Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-11 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > > This filesystem-specific flag needs to be prevented from escaping into other > subsystems that might interact, such as VM. The current usage is mainly > for directories, except for Reiser4, which uses it for journalling > .. > + SetPageMiscFS(pa

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-11 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > Note: I have not fully audited the NFS-related colliding use of page flags > bit 8, Nor will you be able to until the NFS caching patches are released. > to verify that it really does not escape into VFS or MM from NFS, in fact I > have misgivings abo

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-11 Thread David Howells
Trond Myklebust <[EMAIL PROTECTED]> wrote: > > http://marc.theaimsgroup.com/?l=linux-kernel&m=112368417412580&w=2 > > Oh. You are talking about CacheFS? That hasn't been declared "ready to > merge" yet. I can probably put out FS-Cache now, and the patches for kAFS and NFS to use it. CacheFS is t

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-11 Thread David Howells
Adrian Bunk <[EMAIL PROTECTED]> wrote: > Since this was done only for CacheFS, and Andrew dropped CacheFS from > -mm he could drop this patch as well. I asked him not to. Somewhat at his instigation, I requested that he drop the filesystem caching patches for the moment. I'm updating them and th

Re: [RFC][patch 0/2] mm: remove PageReserved

2005-08-11 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > To be honest I'm having some trouble following this through logically. I'll > read through a few more times and see if that fixes the problem. This seems > cluster-related, so I have an interest. Well, perhaps I can explain the function for which I'm

Re: [PATCH, RFC] kill odd mm context pinning hack in frv

2005-08-11 Thread David Howells
Christoph Hellwig <[EMAIL PROTECTED]> wrote: > David, is that more than a debugging aid? I'm trying to get rid of > tasklist_lock users and this one looks really suspicios.. Yes. The FR451 CPU (the only one with an MMU at the moment) has accounting and profiling aids that are enabled by the con

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-12 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > > I know you want to ruthlessly trim out anything that isn't used, but please > > be patient:-) > > Are you sure CacheFS is even the right way to do client-side caching? It's just one way. See the attached document for how it works. > What is wrong w

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-12 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > You also achieved some sort of new low point in the abuse of StudlyCaps > there. Please, let's not get started on mixed case acronyms. My patch has been around for quite a while, and no-one else has complained, not even you before this point. Plus, yo

Re: [RFC][patch 0/2] mm: remove PageReserved

2005-08-15 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > > Now we already do this at one level: RAM. The page cache _is_ such a cache, > > but whilst it's much faster than a disk, it is severely restricted in size > > Did you just suggest that 16 TB/address_space is too small to cache NFS pages? No. I meant

Re: [RFC][patch 0/2] mm: remove PageReserved

2005-08-16 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > > I want to know when a page is going to be modified so that I > > can predict the state of the cache as much as possible. I don't want > > userspace processes corrupting the cache in unrecorded ways. > > There are two cases: > > 1) Metadata. If a

Re: [RFC] unify semaphore implementations

2005-04-28 Thread David Howells
semaphores, see the attached module. It tests both semaphores (as mutexes) and rw-semaphores. David /* rwsem-any.c: run some threads to do R/W semaphore tests * * Copyright (C) 2005 Red Hat, Inc. All Rights Reserved. * Written by David Howells ([EMAIL PROTECTED]) * * This program is free softw

Re: [patch 4/8] irq code: Add coherence test for PREEMPT_ACTIVE

2005-05-27 Thread David Howells
Blaisorblade <[EMAIL PROTECTED]> wrote: > Ok, a grep shows that possible culprits (i.e. giving success to > grep GENERIC_HARDIRQS arch/*/Kconfig, and using 0x400 as PREEMPT_ACTIVE, > as given by grep PREEMPT_ACTIVE include/asm-*/thread_info.h) are (at a first > glance): frv, sh, sh64. For F

