1. 15 9月, 2017 1 次提交
  2. 27 4月, 2017 1 次提交
  3. 16 4月, 2017 1 次提交
    • M
      orangefs: free superblock when mount fails · 1ec1688c
      Martin Brandenburg 提交于
      Otherwise lockdep says:
      
      [ 1337.483798] ================================================
      [ 1337.483999] [ BUG: lock held when returning to user space! ]
      [ 1337.484252] 4.11.0-rc6 #19 Not tainted
      [ 1337.484423] ------------------------------------------------
      [ 1337.484626] mount/14766 is leaving the kernel with locks still held!
      [ 1337.484841] 1 lock held by mount/14766:
      [ 1337.485017]  #0:  (&type->s_umount_key#33/1){+.+.+.}, at: [<ffffffff8124171f>] sget_userns+0x2af/0x520
      
      Caught by xfstests generic/413 which tried to mount with the unsupported
      mount option dax.  Then xfstests generic/422 ran sync which deadlocks.
      Signed-off-by: NMartin Brandenburg <martin@omnibond.com>
      Acked-by: NMike Marshall <hubcap@omnibond.com>
      Cc: stable@vger.kernel.org
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      1ec1688c
  4. 10 2月, 2017 1 次提交
    • M
      orangefs: Dan Carpenter influenced cleanups... · 05973c2e
      Mike Marshall 提交于
      This patch is simlar to one Dan Carpenter sent me, cleans
      up some return codes and whitespace errors. There was one
      place where he thought inserting an error message into
      the ring buffer might be too chatty, I hope I convinced him
      othewise. As a consolation <g> I changed a truly chatty
      error message in another location into a debug message,
      system-admins had already yelled at me about that one...
      Signed-off-by: NMike Marshall <hubcap@omnibond.com>
      05973c2e
  5. 06 12月, 2016 1 次提交
    • A
      [iov_iter] new primitives - copy_from_iter_full() and friends · cbbd26b8
      Al Viro 提交于
      copy_from_iter_full(), copy_from_iter_full_nocache() and
      csum_and_copy_from_iter_full() - counterparts of copy_from_iter()
      et.al., advancing iterator only in case of successful full copy
      and returning whether it had been successful or not.
      
      Convert some obvious users.  *NOTE* - do not blindly assume that
      something is a good candidate for those unless you are sure that
      not advancing iov_iter in failure case is the right thing in
      this case.  Anything that does short read/short write kind of
      stuff (or is in a loop, etc.) is unlikely to be a good one.
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      cbbd26b8
  6. 16 8月, 2016 2 次提交
  7. 15 8月, 2016 1 次提交
  8. 13 8月, 2016 1 次提交
    • M
      orangefs: add features op · 482664dd
      Martin Brandenburg 提交于
      This is a new userspace operation, which will be done if the client-core
      version is greater than or equal to 2.9.6. This will provide a way to
      implement optional features and to determine which features are
      supported by the client-core. If the client-core version is older than
      2.9.6, no optional features are supported and the op will not be done.
      
      The intent is to allow protocol extensions without relying on the
      client-core's current behavior of ignoring what it doesn't understand.
      Signed-off-by: NMartin Brandenburg <martin@omnibond.com>
      482664dd
  9. 10 8月, 2016 1 次提交
  10. 06 7月, 2016 1 次提交
    • J
      orangefs: fix namespace handling · 78fee0b6
      Jann Horn 提交于
      In orangefs_inode_getxattr(), an fsuid is written to dmesg. The kuid is
      converted to a userspace uid via from_kuid(current_user_ns(), [...]), but
      since dmesg is global, init_user_ns should be used here instead.
      
      In copy_attributes_from_inode(), op_alloc() and fill_default_sys_attrs(),
      upcall structures are populated with uids/gids that have been mapped into
      the caller's namespace. However, those upcall structures are read by
      another process (the userspace filesystem driver), and that process might
      be running in another namespace. This effectively lets any user spoof its
      uid and gid as seen by the userspace filesystem driver.
      
      To fix the second issue, I just construct the opcall structures with
      init_user_ns uids/gids and require the filesystem server to run in the
      init namespace. Since orangefs is full of global state anyway (as the error
      message in DUMP_DEVICE_ERROR explains, there can only be one userspace
      orangefs filesystem driver at once), that shouldn't be a problem.
      
      [
      Why does orangefs even exist in the kernel if everything does upcalls into
      userspace? What does orangefs do that couldn't be done with the FUSE
      interface? If there is no good answer to those questions, I'd prefer to see
      orangefs kicked out of the kernel. Can that be done for something that
      shipped in a release?
      
      According to commit f7ab093f ("Orangefs: kernel client part 1"), they
      even already have a FUSE daemon, and the only rational reason (apart from
      "but most of our users report preferring to use our kernel module instead")
      given for not wanting to use FUSE is one "in-the-works" feature that could
      probably be integated into FUSE instead.
      ]
      
      This patch has been compile-tested.
      Signed-off-by: NJann Horn <jannh@google.com>
      Signed-off-by: NMike Marshall <hubcap@omnibond.com>
      78fee0b6
  11. 26 3月, 2016 1 次提交
    • A
      orangefs: fix orangefs_superblock locking · 45996492
      Al Viro 提交于
      * switch orangefs_remount() to taking ORANGEFS_SB(sb) instead of sb
      * remove from the list _before_ orangefs_unmount() - request_mutex
      in the latter will make sure that nothing observed in the loop in
      ORANGEFS_DEV_REMOUNT_ALL handling will get freed until the end
      of loop
      * on removal, keep the forward pointer and zero the back one.  That
      way we can drop and regain the spinlock in the loop body (again,
      ORANGEFS_DEV_REMOUNT_ALL one) and still be able to get to the
      rest of the list.
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      Signed-off-by: NMike Marshall <hubcap@omnibond.com>
      45996492
  12. 15 3月, 2016 1 次提交
  13. 10 3月, 2016 1 次提交
  14. 04 3月, 2016 1 次提交
  15. 27 2月, 2016 1 次提交
  16. 26 2月, 2016 1 次提交
  17. 25 2月, 2016 1 次提交
  18. 20 2月, 2016 5 次提交
  19. 05 2月, 2016 1 次提交
  20. 24 1月, 2016 10 次提交
  21. 20 1月, 2016 1 次提交
  22. 14 1月, 2016 1 次提交
    • M
      Orangefs: implement .write_iter · b3ae4755
      Mike Marshall 提交于
      Until now, orangefs_devreq_write_iter has just been a wrapper for
      the old-fashioned orangefs_devreq_writev... linux would call
      .write_iter with "struct kiocb *iocb" and "struct iov_iter *iter"
      and .write_iter would just:
      
              return pvfs2_devreq_writev(iocb->ki_filp,
                                         iter->iov,
                                         iter->nr_segs,
                                         &iocb->ki_pos);
      Signed-off-by: NMike Marshall <hubcap@omnibond.com>
      b3ae4755
  23. 05 1月, 2016 1 次提交
  24. 18 12月, 2015 1 次提交
  25. 16 12月, 2015 1 次提交
  26. 15 12月, 2015 1 次提交