* [RFC PATCH 0/3] Shared state for all !
@ 2012-05-10 0:22 Joshua Lock
2012-05-10 0:22 ` [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() Joshua Lock
` (4 more replies)
0 siblings, 5 replies; 20+ messages in thread
From: Joshua Lock @ 2012-05-10 0:22 UTC (permalink / raw)
To: openembedded-core
This is an RFC series, and for ease of review sent as against the Poky tree so
that it can be reviewed as a whole.
In Yocto #2041[2] Mark reported an issue with reusing shared state as a
different user on the same machine.
Since the whole purpose of shared state is that it be shared I decided to dig
into this issue. I wanted to at least be able to use the shared-state cache of
a different user without error, even if all of the objects aren't actually used
(i.e. native, at least on the Edison branch I did most of the testing with).
This is an RFC mainly because it changes the permissions of created directories,
sstate files and siginfo files from what they have traditionally been.
There is more of the rhyme an reason in the patch commit headers and comments
but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this patch, as
will all of the contents of sstate-cache (siginfo and tgz) files.
This is actually what one would expect from reading the Python API docs for
os.makedirs "The default mode is 0777 (octal)."[1] but not what actually happens
on most modern Linux systems thanks to umask.
Please review the following changes for suitability for inclusion. If you have
any objections or suggestions for improvement, please respond to the patches. If
you agree with the changes, please provide your Acked-by.
Regards,
Joshua
1. http://docs.python.org/library/os.html#os.makedirs
2. https://bugzilla.yoctoproject.org/show_bug.cgi?id=2041
The following changes since commit 6841abd17268a1c1ca5e3634f0ae9e21426ca9c9:
Hob: change the workflow about click 'Run Image' to run directly after builded a qemu image (2012-05-09 21:56:47 +0100)
are available in the git repository at:
git://git.yoctoproject.org/poky-contrib josh/perms
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=josh/perms
just the BitBake changes are at:
git://github.com/incandescant/bitbake.git josh/perms
https://github.com/incandescant/bitbake/commits/josh/perms
just the openembedded-core changes are at:
git://git.openembedded.org/openembedded-core-contrib josh/perms
http://git.openembedded.org/openembedded-core-contrib/log/?h=josh/perms
Joshua Lock (3):
lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier()
lib/bb/siggen.py: create permissive files and directories
sstate.bbclass: ensure sstate files are easily shared
bitbake/lib/bb/siggen.py | 7 ++++++-
bitbake/lib/bb/utils.py | 7 +++++--
meta/classes/sstate.bbclass | 1 +
3 files changed, 12 insertions(+), 3 deletions(-)
--
1.7.7.6
^ permalink raw reply [flat|nested] 20+ messages in thread* [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock @ 2012-05-10 0:22 ` Joshua Lock 2012-05-10 11:19 ` Richard Purdie 2012-05-10 0:22 ` [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories Joshua Lock ` (3 subsequent siblings) 4 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 0:22 UTC (permalink / raw) To: openembedded-core The optional parameter should be an octal file mode representing the desired permissions of the created directory. If mode isn;t specified use 0777. This is the default of os.makedirs() yet is not often what the created directory ends up with due to umask affecting the call. The use of chmod() in this patch ensures that whatever octal is passed are the permissions the directory will have after creation. This is a behaviour change... Signed-off-by: Joshua Lock <josh@linux.intel.com> --- bitbake/lib/bb/utils.py | 7 +++++-- 1 files changed, 5 insertions(+), 2 deletions(-) diff --git a/bitbake/lib/bb/utils.py b/bitbake/lib/bb/utils.py index 7a73419..33206fe 100644 --- a/bitbake/lib/bb/utils.py +++ b/bitbake/lib/bb/utils.py @@ -531,13 +531,16 @@ def prune_suffix(var, suffixes, d): return var.replace(suffix, "") return var -def mkdirhier(directory): +def mkdirhier(directory, mode=0777): """Create a directory like 'mkdir -p', but does not complain if directory already exists like os.makedirs """ try: - os.makedirs(directory) + os.makedirs(directory, mode) + # We can't rely on makedirs having set the mode correctly as it is + # affected by umask + os.chmod(directory, mode) except OSError as e: if e.errno != errno.EEXIST: raise e -- 1.7.7.6 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() 2012-05-10 0:22 ` [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() Joshua Lock @ 2012-05-10 11:19 ` Richard Purdie 0 siblings, 0 replies; 20+ messages in thread From: Richard Purdie @ 2012-05-10 11:19 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On Wed, 2012-05-09 at 17:22 -0700, Joshua Lock wrote: > The optional parameter should be an octal file mode representing the > desired permissions of the created directory. If mode isn;t specified > use 0777. This is the default of os.makedirs() yet is not often what > the created directory ends up with due to umask affecting the call. > > The use of chmod() in this patch ensures that whatever octal is > passed are the permissions the directory will have after creation. > This is a behaviour change... > > Signed-off-by: Joshua Lock <josh@linux.intel.com> > --- > bitbake/lib/bb/utils.py | 7 +++++-- > 1 files changed, 5 insertions(+), 2 deletions(-) > > diff --git a/bitbake/lib/bb/utils.py b/bitbake/lib/bb/utils.py > index 