Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
63135e08
Commit
63135e08
authored
Jul 17, 2007
by
Steve French
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[CIFS] More whitespace/formatting fixes (noticed by checkpatch)
Signed-off-by:
Steve French
<
sfrench@us.ibm.com
>
parent
7e42ca88
Changes
10
Hide whitespace changes
Inline
Side-by-side
Showing
10 changed files
with
88 additions
and
46 deletions
+88
-46
fs/cifs/cifsencrypt.c
fs/cifs/cifsencrypt.c
+2
-1
fs/cifs/cifsfs.c
fs/cifs/cifsfs.c
+13
-7
fs/cifs/cifssmb.c
fs/cifs/cifssmb.c
+22
-11
fs/cifs/connect.c
fs/cifs/connect.c
+28
-15
fs/cifs/file.c
fs/cifs/file.c
+3
-2
fs/cifs/link.c
fs/cifs/link.c
+2
-1
fs/cifs/misc.c
fs/cifs/misc.c
+10
-5
fs/cifs/netmisc.c
fs/cifs/netmisc.c
+4
-2
fs/cifs/sess.c
fs/cifs/sess.c
+2
-1
fs/cifs/xattr.c
fs/cifs/xattr.c
+2
-1
No files found.
fs/cifs/cifsencrypt.c
View file @
63135e08
...
...
@@ -109,7 +109,8 @@ static int cifs_calc_signature2(const struct kvec *iov, int n_vec,
if
(
i
==
0
)
{
if
(
iov
[
0
].
iov_len
<=
8
)
/* cmd field at offset 9 */
break
;
/* nothing to sign or corrupt header */
MD5Update
(
&
context
,
iov
[
0
].
iov_base
+
4
,
iov
[
0
].
iov_len
-
4
);
MD5Update
(
&
context
,
iov
[
0
].
iov_base
+
4
,
iov
[
0
].
iov_len
-
4
);
}
else
MD5Update
(
&
context
,
iov
[
i
].
iov_base
,
iov
[
i
].
iov_len
);
}
...
...
fs/cifs/cifsfs.c
View file @
63135e08
...
...
@@ -71,16 +71,20 @@ static struct task_struct *dnotifyThread = NULL;
static
const
struct
super_operations
cifs_super_ops
;
unsigned
int
CIFSMaxBufSize
=
CIFS_MAX_MSGSIZE
;
module_param
(
CIFSMaxBufSize
,
int
,
0
);
MODULE_PARM_DESC
(
CIFSMaxBufSize
,
"Network buffer size (not including header). Default: 16384 Range: 8192 to 130048"
);
MODULE_PARM_DESC
(
CIFSMaxBufSize
,
"Network buffer size (not including header). "
"Default: 16384 Range: 8192 to 130048"
);
unsigned
int
cifs_min_rcv
=
CIFS_MIN_RCV_POOL
;
module_param
(
cifs_min_rcv
,
int
,
0
);
MODULE_PARM_DESC
(
cifs_min_rcv
,
"Network buffers in pool. Default: 4 Range: 1 to 64"
);
MODULE_PARM_DESC
(
cifs_min_rcv
,
"Network buffers in pool. Default: 4 Range: "
"1 to 64"
);
unsigned
int
cifs_min_small
=
30
;
module_param
(
cifs_min_small
,
int
,
0
);
MODULE_PARM_DESC
(
cifs_min_small
,
"Small network buffers in pool. Default: 30 Range: 2 to 256"
);
MODULE_PARM_DESC
(
cifs_min_small
,
"Small network buffers in pool. Default: 30 "
"Range: 2 to 256"
);
unsigned
int
cifs_max_pending
=
CIFS_MAX_REQ
;
module_param
(
cifs_max_pending
,
int
,
0
);
MODULE_PARM_DESC
(
cifs_max_pending
,
"Simultaneous requests to server. Default: 50 Range: 2 to 256"
);
MODULE_PARM_DESC
(
cifs_max_pending
,
"Simultaneous requests to server. "
"Default: 50 Range: 2 to 256"
);
extern
mempool_t
*
cifs_sm_req_poolp
;
extern
mempool_t
*
cifs_req_poolp
;
...
