aboutsummaryrefslogtreecommitdiffstats
path: root/fs/Kconfig
diff options
context:
space:
mode:
authorTrond Myklebust <Trond.Myklebust@netapp.com>2008-04-24 14:01:02 -0400
committerTrond Myklebust <Trond.Myklebust@netapp.com>2008-04-24 14:01:02 -0400
commit233607dbbc823caf685e778cabc49fb7f679900b (patch)
tree13840137ee10788061cbec60fcfe8ea4c274558e /fs/Kconfig
parent3dc5063786b273f1aee545844f6bd4e9651ebffe (diff)
parentb48633bd086d21f4a2a5bea96c7e6c7ba58eb60c (diff)
Merge branch 'devel'
Diffstat (limited to 'fs/Kconfig')
-rw-r--r--fs/Kconfig70
1 files changed, 33 insertions, 37 deletions
diff --git a/fs/Kconfig b/fs/Kconfig
index 8b18a8758677..48ca1e1316d9 100644
--- a/fs/Kconfig
+++ b/fs/Kconfig
@@ -1664,30 +1664,6 @@ config NFS_V4
1664 1664
1665 If unsure, say N. 1665 If unsure, say N.
1666 1666
1667config NFS_DIRECTIO
1668 bool "Allow direct I/O on NFS files"
1669 depends on NFS_FS
1670 help
1671 This option enables applications to perform uncached I/O on files
1672 in NFS file systems using the O_DIRECT open() flag. When O_DIRECT
1673 is set for a file, its data is not cached in the system's page
1674 cache. Data is moved to and from user-level application buffers
1675 directly. Unlike local disk-based file systems, NFS O_DIRECT has
1676 no alignment restrictions.
1677
1678 Unless your program is designed to use O_DIRECT properly, you are
1679 much better off allowing the NFS client to manage data caching for
1680 you. Misusing O_DIRECT can cause poor server performance or network
1681 storms. This kernel build option defaults OFF to avoid exposing
1682 system administrators unwittingly to a potentially hazardous
1683 feature.
1684
1685 For more details on NFS O_DIRECT, see fs/nfs/direct.c.
1686
1687 If unsure, say N. This reduces the size of the NFS client, and
1688 causes open() to return EINVAL if a file residing in NFS is
1689 opened with the O_DIRECT flag.
1690
1691config NFSD 1667config NFSD
1692 tristate "NFS server support" 1668 tristate "NFS server support"
1693 depends on INET 1669 depends on INET
@@ -1808,15 +1784,33 @@ config SUNRPC_XPRT_RDMA
1808 tristate 1784 tristate
1809 depends on SUNRPC && INFINIBAND && EXPERIMENTAL 1785 depends on SUNRPC && INFINIBAND && EXPERIMENTAL
1810 default SUNRPC && INFINIBAND 1786 default SUNRPC && INFINIBAND
1787 help
1788 This option enables an RPC client transport capability that
1789 allows the NFS client to mount servers via an RDMA-enabled
1790 transport.
1791
1792 To compile RPC client RDMA transport support as a module,
1793 choose M here: the module will be called xprtrdma.
1794
1795 If unsure, say N.
1811 1796
1812config SUNRPC_BIND34 1797config SUNRPC_BIND34
1813 bool "Support for rpcbind versions 3 & 4 (EXPERIMENTAL)" 1798 bool "Support for rpcbind versions 3 & 4 (EXPERIMENTAL)"
1814 depends on SUNRPC && EXPERIMENTAL 1799 depends on SUNRPC && EXPERIMENTAL
1800 default n
1815 help 1801 help
1816 Provides kernel support for querying rpcbind servers via versions 3 1802 RPC requests over IPv6 networks require support for larger
1817 and 4 of the rpcbind protocol. The kernel automatically falls back 1803 addresses when performing an RPC bind. Sun added support for
1818 to version 2 if a remote rpcbind service does not support versions 1804 IPv6 addressing by creating two new versions of the rpcbind
1819 3 or 4. 1805 protocol (RFC 1833).
1806
1807 This option enables support in the kernel RPC client for
1808 querying rpcbind servers via versions 3 and 4 of the rpcbind
1809 protocol. The kernel automatically falls back to version 2
1810 if a remote rpcbind service does not support versions 3 or 4.
1811 By themselves, these new versions do not provide support for
1812 RPC over IPv6, but the new protocol versions are necessary to
1813 support it.
1820 1814
1821 If unsure, say N to get traditional behavior (version 2 rpcbind 1815 If unsure, say N to get traditional behavior (version 2 rpcbind
1822 requests only). 1816 requests only).
@@ -1830,12 +1824,13 @@ config RPCSEC_GSS_KRB5
1830 select CRYPTO_DES 1824 select CRYPTO_DES
1831 select CRYPTO_CBC 1825 select CRYPTO_CBC
1832 help 1826 help
1833 Provides for secure RPC calls by means of a gss-api 1827 Choose Y here to enable Secure RPC using the Kerberos version 5
1834 mechanism based on Kerberos V5. This is required for 1828 GSS-API mechanism (RFC 1964).
1835 NFSv4.
1836 1829
1837 Note: Requires an auxiliary userspace daemon which may be found on 1830 Secure RPC calls with Kerberos require an auxiliary user-space
1838 http://www.citi.umich.edu/projects/nfsv4/ 1831 daemon which may be found in the Linux nfs-utils package
1832 available from http://linux-nfs.org/. In addition, user-space
1833 Kerberos support should be installed.
1839 1834
1840 If unsure, say N. 1835 If unsure, say N.
1841 1836
@@ -1849,11 +1844,12 @@ config RPCSEC_GSS_SPKM3
1849 select CRYPTO_CAST5 1844 select CRYPTO_CAST5
1850 select CRYPTO_CBC 1845 select CRYPTO_CBC
1851 help 1846 help
1852 Provides for secure RPC calls by means of a gss-api 1847 Choose Y here to enable Secure RPC using the SPKM3 public key
1853 mechanism based on the SPKM3 public-key mechanism. 1848 GSS-API mechansim (RFC 2025).
1854 1849
1855 Note: Requires an auxiliary userspace daemon which may be found on 1850 Secure RPC calls with SPKM3 require an auxiliary userspace
1856 http://www.citi.umich.edu/projects/nfsv4/ 1851 daemon which may be found in the Linux nfs-utils package
1852 available from http://linux-nfs.org/.
1857 1853
1858 If unsure, say N. 1854 If unsure, say N.
1859 1855