On Sun, Feb 24, 2008 at 11:46:07AM +0100, Arnd Bergmann wrote:
> On Saturday 23 February 2008, Al Viro wrote:
>
> > Ewww - caps, \n... BTW, \0 is pointless here - simple_read_from_buffer()
> > will
> > not access it with these arguments)...
>
> > ...
>
> > Please, check the length; sloppy inp
On Tue, Feb 19, 2008 at 05:04:35AM +0100, Arnd Bergmann wrote:
> I noticed that there is a lot of duplication in pseudo
> file systems, so I started looking into how to consolidate
> them. I ended up with a largish rework of the structure
> of libfs and moving almost all of debugfs in there as well
cular this properly exposes the read-ahead window for all
> relevant users and /sys/block//queue/read_ahead_kb should be
> deprecated.
>
> With patient help from Kay Sievers and Greg KH
>
> [EMAIL PROTECTED]
>
> - split off NFS and FUSE changes into separate patches
>
On Thu, Jan 24, 2008 at 08:34:07PM +0100, Miklos Szeredi wrote:
> From: Miklos Szeredi <[EMAIL PROTECTED]>
>
> Add a .show_options super operation to usbfs.
>
> Signed-off-by: Miklos Szeredi <[EMAIL PROTECTED]>
Looks good to me. Do you want to take this through your tree, as it is
dependant on
-stable review patch. If anyone has any objections, please let us know.
--
From: J. Bruce Fields <[EMAIL PROTECTED]>
patch 97855b49b6bac0bd25f16b017883634d13591d00 in mainline.
It's currently possible to send posix_locks_deadlock() into an infinite
loop (under the BKL).
For no
On Fri, Nov 02, 2007 at 11:05:27AM -0600, Latchesar Ionkov wrote:
> Sysfs support for 9P servers.
> Every server type is represented as a directory in /sys/fs/9p/srv. Initially
> there is a single file in the directory -- 'clone'. Reading from the clone
> file creates a new instance of the file ser
On Fri, Nov 02, 2007 at 01:14:05PM -0600, Latchesar Ionkov wrote:
> This patch adds only the basic 9p functionality, we use the sysfs
> interface extensively for configuring the 9p in-kernel servers (patch
> 7 in the series). The v9fs filesyste will probably add some more
> subdirectories for authe
On Fri, Nov 02, 2007 at 10:53:31AM -0600, Latchesar Ionkov wrote:
> This patch implements the basic sysfs support for 9p. If CONFIG_NET_9P_DEBUG
> is defined, allows reading and modifying the debug level via
> /sysfs/fs/9p/debuglevel.
Since this is a debug-only type file, why not just put it in de
On Thu, Sep 27, 2007 at 05:28:57PM -0600, Matthew Wilcox wrote:
> On Thu, Sep 27, 2007 at 07:19:27PM -0400, Theodore Tso wrote:
> > Would you accept a patch which causes the deprecated sysfs
> > files/directories to disappear, even if CONFIG_SYS_DEPRECATED is
> > defined, via a boot-time parameter?
On Thu, Sep 27, 2007 at 07:19:27PM -0400, Theodore Tso wrote:
> On Thu, Sep 27, 2007 at 02:34:45PM -0700, Greg KH wrote:
> > Ok, how then should I advertise this better? What can we do better to
> > help userspace programmers out in this regard?
>
> Would you accept a p
On Thu, Sep 27, 2007 at 06:27:48PM -0400, Kyle Moffett wrote:
> On Sep 27, 2007, at 17:34:45, Greg KH wrote:
>> On Thu, Sep 27, 2007 at 02:37:42PM -0400, Theodore Tso wrote:
>>> That fact that sysfs is all laid out in a directory, but for which some
>>> directories/
On Thu, Sep 27, 2007 at 02:37:42PM -0400, Theodore Tso wrote:
> On Thu, Sep 27, 2007 at 10:59:17AM -0700, Greg KH wrote:
> > Come on now, I'm _very_ tired of this kind of discussion. Please go
> > read the documentation on how to _use_ sysfs from userspace in such a
> >
On Thu, Sep 27, 2007 at 10:23:43AM -0700, Andrew Morton wrote:
> On Thu, 27 Sep 2007 11:59:02 -0400 Theodore Tso <[EMAIL PROTECTED]> wrote:
>
> > On Thu, Sep 27, 2007 at 04:19:12PM +0100, Alan Cox wrote:
> > > There are real things to worry about - sysfs, sysfs, sysfs, ... and all
> > > the other
On Sat, Sep 08, 2007 at 01:11:13PM +0200, Michal Piotrowski wrote:
> USB
>
> Subject : 2.6.23-rc1: USB hard disk broken
> References : http://lkml.org/lkml/2007/7/25/62
> Last known good : ?