7a73419..33206fe 100644 > --- a/bitbake/lib/bb/utils.py > +++ b/bitbake/lib/bb/utils.py > @@ -531,13 +531,16 @@ def prune_suffix(var, suffixes, d): > return var.replace(suffix, "") > return var > > -def mkdirhier(directory): > +def mkdirhier(directory, mode=0777): > """Create a directory like 'mkdir -p', but does not complain if > directory already exists like os.makedirs > """ > > try: > - os.makedirs(directory) > + os.makedirs(directory, mode) > + # We can't rely on makedirs having set the mode correctly as it is > + # affected by umask > + os.chmod(directory, mode) > except OSError as e: > if e.errno != errno.EEXIST: > raise e I'm afraid there are a few holes here. mkdirhier can create parents and your chmod doesn't change these. I also agree with the comments, I think this needs to remain unchanged behaviour wise, respecting the umask and only set a mode if its specified. Cheers, Richard ^ permalink raw reply [flat|nested] 20+ messages in thread
* [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock 2012-05-10 0:22 ` [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() Joshua Lock @ 2012-05-10 0:22 ` Joshua Lock 2012-05-10 11:22 ` Richard Purdie 2012-05-10 0:22 ` [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared Joshua Lock ` (2 subsequent siblings) 4 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 0:22 UTC (permalink / raw) To: openembedded-core Create signature files, and the directories which contain them, with rwx for everyone so that they are easily shared with different users of the same machine. Signed-off-by: Joshua Lock <josh@linux.intel.com> --- bitbake/lib/bb/siggen.py | 7 ++++++- 1 files changed, 6 insertions(+), 1 deletions(-) diff --git a/bitbake/lib/bb/siggen.py b/bitbake/lib/bb/siggen.py index 8c79b17..bd6d59b 100644 --- a/bitbake/lib/bb/siggen.py +++ b/bitbake/lib/bb/siggen.py @@ -201,7 +201,12 @@ class SignatureGeneratorBasic(SignatureGenerator): for dep in data['runtaskdeps']: data['runtaskhashes'][dep] = self.taskhash[dep] - p = pickle.Pickler(file(sigfile, "wb"), -1) + # Create file with permissive (0777) read/write for easier sharing + f = os.fdopen(os.open(sigfile, os.O_RDWR|os.O_CREAT), "wb") + # os.open() and os.fdopen() are affected by the users umask so brute force + # the permissions with a call to chmod + os.chmod(sigfile, 0777) + p = pickle.Pickler(f, -1) p.dump(data) def dump_sigs(self, dataCache): -- 1.7.7.6 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories 2012-05-10 0:22 ` [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories Joshua Lock @ 2012-05-10 11:22 ` Richard Purdie 2012-05-10 16:10 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Richard Purdie @ 2012-05-10 11:22 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On Wed, 2012-05-09 at 17:22 -0700, Joshua Lock wrote: > Create signature files, and the directories which contain them, with > rwx for everyone so that they are easily shared with different users > of the same machine. > > Signed-off-by: Joshua Lock <josh@linux.intel.com> > --- > bitbake/lib/bb/siggen.py | 7 ++++++- > 1 files changed, 6 insertions(+), 1 deletions(-) > > diff --git a/bitbake/lib/bb/siggen.py b/bitbake/lib/bb/siggen.py > index 8c79b17..bd6d59b 100644 > --- a/bitbake/lib/bb/siggen.py > +++ b/bitbake/lib/bb/siggen.py > @@ -201,7 +201,12 @@ class SignatureGeneratorBasic(SignatureGenerator): > for dep in data['runtaskdeps']: > data['runtaskhashes'][dep] = self.taskhash[dep] > > - p = pickle.Pickler(file(sigfile, "wb"), -1) > + # Create file with permissive (0777) read/write for easier sharing > + f = os.fdopen(os.open(sigfile, os.O_RDWR|os.O_CREAT), "wb") > + # os.open() and os.fdopen() are affected by the users umask so brute force > + # the permissions with a call to chmod > + os.chmod(sigfile, 0777) > + p = pickle.Pickler(f, -1) > p.dump(data) Why not just run the chmod after the original pickle code? Its not as if you avoid a race this way :/. Cheers, Richard ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories 2012-05-10 11:22 ` Richard Purdie @ 2012-05-10 16:10 ` Joshua Lock 0 siblings, 0 replies; 20+ messages in thread From: Joshua Lock @ 2012-05-10 16:10 UTC (permalink / raw) To: openembedded-core On 10/05/12 04:22, Richard Purdie wrote: > On Wed, 2012-05-09 at 17:22 -0700, Joshua Lock wrote: >> Create signature files, and the directories which contain them, with >> rwx for everyone so that they are easily shared with different users >> of the same machine. >> >> Signed-off-by: Joshua Lock<josh@linux.intel.com> >> --- >> bitbake/lib/bb/siggen.py | 7 ++++++- >> 1 files changed, 6 insertions(+), 1 deletions(-) >> >> diff --git a/bitbake/lib/bb/siggen.py b/bitbake/lib/bb/siggen.py >> index 8c79b17..bd6d59b 100644 >> --- a/bitbake/lib/bb/siggen.py >> +++ b/bitbake/lib/bb/siggen.py >> @@ -201,7 +201,12 @@ class SignatureGeneratorBasic(SignatureGenerator): >> for dep in data['runtaskdeps']: >> data['runtaskhashes'][dep] = self.taskhash[dep] >> >> - p = pickle.Pickler(file(sigfile, "wb"), -1) >> + # Create file with permissive (0777) read/write for easier sharing >> + f = os.fdopen(os.open(sigfile, os.O_RDWR|os.O_CREAT), "wb") >> + # os.open() and os.fdopen() are affected by the users umask so brute force >> + # the permissions with a call to chmod >> + os.chmod(sigfile, 0777) >> + p = pickle.Pickler(f, -1) >> p.dump(data) > > Why not just run the chmod after the original pickle code? Its not as if > you avoid a race this way :/. Sure, that'd work as well. Though from the