

2002-06-08 Thread Thomas Bushnell, BSG
David Walter[EMAIL PROTECTED] writes: This assignment is prior to the assertion. msgid = m-request.msgh_id The assertion is testing for msgid+100 == m-header.msgh_id Is there a protocol that defines why this value should be 100 than the assigned value? Yes. MiG reply

Re: setuid root programs in hurd dist

2002-06-05 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: ids -- Does pid2task to query arbitrary processes auth ports. Seems like a questionable need. If that info should be public, we could just have the proc server publish the id lists it got in its auth transactions (which

Re: hurd/tmpfs dir.c tmpfs.c

2002-06-04 Thread Thomas Bushnell, BSG
Marco Gerards [EMAIL PROTECTED] writes: I thought about an other solution for the problem, although it is a stange solution it might solve the problem. The thread in fatfs will deadlock because that thread already locked the node, what if the function that locks the node check if the node

Re: getting the openmode in netfs callbacks

2002-06-04 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: how am I supposed to get the openmodes in netfs callbacks like netfs_attempt_read? This is critical to implement O_NONBLOCK behaviour correctly. But the interface is giving me user-user and user-po-np, but I need user-po-openmodes. Netfs

Re: getting the openmode in netfs callbacks

2002-06-04 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: how am I supposed to get the openmodes in netfs callbacks like netfs_attempt_read? To echo Roland's comments, and call for something new: netfs is being stretched *way* beyond its intentions here. I would much rather see a *new* library, parallel

Re: vm_size_t is unsigned, so libps should use unsigned ints.

2002-06-02 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: I'm not sure you're really asking about the C details, but if you are, the answer is something like #define COMPARE(type) \ int \ ps_cmp_##type(type a, type b) { ... } Note that there must be no space between COMPARE and (, and that you

Re: 16 bit UIDs

2002-06-01 Thread Thomas Bushnell, BSG
Wolfgang Jährling [EMAIL PROTECTED] writes: Thomas Bushnell, BSG [EMAIL PROTECTED] wrote: One idea is just a straightforward file somewhere in the filesystem that holds an index of inode numbers and UIDs. Will we use 64-bit UIDs on 64-bit systems? If so, we should use 64 bit wide UID

Re: 16 bit UIDs

2002-05-31 Thread Thomas Bushnell, BSG
Wolfgang Jährling [EMAIL PROTECTED] writes: This overflow UID can be set with sysctl(8) and defaults to the value 65534 (not 65535, as one might expect). It seems to be good enough for Linux, but I'm not sure if it is good enough for us, so how should we handle this situation? Storing the

Re: [GNU Mach] [patch] ImPS/2 support

2002-05-22 Thread Thomas Bushnell, BSG
Jeroen Dekkers [EMAIL PROTECTED] writes: But they don't use it because they are lazy? No, the diacritical marks were never necessary. ___ Bug-hurd mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/bug-hurd

Re: [GNU Mach] [patch] ImPS/2 support

2002-05-21 Thread Thomas Bushnell, BSG
Lionel Elie Mamane [EMAIL PROTECTED] writes: E.g. hair would be pronounced approx. like english hair, but haïr (ha\ir) is ha-yir. Ah, that's roughly the same meaning that a diaeresis has in English. Many English speakers have failed to note that English actually has diacritical marks. The

Patrick Strasser, fix your damn mailer

2002-05-21 Thread Thomas Bushnell, BSG
Patrick Stasser, mail to you from me bounces. I get the following: 553 5.3.0 [EMAIL PROTECTED]... We do not accept SPAM therefore your mail was rejected - see http://www.dnsrbl.net/ And oh-so-helpfully, that URL gets nothing but an empty under construction message. If you want to be on this

Re: /dev translator

2002-05-20 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: So, what you do is you have a special translator on /dev. What does it do? Does it provide a virtual filesystem hierarchy, a bit like the mux filesystems do, or would it be more like fakeroot translator, passing most accesses through, but catching

Re: fakeroot status

2002-05-15 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: We have to implement netfs_S_dir_lookup ourselves, so that it can return partial results using FS_RETRY_MAGICAL to the user. I think this is generally true for weird things like fakeroot. Back when, this was my general intention for weird things,

