1. 15 Jul, 2002 27 commits
  2. 14 Jul, 2002 1 commit
  3. 15 Jul, 2002 1 commit
  4. 14 Jul, 2002 1 commit
  5. 15 Jul, 2002 1 commit
  6. 14 Jul, 2002 9 commits
    • Trond Myklebust's avatar
      [PATCH] 2.5.25 Clean up RPC receive code [part 2] · 4b1191c8
      Trond Myklebust authored
        After getting rid of rpc_lock_task() from net/sunrpc/xprt.c (see the
      previous patch), we can now remove it from the generic RPC queue
      handling code.
      4b1191c8
    • Trond Myklebust's avatar
      [PATCH] 2.5.25 Clean up RPC receive code · 1eedbd78
      Trond Myklebust authored
        Divorces task xid<->request slot mapping from the internals of the
      rpc_waitqueue xprt->pending. Instead xprt_lookup_rqst() is made to
      search a dedicated list (xprt->recv) on which the request slot is
      placed immediately after being allocated to a task. The new queue is
      protected using the spinlock xprt->sock_lock rather than the generic
      RPC task lock.
      
        Both udp_data_ready() and tcp_data_ready() (well tcp_read_request()
      actually) now need to protect against the request being removed from
      the xprt->recv list while they copy the RPC reply data from the skb.
      On the other hand, they no longer need to worry about the task
      disappearing from xprt->pending. This means that rpc_lock_task() hack
      can be replaced by the spinlock xprt->sock_lock.
      1eedbd78
    • Trond Myklebust's avatar
      [PATCH] Fix NFS attribute caching bug · 45bde054
      Trond Myklebust authored
        Fixes an obvious bug in __nfs_refresh_inode(): after updating the
      attribute cache, if we discover that the data cache is invalid don't
      call nfs_zap_caches() as that will also reinvalidate the attribute
      cache.
        This bug plays havoc with the new lookup/revalidation code in 2.4.19
      since it forces a lot of unnecessary extra GETATTR RPC calls.
      45bde054
    • Douglas Gilbert's avatar
      [PATCH] sg driver against lk 2.5.25 · 4b11b184
      Douglas Gilbert authored
      This patch is against lk 2.5.25 . It
        - fixes copy_from/to_user() [William Stinson from dj tree]
        - disables kiobuf use, so it will compile without kiobufs
      
      The latter change is so Andrew Morton can remove kiobufs
      as suggested in his "direct-to-BIO for O_DIRECT" thread.
      4b11b184
    • Martin Dalecki's avatar
      [PATCH] 2.5.25 end_request trivia · 44a88f1c
      Martin Dalecki authored
       - Make airo include tqueue.h, which is needed to make this driver
         compile at all again.
      
       - Adjust aztcd.c and sonycd535.c to the recent end_request() signature
         changes.
      44a88f1c
    • Dave Jones's avatar
      [PATCH] bluesmoke fixes take 2. · 9399b29a
      Dave Jones authored
      From Andi Kleen:
      
      Some fixes for CONFIG_X86_MCE_NONFATAL
      
      Calling smp_call_function from interrupt context is forbidden
      
      Unless I'm mistaken it would BUG on any box with more than two CPUs because
      it would expect smp_call_function callback to run only on a single CPU??
      
      Also handle the Hammer.
      9399b29a
    • Linus Torvalds's avatar
      Merge http://linuxconsole.bkbits.net:8080/dev · 484f2a9c
      Linus Torvalds authored
      into home.transmeta.com:/home/torvalds/v2.5/linux
      484f2a9c
    • Linus Torvalds's avatar
      Merge bk://thebsh.namesys.com/bk/reiser3-linux-2.5 · 866aa8f7
      Linus Torvalds authored
      into home.transmeta.com:/home/torvalds/v2.5/linux
      866aa8f7
    • Hirofumi Ogawa's avatar
      [PATCH] error code for mprotect() · 964f2d4d
      Hirofumi Ogawa authored
      SuSv3 says: "The mprotect() function shall fail if:
      
        [EACCES]
          The prot argument specifies a protection that violates the access
          permission the process has to the underlying memory object.
      
        [EAGAIN]
          The prot argument specifies PROT_WRITE over a MAP_PRIVATE mapping and
          there are insufficient memory resources to reserve for locking the
          private page.
      
        [EINVAL]
          The addr argument is not a multiple of the page size as returned by
          sysconf().
      
        [ENOMEM]
          Addresses in the range [addr,addr+len) are invalid for the address
          space of a process, or specify one or more pages which are not mapped.
      
        [ENOMEM]
          The prot argument specifies PROT_WRITE on a MAP_PRIVATE mapping, and
          it would require more space than the system is able to supply for
          locking the private pages, if required.
      
        [ENOTSUP]
          The implementation does not support the combination of accesses
          requested in the prot argument."
      
      This fixes error code of mprotect() of the ENOMEM case.
      964f2d4d