general feedback it feels like this series is moot and all that we really want is a sanity check. Cheers, Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock 2012-05-10 0:22 ` [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() Joshua Lock 2012-05-10 0:22 ` [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories Joshua Lock @ 2012-05-10 0:22 ` Joshua Lock 2012-05-10 0:27 ` Saul Wold 2012-05-10 0:50 ` [RFC PATCH 0/3] Shared state for all ! Chris Larson 2012-05-10 7:25 ` Koen Kooi 4 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 0:22 UTC (permalink / raw) To: openembedded-core In order to make sstate cache's more easily shared ensure any user of the system has rwx permission by calling chown on sstate files after they're created. Signed-off-by: Joshua Lock <josh@linux.intel.com> --- meta/classes/sstate.bbclass | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass index a8c98e5..6707ecf 100644 --- a/meta/classes/sstate.bbclass +++ b/meta/classes/sstate.bbclass @@ -454,6 +454,7 @@ sstate_create_package () { else tar -cz --file=$TFILE --files-from=/dev/null fi + chmod 0777 $TFILE mv $TFILE ${SSTATE_PKG} cd ${WORKDIR} -- 1.7.7.6 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared 2012-05-10 0:22 ` [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared Joshua Lock @ 2012-05-10 0:27 ` Saul Wold 2012-05-10 1:01 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Saul Wold @ 2012-05-10 0:27 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On 05/09/2012 05:22 PM, Joshua Lock wrote: > In order to make sstate cache's more easily shared ensure any user of > the system has rwx permission by calling chown on sstate files after > they're created. > > Signed-off-by: Joshua Lock<josh@linux.intel.com> > --- > meta/classes/sstate.bbclass | 1 + > 1 files changed, 1 insertions(+), 0 deletions(-) > > diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass > index a8c98e5..6707ecf 100644 > --- a/meta/classes/sstate.bbclass > +++ b/meta/classes/sstate.bbclass > @@ -454,6 +454,7 @@ sstate_create_package () { > else > tar -cz --file=$TFILE --files-from=/dev/null > fi > + chmod 0777 $TFILE > mv $TFILE ${SSTATE_PKG} > > cd ${WORKDIR} Why execute permission, and should it not be restricted to 664 for group level write access? Why would multiple users be writing to the same sstate file anyways once it's there it could be read-only since a change will trigger a new sstate file, not a re-write of the existing one. Sau! ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared 2012-05-10 0:27 ` Saul Wold @ 2012-05-10 1:01 ` Joshua Lock 0 siblings, 0 replies; 20+ messages in thread From: Joshua Lock @ 2012-05-10 1:01 UTC (permalink / raw) To: Saul Wold; +Cc: Patches and discussions about the oe-core layer On 09/05/12 17:27, Saul Wold wrote: > On 05/09/2012 05:22 PM, Joshua Lock wrote: >> In order to make sstate cache's more easily shared ensure any user of >> the system has rwx permission by calling chown on sstate files after >> they're created. >> >> Signed-off-by: Joshua Lock<josh@linux.intel.com> >> --- >> meta/classes/sstate.bbclass | 1 + >> 1 files changed, 1 insertions(+), 0 deletions(-) >> >> diff --git a/meta/classes/sstate.bbclass b/meta/classes/sstate.bbclass >> index a8c98e5..6707ecf 100644 >> --- a/meta/classes/sstate.bbclass >> +++ b/meta/classes/sstate.bbclass >> @@ -454,6 +454,7 @@ sstate_create_package () { >> else >> tar -cz --file=$TFILE --files-from=/dev/null >> fi >> + chmod 0777 $TFILE >> mv $TFILE ${SSTATE_PKG} >> >> cd ${WORKDIR} > Why execute permission, and should it not be restricted to 664 for group > level write access? Why would multiple users be writing to the same > sstate file anyways once it's there it could be read-only since a change > will trigger a new sstate file, not a re-write of the existing one. For permissions I figured that whichever I went with someone would have an alternative suggestion so I went with as indiscriminate as possible - that's the main reason this is an RFC. When I was reproducing the bug and had read-only siginfo file things blew up, so I created them writeable, see [1]. Cheers, Joshua 1. https://bugzilla.yoctoproject.org/show_bug.cgi?id=2041#c9 -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock ` (2 preceding siblings ...) 2012-05-10 0:22 ` [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared Joshua Lock @ 2012-05-10 0:50 ` Chris Larson 2012-05-10 1:05 ` Joshua Lock 2012-05-10 7:25 ` Koen Kooi 4 siblings, 1 reply; 20+ messages in thread From: Chris Larson @ 2012-05-10 0:50 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On Wed, May 9, 2012 at 5:22 PM, Joshua Lock <josh@linux.intel.com> wrote: > In Yocto #2041[2] Mark reported an issue with reusing shared state as a > different user on the same machine. > > Since the whole purpose of shared state is that it be shared I decided to dig > into this issue. I wanted to at least be able to use the shared-state cache of > a different user without error, even if all of the objects aren't actually used > (i.e. native, at least on the Edison branch I did most of the testing with). > > This is an RFC mainly because it changes the permissions of created directories, > sstate files and siginfo files from what they have traditionally been. > > There is more of the rhyme an reason in the patch commit headers and comments > but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this patch, as > will all of the contents of sstate-cache (siginfo and tgz) files. > > This is actually what one would expect from reading the Python API docs for > os.makedirs "The default mode is 0777 (octal)."