summaryrefslogtreecommitdiffstats
path: root/fs
diff options
context:
space:
mode:
authorWolfgang Walter <wolfgang.walter@studentenwerk.mhn.de>2007-09-20 15:51:46 -0400
committerLinus Torvalds <torvalds@woody.linux-foundation.org>2007-09-20 13:15:57 -0700
commit9db619e66503494e41159de3c76fafabe80d016b (patch)
tree8f7d2ba98c216a772b5a0e5ab89708dcaceaa1e3 /fs
parentf685ddaf0fc9b9f53eb9346c858664776becf5d9 (diff)
downloadkernel-crypto-9db619e66503494e41159de3c76fafabe80d016b.tar.gz
kernel-crypto-9db619e66503494e41159de3c76fafabe80d016b.tar.xz
kernel-crypto-9db619e66503494e41159de3c76fafabe80d016b.zip
rpc: fix garbage in printk in svc_tcp_accept()
we upgraded the kernel of a nfs-server from 2.6.17.11 to 2.6.22.6. Since then we get the message lockd: too many open TCP sockets, consider increasing the number of nfsd threads lockd: last TCP connect from ^\\236^\É^D These random characters in the second line are caused by a bug in svc_tcp_accept. (Note: there are two previous __svc_print_addr(sin, buf, sizeof(buf)) calls in this function, either of which would initialize buf correctly; but both are inside "if"'s and are not necessarily executed. This is less obvious in the second case, which is inside a dprintk(), which is a macro which expands to an if statement.) Signed-off-by: Wolfgang Walter <wolfgang.walter@studentenwerk.mhn.de> Signed-off-by: J. Bruce Fields <bfields@citi.umich.edu> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'fs')
0 files changed, 0 insertions, 0 deletions