mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-01 11:46:49 +07:00
2c49be99ed
Use the set_disk_ro() API when the backing file is read-only, to mark the disk read-only, during the ->open(). The current hack does not work when doing a mount -o remount. Also, mark explicitly the code paths which should no more be triggerable (I've removed the WARN_ON(1) things). They should actually become BUG()s probably but I'll avoid that since I'm not so sure the change works so well. I gave it only some limited testing. Signed-off-by: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it> CC: Jens Axboe <axboe@suse.de> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
chan_kern.c | ||
chan_user.c | ||
cow_sys.h | ||
cow_user.c | ||
cow.h | ||
daemon_kern.c | ||
daemon_user.c | ||
daemon.h | ||
fd.c | ||
harddog_kern.c | ||
harddog_user.c | ||
hostaudio_kern.c | ||
line.c | ||
Makefile | ||
mcast_kern.c | ||
mcast_user.c | ||
mcast.h | ||
mconsole_kern.c | ||
mconsole_user.c | ||
mmapper_kern.c | ||
net_kern.c | ||
net_user.c | ||
null.c | ||
pcap_kern.c | ||
pcap_user.c | ||
pcap_user.h | ||
port_kern.c | ||
port_user.c | ||
port.h | ||
pty.c | ||
random.c | ||
slip_kern.c | ||
slip_proto.h | ||
slip_user.c | ||
slip.h | ||
slirp_kern.c | ||
slirp_user.c | ||
slirp.h | ||
ssl.c | ||
ssl.h | ||
stderr_console.c | ||
stdio_console.c | ||
stdio_console.h | ||
tty.c | ||
ubd_kern.c | ||
ubd_user.c | ||
xterm_kern.c | ||
xterm.c | ||
xterm.h |