@@ -10,10 +10,15 @@ associated problem space.
1010point that out explicitly and clearly in the associated patches and Cc
1111` Christian Brauner <brauner (at) kernel (dot) org ` .**
1212
13- * Ability to unmount obstructed mounts. (This means: you have a stack
13+ * [x] Ability to unmount obstructed mounts. (This means: you have a stack
1414 of mounts on the very same inode, and you want to remove a mount in
1515 the middle. Right now, you can only remove the topmost mount.)
1616
17+ ** 🙇 Instead of the ability to unmount obstructured mounts we gained
18+ the ability to mount beneath an existing mount, with mostly
19+ equivalent outcome. `6ac392815628f317fcfdca1a39df00b9cc4ebc8b
20+ ("fs: allow to mount beneath top mount") 🙇**
21+
1722 ** Use-Case:** this is useful for replacing mounts atomically, for
1823 example for upgrading versioned disk images: first an old version
1924 of the image is mounted. Then a new version is mounted over the
@@ -110,11 +115,14 @@ point that out explicitly and clearly in the associated patches and Cc
110115 pointed to ` file://dev/zero ` , not expecting an endless amount of
111116 data to read.
112117
113- * ` IP_UNICAST_IF ` should be taken into account for routing decisions
118+ * [x] ` IP_UNICAST_IF ` should be taken into account for routing decisions
114119 at UDP ` connect() ` time (currently it isn't, only ` SO_BINDTOINDEX `
115120 is, but that does so much more than just that, and one often
116121 doesn't want that)
117122
123+ ** 🙇 `0e4d354762cefd3e16b4cff8988ff276e45effc4 ("net-next: Fix
124+ IP_UNICAST_IF option behavior for connected sockets")` 🙇**
125+
118126 ** Use-Case:** DNS resolvers that associate DNS configuration with
119127 specific network interfaces (example: ` systemd-resolved ` ) typically
120128 want to preferably route DNS traffic to the per-interface DNS
@@ -346,9 +354,11 @@ point that out explicitly and clearly in the associated patches and Cc
346354 ** Use-Case:** block services or containers from re-opening/upgrading an
347355 ` O_PATH ` file descriptor through e.g. ` /proc/<pid>/fd/<nr ` as ` O_WRONLY ` .
348356
349- * Implement a mount-specific companion to ` statx() ` that puts at least the
357+ * [x] Implement a mount-specific companion to ` statx() ` that puts at least the
350358 following information into ` struct mount_info ` :
351359
360+ ** 🙇 46eae99ef73302f9fb3dddcd67c374b3dffe8fd6 ("add statmount(2) syscall")`` 🙇**
361+
352362 * mount flags: ` MOUNT_ATTR_RDONLY ` , ...
353363 * time flags: ` MOUNT_ATTR_RELATIME ` , ...
354364 Could probably be combined with mount flags.
@@ -603,9 +613,11 @@ point that out explicitly and clearly in the associated patches and Cc
603613 system extension with a key pair that is supposed to be good for
604614 container images only.
605615
606- * Make statx() on a pidfd return additional recognizable identifiers
616+ * [x] Make statx() on a pidfd return additional recognizable identifiers
607617 in ` .stx_btime ` and ` .stx_ino ` .
608618
619+ ** 🙇 ` cb12fd8e0dabb9a1c8aef55a6a41e2c255fcdf4b pidfd: add pidfs ` 🙇**
620+
609621 It would be fantastic if issuing statx() on any pidfd would return
610622 the start time of the process in ` .stx_btime ` even after the process
611623 died, plus some reasonably stable 64bit identifier for the process
@@ -639,7 +651,6 @@ point that out explicitly and clearly in the associated patches and Cc
639651 ` SIGCHLD ` /` waitid() ` on them or whether waiting for ` POLLIN ` on
640652 them is the only way to get exit notification.
641653
642-
643654* There should be a way to control the process' ` comm ` field if
644655 started via ` fexecve() ` .
645656
0 commit comments