[possible resend -- sorry]
On 02/28/2013 07:25 AM, Pavel Shilovsky wrote:
> This patchset adds support of O_DENY* flags for Linux fs layer. These flags
> can be used by any application that needs share reservations to organize a
> file access. VFS already has some sort of this capability - now i
Hi,
I am Tejas Nikumbh, an undergrad at Indian Institute of Technology Bombay.
I will be participating in GSoC this year. [GSoC 2013]. In order to imporve
my chances for getting selected this year, I would like to start
contributing early on to Open Source development via Wine.
Here's a little ba
2013/3/1 Andy Lutomirski :
> [possible resend -- sorry]
>
> On 02/28/2013 07:25 AM, Pavel Shilovsky wrote:
>> This patchset adds support of O_DENY* flags for Linux fs layer. These flags
>> can be used by any application that needs share reservations to organize a
>> file access. VFS already has s
Why is this patch marked as "not applied" by the testbot?
In my computer, with the latest git, it applies fine.
Is there a problem with testbot?
Nozomi
De : Marvin
À : nozomi.kod...@yahoo.com
Cc : wine-devel@winehq.org
Envoyé le : Jeudi 28 février 2013 18
Hi,
While running your changed tests on Windows, I think I found new failures.
Being a bot and all I'm not very good at pattern recognition, so I might be
wrong, but could you please double-check?
Full results can be found at
http://testbot.winehq.org/JobDetails.pl?Key=24560
Your paranoid android
writes:
> @@ -2063,9 +2063,10 @@ static DWORD MCI_Break(UINT wDevID, DWORD dwFlags,
> LPMCI_BREAK_PARMS lpParms)
> switch (dwFlags & (MCI_BREAK_KEY | MCI_BREAK_OFF)) {
> case MCI_BREAK_KEY:
> wmd->lpfnYieldProc = MCI_DefYieldProc;
> - wmd->dwYieldData = lpParms->nVirtKey;
>
> How are you handling the case where format is NULL?
Never mind, I see what you're doing. But since the block where you now
handle the horizontal alignment is inside an if (format->vertalign !=
StringAlignmentNear), this will break horizontal alignment when a
vertical alignment is not set.
> -if (format) halign = format->align;
> -else halign = StringAlignmentNear;
> -
How are you handling the case where format is NULL?
that maps them into O_DENY flags and make them visible for
applications that use O_DENYMAND opens.
Signed-off-by: Pavel Shilovsky
---
fs/locks.c | 1 +
fs/nfsd/nfs4state.c | 46 +-
2 files changed, 46 insertions(+), 1 deletion(-)
diff --git
by passing these flags to NFSv4 open request.
Signed-off-by: Pavel Shilovsky
---
fs/nfs/nfs4xdr.c | 24
1 file changed, 20 insertions(+), 4 deletions(-)
diff --git a/fs/nfs/nfs4xdr.c b/fs/nfs/nfs4xdr.c
index 26b1439..58ddc74 100644
--- a/fs/nfs/nfs4xdr.c
+++ b/fs/nfs/nf
to make it match CIFS and VFS variants.
Signed-off-by: Pavel Shilovsky
---
fs/cifs/smb2maperror.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/fs/cifs/smb2maperror.c b/fs/cifs/smb2maperror.c
index 494c912..11e589e 100644
--- a/fs/cifs/smb2maperror.c
+++ b/fs/cifs/smb2maper
forcemand mount option now lets us use Windows mandatory style of
byte-range locks even if server supports posix ones - switches on
Windows locking mechanism. Share flags is another locking mehanism
provided by Windows semantic that can be used by NT_CREATE_ANDX
command. This patch combines all Win
Make CIFSSMBOpen take share_flags as a parm that allows us
to pass new O_DENY* flags to the server.
Signed-off-by: Pavel Shilovsky
---
fs/cifs/cifsacl.c | 6 --
fs/cifs/cifsglob.h | 12 +++-
fs/cifs/cifsproto.h | 9 +
fs/cifs/cifssmb.c | 47 +---
If O_DENYMAND flag is specified, O_DENYREAD/WRITE/MAND flags are
translated to flock's flags:
!O_DENYREAD -> LOCK_READ
!O_DENYWRITE -> LOCK_WRITE
O_DENYMAND -> LOCK_MAND
and set through flock_lock_file on a file.
This change affects opens that use O_DENYMAND flag - all other
native Linux open
This patch adds 4 flags:
1) O_DENYREAD that doesn't permit read access,
2) O_DENYWRITE that doesn't permit write access,
3) O_DENYDELETE that doesn't permit delete or rename,
4) O_DENYMAND that enables O_DENY* flags checks.
Network filesystems CIFS, SMB2.0, SMB3.0 and NFSv4 have such flags -
this
This patchset adds support of O_DENY* flags for Linux fs layer. These flags can
be used by any application that needs share reservations to organize a file
access. VFS already has some sort of this capability - now it's done through
flock/LOCK_MAND mechanis, but that approach is non-atomic. This
Hi,
While running your changed tests on Windows, I think I found new failures.
Being a bot and all I'm not very good at pattern recognition, so I might be
wrong, but could you please double-check?
Full results can be found at
http://testbot.winehq.org/JobDetails.pl?Key=24550
Your paranoid android
17 matches
Mail list logo