Displaying 20 results from an estimated 300 matches similar to: "[2.6 patch] fs/ext3/: possible cleanups"
2005 Jun 20
0
[patch 3/3] Fix misleading gcc4 warning, size may be used uninitialized (ext3)
An embedded and charset-unspecified text was scrubbed...
Name: gcc4-fs_ext3_acl.c
URL: <http://listman.redhat.com/archives/ext3-users/attachments/20050620/80eb5460/attachment.c>
2005 Mar 25
1
[PATCH] kfree() NULL pointer cleanups - no need to check - fs/ext3/
kfree() handles NULL pointers fine - checking is redundant.
Signed-off-by: Jesper Juhl <juhl-lkml at dif.dk>
--- linux-2.6.12-rc1-mm3-orig/fs/ext3/acl.c 2005-03-02 08:37:55.000000000 +0100
+++ linux-2.6.12-rc1-mm3/fs/ext3/acl.c 2005-03-25 22:41:41.000000000 +0100
@@ -197,8 +197,7 @@ ext3_get_acl(struct inode *inode, int ty
acl = NULL;
else
acl = ERR_PTR(retval);
- if (value)
-
2003 Jun 24
1
"NoOp" gives an ringing indication ?
Hi all,
i want lock Zap channels via global var FREE1
if FREE1 = 1 then call should go on with nothing and waiting for digits to
go in _X.
Otherwise hangup the channel
But if the GotoIf goes to s|4 (NoOp) then comes a ringing indication.... !?
The "immediate" property in the zapat.conf is "yes"
[tel1]
exten => s,1,GotoIf($[${FREE1} = 1]?s|4:s|2)
exten =>
2010 Mar 20
2
[PATCH 4/4] btrfs-convert: split into convert/.
No material changes are made.
---
Makefile | 10 +-
convert.c => convert/convert.c | 803 +---------------------------------------
convert/convert.h | 76 ++++
convert/ext2.c | 791 +++++++++++++++++++++++++++++++++++++++
4 files changed, 873 insertions(+), 807 deletions(-)
rename convert.c => convert/convert.c (74%)
create mode
2008 Oct 17
3
[PATCH 0/3] ocfs2: add security EA and ACL support v3
Hi,
These three patches fix the problems in the version two.
And them base on the Tao's patches:
ocfs2/xattr: xattr improvement
The first patch fix some problem in xattr code.
The second patch add security EA support.
The third patch add ACL support.
Best regards,
tiger
2008 Oct 27
3
ocfs2: add security EA support v4
Hi,
I split the previous support security EA patch into four patches for
review. Them besed on joel's xattr-28 branch and tao's patch "Merge
xattr set transaction".
1: move new_inode out of the transaction.
2: add ocfs2_xattr_set_handle.
3: add security xattr APIs
4: add init_security in mknod.
Best regards,
tiger
2014 Feb 04
0
[PATCH 1/3] daemon: parted: refactor sgdisk info parsing code
Isolate in an own function the code that runs sgdisk and parse a field
of it (using an extraction function passed as parameter), using it for
the GUID type.
This is just code motion, no actual behaviour changes.
---
daemon/parted.c | 53 +++++++++++++++++++++++++++++++++++++----------------
1 file changed, 37 insertions(+), 16 deletions(-)
diff --git a/daemon/parted.c b/daemon/parted.c
index
2015 Sep 09
2
[PATCH] inspect: try to use /etc/os-release on Linux guests
If a Linux guest has /etc/os-release (mandatory for systemd, so all the
recent Linux distributions have it), try to parse it for the distro, its
version, and its product name. If we cannot get all of them, the
detection as done so far continues.
Other than changes in the product_name string (which is free-form
anyway, and already documented to not be parseable), there should be no
regressions in
2014 Feb 04
0
[PATCH 2/3] New API: part-get-name (RHBZ#593511).
Counterpart of part-set-name, it uses sgdisk (hence needs the "gdisk"
feature) to query for the label/name of a partition in a GPT layout.
---
daemon/parted.c | 33 +++++++++++++++++++++++++++++++++
generator/actions.ml | 13 +++++++++++++
src/MAX_PROC_NR | 2 +-
3 files changed, 47 insertions(+), 1 deletion(-)
diff --git a/daemon/parted.c b/daemon/parted.c
index
2014 Feb 04
0
Re: [PATCH 2/3] New API: part-get-name (RHBZ#593511).
On Tuesday 04 February 2014 15:59:36 Richard W.M. Jones wrote:
> On Tue, Feb 04, 2014 at 04:01:32PM +0100, Pino Toscano wrote:
> > +static char *
> > +extract_optionally_quoted (const char *value)
> > +{
> > + size_t value_len = strlen (value);
> > +
> > + if (value_len >= 2 &&
> > + ((value[0] == '\'' &&
2013 Oct 16
0
[PATCH] Btrfs: add tests for btrfs_get_extent V2
I''m going to be removing hole extents in the near future so I wanted to make a
sanity test for btrfs_get_extent to make sure I don''t break anything in the
meantime. This patch just puts btrfs_get_extent through its paces by giving it
a completely unreasonable mapping to look at and make sure it is giving us back
maps that make sense. Thanks,
Signed-off-by: Josef Bacik
2023 Jan 25
2
[PATCH 00/12] acl: remove remaining posix acl handlers
Hey everyone,
after we finished the introduction of the new posix acl api last cycle
we still left the generic POSIX ACL xattr handler around for two
reasons. First, because a few filesystems relied on the ->list() method
of the generic POSIX ACL xattr handlers in their ->listxattr() inode
operation. Second, during inode initalization in inode_init_always() the
registered xattr handlers in
2014 Feb 04
2
Re: [PATCH 2/3] New API: part-get-name (RHBZ#593511).
On Tue, Feb 04, 2014 at 04:01:32PM +0100, Pino Toscano wrote:
> +static char *
> +extract_optionally_quoted (const char *value)
> +{
> + size_t value_len = strlen (value);
> +
> + if (value_len >= 2 &&
> + ((value[0] == '\'' && value[value_len - 1] == '\'') ||
> + (value[0] == '"' &&
2013 Sep 24
1
imaptest-20130617 seems to be reporting spurious header changes
I'm trying to use this to test an IMAP server I'm developing (I picked
the nightly up from the link on the wiki page at
http://www.imapwiki.org/ImapTest/Installation). With one client using
the mailbox dovecot-crlf (http://www.dovecot.org/tmp/dovecot-crlf) I get
messages like:
Error: test at npsl.co.uk[67]: 1035253882.5041.34.camel at hurina: Header From
changed 'Timo Sirainen
2012 Apr 29
0
[PATCH 1/2] vfs: re-implement writeback_inodes_sb(_nr)_if_idle() and rename them
writeback_inodes_sb(_nr)_if_idle() is re-implemented by replacing down_read()
with down_read_trylock() because
- If ->s_umount is write locked, then the sb is not idle. That is
writeback_inodes_sb(_nr)_if_idle() needn''t wait for the lock.
- writeback_inodes_sb(_nr)_if_idle() grabs s_umount lock when it want to start
writeback, it may bring us deadlock problem when doing umount.
2012 Dec 14
1
[PATCH] Add support for getting and setting GPT partition type GUIDs
New APIs:
part_set_gpt_type
part_get_gpt_type
---
appliance/packagelist.in | 1 +
daemon/parted.c | 129 +++++++++++++++++++++++++++++++++++++++++++++++
generator/actions.ml | 30 +++++++++++
generator/tests_c_api.ml | 7 +++
generator/types.ml | 5 ++
src/MAX_PROC_NR | 2 +-
6 files changed, 173 insertions(+), 1 deletion(-)
diff --git
2002 Dec 06
2
[patch] fix the ext3 data=journal unmount bug
This patch fixes the data loss which can occur when unmounting a
data=journal ext3 filesystem.
The core problem is that the VFS doesn't tell the filesystem enough
about what is happening. ext3 _needs_ to know the difference between
regular memory-cleansing writeback and sync-for-data-integrity
purposes.
(These two operations are really quite distinct, and the kernel has got
it wrong for
2023 Feb 21
0
[PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
On Tue, 2023-02-21 at 14:45 +0800, Joseph Qi wrote:
> Hi,
>
> Sorry for the late reply.
>
> I don't have much background on this thread. It seems that we have to
> check EOPNOTSUPP since ocfs2_init_security_get() may return EOPNOTSUPP
> if it doesn't support extended attribute feature for backward
> compatibility.
Hi Joseph
yes, I already reintroduced the check.
2011 Jun 02
0
[PATCH v6 11/20] evm: add evm_inode_post_init call in btrfs
After creating the initial LSM security extended attribute, call
evm_inode_post_init_security() to create the ''security.evm''
extended attribute.
Signed-off-by: Mimi Zohar <zohar@us.ibm.com>
---
fs/btrfs/xattr.c | 39 +++++++++++++++++++++++++++++----------
1 files changed, 29 insertions(+), 10 deletions(-)
diff --git a/fs/btrfs/xattr.c b/fs/btrfs/xattr.c
index
2011 May 16
0
[PATCH v5 12/21] evm: add evm_inode_post_init call in btrfs
After creating the initial LSM security extended attribute, call
evm_inode_post_init_security() to create the ''security.evm''
extended attribute.
Signed-off-by: Mimi Zohar <zohar@us.ibm.com>
---
fs/btrfs/xattr.c | 39 +++++++++++++++++++++++++++++----------
1 files changed, 29 insertions(+), 10 deletions(-)
diff --git a/fs/btrfs/xattr.c b/fs/btrfs/xattr.c
index