Re: fakeroot status

2002-05-15 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: But isn't this connected to the case of whether the /dev/fd method works? If we make that method work, then the io_identity check isn't necessary, right? The other method is still preferable. Hrm, I'm beginning to wonder whether the mere fact

Re: fakeroot status

2002-05-15 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Hrm, I'm beginning to wonder whether the mere fact that fakeroot can fake this doesn't mean that the io_identity check isn't sufficient for the security that #! execution needs... It only needs security for EXEC_SECURE, in which case a) it

Re: fakeroot status

2002-05-14 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: I'm pretty sure that fakeroot should *not* override identity--for the reason at least that it is *NOT* the same node. But it's pretending to be. It is either indistinguishable, in which case it doesn't need to exist, or it has *some* difference in

Re: fakeroot status

2002-05-14 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Well, we are not really talking about file_chmod, but about netfs_attempt_chmod. However, I have not found it to be used by anything but netfs_S_file_chmod. The original comment is in libnetfs/netfs.h Ok, that internal interface is used to set

Re: fakeroot problem

2002-05-13 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: However, I think diskfs should not return EOPNOTSUPP for this case. On Unix systems I have tried, trying to execute a device file (that has execute bits set) fails with EACCES. That seems like the appropriate error for attempting to open a symlink

Re: establishing the callers PID

2002-05-13 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: [EMAIL PROTECTED] (Thomas Bushnell, BSG) writes: Right, but that's already a Hurd-specific extension. So it's fine to expect it to use another Hurd-specific extension to get a reliable PID or other identification. What would such an extension

Re: fakeroot status

2002-05-13 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: There is another problem with fakeroot, and that is chmod. It doesn't work at all :) I always get EOPNOTSUPP. Your comment: Unlike the normal Unix and Hurd meaning of chmod, this function is also used to attempt to change files into

Re: fakeroot status

2002-05-13 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Duh. The file_exec to the underlying node calls exec_exec with a port to the underlying node, but the INIT_PORT_CRDIR used to start the lookup is the fakeroot one. We should probably override netfs_S_io_identity to lie and return the underlying

Re: saved IDs and exec (standard violation?)

2002-05-12 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: The only drawback I see is in the case when svuid!=euid or svgid!=egid, and you are executing an sugid file. The user will reauthenticate everything for the svuid=euid, svgid=egid change and then the filesystem will reauthenticate everything again to

Re: iohelp handle_io_release_conch doesn't lock shared page

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: It seems that the shared I/O code is not really tested and a bit dated. Thomas, do you remember any unresolved issues about it? Only that it's essentially untested, and really deprecated. Roland, do you think it's worth keeping around? Is there

Re: iohelp handle_io_release_conch doesn't lock shared page

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: For shared libraries, we use MAP_COPY. Maybe we can use this for executables, too? That is what we do, but the present issue is different; we're talking only about atomicity: that is, if you write the file, then your exec is either the pre-write

Re: saved IDs and exec (standard violation?)

2002-05-11 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Yes, that seems to be a bona fide bug based on a misreading of the standard. The language is not really all that clear, but the behavior of other systems is consistent so we can tell how to read it. That is, svuid=euid and svgid=egid are done *on

Re: saved IDs and exec (standard violation?)

2002-05-11 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Oh this is horrible. Sigh. However, in the normal case, the ids don't change. Is there a security reason we should not allow the user to decide for themselves? Allow the user to decide for themselves does not have a precise meaning to me in

Re: fakeroot problem

2002-05-11 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: To make cases like the current state less confusing, perhaps netfs (and diskfs) should do something special for an EOPNOTSUPP return from *_get_translator in lookup/getroot. It will only come up there if S_IPTRANS is set, which the *_validate_stat

Re: establishing the callers PID

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: I think it is absolutely mandatory that we establish the PID in a trustworthy way rather than let the user provide some unique ID on its own. I think there is already a place in the Hurd where we should do that but don't (wasn't that term's

Re: establishing the callers PID

2002-05-11 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Mmh, we could restrict the monitor to trusted filesystems (eg /). Right, but that's already a Hurd-specific extension. So it's fine to expect it to use another Hurd-specific extension to get a reliable PID or other identification. I am not really