...
@@ -902,7 +906,8 @@ static int cifs_oplock_thread(void *dummyarg)
0
/* len */
,
0
/* offset */
,
0
,
0
,
LOCKING_ANDX_OPLOCK_RELEASE
,
0
/* wait flag */
);
cFYI
(
1
,(
"Oplock release rc = %d "
,
rc
));
cFYI
(
1
,
(
"Oplock release rc = %d "
,
rc
));
}
}
else
spin_unlock
(
&
GlobalMid_Lock
);
...
...
@@ -1040,7 +1045,7 @@ init_cifs(void)
static
void
__exit
exit_cifs
(
void
)
{
cFYI
(
0
,
(
"
In unregister ie
exit_cifs"
));
cFYI
(
0
,
(
"exit_cifs"
));
#ifdef CONFIG_PROC_FS
cifs_proc_clean
();
#endif
...
...
@@ -1055,7 +1060,8 @@ exit_cifs(void)
MODULE_AUTHOR
(
"Steve French <sfrench@us.ibm.com>"
);
MODULE_LICENSE
(
"GPL"
);
/* combination of LGPL + GPL source behaves as GPL */
MODULE_DESCRIPTION
(
"VFS to access servers complying with the SNIA CIFS Specification e.g. Samba and Windows"
);
(
"VFS to access servers complying with the SNIA CIFS Specification "
"e.g. Samba and Windows"
);
MODULE_VERSION
(
CIFS_VERSION
);
module_init
(
init_cifs
)
module_exit
(
exit_cifs
)
fs/cifs/cifssmb.c
View file @
63135e08
...
...
@@ -132,10 +132,13 @@ small_smb_init(int smb_command, int wct, struct cifsTconInfo *tcon,
/* Give Demultiplex thread up to 10 seconds to
reconnect, should be greater than cifs socket
timeout which is 7 seconds */
while
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
while
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
wait_event_interruptible_timeout
(
tcon
->
ses
->
server
->
response_q
,
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsGood
),
10
*
HZ
);
if
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsGood
),
10
*
HZ
);
if
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
/* on "soft" mounts we wait once */
if
((
tcon
->
retry
==
FALSE
)
||
(
tcon
->
ses
->
status
==
CifsExiting
))
{
...
...
@@ -209,7 +212,8 @@ small_smb_init(int smb_command, int wct, struct cifsTconInfo *tcon,
return
-
ENOMEM
;
}
header_assemble
((
struct
smb_hdr
*
)
*
request_buf
,
smb_command
,
tcon
,
wct
);
header_assemble
((
struct
smb_hdr
*
)
*
request_buf
,
smb_command
,
tcon
,
wct
);
if
(
tcon
!=
NULL
)
cifs_stats_inc
(
&
tcon
->
num_smbs_sent
);
...
...
@@ -274,9 +278,11 @@ smb_init(int smb_command, int wct, struct cifsTconInfo *tcon,
/* Give Demultiplex thread up to 10 seconds to
reconnect, should be greater than cifs socket
timeout which is 7 seconds */
while
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
while
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
wait_event_interruptible_timeout
(
tcon
->
ses
->
server
->
response_q
,
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsGood
),
10
*
HZ
);
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsGood
),
10
*
HZ
);
if
(
tcon
->
ses
->
server
->
tcpStatus
==
CifsNeedReconnect
)
{
/* on "soft" mounts we wait once */
...
...
@@ -381,7 +387,8 @@ static int validate_t2(struct smb_t2_rsp *pSMB)
/* check that bcc is less than negotiated smb buffer */
total_size
=
le16_to_cpu
(
pSMB
->
t2_rsp
.
ParameterCount
);
if
(
total_size
<
512
)
{
total_size
+=
le16_to_cpu
(
pSMB
->
t2_rsp
.
DataCount
);
total_size
+=
le16_to_cpu
(
pSMB
->
t2_rsp
.
DataCount
);
/* BCC le converted in SendReceive */
pBCC
=
(
pSMB
->
hdr
.
