You need to sign in or sign up before continuing.
  1. 25 9月, 2012 2 次提交
  2. 20 8月, 2012 1 次提交
  3. 25 7月, 2012 2 次提交
  4. 24 7月, 2012 1 次提交
  5. 14 7月, 2012 8 次提交
  6. 04 5月, 2012 1 次提交
    • I
      cifs - check S_AUTOMOUNT in revalidate · 936ad909
      Ian Kent 提交于
      When revalidating a dentry, if the inode wasn't known to be a dfs
      entry when the dentry was instantiated, such as when created via
      ->readdir(), the DCACHE_NEED_AUTOMOUNT flag needs to be set on the
      dentry in ->d_revalidate().
      
      The false return from cifs_d_revalidate(), due to the inode now
      being marked with the S_AUTOMOUNT flag, might not invalidate the
      dentry if there is a concurrent unlazy path walk. This is because
      the dentry reference count will be at least 2 in this case causing
      d_invalidate() to return EBUSY. So the asumption that the dentry
      will be discarded then correctly instantiated via ->lookup() might
      not hold.
      Signed-off-by: NIan Kent <raven@themaw.net>
      Reviewed-by: NJeff Layton <jlayton@redhat.com>
      Cc: Steve French <smfrench@gmail.com>
      Cc: linux-cifs@vger.kernel.org
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      936ad909
  7. 20 3月, 2012 1 次提交
  8. 27 2月, 2012 1 次提交
  9. 08 2月, 2012 1 次提交
  10. 04 1月, 2012 2 次提交
  11. 18 10月, 2011 1 次提交
  12. 13 10月, 2011 2 次提交
    • S
      cifs: Add mount options for backup intent (try #6) · 3d3ea8e6
      Shirish Pargaonkar 提交于
      Add mount options backupuid and backugid.
      
      It allows an authenticated user to access files with the intent to back them
      up including their ACLs, who may not have access permission but has
      "Backup files and directories user right" on them (by virtue of being part
      of the built-in group Backup Operators.
      
      When mount options backupuid is specified, cifs client restricts the
      use of backup intents to the user whose effective user id is specified
      along with the mount option.
      
      When mount options backupgid is specified, cifs client restricts the
      use of backup intents to the users whose effective user id belongs to the
      group id specified along with the mount option.
      
      If an authenticated user is not part of the built-in group Backup Operators
      at the server, access to such files is denied, even if allowed by the client.
      Signed-off-by: NShirish Pargaonkar <shirishpargaonkar@gmail.com>
      Reviewed-by: NJeff Layton <jlayton@redhat.com>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      3d3ea8e6
    • S
      add new module parameter 'enable_oplocks' · e7504734
      Steve French 提交于
      Thus spake Jeff Layton:
      
      "Making that a module parm would allow you to set that parameter at boot
      time without needing to add special startup scripts. IMO, all of the
      procfile "switches" under /proc/fs/cifs should be module parms
      instead."
      
      This patch doesn't alter the default behavior (Oplocks are enabled by
      default).
      
      To disable oplocks when loading the module, use
      
         modprobe cifs enable_oplocks=0
      
      (any of '0' or 'n' or 'N' conventions can be used).
      
      To disable oplocks at runtime using the new interface, use
      
         echo 0 > /sys/module/cifs/parameters/enable_oplocks
      
      The older /proc/fs/cifs/OplockEnabled interface will be deprecated
      after two releases. A subsequent patch will add an warning message
      about this deprecation.
      
      Changes since v2:
         - make enable_oplocks a 'bool'
      
      Changes since v1:
         - eliminate the use of extra variable by renaming the old one to
           enable_oplocks and make it an 'int' type.
      Reported-by: NAlexander Swen <alex@swen.nu>
      Reviewed-by: NJeff Layton <jlayton@redhat.com>
      Signed-off-by: NSuresh Jayaraman <sjayaraman@suse.de>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      e7504734
  13. 16 8月, 2011 1 次提交
    • J
      cifs: demote cERROR in build_path_from_dentry to cFYI · fa71f447
      Jeff Layton 提交于
      Running the cthon tests on a recent kernel caused this message to pop
      occasionally:
      
          CIFS VFS: did not end path lookup where expected namelen is 0
      
      Some added debugging showed that namelen and dfsplen were both 0 when
      this occurred. That means that the read_seqretry returned true.
      
      Assuming that the comment inside the if statement is true, this should
      be harmless and just means that we raced with a rename. If that is the
      case, then there's no need for alarm and we can demote this to cFYI.
      
      While we're at it, print the dfsplen too so that we can see what
      happened here if the message pops during debugging.
      
      Cc: stable@kernel.org
      Cc: Al Viro <viro@ZenIV.linux.org.uk>
      Signed-off-by: NJeff Layton <jlayton@redhat.com>
      Signed-off-by: NSteve French <sfrench@us.ibm.com>
      fa71f447
  14. 26 7月, 2011 3 次提交
  15. 20 7月, 2011 3 次提交
  16. 17 7月, 2011 1 次提交
  17. 27 5月, 2011 3 次提交
  18. 31 3月, 2011 1 次提交
  19. 16 1月, 2011 1 次提交
  20. 13 1月, 2011 1 次提交
  21. 10 1月, 2011 2 次提交
  22. 07 1月, 2011 1 次提交