Re: rm patch suggestion

2002-05-10 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: On Thu, May 09, 2002 at 07:39:57PM -0700, Thomas Bushnell, BSG wrote: Marcus Brinkmann [EMAIL PROTECTED] writes: Note that there is no way to get levels inbetween if the translators don't provide them. This has long been noticed; you

Re: rm patch suggestion

2002-05-09 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Note that there is no way to get levels inbetween if the translators don't provide them. This has long been noticed; you can always go one at a time if you are the owner. ___ Bug-hurd mailing list [EMAIL

Re: fakeroot problem

2002-05-05 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Probably the right thing to do is unlock the directory node while doing the lookups. This is certainly what diskfs does, and it's pretty important. ___ Bug-hurd mailing list [EMAIL PROTECTED]

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: Does anybody have any idea how often this case occurs with typical activities like compilation? What's the point of the question: to decide if we can ignore the issue, or to decide if the solution has to be terribly efficient? With the current code,

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: I guess I should have asked for the ratio B/A. If that's small, as you claim, there should be a significant gain. _If_ it turned out that A and B were of the same size, then the gain would be quite small, decreasing the number of required syncs at

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
Jeroen Dekkers [EMAIL PROTECTED] writes: The bugs that happen are *not* merely that you lose occasional object files. You can get arbitrary corruption. And then fsck can repair that in the case of a crash, right? No. The normal rules--the ones that I describe as bug free keep things

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: Right, it would improve the speed significantly, but it wouldn't get rid of the harddisk is thrashing hard all the time while I'm compiling, even if I have plenty of RAM and all the source files are cached-behaviour. I have found that compiling is a

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
Jeroen Dekkers [EMAIL PROTECTED] writes: Sorry for my stupidity, but I don't see why fsck can't remove the corrupted part and replace it with some sane stuff. It knows how the filesystem should look like, so it can change it so that it will look like that. Could you please explain why that

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
Jeroen Dekkers [EMAIL PROTECTED] writes: But I was talking about a filesystem where it doesn't matter if there is data loss in the case of a crash. For example, I wouldn't care if the data of my glibc build is lost or corrupted. In that case we don't need it and providing an option which

Re: removing an ext2fs file forces disk activity

2002-05-04 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: You are atypical. On my system, for any given build I do, all the files fit in core and are already in the cache if I've done a previous compile recently, and the only disk activity is writing of new bits that the computation rarely blocks on. Ok,

Re: mkdir() and group id

2002-04-27 Thread Thomas Bushnell, BSG
Oystein Viggen [EMAIL PROTECTED] writes: * [Thomas Bushnell, BSG] Yes, group 0 is the wheel group. HOW DOES THIS CAUSE A SECURITY ISSUE? Please be specific and not vague. Combined with umask 002 (suggested by yourself), this gives members of the wheel group write access to all

Re: mkdir() and group id

2002-04-26 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: I think that I prefer Linux's behaviour. I think, too, esp because of the sgid flag. I wonder what Thomas thinks. The reason why the copy-gid-from directory behavior is better: Imagine a rich set of groups on your computer--representing

Re: mkdir() and group id

2002-04-26 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Paul Jarc) writes: This works with the SysV (aka Linux) behavior as well: if a directory is setgid, any files created within it inherit the group id, and any directories created within it inherit both the group id and the setgid bit. As long as the setgid bit is inherited

Re: mkdir() and group id

2002-04-26 Thread Thomas Bushnell, BSG
Oystein Viggen [EMAIL PROTECTED] writes: The difference is that the SysV way won't work for more than one level of directories. Once you start making dirs within dirs[1], your sgid is not inherited, and group ownership falls back to your default group, instead of what you want. I was just

Re: mkdir() and group id

2002-04-26 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Paul Jarc) writes: [EMAIL PROTECTED] (Thomas Bushnell, BSG) wrote: (You only inherit gid if you are a member of the group.) False. Sorry, you're correct. It is, however, no security hole of the sort that was being implied

Re: fileno(tmpfile()) returns EBADF

2002-04-19 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Sure there is. The basic requirement here is that the the OPEN_MAX limit be enforced as specified, on the total of fopen+tmpfile + open and other POSIX.1 calls (and probably some other ISO C call I am forgetting). Ah, quite right, blech. I had