[PATCH] Keys: Base keyring size on key pointer not key struct

2005-07-05 Thread David Howells
The attached patch makes the keyring functions calculate the new size of a keyring's payload based on the size of pointer to the key struct, not the size of the key struct itself. Signed-Off-By: David Howells <[EMAIL PROTECTED]> --- warthog>diffstat -p1 ../keys-2612mm1.diff

[PATCH] Fix printk format vs argument warning

2005-07-05 Thread David Howells
The attached patch makes the argument to this printk in calibrate_migration_costs() always long to match the format string. Signed-Off-By: David Howells <[EMAIL PROTECTED]> --- warthog>diffstat -p1 format-arg-size-2612mm1-10.diff kernel/sched.c |2 +- 1 files changed, 1 insert

[PATCH] Provide better printk() support for SMP machines

2005-07-05 Thread David Howells
caller holds the lock, thus making oops reports "atomic". Signed-Off-By: David Howells <[EMAIL PROTECTED]> --- diff -uNrp linux-2.6.12-mm1/kernel/printk.c linux-2.6.12-mm1-cachefs-wander/kernel/printk.c --- linux-2.6.12-mm1/kernel/printk.c2005-06-22 13:54:08.0 +0100

Re: [PATCH] Provide better printk() support for SMP machines

2005-07-08 Thread David Howells
Andrew Morton <[EMAIL PROTECTED]> wrote: > hm, I guess it adds a theoretical deadlock if some other CPU is in the > middle of printk and is trying to take some_lock and this CPU takes an oops > while holding some_lock. Probably that's an acceptable tradeoff though. What it perhaps needs is a max

[PATCH] Provide better printk() support for SMP machines [try #2]

2005-07-08 Thread David Howells
caller holds the lock, thus making oops reports "atomic". Signed-Off-By: David Howells <[EMAIL PROTECTED]> --- warthog>diffstat -p1 ../printk-smp-2613rc2mm1-2.diff kernel/printk.c | 15 +-- 1 files changed, 13 insertions(+), 2 deletions(-) diff -uNrp linux-2.

Re: Race condition in module load causing undefined symbols

2005-07-28 Thread David Howells
Hi Steve, Someone's finally waved this discussion in my direction. > Still puzzled about what could have been fixed in user space since this > appears to affect more than one shell. Module loading appears to be > very synchronous, so unless the shell was not waiting for exit status > on children

[PATCH] Keys: Fix key management syscall interface bugs

2005-08-04 Thread David Howells
o the destination keyring if one is supplied. The wrong macro was being used to test for an error condition: PTR_ERR() will always return true, whether or not there's an error; this should've been IS_ERR(). Signed-Off-By: David Howells <[EMAIL PROTECTED]> ---

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-18 Thread David Howells
Pavel Machek <[EMAIL PROTECTED]> wrote: > > My patch has been around for quite a while, and no-one else has > > complained, not even you before this point. Plus, you don't seem to be > > complaining about PageSwapCache... nor even PageLocked. > > PageFsMisc really *is* ugly and hard to read. Page

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-19 Thread David Howells
Pavel Machek <[EMAIL PROTECTED]> wrote: > > I disagree again. I don't think PageFsMisc() is particularly ugly or > > unreadable; and it makes it a touch more likely that someone reading code > > that uses it will notice that it's a miscellaneous flag specifically for > > filesystem use (you can't

Re: [RFC][PATCH] Rename PageChecked as PageMiscFS

2005-08-20 Thread David Howells
Daniel Phillips <[EMAIL PROTECTED]> wrote: > Biased. Fs is a mixed case acronym, nuff said. But I'm still right:-) David - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordo

Re: [PATCH][1/2] fix for -mm add-sem_is_read-write_locked.patch

2005-09-05 Thread David Howells
Rik van Riel <[EMAIL PROTECTED]> wrote: > Here is an incremental fix to the add-sem_is_read-write_locked > patch in -mm. Also attached is a full version of that file, > which can just be dropped into place - I've verified that none > of the patches in your stack get rejects. The comment attached

Re: isofs oops - d_splice_alias+0x1f (2.6.24-rc5-mm1)

2008-01-04 Thread David Howells
OFS error handling From: David Howells <[EMAIL PROTECTED]> Add some more fixes to ISOFS error handling on top of Al Viro's patch: (1) Use IS_ERR() rather than ERR_PTR() to test for errors. (2) Return the error from isofs_iget() in parse_rock_ridge_inode_internal(). (3) In iso

Re: isofs oops - d_splice_alias+0x1f (2.6.24-rc5-mm1)

2008-01-04 Thread David Howells
Al Viro <[EMAIL PROTECTED]> wrote: > My apologies, should've had coffee before posting. Me too, probably. > FWIW, this patch pile is getting ridiculous - it's what, original + 2 fixes > in -mm + mine + this one? Could you post the updated patch with all fixes > and fixes to fixes folded into it

[PATCH [combined]] Stop the ISOFS filesystem from using read_inode(). Make isofs_read_inode()

2008-01-04 Thread David Howells
return an error code, and make isofs_iget() pass it on. Furthermore isofs_iget() no longer ever returns NULL for situations where it used to, so all the places that call it must use IS_ERR() to check its return value. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/isofs/ex

Re: [PATCH [combined]] Stop the ISOFS filesystem from using read_inode(). Make isofs_read_inode()

2008-01-04 Thread David Howells
David Howells <[EMAIL PROTECTED]> wrote: > return an error code, and make isofs_iget() pass it on. Furthermore > isofs_iget() no longer ever returns NULL for situations where it used to, so > all the places that call it must use IS_ERR() to check its return value. Seems "s

Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]

2008-01-07 Thread David Howells
Nick Piggin <[EMAIL PROTECTED]> wrote: > No. I mean call the bit PG_private2. That way non-pagecache and > filesystems that don't use fscache can use it. The bit is called PG_owner_priv_2, and then 'subclassed' to PG_fscache, much like PG_owner_priv_1 is 'subclassed' to PG_checked as was recommen

Re: smpboot_64 section mismatch warning

2008-01-07 Thread David Howells
Sam Ravnborg <[EMAIL PROTECTED]> wrote: > David - will you look into this? Do you have a config? David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Pleas

Re: smpboot_64 section mismatch warning

2008-01-08 Thread David Howells
[arch/x86/kernel/smpboot_64.c] void do_fork_idle(struct work_struct *work) Needs labelling with __cpuinit. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org

[PATCH] Label x86 do_fork_idle() with __cpuinit

2008-01-08 Thread David Howells
Label x86 do_fork_idle() with __cpuinit to avoid getting linker warnings when it references fork_idle(). Also make it static. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- arch/x86/kernel/smpboot_64.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/ar

Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]

2008-01-08 Thread David Howells
Nick Piggin <[EMAIL PROTECTED]> wrote: > > Nick Piggin <[EMAIL PROTECTED]> wrote: > > > No. I mean call the bit PG_private2. That way non-pagecache and > > > filesystems that don't use fscache can use it. > > > > The bit is called PG_owner_priv_2, and then 'subclassed' to PG_fscache, > > much like

Re: [PATCH 10/28] FS-Cache: Recruit a couple of page flags for cache management [try #2]

2008-01-09 Thread David Howells
still going to require that I duplicate read_cache_pages()? Or can you accept that sharing is sufficient, especially if PG_private_2 now exists? David --- FS-Cache: Recruit a couple of page flags for cache management From: David Howells <[EMAIL PROTECTED]> Recruit a couple

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2008-01-09 Thread David Howells
Okay. I can: (1) Have cachefilesd (the daemon) pass a security context string to the cachefiles kernel module, which can then convert it to a secID. It'll require a security_secctx_to_secid() function, but I'm fairly certain I have a patch to add such kicking around somewhere.