> Submitter : Tino Keitel <[EMAIL PROTECTED]>
> Caused-By : ?
> Handled-By :
On Mon, Jul 23, 2007 at 11:47:44AM +0200, Michal Piotrowski wrote:
> Unclassified
>
> Subject : kobject link failure
> References : http://lkml.org/lkml/2007/7/19/495
> Last known good : ?
This is caused by a patch that happened after 2.6.22 was released, so it
is a regression.
> Su
On Thu, Jul 19, 2007 at 06:34:55PM +0200, Michal Piotrowski wrote:
> SYSFS
>
> Subject : sysfs root link count broken in 2.6.22-git5
> References : http://lkml.org/lkml/2007/7/15/62
> Last known good : ?
> Submitter : Jean Delvare <[EMAIL PROTECTED]>
> Caused-By : ?
> Hand
On Sat, Jun 16, 2007 at 01:09:06AM -0700, [EMAIL PROTECTED] wrote:
> On Fri, 15 Jun 2007, Greg KH wrote:
>
> >>> Usually you don't do that by doing a 'mv' otherwise you are almost
> >>> guaranteed stale and mixed up content for some period of time
On Fri, Jun 15, 2007 at 09:21:57PM -0400, James Morris wrote:
> On Fri, 15 Jun 2007, Greg KH wrote:
>
> > Oh great, then things like source code control systems would have no
> > problems with new files being created under them, or renaming whole
> > trees.
>
> I
On Fri, Jun 15, 2007 at 05:01:25PM -0700, [EMAIL PROTECTED] wrote:
> On Fri, 15 Jun 2007, Greg KH wrote:
>
> > On Fri, Jun 15, 2007 at 04:30:44PM -0700, Crispin Cowan wrote:
> >> Greg KH wrote:
> >>> On Fri, Jun 15, 2007 at 10:06:23PM +0200, Pavel Machek wrote
On Fri, Jun 15, 2007 at 05:18:10PM -0700, Seth Arnold wrote:
> On Fri, Jun 15, 2007 at 04:49:25PM -0700, Greg KH wrote:
> > > We have built a label-based AA prototype. It fails because there is no
> > > reasonable way to address the tree renaming problem.
> >
> &g
On Fri, Jun 15, 2007 at 04:30:44PM -0700, Crispin Cowan wrote:
> Greg KH wrote:
> > On Fri, Jun 15, 2007 at 10:06:23PM +0200, Pavel Machek wrote:
> >
> >>>> * Renamed Directory trees: The above problem is compounded with
> >>>> directory t
On Fri, Jun 15, 2007 at 05:42:08PM -0400, James Morris wrote:
> On Fri, 15 Jun 2007, Greg KH wrote:
>
> > > Or just create the files with restrictive labels by default. That way
> > > you "fail closed".
> >
> > From my limited knowledge of SELinu
On Fri, Jun 15, 2007 at 05:28:35PM -0400, Karl MacMillan wrote:
> On Fri, 2007-06-15 at 14:14 -0700, Greg KH wrote:
> > On Fri, Jun 15, 2007 at 01:43:31PM -0700, Casey Schaufler wrote:
> > >
> > > Yup, I see that once you accept the notion that it is OK for a
> &g
On Fri, Jun 15, 2007 at 01:43:31PM -0700, Casey Schaufler wrote:
>
> Yup, I see that once you accept the notion that it is OK for a
> file to be misslabeled for a bit and that having a fixxerupperd
> is sufficient it all falls out.
>
> My point is that there is a segment of the security community
On Fri, Jun 15, 2007 at 10:06:23PM +0200, Pavel Machek wrote:
> Hi!
>
> And before you scream "races", take a look. It does not actually add
> them:
Hey, I never screamed that at all, in fact, I completly agree with you
:)
> > > > I agree that the in-kernel implementation could use different
>
On Thu, Jun 14, 2007 at 05:18:43PM -0700, [EMAIL PROTECTED] wrote:
> On Thu, 14 Jun 2007, Jack Stone wrote:
>
> > [EMAIL PROTECTED] wrote:
> >> On Sun, 10 Jun 2007, Pavel Machek wrote:
> >>> But you have that regex in _user_ space, in a place where policy
> >>> is loaded into kernel.
> >>
> >> th
On Sun, Jun 10, 2007 at 10:09:18AM -0700, Crispin Cowan wrote:
> Andreas Gruenbacher wrote:
> > On Saturday 09 June 2007 02:17, Greg KH wrote:
> >
> >> On Sat, Jun 09, 2007 at 12:03:57AM +0200, Andreas Gruenbacher wrote:
> >>
> >>> AppArmor
On Sat, Jun 09, 2007 at 12:03:57AM +0200, Andreas Gruenbacher wrote:
> AppArmor is meant to be relatively easy to understand, manage, and customize,
> and introducing a labels layer wouldn't help these goals.
Woah, that describes the userspace side of AA just fine, it means
nothing when it comes
On Wed, Jun 06, 2007 at 09:26:26AM -0400, Stephen Smalley wrote:
> On Mon, 2007-06-04 at 23:03 +0200, Andreas Gruenbacher wrote:
> > On Tuesday 15 May 2007 11:20, Pavel Machek wrote:
> > > Hi!
> > >
> > > > Pathname matching, transition table loading, profile loading and
> > > > manipulation.
> >
On Wed, May 09, 2007 at 01:10:09AM +0200, J??rn Engel wrote:
>
> The remaining question is how to deal with kernel-only code that uses
> be64. Convert that to __be64 as well? Or introduce be64 in
> include/linix/types.h instead?
I say leave it alone for now, it's not that common :)
thanks,
gr
On Tue, May 08, 2007 at 10:58:27PM +0200, J??rn Engel wrote:
> On Tue, 8 May 2007 22:15:18 +0300, Pekka Enberg wrote:
> > On 5/8/07, J??rn Engel <[EMAIL PROTECTED]> wrote:
> > >> > +typedef __be16 be16;
> > >> > +typedef __be32 be32;
> > >> > +typedef __be64 be64;
> > >>
> > >> Why are those typede
On Mon, May 07, 2007 at 10:29:29AM -0600, Chris Kottaridis wrote:
> I am getting the following when trying to close a pipe:
Do you have a small, sample example code that can easily duplicate this
problem? Can you post it here?
thanks,
greg k-h
-
To unsubscribe from this list: send the line "uns
On Fri, May 04, 2007 at 04:14:28PM +0200, Jan Kara wrote:
> On Thu 03-05-07 17:16:02, Greg KH wrote:
> > On Thu, May 03, 2007 at 11:54:52AM +0200, Jan Kara wrote:
> > > On Tue 01-05-07 20:26:27, Greg KH wrote:
> > > > On Mon, Apr 30, 2007 at 07:55:36PM +0200, Jan
On Thu, May 03, 2007 at 11:54:52AM +0200, Jan Kara wrote:
> On Tue 01-05-07 20:26:27, Greg KH wrote:
> > On Mon, Apr 30, 2007 at 07:55:36PM +0200, Jan Kara wrote:
> > > Hello,
> > >
> > > attached patch implements renaming for debugfs. I was asked for t
On Mon, Apr 30, 2007 at 07:55:36PM +0200, Jan Kara wrote:
> Hello,
>
> attached patch implements renaming for debugfs. I was asked for this
> feature by WLAN guys and I guess it makes sence (they have some debug info
> in the directory identified by interface name and that can change...).
> Co
On Mon, Apr 16, 2007 at 01:39:19PM -0600, Eric W. Biederman wrote:
> Miklos Szeredi <[EMAIL PROTECTED]> writes:
>
> > From: Miklos Szeredi <[EMAIL PROTECTED]>
> >
> > The owner doesn't need sysadmin capabilities to call umount().
> >
> > Similar behavior as umount(8) on mounts having "user=UID" op
On Wed, Jan 24, 2007 at 01:28:22PM -0700, Eric W. Biederman wrote:
> Greg KH <[EMAIL PROTECTED]> writes:
>
> > On Wed, Jan 24, 2007 at 12:37:19PM -0700, Eric W. Biederman wrote:
> >>
> >> Modify the device class code so that normal manipulations work
> &
On Wed, Jan 24, 2007 at 12:37:19PM -0700, Eric W. Biederman wrote:
>
> Modify the device class code so that normal manipulations work
> in the presence of shadow directories. Some of the shadow directory
> support still needs to be implemented in the implementation of the
> class but these modifi
On Fri, Sep 02, 2005 at 05:44:03PM +0800, David Teigland wrote:
> On Thu, Sep 01, 2005 at 01:35:23PM +0200, Arjan van de Ven wrote:
>
> > + gfs2_assert(gl->gl_sbd, atomic_read(&gl->gl_count) > 0,);
>
> > what is gfs2_assert() about anyway? please just use BUG_ON directly
> > everywhere
>
> Whe
On Mon, Aug 29, 2005 at 09:29:55PM +0200, Miklos Szeredi wrote:
> > Fair enough, where in /sys should such things go? /proc/fs is a
> > well-known place, but there is no /sys/fs :-)
Actually, configfs should probably be mounted in /sys/kernel/config/
Just create that mount point and away you
On Thu, Aug 25, 2005 at 10:45:42AM -0700, Mark Fasheh wrote:
> On Thu, Aug 25, 2005 at 11:58:19AM +0200, Christoph Hellwig wrote:
> > > > - there's still some procfs abuse
> > >
> > > Specifics of what is abuse vs OK would be interesting.
> >
> > You're using procfs for non-process data.
>
>
On Thu, Aug 25, 2005 at 10:43:05AM -0500, Brian King wrote:
> Sonny Rao wrote:
> > On Thu, Aug 25, 2005 at 03:11:03PM +0100, Brian King wrote:
> >
> >>I think this is a libsysfs/iprutils issue due to a sysfs change in
> >>recent kernels. Install sysfsutils 1.3.0, then grab the latest iprutils
>
On Mon, Jul 11, 2005 at 11:07:17AM -0500, Michael C Thompson wrote:
> > > Ultimately, the part where we differ most, is the processing of
> > > information in
> > > fs/dcache.c to give dynamic updates in response to file system activity
> > > (such
> > > as attaching audit information to an audit
On Fri, Jul 08, 2005 at 02:48:03PM -0500, Timothy R. Chavez wrote:
> I've chosen not to respond to individual segments because the overall theme
> is that the right thing to do is to not duplicate functionality.
Correct.
> Your suggestion is to merge the two projects.
Or at the minimal, the comm
On Thu, Jul 07, 2005 at 02:49:15PM -0500, Timothy R. Chavez wrote:
>
> Even if access control prohibits us from actually seeing the content of
> /etc/shadow, if we're auditing /etc/shadow, attempts should be logged
> and not gone unnoticed.
>
> watch /etc/shadow
> passwd
>
> cat /etc/shadow (g
On Thu, Jul 07, 2005 at 03:48:37PM -0400, Steve Grubb wrote:
> On Thursday 07 July 2005 15:04, Greg KH wrote:
> > You are adding auditfs, a new userspace access, right?
>
> Not sure what you mean. This is using the same netlink interface that all the
> rest of the audit s
On Thu, Jul 07, 2005 at 02:49:09PM -0400, Steve Grubb wrote:
> On Thursday 07 July 2005 14:15, Greg KH wrote:
> > I fail to see any refactoring here, why not make your patch rely on
> > theirs?
>
> At the time this code was developed, inotify was not in the kernel. We would
On Thu, Jul 07, 2005 at 07:16:35PM +0100, David Woodhouse wrote:
> On Thu, 2005-07-07 at 11:10 -0700, Greg KH wrote:
> > Yes, and then I change namespaces to put /etc/shadow at
> > /foo/baz/etc/shadow and then access it that way? Will the current
> > audit system fail
On Wed, Jul 06, 2005 at 09:33:05PM -0400, Steve Grubb wrote:
> On Wednesday 06 July 2005 19:50, Greg KH wrote:
> > As inotify works off of open file descriptors, yes, this is true. ?But,
> > again, if you think this is really important, then why not just work
> > with inotify
On Thu, Jul 07, 2005 at 11:26:51AM -0500, Timothy R. Chavez wrote:
> On Wednesday 06 July 2005 18:50, Greg KH wrote:
> > On Wed, Jul 06, 2005 at 03:23:10PM -0500, Timothy R. Chavez wrote:
> > > This is similar to Inotify in that the audit subsystem watches for file
> &g
On Wed, Jul 06, 2005 at 03:23:10PM -0500, Timothy R. Chavez wrote:
> This is similar to Inotify in that the audit subsystem watches for file
> system activity and collects information about inodes its interested
> in, but this is where the similarities stop. Despite the fact that the
> Inotify re
On Wed, Jul 06, 2005 at 11:54:41AM -0500, Timothy R. Chavez wrote:
> To implement this feature we rely on the concepts of a "watch" and
> "watch list". Directories hold lists of "watches" (ie: "watch lists")
> that describe auditable file names one level beneath them. If a file
> holds a pointer
52 matches
Mail list logo