WordCount
*
2
)
+
sizeof
(
struct
smb_hdr
)
+
...
...
@@ -2608,7 +2615,7 @@ CIFSSMBQueryReparseLinkInfo(const int xid, struct cifsTconInfo *tcon,
reparse_buf
->
TargetNameOffset
+
reparse_buf
->
TargetNameLen
)
>
end_of_smb
)
{
cFYI
(
1
,(
"reparse buf
extended
beyond SMB"
));
cFYI
(
1
,(
"reparse buf
goes
beyond SMB"
));
rc
=
-
EIO
;
goto
qreparse_out
;
}
...
...
@@ -2632,7 +2639,8 @@ CIFSSMBQueryReparseLinkInfo(const int xid, struct cifsTconInfo *tcon,
}
}
else
{
rc
=
-
EIO
;
cFYI
(
1
,(
"Invalid return data count on get reparse info ioctl"
));
cFYI
(
1
,
(
"Invalid return data count on "
"get reparse info ioctl"
));
}
symlinkinfo
[
buflen
]
=
0
;
/* just in case so the caller
does not go off the end of the buffer */
...
...
@@ -2750,7 +2758,8 @@ static __u16 ACL_to_cifs_posix(char *parm_data, const char *pACL,
return
0
;
count
=
posix_acl_xattr_count
((
size_t
)
buflen
);
cFYI
(
1
,(
"setting acl with %d entries from buf of length %d and version of %d"
,
cFYI
(
1
,(
"setting acl with %d entries from buf of length %d and "
"version of %d"
,
count
,
buflen
,
le32_to_cpu
(
local_acl
->
a_version
)));
if
(
le32_to_cpu
(
local_acl
->
a_version
)
!=
2
)
{
cFYI
(
1
,
(
"unknown POSIX ACL version %d"
,
...
...
@@ -3957,7 +3966,9 @@ CIFSGetDFSRefer(const int xid, struct cifsSesInfo *ses,
(
8
/* sizeof start of data block */
+
data_offset
+
(
char
*
)
&
pSMBr
->
hdr
.
Protocol
);
cFYI
(
1
,(
"num_referrals: %d dfs flags: 0x%x ...
\n
for referral one refer size: 0x%x srv type: 0x%x refer flags: 0x%x ttl: 0x%x"
,
cFYI
(
1
,(
"num_referrals: %d dfs flags: 0x%x ...
\n
"
"for referral one refer size: 0x%x srv "
"type: 0x%x refer flags: 0x%x ttl: 0x%x"
,
le16_to_cpu
(
pSMBr
->
NumberOfReferrals
),
le16_to_cpu
(
pSMBr
->
DFSFlags
),
le16_to_cpu
(
referrals
->
ReferralSize
),
...
...
fs/cifs/connect.c
View file @
63135e08
...
...
@@ -278,7 +278,7 @@ static int coalesce_t2(struct smb_hdr *psecond, struct smb_hdr *pTargetSMB)
total_data_size
=
le16_to_cpu
(
pSMBt
->
t2_rsp
.
TotalDataCount
);
if
(
total_data_size
!=
le16_to_cpu
(
pSMB2
->
t2_rsp
.
TotalDataCount
))
{
cFYI
(
1
,
(
"total data size
s
of primary and secondary t2 differ"
));
cFYI
(
1
,
(
"total data size of primary and secondary t2 differ"
));
}
total_in_buf
=
le16_to_cpu
(
pSMBt
->
t2_rsp
.
DataCount
);
...
...
@@ -1036,7 +1036,8 @@ cifs_parse_mount_options(char *options, const char *devname,
}
}
else
if
(
strnicmp
(
data
,
"iocharset"
,
9
)
==
0
)
{
if
(
!
value
||
!*
value
)
{
printk
(
KERN_WARNING
"CIFS: invalid iocharset specified
\n
"
);
printk
(
KERN_WARNING
"CIFS: invalid iocharset "
"specified
\n
"
);
return
1
;
/* needs_arg; */
}
if
(
strnlen
(
value
,
65
)
<
65
)
{
...
...
@@ -1046,7 +1047,8 @@ cifs_parse_mount_options(char *options, const char *devname,
is used by caller */
cFYI
(
1
,
(
"iocharset set to %s"
,
value
));
}
else
{
printk
(
KERN_WARNING
"CIFS: iocharset name too long.
\n
"
);
printk
(
KERN_WARNING
"CIFS: iocharset name "
"too long.
\n
"
);
return
1
;
}
}
else
if
(
strnicmp
(
data
,
"uid"
,
3
)
==
0
)
{
...
...
@@ -1098,7 +1100,7 @@ cifs_parse_mount_options(char *options, const char *devname,
}
}
else
if
(
strnicmp
(
data
,
"netbiosname"
,
4
)
==
0
)
{
if
(
!
value
||
!*
value
||
(
*
value
==
' '
))
{
cFYI
(
1
,
(
"invalid (empty) netbiosname
specified
"
));
cFYI
(
1
,
(
"invalid (empty) netbiosname"
));
}
else
{
memset
(
vol
->
source_rfc1001_name
,
0x20
,
15
);
for
(
i
=
0
;
i
<
15
;
i
++
)
{
...
...
@@ -2827,7 +2829,8 @@ CIFSNTLMSSPNegotiateSessSetup(unsigned int xid,
bcc_ptr
++
;
}
else
cFYI
(
1
,
(
"Variable field of length %d extends beyond end of smb"
,
(
"field of length %d "
"extends beyond end of smb"
,
len
));
}
}
else
{
...
...
@@ -2990,13 +2993,17 @@ CIFSNTLMSSPAuthSessSetup(unsigned int xid, struct cifsSesInfo *ses,
cpu_to_le16
(
len
);
}
/* SecurityBlob->WorkstationName.Length = cifs_strtoUCS((__le16 *) bcc_ptr, "AMACHINE",64, nls_codepage);
/* SecurityBlob->WorkstationName.Length =
cifs_strtoUCS((__le16 *) bcc_ptr, "AMACHINE",64, nls_codepage);
SecurityBlob->WorkstationName.Length *= 2;
SecurityBlob->WorkstationName.MaximumLength = cpu_to_le16(SecurityBlob->WorkstationName.Length);
SecurityBlob->WorkstationName.Buffer = cpu_to_le32(SecurityBlobLength);
SecurityBlob->WorkstationName.MaximumLength =
cpu_to_le16(SecurityBlob->WorkstationName.Length);
SecurityBlob->WorkstationName.Buffer =
cpu_to_le32(SecurityBlobLength);
bcc_ptr += SecurityBlob->WorkstationName.Length;
SecurityBlobLength += SecurityBlob->WorkstationName.Length;
SecurityBlob->WorkstationName.Length = cpu_to_le16(SecurityBlob->WorkstationName.Length); */
SecurityBlob->WorkstationName.Length =
cpu_to_le16(SecurityBlob->WorkstationName.Length); */
if
((
long
)
bcc_ptr
%
2
)
{
*
bcc_ptr
=
0
;
...
...
@@ -3202,7 +3209,7 @@ CIFSNTLMSSPAuthSessSetup(unsigned int xid, struct cifsSesInfo *ses,
len
=
strnlen
(
bcc_ptr
,
1024
);
if
(((
long
)
bcc_ptr
+
len
)
-
(
long
)
pByteArea
(
smb_buffer_response
)
<=
BCC
(
smb_buffer_response
))
{
<=
BCC
(
smb_buffer_response
))
{
if
(
ses
->
serverOS
)
kfree
(
ses
->
serverOS
);
ses
->
serverOS
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
...
...
@@ -3216,7 +3223,8 @@ CIFSNTLMSSPAuthSessSetup(unsigned int xid, struct cifsSesInfo *ses,
kfree
(
ses
->
serverNOS
);
ses
->
serverNOS
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
strncpy
(
ses
->
serverNOS
,
bcc_ptr
,
len
);
strncpy
(
ses
->
serverNOS
,
bcc_ptr
,
len
);
bcc_ptr
+=
len
;
bcc_ptr
[
0
]
=
0
;
bcc_ptr
++
;
...
...
@@ -3224,19 +3232,24 @@ CIFSNTLMSSPAuthSessSetup(unsigned int xid, struct cifsSesInfo *ses,
len
=
strnlen
(
bcc_ptr
,
1024
);
if
(
ses
->
serverDomain
)
kfree
(
ses
->
serverDomain
);
ses
->
serverDomain
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
strncpy
(
ses
->
serverDomain
,
bcc_ptr
,
len
);
ses
->
serverDomain
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
strncpy
(
ses
->
serverDomain
,
bcc_ptr
,
len
);
bcc_ptr
+=
len
;
bcc_ptr
[
0
]
=
0
;
bcc_ptr
++
;
}
else
cFYI
(
1
,
(
"Variable field of length %d extends beyond end of smb "
,
(
"field of length %d "
"extends beyond end of smb "
,
len
));
}
}
else
{
cERROR
(
1
,
(
" Security Blob Length extends beyond end of SMB"
));
(
" Security Blob extends beyond end "
"of SMB"
));
}
}
else
{
cERROR
(
1
,
(
"No session structure passed in."
));
...
...
fs/cifs/file.c
View file @
63135e08
...
...
@@ -502,7 +502,8 @@ int cifs_close(struct inode *inode, struct file *file)
timeout
*=
4
;
}
if
(
atomic_read
(
&
pSMBFile
->
wrtPending
))
cERROR
(
1
,(
"close with pending writes"
));
cERROR
(
1
,
(
"close with pending writes"
));
rc
=
CIFSSMBClose
(
xid
,
pTcon
,
pSMBFile
->
netfid
);
}
...
...
@@ -1285,7 +1286,7 @@ static int cifs_writepages(struct address_space *mapping,
1
);
atomic_dec
(
&
open_file
->
wrtPending
);
if
(
rc
||
bytes_written
<
bytes_to_write
)
{
cERROR
(
1
,
(
"Write2 ret %d, written =
%d"
,
cERROR
(
1
,
(
"Write2 ret %d, wrote
%d"
,
rc
,
bytes_written
));
/* BB what if continued retry is
requested via mount flags? */
...
...
fs/cifs/link.c
View file @
63135e08
...
...
@@ -287,7 +287,8 @@ cifs_readlink(struct dentry *direntry, char __user *pBuffer, int buflen)
fid
,
cifs_sb
->
local_nls
);
if
(
CIFSSMBClose
(
xid
,
pTcon
,
fid
))
{
cFYI
(
1
,(
"Error closing junction point (open for ioctl)"
));
cFYI
(
1
,
(
"Error closing junction point "
"(open for ioctl)"
));
}
if
(
rc
==
-
EIO
)
{
/* Query if DFS Junction */
...
...
fs/cifs/misc.c
View file @
63135e08
...
...
@@ -353,7 +353,8 @@ header_assemble(struct smb_hdr *buffer, char smb_command /* command */ ,
/* with userid/password pairs found on the smb session */
/* for other target tcp/ip addresses BB */
if
(
current
->
fsuid
!=
treeCon
->
ses
->
linux_uid
)
{
cFYI
(
1
,(
"Multiuser mode and UID did not match tcon uid"
));
cFYI
(
1
,
(
"Multiuser mode and UID "
"did not match tcon uid"
));
read_lock
(
&
GlobalSMBSeslock
);
list_for_each
(
temp_item
,
&
GlobalSMBSessionList
)
{
ses
=
list_entry
(
temp_item
,
struct
cifsSesInfo
,
cifsSessionList
);
...
...
@@ -461,7 +462,8 @@ checkSMB(struct smb_hdr *smb, __u16 mid, unsigned int length)
clc_len
=
smbCalcSize_LE
(
smb
);
if
(
4
+
len
!=
length
)
{
cERROR
(
1
,
(
"Length read does not match RFC1001 length %d"
,
len
));
cERROR
(
1
,
(
"Length read does not match RFC1001 length %d"
,
len
));
return
1
;
}
...
...
@@ -516,7 +518,8 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
pnotify
=
(
struct
file_notify_information
*
)
((
char
*
)
&
pSMBr
->
hdr
.
Protocol
+
data_offset
);
cFYI
(
1
,(
"dnotify on %s Action: 0x%x"
,
pnotify
->
FileName
,
cFYI
(
1
,
(
"dnotify on %s Action: 0x%x"
,
pnotify
->
FileName
,
pnotify
->
Action
));
/* BB removeme BB */
/* cifs_dump_mem("Rcvd notify Data: ",buf,
sizeof(struct smb_hdr)+60); */
...
...
@@ -567,7 +570,8 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
if
(
pSMB
->
Fid
==
netfile
->
netfid
)
{
struct
cifsInodeInfo
*
pCifsInode
;
read_unlock
(
&
GlobalSMBSeslock
);
cFYI
(
1
,(
"file id match, oplock break"
));
cFYI
(
1
,
(
"file id match, oplock break"
));
pCifsInode
=
CIFS_I
(
netfile
->
pInode
);
pCifsInode
->
clientCanCacheAll
=
FALSE
;
...
...
@@ -578,7 +582,8 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
AllocOplockQEntry
(
netfile
->
pInode
,
netfile
->
netfid
,
tcon
);
cFYI
(
1
,(
"about to wake up oplock thd"
));
cFYI
(
1
,
(
"about to wake up oplock thread"
));
if
(
oplockThread
)
wake_up_process
(
oplockThread
);
return
TRUE
;
...
...
fs/cifs/netmisc.c
View file @
63135e08
...
...
@@ -789,7 +789,8 @@ map_smb_to_linux_error(struct smb_hdr *smb)
sizeof
(
struct
smb_to_posix_error
);
i
++
)
{
if
(
mapping_table_ERRDOS
[
i
].
smb_err
==
0
)
break
;
else
if
(
mapping_table_ERRDOS
[
i
].
smb_err
==
smberrcode
)
{
else
if
(
mapping_table_ERRDOS
[
i
].
smb_err
==
smberrcode
)
{
rc
=
mapping_table_ERRDOS
[
i
].
posix_code
;
break
;
}
...
...
@@ -802,7 +803,8 @@ map_smb_to_linux_error(struct smb_hdr *smb)
sizeof
(
struct
smb_to_posix_error
);
i
++
)
{
if
(
mapping_table_ERRSRV
[
i
].
smb_err
==
0
)
break
;
else
if
(
mapping_table_ERRSRV
[
i
].
smb_err
==
smberrcode
)
{
else
if
(
mapping_table_ERRSRV
[
i
].
smb_err
==
smberrcode
)
{
rc
=
mapping_table_ERRSRV
[
i
].
posix_code
;
break
;
}
...
...
fs/cifs/sess.c
View file @
63135e08
...
...
@@ -535,7 +535,8 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
rc
=
decode_unicode_ssetup
(
&
bcc_ptr
,
bytes_remaining
,
ses
,
nls_cp
);
else
rc
=
decode_ascii_ssetup
(
&
bcc_ptr
,
bytes_remaining
,
ses
,
nls_cp
);
rc
=
decode_ascii_ssetup
(
&
bcc_ptr
,
bytes_remaining
,
ses
,
nls_cp
);
ssetup_exit:
kfree
(
str_area
);
...
...
fs/cifs/xattr.c
View file @
63135e08
...
...
@@ -184,7 +184,8 @@ int cifs_setxattr(struct dentry *direntry, const char *ea_name,
cFYI
(
1
,
(
"set default POSIX ACL not supported"
));
#endif
}
else
{
cFYI
(
1
,
(
"illegal xattr request %s (only user namespace supported)"
,
ea_name
));
cFYI
(
1
,
(
"illegal xattr request %s (only user namespace"
" supported)"
,
ea_name
));
/* BB what if no namespace prefix? */
/* Should we just pass them to server, except for
system and perhaps security prefixes? */
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment