Alexey Dobriyan wrote:
> > +struct proc_fs_context {
> > + struct pid_namespace*pid_ns;
> > + unsigned long mask;
>
> mask should "unsigned" as there aren't lot of flags.
Done, thanks.
David
> +struct proc_fs_context {
> + struct pid_namespace*pid_ns;
> + unsigned long mask;
mask should "unsigned" as there aren't lot of flags.
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|1
fs/proc/internal.h |1
fs/proc/root.c | 220
3 files changed, 151 insertions(+), 71 deletions(-)
diff --git a/fs/proc/inode.c b/fs/proc/
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2
fs/proc/internal.h |2
fs/proc/root.c | 209 +++-
3 files changed, 141 insertions(+), 72 deletions(-)
diff --git a/fs/proc/inode.c b/fs/proc/
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2
fs/proc/internal.h |2
fs/proc/root.c | 209 +++-
3 files changed, 141 insertions(+), 72 deletions(-)
diff --git a/fs/proc/inode.c b/fs/proc/
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2 -
fs/proc/internal.h |2 -
fs/proc/root.c | 179 ++--
3 files changed, 120 insertions(+), 63 deletions(-)
diff --git a/fs/proc/inode.c b/fs/pro
On Tue, Jun 26, 2018 at 09:57:07AM +0100, David Howells wrote:
> Andrei Vagin wrote:
>
> > > > > - mnt = kern_mount_data(&proc_fs_type, ns, 0);
> > >
> > > Here ns->user_ns and get_current_cred()->user_ns are not always equal
> >
> > What do you think about the attached patch?
> > ...
> > -
Andrei Vagin wrote:
> > > > - mnt = kern_mount_data(&proc_fs_type, ns, 0);
> >
> > Here ns->user_ns and get_current_cred()->user_ns are not always equal
>
> What do you think about the attached patch?
> ...
> - fc = vfs_new_fs_context(&proc_fs_type, NULL, 0,
> -
On Mon, Jun 25, 2018 at 11:13:20PM -0700, Andrei Vagin wrote:
> On Mon, Jun 18, 2018 at 08:34:50PM -0700, Andrei Vagin wrote:
> > Hi David,
> >
> > We run CRIU tests for vfs/for-next, and today a few of these test failed. I
> > found that the problem appears after this patch..
> >
> > > int pid_
On Mon, Jun 18, 2018 at 08:34:50PM -0700, Andrei Vagin wrote:
> Hi David,
>
> We run CRIU tests for vfs/for-next, and today a few of these test failed. I
> found that the problem appears after this patch..
>
> > int pid_ns_prepare_proc(struct pid_namespace *ns)
> > {
> > + struct proc_fs_cont
Hi David,
We run CRIU tests for vfs/for-next, and today a few of these test failed. I
found that the problem appears after this patch..
https://travis-ci.org/avagin/linux/jobs/393766778
The reproducer is attached. It creates a process in a new set of namespaces
(user, mount, etc) and then this p
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2 -
fs/proc/internal.h |2 -
fs/proc/root.c | 179 ++--
3 files changed, 120 insertions(+), 63 deletions(-)
diff --git a/fs/proc/inode.c b/fs/pro
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2 -
fs/proc/internal.h |2 -
fs/proc/root.c | 169 ++--
3 files changed, 113 insertions(+), 60 deletions(-)
diff --git a/fs/proc/inode.c b/fs/pro
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2 -
fs/proc/internal.h |2 -
fs/proc/root.c | 176 ++--
3 files changed, 118 insertions(+), 62 deletions(-)
diff --git a/fs/proc/inode.c b/fs/pro
On Wed, Jun 14, 2017 at 04:17:43PM +0100, David Howells wrote:
> int pid_ns_prepare_proc(struct pid_namespace *ns)
> {
> + struct proc_fs_context *ctx;
> + struct fs_context *fc;
> struct vfsmount *mnt;
> + int ret;
> +
> + fc = vfs_new_fs_context(&proc_fs_type, NULL, 0, FS
Add fs_context support to procfs.
Signed-off-by: David Howells
---
fs/proc/inode.c|2 -
fs/proc/internal.h |2 -
fs/proc/root.c | 175 ++--
3 files changed, 116 insertions(+), 63 deletions(-)
diff --git a/fs/proc/inode.c b/fs/pro
16 matches
Mail list logo