- 26 Feb, 2004 40 commits
-
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> check lock length, return appropriate error
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> unlike v2/v3, nfsv4 returns nfserr_inval when attempting to read, write, commit or test lock a symlink. nfsv4 does return nfserr_symlink on lookup and open, so a simple fix in fh_verify() will not work.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au>
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Call decode_fattr on writable attributes to check for xdr errors, incorrect utf8, etc.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> tests if current_fh is the pseudo root for the client and returns nfserr_noent if so. need to call exp_pseudoroot because different clients can have
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> nfsd4_restore_fh() returns nfserr_restorefh instead of nfserr_nofilehandle
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> changes nfserr_readdir_nospc to nfserr_toosmall, following rfc3530 which has no nfserr_readdir_nospc. error 10030 which was nfserr_readdir_nospc is actually nfserr_restorefh.
-
Andrew Morton authored
[PATCH] kNFSd: When looking for a shareowner in the nfsd open, make sure we don't get a lockowner instead. From: NeilBrown <neilb@cse.unsw.edu.au> When looking for a shareowner in the nfsd open, make sure we don't get a lockowner instead.
-
Andrew Morton authored
[PATCH] kNFSd: Use only the uid when deciding whether a setclientid is being done with the "same principal". From: NeilBrown <neilb@cse.unsw.edu.au> I would have assumed that we should also check for the same security (pseudo)flavor, but that doesn't seem to be how Solaris does it, and since the spec doesn't suggest including such information in the clientid, that would make it impossible to switch pseudoflavors.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Since the open op changes the current filehandle, we can't correctly replay compounds containing opens unless we save the filehandle resulting from the open as well as the encoded reply.
-
Andrew Morton authored
[PATCH] kNFSd: When looking for a shareowner in the nfsd open, make sure we don't get a lockowner instead. From: NeilBrown <neilb@cse.unsw.edu.au> When looking for a shareowner in the nfsd open, make sure we don't get a lockowner instead.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Use higher-resolution time for the changeinfo, instead of using time and filesize.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Exclusive creates were failing with permission errors, because they don't set the mode on the newly created file, and the permission check in fh_verify (called at the end of do_open_lookup) was failing. So pass in the MAY_OWNER_OVERRIDE flag to allow the owner of the file to override the permission check.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> It's OK for the find_lockstateowner_str to fail; that just means we haven't seen the lockowner, and will compare the request range to all locks on the file.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> From: "William A.(Andy) Adamson" <andros@citi.umich.edu> Compare inode pointers instead of dentry pointers when checking an inode refered to by a stateid against an inode refered to by a file handle. Set st_vfs_set to 0 if the stateid/file handle check fails to avoid referencing bad state when reaping stateid's.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Updated version which uses ascii-encoding of messages, from http://www.citi.umich.edu/u/marius/linux-2.5.70-idmap-server-new.diff as of October 14, 2003.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> Doesn't actually add integrity support on the server yet; just adapts server-side code to the gss api changes necessary to get integrity working on the client.
-
Andrew Morton authored
From: NeilBrown <neilb@cse.unsw.edu.au> From: "J. Bruce Fields" <bfields@fieldses.org> Note that the user (or exportfs, on the user's behalf) allows a gss pseudoflavor to be used to access an export by exporting to a special client named "gss/pseudoflavor-name", e.g., "gss/krb5" or "gss/lipkey-i".
-
Andrew Morton authored
From: Neil Brown <neilb@cse.unsw.edu.au> Make sure nfsd doesn't modify group_info structures as they might be shared.
-
Andrew Morton authored
From: Neil Brown <neilb@cse.unsw.edu.au> Tidy up new groups handling in nfsd. Set up the group_info structure when decoding the RPC packet instead of in nfsd.
-
Andrew Morton authored
From: Benjamin Herrenschmidt <benh@kernel.crashing.org> ppc64 uses its own range allocator for ioremap (in order to allocate things in a different space than normal vmalloc). This is historic stuff, we may get rid of it, but in the meantime, here's a patch turning the spinlock in there into a semaphore so it doesn't blow up when doing kmallocs.
-
Andrew Morton authored
From: Anton Blanchard <anton@samba.org> From: Stephen Rothwell <sfr@canb.auug.org.au> This moves the sg_dma_* macros to asm/scatterlist.h where they belong (and where almost every other architecture has them).
-
Andrew Morton authored
From: olof@austin.ibm.com Use the new kallsyms_lookup_name() in xmon on ppc64. Ben said he might backport these changes to ppc32 as well.
-
Andrew Morton authored
From: Rusty Russell <rusty@au1.ibm.com> Attached patch adds a kallsyms_lookupname() function for lookups of a symbol name to an address. Debuggers such as ppc[64] xmon can use this. It's intentionally not exported as a symbol for module use, since it can be used to circumvent other symbol export restrictions.
-
Andrew Morton authored
From: Stephen Rothwell <sfr@canb.auug.org.au> Add the PPC64 iSeries virtual disk driver
-
bk://gkernel.bkbits.net/misc-2.5Linus Torvalds authored
into ppc970.osdl.org:/home/torvalds/v2.5/linux
-
Jeff Garzik authored
-
Jeff Garzik authored
-
Jeff Garzik authored
-
Jeff Garzik authored
-
Alexandre Oliva authored
This helps avoid doing push/pop pairs on register contents that we just don't care about. After we've done the xor, the pointers are dead anyway.
-
bk://kernel.bkbits.net/davem/net-2.6Linus Torvalds authored
into ppc970.osdl.org:/home/torvalds/v2.5/linux
-
David S. Miller authored
into kernel.bkbits.net:/home/davem/net-2.6
-
Linus Torvalds authored
Since we do push/pops, a stack-based memory argument would do the wrong thing by using the wrong offsets.
-
Brian Childs authored
The x86-64 implementation of csum-partial.c causes it to compute the checksum incorrectly. As a result, multicast doesn't work. It looks as though iptables is also affected. Here's a simple patch.
-
Marcelo Tosatti authored
This patch is the first of several planned fixes for the cyclades multiserial cards driver. Its mostly a sync with in-house driver: - Prevent users from opening non-existing Z ports - Implement special XON/XOFF character handling in Z cards - Prevent data-loss on Z cards - Throttling fix for Z card - Only throttle if CTS/RTS are set - Fix accounting of received data Kudos to Cyclades R&D
-
Bartlomiej Zolnierkiewicz authored
-
Bartlomiej Zolnierkiewicz authored
-
Bartlomiej Zolnierkiewicz authored
-
Bartlomiej Zolnierkiewicz authored
From: William Lee Irwin III <wli@holomorphy.com> PRD_ENTRIES is specified to be precisely 256; on platforms where PAGE_SIZE varies from 4KB the calculation in the current expression defining it is inaccurate, which may cause crashes. This patch changes it to the constant literal 256.
-