Re: fileno(tmpfile()) returns EBADF

2002-04-19 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: I don't have my copy of POSIX around, but I also remember a vague requirement (or expectation) that the file descriptor allocated is always the smallest file descriptor available. No, that's no requirement. It's the way Unix historically worked,

Re: fileno(tmpfile()) returns EBADF

2002-04-19 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: Roland McGrath [EMAIL PROTECTED] writes: I think the Hurd libc implementation of tmpfile is at fault. POSIX.1 says there must be a file descriptor. Try this libc patch. Why do it this way? I would prefer having fileno generate the file

Re: fileno(tmpfile()) returns EBADF

2002-04-19 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: Uh, I have now rebooted and the standard (the draft7 from the Austin group) in front of me. Let's look at the details: About open(): The open( ) function shall return a file descriptor for the named file that is the lowest file descriptor not

Re: fileno(tmpfile()) returns EBADF

2002-04-17 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: I think the Hurd libc implementation of tmpfile is at fault. POSIX.1 says there must be a file descriptor. Try this libc patch. Why do it this way? I would prefer having fileno generate the file descriptor, since most uses of tmpfile will probably

Re: fatfs locking

2002-04-13 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] writes: FAT doesn't have inodes, so fatfs has to lock the node of the directory that contains the node for which diskfs_cached_lookup is called. This is the root misconception. FAT *does* have inodes. What it doesn't have is *disk inodes*. Or rather, it *does* have disk

Re: mlock doesn't work

2002-04-12 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: This might be a known kernel problem, I'm just a bit sketchy on the details. That is, the Hurd code that does wiring (libshouldbeinlibc/wire.c) makes the pages writable and pokes them before doing vm_wire. This is because there were kernel bugs if

Re: fatfs locking

2002-04-12 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: It occurs to me that without this change, if a directory in a ufs or ext2fs filesystem contains a link to itself by a name other than .., then a lookup of that name will deadlock the directory node. (That is probably an invalid state that fsck would

Re: memory_object_lock_request and memory_object_data_return fnord

2002-03-27 Thread Thomas Bushnell, BSG
Neal H Walfield [EMAIL PROTECTED] writes: I think we should certainly use vm_copy for whole-page copies in pager_memcpy because of the badly suboptimal behavior you've described. I have cooked up the attached implementation. I checked everything but a few border cases -- I need to write

Re: removing an ext2fs file forces disk activity

2002-03-26 Thread Thomas Bushnell, BSG
Ludovic Courtès [EMAIL PROTECTED] writes: This kind of observation is quite normal I guess, due to the extensive use of RPCs and so on, but are there still some optimizations that could be implemented in order to reduce CPU consumption? Where do you think the processor should be spending its

Re: removing an ext2fs file forces disk activity

2002-03-26 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: Perhaps idling, waiting for disk i/o requests to complete? Do a big tar extraction on Linux and note that your tar process soaks up plenty of CPU time. ___ Bug-hurd mailing list [EMAIL PROTECTED]

Re: removing an ext2fs file forces disk activity

2002-03-26 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: The numbers depend a lot on the actual hardware, and the relative speed of the cpu and disks, I think. I just tried extracting gcc-3.0.4.tar (note, no .gz, unzipping would soak up most of the idle time). top reported that the tar process consumed

Re: removing an ext2fs file forces disk activity

2002-03-25 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: causes a lot of disk activity. Further tests showed that the disk is activated for each rm. Is this a hard requirement? In Linux, the loop above does not cause any disk activity (except at the beginning and maybe at the end), it seems to be done

Re: removing an ext2fs file forces disk activity

2002-03-25 Thread Thomas Bushnell, BSG
Atle [EMAIL PROTECTED] writes: When running a telnet session from my Linux PC to a BSD box, I see the disk lamp go on, and I hear the disk go 'chack' each time I press a key on the keyboard! It's updating the mtime on the terminal node. ___

Re: removing an ext2fs file forces disk activity

2002-03-25 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: Is it not good enough to maintain the order of the writes, updating diskblocks in the same order as the corresponding write by the client? Yes, that's enough. But you cannot skip any writes. One problem is that if the filesystem modifies block A,

Re: removing an ext2fs file forces disk activity

2002-03-25 Thread Thomas Bushnell, BSG
[EMAIL PROTECTED] (Niels Möller) writes: How hard would it be to create a new store type that basically implements only a write-cache: It would have store_write put the modified block into a queue, from which blocks are written to the underlying store later by a separate syncing thread.

Re: zealous use of error

2002-03-24 Thread Thomas Bushnell, BSG
James A Morrison [EMAIL PROTECTED] writes: init: * init.c (reboot_mach): Use err, not errno. (run): Likewise. (lauch_core_servers): Likewise. (run_for_real): Check against MACH_PORT_NULL instead of not(!) for failure. (start_child): Likewise. It's

Re: zealous use of error

2002-03-24 Thread Thomas Bushnell, BSG
James Morrison [EMAIL PROTECTED] writes: Previously netfs_make_protid set errno, no matter what. So to keep this behaviour the patch would look like this. There is no need to always set errno (though you should check all the callers to make sure--which needed to be done first anyway).

Re: run.c translator

2002-03-20 Thread Thomas Bushnell, BSG
Marcus Brinkmann [EMAIL PROTECTED] writes: The implementation is using the Hurd's IO interface. It seems I was not clear enough in my original mail. The translator creates a pipe to the forked program, and translates io_read into a pipe read and io_write into a pipe write. The translator

Re: fstests and stuff

2002-03-20 Thread Thomas Bushnell, BSG
James Morrison [EMAIL PROTECTED] writes: On around line 93 of fstests/fstests.c, there is a malloc of size 0, what would be the point of that? Beats me. The program is just for testing, that is, it was there so that we could easily have any random bit of code easily compiled to be run.

Re: patch: use err, not errno

2002-03-14 Thread Thomas Bushnell, BSG
James A Morrison [EMAIL PROTECTED] writes: Ok, I've grep'd through the hurd source looking for instances of errno being assigned directly. These seem to be the places where setting errno isn't right. What's the reason for this? I've also changed !var to var == MACH_PORT_NULL where

Re: patch: use err, not errno

2002-03-14 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: What's the reason for this? Getting at the thread-local errno tends to be rather a pain in gdb. And the overhead of locating the thread-local errno slot is pretty spurious in these cases when compared to a local variable that's just a register.

Re: patch: use err, not errno

2002-03-14 Thread Thomas Bushnell, BSG
James Morrison [EMAIL PROTECTED] writes: I've also changed !var to var == MACH_PORT_NULL where appropriate because some documentation, mach.texi, says MACH_PORT_NULL is not assumed to be 0 in the Hurd system. This is always fine. Yes, but I wanted to be consistant with the

Re: memory_object_lock_request and memory_object_data_return fnord

2002-03-13 Thread Thomas Bushnell, BSG
Neal H Walfield [EMAIL PROTECTED] writes: But, since the user, in this case, is in the same task, we can do some black magic. Do you think that that is reasonable? No, it seems like a bad way to spend effort right now. It would seriously warp the structure of the thing, and we don't havy

Re: console stuff (was: Re: argp limitation

2002-03-11 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: And then the way to change that dynamically is to, well, do a setopts call. If there is some error and it can't read the file, then it returns an error and leaves the previous keymap in place. That seem utterly unacceptable to me based on

Re: console stuff (was: Re: argp limitation

2002-03-11 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: An alternative strategy (for the dynamic case) is to have the client hand a port for the file to the console server, which can then read from it exactly as if it were a file (which it normally will be). Yeah, maybe. But that is certainly more of

Re: oskit-mach: device_write

2002-03-10 Thread Thomas Bushnell, BSG
Daniel Wagner [EMAIL PROTECTED] writes: Calling device_write with an invalid data_count, device_write will return an error (D_INVALID_SIZE). I didn't checked the return value, instead I tested for the bytes_written and of course there's only a bogus value. This is a general rule for MiG

Re: oskit-mach/libstore breakage

2002-03-06 Thread Thomas Bushnell, BSG
Roland McGrath [EMAIL PROTECTED] writes: libstore uses device_map with size and offset being null. Urmph. To my mind, this just illustrates that the current io_map interface model is really wrong and that an io_map call that takes offset and size parameters is the way to go (as is

<    1   2   3   4   5   6   >