Thanks! That perfectly answered my question.
-x
On 8/21/07, Kevin Hao <[EMAIL PROTECTED]> wrote:
> > I am curious how Linux convert an fd to the pathname? Does it
> > recursively walk back from current dentry to the root?
> Using d_path.
> > Can someone point me to the right place in the kernel
Hi,
In the Linux proc filesystem, /proc/[pid]/fd is a link to the
actually the actual pathname of the opened file.
I am curious how Linux convert an fd to the pathname? Does it
recursively walk back from current dentry to the root?
Can someone point me to the right place in the kernel where th
prevent a file from containing part
of old data and part of new data.
That's why I am so confused how can these systems provide consistent
snapshotting capability without sacrificing system performance much.
On 7/3/07, Chris Mason <[EMAIL PROTECTED]> wrote:
On Tue, 3 Jul 2007 01:28:57
ROTECTED]> wrote:
It depends how snapshot is being taken. Usually it is Copy On Write. Google
for Copy on Write and you will find the answer for this.
On 7/3/07, Xin Zhao <[EMAIL PROTECTED]> wrote:
>
> Hi,
>
>
> If a file is already opened when snapshot command is issued,
Hi,
If a file is already opened when snapshot command is issued, the file
itself could be in an inconsistent state already. Before the file is
closed, maybe part of the file contains old data, the rest contains
new data.
How does a versioning filesystem guarantee that the file snapshot is
in a
ings of several different inodes (BTW ext3cow filesystem
may be interesting for you www.ext3cow.com).
Honza
> On 3/28/07, Dave Kleikamp <[EMAIL PROTECTED]> wrote:
> >On Wed, 2007-03-28 at 02:45 -0400, Xin Zhao wrote:
> >> Hi,
>
You are right. If the device is very big, the radix tree could be huge
as well. Maybe the lookup it not that cheap. But the per-device tree
can be optimized too. A simple way I can immediately image is: evenly
split a device into N parts by the sector numbers. For each part, we
maintain a radix tr
TECTED]> wrote:
On Wed, 2007-03-28 at 02:45 -0400, Xin Zhao wrote:
> Hi,
>
> If a Linux process opens and reads a file A, then it closes the file.
> Will Linux keep the file A's data in cache for a while in case another
> process opens and reads the same in a short time? I thi
Hi,
If a Linux process opens and reads a file A, then it closes the file.
Will Linux keep the file A's data in cache for a while in case another
process opens and reads the same in a short time? I think that is what
I heard before.
But after I digged into the kernel code, I am confused.
When a
I read the code and found that a block buffer is not necessarily freed
even if the corresponding inode is released. Looks like block buffer
can stay around as long as the system still has free memory. Is my
understanding correct?
-x
On 3/9/07, Xin Zhao <[EMAIL PROTECTED]> wrote:
Hi,
Hi,
I am working on a file system that allow multiple files to share data
blocks. That is, a data block can be shared by two or more files. Now
my question is: suppose file A and B share the same data block D. Now
a process open file A and read block D, then this process closes file
A. If another
MAIL PROTECTED]> wrote:
On 2007-01-24, Xin Zhao wrote:
> Archived-At: <http://permalink.gmane.org/gmane.linux.kernel/485775>
Hallo.
> I just successfully called do_path_lookup() in my kernel module. I
> just removed the "fastcall" from the declaration of do_path
I just successfully called do_path_lookup() in my kernel module. I
just removed the "fastcall" from the declaration of do_path_lookup(),
then the problem disappeared. I don't quite understand "fastcall"
though.
Can someone explain it?
Thanks,
-x
On 1/23/07, Xin Zhao
Hi,
I tried to call the following code in a kernel module:
error = do_path_lookup(AT_FDCWD, "/etc/profile.d/glib2.csh",
LOOKUP_PARENT, &nd);
I exported the function do_path_lookup() using
"EXPORT_SYMBOL_GPL(do_path_lookup);"
But do_path_lookup() caused the "general protection fault: 00
Sorry if this question is dumb.
SELinux is included in 2.6. But I think it works by putting LSM hooks a lot
of place in Linux and then it can define its own policy enforcement codes.
However, I cannot find hooks in kernel 2.6.9 and 2.6.11. How can
SELinux work with kernel 2.6 to protect system wi
Hi,
I want to lock down a directory to be read-only, say, /etc, for system
security. Unfortunately, some valid system tools might need to
create/modified files like "/etc/dhclient-eth0.conf". To avoid
disrupting the normal running of those tools, I might have to allow
certain files to be created
Let me clarify with an example:
test.c:
**
open("abc.txt", O_RDONLY);
i ++;
Apparently, after the system call "open" in the kernel, the system
will return to the instruction "i++". My question is: can we find out
the instruction pointer in sys_open? If so, how?
Thanks!
xin
-
To unsubsc
wrote:
> On Fri, Jul 29, 2005 at 05:00:20PM -0400, Xin Zhao wrote:
> > Thanks for your reply.
> >
> > Below is the code that print the kernel calling trace:
>
> Can I suggest just turning on frame pointers like I suggested?
>
> If you say Y here the resulting kern
the show_trace does not scan and guess
the pointers. Instead, it use "previous_esp" to extract the esp and
thus the returning eip. Am I right?
Cheers,
xin
On 7/29/05, bert hubert <[EMAIL PROTECTED]> wrote:
> On Fri, Jul 29, 2005 at 04:27:16PM -0400, Xin Zhao wrote:
> >
I tried to use dump_stack to dump the calling trace in the kernel.
What I did is adding a dump_stack() call in the sys_open function.
Below is the dump out result:
Jul 28 17:33:31 normal kernel: [] sys_open+0xa6/0xb7
Jul 28 17:33:31 normal kernel: [] syscall_call+0x7/0xb
However, if I insert a
I know in kernel level we have dump_stack, but is there anyway that we
can dump user stack in the kernel environment? I might want to dump
the calling trace in a system call function.
Thanks in advance!
-x
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a
OK. I already read the codes. But an official document is always welcome. :)
On 7/21/05, Xin Zhao <[EMAIL PROTECTED]> wrote:
> I'd like to learn some details of how RPC's FSM works (e.g. the
> changing graph of all states). I know one possibility is to read the
> source
I'd like to learn some details of how RPC's FSM works (e.g. the
changing graph of all states). I know one possibility is to read the
source code, but it is a little time consuming.
Can someone kindly direct me to some documents about the rpc
implementatino? Thanks in advance!
-x
-
To unsubscribe
Sorry if this question is dumb.
I am trying to modify NFS to add some more features. I changed the
rpc_clnt struct in include/linux/sunrpc/clnt.h to add some more
fields:
vrpc_comm_t *cl_comm;
wait_queue_head_t cl_callwaitq[MAX_PENDING_REQS];
int
nfsd.ko.
How to do this? Thanks!
-x
On 7/5/05, Horst von Brand <[EMAIL PROTECTED]> wrote:
> Xin Zhao <[EMAIL PROTECTED]> wrote:
> > I tried to do "insmod nfsd.ko", but always got the error message
> > "insmod: error inserting 'nfsd.ko': -1 Unknown sy
I tried to do "insmod nfsd.ko", but always got the error message
"insmod: error inserting 'nfsd.ko': -1 Unknown symbol in module"
Why?
The kernel is 2.6.11.10
The command I used is:
1. insmod lockd.ko ---succeed
2. exportfs -r ---succeed
3. insmod nfsd.ko --- failed
Moreover, I noticed that
Please discard the previous message.
I just noticed that something was wrong in the nfsd implementation
(slightly modified by me). After I fixed the problem, I can rmmod nfsd
now.
Sorry for the confusion.
-x
On 7/5/05, Xin Zhao <[EMAIL PROTECTED]> wrote:
> I compile kernel 2.6.
Sorry for this dumb question.
I am trying to install Fedora Core 2 on a dell PowerEdge 2850 with
three 73GB SCSI disks on a RAID 4e/DI controller. I set it up as Raid
5. but when I tried to install FC2, it always complaint that no disk
drive can be found.
Can anybody give me some advice on how t
We can certainly harden the system, but sometime the vulnerability in
kernel is hard to detect and protect. For example, the brk()
vulnerablitiy found in Linux kernel. All the security mechanisms you
mentioned have to rely on a healthy kernel. Unfortunately, the kernel
itself could be compromised t
silly mistakes?
Xin
On 4/17/05, Willy Tarreau <[EMAIL PROTECTED]> wrote:
> On Sun, Apr 17, 2005 at 11:54:34AM -0400, Xin Zhao wrote:
> > Why not simply unset the write bit for all three groups of users?
> > That seems to be enough to prevent file modification.
> >
> >
Why not simply unset the write bit for all three groups of users?
That seems to be enough to prevent file modification.
Immutable seems to only add one more protection level in case of
misconfiguration on standard access right bits. Is that right?
-
To unsubscribe from this list: send the line "
I have very very fast network and is testing NFS2 over this kind of
network. I noticed that for standard work like read/write a large
file, compile kernels, the performance of NFS2 is good. But if I try
to decompress kernel tar file. The standard ext2 takes 28s while NFS2
takes 81s. Also, if I rem
Sorry for the dumb question.
I am trying to develop a new filesystem based on NFS, which runs in a
very fast network environment. I used the source code of NFS2, but
noticed that NFS write is very slow. Even if I changed wsize to 8192,
it still can only reach 1MB/s. I don't know why. Because the
33 matches
Mail list logo