<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/fs/pnode.h, branch v3.0.36</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/fs/pnode.h?h=v3.0.36</id>
<link rel='self' href='https://git.amat.us/linux/atom/fs/pnode.h?h=v3.0.36'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2010-03-03T19:07:55Z</updated>
<entry>
<title>VFS: Clean up shared mount flag propagation</title>
<updated>2010-03-03T19:07:55Z</updated>
<author>
<name>Valerie Aurora</name>
<email>vaurora@redhat.com</email>
</author>
<published>2010-01-26T19:20:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=495d6c9c6595ec7b37910dfd42634839431d21fd'/>
<id>urn:sha1:495d6c9c6595ec7b37910dfd42634839431d21fd</id>
<content type='text'>
The handling of mount flags in set_mnt_shared() got a little tangled
up during previous cleanups, with the following problems:

* MNT_PNODE_MASK is defined as a literal constant when it should be a
bitwise xor of other MNT_* flags
* set_mnt_shared() clears and then sets MNT_SHARED (part of MNT_PNODE_MASK)
* MNT_PNODE_MASK could use a comment in mount.h
* MNT_PNODE_MASK is a terrible name, change to MNT_SHARED_MASK

This patch fixes these problems.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>Kill CL_PROPAGATION, sanitize fs/pnode.c:get_source()</title>
<updated>2010-03-03T18:00:22Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2010-01-16T18:28:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=796a6b521d0eadb338adf8cf7e482351c3a8a7b4'/>
<id>urn:sha1:796a6b521d0eadb338adf8cf7e482351c3a8a7b4</id>
<content type='text'>
First of all, get_source() never results in CL_PROPAGATION
alone.  We either get CL_MAKE_SHARED (for the continuation
of peer group) or CL_SLAVE (slave that is not shared) or both
(beginning of peer group among slaves).  Massage the code to
make that explicit, kill CL_PROPAGATION test in clone_mnt()
(nothing sets CL_MAKE_SHARED without CL_PROPAGATION and in
clone_mnt() we are checking CL_PROPAGATION after we'd found
that there's no CL_SLAVE, so the check for CL_MAKE_SHARED
would do just as well).

Fix comments, while we are at it...

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[patch 7/7] vfs: mountinfo: show dominating group id</title>
<updated>2008-04-23T04:05:09Z</updated>
<author>
<name>Miklos Szeredi</name>
<email>mszeredi@suse.cz</email>
</author>
<published>2008-03-27T12:06:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=97e7e0f71d6d948c25f11f0a33878d9356d9579e'/>
<id>urn:sha1:97e7e0f71d6d948c25f11f0a33878d9356d9579e</id>
<content type='text'>
Show peer group ID of nearest dominating group that has intersection
with the mount's namespace.

Signed-off-by: Miklos Szeredi &lt;mszeredi@suse.cz&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] teach seq_file to discard entries</title>
<updated>2008-04-22T03:14:02Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2008-03-28T04:46:41Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=521b5d0c40386f4a9805cdec7bd979fc96a86aeb'/>
<id>urn:sha1:521b5d0c40386f4a9805cdec7bd979fc96a86aeb</id>
<content type='text'>
Allow -&gt;show() return SEQ_SKIP; that will discard all
output from that element and move on.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] new helpers - collect_mounts() and release_collected_mounts()</title>
<updated>2007-10-21T06:37:25Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2007-06-07T16:20:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8aec08094570562bc305df33b088926d983c3540'/>
<id>urn:sha1:8aec08094570562bc305df33b088926d983c3540</id>
<content type='text'>
Get a snapshot of a subtree, creating private clones of vfsmounts
for all its components and release such snapshot resp.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] rename struct namespace to struct mnt_namespace</title>
<updated>2006-12-08T16:28:51Z</updated>
<author>
<name>Kirill Korotaev</name>
<email>dev@sw.ru</email>
</author>
<published>2006-12-08T10:37:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6b3286ed1169d74fea401367d6d4d6c6ec758a81'/>
<id>urn:sha1:6b3286ed1169d74fea401367d6d4d6c6ec758a81</id>
<content type='text'>
Rename 'struct namespace' to 'struct mnt_namespace' to avoid confusion with
other namespaces being developped for the containers : pid, uts, ipc, etc.
'namespace' variables and attributes are also renamed to 'mnt_ns'

Signed-off-by: Kirill Korotaev &lt;dev@sw.ru&gt;
Signed-off-by: Cedric Le Goater &lt;clg@fr.ibm.com&gt;
Cc: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
Cc: Herbert Poetzl &lt;herbert@13thfloor.at&gt;
Cc: Sukadev Bhattiprolu &lt;sukadev@us.ibm.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] unbindable mounts</title>
<updated>2005-11-08T02:18:11Z</updated>
<author>
<name>Ram Pai</name>
<email>linuxram@us.ibm.com</email>
</author>
<published>2005-11-07T22:21:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9676f0c6389b62bd6b24d77d4b3abdbcfa32d0f2'/>
<id>urn:sha1:9676f0c6389b62bd6b24d77d4b3abdbcfa32d0f2</id>
<content type='text'>
An unbindable mount does not forward or receive propagation.  Also
unbindable mount disallows bind mounts.  The semantics is as follows.

Bind semantics:
  It is invalid to bind mount an unbindable mount.

Move semantics:
  It is invalid to move an unbindable mount under shared mount.

Clone-namespace semantics:
  If a mount is unbindable in the parent namespace, the corresponding
  cloned mount in the child namespace becomes unbindable too.  Note:
  there is subtle difference, unbindable mounts cannot be bind mounted
  but can be cloned during clone-namespace.

Signed-off-by: Ram Pai &lt;linuxram@us.ibm.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] introduce slave mounts</title>
<updated>2005-11-08T02:18:11Z</updated>
<author>
<name>Ram Pai</name>
<email>linuxram@us.ibm.com</email>
</author>
<published>2005-11-07T22:20:48Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a58b0eb8e64b78d9315a5491955e78b1391d42e5'/>
<id>urn:sha1:a58b0eb8e64b78d9315a5491955e78b1391d42e5</id>
<content type='text'>
A slave mount always has a master mount from which it receives
mount/umount events.  Unlike shared mount the event propagation does not
flow from the slave mount to the master.

Signed-off-by: Ram Pai &lt;linuxram@us.ibm.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] shared mounts handling: umount</title>
<updated>2005-11-08T02:18:11Z</updated>
<author>
<name>Ram Pai</name>
<email>linuxram@us.ibm.com</email>
</author>
<published>2005-11-07T22:20:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a05964f3917c7c55368c229d7985f8e7c9977e97'/>
<id>urn:sha1:a05964f3917c7c55368c229d7985f8e7c9977e97</id>
<content type='text'>
An unmount of a mount creates a umount event on the parent.  If the
parent is a shared mount, it gets propagated to all mounts in the peer
group.

Signed-off-by: Ram Pai &lt;linuxram@us.ibm.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] shared mount handling: bind and rbind</title>
<updated>2005-11-08T02:18:11Z</updated>
<author>
<name>Ram Pai</name>
<email>linuxram@us.ibm.com</email>
</author>
<published>2005-11-07T22:19:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b90fa9ae8f51f098ee480bbaabd6867992e9fc58'/>
<id>urn:sha1:b90fa9ae8f51f098ee480bbaabd6867992e9fc58</id>
<content type='text'>
Implement handling of MS_BIND in presense of shared mounts (see
Documentation/sharedsubtree.txt in the end of patch series for detailed
description).

Signed-off-by: Ram Pai &lt;linuxram@us.ibm.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
</feed>