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2008-01-09 Thread David Howells
David Howells <[EMAIL PROTECTED]> wrote: > Now, I recall the addition of another security class being mentioned, which > presumably would give something like: > > avc_has_perm(daemon_tsec->sid, nominated_sid, >SECCLASS_CACHE, CACHE__USE_AS_OVERR

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2008-01-09 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > Right, the latter is reasonable. > Requires adding the class and permission definition to > policy/flask/security_classes and policy/flask/access_vectors and then > regenerating the kernel headers from those files, ala: > svn co http://oss.tresys.com/

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2008-01-10 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > If you have a "SELinux: policy loaded with handle_unknown=allow" > message in your /var/log/messages, then new classes/perms that are not > yet known to the policy will be allowed by default, so the operation > will be permitted by the kernel. I don't

Re: How to manage shared persistent local caching (FS-Cache) with NFS?

2007-12-06 Thread David Howells
Chuck Lever <[EMAIL PROTECTED]> wrote: > Why not use the fsid as well? The NFS client already uses the fsid to detect > when it is crossing a server-side mount point. Why use the FSID at all? The file handles are supposed to be unique per server. > I also note the inclusion of server IP addres

Re: How to manage shared persistent local caching (FS-Cache) with NFS?

2007-12-07 Thread David Howells
Chuck Lever <[EMAIL PROTECTED]> wrote: > Why not encode the local mounted-on directory in the key? Can't. Namespaces. chroot. > Meaning your cache is at quota all the time, and to continue operation it must > eject items constantly. I've thought about that, thank you. Go and read the documen

Re: [PATCH 5/7] Security: Change current->fs[ug]id to current_fs[ug]id()

2007-12-07 Thread David Howells
Serge E. Hallyn <[EMAIL PROTECTED]> wrote: > Could you resend patch 6? As I said in the cover note: A tarball of the patches is available at: http://people.redhat.com/~dhowells/fscache/patches/nfs+fscache-25.tar.bz2 David -- To unsubscribe from this list: send the line "unsubscribe l

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-10 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > > + tsec->create_sid = SECINITSID_UNLABELED; > > + tsec->keycreate_sid = SECINITSID_UNLABELED; > > + tsec->sockcreate_sid = SECINITSID_UNLABELED; Cleared means what? Setting to 0? Or is there some other constant I should use for that? David -

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-10 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > Otherwise, only other issue I have with this interface is it won't > generalize to dealing with nfsd, where we want to set the acting context > to a context we obtain from or determine based upon the client. Are you speaking of security_kernel_act_as()

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-10 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > From a config file whose pathname would be provided by libselinux (ala > the way in which dbusd imports contexts), or directly as a context > returned by a libselinux function. That sounds too SELinux specific. How do I do it so that it works for any

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-10 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > That happens to me when interfaces are described in SELinux terms. I > still don't care much for multiple contexts, and I don't have a good > grasp of how you'll deal with Smack, or any LSM other than SELinux. Me neither. I understand SELinux somewhat

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-11 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > > That sounds too SELinux specific. How do I do it so that it works for any > > LSM? > > You can't. There is no LSM for userspace; LSM specifically disavowed > any common userspace API, and that was one of our original > objections/concerns about it.

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-11 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > All your code has to do is invoke a function provided by libselinux. Calling libselinux means it's a special case for a specific LSM. I think the best way to do this, then, has to be to dlopen the appropriate LSM library. That way I don't need to do

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Karl MacMillan <[EMAIL PROTECTED]> wrote: > That's what I remember as well - I suggested the transition idea and > then, after discussion, agreed that it wasn't the best approach. Sigh. Can you tell me then how to do it now? I don't know very much about using SELinux userspace stuff libraries o

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > You may need to have an application, say cachefileselinuxcontext, that will > read the current policy and spit out an appropriate value of "", > but that can be separate and LSM specific without mucking up your basic > infrastructure applications. What

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > That sounds workable, although I think he will want a more specific hook > than security_secctx_to_secid(), or possibly a second hook call, that > would not only validate the context but authorize the use of it by the > cachefilesd process. And then th

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > What sort of authorization are you thinking of? I would expect > that to have been done by cachefileselinuxcontext (or > cachefilesspiffylsmcontext) up in userspace. If you're going to > rely on userspace applications for policy enforcement they need >

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > Put the result into /etc/cachefiles.conf. Ewww. Runtime mangling of the configuration. I suppose it doesn't have to be in that file with the rest of the config. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > Yes, but we're talking about writing the configuration information > to the kernel, not actually making any access checks with it. I > think. What I think we're talking about (and please correct me David > if I've stepped into the wrong theatre) is gett

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > > This fd selects the > > particular cache context that a particular instance of a running daemon is > > using. > > Yes, but forgive me being slow, I don't see the problem. I mean that it's not particularly sensible to have an auxiliary interface (say

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > More likely, run it at build time in your .spec file to generate > cachefiles.conf, I don't think sticking it in cachefiles.conf is a good idea necessarily. That has to be an administrator modifiable file. Is there a program I could make cachefiles ru

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Casey Schaufler <[EMAIL PROTECTED]> wrote: > It would seem to me that security_secctx_to_secid() ought to suffice if the > application code was written correctly. That's not quite sufficient as there still needs to be a verification step to make sure the caller is allowed to do this. > Be aware

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-12 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > > Have you example code for the security hook you mention? I'm not sure I > > understand why security_secctx_to_secid() is not sufficient. > > security_secctx_to_secid() would just validate and map a context string to a > secid. Validate as in check

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-13 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > It is just a way of carving up the permission space, typically based on > object type, but it can essentially be arbitrary. The check in this > case seems specific to cachefiles since it is controlling an operation > on the /dev/cachefiles interface th

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-13 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > > Yes, we could easily make a simple program that just invokes a > libselinux function that in turn grabs the proper context from some > context configuration file under /etc/selinux/$SELINUXTYPE/contexts/ and > outputs it. Dan can help with that. Th

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-13 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > They would correspond with the operations provided by the /dev/cachefiles > interface, at the granularity you want to support distinctions to be made. Can this be made simpler by the fact that /dev/cachefiles has its own unique label (cachefiles_dev_t)

Re: [PATCH 08/28] SECURITY: Allow kernel services to override LSM settings for task actions [try #2]

2007-12-13 Thread David Howells
Stephen Smalley <[EMAIL PROTECTED]> wrote: > Do any of the interfaces allow a task to act on a cache other than one > it has created? No. > How does the task identify the desired cache? Each file descriptor opened creates one separate cache instance. Any commands sent over that filedescriptor

Re: [PATCH] procfs: constify function pointer tables

2008-01-22 Thread David Howells
FRV looks okay. Acked-By: David Howells <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

[PATCH 00/27] Permit filesystem local caching

2008-01-22 Thread David Howells
These patches add local caching for network filesystems such as NFS. The patches can roughly be broken down into a number of sets: (*) 01-keys-inc-payload.diff (*) 02-keys-search-keyring.diff (*) 03-keys-callout-blob.diff Three patches to the keyring code made to help the CIFS peop

[PATCH 01/27] KEYS: Increase the payload size when instantiating a key

2008-01-22 Thread David Howells
igned-off-by: David Howells <[EMAIL PROTECTED]> --- security/keys/keyctl.c | 38 ++ 1 files changed, 30 insertions(+), 8 deletions(-) diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c index d9ca15c..8ec8432 100644 --- a/security/keys/key

[PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string

2008-01-22 Thread David Howells
() request_key_async() request_key_async_with_auxdata() Signed-off-by: David Howells <[EMAIL PROTECTED]> --- Documentation/keys-request-key.txt | 11 +--- Documentation/keys.txt | 14 +++--- include/linux/key.h|9 --- security/keys/inte

[PATCH 02/27] KEYS: Check starting keyring as part of search

2008-01-22 Thread David Howells
is given and 2) check whether that top-level keyring is the thing being searched for Signed-off-by: Kevin Coffman <[EMAIL PROTECTED]> Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/keys/keyring.c | 35 +++ 1 files changed, 31 insert

[PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id()

2008-01-22 Thread David Howells
Change current->fs[ug]id to current_fs[ug]id() so that fsgid and fsuid can be separated from the task_struct. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- arch/ia64/kernel/perfmon.c|4 ++-- arch/powerpc/platforms/cell/spufs/inode.c |4 ++-- drivers/

[PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing

2008-01-22 Thread David Howells
secid_to_secctx() LSM hook. This patch also includes the SELinux implementation for this hook. Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: Stephen Smalley <[EMAIL PROTECTED]> --- include/linux/security.h | 13 + security/dummy.c |6 ++ security/security

[PATCH 04/27] KEYS: Add keyctl function to get a security label

2008-01-22 Thread David Howells
must have view permission on the key for this function to be successful. Signed-off-by: David Howells <[EMAIL PROTECTED]> Acked-by: Stephen Smalley <[EMAIL PROTECTED]> --- Documentation/keys.txt | 21 +++ include/linux/keyctl.h |1 + include/linux/security.h |

[PATCH 09/27] Security: Pre-add additional non-caching classes

2008-01-22 Thread David Howells
Pre-add additional non-caching classes that are in the SELinux upstream repository, but not in the upstream kernel so they don't get in the fscache class patch. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h |5 + secur

[PATCH 10/27] Security: Add a kernel_service object class to SELinux

2008-01-22 Thread David Howells
. The cachefilesd daemon will nominate the security ID to be used. The second vector is used to grant a process the right to nominate a file creation label for a kernel service to use. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h

[PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions

2008-01-22 Thread David Howells
cred.h b/include/linux/cred.h new file mode 100644 index 000..497af5b --- /dev/null +++ b/include/linux/cred.h @@ -0,0 +1,23 @@ +/* Credential management + * + * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. + * Written by David Howells ([EMAIL PROTECTED]) + * + * This program is free so

[PATCH 12/27] Security: Make NFSD work with detached security

2008-01-22 Thread David Howells
ropriately (see set_security_override[_from_ctx]()). NOTE! This patch must be rolled in to one of the earlier security patches to make it compile fully. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfsd/auth.c| 31 +--- fs/nfsd/nfs4

[PATCH 13/27] FS-Cache: Release page->private after failed readahead

2008-01-22 Thread David Howells
do the honours. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- mm/readahead.c | 39 +-- 1 files changed, 37 insertions(+), 2 deletions(-) diff --git a/mm/readahead.c b/mm/readahead.c index c9c50ca..75aa6b6 100644 --- a/mm/readahead.c ++

[PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management

2008-01-22 Thread David Howells
make the checks for both PG_private and PG_private_2 at the same time. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/splice.c|2 +- include/linux/page-flags.h | 39 +-- include/linux/pagemap.h| 11 +++ mm/fil

[PATCH 15/27] FS-Cache: Provide an add_wait_queue_tail() function

2008-01-22 Thread David Howells
Provide an add_wait_queue_tail() function to add a waiter to the back of a wait queue instead of the front. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- include/linux/wait.h |2 ++ kernel/wait.c| 18 ++ 2 files changed, 20 insertions(+), 0 del

[PATCH 17/27] CacheFiles: Add missing copy_page export for ia64

2008-01-22 Thread David Howells
This one-line patch fixes the missing export of copy_page introduced by the cachefile patches. This patch is not yet upstream, but is required for cachefile on ia64. It will be pushed upstream when cachefile goes upstream. Signed-off-by: Prarit Bhargava <[EMAIL PROTECTED]> Signed-off-by:

[PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3

2008-01-22 Thread David Howells
hen made use of by the generic hook in the next patch, which is used by CacheFiles to write pages to a file without setting up a file struct. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/ext3/inode.c |6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-) diff -

[PATCH 19/27] CacheFiles: Add a hook to write a single page of data to an inode

2008-01-22 Thread David Howells
. Supply a generic implementation for this that uses the write_begin() and write_end() address_space operations to bind a copy directly into the page cache. Hook the Ext2 and Ext3 operations to the generic implementation. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/ext2/inode.c

[PATCH 20/27] CacheFiles: Permit the page lock state to be monitored

2008-01-22 Thread David Howells
-off-by: David Howells <[EMAIL PROTECTED]> --- include/linux/pagemap.h |5 + mm/filemap.c| 18 ++ 2 files changed, 23 insertions(+), 0 deletions(-) diff --git a/include/linux/pagemap.h b/include/linux/pagemap.h index f9e0f81..e9f37b3 100644 --- a/i

[PATCH 21/27] CacheFiles: Export things for CacheFiles

2008-01-22 Thread David Howells
Export a number of functions for CacheFiles's use. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/super.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/fs/super.c b/fs/super.c index ceaf2e3..cd199ae 100644 --- a/fs/super.c +++ b/fs/super.c @@ -2

[PATCH 23/27] NFS: Fix memory leak

2008-01-22 Thread David Howells
Fix a memory leak whereby multiple clientaddr=xxx mount options just overwrite the duplicated client_address option pointer, without freeing the old memory. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/super.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-)

[PATCH 24/27] NFS: Use local caching

2008-01-22 Thread David Howells
NFS filesystem to use caching, add an "fsc" option to the mount: mount warthog:/ /a -o fsc Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/Makefile |1 fs/nfs/client.c |5 + fs/nfs/file.c | 37 fs/nfs/fscache-d

[PATCH 25/27] NFS: Configuration and mount option changes to enable local caching on NFS

2008-01-22 Thread David Howells
Changes to the kernel configuration defintions and to the NFS mount options to allow the local caching support added by the previous patch to be enabled. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/Kconfig|8 fs/nfs/client.c |2 ++ fs/nfs/internal.h

[PATCH 27/27] NFS: Separate caching by superblock, explicitly if necessary

2008-01-22 Thread David Howells
specify a uniquifier. (*) Adding "nofsc" will disable caching. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/fscache-def.c | 33 fs/nfs/fscache.c | 122 - fs/nfs/fscache.h | 46 ++

[PATCH 26/27] NFS: Display local caching state

2008-01-22 Thread David Howells
Display the local caching state in /proc/fs/nfsfs/volumes. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfs/client.c |7 --- fs/nfs/fscache.h | 15 +++ 2 files changed, 19 insertions(+), 3 deletions(-) diff --git a/fs/nfs/client.c b/fs/nfs/client.c

[PATCH 02/27] KEYS: Check starting keyring as part of search [try #2]

2008-01-23 Thread David Howells
is given and 2) check whether that top-level keyring is the thing being searched for Signed-off-by: Kevin Coffman <[EMAIL PROTECTED]> Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/keys/keyring.c | 35 +++ 1 files changed, 31 insert

[PATCH 00/27] Permit filesystem local caching [try #2]

2008-01-23 Thread David Howells
These patches add local caching for network filesystems such as NFS. The patches can roughly be broken down into a number of sets: (*) 01-keys-inc-payload.diff (*) 02-keys-search-keyring.diff (*) 03-keys-callout-blob.diff Three patches to the keyring code made to help the CIFS peop

[PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string [try #2]

2008-01-23 Thread David Howells
() request_key_async() request_key_async_with_auxdata() Signed-off-by: David Howells <[EMAIL PROTECTED]> --- Documentation/keys-request-key.txt | 11 +--- Documentation/keys.txt | 14 +++--- include/linux/key.h|9 --- security/keys/inte

[PATCH 01/27] KEYS: Increase the payload size when instantiating a key [try #2]

2008-01-23 Thread David Howells
igned-off-by: David Howells <[EMAIL PROTECTED]> --- security/keys/keyctl.c | 38 ++ 1 files changed, 30 insertions(+), 8 deletions(-) diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c index d9ca15c..8ec8432 100644 --- a/security/keys/key

Re: [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management

2008-01-23 Thread David Howells
David Howells <[EMAIL PROTECTED]> wrote: > (2) PG_fscache_write (PG_owner_priv_2) > > The marked page is being written to the local cache. The page may not be > modified whilst this is in progress. Oops. wait_on_page_owner_priv_2() should use PG_owner_

[PATCH 04/27] KEYS: Add keyctl function to get a security label [try #2]

2008-01-23 Thread David Howells
must have view permission on the key for this function to be successful. Signed-off-by: David Howells <[EMAIL PROTECTED]> Acked-by: Stephen Smalley <[EMAIL PROTECTED]> --- Documentation/keys.txt | 21 +++ include/linux/keyctl.h |1 + include/linux/security.h |

[PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id() [try #2]

2008-01-23 Thread David Howells
Change current->fs[ug]id to current_fs[ug]id() so that fsgid and fsuid can be separated from the task_struct. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- arch/ia64/kernel/perfmon.c|4 ++-- arch/powerpc/platforms/cell/spufs/inode.c |4 ++-- drivers/

[PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing [try #2]

2008-01-23 Thread David Howells
secid_to_secctx() LSM hook. This patch also includes the SELinux implementation for this hook. Signed-off-by: Paul Moore <[EMAIL PROTECTED]> Acked-by: Stephen Smalley <[EMAIL PROTECTED]> --- include/linux/security.h | 13 + security/dummy.c |6 ++ security/security

[PATCH 09/27] Security: Pre-add additional non-caching classes [try #2]

2008-01-23 Thread David Howells
Pre-add additional non-caching classes that are in the SELinux upstream repository, but not in the upstream kernel so they don't get in the fscache class patch. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h |5 + secur

[PATCH 10/27] Security: Add a kernel_service object class to SELinux [try #2]

2008-01-23 Thread David Howells
. The cachefilesd daemon will nominate the security ID to be used. The second vector is used to grant a process the right to nominate a file creation label for a kernel service to use. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h

[PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions [try #2]

2008-01-23 Thread David Howells
cred.h b/include/linux/cred.h new file mode 100644 index 000..497af5b --- /dev/null +++ b/include/linux/cred.h @@ -0,0 +1,23 @@ +/* Credential management + * + * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. + * Written by David Howells ([EMAIL PROTECTED]) + * + * This program is free so

[PATCH 12/27] Security: Make NFSD work with detached security [try #2]

2008-01-23 Thread David Howells
ropriately (see set_security_override[_from_ctx]()). NOTE! This patch must be rolled in to one of the earlier security patches to make it compile fully. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/nfsd/auth.c| 31 +--- fs/nfsd/nfs4

[PATCH 13/27] FS-Cache: Release page->private after failed readahead [try #2]

2008-01-23 Thread David Howells
do the honours. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- mm/readahead.c | 39 +-- 1 files changed, 37 insertions(+), 2 deletions(-) diff --git a/mm/readahead.c b/mm/readahead.c index c9c50ca..75aa6b6 100644 --- a/mm/readahead.c ++

[PATCH 17/27] CacheFiles: Add missing copy_page export for ia64 [try #2]

2008-01-23 Thread David Howells
This one-line patch fixes the missing export of copy_page introduced by the cachefile patches. This patch is not yet upstream, but is required for cachefile on ia64. It will be pushed upstream when cachefile goes upstream. Signed-off-by: Prarit Bhargava <[EMAIL PROTECTED]> Signed-off-by:

[PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 [try #2]

2008-01-23 Thread David Howells
hen made use of by the generic hook in the next patch, which is used by CacheFiles to write pages to a file without setting up a file struct. Signed-off-by: David Howells <[EMAIL PROTECTED]> --- fs/ext3/inode.c |6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-) diff -

<    5   6   7   8   9   10   11   12   13   14   >