[1] but not what actually happens > on most modern Linux systems thanks to umask. > > Please review the following changes for suitability for inclusion. If you have > any objections or suggestions for improvement, please respond to the patches. If > you agree with the changes, please provide your Acked-by. 777 seems questionable to me, personally. Generally collaboration happens amongst folks within a group, and chmod g+s makes that easier. I'd expect 775 to be a more sane value, myself. -- Christopher Larson ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 0:50 ` [RFC PATCH 0/3] Shared state for all ! Chris Larson @ 2012-05-10 1:05 ` Joshua Lock 2012-05-10 2:15 ` Chris Larson 0 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 1:05 UTC (permalink / raw) To: Patches and discussions about the oe-core layer; +Cc: Chris Larson On 09/05/12 17:50, Chris Larson wrote: > On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> wrote: >> In Yocto #2041[2] Mark reported an issue with reusing shared state as a >> different user on the same machine. >> >> Since the whole purpose of shared state is that it be shared I decided to dig >> into this issue. I wanted to at least be able to use the shared-state cache of >> a different user without error, even if all of the objects aren't actually used >> (i.e. native, at least on the Edison branch I did most of the testing with). >> >> This is an RFC mainly because it changes the permissions of created directories, >> sstate files and siginfo files from what they have traditionally been. >> >> There is more of the rhyme an reason in the patch commit headers and comments >> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this patch, as >> will all of the contents of sstate-cache (siginfo and tgz) files. >> >> This is actually what one would expect from reading the Python API docs for >> os.makedirs "The default mode is 0777 (octal)."[1] but not what actually happens >> on most modern Linux systems thanks to umask. >> >> Please review the following changes for suitability for inclusion. If you have >> any objections or suggestions for improvement, please respond to the patches. If >> you agree with the changes, please provide your Acked-by. > > 777 seems questionable to me, personally. Generally collaboration > happens amongst folks within a group, and chmod g+s makes that easier. > I'd expect 775 to be a more sane value, myself. Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or everything? I went with 777 for mkdirhier as that's the default of os.makedirs before umask is involved. I would likely have picked rw-rw-r-- (664) if I weren't trying to request comments. Cheers, Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 1:05 ` Joshua Lock @ 2012-05-10 2:15 ` Chris Larson 2012-05-10 2:32 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Chris Larson @ 2012-05-10 2:15 UTC (permalink / raw) To: Joshua Lock; +Cc: Patches and discussions about the oe-core layer On Wed, May 9, 2012 at 6:05 PM, Joshua Lock <josh@linux.intel.com> wrote: > > > On 09/05/12 17:50, Chris Larson wrote: >> >> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> wrote: >>> >>> In Yocto #2041[2] Mark reported an issue with reusing shared state as a >>> different user on the same machine. >>> >>> Since the whole purpose of shared state is that it be shared I decided to >>> dig >>> into this issue. I wanted to at least be able to use the shared-state >>> cache of >>> a different user without error, even if all of the objects aren't >>> actually used >>> (i.e. native, at least on the Edison branch I did most of the testing >>> with). >>> >>> This is an RFC mainly because it changes the permissions of created >>> directories, >>> sstate files and siginfo files from what they have traditionally been. >>> >>> There is more of the rhyme an reason in the patch commit headers and >>> comments >>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>> patch, as >>> will all of the contents of sstate-cache (siginfo and tgz) files. >>> >>> This is actually what one would expect from reading the Python API docs >>> for >>> os.makedirs "The default mode is 0777 (octal)."[1] but not what actually >>> happens >>> on most modern Linux systems thanks to umask. >>> >>> Please review the following changes for suitability for inclusion. If you >>> have >>> any objections or suggestions for improvement, please respond to the >>> patches. If >>> you agree with the changes, please provide your Acked-by. >> >> >> 777 seems questionable to me, personally. Generally collaboration >> happens amongst folks within a group, and chmod g+s makes that easier. >> I'd expect 775 to be a more sane value, myself. > > > Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or > everything? > > I went with 777 for mkdirhier as that's the default of os.makedirs before > umask is involved. I would likely have picked rw-rw-r-- (664) if I weren't > trying to request comments. Gotcha. I'm concerned about the behavior change and potential implications of changing the default behavior of mkdirhier. I'm inclined to say that when you don't pass mode, let it use the current behavior of obeying the umask. If we're not going to do that, and want to change the default behavior, then I think 777 is the wrong/questionable default. Beyond that, 777 is certainly the wrong mode to be using for the shared state package in sstate.bbclass. -- Christopher Larson ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 2:15 ` Chris Larson @ 2012-05-10 2:32 ` Joshua Lock 2012-05-10 3:10 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 2:32 UTC (permalink / raw) To: Chris Larson; +Cc: Patches and discussions about the oe-core layer On 09/05/12 19:15, Chris Larson wrote: > On Wed, May 9, 2012 at 6:05 PM, Joshua Lock<josh@linux.intel.com> wrote: >> >> >> On 09/05/12 17:50, Chris Larson wrote: >>> >>> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> wrote: >>>> >>>> In Yocto #2041[2] Mark reported an issue with reusing shared state as a >>>> different user on the same machine. >>>> >>>> Since the whole purpose of shared state is that it be shared I decided to >>>> dig >>>> into this issue. I wanted to at least be able to use the shared-state >>>> cache of >>>> a different user without error, even if all of the objects aren't >>>> actually used >>>> (i.e. native, at least on the Edison branch I did most of the testing >>>> with). >>>> >>>> This is an RFC mainly because it changes the permissions of created >>>> directories, >>>> sstate files and siginfo files from what they have traditionally been. >>>> >>>> There is more of the rhyme an reason in the patch commit headers and >>>> comments >>>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>>> patch, as >>>> will all of the contents of sstate-cache (siginfo and tgz) files. >>>> >>>> This is actually what one would expect from reading the Python API docs >>>> for >>>> os.makedirs "The default mode is 0777 (octal)."[1] but not what actually >>>> happens >>>> on most modern Linux systems thanks to umask. >>>> >>>> Please review the following changes for suitability for inclusion. If you >>>> have >>>> any objections or suggestions for improvement, please respond to the >>>> patches. If >>>> you agree with the changes, please provide your Acked-by. >>> >>> >>> 777 seems questionable to me, personally. Generally collaboration >>> happens amongst folks within a group, and chmod g+s makes that easier. >>> I'd expect 775 to be a more sane value, myself. >> >> >> Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or >> everything? >> >> I went with 777 for mkdirhier as that's the default of os.makedirs before >> umask is involved. I would likely have picked rw-rw-r-- (664) if I weren't >> trying to request comments. > > Gotcha. > > I'm concerned about the behavior change and potential implications of > changing the default behavior of mkdirhier. I'm inclined to say that > when you don't pass mode, let it use the current behavior of obeying > the umask. An earlier version of the series did this and I'm happy to add that behaviour back in. If we're not going to do that, and want to change the > default behavior, then I think 777 is the wrong/questionable default. > Beyond that, 777 is certainly the wrong mode to be using for the > shared state package in sstate.bbclass. Do you have a strong preference on 664 vs. 775 ? Thanks for the comments and feedback, Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 2:32 ` Joshua Lock @ 2012-05-10 3:10 ` Joshua Lock 2012-05-10 3:14 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 3:10 UTC (permalink / raw) To: openembedded-core On 09/05/12 19:32, Joshua Lock wrote: > On 09/05/12 19:15, Chris Larson wrote: >> On Wed, May 9, 2012 at 6:05 PM, Joshua Lock<josh@linux.intel.com> wrote: >>> >>> >>> On 09/05/12 17:50, Chris Larson wrote: >>>> >>>> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> >>>> wrote: >>>>> >>>>> In Yocto #2041[2] Mark reported an issue with reusing shared state >>>>> as a >>>>> different user on the same machine. >>>>> >>>>> Since the whole purpose of shared state is that it be shared I >>>>> decided to >>>>> dig >>>>> into this issue. I wanted to at least be able to use the shared-state >>>>> cache of >>>>> a different user without error, even if all of the objects aren't >>>>> actually used >>>>> (i.e. native, at least on the Edison branch I did most of the testing >>>>> with). >>>>> >>>>> This is an RFC mainly because it changes the permissions of created >>>>> directories, >>>>> sstate files and siginfo files from what they have traditionally been. >>>>> >>>>> There is more of the rhyme an reason in the patch commit headers and >>>>> comments >>>>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>>>> patch, as >>>>> will all of the contents of sstate-cache (siginfo and tgz) files. >>>>> >>>>> This is actually what one would expect from reading the Python API >>>>> docs >>>>> for >>>>> os.makedirs "The default mode is 0777 (octal)."[1] but not what >>>>> actually >>>>> happens >>>>> on most modern Linux systems thanks to umask. >>>>> >>>>> Please review the following changes for suitability for inclusion. >>>>> If you >>>>> have >>>>> any objections or suggestions for improvement, please respond to the >>>>> patches. If >>>>> you agree with the changes, please provide your Acked-by. >>>> >>>> >>>> 777 seems questionable to me, personally. Generally collaboration >>>> happens amongst folks within a group, and chmod g+s makes that easier. >>>> I'd expect 775 to be a more sane value, myself. >>> >>> >>> Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or >>> everything? >>> >>> I went with 777 for mkdirhier as that's the default of os.makedirs >>> before >>> umask is involved. I would likely have picked rw-rw-r-- (664) if I >>> weren't >>> trying to request comments. >> >> Gotcha. >> >> I'm concerned about the behavior change and potential implications of >> changing the default behavior of mkdirhier. I'm inclined to say that >> when you don't pass mode, let it use the current behavior of obeying >> the umask. > > An earlier version of the series did this and I'm happy to add that > behaviour back in. > > If we're not going to do that, and want to change the >> default behavior, then I think 777 is the wrong/questionable default. >> Beyond that, 777 is certainly the wrong mode to be using for the >> shared state package in sstate.bbclass. > > Do you have a strong preference on 664 vs. 775 ? I'm leaning towards 664 (rw-rw-r--) for the files and 775 (rwxrwxr-x) for directories, these are the defaults for file and directory creation on Ubuntu 12.04 and Fedora 16. Cheers, Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 3:10 ` Joshua Lock @ 2012-05-10 3:14 ` Joshua Lock 2012-05-10 5:16 ` Khem Raj 0 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 3:14 UTC (permalink / raw) To: openembedded-core On 09/05/12 20:10, Joshua Lock wrote: > On 09/05/12 19:32, Joshua Lock wrote: >> On 09/05/12 19:15, Chris Larson wrote: >>> On Wed, May 9, 2012 at 6:05 PM, Joshua Lock<josh@linux.intel.com> wrote: >>>> >>>> >>>> On 09/05/12 17:50, Chris Larson wrote: >>>>> >>>>> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> >>>>> wrote: >>>>>> >>>>>> In Yocto #2041[2] Mark reported an issue with reusing shared state >>>>>> as a >>>>>> different user on the same machine. >>>>>> >>>>>> Since the whole purpose of shared state is that it be shared I >>>>>> decided to >>>>>> dig >>>>>> into this issue. I wanted to at least be able to use the shared-state >>>>>> cache of >>>>>> a different user without error, even if all of the objects aren't >>>>>> actually used >>>>>> (i.e. native, at least on the Edison branch I did most of the testing >>>>>> with). >>>>>> >>>>>> This is an RFC mainly because it changes the permissions of created >>>>>> directories, >>>>>> sstate files and siginfo files from what they have traditionally >>>>>> been. >>>>>> >>>>>> There is more of the rhyme an reason in the patch commit headers and >>>>>> comments >>>>>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>>>>> patch, as >>>>>> will all of the contents of sstate-cache (siginfo and tgz) files. >>>>>> >>>>>> This is actually what one would expect from reading the Python API >>>>>> docs >>>>>> for >>>>>> os.makedirs "The default mode is 0777 (octal)."[1] but not what >>>>>> actually >>>>>> happens >>>>>> on most modern Linux systems thanks to umask. >>>>>> >>>>>> Please review the following changes for suitability for inclusion. >>>>>> If you >>>>>> have >>>>>> any objections or suggestions for improvement, please respond to the >>>>>> patches. If >>>>>> you agree with the changes, please provide your Acked-by. >>>>> >>>>> >>>>> 777 seems questionable to me, personally. Generally collaboration >>>>> happens amongst folks within a group, and chmod g+s makes that easier. >>>>> I'd expect 775 to be a more sane value, myself. >>>> >>>> >>>> Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or >>>> everything? >>>> >>>> I went with 777 for mkdirhier as that's the default of os.makedirs >>>> before >>>> umask is involved. I would likely have picked rw-rw-r-- (664) if I >>>> weren't >>>> trying to request comments. >>> >>> Gotcha. >>> >>> I'm concerned about the behavior change and potential implications of >>> changing the default behavior of mkdirhier. I'm inclined to say that >>> when you don't pass mode, let it use the current behavior of obeying >>> the umask. >> >> An earlier version of the series did this and I'm happy to add that >> behaviour back in. >> >> If we're not going to do that, and want to change the >>> default behavior, then I think 777 is the wrong/questionable default. >>> Beyond that, 777 is certainly the wrong mode to be using for the >>> shared state package in sstate.bbclass. >> >> Do you have a strong preference on 664 vs. 775 ? > > I'm leaning towards 664 (rw-rw-r--) for the files and 775 (rwxrwxr-x) > for directories, these are the defaults for file and directory creation > on Ubuntu 12.04 and Fedora 16. At which point, the obvious "solution" to the bug report is a sanity check whether the user can read and write to the sstate directory. Cheers, Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 3:14 ` Joshua Lock @ 2012-05-10 5:16 ` Khem Raj 2012-05-10 16:12 ` Joshua Lock 0 siblings, 1 reply; 20+ messages in thread From: Khem Raj @ 2012-05-10 5:16 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On Wed, May 9, 2012 at 8:14 PM, Joshua Lock <josh@linux.intel.com> wrote: > On 09/05/12 20:10, Joshua Lock wrote: >> >> On 09/05/12 19:32, Joshua Lock wrote: >>> >>> On 09/05/12 19:15, Chris Larson wrote: >>>> >>>> On Wed, May 9, 2012 at 6:05 PM, Joshua Lock<josh@linux.intel.com> wrote: >>>>> >>>>> >>>>> >>>>> On 09/05/12 17:50, Chris Larson wrote: >>>>>> >>>>>> >>>>>> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> >>>>>> wrote: >>>>>>> >>>>>>> >>>>>>> In Yocto #2041[2] Mark reported an issue with reusing shared state >>>>>>> as a >>>>>>> different user on the same machine. >>>>>>> >>>>>>> Since the whole purpose of shared state is that it be shared I >>>>>>> decided to >>>>>>> dig >>>>>>> into this issue. I wanted to at least be able to use the shared-state >>>>>>> cache of >>>>>>> a different user without error, even if all of the objects aren't >>>>>>> actually used >>>>>>> (i.e. native, at least on the Edison branch I did most of the testing >>>>>>> with). >>>>>>> >>>>>>> This is an RFC mainly because it changes the permissions of created >>>>>>> directories, >>>>>>> sstate files and siginfo files from what they have traditionally >>>>>>> been. >>>>>>> >>>>>>> There is more of the rhyme an reason in the patch commit headers and >>>>>>> comments >>>>>>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>>>>>> patch, as >>>>>>> will all of the contents of sstate-cache (siginfo and tgz) files. >>>>>>> >>>>>>> This is actually what one would expect from reading the Python API >>>>>>> docs >>>>>>> for >>>>>>> os.makedirs "The default mode is 0777 (octal)."[1] but not what >>>>>>> actually >>>>>>> happens >>>>>>> on most modern Linux systems thanks to umask. >>>>>>> >>>>>>> Please review the following changes for suitability for inclusion. >>>>>>> If you >>>>>>> have >>>>>>> any objections or suggestions for improvement, please respond to the >>>>>>> patches. If >>>>>>> you agree with the changes, please provide your Acked-by. >>>>>> >>>>>> >>>>>> >>>>>> 777 seems questionable to me, personally. Generally collaboration >>>>>> happens amongst folks within a group, and chmod g+s makes that easier. >>>>>> I'd expect 775 to be a more sane value, myself. >>>>> >>>>> >>>>> >>>>> Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or >>>>> everything? >>>>> >>>>> I went with 777 for mkdirhier as that's the default of os.makedirs >>>>> before >>>>> umask is involved. I would likely have picked rw-rw-r-- (664) if I >>>>> weren't >>>>> trying to request comments. >>>> >>>> >>>> Gotcha. >>>> >>>> I'm concerned about the behavior change and potential implications of >>>> changing the default behavior of mkdirhier. I'm inclined to say that >>>> when you don't pass mode, let it use the current behavior of obeying >>>> the umask. >>> >>> >>> An earlier version of the series did this and I'm happy to add that >>> behaviour back in. >>> >>> If we're not going to do that, and want to change the >>>> >>>> default behavior, then I think 777 is the wrong/questionable default. >>>> Beyond that, 777 is certainly the wrong mode to be using for the >>>> shared state package in sstate.bbclass. >>> >>> >>> Do you have a strong preference on 664 vs. 775 ? >> >> >> I'm leaning towards 664 (rw-rw-r--) for the files and 775 (rwxrwxr-x) >> for directories, these are the defaults for file and directory creation >> on Ubuntu 12.04 and Fedora 16. > > > At which point, the obvious "solution" to the bug report is a sanity check > whether the user can read and write to the sstate directory. may be its already taken care of but I will ask anyway, if shared state is writable for all how is contention resolved when someone tries to update the shared state since he/she rebuilt the package for some reason. I think having a global shared cache to read from but not update it would be something interesting where shared state is updated by say an autobuilder and used by developers in their local builds. On perm issue could it be made that if the file is readable by user then while unpacking it gets the umask of current user ? -Khem ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 5:16 ` Khem Raj @ 2012-05-10 16:12 ` Joshua Lock 2012-05-10 16:31 ` Khem Raj 0 siblings, 1 reply; 20+ messages in thread From: Joshua Lock @ 2012-05-10 16:12 UTC (permalink / raw) To: openembedded-core On 09/05/12 22:16, Khem Raj wrote: > On Wed, May 9, 2012 at 8:14 PM, Joshua Lock<josh@linux.intel.com> wrote: >> On 09/05/12 20:10, Joshua Lock wrote: >>> >>> On 09/05/12 19:32, Joshua Lock wrote: >>>> >>>> On 09/05/12 19:15, Chris Larson wrote: >>>>> >>>>> On Wed, May 9, 2012 at 6:05 PM, Joshua Lock<josh@linux.intel.com> wrote: >>>>>> >>>>>> >>>>>> >>>>>> On 09/05/12 17:50, Chris Larson wrote: >>>>>>> >>>>>>> >>>>>>> On Wed, May 9, 2012 at 5:22 PM, Joshua Lock<josh@linux.intel.com> >>>>>>> wrote: >>>>>>>> >>>>>>>> >>>>>>>> In Yocto #2041[2] Mark reported an issue with reusing shared state >>>>>>>> as a >>>>>>>> different user on the same machine. >>>>>>>> >>>>>>>> Since the whole purpose of shared state is that it be shared I >>>>>>>> decided to >>>>>>>> dig >>>>>>>> into this issue. I wanted to at least be able to use the shared-state >>>>>>>> cache of >>>>>>>> a different user without error, even if all of the objects aren't >>>>>>>> actually used >>>>>>>> (i.e. native, at least on the Edison branch I did most of the testing >>>>>>>> with). >>>>>>>> >>>>>>>> This is an RFC mainly because it changes the permissions of created >>>>>>>> directories, >>>>>>>> sstate files and siginfo files from what they have traditionally >>>>>>>> been. >>>>>>>> >>>>>>>> There is more of the rhyme an reason in the patch commit headers and >>>>>>>> comments >>>>>>>> but tl;dr bb.mkdirhier directories will be 0777 (rwxrwxrwx) with this >>>>>>>> patch, as >>>>>>>> will all of the contents of sstate-cache (siginfo and tgz) files. >>>>>>>> >>>>>>>> This is actually what one would expect from reading the Python API >>>>>>>> docs >>>>>>>> for >>>>>>>> os.makedirs "The default mode is 0777 (octal)."[1] but not what >>>>>>>> actually >>>>>>>> happens >>>>>>>> on most modern Linux systems thanks to umask. >>>>>>>> >>>>>>>> Please review the following changes for suitability for inclusion. >>>>>>>> If you >>>>>>>> have >>>>>>>> any objections or suggestions for improvement, please respond to the >>>>>>>> patches. If >>>>>>>> you agree with the changes, please provide your Acked-by. >>>>>>> >>>>>>> >>>>>>> >>>>>>> 777 seems questionable to me, personally. Generally collaboration >>>>>>> happens amongst folks within a group, and chmod g+s makes that easier. >>>>>>> I'd expect 775 to be a more sane value, myself. >>>>>> >>>>>> >>>>>> >>>>>> Do you mean for bb.mkdirhier calls, the tgz files, the siginfo files or >>>>>> everything? >>>>>> >>>>>> I went with 777 for mkdirhier as that's the default of os.makedirs >>>>>> before >>>>>> umask is involved. I would likely have picked rw-rw-r-- (664) if I >>>>>> weren't >>>>>> trying to request comments. >>>>> >>>>> >>>>> Gotcha. >>>>> >>>>> I'm concerned about the behavior change and potential implications of >>>>> changing the default behavior of mkdirhier. I'm inclined to say that >>>>> when you don't pass mode, let it use the current behavior of obeying >>>>> the umask. >>>> >>>> >>>> An earlier version of the series did this and I'm happy to add that >>>> behaviour back in. >>>> >>>> If we're not going to do that, and want to change the >>>>> >>>>> default behavior, then I think 777 is the wrong/questionable default. >>>>> Beyond that, 777 is certainly the wrong mode to be using for the >>>>> shared state package in sstate.bbclass. >>>> >>>> >>>> Do you have a strong preference on 664 vs. 775 ? >>> >>> >>> I'm leaning towards 664 (rw-rw-r--) for the files and 775 (rwxrwxr-x) >>> for directories, these are the defaults for file and directory creation >>> on Ubuntu 12.04 and Fedora 16. >> >> >> At which point, the obvious "solution" to the bug report is a sanity check >> whether the user can read and write to the sstate directory. > > may be its already taken care of but I will ask anyway, if shared > state is writable for all > how is contention resolved when someone tries to update the shared > state since he/she rebuilt the package for some reason. I think having > a global shared cache to read from but not update it would be > something interesting where shared state is updated by say an > autobuilder and used by developers in their local builds. SSTATE_MIRRORS does this nicely and since it uses the fetcher code that can be a file:// URI or other. Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 16:12 ` Joshua Lock @ 2012-05-10 16:31 ` Khem Raj 0 siblings, 0 replies; 20+ messages in thread From: Khem Raj @ 2012-05-10 16:31 UTC (permalink / raw) To: Patches and discussions about the oe-core layer On Thu, May 10, 2012 at 9:12 AM, Joshua Lock <josh@linux.intel.com> wrote: > > SSTATE_MIRRORS does this nicely and since it uses the fetcher code that can > be a file:// URI or other. yes figured yesterday night when I was thinking about it loud ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock ` (3 preceding siblings ...) 2012-05-10 0:50 ` [RFC PATCH 0/3] Shared state for all ! Chris Larson @ 2012-05-10 7:25 ` Koen Kooi 2012-05-10 16:05 ` Joshua Lock 4 siblings, 1 reply; 20+ messages in thread From: Koen Kooi @ 2012-05-10 7:25 UTC (permalink / raw) To: Patches and discussions about the oe-core layer Op 10 mei 2012, om 02:22 heeft Joshua Lock het volgende geschreven: > This is an RFC series, and for ease of review sent as against the Poky tree It requires an extra step to apply and thus makes review harder for me since my motivation to test them drops below zero. Please send patches to bitbake and oe-core to this list and reserve poky patches for the poky list. As for ease of review by glancing over them: 3 emails are 3 emails. ^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: [RFC PATCH 0/3] Shared state for all ! 2012-05-10 7:25 ` Koen Kooi @ 2012-05-10 16:05 ` Joshua Lock 0 siblings, 0 replies; 20+ messages in thread From: Joshua Lock @ 2012-05-10 16:05 UTC (permalink / raw) To: openembedded-core On 10/05/12 00:25, Koen Kooi wrote: > > Op 10 mei 2012, om 02:22 heeft Joshua Lock het volgende geschreven: > >> This is an RFC series, and for ease of review sent as against the Poky tree > > It requires an extra step to apply and thus makes review harder for me since my motivation to test them drops below zero. Please send patches to bitbake and oe-core to this list and reserve poky patches for the poky list. > As for ease of review by glancing over them: 3 emails are 3 emails. BitBake and OE-Core branches were included in the email, though I didn't explicitly point that out. Joshua -- Joshua Lock Yocto Project Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2012-05-10 16:42 UTC | newest] Thread overview: 20+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2012-05-10 0:22 [RFC PATCH 0/3] Shared state for all ! Joshua Lock 2012-05-10 0:22 ` [RFC PATCH 1/3] lib/bb/utils.py: add optional mode parameter to bb.utils.mkdirhier() Joshua Lock 2012-05-10 11:19 ` Richard Purdie 2012-05-10 0:22 ` [RFC PATCH 2/3] lib/bb/siggen.py: create permissive files and directories Joshua Lock 2012-05-10 11:22 ` Richard Purdie 2012-05-10 16:10 ` Joshua Lock 2012-05-10 0:22 ` [RFC PATCH 3/3] sstate.bbclass: ensure sstate files are easily shared Joshua Lock 2012-05-10 0:27 ` Saul Wold 2012-05-10 1:01 ` Joshua Lock 2012-05-10 0:50 ` [RFC PATCH 0/3] Shared state for all ! Chris Larson 2012-05-10 1:05 ` Joshua Lock 2012-05-10 2:15 ` Chris Larson 2012-05-10 2:32 ` Joshua Lock 2012-05-10 3:10 ` Joshua Lock 2012-05-10 3:14 ` Joshua Lock 2012-05-10 5:16 ` Khem Raj 2012-05-10 16:12 ` Joshua Lock 2012-05-10 16:31 ` Khem Raj 2012-05-10 7:25 ` Koen Kooi 2012-05-10 16:05 ` Joshua Lock
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox